Subversion Repositories Kolibri OS

Rev

Details | Last modification | View Log | RSS feed

Rev Author Line No. Line
8774 rgimad 1
/**
2
 * \file dhm.h
3
 *
4
 * \brief   This file contains Diffie-Hellman-Merkle (DHM) key exchange
5
 *          definitions and functions.
6
 *
7
 * Diffie-Hellman-Merkle (DHM) key exchange is defined in
8
 * RFC-2631: Diffie-Hellman Key Agreement Method and
9
 * Public-Key Cryptography Standards (PKCS) #3: Diffie
10
 * Hellman Key Agreement Standard.
11
 *
12
 * RFC-3526: More Modular Exponential (MODP) Diffie-Hellman groups for
13
 * Internet Key Exchange (IKE) defines a number of standardized
14
 * Diffie-Hellman groups for IKE.
15
 *
16
 * RFC-5114: Additional Diffie-Hellman Groups for Use with IETF
17
 * Standards defines a number of standardized Diffie-Hellman
18
 * groups that can be used.
19
 *
20
 * \warning  The security of the DHM key exchange relies on the proper choice
21
 *           of prime modulus - optimally, it should be a safe prime. The usage
22
 *           of non-safe primes both decreases the difficulty of the underlying
23
 *           discrete logarithm problem and can lead to small subgroup attacks
24
 *           leaking private exponent bits when invalid public keys are used
25
 *           and not detected. This is especially relevant if the same DHM
26
 *           parameters are reused for multiple key exchanges as in static DHM,
27
 *           while the criticality of small-subgroup attacks is lower for
28
 *           ephemeral DHM.
29
 *
30
 * \warning  For performance reasons, the code does neither perform primality
31
 *           nor safe primality tests, nor the expensive checks for invalid
32
 *           subgroups. Moreover, even if these were performed, non-standardized
33
 *           primes cannot be trusted because of the possibility of backdoors
34
 *           that can't be effectively checked for.
35
 *
36
 * \warning  Diffie-Hellman-Merkle is therefore a security risk when not using
37
 *           standardized primes generated using a trustworthy ("nothing up
38
 *           my sleeve") method, such as the RFC 3526 / 7919 primes. In the TLS
39
 *           protocol, DH parameters need to be negotiated, so using the default
40
 *           primes systematically is not always an option. If possible, use
41
 *           Elliptic Curve Diffie-Hellman (ECDH), which has better performance,
42
 *           and for which the TLS protocol mandates the use of standard
43
 *           parameters.
44
 *
45
 */
46
/*
47
 *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved
48
 *  SPDX-License-Identifier: GPL-2.0
49
 *
50
 *  This program is free software; you can redistribute it and/or modify
51
 *  it under the terms of the GNU General Public License as published by
52
 *  the Free Software Foundation; either version 2 of the License, or
53
 *  (at your option) any later version.
54
 *
55
 *  This program is distributed in the hope that it will be useful,
56
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
57
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
58
 *  GNU General Public License for more details.
59
 *
60
 *  You should have received a copy of the GNU General Public License along
61
 *  with this program; if not, write to the Free Software Foundation, Inc.,
62
 *  51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
63
 *
64
 *  This file is part of Mbed TLS (https://tls.mbed.org)
65
 */
66
 
67
#ifndef MBEDTLS_DHM_H
68
#define MBEDTLS_DHM_H
69
 
70
#if !defined(MBEDTLS_CONFIG_FILE)
71
#include "config.h"
72
#else
73
#include MBEDTLS_CONFIG_FILE
74
#endif
75
#include "bignum.h"
76
 
77
/*
78
 * DHM Error codes
79
 */
80
#define MBEDTLS_ERR_DHM_BAD_INPUT_DATA                    -0x3080  /**< Bad input parameters. */
81
#define MBEDTLS_ERR_DHM_READ_PARAMS_FAILED                -0x3100  /**< Reading of the DHM parameters failed. */
82
#define MBEDTLS_ERR_DHM_MAKE_PARAMS_FAILED                -0x3180  /**< Making of the DHM parameters failed. */
83
#define MBEDTLS_ERR_DHM_READ_PUBLIC_FAILED                -0x3200  /**< Reading of the public values failed. */
84
#define MBEDTLS_ERR_DHM_MAKE_PUBLIC_FAILED                -0x3280  /**< Making of the public value failed. */
85
#define MBEDTLS_ERR_DHM_CALC_SECRET_FAILED                -0x3300  /**< Calculation of the DHM secret failed. */
86
#define MBEDTLS_ERR_DHM_INVALID_FORMAT                    -0x3380  /**< The ASN.1 data is not formatted correctly. */
87
#define MBEDTLS_ERR_DHM_ALLOC_FAILED                      -0x3400  /**< Allocation of memory failed. */
88
#define MBEDTLS_ERR_DHM_FILE_IO_ERROR                     -0x3480  /**< Read or write of file failed. */
89
 
90
/* MBEDTLS_ERR_DHM_HW_ACCEL_FAILED is deprecated and should not be used. */
91
#define MBEDTLS_ERR_DHM_HW_ACCEL_FAILED                   -0x3500  /**< DHM hardware accelerator failed. */
92
 
93
#define MBEDTLS_ERR_DHM_SET_GROUP_FAILED                  -0x3580  /**< Setting the modulus and generator failed. */
94
 
95
#ifdef __cplusplus
96
extern "C" {
97
#endif
98
 
99
#if !defined(MBEDTLS_DHM_ALT)
100
 
101
/**
102
 * \brief          The DHM context structure.
103
 */
104
typedef struct mbedtls_dhm_context
105
{
106
    size_t len;         /*!<  The size of \p P in Bytes. */
107
    mbedtls_mpi P;      /*!<  The prime modulus. */
108
    mbedtls_mpi G;      /*!<  The generator. */
109
    mbedtls_mpi X;      /*!<  Our secret value. */
110
    mbedtls_mpi GX;     /*!<  Our public key = \c G^X mod \c P. */
111
    mbedtls_mpi GY;     /*!<  The public key of the peer = \c G^Y mod \c P. */
112
    mbedtls_mpi K;      /*!<  The shared secret = \c G^(XY) mod \c P. */
113
    mbedtls_mpi RP;     /*!<  The cached value = \c R^2 mod \c P. */
114
    mbedtls_mpi Vi;     /*!<  The blinding value. */
115
    mbedtls_mpi Vf;     /*!<  The unblinding value. */
116
    mbedtls_mpi pX;     /*!<  The previous \c X. */
117
}
118
mbedtls_dhm_context;
119
 
