diff options
Diffstat (limited to 'src/lib/libcrypto/dsa')
| -rw-r--r-- | src/lib/libcrypto/dsa/README | 4 | ||||
| -rw-r--r-- | src/lib/libcrypto/dsa/dsagen.c | 112 | ||||
| -rw-r--r-- | src/lib/libcrypto/dsa/dsatest.c | 214 | ||||
| -rw-r--r-- | src/lib/libcrypto/dsa/fips186a.txt | 122 |
4 files changed, 452 insertions, 0 deletions
diff --git a/src/lib/libcrypto/dsa/README b/src/lib/libcrypto/dsa/README new file mode 100644 index 0000000000..6a7e9c170a --- /dev/null +++ b/src/lib/libcrypto/dsa/README | |||
| @@ -0,0 +1,4 @@ | |||
| 1 | The stuff in here is based on patches supplied to me by | ||
| 2 | Steven Schoch <schoch@sheba.arc.nasa.gov> to do DSS. | ||
| 3 | I have since modified a them a little but a debt of gratitude | ||
| 4 | is due for doing the initial work. | ||
diff --git a/src/lib/libcrypto/dsa/dsagen.c b/src/lib/libcrypto/dsa/dsagen.c new file mode 100644 index 0000000000..20335de250 --- /dev/null +++ b/src/lib/libcrypto/dsa/dsagen.c | |||
| @@ -0,0 +1,112 @@ | |||
| 1 | /* crypto/dsa/dsagen.c */ | ||
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
| 3 | * All rights reserved. | ||
| 4 | * | ||
| 5 | * This package is an SSL implementation written | ||
| 6 | * by Eric Young (eay@cryptsoft.com). | ||
| 7 | * The implementation was written so as to conform with Netscapes SSL. | ||
| 8 | * | ||
| 9 | * This library is free for commercial and non-commercial use as long as | ||
| 10 | * the following conditions are aheared to. The following conditions | ||
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
| 13 | * included with this distribution is covered by the same copyright terms | ||
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
| 15 | * | ||
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
| 17 | * the code are not to be removed. | ||
| 18 | * If this package is used in a product, Eric Young should be given attribution | ||
| 19 | * as the author of the parts of the library used. | ||
| 20 | * This can be in the form of a textual message at program startup or | ||
| 21 | * in documentation (online or textual) provided with the package. | ||
| 22 | * | ||
| 23 | * Redistribution and use in source and binary forms, with or without | ||
| 24 | * modification, are permitted provided that the following conditions | ||
| 25 | * are met: | ||
| 26 | * 1. Redistributions of source code must retain the copyright | ||
| 27 | * notice, this list of conditions and the following disclaimer. | ||
| 28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 29 | * notice, this list of conditions and the following disclaimer in the | ||
| 30 | * documentation and/or other materials provided with the distribution. | ||
| 31 | * 3. All advertising materials mentioning features or use of this software | ||
| 32 | * must display the following acknowledgement: | ||
| 33 | * "This product includes cryptographic software written by | ||
| 34 | * Eric Young (eay@cryptsoft.com)" | ||
