aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/libs/openssl/crypto
diff options
context:
space:
mode:
authororivej <orivej@yandex-team.ru>2022-02-10 16:44:49 +0300
committerDaniil Cherednik <dcherednik@yandex-team.ru>2022-02-10 16:44:49 +0300
commit718c552901d703c502ccbefdfc3c9028d608b947 (patch)
tree46534a98bbefcd7b1f3faa5b52c138ab27db75b7 /contrib/libs/openssl/crypto
parente9656aae26e0358d5378e5b63dcac5c8dbe0e4d0 (diff)
downloadydb-718c552901d703c502ccbefdfc3c9028d608b947.tar.gz
Restoring authorship annotation for <orivej@yandex-team.ru>. Commit 1 of 2.
Diffstat (limited to 'contrib/libs/openssl/crypto')
-rw-r--r--contrib/libs/openssl/crypto/asn1/a_time.c52
-rw-r--r--contrib/libs/openssl/crypto/asn1/a_type.c14
-rw-r--r--contrib/libs/openssl/crypto/asn1/x_bignum.c28
-rw-r--r--contrib/libs/openssl/crypto/bio/b_addr.c42
-rw-r--r--contrib/libs/openssl/crypto/bio/bss_dgram.c4
-rw-r--r--contrib/libs/openssl/crypto/bio/bss_file.c54
-rw-r--r--contrib/libs/openssl/crypto/bio/bss_mem.c54
-rw-r--r--contrib/libs/openssl/crypto/blake2/blake2b.c10
-rw-r--r--contrib/libs/openssl/crypto/bn/bn_ctx.c4
-rw-r--r--contrib/libs/openssl/crypto/bn/bn_div.c2
-rw-r--r--contrib/libs/openssl/crypto/bn/bn_lib.c144
-rw-r--r--contrib/libs/openssl/crypto/bn/bn_prime.c14
-rw-r--r--contrib/libs/openssl/crypto/bn/bn_rand.c4
-rw-r--r--contrib/libs/openssl/crypto/bn/bn_sqrt.c6
-rw-r--r--contrib/libs/openssl/crypto/cms/cms_att.c270
-rw-r--r--contrib/libs/openssl/crypto/cms/cms_env.c36
-rw-r--r--contrib/libs/openssl/crypto/cms/cms_err.c8
-rw-r--r--contrib/libs/openssl/crypto/cms/cms_sd.c62
-rw-r--r--contrib/libs/openssl/crypto/cms/cms_smime.c8
-rw-r--r--contrib/libs/openssl/crypto/conf/conf_sap.c2
-rw-r--r--contrib/libs/openssl/crypto/ctype.c14
-rw-r--r--contrib/libs/openssl/crypto/dh/dh_check.c46
-rw-r--r--contrib/libs/openssl/crypto/dh/dh_gen.c54
-rw-r--r--contrib/libs/openssl/crypto/dh/dh_key.c26
-rw-r--r--contrib/libs/openssl/crypto/dh/dh_lib.c6
-rw-r--r--contrib/libs/openssl/crypto/dh/dh_pmeth.c4
-rw-r--r--contrib/libs/openssl/crypto/dsa/dsa_ameth.c4
-rw-r--r--contrib/libs/openssl/crypto/dsa/dsa_err.c6
-rw-r--r--contrib/libs/openssl/crypto/dsa/dsa_gen.c6
-rw-r--r--contrib/libs/openssl/crypto/dsa/dsa_ossl.c32
-rw-r--r--contrib/libs/openssl/crypto/dsa/dsa_pmeth.c20
-rw-r--r--contrib/libs/openssl/crypto/dso/dso_dlfcn.c4
-rw-r--r--contrib/libs/openssl/crypto/dso/dso_openssl.c4
-rw-r--r--contrib/libs/openssl/crypto/dso/dso_win32.c210
-rw-r--r--contrib/libs/openssl/crypto/ec/curve25519.c4
-rw-r--r--contrib/libs/openssl/crypto/ec/curve448/curve448.c6
-rw-r--r--contrib/libs/openssl/crypto/ec/curve448/curve448_tables.c2848
-rw-r--r--contrib/libs/openssl/crypto/ec/curve448/curve448utils.h8
-rw-r--r--contrib/libs/openssl/crypto/ec/curve448/f_generic.c8
-rw-r--r--contrib/libs/openssl/crypto/ec/curve448/scalar.c20
-rw-r--r--contrib/libs/openssl/crypto/ec/ec2_oct.c10
-rw-r--r--contrib/libs/openssl/crypto/ec/ec2_smpl.c2
-rw-r--r--contrib/libs/openssl/crypto/ec/ec_ameth.c12
-rw-r--r--contrib/libs/openssl/crypto/ec/ec_asn1.c134
-rw-r--r--contrib/libs/openssl/crypto/ec/ec_curve.c226
-rw-r--r--contrib/libs/openssl/crypto/ec/ec_lib.c194
-rw-r--r--contrib/libs/openssl/crypto/ec/ec_mult.c8
-rw-r--r--contrib/libs/openssl/crypto/ec/ec_pmeth.c12
-rw-r--r--contrib/libs/openssl/crypto/ec/ecdh_ossl.c8
-rw-r--r--contrib/libs/openssl/crypto/ec/ecdsa_ossl.c24
-rw-r--r--contrib/libs/openssl/crypto/ec/ecp_nistp224.c52
-rw-r--r--contrib/libs/openssl/crypto/ec/ecp_nistp256.c54
-rw-r--r--contrib/libs/openssl/crypto/ec/ecp_nistp521.c72
-rw-r--r--contrib/libs/openssl/crypto/ec/ecp_nistputil.c26
-rw-r--r--contrib/libs/openssl/crypto/ec/ecp_nistz256.c2
-rw-r--r--contrib/libs/openssl/crypto/ec/ecp_smpl.c4
-rw-r--r--contrib/libs/openssl/crypto/ec/ecx_meth.c2
-rw-r--r--contrib/libs/openssl/crypto/engine/eng_devcrypto.c2
-rw-r--r--contrib/libs/openssl/crypto/engine/eng_openssl.c8
-rw-r--r--contrib/libs/openssl/crypto/err/err.c84
-rw-r--r--contrib/libs/openssl/crypto/evp/bio_ok.c4
-rw-r--r--contrib/libs/openssl/crypto/evp/digest.c8
-rw-r--r--contrib/libs/openssl/crypto/evp/e_aes.c182
-rw-r--r--contrib/libs/openssl/crypto/evp/e_aria.c50
-rw-r--r--contrib/libs/openssl/crypto/evp/e_chacha20_poly1305.c20
-rw-r--r--contrib/libs/openssl/crypto/evp/e_rc5.c10
-rw-r--r--contrib/libs/openssl/crypto/evp/evp_err.c18
-rw-r--r--contrib/libs/openssl/crypto/evp/evp_lib.c16
-rw-r--r--contrib/libs/openssl/crypto/evp/m_sha3.c8
-rw-r--r--contrib/libs/openssl/crypto/evp/p_lib.c12
-rw-r--r--contrib/libs/openssl/crypto/evp/p_open.c4
-rw-r--r--contrib/libs/openssl/crypto/hmac/hmac.c14
-rw-r--r--contrib/libs/openssl/crypto/init.c16
-rw-r--r--contrib/libs/openssl/crypto/lhash/lhash.c8
-rw-r--r--contrib/libs/openssl/crypto/mips_arch.h4
-rw-r--r--contrib/libs/openssl/crypto/modes/ccm128.c2
-rw-r--r--contrib/libs/openssl/crypto/o_str.c44
-rw-r--r--contrib/libs/openssl/crypto/objects/obj_dat.h4
-rw-r--r--contrib/libs/openssl/crypto/ocsp/ocsp_ext.c6
-rw-r--r--contrib/libs/openssl/crypto/ocsp/ocsp_lib.c6
-rw-r--r--contrib/libs/openssl/crypto/pem/pem_sign.c4
-rw-r--r--contrib/libs/openssl/crypto/pem/pvkfmt.c6
-rw-r--r--contrib/libs/openssl/crypto/pkcs7/pk7_doit.c18
-rw-r--r--contrib/libs/openssl/crypto/ppccap.c6
-rw-r--r--contrib/libs/openssl/crypto/rand/drbg_lib.c20
-rw-r--r--contrib/libs/openssl/crypto/rand/rand_err.c2
-rw-r--r--contrib/libs/openssl/crypto/rand/rand_lib.c260
-rw-r--r--contrib/libs/openssl/crypto/rand/rand_unix.c264
-rw-r--r--contrib/libs/openssl/crypto/rand/rand_vms.c8
-rw-r--r--contrib/libs/openssl/crypto/rand/rand_win.c8
-rw-r--r--contrib/libs/openssl/crypto/rand/randfile.c2
-rw-r--r--contrib/libs/openssl/crypto/rsa/rsa_ameth.c32
-rw-r--r--contrib/libs/openssl/crypto/rsa/rsa_err.c6
-rw-r--r--contrib/libs/openssl/crypto/rsa/rsa_gen.c6
-rw-r--r--contrib/libs/openssl/crypto/rsa/rsa_lib.c26
-rw-r--r--contrib/libs/openssl/crypto/rsa/rsa_oaep.c48
-rw-r--r--contrib/libs/openssl/crypto/rsa/rsa_ossl.c32
-rw-r--r--contrib/libs/openssl/crypto/rsa/rsa_pk1.c30
-rw-r--r--contrib/libs/openssl/crypto/rsa/rsa_pmeth.c12
-rw-r--r--contrib/libs/openssl/crypto/rsa/rsa_ssl.c36
-rw-r--r--contrib/libs/openssl/crypto/rsa/rsa_x931g.c6
-rw-r--r--contrib/libs/openssl/crypto/s390xcap.c12
-rw-r--r--contrib/libs/openssl/crypto/sha/keccak1600.c50
-rw-r--r--contrib/libs/openssl/crypto/sm2/sm2_sign.c6
-rw-r--r--contrib/libs/openssl/crypto/store/loader_file.c16
-rw-r--r--contrib/libs/openssl/crypto/store/store_lib.c2
-rw-r--r--contrib/libs/openssl/crypto/threads_none.c26
-rw-r--r--contrib/libs/openssl/crypto/threads_pthread.c22
-rw-r--r--contrib/libs/openssl/crypto/threads_win.c10
-rw-r--r--contrib/libs/openssl/crypto/ui/ui_lib.c6
-rw-r--r--contrib/libs/openssl/crypto/ui/ui_openssl.c2
-rw-r--r--contrib/libs/openssl/crypto/uid.c12
-rw-r--r--contrib/libs/openssl/crypto/whrlpool/wp_block.c2
-rw-r--r--contrib/libs/openssl/crypto/x509/by_dir.c6
-rw-r--r--contrib/libs/openssl/crypto/x509/t_req.c10
-rw-r--r--contrib/libs/openssl/crypto/x509/x509_att.c6
-rw-r--r--contrib/libs/openssl/crypto/x509/x509_cmp.c18
-rw-r--r--contrib/libs/openssl/crypto/x509/x509_err.c4
-rw-r--r--contrib/libs/openssl/crypto/x509/x509_lu.c140
-rw-r--r--contrib/libs/openssl/crypto/x509/x509_vfy.c14
-rw-r--r--contrib/libs/openssl/crypto/x509v3/v3_alt.c12
-rw-r--r--contrib/libs/openssl/crypto/x509v3/v3_genn.c4
-rw-r--r--contrib/libs/openssl/crypto/x509v3/v3_purp.c24
-rw-r--r--contrib/libs/openssl/crypto/ya.make1484
124 files changed, 4120 insertions, 4120 deletions
diff --git a/contrib/libs/openssl/crypto/asn1/a_time.c b/contrib/libs/openssl/crypto/asn1/a_time.c
index 54e0de1931..d5229a3a6c 100644
--- a/contrib/libs/openssl/crypto/asn1/a_time.c
+++ b/contrib/libs/openssl/crypto/asn1/a_time.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1999-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1999-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -67,7 +67,7 @@ static void determine_days(struct tm *tm)
}
c = y / 100;
y %= 100;
- /* Zeller's congruence */
+ /* Zeller's congruence */
tm->tm_wday = (d + (13 * m) / 5 + y + y / 4 + c / 4 + 5 * c + 6) % 7;
}
@@ -79,11 +79,11 @@ int asn1_time_to_tm(struct tm *tm, const ASN1_TIME *d)
char *a;
int n, i, i2, l, o, min_l = 11, strict = 0, end = 6, btz = 5, md;
struct tm tmp;
-#if defined(CHARSET_EBCDIC)
- const char upper_z = 0x5A, num_zero = 0x30, period = 0x2E, minus = 0x2D, plus = 0x2B;
-#else
- const char upper_z = 'Z', num_zero = '0', period = '.', minus = '-', plus = '+';
-#endif
+#if defined(CHARSET_EBCDIC)
+ const char upper_z = 0x5A, num_zero = 0x30, period = 0x2E, minus = 0x2D, plus = 0x2B;
+#else
+ const char upper_z = 'Z', num_zero = '0', period = '.', minus = '-', plus = '+';
+#endif
/*
* ASN1_STRING_FLAG_X509_TIME is used to enforce RFC 5280
* time string format, in which:
@@ -124,20 +124,20 @@ int asn1_time_to_tm(struct tm *tm, const ASN1_TIME *d)
if (l < min_l)
goto err;
for (i = 0; i < end; i++) {
- if (!strict && (i == btz) && ((a[o] == upper_z) || (a[o] == plus) || (a[o] == minus))) {
+ if (!strict && (i == btz) && ((a[o] == upper_z) || (a[o] == plus) || (a[o] == minus))) {
i++;
break;
}
- if (!ascii_isdigit(a[o]))
+ if (!ascii_isdigit(a[o]))
goto err;
- n = a[o] - num_zero;
+ n = a[o] - num_zero;
/* incomplete 2-digital number */
if (++o == l)
goto err;
- if (!ascii_isdigit(a[o]))
+ if (!ascii_isdigit(a[o]))
goto err;
- n = (n * 10) + a[o] - num_zero;
+ n = (n * 10) + a[o] - num_zero;
/* no more bytes to read, but we haven't seen time-zone yet */
if (++o == l)
goto err;
@@ -189,14 +189,14 @@ int asn1_time_to_tm(struct tm *tm, const ASN1_TIME *d)
* Optional fractional seconds: decimal point followed by one or more
* digits.
*/
- if (d->type == V_ASN1_GENERALIZEDTIME && a[o] == period) {
+ if (d->type == V_ASN1_GENERALIZEDTIME && a[o] == period) {
if (strict)
/* RFC 5280 forbids fractional seconds */
goto err;
if (++o == l)
goto err;
i = o;
- while ((o < l) && ascii_isdigit(a[o]))
+ while ((o < l) && ascii_isdigit(a[o]))
o++;
/* Must have at least one digit after decimal point */
if (i == o)
@@ -211,10 +211,10 @@ int asn1_time_to_tm(struct tm *tm, const ASN1_TIME *d)
* 'o' can point to '\0' is either the subsequent if or the first
* else if is true.
*/
- if (a[o] == upper_z) {
+ if (a[o] == upper_z) {
o++;
- } else if (!strict && ((a[o] == plus) || (a[o] == minus))) {
- int offsign = a[o] == minus ? 1 : -1;
+ } else if (!strict && ((a[o] == plus) || (a[o] == minus))) {
+ int offsign = a[o] == minus ? 1 : -1;
int offset = 0;
o++;
@@ -227,13 +227,13 @@ int asn1_time_to_tm(struct tm *tm, const ASN1_TIME *d)
if (o + 4 != l)
goto err;
for (i = end; i < end + 2; i++) {
- if (!ascii_isdigit(a[o]))
+ if (!ascii_isdigit(a[o]))
goto err;
- n = a[o] - num_zero;
+ n = a[o] - num_zero;
o++;
- if (!ascii_isdigit(a[o]))
+ if (!ascii_isdigit(a[o]))
goto err;
- n = (n * 10) + a[o] - num_zero;
+ n = (n * 10) + a[o] - num_zero;
i2 = (d->type == V_ASN1_UTCTIME) ? i + 1 : i;
if ((n < min[i2]) || (n > max[i2]))
goto err;
@@ -304,7 +304,7 @@ ASN1_TIME *asn1_time_from_tm(ASN1_TIME *s, struct tm *ts, int type)
ts->tm_mday, ts->tm_hour, ts->tm_min,
ts->tm_sec);
-#ifdef CHARSET_EBCDIC
+#ifdef CHARSET_EBCDIC
ebcdic2ascii(tmps->data, tmps->data, tmps->length);
#endif
return tmps;
@@ -471,7 +471,7 @@ int ASN1_TIME_print(BIO *bp, const ASN1_TIME *tm)
char *v;
int gmt = 0, l;
struct tm stm;
- const char upper_z = 0x5A, period = 0x2E;
+ const char upper_z = 0x5A, period = 0x2E;
if (!asn1_time_to_tm(&stm, tm)) {
/* asn1_time_to_tm will check the time type */
@@ -480,7 +480,7 @@ int ASN1_TIME_print(BIO *bp, const ASN1_TIME *tm)
l = tm->length;
v = (char *)tm->data;
- if (v[l - 1] == upper_z)
+ if (v[l - 1] == upper_z)
gmt = 1;
if (tm->type == V_ASN1_GENERALIZEDTIME) {
@@ -491,10 +491,10 @@ int ASN1_TIME_print(BIO *bp, const ASN1_TIME *tm)
* Try to parse fractional seconds. '14' is the place of
* 'fraction point' in a GeneralizedTime string.
*/
- if (tm->length > 15 && v[14] == period) {
+ if (tm->length > 15 && v[14] == period) {
f = &v[14];
f_len = 1;
- while (14 + f_len < l && ascii_isdigit(f[f_len]))
+ while (14 + f_len < l && ascii_isdigit(f[f_len]))
++f_len;
}
diff --git a/contrib/libs/openssl/crypto/asn1/a_type.c b/contrib/libs/openssl/crypto/asn1/a_type.c
index 4a96315df0..5bdcdd4a17 100644
--- a/contrib/libs/openssl/crypto/asn1/a_type.c
+++ b/contrib/libs/openssl/crypto/asn1/a_type.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -15,9 +15,9 @@
int ASN1_TYPE_get(const ASN1_TYPE *a)
{
- if (a->type == V_ASN1_BOOLEAN
- || a->type == V_ASN1_NULL
- || a->value.ptr != NULL)
+ if (a->type == V_ASN1_BOOLEAN
+ || a->type == V_ASN1_NULL
+ || a->value.ptr != NULL)
return a->type;
else
return 0;
@@ -25,9 +25,9 @@ int ASN1_TYPE_get(const ASN1_TYPE *a)
void ASN1_TYPE_set(ASN1_TYPE *a, int type, void *value)
{
- if (a->type != V_ASN1_BOOLEAN
- && a->type != V_ASN1_NULL
- && a->value.ptr != NULL) {
+ if (a->type != V_ASN1_BOOLEAN
+ && a->type != V_ASN1_NULL
+ && a->value.ptr != NULL) {
ASN1_TYPE **tmp_a = &a;
asn1_primitive_free((ASN1_VALUE **)tmp_a, NULL, 0);
}
diff --git a/contrib/libs/openssl/crypto/asn1/x_bignum.c b/contrib/libs/openssl/crypto/asn1/x_bignum.c
index c6b3accd3a..2755c7b4c6 100644
--- a/contrib/libs/openssl/crypto/asn1/x_bignum.c
+++ b/contrib/libs/openssl/crypto/asn1/x_bignum.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -130,20 +130,20 @@ static int bn_c2i(ASN1_VALUE **pval, const unsigned char *cont, int len,
static int bn_secure_c2i(ASN1_VALUE **pval, const unsigned char *cont, int len,
int utype, char *free_cont, const ASN1_ITEM *it)
{
- int ret;
- BIGNUM *bn;
-
+ int ret;
+ BIGNUM *bn;
+
if (*pval == NULL && !bn_secure_new(pval, it))
- return 0;
-
- ret = bn_c2i(pval, cont, len, utype, free_cont, it);
- if (!ret)
- return 0;
-
- /* Set constant-time flag for all secure BIGNUMS */
- bn = (BIGNUM *)*pval;
- BN_set_flags(bn, BN_FLG_CONSTTIME);
- return ret;
+ return 0;
+
+ ret = bn_c2i(pval, cont, len, utype, free_cont, it);
+ if (!ret)
+ return 0;
+
+ /* Set constant-time flag for all secure BIGNUMS */
+ bn = (BIGNUM *)*pval;
+ BN_set_flags(bn, BN_FLG_CONSTTIME);
+ return ret;
}
static int bn_print(BIO *out, ASN1_VALUE **pval, const ASN1_ITEM *it,
diff --git a/contrib/libs/openssl/crypto/bio/b_addr.c b/contrib/libs/openssl/crypto/bio/b_addr.c
index 8ea32bce40..1f15e39aa5 100644
--- a/contrib/libs/openssl/crypto/bio/b_addr.c
+++ b/contrib/libs/openssl/crypto/bio/b_addr.c
@@ -679,7 +679,7 @@ int BIO_lookup_ex(const char *host, const char *service, int lookup_type,
if (1) {
#ifdef AI_PASSIVE
- int gai_ret = 0, old_ret = 0;
+ int gai_ret = 0, old_ret = 0;
struct addrinfo hints;
memset(&hints, 0, sizeof(hints));
@@ -687,12 +687,12 @@ int BIO_lookup_ex(const char *host, const char *service, int lookup_type,
hints.ai_family = family;
hints.ai_socktype = socktype;
hints.ai_protocol = protocol;
-# ifdef AI_ADDRCONFIG
-# ifdef AF_UNSPEC
+# ifdef AI_ADDRCONFIG
+# ifdef AF_UNSPEC
if (host != NULL && family == AF_UNSPEC)
-# endif
- hints.ai_flags |= AI_ADDRCONFIG;
-# endif
+# endif
+ hints.ai_flags |= AI_ADDRCONFIG;
+# endif
if (lookup_type == BIO_LOOKUP_SERVER)
hints.ai_flags |= AI_PASSIVE;
@@ -701,7 +701,7 @@ int BIO_lookup_ex(const char *host, const char *service, int lookup_type,
* macro magic in bio_local.h
*/
# if defined(AI_ADDRCONFIG) && defined(AI_NUMERICHOST)
- retry:
+ retry:
# endif
switch ((gai_ret = getaddrinfo(host, service, &hints, res))) {
# ifdef EAI_SYSTEM
@@ -710,25 +710,25 @@ int BIO_lookup_ex(const char *host, const char *service, int lookup_type,
BIOerr(BIO_F_BIO_LOOKUP_EX, ERR_R_SYS_LIB);
break;
# endif
-# ifdef EAI_MEMORY
- case EAI_MEMORY:
- BIOerr(BIO_F_BIO_LOOKUP_EX, ERR_R_MALLOC_FAILURE);
- break;
-# endif
+# ifdef EAI_MEMORY
+ case EAI_MEMORY:
+ BIOerr(BIO_F_BIO_LOOKUP_EX, ERR_R_MALLOC_FAILURE);
+ break;
+# endif
case 0:
ret = 1; /* Success */
break;
default:
-# if defined(AI_ADDRCONFIG) && defined(AI_NUMERICHOST)
- if (hints.ai_flags & AI_ADDRCONFIG) {
- hints.ai_flags &= ~AI_ADDRCONFIG;
- hints.ai_flags |= AI_NUMERICHOST;
- old_ret = gai_ret;
- goto retry;
- }
-# endif
+# if defined(AI_ADDRCONFIG) && defined(AI_NUMERICHOST)
+ if (hints.ai_flags & AI_ADDRCONFIG) {
+ hints.ai_flags &= ~AI_ADDRCONFIG;
+ hints.ai_flags |= AI_NUMERICHOST;
+ old_ret = gai_ret;
+ goto retry;
+ }
+# endif
BIOerr(BIO_F_BIO_LOOKUP_EX, ERR_R_SYS_LIB);
- ERR_add_error_data(1, gai_strerror(old_ret ? old_ret : gai_ret));
+ ERR_add_error_data(1, gai_strerror(old_ret ? old_ret : gai_ret));
break;
}
} else {
diff --git a/contrib/libs/openssl/crypto/bio/bss_dgram.c b/contrib/libs/openssl/crypto/bio/bss_dgram.c
index 942fd8b514..fa749172f1 100644
--- a/contrib/libs/openssl/crypto/bio/bss_dgram.c
+++ b/contrib/libs/openssl/crypto/bio/bss_dgram.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2005-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2005-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -784,7 +784,7 @@ static long dgram_ctrl(BIO *b, int cmd, long num, void *ptr)
* reasons. When BIO_CTRL_DGRAM_SET_PEEK_MODE was first defined its value
* was incorrectly clashing with BIO_CTRL_DGRAM_SCTP_SET_IN_HANDSHAKE. The
* value has been updated to a non-clashing value. However to preserve
- * binary compatibility we now respond to both the old value and the new one
+ * binary compatibility we now respond to both the old value and the new one
*/
case BIO_CTRL_DGRAM_SCTP_SET_IN_HANDSHAKE:
case BIO_CTRL_DGRAM_SET_PEEK_MODE:
diff --git a/contrib/libs/openssl/crypto/bio/bss_file.c b/contrib/libs/openssl/crypto/bio/bss_file.c
index 1a70ce7994..dfff33639b 100644
--- a/contrib/libs/openssl/crypto/bio/bss_file.c
+++ b/contrib/libs/openssl/crypto/bio/bss_file.c
@@ -7,7 +7,7 @@
* https://www.openssl.org/source/license.html
*/
-#if defined(__linux) || defined(__sun) || defined(__hpux)
+#if defined(__linux) || defined(__sun) || defined(__hpux)
/*
* Following definition aliases fopen to fopen64 on above mentioned
* platforms. This makes it possible to open and sequentially access files
@@ -20,17 +20,17 @@
* of 32-bit platforms which allow for sequential access of large files
* without extra "magic" comprise *BSD, Darwin, IRIX...
*/
-# ifndef _FILE_OFFSET_BITS
-# define _FILE_OFFSET_BITS 64
+# ifndef _FILE_OFFSET_BITS
+# define _FILE_OFFSET_BITS 64
# endif
-#endif
+#endif
-#include <stdio.h>
-#include <errno.h>
+#include <stdio.h>
+#include <errno.h>
#include "bio_local.h"
-#include <openssl/err.h>
+#include <openssl/err.h>
-#if !defined(OPENSSL_NO_STDIO)
+#if !defined(OPENSSL_NO_STDIO)
static int file_write(BIO *h, const char *buf, int num);
static int file_read(BIO *h, char *buf, int size);
@@ -69,9 +69,9 @@ BIO *BIO_new_file(const char *filename, const char *mode)
SYSerr(SYS_F_FOPEN, get_last_sys_error());
ERR_add_error_data(5, "fopen('", filename, "','", mode, "')");
if (errno == ENOENT
-#ifdef ENXIO
+#ifdef ENXIO
|| errno == ENXIO
-#endif
+#endif
)
BIOerr(BIO_F_BIO_NEW_FILE, BIO_R_NO_SUCH_FILE);
else
@@ -209,33 +209,33 @@ static long file_ctrl(BIO *b, int cmd, long num, void *ptr)
b->shutdown = (int)num & BIO_CLOSE;
b->ptr = ptr;
b->init = 1;
-# if BIO_FLAGS_UPLINK!=0
-# if defined(__MINGW32__) && defined(__MSVCRT__) && !defined(_IOB_ENTRIES)
-# define _IOB_ENTRIES 20
-# endif
+# if BIO_FLAGS_UPLINK!=0
+# if defined(__MINGW32__) && defined(__MSVCRT__) && !defined(_IOB_ENTRIES)
+# define _IOB_ENTRIES 20
+# endif
/* Safety net to catch purely internal BIO_set_fp calls */
-# if defined(_MSC_VER) && _MSC_VER>=1900
+# if defined(_MSC_VER) && _MSC_VER>=1900
if (ptr == stdin || ptr == stdout || ptr == stderr)
BIO_clear_flags(b, BIO_FLAGS_UPLINK);
-# elif defined(_IOB_ENTRIES)
+# elif defined(_IOB_ENTRIES)
if ((size_t)ptr >= (size_t)stdin &&
(size_t)ptr < (size_t)(stdin + _IOB_ENTRIES))
BIO_clear_flags(b, BIO_FLAGS_UPLINK);
# endif
-# endif
-# ifdef UP_fsetmod
+# endif
+# ifdef UP_fsetmod
if (b->flags & BIO_FLAGS_UPLINK)
UP_fsetmod(b->ptr, (char)((num & BIO_FP_TEXT) ? 't' : 'b'));
else
-# endif
+# endif
{
-# if defined(OPENSSL_SYS_WINDOWS)
+# if defined(OPENSSL_SYS_WINDOWS)
int fd = _fileno((FILE *)ptr);
if (num & BIO_FP_TEXT)
_setmode(fd, _O_TEXT);
else
_setmode(fd, _O_BINARY);
-# elif defined(OPENSSL_SYS_MSDOS)
+# elif defined(OPENSSL_SYS_MSDOS)
int fd = fileno((FILE *)ptr);
/* Set correct text/binary mode */
if (num & BIO_FP_TEXT)
@@ -248,11 +248,11 @@ static long file_ctrl(BIO *b, int cmd, long num, void *ptr)
} else
_setmode(fd, _O_BINARY);
}
-# elif defined(OPENSSL_SYS_WIN32_CYGWIN)
+# elif defined(OPENSSL_SYS_WIN32_CYGWIN)
int fd = fileno((FILE *)ptr);
if (!(num & BIO_FP_TEXT))
setmode(fd, O_BINARY);
-# endif
+# endif
}
break;
case BIO_C_SET_FILENAME:
@@ -274,15 +274,15 @@ static long file_ctrl(BIO *b, int cmd, long num, void *ptr)
ret = 0;
break;
}
-# if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WINDOWS)
+# if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WINDOWS)
if (!(num & BIO_FP_TEXT))
OPENSSL_strlcat(p, "b", sizeof(p));
else
OPENSSL_strlcat(p, "t", sizeof(p));
-# elif defined(OPENSSL_SYS_WIN32_CYGWIN)
+# elif defined(OPENSSL_SYS_WIN32_CYGWIN)
if (!(num & BIO_FP_TEXT))
OPENSSL_strlcat(p, "b", sizeof(p));
-# endif
+# endif
fp = openssl_fopen(ptr, p);
if (fp == NULL) {
SYSerr(SYS_F_FOPEN, get_last_sys_error());
@@ -419,4 +419,4 @@ BIO *BIO_new_file(const char *filename, const char *mode)
return NULL;
}
-#endif /* OPENSSL_NO_STDIO */
+#endif /* OPENSSL_NO_STDIO */
diff --git a/contrib/libs/openssl/crypto/bio/bss_mem.c b/contrib/libs/openssl/crypto/bio/bss_mem.c
index 7cb4a57813..908254c3cc 100644
--- a/contrib/libs/openssl/crypto/bio/bss_mem.c
+++ b/contrib/libs/openssl/crypto/bio/bss_mem.c
@@ -57,12 +57,12 @@ static const BIO_METHOD secmem_method = {
NULL, /* mem_callback_ctrl */
};
-/*
- * BIO memory stores buffer and read pointer
- * however the roles are different for read only BIOs.
- * In that case the readp just stores the original state
- * to be used for reset.
- */
+/*
+ * BIO memory stores buffer and read pointer
+ * however the roles are different for read only BIOs.
+ * In that case the readp just stores the original state
+ * to be used for reset.
+ */
typedef struct bio_buf_mem_st {
struct buf_mem_st *buf; /* allocated buffer */
struct buf_mem_st *readp; /* read pointer */
@@ -197,14 +197,14 @@ static int mem_read(BIO *b, char *out, int outl)
BIO_BUF_MEM *bbm = (BIO_BUF_MEM *)b->ptr;
BUF_MEM *bm = bbm->readp;
- if (b->flags & BIO_FLAGS_MEM_RDONLY)
- bm = bbm->buf;
+ if (b->flags & BIO_FLAGS_MEM_RDONLY)
+ bm = bbm->buf;
BIO_clear_retry_flags(b);
ret = (outl >= 0 && (size_t)outl > bm->length) ? (int)bm->length : outl;
if ((out != NULL) && (ret > 0)) {
memcpy(out, bm->data, ret);
bm->length -= ret;
- bm->max -= ret;
+ bm->max -= ret;
bm->data += ret;
} else if (bm->length == 0) {
ret = b->num;
@@ -249,24 +249,24 @@ static long mem_ctrl(BIO *b, int cmd, long num, void *ptr)
BIO_BUF_MEM *bbm = (BIO_BUF_MEM *)b->ptr;
BUF_MEM *bm;
- if (b->flags & BIO_FLAGS_MEM_RDONLY)
- bm = bbm->buf;
- else
- bm = bbm->readp;
-
+ if (b->flags & BIO_FLAGS_MEM_RDONLY)
+ bm = bbm->buf;
+ else
+ bm = bbm->readp;
+
switch (cmd) {
case BIO_CTRL_RESET:
bm = bbm->buf;
if (bm->data != NULL) {
- if (!(b->flags & BIO_FLAGS_MEM_RDONLY)) {
- if (!(b->flags & BIO_FLAGS_NONCLEAR_RST)) {
- memset(bm->data, 0, bm->max);
- bm->length = 0;
- }
- *bbm->readp = *bbm->buf;
+ if (!(b->flags & BIO_FLAGS_MEM_RDONLY)) {
+ if (!(b->flags & BIO_FLAGS_NONCLEAR_RST)) {
+ memset(bm->data, 0, bm->max);
+ bm->length = 0;
+ }
+ *bbm->readp = *bbm->buf;
} else {
- /* For read only case just reset to the start again */
- *bbm->buf = *bbm->readp;
+ /* For read only case just reset to the start again */
+ *bbm->buf = *bbm->readp;
}
}
break;
@@ -291,9 +291,9 @@ static long mem_ctrl(BIO *b, int cmd, long num, void *ptr)
break;
case BIO_C_GET_BUF_MEM_PTR:
if (ptr != NULL) {
- if (!(b->flags & BIO_FLAGS_MEM_RDONLY))
- mem_buf_sync(b);
- bm = bbm->buf;
+ if (!(b->flags & BIO_FLAGS_MEM_RDONLY))
+ mem_buf_sync(b);
+ bm = bbm->buf;
pptr = (char **)ptr;
*pptr = (char *)bm;
}
@@ -331,8 +331,8 @@ static int mem_gets(BIO *bp, char *buf, int size)
BIO_BUF_MEM *bbm = (BIO_BUF_MEM *)bp->ptr;
BUF_MEM *bm = bbm->readp;
- if (bp->flags & BIO_FLAGS_MEM_RDONLY)
- bm = bbm->buf;
+ if (bp->flags & BIO_FLAGS_MEM_RDONLY)
+ bm = bbm->buf;
BIO_clear_retry_flags(bp);
j = bm->length;
if ((size - 1) < j)
diff --git a/contrib/libs/openssl/crypto/blake2/blake2b.c b/contrib/libs/openssl/crypto/blake2/blake2b.c
index fc6e5f1a3f..10a5cdfd60 100644
--- a/contrib/libs/openssl/crypto/blake2/blake2b.c
+++ b/contrib/libs/openssl/crypto/blake2/blake2b.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2016-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2016-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -23,10 +23,10 @@
static const uint64_t blake2b_IV[8] =
{
- 0x6a09e667f3bcc908ULL, 0xbb67ae8584caa73bULL,
- 0x3c6ef372fe94f82bULL, 0xa54ff53a5f1d36f1ULL,
- 0x510e527fade682d1ULL, 0x9b05688c2b3e6c1fULL,
- 0x1f83d9abfb41bd6bULL, 0x5be0cd19137e2179ULL
+ 0x6a09e667f3bcc908ULL, 0xbb67ae8584caa73bULL,
+ 0x3c6ef372fe94f82bULL, 0xa54ff53a5f1d36f1ULL,
+ 0x510e527fade682d1ULL, 0x9b05688c2b3e6c1fULL,
+ 0x1f83d9abfb41bd6bULL, 0x5be0cd19137e2179ULL
};
static const uint8_t blake2b_sigma[12][16] =
diff --git a/contrib/libs/openssl/crypto/bn/bn_ctx.c b/contrib/libs/openssl/crypto/bn/bn_ctx.c
index 042cb247d3..866f748e99 100644
--- a/contrib/libs/openssl/crypto/bn/bn_ctx.c
+++ b/contrib/libs/openssl/crypto/bn/bn_ctx.c
@@ -194,8 +194,8 @@ void BN_CTX_start(BN_CTX *ctx)
void BN_CTX_end(BN_CTX *ctx)
{
- if (ctx == NULL)
- return;
+ if (ctx == NULL)
+ return;
CTXDBG_ENTRY("BN_CTX_end", ctx);
if (ctx->err_stack)
ctx->err_stack--;
diff --git a/contrib/libs/openssl/crypto/bn/bn_div.c b/contrib/libs/openssl/crypto/bn/bn_div.c
index 0da9f39b31..18d4f786b7 100644
--- a/contrib/libs/openssl/crypto/bn/bn_div.c
+++ b/contrib/libs/openssl/crypto/bn/bn_div.c
@@ -258,7 +258,7 @@ int BN_div(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor,
*
* - availability of constant-time bn_div_3_words;
* - dividend is at least as "wide" as divisor, limb-wise, zero-padded
- * if so required, which shouldn't be a privacy problem, because
+ * if so required, which shouldn't be a privacy problem, because
* divisor's length is considered public;
*/
int bn_div_fixed_top(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num,
diff --git a/contrib/libs/openssl/crypto/bn/bn_lib.c b/contrib/libs/openssl/crypto/bn/bn_lib.c
index eb4a31849b..c60a014101 100644
--- a/contrib/libs/openssl/crypto/bn/bn_lib.c
+++ b/contrib/libs/openssl/crypto/bn/bn_lib.c
@@ -144,66 +144,66 @@ int BN_num_bits_word(BN_ULONG l)
# pragma optimize("", on)
#endif
-/*
- * This function still leaks `a->dmax`: it's caller's responsibility to
- * expand the input `a` in advance to a public length.
- */
-static ossl_inline
-int bn_num_bits_consttime(const BIGNUM *a)
-{
- int j, ret;
- unsigned int mask, past_i;
- int i = a->top - 1;
- bn_check_top(a);
-
- for (j = 0, past_i = 0, ret = 0; j < a->dmax; j++) {
- mask = constant_time_eq_int(i, j); /* 0xff..ff if i==j, 0x0 otherwise */
-
- ret += BN_BITS2 & (~mask & ~past_i);
- ret += BN_num_bits_word(a->d[j]) & mask;
-
- past_i |= mask; /* past_i will become 0xff..ff after i==j */
- }
-
- /*
- * if BN_is_zero(a) => i is -1 and ret contains garbage, so we mask the
- * final result.
- */
- mask = ~(constant_time_eq_int(i, ((int)-1)));
-
- return ret & mask;
-}
-
+/*
+ * This function still leaks `a->dmax`: it's caller's responsibility to
+ * expand the input `a` in advance to a public length.
+ */
+static ossl_inline
+int bn_num_bits_consttime(const BIGNUM *a)
+{
+ int j, ret;
+ unsigned int mask, past_i;
+ int i = a->top - 1;
+ bn_check_top(a);
+
+ for (j = 0, past_i = 0, ret = 0; j < a->dmax; j++) {
+ mask = constant_time_eq_int(i, j); /* 0xff..ff if i==j, 0x0 otherwise */
+
+ ret += BN_BITS2 & (~mask & ~past_i);
+ ret += BN_num_bits_word(a->d[j]) & mask;
+
+ past_i |= mask; /* past_i will become 0xff..ff after i==j */
+ }
+
+ /*
+ * if BN_is_zero(a) => i is -1 and ret contains garbage, so we mask the
+ * final result.
+ */
+ mask = ~(constant_time_eq_int(i, ((int)-1)));
+
+ return ret & mask;
+}
+
int BN_num_bits(const BIGNUM *a)
{
int i = a->top - 1;
bn_check_top(a);
- if (a->flags & BN_FLG_CONSTTIME) {
- /*
- * We assume that BIGNUMs flagged as CONSTTIME have also been expanded
- * so that a->dmax is not leaking secret information.
- *
- * In other words, it's the caller's responsibility to ensure `a` has
- * been preallocated in advance to a public length if we hit this
- * branch.
- *
- */
- return bn_num_bits_consttime(a);
- }
-
+ if (a->flags & BN_FLG_CONSTTIME) {
+ /*
+ * We assume that BIGNUMs flagged as CONSTTIME have also been expanded
+ * so that a->dmax is not leaking secret information.
+ *
+ * In other words, it's the caller's responsibility to ensure `a` has
+ * been preallocated in advance to a public length if we hit this
+ * branch.
+ *
+ */
+ return bn_num_bits_consttime(a);
+ }
+
if (BN_is_zero(a))
return 0;
-
+
return ((i * BN_BITS2) + BN_num_bits_word(a->d[i]));
}
-static void bn_free_d(BIGNUM *a, int clear)
+static void bn_free_d(BIGNUM *a, int clear)
{
if (BN_get_flags(a, BN_FLG_SECURE))
- OPENSSL_secure_clear_free(a->d, a->dmax * sizeof(a->d[0]));
- else if (clear != 0)
- OPENSSL_clear_free(a->d, a->dmax * sizeof(a->d[0]));
+ OPENSSL_secure_clear_free(a->d, a->dmax * sizeof(a->d[0]));
+ else if (clear != 0)
+ OPENSSL_clear_free(a->d, a->dmax * sizeof(a->d[0]));
else
OPENSSL_free(a->d);
}
@@ -213,8 +213,8 @@ void BN_clear_free(BIGNUM *a)
{
if (a == NULL)
return;
- if (a->d != NULL && !BN_get_flags(a, BN_FLG_STATIC_DATA))
- bn_free_d(a, 1);
+ if (a->d != NULL && !BN_get_flags(a, BN_FLG_STATIC_DATA))
+ bn_free_d(a, 1);
if (BN_get_flags(a, BN_FLG_MALLOCED)) {
OPENSSL_cleanse(a, sizeof(*a));
OPENSSL_free(a);
@@ -226,7 +226,7 @@ void BN_free(BIGNUM *a)
if (a == NULL)
return;
if (!BN_get_flags(a, BN_FLG_STATIC_DATA))
- bn_free_d(a, 0);
+ bn_free_d(a, 0);
if (a->flags & BN_FLG_MALLOCED)
OPENSSL_free(a);
}
@@ -304,8 +304,8 @@ BIGNUM *bn_expand2(BIGNUM *b, int words)
BN_ULONG *a = bn_expand_internal(b, words);
if (!a)
return NULL;
- if (b->d != NULL)
- bn_free_d(b, 1);
+ if (b->d != NULL)
+ bn_free_d(b, 1);
b->d = a;
b->dmax = words;
}
@@ -396,8 +396,8 @@ void BN_swap(BIGNUM *a, BIGNUM *b)
void BN_clear(BIGNUM *a)
{
- if (a == NULL)
- return;
+ if (a == NULL)
+ return;
bn_check_top(a);
if (a->d != NULL)
OPENSSL_cleanse(a->d, sizeof(*a->d) * a->dmax);
@@ -474,11 +474,11 @@ BIGNUM *BN_bin2bn(const unsigned char *s, int len, BIGNUM *ret)
return ret;
}
-typedef enum {big, little} endianess_t;
-
+typedef enum {big, little} endianess_t;
+
/* ignore negative */
-static
-int bn2binpad(const BIGNUM *a, unsigned char *to, int tolen, endianess_t endianess)
+static
+int bn2binpad(const BIGNUM *a, unsigned char *to, int tolen, endianess_t endianess)
{
int n;
size_t i, lasti, j, atop, mask;
@@ -510,17 +510,17 @@ int bn2binpad(const BIGNUM *a, unsigned char *to, int tolen, endianess_t endiane
lasti = atop - 1;
atop = a->top * BN_BYTES;
- if (endianess == big)
- to += tolen; /* start from the end of the buffer */
- for (i = 0, j = 0; j < (size_t)tolen; j++) {
- unsigned char val;
+ if (endianess == big)
+ to += tolen; /* start from the end of the buffer */
+ for (i = 0, j = 0; j < (size_t)tolen; j++) {
+ unsigned char val;
l = a->d[i / BN_BYTES];
mask = 0 - ((j - atop) >> (8 * sizeof(i) - 1));
- val = (unsigned char)(l >> (8 * (i % BN_BYTES)) & mask);
- if (endianess == big)
- *--to = val;
- else
- *to++ = val;
+ val = (unsigned char)(l >> (8 * (i % BN_BYTES)) & mask);
+ if (endianess == big)
+ *--to = val;
+ else
+ *to++ = val;
i += (i - lasti) >> (8 * sizeof(i) - 1); /* stay on last limb */
}
@@ -531,12 +531,12 @@ int BN_bn2binpad(const BIGNUM *a, unsigned char *to, int tolen)
{
if (tolen < 0)
return -1;
- return bn2binpad(a, to, tolen, big);
+ return bn2binpad(a, to, tolen, big);
}
int BN_bn2bin(const BIGNUM *a, unsigned char *to)
{
- return bn2binpad(a, to, -1, big);
+ return bn2binpad(a, to, -1, big);
}
BIGNUM *BN_lebin2bn(const unsigned char *s, int len, BIGNUM *ret)
@@ -588,9 +588,9 @@ BIGNUM *BN_lebin2bn(const unsigned char *s, int len, BIGNUM *ret)
int BN_bn2lebinpad(const BIGNUM *a, unsigned char *to, int tolen)
{
- if (tolen < 0)
+ if (tolen < 0)
return -1;
- return bn2binpad(a, to, tolen, little);
+ return bn2binpad(a, to, tolen, little);
}
int BN_ucmp(const BIGNUM *a, const BIGNUM *b)
diff --git a/contrib/libs/openssl/crypto/bn/bn_prime.c b/contrib/libs/openssl/crypto/bn/bn_prime.c
index d0cf3779fa..5da0a89d22 100644
--- a/contrib/libs/openssl/crypto/bn/bn_prime.c
+++ b/contrib/libs/openssl/crypto/bn/bn_prime.c
@@ -65,12 +65,12 @@ int BN_generate_prime_ex(BIGNUM *ret, int bits, int safe,
/* There are no prime numbers this small. */
BNerr(BN_F_BN_GENERATE_PRIME_EX, BN_R_BITS_TOO_SMALL);
return 0;
- } else if (add == NULL && safe && bits < 6 && bits != 3) {
- /*
- * The smallest safe prime (7) is three bits.
- * But the following two safe primes with less than 6 bits (11, 23)
- * are unreachable for BN_rand with BN_RAND_TOP_TWO.
- */
+ } else if (add == NULL && safe && bits < 6 && bits != 3) {
+ /*
+ * The smallest safe prime (7) is three bits.
+ * But the following two safe primes with less than 6 bits (11, 23)
+ * are unreachable for BN_rand with BN_RAND_TOP_TWO.
+ */
BNerr(BN_F_BN_GENERATE_PRIME_EX, BN_R_BITS_TOO_SMALL);
return 0;
}
@@ -136,7 +136,7 @@ int BN_generate_prime_ex(BIGNUM *ret, int bits, int safe,
found = 1;
err:
OPENSSL_free(mods);
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(ctx);
bn_check_top(ret);
return found;
diff --git a/contrib/libs/openssl/crypto/bn/bn_rand.c b/contrib/libs/openssl/crypto/bn/bn_rand.c
index 6b4b50a068..d9671c818f 100644
--- a/contrib/libs/openssl/crypto/bn/bn_rand.c
+++ b/contrib/libs/openssl/crypto/bn/bn_rand.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -225,7 +225,7 @@ int BN_generate_dsa_nonce(BIGNUM *out, const BIGNUM *range,
goto err;
/* We copy |priv| into a local buffer to avoid exposing its length. */
- if (BN_bn2binpad(priv, private_bytes, sizeof(private_bytes)) < 0) {
+ if (BN_bn2binpad(priv, private_bytes, sizeof(private_bytes)) < 0) {
/*
* No reasonable DSA or ECDSA key should have a private key this
* large and we don't handle this case in order to avoid leaking the
diff --git a/contrib/libs/openssl/crypto/bn/bn_sqrt.c b/contrib/libs/openssl/crypto/bn/bn_sqrt.c
index 1723d5ded5..e7272cbc9a 100644
--- a/contrib/libs/openssl/crypto/bn/bn_sqrt.c
+++ b/contrib/libs/openssl/crypto/bn/bn_sqrt.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -125,8 +125,8 @@ BIGNUM *BN_mod_sqrt(BIGNUM *in, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx)
* = a.
*
* (This is due to A.O.L. Atkin,
- * Subject: Square Roots and Cognate Matters modulo p=8n+5.
- * URL: https://listserv.nodak.edu/cgi-bin/wa.exe?A2=ind9211&L=NMBRTHRY&P=4026
+ * Subject: Square Roots and Cognate Matters modulo p=8n+5.
+ * URL: https://listserv.nodak.edu/cgi-bin/wa.exe?A2=ind9211&L=NMBRTHRY&P=4026
* November 1992.)
*/
diff --git a/contrib/libs/openssl/crypto/cms/cms_att.c b/contrib/libs/openssl/crypto/cms/cms_att.c
index 4f71661919..57d4b71441 100644
--- a/contrib/libs/openssl/crypto/cms/cms_att.c
+++ b/contrib/libs/openssl/crypto/cms/cms_att.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2008-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2008-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -13,57 +13,57 @@
#include <openssl/err.h>
#include <openssl/cms.h>
#include "cms_local.h"
-#include "internal/nelem.h"
-
-/*-
- * Attribute flags.
- * CMS attribute restrictions are discussed in
- * - RFC 5652 Section 11.
- * ESS attribute restrictions are discussed in
- * - RFC 2634 Section 1.3.4 AND
- * - RFC 5035 Section 5.4
- */
-/* This is a signed attribute */
-#define CMS_ATTR_F_SIGNED 0x01
-/* This is an unsigned attribute */
-#define CMS_ATTR_F_UNSIGNED 0x02
-/* Must be present if there are any other attributes of the same type */
-#define CMS_ATTR_F_REQUIRED_COND 0x10
-/* There can only be one instance of this attribute */
-#define CMS_ATTR_F_ONLY_ONE 0x20
-/* The Attribute's value must have exactly one entry */
-#define CMS_ATTR_F_ONE_ATTR_VALUE 0x40
-
-/* Attributes rules for different attributes */
-static const struct {
- int nid; /* The attribute id */
- int flags;
-} cms_attribute_properties[] = {
- /* See RFC Section 11 */
- { NID_pkcs9_contentType, CMS_ATTR_F_SIGNED
- | CMS_ATTR_F_ONLY_ONE
- | CMS_ATTR_F_ONE_ATTR_VALUE
- | CMS_ATTR_F_REQUIRED_COND },
- { NID_pkcs9_messageDigest, CMS_ATTR_F_SIGNED
- | CMS_ATTR_F_ONLY_ONE
- | CMS_ATTR_F_ONE_ATTR_VALUE
- | CMS_ATTR_F_REQUIRED_COND },
- { NID_pkcs9_signingTime, CMS_ATTR_F_SIGNED
- | CMS_ATTR_F_ONLY_ONE
- | CMS_ATTR_F_ONE_ATTR_VALUE },
- { NID_pkcs9_countersignature, CMS_ATTR_F_UNSIGNED },
- /* ESS */
- { NID_id_smime_aa_signingCertificate, CMS_ATTR_F_SIGNED
- | CMS_ATTR_F_ONLY_ONE
- | CMS_ATTR_F_ONE_ATTR_VALUE },
- { NID_id_smime_aa_signingCertificateV2, CMS_ATTR_F_SIGNED
- | CMS_ATTR_F_ONLY_ONE
- | CMS_ATTR_F_ONE_ATTR_VALUE },
- { NID_id_smime_aa_receiptRequest, CMS_ATTR_F_SIGNED
- | CMS_ATTR_F_ONLY_ONE
- | CMS_ATTR_F_ONE_ATTR_VALUE }
-};
-
+#include "internal/nelem.h"
+
+/*-
+ * Attribute flags.
+ * CMS attribute restrictions are discussed in
+ * - RFC 5652 Section 11.
+ * ESS attribute restrictions are discussed in
+ * - RFC 2634 Section 1.3.4 AND
+ * - RFC 5035 Section 5.4
+ */
+/* This is a signed attribute */
+#define CMS_ATTR_F_SIGNED 0x01
+/* This is an unsigned attribute */
+#define CMS_ATTR_F_UNSIGNED 0x02
+/* Must be present if there are any other attributes of the same type */
+#define CMS_ATTR_F_REQUIRED_COND 0x10
+/* There can only be one instance of this attribute */
+#define CMS_ATTR_F_ONLY_ONE 0x20
+/* The Attribute's value must have exactly one entry */
+#define CMS_ATTR_F_ONE_ATTR_VALUE 0x40
+
+/* Attributes rules for different attributes */
+static const struct {
+ int nid; /* The attribute id */
+ int flags;
+} cms_attribute_properties[] = {
+ /* See RFC Section 11 */
+ { NID_pkcs9_contentType, CMS_ATTR_F_SIGNED
+ | CMS_ATTR_F_ONLY_ONE
+ | CMS_ATTR_F_ONE_ATTR_VALUE
+ | CMS_ATTR_F_REQUIRED_COND },
+ { NID_pkcs9_messageDigest, CMS_ATTR_F_SIGNED
+ | CMS_ATTR_F_ONLY_ONE
+ | CMS_ATTR_F_ONE_ATTR_VALUE
+ | CMS_ATTR_F_REQUIRED_COND },
+ { NID_pkcs9_signingTime, CMS_ATTR_F_SIGNED
+ | CMS_ATTR_F_ONLY_ONE
+ | CMS_ATTR_F_ONE_ATTR_VALUE },
+ { NID_pkcs9_countersignature, CMS_ATTR_F_UNSIGNED },
+ /* ESS */
+ { NID_id_smime_aa_signingCertificate, CMS_ATTR_F_SIGNED
+ | CMS_ATTR_F_ONLY_ONE
+ | CMS_ATTR_F_ONE_ATTR_VALUE },
+ { NID_id_smime_aa_signingCertificateV2, CMS_ATTR_F_SIGNED
+ | CMS_ATTR_F_ONLY_ONE
+ | CMS_ATTR_F_ONE_ATTR_VALUE },
+ { NID_id_smime_aa_receiptRequest, CMS_ATTR_F_SIGNED
+ | CMS_ATTR_F_ONLY_ONE
+ | CMS_ATTR_F_ONE_ATTR_VALUE }
+};
+
/* CMS SignedData Attribute utilities */
int CMS_signed_get_attr_count(const CMS_SignerInfo *si)
@@ -199,86 +199,86 @@ void *CMS_unsigned_get0_data_by_OBJ(CMS_SignerInfo *si, ASN1_OBJECT *oid,
return X509at_get0_data_by_OBJ(si->unsignedAttrs, oid, lastpos, type);
}
-/*
- * Retrieve an attribute by nid from a stack of attributes starting at index
- * *lastpos + 1.
- * Returns the attribute or NULL if there is no attribute.
- * If an attribute was found *lastpos returns the index of the found attribute.
- */
-static X509_ATTRIBUTE *cms_attrib_get(int nid,
- const STACK_OF(X509_ATTRIBUTE) *attrs,
- int *lastpos)
-{
- X509_ATTRIBUTE *at;
- int loc;
-
- loc = X509at_get_attr_by_NID(attrs, nid, *lastpos);
- if (loc < 0)
- return NULL;
-
- at = X509at_get_attr(attrs, loc);
- *lastpos = loc;
- return at;
-}
-
-static int cms_check_attribute(int nid, int flags, int type,
- const STACK_OF(X509_ATTRIBUTE) *attrs,
- int have_attrs)
-{
- int lastpos = -1;
- X509_ATTRIBUTE *at = cms_attrib_get(nid, attrs, &lastpos);
-
- if (at != NULL) {
- int count = X509_ATTRIBUTE_count(at);
-
- /* Is this attribute allowed? */
- if (((flags & type) == 0)
- /* check if multiple attributes of the same type are allowed */
- || (((flags & CMS_ATTR_F_ONLY_ONE) != 0)
- && cms_attrib_get(nid, attrs, &lastpos) != NULL)
- /* Check if attribute should have exactly one value in its set */
- || (((flags & CMS_ATTR_F_ONE_ATTR_VALUE) != 0)
- && count != 1)
- /* There should be at least one value */
- || count == 0)
- return 0;
- } else {
- /* fail if a required attribute is missing */
- if (have_attrs
- && ((flags & CMS_ATTR_F_REQUIRED_COND) != 0)
- && (flags & type) != 0)
- return 0;
- }
- return 1;
-}
-
-/*
- * Check that the signerinfo attributes obey the attribute rules which includes
- * the following checks
- * - If any signed attributes exist then there must be a Content Type
- * and Message Digest attribute in the signed attributes.
- * - The countersignature attribute is an optional unsigned attribute only.
- * - Content Type, Message Digest, and Signing time attributes are signed
- * attributes. Only one instance of each is allowed, with each of these
- * attributes containing a single attribute value in its set.
- */
-int CMS_si_check_attributes(const CMS_SignerInfo *si)
-{
- int i;
- int have_signed_attrs = (CMS_signed_get_attr_count(si) > 0);
- int have_unsigned_attrs = (CMS_unsigned_get_attr_count(si) > 0);
-
- for (i = 0; i < (int)OSSL_NELEM(cms_attribute_properties); ++i) {
- int nid = cms_attribute_properties[i].nid;
- int flags = cms_attribute_properties[i].flags;
-
- if (!cms_check_attribute(nid, flags, CMS_ATTR_F_SIGNED,
- si->signedAttrs, have_signed_attrs)
- || !cms_check_attribute(nid, flags, CMS_ATTR_F_UNSIGNED,
- si->unsignedAttrs, have_unsigned_attrs)) {
- CMSerr(CMS_F_CMS_SI_CHECK_ATTRIBUTES, CMS_R_ATTRIBUTE_ERROR);
- return 0;
- }
- }
- return 1;
-}
+/*
+ * Retrieve an attribute by nid from a stack of attributes starting at index
+ * *lastpos + 1.
+ * Returns the attribute or NULL if there is no attribute.
+ * If an attribute was found *lastpos returns the index of the found attribute.
+ */
+static X509_ATTRIBUTE *cms_attrib_get(int nid,
+ const STACK_OF(X509_ATTRIBUTE) *attrs,
+ int *lastpos)
+{
+ X509_ATTRIBUTE *at;
+ int loc;
+
+ loc = X509at_get_attr_by_NID(attrs, nid, *lastpos);
+ if (loc < 0)
+ return NULL;
+
+ at = X509at_get_attr(attrs, loc);
+ *lastpos = loc;
+ return at;
+}
+
+static int cms_check_attribute(int nid, int flags, int type,
+ const STACK_OF(X509_ATTRIBUTE) *attrs,
+ int have_attrs)
+{
+ int lastpos = -1;
+ X509_ATTRIBUTE *at = cms_attrib_get(nid, attrs, &lastpos);
+
+ if (at != NULL) {
+ int count = X509_ATTRIBUTE_count(at);
+
+ /* Is this attribute allowed? */
+ if (((flags & type) == 0)
+ /* check if multiple attributes of the same type are allowed */
+ || (((flags & CMS_ATTR_F_ONLY_ONE) != 0)
+ && cms_attrib_get(nid, attrs, &lastpos) != NULL)
+ /* Check if attribute should have exactly one value in its set */
+ || (((flags & CMS_ATTR_F_ONE_ATTR_VALUE) != 0)
+ && count != 1)
+ /* There should be at least one value */
+ || count == 0)
+ return 0;
+ } else {
+ /* fail if a required attribute is missing */
+ if (have_attrs
+ && ((flags & CMS_ATTR_F_REQUIRED_COND) != 0)
+ && (flags & type) != 0)
+ return 0;
+ }
+ return 1;
+}
+
+/*
+ * Check that the signerinfo attributes obey the attribute rules which includes
+ * the following checks
+ * - If any signed attributes exist then there must be a Content Type
+ * and Message Digest attribute in the signed attributes.
+ * - The countersignature attribute is an optional unsigned attribute only.
+ * - Content Type, Message Digest, and Signing time attributes are signed
+ * attributes. Only one instance of each is allowed, with each of these
+ * attributes containing a single attribute value in its set.
+ */
+int CMS_si_check_attributes(const CMS_SignerInfo *si)
+{
+ int i;
+ int have_signed_attrs = (CMS_signed_get_attr_count(si) > 0);
+ int have_unsigned_attrs = (CMS_unsigned_get_attr_count(si) > 0);
+
+ for (i = 0; i < (int)OSSL_NELEM(cms_attribute_properties); ++i) {
+ int nid = cms_attribute_properties[i].nid;
+ int flags = cms_attribute_properties[i].flags;
+
+ if (!cms_check_attribute(nid, flags, CMS_ATTR_F_SIGNED,
+ si->signedAttrs, have_signed_attrs)
+ || !cms_check_attribute(nid, flags, CMS_ATTR_F_UNSIGNED,
+ si->unsignedAttrs, have_unsigned_attrs)) {
+ CMSerr(CMS_F_CMS_SI_CHECK_ATTRIBUTES, CMS_R_ATTRIBUTE_ERROR);
+ return 0;
+ }
+ }
+ return 1;
+}
diff --git a/contrib/libs/openssl/crypto/cms/cms_env.c b/contrib/libs/openssl/crypto/cms/cms_env.c
index 04940146fd..759ab2b128 100644
--- a/contrib/libs/openssl/crypto/cms/cms_env.c
+++ b/contrib/libs/openssl/crypto/cms/cms_env.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2008-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2008-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -363,7 +363,7 @@ static int cms_RecipientInfo_ktri_decrypt(CMS_ContentInfo *cms,
unsigned char *ek = NULL;
size_t eklen;
int ret = 0;
- size_t fixlen = 0;
+ size_t fixlen = 0;
CMS_EncryptedContentInfo *ec;
ec = cms->d.envelopedData->encryptedContentInfo;
@@ -372,19 +372,19 @@ static int cms_RecipientInfo_ktri_decrypt(CMS_ContentInfo *cms,
return 0;
}
- if (cms->d.envelopedData->encryptedContentInfo->havenocert
- && !cms->d.envelopedData->encryptedContentInfo->debug) {
- X509_ALGOR *calg = ec->contentEncryptionAlgorithm;
- const EVP_CIPHER *ciph = EVP_get_cipherbyobj(calg->algorithm);
-
- if (ciph == NULL) {
- CMSerr(CMS_F_CMS_RECIPIENTINFO_KTRI_DECRYPT, CMS_R_UNKNOWN_CIPHER);
- return 0;
- }
-
- fixlen = EVP_CIPHER_key_length(ciph);
- }
-
+ if (cms->d.envelopedData->encryptedContentInfo->havenocert
+ && !cms->d.envelopedData->encryptedContentInfo->debug) {
+ X509_ALGOR *calg = ec->contentEncryptionAlgorithm;
+ const EVP_CIPHER *ciph = EVP_get_cipherbyobj(calg->algorithm);
+
+ if (ciph == NULL) {
+ CMSerr(CMS_F_CMS_RECIPIENTINFO_KTRI_DECRYPT, CMS_R_UNKNOWN_CIPHER);
+ return 0;
+ }
+
+ fixlen = EVP_CIPHER_key_length(ciph);
+ }
+
ktri->pctx = EVP_PKEY_CTX_new(pkey, NULL);
if (ktri->pctx == NULL)
return 0;
@@ -415,9 +415,9 @@ static int cms_RecipientInfo_ktri_decrypt(CMS_ContentInfo *cms,
if (EVP_PKEY_decrypt(ktri->pctx, ek, &eklen,
ktri->encryptedKey->data,
- ktri->encryptedKey->length) <= 0
- || eklen == 0
- || (fixlen != 0 && eklen != fixlen)) {
+ ktri->encryptedKey->length) <= 0
+ || eklen == 0
+ || (fixlen != 0 && eklen != fixlen)) {
CMSerr(CMS_F_CMS_RECIPIENTINFO_KTRI_DECRYPT, CMS_R_CMS_LIB);
goto err;
}
diff --git a/contrib/libs/openssl/crypto/cms/cms_err.c b/contrib/libs/openssl/crypto/cms/cms_err.c
index a211f4954c..14d60ba1a2 100644
--- a/contrib/libs/openssl/crypto/cms/cms_err.c
+++ b/contrib/libs/openssl/crypto/cms/cms_err.c
@@ -1,6 +1,6 @@
/*
* Generated by util/mkerr.pl DO NOT EDIT
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -146,8 +146,8 @@ static const ERR_STRING_DATA CMS_str_functs[] = {
{ERR_PACK(ERR_LIB_CMS, CMS_F_CMS_SIGNERINFO_VERIFY_CONTENT, 0),
"CMS_SignerInfo_verify_content"},
{ERR_PACK(ERR_LIB_CMS, CMS_F_CMS_SIGN_RECEIPT, 0), "CMS_sign_receipt"},
- {ERR_PACK(ERR_LIB_CMS, CMS_F_CMS_SI_CHECK_ATTRIBUTES, 0),
- "CMS_si_check_attributes"},
+ {ERR_PACK(ERR_LIB_CMS, CMS_F_CMS_SI_CHECK_ATTRIBUTES, 0),
+ "CMS_si_check_attributes"},
{ERR_PACK(ERR_LIB_CMS, CMS_F_CMS_STREAM, 0), "CMS_stream"},
{ERR_PACK(ERR_LIB_CMS, CMS_F_CMS_UNCOMPRESS, 0), "CMS_uncompress"},
{ERR_PACK(ERR_LIB_CMS, CMS_F_CMS_VERIFY, 0), "CMS_verify"},
@@ -157,7 +157,7 @@ static const ERR_STRING_DATA CMS_str_functs[] = {
static const ERR_STRING_DATA CMS_str_reasons[] = {
{ERR_PACK(ERR_LIB_CMS, 0, CMS_R_ADD_SIGNER_ERROR), "add signer error"},
- {ERR_PACK(ERR_LIB_CMS, 0, CMS_R_ATTRIBUTE_ERROR), "attribute error"},
+ {ERR_PACK(ERR_LIB_CMS, 0, CMS_R_ATTRIBUTE_ERROR), "attribute error"},
{ERR_PACK(ERR_LIB_CMS, 0, CMS_R_CERTIFICATE_ALREADY_PRESENT),
"certificate already present"},
{ERR_PACK(ERR_LIB_CMS, 0, CMS_R_CERTIFICATE_HAS_NO_KEYID),
diff --git a/contrib/libs/openssl/crypto/cms/cms_sd.c b/contrib/libs/openssl/crypto/cms/cms_sd.c
index 3f2a782565..eb1b2b9ea9 100644
--- a/contrib/libs/openssl/crypto/cms/cms_sd.c
+++ b/contrib/libs/openssl/crypto/cms/cms_sd.c
@@ -109,27 +109,27 @@ static void cms_sd_set_version(CMS_SignedData *sd)
}
-/*
- * RFC 5652 Section 11.1 Content Type
- * The content-type attribute within signed-data MUST
- * 1) be present if there are signed attributes
- * 2) match the content type in the signed-data,
- * 3) be a signed attribute.
- * 4) not have more than one copy of the attribute.
- *
- * Note that since the CMS_SignerInfo_sign() always adds the "signing time"
- * attribute, the content type attribute MUST be added also.
- * Assumptions: This assumes that the attribute does not already exist.
- */
-static int cms_set_si_contentType_attr(CMS_ContentInfo *cms, CMS_SignerInfo *si)
-{
- ASN1_OBJECT *ctype = cms->d.signedData->encapContentInfo->eContentType;
-
- /* Add the contentType attribute */
- return CMS_signed_add1_attr_by_NID(si, NID_pkcs9_contentType,
- V_ASN1_OBJECT, ctype, -1) > 0;
-}
-
+/*
+ * RFC 5652 Section 11.1 Content Type
+ * The content-type attribute within signed-data MUST
+ * 1) be present if there are signed attributes
+ * 2) match the content type in the signed-data,
+ * 3) be a signed attribute.
+ * 4) not have more than one copy of the attribute.
+ *
+ * Note that since the CMS_SignerInfo_sign() always adds the "signing time"
+ * attribute, the content type attribute MUST be added also.
+ * Assumptions: This assumes that the attribute does not already exist.
+ */
+static int cms_set_si_contentType_attr(CMS_ContentInfo *cms, CMS_SignerInfo *si)
+{
+ ASN1_OBJECT *ctype = cms->d.signedData->encapContentInfo->eContentType;
+
+ /* Add the contentType attribute */
+ return CMS_signed_add1_attr_by_NID(si, NID_pkcs9_contentType,
+ V_ASN1_OBJECT, ctype, -1) > 0;
+}
+
/* Copy an existing messageDigest value */
static int cms_copy_messageDigest(CMS_ContentInfo *cms, CMS_SignerInfo *si)
@@ -349,8 +349,8 @@ CMS_SignerInfo *CMS_add1_signer(CMS_ContentInfo *cms,
if (flags & CMS_REUSE_DIGEST) {
if (!cms_copy_messageDigest(cms, si))
goto err;
- if (!cms_set_si_contentType_attr(cms, si))
- goto err;
+ if (!cms_set_si_contentType_attr(cms, si))
+ goto err;
if (!(flags & (CMS_PARTIAL | CMS_KEY_PARAM)) &&
!CMS_SignerInfo_sign(si))
goto err;
@@ -589,9 +589,9 @@ static int cms_SignerInfo_content_sign(CMS_ContentInfo *cms,
V_ASN1_OCTET_STRING, md, mdlen))
goto err;
/* Copy content type across */
- if (!cms_set_si_contentType_attr(cms, si))
+ if (!cms_set_si_contentType_attr(cms, si))
goto err;
-
+
if (!CMS_SignerInfo_sign(si))
goto err;
} else if (si->pctx) {
@@ -671,9 +671,9 @@ int CMS_SignerInfo_sign(CMS_SignerInfo *si)
goto err;
}
- if (!CMS_si_check_attributes(si))
- goto err;
-
+ if (!CMS_si_check_attributes(si))
+ goto err;
+
if (si->pctx)
pctx = si->pctx;
else {
@@ -734,9 +734,9 @@ int CMS_SignerInfo_verify(CMS_SignerInfo *si)
return -1;
}
- if (!CMS_si_check_attributes(si))
- return -1;
-
+ if (!CMS_si_check_attributes(si))
+ return -1;
+
md = EVP_get_digestbyobj(si->digestAlgorithm->algorithm);
if (md == NULL)
return -1;
diff --git a/contrib/libs/openssl/crypto/cms/cms_smime.c b/contrib/libs/openssl/crypto/cms/cms_smime.c
index 6e7dbc4da1..2e900c7694 100644
--- a/contrib/libs/openssl/crypto/cms/cms_smime.c
+++ b/contrib/libs/openssl/crypto/cms/cms_smime.c
@@ -743,10 +743,10 @@ int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert,
cms->d.envelopedData->encryptedContentInfo->debug = 1;
else
cms->d.envelopedData->encryptedContentInfo->debug = 0;
- if (!cert)
- cms->d.envelopedData->encryptedContentInfo->havenocert = 1;
- else
- cms->d.envelopedData->encryptedContentInfo->havenocert = 0;
+ if (!cert)
+ cms->d.envelopedData->encryptedContentInfo->havenocert = 1;
+ else
+ cms->d.envelopedData->encryptedContentInfo->havenocert = 0;
if (!pk && !cert && !dcont && !out)
return 1;
if (pk && !CMS_decrypt_set1_pkey(cms, pk, cert))
diff --git a/contrib/libs/openssl/crypto/conf/conf_sap.c b/contrib/libs/openssl/crypto/conf/conf_sap.c
index 82105de748..eb85364fa5 100644
--- a/contrib/libs/openssl/crypto/conf/conf_sap.c
+++ b/contrib/libs/openssl/crypto/conf/conf_sap.c
@@ -42,7 +42,7 @@ void OPENSSL_config(const char *appname)
int openssl_config_int(const OPENSSL_INIT_SETTINGS *settings)
{
- int ret = 0;
+ int ret = 0;
const char *filename;
const char *appname;
unsigned long flags;
diff --git a/contrib/libs/openssl/crypto/ctype.c b/contrib/libs/openssl/crypto/ctype.c
index b7f1183f9c..fa9a4105ee 100644
--- a/contrib/libs/openssl/crypto/ctype.c
+++ b/contrib/libs/openssl/crypto/ctype.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -272,9 +272,9 @@ int ossl_toupper(int c)
{
return ossl_islower(c) ? c ^ case_change : c;
}
-
-int ascii_isdigit(const char inchar) {
- if (inchar > 0x2F && inchar < 0x3A)
- return 1;
- return 0;
-}
+
+int ascii_isdigit(const char inchar) {
+ if (inchar > 0x2F && inchar < 0x3A)
+ return 1;
+ return 0;
+}
diff --git a/contrib/libs/openssl/crypto/dh/dh_check.c b/contrib/libs/openssl/crypto/dh/dh_check.c
index 4ac169e75c..10ff4b1431 100644
--- a/contrib/libs/openssl/crypto/dh/dh_check.c
+++ b/contrib/libs/openssl/crypto/dh/dh_check.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -12,8 +12,8 @@
#include <openssl/bn.h>
#include "dh_local.h"
-# define DH_NUMBER_ITERATIONS_FOR_PRIME 64
-
+# define DH_NUMBER_ITERATIONS_FOR_PRIME 64
+
/*-
* Check that p and g are suitable enough
*
@@ -24,8 +24,8 @@ int DH_check_params_ex(const DH *dh)
{
int errflags = 0;
- if (!DH_check_params(dh, &errflags))
- return 0;
+ if (!DH_check_params(dh, &errflags))
+ return 0;
if ((errflags & DH_CHECK_P_NOT_PRIME) != 0)
DHerr(DH_F_DH_CHECK_PARAMS_EX, DH_R_CHECK_P_NOT_PRIME);
@@ -61,21 +61,21 @@ int DH_check_params(const DH *dh, int *ret)
ok = 1;
err:
- BN_CTX_end(ctx);
- BN_CTX_free(ctx);
+ BN_CTX_end(ctx);
+ BN_CTX_free(ctx);
return ok;
}
/*-
* Check that p is a safe prime and
- * g is a suitable generator.
+ * g is a suitable generator.
*/
int DH_check_ex(const DH *dh)
{
int errflags = 0;
- if (!DH_check(dh, &errflags))
- return 0;
+ if (!DH_check(dh, &errflags))
+ return 0;
if ((errflags & DH_NOT_SUITABLE_GENERATOR) != 0)
DHerr(DH_F_DH_CHECK_EX, DH_R_NOT_SUITABLE_GENERATOR);
@@ -101,9 +101,9 @@ int DH_check(const DH *dh, int *ret)
BN_CTX *ctx = NULL;
BIGNUM *t1 = NULL, *t2 = NULL;
- if (!DH_check_params(dh, ret))
- return 0;
-
+ if (!DH_check_params(dh, ret))
+ return 0;
+
ctx = BN_CTX_new();
if (ctx == NULL)
goto err;
@@ -125,7 +125,7 @@ int DH_check(const DH *dh, int *ret)
if (!BN_is_one(t1))
*ret |= DH_NOT_SUITABLE_GENERATOR;
}
- r = BN_is_prime_ex(dh->q, DH_NUMBER_ITERATIONS_FOR_PRIME, ctx, NULL);
+ r = BN_is_prime_ex(dh->q, DH_NUMBER_ITERATIONS_FOR_PRIME, ctx, NULL);
if (r < 0)
goto err;
if (!r)
@@ -137,9 +137,9 @@ int DH_check(const DH *dh, int *ret)
*ret |= DH_CHECK_INVALID_Q_VALUE;
if (dh->j && BN_cmp(dh->j, t1))
*ret |= DH_CHECK_INVALID_J_VALUE;
- }
+ }
- r = BN_is_prime_ex(dh->p, DH_NUMBER_ITERATIONS_FOR_PRIME, ctx, NULL);
+ r = BN_is_prime_ex(dh->p, DH_NUMBER_ITERATIONS_FOR_PRIME, ctx, NULL);
if (r < 0)
goto err;
if (!r)
@@ -147,7 +147,7 @@ int DH_check(const DH *dh, int *ret)
else if (!dh->q) {
if (!BN_rshift1(t1, dh->p))
goto err;
- r = BN_is_prime_ex(t1, DH_NUMBER_ITERATIONS_FOR_PRIME, ctx, NULL);
+ r = BN_is_prime_ex(t1, DH_NUMBER_ITERATIONS_FOR_PRIME, ctx, NULL);
if (r < 0)
goto err;
if (!r)
@@ -155,8 +155,8 @@ int DH_check(const DH *dh, int *ret)
}
ok = 1;
err:
- BN_CTX_end(ctx);
- BN_CTX_free(ctx);
+ BN_CTX_end(ctx);
+ BN_CTX_free(ctx);
return ok;
}
@@ -164,8 +164,8 @@ int DH_check_pub_key_ex(const DH *dh, const BIGNUM *pub_key)
{
int errflags = 0;
- if (!DH_check_pub_key(dh, pub_key, &errflags))
- return 0;
+ if (!DH_check_pub_key(dh, pub_key, &errflags))
+ return 0;
if ((errflags & DH_CHECK_PUBKEY_TOO_SMALL) != 0)
DHerr(DH_F_DH_CHECK_PUB_KEY_EX, DH_R_CHECK_PUBKEY_TOO_SMALL);
@@ -208,7 +208,7 @@ int DH_check_pub_key(const DH *dh, const BIGNUM *pub_key, int *ret)
ok = 1;
err:
- BN_CTX_end(ctx);
- BN_CTX_free(ctx);
+ BN_CTX_end(ctx);
+ BN_CTX_free(ctx);
return ok;
}
diff --git a/contrib/libs/openssl/crypto/dh/dh_gen.c b/contrib/libs/openssl/crypto/dh/dh_gen.c
index ab82ab58bd..389f2731c1 100644
--- a/contrib/libs/openssl/crypto/dh/dh_gen.c
+++ b/contrib/libs/openssl/crypto/dh/dh_gen.c
@@ -30,33 +30,33 @@ int DH_generate_parameters_ex(DH *ret, int prime_len, int generator,
/*-
* We generate DH parameters as follows
- * find a prime p which is prime_len bits long,
- * where q=(p-1)/2 is also prime.
- * In the following we assume that g is not 0, 1 or p-1, since it
- * would generate only trivial subgroups.
- * For this case, g is a generator of the order-q subgroup if
- * g^q mod p == 1.
- * Or in terms of the Legendre symbol: (g/p) == 1.
+ * find a prime p which is prime_len bits long,
+ * where q=(p-1)/2 is also prime.
+ * In the following we assume that g is not 0, 1 or p-1, since it
+ * would generate only trivial subgroups.
+ * For this case, g is a generator of the order-q subgroup if
+ * g^q mod p == 1.
+ * Or in terms of the Legendre symbol: (g/p) == 1.
*
* Having said all that,
* there is another special case method for the generators 2, 3 and 5.
- * Using the quadratic reciprocity law it is possible to solve
- * (g/p) == 1 for the special values 2, 3, 5:
- * (2/p) == 1 if p mod 8 == 1 or 7.
- * (3/p) == 1 if p mod 12 == 1 or 11.
- * (5/p) == 1 if p mod 5 == 1 or 4.