120
#else /* MBEDTLS_DHM_ALT */
121
#include "dhm_alt.h"
122
#endif /* MBEDTLS_DHM_ALT */
123
 
124
/**
125
 * \brief          This function initializes the DHM context.
126
 *
127
 * \param ctx      The DHM context to initialize.
128
 */
129
void mbedtls_dhm_init( mbedtls_dhm_context *ctx );
130
 
131
/**
132
 * \brief          This function parses the DHM parameters in a
133
 *                 TLS ServerKeyExchange handshake message
134
 *                 (DHM modulus, generator, and public key).
135
 *
136
 * \note           In a TLS handshake, this is the how the client
137
 *                 sets up its DHM context from the server's public
138
 *                 DHM key material.
139
 *
140
 * \param ctx      The DHM context to use. This must be initialized.
141
 * \param p        On input, *p must be the start of the input buffer.
142
 *                 On output, *p is updated to point to the end of the data
143
 *                 that has been read. On success, this is the first byte
144
 *                 past the end of the ServerKeyExchange parameters.
145
 *                 On error, this is the point at which an error has been
146
 *                 detected, which is usually not useful except to debug
147
 *                 failures.
148
 * \param end      The end of the input buffer.
149
 *
150
 * \return         \c 0 on success.
151
 * \return         An \c MBEDTLS_ERR_DHM_XXX error code on failure.
152
 */
153
int mbedtls_dhm_read_params( mbedtls_dhm_context *ctx,
154
                             unsigned char **p,
155
                             const unsigned char *end );
156
 
157
/**
158
 * \brief          This function generates a DHM key pair and exports its
159
 *                 public part together with the DHM parameters in the format
160
 *                 used in a TLS ServerKeyExchange handshake message.
161
 *
162
 * \note           This function assumes that the DHM parameters \c ctx->P
163
 *                 and \c ctx->G have already been properly set. For that, use
164
 *                 mbedtls_dhm_set_group() below in conjunction with
165
 *                 mbedtls_mpi_read_binary() and mbedtls_mpi_read_string().
166
 *
167
 * \note           In a TLS handshake, this is the how the server generates
168
 *                 and exports its DHM key material.
169
 *
170
 * \param ctx      The DHM context to use. This must be initialized
171
 *                 and have the DHM parameters set. It may or may not
172
 *                 already have imported the peer's public key.
173
 * \param x_size   The private key size in Bytes.
174
 * \param olen     The address at which to store the number of Bytes
175
 *                 written on success. This must not be \c NULL.
176
 * \param output   The destination buffer. This must be a writable buffer of
177
 *                 sufficient size to hold the reduced binary presentation of
178
 *                 the modulus, the generator and the public key, each wrapped
179
 *                 with a 2-byte length field. It is the responsibility of the
180
 *                 caller to ensure that enough space is available. Refer to
181
 *                 mbedtls_mpi_size() to computing the byte-size of an MPI.
182
 * \param f_rng    The RNG function. Must not be \c NULL.
183
 * \param p_rng    The RNG context to be passed to \p f_rng. This may be
184
 *                 \c NULL if \p f_rng doesn't need a context parameter.
185
 *
186
 * \return         \c 0 on success.
187
 * \return         An \c MBEDTLS_ERR_DHM_XXX error code on failure.
188
 */
189
int mbedtls_dhm_make_params( mbedtls_dhm_context *ctx, int x_size,
190
                     unsigned char *output, size_t *olen,
191
                     int (*f_rng)(void *, unsigned char *, size_t),
192
                     void *p_rng );
193
 
194
/**
195
 * \brief          This function sets the prime modulus and generator.
196
 *
197
 * \note           This function can be used to set \c ctx->P, \c ctx->G
198
 *                 in preparation for mbedtls_dhm_make_params().
199
 *
200
 * \param ctx      The DHM context to configure. This must be initialized.
201
 * \param P        The MPI holding the DHM prime modulus. This must be
202
 *                 an initialized MPI.
203
 * \param G        The MPI holding the DHM generator. This must be an
204
 *                 initialized MPI.
205
 *
206
 * \return         \c 0 if successful.
207
 * \return         An \c MBEDTLS_ERR_DHM_XXX error code on failure.
208
 */
209
int mbedtls_dhm_set_group( mbedtls_dhm_context *ctx,
210
                           const mbedtls_mpi *P,
211
                           const mbedtls_mpi *G );
212
 
213
/**
214
 * \brief          This function imports the raw public value of the peer.
215
 *
216
 * \note           In a TLS handshake, this is the how the server imports
217
 *                 the Client's public DHM key.
218
 *
219
 * \param ctx      The DHM context to use. This must be initialized and have
220
 *                 its DHM parameters set, e.g. via mbedtls_dhm_set_group().
221
 *                 It may or may not already have generated its own private key.
222
 * \param input    The input buffer containing the \c G^Y value of the peer.
223
 *                 This must be a readable buffer of size \p ilen Bytes.
224
 * \param ilen     The size of the input buffer \p input in Bytes.
225
 *
226
 * \return         \c 0 on success.
227
 * \return         An \c MBEDTLS_ERR_DHM_XXX error code on failure.
228
 */
229
int mbedtls_dhm_read_public( mbedtls_dhm_context *ctx,
230
                     const unsigned char *input, size_t ilen );
231
 
232
/**
233
 * \brief          This function creates a DHM key pair and exports
234
 *                 the raw public key in big-endian format.
235
 *
236
 * \note           The destination buffer is always fully written
237
 *                 so as to contain a big-endian representation of G^X mod P.
238
 *                 If it is larger than \c ctx->len, it is padded accordingly
239
 *                 with zero-bytes at the beginning.
240
 *
241
 * \param ctx      The DHM context to use. This must be initialized and
242
 *                 have the DHM parameters set. It may or may not already
243
 *                 have imported the peer's public key.
244
 * \param x_size   The private key size in Bytes.
245
 * \param output   The destination buffer. This must be a writable buffer of
246
 *                 size \p olen Bytes.
247
 * \param olen     The length of the destination buffer. This must be at least
248
 *                 equal to `ctx->len` (the size of \c P).
249
 * \param f_rng    The RNG function. This must not be \c NULL.
250
 * \param p_rng    The RNG context to be passed to \p f_rng. This may be \c NULL
251
 *                 if \p f_rng doesn't need a context argument.
252
 *
253
 * \return         \c 0 on success.
254
 * \return         An \c MBEDTLS_ERR_DHM_XXX error code on failure.
255
 */
256
int mbedtls_dhm_make_public( mbedtls_dhm_context *ctx, int x_size,
257
                     unsigned char *output, size_t olen,
258
                     int (*f_rng)(void *, unsigned char *, size_t),
259
                     void *p_rng );
260
 