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
| 36 | * being used are not cryptographic related :-). | ||
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
| 38 | * the apps directory (application code) you must include an acknowledgement: | ||
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
| 40 | * | ||
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
| 44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
| 45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
| 46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
| 47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
| 51 | * SUCH DAMAGE. | ||
| 52 | * | ||
| 53 | * The licence and distribution terms for any publically available version or | ||
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
| 55 | * copied and put under another distribution licence | ||
| 56 | * [including the GNU Public Licence.] | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | #include "dsa.h" | ||
| 61 | |||
| 62 | #define TEST | ||
| 63 | #define GENUINE_DSA | ||
| 64 | |||
| 65 | #ifdef GENUINE_DSA | ||
| 66 | #define LAST_VALUE 0xbd | ||
| 67 | #else | ||
| 68 | #define LAST_VALUE 0xd3 | ||
| 69 | #endif | ||
| 70 | |||
| 71 | #ifdef TEST | ||
| 72 | unsigned char seed[20]={ | ||
| 73 | 0xd5,0x01,0x4e,0x4b, | ||
| 74 | 0x60,0xef,0x2b,0xa8, | ||
| 75 | 0xb6,0x21,0x1b,0x40, | ||
| 76 | 0x62,0xba,0x32,0x24, | ||
| 77 | 0xe0,0x42,0x7d,LAST_VALUE}; | ||
| 78 | #endif | ||
| 79 | |||
| 80 | int cb(p,n) | ||
| 81 | int p,n; | ||
| 82 | { | ||
| 83 | char c='*'; | ||
| 84 | |||
| 85 | if (p == 0) c='.'; | ||
| 86 | if (p == 1) c='+'; | ||
| 87 | if (p == 2) c='*'; | ||
| 88 | if (p == 3) c='\n'; | ||
| 89 | printf("%c",c); | ||
| 90 | fflush(stdout); | ||
| 91 | } | ||
| 92 | |||
| 93 | main() | ||
| 94 | { | ||
| 95 | int i; | ||
| 96 | BIGNUM *n; | ||
| 97 | BN_CTX *ctx; | ||
| 98 | unsigned char seed_buf[20]; | ||
| 99 | DSA *dsa; | ||
| 100 | int counter,h; | ||
| 101 | BIO *bio_err=NULL; | ||
| 102 | |||
| 103 | if (bio_err == NULL) | ||
| 104 | bio_err=BIO_new_fp(stderr,BIO_NOCLOSE); | ||
| 105 | |||
| 106 | memcpy(seed_buf,seed,20); | ||
| 107 | dsa=DSA_generate_parameters(1024,seed,20,&counter,&h,cb); | ||
| 108 | |||
| 109 | if (dsa == NULL) | ||
| 110 | DSA_print(bio_err,dsa,0); | ||
| 111 | } | ||
| 112 | |||
diff --git a/src/lib/libcrypto/dsa/dsatest.c b/src/lib/libcrypto/dsa/dsatest.c new file mode 100644 index 0000000000..39bb712c4a --- /dev/null +++ b/src/lib/libcrypto/dsa/dsatest.c | |||
| @@ -0,0 +1,214 @@ | |||
| 1 | /* crypto/dsa/dsatest.c */ | ||
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | ||
| 3 | * All rights reserved. | ||
| 4 | * | ||
| 5 | * This package is an SSL implementation written | ||
| 6 | * by Eric Young (eay@cryptsoft.com). | ||
| 7 | * The implementation was written so as to conform with Netscapes SSL. | ||
| 8 | * | ||
| 9 | * This library is free for commercial and non-commercial use as long as | ||
