Path: blob/main/contrib/bearssl/src/ssl/ssl_hs_client.c
39488 views
/* Automatically generated code; do not modify directly. */12#include <stddef.h>3#include <stdint.h>45typedef struct {6uint32_t *dp;7uint32_t *rp;8const unsigned char *ip;9} t0_context;1011static uint32_t12t0_parse7E_unsigned(const unsigned char **p)13{14uint32_t x;1516x = 0;17for (;;) {18unsigned y;1920y = *(*p) ++;21x = (x << 7) | (uint32_t)(y & 0x7F);22if (y < 0x80) {23return x;24}25}26}2728static int32_t29t0_parse7E_signed(const unsigned char **p)30{31int neg;32uint32_t x;3334neg = ((**p) >> 6) & 1;35x = (uint32_t)-neg;36for (;;) {37unsigned y;3839y = *(*p) ++;40x = (x << 7) | (uint32_t)(y & 0x7F);41if (y < 0x80) {42if (neg) {43return -(int32_t)~x - 1;44} else {45return (int32_t)x;46}47}48}49}5051#define T0_VBYTE(x, n) (unsigned char)((((uint32_t)(x) >> (n)) & 0x7F) | 0x80)52#define T0_FBYTE(x, n) (unsigned char)(((uint32_t)(x) >> (n)) & 0x7F)53#define T0_SBYTE(x) (unsigned char)((((uint32_t)(x) >> 28) + 0xF8) ^ 0xF8)54#define T0_INT1(x) T0_FBYTE(x, 0)55#define T0_INT2(x) T0_VBYTE(x, 7), T0_FBYTE(x, 0)56#define T0_INT3(x) T0_VBYTE(x, 14), T0_VBYTE(x, 7), T0_FBYTE(x, 0)57#define T0_INT4(x) T0_VBYTE(x, 21), T0_VBYTE(x, 14), T0_VBYTE(x, 7), T0_FBYTE(x, 0)58#define T0_INT5(x) T0_SBYTE(x), T0_VBYTE(x, 21), T0_VBYTE(x, 14), T0_VBYTE(x, 7), T0_FBYTE(x, 0)5960/* static const unsigned char t0_datablock[]; */616263void br_ssl_hs_client_init_main(void *t0ctx);6465void br_ssl_hs_client_run(void *t0ctx);66676869#include <stddef.h>70#include <string.h>7172#include "inner.h"7374/*75* This macro evaluates to a pointer to the current engine context.76*/77#define ENG ((br_ssl_engine_context *)(void *)((unsigned char *)t0ctx - offsetof(br_ssl_engine_context, cpu)))787980818283/*84* This macro evaluates to a pointer to the client context, under that85* specific name. It must be noted that since the engine context is the86* first field of the br_ssl_client_context structure ('eng'), then87* pointers values of both types are interchangeable, modulo an88* appropriate cast. This also means that "addresses" computed as offsets89* within the structure work for both kinds of context.90*/91#define CTX ((br_ssl_client_context *)ENG)9293/*94* Generate the pre-master secret for RSA key exchange, and encrypt it95* with the server's public key. Returned value is either the encrypted96* data length (in bytes), or -x on error, with 'x' being an error code.97*98* This code assumes that the public key has been already verified (it99* was properly obtained by the X.509 engine, and it has the right type,100* i.e. it is of type RSA and suitable for encryption).101*/102static int103make_pms_rsa(br_ssl_client_context *ctx, int prf_id)104{105const br_x509_class **xc;106const br_x509_pkey *pk;107const unsigned char *n;108unsigned char *pms;109size_t nlen, u;110111xc = ctx->eng.x509ctx;112pk = (*xc)->get_pkey(xc, NULL);113114/*115* Compute actual RSA key length, in case there are leading zeros.116*/117n = pk->key.rsa.n;118nlen = pk->key.rsa.nlen;119while (nlen > 0 && *n == 0) {120n ++;121nlen --;122}123124/*125* We need at least 59 bytes (48 bytes for pre-master secret, and126* 11 bytes for the PKCS#1 type 2 padding). Note that the X.509127* minimal engine normally blocks RSA keys shorter than 128 bytes,128* so this is mostly for public keys provided explicitly by the129* caller.130*/131if (nlen < 59) {132return -BR_ERR_X509_WEAK_PUBLIC_KEY;133}134if (nlen > sizeof ctx->eng.pad) {135return -BR_ERR_LIMIT_EXCEEDED;136}137138/*139* Make PMS.140*/141pms = ctx->eng.pad + nlen - 48;142br_enc16be(pms, ctx->eng.version_max);143br_hmac_drbg_generate(&ctx->eng.rng, pms + 2, 46);144br_ssl_engine_compute_master(&ctx->eng, prf_id, pms, 48);145146/*147* Apply PKCS#1 type 2 padding.148*/149ctx->eng.pad[0] = 0x00;150ctx->eng.pad[1] = 0x02;151ctx->eng.pad[nlen - 49] = 0x00;152br_hmac_drbg_generate(&ctx->eng.rng, ctx->eng.pad + 2, nlen - 51);153for (u = 2; u < nlen - 49; u ++) {154while (ctx->eng.pad[u] == 0) {155br_hmac_drbg_generate(&ctx->eng.rng,156&ctx->eng.pad[u], 1);157}158}159160/*161* Compute RSA encryption.162*/163if (!ctx->irsapub(ctx->eng.pad, nlen, &pk->key.rsa)) {164return -BR_ERR_LIMIT_EXCEEDED;165}166return (int)nlen;167}168169/*170* OID for hash functions in RSA signatures.171*/172static const unsigned char *HASH_OID[] = {173BR_HASH_OID_SHA1,174BR_HASH_OID_SHA224,175BR_HASH_OID_SHA256,176BR_HASH_OID_SHA384,177BR_HASH_OID_SHA512178};179180/*181* Check the RSA signature on the ServerKeyExchange message.182*183* hash hash function ID (2 to 6), or 0 for MD5+SHA-1 (with RSA only)184* use_rsa non-zero for RSA signature, zero for ECDSA185* sig_len signature length (in bytes); signature value is in the pad186*187* Returned value is 0 on success, or an error code.188*/189static int190verify_SKE_sig(br_ssl_client_context *ctx,191int hash, int use_rsa, size_t sig_len)192{193const br_x509_class **xc;194const br_x509_pkey *pk;195br_multihash_context mhc;196unsigned char hv[64], head[4];197size_t hv_len;198199xc = ctx->eng.x509ctx;200pk = (*xc)->get_pkey(xc, NULL);201br_multihash_zero(&mhc);202br_multihash_copyimpl(&mhc, &ctx->eng.mhash);203br_multihash_init(&mhc);204br_multihash_update(&mhc,205ctx->eng.client_random, sizeof ctx->eng.client_random);206br_multihash_update(&mhc,207ctx->eng.server_random, sizeof ctx->eng.server_random);208head[0] = 3;209head[1] = 0;210head[2] = ctx->eng.ecdhe_curve;211head[3] = ctx->eng.ecdhe_point_len;212br_multihash_update(&mhc, head, sizeof head);213br_multihash_update(&mhc,214ctx->eng.ecdhe_point, ctx->eng.ecdhe_point_len);215if (hash) {216hv_len = br_multihash_out(&mhc, hash, hv);217if (hv_len == 0) {218return BR_ERR_INVALID_ALGORITHM;219}220} else {221if (!br_multihash_out(&mhc, br_md5_ID, hv)222|| !br_multihash_out(&mhc, br_sha1_ID, hv + 16))223{224return BR_ERR_INVALID_ALGORITHM;225}226hv_len = 36;227}228if (use_rsa) {229unsigned char tmp[64];230const unsigned char *hash_oid;231232if (hash) {233hash_oid = HASH_OID[hash - 2];234} else {235hash_oid = NULL;236}237if (!ctx->eng.irsavrfy(ctx->eng.pad, sig_len,238hash_oid, hv_len, &pk->key.rsa, tmp)239|| memcmp(tmp, hv, hv_len) != 0)240{241return BR_ERR_BAD_SIGNATURE;242}243} else {244if (!ctx->eng.iecdsa(ctx->eng.iec, hv, hv_len, &pk->key.ec,245ctx->eng.pad, sig_len))246{247return BR_ERR_BAD_SIGNATURE;248}249}250return 0;251}252253/*254* Perform client-side ECDH (or ECDHE). The point that should be sent to255* the server is written in the pad; returned value is either the point256* length (in bytes), or -x on error, with 'x' being an error code.257*258* The point _from_ the server is taken from ecdhe_point[] if 'ecdhe'259* is non-zero, or from the X.509 engine context if 'ecdhe' is zero260* (for static ECDH).261*/262static int263make_pms_ecdh(br_ssl_client_context *ctx, unsigned ecdhe, int