summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorVadim Bendebury <vbendeb@chromium.org>2019-02-28 20:05:27 -0800
committerchrome-bot <chrome-bot@chromium.org>2019-04-05 09:21:44 -0700
commit1d6c7bb9773f76aa70ce65822fa001ff72892cd2 (patch)
tree3631462d9540df08d13cffa9a7f8e7e9bb3e7899
parent63bf8f8ba87b23378391b147f1b3e9fdcf3d8dc5 (diff)
downloadchrome-ec-1d6c7bb9773f76aa70ce65822fa001ff72892cd2.tar.gz
nvmem: test modifications to support the new scheme
This patch includes changes to support testing of the new nvmem implementation. Making fizz compatible required duplicating a lot of functionality available in the test/ directory (fuzz/nvmem_tpm2_mock.c is very similar to test/nvmem_tpm2_mock.c), but I could not find an easy way to avoid it. BRANCH=cr50, cr50-mp BUG=b:69907320, b:129710256 CQ-DEPEND=CL:1496607 TEST=with the rest of the patches applied 'make buildall -j' succeeds, which confirms both test and fuzz success. Change-Id: Ife999b04d22f8ddbe9ea5d35f4c3e21f57592754 Signed-off-by: Vadim Bendebury <vbendeb@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/1450278 Reviewed-by: Andrey Pronin <apronin@chromium.org>
-rw-r--r--chip/host/config_chip.h18
-rw-r--r--fuzz/build.mk5
-rw-r--r--fuzz/cr50_fuzz.cc1
-rw-r--r--fuzz/fuzz_config.h23
-rw-r--r--fuzz/nvmem_tpm2_mock.c228
-rw-r--r--test/build.mk9
-rw-r--r--test/legacy_nvmem_dump.h1043
-rw-r--r--test/nvmem.c1655
-rw-r--r--test/nvmem_test.h28
-rw-r--r--test/nvmem_tpm2_mock.c377
-rw-r--r--test/nvmem_vars.c538
-rw-r--r--test/nvmem_vars.tasklist17
-rw-r--r--test/pinweaver.c84
-rw-r--r--test/test_config.h64
14 files changed, 2936 insertions, 1154 deletions
diff --git a/chip/host/config_chip.h b/chip/host/config_chip.h
index 8714b57891..f2b7e29416 100644
--- a/chip/host/config_chip.h
+++ b/chip/host/config_chip.h
@@ -9,15 +9,21 @@
#define __CROS_EC_CONFIG_CHIP_H
/* Memory mapping */
+#if !defined(TEST_NVMEM) && !defined(TEST_CR50_FUZZ)
#define CONFIG_FLASH_SIZE 0x00020000
+#define CONFIG_FLASH_BANK_SIZE 0x1000
+#else
+#define CONFIG_FLASH_SIZE (512 * 1024)
+#define CONFIG_FLASH_BANK_SIZE 0x800
+#endif
+
extern char __host_flash[CONFIG_FLASH_SIZE];
-#define CONFIG_PROGRAM_MEMORY_BASE ((uintptr_t)__host_flash)
-#define CONFIG_FLASH_BANK_SIZE 0x1000
-#define CONFIG_FLASH_ERASE_SIZE 0x0010 /* erase bank size */
-#define CONFIG_FLASH_WRITE_SIZE 0x0002 /* minimum write size */
-#define CONFIG_FLASH_WRITE_IDEAL_SIZE 0x0080 /* ideal write size */
-#define CONFIG_RAM_BASE 0x0 /* Not supported */
+#define CONFIG_PROGRAM_MEMORY_BASE ((uintptr_t)__host_flash)
+#define CONFIG_FLASH_ERASE_SIZE 0x0010 /* erase bank size */
+#define CONFIG_FLASH_WRITE_SIZE 0x0002 /* minimum write size */
+#define CONFIG_FLASH_WRITE_IDEAL_SIZE 0x0080 /* ideal write size */
+#define CONFIG_RAM_BASE 0x0 /* Not supported */
#define CONFIG_RAM_SIZE 0x0 /* Not supported */
#define CONFIG_FPU
diff --git a/fuzz/build.mk b/fuzz/build.mk
index fda788fd93..76d7d13f5b 100644
--- a/fuzz/build.mk
+++ b/fuzz/build.mk
@@ -25,7 +25,7 @@ endif
# Does your object file need to link against cstdlib?
# Yes -> use <obj_name>-rw
# Otherwise use <obj_name>-y
-cr50_fuzz-rw = cr50_fuzz.o pinweaver_model.o mem_hash_tree.o
+cr50_fuzz-rw = cr50_fuzz.o pinweaver_model.o mem_hash_tree.o nvmem_tpm2_mock.o
host_command_fuzz-y = host_command_fuzz.o
usb_pd_fuzz-y = usb_pd_fuzz.o
@@ -35,6 +35,9 @@ $(out)/RW/fuzz/pinweaver_model.o: ${CR50_PROTO_HEADERS}
$(out)/RW/fuzz/cr50_fuzz.o: ${CR50_PROTO_HEADERS}
$(out)/RW/fuzz/cr50_fuzz.o: CPPFLAGS+=${LIBPROTOBUF_MUTATOR_CFLAGS}
+TPM2_LIB_ROOT := $(CROS_WORKON_SRCROOT)/src/third_party/tpm2
+$(out)/RW/fuzz/nvmem_tpm2_mock.o: CFLAGS += -I$(TPM2_LIB_ROOT)
+
$(out)/cr50_fuzz.exe: $(out)/cryptoc/libcryptoc.a \
$(out)/gen/fuzz/cr50_fuzz.pb.o \
$(out)/gen/fuzz/pinweaver/pinweaver.pb.o \
diff --git a/fuzz/cr50_fuzz.cc b/fuzz/cr50_fuzz.cc
index e891ee5d85..186700f415 100644
--- a/fuzz/cr50_fuzz.cc
+++ b/fuzz/cr50_fuzz.cc
@@ -71,7 +71,6 @@ void InitializeFuzzerRun() {
memset(__host_flash, 0xff, sizeof(__host_flash));
nvmem_init();
nvmem_enable_commits();
- initvars();
srand(0);
}
diff --git a/fuzz/fuzz_config.h b/fuzz/fuzz_config.h
index 362df69c56..dd2cdc5ae9 100644
--- a/fuzz/fuzz_config.h
+++ b/fuzz/fuzz_config.h
@@ -17,6 +17,7 @@
#define CONFIG_PINWEAVER
#define CONFIG_UPTO_SHA512
#define SHA512_SUPPORT
+#define CONFIG_MALLOC
/******************************************************************************/
/* From chip/g/config_chip.h */
@@ -29,6 +30,11 @@
/******************************************************************************/
/* From board/cr50/board.h */
/* Non-volatile counter storage for U2F */
+#define CONFIG_CRC8
+#define CONFIG_FLASH_ERASED_VALUE32 (-1U)
+#define CONFIG_FLASH_LOG
+#define CONFIG_FLASH_LOG_BASE CONFIG_PROGRAM_MEMORY_BASE
+#define CONFIG_FLASH_LOG_SPACE 0x800
#define CONFIG_FLASH_NVCOUNTER
#define CONFIG_FLASH_NVCTR_SIZE CONFIG_FLASH_BANK_SIZE
#define CONFIG_FLASH_NVCTR_BASE_A (CONFIG_PROGRAM_MEMORY_BASE + \
@@ -41,14 +47,23 @@
#define CONFIG_FLASH_NVMEM_OFFSET_A (CFG_TOP_A_OFF + CONFIG_FLASH_NVCTR_SIZE)
#define CONFIG_FLASH_NVMEM_OFFSET_B (CFG_TOP_B_OFF + CONFIG_FLASH_NVCTR_SIZE)
/* Address of start of Nvmem area */
-#define CONFIG_FLASH_NVMEM_BASE_A (CONFIG_PROGRAM_MEMORY_BASE + \
- CONFIG_FLASH_NVMEM_OFFSET_A)
-#define CONFIG_FLASH_NVMEM_BASE_B (CONFIG_PROGRAM_MEMORY_BASE + \
- CONFIG_FLASH_NVMEM_OFFSET_B)
+#define CONFIG_FLASH_NVMEM_BASE_A \
+ (CONFIG_PROGRAM_MEMORY_BASE + CONFIG_FLASH_NVMEM_OFFSET_A)
+#define CONFIG_FLASH_NVMEM_BASE_B \
+ (CONFIG_PROGRAM_MEMORY_BASE + CONFIG_FLASH_NVMEM_OFFSET_B)
+#define CONFIG_FLASH_NEW_NVMEM_BASE_A \
+ (CONFIG_FLASH_NVMEM_BASE_A + CONFIG_FLASH_BANK_SIZE)
+#define CONFIG_FLASH_NEW_NVMEM_BASE_B \
+ (CONFIG_FLASH_NVMEM_BASE_B + CONFIG_FLASH_BANK_SIZE)
/* Size partition in NvMem */
#define NVMEM_PARTITION_SIZE (CFG_TOP_SIZE - CONFIG_FLASH_NVCTR_SIZE)
/* Size in bytes of NvMem area */
#define CONFIG_FLASH_NVMEM_SIZE (NVMEM_PARTITION_SIZE * NVMEM_NUM_PARTITIONS)
+
+#define NEW_NVMEM_PARTITION_SIZE (NVMEM_PARTITION_SIZE - CONFIG_FLASH_BANK_SIZE)
+#define NEW_NVMEM_TOTAL_PAGES \
+ (2 * NEW_NVMEM_PARTITION_SIZE / CONFIG_FLASH_BANK_SIZE)
+
/* Enable <key, value> variable support. */
#define CONFIG_FLASH_NVMEM_VARS
#define NVMEM_CR50_SIZE 272
diff --git a/fuzz/nvmem_tpm2_mock.c b/fuzz/nvmem_tpm2_mock.c
new file mode 100644
index 0000000000..5fac9674a2
--- /dev/null
+++ b/fuzz/nvmem_tpm2_mock.c
@@ -0,0 +1,228 @@
+/* Copyright 2019 The Chromium OS Authors. All rights reserved.
+ * Use of this source code is governed by a BSD-style license that can be
+ * found in the LICENSE file.
+ */
+/* Stuff from tpm2 directory. */
+#define NV_C
+#include "Global.h"
+#undef NV_C
+#include "NV_fp.h"
+#include "tpm_generated.h"
+
+#include "nvmem.h"
+#include "util.h"
+
+#define NVMEM_CR50_SIZE 272
+
+#ifndef TEST_FUZZ
+uint32_t nvmem_user_sizes[NVMEM_NUM_USERS] = {MOCK_NV_MEMORY_SIZE,
+ NVMEM_CR50_SIZE};
+#endif
+
+uint32_t s_evictNvStart;
+uint32_t s_evictNvEnd;
+
+/* Calculate size of TPM NVMEM. */
+#define MOCK_NV_MEMORY_SIZE \
+ (NVMEM_PARTITION_SIZE - sizeof(struct nvmem_tag) - NVMEM_CR50_SIZE)
+
+/*
+ * Sizes of the reserved objects stored in the TPM NVMEM. Note that the second
+ * last object is in fact a variable size field starting with 4 bytes of size
+ * and then up to 512 bytes of actual index data. The array below assumes that
+ * the full 512 bytes of the index space are used.
+ */
+const uint16_t res_sizes[] = {4, 2, 2, 2, 66, 66, 66, 66, 66, 66,
+ 34, 34, 34, 66, 66, 66, 8, 4, 134, 28,
+ 3, 4, 4, 4, 4, 4, 2, 15, 2, 8,
+ 4, 4, 4, 96, 2844, 424, 516, 8};
+
+static uint16_t res_addrs[ARRAY_SIZE(res_sizes)];
+
+BOOL NvEarlyStageFindHandle(TPM_HANDLE handle)
+{
+ size_t i;
+
+ res_addrs[0] = 0;
+
+ for (i = 1; i < ARRAY_SIZE(res_addrs); i++)
+ res_addrs[i] = res_addrs[i - 1] + res_sizes[i - 1];
+
+ s_evictNvStart = res_addrs[i - 1] + res_sizes[i - 1];
+
+ s_evictNvEnd = MOCK_NV_MEMORY_SIZE;
+ return 0;
+}
+
+void NvGetReserved(UINT32 index, NV_RESERVED_ITEM *ri)
+{
+ if (index < ARRAY_SIZE(res_sizes)) {
+ ri->size = res_sizes[index];
+ ri->offset = res_addrs[index];
+ } else {
+ ri->size = 0;
+ }
+}
+
+UINT16 UINT16_Marshal(UINT16 *source, BYTE **buffer, INT32 *size)
+{
+ uint16_t value;
+
+ if (!size || (*size < sizeof(value)))
+ return 0;
+
+ value = htobe16(*source);
+
+ memcpy(*buffer, &value, sizeof(value));
+ *buffer += sizeof(value);
+ *size -= sizeof(value);
+
+ return sizeof(value);
+}
+
+UINT16 UINT32_Marshal(UINT32 *source, BYTE **buffer, INT32 *size)
+{
+ uint32_t value;
+
+ if (!size || (*size < sizeof(value)))
+ return 0;
+
+ value = htobe32(*source);
+
+ memcpy(*buffer, &value, sizeof(value));
+ *buffer += sizeof(value);
+ *size -= sizeof(value);
+
+ return sizeof(value);
+}
+
+UINT16 UINT64_Marshal(UINT64 *source, BYTE **buffer, INT32 *size)
+{
+ uint64_t value;
+
+ if (!size || (*size < sizeof(value)))
+ return 0;
+
+ value = htobe64(*source);
+
+ memcpy(*buffer, &value, sizeof(value));
+ *buffer += sizeof(value);
+ *size -= sizeof(value);
+
+ return sizeof(value);
+}
+
+UINT16 TPM2B_DIGEST_Marshal(TPM2B_DIGEST *source, BYTE **buffer, INT32 *size)
+{
+ UINT16 total_size;
+ INT32 i;
+ uint8_t *p;
+
+ total_size = UINT16_Marshal(&source->t.size, buffer, size);
+ p = *buffer;
+
+ for (i = 0; (i < source->t.size) && *size; ++i) {
+ *p++ = source->t.buffer[i];
+ *size -= 1;
+ }
+
+ total_size += i;
+ *buffer = p;
+
+ return total_size;
+}
+
+uint16_t TPM2B_AUTH_Marshal(TPM2B_AUTH *source, BYTE **buffer, INT32 *size)
+{
+ return TPM2B_DIGEST_Marshal(source, buffer, size);
+}
+
+uint16_t TPM2B_NONCE_Marshal(TPM2B_AUTH *source, BYTE **buffer, INT32 *size)
+{
+ return TPM2B_DIGEST_Marshal(source, buffer, size);
+}
+
+TPM_RC UINT16_Unmarshal(UINT16 *target, BYTE **buffer, INT32 *size)
+{
+ uint16_t value;
+
+ if (!size || *size < sizeof(value))
+ return TPM_RC_INSUFFICIENT;
+
+ memcpy(&value, *buffer, sizeof(value));
+ *target = be16toh(value);
+
+ *buffer += sizeof(value);
+ *size -= sizeof(value);
+
+ return TPM_RC_SUCCESS;
+}
+
+TPM_RC UINT32_Unmarshal(UINT32 *target, BYTE **buffer, INT32 *size)
+{
+ uint32_t value;
+
+ if (!size || *size < sizeof(value))
+ return TPM_RC_INSUFFICIENT;
+
+ memcpy(&value, *buffer, sizeof(value));
+ *target = be32toh(value);
+
+ *buffer += sizeof(value);
+ *size -= sizeof(value);
+
+ return TPM_RC_SUCCESS;
+}
+
+TPM_RC UINT64_Unmarshal(UINT64 *target, BYTE **buffer, INT32 *size)
+{
+ uint64_t value;
+
+ if (!size || *size < sizeof(value))
+ return TPM_RC_INSUFFICIENT;
+
+ memcpy(&value, *buffer, sizeof(value));
+ *target = be64toh(value);
+
+ *buffer += sizeof(value);
+ *size -= sizeof(value);
+
+ return TPM_RC_SUCCESS;
+}
+
+TPM_RC TPM2B_DIGEST_Unmarshal(TPM2B_DIGEST *target, BYTE **buffer, INT32 *size)
+{
+ TPM_RC result;
+ INT32 i;
+ uint8_t *p;
+
+ result = UINT16_Unmarshal(&target->t.size, buffer, size);
+
+ if (result != TPM_RC_SUCCESS)
+ return result;
+
+ if (target->t.size == 0)
+ return TPM_RC_SUCCESS;
+
+ if ((target->t.size > sizeof(TPMU_HA)) || (target->t.size > *size))
+ return TPM_RC_SIZE;
+
+ p = *buffer;
+ for (i = 0; i < target->t.size; ++i)
+ target->t.buffer[i] = *p++;
+
+ *buffer = p;
+ *size -= i;
+
+ return TPM_RC_SUCCESS;
+}
+
+TPM_RC TPM2B_AUTH_Unmarshal(TPM2B_AUTH *target, BYTE **buffer, INT32 *size)
+{
+ return TPM2B_DIGEST_Unmarshal(target, buffer, size);
+}
+
+TPM_RC TPM2B_NONCE_Unmarshal(TPM2B_AUTH *target, BYTE **buffer, INT32 *size)
+{
+ return TPM2B_DIGEST_Unmarshal(target, buffer, size);
+}
diff --git a/test/build.mk b/test/build.mk
index 979fc352fe..6900c97e3d 100644
--- a/test/build.mk
+++ b/test/build.mk
@@ -47,7 +47,6 @@ test-list-host += motion_angle_tablet
test-list-host += motion_lid
test-list-host += mutex
test-list-host += nvmem
-test-list-host += nvmem_vars
test-list-host += pingpong
test-list-host += pinweaver
test-list-host += power_button
@@ -105,8 +104,7 @@ motion_angle-y=motion_angle.o motion_angle_data_literals.o motion_common.o
motion_angle_tablet-y=motion_angle_tablet.o motion_angle_data_literals_tablet.o motion_common.o
motion_lid-y=motion_lid.o
mutex-y=mutex.o
-nvmem-y=nvmem.o
-nvmem_vars-y=nvmem_vars.o
+nvmem-y=nvmem.o nvmem_tpm2_mock.o
pingpong-y=pingpong.o
pinweaver-y=pinweaver.o
power_button-y=power_button.o
@@ -135,3 +133,8 @@ vboot-y=vboot.o
float-y=fp.o
fp-y=fp.o
x25519-y=x25519.o
+
+TPM2_ROOT := $(CROS_WORKON_SRCROOT)/src/third_party/tpm2
+$(out)/RO/common/new_nvmem.o: CFLAGS += -I$(TPM2_ROOT)
+$(out)/RO/test/nvmem.o: CFLAGS += -I$(TPM2_ROOT)
+$(out)/RO/test/nvmem_tpm2_mock.o: CFLAGS += -I$(TPM2_ROOT)
diff --git a/test/legacy_nvmem_dump.h b/test/legacy_nvmem_dump.h
new file mode 100644
index 0000000000..6816673c23
--- /dev/null
+++ b/test/legacy_nvmem_dump.h
@@ -0,0 +1,1043 @@
+/*
+ * Copyright 2016 The Chromium OS Authors. All rights reserved.
+ * Use of this source code is governed by a BSD-style license that can be
+ * found in the LICENSE file.
+ */
+
+/*
+ * This is a test NVMEM snapshot, it includes a couple of key,value pairs and
+ * a set of TPM reserved and evictable objects, as created after the first
+ * Chrome OS boot on a device.
+ *
+ * This binary dump is placed in a separate file not to free up the test file
+ * using it.