| 10 | * the following conditions are aheared to. The following conditions | ||
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | ||
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | ||
| 13 | * included with this distribution is covered by the same copyright terms | ||
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | ||
| 15 | * | ||
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | ||
| 17 | * the code are not to be removed. | ||
| 18 | * If this package is used in a product, Eric Young should be given attribution | ||
| 19 | * as the author of the parts of the library used. | ||
| 20 | * This can be in the form of a textual message at program startup or | ||
| 21 | * in documentation (online or textual) provided with the package. | ||
| 22 | * | ||
| 23 | * Redistribution and use in source and binary forms, with or without | ||
| 24 | * modification, are permitted provided that the following conditions | ||
| 25 | * are met: | ||
| 26 | * 1. Redistributions of source code must retain the copyright | ||
| 27 | * notice, this list of conditions and the following disclaimer. | ||
| 28 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 29 | * notice, this list of conditions and the following disclaimer in the | ||
| 30 | * documentation and/or other materials provided with the distribution. | ||
| 31 | * 3. All advertising materials mentioning features or use of this software | ||
| 32 | * must display the following acknowledgement: | ||
| 33 | * "This product includes cryptographic software written by | ||
| 34 | * Eric Young (eay@cryptsoft.com)" | ||
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | ||
| 36 | * being used are not cryptographic related :-). | ||
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | ||
| 38 | * the apps directory (application code) you must include an acknowledgement: | ||
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | ||
| 40 | * | ||
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | ||
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
| 44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | ||
| 45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
| 46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
| 47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
| 51 | * SUCH DAMAGE. | ||
| 52 | * | ||
| 53 | * The licence and distribution terms for any publically available version or | ||
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | ||
| 55 | * copied and put under another distribution licence | ||
| 56 | * [including the GNU Public Licence.] | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | #include <stdlib.h> | ||
| 61 | #include <string.h> | ||
| 62 | #include <sys/types.h> | ||
| 63 | #include <sys/stat.h> | ||
| 64 | #include "crypto.h" | ||
| 65 | #include "rand.h" | ||
| 66 | #include "bio.h" | ||
| 67 | #include "err.h" | ||
| 68 | #include "dsa.h" | ||
| 69 | #ifdef WINDOWS | ||
| 70 | #include "../bio/bss_file.c" | ||
| 71 | #endif | ||
