<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/108312/rsa-crypto-sample-in-sdk-2-5-0-fails-on-nrf5340-development-kit-board</link><description>Hi, 
 The RSA crypto sample from the 2.5.0 SDK fails at psa_generate_key() returning -134. The sample is by default configured to use 2048-bit keys. Note that, It fails with the same error code also when changing the sample code and configuration to use</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 27 Feb 2024 18:55:35 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/108312/rsa-crypto-sample-in-sdk-2-5-0-fails-on-nrf5340-development-kit-board" /><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/471124?ContentTypeID=1</link><pubDate>Tue, 27 Feb 2024 18:55:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:851658e6-a4ad-4bea-85e8-861afc22df01</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;Thanks for the update.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/471121?ContentTypeID=1</link><pubDate>Tue, 27 Feb 2024 18:22:49 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:00d628f8-b13a-40cc-8c51-f2f6823d038c</guid><dc:creator>Mathi</dc:creator><description>&lt;p&gt;Just an FYI and thanks for the support.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/471120?ContentTypeID=1</link><pubDate>Tue, 27 Feb 2024 18:20:46 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:24552ecb-55c1-4f6c-ad01-4dcf6ea156a0</guid><dc:creator>Mathi</dc:creator><description>&lt;p&gt;But, instead when i chop the first 24 bytes from the above output and instead pass the remaining 398 bytes to the PSA API, then everything works. &lt;br /&gt;i.e. on other words,&amp;nbsp;the chopped off version of public key(398 bytes) long in the below ASN.1 format is being accepted by PSA:&lt;br /&gt;&lt;br /&gt;&lt;pre class="ui-code" data-mode="text"&gt;398 bytes
SEQUENCE {
   INTEGER 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
   INTEGER 0x010001 (65537 decimal)
}
&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/471119?ContentTypeID=1</link><pubDate>Tue, 27 Feb 2024 18:15:57 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9fd92448-4e85-46cc-97ba-8e2982125de6</guid><dc:creator>Mathi</dc:creator><description>&lt;p&gt;Okay, Just as an update, wanted to share what i found as the difference in the key formats generated by openssl versus what is accepted by PSA.&lt;br /&gt;&lt;br /&gt;Basically, when i use openssl commands, the public key in DER format is&amp;nbsp;422 bytes long, i.e.&lt;br /&gt;&lt;pre class="ui-code" data-mode="text"&gt;openssl rsa -in mathi_pvt_key.der -inform DER -pubout -outform DER -out mathi_public_key.der
openssl pkey -pubin -in mathi_public_key.der -outform DER | xxd -g 1  -i -c 422

The public key output by openssl in DER format is 422 bytes long:
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
In other words, when converting the above bytes to ASN.1 format, it looks like this:
SEQUENCE {
   SEQUENCE {
      OBJECTIDENTIFIER 1.2.840.113549.1.1.1 (rsaEncryption)
      NULL 
   }
   BITSTRING 0x3082018a0282018100bf8b1f325b3063daee3cf3f06a92d4ac1941f6c9d3d6e70094965001d815edca90e8f00c3e646d3a4219c77fcbdeca8be1acbe13d5c2ec78750d938be881d3165321ea7237b921ee0f4da295da3778f39247d076f80790cfd80a72ae3ed3dd06aede4962c50870a499c97dc8b87cf1a76d903f44bdaf6e9f3269bcda351039608f523320014d57c7a22f70f9f6a4856ad5269c9d4c9b0d84fdc59304599c6e08e81d041d347f32190f6273a4fadee498f2422aa1a700f727f1df6838a3ae0b492845d86d477e27a7b4921448afeab01ffdb48bee6e8de75f714b74a2605fda845378de2fd89549158f123472744a991e1cd42e4e4308713caaba7b7fae1fd805e79a6ba1ba3949e9dfad825ea4cc0d7866e9bed8559e66ccb4392ebd52ba19b74befb13135e428ecad2d2b277dfa03df35df8c6b1e2a2b161bb21bd4a215dcee05f4c31f4921f2475ce65c4aa33d79180966f90276f97f2508b338ed515a8b5802016d91bb071f47616ebd00828b0431d533c9d686065f563bb862d7ec6a9b9b0203010001 : 0 unused bit(s)
}&lt;/pre&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/470113?ContentTypeID=1</link><pubDate>Wed, 21 Feb 2024 20:16:44 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:da6b27ad-1dc1-44d6-9b6c-b37263f89296</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;(updated)&lt;/p&gt;
&lt;p&gt;From the team:&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span dir="ltr"&gt;The key-length of 1536 is not recommended for anything than legacy implementations according to NIST recommendations (and others):&amp;nbsp;&lt;span&gt;&lt;img style="max-height:240px;max-width:320px;" src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/pastedimage1708613772708v1.jpeg" alt=" " /&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span dir="ltr"&gt;RSA key size of 2048 and larger is recommended as usable until 2030, with SHA-2 (224 or larger).&amp;nbsp;The reasoning is that the security strength of the operation is so low that it is difficult to give guarantees that it won&amp;#39;t be broken.&amp;nbsp;&lt;a title="https://www.keylength.com/en/4/" href="https://www.keylength.com/en/4/" rel="noopener noreferrer" target="_blank"&gt;https://www.keylength.com/en/4/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;--&lt;/p&gt;
&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;Not know how you exported it, but the key looks wrong. The key must be in DER-form (the first byte of the array should be 0x30). This is documented in the psa spec &lt;a title="https://arm-software.github.io/psa-api/crypto/1.1/api/keys/management.html#key-formats" href="https://arm-software.github.io/psa-api/crypto/1.1/api/keys/management.html#key-formats" rel="noopener noreferrer" target="_blank"&gt;https://arm-software.github.io/psa-api/crypto/1.1/api/keys/management.html#key-formats&lt;/a&gt; (hardware error is the wrong return code, don&amp;#39;t know where that comes from)&lt;/p&gt;
&lt;p&gt;Command to export DER-formatted keys:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;openssl rsa -in private_key.der -inform DER -pubout -outform DER -out public_key.der&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;-Amanda H.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/470071?ContentTypeID=1</link><pubDate>Wed, 21 Feb 2024 15:11:22 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a00bf5f7-e1f5-484c-906e-f46d9df1089d</guid><dc:creator>Mathi</dc:creator><description>&lt;div&gt;