+ */
+ 0x00, 0x65, 0x8e, 0x10, 0x80, 0xca, 0x52, 0x1e, 0x95, 0x81, 0x12, 0x4f,
+ 0x36, 0x78, 0x9a, 0x34, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x10, 0xff, 0xff,
+ 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x10, 0x00, 0x10, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x0d, 0x00, 0x63, 0x72, 0x6f, 0x73, 0x2d, 0x70,
+ 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x00, 0xe1, 0xac, 0x01, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x6b, 0x37, 0x01, 0x00,
+ 0x03, 0x00, 0x00, 0x00, 0xbd, 0xfe, 0xff, 0xff, 0x85, 0xfc, 0x05, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0xb0, 0xde, 0x01, 0x00, 0xb4, 0xde, 0x01, 0x00,
+ 0x9b, 0x0f, 0x06, 0x00, 0xbc, 0xde, 0x01, 0x00, 0x40, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x20, 0x00,
+ 0x5b, 0x15, 0xa1, 0x0a, 0x05, 0x12, 0x58, 0x84, 0xbf, 0xf6, 0xc9, 0xf3,
+ 0xdd, 0xb7, 0x26, 0xce, 0x56, 0x9e, 0x5f, 0x7a, 0xa8, 0xd4, 0x8a, 0x67,
+ 0x5c, 0x26, 0x35, 0x0e, 0xb2, 0x13, 0x2c, 0x79, 0x20, 0x00, 0x26, 0xca,
+ 0x7d, 0xb8, 0x1a, 0x1f, 0x0b, 0x5c, 0x0a, 0xf3, 0xb5, 0xe2, 0x6a, 0xec,
+ 0x1a, 0x0d, 0x90, 0x8b, 0x92, 0x3c, 0x07, 0xb0, 0x41, 0xb0, 0x27, 0x20,
+ 0x88, 0x33, 0xfe, 0x5c, 0xf2, 0x7b, 0x20, 0x00, 0x9e, 0xb7, 0xa2, 0x4c,
+ 0xad, 0x6c, 0xc0, 0x92, 0x92, 0xef, 0xbc, 0x56, 0x65, 0x47, 0xf9, 0x09,
+ 0xd1, 0xc4, 0xbc, 0x36, 0xe8, 0x3a, 0xc2, 0x8a, 0x11, 0x3a, 0xca, 0xe1,
+ 0x66, 0xd7, 0x85, 0x57, 0x20, 0x00, 0x0c, 0x6d, 0xc7, 0x61, 0x92, 0xfc,
+ 0x1b, 0x24, 0x02, 0xc1, 0x92, 0x0e, 0xf4, 0xa1, 0x75, 0xbe, 0xb1, 0x3d,
+ 0x29, 0xfe, 0x1e, 0xe2, 0x65, 0xf5, 0x25, 0xae, 0xaf, 0xfe, 0x73, 0x32,
+ 0x35, 0x75, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x20, 0x00,
+ 0x52, 0x01, 0x7b, 0x53, 0xc5, 0x95, 0xa0, 0x3a, 0x07, 0xd5, 0x62, 0x7f,
+ 0xd3, 0x9c, 0x85, 0xaa, 0xfc, 0x56, 0xa0, 0xfa, 0x3a, 0xe8, 0x17, 0x38,
+ 0xc3, 0x59, 0x65, 0xbe, 0x75, 0x1b, 0xdc, 0xdc, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x20, 0x00, 0x84, 0xe7, 0x7e, 0x46, 0xfe, 0xbd,
+ 0x10, 0xdd, 0x5b, 0x09, 0xb2, 0xe2, 0xb1, 0x3f, 0xbf, 0x9a, 0xf3, 0xd7,
+ 0xfb, 0xf7, 0x28, 0xbb, 0x24, 0x10, 0xa3, 0xf3, 0x18, 0xa4, 0xa2, 0x16,
+ 0xd5, 0xea, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x04, 0x00, 0x00, 0x00, 0x04, 0x00, 0x03, 0xff, 0xff, 0xff, 0x0b, 0x00,
+ 0x03, 0xff, 0xff, 0xff, 0x0c, 0x00, 0x03, 0xff, 0xff, 0xff, 0x0d, 0x00,
+ 0x03, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xc8,
+ 0x00, 0x00, 0x00, 0xe8, 0x03, 0x00, 0x00, 0xe8, 0x03, 0x00, 0x00, 0x01,
+ 0x00, 0x00, 0x00, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x0b, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff,
+ /* Manually added nonempty pcr. Array 0, index 0 */
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x01, 0x02, 0x03, 0x04, 0x05, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff,
+ /* Manually added nonempty pcr. Array 1, index 1 */
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x01, 0x02, 0x03, 0x04, 0x05, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ /* Manually added ram index of size 0x20 */
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x20, 0x00, 0x00, 0x00, 0x55, 0x55,
+ 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55,
+ 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55,
+ 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x69, 0x17, 0x00, 0x00, 0x00, 0x00, 0xc0, 0x01, 0x00, 0x00,
+ 0xc0, 0x01, 0x0b, 0x00, 0x00, 0x00, 0x01, 0x20, 0x04, 0x62, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0xef, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0xc0, 0x01, 0x30, 0x82, 0x03, 0xeb, 0x30, 0x82, 0x02, 0xd3, 0xa0, 0x03,
+ 0x02, 0x01, 0x02, 0x02, 0x10, 0x71, 0x7b, 0xc1, 0xfb, 0x3b, 0x21, 0xb5,
+ 0xfb, 0x02, 0x21, 0x1f, 0xb7, 0x0a, 0xbc, 0xe4, 0x88, 0x30, 0x0d, 0x06,
+ 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, 0x00,
+ 0x30, 0x81, 0x80, 0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06,
+ 0x13, 0x02, 0x55, 0x53, 0x31, 0x13, 0x30, 0x11, 0x06, 0x03, 0x55, 0x04,
+ 0x08, 0x0c, 0x0a, 0x43, 0x61, 0x6c, 0x69, 0x66, 0x6f, 0x72, 0x6e, 0x69,
+ 0x61, 0x31, 0x14, 0x30, 0x12, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x0c, 0x0b,
+ 0x47, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x20, 0x49, 0x6e, 0x63, 0x2e, 0x31,
+ 0x24, 0x30, 0x22, 0x06, 0x03, 0x55, 0x04, 0x0b, 0x0c, 0x1b, 0x45, 0x6e,
+ 0x67, 0x69, 0x6e, 0x65, 0x65, 0x72, 0x69, 0x6e, 0x67, 0x20, 0x61, 0x6e,
+ 0x64, 0x20, 0x44, 0x65, 0x76, 0x65, 0x6c, 0x6f, 0x70, 0x6d, 0x65, 0x6e,
+ 0x74, 0x31, 0x20, 0x30, 0x1e, 0x06, 0x03, 0x55, 0x04, 0x03, 0x0c, 0x17,
+ 0x43, 0x52, 0x4f, 0x53, 0x20, 0x54, 0x50, 0x4d, 0x20, 0x50, 0x52, 0x44,
+ 0x20, 0x45, 0x4b, 0x20, 0x52, 0x4f, 0x4f, 0x54, 0x20, 0x43, 0x41, 0x30,
+ 0x1e, 0x17, 0x0d, 0x31, 0x38, 0x30, 0x37, 0x30, 0x36, 0x30, 0x30, 0x30,
+ 0x30, 0x30, 0x32, 0x5a, 0x17, 0x0d, 0x32, 0x38, 0x30, 0x37, 0x30, 0x36,
+ 0x30, 0x30, 0x30, 0x30, 0x30, 0x32, 0x5a, 0x30, 0x00, 0x30, 0x82, 0x01,
+ 0x22, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01,
+ 0x01, 0x01, 0x05, 0x00, 0x03, 0x82, 0x01, 0x0f, 0x00, 0x30, 0x82, 0x01,
+ 0x0a, 0x02, 0x82, 0x01, 0x01, 0x00, 0xf8, 0x26, 0xde, 0x99, 0xfa, 0x25,
+ 0xe1, 0xb6, 0xda, 0xb7, 0x88, 0x74, 0x77, 0x3d, 0x9a, 0x2e, 0xd0, 0xbd,
+ 0xda, 0x68, 0x8b, 0x1b, 0x8c, 0xe7, 0xd1, 0x0b, 0xf4, 0xfe, 0x8e, 0x94,
+ 0x09, 0x43, 0x11, 0x11, 0x46, 0xfc, 0x16, 0xb5, 0x15, 0x67, 0xab, 0x1b,
+ 0x8f, 0x25, 0xa7, 0x28, 0x04, 0xcc, 0xed, 0xf0, 0x5c, 0xbe, 0xa3, 0xfd,
+ 0x85, 0x85, 0x9b, 0xea, 0x6c, 0x61, 0x8b, 0x7e, 0xd2, 0x76, 0x2b, 0x37,
+ 0x87, 0x30, 0xd3, 0x9f, 0x0d, 0xb7, 0x0e, 0x31, 0x39, 0x3b, 0x3a, 0xa3,
+ 0xab, 0xb5, 0x21, 0x15, 0xb2, 0xc6, 0x7e, 0x78, 0xdc, 0x97, 0x53, 0x56,
+ 0x3f, 0xe9, 0xb4, 0x4e, 0xb8, 0xdd, 0x09, 0xa6, 0x37, 0xd3, 0xf7, 0x11,
+ 0xa2, 0x52, 0x50, 0xa6, 0x53, 0x44, 0xce, 0xb3, 0x9c, 0x02, 0xd8, 0x59,
+ 0x04, 0x3b, 0xba, 0x6c, 0xce, 0xf1, 0x6b, 0x33, 0x60, 0x14, 0x6b, 0xa0,
+ 0x3d, 0x2e, 0x66, 0x67, 0x82, 0x4f, 0x13, 0xa1, 0x82, 0xc4, 0x15, 0x08,
+ 0x7e, 0x59, 0xba, 0x84, 0x3e, 0xac, 0x12, 0x42, 0x98, 0x3d, 0x6e, 0xda,
+ 0xa9, 0xc3, 0xd7, 0x45, 0xeb, 0xc8, 0xec, 0x2a, 0x94, 0x9e, 0xc1, 0xf7,
+ 0x71, 0xca, 0x3d, 0xb3, 0xd2, 0x68, 0x2a, 0xc0, 0xbe, 0x9e, 0x2f, 0x26,
+ 0xf3, 0xf9, 0xb9, 0x7f, 0x21, 0x7f, 0x2f, 0x8b, 0x1b, 0x10, 0xb1, 0x09,
+ 0xc8, 0xab, 0xae, 0xda, 0xae, 0x66, 0x07, 0x4a, 0xc0, 0x75, 0x2a, 0x29,
+ 0x74, 0xb2, 0x99, 0xa6, 0x58, 0x84, 0xdc, 0x3e, 0x6b, 0x47, 0x37, 0xcb,
+ 0xb1, 0xc8, 0xcc, 0x81, 0xb3, 0x8b, 0x3a, 0x0c, 0xd4, 0x6a, 0x11, 0x3f,
+ 0x25, 0x17, 0x5d, 0xaf, 0x33, 0x8a, 0x32, 0x9d, 0x93, 0xef, 0xdb, 0x95,
+ 0x60, 0x5a, 0x15, 0xc5, 0x20, 0x7a, 0xec, 0xce, 0xa9, 0x31, 0x70, 0x24,
+ 0xd1, 0x4d, 0x29, 0xed, 0xeb, 0xec, 0xac, 0x53, 0x19, 0xc3, 0x02, 0x03,
+ 0x01, 0x00, 0x01, 0xa3, 0x81, 0xdf, 0x30, 0x81, 0xdc, 0x30, 0x0e, 0x06,
+ 0x03, 0x55, 0x1d, 0x0f, 0x01, 0x01, 0xff, 0x04, 0x04, 0x03, 0x02, 0x00,
+ 0x20, 0x30, 0x51, 0x06, 0x03, 0x55, 0x1d, 0x11, 0x01, 0x01, 0xff, 0x04,
+ 0x47, 0x30, 0x45, 0xa4, 0x43, 0x30, 0x41, 0x31, 0x16, 0x30, 0x14, 0x06,
+ 0x05, 0x67, 0x81, 0x05, 0x02, 0x01, 0x0c, 0x0b, 0x69, 0x64, 0x3a, 0x34,
+ 0x37, 0x34, 0x46, 0x34, 0x46, 0x34, 0x37, 0x31, 0x0f, 0x30, 0x0d, 0x06,
+ 0x05, 0x67, 0x81, 0x05, 0x02, 0x02, 0x0c, 0x04, 0x48, 0x31, 0x42, 0x32,
+ 0x31, 0x16, 0x30, 0x14, 0x06, 0x05, 0x67, 0x81, 0x05, 0x02, 0x03, 0x0c,
+ 0x0b, 0x69, 0x64, 0x3a, 0x30, 0x30, 0x31, 0x33, 0x30, 0x30, 0x33, 0x37,
+ 0x30, 0x0c, 0x06, 0x03, 0x55, 0x1d, 0x13, 0x01, 0x01, 0xff, 0x04, 0x02,
+ 0x30, 0x00, 0x30, 0x13, 0x06, 0x03, 0x55, 0x1d, 0x20, 0x04, 0x0c, 0x30,
+ 0x0a, 0x30, 0x08, 0x06, 0x06, 0x67, 0x81, 0x0c, 0x01, 0x02, 0x02, 0x30,
+ 0x1f, 0x06, 0x03, 0x55, 0x1d, 0x23, 0x04, 0x18, 0x30, 0x16, 0x80, 0x14,
+ 0x15, 0x39, 0x34, 0xfc, 0x59, 0x19, 0xcd, 0x29, 0x82, 0xf1, 0xf4, 0x7f,
+ 0xad, 0x85, 0xd6, 0x44, 0x69, 0xa1, 0xa1, 0x7b, 0x30, 0x10, 0x06, 0x03,
+ 0x55, 0x1d, 0x25, 0x04, 0x09, 0x30, 0x07, 0x06, 0x05, 0x67, 0x81, 0x05,
+ 0x08, 0x01, 0x30, 0x21, 0x06, 0x03, 0x55, 0x1d, 0x09, 0x04, 0x1a, 0x30,
+ 0x18, 0x30, 0x16, 0x06, 0x05, 0x67, 0x81, 0x05, 0x02, 0x10, 0x31, 0x0d,
+ 0x30, 0x0b, 0x0c, 0x03, 0x32, 0x2e, 0x30, 0x02, 0x01, 0x00, 0x02, 0x01,
+ 0x10, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01,
+ 0x01, 0x0b, 0x05, 0x00, 0x03, 0x82, 0x01, 0x01, 0x00, 0x00, 0x1a, 0xef,
+ 0x74, 0x00, 0x05, 0xa3, 0x1c, 0x8c, 0xec, 0x0b, 0x6d, 0x67, 0x1b, 0x26,
+ 0x34, 0x62, 0xb3, 0x0c, 0x04, 0x34, 0xf6, 0x8c, 0x60, 0xa3, 0xcc, 0x5a,
+ 0xa7, 0x5f, 0x30, 0xa1, 0x50, 0x13, 0xb5, 0xf2, 0x83, 0x49, 0xfb, 0x35,
+ 0x01, 0x74, 0xde, 0xba, 0x3d, 0xba, 0x81, 0x0c, 0x87, 0x92, 0xbb, 0x20,
+ 0xc8, 0xe3, 0x4e, 0x15, 0xd4, 0x6d, 0xe6, 0x6f, 0xae, 0xca, 0x29, 0xa2,
+ 0xba, 0x5a, 0xac, 0xb9, 0x0c, 0xef, 0x85, 0xce, 0x6c, 0x03, 0xbd, 0x57,
+ 0x41, 0x90, 0x13, 0x68, 0x7b, 0xe0, 0x5e, 0xc6, 0x96, 0xe6, 0xbd, 0x67,
+ 0x62, 0x83, 0x7b, 0xc1, 0xa6, 0xfc, 0x2e, 0xc7, 0x74, 0x54, 0xef, 0x93,
+ 0x28, 0x8b, 0x1f, 0x73, 0x3c, 0xa9, 0x11, 0x6e, 0xac, 0xdf, 0x9e, 0xe2,
+ 0xb5, 0x6d, 0x62, 0x44, 0xc3, 0xa0, 0xf6, 0x82, 0x7b, 0x23, 0x82, 0x73,
+ 0x91, 0x22, 0x11, 0x7b, 0xb8, 0x8a, 0x19, 0x45, 0x2b, 0x99, 0xdc, 0x7a,
+ 0xa1, 0x21, 0xd8, 0x37, 0x51, 0x60, 0xfb, 0x20, 0xab, 0x2d, 0x6c, 0x32,
+ 0x07, 0xb8, 0x15, 0xed, 0x7c, 0x62, 0xe9, 0xc9, 0x1d, 0x50, 0x6c, 0x6c,
+ 0x1b, 0x55, 0xcd, 0x92, 0xb6, 0xc1, 0x9a, 0x3d, 0xac, 0x01, 0xc0, 0x66,
+ 0xca, 0xc1, 0x91, 0x09, 0x50, 0x4d, 0x1a, 0xc0, 0x6f, 0xe3, 0x2d, 0x4b,
+ 0x7f, 0xee, 0xa9, 0xff, 0xeb, 0x0d, 0x5d, 0xe5, 0x64, 0xfd, 0x52, 0x6e,
+ 0x8a, 0x91, 0x2d, 0xd0, 0x13, 0xf5, 0xcd, 0x32, 0xfb, 0xe2, 0xe7, 0x6d,
+ 0xfb, 0x05, 0x6a, 0x2a, 0xec, 0xc8, 0xa6, 0xd3, 0x94, 0xee, 0x89, 0x40,
+ 0x24, 0x39, 0x84, 0x6a, 0xc1, 0xd4, 0x16, 0xdf, 0x0f, 0x79, 0x3b, 0x57,
+ 0x17, 0x4d, 0x2d, 0x58, 0x65, 0x19, 0xce, 0x0c, 0xf4, 0x86, 0x19, 0xa6,
+ 0xfe, 0xd7, 0xac, 0x7c, 0x15, 0x7d, 0x06, 0x08, 0xd2, 0xb6, 0xb9, 0x5e,
+ 0x00, 0x29, 0x1b, 0x00, 0x00, 0x01, 0x00, 0xc0, 0x01, 0x01, 0x00, 0xc0,
+ 0x01, 0x0b, 0x00, 0x00, 0x00, 0x01, 0x20, 0x04, 0x62, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x24, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xc0,
+ 0x01, 0x30, 0x82, 0x03, 0x20, 0x30, 0x82, 0x02, 0x08, 0xa0, 0x03, 0x02,
+ 0x01, 0x02, 0x02, 0x10, 0x64, 0x2e, 0x3d, 0x44, 0xaa, 0x6d, 0x90, 0x95,
+ 0x42, 0x28, 0x7d, 0x07, 0x5e, 0xe7, 0x68, 0x66, 0x30, 0x0d, 0x06, 0x09,
+ 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, 0x00, 0x30,
+ 0x81, 0x80, 0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x13,
+ 0x02, 0x55, 0x53, 0x31, 0x13, 0x30, 0x11, 0x06, 0x03, 0x55, 0x04, 0x08,
+ 0x0c, 0x0a, 0x43, 0x61, 0x6c, 0x69, 0x66, 0x6f, 0x72, 0x6e, 0x69, 0x61,
+ 0x31, 0x14, 0x30, 0x12, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x0c, 0x0b, 0x47,
+ 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x20, 0x49, 0x6e, 0x63, 0x2e, 0x31, 0x24,
+ 0x30, 0x22, 0x06, 0x03, 0x55, 0x04, 0x0b, 0x0c, 0x1b, 0x45, 0x6e, 0x67,
+ 0x69, 0x6e, 0x65, 0x65, 0x72, 0x69, 0x6e, 0x67, 0x20, 0x61, 0x6e, 0x64,
+ 0x20, 0x44, 0x65, 0x76, 0x65, 0x6c, 0x6f, 0x70, 0x6d, 0x65, 0x6e, 0x74,
+ 0x31, 0x20, 0x30, 0x1e, 0x06, 0x03, 0x55, 0x04, 0x03, 0x0c, 0x17, 0x43,
+ 0x52, 0x4f, 0x53, 0x20, 0x54, 0x50, 0x4d, 0x20, 0x50, 0x52, 0x44, 0x20,
+ 0x45, 0x4b, 0x20, 0x52, 0x4f, 0x4f, 0x54, 0x20, 0x43, 0x41, 0x30, 0x1e,
+ 0x17, 0x0d, 0x31, 0x38, 0x30, 0x37, 0x30, 0x36, 0x30, 0x30, 0x30, 0x30,
+ 0x30, 0x32, 0x5a, 0x17, 0x0d, 0x32, 0x38, 0x30, 0x37, 0x30, 0x36, 0x30,
+ 0x30, 0x30, 0x30, 0x30, 0x32, 0x5a, 0x30, 0x00, 0x30, 0x59, 0x30, 0x13,
+ 0x06, 0x07, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a,
+ 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07, 0x03, 0x42, 0x00, 0x04, 0xad,
+ 0x72, 0x36, 0x6c, 0x76, 0x5e, 0x69, 0xa1, 0xf5, 0xeb, 0xbf, 0x5d, 0x38,
+ 0x1d, 0x76, 0xda, 0xb3, 0x80, 0xf6, 0xa8, 0xf3, 0x2c, 0x42, 0x7e, 0xc8,
+ 0xd7, 0xc9, 0x46, 0xbd, 0xc6, 0x80, 0x7f, 0xd3, 0xf4, 0xac, 0xa5, 0x60,
+ 0xa3, 0xf1, 0x31, 0x6c, 0xdf, 0x87, 0x95, 0x5c, 0xb6, 0xf3, 0x79, 0xff,
+ 0x7b, 0x46, 0x53, 0xec, 0x3f, 0x20, 0xde, 0x59, 0xa5, 0x2d, 0xcb, 0x77,
+ 0x55, 0x89, 0xad, 0xa3, 0x81, 0xdf, 0x30, 0x81, 0xdc, 0x30, 0x0e, 0x06,
+ 0x03, 0x55, 0x1d, 0x0f, 0x01, 0x01, 0xff, 0x04, 0x04, 0x03, 0x02, 0x00,
+ 0x20, 0x30, 0x51, 0x06, 0x03, 0x55, 0x1d, 0x11, 0x01, 0x01, 0xff, 0x04,
+ 0x47, 0x30, 0x45, 0xa4, 0x43, 0x30, 0x41, 0x31, 0x16, 0x30, 0x14, 0x06,
+ 0x05, 0x67, 0x81, 0x05, 0x02, 0x01, 0x0c, 0x0b, 0x69, 0x64, 0x3a, 0x34,
+ 0x37, 0x34, 0x46, 0x34, 0x46, 0x34, 0x37, 0x31, 0x0f, 0x30, 0x0d, 0x06,
+ 0x05, 0x67, 0x81, 0x05, 0x02, 0x02, 0x0c, 0x04, 0x48, 0x31, 0x42, 0x32,
+ 0x31, 0x16, 0x30, 0x14, 0x06, 0x05, 0x67, 0x81, 0x05, 0x02, 0x03, 0x0c,
+ 0x0b, 0x69, 0x64, 0x3a, 0x30, 0x30, 0x31, 0x33, 0x30, 0x30, 0x33, 0x37,
+ 0x30, 0x0c, 0x06, 0x03, 0x55, 0x1d, 0x13, 0x01, 0x01, 0xff, 0x04, 0x02,
+ 0x30, 0x00, 0x30, 0x13, 0x06, 0x03, 0x55, 0x1d, 0x20, 0x04, 0x0c, 0x30,
+ 0x0a, 0x30, 0x08, 0x06, 0x06, 0x67, 0x81, 0x0c, 0x01, 0x02, 0x02, 0x30,
+ 0x1f, 0x06, 0x03, 0x55, 0x1d, 0x23, 0x04, 0x18, 0x30, 0x16, 0x80, 0x14,
+ 0x15, 0x39, 0x34, 0xfc, 0x59, 0x19, 0xcd, 0x29, 0x82, 0xf1, 0xf4, 0x7f,
+ 0xad, 0x85, 0xd6, 0x44, 0x69, 0xa1, 0xa1, 0x7b, 0x30, 0x10, 0x06, 0x03,
+ 0x55, 0x1d, 0x25, 0x04, 0x09, 0x30, 0x07, 0x06, 0x05, 0x67, 0x81, 0x05,
+ 0x08, 0x01, 0x30, 0x21, 0x06, 0x03, 0x55, 0x1d, 0x09, 0x04, 0x1a, 0x30,
+ 0x18, 0x30, 0x16, 0x06, 0x05, 0x67, 0x81, 0x05, 0x02, 0x10, 0x31, 0x0d,
+ 0x30, 0x0b, 0x0c, 0x03, 0x32, 0x2e, 0x30, 0x02, 0x01, 0x00, 0x02, 0x01,
+ 0x10, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01,
+ 0x01, 0x0b, 0x05, 0x00, 0x03, 0x82, 0x01, 0x01, 0x00, 0x3a, 0xe0, 0x1e,
+ 0x15, 0xd7, 0x11, 0x97, 0xc6, 0xc3, 0x50, 0x9a, 0x0b, 0x7f, 0x0a, 0x5e,
+ 0x7d, 0xd2, 0xb8, 0x08, 0xc0, 0x98, 0x35, 0x73, 0x6d, 0x85, 0x19, 0x46,
+ 0x76, 0x27, 0xcb, 0xa3, 0x66, 0x7f, 0xc9, 0x26, 0x20, 0x52, 0xb5, 0xe9,
+ 0xf5, 0xa0, 0x7a, 0x1d, 0xb3, 0x78, 0x66, 0x6d, 0x13, 0xcb, 0x82, 0x5b,
+ 0x09, 0xdc, 0xcb, 0x01, 0x0c, 0x3e, 0x34, 0x4a, 0x92, 0x44, 0x30, 0x44,
+ 0xda, 0x49, 0xad, 0x45, 0x17, 0xc3, 0x5b, 0x80, 0x8c, 0xa5, 0x11, 0xc4,
+ 0x07, 0x1a, 0x06, 0x43, 0x9c, 0x57, 0x51, 0x42, 0x35, 0xfd, 0xec, 0x68,
+ 0xe3, 0xe8, 0x3f, 0x5b, 0xb0, 0x01, 0x4f, 0xcb, 0xe0, 0x2a, 0x7f, 0xe6,
+ 0x89, 0xcc, 0xef, 0x59, 0xbb, 0x11, 0xed, 0xcb, 0xe6, 0xc9, 0x55, 0x94,
+ 0xf0, 0x5b, 0xee, 0x33, 0xc9, 0xed, 0x1b, 0x02, 0xeb, 0x90, 0x33, 0x0e,
+ 0xc1, 0x8f, 0x1c, 0x37, 0x3f, 0x9c, 0x59, 0x96, 0xe7, 0x73, 0xb1, 0x90,
+ 0x7a, 0x93, 0x2f, 0x4e, 0x98, 0xff, 0xff, 0xa7, 0xfb, 0x7f, 0xb9, 0x1b,
+ 0x46, 0xb8, 0x64, 0x12, 0x92, 0x74, 0x54, 0xe1, 0x7f, 0x07, 0xfa, 0xc4,
+ 0x2e, 0x53, 0xa8, 0x6a, 0xe5, 0x23, 0x92, 0x9e, 0x39, 0x37, 0xfc, 0x5d,
+ 0x2f, 0x7b, 0x69, 0x84, 0xd3, 0x69, 0x4e, 0xd1, 0x98, 0xda, 0x53, 0x34,