- * See for instance: https://en.wikipedia.org/wiki/Legendre_symbol
+ * Using the quadratic reciprocity law it is possible to solve
+ * (g/p) == 1 for the special values 2, 3, 5:
+ * (2/p) == 1 if p mod 8 == 1 or 7.
+ * (3/p) == 1 if p mod 12 == 1 or 11.
+ * (5/p) == 1 if p mod 5 == 1 or 4.
+ * See for instance: https://en.wikipedia.org/wiki/Legendre_symbol
*
- * Since all safe primes > 7 must satisfy p mod 12 == 11
- * and all safe primes > 11 must satisfy p mod 5 != 1
- * we can further improve the condition for g = 2, 3 and 5:
- * for 2, p mod 24 == 23
- * for 3, p mod 12 == 11
- * for 5, p mod 60 == 59
+ * Since all safe primes > 7 must satisfy p mod 12 == 11
+ * and all safe primes > 11 must satisfy p mod 5 != 1
+ * we can further improve the condition for g = 2, 3 and 5:
+ * for 2, p mod 24 == 23
+ * for 3, p mod 12 == 11
+ * for 5, p mod 60 == 59
*
* However for compatibility with previous versions we use:
- * for 2, p mod 24 == 11
- * for 5, p mod 60 == 23
+ * for 2, p mod 24 == 11
+ * for 5, p mod 60 == 23
*/
static int dh_builtin_genparams(DH *ret, int prime_len, int generator,
BN_GENCB *cb)
@@ -91,9 +91,9 @@ static int dh_builtin_genparams(DH *ret, int prime_len, int generator,
goto err;
g = 2;
} else if (generator == DH_GENERATOR_5) {
- if (!BN_set_word(t1, 60))
+ if (!BN_set_word(t1, 60))
goto err;
- if (!BN_set_word(t2, 23))
+ if (!BN_set_word(t2, 23))
goto err;
g = 5;
} else {
@@ -102,9 +102,9 @@ static int dh_builtin_genparams(DH *ret, int prime_len, int generator,
* not: since we are using safe primes, it will generate either an
* order-q or an order-2q group, which both is OK
*/
- if (!BN_set_word(t1, 12))
+ if (!BN_set_word(t1, 12))
goto err;
- if (!BN_set_word(t2, 11))
+ if (!BN_set_word(t2, 11))
goto err;
g = generator;
}
@@ -122,7 +122,7 @@ static int dh_builtin_genparams(DH *ret, int prime_len, int generator,
ok = 0;
}
- BN_CTX_end(ctx);
- BN_CTX_free(ctx);
+ BN_CTX_end(ctx);
+ BN_CTX_free(ctx);
return ok;
}
diff --git a/contrib/libs/openssl/crypto/dh/dh_key.c b/contrib/libs/openssl/crypto/dh/dh_key.c
index 117f2fa883..28db45120d 100644
--- a/contrib/libs/openssl/crypto/dh/dh_key.c
+++ b/contrib/libs/openssl/crypto/dh/dh_key.c
@@ -152,15 +152,15 @@ static int generate_key(DH *dh)
l = dh->length ? dh->length : BN_num_bits(dh->p) - 1;
if (!BN_priv_rand(priv_key, l, BN_RAND_TOP_ONE, BN_RAND_BOTTOM_ANY))
goto err;
- /*
- * We handle just one known case where g is a quadratic non-residue:
- * for g = 2: p % 8 == 3
- */
- if (BN_is_word(dh->g, DH_GENERATOR_2) && !BN_is_bit_set(dh->p, 2)) {
- /* clear bit 0, since it won't be a secret anyway */
- if (!BN_clear_bit(priv_key, 0))
- goto err;
- }
+ /*
+ * We handle just one known case where g is a quadratic non-residue:
+ * for g = 2: p % 8 == 3
+ */
+ if (BN_is_word(dh->g, DH_GENERATOR_2) && !BN_is_bit_set(dh->p, 2)) {
+ /* clear bit 0, since it won't be a secret anyway */
+ if (!BN_clear_bit(priv_key, 0))
+ goto err;
+ }
}
}
@@ -172,11 +172,11 @@ static int generate_key(DH *dh)
BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME);
if (!dh->meth->bn_mod_exp(dh, pub_key, dh->g, prk, dh->p, ctx, mont)) {
- BN_clear_free(prk);
+ BN_clear_free(prk);
goto err;
}
/* We MUST free prk before any further use of priv_key */
- BN_clear_free(prk);
+ BN_clear_free(prk);
}
dh->pub_key = pub_key;
@@ -241,8 +241,8 @@ static int compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh)
ret = BN_bn2binpad(tmp, key, BN_num_bytes(dh->p));
err:
- BN_CTX_end(ctx);
- BN_CTX_free(ctx);
+ BN_CTX_end(ctx);
+ BN_CTX_free(ctx);
return ret;
}
diff --git a/contrib/libs/openssl/crypto/dh/dh_lib.c b/contrib/libs/openssl/crypto/dh/dh_lib.c
index 04b79d355c..3995c4c4e2 100644
--- a/contrib/libs/openssl/crypto/dh/dh_lib.c
+++ b/contrib/libs/openssl/crypto/dh/dh_lib.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -234,11 +234,11 @@ void DH_get0_key(const DH *dh, const BIGNUM **pub_key, const BIGNUM **priv_key)
int DH_set0_key(DH *dh, BIGNUM *pub_key, BIGNUM *priv_key)
{
if (pub_key != NULL) {
- BN_clear_free(dh->pub_key);
+ BN_clear_free(dh->pub_key);
dh->pub_key = pub_key;
}
if (priv_key != NULL) {
- BN_clear_free(dh->priv_key);
+ BN_clear_free(dh->priv_key);
dh->priv_key = priv_key;
}
diff --git a/contrib/libs/openssl/crypto/dh/dh_pmeth.c b/contrib/libs/openssl/crypto/dh/dh_pmeth.c
index 1fd94deb47..06dec5f66a 100644
--- a/contrib/libs/openssl/crypto/dh/dh_pmeth.c
+++ b/contrib/libs/openssl/crypto/dh/dh_pmeth.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2006-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2006-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -54,7 +54,7 @@ static int pkey_dh_init(EVP_PKEY_CTX *ctx)
DHerr(DH_F_PKEY_DH_INIT, ERR_R_MALLOC_FAILURE);
return 0;
}
- dctx->prime_len = 2048;
+ dctx->prime_len = 2048;
dctx->subprime_len = -1;
dctx->generator = 2;
dctx->kdf_type = EVP_PKEY_DH_KDF_NONE;
diff --git a/contrib/libs/openssl/crypto/dsa/dsa_ameth.c b/contrib/libs/openssl/crypto/dsa/dsa_ameth.c
index 2dcaa0815f..4553e85871 100644
--- a/contrib/libs/openssl/crypto/dsa/dsa_ameth.c
+++ b/contrib/libs/openssl/crypto/dsa/dsa_ameth.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2006-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2006-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -503,7 +503,7 @@ static int dsa_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2)
case ASN1_PKEY_CTRL_DEFAULT_MD_NID:
*(int *)arg2 = NID_sha256;
- return 1;
+ return 1;
default:
return -2;
diff --git a/contrib/libs/openssl/crypto/dsa/dsa_err.c b/contrib/libs/openssl/crypto/dsa/dsa_err.c
index 8dcf0548ac..d469dade90 100644
--- a/contrib/libs/openssl/crypto/dsa/dsa_err.c
+++ b/contrib/libs/openssl/crypto/dsa/dsa_err.c
@@ -1,6 +1,6 @@
/*
* Generated by util/mkerr.pl DO NOT EDIT
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -52,8 +52,8 @@ static const ERR_STRING_DATA DSA_str_reasons[] = {
"invalid digest type"},
{ERR_PACK(ERR_LIB_DSA, 0, DSA_R_INVALID_PARAMETERS), "invalid parameters"},
{ERR_PACK(ERR_LIB_DSA, 0, DSA_R_MISSING_PARAMETERS), "missing parameters"},
- {ERR_PACK(ERR_LIB_DSA, 0, DSA_R_MISSING_PRIVATE_KEY),
- "missing private key"},
+ {ERR_PACK(ERR_LIB_DSA, 0, DSA_R_MISSING_PRIVATE_KEY),
+ "missing private key"},
{ERR_PACK(ERR_LIB_DSA, 0, DSA_R_MODULUS_TOO_LARGE), "modulus too large"},
{ERR_PACK(ERR_LIB_DSA, 0, DSA_R_NO_PARAMETERS_SET), "no parameters set"},
{ERR_PACK(ERR_LIB_DSA, 0, DSA_R_PARAMETER_ENCODING_ERROR),
diff --git a/contrib/libs/openssl/crypto/dsa/dsa_gen.c b/contrib/libs/openssl/crypto/dsa/dsa_gen.c
index 5d066a06c5..04bba1b9de 100644
--- a/contrib/libs/openssl/crypto/dsa/dsa_gen.c
+++ b/contrib/libs/openssl/crypto/dsa/dsa_gen.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -292,7 +292,7 @@ int dsa_builtin_paramgen(DSA *ret, size_t bits, size_t qbits,
if (seed_out)
memcpy(seed_out, seed, qsize);
}
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(ctx);
BN_MONT_CTX_free(mont);
return ok;
@@ -606,7 +606,7 @@ int dsa_builtin_paramgen2(DSA *ret, size_t L, size_t N,
OPENSSL_free(seed);
if (seed_out != seed_tmp)
OPENSSL_free(seed_tmp);
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(ctx);
BN_MONT_CTX_free(mont);
EVP_MD_CTX_free(mctx);
diff --git a/contrib/libs/openssl/crypto/dsa/dsa_ossl.c b/contrib/libs/openssl/crypto/dsa/dsa_ossl.c
index a983def64e..4ecb0c6cdd 100644
--- a/contrib/libs/openssl/crypto/dsa/dsa_ossl.c
+++ b/contrib/libs/openssl/crypto/dsa/dsa_ossl.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -72,10 +72,10 @@ static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa)
reason = DSA_R_MISSING_PARAMETERS;
goto err;
}
- if (dsa->priv_key == NULL) {
- reason = DSA_R_MISSING_PRIVATE_KEY;
- goto err;
- }
+ if (dsa->priv_key == NULL) {
+ reason = DSA_R_MISSING_PRIVATE_KEY;
+ goto err;
+ }
ret = DSA_SIG_new();
if (ret == NULL)
@@ -194,16 +194,16 @@ static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in,
return 0;
}
- /* Reject obviously invalid parameters */
- if (BN_is_zero(dsa->p) || BN_is_zero(dsa->q) || BN_is_zero(dsa->g)) {
- DSAerr(DSA_F_DSA_SIGN_SETUP, DSA_R_INVALID_PARAMETERS);
- return 0;
- }
- if (dsa->priv_key == NULL) {
- DSAerr(DSA_F_DSA_SIGN_SETUP, DSA_R_MISSING_PRIVATE_KEY);
- return 0;
- }
-
+ /* Reject obviously invalid parameters */
+ if (BN_is_zero(dsa->p) || BN_is_zero(dsa->q) || BN_is_zero(dsa->g)) {
+ DSAerr(DSA_F_DSA_SIGN_SETUP, DSA_R_INVALID_PARAMETERS);
+ return 0;
+ }
+ if (dsa->priv_key == NULL) {
+ DSAerr(DSA_F_DSA_SIGN_SETUP, DSA_R_MISSING_PRIVATE_KEY);
+ return 0;
+ }
+
k = BN_new();
l = BN_new();
if (k == NULL || l == NULL)
@@ -256,7 +256,7 @@ static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in,
* one bit longer than the modulus.
*
* There are some concerns about the efficacy of doing this. More
- * specifically refer to the discussion starting with:
+ * specifically refer to the discussion starting with:
* https://github.com/openssl/openssl/pull/7486#discussion_r228323705
* The fix is to rework BN so these gymnastics aren't required.
*/
diff --git a/contrib/libs/openssl/crypto/dsa/dsa_pmeth.c b/contrib/libs/openssl/crypto/dsa/dsa_pmeth.c
index 4ca3747a46..3859d0f773 100644
--- a/contrib/libs/openssl/crypto/dsa/dsa_pmeth.c
+++ b/contrib/libs/openssl/crypto/dsa/dsa_pmeth.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2006-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2006-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -20,8 +20,8 @@
typedef struct {
/* Parameter gen parameters */
- int nbits; /* size of p in bits (default: 2048) */
- int qbits; /* size of q in bits (default: 224) */
+ int nbits; /* size of p in bits (default: 2048) */
+ int qbits; /* size of q in bits (default: 224) */
const EVP_MD *pmd; /* MD for parameter generation */
/* Keygen callback info */
int gentmp[2];
@@ -35,8 +35,8 @@ static int pkey_dsa_init(EVP_PKEY_CTX *ctx)
if (dctx == NULL)
return 0;
- dctx->nbits = 2048;
- dctx->qbits = 224;
+ dctx->nbits = 2048;
+ dctx->qbits = 224;
dctx->pmd = NULL;
dctx->md = NULL;
@@ -138,11 +138,11 @@ static int pkey_dsa_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2)
EVP_MD_type((const EVP_MD *)p2) != NID_sha224 &&
EVP_MD_type((const EVP_MD *)p2) != NID_sha256 &&
EVP_MD_type((const EVP_MD *)p2) != NID_sha384 &&
- EVP_MD_type((const EVP_MD *)p2) != NID_sha512 &&
- EVP_MD_type((const EVP_MD *)p2) != NID_sha3_224 &&
- EVP_MD_type((const EVP_MD *)p2) != NID_sha3_256 &&
- EVP_MD_type((const EVP_MD *)p2) != NID_sha3_384 &&
- EVP_MD_type((const EVP_MD *)p2) != NID_sha3_512) {
+ EVP_MD_type((const EVP_MD *)p2) != NID_sha512 &&
+ EVP_MD_type((const EVP_MD *)p2) != NID_sha3_224 &&
+ EVP_MD_type((const EVP_MD *)p2) != NID_sha3_256 &&
+ EVP_MD_type((const EVP_MD *)p2) != NID_sha3_384 &&
+ EVP_MD_type((const EVP_MD *)p2) != NID_sha3_512) {
DSAerr(DSA_F_PKEY_DSA_CTRL, DSA_R_INVALID_DIGEST_TYPE);
return 0;
}
diff --git a/contrib/libs/openssl/crypto/dso/dso_dlfcn.c b/contrib/libs/openssl/crypto/dso/dso_dlfcn.c
index b926cb3021..96ae1fac4d 100644
--- a/contrib/libs/openssl/crypto/dso/dso_dlfcn.c
+++ b/contrib/libs/openssl/crypto/dso/dso_dlfcn.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -27,7 +27,7 @@
# endif
# include <dlfcn.h>
# define HAVE_DLINFO 1
-# if defined(__SCO_VERSION__) || defined(_SCO_ELF) || \
+# if defined(__SCO_VERSION__) || defined(_SCO_ELF) || \
(defined(__osf__) && !defined(RTLD_NEXT)) || \
(defined(__OpenBSD__) && !defined(RTLD_SELF)) || \
defined(__ANDROID__)
diff --git a/contrib/libs/openssl/crypto/dso/dso_openssl.c b/contrib/libs/openssl/crypto/dso/dso_openssl.c
index c76a04db23..aded0f5906 100644
--- a/contrib/libs/openssl/crypto/dso/dso_openssl.c
+++ b/contrib/libs/openssl/crypto/dso/dso_openssl.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -9,7 +9,7 @@
#include "dso_local.h"
-#ifdef DSO_NONE
+#ifdef DSO_NONE
static DSO_METHOD dso_meth_null = {
"NULL shared library method"
diff --git a/contrib/libs/openssl/crypto/dso/dso_win32.c b/contrib/libs/openssl/crypto/dso/dso_win32.c
index af1e559d76..aa29313763 100644
--- a/contrib/libs/openssl/crypto/dso/dso_win32.c
+++ b/contrib/libs/openssl/crypto/dso/dso_win32.c
@@ -64,7 +64,7 @@ static DSO_FUNC_TYPE win32_bind_func(DSO *dso, const char *symname);
static char *win32_name_converter(DSO *dso, const char *filename);
static char *win32_merger(DSO *dso, const char *filespec1,
const char *filespec2);
-static int win32_pathbyaddr(void *addr, char *path, int sz);
+static int win32_pathbyaddr(void *addr, char *path, int sz);
static void *win32_globallookup(const char *name);
static const char *openssl_strnchr(const char *string, int c, size_t len);
@@ -79,7 +79,7 @@ static DSO_METHOD dso_meth_win32 = {
win32_merger,
NULL, /* init */
NULL, /* finish */
- win32_pathbyaddr, /* pathbyaddr */
+ win32_pathbyaddr, /* pathbyaddr */
win32_globallookup
};
@@ -501,111 +501,111 @@ typedef HANDLE(WINAPI *CREATETOOLHELP32SNAPSHOT) (DWORD, DWORD);
typedef BOOL(WINAPI *CLOSETOOLHELP32SNAPSHOT) (HANDLE);
typedef BOOL(WINAPI *MODULE32) (HANDLE, MODULEENTRY32 *);
-static int win32_pathbyaddr(void *addr, char *path, int sz)
-{
- HMODULE dll;
- HANDLE hModuleSnap = INVALID_HANDLE_VALUE;
- MODULEENTRY32 me32;
- CREATETOOLHELP32SNAPSHOT create_snap;
- CLOSETOOLHELP32SNAPSHOT close_snap;
- MODULE32 module_first, module_next;
-
- if (addr == NULL) {
- union {
- int (*f) (void *, char *, int);
- void *p;
- } t = {
- win32_pathbyaddr
- };
- addr = t.p;
- }
-
- dll = LoadLibrary(TEXT(DLLNAME));
- if (dll == NULL) {
- DSOerr(DSO_F_WIN32_PATHBYADDR, DSO_R_UNSUPPORTED);
- return -1;
- }
-
- create_snap = (CREATETOOLHELP32SNAPSHOT)
- GetProcAddress(dll, "CreateToolhelp32Snapshot");
- if (create_snap == NULL) {
- FreeLibrary(dll);
- DSOerr(DSO_F_WIN32_PATHBYADDR, DSO_R_UNSUPPORTED);
- return -1;
- }
- /* We take the rest for granted... */
-# ifdef _WIN32_WCE
- close_snap = (CLOSETOOLHELP32SNAPSHOT)
- GetProcAddress(dll, "CloseToolhelp32Snapshot");
-# else
- close_snap = (CLOSETOOLHELP32SNAPSHOT) CloseHandle;
-# endif
- module_first = (MODULE32) GetProcAddress(dll, "Module32First");
- module_next = (MODULE32) GetProcAddress(dll, "Module32Next");
-
- /*
- * Take a snapshot of current process which includes
- * list of all involved modules.
- */
- hModuleSnap = (*create_snap) (TH32CS_SNAPMODULE, 0);
- if (hModuleSnap == INVALID_HANDLE_VALUE) {
- FreeLibrary(dll);
- DSOerr(DSO_F_WIN32_PATHBYADDR, DSO_R_UNSUPPORTED);
- return -1;
- }
-
- me32.dwSize = sizeof(me32);
-
- if (!(*module_first) (hModuleSnap, &me32)) {
- (*close_snap) (hModuleSnap);
- FreeLibrary(dll);
- DSOerr(DSO_F_WIN32_PATHBYADDR, DSO_R_FAILURE);
- return -1;
- }
-
- /* Enumerate the modules to find one which includes me. */
- do {
+static int win32_pathbyaddr(void *addr, char *path, int sz)
+{
+ HMODULE dll;
+ HANDLE hModuleSnap = INVALID_HANDLE_VALUE;
+ MODULEENTRY32 me32;
+ CREATETOOLHELP32SNAPSHOT create_snap;
+ CLOSETOOLHELP32SNAPSHOT close_snap;
+ MODULE32 module_first, module_next;
+
+ if (addr == NULL) {
+ union {
+ int (*f) (void *, char *, int);
+ void *p;
+ } t = {
+ win32_pathbyaddr
+ };
+ addr = t.p;
+ }
+
+ dll = LoadLibrary(TEXT(DLLNAME));
+ if (dll == NULL) {
+ DSOerr(DSO_F_WIN32_PATHBYADDR, DSO_R_UNSUPPORTED);
+ return -1;
+ }
+
+ create_snap = (CREATETOOLHELP32SNAPSHOT)
+ GetProcAddress(dll, "CreateToolhelp32Snapshot");
+ if (create_snap == NULL) {
+ FreeLibrary(dll);
+ DSOerr(DSO_F_WIN32_PATHBYADDR, DSO_R_UNSUPPORTED);
+ return -1;
+ }
+ /* We take the rest for granted... */
+# ifdef _WIN32_WCE
+ close_snap = (CLOSETOOLHELP32SNAPSHOT)
+ GetProcAddress(dll, "CloseToolhelp32Snapshot");
+# else
+ close_snap = (CLOSETOOLHELP32SNAPSHOT) CloseHandle;
+# endif
+ module_first = (MODULE32) GetProcAddress(dll, "Module32First");
+ module_next = (MODULE32) GetProcAddress(dll, "Module32Next");
+
+ /*
+ * Take a snapshot of current process which includes
+ * list of all involved modules.
+ */
+ hModuleSnap = (*create_snap) (TH32CS_SNAPMODULE, 0);
+ if (hModuleSnap == INVALID_HANDLE_VALUE) {
+ FreeLibrary(dll);
+ DSOerr(DSO_F_WIN32_PATHBYADDR, DSO_R_UNSUPPORTED);
+ return -1;
+ }
+
+ me32.dwSize = sizeof(me32);
+
+ if (!(*module_first) (hModuleSnap, &me32)) {
+ (*close_snap) (hModuleSnap);
+ FreeLibrary(dll);
+ DSOerr(DSO_F_WIN32_PATHBYADDR, DSO_R_FAILURE);
+ return -1;
+ }
+
+ /* Enumerate the modules to find one which includes me. */
+ do {
if ((size_t) addr >= (size_t) me32.modBaseAddr &&
(size_t) addr < (size_t) (me32.modBaseAddr + me32.modBaseSize)) {
- (*close_snap) (hModuleSnap);
- FreeLibrary(dll);
-# ifdef _WIN32_WCE
-# if _WIN32_WCE >= 101
- return WideCharToMultiByte(CP_ACP, 0, me32.szExePath, -1,
- path, sz, NULL, NULL);
-# else
- {
- int i, len = (int)wcslen(me32.szExePath);
- if (sz <= 0)
- return len + 1;
- if (len >= sz)
- len = sz - 1;
- for (i = 0; i < len; i++)
- path[i] = (char)me32.szExePath[i];
- path[len++] = '\0';
- return len;
- }
-# endif
-# else
- {
- int len = (int)strlen(me32.szExePath);
- if (sz <= 0)
- return len + 1;
- if (len >= sz)
- len = sz - 1;
- memcpy(path, me32.szExePath, len);
- path[len++] = '\0';
- return len;
- }
-# endif
- }
- } while ((*module_next) (hModuleSnap, &me32));
-
- (*close_snap) (hModuleSnap);
- FreeLibrary(dll);
- return 0;
-}
-
+ (*close_snap) (hModuleSnap);
+ FreeLibrary(dll);
+# ifdef _WIN32_WCE
+# if _WIN32_WCE >= 101
+ return WideCharToMultiByte(CP_ACP, 0, me32.szExePath, -1,
+ path, sz, NULL, NULL);
+# else
+ {
+ int i, len = (int)wcslen(me32.szExePath);
+ if (sz <= 0)
+ return len + 1;
+ if (len >= sz)
+ len = sz - 1;
+ for (i = 0; i < len; i++)
+ path[i] = (char)me32.szExePath[i];
+ path[len++] = '\0';
+ return len;
+ }
+# endif
+# else
+ {
+ int len = (int)strlen(me32.szExePath);
+ if (sz <= 0)
+ return len + 1;
+ if (len >= sz)
+ len = sz - 1;
+ memcpy(path, me32.szExePath, len);
+ path[len++] = '\0';
+ return len;
+ }
+# endif
+ }
+ } while ((*module_next) (hModuleSnap, &me32));
+
+ (*close_snap) (hModuleSnap);
+ FreeLibrary(dll);
+ return 0;
+}
+
static void *win32_globallookup(const char *name)
{
HMODULE dll;
diff --git a/contrib/libs/openssl/crypto/ec/curve25519.c b/contrib/libs/openssl/crypto/ec/curve25519.c
index 952da0e653..4f9922afe9 100644
--- a/contrib/libs/openssl/crypto/ec/curve25519.c
+++ b/contrib/libs/openssl/crypto/ec/curve25519.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2016-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2016-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -254,7 +254,7 @@ static void x25519_scalar_mulx(uint8_t out[32], const uint8_t scalar[32],
#if defined(X25519_ASM) \
|| ( (defined(__SIZEOF_INT128__) && __SIZEOF_INT128__ == 16) \
&& !defined(__sparc__) \
- && (!defined(__SIZEOF_LONG__) || (__SIZEOF_LONG__ == 8)) \
+ && (!defined(__SIZEOF_LONG__) || (__SIZEOF_LONG__ == 8)) \
&& !(defined(__ANDROID__) && !defined(__clang__)) )
/*
* Base 2^51 implementation. It's virtually no different from reference
diff --git a/contrib/libs/openssl/crypto/ec/curve448/curve448.c b/contrib/libs/openssl/crypto/ec/curve448/curve448.c
index 12d97f0679..f7762ff97e 100644
--- a/contrib/libs/openssl/crypto/ec/curve448/curve448.c
+++ b/contrib/libs/openssl/crypto/ec/curve448/curve448.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
* Copyright 2015-2016 Cryptography Research, Inc.
*
* Licensed under the OpenSSL license (the "License"). You may not use
@@ -27,8 +27,8 @@
static const curve448_scalar_t precomputed_scalarmul_adjustment = {
{
{
- SC_LIMB(0xc873d6d54a7bb0cfULL), SC_LIMB(0xe933d8d723a70aadULL),
- SC_LIMB(0xbb124b65129c96fdULL), SC_LIMB(0x00000008335dc163ULL)
+ SC_LIMB(0xc873d6d54a7bb0cfULL), SC_LIMB(0xe933d8d723a70aadULL),
+ SC_LIMB(0xbb124b65129c96fdULL), SC_LIMB(0x00000008335dc163ULL)
}
}
};
diff --git a/contrib/libs/openssl/crypto/ec/curve448/curve448_tables.c b/contrib/libs/openssl/crypto/ec/curve448/curve448_tables.c
index 9ef29769e3..85dd899a3b 100644
--- a/contrib/libs/openssl/crypto/ec/curve448/curve448_tables.c
+++ b/contrib/libs/openssl/crypto/ec/curve448/curve448_tables.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
* Copyright 2015-2016 Cryptography Research, Inc.
*
* Licensed under the OpenSSL license (the "License"). You may not use
@@ -16,1045 +16,1045 @@
static const curve448_precomputed_s curve448_precomputed_base_table = {
{
{{
- {FIELD_LITERAL(0x00cc3b062366f4ccULL, 0x003d6e34e314aa3cULL,
- 0x00d51c0a7521774dULL, 0x0094e060eec6ab8bULL,
- 0x00d21291b4d80082ULL, 0x00befed12b55ef1eULL,
- 0x00c3dd2df5c94518ULL, 0x00e0a7b112b8d4e6ULL)},
- {FIELD_LITERAL(0x0019eb5608d8723aULL, 0x00d1bab52fb3aedbULL,
- 0x00270a7311ebc90cULL, 0x0037c12b91be7f13ULL,
- 0x005be16cd8b5c704ULL, 0x003e181acda888e1ULL,
- 0x00bc1f00fc3fc6d0ULL, 0x00d3839bfa319e20ULL)},
- {FIELD_LITERAL(0x003caeb88611909fULL, 0x00ea8b378c4df3d4ULL,
- 0x00b3295b95a5a19aULL, 0x00a65f97514bdfb5ULL,
- 0x00b39efba743cab1ULL, 0x0016ba98b862fd2dULL,
- 0x0001508812ee71d7ULL, 0x000a75740eea114aULL)},
- }}, {{
- {FIELD_LITERAL(0x00ebcf0eb649f823ULL, 0x00166d332e98ea03ULL,
- 0x0059ddf64f5cd5f6ULL, 0x0047763123d9471bULL,
- 0x00a64065c53ef62fULL, 0x00978e44c480153dULL,
- 0x000b5b2a0265f194ULL, 0x0046a24b9f32965aULL)},
- {FIELD_LITERAL(0x00b9eef787034df0ULL, 0x0020bc24de3390cdULL,
- 0x000022160bae99bbULL, 0x00ae66e886e97946ULL,
- 0x0048d4bbe02cbb8bULL, 0x0072ba97b34e38d4ULL,
- 0x00eae7ec8f03e85aULL, 0x005ba92ecf808b2cULL)},
- {FIELD_LITERAL(0x00c9cfbbe74258fdULL, 0x00843a979ea9eaa7ULL,
- 0x000cbb4371cfbe90ULL, 0x0059bac8f7f0a628ULL,
- 0x004b3dff882ff530ULL, 0x0011869df4d90733ULL,
- 0x00595aa71f4abfc2ULL, 0x0070e2d38990c2e6ULL)},
- }}, {{
- {FIELD_LITERAL(0x00de2010c0a01733ULL, 0x00c739a612e24297ULL,
- 0x00a7212643141d7cULL, 0x00f88444f6b67c11ULL,
- 0x00484b7b16ec28f2ULL, 0x009c1b8856af9c68ULL,
- 0x00ff4669591fe9d6ULL, 0x0054974be08a32c8ULL)},
- {FIELD_LITERAL(0x0010de3fd682ceedULL, 0x008c07642d83ca4eULL,
- 0x0013bb064e00a1ccULL, 0x009411ae27870e11ULL,
- 0x00ea8e5b4d531223ULL, 0x0032fe7d2aaece2eULL,
- 0x00d989e243e7bb41ULL, 0x000fe79a508e9b8bULL)},
- {FIELD_LITERAL(0x005e0426b9bfc5b1ULL, 0x0041a5b1d29ee4faULL,
- 0x0015b0def7774391ULL, 0x00bc164f1f51af01ULL,
- 0x00d543b0942797b9ULL, 0x003c129b6398099cULL,
- 0x002b114c6e5adf18ULL, 0x00b4e630e4018a7bULL)},
- }}, {{
- {FIELD_LITERAL(0x00d490afc95f8420ULL, 0x00b096bf50c1d9b9ULL,
- 0x00799fd707679866ULL, 0x007c74d9334afbeaULL,
- 0x00efaa8be80ff4edULL, 0x0075c4943bb81694ULL,
- 0x00c21c2fca161f36ULL, 0x00e77035d492bfeeULL)},
- {FIELD_LITERAL(0x006658a190dd6661ULL, 0x00e0e9bab38609a6ULL,
- 0x0028895c802237edULL, 0x006a0229c494f587ULL,
- 0x002dcde96c9916b7ULL, 0x00d158822de16218ULL,
- 0x00173b917a06856fULL, 0x00ca78a79ae07326ULL)},
- {FIELD_LITERAL(0x00e35bfc79caced4ULL, 0x0087238a3e1fe3bbULL,
- 0x00bcbf0ff4ceff5bULL, 0x00a19c1c94099b91ULL,
- 0x0071e102b49db976ULL, 0x0059e3d004eada1eULL,
- 0x008da78afa58a47eULL, 0x00579c8ebf269187ULL)},
- }}, {{
- {FIELD_LITERAL(0x00a16c2905eee75fULL, 0x009d4bcaea2c7e1dULL,
- 0x00d3bd79bfad19dfULL, 0x0050da745193342cULL,
- 0x006abdb8f6b29ab1ULL, 0x00a24fe0a4fef7efULL,
- 0x0063730da1057dfbULL, 0x00a08c312c8eb108ULL)},
- {FIELD_LITERAL(0x00b583be005375beULL, 0x00a40c8f8a4e3df4ULL,
- 0x003fac4a8f5bdbf7ULL, 0x00d4481d872cd718ULL,
- 0x004dc8749cdbaefeULL, 0x00cce740d5e5c975ULL,
- 0x000b1c1f4241fd21ULL, 0x00a76de1b4e1cd07ULL)},
- {FIELD_LITERAL(0x007a076500d30b62ULL, 0x000a6e117b7f090fULL,
- 0x00c8712ae7eebd9aULL, 0x000fbd6c1d5f6ff7ULL,
- 0x003a7977246ebf11ULL, 0x00166ed969c6600eULL,
- 0x00aa42e469c98becULL, 0x00dc58f307cf0666ULL)},
- }}, {{
- {FIELD_LITERAL(0x004b491f65a9a28bULL, 0x006a10309e8a55b7ULL,
- 0x00b67210185187efULL, 0x00cf6497b12d9b8fULL,
- 0x0085778c56e2b1baULL, 0x0015b4c07a814d85ULL,
- 0x00686479e62da561ULL, 0x008de5d88f114916ULL)},
- {FIELD_LITERAL(0x00e37c88d6bba7b1ULL, 0x003e4577e1b8d433ULL,
- 0x0050d8ea5f510ec0ULL, 0x0042fc9f2da9ef59ULL,
- 0x003bd074c1141420ULL, 0x00561b8b7b68774eULL,
- 0x00232e5e5d1013a3ULL, 0x006b7f2cb3d7e73fULL)},
- {FIELD_LITERAL(0x004bdd0f0b41e6a0ULL, 0x001773057c405d24ULL,
- 0x006029f99915bd97ULL, 0x006a5ba70a17fe2fULL,
- 0x0046111977df7e08ULL, 0x004d8124c89fb6b7ULL,
- 0x00580983b2bb2724ULL, 0x00207bf330d6f3feULL)},
- }}, {{
- {FIELD_LITERAL(0x007efdc93972a48bULL, 0x002f5e50e78d5feeULL,
- 0x0080dc11d61c7fe5ULL, 0x0065aa598707245bULL,
- 0x009abba2300641beULL, 0x000c68787656543aULL,
- 0x00ffe0fef2dc0a17ULL, 0x00007ffbd6cb4f3aULL)},
- {FIELD_LITERAL(0x0036012f2b836efcULL, 0x00458c126d6b5fbcULL,
- 0x00a34436d719ad1eULL, 0x0097be6167117deaULL,
- 0x0009c219c879cff3ULL, 0x0065564493e60755ULL,
- 0x00993ac94a8cdec0ULL, 0x002d4885a4d0dbafULL)},
- {FIELD_LITERAL(0x00598b60b4c068baULL, 0x00c547a0be7f1afdULL,
- 0x009582164acf12afULL, 0x00af4acac4fbbe40ULL,
- 0x005f6ca7c539121aULL, 0x003b6e752ebf9d66ULL,
- 0x00f08a30d5cac5d4ULL, 0x00e399bb5f97c5a9ULL)},
- }}, {{
- {FIELD_LITERAL(0x007445a0409c0a66ULL, 0x00a65c369f3829c0ULL,
- 0x0031d248a4f74826ULL, 0x006817f34defbe8eULL,
- 0x00649741d95ebf2eULL, 0x00d46466ab16b397ULL,
- 0x00fdc35703bee414ULL, 0x00343b43334525f8ULL)},
- {FIELD_LITERAL(0x001796bea93f6401ULL, 0x00090c5a42e85269ULL,
- 0x00672412ba1252edULL, 0x001201d47b6de7deULL,
- 0x006877bccfe66497ULL, 0x00b554fd97a4c161ULL,
- 0x009753f42dbac3cfULL, 0x00e983e3e378270aULL)},
- {FIELD_LITERAL(0x00ac3eff18849872ULL, 0x00f0eea3bff05690ULL,
- 0x00a6d72c21dd505dULL, 0x001b832642424169ULL,
- 0x00a6813017b540e5ULL, 0x00a744bd71b385cdULL,
- 0x0022a7d089130a7bULL, 0x004edeec9a133486ULL)},
- }}, {{
- {FIELD_LITERAL(0x00b2d6729196e8a9ULL, 0x0088a9bb2031cef4ULL,
- 0x00579e7787dc1567ULL, 0x0030f49feb059190ULL,
- 0x00a0b1d69c7f7d8fULL, 0x0040bdcc6d9d806fULL,
- 0x00d76c4037edd095ULL, 0x00bbf24376415dd7ULL)},
- {FIELD_LITERAL(0x00240465ff5a7197ULL, 0x00bb97e76caf27d0ULL,
- 0x004b4edbf8116d39ULL, 0x001d8586f708cbaaULL,
- 0x000f8ee8ff8e4a50ULL, 0x00dde5a1945dd622ULL,
- 0x00e6fc1c0957e07cULL, 0x0041c9cdabfd88a0ULL)},
- {FIELD_LITERAL(0x005344b0bf5b548cULL, 0x002957d0b705cc99ULL,
- 0x00f586a70390553dULL, 0x0075b3229f583cc3ULL,
- 0x00a1aa78227490e4ULL, 0x001bf09cf7957717ULL,
- 0x00cf6bf344325f52ULL, 0x0065bd1c23ca3ecfULL)},
- }}, {{
- {FIELD_LITERAL(0x009bff3b3239363cULL, 0x00e17368796ef7c0ULL,
- 0x00528b0fe0971f3aULL, 0x0008014fc8d4a095ULL,
- 0x00d09f2e8a521ec4ULL, 0x006713ab5dde5987ULL,
- 0x0003015758e0dbb1ULL, 0x00215999f1ba212dULL)},
- {FIELD_LITERAL(0x002c88e93527da0eULL, 0x0077c78f3456aad5ULL,
- 0x0071087a0a389d1cULL, 0x00934dac1fb96dbdULL,
- 0x008470e801162697ULL, 0x005bc2196cd4ad49ULL,
- 0x00e535601d5087c3ULL, 0x00769888700f497fULL)},
- {FIELD_LITERAL(0x00da7a4b557298adULL, 0x0019d2589ea5df76ULL,
- 0x00ef3e38be0c6497ULL, 0x00a9644e1312609aULL,
- 0x004592f61b2558daULL, 0x0082c1df510d7e46ULL,
- 0x0042809a535c0023ULL, 0x00215bcb5afd7757ULL)},
- }}, {{
- {FIELD_LITERAL(0x002b9df55a1a4213ULL, 0x00dcfc3b464a26beULL,
- 0x00c4f9e07a8144d5ULL, 0x00c8e0617a92b602ULL,
- 0x008e3c93accafae0ULL, 0x00bf1bcb95b2ca60ULL,
- 0x004ce2426a613bf3ULL, 0x00266cac58e40921ULL)},
- {FIELD_LITERAL(0x008456d5db76e8f0ULL, 0x0032ca9cab2ce163ULL,
- 0x0059f2b8bf91abcfULL, 0x0063c2a021712788ULL,
- 0x00f86155af22f72dULL, 0x00db98b2a6c005a0ULL,
- 0x00ac6e416a693ac4ULL, 0x007a93572af53226ULL)},
- {FIELD_LITERAL(0x0087767520f0de22ULL, 0x0091f64012279fb5ULL,
- 0x001050f1f0644999ULL, 0x004f097a2477ad3cULL,
- 0x006b37913a9947bdULL, 0x001a3d78645af241ULL,
- 0x0057832bbb3008a7ULL, 0x002c1d902b80dc20ULL)},
- }}, {{
- {FIELD_LITERAL(0x001a6002bf178877ULL, 0x009bce168aa5af50ULL,
- 0x005fc318ff04a7f5ULL, 0x0052818f55c36461ULL,
- 0x008768f5d4b24afbULL, 0x0037ffbae7b69c85ULL,
- 0x0018195a4b61edc0ULL, 0x001e12ea088434b2ULL)},
- {FIELD_LITERAL(0x0047d3f804e7ab07ULL, 0x00a809ab5f905260ULL,
- 0x00b3ffc7cdaf306dULL, 0x00746e8ec2d6e509ULL,
- 0x00d0dade8887a645ULL, 0x00acceeebde0dd37ULL,
- 0x009bc2579054686bULL, 0x0023804f97f1c2bfULL)},
- {FIELD_LITERAL(0x0043e2e2e50b80d7ULL, 0x00143aafe4427e0fULL,
- 0x005594aaecab855bULL, 0x008b12ccaaecbc01ULL,
- 0x002deeb091082bc3ULL, 0x009cca4be2ae7514ULL,
- 0x00142b96e696d047ULL, 0x00ad2a2b1c05256aULL)},
- }}, {{
- {FIELD_LITERAL(0x003914f2f144b78bULL, 0x007a95dd8bee6f68ULL,
- 0x00c7f4384d61c8e6ULL, 0x004e51eb60f1bdb2ULL,
- 0x00f64be7aa4621d8ULL, 0x006797bfec2f0ac0ULL,
- 0x007d17aab3c75900ULL, 0x001893e73cac8bc5ULL)},
- {FIELD_LITERAL(0x00140360b768665bULL, 0x00b68aca4967f977ULL,
- 0x0001089b66195ae4ULL, 0x00fe71122185e725ULL,
- 0x000bca2618d49637ULL, 0x00a54f0557d7e98aULL,
- 0x00cdcd2f91d6f417ULL, 0x00ab8c13741fd793ULL)},
- {FIELD_LITERAL(0x00725ee6b1e549e0ULL, 0x007124a0769777faULL,
- 0x000b68fdad07ae42ULL, 0x0085b909cd4952dfULL,
- 0x0092d2e3c81606f4ULL, 0x009f22f6cac099a0ULL,
- 0x00f59da57f2799a8ULL, 0x00f06c090122f777ULL)},
- }}, {{
- {FIELD_LITERAL(0x00ce0bed0a3532bcULL, 0x001a5048a22df16bULL,
- 0x00e31db4cbad8bf1ULL, 0x00e89292120cf00eULL,
- 0x007d1dd1a9b00034ULL, 0x00e2a9041ff8f680ULL,
- 0x006a4c837ae596e7ULL, 0x00713af1068070b3ULL)},
- {FIELD_LITERAL(0x00c4fe64ce66d04bULL, 0x00b095d52e09b3d7ULL,
- 0x00758bbecb1a3a8eULL, 0x00f35cce8d0650c0ULL,
- 0x002b878aa5984473ULL, 0x0062e0a3b7544ddcULL,
- 0x00b25b290ed116feULL, 0x007b0f6abe0bebf2ULL)},
- {FIELD_LITERAL(0x0081d4e3addae0a8ULL, 0x003410c836c7ffccULL,
- 0x00c8129ad89e4314ULL, 0x000e3d5a23922dcdULL,
- 0x00d91e46f29c31f3ULL, 0x006c728cde8c5947ULL,
- 0x002bc655ba2566c0ULL, 0x002ca94721533108ULL)},
- }}, {{
- {FIELD_LITERAL(0x0051e4b3f764d8a9ULL, 0x0019792d46e904a0ULL,
- 0x00853bc13dbc8227ULL, 0x000840208179f12dULL,
- 0x0068243474879235ULL, 0x0013856fbfe374d0ULL,
- 0x00bda12fe8676424ULL, 0x00bbb43635926eb2ULL)},
- {FIELD_LITERAL(0x0012cdc880a93982ULL, 0x003c495b21cd1b58ULL,
- 0x00b7e5c93f22a26eULL, 0x0044aa82dfb99458ULL,
- 0x009ba092cdffe9c0ULL, 0x00a14b3ab2083b73ULL,
- 0x000271c2f70e1c4bULL, 0x00eea9cac0f66eb8ULL)},
- {FIELD_LITERAL(0x001a1847c4ac5480ULL, 0x00b1b412935bb03aULL,
- 0x00f74285983bf2b2ULL, 0x00624138b5b5d0f1ULL,
- 0x008820c0b03d38bfULL, 0x00b94e50a18c1572ULL,
- 0x0060f6934841798fULL, 0x00c52f5d66d6ebe2ULL)},
- }}, {{
- {FIELD_LITERAL(0x00da23d59f9bcea6ULL, 0x00e0f27007a06a4bULL,
- 0x00128b5b43a6758cULL, 0x000cf50190fa8b56ULL,
- 0x00fc877aba2b2d72ULL, 0x00623bef52edf53fULL,
- 0x00e6af6b819669e2ULL, 0x00e314dc34fcaa4fULL)},
- {FIELD_LITERAL(0x0066e5eddd164d1eULL, 0x00418a7c6fe28238ULL,
- 0x0002e2f37e962c25ULL, 0x00f01f56b5975306ULL,
- 0x0048842fa503875cULL, 0x0057b0e968078143ULL,
- 0x00ff683024f3d134ULL, 0x0082ae28fcad12e4ULL)},
- {FIELD_LITERAL(0x0011ddfd21260e42ULL, 0x00d05b0319a76892ULL,
- 0x00183ea4368e9b8fULL, 0x00b0815662affc96ULL,
- 0x00b466a5e7ce7c88ULL, 0x00db93b07506e6eeULL,
- 0x0033885f82f62401ULL, 0x0086f9090ec9b419ULL)},
- }}, {{
- {FIELD_LITERAL(0x00d95d1c5fcb435aULL, 0x0016d1ed6b5086f9ULL,
- 0x00792aa0b7e54d71ULL, 0x0067b65715f1925dULL,
- 0x00a219755ec6176bULL, 0x00bc3f026b12c28fULL,
- 0x00700c897ffeb93eULL, 0x0089b83f6ec50b46ULL)},
- {FIELD_LITERAL(0x003c97e6384da36eULL, 0x00423d53eac81a09ULL,
- 0x00b70d68f3cdce35ULL, 0x00ee7959b354b92cULL,
- 0x00f4e9718819c8caULL, 0x009349f12acbffe9ULL,
- 0x005aee7b62cb7da6ULL, 0x00d97764154ffc86ULL)},
- {FIELD_LITERAL(0x00526324babb46dcULL, 0x002ee99b38d7bf9eULL,
- 0x007ea51794706ef4ULL, 0x00abeb04da6e3c39ULL,
- 0x006b457c1d281060ULL, 0x00fe243e9a66c793ULL,
- 0x00378de0fb6c6ee4ULL, 0x003e4194b9c3cb93ULL)},
- }}, {{
- {FIELD_LITERAL(0x00fed3cd80ca2292ULL, 0x0015b043a73ca613ULL,
- 0x000a9fd7bf9be227ULL, 0x003b5e03de2db983ULL,
- 0x005af72d46904ef7ULL, 0x00c0f1b5c49faa99ULL,
- 0x00dc86fc3bd305e1ULL, 0x00c92f08c1cb1797ULL)},
- {FIELD_LITERAL(0x0079680ce111ed3bULL, 0x001a1ed82806122cULL,
- 0x000c2e7466d15df3ULL, 0x002c407f6f7150fdULL,
- 0x00c5e7c96b1b0ce3ULL, 0x009aa44626863ff9ULL,
- 0x00887b8b5b80be42ULL, 0x00b6023cec964825ULL)},
- {FIELD_LITERAL(0x00e4a8e1048970c8ULL, 0x0062887b7830a302ULL,
- 0x00bcf1c8cd81402bULL, 0x0056dbb81a68f5beULL,
- 0x0014eced83f12452ULL, 0x00139e1a510150dfULL,
- 0x00bb81140a82d1a3ULL, 0x000febcc1aaf1aa7ULL)},
- }}, {{
- {FIELD_LITERAL(0x00a7527958238159ULL, 0x0013ec9537a84cd6ULL,
- 0x001d7fee7d562525ULL, 0x00b9eefa6191d5e5ULL,
- 0x00dbc97db70bcb8aULL, 0x00481affc7a4d395ULL,
- 0x006f73d3e70c31bbULL, 0x00183f324ed96a61ULL)},
- {FIELD_LITERAL(0x0039dd7ce7fc6860ULL, 0x00d64f6425653da1ULL,
- 0x003e037c7f57d0afULL, 0x0063477a06e2bcf2ULL,
- 0x001727dbb7ac67e6ULL, 0x0049589f5efafe2eULL,
- 0x00fc0fef2e813d54ULL, 0x008baa5d087fb50dULL)},
- {FIELD_LITERAL(0x0024fb59d9b457c7ULL, 0x00a7d4e060223e4cULL,
- 0x00c118d1b555fd80ULL, 0x0082e216c732f22aULL,
- 0x00cd2a2993089504ULL, 0x003638e836a3e13dULL,
- 0x000d855ee89b4729ULL, 0x008ec5b7d4810c91ULL)},
- }}, {{
- {FIELD_LITERAL(0x001bf51f7d65cdfdULL, 0x00d14cdafa16a97dULL,
- 0x002c38e60fcd10e7ULL, 0x00a27446e393efbdULL,
- 0x000b5d8946a71fddULL, 0x0063df2cde128f2fULL,
- 0x006c8679569b1888ULL, 0x0059ffc4925d732dULL)},
- {FIELD_LITERAL(0x00ece96f95f2b66fULL, 0x00ece7952813a27bULL,
- 0x0026fc36592e489eULL, 0x007157d1a2de0f66ULL,
- 0x00759dc111d86ddfULL, 0x0012881e5780bb0fULL,
- 0x00c8ccc83ad29496ULL, 0x0012b9bd1929eb71ULL)},
- {FIELD_LITERAL(0x000fa15a20da5df0ULL, 0x00349ddb1a46cd31ULL,
- 0x002c512ad1d8e726ULL, 0x00047611f669318dULL,
- 0x009e68fba591e17eULL, 0x004320dffa803906ULL,
- 0x00a640874951a3d3ULL, 0x00b6353478baa24fULL)},
- }}, {{
- {FIELD_LITERAL(0x009696510000d333ULL, 0x00ec2f788bc04826ULL,
- 0x000e4d02b1f67ba5ULL, 0x00659aa8dace08b6ULL,
- 0x00d7a38a3a3ae533ULL, 0x008856defa8c746bULL,
- 0x004d7a4402d3da1aULL, 0x00ea82e06229260fULL)},
- {FIELD_LITERAL(0x006a15bb20f75c0cULL, 0x0079a144027a5d0cULL,
- 0x00d19116ce0b4d70ULL, 0x0059b83bcb0b268eULL,
- 0x005f58f63f16c127ULL, 0x0079958318ee2c37ULL,
- 0x00defbb063d07f82ULL, 0x00f1f0b931d2d446ULL)},
- {FIELD_LITERAL(0x00cb5e4c3c35d422ULL, 0x008df885ca43577fULL,
- 0x00fa50b16ca3e471ULL, 0x005a0e58e17488c8ULL,
- 0x00b2ceccd6d34d19ULL, 0x00f01d5d235e36e9ULL,
- 0x00db2e7e4be6ca44ULL, 0x00260ab77f35fccdULL)},
- }}, {{
- {FIELD_LITERAL(0x006f6fd9baac61d5ULL, 0x002a7710a020a895ULL,
- 0x009de0db7fc03d4dULL, 0x00cdedcb1875f40bULL,
- 0x00050caf9b6b1e22ULL, 0x005e3a6654456ab0ULL,
- 0x00775fdf8c4423d4ULL, 0x0028701ea5738b5dULL)},
- {FIELD_LITERAL(0x009ffd90abfeae96ULL, 0x00cba3c2b624a516ULL,
- 0x005ef08bcee46c91ULL, 0x00e6fde30afb6185ULL,
- 0x00f0b4db4f818ce4ULL, 0x006c54f45d2127f5ULL,
- 0x00040125035854c7ULL, 0x00372658a3287e13ULL)},
- {FIELD_LITERAL(0x00d7070fb1beb2abULL, 0x0078fc845a93896bULL,
- 0x006894a4b2f224a6ULL, 0x005bdd8192b9dbdeULL,
- 0x00b38839874b3a9eULL, 0x00f93618b04b7a57ULL,
- 0x003e3ec75fd2c67eULL, 0x00bf5e6bfc29494aULL)},
- }}, {{
- {FIELD_LITERAL(0x00f19224ebba2aa5ULL, 0x0074f89d358e694dULL,
- 0x00eea486597135adULL, 0x0081579a4555c7e1ULL,
- 0x0010b9b872930a9dULL, 0x00f002e87a30ecc0ULL,
- 0x009b9d66b6de56e2ULL, 0x00a3c4f45e8004ebULL)},
- {FIELD_LITERAL(0x0045e8dda9400888ULL, 0x002ff12e5fc05db7ULL,
- 0x00a7098d54afe69cULL, 0x00cdbe846a500585ULL,
- 0x00879c1593ca1882ULL, 0x003f7a7fea76c8b0ULL,
- 0x002cd73dd0c8e0a1ULL, 0x00645d6ce96f51feULL)},
- {FIELD_LITERAL(0x002b7e83e123d6d6ULL, 0x00398346f7419c80ULL,
- 0x0042922e55940163ULL, 0x005e7fc5601886a3ULL,
- 0x00e88f2cee1d3103ULL, 0x00e7fab135f2e377ULL,
- 0x00b059984dbf0dedULL, 0x0009ce080faa5bb8ULL)},
- }}, {{
- {FIELD_LITERAL(0x0085e78af7758979ULL, 0x00275a4ee1631a3aULL,
- 0x00d26bc0ed78b683ULL, 0x004f8355ea21064fULL,
- 0x00d618e1a32696e5ULL, 0x008d8d7b150e5680ULL,
- 0x00a74cd854b278d2ULL, 0x001dd62702203ea0ULL)},
- {FIELD_LITERAL(0x00f89335c2a59286ULL, 0x00a0f5c905d55141ULL,
- 0x00b41fb836ee9382ULL, 0x00e235d51730ca43ULL,
- 0x00a5cb37b5c0a69aULL, 0x009b966ffe136c45ULL,
- 0x00cb2ea10bf80ed1ULL, 0x00fb2b370b40dc35ULL)},
- {FIELD_LITERAL(0x00d687d16d4ee8baULL, 0x0071520bdd069dffULL,
- 0x00de85c60d32355dULL, 0x0087d2e3565102f4ULL,
- 0x00cde391b8dfc9aaULL, 0x00e18d69efdfefe5ULL,
- 0x004a9d0591954e91ULL, 0x00fa36dd8b50eee5ULL)},
- }}, {{
- {FIELD_LITERAL(0x002e788749a865f7ULL, 0x006e4dc3116861eaULL,
- 0x009f1428c37276e6ULL, 0x00e7d2e0fc1e1226ULL,
- 0x003aeebc6b6c45f6ULL, 0x0071a8073bf500c9ULL,
- 0x004b22ad986b530cULL, 0x00f439e63c0d79d4ULL)},
- {FIELD_LITERAL(0x006bc3d53011f470ULL, 0x00032d6e692b83e8ULL,
- 0x00059722f497cd0bULL, 0x0009b4e6f0c497ccULL,
- 0x0058a804b7cce6c0ULL, 0x002b71d3302bbd5dULL,
- 0x00e2f82a36765fceULL, 0x008dded99524c703ULL)},
- {FIELD_LITERAL(0x004d058953747d64ULL, 0x00701940fe79aa6fULL,
- 0x00a620ac71c760bfULL, 0x009532b611158b75ULL,
- 0x00547ed7f466f300ULL, 0x003cb5ab53a8401aULL,
- 0x00c7763168ce3120ULL, 0x007e48e33e4b9ab2ULL)},
- }}, {{
- {FIELD_LITERAL(0x001b2fc57bf3c738ULL, 0x006a3f918993fb80ULL,
- 0x0026f7a14fdec288ULL, 0x0075a2cdccef08dbULL,
- 0x00d3ecbc9eecdbf1ULL, 0x0048c40f06e5bf7fULL,
- 0x00d63e423009896bULL, 0x000598bc99c056a8ULL)},
- {FIELD_LITERAL(0x002f194eaafa46dcULL, 0x008e38f57fe87613ULL,
- 0x00dc8e5ae25f4ab2ULL, 0x000a17809575e6bdULL,
- 0x00d3ec7923ba366aULL, 0x003a7e72e0ad75e3ULL,
- 0x0010024b88436e0aULL, 0x00ed3c5444b64051ULL)},
- {FIELD_LITERAL(0x00831fc1340af342ULL, 0x00c9645669466d35ULL,
- 0x007692b4cc5a080fULL, 0x009fd4a47ac9259fULL,
- 0x001eeddf7d45928bULL, 0x003c0446fc45f28bULL,
- 0x002c0713aa3e2507ULL, 0x0095706935f0f41eULL)},
- }}, {{
- {FIELD_LITERAL(0x00766ae4190ec6d8ULL, 0x0065768cabc71380ULL,
- 0x00b902598416cdc2ULL, 0x00380021ad38df52ULL,
- 0x008f0b89d6551134ULL, 0x004254d4cc62c5a5ULL,
- 0x000d79f4484b9b94ULL, 0x00b516732ae3c50eULL)},
- {FIELD_LITERAL(0x001fb73475c45509ULL, 0x00d2b2e5ea43345aULL,
- 0x00cb3c3842077bd1ULL, 0x0029f90ad820946eULL,
- 0x007c11b2380778aaULL, 0x009e54ece62c1704ULL,
- 0x004bc60c41ca01c3ULL, 0x004525679a5a0b03ULL)},
- {FIELD_LITERAL(0x00c64fbddbed87b3ULL, 0x0040601d11731faaULL,
- 0x009c22475b6f9d67ULL, 0x0024b79dae875f15ULL,
- 0x00616fed3f02c3b0ULL, 0x0000cf39f6af2d3bULL,
- 0x00c46bac0aa9a688ULL, 0x00ab23e2800da204ULL)},
- }}, {{
- {FIELD_LITERAL(0x000b3a37617632b0ULL, 0x00597199fe1cfb6cULL,
- 0x0042a7ccdfeafdd6ULL, 0x004cc9f15ebcea17ULL,
- 0x00f436e596a6b4a4ULL, 0x00168861142df0d8ULL,
- 0x000753edfec26af5ULL, 0x000c495d7e388116ULL)},
- {FIELD_LITERAL(0x0017085f4a346148ULL, 0x00c7cf7a37f62272ULL,
- 0x001776e129bc5c30ULL, 0x009955134c9eef2aULL,
- 0x001ba5bdf1df07beULL, 0x00ec39497103a55cULL,
- 0x006578354fda6cfbULL, 0x005f02719d4f15eeULL)},
- {FIELD_LITERAL(0x0052b9d9b5d9655dULL, 0x00d4ec7ba1b461c3ULL,
- 0x00f95df4974f280bULL, 0x003d8e5ca11aeb51ULL,
- 0x00d4981eb5a70b26ULL, 0x000af9a4f6659f29ULL,
- 0x004598c846faeb43ULL, 0x0049d9a183a47670ULL)},
- }}, {{
- {FIELD_LITERAL(0x000a72d23dcb3f1fULL, 0x00a3737f84011727ULL,
- 0x00f870c0fbbf4a47ULL, 0x00a7aadd04b5c9caULL,
- 0x000c7715c67bd072ULL, 0x00015a136afcd74eULL,
- 0x0080d5caea499634ULL, 0x0026b448ec7514b7ULL)},
- {FIELD_LITERAL(0x00b60167d9e7d065ULL, 0x00e60ba0d07381e8ULL,
- 0x003a4f17b725c2d4ULL, 0x006c19fe176b64faULL,
- 0x003b57b31af86ccbULL, 0x0021047c286180fdULL,
- 0x00bdc8fb00c6dbb6ULL, 0x00fe4a9f4bab4f3fULL)},
- {FIELD_LITERAL(0x0088ffc3a16111f7ULL, 0x009155e4245d0bc8ULL,
- 0x00851d68220572d5ULL, 0x00557ace1e514d29ULL,
- 0x0031d7c339d91022ULL, 0x00101d0ae2eaceeaULL,
- 0x00246ab3f837b66aULL, 0x00d5216d381ff530ULL)},
- }}, {{
- {FIELD_LITERAL(0x0057e7ea35f36daeULL, 0x00f47d7ad15de22eULL,
- 0x00d757ea4b105115ULL, 0x008311457d579d7eULL,
- 0x00b49b75b1edd4ebULL, 0x0081c7ff742fd63aULL,
- 0x00ddda3187433df6ULL, 0x00475727d55f9c66ULL)},
- {FIELD_LITERAL(0x00a6295218dc136aULL, 0x00563b3af0e9c012ULL,
- 0x00d3753b0145db1bULL, 0x004550389c043dc1ULL,
- 0x00ea94ae27401bdfULL, 0x002b0b949f2b7956ULL,
- 0x00c63f780ad8e23cULL, 0x00e591c47d6bab15ULL)},
- {FIELD_LITERAL(0x00416c582b058eb6ULL, 0x004107da5b2cc695ULL,
- 0x00b3cd2556aeec64ULL, 0x00c0b418267e57a1ULL,
- 0x001799293579bd2eULL, 0x0046ed44590e4d07ULL,
- 0x001d7459b3630a1eULL, 0x00c6afba8b6696aaULL)},
- }}, {{
- {FIELD_LITERAL(0x008d6009b26da3f8ULL, 0x00898e88ca06b1caULL,
- 0x00edb22b2ed7fe62ULL, 0x00fbc93516aabe80ULL,
- 0x008b4b470c42ce0dULL, 0x00e0032ba7d0dcbbULL,
- 0x00d76da3a956ecc8ULL, 0x007f20fe74e3852aULL)},
- {FIELD_LITERAL(0x002419222c607674ULL, 0x00a7f23af89188b3ULL,
- 0x00ad127284e73d1cULL, 0x008bba582fae1c51ULL,
- 0x00fc6aa7ca9ecab1ULL, 0x003df5319eb6c2baULL,
- 0x002a05af8a8b199aULL, 0x004bf8354558407cULL)},
- {FIELD_LITERAL(0x00ce7d4a30f0fcbfULL, 0x00d02c272629f03dULL,
- 0x0048c001f7400bc2ULL, 0x002c21368011958dULL,
- 0x0098a550391e96b5ULL, 0x002d80b66390f379ULL,
- 0x001fa878760cc785ULL, 0x001adfce54b613d5ULL)},
- }}, {{
- {FIELD_LITERAL(0x001ed4dc71fa2523ULL, 0x005d0bff19bf9b5cULL,
- 0x00c3801cee065a64ULL, 0x001ed0b504323fbfULL,
- 0x0003ab9fdcbbc593ULL, 0x00df82070178b8d2ULL,
- 0x00a2bcaa9c251f85ULL, 0x00c628a3674bd02eULL)},
- {FIELD_LITERAL(0x006b7a0674f9f8deULL, 0x00a742414e5c7cffULL,
- 0x0041cbf3c6e13221ULL, 0x00e3a64fd207af24ULL,
- 0x0087c05f15fbe8d1ULL, 0x004c50936d9e8a33ULL,
- 0x001306ec21042b6dULL, 0x00a4f4137d1141c2ULL)},
- {FIELD_LITERAL(0x0009e6fb921568b0ULL, 0x00b3c60120219118ULL,
- 0x002a6c3460dd503aULL, 0x009db1ef11654b54ULL,
- 0x0063e4bf0be79601ULL, 0x00670d34bb2592b9ULL,
- 0x00dcee2f6c4130ceULL, 0x00b2682e88e77f54ULL)},
- }}, {{
- {FIELD_LITERAL(0x000d5b4b3da135abULL, 0x00838f3e5064d81dULL,
- 0x00d44eb50f6d94edULL, 0x0008931ab502ac6dULL,
- 0x00debe01ca3d3586ULL, 0x0025c206775f0641ULL,
- 0x005ad4b6ae912763ULL, 0x007e2c318ad8f247ULL)},
- {FIELD_LITERAL(0x00ddbe0750dd1addULL, 0x004b3c7b885844b8ULL,
- 0x00363e7ecf12f1aeULL, 0x0062e953e6438f9dULL,
- 0x0023cc73b076afe9ULL, 0x00b09fa083b4da32ULL,
- 0x00c7c3d2456c541dULL, 0x005b591ec6b694d4ULL)},
- {FIELD_LITERAL(0x0028656e19d62fcfULL, 0x0052a4af03df148dULL,
- 0x00122765ddd14e42ULL, 0x00f2252904f67157ULL,
- 0x004741965b636f3aULL, 0x006441d296132cb9ULL,
- 0x005e2106f956a5b7ULL, 0x00247029592d335cULL)},
- }}, {{
- {FIELD_LITERAL(0x003fe038eb92f894ULL, 0x000e6da1b72e8e32ULL,
- 0x003a1411bfcbe0faULL, 0x00b55d473164a9e4ULL,
- 0x00b9a775ac2df48dULL, 0x0002ddf350659e21ULL,
- 0x00a279a69eb19cb3ULL, 0x00f844eab25cba44ULL)},
- {FIELD_LITERAL(0x00c41d1f9c1f1ac1ULL, 0x007b2df4e9f19146ULL,
- 0x00b469355fd5ba7aULL, 0x00b5e1965afc852aULL,
- 0x00388d5f1e2d8217ULL, 0x0022079e4c09ae93ULL,
- 0x0014268acd4ef518ULL, 0x00c1dd8d9640464cULL)},
- {FIELD_LITERAL(0x0038526adeed0c55ULL, 0x00dd68c607e3fe85ULL,
- 0x00f746ddd48a5d57ULL, 0x0042f2952b963b7cULL,
- 0x001cbbd6876d5ec2ULL, 0x005e341470bca5c2ULL,
- 0x00871d41e085f413ULL, 0x00e53ab098f45732ULL)},
- }}, {{
- {FIELD_LITERAL(0x004d51124797c831ULL, 0x008f5ae3750347adULL,
- 0x0070ced94c1a0c8eULL, 0x00f6db2043898e64ULL,
- 0x000d00c9a5750cd0ULL, 0x000741ec59bad712ULL,
- 0x003c9d11aab37b7fULL, 0x00a67ba169807714ULL)},
- {FIELD_LITERAL(0x00adb2c1566e8b8fULL, 0x0096c68a35771a9aULL,
- 0x00869933356f334aULL, 0x00ba9c93459f5962ULL,
- 0x009ec73fb6e8ca4bULL, 0x003c3802c27202e1ULL,
- 0x0031f5b733e0c008ULL, 0x00f9058c19611fa9ULL)},
- {FIELD_LITERAL(0x00238f01814a3421ULL, 0x00c325a44b6cce28ULL,
- 0x002136f97aeb0e73ULL, 0x000cac8268a4afe2ULL,
- 0x0022fd218da471b3ULL, 0x009dcd8dfff8def9ULL,
- 0x00cb9f8181d999bbULL, 0x00143ae56edea349ULL)},
- }}, {{
- {FIELD_LITERAL(0x0000623bf87622c5ULL, 0x00a1966fdd069496ULL,
- 0x00c315b7b812f9fcULL, 0x00bdf5efcd128b97ULL,
- 0x001d464f532e3e16ULL, 0x003cd94f081bfd7eULL,
- 0x00ed9dae12ce4009ULL, 0x002756f5736eee70ULL)},
- {FIELD_LITERAL(0x00a5187e6ee7341bULL, 0x00e6d52e82d83b6eULL,
- 0x00df3c41323094a7ULL, 0x00b3324f444e9de9ULL,
- 0x00689eb21a35bfe5ULL, 0x00f16363becd548dULL,
- 0x00e187cc98e7f60fULL, 0x00127d9062f0ccabULL)},
- {FIELD_LITERAL(0x004ad71b31c29e40ULL, 0x00a5fcace12fae29ULL,
- 0x004425b5597280edULL, 0x00e7ef5d716c3346ULL,
- 0x0010b53ada410ac8ULL, 0x0092310226060c9bULL,
- 0x0091c26128729c7eULL, 0x0088b42900f8ec3bULL)},
- }}, {{
- {FIELD_LITERAL(0x00f1e26e9762d4a8ULL, 0x00d9d74082183414ULL,
- 0x00ffec9bd57a0282ULL, 0x000919e128fd497aULL,
- 0x00ab7ae7d00fe5f8ULL, 0x0054dc442851ff68ULL,
- 0x00c9ebeb3b861687ULL, 0x00507f7cab8b698fULL)},
- {FIELD_LITERAL(0x00c13c5aae3ae341ULL, 0x009c6c9ed98373e7ULL,
- 0x00098f26864577a8ULL, 0x0015b886e9488b45ULL,
- 0x0037692c42aadba5ULL, 0x00b83170b8e7791cULL,
- 0x001670952ece1b44ULL, 0x00fd932a39276da2ULL)},
- {FIELD_LITERAL(0x0081a3259bef3398ULL, 0x005480fff416107bULL,
- 0x00ce4f607d21be98ULL, 0x003ffc084b41df9bULL,
- 0x0043d0bb100502d1ULL, 0x00ec35f575ba3261ULL,
- 0x00ca18f677300ef3ULL, 0x00e8bb0a827d8548ULL)},
- }}, {{
- {FIELD_LITERAL(0x00df76b3328ada72ULL, 0x002e20621604a7c2ULL,
- 0x00f910638a105b09ULL, 0x00ef4724d96ef2cdULL,
- 0x00377d83d6b8a2f7ULL, 0x00b4f48805ade324ULL,
- 0x001cd5da8b152018ULL, 0x0045af671a20ca7fULL)},
- {FIELD_LITERAL(0x009ae3b93a56c404ULL, 0x004a410b7a456699ULL,
- 0x00023a619355e6b2ULL, 0x009cdc7297387257ULL,
- 0x0055b94d4ae70d04ULL, 0x002cbd607f65b005ULL,
- 0x003208b489697166ULL, 0x00ea2aa058867370ULL)},
- {FIELD_LITERAL(0x00f29d2598ee3f32ULL, 0x00b4ac5385d82adcULL,
- 0x007633eaf04df19bULL, 0x00aa2d3d77ceab01ULL,
- 0x004a2302fcbb778aULL, 0x00927f225d5afa34ULL,
- 0x004a8e9d5047f237ULL, 0x008224ae9dbce530ULL)},
- }}, {{
- {FIELD_LITERAL(0x001cf640859b02f8ULL, 0x00758d1d5d5ce427ULL,
- 0x00763c784ef4604cULL, 0x005fa81aee205270ULL,
- 0x00ac537bfdfc44cbULL, 0x004b919bd342d670ULL,
- 0x00238508d9bf4b7aULL, 0x00154888795644f3ULL)},
- {FIELD_LITERAL(0x00c845923c084294ULL, 0x00072419a201bc25ULL,
- 0x0045f408b5f8e669ULL, 0x00e9d6a186b74dfeULL,
- 0x00e19108c68fa075ULL, 0x0017b91d874177b7ULL,
- 0x002f0ca2c7912c5aULL, 0x009400aa385a90a2ULL)},
- {FIELD_LITERAL(0x0071110b01482184ULL, 0x00cfed0044f2bef8ULL,
- 0x0034f2901cf4662eULL, 0x003b4ae2a67f9834ULL,
- 0x00cca9b96fe94810ULL, 0x00522507ae77abd0ULL,
- 0x00bac7422721e73eULL, 0x0066622b0f3a62b0ULL)},
- }}, {{
- {FIELD_LITERAL(0x00f8ac5cf4705b6aULL, 0x00867d82dcb457e3ULL,
- 0x007e13ab2ccc2ce9ULL, 0x009ee9a018d3930eULL,
- 0x008370f8ecb42df8ULL, 0x002d9f019add263eULL,
- 0x003302385b92d196ULL, 0x00a15654536e2c0cULL)},
- {FIELD_LITERAL(0x0026ef1614e160afULL, 0x00c023f9edfc9c76ULL,
- 0x00cff090da5f57baULL, 0x0076db7a66643ae9ULL,
- 0x0019462f8c646999ULL, 0x008fec00b3854b22ULL,
- 0x00d55041692a0a1cULL, 0x0065db894215ca00ULL)},
- {FIELD_LITERAL(0x00a925036e0a451cULL, 0x002a0390c36b6cc1ULL,
- 0x00f27020d90894f4ULL, 0x008d90d52cbd3d7fULL,
- 0x00e1d0137392f3b8ULL, 0x00f017c158b51a8fULL,
- 0x00cac313d3ed7dbcULL, 0x00b99a81e3eb42d3ULL)},
- }}, {{
- {FIELD_LITERAL(0x00b54850275fe626ULL, 0x0053a3fd1ec71140ULL,
- 0x00e3d2d7dbe096faULL, 0x00e4ac7b595cce4cULL,
- 0x0077bad449c0a494ULL, 0x00b7c98814afd5b3ULL,
- 0x0057226f58486cf9ULL, 0x00b1557154f0cc57ULL)},
- {FIELD_LITERAL(0x008cc9cd236315c0ULL, 0x0031d9c5b39fda54ULL,
- 0x00a5713ef37e1171ULL, 0x00293d5ae2886325ULL,
- 0x00c4aba3e05015e1ULL, 0x0003f35ef78e4fc6ULL,
- 0x0039d6bd3ac1527bULL, 0x0019d7c3afb77106ULL)},
- {FIELD_LITERAL(0x007b162931a985afULL, 0x00ad40a2e0daa713ULL,
- 0x006df27c4009f118ULL, 0x00503e9f4e2e8becULL,
- 0x00751a77c82c182dULL, 0x000298937769245bULL,
- 0x00ffb1e8fabf9ee5ULL, 0x0008334706e09abeULL)},
- }}, {{
- {FIELD_LITERAL(0x00dbca4e98a7dcd9ULL, 0x00ee29cfc78bde99ULL,
- 0x00e4a3b6995f52e9ULL, 0x0045d70189ae8096ULL,
- 0x00fd2a8a3b9b0d1bULL, 0x00af1793b107d8e1ULL,
- 0x00dbf92cbe4afa20ULL, 0x00da60f798e3681dULL)},
- {FIELD_LITERAL(0x004246bfcecc627aULL, 0x004ba431246c03a4ULL,
- 0x00bd1d101872d497ULL, 0x003b73d3f185ee16ULL,
- 0x001feb2e2678c0e3ULL, 0x00ff13c5a89dec76ULL,
- 0x00ed06042e771d8fULL, 0x00a4fd2a897a83ddULL)},
- {FIELD_LITERAL(0x009a4a3be50d6597ULL, 0x00de3165fc5a1096ULL,
- 0x004f3f56e345b0c7ULL, 0x00f7bf721d5ab8bcULL,
- 0x004313e47b098c50ULL, 0x00e4c7d5c0e1adbbULL,
- 0x002e3e3db365051eULL, 0x00a480c2cd6a96fbULL)},
- }}, {{
- {FIELD_LITERAL(0x00417fa30a7119edULL, 0x00af257758419751ULL,
- 0x00d358a487b463d4ULL, 0x0089703cc720b00dULL,
- 0x00ce56314ff7f271ULL, 0x0064db171ade62c1ULL,
- 0x00640b36d4a22fedULL, 0x00424eb88696d23fULL)},
- {FIELD_LITERAL(0x004ede34af2813f3ULL, 0x00d4a8e11c9e8216ULL,
- 0x004796d5041de8a5ULL, 0x00c4c6b4d21cc987ULL,
- 0x00e8a433ee07fa1eULL, 0x0055720b5abcc5a1ULL,
- 0x008873ea9c74b080ULL, 0x005b3fec1ab65d48ULL)},
- {FIELD_LITERAL(0x0047e5277db70ec5ULL, 0x000a096c66db7d6bULL,
- 0x00b4164cc1730159ULL, 0x004a9f783fe720feULL,
- 0x00a8177b94449dbcULL, 0x0095a24ff49a599fULL,
- 0x0069c1c578250cbcULL, 0x00452019213debf4ULL)},
- }}, {{
- {FIELD_LITERAL(0x0021ce99e09ebda3ULL, 0x00fcbd9f91875ad0ULL,
- 0x009bbf6b7b7a0b5fULL, 0x00388886a69b1940ULL,
- 0x00926a56d0f81f12ULL, 0x00e12903c3358d46ULL,
- 0x005dfce4e8e1ce9dULL, 0x0044cfa94e2f7e23ULL)},
- {FIELD_LITERAL(0x001bd59c09e982eaULL, 0x00f72daeb937b289ULL,
- 0x0018b76dca908e0eULL, 0x00edb498512384adULL,
- 0x00ce0243b6cc9538ULL, 0x00f96ff690cb4e70ULL,
- 0x007c77bf9f673c8dULL, 0x005bf704c088a528ULL)},
- {FIELD_LITERAL(0x0093d4628dcb33beULL, 0x0095263d51d42582ULL,
- 0x0049b3222458fe06ULL, 0x00e7fce73b653a7fULL,
- 0x003ca2ebce60b369ULL, 0x00c5de239a32bea4ULL,
- 0x0063b8b3d71fb6bfULL, 0x0039aeeb78a1a839ULL)},
- }}, {{
- {FIELD_LITERAL(0x007dc52da400336cULL, 0x001fded1e15b9457ULL,
- 0x00902e00f5568e3aULL, 0x00219bef40456d2dULL,
- 0x005684161fb3dbc9ULL, 0x004a4e9be49a76eaULL,
- 0x006e685ae88b78ffULL, 0x0021c42f13042d3cULL)},
- {FIELD_LITERAL(0x00fb22bb5fd3ce50ULL, 0x0017b48aada7ae54ULL,
- 0x00fd5c44ad19a536ULL, 0x000ccc4e4e55e45cULL,
- 0x00fd637d45b4c3f5ULL, 0x0038914e023c37cfULL,