&lt;div&gt;&lt;span&gt;// Public key exported from PSA&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;//const uint8_t ext_pub_key[] = {0x30,0x82,0x01,0x8A,0x02,0x82,0x01,0x81,0x00,0x87,0x0D,0xC9,0x5C,0xB8,0x9B,0xD1,0x28,0x09,0x62,0x34,0x27,0xAE,0x76,0x8A,0xAA,0x3A,0x88,0xA6,0xF8,0xE5,0x96,0x28,0x9D,0x7A,0x79,0xE2,0x62,0x98,0xD2,0x56,0x06,0xA0,0x2D,0x53,0xE9,0xB3,0xE8,0x08,0x08,0x13,0x90,0x53,0xA8,0xD4,0xF2,0x68,0x15,0x70,0x4F,0x0F,0x9F,0xF2,0xD5,0x41,0x4B,0x9E,0x07,0x72,0xC7,0xC7,0xD9,0x22,0x6E,0x1E,0xE7,0x9C,0x72,0x6F,0x76,0xBD,0x59,0x84,0x1B,0xBC,0x01,0xCF,0xCC,0x20,0x8D,0xEA,0x4A,0xF5,0x1B,0x20,0x62,0xBB,0xCD,0xA5,0x3D,0xDF,0xD5,0xF4,0xB9,0xF2,0xE3,0x97,0x84,0x94,0x2A,0x8D,0x94,0x83,0x87,0xA1,0x5A,0xB0,0xFD,0x0C,0xC3,0x9A,0xB6,0xA9,0x29,0x1F,0x9F,0x64,0x68,0x85,0x08,0xE0,0x8F,0xCF,0x9B,0x01,0x4B,0xFC,0xCB,0x31,0x17,0xA6,0xE9,0xFE,0x38,0x46,0x20,0x6C,0xB5,0x6A,0x99,0xFC,0x27,0xAF,0xE8,0x9A,0x37,0xF4,0xD1,0xFB,0xD0,0x34,0xEA,0x87,0x5F,0x3A,0xF3,0x2F,0xA0,0x64,0xA1,0x0B,0xA1,0x70,0xCB,0x80,0x3C,0x83,0x6F,0xC2,0xA2,0xCC,0xB1,0xB1,0x14,0xAA,0xA9,0x52,0x96,0x23,0x85,0x2B,0xEA,0x27,0x6B,0xC8,0x4E,0xF5,0x2E,0x67,0x1A,0x92,0x49,0x07,0xED,0x01,0x84,0x78,0x0D,0x87,0x14,0xDF,0x67,0x45,0x86,0x05,0x7B,0x81,0x42,0x20,0xC2,0x1C,0x4B,0x5D,0x8E,0x6A,0xC5,0x73,0x1C,0x30,0x6B,0x57,0xED,0x14,0x16,0xE1,0x5D,0x1F,0x76,0x9C,0x06,0x6F,0xFE,0xA5,0xD2,0xF2,0x61,0x3C,0x1E,0xED,0x52,0xC3,0x19,0x41,0x6C,0xFD,0x5F,0x3A,0x0E,0x50,0x18,0xE9,0x0D,0x27,0x71,0xFE,0x7C,0x52,0xB3,0x1D,0x9F,0xA3,0xB6,0xE2,0x89,0x01,0xC1,0x65,0x10,0xF3,0x26,0x06,0xB3,0x37,0x1C,0x82,0x2D,0xAB,0x53,0xBD,0xFB,0x6E,0x4A,0x15,0x94,0x1C,0xCC,0xB9,0x5C,0x7F,0x5D,0x9E,0x34,0x1C,0x9D,0xFF,0x52,0x59,0x4B,0x5C,0x82,0xB6,0x06,0x87,0xB1,0x92,0xB2,0x80,0x08,0x83,0xB3,0x9B,0xA2,0x5A,0xF4,0xAA,0x13,0x80,0x9F,0xEE,0xA4,0x3D,0xEE,0x85,0xD0,0xA8,0xE6,0x2E,0x45,0x29,0xCC,0x9C,0xEF,0x98,0x33,0xA3,0x62,0xD2,0x59,0x78,0xFB,0x6E,0x6F,0xF1,0x27,0x9B,0x34,0xE6,0x8C,0x33,0xBC,0xDA,0x3A,0x5B,0x66,0xE5,0x76,0x3F,0xB7,0xCD,0x86,0x2B,0x58,0xF8,0x41,0x87,0xFC,0x51,0x40,0x2B,0x1D,0x2F,0x99,0xCF,0x0C,0x51,0xC3,0xAA,0x28,0x89,0x07,0x3A,0x3E,0xE5,0x27,0x02,0x03,0x01,0x00,0x01};&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;&lt;span&gt;// Public key exported from openssl&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span&gt;const&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;uint8_t&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;ext_pub_key&lt;/span&gt;&lt;span&gt;[]&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;=&lt;/span&gt;&lt;span&gt; {&lt;/span&gt;&lt;span&gt;0x00&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb5&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x97&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x11&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x7a&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x3f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x80&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xdb&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x2f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x24&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x7c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x74&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x1e&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x7b&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x50&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x9c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xf1&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xfb&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x80&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x8d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x80&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x52&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x97&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xf3&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb6&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x3f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x02&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x30&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x77&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd1&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x8f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x93&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xf9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa3&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x74&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x97&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd2&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x2c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x3a&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x75&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x51&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x0d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xfc&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x94&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x8b&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x29&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x33&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xea&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x84&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc8&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc6&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x49&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x99&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x91&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x73&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x2f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x17&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x52&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x92&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x58&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xeb&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x99&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xdd&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x9c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x89&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x6a&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x6a&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb1&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x6c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x85&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc0&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xec&