prf_id)264{265int curve;266unsigned char key[66], point[133];267const unsigned char *order, *point_src;268size_t glen, olen, point_len, xoff, xlen;269unsigned char mask;270271if (ecdhe) {272curve = ctx->eng.ecdhe_curve;273point_src = ctx->eng.ecdhe_point;274point_len = ctx->eng.ecdhe_point_len;275} else {276const br_x509_class **xc;277const br_x509_pkey *pk;278279xc = ctx->eng.x509ctx;280pk = (*xc)->get_pkey(xc, NULL);281curve = pk->key.ec.curve;282point_src = pk->key.ec.q;283point_len = pk->key.ec.qlen;284}285if ((ctx->eng.iec->supported_curves & ((uint32_t)1 << curve)) == 0) {286return -BR_ERR_INVALID_ALGORITHM;287}288289/*290* We need to generate our key, as a non-zero random value which291* is lower than the curve order, in a "large enough" range. We292* force top bit to 0 and bottom bit to 1, which guarantees that293* the value is in the proper range.294*/295order = ctx->eng.iec->order(curve, &olen);296mask = 0xFF;297while (mask >= order[0]) {298mask >>= 1;299}300br_hmac_drbg_generate(&ctx->eng.rng, key, olen);301key[0] &= mask;302key[olen - 1] |= 0x01;303304/*305* Compute the common ECDH point, whose X coordinate is the306* pre-master secret.307*/308ctx->eng.iec->generator(curve, &glen);309if (glen != point_len) {310return -BR_ERR_INVALID_ALGORITHM;311}312313memcpy(point, point_src, glen);314if (!ctx->eng.iec->mul(point, glen, key, olen, curve)) {315return -BR_ERR_INVALID_ALGORITHM;316}317318/*319* The pre-master secret is the X coordinate.320*/321xoff = ctx->eng.iec->xoff(curve, &xlen);322br_ssl_engine_compute_master(&ctx->eng, prf_id, point + xoff, xlen);323324ctx->eng.iec->mulgen(point, key, olen, curve);325memcpy(ctx->eng.pad, point, glen);326return (int)glen;327}328329/*330* Perform full static ECDH. This occurs only in the context of client331* authentication with certificates: the server uses an EC public key,332* the cipher suite is of type ECDH (not ECDHE), the server requested a333* client certificate and accepts static ECDH, the client has a334* certificate with an EC public key in the same curve, and accepts335* static ECDH as well.336*337* Returned value is 0 on success, -1 on error.338*/339static int340make_pms_static_ecdh(br_ssl_client_context *ctx, int prf_id)341{342unsigned char point[133];343size_t point_len;344const br_x509_class **xc;345const br_x509_pkey *pk;346347xc = ctx->eng.x509ctx;348pk = (*xc)->get_pkey(xc, NULL);349point_len = pk->key.ec.qlen;350if (point_len > sizeof point) {351return -1;352}353memcpy(point, pk->key.ec.q, point_len);354if (!(*ctx->client_auth_vtable)->do_keyx(355ctx->client_auth_vtable, point, &point_len))356{357return -1;358}359br_ssl_engine_compute_master(&ctx->eng,360prf_id, point, point_len);361return 0;362}363364/*365* Compute the client-side signature. This is invoked only when a366* signature-based client authentication was selected. The computed367* signature is in the pad; its length (in bytes) is returned. On368* error, 0 is returned.369*/370static size_t371make_client_sign(br_ssl_client_context *ctx)372{373size_t hv_len;374375/*376* Compute hash of handshake messages so far. This "cannot" fail377* because the list of supported hash functions provided to the378* client certificate handler was trimmed to include only the379* hash functions that the multi-hasher supports.380*/381if (ctx->hash_id) {382hv_len = br_multihash_out(&ctx->eng.mhash,383ctx->hash_id, ctx->eng.pad);384} else {385br_multihash_out(&ctx->eng.mhash,386br_md5_ID, ctx->eng.pad);387br_multihash_out(&ctx->eng.mhash,388br_sha1_ID, ctx->eng.pad + 16);389hv_len = 36;390}391return (*ctx->client_auth_vtable)->do_sign(392ctx->client_auth_vtable, ctx->hash_id, hv_len,393ctx->eng.pad, sizeof ctx->eng.pad);394}395396397398static const unsigned char t0_datablock[] = {3990x00, 0x00, 0x0A, 0x00, 0x24, 0x00, 0x2F, 0x01, 0x24, 0x00, 0x35, 0x02,4000x24, 0x00, 0x3C, 0x01, 0x44, 0x00, 0x3D, 0x02, 0x44, 0x00, 0x9C, 0x03,4010x04, 0x00, 0x9D, 0x04, 0x05, 0xC0, 0x03, 0x40, 0x24, 0xC0, 0x04, 0x41,4020x24, 0xC0, 0x05, 0x42, 0x24, 0xC0, 0x08, 0x20, 0x24, 0xC0, 0x09, 0x21,4030x24, 0xC0, 0x0A, 0x22, 0x24, 0xC0, 0x0D, 0x30, 0x24, 0xC0, 0x0E, 0x31,4040x24, 0xC0, 0x0F, 0x32, 0x24, 0xC0, 0x12, 0x10, 0x24, 0xC0, 0x13, 0x11,4050x24, 0xC0, 0x14, 0x12, 0x24, 0xC0, 0x23, 0x21, 0x44, 0xC0, 0x24, 0x22,4060x55, 0xC0, 0x25, 0x41, 0x44, 0xC0, 0x26, 0x42, 0x55, 0xC0, 0x27, 0x11,4070x44, 0xC0, 0x28, 0x12, 0x55, 0xC0, 0x29, 0x31, 0x44, 0xC0, 0x2A, 0x32,4080x55, 0xC0, 0x2B, 0x23, 0x04, 0xC0, 0x2C, 0x24, 0x05, 0xC0, 0x2D, 0x43,4090x04, 0xC0, 0x2E, 0x44, 0x05, 0xC0, 0x2F, 0x13, 0x04, 0xC0, 0x30, 0x14,4100x05, 0xC0, 0x31, 0x33, 0x04, 0xC0, 0x32, 0x34, 0x05, 0xC0, 0x9C, 0x06,4110x04, 0xC0, 0x9D, 0x07, 0x04, 0xC0, 0xA0, 0x08, 0x04, 0xC0, 0xA1, 0x09,4120x04, 0xC0, 0xAC, 0x26, 0x04, 0xC0, 0xAD, 0x27, 0x04, 0xC0, 0xAE, 0x28,4130x04, 0xC0, 0xAF, 0x29, 0x04, 0xCC, 0xA8, 0x15, 0x04, 0xCC, 0xA9, 0x25,4140x04, 0x00, 0x00415};416417static const unsigned char t0_codeblock[] = {4180x00, 0x01, 0x00, 0x0A, 0x00, 0x00, 0x01, 0x00, 0x0D, 0x00, 0x00, 0x01,4190x00, 0x0E, 0x00, 0x00, 0x01, 0x00, 0x0F, 0x00, 0x00, 0x01, 0x01, 0x08,4200x00, 0x00, 0x01, 0x01, 0x09, 0x00, 0x00, 0x01, 0x02, 0x08, 0x00, 0x00,4210x01, 0x02, 0x09, 0x00, 0x00, 0x25, 0x25, 0x00, 0x00, 0x01,422T0_INT1(BR_ERR_BAD_CCS), 0x00, 0x00, 0x01,423T0_INT1(BR_ERR_BAD_CIPHER_SUITE), 0x00, 0x00, 0x01,424T0_INT1(BR_ERR_BAD_COMPRESSION), 0x00, 0x00, 0x01,425T0_INT1(BR_ERR_BAD_FINISHED), 0x00, 0x00, 0x01,426T0_INT1(BR_ERR_BAD_FRAGLEN), 0x00, 0x00, 0x01,427T0_INT1(BR_ERR_BAD_HANDSHAKE), 0x00, 0x00, 0x01,428T0_INT1(BR_ERR_BAD_HELLO_DONE), 0x00, 0x00, 0x01,429T0_INT1(BR_ERR_BAD_PARAM), 0x00, 0x00, 0x01,430T0_INT1(BR_ERR_BAD_SECRENEG), 0x00, 0x00, 0x01,431T0_INT1(BR_ERR_BAD_SNI), 0x00, 0x00, 0x01, T0_INT1(BR_ERR_BAD_VERSION),4320x00, 0x00, 0x01, T0_INT1(BR_ERR_EXTRA_EXTENSION), 0x00, 0x00, 0x01,433T0_INT1(BR_ERR_INVALID_ALGORITHM), 0x00, 0x00, 0x01,434T0_INT1(BR_ERR_LIMIT_EXCEEDED), 0x00, 0x00, 0x01, T0_INT1(BR_ERR_OK),4350x00, 0x00, 0x01, T0_INT1(BR_ERR_OVERSIZED_ID), 0x00, 0x00, 0x01,436T0_INT1(BR_ERR_RESUME_MISMATCH), 0x00, 0x00, 0x01,437T0_INT1(BR_ERR_UNEXPECTED), 0x00, 0x00, 0x01,438T0_INT1(BR_ERR_UNSUPPORTED_VERSION), 0x00, 0x00, 0x01,439T0_INT1(BR_ERR_WRONG_KEY_USAGE), 0x00, 0x00, 0x01,440T0_INT2(offsetof(br_ssl_engine_context, action)), 0x00, 0x00, 0x01,441T0_INT2(offsetof(br_ssl_engine_context, alert)), 0x00, 0x00, 0x01,442T0_INT2(offsetof(br_ssl_engine_context, application_data)), 0x00, 0x00,4430x01, T0_INT2(offsetof(br_ssl_client_context, auth_type)), 0x00, 0x00,4440x01,445T0_INT2(offsetof(br_ssl_engine_context, session) + offsetof(br_ssl_session_parameters, cipher_suite)),4460x00, 0x00, 0x01,447T0_INT2(offsetof(br_ssl_engine_context, client_random)), 0x00, 0x00,4480x01, T0_INT2(offsetof(br_ssl_engine_context, close_received)), 0x00,4490x00, 