+ 0x80, 0xe6, 0xeb, 0xd5, 0x9a, 0x10, 0x5d, 0xc9, 0x88, 0x2b, 0x13, 0x9c,
+ 0xb9, 0xad, 0x15, 0x4f, 0x3a, 0x6c, 0x0d, 0xd4, 0x50, 0x0b, 0x1d, 0xfb,
+ 0x36, 0x74, 0xf2, 0x3e, 0x32, 0xce, 0x69, 0x5f, 0x67, 0x63, 0x33, 0x0f,
+ 0x7b, 0xc9, 0x5e, 0x68, 0x39, 0xdf, 0xb9, 0xe2, 0x73, 0xd5, 0xd5, 0x40,
+ 0xd8, 0x62, 0x0a, 0x4e, 0x45, 0x6f, 0xc1, 0x92, 0x9c, 0x41, 0x58, 0x21,
+ 0xd4, 0x60, 0x0b, 0xc4, 0x7c, 0x9c, 0xe8, 0x57, 0x5c, 0xed, 0xbc, 0xc1,
+ 0xf4, 0x51, 0x1b, 0x00, 0x00, 0x00, 0x00, 0x00, 0xfe, 0xc3, 0x3c, 0x43,
+ 0xf2, 0xe7, 0x82, 0xf3, 0x5c, 0xec, 0x61, 0x96, 0xef, 0xf5, 0xfb, 0x24,
+ 0x87, 0xaa, 0xf9, 0x5f, 0x3f, 0xf6, 0x5e, 0xdd, 0x0a, 0x59, 0x33, 0xbb,
+ 0xe1, 0xaf, 0x3b, 0xb2, 0x26, 0xfa, 0x1b, 0x00, 0x00, 0x08, 0x10, 0x00,
+ 0x01, 0x08, 0x10, 0x00, 0x01, 0x0b, 0x00, 0x00, 0x00, 0x01, 0x00, 0x05,
+ 0x60, 0x00, 0x00, 0x00, 0xe0, 0xd7, 0xdd, 0x01, 0x00, 0xe3, 0xad, 0x05,
+ 0x00, 0xe2, 0xad, 0x05, 0x00, 0x00, 0x00, 0x00, 0x61, 0x00, 0x53, 0x07,
+ 0x00, 0x00, 0x53, 0x07, 0x00, 0x30, 0x75, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0xd7, 0xdd, 0x01, 0x00, 0xd3, 0x3a, 0x06, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0xb0, 0xde, 0x01, 0x00, 0xb4, 0xde, 0x01, 0x00, 0x9b, 0x0f, 0x06,
+ 0x00, 0xbc, 0xde, 0x01, 0x00, 0x40, 0x00, 0x0d, 0x00, 0x00, 0x00, 0x0e,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x20, 0x8c, 0xb5, 0x01, 0x00, 0xd7, 0xdd, 0x01,
+ 0x00, 0x1f, 0xbd, 0x05, 0x00, 0x4e, 0xbd, 0x05, 0x00, 0x00, 0x00, 0x00,
+ 0x41, 0x01, 0x00, 0x00, 0x00, 0x30, 0xe4, 0x01, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x19, 0x53, 0x05, 0x00, 0x02, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x01, 0x00, 0x02, 0x4c, 0x57, 0x52, 0x47, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0xe8, 0xa0, 0x1c, 0x00, 0x00, 0x07, 0x10,
+ 0x00, 0x01, 0x07, 0x10, 0x00, 0x01, 0x0b, 0x00, 0x00, 0x00, 0x01, 0x4c,
+ 0x05, 0x60, 0x20, 0x00, 0x09, 0x93, 0x3c, 0xce, 0xeb, 0xb4, 0x41, 0x11,
+ 0x18, 0x81, 0x1d, 0xd4, 0x47, 0x78, 0x80, 0x08, 0x88, 0x86, 0x62, 0x2d,
+ 0xd7, 0x79, 0x94, 0x46, 0x62, 0x26, 0x68, 0x8e, 0xee, 0xe6, 0x6a, 0xa1,
+ 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0xb0, 0xde, 0x01, 0x00, 0xb4, 0xde, 0x01, 0x00, 0x9b, 0x0f,
+ 0x06, 0x00, 0xbc, 0xde, 0x01, 0x00, 0x40, 0x00, 0x0a, 0x00, 0x00, 0x00,
+ 0x0e, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x20, 0x8c, 0xb5, 0x01, 0x00, 0xd7, 0xdd,
+ 0x01, 0x00, 0x1f, 0xbd, 0x05, 0x00, 0x4e, 0xbd, 0x05, 0x00, 0x00, 0x00,
+ 0x00, 0x41, 0x01, 0x00, 0x00, 0x00, 0x30, 0xe4, 0x01, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x19, 0x53, 0x05, 0x00, 0x02, 0x00, 0x00, 0x00, 0x03, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x02, 0x00, 0x01, 0x00, 0x01, 0x00,
+ 0x00, 0x00, 0x00, 0x4f, 0x64, 0x1d, 0x00, 0x00, 0x05, 0x00, 0x80, 0x01,
+ 0x05, 0x00, 0x80, 0x01, 0x0b, 0x00, 0x01, 0x00, 0x04, 0x28, 0x04, 0xb0,
+ 0x00, 0x00, 0x40, 0x00, 0xcd, 0xd4, 0x97, 0x24, 0x1f, 0x26, 0xd9, 0x91,
+ 0xad, 0xb8, 0xd2, 0xcb, 0x46, 0x14, 0x65, 0x72, 0x91, 0x8d, 0x56, 0x2e,
+ 0x7b, 0x3f, 0x74, 0x89, 0x80, 0xc6, 0x18, 0xbf, 0xea, 0x58, 0xe6, 0xf6,
+ 0x54, 0xde, 0x01, 0x00, 0xaa, 0x4c, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0xb0, 0xde, 0x01, 0x00, 0xb4, 0xde, 0x01, 0x00, 0x9b, 0x0f, 0x06, 0x00,
+ 0xbc, 0xde, 0x01, 0x00, 0x40, 0x00, 0x28, 0x00, 0x00, 0x00, 0x00, 0x01,
+ 0xfe, 0x1b, 0x00, 0x00, 0x05, 0x00, 0x80, 0x01, 0x43, 0xcf, 0x05, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x07, 0x10, 0x00, 0x01, 0x01, 0x00, 0x00, 0x00,
+ 0xf0, 0xde, 0x01, 0x00, 0x69, 0x01, 0x00, 0x00, 0xb3, 0xd3, 0x05, 0x00,
+ 0xa4, 0xde, 0x01, 0x00, 0xa8, 0xde, 0x01, 0x00, 0xf4, 0xde, 0x01, 0x00,
+ 0xd1, 0x73, 0x06, 0x00, 0x00, 0x00, 0x00, 0x00, 0x98, 0xde, 0x40, 0x00,
+ 0x78, 0x04, 0x01, 0x00, 0x32, 0x4d, 0x50, 0x54, 0x01, 0x00, 0x00, 0x00,
+ 0xe0, 0xa7, 0x0d, 0x1e, 0x0d, 0xe2, 0x5a, 0xb8, 0xd4, 0x5e, 0xb8, 0x2b,
+ 0xcc, 0x99, 0xd2, 0x6a, 0x8f, 0xf0, 0x52, 0x18, 0x72, 0x02, 0x16, 0x8e,
+ 0x83, 0x06, 0xba, 0x01, 0xe4, 0xcc, 0xbf, 0xcf, 0x80, 0x1f, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x81, 0x38, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x0b,
+ 0x00, 0x03, 0x04, 0x72, 0x00, 0x00, 0x00, 0x06, 0x00, 0x80, 0x00, 0x43,
+ 0x00, 0x10, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x9b, 0x0f,
+ 0x10, 0x85, 0x8c, 0x80, 0xfc, 0x15, 0x23, 0xeb, 0x29, 0x04, 0x2d, 0x2c,
+ 0xfc, 0xed, 0xc4, 0x1e, 0x3f, 0xf3, 0xc2, 0x3f, 0x42, 0xd0, 0x5c, 0x8d,
+ 0xe7, 0x3f, 0xc3, 0x17, 0x6d, 0xc5, 0x2c, 0xa8, 0x5f, 0x29, 0x80, 0x82,
+ 0xf2, 0x1f, 0xd1, 0x48, 0xfc, 0x50, 0x96, 0x51, 0x13, 0x5f, 0xbf, 0xa0,
+ 0xdf, 0xb0, 0x16, 0xe2, 0x80, 0x54, 0x11, 0x10, 0x7d, 0x05, 0xf6, 0x16,
+ 0x07, 0xd3, 0xbe, 0x8e, 0x16, 0x6c, 0x83, 0x56, 0xdc, 0xd9, 0x0d, 0x29,
+ 0x42, 0x26, 0x37, 0xa0, 0x5a, 0xa0, 0x47, 0x02, 0x80, 0xfd, 0x2c, 0x8c,
+ 0x23, 0x6c, 0x96, 0x44, 0x9f, 0xd6, 0x7e, 0x33, 0x70, 0xd0, 0xe7, 0x3c,
+ 0x93, 0xf6, 0x4c, 0xf3, 0xf9, 0x6f, 0x5d, 0x40, 0xa0, 0xb0, 0xf5, 0x69,
+ 0xcc, 0x60, 0x19, 0x83, 0x0b, 0xe1, 0xc6, 0xc7, 0x8b, 0xa1, 0x3a, 0x01,
+ 0x16, 0x68, 0xd6, 0x28, 0xf9, 0x19, 0xee, 0x2b, 0x74, 0x9a, 0xba, 0xac,
+ 0x5e, 0x4e, 0x8d, 0x1d, 0x86, 0xef, 0xaf, 0xa4, 0xb4, 0xbd, 0xd4, 0x97,
+ 0x08, 0x6f, 0x20, 0x9b, 0xb3, 0xe8, 0x5e, 0x43, 0x9e, 0xad, 0x05, 0xf8,
+ 0xf0, 0x18, 0x53, 0xaf, 0xda, 0xb7, 0xbc, 0xe1, 0x43, 0xda, 0x03, 0xc0,
+ 0xe4, 0x5a, 0xd1, 0x74, 0xc4, 0x63, 0x2c, 0x22, 0x64, 0x34, 0x61, 0x07,
+ 0x26, 0x3d, 0x8c, 0x91, 0x29, 0xcc, 0x22, 0x5f, 0x14, 0xe9, 0xef, 0x7e,
+ 0xbb, 0x80, 0xf3, 0xed, 0x35, 0xbb, 0xf9, 0xca, 0xa5, 0x53, 0xff, 0x47,
+ 0x9d, 0xc7, 0xf4, 0x1e, 0xfe, 0x24, 0xf1, 0xbd, 0x30, 0x3e, 0x4c, 0xd6,
+ 0x47, 0x2c, 0x00, 0x16, 0x78, 0x61, 0xc4, 0x72, 0xb1, 0x39, 0xe1, 0x5d,
+ 0x18, 0x10, 0xa4, 0x1c, 0x4e, 0x42, 0x27, 0xe4, 0xd2, 0x4b, 0xcb, 0x65,
+ 0x2f, 0x33, 0x69, 0x49, 0xca, 0x2a, 0x89, 0xc7, 0x5d, 0xca, 0x7e, 0xfd,
+ 0xf2, 0x6b, 0x00, 0x01, 0x00, 0x00, 0x00, 0x20, 0x73, 0x9a, 0x3e, 0x61,
+ 0x92, 0x20, 0x63, 0x87, 0x6e, 0x99, 0xaa, 0x85, 0x7b, 0x24, 0x5e, 0xee,
+ 0xfe, 0x80, 0x4d, 0xaa, 0x66, 0x1e, 0x2b, 0xe6, 0x69, 0xca, 0x1f, 0xfd,
+ 0x41, 0xe8, 0x0e, 0xca, 0x00, 0x80, 0xc5, 0xdf, 0xa6, 0x9d, 0x5a, 0x23,
+ 0xde, 0xc4, 0x38, 0xfe, 0xd0, 0x80, 0x5e, 0x7d, 0xd3, 0x01, 0x07, 0xa3,
+ 0x93, 0x80, 0x19, 0xb8, 0xf4, 0xaa, 0xb1, 0xf4, 0x09, 0x78, 0x91, 0x52,
+ 0x48, 0xb1, 0x2b, 0x1b, 0xab, 0xcc, 0x60, 0x53, 0x20, 0x92, 0x85, 0xc6,
+ 0xf7, 0xff, 0x08, 0xee, 0x68, 0x6c, 0xfd, 0x3e, 0xd6, 0x9d, 0xda, 0x0d,
+ 0x03, 0x0c, 0x7c, 0xe0, 0x2b, 0x5c, 0xd4, 0x35, 0x9b, 0x3d, 0x7d, 0xd4,
+ 0x07, 0x7c, 0x8a, 0xc3, 0x79, 0xc0, 0x4b, 0x52, 0x20, 0x18, 0x2f, 0xfe,
+ 0x19, 0xe6, 0x41, 0xac, 0x31, 0xef, 0x32, 0x8e, 0x47, 0xdf, 0x0b, 0x8d,
+ 0x6b, 0x50, 0xbe, 0x15, 0xa2, 0x17, 0x51, 0xef, 0x5e, 0x87, 0xc3, 0x2e,
+ 0xd8, 0xf8, 0xb7, 0x72, 0xc9, 0x5d, 0xe8, 0x71, 0xef, 0x32, 0x02, 0x5d,
+ 0xc5, 0x49, 0x4e, 0xb7, 0xb8, 0xdc, 0xe3, 0x9d, 0xcb, 0x29, 0x49, 0x90,
+ 0xcf, 0xdf, 0x00, 0x00, 0x00, 0x22, 0x00, 0x0b, 0x96, 0xce, 0xc6, 0x42,
+ 0x3b, 0x6f, 0x58, 0x90, 0xd2, 0x2a, 0xbc, 0xc4, 0x59, 0xa1, 0xfb, 0x63,
+ 0xc4, 0xef, 0x59, 0x2a, 0x2d, 0x92, 0x76, 0xfa, 0xdb, 0xac, 0xf6, 0x7b,
+ 0x77, 0xb7, 0x56, 0x93, 0x81, 0x00, 0x00, 0x00, 0x00, 0x22, 0x00, 0x0b,
+ 0x68, 0x0f, 0x54, 0x0a, 0x3f, 0x27, 0xdc, 0x66, 0x76, 0x1a, 0x35, 0x71,
+ 0xe2, 0x5c, 0x08, 0xcf, 0xac, 0x39, 0xea, 0xcc, 0x01, 0x54, 0x4e, 0x48,
+ 0xaa, 0xe1, 0x5c, 0xa5, 0xb7, 0xe1, 0x5b, 0x50, 0x7c, 0x20, 0x00, 0x00,
+ 0x01, 0x00, 0x00, 0x81, 0x38, 0x00, 0x00, 0x00, 0x00, 0x23, 0x00, 0x0b,
+ 0x00, 0x03, 0x04, 0x72, 0x00, 0x00, 0x00, 0x06, 0x00, 0x80, 0x00, 0x43,
+ 0x00, 0x10, 0x00, 0x03, 0x00, 0x10, 0x00, 0x20, 0x6c, 0x05, 0x79, 0x5e,
+ 0x36, 0x4a, 0x04, 0x2c, 0x10, 0x8e, 0x50, 0xcc, 0x60, 0x7e, 0x18, 0xa1,
+ 0xe5, 0x4a, 0x96, 0x56, 0xf1, 0x5f, 0x34, 0x95, 0x36, 0xea, 0x00, 0x64,
+ 0xb9, 0xf4, 0x49, 0x91, 0x00, 0x20, 0x7f, 0x8c, 0xad, 0xea, 0x97, 0xba,
+ 0x99, 0x28, 0x93, 0xb4, 0xcc, 0xa7, 0x36, 0xfa, 0x61, 0xd8, 0x78, 0xb6,
+ 0x06, 0xcd, 0xe3, 0x27, 0x99, 0x7b, 0xaa, 0x3e, 0xa9, 0x4e, 0xf2, 0x93,
+ 0x18, 0x06, 0x00, 0x23, 0x00, 0x00, 0x00, 0x20, 0x16, 0xba, 0x08, 0xd2,
+ 0xd8, 0x63, 0x38, 0xba, 0xb9, 0x0b, 0xce, 0x5b, 0x72, 0x9a, 0x88, 0x08,
+ 0x25, 0xb9, 0xbd, 0xab, 0x16, 0x77, 0x43, 0xbb, 0xcd, 0x3d, 0x4d, 0x48,
+ 0xbc, 0x77, 0xf8, 0xd3, 0x00, 0x20, 0x0f, 0xd6, 0x89, 0x31, 0xdc, 0xfa,
+ 0x70, 0x00, 0x6a, 0x4b, 0x59, 0x60, 0x28, 0x01, 0x54, 0x39, 0x4e, 0xa1,
+ 0x97, 0x28, 0xe0, 0x84, 0x92, 0x0e, 0x35, 0xdc, 0xb3, 0x9a, 0x11, 0x08,
+ 0x7c, 0x93, 0x00, 0x00, 0x00, 0x22, 0x00, 0x0b, 0x5d, 0xab, 0xa0, 0x5d,
+ 0x70, 0x5f, 0x6e, 0x78, 0xeb, 0x82, 0x8c, 0xb4, 0x77, 0x45, 0x95, 0x50,
+ 0x6b, 0x7c, 0x97, 0x5d, 0x2d, 0x31, 0x76, 0x0e, 0x81, 0x9e, 0x4b, 0xa3,
+ 0x80, 0xf5, 0xff, 0x86, 0x81, 0x00, 0x00, 0x01, 0x00, 0x22, 0x00, 0x0b,
+ 0x85, 0xf4, 0xbe, 0x91, 0xe1, 0x2b, 0x4c, 0x2d, 0xaa, 0x64, 0xb1, 0x90,
+ 0x5f, 0xec, 0x74, 0xea, 0xec, 0x2c, 0x3d, 0x0d, 0xbb, 0x26, 0xc0, 0x49,
+ 0x3d, 0xae, 0xa0, 0xe4, 0x72, 0xfa, 0xba, 0x15, 0x74, 0x22, 0x00, 0x00,
+ 0x02, 0x00, 0x00, 0x81, 0x18, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x0b,
+ 0x00, 0x02, 0x04, 0x72, 0x00, 0x00, 0x00, 0x10, 0x00, 0x10, 0x08, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0xed, 0x72, 0x50, 0x56, 0x10, 0xb7,
+ 0xab, 0x52, 0x50, 0x32, 0x4f, 0x82, 0x87, 0x94, 0x83, 0x84, 0x55, 0xeb,
+ 0xda, 0x78, 0x46, 0x34, 0x48, 0xc4, 0xc6, 0x28, 0x47, 0xf4, 0x4c, 0xfd,
+ 0x1f, 0x04, 0xcd, 0xb9, 0x72, 0x6a, 0x49, 0x6c, 0x1c, 0x9b, 0x07, 0x5b,
+ 0xe8, 0xef, 0xaf, 0x0b, 0xeb, 0xb1, 0xcb, 0x24, 0x0e, 0x63, 0x2f, 0x35,
+ 0x3c, 0x79, 0x0c, 0xde, 0xf5, 0xdb, 0x06, 0xe9, 0x68, 0xf4, 0xf0, 0x8e,
+ 0xf1, 0xbf, 0x98, 0x9a, 0xd9, 0x2b, 0x45, 0x85, 0x83, 0xda, 0xd9, 0xf3,
+ 0x6f, 0x1a, 0x24, 0xe8, 0x5d, 0xad, 0xda, 0xa7, 0xfc, 0x03, 0x67, 0xb0,
+ 0xdf, 0x07, 0xbd, 0xe1, 0x1e, 0x7d, 0xa1, 0xea, 0x59, 0xfb, 0xb9, 0x48,
+ 0x2d, 0x45, 0x0c, 0x1b, 0x52, 0x0e, 0xb3, 0xe6, 0xac, 0x4a, 0x91, 0x1c,
+ 0xb1, 0x2f, 0xee, 0xae, 0xf4, 0x0a, 0x79, 0x81, 0x92, 0xab, 0xaa, 0xff,
+ 0x44, 0x0f, 0x8d, 0xe7, 0x30, 0xfd, 0xee, 0x62, 0x0f, 0x92, 0x4d, 0x08,
+ 0xe7, 0xd0, 0xdb, 0x16, 0xf2, 0x27, 0x73, 0x59, 0x18, 0xc5, 0xd9, 0x0d,
+ 0xac, 0xaf, 0xc0, 0xd0, 0xdc, 0xfd, 0x1d, 0xeb, 0x74, 0x33, 0x59, 0xd6,
+ 0x30, 0xe1, 0x29, 0x81, 0xa5, 0xeb, 0x67, 0xc6, 0x32, 0x98, 0x37, 0x12,
+ 0xe8, 0x12, 0x3c, 0x5b, 0xd1, 0xc7, 0x9e, 0x9d, 0x5b, 0xe3, 0x7d, 0x5c,
+ 0xf6, 0x9e, 0x4d, 0xdf, 0x65, 0xe1, 0x95, 0x14, 0xf6, 0xda, 0x94, 0x91,
+ 0x76, 0x91, 0x6b, 0x39, 0x37, 0xf0, 0x72, 0xf9, 0x7f, 0xc1, 0x09, 0x9d,
+ 0x33, 0xf5, 0x26, 0x84, 0xe2, 0xa2, 0x94, 0xc3, 0xad, 0x4a, 0xc2, 0x86,
+ 0xa0, 0x1a, 0xf2, 0x0e, 0xa1, 0x98, 0xb1, 0x9f, 0x50, 0x54, 0xd5, 0xc8,
+ 0x58, 0x11, 0xc3, 0x76, 0x63, 0xc0, 0x49, 0x7b, 0xa5, 0x80, 0x79, 0x75,
+ 0xc0, 0x0c, 0xe9, 0x8a, 0xb0, 0xbe, 0x09, 0x54, 0xfa, 0x19, 0x00, 0x01,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x80, 0xfa, 0x82, 0xd6, 0x21, 0xf1, 0x41,
+ 0x7e, 0xca, 0x35, 0x00, 0x73, 0x63, 0x3f, 0x8d, 0x38, 0xbd, 0x4d, 0xd0,
+ 0x27, 0x0d, 0xe2, 0x66, 0xa5, 0x3c, 0x47, 0x14, 0xe7, 0x36, 0x38, 0x87,
+ 0xe2, 0x5d, 0x6d, 0x2a, 0x19, 0x10, 0xee, 0xfe, 0xf1, 0x6d, 0x6d, 0xb5,
+ 0x2c, 0x2f, 0xe3, 0x8f, 0x9b, 0x5f, 0x73, 0x8b, 0xdd, 0x1b, 0x0d, 0xe8,
+ 0x81, 0x53, 0x79, 0x9b, 0xca, 0x86, 0x03, 0xf9, 0x2d, 0x6e, 0x85, 0x26,
+ 0x14, 0xa7, 0x71, 0xd5, 0xf8, 0xd8, 0x30, 0x27, 0x26, 0x08, 0x30, 0x17,
+ 0xf8, 0xc2, 0x17, 0x6a, 0xb3, 0x7e, 0x98, 0x69, 0x19, 0x94, 0x51, 0x34,
+ 0x94, 0x3c, 0xcf, 0x45, 0x9a, 0x9d, 0x9d, 0xea, 0xcf, 0x04, 0x74, 0x74,
+ 0x79, 0x09, 0x3f, 0xa0, 0xaa, 0x25, 0xd2, 0xda, 0x1f, 0x1a, 0xc6, 0x87,
+ 0xcf, 0x17, 0x1c, 0xfc, 0x1d, 0x59, 0x4e, 0x6d, 0x2f, 0x32, 0x28, 0x39,
+ 0xb0, 0xcd, 0x00, 0x00, 0x00, 0x22, 0x00, 0x0b, 0x92, 0x80, 0x9c, 0x28,
+ 0xa0, 0xc7, 0x75, 0x91, 0x80, 0xc9, 0x86, 0x63, 0xe1, 0xa7, 0x19, 0x33,
+ 0x21, 0xd8, 0x47, 0x8c, 0xac, 0xd4, 0x51, 0x7d, 0x78, 0x31, 0x84, 0x74,
+ 0x49, 0x63, 0x40, 0xba, 0x81, 0x00, 0x00, 0x02, 0x00, 0x22, 0x00, 0x0b,
+ 0xe9, 0x80, 0x8e, 0x73, 0x7d, 0xaa, 0xc3, 0xf8, 0x84, 0xaf, 0x7d, 0x18,
+ 0x10, 0x7c, 0xed, 0xf3, 0x14, 0x72, 0x61, 0x97, 0xb6, 0xd7, 0xbb, 0x3a,
+ 0x47, 0xb0, 0x91, 0xb0, 0xba, 0x7c, 0xbc, 0x04, 0x00, 0x00, 0x00, 0x00,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0x01, 0x20, 0x00, 0x03, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+ 0x04, 0x12, 0x00, 0x76, 0x61, 0x72, 0x31, 0x74, 0x68, 0x69, 0x73, 0x5f,
+ 0x69, 0x73, 0x5f, 0x76, 0x61, 0x72, 0x69, 0x61, 0x62, 0x6c, 0x65, 0x5f,
+ 0x31, 0x04, 0x12, 0x00, 0x76, 0x61, 0x72, 0x32, 0x74, 0x68, 0x69, 0x73,
+ 0x5f, 0x69, 0x73, 0x5f, 0x76, 0x61, 0x72, 0x69, 0x61, 0x62, 0x6c, 0x65,
+ 0x5f, 0x32, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
diff --git a/test/nvmem.c b/test/nvmem.c
index 99b2d554e9..2b814251c9 100644
--- a/test/nvmem.c
+++ b/test/nvmem.c
@@ -5,11 +5,15 @@
* Test Cr-50 Non-Voltatile memory module
*/
+#include "nvmem_test.h"
+
#include "common.h"
#include "console.h"
#include "crc.h"
-#include "nvmem.h"
#include "flash.h"
+#include "new_nvmem.h"
+#include "nvmem.h"
+#include "printf.h"
#include "shared_mem.h"
#include "task.h"
#include "test_util.h"
@@ -19,16 +23,29 @@
#define WRITE_SEGMENT_LEN 200
#define WRITE_READ_SEGMENTS 4
-uint32_t nvmem_user_sizes[NVMEM_NUM_USERS] = {
- NVMEM_USER_0_SIZE,
- NVMEM_USER_1_SIZE,
- NVMEM_USER_2_SIZE
+enum test_failure_mode failure_mode;
+
+static const uint8_t legacy_nvmem_image[] = {
+#include "legacy_nvmem_dump.h"
};
+BUILD_ASSERT(sizeof(legacy_nvmem_image) == NVMEM_PARTITION_SIZE);
+
static uint8_t write_buffer[NVMEM_PARTITION_SIZE];
-static uint8_t read_buffer[NVMEM_PARTITION_SIZE];
static int flash_write_fail;
-static int lock_test_started;
+
+struct nvmem_test_result {
+ int var_count;
+ int reserved_obj_count;
+ int evictable_obj_count;
+ int deleted_obj_count;
+ int delimiter_count;
+ int unexpected_count;
+ size_t valid_data_size;
+ size_t erased_data_size;
+};
+
+static struct nvmem_test_result test_result;
int app_cipher(const void *salt_p, void *out_p, const void *in_p, size_t size)
{
@@ -50,15 +67,28 @@ void app_compute_hash(uint8_t *p_buf, size_t num_bytes,
uint32_t crc;
uint32_t *p_data;
int n;
+ size_t tail_size;
crc32_init();
- /* Assuming here that buffer is 4 byte aligned and that num_bytes is
- * divisible by 4
- */
+ /* Assuming here that buffer is 4 byte aligned. */
p_data = (uint32_t *)p_buf;
- for (n = 0; n < num_bytes/4; n++)
+ for (n = 0; n < num_bytes / 4; n++)
crc32_hash32(*p_data++);
- crc = crc32_result();
+
+ tail_size = num_bytes % 4;
+ if (tail_size) {
+ uint32_t tail;
+
+ tail = 0;
+ memcpy(&tail, p_data, tail_size);
+ crc32_hash32(tail);
+ }
+
+ /*
+ * Crc32 of 0xffffffff is 0xffffffff. Let's spike the results to avoid
+ * this unfortunate Crc32 property.