| 72 | |||
| 73 | #ifdef WIN16 | ||
| 74 | #define MS_CALLBACK _far _loadds | ||
| 75 | #else | ||
| 76 | #define MS_CALLBACK | ||
| 77 | #endif | ||
| 78 | |||
| 79 | #ifndef NOPROTO | ||
| 80 | static void MS_CALLBACK dsa_cb(int p, int n, char *arg); | ||
| 81 | #else | ||
| 82 | static void MS_CALLBACK dsa_cb(); | ||
| 83 | #endif | ||
| 84 | |||
| 85 | static unsigned char seed[20]={ | ||
| 86 | 0xd5,0x01,0x4e,0x4b,0x60,0xef,0x2b,0xa8,0xb6,0x21,0x1b,0x40, | ||
| 87 | 0x62,0xba,0x32,0x24,0xe0,0x42,0x7d,0xd3, | ||
| 88 | }; | ||
| 89 | |||
| 90 | static unsigned char out_p[]={ | ||
| 91 | 0x8d,0xf2,0xa4,0x94,0x49,0x22,0x76,0xaa, | ||
| 92 | 0x3d,0x25,0x75,0x9b,0xb0,0x68,0x69,0xcb, | ||
| 93 | 0xea,0xc0,0xd8,0x3a,0xfb,0x8d,0x0c,0xf7, | ||
| 94 | 0xcb,0xb8,0x32,0x4f,0x0d,0x78,0x82,0xe5, | ||
| 95 | 0xd0,0x76,0x2f,0xc5,0xb7,0x21,0x0e,0xaf, | ||
| 96 | 0xc2,0xe9,0xad,0xac,0x32,0xab,0x7a,0xac, | ||
| 97 | 0x49,0x69,0x3d,0xfb,0xf8,0x37,0x24,0xc2, | ||
| 98 | 0xec,0x07,0x36,0xee,0x31,0xc8,0x02,0x91, | ||
| 99 | }; | ||
| 100 | |||
| 101 | static unsigned char out_q[]={ | ||
| 102 | 0xc7,0x73,0x21,0x8c,0x73,0x7e,0xc8,0xee, | ||
| 103 | 0x99,0x3b,0x4f,0x2d,0xed,0x30,0xf4,0x8e, | ||
| 104 | 0xda,0xce,0x91,0x5f, | ||
| 105 | }; | ||
| 106 | |||
| 107 | static unsigned char out_g[]={ | ||
| 108 | 0x62,0x6d,0x02,0x78,0x39,0xea,0x0a,0x13, | ||
| 109 | 0x41,0x31,0x63,0xa5,0x5b,0x4c,0xb5,0x00, | ||
| 110 | 0x29,0x9d,0x55,0x22,0x95,0x6c,0xef,0xcb, | ||
| 111 | 0x3b,0xff,0x10,0xf3,0x99,0xce,0x2c,0x2e, | ||
| 112 | 0x71,0xcb,0x9d,0xe5,0xfa,0x24,0xba,0xbf, | ||
| 113 | 0x58,0xe5,0xb7,0x95,0x21,0x92,0x5c,0x9c, | ||
| 114 | 0xc4,0x2e,0x9f,0x6f,0x46,0x4b,0x08,0x8c, | ||
| 115 | 0xc5,0x72,0xaf,0x53,0xe6,0xd7,0x88,0x02, | ||
| 116 | }; | ||
| 117 | |||
| 118 | static BIO *bio_err=NULL; | ||
| 119 | |||
| 120 | int main(argc, argv) | ||
| 121 | int argc; | ||
| 122 | char **argv; | ||
| 123 | { | ||
| 124 | DSA *dsa=NULL; | ||
| 125 | int counter,ret=0,i,j; | ||
| 126 | unsigned char buf[256]; | ||
| 127 | unsigned long h; | ||
| 128 | |||
| 129 | if (bio_err == NULL) | ||
| 130 | bio_err=BIO_new_fp(stderr,BIO_NOCLOSE); | ||
| 131 | |||
| 132 | BIO_printf(bio_err,"test generation of DSA parameters\n"); | ||
| 133 | BIO_printf(bio_err,"expect '.*' followed by 5 lines of '.'s and '+'s\n"); | ||
| 134 | dsa=DSA_generate_parameters(512,seed,20,&counter,&h,dsa_cb, | ||
| 135 | (char *)bio_err); | ||
| 136 | |||
| 137 | BIO_printf(bio_err,"seed\n"); | ||
| 138 | for (i=0; i<20; i+=4) | ||
| 139 | { | ||
| 140 | BIO_printf(bio_err,"%02X%02X%02X%02X ", | ||
| 141 | seed[i],seed[i+1],seed[i+2],seed[i+3]); | ||
| 142 | } | ||
| 143 | BIO_printf(bio_err,"\ncounter=%d h=%d\n",counter,h); | ||
| 144 | |||
| 145 | if (dsa == NULL) goto end; | ||
| 146 | DSA_print(bio_err,dsa,0); | ||
| 147 | if (counter != 105) | ||
| 148 | { | ||
| 149 | BIO_printf(bio_err,"counter should be 105\n"); | ||
| 150 | goto end; | ||
| 151 | } | ||
| 152 | if (h != 2) | ||
| 153 | { | ||
