diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2008-04-21 18:57:09 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2008-04-21 18:57:09 -0400 |
commit | 904e0ab54b7591b9cb01cfc0dbbedcc8bc0d949b (patch) | |
tree | 13a2fc98fc7b347fe0d18cc18d452f1f49bff582 | |
parent | 98a1e95f9b5919b55c71a01546415074282d30d5 (diff) | |
parent | c49a7f182c44c31ea460093eb263110824f6c98e (diff) |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
* git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6:
[HWRNG] omap: Minor updates
[CRYPTO] kconfig: Ordering cleanup
[CRYPTO] all: Clean up init()/fini()
[CRYPTO] padlock-aes: Use generic setkey function
[CRYPTO] aes: Export generic setkey
[CRYPTO] api: Make the crypto subsystem fully modular
[CRYPTO] cts: Add CTS mode required for Kerberos AES support
[CRYPTO] lrw: Replace all adds to big endians variables with be*_add_cpu
[CRYPTO] tcrypt: Change the XTEA test vectors
[CRYPTO] tcrypt: Shrink the tcrypt module
[CRYPTO] tcrypt: Change the usage of the test vectors
[CRYPTO] api: Constify function pointer tables
[CRYPTO] aes-x86-32: Remove unused return code
[CRYPTO] tcrypt: Shrink speed templates
[CRYPTO] tcrypt: Group common speed templates
[CRYPTO] sha512: Rename sha512 to sha512_generic
[CRYPTO] sha384: Hardware acceleration for s390
[CRYPTO] sha512: Hardware acceleration for s390
[CRYPTO] s390: Generic sha_update and sha_final
[CRYPTO] api: Switch to proc_create()
44 files changed, 7420 insertions, 7106 deletions
diff --git a/arch/s390/crypto/Makefile b/arch/s390/crypto/Makefile index 14e552c5cc43..6a1157fa4f98 100644 --- a/arch/s390/crypto/Makefile +++ b/arch/s390/crypto/Makefile | |||
@@ -2,8 +2,9 @@ | |||
2 | # Cryptographic API | 2 | # Cryptographic API |
3 | # | 3 | # |
4 | 4 | ||
5 | obj-$(CONFIG_CRYPTO_SHA1_S390) += sha1_s390.o | 5 | obj-$(CONFIG_CRYPTO_SHA1_S390) += sha1_s390.o sha_common.o |
6 | obj-$(CONFIG_CRYPTO_SHA256_S390) += sha256_s390.o | 6 | obj-$(CONFIG_CRYPTO_SHA256_S390) += sha256_s390.o sha_common.o |
7 | obj-$(CONFIG_CRYPTO_SHA512_S390) += sha512_s390.o sha_common.o | ||
7 | obj-$(CONFIG_CRYPTO_DES_S390) += des_s390.o des_check_key.o | 8 | obj-$(CONFIG_CRYPTO_DES_S390) += des_s390.o des_check_key.o |
8 | obj-$(CONFIG_CRYPTO_AES_S390) += aes_s390.o | 9 | obj-$(CONFIG_CRYPTO_AES_S390) += aes_s390.o |
9 | obj-$(CONFIG_S390_PRNG) += prng.o | 10 | obj-$(CONFIG_S390_PRNG) += prng.o |
diff --git a/arch/s390/crypto/crypt_s390.h b/arch/s390/crypto/crypt_s390.h index 95f5160df27f..9992f95ef992 100644 --- a/arch/s390/crypto/crypt_s390.h +++ b/arch/s390/crypto/crypt_s390.h | |||
@@ -82,6 +82,7 @@ enum crypt_s390_kimd_func { | |||
82 | KIMD_QUERY = CRYPT_S390_KIMD | 0, | 82 | KIMD_QUERY = CRYPT_S390_KIMD | 0, |
83 | KIMD_SHA_1 = CRYPT_S390_KIMD | 1, | 83 | KIMD_SHA_1 = CRYPT_S390_KIMD | 1, |
84 | KIMD_SHA_256 = CRYPT_S390_KIMD | 2, | 84 | KIMD_SHA_256 = CRYPT_S390_KIMD | 2, |
85 | KIMD_SHA_512 = CRYPT_S390_KIMD | 3, | ||
85 | }; | 86 | }; |
86 | 87 | ||
87 | /* | 88 | /* |
@@ -92,6 +93,7 @@ enum crypt_s390_klmd_func { | |||
92 | KLMD_QUERY = CRYPT_S390_KLMD | 0, | 93 | KLMD_QUERY = CRYPT_S390_KLMD | 0, |
93 | KLMD_SHA_1 = CRYPT_S390_KLMD | 1, | 94 | KLMD_SHA_1 = CRYPT_S390_KLMD | 1, |
94 | KLMD_SHA_256 = CRYPT_S390_KLMD | 2, | 95 | KLMD_SHA_256 = CRYPT_S390_KLMD | 2, |
96 | KLMD_SHA_512 = CRYPT_S390_KLMD | 3, | ||
95 | }; | 97 | }; |
96 | 98 | ||
97 | /* | 99 | /* |
diff --git a/arch/s390/crypto/sha.h b/arch/s390/crypto/sha.h new file mode 100644 index 000000000000..1ceafa571eab --- /dev/null +++ b/arch/s390/crypto/sha.h | |||
@@ -0,0 +1,35 @@ | |||
1 | /* | ||
2 | * Cryptographic API. | ||
3 | * | ||
4 | * s390 generic implementation of the SHA Secure Hash Algorithms. | ||
5 | * | ||
6 | * Copyright IBM Corp. 2007 | ||
7 | * Author(s): Jan Glauber (jang@de.ibm.com) | ||
8 | * | ||
9 | * This program is free software; you can redistribute it and/or modify it | ||
10 | * under the terms of the GNU General Public License as published by the Free | ||
11 | * Software Foundation; either version 2 of the License, or (at your option) | ||
12 | * any later version. | ||
13 | * | ||
14 | */ | ||
15 | #ifndef _CRYPTO_ARCH_S390_SHA_H | ||
16 | #define _CRYPTO_ARCH_S390_SHA_H | ||
17 | |||
18 | #include <linux/crypto.h> | ||
19 | #include <crypto/sha.h> | ||
20 | |||
21 | /* must be big enough for the largest SHA variant */ | ||
22 | #define SHA_MAX_STATE_SIZE 16 | ||
23 | #define SHA_MAX_BLOCK_SIZE SHA512_BLOCK_SIZE | ||
24 | |||
25 | struct s390_sha_ctx { | ||
26 | u64 count; /* message length in bytes */ | ||
27 | u32 state[SHA_MAX_STATE_SIZE]; | ||
28 | u8 buf[2 * SHA_MAX_BLOCK_SIZE]; | ||
29 | int func; /* KIMD function to use */ | ||
30 | }; | ||
31 | |||
32 | void s390_sha_update(struct crypto_tfm *tfm, const u8 *data, unsigned int len); | ||
33 | void s390_sha_final(struct crypto_tfm *tfm, u8 *out); | ||
34 | |||
35 | #endif | ||
diff --git a/arch/s390/crypto/sha1_s390.c b/arch/s390/crypto/sha1_s390.c index 9cf9eca22747..b3cb5a89b00d 100644 --- a/arch/s390/crypto/sha1_s390.c +++ b/arch/s390/crypto/sha1_s390.c | |||
@@ -29,16 +29,11 @@ | |||
29 | #include <crypto/sha.h> | 29 | #include <crypto/sha.h> |
30 | 30 | ||
31 | #include "crypt_s390.h" | 31 | #include "crypt_s390.h" |
32 | 32 | #include "sha.h" | |
33 | struct s390_sha1_ctx { | ||
34 | u64 count; /* message length */ | ||
35 | u32 state[5]; | ||
36 | u8 buf[2 * SHA1_BLOCK_SIZE]; | ||
37 | }; | ||
38 | 33 | ||
39 | static void sha1_init(struct crypto_tfm *tfm) | 34 | static void sha1_init(struct crypto_tfm *tfm) |
40 | { | 35 | { |
41 | struct s390_sha1_ctx *sctx = crypto_tfm_ctx(tfm); | 36 | struct s390_sha_ctx *sctx = crypto_tfm_ctx(tfm); |
42 | 37 | ||
43 | sctx->state[0] = SHA1_H0; | 38 | sctx->state[0] = SHA1_H0; |
44 | sctx->state[1] = SHA1_H1; | 39 | sctx->state[1] = SHA1_H1; |
@@ -46,79 +41,7 @@ static void sha1_init(struct crypto_tfm *tfm) | |||
46 | sctx->state[3] = SHA1_H3; | 41 | sctx->state[3] = SHA1_H3; |
47 | sctx->state[4] = SHA1_H4; | 42 | sctx->state[4] = SHA1_H4; |
48 | sctx->count = 0; | 43 | sctx->count = 0; |
49 | } | 44 | sctx->func = KIMD_SHA_1; |
50 | |||
51 | static void sha1_update(struct crypto_tfm *tfm, const u8 *data, | ||
52 | unsigned int len) | ||
53 | { | ||
54 | struct s390_sha1_ctx *sctx = crypto_tfm_ctx(tfm); | ||
55 | unsigned int index; | ||
56 | int ret; | ||
57 | |||
58 | /* how much is already in the buffer? */ | ||
59 | index = sctx->count & 0x3f; | ||
60 | |||
61 | sctx->count += len; | ||
62 | |||
63 | if (index + len < SHA1_BLOCK_SIZE) | ||
64 | goto store; | ||
65 | |||
66 | /* process one stored block */ | ||
67 | if (index) { | ||
68 | memcpy(sctx->buf + index, data, SHA1_BLOCK_SIZE - index); | ||
69 | ret = crypt_s390_kimd(KIMD_SHA_1, sctx->state, sctx->buf, | ||
70 | SHA1_BLOCK_SIZE); | ||
71 | BUG_ON(ret != SHA1_BLOCK_SIZE); | ||
72 | data += SHA1_BLOCK_SIZE - index; | ||
73 | len -= SHA1_BLOCK_SIZE - index; | ||
74 | } | ||
75 | |||
76 | /* process as many blocks as possible */ | ||
77 | if (len >= SHA1_BLOCK_SIZE) { | ||
78 | ret = crypt_s390_kimd(KIMD_SHA_1, sctx->state, data, | ||
79 | len & ~(SHA1_BLOCK_SIZE - 1)); | ||
80 | BUG_ON(ret != (len & ~(SHA1_BLOCK_SIZE - 1))); | ||
81 | data += ret; | ||
82 | len -= ret; | ||
83 | } | ||
84 | |||
85 | store: | ||
86 | /* anything left? */ | ||
87 | if (len) | ||
88 | memcpy(sctx->buf + index , data, len); | ||
89 | } | ||
90 | |||
91 | /* Add padding and return the message digest. */ | ||
92 | static void sha1_final(struct crypto_tfm *tfm, u8 *out) | ||
93 | { | ||
94 | struct s390_sha1_ctx *sctx = crypto_tfm_ctx(tfm); | ||
95 | u64 bits; | ||
96 | unsigned int index, end; | ||
97 | int ret; | ||
98 | |||
99 | /* must perform manual padding */ | ||
100 | index = sctx->count & 0x3f; | ||
101 | end = (index < 56) ? SHA1_BLOCK_SIZE : (2 * SHA1_BLOCK_SIZE); | ||
102 | |||
103 | /* start pad with 1 */ | ||
104 | sctx->buf[index] = 0x80; | ||
105 | |||
106 | /* pad with zeros */ | ||
107 | index++; | ||
108 | memset(sctx->buf + index, 0x00, end - index - 8); | ||
109 | |||
110 | /* append message length */ | ||
111 | bits = sctx->count * 8; | ||
112 | memcpy(sctx->buf + end - 8, &bits, sizeof(bits)); | ||
113 | |||
114 | ret = crypt_s390_kimd(KIMD_SHA_1, sctx->state, sctx->buf, end); | ||
115 | BUG_ON(ret != end); | ||
116 | |||
117 | /* copy digest to out */ | ||
118 | memcpy(out, sctx->state, SHA1_DIGEST_SIZE); | ||
119 | |||
120 | /* wipe context */ | ||
121 | memset(sctx, 0, sizeof *sctx); | ||
122 | } | 45 | } |
123 | 46 | ||
124 | static struct crypto_alg alg = { | 47 | static struct crypto_alg alg = { |
@@ -127,21 +50,20 @@ static struct crypto_alg alg = { | |||
127 | .cra_priority = CRYPT_S390_PRIORITY, | 50 | .cra_priority = CRYPT_S390_PRIORITY, |
128 | .cra_flags = CRYPTO_ALG_TYPE_DIGEST, | 51 | .cra_flags = CRYPTO_ALG_TYPE_DIGEST, |
129 | .cra_blocksize = SHA1_BLOCK_SIZE, | 52 | .cra_blocksize = SHA1_BLOCK_SIZE, |
130 | .cra_ctxsize = sizeof(struct s390_sha1_ctx), | 53 | .cra_ctxsize = sizeof(struct s390_sha_ctx), |
131 | .cra_module = THIS_MODULE, | 54 | .cra_module = THIS_MODULE, |
132 | .cra_list = LIST_HEAD_INIT(alg.cra_list), | 55 | .cra_list = LIST_HEAD_INIT(alg.cra_list), |
133 | .cra_u = { .digest = { | 56 | .cra_u = { .digest = { |
134 | .dia_digestsize = SHA1_DIGEST_SIZE, | 57 | .dia_digestsize = SHA1_DIGEST_SIZE, |
135 | .dia_init = sha1_init, | 58 | .dia_init = sha1_init, |
136 | .dia_update = sha1_update, | 59 | .dia_update = s390_sha_update, |
137 | .dia_final = sha1_final } } | 60 | .dia_final = s390_sha_final } } |
138 | }; | 61 | }; |
139 | 62 | ||
140 | static int __init sha1_s390_init(void) | 63 | static int __init sha1_s390_init(void) |
141 | { | 64 | { |
142 | if (!crypt_s390_func_available(KIMD_SHA_1)) | 65 | if (!crypt_s390_func_available(KIMD_SHA_1)) |
143 | return -EOPNOTSUPP; | 66 | return -EOPNOTSUPP; |
144 | |||
145 | return crypto_register_alg(&alg); | 67 | return crypto_register_alg(&alg); |
146 | } | 68 | } |
147 | 69 | ||
@@ -154,6 +76,5 @@ module_init(sha1_s390_init); | |||
154 | module_exit(sha1_s390_fini); | 76 | module_exit(sha1_s390_fini); |
155 | 77 | ||
156 | MODULE_ALIAS("sha1"); | 78 | MODULE_ALIAS("sha1"); |
157 | |||
158 | MODULE_LICENSE("GPL"); | 79 | MODULE_LICENSE("GPL"); |
159 | MODULE_DESCRIPTION("SHA1 Secure Hash Algorithm"); | 80 | MODULE_DESCRIPTION("SHA1 Secure Hash Algorithm"); |
diff --git a/arch/s390/crypto/sha256_s390.c b/arch/s390/crypto/sha256_s390.c index 2a3d756b35d4..19c03fb6ba7e 100644 --- a/arch/s390/crypto/sha256_s390.c +++ b/arch/s390/crypto/sha256_s390.c | |||
@@ -22,16 +22,11 @@ | |||
22 | #include <crypto/sha.h> | 22 | #include <crypto/sha.h> |
23 | 23 | ||
24 | #include "crypt_s390.h" | 24 | #include "crypt_s390.h" |
25 | 25 | #include "sha.h" | |
26 | struct s390_sha256_ctx { | ||
27 | u64 count; /* message length */ | ||
28 | u32 state[8]; | ||
29 | u8 buf[2 * SHA256_BLOCK_SIZE]; | ||
30 | }; | ||
31 | 26 | ||
32 | static void sha256_init(struct crypto_tfm *tfm) | 27 | static void sha256_init(struct crypto_tfm *tfm) |
33 | { | 28 | { |
34 | struct s390_sha256_ctx *sctx = crypto_tfm_ctx(tfm); | 29 | struct s390_sha_ctx *sctx = crypto_tfm_ctx(tfm); |
35 | 30 | ||
36 | sctx->state[0] = SHA256_H0; | 31 | sctx->state[0] = SHA256_H0; |
37 | sctx->state[1] = SHA256_H1; | 32 | sctx->state[1] = SHA256_H1; |
@@ -42,79 +37,7 @@ static void sha256_init(struct crypto_tfm *tfm) | |||
42 | sctx->state[6] = SHA256_H6; | 37 | sctx->state[6] = SHA256_H6; |
43 | sctx->state[7] = SHA256_H7; | 38 | sctx->state[7] = SHA256_H7; |
44 | sctx->count = 0; | 39 | sctx->count = 0; |
45 | } | 40 | sctx->func = KIMD_SHA_256; |
46 | |||
47 | static void sha256_update(struct crypto_tfm *tfm, const u8 *data, | ||
48 | unsigned int len) | ||
49 | { | ||
50 | struct s390_sha256_ctx *sctx = crypto_tfm_ctx(tfm); | ||
51 | unsigned int index; | ||
52 | int ret; | ||
53 | |||
54 | /* how much is already in the buffer? */ | ||
55 | index = sctx->count & 0x3f; | ||
56 | |||
57 | sctx->count += len; | ||
58 | |||
59 | if ((index + len) < SHA256_BLOCK_SIZE) | ||
60 | goto store; | ||
61 | |||
62 | /* process one stored block */ | ||
63 | if (index) { | ||
64 | memcpy(sctx->buf + index, data, SHA256_BLOCK_SIZE - index); | ||
65 | ret = crypt_s390_kimd(KIMD_SHA_256, sctx->state, sctx->buf, | ||
66 | SHA256_BLOCK_SIZE); | ||
67 | BUG_ON(ret != SHA256_BLOCK_SIZE); | ||
68 | data += SHA256_BLOCK_SIZE - index; | ||
69 | len -= SHA256_BLOCK_SIZE - index; | ||
70 | } | ||
71 | |||
72 | /* process as many blocks as possible */ | ||
73 | if (len >= SHA256_BLOCK_SIZE) { | ||
74 | ret = crypt_s390_kimd(KIMD_SHA_256, sctx->state, data, | ||
75 | len & ~(SHA256_BLOCK_SIZE - 1)); | ||
76 | BUG_ON(ret != (len & ~(SHA256_BLOCK_SIZE - 1))); | ||
77 | data += ret; | ||
78 | len -= ret; | ||
79 | } | ||
80 | |||
81 | store: | ||
82 | /* anything left? */ | ||
83 | if (len) | ||
84 | memcpy(sctx->buf + index , data, len); | ||
85 | } | ||
86 | |||
87 | /* Add padding and return the message digest */ | ||
88 | static void sha256_final(struct crypto_tfm *tfm, u8 *out) | ||
89 | { | ||
90 | struct s390_sha256_ctx *sctx = crypto_tfm_ctx(tfm); | ||
91 | u64 bits; | ||
92 | unsigned int index, end; | ||
93 | int ret; | ||
94 | |||
95 | /* must perform manual padding */ | ||
96 | index = sctx->count & 0x3f; | ||
97 | end = (index < 56) ? SHA256_BLOCK_SIZE : (2 * SHA256_BLOCK_SIZE); | ||
98 | |||
99 | /* start pad with 1 */ | ||
100 | sctx->buf[index] = 0x80; | ||
101 | |||
102 | /* pad with zeros */ | ||
103 | index++; | ||
104 | memset(sctx->buf + index, 0x00, end - index - 8); | ||
105 | |||
106 | /* append message length */ | ||
107 | bits = sctx->count * 8; | ||
108 | memcpy(sctx->buf + end - 8, &bits, sizeof(bits)); | ||
109 | |||
110 | ret = crypt_s390_kimd(KIMD_SHA_256, sctx->state, sctx->buf, end); | ||
111 | BUG_ON(ret != end); | ||
112 | |||
113 | /* copy digest to out */ | ||
114 | memcpy(out, sctx->state, SHA256_DIGEST_SIZE); | ||
115 | |||
116 | /* wipe context */ | ||
117 | memset(sctx, 0, sizeof *sctx); | ||
118 | } | 41 | } |
119 | 42 | ||
120 | static struct crypto_alg alg = { | 43 | static struct crypto_alg alg = { |
@@ -123,14 +46,14 @@ static struct crypto_alg alg = { | |||
123 | .cra_priority = CRYPT_S390_PRIORITY, | 46 | .cra_priority = CRYPT_S390_PRIORITY, |
124 | .cra_flags = CRYPTO_ALG_TYPE_DIGEST, | 47 | .cra_flags = CRYPTO_ALG_TYPE_DIGEST, |
125 | .cra_blocksize = SHA256_BLOCK_SIZE, | 48 | .cra_blocksize = SHA256_BLOCK_SIZE, |
126 | .cra_ctxsize = sizeof(struct s390_sha256_ctx), | 49 | .cra_ctxsize = sizeof(struct s390_sha_ctx), |
127 | .cra_module = THIS_MODULE, | 50 | .cra_module = THIS_MODULE, |
128 | .cra_list = LIST_HEAD_INIT(alg.cra_list), | 51 | .cra_list = LIST_HEAD_INIT(alg.cra_list), |
129 | .cra_u = { .digest = { | 52 | .cra_u = { .digest = { |
130 | .dia_digestsize = SHA256_DIGEST_SIZE, | 53 | .dia_digestsize = SHA256_DIGEST_SIZE, |
131 | .dia_init = sha256_init, | 54 | .dia_init = sha256_init, |
132 | .dia_update = sha256_update, | 55 | .dia_update = s390_sha_update, |
133 | .dia_final = sha256_final } } | 56 | .dia_final = s390_sha_final } } |
134 | }; | 57 | }; |
135 | 58 | ||
136 | static int sha256_s390_init(void) | 59 | static int sha256_s390_init(void) |
@@ -150,6 +73,5 @@ module_init(sha256_s390_init); | |||
150 | module_exit(sha256_s390_fini); | 73 | module_exit(sha256_s390_fini); |
151 | 74 | ||
152 | MODULE_ALIAS("sha256"); | 75 | MODULE_ALIAS("sha256"); |
153 | |||
154 | MODULE_LICENSE("GPL"); | 76 | MODULE_LICENSE("GPL"); |
155 | MODULE_DESCRIPTION("SHA256 Secure Hash Algorithm"); | 77 | MODULE_DESCRIPTION("SHA256 Secure Hash Algorithm"); |
diff --git a/arch/s390/crypto/sha512_s390.c b/arch/s390/crypto/sha512_s390.c new file mode 100644 index 000000000000..23c7861f6aeb --- /dev/null +++ b/arch/s390/crypto/sha512_s390.c | |||
@@ -0,0 +1,114 @@ | |||
1 | /* | ||
2 | * Cryptographic API. | ||
3 | * | ||
4 | * s390 implementation of the SHA512 and SHA38 Secure Hash Algorithm. | ||
5 | * | ||
6 | * Copyright IBM Corp. 2007 | ||
7 | * Author(s): Jan Glauber (jang@de.ibm.com) | ||
8 | * | ||
9 | * This program is free software; you can redistribute it and/or modify it | ||
10 | * under the terms of the GNU General Public License as published by the Free | ||
11 | * Software Foundation; either version 2 of the License, or (at your option) | ||
12 | * any later version. | ||
13 | * | ||
14 | */ | ||
15 | #include <linux/init.h> | ||
16 | #include <linux/module.h> | ||
17 | #include <linux/crypto.h> | ||
18 | |||
19 | #include "sha.h" | ||
20 | #include "crypt_s390.h" | ||
21 | |||
22 | static void sha512_init(struct crypto_tfm *tfm) | ||
23 | { | ||
24 | struct s390_sha_ctx *ctx = crypto_tfm_ctx(tfm); | ||
25 | |||
26 | *(__u64 *)&ctx->state[0] = 0x6a09e667f3bcc908ULL; | ||
27 | *(__u64 *)&ctx->state[2] = 0xbb67ae8584caa73bULL; | ||
28 | *(__u64 *)&ctx->state[4] = 0x3c6ef372fe94f82bULL; | ||
29 | *(__u64 *)&ctx->state[6] = 0xa54ff53a5f1d36f1ULL; | ||
30 | *(__u64 *)&ctx->state[8] = 0x510e527fade682d1ULL; | ||
31 | *(__u64 *)&ctx->state[10] = 0x9b05688c2b3e6c1fULL; | ||
32 | *(__u64 *)&ctx->state[12] = 0x1f83d9abfb41bd6bULL; | ||
33 | *(__u64 *)&ctx->state[14] = 0x5be0cd19137e2179ULL; | ||
34 | ctx->count = 0; | ||
35 | ctx->func = KIMD_SHA_512; | ||
36 | } | ||
37 | |||
38 | static struct crypto_alg sha512_alg = { | ||
39 | .cra_name = "sha512", | ||
40 | .cra_driver_name = "sha512-s390", | ||
41 | .cra_priority = CRYPT_S390_PRIORITY, | ||
42 | .cra_flags = CRYPTO_ALG_TYPE_DIGEST, | ||
43 | .cra_blocksize = SHA512_BLOCK_SIZE, | ||
44 | .cra_ctxsize = sizeof(struct s390_sha_ctx), | ||
45 | .cra_module = THIS_MODULE, | ||
46 | .cra_list = LIST_HEAD_INIT(sha512_alg.cra_list), | ||
47 | .cra_u = { .digest = { | ||
48 | .dia_digestsize = SHA512_DIGEST_SIZE, | ||
49 | .dia_init = sha512_init, | ||
50 | .dia_update = s390_sha_update, | ||
51 | .dia_final = s390_sha_final } } | ||
52 | }; | ||
53 | |||
54 | MODULE_ALIAS("sha512"); | ||
55 | |||
56 | static void sha384_init(struct crypto_tfm *tfm) | ||
57 | { | ||
58 | struct s390_sha_ctx *ctx = crypto_tfm_ctx(tfm); | ||
59 | |||
60 | *(__u64 *)&ctx->state[0] = 0xcbbb9d5dc1059ed8ULL; | ||
61 | *(__u64 *)&ctx->state[2] = 0x629a292a367cd507ULL; | ||
62 | *(__u64 *)&ctx->state[4] = 0x9159015a3070dd17ULL; | ||
63 | *(__u64 *)&ctx->state[6] = 0x152fecd8f70e5939ULL; | ||
64 | *(__u64 *)&ctx->state[8] = 0x67332667ffc00b31ULL; | ||
65 | *(__u64 *)&ctx->state[10] = 0x8eb44a8768581511ULL; | ||
66 | *(__u64 *)&ctx->state[12] = 0xdb0c2e0d64f98fa7ULL; | ||
67 | *(__u64 *)&ctx->state[14] = 0x47b5481dbefa4fa4ULL; | ||
68 | ctx->count = 0; | ||
69 | ctx->func = KIMD_SHA_512; | ||
70 | } | ||
71 | |||
72 | static struct crypto_alg sha384_alg = { | ||
73 | .cra_name = "sha384", | ||
74 | .cra_driver_name = "sha384-s390", | ||
75 | .cra_priority = CRYPT_S390_PRIORITY, | ||
76 | .cra_flags = CRYPTO_ALG_TYPE_DIGEST, | ||
77 | .cra_blocksize = SHA384_BLOCK_SIZE, | ||
78 | .cra_ctxsize = sizeof(struct s390_sha_ctx), | ||
79 | .cra_module = THIS_MODULE, | ||
80 | .cra_list = LIST_HEAD_INIT(sha384_alg.cra_list), | ||
81 | .cra_u = { .digest = { | ||
82 | .dia_digestsize = SHA384_DIGEST_SIZE, | ||
83 | .dia_init = sha384_init, | ||
84 | .dia_update = s390_sha_update, | ||
85 | .dia_final = s390_sha_final } } | ||
86 | }; | ||
87 | |||
88 | MODULE_ALIAS("sha384"); | ||
89 | |||
90 | static int __init init(void) | ||
91 | { | ||
92 | int ret; | ||
93 | |||
94 | if (!crypt_s390_func_available(KIMD_SHA_512)) | ||
95 | return -EOPNOTSUPP; | ||
96 | if ((ret = crypto_register_alg(&sha512_alg)) < 0) | ||
97 | goto out; | ||
98 | if ((ret = crypto_register_alg(&sha384_alg)) < 0) | ||
99 | crypto_unregister_alg(&sha512_alg); | ||
100 | out: | ||
101 | return ret; | ||
102 | } | ||
103 | |||
104 | static void __exit fini(void) | ||
105 | { | ||
106 | crypto_unregister_alg(&sha512_alg); | ||
107 | crypto_unregister_alg(&sha384_alg); | ||
108 | } | ||
109 | |||
110 | module_init(init); | ||
111 | module_exit(fini); | ||
112 | |||
113 | MODULE_LICENSE("GPL"); | ||
114 | MODULE_DESCRIPTION("SHA512 and SHA-384 Secure Hash Algorithm"); | ||
diff --git a/arch/s390/crypto/sha_common.c b/arch/s390/crypto/sha_common.c new file mode 100644 index 000000000000..9d6eb8c3d37e --- /dev/null +++ b/arch/s390/crypto/sha_common.c | |||
@@ -0,0 +1,97 @@ | |||
1 | /* | ||
2 | * Cryptographic API. | ||
3 | * | ||
4 | * s390 generic implementation of the SHA Secure Hash Algorithms. | ||
5 | * | ||
6 | * Copyright IBM Corp. 2007 | ||
7 | * Author(s): Jan Glauber (jang@de.ibm.com) | ||
8 | * | ||
9 | * This program is free software; you can redistribute it and/or modify it | ||
10 | * under the terms of the GNU General Public License as published by the Free | ||
11 | * Software Foundation; either version 2 of the License, or (at your option) | ||
12 | * any later version. | ||
13 | * | ||
14 | */ | ||
15 | |||
16 | #include <linux/crypto.h> | ||
17 | #include "sha.h" | ||
18 | #include "crypt_s390.h" | ||
19 | |||
20 | void s390_sha_update(struct crypto_tfm *tfm, const u8 *data, unsigned int len) | ||
21 | { | ||
22 | struct s390_sha_ctx *ctx = crypto_tfm_ctx(tfm); | ||
23 | unsigned int bsize = crypto_tfm_alg_blocksize(tfm); | ||
24 | unsigned int index; | ||
25 | int ret; | ||
26 | |||
27 | /* how much is already in the buffer? */ | ||
28 | index = ctx->count & (bsize - 1); | ||
29 | ctx->count += len; | ||
30 | |||
31 | if ((index + len) < bsize) | ||
32 | goto store; | ||
33 | |||
34 | /* process one stored block */ | ||
35 | if (index) { | ||
36 | memcpy(ctx->buf + index, data, bsize - index); | ||
37 | ret = crypt_s390_kimd(ctx->func, ctx->state, ctx->buf, bsize); | ||
38 | BUG_ON(ret != bsize); | ||
39 | data += bsize - index; | ||
40 | len -= bsize - index; | ||
41 | } | ||
42 | |||
43 | /* process as many blocks as possible */ | ||
44 | if (len >= bsize) { | ||
45 | ret = crypt_s390_kimd(ctx->func, ctx->state, data, | ||
46 | len & ~(bsize - 1)); | ||
47 | BUG_ON(ret != (len & ~(bsize - 1))); | ||
48 | data += ret; | ||
49 | len -= ret; | ||
50 | } | ||
51 | store: | ||
52 | if (len) | ||
53 | memcpy(ctx->buf + index , data, len); | ||
54 | } | ||
55 | EXPORT_SYMBOL_GPL(s390_sha_update); | ||
56 | |||
57 | void s390_sha_final(struct crypto_tfm *tfm, u8 *out) | ||
58 | { | ||
59 | struct s390_sha_ctx *ctx = crypto_tfm_ctx(tfm); | ||
60 | unsigned int bsize = crypto_tfm_alg_blocksize(tfm); | ||
61 | u64 bits; | ||
62 | unsigned int index, end, plen; | ||
63 | int ret; | ||
64 | |||
65 | /* SHA-512 uses 128 bit padding length */ | ||
66 | plen = (bsize > SHA256_BLOCK_SIZE) ? 16 : 8; | ||
67 | |||
68 | /* must perform manual padding */ | ||
69 | index = ctx->count & (bsize - 1); | ||
70 | end = (index < bsize - plen) ? bsize : (2 * bsize); | ||
71 | |||
72 | /* start pad with 1 */ | ||
73 | ctx->buf[index] = 0x80; | ||
74 | index++; | ||
75 | |||
76 | /* pad with zeros */ | ||
77 | memset(ctx->buf + index, 0x00, end - index - 8); | ||
78 | |||
79 | /* | ||
80 | * Append message length. Well, SHA-512 wants a 128 bit lenght value, | ||
81 | * nevertheless we use u64, should be enough for now... | ||
82 | */ | ||
83 | bits = ctx->count * 8; | ||
84 | memcpy(ctx->buf + end - 8, &bits, sizeof(bits)); | ||
85 | |||
86 | ret = crypt_s390_kimd(ctx->func, ctx->state, ctx->buf, end); | ||
87 | BUG_ON(ret != end); | ||
88 | |||
89 | /* copy digest to out */ | ||
90 | memcpy(out, ctx->state, crypto_hash_digestsize(crypto_hash_cast(tfm))); | ||
91 | /* wipe context */ | ||
92 | memset(ctx, 0, sizeof *ctx); | ||
93 | } | ||
94 | EXPORT_SYMBOL_GPL(s390_sha_final); | ||
95 | |||
96 | MODULE_LICENSE("GPL"); | ||
97 | MODULE_DESCRIPTION("s390 SHA cipher common functions"); | ||
diff --git a/arch/x86/crypto/aes-i586-asm_32.S b/arch/x86/crypto/aes-i586-asm_32.S index 1093bede3e0a..e41b147f4509 100644 --- a/arch/x86/crypto/aes-i586-asm_32.S +++ b/arch/x86/crypto/aes-i586-asm_32.S | |||
@@ -289,7 +289,6 @@ aes_enc_blk: | |||
289 | pop %ebx | 289 | pop %ebx |
290 | mov %r0,(%ebp) | 290 | mov %r0,(%ebp) |
291 | pop %ebp | 291 | pop %ebp |
292 | mov $1,%eax | ||
293 | ret | 292 | ret |
294 | 293 | ||
295 | // AES (Rijndael) Decryption Subroutine | 294 | // AES (Rijndael) Decryption Subroutine |
@@ -365,6 +364,4 @@ aes_dec_blk: | |||
365 | pop %ebx | 364 | pop %ebx |
366 | mov %r0,(%ebp) | 365 | mov %r0,(%ebp) |
367 | pop %ebp | 366 | pop %ebp |
368 | mov $1,%eax | ||
369 | ret | 367 | ret |
370 | |||
diff --git a/crypto/Kconfig b/crypto/Kconfig index 69f1be6816f7..864456c140fe 100644 --- a/crypto/Kconfig +++ b/crypto/Kconfig | |||
@@ -13,12 +13,14 @@ source "crypto/async_tx/Kconfig" | |||
13 | # Cryptographic API Configuration | 13 | # Cryptographic API Configuration |
14 | # | 14 | # |
15 | menuconfig CRYPTO | 15 | menuconfig CRYPTO |
16 | bool "Cryptographic API" | 16 | tristate "Cryptographic API" |
17 | help | 17 | help |
18 | This option provides the core Cryptographic API. | 18 | This option provides the core Cryptographic API. |
19 | 19 | ||
20 | if CRYPTO | 20 | if CRYPTO |
21 | 21 | ||
22 | comment "Crypto core or helper" | ||
23 | |||
22 | config CRYPTO_ALGAPI | 24 | config CRYPTO_ALGAPI |
23 | tristate | 25 | tristate |
24 | help | 26 | help |
@@ -32,15 +34,6 @@ config CRYPTO_BLKCIPHER | |||
32 | tristate | 34 | tristate |
33 | select CRYPTO_ALGAPI | 35 | select CRYPTO_ALGAPI |
34 | 36 | ||
35 | config CRYPTO_SEQIV | ||
36 | tristate "Sequence Number IV Generator" | ||
37 | select CRYPTO_AEAD | ||
38 | select CRYPTO_BLKCIPHER | ||
39 | help | ||
40 | This IV generator generates an IV based on a sequence number by | ||
41 | xoring it with a salt. This algorithm is mainly useful for CTR | ||
42 | and similar modes. | ||
43 | |||
44 | config CRYPTO_HASH | 37 | config CRYPTO_HASH |
45 | tristate | 38 | tristate |
46 | select CRYPTO_ALGAPI | 39 | select CRYPTO_ALGAPI |
@@ -52,24 +45,15 @@ config CRYPTO_MANAGER | |||
52 | Create default cryptographic template instantiations such as | 45 | Create default cryptographic template instantiations such as |
53 | cbc(aes). | 46 | cbc(aes). |
54 | 47 | ||
55 | config CRYPTO_HMAC | 48 | config CRYPTO_GF128MUL |
56 | tristate "HMAC support" | 49 | tristate "GF(2^128) multiplication functions (EXPERIMENTAL)" |
57 | select CRYPTO_HASH | ||
58 | select CRYPTO_MANAGER | ||
59 | help | ||
60 | HMAC: Keyed-Hashing for Message Authentication (RFC2104). | ||
61 | This is required for IPSec. | ||
62 | |||
63 | config CRYPTO_XCBC | ||
64 | tristate "XCBC support" | ||
65 | depends on EXPERIMENTAL | 50 | depends on EXPERIMENTAL |
66 | select CRYPTO_HASH | ||
67 | select CRYPTO_MANAGER | ||
68 | help | 51 | help |
69 | XCBC: Keyed-Hashing with encryption algorithm | 52 | Efficient table driven implementation of multiplications in the |
70 | http://www.ietf.org/rfc/rfc3566.txt | 53 | field GF(2^128). This is needed by some cypher modes. This |
71 | http://csrc.nist.gov/encryption/modes/proposedmodes/ | 54 | option will be selected automatically if you select such a |
72 | xcbc-mac/xcbc-mac-spec.pdf | 55 | cipher mode. Only select this option by hand if you expect to load |
56 | an external module that requires these functions. | ||
73 | 57 | ||
74 | config CRYPTO_NULL | 58 | config CRYPTO_NULL |
75 | tristate "Null algorithms" | 59 | tristate "Null algorithms" |
@@ -78,107 +62,98 @@ config CRYPTO_NULL | |||
78 | help | 62 | help |
79 | These are 'Null' algorithms, used by IPsec, which do nothing. | 63 | These are 'Null' algorithms, used by IPsec, which do nothing. |
80 | 64 | ||
81 | config CRYPTO_MD4 | 65 | config CRYPTO_CRYPTD |
82 | tristate "MD4 digest algorithm" | 66 | tristate "Software async crypto daemon" |
83 | select CRYPTO_ALGAPI | 67 | select CRYPTO_BLKCIPHER |
84 | help | 68 | select CRYPTO_MANAGER |
85 | MD4 message digest algorithm (RFC1320). | ||
86 | |||
87 | config CRYPTO_MD5 | ||
88 | tristate "MD5 digest algorithm" | ||
89 | select CRYPTO_ALGAPI | ||
90 | help | 69 | help |
91 | MD5 message digest algorithm (RFC1321). | 70 | This is a generic software asynchronous crypto daemon that |
71 | converts an arbitrary synchronous software crypto algorithm | ||
72 | into an asynchronous algorithm that executes in a kernel thread. | ||
92 | 73 | ||
93 | config CRYPTO_SHA1 | 74 | config CRYPTO_AUTHENC |
94 | tristate "SHA1 digest algorithm" | 75 | tristate "Authenc support" |
95 | select CRYPTO_ALGAPI | 76 | select CRYPTO_AEAD |
77 | select CRYPTO_BLKCIPHER | ||
78 | select CRYPTO_MANAGER | ||
79 | select CRYPTO_HASH | ||
96 | help | 80 | help |
97 | SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2). | 81 | Authenc: Combined mode wrapper for IPsec. |
82 | This is required for IPSec. | ||
98 | 83 | ||
99 | config CRYPTO_SHA256 | 84 | config CRYPTO_TEST |
100 | tristate "SHA224 and SHA256 digest algorithm" | 85 | tristate "Testing module" |
86 | depends on m | ||
101 | select CRYPTO_ALGAPI | 87 | select CRYPTO_ALGAPI |
88 | select CRYPTO_AEAD | ||
89 | select CRYPTO_BLKCIPHER | ||
102 | help | 90 | help |
103 | SHA256 secure hash standard (DFIPS 180-2). | 91 | Quick & dirty crypto test module. |
104 | |||
105 | This version of SHA implements a 256 bit hash with 128 bits of | ||
106 | security against collision attacks. | ||
107 | 92 | ||
108 | This code also includes SHA-224, a 224 bit hash with 112 bits | 93 | comment "Authenticated Encryption with Associated Data" |
109 | of security against collision attacks. | ||
110 | 94 | ||
111 | config CRYPTO_SHA512 | 95 | config CRYPTO_CCM |
112 | tristate "SHA384 and SHA512 digest algorithms" | 96 | tristate "CCM support" |
113 | select CRYPTO_ALGAPI | 97 | select CRYPTO_CTR |
98 | select CRYPTO_AEAD | ||
114 | help | 99 | help |
115 | SHA512 secure hash standard (DFIPS 180-2). | 100 | Support for Counter with CBC MAC. Required for IPsec. |
116 | |||
117 | This version of SHA implements a 512 bit hash with 256 bits of | ||
118 | security against collision attacks. | ||
119 | |||
120 | This code also includes SHA-384, a 384 bit hash with 192 bits | ||
121 | of security against collision attacks. | ||
122 | 101 | ||
123 | config CRYPTO_WP512 | 102 | config CRYPTO_GCM |
124 | tristate "Whirlpool digest algorithms" | 103 | tristate "GCM/GMAC support" |
125 | select CRYPTO_ALGAPI | 104 | select CRYPTO_CTR |
105 | select CRYPTO_AEAD | ||
106 | select CRYPTO_GF128MUL | ||
126 | help | 107 | help |
127 | Whirlpool hash algorithm 512, 384 and 256-bit hashes | 108 | Support for Galois/Counter Mode (GCM) and Galois Message |
128 | 109 | Authentication Code (GMAC). Required for IPSec. | |
129 | Whirlpool-512 is part of the NESSIE cryptographic primitives. | ||
130 | Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard | ||
131 | |||
132 | See also: | ||
133 | <http://planeta.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html> | ||
134 | 110 | ||
135 | config CRYPTO_TGR192 | 111 | config CRYPTO_SEQIV |
136 | tristate "Tiger digest algorithms" | 112 | tristate "Sequence Number IV Generator" |
137 | select CRYPTO_ALGAPI | 113 | select CRYPTO_AEAD |
114 | select CRYPTO_BLKCIPHER | ||
138 | help | 115 | help |
139 | Tiger hash algorithm 192, 160 and 128-bit hashes | 116 | This IV generator generates an IV based on a sequence number by |
140 | 117 | xoring it with a salt. This algorithm is mainly useful for CTR | |
141 | Tiger is a hash function optimized for 64-bit processors while | ||
142 | still having decent performance on 32-bit processors. | ||
143 | Tiger was developed by Ross Anderson and Eli Biham. | ||
144 | |||
145 | See also: | ||
146 | <http://www.cs.technion.ac.il/~biham/Reports/Tiger/>. | ||
147 | 118 | ||
148 | config CRYPTO_GF128MUL | 119 | comment "Block modes" |
149 | tristate "GF(2^128) multiplication functions (EXPERIMENTAL)" | ||
150 | depends on EXPERIMENTAL | ||
151 | help | ||
152 | Efficient table driven implementation of multiplications in the | ||
153 | field GF(2^128). This is needed by some cypher modes. This | ||
154 | option will be selected automatically if you select such a | ||
155 | cipher mode. Only select this option by hand if you expect to load | ||
156 | an external module that requires these functions. | ||
157 | 120 | ||
158 | config CRYPTO_ECB | 121 | config CRYPTO_CBC |
159 | tristate "ECB support" | 122 | tristate "CBC support" |
160 | select CRYPTO_BLKCIPHER | 123 | select CRYPTO_BLKCIPHER |
161 | select CRYPTO_MANAGER | 124 | select CRYPTO_MANAGER |
162 | help | 125 | help |
163 | ECB: Electronic CodeBook mode | 126 | CBC: Cipher Block Chaining mode |
164 | This is the simplest block cipher algorithm. It simply encrypts | 127 | This block cipher algorithm is required for IPSec. |
165 | the input block by block. | ||
166 | 128 | ||
167 | config CRYPTO_CBC | 129 | config CRYPTO_CTR |
168 | tristate "CBC support" | 130 | tristate "CTR support" |
169 | select CRYPTO_BLKCIPHER | 131 | select CRYPTO_BLKCIPHER |
132 | select CRYPTO_SEQIV | ||
170 | select CRYPTO_MANAGER | 133 | select CRYPTO_MANAGER |
171 | help | 134 | help |
172 | CBC: Cipher Block Chaining mode | 135 | CTR: Counter mode |
173 | This block cipher algorithm is required for IPSec. | 136 | This block cipher algorithm is required for IPSec. |
174 | 137 | ||
175 | config CRYPTO_PCBC | 138 | config CRYPTO_CTS |
176 | tristate "PCBC support" | 139 | tristate "CTS support" |
140 | select CRYPTO_BLKCIPHER | ||
141 | help | ||
142 | CTS: Cipher Text Stealing | ||
143 | This is the Cipher Text Stealing mode as described by | ||
144 | Section 8 of rfc2040 and referenced by rfc3962. | ||
145 | (rfc3962 includes errata information in its Appendix A) | ||
146 | This mode is required for Kerberos gss mechanism support | ||
147 | for AES encryption. | ||
148 | |||
149 | config CRYPTO_ECB | ||
150 | tristate "ECB support" | ||
177 | select CRYPTO_BLKCIPHER | 151 | select CRYPTO_BLKCIPHER |
178 | select CRYPTO_MANAGER | 152 | select CRYPTO_MANAGER |
179 | help | 153 | help |
180 | PCBC: Propagating Cipher Block Chaining mode | 154 | ECB: Electronic CodeBook mode |
181 | This block cipher algorithm is required for RxRPC. | 155 | This is the simplest block cipher algorithm. It simply encrypts |
156 | the input block by block. | ||
182 | 157 | ||
183 | config CRYPTO_LRW | 158 | config CRYPTO_LRW |
184 | tristate "LRW support (EXPERIMENTAL)" | 159 | tristate "LRW support (EXPERIMENTAL)" |
@@ -193,6 +168,14 @@ config CRYPTO_LRW | |||
193 | The first 128, 192 or 256 bits in the key are used for AES and the | 168 | The first 128, 192 or 256 bits in the key are used for AES and the |
194 | rest is used to tie each cipher block to its logical position. | 169 | rest is used to tie each cipher block to its logical position. |
195 | 170 | ||
171 | config CRYPTO_PCBC | ||
172 | tristate "PCBC support" | ||
173 | select CRYPTO_BLKCIPHER | ||
174 | select CRYPTO_MANAGER | ||
175 | help | ||
176 | PCBC: Propagating Cipher Block Chaining mode | ||
177 | This block cipher algorithm is required for RxRPC. | ||
178 | |||
196 | config CRYPTO_XTS | 179 | config CRYPTO_XTS |
197 | tristate "XTS support (EXPERIMENTAL)" | 180 | tristate "XTS support (EXPERIMENTAL)" |
198 | depends on EXPERIMENTAL | 181 | depends on EXPERIMENTAL |
@@ -204,149 +187,134 @@ config CRYPTO_XTS | |||
204 | key size 256, 384 or 512 bits. This implementation currently | 187 | key size 256, 384 or 512 bits. This implementation currently |
205 | can't handle a sectorsize which is not a multiple of 16 bytes. | 188 | can't handle a sectorsize which is not a multiple of 16 bytes. |
206 | 189 | ||
207 | config CRYPTO_CTR | 190 | comment "Hash modes" |
208 | tristate "CTR support" | 191 | |
209 | select CRYPTO_BLKCIPHER | 192 | config CRYPTO_HMAC |
210 | select CRYPTO_SEQIV | 193 | tristate "HMAC support" |
194 | select CRYPTO_HASH | ||
211 | select CRYPTO_MANAGER | 195 | select CRYPTO_MANAGER |
212 | help | 196 | help |
213 | CTR: Counter mode | 197 | HMAC: Keyed-Hashing for Message Authentication (RFC2104). |
214 | This block cipher algorithm is required for IPSec. | 198 | This is required for IPSec. |
215 | 199 | ||
216 | config CRYPTO_GCM | 200 | config CRYPTO_XCBC |
217 | tristate "GCM/GMAC support" | 201 | tristate "XCBC support" |
218 | select CRYPTO_CTR | 202 | depends on EXPERIMENTAL |
219 | select CRYPTO_AEAD | 203 | select CRYPTO_HASH |
220 | select CRYPTO_GF128MUL | 204 | select CRYPTO_MANAGER |
221 | help | 205 | help |
222 | Support for Galois/Counter Mode (GCM) and Galois Message | 206 | XCBC: Keyed-Hashing with encryption algorithm |
223 | Authentication Code (GMAC). Required for IPSec. | 207 | http://www.ietf.org/rfc/rfc3566.txt |
208 | http://csrc.nist.gov/encryption/modes/proposedmodes/ | ||
209 | xcbc-mac/xcbc-mac-spec.pdf | ||
224 | 210 | ||
225 | config CRYPTO_CCM | 211 | comment "Digest" |
226 | tristate "CCM support" | ||
227 | select CRYPTO_CTR | ||
228 | select CRYPTO_AEAD | ||
229 | help | ||
230 | Support for Counter with CBC MAC. Required for IPsec. | ||
231 | 212 | ||
232 | config CRYPTO_CRYPTD | 213 | config CRYPTO_CRC32C |
233 | tristate "Software async crypto daemon" | 214 | tristate "CRC32c CRC algorithm" |
234 | select CRYPTO_BLKCIPHER | 215 | select CRYPTO_ALGAPI |
235 | select CRYPTO_MANAGER | 216 | select LIBCRC32C |
236 | help | 217 | help |
237 | This is a generic software asynchronous crypto daemon that | 218 | Castagnoli, et al Cyclic Redundancy-Check Algorithm. Used |
238 | converts an arbitrary synchronous software crypto algorithm | 219 | by iSCSI for header and data digests and by others. |
239 | into an asynchronous algorithm that executes in a kernel thread. | 220 | See Castagnoli93. This implementation uses lib/libcrc32c. |
221 | Module will be crc32c. | ||
240 | 222 | ||
241 | config CRYPTO_DES | 223 | config CRYPTO_MD4 |
242 | tristate "DES and Triple DES EDE cipher algorithms" | 224 | tristate "MD4 digest algorithm" |
243 | select CRYPTO_ALGAPI | 225 | select CRYPTO_ALGAPI |
244 | help | 226 | help |
245 | DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3). | 227 | MD4 message digest algorithm (RFC1320). |
246 | 228 | ||
247 | config CRYPTO_FCRYPT | 229 | config CRYPTO_MD5 |
248 | tristate "FCrypt cipher algorithm" | 230 | tristate "MD5 digest algorithm" |
249 | select CRYPTO_ALGAPI | 231 | select CRYPTO_ALGAPI |
250 | select CRYPTO_BLKCIPHER | ||
251 | help | 232 | help |
252 | FCrypt algorithm used by RxRPC. | 233 | MD5 message digest algorithm (RFC1321). |
253 | 234 | ||
254 | config CRYPTO_BLOWFISH | 235 | config CRYPTO_MICHAEL_MIC |
255 | tristate "Blowfish cipher algorithm" | 236 | tristate "Michael MIC keyed digest algorithm" |
256 | select CRYPTO_ALGAPI | 237 | select CRYPTO_ALGAPI |
257 | help | 238 | help |
258 | Blowfish cipher algorithm, by Bruce Schneier. | 239 | Michael MIC is used for message integrity protection in TKIP |
259 | 240 | (IEEE 802.11i). This algorithm is required for TKIP, but it | |
260 | This is a variable key length cipher which can use keys from 32 | 241 | should not be used for other purposes because of the weakness |
261 | bits to 448 bits in length. It's fast, simple and specifically | 242 | of the algorithm. |
262 | designed for use on "large microprocessors". | ||
263 | |||
264 | See also: | ||
265 | <http://www.schneier.com/blowfish.html> | ||
266 | 243 | ||
267 | config CRYPTO_TWOFISH | 244 | config CRYPTO_SHA1 |
268 | tristate "Twofish cipher algorithm" | 245 | tristate "SHA1 digest algorithm" |
269 | select CRYPTO_ALGAPI | 246 | select CRYPTO_ALGAPI |
270 | select CRYPTO_TWOFISH_COMMON | ||
271 | help | 247 | help |
272 | Twofish cipher algorithm. | 248 | SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2). |
273 | |||
274 | Twofish was submitted as an AES (Advanced Encryption Standard) | ||
275 | candidate cipher by researchers at CounterPane Systems. It is a | ||
276 | 16 round block cipher supporting key sizes of 128, 192, and 256 | ||
277 | bits. | ||
278 | |||
279 | See also: | ||
280 | <http://www.schneier.com/twofish.html> | ||
281 | 249 | ||
282 | config CRYPTO_TWOFISH_COMMON | 250 | config CRYPTO_SHA256 |
283 | tristate | 251 | tristate "SHA224 and SHA256 digest algorithm" |
252 | select CRYPTO_ALGAPI | ||
284 | help | 253 | help |
285 | Common parts of the Twofish cipher algorithm shared by the | 254 | SHA256 secure hash standard (DFIPS 180-2). |
286 | generic c and the assembler implementations. | ||
287 | 255 | ||
288 | config CRYPTO_TWOFISH_586 | 256 | This version of SHA implements a 256 bit hash with 128 bits of |
289 | tristate "Twofish cipher algorithms (i586)" | 257 | security against collision attacks. |
290 | depends on (X86 || UML_X86) && !64BIT | 258 | |
259 | This code also includes SHA-224, a 224 bit hash with 112 bits | ||
260 | of security against collision attacks. | ||
261 | |||
262 | config CRYPTO_SHA512 | ||
263 | tristate "SHA384 and SHA512 digest algorithms" | ||
291 | select CRYPTO_ALGAPI | 264 | select CRYPTO_ALGAPI |
292 | select CRYPTO_TWOFISH_COMMON | ||
293 | help | 265 | help |
294 | Twofish cipher algorithm. | 266 | SHA512 secure hash standard (DFIPS 180-2). |
295 | 267 | ||
296 | Twofish was submitted as an AES (Advanced Encryption Standard) | 268 | This version of SHA implements a 512 bit hash with 256 bits of |
297 | candidate cipher by researchers at CounterPane Systems. It is a | 269 | security against collision attacks. |
298 | 16 round block cipher supporting key sizes of 128, 192, and 256 | ||
299 | bits. | ||
300 | 270 | ||
301 | See also: | 271 | This code also includes SHA-384, a 384 bit hash with 192 bits |
302 | <http://www.schneier.com/twofish.html> | 272 | of security against collision attacks. |
303 | 273 | ||
304 | config CRYPTO_TWOFISH_X86_64 | 274 | config CRYPTO_TGR192 |
305 | tristate "Twofish cipher algorithm (x86_64)" | 275 | tristate "Tiger digest algorithms" |
306 | depends on (X86 || UML_X86) && 64BIT | ||
307 | select CRYPTO_ALGAPI | 276 | select CRYPTO_ALGAPI |
308 | select CRYPTO_TWOFISH_COMMON | ||
309 | help | 277 | help |
310 | Twofish cipher algorithm (x86_64). | 278 | Tiger hash algorithm 192, 160 and 128-bit hashes |
311 | 279 | ||
312 | Twofish was submitted as an AES (Advanced Encryption Standard) | 280 | Tiger is a hash function optimized for 64-bit processors while |
313 | candidate cipher by researchers at CounterPane Systems. It is a | 281 | still having decent performance on 32-bit processors. |
314 | 16 round block cipher supporting key sizes of 128, 192, and 256 | 282 | Tiger was developed by Ross Anderson and Eli Biham. |
315 | bits. | ||
316 | 283 | ||
317 | See also: | 284 | See also: |
318 | <http://www.schneier.com/twofish.html> | 285 | <http://www.cs.technion.ac.il/~biham/Reports/Tiger/>. |
319 | 286 | ||
320 | config CRYPTO_SERPENT | 287 | config CRYPTO_WP512 |
321 | tristate "Serpent cipher algorithm" | 288 | tristate "Whirlpool digest algorithms" |
322 | select CRYPTO_ALGAPI | 289 | select CRYPTO_ALGAPI |
323 | help | 290 | help |
324 | Serpent cipher algorithm, by Anderson, Biham & Knudsen. | 291 | Whirlpool hash algorithm 512, 384 and 256-bit hashes |
325 | 292 | ||
326 | Keys are allowed to be from 0 to 256 bits in length, in steps | 293 | Whirlpool-512 is part of the NESSIE cryptographic primitives. |
327 | of 8 bits. Also includes the 'Tnepres' algorithm, a reversed | 294 | Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard |
328 | variant of Serpent for compatibility with old kerneli.org code. | ||
329 | 295 | ||
330 | See also: | 296 | See also: |
331 | <http://www.cl.cam.ac.uk/~rja14/serpent.html> | 297 | <http://planeta.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html> |
298 | |||
299 | comment "Ciphers" | ||
332 | 300 | ||
333 | config CRYPTO_AES | 301 | config CRYPTO_AES |
334 | tristate "AES cipher algorithms" | 302 | tristate "AES cipher algorithms" |
335 | select CRYPTO_ALGAPI | 303 | select CRYPTO_ALGAPI |
336 | help | 304 | help |
337 | AES cipher algorithms (FIPS-197). AES uses the Rijndael | 305 | AES cipher algorithms (FIPS-197). AES uses the Rijndael |
338 | algorithm. | 306 | algorithm. |
339 | 307 | ||
340 | Rijndael appears to be consistently a very good performer in | 308 | Rijndael appears to be consistently a very good performer in |
341 | both hardware and software across a wide range of computing | 309 | both hardware and software across a wide range of computing |
342 | environments regardless of its use in feedback or non-feedback | 310 | environments regardless of its use in feedback or non-feedback |
343 | modes. Its key setup time is excellent, and its key agility is | 311 | modes. Its key setup time is excellent, and its key agility is |
344 | good. Rijndael's very low memory requirements make it very well | 312 | good. Rijndael's very low memory requirements make it very well |
345 | suited for restricted-space environments, in which it also | 313 | suited for restricted-space environments, in which it also |
346 | demonstrates excellent performance. Rijndael's operations are | 314 | demonstrates excellent performance. Rijndael's operations are |
347 | among the easiest to defend against power and timing attacks. | 315 | among the easiest to defend against power and timing attacks. |
348 | 316 | ||
349 | The AES specifies three key sizes: 128, 192 and 256 bits | 317 | The AES specifies three key sizes: 128, 192 and 256 bits |
350 | 318 | ||
351 | See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information. | 319 | See <http://csrc.nist.gov/CryptoToolkit/aes/> for more information. |
352 | 320 | ||
@@ -356,19 +324,19 @@ config CRYPTO_AES_586 | |||
356 | select CRYPTO_ALGAPI | 324 | select CRYPTO_ALGAPI |
357 | select CRYPTO_AES | 325 | select CRYPTO_AES |
358 | help | 326 | help |
359 | AES cipher algorithms (FIPS-197). AES uses the Rijndael | 327 | AES cipher algorithms (FIPS-197). AES uses the Rijndael |
360 | algorithm. | 328 | algorithm. |
361 | 329 | ||
362 | Rijndael appears to be consistently a very good performer in | 330 | Rijndael appears to be consistently a very good performer in |
363 | both hardware and software across a wide range of computing | 331 | both hardware and software across a wide range of computing |
364 | environments regardless of its use in feedback or non-feedback | 332 | environments regardless of its use in feedback or non-feedback |
365 | modes. Its key setup time is excellent, and its key agility is | 333 | modes. Its key setup time is excellent, and its key agility is |
366 | good. Rijndael's very low memory requirements make it very well | 334 | good. Rijndael's very low memory requirements make it very well |
367 | suited for restricted-space environments, in which it also | 335 | suited for restricted-space environments, in which it also |
368 | demonstrates excellent performance. Rijndael's operations are | 336 | demonstrates excellent performance. Rijndael's operations are |
369 | among the easiest to defend against power and timing attacks. | 337 | among the easiest to defend against power and timing attacks. |
370 | 338 | ||
371 | The AES specifies three key sizes: 128, 192 and 256 bits | 339 | The AES specifies three key sizes: 128, 192 and 256 bits |
372 | 340 | ||
373 | See <http://csrc.nist.gov/encryption/aes/> for more information. | 341 | See <http://csrc.nist.gov/encryption/aes/> for more information. |
374 | 342 | ||
@@ -378,22 +346,75 @@ config CRYPTO_AES_X86_64 | |||
378 | select CRYPTO_ALGAPI | 346 | select CRYPTO_ALGAPI |
379 | select CRYPTO_AES | 347 | select CRYPTO_AES |
380 | help | 348 | help |
381 | AES cipher algorithms (FIPS-197). AES uses the Rijndael | 349 | AES cipher algorithms (FIPS-197). AES uses the Rijndael |
382 | algorithm. | 350 | algorithm. |
383 | 351 | ||
384 | Rijndael appears to be consistently a very good performer in | 352 | Rijndael appears to be consistently a very good performer in |
385 | both hardware and software across a wide range of computing | 353 | both hardware and software across a wide range of computing |
386 | environments regardless of its use in feedback or non-feedback | 354 | environments regardless of its use in feedback or non-feedback |
387 | modes. Its key setup time is excellent, and its key agility is | 355 | modes. Its key setup time is excellent, and its key agility is |
388 | good. Rijndael's very low memory requirements make it very well | 356 | good. Rijndael's very low memory requirements make it very well |
389 | suited for restricted-space environments, in which it also | 357 | suited for restricted-space environments, in which it also |
390 | demonstrates excellent performance. Rijndael's operations are | 358 | demonstrates excellent performance. Rijndael's operations are |
391 | among the easiest to defend against power and timing attacks. | 359 | among the easiest to defend against power and timing attacks. |
392 | 360 | ||
393 | The AES specifies three key sizes: 128, 192 and 256 bits | 361 | The AES specifies three key sizes: 128, 192 and 256 bits |
394 | 362 | ||
395 | See <http://csrc.nist.gov/encryption/aes/> for more information. | 363 | See <http://csrc.nist.gov/encryption/aes/> for more information. |
396 | 364 | ||
365 | config CRYPTO_ANUBIS | ||
366 | tristate "Anubis cipher algorithm" | ||
367 | select CRYPTO_ALGAPI | ||
368 | help | ||
369 | Anubis cipher algorithm. | ||
370 | |||
371 | Anubis is a variable key length cipher which can use keys from | ||
372 | 128 bits to 320 bits in length. It was evaluated as a entrant | ||
373 | in the NESSIE competition. | ||
374 | |||
375 | See also: | ||
376 | <https://www.cosic.esat.kuleuven.ac.be/nessie/reports/> | ||
377 | <http://planeta.terra.com.br/informatica/paulobarreto/AnubisPage.html> | ||
378 | |||
