diff options
author | ryker <> | 1998-10-05 20:13:15 +0000 |
---|---|---|
committer | ryker <> | 1998-10-05 20:13:15 +0000 |
commit | 536c76cbb863bab152f19842ab88772c01e922c7 (patch) | |
tree | dfecec371a097b73d605aae665887946d9982219 /src/lib/libcrypto/dsa | |
download | openbsd-536c76cbb863bab152f19842ab88772c01e922c7.tar.gz openbsd-536c76cbb863bab152f19842ab88772c01e922c7.tar.bz2 openbsd-536c76cbb863bab152f19842ab88772c01e922c7.zip |
Import of SSLeay-0.9.0b with RSA and IDEA stubbed + OpenBSD build
functionality for shared libs.
Note that routines such as sslv2_init and friends that use RSA will
not work due to lack of RSA in this library.
Needs documentation and help from ports for easy upgrade to full
functionality where legally possible.
Diffstat (limited to 'src/lib/libcrypto/dsa')
-rw-r--r-- | src/lib/libcrypto/dsa/README | 4 | ||||
-rw-r--r-- | src/lib/libcrypto/dsa/dsagen.c | 112 | ||||
-rw-r--r-- | src/lib/libcrypto/dsa/dsatest.c | 214 | ||||
-rw-r--r-- | src/lib/libcrypto/dsa/fips186a.txt | 122 |
4 files changed, 452 insertions, 0 deletions
diff --git a/src/lib/libcrypto/dsa/README b/src/lib/libcrypto/dsa/README new file mode 100644 index 0000000000..6a7e9c170a --- /dev/null +++ b/src/lib/libcrypto/dsa/README | |||
@@ -0,0 +1,4 @@ | |||
1 | The stuff in here is based on patches supplied to me by | ||
2 | Steven Schoch <schoch@sheba.arc.nasa.gov> to do DSS. | ||
3 | I have since modified a them a little but a debt of gratitude | ||
4 | is due for doing the initial work. | ||
diff --git a/src/lib/libcrypto/dsa/dsagen.c b/src/lib/libcrypto/dsa/dsagen.c new file mode 100644 index 0000000000..20335de250 --- /dev/null +++ b/src/lib/libcrypto/dsa/dsagen.c | |||
@@ -0,0 +1,112 @@ | |||
1 | /* crypto/dsa/dsagen.c */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #include <stdio.h> | ||
60 | #include "dsa.h" | ||
61 | |||
62 | #define TEST | ||
63 | #define GENUINE_DSA | ||
64 | |||
65 | #ifdef GENUINE_DSA | ||
66 | #define LAST_VALUE 0xbd | ||
67 | #else | ||
68 | #define LAST_VALUE 0xd3 | ||
69 | #endif | ||
70 | |||
71 | #ifdef TEST | ||
72 | unsigned char seed[20]={ | ||
73 | 0xd5,0x01,0x4e,0x4b, | ||
74 | 0x60,0xef,0x2b,0xa8, | ||
75 | 0xb6,0x21,0x1b,0x40, | ||
76 | 0x62,0xba,0x32,0x24, | ||
77 | 0xe0,0x42,0x7d,LAST_VALUE}; | ||
78 | #endif | ||
79 | |||
80 | int cb(p,n) | ||
81 | int p,n; | ||
82 | { | ||
83 | char c='*'; | ||
84 | |||
85 | if (p == 0) c='.'; | ||
86 | if (p == 1) c='+'; | ||
87 | if (p == 2) c='*'; | ||
88 | if (p == 3) c='\n'; | ||
89 | printf("%c",c); | ||
90 | fflush(stdout); | ||
91 | } | ||
92 | |||
93 | main() | ||
94 | { | ||
95 | int i; | ||
96 | BIGNUM *n; | ||
97 | BN_CTX *ctx; | ||
98 | unsigned char seed_buf[20]; | ||
99 | DSA *dsa; | ||
100 | int counter,h; | ||
101 | BIO *bio_err=NULL; | ||
102 | |||
103 | if (bio_err == NULL) | ||
104 | bio_err=BIO_new_fp(stderr,BIO_NOCLOSE); | ||
105 | |||
106 | memcpy(seed_buf,seed,20); | ||