+ */
+ crc = crc32_result() ^ 0x55555555;
for (n = 0; n < hash_bytes; n += sizeof(crc)) {
size_t copy_bytes = MIN(sizeof(crc), hash_bytes - n);
@@ -73,652 +103,1263 @@ int flash_pre_op(void)
return flash_write_fail ? EC_ERROR_UNKNOWN : EC_SUCCESS;
}
-static int generate_random_data(int offset, int num_bytes)
+static void dump_nvmem_state(const char *title,
+ const struct nvmem_test_result *tr)
+{
+ ccprintf("\n%s:\n", title);
+ ccprintf("var_count: %d\n", tr->var_count);
+ ccprintf("reserved_obj_count: %d\n", tr->reserved_obj_count);
+ ccprintf("evictable_obj_count: %d\n", tr->evictable_obj_count);
+ ccprintf("deleted_obj_count: %d\n", tr->deleted_obj_count);
+ ccprintf("deimiter_count: %d\n", tr->delimiter_count);
+ ccprintf("unexpected_count: %d\n", tr->unexpected_count);
+ ccprintf("valid_data_size: %d\n", tr->valid_data_size);
+ ccprintf("erased_data_size: %d\n\n", tr->erased_data_size);
+}
+
+static void wipe_out_nvmem_cache(void)
+{
+ memset(nvmem_cache_base(NVMEM_TPM), 0, nvmem_user_sizes[NVMEM_TPM]);
+}
+
+static int prepare_nvmem_contents(void)
+{
+ struct nvmem_tag *tag;
+
+ memcpy(write_buffer, legacy_nvmem_image, sizeof(write_buffer));
+ tag = (struct nvmem_tag *)write_buffer;
+
+ app_compute_hash(tag->padding, NVMEM_PARTITION_SIZE - NVMEM_SHA_SIZE,
+ tag->sha, sizeof(tag->sha));
+ app_cipher(tag->sha, tag + 1, tag + 1,
+ NVMEM_PARTITION_SIZE - sizeof(struct nvmem_tag));
+
+ return flash_physical_write(CONFIG_FLASH_NVMEM_BASE_A -
+ CONFIG_PROGRAM_MEMORY_BASE,
+ sizeof(write_buffer), write_buffer);
+}
+
+static int iterate_over_flash(void)
{
- int m, n, limit;
- uint32_t r_data;
+ enum ec_error_list rv;
+ struct nn_container *ch;
+ struct access_tracker at = {};
+ uint8_t buf[CONFIG_FLASH_BANK_SIZE];
+
+ memset(&test_result, 0, sizeof(test_result));
+ ch = (struct nn_container *)buf;
+
+ while ((rv = get_next_object(&at, ch, 1)) == EC_SUCCESS)
+ switch (ch->container_type) {
+ case NN_OBJ_OLD_COPY:
+ if (ch->container_type_copy == NN_OBJ_TRANSACTION_DEL) {
+ test_result.delimiter_count++;
+ } else {
+ test_result.deleted_obj_count++;
+ test_result.erased_data_size += ch->size;
+ }
+ break;
+
+ case NN_OBJ_TUPLE:
+ test_result.var_count++;
+ test_result.valid_data_size += ch->size;
+ break;
+
+ case NN_OBJ_TPM_RESERVED:
+ test_result.reserved_obj_count++;
+ test_result.valid_data_size += ch->size;
+ break;
+
+ case NN_OBJ_TPM_EVICTABLE:
+ test_result.evictable_obj_count++;
+ test_result.valid_data_size += ch->size;
+ break;
+
+ case NN_OBJ_TRANSACTION_DEL:
+ test_result.delimiter_count++;
+ break;
+ default:
+ test_result.unexpected_count++;
+ break;
+ }
- /* Ensure it will fit in the write buffer */
- TEST_ASSERT((num_bytes + offset) <= NVMEM_PARTITION_SIZE);
- /* Seed random number sequence */
- r_data = prng((uint32_t)clock());
- m = 0;
- while (m < num_bytes) {
- r_data = prng(r_data);
- limit = MIN(4, num_bytes - m);
- /* No byte alignment assumptions */
- for (n = 0; n < limit; n++)
- write_buffer[offset + m + n] = (r_data >> (n*8)) & 0xff;
- m += limit;
+ if (rv != EC_ERROR_MEMORY_ALLOCATION) {
+ ccprintf("\n%s:%d - unexpected return value %d\n", __func__,
+ __LINE__, rv);
+ return rv;
}
- return EC_SUCCESS;
+ /* Verify that there is a delimiter at the top of the flash. */
+ if (at.mt.data_offset > sizeof(*at.mt.ph)) {
+ if ((at.mt.ph == at.dt.ph) &&
+ (((at.mt.data_offset - sizeof(struct nn_container))) ==
+ at.dt.data_offset)) {
+ return EC_SUCCESS;
+ }
+ } else {
+ if ((at.dt.ph == list_element_to_ph(at.list_index)) &&
+ (at.dt.data_offset ==
+ (CONFIG_FLASH_BANK_SIZE - sizeof(struct nn_container)))) {
+ ccprintf("%s:%d edge delimiter case OK\n", __func__,
+ __LINE__);
+ return EC_SUCCESS;
+ }
+ }
+ ccprintf("%s:%d bad delimiter location: ph %p, "
+ "dt.ph %p, offset %d, delim offset %d\n",
+ __func__, __LINE__, at.mt.ph, at.dt.ph, at.mt.data_offset,
+ at.dt.data_offset);
+
+ return EC_ERROR_INVAL;
}
-static int test_write_read(uint32_t offset, uint32_t num_bytes, int user)
+static void *page_to_flash_addr(int page_num)
{
- int ret;
+ uint32_t base_offset = CONFIG_FLASH_NEW_NVMEM_BASE_A;
- /* Generate source data */
- generate_random_data(0, num_bytes);
- /* Write source data to NvMem */
- ret = nvmem_write(offset, num_bytes, write_buffer, user);
- /* Write to flash */
- ret = nvmem_commit();
- if (ret != EC_SUCCESS)
- return ret;
- /* Read from flash */
- nvmem_read(offset, num_bytes, read_buffer, user);
- /* Verify that write to flash was successful */
- TEST_ASSERT_ARRAY_EQ(write_buffer, read_buffer, num_bytes);
+ if (page_num > NEW_NVMEM_TOTAL_PAGES)
+ return NULL;
- return EC_SUCCESS;
+ if (page_num >= (NEW_NVMEM_TOTAL_PAGES / 2)) {
+ page_num -= (NEW_NVMEM_TOTAL_PAGES / 2);
+ base_offset = CONFIG_FLASH_NEW_NVMEM_BASE_B;
+ }
+
+ return (void *)((uintptr_t)base_offset +
+ page_num * CONFIG_FLASH_BANK_SIZE);
}
-static int write_full_buffer(uint32_t size, int user)
+static int post_init_from_scratch(uint8_t flash_value)
{
- uint32_t offset;
- uint32_t len;
- int ret;
+ int i;
+ void *flash_p;
+
+ memset(write_buffer, flash_value, sizeof(write_buffer));
+
+ /* Overwrite nvmem flash space with junk value. */
+ flash_physical_write(
+ CONFIG_FLASH_NEW_NVMEM_BASE_A - CONFIG_PROGRAM_MEMORY_BASE,
+ NEW_FLASH_HALF_NVMEM_SIZE, (const char *)write_buffer);
+ flash_physical_write(
+ CONFIG_FLASH_NEW_NVMEM_BASE_B - CONFIG_PROGRAM_MEMORY_BASE,
+ NEW_FLASH_HALF_NVMEM_SIZE, (const char *)write_buffer);
+
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+ TEST_ASSERT(iterate_over_flash() == EC_SUCCESS);
+ TEST_ASSERT(test_result.var_count == 0);
+ TEST_ASSERT(test_result.reserved_obj_count == 38);
+ TEST_ASSERT(test_result.evictable_obj_count == 0);
+ TEST_ASSERT(test_result.deleted_obj_count == 0);
+ TEST_ASSERT(test_result.unexpected_count == 0);
+ TEST_ASSERT(test_result.valid_data_size == 1088);
+ TEST_ASSERT(total_var_space == 0);
+
+ for (i = 0; i < (NEW_NVMEM_TOTAL_PAGES - 1); i++) {
+ flash_p = page_to_flash_addr(i);
+
+ TEST_ASSERT(!!flash_p);
+ TEST_ASSERT(is_uninitialized(flash_p, CONFIG_FLASH_BANK_SIZE));
+ }
- /* Start at beginning of the user buffer */
- offset = 0;
- do {
- /* User default segment length unless it will exceed */
- len = MIN(WRITE_SEGMENT_LEN, size - offset);
- /* Generate data for tx buffer */
- generate_random_data(offset, len);
- /* Write data to Nvmem cache memory */
- nvmem_write(offset, len, &write_buffer[offset], user);
- /* Write to flash */
- ret = nvmem_commit();
- if (ret != EC_SUCCESS)
- return ret;
- /* Adjust starting offset by segment length */
- offset += len;
- } while (offset < size);
-
- /* Entire flash buffer should be full at this point */
- nvmem_read(0, size, read_buffer, user);
- /* Verify that write to flash was successful */
- TEST_ASSERT_ARRAY_EQ(write_buffer, read_buffer, size);
+ flash_p = page_to_flash_addr(i);
+ TEST_ASSERT(!is_uninitialized(flash_p, CONFIG_FLASH_BANK_SIZE));
return EC_SUCCESS;
}
+/*
+ * The purpose of this test is to check NvMem initialization when NvMem is
+ * completely erased (i.e. following SpiFlash write of program). In this case,
+ * nvmem_init() is expected to create initial flash storage containing
+ * reserved objects only.
+ */
static int test_fully_erased_nvmem(void)
{
- /*
- * The purpose of this test is to check NvMem intialization when NvMem
- * is completely erased (i.e. following SpiFlash write of program). In
- * this configuration, nvmem_init() should be able to detect this case
- * and configure an initial NvMem partition.
- */
- /* Erase full NvMem area */
- flash_physical_erase(CONFIG_FLASH_NVMEM_OFFSET_A,
- NVMEM_PARTITION_SIZE);
- flash_physical_erase(CONFIG_FLASH_NVMEM_OFFSET_B,
- NVMEM_PARTITION_SIZE);
- /* Call NvMem initialization function */
- return nvmem_init();
+ return post_init_from_scratch(0xff);
}
-static int test_configured_nvmem(void)
+/*
+ * The purpose of this test is to check nvmem_init() in the case when no valid
+ * pages exist but flash space is garbled as opposed to be fully erased. In
+ * this case, the initialization is expected to create one new valid page and
+ * erase the rest of the pages.
+ */
+static int test_corrupt_nvmem(void)
{
- /*
- * The purpose of this test is to check nvmem_init() when both
- * partitions are configured and valid.
- */
+ return post_init_from_scratch(0x55);
+}
- /* Call NvMem initialization */
- return nvmem_init();
+static int prepare_new_flash(void)
+{
+ TEST_ASSERT(test_fully_erased_nvmem() == EC_SUCCESS);
+
+ /* Now copy sensible information into the nvmem cache. */
+ memcpy(nvmem_cache_base(NVMEM_TPM),
+ legacy_nvmem_image + sizeof(struct nvmem_tag),
+ nvmem_user_sizes[NVMEM_TPM]);
+
+ dump_nvmem_state("after first save", &test_result);
+ TEST_ASSERT(new_nvmem_save() == EC_SUCCESS);
+ TEST_ASSERT(iterate_over_flash() == EC_SUCCESS);
+
+ TEST_ASSERT(test_result.deleted_obj_count == 24);
+ TEST_ASSERT(test_result.var_count == 0);
+ TEST_ASSERT(test_result.reserved_obj_count == 40);
+ TEST_ASSERT(test_result.evictable_obj_count == 9);
+ TEST_ASSERT(test_result.unexpected_count == 0);
+ TEST_ASSERT(test_result.valid_data_size == 5128);
+ TEST_ASSERT(test_result.erased_data_size == 698);
+
+ return EC_SUCCESS;
}
-/* Verify that nvmem_erase_user_data only erases the given user's data. */
-static int test_nvmem_erase_user_data(void)
+static int test_nvmem_save(void)
{
- uint32_t write_value;
- uint32_t read_value;
- int i;
+ const char *key = "var1";
+ const char *value = "value of var 1";
+ size_t total_var_size;
+ struct nvmem_test_result old_result;
- nvmem_init();
-
- /* Make sure all partitions have data in them. */
- for (i = 0; i < NVMEM_NUM_PARTITIONS; i++) {
- write_value = i;
- nvmem_write(0, sizeof(write_value), &write_value, NVMEM_USER_0);
- write_value = 2;
- nvmem_write(0, sizeof(write_value), &write_value, NVMEM_USER_1);
- write_value = 3;
- nvmem_write(0, sizeof(write_value), &write_value, NVMEM_USER_2);
- nvmem_commit();
- }
+ TEST_ASSERT(prepare_new_flash() == EC_SUCCESS);
- /* Check that the writes took place. */
- read_value = ~write_value;
- nvmem_read(0, sizeof(read_value), &read_value, NVMEM_USER_0);
- TEST_ASSERT(read_value == i-1);
- nvmem_read(0, sizeof(read_value), &read_value, NVMEM_USER_1);
- TEST_ASSERT(read_value == 2);
- nvmem_read(0, sizeof(read_value), &read_value, NVMEM_USER_2);
- TEST_ASSERT(read_value == 3);
+ /*
+ * Verify that saving without changing the cache does not affect flash
+ * contents.
+ */
+ old_result = test_result;
+ TEST_ASSERT(new_nvmem_save() == EC_SUCCESS);
/*
- * nvmem_erase_user_data() is supposed to erase the user's data across
- * all partitions.
+ * Save of unmodified cache does not modify the flash contents and
+ * does not set the delimiter.
*/
- nvmem_erase_user_data(NVMEM_USER_0);
- for (i = 0; i < NVMEM_NUM_PARTITIONS; i++) {
- /* Make sure USER 0's data is (still) gone. */
- nvmem_read(0, sizeof(read_value), &read_value, NVMEM_USER_0);
- TEST_ASSERT(read_value == 0xffffffff);
+ TEST_ASSERT(iterate_over_flash() == EC_SUCCESS);
+ TEST_ASSERT(!memcmp(&test_result, &old_result, sizeof(test_result)));
- /* Make sure the other users' data has been untouched. */
- nvmem_read(0, sizeof(read_value), &read_value, NVMEM_USER_1);
- TEST_ASSERT(read_value == 2);
+ wipe_out_nvmem_cache();
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+ TEST_ASSERT(new_nvmem_save() == EC_SUCCESS);
+ TEST_ASSERT(iterate_over_flash() == EC_SUCCESS);
+ TEST_ASSERT(!memcmp(&test_result, &old_result, sizeof(test_result)));
- /*
- * The active partition changes when the contents of the cache
- * changes. Therefore, in order to examine all the paritions,
- * we'll keep modifying one of the user's data.
- */
- nvmem_read(0, sizeof(read_value), &read_value, NVMEM_USER_2);
- TEST_ASSERT(read_value == (3+i));
- write_value = 4 + i;
- nvmem_write(0, sizeof(write_value), &write_value, NVMEM_USER_2);
- nvmem_commit();
- }
+ /*
+ * Total size test variable storage takes in flash (container header
+ * size not included).
+ */
+ total_var_size = strlen(key) + strlen(value) + sizeof(struct tuple);
+
+ /* Verify that we can add a variable to nvmem. */
+ TEST_ASSERT(setvar(key, strlen(key), value, strlen(value)) ==
+ EC_SUCCESS);
+ TEST_ASSERT(iterate_over_flash() == EC_SUCCESS);
+
+ /* Remove changes caused by the new var addition. */
+ test_result.var_count -= 1;
+ test_result.delimiter_count -= 1;
+ test_result.valid_data_size -= total_var_size;
+
+ TEST_ASSERT(memcmp(&test_result, &old_result, sizeof(test_result)) ==
+ 0);
+
+ /* Verify that we can delete a variable from nvmem. */
+ TEST_ASSERT(setvar(key, strlen(key), NULL, 0) == EC_SUCCESS);
+ TEST_ASSERT(iterate_over_flash() == EC_SUCCESS);
+ test_result.deleted_obj_count -= 1;
+ test_result.erased_data_size -= total_var_size;
+ test_result.delimiter_count -= 1;
+ TEST_ASSERT(memcmp(&test_result, &old_result, sizeof(test_result)) ==
+ 0);
return EC_SUCCESS;
}
-static int test_corrupt_nvmem(void)
+static size_t get_free_nvmem_room(void)
{
- uint8_t invalid_value = 0x55;
- int ret;
- struct nvmem_tag *p_part;
- uint8_t *p_data;
+ size_t free_room;
+ size_t free_pages;
+ /* Compaction kicks in when 3 pages or less are left. */
+ const size_t max_pages = NEW_NVMEM_TOTAL_PAGES - 3;
+
+ ccprintf("list index %d, data offset 0x%x\n", master_at.list_index,
+ master_at.mt.data_offset);
+
+ if (master_at.list_index >= max_pages)
+ return 0;
+
+ free_pages = max_pages - master_at.list_index;
+ free_room = (free_pages - 1) * (CONFIG_FLASH_BANK_SIZE -
+ sizeof(struct nn_page_header)) +
+ CONFIG_FLASH_BANK_SIZE - master_at.mt.data_offset;
+ ccprintf("free pages %d, data offset 0x%x\n", free_pages,
+ master_at.mt.data_offset);
+ return free_room;
+}
+
+static int test_nvmem_compaction(void)
+{
+ char value[100]; /* Definitely more than enough. */
+ const char *key = "var 1";
+ int i;
+ size_t key_len;
+ size_t val_len;
+ size_t free_room;
+ size_t real_var_size;
+ size_t var_space;
+ int max_vars;
+ int erased_data_size;
+ const size_t alignment_mask = CONFIG_FLASH_WRITE_SIZE - 1;
+
+ key_len = strlen(key);
+ val_len = snprintf(value, sizeof(value), "variable value is %04d", 0);
+
+ TEST_ASSERT(prepare_new_flash() == EC_SUCCESS);
/*
- * The purpose of this test is to check nvmem_init() in the case when no
- * vailid partition exists (not fully erased and no valid sha). In this
- * case, the initialization create one new valid partition.
+ * Remember how much room was erased before flooding nvmem with erased
+ * values.
*/
+ erased_data_size = test_result.erased_data_size;
- /* Overwrite each partition will all 0s */
- memset(write_buffer, invalid_value, NVMEM_PARTITION_SIZE);
- flash_physical_write(CONFIG_FLASH_NVMEM_OFFSET_A,
- NVMEM_PARTITION_SIZE,
- (const char *)write_buffer);
- flash_physical_write(CONFIG_FLASH_NVMEM_OFFSET_B,
- NVMEM_PARTITION_SIZE,
- (const char *)write_buffer);
+ /* Let's see how much free room there is. */
+ free_room = get_free_nvmem_room();
+ TEST_ASSERT(free_room);
+
+ /* How much room (key, value) pair takes in a container. */
+ real_var_size = val_len + key_len + sizeof(struct tuple);
/*
- * The initialization function will look for a valid partition and if
- * none is found, it will create one, and save it at partition index
- * 1.
+ * See how many vars including containers should be able to fit there.
+ *
+ * First calculate rounded up space a var will take. Apart from the
+ * var itself there will be a container header and a delimiter.
*/
- ret = nvmem_init();
- if (ret)
- return ret;
+ var_space = (real_var_size + 2 * sizeof(struct nn_container) +
+ alignment_mask) & ~alignment_mask;
+
+ max_vars = free_room / var_space;
/*
- * nvmem_init() called on uninitialized flash will create the first
- * valid partition with generation set to 0 at flash partition 1.
- *
- * Check here that partition 1 has a generation number of 0.
+ * And now flood the NVMEM with erased values (each new setvar()
+ * invocation erases the previous instance.