379 | config CRYPTO_ARC4 | ||
380 | tristate "ARC4 cipher algorithm" | ||
381 | select CRYPTO_ALGAPI | ||
382 | help | ||
383 | ARC4 cipher algorithm. | ||
384 | |||
385 | ARC4 is a stream cipher using keys ranging from 8 bits to 2048 | ||
386 | bits in length. This algorithm is required for driver-based | ||
387 | WEP, but it should not be for other purposes because of the | ||
388 | weakness of the algorithm. | ||
389 | |||
390 | config CRYPTO_BLOWFISH | ||
391 | tristate "Blowfish cipher algorithm" | ||
392 | select CRYPTO_ALGAPI | ||
393 | help | ||
394 | Blowfish cipher algorithm, by Bruce Schneier. | ||
395 | |||
396 | This is a variable key length cipher which can use keys from 32 | ||
397 | bits to 448 bits in length. It's fast, simple and specifically | ||
398 | designed for use on "large microprocessors". | ||
399 | |||
400 | See also: | ||
401 | <http://www.schneier.com/blowfish.html> | ||
402 | |||
403 | config CRYPTO_CAMELLIA | ||
404 | tristate "Camellia cipher algorithms" | ||
405 | depends on CRYPTO | ||
406 | select CRYPTO_ALGAPI | ||
407 | help | ||
408 | Camellia cipher algorithms module. | ||
409 | |||
410 | Camellia is a symmetric key block cipher developed jointly | ||
411 | at NTT and Mitsubishi Electric Corporation. | ||
412 | |||
413 | The Camellia specifies three key sizes: 128, 192 and 256 bits. | ||
414 | |||
415 | See also: | ||
416 | <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html> | ||
417 | |||
397 | config CRYPTO_CAST5 | 418 | config CRYPTO_CAST5 |
398 | tristate "CAST5 (CAST-128) cipher algorithm" | 419 | tristate "CAST5 (CAST-128) cipher algorithm" |
399 | select CRYPTO_ALGAPI | 420 | select CRYPTO_ALGAPI |
@@ -408,33 +429,18 @@ config CRYPTO_CAST6 | |||
408 | The CAST6 encryption algorithm (synonymous with CAST-256) is | 429 | The CAST6 encryption algorithm (synonymous with CAST-256) is |
409 | described in RFC2612. | 430 | described in RFC2612. |
410 | 431 | ||
411 | config CRYPTO_TEA | 432 | config CRYPTO_DES |
412 | tristate "TEA, XTEA and XETA cipher algorithms" | 433 | tristate "DES and Triple DES EDE cipher algorithms" |
413 | select CRYPTO_ALGAPI | 434 | select CRYPTO_ALGAPI |
414 | help | 435 | help |
415 | TEA cipher algorithm. | 436 | DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3). |
416 | |||
417 | Tiny Encryption Algorithm is a simple cipher that uses | ||
418 | many rounds for security. It is very fast and uses | ||
419 | little memory. | ||
420 | |||
421 | Xtendend Tiny Encryption Algorithm is a modification to | ||
422 | the TEA algorithm to address a potential key weakness | ||
423 | in the TEA algorithm. | ||
424 | |||
425 | Xtendend Encryption Tiny Algorithm is a mis-implementation | ||
426 | of the XTEA algorithm for compatibility purposes. | ||
427 | 437 | ||
428 | config CRYPTO_ARC4 | 438 | config CRYPTO_FCRYPT |
429 | tristate "ARC4 cipher algorithm" | 439 | tristate "FCrypt cipher algorithm" |
430 | select CRYPTO_ALGAPI | 440 | select CRYPTO_ALGAPI |
441 | select CRYPTO_BLKCIPHER | ||
431 | help | 442 | help |
432 | ARC4 cipher algorithm. | 443 | FCrypt algorithm used by RxRPC. |
433 | |||
434 | ARC4 is a stream cipher using keys ranging from 8 bits to 2048 | ||
435 | bits in length. This algorithm is required for driver-based | ||
436 | WEP, but it should not be for other purposes because of the | ||
437 | weakness of the algorithm. | ||
438 | 444 | ||
439 | config CRYPTO_KHAZAD | 445 | config CRYPTO_KHAZAD |
440 | tristate "Khazad cipher algorithm" | 446 | tristate "Khazad cipher algorithm" |
@@ -449,34 +455,6 @@ config CRYPTO_KHAZAD | |||
449 | See also: | 455 | See also: |
450 | <http://planeta.terra.com.br/informatica/paulobarreto/KhazadPage.html> | 456 | <http://planeta.terra.com.br/informatica/paulobarreto/KhazadPage.html> |
451 | 457 | ||
452 | config CRYPTO_ANUBIS | ||
453 | tristate "Anubis cipher algorithm" | ||
454 | select CRYPTO_ALGAPI | ||
455 | help | ||
456 | Anubis cipher algorithm. | ||
457 | |||
458 | Anubis is a variable key length cipher which can use keys from | ||
459 | 128 bits to 320 bits in length. It was evaluated as a entrant | ||
460 | in the NESSIE competition. | ||
461 | |||
462 | See also: | ||
463 | <https://www.cosic.esat.kuleuven.ac.be/nessie/reports/> | ||
464 | <http://planeta.terra.com.br/informatica/paulobarreto/AnubisPage.html> | ||
465 | |||
466 | config CRYPTO_SEED | ||
467 | tristate "SEED cipher algorithm" | ||
468 | select CRYPTO_ALGAPI | ||
469 | help | ||
470 | SEED cipher algorithm (RFC4269). | ||
471 | |||
472 | SEED is a 128-bit symmetric key block cipher that has been | ||
473 | developed by KISA (Korea Information Security Agency) as a | ||
474 | national standard encryption algorithm of the Republic of Korea. | ||
475 | It is a 16 round block cipher with the key size of 128 bit. | ||
476 | |||
477 | See also: | ||
478 | <http://www.kisa.or.kr/kisa/seed/jsp/seed_eng.jsp> | ||
479 | |||
480 | config CRYPTO_SALSA20 | 458 | config CRYPTO_SALSA20 |
481 | tristate "Salsa20 stream cipher algorithm (EXPERIMENTAL)" | 459 | tristate "Salsa20 stream cipher algorithm (EXPERIMENTAL)" |
482 | depends on EXPERIMENTAL | 460 | depends on EXPERIMENTAL |
@@ -518,69 +496,115 @@ config CRYPTO_SALSA20_X86_64 | |||
518 | The Salsa20 stream cipher algorithm is designed by Daniel J. | 496 | The Salsa20 stream cipher algorithm is designed by Daniel J. |
519 | Bernstein <djb@cr.yp.to>. See <http://cr.yp.to/snuffle.html> | 497 | Bernstein <djb@cr.yp.to>. See <http://cr.yp.to/snuffle.html> |
520 | 498 | ||
521 | config CRYPTO_DEFLATE | 499 | config CRYPTO_SEED |
522 | tristate "Deflate compression algorithm" | 500 | tristate "SEED cipher algorithm" |
523 | select CRYPTO_ALGAPI | 501 | select CRYPTO_ALGAPI |
524 | select ZLIB_INFLATE | ||
525 | select ZLIB_DEFLATE | ||
526 | help | 502 | help |
527 | This is the Deflate algorithm (RFC1951), specified for use in | 503 | SEED cipher algorithm (RFC4269). |
528 | IPSec with the IPCOMP protocol (RFC3173, RFC2394). | ||
529 | |||
530 | You will most probably want this if using IPSec. | ||
531 | 504 | ||
532 | config CRYPTO_MICHAEL_MIC | 505 | SEED is a 128-bit symmetric key block cipher that has been |
533 | tristate "Michael MIC keyed digest algorithm" | 506 | developed by KISA (Korea Information Security Agency) as a |
507 | national standard encryption algorithm of the Republic of Korea. | ||
508 | It is a 16 round block cipher with the key size of 128 bit. | ||
509 | |||
510 | See also: | ||
511 | <http://www.kisa.or.kr/kisa/seed/jsp/seed_eng.jsp> | ||
512 | |||
513 | config CRYPTO_SERPENT | ||
514 | tristate "Serpent cipher algorithm" | ||
534 | select CRYPTO_ALGAPI | 515 | select CRYPTO_ALGAPI |
535 | help | 516 | help |
536 | Michael MIC is used for message integrity protection in TKIP | 517 | Serpent cipher algorithm, by Anderson, Biham & Knudsen. |
537 | (IEEE 802.11i). This algorithm is required for TKIP, but it | ||
538 | should not be used for other purposes because of the weakness | ||
539 | of the algorithm. | ||
540 | 518 | ||
541 | config CRYPTO_CRC32C | 519 | Keys are allowed to be from 0 to 256 bits in length, in steps |
542 | tristate "CRC32c CRC algorithm" | 520 | of 8 bits. Also includes the 'Tnepres' algorithm, a reversed |
521 | variant of Serpent for compatibility with old kerneli.org code. | ||
522 | |||
523 | See also: | ||
524 | <http://www.cl.cam.ac.uk/~rja14/serpent.html> | ||
525 | |||
526 | config CRYPTO_TEA | ||
527 | tristate "TEA, XTEA and XETA cipher algorithms" | ||
543 | select CRYPTO_ALGAPI | 528 | select CRYPTO_ALGAPI |
544 | select LIBCRC32C | ||
545 | help | 529 | help |
546 | Castagnoli, et al Cyclic Redundancy-Check Algorithm. Used | 530 | TEA cipher algorithm. |
547 | by iSCSI for header and data digests and by others. | ||
548 | See Castagnoli93. This implementation uses lib/libcrc32c. | ||
549 | Module will be crc32c. | ||
550 | 531 | ||
551 | config CRYPTO_CAMELLIA | 532 | Tiny Encryption Algorithm is a simple cipher that uses |
552 | tristate "Camellia cipher algorithms" | 533 | many rounds for security. It is very fast and uses |
553 | depends on CRYPTO | 534 | little memory. |
535 | |||
536 | Xtendend Tiny Encryption Algorithm is a modification to | ||
537 | the TEA algorithm to address a potential key weakness | ||
538 | in the TEA algorithm. | ||
539 | |||
540 | Xtendend Encryption Tiny Algorithm is a mis-implementation | ||
541 | of the XTEA algorithm for compatibility purposes. | ||
542 | |||
543 | config CRYPTO_TWOFISH | ||
544 | tristate "Twofish cipher algorithm" | ||
554 | select CRYPTO_ALGAPI | 545 | select CRYPTO_ALGAPI |
546 | select CRYPTO_TWOFISH_COMMON | ||
555 | help | 547 | help |
556 | Camellia cipher algorithms module. | 548 | Twofish cipher algorithm. |
557 | 549 | ||
558 | Camellia is a symmetric key block cipher developed jointly | 550 | Twofish was submitted as an AES (Advanced Encryption Standard) |
559 | at NTT and Mitsubishi Electric Corporation. | 551 | candidate cipher by researchers at CounterPane Systems. It is a |
552 | 16 round block cipher supporting key sizes of 128, 192, and 256 | ||
553 | bits. | ||
560 | 554 | ||
561 | The Camellia specifies three key sizes: 128, 192 and 256 bits. | 555 | See also: |
556 | <http://www.schneier.com/twofish.html> | ||
557 | |||
558 | config CRYPTO_TWOFISH_COMMON | ||
559 | tristate | ||
560 | help | ||
561 | Common parts of the Twofish cipher algorithm shared by the | ||
562 | generic c and the assembler implementations. | ||
563 | |||
564 | config CRYPTO_TWOFISH_586 | ||
565 | tristate "Twofish cipher algorithms (i586)" | ||
566 | depends on (X86 || UML_X86) && !64BIT | ||
567 | select CRYPTO_ALGAPI | ||
568 | select CRYPTO_TWOFISH_COMMON | ||
569 | help | ||
570 | Twofish cipher algorithm. | ||
571 | |||
572 | Twofish was submitted as an AES (Advanced Encryption Standard) | ||
573 | candidate cipher by researchers at CounterPane Systems. It is a | ||
574 | 16 round block cipher supporting key sizes of 128, 192, and 256 | ||
575 | bits. | ||
562 | 576 | ||
563 | See also: | 577 | See also: |
564 | <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html> | 578 | <http://www.schneier.com/twofish.html> |
565 | 579 | ||
566 | config CRYPTO_TEST | 580 | config CRYPTO_TWOFISH_X86_64 |
567 | tristate "Testing module" | 581 | tristate "Twofish cipher algorithm (x86_64)" |
568 | depends on m | 582 | depends on (X86 || UML_X86) && 64BIT |
569 | select CRYPTO_ALGAPI | 583 | select CRYPTO_ALGAPI |
570 | select CRYPTO_AEAD | 584 | select CRYPTO_TWOFISH_COMMON |
571 | select CRYPTO_BLKCIPHER | ||
572 | help | 585 | help |
573 | Quick & dirty crypto test module. | 586 | Twofish cipher algorithm (x86_64). |
574 | 587 | ||
575 | config CRYPTO_AUTHENC | 588 | Twofish was submitted as an AES (Advanced Encryption Standard) |
576 | tristate "Authenc support" | 589 | candidate cipher by researchers at CounterPane Systems. It is a |
577 | select CRYPTO_AEAD | 590 | 16 round block cipher supporting key sizes of 128, 192, and 256 |
578 | select CRYPTO_BLKCIPHER | 591 | bits. |
579 | select CRYPTO_MANAGER | 592 | |
580 | select CRYPTO_HASH | 593 | See also: |
594 | <http://www.schneier.com/twofish.html> | ||
595 | |||
596 | comment "Compression" | ||
597 | |||
598 | config CRYPTO_DEFLATE | ||
599 | tristate "Deflate compression algorithm" | ||
600 | select CRYPTO_ALGAPI | ||
601 | select ZLIB_INFLATE | ||
602 | select ZLIB_DEFLATE | ||
581 | help | 603 | help |
582 | Authenc: Combined mode wrapper for IPsec. | 604 | This is the Deflate algorithm (RFC1951), specified for use in |
583 | This is required for IPSec. | 605 | IPSec with the IPCOMP protocol (RFC3173, RFC2394). |
606 | |||
607 | You will most probably want this if using IPSec. | ||
584 | 608 | ||
585 | config CRYPTO_LZO | 609 | config CRYPTO_LZO |
586 | tristate "LZO compression algorithm" | 610 | tristate "LZO compression algorithm" |
diff --git a/crypto/Makefile b/crypto/Makefile index 7cf36253a75e..ca024418f4fb 100644 --- a/crypto/Makefile +++ b/crypto/Makefile | |||
@@ -2,7 +2,8 @@ | |||
2 | # Cryptographic API | 2 | # Cryptographic API |
3 | # | 3 | # |
4 | 4 | ||
5 | obj-$(CONFIG_CRYPTO) += api.o cipher.o digest.o compress.o | 5 | obj-$(CONFIG_CRYPTO) += crypto.o |
6 | crypto-objs := api.o cipher.o digest.o compress.o | ||
6 | 7 | ||
7 | crypto_algapi-$(CONFIG_PROC_FS) += proc.o | 8 | crypto_algapi-$(CONFIG_PROC_FS) += proc.o |
8 | crypto_algapi-objs := algapi.o scatterwalk.o $(crypto_algapi-y) | 9 | crypto_algapi-objs := algapi.o scatterwalk.o $(crypto_algapi-y) |
@@ -28,13 +29,14 @@ obj-$(CONFIG_CRYPTO_MD4) += md4.o | |||
28 | obj-$(CONFIG_CRYPTO_MD5) += md5.o | 29 | obj-$(CONFIG_CRYPTO_MD5) += md5.o |
29 | obj-$(CONFIG_CRYPTO_SHA1) += sha1_generic.o | 30 | obj-$(CONFIG_CRYPTO_SHA1) += sha1_generic.o |
30 | obj-$(CONFIG_CRYPTO_SHA256) += sha256_generic.o | 31 | obj-$(CONFIG_CRYPTO_SHA256) += sha256_generic.o |
31 | obj-$(CONFIG_CRYPTO_SHA512) += sha512.o | 32 | obj-$(CONFIG_CRYPTO_SHA512) += sha512_generic.o |
32 | obj-$(CONFIG_CRYPTO_WP512) += wp512.o | 33 | obj-$(CONFIG_CRYPTO_WP512) += wp512.o |
33 | obj-$(CONFIG_CRYPTO_TGR192) += tgr192.o | 34 | obj-$(CONFIG_CRYPTO_TGR192) += tgr192.o |
34 | obj-$(CONFIG_CRYPTO_GF128MUL) += gf128mul.o | 35 | obj-$(CONFIG_CRYPTO_GF128MUL) += gf128mul.o |
35 | obj-$(CONFIG_CRYPTO_ECB) += ecb.o | 36 | obj-$(CONFIG_CRYPTO_ECB) += ecb.o |
36 | obj-$(CONFIG_CRYPTO_CBC) += cbc.o | 37 | obj-$(CONFIG_CRYPTO_CBC) += cbc.o |
37 | obj-$(CONFIG_CRYPTO_PCBC) += pcbc.o | 38 | obj-$(CONFIG_CRYPTO_PCBC) += pcbc.o |
39 | obj-$(CONFIG_CRYPTO_CTS) += cts.o | ||
38 | obj-$(CONFIG_CRYPTO_LRW) += lrw.o | 40 | obj-$(CONFIG_CRYPTO_LRW) += lrw.o |
39 | obj-$(CONFIG_CRYPTO_XTS) += xts.o | 41 | obj-$(CONFIG_CRYPTO_XTS) += xts.o |
40 | obj-$(CONFIG_CRYPTO_CTR) += ctr.o | 42 | obj-$(CONFIG_CRYPTO_CTR) += ctr.o |
diff --git a/crypto/aes_generic.c b/crypto/aes_generic.c index cf30af74480f..136dc98d8a03 100644 --- a/crypto/aes_generic.c +++ b/crypto/aes_generic.c | |||
@@ -229,18 +229,29 @@ static void __init gen_tabs(void) | |||
229 | ctx->key_enc[8 * i + 15] = t; \ | 229 | ctx->key_enc[8 * i + 15] = t; \ |
230 | } while (0) | 230 | } while (0) |
231 | 231 | ||
232 | int crypto_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, | 232 | /** |
233 | * crypto_aes_expand_key - Expands the AES key as described in FIPS-197 | ||
234 | * @ctx: The location where the computed key will be stored. | ||
235 | * @in_key: The supplied key. | ||
236 | * @key_len: The length of the supplied key. | ||
237 | * | ||
238 | * Returns 0 on success. The function fails only if an invalid key size (or | ||
239 | * pointer) is supplied. | ||
240 | * The expanded key size is 240 bytes (max of 14 rounds with a unique 16 bytes | ||
241 | * key schedule plus a 16 bytes key which is used before the first round). | ||
242 | * The decryption key is prepared for the "Equivalent Inverse Cipher" as | ||
243 | * described in FIPS-197. The first slot (16 bytes) of each key (enc or dec) is | ||
244 | * for the initial combination, the second slot for the first round and so on. | ||
245 | */ | ||
246 | int crypto_aes_expand_key(struct crypto_aes_ctx *ctx, const u8 *in_key, | ||
233 | unsigned int key_len) | 247 | unsigned int key_len) |
234 | { | 248 | { |
235 | struct crypto_aes_ctx *ctx = crypto_tfm_ctx(tfm); | ||
236 | const __le32 *key = (const __le32 *)in_key; | 249 | const __le32 *key = (const __le32 *)in_key; |
237 | u32 *flags = &tfm->crt_flags; | ||
238 | u32 i, t, u, v, w, j; | 250 | u32 i, t, u, v, w, j; |
239 | 251 | ||
240 | if (key_len % 8) { | 252 | if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && |
241 | *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN; | 253 | key_len != AES_KEYSIZE_256) |
242 | return -EINVAL; | 254 | return -EINVAL; |
243 | } | ||
244 | 255 | ||
245 | ctx->key_length = key_len; | 256 | ctx->key_length = key_len; |
246 | 257 | ||
@@ -250,20 +261,20 @@ int crypto_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, | |||
250 | ctx->key_dec[key_len + 27] = ctx->key_enc[3] = le32_to_cpu(key[3]); | 261 | ctx->key_dec[key_len + 27] = ctx->key_enc[3] = le32_to_cpu(key[3]); |
251 | 262 | ||
252 | switch (key_len) { | 263 | switch (key_len) { |
253 | case 16: | 264 | case AES_KEYSIZE_128: |
254 | t = ctx->key_enc[3]; | 265 | t = ctx->key_enc[3]; |
255 | for (i = 0; i < 10; ++i) | 266 | for (i = 0; i < 10; ++i) |
256 | loop4(i); | 267 | loop4(i); |
257 | break; | 268 | break; |
258 | 269 | ||
259 | case 24: | 270 | case AES_KEYSIZE_192: |
260 | ctx->key_enc[4] = le32_to_cpu(key[4]); | 271 | ctx->key_enc[4] = le32_to_cpu(key[4]); |
261 | t = ctx->key_enc[5] = le32_to_cpu(key[5]); | 272 | t = ctx->key_enc[5] = le32_to_cpu(key[5]); |
262 | for (i = 0; i < 8; ++i) | 273 | for (i = 0; i < 8; ++i) |
263 | loop6(i); | 274 | loop6(i); |
264 | break; | 275 | break; |
265 | 276 | ||
266 | case 32: | 277 | case AES_KEYSIZE_256: |
267 | ctx->key_enc[4] = le32_to_cpu(key[4]); | 278 | ctx->key_enc[4] = le32_to_cpu(key[4]); |
268 | ctx->key_enc[5] = le32_to_cpu(key[5]); | 279 | ctx->key_enc[5] = le32_to_cpu(key[5]); |
269 | ctx->key_enc[6] = le32_to_cpu(key[6]); | 280 | ctx->key_enc[6] = le32_to_cpu(key[6]); |
@@ -284,6 +295,33 @@ int crypto_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, | |||
284 | } | 295 | } |
285 | return 0; | 296 | return 0; |
286 | } | 297 | } |
298 | EXPORT_SYMBOL_GPL(crypto_aes_expand_key); | ||
299 | |||
300 | /** | ||
301 | * crypto_aes_set_key - Set the AES key. | ||
302 | * @tfm: The %crypto_tfm that is used in the context. | ||
303 | * @in_key: The input key. | ||
304 | * @key_len: The size of the key. | ||
305 | * | ||
306 | * Returns 0 on success, on failure the %CRYPTO_TFM_RES_BAD_KEY_LEN flag in tfm | ||
307 | * is set. The function uses crypto_aes_expand_key() to expand the key. | ||
308 | * &crypto_aes_ctx _must_ be the private data embedded in @tfm which is | ||
309 | * retrieved with crypto_tfm_ctx(). | ||
310 | */ | ||
311 | int crypto_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, | ||
312 | unsigned int key_len) | ||
313 | { | ||
314 | struct crypto_aes_ctx *ctx = crypto_tfm_ctx(tfm); | ||
315 | u32 *flags = &tfm->crt_flags; | ||
316 | int ret; | ||
317 | |||
318 | ret = crypto_aes_expand_key(ctx, in_key, key_len); | ||
319 | if (!ret) | ||
320 | return 0; | ||
321 | |||
322 | *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN; | ||
323 | return -EINVAL; | ||
324 | } | ||
287 | EXPORT_SYMBOL_GPL(crypto_aes_set_key); | 325 | EXPORT_SYMBOL_GPL(crypto_aes_set_key); |
288 | 326 | ||
289 | /* encrypt a block of text */ | 327 | /* encrypt a block of text */ |
diff --git a/crypto/anubis.c b/crypto/anubis.c index 4ff0e1e243ad..e42c3a8ba4aa 100644 --- a/crypto/anubis.c +++ b/crypto/anubis.c | |||
@@ -687,7 +687,7 @@ static struct crypto_alg anubis_alg = { | |||
687 | .cia_decrypt = anubis_decrypt } } | 687 | .cia_decrypt = anubis_decrypt } } |
688 | }; | 688 | }; |
689 | 689 | ||
690 | static int __init init(void) | 690 | static int __init anubis_mod_init(void) |
691 | { | 691 | { |
692 | int ret = 0; | 692 | int ret = 0; |
693 | 693 | ||
@@ -695,13 +695,13 @@ static int __init init(void) | |||
695 | return ret; | 695 | return ret; |
696 | } | 696 | } |
697 | 697 | ||
698 | static void __exit fini(void) | 698 | static void __exit anubis_mod_fini(void) |
699 | { | 699 | { |
700 | crypto_unregister_alg(&anubis_alg); | 700 | crypto_unregister_alg(&anubis_alg); |
701 | } | 701 | } |
702 | 702 | ||
703 | module_init(init); | 703 | module_init(anubis_mod_init); |
704 | module_exit(fini); | 704 | module_exit(anubis_mod_fini); |
705 | 705 | ||
706 | MODULE_LICENSE("GPL"); | 706 | MODULE_LICENSE("GPL"); |
707 | MODULE_DESCRIPTION("Anubis Cryptographic Algorithm"); | 707 | MODULE_DESCRIPTION("Anubis Cryptographic Algorithm"); |
diff --git a/crypto/api.c b/crypto/api.c index a2496d1bc6d4..0a0f41ef255f 100644 --- a/crypto/api.c +++ b/crypto/api.c | |||
@@ -445,3 +445,6 @@ int crypto_has_alg(const char *name, u32 type, u32 mask) | |||
445 | return ret; | 445 | return ret; |
446 | } | 446 | } |
447 | EXPORT_SYMBOL_GPL(crypto_has_alg); | 447 | EXPORT_SYMBOL_GPL(crypto_has_alg); |
448 | |||
449 | MODULE_DESCRIPTION("Cryptographic core API"); | ||
450 | MODULE_LICENSE("GPL"); | ||
diff --git a/crypto/blowfish.c b/crypto/blowfish.c index 80c3fd8be97c..6f5b48731922 100644 --- a/crypto/blowfish.c +++ b/crypto/blowfish.c | |||
@@ -465,18 +465,18 @@ static struct crypto_alg alg = { | |||
465 | .cia_decrypt = bf_decrypt } } | 465 | .cia_decrypt = bf_decrypt } } |
466 | }; | 466 | }; |
467 | 467 | ||
468 | static int __init init(void) | 468 | static int __init blowfish_mod_init(void) |
469 | { | 469 | { |
470 | return crypto_register_alg(&alg); | 470 | return crypto_register_alg(&alg); |
471 | } | 471 | } |
472 | 472 | ||
473 | static void __exit fini(void) | 473 | static void __exit blowfish_mod_fini(void) |
474 | { | 474 | { |
475 | crypto_unregister_alg(&alg); | 475 | crypto_unregister_alg(&alg); |
476 | } | 476 | } |
477 | 477 | ||
478 | module_init(init); | 478 | module_init(blowfish_mod_init); |
479 | module_exit(fini); | 479 | module_exit(blowfish_mod_fini); |
480 | 480 | ||
481 | MODULE_LICENSE("GPL"); | 481 | MODULE_LICENSE("GPL"); |
482 | MODULE_DESCRIPTION("Blowfish Cipher Algorithm"); | 482 | MODULE_DESCRIPTION("Blowfish Cipher Algorithm"); |
diff --git a/crypto/cast5.c b/crypto/cast5.c index 13ea60abc19a..8cbe28fa0e0c 100644 --- a/crypto/cast5.c +++ b/crypto/cast5.c | |||
@@ -817,18 +817,18 @@ static struct crypto_alg alg = { | |||
817 | } | 817 | } |
818 | }; | 818 | }; |
819 | 819 | ||
820 | static int __init init(void) | 820 | static int __init cast5_mod_init(void) |
821 | { | 821 | { |
822 | return crypto_register_alg(&alg); | 822 | return crypto_register_alg(&alg); |
823 | } | 823 | } |
824 | 824 | ||
825 | static void __exit fini(void) | 825 | static void __exit cast5_mod_fini(void) |
826 | { | 826 | { |
827 | crypto_unregister_alg(&alg); | 827 | crypto_unregister_alg(&alg); |
828 | } | 828 | } |
829 | 829 | ||
830 | module_init(init); | 830 | module_init(cast5_mod_init); |
831 | module_exit(fini); | 831 | module_exit(cast5_mod_fini); |
832 | 832 | ||
833 | MODULE_LICENSE("GPL"); | 833 | MODULE_LICENSE("GPL"); |
834 | MODULE_DESCRIPTION("Cast5 Cipher Algorithm"); | 834 | MODULE_DESCRIPTION("Cast5 Cipher Algorithm"); |
diff --git a/crypto/cast6.c b/crypto/cast6.c index 5fd9420dc58e..007d02beed67 100644 --- a/crypto/cast6.c +++ b/crypto/cast6.c | |||
@@ -528,18 +528,18 @@ static struct crypto_alg alg = { | |||
528 | } | 528 | } |
529 | }; | 529 | }; |
530 | 530 | ||
531 | static int __init init(void) | 531 | static int __init cast6_mod_init(void) |
532 | { | 532 | { |
533 | return crypto_register_alg(&alg); | 533 | return crypto_register_alg(&alg); |
534 | } | 534 | } |
535 | 535 | ||
536 | static void __exit fini(void) | 536 | static void __exit cast6_mod_fini(void) |
537 | { | 537 | { |
538 | crypto_unregister_alg(&alg); | 538 | crypto_unregister_alg(&alg); |
539 | } | 539 | } |
540 | 540 | ||
541 | module_init(init); | 541 | module_init(cast6_mod_init); |
542 | module_exit(fini); | 542 | module_exit(cast6_mod_fini); |
543 | 543 | ||
544 | MODULE_LICENSE("GPL"); | 544 | MODULE_LICENSE("GPL"); |
545 | MODULE_DESCRIPTION("Cast6 Cipher Algorithm"); | 545 | MODULE_DESCRIPTION("Cast6 Cipher Algorithm"); |
diff --git a/crypto/crc32c.c b/crypto/crc32c.c index 0fa744392a4c..0dcf64a74e68 100644 --- a/crypto/crc32c.c +++ b/crypto/crc32c.c | |||
@@ -98,18 +98,18 @@ static struct crypto_alg alg = { | |||
98 | } | 98 | } |
99 | }; | 99 | }; |
100 | 100 | ||
101 | static int __init init(void) | 101 | static int __init crc32c_mod_init(void) |
102 | { | 102 | { |
103 | return crypto_register_alg(&alg); | 103 | return crypto_register_alg(&alg); |
104 | } | 104 | } |
105 | 105 | ||
106 | static void __exit fini(void) | 106 | static void __exit crc32c_mod_fini(void) |
107 | { | 107 | { |
108 | crypto_unregister_alg(&alg); | 108 | crypto_unregister_alg(&alg); |
109 | } | 109 | } |
110 | 110 | ||
111 | module_init(init); | 111 | module_init(crc32c_mod_init); |
112 | module_exit(fini); | 112 | module_exit(crc32c_mod_fini); |
113 | 113 | ||
114 | MODULE_AUTHOR("Clay Haapala <chaapala@cisco.com>"); | 114 | MODULE_AUTHOR("Clay Haapala <chaapala@cisco.com>"); |
115 | MODULE_DESCRIPTION("CRC32c (Castagnoli) calculations wrapper for lib/crc32c"); | 115 | MODULE_DESCRIPTION("CRC32c (Castagnoli) calculations wrapper for lib/crc32c"); |
diff --git a/crypto/crypto_null.c b/crypto/crypto_null.c index ff7b3de1bcfd..1f7d53013a22 100644 --- a/crypto/crypto_null.c +++ b/crypto/crypto_null.c | |||
@@ -142,7 +142,7 @@ MODULE_ALIAS("compress_null"); | |||
142 | MODULE_ALIAS("digest_null"); | 142 | MODULE_ALIAS("digest_null"); |
143 | MODULE_ALIAS("cipher_null"); | 143 | MODULE_ALIAS("cipher_null"); |
144 | 144 | ||
145 | static int __init init(void) | 145 | static int __init crypto_null_mod_init(void) |
146 | { | 146 | { |
147 | int ret = 0; | 147 | int ret = 0; |
148 | 148 | ||
@@ -174,7 +174,7 @@ out_unregister_cipher: | |||
174 | goto out; | 174 | goto out; |
175 | } | 175 | } |
176 | 176 | ||
177 | static void __exit fini(void) | 177 | static void __exit crypto_null_mod_fini(void) |
178 | { | 178 | { |
179 | crypto_unregister_alg(&compress_null); | 179 | crypto_unregister_alg(&compress_null); |
180 | crypto_unregister_alg(&digest_null); | 180 | crypto_unregister_alg(&digest_null); |
@@ -182,8 +182,8 @@ static void __exit fini(void) | |||
182 | crypto_unregister_alg(&cipher_null); | 182 | crypto_unregister_alg(&cipher_null); |
183 | } | 183 | } |
184 | 184 | ||
185 | module_init(init); | 185 | module_init(crypto_null_mod_init); |
186 | module_exit(fini); | 186 | module_exit(crypto_null_mod_fini); |
187 | 187 | ||
188 | MODULE_LICENSE("GPL"); | 188 | MODULE_LICENSE("GPL"); |
189 | MODULE_DESCRIPTION("Null Cryptographic Algorithms"); | 189 | MODULE_DESCRIPTION("Null Cryptographic Algorithms"); |
diff --git a/crypto/cts.c b/crypto/cts.c new file mode 100644 index 000000000000..c4e70bfb4970 --- /dev/null +++ b/crypto/cts.c | |||
@@ -0,0 +1,347 @@ | |||
1 | /* | ||
2 | * CTS: Cipher Text Stealing mode | ||
3 | * | ||
4 | * COPYRIGHT (c) 2008 | ||
5 | * The Regents of the University of Michigan | ||
6 | * ALL RIGHTS RESERVED | ||
7 | * | ||
8 | * Permission is granted to use, copy, create derivative works | ||
9 | * and redistribute this software and such derivative works | ||
10 | * for any purpose, so long as the name of The University of | ||
11 | * Michigan is not used in any advertising or publicity | ||
12 | * pertaining to the use of distribution of this software | ||
13 | * without specific, written prior authorization. If the | ||
14 | * above copyright notice or any other identification of the | ||
15 | * University of Michigan is included in any copy of any | ||
16 | * portion of this software, then the disclaimer below must | ||
17 | * also be included. | ||
18 | * | ||
19 | * THIS SOFTWARE IS PROVIDED AS IS, WITHOUT REPRESENTATION | ||
20 | * FROM THE UNIVERSITY OF MICHIGAN AS TO ITS FITNESS FOR ANY | ||
21 | * PURPOSE, AND WITHOUT WARRANTY BY THE UNIVERSITY OF | ||
22 | * MICHIGAN OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING | ||
23 | * WITHOUT LIMITATION THE IMPLIED WARRANTIES OF | ||
24 | * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE | ||
25 | * REGENTS OF THE UNIVERSITY OF MICHIGAN SHALL NOT BE LIABLE | ||
26 | * FOR ANY DAMAGES, INCLUDING SPECIAL, INDIRECT, INCIDENTAL, OR | ||
27 | * CONSEQUENTIAL DAMAGES, WITH RESPECT TO ANY CLAIM ARISING | ||
28 | * OUT OF OR IN CONNECTION WITH THE USE OF THE SOFTWARE, EVEN | ||
29 | * IF IT HAS BEEN OR IS HEREAFTER ADVISED OF THE POSSIBILITY OF | ||
30 | * SUCH DAMAGES. | ||
31 | */ | ||
32 | |||
33 | /* Derived from various: | ||
34 | * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au> | ||
35 | */ | ||
36 | |||
37 | /* | ||
38 | * This is the Cipher Text Stealing mode as described by | ||
39 | * Section 8 of rfc2040 and referenced by rfc3962. | ||
40 | * rfc3962 includes errata information in its Appendix A. | ||
41 | */ | ||
42 | |||
43 | #include <crypto/algapi.h> | ||
44 | #include <linux/err.h> | ||
45 | #include <linux/init.h> | ||
46 | #include <linux/kernel.h> | ||
47 | #include <linux/log2.h> | ||
48 | #include <linux/module.h> | ||
49 | #include <linux/scatterlist.h> | ||
50 | #include <crypto/scatterwalk.h> | ||
51 | #include <linux/slab.h> | ||
52 | |||
53 | struct crypto_cts_ctx { | ||
54 | struct crypto_blkcipher *child; | ||
55 | }; | ||
56 | |||
57 | static int crypto_cts_setkey(struct crypto_tfm *parent, const u8 *key, | ||
58 | unsigned int keylen) | ||
59 | { | ||
60 | struct crypto_cts_ctx *ctx = crypto_tfm_ctx(parent); | ||
61 | struct crypto_blkcipher *child = ctx->child; | ||
62 | int err; | ||
63 | |||
64 | crypto_blkcipher_clear_flags(child, CRYPTO_TFM_REQ_MASK); | ||
65 | crypto_blkcipher_set_flags(child, crypto_tfm_get_flags(parent) & | ||
66 | CRYPTO_TFM_REQ_MASK); | ||
67 | err = crypto_blkcipher_setkey(child, key, keylen); | ||
68 | crypto_tfm_set_flags(parent, crypto_blkcipher_get_flags(child) & | ||
69 | CRYPTO_TFM_RES_MASK); | ||
70 | return err; | ||
71 | } | ||
72 | |||
73 | static int cts_cbc_encrypt(struct crypto_cts_ctx *ctx, | ||
74 | struct blkcipher_desc *desc, | ||
75 | struct scatterlist *dst, | ||
76 | struct scatterlist *src, | ||
77 | unsigned int offset, | ||
78 | unsigned int nbytes) | ||
79 | { | ||
80 | int bsize = crypto_blkcipher_blocksize(desc->tfm); | ||
81 | u8 tmp[bsize], tmp2[bsize]; | ||
82 | struct blkcipher_desc lcldesc; | ||
83 | struct scatterlist sgsrc[1], sgdst[1]; | ||
84 | int lastn = nbytes - bsize; | ||
85 | u8 iv[bsize]; | ||
86 | u8 s[bsize * 2], d[bsize * 2]; | ||
87 | int err; | ||
88 | |||
89 | if (lastn < 0) | ||
90 | return -EINVAL; | ||
91 | |||
92 | memset(s, 0, sizeof(s)); | ||
93 | scatterwalk_map_and_copy(s, src, offset, nbytes, 0); | ||
94 | |||
95 | memcpy(iv, desc->info, bsize); | ||
96 | |||
97 | lcldesc.tfm = ctx->child; | ||
98 | lcldesc.info = iv; | ||
99 | lcldesc.flags = desc->flags; | ||
100 | |||
101 | sg_set_buf(&sgsrc[0], s, bsize); | ||
102 | sg_set_buf(&sgdst[0], tmp, bsize); | ||
103 | err = crypto_blkcipher_encrypt_iv(&lcldesc, sgdst, sgsrc, bsize); | ||
104 | |||
105 | memcpy(d + bsize, tmp, lastn); | ||
106 | |||
107 | lcldesc.info = tmp; | ||
108 | |||
109 | sg_set_buf(&sgsrc[0], s + bsize, bsize); | ||
110 | sg_set_buf(&sgdst[0], tmp2, bsize); | ||
111 | err = crypto_blkcipher_encrypt_iv(&lcldesc, sgdst, sgsrc, bsize); | ||
112 | |||
113 | memcpy(d, tmp2, bsize); | ||
114 | |||
115 | scatterwalk_map_and_copy(d, dst, offset, nbytes, 1); | ||
116 | |||
117 | memcpy(desc->info, tmp2, bsize); | ||
118 | |||
119 | return err; | ||
120 | } | ||
121 | |||
122 | static int crypto_cts_encrypt(struct blkcipher_desc *desc, | ||
123 | struct scatterlist *dst, struct scatterlist *src, | ||
124 | unsigned int nbytes) | ||
125 | { | ||
126 | struct crypto_cts_ctx *ctx = crypto_blkcipher_ctx(desc->tfm); | ||
127 | int bsize = crypto_blkcipher_blocksize(desc->tfm); | ||
128 | int tot_blocks = (nbytes + bsize - 1) / bsize; | ||
129 | int cbc_blocks = tot_blocks > 2 ? tot_blocks - 2 : 0; | ||
130 | struct blkcipher_desc lcldesc; | ||
131 | int err; | ||
132 | |||
133 | lcldesc.tfm = ctx->child; | ||
134 | lcldesc.info = desc->info; | ||
135 | lcldesc.flags = desc->flags; | ||
136 | |||
137 | if (tot_blocks == 1) { | ||
138 | err = crypto_blkcipher_encrypt_iv(&lcldesc, dst, src, bsize); | ||
139 | } else if (nbytes <= bsize * 2) { | ||
140 | err = cts_cbc_encrypt(ctx, desc, dst, src, 0, nbytes); | ||
141 | } else { | ||
142 | /* do normal function for tot_blocks - 2 */ | ||
143 | err = crypto_blkcipher_encrypt_iv(&lcldesc, dst, src, | ||
144 | cbc_blocks * bsize); | ||
145 | if (err == 0) { | ||
146 | /* do cts for final two blocks */ | ||
147 | err = cts_cbc_encrypt(ctx, desc, dst, src, | ||
148 | cbc_blocks * bsize, | ||
149 | nbytes - (cbc_blocks * bsize)); | ||
150 | } | ||
151 | } | ||
152 | |||
153 | return err; | ||
154 | } | ||
155 | |||
156 | static int cts_cbc_decrypt(struct crypto_cts_ctx *ctx, | ||
157 | struct blkcipher_desc *desc, | ||
158 | struct scatterlist *dst, | ||
159 | struct scatterlist *src, | ||
160 | unsigned int offset, | ||
161 | unsigned int nbytes) | ||
162 | { | ||
163 | int bsize = crypto_blkcipher_blocksize(desc->tfm); | ||
164 | u8 tmp[bsize]; | ||
165 | struct blkcipher_desc lcldesc; | ||
166 | struct scatterlist sgsrc[1], sgdst[1]; | ||
167 | int lastn = nbytes - bsize; | ||
168 | u8 iv[bsize]; | ||
169 | u8 s[bsize * 2], d[bsize * 2]; | ||
170 | int err; | ||
171 | |||
172 | if (lastn < 0) | ||
173 | return -EINVAL; | ||
174 | |||
175 | scatterwalk_map_and_copy(s, src, offset, nbytes, 0); | ||
176 | |||
177 | lcldesc.tfm = ctx->child; | ||
178 | lcldesc.info = iv; | ||
179 | lcldesc.flags = desc->flags; | ||
180 | |||
181 | /* 1. Decrypt Cn-1 (s) to create Dn (tmp)*/ | ||
182 | memset(iv, 0, sizeof(iv)); | ||
183 | sg_set_buf(&sgsrc[0], s, bsize); | ||
184 | sg_set_buf(&sgdst[0], tmp, bsize); | ||
185 | err = crypto_blkcipher_decrypt_iv(&lcldesc, sgdst, sgsrc, bsize); | ||
186 | if (err) | ||
187 | return err; | ||
188 | /* 2. Pad Cn with zeros at the end to create C of length BB */ | ||
189 | memset(iv, 0, sizeof(iv)); | ||
190 | memcpy(iv, s + bsize, lastn); | ||
191 | /* 3. Exclusive-or Dn (tmp) with C (iv) to create Xn (tmp) */ | ||
192 | crypto_xor(tmp, iv, bsize); | ||
193 | /* 4. Select the first Ln bytes of Xn (tmp) to create Pn */ | ||
194 | memcpy(d + bsize, tmp, lastn); | ||
195 | |||
196 | /* 5. Append the tail (BB - Ln) bytes of Xn (tmp) to Cn to create En */ | ||
197 | memcpy(s + bsize + lastn, tmp + lastn, bsize - lastn); | ||
198 | /* 6. Decrypt En to create Pn-1 */ | ||
199 | memset(iv, 0, sizeof(iv)); | ||
200 | sg_set_buf(&sgsrc[0], s + bsize, bsize); | ||
201 | sg_set_buf(&sgdst[0], d, bsize); | ||
202 | err = crypto_blkcipher_decrypt_iv(&lcldesc, sgdst, sgsrc, bsize); | ||
203 | |||
204 | /* XOR with previous block */ | ||
205 | crypto_xor(d, desc->info, bsize); | ||
206 | |||
207 | scatterwalk_map_and_copy(d, dst, offset, nbytes, 1); | ||
208 | |||
209 | memcpy(desc->info, s, bsize); | ||
210 | return err; | ||
211 | } | ||
212 | |||
213 | static int crypto_cts_decrypt(struct blkcipher_desc *desc, | ||
214 | struct scatterlist *dst, struct scatterlist *src, | ||
215 | unsigned int nbytes) | ||
216 | { | ||
217 | struct crypto_cts_ctx *ctx = crypto_blkcipher_ctx(desc->tfm); | ||
218 | int bsize = crypto_blkcipher_blocksize(desc->tfm); | ||
219 | int tot_blocks = (nbytes + bsize - 1) / bsize; | ||
220 | int cbc_blocks = tot_blocks > 2 ? tot_blocks - 2 : 0; | ||
221 | struct blkcipher_desc lcldesc; | ||
222 | int err; | ||
223 | |||
224 | lcldesc.tfm = ctx->child; | ||
225 | lcldesc.info = desc->info; | ||
226 | lcldesc.flags = desc->flags; | ||
227 | |||
228 | if (tot_blocks == 1) { | ||
229 | err = crypto_blkcipher_decrypt_iv(&lcldesc, dst, src, bsize); | ||
230 | } else if (nbytes <= bsize * 2) { | ||
231 | err = cts_cbc_decrypt(ctx, desc, dst, src, 0, nbytes); | ||
232 | } else { | ||
233 | /* do normal function for tot_blocks - 2 */ | ||
234 | err = crypto_blkcipher_decrypt_iv(&lcldesc, dst, src, | ||
235 | cbc_blocks * bsize); | ||
236 | if (err == 0) { | ||
237 | /* do cts for final two blocks */ | ||
238 | err = cts_cbc_decrypt(ctx, desc, dst, src, | ||
239 | cbc_blocks * bsize, | ||
240 | nbytes - (cbc_blocks * bsize)); | ||
241 | } | ||
242 | } | ||
243 | return err; | ||
244 | } | ||
245 | |||
246 | static int crypto_cts_init_tfm(struct crypto_tfm *tfm) | ||
247 | { | ||
248 | struct crypto_instance *inst = (void *)tfm->__crt_alg; | ||
249 | struct crypto_spawn *spawn = crypto_instance_ctx(inst); | ||
250 | struct crypto_cts_ctx *ctx = crypto_tfm_ctx(tfm); | ||
251 | struct crypto_blkcipher *cipher; | ||
252 | |||
253 | cipher = crypto_spawn_blkcipher(spawn); | ||
254 | if (IS_ERR(cipher)) | ||
255 | return PTR_ERR(cipher); | ||
256 | |||
257 | ctx->child = cipher; | ||
258 | return 0; | ||
259 | } | ||
260 | |||
261 | static void crypto_cts_exit_tfm(struct crypto_tfm *tfm) | ||
262 | { | ||
263 | struct crypto_cts_ctx *ctx = crypto_tfm_ctx(tfm); | ||
264 | crypto_free_blkcipher(ctx->child); | ||
265 | } | ||
266 | |||
267 | static struct crypto_instance *crypto_cts_alloc(struct rtattr **tb) | ||
268 | { | ||
269 | struct crypto_instance *inst; | ||
270 | struct crypto_alg *alg; | ||
271 | int err; | ||
272 | |||
273 | err = crypto_check_attr_type(tb, CRYPTO_ALG_TYPE_BLKCIPHER); | ||
274 | if (err) | ||
275 | return ERR_PTR(err); | ||
276 | |||
277 | alg = crypto_attr_alg(tb[1], CRYPTO_ALG_TYPE_BLKCIPHER, | ||
278 | CRYPTO_ALG_TYPE_MASK); | ||
279 | err = PTR_ERR(alg); | ||
280 | if (IS_ERR(alg)) | ||
281 | return ERR_PTR(err); | ||
282 | |||
283 | inst = ERR_PTR(-EINVAL); | ||
284 | if (!is_power_of_2(alg->cra_blocksize)) | ||
285 | goto out_put_alg; | ||
286 | |||
287 | inst = crypto_alloc_instance("cts", alg); | ||
288 | if (IS_ERR(inst)) | ||
289 | goto out_put_alg; | ||
290 | |||
291 | inst->alg.cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER; | ||
292 | inst->alg.cra_priority = alg->cra_priority; | ||
293 | inst->alg.cra_blocksize = alg->cra_blocksize; | ||
294 | inst->alg.cra_alignmask = alg->cra_alignmask; | ||
295 | inst->alg.cra_type = &crypto_blkcipher_type; | ||
296 | |||
297 | /* We access the data as u32s when xoring. */ | ||
298 | inst->alg.cra_alignmask |= __alignof__(u32) - 1; | ||
299 | |||
300 | inst->alg.cra_blkcipher.ivsize = alg->cra_blocksize; | ||
301 | inst->alg.cra_blkcipher.min_keysize = alg->cra_blkcipher.min_keysize; | ||
302 | inst->alg.cra_blkcipher.max_keysize = alg->cra_blkcipher.max_keysize; | ||
303 | |||
304 | inst->alg.cra_blkcipher.geniv = "seqiv"; | ||
305 | |||
306 | inst->alg.cra_ctxsize = sizeof(struct crypto_cts_ctx); | ||
307 | |||
308 | inst->alg.cra_init = crypto_cts_init_tfm; | ||
309 | inst->alg.cra_exit = crypto_cts_exit_tfm; | ||
310 | |||
311 | inst->alg.cra_blkcipher.setkey = crypto_cts_setkey; | ||
312 | inst->alg.cra_blkcipher.encrypt = crypto_cts_encrypt; | ||
313 | inst->alg.cra_blkcipher.decrypt = crypto_cts_decrypt; | ||
314 | |||
315 | out_put_alg: | ||
316 | crypto_mod_put(alg); | ||
317 | return inst; | ||
318 | } | ||
319 | |||
320 | static void crypto_cts_free(struct crypto_instance *inst) | ||
321 | { | ||
322 | crypto_drop_spawn(crypto_instance_ctx(inst)); | ||
323 | kfree(inst); | ||
324 | } | ||
325 | |||
326 | static struct crypto_template crypto_cts_tmpl = { | ||
327 | .name = "cts", | ||
328 | .alloc = crypto_cts_alloc, | ||
329 | .free = crypto_cts_free, | ||
330 | .module = THIS_MODULE, | ||
331 | }; | ||
332 | |||
333 | static int __init crypto_cts_module_init(void) | ||
334 | { | ||
335 | return crypto_register_template(&crypto_cts_tmpl); | ||
336 | } | ||
337 | |||
338 | static void __exit crypto_cts_module_exit(void) | ||
339 | { | ||
340 | crypto_unregister_template(&crypto_cts_tmpl); | ||
341 | } | ||
342 | |||
343 | module_init(crypto_cts_module_init); | ||
344 | module_exit(crypto_cts_module_exit); | ||
345 | |||
346 | MODULE_LICENSE("Dual BSD/GPL"); | ||
347 | MODULE_DESCRIPTION("CTS-CBC CipherText Stealing for CBC"); | ||
diff --git a/crypto/deflate.c b/crypto/deflate.c index 6588bbf82e9b..9128da44e953 100644 --- a/crypto/deflate.c +++ b/crypto/deflate.c | |||
@@ -208,18 +208,18 @@ static struct crypto_alg alg = { | |||
208 | .coa_decompress = deflate_decompress } } | 208 | .coa_decompress = deflate_decompress } } |
209 | }; | 209 | }; |
210 | 210 | ||
211 | static int __init init(void) | 211 | static int __init deflate_mod_init(void) |
212 | { | 212 | { |
213 | return crypto_register_alg(&alg); | 213 | return crypto_register_alg(&alg); |
214 | } | 214 | } |
215 | 215 | ||
216 | static void __exit fini(void) | 216 | static void __exit deflate_mod_fini(void) |
217 | { | 217 | { |
218 | crypto_unregister_alg(&alg); | 218 | crypto_unregister_alg(&alg); |
219 | } | 219 | } |
220 | 220 | ||
221 | module_init(init); | 221 | module_init(deflate_mod_init); |
222 | module_exit(fini); | 222 | module_exit(deflate_mod_fini); |
223 | 223 | ||
224 | MODULE_LICENSE("GPL"); | 224 | MODULE_LICENSE("GPL"); |
225 | MODULE_DESCRIPTION("Deflate Compression Algorithm for IPCOMP"); | 225 | MODULE_DESCRIPTION("Deflate Compression Algorithm for IPCOMP"); |
diff --git a/crypto/des_generic.c b/crypto/des_generic.c index 355ecb71cb0d..5d0e4580f998 100644 --- a/crypto/des_generic.c +++ b/crypto/des_generic.c | |||
@@ -977,7 +977,7 @@ static struct crypto_alg des3_ede_alg = { | |||
977 | 977 | ||
978 | MODULE_ALIAS("des3_ede"); | 978 | MODULE_ALIAS("des3_ede"); |
979 | 979 | ||
980 | static int __init init(void) | 980 | static int __init des_generic_mod_init(void) |
981 | { | 981 | { |
982 | int ret = 0; | 982 | int ret = 0; |
983 | 983 | ||
@@ -992,14 +992,14 @@ out: | |||
992 | return ret; | 992 | return ret; |
993 | } | 993 | } |
994 | 994 | ||
995 | static void __exit fini(void) | 995 | static void __exit des_generic_mod_fini(void) |
996 | { | 996 | { |
997 | crypto_unregister_alg(&des3_ede_alg); | 997 | crypto_unregister_alg(&des3_ede_alg); |
998 | crypto_unregister_alg(&des_alg); | 998 | crypto_unregister_alg(&des_alg); |
999 | } | 999 | } |
1000 | 1000 | ||
1001 | module_init(init); | 1001 | module_init(des_generic_mod_init); |
1002 | module_exit(fini); | 1002 | module_exit(des_generic_mod_fini); |
1003 | 1003 | ||
1004 | MODULE_LICENSE("GPL"); | 1004 | MODULE_LICENSE("GPL"); |
1005 | MODULE_DESCRIPTION("DES & Triple DES EDE Cipher Algorithms"); | 1005 | MODULE_DESCRIPTION("DES & Triple DES EDE Cipher Algorithms"); |
diff --git a/crypto/fcrypt.c b/crypto/fcrypt.c index a32cb68bbc60..1302f4cae337 100644 --- a/crypto/fcrypt.c +++ b/crypto/fcrypt.c | |||
@@ -405,18 +405,18 @@ static struct crypto_alg fcrypt_alg = { | |||
405 | .cia_decrypt = fcrypt_decrypt } } | 405 | .cia_decrypt = fcrypt_decrypt } } |
406 | }; | 406 | }; |
407 | 407 | ||
408 | static int __init init(void) | 408 | static int __init fcrypt_mod_init(void) |
409 | { | 409 | { |
410 | return crypto_register_alg(&fcrypt_alg); | 410 | return crypto_register_alg(&fcrypt_alg); |
411 | } | 411 | } |
412 | 412 | ||
413 | static void __exit fini(void) | 413 | static void __exit fcrypt_mod_fini(void) |
414 | { | 414 | { |
415 | crypto_unregister_alg(&fcrypt_alg); | 415 | crypto_unregister_alg(&fcrypt_alg); |
416 | } | 416 | } |
417 | 417 | ||
418 | module_init(init); | 418 | module_init(fcrypt_mod_init); |
419 | module_exit(fini); | 419 | module_exit(fcrypt_mod_fini); |
420 | 420 | ||
421 | MODULE_LICENSE("Dual BSD/GPL"); | 421 | MODULE_LICENSE("Dual BSD/GPL"); |
422 | MODULE_DESCRIPTION("FCrypt Cipher Algorithm"); | 422 | MODULE_DESCRIPTION("FCrypt Cipher Algorithm"); |
diff --git a/crypto/khazad.c b/crypto/khazad.c index 704ebfe26b55..527e4e395fc3 100644 --- a/crypto/khazad.c +++ b/crypto/khazad.c | |||
@@ -862,7 +862,7 @@ static struct crypto_alg khazad_alg = { | |||
862 | .cia_decrypt = khazad_decrypt } } | 862 | .cia_decrypt = khazad_decrypt } } |
863 | }; | 863 | }; |
864 | 864 | ||
865 | static int __init init(void) | 865 | static int __init khazad_mod_init(void) |
866 | { | 866 | { |
867 | int ret = 0; | 867 | int ret = 0; |
868 | 868 | ||
@@ -870,14 +870,14 @@ static int __init init(void) | |||
870 | return ret; | 870 | return ret; |
871 | } | 871 | } |
872 | 872 | ||
873 | static void __exit fini(void) | 873 | static void __exit khazad_mod_fini(void) |
874 | { | 874 | { |
875 | crypto_unregister_alg(&khazad_alg); | 875 | crypto_unregister_alg(&khazad_alg); |
876 | } | 876 | } |
877 | 877 | ||
878 | 878 | ||
879 | module_init(init); | 879 | module_init(khazad_mod_init); |
880 | module_exit(fini); | 880 | module_exit(khazad_mod_fini); |
881 | 881 | ||
882 | MODULE_LICENSE("GPL"); | 882 | MODULE_LICENSE("GPL"); |
883 | MODULE_DESCRIPTION("Khazad Cryptographic Algorithm"); | 883 | MODULE_DESCRIPTION("Khazad Cryptographic Algorithm"); |
diff --git a/crypto/lrw.c b/crypto/lrw.c index 9d52e580d10a..8ef664e3bcd9 100644 --- a/crypto/lrw.c +++ b/crypto/lrw.c | |||
@@ -91,8 +91,9 @@ struct sinfo { | |||
91 | 91 | ||
92 | static inline void inc(be128 *iv) | 92 | static inline void inc(be128 *iv) |
93 | { | 93 | { |
94 | if (!(iv->b = cpu_to_be64(be64_to_cpu(iv->b) + 1))) | 94 | be64_add_cpu(&iv->b, 1); |
95 | iv->a = cpu_to_be64(be64_to_cpu(iv->a) + 1); | 95 | if (!iv->b) |
96 | be64_add_cpu(&iv->a, 1); | ||
96 | } | 97 | } |
97 | 98 | ||
98 | static inline void lrw_round(struct sinfo *s, void *dst, const void *src) | 99 | static inline void lrw_round(struct sinfo *s, void *dst, const void *src) |
diff --git a/crypto/lzo.c b/crypto/lzo.c index 48c32883f024..b5e77077d751 100644 --- a/crypto/lzo.c +++ b/crypto/lzo.c | |||
@@ -89,18 +89,18 @@ static struct crypto_alg alg = { | |||
89 | .coa_decompress = lzo_decompress } } | 89 | .coa_decompress = lzo_decompress } } |
90 | }; | 90 | }; |
91 | 91 | ||
92 | static int __init init(void) | 92 | static int __init lzo_mod_init(void) |
93 | { | 93 | { |
94 | return crypto_register_alg(&alg); | 94 | return crypto_register_alg(&alg); |
95 | } | 95 | } |
96 | 96 | ||
97 | static void __exit fini(void) | 97 | static void __exit lzo_mod_fini(void) |
98 | { | 98 | { |
99 | crypto_unregister_alg(&alg); | 99 | crypto_unregister_alg(&alg); |
100 | } | 100 | } |
101 | 101 | ||
102 | module_init(init); | 102 | module_init(lzo_mod_init); |
103 | module_exit(fini); | 103 | module_exit(lzo_mod_fini); |
104 | 104 | ||
105 | MODULE_LICENSE("GPL"); | 105 | MODULE_LICENSE("GPL"); |
106 | MODULE_DESCRIPTION("LZO Compression Algorithm"); | 106 | MODULE_DESCRIPTION("LZO Compression Algorithm"); |
diff --git a/crypto/md4.c b/crypto/md4.c index c1bc71bdc16b..3c19aa0750fd 100644 --- a/crypto/md4.c +++ b/crypto/md4.c | |||
@@ -233,18 +233,18 @@ static struct crypto_alg alg = { | |||
233 | .dia_final = md4_final } } | 233 | .dia_final = md4_final } } |
234 | }; | 234 | }; |
235 | 235 | ||
236 | static int __init init(void) | 236 | static int __init md4_mod_init(void) |
237 | { | 237 | { |
238 | return crypto_register_alg(&alg); | 238 | return crypto_register_alg(&alg); |
239 | } | 239 | } |
240 | 240 | ||
241 | static void __exit fini(void) | 241 | static void __exit md4_mod_fini(void) |
242 | { | 242 | { |
243 | crypto_unregister_alg(&alg); | 243 | crypto_unregister_alg(&alg); |
244 | } | 244 | } |
245 | 245 | ||
246 | module_init(init); | 246 | module_init(md4_mod_init); |
247 | module_exit(fini); | 247 | module_exit(md4_mod_fini); |
248 | 248 | ||
249 | MODULE_LICENSE("GPL"); | 249 | MODULE_LICENSE("GPL"); |
250 | MODULE_DESCRIPTION("MD4 Message Digest Algorithm"); | 250 | MODULE_DESCRIPTION("MD4 Message Digest Algorithm"); |
diff --git a/crypto/md5.c b/crypto/md5.c index 93d18e8b3d53..39268f3d2f1d 100644 --- a/crypto/md5.c +++ b/crypto/md5.c | |||
@@ -228,18 +228,18 @@ static struct crypto_alg alg = { | |||
228 | .dia_final = md5_final } } | 228 | .dia_final = md5_final } } |
229 | }; | 229 | }; |
230 | 230 | ||
231 | static int __init init(void) | 231 | static int __init md5_mod_init(void) |
232 | { | 232 | { |
233 | return crypto_register_alg(&alg); | 233 | return crypto_register_alg(&alg); |
234 | } | 234 | } |
235 | 235 | ||
236 | static void __exit fini(void) | 236 | static void __exit md5_mod_fini(void) |
237 | { | 237 | { |
238 | crypto_unregister_alg(&alg); | 238 | crypto_unregister_alg(&alg); |
239 | } | 239 | } |
240 | 240 | ||
241 | module_init(init); | 241 | module_init(md5_mod_init); |
242 | module_exit(fini); | 242 | module_exit(md5_mod_fini); |
243 | 243 | ||
244 | MODULE_LICENSE("GPL"); | 244 | MODULE_LICENSE("GPL"); |
245 | MODULE_DESCRIPTION("MD5 Message Digest Algorithm"); | 245 | MODULE_DESCRIPTION("MD5 Message Digest Algorithm"); |
diff --git a/crypto/proc.c b/crypto/proc.c index 3d73323ff79b..02ff5670c158 100644 --- a/crypto/proc.c +++ b/crypto/proc.c | |||
@@ -78,7 +78,7 @@ static int c_show(struct seq_file *m, void *p) | |||
78 | return 0; | 78 | return 0; |
79 | } | 79 | } |
80 | 80 | ||
81 | static struct seq_operations crypto_seq_ops = { | 81 | static const struct seq_operations crypto_seq_ops = { |
82 | .start = c_start, | 82 | .start = c_start, |
83 | .next = c_next, | 83 | .next = c_next, |
84 | .stop = c_stop, | 84 | .stop = c_stop, |
@@ -99,11 +99,7 @@ static const struct file_operations proc_crypto_ops = { | |||
99 | 99 | ||
100 | void __init crypto_init_proc(void) | 100 | void __init crypto_init_proc(void) |
101 | { | 101 | { |
102 | struct proc_dir_entry *proc; | 102 | proc_create("crypto", 0, NULL, &proc_crypto_ops); |
103 | |||
104 | proc = create_proc_entry("crypto", 0, NULL); | ||
105 | if (proc) | ||
106 | proc->proc_fops = &proc_crypto_ops; | ||
107 | } | 103 | } |
108 | 104 | ||
109 | void __exit crypto_exit_proc(void) | 105 | void __exit crypto_exit_proc(void) |
diff --git a/crypto/salsa20_generic.c b/crypto/salsa20_generic.c index 1fa4e4ddcab5..b07d55981741 100644 --- a/crypto/salsa20_generic.c +++ b/crypto/salsa20_generic.c | |||
@@ -237,18 +237,18 @@ static struct crypto_alg alg = { | |||
237 | } | 237 | } |
238 | }; | 238 | }; |
239 | 239 | ||
240 | static int __init init(void) | 240 | static int __init salsa20_generic_mod_init(void) |
241 | { | 241 | { |
242 | return crypto_register_alg(&alg); | 242 | return crypto_register_alg(&alg); |
243 | } | 243 | } |
244 | 244 | ||
245 | static void __exit fini(void) | 245 | static void __exit salsa20_generic_mod_fini(void) |
246 | { | 246 | { |
247 | crypto_unregister_alg(&alg); | 247 | crypto_unregister_alg(&alg); |