107 | dsa=DSA_generate_parameters(1024,seed,20,&counter,&h,cb); | ||
108 | |||
109 | if (dsa == NULL) | ||
110 | DSA_print(bio_err,dsa,0); | ||
111 | } | ||
112 | |||
diff --git a/src/lib/libcrypto/dsa/dsatest.c b/src/lib/libcrypto/dsa/dsatest.c new file mode 100644 index 0000000000..39bb712c4a --- /dev/null +++ b/src/lib/libcrypto/dsa/dsatest.c | |||
@@ -0,0 +1,214 @@ | |||
1 | /* crypto/dsa/dsatest.c */ | ||
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
3 | * All rights reserved. | ||
4 | * | ||
5 | * This package is an SSL implementation written | ||
6 | * by Eric Young (eay@cryptsoft.com). | ||
7 | * The implementation was written so as to conform with Netscapes SSL. | ||
8 | * | ||
9 | * This library is free for commercial and non-commercial use as long as | ||
10 | * the following conditions are aheared to. The following conditions | ||
11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
13 | * included with this distribution is covered by the same copyright terms | ||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
15 | * | ||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
17 | * the code are not to be removed. | ||
18 | * If this package is used in a product, Eric Young should be given attribution | ||
19 | * as the author of the parts of the library used. | ||
20 | * This can be in the form of a textual message at program startup or | ||
21 | * in documentation (online or textual) provided with the package. | ||
22 | * | ||
23 | * Redistribution and use in source and binary forms, with or without | ||
24 | * modification, are permitted provided that the following conditions | ||
25 | * are met: | ||
26 | * 1. Redistributions of source code must retain the copyright | ||
27 | * notice, this list of conditions and the following disclaimer. | ||
28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
29 | * notice, this list of conditions and the following disclaimer in the | ||
30 | * documentation and/or other materials provided with the distribution. | ||
31 | * 3. All advertising materials mentioning features or use of this software | ||
32 | * must display the following acknowledgement: | ||
33 | * "This product includes cryptographic software written by | ||
34 | * Eric Young (eay@cryptsoft.com)" | ||
35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
36 | * being used are not cryptographic related :-). | ||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
38 | * the apps directory (application code) you must include an acknowledgement: | ||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
40 | * | ||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
51 | * SUCH DAMAGE. | ||
52 | * | ||
53 | * The licence and distribution terms for any publically available version or | ||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
55 | * copied and put under another distribution licence | ||
56 | * [including the GNU Public Licence.] | ||