261
/**
262
 * \brief          This function derives and exports the shared secret
263
 *                 \c (G^Y)^X mod \c P.
264
 *
265
 * \note           If \p f_rng is not \c NULL, it is used to blind the input as
266
 *                 a countermeasure against timing attacks. Blinding is used
267
 *                 only if our private key \c X is re-used, and not used
268
 *                 otherwise. We recommend always passing a non-NULL
269
 *                 \p f_rng argument.
270
 *
271
 * \param ctx           The DHM context to use. This must be initialized
272
 *                      and have its own private key generated and the peer's
273
 *                      public key imported.
274
 * \param output        The buffer to write the generated shared key to. This
275
 *                      must be a writable buffer of size \p output_size Bytes.
276
 * \param output_size   The size of the destination buffer. This must be at
277
 *                      least the size of \c ctx->len (the size of \c P).
278
 * \param olen          On exit, holds the actual number of Bytes written.
279
 * \param f_rng         The RNG function, for blinding purposes. This may
280
 *                      b \c NULL if blinding isn't needed.
281
 * \param p_rng         The RNG context. This may be \c NULL if \p f_rng
282
 *                      doesn't need a context argument.
283
 *
284
 * \return              \c 0 on success.
285
 * \return              An \c MBEDTLS_ERR_DHM_XXX error code on failure.
286
 */
287
int mbedtls_dhm_calc_secret( mbedtls_dhm_context *ctx,
288
                     unsigned char *output, size_t output_size, size_t *olen,
289
                     int (*f_rng)(void *, unsigned char *, size_t),
290
                     void *p_rng );
291
 
292
/**
293
 * \brief          This function frees and clears the components
294
 *                 of a DHM context.
295
 *
296
 * \param ctx      The DHM context to free and clear. This may be \c NULL,
297
 *                 in which case this function is a no-op. If it is not \c NULL,
298
 *                 it must point to an initialized DHM context.
299
 */
300
void mbedtls_dhm_free( mbedtls_dhm_context *ctx );
301
 
302
#if defined(MBEDTLS_ASN1_PARSE_C)
303
/** \ingroup x509_module */
304
/**
305
 * \brief             This function parses DHM parameters in PEM or DER format.
306
 *
307
 * \param dhm         The DHM context to import the DHM parameters into.
308
 *                    This must be initialized.
309
 * \param dhmin       The input buffer. This must be a readable buffer of
310
 *                    length \p dhminlen Bytes.
311
 * \param dhminlen    The size of the input buffer \p dhmin, including the
312
 *                    terminating \c NULL Byte for PEM data.
313
 *
314
 * \return            \c 0 on success.
315
 * \return            An \c MBEDTLS_ERR_DHM_XXX or \c MBEDTLS_ERR_PEM_XXX error
316
 *                    code on failure.
317
 */
318
int mbedtls_dhm_parse_dhm( mbedtls_dhm_context *dhm, const unsigned char *dhmin,
319
                           size_t dhminlen );
320
 
321
#if defined(MBEDTLS_FS_IO)
322
/** \ingroup x509_module */
323
/**
324
 * \brief          This function loads and parses DHM parameters from a file.
325
 *
326
 * \param dhm      The DHM context to load the parameters to.
327
 *                 This must be initialized.
328
 * \param path     The filename to read the DHM parameters from.
329
 *                 This must not be \c NULL.
330
 *
331
 * \return         \c 0 on success.
332
 * \return         An \c MBEDTLS_ERR_DHM_XXX or \c MBEDTLS_ERR_PEM_XXX
333
 *                 error code on failure.
334
 */
335
int mbedtls_dhm_parse_dhmfile( mbedtls_dhm_context *dhm, const char *path );
336
#endif /* MBEDTLS_FS_IO */
337
#endif /* MBEDTLS_ASN1_PARSE_C */
338
 
339
#if defined(MBEDTLS_SELF_TEST)
340
 
341
/**
342
 * \brief          The DMH checkup routine.
343
 *
344
 * \return         \c 0 on success.
345
 * \return         \c 1 on failure.
346
 */
347
int mbedtls_dhm_self_test( int verbose );
348
 
349
#endif /* MBEDTLS_SELF_TEST */
350
#ifdef __cplusplus
351
}
352
#endif
353
 
354
/**
355
 * RFC 3526, RFC 5114 and RFC 7919 standardize a number of
356
 * Diffie-Hellman groups, some of which are included here
357
 * for use within the SSL/TLS module and the user's convenience
358
 * when configuring the Diffie-Hellman parameters by hand
359
 * through \c mbedtls_ssl_conf_dh_param.
360
 *
361
 * The following lists the source of the above groups in the standards:
362
 * - RFC 5114 section 2.2:  2048-bit MODP Group with 224-bit Prime Order Subgroup
363
 * - RFC 3526 section 3:    2048-bit MODP Group
364
 * - RFC 3526 section 4:    3072-bit MODP Group
365
 * - RFC 3526 section 5:    4096-bit MODP Group
366
 * - RFC 7919 section A.1:  ffdhe2048
367
 * - RFC 7919 section A.2:  ffdhe3072
368
 * - RFC 7919 section A.3:  ffdhe4096
369
 * - RFC 7919 section A.4:  ffdhe6144
370
 * - RFC 7919 section A.5:  ffdhe8192
371
 *
372
 * The constants with suffix "_p" denote the chosen prime moduli, while
373
 * the constants with suffix "_g" denote the chosen generator
374
 * of the associated prime field.
375
 *
376
 * The constants further suffixed with "_bin" are provided in binary format,
377
 * while all other constants represent null-terminated strings holding the
378
 * hexadecimal presentation of the respective numbers.
379
 *
380
 * The primes from RFC 3526 and RFC 7919 have been generating by the following
381
 * trust-worthy procedure:
382
 * - Fix N in { 2048, 3072, 4096, 6144, 8192 } and consider the N-bit number
383
 *   the first and last 64 bits are all 1, and the remaining N - 128 bits of
384
 *   which are 0x7ff...ff.
385
 * - Add the smallest multiple of the first N - 129 bits of the binary expansion
386
 *   of pi (for RFC 5236) or e (for RFC 7919) to this intermediate bit-string
387
 *   such that the resulting integer is a safe-prime.
388
 * - The result is the respective RFC 3526 / 7919 prime, and the corresponding
389
 *   generator is always chosen to be 2 (which is a square for these prime,
390
 *   hence the corresponding subgroup has order (p-1)/2 and avoids leaking a
391
 *   bit in the private exponent).
392
 *
393
 */
394
 