248 | } | 248 | } |
249 | 249 | ||
250 | module_init(init); | 250 | module_init(salsa20_generic_mod_init); |
251 | module_exit(fini); | 251 | module_exit(salsa20_generic_mod_fini); |
252 | 252 | ||
253 | MODULE_LICENSE("GPL"); | 253 | MODULE_LICENSE("GPL"); |
254 | MODULE_DESCRIPTION ("Salsa20 stream cipher algorithm"); | 254 | MODULE_DESCRIPTION ("Salsa20 stream cipher algorithm"); |
diff --git a/crypto/serpent.c b/crypto/serpent.c index 2b0a19a44ec5..b651a55fa569 100644 --- a/crypto/serpent.c +++ b/crypto/serpent.c | |||
@@ -557,7 +557,7 @@ static struct crypto_alg tnepres_alg = { | |||
557 | .cia_decrypt = tnepres_decrypt } } | 557 | .cia_decrypt = tnepres_decrypt } } |
558 | }; | 558 | }; |
559 | 559 | ||
560 | static int __init init(void) | 560 | static int __init serpent_mod_init(void) |
561 | { | 561 | { |
562 | int ret = crypto_register_alg(&serpent_alg); | 562 | int ret = crypto_register_alg(&serpent_alg); |
563 | 563 | ||
@@ -572,14 +572,14 @@ static int __init init(void) | |||
572 | return ret; | 572 | return ret; |
573 | } | 573 | } |
574 | 574 | ||
575 | static void __exit fini(void) | 575 | static void __exit serpent_mod_fini(void) |
576 | { | 576 | { |
577 | crypto_unregister_alg(&tnepres_alg); | 577 | crypto_unregister_alg(&tnepres_alg); |
578 | crypto_unregister_alg(&serpent_alg); | 578 | crypto_unregister_alg(&serpent_alg); |
579 | } | 579 | } |
580 | 580 | ||
581 | module_init(init); | 581 | module_init(serpent_mod_init); |
582 | module_exit(fini); | 582 | module_exit(serpent_mod_fini); |
583 | 583 | ||
584 | MODULE_LICENSE("GPL"); | 584 | MODULE_LICENSE("GPL"); |
585 | MODULE_DESCRIPTION("Serpent and tnepres (kerneli compatible serpent reversed) Cipher Algorithm"); | 585 | MODULE_DESCRIPTION("Serpent and tnepres (kerneli compatible serpent reversed) Cipher Algorithm"); |
diff --git a/crypto/sha1_generic.c b/crypto/sha1_generic.c index 68c62f528eb5..c7c6899e1fca 100644 --- a/crypto/sha1_generic.c +++ b/crypto/sha1_generic.c | |||
@@ -120,18 +120,18 @@ static struct crypto_alg alg = { | |||
120 | .dia_final = sha1_final } } | 120 | .dia_final = sha1_final } } |
121 | }; | 121 | }; |
122 | 122 | ||
123 | static int __init init(void) | 123 | static int __init sha1_generic_mod_init(void) |
124 | { | 124 | { |
125 | return crypto_register_alg(&alg); | 125 | return crypto_register_alg(&alg); |
126 | } | 126 | } |
127 | 127 | ||
128 | static void __exit fini(void) | 128 | static void __exit sha1_generic_mod_fini(void) |
129 | { | 129 | { |
130 | crypto_unregister_alg(&alg); | 130 | crypto_unregister_alg(&alg); |
131 | } | 131 | } |
132 | 132 | ||
133 | module_init(init); | 133 | module_init(sha1_generic_mod_init); |
134 | module_exit(fini); | 134 | module_exit(sha1_generic_mod_fini); |
135 | 135 | ||
136 | MODULE_LICENSE("GPL"); | 136 | MODULE_LICENSE("GPL"); |
137 | MODULE_DESCRIPTION("SHA1 Secure Hash Algorithm"); | 137 | MODULE_DESCRIPTION("SHA1 Secure Hash Algorithm"); |
diff --git a/crypto/sha256_generic.c b/crypto/sha256_generic.c index 3cc93fd61043..5a8dd47558e5 100644 --- a/crypto/sha256_generic.c +++ b/crypto/sha256_generic.c | |||
@@ -353,7 +353,7 @@ static struct crypto_alg sha224 = { | |||
353 | .dia_final = sha224_final } } | 353 | .dia_final = sha224_final } } |
354 | }; | 354 | }; |
355 | 355 | ||
356 | static int __init init(void) | 356 | static int __init sha256_generic_mod_init(void) |
357 | { | 357 | { |
358 | int ret = 0; | 358 | int ret = 0; |
359 | 359 | ||
@@ -370,14 +370,14 @@ static int __init init(void) | |||
370 | return ret; | 370 | return ret; |
371 | } | 371 | } |
372 | 372 | ||
373 | static void __exit fini(void) | 373 | static void __exit sha256_generic_mod_fini(void) |
374 | { | 374 | { |
375 | crypto_unregister_alg(&sha224); | 375 | crypto_unregister_alg(&sha224); |
376 | crypto_unregister_alg(&sha256); | 376 | crypto_unregister_alg(&sha256); |
377 | } | 377 | } |
378 | 378 | ||
379 | module_init(init); | 379 | module_init(sha256_generic_mod_init); |
380 | module_exit(fini); | 380 | module_exit(sha256_generic_mod_fini); |
381 | 381 | ||
382 | MODULE_LICENSE("GPL"); | 382 | MODULE_LICENSE("GPL"); |
383 | MODULE_DESCRIPTION("SHA-224 and SHA-256 Secure Hash Algorithm"); | 383 | MODULE_DESCRIPTION("SHA-224 and SHA-256 Secure Hash Algorithm"); |
diff --git a/crypto/sha512.c b/crypto/sha512_generic.c index c39c803ecc02..bc3686138aeb 100644 --- a/crypto/sha512.c +++ b/crypto/sha512_generic.c | |||
@@ -104,9 +104,9 @@ sha512_transform(u64 *state, u64 *W, const u8 *input) | |||
104 | } | 104 | } |
105 | 105 | ||
106 | /* load the state into our registers */ | 106 | /* load the state into our registers */ |
107 | a=state[0]; b=state[1]; c=state[2]; d=state[3]; | 107 | a=state[0]; b=state[1]; c=state[2]; d=state[3]; |
108 | e=state[4]; f=state[5]; g=state[6]; h=state[7]; | 108 | e=state[4]; f=state[5]; g=state[6]; h=state[7]; |
109 | 109 | ||
110 | /* now iterate */ | 110 | /* now iterate */ |
111 | for (i=0; i<80; i+=8) { | 111 | for (i=0; i<80; i+=8) { |
112 | t1 = h + e1(e) + Ch(e,f,g) + sha512_K[i ] + W[i ]; | 112 | t1 = h + e1(e) + Ch(e,f,g) + sha512_K[i ] + W[i ]; |
@@ -126,9 +126,9 @@ sha512_transform(u64 *state, u64 *W, const u8 *input) | |||
126 | t1 = a + e1(f) + Ch(f,g,h) + sha512_K[i+7] + W[i+7]; | 126 | t1 = a + e1(f) + Ch(f,g,h) + sha512_K[i+7] + W[i+7]; |
127 | t2 = e0(b) + Maj(b,c,d); e+=t1; a=t1+t2; | 127 | t2 = e0(b) + Maj(b,c,d); e+=t1; a=t1+t2; |
128 | } | 128 | } |
129 | 129 | ||
130 | state[0] += a; state[1] += b; state[2] += c; state[3] += d; | 130 | state[0] += a; state[1] += b; state[2] += c; state[3] += d; |
131 | state[4] += e; state[5] += f; state[6] += g; state[7] += h; | 131 | state[4] += e; state[5] += f; state[6] += g; state[7] += h; |
132 | 132 | ||
133 | /* erase our data */ | 133 | /* erase our data */ |
134 | a = b = c = d = e = f = g = h = t1 = t2 = 0; | 134 | a = b = c = d = e = f = g = h = t1 = t2 = 0; |
@@ -173,7 +173,7 @@ sha512_update(struct crypto_tfm *tfm, const u8 *data, unsigned int len) | |||
173 | 173 | ||
174 | /* Compute number of bytes mod 128 */ | 174 | /* Compute number of bytes mod 128 */ |
175 | index = (unsigned int)((sctx->count[0] >> 3) & 0x7F); | 175 | index = (unsigned int)((sctx->count[0] >> 3) & 0x7F); |
176 | 176 | ||
177 | /* Update number of bits */ | 177 | /* Update number of bits */ |
178 | if ((sctx->count[0] += (len << 3)) < (len << 3)) { | 178 | if ((sctx->count[0] += (len << 3)) < (len << 3)) { |
179 | if ((sctx->count[1] += 1) < 1) | 179 | if ((sctx->count[1] += 1) < 1) |
@@ -181,9 +181,9 @@ sha512_update(struct crypto_tfm *tfm, const u8 *data, unsigned int len) | |||
181 | sctx->count[3]++; | 181 | sctx->count[3]++; |
182 | sctx->count[1] += (len >> 29); | 182 | sctx->count[1] += (len >> 29); |
183 | } | 183 | } |
184 | 184 | ||
185 | part_len = 128 - index; | 185 | part_len = 128 - index; |
186 | 186 | ||
187 | /* Transform as many times as possible. */ | 187 | /* Transform as many times as possible. */ |
188 | if (len >= part_len) { | 188 | if (len >= part_len) { |
189 | memcpy(&sctx->buf[index], data, part_len); | 189 | memcpy(&sctx->buf[index], data, part_len); |
@@ -278,9 +278,7 @@ static struct crypto_alg sha384 = { | |||
278 | } | 278 | } |
279 | }; | 279 | }; |
280 | 280 | ||
281 | MODULE_ALIAS("sha384"); | 281 | static int __init sha512_generic_mod_init(void) |
282 | |||
283 | static int __init init(void) | ||
284 | { | 282 | { |
285 | int ret = 0; | 283 | int ret = 0; |
286 | 284 | ||
@@ -292,14 +290,17 @@ out: | |||
292 | return ret; | 290 | return ret; |
293 | } | 291 | } |
294 | 292 | ||
295 | static void __exit fini(void) | 293 | static void __exit sha512_generic_mod_fini(void) |
296 | { | 294 | { |
297 | crypto_unregister_alg(&sha384); | 295 | crypto_unregister_alg(&sha384); |
298 | crypto_unregister_alg(&sha512); | 296 | crypto_unregister_alg(&sha512); |
299 | } | 297 | } |
300 | 298 | ||
301 | module_init(init); | 299 | module_init(sha512_generic_mod_init); |
302 | module_exit(fini); | 300 | module_exit(sha512_generic_mod_fini); |
303 | 301 | ||
304 | MODULE_LICENSE("GPL"); | 302 | MODULE_LICENSE("GPL"); |
305 | MODULE_DESCRIPTION("SHA-512 and SHA-384 Secure Hash Algorithms"); | 303 | MODULE_DESCRIPTION("SHA-512 and SHA-384 Secure Hash Algorithms"); |
304 | |||
305 | MODULE_ALIAS("sha384"); | ||
306 | MODULE_ALIAS("sha512"); | ||
diff --git a/crypto/tcrypt.c b/crypto/tcrypt.c index 1ab8c017a011..6beabc5abd07 100644 --- a/crypto/tcrypt.c +++ b/crypto/tcrypt.c | |||
@@ -82,9 +82,8 @@ static char *check[] = { | |||
82 | "des", "md5", "des3_ede", "rot13", "sha1", "sha224", "sha256", | 82 | "des", "md5", "des3_ede", "rot13", "sha1", "sha224", "sha256", |
83 | "blowfish", "twofish", "serpent", "sha384", "sha512", "md4", "aes", | 83 | "blowfish", "twofish", "serpent", "sha384", "sha512", "md4", "aes", |
84 | "cast6", "arc4", "michael_mic", "deflate", "crc32c", "tea", "xtea", | 84 | "cast6", "arc4", "michael_mic", "deflate", "crc32c", "tea", "xtea", |
85 | "arc4", "michael_mic", "deflate", "crc32c", "tea", "xtea", | ||
86 | "khazad", "wp512", "wp384", "wp256", "tnepres", "xeta", "fcrypt", | 85 | "khazad", "wp512", "wp384", "wp256", "tnepres", "xeta", "fcrypt", |
87 | "camellia", "seed", "salsa20", "lzo", NULL | 86 | "camellia", "seed", "salsa20", "lzo", "cts", NULL |
88 | }; | 87 | }; |
89 | 88 | ||
90 | static void hexdump(unsigned char *buf, unsigned int len) | 89 | static void hexdump(unsigned char *buf, unsigned int len) |
@@ -113,23 +112,11 @@ static void test_hash(char *algo, struct hash_testvec *template, | |||
113 | char result[64]; | 112 | char result[64]; |
114 | struct crypto_hash *tfm; | 113 | struct crypto_hash *tfm; |
115 | struct hash_desc desc; | 114 | struct hash_desc desc; |
116 | struct hash_testvec *hash_tv; | ||
117 | unsigned int tsize; | ||
118 | int ret; | 115 | int ret; |
116 | void *hash_buff; | ||
119 | 117 | ||
120 | printk("\ntesting %s\n", algo); | 118 | printk("\ntesting %s\n", algo); |
121 | 119 | ||
122 | tsize = sizeof(struct hash_testvec); | ||
123 | tsize *= tcount; | ||
124 | |||
125 | if (tsize > TVMEMSIZE) { | ||
126 | printk("template (%u) too big for tvmem (%u)\n", tsize, TVMEMSIZE); | ||
127 | return; | ||
128 | } | ||
129 | |||
130 | memcpy(tvmem, template, tsize); | ||
131 | hash_tv = (void *)tvmem; | ||
132 | |||
133 | tfm = crypto_alloc_hash(algo, 0, CRYPTO_ALG_ASYNC); | 120 | tfm = crypto_alloc_hash(algo, 0, CRYPTO_ALG_ASYNC); |
134 | if (IS_ERR(tfm)) { | 121 | if (IS_ERR(tfm)) { |
135 | printk("failed to load transform for %s: %ld\n", algo, | 122 | printk("failed to load transform for %s: %ld\n", algo, |
@@ -144,28 +131,36 @@ static void test_hash(char *algo, struct hash_testvec *template, | |||
144 | printk("test %u:\n", i + 1); | 131 | printk("test %u:\n", i + 1); |
145 | memset(result, 0, 64); | 132 | memset(result, 0, 64); |
146 | 133 | ||
147 | sg_init_one(&sg[0], hash_tv[i].plaintext, hash_tv[i].psize); | 134 | hash_buff = kzalloc(template[i].psize, GFP_KERNEL); |
135 | if (!hash_buff) | ||
136 | continue; | ||
137 | |||
138 | memcpy(hash_buff, template[i].plaintext, template[i].psize); | ||
139 | sg_init_one(&sg[0], hash_buff, template[i].psize); | ||
148 | 140 | ||
149 | if (hash_tv[i].ksize) { | 141 | if (template[i].ksize) { |
150 | ret = crypto_hash_setkey(tfm, hash_tv[i].key, | 142 | ret = crypto_hash_setkey(tfm, template[i].key, |
151 | hash_tv[i].ksize); | 143 | template[i].ksize); |
152 | if (ret) { | 144 | if (ret) { |
153 | printk("setkey() failed ret=%d\n", ret); | 145 | printk("setkey() failed ret=%d\n", ret); |
146 | kfree(hash_buff); | ||
154 | goto out; | 147 | goto out; |
155 | } | 148 | } |
156 | } | 149 | } |
157 | 150 | ||
158 | ret = crypto_hash_digest(&desc, sg, hash_tv[i].psize, result); | 151 | ret = crypto_hash_digest(&desc, sg, template[i].psize, result); |
159 | if (ret) { | 152 | if (ret) { |
160 | printk("digest () failed ret=%d\n", ret); | 153 | printk("digest () failed ret=%d\n", ret); |
154 | kfree(hash_buff); | ||
161 | goto out; | 155 | goto out; |
162 | } | 156 | } |
163 | 157 | ||
164 | hexdump(result, crypto_hash_digestsize(tfm)); | 158 | hexdump(result, crypto_hash_digestsize(tfm)); |
165 | printk("%s\n", | 159 | printk("%s\n", |
166 | memcmp(result, hash_tv[i].digest, | 160 | memcmp(result, template[i].digest, |
167 | crypto_hash_digestsize(tfm)) ? | 161 | crypto_hash_digestsize(tfm)) ? |
168 | "fail" : "pass"); | 162 | "fail" : "pass"); |
163 | kfree(hash_buff); | ||
169 | } | 164 | } |
170 | 165 | ||
171 | printk("testing %s across pages\n", algo); | 166 | printk("testing %s across pages\n", algo); |
@@ -175,25 +170,25 @@ static void test_hash(char *algo, struct hash_testvec *template, | |||
175 | 170 | ||
176 | j = 0; | 171 | j = 0; |
177 | for (i = 0; i < tcount; i++) { | 172 | for (i = 0; i < tcount; i++) { |
178 | if (hash_tv[i].np) { | 173 | if (template[i].np) { |
179 | j++; | 174 | j++; |
180 | printk("test %u:\n", j); | 175 | printk("test %u:\n", j); |
181 | memset(result, 0, 64); | 176 | memset(result, 0, 64); |
182 | 177 | ||
183 | temp = 0; | 178 | temp = 0; |
184 | sg_init_table(sg, hash_tv[i].np); | 179 | sg_init_table(sg, template[i].np); |
185 | for (k = 0; k < hash_tv[i].np; k++) { | 180 | for (k = 0; k < template[i].np; k++) { |
186 | memcpy(&xbuf[IDX[k]], | 181 | memcpy(&xbuf[IDX[k]], |
187 | hash_tv[i].plaintext + temp, | 182 | template[i].plaintext + temp, |
188 | hash_tv[i].tap[k]); | 183 | template[i].tap[k]); |
189 | temp += hash_tv[i].tap[k]; | 184 | temp += template[i].tap[k]; |
190 | sg_set_buf(&sg[k], &xbuf[IDX[k]], | 185 | sg_set_buf(&sg[k], &xbuf[IDX[k]], |
191 | hash_tv[i].tap[k]); | 186 | template[i].tap[k]); |
192 | } | 187 | } |
193 | 188 | ||
194 | if (hash_tv[i].ksize) { | 189 | if (template[i].ksize) { |
195 | ret = crypto_hash_setkey(tfm, hash_tv[i].key, | 190 | ret = crypto_hash_setkey(tfm, template[i].key, |
196 | hash_tv[i].ksize); | 191 | template[i].ksize); |
197 | 192 | ||
198 | if (ret) { | 193 | if (ret) { |
199 | printk("setkey() failed ret=%d\n", ret); | 194 | printk("setkey() failed ret=%d\n", ret); |
@@ -201,7 +196,7 @@ static void test_hash(char *algo, struct hash_testvec *template, | |||
201 | } | 196 | } |
202 | } | 197 | } |
203 | 198 | ||
204 | ret = crypto_hash_digest(&desc, sg, hash_tv[i].psize, | 199 | ret = crypto_hash_digest(&desc, sg, template[i].psize, |
205 | result); | 200 | result); |
206 | if (ret) { | 201 | if (ret) { |
207 | printk("digest () failed ret=%d\n", ret); | 202 | printk("digest () failed ret=%d\n", ret); |
@@ -210,7 +205,7 @@ static void test_hash(char *algo, struct hash_testvec *template, | |||
210 | 205 | ||
211 | hexdump(result, crypto_hash_digestsize(tfm)); | 206 | hexdump(result, crypto_hash_digestsize(tfm)); |
212 | printk("%s\n", | 207 | printk("%s\n", |
213 | memcmp(result, hash_tv[i].digest, | 208 | memcmp(result, template[i].digest, |
214 | crypto_hash_digestsize(tfm)) ? | 209 | crypto_hash_digestsize(tfm)) ? |
215 | "fail" : "pass"); | 210 | "fail" : "pass"); |
216 | } | 211 | } |
@@ -224,17 +219,18 @@ static void test_aead(char *algo, int enc, struct aead_testvec *template, | |||
224 | unsigned int tcount) | 219 | unsigned int tcount) |
225 | { | 220 | { |
226 | unsigned int ret, i, j, k, temp; | 221 | unsigned int ret, i, j, k, temp; |
227 | unsigned int tsize; | ||
228 | char *q; | 222 | char *q; |
229 | struct crypto_aead *tfm; | 223 | struct crypto_aead *tfm; |
230 | char *key; | 224 | char *key; |
231 | struct aead_testvec *aead_tv; | ||
232 | struct aead_request *req; | 225 | struct aead_request *req; |
233 | struct scatterlist sg[8]; | 226 | struct scatterlist sg[8]; |
234 | struct scatterlist asg[8]; | 227 | struct scatterlist asg[8]; |
235 | const char *e; | 228 | const char *e; |
236 | struct tcrypt_result result; | 229 | struct tcrypt_result result; |
237 | unsigned int authsize; | 230 | unsigned int authsize; |
231 | void *input; | ||
232 | void *assoc; | ||
233 | char iv[MAX_IVLEN]; | ||
238 | 234 | ||
239 | if (enc == ENCRYPT) | 235 | if (enc == ENCRYPT) |
240 | e = "encryption"; | 236 | e = "encryption"; |
@@ -243,18 +239,6 @@ static void test_aead(char *algo, int enc, struct aead_testvec *template, | |||
243 | 239 | ||
244 | printk(KERN_INFO "\ntesting %s %s\n", algo, e); | 240 | printk(KERN_INFO "\ntesting %s %s\n", algo, e); |
245 | 241 | ||
246 | tsize = sizeof(struct aead_testvec); | ||
247 | tsize *= tcount; | ||
248 | |||
249 | if (tsize > TVMEMSIZE) { | ||
250 | printk(KERN_INFO "template (%u) too big for tvmem (%u)\n", | ||
251 | tsize, TVMEMSIZE); | ||
252 | return; | ||
253 | } | ||
254 | |||
255 | memcpy(tvmem, template, tsize); | ||
256 | aead_tv = (void *)tvmem; | ||
257 | |||
258 | init_completion(&result.completion); | 242 | init_completion(&result.completion); |
259 | 243 | ||
260 | tfm = crypto_alloc_aead(algo, 0, 0); | 244 | tfm = crypto_alloc_aead(algo, 0, 0); |
@@ -275,46 +259,68 @@ static void test_aead(char *algo, int enc, struct aead_testvec *template, | |||
275 | tcrypt_complete, &result); | 259 | tcrypt_complete, &result); |
276 | 260 | ||
277 | for (i = 0, j = 0; i < tcount; i++) { | 261 | for (i = 0, j = 0; i < tcount; i++) { |
278 | if (!aead_tv[i].np) { | 262 | if (!template[i].np) { |
279 | printk(KERN_INFO "test %u (%d bit key):\n", | 263 | printk(KERN_INFO "test %u (%d bit key):\n", |
280 | ++j, aead_tv[i].klen * 8); | 264 | ++j, template[i].klen * 8); |
265 | |||
266 | /* some tepmplates have no input data but they will | ||
267 | * touch input | ||
268 | */ | ||
269 | input = kzalloc(template[i].ilen + template[i].rlen, GFP_KERNEL); | ||
270 | if (!input) | ||
271 | continue; | ||
272 | |||
273 | assoc = kzalloc(template[i].alen, GFP_KERNEL); | ||
274 | if (!assoc) { | ||
275 | kfree(input); | ||
276 | continue; | ||
277 | } | ||
278 | |||
279 | memcpy(input, template[i].input, template[i].ilen); | ||
280 | memcpy(assoc, template[i].assoc, template[i].alen); | ||
281 | if (template[i].iv) | ||
282 | memcpy(iv, template[i].iv, MAX_IVLEN); | ||
283 | else | ||
284 | memset(iv, 0, MAX_IVLEN); | ||
281 | 285 | ||
282 | crypto_aead_clear_flags(tfm, ~0); | 286 | crypto_aead_clear_flags(tfm, ~0); |
283 | if (aead_tv[i].wk) | 287 | if (template[i].wk) |
284 | crypto_aead_set_flags( | 288 | crypto_aead_set_flags( |
285 | tfm, CRYPTO_TFM_REQ_WEAK_KEY); | 289 | tfm, CRYPTO_TFM_REQ_WEAK_KEY); |
286 | key = aead_tv[i].key; | 290 | |
291 | if (template[i].key) | ||
292 | key = template[i].key; | ||
293 | else | ||
294 | key = kzalloc(template[i].klen, GFP_KERNEL); | ||
287 | 295 | ||
288 | ret = crypto_aead_setkey(tfm, key, | 296 | ret = crypto_aead_setkey(tfm, key, |
289 | aead_tv[i].klen); | 297 | template[i].klen); |
290 | if (ret) { | 298 | if (ret) { |
291 | printk(KERN_INFO "setkey() failed flags=%x\n", | 299 | printk(KERN_INFO "setkey() failed flags=%x\n", |
292 | crypto_aead_get_flags(tfm)); | 300 | crypto_aead_get_flags(tfm)); |
293 | 301 | ||
294 | if (!aead_tv[i].fail) | 302 | if (!template[i].fail) |
295 | goto out; | 303 | goto next_one; |
296 | } | 304 | } |
297 | 305 | ||
298 | authsize = abs(aead_tv[i].rlen - aead_tv[i].ilen); | 306 | authsize = abs(template[i].rlen - template[i].ilen); |
299 | ret = crypto_aead_setauthsize(tfm, authsize); | 307 | ret = crypto_aead_setauthsize(tfm, authsize); |
300 | if (ret) { | 308 | if (ret) { |
301 | printk(KERN_INFO | 309 | printk(KERN_INFO |
302 | "failed to set authsize = %u\n", | 310 | "failed to set authsize = %u\n", |
303 | authsize); | 311 | authsize); |
304 | goto out; | 312 | goto next_one; |
305 | } | 313 | } |
306 | 314 | ||
307 | sg_init_one(&sg[0], aead_tv[i].input, | 315 | sg_init_one(&sg[0], input, |
308 | aead_tv[i].ilen + (enc ? authsize : 0)); | 316 | template[i].ilen + (enc ? authsize : 0)); |
309 | 317 | ||
310 | sg_init_one(&asg[0], aead_tv[i].assoc, | 318 | sg_init_one(&asg[0], assoc, template[i].alen); |
311 | aead_tv[i].alen); | ||
312 | 319 | ||
313 | aead_request_set_crypt(req, sg, sg, | 320 | aead_request_set_crypt(req, sg, sg, |
314 | aead_tv[i].ilen, | 321 | template[i].ilen, iv); |
315 | aead_tv[i].iv); | ||
316 | 322 | ||
317 | aead_request_set_assoc(req, asg, aead_tv[i].alen); | 323 | aead_request_set_assoc(req, asg, template[i].alen); |
318 | 324 | ||
319 | ret = enc ? | 325 | ret = enc ? |
320 | crypto_aead_encrypt(req) : | 326 | crypto_aead_encrypt(req) : |
@@ -335,15 +341,21 @@ static void test_aead(char *algo, int enc, struct aead_testvec *template, | |||
335 | default: | 341 | default: |
336 | printk(KERN_INFO "%s () failed err=%d\n", | 342 | printk(KERN_INFO "%s () failed err=%d\n", |
337 | e, -ret); | 343 | e, -ret); |
338 | goto out; | 344 | goto next_one; |
339 | } | 345 | } |
340 | 346 | ||
341 | q = kmap(sg_page(&sg[0])) + sg[0].offset; | 347 | q = kmap(sg_page(&sg[0])) + sg[0].offset; |
342 | hexdump(q, aead_tv[i].rlen); | 348 | hexdump(q, template[i].rlen); |
343 | 349 | ||
344 | printk(KERN_INFO "enc/dec: %s\n", | 350 | printk(KERN_INFO "enc/dec: %s\n", |
345 | memcmp(q, aead_tv[i].result, | 351 | memcmp(q, template[i].result, |
346 | aead_tv[i].rlen) ? "fail" : "pass"); | 352 | template[i].rlen) ? "fail" : "pass"); |
353 | kunmap(sg_page(&sg[0])); | ||
354 | next_one: | ||
355 | if (!template[i].key) | ||
356 | kfree(key); | ||
357 | kfree(assoc); | ||
358 | kfree(input); | ||
347 | } | 359 | } |
348 | } | 360 | } |
349 | 361 | ||
@@ -352,36 +364,41 @@ static void test_aead(char *algo, int enc, struct aead_testvec *template, | |||
352 | memset(axbuf, 0, XBUFSIZE); | 364 | memset(axbuf, 0, XBUFSIZE); |
353 | 365 | ||
354 | for (i = 0, j = 0; i < tcount; i++) { | 366 | for (i = 0, j = 0; i < tcount; i++) { |
355 | if (aead_tv[i].np) { | 367 | if (template[i].np) { |
356 | printk(KERN_INFO "test %u (%d bit key):\n", | 368 | printk(KERN_INFO "test %u (%d bit key):\n", |
357 | ++j, aead_tv[i].klen * 8); | 369 | ++j, template[i].klen * 8); |
370 | |||
371 | if (template[i].iv) | ||
372 | memcpy(iv, template[i].iv, MAX_IVLEN); | ||
373 | else | ||
374 | memset(iv, 0, MAX_IVLEN); | ||
358 | 375 | ||
359 | crypto_aead_clear_flags(tfm, ~0); | 376 | crypto_aead_clear_flags(tfm, ~0); |
360 | if (aead_tv[i].wk) | 377 | if (template[i].wk) |
361 | crypto_aead_set_flags( | 378 | crypto_aead_set_flags( |
362 | tfm, CRYPTO_TFM_REQ_WEAK_KEY); | 379 | tfm, CRYPTO_TFM_REQ_WEAK_KEY); |
363 | key = aead_tv[i].key; | 380 | key = template[i].key; |
364 | 381 | ||
365 | ret = crypto_aead_setkey(tfm, key, aead_tv[i].klen); | 382 | ret = crypto_aead_setkey(tfm, key, template[i].klen); |
366 | if (ret) { | 383 | if (ret) { |
367 | printk(KERN_INFO "setkey() failed flags=%x\n", | 384 | printk(KERN_INFO "setkey() failed flags=%x\n", |
368 | crypto_aead_get_flags(tfm)); | 385 | crypto_aead_get_flags(tfm)); |
369 | 386 | ||
370 | if (!aead_tv[i].fail) | 387 | if (!template[i].fail) |
371 | goto out; | 388 | goto out; |
372 | } | 389 | } |
373 | 390 | ||
374 | sg_init_table(sg, aead_tv[i].np); | 391 | sg_init_table(sg, template[i].np); |
375 | for (k = 0, temp = 0; k < aead_tv[i].np; k++) { | 392 | for (k = 0, temp = 0; k < template[i].np; k++) { |
376 | memcpy(&xbuf[IDX[k]], | 393 | memcpy(&xbuf[IDX[k]], |
377 | aead_tv[i].input + temp, | 394 | template[i].input + temp, |
378 | aead_tv[i].tap[k]); | 395 | template[i].tap[k]); |
379 | temp += aead_tv[i].tap[k]; | 396 | temp += template[i].tap[k]; |
380 | sg_set_buf(&sg[k], &xbuf[IDX[k]], | 397 | sg_set_buf(&sg[k], &xbuf[IDX[k]], |
381 | aead_tv[i].tap[k]); | 398 | template[i].tap[k]); |
382 | } | 399 | } |
383 | 400 | ||
384 | authsize = abs(aead_tv[i].rlen - aead_tv[i].ilen); | 401 | authsize = abs(template[i].rlen - template[i].ilen); |
385 | ret = crypto_aead_setauthsize(tfm, authsize); | 402 | ret = crypto_aead_setauthsize(tfm, authsize); |
386 | if (ret) { | 403 | if (ret) { |
387 | printk(KERN_INFO | 404 | printk(KERN_INFO |
@@ -393,21 +410,21 @@ static void test_aead(char *algo, int enc, struct aead_testvec *template, | |||
393 | if (enc) | 410 | if (enc) |
394 | sg[k - 1].length += authsize; | 411 | sg[k - 1].length += authsize; |
395 | 412 | ||
396 | sg_init_table(asg, aead_tv[i].anp); | 413 | sg_init_table(asg, template[i].anp); |
397 | for (k = 0, temp = 0; k < aead_tv[i].anp; k++) { | 414 | for (k = 0, temp = 0; k < template[i].anp; k++) { |
398 | memcpy(&axbuf[IDX[k]], | 415 | memcpy(&axbuf[IDX[k]], |
399 | aead_tv[i].assoc + temp, | 416 | template[i].assoc + temp, |
400 | aead_tv[i].atap[k]); | 417 | template[i].atap[k]); |
401 | temp += aead_tv[i].atap[k]; | 418 | temp += template[i].atap[k]; |
402 | sg_set_buf(&asg[k], &axbuf[IDX[k]], | 419 | sg_set_buf(&asg[k], &axbuf[IDX[k]], |
403 | aead_tv[i].atap[k]); | 420 | template[i].atap[k]); |
404 | } | 421 | } |
405 | 422 | ||
406 | aead_request_set_crypt(req, sg, sg, | 423 | aead_request_set_crypt(req, sg, sg, |
407 | aead_tv[i].ilen, | 424 | template[i].ilen, |
408 | aead_tv[i].iv); | 425 | iv); |
409 | 426 | ||
410 | aead_request_set_assoc(req, asg, aead_tv[i].alen); | 427 | aead_request_set_assoc(req, asg, template[i].alen); |
411 | 428 | ||
412 | ret = enc ? | 429 | ret = enc ? |
413 | crypto_aead_encrypt(req) : | 430 | crypto_aead_encrypt(req) : |
@@ -431,18 +448,19 @@ static void test_aead(char *algo, int enc, struct aead_testvec *template, | |||
431 | goto out; | 448 | goto out; |
432 | } | 449 | } |
433 | 450 | ||
434 | for (k = 0, temp = 0; k < aead_tv[i].np; k++) { | 451 | for (k = 0, temp = 0; k < template[i].np; k++) { |
435 | printk(KERN_INFO "page %u\n", k); | 452 | printk(KERN_INFO "page %u\n", k); |
436 | q = kmap(sg_page(&sg[k])) + sg[k].offset; | 453 | q = kmap(sg_page(&sg[k])) + sg[k].offset; |
437 | hexdump(q, aead_tv[i].tap[k]); | 454 | hexdump(q, template[i].tap[k]); |
438 | printk(KERN_INFO "%s\n", | 455 | printk(KERN_INFO "%s\n", |
439 | memcmp(q, aead_tv[i].result + temp, | 456 | memcmp(q, template[i].result + temp, |
440 | aead_tv[i].tap[k] - | 457 | template[i].tap[k] - |
441 | (k < aead_tv[i].np - 1 || enc ? | 458 | (k < template[i].np - 1 || enc ? |
442 | 0 : authsize)) ? | 459 | 0 : authsize)) ? |
443 | "fail" : "pass"); | 460 | "fail" : "pass"); |
444 | 461 | ||
445 | temp += aead_tv[i].tap[k]; | 462 | temp += template[i].tap[k]; |
463 | kunmap(sg_page(&sg[k])); | ||
446 | } | 464 | } |
447 | } | 465 | } |
448 | } | 466 | } |
@@ -456,15 +474,14 @@ static void test_cipher(char *algo, int enc, | |||
456 | struct cipher_testvec *template, unsigned int tcount) | 474 | struct cipher_testvec *template, unsigned int tcount) |
457 | { | 475 | { |
458 | unsigned int ret, i, j, k, temp; | 476 | unsigned int ret, i, j, k, temp; |
459 | unsigned int tsize; | ||
460 | char *q; | 477 | char *q; |
461 | struct crypto_ablkcipher *tfm; | 478 | struct crypto_ablkcipher *tfm; |
462 | char *key; | ||
463 | struct cipher_testvec *cipher_tv; | ||
464 | struct ablkcipher_request *req; | 479 | struct ablkcipher_request *req; |
465 | struct scatterlist sg[8]; | 480 | struct scatterlist sg[8]; |
466 | const char *e; | 481 | const char *e; |
467 | struct tcrypt_result result; | 482 | struct tcrypt_result result; |
483 | void *data; | ||
484 | char iv[MAX_IVLEN]; | ||
468 | 485 | ||
469 | if (enc == ENCRYPT) | 486 | if (enc == ENCRYPT) |
470 | e = "encryption"; | 487 | e = "encryption"; |
@@ -473,16 +490,7 @@ static void test_cipher(char *algo, int enc, | |||
473 | 490 | ||
474 | printk("\ntesting %s %s\n", algo, e); | 491 | printk("\ntesting %s %s\n", algo, e); |
475 | 492 | ||
476 | tsize = sizeof (struct cipher_testvec); | ||
477 | if (tsize > TVMEMSIZE) { | ||
478 | printk("template (%u) too big for tvmem (%u)\n", tsize, | ||
479 | TVMEMSIZE); | ||
480 | return; | ||
481 | } | ||
482 | cipher_tv = (void *)tvmem; | ||
483 | |||
484 | init_completion(&result.completion); | 493 | init_completion(&result.completion); |
485 | |||
486 | tfm = crypto_alloc_ablkcipher(algo, 0, 0); | 494 | tfm = crypto_alloc_ablkcipher(algo, 0, 0); |
487 | 495 | ||
488 | if (IS_ERR(tfm)) { | 496 | if (IS_ERR(tfm)) { |
@@ -502,35 +510,43 @@ static void test_cipher(char *algo, int enc, | |||
502 | 510 | ||
503 | j = 0; | 511 | j = 0; |
504 | for (i = 0; i < tcount; i++) { | 512 | for (i = 0; i < tcount; i++) { |
505 | memcpy(cipher_tv, &template[i], tsize); | 513 | |
506 | if (!(cipher_tv->np)) { | 514 | data = kzalloc(template[i].ilen, GFP_KERNEL); |
515 | if (!data) | ||
516 | continue; | ||
517 | |||
518 | memcpy(data, template[i].input, template[i].ilen); | ||
519 | if (template[i].iv) | ||
520 | memcpy(iv, template[i].iv, MAX_IVLEN); | ||
521 | else | ||
522 | memset(iv, 0, MAX_IVLEN); | ||
523 | |||
524 | if (!(template[i].np)) { | ||
507 | j++; | 525 | j++; |
508 | printk("test %u (%d bit key):\n", | 526 | printk("test %u (%d bit key):\n", |
509 | j, cipher_tv->klen * 8); | 527 | j, template[i].klen * 8); |
510 | 528 | ||
511 | crypto_ablkcipher_clear_flags(tfm, ~0); | 529 | crypto_ablkcipher_clear_flags(tfm, ~0); |
512 | if (cipher_tv->wk) | 530 | if (template[i].wk) |
513 | crypto_ablkcipher_set_flags( | 531 | crypto_ablkcipher_set_flags( |
514 | tfm, CRYPTO_TFM_REQ_WEAK_KEY); | 532 | tfm, CRYPTO_TFM_REQ_WEAK_KEY); |
515 | key = cipher_tv->key; | ||
516 | 533 | ||
517 | ret = crypto_ablkcipher_setkey(tfm, key, | 534 | ret = crypto_ablkcipher_setkey(tfm, template[i].key, |
518 | cipher_tv->klen); | 535 | template[i].klen); |
519 | if (ret) { | 536 | if (ret) { |
520 | printk("setkey() failed flags=%x\n", | 537 | printk("setkey() failed flags=%x\n", |
521 | crypto_ablkcipher_get_flags(tfm)); | 538 | crypto_ablkcipher_get_flags(tfm)); |
522 | 539 | ||
523 | if (!cipher_tv->fail) | 540 | if (!template[i].fail) { |
541 | kfree(data); | ||
524 | goto out; | 542 | goto out; |
543 | } | ||
525 | } | 544 | } |
526 | 545 | ||
527 | sg_init_one(&sg[0], cipher_tv->input, | 546 | sg_init_one(&sg[0], data, template[i].ilen); |
528 | cipher_tv->ilen); | ||
529 | 547 | ||
530 | ablkcipher_request_set_crypt(req, sg, sg, | 548 | ablkcipher_request_set_crypt(req, sg, sg, |
531 | cipher_tv->ilen, | 549 | template[i].ilen, iv); |
532 | cipher_tv->iv); | ||
533 | |||
534 | ret = enc ? | 550 | ret = enc ? |
535 | crypto_ablkcipher_encrypt(req) : | 551 | crypto_ablkcipher_encrypt(req) : |
536 | crypto_ablkcipher_decrypt(req); | 552 | crypto_ablkcipher_decrypt(req); |
@@ -549,16 +565,19 @@ static void test_cipher(char *algo, int enc, | |||
549 | /* fall through */ | 565 | /* fall through */ |
550 | default: | 566 | default: |
551 | printk("%s () failed err=%d\n", e, -ret); | 567 | printk("%s () failed err=%d\n", e, -ret); |
568 | kfree(data); | ||
552 | goto out; | 569 | goto out; |
553 | } | 570 | } |
554 | 571 | ||
555 | q = kmap(sg_page(&sg[0])) + sg[0].offset; | 572 | q = kmap(sg_page(&sg[0])) + sg[0].offset; |
556 | hexdump(q, cipher_tv->rlen); | 573 | hexdump(q, template[i].rlen); |
557 | 574 | ||
558 | printk("%s\n", | 575 | printk("%s\n", |
559 | memcmp(q, cipher_tv->result, | 576 | memcmp(q, template[i].result, |
560 | cipher_tv->rlen) ? "fail" : "pass"); | 577 | template[i].rlen) ? "fail" : "pass"); |
578 | kunmap(sg_page(&sg[0])); | ||
561 | } | 579 | } |
580 | kfree(data); | ||
562 | } | 581 | } |
563 | 582 | ||
564 | printk("\ntesting %s %s across pages (chunking)\n", algo, e); | 583 | printk("\ntesting %s %s across pages (chunking)\n", algo, e); |
@@ -566,42 +585,53 @@ static void test_cipher(char *algo, int enc, | |||
566 | 585 | ||
567 | j = 0; | 586 | j = 0; |
568 | for (i = 0; i < tcount; i++) { | 587 | for (i = 0; i < tcount; i++) { |
569 | memcpy(cipher_tv, &template[i], tsize); | 588 | |
570 | if (cipher_tv->np) { | 589 | data = kzalloc(template[i].ilen, GFP_KERNEL); |
590 | if (!data) | ||
591 | continue; | ||
592 | |||
593 | memcpy(data, template[i].input, template[i].ilen); | ||
594 | |||
595 | if (template[i].iv) | ||
596 | memcpy(iv, template[i].iv, MAX_IVLEN); | ||
597 | else | ||
598 | memset(iv, 0, MAX_IVLEN); | ||
599 | |||
600 | if (template[i].np) { | ||
571 | j++; | 601 | j++; |
572 | printk("test %u (%d bit key):\n", | 602 | printk("test %u (%d bit key):\n", |
573 | j, cipher_tv->klen * 8); | 603 | j, template[i].klen * 8); |
574 | 604 | ||
575 | crypto_ablkcipher_clear_flags(tfm, ~0); | 605 | crypto_ablkcipher_clear_flags(tfm, ~0); |
576 | if (cipher_tv->wk) | 606 | if (template[i].wk) |
577 | crypto_ablkcipher_set_flags( | 607 | crypto_ablkcipher_set_flags( |
578 | tfm, CRYPTO_TFM_REQ_WEAK_KEY); | 608 | tfm, CRYPTO_TFM_REQ_WEAK_KEY); |
579 | key = cipher_tv->key; | ||
580 | 609 | ||
581 | ret = crypto_ablkcipher_setkey(tfm, key, | 610 | ret = crypto_ablkcipher_setkey(tfm, template[i].key, |
582 | cipher_tv->klen); | 611 | template[i].klen); |
583 | if (ret) { | 612 | if (ret) { |
584 | printk("setkey() failed flags=%x\n", | 613 | printk("setkey() failed flags=%x\n", |
585 | crypto_ablkcipher_get_flags(tfm)); | 614 | crypto_ablkcipher_get_flags(tfm)); |
586 | 615 | ||
587 | if (!cipher_tv->fail) | 616 | if (!template[i].fail) { |
617 | kfree(data); | ||
588 | goto out; | 618 | goto out; |
619 | } | ||
589 | } | 620 | } |
590 | 621 | ||
591 | temp = 0; | 622 | temp = 0; |
592 | sg_init_table(sg, cipher_tv->np); | 623 | sg_init_table(sg, template[i].np); |
593 | for (k = 0; k < cipher_tv->np; k++) { | 624 | for (k = 0; k < template[i].np; k++) { |
594 | memcpy(&xbuf[IDX[k]], | 625 | memcpy(&xbuf[IDX[k]], |
595 | cipher_tv->input + temp, | 626 | template[i].input + temp, |
596 | cipher_tv->tap[k]); | 627 | template[i].tap[k]); |
597 | temp += cipher_tv->tap[k]; | 628 | temp += template[i].tap[k]; |
598 | sg_set_buf(&sg[k], &xbuf[IDX[k]], | 629 | sg_set_buf(&sg[k], &xbuf[IDX[k]], |
599 | cipher_tv->tap[k]); | 630 | template[i].tap[k]); |
600 | } | 631 | } |
601 | 632 | ||
602 | ablkcipher_request_set_crypt(req, sg, sg, | 633 | ablkcipher_request_set_crypt(req, sg, sg, |
603 | cipher_tv->ilen, | 634 | template[i].ilen, iv); |
604 | cipher_tv->iv); | ||
605 | 635 | ||
606 | ret = enc ? | 636 | ret = enc ? |
607 | crypto_ablkcipher_encrypt(req) : | 637 | crypto_ablkcipher_encrypt(req) : |
@@ -625,19 +655,19 @@ static void test_cipher(char *algo, int enc, | |||
625 | } | 655 | } |
626 | 656 | ||
627 | temp = 0; | 657 | temp = 0; |
628 | for (k = 0; k < cipher_tv->np; k++) { | 658 | for (k = 0; k < template[i].np; k++) { |
629 | printk("page %u\n", k); | 659 | printk("page %u\n", k); |
630 | q = kmap(sg_page(&sg[k])) + sg[k].offset; | 660 | q = kmap(sg_page(&sg[k])) + sg[k].offset; |
631 | hexdump(q, cipher_tv->tap[k]); | 661 | hexdump(q, template[i].tap[k]); |
632 | printk("%s\n", | 662 | printk("%s\n", |
633 | memcmp(q, cipher_tv->result + temp, | 663 | memcmp(q, template[i].result + temp, |
634 | cipher_tv->tap[k]) ? "fail" : | 664 | template[i].tap[k]) ? "fail" : |
635 | "pass"); | 665 | "pass"); |
636 | temp += cipher_tv->tap[k]; | 666 | temp += template[i].tap[k]; |
667 | kunmap(sg_page(&sg[k])); | ||
637 | } | 668 | } |
638 | } | 669 | } |
639 | } | 670 | } |
640 | |||
641 | out: | 671 | out: |
642 | crypto_free_ablkcipher(tfm); | 672 | crypto_free_ablkcipher(tfm); |
643 | ablkcipher_request_free(req); | 673 | ablkcipher_request_free(req); |
@@ -721,15 +751,18 @@ out: | |||
721 | return ret; | 751 | return ret; |
722 | } | 752 | } |
723 | 753 | ||
754 | static u32 block_sizes[] = { 16, 64, 256, 1024, 8192, 0 }; | ||
755 | |||
724 | static void test_cipher_speed(char *algo, int enc, unsigned int sec, | 756 | static void test_cipher_speed(char *algo, int enc, unsigned int sec, |
725 | struct cipher_testvec *template, | 757 | struct cipher_testvec *template, |
726 | unsigned int tcount, struct cipher_speed *speed) | 758 | unsigned int tcount, u8 *keysize) |
727 | { | 759 | { |
728 | unsigned int ret, i, j, iv_len; | 760 | unsigned int ret, i, j, iv_len; |
729 | unsigned char *key, *p, iv[128]; | 761 | unsigned char *key, *p, iv[128]; |
730 | struct crypto_blkcipher *tfm; | 762 | struct crypto_blkcipher *tfm; |
731 | struct blkcipher_desc desc; | 763 | struct blkcipher_desc desc; |
732 | const char *e; | 764 | const char *e; |
765 | u32 *b_size; | ||
733 | 766 | ||
734 | if (enc == ENCRYPT) | 767 | if (enc == ENCRYPT) |
735 | e = "encryption"; | 768 | e = "encryption"; |
@@ -748,52 +781,60 @@ static void test_cipher_speed(char *algo, int enc, unsigned int sec, | |||
748 | desc.tfm = tfm; | 781 | desc.tfm = tfm; |
749 | desc.flags = 0; | 782 | desc.flags = 0; |
750 | 783 | ||
751 | for (i = 0; speed[i].klen != 0; i++) { | 784 | i = 0; |
752 | if ((speed[i].blen + speed[i].klen) > TVMEMSIZE) { | 785 | do { |
753 | printk("template (%u) too big for tvmem (%u)\n", | 786 | |
754 | speed[i].blen + speed[i].klen, TVMEMSIZE); | 787 | b_size = block_sizes; |
755 | goto out; | 788 | do { |
756 | } | 789 | |
790 | if ((*keysize + *b_size) > TVMEMSIZE) { | ||
791 | printk("template (%u) too big for tvmem (%u)\n", | ||
792 | *keysize + *b_size, TVMEMSIZE); | ||
793 | goto out; | ||
794 | } | ||
757 | 795 | ||
758 | printk("test %u (%d bit key, %d byte blocks): ", i, | 796 | printk("test %u (%d bit key, %d byte blocks): ", i, |
759 | speed[i].klen * 8, speed[i].blen); | 797 | *keysize * 8, *b_size); |
760 | 798 | ||
761 | memset(tvmem, 0xff, speed[i].klen + speed[i].blen); | 799 | memset(tvmem, 0xff, *keysize + *b_size); |
762 | 800 | ||
763 | /* set key, plain text and IV */ | 801 | /* set key, plain text and IV */ |
764 | key = (unsigned char *)tvmem; | 802 | key = (unsigned char *)tvmem; |
765 | for (j = 0; j < tcount; j++) { | 803 | for (j = 0; j < tcount; j++) { |
766 | if (template[j].klen == speed[i].klen) { | 804 | if (template[j].klen == *keysize) { |
767 | key = template[j].key; | 805 | key = template[j].key; |
768 | break; | 806 | break; |
807 | } | ||
769 | } | 808 | } |
770 | } | 809 | p = (unsigned char *)tvmem + *keysize; |
771 | p = (unsigned char *)tvmem + speed[i].klen; | ||
772 | 810 | ||
773 | ret = crypto_blkcipher_setkey(tfm, key, speed[i].klen); | 811 | ret = crypto_blkcipher_setkey(tfm, key, *keysize); |
774 | if (ret) { | 812 | if (ret) { |
775 | printk("setkey() failed flags=%x\n", | 813 | printk("setkey() failed flags=%x\n", |
776 | crypto_blkcipher_get_flags(tfm)); | 814 | crypto_blkcipher_get_flags(tfm)); |
777 | goto out; | 815 | goto out; |
778 | } | 816 | } |
779 | 817 | ||
780 | iv_len = crypto_blkcipher_ivsize(tfm); | 818 | iv_len = crypto_blkcipher_ivsize(tfm); |
781 | if (iv_len) { | 819 | if (iv_len) { |
782 | memset(&iv, 0xff, iv_len); | 820 | memset(&iv, 0xff, iv_len); |
783 | crypto_blkcipher_set_iv(tfm, iv, iv_len); | 821 | crypto_blkcipher_set_iv(tfm, iv, iv_len); |
784 | } | 822 | } |
785 | 823 | ||
786 | if (sec) | 824 | if (sec) |
787 | ret = test_cipher_jiffies(&desc, enc, p, speed[i].blen, | 825 | ret = test_cipher_jiffies(&desc, enc, p, *b_size, sec); |
788 | sec); | 826 | else |
789 | else | 827 | ret = test_cipher_cycles(&desc, enc, p, *b_size); |
790 | ret = test_cipher_cycles(&desc, enc, p, speed[i].blen); | ||
791 | 828 | ||
792 | if (ret) { | 829 | if (ret) { |
793 | printk("%s() failed flags=%x\n", e, desc.flags); | 830 | printk("%s() failed flags=%x\n", e, desc.flags); |
794 | break; | 831 | break; |
795 | } | 832 | } |
796 | } | 833 | b_size++; |
834 | i++; | ||
835 | } while (*b_size); | ||
836 | keysize++; | ||
837 | } while (*keysize); | ||
797 | 838 | ||
798 | out: | 839 | out: |
799 | crypto_free_blkcipher(tfm); | 840 | crypto_free_blkcipher(tfm); |
@@ -1041,22 +1082,10 @@ static void test_comp(char *algo, struct comp_testvec *ctemplate, | |||
1041 | unsigned int i; | 1082 | unsigned int i; |
1042 | char result[COMP_BUF_SIZE]; | 1083 | char result[COMP_BUF_SIZE]; |
1043 | struct crypto_comp *tfm; | 1084 | struct crypto_comp *tfm; |
1044 | struct comp_testvec *tv; | ||
1045 | unsigned int tsize; | 1085 | unsigned int tsize; |
1046 | 1086 | ||
1047 | printk("\ntesting %s compression\n", algo); | 1087 | printk("\ntesting %s compression\n", algo); |
1048 | 1088 | ||
1049 | tsize = sizeof(struct comp_testvec); | ||
1050 | tsize *= ctcount; | ||
1051 | if (tsize > TVMEMSIZE) { | ||
1052 | printk("template (%u) too big for tvmem (%u)\n", tsize, | ||
1053 | TVMEMSIZE); | ||
1054 | return; | ||
1055 | } | ||
1056 | |||
1057 | memcpy(tvmem, ctemplate, tsize); | ||
1058 | tv = (void *)tvmem; | ||
1059 | |||
1060 | tfm = crypto_alloc_comp(algo, 0, CRYPTO_ALG_ASYNC); | 1089 | tfm = crypto_alloc_comp(algo, 0, CRYPTO_ALG_ASYNC); |
1061 | if (IS_ERR(tfm)) { | 1090 | if (IS_ERR(tfm)) { |
1062 | printk("failed to load transform for %s\n", algo); | 1091 | printk("failed to load transform for %s\n", algo); |
@@ -1069,8 +1098,8 @@ static void test_comp(char *algo, struct comp_testvec *ctemplate, | |||
1069 | printk("test %u:\n", i + 1); | 1098 | printk("test %u:\n", i + 1); |
1070 | memset(result, 0, sizeof (result)); | 1099 | memset(result, 0, sizeof (result)); |
1071 | 1100 | ||
1072 | ilen = tv[i].inlen; | 1101 | ilen = ctemplate[i].inlen; |
1073 | ret = crypto_comp_compress(tfm, tv[i].input, | 1102 | ret = crypto_comp_compress(tfm, ctemplate[i].input, |
1074 | ilen, result, &dlen); | 1103 | ilen, result, &dlen); |
1075 | if (ret) { | 1104 | if (ret) { |
1076 | printk("fail: ret=%d\n", ret); | 1105 | printk("fail: ret=%d\n", ret); |
@@ -1078,7 +1107,7 @@ static void test_comp(char *algo, struct comp_testvec *ctemplate, | |||
1078 | } | 1107 | } |
1079 | hexdump(result, dlen); | 1108 | hexdump(result, dlen); |
1080 | printk("%s (ratio %d:%d)\n", | 1109 | printk("%s (ratio %d:%d)\n", |
1081 | memcmp(result, tv[i].output, dlen) ? "fail" : "pass", | 1110 | memcmp(result, ctemplate[i].output, dlen) ? "fail" : "pass", |
1082 | ilen, dlen); | 1111 | ilen, dlen); |
1083 | } | 1112 | } |
1084 | 1113 | ||
@@ -1092,17 +1121,14 @@ static void test_comp(char *algo, struct comp_testvec *ctemplate, | |||
1092 | goto out; | 1121 | goto out; |
1093 | } | 1122 | } |
1094 | 1123 | ||
1095 | memcpy(tvmem, dtemplate, tsize); | ||
1096 | tv = (void *)tvmem; | ||
1097 | |||
1098 | for (i = 0; i < dtcount; i++) { | 1124 | for (i = 0; i < dtcount; i++) { |
1099 | int ilen, ret, dlen = COMP_BUF_SIZE; | 1125 | int ilen, ret, dlen = COMP_BUF_SIZE; |
1100 | 1126 | ||
1101 | printk("test %u:\n", i + 1); | 1127 | printk("test %u:\n", i + 1); |
1102 | memset(result, 0, sizeof (result)); | 1128 | memset(result, 0, sizeof (result)); |
1103 | 1129 | ||
1104 | ilen = tv[i].inlen; | 1130 | ilen = dtemplate[i].inlen; |
1105 | ret = crypto_comp_decompress(tfm, tv[i].input, | 1131 | ret = crypto_comp_decompress(tfm, dtemplate[i].input, |
1106 | ilen, result, &dlen); | 1132 | ilen, result, &dlen); |
1107 | if (ret) { | 1133 | if (ret) { |
1108 | printk("fail: ret=%d\n", ret); | 1134 | printk("fail: ret=%d\n", ret); |
@@ -1110,7 +1136,7 @@ static void test_comp(char *algo, struct comp_testvec *ctemplate, | |||
1110 | } | 1136 | } |
1111 | hexdump(result, dlen); | 1137 | hexdump(result, dlen); |
1112 | printk("%s (ratio %d:%d)\n", | 1138 | printk("%s (ratio %d:%d)\n", |
1113 | memcmp(result, tv[i].output, dlen) ? "fail" : "pass", | 1139 | memcmp(result, dtemplate[i].output, dlen) ? "fail" : "pass", |
1114 | ilen, dlen); | 1140 | ilen, dlen); |
1115 | } | 1141 | } |
1116 | out: | 1142 | out: |
@@ -1301,6 +1327,12 @@ static void do_test(void) | |||
1301 | test_cipher("ecb(seed)", DECRYPT, seed_dec_tv_template, | 1327 | test_cipher("ecb(seed)", DECRYPT, seed_dec_tv_template, |
1302 | SEED_DEC_TEST_VECTORS); | 1328 | SEED_DEC_TEST_VECTORS); |
1303 | 1329 | ||
1330 | //CTS | ||
1331 | test_cipher("cts(cbc(aes))", ENCRYPT, cts_mode_enc_tv_template, | ||
1332 | CTS_MODE_ENC_TEST_VECTORS); | ||
1333 | test_cipher("cts(cbc(aes))", DECRYPT, cts_mode_dec_tv_template, | ||
1334 | CTS_MODE_DEC_TEST_VECTORS); | ||
1335 | |||
1304 | test_hash("sha384", sha384_tv_template, SHA384_TEST_VECTORS); | 1336 | test_hash("sha384", sha384_tv_template, SHA384_TEST_VECTORS); |
1305 | test_hash("sha512", sha512_tv_template, SHA512_TEST_VECTORS); | 1337 | test_hash("sha512", sha512_tv_template, SHA512_TEST_VECTORS); |
1306 | test_hash("wp512", wp512_tv_template, WP512_TEST_VECTORS); | 1338 | test_hash("wp512", wp512_tv_template, WP512_TEST_VECTORS); |
@@ -1584,6 +1616,13 @@ static void do_test(void) | |||
1584 | AES_CCM_DEC_TEST_VECTORS); | 1616 | AES_CCM_DEC_TEST_VECTORS); |
1585 | break; | 1617 | break; |
1586 | 1618 | ||
1619 | case 38: | ||
1620 | test_cipher("cts(cbc(aes))", ENCRYPT, cts_mode_enc_tv_template, | ||
1621 | CTS_MODE_ENC_TEST_VECTORS); | ||
1622 | test_cipher("cts(cbc(aes))", DECRYPT, cts_mode_dec_tv_template, | ||
1623 | CTS_MODE_DEC_TEST_VECTORS); | ||
1624 | break; | ||
1625 | |||
1587 | case 100: | 1626 | case 100: |
1588 | test_hash("hmac(md5)", hmac_md5_tv_template, | 1627 | test_hash("hmac(md5)", hmac_md5_tv_template, |
1589 | HMAC_MD5_TEST_VECTORS); | 1628 | HMAC_MD5_TEST_VECTORS); |
@@ -1621,89 +1660,85 @@ static void do_test(void) | |||
1621 | 1660 | ||
1622 | case 200: | 1661 | case 200: |
1623 | test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0, | 1662 | test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0, |
1624 | aes_speed_template); | 1663 | speed_template_16_24_32); |
1625 | test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0, | 1664 | test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0, |
1626 | aes_speed_template); | 1665 | speed_template_16_24_32); |
1627 | test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0, | 1666 | test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0, |
1628 | aes_speed_template); | 1667 | speed_template_16_24_32); |
1629 | test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0, | 1668 | test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0, |
1630 | aes_speed_template); | 1669 | speed_template_16_24_32); |
1631 | test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0, | 1670 | test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0, |
1632 | aes_lrw_speed_template); | 1671 | speed_template_32_40_48); |
1633 | test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0, | 1672 | test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0, |
1634 | aes_lrw_speed_template); | 1673 | speed_template_32_40_48); |
1635 | test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0, | 1674 | test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0, |
1636 | aes_xts_speed_template); | 1675 | speed_template_32_48_64); |
1637 | test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, | 1676 | test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, |
1638 | aes_xts_speed_template); | 1677 | speed_template_32_48_64); |
1639 | break; | 1678 | break; |
1640 | 1679 | ||
1641 | case 201: | 1680 | case 201: |
1642 | test_cipher_speed("ecb(des3_ede)", ENCRYPT, sec, | 1681 | test_cipher_speed("ecb(des3_ede)", ENCRYPT, sec, |
1643 | des3_ede_enc_tv_template, | 1682 | des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS, |
1644 | DES3_EDE_ENC_TEST_VECTORS, | 1683 | speed_template_24); |
1645 | des3_ede_speed_template); | ||
1646 | test_cipher_speed("ecb(des3_ede)", DECRYPT, sec, | 1684 | test_cipher_speed("ecb(des3_ede)", DECRYPT, sec, |
1647 | des3_ede_dec_tv_template, | 1685 | des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS, |
1648 | DES3_EDE_DEC_TEST_VECTORS, | 1686 | speed_template_24); |
1649 | des3_ede_speed_template); | ||
1650 | test_cipher_speed("cbc(des3_ede)", ENCRYPT, sec, | 1687 | test_cipher_speed("cbc(des3_ede)", ENCRYPT, sec, |
1651 | des3_ede_enc_tv_template, | 1688 | des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS, |
1652 | DES3_EDE_ENC_TEST_VECTORS, | 1689 | speed_template_24); |
1653 | des3_ede_speed_template); | ||
1654 | test_cipher_speed("cbc(des3_ede)", DECRYPT, sec, | 1690 | test_cipher_speed("cbc(des3_ede)", DECRYPT, sec, |
1655 | des3_ede_dec_tv_template, | 1691 | des3_ede_enc_tv_template, DES3_EDE_ENC_TEST_VECTORS, |
1656 | DES3_EDE_DEC_TEST_VECTORS, | 1692 | speed_template_24); |
1657 | des3_ede_speed_template); | ||
1658 | break; | 1693 | break; |
1659 | 1694 | ||
1660 | case 202: | 1695 | case 202: |
1661 | test_cipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0, | 1696 | test_cipher_speed("ecb(twofish)", ENCRYPT, sec, NULL, 0, |
1662 | twofish_speed_template); | 1697 | speed_template_16_24_32); |
1663 | test_cipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0, | 1698 | test_cipher_speed("ecb(twofish)", DECRYPT, sec, NULL, 0, |
1664 | twofish_speed_template); | 1699 | speed_template_16_24_32); |
1665 | test_cipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0, | 1700 | test_cipher_speed("cbc(twofish)", ENCRYPT, sec, NULL, 0, |
1666 | twofish_speed_template); | 1701 | speed_template_16_24_32); |
1667 | test_cipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0, | 1702 | test_cipher_speed("cbc(twofish)", DECRYPT, sec, NULL, 0, |
1668 | twofish_speed_template); | 1703 | speed_template_16_24_32); |
1669 | break; | 1704 | break; |
1670 | 1705 | ||
1671 | case 203: | 1706 | case 203: |
1672 | test_cipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0, | 1707 | test_cipher_speed("ecb(blowfish)", ENCRYPT, sec, NULL, 0, |
1673 | blowfish_speed_template); | 1708 | speed_template_8_32); |
1674 | test_cipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0, | 1709 | test_cipher_speed("ecb(blowfish)", DECRYPT, sec, NULL, 0, |
1675 | blowfish_speed_template); | 1710 | speed_template_8_32); |
1676 | test_cipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0, | 1711 | test_cipher_speed("cbc(blowfish)", ENCRYPT, sec, NULL, 0, |
1677 | blowfish_speed_template); | 1712 | speed_template_8_32); |
1678 | test_cipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0, | 1713 | test_cipher_speed("cbc(blowfish)", DECRYPT, sec, NULL, 0, |
1679 | blowfish_speed_template); | 1714 | speed_template_8_32); |
1680 | break; | 1715 | break; |