- 0x00ac1881d6a8d898ULL, 0x00611ed8d3d943a8ULL)},
- {FIELD_LITERAL(0x0056e2259d113d2bULL, 0x00594819b284ec16ULL,
- 0x00c7bf794bb36696ULL, 0x00721ee75097cdc6ULL,
- 0x00f71be9047a2892ULL, 0x00df6ba142564edfULL,
- 0x0069580b7a184e8dULL, 0x00f056e38fca0feeULL)},
- }}, {{
- {FIELD_LITERAL(0x009df98566a18c6dULL, 0x00cf3a200968f219ULL,
- 0x0044ba60da6d9086ULL, 0x00dbc9c0e344da03ULL,
- 0x000f9401c4466855ULL, 0x00d46a57c5b0a8d1ULL,
- 0x00875a635d7ac7c6ULL, 0x00ef4a933b7e0ae6ULL)},
- {FIELD_LITERAL(0x005e8694077a1535ULL, 0x008bef75f71c8f1dULL,
- 0x000a7c1316423511ULL, 0x00906e1d70604320ULL,
- 0x003fc46c1a2ffbd6ULL, 0x00d1d5022e68f360ULL,
- 0x002515fba37bbf46ULL, 0x00ca16234e023b44ULL)},
- {FIELD_LITERAL(0x00787c99561f4690ULL, 0x00a857a8c1561f27ULL,
- 0x00a10df9223c09feULL, 0x00b98a9562e3b154ULL,
- 0x004330b8744c3ed2ULL, 0x00e06812807ec5c4ULL,
- 0x00e4cf6a7db9f1e3ULL, 0x00d95b089f132a34ULL)},
- }}, {{
- {FIELD_LITERAL(0x002922b39ca33eecULL, 0x0090d12a5f3ab194ULL,
- 0x00ab60c02fb5f8edULL, 0x00188d292abba1cfULL,
- 0x00e10edec9698f6eULL, 0x0069a4d9934133c8ULL,
- 0x0024aac40e6d3d06ULL, 0x001702c2177661b0ULL)},
- {FIELD_LITERAL(0x00139078397030bdULL, 0x000e3c447e859a00ULL,
- 0x0064a5b334c82393ULL, 0x00b8aabeb7358093ULL,
- 0x00020778bb9ae73bULL, 0x0032ee94c7892a18ULL,
- 0x008215253cb41bdaULL, 0x005e2797593517aeULL)},
- {FIELD_LITERAL(0x0083765a5f855d4aULL, 0x0051b6d1351b8ee2ULL,
- 0x00116de548b0f7bbULL, 0x0087bd88703affa0ULL,
- 0x0095b2cc34d7fdd2ULL, 0x0084cd81b53f0bc8ULL,
- 0x008562fc995350edULL, 0x00a39abb193651e3ULL)},
- }}, {{
- {FIELD_LITERAL(0x0019e23f0474b114ULL, 0x00eb94c2ad3b437eULL,
- 0x006ddb34683b75acULL, 0x00391f9209b564c6ULL,
- 0x00083b3bb3bff7aaULL, 0x00eedcd0f6dceefcULL,
- 0x00b50817f794fe01ULL, 0x0036474deaaa75c9ULL)},
- {FIELD_LITERAL(0x0091868594265aa2ULL, 0x00797accae98ca6dULL,
- 0x0008d8c5f0f8a184ULL, 0x00d1f4f1c2b2fe6eULL,
- 0x0036783dfb48a006ULL, 0x008c165120503527ULL,
- 0x0025fd780058ce9bULL, 0x0068beb007be7d27ULL)},
- {FIELD_LITERAL(0x00d0ff88aa7c90c2ULL, 0x00b2c60dacf53394ULL,
- 0x0094a7284d9666d6ULL, 0x00bed9022ce7a19dULL,
- 0x00c51553f0cd7682ULL, 0x00c3fb870b124992ULL,
- 0x008d0bc539956c9bULL, 0x00fc8cf258bb8885ULL)},
- }}, {{
- {FIELD_LITERAL(0x003667bf998406f8ULL, 0x0000115c43a12975ULL,
- 0x001e662f3b20e8fdULL, 0x0019ffa534cb24ebULL,
- 0x00016be0dc8efb45ULL, 0x00ff76a8b26243f5ULL,
- 0x00ae20d241a541e3ULL, 0x0069bd6af13cd430ULL)},
- {FIELD_LITERAL(0x0045fdc16487cda3ULL, 0x00b2d8e844cf2ed7ULL,
- 0x00612c50e88c1607ULL, 0x00a08aabc66c1672ULL,
- 0x006031fdcbb24d97ULL, 0x001b639525744b93ULL,
- 0x004409d62639ab17ULL, 0x00a1853d0347ab1dULL)},
- {FIELD_LITERAL(0x0075a1a56ebf5c21ULL, 0x00a3e72be9ac53edULL,
- 0x00efcde1629170c2ULL, 0x0004225fe91ef535ULL,
- 0x0088049fc73dfda7ULL, 0x004abc74857e1288ULL,
- 0x0024e2434657317cULL, 0x00d98cb3d3e5543cULL)},
- }}, {{
- {FIELD_LITERAL(0x00b4b53eab6bdb19ULL, 0x009b22d8b43711d0ULL,
- 0x00d948b9d961785dULL, 0x00cb167b6f279eadULL,
- 0x00191de3a678e1c9ULL, 0x00d9dd9511095c2eULL,
- 0x00f284324cd43067ULL, 0x00ed74fa535151ddULL)},
- {FIELD_LITERAL(0x007e32c049b5c477ULL, 0x009d2bfdbd9bcfd8ULL,
- 0x00636e93045938c6ULL, 0x007fde4af7687298ULL,
- 0x0046a5184fafa5d3ULL, 0x0079b1e7f13a359bULL,
- 0x00875adf1fb927d6ULL, 0x00333e21c61bcad2ULL)},
- {FIELD_LITERAL(0x00048014f73d8b8dULL, 0x0075684aa0966388ULL,
- 0x0092be7df06dc47cULL, 0x0097cebcd0f5568aULL,
- 0x005a7004d9c4c6a9ULL, 0x00b0ecbb659924c7ULL,
- 0x00d90332dd492a7cULL, 0x0057fc14df11493dULL)},
- }}, {{
- {FIELD_LITERAL(0x0008ed8ea0ad95beULL, 0x0041d324b9709645ULL,
- 0x00e25412257a19b4ULL, 0x0058df9f3423d8d2ULL,
- 0x00a9ab20def71304ULL, 0x009ae0dbf8ac4a81ULL,
- 0x00c9565977e4392aULL, 0x003c9269444baf55ULL)},
- {FIELD_LITERAL(0x007df6cbb926830bULL, 0x00d336058ae37865ULL,
- 0x007af47dac696423ULL, 0x0048d3011ec64ac8ULL,
- 0x006b87666e40049fULL, 0x0036a2e0e51303d7ULL,
- 0x00ba319bd79dbc55ULL, 0x003e2737ecc94f53ULL)},
- {FIELD_LITERAL(0x00d296ff726272d9ULL, 0x00f6d097928fcf57ULL,
- 0x00e0e616a55d7013ULL, 0x00deaf454ed9eac7ULL,
- 0x0073a56bedef4d92ULL, 0x006ccfdf6fc92e19ULL,
- 0x009d1ee1371a7218ULL, 0x00ee3c2ee4462d80ULL)},
- }}, {{
- {FIELD_LITERAL(0x00437bce9bccdf9dULL, 0x00e0c8e2f85dc0a3ULL,
- 0x00c91a7073995a19ULL, 0x00856ec9fe294559ULL,
- 0x009e4b33394b156eULL, 0x00e245b0dc497e5cULL,
- 0x006a54e687eeaeffULL, 0x00f1cd1cd00fdb7cULL)},
- {FIELD_LITERAL(0x008132ae5c5d8cd1ULL, 0x00121d68324a1d9fULL,
- 0x00d6be9dafcb8c76ULL, 0x00684d9070edf745ULL,
- 0x00519fbc96d7448eULL, 0x00388182fdc1f27eULL,
- 0x000235baed41f158ULL, 0x00bf6cf6f1a1796aULL)},
- {FIELD_LITERAL(0x002adc4b4d148219ULL, 0x003084ada0d3a90aULL,
- 0x0046de8aab0f2e4eULL, 0x00452d342a67b5fdULL,
- 0x00d4b50f01d4de21ULL, 0x00db6d9fc0cefb79ULL,
- 0x008c184c86a462cdULL, 0x00e17c83764d42daULL)},
- }}, {{
- {FIELD_LITERAL(0x007b2743b9a1e01aULL, 0x007847ffd42688c4ULL,
- 0x006c7844d610a316ULL, 0x00f0cb8b250aa4b0ULL,
- 0x00a19060143b3ae6ULL, 0x0014eb10b77cfd80ULL,
- 0x000170905729dd06ULL, 0x00063b5b9cd72477ULL)},
- {FIELD_LITERAL(0x00ce382dc7993d92ULL, 0x00021153e938b4c8ULL,
- 0x00096f7567f48f51ULL, 0x0058f81ddfe4b0d5ULL,
- 0x00cc379a56b355c7ULL, 0x002c760770d3e819ULL,
- 0x00ee22d1d26e5a40ULL, 0x00de6d93d5b082d7ULL)},
- {FIELD_LITERAL(0x000a91a42c52e056ULL, 0x00185f6b77fce7eaULL,
- 0x000803c51962f6b5ULL, 0x0022528582ba563dULL,
- 0x0043f8040e9856d6ULL, 0x0085a29ec81fb860ULL,
- 0x005f9a611549f5ffULL, 0x00c1f974ecbd4b06ULL)},
- }}, {{
- {FIELD_LITERAL(0x005b64c6fd65ec97ULL, 0x00c1fdd7f877bc7fULL,
- 0x000d9cc6c89f841cULL, 0x005c97b7f1aff9adULL,
- 0x0075e3c61475d47eULL, 0x001ecb1ba8153011ULL,
- 0x00fe7f1c8d71d40dULL, 0x003fa9757a229832ULL)},
- {FIELD_LITERAL(0x00ffc5c89d2b0cbaULL, 0x00d363d42e3e6fc3ULL,
- 0x0019a1a0118e2e8aULL, 0x00f7baeff48882e1ULL,
- 0x001bd5af28c6b514ULL, 0x0055476ca2253cb2ULL,
- 0x00d8eb1977e2ddf3ULL, 0x00b173b1adb228a1ULL)},
- {FIELD_LITERAL(0x00f2cb99dd0ad707ULL, 0x00e1e08b6859ddd8ULL,
- 0x000008f2d0650bccULL, 0x00d7ed392f8615c3ULL,
- 0x00976750a94da27fULL, 0x003e83bb0ecb69baULL,
- 0x00df8e8d15c14ac6ULL, 0x00f9f7174295d9c2ULL)},
- }}, {{
- {FIELD_LITERAL(0x00f11cc8e0e70bcbULL, 0x00e5dc689974e7ddULL,
- 0x0014e409f9ee5870ULL, 0x00826e6689acbd63ULL,
- 0x008a6f4e3d895d88ULL, 0x00b26a8da41fd4adULL,
- 0x000fb7723f83efd7ULL, 0x009c749db0a5f6c3ULL)},
- {FIELD_LITERAL(0x002389319450f9baULL, 0x003677f31aa1250aULL,
- 0x0092c3db642f38cbULL, 0x00f8b64c0dfc9773ULL,
- 0x00cd49fe3505b795ULL, 0x0068105a4090a510ULL,
- 0x00df0ba2072a8bb6ULL, 0x00eb396143afd8beULL)},
- {FIELD_LITERAL(0x00a0d4ecfb24cdffULL, 0x00ddaf8008ba6479ULL,
- 0x00f0b3e36d4b0f44ULL, 0x003734bd3af1f146ULL,
- 0x00b87e2efc75527eULL, 0x00d230df55ddab50ULL,
- 0x002613257ae56c1dULL, 0x00bc0946d135934dULL)},
- }}, {{
- {FIELD_LITERAL(0x00468711bd994651ULL, 0x0033108fa67561bfULL,
- 0x0089d760192a54b4ULL, 0x00adc433de9f1871ULL,
- 0x000467d05f36e050ULL, 0x007847e0f0579f7fULL,
- 0x00a2314ad320052dULL, 0x00b3a93649f0b243ULL)},
- {FIELD_LITERAL(0x0067f8f0c4fe26c9ULL, 0x0079c4a3cc8f67b9ULL,
- 0x0082b1e62f23550dULL, 0x00f2d409caefd7f5ULL,
- 0x0080e67dcdb26e81ULL, 0x0087ae993ea1f98aULL,
- 0x00aa108becf61d03ULL, 0x001acf11efb608a3ULL)},
- {FIELD_LITERAL(0x008225febbab50d9ULL, 0x00f3b605e4dd2083ULL,
- 0x00a32b28189e23d2ULL, 0x00d507e5e5eb4c97ULL,
- 0x005a1a84e302821fULL, 0x0006f54c1c5f08c7ULL,
- 0x00a347c8cb2843f0ULL, 0x0009f73e9544bfa5ULL)},
- }}, {{
- {FIELD_LITERAL(0x006c59c9ae744185ULL, 0x009fc32f1b4282cdULL,
- 0x004d6348ca59b1acULL, 0x00105376881be067ULL,
- 0x00af4096013147dcULL, 0x004abfb5a5cb3124ULL,
- 0x000d2a7f8626c354ULL, 0x009c6ed568e07431ULL)},
- {FIELD_LITERAL(0x00e828333c297f8bULL, 0x009ef3cf8c3f7e1fULL,
- 0x00ab45f8fff31cb9ULL, 0x00c8b4178cb0b013ULL,
- 0x00d0c50dd3260a3fULL, 0x0097126ac257f5bcULL,
- 0x0042376cc90c705aULL, 0x001d96fdb4a1071eULL)},
- {FIELD_LITERAL(0x00542d44d89ee1a8ULL, 0x00306642e0442d98ULL,
- 0x0090853872b87338ULL, 0x002362cbf22dc044ULL,
- 0x002c222adff663b8ULL, 0x0067c924495fcb79ULL,
- 0x000e621d983c977cULL, 0x00df77a9eccb66fbULL)},
- }}, {{
- {FIELD_LITERAL(0x002809e4bbf1814aULL, 0x00b9e854f9fafb32ULL,
- 0x00d35e67c10f7a67ULL, 0x008f1bcb76e748cfULL,
- 0x004224d9515687d2ULL, 0x005ba0b774e620c4ULL,
- 0x00b5e57db5d54119ULL, 0x00e15babe5683282ULL)},
- {FIELD_LITERAL(0x00832d02369b482cULL, 0x00cba52ff0d93450ULL,
- 0x003fa9c908d554dbULL, 0x008d1e357b54122fULL,
- 0x00abd91c2dc950c6ULL, 0x007eff1df4c0ec69ULL,
- 0x003f6aeb13fb2d31ULL, 0x00002d6179fc5b2cULL)},
- {FIELD_LITERAL(0x0046c9eda81c9c89ULL, 0x00b60cb71c8f62fcULL,
- 0x0022f5a683baa558ULL, 0x00f87319fccdf997ULL,
- 0x009ca09b51ce6a22ULL, 0x005b12baf4af7d77ULL,
- 0x008a46524a1e33e2ULL, 0x00035a77e988be0dULL)},
- }}, {{
- {FIELD_LITERAL(0x00a7efe46a7dbe2fULL, 0x002f66fd55014fe7ULL,
- 0x006a428afa1ff026ULL, 0x0056caaa9604ab72ULL,
- 0x0033f3bcd7fac8aeULL, 0x00ccb1aa01c86764ULL,
- 0x00158d1edf13bf40ULL, 0x009848ee76fcf3b4ULL)},
- {FIELD_LITERAL(0x00a9e7730a819691ULL, 0x00d9cc73c4992b70ULL,
- 0x00e299bde067de5aULL, 0x008c314eb705192aULL,
- 0x00e7226f17e8a3ccULL, 0x0029dfd956e65a47ULL,
- 0x0053a8e839073b12ULL, 0x006f942b2ab1597eULL)},
- {FIELD_LITERAL(0x001c3d780ecd5e39ULL, 0x0094f247fbdcc5feULL,
- 0x00d5c786fd527764ULL, 0x00b6f4da74f0db2aULL,
- 0x0080f1f8badcd5fcULL, 0x00f36a373ad2e23bULL,
- 0x00f804f9f4343bf2ULL, 0x00d1af40ec623982ULL)},
- }}, {{
- {FIELD_LITERAL(0x0082aeace5f1b144ULL, 0x00f68b3108cf4dd3ULL,
- 0x00634af01dde3020ULL, 0x000beab5df5c2355ULL,
- 0x00e8b790d1b49b0bULL, 0x00e48d15854e36f4ULL,
- 0x0040ab2d95f3db9fULL, 0x002711c4ed9e899aULL)},
- {FIELD_LITERAL(0x0039343746531ebeULL, 0x00c8509d835d429dULL,
- 0x00e79eceff6b0018ULL, 0x004abfd31e8efce5ULL,
- 0x007bbfaaa1e20210ULL, 0x00e3be89c193e179ULL,
- 0x001c420f4c31d585ULL, 0x00f414a315bef5aeULL)},
- {FIELD_LITERAL(0x007c296a24990df8ULL, 0x00d5d07525a75588ULL,
- 0x00dd8e113e94b7e7ULL, 0x007bbc58febe0cc8ULL,
- 0x0029f51af9bfcad3ULL, 0x007e9311ec7ab6f3ULL,
- 0x009a884de1676343ULL, 0x0050d5f2dce84be9ULL)},
- }}, {{
- {FIELD_LITERAL(0x005fa020cca2450aULL, 0x00491c29db6416d8ULL,
- 0x0037cefe3f9f9a85ULL, 0x003d405230647066ULL,
- 0x0049e835f0fdbe89ULL, 0x00feb78ac1a0815cULL,
- 0x00828e4b32dc9724ULL, 0x00db84f2dc8d6fd4ULL)},
- {FIELD_LITERAL(0x0098cddc8b39549aULL, 0x006da37e3b05d22cULL,
- 0x00ce633cfd4eb3cbULL, 0x00fda288ef526acdULL,
- 0x0025338878c5d30aULL, 0x00f34438c4e5a1b4ULL,
- 0x00584efea7c310f1ULL, 0x0041a551f1b660adULL)},
- {FIELD_LITERAL(0x00d7f7a8fbd6437aULL, 0x0062872413bf3753ULL,
- 0x00ad4bbcb43c584bULL, 0x007fe49be601d7e3ULL,
- 0x0077c659789babf4ULL, 0x00eb45fcb06a741bULL,
- 0x005ce244913f9708ULL, 0x0088426401736326ULL)},
- }}, {{
- {FIELD_LITERAL(0x007bf562ca768d7cULL, 0x006c1f3a174e387cULL,
- 0x00f024b447fee939ULL, 0x007e7af75f01143fULL,
- 0x003adb70b4eed89dULL, 0x00e43544021ad79aULL,
- 0x0091f7f7042011f6ULL, 0x0093c1a1ee3a0ddcULL)},
- {FIELD_LITERAL(0x00a0b68ec1eb72d2ULL, 0x002c03235c0d45a0ULL,
- 0x00553627323fe8c5ULL, 0x006186e94b17af94ULL,
- 0x00a9906196e29f14ULL, 0x0025b3aee6567733ULL,
- 0x007e0dd840080517ULL, 0x0018eb5801a4ba93ULL)},
- {FIELD_LITERAL(0x00d7fe7017bf6a40ULL, 0x006e3f0624be0c42ULL,
- 0x00ffbba205358245ULL, 0x00f9fc2cf8194239ULL,
- 0x008d93b37bf15b4eULL, 0x006ddf2e38be8e95ULL,
- 0x002b6e79bf5fcff9ULL, 0x00ab355da425e2deULL)},
- }}, {{
- {FIELD_LITERAL(0x00938f97e20be973ULL, 0x0099141a36aaf306ULL,
- 0x0057b0ca29e545a1ULL, 0x0085db571f9fbc13ULL,
- 0x008b333c554b4693ULL, 0x0043ab6ef3e241cbULL,
- 0x0054fb20aa1e5c70ULL, 0x00be0ff852760adfULL)},
- {FIELD_LITERAL(0x003973d8938971d6ULL, 0x002aca26fa80c1f5ULL,
- 0x00108af1faa6b513ULL, 0x00daae275d7924e6ULL,
- 0x0053634ced721308ULL, 0x00d2355fe0bbd443ULL,
- 0x00357612b2d22095ULL, 0x00f9bb9dd4136cf3ULL)},
- {FIELD_LITERAL(0x002bff12cf5e03a5ULL, 0x001bdb1fa8a19cf8ULL,
- 0x00c91c6793f84d39ULL, 0x00f869f1b2eba9afULL,
- 0x0059bc547dc3236bULL, 0x00d91611d6d38689ULL,
- 0x00e062daaa2c0214ULL, 0x00ed3c047cc2bc82ULL)},
- }}, {{
- {FIELD_LITERAL(0x000050d70c32b31aULL, 0x001939d576d437b3ULL,
- 0x00d709e598bf9fe6ULL, 0x00a885b34bd2ee9eULL,
- 0x00dd4b5c08ab1a50ULL, 0x0091bebd50b55639ULL,
- 0x00cf79ff64acdbc6ULL, 0x006067a39d826336ULL)},
- {FIELD_LITERAL(0x0062dd0fb31be374ULL, 0x00fcc96b84c8e727ULL,
- 0x003f64f1375e6ae3ULL, 0x0057d9b6dd1af004ULL,
- 0x00d6a167b1103c7bULL, 0x00dd28f3180fb537ULL,
- 0x004ff27ad7167128ULL, 0x008934c33461f2acULL)},
- {FIELD_LITERAL(0x0065b472b7900043ULL, 0x00ba7efd2ff1064bULL,
- 0x000b67d6c4c3020fULL, 0x0012d28469f4e46dULL,
- 0x0031c32939703ec7ULL, 0x00b49f0bce133066ULL,
- 0x00f7e10416181d47ULL, 0x005c90f51867eeccULL)},
- }}, {{
- {FIELD_LITERAL(0x0051207abd179101ULL, 0x00fc2a5c20d9c5daULL,
- 0x00fb9d5f2701b6dfULL, 0x002dd040fdea82b8ULL,
- 0x00f163b0738442ffULL, 0x00d9736bd68855b8ULL,
- 0x00e0d8e93005e61cULL, 0x00df5a40b3988570ULL)},
- {FIELD_LITERAL(0x0006918f5dfce6dcULL, 0x00d4bf1c793c57fbULL,
- 0x0069a3f649435364ULL, 0x00e89a50e5b0cd6eULL,
- 0x00b9f6a237e973afULL, 0x006d4ed8b104e41dULL,
- 0x00498946a3924cd2ULL, 0x00c136ec5ac9d4f7ULL)},
- {FIELD_LITERAL(0x0011a9c290ac5336ULL, 0x002b9a2d4a6a6533ULL,
- 0x009a8a68c445d937ULL, 0x00361b27b07e5e5cULL,
- 0x003c043b1755b974ULL, 0x00b7eb66cf1155eeULL,
- 0x0077af5909eefff2ULL, 0x0098f609877cc806ULL)},
- }}, {{
- {FIELD_LITERAL(0x00ab13af436bf8f4ULL, 0x000bcf0a0dac8574ULL,
- 0x00d50c864f705045ULL, 0x00c40e611debc842ULL,
- 0x0085010489bd5caaULL, 0x007c5050acec026fULL,
- 0x00f67d943c8da6d1ULL, 0x00de1da0278074c6ULL)},
- {FIELD_LITERAL(0x00b373076597455fULL, 0x00e83f1af53ac0f5ULL,
- 0x0041f63c01dc6840ULL, 0x0097dea19b0c6f4bULL,
- 0x007f9d63b4c1572cULL, 0x00e692d492d0f5f0ULL,
- 0x00cbcb392e83b4adULL, 0x0069c0f39ed9b1a8ULL)},
- {FIELD_LITERAL(0x00861030012707c9ULL, 0x009fbbdc7fd4aafbULL,
- 0x008f591d6b554822ULL, 0x00df08a41ea18adeULL,
- 0x009d7d83e642abeaULL, 0x0098c71bda3b78ffULL,
- 0x0022c89e7021f005ULL, 0x0044d29a3fe1e3c4ULL)},
- }}, {{
- {FIELD_LITERAL(0x00e748cd7b5c52f2ULL, 0x00ea9df883f89cc3ULL,
- 0x0018970df156b6c7ULL, 0x00c5a46c2a33a847ULL,
- 0x00cbde395e32aa09ULL, 0x0072474ebb423140ULL,
- 0x00fb00053086a23dULL, 0x001dafcfe22d4e1fULL)},
- {FIELD_LITERAL(0x00c903ee6d825540ULL, 0x00add6c4cf98473eULL,
- 0x007636efed4227f1ULL, 0x00905124ae55e772ULL,
- 0x00e6b38fab12ed53ULL, 0x0045e132b863fe55ULL,
- 0x003974662edb366aULL, 0x00b1787052be8208ULL)},
- {FIELD_LITERAL(0x00a614b00d775c7cULL, 0x00d7c78941cc7754ULL,
- 0x00422dd68b5dabc4ULL, 0x00a6110f0167d28bULL,
- 0x00685a309c252886ULL, 0x00b439ffd5143660ULL,
- 0x003656e29ee7396fULL, 0x00c7c9b9ed5ad854ULL)},
- }}, {{
- {FIELD_LITERAL(0x0040f7e7c5b37bf2ULL, 0x0064e4dc81181bbaULL,
- 0x00a8767ae2a366b6ULL, 0x001496b4f90546f2ULL,
- 0x002a28493f860441ULL, 0x0021f59513049a3aULL,
- 0x00852d369a8b7ee3ULL, 0x00dd2e7d8b7d30a9ULL)},
- {FIELD_LITERAL(0x00006e34a35d9fbcULL, 0x00eee4e48b2f019aULL,
- 0x006b344743003a5fULL, 0x00541d514f04a7e3ULL,
- 0x00e81f9ee7647455ULL, 0x005e2b916c438f81ULL,
- 0x00116f8137b7eff0ULL, 0x009bd3decc7039d1ULL)},
- {FIELD_LITERAL(0x0005d226f434110dULL, 0x00af8288b8ef21d5ULL,
- 0x004a7a52ef181c8cULL, 0x00be0b781b4b06deULL,
- 0x00e6e3627ded07e1ULL, 0x00e43aa342272b8bULL,
- 0x00e86ab424577d84ULL, 0x00fb292c566e35bbULL)},
- }}, {{
- {FIELD_LITERAL(0x00334f5303ea1222ULL, 0x00dfb3dbeb0a5d3eULL,
- 0x002940d9592335c1ULL, 0x00706a7a63e8938aULL,
- 0x005a533558bc4cafULL, 0x00558e33192022a9ULL,
- 0x00970d9faf74c133ULL, 0x002979fcb63493caULL)},
- {FIELD_LITERAL(0x00e38abece3c82abULL, 0x005a51f18a2c7a86ULL,
- 0x009dafa2e86d592eULL, 0x00495a62eb688678ULL,
- 0x00b79df74c0eb212ULL, 0x0023e8cc78b75982ULL,
- 0x005998cb91075e13ULL, 0x00735aa9ba61bc76ULL)},
- {FIELD_LITERAL(0x00d9f7a82ddbe628ULL, 0x00a1fc782889ae0fULL,
- 0x0071ffda12d14b66ULL, 0x0037cf4eca7fb3d5ULL,
- 0x00c80bc242c58808ULL, 0x0075bf8c2d08c863ULL,
- 0x008d41f31afc52a7ULL, 0x00197962ecf38741ULL)},
- }}, {{
- {FIELD_LITERAL(0x006e9f475cccf2eeULL, 0x00454b9cd506430cULL,
- 0x00224a4fb79ee479ULL, 0x0062e3347ef0b5e2ULL,
- 0x0034fd2a3512232aULL, 0x00b8b3cb0f457046ULL,
- 0x00eb20165daa38ecULL, 0x00128eebc2d9c0f7ULL)},
- {FIELD_LITERAL(0x00bfc5fa1e4ea21fULL, 0x00c21d7b6bb892e6ULL,
- 0x00cf043f3acf0291ULL, 0x00c13f2f849b3c90ULL,
- 0x00d1a97ebef10891ULL, 0x0061e130a445e7feULL,
- 0x0019513fdedbf22bULL, 0x001d60c813bff841ULL)},
- {FIELD_LITERAL(0x0019561c7fcf0213ULL, 0x00e3dca6843ebd77ULL,
- 0x0068ea95b9ca920eULL, 0x009bdfb70f253595ULL,
- 0x00c68f59186aa02aULL, 0x005aee1cca1c3039ULL,
- 0x00ab79a8a937a1ceULL, 0x00b9a0e549959e6fULL)},
- }}, {{
- {FIELD_LITERAL(0x00c79e0b6d97dfbdULL, 0x00917c71fd2bc6e8ULL,
- 0x00db7529ccfb63d8ULL, 0x00be5be957f17866ULL,
- 0x00a9e11fdc2cdac1ULL, 0x007b91a8e1f44443ULL,
- 0x00a3065e4057d80fULL, 0x004825f5b8d5f6d4ULL)},
- {FIELD_LITERAL(0x003e4964fa8a8fc8ULL, 0x00f6a1cdbcf41689ULL,
- 0x00943cb18fe7fda7ULL, 0x00606dafbf34440aULL,
- 0x005d37a86399c789ULL, 0x00e79a2a69417403ULL,
- 0x00fe34f7e68b8866ULL, 0x0011f448ed2df10eULL)},
- {FIELD_LITERAL(0x00f1f57efcc1fcc4ULL, 0x00513679117de154ULL,
- 0x002e5b5b7c86d8c3ULL, 0x009f6486561f9cfbULL,
- 0x00169e74b0170cf7ULL, 0x00900205af4af696ULL,
- 0x006acfddb77853f3ULL, 0x00df184c90f31068ULL)},
- }}, {{
- {FIELD_LITERAL(0x00b37396c3320791ULL, 0x00fc7b67175c5783ULL,
- 0x00c36d2cd73ecc38ULL, 0x0080ebcc0b328fc5ULL,
- 0x0043a5b22b35d35dULL, 0x00466c9f1713c9daULL,
- 0x0026ad346dcaa8daULL, 0x007c684e701183a6ULL)},
- {FIELD_LITERAL(0x00fd579ffb691713ULL, 0x00b76af4f81c412dULL,
- 0x00f239de96110f82ULL, 0x00e965fb437f0306ULL,
- 0x00ca7e9436900921ULL, 0x00e487f1325fa24aULL,
- 0x00633907de476380ULL, 0x00721c62ac5b8ea0ULL)},
- {FIELD_LITERAL(0x00c0d54e542eb4f9ULL, 0x004ed657171c8dcfULL,
- 0x00b743a4f7c2a39bULL, 0x00fd9f93ed6cc567ULL,
- 0x00307fae3113e58bULL, 0x0058aa577c93c319ULL,
- 0x00d254556f35b346ULL, 0x00491aada2203f0dULL)},
- }}, {{
- {FIELD_LITERAL(0x00dff3103786ff34ULL, 0x000144553b1f20c3ULL,
- 0x0095613baeb930e4ULL, 0x00098058275ea5d4ULL,
- 0x007cd1402b046756ULL, 0x0074d74e4d58aee3ULL,
- 0x005f93fc343ff69bULL, 0x00873df17296b3b0ULL)},
- {FIELD_LITERAL(0x00c4a1fb48635413ULL, 0x00b5dd54423ad59fULL,
- 0x009ff5d53fd24a88ULL, 0x003c98d267fc06a7ULL,
- 0x002db7cb20013641ULL, 0x00bd1d6716e191f2ULL,
- 0x006dbc8b29094241ULL, 0x0044bbf233dafa2cULL)},
- {FIELD_LITERAL(0x0055838d41f531e6ULL, 0x00bf6a2dd03c81b2ULL,
- 0x005827a061c4839eULL, 0x0000de2cbb36aac3ULL,
- 0x002efa29d9717478ULL, 0x00f9e928cc8a77baULL,
- 0x00c134b458def9efULL, 0x00958a182223fc48ULL)},
- }}, {{
- {FIELD_LITERAL(0x000a9ee23c06881fULL, 0x002c727d3d871945ULL,
- 0x00f47d971512d24aULL, 0x00671e816f9ef31aULL,
- 0x00883af2cfaad673ULL, 0x00601f98583d6c9aULL,
- 0x00b435f5adc79655ULL, 0x00ad87b71c04bff2ULL)},
- {FIELD_LITERAL(0x007860d99db787cfULL, 0x00fda8983018f4a8ULL,
- 0x008c8866bac4743cULL, 0x00ef471f84c82a3fULL,
- 0x00abea5976d3b8e7ULL, 0x00714882896cd015ULL,
- 0x00b49fae584ddac5ULL, 0x008e33a1a0b69c81ULL)},
- {FIELD_LITERAL(0x007b6ee2c9e8a9ecULL, 0x002455dbbd89d622ULL,
- 0x006490cf4eaab038ULL, 0x00d925f6c3081561ULL,
- 0x00153b3047de7382ULL, 0x003b421f8bdceb6fULL,
- 0x00761a4a5049da78ULL, 0x00980348c5202433ULL)},
- }}, {{
- {FIELD_LITERAL(0x007f8a43da97dd5cULL, 0x00058539c800fc7bULL,
- 0x0040f3cf5a28414aULL, 0x00d68dd0d95283d6ULL,
- 0x004adce9da90146eULL, 0x00befa41c7d4f908ULL,
- 0x007603bc2e3c3060ULL, 0x00bdf360ab3545dbULL)},
- {FIELD_LITERAL(0x00eebfd4e2312cc3ULL, 0x00474b2564e4fc8cULL,
- 0x003303ef14b1da9bULL, 0x003c93e0e66beb1dULL,
- 0x0013619b0566925aULL, 0x008817c24d901bf3ULL,
- 0x00b62bd8898d218bULL, 0x0075a7716f1e88a2ULL)},
- {FIELD_LITERAL(0x0009218da1e6890fULL, 0x0026907f5fd02575ULL,
- 0x004dabed5f19d605ULL, 0x003abf181870249dULL,
- 0x00b52fd048cc92c4ULL, 0x00b6dd51e415a5c5ULL,
- 0x00d9eb82bd2b4014ULL, 0x002c865a43b46b43ULL)},
- }}, {{
- {FIELD_LITERAL(0x0070047189452f4cULL, 0x00f7ad12e1ce78d5ULL,
- 0x00af1ba51ec44a8bULL, 0x005f39f63e667cd6ULL,
- 0x00058eac4648425eULL, 0x00d7fdab42bea03bULL,
- 0x0028576a5688de15ULL, 0x00af973209e77c10ULL)},
- {FIELD_LITERAL(0x00c338b915d8fef0ULL, 0x00a893292045c39aULL,
- 0x0028ab4f2eba6887ULL, 0x0060743cb519fd61ULL,
- 0x0006213964093ac0ULL, 0x007c0b7a43f6266dULL,
- 0x008e3557c4fa5bdaULL, 0x002da976de7b8d9dULL)},
- {FIELD_LITERAL(0x0048729f8a8b6dcdULL, 0x00fe23b85cc4d323ULL,
- 0x00e7384d16e4db0eULL, 0x004a423970678942ULL,
- 0x00ec0b763345d4baULL, 0x00c477b9f99ed721ULL,
- 0x00c29dad3777b230ULL, 0x001c517b466f7df6ULL)},
- }}, {{
- {FIELD_LITERAL(0x006366c380f7b574ULL, 0x001c7d1f09ff0438ULL,
- 0x003e20a7301f5b22ULL, 0x00d3efb1916d28f6ULL,
- 0x0049f4f81060ce83ULL, 0x00c69d91ea43ced1ULL,
- 0x002b6f3e5cd269edULL, 0x005b0fb22ce9ec65ULL)},
- {FIELD_LITERAL(0x00aa2261022d883fULL, 0x00ebcca4548010acULL,
- 0x002528512e28a437ULL, 0x0070ca7676b66082ULL,
- 0x0084bda170f7c6d3ULL, 0x00581b4747c9b8bbULL,
- 0x005c96a01061c7e2ULL, 0x00fb7c4a362b5273ULL)},
- {FIELD_LITERAL(0x00c30020eb512d02ULL, 0x0060f288283a4d26ULL,
- 0x00b7ed13becde260ULL, 0x0075ebb74220f6e9ULL,
- 0x00701079fcfe8a1fULL, 0x001c28fcdff58938ULL,
- 0x002e4544b8f4df6bULL, 0x0060c5bc4f1a7d73ULL)},
- }}, {{
- {FIELD_LITERAL(0x00ae307cf069f701ULL, 0x005859f222dd618bULL,
- 0x00212d6c46ec0b0dULL, 0x00a0fe4642afb62dULL,
- 0x00420d8e4a0a8903ULL, 0x00a80ff639bdf7b0ULL,
- 0x0019bee1490b5d8eULL, 0x007439e4b9c27a86ULL)},
- {FIELD_LITERAL(0x00a94700032a093fULL, 0x0076e96c225216e7ULL,
- 0x00a63a4316e45f91ULL, 0x007d8bbb4645d3b2ULL,
- 0x00340a6ff22793ebULL, 0x006f935d4572aeb7ULL,
- 0x00b1fb69f00afa28ULL, 0x009e8f3423161ed3ULL)},
- {FIELD_LITERAL(0x009ef49c6b5ced17ULL, 0x00a555e6269e9f0aULL,
- 0x007e6f1d79ec73b5ULL, 0x009ac78695a32ac4ULL,
- 0x0001d77fbbcd5682ULL, 0x008cea1fee0aaeedULL,
- 0x00f42bea82a53462ULL, 0x002e46ab96cafcc9ULL)},
- }}, {{
- {FIELD_LITERAL(0x0051cfcc5885377aULL, 0x00dce566cb1803caULL,
- 0x00430c7643f2c7d4ULL, 0x00dce1a1337bdcc0ULL,
- 0x0010d5bd7283c128ULL, 0x003b1b547f9b46feULL,
- 0x000f245e37e770abULL, 0x007b72511f022b37ULL)},
- {FIELD_LITERAL(0x0060db815bc4786cULL, 0x006fab25beedc434ULL,
- 0x00c610d06084797cULL, 0x000c48f08537bec0ULL,
- 0x0031aba51c5b93daULL, 0x007968fa6e01f347ULL,
- 0x0030070da52840c6ULL, 0x00c043c225a4837fULL)},
- {FIELD_LITERAL(0x001bcfd00649ee93ULL, 0x006dceb47e2a0fd5ULL,
- 0x00f2cebda0cf8fd0ULL, 0x00b6b9d9d1fbdec3ULL,
- 0x00815262e6490611ULL, 0x00ef7f5ce3176760ULL,
- 0x00e49cd0c998d58bULL, 0x005fc6cc269ba57cULL)},
- }}, {{
- {FIELD_LITERAL(0x008940211aa0d633ULL, 0x00addae28136571dULL,
- 0x00d68fdbba20d673ULL, 0x003bc6129bc9e21aULL,
- 0x000346cf184ebe9aULL, 0x0068774d741ebc7fULL,
- 0x0019d5e9e6966557ULL, 0x0003cbd7f981b651ULL)},
- {FIELD_LITERAL(0x004a2902926f8d3fULL, 0x00ad79b42637ab75ULL,
- 0x0088f60b90f2d4e8ULL, 0x0030f54ef0e398c4ULL,
- 0x00021dc9bf99681eULL, 0x007ebf66fde74ee3ULL,
- 0x004ade654386e9a4ULL, 0x00e7485066be4c27ULL)},
- {FIELD_LITERAL(0x00445f1263983be0ULL, 0x004cf371dda45e6aULL,
- 0x00744a89d5a310e7ULL, 0x001f20ce4f904833ULL,
- 0x00e746edebe66e29ULL, 0x000912ab1f6c153dULL,
- 0x00f61d77d9b2444cULL, 0x0001499cd6647610ULL)},
+ {FIELD_LITERAL(0x00cc3b062366f4ccULL, 0x003d6e34e314aa3cULL,
+ 0x00d51c0a7521774dULL, 0x0094e060eec6ab8bULL,
+ 0x00d21291b4d80082ULL, 0x00befed12b55ef1eULL,
+ 0x00c3dd2df5c94518ULL, 0x00e0a7b112b8d4e6ULL)},
+ {FIELD_LITERAL(0x0019eb5608d8723aULL, 0x00d1bab52fb3aedbULL,
+ 0x00270a7311ebc90cULL, 0x0037c12b91be7f13ULL,
+ 0x005be16cd8b5c704ULL, 0x003e181acda888e1ULL,
+ 0x00bc1f00fc3fc6d0ULL, 0x00d3839bfa319e20ULL)},
+ {FIELD_LITERAL(0x003caeb88611909fULL, 0x00ea8b378c4df3d4ULL,
+ 0x00b3295b95a5a19aULL, 0x00a65f97514bdfb5ULL,
+ 0x00b39efba743cab1ULL, 0x0016ba98b862fd2dULL,
+ 0x0001508812ee71d7ULL, 0x000a75740eea114aULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00ebcf0eb649f823ULL, 0x00166d332e98ea03ULL,
+ 0x0059ddf64f5cd5f6ULL, 0x0047763123d9471bULL,
+ 0x00a64065c53ef62fULL, 0x00978e44c480153dULL,
+ 0x000b5b2a0265f194ULL, 0x0046a24b9f32965aULL)},
+ {FIELD_LITERAL(0x00b9eef787034df0ULL, 0x0020bc24de3390cdULL,
+ 0x000022160bae99bbULL, 0x00ae66e886e97946ULL,
+ 0x0048d4bbe02cbb8bULL, 0x0072ba97b34e38d4ULL,
+ 0x00eae7ec8f03e85aULL, 0x005ba92ecf808b2cULL)},
+ {FIELD_LITERAL(0x00c9cfbbe74258fdULL, 0x00843a979ea9eaa7ULL,
+ 0x000cbb4371cfbe90ULL, 0x0059bac8f7f0a628ULL,
+ 0x004b3dff882ff530ULL, 0x0011869df4d90733ULL,
+ 0x00595aa71f4abfc2ULL, 0x0070e2d38990c2e6ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00de2010c0a01733ULL, 0x00c739a612e24297ULL,
+ 0x00a7212643141d7cULL, 0x00f88444f6b67c11ULL,
+ 0x00484b7b16ec28f2ULL, 0x009c1b8856af9c68ULL,
+ 0x00ff4669591fe9d6ULL, 0x0054974be08a32c8ULL)},
+ {FIELD_LITERAL(0x0010de3fd682ceedULL, 0x008c07642d83ca4eULL,
+ 0x0013bb064e00a1ccULL, 0x009411ae27870e11ULL,
+ 0x00ea8e5b4d531223ULL, 0x0032fe7d2aaece2eULL,
+ 0x00d989e243e7bb41ULL, 0x000fe79a508e9b8bULL)},
+ {FIELD_LITERAL(0x005e0426b9bfc5b1ULL, 0x0041a5b1d29ee4faULL,
+ 0x0015b0def7774391ULL, 0x00bc164f1f51af01ULL,
+ 0x00d543b0942797b9ULL, 0x003c129b6398099cULL,
+ 0x002b114c6e5adf18ULL, 0x00b4e630e4018a7bULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00d490afc95f8420ULL, 0x00b096bf50c1d9b9ULL,
+ 0x00799fd707679866ULL, 0x007c74d9334afbeaULL,
+ 0x00efaa8be80ff4edULL, 0x0075c4943bb81694ULL,
+ 0x00c21c2fca161f36ULL, 0x00e77035d492bfeeULL)},
+ {FIELD_LITERAL(0x006658a190dd6661ULL, 0x00e0e9bab38609a6ULL,
+ 0x0028895c802237edULL, 0x006a0229c494f587ULL,
+ 0x002dcde96c9916b7ULL, 0x00d158822de16218ULL,
+ 0x00173b917a06856fULL, 0x00ca78a79ae07326ULL)},
+ {FIELD_LITERAL(0x00e35bfc79caced4ULL, 0x0087238a3e1fe3bbULL,
+ 0x00bcbf0ff4ceff5bULL, 0x00a19c1c94099b91ULL,
+ 0x0071e102b49db976ULL, 0x0059e3d004eada1eULL,
+ 0x008da78afa58a47eULL, 0x00579c8ebf269187ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00a16c2905eee75fULL, 0x009d4bcaea2c7e1dULL,
+ 0x00d3bd79bfad19dfULL, 0x0050da745193342cULL,
+ 0x006abdb8f6b29ab1ULL, 0x00a24fe0a4fef7efULL,
+ 0x0063730da1057dfbULL, 0x00a08c312c8eb108ULL)},
+ {FIELD_LITERAL(0x00b583be005375beULL, 0x00a40c8f8a4e3df4ULL,
+ 0x003fac4a8f5bdbf7ULL, 0x00d4481d872cd718ULL,
+ 0x004dc8749cdbaefeULL, 0x00cce740d5e5c975ULL,
+ 0x000b1c1f4241fd21ULL, 0x00a76de1b4e1cd07ULL)},
+ {FIELD_LITERAL(0x007a076500d30b62ULL, 0x000a6e117b7f090fULL,
+ 0x00c8712ae7eebd9aULL, 0x000fbd6c1d5f6ff7ULL,
+ 0x003a7977246ebf11ULL, 0x00166ed969c6600eULL,
+ 0x00aa42e469c98becULL, 0x00dc58f307cf0666ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x004b491f65a9a28bULL, 0x006a10309e8a55b7ULL,
+ 0x00b67210185187efULL, 0x00cf6497b12d9b8fULL,
+ 0x0085778c56e2b1baULL, 0x0015b4c07a814d85ULL,
+ 0x00686479e62da561ULL, 0x008de5d88f114916ULL)},
+ {FIELD_LITERAL(0x00e37c88d6bba7b1ULL, 0x003e4577e1b8d433ULL,
+ 0x0050d8ea5f510ec0ULL, 0x0042fc9f2da9ef59ULL,
+ 0x003bd074c1141420ULL, 0x00561b8b7b68774eULL,
+ 0x00232e5e5d1013a3ULL, 0x006b7f2cb3d7e73fULL)},
+ {FIELD_LITERAL(0x004bdd0f0b41e6a0ULL, 0x001773057c405d24ULL,
+ 0x006029f99915bd97ULL, 0x006a5ba70a17fe2fULL,
+ 0x0046111977df7e08ULL, 0x004d8124c89fb6b7ULL,
+ 0x00580983b2bb2724ULL, 0x00207bf330d6f3feULL)},
+ }}, {{
+ {FIELD_LITERAL(0x007efdc93972a48bULL, 0x002f5e50e78d5feeULL,
+ 0x0080dc11d61c7fe5ULL, 0x0065aa598707245bULL,
+ 0x009abba2300641beULL, 0x000c68787656543aULL,
+ 0x00ffe0fef2dc0a17ULL, 0x00007ffbd6cb4f3aULL)},
+ {FIELD_LITERAL(0x0036012f2b836efcULL, 0x00458c126d6b5fbcULL,
+ 0x00a34436d719ad1eULL, 0x0097be6167117deaULL,
+ 0x0009c219c879cff3ULL, 0x0065564493e60755ULL,
+ 0x00993ac94a8cdec0ULL, 0x002d4885a4d0dbafULL)},
+ {FIELD_LITERAL(0x00598b60b4c068baULL, 0x00c547a0be7f1afdULL,
+ 0x009582164acf12afULL, 0x00af4acac4fbbe40ULL,
+ 0x005f6ca7c539121aULL, 0x003b6e752ebf9d66ULL,
+ 0x00f08a30d5cac5d4ULL, 0x00e399bb5f97c5a9ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x007445a0409c0a66ULL, 0x00a65c369f3829c0ULL,
+ 0x0031d248a4f74826ULL, 0x006817f34defbe8eULL,
+ 0x00649741d95ebf2eULL, 0x00d46466ab16b397ULL,
+ 0x00fdc35703bee414ULL, 0x00343b43334525f8ULL)},
+ {FIELD_LITERAL(0x001796bea93f6401ULL, 0x00090c5a42e85269ULL,
+ 0x00672412ba1252edULL, 0x001201d47b6de7deULL,
+ 0x006877bccfe66497ULL, 0x00b554fd97a4c161ULL,
+ 0x009753f42dbac3cfULL, 0x00e983e3e378270aULL)},
+ {FIELD_LITERAL(0x00ac3eff18849872ULL, 0x00f0eea3bff05690ULL,
+ 0x00a6d72c21dd505dULL, 0x001b832642424169ULL,
+ 0x00a6813017b540e5ULL, 0x00a744bd71b385cdULL,
+ 0x0022a7d089130a7bULL, 0x004edeec9a133486ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00b2d6729196e8a9ULL, 0x0088a9bb2031cef4ULL,
+ 0x00579e7787dc1567ULL, 0x0030f49feb059190ULL,
+ 0x00a0b1d69c7f7d8fULL, 0x0040bdcc6d9d806fULL,
+ 0x00d76c4037edd095ULL, 0x00bbf24376415dd7ULL)},
+ {FIELD_LITERAL(0x00240465ff5a7197ULL, 0x00bb97e76caf27d0ULL,
+ 0x004b4edbf8116d39ULL, 0x001d8586f708cbaaULL,
+ 0x000f8ee8ff8e4a50ULL, 0x00dde5a1945dd622ULL,
+ 0x00e6fc1c0957e07cULL, 0x0041c9cdabfd88a0ULL)},
+ {FIELD_LITERAL(0x005344b0bf5b548cULL, 0x002957d0b705cc99ULL,
+ 0x00f586a70390553dULL, 0x0075b3229f583cc3ULL,
+ 0x00a1aa78227490e4ULL, 0x001bf09cf7957717ULL,
+ 0x00cf6bf344325f52ULL, 0x0065bd1c23ca3ecfULL)},
+ }}, {{
+ {FIELD_LITERAL(0x009bff3b3239363cULL, 0x00e17368796ef7c0ULL,
+ 0x00528b0fe0971f3aULL, 0x0008014fc8d4a095ULL,
+ 0x00d09f2e8a521ec4ULL, 0x006713ab5dde5987ULL,
+ 0x0003015758e0dbb1ULL, 0x00215999f1ba212dULL)},
+ {FIELD_LITERAL(0x002c88e93527da0eULL, 0x0077c78f3456aad5ULL,
+ 0x0071087a0a389d1cULL, 0x00934dac1fb96dbdULL,
+ 0x008470e801162697ULL, 0x005bc2196cd4ad49ULL,
+ 0x00e535601d5087c3ULL, 0x00769888700f497fULL)},
+ {FIELD_LITERAL(0x00da7a4b557298adULL, 0x0019d2589ea5df76ULL,
+ 0x00ef3e38be0c6497ULL, 0x00a9644e1312609aULL,
+ 0x004592f61b2558daULL, 0x0082c1df510d7e46ULL,
+ 0x0042809a535c0023ULL, 0x00215bcb5afd7757ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x002b9df55a1a4213ULL, 0x00dcfc3b464a26beULL,
+ 0x00c4f9e07a8144d5ULL, 0x00c8e0617a92b602ULL,
+ 0x008e3c93accafae0ULL, 0x00bf1bcb95b2ca60ULL,
+ 0x004ce2426a613bf3ULL, 0x00266cac58e40921ULL)},
+ {FIELD_LITERAL(0x008456d5db76e8f0ULL, 0x0032ca9cab2ce163ULL,
+ 0x0059f2b8bf91abcfULL, 0x0063c2a021712788ULL,
+ 0x00f86155af22f72dULL, 0x00db98b2a6c005a0ULL,
+ 0x00ac6e416a693ac4ULL, 0x007a93572af53226ULL)},
+ {FIELD_LITERAL(0x0087767520f0de22ULL, 0x0091f64012279fb5ULL,
+ 0x001050f1f0644999ULL, 0x004f097a2477ad3cULL,
+ 0x006b37913a9947bdULL, 0x001a3d78645af241ULL,
+ 0x0057832bbb3008a7ULL, 0x002c1d902b80dc20ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x001a6002bf178877ULL, 0x009bce168aa5af50ULL,
+ 0x005fc318ff04a7f5ULL, 0x0052818f55c36461ULL,
+ 0x008768f5d4b24afbULL, 0x0037ffbae7b69c85ULL,
+ 0x0018195a4b61edc0ULL, 0x001e12ea088434b2ULL)},
+ {FIELD_LITERAL(0x0047d3f804e7ab07ULL, 0x00a809ab5f905260ULL,
+ 0x00b3ffc7cdaf306dULL, 0x00746e8ec2d6e509ULL,
+ 0x00d0dade8887a645ULL, 0x00acceeebde0dd37ULL,
+ 0x009bc2579054686bULL, 0x0023804f97f1c2bfULL)},
+ {FIELD_LITERAL(0x0043e2e2e50b80d7ULL, 0x00143aafe4427e0fULL,
+ 0x005594aaecab855bULL, 0x008b12ccaaecbc01ULL,
+ 0x002deeb091082bc3ULL, 0x009cca4be2ae7514ULL,
+ 0x00142b96e696d047ULL, 0x00ad2a2b1c05256aULL)},
+ }}, {{
+ {FIELD_LITERAL(0x003914f2f144b78bULL, 0x007a95dd8bee6f68ULL,
+ 0x00c7f4384d61c8e6ULL, 0x004e51eb60f1bdb2ULL,
+ 0x00f64be7aa4621d8ULL, 0x006797bfec2f0ac0ULL,
+ 0x007d17aab3c75900ULL, 0x001893e73cac8bc5ULL)},
+ {FIELD_LITERAL(0x00140360b768665bULL, 0x00b68aca4967f977ULL,
+ 0x0001089b66195ae4ULL, 0x00fe71122185e725ULL,
+ 0x000bca2618d49637ULL, 0x00a54f0557d7e98aULL,
+ 0x00cdcd2f91d6f417ULL, 0x00ab8c13741fd793ULL)},
+ {FIELD_LITERAL(0x00725ee6b1e549e0ULL, 0x007124a0769777faULL,
+ 0x000b68fdad07ae42ULL, 0x0085b909cd4952dfULL,
+ 0x0092d2e3c81606f4ULL, 0x009f22f6cac099a0ULL,
+ 0x00f59da57f2799a8ULL, 0x00f06c090122f777ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00ce0bed0a3532bcULL, 0x001a5048a22df16bULL,
+ 0x00e31db4cbad8bf1ULL, 0x00e89292120cf00eULL,
+ 0x007d1dd1a9b00034ULL, 0x00e2a9041ff8f680ULL,
+ 0x006a4c837ae596e7ULL, 0x00713af1068070b3ULL)},
+ {FIELD_LITERAL(0x00c4fe64ce66d04bULL, 0x00b095d52e09b3d7ULL,
+ 0x00758bbecb1a3a8eULL, 0x00f35cce8d0650c0ULL,
+ 0x002b878aa5984473ULL, 0x0062e0a3b7544ddcULL,
+ 0x00b25b290ed116feULL, 0x007b0f6abe0bebf2ULL)},
+ {FIELD_LITERAL(0x0081d4e3addae0a8ULL, 0x003410c836c7ffccULL,
+ 0x00c8129ad89e4314ULL, 0x000e3d5a23922dcdULL,
+ 0x00d91e46f29c31f3ULL, 0x006c728cde8c5947ULL,
+ 0x002bc655ba2566c0ULL, 0x002ca94721533108ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x0051e4b3f764d8a9ULL, 0x0019792d46e904a0ULL,
+ 0x00853bc13dbc8227ULL, 0x000840208179f12dULL,
+ 0x0068243474879235ULL, 0x0013856fbfe374d0ULL,
+ 0x00bda12fe8676424ULL, 0x00bbb43635926eb2ULL)},
+ {FIELD_LITERAL(0x0012cdc880a93982ULL, 0x003c495b21cd1b58ULL,
+ 0x00b7e5c93f22a26eULL, 0x0044aa82dfb99458ULL,
+ 0x009ba092cdffe9c0ULL, 0x00a14b3ab2083b73ULL,
+ 0x000271c2f70e1c4bULL, 0x00eea9cac0f66eb8ULL)},
+ {FIELD_LITERAL(0x001a1847c4ac5480ULL, 0x00b1b412935bb03aULL,
+ 0x00f74285983bf2b2ULL, 0x00624138b5b5d0f1ULL,
+ 0x008820c0b03d38bfULL, 0x00b94e50a18c1572ULL,
+ 0x0060f6934841798fULL, 0x00c52f5d66d6ebe2ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00da23d59f9bcea6ULL, 0x00e0f27007a06a4bULL,
+ 0x00128b5b43a6758cULL, 0x000cf50190fa8b56ULL,
+ 0x00fc877aba2b2d72ULL, 0x00623bef52edf53fULL,
+ 0x00e6af6b819669e2ULL, 0x00e314dc34fcaa4fULL)},
+ {FIELD_LITERAL(0x0066e5eddd164d1eULL, 0x00418a7c6fe28238ULL,
+ 0x0002e2f37e962c25ULL, 0x00f01f56b5975306ULL,
+ 0x0048842fa503875cULL, 0x0057b0e968078143ULL,
+ 0x00ff683024f3d134ULL, 0x0082ae28fcad12e4ULL)},
+ {FIELD_LITERAL(0x0011ddfd21260e42ULL, 0x00d05b0319a76892ULL,
+ 0x00183ea4368e9b8fULL, 0x00b0815662affc96ULL,
+ 0x00b466a5e7ce7c88ULL, 0x00db93b07506e6eeULL,
+ 0x0033885f82f62401ULL, 0x0086f9090ec9b419ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00d95d1c5fcb435aULL, 0x0016d1ed6b5086f9ULL,
+ 0x00792aa0b7e54d71ULL, 0x0067b65715f1925dULL,
+ 0x00a219755ec6176bULL, 0x00bc3f026b12c28fULL,
+ 0x00700c897ffeb93eULL, 0x0089b83f6ec50b46ULL)},
+ {FIELD_LITERAL(0x003c97e6384da36eULL, 0x00423d53eac81a09ULL,
+ 0x00b70d68f3cdce35ULL, 0x00ee7959b354b92cULL,
+ 0x00f4e9718819c8caULL, 0x009349f12acbffe9ULL,
+ 0x005aee7b62cb7da6ULL, 0x00d97764154ffc86ULL)},
+ {FIELD_LITERAL(0x00526324babb46dcULL, 0x002ee99b38d7bf9eULL,
+ 0x007ea51794706ef4ULL, 0x00abeb04da6e3c39ULL,
+ 0x006b457c1d281060ULL, 0x00fe243e9a66c793ULL,
+ 0x00378de0fb6c6ee4ULL, 0x003e4194b9c3cb93ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00fed3cd80ca2292ULL, 0x0015b043a73ca613ULL,
+ 0x000a9fd7bf9be227ULL, 0x003b5e03de2db983ULL,
+ 0x005af72d46904ef7ULL, 0x00c0f1b5c49faa99ULL,
+ 0x00dc86fc3bd305e1ULL, 0x00c92f08c1cb1797ULL)},
+ {FIELD_LITERAL(0x0079680ce111ed3bULL, 0x001a1ed82806122cULL,
+ 0x000c2e7466d15df3ULL, 0x002c407f6f7150fdULL,
+ 0x00c5e7c96b1b0ce3ULL, 0x009aa44626863ff9ULL,
+ 0x00887b8b5b80be42ULL, 0x00b6023cec964825ULL)},
+ {FIELD_LITERAL(0x00e4a8e1048970c8ULL, 0x0062887b7830a302ULL,
+ 0x00bcf1c8cd81402bULL, 0x0056dbb81a68f5beULL,
+ 0x0014eced83f12452ULL, 0x00139e1a510150dfULL,
+ 0x00bb81140a82d1a3ULL, 0x000febcc1aaf1aa7ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00a7527958238159ULL, 0x0013ec9537a84cd6ULL,
+ 0x001d7fee7d562525ULL, 0x00b9eefa6191d5e5ULL,
+ 0x00dbc97db70bcb8aULL, 0x00481affc7a4d395ULL,
+ 0x006f73d3e70c31bbULL, 0x00183f324ed96a61ULL)},
+ {FIELD_LITERAL(0x0039dd7ce7fc6860ULL, 0x00d64f6425653da1ULL,
+ 0x003e037c7f57d0afULL, 0x0063477a06e2bcf2ULL,
+ 0x001727dbb7ac67e6ULL, 0x0049589f5efafe2eULL,
+ 0x00fc0fef2e813d54ULL, 0x008baa5d087fb50dULL)},
+ {FIELD_LITERAL(0x0024fb59d9b457c7ULL, 0x00a7d4e060223e4cULL,
+ 0x00c118d1b555fd80ULL, 0x0082e216c732f22aULL,
+ 0x00cd2a2993089504ULL, 0x003638e836a3e13dULL,
+ 0x000d855ee89b4729ULL, 0x008ec5b7d4810c91ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x001bf51f7d65cdfdULL, 0x00d14cdafa16a97dULL,
+ 0x002c38e60fcd10e7ULL, 0x00a27446e393efbdULL,
+ 0x000b5d8946a71fddULL, 0x0063df2cde128f2fULL,
+ 0x006c8679569b1888ULL, 0x0059ffc4925d732dULL)},
+ {FIELD_LITERAL(0x00ece96f95f2b66fULL, 0x00ece7952813a27bULL,
+ 0x0026fc36592e489eULL, 0x007157d1a2de0f66ULL,
+ 0x00759dc111d86ddfULL, 0x0012881e5780bb0fULL,
+ 0x00c8ccc83ad29496ULL, 0x0012b9bd1929eb71ULL)},
+ {FIELD_LITERAL(0x000fa15a20da5df0ULL, 0x00349ddb1a46cd31ULL,
+ 0x002c512ad1d8e726ULL, 0x00047611f669318dULL,
+ 0x009e68fba591e17eULL, 0x004320dffa803906ULL,
+ 0x00a640874951a3d3ULL, 0x00b6353478baa24fULL)},
+ }}, {{
+ {FIELD_LITERAL(0x009696510000d333ULL, 0x00ec2f788bc04826ULL,
+ 0x000e4d02b1f67ba5ULL, 0x00659aa8dace08b6ULL,
+ 0x00d7a38a3a3ae533ULL, 0x008856defa8c746bULL,
+ 0x004d7a4402d3da1aULL, 0x00ea82e06229260fULL)},
+ {FIELD_LITERAL(0x006a15bb20f75c0cULL, 0x0079a144027a5d0cULL,
+ 0x00d19116ce0b4d70ULL, 0x0059b83bcb0b268eULL,
+ 0x005f58f63f16c127ULL, 0x0079958318ee2c37ULL,
+ 0x00defbb063d07f82ULL, 0x00f1f0b931d2d446ULL)},
+ {FIELD_LITERAL(0x00cb5e4c3c35d422ULL, 0x008df885ca43577fULL,
+ 0x00fa50b16ca3e471ULL, 0x005a0e58e17488c8ULL,
+ 0x00b2ceccd6d34d19ULL, 0x00f01d5d235e36e9ULL,
+ 0x00db2e7e4be6ca44ULL, 0x00260ab77f35fccdULL)},
+ }}, {{
+ {FIELD_LITERAL(0x006f6fd9baac61d5ULL, 0x002a7710a020a895ULL,
+ 0x009de0db7fc03d4dULL, 0x00cdedcb1875f40bULL,
+ 0x00050caf9b6b1e22ULL, 0x005e3a6654456ab0ULL,
+ 0x00775fdf8c4423d4ULL, 0x0028701ea5738b5dULL)},
+ {FIELD_LITERAL(0x009ffd90abfeae96ULL, 0x00cba3c2b624a516ULL,
+ 0x005ef08bcee46c91ULL, 0x00e6fde30afb6185ULL,
+ 0x00f0b4db4f818ce4ULL, 0x006c54f45d2127f5ULL,
+ 0x00040125035854c7ULL, 0x00372658a3287e13ULL)},
+ {FIELD_LITERAL(0x00d7070fb1beb2abULL, 0x0078fc845a93896bULL,
+ 0x006894a4b2f224a6ULL, 0x005bdd8192b9dbdeULL,
+ 0x00b38839874b3a9eULL, 0x00f93618b04b7a57ULL,
+ 0x003e3ec75fd2c67eULL, 0x00bf5e6bfc29494aULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00f19224ebba2aa5ULL, 0x0074f89d358e694dULL,
+ 0x00eea486597135adULL, 0x0081579a4555c7e1ULL,
+ 0x0010b9b872930a9dULL, 0x00f002e87a30ecc0ULL,
+ 0x009b9d66b6de56e2ULL, 0x00a3c4f45e8004ebULL)},
+ {FIELD_LITERAL(0x0045e8dda9400888ULL, 0x002ff12e5fc05db7ULL,
+ 0x00a7098d54afe69cULL, 0x00cdbe846a500585ULL,
+ 0x00879c1593ca1882ULL, 0x003f7a7fea76c8b0ULL,
+ 0x002cd73dd0c8e0a1ULL, 0x00645d6ce96f51feULL)},
+ {FIELD_LITERAL(0x002b7e83e123d6d6ULL, 0x00398346f7419c80ULL,
+ 0x0042922e55940163ULL, 0x005e7fc5601886a3ULL,
+ 0x00e88f2cee1d3103ULL, 0x00e7fab135f2e377ULL,
+ 0x00b059984dbf0dedULL, 0x0009ce080faa5bb8ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x0085e78af7758979ULL, 0x00275a4ee1631a3aULL,
+ 0x00d26bc0ed78b683ULL, 0x004f8355ea21064fULL,
+ 0x00d618e1a32696e5ULL, 0x008d8d7b150e5680ULL,
+ 0x00a74cd854b278d2ULL, 0x001dd62702203ea0ULL)},
+ {FIELD_LITERAL(0x00f89335c2a59286ULL, 0x00a0f5c905d55141ULL,
+ 0x00b41fb836ee9382ULL, 0x00e235d51730ca43ULL,
+ 0x00a5cb37b5c0a69aULL, 0x009b966ffe136c45ULL,
+ 0x00cb2ea10bf80ed1ULL, 0x00fb2b370b40dc35ULL)},
+ {FIELD_LITERAL(0x00d687d16d4ee8baULL, 0x0071520bdd069dffULL,
+ 0x00de85c60d32355dULL, 0x0087d2e3565102f4ULL,
+ 0x00cde391b8dfc9aaULL, 0x00e18d69efdfefe5ULL,
+ 0x004a9d0591954e91ULL, 0x00fa36dd8b50eee5ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x002e788749a865f7ULL, 0x006e4dc3116861eaULL,
+ 0x009f1428c37276e6ULL, 0x00e7d2e0fc1e1226ULL,
+ 0x003aeebc6b6c45f6ULL, 0x0071a8073bf500c9ULL,
+ 0x004b22ad986b530cULL, 0x00f439e63c0d79d4ULL)},
+ {FIELD_LITERAL(0x006bc3d53011f470ULL, 0x00032d6e692b83e8ULL,
+ 0x00059722f497cd0bULL, 0x0009b4e6f0c497ccULL,
+ 0x0058a804b7cce6c0ULL, 0x002b71d3302bbd5dULL,
+ 0x00e2f82a36765fceULL, 0x008dded99524c703ULL)},
+ {FIELD_LITERAL(0x004d058953747d64ULL, 0x00701940fe79aa6fULL,
+ 0x00a620ac71c760bfULL, 0x009532b611158b75ULL,
+ 0x00547ed7f466f300ULL, 0x003cb5ab53a8401aULL,
+ 0x00c7763168ce3120ULL, 0x007e48e33e4b9ab2ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x001b2fc57bf3c738ULL, 0x006a3f918993fb80ULL,
+ 0x0026f7a14fdec288ULL, 0x0075a2cdccef08dbULL,
+ 0x00d3ecbc9eecdbf1ULL, 0x0048c40f06e5bf7fULL,
+ 0x00d63e423009896bULL, 0x000598bc99c056a8ULL)},
+ {FIELD_LITERAL(0x002f194eaafa46dcULL, 0x008e38f57fe87613ULL,
+ 0x00dc8e5ae25f4ab2ULL, 0x000a17809575e6bdULL,
+ 0x00d3ec7923ba366aULL, 0x003a7e72e0ad75e3ULL,
+ 0x0010024b88436e0aULL, 0x00ed3c5444b64051ULL)},
+ {FIELD_LITERAL(0x00831fc1340af342ULL, 0x00c9645669466d35ULL,
+ 0x007692b4cc5a080fULL, 0x009fd4a47ac9259fULL,
+ 0x001eeddf7d45928bULL, 0x003c0446fc45f28bULL,
+ 0x002c0713aa3e2507ULL, 0x0095706935f0f41eULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00766ae4190ec6d8ULL, 0x0065768cabc71380ULL,
+ 0x00b902598416cdc2ULL, 0x00380021ad38df52ULL,
+ 0x008f0b89d6551134ULL, 0x004254d4cc62c5a5ULL,
+ 0x000d79f4484b9b94ULL, 0x00b516732ae3c50eULL)},
+ {FIELD_LITERAL(0x001fb73475c45509ULL, 0x00d2b2e5ea43345aULL,
+ 0x00cb3c3842077bd1ULL, 0x0029f90ad820946eULL,
+ 0x007c11b2380778aaULL, 0x009e54ece62c1704ULL,
+ 0x004bc60c41ca01c3ULL, 0x004525679a5a0b03ULL)},
+ {FIELD_LITERAL(0x00c64fbddbed87b3ULL, 0x0040601d11731faaULL,
+ 0x009c22475b6f9d67ULL, 0x0024b79dae875f15ULL,
+ 0x00616fed3f02c3b0ULL, 0x0000cf39f6af2d3bULL,
+ 0x00c46bac0aa9a688ULL, 0x00ab23e2800da204ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x000b3a37617632b0ULL, 0x00597199fe1cfb6cULL,
+ 0x0042a7ccdfeafdd6ULL, 0x004cc9f15ebcea17ULL,
+ 0x00f436e596a6b4a4ULL, 0x00168861142df0d8ULL,
+ 0x000753edfec26af5ULL, 0x000c495d7e388116ULL)},
+ {FIELD_LITERAL(0x0017085f4a346148ULL, 0x00c7cf7a37f62272ULL,
+ 0x001776e129bc5c30ULL, 0x009955134c9eef2aULL,
+ 0x001ba5bdf1df07beULL, 0x00ec39497103a55cULL,
+ 0x006578354fda6cfbULL, 0x005f02719d4f15eeULL)},
+ {FIELD_LITERAL(0x0052b9d9b5d9655dULL, 0x00d4ec7ba1b461c3ULL,
+ 0x00f95df4974f280bULL, 0x003d8e5ca11aeb51ULL,
+ 0x00d4981eb5a70b26ULL, 0x000af9a4f6659f29ULL,
+ 0x004598c846faeb43ULL, 0x0049d9a183a47670ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x000a72d23dcb3f1fULL, 0x00a3737f84011727ULL,
+ 0x00f870c0fbbf4a47ULL, 0x00a7aadd04b5c9caULL,
+ 0x000c7715c67bd072ULL, 0x00015a136afcd74eULL,
+ 0x0080d5caea499634ULL, 0x0026b448ec7514b7ULL)},
+ {FIELD_LITERAL(0x00b60167d9e7d065ULL, 0x00e60ba0d07381e8ULL,
+ 0x003a4f17b725c2d4ULL, 0x006c19fe176b64faULL,
+ 0x003b57b31af86ccbULL, 0x0021047c286180fdULL,
+ 0x00bdc8fb00c6dbb6ULL, 0x00fe4a9f4bab4f3fULL)},
+ {FIELD_LITERAL(0x0088ffc3a16111f7ULL, 0x009155e4245d0bc8ULL,
+ 0x00851d68220572d5ULL, 0x00557ace1e514d29ULL,
+ 0x0031d7c339d91022ULL, 0x00101d0ae2eaceeaULL,
+ 0x00246ab3f837b66aULL, 0x00d5216d381ff530ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x0057e7ea35f36daeULL, 0x00f47d7ad15de22eULL,
+ 0x00d757ea4b105115ULL, 0x008311457d579d7eULL,
+ 0x00b49b75b1edd4ebULL, 0x0081c7ff742fd63aULL,
+ 0x00ddda3187433df6ULL, 0x00475727d55f9c66ULL)},
+ {FIELD_LITERAL(0x00a6295218dc136aULL, 0x00563b3af0e9c012ULL,
+ 0x00d3753b0145db1bULL, 0x004550389c043dc1ULL,
+ 0x00ea94ae27401bdfULL, 0x002b0b949f2b7956ULL,
+ 0x00c63f780ad8e23cULL, 0x00e591c47d6bab15ULL)},
+ {FIELD_LITERAL(0x00416c582b058eb6ULL, 0x004107da5b2cc695ULL,
+ 0x00b3cd2556aeec64ULL, 0x00c0b418267e57a1ULL,
+ 0x001799293579bd2eULL, 0x0046ed44590e4d07ULL,
+ 0x001d7459b3630a1eULL, 0x00c6afba8b6696aaULL)},
+ }}, {{
+ {FIELD_LITERAL(0x008d6009b26da3f8ULL, 0x00898e88ca06b1caULL,
+ 0x00edb22b2ed7fe62ULL, 0x00fbc93516aabe80ULL,
+ 0x008b4b470c42ce0dULL, 0x00e0032ba7d0dcbbULL,
+ 0x00d76da3a956ecc8ULL, 0x007f20fe74e3852aULL)},
+ {FIELD_LITERAL(0x002419222c607674ULL, 0x00a7f23af89188b3ULL,
+ 0x00ad127284e73d1cULL, 0x008bba582fae1c51ULL,
+ 0x00fc6aa7ca9ecab1ULL, 0x003df5319eb6c2baULL,
+ 0x002a05af8a8b199aULL, 0x004bf8354558407cULL)},
+ {FIELD_LITERAL(0x00ce7d4a30f0fcbfULL, 0x00d02c272629f03dULL,
+ 0x0048c001f7400bc2ULL, 0x002c21368011958dULL,
+ 0x0098a550391e96b5ULL, 0x002d80b66390f379ULL,
+ 0x001fa878760cc785ULL, 0x001adfce54b613d5ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x001ed4dc71fa2523ULL, 0x005d0bff19bf9b5cULL,
+ 0x00c3801cee065a64ULL, 0x001ed0b504323fbfULL,
+ 0x0003ab9fdcbbc593ULL, 0x00df82070178b8d2ULL,
+ 0x00a2bcaa9c251f85ULL, 0x00c628a3674bd02eULL)},
+ {FIELD_LITERAL(0x006b7a0674f9f8deULL, 0x00a742414e5c7cffULL,
+ 0x0041cbf3c6e13221ULL, 0x00e3a64fd207af24ULL,
+ 0x0087c05f15fbe8d1ULL, 0x004c50936d9e8a33ULL,
+ 0x001306ec21042b6dULL, 0x00a4f4137d1141c2ULL)},
+ {FIELD_LITERAL(0x0009e6fb921568b0ULL, 0x00b3c60120219118ULL,
+ 0x002a6c3460dd503aULL, 0x009db1ef11654b54ULL,
+ 0x0063e4bf0be79601ULL, 0x00670d34bb2592b9ULL,
+ 0x00dcee2f6c4130ceULL, 0x00b2682e88e77f54ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x000d5b4b3da135abULL, 0x00838f3e5064d81dULL,
+ 0x00d44eb50f6d94edULL, 0x0008931ab502ac6dULL,
+ 0x00debe01ca3d3586ULL, 0x0025c206775f0641ULL,
+ 0x005ad4b6ae912763ULL, 0x007e2c318ad8f247ULL)},
+ {FIELD_LITERAL(0x00ddbe0750dd1addULL, 0x004b3c7b885844b8ULL,
+ 0x00363e7ecf12f1aeULL, 0x0062e953e6438f9dULL,
+ 0x0023cc73b076afe9ULL, 0x00b09fa083b4da32ULL,
+ 0x00c7c3d2456c541dULL, 0x005b591ec6b694d4ULL)},
+ {FIELD_LITERAL(0x0028656e19d62fcfULL, 0x0052a4af03df148dULL,
+ 0x00122765ddd14e42ULL, 0x00f2252904f67157ULL,
+ 0x004741965b636f3aULL, 0x006441d296132cb9ULL,
+ 0x005e2106f956a5b7ULL, 0x00247029592d335cULL)},
+ }}, {{
+ {FIELD_LITERAL(0x003fe038eb92f894ULL, 0x000e6da1b72e8e32ULL,
+ 0x003a1411bfcbe0faULL, 0x00b55d473164a9e4ULL,
+ 0x00b9a775ac2df48dULL, 0x0002ddf350659e21ULL,
+ 0x00a279a69eb19cb3ULL, 0x00f844eab25cba44ULL)},
+ {FIELD_LITERAL(0x00c41d1f9c1f1ac1ULL, 0x007b2df4e9f19146ULL,
+ 0x00b469355fd5ba7aULL, 0x00b5e1965afc852aULL,
+ 0x00388d5f1e2d8217ULL, 0x0022079e4c09ae93ULL,
+ 0x0014268acd4ef518ULL, 0x00c1dd8d9640464cULL)},
+ {FIELD_LITERAL(0x0038526adeed0c55ULL, 0x00dd68c607e3fe85ULL,
+ 0x00f746ddd48a5d57ULL, 0x0042f2952b963b7cULL,
+ 0x001cbbd6876d5ec2ULL, 0x005e341470bca5c2ULL,
+ 0x00871d41e085f413ULL, 0x00e53ab098f45732ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x004d51124797c831ULL, 0x008f5ae3750347adULL,
+ 0x0070ced94c1a0c8eULL, 0x00f6db2043898e64ULL,
+ 0x000d00c9a5750cd0ULL, 0x000741ec59bad712ULL,
+ 0x003c9d11aab37b7fULL, 0x00a67ba169807714ULL)},
+ {FIELD_LITERAL(0x00adb2c1566e8b8fULL, 0x0096c68a35771a9aULL,
+ 0x00869933356f334aULL, 0x00ba9c93459f5962ULL,
+ 0x009ec73fb6e8ca4bULL, 0x003c3802c27202e1ULL,
+ 0x0031f5b733e0c008ULL, 0x00f9058c19611fa9ULL)},
+ {FIELD_LITERAL(0x00238f01814a3421ULL, 0x00c325a44b6cce28ULL,
+ 0x002136f97aeb0e73ULL, 0x000cac8268a4afe2ULL,
+ 0x0022fd218da471b3ULL, 0x009dcd8dfff8def9ULL,
+ 0x00cb9f8181d999bbULL, 0x00143ae56edea349ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x0000623bf87622c5ULL, 0x00a1966fdd069496ULL,
+ 0x00c315b7b812f9fcULL, 0x00bdf5efcd128b97ULL,
+ 0x001d464f532e3e16ULL, 0x003cd94f081bfd7eULL,
+ 0x00ed9dae12ce4009ULL, 0x002756f5736eee70ULL)},
+ {FIELD_LITERAL(0x00a5187e6ee7341bULL, 0x00e6d52e82d83b6eULL,
+ 0x00df3c41323094a7ULL, 0x00b3324f444e9de9ULL,
+ 0x00689eb21a35bfe5ULL, 0x00f16363becd548dULL,
+ 0x00e187cc98e7f60fULL, 0x00127d9062f0ccabULL)},
+ {FIELD_LITERAL(0x004ad71b31c29e40ULL, 0x00a5fcace12fae29ULL,
+ 0x004425b5597280edULL, 0x00e7ef5d716c3346ULL,
+ 0x0010b53ada410ac8ULL, 0x0092310226060c9bULL,
+ 0x0091c26128729c7eULL, 0x0088b42900f8ec3bULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00f1e26e9762d4a8ULL, 0x00d9d74082183414ULL,
+ 0x00ffec9bd57a0282ULL, 0x000919e128fd497aULL,
+ 0x00ab7ae7d00fe5f8ULL, 0x0054dc442851ff68ULL,
+ 0x00c9ebeb3b861687ULL, 0x00507f7cab8b698fULL)},
+ {FIELD_LITERAL(0x00c13c5aae3ae341ULL, 0x009c6c9ed98373e7ULL,
+ 0x00098f26864577a8ULL, 0x0015b886e9488b45ULL,
+ 0x0037692c42aadba5ULL, 0x00b83170b8e7791cULL,
+ 0x001670952ece1b44ULL, 0x00fd932a39276da2ULL)},
+ {FIELD_LITERAL(0x0081a3259bef3398ULL, 0x005480fff416107bULL,
+ 0x00ce4f607d21be98ULL, 0x003ffc084b41df9bULL,
+ 0x0043d0bb100502d1ULL, 0x00ec35f575ba3261ULL,
+ 0x00ca18f677300ef3ULL, 0x00e8bb0a827d8548ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00df76b3328ada72ULL, 0x002e20621604a7c2ULL,
+ 0x00f910638a105b09ULL, 0x00ef4724d96ef2cdULL,
+ 0x00377d83d6b8a2f7ULL, 0x00b4f48805ade324ULL,
+ 0x001cd5da8b152018ULL, 0x0045af671a20ca7fULL)},
+ {FIELD_LITERAL(0x009ae3b93a56c404ULL, 0x004a410b7a456699ULL,
+ 0x00023a619355e6b2ULL, 0x009cdc7297387257ULL,
+ 0x0055b94d4ae70d04ULL, 0x002cbd607f65b005ULL,
+ 0x003208b489697166ULL, 0x00ea2aa058867370ULL)},
+ {FIELD_LITERAL(0x00f29d2598ee3f32ULL, 0x00b4ac5385d82adcULL,
+ 0x007633eaf04df19bULL, 0x00aa2d3d77ceab01ULL,
+ 0x004a2302fcbb778aULL, 0x00927f225d5afa34ULL,
+ 0x004a8e9d5047f237ULL, 0x008224ae9dbce530ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x001cf640859b02f8ULL, 0x00758d1d5d5ce427ULL,
+ 0x00763c784ef4604cULL, 0x005fa81aee205270ULL,
+ 0x00ac537bfdfc44cbULL, 0x004b919bd342d670ULL,
+ 0x00238508d9bf4b7aULL, 0x00154888795644f3ULL)},
+ {FIELD_LITERAL(0x00c845923c084294ULL, 0x00072419a201bc25ULL,
+ 0x0045f408b5f8e669ULL, 0x00e9d6a186b74dfeULL,
+ 0x00e19108c68fa075ULL, 0x0017b91d874177b7ULL,
+ 0x002f0ca2c7912c5aULL, 0x009400aa385a90a2ULL)},
+ {FIELD_LITERAL(0x0071110b01482184ULL, 0x00cfed0044f2bef8ULL,
+ 0x0034f2901cf4662eULL, 0x003b4ae2a67f9834ULL,
+ 0x00cca9b96fe94810ULL, 0x00522507ae77abd0ULL,
+ 0x00bac7422721e73eULL, 0x0066622b0f3a62b0ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00f8ac5cf4705b6aULL, 0x00867d82dcb457e3ULL,
+ 0x007e13ab2ccc2ce9ULL, 0x009ee9a018d3930eULL,
+ 0x008370f8ecb42df8ULL, 0x002d9f019add263eULL,
+ 0x003302385b92d196ULL, 0x00a15654536e2c0cULL)},
+ {FIELD_LITERAL(0x0026ef1614e160afULL, 0x00c023f9edfc9c76ULL,
+ 0x00cff090da5f57baULL, 0x0076db7a66643ae9ULL,
+ 0x0019462f8c646999ULL, 0x008fec00b3854b22ULL,
+ 0x00d55041692a0a1cULL, 0x0065db894215ca00ULL)},
+ {FIELD_LITERAL(0x00a925036e0a451cULL, 0x002a0390c36b6cc1ULL,
+ 0x00f27020d90894f4ULL, 0x008d90d52cbd3d7fULL,
+ 0x00e1d0137392f3b8ULL, 0x00f017c158b51a8fULL,