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x07&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xfa&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xcf&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x4f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xe1&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xbf&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x0c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x61&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x87&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb6&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xbc&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc6&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x5f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x64&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x34&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x8c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x0b&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x71&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xfc&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x4f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xf9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x3a&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x93&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xf1&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa2&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x36&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x5f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xcd&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x03&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xaf&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xcd&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x45&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x56&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x4f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xe4&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x8d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x8d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x9b&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb2&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x48&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa1&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x09&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x84&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd8&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb4&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x6b&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x20&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xab&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x13&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x6c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x82&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x35&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x49&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x8f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x81&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xea&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xbb&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x2d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x5b&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x7a&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x51&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x44&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x02&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xf7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x60&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x9d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xf1&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa5&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xe5&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x1c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x49&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x9d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x49&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x32&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc8&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x39&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x71&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xed&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xe6&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x6a&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xce&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc3&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x95&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x9c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x85&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x63&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x44&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x3f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb5&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xdf&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x12&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x73&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x4b&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x53&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x54&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x3d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x76&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc3&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x74&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xf9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x0c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x1c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x4f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xbf&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x9d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x21&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x8d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x91&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd2&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x46&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x73&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x89&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x58&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x00&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x46&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xcf&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xbe&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xe5&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x21&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x1d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x00&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x0b&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x90&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xe4&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x9c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xfd&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x1b&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x99&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x7f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xaa&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd6&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x65&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xf7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xf3&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd5&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x38&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb2&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xe3&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x73&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x54&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xab&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xeb&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x03&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x96&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x10&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc1&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x8d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa3&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x22&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xe1&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xf8&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xe7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc3&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa8&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb5&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x2e&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xe3&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x36&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x13&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x92&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x4c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa0&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x16&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa6&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa6&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa0&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa8&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x08&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd1&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa2&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x51&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd8&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x7a&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x7b&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xbf&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x50&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x45&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd6&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xbf&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa8&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xfd&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd5&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x59&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xba&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x46&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x9f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x80&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x21&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xfd&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb1&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x70&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x86&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x41&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xed&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd2&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xfb&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x72&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x58&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x62&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xf0&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xe3&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x07&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x76&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x5d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xf4&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x19&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x9f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x9b&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x60&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x6a&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xbd&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x6e&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x7d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x53&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xfb&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x16&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x8e&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xfc&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xcc&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x50&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xfa&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc2&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xe9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xfa&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x82&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x29&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x2f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