1681 | 1716 | ||
1682 | case 204: | 1717 | case 204: |
1683 | test_cipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0, | 1718 | test_cipher_speed("ecb(des)", ENCRYPT, sec, NULL, 0, |
1684 | des_speed_template); | 1719 | speed_template_8); |
1685 | test_cipher_speed("ecb(des)", DECRYPT, sec, NULL, 0, | 1720 | test_cipher_speed("ecb(des)", DECRYPT, sec, NULL, 0, |
1686 | des_speed_template); | 1721 | speed_template_8); |
1687 | test_cipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0, | 1722 | test_cipher_speed("cbc(des)", ENCRYPT, sec, NULL, 0, |
1688 | des_speed_template); | 1723 | speed_template_8); |
1689 | test_cipher_speed("cbc(des)", DECRYPT, sec, NULL, 0, | 1724 | test_cipher_speed("cbc(des)", DECRYPT, sec, NULL, 0, |
1690 | des_speed_template); | 1725 | speed_template_8); |
1691 | break; | 1726 | break; |
1692 | 1727 | ||
1693 | case 205: | 1728 | case 205: |
1694 | test_cipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0, | 1729 | test_cipher_speed("ecb(camellia)", ENCRYPT, sec, NULL, 0, |
1695 | camellia_speed_template); | 1730 | speed_template_16_24_32); |
1696 | test_cipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0, | 1731 | test_cipher_speed("ecb(camellia)", DECRYPT, sec, NULL, 0, |
1697 | camellia_speed_template); | 1732 | speed_template_16_24_32); |
1698 | test_cipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0, | 1733 | test_cipher_speed("cbc(camellia)", ENCRYPT, sec, NULL, 0, |
1699 | camellia_speed_template); | 1734 | speed_template_16_24_32); |
1700 | test_cipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0, | 1735 | test_cipher_speed("cbc(camellia)", DECRYPT, sec, NULL, 0, |
1701 | camellia_speed_template); | 1736 | speed_template_16_24_32); |
1702 | break; | 1737 | break; |
1703 | 1738 | ||
1704 | case 206: | 1739 | case 206: |
1705 | test_cipher_speed("salsa20", ENCRYPT, sec, NULL, 0, | 1740 | test_cipher_speed("salsa20", ENCRYPT, sec, NULL, 0, |
1706 | salsa20_speed_template); | 1741 | speed_template_16_32); |
1707 | break; | 1742 | break; |
1708 | 1743 | ||
1709 | case 300: | 1744 | case 300: |
@@ -1775,7 +1810,7 @@ static void do_test(void) | |||
1775 | } | 1810 | } |
1776 | } | 1811 | } |
1777 | 1812 | ||
1778 | static int __init init(void) | 1813 | static int __init tcrypt_mod_init(void) |
1779 | { | 1814 | { |
1780 | int err = -ENOMEM; | 1815 | int err = -ENOMEM; |
1781 | 1816 | ||
@@ -1814,10 +1849,10 @@ static int __init init(void) | |||
1814 | * If an init function is provided, an exit function must also be provided | 1849 | * If an init function is provided, an exit function must also be provided |
1815 | * to allow module unload. | 1850 | * to allow module unload. |
1816 | */ | 1851 | */ |
1817 | static void __exit fini(void) { } | 1852 | static void __exit tcrypt_mod_fini(void) { } |
1818 | 1853 | ||
1819 | module_init(init); | 1854 | module_init(tcrypt_mod_init); |
1820 | module_exit(fini); | 1855 | module_exit(tcrypt_mod_fini); |
1821 | 1856 | ||
1822 | module_param(mode, int, 0); | 1857 | module_param(mode, int, 0); |
1823 | module_param(sec, uint, 0); | 1858 | module_param(sec, uint, 0); |
diff --git a/crypto/tcrypt.h b/crypto/tcrypt.h index f785e5618e11..47bc0ecb8978 100644 --- a/crypto/tcrypt.h +++ b/crypto/tcrypt.h | |||
@@ -31,9 +31,9 @@ | |||
31 | 31 | ||
32 | struct hash_testvec { | 32 | struct hash_testvec { |
33 | /* only used with keyed hash algorithms */ | 33 | /* only used with keyed hash algorithms */ |
34 | char key[132] __attribute__ ((__aligned__(4))); | 34 | char *key; |
35 | char plaintext[240]; | 35 | char *plaintext; |
36 | char digest[MAX_DIGEST_SIZE]; | 36 | char *digest; |
37 | unsigned char tap[MAX_TAP]; | 37 | unsigned char tap[MAX_TAP]; |
38 | unsigned char psize; | 38 | unsigned char psize; |
39 | unsigned char np; | 39 | unsigned char np; |
@@ -41,10 +41,10 @@ struct hash_testvec { | |||
41 | }; | 41 | }; |
42 | 42 | ||
43 | struct cipher_testvec { | 43 | struct cipher_testvec { |
44 | char key[MAX_KEYLEN] __attribute__ ((__aligned__(4))); | 44 | char *key; |
45 | char iv[MAX_IVLEN]; | 45 | char *iv; |
46 | char input[4100]; | 46 | char *input; |
47 | char result[4100]; | 47 | char *result; |
48 | unsigned char tap[MAX_TAP]; | 48 | unsigned char tap[MAX_TAP]; |
49 | int np; | 49 | int np; |
50 | unsigned char fail; | 50 | unsigned char fail; |
@@ -55,11 +55,11 @@ struct cipher_testvec { | |||
55 | }; | 55 | }; |
56 | 56 | ||
57 | struct aead_testvec { | 57 | struct aead_testvec { |
58 | char key[MAX_KEYLEN] __attribute__ ((__aligned__(4))); | 58 | char *key; |
59 | char iv[MAX_IVLEN]; | 59 | char *iv; |
60 | char input[512]; | 60 | char *input; |
61 | char assoc[512]; | 61 | char *assoc; |
62 | char result[512]; | 62 | char *result; |
63 | unsigned char tap[MAX_TAP]; | 63 | unsigned char tap[MAX_TAP]; |
64 | unsigned char atap[MAX_TAP]; | 64 | unsigned char atap[MAX_TAP]; |
65 | int np; | 65 | int np; |
@@ -72,16 +72,13 @@ struct aead_testvec { | |||
72 | unsigned short rlen; | 72 | unsigned short rlen; |
73 | }; | 73 | }; |
74 | 74 | ||
75 | struct cipher_speed { | ||
76 | unsigned char klen; | ||
77 | unsigned int blen; | ||
78 | }; | ||
79 | |||
80 | struct hash_speed { | 75 | struct hash_speed { |
81 | unsigned int blen; /* buffer length */ | 76 | unsigned int blen; /* buffer length */ |
82 | unsigned int plen; /* per-update length */ | 77 | unsigned int plen; /* per-update length */ |
83 | }; | 78 | }; |
84 | 79 | ||
80 | static char zeroed_string[48]; | ||
81 | |||
85 | /* | 82 | /* |
86 | * MD4 test vectors from RFC1320 | 83 | * MD4 test vectors from RFC1320 |
87 | */ | 84 | */ |
@@ -90,41 +87,41 @@ struct hash_speed { | |||
90 | static struct hash_testvec md4_tv_template [] = { | 87 | static struct hash_testvec md4_tv_template [] = { |
91 | { | 88 | { |
92 | .plaintext = "", | 89 | .plaintext = "", |
93 | .digest = { 0x31, 0xd6, 0xcf, 0xe0, 0xd1, 0x6a, 0xe9, 0x31, | 90 | .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31" |
94 | 0xb7, 0x3c, 0x59, 0xd7, 0xe0, 0xc0, 0x89, 0xc0 }, | 91 | "\xb7\x3c\x59\xd7\xe0\xc0\x89\xc0", |
95 | }, { | 92 | }, { |
96 | .plaintext = "a", | 93 | .plaintext = "a", |
97 | .psize = 1, | 94 | .psize = 1, |
98 | .digest = { 0xbd, 0xe5, 0x2c, 0xb3, 0x1d, 0xe3, 0x3e, 0x46, | 95 | .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46" |
99 | 0x24, 0x5e, 0x05, 0xfb, 0xdb, 0xd6, 0xfb, 0x24 }, | 96 | "\x24\x5e\x05\xfb\xdb\xd6\xfb\x24", |
100 | }, { | 97 | }, { |
101 | .plaintext = "abc", | 98 | .plaintext = "abc", |
102 | .psize = 3, | 99 | .psize = 3, |
103 | .digest = { 0xa4, 0x48, 0x01, 0x7a, 0xaf, 0x21, 0xd8, 0x52, | 100 | .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52" |
104 | 0x5f, 0xc1, 0x0a, 0xe8, 0x7a, 0xa6, 0x72, 0x9d }, | 101 | "\x5f\xc1\x0a\xe8\x7a\xa6\x72\x9d", |
105 | }, { | 102 | }, { |
106 | .plaintext = "message digest", | 103 | .plaintext = "message digest", |
107 | .psize = 14, | 104 | .psize = 14, |
108 | .digest = { 0xd9, 0x13, 0x0a, 0x81, 0x64, 0x54, 0x9f, 0xe8, | 105 | .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8" |
109 | 0x18, 0x87, 0x48, 0x06, 0xe1, 0xc7, 0x01, 0x4b }, | 106 | "\x18\x87\x48\x06\xe1\xc7\x01\x4b", |
110 | }, { | 107 | }, { |
111 | .plaintext = "abcdefghijklmnopqrstuvwxyz", | 108 | .plaintext = "abcdefghijklmnopqrstuvwxyz", |
112 | .psize = 26, | 109 | .psize = 26, |
113 | .digest = { 0xd7, 0x9e, 0x1c, 0x30, 0x8a, 0xa5, 0xbb, 0xcd, | 110 | .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd" |
114 | 0xee, 0xa8, 0xed, 0x63, 0xdf, 0x41, 0x2d, 0xa9 }, | 111 | "\xee\xa8\xed\x63\xdf\x41\x2d\xa9", |
115 | .np = 2, | 112 | .np = 2, |
116 | .tap = { 13, 13 }, | 113 | .tap = { 13, 13 }, |
117 | }, { | 114 | }, { |
118 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", | 115 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", |
119 | .psize = 62, | 116 | .psize = 62, |
120 | .digest = { 0x04, 0x3f, 0x85, 0x82, 0xf2, 0x41, 0xdb, 0x35, | 117 | .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35" |
121 | 0x1c, 0xe6, 0x27, 0xe1, 0x53, 0xe7, 0xf0, 0xe4 }, | 118 | "\x1c\xe6\x27\xe1\x53\xe7\xf0\xe4", |
122 | }, { | 119 | }, { |
123 | .plaintext = "123456789012345678901234567890123456789012345678901234567890123" | 120 | .plaintext = "123456789012345678901234567890123456789012345678901234567890123" |
124 | "45678901234567890", | 121 | "45678901234567890", |
125 | .psize = 80, | 122 | .psize = 80, |
126 | .digest = { 0xe3, 0x3b, 0x4d, 0xdc, 0x9c, 0x38, 0xf2, 0x19, | 123 | .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19" |
127 | 0x9c, 0x3e, 0x7b, 0x16, 0x4f, 0xcc, 0x05, 0x36 }, | 124 | "\x9c\x3e\x7b\x16\x4f\xcc\x05\x36", |
128 | }, | 125 | }, |
129 | }; | 126 | }; |
130 | 127 | ||
@@ -135,41 +132,41 @@ static struct hash_testvec md4_tv_template [] = { | |||
135 | 132 | ||
136 | static struct hash_testvec md5_tv_template[] = { | 133 | static struct hash_testvec md5_tv_template[] = { |
137 | { | 134 | { |
138 | .digest = { 0xd4, 0x1d, 0x8c, 0xd9, 0x8f, 0x00, 0xb2, 0x04, | 135 | .digest = "\xd4\x1d\x8c\xd9\x8f\x00\xb2\x04" |
139 | 0xe9, 0x80, 0x09, 0x98, 0xec, 0xf8, 0x42, 0x7e }, | 136 | "\xe9\x80\x09\x98\xec\xf8\x42\x7e", |
140 | }, { | 137 | }, { |
141 | .plaintext = "a", | 138 | .plaintext = "a", |
142 | .psize = 1, | 139 | .psize = 1, |
143 | .digest = { 0x0c, 0xc1, 0x75, 0xb9, 0xc0, 0xf1, 0xb6, 0xa8, | 140 | .digest = "\x0c\xc1\x75\xb9\xc0\xf1\xb6\xa8" |
144 | 0x31, 0xc3, 0x99, 0xe2, 0x69, 0x77, 0x26, 0x61 }, | 141 | "\x31\xc3\x99\xe2\x69\x77\x26\x61", |
145 | }, { | 142 | }, { |
146 | .plaintext = "abc", | 143 | .plaintext = "abc", |
147 | .psize = 3, | 144 | .psize = 3, |
148 | .digest = { 0x90, 0x01, 0x50, 0x98, 0x3c, 0xd2, 0x4f, 0xb0, | 145 | .digest = "\x90\x01\x50\x98\x3c\xd2\x4f\xb0" |
149 | 0xd6, 0x96, 0x3f, 0x7d, 0x28, 0xe1, 0x7f, 0x72 }, | 146 | "\xd6\x96\x3f\x7d\x28\xe1\x7f\x72", |
150 | }, { | 147 | }, { |
151 | .plaintext = "message digest", | 148 | .plaintext = "message digest", |
152 | .psize = 14, | 149 | .psize = 14, |
153 | .digest = { 0xf9, 0x6b, 0x69, 0x7d, 0x7c, 0xb7, 0x93, 0x8d, | 150 | .digest = "\xf9\x6b\x69\x7d\x7c\xb7\x93\x8d" |
154 | 0x52, 0x5a, 0x2f, 0x31, 0xaa, 0xf1, 0x61, 0xd0 }, | 151 | "\x52\x5a\x2f\x31\xaa\xf1\x61\xd0", |
155 | }, { | 152 | }, { |
156 | .plaintext = "abcdefghijklmnopqrstuvwxyz", | 153 | .plaintext = "abcdefghijklmnopqrstuvwxyz", |
157 | .psize = 26, | 154 | .psize = 26, |
158 | .digest = { 0xc3, 0xfc, 0xd3, 0xd7, 0x61, 0x92, 0xe4, 0x00, | 155 | .digest = "\xc3\xfc\xd3\xd7\x61\x92\xe4\x00" |
159 | 0x7d, 0xfb, 0x49, 0x6c, 0xca, 0x67, 0xe1, 0x3b }, | 156 | "\x7d\xfb\x49\x6c\xca\x67\xe1\x3b", |
160 | .np = 2, | 157 | .np = 2, |
161 | .tap = {13, 13} | 158 | .tap = {13, 13} |
162 | }, { | 159 | }, { |
163 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", | 160 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", |
164 | .psize = 62, | 161 | .psize = 62, |
165 | .digest = { 0xd1, 0x74, 0xab, 0x98, 0xd2, 0x77, 0xd9, 0xf5, | 162 | .digest = "\xd1\x74\xab\x98\xd2\x77\xd9\xf5" |
166 | 0xa5, 0x61, 0x1c, 0x2c, 0x9f, 0x41, 0x9d, 0x9f }, | 163 | "\xa5\x61\x1c\x2c\x9f\x41\x9d\x9f", |
167 | }, { | 164 | }, { |
168 | .plaintext = "12345678901234567890123456789012345678901234567890123456789012" | 165 | .plaintext = "12345678901234567890123456789012345678901234567890123456789012" |
169 | "345678901234567890", | 166 | "345678901234567890", |
170 | .psize = 80, | 167 | .psize = 80, |
171 | .digest = { 0x57, 0xed, 0xf4, 0xa2, 0x2b, 0xe3, 0xc9, 0x55, | 168 | .digest = "\x57\xed\xf4\xa2\x2b\xe3\xc9\x55" |
172 | 0xac, 0x49, 0xda, 0x2e, 0x21, 0x07, 0xb6, 0x7a }, | 169 | "\xac\x49\xda\x2e\x21\x07\xb6\x7a", |
173 | } | 170 | } |
174 | }; | 171 | }; |
175 | 172 | ||
@@ -182,13 +179,13 @@ static struct hash_testvec sha1_tv_template[] = { | |||
182 | { | 179 | { |
183 | .plaintext = "abc", | 180 | .plaintext = "abc", |
184 | .psize = 3, | 181 | .psize = 3, |
185 | .digest = { 0xa9, 0x99, 0x3e, 0x36, 0x47, 0x06, 0x81, 0x6a, 0xba, 0x3e, | 182 | .digest = "\xa9\x99\x3e\x36\x47\x06\x81\x6a\xba\x3e" |
186 | 0x25, 0x71, 0x78, 0x50, 0xc2, 0x6c, 0x9c, 0xd0, 0xd8, 0x9d }, | 183 | "\x25\x71\x78\x50\xc2\x6c\x9c\xd0\xd8\x9d", |
187 | }, { | 184 | }, { |
188 | .plaintext = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", | 185 | .plaintext = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", |
189 | .psize = 56, | 186 | .psize = 56, |
190 | .digest = { 0x84, 0x98, 0x3e, 0x44, 0x1c, 0x3b, 0xd2, 0x6e, 0xba, 0xae, | 187 | .digest = "\x84\x98\x3e\x44\x1c\x3b\xd2\x6e\xba\xae" |
191 | 0x4a, 0xa1, 0xf9, 0x51, 0x29, 0xe5, 0xe5, 0x46, 0x70, 0xf1 }, | 188 | "\x4a\xa1\xf9\x51\x29\xe5\xe5\x46\x70\xf1", |
192 | .np = 2, | 189 | .np = 2, |
193 | .tap = { 28, 28 } | 190 | .tap = { 28, 28 } |
194 | } | 191 | } |
@@ -204,18 +201,18 @@ static struct hash_testvec sha224_tv_template[] = { | |||
204 | { | 201 | { |
205 | .plaintext = "abc", | 202 | .plaintext = "abc", |
206 | .psize = 3, | 203 | .psize = 3, |
207 | .digest = { 0x23, 0x09, 0x7D, 0x22, 0x34, 0x05, 0xD8, 0x22, | 204 | .digest = "\x23\x09\x7D\x22\x34\x05\xD8\x22" |
208 | 0x86, 0x42, 0xA4, 0x77, 0xBD, 0xA2, 0x55, 0xB3, | 205 | "\x86\x42\xA4\x77\xBD\xA2\x55\xB3" |
209 | 0x2A, 0xAD, 0xBC, 0xE4, 0xBD, 0xA0, 0xB3, 0xF7, | 206 | "\x2A\xAD\xBC\xE4\xBD\xA0\xB3\xF7" |
210 | 0xE3, 0x6C, 0x9D, 0xA7}, | 207 | "\xE3\x6C\x9D\xA7", |
211 | }, { | 208 | }, { |
212 | .plaintext = | 209 | .plaintext = |
213 | "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", | 210 | "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", |
214 | .psize = 56, | 211 | .psize = 56, |
215 | .digest = { 0x75, 0x38, 0x8B, 0x16, 0x51, 0x27, 0x76, 0xCC, | 212 | .digest = "\x75\x38\x8B\x16\x51\x27\x76\xCC" |
216 | 0x5D, 0xBA, 0x5D, 0xA1, 0xFD, 0x89, 0x01, 0x50, | 213 | "\x5D\xBA\x5D\xA1\xFD\x89\x01\x50" |
217 | 0xB0, 0xC6, 0x45, 0x5C, 0xB4, 0xF5, 0x8B, 0x19, | 214 | "\xB0\xC6\x45\x5C\xB4\xF5\x8B\x19" |
218 | 0x52, 0x52, 0x25, 0x25 }, | 215 | "\x52\x52\x25\x25", |
219 | .np = 2, | 216 | .np = 2, |
220 | .tap = { 28, 28 } | 217 | .tap = { 28, 28 } |
221 | } | 218 | } |
@@ -230,17 +227,17 @@ static struct hash_testvec sha256_tv_template[] = { | |||
230 | { | 227 | { |
231 | .plaintext = "abc", | 228 | .plaintext = "abc", |
232 | .psize = 3, | 229 | .psize = 3, |
233 | .digest = { 0xba, 0x78, 0x16, 0xbf, 0x8f, 0x01, 0xcf, 0xea, | 230 | .digest = "\xba\x78\x16\xbf\x8f\x01\xcf\xea" |
234 | 0x41, 0x41, 0x40, 0xde, 0x5d, 0xae, 0x22, 0x23, | 231 | "\x41\x41\x40\xde\x5d\xae\x22\x23" |
235 | 0xb0, 0x03, 0x61, 0xa3, 0x96, 0x17, 0x7a, 0x9c, | 232 | "\xb0\x03\x61\xa3\x96\x17\x7a\x9c" |
236 | 0xb4, 0x10, 0xff, 0x61, 0xf2, 0x00, 0x15, 0xad }, | 233 | "\xb4\x10\xff\x61\xf2\x00\x15\xad", |
237 | }, { | 234 | }, { |
238 | .plaintext = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", | 235 | .plaintext = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", |
239 | .psize = 56, | 236 | .psize = 56, |
240 | .digest = { 0x24, 0x8d, 0x6a, 0x61, 0xd2, 0x06, 0x38, 0xb8, | 237 | .digest = "\x24\x8d\x6a\x61\xd2\x06\x38\xb8" |
241 | 0xe5, 0xc0, 0x26, 0x93, 0x0c, 0x3e, 0x60, 0x39, | 238 | "\xe5\xc0\x26\x93\x0c\x3e\x60\x39" |
242 | 0xa3, 0x3c, 0xe4, 0x59, 0x64, 0xff, 0x21, 0x67, | 239 | "\xa3\x3c\xe4\x59\x64\xff\x21\x67" |
243 | 0xf6, 0xec, 0xed, 0xd4, 0x19, 0xdb, 0x06, 0xc1 }, | 240 | "\xf6\xec\xed\xd4\x19\xdb\x06\xc1", |
244 | .np = 2, | 241 | .np = 2, |
245 | .tap = { 28, 28 } | 242 | .tap = { 28, 28 } |
246 | }, | 243 | }, |
@@ -255,41 +252,41 @@ static struct hash_testvec sha384_tv_template[] = { | |||
255 | { | 252 | { |
256 | .plaintext= "abc", | 253 | .plaintext= "abc", |
257 | .psize = 3, | 254 | .psize = 3, |
258 | .digest = { 0xcb, 0x00, 0x75, 0x3f, 0x45, 0xa3, 0x5e, 0x8b, | 255 | .digest = "\xcb\x00\x75\x3f\x45\xa3\x5e\x8b" |
259 | 0xb5, 0xa0, 0x3d, 0x69, 0x9a, 0xc6, 0x50, 0x07, | 256 | "\xb5\xa0\x3d\x69\x9a\xc6\x50\x07" |
260 | 0x27, 0x2c, 0x32, 0xab, 0x0e, 0xde, 0xd1, 0x63, | 257 | "\x27\x2c\x32\xab\x0e\xde\xd1\x63" |
261 | 0x1a, 0x8b, 0x60, 0x5a, 0x43, 0xff, 0x5b, 0xed, | 258 | "\x1a\x8b\x60\x5a\x43\xff\x5b\xed" |
262 | 0x80, 0x86, 0x07, 0x2b, 0xa1, 0xe7, 0xcc, 0x23, | 259 | "\x80\x86\x07\x2b\xa1\xe7\xcc\x23" |
263 | 0x58, 0xba, 0xec, 0xa1, 0x34, 0xc8, 0x25, 0xa7 }, | 260 | "\x58\xba\xec\xa1\x34\xc8\x25\xa7", |
264 | }, { | 261 | }, { |
265 | .plaintext = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", | 262 | .plaintext = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", |
266 | .psize = 56, | 263 | .psize = 56, |
267 | .digest = { 0x33, 0x91, 0xfd, 0xdd, 0xfc, 0x8d, 0xc7, 0x39, | 264 | .digest = "\x33\x91\xfd\xdd\xfc\x8d\xc7\x39" |
268 | 0x37, 0x07, 0xa6, 0x5b, 0x1b, 0x47, 0x09, 0x39, | 265 | "\x37\x07\xa6\x5b\x1b\x47\x09\x39" |
269 | 0x7c, 0xf8, 0xb1, 0xd1, 0x62, 0xaf, 0x05, 0xab, | 266 | "\x7c\xf8\xb1\xd1\x62\xaf\x05\xab" |
270 | 0xfe, 0x8f, 0x45, 0x0d, 0xe5, 0xf3, 0x6b, 0xc6, | 267 | "\xfe\x8f\x45\x0d\xe5\xf3\x6b\xc6" |
271 | 0xb0, 0x45, 0x5a, 0x85, 0x20, 0xbc, 0x4e, 0x6f, | 268 | "\xb0\x45\x5a\x85\x20\xbc\x4e\x6f" |
272 | 0x5f, 0xe9, 0x5b, 0x1f, 0xe3, 0xc8, 0x45, 0x2b}, | 269 | "\x5f\xe9\x5b\x1f\xe3\xc8\x45\x2b", |
273 | }, { | 270 | }, { |
274 | .plaintext = "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmn" | 271 | .plaintext = "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmn" |
275 | "hijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", | 272 | "hijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", |
276 | .psize = 112, | 273 | .psize = 112, |
277 | .digest = { 0x09, 0x33, 0x0c, 0x33, 0xf7, 0x11, 0x47, 0xe8, | 274 | .digest = "\x09\x33\x0c\x33\xf7\x11\x47\xe8" |
278 | 0x3d, 0x19, 0x2f, 0xc7, 0x82, 0xcd, 0x1b, 0x47, | 275 | "\x3d\x19\x2f\xc7\x82\xcd\x1b\x47" |
279 | 0x53, 0x11, 0x1b, 0x17, 0x3b, 0x3b, 0x05, 0xd2, | 276 | "\x53\x11\x1b\x17\x3b\x3b\x05\xd2" |
280 | 0x2f, 0xa0, 0x80, 0x86, 0xe3, 0xb0, 0xf7, 0x12, | 277 | "\x2f\xa0\x80\x86\xe3\xb0\xf7\x12" |
281 | 0xfc, 0xc7, 0xc7, 0x1a, 0x55, 0x7e, 0x2d, 0xb9, | 278 | "\xfc\xc7\xc7\x1a\x55\x7e\x2d\xb9" |
282 | 0x66, 0xc3, 0xe9, 0xfa, 0x91, 0x74, 0x60, 0x39 }, | 279 | "\x66\xc3\xe9\xfa\x91\x74\x60\x39", |
283 | }, { | 280 | }, { |
284 | .plaintext = "abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcd" | 281 | .plaintext = "abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcd" |
285 | "efghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz", | 282 | "efghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz", |
286 | .psize = 104, | 283 | .psize = 104, |
287 | .digest = { 0x3d, 0x20, 0x89, 0x73, 0xab, 0x35, 0x08, 0xdb, | 284 | .digest = "\x3d\x20\x89\x73\xab\x35\x08\xdb" |
288 | 0xbd, 0x7e, 0x2c, 0x28, 0x62, 0xba, 0x29, 0x0a, | 285 | "\xbd\x7e\x2c\x28\x62\xba\x29\x0a" |
289 | 0xd3, 0x01, 0x0e, 0x49, 0x78, 0xc1, 0x98, 0xdc, | 286 | "\xd3\x01\x0e\x49\x78\xc1\x98\xdc" |
290 | 0x4d, 0x8f, 0xd0, 0x14, 0xe5, 0x82, 0x82, 0x3a, | 287 | "\x4d\x8f\xd0\x14\xe5\x82\x82\x3a" |
291 | 0x89, 0xe1, 0x6f, 0x9b, 0x2a, 0x7b, 0xbc, 0x1a, | 288 | "\x89\xe1\x6f\x9b\x2a\x7b\xbc\x1a" |
292 | 0xc9, 0x38, 0xe2, 0xd1, 0x99, 0xe8, 0xbe, 0xa4 }, | 289 | "\xc9\x38\xe2\xd1\x99\xe8\xbe\xa4", |
293 | .np = 4, | 290 | .np = 4, |
294 | .tap = { 26, 26, 26, 26 } | 291 | .tap = { 26, 26, 26, 26 } |
295 | }, | 292 | }, |
@@ -304,49 +301,49 @@ static struct hash_testvec sha512_tv_template[] = { | |||
304 | { | 301 | { |
305 | .plaintext = "abc", | 302 | .plaintext = "abc", |
306 | .psize = 3, | 303 | .psize = 3, |
307 | .digest = { 0xdd, 0xaf, 0x35, 0xa1, 0x93, 0x61, 0x7a, 0xba, | 304 | .digest = "\xdd\xaf\x35\xa1\x93\x61\x7a\xba" |
308 | 0xcc, 0x41, 0x73, 0x49, 0xae, 0x20, 0x41, 0x31, | 305 | "\xcc\x41\x73\x49\xae\x20\x41\x31" |
309 | 0x12, 0xe6, 0xfa, 0x4e, 0x89, 0xa9, 0x7e, 0xa2, | 306 | "\x12\xe6\xfa\x4e\x89\xa9\x7e\xa2" |
310 | 0x0a, 0x9e, 0xee, 0xe6, 0x4b, 0x55, 0xd3, 0x9a, | 307 | "\x0a\x9e\xee\xe6\x4b\x55\xd3\x9a" |
311 | 0x21, 0x92, 0x99, 0x2a, 0x27, 0x4f, 0xc1, 0xa8, | 308 | "\x21\x92\x99\x2a\x27\x4f\xc1\xa8" |
312 | 0x36, 0xba, 0x3c, 0x23, 0xa3, 0xfe, 0xeb, 0xbd, | 309 | "\x36\xba\x3c\x23\xa3\xfe\xeb\xbd" |
313 | 0x45, 0x4d, 0x44, 0x23, 0x64, 0x3c, 0xe8, 0x0e, | 310 | "\x45\x4d\x44\x23\x64\x3c\xe8\x0e" |
314 | 0x2a, 0x9a, 0xc9, 0x4f, 0xa5, 0x4c, 0xa4, 0x9f }, | 311 | "\x2a\x9a\xc9\x4f\xa5\x4c\xa4\x9f", |
315 | }, { | 312 | }, { |
316 | .plaintext = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", | 313 | .plaintext = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", |
317 | .psize = 56, | 314 | .psize = 56, |
318 | .digest = { 0x20, 0x4a, 0x8f, 0xc6, 0xdd, 0xa8, 0x2f, 0x0a, | 315 | .digest = "\x20\x4a\x8f\xc6\xdd\xa8\x2f\x0a" |
319 | 0x0c, 0xed, 0x7b, 0xeb, 0x8e, 0x08, 0xa4, 0x16, | 316 | "\x0c\xed\x7b\xeb\x8e\x08\xa4\x16" |
320 | 0x57, 0xc1, 0x6e, 0xf4, 0x68, 0xb2, 0x28, 0xa8, | 317 | "\x57\xc1\x6e\xf4\x68\xb2\x28\xa8" |
321 | 0x27, 0x9b, 0xe3, 0x31, 0xa7, 0x03, 0xc3, 0x35, | 318 | "\x27\x9b\xe3\x31\xa7\x03\xc3\x35" |
322 | 0x96, 0xfd, 0x15, 0xc1, 0x3b, 0x1b, 0x07, 0xf9, | 319 | "\x96\xfd\x15\xc1\x3b\x1b\x07\xf9" |
323 | 0xaa, 0x1d, 0x3b, 0xea, 0x57, 0x78, 0x9c, 0xa0, | 320 | "\xaa\x1d\x3b\xea\x57\x78\x9c\xa0" |
324 | 0x31, 0xad, 0x85, 0xc7, 0xa7, 0x1d, 0xd7, 0x03, | 321 | "\x31\xad\x85\xc7\xa7\x1d\xd7\x03" |
325 | 0x54, 0xec, 0x63, 0x12, 0x38, 0xca, 0x34, 0x45 }, | 322 | "\x54\xec\x63\x12\x38\xca\x34\x45", |
326 | }, { | 323 | }, { |
327 | .plaintext = "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmn" | 324 | .plaintext = "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmn" |
328 | "hijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", | 325 | "hijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", |
329 | .psize = 112, | 326 | .psize = 112, |
330 | .digest = { 0x8e, 0x95, 0x9b, 0x75, 0xda, 0xe3, 0x13, 0xda, | 327 | .digest = "\x8e\x95\x9b\x75\xda\xe3\x13\xda" |
331 | 0x8c, 0xf4, 0xf7, 0x28, 0x14, 0xfc, 0x14, 0x3f, | 328 | "\x8c\xf4\xf7\x28\x14\xfc\x14\x3f" |
332 | 0x8f, 0x77, 0x79, 0xc6, 0xeb, 0x9f, 0x7f, 0xa1, | 329 | "\x8f\x77\x79\xc6\xeb\x9f\x7f\xa1" |
333 | 0x72, 0x99, 0xae, 0xad, 0xb6, 0x88, 0x90, 0x18, | 330 | "\x72\x99\xae\xad\xb6\x88\x90\x18" |
334 | 0x50, 0x1d, 0x28, 0x9e, 0x49, 0x00, 0xf7, 0xe4, | 331 | "\x50\x1d\x28\x9e\x49\x00\xf7\xe4" |
335 | 0x33, 0x1b, 0x99, 0xde, 0xc4, 0xb5, 0x43, 0x3a, | 332 | "\x33\x1b\x99\xde\xc4\xb5\x43\x3a" |
336 | 0xc7, 0xd3, 0x29, 0xee, 0xb6, 0xdd, 0x26, 0x54, | 333 | "\xc7\xd3\x29\xee\xb6\xdd\x26\x54" |
337 | 0x5e, 0x96, 0xe5, 0x5b, 0x87, 0x4b, 0xe9, 0x09 }, | 334 | "\x5e\x96\xe5\x5b\x87\x4b\xe9\x09", |
338 | }, { | 335 | }, { |
339 | .plaintext = "abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcd" | 336 | .plaintext = "abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcd" |
340 | "efghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz", | 337 | "efghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz", |
341 | .psize = 104, | 338 | .psize = 104, |
342 | .digest = { 0x93, 0x0d, 0x0c, 0xef, 0xcb, 0x30, 0xff, 0x11, | 339 | .digest = "\x93\x0d\x0c\xef\xcb\x30\xff\x11" |
343 | 0x33, 0xb6, 0x89, 0x81, 0x21, 0xf1, 0xcf, 0x3d, | 340 | "\x33\xb6\x89\x81\x21\xf1\xcf\x3d" |
344 | 0x27, 0x57, 0x8a, 0xfc, 0xaf, 0xe8, 0x67, 0x7c, | 341 | "\x27\x57\x8a\xfc\xaf\xe8\x67\x7c" |
345 | 0x52, 0x57, 0xcf, 0x06, 0x99, 0x11, 0xf7, 0x5d, | 342 | "\x52\x57\xcf\x06\x99\x11\xf7\x5d" |
346 | 0x8f, 0x58, 0x31, 0xb5, 0x6e, 0xbf, 0xda, 0x67, | 343 | "\x8f\x58\x31\xb5\x6e\xbf\xda\x67" |
347 | 0xb2, 0x78, 0xe6, 0x6d, 0xff, 0x8b, 0x84, 0xfe, | 344 | "\xb2\x78\xe6\x6d\xff\x8b\x84\xfe" |
348 | 0x2b, 0x28, 0x70, 0xf7, 0x42, 0xa5, 0x80, 0xd8, | 345 | "\x2b\x28\x70\xf7\x42\xa5\x80\xd8" |
349 | 0xed, 0xb4, 0x19, 0x87, 0x23, 0x28, 0x50, 0xc9 }, | 346 | "\xed\xb4\x19\x87\x23\x28\x50\xc9", |
350 | .np = 4, | 347 | .np = 4, |
351 | .tap = { 26, 26, 26, 26 } | 348 | .tap = { 26, 26, 26, 26 } |
352 | }, | 349 | }, |
@@ -364,95 +361,95 @@ static struct hash_testvec wp512_tv_template[] = { | |||
364 | { | 361 | { |
365 | .plaintext = "", | 362 | .plaintext = "", |
366 | .psize = 0, | 363 | .psize = 0, |
367 | .digest = { 0x19, 0xFA, 0x61, 0xD7, 0x55, 0x22, 0xA4, 0x66, | 364 | .digest = "\x19\xFA\x61\xD7\x55\x22\xA4\x66" |
368 | 0x9B, 0x44, 0xE3, 0x9C, 0x1D, 0x2E, 0x17, 0x26, | 365 | "\x9B\x44\xE3\x9C\x1D\x2E\x17\x26" |
369 | 0xC5, 0x30, 0x23, 0x21, 0x30, 0xD4, 0x07, 0xF8, | 366 | "\xC5\x30\x23\x21\x30\xD4\x07\xF8" |
370 | 0x9A, 0xFE, 0xE0, 0x96, 0x49, 0x97, 0xF7, 0xA7, | 367 | "\x9A\xFE\xE0\x96\x49\x97\xF7\xA7" |
371 | 0x3E, 0x83, 0xBE, 0x69, 0x8B, 0x28, 0x8F, 0xEB, | 368 | "\x3E\x83\xBE\x69\x8B\x28\x8F\xEB" |
372 | 0xCF, 0x88, 0xE3, 0xE0, 0x3C, 0x4F, 0x07, 0x57, | 369 | "\xCF\x88\xE3\xE0\x3C\x4F\x07\x57" |
373 | 0xEA, 0x89, 0x64, 0xE5, 0x9B, 0x63, 0xD9, 0x37, | 370 | "\xEA\x89\x64\xE5\x9B\x63\xD9\x37" |
374 | 0x08, 0xB1, 0x38, 0xCC, 0x42, 0xA6, 0x6E, 0xB3 }, | 371 | "\x08\xB1\x38\xCC\x42\xA6\x6E\xB3", |
375 | 372 | ||
376 | 373 | ||
377 | }, { | 374 | }, { |
378 | .plaintext = "a", | 375 | .plaintext = "a", |
379 | .psize = 1, | 376 | .psize = 1, |
380 | .digest = { 0x8A, 0xCA, 0x26, 0x02, 0x79, 0x2A, 0xEC, 0x6F, | 377 | .digest = "\x8A\xCA\x26\x02\x79\x2A\xEC\x6F" |
381 | 0x11, 0xA6, 0x72, 0x06, 0x53, 0x1F, 0xB7, 0xD7, | 378 | "\x11\xA6\x72\x06\x53\x1F\xB7\xD7" |
382 | 0xF0, 0xDF, 0xF5, 0x94, 0x13, 0x14, 0x5E, 0x69, | 379 | "\xF0\xDF\xF5\x94\x13\x14\x5E\x69" |
383 | 0x73, 0xC4, 0x50, 0x01, 0xD0, 0x08, 0x7B, 0x42, | 380 | "\x73\xC4\x50\x01\xD0\x08\x7B\x42" |
384 | 0xD1, 0x1B, 0xC6, 0x45, 0x41, 0x3A, 0xEF, 0xF6, | 381 | "\xD1\x1B\xC6\x45\x41\x3A\xEF\xF6" |
385 | 0x3A, 0x42, 0x39, 0x1A, 0x39, 0x14, 0x5A, 0x59, | 382 | "\x3A\x42\x39\x1A\x39\x14\x5A\x59" |
386 | 0x1A, 0x92, 0x20, 0x0D, 0x56, 0x01, 0x95, 0xE5, | 383 | "\x1A\x92\x20\x0D\x56\x01\x95\xE5" |
387 | 0x3B, 0x47, 0x85, 0x84, 0xFD, 0xAE, 0x23, 0x1A }, | 384 | "\x3B\x47\x85\x84\xFD\xAE\x23\x1A", |
388 | }, { | 385 | }, { |
389 | .plaintext = "abc", | 386 | .plaintext = "abc", |
390 | .psize = 3, | 387 | .psize = 3, |
391 | .digest = { 0x4E, 0x24, 0x48, 0xA4, 0xC6, 0xF4, 0x86, 0xBB, | 388 | .digest = "\x4E\x24\x48\xA4\xC6\xF4\x86\xBB" |
392 | 0x16, 0xB6, 0x56, 0x2C, 0x73, 0xB4, 0x02, 0x0B, | 389 | "\x16\xB6\x56\x2C\x73\xB4\x02\x0B" |
393 | 0xF3, 0x04, 0x3E, 0x3A, 0x73, 0x1B, 0xCE, 0x72, | 390 | "\xF3\x04\x3E\x3A\x73\x1B\xCE\x72" |
394 | 0x1A, 0xE1, 0xB3, 0x03, 0xD9, 0x7E, 0x6D, 0x4C, | 391 | "\x1A\xE1\xB3\x03\xD9\x7E\x6D\x4C" |
395 | 0x71, 0x81, 0xEE, 0xBD, 0xB6, 0xC5, 0x7E, 0x27, | 392 | "\x71\x81\xEE\xBD\xB6\xC5\x7E\x27" |
396 | 0x7D, 0x0E, 0x34, 0x95, 0x71, 0x14, 0xCB, 0xD6, | 393 | "\x7D\x0E\x34\x95\x71\x14\xCB\xD6" |
397 | 0xC7, 0x97, 0xFC, 0x9D, 0x95, 0xD8, 0xB5, 0x82, | 394 | "\xC7\x97\xFC\x9D\x95\xD8\xB5\x82" |
398 | 0xD2, 0x25, 0x29, 0x20, 0x76, 0xD4, 0xEE, 0xF5 }, | 395 | "\xD2\x25\x29\x20\x76\xD4\xEE\xF5", |
399 | }, { | 396 | }, { |
400 | .plaintext = "message digest", | 397 | .plaintext = "message digest", |
401 | .psize = 14, | 398 | .psize = 14, |
402 | .digest = { 0x37, 0x8C, 0x84, 0xA4, 0x12, 0x6E, 0x2D, 0xC6, | 399 | .digest = "\x37\x8C\x84\xA4\x12\x6E\x2D\xC6" |
403 | 0xE5, 0x6D, 0xCC, 0x74, 0x58, 0x37, 0x7A, 0xAC, | 400 | "\xE5\x6D\xCC\x74\x58\x37\x7A\xAC" |
404 | 0x83, 0x8D, 0x00, 0x03, 0x22, 0x30, 0xF5, 0x3C, | 401 | "\x83\x8D\x00\x03\x22\x30\xF5\x3C" |
405 | 0xE1, 0xF5, 0x70, 0x0C, 0x0F, 0xFB, 0x4D, 0x3B, | 402 | "\xE1\xF5\x70\x0C\x0F\xFB\x4D\x3B" |
406 | 0x84, 0x21, 0x55, 0x76, 0x59, 0xEF, 0x55, 0xC1, | 403 | "\x84\x21\x55\x76\x59\xEF\x55\xC1" |
407 | 0x06, 0xB4, 0xB5, 0x2A, 0xC5, 0xA4, 0xAA, 0xA6, | 404 | "\x06\xB4\xB5\x2A\xC5\xA4\xAA\xA6" |
408 | 0x92, 0xED, 0x92, 0x00, 0x52, 0x83, 0x8F, 0x33, | 405 | "\x92\xED\x92\x00\x52\x83\x8F\x33" |
409 | 0x62, 0xE8, 0x6D, 0xBD, 0x37, 0xA8, 0x90, 0x3E }, | 406 | "\x62\xE8\x6D\xBD\x37\xA8\x90\x3E", |
410 | }, { | 407 | }, { |
411 | .plaintext = "abcdefghijklmnopqrstuvwxyz", | 408 | .plaintext = "abcdefghijklmnopqrstuvwxyz", |
412 | .psize = 26, | 409 | .psize = 26, |
413 | .digest = { 0xF1, 0xD7, 0x54, 0x66, 0x26, 0x36, 0xFF, 0xE9, | 410 | .digest = "\xF1\xD7\x54\x66\x26\x36\xFF\xE9" |
414 | 0x2C, 0x82, 0xEB, 0xB9, 0x21, 0x2A, 0x48, 0x4A, | 411 | "\x2C\x82\xEB\xB9\x21\x2A\x48\x4A" |
415 | 0x8D, 0x38, 0x63, 0x1E, 0xAD, 0x42, 0x38, 0xF5, | 412 | "\x8D\x38\x63\x1E\xAD\x42\x38\xF5" |
416 | 0x44, 0x2E, 0xE1, 0x3B, 0x80, 0x54, 0xE4, 0x1B, | 413 | "\x44\x2E\xE1\x3B\x80\x54\xE4\x1B" |
417 | 0x08, 0xBF, 0x2A, 0x92, 0x51, 0xC3, 0x0B, 0x6A, | 414 | "\x08\xBF\x2A\x92\x51\xC3\x0B\x6A" |
418 | 0x0B, 0x8A, 0xAE, 0x86, 0x17, 0x7A, 0xB4, 0xA6, | 415 | "\x0B\x8A\xAE\x86\x17\x7A\xB4\xA6" |
419 | 0xF6, 0x8F, 0x67, 0x3E, 0x72, 0x07, 0x86, 0x5D, | 416 | "\xF6\x8F\x67\x3E\x72\x07\x86\x5D" |
420 | 0x5D, 0x98, 0x19, 0xA3, 0xDB, 0xA4, 0xEB, 0x3B }, | 417 | "\x5D\x98\x19\xA3\xDB\xA4\xEB\x3B", |
421 | }, { | 418 | }, { |
422 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZ" | 419 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZ" |
423 | "abcdefghijklmnopqrstuvwxyz0123456789", | 420 | "abcdefghijklmnopqrstuvwxyz0123456789", |
424 | .psize = 62, | 421 | .psize = 62, |
425 | .digest = { 0xDC, 0x37, 0xE0, 0x08, 0xCF, 0x9E, 0xE6, 0x9B, | 422 | .digest = "\xDC\x37\xE0\x08\xCF\x9E\xE6\x9B" |
426 | 0xF1, 0x1F, 0x00, 0xED, 0x9A, 0xBA, 0x26, 0x90, | 423 | "\xF1\x1F\x00\xED\x9A\xBA\x26\x90" |
427 | 0x1D, 0xD7, 0xC2, 0x8C, 0xDE, 0xC0, 0x66, 0xCC, | 424 | "\x1D\xD7\xC2\x8C\xDE\xC0\x66\xCC" |
428 | 0x6A, 0xF4, 0x2E, 0x40, 0xF8, 0x2F, 0x3A, 0x1E, | 425 | "\x6A\xF4\x2E\x40\xF8\x2F\x3A\x1E" |
429 | 0x08, 0xEB, 0xA2, 0x66, 0x29, 0x12, 0x9D, 0x8F, | 426 | "\x08\xEB\xA2\x66\x29\x12\x9D\x8F" |
430 | 0xB7, 0xCB, 0x57, 0x21, 0x1B, 0x92, 0x81, 0xA6, | 427 | "\xB7\xCB\x57\x21\x1B\x92\x81\xA6" |
431 | 0x55, 0x17, 0xCC, 0x87, 0x9D, 0x7B, 0x96, 0x21, | 428 | "\x55\x17\xCC\x87\x9D\x7B\x96\x21" |
432 | 0x42, 0xC6, 0x5F, 0x5A, 0x7A, 0xF0, 0x14, 0x67 }, | 429 | "\x42\xC6\x5F\x5A\x7A\xF0\x14\x67", |
433 | }, { | 430 | }, { |
434 | .plaintext = "1234567890123456789012345678901234567890" | 431 | .plaintext = "1234567890123456789012345678901234567890" |
435 | "1234567890123456789012345678901234567890", | 432 | "1234567890123456789012345678901234567890", |
436 | .psize = 80, | 433 | .psize = 80, |
437 | .digest = { 0x46, 0x6E, 0xF1, 0x8B, 0xAB, 0xB0, 0x15, 0x4D, | 434 | .digest = "\x46\x6E\xF1\x8B\xAB\xB0\x15\x4D" |
438 | 0x25, 0xB9, 0xD3, 0x8A, 0x64, 0x14, 0xF5, 0xC0, | 435 | "\x25\xB9\xD3\x8A\x64\x14\xF5\xC0" |
439 | 0x87, 0x84, 0x37, 0x2B, 0xCC, 0xB2, 0x04, 0xD6, | 436 | "\x87\x84\x37\x2B\xCC\xB2\x04\xD6" |
440 | 0x54, 0x9C, 0x4A, 0xFA, 0xDB, 0x60, 0x14, 0x29, | 437 | "\x54\x9C\x4A\xFA\xDB\x60\x14\x29" |
441 | 0x4D, 0x5B, 0xD8, 0xDF, 0x2A, 0x6C, 0x44, 0xE5, | 438 | "\x4D\x5B\xD8\xDF\x2A\x6C\x44\xE5" |
442 | 0x38, 0xCD, 0x04, 0x7B, 0x26, 0x81, 0xA5, 0x1A, | 439 | "\x38\xCD\x04\x7B\x26\x81\xA5\x1A" |
443 | 0x2C, 0x60, 0x48, 0x1E, 0x88, 0xC5, 0xA2, 0x0B, | 440 | "\x2C\x60\x48\x1E\x88\xC5\xA2\x0B" |
444 | 0x2C, 0x2A, 0x80, 0xCF, 0x3A, 0x9A, 0x08, 0x3B }, | 441 | "\x2C\x2A\x80\xCF\x3A\x9A\x08\x3B", |
445 | }, { | 442 | }, { |
446 | .plaintext = "abcdbcdecdefdefgefghfghighijhijk", | 443 | .plaintext = "abcdbcdecdefdefgefghfghighijhijk", |
447 | .psize = 32, | 444 | .psize = 32, |
448 | .digest = { 0x2A, 0x98, 0x7E, 0xA4, 0x0F, 0x91, 0x70, 0x61, | 445 | .digest = "\x2A\x98\x7E\xA4\x0F\x91\x70\x61" |
449 | 0xF5, 0xD6, 0xF0, 0xA0, 0xE4, 0x64, 0x4F, 0x48, | 446 | "\xF5\xD6\xF0\xA0\xE4\x64\x4F\x48" |
450 | 0x8A, 0x7A, 0x5A, 0x52, 0xDE, 0xEE, 0x65, 0x62, | 447 | "\x8A\x7A\x5A\x52\xDE\xEE\x65\x62" |
451 | 0x07, 0xC5, 0x62, 0xF9, 0x88, 0xE9, 0x5C, 0x69, | 448 | "\x07\xC5\x62\xF9\x88\xE9\x5C\x69" |
452 | 0x16, 0xBD, 0xC8, 0x03, 0x1B, 0xC5, 0xBE, 0x1B, | 449 | "\x16\xBD\xC8\x03\x1B\xC5\xBE\x1B" |
453 | 0x7B, 0x94, 0x76, 0x39, 0xFE, 0x05, 0x0B, 0x56, | 450 | "\x7B\x94\x76\x39\xFE\x05\x0B\x56" |
454 | 0x93, 0x9B, 0xAA, 0xA0, 0xAD, 0xFF, 0x9A, 0xE6, | 451 | "\x93\x9B\xAA\xA0\xAD\xFF\x9A\xE6" |
455 | 0x74, 0x5B, 0x7B, 0x18, 0x1C, 0x3B, 0xE3, 0xFD }, | 452 | "\x74\x5B\x7B\x18\x1C\x3B\xE3\xFD", |
456 | }, | 453 | }, |
457 | }; | 454 | }; |
458 | 455 | ||
@@ -462,79 +459,79 @@ static struct hash_testvec wp384_tv_template[] = { | |||
462 | { | 459 | { |
463 | .plaintext = "", | 460 | .plaintext = "", |
464 | .psize = 0, | 461 | .psize = 0, |
465 | .digest = { 0x19, 0xFA, 0x61, 0xD7, 0x55, 0x22, 0xA4, 0x66, | 462 | .digest = "\x19\xFA\x61\xD7\x55\x22\xA4\x66" |
466 | 0x9B, 0x44, 0xE3, 0x9C, 0x1D, 0x2E, 0x17, 0x26, | 463 | "\x9B\x44\xE3\x9C\x1D\x2E\x17\x26" |
467 | 0xC5, 0x30, 0x23, 0x21, 0x30, 0xD4, 0x07, 0xF8, | 464 | "\xC5\x30\x23\x21\x30\xD4\x07\xF8" |
468 | 0x9A, 0xFE, 0xE0, 0x96, 0x49, 0x97, 0xF7, 0xA7, | 465 | "\x9A\xFE\xE0\x96\x49\x97\xF7\xA7" |
469 | 0x3E, 0x83, 0xBE, 0x69, 0x8B, 0x28, 0x8F, 0xEB, | 466 | "\x3E\x83\xBE\x69\x8B\x28\x8F\xEB" |
470 | 0xCF, 0x88, 0xE3, 0xE0, 0x3C, 0x4F, 0x07, 0x57 }, | 467 | "\xCF\x88\xE3\xE0\x3C\x4F\x07\x57", |
471 | 468 | ||
472 | 469 | ||
473 | }, { | 470 | }, { |
474 | .plaintext = "a", | 471 | .plaintext = "a", |
475 | .psize = 1, | 472 | .psize = 1, |
476 | .digest = { 0x8A, 0xCA, 0x26, 0x02, 0x79, 0x2A, 0xEC, 0x6F, | 473 | .digest = "\x8A\xCA\x26\x02\x79\x2A\xEC\x6F" |
477 | 0x11, 0xA6, 0x72, 0x06, 0x53, 0x1F, 0xB7, 0xD7, | 474 | "\x11\xA6\x72\x06\x53\x1F\xB7\xD7" |
478 | 0xF0, 0xDF, 0xF5, 0x94, 0x13, 0x14, 0x5E, 0x69, | 475 | "\xF0\xDF\xF5\x94\x13\x14\x5E\x69" |
479 | 0x73, 0xC4, 0x50, 0x01, 0xD0, 0x08, 0x7B, 0x42, | 476 | "\x73\xC4\x50\x01\xD0\x08\x7B\x42" |
480 | 0xD1, 0x1B, 0xC6, 0x45, 0x41, 0x3A, 0xEF, 0xF6, | 477 | "\xD1\x1B\xC6\x45\x41\x3A\xEF\xF6" |
481 | 0x3A, 0x42, 0x39, 0x1A, 0x39, 0x14, 0x5A, 0x59 }, | 478 | "\x3A\x42\x39\x1A\x39\x14\x5A\x59", |
482 | }, { | 479 | }, { |
483 | .plaintext = "abc", | 480 | .plaintext = "abc", |
484 | .psize = 3, | 481 | .psize = 3, |
485 | .digest = { 0x4E, 0x24, 0x48, 0xA4, 0xC6, 0xF4, 0x86, 0xBB, | 482 | .digest = "\x4E\x24\x48\xA4\xC6\xF4\x86\xBB" |
486 | 0x16, 0xB6, 0x56, 0x2C, 0x73, 0xB4, 0x02, 0x0B, | 483 | "\x16\xB6\x56\x2C\x73\xB4\x02\x0B" |
487 | 0xF3, 0x04, 0x3E, 0x3A, 0x73, 0x1B, 0xCE, 0x72, | 484 | "\xF3\x04\x3E\x3A\x73\x1B\xCE\x72" |
488 | 0x1A, 0xE1, 0xB3, 0x03, 0xD9, 0x7E, 0x6D, 0x4C, | 485 | "\x1A\xE1\xB3\x03\xD9\x7E\x6D\x4C" |
489 | 0x71, 0x81, 0xEE, 0xBD, 0xB6, 0xC5, 0x7E, 0x27, | 486 | "\x71\x81\xEE\xBD\xB6\xC5\x7E\x27" |
490 | 0x7D, 0x0E, 0x34, 0x95, 0x71, 0x14, 0xCB, 0xD6 }, | 487 | "\x7D\x0E\x34\x95\x71\x14\xCB\xD6", |
491 | }, { | 488 | }, { |
492 | .plaintext = "message digest", | 489 | .plaintext = "message digest", |
493 | .psize = 14, | 490 | .psize = 14, |
494 | .digest = { 0x37, 0x8C, 0x84, 0xA4, 0x12, 0x6E, 0x2D, 0xC6, | 491 | .digest = "\x37\x8C\x84\xA4\x12\x6E\x2D\xC6" |
495 | 0xE5, 0x6D, 0xCC, 0x74, 0x58, 0x37, 0x7A, 0xAC, | 492 | "\xE5\x6D\xCC\x74\x58\x37\x7A\xAC" |
496 | 0x83, 0x8D, 0x00, 0x03, 0x22, 0x30, 0xF5, 0x3C, | 493 | "\x83\x8D\x00\x03\x22\x30\xF5\x3C" |
497 | 0xE1, 0xF5, 0x70, 0x0C, 0x0F, 0xFB, 0x4D, 0x3B, | 494 | "\xE1\xF5\x70\x0C\x0F\xFB\x4D\x3B" |
498 | 0x84, 0x21, 0x55, 0x76, 0x59, 0xEF, 0x55, 0xC1, | 495 | "\x84\x21\x55\x76\x59\xEF\x55\xC1" |
499 | 0x06, 0xB4, 0xB5, 0x2A, 0xC5, 0xA4, 0xAA, 0xA6 }, | 496 | "\x06\xB4\xB5\x2A\xC5\xA4\xAA\xA6", |
500 | }, { | 497 | }, { |
501 | .plaintext = "abcdefghijklmnopqrstuvwxyz", | 498 | .plaintext = "abcdefghijklmnopqrstuvwxyz", |
502 | .psize = 26, | 499 | .psize = 26, |
503 | .digest = { 0xF1, 0xD7, 0x54, 0x66, 0x26, 0x36, 0xFF, 0xE9, | 500 | .digest = "\xF1\xD7\x54\x66\x26\x36\xFF\xE9" |
504 | 0x2C, 0x82, 0xEB, 0xB9, 0x21, 0x2A, 0x48, 0x4A, | 501 | "\x2C\x82\xEB\xB9\x21\x2A\x48\x4A" |
505 | 0x8D, 0x38, 0x63, 0x1E, 0xAD, 0x42, 0x38, 0xF5, | 502 | "\x8D\x38\x63\x1E\xAD\x42\x38\xF5" |
506 | 0x44, 0x2E, 0xE1, 0x3B, 0x80, 0x54, 0xE4, 0x1B, | 503 | "\x44\x2E\xE1\x3B\x80\x54\xE4\x1B" |
507 | 0x08, 0xBF, 0x2A, 0x92, 0x51, 0xC3, 0x0B, 0x6A, | 504 | "\x08\xBF\x2A\x92\x51\xC3\x0B\x6A" |
508 | 0x0B, 0x8A, 0xAE, 0x86, 0x17, 0x7A, 0xB4, 0xA6 }, | 505 | "\x0B\x8A\xAE\x86\x17\x7A\xB4\xA6", |
509 | }, { | 506 | }, { |
510 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZ" | 507 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZ" |
511 | "abcdefghijklmnopqrstuvwxyz0123456789", | 508 | "abcdefghijklmnopqrstuvwxyz0123456789", |
512 | .psize = 62, | 509 | .psize = 62, |
513 | .digest = { 0xDC, 0x37, 0xE0, 0x08, 0xCF, 0x9E, 0xE6, 0x9B, | 510 | .digest = "\xDC\x37\xE0\x08\xCF\x9E\xE6\x9B" |
514 | 0xF1, 0x1F, 0x00, 0xED, 0x9A, 0xBA, 0x26, 0x90, | 511 | "\xF1\x1F\x00\xED\x9A\xBA\x26\x90" |
515 | 0x1D, 0xD7, 0xC2, 0x8C, 0xDE, 0xC0, 0x66, 0xCC, | 512 | "\x1D\xD7\xC2\x8C\xDE\xC0\x66\xCC" |
516 | 0x6A, 0xF4, 0x2E, 0x40, 0xF8, 0x2F, 0x3A, 0x1E, | 513 | "\x6A\xF4\x2E\x40\xF8\x2F\x3A\x1E" |
517 | 0x08, 0xEB, 0xA2, 0x66, 0x29, 0x12, 0x9D, 0x8F, | 514 | "\x08\xEB\xA2\x66\x29\x12\x9D\x8F" |
518 | 0xB7, 0xCB, 0x57, 0x21, 0x1B, 0x92, 0x81, 0xA6 }, | 515 | "\xB7\xCB\x57\x21\x1B\x92\x81\xA6", |
519 | }, { | 516 | }, { |
520 | .plaintext = "1234567890123456789012345678901234567890" | 517 | .plaintext = "1234567890123456789012345678901234567890" |
521 | "1234567890123456789012345678901234567890", | 518 | "1234567890123456789012345678901234567890", |
522 | .psize = 80, | 519 | .psize = 80, |
523 | .digest = { 0x46, 0x6E, 0xF1, 0x8B, 0xAB, 0xB0, 0x15, 0x4D, | 520 | .digest = "\x46\x6E\xF1\x8B\xAB\xB0\x15\x4D" |
524 | 0x25, 0xB9, 0xD3, 0x8A, 0x64, 0x14, 0xF5, 0xC0, | 521 | "\x25\xB9\xD3\x8A\x64\x14\xF5\xC0" |
525 | 0x87, 0x84, 0x37, 0x2B, 0xCC, 0xB2, 0x04, 0xD6, | 522 | "\x87\x84\x37\x2B\xCC\xB2\x04\xD6" |
526 | 0x54, 0x9C, 0x4A, 0xFA, 0xDB, 0x60, 0x14, 0x29, | 523 | "\x54\x9C\x4A\xFA\xDB\x60\x14\x29" |
527 | 0x4D, 0x5B, 0xD8, 0xDF, 0x2A, 0x6C, 0x44, 0xE5, | 524 | "\x4D\x5B\xD8\xDF\x2A\x6C\x44\xE5" |
528 | 0x38, 0xCD, 0x04, 0x7B, 0x26, 0x81, 0xA5, 0x1A }, | 525 | "\x38\xCD\x04\x7B\x26\x81\xA5\x1A", |
529 | }, { | 526 | }, { |
530 | .plaintext = "abcdbcdecdefdefgefghfghighijhijk", | 527 | .plaintext = "abcdbcdecdefdefgefghfghighijhijk", |
531 | .psize = 32, | 528 | .psize = 32, |
532 | .digest = { 0x2A, 0x98, 0x7E, 0xA4, 0x0F, 0x91, 0x70, 0x61, | 529 | .digest = "\x2A\x98\x7E\xA4\x0F\x91\x70\x61" |
533 | 0xF5, 0xD6, 0xF0, 0xA0, 0xE4, 0x64, 0x4F, 0x48, | 530 | "\xF5\xD6\xF0\xA0\xE4\x64\x4F\x48" |
534 | 0x8A, 0x7A, 0x5A, 0x52, 0xDE, 0xEE, 0x65, 0x62, | 531 | "\x8A\x7A\x5A\x52\xDE\xEE\x65\x62" |
535 | 0x07, 0xC5, 0x62, 0xF9, 0x88, 0xE9, 0x5C, 0x69, | 532 | "\x07\xC5\x62\xF9\x88\xE9\x5C\x69" |
536 | 0x16, 0xBD, 0xC8, 0x03, 0x1B, 0xC5, 0xBE, 0x1B, | 533 | "\x16\xBD\xC8\x03\x1B\xC5\xBE\x1B" |
537 | 0x7B, 0x94, 0x76, 0x39, 0xFE, 0x05, 0x0B, 0x56 }, | 534 | "\x7B\x94\x76\x39\xFE\x05\x0B\x56", |
538 | }, | 535 | }, |
539 | }; | 536 | }; |
540 | 537 | ||
@@ -544,63 +541,63 @@ static struct hash_testvec wp256_tv_template[] = { | |||
544 | { | 541 | { |
545 | .plaintext = "", | 542 | .plaintext = "", |
546 | .psize = 0, | 543 | .psize = 0, |
547 | .digest = { 0x19, 0xFA, 0x61, 0xD7, 0x55, 0x22, 0xA4, 0x66, | 544 | .digest = "\x19\xFA\x61\xD7\x55\x22\xA4\x66" |
548 | 0x9B, 0x44, 0xE3, 0x9C, 0x1D, 0x2E, 0x17, 0x26, | 545 | "\x9B\x44\xE3\x9C\x1D\x2E\x17\x26" |
549 | 0xC5, 0x30, 0x23, 0x21, 0x30, 0xD4, 0x07, 0xF8, | 546 | "\xC5\x30\x23\x21\x30\xD4\x07\xF8" |
550 | 0x9A, 0xFE, 0xE0, 0x96, 0x49, 0x97, 0xF7, 0xA7 }, | 547 | "\x9A\xFE\xE0\x96\x49\x97\xF7\xA7", |
551 | 548 | ||
552 | 549 | ||
553 | }, { | 550 | }, { |
554 | .plaintext = "a", | 551 | .plaintext = "a", |
555 | .psize = 1, | 552 | .psize = 1, |
556 | .digest = { 0x8A, 0xCA, 0x26, 0x02, 0x79, 0x2A, 0xEC, 0x6F, | 553 | .digest = "\x8A\xCA\x26\x02\x79\x2A\xEC\x6F" |
557 | 0x11, 0xA6, 0x72, 0x06, 0x53, 0x1F, 0xB7, 0xD7, | 554 | "\x11\xA6\x72\x06\x53\x1F\xB7\xD7" |
558 | 0xF0, 0xDF, 0xF5, 0x94, 0x13, 0x14, 0x5E, 0x69, | 555 | "\xF0\xDF\xF5\x94\x13\x14\x5E\x69" |
559 | 0x73, 0xC4, 0x50, 0x01, 0xD0, 0x08, 0x7B, 0x42 }, | 556 | "\x73\xC4\x50\x01\xD0\x08\x7B\x42", |
560 | }, { | 557 | }, { |
561 | .plaintext = "abc", | 558 | .plaintext = "abc", |
562 | .psize = 3, | 559 | .psize = 3, |
563 | .digest = { 0x4E, 0x24, 0x48, 0xA4, 0xC6, 0xF4, 0x86, 0xBB, | 560 | .digest = "\x4E\x24\x48\xA4\xC6\xF4\x86\xBB" |
564 | 0x16, 0xB6, 0x56, 0x2C, 0x73, 0xB4, 0x02, 0x0B, | 561 | "\x16\xB6\x56\x2C\x73\xB4\x02\x0B" |
565 | 0xF3, 0x04, 0x3E, 0x3A, 0x73, 0x1B, 0xCE, 0x72, | 562 | "\xF3\x04\x3E\x3A\x73\x1B\xCE\x72" |
566 | 0x1A, 0xE1, 0xB3, 0x03, 0xD9, 0x7E, 0x6D, 0x4C }, | 563 | "\x1A\xE1\xB3\x03\xD9\x7E\x6D\x4C", |
567 | }, { | 564 | }, { |
568 | .plaintext = "message digest", | 565 | .plaintext = "message digest", |
569 | .psize = 14, | 566 | .psize = 14, |
570 | .digest = { 0x37, 0x8C, 0x84, 0xA4, 0x12, 0x6E, 0x2D, 0xC6, | 567 | .digest = "\x37\x8C\x84\xA4\x12\x6E\x2D\xC6" |
571 | 0xE5, 0x6D, 0xCC, 0x74, 0x58, 0x37, 0x7A, 0xAC, | 568 | "\xE5\x6D\xCC\x74\x58\x37\x7A\xAC" |
572 | 0x83, 0x8D, 0x00, 0x03, 0x22, 0x30, 0xF5, 0x3C, | 569 | "\x83\x8D\x00\x03\x22\x30\xF5\x3C" |
573 | 0xE1, 0xF5, 0x70, 0x0C, 0x0F, 0xFB, 0x4D, 0x3B }, | 570 | "\xE1\xF5\x70\x0C\x0F\xFB\x4D\x3B", |
574 | }, { | 571 | }, { |
575 | .plaintext = "abcdefghijklmnopqrstuvwxyz", | 572 | .plaintext = "abcdefghijklmnopqrstuvwxyz", |
576 | .psize = 26, | 573 | .psize = 26, |
577 | .digest = { 0xF1, 0xD7, 0x54, 0x66, 0x26, 0x36, 0xFF, 0xE9, | 574 | .digest = "\xF1\xD7\x54\x66\x26\x36\xFF\xE9" |
578 | 0x2C, 0x82, 0xEB, 0xB9, 0x21, 0x2A, 0x48, 0x4A, | 575 | "\x2C\x82\xEB\xB9\x21\x2A\x48\x4A" |
579 | 0x8D, 0x38, 0x63, 0x1E, 0xAD, 0x42, 0x38, 0xF5, | 576 | "\x8D\x38\x63\x1E\xAD\x42\x38\xF5" |
580 | 0x44, 0x2E, 0xE1, 0x3B, 0x80, 0x54, 0xE4, 0x1B }, | 577 | "\x44\x2E\xE1\x3B\x80\x54\xE4\x1B", |
581 | }, { | 578 | }, { |
582 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZ" | 579 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZ" |
583 | "abcdefghijklmnopqrstuvwxyz0123456789", | 580 | "abcdefghijklmnopqrstuvwxyz0123456789", |
584 | .psize = 62, | 581 | .psize = 62, |
585 | .digest = { 0xDC, 0x37, 0xE0, 0x08, 0xCF, 0x9E, 0xE6, 0x9B, | 582 | .digest = "\xDC\x37\xE0\x08\xCF\x9E\xE6\x9B" |
586 | 0xF1, 0x1F, 0x00, 0xED, 0x9A, 0xBA, 0x26, 0x90, | 583 | "\xF1\x1F\x00\xED\x9A\xBA\x26\x90" |
587 | 0x1D, 0xD7, 0xC2, 0x8C, 0xDE, 0xC0, 0x66, 0xCC, | 584 | "\x1D\xD7\xC2\x8C\xDE\xC0\x66\xCC" |
588 | 0x6A, 0xF4, 0x2E, 0x40, 0xF8, 0x2F, 0x3A, 0x1E }, | 585 | "\x6A\xF4\x2E\x40\xF8\x2F\x3A\x1E", |
589 | }, { | 586 | }, { |
590 | .plaintext = "1234567890123456789012345678901234567890" | 587 | .plaintext = "1234567890123456789012345678901234567890" |
591 | "1234567890123456789012345678901234567890", | 588 | "1234567890123456789012345678901234567890", |
592 | .psize = 80, | 589 | .psize = 80, |
593 | .digest = { 0x46, 0x6E, 0xF1, 0x8B, 0xAB, 0xB0, 0x15, 0x4D, | 590 | .digest = "\x46\x6E\xF1\x8B\xAB\xB0\x15\x4D" |
594 | 0x25, 0xB9, 0xD3, 0x8A, 0x64, 0x14, 0xF5, 0xC0, | 591 | "\x25\xB9\xD3\x8A\x64\x14\xF5\xC0" |
595 | 0x87, 0x84, 0x37, 0x2B, 0xCC, 0xB2, 0x04, 0xD6, | 592 | "\x87\x84\x37\x2B\xCC\xB2\x04\xD6" |
596 | 0x54, 0x9C, 0x4A, 0xFA, 0xDB, 0x60, 0x14, 0x29 }, | 593 | "\x54\x9C\x4A\xFA\xDB\x60\x14\x29", |
597 | }, { | 594 | }, { |
598 | .plaintext = "abcdbcdecdefdefgefghfghighijhijk", | 595 | .plaintext = "abcdbcdecdefdefgefghfghighijhijk", |
599 | .psize = 32, | 596 | .psize = 32, |
600 | .digest = { 0x2A, 0x98, 0x7E, 0xA4, 0x0F, 0x91, 0x70, 0x61, | 597 | .digest = "\x2A\x98\x7E\xA4\x0F\x91\x70\x61" |
601 | 0xF5, 0xD6, 0xF0, 0xA0, 0xE4, 0x64, 0x4F, 0x48, | 598 | "\xF5\xD6\xF0\xA0\xE4\x64\x4F\x48" |
602 | 0x8A, 0x7A, 0x5A, 0x52, 0xDE, 0xEE, 0x65, 0x62, | 599 | "\x8A\x7A\x5A\x52\xDE\xEE\x65\x62" |
603 | 0x07, 0xC5, 0x62, 0xF9, 0x88, 0xE9, 0x5C, 0x69 }, | 600 | "\x07\xC5\x62\xF9\x88\xE9\x5C\x69", |
604 | }, | 601 | }, |
605 | }; | 602 | }; |
606 | 603 | ||
@@ -613,42 +610,42 @@ static struct hash_testvec tgr192_tv_template[] = { | |||
613 | { | 610 | { |
614 | .plaintext = "", | 611 | .plaintext = "", |
615 | .psize = 0, | 612 | .psize = 0, |
616 | .digest = { 0x24, 0xf0, 0x13, 0x0c, 0x63, 0xac, 0x93, 0x32, | 613 | .digest = "\x24\xf0\x13\x0c\x63\xac\x93\x32" |
617 | 0x16, 0x16, 0x6e, 0x76, 0xb1, 0xbb, 0x92, 0x5f, | 614 | "\x16\x16\x6e\x76\xb1\xbb\x92\x5f" |
618 | 0xf3, 0x73, 0xde, 0x2d, 0x49, 0x58, 0x4e, 0x7a }, | 615 | "\xf3\x73\xde\x2d\x49\x58\x4e\x7a", |
619 | }, { | 616 | }, { |
620 | .plaintext = "abc", | 617 | .plaintext = "abc", |
621 | .psize = 3, | 618 | .psize = 3, |
622 | .digest = { 0xf2, 0x58, 0xc1, 0xe8, 0x84, 0x14, 0xab, 0x2a, | 619 | .digest = "\xf2\x58\xc1\xe8\x84\x14\xab\x2a" |
623 | 0x52, 0x7a, 0xb5, 0x41, 0xff, 0xc5, 0xb8, 0xbf, | 620 | "\x52\x7a\xb5\x41\xff\xc5\xb8\xbf" |
624 | 0x93, 0x5f, 0x7b, 0x95, 0x1c, 0x13, 0x29, 0x51 }, | 621 | "\x93\x5f\x7b\x95\x1c\x13\x29\x51", |
625 | }, { | 622 | }, { |
626 | .plaintext = "Tiger", | 623 | .plaintext = "Tiger", |
627 | .psize = 5, | 624 | .psize = 5, |
628 | .digest = { 0x9f, 0x00, 0xf5, 0x99, 0x07, 0x23, 0x00, 0xdd, | 625 | .digest = "\x9f\x00\xf5\x99\x07\x23\x00\xdd" |
629 | 0x27, 0x6a, 0xbb, 0x38, 0xc8, 0xeb, 0x6d, 0xec, | 626 | "\x27\x6a\xbb\x38\xc8\xeb\x6d\xec" |
630 | 0x37, 0x79, 0x0c, 0x11, 0x6f, 0x9d, 0x2b, 0xdf }, | 627 | "\x37\x79\x0c\x11\x6f\x9d\x2b\xdf", |
631 | }, { | 628 | }, { |
632 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+-", | 629 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+-", |
633 | .psize = 64, | 630 | .psize = 64, |
634 | .digest = { 0x87, 0xfb, 0x2a, 0x90, 0x83, 0x85, 0x1c, 0xf7, | 631 | .digest = "\x87\xfb\x2a\x90\x83\x85\x1c\xf7" |
635 | 0x47, 0x0d, 0x2c, 0xf8, 0x10, 0xe6, 0xdf, 0x9e, | 632 | "\x47\x0d\x2c\xf8\x10\xe6\xdf\x9e" |
636 | 0xb5, 0x86, 0x44, 0x50, 0x34, 0xa5, 0xa3, 0x86 }, | 633 | "\xb5\x86\x44\x50\x34\xa5\xa3\x86", |
637 | }, { | 634 | }, { |
638 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZ=abcdefghijklmnopqrstuvwxyz+0123456789", | 635 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZ=abcdefghijklmnopqrstuvwxyz+0123456789", |
639 | .psize = 64, | 636 | .psize = 64, |
640 | .digest = { 0x46, 0x7d, 0xb8, 0x08, 0x63, 0xeb, 0xce, 0x48, | 637 | .digest = "\x46\x7d\xb8\x08\x63\xeb\xce\x48" |
641 | 0x8d, 0xf1, 0xcd, 0x12, 0x61, 0x65, 0x5d, 0xe9, | 638 | "\x8d\xf1\xcd\x12\x61\x65\x5d\xe9" |
642 | 0x57, 0x89, 0x65, 0x65, 0x97, 0x5f, 0x91, 0x97 }, | 639 | "\x57\x89\x65\x65\x97\x5f\x91\x97", |
643 | }, { | 640 | }, { |
644 | .plaintext = "Tiger - A Fast New Hash Function, " | 641 | .plaintext = "Tiger - A Fast New Hash Function, " |
645 | "by Ross Anderson and Eli Biham, " | 642 | "by Ross Anderson and Eli Biham, " |
646 | "proceedings of Fast Software Encryption 3, " | 643 | "proceedings of Fast Software Encryption 3, " |
647 | "Cambridge, 1996.", | 644 | "Cambridge, 1996.", |
648 | .psize = 125, | 645 | .psize = 125, |
649 | .digest = { 0x3d, 0x9a, 0xeb, 0x03, 0xd1, 0xbd, 0x1a, 0x63, | 646 | .digest = "\x3d\x9a\xeb\x03\xd1\xbd\x1a\x63" |
650 | 0x57, 0xb2, 0x77, 0x4d, 0xfd, 0x6d, 0x5b, 0x24, | 647 | "\x57\xb2\x77\x4d\xfd\x6d\x5b\x24" |
651 | 0xdd, 0x68, 0x15, 0x1d, 0x50, 0x39, 0x74, 0xfc }, | 648 | "\xdd\x68\x15\x1d\x50\x39\x74\xfc", |
652 | }, | 649 | }, |
653 | }; | 650 | }; |
654 | 651 | ||
@@ -658,42 +655,42 @@ static struct hash_testvec tgr160_tv_template[] = { | |||
658 | { | 655 | { |
659 | .plaintext = "", | 656 | .plaintext = "", |
660 | .psize = 0, | 657 | .psize = 0, |
661 | .digest = { 0x24, 0xf0, 0x13, 0x0c, 0x63, 0xac, 0x93, 0x32, | 658 | .digest = "\x24\xf0\x13\x0c\x63\xac\x93\x32" |
662 | 0x16, 0x16, 0x6e, 0x76, 0xb1, 0xbb, 0x92, 0x5f, | 659 | "\x16\x16\x6e\x76\xb1\xbb\x92\x5f" |
663 | 0xf3, 0x73, 0xde, 0x2d }, | 660 | "\xf3\x73\xde\x2d", |
664 | }, { | 661 | }, { |
665 | .plaintext = "abc", | 662 | .plaintext = "abc", |
666 | .psize = 3, | 663 | .psize = 3, |
667 | .digest = { 0xf2, 0x58, 0xc1, 0xe8, 0x84, 0x14, 0xab, 0x2a, | 664 | .digest = "\xf2\x58\xc1\xe8\x84\x14\xab\x2a" |
668 | 0x52, 0x7a, 0xb5, 0x41, 0xff, 0xc5, 0xb8, 0xbf, | 665 | "\x52\x7a\xb5\x41\xff\xc5\xb8\xbf" |
669 | 0x93, 0x5f, 0x7b, 0x95 }, | 666 | "\x93\x5f\x7b\x95", |
670 | }, { | 667 | }, { |
671 | .plaintext = "Tiger", | 668 | .plaintext = "Tiger", |
672 | .psize = 5, | 669 | .psize = 5, |
673 | .digest = { 0x9f, 0x00, 0xf5, 0x99, 0x07, 0x23, 0x00, 0xdd, | 670 | .digest = "\x9f\x00\xf5\x99\x07\x23\x00\xdd" |
674 | 0x27, 0x6a, 0xbb, 0x38, 0xc8, 0xeb, 0x6d, 0xec, | 671 | "\x27\x6a\xbb\x38\xc8\xeb\x6d\xec" |
675 | 0x37, 0x79, 0x0c, 0x11 }, | 672 | "\x37\x79\x0c\x11", |
676 | }, { | 673 | }, { |
677 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+-", | 674 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+-", |
678 | .psize = 64, | 675 | .psize = 64, |
679 | .digest = { 0x87, 0xfb, 0x2a, 0x90, 0x83, 0x85, 0x1c, 0xf7, | 676 | .digest = "\x87\xfb\x2a\x90\x83\x85\x1c\xf7" |
680 | 0x47, 0x0d, 0x2c, 0xf8, 0x10, 0xe6, 0xdf, 0x9e, | 677 | "\x47\x0d\x2c\xf8\x10\xe6\xdf\x9e" |
681 | 0xb5, 0x86, 0x44, 0x50 }, | 678 | "\xb5\x86\x44\x50", |
682 | }, { | 679 | }, { |
683 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZ=abcdefghijklmnopqrstuvwxyz+0123456789", | 680 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZ=abcdefghijklmnopqrstuvwxyz+0123456789", |
684 | .psize = 64, | 681 | .psize = 64, |
685 | .digest = { 0x46, 0x7d, 0xb8, 0x08, 0x63, 0xeb, 0xce, 0x48, | 682 | .digest = "\x46\x7d\xb8\x08\x63\xeb\xce\x48" |
686 | 0x8d, 0xf1, 0xcd, 0x12, 0x61, 0x65, 0x5d, 0xe9, | 683 | "\x8d\xf1\xcd\x12\x61\x65\x5d\xe9" |
687 | 0x57, 0x89, 0x65, 0x65 }, | 684 | "\x57\x89\x65\x65", |
688 | }, { | 685 | }, { |
689 | .plaintext = "Tiger - A Fast New Hash Function, " | 686 | .plaintext = "Tiger - A Fast New Hash Function, " |
690 | "by Ross Anderson and Eli Biham, " | 687 | "by Ross Anderson and Eli Biham, " |
691 | "proceedings of Fast Software Encryption 3, " | 688 | "proceedings of Fast Software Encryption 3, " |
692 | "Cambridge, 1996.", | 689 | "Cambridge, 1996.", |
693 | .psize = 125, | 690 | .psize = 125, |
694 | .digest = { 0x3d, 0x9a, 0xeb, 0x03, 0xd1, 0xbd, 0x1a, 0x63, | 691 | .digest = "\x3d\x9a\xeb\x03\xd1\xbd\x1a\x63" |