+ 0x00cac313d3ed7dbcULL, 0x00b99a81e3eb42d3ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00b54850275fe626ULL, 0x0053a3fd1ec71140ULL,
+ 0x00e3d2d7dbe096faULL, 0x00e4ac7b595cce4cULL,
+ 0x0077bad449c0a494ULL, 0x00b7c98814afd5b3ULL,
+ 0x0057226f58486cf9ULL, 0x00b1557154f0cc57ULL)},
+ {FIELD_LITERAL(0x008cc9cd236315c0ULL, 0x0031d9c5b39fda54ULL,
+ 0x00a5713ef37e1171ULL, 0x00293d5ae2886325ULL,
+ 0x00c4aba3e05015e1ULL, 0x0003f35ef78e4fc6ULL,
+ 0x0039d6bd3ac1527bULL, 0x0019d7c3afb77106ULL)},
+ {FIELD_LITERAL(0x007b162931a985afULL, 0x00ad40a2e0daa713ULL,
+ 0x006df27c4009f118ULL, 0x00503e9f4e2e8becULL,
+ 0x00751a77c82c182dULL, 0x000298937769245bULL,
+ 0x00ffb1e8fabf9ee5ULL, 0x0008334706e09abeULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00dbca4e98a7dcd9ULL, 0x00ee29cfc78bde99ULL,
+ 0x00e4a3b6995f52e9ULL, 0x0045d70189ae8096ULL,
+ 0x00fd2a8a3b9b0d1bULL, 0x00af1793b107d8e1ULL,
+ 0x00dbf92cbe4afa20ULL, 0x00da60f798e3681dULL)},
+ {FIELD_LITERAL(0x004246bfcecc627aULL, 0x004ba431246c03a4ULL,
+ 0x00bd1d101872d497ULL, 0x003b73d3f185ee16ULL,
+ 0x001feb2e2678c0e3ULL, 0x00ff13c5a89dec76ULL,
+ 0x00ed06042e771d8fULL, 0x00a4fd2a897a83ddULL)},
+ {FIELD_LITERAL(0x009a4a3be50d6597ULL, 0x00de3165fc5a1096ULL,
+ 0x004f3f56e345b0c7ULL, 0x00f7bf721d5ab8bcULL,
+ 0x004313e47b098c50ULL, 0x00e4c7d5c0e1adbbULL,
+ 0x002e3e3db365051eULL, 0x00a480c2cd6a96fbULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00417fa30a7119edULL, 0x00af257758419751ULL,
+ 0x00d358a487b463d4ULL, 0x0089703cc720b00dULL,
+ 0x00ce56314ff7f271ULL, 0x0064db171ade62c1ULL,
+ 0x00640b36d4a22fedULL, 0x00424eb88696d23fULL)},
+ {FIELD_LITERAL(0x004ede34af2813f3ULL, 0x00d4a8e11c9e8216ULL,
+ 0x004796d5041de8a5ULL, 0x00c4c6b4d21cc987ULL,
+ 0x00e8a433ee07fa1eULL, 0x0055720b5abcc5a1ULL,
+ 0x008873ea9c74b080ULL, 0x005b3fec1ab65d48ULL)},
+ {FIELD_LITERAL(0x0047e5277db70ec5ULL, 0x000a096c66db7d6bULL,
+ 0x00b4164cc1730159ULL, 0x004a9f783fe720feULL,
+ 0x00a8177b94449dbcULL, 0x0095a24ff49a599fULL,
+ 0x0069c1c578250cbcULL, 0x00452019213debf4ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x0021ce99e09ebda3ULL, 0x00fcbd9f91875ad0ULL,
+ 0x009bbf6b7b7a0b5fULL, 0x00388886a69b1940ULL,
+ 0x00926a56d0f81f12ULL, 0x00e12903c3358d46ULL,
+ 0x005dfce4e8e1ce9dULL, 0x0044cfa94e2f7e23ULL)},
+ {FIELD_LITERAL(0x001bd59c09e982eaULL, 0x00f72daeb937b289ULL,
+ 0x0018b76dca908e0eULL, 0x00edb498512384adULL,
+ 0x00ce0243b6cc9538ULL, 0x00f96ff690cb4e70ULL,
+ 0x007c77bf9f673c8dULL, 0x005bf704c088a528ULL)},
+ {FIELD_LITERAL(0x0093d4628dcb33beULL, 0x0095263d51d42582ULL,
+ 0x0049b3222458fe06ULL, 0x00e7fce73b653a7fULL,
+ 0x003ca2ebce60b369ULL, 0x00c5de239a32bea4ULL,
+ 0x0063b8b3d71fb6bfULL, 0x0039aeeb78a1a839ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x007dc52da400336cULL, 0x001fded1e15b9457ULL,
+ 0x00902e00f5568e3aULL, 0x00219bef40456d2dULL,
+ 0x005684161fb3dbc9ULL, 0x004a4e9be49a76eaULL,
+ 0x006e685ae88b78ffULL, 0x0021c42f13042d3cULL)},
+ {FIELD_LITERAL(0x00fb22bb5fd3ce50ULL, 0x0017b48aada7ae54ULL,
+ 0x00fd5c44ad19a536ULL, 0x000ccc4e4e55e45cULL,
+ 0x00fd637d45b4c3f5ULL, 0x0038914e023c37cfULL,
+ 0x00ac1881d6a8d898ULL, 0x00611ed8d3d943a8ULL)},
+ {FIELD_LITERAL(0x0056e2259d113d2bULL, 0x00594819b284ec16ULL,
+ 0x00c7bf794bb36696ULL, 0x00721ee75097cdc6ULL,
+ 0x00f71be9047a2892ULL, 0x00df6ba142564edfULL,
+ 0x0069580b7a184e8dULL, 0x00f056e38fca0feeULL)},
+ }}, {{
+ {FIELD_LITERAL(0x009df98566a18c6dULL, 0x00cf3a200968f219ULL,
+ 0x0044ba60da6d9086ULL, 0x00dbc9c0e344da03ULL,
+ 0x000f9401c4466855ULL, 0x00d46a57c5b0a8d1ULL,
+ 0x00875a635d7ac7c6ULL, 0x00ef4a933b7e0ae6ULL)},
+ {FIELD_LITERAL(0x005e8694077a1535ULL, 0x008bef75f71c8f1dULL,
+ 0x000a7c1316423511ULL, 0x00906e1d70604320ULL,
+ 0x003fc46c1a2ffbd6ULL, 0x00d1d5022e68f360ULL,
+ 0x002515fba37bbf46ULL, 0x00ca16234e023b44ULL)},
+ {FIELD_LITERAL(0x00787c99561f4690ULL, 0x00a857a8c1561f27ULL,
+ 0x00a10df9223c09feULL, 0x00b98a9562e3b154ULL,
+ 0x004330b8744c3ed2ULL, 0x00e06812807ec5c4ULL,
+ 0x00e4cf6a7db9f1e3ULL, 0x00d95b089f132a34ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x002922b39ca33eecULL, 0x0090d12a5f3ab194ULL,
+ 0x00ab60c02fb5f8edULL, 0x00188d292abba1cfULL,
+ 0x00e10edec9698f6eULL, 0x0069a4d9934133c8ULL,
+ 0x0024aac40e6d3d06ULL, 0x001702c2177661b0ULL)},
+ {FIELD_LITERAL(0x00139078397030bdULL, 0x000e3c447e859a00ULL,
+ 0x0064a5b334c82393ULL, 0x00b8aabeb7358093ULL,
+ 0x00020778bb9ae73bULL, 0x0032ee94c7892a18ULL,
+ 0x008215253cb41bdaULL, 0x005e2797593517aeULL)},
+ {FIELD_LITERAL(0x0083765a5f855d4aULL, 0x0051b6d1351b8ee2ULL,
+ 0x00116de548b0f7bbULL, 0x0087bd88703affa0ULL,
+ 0x0095b2cc34d7fdd2ULL, 0x0084cd81b53f0bc8ULL,
+ 0x008562fc995350edULL, 0x00a39abb193651e3ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x0019e23f0474b114ULL, 0x00eb94c2ad3b437eULL,
+ 0x006ddb34683b75acULL, 0x00391f9209b564c6ULL,
+ 0x00083b3bb3bff7aaULL, 0x00eedcd0f6dceefcULL,
+ 0x00b50817f794fe01ULL, 0x0036474deaaa75c9ULL)},
+ {FIELD_LITERAL(0x0091868594265aa2ULL, 0x00797accae98ca6dULL,
+ 0x0008d8c5f0f8a184ULL, 0x00d1f4f1c2b2fe6eULL,
+ 0x0036783dfb48a006ULL, 0x008c165120503527ULL,
+ 0x0025fd780058ce9bULL, 0x0068beb007be7d27ULL)},
+ {FIELD_LITERAL(0x00d0ff88aa7c90c2ULL, 0x00b2c60dacf53394ULL,
+ 0x0094a7284d9666d6ULL, 0x00bed9022ce7a19dULL,
+ 0x00c51553f0cd7682ULL, 0x00c3fb870b124992ULL,
+ 0x008d0bc539956c9bULL, 0x00fc8cf258bb8885ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x003667bf998406f8ULL, 0x0000115c43a12975ULL,
+ 0x001e662f3b20e8fdULL, 0x0019ffa534cb24ebULL,
+ 0x00016be0dc8efb45ULL, 0x00ff76a8b26243f5ULL,
+ 0x00ae20d241a541e3ULL, 0x0069bd6af13cd430ULL)},
+ {FIELD_LITERAL(0x0045fdc16487cda3ULL, 0x00b2d8e844cf2ed7ULL,
+ 0x00612c50e88c1607ULL, 0x00a08aabc66c1672ULL,
+ 0x006031fdcbb24d97ULL, 0x001b639525744b93ULL,
+ 0x004409d62639ab17ULL, 0x00a1853d0347ab1dULL)},
+ {FIELD_LITERAL(0x0075a1a56ebf5c21ULL, 0x00a3e72be9ac53edULL,
+ 0x00efcde1629170c2ULL, 0x0004225fe91ef535ULL,
+ 0x0088049fc73dfda7ULL, 0x004abc74857e1288ULL,
+ 0x0024e2434657317cULL, 0x00d98cb3d3e5543cULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00b4b53eab6bdb19ULL, 0x009b22d8b43711d0ULL,
+ 0x00d948b9d961785dULL, 0x00cb167b6f279eadULL,
+ 0x00191de3a678e1c9ULL, 0x00d9dd9511095c2eULL,
+ 0x00f284324cd43067ULL, 0x00ed74fa535151ddULL)},
+ {FIELD_LITERAL(0x007e32c049b5c477ULL, 0x009d2bfdbd9bcfd8ULL,
+ 0x00636e93045938c6ULL, 0x007fde4af7687298ULL,
+ 0x0046a5184fafa5d3ULL, 0x0079b1e7f13a359bULL,
+ 0x00875adf1fb927d6ULL, 0x00333e21c61bcad2ULL)},
+ {FIELD_LITERAL(0x00048014f73d8b8dULL, 0x0075684aa0966388ULL,
+ 0x0092be7df06dc47cULL, 0x0097cebcd0f5568aULL,
+ 0x005a7004d9c4c6a9ULL, 0x00b0ecbb659924c7ULL,
+ 0x00d90332dd492a7cULL, 0x0057fc14df11493dULL)},
+ }}, {{
+ {FIELD_LITERAL(0x0008ed8ea0ad95beULL, 0x0041d324b9709645ULL,
+ 0x00e25412257a19b4ULL, 0x0058df9f3423d8d2ULL,
+ 0x00a9ab20def71304ULL, 0x009ae0dbf8ac4a81ULL,
+ 0x00c9565977e4392aULL, 0x003c9269444baf55ULL)},
+ {FIELD_LITERAL(0x007df6cbb926830bULL, 0x00d336058ae37865ULL,
+ 0x007af47dac696423ULL, 0x0048d3011ec64ac8ULL,
+ 0x006b87666e40049fULL, 0x0036a2e0e51303d7ULL,
+ 0x00ba319bd79dbc55ULL, 0x003e2737ecc94f53ULL)},
+ {FIELD_LITERAL(0x00d296ff726272d9ULL, 0x00f6d097928fcf57ULL,
+ 0x00e0e616a55d7013ULL, 0x00deaf454ed9eac7ULL,
+ 0x0073a56bedef4d92ULL, 0x006ccfdf6fc92e19ULL,
+ 0x009d1ee1371a7218ULL, 0x00ee3c2ee4462d80ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00437bce9bccdf9dULL, 0x00e0c8e2f85dc0a3ULL,
+ 0x00c91a7073995a19ULL, 0x00856ec9fe294559ULL,
+ 0x009e4b33394b156eULL, 0x00e245b0dc497e5cULL,
+ 0x006a54e687eeaeffULL, 0x00f1cd1cd00fdb7cULL)},
+ {FIELD_LITERAL(0x008132ae5c5d8cd1ULL, 0x00121d68324a1d9fULL,
+ 0x00d6be9dafcb8c76ULL, 0x00684d9070edf745ULL,
+ 0x00519fbc96d7448eULL, 0x00388182fdc1f27eULL,
+ 0x000235baed41f158ULL, 0x00bf6cf6f1a1796aULL)},
+ {FIELD_LITERAL(0x002adc4b4d148219ULL, 0x003084ada0d3a90aULL,
+ 0x0046de8aab0f2e4eULL, 0x00452d342a67b5fdULL,
+ 0x00d4b50f01d4de21ULL, 0x00db6d9fc0cefb79ULL,
+ 0x008c184c86a462cdULL, 0x00e17c83764d42daULL)},
+ }}, {{
+ {FIELD_LITERAL(0x007b2743b9a1e01aULL, 0x007847ffd42688c4ULL,
+ 0x006c7844d610a316ULL, 0x00f0cb8b250aa4b0ULL,
+ 0x00a19060143b3ae6ULL, 0x0014eb10b77cfd80ULL,
+ 0x000170905729dd06ULL, 0x00063b5b9cd72477ULL)},
+ {FIELD_LITERAL(0x00ce382dc7993d92ULL, 0x00021153e938b4c8ULL,
+ 0x00096f7567f48f51ULL, 0x0058f81ddfe4b0d5ULL,
+ 0x00cc379a56b355c7ULL, 0x002c760770d3e819ULL,
+ 0x00ee22d1d26e5a40ULL, 0x00de6d93d5b082d7ULL)},
+ {FIELD_LITERAL(0x000a91a42c52e056ULL, 0x00185f6b77fce7eaULL,
+ 0x000803c51962f6b5ULL, 0x0022528582ba563dULL,
+ 0x0043f8040e9856d6ULL, 0x0085a29ec81fb860ULL,
+ 0x005f9a611549f5ffULL, 0x00c1f974ecbd4b06ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x005b64c6fd65ec97ULL, 0x00c1fdd7f877bc7fULL,
+ 0x000d9cc6c89f841cULL, 0x005c97b7f1aff9adULL,
+ 0x0075e3c61475d47eULL, 0x001ecb1ba8153011ULL,
+ 0x00fe7f1c8d71d40dULL, 0x003fa9757a229832ULL)},
+ {FIELD_LITERAL(0x00ffc5c89d2b0cbaULL, 0x00d363d42e3e6fc3ULL,
+ 0x0019a1a0118e2e8aULL, 0x00f7baeff48882e1ULL,
+ 0x001bd5af28c6b514ULL, 0x0055476ca2253cb2ULL,
+ 0x00d8eb1977e2ddf3ULL, 0x00b173b1adb228a1ULL)},
+ {FIELD_LITERAL(0x00f2cb99dd0ad707ULL, 0x00e1e08b6859ddd8ULL,
+ 0x000008f2d0650bccULL, 0x00d7ed392f8615c3ULL,
+ 0x00976750a94da27fULL, 0x003e83bb0ecb69baULL,
+ 0x00df8e8d15c14ac6ULL, 0x00f9f7174295d9c2ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00f11cc8e0e70bcbULL, 0x00e5dc689974e7ddULL,
+ 0x0014e409f9ee5870ULL, 0x00826e6689acbd63ULL,
+ 0x008a6f4e3d895d88ULL, 0x00b26a8da41fd4adULL,
+ 0x000fb7723f83efd7ULL, 0x009c749db0a5f6c3ULL)},
+ {FIELD_LITERAL(0x002389319450f9baULL, 0x003677f31aa1250aULL,
+ 0x0092c3db642f38cbULL, 0x00f8b64c0dfc9773ULL,
+ 0x00cd49fe3505b795ULL, 0x0068105a4090a510ULL,
+ 0x00df0ba2072a8bb6ULL, 0x00eb396143afd8beULL)},
+ {FIELD_LITERAL(0x00a0d4ecfb24cdffULL, 0x00ddaf8008ba6479ULL,
+ 0x00f0b3e36d4b0f44ULL, 0x003734bd3af1f146ULL,
+ 0x00b87e2efc75527eULL, 0x00d230df55ddab50ULL,
+ 0x002613257ae56c1dULL, 0x00bc0946d135934dULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00468711bd994651ULL, 0x0033108fa67561bfULL,
+ 0x0089d760192a54b4ULL, 0x00adc433de9f1871ULL,
+ 0x000467d05f36e050ULL, 0x007847e0f0579f7fULL,
+ 0x00a2314ad320052dULL, 0x00b3a93649f0b243ULL)},
+ {FIELD_LITERAL(0x0067f8f0c4fe26c9ULL, 0x0079c4a3cc8f67b9ULL,
+ 0x0082b1e62f23550dULL, 0x00f2d409caefd7f5ULL,
+ 0x0080e67dcdb26e81ULL, 0x0087ae993ea1f98aULL,
+ 0x00aa108becf61d03ULL, 0x001acf11efb608a3ULL)},
+ {FIELD_LITERAL(0x008225febbab50d9ULL, 0x00f3b605e4dd2083ULL,
+ 0x00a32b28189e23d2ULL, 0x00d507e5e5eb4c97ULL,
+ 0x005a1a84e302821fULL, 0x0006f54c1c5f08c7ULL,
+ 0x00a347c8cb2843f0ULL, 0x0009f73e9544bfa5ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x006c59c9ae744185ULL, 0x009fc32f1b4282cdULL,
+ 0x004d6348ca59b1acULL, 0x00105376881be067ULL,
+ 0x00af4096013147dcULL, 0x004abfb5a5cb3124ULL,
+ 0x000d2a7f8626c354ULL, 0x009c6ed568e07431ULL)},
+ {FIELD_LITERAL(0x00e828333c297f8bULL, 0x009ef3cf8c3f7e1fULL,
+ 0x00ab45f8fff31cb9ULL, 0x00c8b4178cb0b013ULL,
+ 0x00d0c50dd3260a3fULL, 0x0097126ac257f5bcULL,
+ 0x0042376cc90c705aULL, 0x001d96fdb4a1071eULL)},
+ {FIELD_LITERAL(0x00542d44d89ee1a8ULL, 0x00306642e0442d98ULL,
+ 0x0090853872b87338ULL, 0x002362cbf22dc044ULL,
+ 0x002c222adff663b8ULL, 0x0067c924495fcb79ULL,
+ 0x000e621d983c977cULL, 0x00df77a9eccb66fbULL)},
+ }}, {{
+ {FIELD_LITERAL(0x002809e4bbf1814aULL, 0x00b9e854f9fafb32ULL,
+ 0x00d35e67c10f7a67ULL, 0x008f1bcb76e748cfULL,
+ 0x004224d9515687d2ULL, 0x005ba0b774e620c4ULL,
+ 0x00b5e57db5d54119ULL, 0x00e15babe5683282ULL)},
+ {FIELD_LITERAL(0x00832d02369b482cULL, 0x00cba52ff0d93450ULL,
+ 0x003fa9c908d554dbULL, 0x008d1e357b54122fULL,
+ 0x00abd91c2dc950c6ULL, 0x007eff1df4c0ec69ULL,
+ 0x003f6aeb13fb2d31ULL, 0x00002d6179fc5b2cULL)},
+ {FIELD_LITERAL(0x0046c9eda81c9c89ULL, 0x00b60cb71c8f62fcULL,
+ 0x0022f5a683baa558ULL, 0x00f87319fccdf997ULL,
+ 0x009ca09b51ce6a22ULL, 0x005b12baf4af7d77ULL,
+ 0x008a46524a1e33e2ULL, 0x00035a77e988be0dULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00a7efe46a7dbe2fULL, 0x002f66fd55014fe7ULL,
+ 0x006a428afa1ff026ULL, 0x0056caaa9604ab72ULL,
+ 0x0033f3bcd7fac8aeULL, 0x00ccb1aa01c86764ULL,
+ 0x00158d1edf13bf40ULL, 0x009848ee76fcf3b4ULL)},
+ {FIELD_LITERAL(0x00a9e7730a819691ULL, 0x00d9cc73c4992b70ULL,
+ 0x00e299bde067de5aULL, 0x008c314eb705192aULL,
+ 0x00e7226f17e8a3ccULL, 0x0029dfd956e65a47ULL,
+ 0x0053a8e839073b12ULL, 0x006f942b2ab1597eULL)},
+ {FIELD_LITERAL(0x001c3d780ecd5e39ULL, 0x0094f247fbdcc5feULL,
+ 0x00d5c786fd527764ULL, 0x00b6f4da74f0db2aULL,
+ 0x0080f1f8badcd5fcULL, 0x00f36a373ad2e23bULL,
+ 0x00f804f9f4343bf2ULL, 0x00d1af40ec623982ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x0082aeace5f1b144ULL, 0x00f68b3108cf4dd3ULL,
+ 0x00634af01dde3020ULL, 0x000beab5df5c2355ULL,
+ 0x00e8b790d1b49b0bULL, 0x00e48d15854e36f4ULL,
+ 0x0040ab2d95f3db9fULL, 0x002711c4ed9e899aULL)},
+ {FIELD_LITERAL(0x0039343746531ebeULL, 0x00c8509d835d429dULL,
+ 0x00e79eceff6b0018ULL, 0x004abfd31e8efce5ULL,
+ 0x007bbfaaa1e20210ULL, 0x00e3be89c193e179ULL,
+ 0x001c420f4c31d585ULL, 0x00f414a315bef5aeULL)},
+ {FIELD_LITERAL(0x007c296a24990df8ULL, 0x00d5d07525a75588ULL,
+ 0x00dd8e113e94b7e7ULL, 0x007bbc58febe0cc8ULL,
+ 0x0029f51af9bfcad3ULL, 0x007e9311ec7ab6f3ULL,
+ 0x009a884de1676343ULL, 0x0050d5f2dce84be9ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x005fa020cca2450aULL, 0x00491c29db6416d8ULL,
+ 0x0037cefe3f9f9a85ULL, 0x003d405230647066ULL,
+ 0x0049e835f0fdbe89ULL, 0x00feb78ac1a0815cULL,
+ 0x00828e4b32dc9724ULL, 0x00db84f2dc8d6fd4ULL)},
+ {FIELD_LITERAL(0x0098cddc8b39549aULL, 0x006da37e3b05d22cULL,
+ 0x00ce633cfd4eb3cbULL, 0x00fda288ef526acdULL,
+ 0x0025338878c5d30aULL, 0x00f34438c4e5a1b4ULL,
+ 0x00584efea7c310f1ULL, 0x0041a551f1b660adULL)},
+ {FIELD_LITERAL(0x00d7f7a8fbd6437aULL, 0x0062872413bf3753ULL,
+ 0x00ad4bbcb43c584bULL, 0x007fe49be601d7e3ULL,
+ 0x0077c659789babf4ULL, 0x00eb45fcb06a741bULL,
+ 0x005ce244913f9708ULL, 0x0088426401736326ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x007bf562ca768d7cULL, 0x006c1f3a174e387cULL,
+ 0x00f024b447fee939ULL, 0x007e7af75f01143fULL,
+ 0x003adb70b4eed89dULL, 0x00e43544021ad79aULL,
+ 0x0091f7f7042011f6ULL, 0x0093c1a1ee3a0ddcULL)},
+ {FIELD_LITERAL(0x00a0b68ec1eb72d2ULL, 0x002c03235c0d45a0ULL,
+ 0x00553627323fe8c5ULL, 0x006186e94b17af94ULL,
+ 0x00a9906196e29f14ULL, 0x0025b3aee6567733ULL,
+ 0x007e0dd840080517ULL, 0x0018eb5801a4ba93ULL)},
+ {FIELD_LITERAL(0x00d7fe7017bf6a40ULL, 0x006e3f0624be0c42ULL,
+ 0x00ffbba205358245ULL, 0x00f9fc2cf8194239ULL,
+ 0x008d93b37bf15b4eULL, 0x006ddf2e38be8e95ULL,
+ 0x002b6e79bf5fcff9ULL, 0x00ab355da425e2deULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00938f97e20be973ULL, 0x0099141a36aaf306ULL,
+ 0x0057b0ca29e545a1ULL, 0x0085db571f9fbc13ULL,
+ 0x008b333c554b4693ULL, 0x0043ab6ef3e241cbULL,
+ 0x0054fb20aa1e5c70ULL, 0x00be0ff852760adfULL)},
+ {FIELD_LITERAL(0x003973d8938971d6ULL, 0x002aca26fa80c1f5ULL,
+ 0x00108af1faa6b513ULL, 0x00daae275d7924e6ULL,
+ 0x0053634ced721308ULL, 0x00d2355fe0bbd443ULL,
+ 0x00357612b2d22095ULL, 0x00f9bb9dd4136cf3ULL)},
+ {FIELD_LITERAL(0x002bff12cf5e03a5ULL, 0x001bdb1fa8a19cf8ULL,
+ 0x00c91c6793f84d39ULL, 0x00f869f1b2eba9afULL,
+ 0x0059bc547dc3236bULL, 0x00d91611d6d38689ULL,
+ 0x00e062daaa2c0214ULL, 0x00ed3c047cc2bc82ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x000050d70c32b31aULL, 0x001939d576d437b3ULL,
+ 0x00d709e598bf9fe6ULL, 0x00a885b34bd2ee9eULL,
+ 0x00dd4b5c08ab1a50ULL, 0x0091bebd50b55639ULL,
+ 0x00cf79ff64acdbc6ULL, 0x006067a39d826336ULL)},
+ {FIELD_LITERAL(0x0062dd0fb31be374ULL, 0x00fcc96b84c8e727ULL,
+ 0x003f64f1375e6ae3ULL, 0x0057d9b6dd1af004ULL,
+ 0x00d6a167b1103c7bULL, 0x00dd28f3180fb537ULL,
+ 0x004ff27ad7167128ULL, 0x008934c33461f2acULL)},
+ {FIELD_LITERAL(0x0065b472b7900043ULL, 0x00ba7efd2ff1064bULL,
+ 0x000b67d6c4c3020fULL, 0x0012d28469f4e46dULL,
+ 0x0031c32939703ec7ULL, 0x00b49f0bce133066ULL,
+ 0x00f7e10416181d47ULL, 0x005c90f51867eeccULL)},
+ }}, {{
+ {FIELD_LITERAL(0x0051207abd179101ULL, 0x00fc2a5c20d9c5daULL,
+ 0x00fb9d5f2701b6dfULL, 0x002dd040fdea82b8ULL,
+ 0x00f163b0738442ffULL, 0x00d9736bd68855b8ULL,
+ 0x00e0d8e93005e61cULL, 0x00df5a40b3988570ULL)},
+ {FIELD_LITERAL(0x0006918f5dfce6dcULL, 0x00d4bf1c793c57fbULL,
+ 0x0069a3f649435364ULL, 0x00e89a50e5b0cd6eULL,
+ 0x00b9f6a237e973afULL, 0x006d4ed8b104e41dULL,
+ 0x00498946a3924cd2ULL, 0x00c136ec5ac9d4f7ULL)},
+ {FIELD_LITERAL(0x0011a9c290ac5336ULL, 0x002b9a2d4a6a6533ULL,
+ 0x009a8a68c445d937ULL, 0x00361b27b07e5e5cULL,
+ 0x003c043b1755b974ULL, 0x00b7eb66cf1155eeULL,
+ 0x0077af5909eefff2ULL, 0x0098f609877cc806ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00ab13af436bf8f4ULL, 0x000bcf0a0dac8574ULL,
+ 0x00d50c864f705045ULL, 0x00c40e611debc842ULL,
+ 0x0085010489bd5caaULL, 0x007c5050acec026fULL,
+ 0x00f67d943c8da6d1ULL, 0x00de1da0278074c6ULL)},
+ {FIELD_LITERAL(0x00b373076597455fULL, 0x00e83f1af53ac0f5ULL,
+ 0x0041f63c01dc6840ULL, 0x0097dea19b0c6f4bULL,
+ 0x007f9d63b4c1572cULL, 0x00e692d492d0f5f0ULL,
+ 0x00cbcb392e83b4adULL, 0x0069c0f39ed9b1a8ULL)},
+ {FIELD_LITERAL(0x00861030012707c9ULL, 0x009fbbdc7fd4aafbULL,
+ 0x008f591d6b554822ULL, 0x00df08a41ea18adeULL,
+ 0x009d7d83e642abeaULL, 0x0098c71bda3b78ffULL,
+ 0x0022c89e7021f005ULL, 0x0044d29a3fe1e3c4ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00e748cd7b5c52f2ULL, 0x00ea9df883f89cc3ULL,
+ 0x0018970df156b6c7ULL, 0x00c5a46c2a33a847ULL,
+ 0x00cbde395e32aa09ULL, 0x0072474ebb423140ULL,
+ 0x00fb00053086a23dULL, 0x001dafcfe22d4e1fULL)},
+ {FIELD_LITERAL(0x00c903ee6d825540ULL, 0x00add6c4cf98473eULL,
+ 0x007636efed4227f1ULL, 0x00905124ae55e772ULL,
+ 0x00e6b38fab12ed53ULL, 0x0045e132b863fe55ULL,
+ 0x003974662edb366aULL, 0x00b1787052be8208ULL)},
+ {FIELD_LITERAL(0x00a614b00d775c7cULL, 0x00d7c78941cc7754ULL,
+ 0x00422dd68b5dabc4ULL, 0x00a6110f0167d28bULL,
+ 0x00685a309c252886ULL, 0x00b439ffd5143660ULL,
+ 0x003656e29ee7396fULL, 0x00c7c9b9ed5ad854ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x0040f7e7c5b37bf2ULL, 0x0064e4dc81181bbaULL,
+ 0x00a8767ae2a366b6ULL, 0x001496b4f90546f2ULL,
+ 0x002a28493f860441ULL, 0x0021f59513049a3aULL,
+ 0x00852d369a8b7ee3ULL, 0x00dd2e7d8b7d30a9ULL)},
+ {FIELD_LITERAL(0x00006e34a35d9fbcULL, 0x00eee4e48b2f019aULL,
+ 0x006b344743003a5fULL, 0x00541d514f04a7e3ULL,
+ 0x00e81f9ee7647455ULL, 0x005e2b916c438f81ULL,
+ 0x00116f8137b7eff0ULL, 0x009bd3decc7039d1ULL)},
+ {FIELD_LITERAL(0x0005d226f434110dULL, 0x00af8288b8ef21d5ULL,
+ 0x004a7a52ef181c8cULL, 0x00be0b781b4b06deULL,
+ 0x00e6e3627ded07e1ULL, 0x00e43aa342272b8bULL,
+ 0x00e86ab424577d84ULL, 0x00fb292c566e35bbULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00334f5303ea1222ULL, 0x00dfb3dbeb0a5d3eULL,
+ 0x002940d9592335c1ULL, 0x00706a7a63e8938aULL,
+ 0x005a533558bc4cafULL, 0x00558e33192022a9ULL,
+ 0x00970d9faf74c133ULL, 0x002979fcb63493caULL)},
+ {FIELD_LITERAL(0x00e38abece3c82abULL, 0x005a51f18a2c7a86ULL,
+ 0x009dafa2e86d592eULL, 0x00495a62eb688678ULL,
+ 0x00b79df74c0eb212ULL, 0x0023e8cc78b75982ULL,
+ 0x005998cb91075e13ULL, 0x00735aa9ba61bc76ULL)},
+ {FIELD_LITERAL(0x00d9f7a82ddbe628ULL, 0x00a1fc782889ae0fULL,
+ 0x0071ffda12d14b66ULL, 0x0037cf4eca7fb3d5ULL,
+ 0x00c80bc242c58808ULL, 0x0075bf8c2d08c863ULL,
+ 0x008d41f31afc52a7ULL, 0x00197962ecf38741ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x006e9f475cccf2eeULL, 0x00454b9cd506430cULL,
+ 0x00224a4fb79ee479ULL, 0x0062e3347ef0b5e2ULL,
+ 0x0034fd2a3512232aULL, 0x00b8b3cb0f457046ULL,
+ 0x00eb20165daa38ecULL, 0x00128eebc2d9c0f7ULL)},
+ {FIELD_LITERAL(0x00bfc5fa1e4ea21fULL, 0x00c21d7b6bb892e6ULL,
+ 0x00cf043f3acf0291ULL, 0x00c13f2f849b3c90ULL,
+ 0x00d1a97ebef10891ULL, 0x0061e130a445e7feULL,
+ 0x0019513fdedbf22bULL, 0x001d60c813bff841ULL)},
+ {FIELD_LITERAL(0x0019561c7fcf0213ULL, 0x00e3dca6843ebd77ULL,
+ 0x0068ea95b9ca920eULL, 0x009bdfb70f253595ULL,
+ 0x00c68f59186aa02aULL, 0x005aee1cca1c3039ULL,
+ 0x00ab79a8a937a1ceULL, 0x00b9a0e549959e6fULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00c79e0b6d97dfbdULL, 0x00917c71fd2bc6e8ULL,
+ 0x00db7529ccfb63d8ULL, 0x00be5be957f17866ULL,
+ 0x00a9e11fdc2cdac1ULL, 0x007b91a8e1f44443ULL,
+ 0x00a3065e4057d80fULL, 0x004825f5b8d5f6d4ULL)},
+ {FIELD_LITERAL(0x003e4964fa8a8fc8ULL, 0x00f6a1cdbcf41689ULL,
+ 0x00943cb18fe7fda7ULL, 0x00606dafbf34440aULL,
+ 0x005d37a86399c789ULL, 0x00e79a2a69417403ULL,
+ 0x00fe34f7e68b8866ULL, 0x0011f448ed2df10eULL)},
+ {FIELD_LITERAL(0x00f1f57efcc1fcc4ULL, 0x00513679117de154ULL,
+ 0x002e5b5b7c86d8c3ULL, 0x009f6486561f9cfbULL,
+ 0x00169e74b0170cf7ULL, 0x00900205af4af696ULL,
+ 0x006acfddb77853f3ULL, 0x00df184c90f31068ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00b37396c3320791ULL, 0x00fc7b67175c5783ULL,
+ 0x00c36d2cd73ecc38ULL, 0x0080ebcc0b328fc5ULL,
+ 0x0043a5b22b35d35dULL, 0x00466c9f1713c9daULL,
+ 0x0026ad346dcaa8daULL, 0x007c684e701183a6ULL)},
+ {FIELD_LITERAL(0x00fd579ffb691713ULL, 0x00b76af4f81c412dULL,
+ 0x00f239de96110f82ULL, 0x00e965fb437f0306ULL,
+ 0x00ca7e9436900921ULL, 0x00e487f1325fa24aULL,
+ 0x00633907de476380ULL, 0x00721c62ac5b8ea0ULL)},
+ {FIELD_LITERAL(0x00c0d54e542eb4f9ULL, 0x004ed657171c8dcfULL,
+ 0x00b743a4f7c2a39bULL, 0x00fd9f93ed6cc567ULL,
+ 0x00307fae3113e58bULL, 0x0058aa577c93c319ULL,
+ 0x00d254556f35b346ULL, 0x00491aada2203f0dULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00dff3103786ff34ULL, 0x000144553b1f20c3ULL,
+ 0x0095613baeb930e4ULL, 0x00098058275ea5d4ULL,
+ 0x007cd1402b046756ULL, 0x0074d74e4d58aee3ULL,
+ 0x005f93fc343ff69bULL, 0x00873df17296b3b0ULL)},
+ {FIELD_LITERAL(0x00c4a1fb48635413ULL, 0x00b5dd54423ad59fULL,
+ 0x009ff5d53fd24a88ULL, 0x003c98d267fc06a7ULL,
+ 0x002db7cb20013641ULL, 0x00bd1d6716e191f2ULL,
+ 0x006dbc8b29094241ULL, 0x0044bbf233dafa2cULL)},
+ {FIELD_LITERAL(0x0055838d41f531e6ULL, 0x00bf6a2dd03c81b2ULL,
+ 0x005827a061c4839eULL, 0x0000de2cbb36aac3ULL,
+ 0x002efa29d9717478ULL, 0x00f9e928cc8a77baULL,
+ 0x00c134b458def9efULL, 0x00958a182223fc48ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x000a9ee23c06881fULL, 0x002c727d3d871945ULL,
+ 0x00f47d971512d24aULL, 0x00671e816f9ef31aULL,
+ 0x00883af2cfaad673ULL, 0x00601f98583d6c9aULL,
+ 0x00b435f5adc79655ULL, 0x00ad87b71c04bff2ULL)},
+ {FIELD_LITERAL(0x007860d99db787cfULL, 0x00fda8983018f4a8ULL,
+ 0x008c8866bac4743cULL, 0x00ef471f84c82a3fULL,
+ 0x00abea5976d3b8e7ULL, 0x00714882896cd015ULL,
+ 0x00b49fae584ddac5ULL, 0x008e33a1a0b69c81ULL)},
+ {FIELD_LITERAL(0x007b6ee2c9e8a9ecULL, 0x002455dbbd89d622ULL,
+ 0x006490cf4eaab038ULL, 0x00d925f6c3081561ULL,
+ 0x00153b3047de7382ULL, 0x003b421f8bdceb6fULL,
+ 0x00761a4a5049da78ULL, 0x00980348c5202433ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x007f8a43da97dd5cULL, 0x00058539c800fc7bULL,
+ 0x0040f3cf5a28414aULL, 0x00d68dd0d95283d6ULL,
+ 0x004adce9da90146eULL, 0x00befa41c7d4f908ULL,
+ 0x007603bc2e3c3060ULL, 0x00bdf360ab3545dbULL)},
+ {FIELD_LITERAL(0x00eebfd4e2312cc3ULL, 0x00474b2564e4fc8cULL,
+ 0x003303ef14b1da9bULL, 0x003c93e0e66beb1dULL,
+ 0x0013619b0566925aULL, 0x008817c24d901bf3ULL,
+ 0x00b62bd8898d218bULL, 0x0075a7716f1e88a2ULL)},
+ {FIELD_LITERAL(0x0009218da1e6890fULL, 0x0026907f5fd02575ULL,
+ 0x004dabed5f19d605ULL, 0x003abf181870249dULL,
+ 0x00b52fd048cc92c4ULL, 0x00b6dd51e415a5c5ULL,
+ 0x00d9eb82bd2b4014ULL, 0x002c865a43b46b43ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x0070047189452f4cULL, 0x00f7ad12e1ce78d5ULL,
+ 0x00af1ba51ec44a8bULL, 0x005f39f63e667cd6ULL,
+ 0x00058eac4648425eULL, 0x00d7fdab42bea03bULL,
+ 0x0028576a5688de15ULL, 0x00af973209e77c10ULL)},
+ {FIELD_LITERAL(0x00c338b915d8fef0ULL, 0x00a893292045c39aULL,
+ 0x0028ab4f2eba6887ULL, 0x0060743cb519fd61ULL,
+ 0x0006213964093ac0ULL, 0x007c0b7a43f6266dULL,
+ 0x008e3557c4fa5bdaULL, 0x002da976de7b8d9dULL)},
+ {FIELD_LITERAL(0x0048729f8a8b6dcdULL, 0x00fe23b85cc4d323ULL,
+ 0x00e7384d16e4db0eULL, 0x004a423970678942ULL,
+ 0x00ec0b763345d4baULL, 0x00c477b9f99ed721ULL,
+ 0x00c29dad3777b230ULL, 0x001c517b466f7df6ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x006366c380f7b574ULL, 0x001c7d1f09ff0438ULL,
+ 0x003e20a7301f5b22ULL, 0x00d3efb1916d28f6ULL,
+ 0x0049f4f81060ce83ULL, 0x00c69d91ea43ced1ULL,
+ 0x002b6f3e5cd269edULL, 0x005b0fb22ce9ec65ULL)},
+ {FIELD_LITERAL(0x00aa2261022d883fULL, 0x00ebcca4548010acULL,
+ 0x002528512e28a437ULL, 0x0070ca7676b66082ULL,
+ 0x0084bda170f7c6d3ULL, 0x00581b4747c9b8bbULL,
+ 0x005c96a01061c7e2ULL, 0x00fb7c4a362b5273ULL)},
+ {FIELD_LITERAL(0x00c30020eb512d02ULL, 0x0060f288283a4d26ULL,
+ 0x00b7ed13becde260ULL, 0x0075ebb74220f6e9ULL,
+ 0x00701079fcfe8a1fULL, 0x001c28fcdff58938ULL,
+ 0x002e4544b8f4df6bULL, 0x0060c5bc4f1a7d73ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x00ae307cf069f701ULL, 0x005859f222dd618bULL,
+ 0x00212d6c46ec0b0dULL, 0x00a0fe4642afb62dULL,
+ 0x00420d8e4a0a8903ULL, 0x00a80ff639bdf7b0ULL,
+ 0x0019bee1490b5d8eULL, 0x007439e4b9c27a86ULL)},
+ {FIELD_LITERAL(0x00a94700032a093fULL, 0x0076e96c225216e7ULL,
+ 0x00a63a4316e45f91ULL, 0x007d8bbb4645d3b2ULL,
+ 0x00340a6ff22793ebULL, 0x006f935d4572aeb7ULL,
+ 0x00b1fb69f00afa28ULL, 0x009e8f3423161ed3ULL)},
+ {FIELD_LITERAL(0x009ef49c6b5ced17ULL, 0x00a555e6269e9f0aULL,
+ 0x007e6f1d79ec73b5ULL, 0x009ac78695a32ac4ULL,
+ 0x0001d77fbbcd5682ULL, 0x008cea1fee0aaeedULL,
+ 0x00f42bea82a53462ULL, 0x002e46ab96cafcc9ULL)},
+ }}, {{
+ {FIELD_LITERAL(0x0051cfcc5885377aULL, 0x00dce566cb1803caULL,
+ 0x00430c7643f2c7d4ULL, 0x00dce1a1337bdcc0ULL,
+ 0x0010d5bd7283c128ULL, 0x003b1b547f9b46feULL,
+ 0x000f245e37e770abULL, 0x007b72511f022b37ULL)},
+ {FIELD_LITERAL(0x0060db815bc4786cULL, 0x006fab25beedc434ULL,
+ 0x00c610d06084797cULL, 0x000c48f08537bec0ULL,
+ 0x0031aba51c5b93daULL, 0x007968fa6e01f347ULL,
+ 0x0030070da52840c6ULL, 0x00c043c225a4837fULL)},
+ {FIELD_LITERAL(0x001bcfd00649ee93ULL, 0x006dceb47e2a0fd5ULL,
+ 0x00f2cebda0cf8fd0ULL, 0x00b6b9d9d1fbdec3ULL,
+ 0x00815262e6490611ULL, 0x00ef7f5ce3176760ULL,
+ 0x00e49cd0c998d58bULL, 0x005fc6cc269ba57cULL)},
+ }}, {{
+ {FIELD_LITERAL(0x008940211aa0d633ULL, 0x00addae28136571dULL,
+ 0x00d68fdbba20d673ULL, 0x003bc6129bc9e21aULL,
+ 0x000346cf184ebe9aULL, 0x0068774d741ebc7fULL,
+ 0x0019d5e9e6966557ULL, 0x0003cbd7f981b651ULL)},
+ {FIELD_LITERAL(0x004a2902926f8d3fULL, 0x00ad79b42637ab75ULL,
+ 0x0088f60b90f2d4e8ULL, 0x0030f54ef0e398c4ULL,
+ 0x00021dc9bf99681eULL, 0x007ebf66fde74ee3ULL,
+ 0x004ade654386e9a4ULL, 0x00e7485066be4c27ULL)},
+ {FIELD_LITERAL(0x00445f1263983be0ULL, 0x004cf371dda45e6aULL,
+ 0x00744a89d5a310e7ULL, 0x001f20ce4f904833ULL,
+ 0x00e746edebe66e29ULL, 0x000912ab1f6c153dULL,
+ 0x00f61d77d9b2444cULL, 0x0001499cd6647610ULL)},
}}
}
};
@@ -1063,421 +1063,421 @@ const struct curve448_precomputed_s *curve448_precomputed_base
static const niels_t curve448_wnaf_base_table[32] = {
{{
- {FIELD_LITERAL(0x00303cda6feea532ULL, 0x00860f1d5a3850e4ULL,
- 0x00226b9fa4728ccdULL, 0x00e822938a0a0c0cULL,
- 0x00263a61c9ea9216ULL, 0x001204029321b828ULL,
- 0x006a468360983c65ULL, 0x0002846f0a782143ULL)},
- {FIELD_LITERAL(0x00303cda6feea532ULL, 0x00860f1d5a3850e4ULL,
- 0x00226b9fa4728ccdULL, 0x006822938a0a0c0cULL,
- 0x00263a61c9ea9215ULL, 0x001204029321b828ULL,
- 0x006a468360983c65ULL, 0x0082846f0a782143ULL)},
- {FIELD_LITERAL(0x00ef8e22b275198dULL, 0x00b0eb141a0b0e8bULL,
- 0x001f6789da3cb38cULL, 0x006d2ff8ed39073eULL,
- 0x00610bdb69a167f3ULL, 0x00571f306c9689b4ULL,
- 0x00f557e6f84b2df8ULL, 0x002affd38b2c86dbULL)},
+ {FIELD_LITERAL(0x00303cda6feea532ULL, 0x00860f1d5a3850e4ULL,
+ 0x00226b9fa4728ccdULL, 0x00e822938a0a0c0cULL,
+ 0x00263a61c9ea9216ULL, 0x001204029321b828ULL,
+ 0x006a468360983c65ULL, 0x0002846f0a782143ULL)},
+ {FIELD_LITERAL(0x00303cda6feea532ULL, 0x00860f1d5a3850e4ULL,
+ 0x00226b9fa4728ccdULL, 0x006822938a0a0c0cULL,
+ 0x00263a61c9ea9215ULL, 0x001204029321b828ULL,
+ 0x006a468360983c65ULL, 0x0082846f0a782143ULL)},
+ {FIELD_LITERAL(0x00ef8e22b275198dULL, 0x00b0eb141a0b0e8bULL,
+ 0x001f6789da3cb38cULL, 0x006d2ff8ed39073eULL,
+ 0x00610bdb69a167f3ULL, 0x00571f306c9689b4ULL,
+ 0x00f557e6f84b2df8ULL, 0x002affd38b2c86dbULL)},
}}, {{
- {FIELD_LITERAL(0x00cea0fc8d2e88b5ULL, 0x00821612d69f1862ULL,
- 0x0074c283b3e67522ULL, 0x005a195ba05a876dULL,
- 0x000cddfe557feea4ULL, 0x008046c795bcc5e5ULL,
- 0x00540969f4d6e119ULL, 0x00d27f96d6b143d5ULL)},
- {FIELD_LITERAL(0x000c3b1019d474e8ULL, 0x00e19533e4952284ULL,
- 0x00cc9810ba7c920aULL, 0x00f103d2785945acULL,
- 0x00bfa5696cc69b34ULL, 0x00a8d3d51e9ca839ULL,
- 0x005623cb459586b9ULL, 0x00eae7ce1cd52e9eULL)},
- {FIELD_LITERAL(0x0005a178751dd7d8ULL, 0x002cc3844c69c42fULL,
- 0x00acbfe5efe10539ULL, 0x009c20f43431a65aULL,
- 0x008435d96374a7b3ULL, 0x009ee57566877bd3ULL,
- 0x0044691725ed4757ULL, 0x001e87bb2fe2c6b2ULL)},
+ {FIELD_LITERAL(0x00cea0fc8d2e88b5ULL, 0x00821612d69f1862ULL,
+ 0x0074c283b3e67522ULL, 0x005a195ba05a876dULL,
+ 0x000cddfe557feea4ULL, 0x008046c795bcc5e5ULL,
+ 0x00540969f4d6e119ULL, 0x00d27f96d6b143d5ULL)},
+ {FIELD_LITERAL(0x000c3b1019d474e8ULL, 0x00e19533e4952284ULL,
+ 0x00cc9810ba7c920aULL, 0x00f103d2785945acULL,
+ 0x00bfa5696cc69b34ULL, 0x00a8d3d51e9ca839ULL,
+ 0x005623cb459586b9ULL, 0x00eae7ce1cd52e9eULL)},
+ {FIELD_LITERAL(0x0005a178751dd7d8ULL, 0x002cc3844c69c42fULL,
+ 0x00acbfe5efe10539ULL, 0x009c20f43431a65aULL,
+ 0x008435d96374a7b3ULL, 0x009ee57566877bd3ULL,
+ 0x0044691725ed4757ULL, 0x001e87bb2fe2c6b2ULL)},
}}, {{
- {FIELD_LITERAL(0x000cedc4debf7a04ULL, 0x002ffa45000470acULL,
- 0x002e9f9678201915ULL, 0x0017da1208c4fe72ULL,
- 0x007d558cc7d656cbULL, 0x0037a827287cf289ULL,
- 0x00142472d3441819ULL, 0x009c21f166cf8dd1ULL)},
- {FIELD_LITERAL(0x003ef83af164b2f2ULL, 0x000949a5a0525d0dULL,
- 0x00f4498186cac051ULL, 0x00e77ac09ef126d2ULL,
- 0x0073ae0b2c9296e9ULL, 0x001c163f6922e3edULL,
- 0x0062946159321beaULL, 0x00cfb79b22990b39ULL)},
- {FIELD_LITERAL(0x00b001431ca9e654ULL, 0x002d7e5eabcc9a3aULL,
- 0x0052e8114c2f6747ULL, 0x0079ac4f94487f92ULL,
- 0x00bffd919b5d749cULL, 0x00261f92ad15e620ULL,
- 0x00718397b7a97895ULL, 0x00c1443e6ebbc0c4ULL)},
+ {FIELD_LITERAL(0x000cedc4debf7a04ULL, 0x002ffa45000470acULL,
+ 0x002e9f9678201915ULL, 0x0017da1208c4fe72ULL,
+ 0x007d558cc7d656cbULL, 0x0037a827287cf289ULL,
+ 0x00142472d3441819ULL, 0x009c21f166cf8dd1ULL)},
+ {FIELD_LITERAL(0x003ef83af164b2f2ULL, 0x000949a5a0525d0dULL,
+ 0x00f4498186cac051ULL, 0x00e77ac09ef126d2ULL,
+ 0x0073ae0b2c9296e9ULL, 0x001c163f6922e3edULL,
+ 0x0062946159321beaULL, 0x00cfb79b22990b39ULL)},
+ {FIELD_LITERAL(0x00b001431ca9e654ULL, 0x002d7e5eabcc9a3aULL,
+ 0x0052e8114c2f6747ULL, 0x0079ac4f94487f92ULL,
+ 0x00bffd919b5d749cULL, 0x00261f92ad15e620ULL,
+ 0x00718397b7a97895ULL, 0x00c1443e6ebbc0c4ULL)},
}}, {{
- {FIELD_LITERAL(0x00eacd90c1e0a049ULL, 0x008977935b149fbeULL,
- 0x0004cb9ba11c93dcULL, 0x009fbd5b3470844dULL,
- 0x004bc18c9bfc22cfULL, 0x0057679a991839f3ULL,
- 0x00ef15b76fb4092eULL, 0x0074a5173a225041ULL)},
- {FIELD_LITERAL(0x003f5f9d7ec4777bULL, 0x00ab2e733c919c94ULL,
- 0x001bb6c035245ae5ULL, 0x00a325a49a883630ULL,
- 0x0033e9a9ea3cea2fULL, 0x00e442a1eaa0e844ULL,
- 0x00b2116d5b0e71b8ULL, 0x00c16abed6d64047ULL)},
- {FIELD_LITERAL(0x00c560b5ed051165ULL, 0x001945adc5d65094ULL,
- 0x00e221865710f910ULL, 0x00cc12bc9e9b8cebULL,
- 0x004faa9518914e35ULL, 0x0017476d89d42f6dULL,
- 0x00b8f637c8fa1c8bULL, 0x0088c7d2790864b8ULL)},
+ {FIELD_LITERAL(0x00eacd90c1e0a049ULL, 0x008977935b149fbeULL,
+ 0x0004cb9ba11c93dcULL, 0x009fbd5b3470844dULL,
+ 0x004bc18c9bfc22cfULL, 0x0057679a991839f3ULL,
+ 0x00ef15b76fb4092eULL, 0x0074a5173a225041ULL)},
+ {FIELD_LITERAL(0x003f5f9d7ec4777bULL, 0x00ab2e733c919c94ULL,
+ 0x001bb6c035245ae5ULL, 0x00a325a49a883630ULL,
+ 0x0033e9a9ea3cea2fULL, 0x00e442a1eaa0e844ULL,
+ 0x00b2116d5b0e71b8ULL, 0x00c16abed6d64047ULL)},
+ {FIELD_LITERAL(0x00c560b5ed051165ULL, 0x001945adc5d65094ULL,
+ 0x00e221865710f910ULL, 0x00cc12bc9e9b8cebULL,
+ 0x004faa9518914e35ULL, 0x0017476d89d42f6dULL,
+ 0x00b8f637c8fa1c8bULL, 0x0088c7d2790864b8ULL)},
}}, {{
- {FIELD_LITERAL(0x00ef7eafc1c69be6ULL, 0x0085d3855778fbeaULL,
- 0x002c8d5b450cb6f5ULL, 0x004e77de5e1e7fecULL,
- 0x0047c057893abdedULL, 0x001b430b85d51e16ULL,
- 0x00965c7b45640c3cULL, 0x00487b2bb1162b97ULL)},
- {FIELD_LITERAL(0x0099c73a311beec2ULL, 0x00a3eff38d8912adULL,
- 0x002efa9d1d7e8972ULL, 0x00f717ae1e14d126ULL,
- 0x002833f795850c8bULL, 0x0066c12ad71486bdULL,
- 0x00ae9889da4820ebULL, 0x00d6044309555c08ULL)},
- {FIELD_LITERAL(0x004b1c5283d15e41ULL, 0x00669d8ea308ff75ULL,
- 0x0004390233f762a1ULL, 0x00e1d67b83cb6cecULL,
- 0x003eebaa964c78b1ULL, 0x006b0aff965eb664ULL,
- 0x00b313d4470bdc37ULL, 0x008814ffcb3cb9d8ULL)},
+ {FIELD_LITERAL(0x00ef7eafc1c69be6ULL, 0x0085d3855778fbeaULL,
+ 0x002c8d5b450cb6f5ULL, 0x004e77de5e1e7fecULL,
+ 0x0047c057893abdedULL, 0x001b430b85d51e16ULL,
+ 0x00965c7b45640c3cULL, 0x00487b2bb1162b97ULL)},
+ {FIELD_LITERAL(0x0099c73a311beec2ULL, 0x00a3eff38d8912adULL,
+ 0x002efa9d1d7e8972ULL, 0x00f717ae1e14d126ULL,
+ 0x002833f795850c8bULL, 0x0066c12ad71486bdULL,
+ 0x00ae9889da4820ebULL, 0x00d6044309555c08ULL)},
+ {FIELD_LITERAL(0x004b1c5283d15e41ULL, 0x00669d8ea308ff75ULL,
+ 0x0004390233f762a1ULL, 0x00e1d67b83cb6cecULL,
+ 0x003eebaa964c78b1ULL, 0x006b0aff965eb664ULL,
+ 0x00b313d4470bdc37ULL, 0x008814ffcb3cb9d8ULL)},
}}, {{
- {FIELD_LITERAL(0x009724b8ce68db70ULL, 0x007678b5ed006f3dULL,
- 0x00bdf4b89c0abd73ULL, 0x00299748e04c7c6dULL,
- 0x00ddd86492c3c977ULL, 0x00c5a7febfa30a99ULL,
- 0x00ed84715b4b02bbULL, 0x00319568adf70486ULL)},
- {FIELD_LITERAL(0x0070ff2d864de5bbULL, 0x005a37eeb637ee95ULL,
- 0x0033741c258de160ULL, 0x00e6ca5cb1988f46ULL,
- 0x001ceabd92a24661ULL, 0x0030957bd500fe40ULL,
- 0x001c3362afe912c5ULL, 0x005187889f678bd2ULL)},
- {FIELD_LITERAL(0x0086835fc62bbdc7ULL, 0x009c3516ca4910a1ULL,
- 0x00956c71f8d00783ULL, 0x0095c78fcf63235fULL,
- 0x00fc7ff6ba05c222ULL, 0x00cdd8b3f8d74a52ULL,
- 0x00ac5ae16de8256eULL, 0x00e9d4be8ed48624ULL)},
+ {FIELD_LITERAL(0x009724b8ce68db70ULL, 0x007678b5ed006f3dULL,
+ 0x00bdf4b89c0abd73ULL, 0x00299748e04c7c6dULL,
+ 0x00ddd86492c3c977ULL, 0x00c5a7febfa30a99ULL,
+ 0x00ed84715b4b02bbULL, 0x00319568adf70486ULL)},
+ {FIELD_LITERAL(0x0070ff2d864de5bbULL, 0x005a37eeb637ee95ULL,
+ 0x0033741c258de160ULL, 0x00e6ca5cb1988f46ULL,
+ 0x001ceabd92a24661ULL, 0x0030957bd500fe40ULL,
+ 0x001c3362afe912c5ULL, 0x005187889f678bd2ULL)},
+ {FIELD_LITERAL(0x0086835fc62bbdc7ULL, 0x009c3516ca4910a1ULL,
+ 0x00956c71f8d00783ULL, 0x0095c78fcf63235fULL,
+ 0x00fc7ff6ba05c222ULL, 0x00cdd8b3f8d74a52ULL,
+ 0x00ac5ae16de8256eULL, 0x00e9d4be8ed48624ULL)},
}}, {{
- {FIELD_LITERAL(0x00c0ce11405df2d8ULL, 0x004e3f37b293d7b6ULL,
- 0x002410172e1ac6dbULL, 0x00b8dbff4bf8143dULL,
- 0x003a7b409d56eb66ULL, 0x003e0f6a0dfef9afULL,
- 0x0081c4e4d3645be1ULL, 0x00ce76076b127623ULL)},
- {FIELD_LITERAL(0x00f6ee0f98974239ULL, 0x0042d89af07d3a4fULL,
- 0x00846b7fe84346b5ULL, 0x006a21fc6a8d39a1ULL,
- 0x00ac8bc2541ff2d9ULL, 0x006d4e2a77732732ULL,
- 0x009a39b694cc3f2fULL, 0x0085c0aa2a404c8fULL)},
- {FIELD_LITERAL(0x00b261101a218548ULL, 0x00c1cae96424277bULL,
- 0x00869da0a77dd268ULL, 0x00bc0b09f8ec83eaULL,
- 0x00d61027f8e82ba9ULL, 0x00aa4c85999dce67ULL,
- 0x00eac3132b9f3fe1ULL, 0x00fb9b0cf1c695d2ULL)},
+ {FIELD_LITERAL(0x00c0ce11405df2d8ULL, 0x004e3f37b293d7b6ULL,
+ 0x002410172e1ac6dbULL, 0x00b8dbff4bf8143dULL,
+ 0x003a7b409d56eb66ULL, 0x003e0f6a0dfef9afULL,
+ 0x0081c4e4d3645be1ULL, 0x00ce76076b127623ULL)},
+ {FIELD_LITERAL(0x00f6ee0f98974239ULL, 0x0042d89af07d3a4fULL,
+ 0x00846b7fe84346b5ULL, 0x006a21fc6a8d39a1ULL,
+ 0x00ac8bc2541ff2d9ULL, 0x006d4e2a77732732ULL,
+ 0x009a39b694cc3f2fULL, 0x0085c0aa2a404c8fULL)},
+ {FIELD_LITERAL(0x00b261101a218548ULL, 0x00c1cae96424277bULL,
+ 0x00869da0a77dd268ULL, 0x00bc0b09f8ec83eaULL,
+ 0x00d61027f8e82ba9ULL, 0x00aa4c85999dce67ULL,
+ 0x00eac3132b9f3fe1ULL, 0x00fb9b0cf1c695d2ULL)},
}}, {{
- {FIELD_LITERAL(0x0043079295512f0dULL, 0x0046a009861758e0ULL,
- 0x003ee2842a807378ULL, 0x0034cc9d1298e4faULL,
- 0x009744eb4d31b3eeULL, 0x00afacec96650cd0ULL,
- 0x00ac891b313761aeULL, 0x00e864d6d26e708aULL)},
- {FIELD_LITERAL(0x00a84d7c8a23b491ULL, 0x0088e19aa868b27fULL,
- 0x0005986d43e78ce9ULL, 0x00f28012f0606d28ULL,
- 0x0017ded7e10249b3ULL, 0x005ed4084b23af9bULL,
- 0x00b9b0a940564472ULL, 0x00ad9056cceeb1f4ULL)},
- {FIELD_LITERAL(0x00db91b357fe755eULL, 0x00a1aa544b15359cULL,
- 0x00af4931a0195574ULL, 0x007686124fe11aefULL,
- 0x00d1ead3c7b9ef7eULL, 0x00aaf5fc580f8c15ULL,
- 0x00e727be147ee1ecULL, 0x003c61c1e1577b86ULL)},
+ {FIELD_LITERAL(0x0043079295512f0dULL, 0x0046a009861758e0ULL,
+ 0x003ee2842a807378ULL, 0x0034cc9d1298e4faULL,
+ 0x009744eb4d31b3eeULL, 0x00afacec96650cd0ULL,
+ 0x00ac891b313761aeULL, 0x00e864d6d26e708aULL)},
+ {FIELD_LITERAL(0x00a84d7c8a23b491ULL, 0x0088e19aa868b27fULL,
+ 0x0005986d43e78ce9ULL, 0x00f28012f0606d28ULL,
+ 0x0017ded7e10249b3ULL, 0x005ed4084b23af9bULL,
+ 0x00b9b0a940564472ULL, 0x00ad9056cceeb1f4ULL)},
+ {FIELD_LITERAL(0x00db91b357fe755eULL, 0x00a1aa544b15359cULL,
+ 0x00af4931a0195574ULL, 0x007686124fe11aefULL,
+ 0x00d1ead3c7b9ef7eULL, 0x00aaf5fc580f8c15ULL,
+ 0x00e727be147ee1ecULL, 0x003c61c1e1577b86ULL)},
}}, {{
- {FIELD_LITERAL(0x009d3fca983220cfULL, 0x00cd11acbc853dc4ULL,
- 0x0017590409d27f1dULL, 0x00d2176698082802ULL,
- 0x00fa01251b2838c8ULL, 0x00dd297a0d9b51c6ULL,
- 0x00d76c92c045820aULL, 0x00534bc7c46c9033ULL)},
- {FIELD_LITERAL(0x0080ed9bc9b07338ULL, 0x00fceac7745d2652ULL,
- 0x008a9d55f5f2cc69ULL, 0x0096ce72df301ac5ULL,
- 0x00f53232e7974d87ULL, 0x0071728c7ae73947ULL,
- 0x0090507602570778ULL, 0x00cb81cfd883b1b2ULL)},
- {FIELD_LITERAL(0x005011aadea373daULL, 0x003a8578ec896034ULL,
- 0x00f20a6535fa6d71ULL, 0x005152d31e5a87cfULL,
- 0x002bac1c8e68ca31ULL, 0x00b0e323db4c1381ULL,
- 0x00f1d596b7d5ae25ULL, 0x00eae458097cb4e0ULL)},
+ {FIELD_LITERAL(0x009d3fca983220cfULL, 0x00cd11acbc853dc4ULL,
+ 0x0017590409d27f1dULL, 0x00d2176698082802ULL,
+ 0x00fa01251b2838c8ULL, 0x00dd297a0d9b51c6ULL,
+ 0x00d76c92c045820aULL, 0x00534bc7c46c9033ULL)},
+ {FIELD_LITERAL(0x0080ed9bc9b07338ULL, 0x00fceac7745d2652ULL,
+ 0x008a9d55f5f2cc69ULL, 0x0096ce72df301ac5ULL,
+ 0x00f53232e7974d87ULL, 0x0071728c7ae73947ULL,
+ 0x0090507602570778ULL, 0x00cb81cfd883b1b2ULL)},
+ {FIELD_LITERAL(0x005011aadea373daULL, 0x003a8578ec896034ULL,
+ 0x00f20a6535fa6d71ULL, 0x005152d31e5a87cfULL,
+ 0x002bac1c8e68ca31ULL, 0x00b0e323db4c1381ULL,
+ 0x00f1d596b7d5ae25ULL, 0x00eae458097cb4e0ULL)},
}}, {{
- {FIELD_LITERAL(0x00920ac80f9b0d21ULL, 0x00f80f7f73401246ULL,
- 0x0086d37849b557d6ULL, 0x0002bd4b317b752eULL,
- 0x00b26463993a42bbULL, 0x002070422a73b129ULL,
- 0x00341acaa0380cb3ULL, 0x00541914dd66a1b2ULL)},
- {FIELD_LITERAL(0x00c1513cd66abe8cULL, 0x000139e01118944dULL,
- 0x0064abbcb8080bbbULL, 0x00b3b08202473142ULL,
- 0x00c629ef25da2403ULL, 0x00f0aec3310d9b7fULL,
- 0x0050b2227472d8cdULL, 0x00f6c8a922d41fb4ULL)},
- {FIELD_LITERAL(0x001075ccf26b7b1fULL, 0x00bb6bb213170433ULL,
- 0x00e9491ad262da79ULL, 0x009ef4f48d2d384cULL,
- 0x008992770766f09dULL, 0x001584396b6b1101ULL,
- 0x00af3f8676c9feefULL, 0x0024603c40269118ULL)},
+ {FIELD_LITERAL(0x00920ac80f9b0d21ULL, 0x00f80f7f73401246ULL,
+ 0x0086d37849b557d6ULL, 0x0002bd4b317b752eULL,
+ 0x00b26463993a42bbULL, 0x002070422a73b129ULL,
+ 0x00341acaa0380cb3ULL, 0x00541914dd66a1b2ULL)},
+ {FIELD_LITERAL(0x00c1513cd66abe8cULL, 0x000139e01118944dULL,
+ 0x0064abbcb8080bbbULL, 0x00b3b08202473142ULL,
+ 0x00c629ef25da2403ULL, 0x00f0aec3310d9b7fULL,
+ 0x0050b2227472d8cdULL, 0x00f6c8a922d41fb4ULL)},
+ {FIELD_LITERAL(0x001075ccf26b7b1fULL, 0x00bb6bb213170433ULL,
+ 0x00e9491ad262da79ULL, 0x009ef4f48d2d384cULL,
+ 0x008992770766f09dULL, 0x001584396b6b1101ULL,
+ 0x00af3f8676c9feefULL, 0x0024603c40269118ULL)},
}}, {{
- {FIELD_LITERAL(0x009dd7b31319527cULL, 0x001e7ac948d873a9ULL,
- 0x00fa54b46ef9673aULL, 0x0066efb8d5b02fe6ULL,
- 0x00754b1d3928aeaeULL, 0x0004262ac72a6f6bULL,
- 0x0079b7d49a6eb026ULL, 0x003126a753540102ULL)},
- {FIELD_LITERAL(0x009666e24f693947ULL, 0x00f714311269d45fULL,
- 0x0010ffac1d0c851cULL, 0x0066e80c37363497ULL,
- 0x00f1f4ad010c60b0ULL, 0x0015c87408470ff7ULL,
- 0x00651d5e9c7766a4ULL, 0x008138819d7116deULL)},
- {FIELD_LITERAL(0x003934b11c57253bULL, 0x00ef308edf21f46eULL,
- 0x00e54e99c7a16198ULL, 0x0080d57135764e63ULL,
- 0x00751c27b946bc24ULL, 0x00dd389ce4e9e129ULL,
- 0x00a1a2bfd1cd84dcULL, 0x002fae73e5149b32ULL)},
+ {FIELD_LITERAL(0x009dd7b31319527cULL, 0x001e7ac948d873a9ULL,
+ 0x00fa54b46ef9673aULL, 0x0066efb8d5b02fe6ULL,
+ 0x00754b1d3928aeaeULL, 0x0004262ac72a6f6bULL,
+ 0x0079b7d49a6eb026ULL, 0x003126a753540102ULL)},
+ {FIELD_LITERAL(0x009666e24f693947ULL, 0x00f714311269d45fULL,
+ 0x0010ffac1d0c851cULL, 0x0066e80c37363497ULL,
+ 0x00f1f4ad010c60b0ULL, 0x0015c87408470ff7ULL,
+ 0x00651d5e9c7766a4ULL, 0x008138819d7116deULL)},
+ {FIELD_LITERAL(0x003934b11c57253bULL, 0x00ef308edf21f46eULL,
+ 0x00e54e99c7a16198ULL, 0x0080d57135764e63ULL,
+ 0x00751c27b946bc24ULL, 0x00dd389ce4e9e129ULL,
+ 0x00a1a2bfd1cd84dcULL, 0x002fae73e5149b32ULL)},
}}, {{
- {FIELD_LITERAL(0x00911657dffb4cddULL, 0x00c100b7cc553d06ULL,
- 0x00449d075ec467ccULL, 0x007062100bc64e70ULL,
- 0x0043cf86f7bd21e7ULL, 0x00f401dc4b797deaULL,
- 0x005224afb2f62e65ULL, 0x00d1ede3fb5a42beULL)},
- {FIELD_LITERAL(0x00f2ba36a41aa144ULL, 0x00a0c22d946ee18fULL,
- 0x008aae8ef9a14f99ULL, 0x00eef4d79b19bb36ULL,
- 0x008e75ce3d27b1fcULL, 0x00a65daa03b29a27ULL,
- 0x00d9cc83684eb145ULL, 0x009e1ed80cc2ed74ULL)},
- {FIELD_LITERAL(0x00bed953d1997988ULL, 0x00b93ed175a24128ULL,
- 0x00871c5963fb6365ULL, 0x00ca2df20014a787ULL,
- 0x00f5d9c1d0b34322ULL, 0x00f6f5942818db0aULL,
- 0x004cc091f49c9906ULL, 0x00e8a188a60bff9fULL)},
+ {FIELD_LITERAL(0x00911657dffb4cddULL, 0x00c100b7cc553d06ULL,
+ 0x00449d075ec467ccULL, 0x007062100bc64e70ULL,
+ 0x0043cf86f7bd21e7ULL, 0x00f401dc4b797deaULL,
+ 0x005224afb2f62e65ULL, 0x00d1ede3fb5a42beULL)},
+ {FIELD_LITERAL(0x00f2ba36a41aa144ULL, 0x00a0c22d946ee18fULL,
+ 0x008aae8ef9a14f99ULL, 0x00eef4d79b19bb36ULL,
+ 0x008e75ce3d27b1fcULL, 0x00a65daa03b29a27ULL,
+ 0x00d9cc83684eb145ULL, 0x009e1ed80cc2ed74ULL)},
+ {FIELD_LITERAL(0x00bed953d1997988ULL, 0x00b93ed175a24128ULL,
+ 0x00871c5963fb6365ULL, 0x00ca2df20014a787ULL,
+ 0x00f5d9c1d0b34322ULL, 0x00f6f5942818db0aULL,
+ 0x004cc091f49c9906ULL, 0x00e8a188a60bff9fULL)},
}}, {{
- {FIELD_LITERAL(0x0032c7762032fae8ULL, 0x00e4087232e0bc21ULL,
- 0x00f767344b6e8d85ULL, 0x00bbf369b76c2aa2ULL,
- 0x008a1f46c6e1570cULL, 0x001368cd9780369fULL,
- 0x007359a39d079430ULL, 0x0003646512921434ULL)},
- {FIELD_LITERAL(0x007c4b47ca7c73e7ULL, 0x005396221039734bULL,
- 0x008b64ddf0e45d7eULL, 0x00bfad5af285e6c2ULL,
- 0x008ec711c5b1a1a8ULL, 0x00cf663301237f98ULL,
- 0x00917ee3f1655126ULL, 0x004152f337efedd8ULL)},
- {FIELD_LITERAL(0x0007c7edc9305daaULL, 0x000a6664f273701cULL,
- 0x00f6e78795e200b1ULL, 0x005d05b9ecd2473eULL,
- 0x0014f5f17c865786ULL, 0x00c7fd2d166fa995ULL,
- 0x004939a2d8eb80e0ULL, 0x002244ba0942c199ULL)},
+ {FIELD_LITERAL(0x0032c7762032fae8ULL, 0x00e4087232e0bc21ULL,
+ 0x00f767344b6e8d85ULL, 0x00bbf369b76c2aa2ULL,
+ 0x008a1f46c6e1570cULL, 0x001368cd9780369fULL,
+ 0x007359a39d079430ULL, 0x0003646512921434ULL)},
+ {FIELD_LITERAL(0x007c4b47ca7c73e7ULL, 0x005396221039734bULL,
+ 0x008b64ddf0e45d7eULL, 0x00bfad5af285e6c2ULL,
+ 0x008ec711c5b1a1a8ULL, 0x00cf663301237f98ULL,
+ 0x00917ee3f1655126ULL, 0x004152f337efedd8ULL)},
+ {FIELD_LITERAL(0x0007c7edc9305daaULL, 0x000a6664f273701cULL,
+ 0x00f6e78795e200b1ULL, 0x005d05b9ecd2473eULL,
+ 0x0014f5f17c865786ULL, 0x00c7fd2d166fa995ULL,
+ 0x004939a2d8eb80e0ULL, 0x002244ba0942c199ULL)},
}}, {{
- {FIELD_LITERAL(0x00321e767f0262cfULL, 0x002e57d776caf68eULL,
- 0x00bf2c94814f0437ULL, 0x00c339196acd622fULL,
- 0x001db4cce71e2770ULL, 0x001ded5ddba6eee2ULL,
- 0x0078608ab1554c8dULL, 0x00067fe0ab76365bULL)},
- {FIELD_LITERAL(0x00f09758e11e3985ULL, 0x00169efdbd64fad3ULL,
- 0x00e8889b7d6dacd6ULL, 0x0035cdd58ea88209ULL,
- 0x00bcda47586d7f49ULL, 0x003cdddcb2879088ULL,
- 0x0016da70187e954bULL, 0x009556ea2e92aacdULL)},
- {FIELD_LITERAL(0x008cab16bd1ff897ULL, 0x00b389972cdf753fULL,
- 0x00ea8ed1e46dfdc0ULL, 0x004fe7ef94c589f4ULL,
- 0x002b8ae9b805ecf3ULL, 0x0025c08d892874a5ULL,
- 0x0023938e98d44c4cULL, 0x00f759134cabf69cULL)},
+ {FIELD_LITERAL(0x00321e767f0262cfULL, 0x002e57d776caf68eULL,
+ 0x00bf2c94814f0437ULL, 0x00c339196acd622fULL,
+ 0x001db4cce71e2770ULL, 0x001ded5ddba6eee2ULL,
+ 0x0078608ab1554c8dULL, 0x00067fe0ab76365bULL)},
+ {FIELD_LITERAL(0x00f09758e11e3985ULL, 0x00169efdbd64fad3ULL,
+ 0x00e8889b7d6dacd6ULL, 0x0035cdd58ea88209ULL,
+ 0x00bcda47586d7f49ULL, 0x003cdddcb2879088ULL,
+ 0x0016da70187e954bULL, 0x009556ea2e92aacdULL)},
+ {FIELD_LITERAL(0x008cab16bd1ff897ULL, 0x00b389972cdf753fULL,
+ 0x00ea8ed1e46dfdc0ULL, 0x004fe7ef94c589f4ULL,
+ 0x002b8ae9b805ecf3ULL, 0x0025c08d892874a5ULL,
+ 0x0023938e98d44c4cULL, 0x00f759134cabf69cULL)},
}}, {{
- {FIELD_LITERAL(0x006c2a84678e4b3bULL, 0x007a194aacd1868fULL,
- 0x00ed0225af424761ULL, 0x00da0a6f293c64b8ULL,
- 0x001062ac5c6a7a18ULL, 0x0030f5775a8aeef4ULL,
- 0x0002acaad76b7af0ULL, 0x00410b8fd63a579fULL)},
- {FIELD_LITERAL(0x001ec59db3d9590eULL, 0x001e9e3f1c3f182dULL,
- 0x0045a9c3ec2cab14ULL, 0x0008198572aeb673ULL,
- 0x00773b74068bd167ULL, 0x0012535eaa395434ULL,
- 0x0044dba9e3bbb74aULL, 0x002fba4d3c74bd0eULL)},
- {FIELD_LITERAL(0x0042bf08fe66922cULL, 0x003318b8fbb49e8cULL,
- 0x00d75946004aa14cULL, 0x00f601586b42bf1cULL,
- 0x00c74cf1d912fe66ULL, 0x00abcb36974b30adULL,
- 0x007eb78720c9d2b8ULL, 0x009f54ab7bd4df85ULL)},
+ {FIELD_LITERAL(0x006c2a84678e4b3bULL, 0x007a194aacd1868fULL,
+ 0x00ed0225af424761ULL, 0x00da0a6f293c64b8ULL,
+ 0x001062ac5c6a7a18ULL, 0x0030f5775a8aeef4ULL,
+ 0x0002acaad76b7af0ULL, 0x00410b8fd63a579fULL)},
+ {FIELD_LITERAL(0x001ec59db3d9590eULL, 0x001e9e3f1c3f182dULL,
+ 0x0045a9c3ec2cab14ULL, 0x0008198572aeb673ULL,
+ 0x00773b74068bd167ULL, 0x0012535eaa395434ULL,
+ 0x0044dba9e3bbb74aULL, 0x002fba4d3c74bd0eULL)},
+ {FIELD_LITERAL(0x0042bf08fe66922cULL, 0x003318b8fbb49e8cULL,
+ 0x00d75946004aa14cULL, 0x00f601586b42bf1cULL,
+ 0x00c74cf1d912fe66ULL, 0x00abcb36974b30adULL,
+ 0x007eb78720c9d2b8ULL, 0x009f54ab7bd4df85ULL)},
}}, {{
- {FIELD_LITERAL(0x00db9fc948f73826ULL, 0x00fa8b3746ed8ee9ULL,
- 0x00132cb65aafbeb2ULL, 0x00c36ff3fe7925b8ULL,
- 0x00837daed353d2feULL, 0x00ec661be0667cf4ULL,
- 0x005beb8ed2e90204ULL, 0x00d77dd69e564967ULL)},
- {FIELD_LITERAL(0x0042e6268b861751ULL, 0x0008dd0469500c16ULL,
- 0x00b51b57c338a3fdULL, 0x00cc4497d85cff6bULL,
- 0x002f13d6b57c34a4ULL, 0x0083652eaf301105ULL,
- 0x00cc344294cc93a8ULL, 0x0060f4d02810e270ULL)},
- {FIELD_LITERAL(0x00a8954363cd518bULL, 0x00ad171124bccb7bULL,
- 0x0065f46a4adaae00ULL, 0x001b1a5b2a96e500ULL,
- 0x0043fe24f8233285ULL, 0x0066996d8ae1f2c3ULL,
- 0x00c530f3264169f9ULL, 0x00c0f92d07cf6a57ULL)},
+ {FIELD_LITERAL(0x00db9fc948f73826ULL, 0x00fa8b3746ed8ee9ULL,
+ 0x00132cb65aafbeb2ULL, 0x00c36ff3fe7925b8ULL,
+ 0x00837daed353d2feULL, 0x00ec661be0667cf4ULL,
+ 0x005beb8ed2e90204ULL, 0x00d77dd69e564967ULL)},
+ {FIELD_LITERAL(0x0042e6268b861751ULL, 0x0008dd0469500c16ULL,
+ 0x00b51b57c338a3fdULL, 0x00cc4497d85cff6bULL,
+ 0x002f13d6b57c34a4ULL, 0x0083652eaf301105ULL,
+ 0x00cc344294cc93a8ULL, 0x0060f4d02810e270ULL)},
+ {FIELD_LITERAL(0x00a8954363cd518bULL, 0x00ad171124bccb7bULL,
+ 0x0065f46a4adaae00ULL, 0x001b1a5b2a96e500ULL,
+ 0x0043fe24f8233285ULL, 0x0066996d8ae1f2c3ULL,
+ 0x00c530f3264169f9ULL, 0x00c0f92d07cf6a57ULL)},
}}, {{
- {FIELD_LITERAL(0x0036a55c6815d943ULL, 0x008c8d1def993db3ULL,
- 0x002e0e1e8ff7318fULL, 0x00d883a4b92db00aULL,
- 0x002f5e781ae33906ULL, 0x001a72adb235c06dULL,
- 0x00f2e59e736e9caaULL, 0x001a4b58e3031914ULL)},
- {FIELD_LITERAL(0x00d73bfae5e00844ULL, 0x00bf459766fb5f52ULL,
- 0x0061b4f5a5313cdeULL, 0x004392d4c3b95514ULL,
- 0x000d3551b1077523ULL, 0x0000998840ee5d71ULL,
- 0x006de6e340448b7bULL, 0x00251aa504875d6eULL)},
- {FIELD_LITERAL(0x003bf343427ac342ULL, 0x00adc0a78642b8c5ULL,
- 0x0003b893175a8314ULL, 0x0061a34ade5703bcULL,
- 0x00ea3ea8bb71d632ULL, 0x00be0df9a1f198c2ULL,
- 0x0046dd8e7c1635fbULL, 0x00f1523fdd25d5e5ULL)},
+ {FIELD_LITERAL(0x0036a55c6815d943ULL, 0x008c8d1def993db3ULL,
+ 0x002e0e1e8ff7318fULL, 0x00d883a4b92db00aULL,
+ 0x002f5e781ae33906ULL, 0x001a72adb235c06dULL,
+ 0x00f2e59e736e9caaULL, 0x001a4b58e3031914ULL)},
+ {FIELD_LITERAL(0x00d73bfae5e00844ULL, 0x00bf459766fb5f52ULL,
+ 0x0061b4f5a5313cdeULL, 0x004392d4c3b95514ULL,
+ 0x000d3551b1077523ULL, 0x0000998840ee5d71ULL,
+ 0x006de6e340448b7bULL, 0x00251aa504875d6eULL)},
+ {FIELD_LITERAL(0x003bf343427ac342ULL, 0x00adc0a78642b8c5ULL,
+ 0x0003b893175a8314ULL, 0x0061a34ade5703bcULL,
+ 0x00ea3ea8bb71d632ULL, 0x00be0df9a1f198c2ULL,
+ 0x0046dd8e7c1635fbULL, 0x00f1523fdd25d5e5ULL)},
}}, {{
- {FIELD_LITERAL(0x00633f63fc9dd406ULL, 0x00e713ff80e04a43ULL,
- 0x0060c6e970f2d621ULL, 0x00a57cd7f0df1891ULL,
- 0x00f2406a550650bbULL, 0x00b064290efdc684ULL,
- 0x001eab0144d17916ULL, 0x00cd15f863c293abULL)},
- {FIELD_LITERAL(0x0029cec55273f70dULL, 0x007044ee275c6340ULL,
- 0x0040f637a93015e2ULL, 0x00338bb78db5aae9ULL,
- 0x001491b2a6132147ULL, 0x00a125d6cfe6bde3ULL,
- 0x005f7ac561ba8669ULL, 0x001d5eaea3fbaacfULL)},
- {FIELD_LITERAL(0x00054e9635e3be31ULL, 0x000e43f31e2872beULL,
- 0x00d05b1c9e339841ULL, 0x006fac50bd81fd98ULL,
- 0x00cdc7852eaebb09ULL, 0x004ff519b061991bULL,
- 0x009099e8107d4c85ULL, 0x00273e24c36a4a61ULL)},
+ {FIELD_LITERAL(0x00633f63fc9dd406ULL, 0x00e713ff80e04a43ULL,
+ 0x0060c6e970f2d621ULL, 0x00a57cd7f0df1891ULL,
+ 0x00f2406a550650bbULL, 0x00b064290efdc684ULL,