395
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
396
 
397
/**
398
 * \warning The origin of the primes in RFC 5114 is not documented and
399
 *          their use therefore constitutes a security risk!
400
 *
401
 * \deprecated The hex-encoded primes from RFC 5114 are deprecated and are
402
 *             likely to be removed in a future version of the library without
403
 *             replacement.
404
 */
405
 
406
/**
407
 * The hexadecimal presentation of the prime underlying the
408
 * 2048-bit MODP Group with 224-bit Prime Order Subgroup, as defined
409
 * in RFC-5114: Additional Diffie-Hellman Groups for Use with
410
 * IETF Standards.
411
 */
412
#define MBEDTLS_DHM_RFC5114_MODP_2048_P                         \
413
    MBEDTLS_DEPRECATED_STRING_CONSTANT(                         \
414
        "AD107E1E9123A9D0D660FAA79559C51FA20D64E5683B9FD1"      \
415
        "B54B1597B61D0A75E6FA141DF95A56DBAF9A3C407BA1DF15"      \
416
        "EB3D688A309C180E1DE6B85A1274A0A66D3F8152AD6AC212"      \
417
        "9037C9EDEFDA4DF8D91E8FEF55B7394B7AD5B7D0B6C12207"      \
418
        "C9F98D11ED34DBF6C6BA0B2C8BBC27BE6A00E0A0B9C49708"      \
419
        "B3BF8A317091883681286130BC8985DB1602E714415D9330"      \
420
        "278273C7DE31EFDC7310F7121FD5A07415987D9ADC0A486D"      \
421
        "CDF93ACC44328387315D75E198C641A480CD86A1B9E587E8"      \
422
        "BE60E69CC928B2B9C52172E413042E9B23F10B0E16E79763"      \
423
        "C9B53DCF4BA80A29E3FB73C16B8E75B97EF363E2FFA31F71"      \
424
        "CF9DE5384E71B81C0AC4DFFE0C10E64F" )
425
 
426
/**
427
 * The hexadecimal presentation of the chosen generator of the 2048-bit MODP
428
 * Group with 224-bit Prime Order Subgroup, as defined in RFC-5114:
429
 * Additional Diffie-Hellman Groups for Use with IETF Standards.
430
 */
431
#define MBEDTLS_DHM_RFC5114_MODP_2048_G                         \
432
    MBEDTLS_DEPRECATED_STRING_CONSTANT(                         \
433
        "AC4032EF4F2D9AE39DF30B5C8FFDAC506CDEBE7B89998CAF"      \
434
        "74866A08CFE4FFE3A6824A4E10B9A6F0DD921F01A70C4AFA"      \
435
        "AB739D7700C29F52C57DB17C620A8652BE5E9001A8D66AD7"      \
436
        "C17669101999024AF4D027275AC1348BB8A762D0521BC98A"      \
437
        "E247150422EA1ED409939D54DA7460CDB5F6C6B250717CBE"      \
438
        "F180EB34118E98D119529A45D6F834566E3025E316A330EF"      \
439
        "BB77A86F0C1AB15B051AE3D428C8F8ACB70A8137150B8EEB"      \
440
        "10E183EDD19963DDD9E263E4770589EF6AA21E7F5F2FF381"      \
441
        "B539CCE3409D13CD566AFBB48D6C019181E1BCFE94B30269"      \
442
        "EDFE72FE9B6AA4BD7B5A0F1C71CFFF4C19C418E1F6EC0179"      \
443
        "81BC087F2A7065B384B890D3191F2BFA" )
444
 
445
/**
446
 * The hexadecimal presentation of the prime underlying the 2048-bit MODP
447
 * Group, as defined in RFC-3526: More Modular Exponential (MODP)
448
 * Diffie-Hellman groups for Internet Key Exchange (IKE).
449
 *
450
 * \deprecated The hex-encoded primes from RFC 3625 are deprecated and
451
 *             superseded by the corresponding macros providing them as
452
 *             binary constants. Their hex-encoded constants are likely
453
 *             to be removed in a future version of the library.
454
 *
455
 */
456
#define MBEDTLS_DHM_RFC3526_MODP_2048_P                         \
457
    MBEDTLS_DEPRECATED_STRING_CONSTANT(                         \
458
        "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1"      \
459
        "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"      \
460
        "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245"      \
461
        "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"      \
462
        "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D"      \
463
        "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"      \
464
        "83655D23DCA3AD961C62F356208552BB9ED529077096966D"      \
465
        "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"      \
466
        "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9"      \
467
        "DE2BCBF6955817183995497CEA956AE515D2261898FA0510"      \
468
        "15728E5A8AACAA68FFFFFFFFFFFFFFFF" )
469
 
470
/**
471
 * The hexadecimal presentation of the chosen generator of the 2048-bit MODP
472
 * Group, as defined in RFC-3526: More Modular Exponential (MODP)
473
 * Diffie-Hellman groups for Internet Key Exchange (IKE).
474
 */
475
#define MBEDTLS_DHM_RFC3526_MODP_2048_G                         \
476
    MBEDTLS_DEPRECATED_STRING_CONSTANT( "02" )
477
 
478
/**
479
 * The hexadecimal presentation of the prime underlying the 3072-bit MODP
480
 * Group, as defined in RFC-3072: More Modular Exponential (MODP)
481
 * Diffie-Hellman groups for Internet Key Exchange (IKE).
482
 */
483
#define MBEDTLS_DHM_RFC3526_MODP_3072_P                         \
484
    MBEDTLS_DEPRECATED_STRING_CONSTANT(                         \
485
        "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1"      \
486
        "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"      \
487
        "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245"      \
488
        "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"      \
489
        "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D"      \
490
        "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"      \
491
        "83655D23DCA3AD961C62F356208552BB9ED529077096966D"      \
492
        "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"      \
493
        "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9"      \
494
        "DE2BCBF6955817183995497CEA956AE515D2261898FA0510"      \
495
        "15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64"      \
496
        "ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7"      \
497
        "ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B"      \
498
        "F12FFA06D98A0864D87602733EC86A64521F2B18177B200C"      \
499
        "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31"      \
500
        "43DB5BFCE0FD108E4B82D120A93AD2CAFFFFFFFFFFFFFFFF" )
501
 