| 154 | BIO_printf(bio_err,"h should be 2\n"); | ||
| 155 | goto end; | ||
| 156 | } | ||
| 157 | |||
| 158 | i=BN_bn2bin(dsa->q,buf); | ||
| 159 | j=sizeof(out_q); | ||
| 160 | if ((i != j) || (memcmp(buf,out_q,i) != 0)) | ||
| 161 | { | ||
| 162 | BIO_printf(bio_err,"q value is wrong\n"); | ||
| 163 | goto end; | ||
| 164 | } | ||
| 165 | |||
| 166 | i=BN_bn2bin(dsa->p,buf); | ||
| 167 | j=sizeof(out_p); | ||
| 168 | if ((i != j) || (memcmp(buf,out_p,i) != 0)) | ||
| 169 | { | ||
| 170 | BIO_printf(bio_err,"p value is wrong\n"); | ||
| 171 | goto end; | ||
| 172 | } | ||
| 173 | |||
| 174 | i=BN_bn2bin(dsa->g,buf); | ||
| 175 | j=sizeof(out_g); | ||
| 176 | if ((i != j) || (memcmp(buf,out_g,i) != 0)) | ||
| 177 | { | ||
| 178 | BIO_printf(bio_err,"g value is wrong\n"); | ||
| 179 | goto end; | ||
| 180 | } | ||
| 181 | |||
| 182 | ret=1; | ||
| 183 | end: | ||
| 184 | if (!ret) | ||
| 185 | ERR_print_errors(bio_err); | ||
| 186 | if (bio_err != NULL) BIO_free(bio_err); | ||
| 187 | if (dsa != NULL) DSA_free(dsa); | ||
| 188 | exit(!ret); | ||
| 189 | return(0); | ||
| 190 | } | ||
| 191 | |||
| 192 | static void MS_CALLBACK dsa_cb(p, n, arg) | ||
| 193 | int p; | ||
| 194 | int n; | ||
| 195 | char *arg; | ||
| 196 | { | ||
| 197 | char c='*'; | ||
| 198 | static int ok=0,num=0; | ||
| 199 | |||
| 200 | if (p == 0) { c='.'; num++; }; | ||
| 201 | if (p == 1) c='+'; | ||
| 202 | if (p == 2) { c='*'; ok++; } | ||
| 203 | if (p == 3) c='\n'; | ||
| 204 | BIO_write((BIO *)arg,&c,1); | ||
| 205 | BIO_flush((BIO *)arg); | ||
| 206 | |||
| 207 | if (!ok && (p == 0) && (num > 1)) | ||
| 208 | { | ||
| 209 | BIO_printf((BIO *)arg,"error in dsatest\n"); | ||
| 210 | exit(1); | ||
| 211 | } | ||
| 212 | } | ||
| 213 | |||
| 214 | |||
diff --git a/src/lib/libcrypto/dsa/fips186a.txt b/src/lib/libcrypto/dsa/fips186a.txt new file mode 100644 index 0000000000..3a2e0a0d51 --- /dev/null +++ b/src/lib/libcrypto/dsa/fips186a.txt | |||
| @@ -0,0 +1,122 @@ | |||
| 1 | The origional FIPE 180 used SHA-0 (FIPS 180) for its appendix 5 | ||
| 2 | examples. This is an updated version that uses SHA-1 (FIPS 180-1) | ||
| 3 | supplied to me by Wei Dai | ||
| 4 | -- | ||
| 5 | APPENDIX 5. EXAMPLE OF THE DSA | ||
| 6 | |||
| 7 | |||
| 8 | This appendix is for informational purposes only and is not required to meet | ||
| 9 | the standard. | ||
| 10 | |||
| 11 | Let L = 512 (size of p). The values in this example are expressed in | ||
| 12 | hexadecimal notation. The p and q given here were generated by the prime | ||
| 13 | generation standard described in appendix 2 using the 160-bit SEED: | ||
| 14 | |||
| 15 | d5014e4b 60ef2ba8 b6211b40 62ba3224 e0427dd3 | ||
| 16 | |||
| 17 | With this SEED, the algorithm found p and q when the counter was at 105. | ||
| 18 | |||
| 19 | x was generated by the algorithm described in appendix 3, section 3.1, using | ||
| 20 | the SHA to construct G (as in appendix 3, section 3.3) and a 160-bit XSEED: | ||