+ 0x001eab0144d17916ULL, 0x00cd15f863c293abULL)},
+ {FIELD_LITERAL(0x0029cec55273f70dULL, 0x007044ee275c6340ULL,
+ 0x0040f637a93015e2ULL, 0x00338bb78db5aae9ULL,
+ 0x001491b2a6132147ULL, 0x00a125d6cfe6bde3ULL,
+ 0x005f7ac561ba8669ULL, 0x001d5eaea3fbaacfULL)},
+ {FIELD_LITERAL(0x00054e9635e3be31ULL, 0x000e43f31e2872beULL,
+ 0x00d05b1c9e339841ULL, 0x006fac50bd81fd98ULL,
+ 0x00cdc7852eaebb09ULL, 0x004ff519b061991bULL,
+ 0x009099e8107d4c85ULL, 0x00273e24c36a4a61ULL)},
}}, {{
- {FIELD_LITERAL(0x00070b4441ef2c46ULL, 0x00efa5b02801a109ULL,
- 0x00bf0b8c3ee64adfULL, 0x008a67e0b3452e98ULL,
- 0x001916b1f2fa7a74ULL, 0x00d781a78ff6cdc3ULL,
- 0x008682ce57e5c919ULL, 0x00cc1109dd210da3ULL)},
- {FIELD_LITERAL(0x00cae8aaff388663ULL, 0x005e983a35dda1c7ULL,
- 0x007ab1030d8e37f4ULL, 0x00e48940f5d032feULL,
- 0x006a36f9ef30b331ULL, 0x009be6f03958c757ULL,
- 0x0086231ceba91400ULL, 0x008bd0f7b823e7aaULL)},
- {FIELD_LITERAL(0x00cf881ebef5a45aULL, 0x004ebea78e7c6f2cULL,
- 0x0090da9209cf26a0ULL, 0x00de2b2e4c775b84ULL,
- 0x0071d6031c3c15aeULL, 0x00d9e927ef177d70ULL,
- 0x00894ee8c23896fdULL, 0x00e3b3b401e41aadULL)},
+ {FIELD_LITERAL(0x00070b4441ef2c46ULL, 0x00efa5b02801a109ULL,
+ 0x00bf0b8c3ee64adfULL, 0x008a67e0b3452e98ULL,
+ 0x001916b1f2fa7a74ULL, 0x00d781a78ff6cdc3ULL,
+ 0x008682ce57e5c919ULL, 0x00cc1109dd210da3ULL)},
+ {FIELD_LITERAL(0x00cae8aaff388663ULL, 0x005e983a35dda1c7ULL,
+ 0x007ab1030d8e37f4ULL, 0x00e48940f5d032feULL,
+ 0x006a36f9ef30b331ULL, 0x009be6f03958c757ULL,
+ 0x0086231ceba91400ULL, 0x008bd0f7b823e7aaULL)},
+ {FIELD_LITERAL(0x00cf881ebef5a45aULL, 0x004ebea78e7c6f2cULL,
+ 0x0090da9209cf26a0ULL, 0x00de2b2e4c775b84ULL,
+ 0x0071d6031c3c15aeULL, 0x00d9e927ef177d70ULL,
+ 0x00894ee8c23896fdULL, 0x00e3b3b401e41aadULL)},
}}, {{
- {FIELD_LITERAL(0x00204fef26864170ULL, 0x00819269c5dee0f8ULL,
- 0x00bfb4713ec97966ULL, 0x0026339a6f34df78ULL,
- 0x001f26e64c761dc2ULL, 0x00effe3af313cb60ULL,
- 0x00e17b70138f601bULL, 0x00f16e1ccd9ede5eULL)},
- {FIELD_LITERAL(0x005d9a8353fdb2dbULL, 0x0055cc2048c698f0ULL,
- 0x00f6c4ac89657218ULL, 0x00525034d73faeb2ULL,
- 0x00435776fbda3c7dULL, 0x0070ea5312323cbcULL,
- 0x007a105d44d069fbULL, 0x006dbc8d6dc786aaULL)},
- {FIELD_LITERAL(0x0017cff19cd394ecULL, 0x00fef7b810922587ULL,
- 0x00e6483970dff548ULL, 0x00ddf36ad6874264ULL,
- 0x00e61778523fcce2ULL, 0x0093a66c0c93b24aULL,
- 0x00fd367114db7f86ULL, 0x007652d7ddce26ddULL)},
+ {FIELD_LITERAL(0x00204fef26864170ULL, 0x00819269c5dee0f8ULL,
+ 0x00bfb4713ec97966ULL, 0x0026339a6f34df78ULL,
+ 0x001f26e64c761dc2ULL, 0x00effe3af313cb60ULL,
+ 0x00e17b70138f601bULL, 0x00f16e1ccd9ede5eULL)},
+ {FIELD_LITERAL(0x005d9a8353fdb2dbULL, 0x0055cc2048c698f0ULL,
+ 0x00f6c4ac89657218ULL, 0x00525034d73faeb2ULL,
+ 0x00435776fbda3c7dULL, 0x0070ea5312323cbcULL,
+ 0x007a105d44d069fbULL, 0x006dbc8d6dc786aaULL)},
+ {FIELD_LITERAL(0x0017cff19cd394ecULL, 0x00fef7b810922587ULL,
+ 0x00e6483970dff548ULL, 0x00ddf36ad6874264ULL,
+ 0x00e61778523fcce2ULL, 0x0093a66c0c93b24aULL,
+ 0x00fd367114db7f86ULL, 0x007652d7ddce26ddULL)},
}}, {{
- {FIELD_LITERAL(0x00d92ced7ba12843ULL, 0x00aea9c7771e86e7ULL,
- 0x0046639693354f7bULL, 0x00a628dbb6a80c47ULL,
- 0x003a0b0507372953ULL, 0x00421113ab45c0d9ULL,
- 0x00e545f08362ab7aULL, 0x0028ce087b4d6d96ULL)},
- {FIELD_LITERAL(0x00a67ee7cf9f99ebULL, 0x005713b275f2ff68ULL,
- 0x00f1d536a841513dULL, 0x00823b59b024712eULL,
- 0x009c46b9d0d38cecULL, 0x00cdb1595aa2d7d4ULL,
- 0x008375b3423d9af8ULL, 0x000ab0b516d978f7ULL)},
- {FIELD_LITERAL(0x00428dcb3c510b0fULL, 0x00585607ea24bb4eULL,
- 0x003736bf1603687aULL, 0x00c47e568c4fe3c7ULL,
- 0x003cd00282848605ULL, 0x0043a487c3b91939ULL,
- 0x004ffc04e1095a06ULL, 0x00a4c989a3d4b918ULL)},
+ {FIELD_LITERAL(0x00d92ced7ba12843ULL, 0x00aea9c7771e86e7ULL,
+ 0x0046639693354f7bULL, 0x00a628dbb6a80c47ULL,
+ 0x003a0b0507372953ULL, 0x00421113ab45c0d9ULL,
+ 0x00e545f08362ab7aULL, 0x0028ce087b4d6d96ULL)},
+ {FIELD_LITERAL(0x00a67ee7cf9f99ebULL, 0x005713b275f2ff68ULL,
+ 0x00f1d536a841513dULL, 0x00823b59b024712eULL,
+ 0x009c46b9d0d38cecULL, 0x00cdb1595aa2d7d4ULL,
+ 0x008375b3423d9af8ULL, 0x000ab0b516d978f7ULL)},
+ {FIELD_LITERAL(0x00428dcb3c510b0fULL, 0x00585607ea24bb4eULL,
+ 0x003736bf1603687aULL, 0x00c47e568c4fe3c7ULL,
+ 0x003cd00282848605ULL, 0x0043a487c3b91939ULL,
+ 0x004ffc04e1095a06ULL, 0x00a4c989a3d4b918ULL)},
}}, {{
- {FIELD_LITERAL(0x00a8778d0e429f7aULL, 0x004c02b059105a68ULL,
- 0x0016653b609da3ffULL, 0x00d5107bd1a12d27ULL,
- 0x00b4708f9a771cabULL, 0x00bb63b662033f69ULL,
- 0x0072f322240e7215ULL, 0x0019445b59c69222ULL)},
- {FIELD_LITERAL(0x00cf4f6069a658e6ULL, 0x0053ca52859436a6ULL,
- 0x0064b994d7e3e117ULL, 0x00cb469b9a07f534ULL,
- 0x00cfb68f399e9d47ULL, 0x00f0dcb8dac1c6e7ULL,
- 0x00f2ab67f538b3a5ULL, 0x0055544f178ab975ULL)},
- {FIELD_LITERAL(0x0099b7a2685d538cULL, 0x00e2f1897b7c0018ULL,
- 0x003adac8ce48dae3ULL, 0x00089276d5c50c0cULL,
- 0x00172fca07ad6717ULL, 0x00cb1a72f54069e5ULL,
- 0x004ee42f133545b3ULL, 0x00785f8651362f16ULL)},
+ {FIELD_LITERAL(0x00a8778d0e429f7aULL, 0x004c02b059105a68ULL,
+ 0x0016653b609da3ffULL, 0x00d5107bd1a12d27ULL,
+ 0x00b4708f9a771cabULL, 0x00bb63b662033f69ULL,
+ 0x0072f322240e7215ULL, 0x0019445b59c69222ULL)},
+ {FIELD_LITERAL(0x00cf4f6069a658e6ULL, 0x0053ca52859436a6ULL,
+ 0x0064b994d7e3e117ULL, 0x00cb469b9a07f534ULL,
+ 0x00cfb68f399e9d47ULL, 0x00f0dcb8dac1c6e7ULL,
+ 0x00f2ab67f538b3a5ULL, 0x0055544f178ab975ULL)},
+ {FIELD_LITERAL(0x0099b7a2685d538cULL, 0x00e2f1897b7c0018ULL,
+ 0x003adac8ce48dae3ULL, 0x00089276d5c50c0cULL,
+ 0x00172fca07ad6717ULL, 0x00cb1a72f54069e5ULL,
+ 0x004ee42f133545b3ULL, 0x00785f8651362f16ULL)},
}}, {{
- {FIELD_LITERAL(0x0049cbac38509e11ULL, 0x0015234505d42cdfULL,
- 0x00794fb0b5840f1cULL, 0x00496437344045a5ULL,
- 0x0031b6d944e4f9b0ULL, 0x00b207318ac1f5d8ULL,
- 0x0000c840da7f5c5dULL, 0x00526f373a5c8814ULL)},
- {FIELD_LITERAL(0x002c7b7742d1dfd9ULL, 0x002cabeb18623c01ULL,
- 0x00055f5e3e044446ULL, 0x006c20f3b4ef54baULL,
- 0x00c600141ec6b35fULL, 0x00354f437f1a32a3ULL,
- 0x00bac4624a3520f9ULL, 0x00c483f734a90691ULL)},
- {FIELD_LITERAL(0x0053a737d422918dULL, 0x00f7fca1d8758625ULL,
- 0x00c360336dadb04cULL, 0x00f38e3d9158a1b8ULL,
- 0x0069ce3b418e84c6ULL, 0x005d1697eca16eadULL,
- 0x00f8bd6a35ece13dULL, 0x007885dfc2b5afeaULL)},
+ {FIELD_LITERAL(0x0049cbac38509e11ULL, 0x0015234505d42cdfULL,
+ 0x00794fb0b5840f1cULL, 0x00496437344045a5ULL,
+ 0x0031b6d944e4f9b0ULL, 0x00b207318ac1f5d8ULL,
+ 0x0000c840da7f5c5dULL, 0x00526f373a5c8814ULL)},
+ {FIELD_LITERAL(0x002c7b7742d1dfd9ULL, 0x002cabeb18623c01ULL,
+ 0x00055f5e3e044446ULL, 0x006c20f3b4ef54baULL,
+ 0x00c600141ec6b35fULL, 0x00354f437f1a32a3ULL,
+ 0x00bac4624a3520f9ULL, 0x00c483f734a90691ULL)},
+ {FIELD_LITERAL(0x0053a737d422918dULL, 0x00f7fca1d8758625ULL,
+ 0x00c360336dadb04cULL, 0x00f38e3d9158a1b8ULL,
+ 0x0069ce3b418e84c6ULL, 0x005d1697eca16eadULL,
+ 0x00f8bd6a35ece13dULL, 0x007885dfc2b5afeaULL)},
}}, {{
- {FIELD_LITERAL(0x00c3617ae260776cULL, 0x00b20dc3e96922d7ULL,
- 0x00a1a7802246706aULL, 0x00ca6505a5240244ULL,
- 0x002246b62d919782ULL, 0x001439102d7aa9b3ULL,
- 0x00e8af1139e6422cULL, 0x00c888d1b52f2b05ULL)},
- {FIELD_LITERAL(0x005b67690ffd41d9ULL, 0x005294f28df516f9ULL,
- 0x00a879272412fcb9ULL, 0x00098b629a6d1c8dULL,
- 0x00fabd3c8050865aULL, 0x00cd7e5b0a3879c5ULL,
- 0x00153238210f3423ULL, 0x00357cac101e9f42ULL)},
- {FIELD_LITERAL(0x008917b454444fb7ULL, 0x00f59247c97e441bULL,
- 0x00a6200a6815152dULL, 0x0009a4228601d254ULL,
- 0x001c0360559bd374ULL, 0x007563362039cb36ULL,
- 0x00bd75b48d74e32bULL, 0x0017f515ac3499e8ULL)},
+ {FIELD_LITERAL(0x00c3617ae260776cULL, 0x00b20dc3e96922d7ULL,
+ 0x00a1a7802246706aULL, 0x00ca6505a5240244ULL,
+ 0x002246b62d919782ULL, 0x001439102d7aa9b3ULL,
+ 0x00e8af1139e6422cULL, 0x00c888d1b52f2b05ULL)},
+ {FIELD_LITERAL(0x005b67690ffd41d9ULL, 0x005294f28df516f9ULL,
+ 0x00a879272412fcb9ULL, 0x00098b629a6d1c8dULL,
+ 0x00fabd3c8050865aULL, 0x00cd7e5b0a3879c5ULL,
+ 0x00153238210f3423ULL, 0x00357cac101e9f42ULL)},
+ {FIELD_LITERAL(0x008917b454444fb7ULL, 0x00f59247c97e441bULL,
+ 0x00a6200a6815152dULL, 0x0009a4228601d254ULL,
+ 0x001c0360559bd374ULL, 0x007563362039cb36ULL,
+ 0x00bd75b48d74e32bULL, 0x0017f515ac3499e8ULL)},
}}, {{
- {FIELD_LITERAL(0x001532a7ffe41c5aULL, 0x00eb1edce358d6bfULL,
- 0x00ddbacc7b678a7bULL, 0x008a7b70f3c841a3ULL,
- 0x00f1923bf27d3f4cULL, 0x000b2713ed8f7873ULL,
- 0x00aaf67e29047902ULL, 0x0044994a70b3976dULL)},
- {FIELD_LITERAL(0x00d54e802082d42cULL, 0x00a55aa0dce7cc6cULL,
- 0x006477b96073f146ULL, 0x0082efe4ceb43594ULL,
- 0x00a922bcba026845ULL, 0x0077f19d1ab75182ULL,
- 0x00c2bb2737846e59ULL, 0x0004d7eec791dd33ULL)},
- {FIELD_LITERAL(0x0044588d1a81d680ULL, 0x00b0a9097208e4f8ULL,
- 0x00212605350dc57eULL, 0x0028717cd2871123ULL,
- 0x00fb083c100fd979ULL, 0x0045a056ce063fdfULL,
- 0x00a5d604b4dd6a41ULL, 0x001dabc08ba4e236ULL)},
+ {FIELD_LITERAL(0x001532a7ffe41c5aULL, 0x00eb1edce358d6bfULL,
+ 0x00ddbacc7b678a7bULL, 0x008a7b70f3c841a3ULL,
+ 0x00f1923bf27d3f4cULL, 0x000b2713ed8f7873ULL,
+ 0x00aaf67e29047902ULL, 0x0044994a70b3976dULL)},
+ {FIELD_LITERAL(0x00d54e802082d42cULL, 0x00a55aa0dce7cc6cULL,
+ 0x006477b96073f146ULL, 0x0082efe4ceb43594ULL,
+ 0x00a922bcba026845ULL, 0x0077f19d1ab75182ULL,
+ 0x00c2bb2737846e59ULL, 0x0004d7eec791dd33ULL)},
+ {FIELD_LITERAL(0x0044588d1a81d680ULL, 0x00b0a9097208e4f8ULL,
+ 0x00212605350dc57eULL, 0x0028717cd2871123ULL,
+ 0x00fb083c100fd979ULL, 0x0045a056ce063fdfULL,
+ 0x00a5d604b4dd6a41ULL, 0x001dabc08ba4e236ULL)},
}}, {{
- {FIELD_LITERAL(0x00c4887198d7a7faULL, 0x00244f98fb45784aULL,
- 0x0045911e15a15d01ULL, 0x001d323d374c0966ULL,
- 0x00967c3915196562ULL, 0x0039373abd2f3c67ULL,
- 0x000d2c5614312423ULL, 0x0041cf2215442ce3ULL)},
- {FIELD_LITERAL(0x008ede889ada7f06ULL, 0x001611e91de2e135ULL,
- 0x00fdb9a458a471b9ULL, 0x00563484e03710d1ULL,
- 0x0031cc81925e3070ULL, 0x0062c97b3af80005ULL,
- 0x00fa733eea28edebULL, 0x00e82457e1ebbc88ULL)},
- {FIELD_LITERAL(0x006a0df5fe9b6f59ULL, 0x00a0d4ff46040d92ULL,
- 0x004a7cedb6f93250ULL, 0x00d1df8855b8c357ULL,
- 0x00e73a46086fd058ULL, 0x0048fb0add6dfe59ULL,
- 0x001e03a28f1b4e3dULL, 0x00a871c993308d76ULL)},
+ {FIELD_LITERAL(0x00c4887198d7a7faULL, 0x00244f98fb45784aULL,
+ 0x0045911e15a15d01ULL, 0x001d323d374c0966ULL,
+ 0x00967c3915196562ULL, 0x0039373abd2f3c67ULL,
+ 0x000d2c5614312423ULL, 0x0041cf2215442ce3ULL)},
+ {FIELD_LITERAL(0x008ede889ada7f06ULL, 0x001611e91de2e135ULL,
+ 0x00fdb9a458a471b9ULL, 0x00563484e03710d1ULL,
+ 0x0031cc81925e3070ULL, 0x0062c97b3af80005ULL,
+ 0x00fa733eea28edebULL, 0x00e82457e1ebbc88ULL)},
+ {FIELD_LITERAL(0x006a0df5fe9b6f59ULL, 0x00a0d4ff46040d92ULL,
+ 0x004a7cedb6f93250ULL, 0x00d1df8855b8c357ULL,
+ 0x00e73a46086fd058ULL, 0x0048fb0add6dfe59ULL,
+ 0x001e03a28f1b4e3dULL, 0x00a871c993308d76ULL)},
}}, {{
- {FIELD_LITERAL(0x0030dbb2d1766ec8ULL, 0x00586c0ad138555eULL,
- 0x00d1a34f9e91c77cULL, 0x0063408ad0e89014ULL,
- 0x00d61231b05f6f5bULL, 0x0009abf569f5fd8aULL,
- 0x00aec67a110f1c43ULL, 0x0031d1a790938dd7ULL)},
- {FIELD_LITERAL(0x006cded841e2a862ULL, 0x00198d60af0ab6fbULL,
- 0x0018f09db809e750ULL, 0x004e6ac676016263ULL,
- 0x00eafcd1620969cbULL, 0x002c9784ca34917dULL,
- 0x0054f00079796de7ULL, 0x00d9fab5c5972204ULL)},
- {FIELD_LITERAL(0x004bd0fee2438a83ULL, 0x00b571e62b0f83bdULL,
- 0x0059287d7ce74800ULL, 0x00fb3631b645c3f0ULL,
- 0x00a018e977f78494ULL, 0x0091e27065c27b12ULL,
- 0x007696c1817165e0ULL, 0x008c40be7c45ba3aULL)},
+ {FIELD_LITERAL(0x0030dbb2d1766ec8ULL, 0x00586c0ad138555eULL,
+ 0x00d1a34f9e91c77cULL, 0x0063408ad0e89014ULL,
+ 0x00d61231b05f6f5bULL, 0x0009abf569f5fd8aULL,
+ 0x00aec67a110f1c43ULL, 0x0031d1a790938dd7ULL)},
+ {FIELD_LITERAL(0x006cded841e2a862ULL, 0x00198d60af0ab6fbULL,
+ 0x0018f09db809e750ULL, 0x004e6ac676016263ULL,
+ 0x00eafcd1620969cbULL, 0x002c9784ca34917dULL,
+ 0x0054f00079796de7ULL, 0x00d9fab5c5972204ULL)},
+ {FIELD_LITERAL(0x004bd0fee2438a83ULL, 0x00b571e62b0f83bdULL,
+ 0x0059287d7ce74800ULL, 0x00fb3631b645c3f0ULL,
+ 0x00a018e977f78494ULL, 0x0091e27065c27b12ULL,
+ 0x007696c1817165e0ULL, 0x008c40be7c45ba3aULL)},
}}, {{
- {FIELD_LITERAL(0x00a0f326327cb684ULL, 0x001c7d0f672680ffULL,
- 0x008c1c81ffb112d1ULL, 0x00f8f801674eddc8ULL,
- 0x00e926d5d48c2a9dULL, 0x005bd6d954c6fe9aULL,
- 0x004c6b24b4e33703ULL, 0x00d05eb5c09105ccULL)},
- {FIELD_LITERAL(0x00d61731caacf2cfULL, 0x002df0c7609e01c5ULL,
- 0x00306172208b1e2bULL, 0x00b413fe4fb2b686ULL,
- 0x00826d360902a221ULL, 0x003f8d056e67e7f7ULL,
- 0x0065025b0175e989ULL, 0x00369add117865ebULL)},
- {FIELD_LITERAL(0x00aaf895aec2fa11ULL, 0x000f892bc313eb52ULL,
- 0x005b1c794dad050bULL, 0x003f8ec4864cec14ULL,
- 0x00af81058d0b90e5ULL, 0x00ebe43e183997bbULL,
- 0x00a9d610f9f3e615ULL, 0x007acd8eec2e88d3ULL)},
+ {FIELD_LITERAL(0x00a0f326327cb684ULL, 0x001c7d0f672680ffULL,
+ 0x008c1c81ffb112d1ULL, 0x00f8f801674eddc8ULL,
+ 0x00e926d5d48c2a9dULL, 0x005bd6d954c6fe9aULL,
+ 0x004c6b24b4e33703ULL, 0x00d05eb5c09105ccULL)},
+ {FIELD_LITERAL(0x00d61731caacf2cfULL, 0x002df0c7609e01c5ULL,
+ 0x00306172208b1e2bULL, 0x00b413fe4fb2b686ULL,
+ 0x00826d360902a221ULL, 0x003f8d056e67e7f7ULL,
+ 0x0065025b0175e989ULL, 0x00369add117865ebULL)},
+ {FIELD_LITERAL(0x00aaf895aec2fa11ULL, 0x000f892bc313eb52ULL,
+ 0x005b1c794dad050bULL, 0x003f8ec4864cec14ULL,
+ 0x00af81058d0b90e5ULL, 0x00ebe43e183997bbULL,
+ 0x00a9d610f9f3e615ULL, 0x007acd8eec2e88d3ULL)},
}}, {{
- {FIELD_LITERAL(0x0049b2fab13812a3ULL, 0x00846db32cd60431ULL,
- 0x000177fa578c8d6cULL, 0x00047d0e2ad4bc51ULL,
- 0x00b158ba38d1e588ULL, 0x006a45daad79e3f3ULL,
- 0x000997b93cab887bULL, 0x00c47ea42fa23dc3ULL)},
- {FIELD_LITERAL(0x0012b6fef7aeb1caULL, 0x009412768194b6a7ULL,
- 0x00ff0d351f23ab93ULL, 0x007e8a14c1aff71bULL,
- 0x006c1c0170c512bcULL, 0x0016243ea02ab2e5ULL,
- 0x007bb6865b303f3eULL, 0x0015ce6b29b159f4ULL)},
- {FIELD_LITERAL(0x009961cd02e68108ULL, 0x00e2035d3a1d0836ULL,
- 0x005d51f69b5e1a1dULL, 0x004bccb4ea36edcdULL,
- 0x0069be6a7aeef268ULL, 0x0063f4dd9de8d5a7ULL,
- 0x006283783092ca35ULL, 0x0075a31af2c35409ULL)},
+ {FIELD_LITERAL(0x0049b2fab13812a3ULL, 0x00846db32cd60431ULL,
+ 0x000177fa578c8d6cULL, 0x00047d0e2ad4bc51ULL,
+ 0x00b158ba38d1e588ULL, 0x006a45daad79e3f3ULL,
+ 0x000997b93cab887bULL, 0x00c47ea42fa23dc3ULL)},
+ {FIELD_LITERAL(0x0012b6fef7aeb1caULL, 0x009412768194b6a7ULL,
+ 0x00ff0d351f23ab93ULL, 0x007e8a14c1aff71bULL,
+ 0x006c1c0170c512bcULL, 0x0016243ea02ab2e5ULL,
+ 0x007bb6865b303f3eULL, 0x0015ce6b29b159f4ULL)},
+ {FIELD_LITERAL(0x009961cd02e68108ULL, 0x00e2035d3a1d0836ULL,
+ 0x005d51f69b5e1a1dULL, 0x004bccb4ea36edcdULL,
+ 0x0069be6a7aeef268ULL, 0x0063f4dd9de8d5a7ULL,
+ 0x006283783092ca35ULL, 0x0075a31af2c35409ULL)},
}}, {{
- {FIELD_LITERAL(0x00c412365162e8cfULL, 0x00012283fb34388aULL,
- 0x003e6543babf39e2ULL, 0x00eead6b3a804978ULL,
- 0x0099c0314e8b326fULL, 0x00e98e0a8d477a4fULL,
- 0x00d2eb96b127a687ULL, 0x00ed8d7df87571bbULL)},
- {FIELD_LITERAL(0x00777463e308cacfULL, 0x00c8acb93950132dULL,
- 0x00ebddbf4ca48b2cULL, 0x0026ad7ca0795a0aULL,
- 0x00f99a3d9a715064ULL, 0x000d60bcf9d4dfccULL,
- 0x005e65a73a437a06ULL, 0x0019d536a8db56c8ULL)},
- {FIELD_LITERAL(0x00192d7dd558d135ULL, 0x0027cd6a8323ffa7ULL,
- 0x00239f1a412dc1e7ULL, 0x0046b4b3be74fc5cULL,
- 0x0020c47a2bef5bceULL, 0x00aa17e48f43862bULL,
- 0x00f7e26c96342e5fULL, 0x0008011c530f39a9ULL)},
+ {FIELD_LITERAL(0x00c412365162e8cfULL, 0x00012283fb34388aULL,
+ 0x003e6543babf39e2ULL, 0x00eead6b3a804978ULL,
+ 0x0099c0314e8b326fULL, 0x00e98e0a8d477a4fULL,
+ 0x00d2eb96b127a687ULL, 0x00ed8d7df87571bbULL)},
+ {FIELD_LITERAL(0x00777463e308cacfULL, 0x00c8acb93950132dULL,
+ 0x00ebddbf4ca48b2cULL, 0x0026ad7ca0795a0aULL,
+ 0x00f99a3d9a715064ULL, 0x000d60bcf9d4dfccULL,
+ 0x005e65a73a437a06ULL, 0x0019d536a8db56c8ULL)},
+ {FIELD_LITERAL(0x00192d7dd558d135ULL, 0x0027cd6a8323ffa7ULL,
+ 0x00239f1a412dc1e7ULL, 0x0046b4b3be74fc5cULL,
+ 0x0020c47a2bef5bceULL, 0x00aa17e48f43862bULL,
+ 0x00f7e26c96342e5fULL, 0x0008011c530f39a9ULL)},
}}, {{
- {FIELD_LITERAL(0x00aad4ac569bf0f1ULL, 0x00a67adc90b27740ULL,
- 0x0048551369a5751aULL, 0x0031252584a3306aULL,
- 0x0084e15df770e6fcULL, 0x00d7bba1c74b5805ULL,
- 0x00a80ef223af1012ULL, 0x0089c85ceb843a34ULL)},
- {FIELD_LITERAL(0x00c4545be4a54004ULL, 0x0099e11f60357e6cULL,
- 0x001f3936d19515a6ULL, 0x007793df84341a6eULL,
- 0x0051061886717ffaULL, 0x00e9b0a660b28f85ULL,
- 0x0044ea685892de0dULL, 0x000257d2a1fda9d9ULL)},
- {FIELD_LITERAL(0x007e8b01b24ac8a8ULL, 0x006cf3b0b5ca1337ULL,
- 0x00f1607d3e36a570ULL, 0x0039b7fab82991a1ULL,
- 0x00231777065840c5ULL, 0x00998e5afdd346f9ULL,
- 0x00b7dc3e64acc85fULL, 0x00baacc748013ad6ULL)},
+ {FIELD_LITERAL(0x00aad4ac569bf0f1ULL, 0x00a67adc90b27740ULL,
+ 0x0048551369a5751aULL, 0x0031252584a3306aULL,
+ 0x0084e15df770e6fcULL, 0x00d7bba1c74b5805ULL,
+ 0x00a80ef223af1012ULL, 0x0089c85ceb843a34ULL)},
+ {FIELD_LITERAL(0x00c4545be4a54004ULL, 0x0099e11f60357e6cULL,
+ 0x001f3936d19515a6ULL, 0x007793df84341a6eULL,
+ 0x0051061886717ffaULL, 0x00e9b0a660b28f85ULL,
+ 0x0044ea685892de0dULL, 0x000257d2a1fda9d9ULL)},
+ {FIELD_LITERAL(0x007e8b01b24ac8a8ULL, 0x006cf3b0b5ca1337ULL,
+ 0x00f1607d3e36a570ULL, 0x0039b7fab82991a1ULL,
+ 0x00231777065840c5ULL, 0x00998e5afdd346f9ULL,
+ 0x00b7dc3e64acc85fULL, 0x00baacc748013ad6ULL)},
}}, {{
- {FIELD_LITERAL(0x008ea6a4177580bfULL, 0x005fa1953e3f0378ULL,
- 0x005fe409ac74d614ULL, 0x00452327f477e047ULL,
- 0x00a4018507fb6073ULL, 0x007b6e71951caac8ULL,
- 0x0012b42ab8a6ce91ULL, 0x0080eca677294ab7ULL)},
- {FIELD_LITERAL(0x00a53edc023ba69bULL, 0x00c6afa83ddde2e8ULL,
- 0x00c3f638b307b14eULL, 0x004a357a64414062ULL,
- 0x00e4d94d8b582dc9ULL, 0x001739caf71695b7ULL,
- 0x0012431b2ae28de1ULL, 0x003b6bc98682907cULL)},
- {FIELD_LITERAL(0x008a9a93be1f99d6ULL, 0x0079fa627cc699c8ULL,
- 0x00b0cfb134ba84c8ULL, 0x001c4b778249419aULL,
- 0x00df4ab3d9c44f40ULL, 0x009f596e6c1a9e3cULL,
- 0x001979c0df237316ULL, 0x00501e953a919b87ULL)},
+ {FIELD_LITERAL(0x008ea6a4177580bfULL, 0x005fa1953e3f0378ULL,
+ 0x005fe409ac74d614ULL, 0x00452327f477e047ULL,
+ 0x00a4018507fb6073ULL, 0x007b6e71951caac8ULL,
+ 0x0012b42ab8a6ce91ULL, 0x0080eca677294ab7ULL)},
+ {FIELD_LITERAL(0x00a53edc023ba69bULL, 0x00c6afa83ddde2e8ULL,
+ 0x00c3f638b307b14eULL, 0x004a357a64414062ULL,
+ 0x00e4d94d8b582dc9ULL, 0x001739caf71695b7ULL,
+ 0x0012431b2ae28de1ULL, 0x003b6bc98682907cULL)},
+ {FIELD_LITERAL(0x008a9a93be1f99d6ULL, 0x0079fa627cc699c8ULL,
+ 0x00b0cfb134ba84c8ULL, 0x001c4b778249419aULL,
+ 0x00df4ab3d9c44f40ULL, 0x009f596e6c1a9e3cULL,
+ 0x001979c0df237316ULL, 0x00501e953a919b87ULL)},
}}
};
const niels_t *curve448_wnaf_base = curve448_wnaf_base_table;
diff --git a/contrib/libs/openssl/crypto/ec/curve448/curve448utils.h b/contrib/libs/openssl/crypto/ec/curve448/curve448utils.h
index 86c258e745..ad6f497553 100644
--- a/contrib/libs/openssl/crypto/ec/curve448/curve448utils.h
+++ b/contrib/libs/openssl/crypto/ec/curve448/curve448utils.h
@@ -1,5 +1,5 @@
/*
- * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
* Copyright 2015 Cryptography Research, Inc.
*
* Licensed under the OpenSSL license (the "License"). You may not use
@@ -24,9 +24,9 @@
*/
# ifndef C448_WORD_BITS
# if (defined(__SIZEOF_INT128__) && (__SIZEOF_INT128__ == 16)) \
- && !defined(__sparc__) \
- && (!defined(__SIZEOF_LONG__) || (__SIZEOF_LONG__ == 8))
-
+ && !defined(__sparc__) \
+ && (!defined(__SIZEOF_LONG__) || (__SIZEOF_LONG__ == 8))
+
# define C448_WORD_BITS 64 /* The number of bits in a word */
# else
# define C448_WORD_BITS 32 /* The number of bits in a word */
diff --git a/contrib/libs/openssl/crypto/ec/curve448/f_generic.c b/contrib/libs/openssl/crypto/ec/curve448/f_generic.c
index 09d08165e2..af7d4e952a 100644
--- a/contrib/libs/openssl/crypto/ec/curve448/f_generic.c
+++ b/contrib/libs/openssl/crypto/ec/curve448/f_generic.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
* Copyright 2015-2016 Cryptography Research, Inc.
*
* Licensed under the OpenSSL license (the "License"). You may not use
@@ -12,9 +12,9 @@
#include "field.h"
static const gf MODULUS = {
- FIELD_LITERAL(0xffffffffffffffULL, 0xffffffffffffffULL, 0xffffffffffffffULL,
- 0xffffffffffffffULL, 0xfffffffffffffeULL, 0xffffffffffffffULL,
- 0xffffffffffffffULL, 0xffffffffffffffULL)
+ FIELD_LITERAL(0xffffffffffffffULL, 0xffffffffffffffULL, 0xffffffffffffffULL,
+ 0xffffffffffffffULL, 0xfffffffffffffeULL, 0xffffffffffffffULL,
+ 0xffffffffffffffULL, 0xffffffffffffffULL)
};
/* Serialize to wire format. */
diff --git a/contrib/libs/openssl/crypto/ec/curve448/scalar.c b/contrib/libs/openssl/crypto/ec/curve448/scalar.c
index 347794bbac..d143b4f178 100644
--- a/contrib/libs/openssl/crypto/ec/curve448/scalar.c
+++ b/contrib/libs/openssl/crypto/ec/curve448/scalar.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
* Copyright 2015-2016 Cryptography Research, Inc.
*
* Licensed under the OpenSSL license (the "License"). You may not use
@@ -14,24 +14,24 @@
#include "word.h"
#include "point_448.h"
-static const c448_word_t MONTGOMERY_FACTOR = (c448_word_t) 0x3bd440fae918bc5ULL;
+static const c448_word_t MONTGOMERY_FACTOR = (c448_word_t) 0x3bd440fae918bc5ULL;
static const curve448_scalar_t sc_p = {
{
{
- SC_LIMB(0x2378c292ab5844f3ULL), SC_LIMB(0x216cc2728dc58f55ULL),
- SC_LIMB(0xc44edb49aed63690ULL), SC_LIMB(0xffffffff7cca23e9ULL),
- SC_LIMB(0xffffffffffffffffULL), SC_LIMB(0xffffffffffffffffULL),
- SC_LIMB(0x3fffffffffffffffULL)
+ SC_LIMB(0x2378c292ab5844f3ULL), SC_LIMB(0x216cc2728dc58f55ULL),
+ SC_LIMB(0xc44edb49aed63690ULL), SC_LIMB(0xffffffff7cca23e9ULL),
+ SC_LIMB(0xffffffffffffffffULL), SC_LIMB(0xffffffffffffffffULL),
+ SC_LIMB(0x3fffffffffffffffULL)
}
}
}, sc_r2 = {
{
{
- SC_LIMB(0xe3539257049b9b60ULL), SC_LIMB(0x7af32c4bc1b195d9ULL),
- SC_LIMB(0x0d66de2388ea1859ULL), SC_LIMB(0xae17cf725ee4d838ULL),
- SC_LIMB(0x1a9cc14ba3c47c44ULL), SC_LIMB(0x2052bcb7e4d070afULL),
- SC_LIMB(0x3402a939f823b729ULL)
+ SC_LIMB(0xe3539257049b9b60ULL), SC_LIMB(0x7af32c4bc1b195d9ULL),
+ SC_LIMB(0x0d66de2388ea1859ULL), SC_LIMB(0xae17cf725ee4d838ULL),
+ SC_LIMB(0x1a9cc14ba3c47c44ULL), SC_LIMB(0x2052bcb7e4d070afULL),
+ SC_LIMB(0x3402a939f823b729ULL)
}
}
};
diff --git a/contrib/libs/openssl/crypto/ec/ec2_oct.c b/contrib/libs/openssl/crypto/ec/ec2_oct.c
index 788e6501fb..c72d8f2846 100644
--- a/contrib/libs/openssl/crypto/ec/ec2_oct.c
+++ b/contrib/libs/openssl/crypto/ec/ec2_oct.c
@@ -237,7 +237,7 @@ int ec_GF2m_simple_oct2point(const EC_GROUP *group, EC_POINT *point,
BN_CTX *ctx)
{
point_conversion_form_t form;
- int y_bit, m;
+ int y_bit, m;
BN_CTX *new_ctx = NULL;
BIGNUM *x, *y, *yxi;
size_t field_len, enc_len;
@@ -283,8 +283,8 @@ int ec_GF2m_simple_oct2point(const EC_GROUP *group, EC_POINT *point,
return EC_POINT_set_to_infinity(group, point);
}
- m = EC_GROUP_get_degree(group);
- field_len = (m + 7) / 8;
+ m = EC_GROUP_get_degree(group);
+ field_len = (m + 7) / 8;
enc_len =
(form ==
POINT_CONVERSION_COMPRESSED) ? 1 + field_len : 1 + 2 * field_len;
@@ -309,7 +309,7 @@ int ec_GF2m_simple_oct2point(const EC_GROUP *group, EC_POINT *point,
if (!BN_bin2bn(buf + 1, field_len, x))
goto err;
- if (BN_num_bits(x) > m) {
+ if (BN_num_bits(x) > m) {
ECerr(EC_F_EC_GF2M_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING);
goto err;
}
@@ -320,7 +320,7 @@ int ec_GF2m_simple_oct2point(const EC_GROUP *group, EC_POINT *point,
} else {
if (!BN_bin2bn(buf + 1 + field_len, field_len, y))
goto err;
- if (BN_num_bits(y) > m) {
+ if (BN_num_bits(y) > m) {
ECerr(EC_F_EC_GF2M_SIMPLE_OCT2POINT, EC_R_INVALID_ENCODING);
goto err;
}
diff --git a/contrib/libs/openssl/crypto/ec/ec2_smpl.c b/contrib/libs/openssl/crypto/ec/ec2_smpl.c
index 84e5537a03..761f89ce8f 100644
--- a/contrib/libs/openssl/crypto/ec/ec2_smpl.c
+++ b/contrib/libs/openssl/crypto/ec/ec2_smpl.c
@@ -204,7 +204,7 @@ int ec_GF2m_simple_group_check_discriminant(const EC_GROUP *group,
ret = 1;
err:
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(new_ctx);
return ret;
}
diff --git a/contrib/libs/openssl/crypto/ec/ec_ameth.c b/contrib/libs/openssl/crypto/ec/ec_ameth.c
index 5098bd7a66..48e4ef041c 100644
--- a/contrib/libs/openssl/crypto/ec/ec_ameth.c
+++ b/contrib/libs/openssl/crypto/ec/ec_ameth.c
@@ -521,12 +521,12 @@ static int ec_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2)
#endif
case ASN1_PKEY_CTRL_DEFAULT_MD_NID:
- if (EVP_PKEY_id(pkey) == EVP_PKEY_SM2) {
- /* For SM2, the only valid digest-alg is SM3 */
- *(int *)arg2 = NID_sm3;
- } else {
- *(int *)arg2 = NID_sha256;
- }
+ if (EVP_PKEY_id(pkey) == EVP_PKEY_SM2) {
+ /* For SM2, the only valid digest-alg is SM3 */
+ *(int *)arg2 = NID_sm3;
+ } else {
+ *(int *)arg2 = NID_sha256;
+ }
return 1;
case ASN1_PKEY_CTRL_SET1_TLS_ENCPT:
diff --git a/contrib/libs/openssl/crypto/ec/ec_asn1.c b/contrib/libs/openssl/crypto/ec/ec_asn1.c
index c8ee1e6f17..f763a52e8a 100644
--- a/contrib/libs/openssl/crypto/ec/ec_asn1.c
+++ b/contrib/libs/openssl/crypto/ec/ec_asn1.c
@@ -585,12 +585,12 @@ ECPKPARAMETERS *EC_GROUP_get_ecpkparameters(const EC_GROUP *group,
EC_GROUP *EC_GROUP_new_from_ecparameters(const ECPARAMETERS *params)
{
int ok = 0, tmp;
- EC_GROUP *ret = NULL, *dup = NULL;
+ EC_GROUP *ret = NULL, *dup = NULL;
BIGNUM *p = NULL, *a = NULL, *b = NULL;
EC_POINT *point = NULL;
long field_bits;
- int curve_name = NID_undef;
- BN_CTX *ctx = NULL;
+ int curve_name = NID_undef;
+ BN_CTX *ctx = NULL;
if (!params->fieldID || !params->fieldID->fieldType ||
!params->fieldID->p.ptr) {
@@ -811,61 +811,61 @@ EC_GROUP *EC_GROUP_new_from_ecparameters(const ECPARAMETERS *params)
goto err;
}
- /*
- * Check if the explicit parameters group just created matches one of the
- * built-in curves.
- *
- * We create a copy of the group just built, so that we can remove optional
- * fields for the lookup: we do this to avoid the possibility that one of
- * the optional parameters is used to force the library into using a less
- * performant and less secure EC_METHOD instead of the specialized one.
- * In any case, `seed` is not really used in any computation, while a
- * cofactor different from the one in the built-in table is just
- * mathematically wrong anyway and should not be used.
- */
- if ((ctx = BN_CTX_new()) == NULL) {
- ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_BN_LIB);
- goto err;
- }
- if ((dup = EC_GROUP_dup(ret)) == NULL
- || EC_GROUP_set_seed(dup, NULL, 0) != 1
- || !EC_GROUP_set_generator(dup, point, a, NULL)) {
- ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_EC_LIB);
- goto err;
- }
- if ((curve_name = ec_curve_nid_from_params(dup, ctx)) != NID_undef) {
- /*
- * The input explicit parameters successfully matched one of the
- * built-in curves: often for built-in curves we have specialized
- * methods with better performance and hardening.
- *
- * In this case we replace the `EC_GROUP` created through explicit
- * parameters with one created from a named group.
- */
- EC_GROUP *named_group = NULL;
-
-#ifndef OPENSSL_NO_EC_NISTP_64_GCC_128
- /*
- * NID_wap_wsg_idm_ecid_wtls12 and NID_secp224r1 are both aliases for
- * the same curve, we prefer the SECP nid when matching explicit
- * parameters as that is associated with a specialized EC_METHOD.
- */
- if (curve_name == NID_wap_wsg_idm_ecid_wtls12)
- curve_name = NID_secp224r1;
-#endif /* !def(OPENSSL_NO_EC_NISTP_64_GCC_128) */
-
- if ((named_group = EC_GROUP_new_by_curve_name(curve_name)) == NULL) {
- ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_EC_LIB);
- goto err;
- }
- EC_GROUP_free(ret);
- ret = named_group;
-
- /*
- * Set the flag so that EC_GROUPs created from explicit parameters are
- * serialized using explicit parameters by default.
- */
- EC_GROUP_set_asn1_flag(ret, OPENSSL_EC_EXPLICIT_CURVE);
+ /*
+ * Check if the explicit parameters group just created matches one of the
+ * built-in curves.
+ *
+ * We create a copy of the group just built, so that we can remove optional
+ * fields for the lookup: we do this to avoid the possibility that one of
+ * the optional parameters is used to force the library into using a less
+ * performant and less secure EC_METHOD instead of the specialized one.
+ * In any case, `seed` is not really used in any computation, while a
+ * cofactor different from the one in the built-in table is just
+ * mathematically wrong anyway and should not be used.
+ */
+ if ((ctx = BN_CTX_new()) == NULL) {
+ ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_BN_LIB);
+ goto err;
+ }
+ if ((dup = EC_GROUP_dup(ret)) == NULL
+ || EC_GROUP_set_seed(dup, NULL, 0) != 1
+ || !EC_GROUP_set_generator(dup, point, a, NULL)) {
+ ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_EC_LIB);
+ goto err;
+ }
+ if ((curve_name = ec_curve_nid_from_params(dup, ctx)) != NID_undef) {
+ /*
+ * The input explicit parameters successfully matched one of the
+ * built-in curves: often for built-in curves we have specialized
+ * methods with better performance and hardening.
+ *
+ * In this case we replace the `EC_GROUP` created through explicit
+ * parameters with one created from a named group.
+ */
+ EC_GROUP *named_group = NULL;
+
+#ifndef OPENSSL_NO_EC_NISTP_64_GCC_128
+ /*
+ * NID_wap_wsg_idm_ecid_wtls12 and NID_secp224r1 are both aliases for
+ * the same curve, we prefer the SECP nid when matching explicit
+ * parameters as that is associated with a specialized EC_METHOD.
+ */
+ if (curve_name == NID_wap_wsg_idm_ecid_wtls12)
+ curve_name = NID_secp224r1;
+#endif /* !def(OPENSSL_NO_EC_NISTP_64_GCC_128) */
+
+ if ((named_group = EC_GROUP_new_by_curve_name(curve_name)) == NULL) {
+ ECerr(EC_F_EC_GROUP_NEW_FROM_ECPARAMETERS, ERR_R_EC_LIB);
+ goto err;
+ }
+ EC_GROUP_free(ret);
+ ret = named_group;
+
+ /*
+ * Set the flag so that EC_GROUPs created from explicit parameters are
+ * serialized using explicit parameters by default.
+ */
+ EC_GROUP_set_asn1_flag(ret, OPENSSL_EC_EXPLICIT_CURVE);
/*
* If the input params do not contain the optional seed field we make
@@ -880,24 +880,24 @@ EC_GROUP *EC_GROUP_new_from_ecparameters(const ECPARAMETERS *params)
if (EC_GROUP_set_seed(ret, NULL, 0) != 1)
goto err;
}
- }
-
+ }
+
ok = 1;
err:
if (!ok) {
- EC_GROUP_free(ret);
+ EC_GROUP_free(ret);
ret = NULL;
}
- EC_GROUP_free(dup);
+ EC_GROUP_free(dup);
BN_free(p);
BN_free(a);
BN_free(b);
EC_POINT_free(point);
-
- BN_CTX_free(ctx);
-
+
+ BN_CTX_free(ctx);
+
return ret;
}
@@ -963,7 +963,7 @@ EC_GROUP *d2i_ECPKParameters(EC_GROUP **a, const unsigned char **in, long len)
group->decoded_from_explicit_params = 1;
if (a) {
- EC_GROUP_free(*a);
+ EC_GROUP_free(*a);
*a = group;
}
@@ -1011,7 +1011,7 @@ EC_KEY *d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len)
ret = *a;
if (priv_key->parameters) {
- EC_GROUP_free(ret->group);
+ EC_GROUP_free(ret->group);
ret->group = EC_GROUP_new_from_ecpkparameters(priv_key->parameters);
if (ret->group != NULL
&& priv_key->parameters->type == ECPKPARAMETERS_TYPE_EXPLICIT)
diff --git a/contrib/libs/openssl/crypto/ec/ec_curve.c b/contrib/libs/openssl/crypto/ec/ec_curve.c
index 8de486cbd7..de7792292c 100644
--- a/contrib/libs/openssl/crypto/ec/ec_curve.c
+++ b/contrib/libs/openssl/crypto/ec/ec_curve.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2002-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2002-2019 The OpenSSL Project Authors. All Rights Reserved.
* Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved
*
* Licensed under the OpenSSL license (the "License"). You may not use
@@ -3197,115 +3197,115 @@ int EC_curve_nist2nid(const char *name)
}
return NID_undef;
}
-
-#define NUM_BN_FIELDS 6
-/*
- * Validates EC domain parameter data for known named curves.
- * This can be used when a curve is loaded explicitly (without a curve
- * name) or to validate that domain parameters have not been modified.
- *
- * Returns: The nid associated with the found named curve, or NID_undef
- * if not found. If there was an error it returns -1.
- */
-int ec_curve_nid_from_params(const EC_GROUP *group, BN_CTX *ctx)
-{
- int ret = -1, nid, len, field_type, param_len;
- size_t i, seed_len;
- const unsigned char *seed, *params_seed, *params;
- unsigned char *param_bytes = NULL;
- const EC_CURVE_DATA *data;
- const EC_POINT *generator = NULL;
- const EC_METHOD *meth;
- const BIGNUM *cofactor = NULL;
- /* An array of BIGNUMs for (p, a, b, x, y, order) */
- BIGNUM *bn[NUM_BN_FIELDS] = {NULL, NULL, NULL, NULL, NULL, NULL};
-
- meth = EC_GROUP_method_of(group);
- if (meth == NULL)
- return -1;
- /* Use the optional named curve nid as a search field */
- nid = EC_GROUP_get_curve_name(group);
- field_type = EC_METHOD_get_field_type(meth);
- seed_len = EC_GROUP_get_seed_len(group);
- seed = EC_GROUP_get0_seed(group);
- cofactor = EC_GROUP_get0_cofactor(group);
-
- BN_CTX_start(ctx);
-
- /*
- * The built-in curves contains data fields (p, a, b, x, y, order) that are
- * all zero-padded to be the same size. The size of the padding is
- * determined by either the number of bytes in the field modulus (p) or the
- * EC group order, whichever is larger.
- */
- param_len = BN_num_bytes(group->order);
- len = BN_num_bytes(group->field);
- if (len > param_len)
- param_len = len;
-
- /* Allocate space to store the padded data for (p, a, b, x, y, order) */
- param_bytes = OPENSSL_malloc(param_len * NUM_BN_FIELDS);
- if (param_bytes == NULL)
- goto end;
-
- /* Create the bignums */
- for (i = 0; i < NUM_BN_FIELDS; ++i) {
- if ((bn[i] = BN_CTX_get(ctx)) == NULL)
- goto end;
- }
- /*
- * Fill in the bn array with the same values as the internal curves
- * i.e. the values are p, a, b, x, y, order.
- */
- /* Get p, a & b */
- if (!(EC_GROUP_get_curve(group, bn[0], bn[1], bn[2], ctx)
- && ((generator = EC_GROUP_get0_generator(group)) != NULL)
- /* Get x & y */
- && EC_POINT_get_affine_coordinates(group, generator, bn[3], bn[4], ctx)
- /* Get order */
- && EC_GROUP_get_order(group, bn[5], ctx)))
- goto end;
-
- /*
- * Convert the bignum array to bytes that are joined together to form
- * a single buffer that contains data for all fields.
- * (p, a, b, x, y, order) are all zero padded to be the same size.
- */
- for (i = 0; i < NUM_BN_FIELDS; ++i) {
- if (BN_bn2binpad(bn[i], &param_bytes[i*param_len], param_len) <= 0)
- goto end;
- }
-
- for (i = 0; i < curve_list_length; i++) {
- const ec_list_element curve = curve_list[i];
-
- data = curve.data;
- /* Get the raw order byte data */
- params_seed = (const unsigned char *)(data + 1); /* skip header */
- params = params_seed + data->seed_len;
-
- /* Look for unique fields in the fixed curve data */
- if (data->field_type == field_type
- && param_len == data->param_len
- && (nid <= 0 || nid == curve.nid)
- /* check the optional cofactor (ignore if its zero) */
- && (BN_is_zero(cofactor)
- || BN_is_word(cofactor, (const BN_ULONG)curve.data->cofactor))
- /* Check the optional seed (ignore if its not set) */
- && (data->seed_len == 0 || seed_len == 0
- || ((size_t)data->seed_len == seed_len
- && memcmp(params_seed, seed, seed_len) == 0))
- /* Check that the groups params match the built-in curve params */
- && memcmp(param_bytes, params, param_len * NUM_BN_FIELDS)
- == 0) {
- ret = curve.nid;
- goto end;
- }
- }
- /* Gets here if the group was not found */
- ret = NID_undef;
-end:
- OPENSSL_free(param_bytes);
- BN_CTX_end(ctx);
- return ret;
-}
+
+#define NUM_BN_FIELDS 6
+/*
+ * Validates EC domain parameter data for known named curves.
+ * This can be used when a curve is loaded explicitly (without a curve
+ * name) or to validate that domain parameters have not been modified.
+ *
+ * Returns: The nid associated with the found named curve, or NID_undef
+ * if not found. If there was an error it returns -1.
+ */
+int ec_curve_nid_from_params(const EC_GROUP *group, BN_CTX *ctx)
+{
+ int ret = -1, nid, len, field_type, param_len;
+ size_t i, seed_len;
+ const unsigned char *seed, *params_seed, *params;
+ unsigned char *param_bytes = NULL;
+ const EC_CURVE_DATA *data;
+ const EC_POINT *generator = NULL;
+ const EC_METHOD *meth;
+ const BIGNUM *cofactor = NULL;
+ /* An array of BIGNUMs for (p, a, b, x, y, order) */
+ BIGNUM *bn[NUM_BN_FIELDS] = {NULL, NULL, NULL, NULL, NULL, NULL};
+
+ meth = EC_GROUP_method_of(group);
+ if (meth == NULL)
+ return -1;
+ /* Use the optional named curve nid as a search field */
+ nid = EC_GROUP_get_curve_name(group);
+ field_type = EC_METHOD_get_field_type(meth);
+ seed_len = EC_GROUP_get_seed_len(group);
+ seed = EC_GROUP_get0_seed(group);
+ cofactor = EC_GROUP_get0_cofactor(group);
+
+ BN_CTX_start(ctx);
+
+ /*
+ * The built-in curves contains data fields (p, a, b, x, y, order) that are
+ * all zero-padded to be the same size. The size of the padding is
+ * determined by either the number of bytes in the field modulus (p) or the
+ * EC group order, whichever is larger.
+ */
+ param_len = BN_num_bytes(group->order);
+ len = BN_num_bytes(group->field);
+ if (len > param_len)
+ param_len = len;
+
+ /* Allocate space to store the padded data for (p, a, b, x, y, order) */
+ param_bytes = OPENSSL_malloc(param_len * NUM_BN_FIELDS);
+ if (param_bytes == NULL)
+ goto end;
+
+ /* Create the bignums */
+ for (i = 0; i < NUM_BN_FIELDS; ++i) {
+ if ((bn[i] = BN_CTX_get(ctx)) == NULL)
+ goto end;
+ }
+ /*
+ * Fill in the bn array with the same values as the internal curves
+ * i.e. the values are p, a, b, x, y, order.
+ */
+ /* Get p, a & b */
+ if (!(EC_GROUP_get_curve(group, bn[0], bn[1], bn[2], ctx)
+ && ((generator = EC_GROUP_get0_generator(group)) != NULL)
+ /* Get x & y */
+ && EC_POINT_get_affine_coordinates(group, generator, bn[3], bn[4], ctx)
+ /* Get order */
+ && EC_GROUP_get_order(group, bn[5], ctx)))
+ goto end;
+
+ /*
+ * Convert the bignum array to bytes that are joined together to form
+ * a single buffer that contains data for all fields.
+ * (p, a, b, x, y, order) are all zero padded to be the same size.
+ */
+ for (i = 0; i < NUM_BN_FIELDS; ++i) {
+ if (BN_bn2binpad(bn[i], &param_bytes[i*param_len], param_len) <= 0)
+ goto end;
+ }
+
+ for (i = 0; i < curve_list_length; i++) {
+ const ec_list_element curve = curve_list[i];
+
+ data = curve.data;
+ /* Get the raw order byte data */
+ params_seed = (const unsigned char *)(data + 1); /* skip header */
+ params = params_seed + data->seed_len;
+
+ /* Look for unique fields in the fixed curve data */
+ if (data->field_type == field_type
+ && param_len == data->param_len
+ && (nid <= 0 || nid == curve.nid)
+ /* check the optional cofactor (ignore if its zero) */
+ && (BN_is_zero(cofactor)
+ || BN_is_word(cofactor, (const BN_ULONG)curve.data->cofactor))
+ /* Check the optional seed (ignore if its not set) */
+ && (data->seed_len == 0 || seed_len == 0
+ || ((size_t)data->seed_len == seed_len
+ && memcmp(params_seed, seed, seed_len) == 0))
+ /* Check that the groups params match the built-in curve params */
+ && memcmp(param_bytes, params, param_len * NUM_BN_FIELDS)
+ == 0) {
+ ret = curve.nid;
+ goto end;
+ }
+ }
+ /* Gets here if the group was not found */
+ ret = NID_undef;
+end:
+ OPENSSL_free(param_bytes);
+ BN_CTX_end(ctx);
+ return ret;
+}
diff --git a/contrib/libs/openssl/crypto/ec/ec_lib.c b/contrib/libs/openssl/crypto/ec/ec_lib.c
index 08db89fcee..5bc08f7b63 100644
--- a/contrib/libs/openssl/crypto/ec/ec_lib.c
+++ b/contrib/libs/openssl/crypto/ec/ec_lib.c
@@ -266,67 +266,67 @@ int EC_METHOD_get_field_type(const EC_METHOD *meth)
static int ec_precompute_mont_data(EC_GROUP *);
-/*-
- * Try computing cofactor from the generator order (n) and field cardinality (q).
- * This works for all curves of cryptographic interest.
- *
- * Hasse thm: q + 1 - 2*sqrt(q) <= n*h <= q + 1 + 2*sqrt(q)
- * h_min = (q + 1 - 2*sqrt(q))/n
- * h_max = (q + 1 + 2*sqrt(q))/n
- * h_max - h_min = 4*sqrt(q)/n
- * So if n > 4*sqrt(q) holds, there is only one possible value for h:
- * h = \lfloor (h_min + h_max)/2 \rceil = \lfloor (q + 1)/n \rceil
- *
- * Otherwise, zero cofactor and return success.
- */
-static int ec_guess_cofactor(EC_GROUP *group) {
- int ret = 0;
- BN_CTX *ctx = NULL;
- BIGNUM *q = NULL;
-
- /*-
- * If the cofactor is too large, we cannot guess it.
- * The RHS of below is a strict overestimate of lg(4 * sqrt(q))
- */
- if (BN_num_bits(group->order) <= (BN_num_bits(group->field) + 1) / 2 + 3) {
- /* default to 0 */
- BN_zero(group->cofactor);
- /* return success */
- return 1;
- }
-
- if ((ctx = BN_CTX_new()) == NULL)
- return 0;
-
- BN_CTX_start(ctx);
- if ((q = BN_CTX_get(ctx)) == NULL)
- goto err;
-
- /* set q = 2**m for binary fields; q = p otherwise */
- if (group->meth->field_type == NID_X9_62_characteristic_two_field) {
- BN_zero(q);
- if (!BN_set_bit(q, BN_num_bits(group->field) - 1))
- goto err;
- } else {
- if (!BN_copy(q, group->field))
- goto err;
- }
-
- /* compute h = \lfloor (q + 1)/n \rceil = \lfloor (q + 1 + n/2)/n \rfloor */
- if (!BN_rshift1(group->cofactor, group->order) /* n/2 */
- || !BN_add(group->cofactor, group->cofactor, q) /* q + n/2 */
- /* q + 1 + n/2 */
- || !BN_add(group->cofactor, group->cofactor, BN_value_one())
- /* (q + 1 + n/2)/n */
- || !BN_div(group->cofactor, NULL, group->cofactor, group->order, ctx))
- goto err;
- ret = 1;
- err:
- BN_CTX_end(ctx);
- BN_CTX_free(ctx);
- return ret;
-}
-
+/*-
+ * Try computing cofactor from the generator order (n) and field cardinality (q).
+ * This works for all curves of cryptographic interest.
+ *
+ * Hasse thm: q + 1 - 2*sqrt(q) <= n*h <= q + 1 + 2*sqrt(q)
+ * h_min = (q + 1 - 2*sqrt(q))/n
+ * h_max = (q + 1 + 2*sqrt(q))/n
+ * h_max - h_min = 4*sqrt(q)/n
+ * So if n > 4*sqrt(q) holds, there is only one possible value for h:
+ * h = \lfloor (h_min + h_max)/2 \rceil = \lfloor (q + 1)/n \rceil
+ *
+ * Otherwise, zero cofactor and return success.
+ */
+static int ec_guess_cofactor(EC_GROUP *group) {
+ int ret = 0;
+ BN_CTX *ctx = NULL;
+ BIGNUM *q = NULL;
+
+ /*-
+ * If the cofactor is too large, we cannot guess it.
+ * The RHS of below is a strict overestimate of lg(4 * sqrt(q))
+ */
+ if (BN_num_bits(group->order) <= (BN_num_bits(group->field) + 1) / 2 + 3) {
+ /* default to 0 */
+ BN_zero(group->cofactor);
+ /* return success */
+ return 1;
+ }
+
+ if ((ctx = BN_CTX_new()) == NULL)
+ return 0;
+
+ BN_CTX_start(ctx);
+ if ((q = BN_CTX_get(ctx)) == NULL)
+ goto err;
+
+ /* set q = 2**m for binary fields; q = p otherwise */
+ if (group->meth->field_type == NID_X9_62_characteristic_two_field) {
+ BN_zero(q);
+ if (!BN_set_bit(q, BN_num_bits(group->field) - 1))
+ goto err;
+ } else {
+ if (!BN_copy(q, group->field))
+ goto err;
+ }
+
+ /* compute h = \lfloor (q + 1)/n \rceil = \lfloor (q + 1 + n/2)/n \rfloor */
+ if (!BN_rshift1(group->cofactor, group->order) /* n/2 */
+ || !BN_add(group->cofactor, group->cofactor, q) /* q + n/2 */
+ /* q + 1 + n/2 */
+ || !BN_add(group->cofactor, group->cofactor, BN_value_one())
+ /* (q + 1 + n/2)/n */
+ || !BN_div(group->cofactor, NULL, group->cofactor, group->order, ctx))
+ goto err;
+ ret = 1;
+ err:
+ BN_CTX_end(ctx);
+ BN_CTX_free(ctx);
+ return ret;
+}
+
int EC_GROUP_set_generator(EC_GROUP *group, const EC_POINT *generator,
const BIGNUM *order, const BIGNUM *cofactor)
{
@@ -335,34 +335,34 @@ int EC_GROUP_set_generator(EC_GROUP *group, const EC_POINT *generator,
return 0;
}
- /* require group->field >= 1 */
- if (group->field == NULL || BN_is_zero(group->field)
- || BN_is_negative(group->field)) {
- ECerr(EC_F_EC_GROUP_SET_GENERATOR, EC_R_INVALID_FIELD);
- return 0;
- }
-
- /*-
- * - require order >= 1
- * - enforce upper bound due to Hasse thm: order can be no more than one bit
- * longer than field cardinality
- */
- if (order == NULL || BN_is_zero(order) || BN_is_negative(order)
- || BN_num_bits(order) > BN_num_bits(group->field) + 1) {
- ECerr(EC_F_EC_GROUP_SET_GENERATOR, EC_R_INVALID_GROUP_ORDER);
- return 0;
- }
-
- /*-
- * Unfortunately the cofactor is an optional field in many standards.
- * Internally, the lib uses 0 cofactor as a marker for "unknown cofactor".
- * So accept cofactor == NULL or cofactor >= 0.
- */
- if (cofactor != NULL && BN_is_negative(cofactor)) {
- ECerr(EC_F_EC_GROUP_SET_GENERATOR, EC_R_UNKNOWN_COFACTOR);
- return 0;
- }
-
+ /* require group->field >= 1 */
+ if (group->field == NULL || BN_is_zero(group->field)
+ || BN_is_negative(group->field)) {
+ ECerr(EC_F_EC_GROUP_SET_GENERATOR, EC_R_INVALID_FIELD);
+ return 0;
+ }
+
+ /*-
+ * - require order >= 1
+ * - enforce upper bound due to Hasse thm: order can be no more than one bit
+ * longer than field cardinality
+ */
+ if (order == NULL || BN_is_zero(order) || BN_is_negative(order)
+ || BN_num_bits(order) > BN_num_bits(group->field) + 1) {
+ ECerr(EC_F_EC_GROUP_SET_GENERATOR, EC_R_INVALID_GROUP_ORDER);
+ return 0;
+ }
+
+ /*-
+ * Unfortunately the cofactor is an optional field in many standards.
+ * Internally, the lib uses 0 cofactor as a marker for "unknown cofactor".
+ * So accept cofactor == NULL or cofactor >= 0.
+ */
+ if (cofactor != NULL && BN_is_negative(cofactor)) {
+ ECerr(EC_F_EC_GROUP_SET_GENERATOR, EC_R_UNKNOWN_COFACTOR);
+ return 0;
+ }
+
if (group->generator == NULL) {
group->generator = EC_POINT_new(group);
if (group->generator == NULL)
@@ -371,17 +371,17 @@ int EC_GROUP_set_generator(EC_GROUP *group, const EC_POINT *generator,
if (!EC_POINT_copy(group->generator, generator))
return 0;
- if (!BN_copy(group->order, order))
- return 0;
+ if (!BN_copy(group->order, order))
+ return 0;
- /* Either take the provided positive cofactor, or try to compute it */
- if (cofactor != NULL && !BN_is_zero(cofactor)) {
+ /* Either take the provided positive cofactor, or try to compute it */
+ if (cofactor != NULL && !BN_is_zero(cofactor)) {
if (!BN_copy(group->cofactor, cofactor))
return 0;
- } else if (!ec_guess_cofactor(group)) {
+ } else if (!ec_guess_cofactor(group)) {
BN_zero(group->cofactor);
- return 0;
- }
+ return 0;
+ }
/*
* Some groups have an order with
@@ -1164,7 +1164,7 @@ static int ec_field_inverse_mod_ord(const EC_GROUP *group, BIGNUM *r,
ret = 1;
err:
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(new_ctx);
return ret;
}
diff --git a/contrib/libs/openssl/crypto/ec/ec_mult.c b/contrib/libs/openssl/crypto/ec/ec_mult.c
index 9a1e3974ed..26a5ad4b03 100644
--- a/contrib/libs/openssl/crypto/ec/ec_mult.c
+++ b/contrib/libs/openssl/crypto/ec/ec_mult.c
@@ -371,7 +371,7 @@ int ec_scalar_mul_ladder(const EC_GROUP *group, EC_POINT *r,
err:
EC_POINT_free(p);
- EC_POINT_clear_free(s);
+ EC_POINT_clear_free(s);
BN_CTX_end(ctx);
return ret;
@@ -434,7 +434,7 @@ int ec_wNAF_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar,
* scalar multiplication implementation based on a Montgomery ladder,
* with various timing attack defenses.
*/
- if ((scalar != group->order) && (scalar != NULL) && (num == 0)) {
+ if ((scalar != group->order) && (scalar != NULL) && (num == 0)) {
/*-
* In this case we want to compute scalar * GeneratorPoint: this
* codepath is reached most prominently by (ephemeral) key
@@ -445,7 +445,7 @@ int ec_wNAF_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar,
*/
return ec_scalar_mul_ladder(group, r, scalar, NULL, ctx);
}
- if ((scalar == NULL) && (num == 1) && (scalars[0] != group->order)) {
+ if ((scalar == NULL) && (num == 1) && (scalars[0] != group->order)) {
/*-
* In this case we want to compute scalar * VariablePoint: this
* codepath is reached most prominently by the second half of ECDH,
@@ -955,7 +955,7 @@ int ec_wNAF_precompute_mult(EC_GROUP *group, BN_CTX *ctx)
ret = 1;
err:
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(new_ctx);
EC_ec_pre_comp_free(pre_comp);
if (points) {
diff --git a/contrib/libs/openssl/crypto/ec/ec_pmeth.c b/contrib/libs/openssl/crypto/ec/ec_pmeth.c
index 64d2cc93a6..fbf4c6ce00 100644
--- a/contrib/libs/openssl/crypto/ec/ec_pmeth.c
+++ b/contrib/libs/openssl/crypto/ec/ec_pmeth.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2006-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2006-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -323,11 +323,11 @@ static int pkey_ec_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2)
EVP_MD_type((const EVP_MD *)p2) != NID_sha224 &&
EVP_MD_type((const EVP_MD *)p2) != NID_sha256 &&
EVP_MD_type((const EVP_MD *)p2) != NID_sha384 &&
- EVP_MD_type((const EVP_MD *)p2) != NID_sha512 &&
- EVP_MD_type((const EVP_MD *)p2) != NID_sha3_224 &&
- EVP_MD_type((const EVP_MD *)p2) != NID_sha3_256 &&
- EVP_MD_type((const EVP_MD *)p2) != NID_sha3_384 &&
- EVP_MD_type((const EVP_MD *)p2) != NID_sha3_512) {
+ EVP_MD_type((const EVP_MD *)p2) != NID_sha512 &&
+ EVP_MD_type((const EVP_MD *)p2) != NID_sha3_224 &&
+ EVP_MD_type((const EVP_MD *)p2) != NID_sha3_256 &&
+ EVP_MD_type((const EVP_MD *)p2) != NID_sha3_384 &&
+ EVP_MD_type((const EVP_MD *)p2) != NID_sha3_512) {
ECerr(EC_F_PKEY_EC_CTRL, EC_R_INVALID_DIGEST_TYPE);
return 0;
}
diff --git a/contrib/libs/openssl/crypto/ec/ecdh_ossl.c b/contrib/libs/openssl/crypto/ec/ecdh_ossl.c
index 0be00d43da..6a37695b07 100644
--- a/contrib/libs/openssl/crypto/ec/ecdh_ossl.c
+++ b/contrib/libs/openssl/crypto/ec/ecdh_ossl.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2002-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2002-2019 The OpenSSL Project Authors. All Rights Reserved.
* Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved
*
* Licensed under the OpenSSL license (the "License"). You may not use
@@ -58,7 +58,7 @@ int ecdh_simple_compute_key(unsigned char **pout, size_t *poutlen,
priv_key = EC_KEY_get0_private_key(ecdh);
if (priv_key == NULL) {
- ECerr(EC_F_ECDH_SIMPLE_COMPUTE_KEY, EC_R_MISSING_PRIVATE_KEY);
+ ECerr(EC_F_ECDH_SIMPLE_COMPUTE_KEY, EC_R_MISSING_PRIVATE_KEY);
goto err;
}
@@ -112,8 +112,8 @@ int ecdh_simple_compute_key(unsigned char **pout, size_t *poutlen,
ret = 1;
err:
- EC_POINT_clear_free(tmp);
- BN_CTX_end(ctx);
+ EC_POINT_clear_free(tmp);
+ BN_CTX_end(ctx);
BN_CTX_free(ctx);
OPENSSL_free(buf);
return ret;
diff --git a/contrib/libs/openssl/crypto/ec/ecdsa_ossl.c b/contrib/libs/openssl/crypto/ec/ecdsa_ossl.c
index 1da87bfb5e..beef99612a 100644
--- a/contrib/libs/openssl/crypto/ec/ecdsa_ossl.c
+++ b/contrib/libs/openssl/crypto/ec/ecdsa_ossl.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2002-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2002-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -41,16 +41,16 @@ static int ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in,
const EC_GROUP *group;
int ret = 0;
int order_bits;
- const BIGNUM *priv_key;
+ const BIGNUM *priv_key;
if (eckey == NULL || (group = EC_KEY_get0_group(eckey)) == NULL) {
ECerr(EC_F_ECDSA_SIGN_SETUP, ERR_R_PASSED_NULL_PARAMETER);
return 0;
}
- if ((priv_key = EC_KEY_get0_private_key(eckey)) == NULL) {
- ECerr(EC_F_ECDSA_SIGN_SETUP, EC_R_MISSING_PRIVATE_KEY);
- return 0;
- }
+ if ((priv_key = EC_KEY_get0_private_key(eckey)) == NULL) {
+ ECerr(EC_F_ECDSA_SIGN_SETUP, EC_R_MISSING_PRIVATE_KEY);
+ return 0;
+ }
if (!EC_KEY_can_sign(eckey)) {
ECerr(EC_F_ECDSA_SIGN_SETUP, EC_R_CURVE_DOES_NOT_SUPPORT_SIGNING);
@@ -88,7 +88,7 @@ static int ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in,
/* get random k */
do {
if (dgst != NULL) {
- if (!BN_generate_dsa_nonce(k, order, priv_key,
+ if (!BN_generate_dsa_nonce(k, order, priv_key,
dgst, dlen, ctx)) {
ECerr(EC_F_ECDSA_SIGN_SETUP,
EC_R_RANDOM_NUMBER_GENERATION_FAILED);
@@ -166,14 +166,14 @@ ECDSA_SIG *ossl_ecdsa_sign_sig(const unsigned char *dgst, int dgst_len,
group = EC_KEY_get0_group(eckey);
priv_key = EC_KEY_get0_private_key(eckey);
- if (group == NULL) {
+ if (group == NULL) {
ECerr(EC_F_OSSL_ECDSA_SIGN_SIG, ERR_R_PASSED_NULL_PARAMETER);
return NULL;
}
- if (priv_key == NULL) {
- ECerr(EC_F_OSSL_ECDSA_SIGN_SIG, EC_R_MISSING_PRIVATE_KEY);
- return NULL;
- }
+ if (priv_key == NULL) {
+ ECerr(EC_F_OSSL_ECDSA_SIGN_SIG, EC_R_MISSING_PRIVATE_KEY);
+ return NULL;
+ }
if (!EC_KEY_can_sign(eckey)) {
ECerr(EC_F_OSSL_ECDSA_SIGN_SIG, EC_R_CURVE_DOES_NOT_SUPPORT_SIGNING);
diff --git a/contrib/libs/openssl/crypto/ec/ecp_nistp224.c b/contrib/libs/openssl/crypto/ec/ecp_nistp224.c
index 6f7d66c8be..5040b5a49b 100644
--- a/contrib/libs/openssl/crypto/ec/ecp_nistp224.c
+++ b/contrib/libs/openssl/crypto/ec/ecp_nistp224.c
@@ -329,14 +329,14 @@ static void felem_to_bin28(u8 out[28], const felem in)
static int BN_to_felem(felem out, const BIGNUM *bn)
{
felem_bytearray b_out;
- int num_bytes;
+ int num_bytes;
- if (BN_is_negative(bn)) {
+ if (BN_is_negative(bn)) {
ECerr(EC_F_BN_TO_FELEM, EC_R_BIGNUM_OUT_OF_RANGE);
return 0;
}
- num_bytes = BN_bn2lebinpad(bn, b_out, sizeof(b_out));
- if (num_bytes < 0) {
+ num_bytes = BN_bn2lebinpad(bn, b_out, sizeof(b_out));
+ if (num_bytes < 0) {
ECerr(EC_F_BN_TO_FELEM, EC_R_BIGNUM_OUT_OF_RANGE);
return 0;
}
@@ -347,9 +347,9 @@ static int BN_to_felem(felem out, const BIGNUM *bn)
/* From internal representation to OpenSSL BIGNUM */
static BIGNUM *felem_to_BN(BIGNUM *out, const felem in)
{
- felem_bytearray b_out;
- felem_to_bin28(b_out, in);
- return BN_lebin2bn(b_out, sizeof(b_out), out);
+ felem_bytearray b_out;
+ felem_to_bin28(b_out, in);
+ return BN_lebin2bn(b_out, sizeof(b_out), out);
}
/******************************************************************************/
@@ -1416,7 +1416,7 @@ int ec_GFp_nistp224_points_mul(const EC_GROUP *group, EC_POINT *r,
felem_bytearray *secrets = NULL;
felem (*pre_comp)[17][3] = NULL;
felem *tmp_felems = NULL;
- int num_bytes;
+ int num_bytes;
int have_pre_comp = 0;
size_t num_points = num;
felem x_in, y_in, z_in, x_out, y_out, z_out;
@@ -1491,11 +1491,11 @@ int ec_GFp_nistp224_points_mul(const EC_GROUP *group, EC_POINT *r,
* i.e., they contribute nothing to the linear combination
*/
for (i = 0; i < num_points; ++i) {
- if (i == num) {
+ if (i == num) {
/* the generator */
p = EC_GROUP_get0_generator(group);
p_scalar = scalar;
- } else {
+ } else {
/* the i^th point */
p = points[i];
p_scalar = scalars[i];
@@ -1512,16 +1512,16 @@ int ec_GFp_nistp224_points_mul(const EC_GROUP *group, EC_POINT *r,
ECerr(EC_F_EC_GFP_NISTP224_POINTS_MUL, ERR_R_BN_LIB);
goto err;
}
- num_bytes = BN_bn2lebinpad(tmp_scalar,
- secrets[i], sizeof(secrets[i]));
- } else {
- num_bytes = BN_bn2lebinpad(p_scalar,
- secrets[i], sizeof(secrets[i]));
- }
- if (num_bytes < 0) {
- ECerr(EC_F_EC_GFP_NISTP224_POINTS_MUL, ERR_R_BN_LIB);
- goto err;
- }
+ num_bytes = BN_bn2lebinpad(tmp_scalar,
+ secrets[i], sizeof(secrets[i]));
+ } else {
+ num_bytes = BN_bn2lebinpad(p_scalar,
+ secrets[i], sizeof(secrets[i]));
+ }
+ if (num_bytes < 0) {
+ ECerr(EC_F_EC_GFP_NISTP224_POINTS_MUL, ERR_R_BN_LIB);
+ goto err;
+ }
/* precompute multiples */
if ((!BN_to_felem(x_out, p->X)) ||
(!BN_to_felem(y_out, p->Y)) ||
@@ -1564,21 +1564,21 @@ int ec_GFp_nistp224_points_mul(const EC_GROUP *group, EC_POINT *r,
ECerr(EC_F_EC_GFP_NISTP224_POINTS_MUL, ERR_R_BN_LIB);
goto err;
}
- num_bytes = BN_bn2lebinpad(tmp_scalar, g_secret, sizeof(g_secret));
- } else {
- num_bytes = BN_bn2lebinpad(scalar, g_secret, sizeof(g_secret));
- }
+ num_bytes = BN_bn2lebinpad(tmp_scalar, g_secret, sizeof(g_secret));
+ } else {
+ num_bytes = BN_bn2lebinpad(scalar, g_secret, sizeof(g_secret));
+ }
/* do the multiplication with generator precomputation */
batch_mul(x_out, y_out, z_out,
(const felem_bytearray(*))secrets, num_points,
g_secret,
mixed, (const felem(*)[17][3])pre_comp, g_pre_comp);
- } else {
+ } else {
/* do the multiplication without generator precomputation */
batch_mul(x_out, y_out, z_out,
(const felem_bytearray(*))secrets, num_points,
NULL, mixed, (const felem(*)[17][3])pre_comp, NULL);
- }
+ }
/* reduce the output to its unique minimal representation */
felem_contract(x_in, x_out);
felem_contract(y_in, y_out);
diff --git a/contrib/libs/openssl/crypto/ec/ecp_nistp256.c b/contrib/libs/openssl/crypto/ec/ecp_nistp256.c
index e23e9d2a0b..73aa1a1a73 100644
--- a/contrib/libs/openssl/crypto/ec/ecp_nistp256.c
+++ b/contrib/libs/openssl/crypto/ec/ecp_nistp256.c
@@ -150,14 +150,14 @@ static void smallfelem_to_bin32(u8 out[32], const smallfelem in)
static int BN_to_felem(felem out, const BIGNUM *bn)
{
felem_bytearray b_out;
- int num_bytes;
+ int num_bytes;
- if (BN_is_negative(bn)) {
+ if (BN_is_negative(bn)) {
ECerr(EC_F_BN_TO_FELEM, EC_R_BIGNUM_OUT_OF_RANGE);
return 0;
}
- num_bytes = BN_bn2lebinpad(bn, b_out, sizeof(b_out));
- if (num_bytes < 0) {
+ num_bytes = BN_bn2lebinpad(bn, b_out, sizeof(b_out));
+ if (num_bytes < 0) {
ECerr(EC_F_BN_TO_FELEM, EC_R_BIGNUM_OUT_OF_RANGE);
return 0;
}
@@ -168,9 +168,9 @@ static int BN_to_felem(felem out, const BIGNUM *bn)
/* felem_to_BN converts an felem into an OpenSSL BIGNUM */
static BIGNUM *smallfelem_to_BN(BIGNUM *out, const smallfelem in)
{
- felem_bytearray b_out;
- smallfelem_to_bin32(b_out, in);
- return BN_lebin2bn(b_out, sizeof(b_out), out);
+ felem_bytearray b_out;
+ smallfelem_to_bin32(b_out, in);
+ return BN_lebin2bn(b_out, sizeof(b_out), out);
}
/*-
@@ -2030,8 +2030,8 @@ int ec_GFp_nistp256_points_mul(const EC_GROUP *group, EC_POINT *r,
felem_bytearray *secrets = NULL;
smallfelem (*pre_comp)[17][3] = NULL;
smallfelem *tmp_smallfelems = NULL;
- unsigned i;
- int num_bytes;
+ unsigned i;
+ int num_bytes;
int have_pre_comp = 0;
size_t num_points = num;
smallfelem x_in, y_in, z_in;
@@ -2108,14 +2108,14 @@ int ec_GFp_nistp256_points_mul(const EC_GROUP *group, EC_POINT *r,
memset(secrets, 0, sizeof(*secrets) * num_points);
memset(pre_comp, 0, sizeof(*pre_comp) * num_points);
for (i = 0; i < num_points; ++i) {
- if (i == num) {
+ if (i == num) {
/*
* we didn't have a valid precomputation, so we pick the
* generator
*/
p = EC_GROUP_get0_generator(group);
p_scalar = scalar;
- } else {
+ } else {
/* the i^th point */
p = points[i];
p_scalar = scalars[i];
@@ -2132,16 +2132,16 @@ int ec_GFp_nistp256_points_mul(const EC_GROUP *group, EC_POINT *r,
ECerr(EC_F_EC_GFP_NISTP256_POINTS_MUL, ERR_R_BN_LIB);
goto err;
}
- num_bytes = BN_bn2lebinpad(tmp_scalar,
- secrets[i], sizeof(secrets[i]));
- } else {
- num_bytes = BN_bn2lebinpad(p_scalar,
- secrets[i], sizeof(secrets[i]));
- }
- if (num_bytes < 0) {
- ECerr(EC_F_EC_GFP_NISTP256_POINTS_MUL, ERR_R_BN_LIB);
- goto err;
- }
+ num_bytes = BN_bn2lebinpad(tmp_scalar,
+ secrets[i], sizeof(secrets[i]));
+ } else {
+ num_bytes = BN_bn2lebinpad(p_scalar,
+ secrets[i], sizeof(secrets[i]));
+ }
+ if (num_bytes < 0) {
+ ECerr(EC_F_EC_GFP_NISTP256_POINTS_MUL, ERR_R_BN_LIB);
+ goto err;
+ }
/* precompute multiples */
if ((!BN_to_felem(x_out, p->X)) ||
(!BN_to_felem(y_out, p->Y)) ||
@@ -2186,21 +2186,21 @@ int ec_GFp_nistp256_points_mul(const EC_GROUP *group, EC_POINT *r,
ECerr(EC_F_EC_GFP_NISTP256_POINTS_MUL, ERR_R_BN_LIB);
goto err;
}
- num_bytes = BN_bn2lebinpad(tmp_scalar, g_secret, sizeof(g_secret));
- } else {
- num_bytes = BN_bn2lebinpad(scalar, g_secret, sizeof(g_secret));
- }
+ num_bytes = BN_bn2lebinpad(tmp_scalar, g_secret, sizeof(g_secret));
+ } else {
+ num_bytes = BN_bn2lebinpad(scalar, g_secret, sizeof(g_secret));
+ }
/* do the multiplication with generator precomputation */
batch_mul(x_out, y_out, z_out,
(const felem_bytearray(*))secrets, num_points,
g_secret,
mixed, (const smallfelem(*)[17][3])pre_comp, g_pre_comp);
- } else {
+ } else {
/* do the multiplication without generator precomputation */
batch_mul(x_out, y_out, z_out,
(const felem_bytearray(*))secrets, num_points,
NULL, mixed, (const smallfelem(*)[17][3])pre_comp, NULL);
- }
+ }
/* reduce the output to its unique minimal representation */
felem_contract(x_in, x_out);
felem_contract(y_in, y_out);
diff --git a/contrib/libs/openssl/crypto/ec/ecp_nistp521.c b/contrib/libs/openssl/crypto/ec/ecp_nistp521.c
index 08b3278729..1634f89017 100644
--- a/contrib/libs/openssl/crypto/ec/ecp_nistp521.c
+++ b/contrib/libs/openssl/crypto/ec/ecp_nistp521.c
@@ -174,14 +174,14 @@ static void felem_to_bin66(u8 out[66], const felem in)
static int BN_to_felem(felem out, const BIGNUM *bn)
{
felem_bytearray b_out;
- int num_bytes;
+ int num_bytes;
- if (BN_is_negative(bn)) {
+ if (BN_is_negative(bn)) {
ECerr(EC_F_BN_TO_FELEM, EC_R_BIGNUM_OUT_OF_RANGE);
return 0;
}
- num_bytes = BN_bn2lebinpad(bn, b_out, sizeof(b_out));
- if (num_bytes < 0) {
+ num_bytes = BN_bn2lebinpad(bn, b_out, sizeof(b_out));
+ if (num_bytes < 0) {
ECerr(EC_F_BN_TO_FELEM, EC_R_BIGNUM_OUT_OF_RANGE);
return 0;
}
@@ -192,9 +192,9 @@ static int BN_to_felem(felem out, const BIGNUM *bn)
/* felem_to_BN converts an felem into an OpenSSL BIGNUM */
static BIGNUM *felem_to_BN(BIGNUM *out, const felem in)
{
- felem_bytearray b_out;
- felem_to_bin66(b_out, in);
- return BN_lebin2bn(b_out, sizeof(b_out), out);
+ felem_bytearray b_out;
+ felem_to_bin66(b_out, in);
+ return BN_lebin2bn(b_out, sizeof(b_out), out);
}
/*-
@@ -344,15 +344,15 @@ static void felem_diff64(felem out, const felem in)
static void felem_diff_128_64(largefelem out, const felem in)
{
/*
- * In order to prevent underflow, we add 64p mod p (which is equivalent
- * to 0 mod p) before subtracting. p is 2^521 - 1, i.e. in binary a 521
- * digit number with all bits set to 1. See "The representation of field
- * elements" comment above for a description of how limbs are used to
- * represent a number. 64p is represented with 8 limbs containing a number
- * with 58 bits set and one limb with a number with 57 bits set.
+ * In order to prevent underflow, we add 64p mod p (which is equivalent
+ * to 0 mod p) before subtracting. p is 2^521 - 1, i.e. in binary a 521
+ * digit number with all bits set to 1. See "The representation of field
+ * elements" comment above for a description of how limbs are used to
+ * represent a number. 64p is represented with 8 limbs containing a number
+ * with 58 bits set and one limb with a number with 57 bits set.
*/
- static const limb two63m6 = (((limb) 1) << 63) - (((limb) 1) << 6);
- static const limb two63m5 = (((limb) 1) << 63) - (((limb) 1) << 5);
+ static const limb two63m6 = (((limb) 1) << 63) - (((limb) 1) << 6);
+ static const limb two63m5 = (((limb) 1) << 63) - (((limb) 1) << 5);
out[0] += two63m6 - in[0];
out[1] += two63m5 - in[1];
@@ -1274,7 +1274,7 @@ static void point_add(felem x3, felem y3, felem z3,
* ffffffa51868783bf2f966b7fcc0148f709a5d03bb5c9b8899c47aebb6fb
* 71e913863f7, in that case the penultimate intermediate is -9G and
* the final digit is also -9G. Since this only happens for a single
- * scalar, the timing leak is irrelevant. (Any attacker who wanted to
+ * scalar, the timing leak is irrelevant. (Any attacker who wanted to
* check whether a secret scalar was that exact value, can already do
* so.)
*/
@@ -1871,8 +1871,8 @@ int ec_GFp_nistp521_points_mul(const EC_GROUP *group, EC_POINT *r,
felem_bytearray *secrets = NULL;
felem (*pre_comp)[17][3] = NULL;
felem *tmp_felems = NULL;
- unsigned i;
- int num_bytes;
+ unsigned i;
+ int num_bytes;
int have_pre_comp = 0;
size_t num_points = num;
felem x_in, y_in, z_in, x_out, y_out, z_out;
@@ -1947,14 +1947,14 @@ int ec_GFp_nistp521_points_mul(const EC_GROUP *group, EC_POINT *r,
* i.e., they contribute nothing to the linear combination
*/
for (i = 0; i < num_points; ++i) {
- if (i == num) {
+ if (i == num) {
/*
* we didn't have a valid precomputation, so we pick the
* generator
*/
p = EC_GROUP_get0_generator(group);
p_scalar = scalar;
- } else {
+ } else {
/* the i^th point */
p = points[i];
p_scalar = scalars[i];
@@ -1971,16 +1971,16 @@ int ec_GFp_nistp521_points_mul(const EC_GROUP *group, EC_POINT *r,
ECerr(EC_F_EC_GFP_NISTP521_POINTS_MUL, ERR_R_BN_LIB);
goto err;
}
- num_bytes = BN_bn2lebinpad(tmp_scalar,
- secrets[i], sizeof(secrets[i]));
- } else {
- num_bytes = BN_bn2lebinpad(p_scalar,
- secrets[i], sizeof(secrets[i]));
- }
- if (num_bytes < 0) {
- ECerr(EC_F_EC_GFP_NISTP521_POINTS_MUL, ERR_R_BN_LIB);
- goto err;
- }
+ num_bytes = BN_bn2lebinpad(tmp_scalar,
+ secrets[i], sizeof(secrets[i]));
+ } else {
+ num_bytes = BN_bn2lebinpad(p_scalar,
+ secrets[i], sizeof(secrets[i]));
+ }
+ if (num_bytes < 0) {
+ ECerr(EC_F_EC_GFP_NISTP521_POINTS_MUL, ERR_R_BN_LIB);
+ goto err;
+ }
/* precompute multiples */
if ((!BN_to_felem(x_out, p->X)) ||
(!BN_to_felem(y_out, p->Y)) ||
@@ -2023,22 +2023,22 @@ int ec_GFp_nistp521_points_mul(const EC_GROUP *group, EC_POINT *r,
ECerr(EC_F_EC_GFP_NISTP521_POINTS_MUL, ERR_R_BN_LIB);
goto err;
}
- num_bytes = BN_bn2lebinpad(tmp_scalar, g_secret, sizeof(g_secret));
- } else {
- num_bytes = BN_bn2lebinpad(scalar, g_secret, sizeof(g_secret));
- }
+ num_bytes = BN_bn2lebinpad(tmp_scalar, g_secret, sizeof(g_secret));
+ } else {
+ num_bytes = BN_bn2lebinpad(scalar, g_secret, sizeof(g_secret));
+ }
/* do the multiplication with generator precomputation */
batch_mul(x_out, y_out, z_out,
(const felem_bytearray(*))secrets, num_points,
g_secret,
mixed, (const felem(*)[17][3])pre_comp,
(const felem(*)[3])g_pre_comp);
- } else {
+ } else {
/* do the multiplication without generator precomputation */
batch_mul(x_out, y_out, z_out,
(const felem_bytearray(*))secrets, num_points,
NULL, mixed, (const felem(*)[17][3])pre_comp, NULL);
- }
+ }
/* reduce the output to its unique minimal representation */
felem_contract(x_in, x_out);
felem_contract(y_in, y_out);
diff --git a/contrib/libs/openssl/crypto/ec/ecp_nistputil.c b/contrib/libs/openssl/crypto/ec/ecp_nistputil.c
index 60e1325c34..6563cd3834 100644
--- a/contrib/libs/openssl/crypto/ec/ecp_nistputil.c
+++ b/contrib/libs/openssl/crypto/ec/ecp_nistputil.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2011-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2011-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -158,13 +158,13 @@ void ec_GFp_nistp_points_make_affine_internal(size_t num, void *point_array,
* of a nonnegative integer (b_k in {0, 1}), rewrite it in digits 0, 1, -1
* by using bit-wise subtraction as follows:
*
- * b_k b_(k-1) ... b_2 b_1 b_0
- * - b_k ... b_3 b_2 b_1 b_0
- * -----------------------------------------
- * s_(k+1) s_k ... s_3 s_2 s_1 s_0
+ * b_k b_(k-1) ... b_2 b_1 b_0
+ * - b_k ... b_3 b_2 b_1 b_0
+ * -----------------------------------------
+ * s_(k+1) s_k ... s_3 s_2 s_1 s_0
*
* A left-shift followed by subtraction of the original value yields a new
- * representation of the same value, using signed bits s_i = b_(i-1) - b_i.
+ * representation of the same value, using signed bits s_i = b_(i-1) - b_i.
* This representation from Booth's paper has since appeared in the
* literature under a variety of different names including "reversed binary
* form", "alternating greedy expansion", "mutual opposite form", and
@@ -188,7 +188,7 @@ void ec_GFp_nistp_points_make_affine_internal(size_t num, void *point_array,
* (1961), pp. 67-91), in a radix-2^5 setting. That is, we always combine five
* signed bits into a signed digit:
*
- * s_(5j + 4) s_(5j + 3) s_(5j + 2) s_(5j + 1) s_(5j)
+ * s_(5j + 4) s_(5j + 3) s_(5j + 2) s_(5j + 1) s_(5j)
*
* The sign-alternating property implies that the resulting digit values are
* integers from -16 to 16.
@@ -196,14 +196,14 @@ void ec_GFp_nistp_points_make_affine_internal(size_t num, void *point_array,
* Of course, we don't actually need to compute the signed digits s_i as an
* intermediate step (that's just a nice way to see how this scheme relates
* to the wNAF): a direct computation obtains the recoded digit from the
- * six bits b_(5j + 4) ... b_(5j - 1).
+ * six bits b_(5j + 4) ... b_(5j - 1).
*
- * This function takes those six bits as an integer (0 .. 63), writing the
+ * This function takes those six bits as an integer (0 .. 63), writing the
* recoded digit to *sign (0 for positive, 1 for negative) and *digit (absolute
- * value, in the range 0 .. 16). Note that this integer essentially provides
- * the input bits "shifted to the left" by one position: for example, the input
- * to compute the least significant recoded digit, given that there's no bit
- * b_-1, has to be b_4 b_3 b_2 b_1 b_0 0.
+ * value, in the range 0 .. 16). Note that this integer essentially provides
+ * the input bits "shifted to the left" by one position: for example, the input
+ * to compute the least significant recoded digit, given that there's no bit
+ * b_-1, has to be b_4 b_3 b_2 b_1 b_0 0.
*
*/
void ec_GFp_nistp_recode_scalar_bits(unsigned char *sign,
diff --git a/contrib/libs/openssl/crypto/ec/ecp_nistz256.c b/contrib/libs/openssl/crypto/ec/ecp_nistz256.c
index 4c4839cc13..d0b4533701 100644
--- a/contrib/libs/openssl/crypto/ec/ecp_nistz256.c
+++ b/contrib/libs/openssl/crypto/ec/ecp_nistz256.c
@@ -920,7 +920,7 @@ __owur static int ecp_nistz256_mult_precompute(EC_GROUP *group, BN_CTX *ctx)
ret = 1;
err:
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(new_ctx);
EC_nistz256_pre_comp_free(pre_comp);
diff --git a/contrib/libs/openssl/crypto/ec/ecp_smpl.c b/contrib/libs/openssl/crypto/ec/ecp_smpl.c
index b3110ec89d..60534b3ceb 100644
--- a/contrib/libs/openssl/crypto/ec/ecp_smpl.c
+++ b/contrib/libs/openssl/crypto/ec/ecp_smpl.c
@@ -307,7 +307,7 @@ int ec_GFp_simple_group_check_discriminant(const EC_GROUP *group, BN_CTX *ctx)
ret = 1;
err:
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(new_ctx);
return ret;
}
@@ -786,7 +786,7 @@ int ec_GFp_simple_add(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a,
ret = 1;
end:
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(new_ctx);
return ret;
}
diff --git a/contrib/libs/openssl/crypto/ec/ecx_meth.c b/contrib/libs/openssl/crypto/ec/ecx_meth.c
index 9dc5259e4a..442b30a6ea 100644
--- a/contrib/libs/openssl/crypto/ec/ecx_meth.c
+++ b/contrib/libs/openssl/crypto/ec/ecx_meth.c
@@ -532,7 +532,7 @@ static int ecd_item_sign25519(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn,
X509_ALGOR_set0(alg1, OBJ_nid2obj(NID_ED25519), V_ASN1_UNDEF, NULL);
if (alg2)
X509_ALGOR_set0(alg2, OBJ_nid2obj(NID_ED25519), V_ASN1_UNDEF, NULL);
- /* Algorithm identifiers set: carry on as normal */
+ /* Algorithm identifiers set: carry on as normal */
return 3;
}
diff --git a/contrib/libs/openssl/crypto/engine/eng_devcrypto.c b/contrib/libs/openssl/crypto/engine/eng_devcrypto.c
index 84a3b7dbec..376a9e67e3 100644
--- a/contrib/libs/openssl/crypto/engine/eng_devcrypto.c
+++ b/contrib/libs/openssl/crypto/engine/eng_devcrypto.c
@@ -26,7 +26,7 @@
/* #define ENGINE_DEVCRYPTO_DEBUG */
-#if CRYPTO_ALGORITHM_MIN < CRYPTO_ALGORITHM_MAX
+#if CRYPTO_ALGORITHM_MIN < CRYPTO_ALGORITHM_MAX
# define CHECK_BSD_STYLE_MACROS
#endif
diff --git a/contrib/libs/openssl/crypto/engine/eng_openssl.c b/contrib/libs/openssl/crypto/engine/eng_openssl.c
index 25631fb879..8846df9eb5 100644
--- a/contrib/libs/openssl/crypto/engine/eng_openssl.c
+++ b/contrib/libs/openssl/crypto/engine/eng_openssl.c
@@ -29,14 +29,14 @@
*/
#define TEST_ENG_OPENSSL_RC4
#ifndef OPENSSL_NO_STDIO
-# define TEST_ENG_OPENSSL_PKEY
+# define TEST_ENG_OPENSSL_PKEY
#endif
/* #define TEST_ENG_OPENSSL_HMAC */
/* #define TEST_ENG_OPENSSL_HMAC_INIT */
/* #define TEST_ENG_OPENSSL_RC4_OTHERS */
-#ifndef OPENSSL_NO_STDIO
-# define TEST_ENG_OPENSSL_RC4_P_INIT
-#endif
+#ifndef OPENSSL_NO_STDIO
+# define TEST_ENG_OPENSSL_RC4_P_INIT
+#endif
/* #define TEST_ENG_OPENSSL_RC4_P_CIPHER */
#define TEST_ENG_OPENSSL_SHA
/* #define TEST_ENG_OPENSSL_SHA_OTHERS */
diff --git a/contrib/libs/openssl/crypto/err/err.c b/contrib/libs/openssl/crypto/err/err.c
index 1372d52f80..0bda6dc66f 100644
--- a/contrib/libs/openssl/crypto/err/err.c
+++ b/contrib/libs/openssl/crypto/err/err.c
@@ -184,8 +184,8 @@ static ERR_STRING_DATA *int_err_get_item(const ERR_STRING_DATA *d)
}
#ifndef OPENSSL_NO_ERR
-/* 2019-05-21: Russian and Ukrainian locales on Linux require more than 6,5 kB */
-# define SPACE_SYS_STR_REASONS 8 * 1024
+/* 2019-05-21: Russian and Ukrainian locales on Linux require more than 6,5 kB */
+# define SPACE_SYS_STR_REASONS 8 * 1024
# define NUM_SYS_STR_REASONS 127
static ERR_STRING_DATA SYS_str_reasons[NUM_SYS_STR_REASONS + 1];
@@ -219,28 +219,28 @@ static void build_SYS_str_reasons(void)
ERR_STRING_DATA *str = &SYS_str_reasons[i - 1];
str->error = ERR_PACK(ERR_LIB_SYS, 0, i);
- /*
- * If we have used up all the space in strerror_pool,
- * there's no point in calling openssl_strerror_r()
- */
- if (str->string == NULL && cnt < sizeof(strerror_pool)) {
+ /*
+ * If we have used up all the space in strerror_pool,
+ * there's no point in calling openssl_strerror_r()
+ */
+ if (str->string == NULL && cnt < sizeof(strerror_pool)) {
if (openssl_strerror_r(i, cur, sizeof(strerror_pool) - cnt)) {
- size_t l = strlen(cur);
+ size_t l = strlen(cur);
str->string = cur;
cnt += l;
cur += l;
-
- /*
- * VMS has an unusual quirk of adding spaces at the end of
- * some (most? all?) messages. Lets trim them off.
- */
- while (cur > strerror_pool && ossl_isspace(cur[-1])) {
- cur--;
- cnt--;
- }
- *cur++ = '\0';
- cnt++;
+
+ /*
+ * VMS has an unusual quirk of adding spaces at the end of
+ * some (most? all?) messages. Lets trim them off.
+ */
+ while (cur > strerror_pool && ossl_isspace(cur[-1])) {
+ cur--;
+ cnt--;
+ }
+ *cur++ = '\0';
+ cnt++;
}
}
if (str->string == NULL)
@@ -525,24 +525,24 @@ static unsigned long get_error_values(int inc, int top, const char **file,
return ERR_R_INTERNAL_ERROR;
}
- while (es->bottom != es->top) {
- if (es->err_flags[es->top] & ERR_FLAG_CLEAR) {
- err_clear(es, es->top);
- es->top = es->top > 0 ? es->top - 1 : ERR_NUM_ERRORS - 1;
- continue;
- }
- i = (es->bottom + 1) % ERR_NUM_ERRORS;
- if (es->err_flags[i] & ERR_FLAG_CLEAR) {
- es->bottom = i;
- err_clear(es, es->bottom);
- continue;
- }
- break;
- }
-
+ while (es->bottom != es->top) {
+ if (es->err_flags[es->top] & ERR_FLAG_CLEAR) {
+ err_clear(es, es->top);
+ es->top = es->top > 0 ? es->top - 1 : ERR_NUM_ERRORS - 1;
+ continue;
+ }
+ i = (es->bottom + 1) % ERR_NUM_ERRORS;
+ if (es->err_flags[i] & ERR_FLAG_CLEAR) {
+ es->bottom = i;
+ err_clear(es, es->bottom);
+ continue;
+ }
+ break;
+ }
+
if (es->bottom == es->top)
return 0;
-
+
if (top)
i = es->top; /* last error */
else
@@ -942,11 +942,11 @@ void err_clear_last_constant_time(int clear)
top = es->top;
- /*
- * Flag error as cleared but remove it elsewhere to avoid two errors
- * accessing the same error stack location, revealing timing information.
- */
- clear = constant_time_select_int(constant_time_eq_int(clear, 0),
- 0, ERR_FLAG_CLEAR);
- es->err_flags[top] |= clear;
+ /*
+ * Flag error as cleared but remove it elsewhere to avoid two errors
+ * accessing the same error stack location, revealing timing information.
+ */
+ clear = constant_time_select_int(constant_time_eq_int(clear, 0),
+ 0, ERR_FLAG_CLEAR);
+ es->err_flags[top] |= clear;
}
diff --git a/contrib/libs/openssl/crypto/evp/bio_ok.c b/contrib/libs/openssl/crypto/evp/bio_ok.c
index 9610f3c1ef..e9a9e70139 100644
--- a/contrib/libs/openssl/crypto/evp/bio_ok.c
+++ b/contrib/libs/openssl/crypto/evp/bio_ok.c
@@ -38,9 +38,9 @@
of memory.
BIO_f_reliable splits data stream into blocks. Each block is prefixed
- with its length and suffixed with its digest. So you need only
+ with its length and suffixed with its digest. So you need only
several Kbytes of memory to buffer single block before verifying
- its digest.
+ its digest.
BIO_f_reliable goes further and adds several important capabilities:
diff --git a/contrib/libs/openssl/crypto/evp/digest.c b/contrib/libs/openssl/crypto/evp/digest.c
index d1bfa274ca..c0873c0644 100644
--- a/contrib/libs/openssl/crypto/evp/digest.c
+++ b/contrib/libs/openssl/crypto/evp/digest.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -150,9 +150,9 @@ int EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, ENGINE *impl)
int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t count)
{
- if (count == 0)
- return 1;
-
+ if (count == 0)
+ return 1;
+
return ctx->update(ctx, data, count);
}
diff --git a/contrib/libs/openssl/crypto/evp/e_aes.c b/contrib/libs/openssl/crypto/evp/e_aes.c
index 2c2812fdf1..32de11b5e9 100644
--- a/contrib/libs/openssl/crypto/evp/e_aes.c
+++ b/contrib/libs/openssl/crypto/evp/e_aes.c
@@ -386,25 +386,25 @@ static int aesni_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
const unsigned char *iv, int enc)
{
EVP_AES_XTS_CTX *xctx = EVP_C_DATA(EVP_AES_XTS_CTX,ctx);
-
+
if (!iv && !key)
return 1;
if (key) {
- /* The key is two half length keys in reality */
- const int bytes = EVP_CIPHER_CTX_key_length(ctx) / 2;
-
- /*
- * Verify that the two keys are different.
- *
- * This addresses Rogaway's vulnerability.
- * See comment in aes_xts_init_key() below.
- */
- if (enc && CRYPTO_memcmp(key, key + bytes, bytes) == 0) {
- EVPerr(EVP_F_AESNI_XTS_INIT_KEY, EVP_R_XTS_DUPLICATED_KEYS);
- return 0;
- }
-
+ /* The key is two half length keys in reality */
+ const int bytes = EVP_CIPHER_CTX_key_length(ctx) / 2;
+
+ /*
+ * Verify that the two keys are different.
+ *
+ * This addresses Rogaway's vulnerability.
+ * See comment in aes_xts_init_key() below.
+ */
+ if (enc && CRYPTO_memcmp(key, key + bytes, bytes) == 0) {
+ EVPerr(EVP_F_AESNI_XTS_INIT_KEY, EVP_R_XTS_DUPLICATED_KEYS);
+ return 0;
+ }
+
/* key_len is two AES keys */
if (enc) {
aesni_set_encrypt_key(key, EVP_CIPHER_CTX_key_length(ctx) * 4,
@@ -805,26 +805,26 @@ static int aes_t4_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
const unsigned char *iv, int enc)
{
EVP_AES_XTS_CTX *xctx = EVP_C_DATA(EVP_AES_XTS_CTX,ctx);
-
+
if (!iv && !key)
return 1;
if (key) {
- /* The key is two half length keys in reality */
- const int bytes = EVP_CIPHER_CTX_key_length(ctx) / 2;
- const int bits = bytes * 8;
-
- /*
- * Verify that the two keys are different.
- *
- * This addresses Rogaway's vulnerability.
- * See comment in aes_xts_init_key() below.
- */
- if (enc && CRYPTO_memcmp(key, key + bytes, bytes) == 0) {
- EVPerr(EVP_F_AES_T4_XTS_INIT_KEY, EVP_R_XTS_DUPLICATED_KEYS);
- return 0;
- }
-
+ /* The key is two half length keys in reality */
+ const int bytes = EVP_CIPHER_CTX_key_length(ctx) / 2;
+ const int bits = bytes * 8;
+
+ /*
+ * Verify that the two keys are different.
+ *
+ * This addresses Rogaway's vulnerability.
+ * See comment in aes_xts_init_key() below.
+ */
+ if (enc && CRYPTO_memcmp(key, key + bytes, bytes) == 0) {
+ EVPerr(EVP_F_AES_T4_XTS_INIT_KEY, EVP_R_XTS_DUPLICATED_KEYS);
+ return 0;
+ }
+
xctx->stream = NULL;
/* key_len is two AES keys */
if (enc) {
@@ -1625,7 +1625,7 @@ static int s390x_aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr)
switch (type) {
case EVP_CTRL_INIT:
- ivlen = EVP_CIPHER_iv_length(c->cipher);
+ ivlen = EVP_CIPHER_iv_length(c->cipher);
iv = EVP_CIPHER_CTX_iv_noconst(c);
gctx->key_set = 0;
gctx->iv_set = 0;
@@ -1636,10 +1636,10 @@ static int s390x_aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr)
gctx->tls_aad_len = -1;
return 1;
- case EVP_CTRL_GET_IVLEN:
- *(int *)ptr = gctx->ivlen;
- return 1;
-
+ case EVP_CTRL_GET_IVLEN:
+ *(int *)ptr = gctx->ivlen;
+ return 1;
+
case EVP_CTRL_AEAD_SET_IVLEN:
if (arg <= 0)
return 0;
@@ -2272,10 +2272,10 @@ static int s390x_aes_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
return len;
}
- /* The tag must be set before actually decrypting data */
- if (!enc && !cctx->aes.ccm.tag_set)
- return -1;
-
+ /* The tag must be set before actually decrypting data */
+ if (!enc && !cctx->aes.ccm.tag_set)
+ return -1;
+
/* Update(): Process message. */
if (!cctx->aes.ccm.len_set) {
@@ -2333,10 +2333,10 @@ static int s390x_aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr)
cctx->aes.ccm.tls_aad_len = -1;
return 1;
- case EVP_CTRL_GET_IVLEN:
- *(int *)ptr = 15 - cctx->aes.ccm.l;
- return 1;
-
+ case EVP_CTRL_GET_IVLEN:
+ *(int *)ptr = 15 - cctx->aes.ccm.l;
+ return 1;
+
case EVP_CTRL_AEAD_TLS1_AAD:
if (arg != EVP_AEAD_TLS1_AAD_LEN)
return 0;
@@ -2852,17 +2852,17 @@ static int aes_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr)
case EVP_CTRL_INIT:
gctx->key_set = 0;
gctx->iv_set = 0;
- gctx->ivlen = EVP_CIPHER_iv_length(c->cipher);
+ gctx->ivlen = EVP_CIPHER_iv_length(c->cipher);
gctx->iv = c->iv;
gctx->taglen = -1;
gctx->iv_gen = 0;
gctx->tls_aad_len = -1;
return 1;
- case EVP_CTRL_GET_IVLEN:
- *(int *)ptr = gctx->ivlen;
- return 1;
-
+ case EVP_CTRL_GET_IVLEN:
+ *(int *)ptr = gctx->ivlen;
+ return 1;
+
case EVP_CTRL_AEAD_SET_IVLEN:
if (arg <= 0)
return 0;
@@ -3313,7 +3313,7 @@ static int aes_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
#define CUSTOM_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 \
| EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER \
| EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT \
- | EVP_CIPH_CUSTOM_COPY | EVP_CIPH_CUSTOM_IV_LENGTH)
+ | EVP_CIPH_CUSTOM_COPY | EVP_CIPH_CUSTOM_IV_LENGTH)
BLOCK_CIPHER_custom(NID_aes, 128, 1, 12, gcm, GCM,
EVP_CIPH_FLAG_AEAD_CIPHER | CUSTOM_FLAGS)
@@ -3324,12 +3324,12 @@ BLOCK_CIPHER_custom(NID_aes, 128, 1, 12, gcm, GCM,
static int aes_xts_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr)
{
- EVP_AES_XTS_CTX *xctx = EVP_C_DATA(EVP_AES_XTS_CTX, c);
-
+ EVP_AES_XTS_CTX *xctx = EVP_C_DATA(EVP_AES_XTS_CTX, c);
+
if (type == EVP_CTRL_COPY) {
EVP_CIPHER_CTX *out = ptr;
EVP_AES_XTS_CTX *xctx_out = EVP_C_DATA(EVP_AES_XTS_CTX,out);
-
+
if (xctx->xts.key1) {
if (xctx->xts.key1 != &xctx->ks1)
return 0;
@@ -3353,36 +3353,36 @@ static int aes_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
const unsigned char *iv, int enc)
{
EVP_AES_XTS_CTX *xctx = EVP_C_DATA(EVP_AES_XTS_CTX,ctx);
-
+
if (!iv && !key)
return 1;
if (key)
do {
- /* The key is two half length keys in reality */
- const int bytes = EVP_CIPHER_CTX_key_length(ctx) / 2;
-
- /*
- * Verify that the two keys are different.
- *
- * This addresses the vulnerability described in Rogaway's
- * September 2004 paper:
- *
- * "Efficient Instantiations of Tweakable Blockciphers and
- * Refinements to Modes OCB and PMAC".
- * (http://web.cs.ucdavis.edu/~rogaway/papers/offsets.pdf)
- *
- * FIPS 140-2 IG A.9 XTS-AES Key Generation Requirements states
- * that:
- * "The check for Key_1 != Key_2 shall be done at any place
- * BEFORE using the keys in the XTS-AES algorithm to process
- * data with them."
- */
- if (enc && CRYPTO_memcmp(key, key + bytes, bytes) == 0) {
- EVPerr(EVP_F_AES_XTS_INIT_KEY, EVP_R_XTS_DUPLICATED_KEYS);
- return 0;
- }
-
+ /* The key is two half length keys in reality */
+ const int bytes = EVP_CIPHER_CTX_key_length(ctx) / 2;
+
+ /*
+ * Verify that the two keys are different.
+ *
+ * This addresses the vulnerability described in Rogaway's
+ * September 2004 paper:
+ *
+ * "Efficient Instantiations of Tweakable Blockciphers and
+ * Refinements to Modes OCB and PMAC".
+ * (http://web.cs.ucdavis.edu/~rogaway/papers/offsets.pdf)
+ *
+ * FIPS 140-2 IG A.9 XTS-AES Key Generation Requirements states
+ * that:
+ * "The check for Key_1 != Key_2 shall be done at any place
+ * BEFORE using the keys in the XTS-AES algorithm to process
+ * data with them."
+ */
+ if (enc && CRYPTO_memcmp(key, key + bytes, bytes) == 0) {
+ EVPerr(EVP_F_AES_XTS_INIT_KEY, EVP_R_XTS_DUPLICATED_KEYS);
+ return 0;
+ }
+
#ifdef AES_XTS_ASM
xctx->stream = enc ? AES_xts_encrypt : AES_xts_decrypt;
#else
@@ -3515,9 +3515,9 @@ static int aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr)
cctx->len_set = 0;
cctx->tls_aad_len = -1;
return 1;
- case EVP_CTRL_GET_IVLEN:
- *(int *)ptr = 15 - cctx->L;
- return 1;
+ case EVP_CTRL_GET_IVLEN:
+ *(int *)ptr = 15 - cctx->L;
+ return 1;
case EVP_CTRL_AEAD_TLS1_AAD:
/* Save the AAD for later use */
if (arg != EVP_AEAD_TLS1_AAD_LEN)
@@ -3727,11 +3727,11 @@ static int aes_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
CRYPTO_ccm128_aad(ccm, in, len);
return len;
}
-
- /* The tag must be set before actually decrypting data */
- if (!EVP_CIPHER_CTX_encrypting(ctx) && !cctx->tag_set)
- return -1;
-
+
+ /* The tag must be set before actually decrypting data */
+ if (!EVP_CIPHER_CTX_encrypting(ctx) && !cctx->tag_set)
+ return -1;
+
/* If not set length yet do it */
if (!cctx->len_set) {
if (CRYPTO_ccm128_setiv(ccm, EVP_CIPHER_CTX_iv_noconst(ctx),
@@ -3966,17 +3966,17 @@ static int aes_ocb_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr)
case EVP_CTRL_INIT:
octx->key_set = 0;
octx->iv_set = 0;
- octx->ivlen = EVP_CIPHER_iv_length(c->cipher);
+ octx->ivlen = EVP_CIPHER_iv_length(c->cipher);
octx->iv = EVP_CIPHER_CTX_iv_noconst(c);
octx->taglen = 16;
octx->data_buf_len = 0;
octx->aad_buf_len = 0;
return 1;
- case EVP_CTRL_GET_IVLEN:
- *(int *)ptr = octx->ivlen;
- return 1;
-
+ case EVP_CTRL_GET_IVLEN:
+ *(int *)ptr = octx->ivlen;
+ return 1;
+
case EVP_CTRL_AEAD_SET_IVLEN:
/* IV len must be 1 to 15 */
if (arg <= 0 || arg > 15)
diff --git a/contrib/libs/openssl/crypto/evp/e_aria.c b/contrib/libs/openssl/crypto/evp/e_aria.c
index 1cc6dd91a9..bbddd7c890 100644
--- a/contrib/libs/openssl/crypto/evp/e_aria.c
+++ b/contrib/libs/openssl/crypto/evp/e_aria.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
* Copyright (c) 2017, Oracle and/or its affiliates. All rights reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
@@ -252,7 +252,7 @@ static int aria_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr)
case EVP_CTRL_INIT:
gctx->key_set = 0;
gctx->iv_set = 0;
- gctx->ivlen = EVP_CIPHER_iv_length(c->cipher);
+ gctx->ivlen = EVP_CIPHER_iv_length(c->cipher);
gctx->iv = EVP_CIPHER_CTX_iv_noconst(c);
gctx->taglen = -1;
gctx->iv_gen = 0;
@@ -274,10 +274,10 @@ static int aria_gcm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr)
gctx->ivlen = arg;
return 1;
- case EVP_CTRL_GET_IVLEN:
- *(int *)ptr = gctx->ivlen;
- return 1;
-
+ case EVP_CTRL_GET_IVLEN:
+ *(int *)ptr = gctx->ivlen;
+ return 1;
+
case EVP_CTRL_AEAD_SET_TAG:
if (arg <= 0 || arg > 16 || EVP_CIPHER_CTX_encrypting(c))
return 0;
@@ -490,16 +490,16 @@ static int aria_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
return 0;
}
-static int aria_gcm_cleanup(EVP_CIPHER_CTX *ctx)
-{
- EVP_ARIA_GCM_CTX *gctx = EVP_C_DATA(EVP_ARIA_GCM_CTX, ctx);
-
- if (gctx->iv != EVP_CIPHER_CTX_iv_noconst(ctx))
- OPENSSL_free(gctx->iv);
-
- return 1;
-}
-
+static int aria_gcm_cleanup(EVP_CIPHER_CTX *ctx)
+{
+ EVP_ARIA_GCM_CTX *gctx = EVP_C_DATA(EVP_ARIA_GCM_CTX, ctx);
+
+ if (gctx->iv != EVP_CIPHER_CTX_iv_noconst(ctx))
+ OPENSSL_free(gctx->iv);
+
+ return 1;
+}
+
static int aria_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
const unsigned char *iv, int enc)
{
@@ -577,10 +577,10 @@ static int aria_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr)
memcpy(EVP_CIPHER_CTX_iv_noconst(c), ptr, arg);
return 1;
- case EVP_CTRL_GET_IVLEN:
- *(int *)ptr = 15 - cctx->L;
- return 1;
-
+ case EVP_CTRL_GET_IVLEN:
+ *(int *)ptr = 15 - cctx->L;
+ return 1;
+
case EVP_CTRL_AEAD_SET_IVLEN:
arg = 15 - arg;
/* fall thru */
@@ -748,13 +748,13 @@ static int aria_ccm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
}
}
-#define aria_ccm_cleanup NULL
-
+#define aria_ccm_cleanup NULL
+
#define ARIA_AUTH_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 \
| EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER \
| EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT \
- | EVP_CIPH_CUSTOM_COPY | EVP_CIPH_FLAG_AEAD_CIPHER \
- | EVP_CIPH_CUSTOM_IV_LENGTH)
+ | EVP_CIPH_CUSTOM_COPY | EVP_CIPH_FLAG_AEAD_CIPHER \
+ | EVP_CIPH_CUSTOM_IV_LENGTH)
#define BLOCK_CIPHER_aead(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \
static const EVP_CIPHER aria_##keylen##_##mode = { \
@@ -763,7 +763,7 @@ static const EVP_CIPHER aria_##keylen##_##mode = { \
ARIA_AUTH_FLAGS|EVP_CIPH_##MODE##_MODE, \
aria_##mode##_init_key, \
aria_##mode##_cipher, \
- aria_##mode##_cleanup, \
+ aria_##mode##_cleanup, \
sizeof(EVP_ARIA_##MODE##_CTX), \
NULL,NULL,aria_##mode##_ctrl,NULL }; \
const EVP_CIPHER *EVP_aria_##keylen##_##mode(void) \
diff --git a/contrib/libs/openssl/crypto/evp/e_chacha20_poly1305.c b/contrib/libs/openssl/crypto/evp/e_chacha20_poly1305.c
index bdc406bb69..fa44930625 100644
--- a/contrib/libs/openssl/crypto/evp/e_chacha20_poly1305.c
+++ b/contrib/libs/openssl/crypto/evp/e_chacha20_poly1305.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2015-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2015-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -30,8 +30,8 @@ typedef struct {
#define data(ctx) ((EVP_CHACHA_KEY *)(ctx)->cipher_data)
-#define CHACHA20_POLY1305_MAX_IVLEN 12
-
+#define CHACHA20_POLY1305_MAX_IVLEN 12
+
static int chacha_init_key(EVP_CIPHER_CTX *ctx,
const unsigned char user_key[CHACHA_KEY_SIZE],
const unsigned char iv[CHACHA_CTR_SIZE], int enc)
@@ -534,12 +534,12 @@ static int chacha20_poly1305_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg,
}
return 1;
- case EVP_CTRL_GET_IVLEN:
- *(int *)ptr = actx->nonce_len;
- return 1;
-
+ case EVP_CTRL_GET_IVLEN:
+ *(int *)ptr = actx->nonce_len;
+ return 1;
+
case EVP_CTRL_AEAD_SET_IVLEN:
- if (arg <= 0 || arg > CHACHA20_POLY1305_MAX_IVLEN)
+ if (arg <= 0 || arg > CHACHA20_POLY1305_MAX_IVLEN)
return 0;
actx->nonce_len = arg;
return 1;
@@ -617,8 +617,8 @@ static EVP_CIPHER chacha20_poly1305 = {
12, /* iv_len, 96-bit nonce in the context */
EVP_CIPH_FLAG_AEAD_CIPHER | EVP_CIPH_CUSTOM_IV |
EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT |
- EVP_CIPH_CUSTOM_COPY | EVP_CIPH_FLAG_CUSTOM_CIPHER |
- EVP_CIPH_CUSTOM_IV_LENGTH,
+ EVP_CIPH_CUSTOM_COPY | EVP_CIPH_FLAG_CUSTOM_CIPHER |
+ EVP_CIPH_CUSTOM_IV_LENGTH,
chacha20_poly1305_init_key,
chacha20_poly1305_cipher,
chacha20_poly1305_cleanup,
diff --git a/contrib/libs/openssl/crypto/evp/e_rc5.c b/contrib/libs/openssl/crypto/evp/e_rc5.c
index c86e87b65a..ef997c9031 100644
--- a/contrib/libs/openssl/crypto/evp/e_rc5.c
+++ b/contrib/libs/openssl/crypto/evp/e_rc5.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -66,10 +66,10 @@ static int rc5_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr)
static int r_32_12_16_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
const unsigned char *iv, int enc)
{
- if (EVP_CIPHER_CTX_key_length(ctx) > 255) {
- EVPerr(EVP_F_R_32_12_16_INIT_KEY, EVP_R_BAD_KEY_LENGTH);
- return 0;
- }
+ if (EVP_CIPHER_CTX_key_length(ctx) > 255) {
+ EVPerr(EVP_F_R_32_12_16_INIT_KEY, EVP_R_BAD_KEY_LENGTH);
+ return 0;
+ }
RC5_32_set_key(&data(ctx)->ks, EVP_CIPHER_CTX_key_length(ctx),
key, data(ctx)->rounds);
return 1;
diff --git a/contrib/libs/openssl/crypto/evp/evp_err.c b/contrib/libs/openssl/crypto/evp/evp_err.c
index 32ac0125de..ecb7860070 100644
--- a/contrib/libs/openssl/crypto/evp/evp_err.c
+++ b/contrib/libs/openssl/crypto/evp/evp_err.c
@@ -15,15 +15,15 @@
static const ERR_STRING_DATA EVP_str_functs[] = {
{ERR_PACK(ERR_LIB_EVP, EVP_F_AESNI_INIT_KEY, 0), "aesni_init_key"},
- {ERR_PACK(ERR_LIB_EVP, EVP_F_AESNI_XTS_INIT_KEY, 0), "aesni_xts_init_key"},
+ {ERR_PACK(ERR_LIB_EVP, EVP_F_AESNI_XTS_INIT_KEY, 0), "aesni_xts_init_key"},
{ERR_PACK(ERR_LIB_EVP, EVP_F_AES_GCM_CTRL, 0), "aes_gcm_ctrl"},
{ERR_PACK(ERR_LIB_EVP, EVP_F_AES_INIT_KEY, 0), "aes_init_key"},
{ERR_PACK(ERR_LIB_EVP, EVP_F_AES_OCB_CIPHER, 0), "aes_ocb_cipher"},
{ERR_PACK(ERR_LIB_EVP, EVP_F_AES_T4_INIT_KEY, 0), "aes_t4_init_key"},
- {ERR_PACK(ERR_LIB_EVP, EVP_F_AES_T4_XTS_INIT_KEY, 0),
- "aes_t4_xts_init_key"},
+ {ERR_PACK(ERR_LIB_EVP, EVP_F_AES_T4_XTS_INIT_KEY, 0),
+ "aes_t4_xts_init_key"},
{ERR_PACK(ERR_LIB_EVP, EVP_F_AES_WRAP_CIPHER, 0), "aes_wrap_cipher"},
- {ERR_PACK(ERR_LIB_EVP, EVP_F_AES_XTS_INIT_KEY, 0), "aes_xts_init_key"},
+ {ERR_PACK(ERR_LIB_EVP, EVP_F_AES_XTS_INIT_KEY, 0), "aes_xts_init_key"},
{ERR_PACK(ERR_LIB_EVP, EVP_F_ALG_MODULE_INIT, 0), "alg_module_init"},
{ERR_PACK(ERR_LIB_EVP, EVP_F_ARIA_CCM_INIT_KEY, 0), "aria_ccm_init_key"},
{ERR_PACK(ERR_LIB_EVP, EVP_F_ARIA_GCM_CTRL, 0), "aria_gcm_ctrl"},
@@ -153,8 +153,8 @@ static const ERR_STRING_DATA EVP_str_functs[] = {
{ERR_PACK(ERR_LIB_EVP, EVP_F_PKEY_SET_TYPE, 0), "pkey_set_type"},
{ERR_PACK(ERR_LIB_EVP, EVP_F_RC2_MAGIC_TO_METH, 0), "rc2_magic_to_meth"},
{ERR_PACK(ERR_LIB_EVP, EVP_F_RC5_CTRL, 0), "rc5_ctrl"},
- {ERR_PACK(ERR_LIB_EVP, EVP_F_R_32_12_16_INIT_KEY, 0),
- "r_32_12_16_init_key"},
+ {ERR_PACK(ERR_LIB_EVP, EVP_F_R_32_12_16_INIT_KEY, 0),
+ "r_32_12_16_init_key"},
{ERR_PACK(ERR_LIB_EVP, EVP_F_S390X_AES_GCM_CTRL, 0), "s390x_aes_gcm_ctrl"},
{ERR_PACK(ERR_LIB_EVP, EVP_F_UPDATE, 0), "update"},
{0, NULL}
@@ -166,7 +166,7 @@ static const ERR_STRING_DATA EVP_str_reasons[] = {
{ERR_PACK(ERR_LIB_EVP, 0, EVP_R_ARIA_KEY_SETUP_FAILED),
"aria key setup failed"},
{ERR_PACK(ERR_LIB_EVP, 0, EVP_R_BAD_DECRYPT), "bad decrypt"},
- {ERR_PACK(ERR_LIB_EVP, 0, EVP_R_BAD_KEY_LENGTH), "bad key length"},
+ {ERR_PACK(ERR_LIB_EVP, 0, EVP_R_BAD_KEY_LENGTH), "bad key length"},
{ERR_PACK(ERR_LIB_EVP, 0, EVP_R_BUFFER_TOO_SMALL), "buffer too small"},
{ERR_PACK(ERR_LIB_EVP, 0, EVP_R_CAMELLIA_KEY_SETUP_FAILED),
"camellia key setup failed"},
@@ -276,8 +276,8 @@ static const ERR_STRING_DATA EVP_str_reasons[] = {
"wrap mode not allowed"},
{ERR_PACK(ERR_LIB_EVP, 0, EVP_R_WRONG_FINAL_BLOCK_LENGTH),
"wrong final block length"},
- {ERR_PACK(ERR_LIB_EVP, 0, EVP_R_XTS_DUPLICATED_KEYS),
- "xts duplicated keys"},
+ {ERR_PACK(ERR_LIB_EVP, 0, EVP_R_XTS_DUPLICATED_KEYS),
+ "xts duplicated keys"},
{0, NULL}
};
diff --git a/contrib/libs/openssl/crypto/evp/evp_lib.c b/contrib/libs/openssl/crypto/evp/evp_lib.c
index 45cde0da8b..82741c35a3 100644
--- a/contrib/libs/openssl/crypto/evp/evp_lib.c
+++ b/contrib/libs/openssl/crypto/evp/evp_lib.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -242,13 +242,13 @@ int EVP_CIPHER_iv_length(const EVP_CIPHER *cipher)
int EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx)
{
- int i, rv;
-
- if ((EVP_CIPHER_flags(ctx->cipher) & EVP_CIPH_CUSTOM_IV_LENGTH) != 0) {
- rv = EVP_CIPHER_CTX_ctrl((EVP_CIPHER_CTX *)ctx, EVP_CTRL_GET_IVLEN,
- 0, &i);
- return (rv == 1) ? i : -1;
- }
+ int i, rv;
+
+ if ((EVP_CIPHER_flags(ctx->cipher) & EVP_CIPH_CUSTOM_IV_LENGTH) != 0) {
+ rv = EVP_CIPHER_CTX_ctrl((EVP_CIPHER_CTX *)ctx, EVP_CTRL_GET_IVLEN,
+ 0, &i);
+ return (rv == 1) ? i : -1;
+ }
return ctx->cipher->iv_len;
}
diff --git a/contrib/libs/openssl/crypto/evp/m_sha3.c b/contrib/libs/openssl/crypto/evp/m_sha3.c
index 54c592a3cc..236f9cb0db 100644
--- a/contrib/libs/openssl/crypto/evp/m_sha3.c
+++ b/contrib/libs/openssl/crypto/evp/m_sha3.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -108,9 +108,9 @@ static int sha3_final(EVP_MD_CTX *evp_ctx, unsigned char *md)
size_t bsz = ctx->block_size;
size_t num = ctx->num;
- if (ctx->md_size == 0)
- return 1;
-
+ if (ctx->md_size == 0)
+ return 1;
+
/*
* Pad the data with 10*1. Note that |num| can be |bsz - 1|
* in which case both byte operations below are performed on
diff --git a/contrib/libs/openssl/crypto/evp/p_lib.c b/contrib/libs/openssl/crypto/evp/p_lib.c
index 9f1a485a5b..21a5018441 100644
--- a/contrib/libs/openssl/crypto/evp/p_lib.c
+++ b/contrib/libs/openssl/crypto/evp/p_lib.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -394,11 +394,11 @@ int EVP_PKEY_set1_engine(EVP_PKEY *pkey, ENGINE *e)
pkey->pmeth_engine = e;
return 1;
}
-
-ENGINE *EVP_PKEY_get0_engine(const EVP_PKEY *pkey)
-{
- return pkey->engine;
-}
+
+ENGINE *EVP_PKEY_get0_engine(const EVP_PKEY *pkey)
+{
+ return pkey->engine;
+}
#endif
int EVP_PKEY_assign(EVP_PKEY *pkey, int type, void *key)
{
diff --git a/contrib/libs/openssl/crypto/evp/p_open.c b/contrib/libs/openssl/crypto/evp/p_open.c
index 1ce87454bd..b8adae0b82 100644
--- a/contrib/libs/openssl/crypto/evp/p_open.c
+++ b/contrib/libs/openssl/crypto/evp/p_open.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -40,7 +40,7 @@ int EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type,
}
size = EVP_PKEY_size(priv);
- key = OPENSSL_malloc(size);
+ key = OPENSSL_malloc(size);
if (key == NULL) {
/* ERROR */
EVPerr(EVP_F_EVP_OPENINIT, ERR_R_MALLOC_FAILURE);
diff --git a/contrib/libs/openssl/crypto/hmac/hmac.c b/contrib/libs/openssl/crypto/hmac/hmac.c
index 5e087bf92f..0ea1865bdc 100644
--- a/contrib/libs/openssl/crypto/hmac/hmac.c
+++ b/contrib/libs/openssl/crypto/hmac/hmac.c
@@ -36,13 +36,13 @@ int HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int len,
return 0;
}
- /*
- * The HMAC construction is not allowed to be used with the
- * extendable-output functions (XOF) shake128 and shake256.
- */
- if ((EVP_MD_meth_get_flags(md) & EVP_MD_FLAG_XOF) != 0)
- return 0;
-
+ /*
+ * The HMAC construction is not allowed to be used with the
+ * extendable-output functions (XOF) shake128 and shake256.
+ */
+ if ((EVP_MD_meth_get_flags(md) & EVP_MD_FLAG_XOF) != 0)
+ return 0;
+
if (key != NULL) {
reset = 1;
diff --git a/contrib/libs/openssl/crypto/init.c b/contrib/libs/openssl/crypto/init.c
index 1b0d523bea..d1f0be9d93 100644
--- a/contrib/libs/openssl/crypto/init.c
+++ b/contrib/libs/openssl/crypto/init.c
@@ -40,7 +40,7 @@ static int stopped = 0;
* destructor for threads terminating before libcrypto is initialized or
* after it's de-initialized. Access to the key doesn't have to be
* serialized for the said threads, because they didn't use libcrypto
- * and it doesn't matter if they pick "impossible" or dereference real
+ * and it doesn't matter if they pick "impossible" or dereference real
* key value and pull NULL past initialization in the first thread that
* intends to use libcrypto.
*/
@@ -161,9 +161,9 @@ DEFINE_RUN_ONCE_STATIC(ossl_init_load_crypto_nodelete)
#ifdef OPENSSL_INIT_DEBUG
fprintf(stderr, "OPENSSL_INIT: ossl_init_load_crypto_nodelete()\n");
#endif
-#if !defined(OPENSSL_USE_NODELETE) \
+#if !defined(OPENSSL_USE_NODELETE) \
&& !defined(OPENSSL_NO_PINSHARED)
-# if defined(DSO_WIN32) && !defined(_WIN32_WCE)
+# if defined(DSO_WIN32) && !defined(_WIN32_WCE)
{
HMODULE handle = NULL;
BOOL ret;
@@ -179,7 +179,7 @@ DEFINE_RUN_ONCE_STATIC(ossl_init_load_crypto_nodelete)
# endif
return (ret == TRUE) ? 1 : 0;
}
-# elif !defined(DSO_NONE)
+# elif !defined(DSO_NONE)
/*
* Deliberately leak a reference to ourselves. This will force the library
* to remain loaded until the atexit() handler is run at process exit.
@@ -701,7 +701,7 @@ int OPENSSL_init_crypto(uint64_t opts, const OPENSSL_INIT_SETTINGS *settings)
ret = RUN_ONCE(&config, ossl_init_config);
conf_settings = NULL;
CRYPTO_THREAD_unlock(init_lock);
- if (ret <= 0)
+ if (ret <= 0)
return 0;
}
@@ -763,7 +763,7 @@ int OPENSSL_atexit(void (*handler)(void))
{
OPENSSL_INIT_STOP *newhand;
-#if !defined(OPENSSL_USE_NODELETE)\
+#if !defined(OPENSSL_USE_NODELETE)\
&& !defined(OPENSSL_NO_PINSHARED)
{
union {
@@ -772,7 +772,7 @@ int OPENSSL_atexit(void (*handler)(void))
} handlersym;
handlersym.func = handler;
-# if defined(DSO_WIN32) && !defined(_WIN32_WCE)
+# if defined(DSO_WIN32) && !defined(_WIN32_WCE)
{
HMODULE handle = NULL;
BOOL ret;
@@ -788,7 +788,7 @@ int OPENSSL_atexit(void (*handler)(void))
if (!ret)
return 0;
}
-# elif !defined(DSO_NONE)
+# elif !defined(DSO_NONE)
/*
* Deliberately leak a reference to the handler. This will force the
* library/code containing the handler to remain loaded until we run the
diff --git a/contrib/libs/openssl/crypto/lhash/lhash.c b/contrib/libs/openssl/crypto/lhash/lhash.c
index 9dc887d91e..7ef3514cad 100644
--- a/contrib/libs/openssl/crypto/lhash/lhash.c
+++ b/contrib/libs/openssl/crypto/lhash/lhash.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -19,14 +19,14 @@
/*
* A hashing implementation that appears to be based on the linear hashing
- * algorithm:
+ * algorithm:
* https://en.wikipedia.org/wiki/Linear_hashing
*
* Litwin, Witold (1980), "Linear hashing: A new tool for file and table
* addressing", Proc. 6th Conference on Very Large Databases: 212-223
- * https://hackthology.com/pdfs/Litwin-1980-Linear_Hashing.pdf
+ * https://hackthology.com/pdfs/Litwin-1980-Linear_Hashing.pdf
*
- * From the Wikipedia article "Linear hashing is used in the BDB Berkeley
+ * From the Wikipedia article "Linear hashing is used in the BDB Berkeley
* database system, which in turn is used by many software systems such as
* OpenLDAP, using a C implementation derived from the CACM article and first
* published on the Usenet in 1988 by Esmond Pitt."
diff --git a/contrib/libs/openssl/crypto/mips_arch.h b/contrib/libs/openssl/crypto/mips_arch.h
index 4ae1a1a933..2a10a959cf 100644
--- a/contrib/libs/openssl/crypto/mips_arch.h
+++ b/contrib/libs/openssl/crypto/mips_arch.h
@@ -1,5 +1,5 @@
/*
- * Copyright 2011-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2011-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -11,7 +11,7 @@
# define OSSL_CRYPTO_MIPS_ARCH_H
# if (defined(__mips_smartmips) || defined(_MIPS_ARCH_MIPS32R3) || \
- defined(_MIPS_ARCH_MIPS32R5) || defined(_MIPS_ARCH_MIPS32R6)) \
+ defined(_MIPS_ARCH_MIPS32R5) || defined(_MIPS_ARCH_MIPS32R6)) \
&& !defined(_MIPS_ARCH_MIPS32R2)
# define _MIPS_ARCH_MIPS32R2
# endif
diff --git a/contrib/libs/openssl/crypto/modes/ccm128.c b/contrib/libs/openssl/crypto/modes/ccm128.c
index 655b103502..b76abe47ac 100644
--- a/contrib/libs/openssl/crypto/modes/ccm128.c
+++ b/contrib/libs/openssl/crypto/modes/ccm128.c
@@ -435,7 +435,7 @@ size_t CRYPTO_ccm128_tag(CCM128_CONTEXT *ctx, unsigned char *tag, size_t len)
M *= 2;
M += 2;
- if (len != M)
+ if (len != M)
return 0;
memcpy(tag, ctx->cmac.c, M);
return M;
diff --git a/contrib/libs/openssl/crypto/o_str.c b/contrib/libs/openssl/crypto/o_str.c
index eb9f21cc0c..74133f3de7 100644
--- a/contrib/libs/openssl/crypto/o_str.c
+++ b/contrib/libs/openssl/crypto/o_str.c
@@ -223,26 +223,26 @@ int openssl_strerror_r(int errnum, char *buf, size_t buflen)
#if defined(_MSC_VER) && _MSC_VER>=1400 && !defined(_WIN32_WCE)
return !strerror_s(buf, buflen, errnum);
#elif defined(_GNU_SOURCE)
- char *err;
-
- /*
- * GNU strerror_r may not actually set buf.
- * It can return a pointer to some (immutable) static string in which case
- * buf is left unused.
- */
- err = strerror_r(errnum, buf, buflen);
- if (err == NULL || buflen == 0)
- return 0;
- /*
- * If err is statically allocated, err != buf and we need to copy the data.
- * If err points somewhere inside buf, OPENSSL_strlcpy can handle this,
- * since src and dest are not annotated with __restrict and the function
- * reads src byte for byte and writes to dest.
- * If err == buf we do not have to copy anything.
- */
- if (err != buf)
- OPENSSL_strlcpy(buf, err, buflen);
- return 1;
+ char *err;
+
+ /*
+ * GNU strerror_r may not actually set buf.
+ * It can return a pointer to some (immutable) static string in which case
+ * buf is left unused.
+ */
+ err = strerror_r(errnum, buf, buflen);
+ if (err == NULL || buflen == 0)
+ return 0;
+ /*
+ * If err is statically allocated, err != buf and we need to copy the data.
+ * If err points somewhere inside buf, OPENSSL_strlcpy can handle this,
+ * since src and dest are not annotated with __restrict and the function
+ * reads src byte for byte and writes to dest.
+ * If err == buf we do not have to copy anything.
+ */
+ if (err != buf)
+ OPENSSL_strlcpy(buf, err, buflen);
+ return 1;
#elif (defined(_POSIX_C_SOURCE) && _POSIX_C_SOURCE >= 200112L) || \
(defined(_XOPEN_SOURCE) && _XOPEN_SOURCE >= 600)
/*
@@ -253,7 +253,7 @@ int openssl_strerror_r(int errnum, char *buf, size_t buflen)
return !strerror_r(errnum, buf, buflen);
#else
char *err;
-
+
/* Fall back to non-thread safe strerror()...its all we can do */
if (buflen < 2)
return 0;
@@ -261,7 +261,7 @@ int openssl_strerror_r(int errnum, char *buf, size_t buflen)
/* Can this ever happen? */
if (err == NULL)
return 0;
- OPENSSL_strlcpy(buf, err, buflen);
+ OPENSSL_strlcpy(buf, err, buflen);
return 1;
#endif
}
diff --git a/contrib/libs/openssl/crypto/objects/obj_dat.h b/contrib/libs/openssl/crypto/objects/obj_dat.h
index 24b49a2df2..5c30a552e7 100644
--- a/contrib/libs/openssl/crypto/objects/obj_dat.h
+++ b/contrib/libs/openssl/crypto/objects/obj_dat.h
@@ -1070,7 +1070,7 @@ static const unsigned char so[7762] = {
0x2A,0x85,0x03,0x07,0x01,0x01,0x07,0x01, /* [ 7684] OBJ_id_tc26_wrap_gostr3412_2015_magma */
0x2A,0x85,0x03,0x07,0x01,0x01,0x07,0x01,0x01, /* [ 7692] OBJ_id_tc26_wrap_gostr3412_2015_magma_kexp15 */
0x2A,0x85,0x03,0x07,0x01,0x01,0x07,0x02, /* [ 7701] OBJ_id_tc26_wrap_gostr3412_2015_kuznyechik */
- 0x2A,0x85,0x03,0x07,0x01,0x01,0x07,0x02,0x01, /* [ 7709] OBJ_id_tc26_wrap_gostr3412_2015_kuznyechik_kexp15 */
+ 0x2A,0x85,0x03,0x07,0x01,0x01,0x07,0x02,0x01, /* [ 7709] OBJ_id_tc26_wrap_gostr3412_2015_kuznyechik_kexp15 */
0x2A,0x85,0x03,0x07,0x01,0x02,0x01,0x01,0x02, /* [ 7718] OBJ_id_tc26_gost_3410_2012_256_paramSetB */
0x2A,0x85,0x03,0x07,0x01,0x02,0x01,0x01,0x03, /* [ 7727] OBJ_id_tc26_gost_3410_2012_256_paramSetC */
0x2A,0x85,0x03,0x07,0x01,0x02,0x01,0x01,0x04, /* [ 7736] OBJ_id_tc26_gost_3410_2012_256_paramSetD */
@@ -5364,7 +5364,7 @@ static const unsigned int obj_objs[NUM_OBJ] = {
1177, /* OBJ_id_tc26_cipher_gostr3412_2015_kuznyechik_ctracpkm 1 2 643 7 1 1 5 2 1 */
1178, /* OBJ_id_tc26_cipher_gostr3412_2015_kuznyechik_ctracpkm_omac 1 2 643 7 1 1 5 2 2 */
1181, /* OBJ_id_tc26_wrap_gostr3412_2015_magma_kexp15 1 2 643 7 1 1 7 1 1 */
- 1183, /* OBJ_id_tc26_wrap_gostr3412_2015_kuznyechik_kexp15 1 2 643 7 1 1 7 2 1 */
+ 1183, /* OBJ_id_tc26_wrap_gostr3412_2015_kuznyechik_kexp15 1 2 643 7 1 1 7 2 1 */
1148, /* OBJ_id_tc26_gost_3410_2012_256_paramSetA 1 2 643 7 1 2 1 1 1 */
1184, /* OBJ_id_tc26_gost_3410_2012_256_paramSetB 1 2 643 7 1 2 1 1 2 */
1185, /* OBJ_id_tc26_gost_3410_2012_256_paramSetC 1 2 643 7 1 2 1 1 3 */
diff --git a/contrib/libs/openssl/crypto/ocsp/ocsp_ext.c b/contrib/libs/openssl/crypto/ocsp/ocsp_ext.c
index f6c387ffb7..9f5962bcfa 100644
--- a/contrib/libs/openssl/crypto/ocsp/ocsp_ext.c
+++ b/contrib/libs/openssl/crypto/ocsp/ocsp_ext.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -439,7 +439,7 @@ X509_EXTENSION *OCSP_url_svcloc_new(X509_NAME *issuer, const char **urls)
if ((sloc = OCSP_SERVICELOC_new()) == NULL)
goto err;
- X509_NAME_free(sloc->issuer);
+ X509_NAME_free(sloc->issuer);
if ((sloc->issuer = X509_NAME_dup(issuer)) == NULL)
goto err;
if (urls && *urls
@@ -454,7 +454,7 @@ X509_EXTENSION *OCSP_url_svcloc_new(X509_NAME *issuer, const char **urls)
goto err;
if (!ASN1_STRING_set((ASN1_STRING *)ia5, *urls, -1))
goto err;
- /* ad->location is allocated inside ACCESS_DESCRIPTION_new */
+ /* ad->location is allocated inside ACCESS_DESCRIPTION_new */
ad->location->type = GEN_URI;
ad->location->d.ia5 = ia5;
ia5 = NULL;
diff --git a/contrib/libs/openssl/crypto/ocsp/ocsp_lib.c b/contrib/libs/openssl/crypto/ocsp/ocsp_lib.c
index 37ac6c03fd..4c34a05477 100644
--- a/contrib/libs/openssl/crypto/ocsp/ocsp_lib.c
+++ b/contrib/libs/openssl/crypto/ocsp/ocsp_lib.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -88,7 +88,7 @@ OCSP_CERTID *OCSP_cert_id_new(const EVP_MD *dgst,
return NULL;
}
-int OCSP_id_issuer_cmp(const OCSP_CERTID *a, const OCSP_CERTID *b)
+int OCSP_id_issuer_cmp(const OCSP_CERTID *a, const OCSP_CERTID *b)
{
int ret;
ret = OBJ_cmp(a->hashAlgorithm.algorithm, b->hashAlgorithm.algorithm);
@@ -100,7 +100,7 @@ int OCSP_id_issuer_cmp(const OCSP_CERTID *a, const OCSP_CERTID *b)
return ASN1_OCTET_STRING_cmp(&a->issuerKeyHash, &b->issuerKeyHash);
}
-int OCSP_id_cmp(const OCSP_CERTID *a, const OCSP_CERTID *b)
+int OCSP_id_cmp(const OCSP_CERTID *a, const OCSP_CERTID *b)
{
int ret;
ret = OCSP_id_issuer_cmp(a, b);
diff --git a/contrib/libs/openssl/crypto/pem/pem_sign.c b/contrib/libs/openssl/crypto/pem/pem_sign.c
index 7e7b32ebf7..1db1eea20f 100644
--- a/contrib/libs/openssl/crypto/pem/pem_sign.c
+++ b/contrib/libs/openssl/crypto/pem/pem_sign.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -31,7 +31,7 @@ int PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret,
int i, ret = 0;
unsigned int m_len;
- m = OPENSSL_malloc(EVP_PKEY_size(pkey));
+ m = OPENSSL_malloc(EVP_PKEY_size(pkey));
if (m == NULL) {
PEMerr(PEM_F_PEM_SIGNFINAL, ERR_R_MALLOC_FAILURE);
goto err;
diff --git a/contrib/libs/openssl/crypto/pem/pvkfmt.c b/contrib/libs/openssl/crypto/pem/pvkfmt.c
index a933b7c181..b513f7120c 100644
--- a/contrib/libs/openssl/crypto/pem/pvkfmt.c
+++ b/contrib/libs/openssl/crypto/pem/pvkfmt.c
@@ -274,9 +274,9 @@ static EVP_PKEY *b2i_dss(const unsigned char **in,
if (!read_lebn(&p, 20, &priv_key))
goto memerr;
- /* Set constant time flag before public key calculation */
- BN_set_flags(priv_key, BN_FLG_CONSTTIME);
-
+ /* Set constant time flag before public key calculation */
+ BN_set_flags(priv_key, BN_FLG_CONSTTIME);
+
/* Calculate public key */
pub_key = BN_new();
if (pub_key == NULL)
diff --git a/contrib/libs/openssl/crypto/pkcs7/pk7_doit.c b/contrib/libs/openssl/crypto/pkcs7/pk7_doit.c
index f63fbc50ea..1a86e8313c 100644
--- a/contrib/libs/openssl/crypto/pkcs7/pk7_doit.c
+++ b/contrib/libs/openssl/crypto/pkcs7/pk7_doit.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -137,8 +137,8 @@ static int pkcs7_encode_rinfo(PKCS7_RECIP_INFO *ri,
}
static int pkcs7_decrypt_rinfo(unsigned char **pek, int *peklen,
- PKCS7_RECIP_INFO *ri, EVP_PKEY *pkey,
- size_t fixlen)
+ PKCS7_RECIP_INFO *ri, EVP_PKEY *pkey,
+ size_t fixlen)
{
EVP_PKEY_CTX *pctx = NULL;
unsigned char *ek = NULL;
@@ -171,9 +171,9 @@ static int pkcs7_decrypt_rinfo(unsigned char **pek, int *peklen,
}
if (EVP_PKEY_decrypt(pctx, ek, &eklen,
- ri->enc_key->data, ri->enc_key->length) <= 0
- || eklen == 0
- || (fixlen != 0 && eklen != fixlen)) {
+ ri->enc_key->data, ri->enc_key->length) <= 0
+ || eklen == 0
+ || (fixlen != 0 && eklen != fixlen)) {
ret = 0;
PKCS7err(PKCS7_F_PKCS7_DECRYPT_RINFO, ERR_R_EVP_LIB);
goto err;
@@ -502,14 +502,14 @@ BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert)
for (i = 0; i < sk_PKCS7_RECIP_INFO_num(rsk); i++) {
ri = sk_PKCS7_RECIP_INFO_value(rsk, i);
- if (pkcs7_decrypt_rinfo(&ek, &eklen, ri, pkey,
- EVP_CIPHER_key_length(evp_cipher)) < 0)
+ if (pkcs7_decrypt_rinfo(&ek, &eklen, ri, pkey,
+ EVP_CIPHER_key_length(evp_cipher)) < 0)
goto err;
ERR_clear_error();
}
} else {
/* Only exit on fatal errors, not decrypt failure */
- if (pkcs7_decrypt_rinfo(&ek, &eklen, ri, pkey, 0) < 0)
+ if (pkcs7_decrypt_rinfo(&ek, &eklen, ri, pkey, 0) < 0)
goto err;
ERR_clear_error();
}
diff --git a/contrib/libs/openssl/crypto/ppccap.c b/contrib/libs/openssl/crypto/ppccap.c
index eeaa47cc6b..15197fb22d 100644
--- a/contrib/libs/openssl/crypto/ppccap.c
+++ b/contrib/libs/openssl/crypto/ppccap.c
@@ -338,7 +338,7 @@ void OPENSSL_cpuid_setup(void)
#ifdef OSSL_IMPLEMENT_GETAUXVAL
{
unsigned long hwcap = getauxval(HWCAP);
- unsigned long hwcap2 = getauxval(HWCAP2);
+ unsigned long hwcap2 = getauxval(HWCAP2);
if (hwcap & HWCAP_FPU) {
OPENSSL_ppccap_P |= PPC_FPU;
@@ -357,11 +357,11 @@ void OPENSSL_cpuid_setup(void)
if (hwcap & HWCAP_ALTIVEC) {
OPENSSL_ppccap_P |= PPC_ALTIVEC;
- if ((hwcap & HWCAP_VSX) && (hwcap2 & HWCAP_VEC_CRYPTO))
+ if ((hwcap & HWCAP_VSX) && (hwcap2 & HWCAP_VEC_CRYPTO))
OPENSSL_ppccap_P |= PPC_CRYPTO207;
}
- if (hwcap2 & HWCAP_ARCH_3_00) {
+ if (hwcap2 & HWCAP_ARCH_3_00) {
OPENSSL_ppccap_P |= PPC_MADD300;
}
}
diff --git a/contrib/libs/openssl/crypto/rand/drbg_lib.c b/contrib/libs/openssl/crypto/rand/drbg_lib.c
index 8c7c28c970..3e47503f3d 100644
--- a/contrib/libs/openssl/crypto/rand/drbg_lib.c
+++ b/contrib/libs/openssl/crypto/rand/drbg_lib.c
@@ -188,8 +188,8 @@ static RAND_DRBG *rand_drbg_new(int secure,
unsigned int flags,
RAND_DRBG *parent)
{
- RAND_DRBG *drbg = secure ? OPENSSL_secure_zalloc(sizeof(*drbg))
- : OPENSSL_zalloc(sizeof(*drbg));
+ RAND_DRBG *drbg = secure ? OPENSSL_secure_zalloc(sizeof(*drbg))
+ : OPENSSL_zalloc(sizeof(*drbg));
if (drbg == NULL) {
RANDerr(RAND_F_RAND_DRBG_NEW, ERR_R_MALLOC_FAILURE);
@@ -197,7 +197,7 @@ static RAND_DRBG *rand_drbg_new(int secure,
}
drbg->secure = secure && CRYPTO_secure_allocated(drbg);
- drbg->fork_id = openssl_get_fork_id();
+ drbg->fork_id = openssl_get_fork_id();
drbg->parent = parent;
if (parent == NULL) {
@@ -318,7 +318,7 @@ int RAND_DRBG_instantiate(RAND_DRBG *drbg,
/*
* NIST SP800-90Ar1 section 9.1 says you can combine getting the entropy
* and nonce in 1 call by increasing the entropy with 50% and increasing
- * the minimum length to accommodate the length of the nonce.