502
/**
503
 * The hexadecimal presentation of the chosen generator of the 3072-bit MODP
504
 * Group, as defined in RFC-3526: More Modular Exponential (MODP)
505
 * Diffie-Hellman groups for Internet Key Exchange (IKE).
506
 */
507
#define MBEDTLS_DHM_RFC3526_MODP_3072_G                      \
508
    MBEDTLS_DEPRECATED_STRING_CONSTANT( "02" )
509
 
510
/**
511
 * The hexadecimal presentation of the prime underlying the 4096-bit MODP
512
 * Group, as defined in RFC-3526: More Modular Exponential (MODP)
513
 * Diffie-Hellman groups for Internet Key Exchange (IKE).
514
 */
515
#define MBEDTLS_DHM_RFC3526_MODP_4096_P                      \
516
    MBEDTLS_DEPRECATED_STRING_CONSTANT(                      \
517
        "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1"   \
518
        "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"   \
519
        "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245"   \
520
        "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"   \
521
        "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D"   \
522
        "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"   \
523
        "83655D23DCA3AD961C62F356208552BB9ED529077096966D"   \
524
        "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"   \
525
        "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9"   \
526
        "DE2BCBF6955817183995497CEA956AE515D2261898FA0510"   \
527
        "15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64"   \
528
        "ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7"   \
529
        "ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B"   \
530
        "F12FFA06D98A0864D87602733EC86A64521F2B18177B200C"   \
531
        "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31"   \
532
        "43DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D7"   \
533
        "88719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA"   \
534
        "2583E9CA2AD44CE8DBBBC2DB04DE8EF92E8EFC141FBECAA6"   \
535
        "287C59474E6BC05D99B2964FA090C3A2233BA186515BE7ED"   \
536
        "1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA9"   \
537
        "93B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934063199"   \
538
        "FFFFFFFFFFFFFFFF" )
539
 
540
/**
541
 * The hexadecimal presentation of the chosen generator of the 4096-bit MODP
542
 * Group, as defined in RFC-3526: More Modular Exponential (MODP)
543
 * Diffie-Hellman groups for Internet Key Exchange (IKE).
544
 */
545
#define MBEDTLS_DHM_RFC3526_MODP_4096_G                      \
546
    MBEDTLS_DEPRECATED_STRING_CONSTANT( "02" )
547
 
548
#endif /* MBEDTLS_DEPRECATED_REMOVED */
549
 
550
/*
551
 * Trustworthy DHM parameters in binary form
552
 */
553
 
554
#define MBEDTLS_DHM_RFC3526_MODP_2048_P_BIN {        \
555
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \
556
     0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, \
557
     0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, \
558
     0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, \
559
     0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, \
560
     0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, \
561
     0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, \
562
     0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, \
563
     0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, \
564
     0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, \
565
     0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, \
566
     0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, \
567
     0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, \
568
     0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, \
569
     0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, \
570
     0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, \
571
     0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, \
572
     0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, \
573
     0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, \
574
     0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, \
575
     0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, \
576
     0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, \
577
     0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, \
578
     0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, \
579
     0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, \
580
     0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, \
581
     0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, \
582
     0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, \
583
     0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, \
584
     0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, \
585
     0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAC, 0xAA, 0x68, \
586
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }
587
 
588
#define MBEDTLS_DHM_RFC3526_MODP_2048_G_BIN { 0x02 }
589
 
590
#define MBEDTLS_DHM_RFC3526_MODP_3072_P_BIN {       \
591
    0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \
592
    0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, \
593
    0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, \
594
    0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, \
595
    0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, \
596
    0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, \
597
    0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, \
598
    0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, \
599
    0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, \
600
    0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, \
601
    0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, \
602
    0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, \
603
    0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, \
604
    0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, \
605
    0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, \
606
    0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, \
607
    0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, \
608
    0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, \
609
    0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, \
610
    0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, \
611
    0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, \
612
    0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, \
613
    0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, \
614
    0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, \
615
    0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, \
616
    0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, \
617
    0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, \
618
    0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, \
619
    0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, \
620
    0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, \
621
    0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D, \
622
    0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33, \
623
    0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64, \
624
    0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A, \
625
    0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D, \
626
    0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7, \
627
    0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7, \
628
    0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D, \
629
    0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B, \
630
    0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64, \
631
    0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64, \
632
    0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C, \
633
    0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C, \
634
    0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2, \
635
    0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31, \
636
    0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E, \
637
    0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x3A, 0xD2, 0xCA, \
638
    0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }
639
 
640
#define MBEDTLS_DHM_RFC3526_MODP_3072_G_BIN { 0x02 }
641
 
642
#define MBEDTLS_DHM_RFC3526_MODP_4096_P_BIN  {       \
643
    0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,  \
644
    0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34,  \
645
    0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1,  \
646
    0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74,  \
647
    0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22,  \
648
    0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD,  \
649
    0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B,  \
650
    0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37,  \
651
    0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45,  \
652
    0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6,  \
653
    0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B,  \
654
    0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED,  \
655
    0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5,  \
656
    0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6,  \
657
    0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D,  \
658
    0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05,  \
659
    0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A,  \
660
    0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F,  \
661
    0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96,  \
662
    0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB,  \
663
    0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D,  \
664
    0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04,  \
665
    0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C,  \
666
    0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B,  \
667
    0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03,  \
668
    0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F,  \
669
    0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9,  \
670
    0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18,  \
671
    0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5,  \
672
    0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10,  \
673
    0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D,  \
674
    0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33,  \
675
    0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64,  \
676
    0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A,  \
677
    0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D,  \
678
    0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7,  \
679
    0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7,  \
680
    0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D,  \
681
    0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B,  \
682
    0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64,  \
683
    0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64,  \
684
    0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C,  \
685
    0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C,  \
686
    0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2,  \
687
    0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31,  \
688
    0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E,  \
689
    0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x21, 0x08, 0x01,  \
690
    0x1A, 0x72, 0x3C, 0x12, 0xA7, 0x87, 0xE6, 0xD7,  \
691
    0x88, 0x71, 0x9A, 0x10, 0xBD, 0xBA, 0x5B, 0x26,  \
692
    0x99, 0xC3, 0x27, 0x18, 0x6A, 0xF4, 0xE2, 0x3C,  \
693
    0x1A, 0x94, 0x68, 0x34, 0xB6, 0x15, 0x0B, 0xDA,  \
694
    0x25, 0x83, 0xE9, 0xCA, 0x2A, 0xD4, 0x4C, 0xE8,  \
695
    0xDB, 0xBB, 0xC2, 0xDB, 0x04, 0xDE, 0x8E, 0xF9,  \
696
    0x2E, 0x8E, 0xFC, 0x14, 0x1F, 0xBE, 0xCA, 0xA6,  \
697
    0x28, 0x7C, 0x59, 0x47, 0x4E, 0x6B, 0xC0, 0x5D,  \
698
    0x99, 0xB2, 0x96, 0x4F, 0xA0, 0x90, 0xC3, 0xA2,  \
699
    0x23, 0x3B, 0xA1, 0x86, 0x51, 0x5B, 0xE7, 0xED,  \
700
    0x1F, 0x61, 0x29, 0x70, 0xCE, 0xE2, 0xD7, 0xAF,  \
701
    0xB8, 0x1B, 0xDD, 0x76, 0x21, 0x70, 0x48, 0x1C,  \
702
    0xD0, 0x06, 0x91, 0x27, 0xD5, 0xB0, 0x5A, 0xA9,  \
703
    0x93, 0xB4, 0xEA, 0x98, 0x8D, 0x8F, 0xDD, 0xC1,  \
704
    0x86, 0xFF, 0xB7, 0xDC, 0x90, 0xA6, 0xC0, 0x8F,  \
705
    0x4D, 0xF4, 0x35, 0xC9, 0x34, 0x06, 0x31, 0x99,  \
706
    0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }
707
 