0x01, T0_INT2(offsetof(br_ssl_engine_context, ecdhe_curve)),4500x00, 0x00, 0x01,451T0_INT2(offsetof(br_ssl_engine_context, ecdhe_point)), 0x00, 0x00,4520x01, T0_INT2(offsetof(br_ssl_engine_context, ecdhe_point_len)), 0x00,4530x00, 0x01, T0_INT2(offsetof(br_ssl_engine_context, flags)), 0x00,4540x00, 0x01, T0_INT2(offsetof(br_ssl_client_context, hash_id)), 0x00,4550x00, 0x01, T0_INT2(offsetof(br_ssl_client_context, hashes)), 0x00,4560x00, 0x01, T0_INT2(offsetof(br_ssl_engine_context, log_max_frag_len)),4570x00, 0x00, 0x01,458T0_INT2(offsetof(br_ssl_client_context, min_clienthello_len)), 0x00,4590x00, 0x01, T0_INT2(offsetof(br_ssl_engine_context, pad)), 0x00, 0x00,4600x01, T0_INT2(offsetof(br_ssl_engine_context, protocol_names_num)),4610x00, 0x00, 0x01,462T0_INT2(offsetof(br_ssl_engine_context, record_type_in)), 0x00, 0x00,4630x01, T0_INT2(offsetof(br_ssl_engine_context, record_type_out)), 0x00,4640x00, 0x01, T0_INT2(offsetof(br_ssl_engine_context, reneg)), 0x00,4650x00, 0x01, T0_INT2(offsetof(br_ssl_engine_context, saved_finished)),4660x00, 0x00, 0x01,467T0_INT2(offsetof(br_ssl_engine_context, selected_protocol)), 0x00,4680x00, 0x01, T0_INT2(offsetof(br_ssl_engine_context, server_name)),4690x00, 0x00, 0x01,470T0_INT2(offsetof(br_ssl_engine_context, server_random)), 0x00, 0x00,4710x01,472T0_INT2(offsetof(br_ssl_engine_context, session) + offsetof(br_ssl_session_parameters, session_id)),4730x00, 0x00, 0x01,474T0_INT2(offsetof(br_ssl_engine_context, session) + offsetof(br_ssl_session_parameters, session_id_len)),4750x00, 0x00, 0x01,476T0_INT2(offsetof(br_ssl_engine_context, shutdown_recv)), 0x00, 0x00,4770x01, T0_INT2(offsetof(br_ssl_engine_context, suites_buf)), 0x00, 0x00,4780x01, T0_INT2(offsetof(br_ssl_engine_context, suites_num)), 0x00, 0x00,4790x01,480T0_INT2(offsetof(br_ssl_engine_context, session) + offsetof(br_ssl_session_parameters, version)),4810x00, 0x00, 0x01, T0_INT2(offsetof(br_ssl_engine_context, version_in)),4820x00, 0x00, 0x01,483T0_INT2(offsetof(br_ssl_engine_context, version_max)), 0x00, 0x00,4840x01, T0_INT2(offsetof(br_ssl_engine_context, version_min)), 0x00,4850x00, 0x01, T0_INT2(offsetof(br_ssl_engine_context, version_out)),4860x00, 0x00, 0x09, 0x26, 0x58, 0x06, 0x02, 0x68, 0x28, 0x00, 0x00, 0x06,4870x08, 0x2C, 0x0E, 0x05, 0x02, 0x71, 0x28, 0x04, 0x01, 0x3C, 0x00, 0x00,4880x01, 0x01, 0x00, 0x01, 0x03, 0x00, 0x99, 0x26, 0x5E, 0x44, 0x9D, 0x26,4890x05, 0x04, 0x60, 0x01, 0x00, 0x00, 0x02, 0x00, 0x0E, 0x06, 0x02, 0x9D,4900x00, 0x5E, 0x04, 0x6B, 0x00, 0x06, 0x02, 0x68, 0x28, 0x00, 0x00, 0x26,4910x89, 0x44, 0x05, 0x03, 0x01, 0x0C, 0x08, 0x44, 0x79, 0x2C, 0xAB, 0x1C,4920x84, 0x01, 0x0C, 0x31, 0x00, 0x00, 0x26, 0x1F, 0x01, 0x08, 0x0B, 0x44,4930x5C, 0x1F, 0x08, 0x00, 0x01, 0x03, 0x00, 0x77, 0x2E, 0x02, 0x00, 0x36,4940x17, 0x01, 0x01, 0x0B, 0x77, 0x3E, 0x29, 0x1A, 0x36, 0x06, 0x07, 0x02,4950x00, 0xCF, 0x03, 0x00, 0x04, 0x75, 0x01, 0x00, 0xC5, 0x02, 0x00, 0x26,4960x1A, 0x17, 0x06, 0x02, 0x6F, 0x28, 0xCF, 0x04, 0x76, 0x01, 0x01, 0x00,4970x77, 0x3E, 0x01, 0x16, 0x87, 0x3E, 0x01, 0x00, 0x8A, 0x3C, 0x34, 0xD5,4980x29, 0xB4, 0x06, 0x09, 0x01, 0x7F, 0xAF, 0x01, 0x7F, 0xD2, 0x04, 0x80,4990x53, 0xB1, 0x79, 0x2C, 0xA1, 0x01, T0_INT1(BR_KEYTYPE_SIGN), 0x17,5000x06, 0x01, 0xB5, 0xB8, 0x26, 0x01, 0x0D, 0x0E, 0x06, 0x07, 0x25, 0xB7,5010xB8, 0x01, 0x7F, 0x04, 0x02, 0x01, 0x00, 0x03, 0x00, 0x01, 0x0E, 0x0E,5020x05, 0x02, 0x72, 0x28, 0x06, 0x02, 0x67, 0x28, 0x33, 0x06, 0x02, 0x72,5030x28, 0x02, 0x00, 0x06, 0x1C, 0xD3, 0x80, 0x2E, 0x01, 0x81, 0x7F, 0x0E,5040x06, 0x0D, 0x25, 0x01, 0x10, 0xDE, 0x01, 0x00, 0xDD, 0x79, 0x2C, 0xAB,5050x24, 0x04, 0x04, 0xD6, 0x06, 0x01, 0xD4, 0x04, 0x01, 0xD6, 0x01, 0x7F,5060xD2, 0x01, 0x7F, 0xAF, 0x01, 0x01, 0x77, 0x3E, 0x01, 0x17, 0x87, 0x3E,5070x00, 0x00, 0x38, 0x38, 0x00, 0x00, 0x9A, 0x01, 0x0C, 0x11, 0x01, 0x00,5080x38, 0x0E, 0x06, 0x05, 0x25, 0x01,509T0_INT1(BR_KEYTYPE_RSA | BR_KEYTYPE_KEYX), 0x04, 0x30, 0x01, 0x01,5100x38, 0x0E, 0x06, 0x05, 0x25, 0x01,511T0_INT1(BR_KEYTYPE_RSA | BR_KEYTYPE_SIGN), 0x04, 0x25, 0x01, 0x02,5120x38, 0x0E, 0x06, 0x05, 0x25, 0x01,513T0_INT1(BR_KEYTYPE_EC | BR_KEYTYPE_SIGN), 0x04, 0x1A, 0x01, 0x03,5140x38, 0x0E, 0x06, 0x05, 0x25, 0x01,515T0_INT1(BR_KEYTYPE_EC | BR_KEYTYPE_KEYX), 0x04, 0x0F, 0x01, 0x04,5160x38, 0x0E, 0x06, 0x05, 0x25, 0x01,517T0_INT1(BR_KEYTYPE_EC | BR_KEYTYPE_KEYX), 0x04, 0x04, 0x01, 0x00,5180x44, 0x25, 0x00, 0x00, 0x82, 0x2E, 0x01, 0x0E, 0x0E, 0x06, 0x04, 0x01,5190x00, 0x04, 0x02, 0x01, 0x05, 0x00, 0x00, 0x40, 0x06, 0x04, 0x01, 0x06,5200x04, 0x02, 0x01, 0x00, 0x00, 0x00, 0x88, 0x2E, 0x26, 0x06, 0x08, 0x01,5210x01, 0x09, 0x01, 0x11, 0x07, 0x04, 0x03, 0x25, 0x01, 0x05, 0x00, 0x01,5220x41, 0x03, 0x00, 0x25, 0x01, 0x00, 0x43, 0x06, 0x03, 0x02, 0x00, 0x08,5230x42, 0x06, 0x03, 0x02, 0x00, 0x08, 0x26, 0x06, 0x06, 0x01, 0x01, 0x0B,5240x01, 0x06, 0x08, 0x00, 0x00, 0x8B, 0x3F, 0x26, 0x06, 0x03, 0x01, 0x09,5250x08, 0x00, 0x01, 0x40, 0x26, 0x06, 0x1E, 0x01, 0x00, 0x03, 0x00, 0x26,5260x06, 0x0E, 0x26, 0x01, 0x01, 0x17, 0x02, 0x00, 0x08, 0x03, 0x00, 0x01,5270x01, 0x11, 0x04, 0x6F, 0x25, 0x02, 0x00, 0x01, 0x01, 0x0B, 0x01, 0x06,5280x08, 0x00, 0x00, 0x7F, 0x2D, 0x44, 0x11, 0x01, 0x01, 0x17, 0x35, 0x00,5290x00, 0x9F, 0xCE, 0x26, 0x01, 0x07, 0x17, 0x01, 0x00, 0x38, 0x0E, 0x06,5300x09, 0x25, 0x01, 0x10, 0x17, 0x06, 0x01, 0x9F, 0x04, 0x35, 0x01, 0x01,5310x38, 0x0E, 0x06, 0x2C, 0x25, 0x25, 0x01, 0x00, 0x77, 0x3E, 0xB3, 0x88,5320x2E, 0x01, 0x01, 0x0E, 0x01, 0x01, 0xA8, 0x37, 0x06, 0x17, 0x29, 0x1A,5330x36, 0x06, 0x04, 0xCE, 0x25, 0x04, 0x78, 0x01, 0x80, 0x64, 0xC5, 0x01,5340x01, 0x77, 0x3E, 0x01, 0x17, 0x87, 0x3E, 0x04, 0x01, 0x9F, 0x04, 0x03,5350x72, 0x28, 0x25, 0x04, 0xFF, 0x34, 0x01, 0x26, 0x03, 0x00, 0x09, 0x26,5360x58, 0x06, 0x02, 0x68, 0x28, 0x02, 0x00, 0x00, 0x00, 0x9A, 0x01, 0x0F,5370x17, 0x00, 0x00, 0x76, 0x2E, 0x01, 0x00, 0x38, 0x0E, 0x06, 0x10, 0x25,5380x26, 0x01, 0x01, 0x0D, 0x06, 0x03, 0x25, 0x01, 0x02, 0x76, 0x3E, 0x01,5390x00, 0x04, 0x21, 0x01, 0x01, 0x38, 0x0E, 0x06, 0x14, 0x25, 0x01, 0x00,5400x76, 0x3E, 0x26, 0x01, 0x80, 0x64, 0x0E, 0x06, 0x05, 0x01, 0x82, 0x00,5410x08, 0x28, 0x5A, 0x04, 0x07, 0x25, 0x01, 0x82, 0x00, 0x08, 0x28, 0x25,5420x00, 0x00, 0x01, 0x00, 0x2F, 0x06, 0x05, 0x3A, 0xAC, 0x37, 0x04, 0x78,5430x26, 0x06, 0x04, 0x01, 0x01, 0x8F, 0x3E, 0x00, 0x01, 0xBF, 0xAA, 0xBF,5440xAA, 0xC1, 0x84, 0x44, 0x26, 0x03, 0x00, 0xB6, 0x9B, 0x9B, 0x02, 0x00,5450x4D, 0x26, 0x58, 0x06, 0x0A, 0x01, 0x03, 0xA8, 0x06, 0x02, 0x72, 0x28,5460x25, 0x04, 0x03, 0x5C, 0x8A, 0x3C, 0x00, 0x00, 0x2F, 0x06, 0x0B, 0x86,5470x2E, 0x01, 0x14, 0x0D, 0x06, 0x02, 0x72, 0x28, 0x04, 0x11, 0xCE, 0x01,5480x07, 0x17, 0x26, 0x01, 0x02, 0x0D, 0x06, 0x06, 0x06, 0x02, 0x72, 0x28,5490x04, 0x70, 0x25, 0xC2, 0x01, 0x01, 0x0D, 0x33, 0x37, 0x06, 0x02, 0x61,5500x28, 0x26, 0x01, 0x01, 0xC8, 0x36, 0xB2, 0x00, 0x01, 0xB8, 0x01, 0x0B,5510x0E, 0x05, 0x02, 0x72, 0x28, 0x26, 0x01, 0x03, 0x0E, 0x06, 