+ * the minimum length to accommodate the length of the nonce.
* We do this in case a nonce is require and get_nonce is NULL.
*/
if (drbg->min_noncelen > 0 && drbg->get_nonce == NULL) {
@@ -577,7 +577,7 @@ int RAND_DRBG_generate(RAND_DRBG *drbg, unsigned char *out, size_t outlen,
int prediction_resistance,
const unsigned char *adin, size_t adinlen)
{
- int fork_id;
+ int fork_id;
int reseed_required = 0;
if (drbg->state != DRBG_READY) {
@@ -603,10 +603,10 @@ int RAND_DRBG_generate(RAND_DRBG *drbg, unsigned char *out, size_t outlen,
return 0;
}
- fork_id = openssl_get_fork_id();
-
- if (drbg->fork_id != fork_id) {
- drbg->fork_id = fork_id;
+ fork_id = openssl_get_fork_id();
+
+ if (drbg->fork_id != fork_id) {
+ drbg->fork_id = fork_id;
reseed_required = 1;
}
@@ -663,7 +663,7 @@ int RAND_DRBG_bytes(RAND_DRBG *drbg, unsigned char *out, size_t outlen)
if (drbg->adin_pool == NULL) {
if (drbg->type == 0)
goto err;
- drbg->adin_pool = rand_pool_new(0, 0, 0, drbg->max_adinlen);
+ drbg->adin_pool = rand_pool_new(0, 0, 0, drbg->max_adinlen);
if (drbg->adin_pool == NULL)
goto err;
}
diff --git a/contrib/libs/openssl/crypto/rand/rand_err.c b/contrib/libs/openssl/crypto/rand/rand_err.c
index a3ae5f53c2..55effaa7a9 100644
--- a/contrib/libs/openssl/crypto/rand/rand_err.c
+++ b/contrib/libs/openssl/crypto/rand/rand_err.c
@@ -49,7 +49,7 @@ static const ERR_STRING_DATA RAND_str_functs[] = {
{ERR_PACK(ERR_LIB_RAND, RAND_F_RAND_POOL_ATTACH, 0), "rand_pool_attach"},
{ERR_PACK(ERR_LIB_RAND, RAND_F_RAND_POOL_BYTES_NEEDED, 0),
"rand_pool_bytes_needed"},
- {ERR_PACK(ERR_LIB_RAND, RAND_F_RAND_POOL_GROW, 0), "rand_pool_grow"},
+ {ERR_PACK(ERR_LIB_RAND, RAND_F_RAND_POOL_GROW, 0), "rand_pool_grow"},
{ERR_PACK(ERR_LIB_RAND, RAND_F_RAND_POOL_NEW, 0), "rand_pool_new"},
{ERR_PACK(ERR_LIB_RAND, RAND_F_RAND_PSEUDO_BYTES, 0), "RAND_pseudo_bytes"},
{ERR_PACK(ERR_LIB_RAND, RAND_F_RAND_WRITE_FILE, 0), "RAND_write_file"},
diff --git a/contrib/libs/openssl/crypto/rand/rand_lib.c b/contrib/libs/openssl/crypto/rand/rand_lib.c
index 5c72fad8ca..18a6635df3 100644
--- a/contrib/libs/openssl/crypto/rand/rand_lib.c
+++ b/contrib/libs/openssl/crypto/rand/rand_lib.c
@@ -135,7 +135,7 @@ size_t rand_drbg_get_entropy(RAND_DRBG *drbg,
size_t entropy_available = 0;
RAND_POOL *pool;
- if (drbg->parent != NULL && drbg->strength > drbg->parent->strength) {
+ if (drbg->parent != NULL && drbg->strength > drbg->parent->strength) {
/*
* We currently don't support the algorithm from NIST SP 800-90C
* 10.1.2 to use a weaker DRBG as source
@@ -148,12 +148,12 @@ size_t rand_drbg_get_entropy(RAND_DRBG *drbg,
pool = drbg->seed_pool;
pool->entropy_requested = entropy;
} else {
- pool = rand_pool_new(entropy, drbg->secure, min_len, max_len);
+ pool = rand_pool_new(entropy, drbg->secure, min_len, max_len);
if (pool == NULL)
return 0;
}
- if (drbg->parent != NULL) {
+ if (drbg->parent != NULL) {
size_t bytes_needed = rand_pool_bytes_needed(pool, 1 /*entropy_factor*/);
unsigned char *buffer = rand_pool_add_begin(pool, bytes_needed);
@@ -161,9 +161,9 @@ size_t rand_drbg_get_entropy(RAND_DRBG *drbg,
size_t bytes = 0;
/*
- * Get random data from parent. Include our address as additional input,
- * in order to provide some additional distinction between different
- * DRBG child instances.
+ * Get random data from parent. Include our address as additional input,
+ * in order to provide some additional distinction between different
+ * DRBG child instances.
* Our lock is already held, but we need to lock our parent before
* generating bits from it. (Note: taking the lock will be a no-op
* if locking if drbg->parent->lock == NULL.)
@@ -172,7 +172,7 @@ size_t rand_drbg_get_entropy(RAND_DRBG *drbg,
if (RAND_DRBG_generate(drbg->parent,
buffer, bytes_needed,
prediction_resistance,
- (unsigned char *)&drbg, sizeof(drbg)) != 0)
+ (unsigned char *)&drbg, sizeof(drbg)) != 0)
bytes = bytes_needed;
rand_drbg_unlock(drbg->parent);
@@ -214,12 +214,12 @@ size_t rand_drbg_get_entropy(RAND_DRBG *drbg,
void rand_drbg_cleanup_entropy(RAND_DRBG *drbg,
unsigned char *out, size_t outlen)
{
- if (drbg->seed_pool == NULL) {
- if (drbg->secure)
- OPENSSL_secure_clear_free(out, outlen);
- else
- OPENSSL_clear_free(out, outlen);
- }
+ if (drbg->seed_pool == NULL) {
+ if (drbg->secure)
+ OPENSSL_secure_clear_free(out, outlen);
+ else
+ OPENSSL_clear_free(out, outlen);
+ }
}
@@ -237,10 +237,10 @@ size_t rand_drbg_get_nonce(RAND_DRBG *drbg,
struct {
void * instance;
int count;
- } data;
+ } data;
- memset(&data, 0, sizeof(data));
- pool = rand_pool_new(0, 0, min_len, max_len);
+ memset(&data, 0, sizeof(data));
+ pool = rand_pool_new(0, 0, min_len, max_len);
if (pool == NULL)
return 0;
@@ -269,7 +269,7 @@ size_t rand_drbg_get_nonce(RAND_DRBG *drbg,
void rand_drbg_cleanup_nonce(RAND_DRBG *drbg,
unsigned char *out, size_t outlen)
{
- OPENSSL_clear_free(out, outlen);
+ OPENSSL_clear_free(out, outlen);
}
/*
@@ -360,7 +360,7 @@ void rand_cleanup_int(void)
}
/*
- * RAND_close_seed_files() ensures that any seed file descriptors are
+ * RAND_close_seed_files() ensures that any seed file descriptors are
* closed after use.
*/
void RAND_keep_random_devices_open(int keep)
@@ -402,8 +402,8 @@ int RAND_poll(void)
} else {
/* fill random pool and seed the current legacy RNG */
- pool = rand_pool_new(RAND_DRBG_STRENGTH, 1,
- (RAND_DRBG_STRENGTH + 7) / 8,
+ pool = rand_pool_new(RAND_DRBG_STRENGTH, 1,
+ (RAND_DRBG_STRENGTH + 7) / 8,
RAND_POOL_MAX_LENGTH);
if (pool == NULL)
return 0;
@@ -429,11 +429,11 @@ err:
* Allocate memory and initialize a new random pool
*/
-RAND_POOL *rand_pool_new(int entropy_requested, int secure,
- size_t min_len, size_t max_len)
+RAND_POOL *rand_pool_new(int entropy_requested, int secure,
+ size_t min_len, size_t max_len)
{
RAND_POOL *pool;
- size_t min_alloc_size = RAND_POOL_MIN_ALLOCATION(secure);
+ size_t min_alloc_size = RAND_POOL_MIN_ALLOCATION(secure);
if (!RUN_ONCE(&rand_init, do_rand_init))
return NULL;
@@ -447,22 +447,22 @@ RAND_POOL *rand_pool_new(int entropy_requested, int secure,
pool->min_len = min_len;
pool->max_len = (max_len > RAND_POOL_MAX_LENGTH) ?
RAND_POOL_MAX_LENGTH : max_len;
- pool->alloc_len = min_len < min_alloc_size ? min_alloc_size : min_len;
- if (pool->alloc_len > pool->max_len)
- pool->alloc_len = pool->max_len;
-
- if (secure)
- pool->buffer = OPENSSL_secure_zalloc(pool->alloc_len);
- else
- pool->buffer = OPENSSL_zalloc(pool->alloc_len);
-
+ pool->alloc_len = min_len < min_alloc_size ? min_alloc_size : min_len;
+ if (pool->alloc_len > pool->max_len)
+ pool->alloc_len = pool->max_len;
+
+ if (secure)
+ pool->buffer = OPENSSL_secure_zalloc(pool->alloc_len);
+ else
+ pool->buffer = OPENSSL_zalloc(pool->alloc_len);
+
if (pool->buffer == NULL) {
RANDerr(RAND_F_RAND_POOL_NEW, ERR_R_MALLOC_FAILURE);
goto err;
}
pool->entropy_requested = entropy_requested;
- pool->secure = secure;
+ pool->secure = secure;
return pool;
@@ -497,7 +497,7 @@ RAND_POOL *rand_pool_attach(const unsigned char *buffer, size_t len,
pool->attached = 1;
- pool->min_len = pool->max_len = pool->alloc_len = pool->len;
+ pool->min_len = pool->max_len = pool->alloc_len = pool->len;
pool->entropy = entropy;
return pool;
@@ -517,13 +517,13 @@ void rand_pool_free(RAND_POOL *pool)
* to rand_pool_attach() as `const unsigned char*`.
* (see corresponding comment in rand_pool_attach()).
*/
- if (!pool->attached) {
- if (pool->secure)
- OPENSSL_secure_clear_free(pool->buffer, pool->alloc_len);
- else
- OPENSSL_clear_free(pool->buffer, pool->alloc_len);
- }
-
+ if (!pool->attached) {
+ if (pool->secure)
+ OPENSSL_secure_clear_free(pool->buffer, pool->alloc_len);
+ else
+ OPENSSL_clear_free(pool->buffer, pool->alloc_len);
+ }
+
OPENSSL_free(pool);
}
@@ -616,42 +616,42 @@ size_t rand_pool_entropy_needed(RAND_POOL *pool)
return 0;
}
-/* Increase the allocation size -- not usable for an attached pool */
-static int rand_pool_grow(RAND_POOL *pool, size_t len)
-{
- if (len > pool->alloc_len - pool->len) {
- unsigned char *p;
- const size_t limit = pool->max_len / 2;
- size_t newlen = pool->alloc_len;
-
- if (pool->attached || len > pool->max_len - pool->len) {
- RANDerr(RAND_F_RAND_POOL_GROW, ERR_R_INTERNAL_ERROR);
- return 0;
- }
-
- do
- newlen = newlen < limit ? newlen * 2 : pool->max_len;
- while (len > newlen - pool->len);
-
- if (pool->secure)
- p = OPENSSL_secure_zalloc(newlen);
- else
- p = OPENSSL_zalloc(newlen);
- if (p == NULL) {
- RANDerr(RAND_F_RAND_POOL_GROW, ERR_R_MALLOC_FAILURE);
- return 0;
- }
- memcpy(p, pool->buffer, pool->len);
- if (pool->secure)
- OPENSSL_secure_clear_free(pool->buffer, pool->alloc_len);
- else
- OPENSSL_clear_free(pool->buffer, pool->alloc_len);
- pool->buffer = p;
- pool->alloc_len = newlen;
- }
- return 1;
-}
-
+/* Increase the allocation size -- not usable for an attached pool */
+static int rand_pool_grow(RAND_POOL *pool, size_t len)
+{
+ if (len > pool->alloc_len - pool->len) {
+ unsigned char *p;
+ const size_t limit = pool->max_len / 2;
+ size_t newlen = pool->alloc_len;
+
+ if (pool->attached || len > pool->max_len - pool->len) {
+ RANDerr(RAND_F_RAND_POOL_GROW, ERR_R_INTERNAL_ERROR);
+ return 0;
+ }
+
+ do
+ newlen = newlen < limit ? newlen * 2 : pool->max_len;
+ while (len > newlen - pool->len);
+
+ if (pool->secure)
+ p = OPENSSL_secure_zalloc(newlen);
+ else
+ p = OPENSSL_zalloc(newlen);
+ if (p == NULL) {
+ RANDerr(RAND_F_RAND_POOL_GROW, ERR_R_MALLOC_FAILURE);
+ return 0;
+ }
+ memcpy(p, pool->buffer, pool->len);
+ if (pool->secure)
+ OPENSSL_secure_clear_free(pool->buffer, pool->alloc_len);
+ else
+ OPENSSL_clear_free(pool->buffer, pool->alloc_len);
+ pool->buffer = p;
+ pool->alloc_len = newlen;
+ }
+ return 1;
+}
+
/*
* Returns the number of bytes needed to fill the pool, assuming
* the input has 1 / |entropy_factor| entropy bits per data bit.
@@ -681,24 +681,24 @@ size_t rand_pool_bytes_needed(RAND_POOL *pool, unsigned int entropy_factor)
/* to meet the min_len requirement */
bytes_needed = pool->min_len - pool->len;
- /*
- * Make sure the buffer is large enough for the requested amount
- * of data. This guarantees that existing code patterns where
- * rand_pool_add_begin, rand_pool_add_end or rand_pool_add
- * are used to collect entropy data without any error handling
- * whatsoever, continue to be valid.
- * Furthermore if the allocation here fails once, make sure that
- * we don't fall back to a less secure or even blocking random source,
- * as that could happen by the existing code patterns.
- * This is not a concern for additional data, therefore that
- * is not needed if rand_pool_grow fails in other places.
- */
- if (!rand_pool_grow(pool, bytes_needed)) {
- /* persistent error for this pool */
- pool->max_len = pool->len = 0;
- return 0;
- }
-
+ /*
+ * Make sure the buffer is large enough for the requested amount
+ * of data. This guarantees that existing code patterns where
+ * rand_pool_add_begin, rand_pool_add_end or rand_pool_add
+ * are used to collect entropy data without any error handling
+ * whatsoever, continue to be valid.
+ * Furthermore if the allocation here fails once, make sure that
+ * we don't fall back to a less secure or even blocking random source,
+ * as that could happen by the existing code patterns.
+ * This is not a concern for additional data, therefore that
+ * is not needed if rand_pool_grow fails in other places.
+ */
+ if (!rand_pool_grow(pool, bytes_needed)) {
+ /* persistent error for this pool */
+ pool->max_len = pool->len = 0;
+ return 0;
+ }
+
return bytes_needed;
}
@@ -731,27 +731,27 @@ int rand_pool_add(RAND_POOL *pool,
}
if (len > 0) {
- /*
- * This is to protect us from accidentally passing the buffer
- * returned from rand_pool_add_begin.
- * The check for alloc_len makes sure we do not compare the
- * address of the end of the allocated memory to something
- * different, since that comparison would have an
- * indeterminate result.
- */
- if (pool->alloc_len > pool->len && pool->buffer + pool->len == buffer) {
- RANDerr(RAND_F_RAND_POOL_ADD, ERR_R_INTERNAL_ERROR);
- return 0;
- }
- /*
- * We have that only for cases when a pool is used to collect
- * additional data.
- * For entropy data, as long as the allocation request stays within
- * the limits given by rand_pool_bytes_needed this rand_pool_grow
- * below is guaranteed to succeed, thus no allocation happens.
- */
- if (!rand_pool_grow(pool, len))
- return 0;
+ /*
+ * This is to protect us from accidentally passing the buffer
+ * returned from rand_pool_add_begin.
+ * The check for alloc_len makes sure we do not compare the
+ * address of the end of the allocated memory to something
+ * different, since that comparison would have an
+ * indeterminate result.
+ */
+ if (pool->alloc_len > pool->len && pool->buffer + pool->len == buffer) {
+ RANDerr(RAND_F_RAND_POOL_ADD, ERR_R_INTERNAL_ERROR);
+ return 0;
+ }
+ /*
+ * We have that only for cases when a pool is used to collect
+ * additional data.
+ * For entropy data, as long as the allocation request stays within
+ * the limits given by rand_pool_bytes_needed this rand_pool_grow
+ * below is guaranteed to succeed, thus no allocation happens.
+ */
+ if (!rand_pool_grow(pool, len))
+ return 0;
memcpy(pool->buffer + pool->len, buffer, len);
pool->len += len;
pool->entropy += entropy;
@@ -784,21 +784,21 @@ unsigned char *rand_pool_add_begin(RAND_POOL *pool, size_t len)
if (pool->buffer == NULL) {
RANDerr(RAND_F_RAND_POOL_ADD_BEGIN, ERR_R_INTERNAL_ERROR);
- return NULL;
+ return NULL;
}
- /*
- * As long as the allocation request stays within the limits given
- * by rand_pool_bytes_needed this rand_pool_grow below is guaranteed
- * to succeed, thus no allocation happens.
- * We have that only for cases when a pool is used to collect
- * additional data. Then the buffer might need to grow here,
- * and of course the caller is responsible to check the return
- * value of this function.
- */
- if (!rand_pool_grow(pool, len))
- return NULL;
-
+ /*
+ * As long as the allocation request stays within the limits given
+ * by rand_pool_bytes_needed this rand_pool_grow below is guaranteed
+ * to succeed, thus no allocation happens.
+ * We have that only for cases when a pool is used to collect
+ * additional data. Then the buffer might need to grow here,
+ * and of course the caller is responsible to check the return
+ * value of this function.
+ */
+ if (!rand_pool_grow(pool, len))
+ return NULL;
+
return pool->buffer + pool->len;
}
@@ -813,7 +813,7 @@ unsigned char *rand_pool_add_begin(RAND_POOL *pool, size_t len)
*/
int rand_pool_add_end(RAND_POOL *pool, size_t len, size_t entropy)
{
- if (len > pool->alloc_len - pool->len) {
+ if (len > pool->alloc_len - pool->len) {
RANDerr(RAND_F_RAND_POOL_ADD_END, RAND_R_RANDOM_POOL_OVERFLOW);
return 0;
}
diff --git a/contrib/libs/openssl/crypto/rand/rand_unix.c b/contrib/libs/openssl/crypto/rand/rand_unix.c
index 5766e5abe7..9ea7a2857f 100644
--- a/contrib/libs/openssl/crypto/rand/rand_unix.c
+++ b/contrib/libs/openssl/crypto/rand/rand_unix.c
@@ -14,17 +14,17 @@
#include <stdio.h>
#include "internal/cryptlib.h"
#include <openssl/rand.h>
-#include <openssl/crypto.h>
+#include <openssl/crypto.h>
#include "rand_local.h"
#include "crypto/rand.h"
#include <stdio.h>
#include "internal/dso.h"
-#ifdef __linux
-# include <sys/syscall.h>
-# ifdef DEVRANDOM_WAIT
-# include <sys/shm.h>
-# include <sys/utsname.h>
-# endif
+#ifdef __linux
+# include <sys/syscall.h>
+# ifdef DEVRANDOM_WAIT
+# include <sys/shm.h>
+# include <sys/utsname.h>
+# endif
#endif
#if (defined(__FreeBSD__) || defined(__NetBSD__)) && !defined(OPENSSL_SYS_UEFI)
# include <sys/types.h>
@@ -286,12 +286,12 @@ static ssize_t sysctl_random(char *buf, size_t buflen)
# endif
# if defined(OPENSSL_RAND_SEED_GETRANDOM)
-
-# if defined(__linux) && !defined(__NR_getrandom)
+
+# if defined(__linux) && !defined(__NR_getrandom)
# if defined(__arm__)
-# define __NR_getrandom (__NR_SYSCALL_BASE+384)
-# elif defined(__i386__)
-# define __NR_getrandom 355
+# define __NR_getrandom (__NR_SYSCALL_BASE+384)
+# elif defined(__i386__)
+# define __NR_getrandom 355
# elif defined(__x86_64__)
# if defined(__ILP32__)
# define __NR_getrandom (__X32_SYSCALL_BIT + 318)
@@ -340,9 +340,9 @@ static ssize_t sysctl_random(char *buf, size_t buflen)
# define __NR_getrandom 278
# else /* generic */
# define __NR_getrandom 278
-# endif
-# endif
-
+# endif
+# endif
+
/*
* syscall_random(): Try to get random data using a system call
* returns the number of bytes returned in buf, or < 0 on error.
@@ -404,8 +404,8 @@ static ssize_t syscall_random(void *buf, size_t buflen)
# endif
/* Linux supports this since version 3.17 */
-# if defined(__linux) && defined(__NR_getrandom)
- return syscall(__NR_getrandom, buf, buflen, 0);
+# if defined(__linux) && defined(__NR_getrandom)
+ return syscall(__NR_getrandom, buf, buflen, 0);
# elif (defined(__FreeBSD__) || defined(__NetBSD__)) && defined(KERN_ARND)
return sysctl_random(buf, buflen);
# else
@@ -428,91 +428,91 @@ static int keep_random_devices_open = 1;
# if defined(__linux) && defined(DEVRANDOM_WAIT) \
&& defined(OPENSSL_RAND_SEED_GETRANDOM)
-static void *shm_addr;
-
-static void cleanup_shm(void)
-{
- shmdt(shm_addr);
-}
-
+static void *shm_addr;
+
+static void cleanup_shm(void)
+{
+ shmdt(shm_addr);
+}
+
/*
- * Ensure that the system randomness source has been adequately seeded.
- * This is done by having the first start of libcrypto, wait until the device
- * /dev/random becomes able to supply a byte of entropy. Subsequent starts
- * of the library and later reseedings do not need to do this.
- */
-static int wait_random_seeded(void)
-{
- static int seeded = OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID < 0;
- static const int kernel_version[] = { DEVRANDOM_SAFE_KERNEL };
- int kernel[2];
- int shm_id, fd, r;
- char c, *p;
- struct utsname un;
- fd_set fds;
-
- if (!seeded) {
- /* See if anything has created the global seeded indication */
- if ((shm_id = shmget(OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID, 1, 0)) == -1) {
- /*
- * Check the kernel's version and fail if it is too recent.
- *
- * Linux kernels from 4.8 onwards do not guarantee that
- * /dev/urandom is properly seeded when /dev/random becomes
- * readable. However, such kernels support the getentropy(2)
- * system call and this should always succeed which renders
- * this alternative but essentially identical source moot.
- */
- if (uname(&un) == 0) {
- kernel[0] = atoi(un.release);
- p = strchr(un.release, '.');
- kernel[1] = p == NULL ? 0 : atoi(p + 1);
- if (kernel[0] > kernel_version[0]
- || (kernel[0] == kernel_version[0]
- && kernel[1] >= kernel_version[1])) {
- return 0;
- }
- }
- /* Open /dev/random and wait for it to be readable */
- if ((fd = open(DEVRANDOM_WAIT, O_RDONLY)) != -1) {
- if (DEVRANDM_WAIT_USE_SELECT && fd < FD_SETSIZE) {
- FD_ZERO(&fds);
- FD_SET(fd, &fds);
- while ((r = select(fd + 1, &fds, NULL, NULL, NULL)) < 0
- && errno == EINTR);
- } else {
- while ((r = read(fd, &c, 1)) < 0 && errno == EINTR);
- }
- close(fd);
- if (r == 1) {
- seeded = 1;
- /* Create the shared memory indicator */
- shm_id = shmget(OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID, 1,
- IPC_CREAT | S_IRUSR | S_IRGRP | S_IROTH);
- }
- }
- }
- if (shm_id != -1) {
- seeded = 1;
- /*
- * Map the shared memory to prevent its premature destruction.
- * If this call fails, it isn't a big problem.
- */
- shm_addr = shmat(shm_id, NULL, SHM_RDONLY);
- if (shm_addr != (void *)-1)
- OPENSSL_atexit(&cleanup_shm);
- }
- }
- return seeded;
-}
+ * Ensure that the system randomness source has been adequately seeded.
+ * This is done by having the first start of libcrypto, wait until the device
+ * /dev/random becomes able to supply a byte of entropy. Subsequent starts
+ * of the library and later reseedings do not need to do this.
+ */
+static int wait_random_seeded(void)
+{
+ static int seeded = OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID < 0;
+ static const int kernel_version[] = { DEVRANDOM_SAFE_KERNEL };
+ int kernel[2];
+ int shm_id, fd, r;
+ char c, *p;
+ struct utsname un;
+ fd_set fds;
+
+ if (!seeded) {
+ /* See if anything has created the global seeded indication */
+ if ((shm_id = shmget(OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID, 1, 0)) == -1) {
+ /*
+ * Check the kernel's version and fail if it is too recent.
+ *
+ * Linux kernels from 4.8 onwards do not guarantee that
+ * /dev/urandom is properly seeded when /dev/random becomes
+ * readable. However, such kernels support the getentropy(2)
+ * system call and this should always succeed which renders
+ * this alternative but essentially identical source moot.
+ */
+ if (uname(&un) == 0) {
+ kernel[0] = atoi(un.release);
+ p = strchr(un.release, '.');
+ kernel[1] = p == NULL ? 0 : atoi(p + 1);
+ if (kernel[0] > kernel_version[0]
+ || (kernel[0] == kernel_version[0]
+ && kernel[1] >= kernel_version[1])) {
+ return 0;
+ }
+ }
+ /* Open /dev/random and wait for it to be readable */
+ if ((fd = open(DEVRANDOM_WAIT, O_RDONLY)) != -1) {
+ if (DEVRANDM_WAIT_USE_SELECT && fd < FD_SETSIZE) {
+ FD_ZERO(&fds);
+ FD_SET(fd, &fds);
+ while ((r = select(fd + 1, &fds, NULL, NULL, NULL)) < 0
+ && errno == EINTR);
+ } else {
+ while ((r = read(fd, &c, 1)) < 0 && errno == EINTR);
+ }
+ close(fd);
+ if (r == 1) {
+ seeded = 1;
+ /* Create the shared memory indicator */
+ shm_id = shmget(OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID, 1,
+ IPC_CREAT | S_IRUSR | S_IRGRP | S_IROTH);
+ }
+ }
+ }
+ if (shm_id != -1) {
+ seeded = 1;
+ /*
+ * Map the shared memory to prevent its premature destruction.
+ * If this call fails, it isn't a big problem.
+ */
+ shm_addr = shmat(shm_id, NULL, SHM_RDONLY);
+ if (shm_addr != (void *)-1)
+ OPENSSL_atexit(&cleanup_shm);
+ }
+ }
+ return seeded;
+}
# else /* defined __linux && DEVRANDOM_WAIT && OPENSSL_RAND_SEED_GETRANDOM */
-static int wait_random_seeded(void)
-{
- return 1;
-}
-# endif
-
-/*
+static int wait_random_seeded(void)
+{
+ return 1;
+}
+# endif
+
+/*
* Verify that the file descriptor associated with the random source is
* still valid. The rationale for doing this is the fact that it is not
* uncommon for daemons to close all open file handles when daemonizing.
@@ -638,12 +638,12 @@ size_t rand_pool_acquire_entropy(RAND_POOL *pool)
# if defined(OPENSSL_RAND_SEED_NONE)
return rand_pool_entropy_available(pool);
# else
- size_t entropy_available;
+ size_t entropy_available;
# if defined(OPENSSL_RAND_SEED_GETRANDOM)
{
- size_t bytes_needed;
- unsigned char *buffer;
+ size_t bytes_needed;
+ unsigned char *buffer;
ssize_t bytes;
/* Maximum allowed number of consecutive unsuccessful attempts */
int attempts = 3;
@@ -673,16 +673,16 @@ size_t rand_pool_acquire_entropy(RAND_POOL *pool)
# endif
# if defined(OPENSSL_RAND_SEED_DEVRANDOM)
- if (wait_random_seeded()) {
- size_t bytes_needed;
- unsigned char *buffer;
+ if (wait_random_seeded()) {
+ size_t bytes_needed;
+ unsigned char *buffer;
size_t i;
- bytes_needed = rand_pool_bytes_needed(pool, 1 /*entropy_factor*/);
- for (i = 0; bytes_needed > 0 && i < OSSL_NELEM(random_device_paths);
- i++) {
+ bytes_needed = rand_pool_bytes_needed(pool, 1 /*entropy_factor*/);
+ for (i = 0; bytes_needed > 0 && i < OSSL_NELEM(random_device_paths);
+ i++) {
ssize_t bytes = 0;
- /* Maximum number of consecutive unsuccessful attempts */
+ /* Maximum number of consecutive unsuccessful attempts */
int attempts = 3;
const int fd = get_random_device(i);
@@ -696,7 +696,7 @@ size_t rand_pool_acquire_entropy(RAND_POOL *pool)
if (bytes > 0) {
rand_pool_add_end(pool, bytes, 8 * bytes);
bytes_needed -= bytes;
- attempts = 3; /* reset counter on successful attempt */
+ attempts = 3; /* reset counter on successful attempt */
} else if (bytes < 0 && errno != EINTR) {
break;
}
@@ -704,7 +704,7 @@ size_t rand_pool_acquire_entropy(RAND_POOL *pool)
if (bytes < 0 || !keep_random_devices_open)
close_random_device(i);
- bytes_needed = rand_pool_bytes_needed(pool, 1);
+ bytes_needed = rand_pool_bytes_needed(pool, 1);
}
entropy_available = rand_pool_entropy_available(pool);
if (entropy_available > 0)
@@ -725,29 +725,29 @@ size_t rand_pool_acquire_entropy(RAND_POOL *pool)
# endif
# if defined(OPENSSL_RAND_SEED_EGD)
- {
+ {
static const char *paths[] = { DEVRANDOM_EGD, NULL };
- size_t bytes_needed;
- unsigned char *buffer;
+ size_t bytes_needed;
+ unsigned char *buffer;
int i;
- bytes_needed = rand_pool_bytes_needed(pool, 1 /*entropy_factor*/);
- for (i = 0; bytes_needed > 0 && paths[i] != NULL; i++) {
- size_t bytes = 0;
- int num;
-
+ bytes_needed = rand_pool_bytes_needed(pool, 1 /*entropy_factor*/);
+ for (i = 0; bytes_needed > 0 && paths[i] != NULL; i++) {
+ size_t bytes = 0;
+ int num;
+
buffer = rand_pool_add_begin(pool, bytes_needed);
- num = RAND_query_egd_bytes(paths[i],
- buffer, (int)bytes_needed);
- if (num == (int)bytes_needed)
- bytes = bytes_needed;
+ num = RAND_query_egd_bytes(paths[i],
+ buffer, (int)bytes_needed);
+ if (num == (int)bytes_needed)
+ bytes = bytes_needed;
- rand_pool_add_end(pool, bytes, 8 * bytes);
- bytes_needed = rand_pool_bytes_needed(pool, 1);
+ rand_pool_add_end(pool, bytes, 8 * bytes);
+ bytes_needed = rand_pool_bytes_needed(pool, 1);
}
- entropy_available = rand_pool_entropy_available(pool);
- if (entropy_available > 0)
- return entropy_available;
+ entropy_available = rand_pool_entropy_available(pool);
+ if (entropy_available > 0)
+ return entropy_available;
}
# endif
@@ -781,18 +781,18 @@ int rand_pool_add_nonce_data(RAND_POOL *pool)
int rand_pool_add_additional_data(RAND_POOL *pool)
{
struct {
- int fork_id;
+ int fork_id;
CRYPTO_THREAD_ID tid;
uint64_t time;
} data = { 0 };
/*
* Add some noise from the thread id and a high resolution timer.
- * The fork_id adds some extra fork-safety.
+ * The fork_id adds some extra fork-safety.
* The thread id adds a little randomness if the drbg is accessed
* concurrently (which is the case for the <master> drbg).
*/
- data.fork_id = openssl_get_fork_id();
+ data.fork_id = openssl_get_fork_id();
data.tid = CRYPTO_THREAD_get_current_id();
data.time = get_timer_bits();
diff --git a/contrib/libs/openssl/crypto/rand/rand_vms.c b/contrib/libs/openssl/crypto/rand/rand_vms.c
index b1e9f7974e..27d0ccd30b 100644
--- a/contrib/libs/openssl/crypto/rand/rand_vms.c
+++ b/contrib/libs/openssl/crypto/rand/rand_vms.c
@@ -591,11 +591,11 @@ int rand_pool_add_additional_data(RAND_POOL *pool)
* concurrently (which is the case for the <master> drbg).
*/
data.tid = CRYPTO_THREAD_get_current_id();
-#if __CRTL_VER >= 80400000
+#if __CRTL_VER >= 80400000
sys$gettim_prec(&data.time);
-#else
- sys$gettim((void*)&data.time);
-#endif
+#else
+ sys$gettim((void*)&data.time);
+#endif
return rand_pool_add(pool, (unsigned char *)&data, sizeof(data), 0);
}
diff --git a/contrib/libs/openssl/crypto/rand/rand_win.c b/contrib/libs/openssl/crypto/rand/rand_win.c
index 9036546008..6d8bbc01cc 100644
--- a/contrib/libs/openssl/crypto/rand/rand_win.c
+++ b/contrib/libs/openssl/crypto/rand/rand_win.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -18,9 +18,9 @@
# endif
# include <windows.h>
-/* On Windows Vista or higher use BCrypt instead of the legacy CryptoAPI */
-# if defined(_MSC_VER) && _MSC_VER > 1500 /* 1500 = Visual Studio 2008 */ \
- && defined(_WIN32_WINNT) && _WIN32_WINNT >= 0x0600
+/* On Windows Vista or higher use BCrypt instead of the legacy CryptoAPI */
+# if defined(_MSC_VER) && _MSC_VER > 1500 /* 1500 = Visual Studio 2008 */ \
+ && defined(_WIN32_WINNT) && _WIN32_WINNT >= 0x0600
# define USE_BCRYPTGENRANDOM
# endif
diff --git a/contrib/libs/openssl/crypto/rand/randfile.c b/contrib/libs/openssl/crypto/rand/randfile.c
index 229ce864a3..4db9d66856 100644
--- a/contrib/libs/openssl/crypto/rand/randfile.c
+++ b/contrib/libs/openssl/crypto/rand/randfile.c
@@ -254,7 +254,7 @@ const char *RAND_file_name(char *buf, size_t size)
size_t len;
int use_randfile = 1;
-#if defined(_WIN32) && defined(CP_UTF8) && !defined(_WIN32_WCE)
+#if defined(_WIN32) && defined(CP_UTF8) && !defined(_WIN32_WCE)
DWORD envlen;
WCHAR *var;
diff --git a/contrib/libs/openssl/crypto/rsa/rsa_ameth.c b/contrib/libs/openssl/crypto/rsa/rsa_ameth.c
index fb045544a8..3779797305 100644
--- a/contrib/libs/openssl/crypto/rsa/rsa_ameth.c
+++ b/contrib/libs/openssl/crypto/rsa/rsa_ameth.c
@@ -467,9 +467,9 @@ static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg,
static int rsa_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2)
{
X509_ALGOR *alg = NULL;
- const EVP_MD *md;
- const EVP_MD *mgf1md;
- int min_saltlen;
+ const EVP_MD *md;
+ const EVP_MD *mgf1md;
+ int min_saltlen;
switch (op) {
@@ -509,16 +509,16 @@ static int rsa_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2)
#endif
case ASN1_PKEY_CTRL_DEFAULT_MD_NID:
- if (pkey->pkey.rsa->pss != NULL) {
- if (!rsa_pss_get_param(pkey->pkey.rsa->pss, &md, &mgf1md,
- &min_saltlen)) {
- RSAerr(0, ERR_R_INTERNAL_ERROR);
- return 0;
- }
- *(int *)arg2 = EVP_MD_type(md);
- /* Return of 2 indicates this MD is mandatory */
- return 2;
- }
+ if (pkey->pkey.rsa->pss != NULL) {
+ if (!rsa_pss_get_param(pkey->pkey.rsa->pss, &md, &mgf1md,
+ &min_saltlen)) {
+ RSAerr(0, ERR_R_INTERNAL_ERROR);
+ return 0;
+ }
+ *(int *)arg2 = EVP_MD_type(md);
+ /* Return of 2 indicates this MD is mandatory */
+ return 2;
+ }
*(int *)arg2 = NID_sha256;
return 1;
@@ -605,12 +605,12 @@ static RSA_PSS_PARAMS *rsa_ctx_to_pss(EVP_PKEY_CTX *pkctx)
return NULL;
if (saltlen == -1) {
saltlen = EVP_MD_size(sigmd);
- } else if (saltlen == -2 || saltlen == -3) {
+ } else if (saltlen == -2 || saltlen == -3) {
saltlen = EVP_PKEY_size(pk) - EVP_MD_size(sigmd) - 2;
if ((EVP_PKEY_bits(pk) & 0x7) == 1)
saltlen--;
- if (saltlen < 0)
- return NULL;
+ if (saltlen < 0)
+ return NULL;
}
return rsa_pss_params_create(sigmd, mgf1md, saltlen);
diff --git a/contrib/libs/openssl/crypto/rsa/rsa_err.c b/contrib/libs/openssl/crypto/rsa/rsa_err.c
index 0687c1e626..c89243891f 100644
--- a/contrib/libs/openssl/crypto/rsa/rsa_err.c
+++ b/contrib/libs/openssl/crypto/rsa/rsa_err.c
@@ -1,6 +1,6 @@
/*
* Generated by util/mkerr.pl DO NOT EDIT
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -174,8 +174,8 @@ static const ERR_STRING_DATA RSA_str_reasons[] = {
{ERR_PACK(ERR_LIB_RSA, 0, RSA_R_LAST_OCTET_INVALID), "last octet invalid"},
{ERR_PACK(ERR_LIB_RSA, 0, RSA_R_MGF1_DIGEST_NOT_ALLOWED),
"mgf1 digest not allowed"},
- {ERR_PACK(ERR_LIB_RSA, 0, RSA_R_MISSING_PRIVATE_KEY),
- "missing private key"},
+ {ERR_PACK(ERR_LIB_RSA, 0, RSA_R_MISSING_PRIVATE_KEY),
+ "missing private key"},
{ERR_PACK(ERR_LIB_RSA, 0, RSA_R_MODULUS_TOO_LARGE), "modulus too large"},
{ERR_PACK(ERR_LIB_RSA, 0, RSA_R_MP_COEFFICIENT_NOT_INVERSE_OF_R),
"mp coefficient not inverse of r"},
diff --git a/contrib/libs/openssl/crypto/rsa/rsa_gen.c b/contrib/libs/openssl/crypto/rsa/rsa_gen.c
index 29056a62a1..b6a349461a 100644
--- a/contrib/libs/openssl/crypto/rsa/rsa_gen.c
+++ b/contrib/libs/openssl/crypto/rsa/rsa_gen.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -250,7 +250,7 @@ static int rsa_builtin_keygen(RSA *rsa, int bits, int primes, BIGNUM *e_value,
*
* This strategy has the following goals:
*
- * 1. 1024-bit factors are efficient when using 3072 and 4096-bit key
+ * 1. 1024-bit factors are efficient when using 3072 and 4096-bit key
* 2. stay the same logic with normal 2-prime key
*/
bitse -= bitsr[i];
@@ -387,7 +387,7 @@ static int rsa_builtin_keygen(RSA *rsa, int bits, int primes, BIGNUM *e_value,
RSAerr(RSA_F_RSA_BUILTIN_KEYGEN, ERR_LIB_BN);
ok = 0;
}
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(ctx);
return ok;
}
diff --git a/contrib/libs/openssl/crypto/rsa/rsa_lib.c b/contrib/libs/openssl/crypto/rsa/rsa_lib.c
index 63fd1a6db4..231dcc139d 100644
--- a/contrib/libs/openssl/crypto/rsa/rsa_lib.c
+++ b/contrib/libs/openssl/crypto/rsa/rsa_lib.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -198,7 +198,7 @@ int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d)
if (d != NULL) {
BN_clear_free(r->d);
r->d = d;
- BN_set_flags(r->d, BN_FLG_CONSTTIME);
+ BN_set_flags(r->d, BN_FLG_CONSTTIME);
}
return 1;
@@ -216,12 +216,12 @@ int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q)
if (p != NULL) {
BN_clear_free(r->p);
r->p = p;
- BN_set_flags(r->p, BN_FLG_CONSTTIME);
+ BN_set_flags(r->p, BN_FLG_CONSTTIME);
}
if (q != NULL) {
BN_clear_free(r->q);
r->q = q;
- BN_set_flags(r->q, BN_FLG_CONSTTIME);
+ BN_set_flags(r->q, BN_FLG_CONSTTIME);
}
return 1;
@@ -240,17 +240,17 @@ int RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp)
if (dmp1 != NULL) {
BN_clear_free(r->dmp1);
r->dmp1 = dmp1;
- BN_set_flags(r->dmp1, BN_FLG_CONSTTIME);
+ BN_set_flags(r->dmp1, BN_FLG_CONSTTIME);
}
if (dmq1 != NULL) {
BN_clear_free(r->dmq1);
r->dmq1 = dmq1;
- BN_set_flags(r->dmq1, BN_FLG_CONSTTIME);
+ BN_set_flags(r->dmq1, BN_FLG_CONSTTIME);
}
if (iqmp != NULL) {
BN_clear_free(r->iqmp);
r->iqmp = iqmp;
- BN_set_flags(r->iqmp, BN_FLG_CONSTTIME);
+ BN_set_flags(r->iqmp, BN_FLG_CONSTTIME);
}
return 1;
@@ -282,15 +282,15 @@ int RSA_set0_multi_prime_params(RSA *r, BIGNUM *primes[], BIGNUM *exps[],
if (pinfo == NULL)
goto err;
if (primes[i] != NULL && exps[i] != NULL && coeffs[i] != NULL) {
- BN_clear_free(pinfo->r);
- BN_clear_free(pinfo->d);
- BN_clear_free(pinfo->t);
+ BN_clear_free(pinfo->r);
+ BN_clear_free(pinfo->d);
+ BN_clear_free(pinfo->t);
pinfo->r = primes[i];
pinfo->d = exps[i];
pinfo->t = coeffs[i];
- BN_set_flags(pinfo->r, BN_FLG_CONSTTIME);
- BN_set_flags(pinfo->d, BN_FLG_CONSTTIME);
- BN_set_flags(pinfo->t, BN_FLG_CONSTTIME);
+ BN_set_flags(pinfo->r, BN_FLG_CONSTTIME);
+ BN_set_flags(pinfo->d, BN_FLG_CONSTTIME);
+ BN_set_flags(pinfo->t, BN_FLG_CONSTTIME);
} else {
rsa_multip_info_free(pinfo);
goto err;
diff --git a/contrib/libs/openssl/crypto/rsa/rsa_oaep.c b/contrib/libs/openssl/crypto/rsa/rsa_oaep.c
index 302360a964..ab93a61e3f 100644
--- a/contrib/libs/openssl/crypto/rsa/rsa_oaep.c
+++ b/contrib/libs/openssl/crypto/rsa/rsa_oaep.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1999-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1999-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -143,7 +143,7 @@ int RSA_padding_check_PKCS1_OAEP_mgf1(unsigned char *to, int tlen,
* |num| is the length of the modulus; |flen| is the length of the
* encoded message. Therefore, for any |from| that was obtained by
* decrypting a ciphertext, we must have |flen| <= |num|. Similarly,
- * |num| >= 2 * |mdlen| + 2 must hold for the modulus irrespective of
+ * |num| >= 2 * |mdlen| + 2 must hold for the modulus irrespective of
* the ciphertext, see PKCS #1 v2.2, section 7.1.2.
* This does not leak any side-channel information.
*/
@@ -185,10 +185,10 @@ int RSA_padding_check_PKCS1_OAEP_mgf1(unsigned char *to, int tlen,
* true. See James H. Manger, "A Chosen Ciphertext Attack on RSA
* Optimal Asymmetric Encryption Padding (OAEP) [...]", CRYPTO 2001).
*/
- good = constant_time_is_zero(em[0]);
+ good = constant_time_is_zero(em[0]);
- maskedseed = em + 1;
- maskeddb = em + 1 + mdlen;
+ maskedseed = em + 1;
+ maskeddb = em + 1 + mdlen;
if (PKCS1_MGF1(seed, mdlen, maskeddb, dblen, mgf1md))
goto cleanup;
@@ -229,31 +229,31 @@ int RSA_padding_check_PKCS1_OAEP_mgf1(unsigned char *to, int tlen,
mlen = dblen - msg_index;
/*
- * For good measure, do this check in constant time as well.
+ * For good measure, do this check in constant time as well.
*/
good &= constant_time_ge(tlen, mlen);
/*
- * Move the result in-place by |dblen|-|mdlen|-1-|mlen| bytes to the left.
- * Then if |good| move |mlen| bytes from |db|+|mdlen|+1 to |to|.
- * Otherwise leave |to| unchanged.
- * Copy the memory back in a way that does not reveal the size of
- * the data being copied via a timing side channel. This requires copying
- * parts of the buffer multiple times based on the bits set in the real
- * length. Clear bits do a non-copy with identical access pattern.
- * The loop below has overall complexity of O(N*log(N)).
+ * Move the result in-place by |dblen|-|mdlen|-1-|mlen| bytes to the left.
+ * Then if |good| move |mlen| bytes from |db|+|mdlen|+1 to |to|.
+ * Otherwise leave |to| unchanged.
+ * Copy the memory back in a way that does not reveal the size of
+ * the data being copied via a timing side channel. This requires copying
+ * parts of the buffer multiple times based on the bits set in the real
+ * length. Clear bits do a non-copy with identical access pattern.
+ * The loop below has overall complexity of O(N*log(N)).
*/
- tlen = constant_time_select_int(constant_time_lt(dblen - mdlen - 1, tlen),
- dblen - mdlen - 1, tlen);
- for (msg_index = 1; msg_index < dblen - mdlen - 1; msg_index <<= 1) {
- mask = ~constant_time_eq(msg_index & (dblen - mdlen - 1 - mlen), 0);
- for (i = mdlen + 1; i < dblen - msg_index; i++)
- db[i] = constant_time_select_8(mask, db[i + msg_index], db[i]);
- }
- for (i = 0; i < tlen; i++) {
- mask = good & constant_time_lt(i, mlen);
- to[i] = constant_time_select_8(mask, db[i + mdlen + 1], to[i]);
+ tlen = constant_time_select_int(constant_time_lt(dblen - mdlen - 1, tlen),
+ dblen - mdlen - 1, tlen);
+ for (msg_index = 1; msg_index < dblen - mdlen - 1; msg_index <<= 1) {
+ mask = ~constant_time_eq(msg_index & (dblen - mdlen - 1 - mlen), 0);
+ for (i = mdlen + 1; i < dblen - msg_index; i++)
+ db[i] = constant_time_select_8(mask, db[i + msg_index], db[i]);
}
+ for (i = 0; i < tlen; i++) {
+ mask = good & constant_time_lt(i, mlen);
+ to[i] = constant_time_select_8(mask, db[i + mdlen + 1], to[i]);
+ }
/*
* To avoid chosen ciphertext attacks, the error message should not
diff --git a/contrib/libs/openssl/crypto/rsa/rsa_ossl.c b/contrib/libs/openssl/crypto/rsa/rsa_ossl.c
index b52a66f6a6..f8b3a2f2d9 100644
--- a/contrib/libs/openssl/crypto/rsa/rsa_ossl.c
+++ b/contrib/libs/openssl/crypto/rsa/rsa_ossl.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -148,7 +148,7 @@ static int rsa_ossl_public_encrypt(int flen, const unsigned char *from,
*/
r = BN_bn2binpad(ret, to, num);
err:
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(ctx);
OPENSSL_clear_free(buf, num);
return r;
@@ -321,11 +321,11 @@ static int rsa_ossl_private_encrypt(int flen, const unsigned char *from,
RSAerr(RSA_F_RSA_OSSL_PRIVATE_ENCRYPT, ERR_R_MALLOC_FAILURE);
goto err;
}
- if (rsa->d == NULL) {
- RSAerr(RSA_F_RSA_OSSL_PRIVATE_ENCRYPT, RSA_R_MISSING_PRIVATE_KEY);
- BN_free(d);
- goto err;
- }
+ if (rsa->d == NULL) {
+ RSAerr(RSA_F_RSA_OSSL_PRIVATE_ENCRYPT, RSA_R_MISSING_PRIVATE_KEY);
+ BN_free(d);
+ goto err;
+ }
BN_with_flags(d, rsa->d, BN_FLG_CONSTTIME);
if (!rsa->meth->bn_mod_exp(ret, f, d, rsa->n, ctx,
@@ -358,7 +358,7 @@ static int rsa_ossl_private_encrypt(int flen, const unsigned char *from,
*/
r = BN_bn2binpad(res, to, num);
err:
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(ctx);
OPENSSL_clear_free(buf, num);
return r;
@@ -443,11 +443,11 @@ static int rsa_ossl_private_decrypt(int flen, const unsigned char *from,
RSAerr(RSA_F_RSA_OSSL_PRIVATE_DECRYPT, ERR_R_MALLOC_FAILURE);
goto err;
}
- if (rsa->d == NULL) {
- RSAerr(RSA_F_RSA_OSSL_PRIVATE_DECRYPT, RSA_R_MISSING_PRIVATE_KEY);
- BN_free(d);
- goto err;
- }
+ if (rsa->d == NULL) {
+ RSAerr(RSA_F_RSA_OSSL_PRIVATE_DECRYPT, RSA_R_MISSING_PRIVATE_KEY);
+ BN_free(d);
+ goto err;
+ }
BN_with_flags(d, rsa->d, BN_FLG_CONSTTIME);
if (rsa->flags & RSA_FLAG_CACHE_PUBLIC)
@@ -489,10 +489,10 @@ static int rsa_ossl_private_decrypt(int flen, const unsigned char *from,
goto err;
}
RSAerr(RSA_F_RSA_OSSL_PRIVATE_DECRYPT, RSA_R_PADDING_CHECK_FAILED);
- err_clear_last_constant_time(1 & ~constant_time_msb(r));
+ err_clear_last_constant_time(1 & ~constant_time_msb(r));
err:
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(ctx);
OPENSSL_clear_free(buf, num);
return r;
@@ -588,7 +588,7 @@ static int rsa_ossl_public_decrypt(int flen, const unsigned char *from,
RSAerr(RSA_F_RSA_OSSL_PUBLIC_DECRYPT, RSA_R_PADDING_CHECK_FAILED);
err:
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(ctx);
OPENSSL_clear_free(buf, num);
return r;
diff --git a/contrib/libs/openssl/crypto/rsa/rsa_pk1.c b/contrib/libs/openssl/crypto/rsa/rsa_pk1.c
index a3d0b7cef8..9cd04dd156 100644
--- a/contrib/libs/openssl/crypto/rsa/rsa_pk1.c
+++ b/contrib/libs/openssl/crypto/rsa/rsa_pk1.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -193,13 +193,13 @@ int RSA_padding_check_PKCS1_type_2(unsigned char *to, int tlen,
*--em = *from & mask;
}
- good = constant_time_is_zero(em[0]);
- good &= constant_time_eq(em[1], 2);
+ good = constant_time_is_zero(em[0]);
+ good &= constant_time_eq(em[1], 2);
/* scan over padding data */
found_zero_byte = 0;
for (i = 2; i < num; i++) {
- unsigned int equals0 = constant_time_is_zero(em[i]);
+ unsigned int equals0 = constant_time_is_zero(em[i]);
zero_index = constant_time_select_int(~found_zero_byte & equals0,
i, zero_index);
@@ -207,7 +207,7 @@ int RSA_padding_check_PKCS1_type_2(unsigned char *to, int tlen,
}
/*
- * PS must be at least 8 bytes long, and it starts two bytes into |em|.
+ * PS must be at least 8 bytes long, and it starts two bytes into |em|.
* If we never found a 0-byte, then |zero_index| is 0 and the check
* also fails.
*/
@@ -228,24 +228,24 @@ int RSA_padding_check_PKCS1_type_2(unsigned char *to, int tlen,
/*
* Move the result in-place by |num|-RSA_PKCS1_PADDING_SIZE-|mlen| bytes to the left.
* Then if |good| move |mlen| bytes from |em|+RSA_PKCS1_PADDING_SIZE to |to|.
- * Otherwise leave |to| unchanged.
- * Copy the memory back in a way that does not reveal the size of
- * the data being copied via a timing side channel. This requires copying
- * parts of the buffer multiple times based on the bits set in the real
- * length. Clear bits do a non-copy with identical access pattern.
- * The loop below has overall complexity of O(N*log(N)).
+ * Otherwise leave |to| unchanged.
+ * Copy the memory back in a way that does not reveal the size of
+ * the data being copied via a timing side channel. This requires copying
+ * parts of the buffer multiple times based on the bits set in the real
+ * length. Clear bits do a non-copy with identical access pattern.
+ * The loop below has overall complexity of O(N*log(N)).
*/
tlen = constant_time_select_int(constant_time_lt(num - RSA_PKCS1_PADDING_SIZE, tlen),
num - RSA_PKCS1_PADDING_SIZE, tlen);
for (msg_index = 1; msg_index < num - RSA_PKCS1_PADDING_SIZE; msg_index <<= 1) {
mask = ~constant_time_eq(msg_index & (num - RSA_PKCS1_PADDING_SIZE - mlen), 0);
for (i = RSA_PKCS1_PADDING_SIZE; i < num - msg_index; i++)
- em[i] = constant_time_select_8(mask, em[i + msg_index], em[i]);
+ em[i] = constant_time_select_8(mask, em[i + msg_index], em[i]);
}
- for (i = 0; i < tlen; i++) {
- mask = good & constant_time_lt(i, mlen);
+ for (i = 0; i < tlen; i++) {
+ mask = good & constant_time_lt(i, mlen);
to[i] = constant_time_select_8(mask, em[i + RSA_PKCS1_PADDING_SIZE], to[i]);
- }
+ }
OPENSSL_clear_free(em, num);
RSAerr(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2, RSA_R_PKCS_DECODING_ERROR);
diff --git a/contrib/libs/openssl/crypto/rsa/rsa_pmeth.c b/contrib/libs/openssl/crypto/rsa/rsa_pmeth.c
index 0eb21c8af9..202b70867d 100644
--- a/contrib/libs/openssl/crypto/rsa/rsa_pmeth.c
+++ b/contrib/libs/openssl/crypto/rsa/rsa_pmeth.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2006-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2006-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -8,7 +8,7 @@
*/
#include "internal/constant_time.h"
-
+
#include <stdio.h>
#include "internal/cryptlib.h"
#include <openssl/asn1t.h>
@@ -56,7 +56,7 @@ static int pkey_rsa_init(EVP_PKEY_CTX *ctx)
if (rctx == NULL)
return 0;
- rctx->nbits = 2048;
+ rctx->nbits = 2048;
rctx->primes = RSA_DEFAULT_PRIME_NUM;
if (pkey_ctx_is_pss(ctx))
rctx->pad_mode = RSA_PKCS1_PSS_PADDING;
@@ -342,9 +342,9 @@ static int pkey_rsa_decrypt(EVP_PKEY_CTX *ctx,
ret = RSA_private_decrypt(inlen, in, out, ctx->pkey->pkey.rsa,
rctx->pad_mode);
}
- *outlen = constant_time_select_s(constant_time_msb_s(ret), *outlen, ret);
- ret = constant_time_select_int(constant_time_msb(ret), ret, 1);
- return ret;
+ *outlen = constant_time_select_s(constant_time_msb_s(ret), *outlen, ret);
+ ret = constant_time_select_int(constant_time_msb(ret), ret, 1);
+ return ret;
}
static int check_padding_md(const EVP_MD *md, int padding)
diff --git a/contrib/libs/openssl/crypto/rsa/rsa_ssl.c b/contrib/libs/openssl/crypto/rsa/rsa_ssl.c
index e1c755ae46..4d72145922 100644
--- a/contrib/libs/openssl/crypto/rsa/rsa_ssl.c
+++ b/contrib/libs/openssl/crypto/rsa/rsa_ssl.c
@@ -67,9 +67,9 @@ int RSA_padding_check_SSLv23(unsigned char *to, int tlen,
unsigned int good, found_zero_byte, mask, threes_in_row;
int zero_index = 0, msg_index, mlen = -1, err;
- if (tlen <= 0 || flen <= 0)
- return -1;
-
+ if (tlen <= 0 || flen <= 0)
+ return -1;
+
if (flen > num || num < RSA_PKCS1_PADDING_SIZE) {
RSAerr(RSA_F_RSA_PADDING_CHECK_SSLV23, RSA_R_DATA_TOO_SMALL);
return -1;
@@ -93,8 +93,8 @@ int RSA_padding_check_SSLv23(unsigned char *to, int tlen,
*--em = *from & mask;
}
- good = constant_time_is_zero(em[0]);
- good &= constant_time_eq(em[1], 2);
+ good = constant_time_is_zero(em[0]);
+ good &= constant_time_eq(em[1], 2);
err = constant_time_select_int(good, 0, RSA_R_BLOCK_TYPE_IS_NOT_02);
mask = ~good;
@@ -102,18 +102,18 @@ int RSA_padding_check_SSLv23(unsigned char *to, int tlen,
found_zero_byte = 0;
threes_in_row = 0;
for (i = 2; i < num; i++) {
- unsigned int equals0 = constant_time_is_zero(em[i]);
+ unsigned int equals0 = constant_time_is_zero(em[i]);
zero_index = constant_time_select_int(~found_zero_byte & equals0,
i, zero_index);
found_zero_byte |= equals0;
threes_in_row += 1 & ~found_zero_byte;
- threes_in_row &= found_zero_byte | constant_time_eq(em[i], 3);
+ threes_in_row &= found_zero_byte | constant_time_eq(em[i], 3);
}
/*
- * PS must be at least 8 bytes long, and it starts two bytes into |em|.
+ * PS must be at least 8 bytes long, and it starts two bytes into |em|.
* If we never found a 0-byte, then |zero_index| is 0 and the check
* also fails.
*/
@@ -149,24 +149,24 @@ int RSA_padding_check_SSLv23(unsigned char *to, int tlen,
/*
* Move the result in-place by |num|-RSA_PKCS1_PADDING_SIZE-|mlen| bytes to the left.
* Then if |good| move |mlen| bytes from |em|+RSA_PKCS1_PADDING_SIZE to |to|.
- * Otherwise leave |to| unchanged.
- * Copy the memory back in a way that does not reveal the size of
- * the data being copied via a timing side channel. This requires copying
- * parts of the buffer multiple times based on the bits set in the real
- * length. Clear bits do a non-copy with identical access pattern.
- * The loop below has overall complexity of O(N*log(N)).
+ * Otherwise leave |to| unchanged.
+ * Copy the memory back in a way that does not reveal the size of
+ * the data being copied via a timing side channel. This requires copying
+ * parts of the buffer multiple times based on the bits set in the real
+ * length. Clear bits do a non-copy with identical access pattern.
+ * The loop below has overall complexity of O(N*log(N)).
*/
tlen = constant_time_select_int(constant_time_lt(num - RSA_PKCS1_PADDING_SIZE, tlen),
num - RSA_PKCS1_PADDING_SIZE, tlen);
for (msg_index = 1; msg_index < num - RSA_PKCS1_PADDING_SIZE; msg_index <<= 1) {
mask = ~constant_time_eq(msg_index & (num - RSA_PKCS1_PADDING_SIZE - mlen), 0);
for (i = RSA_PKCS1_PADDING_SIZE; i < num - msg_index; i++)
- em[i] = constant_time_select_8(mask, em[i + msg_index], em[i]);
+ em[i] = constant_time_select_8(mask, em[i + msg_index], em[i]);
}
- for (i = 0; i < tlen; i++) {
- mask = good & constant_time_lt(i, mlen);
+ for (i = 0; i < tlen; i++) {
+ mask = good & constant_time_lt(i, mlen);
to[i] = constant_time_select_8(mask, em[i + RSA_PKCS1_PADDING_SIZE], to[i]);
- }
+ }
OPENSSL_clear_free(em, num);
RSAerr(RSA_F_RSA_PADDING_CHECK_SSLV23, err);
diff --git a/contrib/libs/openssl/crypto/rsa/rsa_x931g.c b/contrib/libs/openssl/crypto/rsa/rsa_x931g.c
index 322cd14a84..702633f62b 100644
--- a/contrib/libs/openssl/crypto/rsa/rsa_x931g.c
+++ b/contrib/libs/openssl/crypto/rsa/rsa_x931g.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -133,7 +133,7 @@ int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1,
ret = 1;
err:
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(ctx);
BN_CTX_free(ctx2);
@@ -187,7 +187,7 @@ int RSA_X931_generate_key_ex(RSA *rsa, int bits, const BIGNUM *e,
ok = 1;
error:
- BN_CTX_end(ctx);
+ BN_CTX_end(ctx);
BN_CTX_free(ctx);
if (ok)
diff --git a/contrib/libs/openssl/crypto/s390xcap.c b/contrib/libs/openssl/crypto/s390xcap.c
index 5d58b2d807..36541f061d 100644
--- a/contrib/libs/openssl/crypto/s390xcap.c
+++ b/contrib/libs/openssl/crypto/s390xcap.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2010-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2010-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -29,7 +29,7 @@ struct OPENSSL_s390xcap_st OPENSSL_s390xcap_P;
void OPENSSL_cpuid_setup(void)
{
sigset_t oset;
- struct sigaction ill_act, oact_ill, oact_fpe;
+ struct sigaction ill_act, oact_ill, oact_fpe;
if (OPENSSL_s390xcap_P.stfle[0])
return;
@@ -44,8 +44,8 @@ void OPENSSL_cpuid_setup(void)
sigdelset(&ill_act.sa_mask, SIGFPE);
sigdelset(&ill_act.sa_mask, SIGTRAP);
sigprocmask(SIG_SETMASK, &ill_act.sa_mask, &oset);
- sigaction(SIGILL, &ill_act, &oact_ill);
- sigaction(SIGFPE, &ill_act, &oact_fpe);
+ sigaction(SIGILL, &ill_act, &oact_ill);
+ sigaction(SIGFPE, &ill_act, &oact_fpe);
/* protection against missing store-facility-list-extended */
if (sigsetjmp(ill_jmp, 1) == 0)
@@ -61,7 +61,7 @@ void OPENSSL_cpuid_setup(void)
| S390X_CAPBIT(S390X_VXE));
}
- sigaction(SIGFPE, &oact_fpe, NULL);
- sigaction(SIGILL, &oact_ill, NULL);
+ sigaction(SIGFPE, &oact_fpe, NULL);
+ sigaction(SIGILL, &oact_ill, NULL);
sigprocmask(SIG_SETMASK, &oset, NULL);
}
diff --git a/contrib/libs/openssl/crypto/sha/keccak1600.c b/contrib/libs/openssl/crypto/sha/keccak1600.c
index 55a44023d5..d04b2bf531 100644
--- a/contrib/libs/openssl/crypto/sha/keccak1600.c
+++ b/contrib/libs/openssl/crypto/sha/keccak1600.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2016-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2016-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -78,30 +78,30 @@ static const unsigned char rhotates[5][5] = {
};
static const uint64_t iotas[] = {
- BIT_INTERLEAVE ? 0x0000000000000001ULL : 0x0000000000000001ULL,
- BIT_INTERLEAVE ? 0x0000008900000000ULL : 0x0000000000008082ULL,
- BIT_INTERLEAVE ? 0x8000008b00000000ULL : 0x800000000000808aULL,
- BIT_INTERLEAVE ? 0x8000808000000000ULL : 0x8000000080008000ULL,
- BIT_INTERLEAVE ? 0x0000008b00000001ULL : 0x000000000000808bULL,
- BIT_INTERLEAVE ? 0x0000800000000001ULL : 0x0000000080000001ULL,
- BIT_INTERLEAVE ? 0x8000808800000001ULL : 0x8000000080008081ULL,
- BIT_INTERLEAVE ? 0x8000008200000001ULL : 0x8000000000008009ULL,
- BIT_INTERLEAVE ? 0x0000000b00000000ULL : 0x000000000000008aULL,
- BIT_INTERLEAVE ? 0x0000000a00000000ULL : 0x0000000000000088ULL,
- BIT_INTERLEAVE ? 0x0000808200000001ULL : 0x0000000080008009ULL,
- BIT_INTERLEAVE ? 0x0000800300000000ULL : 0x000000008000000aULL,
- BIT_INTERLEAVE ? 0x0000808b00000001ULL : 0x000000008000808bULL,
- BIT_INTERLEAVE ? 0x8000000b00000001ULL : 0x800000000000008bULL,
- BIT_INTERLEAVE ? 0x8000008a00000001ULL : 0x8000000000008089ULL,
- BIT_INTERLEAVE ? 0x8000008100000001ULL : 0x8000000000008003ULL,
- BIT_INTERLEAVE ? 0x8000008100000000ULL : 0x8000000000008002ULL,
- BIT_INTERLEAVE ? 0x8000000800000000ULL : 0x8000000000000080ULL,
- BIT_INTERLEAVE ? 0x0000008300000000ULL : 0x000000000000800aULL,
- BIT_INTERLEAVE ? 0x8000800300000000ULL : 0x800000008000000aULL,
- BIT_INTERLEAVE ? 0x8000808800000001ULL : 0x8000000080008081ULL,
- BIT_INTERLEAVE ? 0x8000008800000000ULL : 0x8000000000008080ULL,
- BIT_INTERLEAVE ? 0x0000800000000001ULL : 0x0000000080000001ULL,
- BIT_INTERLEAVE ? 0x8000808200000000ULL : 0x8000000080008008ULL
+ BIT_INTERLEAVE ? 0x0000000000000001ULL : 0x0000000000000001ULL,
+ BIT_INTERLEAVE ? 0x0000008900000000ULL : 0x0000000000008082ULL,
+ BIT_INTERLEAVE ? 0x8000008b00000000ULL : 0x800000000000808aULL,
+ BIT_INTERLEAVE ? 0x8000808000000000ULL : 0x8000000080008000ULL,
+ BIT_INTERLEAVE ? 0x0000008b00000001ULL : 0x000000000000808bULL,
+ BIT_INTERLEAVE ? 0x0000800000000001ULL : 0x0000000080000001ULL,
+ BIT_INTERLEAVE ? 0x8000808800000001ULL : 0x8000000080008081ULL,
+ BIT_INTERLEAVE ? 0x8000008200000001ULL : 0x8000000000008009ULL,
+ BIT_INTERLEAVE ? 0x0000000b00000000ULL : 0x000000000000008aULL,
+ BIT_INTERLEAVE ? 0x0000000a00000000ULL : 0x0000000000000088ULL,
+ BIT_INTERLEAVE ? 0x0000808200000001ULL : 0x0000000080008009ULL,
+ BIT_INTERLEAVE ? 0x0000800300000000ULL : 0x000000008000000aULL,
+ BIT_INTERLEAVE ? 0x0000808b00000001ULL : 0x000000008000808bULL,
+ BIT_INTERLEAVE ? 0x8000000b00000001ULL : 0x800000000000008bULL,
+ BIT_INTERLEAVE ? 0x8000008a00000001ULL : 0x8000000000008089ULL,
+ BIT_INTERLEAVE ? 0x8000008100000001ULL : 0x8000000000008003ULL,
+ BIT_INTERLEAVE ? 0x8000008100000000ULL : 0x8000000000008002ULL,
+ BIT_INTERLEAVE ? 0x8000000800000000ULL : 0x8000000000000080ULL,
+ BIT_INTERLEAVE ? 0x0000008300000000ULL : 0x000000000000800aULL,
+ BIT_INTERLEAVE ? 0x8000800300000000ULL : 0x800000008000000aULL,
+ BIT_INTERLEAVE ? 0x8000808800000001ULL : 0x8000000080008081ULL,
+ BIT_INTERLEAVE ? 0x8000008800000000ULL : 0x8000000000008080ULL,
+ BIT_INTERLEAVE ? 0x0000800000000001ULL : 0x0000000080000001ULL,
+ BIT_INTERLEAVE ? 0x8000808200000000ULL : 0x8000000080008008ULL
};
#if defined(KECCAK_REF)
diff --git a/contrib/libs/openssl/crypto/sm2/sm2_sign.c b/contrib/libs/openssl/crypto/sm2/sm2_sign.c
index 683f03f935..f560f8b1f9 100644
--- a/contrib/libs/openssl/crypto/sm2/sm2_sign.c
+++ b/contrib/libs/openssl/crypto/sm2/sm2_sign.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
* Copyright 2017 Ribose Inc. All Rights Reserved.
* Ported from Ribose contributions from Botan.
*
@@ -313,12 +313,12 @@ static int sm2_sig_verify(const EC_KEY *key, const ECDSA_SIG *sig,
/*
* B1: verify whether r' in [1,n-1], verification failed if not
- * B2: verify whether s' in [1,n-1], verification failed if not
+ * B2: verify whether s' in [1,n-1], verification failed if not
* B3: set M'~=ZA || M'
* B4: calculate e'=Hv(M'~)
* B5: calculate t = (r' + s') modn, verification failed if t=0
* B6: calculate the point (x1', y1')=[s']G + [t]PA
- * B7: calculate R=(e'+x1') modn, verification pass if yes, otherwise failed
+ * B7: calculate R=(e'+x1') modn, verification pass if yes, otherwise failed
*/
ECDSA_SIG_get0(sig, &r, &s);
diff --git a/contrib/libs/openssl/crypto/store/loader_file.c b/contrib/libs/openssl/crypto/store/loader_file.c
index 32e7b9f65a..b3ab8b8017 100644
--- a/contrib/libs/openssl/crypto/store/loader_file.c
+++ b/contrib/libs/openssl/crypto/store/loader_file.c
@@ -172,7 +172,7 @@ typedef OSSL_STORE_INFO *(*file_try_decode_fn)(const char *pem_name,
typedef int (*file_eof_fn)(void *handler_ctx);
/*
* The destroy_ctx function is used to destroy the handler_ctx that was
- * initiated by a repeatable try_decode function. This is only used when
+ * initiated by a repeatable try_decode function. This is only used when
* the handler is marked repeatable.
*/
typedef void (*file_destroy_ctx_fn)(void **handler_ctx);
@@ -507,7 +507,7 @@ static FILE_HANDLER PrivateKey_handler = {
};
/*
- * Public key decoder. Only supports SubjectPublicKeyInfo formatted keys.
+ * Public key decoder. Only supports SubjectPublicKeyInfo formatted keys.
*/
static OSSL_STORE_INFO *try_decode_PUBKEY(const char *pem_name,
const char *pem_header,
@@ -897,10 +897,10 @@ static OSSL_STORE_LOADER_CTX *file_open(const OSSL_STORE_LOADER *loader,
if (ctx->_.dir.last_entry == NULL) {
if (ctx->_.dir.last_errno != 0) {
char errbuf[256];
- OSSL_STOREerr(OSSL_STORE_F_FILE_OPEN, ERR_R_SYS_LIB);
+ OSSL_STOREerr(OSSL_STORE_F_FILE_OPEN, ERR_R_SYS_LIB);
errno = ctx->_.dir.last_errno;
- if (openssl_strerror_r(errno, errbuf, sizeof(errbuf)))
- ERR_add_error_data(1, errbuf);
+ if (openssl_strerror_r(errno, errbuf, sizeof(errbuf)))
+ ERR_add_error_data(1, errbuf);
goto err;
}
ctx->_.dir.end_reached = 1;
@@ -1297,11 +1297,11 @@ static OSSL_STORE_INFO *file_load(OSSL_STORE_LOADER_CTX *ctx,
if (!ctx->_.dir.end_reached) {
char errbuf[256];
assert(ctx->_.dir.last_errno != 0);
- OSSL_STOREerr(OSSL_STORE_F_FILE_LOAD, ERR_R_SYS_LIB);
+ OSSL_STOREerr(OSSL_STORE_F_FILE_LOAD, ERR_R_SYS_LIB);
errno = ctx->_.dir.last_errno;
ctx->errcnt++;
- if (openssl_strerror_r(errno, errbuf, sizeof(errbuf)))
- ERR_add_error_data(1, errbuf);
+ if (openssl_strerror_r(errno, errbuf, sizeof(errbuf)))
+ ERR_add_error_data(1, errbuf);
}
return NULL;
}
diff --git a/contrib/libs/openssl/crypto/store/store_lib.c b/contrib/libs/openssl/crypto/store/store_lib.c
index fb71f84725..a2a9d58404 100644
--- a/contrib/libs/openssl/crypto/store/store_lib.c
+++ b/contrib/libs/openssl/crypto/store/store_lib.c
@@ -232,7 +232,7 @@ int OSSL_STORE_close(OSSL_STORE_CTX *ctx)
* Functions to generate OSSL_STORE_INFOs, one function for each type we
* support having in them as well as a generic constructor.
*
- * In all cases, ownership of the object is transferred to the OSSL_STORE_INFO
+ * In all cases, ownership of the object is transferred to the OSSL_STORE_INFO
* and will therefore be freed when the OSSL_STORE_INFO is freed.
*/
static OSSL_STORE_INFO *store_info_new(int type, void *data)
diff --git a/contrib/libs/openssl/crypto/threads_none.c b/contrib/libs/openssl/crypto/threads_none.c
index aaaaae872a..a1423fe1cf 100644
--- a/contrib/libs/openssl/crypto/threads_none.c
+++ b/contrib/libs/openssl/crypto/threads_none.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2016-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2016-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -12,11 +12,11 @@
#if !defined(OPENSSL_THREADS) || defined(CRYPTO_TDEBUG)
-# if defined(OPENSSL_SYS_UNIX)
-# include <sys/types.h>
-# include <unistd.h>
-# endif
-
+# if defined(OPENSSL_SYS_UNIX)
+# include <sys/types.h>
+# include <unistd.h>
+# endif
+
CRYPTO_RWLOCK *CRYPTO_THREAD_lock_new(void)
{
CRYPTO_RWLOCK *lock;
@@ -138,12 +138,12 @@ int openssl_init_fork_handlers(void)
return 0;
}
-int openssl_get_fork_id(void)
-{
-# if defined(OPENSSL_SYS_UNIX)
- return getpid();
-# else
+int openssl_get_fork_id(void)
+{
+# if defined(OPENSSL_SYS_UNIX)
+ return getpid();
+# else
return 0;
-# endif
-}
+# endif
+}
#endif
diff --git a/contrib/libs/openssl/crypto/threads_pthread.c b/contrib/libs/openssl/crypto/threads_pthread.c
index cca17aa406..f92e1e94ed 100644
--- a/contrib/libs/openssl/crypto/threads_pthread.c
+++ b/contrib/libs/openssl/crypto/threads_pthread.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2016-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2016-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -12,11 +12,11 @@
#if defined(OPENSSL_THREADS) && !defined(CRYPTO_TDEBUG) && !defined(OPENSSL_SYS_WINDOWS)
-# if defined(OPENSSL_SYS_UNIX)
-# include <sys/types.h>
-# include <unistd.h>
-#endif
-
+# if defined(OPENSSL_SYS_UNIX)
+# include <sys/types.h>
+# include <unistd.h>
+#endif
+
# ifdef PTHREAD_RWLOCK_INITIALIZER
# define USE_RWLOCK
# endif
@@ -202,9 +202,9 @@ int openssl_init_fork_handlers(void)
# endif
return 0;
}
-
-int openssl_get_fork_id(void)
-{
- return getpid();
-}
+
+int openssl_get_fork_id(void)
+{
+ return getpid();
+}
#endif
diff --git a/contrib/libs/openssl/crypto/threads_win.c b/contrib/libs/openssl/crypto/threads_win.c
index 83dccb84fb..9418f464aa 100644
--- a/contrib/libs/openssl/crypto/threads_win.c
+++ b/contrib/libs/openssl/crypto/threads_win.c
@@ -31,7 +31,7 @@ CRYPTO_RWLOCK *CRYPTO_THREAD_lock_new(void)
return NULL;
}
# else
- InitializeCriticalSection(lock);
+ InitializeCriticalSection(lock);
# endif
return lock;
@@ -164,8 +164,8 @@ int openssl_init_fork_handlers(void)
return 0;
}
-int openssl_get_fork_id(void)
-{
- return 0;
-}
+int openssl_get_fork_id(void)
+{
+ return 0;
+}
#endif
diff --git a/contrib/libs/openssl/crypto/ui/ui_lib.c b/contrib/libs/openssl/crypto/ui/ui_lib.c
index 49cc45057c..c04e71bf3d 100644
--- a/contrib/libs/openssl/crypto/ui/ui_lib.c
+++ b/contrib/libs/openssl/crypto/ui/ui_lib.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2001-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2001-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -500,7 +500,7 @@ int UI_process(UI *ui)
if (ui->meth->ui_flush != NULL)
switch (ui->meth->ui_flush(ui)) {
case -1: /* Interrupt/Cancel/something... */
- ui->flags &= ~UI_FLAG_REDOABLE;
+ ui->flags &= ~UI_FLAG_REDOABLE;
ok = -2;
goto err;
case 0: /* Errors */
@@ -518,7 +518,7 @@ int UI_process(UI *ui)
sk_UI_STRING_value(ui->strings,
i))) {
case -1: /* Interrupt/Cancel/something... */
- ui->flags &= ~UI_FLAG_REDOABLE;
+ ui->flags &= ~UI_FLAG_REDOABLE;
ok = -2;
goto err;
case 0: /* Errors */
diff --git a/contrib/libs/openssl/crypto/ui/ui_openssl.c b/contrib/libs/openssl/crypto/ui/ui_openssl.c
index 9526c16536..d36610848c 100644
--- a/contrib/libs/openssl/crypto/ui/ui_openssl.c
+++ b/contrib/libs/openssl/crypto/ui/ui_openssl.c
@@ -79,7 +79,7 @@
* systems that require something different.