57 | */ | ||
58 | |||
59 | #include <stdio.h> | ||
60 | #include <stdlib.h> | ||
61 | #include <string.h> | ||
62 | #include <sys/types.h> | ||
63 | #include <sys/stat.h> | ||
64 | #include "crypto.h" | ||
65 | #include "rand.h" | ||
66 | #include "bio.h" | ||
67 | #include "err.h" | ||
68 | #include "dsa.h" | ||
69 | #ifdef WINDOWS | ||
70 | #include "../bio/bss_file.c" | ||
71 | #endif | ||
72 | |||
73 | #ifdef WIN16 | ||
74 | #define MS_CALLBACK _far _loadds | ||
75 | #else | ||
76 | #define MS_CALLBACK | ||
77 | #endif | ||
78 | |||
79 | #ifndef NOPROTO | ||
80 | static void MS_CALLBACK dsa_cb(int p, int n, char *arg); | ||
81 | #else | ||
82 | static void MS_CALLBACK dsa_cb(); | ||
83 | #endif | ||
84 | |||
85 | static unsigned char seed[20]={ | ||
86 | 0xd5,0x01,0x4e,0x4b,0x60,0xef,0x2b,0xa8,0xb6,0x21,0x1b,0x40, | ||
87 | 0x62,0xba,0x32,0x24,0xe0,0x42,0x7d,0xd3, | ||
88 | }; | ||
89 | |||
90 | static unsigned char out_p[]={ | ||
91 | 0x8d,0xf2,0xa4,0x94,0x49,0x22,0x76,0xaa, | ||
92 | 0x3d,0x25,0x75,0x9b,0xb0,0x68,0x69,0xcb, | ||
93 | 0xea,0xc0,0xd8,0x3a,0xfb,0x8d,0x0c,0xf7, | ||
94 | 0xcb,0xb8,0x32,0x4f,0x0d,0x78,0x82,0xe5, | ||
95 | 0xd0,0x76,0x2f,0xc5,0xb7,0x21,0x0e,0xaf, | ||
96 | 0xc2,0xe9,0xad,0xac,0x32,0xab,0x7a,0xac, | ||
97 | 0x49,0x69,0x3d,0xfb,0xf8,0x37,0x24,0xc2, | ||
98 | 0xec,0x07,0x36,0xee,0x31,0xc8,0x02,0x91, | ||
99 | }; | ||
100 | |||
101 | static unsigned char out_q[]={ | ||
102 | 0xc7,0x73,0x21,0x8c,0x73,0x7e,0xc8,0xee, | ||
103 | 0x99,0x3b,0x4f,0x2d,0xed,0x30,0xf4,0x8e, | ||
104 | 0xda,0xce,0x91,0x5f, | ||
105 | }; | ||
106 | |||
107 | static unsigned char out_g[]={ | ||
108 | 0x62,0x6d,0x02,0x78,0x39,0xea,0x0a,0x13, | ||
109 | 0x41,0x31,0x63,0xa5,0x5b,0x4c,0xb5,0x00, | ||
110 | 0x29,0x9d,0x55,0x22,0x95,0x6c,0xef,0xcb, | ||
111 | 0x3b,0xff,0x10,0xf3,0x99,0xce,0x2c,0x2e, | ||
112 | 0x71,0xcb,0x9d,0xe5,0xfa,0x24,0xba,0xbf, | ||
113 | 0x58,0xe5,0xb7,0x95,0x21,0x92,0x5c,0x9c, | ||
114 | 0xc4,0x2e,0x9f,0x6f,0x46,0x4b,0x08,0x8c, | ||
115 | 0xc5,0x72,0xaf,0x53,0xe6,0xd7,0x88,0x02, | ||
116 | }; | ||
117 | |||
118 | static BIO *bio_err=NULL; | ||
119 | |||
120 | int main(argc, argv) | ||
121 | int argc; | ||
122 | char **argv; | ||
123 | { | ||
124 | DSA *dsa=NULL; | ||
125 | int counter,ret=0,i,j; | ||
126 | unsigned char buf[256]; | ||
127 | unsigned long h; | ||
128 | |||
129 | if (bio_err == NULL) | ||
130 | bio_err=BIO_new_fp(stderr,BIO_NOCLOSE); | ||
131 | |||
132 | BIO_printf(bio_err,"test generation of DSA parameters\n"); | ||
133 | BIO_printf(bio_err,"expect '.*' followed by 5 lines of '.'s and '+'s\n"); | ||
134 | dsa=DSA_generate_parameters(512,seed,20,&counter,&h,dsa_cb, | ||
135 | (char *)bio_err); | ||
136 | |||
137 | BIO_printf(bio_err,"seed\n"); | ||
138 | for (i=0; i<20; i+=4) | ||
139 | { | ||
140 | BIO_printf(bio_err,"%02X%02X%02X%02X ", | ||
141 | seed[i],seed[i+1],seed[i+2],seed[i+3]); | ||
142 | } | ||
143 | BIO_printf(bio_err,"\ncounter=%d h=%d\n",counter,h); | ||