708
#define MBEDTLS_DHM_RFC3526_MODP_4096_G_BIN { 0x02 }
709
 
710
#define MBEDTLS_DHM_RFC7919_FFDHE2048_P_BIN {        \
711
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \
712
     0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \
713
     0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \
714
     0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \
715
     0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \
716
     0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \
717
     0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \
718
     0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \
719
     0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \
720
     0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \
721
     0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \
722
     0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \
723
     0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \
724
     0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \
725
     0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \
726
     0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \
727
     0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \
728
     0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \
729
     0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \
730
     0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \
731
     0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \
732
     0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \
733
     0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \
734
     0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \
735
     0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \
736
     0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \
737
     0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \
738
     0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \
739
     0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \
740
     0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \
741
     0x88, 0x6B, 0x42, 0x38, 0x61, 0x28, 0x5C, 0x97, \
742
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, }
743
 
744
#define MBEDTLS_DHM_RFC7919_FFDHE2048_G_BIN { 0x02 }
745
 
746
#define MBEDTLS_DHM_RFC7919_FFDHE3072_P_BIN { \
747
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \
748
     0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \
749
     0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \
750
     0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \
751
     0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \
752
     0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \
753
     0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \
754
     0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \
755
     0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \
756
     0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \
757
     0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \
758
     0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \
759
     0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \
760
     0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \
761
     0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \
762
     0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \
763
     0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \
764
     0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \
765
     0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \
766
     0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \
767
     0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \
768
     0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \
769
     0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \
770
     0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \
771
     0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \
772
     0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \
773
     0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \
774
     0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \
775
     0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \
776
     0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \
777
     0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, \
778
     0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, \
779
     0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, \
780
     0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, \
781
     0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, \
782
     0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, \
783
     0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, \
784
     0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, \
785
     0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, \
786
     0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, \
787
     0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, \
788
     0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, \
789
     0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, \
790
     0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, \
791
     0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, \
792
     0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, \
793
     0x25, 0xE4, 0x1D, 0x2B, 0x66, 0xC6, 0x2E, 0x37, \
794
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }
795
 
796
#define MBEDTLS_DHM_RFC7919_FFDHE3072_G_BIN { 0x02 }
797
 
798
#define MBEDTLS_DHM_RFC7919_FFDHE4096_P_BIN {        \
799
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \
800
     0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \
801
     0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \
802
     0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \
803
     0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \
804
     0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \
805
     0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \
806
     0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \
807
     0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \
808
     0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \
809
     0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \
810
     0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \
811
     0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \
812
     0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \
813
     0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \
814
     0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \
815
     0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \
816
     0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \
817
     0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \
818
     0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \
819
     0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \
820
     0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \
821
     0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \
822
     0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \
823
     0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \
824
     0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \
825
     0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \
826
     0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \
827
     0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \
828
     0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \
829
     0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, \
830
     0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, \
831
     0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, \
832
     0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, \
833
     0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, \
834
     0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, \
835
     0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, \
836
     0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, \
837
     0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, \
838
     0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, \
839
     0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, \
840
     0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, \
841
     0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, \
842
     0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, \
843
     0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, \
844
     0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, \
845
     0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, \
846
     0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, \
847
     0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, \
848
     0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, \
849
     0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, \
850
     0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, \
851
     0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, \
852
     0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, \
853
     0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, \
854
     0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, \
855
     0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, \
856
     0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, \
857
     0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, \
858
     0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, \
859
     0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, \
860
     0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, \
861
     0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x65, 0x5F, 0x6A, \
862
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }
863
 