0x08, 0xC0,5520x06, 0x02, 0x68, 0x28, 0x44, 0x25, 0x00, 0x44, 0x57, 0xC0, 0xAA, 0x26,5530x06, 0x23, 0xC0, 0xAA, 0x26, 0x56, 0x26, 0x06, 0x18, 0x26, 0x01, 0x82,5540x00, 0x0F, 0x06, 0x05, 0x01, 0x82, 0x00, 0x04, 0x01, 0x26, 0x03, 0x00,5550x84, 0x02, 0x00, 0xB6, 0x02, 0x00, 0x53, 0x04, 0x65, 0x9B, 0x54, 0x04,5560x5A, 0x9B, 0x9B, 0x55, 0x26, 0x06, 0x02, 0x35, 0x00, 0x25, 0x2B, 0x00,5570x00, 0x79, 0x2C, 0xA1, 0x01, 0x7F, 0xB0, 0x26, 0x58, 0x06, 0x02, 0x35,5580x28, 0x26, 0x05, 0x02, 0x72, 0x28, 0x38, 0x17, 0x0D, 0x06, 0x02, 0x74,5590x28, 0x3B, 0x00, 0x00, 0x9C, 0xB8, 0x01, 0x14, 0x0D, 0x06, 0x02, 0x72,5600x28, 0x84, 0x01, 0x0C, 0x08, 0x01, 0x0C, 0xB6, 0x9B, 0x84, 0x26, 0x01,5610x0C, 0x08, 0x01, 0x0C, 0x30, 0x05, 0x02, 0x64, 0x28, 0x00, 0x00, 0xB9,5620x06, 0x02, 0x72, 0x28, 0x06, 0x02, 0x66, 0x28, 0x00, 0x0A, 0xB8, 0x01,5630x02, 0x0E, 0x05, 0x02, 0x72, 0x28, 0xBF, 0x03, 0x00, 0x02, 0x00, 0x95,5640x2C, 0x0A, 0x02, 0x00, 0x94, 0x2C, 0x0F, 0x37, 0x06, 0x02, 0x73, 0x28,5650x02, 0x00, 0x93, 0x2C, 0x0D, 0x06, 0x02, 0x6B, 0x28, 0x02, 0x00, 0x96,5660x3C, 0x8C, 0x01, 0x20, 0xB6, 0x01, 0x00, 0x03, 0x01, 0xC1, 0x03, 0x02,5670x02, 0x02, 0x01, 0x20, 0x0F, 0x06, 0x02, 0x70, 0x28, 0x84, 0x02, 0x02,5680xB6, 0x02, 0x02, 0x8E, 0x2E, 0x0E, 0x02, 0x02, 0x01, 0x00, 0x0F, 0x17,5690x06, 0x0B, 0x8D, 0x84, 0x02, 0x02, 0x30, 0x06, 0x04, 0x01, 0x7F, 0x03,5700x01, 0x8D, 0x84, 0x02, 0x02, 0x31, 0x02, 0x02, 0x8E, 0x3E, 0x02, 0x00,5710x92, 0x02, 0x01, 0x98, 0xBF, 0x26, 0xC3, 0x58, 0x06, 0x02, 0x62, 0x28,5720x26, 0xCD, 0x02, 0x00, 0x01, 0x86, 0x03, 0x0A, 0x17, 0x06, 0x02, 0x62,5730x28, 0x79, 0x02, 0x01, 0x98, 0xC1, 0x06, 0x02, 0x63, 0x28, 0x26, 0x06,5740x81, 0x47, 0xBF, 0xAA, 0xA6, 0x03, 0x03, 0xA4, 0x03, 0x04, 0xA2, 0x03,5750x05, 0xA5, 0x03, 0x06, 0xA7, 0x03, 0x07, 0xA3, 0x03, 0x08, 0x27, 0x03,5760x09, 0x26, 0x06, 0x81, 0x18, 0xBF, 0x01, 0x00, 0x38, 0x0E, 0x06, 0x0F,5770x25, 0x02, 0x03, 0x05, 0x02, 0x6C, 0x28, 0x01, 0x00, 0x03, 0x03, 0xBE,5780x04, 0x80, 0x7F, 0x01, 0x01, 0x38, 0x0E, 0x06, 0x0F, 0x25, 0x02, 0x05,5790x05, 0x02, 0x6C, 0x28, 0x01, 0x00, 0x03, 0x05, 0xBC, 0x04, 0x80, 0x6A,5800x01, 0x83, 0xFE, 0x01, 0x38, 0x0E, 0x06, 0x0F, 0x25, 0x02, 0x04, 0x05,5810x02, 0x6C, 0x28, 0x01, 0x00, 0x03, 0x04, 0xBD, 0x04, 0x80, 0x53, 0x01,5820x0D, 0x38, 0x0E, 0x06, 0x0E, 0x25, 0x02, 0x06, 0x05, 0x02, 0x6C, 0x28,5830x01, 0x00, 0x03, 0x06, 0xBA, 0x04, 0x3F, 0x01, 0x0A, 0x38, 0x0E, 0x06,5840x0E, 0x25, 0x02, 0x07, 0x05, 0x02, 0x6C, 0x28, 0x01, 0x00, 0x03, 0x07,5850xBA, 0x04, 0x2B, 0x01, 0x0B, 0x38, 0x0E, 0x06, 0x0E, 0x25, 0x02, 0x08,5860x05, 0x02, 0x6C, 0x28, 0x01, 0x00, 0x03, 0x08, 0xBA, 0x04, 0x17, 0x01,5870x10, 0x38, 0x0E, 0x06, 0x0E, 0x25, 0x02, 0x09, 0x05, 0x02, 0x6C, 0x28,5880x01, 0x00, 0x03, 0x09, 0xAE, 0x04, 0x03, 0x6C, 0x28, 0x25, 0x04, 0xFE,5890x64, 0x02, 0x04, 0x06, 0x0D, 0x02, 0x04, 0x01, 0x05, 0x0F, 0x06, 0x02,5900x69, 0x28, 0x01, 0x01, 0x88, 0x3E, 0x9B, 0x04, 0x0C, 0xA4, 0x01, 0x05,5910x0F, 0x06, 0x02, 0x69, 0x28, 0x01, 0x01, 0x88, 0x3E, 0x9B, 0x02, 0x01,5920x00, 0x04, 0xB8, 0x01, 0x0C, 0x0E, 0x05, 0x02, 0x72, 0x28, 0xC1, 0x01,5930x03, 0x0E, 0x05, 0x02, 0x6D, 0x28, 0xBF, 0x26, 0x7C, 0x3E, 0x26, 0x01,5940x20, 0x10, 0x06, 0x02, 0x6D, 0x28, 0x40, 0x44, 0x11, 0x01, 0x01, 0x17,5950x05, 0x02, 0x6D, 0x28, 0xC1, 0x26, 0x01, 0x81, 0x05, 0x0F, 0x06, 0x02,5960x6D, 0x28, 0x26, 0x7E, 0x3E, 0x7D, 0x44, 0xB6, 0x92, 0x2C, 0x01, 0x86,5970x03, 0x10, 0x03, 0x00, 0x79, 0x2C, 0xCB, 0x03, 0x01, 0x01, 0x02, 0x03,5980x02, 0x02, 0x00, 0x06, 0x21, 0xC1, 0x26, 0x26, 0x01, 0x02, 0x0A, 0x44,5990x01, 0x06, 0x0F, 0x37, 0x06, 0x02, 0x6D, 0x28, 0x03, 0x02, 0xC1, 0x02,6000x01, 0x01, 0x01, 0x0B, 0x01, 0x03, 0x08, 0x0E, 0x05, 0x02, 0x6D, 0x28,6010x04, 0x08, 0x02, 0x01, 0x06, 0x04, 0x01, 0x00, 0x03, 0x02, 0xBF, 0x26,6020x03, 0x03, 0x26, 0x01, 0x84, 0x00, 0x0F, 0x06, 0x02, 0x6E, 0x28, 0x84,6030x44, 0xB6, 0x02, 0x02, 0x02, 0x01, 0x02, 0x03, 0x50, 0x26, 0x06, 0x01,6040x28, 0x25, 0x9B, 0x00, 0x02, 0x03, 0x00, 0x03, 0x01, 0x02, 0x00, 0x97,6050x02, 0x01, 0x02, 0x00, 0x39, 0x26, 0x01, 0x00, 0x0E, 0x06, 0x02, 0x60,6060x00, 0xD0, 0x04, 0x74, 0x02, 0x01, 0x00, 0x03, 0x00, 0xC1, 0xAA, 0x26,6070x06, 0x80, 0x43, 0xC1, 0x01, 0x01, 0x38, 0x0E, 0x06, 0x06, 0x25, 0x01,6080x81, 0x7F, 0x04, 0x2E, 0x01, 0x80, 0x40, 0x38, 0x0E, 0x06, 0x07, 0x25,6090x01, 0x83, 0xFE, 0x00, 0x04, 0x20, 0x01, 0x80, 0x41, 0x38, 0x0E, 0x06,6100x07, 0x25, 0x01, 0x84, 0x80, 0x00, 0x04, 0x12, 0x01, 0x80, 0x42, 0x38,6110x0E, 0x06, 0x07, 0x25, 0x01, 0x88, 0x80, 0x00, 0x04, 0x04, 0x01, 0x00,6120x44, 0x25, 0x02, 0x00, 0x37, 0x03, 0x00, 0x04, 0xFF, 0x39, 0x9B, 0x79,6130x2C, 0xC9, 0x05, 0x09, 0x02, 0x00, 0x01, 0x83, 0xFF, 0x7F, 0x17, 0x03,6140x00, 0x92, 0x2C, 0x01, 0x86, 0x03, 0x10, 0x06, 0x3A, 0xBB, 0x26, 0x81,6150x3D, 0x41, 0x25, 0x26, 0x01, 0x08, 0x0B, 0x37, 0x01, 0x8C, 0x80, 0x00,6160x37, 0x17, 0x02, 0x00, 0x17, 0x02, 0x00, 0x01, 0x8C, 0x80, 0x00, 0x17,6170x06, 0x19, 0x26, 0x01, 0x81, 0x7F, 0x17, 0x06, 0x05, 0x01, 0x84, 0x80,6180x00, 0x37, 0x26, 0x01, 0x83, 0xFE, 0x00, 0x17, 0x06, 0x05, 0x01, 0x88,6190x80, 0x00, 0x37, 0x03, 0x00, 0x04, 0x09, 0x02, 0x00, 0x01, 0x8C, 0x88,6200x01, 0x17, 0x03, 0x00, 0x16, 0xBF, 0xAA, 0x26, 0x06, 0x23, 0xBF, 0xAA,6210x26, 0x15, 0x26, 0x06, 0x18, 0x26, 0x01, 0x82, 0x00, 0x0F, 0x06, 0x05,6220x01, 0x82, 0x00, 0x04, 0x01, 0x26, 0x03, 0x01, 0x84, 0x02, 0x01, 0xB6,6230x02, 0x01, 0x12, 0x04, 0x65, 0x9B, 0x13, 0x04, 0x5A, 0x9B, 0x14, 0x9B,6240x02, 0x00, 0x2A, 0x00, 0x00, 0xB9, 0x26, 0x5A, 0x06, 0x07, 0x25, 0x06,6250x02, 0x66, 0x28, 0x04, 0x74, 0x00, 0x00, 0xC2, 0x01, 0x03, 0xC0, 0x44,6260x25, 0x44, 0x00, 0x00, 0xBF, 0xC6, 0x00, 0x03, 0x01, 0x00, 0x03, 0x00,6270xBF, 0xAA, 0x26, 0x06, 0x80, 0x50, 0xC1, 0x03, 0x01, 0xC1, 0x03, 0x02,6280x02, 0x01, 0x01, 0x08, 0x0E, 0x06, 0x16, 0x02, 0x02, 0x01, 0x0F, 0x0C,6290x06, 0x0D, 0x01, 0x01, 0x02, 0x02, 0x01, 0x10, 0x08, 0x0B, 0x02, 0x00,6300x37, 0x03, 0x00, 0x04, 0x2A, 0x02, 0x01, 0x01, 0x02, 0x10, 0x02, 0x01,6310x01, 0x06, 0x0C, 0x17, 0x02, 0x02, 0x01, 0x01, 0x0E, 0x02, 0x02, 0x01,6320x03, 0x0E, 0x37, 0x17, 0x06, 0x11, 0x02, 0x00, 0x01, 0x01, 0x02, 0x02,6330x5D, 0x01, 0x02, 0x0B, 0x02, 0x01, 0x08, 0x0B, 0x37, 0x03, 0x00, 0x04,6340xFF, 0x2C, 0x9B, 0x02, 0x00, 0x00, 0x00, 0xBF, 0x01, 0x01, 0x0E, 0x05,6350x02, 0x65, 0x28, 0xC1, 0x01, 0x08, 0x08, 0x82, 0x2E, 0x0E, 0x05, 0x02,6360x65, 0x28, 0x00, 0x00, 0xBF, 0x88, 0x2E, 0x05, 0x15, 0x01, 0x01, 0x0E,6370x05, 0x02, 0x69, 0x28, 0xC1, 0x01, 0x00, 0x0E, 0x05, 0x02, 0x69, 0x28,6380x01, 0x02, 0x88, 0x3E, 0x04, 0x1C, 0x01, 0x19, 0x0E, 0x05, 0x02, 0x69,6390x28, 0xC1, 0x01, 0x18, 0x0E, 0x05, 0x02, 0x69, 0x28, 0x84, 0x01, 0x18,6400xB6, 0x89, 0x84, 0x01, 0x18, 0x30, 0x05, 0x02, 0x69, 0x28, 0x00, 0x00,6410xBF, 0x06, 0x02, 0x6A, 0x28, 0x00, 0x00, 0x01, 0x02, 0x97, 0xC2, 0x01,6420x08, 0x0B, 0xC2, 0x08, 0x00, 0x00, 0x01, 0x03, 0x97, 0xC2, 0x01, 0x08,6430x0B, 0xC2, 0x08, 0x01, 0x08, 0x0B, 0xC2, 0x08, 0x00, 0x00, 0x01, 