144 | |||
145 | if (dsa == NULL) goto end; | ||
146 | DSA_print(bio_err,dsa,0); | ||
147 | if (counter != 105) | ||
148 | { | ||
149 | BIO_printf(bio_err,"counter should be 105\n"); | ||
150 | goto end; | ||
151 | } | ||
152 | if (h != 2) | ||
153 | { | ||
154 | BIO_printf(bio_err,"h should be 2\n"); | ||
155 | goto end; | ||
156 | } | ||
157 | |||
158 | i=BN_bn2bin(dsa->q,buf); | ||
159 | j=sizeof(out_q); | ||
160 | if ((i != j) || (memcmp(buf,out_q,i) != 0)) | ||
161 | { | ||
162 | BIO_printf(bio_err,"q value is wrong\n"); | ||
163 | goto end; | ||
164 | } | ||
165 | |||
166 | i=BN_bn2bin(dsa->p,buf); | ||
167 | j=sizeof(out_p); | ||
168 | if ((i != j) || (memcmp(buf,out_p,i) != 0)) | ||
169 | { | ||
170 | BIO_printf(bio_err,"p value is wrong\n"); | ||
171 | goto end; | ||
172 | } | ||
173 | |||
174 | i=BN_bn2bin(dsa->g,buf); | ||
175 | j=sizeof(out_g); | ||
176 | if ((i != j) || (memcmp(buf,out_g,i) != 0)) | ||
177 | { | ||
178 | BIO_printf(bio_err,"g value is wrong\n"); | ||
179 | goto end; | ||
180 | } | ||
181 | |||
182 | ret=1; | ||
183 | end: | ||
184 | if (!ret) | ||
185 | ERR_print_errors(bio_err); | ||
186 | if (bio_err != NULL) BIO_free(bio_err); | ||
187 | if (dsa != NULL) DSA_free(dsa); | ||
188 | exit(!ret); | ||
189 | return(0); | ||
190 | } | ||
191 | |||
192 | static void MS_CALLBACK dsa_cb(p, n, arg) | ||
193 | int p; | ||
194 | int n; | ||
195 | char *arg; | ||
196 | { | ||
197 | char c='*'; | ||
198 | static int ok=0,num=0; | ||
199 | |||
200 | if (p == 0) { c='.'; num++; }; | ||
201 | if (p == 1) c='+'; | ||
202 | if (p == 2) { c='*'; ok++; } | ||
203 | if (p == 3) c='\n'; | ||
204 | BIO_write((BIO *)arg,&c,1); | ||
205 | BIO_flush((BIO *)arg); | ||
206 | |||
207 | if (!ok && (p == 0) && (num > 1)) | ||
208 | { | ||
209 | BIO_printf((BIO *)arg,"error in dsatest\n"); | ||
210 | exit(1); | ||
211 | } | ||
212 | } | ||
213 | |||
214 | |||
diff --git a/src/lib/libcrypto/dsa/fips186a.txt b/src/lib/libcrypto/dsa/fips186a.txt new file mode 100644 index 0000000000..3a2e0a0d51 --- /dev/null +++ b/src/lib/libcrypto/dsa/fips186a.txt | |||
@@ -0,0 +1,122 @@ | |||
1 | The origional FIPE 180 used SHA-0 (FIPS 180) for its appendix 5 | ||
2 | examples. This is an updated version that uses SHA-1 (FIPS 180-1) | ||
3 | supplied to me by Wei Dai | ||
4 | -- | ||
5 | APPENDIX 5. EXAMPLE OF THE DSA | ||
6 | |||
7 | |||
8 | This appendix is for informational purposes only and is not required to meet | ||
9 | the standard. | ||
10 | |||
11 | Let L = 512 (size of p). The values in this example are expressed in | ||
12 | hexadecimal notation. The p and q given here were generated by the prime | ||
13 | generation standard described in appendix 2 using the 160-bit SEED: | ||
14 | |||
15 | d5014e4b 60ef2ba8 b6211b40 62ba3224 e0427dd3 | ||
16 | |||
17 | With this SEED, the algorithm found p and q when the counter was at 105. | ||
18 | |||