864
#define MBEDTLS_DHM_RFC7919_FFDHE4096_G_BIN { 0x02 }
865
 
866
#define MBEDTLS_DHM_RFC7919_FFDHE6144_P_BIN {        \
867
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \
868
     0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \
869
     0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \
870
     0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \
871
     0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \
872
     0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \
873
     0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \
874
     0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \
875
     0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \
876
     0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \
877
     0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \
878
     0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \
879
     0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \
880
     0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \
881
     0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \
882
     0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \
883
     0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \
884
     0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \
885
     0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \
886
     0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \
887
     0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \
888
     0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \
889
     0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \
890
     0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \
891
     0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \
892
     0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \
893
     0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \
894
     0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \
895
     0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \
896
     0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \
897
     0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, \
898
     0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, \
899
     0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, \
900
     0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, \
901
     0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, \
902
     0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, \
903
     0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, \
904
     0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, \
905
     0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, \
906
     0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, \
907
     0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, \
908
     0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, \
909
     0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, \
910
     0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, \
911
     0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, \
912
     0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, \
913
     0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, \
914
     0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, \
915
     0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, \
916
     0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, \
917
     0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, \
918
     0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, \
919
     0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, \
920
     0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, \
921
     0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, \
922
     0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, \
923
     0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, \
924
     0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, \
925
     0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, \
926
     0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, \
927
     0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, \
928
     0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, \
929
     0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x0D, 0xD9, 0x02, \
930
     0x0B, 0xFD, 0x64, 0xB6, 0x45, 0x03, 0x6C, 0x7A, \
931
     0x4E, 0x67, 0x7D, 0x2C, 0x38, 0x53, 0x2A, 0x3A, \
932
     0x23, 0xBA, 0x44, 0x42, 0xCA, 0xF5, 0x3E, 0xA6, \
933
     0x3B, 0xB4, 0x54, 0x32, 0x9B, 0x76, 0x24, 0xC8, \
934
     0x91, 0x7B, 0xDD, 0x64, 0xB1, 0xC0, 0xFD, 0x4C, \
935
     0xB3, 0x8E, 0x8C, 0x33, 0x4C, 0x70, 0x1C, 0x3A, \
936
     0xCD, 0xAD, 0x06, 0x57, 0xFC, 0xCF, 0xEC, 0x71, \
937
     0x9B, 0x1F, 0x5C, 0x3E, 0x4E, 0x46, 0x04, 0x1F, \
938
     0x38, 0x81, 0x47, 0xFB, 0x4C, 0xFD, 0xB4, 0x77, \
939
     0xA5, 0x24, 0x71, 0xF7, 0xA9, 0xA9, 0x69, 0x10, \
940
     0xB8, 0x55, 0x32, 0x2E, 0xDB, 0x63, 0x40, 0xD8, \
941
     0xA0, 0x0E, 0xF0, 0x92, 0x35, 0x05, 0x11, 0xE3, \
942
     0x0A, 0xBE, 0xC1, 0xFF, 0xF9, 0xE3, 0xA2, 0x6E, \
943
     0x7F, 0xB2, 0x9F, 0x8C, 0x18, 0x30, 0x23, 0xC3, \
944
     0x58, 0x7E, 0x38, 0xDA, 0x00, 0x77, 0xD9, 0xB4, \
945
     0x76, 0x3E, 0x4E, 0x4B, 0x94, 0xB2, 0xBB, 0xC1, \
946
     0x94, 0xC6, 0x65, 0x1E, 0x77, 0xCA, 0xF9, 0x92, \
947
     0xEE, 0xAA, 0xC0, 0x23, 0x2A, 0x28, 0x1B, 0xF6, \
948
     0xB3, 0xA7, 0x39, 0xC1, 0x22, 0x61, 0x16, 0x82, \
949
     0x0A, 0xE8, 0xDB, 0x58, 0x47, 0xA6, 0x7C, 0xBE, \
950
     0xF9, 0xC9, 0x09, 0x1B, 0x46, 0x2D, 0x53, 0x8C, \
951
     0xD7, 0x2B, 0x03, 0x74, 0x6A, 0xE7, 0x7F, 0x5E, \
952
     0x62, 0x29, 0x2C, 0x31, 0x15, 0x62, 0xA8, 0x46, \
953
     0x50, 0x5D, 0xC8, 0x2D, 0xB8, 0x54, 0x33, 0x8A, \
954
     0xE4, 0x9F, 0x52, 0x35, 0xC9, 0x5B, 0x91, 0x17, \
955
     0x8C, 0xCF, 0x2D, 0xD5, 0xCA, 0xCE, 0xF4, 0x03, \
956
     0xEC, 0x9D, 0x18, 0x10, 0xC6, 0x27, 0x2B, 0x04, \
957
     0x5B, 0x3B, 0x71, 0xF9, 0xDC, 0x6B, 0x80, 0xD6, \
958
     0x3F, 0xDD, 0x4A, 0x8E, 0x9A, 0xDB, 0x1E, 0x69, \
959
     0x62, 0xA6, 0x95, 0x26, 0xD4, 0x31, 0x61, 0xC1, \
960
     0xA4, 0x1D, 0x57, 0x0D, 0x79, 0x38, 0xDA, 0xD4, \
961
     0xA4, 0x0E, 0x32, 0x9C, 0xD0, 0xE4, 0x0E, 0x65, \
962
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }
963
 
