Welcome to mirror list, hosted at ThFree Co, Russian Federation.

ecdsa_priv_prime256v1.c « Src « PKA_ECCscalarMultiplication « PKA « Examples « P-NUCLEO-WB55.Nucleo « Projects - github.com/Flipper-Zero/STM32CubeWB.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
blob: 3da1c1e1f0afa85c2b3b90a30cbd7c12272935c2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
/**
  ******************************************************************************
  * @file    PKA/PKA_ECCscalarMultiplication/Src/ecdsa_priv_prime256v1.c
  * @author  MCD Application Team
  * @brief   This file contains buffers reflecting the content of the file
  *          ecdsa_priv_prime256v1.pem provided as an example of private and
  *          public key pair to demonstrate functionality of PKA.
  ******************************************************************************
  * @attention
  *
  * Copyright (c) 2019-2021 STMicroelectronics.
  * All rights reserved.
  *
  * This software is licensed under terms that can be found in the LICENSE file
  * in the root directory of this software component.
  * If no LICENSE file comes with this software, it is provided AS-IS.
  *
  ******************************************************************************
  */
  
/* Includes ------------------------------------------------------------------*/
#include "main.h"

/* This file reflect the content of ecdsa_priv_prime256v1.pem */

/* ecdsa_priv_prime256v1.pem has been created using openssl 1.0.2k  26 Jan 2017 */
/* Buffer have been adapted from the output of the command: openssl ec -in ecdsa_priv_prime256v1.pem -text -noout */
/*
Private-Key: (256 bit)
priv:
    00:fe:22:d2:a5:e9:e8:1f:92:b0:bb:42:c2:fe:de:
    3e:63:ab:0a:b1:0f:14:9a:a8:3f:76:da:44:69:d3:
    be:69:57
pub:
    04:dd:79:95:da:1f:a1:c0:25:f3:e7:aa:6b:62:2c:
    9d:78:4a:37:22:dc:8d:64:6b:1b:14:f5:c3:a0:3c:
    a9:70:19:c6:d8:7e:b5:78:43:ff:15:a0:77:92:55:
    86:8e:5b:b4:0e:b0:79:c8:e3:42:ca:c4:55:f7:2c:
    f4:04:b1:99:82
*/
/* Remark: 00 at beginning of buffers are removed to ease the usage with PKA */
/* Remark: ecdsa_priv_prime256v1_pub contains 2 points, they are split to 
           ecdsa_priv_prime256v1_pubX and ecdsa_priv_prime256v1_pubY to ease the usage 
           with PKA */
/* Remark: ecdsa_priv_prime256v1_Generator contains 2 points, they are split to 
           ecdsa_priv_prime256v1_GeneratorX and ecdsa_priv_prime256v1_GeneratorY to 
           ease the usage with PKA */

#include "main.h"

const uint8_t ecdsa_priv_prime256v1_priv[] = {
/*0x00,*/ 0xfe, 0x22, 0xd2, 0xa5, 0xe9, 0xe8, 0x1f, 0x92, 0xb0, 0xbb, 0x42, 0xc2, 0xfe, 0xde,
    0x3e, 0x63, 0xab, 0x0a, 0xb1, 0x0f, 0x14, 0x9a, 0xa8, 0x3f, 0x76, 0xda, 0x44, 0x69, 0xd3,
    0xbe, 0x69, 0x57
};
const uint32_t ecdsa_priv_prime256v1_priv_len = 32;

const uint8_t ecdsa_priv_prime256v1_pub[] = {
    0x04, 0xdd, 0x79, 0x95, 0xda, 0x1f, 0xa1, 0xc0, 0x25, 0xf3, 0xe7, 0xaa, 0x6b, 0x62, 0x2c,
    0x9d, 0x78, 0x4a, 0x37, 0x22, 0xdc, 0x8d, 0x64, 0x6b, 0x1b, 0x14, 0xf5, 0xc3, 0xa0, 0x3c,
    0xa9, 0x70, 0x19, 0xc6, 0xd8, 0x7e, 0xb5, 0x78, 0x43, 0xff, 0x15, 0xa0, 0x77, 0x92, 0x55,
    0x86, 0x8e, 0x5b, 0xb4, 0x0e, 0xb0, 0x79, 0xc8, 0xe3, 0x42, 0xca, 0xc4, 0x55, 0xf7, 0x2c,
    0xf4, 0x04, 0xb1, 0x99, 0x82
};
const uint32_t ecdsa_priv_prime256v1_pub_len = 65;

/* This buffer is extracted from ecdsa_priv_prime256v1_pub as its first part */
const uint8_t ecdsa_priv_prime256v1_pubX[] = {
    0xdd, 0x79, 0x95, 0xda, 0x1f, 0xa1, 0xc0, 0x25, 0xf3, 0xe7, 0xaa, 0x6b, 0x62, 0x2c, 0x9d, 
    0x78, 0x4a, 0x37, 0x22, 0xdc, 0x8d, 0x64, 0x6b, 0x1b, 0x14, 0xf5, 0xc3, 0xa0, 0x3c, 0xa9, 
    0x70, 0x19
};
const uint32_t ecdsa_priv_prime256v1_pubX_len = 32;

/* This buffer is extracted from ecdsa_priv_prime256v1_pub as its second part */
const uint8_t ecdsa_priv_prime256v1_pubY[] = {
    0xc6, 0xd8, 0x7e, 0xb5, 0x78, 0x43, 0xff, 0x15, 0xa0, 0x77, 0x92, 0x55, 0x86, 0x8e, 0x5b, 
    0xb4, 0x0e, 0xb0, 0x79, 0xc8, 0xe3, 0x42, 0xca, 0xc4, 0x55, 0xf7, 0x2c, 0xf4, 0x04, 0xb1, 
    0x99, 0x82
};
const uint32_t ecdsa_priv_prime256v1_pubY_len = 32;