695 | 0x57, 0xb2, 0x77, 0x4d, 0xfd, 0x6d, 0x5b, 0x24, | 692 | "\x57\xb2\x77\x4d\xfd\x6d\x5b\x24" |
696 | 0xdd, 0x68, 0x15, 0x1d }, | 693 | "\xdd\x68\x15\x1d", |
697 | }, | 694 | }, |
698 | }; | 695 | }; |
699 | 696 | ||
@@ -703,36 +700,36 @@ static struct hash_testvec tgr128_tv_template[] = { | |||
703 | { | 700 | { |
704 | .plaintext = "", | 701 | .plaintext = "", |
705 | .psize = 0, | 702 | .psize = 0, |
706 | .digest = { 0x24, 0xf0, 0x13, 0x0c, 0x63, 0xac, 0x93, 0x32, | 703 | .digest = "\x24\xf0\x13\x0c\x63\xac\x93\x32" |
707 | 0x16, 0x16, 0x6e, 0x76, 0xb1, 0xbb, 0x92, 0x5f }, | 704 | "\x16\x16\x6e\x76\xb1\xbb\x92\x5f", |
708 | }, { | 705 | }, { |
709 | .plaintext = "abc", | 706 | .plaintext = "abc", |
710 | .psize = 3, | 707 | .psize = 3, |
711 | .digest = { 0xf2, 0x58, 0xc1, 0xe8, 0x84, 0x14, 0xab, 0x2a, | 708 | .digest = "\xf2\x58\xc1\xe8\x84\x14\xab\x2a" |
712 | 0x52, 0x7a, 0xb5, 0x41, 0xff, 0xc5, 0xb8, 0xbf }, | 709 | "\x52\x7a\xb5\x41\xff\xc5\xb8\xbf", |
713 | }, { | 710 | }, { |
714 | .plaintext = "Tiger", | 711 | .plaintext = "Tiger", |
715 | .psize = 5, | 712 | .psize = 5, |
716 | .digest = { 0x9f, 0x00, 0xf5, 0x99, 0x07, 0x23, 0x00, 0xdd, | 713 | .digest = "\x9f\x00\xf5\x99\x07\x23\x00\xdd" |
717 | 0x27, 0x6a, 0xbb, 0x38, 0xc8, 0xeb, 0x6d, 0xec }, | 714 | "\x27\x6a\xbb\x38\xc8\xeb\x6d\xec", |
718 | }, { | 715 | }, { |
719 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+-", | 716 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+-", |
720 | .psize = 64, | 717 | .psize = 64, |
721 | .digest = { 0x87, 0xfb, 0x2a, 0x90, 0x83, 0x85, 0x1c, 0xf7, | 718 | .digest = "\x87\xfb\x2a\x90\x83\x85\x1c\xf7" |
722 | 0x47, 0x0d, 0x2c, 0xf8, 0x10, 0xe6, 0xdf, 0x9e }, | 719 | "\x47\x0d\x2c\xf8\x10\xe6\xdf\x9e", |
723 | }, { | 720 | }, { |
724 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZ=abcdefghijklmnopqrstuvwxyz+0123456789", | 721 | .plaintext = "ABCDEFGHIJKLMNOPQRSTUVWXYZ=abcdefghijklmnopqrstuvwxyz+0123456789", |
725 | .psize = 64, | 722 | .psize = 64, |
726 | .digest = { 0x46, 0x7d, 0xb8, 0x08, 0x63, 0xeb, 0xce, 0x48, | 723 | .digest = "\x46\x7d\xb8\x08\x63\xeb\xce\x48" |
727 | 0x8d, 0xf1, 0xcd, 0x12, 0x61, 0x65, 0x5d, 0xe9 }, | 724 | "\x8d\xf1\xcd\x12\x61\x65\x5d\xe9", |
728 | }, { | 725 | }, { |
729 | .plaintext = "Tiger - A Fast New Hash Function, " | 726 | .plaintext = "Tiger - A Fast New Hash Function, " |
730 | "by Ross Anderson and Eli Biham, " | 727 | "by Ross Anderson and Eli Biham, " |
731 | "proceedings of Fast Software Encryption 3, " | 728 | "proceedings of Fast Software Encryption 3, " |
732 | "Cambridge, 1996.", | 729 | "Cambridge, 1996.", |
733 | .psize = 125, | 730 | .psize = 125, |
734 | .digest = { 0x3d, 0x9a, 0xeb, 0x03, 0xd1, 0xbd, 0x1a, 0x63, | 731 | .digest = "\x3d\x9a\xeb\x03\xd1\xbd\x1a\x63" |
735 | 0x57, 0xb2, 0x77, 0x4d, 0xfd, 0x6d, 0x5b, 0x24 }, | 732 | "\x57\xb2\x77\x4d\xfd\x6d\x5b\x24", |
736 | }, | 733 | }, |
737 | }; | 734 | }; |
738 | 735 | ||
@@ -745,59 +742,77 @@ static struct hash_testvec tgr128_tv_template[] = { | |||
745 | static struct hash_testvec hmac_md5_tv_template[] = | 742 | static struct hash_testvec hmac_md5_tv_template[] = |
746 | { | 743 | { |
747 | { | 744 | { |
748 | .key = { [0 ... 15] = 0x0b }, | 745 | .key = "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b", |
749 | .ksize = 16, | 746 | .ksize = 16, |
750 | .plaintext = "Hi There", | 747 | .plaintext = "Hi There", |
751 | .psize = 8, | 748 | .psize = 8, |
752 | .digest = { 0x92, 0x94, 0x72, 0x7a, 0x36, 0x38, 0xbb, 0x1c, | 749 | .digest = "\x92\x94\x72\x7a\x36\x38\xbb\x1c" |
753 | 0x13, 0xf4, 0x8e, 0xf8, 0x15, 0x8b, 0xfc, 0x9d }, | 750 | "\x13\xf4\x8e\xf8\x15\x8b\xfc\x9d", |
754 | }, { | 751 | }, { |
755 | .key = { 'J', 'e', 'f', 'e' }, | 752 | .key = "Jefe", |
756 | .ksize = 4, | 753 | .ksize = 4, |
757 | .plaintext = "what do ya want for nothing?", | 754 | .plaintext = "what do ya want for nothing?", |
758 | .psize = 28, | 755 | .psize = 28, |
759 | .digest = { 0x75, 0x0c, 0x78, 0x3e, 0x6a, 0xb0, 0xb5, 0x03, | 756 | .digest = "\x75\x0c\x78\x3e\x6a\xb0\xb5\x03" |
760 | 0xea, 0xa8, 0x6e, 0x31, 0x0a, 0x5d, 0xb7, 0x38 }, | 757 | "\xea\xa8\x6e\x31\x0a\x5d\xb7\x38", |
761 | .np = 2, | 758 | .np = 2, |
762 | .tap = {14, 14} | 759 | .tap = {14, 14} |
763 | }, { | 760 | }, { |
764 | .key = { [0 ... 15] = 0xaa }, | 761 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa", |
765 | .ksize = 16, | 762 | .ksize = 16, |
766 | .plaintext = { [0 ... 49] = 0xdd }, | 763 | .plaintext = "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" |
764 | "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" | ||
765 | "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" | ||
766 | "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd", | ||
767 | .psize = 50, | 767 | .psize = 50, |
768 | .digest = { 0x56, 0xbe, 0x34, 0x52, 0x1d, 0x14, 0x4c, 0x88, | 768 | .digest = "\x56\xbe\x34\x52\x1d\x14\x4c\x88" |
769 | 0xdb, 0xb8, 0xc7, 0x33, 0xf0, 0xe8, 0xb3, 0xf6 }, | 769 | "\xdb\xb8\xc7\x33\xf0\xe8\xb3\xf6", |
770 | }, { | 770 | }, { |
771 | .key = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, | 771 | .key = "\x01\x02\x03\x04\x05\x06\x07\x08" |
772 | 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, | 772 | "\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10" |
773 | 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, }, | 773 | "\x11\x12\x13\x14\x15\x16\x17\x18\x19", |
774 | .ksize = 25, | 774 | .ksize = 25, |
775 | .plaintext = { [0 ... 49] = 0xcd }, | 775 | .plaintext = "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" |
776 | "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" | ||
777 | "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" | ||
778 | "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd", | ||
776 | .psize = 50, | 779 | .psize = 50, |
777 | .digest = { 0x69, 0x7e, 0xaf, 0x0a, 0xca, 0x3a, 0x3a, 0xea, | 780 | .digest = "\x69\x7e\xaf\x0a\xca\x3a\x3a\xea" |
778 | 0x3a, 0x75, 0x16, 0x47, 0x46, 0xff, 0xaa, 0x79 }, | 781 | "\x3a\x75\x16\x47\x46\xff\xaa\x79", |
779 | }, { | 782 | }, { |
780 | .key = { [0 ... 15] = 0x0c }, | 783 | .key = "\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c", |
781 | .ksize = 16, | 784 | .ksize = 16, |
782 | .plaintext = "Test With Truncation", | 785 | .plaintext = "Test With Truncation", |
783 | .psize = 20, | 786 | .psize = 20, |
784 | .digest = { 0x56, 0x46, 0x1e, 0xf2, 0x34, 0x2e, 0xdc, 0x00, | 787 | .digest = "\x56\x46\x1e\xf2\x34\x2e\xdc\x00" |
785 | 0xf9, 0xba, 0xb9, 0x95, 0x69, 0x0e, 0xfd, 0x4c }, | 788 | "\xf9\xba\xb9\x95\x69\x0e\xfd\x4c", |
786 | }, { | 789 | }, { |
787 | .key = { [0 ... 79] = 0xaa }, | 790 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
791 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
792 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
793 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
794 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
795 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
796 | "\xaa\xaa", | ||
788 | .ksize = 80, | 797 | .ksize = 80, |
789 | .plaintext = "Test Using Larger Than Block-Size Key - Hash Key First", | 798 | .plaintext = "Test Using Larger Than Block-Size Key - Hash Key First", |
790 | .psize = 54, | 799 | .psize = 54, |
791 | .digest = { 0x6b, 0x1a, 0xb7, 0xfe, 0x4b, 0xd7, 0xbf, 0x8f, | 800 | .digest = "\x6b\x1a\xb7\xfe\x4b\xd7\xbf\x8f" |
792 | 0x0b, 0x62, 0xe6, 0xce, 0x61, 0xb9, 0xd0, 0xcd }, | 801 | "\x0b\x62\xe6\xce\x61\xb9\xd0\xcd", |
793 | }, { | 802 | }, { |
794 | .key = { [0 ... 79] = 0xaa }, | 803 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
804 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
805 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
806 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
807 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
808 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
809 | "\xaa\xaa", | ||
795 | .ksize = 80, | 810 | .ksize = 80, |
796 | .plaintext = "Test Using Larger Than Block-Size Key and Larger Than One " | 811 | .plaintext = "Test Using Larger Than Block-Size Key and Larger Than One " |
797 | "Block-Size Data", | 812 | "Block-Size Data", |
798 | .psize = 73, | 813 | .psize = 73, |
799 | .digest = { 0x6f, 0x63, 0x0f, 0xad, 0x67, 0xcd, 0xa0, 0xee, | 814 | .digest = "\x6f\x63\x0f\xad\x67\xcd\xa0\xee" |
800 | 0x1f, 0xb1, 0xf5, 0x62, 0xdb, 0x3a, 0xa5, 0x3e }, | 815 | "\x1f\xb1\xf5\x62\xdb\x3a\xa5\x3e", |
801 | }, | 816 | }, |
802 | }; | 817 | }; |
803 | 818 | ||
@@ -808,60 +823,78 @@ static struct hash_testvec hmac_md5_tv_template[] = | |||
808 | 823 | ||
809 | static struct hash_testvec hmac_sha1_tv_template[] = { | 824 | static struct hash_testvec hmac_sha1_tv_template[] = { |
810 | { | 825 | { |
811 | .key = { [0 ... 19] = 0x0b }, | 826 | .key = "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b", |
812 | .ksize = 20, | 827 | .ksize = 20, |
813 | .plaintext = "Hi There", | 828 | .plaintext = "Hi There", |
814 | .psize = 8, | 829 | .psize = 8, |
815 | .digest = { 0xb6, 0x17, 0x31, 0x86, 0x55, 0x05, 0x72, 0x64, | 830 | .digest = "\xb6\x17\x31\x86\x55\x05\x72\x64" |
816 | 0xe2, 0x8b, 0xc0, 0xb6, 0xfb, 0x37, 0x8c, 0x8e, 0xf1, | 831 | "\xe2\x8b\xc0\xb6\xfb\x37\x8c\x8e\xf1" |
817 | 0x46, 0xbe }, | 832 | "\x46\xbe", |
818 | }, { | 833 | }, { |
819 | .key = { 'J', 'e', 'f', 'e' }, | 834 | .key = "Jefe", |
820 | .ksize = 4, | 835 | .ksize = 4, |
821 | .plaintext = "what do ya want for nothing?", | 836 | .plaintext = "what do ya want for nothing?", |
822 | .psize = 28, | 837 | .psize = 28, |
823 | .digest = { 0xef, 0xfc, 0xdf, 0x6a, 0xe5, 0xeb, 0x2f, 0xa2, 0xd2, 0x74, | 838 | .digest = "\xef\xfc\xdf\x6a\xe5\xeb\x2f\xa2\xd2\x74" |
824 | 0x16, 0xd5, 0xf1, 0x84, 0xdf, 0x9c, 0x25, 0x9a, 0x7c, 0x79 }, | 839 | "\x16\xd5\xf1\x84\xdf\x9c\x25\x9a\x7c\x79", |
825 | .np = 2, | 840 | .np = 2, |
826 | .tap = { 14, 14 } | 841 | .tap = { 14, 14 } |
827 | }, { | 842 | }, { |
828 | .key = { [0 ... 19] = 0xaa }, | 843 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa", |
829 | .ksize = 20, | 844 | .ksize = 20, |
830 | .plaintext = { [0 ... 49] = 0xdd }, | 845 | .plaintext = "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" |
846 | "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" | ||
847 | "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" | ||
848 | "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd", | ||
831 | .psize = 50, | 849 | .psize = 50, |
832 | .digest = { 0x12, 0x5d, 0x73, 0x42, 0xb9, 0xac, 0x11, 0xcd, 0x91, 0xa3, | 850 | .digest = "\x12\x5d\x73\x42\xb9\xac\x11\xcd\x91\xa3" |
833 | 0x9a, 0xf4, 0x8a, 0xa1, 0x7b, 0x4f, 0x63, 0xf1, 0x75, 0xd3 }, | 851 | "\x9a\xf4\x8a\xa1\x7b\x4f\x63\xf1\x75\xd3", |
834 | }, { | 852 | }, { |
835 | .key = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, | 853 | .key = "\x01\x02\x03\x04\x05\x06\x07\x08" |
836 | 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, | 854 | "\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10" |
837 | 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19 }, | 855 | "\x11\x12\x13\x14\x15\x16\x17\x18\x19", |
838 | .ksize = 25, | 856 | .ksize = 25, |
839 | .plaintext = { [0 ... 49] = 0xcd }, | 857 | .plaintext = "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" |
858 | "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" | ||
859 | "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" | ||
860 | "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd", | ||
840 | .psize = 50, | 861 | .psize = 50, |
841 | .digest = { 0x4c, 0x90, 0x07, 0xf4, 0x02, 0x62, 0x50, 0xc6, 0xbc, 0x84, | 862 | .digest = "\x4c\x90\x07\xf4\x02\x62\x50\xc6\xbc\x84" |
842 | 0x14, 0xf9, 0xbf, 0x50, 0xc8, 0x6c, 0x2d, 0x72, 0x35, 0xda }, | 863 | "\x14\xf9\xbf\x50\xc8\x6c\x2d\x72\x35\xda", |
843 | }, { | 864 | }, { |
844 | .key = { [0 ... 19] = 0x0c }, | 865 | .key = "\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c", |
845 | .ksize = 20, | 866 | .ksize = 20, |
846 | .plaintext = "Test With Truncation", | 867 | .plaintext = "Test With Truncation", |
847 | .psize = 20, | 868 | .psize = 20, |
848 | .digest = { 0x4c, 0x1a, 0x03, 0x42, 0x4b, 0x55, 0xe0, 0x7f, 0xe7, 0xf2, | 869 | .digest = "\x4c\x1a\x03\x42\x4b\x55\xe0\x7f\xe7\xf2" |
849 | 0x7b, 0xe1, 0xd5, 0x8b, 0xb9, 0x32, 0x4a, 0x9a, 0x5a, 0x04 }, | 870 | "\x7b\xe1\xd5\x8b\xb9\x32\x4a\x9a\x5a\x04", |
850 | }, { | 871 | }, { |
851 | .key = { [0 ... 79] = 0xaa }, | 872 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
873 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
874 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
875 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
876 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
877 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
878 | "\xaa\xaa", | ||
852 | .ksize = 80, | 879 | .ksize = 80, |
853 | .plaintext = "Test Using Larger Than Block-Size Key - Hash Key First", | 880 | .plaintext = "Test Using Larger Than Block-Size Key - Hash Key First", |
854 | .psize = 54, | 881 | .psize = 54, |
855 | .digest = { 0xaa, 0x4a, 0xe5, 0xe1, 0x52, 0x72, 0xd0, 0x0e, 0x95, 0x70, | 882 | .digest = "\xaa\x4a\xe5\xe1\x52\x72\xd0\x0e\x95\x70" |
856 | 0x56, 0x37, 0xce, 0x8a, 0x3b, 0x55, 0xed, 0x40, 0x21, 0x12 }, | 883 | "\x56\x37\xce\x8a\x3b\x55\xed\x40\x21\x12", |
857 | }, { | 884 | }, { |
858 | .key = { [0 ... 79] = 0xaa }, | 885 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
886 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
887 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
888 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
889 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
890 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
891 | "\xaa\xaa", | ||
859 | .ksize = 80, | 892 | .ksize = 80, |
860 | .plaintext = "Test Using Larger Than Block-Size Key and Larger Than One " | 893 | .plaintext = "Test Using Larger Than Block-Size Key and Larger Than One " |
861 | "Block-Size Data", | 894 | "Block-Size Data", |
862 | .psize = 73, | 895 | .psize = 73, |
863 | .digest = { 0xe8, 0xe9, 0x9d, 0x0f, 0x45, 0x23, 0x7d, 0x78, 0x6d, 0x6b, | 896 | .digest = "\xe8\xe9\x9d\x0f\x45\x23\x7d\x78\x6d\x6b" |
864 | 0xba, 0xa7, 0x96, 0x5c, 0x78, 0x08, 0xbb, 0xff, 0x1a, 0x91 }, | 897 | "\xba\xa7\x96\x5c\x78\x08\xbb\xff\x1a\x91", |
865 | }, | 898 | }, |
866 | }; | 899 | }; |
867 | 900 | ||
@@ -873,110 +906,110 @@ static struct hash_testvec hmac_sha1_tv_template[] = { | |||
873 | 906 | ||
874 | static struct hash_testvec hmac_sha224_tv_template[] = { | 907 | static struct hash_testvec hmac_sha224_tv_template[] = { |
875 | { | 908 | { |
876 | .key = { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, | 909 | .key = "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b" |
877 | 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, | 910 | "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b" |
878 | 0x0b, 0x0b, 0x0b, 0x0b }, | 911 | "\x0b\x0b\x0b\x0b", |
879 | .ksize = 20, | 912 | .ksize = 20, |
880 | /* ("Hi There") */ | 913 | /* ("Hi There") */ |
881 | .plaintext = { 0x48, 0x69, 0x20, 0x54, 0x68, 0x65, 0x72, 0x65 }, | 914 | .plaintext = "\x48\x69\x20\x54\x68\x65\x72\x65", |
882 | .psize = 8, | 915 | .psize = 8, |
883 | .digest = { 0x89, 0x6f, 0xb1, 0x12, 0x8a, 0xbb, 0xdf, 0x19, | 916 | .digest = "\x89\x6f\xb1\x12\x8a\xbb\xdf\x19" |
884 | 0x68, 0x32, 0x10, 0x7c, 0xd4, 0x9d, 0xf3, 0x3f, | 917 | "\x68\x32\x10\x7c\xd4\x9d\xf3\x3f" |
885 | 0x47, 0xb4, 0xb1, 0x16, 0x99, 0x12, 0xba, 0x4f, | 918 | "\x47\xb4\xb1\x16\x99\x12\xba\x4f" |
886 | 0x53, 0x68, 0x4b, 0x22}, | 919 | "\x53\x68\x4b\x22", |
887 | }, { | 920 | }, { |
888 | .key = { 0x4a, 0x65, 0x66, 0x65 }, /* ("Jefe") */ | 921 | .key = "Jefe", |
889 | .ksize = 4, | 922 | .ksize = 4, |
890 | /* ("what do ya want for nothing?") */ | 923 | /* ("what do ya want for nothing?") */ |
891 | .plaintext = { 0x77, 0x68, 0x61, 0x74, 0x20, 0x64, 0x6f, 0x20, | 924 | .plaintext = "\x77\x68\x61\x74\x20\x64\x6f\x20" |
892 | 0x79, 0x61, 0x20, 0x77, 0x61, 0x6e, 0x74, 0x20, | 925 | "\x79\x61\x20\x77\x61\x6e\x74\x20" |
893 | 0x66, 0x6f, 0x72, 0x20, 0x6e, 0x6f, 0x74, 0x68, | 926 | "\x66\x6f\x72\x20\x6e\x6f\x74\x68" |
894 | 0x69, 0x6e, 0x67, 0x3f }, | 927 | "\x69\x6e\x67\x3f", |
895 | .psize = 28, | 928 | .psize = 28, |
896 | .digest = { 0xa3, 0x0e, 0x01, 0x09, 0x8b, 0xc6, 0xdb, 0xbf, | 929 | .digest = "\xa3\x0e\x01\x09\x8b\xc6\xdb\xbf" |
897 | 0x45, 0x69, 0x0f, 0x3a, 0x7e, 0x9e, 0x6d, 0x0f, | 930 | "\x45\x69\x0f\x3a\x7e\x9e\x6d\x0f" |
898 | 0x8b, 0xbe, 0xa2, 0xa3, 0x9e, 0x61, 0x48, 0x00, | 931 | "\x8b\xbe\xa2\xa3\x9e\x61\x48\x00" |
899 | 0x8f, 0xd0, 0x5e, 0x44 }, | 932 | "\x8f\xd0\x5e\x44", |
900 | .np = 4, | 933 | .np = 4, |
901 | .tap = { 7, 7, 7, 7 } | 934 | .tap = { 7, 7, 7, 7 } |
902 | }, { | 935 | }, { |
903 | .key = { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 936 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
904 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 937 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
905 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 938 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
906 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 939 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
907 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 940 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
908 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 941 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
909 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 942 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
910 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 943 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
911 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 944 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
912 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 945 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
913 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 946 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
914 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 947 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
915 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 948 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
916 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 949 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
917 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 950 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
918 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 951 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
919 | 0xaa, 0xaa, 0xaa }, | 952 | "\xaa\xaa\xaa", |
920 | .ksize = 131, | 953 | .ksize = 131, |
921 | /* ("Test Using Larger Than Block-Size Key - Hash Key First") */ | 954 | /* ("Test Using Larger Than Block-Size Key - Hash Key First") */ |
922 | .plaintext = { 0x54, 0x65, 0x73, 0x74, 0x20, 0x55, 0x73, 0x69, | 955 | .plaintext = "\x54\x65\x73\x74\x20\x55\x73\x69" |
923 | 0x6e, 0x67, 0x20, 0x4c, 0x61, 0x72, 0x67, 0x65, | 956 | "\x6e\x67\x20\x4c\x61\x72\x67\x65" |
924 | 0x72, 0x20, 0x54, 0x68, 0x61, 0x6e, 0x20, 0x42, | 957 | "\x72\x20\x54\x68\x61\x6e\x20\x42" |
925 | 0x6c, 0x6f, 0x63, 0x6b, 0x2d, 0x53, 0x69, 0x7a, | 958 | "\x6c\x6f\x63\x6b\x2d\x53\x69\x7a" |
926 | 0x65, 0x20, 0x4b, 0x65, 0x79, 0x20, 0x2d, 0x20, | 959 | "\x65\x20\x4b\x65\x79\x20\x2d\x20" |
927 | 0x48, 0x61, 0x73, 0x68, 0x20, 0x4b, 0x65, 0x79, | 960 | "\x48\x61\x73\x68\x20\x4b\x65\x79" |
928 | 0x20, 0x46, 0x69, 0x72, 0x73, 0x74 }, | 961 | "\x20\x46\x69\x72\x73\x74", |
929 | .psize = 54, | 962 | .psize = 54, |
930 | .digest = { 0x95, 0xe9, 0xa0, 0xdb, 0x96, 0x20, 0x95, 0xad, | 963 | .digest = "\x95\xe9\xa0\xdb\x96\x20\x95\xad" |
931 | 0xae, 0xbe, 0x9b, 0x2d, 0x6f, 0x0d, 0xbc, 0xe2, | 964 | "\xae\xbe\x9b\x2d\x6f\x0d\xbc\xe2" |
932 | 0xd4, 0x99, 0xf1, 0x12, 0xf2, 0xd2, 0xb7, 0x27, | 965 | "\xd4\x99\xf1\x12\xf2\xd2\xb7\x27" |
933 | 0x3f, 0xa6, 0x87, 0x0e }, | 966 | "\x3f\xa6\x87\x0e", |
934 | }, { | 967 | }, { |
935 | .key = { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 968 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
936 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 969 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
937 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 970 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
938 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 971 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
939 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 972 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
940 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 973 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
941 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 974 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
942 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 975 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
943 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 976 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
944 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 977 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
945 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 978 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
946 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 979 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
947 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 980 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
948 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 981 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
949 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 982 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
950 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 983 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
951 | 0xaa, 0xaa, 0xaa }, | 984 | "\xaa\xaa\xaa", |
952 | .ksize = 131, | 985 | .ksize = 131, |
953 | /* ("This is a test using a larger than block-size key and a") | 986 | /* ("This is a test using a larger than block-size key and a") |
954 | (" larger than block-size data. The key needs to be") | 987 | (" larger than block-size data. The key needs to be") |
955 | (" hashed before being used by the HMAC algorithm.") */ | 988 | (" hashed before being used by the HMAC algorithm.") */ |
956 | .plaintext = { 0x54, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, | 989 | .plaintext = "\x54\x68\x69\x73\x20\x69\x73\x20" |
957 | 0x61, 0x20, 0x74, 0x65, 0x73, 0x74, 0x20, 0x75, | 990 | "\x61\x20\x74\x65\x73\x74\x20\x75" |
958 | 0x73, 0x69, 0x6e, 0x67, 0x20, 0x61, 0x20, 0x6c, | 991 | "\x73\x69\x6e\x67\x20\x61\x20\x6c" |
959 | 0x61, 0x72, 0x67, 0x65, 0x72, 0x20, 0x74, 0x68, | 992 | "\x61\x72\x67\x65\x72\x20\x74\x68" |
960 | 0x61, 0x6e, 0x20, 0x62, 0x6c, 0x6f, 0x63, 0x6b, | 993 | "\x61\x6e\x20\x62\x6c\x6f\x63\x6b" |
961 | 0x2d, 0x73, 0x69, 0x7a, 0x65, 0x20, 0x6b, 0x65, | 994 | "\x2d\x73\x69\x7a\x65\x20\x6b\x65" |
962 | 0x79, 0x20, 0x61, 0x6e, 0x64, 0x20, 0x61, 0x20, | 995 | "\x79\x20\x61\x6e\x64\x20\x61\x20" |
963 | 0x6c, 0x61, 0x72, 0x67, 0x65, 0x72, 0x20, 0x74, | 996 | "\x6c\x61\x72\x67\x65\x72\x20\x74" |
964 | 0x68, 0x61, 0x6e, 0x20, 0x62, 0x6c, 0x6f, 0x63, | 997 | "\x68\x61\x6e\x20\x62\x6c\x6f\x63" |
965 | 0x6b, 0x2d, 0x73, 0x69, 0x7a, 0x65, 0x20, 0x64, | 998 | "\x6b\x2d\x73\x69\x7a\x65\x20\x64" |
966 | 0x61, 0x74, 0x61, 0x2e, 0x20, 0x54, 0x68, 0x65, | 999 | "\x61\x74\x61\x2e\x20\x54\x68\x65" |
967 | 0x20, 0x6b, 0x65, 0x79, 0x20, 0x6e, 0x65, 0x65, | 1000 | "\x20\x6b\x65\x79\x20\x6e\x65\x65" |
968 | 0x64, 0x73, 0x20, 0x74, 0x6f, 0x20, 0x62, 0x65, | 1001 | "\x64\x73\x20\x74\x6f\x20\x62\x65" |
969 | 0x20, 0x68, 0x61, 0x73, 0x68, 0x65, 0x64, 0x20, | 1002 | "\x20\x68\x61\x73\x68\x65\x64\x20" |
970 | 0x62, 0x65, 0x66, 0x6f, 0x72, 0x65, 0x20, 0x62, | 1003 | "\x62\x65\x66\x6f\x72\x65\x20\x62" |
971 | 0x65, 0x69, 0x6e, 0x67, 0x20, 0x75, 0x73, 0x65, | 1004 | "\x65\x69\x6e\x67\x20\x75\x73\x65" |
972 | 0x64, 0x20, 0x62, 0x79, 0x20, 0x74, 0x68, 0x65, | 1005 | "\x64\x20\x62\x79\x20\x74\x68\x65" |
973 | 0x20, 0x48, 0x4d, 0x41, 0x43, 0x20, 0x61, 0x6c, | 1006 | "\x20\x48\x4d\x41\x43\x20\x61\x6c" |
974 | 0x67, 0x6f, 0x72, 0x69, 0x74, 0x68, 0x6d, 0x2e }, | 1007 | "\x67\x6f\x72\x69\x74\x68\x6d\x2e", |
975 | .psize = 152, | 1008 | .psize = 152, |
976 | .digest = { 0x3a, 0x85, 0x41, 0x66, 0xac, 0x5d, 0x9f, 0x02, | 1009 | .digest = "\x3a\x85\x41\x66\xac\x5d\x9f\x02" |
977 | 0x3f, 0x54, 0xd5, 0x17, 0xd0, 0xb3, 0x9d, 0xbd, | 1010 | "\x3f\x54\xd5\x17\xd0\xb3\x9d\xbd" |
978 | 0x94, 0x67, 0x70, 0xdb, 0x9c, 0x2b, 0x95, 0xc9, | 1011 | "\x94\x67\x70\xdb\x9c\x2b\x95\xc9" |
979 | 0xf6, 0xf5, 0x65, 0xd1 }, | 1012 | "\xf6\xf5\x65\xd1", |
980 | }, | 1013 | }, |
981 | }; | 1014 | }; |
982 | 1015 | ||
@@ -988,112 +1021,136 @@ static struct hash_testvec hmac_sha224_tv_template[] = { | |||
988 | 1021 | ||
989 | static struct hash_testvec hmac_sha256_tv_template[] = { | 1022 | static struct hash_testvec hmac_sha256_tv_template[] = { |
990 | { | 1023 | { |
991 | .key = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, | 1024 | .key = "\x01\x02\x03\x04\x05\x06\x07\x08" |
992 | 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, | 1025 | "\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10" |
993 | 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, | 1026 | "\x11\x12\x13\x14\x15\x16\x17\x18" |
994 | 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20}, | 1027 | "\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20", |
995 | .ksize = 32, | 1028 | .ksize = 32, |
996 | .plaintext = "abc", | 1029 | .plaintext = "abc", |
997 | .psize = 3, | 1030 | .psize = 3, |
998 | .digest = { 0xa2, 0x1b, 0x1f, 0x5d, 0x4c, 0xf4, 0xf7, 0x3a, | 1031 | .digest = "\xa2\x1b\x1f\x5d\x4c\xf4\xf7\x3a" |
999 | 0x4d, 0xd9, 0x39, 0x75, 0x0f, 0x7a, 0x06, 0x6a, | 1032 | "\x4d\xd9\x39\x75\x0f\x7a\x06\x6a" |
1000 | 0x7f, 0x98, 0xcc, 0x13, 0x1c, 0xb1, 0x6a, 0x66, | 1033 | "\x7f\x98\xcc\x13\x1c\xb1\x6a\x66" |
1001 | 0x92, 0x75, 0x90, 0x21, 0xcf, 0xab, 0x81, 0x81 }, | 1034 | "\x92\x75\x90\x21\xcf\xab\x81\x81", |
1002 | }, { | 1035 | }, { |
1003 | .key = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, | 1036 | .key = "\x01\x02\x03\x04\x05\x06\x07\x08" |
1004 | 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, | 1037 | "\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10" |
1005 | 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, | 1038 | "\x11\x12\x13\x14\x15\x16\x17\x18" |
1006 | 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20 }, | 1039 | "\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20", |
1007 | .ksize = 32, | 1040 | .ksize = 32, |
1008 | .plaintext = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", | 1041 | .plaintext = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", |
1009 | .psize = 56, | 1042 | .psize = 56, |
1010 | .digest = { 0x10, 0x4f, 0xdc, 0x12, 0x57, 0x32, 0x8f, 0x08, | 1043 | .digest = "\x10\x4f\xdc\x12\x57\x32\x8f\x08" |
1011 | 0x18, 0x4b, 0xa7, 0x31, 0x31, 0xc5, 0x3c, 0xae, | 1044 | "\x18\x4b\xa7\x31\x31\xc5\x3c\xae" |
1012 | 0xe6, 0x98, 0xe3, 0x61, 0x19, 0x42, 0x11, 0x49, | 1045 | "\xe6\x98\xe3\x61\x19\x42\x11\x49" |
1013 | 0xea, 0x8c, 0x71, 0x24, 0x56, 0x69, 0x7d, 0x30 }, | 1046 | "\xea\x8c\x71\x24\x56\x69\x7d\x30", |
1014 | }, { | 1047 | }, { |
1015 | .key = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, | 1048 | .key = "\x01\x02\x03\x04\x05\x06\x07\x08" |
1016 | 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, | 1049 | "\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10" |
1017 | 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, | 1050 | "\x11\x12\x13\x14\x15\x16\x17\x18" |
1018 | 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20 }, | 1051 | "\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20", |
1019 | .ksize = 32, | 1052 | .ksize = 32, |
1020 | .plaintext = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" | 1053 | .plaintext = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" |
1021 | "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", | 1054 | "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", |
1022 | .psize = 112, | 1055 | .psize = 112, |
1023 | .digest = { 0x47, 0x03, 0x05, 0xfc, 0x7e, 0x40, 0xfe, 0x34, | 1056 | .digest = "\x47\x03\x05\xfc\x7e\x40\xfe\x34" |
1024 | 0xd3, 0xee, 0xb3, 0xe7, 0x73, 0xd9, 0x5a, 0xab, | 1057 | "\xd3\xee\xb3\xe7\x73\xd9\x5a\xab" |
1025 | 0x73, 0xac, 0xf0, 0xfd, 0x06, 0x04, 0x47, 0xa5, | 1058 | "\x73\xac\xf0\xfd\x06\x04\x47\xa5" |
1026 | 0xeb, 0x45, 0x95, 0xbf, 0x33, 0xa9, 0xd1, 0xa3 }, | 1059 | "\xeb\x45\x95\xbf\x33\xa9\xd1\xa3", |
1027 | }, { | 1060 | }, { |
1028 | .key = { [0 ... 31] = 0x0b }, | 1061 | .key = "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b" |
1062 | "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b" | ||
1063 | "\x0b\x0b\x0b\x0b\x0b\x0b", | ||
1029 | .ksize = 32, | 1064 | .ksize = 32, |
1030 | .plaintext = "Hi There", | 1065 | .plaintext = "Hi There", |
1031 | .psize = 8, | 1066 | .psize = 8, |
1032 | .digest = { 0x19, 0x8a, 0x60, 0x7e, 0xb4, 0x4b, 0xfb, 0xc6, | 1067 | .digest = "\x19\x8a\x60\x7e\xb4\x4b\xfb\xc6" |
1033 | 0x99, 0x03, 0xa0, 0xf1, 0xcf, 0x2b, 0xbd, 0xc5, | 1068 | "\x99\x03\xa0\xf1\xcf\x2b\xbd\xc5" |
1034 | 0xba, 0x0a, 0xa3, 0xf3, 0xd9, 0xae, 0x3c, 0x1c, | 1069 | "\xba\x0a\xa3\xf3\xd9\xae\x3c\x1c" |
1035 | 0x7a, 0x3b, 0x16, 0x96, 0xa0, 0xb6, 0x8c, 0xf7 }, | 1070 | "\x7a\x3b\x16\x96\xa0\xb6\x8c\xf7", |
1036 | }, { | 1071 | }, { |
1037 | .key = "Jefe", | 1072 | .key = "Jefe", |
1038 | .ksize = 4, | 1073 | .ksize = 4, |
1039 | .plaintext = "what do ya want for nothing?", | 1074 | .plaintext = "what do ya want for nothing?", |
1040 | .psize = 28, | 1075 | .psize = 28, |
1041 | .digest = { 0x5b, 0xdc, 0xc1, 0x46, 0xbf, 0x60, 0x75, 0x4e, | 1076 | .digest = "\x5b\xdc\xc1\x46\xbf\x60\x75\x4e" |
1042 | 0x6a, 0x04, 0x24, 0x26, 0x08, 0x95, 0x75, 0xc7, | 1077 | "\x6a\x04\x24\x26\x08\x95\x75\xc7" |
1043 | 0x5a, 0x00, 0x3f, 0x08, 0x9d, 0x27, 0x39, 0x83, | 1078 | "\x5a\x00\x3f\x08\x9d\x27\x39\x83" |
1044 | 0x9d, 0xec, 0x58, 0xb9, 0x64, 0xec, 0x38, 0x43 }, | 1079 | "\x9d\xec\x58\xb9\x64\xec\x38\x43", |
1045 | .np = 2, | 1080 | .np = 2, |
1046 | .tap = { 14, 14 } | 1081 | .tap = { 14, 14 } |
1047 | }, { | 1082 | }, { |
1048 | .key = { [0 ... 31] = 0xaa }, | 1083 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1084 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
1085 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa", | ||
1049 | .ksize = 32, | 1086 | .ksize = 32, |
1050 | .plaintext = { [0 ... 49] = 0xdd }, | 1087 | .plaintext = "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" |
1088 | "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" | ||
1089 | "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" | ||
1090 | "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd", | ||
1051 | .psize = 50, | 1091 | .psize = 50, |
1052 | .digest = { 0xcd, 0xcb, 0x12, 0x20, 0xd1, 0xec, 0xcc, 0xea, | 1092 | .digest = "\xcd\xcb\x12\x20\xd1\xec\xcc\xea" |
1053 | 0x91, 0xe5, 0x3a, 0xba, 0x30, 0x92, 0xf9, 0x62, | 1093 | "\x91\xe5\x3a\xba\x30\x92\xf9\x62" |
1054 | 0xe5, 0x49, 0xfe, 0x6c, 0xe9, 0xed, 0x7f, 0xdc, | 1094 | "\xe5\x49\xfe\x6c\xe9\xed\x7f\xdc" |
1055 | 0x43, 0x19, 0x1f, 0xbd, 0xe4, 0x5c, 0x30, 0xb0 }, | 1095 | "\x43\x19\x1f\xbd\xe4\x5c\x30\xb0", |
1056 | }, { | 1096 | }, { |
1057 | .key = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, | 1097 | .key = "\x01\x02\x03\x04\x05\x06\x07\x08" |
1058 | 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, | 1098 | "\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10" |
1059 | 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, | 1099 | "\x11\x12\x13\x14\x15\x16\x17\x18" |
1060 | 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, | 1100 | "\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20" |
1061 | 0x21, 0x22, 0x23, 0x24, 0x25 }, | 1101 | "\x21\x22\x23\x24\x25", |
1062 | .ksize = 37, | 1102 | .ksize = 37, |
1063 | .plaintext = { [0 ... 49] = 0xcd }, | 1103 | .plaintext = "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" |
1104 | "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" | ||
1105 | "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" | ||
1106 | "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd", | ||
1064 | .psize = 50, | 1107 | .psize = 50, |
1065 | .digest = { 0xd4, 0x63, 0x3c, 0x17, 0xf6, 0xfb, 0x8d, 0x74, | 1108 | .digest = "\xd4\x63\x3c\x17\xf6\xfb\x8d\x74" |
1066 | 0x4c, 0x66, 0xde, 0xe0, 0xf8, 0xf0, 0x74, 0x55, | 1109 | "\x4c\x66\xde\xe0\xf8\xf0\x74\x55" |
1067 | 0x6e, 0xc4, 0xaf, 0x55, 0xef, 0x07, 0x99, 0x85, | 1110 | "\x6e\xc4\xaf\x55\xef\x07\x99\x85" |
1068 | 0x41, 0x46, 0x8e, 0xb4, 0x9b, 0xd2, 0xe9, 0x17 }, | 1111 | "\x41\x46\x8e\xb4\x9b\xd2\xe9\x17", |
1069 | }, { | 1112 | }, { |
1070 | .key = { [0 ... 31] = 0x0c }, | 1113 | .key = "\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c" |
1114 | "\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c" | ||
1115 | "\x0c\x0c\x0c\x0c\x0c\x0c", | ||
1071 | .ksize = 32, | 1116 | .ksize = 32, |
1072 | .plaintext = "Test With Truncation", | 1117 | .plaintext = "Test With Truncation", |
1073 | .psize = 20, | 1118 | .psize = 20, |
1074 | .digest = { 0x75, 0x46, 0xaf, 0x01, 0x84, 0x1f, 0xc0, 0x9b, | 1119 | .digest = "\x75\x46\xaf\x01\x84\x1f\xc0\x9b" |
1075 | 0x1a, 0xb9, 0xc3, 0x74, 0x9a, 0x5f, 0x1c, 0x17, | 1120 | "\x1a\xb9\xc3\x74\x9a\x5f\x1c\x17" |
1076 | 0xd4, 0xf5, 0x89, 0x66, 0x8a, 0x58, 0x7b, 0x27, | 1121 | "\xd4\xf5\x89\x66\x8a\x58\x7b\x27" |
1077 | 0x00, 0xa9, 0xc9, 0x7c, 0x11, 0x93, 0xcf, 0x42 }, | 1122 | "\x00\xa9\xc9\x7c\x11\x93\xcf\x42", |
1078 | }, { | 1123 | }, { |
1079 | .key = { [0 ... 79] = 0xaa }, | 1124 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1125 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
1126 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
1127 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
1128 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
1129 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
1130 | "\xaa\xaa", | ||
1080 | .ksize = 80, | 1131 | .ksize = 80, |
1081 | .plaintext = "Test Using Larger Than Block-Size Key - Hash Key First", | 1132 | .plaintext = "Test Using Larger Than Block-Size Key - Hash Key First", |
1082 | .psize = 54, | 1133 | .psize = 54, |
1083 | .digest = { 0x69, 0x53, 0x02, 0x5e, 0xd9, 0x6f, 0x0c, 0x09, | 1134 | .digest = "\x69\x53\x02\x5e\xd9\x6f\x0c\x09" |
1084 | 0xf8, 0x0a, 0x96, 0xf7, 0x8e, 0x65, 0x38, 0xdb, | 1135 | "\xf8\x0a\x96\xf7\x8e\x65\x38\xdb" |
1085 | 0xe2, 0xe7, 0xb8, 0x20, 0xe3, 0xdd, 0x97, 0x0e, | 1136 | "\xe2\xe7\xb8\x20\xe3\xdd\x97\x0e" |
1086 | 0x7d, 0xdd, 0x39, 0x09, 0x1b, 0x32, 0x35, 0x2f }, | 1137 | "\x7d\xdd\x39\x09\x1b\x32\x35\x2f", |
1087 | }, { | 1138 | }, { |
1088 | .key = { [0 ... 79] = 0xaa }, | 1139 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1140 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
1141 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
1142 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
1143 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
1144 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" | ||
1145 | "\xaa\xaa", | ||
1089 | .ksize = 80, | 1146 | .ksize = 80, |
1090 | .plaintext = "Test Using Larger Than Block-Size Key and Larger Than " | 1147 | .plaintext = "Test Using Larger Than Block-Size Key and Larger Than " |
1091 | "One Block-Size Data", | 1148 | "One Block-Size Data", |
1092 | .psize = 73, | 1149 | .psize = 73, |
1093 | .digest = { 0x63, 0x55, 0xac, 0x22, 0xe8, 0x90, 0xd0, 0xa3, | 1150 | .digest = "\x63\x55\xac\x22\xe8\x90\xd0\xa3" |
1094 | 0xc8, 0x48, 0x1a, 0x5c, 0xa4, 0x82, 0x5b, 0xc8, | 1151 | "\xc8\x48\x1a\x5c\xa4\x82\x5b\xc8" |
1095 | 0x84, 0xd3, 0xe7, 0xa1, 0xff, 0x98, 0xa2, 0xfc, | 1152 | "\x84\xd3\xe7\xa1\xff\x98\xa2\xfc" |
1096 | 0x2a, 0xc7, 0xd8, 0xe0, 0x64, 0xc3, 0xb2, 0xe6 }, | 1153 | "\x2a\xc7\xd8\xe0\x64\xc3\xb2\xe6", |
1097 | }, | 1154 | }, |
1098 | }; | 1155 | }; |
1099 | 1156 | ||
@@ -1101,63 +1158,63 @@ static struct hash_testvec hmac_sha256_tv_template[] = { | |||
1101 | 1158 | ||
1102 | static struct hash_testvec aes_xcbc128_tv_template[] = { | 1159 | static struct hash_testvec aes_xcbc128_tv_template[] = { |
1103 | { | 1160 | { |
1104 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 1161 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
1105 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 1162 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
1106 | .plaintext = { [0 ... 15] = 0 }, | 1163 | .plaintext = zeroed_string, |
1107 | .digest = { 0x75, 0xf0, 0x25, 0x1d, 0x52, 0x8a, 0xc0, 0x1c, | 1164 | .digest = "\x75\xf0\x25\x1d\x52\x8a\xc0\x1c" |
1108 | 0x45, 0x73, 0xdf, 0xd5, 0x84, 0xd7, 0x9f, 0x29 }, | 1165 | "\x45\x73\xdf\xd5\x84\xd7\x9f\x29", |
1109 | .psize = 0, | 1166 | .psize = 0, |
1110 | .ksize = 16, | 1167 | .ksize = 16, |
1111 | }, { | 1168 | }, { |
1112 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 1169 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
1113 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 1170 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
1114 | .plaintext = { 0x00, 0x01, 0x02 }, | 1171 | .plaintext = "\x00\x01\x02", |
1115 | .digest = { 0x5b, 0x37, 0x65, 0x80, 0xae, 0x2f, 0x19, 0xaf, | 1172 | .digest = "\x5b\x37\x65\x80\xae\x2f\x19\xaf" |
1116 | 0xe7, 0x21, 0x9c, 0xee, 0xf1, 0x72, 0x75, 0x6f }, | 1173 | "\xe7\x21\x9c\xee\xf1\x72\x75\x6f", |
1117 | .psize = 3, | 1174 | .psize = 3, |
1118 | .ksize = 16, | 1175 | .ksize = 16, |
1119 | } , { | 1176 | } , { |
1120 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 1177 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
1121 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 1178 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
1122 | .plaintext = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 1179 | .plaintext = "\x00\x01\x02\x03\x04\x05\x06\x07" |
1123 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 1180 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
1124 | .digest = { 0xd2, 0xa2, 0x46, 0xfa, 0x34, 0x9b, 0x68, 0xa7, | 1181 | .digest = "\xd2\xa2\x46\xfa\x34\x9b\x68\xa7" |
1125 | 0x99, 0x98, 0xa4, 0x39, 0x4f, 0xf7, 0xa2, 0x63 }, | 1182 | "\x99\x98\xa4\x39\x4f\xf7\xa2\x63", |
1126 | .psize = 16, | 1183 | .psize = 16, |
1127 | .ksize = 16, | 1184 | .ksize = 16, |
1128 | }, { | 1185 | }, { |
1129 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 1186 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
1130 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 1187 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
1131 | .plaintext = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 1188 | .plaintext = "\x00\x01\x02\x03\x04\x05\x06\x07" |
1132 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 1189 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
1133 | 0x10, 0x11, 0x12, 0x13 }, | 1190 | "\x10\x11\x12\x13", |
1134 | .digest = { 0x47, 0xf5, 0x1b, 0x45, 0x64, 0x96, 0x62, 0x15, | 1191 | .digest = "\x47\xf5\x1b\x45\x64\x96\x62\x15" |
1135 | 0xb8, 0x98, 0x5c, 0x63, 0x05, 0x5e, 0xd3, 0x08 }, | 1192 | "\xb8\x98\x5c\x63\x05\x5e\xd3\x08", |
1136 | .tap = { 10, 10 }, | 1193 | .tap = { 10, 10 }, |
1137 | .psize = 20, | 1194 | .psize = 20, |
1138 | .np = 2, | 1195 | .np = 2, |
1139 | .ksize = 16, | 1196 | .ksize = 16, |
1140 | }, { | 1197 | }, { |
1141 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 1198 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
1142 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 1199 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
1143 | .plaintext = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 1200 | .plaintext = "\x00\x01\x02\x03\x04\x05\x06\x07" |
1144 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 1201 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
1145 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 1202 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
1146 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 1203 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
1147 | .digest = { 0xf5, 0x4f, 0x0e, 0xc8, 0xd2, 0xb9, 0xf3, 0xd3, | 1204 | .digest = "\xf5\x4f\x0e\xc8\xd2\xb9\xf3\xd3" |
1148 | 0x68, 0x07, 0x73, 0x4b, 0xd5, 0x28, 0x3f, 0xd4 }, | 1205 | "\x68\x07\x73\x4b\xd5\x28\x3f\xd4", |
1149 | .psize = 32, | 1206 | .psize = 32, |
1150 | .ksize = 16, | 1207 | .ksize = 16, |
1151 | }, { | 1208 | }, { |
1152 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 1209 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
1153 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 1210 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
1154 | .plaintext = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 1211 | .plaintext = "\x00\x01\x02\x03\x04\x05\x06\x07" |
1155 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 1212 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
1156 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 1213 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
1157 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, | 1214 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f" |
1158 | 0x20, 0x21 }, | 1215 | "\x20\x21", |
1159 | .digest = { 0xbe, 0xcb, 0xb3, 0xbc, 0xcd, 0xb5, 0x18, 0xa3, | 1216 | .digest = "\xbe\xcb\xb3\xbc\xcd\xb5\x18\xa3" |
1160 | 0x06, 0x77, 0xd5, 0x48, 0x1f, 0xb6, 0xb4, 0xd8 }, | 1217 | "\x06\x77\xd5\x48\x1f\xb6\xb4\xd8", |
1161 | .tap = { 17, 17 }, | 1218 | .tap = { 17, 17 }, |
1162 | .psize = 34, | 1219 | .psize = 34, |
1163 | .np = 2, | 1220 | .np = 2, |
@@ -1173,112 +1230,95 @@ static struct hash_testvec aes_xcbc128_tv_template[] = { | |||
1173 | 1230 | ||
1174 | static struct hash_testvec hmac_sha384_tv_template[] = { | 1231 | static struct hash_testvec hmac_sha384_tv_template[] = { |
1175 | { | 1232 | { |
1176 | .key = { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, | 1233 | .key = "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b" |
1177 | 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, | 1234 | "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b" |
1178 | 0x0b, 0x0b, 0x0b, 0x0b }, // (20 bytes) | 1235 | "\x0b\x0b\x0b\x0b", |
1179 | .ksize = 20, | 1236 | .ksize = 20, |
1180 | .plaintext = { 0x48, 0x69, 0x20, 0x54, 0x68, 0x65, 0x72, 0x65 }, // ("Hi There") | 1237 | .plaintext = "Hi There", |
1181 | .psize = 8, | 1238 | .psize = 8, |
1182 | .digest = { 0xaf, 0xd0, 0x39, 0x44, 0xd8, 0x48, 0x95, 0x62, | 1239 | .digest = "\xaf\xd0\x39\x44\xd8\x48\x95\x62" |
1183 | 0x6b, 0x08, 0x25, 0xf4, 0xab, 0x46, 0x90, 0x7f, | 1240 | "\x6b\x08\x25\xf4\xab\x46\x90\x7f" |
1184 | 0x15, 0xf9, 0xda, 0xdb, 0xe4, 0x10, 0x1e, 0xc6, | 1241 | "\x15\xf9\xda\xdb\xe4\x10\x1e\xc6" |
1185 | 0x82, 0xaa, 0x03, 0x4c, 0x7c, 0xeb, 0xc5, 0x9c, | 1242 | "\x82\xaa\x03\x4c\x7c\xeb\xc5\x9c" |
1186 | 0xfa, 0xea, 0x9e, 0xa9, 0x07, 0x6e, 0xde, 0x7f, | 1243 | "\xfa\xea\x9e\xa9\x07\x6e\xde\x7f" |
1187 | 0x4a, 0xf1, 0x52, 0xe8, 0xb2, 0xfa, 0x9c, 0xb6 }, | 1244 | "\x4a\xf1\x52\xe8\xb2\xfa\x9c\xb6", |
1188 | }, { | 1245 | }, { |
1189 | .key = { 0x4a, 0x65, 0x66, 0x65 }, // ("Jefe") | 1246 | .key = "Jefe", |
1190 | .ksize = 4, | 1247 | .ksize = 4, |
1191 | .plaintext = { 0x77, 0x68, 0x61, 0x74, 0x20, 0x64, 0x6f, 0x20, | 1248 | .plaintext = "what do ya want for nothing?", |
1192 | 0x79, 0x61, 0x20, 0x77, 0x61, 0x6e, 0x74, 0x20, // ("what do ya want ") | ||
1193 | 0x66, 0x6f, 0x72, 0x20, 0x6e, 0x6f, 0x74, 0x68, | ||
1194 | 0x69, 0x6e, 0x67, 0x3f }, // ("for nothing?") | ||
1195 | .psize = 28, | 1249 | .psize = 28, |
1196 | .digest = { 0xaf, 0x45, 0xd2, 0xe3, 0x76, 0x48, 0x40, 0x31, | 1250 | .digest = "\xaf\x45\xd2\xe3\x76\x48\x40\x31" |
1197 | 0x61, 0x7f, 0x78, 0xd2, 0xb5, 0x8a, 0x6b, 0x1b, | 1251 | "\x61\x7f\x78\xd2\xb5\x8a\x6b\x1b" |
1198 | 0x9c, 0x7e, 0xf4, 0x64, 0xf5, 0xa0, 0x1b, 0x47, | 1252 | "\x9c\x7e\xf4\x64\xf5\xa0\x1b\x47" |
1199 | 0xe4, 0x2e, 0xc3, 0x73, 0x63, 0x22, 0x44, 0x5e, | 1253 | "\xe4\x2e\xc3\x73\x63\x22\x44\x5e" |
1200 | 0x8e, 0x22, 0x40, 0xca, 0x5e, 0x69, 0xe2, 0xc7, | 1254 | "\x8e\x22\x40\xca\x5e\x69\xe2\xc7" |
1201 | 0x8b, 0x32, 0x39, 0xec, 0xfa, 0xb2, 0x16, 0x49 }, | 1255 | "\x8b\x32\x39\xec\xfa\xb2\x16\x49", |
1202 | .np = 4, | 1256 | .np = 4, |
1203 | .tap = { 7, 7, 7, 7 } | 1257 | .tap = { 7, 7, 7, 7 } |
1204 | }, { | 1258 | }, { |
1205 | .key = { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1259 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1206 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1260 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1207 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1261 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1208 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1262 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1209 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1263 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1210 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1264 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1211 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1265 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1212 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1266 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1213 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1267 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1214 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1268 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1215 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1269 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1216 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1270 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1217 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1271 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1218 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1272 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1219 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1273 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1220 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1274 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1221 | 0xaa, 0xaa, 0xaa }, // (131 bytes) | 1275 | "\xaa\xaa\xaa", |
1222 | .ksize = 131, | 1276 | .ksize = 131, |
1223 | .plaintext = { 0x54, 0x65, 0x73, 0x74, 0x20, 0x55, 0x73, 0x69, | 1277 | .plaintext = "Test Using Larger Than Block-Siz" |
1224 | 0x6e, 0x67, 0x20, 0x4c, 0x61, 0x72, 0x67, 0x65, // ("Test Using Large") | 1278 | "e Key - Hash Key First", |
1225 | 0x72, 0x20, 0x54, 0x68, 0x61, 0x6e, 0x20, 0x42, | ||
1226 | 0x6c, 0x6f, 0x63, 0x6b, 0x2d, 0x53, 0x69, 0x7a, // ("r Than Block-Siz") | ||
1227 | 0x65, 0x20, 0x4b, 0x65, 0x79, 0x20, 0x2d, 0x20, | ||
1228 | 0x48, 0x61, 0x73, 0x68, 0x20, 0x4b, 0x65, 0x79, // ("e Key - Hash Key") | ||
1229 | 0x20, 0x46, 0x69, 0x72, 0x73, 0x74 }, // (" First") | ||
1230 | .psize = 54, | 1279 | .psize = 54, |
1231 | .digest = { 0x4e, 0xce, 0x08, 0x44, 0x85, 0x81, 0x3e, 0x90, | 1280 | .digest = "\x4e\xce\x08\x44\x85\x81\x3e\x90" |
1232 | 0x88, 0xd2, 0xc6, 0x3a, 0x04, 0x1b, 0xc5, 0xb4, | 1281 | "\x88\xd2\xc6\x3a\x04\x1b\xc5\xb4" |
1233 | 0x4f, 0x9e, 0xf1, 0x01, 0x2a, 0x2b, 0x58, 0x8f, | 1282 | "\x4f\x9e\xf1\x01\x2a\x2b\x58\x8f" |
1234 | 0x3c, 0xd1, 0x1f, 0x05, 0x03, 0x3a, 0xc4, 0xc6, | 1283 | "\x3c\xd1\x1f\x05\x03\x3a\xc4\xc6" |
1235 | 0x0c, 0x2e, 0xf6, 0xab, 0x40, 0x30, 0xfe, 0x82, | 1284 | "\x0c\x2e\xf6\xab\x40\x30\xfe\x82" |
1236 | 0x96, 0x24, 0x8d, 0xf1, 0x63, 0xf4, 0x49, 0x52 }, | 1285 | "\x96\x24\x8d\xf1\x63\xf4\x49\x52", |
1237 | }, { | 1286 | }, { |
1238 | .key = { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1287 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1239 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1288 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1240 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1289 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1241 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1290 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1242 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1291 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1243 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1292 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1244 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1293 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1245 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1294 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1246 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1295 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1247 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1296 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1248 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1297 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1249 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1298 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1250 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1299 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1251 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1300 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1252 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1301 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1253 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1302 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1254 | 0xaa, 0xaa, 0xaa }, // (131 bytes) | 1303 | "\xaa\xaa\xaa", |
1255 | .ksize = 131, | 1304 | .ksize = 131, |