| 21 | |||
| 22 | XSEED = | ||
| 23 | |||
| 24 | bd029bbe 7f51960b cf9edb2b 61f06f0f eb5a38b6 | ||
| 25 | |||
| 26 | t = | ||
| 27 | 67452301 EFCDAB89 98BADCFE 10325476 C3D2E1F0 | ||
| 28 | |||
| 29 | x = G(t,XSEED) mod q | ||
| 30 | |||
| 31 | k was generated by the algorithm described in appendix 3, section 3.2, using | ||
| 32 | the SHA to construct G (as in appendix 3, section 3.3) and a 160-bit KSEED: | ||
| 33 | |||
| 34 | KSEED = | ||
| 35 | |||
| 36 | 687a66d9 0648f993 867e121f 4ddf9ddb 01205584 | ||
| 37 | |||
| 38 | t = | ||
| 39 | EFCDAB89 98BADCFE 10325476 C3D2E1F0 67452301 | ||
| 40 | |||
| 41 | k = G(t,KSEED) mod q | ||
| 42 | |||
| 43 | Finally: | ||
| 44 | |||
| 45 | h = 2 | ||
| 46 | |||
| 47 | p = | ||
| 48 | 8df2a494 492276aa 3d25759b b06869cb eac0d83a fb8d0cf7 | ||
| 49 | cbb8324f 0d7882e5 d0762fc5 b7210eaf c2e9adac 32ab7aac | ||
| 50 | 49693dfb f83724c2 ec0736ee 31c80291 | ||
| 51 | |||
| 52 | |||
| 53 | q = | ||
| 54 | c773218c 737ec8ee 993b4f2d ed30f48e dace915f | ||
| 55 | |||
| 56 | |||
| 57 | g = | ||
| 58 | 626d0278 39ea0a13 413163a5 5b4cb500 299d5522 956cefcb | ||
| 59 | 3bff10f3 99ce2c2e 71cb9de5 fa24babf 58e5b795 21925c9c | ||
| 60 | c42e9f6f 464b088c c572af53 e6d78802 | ||
| 61 | |||
| 62 | |||
| 63 | x = | ||
| 64 | 2070b322 3dba372f de1c0ffc 7b2e3b49 8b260614 | ||
| 65 | |||
| 66 | |||
| 67 | k = | ||
| 68 | 358dad57 1462710f 50e254cf 1a376b2b deaadfbf | ||
| 69 | |||
| 70 | |||
| 71 | kinv = | ||
| 72 | |||
| 73 | 0d516729 8202e49b 4116ac10 4fc3f415 ae52f917 | ||
| 74 | |||
| 75 | M = ASCII form of "abc" (See FIPS PUB 180-1, Appendix A) | ||
| 76 | |||
| 77 | SHA(M) = | ||
| 78 | |||
| 79 | a9993e36 4706816a ba3e2571 7850c26c 9cd0d89d | ||
| 80 | |||
| 81 | |||
| 82 | y = | ||
| 83 | |||
| 84 | 19131871 d75b1612 a819f29d 78d1b0d7 346f7aa7 7bb62a85 | ||
| 85 | 9bfd6c56 75da9d21 2d3a36ef 1672ef66 0b8c7c25 5cc0ec74 | ||
| 86 | 858fba33 f44c0669 9630a76b 030ee333 | ||
| 87 | |||
| 88 | |||
| 89 | r = | ||
| 90 | 8bac1ab6 6410435c b7181f95 b16ab97c 92b341c0 | ||
| 91 | |||
| 92 | s = | ||
| 93 | 41e2345f 1f56df24 58f426d1 55b4ba2d b6dcd8c8 | ||
| 94 | |||
| 95 | |||
| 96 | w = | ||
| 97 | 9df4ece5 826be95f ed406d41 b43edc0b 1c18841b | ||
| 98 | |||
| 99 | |||
| 100 | u1 = | ||
| 101 | bf655bd0 46f0b35e c791b004 804afcbb 8ef7d69d | ||
| 102 | |||
| 103 | |||
| 104 | u2 = | ||
| 105 | 821a9263 12e97ade abcc8d08 2b527897 8a2df4b0 | ||
| 106 | |||
| 107 | |||
| 108 | gu1 mod p = | ||
| 109 | |||
| 110 | 51b1bf86 7888e5f3 af6fb476 9dd016bc fe667a65 aafc2753 | ||
| 111 | 9063bd3d 2b138b4c e02cc0c0 2ec62bb6 7306c63e 4db95bbf | ||
| 112 | 6f96662a 1987a21b e4ec1071 010b6069 | ||
| 113 | |||
| 114 | |||
| 115 | yu2 mod p = | ||
| 116 | |||
| 117 | 8b510071 2957e950 50d6b8fd 376a668e 4b0d633c 1e46e665 | ||
| 118 | 5c611a72 e2b28483 be52c74d 4b30de61 a668966e dc307a67 | ||
| 119 | c19441f4 22bf3c34 08aeba1f 0a4dbec7 | ||
| 120 | |||
| 121 | v = | ||
| 122 | 8bac1ab6 6410435c b7181f95 b16ab97c 92b341c0 | ||