0x01,6440x97, 0xC2, 0x00, 0x00, 0x3A, 0x26, 0x58, 0x05, 0x01, 0x00, 0x25, 0xD0,6450x04, 0x76, 0x02, 0x03, 0x00, 0x91, 0x2E, 0x03, 0x01, 0x01, 0x00, 0x26,6460x02, 0x01, 0x0A, 0x06, 0x10, 0x26, 0x01, 0x01, 0x0B, 0x90, 0x08, 0x2C,6470x02, 0x00, 0x0E, 0x06, 0x01, 0x00, 0x5C, 0x04, 0x6A, 0x25, 0x01, 0x7F,6480x00, 0x00, 0x01, 0x15, 0x87, 0x3E, 0x44, 0x52, 0x25, 0x52, 0x25, 0x29,6490x00, 0x00, 0x01, 0x01, 0x44, 0xC4, 0x00, 0x00, 0x44, 0x38, 0x97, 0x44,6500x26, 0x06, 0x05, 0xC2, 0x25, 0x5D, 0x04, 0x78, 0x25, 0x00, 0x00, 0x26,6510x01, 0x81, 0xAC, 0x00, 0x0E, 0x06, 0x04, 0x25, 0x01, 0x7F, 0x00, 0x9A,6520x59, 0x00, 0x02, 0x03, 0x00, 0x79, 0x2C, 0x9A, 0x03, 0x01, 0x02, 0x01,6530x01, 0x0F, 0x17, 0x02, 0x01, 0x01, 0x04, 0x11, 0x01, 0x0F, 0x17, 0x02,6540x01, 0x01, 0x08, 0x11, 0x01, 0x0F, 0x17, 0x01, 0x00, 0x38, 0x0E, 0x06,6550x10, 0x25, 0x01, 0x00, 0x01, 0x18, 0x02, 0x00, 0x06, 0x03, 0x49, 0x04,6560x01, 0x4A, 0x04, 0x81, 0x0D, 0x01, 0x01, 0x38, 0x0E, 0x06, 0x10, 0x25,6570x01, 0x01, 0x01, 0x10, 0x02, 0x00, 0x06, 0x03, 0x49, 0x04, 0x01, 0x4A,6580x04, 0x80, 0x77, 0x01, 0x02, 0x38, 0x0E, 0x06, 0x10, 0x25, 0x01, 0x01,6590x01, 0x20, 0x02, 0x00, 0x06, 0x03, 0x49, 0x04, 0x01, 0x4A, 0x04, 0x80,6600x61, 0x01, 0x03, 0x38, 0x0E, 0x06, 0x0F, 0x25, 0x25, 0x01, 0x10, 0x02,6610x00, 0x06, 0x03, 0x47, 0x04, 0x01, 0x48, 0x04, 0x80, 0x4C, 0x01, 0x04,6620x38, 0x0E, 0x06, 0x0E, 0x25, 0x25, 0x01, 0x20, 0x02, 0x00, 0x06, 0x03,6630x47, 0x04, 0x01, 0x48, 0x04, 0x38, 0x01, 0x05, 0x38, 0x0E, 0x06, 0x0C,6640x25, 0x25, 0x02, 0x00, 0x06, 0x03, 0x4B, 0x04, 0x01, 0x4C, 0x04, 0x26,6650x26, 0x01, 0x09, 0x0F, 0x06, 0x02, 0x68, 0x28, 0x44, 0x25, 0x26, 0x01,6660x01, 0x17, 0x01, 0x04, 0x0B, 0x01, 0x10, 0x08, 0x44, 0x01, 0x08, 0x17,6670x01, 0x10, 0x44, 0x09, 0x02, 0x00, 0x06, 0x03, 0x45, 0x04, 0x01, 0x46,6680x00, 0x25, 0x00, 0x00, 0x9A, 0x01, 0x0C, 0x11, 0x01, 0x02, 0x0F, 0x00,6690x00, 0x9A, 0x01, 0x0C, 0x11, 0x26, 0x5B, 0x44, 0x01, 0x03, 0x0A, 0x17,6700x00, 0x00, 0x9A, 0x01, 0x0C, 0x11, 0x01, 0x01, 0x0E, 0x00, 0x00, 0x9A,6710x01, 0x0C, 0x11, 0x5A, 0x00, 0x00, 0x9A, 0x01, 0x81, 0x70, 0x17, 0x01,6720x20, 0x0D, 0x00, 0x00, 0x1B, 0x01, 0x00, 0x75, 0x2E, 0x26, 0x06, 0x22,6730x01, 0x01, 0x38, 0x0E, 0x06, 0x06, 0x25, 0x01, 0x00, 0x9E, 0x04, 0x14,6740x01, 0x02, 0x38, 0x0E, 0x06, 0x0D, 0x25, 0x77, 0x2E, 0x01, 0x01, 0x0E,6750x06, 0x03, 0x01, 0x10, 0x37, 0x04, 0x01, 0x25, 0x04, 0x01, 0x25, 0x7B,6760x2E, 0x05, 0x33, 0x2F, 0x06, 0x30, 0x86, 0x2E, 0x01, 0x14, 0x38, 0x0E,6770x06, 0x06, 0x25, 0x01, 0x02, 0x37, 0x04, 0x22, 0x01, 0x15, 0x38, 0x0E,6780x06, 0x09, 0x25, 0xAD, 0x06, 0x03, 0x01, 0x7F, 0x9E, 0x04, 0x13, 0x01,6790x16, 0x38, 0x0E, 0x06, 0x06, 0x25, 0x01, 0x01, 0x37, 0x04, 0x07, 0x25,6800x01, 0x04, 0x37, 0x01, 0x00, 0x25, 0x1A, 0x06, 0x03, 0x01, 0x08, 0x37,6810x00, 0x00, 0x1B, 0x26, 0x05, 0x13, 0x2F, 0x06, 0x10, 0x86, 0x2E, 0x01,6820x15, 0x0E, 0x06, 0x08, 0x25, 0xAD, 0x01, 0x00, 0x77, 0x3E, 0x04, 0x01,6830x20, 0x00, 0x00, 0xCE, 0x01, 0x07, 0x17, 0x01, 0x01, 0x0F, 0x06, 0x02,6840x72, 0x28, 0x00, 0x01, 0x03, 0x00, 0x29, 0x1A, 0x06, 0x05, 0x02, 0x00,6850x87, 0x3E, 0x00, 0xCE, 0x25, 0x04, 0x74, 0x00, 0x01, 0x14, 0xD1, 0x01,6860x01, 0xDE, 0x29, 0x26, 0x01, 0x00, 0xC8, 0x01, 0x16, 0xD1, 0xD7, 0x29,6870x00, 0x00, 0x01, 0x0B, 0xDE, 0x4E, 0x26, 0x26, 0x01, 0x03, 0x08, 0xDD,6880xDD, 0x18, 0x26, 0x58, 0x06, 0x02, 0x25, 0x00, 0xDD, 0x1D, 0x26, 0x06,6890x05, 0x84, 0x44, 0xD8, 0x04, 0x77, 0x25, 0x04, 0x6C, 0x00, 0x21, 0x01,6900x0F, 0xDE, 0x26, 0x92, 0x2C, 0x01, 0x86, 0x03, 0x10, 0x06, 0x0C, 0x01,6910x04, 0x08, 0xDD, 0x80, 0x2E, 0xDE, 0x78, 0x2E, 0xDE, 0x04, 0x02, 0x5E,6920xDD, 0x26, 0xDC, 0x84, 0x44, 0xD8, 0x00, 0x02, 0xA4, 0xA6, 0x08, 0xA2,6930x08, 0xA5, 0x08, 0xA7, 0x08, 0xA3, 0x08, 0x27, 0x08, 0x03, 0x00, 0x01,6940x01, 0xDE, 0x01, 0x27, 0x8E, 0x2E, 0x08, 0x91, 0x2E, 0x01, 0x01, 0x0B,6950x08, 0x02, 0x00, 0x06, 0x04, 0x5E, 0x02, 0x00, 0x08, 0x83, 0x2C, 0x38,6960x09, 0x26, 0x5B, 0x06, 0x24, 0x02, 0x00, 0x05, 0x04, 0x44, 0x5E, 0x44,6970x5F, 0x01, 0x04, 0x09, 0x26, 0x58, 0x06, 0x03, 0x25, 0x01, 0x00, 0x26,6980x01, 0x04, 0x08, 0x02, 0x00, 0x08, 0x03, 0x00, 0x44, 0x01, 0x04, 0x08,6990x38, 0x08, 0x44, 0x04, 0x03, 0x25, 0x01, 0x7F, 0x03, 0x01, 0xDD, 0x94,7000x2C, 0xDC, 0x7A, 0x01, 0x04, 0x19, 0x7A, 0x01, 0x04, 0x08, 0x01, 0x1C,7010x32, 0x7A, 0x01, 0x20, 0xD8, 0x8D, 0x8E, 0x2E, 0xDA, 0x91, 0x2E, 0x26,7020x01, 0x01, 0x0B, 0xDC, 0x90, 0x44, 0x26, 0x06, 0x0F, 0x5D, 0x38, 0x2C,7030x26, 0xC7, 0x05, 0x02, 0x62, 0x28, 0xDC, 0x44, 0x5E, 0x44, 0x04, 0x6E,7040x60, 0x01, 0x01, 0xDE, 0x01, 0x00, 0xDE, 0x02, 0x00, 0x06, 0x81, 0x5A,7050x02, 0x00, 0xDC, 0xA4, 0x06, 0x0E, 0x01, 0x83, 0xFE, 0x01, 0xDC, 0x89,7060xA4, 0x01, 0x04, 0x09, 0x26, 0xDC, 0x5D, 0xDA, 0xA6, 0x06, 0x16, 0x01,7070x00, 0xDC, 0x8B, 0xA6, 0x01, 0x04, 0x09, 0x26, 0xDC, 0x01, 0x02, 0x09,7080x26, 0xDC, 0x01, 0x00, 0xDE, 0x01, 0x03, 0x09, 0xD9, 0xA2, 0x06, 0x0C,7090x01, 0x01, 0xDC, 0x01, 0x01, 0xDC, 0x82, 0x2E, 0x01, 0x08, 0x09, 0xDE,7100xA5, 0x06, 0x19, 0x01, 0x0D, 0xDC, 0xA5, 0x01, 0x04, 0x09, 0x26, 0xDC,7110x01, 0x02, 0x09, 0xDC, 0x42, 0x06, 0x03, 0x01, 0x03, 0xDB, 0x43, 0x06,7120x03, 0x01, 0x01, 0xDB, 0xA7, 0x26, 0x06, 0x36, 0x01, 0x0A, 0xDC, 0x01,7130x04, 0x09, 0x26, 0xDC, 0x5F, 0xDC, 0x40, 0x01, 0x00, 0x26, 0x01, 0x82,7140x80, 0x80, 0x80, 0x00, 0x17, 0x06, 0x0A, 0x01, 0xFD, 0xFF, 0xFF, 0xFF,7150x7F, 0x17, 0x01, 0x1D, 0xDC, 0x26, 0x01, 0x20, 0x0A, 0x06, 0x0C, 0xA0,7160x11, 0x01, 0x01, 0x17, 0x06, 0x02, 0x26, 0xDC, 0x5C, 0x04, 0x6E, 0x60,7170x04, 0x01, 0x25, 0xA3, 0x06, 0x0A, 0x01, 0x0B, 0xDC, 0x01, 0x02, 0xDC,7180x01, 0x82, 0x00, 0xDC, 0x27, 0x26, 0x06, 0x1F, 0x01, 0x10, 0xDC, 0x01,7190x04, 0x09, 0x26, 0xDC, 0x5F, 0xDC, 0x85, 0x2C, 0x01, 0x00, 0xA0, 0x0F,7200x06, 0x0A, 0x26, 0x1E, 0x26, 0xDE, 0x84, 0x44, 0xD8, 0x5C, 0x04, 0x72,7210x60, 0x04, 0x01, 0x25, 0x02, 0x01, 0x58, 0x05, 0x11, 0x01, 0x15, 0xDC,7220x02, 0x01, 0x26, 0xDC, 0x26, 0x06, 0x06, 0x5D, 0x01, 0x00, 0xDE, 0x04,7230x77, 0x25, 0x00, 0x00, 0x01, 0x10, 0xDE, 0x79, 0x2C, 0x26, 0xCC, 0x06,7240x0C, 0xAB, 0x23, 0x26, 0x5E, 0xDD, 0x26, 0xDC, 0x84, 0x44, 0xD8, 0x04,7250x0D, 0x26, 0xCA, 0x44, 0xAB, 0x22, 0x26, 0x5C, 0xDD, 0x26, 0xDE, 0x84,7260x44, 0xD8, 0x00, 0x00, 0x9C, 0x01, 0x14, 0xDE, 0x01, 0x0C, 0xDD, 0x84,7270x01, 0x0C, 0xD8, 0x00, 0x00, 0x51, 0x26, 0x01, 0x00, 0x0E, 0x06, 0x02,7280x60, 0x00, 0xCE, 0x25, 0x04, 0x73, 0x00, 0x26, 0xDC, 0xD8, 0x00, 0x00,7290x26, 0xDE, 0xD8, 0x00, 0x01, 0x03, 0x00, 0x41, 0x25, 0x26, 0x01, 0x10,7300x17, 0x06, 0x06, 0x01, 0x04, 0xDE, 0x02, 0x00, 0xDE, 0x26, 0x01, 0x08,7310x17, 0x06, 0x06, 0x01, 0x03, 0xDE, 0x02, 0x00, 0xDE, 0x26, 0x01, 0x20,7320x17, 0x06, 0x06, 0x01, 0x05, 0xDE, 0x02, 0x00, 0xDE, 0x26, 0x01, 0x80,7330x40, 0x17, 0x06, 0x06, 0x01, 0x06, 0xDE, 0x02, 0x00, 0xDE, 0x01, 0x04,7340x17, 0x06, 0x06, 0x01, 0x02, 0xDE, 0x02, 0x00, 0xDE, 0x00, 0x00, 0x26,7350x01, 0x08, 0x4F, 0xDE, 0xDE, 0x00, 0x00, 0x26, 0x01, 0x10, 0x4F, 0xDE,7360xDC, 