1256 | .plaintext = { 0x54, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, | 1305 | .plaintext = "This is a test u" |
1257 | 0x61, 0x20, 0x74, 0x65, 0x73, 0x74, 0x20, 0x75, // ("This is a test u") | 1306 | "sing a larger th" |
1258 | 0x73, 0x69, 0x6e, 0x67, 0x20, 0x61, 0x20, 0x6c, | 1307 | "an block-size ke" |
1259 | 0x61, 0x72, 0x67, 0x65, 0x72, 0x20, 0x74, 0x68, // ("sing a larger th") | 1308 | "y and a larger t" |
1260 | 0x61, 0x6e, 0x20, 0x62, 0x6c, 0x6f, 0x63, 0x6b, | 1309 | "han block-size d" |
1261 | 0x2d, 0x73, 0x69, 0x7a, 0x65, 0x20, 0x6b, 0x65, // ("an block-size ke") | 1310 | "ata. The key nee" |
1262 | 0x79, 0x20, 0x61, 0x6e, 0x64, 0x20, 0x61, 0x20, | 1311 | "ds to be hashed " |
1263 | 0x6c, 0x61, 0x72, 0x67, 0x65, 0x72, 0x20, 0x74, // ("y and a larger t") | 1312 | "before being use" |
1264 | 0x68, 0x61, 0x6e, 0x20, 0x62, 0x6c, 0x6f, 0x63, | 1313 | "d by the HMAC al" |
1265 | 0x6b, 0x2d, 0x73, 0x69, 0x7a, 0x65, 0x20, 0x64, // ("han block-size d") | 1314 | "gorithm.", |
1266 | 0x61, 0x74, 0x61, 0x2e, 0x20, 0x54, 0x68, 0x65, | ||
1267 | 0x20, 0x6b, 0x65, 0x79, 0x20, 0x6e, 0x65, 0x65, // ("ata. The key nee") | ||
1268 | 0x64, 0x73, 0x20, 0x74, 0x6f, 0x20, 0x62, 0x65, | ||
1269 | 0x20, 0x68, 0x61, 0x73, 0x68, 0x65, 0x64, 0x20, // ("ds to be hashed ") | ||
1270 | 0x62, 0x65, 0x66, 0x6f, 0x72, 0x65, 0x20, 0x62, | ||
1271 | 0x65, 0x69, 0x6e, 0x67, 0x20, 0x75, 0x73, 0x65, // ("before being use") | ||
1272 | 0x64, 0x20, 0x62, 0x79, 0x20, 0x74, 0x68, 0x65, | ||
1273 | 0x20, 0x48, 0x4d, 0x41, 0x43, 0x20, 0x61, 0x6c, // ("d by the HMAC al") | ||
1274 | 0x67, 0x6f, 0x72, 0x69, 0x74, 0x68, 0x6d, 0x2e }, // ("gorithm.") | ||
1275 | .psize = 152, | 1315 | .psize = 152, |
1276 | .digest = { 0x66, 0x17, 0x17, 0x8e, 0x94, 0x1f, 0x02, 0x0d, | 1316 | .digest = "\x66\x17\x17\x8e\x94\x1f\x02\x0d" |
1277 | 0x35, 0x1e, 0x2f, 0x25, 0x4e, 0x8f, 0xd3, 0x2c, | 1317 | "\x35\x1e\x2f\x25\x4e\x8f\xd3\x2c" |
1278 | 0x60, 0x24, 0x20, 0xfe, 0xb0, 0xb8, 0xfb, 0x9a, | 1318 | "\x60\x24\x20\xfe\xb0\xb8\xfb\x9a" |
1279 | 0xdc, 0xce, 0xbb, 0x82, 0x46, 0x1e, 0x99, 0xc5, | 1319 | "\xdc\xce\xbb\x82\x46\x1e\x99\xc5" |
1280 | 0xa6, 0x78, 0xcc, 0x31, 0xe7, 0x99, 0x17, 0x6d, | 1320 | "\xa6\x78\xcc\x31\xe7\x99\x17\x6d" |
1281 | 0x38, 0x60, 0xe6, 0x11, 0x0c, 0x46, 0x52, 0x3e }, | 1321 | "\x38\x60\xe6\x11\x0c\x46\x52\x3e", |
1282 | }, | 1322 | }, |
1283 | }; | 1323 | }; |
1284 | 1324 | ||
@@ -1290,120 +1330,106 @@ static struct hash_testvec hmac_sha384_tv_template[] = { | |||
1290 | 1330 | ||
1291 | static struct hash_testvec hmac_sha512_tv_template[] = { | 1331 | static struct hash_testvec hmac_sha512_tv_template[] = { |
1292 | { | 1332 | { |
1293 | .key = { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, | 1333 | .key = "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b" |
1294 | 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, | 1334 | "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b" |
1295 | 0x0b, 0x0b, 0x0b, 0x0b }, // (20 bytes) | 1335 | "\x0b\x0b\x0b\x0b", |
1296 | .ksize = 20, | 1336 | .ksize = 20, |
1297 | .plaintext = { 0x48, 0x69, 0x20, 0x54, 0x68, 0x65, 0x72, 0x65 }, // ("Hi There") | 1337 | .plaintext = "Hi There", |
1298 | .psize = 8, | 1338 | .psize = 8, |
1299 | .digest = { 0x87, 0xaa, 0x7c, 0xde, 0xa5, 0xef, 0x61, 0x9d, | 1339 | .digest = "\x87\xaa\x7c\xde\xa5\xef\x61\x9d" |
1300 | 0x4f, 0xf0, 0xb4, 0x24, 0x1a, 0x1d, 0x6c, 0xb0, | 1340 | "\x4f\xf0\xb4\x24\x1a\x1d\x6c\xb0" |
1301 | 0x23, 0x79, 0xf4, 0xe2, 0xce, 0x4e, 0xc2, 0x78, | 1341 | "\x23\x79\xf4\xe2\xce\x4e\xc2\x78" |
1302 | 0x7a, 0xd0, 0xb3, 0x05, 0x45, 0xe1, 0x7c, 0xde, | 1342 | "\x7a\xd0\xb3\x05\x45\xe1\x7c\xde" |
1303 | 0xda, 0xa8, 0x33, 0xb7, 0xd6, 0xb8, 0xa7, 0x02, | 1343 | "\xda\xa8\x33\xb7\xd6\xb8\xa7\x02" |
1304 | 0x03, 0x8b, 0x27, 0x4e, 0xae, 0xa3, 0xf4, 0xe4, | 1344 | "\x03\x8b\x27\x4e\xae\xa3\xf4\xe4" |
1305 | 0xbe, 0x9d, 0x91, 0x4e, 0xeb, 0x61, 0xf1, 0x70, | 1345 | "\xbe\x9d\x91\x4e\xeb\x61\xf1\x70" |
1306 | 0x2e, 0x69, 0x6c, 0x20, 0x3a, 0x12, 0x68, 0x54 }, | 1346 | "\x2e\x69\x6c\x20\x3a\x12\x68\x54", |
1307 | }, { | 1347 | }, { |
1308 | .key = { 0x4a, 0x65, 0x66, 0x65 }, // ("Jefe") | 1348 | .key = "Jefe", |
1309 | .ksize = 4, | 1349 | .ksize = 4, |
1310 | .plaintext = { 0x77, 0x68, 0x61, 0x74, 0x20, 0x64, 0x6f, 0x20, | 1350 | .plaintext = "what do ya want for nothing?", |
1311 | 0x79, 0x61, 0x20, 0x77, 0x61, 0x6e, 0x74, 0x20, // ("what do ya want ") | ||
1312 | 0x66, 0x6f, 0x72, 0x20, 0x6e, 0x6f, 0x74, 0x68, | ||
1313 | 0x69, 0x6e, 0x67, 0x3f }, // ("for nothing?") | ||
1314 | .psize = 28, | 1351 | .psize = 28, |
1315 | .digest = { 0x16, 0x4b, 0x7a, 0x7b, 0xfc, 0xf8, 0x19, 0xe2, | 1352 | .digest = "\x16\x4b\x7a\x7b\xfc\xf8\x19\xe2" |
1316 | 0xe3, 0x95, 0xfb, 0xe7, 0x3b, 0x56, 0xe0, 0xa3, | 1353 | "\xe3\x95\xfb\xe7\x3b\x56\xe0\xa3" |
1317 | 0x87, 0xbd, 0x64, 0x22, 0x2e, 0x83, 0x1f, 0xd6, | 1354 | "\x87\xbd\x64\x22\x2e\x83\x1f\xd6" |
1318 | 0x10, 0x27, 0x0c, 0xd7, 0xea, 0x25, 0x05, 0x54, | 1355 | "\x10\x27\x0c\xd7\xea\x25\x05\x54" |
1319 | 0x97, 0x58, 0xbf, 0x75, 0xc0, 0x5a, 0x99, 0x4a, | 1356 | "\x97\x58\xbf\x75\xc0\x5a\x99\x4a" |
1320 | 0x6d, 0x03, 0x4f, 0x65, 0xf8, 0xf0, 0xe6, 0xfd, | 1357 | "\x6d\x03\x4f\x65\xf8\xf0\xe6\xfd" |
1321 | 0xca, 0xea, 0xb1, 0xa3, 0x4d, 0x4a, 0x6b, 0x4b, | 1358 | "\xca\xea\xb1\xa3\x4d\x4a\x6b\x4b" |
1322 | 0x63, 0x6e, 0x07, 0x0a, 0x38, 0xbc, 0xe7, 0x37 }, | 1359 | "\x63\x6e\x07\x0a\x38\xbc\xe7\x37", |
1323 | .np = 4, | 1360 | .np = 4, |
1324 | .tap = { 7, 7, 7, 7 } | 1361 | .tap = { 7, 7, 7, 7 } |
1325 | }, { | 1362 | }, { |
1326 | .key = { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1363 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1327 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1364 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1328 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1365 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1329 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1366 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1330 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1367 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1331 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1368 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1332 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1369 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1333 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1370 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1334 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1371 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1335 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1372 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1336 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1373 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1337 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1374 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1338 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1375 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1339 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1376 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1340 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1377 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1341 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1378 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1342 | 0xaa, 0xaa, 0xaa }, // (131 bytes) | 1379 | "\xaa\xaa\xaa", |
1343 | .ksize = 131, | 1380 | .ksize = 131, |
1344 | .plaintext = { 0x54, 0x65, 0x73, 0x74, 0x20, 0x55, 0x73, 0x69, | 1381 | .plaintext = "Test Using Large" |
1345 | 0x6e, 0x67, 0x20, 0x4c, 0x61, 0x72, 0x67, 0x65, // ("Test Using Large") | 1382 | "r Than Block-Siz" |
1346 | 0x72, 0x20, 0x54, 0x68, 0x61, 0x6e, 0x20, 0x42, | 1383 | "e Key - Hash Key" |
1347 | 0x6c, 0x6f, 0x63, 0x6b, 0x2d, 0x53, 0x69, 0x7a, // ("r Than Block-Siz") | 1384 | " First", |
1348 | 0x65, 0x20, 0x4b, 0x65, 0x79, 0x20, 0x2d, 0x20, | ||
1349 | 0x48, 0x61, 0x73, 0x68, 0x20, 0x4b, 0x65, 0x79, // ("e Key - Hash Key") | ||
1350 | 0x20, 0x46, 0x69, 0x72, 0x73, 0x74 }, // (" First") | ||
1351 | .psize = 54, | 1385 | .psize = 54, |
1352 | .digest = { 0x80, 0xb2, 0x42, 0x63, 0xc7, 0xc1, 0xa3, 0xeb, | 1386 | .digest = "\x80\xb2\x42\x63\xc7\xc1\xa3\xeb" |
1353 | 0xb7, 0x14, 0x93, 0xc1, 0xdd, 0x7b, 0xe8, 0xb4, | 1387 | "\xb7\x14\x93\xc1\xdd\x7b\xe8\xb4" |
1354 | 0x9b, 0x46, 0xd1, 0xf4, 0x1b, 0x4a, 0xee, 0xc1, | 1388 | "\x9b\x46\xd1\xf4\x1b\x4a\xee\xc1" |
1355 | 0x12, 0x1b, 0x01, 0x37, 0x83, 0xf8, 0xf3, 0x52, | 1389 | "\x12\x1b\x01\x37\x83\xf8\xf3\x52" |
1356 | 0x6b, 0x56, 0xd0, 0x37, 0xe0, 0x5f, 0x25, 0x98, | 1390 | "\x6b\x56\xd0\x37\xe0\x5f\x25\x98" |
1357 | 0xbd, 0x0f, 0xd2, 0x21, 0x5d, 0x6a, 0x1e, 0x52, | 1391 | "\xbd\x0f\xd2\x21\x5d\x6a\x1e\x52" |
1358 | 0x95, 0xe6, 0x4f, 0x73, 0xf6, 0x3f, 0x0a, 0xec, | 1392 | "\x95\xe6\x4f\x73\xf6\x3f\x0a\xec" |
1359 | 0x8b, 0x91, 0x5a, 0x98, 0x5d, 0x78, 0x65, 0x98 }, | 1393 | "\x8b\x91\x5a\x98\x5d\x78\x65\x98", |
1360 | }, { | 1394 | }, { |
1361 | .key = { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1395 | .key = "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1362 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1396 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1363 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1397 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1364 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1398 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1365 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1399 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1366 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1400 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1367 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1401 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1368 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1402 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1369 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1403 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1370 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1404 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1371 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1405 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1372 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1406 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1373 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1407 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1374 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1408 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1375 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1409 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1376 | 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | 1410 | "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" |
1377 | 0xaa, 0xaa, 0xaa }, // (131 bytes) | 1411 | "\xaa\xaa\xaa", |
1378 | .ksize = 131, | 1412 | .ksize = 131, |
1379 | .plaintext = { 0x54, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, | 1413 | .plaintext = |
1380 | 0x61, 0x20, 0x74, 0x65, 0x73, 0x74, 0x20, 0x75, // ("This is a test u") | 1414 | "This is a test u" |
1381 | 0x73, 0x69, 0x6e, 0x67, 0x20, 0x61, 0x20, 0x6c, | 1415 | "sing a larger th" |
1382 | 0x61, 0x72, 0x67, 0x65, 0x72, 0x20, 0x74, 0x68, // ("sing a larger th") | 1416 | "an block-size ke" |
1383 | 0x61, 0x6e, 0x20, 0x62, 0x6c, 0x6f, 0x63, 0x6b, | 1417 | "y and a larger t" |
1384 | 0x2d, 0x73, 0x69, 0x7a, 0x65, 0x20, 0x6b, 0x65, // ("an block-size ke") | 1418 | "han block-size d" |
1385 | 0x79, 0x20, 0x61, 0x6e, 0x64, 0x20, 0x61, 0x20, | 1419 | "ata. The key nee" |
1386 | 0x6c, 0x61, 0x72, 0x67, 0x65, 0x72, 0x20, 0x74, // ("y and a larger t") | 1420 | "ds to be hashed " |
1387 | 0x68, 0x61, 0x6e, 0x20, 0x62, 0x6c, 0x6f, 0x63, | 1421 | "before being use" |
1388 | 0x6b, 0x2d, 0x73, 0x69, 0x7a, 0x65, 0x20, 0x64, // ("han block-size d") | 1422 | "d by the HMAC al" |
1389 | 0x61, 0x74, 0x61, 0x2e, 0x20, 0x54, 0x68, 0x65, | 1423 | "gorithm.", |
1390 | 0x20, 0x6b, 0x65, 0x79, 0x20, 0x6e, 0x65, 0x65, // ("ata. The key nee") | ||
1391 | 0x64, 0x73, 0x20, 0x74, 0x6f, 0x20, 0x62, 0x65, | ||
1392 | 0x20, 0x68, 0x61, 0x73, 0x68, 0x65, 0x64, 0x20, // ("ds to be hashed ") | ||
1393 | 0x62, 0x65, 0x66, 0x6f, 0x72, 0x65, 0x20, 0x62, | ||
1394 | 0x65, 0x69, 0x6e, 0x67, 0x20, 0x75, 0x73, 0x65, // ("before being use") | ||
1395 | 0x64, 0x20, 0x62, 0x79, 0x20, 0x74, 0x68, 0x65, | ||
1396 | 0x20, 0x48, 0x4d, 0x41, 0x43, 0x20, 0x61, 0x6c, // ("d by the HMAC al") | ||
1397 | 0x67, 0x6f, 0x72, 0x69, 0x74, 0x68, 0x6d, 0x2e }, // ("gorithm.") | ||
1398 | .psize = 152, | 1424 | .psize = 152, |
1399 | .digest = { 0xe3, 0x7b, 0x6a, 0x77, 0x5d, 0xc8, 0x7d, 0xba, | 1425 | .digest = "\xe3\x7b\x6a\x77\x5d\xc8\x7d\xba" |
1400 | 0xa4, 0xdf, 0xa9, 0xf9, 0x6e, 0x5e, 0x3f, 0xfd, | 1426 | "\xa4\xdf\xa9\xf9\x6e\x5e\x3f\xfd" |
1401 | 0xde, 0xbd, 0x71, 0xf8, 0x86, 0x72, 0x89, 0x86, | 1427 | "\xde\xbd\x71\xf8\x86\x72\x89\x86" |
1402 | 0x5d, 0xf5, 0xa3, 0x2d, 0x20, 0xcd, 0xc9, 0x44, | 1428 | "\x5d\xf5\xa3\x2d\x20\xcd\xc9\x44" |
1403 | 0xb6, 0x02, 0x2c, 0xac, 0x3c, 0x49, 0x82, 0xb1, | 1429 | "\xb6\x02\x2c\xac\x3c\x49\x82\xb1" |
1404 | 0x0d, 0x5e, 0xeb, 0x55, 0xc3, 0xe4, 0xde, 0x15, | 1430 | "\x0d\x5e\xeb\x55\xc3\xe4\xde\x15" |
1405 | 0x13, 0x46, 0x76, 0xfb, 0x6d, 0xe0, 0x44, 0x60, | 1431 | "\x13\x46\x76\xfb\x6d\xe0\x44\x60" |
1406 | 0x65, 0xc9, 0x74, 0x40, 0xfa, 0x8c, 0x6a, 0x58 }, | 1432 | "\x65\xc9\x74\x40\xfa\x8c\x6a\x58", |
1407 | }, | 1433 | }, |
1408 | }; | 1434 | }; |
1409 | 1435 | ||
@@ -1419,102 +1445,102 @@ static struct hash_testvec hmac_sha512_tv_template[] = { | |||
1419 | 1445 | ||
1420 | static struct cipher_testvec des_enc_tv_template[] = { | 1446 | static struct cipher_testvec des_enc_tv_template[] = { |
1421 | { /* From Applied Cryptography */ | 1447 | { /* From Applied Cryptography */ |
1422 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1448 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1423 | .klen = 8, | 1449 | .klen = 8, |
1424 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7 }, | 1450 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xe7", |
1425 | .ilen = 8, | 1451 | .ilen = 8, |
1426 | .result = { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d }, | 1452 | .result = "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d", |
1427 | .rlen = 8, | 1453 | .rlen = 8, |
1428 | }, { /* Same key, different plaintext block */ | 1454 | }, { /* Same key, different plaintext block */ |
1429 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1455 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1430 | .klen = 8, | 1456 | .klen = 8, |
1431 | .input = { 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99 }, | 1457 | .input = "\x22\x33\x44\x55\x66\x77\x88\x99", |
1432 | .ilen = 8, | 1458 | .ilen = 8, |
1433 | .result = { 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b }, | 1459 | .result = "\xf7\x9c\x89\x2a\x33\x8f\x4a\x8b", |
1434 | .rlen = 8, | 1460 | .rlen = 8, |
1435 | }, { /* Sbox test from NBS */ | 1461 | }, { /* Sbox test from NBS */ |
1436 | .key = { 0x7c, 0xa1, 0x10, 0x45, 0x4a, 0x1a, 0x6e, 0x57 }, | 1462 | .key = "\x7c\xa1\x10\x45\x4a\x1a\x6e\x57", |
1437 | .klen = 8, | 1463 | .klen = 8, |
1438 | .input = { 0x01, 0xa1, 0xd6, 0xd0, 0x39, 0x77, 0x67, 0x42 }, | 1464 | .input = "\x01\xa1\xd6\xd0\x39\x77\x67\x42", |
1439 | .ilen = 8, | 1465 | .ilen = 8, |
1440 | .result = { 0x69, 0x0f, 0x5b, 0x0d, 0x9a, 0x26, 0x93, 0x9b }, | 1466 | .result = "\x69\x0f\x5b\x0d\x9a\x26\x93\x9b", |
1441 | .rlen = 8, | 1467 | .rlen = 8, |
1442 | }, { /* Three blocks */ | 1468 | }, { /* Three blocks */ |
1443 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1469 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1444 | .klen = 8, | 1470 | .klen = 8, |
1445 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, | 1471 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xe7" |
1446 | 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, | 1472 | "\x22\x33\x44\x55\x66\x77\x88\x99" |
1447 | 0xca, 0xfe, 0xba, 0xbe, 0xfe, 0xed, 0xbe, 0xef }, | 1473 | "\xca\xfe\xba\xbe\xfe\xed\xbe\xef", |
1448 | .ilen = 24, | 1474 | .ilen = 24, |
1449 | .result = { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, | 1475 | .result = "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d" |
1450 | 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b, | 1476 | "\xf7\x9c\x89\x2a\x33\x8f\x4a\x8b" |
1451 | 0xb4, 0x99, 0x26, 0xf7, 0x1f, 0xe1, 0xd4, 0x90 }, | 1477 | "\xb4\x99\x26\xf7\x1f\xe1\xd4\x90", |
1452 | .rlen = 24, | 1478 | .rlen = 24, |
1453 | }, { /* Weak key */ | 1479 | }, { /* Weak key */ |
1454 | .fail = 1, | 1480 | .fail = 1, |
1455 | .wk = 1, | 1481 | .wk = 1, |
1456 | .key = { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 }, | 1482 | .key = "\x01\x01\x01\x01\x01\x01\x01\x01", |
1457 | .klen = 8, | 1483 | .klen = 8, |
1458 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7 }, | 1484 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xe7", |
1459 | .ilen = 8, | 1485 | .ilen = 8, |
1460 | .result = { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d }, | 1486 | .result = "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d", |
1461 | .rlen = 8, | 1487 | .rlen = 8, |
1462 | }, { /* Two blocks -- for testing encryption across pages */ | 1488 | }, { /* Two blocks -- for testing encryption across pages */ |
1463 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1489 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1464 | .klen = 8, | 1490 | .klen = 8, |
1465 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, | 1491 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xe7" |
1466 | 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99 }, | 1492 | "\x22\x33\x44\x55\x66\x77\x88\x99", |
1467 | .ilen = 16, | 1493 | .ilen = 16, |
1468 | .result = { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, | 1494 | .result = "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d" |
1469 | 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b }, | 1495 | "\xf7\x9c\x89\x2a\x33\x8f\x4a\x8b", |
1470 | .rlen = 16, | 1496 | .rlen = 16, |
1471 | .np = 2, | 1497 | .np = 2, |
1472 | .tap = { 8, 8 } | 1498 | .tap = { 8, 8 } |
1473 | }, { /* Four blocks -- for testing encryption with chunking */ | 1499 | }, { /* Four blocks -- for testing encryption with chunking */ |
1474 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1500 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1475 | .klen = 8, | 1501 | .klen = 8, |
1476 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, | 1502 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xe7" |
1477 | 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, | 1503 | "\x22\x33\x44\x55\x66\x77\x88\x99" |
1478 | 0xca, 0xfe, 0xba, 0xbe, 0xfe, 0xed, 0xbe, 0xef, | 1504 | "\xca\xfe\xba\xbe\xfe\xed\xbe\xef" |
1479 | 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99 }, | 1505 | "\x22\x33\x44\x55\x66\x77\x88\x99", |
1480 | .ilen = 32, | 1506 | .ilen = 32, |
1481 | .result = { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, | 1507 | .result = "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d" |
1482 | 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b, | 1508 | "\xf7\x9c\x89\x2a\x33\x8f\x4a\x8b" |
1483 | 0xb4, 0x99, 0x26, 0xf7, 0x1f, 0xe1, 0xd4, 0x90, | 1509 | "\xb4\x99\x26\xf7\x1f\xe1\xd4\x90" |
1484 | 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b }, | 1510 | "\xf7\x9c\x89\x2a\x33\x8f\x4a\x8b", |
1485 | .rlen = 32, | 1511 | .rlen = 32, |
1486 | .np = 3, | 1512 | .np = 3, |
1487 | .tap = { 14, 10, 8 } | 1513 | .tap = { 14, 10, 8 } |
1488 | }, { | 1514 | }, { |
1489 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1515 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1490 | .klen = 8, | 1516 | .klen = 8, |
1491 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, | 1517 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xe7" |
1492 | 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, | 1518 | "\x22\x33\x44\x55\x66\x77\x88\x99" |
1493 | 0xca, 0xfe, 0xba, 0xbe, 0xfe, 0xed, 0xbe, 0xef }, | 1519 | "\xca\xfe\xba\xbe\xfe\xed\xbe\xef", |
1494 | .ilen = 24, | 1520 | .ilen = 24, |
1495 | .result = { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, | 1521 | .result = "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d" |
1496 | 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b, | 1522 | "\xf7\x9c\x89\x2a\x33\x8f\x4a\x8b" |
1497 | 0xb4, 0x99, 0x26, 0xf7, 0x1f, 0xe1, 0xd4, 0x90 }, | 1523 | "\xb4\x99\x26\xf7\x1f\xe1\xd4\x90", |
1498 | .rlen = 24, | 1524 | .rlen = 24, |
1499 | .np = 4, | 1525 | .np = 4, |
1500 | .tap = { 2, 1, 3, 18 } | 1526 | .tap = { 2, 1, 3, 18 } |
1501 | }, { | 1527 | }, { |
1502 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1528 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1503 | .klen = 8, | 1529 | .klen = 8, |
1504 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, | 1530 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xe7" |
1505 | 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99 }, | 1531 | "\x22\x33\x44\x55\x66\x77\x88\x99", |
1506 | .ilen = 16, | 1532 | .ilen = 16, |
1507 | .result = { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, | 1533 | .result = "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d" |
1508 | 0xf7, 0x9c, 0x89, 0x2a, 0x33, 0x8f, 0x4a, 0x8b }, | 1534 | "\xf7\x9c\x89\x2a\x33\x8f\x4a\x8b", |
1509 | .rlen = 16, | 1535 | .rlen = 16, |
1510 | .np = 5, | 1536 | .np = 5, |
1511 | .tap = { 2, 2, 2, 2, 8 } | 1537 | .tap = { 2, 2, 2, 2, 8 } |
1512 | }, { | 1538 | }, { |
1513 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1539 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1514 | .klen = 8, | 1540 | .klen = 8, |
1515 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7 }, | 1541 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xe7", |
1516 | .ilen = 8, | 1542 | .ilen = 8, |
1517 | .result = { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d }, | 1543 | .result = "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d", |
1518 | .rlen = 8, | 1544 | .rlen = 8, |
1519 | .np = 8, | 1545 | .np = 8, |
1520 | .tap = { 1, 1, 1, 1, 1, 1, 1, 1 } | 1546 | .tap = { 1, 1, 1, 1, 1, 1, 1, 1 } |
@@ -1523,38 +1549,38 @@ static struct cipher_testvec des_enc_tv_template[] = { | |||
1523 | 1549 | ||
1524 | static struct cipher_testvec des_dec_tv_template[] = { | 1550 | static struct cipher_testvec des_dec_tv_template[] = { |
1525 | { /* From Applied Cryptography */ | 1551 | { /* From Applied Cryptography */ |
1526 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1552 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1527 | .klen = 8, | 1553 | .klen = 8, |
1528 | .input = { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d }, | 1554 | .input = "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d", |
1529 | .ilen = 8, | 1555 | .ilen = 8, |
1530 | .result = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7 }, | 1556 | .result = "\x01\x23\x45\x67\x89\xab\xcd\xe7", |
1531 | .rlen = 8, | 1557 | .rlen = 8, |
1532 | }, { /* Sbox test from NBS */ | 1558 | }, { /* Sbox test from NBS */ |
1533 | .key = { 0x7c, 0xa1, 0x10, 0x45, 0x4a, 0x1a, 0x6e, 0x57 }, | 1559 | .key = "\x7c\xa1\x10\x45\x4a\x1a\x6e\x57", |
1534 | .klen = 8, | 1560 | .klen = 8, |
1535 | .input = { 0x69, 0x0f, 0x5b, 0x0d, 0x9a, 0x26, 0x93, 0x9b }, | 1561 | .input = "\x69\x0f\x5b\x0d\x9a\x26\x93\x9b", |
1536 | .ilen = 8, | 1562 | .ilen = 8, |
1537 | .result = { 0x01, 0xa1, 0xd6, 0xd0, 0x39, 0x77, 0x67, 0x42 }, | 1563 | .result = "\x01\xa1\xd6\xd0\x39\x77\x67\x42", |
1538 | .rlen = 8, | 1564 | .rlen = 8, |
1539 | }, { /* Two blocks, for chunking test */ | 1565 | }, { /* Two blocks, for chunking test */ |
1540 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1566 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1541 | .klen = 8, | 1567 | .klen = 8, |
1542 | .input = { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, | 1568 | .input = "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d" |
1543 | 0x69, 0x0f, 0x5b, 0x0d, 0x9a, 0x26, 0x93, 0x9b }, | 1569 | "\x69\x0f\x5b\x0d\x9a\x26\x93\x9b", |
1544 | .ilen = 16, | 1570 | .ilen = 16, |
1545 | .result = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, | 1571 | .result = "\x01\x23\x45\x67\x89\xab\xcd\xe7" |
1546 | 0xa3, 0x99, 0x7b, 0xca, 0xaf, 0x69, 0xa0, 0xf5 }, | 1572 | "\xa3\x99\x7b\xca\xaf\x69\xa0\xf5", |
1547 | .rlen = 16, | 1573 | .rlen = 16, |
1548 | .np = 2, | 1574 | .np = 2, |
1549 | .tap = { 8, 8 } | 1575 | .tap = { 8, 8 } |
1550 | }, { | 1576 | }, { |
1551 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1577 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1552 | .klen = 8, | 1578 | .klen = 8, |
1553 | .input = { 0xc9, 0x57, 0x44, 0x25, 0x6a, 0x5e, 0xd3, 0x1d, | 1579 | .input = "\xc9\x57\x44\x25\x6a\x5e\xd3\x1d" |
1554 | 0x69, 0x0f, 0x5b, 0x0d, 0x9a, 0x26, 0x93, 0x9b }, | 1580 | "\x69\x0f\x5b\x0d\x9a\x26\x93\x9b", |
1555 | .ilen = 16, | 1581 | .ilen = 16, |
1556 | .result = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xe7, | 1582 | .result = "\x01\x23\x45\x67\x89\xab\xcd\xe7" |
1557 | 0xa3, 0x99, 0x7b, 0xca, 0xaf, 0x69, 0xa0, 0xf5 }, | 1583 | "\xa3\x99\x7b\xca\xaf\x69\xa0\xf5", |
1558 | .rlen = 16, | 1584 | .rlen = 16, |
1559 | .np = 3, | 1585 | .np = 3, |
1560 | .tap = { 3, 12, 1 } | 1586 | .tap = { 3, 12, 1 } |
@@ -1563,53 +1589,53 @@ static struct cipher_testvec des_dec_tv_template[] = { | |||
1563 | 1589 | ||
1564 | static struct cipher_testvec des_cbc_enc_tv_template[] = { | 1590 | static struct cipher_testvec des_cbc_enc_tv_template[] = { |
1565 | { /* From OpenSSL */ | 1591 | { /* From OpenSSL */ |
1566 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef}, | 1592 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1567 | .klen = 8, | 1593 | .klen = 8, |
1568 | .iv = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10}, | 1594 | .iv = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
1569 | .input = { 0x37, 0x36, 0x35, 0x34, 0x33, 0x32, 0x31, 0x20, | 1595 | .input = "\x37\x36\x35\x34\x33\x32\x31\x20" |
1570 | 0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74, | 1596 | "\x4e\x6f\x77\x20\x69\x73\x20\x74" |
1571 | 0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20 }, | 1597 | "\x68\x65\x20\x74\x69\x6d\x65\x20", |
1572 | .ilen = 24, | 1598 | .ilen = 24, |
1573 | .result = { 0xcc, 0xd1, 0x73, 0xff, 0xab, 0x20, 0x39, 0xf4, | 1599 | .result = "\xcc\xd1\x73\xff\xab\x20\x39\xf4" |
1574 | 0xac, 0xd8, 0xae, 0xfd, 0xdf, 0xd8, 0xa1, 0xeb, | 1600 | "\xac\xd8\xae\xfd\xdf\xd8\xa1\xeb" |
1575 | 0x46, 0x8e, 0x91, 0x15, 0x78, 0x88, 0xba, 0x68 }, | 1601 | "\x46\x8e\x91\x15\x78\x88\xba\x68", |
1576 | .rlen = 24, | 1602 | .rlen = 24, |
1577 | }, { /* FIPS Pub 81 */ | 1603 | }, { /* FIPS Pub 81 */ |
1578 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1604 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1579 | .klen = 8, | 1605 | .klen = 8, |
1580 | .iv = { 0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef }, | 1606 | .iv = "\x12\x34\x56\x78\x90\xab\xcd\xef", |
1581 | .input = { 0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74 }, | 1607 | .input = "\x4e\x6f\x77\x20\x69\x73\x20\x74", |
1582 | .ilen = 8, | 1608 | .ilen = 8, |
1583 | .result = { 0xe5, 0xc7, 0xcd, 0xde, 0x87, 0x2b, 0xf2, 0x7c }, | 1609 | .result = "\xe5\xc7\xcd\xde\x87\x2b\xf2\x7c", |
1584 | .rlen = 8, | 1610 | .rlen = 8, |
1585 | }, { | 1611 | }, { |
1586 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1612 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1587 | .klen = 8, | 1613 | .klen = 8, |
1588 | .iv = { 0xe5, 0xc7, 0xcd, 0xde, 0x87, 0x2b, 0xf2, 0x7c }, | 1614 | .iv = "\xe5\xc7\xcd\xde\x87\x2b\xf2\x7c", |
1589 | .input = { 0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20 }, | 1615 | .input = "\x68\x65\x20\x74\x69\x6d\x65\x20", |
1590 | .ilen = 8, | 1616 | .ilen = 8, |
1591 | .result = { 0x43, 0xe9, 0x34, 0x00, 0x8c, 0x38, 0x9c, 0x0f }, | 1617 | .result = "\x43\xe9\x34\x00\x8c\x38\x9c\x0f", |
1592 | .rlen = 8, | 1618 | .rlen = 8, |
1593 | }, { | 1619 | }, { |
1594 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1620 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1595 | .klen = 8, | 1621 | .klen = 8, |
1596 | .iv = { 0x43, 0xe9, 0x34, 0x00, 0x8c, 0x38, 0x9c, 0x0f }, | 1622 | .iv = "\x43\xe9\x34\x00\x8c\x38\x9c\x0f", |
1597 | .input = { 0x66, 0x6f, 0x72, 0x20, 0x61, 0x6c, 0x6c, 0x20 }, | 1623 | .input = "\x66\x6f\x72\x20\x61\x6c\x6c\x20", |
1598 | .ilen = 8, | 1624 | .ilen = 8, |
1599 | .result = { 0x68, 0x37, 0x88, 0x49, 0x9a, 0x7c, 0x05, 0xf6 }, | 1625 | .result = "\x68\x37\x88\x49\x9a\x7c\x05\xf6", |
1600 | .rlen = 8, | 1626 | .rlen = 8, |
1601 | }, { /* Copy of openssl vector for chunk testing */ | 1627 | }, { /* Copy of openssl vector for chunk testing */ |
1602 | /* From OpenSSL */ | 1628 | /* From OpenSSL */ |
1603 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef}, | 1629 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1604 | .klen = 8, | 1630 | .klen = 8, |
1605 | .iv = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10}, | 1631 | .iv = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
1606 | .input = { 0x37, 0x36, 0x35, 0x34, 0x33, 0x32, 0x31, 0x20, | 1632 | .input = "\x37\x36\x35\x34\x33\x32\x31\x20" |
1607 | 0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74, | 1633 | "\x4e\x6f\x77\x20\x69\x73\x20\x74" |
1608 | 0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20 }, | 1634 | "\x68\x65\x20\x74\x69\x6d\x65\x20", |
1609 | .ilen = 24, | 1635 | .ilen = 24, |
1610 | .result = { 0xcc, 0xd1, 0x73, 0xff, 0xab, 0x20, 0x39, 0xf4, | 1636 | .result = "\xcc\xd1\x73\xff\xab\x20\x39\xf4" |
1611 | 0xac, 0xd8, 0xae, 0xfd, 0xdf, 0xd8, 0xa1, 0xeb, | 1637 | "\xac\xd8\xae\xfd\xdf\xd8\xa1\xeb" |
1612 | 0x46, 0x8e, 0x91, 0x15, 0x78, 0x88, 0xba, 0x68 }, | 1638 | "\x46\x8e\x91\x15\x78\x88\xba\x68", |
1613 | .rlen = 24, | 1639 | .rlen = 24, |
1614 | .np = 2, | 1640 | .np = 2, |
1615 | .tap = { 13, 11 } | 1641 | .tap = { 13, 11 } |
@@ -1618,36 +1644,36 @@ static struct cipher_testvec des_cbc_enc_tv_template[] = { | |||
1618 | 1644 | ||
1619 | static struct cipher_testvec des_cbc_dec_tv_template[] = { | 1645 | static struct cipher_testvec des_cbc_dec_tv_template[] = { |
1620 | { /* FIPS Pub 81 */ | 1646 | { /* FIPS Pub 81 */ |
1621 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1647 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1622 | .klen = 8, | 1648 | .klen = 8, |
1623 | .iv = { 0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef }, | 1649 | .iv = "\x12\x34\x56\x78\x90\xab\xcd\xef", |
1624 | .input = { 0xe5, 0xc7, 0xcd, 0xde, 0x87, 0x2b, 0xf2, 0x7c }, | 1650 | .input = "\xe5\xc7\xcd\xde\x87\x2b\xf2\x7c", |
1625 | .ilen = 8, | 1651 | .ilen = 8, |
1626 | .result = { 0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74 }, | 1652 | .result = "\x4e\x6f\x77\x20\x69\x73\x20\x74", |
1627 | .rlen = 8, | 1653 | .rlen = 8, |
1628 | }, { | 1654 | }, { |
1629 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1655 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1630 | .klen = 8, | 1656 | .klen = 8, |
1631 | .iv = { 0xe5, 0xc7, 0xcd, 0xde, 0x87, 0x2b, 0xf2, 0x7c }, | 1657 | .iv = "\xe5\xc7\xcd\xde\x87\x2b\xf2\x7c", |
1632 | .input = { 0x43, 0xe9, 0x34, 0x00, 0x8c, 0x38, 0x9c, 0x0f }, | 1658 | .input = "\x43\xe9\x34\x00\x8c\x38\x9c\x0f", |
1633 | .ilen = 8, | 1659 | .ilen = 8, |
1634 | .result = { 0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20 }, | 1660 | .result = "\x68\x65\x20\x74\x69\x6d\x65\x20", |
1635 | .rlen = 8, | 1661 | .rlen = 8, |
1636 | }, { | 1662 | }, { |
1637 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1663 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1638 | .klen = 8, | 1664 | .klen = 8, |
1639 | .iv = { 0x43, 0xe9, 0x34, 0x00, 0x8c, 0x38, 0x9c, 0x0f }, | 1665 | .iv = "\x43\xe9\x34\x00\x8c\x38\x9c\x0f", |
1640 | .input = { 0x68, 0x37, 0x88, 0x49, 0x9a, 0x7c, 0x05, 0xf6 }, | 1666 | .input = "\x68\x37\x88\x49\x9a\x7c\x05\xf6", |
1641 | .ilen = 8, | 1667 | .ilen = 8, |
1642 | .result = { 0x66, 0x6f, 0x72, 0x20, 0x61, 0x6c, 0x6c, 0x20 }, | 1668 | .result = "\x66\x6f\x72\x20\x61\x6c\x6c\x20", |
1643 | .rlen = 8, | 1669 | .rlen = 8, |
1644 | }, { /* Copy of above, for chunk testing */ | 1670 | }, { /* Copy of above, for chunk testing */ |
1645 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1671 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1646 | .klen = 8, | 1672 | .klen = 8, |
1647 | .iv = { 0x43, 0xe9, 0x34, 0x00, 0x8c, 0x38, 0x9c, 0x0f }, | 1673 | .iv = "\x43\xe9\x34\x00\x8c\x38\x9c\x0f", |
1648 | .input = { 0x68, 0x37, 0x88, 0x49, 0x9a, 0x7c, 0x05, 0xf6 }, | 1674 | .input = "\x68\x37\x88\x49\x9a\x7c\x05\xf6", |
1649 | .ilen = 8, | 1675 | .ilen = 8, |
1650 | .result = { 0x66, 0x6f, 0x72, 0x20, 0x61, 0x6c, 0x6c, 0x20 }, | 1676 | .result = "\x66\x6f\x72\x20\x61\x6c\x6c\x20", |
1651 | .rlen = 8, | 1677 | .rlen = 8, |
1652 | .np = 2, | 1678 | .np = 2, |
1653 | .tap = { 4, 4 } | 1679 | .tap = { 4, 4 } |
@@ -1659,62 +1685,62 @@ static struct cipher_testvec des_cbc_dec_tv_template[] = { | |||
1659 | */ | 1685 | */ |
1660 | static struct cipher_testvec des3_ede_enc_tv_template[] = { | 1686 | static struct cipher_testvec des3_ede_enc_tv_template[] = { |
1661 | { /* These are from openssl */ | 1687 | { /* These are from openssl */ |
1662 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 1688 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
1663 | 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, | 1689 | "\x55\x55\x55\x55\x55\x55\x55\x55" |
1664 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10}, | 1690 | "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
1665 | .klen = 24, | 1691 | .klen = 24, |
1666 | .input = { 0x73, 0x6f, 0x6d, 0x65, 0x64, 0x61, 0x74, 0x61 }, | 1692 | .input = "\x73\x6f\x6d\x65\x64\x61\x74\x61", |
1667 | .ilen = 8, | 1693 | .ilen = 8, |
1668 | .result = { 0x18, 0xd7, 0x48, 0xe5, 0x63, 0x62, 0x05, 0x72 }, | 1694 | .result = "\x18\xd7\x48\xe5\x63\x62\x05\x72", |
1669 | .rlen = 8, | 1695 | .rlen = 8, |
1670 | }, { | 1696 | }, { |
1671 | .key = { 0x03, 0x52, 0x02, 0x07, 0x67, 0x20, 0x82, 0x17, | 1697 | .key = "\x03\x52\x02\x07\x67\x20\x82\x17" |
1672 | 0x86, 0x02, 0x87, 0x66, 0x59, 0x08, 0x21, 0x98, | 1698 | "\x86\x02\x87\x66\x59\x08\x21\x98" |
1673 | 0x64, 0x05, 0x6a, 0xbd, 0xfe, 0xa9, 0x34, 0x57 }, | 1699 | "\x64\x05\x6a\xbd\xfe\xa9\x34\x57", |
1674 | .klen = 24, | 1700 | .klen = 24, |
1675 | .input = { 0x73, 0x71, 0x75, 0x69, 0x67, 0x67, 0x6c, 0x65 }, | 1701 | .input = "\x73\x71\x75\x69\x67\x67\x6c\x65", |
1676 | .ilen = 8, | 1702 | .ilen = 8, |
1677 | .result = { 0xc0, 0x7d, 0x2a, 0x0f, 0xa5, 0x66, 0xfa, 0x30 }, | 1703 | .result = "\xc0\x7d\x2a\x0f\xa5\x66\xfa\x30", |
1678 | .rlen = 8, | 1704 | .rlen = 8, |
1679 | }, { | 1705 | }, { |
1680 | .key = { 0x10, 0x46, 0x10, 0x34, 0x89, 0x98, 0x80, 0x20, | 1706 | .key = "\x10\x46\x10\x34\x89\x98\x80\x20" |
1681 | 0x91, 0x07, 0xd0, 0x15, 0x89, 0x19, 0x01, 0x01, | 1707 | "\x91\x07\xd0\x15\x89\x19\x01\x01" |
1682 | 0x19, 0x07, 0x92, 0x10, 0x98, 0x1a, 0x01, 0x01 }, | 1708 | "\x19\x07\x92\x10\x98\x1a\x01\x01", |
1683 | .klen = 24, | 1709 | .klen = 24, |
1684 | .input = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 1710 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00", |
1685 | .ilen = 8, | 1711 | .ilen = 8, |
1686 | .result = { 0xe1, 0xef, 0x62, 0xc3, 0x32, 0xfe, 0x82, 0x5b }, | 1712 | .result = "\xe1\xef\x62\xc3\x32\xfe\x82\x5b", |
1687 | .rlen = 8, | 1713 | .rlen = 8, |
1688 | }, | 1714 | }, |
1689 | }; | 1715 | }; |
1690 | 1716 | ||
1691 | static struct cipher_testvec des3_ede_dec_tv_template[] = { | 1717 | static struct cipher_testvec des3_ede_dec_tv_template[] = { |
1692 | { /* These are from openssl */ | 1718 | { /* These are from openssl */ |
1693 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 1719 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
1694 | 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, 0x55, | 1720 | "\x55\x55\x55\x55\x55\x55\x55\x55" |
1695 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10}, | 1721 | "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
1696 | .klen = 24, | 1722 | .klen = 24, |
1697 | .input = { 0x18, 0xd7, 0x48, 0xe5, 0x63, 0x62, 0x05, 0x72 }, | 1723 | .input = "\x18\xd7\x48\xe5\x63\x62\x05\x72", |
1698 | .ilen = 8, | 1724 | .ilen = 8, |
1699 | .result = { 0x73, 0x6f, 0x6d, 0x65, 0x64, 0x61, 0x74, 0x61 }, | 1725 | .result = "\x73\x6f\x6d\x65\x64\x61\x74\x61", |
1700 | .rlen = 8, | 1726 | .rlen = 8, |
1701 | }, { | 1727 | }, { |
1702 | .key = { 0x03, 0x52, 0x02, 0x07, 0x67, 0x20, 0x82, 0x17, | 1728 | .key = "\x03\x52\x02\x07\x67\x20\x82\x17" |
1703 | 0x86, 0x02, 0x87, 0x66, 0x59, 0x08, 0x21, 0x98, | 1729 | "\x86\x02\x87\x66\x59\x08\x21\x98" |
1704 | 0x64, 0x05, 0x6a, 0xbd, 0xfe, 0xa9, 0x34, 0x57 }, | 1730 | "\x64\x05\x6a\xbd\xfe\xa9\x34\x57", |
1705 | .klen = 24, | 1731 | .klen = 24, |
1706 | .input = { 0xc0, 0x7d, 0x2a, 0x0f, 0xa5, 0x66, 0xfa, 0x30 }, | 1732 | .input = "\xc0\x7d\x2a\x0f\xa5\x66\xfa\x30", |
1707 | .ilen = 8, | 1733 | .ilen = 8, |
1708 | .result = { 0x73, 0x71, 0x75, 0x69, 0x67, 0x67, 0x6c, 0x65 }, | 1734 | .result = "\x73\x71\x75\x69\x67\x67\x6c\x65", |
1709 | .rlen = 8, | 1735 | .rlen = 8, |
1710 | }, { | 1736 | }, { |
1711 | .key = { 0x10, 0x46, 0x10, 0x34, 0x89, 0x98, 0x80, 0x20, | 1737 | .key = "\x10\x46\x10\x34\x89\x98\x80\x20" |
1712 | 0x91, 0x07, 0xd0, 0x15, 0x89, 0x19, 0x01, 0x01, | 1738 | "\x91\x07\xd0\x15\x89\x19\x01\x01" |
1713 | 0x19, 0x07, 0x92, 0x10, 0x98, 0x1a, 0x01, 0x01 }, | 1739 | "\x19\x07\x92\x10\x98\x1a\x01\x01", |
1714 | .klen = 24, | 1740 | .klen = 24, |
1715 | .input = { 0xe1, 0xef, 0x62, 0xc3, 0x32, 0xfe, 0x82, 0x5b }, | 1741 | .input = "\xe1\xef\x62\xc3\x32\xfe\x82\x5b", |
1716 | .ilen = 8, | 1742 | .ilen = 8, |
1717 | .result = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 1743 | .result = "\x00\x00\x00\x00\x00\x00\x00\x00", |
1718 | .rlen = 8, | 1744 | .rlen = 8, |
1719 | }, | 1745 | }, |
1720 | }; | 1746 | }; |
@@ -1729,148 +1755,148 @@ static struct cipher_testvec des3_ede_dec_tv_template[] = { | |||
1729 | 1755 | ||
1730 | static struct cipher_testvec bf_enc_tv_template[] = { | 1756 | static struct cipher_testvec bf_enc_tv_template[] = { |
1731 | { /* DES test vectors from OpenSSL */ | 1757 | { /* DES test vectors from OpenSSL */ |
1732 | .key = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, }, | 1758 | .key = "\x00\x00\x00\x00\x00\x00\x00\x00", |
1733 | .klen = 8, | 1759 | .klen = 8, |
1734 | .input = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 1760 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00", |
1735 | .ilen = 8, | 1761 | .ilen = 8, |
1736 | .result = { 0x4e, 0xf9, 0x97, 0x45, 0x61, 0x98, 0xdd, 0x78 }, | 1762 | .result = "\x4e\xf9\x97\x45\x61\x98\xdd\x78", |
1737 | .rlen = 8, | 1763 | .rlen = 8, |
1738 | }, { | 1764 | }, { |
1739 | .key = { 0x1f, 0x1f, 0x1f, 0x1f, 0x0e, 0x0e, 0x0e, 0x0e }, | 1765 | .key = "\x1f\x1f\x1f\x1f\x0e\x0e\x0e\x0e", |
1740 | .klen = 8, | 1766 | .klen = 8, |
1741 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1767 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1742 | .ilen = 8, | 1768 | .ilen = 8, |
1743 | .result = { 0xa7, 0x90, 0x79, 0x51, 0x08, 0xea, 0x3c, 0xae }, | 1769 | .result = "\xa7\x90\x79\x51\x08\xea\x3c\xae", |
1744 | .rlen = 8, | 1770 | .rlen = 8, |
1745 | }, { | 1771 | }, { |
1746 | .key = { 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87 }, | 1772 | .key = "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87", |
1747 | .klen = 8, | 1773 | .klen = 8, |
1748 | .input = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 1774 | .input = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
1749 | .ilen = 8, | 1775 | .ilen = 8, |
1750 | .result = { 0xe8, 0x7a, 0x24, 0x4e, 0x2c, 0xc8, 0x5e, 0x82 }, | 1776 | .result = "\xe8\x7a\x24\x4e\x2c\xc8\x5e\x82", |
1751 | .rlen = 8, | 1777 | .rlen = 8, |
1752 | }, { /* Vary the keylength... */ | 1778 | }, { /* Vary the keylength... */ |
1753 | .key = { 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87, | 1779 | .key = "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87" |
1754 | 0x78, 0x69, 0x5a, 0x4b, 0x3c, 0x2d, 0x1e, 0x0f }, | 1780 | "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f", |
1755 | .klen = 16, | 1781 | .klen = 16, |
1756 | .input = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 1782 | .input = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
1757 | .ilen = 8, | 1783 | .ilen = 8, |
1758 | .result = { 0x93, 0x14, 0x28, 0x87, 0xee, 0x3b, 0xe1, 0x5c }, | 1784 | .result = "\x93\x14\x28\x87\xee\x3b\xe1\x5c", |
1759 | .rlen = 8, | 1785 | .rlen = 8, |
1760 | }, { | 1786 | }, { |
1761 | .key = { 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87, | 1787 | .key = "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87" |
1762 | 0x78, 0x69, 0x5a, 0x4b, 0x3c, 0x2d, 0x1e, 0x0f, | 1788 | "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f" |
1763 | 0x00, 0x11, 0x22, 0x33, 0x44 }, | 1789 | "\x00\x11\x22\x33\x44", |
1764 | .klen = 21, | 1790 | .klen = 21, |
1765 | .input = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 1791 | .input = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
1766 | .ilen = 8, | 1792 | .ilen = 8, |
1767 | .result = { 0xe6, 0xf5, 0x1e, 0xd7, 0x9b, 0x9d, 0xb2, 0x1f }, | 1793 | .result = "\xe6\xf5\x1e\xd7\x9b\x9d\xb2\x1f", |
1768 | .rlen = 8, | 1794 | .rlen = 8, |
1769 | }, { /* Generated with bf488 */ | 1795 | }, { /* Generated with bf488 */ |
1770 | .key = { 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87, | 1796 | .key = "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87" |
1771 | 0x78, 0x69, 0x5a, 0x4b, 0x3c, 0x2d, 0x1e, 0x0f, | 1797 | "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f" |
1772 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 1798 | "\x00\x11\x22\x33\x44\x55\x66\x77" |
1773 | 0x04, 0x68, 0x91, 0x04, 0xc2, 0xfd, 0x3b, 0x2f, | 1799 | "\x04\x68\x91\x04\xc2\xfd\x3b\x2f" |
1774 | 0x58, 0x40, 0x23, 0x64, 0x1a, 0xba, 0x61, 0x76, | 1800 | "\x58\x40\x23\x64\x1a\xba\x61\x76" |
1775 | 0x1f, 0x1f, 0x1f, 0x1f, 0x0e, 0x0e, 0x0e, 0x0e, | 1801 | "\x1f\x1f\x1f\x1f\x0e\x0e\x0e\x0e" |
1776 | 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }, | 1802 | "\xff\xff\xff\xff\xff\xff\xff\xff", |
1777 | .klen = 56, | 1803 | .klen = 56, |
1778 | .input = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 1804 | .input = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
1779 | .ilen = 8, | 1805 | .ilen = 8, |
1780 | .result = { 0xc0, 0x45, 0x04, 0x01, 0x2e, 0x4e, 0x1f, 0x53 }, | 1806 | .result = "\xc0\x45\x04\x01\x2e\x4e\x1f\x53", |
1781 | .rlen = 8, | 1807 | .rlen = 8, |
1782 | }, | 1808 | }, |
1783 | }; | 1809 | }; |
1784 | 1810 | ||
1785 | static struct cipher_testvec bf_dec_tv_template[] = { | 1811 | static struct cipher_testvec bf_dec_tv_template[] = { |
1786 | { /* DES test vectors from OpenSSL */ | 1812 | { /* DES test vectors from OpenSSL */ |
1787 | .key = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 1813 | .key = "\x00\x00\x00\x00\x00\x00\x00\x00", |
1788 | .klen = 8, | 1814 | .klen = 8, |
1789 | .input = { 0x4e, 0xf9, 0x97, 0x45, 0x61, 0x98, 0xdd, 0x78 }, | 1815 | .input = "\x4e\xf9\x97\x45\x61\x98\xdd\x78", |
1790 | .ilen = 8, | 1816 | .ilen = 8, |
1791 | .result = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 1817 | .result = "\x00\x00\x00\x00\x00\x00\x00\x00", |
1792 | .rlen = 8, | 1818 | .rlen = 8, |
1793 | }, { | 1819 | }, { |
1794 | .key = { 0x1f, 0x1f, 0x1f, 0x1f, 0x0e, 0x0e, 0x0e, 0x0e }, | 1820 | .key = "\x1f\x1f\x1f\x1f\x0e\x0e\x0e\x0e", |
1795 | .klen = 8, | 1821 | .klen = 8, |
1796 | .input = { 0xa7, 0x90, 0x79, 0x51, 0x08, 0xea, 0x3c, 0xae }, | 1822 | .input = "\xa7\x90\x79\x51\x08\xea\x3c\xae", |
1797 | .ilen = 8, | 1823 | .ilen = 8, |
1798 | .result = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 1824 | .result = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
1799 | .rlen = 8, | 1825 | .rlen = 8, |
1800 | }, { | 1826 | }, { |
1801 | .key = { 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87 }, | 1827 | .key = "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87", |
1802 | .klen = 8, | 1828 | .klen = 8, |
1803 | .input = { 0xe8, 0x7a, 0x24, 0x4e, 0x2c, 0xc8, 0x5e, 0x82 }, | 1829 | .input = "\xe8\x7a\x24\x4e\x2c\xc8\x5e\x82", |
1804 | .ilen = 8, | 1830 | .ilen = 8, |
1805 | .result = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 1831 | .result = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
1806 | .rlen = 8, | 1832 | .rlen = 8, |
1807 | }, { /* Vary the keylength... */ | 1833 | }, { /* Vary the keylength... */ |
1808 | .key = { 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87, | 1834 | .key = "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87" |
1809 | 0x78, 0x69, 0x5a, 0x4b, 0x3c, 0x2d, 0x1e, 0x0f }, | 1835 | "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f", |
1810 | .klen = 16, | 1836 | .klen = 16, |
1811 | .input = { 0x93, 0x14, 0x28, 0x87, 0xee, 0x3b, 0xe1, 0x5c }, | 1837 | .input = "\x93\x14\x28\x87\xee\x3b\xe1\x5c", |
1812 | .ilen = 8, | 1838 | .ilen = 8, |
1813 | .result = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 1839 | .result = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
1814 | .rlen = 8, | 1840 | .rlen = 8, |
1815 | }, { | 1841 | }, { |
1816 | .key = { 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87, | 1842 | .key = "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87" |
1817 | 0x78, 0x69, 0x5a, 0x4b, 0x3c, 0x2d, 0x1e, 0x0f, | 1843 | "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f" |
1818 | 0x00, 0x11, 0x22, 0x33, 0x44 }, | 1844 | "\x00\x11\x22\x33\x44", |
1819 | .klen = 21, | 1845 | .klen = 21, |
1820 | .input = { 0xe6, 0xf5, 0x1e, 0xd7, 0x9b, 0x9d, 0xb2, 0x1f }, | 1846 | .input = "\xe6\xf5\x1e\xd7\x9b\x9d\xb2\x1f", |
1821 | .ilen = 8, | 1847 | .ilen = 8, |
1822 | .result = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 1848 | .result = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
1823 | .rlen = 8, | 1849 | .rlen = 8, |
1824 | }, { /* Generated with bf488, using OpenSSL, Libgcrypt and Nettle */ | 1850 | }, { /* Generated with bf488, using OpenSSL, Libgcrypt and Nettle */ |
1825 | .key = { 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87, | 1851 | .key = "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87" |
1826 | 0x78, 0x69, 0x5a, 0x4b, 0x3c, 0x2d, 0x1e, 0x0f, | 1852 | "\x78\x69\x5a\x4b\x3c\x2d\x1e\x0f" |
1827 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 1853 | "\x00\x11\x22\x33\x44\x55\x66\x77" |
1828 | 0x04, 0x68, 0x91, 0x04, 0xc2, 0xfd, 0x3b, 0x2f, | 1854 | "\x04\x68\x91\x04\xc2\xfd\x3b\x2f" |
1829 | 0x58, 0x40, 0x23, 0x64, 0x1a, 0xba, 0x61, 0x76, | 1855 | "\x58\x40\x23\x64\x1a\xba\x61\x76" |
1830 | 0x1f, 0x1f, 0x1f, 0x1f, 0x0e, 0x0e, 0x0e, 0x0e, | 1856 | "\x1f\x1f\x1f\x1f\x0e\x0e\x0e\x0e" |
1831 | 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }, | 1857 | "\xff\xff\xff\xff\xff\xff\xff\xff", |
1832 | .klen = 56, | 1858 | .klen = 56, |
1833 | .input = { 0xc0, 0x45, 0x04, 0x01, 0x2e, 0x4e, 0x1f, 0x53 }, | 1859 | .input = "\xc0\x45\x04\x01\x2e\x4e\x1f\x53", |
1834 | .ilen = 8, | 1860 | .ilen = 8, |
1835 | .result = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 1861 | .result = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
1836 | .rlen = 8, | 1862 | .rlen = 8, |
1837 | }, | 1863 | }, |
1838 | }; | 1864 | }; |
1839 | 1865 | ||
1840 | static struct cipher_testvec bf_cbc_enc_tv_template[] = { | 1866 | static struct cipher_testvec bf_cbc_enc_tv_template[] = { |
1841 | { /* From OpenSSL */ | 1867 | { /* From OpenSSL */ |
1842 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 1868 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
1843 | 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87 }, | 1869 | "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87", |
1844 | .klen = 16, | 1870 | .klen = 16, |
1845 | .iv = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 1871 | .iv = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
1846 | .input = { 0x37, 0x36, 0x35, 0x34, 0x33, 0x32, 0x31, 0x20, | 1872 | .input = "\x37\x36\x35\x34\x33\x32\x31\x20" |
1847 | 0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74, | 1873 | "\x4e\x6f\x77\x20\x69\x73\x20\x74" |
1848 | 0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20, | 1874 | "\x68\x65\x20\x74\x69\x6d\x65\x20" |
1849 | 0x66, 0x6f, 0x72, 0x20, 0x00, 0x00, 0x00, 0x00 }, | 1875 | "\x66\x6f\x72\x20\x00\x00\x00\x00", |
1850 | .ilen = 32, | 1876 | .ilen = 32, |
1851 | .result = { 0x6b, 0x77, 0xb4, 0xd6, 0x30, 0x06, 0xde, 0xe6, | 1877 | .result = "\x6b\x77\xb4\xd6\x30\x06\xde\xe6" |
1852 | 0x05, 0xb1, 0x56, 0xe2, 0x74, 0x03, 0x97, 0x93, | 1878 | "\x05\xb1\x56\xe2\x74\x03\x97\x93" |
1853 | 0x58, 0xde, 0xb9, 0xe7, 0x15, 0x46, 0x16, 0xd9, | 1879 | "\x58\xde\xb9\xe7\x15\x46\x16\xd9" |
1854 | 0x59, 0xf1, 0x65, 0x2b, 0xd5, 0xff, 0x92, 0xcc }, | 1880 | "\x59\xf1\x65\x2b\xd5\xff\x92\xcc", |
1855 | .rlen = 32, | 1881 | .rlen = 32, |
1856 | }, | 1882 | }, |
1857 | }; | 1883 | }; |
1858 | 1884 | ||
1859 | static struct cipher_testvec bf_cbc_dec_tv_template[] = { | 1885 | static struct cipher_testvec bf_cbc_dec_tv_template[] = { |
1860 | { /* From OpenSSL */ | 1886 | { /* From OpenSSL */ |
1861 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 1887 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