19 | x was generated by the algorithm described in appendix 3, section 3.1, using | ||
20 | the SHA to construct G (as in appendix 3, section 3.3) and a 160-bit XSEED: | ||
21 | |||
22 | XSEED = | ||
23 | |||
24 | bd029bbe 7f51960b cf9edb2b 61f06f0f eb5a38b6 | ||
25 | |||
26 | t = | ||
27 | 67452301 EFCDAB89 98BADCFE 10325476 C3D2E1F0 | ||
28 | |||
29 | x = G(t,XSEED) mod q | ||
30 | |||
31 | k was generated by the algorithm described in appendix 3, section 3.2, using | ||
32 | the SHA to construct G (as in appendix 3, section 3.3) and a 160-bit KSEED: | ||
33 | |||
34 | KSEED = | ||
35 | |||
36 | 687a66d9 0648f993 867e121f 4ddf9ddb 01205584 | ||
37 | |||
38 | t = | ||
39 | EFCDAB89 98BADCFE 10325476 C3D2E1F0 67452301 | ||
40 | |||
41 | k = G(t,KSEED) mod q | ||
42 | |||
43 | Finally: | ||
44 | |||
45 | h = 2 | ||
46 | |||
47 | p = | ||
48 | 8df2a494 492276aa 3d25759b b06869cb eac0d83a fb8d0cf7 | ||
49 | cbb8324f 0d7882e5 d0762fc5 b7210eaf c2e9adac 32ab7aac | ||
50 | 49693dfb f83724c2 ec0736ee 31c80291 | ||
51 | |||
52 | |||
53 | q = | ||
54 | c773218c 737ec8ee 993b4f2d ed30f48e dace915f | ||
55 | |||
56 | |||
57 | g = | ||
58 | 626d0278 39ea0a13 413163a5 5b4cb500 299d5522 956cefcb | ||
59 | 3bff10f3 99ce2c2e 71cb9de5 fa24babf 58e5b795 21925c9c | ||
60 | c42e9f6f 464b088c c572af53 e6d78802 | ||
61 | |||
62 | |||
63 | x = | ||
64 | 2070b322 3dba372f de1c0ffc 7b2e3b49 8b260614 | ||
65 | |||
66 | |||
67 | k = | ||
68 | 358dad57 1462710f 50e254cf 1a376b2b deaadfbf | ||
69 | |||
70 | |||
71 | kinv = | ||
72 | |||
73 | 0d516729 8202e49b 4116ac10 4fc3f415 ae52f917 | ||
74 | |||
75 | M = ASCII form of "abc" (See FIPS PUB 180-1, Appendix A) | ||
76 | |||
77 | SHA(M) = | ||
78 | |||
79 | a9993e36 4706816a ba3e2571 7850c26c 9cd0d89d | ||
80 | |||
81 | |||
82 | y = | ||
83 | |||
84 | 19131871 d75b1612 a819f29d 78d1b0d7 346f7aa7 7bb62a85 | ||
85 | 9bfd6c56 75da9d21 2d3a36ef 1672ef66 0b8c7c25 5cc0ec74 | ||
86 | 858fba33 f44c0669 9630a76b 030ee333 | ||
87 | |||
88 | |||
89 | r = | ||
90 | 8bac1ab6 6410435c b7181f95 b16ab97c 92b341c0 | ||
91 | |||
92 | s = | ||
93 | 41e2345f 1f56df24 58f426d1 55b4ba2d b6dcd8c8 | ||
94 | |||
95 | |||
96 | w = | ||
97 | 9df4ece5 826be95f ed406d41 b43edc0b 1c18841b | ||
98 | |||
99 | |||
100 | u1 = | ||
101 | bf655bd0 46f0b35e c791b004 804afcbb 8ef7d69d | ||
102 | |||
103 | |||
104 | u2 = | ||
105 | 821a9263 12e97ade abcc8d08 2b527897 8a2df4b0 | ||
106 | |||
107 | |||
108 | gu1 mod p = | ||
109 | |||
110 | 51b1bf86 7888e5f3 af6fb476 9dd016bc fe667a65 aafc2753 | ||
111 | 9063bd3d 2b138b4c e02cc0c0 2ec62bb6 7306c63e 4db95bbf | ||
112 | 6f96662a 1987a21b e4ec1071 010b6069 | ||
113 | |||
114 | |||
115 | yu2 mod p = | ||
116 | |||
117 | 8b510071 2957e950 50d6b8fd 376a668e 4b0d633c 1e46e665 | ||
118 | 5c611a72 e2b28483 be52c74d 4b30de61 a668966e dc307a67 | ||
119 | c19441f4 22bf3c34 08aeba1f 0a4dbec7 | ||
120 | |||
121 | v = | ||
122 | 8bac1ab6 6410435c b7181f95 b16ab97c 92b341c0 | ||