0x00, 0x00, 0x26, 0x52, 0x06, 0x02, 0x25, 0x00, 0xCE, 0x25, 0x04,7370x76738};739740static const uint16_t t0_caddr[] = {7410,7425,74310,74415,74520,74625,74730,74835,74940,75044,75148,75252,75356,75460,75564,75668,75772,75876,75980,76084,76188,76292,76396,764100,765104,766108,767112,768116,769120,770124,771129,772134,773139,774144,775149,776154,777159,778164,779169,780174,781179,782184,783189,784194,785199,786204,787209,788214,789219,790224,791229,792234,793239,794244,795249,796254,797259,798264,799269,800274,801279,802284,803289,804294,805303,806316,807320,808345,809351,810370,811381,812422,813542,814546,815611,816626,817637,818655,819684,820694,821730,822740,823818,824832,825838,826897,827916,828951,8291000,8301076,8311103,8321134,8331145,8341497,8351644,8361668,8371884,8381898,8391907,8401911,8412006,8422027,8432083,8442090,8452101,8462117,8472123,8482134,8492169,8502181,8512187,8522202,8532218,8542411,8552420,8562433,8572442,8582449,8592459,8602565,8612590,8622603,8632619,8642637,8652669,8662703,8673071,8683107,8693120,8703134,8713139,8723144,8733210,8743218,8753226876};877878#define T0_INTERPRETED 88879880#define T0_ENTER(ip, rp, slot) do { \881const unsigned char *t0_newip; \882uint32_t t0_lnum; \883t0_newip = &t0_codeblock[t0_caddr[(slot) - T0_INTERPRETED]]; \884t0_lnum = t0_parse7E_unsigned(&t0_newip); \885(rp) += t0_lnum; \886*((rp) ++) = (uint32_t)((ip) - &t0_codeblock[0]) + (t0_lnum << 16); \887(ip) = t0_newip; \888} while (0)889890#define T0_DEFENTRY(name, slot) \891void \892name(void *ctx) \893{ \894t0_context *t0ctx = ctx; \895t0ctx->ip = &t0_codeblock[0]; \896T0_ENTER(t0ctx->ip, t0ctx->rp, slot); \897}898899T0_DEFENTRY(br_ssl_hs_client_init_main, 169)900901#define T0_NEXT(t0ipp) (*(*(t0ipp)) ++)902903void904br_ssl_hs_client_run(void *t0ctx)905{906uint32_t *dp, *rp;907const unsigned char *ip;908909#define T0_LOCAL(x) (*(rp - 2 - (x)))910#define T0_POP() (*-- dp)911#define T0_POPi() (*(int32_t *)(-- dp))912#define T0_PEEK(x) (*(dp - 1 - (x)))913#define T0_PEEKi(x) (*(int32_t *)(dp - 1 - (x)))914#define T0_PUSH(v) do { *dp = (v); dp ++; } while (0)915#define T0_PUSHi(v) do { *(int32_t *)dp = (v); dp ++; } while (0)916#define T0_RPOP() (*-- rp)917#define T0_RPOPi() (*(int32_t *)(-- rp))918#define T0_RPUSH(v) do { *rp = (v); rp ++; } while (0)919#define T0_RPUSHi(v) do { *(int32_t *)rp = (v); rp ++; } while (0)920#define T0_ROLL(x) do { \921size_t t0len = (size_t)(x); \922uint32_t t0tmp = *(dp - 1 - t0len); \923memmove(dp - t0len - 1, dp - t0len, t0len * sizeof *dp); \924*(dp - 1) = t0tmp; \925} while (0)926#define T0_SWAP() do { \927uint32_t t0tmp = *(dp - 2); \928*(dp - 2) = *(dp - 1); \929*(dp - 1) = t0tmp; \930} while (0)931#define T0_ROT() do { \932uint32_t t0tmp = *(dp - 3); \933*(dp - 3) = *(dp - 2); \934*(dp - 2) = *(dp - 1); \935*(dp - 1) = t0tmp; \936} while (0)937#define T0_NROT() do { \938uint32_t t0tmp = *(dp - 1); \939*(dp - 1) = *(dp - 2); \940*(dp - 2) = *(dp - 3); \941*(dp - 3) = t0tmp; \942} while (0)943#define T0_PICK(x) do { \944uint32_t t0depth = (x); \945T0_PUSH(T0_PEEK(t0depth)); \946} while (0)947#define T0_CO() do { \948goto t0_exit; \949} while (0)950#define T0_RET() goto t0_next951952dp = ((t0_context *)t0ctx)->dp;953rp = ((t0_context *)t0ctx)->rp;954ip = ((t0_context *)t0ctx)->ip;955goto t0_next;956for (;;) {957uint32_t t0x;958959t0_next:960t0x = T0_NEXT(&ip);961if (t0x < T0_INTERPRETED) {962switch (t0x) {963int32_t t0off;964965case 0: /* ret */966t0x = T0_RPOP();967rp -= (t0x >> 16);968t0x &= 0xFFFF;969if (t0x == 0) {970ip = NULL;971goto t0_exit;972}973ip = &t0_codeblock[t0x];974break;975case 1: /* literal constant */976T0_PUSHi(t0_parse7E_signed(&ip));977break;978case 2: /* read local */979T0_PUSH(T0_LOCAL(t0_parse7E_unsigned(&ip)));980break;981case 3: /* write local */982T0_LOCAL(t0_parse7E_unsigned(&ip)) = T0_POP();983break;984case 4: /* jump */985t0off = t0_parse7E_signed(&ip);986ip += t0off;987break;988case 5: /* jump if */989t0off = t0_parse7E_signed(&ip);990if (T0_POP()) {991ip += t0off;992}993break;994case 6: /* jump if not */995t0off = t0_parse7E_signed(&ip);996if (!T0_POP()) {997ip += t0off;998}999break;1000case 7: {1001/* * */10021003uint32_t b = T0_POP();1004uint32_t a = T0_POP();1005T0_PUSH(a * b);10061007}1008break;1009case 8: {1010/* + */10111012uint32_t b = T0_POP();1013uint32_t a = T0_POP();1014T0_PUSH(a + b);10151016}1017break;1018case 9: {1019/* - */10201021uint32_t b = T0_POP();1022uint32_t a = T0_POP();1023T0_PUSH(a - b);10241025}1026break;1027case 10: {1028/* < */10291030int32_t b = T0_POPi();1031int32_t a = T0_POPi();1032T0_PUSH(-(uint32_t)(a < b));10331034}1035break;1036case 11: {1037/* << */10381039int c = (int)T0_POPi();1040uint32_t x = T0_POP();1041T0_PUSH(x << c);10421043}1044break;1045case 12: {1046/* <= */10471048int32_t b = T0_POPi();1049int32_t a = T0_POPi();1050T0_PUSH(-(uint32_t)(a <= b));10511052}1053break;1054case 13: {1055/* <> */10561057uint32_t b = T0_POP();1058uint32_t a = T0_POP();1059T0_PUSH(-(uint32_t)(a != b));10601061}1062break;1063case 14: {1064/* = */10651066uint32_t b = T0_POP();1067uint32_t a = T0_POP();1068T0_PUSH(-(uint32_t)(a == b));10691070}1071break;1072case 15: {1073/* > */10741075int32_t b = T0_POPi();1076int32_t a = T0_POPi();1077T0_PUSH(-(uint32_t)(a > b));10781079}1080break;1081case 16: {1082/* >= */10831084int32_t b = T0_POPi();1085int32_t a = T0_POPi();1086T0_PUSH(-(uint32_t)(a >= b));10871088}1089break;1090case 17: {1091/* >> */10921093int c = (int)T0_POPi();1094int32_t x = T0_POPi();1095T0_PUSHi(x >> c);10961097}1098break;1099case 18: {1100/* anchor-dn-append-name */11011102size_t len;11031104len = T0_POP();1105if (CTX->client_auth_vtable != NULL) {1106(*CTX->client_auth_vtable)->append_name(1107CTX->client_auth_vtable, ENG->pad, len);1108}11091110}1111break;1112case 19: {1113/* anchor-dn-end-name */11141115if (CTX->client_auth_vtable != NULL) {1116(*CTX->client_auth_vtable)->end_name(1117CTX->client_auth_vtable);1118}11191120}1121break;1122case 20: {1123/* anchor-dn-end-name-list */11241125if (CTX->client_auth_vtable != NULL) {1126(*CTX->client_auth_vtable)->end_name_list(1127CTX->client_auth_vtable);1128}11291130}1131break;1132case 21: {1133/* anchor-dn-start-name */11341135size_t len;11361137len = T0_POP();1138if (CTX->client_auth_vtable != NULL) {1139(*CTX->client_auth_vtable)->start_name(1140CTX->client_auth_vtable, len);1141}11421143}1144break;1145case 22: {1146/* anchor-dn-start-name-list */11471148if (CTX->client_auth_vtable != NULL) {1149(*CTX->client_auth_vtable)->start_name_list(1150CTX->client_auth_vtable);1151}11521153}1154break;1155case 23: {1156/* and */11571158uint32_t b = T0_POP();1159uint32_t a = T0_POP();1160T0_PUSH(a & b);11611162}1163break;1164case 24: {1165/* begin-cert */11661167if (ENG->chain_len == 0) {1168T0_PUSHi(-1);1169} else {1170ENG->cert_cur = ENG->chain->data;1171ENG->cert_len = ENG->chain->data_len;1172ENG->chain ++;1173ENG->chain_len --;1174T0_PUSH(ENG->cert_len);1175}11761177}1178break;1179case 25: {1180/* bzero */11811182size_t len = (size_t)T0_POP();1183void *addr = (unsigned char *)ENG + (size_t)T0_POP();1184memset(addr, 0, len);11851186}1187break;1188case 26: {1189/* can-output? */11901191T0_PUSHi(-(ENG->hlen_out > 0));11921193}1194break;1195case 27: {1196/* co */1197T0_CO();1198}1199break;1200case 28: {1201/* compute-Finished-inner */12021203int prf_id = T0_POP();1204int from_client = T0_POPi();1205unsigned char tmp[48];1206br_tls_prf_seed_chunk seed;12071208br_tls_prf_impl prf = br_ssl_engine_get_PRF(ENG, prf_id);1209seed.data = tmp;1210if (ENG->session.version >= BR_TLS12) {1211seed.len = br_multihash_out(&ENG->mhash, prf_id, tmp);1212} else {1213br_multihash_out(&ENG->mhash, br_md5_ID, tmp);1214br_multihash_out(&ENG->mhash, br_sha1_ID, tmp + 16);1215seed.len = 36;1216}1217prf(ENG->pad, 12, ENG->session.master_secret,1218sizeof ENG->session.master_secret,1219from_client ? "client finished" : "server finished",12201, &seed);12211222}1223break;1224case 29: {1225/* copy-cert-chunk */12261227size_t clen;12281229clen = ENG->cert_len;1230if (clen > sizeof ENG->pad) {1231clen = sizeof ENG->pad;1232}1233memcpy(ENG->pad, ENG->cert_cur, clen);1234ENG->cert_cur += clen;1235ENG->cert_len -= clen;1236T0_PUSH(clen);12371238}1239break;1240case 30: {1241/* copy-protocol-name */12421243size_t idx = T0_POP();1244size_t len = strlen(ENG->protocol_names[idx]);1245memcpy(ENG->pad, ENG->protocol_names[idx], len);1246T0_PUSH(len);12471248}1249break;1250case 31: {1251/* data-get8 */12521253size_t addr = T0_POP();1254T0_PUSH(t0_datablock[addr]);12551256}1257break;1258case 32: {1259/* discard-input */12601261ENG->hlen_in = 0;12621263}1264break;1265case 33: {1266/* do-client-sign */12671268size_t sig_len;12691270sig_len = make_client_sign(CTX);1271if (sig_len == 0) {1272br_ssl_engine_fail(ENG, BR_ERR_INVALID_ALGORITHM);1273T0_CO();1274}1275T0_PUSH(sig_len);12761277}1278break;1279case 34: {1280/* do-ecdh */12811282unsigned prf_id = T0_POP();1283unsigned ecdhe = T0_POP();1284int x;12851286x = make_pms_ecdh(CTX, ecdhe, prf_id);1287if (x < 0) {1288br_ssl_engine_fail(ENG, -x);1289T0_CO();1290} else {1291T0_PUSH(x);1292}12931294}1295break;1296case 35: {1297/* do-rsa-encrypt */12981299int x;13001301x = make_pms_rsa(CTX, T0_POP());1302if (x < 0) {1303br_ssl_engine_fail(ENG, -x);1304T0_CO();1305} else {1306T0_PUSH(x);1307}13081309}1310break;1311case 36: {1312/* do-static-ecdh */13131314unsigned prf_id = T0_POP();13151316if (make_pms_static_ecdh(CTX, prf_id) < 0) {1317br_ssl_engine_fail(ENG, BR_ERR_INVALID_ALGORITHM);1318T0_CO();1319}13201321}1322break;1323case 37: {1324/* drop */1325(void)T0_POP();1326}1327break;1328case 38: {1329/* dup */1330T0_PUSH(T0_PEEK(0));1331}1332break;1333case 39: {1334/* ext-ALPN-length */13351336size_t u, len;13371338if (ENG->protocol_names_num == 0) {1339T0_PUSH(0);1340T0_RET();1341}1342len = 6;1343for (u = 0; u < ENG->protocol_names_num; u ++) {1344len += 1 + strlen(ENG->protocol_names[u]);1345}1346T0_PUSH(len);13471348}1349break;1350case 40: {1351/* fail */13521353br_ssl_engine_fail(ENG, (int)T0_POPi());1354T0_CO();13551356}1357break;1358case 41: {1359/* flush-record */13601361br_ssl_engine_flush_record(ENG);13621363}1364break;1365case 42: {1366/* get-client-chain */13671368uint32_t auth_types;13691370auth_types = T0_POP();1371if (CTX->client_auth_vtable != NULL) {1372br_ssl_client_certificate ux;13731374(*CTX->client_auth_vtable)->choose(CTX->client_auth_vtable,1375CTX, auth_types, &ux);1376CTX->auth_type = (unsigned char)ux.auth_type;1377CTX->hash_id = (unsigned char)ux.hash_id;1378ENG->chain = ux.chain;1379ENG->chain_len = ux.chain_len;1380} else {1381CTX->hash_id = 0;1382ENG->chain_len = 0;1383}13841385}1386break;1387case 43: {1388/* get-key-type-usages */13891390const br_x509_class *xc;1391const br_x509_pkey *pk;1392unsigned usages;13931394xc = *(ENG->x509ctx);1395pk = xc->get_pkey(ENG->x509ctx, &usages);1396if (pk == NULL) {1397T0_PUSH(0);1398} else {1399T0_PUSH(pk->key_type | usages);1400}14011402}1403break;1404case 44: {1405/* get16 */14061407size_t addr = (size_t)T0_POP();1408T0_PUSH(*(uint16_t *)(void *)((unsigned char *)ENG + addr));14091410}1411break;1412case 45: {1413/* get32 */14141415size_t addr = (size_t)T0_POP();1416T0_PUSH(*(uint32_t *)(void *)((unsigned char *)ENG + addr));14171418}1419break;1420case 46: {1421/* get8 */14221423size_t addr = (size_t)T0_POP();1424T0_PUSH(*((unsigned char *)ENG + addr));14251426}1427break;1428case 47: {1429/* has-input? */14301431T0_PUSHi(-(ENG->hlen_in != 0));14321433}1434break;1435case 48: {1436/* memcmp */14371438size_t len = (size_t)T0_POP();1439void *addr2 = (unsigned char *)ENG + (size_t)T0_POP();1440void *addr1 = (unsigned char *)ENG + (size_t)T0_POP();1441int x = memcmp(addr1, addr2, len);1442T0_PUSH((uint32_t)-(x == 0));14431444}1445break;1446case 49: {1447/* memcpy */14481449size_t len = (size_t)T0_POP();1450void *src = (unsigned char *)ENG + (size_t)T0_POP();1451void *dst = (unsigned char *)ENG + (size_t)T0_POP();1452memcpy(dst, src, len);14531454}1455break;1456case 50: {1457/* mkrand */14581459size_t len = (size_t)T0_POP();1460void *addr = (unsigned char *)ENG + (size_t)T0_POP();1461br_hmac_drbg_generate(&ENG->rng, addr, len);14621463}1464break;1465case 51: {1466/* more-incoming-bytes? */14671468T0_PUSHi(ENG->hlen_in != 0 || !br_ssl_engine_recvrec_finished(ENG));14691470}1471break;1472case 52: {1473/* multihash-init */14741475br_multihash_init(&ENG->mhash);14761477}1478break;1479case 53: {1480/* neg */14811482uint32_t a = T0_POP();1483T0_PUSH(-a);14841485}1486break;1487case 54: {1488/* not */14891490uint32_t a = T0_POP();1491T0_PUSH(~a);14921493}1494break;1495case 55: {1496/* or */14971498uint32_t b = T0_POP();1499uint32_t a = T0_POP();1500T0_PUSH(a | b);15011502}1503break;1504case 56: {1505/* over */1506T0_PUSH(T0_PEEK(1));1507}1508break;1509case 57: {1510/* read-chunk-native */15111512size_t clen = ENG->hlen_in;1513if (clen > 0) {1514uint32_t addr, len;15151516len = T0_POP();1517addr = T0_POP();1518if ((size_t)len < clen) {1519clen = (size_t)len;1520}1521memcpy((unsigned char *)ENG + addr, ENG->hbuf_in, clen);1522if (ENG->record_type_in == BR_SSL_HANDSHAKE) {1523br_multihash_update(&ENG->mhash, ENG->hbuf_in, clen);1524}1525T0_PUSH(addr + (uint32_t)clen);1526T0_PUSH(len - (uint32_t)clen);1527ENG->hbuf_in += clen;1528ENG->hlen_in -= clen;1529}15301531}1532break;1533case 58: {1534/* read8-native */15351536if (ENG->hlen_in > 0) {1537unsigned char x;15381539x = *ENG->hbuf_in ++;1540if (ENG->record_type_in == BR_SSL_HANDSHAKE) {1541br_multihash_update(&ENG->mhash, &x, 1);1542}1543T0_PUSH(x);1544ENG->hlen_in --;1545} else {1546T0_PUSHi(-1);1547}15481549}1550break;1551case 59: {1552/* set-server-curve */15531554const br_x509_class *xc;1555const br_x509_pkey *pk;15561557xc = *(ENG->x509ctx);1558pk = xc->get_pkey(ENG->x509ctx, NULL);1559CTX->server_curve =1560(pk->key_type == BR_KEYTYPE_EC) ? pk->key.ec.curve : 0;15611562}1563break;1564case 60: {1565/* set16 */15661567size_t addr = (size_t)T0_POP();1568*(uint16_t *)(void *)((unsigned char *)ENG + addr) = (uint16_t)T0_POP();15691570}1571break;1572case 61: {1573/* set32 */15741575size_t addr = (size_t)T0_POP();1576*(uint32_t *)(void *)((unsigned char *)ENG + addr) = (uint32_t)T0_POP();15771578}1579break;1580case 62: {1581/* set8 */15821583size_t addr = (size_t)T0_POP();1584*((unsigned char *)ENG + addr) = (unsigned char)T0_POP();15851586}1587break;1588case 63: {1589/* strlen */15901591void *str = (unsigned char *)ENG + (size_t)T0_POP();1592T0_PUSH((uint32_t)strlen(str));15931594}1595break;1596case 64: {1597/* supported-curves */15981599uint32_t x = ENG->iec == NULL ? 