xd0&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x88&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc0&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa6&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x43&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xe0&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x6c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x7a&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xca&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x76&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xe3&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x39&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x2a&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x47&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x95&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x78&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x10&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x4d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x4f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xdf&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x38&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc8&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x10&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xdb&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xfe&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x1f&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x19&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc8&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa9&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xcd&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x7a&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x15&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x2d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x61&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x87&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x66&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xcf&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x03&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x18&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x7e&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x0a&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb7&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x16&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb3&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x39&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb0&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb5&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc1&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x06&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x77&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb1&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xb1&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xc0&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x4c&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x21&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x5d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0xa8&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x6d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x34&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x27&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x28&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x92&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x9d&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x19&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x01&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x00&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt;0x01&lt;/span&gt;&lt;span&gt;};&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/470070?ContentTypeID=1</link><pubDate>Wed, 21 Feb 2024 15:10:37 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9b1842de-ffb3-468f-87ce-bf6e728bf8f1</guid><dc:creator>Mathi</dc:creator><description>&lt;p&gt;Another update - &lt;br /&gt;Case 1) I manually saved (in hex) the public key exported from PSA (using psa_generate_key()). And imported it in a different standalone application, encryption(RSA-OAEP-3072) worked.&lt;br /&gt;The length of the public key (with exponent) was 398 bytes&amp;nbsp;&lt;br /&gt;&lt;br /&gt;Case 2) Imported the public key from from openssl, encryption fails with (-147).&lt;br /&gt;The length of the public key (with exponent) was 388 bytes.&lt;br /&gt;&lt;br /&gt;Are there any special bytes to be included to the public key format when using PSA APIs&lt;br /&gt;Thanks,&lt;/p&gt;
&lt;p&gt;Mathi.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/469984?ContentTypeID=1</link><pubDate>Wed, 21 Feb 2024 10:23:27 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2f4a7de3-b49e-4623-8f25-03d69a8283f0</guid><dc:creator>Mathi</dc:creator><description>&lt;p&gt;I ran into another problem.&lt;br /&gt;If i import a RSA public key generated using openssl, then psa_asymmetric_enrypt() fails with (-147 = HARDWARE_FAILURE). Here, i use the&amp;nbsp;&lt;span&gt;pub_key_handle from psa_key_import().&lt;br /&gt;&lt;/span&gt;Does this mean, only keys generated on the device, are supported?&lt;br /&gt;Or Is there anything specific about the PSA key-format for RSA-OAEP-3072?&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/469876?ContentTypeID=1</link><pubDate>Tue, 20 Feb 2024 16:29:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:676d80fb-c0d2-4112-8143-3bdb967fb77c</guid><dc:creator>Mathi</dc:creator><description>&lt;p&gt;That helped. Thanks.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/469870?ContentTypeID=1</link><pubDate>Tue, 20 Feb 2024 16:07:41 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9b0d927e-1a98-45a9-840d-cd9659bd7dc6</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;Hi,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Did you&amp;nbsp;&lt;span&gt;&lt;span dir="ltr"&gt;enable &lt;a href="https://developer.nordicsemi.com/nRF_Connect_SDK/doc/2.5.2/nrf/libraries/nrf_security/doc/backend_config.html#secure-hash-configurations"&gt;the config&lt;/a&gt; for&amp;nbsp;PSA_ALG_SHA_1?&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span dir="ltr"&gt;Disclaimer from &lt;a title="https://armmbed.github.io/mbed-crypto/html/api/ops/hashes.html#psa_alg_sha_1" href="https://armmbed.github.io/mbed-crypto/html/api/ops/hashes.html#PSA_ALG_SHA_1" rel="noopener noreferrer" target="_blank"&gt;PSA Crypto API&lt;/a&gt;:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;The SHA-1 hash is weak and deprecated and is only recommended for use in legacy protocols.&lt;/blockquote&gt;