*/
- p_part = (struct nvmem_tag *)CONFIG_FLASH_NVMEM_BASE_B;
- TEST_ASSERT(p_part->generation == 0);
- p_data = (uint8_t *)p_part + sizeof(struct nvmem_tag);
+ for (i = 0; i <= max_vars; i++) {
+ snprintf(value, sizeof(value), "variable value is %04d", i);
+ TEST_ASSERT(setvar(key, key_len, value, val_len) == EC_SUCCESS);
+ }
- /* Verify that partition 0 is still empty. */
- memset(write_buffer, invalid_value, NVMEM_PARTITION_SIZE);
- p_data = (void *)CONFIG_FLASH_NVMEM_BASE_A;
- TEST_ASSERT_ARRAY_EQ(write_buffer, p_data, NVMEM_PARTITION_SIZE);
+ TEST_ASSERT(iterate_over_flash() == EC_SUCCESS);
+ /* Make sure there was no compaction yet. */
+ TEST_ASSERT(test_result.erased_data_size > erased_data_size);
- /* Now let's write a different value into user NVMEM_CR50 */
- invalid_value ^= ~0;
- TEST_ASSERT(nvmem_write(0, sizeof(invalid_value),
- &invalid_value, NVMEM_USER_0) == EC_SUCCESS);
- TEST_ASSERT(nvmem_commit() == EC_SUCCESS);
+ /* This is how much the erased space grew as a result of flooding. */
+ erased_data_size = test_result.erased_data_size - erased_data_size;
+ TEST_ASSERT(erased_data_size == max_vars * real_var_size);
- /* Verify that partition 1 generation did not change. */
- TEST_ASSERT(p_part->generation == 0);
+ /* This will take it over the compaction limit. */
+ val_len = snprintf(value, sizeof(value), "variable value is %03d", i);
+ TEST_ASSERT(setvar(key, key_len, value, val_len) == EC_SUCCESS);
+ TEST_ASSERT(iterate_over_flash() == EC_SUCCESS);
+ TEST_ASSERT(test_result.erased_data_size < var_space);
+ return EC_SUCCESS;
+}
+
+static int test_configured_nvmem(void)
+{
/*
- * Now verify that partition 0 generation is set to 1;
+ * The purpose of this test is to check how nvmem_init() initializes
+ * from previously saved flash contents.
*/
- p_part = (struct nvmem_tag *)CONFIG_FLASH_NVMEM_BASE_A;
- TEST_ASSERT(p_part->generation == 1);
+ TEST_ASSERT(prepare_nvmem_contents() == EC_SUCCESS);
- return EC_SUCCESS;
+ /*
+ * This is initialization from legacy flash contents which replaces
+ * legacy flash image with the new format flash image
+ */
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+
+ /* And this is initialization from the new flash layout. */
+ return nvmem_init();
}
-static int test_write_read_sequence(void)
+static uint8_t find_lb(const void *data)
{
- uint32_t offset;
- uint32_t length;
- int user;
- int n;
- int ret;
-
- for (user = 0; user < NVMEM_NUM_USERS; user++) {
- /* Length for each write/read segment */
- length = nvmem_user_sizes[user] / WRITE_READ_SEGMENTS;
- /* Start at beginning of user buffer */
- offset = 0;
- for (n = 0; n < WRITE_READ_SEGMENTS; n++) {
- ret = test_write_read(offset, length, user);
- if (ret != EC_SUCCESS)
- return ret;
- /* Adjust offset by segment length */
- offset += length;
- /* For 1st iteration only, adjust to create stagger */
- if (n == 0)
- offset -= length / 2;
-
- }
- }
- return EC_SUCCESS;
+ return (const uint8_t *)memchr(data, '#', 256) - (const uint8_t *)data;
}
-static int test_write_full_multi(void)
+/*
+ * Helper function, depending on the argument value either writes variables
+ * into nvmem and verifies their presence, or deletes them and verifies that
+ * they indeed disappear.
+ */
+static int var_read_write_delete_helper(int do_write)
{
- int n;
- int ret;
+ size_t i;
+ uint16_t saved_total_var_space;
+ uint32_t coverage_map;
+
+ const struct {
+ uint8_t *key;
+ uint8_t *value;
+ } kv_pairs[] = {
+ /* Use # as the delimiter to allow \0 in keys/values. */
+ {"\0key\00#", "value of key2#"}, {"key1#", "value of key1#"},
+ {"key2#", "value of key2#"}, {"key3#", "value of\0 key3#"},
+ {"ke\04#", "value\0 of\0 key4#"},
+ };
+
+ coverage_map = 0;
+ saved_total_var_space = total_var_space;
/*
- * The purpose of this test is to completely fill each user buffer in
- * NvMem with random data a segment length at a time. The data written
- * to NvMem is saved in write_buffer[] and then can be used to check the
- * NvMem writes were successful by reading and then comparing each user
- * buffer.
+ * Read all vars, one at a time, verifying that they shows up in
+ * getvar results when appropriate but not before.
*/
- for (n = 0; n < NVMEM_NUM_USERS; n++) {
- ret = write_full_buffer(nvmem_user_sizes[n], n);
- if (ret != EC_SUCCESS)
- return ret;
+ for (i = 0; i <= ARRAY_SIZE(kv_pairs); i++) {
+ size_t j;
+ uint8_t key_len;
+ uint8_t val_len;
+ const void *value;
+
+ for (j = 0; j < ARRAY_SIZE(kv_pairs); j++) {
+ struct tuple *t;
+
+ coverage_map |= 1;
+
+ key_len = find_lb(kv_pairs[j].key);
+ t = getvar(kv_pairs[j].key, key_len);
+
+ if ((j >= i) ^ !do_write) {
+ TEST_ASSERT(t == NULL);
+ continue;
+ }
+
+ coverage_map |= 2;
+
+ TEST_ASSERT(saved_total_var_space == total_var_space);
+
+ /* Confirm that what we found is the right variable. */
+ val_len = find_lb(kv_pairs[j].value);
+
+ TEST_ASSERT(t->key_len == key_len);
+ TEST_ASSERT(t->val_len == val_len);
+ TEST_ASSERT(
+ !memcmp(kv_pairs[j].key, t->data_, key_len));
+ TEST_ASSERT(!memcmp(kv_pairs[j].value,
+ t->data_ + key_len, val_len));
+ freevar(t);
+ }
+
+ if (i == ARRAY_SIZE(kv_pairs)) {
+ coverage_map |= 4;
+ /* All four variables have been processed. */
+ break;
+ }
+
+ val_len = find_lb(kv_pairs[i].value);
+ key_len = find_lb(kv_pairs[i].key);
+ value = kv_pairs[i].value;
+ if (!do_write) {
+
+ coverage_map |= 8;
+
+ saved_total_var_space -= val_len + key_len;
+ /*
+ * Make sure all val_len == 0 and val == NULL
+ * combinations are exercised.
+ */
+ switch (i) {
+ case 0:
+ val_len = 0;
+ coverage_map |= 0x10;
+ break;
+
+ case 1:
+ coverage_map |= 0x20;
+ value = NULL;
+ break;
+ default:
+ coverage_map |= 0x40;
+ val_len = 0;
+ value = NULL;
+ break;
+ }
+ } else {
+ coverage_map |= 0x80;
+ saved_total_var_space += val_len + key_len;
+ }
+ key_len = find_lb(kv_pairs[i].key);
+ TEST_ASSERT(setvar(kv_pairs[i].key, key_len, value, val_len) ==
+ EC_SUCCESS);
+
+ TEST_ASSERT(saved_total_var_space == total_var_space);
}
+
+ if (do_write)
+ TEST_ASSERT(coverage_map == 0x87);
+ else
+ TEST_ASSERT(coverage_map == 0x7f);
+
return EC_SUCCESS;
}
-static int test_write_fail(void)
+static int test_var_read_write_delete(void)
{
- uint32_t offset = 0;
- uint32_t num_bytes = 0x200;
- int ret;
+ TEST_ASSERT(post_init_from_scratch(0xff) == EC_SUCCESS);
- /* Do write/read sequence that's expected to be successful */
- if (test_write_read(offset, num_bytes, NVMEM_USER_0))
- return EC_ERROR_UNKNOWN;
+ ccprintf("\n%s: starting write cycle\n", __func__);
+ TEST_ASSERT(var_read_write_delete_helper(1) == EC_SUCCESS);
- /* Prevent flash erase/write operations */
- flash_write_fail = 1;
- /* Attempt flash write */
- ret = test_write_read(offset, num_bytes, NVMEM_USER_0);
- /* Resume normal operation */
- flash_write_fail = 0;
+ ccprintf("%s: starting delete cycle\n", __func__);
+ TEST_ASSERT(var_read_write_delete_helper(0) == EC_SUCCESS);
+
+ return EC_SUCCESS;
+}
+/* Verify that nvmem_erase_user_data only erases the given user's data. */
+static int test_nvmem_erase_tpm_data(void)
+{
+ TEST_ASSERT(prepare_nvmem_contents() == EC_SUCCESS);
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+ browse_flash_contents(1);
+ TEST_ASSERT(nvmem_erase_tpm_data() == EC_SUCCESS);
+ browse_flash_contents(1);
+ TEST_ASSERT(iterate_over_flash() == EC_SUCCESS);
+ TEST_ASSERT(test_result.deleted_obj_count == 0);
+ TEST_ASSERT(test_result.var_count == 3);
+ TEST_ASSERT(test_result.reserved_obj_count == 0);
+ TEST_ASSERT(test_result.evictable_obj_count == 0);
+ TEST_ASSERT(test_result.unexpected_count == 0);
+ TEST_ASSERT(test_result.valid_data_size == 86);
+ TEST_ASSERT(test_result.erased_data_size == 0);
- /* This test is successful if write attempt failed */
- return !ret;
+ return EC_SUCCESS;
}
-static int test_buffer_overflow(void)
+static size_t fill_obj_offsets(uint16_t *offsets, size_t max_objects)
{
- int ret;
- int n;
+ size_t i;
+ size_t obj_count;
- /*
- * The purpose of this test is to check that NvMem writes behave
- * properly in relation to the defined length of each user buffer. A
- * write operation to completely fill the buffer is done first. This
- * should pass. Then the same buffer is written to with one extra byte
- * and this operation is expected to fail.
- */
+ obj_count = init_object_offsets(offsets, max_objects);
- /* Do test for each user buffer */
- for (n = 0; n < NVMEM_NUM_USERS; n++) {
- /* Write full buffer */
- ret = write_full_buffer(nvmem_user_sizes[n], n);
- if (ret != EC_SUCCESS)
- return ret;
- /* Attempt to write full buffer plus 1 extra byte */
- ret = write_full_buffer(nvmem_user_sizes[n] + 1, n);
- if (!ret)
- return EC_ERROR_UNKNOWN;
+ ccprintf("%d objects\n", obj_count);
+ for (i = 0; i < obj_count; i++) {
+ uint32_t *op;
+
+ op = evictable_offs_to_addr(offsets[i]);
+ ccprintf("offs %04x:%08x:%08x:%08x addr %p size %d\n",
+ offsets[i], op[-1], op[0], op[1], op,
+ (uintptr_t)nvmem_cache_base(NVMEM_TPM) + op[-1] -
+ (uintptr_t)op);
}
- /* Test case where user buffer number is valid */
- ret = test_write_read(0, 0x100, NVMEM_USER_0);
- if (ret != EC_SUCCESS)
- return ret;
- /* Attempt same write, but with invalid user number */
- ret = test_write_read(0, 0x100, NVMEM_NUM_USERS);
- if (!ret)
- return ret;
+ return obj_count;
+}
- return EC_SUCCESS;
+static size_t fill_cache_offsets(const void *cache, uint16_t *offsets,
+ size_t max_objects)
+{
+ uint8_t buf[nvmem_user_sizes[NVMEM_TPM]];
+ void *real_cache;
+ size_t num_offsets;
+
+ real_cache = nvmem_cache_base(NVMEM_TPM);
+ memcpy(buf, real_cache, sizeof(buf));
+
+ memcpy(real_cache, cache, sizeof(buf));
+ memset(offsets, 0, sizeof(*offsets) * max_objects);
+ num_offsets = fill_obj_offsets(offsets, max_objects);
+
+ /* Restore the real cache. */
+ memcpy(real_cache, buf, sizeof(buf));
+
+ return num_offsets;
}
+#define MAX_OFFSETS 20
-static int test_move(void)
+static uint32_t get_evict_size(const uint8_t *cache, uint16_t offset)
{
- uint32_t len = 0x100;
- uint32_t nv1_offset;
- uint32_t nv2_offset;
- int user = 0;
- int n;
- int ret;
+ uint32_t next_addr;
+ uint32_t cache_offset;
- /*
- * The purpose of this test is to check that nvmem_move() behaves
- * properly. This test only uses one user buffer as accessing multiple
- * user buffers is tested separately. This test uses writes a set of
- * test data then test move operations with full overlap, half overlap
- * and no overlap. Folliwng these tests, the boundary conditions for
- * move operations are checked for the giver user buffer.
- */
+ cache_offset = s_evictNvStart + offset;
+ memcpy(&next_addr, cache + cache_offset - sizeof(next_addr),
+ sizeof(next_addr));
+
+ return next_addr - cache_offset;
+}
+
+/* Returns zero if the two objects are identical. */
+static int compare_objects(const uint8_t *cache1, uint16_t offset1,
+ const uint8_t *cache2, uint16_t offset2)
+{
+ uint32_t size1;
+ uint32_t size2;
+
+ size1 = get_evict_size(cache1, offset1);
+ size2 = get_evict_size(cache2, offset2);
+
+ if (size1 == size2)
+ return memcmp(cache1 + s_evictNvStart + offset1,
+ cache2 + s_evictNvStart + offset2, size1);
+
+ return 1;
+}
+/*
+ * Compare two instances of NVMEM caches. Reserved spaces should be exactly
+ * the same for the match, but evictable objects could be rearranged due to
+ * compaction, updating, etc.
+ *
+ * For the two cache instances to be considered the same the sets and contents
+ * of the evictable object spaces must also match object to object.
+ */
+static int caches_match(const uint8_t *cache1, const uint8_t *cache2)
+{
+ int failed_count;
+ size_t cache1_offs_count;
+ size_t cache2_offs_count;
+ size_t i;
+ uint16_t cache1_offsets[MAX_OFFSETS];
+ uint16_t cache2_offsets[MAX_OFFSETS];
+
+ for (failed_count = i = 0; i < NV_PSEUDO_RESERVE_LAST; i++) {
+ NV_RESERVED_ITEM ri;
+ struct {
+ uint32_t offset;
+ uint32_t size;
+ } ranges[3];
+ size_t j;
+
+ NvGetReserved(i, &ri);
+
+ ranges[0].offset = ri.offset;
+
+ if (i != NV_STATE_CLEAR) {
+ ranges[0].size = ri.size;
+ ranges[1].size = 0;
+ } else {
+ ranges[0].size = offsetof(STATE_CLEAR_DATA, pcrSave);
+ ranges[1].offset = ranges[0].offset + ranges[0].size;
+ ranges[1].size = sizeof(PCR_SAVE);
+ ranges[2].offset = ranges[1].offset + ranges[1].size;
+ ranges[2].size = sizeof(PCR_AUTHVALUE);
+ }
+
+ for (j = 0; j < ARRAY_SIZE(ranges); j++) {
+
+ uint32_t offset;
+ uint32_t size;
+ uint32_t k;
+
+ size = ranges[j].size;
+ if (!size)
+ break;
+
+ offset = ranges[j].offset;
- nv1_offset = 0;
- for (n = 0; n < 3; n++) {
- /* Generate Test data */
- generate_random_data(nv1_offset, len);
- nv2_offset = nv1_offset + (len / 2) * n;
- /* Write data to Nvmem cache memory */
- nvmem_write(nv1_offset, len, &write_buffer[nv1_offset], user);
- nvmem_commit();
- /* Test move while data is in cache area */
- nvmem_move(nv1_offset, nv2_offset, len, user);
- nvmem_read(nv2_offset, len, read_buffer, user);
- if (memcmp(write_buffer, read_buffer, len))
- return EC_ERROR_UNKNOWN;
- ccprintf("Memmove nv1 = 0x%x, nv2 = 0x%x\n",
- nv1_offset, nv2_offset);
+ if (!memcmp(cache1 + offset, cache2 + offset, size))
+ continue;
+
+ ccprintf("%s:%d failed comparing %d:%d:\n", __func__,
+ __LINE__, i, j);
+ for (k = offset; k < (offset + size); k++)
+ if (cache1[k] != cache2[k])
+ ccprintf(" %3d:%02x", k - offset,
+ cache1[k]);
+ ccprintf("\n");
+ for (k = offset; k < (offset + size); k++)
+ if (cache1[k] != cache2[k])
+ ccprintf(" %3d:%02x", k - offset,
+ cache2[k]);
+ ccprintf("\n");
+
+ failed_count++;
+ }
}
- /* Test invalid buffer offsets */
- /* Destination offset is equal to length of buffer */
- nv1_offset = 0;
- nv2_offset = nvmem_user_sizes[user];
- /* Attempt to move just 1 byte */
- ret = nvmem_move(nv1_offset, nv2_offset, 1, user);
- if (!ret)
- return EC_ERROR_UNKNOWN;
-
- /* Source offset is equal to length of buffer */
- nv1_offset = nvmem_user_sizes[user];
- nv2_offset = 0;
- /* Attempt to move just 1 byte */
- ret = nvmem_move(nv1_offset, nv2_offset, 1, user);
- if (!ret)
- return EC_ERROR_UNKNOWN;
-
- nv1_offset = 0;
- nv2_offset = nvmem_user_sizes[user] - len;
- /* Move data chunk from start to end of buffer */
- ret = nvmem_move(nv1_offset, nv2_offset,
- len, user);
- if (ret)
- return ret;
-
- /* Attempt to move data chunk 1 byte beyond end of user buffer */
- nv1_offset = 0;
- nv2_offset = nvmem_user_sizes[user] - len + 1;
- ret = nvmem_move(nv1_offset, nv2_offset,
- len, user);
- if (!ret)
- return EC_ERROR_UNKNOWN;
- /* nvmem_move returned an error, need to clear internal error state */
- nvmem_commit();
+ TEST_ASSERT(!failed_count);
+
+ cache1_offs_count = fill_cache_offsets(cache1, cache1_offsets,
+ ARRAY_SIZE(cache1_offsets));
+ cache2_offs_count = fill_cache_offsets(cache2, cache2_offsets,
+ ARRAY_SIZE(cache2_offsets));
+
+ TEST_ASSERT(cache1_offs_count == cache2_offs_count);
+
+ for (i = 0; (i < ARRAY_SIZE(cache1_offsets)) && cache2_offs_count;
+ i++) {
+ size_t j;
+
+ for (j = 0; j < cache2_offs_count; j++) {
+ if (compare_objects(cache1, cache1_offsets[i], cache2,
+ cache2_offsets[j]))
+ continue;
+ /* Remove object from the cache2 offsets. */
+ cache2_offsets[j] = cache2_offsets[--cache2_offs_count];
+ break;
+ }
+ }
+
+ TEST_ASSERT(cache2_offs_count == 0);
return EC_SUCCESS;
}
-static int test_is_different(void)
+static int prepare_post_migration_nvmem(void)
{
- uint32_t len = 0x41;
- uint32_t nv1_offset = 0;
- int user = 1;
- int ret;
+ TEST_ASSERT(prepare_nvmem_contents() == EC_SUCCESS);
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+ TEST_ASSERT(new_nvmem_save() == EC_SUCCESS);
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+ return EC_SUCCESS;
+}
+/*
+ * This test creates various failure conditions related to interrupted nvmem
+ * save operations and verifies that transaction integrity is maintained -
+ * i.e. either all variables get updated,
+ */
+static int test_nvmem_incomplete_transaction(void)
+{
/*
- * The purpose of this test is to verify nv_is_different(). Test data is
- * written to a location in user buffer 1, then a case that's expected
- * to pass along with a case that is expected to fail are checked. Next
- * the same tests are repeated when the NvMem write is followed by a
- * commit operation.
+ * Will be more than enough, we can't store more than 15 objects or so
+ * anyways.
*/
+ uint16_t offsets[MAX_OFFSETS];
+ size_t num_objects;
+ uint8_t buf[nvmem_user_sizes[NVMEM_TPM]];
+
+ TEST_ASSERT(prepare_post_migration_nvmem() == EC_SUCCESS);
+ num_objects = fill_obj_offsets(offsets, ARRAY_SIZE(offsets));
+ TEST_ASSERT(num_objects == 9);
+
+ /* Save cache state before deleting objects. */
+ memcpy(buf, nvmem_cache_base(NVMEM_TPM), sizeof(buf));
+
+ drop_evictable_obj(evictable_offs_to_addr(offsets[4]));
+ drop_evictable_obj(evictable_offs_to_addr(offsets[3]));
+
+ failure_mode = TEST_FAIL_WHEN_SAVING;
+ TEST_ASSERT(new_nvmem_save() == EC_SUCCESS);
+ wipe_out_nvmem_cache();
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+
+ TEST_ASSERT(caches_match(buf, nvmem_cache_base(NVMEM_TPM)) ==
+ EC_SUCCESS);
+ drop_evictable_obj(evictable_offs_to_addr(offsets[4]));
+ drop_evictable_obj(evictable_offs_to_addr(offsets[3]));
+
+ /* Check if failure when invalidating is recovered after restart. */
+ failure_mode = TEST_FAIL_WHEN_INVALIDATING;
+ TEST_ASSERT(new_nvmem_save() == EC_SUCCESS);
+ ccprintf("%s:%d\n", __func__, __LINE__);
+ wipe_out_nvmem_cache();
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+ ccprintf("%s:%d\n", __func__, __LINE__);
+ num_objects = fill_obj_offsets(offsets, ARRAY_SIZE(offsets));
+ TEST_ASSERT(num_objects == 7);
- /* Generate test data */
- generate_random_data(nv1_offset, len);
- /* Write to NvMem cache buffer */
- nvmem_write(nv1_offset, len, &write_buffer[nv1_offset], user);
- /* Expected to be the same */
- ret = nvmem_is_different(nv1_offset, len,
- &write_buffer[nv1_offset], user);
- if (ret)
- return EC_ERROR_UNKNOWN;
-
- /* Expected to be different */
- ret = nvmem_is_different(nv1_offset + 1, len,
- &write_buffer[nv1_offset], user);
- if (!ret)
- return EC_ERROR_UNKNOWN;
-
- /* Commit cache buffer and retest */
- nvmem_commit();
- /* Expected to be the same */
- ret = nvmem_is_different(nv1_offset, len,
- &write_buffer[nv1_offset], user);
- if (ret)
- return EC_ERROR_UNKNOWN;
-
- /* Expected to be different */
- write_buffer[nv1_offset] ^= 0xff;
- ret = nvmem_is_different(nv1_offset, len,
- &write_buffer[nv1_offset], user);
- if (!ret)
- return EC_ERROR_UNKNOWN;
+ return EC_SUCCESS;
+}
+
+/*
+ * Verify that interrupted compaction results in a consistent state of the
+ * NVMEM cache.
+ */
+static int test_nvmem_interrupted_compaction(void)
+{
+ uint8_t buf[nvmem_user_sizes[NVMEM_TPM]];
+ uint8_t target_list_index;
+ uint8_t filler = 1;
+ TEST_ASSERT(prepare_post_migration_nvmem() == EC_SUCCESS);
+
+ /* Let's fill up a couple of pages with erased objects. */
+ target_list_index = master_at.list_index + 2;
+
+ do {
+ /*
+ * A few randomly picked reserved objects to modify to create
+ * need for compaction.