0 : ENG->iec->supported_curves;1600T0_PUSH(x);16011602}1603break;1604case 65: {1605/* supported-hash-functions */16061607int i;1608unsigned x, num;16091610x = 0;1611num = 0;1612for (i = br_sha1_ID; i <= br_sha512_ID; i ++) {1613if (br_multihash_getimpl(&ENG->mhash, i)) {1614x |= 1U << i;1615num ++;1616}1617}1618T0_PUSH(x);1619T0_PUSH(num);16201621}1622break;1623case 66: {1624/* supports-ecdsa? */16251626T0_PUSHi(-(ENG->iecdsa != 0));16271628}1629break;1630case 67: {1631/* supports-rsa-sign? */16321633T0_PUSHi(-(ENG->irsavrfy != 0));16341635}1636break;1637case 68: {1638/* swap */1639T0_SWAP();1640}1641break;1642case 69: {1643/* switch-aesccm-in */16441645int is_client, prf_id;1646unsigned cipher_key_len, tag_len;16471648tag_len = T0_POP();1649cipher_key_len = T0_POP();1650prf_id = T0_POP();1651is_client = T0_POP();1652br_ssl_engine_switch_ccm_in(ENG, is_client, prf_id,1653ENG->iaes_ctrcbc, cipher_key_len, tag_len);16541655}1656break;1657case 70: {1658/* switch-aesccm-out */16591660int is_client, prf_id;1661unsigned cipher_key_len, tag_len;16621663tag_len = T0_POP();1664cipher_key_len = T0_POP();1665prf_id = T0_POP();1666is_client = T0_POP();1667br_ssl_engine_switch_ccm_out(ENG, is_client, prf_id,1668ENG->iaes_ctrcbc, cipher_key_len, tag_len);16691670}1671break;1672case 71: {1673/* switch-aesgcm-in */16741675int is_client, prf_id;1676unsigned cipher_key_len;16771678cipher_key_len = T0_POP();1679prf_id = T0_POP();1680is_client = T0_POP();1681br_ssl_engine_switch_gcm_in(ENG, is_client, prf_id,1682ENG->iaes_ctr, cipher_key_len);16831684}1685break;1686case 72: {1687/* switch-aesgcm-out */16881689int is_client, prf_id;1690unsigned cipher_key_len;16911692cipher_key_len = T0_POP();1693prf_id = T0_POP();1694is_client = T0_POP();1695br_ssl_engine_switch_gcm_out(ENG, is_client, prf_id,1696ENG->iaes_ctr, cipher_key_len);16971698}1699break;1700case 73: {1701/* switch-cbc-in */17021703int is_client, prf_id, mac_id, aes;1704unsigned cipher_key_len;17051706cipher_key_len = T0_POP();1707aes = T0_POP();1708mac_id = T0_POP();1709prf_id = T0_POP();1710is_client = T0_POP();1711br_ssl_engine_switch_cbc_in(ENG, is_client, prf_id, mac_id,1712aes ? ENG->iaes_cbcdec : ENG->ides_cbcdec, cipher_key_len);17131714}1715break;1716case 74: {1717/* switch-cbc-out */17181719int is_client, prf_id, mac_id, aes;1720unsigned cipher_key_len;17211722cipher_key_len = T0_POP();1723aes = T0_POP();1724mac_id = T0_POP();1725prf_id = T0_POP();1726is_client = T0_POP();1727br_ssl_engine_switch_cbc_out(ENG, is_client, prf_id, mac_id,1728aes ? ENG->iaes_cbcenc : ENG->ides_cbcenc, cipher_key_len);17291730}1731break;1732case 75: {1733/* switch-chapol-in */17341735int is_client, prf_id;17361737prf_id = T0_POP();1738is_client = T0_POP();1739br_ssl_engine_switch_chapol_in(ENG, is_client, prf_id);17401741}1742break;1743case 76: {1744/* switch-chapol-out */17451746int is_client, prf_id;17471748prf_id = T0_POP();1749is_client = T0_POP();1750br_ssl_engine_switch_chapol_out(ENG, is_client, prf_id);17511752}1753break;1754case 77: {1755/* test-protocol-name */17561757size_t len = T0_POP();1758size_t u;17591760for (u = 0; u < ENG->protocol_names_num; u ++) {1761const char *name;17621763name = ENG->protocol_names[u];1764if (len == strlen(name) && memcmp(ENG->pad, name, len) == 0) {1765T0_PUSH(u);1766T0_RET();1767}1768}1769T0_PUSHi(-1);17701771}1772break;1773case 78: {1774/* total-chain-length */17751776size_t u;1777uint32_t total;17781779total = 0;1780for (u = 0; u < ENG->chain_len; u ++) {1781total += 3 + (uint32_t)ENG->chain[u].data_len;1782}1783T0_PUSH(total);17841785}1786break;1787case 79: {1788/* u>> */17891790int c = (int)T0_POPi();1791uint32_t x = T0_POP();1792T0_PUSH(x >> c);17931794}1795break;1796case 80: {1797/* verify-SKE-sig */17981799size_t sig_len = T0_POP();1800int use_rsa = T0_POPi();1801int hash = T0_POPi();18021803T0_PUSH(verify_SKE_sig(CTX, hash, use_rsa, sig_len));18041805}1806break;1807case 81: {1808/* write-blob-chunk */18091810size_t clen = ENG->hlen_out;1811if (clen > 0) {1812uint32_t addr, len;18131814len = T0_POP();1815addr = T0_POP();1816if ((size_t)len < clen) {1817clen = (size_t)len;1818}1819memcpy(ENG->hbuf_out, (unsigned char *)ENG + addr, clen);1820if (ENG->record_type_out == BR_SSL_HANDSHAKE) {1821br_multihash_update(&ENG->mhash, ENG->hbuf_out, clen);1822}1823T0_PUSH(addr + (uint32_t)clen);1824T0_PUSH(len - (uint32_t)clen);1825ENG->hbuf_out += clen;1826ENG->hlen_out -= clen;1827}18281829}1830break;1831case 82: {1832/* write8-native */18331834unsigned char x;18351836x = (unsigned char)T0_POP();1837if (ENG->hlen_out > 0) {1838if (ENG->record_type_out == BR_SSL_HANDSHAKE) {1839br_multihash_update(&ENG->mhash, &x, 1);1840}1841*ENG->hbuf_out ++ = x;1842ENG->hlen_out --;1843T0_PUSHi(-1);1844} else {1845T0_PUSHi(0);1846}18471848}1849break;1850case 83: {1851/* x509-append */18521853const br_x509_class *xc;1854size_t len;18551856xc = *(ENG->x509ctx);1857len = T0_POP();1858xc->append(ENG->x509ctx, ENG->pad, len);18591860}1861break;1862case 84: {1863/* x509-end-cert */18641865const br_x509_class *xc;18661867xc = *(ENG->x509ctx);1868xc->end_cert(ENG->x509ctx);18691870}1871break;1872case 85: {1873/* x509-end-chain */18741875const br_x509_class *xc;18761877xc = *(ENG->x509ctx);1878T0_PUSH(xc->end_chain(ENG->x509ctx));18791880}1881break;1882case 86: {1883/* x509-start-cert */18841885const br_x509_class *xc;18861887xc = *(ENG->x509ctx);1888xc->start_cert(ENG->x509ctx, T0_POP());18891890}1891break;1892case 87: {1893/* x509-start-chain */18941895const br_x509_class *xc;1896uint32_t bc;18971898bc = T0_POP();1899xc = *(ENG->x509ctx);1900xc->start_chain(ENG->x509ctx, bc ? ENG->server_name : NULL);19011902}1903break;1904}19051906} else {1907T0_ENTER(ip, rp, t0x);1908}1909}1910t0_exit:1911((t0_context *)t0ctx)->dp = dp;1912((t0_context *)t0ctx)->rp = rp;1913((t0_context *)t0ctx)->ip = ip;1914}191519161917