1862 | 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87 }, | 1888 | "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87", |
1863 | .klen = 16, | 1889 | .klen = 16, |
1864 | .iv = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 1890 | .iv = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
1865 | .input = { 0x6b, 0x77, 0xb4, 0xd6, 0x30, 0x06, 0xde, 0xe6, | 1891 | .input = "\x6b\x77\xb4\xd6\x30\x06\xde\xe6" |
1866 | 0x05, 0xb1, 0x56, 0xe2, 0x74, 0x03, 0x97, 0x93, | 1892 | "\x05\xb1\x56\xe2\x74\x03\x97\x93" |
1867 | 0x58, 0xde, 0xb9, 0xe7, 0x15, 0x46, 0x16, 0xd9, | 1893 | "\x58\xde\xb9\xe7\x15\x46\x16\xd9" |
1868 | 0x59, 0xf1, 0x65, 0x2b, 0xd5, 0xff, 0x92, 0xcc }, | 1894 | "\x59\xf1\x65\x2b\xd5\xff\x92\xcc", |
1869 | .ilen = 32, | 1895 | .ilen = 32, |
1870 | .result = { 0x37, 0x36, 0x35, 0x34, 0x33, 0x32, 0x31, 0x20, | 1896 | .result = "\x37\x36\x35\x34\x33\x32\x31\x20" |
1871 | 0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74, | 1897 | "\x4e\x6f\x77\x20\x69\x73\x20\x74" |
1872 | 0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20, | 1898 | "\x68\x65\x20\x74\x69\x6d\x65\x20" |
1873 | 0x66, 0x6f, 0x72, 0x20, 0x00, 0x00, 0x00, 0x00 }, | 1899 | "\x66\x6f\x72\x20\x00\x00\x00\x00", |
1874 | .rlen = 32, | 1900 | .rlen = 32, |
1875 | }, | 1901 | }, |
1876 | }; | 1902 | }; |
@@ -1885,158 +1911,158 @@ static struct cipher_testvec bf_cbc_dec_tv_template[] = { | |||
1885 | 1911 | ||
1886 | static struct cipher_testvec tf_enc_tv_template[] = { | 1912 | static struct cipher_testvec tf_enc_tv_template[] = { |
1887 | { | 1913 | { |
1888 | .key = { [0 ... 15] = 0x00 }, | 1914 | .key = zeroed_string, |
1889 | .klen = 16, | 1915 | .klen = 16, |
1890 | .input = { [0 ... 15] = 0x00 }, | 1916 | .input = zeroed_string, |
1891 | .ilen = 16, | 1917 | .ilen = 16, |
1892 | .result = { 0x9f, 0x58, 0x9f, 0x5c, 0xf6, 0x12, 0x2c, 0x32, | 1918 | .result = "\x9f\x58\x9f\x5c\xf6\x12\x2c\x32" |
1893 | 0xb6, 0xbf, 0xec, 0x2f, 0x2a, 0xe8, 0xc3, 0x5a }, | 1919 | "\xb6\xbf\xec\x2f\x2a\xe8\xc3\x5a", |
1894 | .rlen = 16, | 1920 | .rlen = 16, |
1895 | }, { | 1921 | }, { |
1896 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 1922 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
1897 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, | 1923 | "\xfe\xdc\xba\x98\x76\x54\x32\x10" |
1898 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77 }, | 1924 | "\x00\x11\x22\x33\x44\x55\x66\x77", |
1899 | .klen = 24, | 1925 | .klen = 24, |
1900 | .input = { [0 ... 15] = 0x00 }, | 1926 | .input = zeroed_string, |
1901 | .ilen = 16, | 1927 | .ilen = 16, |
1902 | .result = { 0xcf, 0xd1, 0xd2, 0xe5, 0xa9, 0xbe, 0x9c, 0xdf, | 1928 | .result = "\xcf\xd1\xd2\xe5\xa9\xbe\x9c\xdf" |
1903 | 0x50, 0x1f, 0x13, 0xb8, 0x92, 0xbd, 0x22, 0x48 }, | 1929 | "\x50\x1f\x13\xb8\x92\xbd\x22\x48", |
1904 | .rlen = 16, | 1930 | .rlen = 16, |
1905 | }, { | 1931 | }, { |
1906 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 1932 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
1907 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, | 1933 | "\xfe\xdc\xba\x98\x76\x54\x32\x10" |
1908 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 1934 | "\x00\x11\x22\x33\x44\x55\x66\x77" |
1909 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, | 1935 | "\x88\x99\xaa\xbb\xcc\xdd\xee\xff", |
1910 | .klen = 32, | 1936 | .klen = 32, |
1911 | .input = { [0 ... 15] = 0x00 }, | 1937 | .input = zeroed_string, |
1912 | .ilen = 16, | 1938 | .ilen = 16, |
1913 | .result = { 0x37, 0x52, 0x7b, 0xe0, 0x05, 0x23, 0x34, 0xb8, | 1939 | .result = "\x37\x52\x7b\xe0\x05\x23\x34\xb8" |
1914 | 0x9f, 0x0c, 0xfc, 0xca, 0xe8, 0x7c, 0xfa, 0x20 }, | 1940 | "\x9f\x0c\xfc\xca\xe8\x7c\xfa\x20", |
1915 | .rlen = 16, | 1941 | .rlen = 16, |
1916 | }, | 1942 | }, |
1917 | }; | 1943 | }; |
1918 | 1944 | ||
1919 | static struct cipher_testvec tf_dec_tv_template[] = { | 1945 | static struct cipher_testvec tf_dec_tv_template[] = { |
1920 | { | 1946 | { |
1921 | .key = { [0 ... 15] = 0x00 }, | 1947 | .key = zeroed_string, |
1922 | .klen = 16, | 1948 | .klen = 16, |
1923 | .input = { 0x9f, 0x58, 0x9f, 0x5c, 0xf6, 0x12, 0x2c, 0x32, | 1949 | .input = "\x9f\x58\x9f\x5c\xf6\x12\x2c\x32" |
1924 | 0xb6, 0xbf, 0xec, 0x2f, 0x2a, 0xe8, 0xc3, 0x5a }, | 1950 | "\xb6\xbf\xec\x2f\x2a\xe8\xc3\x5a", |
1925 | .ilen = 16, | 1951 | .ilen = 16, |
1926 | .result = { [0 ... 15] = 0x00 }, | 1952 | .result = zeroed_string, |
1927 | .rlen = 16, | 1953 | .rlen = 16, |
1928 | }, { | 1954 | }, { |
1929 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 1955 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
1930 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, | 1956 | "\xfe\xdc\xba\x98\x76\x54\x32\x10" |
1931 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77 }, | 1957 | "\x00\x11\x22\x33\x44\x55\x66\x77", |
1932 | .klen = 24, | 1958 | .klen = 24, |
1933 | .input = { 0xcf, 0xd1, 0xd2, 0xe5, 0xa9, 0xbe, 0x9c, 0xdf, | 1959 | .input = "\xcf\xd1\xd2\xe5\xa9\xbe\x9c\xdf" |
1934 | 0x50, 0x1f, 0x13, 0xb8, 0x92, 0xbd, 0x22, 0x48 }, | 1960 | "\x50\x1f\x13\xb8\x92\xbd\x22\x48", |
1935 | .ilen = 16, | 1961 | .ilen = 16, |
1936 | .result = { [0 ... 15] = 0x00 }, | 1962 | .result = zeroed_string, |
1937 | .rlen = 16, | 1963 | .rlen = 16, |
1938 | }, { | 1964 | }, { |
1939 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 1965 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
1940 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, | 1966 | "\xfe\xdc\xba\x98\x76\x54\x32\x10" |
1941 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 1967 | "\x00\x11\x22\x33\x44\x55\x66\x77" |
1942 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, | 1968 | "\x88\x99\xaa\xbb\xcc\xdd\xee\xff", |
1943 | .klen = 32, | 1969 | .klen = 32, |
1944 | .input = { 0x37, 0x52, 0x7b, 0xe0, 0x05, 0x23, 0x34, 0xb8, | 1970 | .input = "\x37\x52\x7b\xe0\x05\x23\x34\xb8" |
1945 | 0x9f, 0x0c, 0xfc, 0xca, 0xe8, 0x7c, 0xfa, 0x20 }, | 1971 | "\x9f\x0c\xfc\xca\xe8\x7c\xfa\x20", |
1946 | .ilen = 16, | 1972 | .ilen = 16, |
1947 | .result = { [0 ... 15] = 0x00 }, | 1973 | .result = zeroed_string, |
1948 | .rlen = 16, | 1974 | .rlen = 16, |
1949 | }, | 1975 | }, |
1950 | }; | 1976 | }; |
1951 | 1977 | ||
1952 | static struct cipher_testvec tf_cbc_enc_tv_template[] = { | 1978 | static struct cipher_testvec tf_cbc_enc_tv_template[] = { |
1953 | { /* Generated with Nettle */ | 1979 | { /* Generated with Nettle */ |
1954 | .key = { [0 ... 15] = 0x00 }, | 1980 | .key = zeroed_string, |
1955 | .klen = 16, | 1981 | .klen = 16, |
1956 | .iv = { [0 ... 15] = 0x00 }, | 1982 | .iv = zeroed_string, |
1957 | .input = { [0 ... 15] = 0x00 }, | 1983 | .input = zeroed_string, |
1958 | .ilen = 16, | 1984 | .ilen = 16, |
1959 | .result = { 0x9f, 0x58, 0x9f, 0x5c, 0xf6, 0x12, 0x2c, 0x32, | 1985 | .result = "\x9f\x58\x9f\x5c\xf6\x12\x2c\x32" |
1960 | 0xb6, 0xbf, 0xec, 0x2f, 0x2a, 0xe8, 0xc3, 0x5a }, | 1986 | "\xb6\xbf\xec\x2f\x2a\xe8\xc3\x5a", |
1961 | .rlen = 16, | 1987 | .rlen = 16, |
1962 | }, { | 1988 | }, { |
1963 | .key = { [0 ... 15] = 0x00 }, | 1989 | .key = zeroed_string, |
1964 | .klen = 16, | 1990 | .klen = 16, |
1965 | .iv = { 0x9f, 0x58, 0x9f, 0x5c, 0xf6, 0x12, 0x2c, 0x32, | 1991 | .iv = "\x9f\x58\x9f\x5c\xf6\x12\x2c\x32" |
1966 | 0xb6, 0xbf, 0xec, 0x2f, 0x2a, 0xe8, 0xc3, 0x5a }, | 1992 | "\xb6\xbf\xec\x2f\x2a\xe8\xc3\x5a", |
1967 | .input = { [0 ... 15] = 0x00 }, | 1993 | .input = zeroed_string, |
1968 | .ilen = 16, | 1994 | .ilen = 16, |
1969 | .result = { 0xd4, 0x91, 0xdb, 0x16, 0xe7, 0xb1, 0xc3, 0x9e, | 1995 | .result = "\xd4\x91\xdb\x16\xe7\xb1\xc3\x9e" |
1970 | 0x86, 0xcb, 0x08, 0x6b, 0x78, 0x9f, 0x54, 0x19 }, | 1996 | "\x86\xcb\x08\x6b\x78\x9f\x54\x19", |
1971 | .rlen = 16, | 1997 | .rlen = 16, |
1972 | }, { | 1998 | }, { |
1973 | .key = { [0 ... 15] = 0x00 }, | 1999 | .key = zeroed_string, |
1974 | .klen = 16, | 2000 | .klen = 16, |
1975 | .iv = { 0xd4, 0x91, 0xdb, 0x16, 0xe7, 0xb1, 0xc3, 0x9e, | 2001 | .iv = "\xd4\x91\xdb\x16\xe7\xb1\xc3\x9e" |
1976 | 0x86, 0xcb, 0x08, 0x6b, 0x78, 0x9f, 0x54, 0x19 }, | 2002 | "\x86\xcb\x08\x6b\x78\x9f\x54\x19", |
1977 | .input = { [0 ... 15] = 0x00 }, | 2003 | .input = zeroed_string, |
1978 | .ilen = 16, | 2004 | .ilen = 16, |
1979 | .result = { 0x05, 0xef, 0x8c, 0x61, 0xa8, 0x11, 0x58, 0x26, | 2005 | .result = "\x05\xef\x8c\x61\xa8\x11\x58\x26" |
1980 | 0x34, 0xba, 0x5c, 0xb7, 0x10, 0x6a, 0xa6, 0x41 }, | 2006 | "\x34\xba\x5c\xb7\x10\x6a\xa6\x41", |
1981 | .rlen = 16, | 2007 | .rlen = 16, |
1982 | }, { | 2008 | }, { |
1983 | .key = { [0 ... 15] = 0x00 }, | 2009 | .key = zeroed_string, |
1984 | .klen = 16, | 2010 | .klen = 16, |
1985 | .iv = { [0 ... 15] = 0x00 }, | 2011 | .iv = zeroed_string, |
1986 | .input = { [0 ... 47] = 0x00 }, | 2012 | .input = zeroed_string, |
1987 | .ilen = 48, | 2013 | .ilen = 48, |
1988 | .result = { 0x9f, 0x58, 0x9f, 0x5c, 0xf6, 0x12, 0x2c, 0x32, | 2014 | .result = "\x9f\x58\x9f\x5c\xf6\x12\x2c\x32" |
1989 | 0xb6, 0xbf, 0xec, 0x2f, 0x2a, 0xe8, 0xc3, 0x5a, | 2015 | "\xb6\xbf\xec\x2f\x2a\xe8\xc3\x5a" |
1990 | 0xd4, 0x91, 0xdb, 0x16, 0xe7, 0xb1, 0xc3, 0x9e, | 2016 | "\xd4\x91\xdb\x16\xe7\xb1\xc3\x9e" |
1991 | 0x86, 0xcb, 0x08, 0x6b, 0x78, 0x9f, 0x54, 0x19, | 2017 | "\x86\xcb\x08\x6b\x78\x9f\x54\x19" |
1992 | 0x05, 0xef, 0x8c, 0x61, 0xa8, 0x11, 0x58, 0x26, | 2018 | "\x05\xef\x8c\x61\xa8\x11\x58\x26" |
1993 | 0x34, 0xba, 0x5c, 0xb7, 0x10, 0x6a, 0xa6, 0x41 }, | 2019 | "\x34\xba\x5c\xb7\x10\x6a\xa6\x41", |
1994 | .rlen = 48, | 2020 | .rlen = 48, |
1995 | }, | 2021 | }, |
1996 | }; | 2022 | }; |
1997 | 2023 | ||
1998 | static struct cipher_testvec tf_cbc_dec_tv_template[] = { | 2024 | static struct cipher_testvec tf_cbc_dec_tv_template[] = { |
1999 | { /* Reverse of the first four above */ | 2025 | { /* Reverse of the first four above */ |
2000 | .key = { [0 ... 15] = 0x00 }, | 2026 | .key = zeroed_string, |
2001 | .klen = 16, | 2027 | .klen = 16, |
2002 | .iv = { [0 ... 15] = 0x00 }, | 2028 | .iv = zeroed_string, |
2003 | .input = { 0x9f, 0x58, 0x9f, 0x5c, 0xf6, 0x12, 0x2c, 0x32, | 2029 | .input = "\x9f\x58\x9f\x5c\xf6\x12\x2c\x32" |
2004 | 0xb6, 0xbf, 0xec, 0x2f, 0x2a, 0xe8, 0xc3, 0x5a }, | 2030 | "\xb6\xbf\xec\x2f\x2a\xe8\xc3\x5a", |
2005 | .ilen = 16, | 2031 | .ilen = 16, |
2006 | .result = { [0 ... 15] = 0x00 }, | 2032 | .result = zeroed_string, |
2007 | .rlen = 16, | 2033 | .rlen = 16, |
2008 | }, { | 2034 | }, { |
2009 | .key = { [0 ... 15] = 0x00 }, | 2035 | .key = zeroed_string, |
2010 | .klen = 16, | 2036 | .klen = 16, |
2011 | .iv = { 0x9f, 0x58, 0x9f, 0x5c, 0xf6, 0x12, 0x2c, 0x32, | 2037 | .iv = "\x9f\x58\x9f\x5c\xf6\x12\x2c\x32" |
2012 | 0xb6, 0xbf, 0xec, 0x2f, 0x2a, 0xe8, 0xc3, 0x5a }, | 2038 | "\xb6\xbf\xec\x2f\x2a\xe8\xc3\x5a", |
2013 | .input = { 0xd4, 0x91, 0xdb, 0x16, 0xe7, 0xb1, 0xc3, 0x9e, | 2039 | .input = "\xd4\x91\xdb\x16\xe7\xb1\xc3\x9e" |
2014 | 0x86, 0xcb, 0x08, 0x6b, 0x78, 0x9f, 0x54, 0x19 }, | 2040 | "\x86\xcb\x08\x6b\x78\x9f\x54\x19", |
2015 | .ilen = 16, | 2041 | .ilen = 16, |
2016 | .result = { [0 ... 15] = 0x00 }, | 2042 | .result = zeroed_string, |
2017 | .rlen = 16, | 2043 | .rlen = 16, |
2018 | }, { | 2044 | }, { |
2019 | .key = { [0 ... 15] = 0x00 }, | 2045 | .key = zeroed_string, |
2020 | .klen = 16, | 2046 | .klen = 16, |
2021 | .iv = { 0xd4, 0x91, 0xdb, 0x16, 0xe7, 0xb1, 0xc3, 0x9e, | 2047 | .iv = "\xd4\x91\xdb\x16\xe7\xb1\xc3\x9e" |
2022 | 0x86, 0xcb, 0x08, 0x6b, 0x78, 0x9f, 0x54, 0x19 }, | 2048 | "\x86\xcb\x08\x6b\x78\x9f\x54\x19", |
2023 | .input = { 0x05, 0xef, 0x8c, 0x61, 0xa8, 0x11, 0x58, 0x26, | 2049 | .input = "\x05\xef\x8c\x61\xa8\x11\x58\x26" |
2024 | 0x34, 0xba, 0x5c, 0xb7, 0x10, 0x6a, 0xa6, 0x41 }, | 2050 | "\x34\xba\x5c\xb7\x10\x6a\xa6\x41", |
2025 | .ilen = 16, | 2051 | .ilen = 16, |
2026 | .result = { [0 ... 15] = 0x00 }, | 2052 | .result = zeroed_string, |
2027 | .rlen = 16, | 2053 | .rlen = 16, |
2028 | }, { | 2054 | }, { |
2029 | .key = { [0 ... 15] = 0x00 }, | 2055 | .key = zeroed_string, |
2030 | .klen = 16, | 2056 | .klen = 16, |
2031 | .iv = { [0 ... 15] = 0x00 }, | 2057 | .iv = zeroed_string, |
2032 | .input = { 0x9f, 0x58, 0x9f, 0x5c, 0xf6, 0x12, 0x2c, 0x32, | 2058 | .input = "\x9f\x58\x9f\x5c\xf6\x12\x2c\x32" |
2033 | 0xb6, 0xbf, 0xec, 0x2f, 0x2a, 0xe8, 0xc3, 0x5a, | 2059 | "\xb6\xbf\xec\x2f\x2a\xe8\xc3\x5a" |
2034 | 0xd4, 0x91, 0xdb, 0x16, 0xe7, 0xb1, 0xc3, 0x9e, | 2060 | "\xd4\x91\xdb\x16\xe7\xb1\xc3\x9e" |
2035 | 0x86, 0xcb, 0x08, 0x6b, 0x78, 0x9f, 0x54, 0x19, | 2061 | "\x86\xcb\x08\x6b\x78\x9f\x54\x19" |
2036 | 0x05, 0xef, 0x8c, 0x61, 0xa8, 0x11, 0x58, 0x26, | 2062 | "\x05\xef\x8c\x61\xa8\x11\x58\x26" |
2037 | 0x34, 0xba, 0x5c, 0xb7, 0x10, 0x6a, 0xa6, 0x41 }, | 2063 | "\x34\xba\x5c\xb7\x10\x6a\xa6\x41", |
2038 | .ilen = 48, | 2064 | .ilen = 48, |
2039 | .result = { [0 ... 47] = 0x00 }, | 2065 | .result = zeroed_string, |
2040 | .rlen = 48, | 2066 | .rlen = 48, |
2041 | }, | 2067 | }, |
2042 | }; | 2068 | }; |
@@ -2053,90 +2079,90 @@ static struct cipher_testvec tf_cbc_dec_tv_template[] = { | |||
2053 | 2079 | ||
2054 | static struct cipher_testvec serpent_enc_tv_template[] = { | 2080 | static struct cipher_testvec serpent_enc_tv_template[] = { |
2055 | { | 2081 | { |
2056 | .input = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2082 | .input = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2057 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2083 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2058 | .ilen = 16, | 2084 | .ilen = 16, |
2059 | .result = { 0x12, 0x07, 0xfc, 0xce, 0x9b, 0xd0, 0xd6, 0x47, | 2085 | .result = "\x12\x07\xfc\xce\x9b\xd0\xd6\x47" |
2060 | 0x6a, 0xe9, 0x8f, 0xbe, 0xd1, 0x43, 0xa0, 0xe2 }, | 2086 | "\x6a\xe9\x8f\xbe\xd1\x43\xa0\xe2", |
2061 | .rlen = 16, | 2087 | .rlen = 16, |
2062 | }, { | 2088 | }, { |
2063 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2089 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2064 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2090 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2065 | .klen = 16, | 2091 | .klen = 16, |
2066 | .input = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2092 | .input = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2067 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2093 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2068 | .ilen = 16, | 2094 | .ilen = 16, |
2069 | .result = { 0x4c, 0x7d, 0x8a, 0x32, 0x80, 0x72, 0xa2, 0x2c, | 2095 | .result = "\x4c\x7d\x8a\x32\x80\x72\xa2\x2c" |
2070 | 0x82, 0x3e, 0x4a, 0x1f, 0x3a, 0xcd, 0xa1, 0x6d }, | 2096 | "\x82\x3e\x4a\x1f\x3a\xcd\xa1\x6d", |
2071 | .rlen = 16, | 2097 | .rlen = 16, |
2072 | }, { | 2098 | }, { |
2073 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2099 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2074 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 2100 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
2075 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 2101 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
2076 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 2102 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
2077 | .klen = 32, | 2103 | .klen = 32, |
2078 | .input = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2104 | .input = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2079 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2105 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2080 | .ilen = 16, | 2106 | .ilen = 16, |
2081 | .result = { 0xde, 0x26, 0x9f, 0xf8, 0x33, 0xe4, 0x32, 0xb8, | 2107 | .result = "\xde\x26\x9f\xf8\x33\xe4\x32\xb8" |
2082 | 0x5b, 0x2e, 0x88, 0xd2, 0x70, 0x1c, 0xe7, 0x5c }, | 2108 | "\x5b\x2e\x88\xd2\x70\x1c\xe7\x5c", |
2083 | .rlen = 16, | 2109 | .rlen = 16, |
2084 | }, { | 2110 | }, { |
2085 | .key = { [15] = 0x80 }, | 2111 | .key = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80", |
2086 | .klen = 16, | 2112 | .klen = 16, |
2087 | .input = { [0 ... 15] = 0x00 }, | 2113 | .input = zeroed_string, |
2088 | .ilen = 16, | 2114 | .ilen = 16, |
2089 | .result = { 0xdd, 0xd2, 0x6b, 0x98, 0xa5, 0xff, 0xd8, 0x2c, | 2115 | .result = "\xdd\xd2\x6b\x98\xa5\xff\xd8\x2c" |
2090 | 0x05, 0x34, 0x5a, 0x9d, 0xad, 0xbf, 0xaf, 0x49}, | 2116 | "\x05\x34\x5a\x9d\xad\xbf\xaf\x49", |
2091 | .rlen = 16, | 2117 | .rlen = 16, |
2092 | }, | 2118 | }, |
2093 | }; | 2119 | }; |
2094 | 2120 | ||
2095 | static struct cipher_testvec tnepres_enc_tv_template[] = { | 2121 | static struct cipher_testvec tnepres_enc_tv_template[] = { |
2096 | { /* KeySize=128, PT=0, I=1 */ | 2122 | { /* KeySize=128, PT=0, I=1 */ |
2097 | .input = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2123 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2098 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 2124 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
2099 | .key = { 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2125 | .key = "\x80\x00\x00\x00\x00\x00\x00\x00" |
2100 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 2126 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
2101 | .klen = 16, | 2127 | .klen = 16, |
2102 | .ilen = 16, | 2128 | .ilen = 16, |
2103 | .result = { 0x49, 0xaf, 0xbf, 0xad, 0x9d, 0x5a, 0x34, 0x05, | 2129 | .result = "\x49\xaf\xbf\xad\x9d\x5a\x34\x05" |
2104 | 0x2c, 0xd8, 0xff, 0xa5, 0x98, 0x6b, 0xd2, 0xdd }, | 2130 | "\x2c\xd8\xff\xa5\x98\x6b\xd2\xdd", |
2105 | .rlen = 16, | 2131 | .rlen = 16, |
2106 | }, { /* KeySize=192, PT=0, I=1 */ | 2132 | }, { /* KeySize=192, PT=0, I=1 */ |
2107 | .key = { 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2133 | .key = "\x80\x00\x00\x00\x00\x00\x00\x00" |
2108 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2134 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
2109 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 2135 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
2110 | .klen = 24, | 2136 | .klen = 24, |
2111 | .input = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2137 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2112 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 2138 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
2113 | .ilen = 16, | 2139 | .ilen = 16, |
2114 | .result = { 0xe7, 0x8e, 0x54, 0x02, 0xc7, 0x19, 0x55, 0x68, | 2140 | .result = "\xe7\x8e\x54\x02\xc7\x19\x55\x68" |
2115 | 0xac, 0x36, 0x78, 0xf7, 0xa3, 0xf6, 0x0c, 0x66 }, | 2141 | "\xac\x36\x78\xf7\xa3\xf6\x0c\x66", |
2116 | .rlen = 16, | 2142 | .rlen = 16, |
2117 | }, { /* KeySize=256, PT=0, I=1 */ | 2143 | }, { /* KeySize=256, PT=0, I=1 */ |
2118 | .key = { 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2144 | .key = "\x80\x00\x00\x00\x00\x00\x00\x00" |
2119 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2145 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
2120 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2146 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
2121 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 2147 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
2122 | .klen = 32, | 2148 | .klen = 32, |
2123 | .input = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2149 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2124 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 2150 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
2125 | .ilen = 16, | 2151 | .ilen = 16, |
2126 | .result = { 0xab, 0xed, 0x96, 0xe7, 0x66, 0xbf, 0x28, 0xcb, | 2152 | .result = "\xab\xed\x96\xe7\x66\xbf\x28\xcb" |
2127 | 0xc0, 0xeb, 0xd2, 0x1a, 0x82, 0xef, 0x08, 0x19 }, | 2153 | "\xc0\xeb\xd2\x1a\x82\xef\x08\x19", |
2128 | .rlen = 16, | 2154 | .rlen = 16, |
2129 | }, { /* KeySize=256, I=257 */ | 2155 | }, { /* KeySize=256, I=257 */ |
2130 | .key = { 0x1f, 0x1e, 0x1d, 0x1c, 0x1b, 0x1a, 0x19, 0x18, | 2156 | .key = "\x1f\x1e\x1d\x1c\x1b\x1a\x19\x18" |
2131 | 0x17, 0x16, 0x15, 0x14, 0x13, 0x12, 0x11, 0x10, | 2157 | "\x17\x16\x15\x14\x13\x12\x11\x10" |
2132 | 0x0f, 0x0e, 0x0d, 0x0c, 0x0b, 0x0a, 0x09, 0x08, | 2158 | "\x0f\x0e\x0d\x0c\x0b\x0a\x09\x08" |
2133 | 0x07, 0x06, 0x05, 0x04, 0x03, 0x02, 0x01, 0x00 }, | 2159 | "\x07\x06\x05\x04\x03\x02\x01\x00", |
2134 | .klen = 32, | 2160 | .klen = 32, |
2135 | .input = { 0x0f, 0x0e, 0x0d, 0x0c, 0x0b, 0x0a, 0x09, 0x08, | 2161 | .input = "\x0f\x0e\x0d\x0c\x0b\x0a\x09\x08" |
2136 | 0x07, 0x06, 0x05, 0x04, 0x03, 0x02, 0x01, 0x00 }, | 2162 | "\x07\x06\x05\x04\x03\x02\x01\x00", |
2137 | .ilen = 16, | 2163 | .ilen = 16, |
2138 | .result = { 0x5c, 0xe7, 0x1c, 0x70, 0xd2, 0x88, 0x2e, 0x5b, | 2164 | .result = "\x5c\xe7\x1c\x70\xd2\x88\x2e\x5b" |
2139 | 0xb8, 0x32, 0xe4, 0x33, 0xf8, 0x9f, 0x26, 0xde }, | 2165 | "\xb8\x32\xe4\x33\xf8\x9f\x26\xde", |
2140 | .rlen = 16, | 2166 | .rlen = 16, |
2141 | }, | 2167 | }, |
2142 | }; | 2168 | }; |
@@ -2144,82 +2170,82 @@ static struct cipher_testvec tnepres_enc_tv_template[] = { | |||
2144 | 2170 | ||
2145 | static struct cipher_testvec serpent_dec_tv_template[] = { | 2171 | static struct cipher_testvec serpent_dec_tv_template[] = { |
2146 | { | 2172 | { |
2147 | .input = { 0x12, 0x07, 0xfc, 0xce, 0x9b, 0xd0, 0xd6, 0x47, | 2173 | .input = "\x12\x07\xfc\xce\x9b\xd0\xd6\x47" |
2148 | 0x6a, 0xe9, 0x8f, 0xbe, 0xd1, 0x43, 0xa0, 0xe2 }, | 2174 | "\x6a\xe9\x8f\xbe\xd1\x43\xa0\xe2", |
2149 | .ilen = 16, | 2175 | .ilen = 16, |
2150 | .result = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2176 | .result = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2151 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2177 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2152 | .rlen = 16, | 2178 | .rlen = 16, |
2153 | }, { | 2179 | }, { |
2154 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2180 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2155 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2181 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2156 | .klen = 16, | 2182 | .klen = 16, |
2157 | .input = { 0x4c, 0x7d, 0x8a, 0x32, 0x80, 0x72, 0xa2, 0x2c, | 2183 | .input = "\x4c\x7d\x8a\x32\x80\x72\xa2\x2c" |
2158 | 0x82, 0x3e, 0x4a, 0x1f, 0x3a, 0xcd, 0xa1, 0x6d }, | 2184 | "\x82\x3e\x4a\x1f\x3a\xcd\xa1\x6d", |
2159 | .ilen = 16, | 2185 | .ilen = 16, |
2160 | .result = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2186 | .result = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2161 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2187 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2162 | .rlen = 16, | 2188 | .rlen = 16, |
2163 | }, { | 2189 | }, { |
2164 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2190 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2165 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 2191 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
2166 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 2192 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
2167 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 2193 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
2168 | .klen = 32, | 2194 | .klen = 32, |
2169 | .input = { 0xde, 0x26, 0x9f, 0xf8, 0x33, 0xe4, 0x32, 0xb8, | 2195 | .input = "\xde\x26\x9f\xf8\x33\xe4\x32\xb8" |
2170 | 0x5b, 0x2e, 0x88, 0xd2, 0x70, 0x1c, 0xe7, 0x5c }, | 2196 | "\x5b\x2e\x88\xd2\x70\x1c\xe7\x5c", |
2171 | .ilen = 16, | 2197 | .ilen = 16, |
2172 | .result = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2198 | .result = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2173 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2199 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2174 | .rlen = 16, | 2200 | .rlen = 16, |
2175 | }, { | 2201 | }, { |
2176 | .key = { [15] = 0x80 }, | 2202 | .key = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80", |
2177 | .klen = 16, | 2203 | .klen = 16, |
2178 | .input = { 0xdd, 0xd2, 0x6b, 0x98, 0xa5, 0xff, 0xd8, 0x2c, | 2204 | .input = "\xdd\xd2\x6b\x98\xa5\xff\xd8\x2c" |
2179 | 0x05, 0x34, 0x5a, 0x9d, 0xad, 0xbf, 0xaf, 0x49}, | 2205 | "\x05\x34\x5a\x9d\xad\xbf\xaf\x49", |
2180 | .ilen = 16, | 2206 | .ilen = 16, |
2181 | .result = { [0 ... 15] = 0x00 }, | 2207 | .result = zeroed_string, |
2182 | .rlen = 16, | 2208 | .rlen = 16, |
2183 | }, | 2209 | }, |
2184 | }; | 2210 | }; |
2185 | 2211 | ||
2186 | static struct cipher_testvec tnepres_dec_tv_template[] = { | 2212 | static struct cipher_testvec tnepres_dec_tv_template[] = { |
2187 | { | 2213 | { |
2188 | .input = { 0x41, 0xcc, 0x6b, 0x31, 0x59, 0x31, 0x45, 0x97, | 2214 | .input = "\x41\xcc\x6b\x31\x59\x31\x45\x97" |
2189 | 0x6d, 0x6f, 0xbb, 0x38, 0x4b, 0x37, 0x21, 0x28 }, | 2215 | "\x6d\x6f\xbb\x38\x4b\x37\x21\x28", |
2190 | .ilen = 16, | 2216 | .ilen = 16, |
2191 | .result = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2217 | .result = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2192 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2218 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2193 | .rlen = 16, | 2219 | .rlen = 16, |
2194 | }, { | 2220 | }, { |
2195 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2221 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2196 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2222 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2197 | .klen = 16, | 2223 | .klen = 16, |
2198 | .input = { 0xea, 0xf4, 0xd7, 0xfc, 0xd8, 0x01, 0x34, 0x47, | 2224 | .input = "\xea\xf4\xd7\xfc\xd8\x01\x34\x47" |
2199 | 0x81, 0x45, 0x0b, 0xfa, 0x0c, 0xd6, 0xad, 0x6e }, | 2225 | "\x81\x45\x0b\xfa\x0c\xd6\xad\x6e", |
2200 | .ilen = 16, | 2226 | .ilen = 16, |
2201 | .result = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2227 | .result = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2202 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2228 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2203 | .rlen = 16, | 2229 | .rlen = 16, |
2204 | }, { | 2230 | }, { |
2205 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2231 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2206 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 2232 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
2207 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 2233 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
2208 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 2234 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
2209 | .klen = 32, | 2235 | .klen = 32, |
2210 | .input = { 0x64, 0xa9, 0x1a, 0x37, 0xed, 0x9f, 0xe7, 0x49, | 2236 | .input = "\x64\xa9\x1a\x37\xed\x9f\xe7\x49" |
2211 | 0xa8, 0x4e, 0x76, 0xd6, 0xf5, 0x0d, 0x78, 0xee }, | 2237 | "\xa8\x4e\x76\xd6\xf5\x0d\x78\xee", |
2212 | .ilen = 16, | 2238 | .ilen = 16, |
2213 | .result = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2239 | .result = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2214 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2240 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2215 | .rlen = 16, | 2241 | .rlen = 16, |
2216 | }, { /* KeySize=128, I=121 */ | 2242 | }, { /* KeySize=128, I=121 */ |
2217 | .key = { [15] = 0x80 }, | 2243 | .key = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80", |
2218 | .klen = 16, | 2244 | .klen = 16, |
2219 | .input = { 0x3d, 0xda, 0xbf, 0xc0, 0x06, 0xda, 0xab, 0x06, | 2245 | .input = "\x3d\xda\xbf\xc0\x06\xda\xab\x06" |
2220 | 0x46, 0x2a, 0xf4, 0xef, 0x81, 0x54, 0x4e, 0x26 }, | 2246 | "\x46\x2a\xf4\xef\x81\x54\x4e\x26", |
2221 | .ilen = 16, | 2247 | .ilen = 16, |
2222 | .result = { [0 ... 15] = 0x00 }, | 2248 | .result = zeroed_string, |
2223 | .rlen = 16, | 2249 | .rlen = 16, |
2224 | }, | 2250 | }, |
2225 | }; | 2251 | }; |
@@ -2231,68 +2257,68 @@ static struct cipher_testvec tnepres_dec_tv_template[] = { | |||
2231 | 2257 | ||
2232 | static struct cipher_testvec cast6_enc_tv_template[] = { | 2258 | static struct cipher_testvec cast6_enc_tv_template[] = { |
2233 | { | 2259 | { |
2234 | .key = { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, | 2260 | .key = "\x23\x42\xbb\x9e\xfa\x38\x54\x2c" |
2235 | 0x0a, 0xf7, 0x56, 0x47, 0xf2, 0x9f, 0x61, 0x5d }, | 2261 | "\x0a\xf7\x56\x47\xf2\x9f\x61\x5d", |
2236 | .klen = 16, | 2262 | .klen = 16, |
2237 | .input = { [0 ... 15] = 0x00 }, | 2263 | .input = zeroed_string, |
2238 | .ilen = 16, | 2264 | .ilen = 16, |
2239 | .result = { 0xc8, 0x42, 0xa0, 0x89, 0x72, 0xb4, 0x3d, 0x20, | 2265 | .result = "\xc8\x42\xa0\x89\x72\xb4\x3d\x20" |
2240 | 0x83, 0x6c, 0x91, 0xd1, 0xb7, 0x53, 0x0f, 0x6b }, | 2266 | "\x83\x6c\x91\xd1\xb7\x53\x0f\x6b", |
2241 | .rlen = 16, | 2267 | .rlen = 16, |
2242 | }, { | 2268 | }, { |
2243 | .key = { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, | 2269 | .key = "\x23\x42\xbb\x9e\xfa\x38\x54\x2c" |
2244 | 0xbe, 0xd0, 0xac, 0x83, 0x94, 0x0a, 0xc2, 0x98, | 2270 | "\xbe\xd0\xac\x83\x94\x0a\xc2\x98" |
2245 | 0xba, 0xc7, 0x7a, 0x77, 0x17, 0x94, 0x28, 0x63 }, | 2271 | "\xba\xc7\x7a\x77\x17\x94\x28\x63", |
2246 | .klen = 24, | 2272 | .klen = 24, |
2247 | .input = { [0 ... 15] = 0x00 }, | 2273 | .input = zeroed_string, |
2248 | .ilen = 16, | 2274 | .ilen = 16, |
2249 | .result = { 0x1b, 0x38, 0x6c, 0x02, 0x10, 0xdc, 0xad, 0xcb, | 2275 | .result = "\x1b\x38\x6c\x02\x10\xdc\xad\xcb" |
2250 | 0xdd, 0x0e, 0x41, 0xaa, 0x08, 0xa7, 0xa7, 0xe8 }, | 2276 | "\xdd\x0e\x41\xaa\x08\xa7\xa7\xe8", |
2251 | .rlen = 16, | 2277 | .rlen = 16, |
2252 | }, { | 2278 | }, { |
2253 | .key = { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, | 2279 | .key = "\x23\x42\xbb\x9e\xfa\x38\x54\x2c" |
2254 | 0xbe, 0xd0, 0xac, 0x83, 0x94, 0x0a, 0xc2, 0x98, | 2280 | "\xbe\xd0\xac\x83\x94\x0a\xc2\x98" |
2255 | 0x8d, 0x7c, 0x47, 0xce, 0x26, 0x49, 0x08, 0x46, | 2281 | "\x8d\x7c\x47\xce\x26\x49\x08\x46" |
2256 | 0x1c, 0xc1, 0xb5, 0x13, 0x7a, 0xe6, 0xb6, 0x04 }, | 2282 | "\x1c\xc1\xb5\x13\x7a\xe6\xb6\x04", |
2257 | .klen = 32, | 2283 | .klen = 32, |
2258 | .input = { [0 ... 15] = 0x00 }, | 2284 | .input = zeroed_string, |
2259 | .ilen = 16, | 2285 | .ilen = 16, |
2260 | .result = { 0x4f, 0x6a, 0x20, 0x38, 0x28, 0x68, 0x97, 0xb9, | 2286 | .result = "\x4f\x6a\x20\x38\x28\x68\x97\xb9" |
2261 | 0xc9, 0x87, 0x01, 0x36, 0x55, 0x33, 0x17, 0xfa }, | 2287 | "\xc9\x87\x01\x36\x55\x33\x17\xfa", |
2262 | .rlen = 16, | 2288 | .rlen = 16, |
2263 | }, | 2289 | }, |
2264 | }; | 2290 | }; |
2265 | 2291 | ||
2266 | static struct cipher_testvec cast6_dec_tv_template[] = { | 2292 | static struct cipher_testvec cast6_dec_tv_template[] = { |
2267 | { | 2293 | { |
2268 | .key = { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, | 2294 | .key = "\x23\x42\xbb\x9e\xfa\x38\x54\x2c" |
2269 | 0x0a, 0xf7, 0x56, 0x47, 0xf2, 0x9f, 0x61, 0x5d }, | 2295 | "\x0a\xf7\x56\x47\xf2\x9f\x61\x5d", |
2270 | .klen = 16, | 2296 | .klen = 16, |
2271 | .input = { 0xc8, 0x42, 0xa0, 0x89, 0x72, 0xb4, 0x3d, 0x20, | 2297 | .input = "\xc8\x42\xa0\x89\x72\xb4\x3d\x20" |
2272 | 0x83, 0x6c, 0x91, 0xd1, 0xb7, 0x53, 0x0f, 0x6b }, | 2298 | "\x83\x6c\x91\xd1\xb7\x53\x0f\x6b", |
2273 | .ilen = 16, | 2299 | .ilen = 16, |
2274 | .result = { [0 ... 15] = 0x00 }, | 2300 | .result = zeroed_string, |
2275 | .rlen = 16, | 2301 | .rlen = 16, |
2276 | }, { | 2302 | }, { |
2277 | .key = { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, | 2303 | .key = "\x23\x42\xbb\x9e\xfa\x38\x54\x2c" |
2278 | 0xbe, 0xd0, 0xac, 0x83, 0x94, 0x0a, 0xc2, 0x98, | 2304 | "\xbe\xd0\xac\x83\x94\x0a\xc2\x98" |
2279 | 0xba, 0xc7, 0x7a, 0x77, 0x17, 0x94, 0x28, 0x63 }, | 2305 | "\xba\xc7\x7a\x77\x17\x94\x28\x63", |
2280 | .klen = 24, | 2306 | .klen = 24, |
2281 | .input = { 0x1b, 0x38, 0x6c, 0x02, 0x10, 0xdc, 0xad, 0xcb, | 2307 | .input = "\x1b\x38\x6c\x02\x10\xdc\xad\xcb" |
2282 | 0xdd, 0x0e, 0x41, 0xaa, 0x08, 0xa7, 0xa7, 0xe8 }, | 2308 | "\xdd\x0e\x41\xaa\x08\xa7\xa7\xe8", |
2283 | .ilen = 16, | 2309 | .ilen = 16, |
2284 | .result = { [0 ... 15] = 0x00 }, | 2310 | .result = zeroed_string, |
2285 | .rlen = 16, | 2311 | .rlen = 16, |
2286 | }, { | 2312 | }, { |
2287 | .key = { 0x23, 0x42, 0xbb, 0x9e, 0xfa, 0x38, 0x54, 0x2c, | 2313 | .key = "\x23\x42\xbb\x9e\xfa\x38\x54\x2c" |
2288 | 0xbe, 0xd0, 0xac, 0x83, 0x94, 0x0a, 0xc2, 0x98, | 2314 | "\xbe\xd0\xac\x83\x94\x0a\xc2\x98" |
2289 | 0x8d, 0x7c, 0x47, 0xce, 0x26, 0x49, 0x08, 0x46, | 2315 | "\x8d\x7c\x47\xce\x26\x49\x08\x46" |
2290 | 0x1c, 0xc1, 0xb5, 0x13, 0x7a, 0xe6, 0xb6, 0x04 }, | 2316 | "\x1c\xc1\xb5\x13\x7a\xe6\xb6\x04", |
2291 | .klen = 32, | 2317 | .klen = 32, |
2292 | .input = { 0x4f, 0x6a, 0x20, 0x38, 0x28, 0x68, 0x97, 0xb9, | 2318 | .input = "\x4f\x6a\x20\x38\x28\x68\x97\xb9" |
2293 | 0xc9, 0x87, 0x01, 0x36, 0x55, 0x33, 0x17, 0xfa }, | 2319 | "\xc9\x87\x01\x36\x55\x33\x17\xfa", |
2294 | .ilen = 16, | 2320 | .ilen = 16, |
2295 | .result = { [0 ... 15] = 0x00 }, | 2321 | .result = zeroed_string, |
2296 | .rlen = 16, | 2322 | .rlen = 16, |
2297 | }, | 2323 | }, |
2298 | }; | 2324 | }; |
@@ -2318,238 +2344,238 @@ static struct cipher_testvec cast6_dec_tv_template[] = { | |||
2318 | 2344 | ||
2319 | static struct cipher_testvec aes_enc_tv_template[] = { | 2345 | static struct cipher_testvec aes_enc_tv_template[] = { |
2320 | { /* From FIPS-197 */ | 2346 | { /* From FIPS-197 */ |
2321 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2347 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2322 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2348 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2323 | .klen = 16, | 2349 | .klen = 16, |
2324 | .input = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 2350 | .input = "\x00\x11\x22\x33\x44\x55\x66\x77" |
2325 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, | 2351 | "\x88\x99\xaa\xbb\xcc\xdd\xee\xff", |
2326 | .ilen = 16, | 2352 | .ilen = 16, |
2327 | .result = { 0x69, 0xc4, 0xe0, 0xd8, 0x6a, 0x7b, 0x04, 0x30, | 2353 | .result = "\x69\xc4\xe0\xd8\x6a\x7b\x04\x30" |
2328 | 0xd8, 0xcd, 0xb7, 0x80, 0x70, 0xb4, 0xc5, 0x5a }, | 2354 | "\xd8\xcd\xb7\x80\x70\xb4\xc5\x5a", |
2329 | .rlen = 16, | 2355 | .rlen = 16, |
2330 | }, { | 2356 | }, { |
2331 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2357 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2332 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 2358 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
2333 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17 }, | 2359 | "\x10\x11\x12\x13\x14\x15\x16\x17", |
2334 | .klen = 24, | 2360 | .klen = 24, |
2335 | .input = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 2361 | .input = "\x00\x11\x22\x33\x44\x55\x66\x77" |
2336 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, | 2362 | "\x88\x99\xaa\xbb\xcc\xdd\xee\xff", |
2337 | .ilen = 16, | 2363 | .ilen = 16, |
2338 | .result = { 0xdd, 0xa9, 0x7c, 0xa4, 0x86, 0x4c, 0xdf, 0xe0, | 2364 | .result = "\xdd\xa9\x7c\xa4\x86\x4c\xdf\xe0" |
2339 | 0x6e, 0xaf, 0x70, 0xa0, 0xec, 0x0d, 0x71, 0x91 }, | 2365 | "\x6e\xaf\x70\xa0\xec\x0d\x71\x91", |
2340 | .rlen = 16, | 2366 | .rlen = 16, |
2341 | }, { | 2367 | }, { |
2342 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2368 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2343 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 2369 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
2344 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 2370 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
2345 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 2371 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
2346 | .klen = 32, | 2372 | .klen = 32, |
2347 | .input = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 2373 | .input = "\x00\x11\x22\x33\x44\x55\x66\x77" |
2348 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, | 2374 | "\x88\x99\xaa\xbb\xcc\xdd\xee\xff", |
2349 | .ilen = 16, | 2375 | .ilen = 16, |
2350 | .result = { 0x8e, 0xa2, 0xb7, 0xca, 0x51, 0x67, 0x45, 0xbf, | 2376 | .result = "\x8e\xa2\xb7\xca\x51\x67\x45\xbf" |
2351 | 0xea, 0xfc, 0x49, 0x90, 0x4b, 0x49, 0x60, 0x89 }, | 2377 | "\xea\xfc\x49\x90\x4b\x49\x60\x89", |
2352 | .rlen = 16, | 2378 | .rlen = 16, |
2353 | }, | 2379 | }, |
2354 | }; | 2380 | }; |
2355 | 2381 | ||
2356 | static struct cipher_testvec aes_dec_tv_template[] = { | 2382 | static struct cipher_testvec aes_dec_tv_template[] = { |
2357 | { /* From FIPS-197 */ | 2383 | { /* From FIPS-197 */ |
2358 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2384 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2359 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2385 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2360 | .klen = 16, | 2386 | .klen = 16, |
2361 | .input = { 0x69, 0xc4, 0xe0, 0xd8, 0x6a, 0x7b, 0x04, 0x30, | 2387 | .input = "\x69\xc4\xe0\xd8\x6a\x7b\x04\x30" |
2362 | 0xd8, 0xcd, 0xb7, 0x80, 0x70, 0xb4, 0xc5, 0x5a }, | 2388 | "\xd8\xcd\xb7\x80\x70\xb4\xc5\x5a", |
2363 | .ilen = 16, | 2389 | .ilen = 16, |
2364 | .result = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 2390 | .result = "\x00\x11\x22\x33\x44\x55\x66\x77" |
2365 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, | 2391 | "\x88\x99\xaa\xbb\xcc\xdd\xee\xff", |
2366 | .rlen = 16, | 2392 | .rlen = 16, |
2367 | }, { | 2393 | }, { |
2368 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2394 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2369 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 2395 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
2370 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17 }, | 2396 | "\x10\x11\x12\x13\x14\x15\x16\x17", |
2371 | .klen = 24, | 2397 | .klen = 24, |
2372 | .input = { 0xdd, 0xa9, 0x7c, 0xa4, 0x86, 0x4c, 0xdf, 0xe0, | 2398 | .input = "\xdd\xa9\x7c\xa4\x86\x4c\xdf\xe0" |
2373 | 0x6e, 0xaf, 0x70, 0xa0, 0xec, 0x0d, 0x71, 0x91 }, | 2399 | "\x6e\xaf\x70\xa0\xec\x0d\x71\x91", |
2374 | .ilen = 16, | 2400 | .ilen = 16, |
2375 | .result = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 2401 | .result = "\x00\x11\x22\x33\x44\x55\x66\x77" |
2376 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, | 2402 | "\x88\x99\xaa\xbb\xcc\xdd\xee\xff", |
2377 | .rlen = 16, | 2403 | .rlen = 16, |
2378 | }, { | 2404 | }, { |
2379 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2405 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2380 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 2406 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
2381 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 2407 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
2382 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 2408 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
2383 | .klen = 32, | 2409 | .klen = 32, |
2384 | .input = { 0x8e, 0xa2, 0xb7, 0xca, 0x51, 0x67, 0x45, 0xbf, | 2410 | .input = "\x8e\xa2\xb7\xca\x51\x67\x45\xbf" |
2385 | 0xea, 0xfc, 0x49, 0x90, 0x4b, 0x49, 0x60, 0x89 }, | 2411 | "\xea\xfc\x49\x90\x4b\x49\x60\x89", |
2386 | .ilen = 16, | 2412 | .ilen = 16, |
2387 | .result = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 2413 | .result = "\x00\x11\x22\x33\x44\x55\x66\x77" |
2388 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, | 2414 | "\x88\x99\xaa\xbb\xcc\xdd\xee\xff", |
2389 | .rlen = 16, | 2415 | .rlen = 16, |
2390 | }, | 2416 | }, |
2391 | }; | 2417 | }; |
2392 | 2418 | ||
2393 | static struct cipher_testvec aes_cbc_enc_tv_template[] = { | 2419 | static struct cipher_testvec aes_cbc_enc_tv_template[] = { |
2394 | { /* From RFC 3602 */ | 2420 | { /* From RFC 3602 */ |
2395 | .key = { 0x06, 0xa9, 0x21, 0x40, 0x36, 0xb8, 0xa1, 0x5b, | 2421 | .key = "\x06\xa9\x21\x40\x36\xb8\xa1\x5b" |
2396 | 0x51, 0x2e, 0x03, 0xd5, 0x34, 0x12, 0x00, 0x06 }, | 2422 | "\x51\x2e\x03\xd5\x34\x12\x00\x06", |
2397 | .klen = 16, | 2423 | .klen = 16, |
2398 | .iv = { 0x3d, 0xaf, 0xba, 0x42, 0x9d, 0x9e, 0xb4, 0x30, | 2424 | .iv = "\x3d\xaf\xba\x42\x9d\x9e\xb4\x30" |
2399 | 0xb4, 0x22, 0xda, 0x80, 0x2c, 0x9f, 0xac, 0x41 }, | 2425 | "\xb4\x22\xda\x80\x2c\x9f\xac\x41", |
2400 | .input = { "Single block msg" }, | 2426 | .input = "Single block msg", |
2401 | .ilen = 16, | 2427 | .ilen = 16, |
2402 | .result = { 0xe3, 0x53, 0x77, 0x9c, 0x10, 0x79, 0xae, 0xb8, | 2428 | .result = "\xe3\x53\x77\x9c\x10\x79\xae\xb8" |
2403 | 0x27, 0x08, 0x94, 0x2d, 0xbe, 0x77, 0x18, 0x1a }, | 2429 | "\x27\x08\x94\x2d\xbe\x77\x18\x1a", |
2404 | .rlen = 16, | 2430 | .rlen = 16, |
2405 | }, { | 2431 | }, { |
2406 | .key = { 0xc2, 0x86, 0x69, 0x6d, 0x88, 0x7c, 0x9a, 0xa0, | 2432 | .key = "\xc2\x86\x69\x6d\x88\x7c\x9a\xa0" |
2407 | 0x61, 0x1b, 0xbb, 0x3e, 0x20, 0x25, 0xa4, 0x5a }, | 2433 | "\x61\x1b\xbb\x3e\x20\x25\xa4\x5a", |
2408 | .klen = 16, | 2434 | .klen = 16, |
2409 | .iv = { 0x56, 0x2e, 0x17, 0x99, 0x6d, 0x09, 0x3d, 0x28, | 2435 | .iv = "\x56\x2e\x17\x99\x6d\x09\x3d\x28" |
2410 | 0xdd, 0xb3, 0xba, 0x69, 0x5a, 0x2e, 0x6f, 0x58 }, | 2436 | "\xdd\xb3\xba\x69\x5a\x2e\x6f\x58", |
2411 | .input = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2437 | .input = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2412 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 2438 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
2413 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 2439 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
2414 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 2440 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
2415 | .ilen = 32, | 2441 | .ilen = 32, |
2416 | .result = { 0xd2, 0x96, 0xcd, 0x94, 0xc2, 0xcc, 0xcf, 0x8a, | 2442 | .result = "\xd2\x96\xcd\x94\xc2\xcc\xcf\x8a" |
2417 | 0x3a, 0x86, 0x30, 0x28, 0xb5, 0xe1, 0xdc, 0x0a, | 2443 | "\x3a\x86\x30\x28\xb5\xe1\xdc\x0a" |
2418 | 0x75, 0x86, 0x60, 0x2d, 0x25, 0x3c, 0xff, 0xf9, | 2444 | "\x75\x86\x60\x2d\x25\x3c\xff\xf9" |
2419 | 0x1b, 0x82, 0x66, 0xbe, 0xa6, 0xd6, 0x1a, 0xb1 }, | 2445 | "\x1b\x82\x66\xbe\xa6\xd6\x1a\xb1", |
2420 | .rlen = 32, | 2446 | .rlen = 32, |
2421 | }, { /* From NIST SP800-38A */ | 2447 | }, { /* From NIST SP800-38A */ |
2422 | .key = { 0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, | 2448 | .key = "\x8e\x73\xb0\xf7\xda\x0e\x64\x52" |
2423 | 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5, | 2449 | "\xc8\x10\xf3\x2b\x80\x90\x79\xe5" |
2424 | 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b }, | 2450 | "\x62\xf8\xea\xd2\x52\x2c\x6b\x7b", |
2425 | .klen = 24, | 2451 | .klen = 24, |
2426 | .iv = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2452 | .iv = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2427 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2453 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2428 | .input = { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, | 2454 | .input = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96" |
2429 | 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, | 2455 | "\xe9\x3d\x7e\x11\x73\x93\x17\x2a" |
2430 | 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, | 2456 | "\xae\x2d\x8a\x57\x1e\x03\xac\x9c" |
2431 | 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, | 2457 | "\x9e\xb7\x6f\xac\x45\xaf\x8e\x51" |
2432 | 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, | 2458 | "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11" |
2433 | 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, | 2459 | "\xe5\xfb\xc1\x19\x1a\x0a\x52\xef" |
2434 | 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, | 2460 | "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17" |
2435 | 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 }, | 2461 | "\xad\x2b\x41\x7b\xe6\x6c\x37\x10", |
2436 | .ilen = 64, | 2462 | .ilen = 64, |
2437 | .result = { 0x4f, 0x02, 0x1d, 0xb2, 0x43, 0xbc, 0x63, 0x3d, | 2463 | .result = "\x4f\x02\x1d\xb2\x43\xbc\x63\x3d" |
2438 | 0x71, 0x78, 0x18, 0x3a, 0x9f, 0xa0, 0x71, 0xe8, | 2464 | "\x71\x78\x18\x3a\x9f\xa0\x71\xe8" |
2439 | 0xb4, 0xd9, 0xad, 0xa9, 0xad, 0x7d, 0xed, 0xf4, | 2465 | "\xb4\xd9\xad\xa9\xad\x7d\xed\xf4" |
2440 | 0xe5, 0xe7, 0x38, 0x76, 0x3f, 0x69, 0x14, 0x5a, | 2466 | "\xe5\xe7\x38\x76\x3f\x69\x14\x5a" |
2441 | 0x57, 0x1b, 0x24, 0x20, 0x12, 0xfb, 0x7a, 0xe0, | 2467 | "\x57\x1b\x24\x20\x12\xfb\x7a\xe0" |
2442 | 0x7f, 0xa9, 0xba, 0xac, 0x3d, 0xf1, 0x02, 0xe0, | 2468 | "\x7f\xa9\xba\xac\x3d\xf1\x02\xe0" |
2443 | 0x08, 0xb0, 0xe2, 0x79, 0x88, 0x59, 0x88, 0x81, | 2469 | "\x08\xb0\xe2\x79\x88\x59\x88\x81" |
2444 | 0xd9, 0x20, 0xa9, 0xe6, 0x4f, 0x56, 0x15, 0xcd }, | 2470 | "\xd9\x20\xa9\xe6\x4f\x56\x15\xcd", |
2445 | .rlen = 64, | 2471 | .rlen = 64, |
2446 | }, { | 2472 | }, { |
2447 | .key = { 0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, | 2473 | .key = "\x60\x3d\xeb\x10\x15\xca\x71\xbe" |
2448 | 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81, | 2474 | "\x2b\x73\xae\xf0\x85\x7d\x77\x81" |
2449 | 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, | 2475 | "\x1f\x35\x2c\x07\x3b\x61\x08\xd7" |
2450 | 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4 }, | 2476 | "\x2d\x98\x10\xa3\x09\x14\xdf\xf4", |
2451 | .klen = 32, | 2477 | .klen = 32, |
2452 | .iv = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2478 | .iv = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2453 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2479 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2454 | .input = { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, | 2480 | .input = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96" |
2455 | 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, | 2481 | "\xe9\x3d\x7e\x11\x73\x93\x17\x2a" |
2456 | 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, | 2482 | "\xae\x2d\x8a\x57\x1e\x03\xac\x9c" |
2457 | 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, | 2483 | "\x9e\xb7\x6f\xac\x45\xaf\x8e\x51" |
2458 | 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, | 2484 | "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11" |
2459 | 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, | 2485 | "\xe5\xfb\xc1\x19\x1a\x0a\x52\xef" |
2460 | 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, | 2486 | "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17" |
2461 | 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 }, | 2487 | "\xad\x2b\x41\x7b\xe6\x6c\x37\x10", |
2462 | .ilen = 64, | 2488 | .ilen = 64, |
2463 | .result = { 0xf5, 0x8c, 0x4c, 0x04, 0xd6, 0xe5, 0xf1, 0xba, | 2489 | .result = "\xf5\x8c\x4c\x04\xd6\xe5\xf1\xba" |
2464 | 0x77, 0x9e, 0xab, 0xfb, 0x5f, 0x7b, 0xfb, 0xd6, | 2490 | "\x77\x9e\xab\xfb\x5f\x7b\xfb\xd6" |
2465 | 0x9c, 0xfc, 0x4e, 0x96, 0x7e, 0xdb, 0x80, 0x8d, | 2491 | "\x9c\xfc\x4e\x96\x7e\xdb\x80\x8d" |
2466 | 0x67, 0x9f, 0x77, 0x7b, 0xc6, 0x70, 0x2c, 0x7d, | 2492 | "\x67\x9f\x77\x7b\xc6\x70\x2c\x7d" |
2467 | 0x39, 0xf2, 0x33, 0x69, 0xa9, 0xd9, 0xba, 0xcf, | 2493 | "\x39\xf2\x33\x69\xa9\xd9\xba\xcf" |
2468 | 0xa5, 0x30, 0xe2, 0x63, 0x04, 0x23, 0x14, 0x61, | 2494 | "\xa5\x30\xe2\x63\x04\x23\x14\x61" |
2469 | 0xb2, 0xeb, 0x05, 0xe2, 0xc3, 0x9b, 0xe9, 0xfc, | 2495 | "\xb2\xeb\x05\xe2\xc3\x9b\xe9\xfc" |
2470 | 0xda, 0x6c, 0x19, 0x07, 0x8c, 0x6a, 0x9d, 0x1b }, | 2496 | "\xda\x6c\x19\x07\x8c\x6a\x9d\x1b", |
2471 | .rlen = 64, | 2497 | .rlen = 64, |
2472 | }, | 2498 | }, |
2473 | }; | 2499 | }; |
2474 | 2500 | ||
2475 | static struct cipher_testvec aes_cbc_dec_tv_template[] = { | 2501 | static struct cipher_testvec aes_cbc_dec_tv_template[] = { |
2476 | { /* From RFC 3602 */ | 2502 | { /* From RFC 3602 */ |
2477 | .key = { 0x06, 0xa9, 0x21, 0x40, 0x36, 0xb8, 0xa1, 0x5b, | 2503 | .key = "\x06\xa9\x21\x40\x36\xb8\xa1\x5b" |
2478 | 0x51, 0x2e, 0x03, 0xd5, 0x34, 0x12, 0x00, 0x06 }, | 2504 | "\x51\x2e\x03\xd5\x34\x12\x00\x06", |
2479 | .klen = 16, | 2505 | .klen = 16, |
2480 | .iv = { 0x3d, 0xaf, 0xba, 0x42, 0x9d, 0x9e, 0xb4, 0x30, | 2506 | .iv = "\x3d\xaf\xba\x42\x9d\x9e\xb4\x30" |
2481 | 0xb4, 0x22, 0xda, 0x80, 0x2c, 0x9f, 0xac, 0x41 }, | 2507 | "\xb4\x22\xda\x80\x2c\x9f\xac\x41", |
2482 | .input = { 0xe3, 0x53, 0x77, 0x9c, 0x10, 0x79, 0xae, 0xb8, | 2508 | .input = "\xe3\x53\x77\x9c\x10\x79\xae\xb8" |
2483 | 0x27, 0x08, 0x94, 0x2d, 0xbe, 0x77, 0x18, 0x1a }, | 2509 | "\x27\x08\x94\x2d\xbe\x77\x18\x1a", |
2484 | .ilen = 16, | 2510 | .ilen = 16, |
2485 | .result = { "Single block msg" }, | 2511 | .result = "Single block msg", |
2486 | .rlen = 16, | 2512 | .rlen = 16, |
2487 | }, { | 2513 | }, { |
2488 | .key = { 0xc2, 0x86, 0x69, 0x6d, 0x88, 0x7c, 0x9a, 0xa0, | 2514 | .key = "\xc2\x86\x69\x6d\x88\x7c\x9a\xa0" |
2489 | 0x61, 0x1b, 0xbb, 0x3e, 0x20, 0x25, 0xa4, 0x5a }, | 2515 | "\x61\x1b\xbb\x3e\x20\x25\xa4\x5a", |
2490 | .klen = 16, | 2516 | .klen = 16, |
2491 | .iv = { 0x56, 0x2e, 0x17, 0x99, 0x6d, 0x09, 0x3d, 0x28, | 2517 | .iv = "\x56\x2e\x17\x99\x6d\x09\x3d\x28" |
2492 | 0xdd, 0xb3, 0xba, 0x69, 0x5a, 0x2e, 0x6f, 0x58 }, | 2518 | "\xdd\xb3\xba\x69\x5a\x2e\x6f\x58", |
2493 | .input = { 0xd2, 0x96, 0xcd, 0x94, 0xc2, 0xcc, 0xcf, 0x8a, | 2519 | .input = "\xd2\x96\xcd\x94\xc2\xcc\xcf\x8a" |
2494 | 0x3a, 0x86, 0x30, 0x28, 0xb5, 0xe1, 0xdc, 0x0a, | 2520 | "\x3a\x86\x30\x28\xb5\xe1\xdc\x0a" |
2495 | 0x75, 0x86, 0x60, 0x2d, 0x25, 0x3c, 0xff, 0xf9, | 2521 | "\x75\x86\x60\x2d\x25\x3c\xff\xf9" |
2496 | 0x1b, 0x82, 0x66, 0xbe, 0xa6, 0xd6, 0x1a, 0xb1 }, | 2522 | "\x1b\x82\x66\xbe\xa6\xd6\x1a\xb1", |
2497 | .ilen = 32, | 2523 | .ilen = 32, |
2498 | .result = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2524 | .result = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2499 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 2525 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
2500 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 2526 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
2501 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 2527 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
2502 | .rlen = 32, | 2528 | .rlen = 32, |
2503 | }, { /* From NIST SP800-38A */ | 2529 | }, { /* From NIST SP800-38A */ |
2504 | .key = { 0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, | 2530 | .key = "\x8e\x73\xb0\xf7\xda\x0e\x64\x52" |