&lt;p&gt;-Amanda H.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/469864?ContentTypeID=1</link><pubDate>Tue, 20 Feb 2024 15:45:12 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:384eb49b-fded-4a5d-83b3-a72f510aac94</guid><dc:creator>Mathi</dc:creator><description>&lt;p&gt;But then, psa_asymmetric_encrypt() fails with same error code (-147 = HARDWARE_FAILURE) &lt;br /&gt;for all key sizes WHEN setting the algorithm to&amp;nbsp;&lt;br /&gt;&lt;span&gt;psa_set_key_algorithm&lt;/span&gt;&lt;span&gt;(&lt;/span&gt;&lt;span&gt;&amp;amp;&lt;/span&gt;&lt;span&gt;key_attributes&lt;/span&gt;&lt;span&gt;, (&lt;/span&gt;&lt;span&gt;PSA_ALG_RSA_OAEP&lt;/span&gt;&lt;span&gt;(&lt;/span&gt;&lt;span&gt;PSA_ALG_SHA_1&lt;/span&gt;&lt;span&gt;)));&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/469850?ContentTypeID=1</link><pubDate>Tue, 20 Feb 2024 15:07:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f33968ac-f7d7-49ec-b4ce-70ee44d93ffa</guid><dc:creator>Mathi</dc:creator><description>&lt;p&gt;Hi,&lt;br /&gt;&lt;br /&gt;As an update, please note that the psa_asymmetric_encrypt() API worked fine now after passing the&amp;nbsp;keypair_handle (i.e. instead of using the pub_key_handle) to the API.&lt;br /&gt;&lt;br /&gt;The encryption works fine for 1024, 2048 and 3072-bit keys when the algorithm is set to&amp;nbsp;&lt;br /&gt;&lt;span&gt;psa_set_key_algorithm&lt;/span&gt;&lt;span&gt;(&lt;/span&gt;&lt;span&gt;&amp;amp;&lt;/span&gt;&lt;span&gt;key_attributes&lt;/span&gt;&lt;span&gt;, (&lt;/span&gt;&lt;span&gt;PSA_ALG_RSA_OAEP&lt;/span&gt;&lt;span&gt;(&lt;/span&gt;&lt;span&gt;PSA_ALG_SHA_256&lt;/span&gt;&lt;span&gt;)));&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/469636?ContentTypeID=1</link><pubDate>Mon, 19 Feb 2024 20:40:09 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:174530de-68f9-44db-b03e-2b3a2fa3dc30</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;Hi,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Did you&amp;nbsp;&lt;span&gt;&lt;span dir="ltr"&gt;change the buffer sizes for the key:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;&lt;span&gt;&lt;span dir="ltr"&gt;NRF_CRYPTO_EXAMPLE_RSA_PUBLIC_KEY_SIZE&lt;br /&gt; NRF_CRYPTO_EXAMPLE_RSA_SIGNATURE_SIZE&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span dir="ltr"&gt;If these are increased the 2048 bit RSA key should work as expected.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span dir="ltr"&gt;-Amanda H.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/469630?ContentTypeID=1</link><pubDate>Mon, 19 Feb 2024 17:51:28 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9cc608cf-a6b5-4e6c-a03e-0028f0f5af84</guid><dc:creator>Mathi</dc:creator><description>&lt;p&gt;Hi Amanda,&lt;br /&gt;&lt;br /&gt;I continued further and modifed the default RSA example to try RSA_OAEP encryption for 1024-bit keys&lt;br /&gt;and that fails i.e. psa_asymmetric_encrypt() fails with&amp;nbsp;error code -147(HARDWARE_FAILURE).&lt;br /&gt;&lt;br /&gt;This looks very similair to the problem my colleague had experienced about an year ago, see this ==&amp;gt;&lt;br /&gt; &amp;nbsp;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/95814/rsa-example-fails-on-psa_sign_hash-returning--133/405682"&gt;RSA example fails on psa_sign_hash returning -133 - Nordic Q&amp;amp;A - Nordic DevZone - Nordic DevZone (nordicsemi.com)&lt;br /&gt;&lt;br /&gt;&lt;/a&gt;I don&amp;#39;t know if anything has changed in the past 1 year between 2.1.1 and 2.5.0 - &lt;br /&gt;Could you please confirm whether psa_asymmetric_encrypt() for RSA 1024-bit keys is supported or not?&lt;br /&gt;&lt;br /&gt;Kind Regards,&amp;nbsp;Mathi.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/469286?ContentTypeID=1</link><pubDate>Fri, 16 Feb 2024 14:51:45 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4b191b5e-87d6-4720-aca5-c27dac6ac73d</guid><dc:creator>Mathi</dc:creator><description>&lt;p&gt;Hi Amanda,&lt;br /&gt;&lt;br /&gt;Thanks for the reply.&lt;br /&gt;Meanwhile, I just randomly increased the memory sizes from 16K to 20K and the default sample for key size 2048 bits, worked.&lt;br /&gt;(i.e. basically for experimentation, i just set&amp;nbsp;CONFIG_MAIN_STACK_SIZE, CONFIG_HEAP_MEM_POOL_SIZE, CONFIG_MBEDTLS_HEAP_SIZE, all to 20 K) and it worked.&lt;br /&gt;I did not expect an PSA_ERR_NOT_SUPPORTED error code for memory reasons though.&lt;br /&gt;Also, I also noticed that the key_generation takes a longer time, with different key sizes.&lt;br /&gt;Will update you further.&lt;br /&gt;&lt;br /&gt;Mathi.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: RSA crypto sample in SDK 2.5.0 fails on nRF5340 Development Kit board</title><link>https://devzone.nordicsemi.com/thread/469131?ContentTypeID=1</link><pubDate>Thu, 15 Feb 2024 19:29:53 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2b263d93-46dd-49e4-9cf0-f3e9cceb8613</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;Hi,&amp;nbsp;&lt;/p&gt;
[quote user=""]It fails with the same error code when changing the sample code and configuration to use&amp;nbsp;&lt;span&gt;&lt;span&gt;CONFIG_PSA_WANT_RSA_KEY_SIZE_1536=y or configuring&amp;nbsp;&lt;/span&gt;&lt;/span&gt;CONFIG_PSA_WANT_RSA_KEY_SIZE_1024=y.[/quote]
&lt;p&gt;If you check the .config under build/zephyr, you can find&amp;nbsp;&lt;span&gt;CONFIG_PSA_WANT_RSA_KEY_SIZE_1024=y is set by default.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;How do you modify the code? Could you elaborate on what you modified?&lt;/span&gt;&lt;/p&gt;
[quote user=""](1) When can the basic/default RSA sample application in SDK 2.5.0 fail on the nRF5340 Development Kit?[/quote]
&lt;p&gt;The error would give some clues.&amp;nbsp;&lt;/p&gt;
[quote user=""](2) We intend to&amp;nbsp;use PSA API for RSA OAEP with key size&amp;nbsp;&lt;span&gt;CONFIG_PSA_WANT_RSA_KEY_SIZE_3072. Is this supported in SDK 2.5.0?&lt;/span&gt;[/quote]
&lt;p&gt;&lt;span&gt;The default setting already has&amp;nbsp;CONFIG_PSA_WANT_RSA_KEY_SIZE_3072.&amp;nbsp; Y&lt;/span&gt;&lt;span&gt;ou check the .config under build/zephyr.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Regards,&lt;br /&gt;Amanda H.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>