+ */
+ const uint8_t objs_to_modify[] = {1, 3, 19, 42};
+ size_t i;
+
+ for (i = 0; i < ARRAY_SIZE(objs_to_modify); i++) {
+ NV_RESERVED_ITEM ri;
+
+ NvGetReserved(i, &ri);
+
+ /* Direct access to the object. */
+ memset((uint8_t *)nvmem_cache_base(NVMEM_TPM) +
+ ri.offset,
+ filler++, ri.size);
+ }
+ TEST_ASSERT(new_nvmem_save() == EC_SUCCESS);
+ } while (master_at.list_index != target_list_index);
+
+ /* Save the state of NVMEM cache. */
+ memcpy(buf, nvmem_cache_base(NVMEM_TPM), sizeof(buf));
+ failure_mode = TEST_FAIL_WHEN_COMPACTING;
+ compact_nvmem();
+ wipe_out_nvmem_cache();
+ ccprintf("%s:%d\n", __func__, __LINE__);
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+ TEST_ASSERT(caches_match(buf, nvmem_cache_base(NVMEM_TPM)) ==
+ EC_SUCCESS);
return EC_SUCCESS;
}
int nvmem_first_task(void *unused)
{
- uint32_t offset = 0;
- uint32_t num_bytes = WRITE_SEGMENT_LEN;
- int user = NVMEM_USER_0;
-
- task_wait_event(0);
- /* Generate source data */
- generate_random_data(0, num_bytes);
- nvmem_write(0, num_bytes, &write_buffer[offset], user);
- /* Read from cache memory */
- nvmem_read(0, num_bytes, read_buffer, user);
- /* Verify that write to nvmem was successful */
- TEST_ASSERT_ARRAY_EQ(write_buffer, read_buffer, num_bytes);
- /* Wait here with mutex held by this task */
- task_wait_event(0);
- /* Write to flash which releases nvmem mutex */
- nvmem_commit();
- nvmem_read(0, num_bytes, read_buffer, user);
- /* Verify that write to flash was successful */
- TEST_ASSERT_ARRAY_EQ(write_buffer, read_buffer, num_bytes);
-
return EC_SUCCESS;
}
int nvmem_second_task(void *unused)
{
- uint32_t offset = WRITE_SEGMENT_LEN;
- uint32_t num_bytes = WRITE_SEGMENT_LEN;
- int user = NVMEM_USER_0;
-
- task_wait_event(0);
-
- /* Gen test data and don't overwite test data generated by 1st task */
- generate_random_data(offset, num_bytes);
- /* Write test data at offset 0 nvmem user buffer */
- nvmem_write(0, num_bytes, &write_buffer[offset], user);
- /* Write to flash */
- nvmem_commit();
- /* Read from nvmem */
- nvmem_read(0, num_bytes, read_buffer, user);
- /* Verify that write to nvmem was successful */
- TEST_ASSERT_ARRAY_EQ(&write_buffer[offset], read_buffer, num_bytes);
- /* Clear flag to indicate lock test is complete */
- lock_test_started = 0;
-
return EC_SUCCESS;
}
-static int test_lock(void)
+static void run_test_setup(void)
{
- /*
- * This purpose of this test is to verify the mutex lock portion of the
- * nvmem module. There are two additional tasks utilized. The first task
- * is woken and it creates some test data and does an
- * nvmem_write(). This will cause the mutex to be locked by the 1st
- * task. The 1st task then waits and control is returned to this
- * function and the 2nd task is woken, the 2nd task also attempts to
- * write data to nvmem. The 2nd task should stall waiting for the mutex
- * to be unlocked.
- *
- * When control returns to this function, the 1st task is woken again
- * and the nvmem operation is completed. This will allow the 2nd task to
- * grab the lock and finish its nvmem operation. The test will not
- * complete until the 2nd task finishes the nvmem write. A static global
- * flag is used to let this function know when the 2nd task is complete.
- *
- * Both tasks write to the same location in nvmem so the test will only
- * pass if the 2nd task can't write until the nvmem write in the 1st
- * task is completed.
- */
+ /* Allow Flash erase/writes */
+ flash_write_fail = 0;
+ test_reset();
+}
- /* Set flag for start of test */
- lock_test_started = 1;
- /* Wake first_task */
- task_wake(TASK_ID_NV_1);
- task_wait_event(1000);
- /* Wake second_task. It should stall waiting for mutex */
- task_wake(TASK_ID_NV_2);
- task_wait_event(1000);
- /* Go back to first_task so it can complete its nvmem operation */
- task_wake(TASK_ID_NV_1);
- /* Wait for 2nd task to complete nvmem operation */
- while (lock_test_started)
- task_wait_event(100);
+void nvmem_wipe_cache(void)
+{
+}
- return EC_SUCCESS;
+int DCRYPTO_ladder_is_enabled(void)
+{
+ return 1;
}
-static int test_nvmem_save(void)
+static int test_migration(void)
{
/*
- * The purpose of this test is to verify that if the written value
- * did not change the cache contents there is no actual write
- * happening at the commit time.
+ * This purpose of this test is to verify migration of the 'legacy'
+ * TPM NVMEM format to the new scheme where each element is stored in
+ * flash in its own container.
*/
- int dummy_value;
- int offset = 0x10;
- uint8_t generation_a;
- uint8_t generation_b;
- uint8_t prev_generation;
- uint8_t new_generation;
- const struct nvmem_tag *part_a;
- const struct nvmem_tag *part_b;
- const struct nvmem_tag *new_gen_part;
- const struct nvmem_tag *prev_gen_part;
-
- part_a = (const struct nvmem_tag *)CONFIG_FLASH_NVMEM_BASE_A;
- part_b = (const struct nvmem_tag *)CONFIG_FLASH_NVMEM_BASE_B;
+ TEST_ASSERT(prepare_nvmem_contents() == EC_SUCCESS);
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+ TEST_ASSERT(iterate_over_flash() == EC_SUCCESS);
+ TEST_ASSERT(test_result.var_count == 3);
+ TEST_ASSERT(test_result.reserved_obj_count == 40);
+ TEST_ASSERT(test_result.evictable_obj_count == 9);
+ TEST_ASSERT(test_result.delimiter_count == 1);
+ TEST_ASSERT(test_result.deleted_obj_count == 0);
+ TEST_ASSERT(test_result.unexpected_count == 0);
+ TEST_ASSERT(test_result.valid_data_size == 5214);
+ TEST_ASSERT(total_var_space == 77);
+ /* Container pointer not yet set. */
+ TEST_ASSERT(!master_at.ct.data_offset && !master_at.ct.ph);
+ return EC_SUCCESS;
+}
+
+/*
+ * The purpose of this test is to verify variable storage limits, both per
+ * object and total.
+ */
+static int test_var_boundaries(void)
+{
+ const size_t max_size = 255; /* Key and value must fit in a byte. */
+ const uint8_t *key;
+ const uint8_t *val;
+ size_t key_len;
+ size_t val_len;
+ uint16_t saved_total_var_space;
+ uint32_t coverage_map;
+ uint8_t var_key[10];
+
+ TEST_ASSERT(prepare_new_flash() == EC_SUCCESS);
+ saved_total_var_space = total_var_space;
+ coverage_map = 0;
+
/*
- * Make sure nvmem is initialized and both partitions have been
- * written.
+ * Let's use the legacy NVMEM image as a source of fairly random but
+ * reproducible data.
*/
- nvmem_init();
+ key = legacy_nvmem_image;
+ val = legacy_nvmem_image;
/*
- * Make sure something is changed at offset 0x10 into the second user
- * space.
+ * Test limit of max variable body space, use keys and values of
+ * different sizes, below and above the limit.
*/
- nvmem_read(offset, sizeof(dummy_value), &dummy_value, NVMEM_USER_1);
- dummy_value ^= ~0;
- nvmem_write(0x10, sizeof(dummy_value), &dummy_value, NVMEM_USER_1);
- nvmem_commit();
+ for (key_len = 1; key_len < max_size; key_len += 20) {
+
+ coverage_map |= 1;
+
+ val_len = MIN(max_size, MAX_VAR_BODY_SPACE - key_len);
+ TEST_ASSERT(setvar(key, key_len, val, val_len) == EC_SUCCESS);
+ TEST_ASSERT(total_var_space ==
+ saved_total_var_space + key_len + val_len);
- /* Verify that the two generation values are different. */
- generation_a = part_a->generation;
- generation_b = part_b->generation;
- TEST_ASSERT(generation_a != generation_b);
+ /* Now drop the variable from the storage. */
+ TEST_ASSERT(setvar(key, key_len, NULL, 0) == EC_SUCCESS);
+ TEST_ASSERT(total_var_space == saved_total_var_space);
+
+ /* And if key length allows it, try to write too much. */
+ if (val_len == max_size)
+ continue;
+
+ coverage_map |= 2;
+ /*
+ * Yes, let's try writing one byte too many and see that the
+ * attempt is rejected.
+ */
+ val_len++;
+ TEST_ASSERT(setvar(key, key_len, val, val_len) ==
+ EC_ERROR_INVAL);
+ TEST_ASSERT(total_var_space == saved_total_var_space);
+ }
/*
- * Figure out which one should change next, we are close to the
- * beginnig of the test, no wrap is expected.
+ * Test limit of max total variable space, use keys and values of
+ * different sizes, below and above the limit.
*/
- if (generation_a > generation_b) {
- prev_generation = generation_a;
- new_generation = generation_a + 1;
- new_gen_part = part_b;
- prev_gen_part = part_a;
- } else {
- prev_generation = generation_b;
- new_generation = generation_b + 1;
- new_gen_part = part_a;
- prev_gen_part = part_b;
+ key_len = sizeof(var_key);
+ val_len = 20; /* Anything below 256 would work. */
+ memset(var_key, 'x', key_len);
+
+ while (1) {
+ int rv;
+
+ /*
+ * Change the key so that a new variable is added to the
+ * storage.
+ */
+ rv = setvar(var_key, key_len, val, val_len);
+
+ if (rv == EC_ERROR_OVERFLOW)
+ break;
+
+ coverage_map |= 4;
+ TEST_ASSERT(rv == EC_SUCCESS);
+ var_key[0]++;
+ saved_total_var_space += key_len + val_len;
}
- /* Write a new value, this should trigger generation switch. */
- dummy_value += 1;
- TEST_ASSERT(nvmem_write(0x10, sizeof(dummy_value),
- &dummy_value, NVMEM_USER_1) == EC_SUCCESS);
- TEST_ASSERT(nvmem_commit() == EC_SUCCESS);
+ TEST_ASSERT(saved_total_var_space == total_var_space);
+ TEST_ASSERT(saved_total_var_space <= MAX_VAR_TOTAL_SPACE);
+ TEST_ASSERT((saved_total_var_space + key_len + val_len) >
+ MAX_VAR_TOTAL_SPACE);
- TEST_ASSERT(prev_gen_part->generation == prev_generation);
- TEST_ASSERT(new_gen_part->generation == new_generation);
+ TEST_ASSERT(coverage_map == 7);
+ return EC_SUCCESS;
+}
- /* Write the same value, this should NOT trigger generation switch. */
- TEST_ASSERT(nvmem_write(0x10, sizeof(dummy_value),
- &dummy_value, NVMEM_USER_1) == EC_SUCCESS);
- TEST_ASSERT(nvmem_commit() == EC_SUCCESS);
+static int verify_ram_index_space(size_t verify_size)
+{
+ NV_RESERVED_ITEM ri;
+ size_t i;
+ uint32_t casted_size;
+ uint8_t byte;
+ uint8_t fill_byte = 0x55;
+
+ if (verify_size > RAM_INDEX_SPACE)
+ return EC_ERROR_INVAL;
+
+ NvGetReserved(NV_RAM_INDEX_SPACE, &ri);
+
+ /*
+ * Save the size of the index space, needed on machines where size_t
+ * is a 64 bit value.
+ */
+ casted_size = verify_size;
+
+ /*
+ * Now write index space in the cache, we write the complete space,
+ * but on read back only verify_size bytes are expected to be set.
+ */
+ nvmem_write(ri.offset, sizeof(casted_size), &casted_size, NVMEM_TPM);
+
+ for (i = 0; i < RAM_INDEX_SPACE; i++)
+ nvmem_write(ri.offset + sizeof(casted_size) + i,
+ sizeof(fill_byte), &fill_byte, NVMEM_TPM);
- TEST_ASSERT(prev_gen_part->generation == prev_generation);
- TEST_ASSERT(new_gen_part->generation == new_generation);
+ TEST_ASSERT(new_nvmem_save() == EC_SUCCESS);
+ wipe_out_nvmem_cache();
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+
+ /* Make sure read back size matches. */
+ nvmem_read(ri.offset, sizeof(casted_size), &casted_size, NVMEM_TPM);
+ TEST_ASSERT(casted_size == verify_size);
+
+ /*
+ * Now check spaces which were supposed to be written (up to
+ * verify_size) and left intact.
+ */
+ for (i = 0; i < RAM_INDEX_SPACE; i++) {
+ nvmem_read(ri.offset + sizeof(casted_size) + i, sizeof(byte),
+ &byte, NVMEM_TPM);
+ if (i < verify_size)
+ TEST_ASSERT(byte == fill_byte);
+ else
+ TEST_ASSERT(byte == 0);
+ }
return EC_SUCCESS;
}
-static void run_test_setup(void)
+static int test_tpm_nvmem_modify_reserved_objects(void)
{
- /* Allow Flash erase/writes */
- flash_write_fail = 0;
- test_reset();
+ NV_RESERVED_ITEM ri;
+ /* Some random reserved objects' indices. */
+ const uint8_t res_obj_ids[] = {1, 4, 9, 20};
+ size_t i;
+ static uint8_t cache_copy[12 * 1024];
+ struct nvmem_test_result old_result;
+ uint64_t new_values[ARRAY_SIZE(res_obj_ids)];
+ size_t erased_size;
+
+ TEST_ASSERT(sizeof(cache_copy) >= nvmem_user_sizes[NVMEM_TPM]);
+ TEST_ASSERT(prepare_new_flash() == EC_SUCCESS);
+ TEST_ASSERT(new_nvmem_save() == EC_SUCCESS);
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+ iterate_over_flash();
+ old_result = test_result;
+
+ /* Preserve NVMEM cache for future comparison. */
+ memcpy(cache_copy, nvmem_cache_base(NVMEM_TPM),
+ nvmem_user_sizes[NVMEM_TPM]);
+
+ erased_size = 0;
+ /* Modify several reserved objects in the cache. */
+ for (i = 0; i < ARRAY_SIZE(res_obj_ids); i++) {
+ size_t copy_size;
+ uint8_t *addr_in_cache;
+ size_t k;
+
+ NvGetReserved(res_obj_ids[i], &ri);
+ copy_size = MIN(sizeof(new_values[0]), ri.size);
+ addr_in_cache =
+ (uint8_t *)nvmem_cache_base(NVMEM_TPM) + ri.offset;
+
+ /* Prepare a new value for the variable. */
+ memcpy(new_values + i, addr_in_cache, copy_size);
+ for (k = 0; k < copy_size; k++)
+ ((uint8_t *)(new_values + i))[k] ^= 0x55;
+
+ /* Update value in the cache. */
+ memcpy(addr_in_cache, new_values + i, copy_size);
+
+ /* And in the cache copy. */
+ memcpy(cache_copy + ri.offset, new_values + i, copy_size);
+
+ /*
+ * This much will be added to the erased space, object size
+ * plus index size.
+ */
+ erased_size += ri.size + 1;
+ }
+
+ /* Save it into flash. */
+ TEST_ASSERT(new_nvmem_save() == EC_SUCCESS);
+
+ /* Wipe out the cache to be sure. */
+ wipe_out_nvmem_cache();
+
+ /* Read NVMEM contents from flash. */
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+
+ /* Verify that the cache matches expectations. */
+ TEST_ASSERT(!memcmp(cache_copy, nvmem_cache_base(NVMEM_TPM),
+ nvmem_user_sizes[NVMEM_TPM]));
+
+ iterate_over_flash();
+
+ /* Update previous results with our expectations. */
+ old_result.deleted_obj_count += ARRAY_SIZE(res_obj_ids);
+ old_result.erased_data_size += erased_size;
+ old_result.delimiter_count++;
+
+ TEST_ASSERT(!memcmp(&test_result, &old_result, sizeof(test_result)));
+
+ /* Verify several index space cases. */
+ for (i = 0; i <= RAM_INDEX_SPACE; i += (RAM_INDEX_SPACE / 2))
+ TEST_ASSERT(verify_ram_index_space(i) == EC_SUCCESS);
+
+ return EC_SUCCESS;
}
-void nvmem_wipe_cache(void)
+static int compare_object(uint16_t obj_offset, size_t obj_size, const void *obj)
{
+ uint32_t next_addr;
+
+ memcpy(&next_addr,
+ evictable_offs_to_addr(obj_offset - sizeof(next_addr)),
+ sizeof(next_addr));
+
+ ccprintf("next_addr %x, sum %x size %d\n", next_addr,
+ (s_evictNvStart + obj_offset + obj_size), obj_size);
+ TEST_ASSERT(next_addr == (s_evictNvStart + obj_offset + obj_size));
+
+ if (!memcmp(evictable_offs_to_addr(obj_offset), obj, obj_size))
+ return EC_SUCCESS;
+
+ return EC_ERROR_INVAL;
}
-int DCRYPTO_ladder_is_enabled(void)
+static int test_tpm_nvmem_modify_evictable_objects(void)
{
- return 1;
+ size_t num_objects;
+ uint16_t offsets[MAX_OFFSETS];
+ uint32_t handles[ARRAY_SIZE(offsets)];
+ uint32_t new_evictable_object[30];
+ size_t i;
+ const uint32_t new_obj_handle = 0x100;
+ static uint8_t modified_obj[CONFIG_FLASH_BANK_SIZE];
+ size_t modified_obj_size;
+ uint32_t modified_obj_handle;
+ uint32_t deleted_obj_handle;
+ uint8_t *obj_cache_addr;
+ size_t num_handles;
+ int new_obj_index;
+ int modified_obj_index;
+
+ TEST_ASSERT(prepare_new_flash() == EC_SUCCESS);
+ TEST_ASSERT(new_nvmem_save() == EC_SUCCESS);
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+ iterate_over_flash();
+
+ /* Verify that all evictable objects are there. */
+ num_objects = fill_obj_offsets(offsets, ARRAY_SIZE(offsets));
+ TEST_ASSERT(num_objects == 9);
+ num_handles = num_objects;
+
+ /* Save handles of all objects there are. */
+ for (i = 0; i < num_objects; i++) {
+ memcpy(handles + i, evictable_offs_to_addr(offsets[i]),
+ sizeof(handles[i]));
+ ccprintf("obj %d handle %08x\n", i, handles[i]);
+ }
+ /*
+ * Let's modify the object which currently is stored second in the
+ * stack.
+ */
+ modified_obj_size = offsets[3] - offsets[2] - sizeof(uint32_t);
+
+ /* Modify the object and copy modified value into local buffer. */
+ obj_cache_addr = evictable_offs_to_addr(offsets[2]);
+ memcpy(&modified_obj_handle, obj_cache_addr,
+ sizeof(modified_obj_handle));
+
+ for (i = 0; i < modified_obj_size; i++) {
+ uint8_t c;
+
+ c = obj_cache_addr[i];
+
+ if (i >= sizeof(uint32_t)) { /* Preserve the 4 byte handle. */
+ c ^= 0x55;
+ obj_cache_addr[i] = c;
+ }
+ modified_obj[i] = c;
+ }
+
+ /* Save its handle and then drop the object at offset 5. */
+ memcpy(&deleted_obj_handle, evictable_offs_to_addr(offsets[5]),
+ sizeof(deleted_obj_handle));
+ drop_evictable_obj(evictable_offs_to_addr(offsets[5]));
+
+ /* Prepare the new evictable object, first four bytes are the handle. */
+ for (i = 0; i < ARRAY_SIZE(new_evictable_object); i++)
+ new_evictable_object[i] = new_obj_handle + i;
+
+ /* Add it to the cache. */
+ add_evictable_obj(new_evictable_object, sizeof(new_evictable_object));
+
+ /* Save the new cache state in the flash. */
+ TEST_ASSERT(new_nvmem_save() == EC_SUCCESS);
+
+ /* Wipe out NVMEM cache just in case. */
+ wipe_out_nvmem_cache();
+
+ /* Read back from flash into cache. */
+ TEST_ASSERT(nvmem_init() == EC_SUCCESS);
+
+ /* One object removed, one added, the number should have not changed. */
+ TEST_ASSERT(num_objects ==
+ fill_obj_offsets(offsets, ARRAY_SIZE(offsets)));
+
+ new_obj_index = 0;
+ modified_obj_index = 0;
+ for (i = 0; i < num_objects; i++) {
+ uint32_t handle;
+ size_t j;
+
+ memcpy(&handle, evictable_offs_to_addr(offsets[i]),
+ sizeof(handles[i]));
+ ASSERT(handle != deleted_obj_handle);
+
+ if (handle == new_obj_handle)
+ new_obj_index = i;
+ else if (handle == modified_obj_handle)
+ modified_obj_index = i;
+ /*
+ * Remove the found handle from the set of handles which were
+ * there originally.
+ */
+ for (j = 0; j < num_handles; j++)
+ if (handles[j] == handle) {
+ num_handles--;
+ handles[j] = handles[num_handles];
+ break;
+ }
+ }
+
+ /*
+ * Removed object's handle is still in the array, and it should be the
+ * only remaining element.
+ */
+ TEST_ASSERT(num_handles == 1);
+ TEST_ASSERT(handles[0] == deleted_obj_handle);
+ TEST_ASSERT(new_obj_index >= 0); /* New handle was seen in the cache. */
+ TEST_ASSERT(modified_obj_index >=
+ 0); /* Modified object was seen in the cache. */
+
+ TEST_ASSERT(compare_object(offsets[new_obj_index],
+ sizeof(new_evictable_object),
+ new_evictable_object) == EC_SUCCESS);
+ TEST_ASSERT(compare_object(offsets[modified_obj_index],
+ modified_obj_size,
+ modified_obj) == EC_SUCCESS);
+ return EC_SUCCESS;
}
void run_test(void)
{
run_test_setup();
+
+ if (0) {
+ RUN_TEST(test_nvmem_incomplete_transaction);
+ test_print_result();
+ return;
+ }
+ RUN_TEST(test_migration);
RUN_TEST(test_corrupt_nvmem);
RUN_TEST(test_fully_erased_nvmem);
RUN_TEST(test_configured_nvmem);
- RUN_TEST(test_write_read_sequence);
- RUN_TEST(test_write_full_multi);
- RUN_TEST(test_write_fail);
- RUN_TEST(test_buffer_overflow);
- RUN_TEST(test_move);
- RUN_TEST(test_is_different);
- RUN_TEST(test_lock);
- RUN_TEST(test_nvmem_erase_user_data);
RUN_TEST(test_nvmem_save);
+ RUN_TEST(test_var_read_write_delete);
+ RUN_TEST(test_nvmem_compaction);
+ RUN_TEST(test_var_boundaries);
+ RUN_TEST(test_nvmem_erase_tpm_data);
+ RUN_TEST(test_tpm_nvmem_modify_reserved_objects);
+ RUN_TEST(test_tpm_nvmem_modify_evictable_objects);
+ RUN_TEST(test_nvmem_incomplete_transaction);
+ failure_mode = TEST_NO_FAILURE; /* In case the above test failed. */
+ RUN_TEST(test_nvmem_interrupted_compaction);
+ failure_mode = TEST_NO_FAILURE; /* In case the above test failed. */
+
+ /*
+ * more tests to come
+ * RUN_TEST(test_lock);
+ * RUN_TEST(test_malloc_blocking);
+ */
+
test_print_result();
}
diff --git a/test/nvmem_test.h b/test/nvmem_test.h
new file mode 100644
index 0000000000..f8f166dc5e
--- /dev/null
+++ b/test/nvmem_test.h
@@ -0,0 +1,28 @@
+/* Copyright 2019 The Chromium OS Authors. All rights reserved.
+ * Use of this source code is governed by a BSD-style license that can be
+ * found in the LICENSE file.