964
#define MBEDTLS_DHM_RFC7919_FFDHE6144_G_BIN { 0x02 }
965
 
966
#define MBEDTLS_DHM_RFC7919_FFDHE8192_P_BIN {        \
967
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \
968
     0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \
969
     0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \
970
     0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \
971
     0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \
972
     0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \
973
     0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \
974
     0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \
975
     0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \
976
     0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \
977
     0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \
978
     0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \
979
     0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \
980
     0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \
981
     0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \
982
     0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \
983
     0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \
984
     0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \
985
     0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \
986
     0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \
987
     0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \
988
     0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \
989
     0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \
990
     0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \
991
     0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \
992
     0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \
993
     0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \
994
     0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \
995
     0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \
996
     0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \
997
     0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, \
998
     0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, \
999
     0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, \
1000
     0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, \
1001
     0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, \
1002
     0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, \
1003
     0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, \
1004
     0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, \
1005
     0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, \
1006
     0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, \
1007
     0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, \
1008
     0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, \
1009
     0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, \
1010
     0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, \
1011
     0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, \
1012
     0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, \
1013
     0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, \
1014
     0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, \
1015
     0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, \
1016
     0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, \
1017
     0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, \
1018
     0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, \
1019
     0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, \
1020
     0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, \
1021
     0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, \
1022
     0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, \
1023
     0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, \
1024
     0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, \
1025
     0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, \
1026
     0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, \
1027
     0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, \
1028
     0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, \
1029
     0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x0D, 0xD9, 0x02, \
1030
     0x0B, 0xFD, 0x64, 0xB6, 0x45, 0x03, 0x6C, 0x7A, \
1031
     0x4E, 0x67, 0x7D, 0x2C, 0x38, 0x53, 0x2A, 0x3A, \
1032
     0x23, 0xBA, 0x44, 0x42, 0xCA, 0xF5, 0x3E, 0xA6, \
1033
     0x3B, 0xB4, 0x54, 0x32, 0x9B, 0x76, 0x24, 0xC8, \
1034
     0x91, 0x7B, 0xDD, 0x64, 0xB1, 0xC0, 0xFD, 0x4C, \
1035
     0xB3, 0x8E, 0x8C, 0x33, 0x4C, 0x70, 0x1C, 0x3A, \
1036
     0xCD, 0xAD, 0x06, 0x57, 0xFC, 0xCF, 0xEC, 0x71, \
1037
     0x9B, 0x1F, 0x5C, 0x3E, 0x4E, 0x46, 0x04, 0x1F, \
1038
     0x38, 0x81, 0x47, 0xFB, 0x4C, 0xFD, 0xB4, 0x77, \
1039
     0xA5, 0x24, 0x71, 0xF7, 0xA9, 0xA9, 0x69, 0x10, \
1040
     0xB8, 0x55, 0x32, 0x2E, 0xDB, 0x63, 0x40, 0xD8, \
1041
     0xA0, 0x0E, 0xF0, 0x92, 0x35, 0x05, 0x11, 0xE3, \
1042
     0x0A, 0xBE, 0xC1, 0xFF, 0xF9, 0xE3, 0xA2, 0x6E, \
1043
     0x7F, 0xB2, 0x9F, 0x8C, 0x18, 0x30, 0x23, 0xC3, \
1044
     0x58, 0x7E, 0x38, 0xDA, 0x00, 0x77, 0xD9, 0xB4, \
1045
     0x76, 0x3E, 0x4E, 0x4B, 0x94, 0xB2, 0xBB, 0xC1, \
1046
     0x94, 0xC6, 0x65, 0x1E, 0x77, 0xCA, 0xF9, 0x92, \
1047
     0xEE, 0xAA, 0xC0, 0x23, 0x2A, 0x28, 0x1B, 0xF6, \
1048
     0xB3, 0xA7, 0x39, 0xC1, 0x22, 0x61, 0x16, 0x82, \
1049
     0x0A, 0xE8, 0xDB, 0x58, 0x47, 0xA6, 0x7C, 0xBE, \
1050
     0xF9, 0xC9, 0x09, 0x1B, 0x46, 0x2D, 0x53, 0x8C, \
1051
     0xD7, 0x2B, 0x03, 0x74, 0x6A, 0xE7, 0x7F, 0x5E, \
1052
     0x62, 0x29, 0x2C, 0x31, 0x15, 0x62, 0xA8, 0x46, \
1053
     0x50, 0x5D, 0xC8, 0x2D, 0xB8, 0x54, 0x33, 0x8A, \
1054
     0xE4, 0x9F, 0x52, 0x35, 0xC9, 0x5B, 0x91, 0x17, \
1055
     0x8C, 0xCF, 0x2D, 0xD5, 0xCA, 0xCE, 0xF4, 0x03, \
1056
     0xEC, 0x9D, 0x18, 0x10, 0xC6, 0x27, 0x2B, 0x04, \
1057
     0x5B, 0x3B, 0x71, 0xF9, 0xDC, 0x6B, 0x80, 0xD6, \
1058
     0x3F, 0xDD, 0x4A, 0x8E, 0x9A, 0xDB, 0x1E, 0x69, \
1059
     0x62, 0xA6, 0x95, 0x26, 0xD4, 0x31, 0x61, 0xC1, \
1060
     0xA4, 0x1D, 0x57, 0x0D, 0x79, 0x38, 0xDA, 0xD4, \
1061
     0xA4, 0x0E, 0x32, 0x9C, 0xCF, 0xF4, 0x6A, 0xAA, \
1062
     0x36, 0xAD, 0x00, 0x4C, 0xF6, 0x00, 0xC8, 0x38, \
1063
     0x1E, 0x42, 0x5A, 0x31, 0xD9, 0x51, 0xAE, 0x64, \
1064
     0xFD, 0xB2, 0x3F, 0xCE, 0xC9, 0x50, 0x9D, 0x43, \
1065
     0x68, 0x7F, 0xEB, 0x69, 0xED, 0xD1, 0xCC, 0x5E, \
1066
     0x0B, 0x8C, 0xC3, 0xBD, 0xF6, 0x4B, 0x10, 0xEF, \
1067
     0x86, 0xB6, 0x31, 0x42, 0xA3, 0xAB, 0x88, 0x29, \
1068
     0x55, 0x5B, 0x2F, 0x74, 0x7C, 0x93, 0x26, 0x65, \
1069
     0xCB, 0x2C, 0x0F, 0x1C, 0xC0, 0x1B, 0xD7, 0x02, \
1070
     0x29, 0x38, 0x88, 0x39, 0xD2, 0xAF, 0x05, 0xE4, \
1071
     0x54, 0x50, 0x4A, 0xC7, 0x8B, 0x75, 0x82, 0x82, \
1072
     0x28, 0x46, 0xC0, 0xBA, 0x35, 0xC3, 0x5F, 0x5C, \
1073
     0x59, 0x16, 0x0C, 0xC0, 0x46, 0xFD, 0x82, 0x51, \
1074
     0x54, 0x1F, 0xC6, 0x8C, 0x9C, 0x86, 0xB0, 0x22, \
1075
     0xBB, 0x70, 0x99, 0x87, 0x6A, 0x46, 0x0E, 0x74, \
1076
     0x51, 0xA8, 0xA9, 0x31, 0x09, 0x70, 0x3F, 0xEE, \
1077
     0x1C, 0x21, 0x7E, 0x6C, 0x38, 0x26, 0xE5, 0x2C, \
1078
     0x51, 0xAA, 0x69, 0x1E, 0x0E, 0x42, 0x3C, 0xFC, \
1079
     0x99, 0xE9, 0xE3, 0x16, 0x50, 0xC1, 0x21, 0x7B, \
1080
     0x62, 0x48, 0x16, 0xCD, 0xAD, 0x9A, 0x95, 0xF9, \
1081
     0xD5, 0xB8, 0x01, 0x94, 0x88, 0xD9, 0xC0, 0xA0, \
1082
     0xA1, 0xFE, 0x30, 0x75, 0xA5, 0x77, 0xE2, 0x31, \
1083
     0x83, 0xF8, 0x1D, 0x4A, 0x3F, 0x2F, 0xA4, 0x57, \
1084
     0x1E, 0xFC, 0x8C, 0xE0, 0xBA, 0x8A, 0x4F, 0xE8, \
1085
     0xB6, 0x85, 0x5D, 0xFE, 0x72, 0xB0, 0xA6, 0x6E, \
1086
     0xDE, 0xD2, 0xFB, 0xAB, 0xFB, 0xE5, 0x8A, 0x30, \
1087
     0xFA, 0xFA, 0xBE, 0x1C, 0x5D, 0x71, 0xA8, 0x7E, \
1088
     0x2F, 0x74, 0x1E, 0xF8, 0xC1, 0xFE, 0x86, 0xFE, \
1089
     0xA6, 0xBB, 0xFD, 0xE5, 0x30, 0x67, 0x7F, 0x0D, \
1090
     0x97, 0xD1, 0x1D, 0x49, 0xF7, 0xA8, 0x44, 0x3D, \
1091
     0x08, 0x22, 0xE5, 0x06, 0xA9, 0xF4, 0x61, 0x4E, \
1092
     0x01, 0x1E, 0x2A, 0x94, 0x83, 0x8F, 0xF8, 0x8C, \
1093
     0xD6, 0x8C, 0x8B, 0xB7, 0xC5, 0xC6, 0x42, 0x4C, \
1094
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }
1095
 
1096
#define MBEDTLS_DHM_RFC7919_FFDHE8192_G_BIN { 0x02 }
1097
 
1098
#endif /* dhm.h */