*
* Note: we do not use SGTTY unless it's defined by the configuration. We
- * may eventually opt to remove its use entirely.
+ * may eventually opt to remove its use entirely.
*/
# if !defined(TERMIOS) && !defined(TERMIO) && !defined(SGTTY)
diff --git a/contrib/libs/openssl/crypto/uid.c b/contrib/libs/openssl/crypto/uid.c
index 5e3315eeb2..800554d46e 100644
--- a/contrib/libs/openssl/crypto/uid.c
+++ b/contrib/libs/openssl/crypto/uid.c
@@ -10,20 +10,20 @@
#include <openssl/crypto.h>
#include <openssl/opensslconf.h>
-#if defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VXWORKS) || defined(OPENSSL_SYS_UEFI)
+#if defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VXWORKS) || defined(OPENSSL_SYS_UEFI)
int OPENSSL_issetugid(void)
{
- return 0;
+ return 0;
}
-#elif defined(__OpenBSD__) || (defined(__FreeBSD__) && __FreeBSD__ > 2) || defined(__DragonFly__)
-
-# include OPENSSL_UNISTD
+#elif defined(__OpenBSD__) || (defined(__FreeBSD__) && __FreeBSD__ > 2) || defined(__DragonFly__)
+# include OPENSSL_UNISTD
+
int OPENSSL_issetugid(void)
{
- return issetugid();
+ return issetugid();
}
#else
diff --git a/contrib/libs/openssl/crypto/whrlpool/wp_block.c b/contrib/libs/openssl/crypto/whrlpool/wp_block.c
index 39ad009c01..a16ded0dbb 100644
--- a/contrib/libs/openssl/crypto/whrlpool/wp_block.c
+++ b/contrib/libs/openssl/crypto/whrlpool/wp_block.c
@@ -101,7 +101,7 @@ typedef u64 u64_aX;
#ifndef PEDANTIC
# if defined(_MSC_VER)
# if defined(_WIN64) /* applies to both IA-64 and AMD64 */
-# include <stdlib.h>
+# include <stdlib.h>
# pragma intrinsic(_rotl64)
# define ROTATE(a,n) _rotl64((a),n)
# endif
diff --git a/contrib/libs/openssl/crypto/x509/by_dir.c b/contrib/libs/openssl/crypto/x509/by_dir.c
index 238c2519a6..120bcbd419 100644
--- a/contrib/libs/openssl/crypto/x509/by_dir.c
+++ b/contrib/libs/openssl/crypto/x509/by_dir.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -327,10 +327,10 @@ static int get_cert_by_subject(X509_LOOKUP *xl, X509_LOOKUP_TYPE type,
/*
* we have added it to the cache so now pull it out again
*/
- X509_STORE_lock(xl->store_ctx);
+ X509_STORE_lock(xl->store_ctx);
j = sk_X509_OBJECT_find(xl->store_ctx->objs, &stmp);
tmp = sk_X509_OBJECT_value(xl->store_ctx->objs, j);
- X509_STORE_unlock(xl->store_ctx);
+ X509_STORE_unlock(xl->store_ctx);
/* If a CRL, update the last file suffix added for this */
diff --git a/contrib/libs/openssl/crypto/x509/t_req.c b/contrib/libs/openssl/crypto/x509/t_req.c
index dc3b4f262d..040c4cd9d0 100644
--- a/contrib/libs/openssl/crypto/x509/t_req.c
+++ b/contrib/libs/openssl/crypto/x509/t_req.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -127,10 +127,10 @@ int X509_REQ_print_ex(BIO *bp, X509_REQ *x, unsigned long nmflags,
if ((j = i2a_ASN1_OBJECT(bp, aobj)) > 0) {
ii = 0;
count = X509_ATTRIBUTE_count(a);
- if (count == 0) {
- X509err(X509_F_X509_REQ_PRINT_EX, X509_R_INVALID_ATTRIBUTES);
- return 0;
- }
+ if (count == 0) {
+ X509err(X509_F_X509_REQ_PRINT_EX, X509_R_INVALID_ATTRIBUTES);
+ return 0;
+ }
get_next:
at = X509_ATTRIBUTE_get0_type(a, ii);
type = at->type;
diff --git a/contrib/libs/openssl/crypto/x509/x509_att.c b/contrib/libs/openssl/crypto/x509/x509_att.c
index cc9f9d1909..cfaaeec1f0 100644
--- a/contrib/libs/openssl/crypto/x509/x509_att.c
+++ b/contrib/libs/openssl/crypto/x509/x509_att.c
@@ -314,9 +314,9 @@ void *X509_ATTRIBUTE_get0_data(X509_ATTRIBUTE *attr, int idx,
ttmp = X509_ATTRIBUTE_get0_type(attr, idx);
if (!ttmp)
return NULL;
- if (atrtype == V_ASN1_BOOLEAN
- || atrtype == V_ASN1_NULL
- || atrtype != ASN1_TYPE_get(ttmp)) {
+ if (atrtype == V_ASN1_BOOLEAN
+ || atrtype == V_ASN1_NULL
+ || atrtype != ASN1_TYPE_get(ttmp)) {
X509err(X509_F_X509_ATTRIBUTE_GET0_DATA, X509_R_WRONG_TYPE);
return NULL;
}
diff --git a/contrib/libs/openssl/crypto/x509/x509_cmp.c b/contrib/libs/openssl/crypto/x509/x509_cmp.c
index 1d8d2d7b28..eeb11c035e 100644
--- a/contrib/libs/openssl/crypto/x509/x509_cmp.c
+++ b/contrib/libs/openssl/crypto/x509/x509_cmp.c
@@ -459,17 +459,17 @@ STACK_OF(X509) *X509_chain_up_ref(STACK_OF(X509) *chain)
STACK_OF(X509) *ret;
int i;
ret = sk_X509_dup(chain);
- if (ret == NULL)
- return NULL;
+ if (ret == NULL)
+ return NULL;
for (i = 0; i < sk_X509_num(ret); i++) {
X509 *x = sk_X509_value(ret, i);
- if (!X509_up_ref(x))
- goto err;
+ if (!X509_up_ref(x))
+ goto err;
}
return ret;
- err:
- while (i-- > 0)
- X509_free (sk_X509_value(ret, i));
- sk_X509_free(ret);
- return NULL;
+ err:
+ while (i-- > 0)
+ X509_free (sk_X509_value(ret, i));
+ sk_X509_free(ret);
+ return NULL;
}
diff --git a/contrib/libs/openssl/crypto/x509/x509_err.c b/contrib/libs/openssl/crypto/x509/x509_err.c
index bdd1e67cd3..78ad201c7f 100644
--- a/contrib/libs/openssl/crypto/x509/x509_err.c
+++ b/contrib/libs/openssl/crypto/x509/x509_err.c
@@ -124,8 +124,8 @@ static const ERR_STRING_DATA X509_str_reasons[] = {
{ERR_PACK(ERR_LIB_X509, 0, X509_R_CRL_VERIFY_FAILURE),
"crl verify failure"},
{ERR_PACK(ERR_LIB_X509, 0, X509_R_IDP_MISMATCH), "idp mismatch"},
- {ERR_PACK(ERR_LIB_X509, 0, X509_R_INVALID_ATTRIBUTES),
- "invalid attributes"},
+ {ERR_PACK(ERR_LIB_X509, 0, X509_R_INVALID_ATTRIBUTES),
+ "invalid attributes"},
{ERR_PACK(ERR_LIB_X509, 0, X509_R_INVALID_DIRECTORY), "invalid directory"},
{ERR_PACK(ERR_LIB_X509, 0, X509_R_INVALID_FIELD_NAME),
"invalid field name"},
diff --git a/contrib/libs/openssl/crypto/x509/x509_lu.c b/contrib/libs/openssl/crypto/x509/x509_lu.c
index 641a41c35c..411c451838 100644
--- a/contrib/libs/openssl/crypto/x509/x509_lu.c
+++ b/contrib/libs/openssl/crypto/x509/x509_lu.c
@@ -1,5 +1,5 @@
/*
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -289,25 +289,25 @@ X509_OBJECT *X509_STORE_CTX_get_obj_by_subject(X509_STORE_CTX *vs,
int X509_STORE_CTX_get_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type,
X509_NAME *name, X509_OBJECT *ret)
{
- X509_STORE *store = vs->ctx;
+ X509_STORE *store = vs->ctx;
X509_LOOKUP *lu;
X509_OBJECT stmp, *tmp;
int i, j;
- if (store == NULL)
+ if (store == NULL)
return 0;
stmp.type = X509_LU_NONE;
- stmp.data.ptr = NULL;
-
-
- X509_STORE_lock(store);
- tmp = X509_OBJECT_retrieve_by_subject(store->objs, type, name);
- X509_STORE_unlock(store);
+ stmp.data.ptr = NULL;
+
+ X509_STORE_lock(store);
+ tmp = X509_OBJECT_retrieve_by_subject(store->objs, type, name);
+ X509_STORE_unlock(store);
+
if (tmp == NULL || type == X509_LU_CRL) {
- for (i = 0; i < sk_X509_LOOKUP_num(store->get_cert_methods); i++) {
- lu = sk_X509_LOOKUP_value(store->get_cert_methods, i);
+ for (i = 0; i < sk_X509_LOOKUP_num(store->get_cert_methods); i++) {
+ lu = sk_X509_LOOKUP_value(store->get_cert_methods, i);
j = X509_LOOKUP_by_subject(lu, type, name, &stmp);
if (j) {
tmp = &stmp;
@@ -318,16 +318,16 @@ int X509_STORE_CTX_get_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type,
return 0;
}
- if (!X509_OBJECT_up_ref_count(tmp))
- return 0;
-
+ if (!X509_OBJECT_up_ref_count(tmp))
+ return 0;
+
ret->type = tmp->type;
ret->data.ptr = tmp->data.ptr;
return 1;
}
-static int x509_store_add(X509_STORE *store, void *x, int crl) {
+static int x509_store_add(X509_STORE *store, void *x, int crl) {
X509_OBJECT *obj;
int ret = 0, added = 0;
@@ -344,20 +344,20 @@ static int x509_store_add(X509_STORE *store, void *x, int crl) {
obj->type = X509_LU_X509;
obj->data.x509 = (X509 *)x;
}
- if (!X509_OBJECT_up_ref_count(obj)) {
- obj->type = X509_LU_NONE;
- X509_OBJECT_free(obj);
- return 0;
- }
+ if (!X509_OBJECT_up_ref_count(obj)) {
+ obj->type = X509_LU_NONE;
+ X509_OBJECT_free(obj);
+ return 0;
+ }
- X509_STORE_lock(store);
- if (X509_OBJECT_retrieve_match(store->objs, obj)) {
+ X509_STORE_lock(store);
+ if (X509_OBJECT_retrieve_match(store->objs, obj)) {
ret = 1;
} else {
- added = sk_X509_OBJECT_push(store->objs, obj);
+ added = sk_X509_OBJECT_push(store->objs, obj);
ret = added != 0;
}
- X509_STORE_unlock(store);
+ X509_STORE_unlock(store);
if (added == 0) /* obj not pushed */
X509_OBJECT_free(obj);
@@ -538,13 +538,13 @@ STACK_OF(X509) *X509_STORE_CTX_get1_certs(X509_STORE_CTX *ctx, X509_NAME *nm)
STACK_OF(X509) *sk = NULL;
X509 *x;
X509_OBJECT *obj;
- X509_STORE *store = ctx->ctx;
+ X509_STORE *store = ctx->ctx;
- if (store == NULL)
+ if (store == NULL)
return NULL;
- X509_STORE_lock(store);
- idx = x509_object_idx_cnt(store->objs, X509_LU_X509, nm, &cnt);
+ X509_STORE_lock(store);
+ idx = x509_object_idx_cnt(store->objs, X509_LU_X509, nm, &cnt);
if (idx < 0) {
/*
* Nothing found in cache: do lookup to possibly add new objects to
@@ -552,8 +552,8 @@ STACK_OF(X509) *X509_STORE_CTX_get1_certs(X509_STORE_CTX *ctx, X509_NAME *nm)
*/
X509_OBJECT *xobj = X509_OBJECT_new();
- X509_STORE_unlock(store);
-
+ X509_STORE_unlock(store);
+
if (xobj == NULL)
return NULL;
if (!X509_STORE_CTX_get_by_subject(ctx, X509_LU_X509, nm, xobj)) {
@@ -561,31 +561,31 @@ STACK_OF(X509) *X509_STORE_CTX_get1_certs(X509_STORE_CTX *ctx, X509_NAME *nm)
return NULL;
}
X509_OBJECT_free(xobj);
- X509_STORE_lock(store);
- idx = x509_object_idx_cnt(store->objs, X509_LU_X509, nm, &cnt);
+ X509_STORE_lock(store);
+ idx = x509_object_idx_cnt(store->objs, X509_LU_X509, nm, &cnt);
if (idx < 0) {
- X509_STORE_unlock(store);
+ X509_STORE_unlock(store);
return NULL;
}
}
sk = sk_X509_new_null();
for (i = 0; i < cnt; i++, idx++) {
- obj = sk_X509_OBJECT_value(store->objs, idx);
+ obj = sk_X509_OBJECT_value(store->objs, idx);
x = obj->data.x509;
- if (!X509_up_ref(x)) {
- X509_STORE_unlock(store);
- sk_X509_pop_free(sk, X509_free);
- return NULL;
- }
+ if (!X509_up_ref(x)) {
+ X509_STORE_unlock(store);
+ sk_X509_pop_free(sk, X509_free);
+ return NULL;
+ }
if (!sk_X509_push(sk, x)) {
- X509_STORE_unlock(store);
+ X509_STORE_unlock(store);
X509_free(x);
sk_X509_pop_free(sk, X509_free);
return NULL;
}
}
- X509_STORE_unlock(store);
+ X509_STORE_unlock(store);
return sk;
}
@@ -595,42 +595,42 @@ STACK_OF(X509_CRL) *X509_STORE_CTX_get1_crls(X509_STORE_CTX *ctx, X509_NAME *nm)
STACK_OF(X509_CRL) *sk = sk_X509_CRL_new_null();
X509_CRL *x;
X509_OBJECT *obj, *xobj = X509_OBJECT_new();
- X509_STORE *store = ctx->ctx;
+ X509_STORE *store = ctx->ctx;
/* Always do lookup to possibly add new CRLs to cache */
if (sk == NULL
|| xobj == NULL
- || store == NULL
+ || store == NULL
|| !X509_STORE_CTX_get_by_subject(ctx, X509_LU_CRL, nm, xobj)) {
X509_OBJECT_free(xobj);
sk_X509_CRL_free(sk);
return NULL;
}
X509_OBJECT_free(xobj);
- X509_STORE_lock(store);
- idx = x509_object_idx_cnt(store->objs, X509_LU_CRL, nm, &cnt);
+ X509_STORE_lock(store);
+ idx = x509_object_idx_cnt(store->objs, X509_LU_CRL, nm, &cnt);
if (idx < 0) {
- X509_STORE_unlock(store);
+ X509_STORE_unlock(store);
sk_X509_CRL_free(sk);
return NULL;
}
for (i = 0; i < cnt; i++, idx++) {
- obj = sk_X509_OBJECT_value(store->objs, idx);
+ obj = sk_X509_OBJECT_value(store->objs, idx);
x = obj->data.crl;
- if (!X509_CRL_up_ref(x)) {
- X509_STORE_unlock(store);
- sk_X509_CRL_pop_free(sk, X509_CRL_free);
- return NULL;
- }
+ if (!X509_CRL_up_ref(x)) {
+ X509_STORE_unlock(store);
+ sk_X509_CRL_pop_free(sk, X509_CRL_free);
+ return NULL;
+ }
if (!sk_X509_CRL_push(sk, x)) {
- X509_STORE_unlock(store);
+ X509_STORE_unlock(store);
X509_CRL_free(x);
sk_X509_CRL_pop_free(sk, X509_CRL_free);
return NULL;
}
}
- X509_STORE_unlock(store);
+ X509_STORE_unlock(store);
return sk;
}
@@ -678,7 +678,7 @@ int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x)
{
X509_NAME *xn;
X509_OBJECT *obj = X509_OBJECT_new(), *pobj = NULL;
- X509_STORE *store = ctx->ctx;
+ X509_STORE *store = ctx->ctx;
int i, ok, idx, ret;
if (obj == NULL)
@@ -694,28 +694,28 @@ int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x)
if (ctx->check_issued(ctx, x, obj->data.x509)) {
if (x509_check_cert_time(ctx, obj->data.x509, -1)) {
*issuer = obj->data.x509;
- if (!X509_up_ref(*issuer)) {
- *issuer = NULL;
- ok = -1;
- }
+ if (!X509_up_ref(*issuer)) {
+ *issuer = NULL;
+ ok = -1;
+ }
X509_OBJECT_free(obj);
- return ok;
+ return ok;
}
}
X509_OBJECT_free(obj);
- if (store == NULL)
+ if (store == NULL)
return 0;
/* Else find index of first cert accepted by 'check_issued' */
ret = 0;
- X509_STORE_lock(store);
- idx = X509_OBJECT_idx_by_subject(store->objs, X509_LU_X509, xn);
+ X509_STORE_lock(store);
+ idx = X509_OBJECT_idx_by_subject(store->objs, X509_LU_X509, xn);
if (idx != -1) { /* should be true as we've had at least one
* match */
/* Look through all matching certs for suitable issuer */
- for (i = idx; i < sk_X509_OBJECT_num(store->objs); i++) {
- pobj = sk_X509_OBJECT_value(store->objs, i);
+ for (i = idx; i < sk_X509_OBJECT_num(store->objs); i++) {
+ pobj = sk_X509_OBJECT_value(store->objs, i);
/* See if we've run past the matches */
if (pobj->type != X509_LU_X509)
break;
@@ -736,11 +736,11 @@ int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x)
}
}
}
- if (*issuer && !X509_up_ref(*issuer)) {
- *issuer = NULL;
- ret = -1;
- }
- X509_STORE_unlock(store);
+ if (*issuer && !X509_up_ref(*issuer)) {
+ *issuer = NULL;
+ ret = -1;
+ }
+ X509_STORE_unlock(store);
return ret;
}
diff --git a/contrib/libs/openssl/crypto/x509/x509_vfy.c b/contrib/libs/openssl/crypto/x509/x509_vfy.c
index 20a36e763c..3208da43d9 100644
--- a/contrib/libs/openssl/crypto/x509/x509_vfy.c
+++ b/contrib/libs/openssl/crypto/x509/x509_vfy.c
@@ -1853,11 +1853,11 @@ int X509_cmp_time(const ASN1_TIME *ctm, time_t *cmp_time)
static const size_t generalizedtime_length = sizeof("YYYYMMDDHHMMSSZ") - 1;
ASN1_TIME *asn1_cmp_time = NULL;
int i, day, sec, ret = 0;
-#ifdef CHARSET_EBCDIC
- const char upper_z = 0x5A;
-#else
- const char upper_z = 'Z';
-#endif
+#ifdef CHARSET_EBCDIC
+ const char upper_z = 0x5A;
+#else
+ const char upper_z = 'Z';
+#endif
/*
* Note that ASN.1 allows much more slack in the time format than RFC5280.
* In RFC5280, the representation is fixed:
@@ -1888,10 +1888,10 @@ int X509_cmp_time(const ASN1_TIME *ctm, time_t *cmp_time)
* Digit and date ranges will be verified in the conversion methods.
*/
for (i = 0; i < ctm->length - 1; i++) {
- if (!ascii_isdigit(ctm->data[i]))
+ if (!ascii_isdigit(ctm->data[i]))
return 0;
}
- if (ctm->data[ctm->length - 1] != upper_z)
+ if (ctm->data[ctm->length - 1] != upper_z)
return 0;
/*
diff --git a/contrib/libs/openssl/crypto/x509v3/v3_alt.c b/contrib/libs/openssl/crypto/x509v3/v3_alt.c
index 7c32d4031d..5da1599bff 100644
--- a/contrib/libs/openssl/crypto/x509v3/v3_alt.c
+++ b/contrib/libs/openssl/crypto/x509v3/v3_alt.c
@@ -174,18 +174,18 @@ int GENERAL_NAME_print(BIO *out, GENERAL_NAME *gen)
break;
case GEN_EMAIL:
- BIO_printf(out, "email:");
- ASN1_STRING_print(out, gen->d.ia5);
+ BIO_printf(out, "email:");
+ ASN1_STRING_print(out, gen->d.ia5);
break;
case GEN_DNS:
- BIO_printf(out, "DNS:");
- ASN1_STRING_print(out, gen->d.ia5);
+ BIO_printf(out, "DNS:");
+ ASN1_STRING_print(out, gen->d.ia5);
break;
case GEN_URI:
- BIO_printf(out, "URI:");
- ASN1_STRING_print(out, gen->d.ia5);
+ BIO_printf(out, "URI:");
+ ASN1_STRING_print(out, gen->d.ia5);
break;
case GEN_DIRNAME:
diff --git a/contrib/libs/openssl/crypto/x509v3/v3_genn.c b/contrib/libs/openssl/crypto/x509v3/v3_genn.c
index 87a5eff47c..4535dcf699 100644
--- a/contrib/libs/openssl/crypto/x509v3/v3_genn.c
+++ b/contrib/libs/openssl/crypto/x509v3/v3_genn.c
@@ -181,7 +181,7 @@ void GENERAL_NAME_set0_value(GENERAL_NAME *a, int type, void *value)
a->type = type;
}
-void *GENERAL_NAME_get0_value(const GENERAL_NAME *a, int *ptype)
+void *GENERAL_NAME_get0_value(const GENERAL_NAME *a, int *ptype)
{
if (ptype)
*ptype = a->type;
@@ -228,7 +228,7 @@ int GENERAL_NAME_set0_othername(GENERAL_NAME *gen,
return 1;
}
-int GENERAL_NAME_get0_otherName(const GENERAL_NAME *gen,
+int GENERAL_NAME_get0_otherName(const GENERAL_NAME *gen,
ASN1_OBJECT **poid, ASN1_TYPE **pvalue)
{
if (gen->type != GEN_OTHERNAME)
diff --git a/contrib/libs/openssl/crypto/x509v3/v3_purp.c b/contrib/libs/openssl/crypto/x509v3/v3_purp.c
index a1aeb4e4c6..a943f9ace1 100644
--- a/contrib/libs/openssl/crypto/x509v3/v3_purp.c
+++ b/contrib/libs/openssl/crypto/x509v3/v3_purp.c
@@ -958,22 +958,22 @@ const ASN1_OCTET_STRING *X509_get0_authority_key_id(X509 *x)
return (x->akid != NULL ? x->akid->keyid : NULL);
}
-const GENERAL_NAMES *X509_get0_authority_issuer(X509 *x)
-{
- /* Call for side-effect of computing hash and caching extensions */
+const GENERAL_NAMES *X509_get0_authority_issuer(X509 *x)
+{
+ /* Call for side-effect of computing hash and caching extensions */
if (X509_check_purpose(x, -1, -1) != 1)
return NULL;
- return (x->akid != NULL ? x->akid->issuer : NULL);
-}
-
-const ASN1_INTEGER *X509_get0_authority_serial(X509 *x)
-{
- /* Call for side-effect of computing hash and caching extensions */
+ return (x->akid != NULL ? x->akid->issuer : NULL);
+}
+
+const ASN1_INTEGER *X509_get0_authority_serial(X509 *x)
+{
+ /* Call for side-effect of computing hash and caching extensions */
if (X509_check_purpose(x, -1, -1) != 1)
return NULL;
- return (x->akid != NULL ? x->akid->serial : NULL);
-}
-
+ return (x->akid != NULL ? x->akid->serial : NULL);
+}
+
long X509_get_pathlen(X509 *x)
{
/* Called for side effect of caching extensions */
diff --git a/contrib/libs/openssl/crypto/ya.make b/contrib/libs/openssl/crypto/ya.make
index 3acfb0cac7..bfd0a97b60 100644
--- a/contrib/libs/openssl/crypto/ya.make
+++ b/contrib/libs/openssl/crypto/ya.make
@@ -197,619 +197,619 @@ IF (ARCH_TYPE_32)
)
ENDIF()
-IF (ARCH_X86_64 AND NOT MSVC)
+IF (ARCH_X86_64 AND NOT MSVC)
SET_APPEND(
SFLAGS
-mavx512bw
-mavx512ifma
-mavx512vl
)
-ENDIF()
-
+ENDIF()
+
IF (OS_WINDOWS)
SET_COMPILE_OUTPUTS_MODIFIERS(NOREL)
ENDIF()
SRCS(
- aes/aes_cbc.c
- aes/aes_cfb.c
- aes/aes_ecb.c
- aes/aes_ige.c
- aes/aes_misc.c
- aes/aes_ofb.c
- aes/aes_wrap.c
- aria/aria.c
- asn1/a_bitstr.c
- asn1/a_d2i_fp.c
- asn1/a_digest.c
- asn1/a_dup.c
- asn1/a_gentm.c
- asn1/a_i2d_fp.c
- asn1/a_int.c
- asn1/a_mbstr.c
- asn1/a_object.c
- asn1/a_octet.c
- asn1/a_print.c
- asn1/a_sign.c
- asn1/a_strex.c
- asn1/a_strnid.c
- asn1/a_time.c
- asn1/a_type.c
- asn1/a_utctm.c
- asn1/a_utf8.c
- asn1/a_verify.c
- asn1/ameth_lib.c
- asn1/asn1_err.c
- asn1/asn1_gen.c
- asn1/asn1_item_list.c
- asn1/asn1_lib.c
- asn1/asn1_par.c
- asn1/asn_mime.c
- asn1/asn_moid.c
- asn1/asn_mstbl.c
- asn1/asn_pack.c
- asn1/bio_asn1.c
- asn1/bio_ndef.c
- asn1/d2i_pr.c
- asn1/d2i_pu.c
- asn1/evp_asn1.c
- asn1/f_int.c
- asn1/f_string.c
- asn1/i2d_pr.c
- asn1/i2d_pu.c
- asn1/n_pkey.c
- asn1/nsseq.c
- asn1/p5_pbe.c
- asn1/p5_pbev2.c
- asn1/p5_scrypt.c
- asn1/p8_pkey.c
- asn1/t_bitst.c
- asn1/t_pkey.c
- asn1/t_spki.c
- asn1/tasn_dec.c
- asn1/tasn_enc.c
- asn1/tasn_fre.c
- asn1/tasn_new.c
- asn1/tasn_prn.c
- asn1/tasn_scn.c
- asn1/tasn_typ.c
- asn1/tasn_utl.c
- asn1/x_algor.c
- asn1/x_bignum.c
- asn1/x_info.c
- asn1/x_int64.c
- asn1/x_long.c
- asn1/x_pkey.c
- asn1/x_sig.c
- asn1/x_spki.c
- asn1/x_val.c
- async/arch/async_null.c
- async/arch/async_posix.c
- async/arch/async_win.c
- async/async.c
- async/async_err.c
- async/async_wait.c
- bf/bf_cfb64.c
- bf/bf_ecb.c
- bf/bf_ofb64.c
- bf/bf_skey.c
- bio/b_addr.c
- bio/b_dump.c
- bio/b_print.c
- bio/b_sock.c
- bio/b_sock2.c
- bio/bf_buff.c
- bio/bf_lbuf.c
- bio/bf_nbio.c
- bio/bf_null.c
- bio/bio_cb.c
- bio/bio_err.c
- bio/bio_lib.c
- bio/bio_meth.c
- bio/bss_acpt.c
- bio/bss_bio.c
- bio/bss_conn.c
- bio/bss_dgram.c
- bio/bss_fd.c
- bio/bss_file.c
- bio/bss_log.c
- bio/bss_mem.c
- bio/bss_null.c
- bio/bss_sock.c
- blake2/blake2b.c
- blake2/blake2s.c
- blake2/m_blake2b.c
- blake2/m_blake2s.c
- bn/bn_add.c
- bn/bn_blind.c
- bn/bn_const.c
- bn/bn_ctx.c
- bn/bn_depr.c
- bn/bn_dh.c
- bn/bn_div.c
- bn/bn_err.c
- bn/bn_exp.c
- bn/bn_exp2.c
- bn/bn_gcd.c
- bn/bn_gf2m.c
- bn/bn_intern.c
- bn/bn_kron.c
- bn/bn_lib.c
- bn/bn_mod.c
- bn/bn_mont.c
- bn/bn_mpi.c
- bn/bn_mul.c
- bn/bn_nist.c
- bn/bn_prime.c
- bn/bn_print.c
- bn/bn_rand.c
- bn/bn_recp.c
- bn/bn_shift.c
- bn/bn_sqr.c
- bn/bn_sqrt.c
- bn/bn_srp.c
- bn/bn_word.c
- bn/bn_x931p.c
- buffer/buf_err.c
- buffer/buffer.c
- camellia/cmll_cfb.c
- camellia/cmll_ctr.c
- camellia/cmll_ecb.c
- camellia/cmll_ofb.c
- cast/c_cfb64.c
- cast/c_ecb.c
- cast/c_enc.c
- cast/c_ofb64.c
- cast/c_skey.c
- cmac/cm_ameth.c
- cmac/cm_pmeth.c
- cmac/cmac.c
- cms/cms_asn1.c
- cms/cms_att.c
- cms/cms_cd.c
- cms/cms_dd.c
- cms/cms_enc.c
- cms/cms_env.c
- cms/cms_err.c
- cms/cms_ess.c
- cms/cms_io.c
- cms/cms_kari.c
- cms/cms_lib.c
- cms/cms_pwri.c
- cms/cms_sd.c
- cms/cms_smime.c
- comp/c_zlib.c
- comp/comp_err.c
- comp/comp_lib.c
- conf/conf_api.c
- conf/conf_def.c
- conf/conf_err.c
- conf/conf_lib.c
- conf/conf_mall.c
- conf/conf_mod.c
- conf/conf_sap.c
- conf/conf_ssl.c
- cpt_err.c
- cryptlib.c
- ct/ct_b64.c
- ct/ct_err.c
- ct/ct_log.c
- ct/ct_oct.c
- ct/ct_policy.c
- ct/ct_prn.c
- ct/ct_sct.c
- ct/ct_sct_ctx.c
- ct/ct_vfy.c
- ct/ct_x509v3.c
- ctype.c
- cversion.c
- des/cbc_cksm.c
- des/cbc_enc.c
- des/cfb64ede.c
- des/cfb64enc.c
- des/cfb_enc.c
- des/ecb3_enc.c
- des/ecb_enc.c
- des/fcrypt.c
- des/ofb64ede.c
- des/ofb64enc.c
- des/ofb_enc.c
- des/pcbc_enc.c
- des/qud_cksm.c
- des/rand_key.c
- des/set_key.c
- des/str2key.c
- des/xcbc_enc.c
- dh/dh_ameth.c
- dh/dh_asn1.c
- dh/dh_check.c
- dh/dh_depr.c
- dh/dh_err.c
- dh/dh_gen.c
- dh/dh_kdf.c
- dh/dh_key.c
- dh/dh_lib.c
- dh/dh_meth.c
- dh/dh_pmeth.c
- dh/dh_prn.c
- dh/dh_rfc5114.c
- dh/dh_rfc7919.c
- dsa/dsa_ameth.c
- dsa/dsa_asn1.c
- dsa/dsa_depr.c
- dsa/dsa_err.c
- dsa/dsa_gen.c
- dsa/dsa_key.c
- dsa/dsa_lib.c
- dsa/dsa_meth.c
- dsa/dsa_ossl.c
- dsa/dsa_pmeth.c
- dsa/dsa_prn.c
- dsa/dsa_sign.c
- dsa/dsa_vrf.c
- dso/dso_dl.c
- dso/dso_err.c
- dso/dso_lib.c
- dso/dso_openssl.c
- dso/dso_vms.c
- dso/dso_win32.c
- ebcdic.c
- ec/curve25519.c
- ec/curve448/arch_32/f_impl.c
- ec/curve448/curve448.c
- ec/curve448/curve448_tables.c
- ec/curve448/eddsa.c
- ec/curve448/f_generic.c
- ec/curve448/scalar.c
- ec/ec2_oct.c
- ec/ec2_smpl.c
- ec/ec_ameth.c
- ec/ec_asn1.c
- ec/ec_check.c
- ec/ec_curve.c
- ec/ec_cvt.c
- ec/ec_err.c
- ec/ec_key.c
- ec/ec_kmeth.c
- ec/ec_lib.c
- ec/ec_mult.c
- ec/ec_oct.c
- ec/ec_pmeth.c
- ec/ec_print.c
- ec/ecdh_kdf.c
- ec/ecdh_ossl.c
- ec/ecdsa_ossl.c
- ec/ecdsa_sign.c
- ec/ecdsa_vrf.c
- ec/eck_prn.c
- ec/ecp_mont.c
- ec/ecp_nist.c
- ec/ecp_nistp224.c
- ec/ecp_nistp256.c
- ec/ecp_nistp521.c
- ec/ecp_nistputil.c
- ec/ecp_oct.c
- ec/ecp_smpl.c
- ec/ecx_meth.c
- err/err.c
- err/err_all.c
- err/err_prn.c
- evp/bio_b64.c
- evp/bio_enc.c
- evp/bio_md.c
- evp/bio_ok.c
- evp/c_allc.c
- evp/c_alld.c
- evp/cmeth_lib.c
- evp/digest.c
- evp/e_aes.c
- evp/e_aes_cbc_hmac_sha1.c
- evp/e_aes_cbc_hmac_sha256.c
- evp/e_aria.c
- evp/e_bf.c
- evp/e_camellia.c
- evp/e_cast.c
- evp/e_chacha20_poly1305.c
- evp/e_des.c
- evp/e_des3.c
- evp/e_idea.c
- evp/e_null.c
- evp/e_old.c
- evp/e_rc2.c
- evp/e_rc4.c
- evp/e_rc4_hmac_md5.c
- evp/e_rc5.c
- evp/e_seed.c
- evp/e_sm4.c
- evp/e_xcbc_d.c
- evp/encode.c
- evp/evp_cnf.c
- evp/evp_enc.c
- evp/evp_err.c
- evp/evp_key.c
- evp/evp_lib.c
- evp/evp_pbe.c
- evp/evp_pkey.c
- evp/m_md2.c
- evp/m_md4.c
- evp/m_md5.c
- evp/m_md5_sha1.c
- evp/m_mdc2.c
- evp/m_null.c
- evp/m_ripemd.c
- evp/m_sha1.c
- evp/m_sha3.c
- evp/m_sigver.c
- evp/m_wp.c
- evp/names.c
- evp/p5_crpt.c
- evp/p5_crpt2.c
- evp/p_dec.c
- evp/p_enc.c
- evp/p_lib.c
- evp/p_open.c
- evp/p_seal.c
- evp/p_sign.c
- evp/p_verify.c
- evp/pbe_scrypt.c
- evp/pmeth_fn.c
- evp/pmeth_gn.c
- evp/pmeth_lib.c
- ex_data.c
- getenv.c
- hmac/hm_ameth.c
- hmac/hm_pmeth.c
- hmac/hmac.c
- idea/i_cbc.c
- idea/i_cfb64.c
- idea/i_ecb.c
- idea/i_ofb64.c
- idea/i_skey.c
- init.c
- kdf/hkdf.c
- kdf/kdf_err.c
- kdf/scrypt.c
- kdf/tls1_prf.c
- lhash/lh_stats.c
- lhash/lhash.c
- md4/md4_dgst.c
- md4/md4_one.c
- md5/md5_dgst.c
- md5/md5_one.c
- mdc2/mdc2_one.c
- mdc2/mdc2dgst.c
- mem.c
- mem_dbg.c
- mem_sec.c
- modes/cbc128.c
- modes/ccm128.c
- modes/cfb128.c
- modes/ctr128.c
- modes/cts128.c
- modes/gcm128.c
- modes/ocb128.c
- modes/ofb128.c
- modes/wrap128.c
- modes/xts128.c
- o_dir.c
- o_fips.c
- o_fopen.c
- o_init.c
- o_str.c
- o_time.c
- objects/o_names.c
- objects/obj_dat.c
- objects/obj_err.c
- objects/obj_lib.c
- objects/obj_xref.c
- ocsp/ocsp_asn.c
- ocsp/ocsp_cl.c
- ocsp/ocsp_err.c
- ocsp/ocsp_ext.c
- ocsp/ocsp_ht.c
- ocsp/ocsp_lib.c
- ocsp/ocsp_prn.c
- ocsp/ocsp_srv.c
- ocsp/ocsp_vfy.c
- ocsp/v3_ocsp.c
- pem/pem_all.c
- pem/pem_err.c
- pem/pem_info.c
- pem/pem_lib.c
- pem/pem_oth.c
- pem/pem_pk8.c
- pem/pem_pkey.c
- pem/pem_sign.c
- pem/pem_x509.c
- pem/pem_xaux.c
- pem/pvkfmt.c
- pkcs12/p12_add.c
- pkcs12/p12_asn.c
- pkcs12/p12_attr.c
- pkcs12/p12_crpt.c
- pkcs12/p12_crt.c
- pkcs12/p12_decr.c
- pkcs12/p12_init.c
- pkcs12/p12_key.c
- pkcs12/p12_kiss.c
- pkcs12/p12_mutl.c
- pkcs12/p12_npas.c
- pkcs12/p12_p8d.c
- pkcs12/p12_p8e.c
- pkcs12/p12_sbag.c
- pkcs12/p12_utl.c
- pkcs12/pk12err.c
- pkcs7/bio_pk7.c
- pkcs7/pk7_asn1.c
- pkcs7/pk7_attr.c
- pkcs7/pk7_doit.c
- pkcs7/pk7_lib.c
- pkcs7/pk7_mime.c
- pkcs7/pk7_smime.c
- pkcs7/pkcs7err.c
- poly1305/poly1305.c
- poly1305/poly1305_ameth.c
- poly1305/poly1305_pmeth.c
- rand/drbg_ctr.c
- rand/drbg_lib.c
- rand/rand_egd.c
- rand/rand_err.c
- rand/rand_lib.c
- rand/rand_unix.c
- rand/rand_win.c
- rand/randfile.c
- rc2/rc2_cbc.c
- rc2/rc2_ecb.c
- rc2/rc2_skey.c
- rc2/rc2cfb64.c
- rc2/rc2ofb64.c
- ripemd/rmd_dgst.c
- ripemd/rmd_one.c
- rsa/rsa_ameth.c
- rsa/rsa_asn1.c
- rsa/rsa_chk.c
- rsa/rsa_crpt.c
- rsa/rsa_depr.c
- rsa/rsa_err.c
- rsa/rsa_gen.c
- rsa/rsa_lib.c
- rsa/rsa_meth.c
- rsa/rsa_mp.c
- rsa/rsa_none.c
- rsa/rsa_oaep.c
- rsa/rsa_ossl.c
- rsa/rsa_pk1.c
- rsa/rsa_pmeth.c
- rsa/rsa_prn.c
- rsa/rsa_pss.c
- rsa/rsa_saos.c
- rsa/rsa_sign.c
- rsa/rsa_ssl.c
- rsa/rsa_x931.c
- rsa/rsa_x931g.c
- seed/seed.c
- seed/seed_cbc.c
- seed/seed_cfb.c
- seed/seed_ecb.c
- seed/seed_ofb.c
- sha/sha1_one.c
- sha/sha1dgst.c
- sha/sha256.c
- sha/sha512.c
- siphash/siphash.c
- siphash/siphash_ameth.c
- siphash/siphash_pmeth.c
- sm2/sm2_crypt.c
- sm2/sm2_err.c
- sm2/sm2_pmeth.c
- sm2/sm2_sign.c
- sm3/m_sm3.c
- sm3/sm3.c
- sm4/sm4.c
- srp/srp_lib.c
- srp/srp_vfy.c
- stack/stack.c
- store/loader_file.c
- store/store_err.c
- store/store_init.c
- store/store_lib.c
- store/store_register.c
- store/store_strings.c
- threads_none.c
- threads_pthread.c
- threads_win.c
- ts/ts_asn1.c
- ts/ts_conf.c
- ts/ts_err.c
- ts/ts_lib.c
- ts/ts_req_print.c
- ts/ts_req_utils.c
- ts/ts_rsp_print.c
- ts/ts_rsp_sign.c
- ts/ts_rsp_utils.c
- ts/ts_rsp_verify.c
- ts/ts_verify_ctx.c
- txt_db/txt_db.c
- ui/ui_err.c
- ui/ui_lib.c
- ui/ui_null.c
- ui/ui_openssl.c
- ui/ui_util.c
- uid.c
- whrlpool/wp_dgst.c
- x509/by_dir.c
- x509/by_file.c
- x509/t_crl.c
- x509/t_req.c
- x509/t_x509.c
- x509/x509_att.c
- x509/x509_cmp.c
- x509/x509_d2.c
- x509/x509_def.c
- x509/x509_err.c
- x509/x509_ext.c
- x509/x509_lu.c
- x509/x509_meth.c
- x509/x509_obj.c
- x509/x509_r2x.c
- x509/x509_req.c
- x509/x509_set.c
- x509/x509_trs.c
- x509/x509_txt.c
- x509/x509_v3.c
- x509/x509_vfy.c
- x509/x509_vpm.c
- x509/x509cset.c
- x509/x509name.c
- x509/x509rset.c
- x509/x509spki.c
- x509/x509type.c
- x509/x_all.c
- x509/x_attrib.c
- x509/x_crl.c
- x509/x_exten.c
- x509/x_name.c
- x509/x_pubkey.c
- x509/x_req.c
- x509/x_x509.c
- x509/x_x509a.c
- x509v3/pcy_cache.c
- x509v3/pcy_data.c
- x509v3/pcy_lib.c
- x509v3/pcy_map.c
- x509v3/pcy_node.c
- x509v3/pcy_tree.c
- x509v3/v3_addr.c
- x509v3/v3_admis.c
- x509v3/v3_akey.c
- x509v3/v3_akeya.c
- x509v3/v3_alt.c
- x509v3/v3_asid.c
- x509v3/v3_bcons.c
- x509v3/v3_bitst.c
- x509v3/v3_conf.c
- x509v3/v3_cpols.c
- x509v3/v3_crld.c
- x509v3/v3_enum.c
- x509v3/v3_extku.c
- x509v3/v3_genn.c
- x509v3/v3_ia5.c
- x509v3/v3_info.c
- x509v3/v3_int.c
- x509v3/v3_lib.c
- x509v3/v3_ncons.c
- x509v3/v3_pci.c
- x509v3/v3_pcia.c
- x509v3/v3_pcons.c
- x509v3/v3_pku.c
- x509v3/v3_pmaps.c
- x509v3/v3_prn.c
- x509v3/v3_purp.c
- x509v3/v3_skey.c
- x509v3/v3_sxnet.c
- x509v3/v3_tlsf.c
- x509v3/v3_utl.c
- x509v3/v3err.c
+ aes/aes_cbc.c
+ aes/aes_cfb.c
+ aes/aes_ecb.c
+ aes/aes_ige.c
+ aes/aes_misc.c
+ aes/aes_ofb.c
+ aes/aes_wrap.c
+ aria/aria.c
+ asn1/a_bitstr.c
+ asn1/a_d2i_fp.c
+ asn1/a_digest.c
+ asn1/a_dup.c
+ asn1/a_gentm.c
+ asn1/a_i2d_fp.c
+ asn1/a_int.c
+ asn1/a_mbstr.c
+ asn1/a_object.c
+ asn1/a_octet.c
+ asn1/a_print.c
+ asn1/a_sign.c
+ asn1/a_strex.c
+ asn1/a_strnid.c
+ asn1/a_time.c
+ asn1/a_type.c
+ asn1/a_utctm.c
+ asn1/a_utf8.c
+ asn1/a_verify.c
+ asn1/ameth_lib.c
+ asn1/asn1_err.c
+ asn1/asn1_gen.c
+ asn1/asn1_item_list.c
+ asn1/asn1_lib.c
+ asn1/asn1_par.c
+ asn1/asn_mime.c
+ asn1/asn_moid.c
+ asn1/asn_mstbl.c
+ asn1/asn_pack.c
+ asn1/bio_asn1.c
+ asn1/bio_ndef.c
+ asn1/d2i_pr.c
+ asn1/d2i_pu.c
+ asn1/evp_asn1.c
+ asn1/f_int.c
+ asn1/f_string.c
+ asn1/i2d_pr.c
+ asn1/i2d_pu.c
+ asn1/n_pkey.c
+ asn1/nsseq.c
+ asn1/p5_pbe.c
+ asn1/p5_pbev2.c
+ asn1/p5_scrypt.c
+ asn1/p8_pkey.c
+ asn1/t_bitst.c
+ asn1/t_pkey.c
+ asn1/t_spki.c
+ asn1/tasn_dec.c
+ asn1/tasn_enc.c
+ asn1/tasn_fre.c
+ asn1/tasn_new.c
+ asn1/tasn_prn.c
+ asn1/tasn_scn.c
+ asn1/tasn_typ.c
+ asn1/tasn_utl.c
+ asn1/x_algor.c
+ asn1/x_bignum.c
+ asn1/x_info.c
+ asn1/x_int64.c
+ asn1/x_long.c
+ asn1/x_pkey.c
+ asn1/x_sig.c
+ asn1/x_spki.c
+ asn1/x_val.c
+ async/arch/async_null.c
+ async/arch/async_posix.c
+ async/arch/async_win.c
+ async/async.c
+ async/async_err.c
+ async/async_wait.c
+ bf/bf_cfb64.c
+ bf/bf_ecb.c
+ bf/bf_ofb64.c
+ bf/bf_skey.c
+ bio/b_addr.c
+ bio/b_dump.c
+ bio/b_print.c
+ bio/b_sock.c
+ bio/b_sock2.c
+ bio/bf_buff.c
+ bio/bf_lbuf.c
+ bio/bf_nbio.c
+ bio/bf_null.c
+ bio/bio_cb.c
+ bio/bio_err.c
+ bio/bio_lib.c
+ bio/bio_meth.c
+ bio/bss_acpt.c
+ bio/bss_bio.c
+ bio/bss_conn.c
+ bio/bss_dgram.c
+ bio/bss_fd.c
+ bio/bss_file.c
+ bio/bss_log.c
+ bio/bss_mem.c
+ bio/bss_null.c
+ bio/bss_sock.c
+ blake2/blake2b.c
+ blake2/blake2s.c
+ blake2/m_blake2b.c
+ blake2/m_blake2s.c
+ bn/bn_add.c
+ bn/bn_blind.c
+ bn/bn_const.c
+ bn/bn_ctx.c
+ bn/bn_depr.c
+ bn/bn_dh.c
+ bn/bn_div.c
+ bn/bn_err.c
+ bn/bn_exp.c
+ bn/bn_exp2.c
+ bn/bn_gcd.c
+ bn/bn_gf2m.c
+ bn/bn_intern.c
+ bn/bn_kron.c
+ bn/bn_lib.c
+ bn/bn_mod.c
+ bn/bn_mont.c
+ bn/bn_mpi.c
+ bn/bn_mul.c
+ bn/bn_nist.c
+ bn/bn_prime.c
+ bn/bn_print.c
+ bn/bn_rand.c
+ bn/bn_recp.c
+ bn/bn_shift.c
+ bn/bn_sqr.c
+ bn/bn_sqrt.c
+ bn/bn_srp.c
+ bn/bn_word.c
+ bn/bn_x931p.c
+ buffer/buf_err.c
+ buffer/buffer.c
+ camellia/cmll_cfb.c
+ camellia/cmll_ctr.c
+ camellia/cmll_ecb.c
+ camellia/cmll_ofb.c
+ cast/c_cfb64.c
+ cast/c_ecb.c
+ cast/c_enc.c
+ cast/c_ofb64.c
+ cast/c_skey.c
+ cmac/cm_ameth.c
+ cmac/cm_pmeth.c
+ cmac/cmac.c
+ cms/cms_asn1.c
+ cms/cms_att.c
+ cms/cms_cd.c
+ cms/cms_dd.c
+ cms/cms_enc.c
+ cms/cms_env.c
+ cms/cms_err.c
+ cms/cms_ess.c
+ cms/cms_io.c
+ cms/cms_kari.c
+ cms/cms_lib.c
+ cms/cms_pwri.c
+ cms/cms_sd.c
+ cms/cms_smime.c
+ comp/c_zlib.c
+ comp/comp_err.c
+ comp/comp_lib.c
+ conf/conf_api.c
+ conf/conf_def.c
+ conf/conf_err.c
+ conf/conf_lib.c
+ conf/conf_mall.c
+ conf/conf_mod.c
+ conf/conf_sap.c
+ conf/conf_ssl.c
+ cpt_err.c
+ cryptlib.c
+ ct/ct_b64.c
+ ct/ct_err.c
+ ct/ct_log.c
+ ct/ct_oct.c
+ ct/ct_policy.c
+ ct/ct_prn.c
+ ct/ct_sct.c
+ ct/ct_sct_ctx.c
+ ct/ct_vfy.c
+ ct/ct_x509v3.c
+ ctype.c
+ cversion.c
+ des/cbc_cksm.c
+ des/cbc_enc.c
+ des/cfb64ede.c
+ des/cfb64enc.c
+ des/cfb_enc.c
+ des/ecb3_enc.c
+ des/ecb_enc.c
+ des/fcrypt.c
+ des/ofb64ede.c
+ des/ofb64enc.c
+ des/ofb_enc.c
+ des/pcbc_enc.c
+ des/qud_cksm.c
+ des/rand_key.c
+ des/set_key.c
+ des/str2key.c
+ des/xcbc_enc.c
+ dh/dh_ameth.c
+ dh/dh_asn1.c
+ dh/dh_check.c
+ dh/dh_depr.c
+ dh/dh_err.c
+ dh/dh_gen.c
+ dh/dh_kdf.c
+ dh/dh_key.c
+ dh/dh_lib.c
+ dh/dh_meth.c
+ dh/dh_pmeth.c
+ dh/dh_prn.c
+ dh/dh_rfc5114.c
+ dh/dh_rfc7919.c
+ dsa/dsa_ameth.c
+ dsa/dsa_asn1.c
+ dsa/dsa_depr.c
+ dsa/dsa_err.c
+ dsa/dsa_gen.c
+ dsa/dsa_key.c
+ dsa/dsa_lib.c
+ dsa/dsa_meth.c
+ dsa/dsa_ossl.c
+ dsa/dsa_pmeth.c
+ dsa/dsa_prn.c
+ dsa/dsa_sign.c
+ dsa/dsa_vrf.c
+ dso/dso_dl.c
+ dso/dso_err.c
+ dso/dso_lib.c
+ dso/dso_openssl.c
+ dso/dso_vms.c
+ dso/dso_win32.c
+ ebcdic.c
+ ec/curve25519.c
+ ec/curve448/arch_32/f_impl.c
+ ec/curve448/curve448.c
+ ec/curve448/curve448_tables.c
+ ec/curve448/eddsa.c
+ ec/curve448/f_generic.c
+ ec/curve448/scalar.c
+ ec/ec2_oct.c
+ ec/ec2_smpl.c
+ ec/ec_ameth.c
+ ec/ec_asn1.c
+ ec/ec_check.c
+ ec/ec_curve.c
+ ec/ec_cvt.c
+ ec/ec_err.c
+ ec/ec_key.c
+ ec/ec_kmeth.c
+ ec/ec_lib.c
+ ec/ec_mult.c
+ ec/ec_oct.c
+ ec/ec_pmeth.c
+ ec/ec_print.c
+ ec/ecdh_kdf.c
+ ec/ecdh_ossl.c
+ ec/ecdsa_ossl.c
+ ec/ecdsa_sign.c
+ ec/ecdsa_vrf.c
+ ec/eck_prn.c
+ ec/ecp_mont.c
+ ec/ecp_nist.c
+ ec/ecp_nistp224.c
+ ec/ecp_nistp256.c
+ ec/ecp_nistp521.c
+ ec/ecp_nistputil.c
+ ec/ecp_oct.c
+ ec/ecp_smpl.c
+ ec/ecx_meth.c
+ err/err.c
+ err/err_all.c
+ err/err_prn.c
+ evp/bio_b64.c
+ evp/bio_enc.c
+ evp/bio_md.c
+ evp/bio_ok.c
+ evp/c_allc.c
+ evp/c_alld.c
+ evp/cmeth_lib.c
+ evp/digest.c
+ evp/e_aes.c
+ evp/e_aes_cbc_hmac_sha1.c
+ evp/e_aes_cbc_hmac_sha256.c
+ evp/e_aria.c
+ evp/e_bf.c
+ evp/e_camellia.c
+ evp/e_cast.c
+ evp/e_chacha20_poly1305.c
+ evp/e_des.c
+ evp/e_des3.c
+ evp/e_idea.c
+ evp/e_null.c
+ evp/e_old.c
+ evp/e_rc2.c
+ evp/e_rc4.c
+ evp/e_rc4_hmac_md5.c
+ evp/e_rc5.c
+ evp/e_seed.c
+ evp/e_sm4.c
+ evp/e_xcbc_d.c
+ evp/encode.c
+ evp/evp_cnf.c
+ evp/evp_enc.c
+ evp/evp_err.c
+ evp/evp_key.c
+ evp/evp_lib.c
+ evp/evp_pbe.c
+ evp/evp_pkey.c
+ evp/m_md2.c
+ evp/m_md4.c
+ evp/m_md5.c
+ evp/m_md5_sha1.c
+ evp/m_mdc2.c
+ evp/m_null.c
+ evp/m_ripemd.c
+ evp/m_sha1.c
+ evp/m_sha3.c
+ evp/m_sigver.c
+ evp/m_wp.c
+ evp/names.c
+ evp/p5_crpt.c
+ evp/p5_crpt2.c
+ evp/p_dec.c
+ evp/p_enc.c
+ evp/p_lib.c
+ evp/p_open.c
+ evp/p_seal.c
+ evp/p_sign.c
+ evp/p_verify.c
+ evp/pbe_scrypt.c
+ evp/pmeth_fn.c
+ evp/pmeth_gn.c
+ evp/pmeth_lib.c
+ ex_data.c
+ getenv.c
+ hmac/hm_ameth.c
+ hmac/hm_pmeth.c
+ hmac/hmac.c
+ idea/i_cbc.c
+ idea/i_cfb64.c
+ idea/i_ecb.c
+ idea/i_ofb64.c
+ idea/i_skey.c
+ init.c
+ kdf/hkdf.c
+ kdf/kdf_err.c
+ kdf/scrypt.c
+ kdf/tls1_prf.c
+ lhash/lh_stats.c
+ lhash/lhash.c
+ md4/md4_dgst.c
+ md4/md4_one.c
+ md5/md5_dgst.c
+ md5/md5_one.c
+ mdc2/mdc2_one.c
+ mdc2/mdc2dgst.c
+ mem.c
+ mem_dbg.c
+ mem_sec.c
+ modes/cbc128.c
+ modes/ccm128.c
+ modes/cfb128.c
+ modes/ctr128.c
+ modes/cts128.c
+ modes/gcm128.c
+ modes/ocb128.c
+ modes/ofb128.c
+ modes/wrap128.c
+ modes/xts128.c
+ o_dir.c
+ o_fips.c
+ o_fopen.c
+ o_init.c
+ o_str.c
+ o_time.c
+ objects/o_names.c
+ objects/obj_dat.c
+ objects/obj_err.c
+ objects/obj_lib.c
+ objects/obj_xref.c
+ ocsp/ocsp_asn.c
+ ocsp/ocsp_cl.c
+ ocsp/ocsp_err.c
+ ocsp/ocsp_ext.c
+ ocsp/ocsp_ht.c
+ ocsp/ocsp_lib.c
+ ocsp/ocsp_prn.c
+ ocsp/ocsp_srv.c
+ ocsp/ocsp_vfy.c
+ ocsp/v3_ocsp.c
+ pem/pem_all.c
+ pem/pem_err.c
+ pem/pem_info.c
+ pem/pem_lib.c
+ pem/pem_oth.c
+ pem/pem_pk8.c
+ pem/pem_pkey.c
+ pem/pem_sign.c
+ pem/pem_x509.c
+ pem/pem_xaux.c
+ pem/pvkfmt.c
+ pkcs12/p12_add.c
+ pkcs12/p12_asn.c
+ pkcs12/p12_attr.c
+ pkcs12/p12_crpt.c
+ pkcs12/p12_crt.c
+ pkcs12/p12_decr.c
+ pkcs12/p12_init.c
+ pkcs12/p12_key.c
+ pkcs12/p12_kiss.c
+ pkcs12/p12_mutl.c
+ pkcs12/p12_npas.c
+ pkcs12/p12_p8d.c
+ pkcs12/p12_p8e.c
+ pkcs12/p12_sbag.c
+ pkcs12/p12_utl.c
+ pkcs12/pk12err.c
+ pkcs7/bio_pk7.c
+ pkcs7/pk7_asn1.c
+ pkcs7/pk7_attr.c
+ pkcs7/pk7_doit.c
+ pkcs7/pk7_lib.c
+ pkcs7/pk7_mime.c
+ pkcs7/pk7_smime.c
+ pkcs7/pkcs7err.c
+ poly1305/poly1305.c
+ poly1305/poly1305_ameth.c
+ poly1305/poly1305_pmeth.c
+ rand/drbg_ctr.c
+ rand/drbg_lib.c
+ rand/rand_egd.c
+ rand/rand_err.c
+ rand/rand_lib.c
+ rand/rand_unix.c
+ rand/rand_win.c
+ rand/randfile.c
+ rc2/rc2_cbc.c
+ rc2/rc2_ecb.c
+ rc2/rc2_skey.c
+ rc2/rc2cfb64.c
+ rc2/rc2ofb64.c
+ ripemd/rmd_dgst.c
+ ripemd/rmd_one.c
+ rsa/rsa_ameth.c
+ rsa/rsa_asn1.c
+ rsa/rsa_chk.c
+ rsa/rsa_crpt.c
+ rsa/rsa_depr.c
+ rsa/rsa_err.c
+ rsa/rsa_gen.c
+ rsa/rsa_lib.c
+ rsa/rsa_meth.c
+ rsa/rsa_mp.c
+ rsa/rsa_none.c
+ rsa/rsa_oaep.c
+ rsa/rsa_ossl.c
+ rsa/rsa_pk1.c
+ rsa/rsa_pmeth.c
+ rsa/rsa_prn.c
+ rsa/rsa_pss.c
+ rsa/rsa_saos.c
+ rsa/rsa_sign.c
+ rsa/rsa_ssl.c
+ rsa/rsa_x931.c
+ rsa/rsa_x931g.c
+ seed/seed.c
+ seed/seed_cbc.c
+ seed/seed_cfb.c
+ seed/seed_ecb.c
+ seed/seed_ofb.c
+ sha/sha1_one.c
+ sha/sha1dgst.c
+ sha/sha256.c
+ sha/sha512.c
+ siphash/siphash.c
+ siphash/siphash_ameth.c
+ siphash/siphash_pmeth.c
+ sm2/sm2_crypt.c
+ sm2/sm2_err.c
+ sm2/sm2_pmeth.c
+ sm2/sm2_sign.c
+ sm3/m_sm3.c
+ sm3/sm3.c
+ sm4/sm4.c
+ srp/srp_lib.c
+ srp/srp_vfy.c
+ stack/stack.c
+ store/loader_file.c
+ store/store_err.c
+ store/store_init.c
+ store/store_lib.c
+ store/store_register.c
+ store/store_strings.c
+ threads_none.c
+ threads_pthread.c
+ threads_win.c
+ ts/ts_asn1.c
+ ts/ts_conf.c
+ ts/ts_err.c
+ ts/ts_lib.c
+ ts/ts_req_print.c
+ ts/ts_req_utils.c
+ ts/ts_rsp_print.c
+ ts/ts_rsp_sign.c
+ ts/ts_rsp_utils.c
+ ts/ts_rsp_verify.c
+ ts/ts_verify_ctx.c
+ txt_db/txt_db.c
+ ui/ui_err.c
+ ui/ui_lib.c
+ ui/ui_null.c
+ ui/ui_openssl.c
+ ui/ui_util.c
+ uid.c
+ whrlpool/wp_dgst.c
+ x509/by_dir.c
+ x509/by_file.c
+ x509/t_crl.c
+ x509/t_req.c
+ x509/t_x509.c
+ x509/x509_att.c
+ x509/x509_cmp.c
+ x509/x509_d2.c
+ x509/x509_def.c
+ x509/x509_err.c
+ x509/x509_ext.c
+ x509/x509_lu.c
+ x509/x509_meth.c
+ x509/x509_obj.c
+ x509/x509_r2x.c
+ x509/x509_req.c
+ x509/x509_set.c
+ x509/x509_trs.c
+ x509/x509_txt.c
+ x509/x509_v3.c
+ x509/x509_vfy.c
+ x509/x509_vpm.c
+ x509/x509cset.c
+ x509/x509name.c
+ x509/x509rset.c
+ x509/x509spki.c
+ x509/x509type.c
+ x509/x_all.c
+ x509/x_attrib.c
+ x509/x_crl.c
+ x509/x_exten.c
+ x509/x_name.c
+ x509/x_pubkey.c
+ x509/x_req.c
+ x509/x_x509.c
+ x509/x_x509a.c
+ x509v3/pcy_cache.c
+ x509v3/pcy_data.c
+ x509v3/pcy_lib.c
+ x509v3/pcy_map.c
+ x509v3/pcy_node.c
+ x509v3/pcy_tree.c
+ x509v3/v3_addr.c
+ x509v3/v3_admis.c
+ x509v3/v3_akey.c
+ x509v3/v3_akeya.c
+ x509v3/v3_alt.c
+ x509v3/v3_asid.c
+ x509v3/v3_bcons.c
+ x509v3/v3_bitst.c
+ x509v3/v3_conf.c
+ x509v3/v3_cpols.c
+ x509v3/v3_crld.c
+ x509v3/v3_enum.c
+ x509v3/v3_extku.c
+ x509v3/v3_genn.c
+ x509v3/v3_ia5.c
+ x509v3/v3_info.c
+ x509v3/v3_int.c
+ x509v3/v3_lib.c
+ x509v3/v3_ncons.c
+ x509v3/v3_pci.c
+ x509v3/v3_pcia.c
+ x509v3/v3_pcons.c
+ x509v3/v3_pku.c
+ x509v3/v3_pmaps.c
+ x509v3/v3_prn.c
+ x509v3/v3_purp.c
+ x509v3/v3_skey.c
+ x509v3/v3_sxnet.c
+ x509v3/v3_tlsf.c
+ x509v3/v3_utl.c
+ x509v3/v3err.c
)
IF (NOT WINDOWS_I686)
@@ -860,57 +860,57 @@ IF (NOT IOS_I386 AND NOT ANDROID_I686 AND NOT WINDOWS_I686)
)
ENDIF()
-IF (OS_DARWIN AND ARCH_X86_64 OR OS_LINUX AND ARCH_X86_64 OR OS_WINDOWS AND ARCH_X86_64)
- SRCS(
- bn/rsaz_exp.c
- )
-ENDIF()
-
-IF (OS_DARWIN AND ARCH_X86_64 OR OS_LINUX AND ARCH_X86_64)
- SRCS(
- bn/asm/x86_64-gcc.c
- )
-ENDIF()
-
-IF (OS_LINUX AND ARCH_AARCH64 OR OS_WINDOWS AND ARCH_X86_64 OR OS_LINUX AND ARCH_PPC64LE)
- SRCS(
- bn/bn_asm.c
- )
-ENDIF()
-
-IF (OS_DARWIN AND ARCH_X86_64)
- SRCS(
- ../asm/darwin/crypto/aes/aesni-mb-x86_64.s
- ../asm/darwin/crypto/aes/aesni-sha1-x86_64.s
- ../asm/darwin/crypto/aes/aesni-sha256-x86_64.s
- ../asm/darwin/crypto/aes/aesni-x86_64.s
- ../asm/darwin/crypto/aes/vpaes-x86_64.s
- ../asm/darwin/crypto/bn/rsaz-avx2.s
- ../asm/darwin/crypto/bn/rsaz-x86_64.s
- ../asm/darwin/crypto/bn/x86_64-gf2m.s
- ../asm/darwin/crypto/bn/x86_64-mont.s
- ../asm/darwin/crypto/bn/x86_64-mont5.s
- ../asm/darwin/crypto/camellia/cmll-x86_64.s
- ../asm/darwin/crypto/chacha/chacha-x86_64.s
- ../asm/darwin/crypto/ec/ecp_nistz256-x86_64.s
- ../asm/darwin/crypto/ec/x25519-x86_64.s
- ../asm/darwin/crypto/md5/md5-x86_64.s
- ../asm/darwin/crypto/modes/aesni-gcm-x86_64.s
- ../asm/darwin/crypto/modes/ghash-x86_64.s
- ../asm/darwin/crypto/poly1305/poly1305-x86_64.s
- ../asm/darwin/crypto/rc4/rc4-md5-x86_64.s
- ../asm/darwin/crypto/rc4/rc4-x86_64.s
- ../asm/darwin/crypto/sha/keccak1600-x86_64.s
- ../asm/darwin/crypto/sha/sha1-mb-x86_64.s
- ../asm/darwin/crypto/sha/sha1-x86_64.s
- ../asm/darwin/crypto/sha/sha256-mb-x86_64.s
- ../asm/darwin/crypto/sha/sha256-x86_64.s
- ../asm/darwin/crypto/sha/sha512-x86_64.s
- ../asm/darwin/crypto/whrlpool/wp-x86_64.s
- ../asm/darwin/crypto/x86_64cpuid.s
- )
-ENDIF()
-
+IF (OS_DARWIN AND ARCH_X86_64 OR OS_LINUX AND ARCH_X86_64 OR OS_WINDOWS AND ARCH_X86_64)
+ SRCS(
+ bn/rsaz_exp.c
+ )
+ENDIF()
+
+IF (OS_DARWIN AND ARCH_X86_64 OR OS_LINUX AND ARCH_X86_64)
+ SRCS(
+ bn/asm/x86_64-gcc.c
+ )
+ENDIF()
+
+IF (OS_LINUX AND ARCH_AARCH64 OR OS_WINDOWS AND ARCH_X86_64 OR OS_LINUX AND ARCH_PPC64LE)
+ SRCS(
+ bn/bn_asm.c
+ )
+ENDIF()
+
+IF (OS_DARWIN AND ARCH_X86_64)
+ SRCS(
+ ../asm/darwin/crypto/aes/aesni-mb-x86_64.s
+ ../asm/darwin/crypto/aes/aesni-sha1-x86_64.s
+ ../asm/darwin/crypto/aes/aesni-sha256-x86_64.s
+ ../asm/darwin/crypto/aes/aesni-x86_64.s
+ ../asm/darwin/crypto/aes/vpaes-x86_64.s
+ ../asm/darwin/crypto/bn/rsaz-avx2.s
+ ../asm/darwin/crypto/bn/rsaz-x86_64.s
+ ../asm/darwin/crypto/bn/x86_64-gf2m.s
+ ../asm/darwin/crypto/bn/x86_64-mont.s
+ ../asm/darwin/crypto/bn/x86_64-mont5.s
+ ../asm/darwin/crypto/camellia/cmll-x86_64.s
+ ../asm/darwin/crypto/chacha/chacha-x86_64.s
+ ../asm/darwin/crypto/ec/ecp_nistz256-x86_64.s
+ ../asm/darwin/crypto/ec/x25519-x86_64.s
+ ../asm/darwin/crypto/md5/md5-x86_64.s
+ ../asm/darwin/crypto/modes/aesni-gcm-x86_64.s
+ ../asm/darwin/crypto/modes/ghash-x86_64.s
+ ../asm/darwin/crypto/poly1305/poly1305-x86_64.s
+ ../asm/darwin/crypto/rc4/rc4-md5-x86_64.s
+ ../asm/darwin/crypto/rc4/rc4-x86_64.s
+ ../asm/darwin/crypto/sha/keccak1600-x86_64.s
+ ../asm/darwin/crypto/sha/sha1-mb-x86_64.s
+ ../asm/darwin/crypto/sha/sha1-x86_64.s
+ ../asm/darwin/crypto/sha/sha256-mb-x86_64.s
+ ../asm/darwin/crypto/sha/sha256-x86_64.s
+ ../asm/darwin/crypto/sha/sha512-x86_64.s
+ ../asm/darwin/crypto/whrlpool/wp-x86_64.s
+ ../asm/darwin/crypto/x86_64cpuid.s
+ )
+ENDIF()
+
IF (OS_DARWIN AND ARCH_ARM64)
SRCS(
../asm/darwin-arm64/crypto/sha/keccak1600-armv8.S
@@ -980,92 +980,92 @@ IF (OS_LINUX AND ARCH_ARM7)
)
ENDIF()
-IF (OS_LINUX AND ARCH_AARCH64)
- SRCS(
- ../asm/aarch64/crypto/aes/aesv8-armx.S
- ../asm/aarch64/crypto/aes/vpaes-armv8.S
- ../asm/aarch64/crypto/arm64cpuid.S
- ../asm/aarch64/crypto/bn/armv8-mont.S
- ../asm/aarch64/crypto/chacha/chacha-armv8.S
- ../asm/aarch64/crypto/ec/ecp_nistz256-armv8.S
- ../asm/aarch64/crypto/modes/ghashv8-armx.S
- ../asm/aarch64/crypto/poly1305/poly1305-armv8.S
- ../asm/aarch64/crypto/sha/keccak1600-armv8.S
- ../asm/aarch64/crypto/sha/sha1-armv8.S
- ../asm/aarch64/crypto/sha/sha256-armv8.S
- ../asm/aarch64/crypto/sha/sha512-armv8.S
- armcap.c
- camellia/camellia.c
- camellia/cmll_cbc.c
- rc4/rc4_enc.c
- rc4/rc4_skey.c
- whrlpool/wp_block.c
- )
-ENDIF()
-
-IF (OS_LINUX AND ARCH_PPC64LE)
- SRCS(
- ../asm/ppc64le/crypto/aes/aesp8-ppc.s
- ../asm/ppc64le/crypto/aes/vpaes-ppc.s
- ../asm/ppc64le/crypto/bn/bn-ppc.s
- ../asm/ppc64le/crypto/bn/ppc-mont.s
- ../asm/ppc64le/crypto/chacha/chacha-ppc.s
- ../asm/ppc64le/crypto/ec/ecp_nistz256-ppc64.s
- ../asm/ppc64le/crypto/ec/x25519-ppc64.s
- ../asm/ppc64le/crypto/modes/ghashp8-ppc.s
- ../asm/ppc64le/crypto/poly1305/poly1305-ppc.s
- ../asm/ppc64le/crypto/poly1305/poly1305-ppcfp.s
- ../asm/ppc64le/crypto/ppccpuid.s
- ../asm/ppc64le/crypto/sha/keccak1600-ppc64.s
- ../asm/ppc64le/crypto/sha/sha1-ppc.s
- ../asm/ppc64le/crypto/sha/sha256-ppc.s
- ../asm/ppc64le/crypto/sha/sha256p8-ppc.s
- ../asm/ppc64le/crypto/sha/sha512-ppc.s
- ../asm/ppc64le/crypto/sha/sha512p8-ppc.s
- ppccap.c
- camellia/camellia.c
- camellia/cmll_cbc.c
- rc4/rc4_enc.c
- rc4/rc4_skey.c
- whrlpool/wp_block.c
- )
-ENDIF()
-
-IF (OS_LINUX AND ARCH_X86_64)
- SRCS(
- ../asm/linux/crypto/aes/aesni-mb-x86_64.s
- ../asm/linux/crypto/aes/aesni-sha1-x86_64.s
- ../asm/linux/crypto/aes/aesni-sha256-x86_64.s
- ../asm/linux/crypto/aes/aesni-x86_64.s
- ../asm/linux/crypto/aes/vpaes-x86_64.s
- ../asm/linux/crypto/bn/rsaz-avx2.s
- ../asm/linux/crypto/bn/rsaz-x86_64.s
- ../asm/linux/crypto/bn/x86_64-gf2m.s
- ../asm/linux/crypto/bn/x86_64-mont.s
- ../asm/linux/crypto/bn/x86_64-mont5.s
- ../asm/linux/crypto/camellia/cmll-x86_64.s
- ../asm/linux/crypto/chacha/chacha-x86_64.s
- ../asm/linux/crypto/ec/ecp_nistz256-x86_64.s
- ../asm/linux/crypto/ec/x25519-x86_64.s
- ../asm/linux/crypto/md5/md5-x86_64.s
- ../asm/linux/crypto/modes/aesni-gcm-x86_64.s
- ../asm/linux/crypto/modes/ghash-x86_64.s
- ../asm/linux/crypto/poly1305/poly1305-x86_64.s
- ../asm/linux/crypto/rc4/rc4-md5-x86_64.s
- ../asm/linux/crypto/rc4/rc4-x86_64.s
- ../asm/linux/crypto/sha/keccak1600-x86_64.s
- ../asm/linux/crypto/sha/sha1-mb-x86_64.s
- ../asm/linux/crypto/sha/sha1-x86_64.s
- ../asm/linux/crypto/sha/sha256-mb-x86_64.s
- ../asm/linux/crypto/sha/sha256-x86_64.s
- ../asm/linux/crypto/sha/sha512-x86_64.s
- ../asm/linux/crypto/whrlpool/wp-x86_64.s
- ../asm/linux/crypto/x86_64cpuid.s
- )
-ENDIF()
-
-IF (OS_WINDOWS AND ARCH_X86_64)
- SRCS(
+IF (OS_LINUX AND ARCH_AARCH64)
+ SRCS(
+ ../asm/aarch64/crypto/aes/aesv8-armx.S
+ ../asm/aarch64/crypto/aes/vpaes-armv8.S
+ ../asm/aarch64/crypto/arm64cpuid.S
+ ../asm/aarch64/crypto/bn/armv8-mont.S
+ ../asm/aarch64/crypto/chacha/chacha-armv8.S
+ ../asm/aarch64/crypto/ec/ecp_nistz256-armv8.S
+ ../asm/aarch64/crypto/modes/ghashv8-armx.S
+ ../asm/aarch64/crypto/poly1305/poly1305-armv8.S
+ ../asm/aarch64/crypto/sha/keccak1600-armv8.S
+ ../asm/aarch64/crypto/sha/sha1-armv8.S
+ ../asm/aarch64/crypto/sha/sha256-armv8.S
+ ../asm/aarch64/crypto/sha/sha512-armv8.S
+ armcap.c
+ camellia/camellia.c
+ camellia/cmll_cbc.c
+ rc4/rc4_enc.c
+ rc4/rc4_skey.c
+ whrlpool/wp_block.c
+ )
+ENDIF()
+
+IF (OS_LINUX AND ARCH_PPC64LE)
+ SRCS(
+ ../asm/ppc64le/crypto/aes/aesp8-ppc.s
+ ../asm/ppc64le/crypto/aes/vpaes-ppc.s
+ ../asm/ppc64le/crypto/bn/bn-ppc.s
+ ../asm/ppc64le/crypto/bn/ppc-mont.s
+ ../asm/ppc64le/crypto/chacha/chacha-ppc.s
+ ../asm/ppc64le/crypto/ec/ecp_nistz256-ppc64.s
+ ../asm/ppc64le/crypto/ec/x25519-ppc64.s
+ ../asm/ppc64le/crypto/modes/ghashp8-ppc.s
+ ../asm/ppc64le/crypto/poly1305/poly1305-ppc.s
+ ../asm/ppc64le/crypto/poly1305/poly1305-ppcfp.s
+ ../asm/ppc64le/crypto/ppccpuid.s
+ ../asm/ppc64le/crypto/sha/keccak1600-ppc64.s
+ ../asm/ppc64le/crypto/sha/sha1-ppc.s
+ ../asm/ppc64le/crypto/sha/sha256-ppc.s
+ ../asm/ppc64le/crypto/sha/sha256p8-ppc.s
+ ../asm/ppc64le/crypto/sha/sha512-ppc.s
+ ../asm/ppc64le/crypto/sha/sha512p8-ppc.s
+ ppccap.c
+ camellia/camellia.c
+ camellia/cmll_cbc.c
+ rc4/rc4_enc.c
+ rc4/rc4_skey.c
+ whrlpool/wp_block.c
+ )
+ENDIF()
+
+IF (OS_LINUX AND ARCH_X86_64)
+ SRCS(
+ ../asm/linux/crypto/aes/aesni-mb-x86_64.s
+ ../asm/linux/crypto/aes/aesni-sha1-x86_64.s
+ ../asm/linux/crypto/aes/aesni-sha256-x86_64.s
+ ../asm/linux/crypto/aes/aesni-x86_64.s
+ ../asm/linux/crypto/aes/vpaes-x86_64.s
+ ../asm/linux/crypto/bn/rsaz-avx2.s
+ ../asm/linux/crypto/bn/rsaz-x86_64.s
+ ../asm/linux/crypto/bn/x86_64-gf2m.s
+ ../asm/linux/crypto/bn/x86_64-mont.s
+ ../asm/linux/crypto/bn/x86_64-mont5.s
+ ../asm/linux/crypto/camellia/cmll-x86_64.s
+ ../asm/linux/crypto/chacha/chacha-x86_64.s
+ ../asm/linux/crypto/ec/ecp_nistz256-x86_64.s
+ ../asm/linux/crypto/ec/x25519-x86_64.s
+ ../asm/linux/crypto/md5/md5-x86_64.s
+ ../asm/linux/crypto/modes/aesni-gcm-x86_64.s
+ ../asm/linux/crypto/modes/ghash-x86_64.s
+ ../asm/linux/crypto/poly1305/poly1305-x86_64.s
+ ../asm/linux/crypto/rc4/rc4-md5-x86_64.s
+ ../asm/linux/crypto/rc4/rc4-x86_64.s
+ ../asm/linux/crypto/sha/keccak1600-x86_64.s
+ ../asm/linux/crypto/sha/sha1-mb-x86_64.s
+ ../asm/linux/crypto/sha/sha1-x86_64.s
+ ../asm/linux/crypto/sha/sha256-mb-x86_64.s
+ ../asm/linux/crypto/sha/sha256-x86_64.s
+ ../asm/linux/crypto/sha/sha512-x86_64.s
+ ../asm/linux/crypto/whrlpool/wp-x86_64.s
+ ../asm/linux/crypto/x86_64cpuid.s
+ )
+ENDIF()
+
+IF (OS_WINDOWS AND ARCH_X86_64)
+ SRCS(
../asm/windows/crypto/aes/aesni-mb-x86_64.masm
../asm/windows/crypto/aes/aesni-sha1-x86_64.masm
../asm/windows/crypto/aes/aesni-sha256-x86_64.masm
@@ -1095,9 +1095,9 @@ IF (OS_WINDOWS AND ARCH_X86_64)
../asm/windows/crypto/whrlpool/wp-x86_64.masm
../asm/windows/crypto/uplink-x86_64.masm
../asm/windows/crypto/x86_64cpuid.masm
- )
-ENDIF()
-
+ )
+ENDIF()
+
IF (OS_WINDOWS AND ARCH_I386)
CFLAGS(
-DGHASH_ASM