+ */
+
+#ifndef __EC_TEST_NVMEM_TEST_H
+#define __EC_TEST_NVMEM_TEST_H
+
+#define EMBEDDED_MODE 1
+#define NV_C
+#include "Global.h"
+#undef NV_C
+#include "NV_fp.h"
+#include "tpm_generated.h"
+
+enum test_failure_mode {
+ TEST_NO_FAILURE,
+ TEST_FAIL_WHEN_SAVING,
+ TEST_FAIL_WHEN_INVALIDATING,
+ TEST_FAIL_WHEN_COMPACTING
+};
+
+extern enum test_failure_mode failure_mode;
+
+size_t add_evictable_obj(void *obj, size_t obj_size);
+void drop_evictable_obj(void *obj);
+
+#endif /* ! __EC_TEST_NVMEM_TEST_H */
diff --git a/test/nvmem_tpm2_mock.c b/test/nvmem_tpm2_mock.c
new file mode 100644
index 0000000000..070525406d
--- /dev/null
+++ b/test/nvmem_tpm2_mock.c
@@ -0,0 +1,377 @@
+/* Copyright 2019 The Chromium OS Authors. All rights reserved.
+ * Use of this source code is governed by a BSD-style license that can be
+ * found in the LICENSE file.
+ */
+/* Stuff from tpm2 directory. */
+
+#include "nvmem_test.h"
+
+#include "console.h"
+#include "nvmem.h"
+#include "util.h"
+
+#define NVMEM_CR50_SIZE 272
+
+uint32_t s_evictNvStart;
+uint32_t s_evictNvEnd;
+
+/* Calculate size of TPM NVMEM. */
+#define MOCK_NV_MEMORY_SIZE \
+ (NVMEM_PARTITION_SIZE - sizeof(struct nvmem_tag) - NVMEM_CR50_SIZE)
+
+uint32_t nvmem_user_sizes[NVMEM_NUM_USERS] = {MOCK_NV_MEMORY_SIZE,
+ NVMEM_CR50_SIZE};
+
+/*
+ * Sizes of the reserved objects stored in the TPM NVMEM. Note that the second
+ * last object is in fact a variable size field starting with 4 bytes of size
+ * and then up to 512 bytes of actual index data. The array below assumes that
+ * the full 512 bytes of the index space are used.
+ */
+const uint16_t res_sizes[] = {4, 2, 2, 2, 66, 66, 66, 66, 66, 66,
+ 34, 34, 34, 66, 66, 66, 8, 4, 134, 28,
+ 3, 4, 4, 4, 4, 4, 2, 15, 2, 8,
+ 4, 4, 4, 96, 2844, 424, 516, 8};
+
+static uint16_t res_addrs[ARRAY_SIZE(res_sizes)];
+
+BOOL NvEarlyStageFindHandle(TPM_HANDLE handle)
+{
+ size_t i;
+
+ res_addrs[0] = 0;
+
+ for (i = 1; i < ARRAY_SIZE(res_addrs); i++)
+ res_addrs[i] = res_addrs[i - 1] + res_sizes[i - 1];
+
+ s_evictNvStart = res_addrs[i - 1] + res_sizes[i - 1];
+
+ s_evictNvEnd = MOCK_NV_MEMORY_SIZE;
+ return 0;
+}
+
+void NvGetReserved(UINT32 index, NV_RESERVED_ITEM *ri)
+{
+ uint32_t index_size;
+
+ if (index >= ARRAY_SIZE(res_sizes)) {
+ ri->size = 0;
+ return;
+ }
+
+ ri->offset = res_addrs[index];
+ if (index != NV_RAM_INDEX_SPACE) {
+ ri->size = res_sizes[index];
+ return;
+ }
+
+ memcpy(&index_size, nvmem_cache_base(NVMEM_TPM) + ri->offset,
+ sizeof(index_size));
+
+ if (index_size == ~0)
+ /* Must be starting with empty flash memeory. */
+ index_size = 0;
+
+ ri->size = index_size + sizeof(index_size);
+}
+
+UINT16 UINT16_Marshal(UINT16 *source, BYTE **buffer, INT32 *size)
+{
+ uint16_t value;
+
+ if (!size || (*size < sizeof(value)))
+ return 0;
+
+ value = htobe16(*source);
+
+ memcpy(*buffer, &value, sizeof(value));
+ *buffer += sizeof(value);
+ *size -= sizeof(value);
+
+ return sizeof(value);
+}
+
+UINT16 UINT32_Marshal(UINT32 *source, BYTE **buffer, INT32 *size)
+{
+ uint32_t value;
+
+ if (!size || (*size < sizeof(value)))
+ return 0;
+
+ value = htobe32(*source);
+
+ memcpy(*buffer, &value, sizeof(value));
+ *buffer += sizeof(value);
+ *size -= sizeof(value);
+
+ return sizeof(value);
+}
+
+UINT16 UINT64_Marshal(UINT64 *source, BYTE **buffer, INT32 *size)
+{
+ uint64_t value;
+
+ if (!size || (*size < sizeof(value)))
+ return 0;
+
+ value = htobe64(*source);
+
+ memcpy(*buffer, &value, sizeof(value));
+ *buffer += sizeof(value);
+ *size -= sizeof(value);
+
+ return sizeof(value);
+}
+
+UINT16 TPM2B_DIGEST_Marshal(TPM2B_DIGEST *source, BYTE **buffer, INT32 *size)
+{
+ UINT16 total_size;
+ INT32 i;
+ uint8_t *p;
+
+ total_size = UINT16_Marshal(&source->t.size, buffer, size);
+ p = *buffer;
+
+ for (i = 0; (i < source->t.size) && *size; ++i) {
+ *p++ = source->t.buffer[i];
+ *size -= 1;
+ }
+
+ total_size += i;
+ *buffer = p;
+
+ return total_size;
+}
+
+uint16_t TPM2B_AUTH_Marshal(TPM2B_AUTH *source, BYTE **buffer, INT32 *size)
+{
+ return TPM2B_DIGEST_Marshal(source, buffer, size);
+}
+
+uint16_t TPM2B_NONCE_Marshal(TPM2B_AUTH *source, BYTE **buffer, INT32 *size)
+{
+ return TPM2B_DIGEST_Marshal(source, buffer, size);
+}
+
+TPM_RC UINT16_Unmarshal(UINT16 *target, BYTE **buffer, INT32 *size)
+{
+ uint16_t value;
+
+ if (!size || *size < sizeof(value))
+ return TPM_RC_INSUFFICIENT;
+
+ memcpy(&value, *buffer, sizeof(value));
+ *target = be16toh(value);
+
+ *buffer += sizeof(value);
+ *size -= sizeof(value);
+
+ return TPM_RC_SUCCESS;
+}
+
+TPM_RC UINT32_Unmarshal(UINT32 *target, BYTE **buffer, INT32 *size)
+{
+ uint32_t value;
+
+ if (!size || *size < sizeof(value))
+ return TPM_RC_INSUFFICIENT;
+
+ memcpy(&value, *buffer, sizeof(value));
+ *target = be32toh(value);
+
+ *buffer += sizeof(value);
+ *size -= sizeof(value);
+
+ return TPM_RC_SUCCESS;
+}
+
+TPM_RC UINT64_Unmarshal(UINT64 *target, BYTE **buffer, INT32 *size)
+{
+ uint64_t value;
+
+ if (!size || *size < sizeof(value))
+ return TPM_RC_INSUFFICIENT;
+
+ memcpy(&value, *buffer, sizeof(value));
+ *target = be64toh(value);
+
+ *buffer += sizeof(value);
+ *size -= sizeof(value);
+
+ return TPM_RC_SUCCESS;
+}
+
+TPM_RC TPM2B_DIGEST_Unmarshal(TPM2B_DIGEST *target, BYTE **buffer, INT32 *size)
+{
+ TPM_RC result;
+ INT32 i;
+ uint8_t *p;
+
+ result = UINT16_Unmarshal(&target->t.size, buffer, size);
+
+ if (result != TPM_RC_SUCCESS)
+ return result;
+
+ if (target->t.size == 0)
+ return TPM_RC_SUCCESS;
+
+ if ((target->t.size > sizeof(TPMU_HA)) || (target->t.size > *size))
+ return TPM_RC_SIZE;
+
+ p = *buffer;
+ for (i = 0; i < target->t.size; ++i)
+ target->t.buffer[i] = *p++;
+
+ *buffer = p;
+ *size -= i;
+
+ return TPM_RC_SUCCESS;
+}
+
+TPM_RC TPM2B_AUTH_Unmarshal(TPM2B_AUTH *target, BYTE **buffer, INT32 *size)
+{
+ return TPM2B_DIGEST_Unmarshal(target, buffer, size);
+}
+
+TPM_RC TPM2B_NONCE_Unmarshal(TPM2B_AUTH *target, BYTE **buffer, INT32 *size)
+{
+ return TPM2B_DIGEST_Unmarshal(target, buffer, size);
+}
+
+#define ITER_INIT (~0)
+
+static void *get_cache_addr(size_t offset)
+{
+ return (void *)(((uintptr_t)nvmem_cache_base(NVMEM_TPM)) + offset);
+}
+
+static void read_from_cache(size_t offset, size_t size, void *dest)
+{
+ nvmem_read(offset, size, dest, NVMEM_TPM);
+}
+
+static void write_to_cache(size_t offset, size_t size, void *src)
+{
+ nvmem_write(offset, size, src, NVMEM_TPM);
+}
+
+/* Copies of the appropriate functions from NV.c in TPM2 library. */
+static uint32_t nv_next(uint32_t *iter)
+{
+ uint32_t currentIter;
+
+ if (*iter == ITER_INIT)
+ *iter = s_evictNvStart;
+
+ if ((*iter + sizeof(uint32_t) > s_evictNvEnd) || !*iter)
+ return 0;
+
+ currentIter = *iter;
+ read_from_cache(*iter, sizeof(uint32_t), iter);
+ if (!*iter || (*iter == ITER_INIT))
+ return 0;
+
+ return currentIter + sizeof(uint32_t);
+}
+
+static uint32_t nv_get_end(void)
+{
+ uint32_t iter = ITER_INIT;
+ uint32_t endAddr = s_evictNvStart;
+ uint32_t currentAddr;
+
+ while ((currentAddr = nv_next(&iter)) != 0)
+ endAddr = currentAddr;
+
+ if (endAddr != s_evictNvStart) {
+ /* Read offset. */
+ endAddr -= sizeof(uint32_t);
+ read_from_cache(endAddr, sizeof(uint32_t), &endAddr);
+ }
+ return endAddr;
+}
+
+size_t add_evictable_obj(void *obj, size_t obj_size)
+{
+ uint32_t end_addr;
+ uint32_t next_addr;
+ uint32_t list_end = 0;
+
+ end_addr = nv_get_end();
+
+ next_addr = end_addr + sizeof(uint32_t) + obj_size;
+
+ if (next_addr >= s_evictNvEnd) {
+ ccprintf("%s: could not fit %d bytes!\n", __func__, obj_size);
+ return 0;
+ }
+
+ /* Write next pointer */
+ write_to_cache(end_addr, sizeof(uint32_t), &next_addr);
+ /* Write entity data. */
+ write_to_cache(end_addr + sizeof(uint32_t), obj_size, obj);
+
+ /* Write the end of list if it fits. */
+ if (next_addr + sizeof(uint32_t) <= s_evictNvEnd)
+ write_to_cache(next_addr, sizeof(list_end), &list_end);
+
+ return obj_size;
+}
+
+/*
+ * It is the responsibility of the caller to pass the proper address of an
+ * object in the cache.
+ */
+void drop_evictable_obj(void *obj)
+{
+ uint32_t next_addr;
+ uint32_t list_end = 0;
+ uint32_t obj_addr;
+
+ obj_addr = (uintptr_t)obj - (uintptr_t)nvmem_cache_base(NVMEM_TPM);
+ read_from_cache(obj_addr - sizeof(next_addr), sizeof(next_addr),
+ &next_addr);
+ ccprintf("%s:%d dropping obj at cache addr %x, offset %x, addr %p next "
+ "addr %x aka %x (off s_evictNvStart)\n",
+ __func__, __LINE__, obj_addr - s_evictNvStart, obj_addr, obj,
+ next_addr, next_addr - s_evictNvStart);
+
+ /*
+ * Now, to make it easier to add objects behind the current one, let's
+ * pretend there is no more objects.
+ */
+ write_to_cache(obj_addr - sizeof(next_addr), sizeof(list_end),
+ &list_end);
+
+ if (!next_addr || (next_addr == s_evictNvEnd))
+ return;
+
+ /*
+ * Iterate over objects starting with next_addr, copying them into
+ * obj_addr.
+ */
+ obj_addr = next_addr;
+ while (1) {
+ uint32_t next_next_addr;
+ uint32_t next_obj_size;
+
+ read_from_cache(next_addr, sizeof(next_next_addr),
+ &next_next_addr);
+
+ if (!next_next_addr || (next_next_addr == s_evictNvEnd))
+ return;
+
+ next_obj_size = next_next_addr - obj_addr - sizeof(uint32_t);
+ add_evictable_obj(
+ (void *)((uintptr_t)nvmem_cache_base(NVMEM_TPM) +
+ next_addr + sizeof(uint32_t)),
+ next_obj_size);
+ next_addr = next_next_addr;
+ obj_addr += next_obj_size + sizeof(next_obj_size);
+ }
+}
+
+void *evictable_offs_to_addr(uint16_t offset)
+{
+ return (void *)((uintptr_t)get_cache_addr(s_evictNvStart) + offset);
+}
diff --git a/test/nvmem_vars.c b/test/nvmem_vars.c
deleted file mode 100644
index 99e059215e..0000000000
--- a/test/nvmem_vars.c
+++ /dev/null
@@ -1,538 +0,0 @@
-/* Copyright 2016 The Chromium OS Authors. All rights reserved.
- * Use of this source code is governed by a BSD-style license that can be
- * found in the LICENSE file.
- *
- * Test of the key=val variable implementation (set, get, delete, etc).
- */
-
-#include "common.h"
-#include "compile_time_macros.h"
-#include "nvmem.h"
-#include "nvmem_vars.h"
-#include "printf.h"
-#include "shared_mem.h"
-#include "test_util.h"
-
-/* Declare the user regions (see test_config.h) */
-uint32_t nvmem_user_sizes[] = {
- CONFIG_FLASH_NVMEM_VARS_USER_SIZE,
-};
-BUILD_ASSERT(ARRAY_SIZE(nvmem_user_sizes) == NVMEM_NUM_USERS);
-
-/****************************************************************************/
-/* Mock the flash storage */
-
-static uint8_t ram_buffer[CONFIG_FLASH_NVMEM_VARS_USER_SIZE];
-static uint8_t flash_buffer[CONFIG_FLASH_NVMEM_VARS_USER_SIZE];
-
-extern char *rbuf;
-
-/* Internal functions exported for test */
-void release_local_copy(void)
-{
- rbuf = NULL;
-}
-
-int get_local_copy(void)
-{
- if (!rbuf) {
- memcpy(ram_buffer, flash_buffer, sizeof(ram_buffer));
- rbuf = (char *)ram_buffer;
- }
- return EC_SUCCESS;
-}
-
-int nvmem_read(uint32_t startOffset, uint32_t size,
- void *data_, enum nvmem_users user)
-{
- /* Our mocks make some assumptions */
- if (startOffset != 0 ||
- size > CONFIG_FLASH_NVMEM_VARS_USER_SIZE ||
- user != CONFIG_FLASH_NVMEM_VARS_USER_NUM)
- return EC_ERROR_UNIMPLEMENTED;
-
- if (!data_)
- return EC_ERROR_INVAL;
-
- memcpy(data_, flash_buffer, size);
-
- return EC_SUCCESS;
-}
-
-int nvmem_write(uint32_t startOffset, uint32_t size,
- void *data_, enum nvmem_users user)
-{
- /* Our mocks make some assumptions */
- if (startOffset != 0 ||
- size > CONFIG_FLASH_NVMEM_VARS_USER_SIZE ||
- user != CONFIG_FLASH_NVMEM_VARS_USER_NUM)
- return EC_ERROR_UNIMPLEMENTED;
-
- if (!data_)
- return EC_ERROR_INVAL;
-
- memcpy(ram_buffer, data_, size);
-
- return EC_SUCCESS;
-}
-
-int nvmem_commit(void)
-{
- memcpy(flash_buffer, ram_buffer, CONFIG_FLASH_NVMEM_VARS_USER_SIZE);
- return EC_SUCCESS;
-}
-
-int nvmem_erase_user_data(enum nvmem_users user)
-{
- memset(ram_buffer, 0xff, sizeof(ram_buffer));
- memset(flash_buffer, 0xff, sizeof(flash_buffer));
- return EC_SUCCESS;
-}
-
-/****************************************************************************/
-/* Helper routines */
-
-static void erase_flash(void)
-{
- /* Invalidate the RAM cache */
- release_local_copy();
-
- /* Zero flash */
- memset(flash_buffer, 0xff, sizeof(flash_buffer));
-}
-
-/* Erase flash, then copy data_ over it */
-static void load_flash(const uint8_t *data_, size_t data_len)
-{
- erase_flash();
- memcpy(flash_buffer, data_, data_len);
-}
-
-/* Return true if flash matches data_, and is followed by 0xff to the end */
-static int verify_flash(const uint8_t *data_, size_t data_len)
-{
- size_t i;
-
- /* mismatch means false */
- if (memcmp(flash_buffer, data_, data_len))
- return 0;
-
- for (i = data_len;
- i < CONFIG_FLASH_NVMEM_VARS_USER_SIZE - data_len;
- i++)
- if (flash_buffer[i] != 0xff)
- return 0;
- return 1;
-}
-
-/*
- * Treating both as strings, save the <key, value> pair.
- */
-int str_setvar(const char *key, const char *val)
-{
- /* Only for tests, so assume the length will fit */
- uint8_t key_len, val_len;
-
- key_len = strlen(key);
- val_len = val ? strlen(val) : 0;
-
- return setvar(key, key_len, val, val_len);
-}
-
-/*
- * Treating both as strings, lookup the key and compare the result with the
- * expected value. Return true if they match.
- */
-static int str_matches(const char *key, const char *expected_val)
-{
- const struct tuple *t = getvar(key, strlen(key));
- uint8_t expected_len;
-
- if (!expected_val && !t)
- return 1;
-
- if (expected_val && !t)
- return 0;
-
- if (!expected_val && t)
- return 0;
-
- expected_len = strlen(expected_val);
- return !memcmp(tuple_val(t), expected_val, expected_len);
-}
-
-/****************************************************************************/
-/* Tests */
-
-static int check_init(void)
-{
- /* Valid entries */
- const uint8_t good[] = { 0x01, 0x01, 0x00, 'A', 'a',
- 0x01, 0x01, 0x00, 'B', 'b',
- 0x00 };
-
- /* Empty variables are 0x00, followed by all 0xff */
- const uint8_t empty[] = { 0x00 };
-
- /*
- * This is parsed as though there's only one variable, but it's wrong
- * because the rest of the storage isn't 0xff.
- */
- const uint8_t bad_key[] = { 0x01, 0x01, 0x00, 'A', 'a',
- 0x00, 0x01, 0x00, 'B', 'b',
- 0x00 };
-
- /* Zero-length variables are not allowed */
- const uint8_t bad_val[] = { 0x01, 0x01, 0x00, 'A', 'a',
- 0x01, 0x00, 0x00, 'B', 'b',
- 0x00 };
-
- /* The next constants use magic numbers based on on the region size */
- BUILD_ASSERT(CONFIG_FLASH_NVMEM_VARS_USER_SIZE == 600);
-
- /* This is one byte too large */
- const uint8_t too_big[] = { [0] = 0xff, [1] = 0xff, /* 0 - 512 */
- [513] = 0x01, [514] = 0x53, /* 513 - 599 */
- [599] = 0x00 };
-
- /* This should just barely fit */
- const uint8_t just_right[] = { [0] = 0xff, [1] = 0xff, /* 0-512 */
- [513] = 0x01, [514] = 0x52, /* 513-598 */
- [599] = 0x00 };
-
- /* No end marker */
- const uint8_t not_right[] = { [0] = 0xff, [1] = 0xff, /* 0-512 */
- [513] = 0x01, [514] = 0x52, /* 513-598 */
- [599] = 0xff };
-
- load_flash(good, sizeof(good));
- TEST_ASSERT(initvars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(good, sizeof(good)));
-
- load_flash(empty, sizeof(empty));
- TEST_ASSERT(initvars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(empty, sizeof(empty)));
-
- /* All 0xff quickly runs off the end of the storage */
- erase_flash();
- TEST_ASSERT(initvars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(empty, sizeof(empty)));
-
- load_flash(bad_key, sizeof(bad_key));
- TEST_ASSERT(initvars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(empty, sizeof(empty)));
-
- load_flash(bad_val, sizeof(bad_val));
- TEST_ASSERT(initvars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(empty, sizeof(empty)));
-
- load_flash(too_big, sizeof(too_big));
- TEST_ASSERT(initvars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(empty, sizeof(empty)));
-
- load_flash(just_right, sizeof(just_right));
- TEST_ASSERT(initvars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(just_right, sizeof(just_right)));
-
- load_flash(not_right, sizeof(not_right));
- TEST_ASSERT(initvars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(empty, sizeof(empty)));
-
- return EC_SUCCESS;
-}
-
-static int simple_search(void)
-{
- const uint8_t preload[] = {
- 0x02, 0x02, 0x00, 'h', 'o', 'y', 'o',
- 0x02, 0x4, 0x00, 'y', 'o', 'h', 'o', 'y', 'o',
- 0x02, 0x06, 0x00, 'm', 'o', 'y', 'o', 'h', 'o', 'y', 'o',
- 0x00 };
-
- load_flash(preload, sizeof(preload));
- TEST_ASSERT(initvars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(preload, sizeof(preload)));
-
- TEST_ASSERT(str_matches("no", 0));
- TEST_ASSERT(str_matches("ho", "yo"));
- TEST_ASSERT(str_matches("yo", "hoyo"));
- TEST_ASSERT(str_matches("mo", "yohoyo"));
-
- return EC_SUCCESS;
-}
-
-static int simple_write(void)
-{
- const uint8_t after_one[] = {
- 0x02, 0x02, 0x00, 'h', 'o', 'y', 'o',
- 0x00 };
-
- const uint8_t after_two[] = {
- 0x02, 0x02, 0x00, 'h', 'o', 'y', 'o',
- 0x02, 0x4, 0x00, 'y', 'o', 'h', 'o', 'y', 'o',
- 0x00 };
-
- const uint8_t after_three[] = {
- 0x02, 0x02, 0x00, 'h', 'o', 'y', 'o',
- 0x02, 0x4, 0x00, 'y', 'o', 'h', 'o', 'y', 'o',
- 0x02, 0x06, 0x00, 'm', 'o', 'y', 'o', 'h', 'o', 'y', 'o',
- 0x00 };
-
- erase_flash();
- TEST_ASSERT(initvars() == EC_SUCCESS);
-
- TEST_ASSERT(setvar("ho", 2, "yo", 2) == EC_SUCCESS);
- TEST_ASSERT(writevars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(after_one, sizeof(after_one)));
-
- TEST_ASSERT(setvar("yo", 2, "hoyo", 4) == EC_SUCCESS);
- TEST_ASSERT(writevars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(after_two, sizeof(after_two)));
-
- TEST_ASSERT(setvar("mo", 2, "yohoyo", 6) == EC_SUCCESS);
- TEST_ASSERT(writevars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(after_three, sizeof(after_three)));
-
- return EC_SUCCESS;
-}
-
-static int simple_delete(void)
-{
- const char start_with[] = {
- 0x01, 0x05, 0x00, 'A', 'a', 'a', 'a', 'a', 'a',
- 0x02, 0x03, 0x00, 'B', 'B', 'b', 'b', 'b',
- 0x03, 0x06, 0x00, 'C', 'C', 'C', 'x', 'y', 'z', 'p', 'd', 'q',
- 0x01, 0x03, 0x00, 'M', 'm', '0', 'm',
- 0x04, 0x01, 0x00, 'N', 'N', 'N', 'N', 'n',
- 0x00 };
-
- const char after_one[] = {
- 0x02, 0x03, 0x00, 'B', 'B', 'b', 'b', 'b',
- 0x03, 0x06, 0x00, 'C', 'C', 'C', 'x', 'y', 'z', 'p', 'd', 'q',
- 0x01, 0x03, 0x00, 'M', 'm', '0', 'm',
- 0x04, 0x01, 0x00, 'N', 'N', 'N', 'N', 'n',
- 0x00 };
-
- const char after_two[] = {
- 0x02, 0x03, 0x00, 'B', 'B', 'b', 'b', 'b',
- 0x03, 0x06, 0x00, 'C', 'C', 'C', 'x', 'y', 'z', 'p', 'd', 'q',
- 0x01, 0x03, 0x00, 'M', 'm', '0', 'm',
- 0x00 };
-
- const char after_three[] = {
- 0x02, 0x03, 0x00, 'B', 'B', 'b', 'b', 'b',
- 0x01, 0x03, 0x00, 'M', 'm', '0', 'm',
- 0x00 };
-
- const char empty[] = { 0x00 };
-
- erase_flash();
- TEST_ASSERT(initvars() == EC_SUCCESS);
-
- TEST_ASSERT(setvar("A", 1, "aaaaa", 5) == EC_SUCCESS);
- TEST_ASSERT(setvar("BB", 2, "bbb", 3) == EC_SUCCESS);
- TEST_ASSERT(setvar("CCC", 3, "xyzpdq", 6) == EC_SUCCESS);
- TEST_ASSERT(setvar("M", 1, "m0m", 3) == EC_SUCCESS);
- TEST_ASSERT(setvar("NNNN", 4, "n", 1) == EC_SUCCESS);
- TEST_ASSERT(writevars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(start_with, sizeof(start_with)));
-
- /* Zap first variable by setting var_len to 0 */
- TEST_ASSERT(setvar("A", 1, "yohoyo", 0) == EC_SUCCESS);
- TEST_ASSERT(writevars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(after_one, sizeof(after_one)));
-
- /* Zap last variable by passing null pointer */
- TEST_ASSERT(setvar("NNNN", 4, 0, 3) == EC_SUCCESS);
- TEST_ASSERT(writevars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(after_two, sizeof(after_two)));
-
- /* Ensure that zapping nonexistant variable does nothing */
- TEST_ASSERT(setvar("XXX", 3, 0, 0) == EC_SUCCESS);
- TEST_ASSERT(writevars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(after_two, sizeof(after_two)));
-
- /* Zap variable in the middle */
- TEST_ASSERT(setvar("CCC", 3, 0, 0) == EC_SUCCESS);
- TEST_ASSERT(writevars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(after_three, sizeof(after_three)));
-
- /* Zap the rest */
- TEST_ASSERT(setvar("BB", 2, 0, 0) == EC_SUCCESS);
- TEST_ASSERT(setvar("M", 1, 0, 0) == EC_SUCCESS);
- TEST_ASSERT(writevars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(empty, sizeof(empty)));
-
- /* Zapping a nonexistant variable still does nothing */
- TEST_ASSERT(setvar("XXX", 3, 0, 0) == EC_SUCCESS);
- TEST_ASSERT(writevars() == EC_SUCCESS);
- TEST_ASSERT(verify_flash(empty, sizeof(empty)));
-
- return EC_SUCCESS;
-}
-
-static int complex_write(void)
-{
- erase_flash();
- TEST_ASSERT(initvars() == EC_SUCCESS);
-
- /* Do a bunch of writes and erases */
- str_setvar("ho", "aa");
- str_setvar("zo", "nn");
- str_setvar("yo", "CCCCCCCC");
- str_setvar("zooo", "yyyyyyy");
- str_setvar("yo", "AA");
- str_setvar("ho", 0);
- str_setvar("yi", "BBB");
- str_setvar("yi", "AA");
- str_setvar("hixx", 0);
- str_setvar("yo", "BBB");
- str_setvar("zo", "");
- str_setvar("hi", "bbb");
- str_setvar("ho", "cccccc");
- str_setvar("yo", "");
- str_setvar("zo", "ggggg");
-
- /* What do we expect to find? */
- TEST_ASSERT(str_matches("hi", "bbb"));
- TEST_ASSERT(str_matches("hixx", 0));
- TEST_ASSERT(str_matches("ho", "cccccc"));
- TEST_ASSERT(str_matches("yi", "AA"));
- TEST_ASSERT(str_matches("yo", 0));
- TEST_ASSERT(str_matches("zo", "ggggg"));
- TEST_ASSERT(str_matches("zooo", "yyyyyyy"));
-
- return EC_SUCCESS;
-}
-
-static int weird_keys(void)
-{
- uint8_t keyA[255];
- uint8_t keyB[255];
- const char *valA = "this is A";
- const char *valB = "THIS IS b";
- int i;
- const struct tuple *t;
-
- erase_flash();
- TEST_ASSERT(initvars() == EC_SUCCESS);
-
- for (i = 0; i < 255; i++) {
- keyA[i] = i;
- keyB[i] = 255 - i;
- }
-
- TEST_ASSERT(setvar(keyA, sizeof(keyA),
- valA, strlen(valA)) == EC_SUCCESS);
-
- TEST_ASSERT(setvar(keyB, sizeof(keyB),
- valB, strlen(valB)) == EC_SUCCESS);
-
- TEST_ASSERT(writevars() == EC_SUCCESS);
-
- t = getvar(keyA, sizeof(keyA));
- TEST_ASSERT(t);
- TEST_ASSERT(t->val_len == strlen(valA));
- TEST_ASSERT(memcmp(tuple_val(t), valA, strlen(valA)) == 0);
-
- t = getvar(keyB, sizeof(keyB));
- TEST_ASSERT(t);
- TEST_ASSERT(t->val_len == strlen(valB));
- TEST_ASSERT(memcmp(tuple_val(t), valB, strlen(valB)) == 0);
-
- return EC_SUCCESS;
-}
-
-static int weird_values(void)
-{
- const char *keyA = "this is A";
- const char *keyB = "THIS IS b";
- char valA[255];
- char valB[255];
- int i;
- const struct tuple *t;
-
- erase_flash();
- TEST_ASSERT(initvars() == EC_SUCCESS);
-
- for (i = 0; i < 255; i++) {
- valA[i] = i;
- valB[i] = 255 - i;
- }
-
- TEST_ASSERT(setvar(keyA, strlen(keyA),
- valA, sizeof(valA)) == EC_SUCCESS);
- TEST_ASSERT(str_setvar("c", "CcC") == EC_SUCCESS);
- TEST_ASSERT(setvar(keyB, strlen(keyB),
- valB, sizeof(valB)) == EC_SUCCESS);
- TEST_ASSERT(str_setvar("d", "dDd") == EC_SUCCESS);
-
- TEST_ASSERT(writevars() == EC_SUCCESS);
-
- t = getvar(keyA, strlen(keyA));
- TEST_ASSERT(t);
- TEST_ASSERT(memcmp(tuple_val(t), valA, sizeof(valA)) == 0);
-
- t = getvar(keyB, strlen(keyB));
- TEST_ASSERT(t);
- TEST_ASSERT(memcmp(tuple_val(t), valB, sizeof(valB)) == 0);
-
- TEST_ASSERT(str_matches("c", "CcC"));
- TEST_ASSERT(str_matches("d", "dDd"));
-
- return EC_SUCCESS;
-}
-
-static int fill_it_up(void)
-{
- int i, n;
- char key[20];
-
- erase_flash();
- TEST_ASSERT(initvars() == EC_SUCCESS);
-
- /*
- * Some magic numbers here, because we want to use up 10 bytes at a
- * time and end up with exactly 9 free bytes left.
- */
- TEST_ASSERT(CONFIG_FLASH_NVMEM_VARS_USER_SIZE % 10 == 0);
- n = CONFIG_FLASH_NVMEM_VARS_USER_SIZE / 10;
- TEST_ASSERT(n < 1000);
-
- /* Fill up the storage */
- for (i = 0; i < n - 1; i++) {
- /* 3-byte header, 5-char key, 2-char val, == 10 chars */
- snprintf(key, sizeof(key), "kk%03d", i);
- TEST_ASSERT(setvar(key, 5, "aa", 2) == EC_SUCCESS);
- }
-
- /*
- * Should be nine bytes left in rbuf (because we need one more '\0' at
- * the end). This won't fit.
- */
- TEST_ASSERT(setvar("kk999", 5, "aa", 2) == EC_ERROR_OVERFLOW);
- /* But this will. */
- TEST_ASSERT(setvar("kk999", 5, "a", 1) == EC_SUCCESS);
- /* And this, because it replaces a previous entry */
- TEST_ASSERT(setvar("kk000", 5, "bc", 2) == EC_SUCCESS);
- /* But this still won't fit */
- TEST_ASSERT(setvar("kk999", 5, "de", 2) == EC_ERROR_OVERFLOW);
-
- return EC_SUCCESS;
-}
-
-void run_test(void)
-{
- test_reset();
-
- RUN_TEST(check_init);
- RUN_TEST(simple_write);
- RUN_TEST(simple_search);
- RUN_TEST(simple_delete);
- RUN_TEST(complex_write);
- RUN_TEST(weird_keys);
- RUN_TEST(weird_values);
- RUN_TEST(fill_it_up);
-
- test_print_result();
-}
diff --git a/test/nvmem_vars.tasklist b/test/nvmem_vars.tasklist
deleted file mode 100644
index cc500f5e8f..0000000000
--- a/test/nvmem_vars.tasklist
+++ /dev/null
@@ -1,17 +0,0 @@
-/* Copyright 2016 The Chromium OS Authors. All rights reserved.
- * Use of this source code is governed by a BSD-style license that can be
- * found in the LICENSE file.
- */
-
-/**
- * List of enabled tasks in the priority order
- *
- * The first one has the lowest priority.
- *
- * For each task, use the macro TASK_TEST(n, r, d, s) where :
- * 'n' in the name of the task
- * 'r' in the main routine of the task
- * 'd' in an opaque parameter passed to the routine at startup
- * 's' is the stack size in bytes; must be a multiple of 8
- */
-#define CONFIG_TEST_TASK_LIST /* No test task */
diff --git a/test/pinweaver.c b/test/pinweaver.c
index 71f8f0387d..079fbe2b88 100644
--- a/test/pinweaver.c
+++ b/test/pinweaver.c
@@ -16,6 +16,8 @@
#include "test_util.h"
+#include <stdlib.h>
+
struct pw_test_data_t {
union {
struct pw_request_t request;
@@ -152,13 +154,10 @@ const uint8_t DEFAULT_PCR_DIGEST[] = {
/* Config Variables and defines for Mocks.
*/
-struct tuple MOCK_pw_tuple;
struct pw_long_term_storage_t MOCK_pw_long_term_storage;
struct pw_log_storage_t MOCK_pw_log_storage;
int MOCK_getvar_ret = EC_SUCCESS;
int MOCK_setvar_ret = EC_SUCCESS;
-int MOCK_writevars_ret = EC_SUCCESS;
-void *MOCK_tuple_val_ret;
const uint8_t *MOCK_rand_bytes_src;
size_t MOCK_rand_bytes_offset;
@@ -342,7 +341,6 @@ static void setup_storage(int num_operations)
{
MOCK_getvar_ret = EC_SUCCESS;
MOCK_setvar_ret = EC_SUCCESS;
- MOCK_writevars_ret = EC_SUCCESS;
memset(&MOCK_pw_long_term_storage, 0,
sizeof(MOCK_pw_long_term_storage));
@@ -470,7 +468,6 @@ static void setup_reset_tree_defaults(struct merkle_tree_t *merkle_tree,
MOCK_rand_bytes_len = sizeof(EMPTY_TREE.key_derivation_nonce);
MOCK_appkey_derive_fail = EC_SUCCESS;
MOCK_setvar_ret = EC_SUCCESS;
- MOCK_writevars_ret = EC_SUCCESS;
}
static void setup_insert_leaf_defaults(struct merkle_tree_t *merkle_tree,
@@ -513,7 +510,6 @@ static void setup_insert_leaf_defaults(struct merkle_tree_t *merkle_tree,
MOCK_hmac = DEFAULT_HMAC;
MOCK_aes_fail = 0;
MOCK_setvar_ret = EC_SUCCESS;
- MOCK_writevars_ret = EC_SUCCESS;
}
static void setup_remove_leaf_defaults(struct merkle_tree_t *merkle_tree,
@@ -540,7 +536,6 @@ static void setup_remove_leaf_defaults(struct merkle_tree_t *merkle_tree,
setup_default_empty_path(request->data.remove_leaf.path_hashes);
MOCK_setvar_ret = EC_SUCCESS;
- MOCK_writevars_ret = EC_SUCCESS;
}
static void setup_try_auth_defaults_with_leaf(
@@ -598,7 +593,6 @@ static void setup_try_auth_defaults_with_leaf(
MOCK_hash_update_cb = auth_hash_update_cb;
MOCK_aes_fail = 0;
MOCK_setvar_ret = EC_SUCCESS;
- MOCK_writevars_ret = EC_SUCCESS;
}
static void setup_try_auth_defaults(struct merkle_tree_t *merkle_tree,
@@ -645,7 +639,6 @@ static void setup_reset_auth_defaults(struct merkle_tree_t *merkle_tree,
MOCK_hmac = EMPTY_HMAC; /* Gets overwritten by auth_hash_update_cb. */
MOCK_aes_fail = 0;
MOCK_setvar_ret = EC_SUCCESS;
- MOCK_writevars_ret = EC_SUCCESS;
}
static void setup_get_log_defaults(struct merkle_tree_t *merkle_tree,
@@ -800,35 +793,57 @@ uint8_t get_current_pcr_digest(const uint8_t bitmask[2],
/******************************************************************************/
/* Mock implementations of nvmem_vars functionality.
*/
-const struct tuple *getvar(const uint8_t *key, uint8_t key_len)
+struct tuple *getvar(const uint8_t *key, uint8_t key_len)
{
+ struct tuple *var = NULL;
+ size_t i;
+
+ const struct {
+ size_t key_len;
+ const void *key;
+ size_t val_size;
+ const void *val;
+ } vars[] = {
+ {sizeof(PW_TREE_VAR) - 1, PW_TREE_VAR,
+ sizeof(MOCK_pw_long_term_storage), &MOCK_pw_long_term_storage},
+ {sizeof(PW_LOG_VAR0) - 1, PW_LOG_VAR0,
+ sizeof(MOCK_pw_log_storage), &MOCK_pw_log_storage},
+ };
+
+ if (!key || !key_len)
+ return NULL;
+
if (MOCK_getvar_ret != EC_SUCCESS)
return NULL;
- MOCK_pw_tuple.flags = 0;
- MOCK_pw_tuple.key_len = key_len;
+ for (i = 0; i < ARRAY_SIZE(vars); i++) {
+ if ((key_len != vars[i].key_len) ||
+ memcmp(key, vars[i].key, key_len)) {
+ continue;
+ }
+ var = malloc(sizeof(struct tuple) + key_len + vars[i].val_size);
+ var->flags = 0;
+ var->val_len = vars[i].val_size;
+ memcpy(var->data_ + var->key_len, vars[i].val, var->val_len);
+ break;
+ }
- if (key_len == (sizeof(PW_TREE_VAR) - 1) &&
- memcmp(key, PW_TREE_VAR, (sizeof(PW_TREE_VAR) - 1)) == 0) {
- MOCK_pw_tuple.val_len = sizeof(MOCK_pw_long_term_storage);
- MOCK_tuple_val_ret = &MOCK_pw_long_term_storage;
- return &MOCK_pw_tuple;
- } else if (key_len == (sizeof(PW_LOG_VAR0) - 1) &&
- memcmp(key, PW_LOG_VAR0, (sizeof(PW_LOG_VAR0) - 1)) == 0) {
- MOCK_pw_tuple.val_len = sizeof(struct pw_log_storage_t);
- MOCK_tuple_val_ret = &MOCK_pw_log_storage;
- return &MOCK_pw_tuple;
- } else
- return NULL;
+ return var;
}
+int freevar(struct tuple *var)
+{
+ free(var);
+
+ return EC_SUCCESS;
+}
const uint8_t *tuple_val(const struct tuple *tpl)
{
- return MOCK_tuple_val_ret;
+ return tpl->data_ + tpl->key_len;
}
-int setvar(const uint8_t *key, uint8_t key_len,
- const uint8_t *val, uint8_t val_len)
+int setvar(const uint8_t *key, uint8_t key_len, const uint8_t *val,
+ uint8_t val_len)
{
if (MOCK_setvar_ret != EC_SUCCESS)
return MOCK_setvar_ret;
@@ -847,11 +862,6 @@ int setvar(const uint8_t *key, uint8_t key_len,
return EC_ERROR_UNKNOWN;
}
-int writevars(void)
-{
- return MOCK_writevars_ret;
-}
-
/******************************************************************************/
/* Mock implementations of TRNG functionality.
*/
@@ -1214,7 +1224,7 @@ static int handle_reset_tree_nv_fail(void)
setup_reset_tree_defaults(&merkle_tree, &buf.request);
- MOCK_writevars_ret = PW_ERR_NV_LENGTH_MISMATCH;
+ MOCK_setvar_ret = PW_ERR_NV_LENGTH_MISMATCH;
TEST_RET_EQ(test_handle_short_msg(&merkle_tree, &buf, merkle_tree.root),
PW_ERR_NV_LENGTH_MISMATCH);
@@ -1364,7 +1374,7 @@ static int handle_insert_leaf_nv_fail(void)
setup_insert_leaf_defaults(&merkle_tree, &buf.request);
- MOCK_writevars_ret = PW_ERR_NV_LENGTH_MISMATCH;
+ MOCK_setvar_ret = PW_ERR_NV_LENGTH_MISMATCH;
TEST_RET_EQ(test_handle_short_msg(&merkle_tree, &buf, merkle_tree.root),
PW_ERR_NV_LENGTH_MISMATCH);
@@ -1535,7 +1545,7 @@ static int handle_remove_leaf_nv_fail(void)
setup_remove_leaf_defaults(&merkle_tree, &buf.request);
- MOCK_writevars_ret = PW_ERR_NV_LENGTH_MISMATCH;
+ MOCK_setvar_ret = PW_ERR_NV_LENGTH_MISMATCH;
TEST_RET_EQ(test_handle_short_msg(&merkle_tree, &buf, merkle_tree.root),
PW_ERR_NV_LENGTH_MISMATCH);
@@ -1789,7 +1799,7 @@ static int handle_try_auth_nv_fail(void)
force_restart_count(0);
force_time((timestamp_t){.val = 65 * SECOND});
- MOCK_writevars_ret = PW_ERR_NV_LENGTH_MISMATCH;
+ MOCK_setvar_ret = PW_ERR_NV_LENGTH_MISMATCH;
TEST_RET_EQ(test_handle_short_msg(&merkle_tree, &buf, merkle_tree.root),
PW_ERR_NV_LENGTH_MISMATCH);
@@ -2136,7 +2146,7 @@ static int handle_reset_auth_nv_fail(void)
setup_reset_auth_defaults(&merkle_tree, &buf.request);
- MOCK_writevars_ret = PW_ERR_NV_LENGTH_MISMATCH;
+ MOCK_setvar_ret = PW_ERR_NV_LENGTH_MISMATCH;
TEST_RET_EQ(test_handle_short_msg(&merkle_tree, &buf, merkle_tree.root),
PW_ERR_NV_LENGTH_MISMATCH);
diff --git a/test/test_config.h b/test/test_config.h
index 22f497bcc0..17e7d6f44d 100644
--- a/test/test_config.h
+++ b/test/test_config.h
@@ -257,53 +257,37 @@ int ncp15wb_calculate_temp(uint16_t adc);
#define CONFIG_USB_PD_PORT_COUNT 2
#endif
-#ifdef TEST_NVMEM
+#if defined(TEST_NVMEM) || defined(TEST_NVMEM_VARS)
+#define CONFIG_CRC8
+#define CONFIG_FLASH_ERASED_VALUE32 (-1U)
+#define CONFIG_FLASH_LOG
+#define CONFIG_FLASH_LOG_BASE CONFIG_PROGRAM_MEMORY_BASE
+#define CONFIG_FLASH_LOG_SPACE 0x800
#define CONFIG_FLASH_NVMEM
-#define CONFIG_FLASH_NVMEM_OFFSET_A 0x1000
-#define CONFIG_FLASH_NVMEM_OFFSET_B 0x4000
-#define CONFIG_FLASH_NVMEM_BASE_A (CONFIG_PROGRAM_MEMORY_BASE + \
- CONFIG_FLASH_NVMEM_OFFSET_A)
-#define CONFIG_FLASH_NVMEM_BASE_B (CONFIG_PROGRAM_MEMORY_BASE + \
- CONFIG_FLASH_NVMEM_OFFSET_B)
-#define CONFIG_FLASH_NVMEM_SIZE 0x4000
+#define CONFIG_FLASH_NVMEM_OFFSET_A 0x3d000
+#define CONFIG_FLASH_NVMEM_OFFSET_B 0x7d000
+#define CONFIG_FLASH_NVMEM_BASE_A \
+ (CONFIG_PROGRAM_MEMORY_BASE + CONFIG_FLASH_NVMEM_OFFSET_A)
+#define CONFIG_FLASH_NVMEM_BASE_B \
+ (CONFIG_PROGRAM_MEMORY_BASE + CONFIG_FLASH_NVMEM_OFFSET_B)
+#define CONFIG_FLASH_NEW_NVMEM_BASE_A (CONFIG_FLASH_NVMEM_BASE_A + 0x800)
+#define CONFIG_FLASH_NEW_NVMEM_BASE_B (CONFIG_FLASH_NVMEM_BASE_B + 0x800)
+#define CONFIG_MALLOC
+/* This is legacy NVMEM partition size. */
+#define NVMEM_PARTITION_SIZE 0x3000
+#define NEW_FLASH_HALF_NVMEM_SIZE \
+ (NVMEM_PARTITION_SIZE - CONFIG_FLASH_BANK_SIZE)
+#define NEW_NVMEM_PARTITION_SIZE (NVMEM_PARTITION_SIZE - CONFIG_FLASH_BANK_SIZE)
+#define NEW_NVMEM_TOTAL_PAGES \
+ (2 * NEW_NVMEM_PARTITION_SIZE / CONFIG_FLASH_BANK_SIZE)
#define CONFIG_SW_CRC
-
-#define NVMEM_PARTITION_SIZE \
- (CONFIG_FLASH_NVMEM_SIZE / NVMEM_NUM_PARTITIONS)
-/* User buffer definitions for test purposes */
-#define NVMEM_USER_2_SIZE 0x201
-#define NVMEM_USER_1_SIZE 0x402
-#define NVMEM_USER_0_SIZE (NVMEM_PARTITION_SIZE - \
- NVMEM_USER_2_SIZE - NVMEM_USER_1_SIZE - \
- sizeof(struct nvmem_tag))
+#define CONFIG_FLASH_NVMEM_VARS
#ifndef __ASSEMBLER__
-enum nvmem_users {
- NVMEM_USER_0,
- NVMEM_USER_1,
- NVMEM_USER_2,
- NVMEM_NUM_USERS
-};
+enum nvmem_users { NVMEM_TPM = 0, NVMEM_CR50, NVMEM_NUM_USERS };
#endif
#endif
-#ifdef TEST_NVMEM_VARS
-#define NVMEM_PARTITION_SIZE 0x3000
-#define CONFIG_FLASH_NVMEM_VARS
-#ifndef __ASSEMBLER__
-/* Define the user region numbers */
-enum nvmem_users {
- CONFIG_FLASH_NVMEM_VARS_USER_NUM,
- NVMEM_NUM_USERS
-};
-/* Define a test var. */
-enum nvmem_vars {
- NVMEM_VAR_TEST_VAR,
-};
-#endif
-#define CONFIG_FLASH_NVMEM_VARS_USER_SIZE 600
-#endif /* TEST_NVMEM_VARS */
-
#ifdef TEST_PINWEAVER
#define CONFIG_DCRYPTO_MOCK
#define CONFIG_PINWEAVER