2505 | 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5, | 2531 | "\xc8\x10\xf3\x2b\x80\x90\x79\xe5" |
2506 | 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b }, | 2532 | "\x62\xf8\xea\xd2\x52\x2c\x6b\x7b", |
2507 | .klen = 24, | 2533 | .klen = 24, |
2508 | .iv = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2534 | .iv = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2509 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2535 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2510 | .input = { 0x4f, 0x02, 0x1d, 0xb2, 0x43, 0xbc, 0x63, 0x3d, | 2536 | .input = "\x4f\x02\x1d\xb2\x43\xbc\x63\x3d" |
2511 | 0x71, 0x78, 0x18, 0x3a, 0x9f, 0xa0, 0x71, 0xe8, | 2537 | "\x71\x78\x18\x3a\x9f\xa0\x71\xe8" |
2512 | 0xb4, 0xd9, 0xad, 0xa9, 0xad, 0x7d, 0xed, 0xf4, | 2538 | "\xb4\xd9\xad\xa9\xad\x7d\xed\xf4" |
2513 | 0xe5, 0xe7, 0x38, 0x76, 0x3f, 0x69, 0x14, 0x5a, | 2539 | "\xe5\xe7\x38\x76\x3f\x69\x14\x5a" |
2514 | 0x57, 0x1b, 0x24, 0x20, 0x12, 0xfb, 0x7a, 0xe0, | 2540 | "\x57\x1b\x24\x20\x12\xfb\x7a\xe0" |
2515 | 0x7f, 0xa9, 0xba, 0xac, 0x3d, 0xf1, 0x02, 0xe0, | 2541 | "\x7f\xa9\xba\xac\x3d\xf1\x02\xe0" |
2516 | 0x08, 0xb0, 0xe2, 0x79, 0x88, 0x59, 0x88, 0x81, | 2542 | "\x08\xb0\xe2\x79\x88\x59\x88\x81" |
2517 | 0xd9, 0x20, 0xa9, 0xe6, 0x4f, 0x56, 0x15, 0xcd }, | 2543 | "\xd9\x20\xa9\xe6\x4f\x56\x15\xcd", |
2518 | .ilen = 64, | 2544 | .ilen = 64, |
2519 | .result = { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, | 2545 | .result = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96" |
2520 | 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, | 2546 | "\xe9\x3d\x7e\x11\x73\x93\x17\x2a" |
2521 | 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, | 2547 | "\xae\x2d\x8a\x57\x1e\x03\xac\x9c" |
2522 | 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, | 2548 | "\x9e\xb7\x6f\xac\x45\xaf\x8e\x51" |
2523 | 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, | 2549 | "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11" |
2524 | 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, | 2550 | "\xe5\xfb\xc1\x19\x1a\x0a\x52\xef" |
2525 | 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, | 2551 | "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17" |
2526 | 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 }, | 2552 | "\xad\x2b\x41\x7b\xe6\x6c\x37\x10", |
2527 | .rlen = 64, | 2553 | .rlen = 64, |
2528 | }, { | 2554 | }, { |
2529 | .key = { 0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, | 2555 | .key = "\x60\x3d\xeb\x10\x15\xca\x71\xbe" |
2530 | 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81, | 2556 | "\x2b\x73\xae\xf0\x85\x7d\x77\x81" |
2531 | 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, | 2557 | "\x1f\x35\x2c\x07\x3b\x61\x08\xd7" |
2532 | 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4 }, | 2558 | "\x2d\x98\x10\xa3\x09\x14\xdf\xf4", |
2533 | .klen = 32, | 2559 | .klen = 32, |
2534 | .iv = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 2560 | .iv = "\x00\x01\x02\x03\x04\x05\x06\x07" |
2535 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 2561 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
2536 | .input = { 0xf5, 0x8c, 0x4c, 0x04, 0xd6, 0xe5, 0xf1, 0xba, | 2562 | .input = "\xf5\x8c\x4c\x04\xd6\xe5\xf1\xba" |
2537 | 0x77, 0x9e, 0xab, 0xfb, 0x5f, 0x7b, 0xfb, 0xd6, | 2563 | "\x77\x9e\xab\xfb\x5f\x7b\xfb\xd6" |
2538 | 0x9c, 0xfc, 0x4e, 0x96, 0x7e, 0xdb, 0x80, 0x8d, | 2564 | "\x9c\xfc\x4e\x96\x7e\xdb\x80\x8d" |
2539 | 0x67, 0x9f, 0x77, 0x7b, 0xc6, 0x70, 0x2c, 0x7d, | 2565 | "\x67\x9f\x77\x7b\xc6\x70\x2c\x7d" |
2540 | 0x39, 0xf2, 0x33, 0x69, 0xa9, 0xd9, 0xba, 0xcf, | 2566 | "\x39\xf2\x33\x69\xa9\xd9\xba\xcf" |
2541 | 0xa5, 0x30, 0xe2, 0x63, 0x04, 0x23, 0x14, 0x61, | 2567 | "\xa5\x30\xe2\x63\x04\x23\x14\x61" |
2542 | 0xb2, 0xeb, 0x05, 0xe2, 0xc3, 0x9b, 0xe9, 0xfc, | 2568 | "\xb2\xeb\x05\xe2\xc3\x9b\xe9\xfc" |
2543 | 0xda, 0x6c, 0x19, 0x07, 0x8c, 0x6a, 0x9d, 0x1b }, | 2569 | "\xda\x6c\x19\x07\x8c\x6a\x9d\x1b", |
2544 | .ilen = 64, | 2570 | .ilen = 64, |
2545 | .result = { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, | 2571 | .result = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96" |
2546 | 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, | 2572 | "\xe9\x3d\x7e\x11\x73\x93\x17\x2a" |
2547 | 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, | 2573 | "\xae\x2d\x8a\x57\x1e\x03\xac\x9c" |
2548 | 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, | 2574 | "\x9e\xb7\x6f\xac\x45\xaf\x8e\x51" |
2549 | 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, | 2575 | "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11" |
2550 | 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, | 2576 | "\xe5\xfb\xc1\x19\x1a\x0a\x52\xef" |
2551 | 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, | 2577 | "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17" |
2552 | 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 }, | 2578 | "\xad\x2b\x41\x7b\xe6\x6c\x37\x10", |
2553 | .rlen = 64, | 2579 | .rlen = 64, |
2554 | }, | 2580 | }, |
2555 | }; | 2581 | }; |
@@ -2557,250 +2583,249 @@ static struct cipher_testvec aes_cbc_dec_tv_template[] = { | |||
2557 | static struct cipher_testvec aes_lrw_enc_tv_template[] = { | 2583 | static struct cipher_testvec aes_lrw_enc_tv_template[] = { |
2558 | /* from http://grouper.ieee.org/groups/1619/email/pdf00017.pdf */ | 2584 | /* from http://grouper.ieee.org/groups/1619/email/pdf00017.pdf */ |
2559 | { /* LRW-32-AES 1 */ | 2585 | { /* LRW-32-AES 1 */ |
2560 | .key = { 0x45, 0x62, 0xac, 0x25, 0xf8, 0x28, 0x17, 0x6d, | 2586 | .key = "\x45\x62\xac\x25\xf8\x28\x17\x6d" |
2561 | 0x4c, 0x26, 0x84, 0x14, 0xb5, 0x68, 0x01, 0x85, | 2587 | "\x4c\x26\x84\x14\xb5\x68\x01\x85" |
2562 | 0x25, 0x8e, 0x2a, 0x05, 0xe7, 0x3e, 0x9d, 0x03, | 2588 | "\x25\x8e\x2a\x05\xe7\x3e\x9d\x03" |
2563 | 0xee, 0x5a, 0x83, 0x0c, 0xcc, 0x09, 0x4c, 0x87 }, | 2589 | "\xee\x5a\x83\x0c\xcc\x09\x4c\x87", |
2564 | .klen = 32, | 2590 | .klen = 32, |
2565 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2591 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2566 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }, | 2592 | "\x00\x00\x00\x00\x00\x00\x00\x01", |
2567 | .input = { 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 2593 | .input = "\x30\x31\x32\x33\x34\x35\x36\x37" |
2568 | 0x38, 0x39, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46 }, | 2594 | "\x38\x39\x41\x42\x43\x44\x45\x46", |
2569 | .ilen = 16, | 2595 | .ilen = 16, |
2570 | .result = { 0xf1, 0xb2, 0x73, 0xcd, 0x65, 0xa3, 0xdf, 0x5f, | 2596 | .result = "\xf1\xb2\x73\xcd\x65\xa3\xdf\x5f" |
2571 | 0xe9, 0x5d, 0x48, 0x92, 0x54, 0x63, 0x4e, 0xb8 }, | 2597 | "\xe9\x5d\x48\x92\x54\x63\x4e\xb8", |
2572 | .rlen = 16, | 2598 | .rlen = 16, |
2573 | }, { /* LRW-32-AES 2 */ | 2599 | }, { /* LRW-32-AES 2 */ |
2574 | .key = { 0x59, 0x70, 0x47, 0x14, 0xf5, 0x57, 0x47, 0x8c, | 2600 | .key = "\x59\x70\x47\x14\xf5\x57\x47\x8c" |
2575 | 0xd7, 0x79, 0xe8, 0x0f, 0x54, 0x88, 0x79, 0x44, | 2601 | "\xd7\x79\xe8\x0f\x54\x88\x79\x44" |
2576 | 0x0d, 0x48, 0xf0, 0xb7, 0xb1, 0x5a, 0x53, 0xea, | 2602 | "\x0d\x48\xf0\xb7\xb1\x5a\x53\xea" |
2577 | 0x1c, 0xaa, 0x6b, 0x29, 0xc2, 0xca, 0xfb, 0xaf | 2603 | "\x1c\xaa\x6b\x29\xc2\xca\xfb\xaf", |
2578 | }, | ||
2579 | .klen = 32, | 2604 | .klen = 32, |
2580 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2605 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2581 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02 }, | 2606 | "\x00\x00\x00\x00\x00\x00\x00\x02", |
2582 | .input = { 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 2607 | .input = "\x30\x31\x32\x33\x34\x35\x36\x37" |
2583 | 0x38, 0x39, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46 }, | 2608 | "\x38\x39\x41\x42\x43\x44\x45\x46", |
2584 | .ilen = 16, | 2609 | .ilen = 16, |
2585 | .result = { 0x00, 0xc8, 0x2b, 0xae, 0x95, 0xbb, 0xcd, 0xe5, | 2610 | .result = "\x00\xc8\x2b\xae\x95\xbb\xcd\xe5" |
2586 | 0x27, 0x4f, 0x07, 0x69, 0xb2, 0x60, 0xe1, 0x36 }, | 2611 | "\x27\x4f\x07\x69\xb2\x60\xe1\x36", |
2587 | .rlen = 16, | 2612 | .rlen = 16, |
2588 | }, { /* LRW-32-AES 3 */ | 2613 | }, { /* LRW-32-AES 3 */ |
2589 | .key = { 0xd8, 0x2a, 0x91, 0x34, 0xb2, 0x6a, 0x56, 0x50, | 2614 | .key = "\xd8\x2a\x91\x34\xb2\x6a\x56\x50" |
2590 | 0x30, 0xfe, 0x69, 0xe2, 0x37, 0x7f, 0x98, 0x47, | 2615 | "\x30\xfe\x69\xe2\x37\x7f\x98\x47" |
2591 | 0xcd, 0xf9, 0x0b, 0x16, 0x0c, 0x64, 0x8f, 0xb6, | 2616 | "\xcd\xf9\x0b\x16\x0c\x64\x8f\xb6" |
2592 | 0xb0, 0x0d, 0x0d, 0x1b, 0xae, 0x85, 0x87, 0x1f }, | 2617 | "\xb0\x0d\x0d\x1b\xae\x85\x87\x1f", |
2593 | .klen = 32, | 2618 | .klen = 32, |
2594 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2619 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2595 | 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00 }, | 2620 | "\x00\x00\x00\x02\x00\x00\x00\x00", |
2596 | .input = { 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 2621 | .input = "\x30\x31\x32\x33\x34\x35\x36\x37" |
2597 | 0x38, 0x39, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46 }, | 2622 | "\x38\x39\x41\x42\x43\x44\x45\x46", |
2598 | .ilen = 16, | 2623 | .ilen = 16, |
2599 | .result = { 0x76, 0x32, 0x21, 0x83, 0xed, 0x8f, 0xf1, 0x82, | 2624 | .result = "\x76\x32\x21\x83\xed\x8f\xf1\x82" |
2600 | 0xf9, 0x59, 0x62, 0x03, 0x69, 0x0e, 0x5e, 0x01 }, | 2625 | "\xf9\x59\x62\x03\x69\x0e\x5e\x01", |
2601 | .rlen = 16, | 2626 | .rlen = 16, |
2602 | }, { /* LRW-32-AES 4 */ | 2627 | }, { /* LRW-32-AES 4 */ |
2603 | .key = { 0x0f, 0x6a, 0xef, 0xf8, 0xd3, 0xd2, 0xbb, 0x15, | 2628 | .key = "\x0f\x6a\xef\xf8\xd3\xd2\xbb\x15" |
2604 | 0x25, 0x83, 0xf7, 0x3c, 0x1f, 0x01, 0x28, 0x74, | 2629 | "\x25\x83\xf7\x3c\x1f\x01\x28\x74" |
2605 | 0xca, 0xc6, 0xbc, 0x35, 0x4d, 0x4a, 0x65, 0x54, | 2630 | "\xca\xc6\xbc\x35\x4d\x4a\x65\x54" |
2606 | 0x90, 0xae, 0x61, 0xcf, 0x7b, 0xae, 0xbd, 0xcc, | 2631 | "\x90\xae\x61\xcf\x7b\xae\xbd\xcc" |
2607 | 0xad, 0xe4, 0x94, 0xc5, 0x4a, 0x29, 0xae, 0x70 }, | 2632 | "\xad\xe4\x94\xc5\x4a\x29\xae\x70", |
2608 | .klen = 40, | 2633 | .klen = 40, |
2609 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2634 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2610 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }, | 2635 | "\x00\x00\x00\x00\x00\x00\x00\x01", |
2611 | .input = { 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 2636 | .input = "\x30\x31\x32\x33\x34\x35\x36\x37" |
2612 | 0x38, 0x39, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46 }, | 2637 | "\x38\x39\x41\x42\x43\x44\x45\x46", |
2613 | .ilen = 16, | 2638 | .ilen = 16, |
2614 | .result = { 0x9c, 0x0f, 0x15, 0x2f, 0x55, 0xa2, 0xd8, 0xf0, | 2639 | .result = "\x9c\x0f\x15\x2f\x55\xa2\xd8\xf0" |
2615 | 0xd6, 0x7b, 0x8f, 0x9e, 0x28, 0x22, 0xbc, 0x41 }, | 2640 | "\xd6\x7b\x8f\x9e\x28\x22\xbc\x41", |
2616 | .rlen = 16, | 2641 | .rlen = 16, |
2617 | }, { /* LRW-32-AES 5 */ | 2642 | }, { /* LRW-32-AES 5 */ |
2618 | .key = { 0x8a, 0xd4, 0xee, 0x10, 0x2f, 0xbd, 0x81, 0xff, | 2643 | .key = "\x8a\xd4\xee\x10\x2f\xbd\x81\xff" |
2619 | 0xf8, 0x86, 0xce, 0xac, 0x93, 0xc5, 0xad, 0xc6, | 2644 | "\xf8\x86\xce\xac\x93\xc5\xad\xc6" |
2620 | 0xa0, 0x19, 0x07, 0xc0, 0x9d, 0xf7, 0xbb, 0xdd, | 2645 | "\xa0\x19\x07\xc0\x9d\xf7\xbb\xdd" |
2621 | 0x52, 0x13, 0xb2, 0xb7, 0xf0, 0xff, 0x11, 0xd8, | 2646 | "\x52\x13\xb2\xb7\xf0\xff\x11\xd8" |
2622 | 0xd6, 0x08, 0xd0, 0xcd, 0x2e, 0xb1, 0x17, 0x6f }, | 2647 | "\xd6\x08\xd0\xcd\x2e\xb1\x17\x6f", |
2623 | .klen = 40, | 2648 | .klen = 40, |
2624 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2649 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2625 | 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00 }, | 2650 | "\x00\x00\x00\x02\x00\x00\x00\x00", |
2626 | .input = { 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 2651 | .input = "\x30\x31\x32\x33\x34\x35\x36\x37" |
2627 | 0x38, 0x39, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46 }, | 2652 | "\x38\x39\x41\x42\x43\x44\x45\x46", |
2628 | .ilen = 16, | 2653 | .ilen = 16, |
2629 | .result = { 0xd4, 0x27, 0x6a, 0x7f, 0x14, 0x91, 0x3d, 0x65, | 2654 | .result = "\xd4\x27\x6a\x7f\x14\x91\x3d\x65" |
2630 | 0xc8, 0x60, 0x48, 0x02, 0x87, 0xe3, 0x34, 0x06 }, | 2655 | "\xc8\x60\x48\x02\x87\xe3\x34\x06", |
2631 | .rlen = 16, | 2656 | .rlen = 16, |
2632 | }, { /* LRW-32-AES 6 */ | 2657 | }, { /* LRW-32-AES 6 */ |
2633 | .key = { 0xf8, 0xd4, 0x76, 0xff, 0xd6, 0x46, 0xee, 0x6c, | 2658 | .key = "\xf8\xd4\x76\xff\xd6\x46\xee\x6c" |
2634 | 0x23, 0x84, 0xcb, 0x1c, 0x77, 0xd6, 0x19, 0x5d, | 2659 | "\x23\x84\xcb\x1c\x77\xd6\x19\x5d" |
2635 | 0xfe, 0xf1, 0xa9, 0xf3, 0x7b, 0xbc, 0x8d, 0x21, | 2660 | "\xfe\xf1\xa9\xf3\x7b\xbc\x8d\x21" |
2636 | 0xa7, 0x9c, 0x21, 0xf8, 0xcb, 0x90, 0x02, 0x89, | 2661 | "\xa7\x9c\x21\xf8\xcb\x90\x02\x89" |
2637 | 0xa8, 0x45, 0x34, 0x8e, 0xc8, 0xc5, 0xb5, 0xf1, | 2662 | "\xa8\x45\x34\x8e\xc8\xc5\xb5\xf1" |
2638 | 0x26, 0xf5, 0x0e, 0x76, 0xfe, 0xfd, 0x1b, 0x1e }, | 2663 | "\x26\xf5\x0e\x76\xfe\xfd\x1b\x1e", |
2639 | .klen = 48, | 2664 | .klen = 48, |
2640 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2665 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2641 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }, | 2666 | "\x00\x00\x00\x00\x00\x00\x00\x01", |
2642 | .input = { 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 2667 | .input = "\x30\x31\x32\x33\x34\x35\x36\x37" |
2643 | 0x38, 0x39, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46 }, | 2668 | "\x38\x39\x41\x42\x43\x44\x45\x46", |
2644 | .ilen = 16, | 2669 | .ilen = 16, |
2645 | .result = { 0xbd, 0x06, 0xb8, 0xe1, 0xdb, 0x98, 0x89, 0x9e, | 2670 | .result = "\xbd\x06\xb8\xe1\xdb\x98\x89\x9e" |
2646 | 0xc4, 0x98, 0xe4, 0x91, 0xcf, 0x1c, 0x70, 0x2b }, | 2671 | "\xc4\x98\xe4\x91\xcf\x1c\x70\x2b", |
2647 | .rlen = 16, | 2672 | .rlen = 16, |
2648 | }, { /* LRW-32-AES 7 */ | 2673 | }, { /* LRW-32-AES 7 */ |
2649 | .key = { 0xfb, 0x76, 0x15, 0xb2, 0x3d, 0x80, 0x89, 0x1d, | 2674 | .key = "\xfb\x76\x15\xb2\x3d\x80\x89\x1d" |
2650 | 0xd4, 0x70, 0x98, 0x0b, 0xc7, 0x95, 0x84, 0xc8, | 2675 | "\xd4\x70\x98\x0b\xc7\x95\x84\xc8" |
2651 | 0xb2, 0xfb, 0x64, 0xce, 0x60, 0x97, 0x87, 0x8d, | 2676 | "\xb2\xfb\x64\xce\x60\x97\x87\x8d" |
2652 | 0x17, 0xfc, 0xe4, 0x5a, 0x49, 0xe8, 0x30, 0xb7, | 2677 | "\x17\xfc\xe4\x5a\x49\xe8\x30\xb7" |
2653 | 0x6e, 0x78, 0x17, 0xe7, 0x2d, 0x5e, 0x12, 0xd4, | 2678 | "\x6e\x78\x17\xe7\x2d\x5e\x12\xd4" |
2654 | 0x60, 0x64, 0x04, 0x7a, 0xf1, 0x2f, 0x9e, 0x0c }, | 2679 | "\x60\x64\x04\x7a\xf1\x2f\x9e\x0c", |
2655 | .klen = 48, | 2680 | .klen = 48, |
2656 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2681 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2657 | 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00 }, | 2682 | "\x00\x00\x00\x02\x00\x00\x00\x00", |
2658 | .input = { 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 2683 | .input = "\x30\x31\x32\x33\x34\x35\x36\x37" |
2659 | 0x38, 0x39, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46 }, | 2684 | "\x38\x39\x41\x42\x43\x44\x45\x46", |
2660 | .ilen = 16, | 2685 | .ilen = 16, |
2661 | .result = { 0x5b, 0x90, 0x8e, 0xc1, 0xab, 0xdd, 0x67, 0x5f, | 2686 | .result = "\x5b\x90\x8e\xc1\xab\xdd\x67\x5f" |
2662 | 0x3d, 0x69, 0x8a, 0x95, 0x53, 0xc8, 0x9c, 0xe5 }, | 2687 | "\x3d\x69\x8a\x95\x53\xc8\x9c\xe5", |
2663 | .rlen = 16, | 2688 | .rlen = 16, |
2664 | }, { | 2689 | }, { |
2665 | /* http://www.mail-archive.com/stds-p1619@listserv.ieee.org/msg00173.html */ | 2690 | /* http://www.mail-archive.com/stds-p1619@listserv.ieee.org/msg00173.html */ |
2666 | .key = { 0xf8, 0xd4, 0x76, 0xff, 0xd6, 0x46, 0xee, 0x6c, | 2691 | .key = "\xf8\xd4\x76\xff\xd6\x46\xee\x6c" |
2667 | 0x23, 0x84, 0xcb, 0x1c, 0x77, 0xd6, 0x19, 0x5d, | 2692 | "\x23\x84\xcb\x1c\x77\xd6\x19\x5d" |
2668 | 0xfe, 0xf1, 0xa9, 0xf3, 0x7b, 0xbc, 0x8d, 0x21, | 2693 | "\xfe\xf1\xa9\xf3\x7b\xbc\x8d\x21" |
2669 | 0xa7, 0x9c, 0x21, 0xf8, 0xcb, 0x90, 0x02, 0x89, | 2694 | "\xa7\x9c\x21\xf8\xcb\x90\x02\x89" |
2670 | 0xa8, 0x45, 0x34, 0x8e, 0xc8, 0xc5, 0xb5, 0xf1, | 2695 | "\xa8\x45\x34\x8e\xc8\xc5\xb5\xf1" |
2671 | 0x26, 0xf5, 0x0e, 0x76, 0xfe, 0xfd, 0x1b, 0x1e }, | 2696 | "\x26\xf5\x0e\x76\xfe\xfd\x1b\x1e", |
2672 | .klen = 48, | 2697 | .klen = 48, |
2673 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2698 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2674 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }, | 2699 | "\x00\x00\x00\x00\x00\x00\x00\x01", |
2675 | .input = { 0x05, 0x11, 0xb7, 0x18, 0xab, 0xc6, 0x2d, 0xac, | 2700 | .input = "\x05\x11\xb7\x18\xab\xc6\x2d\xac" |
2676 | 0x70, 0x5d, 0xf6, 0x22, 0x94, 0xcd, 0xe5, 0x6c, | 2701 | "\x70\x5d\xf6\x22\x94\xcd\xe5\x6c" |
2677 | 0x17, 0x6b, 0xf6, 0x1c, 0xf0, 0xf3, 0x6e, 0xf8, | 2702 | "\x17\x6b\xf6\x1c\xf0\xf3\x6e\xf8" |
2678 | 0x50, 0x38, 0x1f, 0x71, 0x49, 0xb6, 0x57, 0xd6, | 2703 | "\x50\x38\x1f\x71\x49\xb6\x57\xd6" |
2679 | 0x8f, 0xcb, 0x8d, 0x6b, 0xe3, 0xa6, 0x29, 0x90, | 2704 | "\x8f\xcb\x8d\x6b\xe3\xa6\x29\x90" |
2680 | 0xfe, 0x2a, 0x62, 0x82, 0xae, 0x6d, 0x8b, 0xf6, | 2705 | "\xfe\x2a\x62\x82\xae\x6d\x8b\xf6" |
2681 | 0xad, 0x1e, 0x9e, 0x20, 0x5f, 0x38, 0xbe, 0x04, | 2706 | "\xad\x1e\x9e\x20\x5f\x38\xbe\x04" |
2682 | 0xda, 0x10, 0x8e, 0xed, 0xa2, 0xa4, 0x87, 0xab, | 2707 | "\xda\x10\x8e\xed\xa2\xa4\x87\xab" |
2683 | 0xda, 0x6b, 0xb4, 0x0c, 0x75, 0xba, 0xd3, 0x7c, | 2708 | "\xda\x6b\xb4\x0c\x75\xba\xd3\x7c" |
2684 | 0xc9, 0xac, 0x42, 0x31, 0x95, 0x7c, 0xc9, 0x04, | 2709 | "\xc9\xac\x42\x31\x95\x7c\xc9\x04" |
2685 | 0xeb, 0xd5, 0x6e, 0x32, 0x69, 0x8a, 0xdb, 0xa6, | 2710 | "\xeb\xd5\x6e\x32\x69\x8a\xdb\xa6" |
2686 | 0x15, 0xd7, 0x3f, 0x4f, 0x2f, 0x66, 0x69, 0x03, | 2711 | "\x15\xd7\x3f\x4f\x2f\x66\x69\x03" |
2687 | 0x9c, 0x1f, 0x54, 0x0f, 0xde, 0x1f, 0xf3, 0x65, | 2712 | "\x9c\x1f\x54\x0f\xde\x1f\xf3\x65" |
2688 | 0x4c, 0x96, 0x12, 0xed, 0x7c, 0x92, 0x03, 0x01, | 2713 | "\x4c\x96\x12\xed\x7c\x92\x03\x01" |
2689 | 0x6f, 0xbc, 0x35, 0x93, 0xac, 0xf1, 0x27, 0xf1, | 2714 | "\x6f\xbc\x35\x93\xac\xf1\x27\xf1" |
2690 | 0xb4, 0x96, 0x82, 0x5a, 0x5f, 0xb0, 0xa0, 0x50, | 2715 | "\xb4\x96\x82\x5a\x5f\xb0\xa0\x50" |
2691 | 0x89, 0xa4, 0x8e, 0x66, 0x44, 0x85, 0xcc, 0xfd, | 2716 | "\x89\xa4\x8e\x66\x44\x85\xcc\xfd" |
2692 | 0x33, 0x14, 0x70, 0xe3, 0x96, 0xb2, 0xc3, 0xd3, | 2717 | "\x33\x14\x70\xe3\x96\xb2\xc3\xd3" |
2693 | 0xbb, 0x54, 0x5a, 0x1a, 0xf9, 0x74, 0xa2, 0xc5, | 2718 | "\xbb\x54\x5a\x1a\xf9\x74\xa2\xc5" |
2694 | 0x2d, 0x64, 0x75, 0xdd, 0xb4, 0x54, 0xe6, 0x74, | 2719 | "\x2d\x64\x75\xdd\xb4\x54\xe6\x74" |
2695 | 0x8c, 0xd3, 0x9d, 0x9e, 0x86, 0xab, 0x51, 0x53, | 2720 | "\x8c\xd3\x9d\x9e\x86\xab\x51\x53" |
2696 | 0xb7, 0x93, 0x3e, 0x6f, 0xd0, 0x4e, 0x2c, 0x40, | 2721 | "\xb7\x93\x3e\x6f\xd0\x4e\x2c\x40" |
2697 | 0xf6, 0xa8, 0x2e, 0x3e, 0x9d, 0xf4, 0x66, 0xa5, | 2722 | "\xf6\xa8\x2e\x3e\x9d\xf4\x66\xa5" |
2698 | 0x76, 0x12, 0x73, 0x44, 0x1a, 0x56, 0xd7, 0x72, | 2723 | "\x76\x12\x73\x44\x1a\x56\xd7\x72" |
2699 | 0x88, 0xcd, 0x21, 0x8c, 0x4c, 0x0f, 0xfe, 0xda, | 2724 | "\x88\xcd\x21\x8c\x4c\x0f\xfe\xda" |
2700 | 0x95, 0xe0, 0x3a, 0xa6, 0xa5, 0x84, 0x46, 0xcd, | 2725 | "\x95\xe0\x3a\xa6\xa5\x84\x46\xcd" |
2701 | 0xd5, 0x3e, 0x9d, 0x3a, 0xe2, 0x67, 0xe6, 0x60, | 2726 | "\xd5\x3e\x9d\x3a\xe2\x67\xe6\x60" |
2702 | 0x1a, 0xe2, 0x70, 0x85, 0x58, 0xc2, 0x1b, 0x09, | 2727 | "\x1a\xe2\x70\x85\x58\xc2\x1b\x09" |
2703 | 0xe1, 0xd7, 0x2c, 0xca, 0xad, 0xa8, 0x8f, 0xf9, | 2728 | "\xe1\xd7\x2c\xca\xad\xa8\x8f\xf9" |
2704 | 0xac, 0xb3, 0x0e, 0xdb, 0xca, 0x2e, 0xe2, 0xb8, | 2729 | "\xac\xb3\x0e\xdb\xca\x2e\xe2\xb8" |
2705 | 0x51, 0x71, 0xd9, 0x3c, 0x6c, 0xf1, 0x56, 0xf8, | 2730 | "\x51\x71\xd9\x3c\x6c\xf1\x56\xf8" |
2706 | 0xea, 0x9c, 0xf1, 0xfb, 0x0c, 0xe6, 0xb7, 0x10, | 2731 | "\xea\x9c\xf1\xfb\x0c\xe6\xb7\x10" |
2707 | 0x1c, 0xf8, 0xa9, 0x7c, 0xe8, 0x53, 0x35, 0xc1, | 2732 | "\x1c\xf8\xa9\x7c\xe8\x53\x35\xc1" |
2708 | 0x90, 0x3e, 0x76, 0x4a, 0x74, 0xa4, 0x21, 0x2c, | 2733 | "\x90\x3e\x76\x4a\x74\xa4\x21\x2c" |
2709 | 0xf6, 0x2c, 0x4e, 0x0f, 0x94, 0x3a, 0x88, 0x2e, | 2734 | "\xf6\x2c\x4e\x0f\x94\x3a\x88\x2e" |
2710 | 0x41, 0x09, 0x6a, 0x33, 0x7d, 0xf6, 0xdd, 0x3f, | 2735 | "\x41\x09\x6a\x33\x7d\xf6\xdd\x3f" |
2711 | 0x8d, 0x23, 0x31, 0x74, 0x84, 0xeb, 0x88, 0x6e, | 2736 | "\x8d\x23\x31\x74\x84\xeb\x88\x6e" |
2712 | 0xcc, 0xb9, 0xbc, 0x22, 0x83, 0x19, 0x07, 0x22, | 2737 | "\xcc\xb9\xbc\x22\x83\x19\x07\x22" |
2713 | 0xa5, 0x2d, 0xdf, 0xa5, 0xf3, 0x80, 0x85, 0x78, | 2738 | "\xa5\x2d\xdf\xa5\xf3\x80\x85\x78" |
2714 | 0x84, 0x39, 0x6a, 0x6d, 0x6a, 0x99, 0x4f, 0xa5, | 2739 | "\x84\x39\x6a\x6d\x6a\x99\x4f\xa5" |
2715 | 0x15, 0xfe, 0x46, 0xb0, 0xe4, 0x6c, 0xa5, 0x41, | 2740 | "\x15\xfe\x46\xb0\xe4\x6c\xa5\x41" |
2716 | 0x3c, 0xce, 0x8f, 0x42, 0x60, 0x71, 0xa7, 0x75, | 2741 | "\x3c\xce\x8f\x42\x60\x71\xa7\x75" |
2717 | 0x08, 0x40, 0x65, 0x8a, 0x82, 0xbf, 0xf5, 0x43, | 2742 | "\x08\x40\x65\x8a\x82\xbf\xf5\x43" |
2718 | 0x71, 0x96, 0xa9, 0x4d, 0x44, 0x8a, 0x20, 0xbe, | 2743 | "\x71\x96\xa9\x4d\x44\x8a\x20\xbe" |
2719 | 0xfa, 0x4d, 0xbb, 0xc0, 0x7d, 0x31, 0x96, 0x65, | 2744 | "\xfa\x4d\xbb\xc0\x7d\x31\x96\x65" |
2720 | 0xe7, 0x75, 0xe5, 0x3e, 0xfd, 0x92, 0x3b, 0xc9, | 2745 | "\xe7\x75\xe5\x3e\xfd\x92\x3b\xc9" |
2721 | 0x55, 0xbb, 0x16, 0x7e, 0xf7, 0xc2, 0x8c, 0xa4, | 2746 | "\x55\xbb\x16\x7e\xf7\xc2\x8c\xa4" |
2722 | 0x40, 0x1d, 0xe5, 0xef, 0x0e, 0xdf, 0xe4, 0x9a, | 2747 | "\x40\x1d\xe5\xef\x0e\xdf\xe4\x9a" |
2723 | 0x62, 0x73, 0x65, 0xfd, 0x46, 0x63, 0x25, 0x3d, | 2748 | "\x62\x73\x65\xfd\x46\x63\x25\x3d" |
2724 | 0x2b, 0xaf, 0xe5, 0x64, 0xfe, 0xa5, 0x5c, 0xcf, | 2749 | "\x2b\xaf\xe5\x64\xfe\xa5\x5c\xcf" |
2725 | 0x24, 0xf3, 0xb4, 0xac, 0x64, 0xba, 0xdf, 0x4b, | 2750 | "\x24\xf3\xb4\xac\x64\xba\xdf\x4b" |
2726 | 0xc6, 0x96, 0x7d, 0x81, 0x2d, 0x8d, 0x97, 0xf7, | 2751 | "\xc6\x96\x7d\x81\x2d\x8d\x97\xf7" |
2727 | 0xc5, 0x68, 0x77, 0x84, 0x32, 0x2b, 0xcc, 0x85, | 2752 | "\xc5\x68\x77\x84\x32\x2b\xcc\x85" |
2728 | 0x74, 0x96, 0xf0, 0x12, 0x77, 0x61, 0xb9, 0xeb, | 2753 | "\x74\x96\xf0\x12\x77\x61\xb9\xeb" |
2729 | 0x71, 0xaa, 0x82, 0xcb, 0x1c, 0xdb, 0x89, 0xc8, | 2754 | "\x71\xaa\x82\xcb\x1c\xdb\x89\xc8" |
2730 | 0xc6, 0xb5, 0xe3, 0x5c, 0x7d, 0x39, 0x07, 0x24, | 2755 | "\xc6\xb5\xe3\x5c\x7d\x39\x07\x24" |
2731 | 0xda, 0x39, 0x87, 0x45, 0xc0, 0x2b, 0xbb, 0x01, | 2756 | "\xda\x39\x87\x45\xc0\x2b\xbb\x01" |
2732 | 0xac, 0xbc, 0x2a, 0x5c, 0x7f, 0xfc, 0xe8, 0xce, | 2757 | "\xac\xbc\x2a\x5c\x7f\xfc\xe8\xce" |
2733 | 0x6d, 0x9c, 0x6f, 0xed, 0xd3, 0xc1, 0xa1, 0xd6, | 2758 | "\x6d\x9c\x6f\xed\xd3\xc1\xa1\xd6" |
2734 | 0xc5, 0x55, 0xa9, 0x66, 0x2f, 0xe1, 0xc8, 0x32, | 2759 | "\xc5\x55\xa9\x66\x2f\xe1\xc8\x32" |
2735 | 0xa6, 0x5d, 0xa4, 0x3a, 0x98, 0x73, 0xe8, 0x45, | 2760 | "\xa6\x5d\xa4\x3a\x98\x73\xe8\x45" |
2736 | 0xa4, 0xc7, 0xa8, 0xb4, 0xf6, 0x13, 0x03, 0xf6, | 2761 | "\xa4\xc7\xa8\xb4\xf6\x13\x03\xf6" |
2737 | 0xe9, 0x2e, 0xc4, 0x29, 0x0f, 0x84, 0xdb, 0xc4, | 2762 | "\xe9\x2e\xc4\x29\x0f\x84\xdb\xc4" |
2738 | 0x21, 0xc4, 0xc2, 0x75, 0x67, 0x89, 0x37, 0x0a }, | 2763 | "\x21\xc4\xc2\x75\x67\x89\x37\x0a", |
2739 | .ilen = 512, | 2764 | .ilen = 512, |
2740 | .result = { 0x1a, 0x1d, 0xa9, 0x30, 0xad, 0xf9, 0x2f, 0x9b, | 2765 | .result = "\x1a\x1d\xa9\x30\xad\xf9\x2f\x9b" |
2741 | 0xb6, 0x1d, 0xae, 0xef, 0xf0, 0x2f, 0xf8, 0x5a, | 2766 | "\xb6\x1d\xae\xef\xf0\x2f\xf8\x5a" |
2742 | 0x39, 0x3c, 0xbf, 0x2a, 0xb2, 0x45, 0xb2, 0x23, | 2767 | "\x39\x3c\xbf\x2a\xb2\x45\xb2\x23" |
2743 | 0x1b, 0x63, 0x3c, 0xcf, 0xaa, 0xbe, 0xcf, 0x4e, | 2768 | "\x1b\x63\x3c\xcf\xaa\xbe\xcf\x4e" |
2744 | 0xfa, 0xe8, 0x29, 0xc2, 0x20, 0x68, 0x2b, 0x3c, | 2769 | "\xfa\xe8\x29\xc2\x20\x68\x2b\x3c" |
2745 | 0x2e, 0x8b, 0xf7, 0x6e, 0x25, 0xbd, 0xe3, 0x3d, | 2770 | "\x2e\x8b\xf7\x6e\x25\xbd\xe3\x3d" |
2746 | 0x66, 0x27, 0xd6, 0xaf, 0xd6, 0x64, 0x3e, 0xe3, | 2771 | "\x66\x27\xd6\xaf\xd6\x64\x3e\xe3" |
2747 | 0xe8, 0x58, 0x46, 0x97, 0x39, 0x51, 0x07, 0xde, | 2772 | "\xe8\x58\x46\x97\x39\x51\x07\xde" |
2748 | 0xcb, 0x37, 0xbc, 0xa9, 0xc0, 0x5f, 0x75, 0xc3, | 2773 | "\xcb\x37\xbc\xa9\xc0\x5f\x75\xc3" |
2749 | 0x0e, 0x84, 0x23, 0x1d, 0x16, 0xd4, 0x1c, 0x59, | 2774 | "\x0e\x84\x23\x1d\x16\xd4\x1c\x59" |
2750 | 0x9c, 0x1a, 0x02, 0x55, 0xab, 0x3a, 0x97, 0x1d, | 2775 | "\x9c\x1a\x02\x55\xab\x3a\x97\x1d" |
2751 | 0xdf, 0xdd, 0xc7, 0x06, 0x51, 0xd7, 0x70, 0xae, | 2776 | "\xdf\xdd\xc7\x06\x51\xd7\x70\xae" |
2752 | 0x23, 0xc6, 0x8c, 0xf5, 0x1e, 0xa0, 0xe5, 0x82, | 2777 | "\x23\xc6\x8c\xf5\x1e\xa0\xe5\x82" |
2753 | 0xb8, 0xb2, 0xbf, 0x04, 0xa0, 0x32, 0x8e, 0x68, | 2778 | "\xb8\xb2\xbf\x04\xa0\x32\x8e\x68" |
2754 | 0xeb, 0xaf, 0x6e, 0x2d, 0x94, 0x22, 0x2f, 0xce, | 2779 | "\xeb\xaf\x6e\x2d\x94\x22\x2f\xce" |
2755 | 0x4c, 0xb5, 0x59, 0xe2, 0xa2, 0x2f, 0xa0, 0x98, | 2780 | "\x4c\xb5\x59\xe2\xa2\x2f\xa0\x98" |
2756 | 0x1a, 0x97, 0xc6, 0xd4, 0xb5, 0x00, 0x59, 0xf2, | 2781 | "\x1a\x97\xc6\xd4\xb5\x00\x59\xf2" |
2757 | 0x84, 0x14, 0x72, 0xb1, 0x9a, 0x6e, 0xa3, 0x7f, | 2782 | "\x84\x14\x72\xb1\x9a\x6e\xa3\x7f" |
2758 | 0xea, 0x20, 0xe7, 0xcb, 0x65, 0x77, 0x3a, 0xdf, | 2783 | "\xea\x20\xe7\xcb\x65\x77\x3a\xdf" |
2759 | 0xc8, 0x97, 0x67, 0x15, 0xc2, 0x2a, 0x27, 0xcc, | 2784 | "\xc8\x97\x67\x15\xc2\x2a\x27\xcc" |
2760 | 0x18, 0x55, 0xa1, 0x24, 0x0b, 0x24, 0x24, 0xaf, | 2785 | "\x18\x55\xa1\x24\x0b\x24\x24\xaf" |
2761 | 0x5b, 0xec, 0x68, 0xb8, 0xc8, 0xf5, 0xba, 0x63, | 2786 | "\x5b\xec\x68\xb8\xc8\xf5\xba\x63" |
2762 | 0xff, 0xed, 0x89, 0xce, 0xd5, 0x3d, 0x88, 0xf3, | 2787 | "\xff\xed\x89\xce\xd5\x3d\x88\xf3" |
2763 | 0x25, 0xef, 0x05, 0x7c, 0x3a, 0xef, 0xeb, 0xd8, | 2788 | "\x25\xef\x05\x7c\x3a\xef\xeb\xd8" |
2764 | 0x7a, 0x32, 0x0d, 0xd1, 0x1e, 0x58, 0x59, 0x99, | 2789 | "\x7a\x32\x0d\xd1\x1e\x58\x59\x99" |
2765 | 0x90, 0x25, 0xb5, 0x26, 0xb0, 0xe3, 0x2b, 0x6c, | 2790 | "\x90\x25\xb5\x26\xb0\xe3\x2b\x6c" |
2766 | 0x4c, 0xa9, 0x8b, 0x84, 0x4f, 0x5e, 0x01, 0x50, | 2791 | "\x4c\xa9\x8b\x84\x4f\x5e\x01\x50" |
2767 | 0x41, 0x30, 0x58, 0xc5, 0x62, 0x74, 0x52, 0x1d, | 2792 | "\x41\x30\x58\xc5\x62\x74\x52\x1d" |
2768 | 0x45, 0x24, 0x6a, 0x42, 0x64, 0x4f, 0x97, 0x1c, | 2793 | "\x45\x24\x6a\x42\x64\x4f\x97\x1c" |
2769 | 0xa8, 0x66, 0xb5, 0x6d, 0x79, 0xd4, 0x0d, 0x48, | 2794 | "\xa8\x66\xb5\x6d\x79\xd4\x0d\x48" |
2770 | 0xc5, 0x5f, 0xf3, 0x90, 0x32, 0xdd, 0xdd, 0xe1, | 2795 | "\xc5\x5f\xf3\x90\x32\xdd\xdd\xe1" |
2771 | 0xe4, 0xa9, 0x9f, 0xfc, 0xc3, 0x52, 0x5a, 0x46, | 2796 | "\xe4\xa9\x9f\xfc\xc3\x52\x5a\x46" |
2772 | 0xe4, 0x81, 0x84, 0x95, 0x36, 0x59, 0x7a, 0x6b, | 2797 | "\xe4\x81\x84\x95\x36\x59\x7a\x6b" |
2773 | 0xaa, 0xb3, 0x60, 0xad, 0xce, 0x9f, 0x9f, 0x28, | 2798 | "\xaa\xb3\x60\xad\xce\x9f\x9f\x28" |
2774 | 0xe0, 0x01, 0x75, 0x22, 0xc4, 0x4e, 0xa9, 0x62, | 2799 | "\xe0\x01\x75\x22\xc4\x4e\xa9\x62" |
2775 | 0x5c, 0x62, 0x0d, 0x00, 0xcb, 0x13, 0xe8, 0x43, | 2800 | "\x5c\x62\x0d\x00\xcb\x13\xe8\x43" |
2776 | 0x72, 0xd4, 0x2d, 0x53, 0x46, 0xb5, 0xd1, 0x16, | 2801 | "\x72\xd4\x2d\x53\x46\xb5\xd1\x16" |
2777 | 0x22, 0x18, 0xdf, 0x34, 0x33, 0xf5, 0xd6, 0x1c, | 2802 | "\x22\x18\xdf\x34\x33\xf5\xd6\x1c" |
2778 | 0xb8, 0x79, 0x78, 0x97, 0x94, 0xff, 0x72, 0x13, | 2803 | "\xb8\x79\x78\x97\x94\xff\x72\x13" |
2779 | 0x4c, 0x27, 0xfc, 0xcb, 0xbf, 0x01, 0x53, 0xa6, | 2804 | "\x4c\x27\xfc\xcb\xbf\x01\x53\xa6" |
2780 | 0xb4, 0x50, 0x6e, 0xde, 0xdf, 0xb5, 0x43, 0xa4, | 2805 | "\xb4\x50\x6e\xde\xdf\xb5\x43\xa4" |
2781 | 0x59, 0xdf, 0x52, 0xf9, 0x7c, 0xe0, 0x11, 0x6f, | 2806 | "\x59\xdf\x52\xf9\x7c\xe0\x11\x6f" |
2782 | 0x2d, 0x14, 0x8e, 0x24, 0x61, 0x2c, 0xe1, 0x17, | 2807 | "\x2d\x14\x8e\x24\x61\x2c\xe1\x17" |
2783 | 0xcc, 0xce, 0x51, 0x0c, 0x19, 0x8a, 0x82, 0x30, | 2808 | "\xcc\xce\x51\x0c\x19\x8a\x82\x30" |
2784 | 0x94, 0xd5, 0x3d, 0x6a, 0x53, 0x06, 0x5e, 0xbd, | 2809 | "\x94\xd5\x3d\x6a\x53\x06\x5e\xbd" |
2785 | 0xb7, 0xeb, 0xfa, 0xfd, 0x27, 0x51, 0xde, 0x85, | 2810 | "\xb7\xeb\xfa\xfd\x27\x51\xde\x85" |
2786 | 0x1e, 0x86, 0x53, 0x11, 0x53, 0x94, 0x00, 0xee, | 2811 | "\x1e\x86\x53\x11\x53\x94\x00\xee" |
2787 | 0x2b, 0x8c, 0x08, 0x2a, 0xbf, 0xdd, 0xae, 0x11, | 2812 | "\x2b\x8c\x08\x2a\xbf\xdd\xae\x11" |
2788 | 0xcb, 0x1e, 0xa2, 0x07, 0x9a, 0x80, 0xcf, 0x62, | 2813 | "\xcb\x1e\xa2\x07\x9a\x80\xcf\x62" |
2789 | 0x9b, 0x09, 0xdc, 0x95, 0x3c, 0x96, 0x8e, 0xb1, | 2814 | "\x9b\x09\xdc\x95\x3c\x96\x8e\xb1" |
2790 | 0x09, 0xbd, 0xe4, 0xeb, 0xdb, 0xca, 0x70, 0x7a, | 2815 | "\x09\xbd\xe4\xeb\xdb\xca\x70\x7a" |
2791 | 0x9e, 0xfa, 0x31, 0x18, 0x45, 0x3c, 0x21, 0x33, | 2816 | "\x9e\xfa\x31\x18\x45\x3c\x21\x33" |
2792 | 0xb0, 0xb3, 0x2b, 0xea, 0xf3, 0x71, 0x2d, 0xe1, | 2817 | "\xb0\xb3\x2b\xea\xf3\x71\x2d\xe1" |
2793 | 0x03, 0xad, 0x1b, 0x48, 0xd4, 0x67, 0x27, 0xf0, | 2818 | "\x03\xad\x1b\x48\xd4\x67\x27\xf0" |
2794 | 0x62, 0xe4, 0x3d, 0xfb, 0x9b, 0x08, 0x76, 0xe7, | 2819 | "\x62\xe4\x3d\xfb\x9b\x08\x76\xe7" |
2795 | 0xdd, 0x2b, 0x01, 0x39, 0x04, 0x5a, 0x58, 0x7a, | 2820 | "\xdd\x2b\x01\x39\x04\x5a\x58\x7a" |
2796 | 0xf7, 0x11, 0x90, 0xec, 0xbd, 0x51, 0x5c, 0x32, | 2821 | "\xf7\x11\x90\xec\xbd\x51\x5c\x32" |
2797 | 0x6b, 0xd7, 0x35, 0x39, 0x02, 0x6b, 0xf2, 0xa6, | 2822 | "\x6b\xd7\x35\x39\x02\x6b\xf2\xa6" |
2798 | 0xd0, 0x0d, 0x07, 0xe1, 0x06, 0xc4, 0x5b, 0x7d, | 2823 | "\xd0\x0d\x07\xe1\x06\xc4\x5b\x7d" |
2799 | 0xe4, 0x6a, 0xd7, 0xee, 0x15, 0x1f, 0x83, 0xb4, | 2824 | "\xe4\x6a\xd7\xee\x15\x1f\x83\xb4" |
2800 | 0xa3, 0xa7, 0x5e, 0xc3, 0x90, 0xb7, 0xef, 0xd3, | 2825 | "\xa3\xa7\x5e\xc3\x90\xb7\xef\xd3" |
2801 | 0xb7, 0x4f, 0xf8, 0x92, 0x4c, 0xb7, 0x3c, 0x29, | 2826 | "\xb7\x4f\xf8\x92\x4c\xb7\x3c\x29" |
2802 | 0xcd, 0x7e, 0x2b, 0x5d, 0x43, 0xea, 0x42, 0xe7, | 2827 | "\xcd\x7e\x2b\x5d\x43\xea\x42\xe7" |
2803 | 0x74, 0x3f, 0x7d, 0x58, 0x88, 0x75, 0xde, 0x3e }, | 2828 | "\x74\x3f\x7d\x58\x88\x75\xde\x3e", |
2804 | .rlen = 512, | 2829 | .rlen = 512, |
2805 | } | 2830 | } |
2806 | }; | 2831 | }; |
@@ -2809,250 +2834,249 @@ static struct cipher_testvec aes_lrw_dec_tv_template[] = { | |||
2809 | /* from http://grouper.ieee.org/groups/1619/email/pdf00017.pdf */ | 2834 | /* from http://grouper.ieee.org/groups/1619/email/pdf00017.pdf */ |
2810 | /* same as enc vectors with input and result reversed */ | 2835 | /* same as enc vectors with input and result reversed */ |
2811 | { /* LRW-32-AES 1 */ | 2836 | { /* LRW-32-AES 1 */ |
2812 | .key = { 0x45, 0x62, 0xac, 0x25, 0xf8, 0x28, 0x17, 0x6d, | 2837 | .key = "\x45\x62\xac\x25\xf8\x28\x17\x6d" |
2813 | 0x4c, 0x26, 0x84, 0x14, 0xb5, 0x68, 0x01, 0x85, | 2838 | "\x4c\x26\x84\x14\xb5\x68\x01\x85" |
2814 | 0x25, 0x8e, 0x2a, 0x05, 0xe7, 0x3e, 0x9d, 0x03, | 2839 | "\x25\x8e\x2a\x05\xe7\x3e\x9d\x03" |
2815 | 0xee, 0x5a, 0x83, 0x0c, 0xcc, 0x09, 0x4c, 0x87 }, | 2840 | "\xee\x5a\x83\x0c\xcc\x09\x4c\x87", |
2816 | .klen = 32, | 2841 | .klen = 32, |
2817 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2842 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2818 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }, | 2843 | "\x00\x00\x00\x00\x00\x00\x00\x01", |
2819 | .input = { 0xf1, 0xb2, 0x73, 0xcd, 0x65, 0xa3, 0xdf, 0x5f, | 2844 | .input = "\xf1\xb2\x73\xcd\x65\xa3\xdf\x5f" |
2820 | 0xe9, 0x5d, 0x48, 0x92, 0x54, 0x63, 0x4e, 0xb8 }, | 2845 | "\xe9\x5d\x48\x92\x54\x63\x4e\xb8", |
2821 | .ilen = 16, | 2846 | .ilen = 16, |
2822 | .result = { 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 2847 | .result = "\x30\x31\x32\x33\x34\x35\x36\x37" |
2823 | 0x38, 0x39, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46 }, | 2848 | "\x38\x39\x41\x42\x43\x44\x45\x46", |
2824 | .rlen = 16, | 2849 | .rlen = 16, |
2825 | }, { /* LRW-32-AES 2 */ | 2850 | }, { /* LRW-32-AES 2 */ |
2826 | .key = { 0x59, 0x70, 0x47, 0x14, 0xf5, 0x57, 0x47, 0x8c, | 2851 | .key = "\x59\x70\x47\x14\xf5\x57\x47\x8c" |
2827 | 0xd7, 0x79, 0xe8, 0x0f, 0x54, 0x88, 0x79, 0x44, | 2852 | "\xd7\x79\xe8\x0f\x54\x88\x79\x44" |
2828 | 0x0d, 0x48, 0xf0, 0xb7, 0xb1, 0x5a, 0x53, 0xea, | 2853 | "\x0d\x48\xf0\xb7\xb1\x5a\x53\xea" |
2829 | 0x1c, 0xaa, 0x6b, 0x29, 0xc2, 0xca, 0xfb, 0xaf | 2854 | "\x1c\xaa\x6b\x29\xc2\xca\xfb\xaf", |
2830 | }, | ||
2831 | .klen = 32, | 2855 | .klen = 32, |
2832 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2856 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2833 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02 }, | 2857 | "\x00\x00\x00\x00\x00\x00\x00\x02", |
2834 | .input = { 0x00, 0xc8, 0x2b, 0xae, 0x95, 0xbb, 0xcd, 0xe5, | 2858 | .input = "\x00\xc8\x2b\xae\x95\xbb\xcd\xe5" |
2835 | 0x27, 0x4f, 0x07, 0x69, 0xb2, 0x60, 0xe1, 0x36 }, | 2859 | "\x27\x4f\x07\x69\xb2\x60\xe1\x36", |
2836 | .ilen = 16, | 2860 | .ilen = 16, |
2837 | .result = { 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 2861 | .result = "\x30\x31\x32\x33\x34\x35\x36\x37" |
2838 | 0x38, 0x39, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46 }, | 2862 | "\x38\x39\x41\x42\x43\x44\x45\x46", |
2839 | .rlen = 16, | 2863 | .rlen = 16, |
2840 | }, { /* LRW-32-AES 3 */ | 2864 | }, { /* LRW-32-AES 3 */ |
2841 | .key = { 0xd8, 0x2a, 0x91, 0x34, 0xb2, 0x6a, 0x56, 0x50, | 2865 | .key = "\xd8\x2a\x91\x34\xb2\x6a\x56\x50" |
2842 | 0x30, 0xfe, 0x69, 0xe2, 0x37, 0x7f, 0x98, 0x47, | 2866 | "\x30\xfe\x69\xe2\x37\x7f\x98\x47" |
2843 | 0xcd, 0xf9, 0x0b, 0x16, 0x0c, 0x64, 0x8f, 0xb6, | 2867 | "\xcd\xf9\x0b\x16\x0c\x64\x8f\xb6" |
2844 | 0xb0, 0x0d, 0x0d, 0x1b, 0xae, 0x85, 0x87, 0x1f }, | 2868 | "\xb0\x0d\x0d\x1b\xae\x85\x87\x1f", |
2845 | .klen = 32, | 2869 | .klen = 32, |
2846 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2870 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2847 | 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00 }, | 2871 | "\x00\x00\x00\x02\x00\x00\x00\x00", |
2848 | .input = { 0x76, 0x32, 0x21, 0x83, 0xed, 0x8f, 0xf1, 0x82, | 2872 | .input = "\x76\x32\x21\x83\xed\x8f\xf1\x82" |
2849 | 0xf9, 0x59, 0x62, 0x03, 0x69, 0x0e, 0x5e, 0x01 }, | 2873 | "\xf9\x59\x62\x03\x69\x0e\x5e\x01", |
2850 | .ilen = 16, | 2874 | .ilen = 16, |
2851 | .result = { 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 2875 | .result = "\x30\x31\x32\x33\x34\x35\x36\x37" |
2852 | 0x38, 0x39, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46 }, | 2876 | "\x38\x39\x41\x42\x43\x44\x45\x46", |
2853 | .rlen = 16, | 2877 | .rlen = 16, |
2854 | }, { /* LRW-32-AES 4 */ | 2878 | }, { /* LRW-32-AES 4 */ |
2855 | .key = { 0x0f, 0x6a, 0xef, 0xf8, 0xd3, 0xd2, 0xbb, 0x15, | 2879 | .key = "\x0f\x6a\xef\xf8\xd3\xd2\xbb\x15" |
2856 | 0x25, 0x83, 0xf7, 0x3c, 0x1f, 0x01, 0x28, 0x74, | 2880 | "\x25\x83\xf7\x3c\x1f\x01\x28\x74" |
2857 | 0xca, 0xc6, 0xbc, 0x35, 0x4d, 0x4a, 0x65, 0x54, | 2881 | "\xca\xc6\xbc\x35\x4d\x4a\x65\x54" |
2858 | 0x90, 0xae, 0x61, 0xcf, 0x7b, 0xae, 0xbd, 0xcc, | 2882 | "\x90\xae\x61\xcf\x7b\xae\xbd\xcc" |
2859 | 0xad, 0xe4, 0x94, 0xc5, 0x4a, 0x29, 0xae, 0x70 }, | 2883 | "\xad\xe4\x94\xc5\x4a\x29\xae\x70", |
2860 | .klen = 40, | 2884 | .klen = 40, |
2861 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2885 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2862 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }, | 2886 | "\x00\x00\x00\x00\x00\x00\x00\x01", |
2863 | .input = { 0x9c, 0x0f, 0x15, 0x2f, 0x55, 0xa2, 0xd8, 0xf0, | 2887 | .input = "\x9c\x0f\x15\x2f\x55\xa2\xd8\xf0" |
2864 | 0xd6, 0x7b, 0x8f, 0x9e, 0x28, 0x22, 0xbc, 0x41 }, | 2888 | "\xd6\x7b\x8f\x9e\x28\x22\xbc\x41", |
2865 | .ilen = 16, | 2889 | .ilen = 16, |
2866 | .result = { 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 2890 | .result = "\x30\x31\x32\x33\x34\x35\x36\x37" |
2867 | 0x38, 0x39, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46 }, | 2891 | "\x38\x39\x41\x42\x43\x44\x45\x46", |
2868 | .rlen = 16, | 2892 | .rlen = 16, |
2869 | }, { /* LRW-32-AES 5 */ | 2893 | }, { /* LRW-32-AES 5 */ |
2870 | .key = { 0x8a, 0xd4, 0xee, 0x10, 0x2f, 0xbd, 0x81, 0xff, | 2894 | .key = "\x8a\xd4\xee\x10\x2f\xbd\x81\xff" |
2871 | 0xf8, 0x86, 0xce, 0xac, 0x93, 0xc5, 0xad, 0xc6, | 2895 | "\xf8\x86\xce\xac\x93\xc5\xad\xc6" |
2872 | 0xa0, 0x19, 0x07, 0xc0, 0x9d, 0xf7, 0xbb, 0xdd, | 2896 | "\xa0\x19\x07\xc0\x9d\xf7\xbb\xdd" |
2873 | 0x52, 0x13, 0xb2, 0xb7, 0xf0, 0xff, 0x11, 0xd8, | 2897 | "\x52\x13\xb2\xb7\xf0\xff\x11\xd8" |
2874 | 0xd6, 0x08, 0xd0, 0xcd, 0x2e, 0xb1, 0x17, 0x6f }, | 2898 | "\xd6\x08\xd0\xcd\x2e\xb1\x17\x6f", |
2875 | .klen = 40, | 2899 | .klen = 40, |
2876 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2900 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2877 | 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00 }, | 2901 | "\x00\x00\x00\x02\x00\x00\x00\x00", |
2878 | .input = { 0xd4, 0x27, 0x6a, 0x7f, 0x14, 0x91, 0x3d, 0x65, | 2902 | .input = "\xd4\x27\x6a\x7f\x14\x91\x3d\x65" |
2879 | 0xc8, 0x60, 0x48, 0x02, 0x87, 0xe3, 0x34, 0x06 }, | 2903 | "\xc8\x60\x48\x02\x87\xe3\x34\x06", |
2880 | .ilen = 16, | 2904 | .ilen = 16, |
2881 | .result = { 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 2905 | .result = "\x30\x31\x32\x33\x34\x35\x36\x37" |
2882 | 0x38, 0x39, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46 }, | 2906 | "\x38\x39\x41\x42\x43\x44\x45\x46", |
2883 | .rlen = 16, | 2907 | .rlen = 16, |
2884 | }, { /* LRW-32-AES 6 */ | 2908 | }, { /* LRW-32-AES 6 */ |
2885 | .key = { 0xf8, 0xd4, 0x76, 0xff, 0xd6, 0x46, 0xee, 0x6c, | 2909 | .key = "\xf8\xd4\x76\xff\xd6\x46\xee\x6c" |
2886 | 0x23, 0x84, 0xcb, 0x1c, 0x77, 0xd6, 0x19, 0x5d, | 2910 | "\x23\x84\xcb\x1c\x77\xd6\x19\x5d" |
2887 | 0xfe, 0xf1, 0xa9, 0xf3, 0x7b, 0xbc, 0x8d, 0x21, | 2911 | "\xfe\xf1\xa9\xf3\x7b\xbc\x8d\x21" |
2888 | 0xa7, 0x9c, 0x21, 0xf8, 0xcb, 0x90, 0x02, 0x89, | 2912 | "\xa7\x9c\x21\xf8\xcb\x90\x02\x89" |
2889 | 0xa8, 0x45, 0x34, 0x8e, 0xc8, 0xc5, 0xb5, 0xf1, | 2913 | "\xa8\x45\x34\x8e\xc8\xc5\xb5\xf1" |
2890 | 0x26, 0xf5, 0x0e, 0x76, 0xfe, 0xfd, 0x1b, 0x1e }, | 2914 | "\x26\xf5\x0e\x76\xfe\xfd\x1b\x1e", |
2891 | .klen = 48, | 2915 | .klen = 48, |
2892 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2916 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2893 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }, | 2917 | "\x00\x00\x00\x00\x00\x00\x00\x01", |
2894 | .input = { 0xbd, 0x06, 0xb8, 0xe1, 0xdb, 0x98, 0x89, 0x9e, | 2918 | .input = "\xbd\x06\xb8\xe1\xdb\x98\x89\x9e" |
2895 | 0xc4, 0x98, 0xe4, 0x91, 0xcf, 0x1c, 0x70, 0x2b }, | 2919 | "\xc4\x98\xe4\x91\xcf\x1c\x70\x2b", |
2896 | .ilen = 16, | 2920 | .ilen = 16, |
2897 | .result = { 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 2921 | .result = "\x30\x31\x32\x33\x34\x35\x36\x37" |
2898 | 0x38, 0x39, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46 }, | 2922 | "\x38\x39\x41\x42\x43\x44\x45\x46", |
2899 | .rlen = 16, | 2923 | .rlen = 16, |
2900 | }, { /* LRW-32-AES 7 */ | 2924 | }, { /* LRW-32-AES 7 */ |
2901 | .key = { 0xfb, 0x76, 0x15, 0xb2, 0x3d, 0x80, 0x89, 0x1d, | 2925 | .key = "\xfb\x76\x15\xb2\x3d\x80\x89\x1d" |
2902 | 0xd4, 0x70, 0x98, 0x0b, 0xc7, 0x95, 0x84, 0xc8, | 2926 | "\xd4\x70\x98\x0b\xc7\x95\x84\xc8" |
2903 | 0xb2, 0xfb, 0x64, 0xce, 0x60, 0x97, 0x87, 0x8d, | 2927 | "\xb2\xfb\x64\xce\x60\x97\x87\x8d" |
2904 | 0x17, 0xfc, 0xe4, 0x5a, 0x49, 0xe8, 0x30, 0xb7, | 2928 | "\x17\xfc\xe4\x5a\x49\xe8\x30\xb7" |
2905 | 0x6e, 0x78, 0x17, 0xe7, 0x2d, 0x5e, 0x12, 0xd4, | 2929 | "\x6e\x78\x17\xe7\x2d\x5e\x12\xd4" |
2906 | 0x60, 0x64, 0x04, 0x7a, 0xf1, 0x2f, 0x9e, 0x0c }, | 2930 | "\x60\x64\x04\x7a\xf1\x2f\x9e\x0c", |
2907 | .klen = 48, | 2931 | .klen = 48, |
2908 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2932 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2909 | 0x00, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00 }, | 2933 | "\x00\x00\x00\x02\x00\x00\x00\x00", |
2910 | .input = { 0x5b, 0x90, 0x8e, 0xc1, 0xab, 0xdd, 0x67, 0x5f, | 2934 | .input = "\x5b\x90\x8e\xc1\xab\xdd\x67\x5f" |
2911 | 0x3d, 0x69, 0x8a, 0x95, 0x53, 0xc8, 0x9c, 0xe5 }, | 2935 | "\x3d\x69\x8a\x95\x53\xc8\x9c\xe5", |
2912 | .ilen = 16, | 2936 | .ilen = 16, |
2913 | .result = { 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 2937 | .result = "\x30\x31\x32\x33\x34\x35\x36\x37" |
2914 | 0x38, 0x39, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46 }, | 2938 | "\x38\x39\x41\x42\x43\x44\x45\x46", |
2915 | .rlen = 16, | 2939 | .rlen = 16, |
2916 | }, { | 2940 | }, { |
2917 | /* http://www.mail-archive.com/stds-p1619@listserv.ieee.org/msg00173.html */ | 2941 | /* http://www.mail-archive.com/stds-p1619@listserv.ieee.org/msg00173.html */ |
2918 | .key = { 0xf8, 0xd4, 0x76, 0xff, 0xd6, 0x46, 0xee, 0x6c, | 2942 | .key = "\xf8\xd4\x76\xff\xd6\x46\xee\x6c" |
2919 | 0x23, 0x84, 0xcb, 0x1c, 0x77, 0xd6, 0x19, 0x5d, | 2943 | "\x23\x84\xcb\x1c\x77\xd6\x19\x5d" |
2920 | 0xfe, 0xf1, 0xa9, 0xf3, 0x7b, 0xbc, 0x8d, 0x21, | 2944 | "\xfe\xf1\xa9\xf3\x7b\xbc\x8d\x21" |
2921 | 0xa7, 0x9c, 0x21, 0xf8, 0xcb, 0x90, 0x02, 0x89, | 2945 | "\xa7\x9c\x21\xf8\xcb\x90\x02\x89" |
2922 | 0xa8, 0x45, 0x34, 0x8e, 0xc8, 0xc5, 0xb5, 0xf1, | 2946 | "\xa8\x45\x34\x8e\xc8\xc5\xb5\xf1" |
2923 | 0x26, 0xf5, 0x0e, 0x76, 0xfe, 0xfd, 0x1b, 0x1e }, | 2947 | "\x26\xf5\x0e\x76\xfe\xfd\x1b\x1e", |
2924 | .klen = 48, | 2948 | .klen = 48, |
2925 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 2949 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
2926 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }, | 2950 | "\x00\x00\x00\x00\x00\x00\x00\x01", |
2927 | .input = { 0x1a, 0x1d, 0xa9, 0x30, 0xad, 0xf9, 0x2f, 0x9b, | 2951 | .input = "\x1a\x1d\xa9\x30\xad\xf9\x2f\x9b" |
2928 | 0xb6, 0x1d, 0xae, 0xef, 0xf0, 0x2f, 0xf8, 0x5a, | 2952 | "\xb6\x1d\xae\xef\xf0\x2f\xf8\x5a" |
2929 | 0x39, 0x3c, 0xbf, 0x2a, 0xb2, 0x45, 0xb2, 0x23, | 2953 | "\x39\x3c\xbf\x2a\xb2\x45\xb2\x23" |
2930 | 0x1b, 0x63, 0x3c, 0xcf, 0xaa, 0xbe, 0xcf, 0x4e, | 2954 | "\x1b\x63\x3c\xcf\xaa\xbe\xcf\x4e" |
2931 | 0xfa, 0xe8, 0x29, 0xc2, 0x20, 0x68, 0x2b, 0x3c, | 2955 | "\xfa\xe8\x29\xc2\x20\x68\x2b\x3c" |
2932 | 0x2e, 0x8b, 0xf7, 0x6e, 0x25, 0xbd, 0xe3, 0x3d, | 2956 | "\x2e\x8b\xf7\x6e\x25\xbd\xe3\x3d" |
2933 | 0x66, 0x27, 0xd6, 0xaf, 0xd6, 0x64, 0x3e, 0xe3, | 2957 | "\x66\x27\xd6\xaf\xd6\x64\x3e\xe3" |
2934 | 0xe8, 0x58, 0x46, 0x97, 0x39, 0x51, 0x07, 0xde, | 2958 | "\xe8\x58\x46\x97\x39\x51\x07\xde" |
2935 | 0xcb, 0x37, 0xbc, 0xa9, 0xc0, 0x5f, 0x75, 0xc3, | 2959 | "\xcb\x37\xbc\xa9\xc0\x5f\x75\xc3" |
2936 | 0x0e, 0x84, 0x23, 0x1d, 0x16, 0xd4, 0x1c, 0x59, | 2960 | "\x0e\x84\x23\x1d\x16\xd4\x1c\x59" |
2937 | 0x9c, 0x1a, 0x02, 0x55, 0xab, 0x3a, 0x97, 0x1d, | 2961 | "\x9c\x1a\x02\x55\xab\x3a\x97\x1d" |
2938 | 0xdf, 0xdd, 0xc7, 0x06, 0x51, 0xd7, 0x70, 0xae, | 2962 | "\xdf\xdd\xc7\x06\x51\xd7\x70\xae" |
2939 | 0x23, 0xc6, 0x8c, 0xf5, 0x1e, 0xa0, 0xe5, 0x82, | 2963 | "\x23\xc6\x8c\xf5\x1e\xa0\xe5\x82" |
2940 | 0xb8, 0xb2, 0xbf, 0x04, 0xa0, 0x32, 0x8e, 0x68, | 2964 | "\xb8\xb2\xbf\x04\xa0\x32\x8e\x68" |
2941 | 0xeb, 0xaf, 0x6e, 0x2d, 0x94, 0x22, 0x2f, 0xce, | 2965 | "\xeb\xaf\x6e\x2d\x94\x22\x2f\xce" |
2942 | 0x4c, 0xb5, 0x59, 0xe2, 0xa2, 0x2f, 0xa0, 0x98, | 2966 | "\x4c\xb5\x59\xe2\xa2\x2f\xa0\x98" |
2943 | 0x1a, 0x97, 0xc6, 0xd4, 0xb5, 0x00, 0x59, 0xf2, | 2967 | "\x1a\x97\xc6\xd4\xb5\x00\x59\xf2" |
2944 | 0x84, 0x14, 0x72, 0xb1, 0x9a, 0x6e, 0xa3, 0x7f, | 2968 | "\x84\x14\x72\xb1\x9a\x6e\xa3\x7f" |
2945 | 0xea, 0x20, 0xe7, 0xcb, 0x65, 0x77, 0x3a, 0xdf, | 2969 | "\xea\x20\xe7\xcb\x65\x77\x3a\xdf" |
2946 | 0xc8, 0x97, 0x67, 0x15, 0xc2, 0x2a, 0x27, 0xcc, | 2970 | "\xc8\x97\x67\x15\xc2\x2a\x27\xcc" |
2947 | 0x18, 0x55, 0xa1, 0x24, 0x0b, 0x24, 0x24, 0xaf, | 2971 | "\x18\x55\xa1\x24\x0b\x24\x24\xaf" |
2948 | 0x5b, 0xec, 0x68, 0xb8, 0xc8, 0xf5, 0xba, 0x63, | 2972 | "\x5b\xec\x68\xb8\xc8\xf5\xba\x63" |
2949 | 0xff, 0xed, 0x89, 0xce, 0xd5, 0x3d, 0x88, 0xf3, | 2973 | "\xff\xed\x89\xce\xd5\x3d\x88\xf3" |
2950 | 0x25, 0xef, 0x05, 0x7c, 0x3a, 0xef, 0xeb, 0xd8, | 2974 | "\x25\xef\x05\x7c\x3a\xef\xeb\xd8" |
2951 | 0x7a, 0x32, 0x0d, 0xd1, 0x1e, 0x58, 0x59, 0x99, | 2975 | "\x7a\x32\x0d\xd1\x1e\x58\x59\x99" |
2952 | 0x90, 0x25, 0xb5, 0x26, 0xb0, 0xe3, 0x2b, 0x6c, | 2976 | "\x90\x25\xb5\x26\xb0\xe3\x2b\x6c" |
2953 | 0x4c, 0xa9, 0x8b, 0x84, 0x4f, 0x5e, 0x01, 0x50, | 2977 | "\x4c\xa9\x8b\x84\x4f\x5e\x01\x50" |
2954 | 0x41, 0x30, 0x58, 0xc5, 0x62, 0x74, 0x52, 0x1d, | 2978 | "\x41\x30\x58\xc5\x62\x74\x52\x1d" |
2955 | 0x45, 0x24, 0x6a, 0x42, 0x64, 0x4f, 0x97, 0x1c, | 2979 | "\x45\x24\x6a\x42\x64\x4f\x97\x1c" |
2956 | 0xa8, 0x66, 0xb5, 0x6d, 0x79, 0xd4, 0x0d, 0x48, | 2980 | "\xa8\x66\xb5\x6d\x79\xd4\x0d\x48" |
2957 | 0xc5, 0x5f, 0xf3, 0x90, 0x32, 0xdd, 0xdd, 0xe1, | 2981 | "\xc5\x5f\xf3\x90\x32\xdd\xdd\xe1" |
2958 | 0xe4, 0xa9, 0x9f, 0xfc, 0xc3, 0x52, 0x5a, 0x46, | 2982 | "\xe4\xa9\x9f\xfc\xc3\x52\x5a\x46" |
2959 | 0xe4, 0x81, 0x84, 0x95, 0x36, 0x59, 0x7a, 0x6b, | 2983 | "\xe4\x81\x84\x95\x36\x59\x7a\x6b" |
2960 | 0xaa, 0xb3, 0x60, 0xad, 0xce, 0x9f, 0x9f, 0x28, | 2984 | "\xaa\xb3\x60\xad\xce\x9f\x9f\x28" |
2961 | 0xe0, 0x01, 0x75, 0x22, 0xc4, 0x4e, 0xa9, 0x62, | 2985 | "\xe0\x01\x75\x22\xc4\x4e\xa9\x62" |
2962 | 0x5c, 0x62, 0x0d, 0x00, 0xcb, 0x13, 0xe8, 0x43, | 2986 | "\x5c\x62\x0d\x00\xcb\x13\xe8\x43" |
2963 | 0x72, 0xd4, 0x2d, 0x53, 0x46, 0xb5, 0xd1, 0x16, | 2987 | "\x72\xd4\x2d\x53\x46\xb5\xd1\x16" |
2964 | 0x22, 0x18, 0xdf, 0x34, 0x33, 0xf5, 0xd6, 0x1c, | 2988 | "\x22\x18\xdf\x34\x33\xf5\xd6\x1c" |
2965 | 0xb8, 0x79, 0x78, 0x97, 0x94, 0xff, 0x72, 0x13, | 2989 | "\xb8\x79\x78\x97\x94\xff\x72\x13" |
2966 | 0x4c, 0x27, 0xfc, 0xcb, 0xbf, 0x01, 0x53, 0xa6, | 2990 | "\x4c\x27\xfc\xcb\xbf\x01\x53\xa6" |
2967 | 0xb4, 0x50, 0x6e, 0xde, 0xdf, 0xb5, 0x43, 0xa4, | 2991 | "\xb4\x50\x6e\xde\xdf\xb5\x43\xa4" |
2968 | 0x59, 0xdf, 0x52, 0xf9, 0x7c, 0xe0, 0x11, 0x6f, | 2992 | "\x59\xdf\x52\xf9\x7c\xe0\x11\x6f" |
2969 | 0x2d, 0x14, 0x8e, 0x24, 0x61, 0x2c, 0xe1, 0x17, | 2993 | "\x2d\x14\x8e\x24\x61\x2c\xe1\x17" |
2970 | 0xcc, 0xce, 0x51, 0x0c, 0x19, 0x8a, 0x82, 0x30, | 2994 | "\xcc\xce\x51\x0c\x19\x8a\x82\x30" |
2971 | 0x94, 0xd5, 0x3d, 0x6a, 0x53, 0x06, 0x5e, 0xbd, | 2995 | "\x94\xd5\x3d\x6a\x53\x06\x5e\xbd" |
2972 | 0xb7, 0xeb, 0xfa, 0xfd, 0x27, 0x51, 0xde, 0x85, | 2996 | "\xb7\xeb\xfa\xfd\x27\x51\xde\x85" |
2973 | 0x1e, 0x86, 0x53, 0x11, 0x53, 0x94, 0x00, 0xee, | 2997 | "\x1e\x86\x53\x11\x53\x94\x00\xee" |
2974 | 0x2b, 0x8c, 0x08, 0x2a, 0xbf, 0xdd, 0xae, 0x11, | 2998 | "\x2b\x8c\x08\x2a\xbf\xdd\xae\x11" |
2975 | 0xcb, 0x1e, 0xa2, 0x07, 0x9a, 0x80, 0xcf, 0x62, | 2999 | "\xcb\x1e\xa2\x07\x9a\x80\xcf\x62" |
2976 | 0x9b, 0x09, 0xdc, 0x95, 0x3c, 0x96, 0x8e, 0xb1, | 3000 | "\x9b\x09\xdc\x95\x3c\x96\x8e\xb1" |
2977 | 0x09, 0xbd, 0xe4, 0xeb, 0xdb, 0xca, 0x70, 0x7a, | 3001 | "\x09\xbd\xe4\xeb\xdb\xca\x70\x7a" |
2978 | 0x9e, 0xfa, 0x31, 0x18, 0x45, 0x3c, 0x21, 0x33, | 3002 | "\x9e\xfa\x31\x18\x45\x3c\x21\x33" |
2979 | 0xb0, 0xb3, 0x2b, 0xea, 0xf3, 0x71, 0x2d, 0xe1, | 3003 | "\xb0\xb3\x2b\xea\xf3\x71\x2d\xe1" |
2980 | 0x03, 0xad, 0x1b, 0x48, 0xd4, 0x67, 0x27, 0xf0, | 3004 | "\x03\xad\x1b\x48\xd4\x67\x27\xf0" |
2981 | 0x62, 0xe4, 0x3d, 0xfb, 0x9b, 0x08, 0x76, 0xe7, | 3005 | "\x62\xe4\x3d\xfb\x9b\x08\x76\xe7" |
2982 | 0xdd, 0x2b, 0x01, 0x39, 0x04, 0x5a, 0x58, 0x7a, | 3006 | "\xdd\x2b\x01\x39\x04\x5a\x58\x7a" |
2983 | 0xf7, 0x11, 0x90, 0xec, 0xbd, 0x51, 0x5c, 0x32, | 3007 | "\xf7\x11\x90\xec\xbd\x51\x5c\x32" |
2984 | 0x6b, 0xd7, 0x35, 0x39, 0x02, 0x6b, 0xf2, 0xa6, | 3008 | "\x6b\xd7\x35\x39\x02\x6b\xf2\xa6" |
2985 | 0xd0, 0x0d, 0x07, 0xe1, 0x06, 0xc4, 0x5b, 0x7d, | 3009 | "\xd0\x0d\x07\xe1\x06\xc4\x5b\x7d" |
2986 | 0xe4, 0x6a, 0xd7, 0xee, 0x15, 0x1f, 0x83, 0xb4, | 3010 | "\xe4\x6a\xd7\xee\x15\x1f\x83\xb4" |
2987 | 0xa3, 0xa7, 0x5e, 0xc3, 0x90, 0xb7, 0xef, 0xd3, | 3011 | "\xa3\xa7\x5e\xc3\x90\xb7\xef\xd3" |
2988 | 0xb7, 0x4f, 0xf8, 0x92, 0x4c, 0xb7, 0x3c, 0x29, | 3012 | "\xb7\x4f\xf8\x92\x4c\xb7\x3c\x29" |
2989 | 0xcd, 0x7e, 0x2b, 0x5d, 0x43, 0xea, 0x42, 0xe7, | 3013 | "\xcd\x7e\x2b\x5d\x43\xea\x42\xe7" |
2990 | 0x74, 0x3f, 0x7d, 0x58, 0x88, 0x75, 0xde, 0x3e }, | 3014 | "\x74\x3f\x7d\x58\x88\x75\xde\x3e", |
2991 | .ilen = 512, | 3015 | .ilen = 512, |
2992 | .result = { 0x05, 0x11, 0xb7, 0x18, 0xab, 0xc6, 0x2d, 0xac, | 3016 | .result = "\x05\x11\xb7\x18\xab\xc6\x2d\xac" |
2993 | 0x70, 0x5d, 0xf6, 0x22, 0x94, 0xcd, 0xe5, 0x6c, | 3017 | "\x70\x5d\xf6\x22\x94\xcd\xe5\x6c" |
2994 | 0x17, 0x6b, 0xf6, 0x1c, 0xf0, 0xf3, 0x6e, 0xf8, | 3018 | "\x17\x6b\xf6\x1c\xf0\xf3\x6e\xf8" |
2995 | 0x50, 0x38, 0x1f, 0x71, 0x49, 0xb6, 0x57, 0xd6, | 3019 | "\x50\x38\x1f\x71\x49\xb6\x57\xd6" |
2996 | 0x8f, 0xcb, 0x8d, 0x6b, 0xe3, 0xa6, 0x29, 0x90, | 3020 | "\x8f\xcb\x8d\x6b\xe3\xa6\x29\x90" |
2997 | 0xfe, 0x2a, 0x62, 0x82, 0xae, 0x6d, 0x8b, 0xf6, | 3021 | "\xfe\x2a\x62\x82\xae\x6d\x8b\xf6" |
2998 | 0xad, 0x1e, 0x9e, 0x20, 0x5f, 0x38, 0xbe, 0x04, | 3022 | "\xad\x1e\x9e\x20\x5f\x38\xbe\x04" |
2999 | 0xda, 0x10, 0x8e, 0xed, 0xa2, 0xa4, 0x87, 0xab, | 3023 | "\xda\x10\x8e\xed\xa2\xa4\x87\xab" |
3000 | 0xda, 0x6b, 0xb4, 0x0c, 0x75, 0xba, 0xd3, 0x7c, | 3024 | "\xda\x6b\xb4\x0c\x75\xba\xd3\x7c" |
3001 | 0xc9, 0xac, 0x42, 0x31, 0x95, 0x7c, 0xc9, 0x04, | 3025 | "\xc9\xac\x42\x31\x95\x7c\xc9\x04" |
3002 | 0xeb, 0xd5, 0x6e, 0x32, 0x69, 0x8a, 0xdb, 0xa6, | 3026 | "\xeb\xd5\x6e\x32\x69\x8a\xdb\xa6" |
3003 | 0x15, 0xd7, 0x3f, 0x4f, 0x2f, 0x66, 0x69, 0x03, | 3027 | "\x15\xd7\x3f\x4f\x2f\x66\x69\x03" |
3004 | 0x9c, 0x1f, 0x54, 0x0f, 0xde, 0x1f, 0xf3, 0x65, | 3028 | "\x9c\x1f\x54\x0f\xde\x1f\xf3\x65" |
3005 | 0x4c, 0x96, 0x12, 0xed, 0x7c, 0x92, 0x03, 0x01, | 3029 | "\x4c\x96\x12\xed\x7c\x92\x03\x01" |
3006 | 0x6f, 0xbc, 0x35, 0x93, 0xac, 0xf1, 0x27, 0xf1, | 3030 | "\x6f\xbc\x35\x93\xac\xf1\x27\xf1" |
3007 | 0xb4, 0x96, 0x82, 0x5a, 0x5f, 0xb0, 0xa0, 0x50, | 3031 | "\xb4\x96\x82\x5a\x5f\xb0\xa0\x50" |
3008 | 0x89, 0xa4, 0x8e, 0x66, 0x44, 0x85, 0xcc, 0xfd, | 3032 | "\x89\xa4\x8e\x66\x44\x85\xcc\xfd" |
3009 | 0x33, 0x14, 0x70, 0xe3, 0x96, 0xb2, 0xc3, 0xd3, | 3033 | "\x33\x14\x70\xe3\x96\xb2\xc3\xd3" |
3010 | 0xbb, 0x54, 0x5a, 0x1a, 0xf9, 0x74, 0xa2, 0xc5, | 3034 | "\xbb\x54\x5a\x1a\xf9\x74\xa2\xc5" |
3011 | 0x2d, 0x64, 0x75, 0xdd, 0xb4, 0x54, 0xe6, 0x74, | 3035 | "\x2d\x64\x75\xdd\xb4\x54\xe6\x74" |
3012 | 0x8c, 0xd3, 0x9d, 0x9e, 0x86, 0xab, 0x51, 0x53, | 3036 | "\x8c\xd3\x9d\x9e\x86\xab\x51\x53" |
3013 | 0xb7, 0x93, 0x3e, 0x6f, 0xd0, 0x4e, 0x2c, 0x40, | 3037 | "\xb7\x93\x3e\x6f\xd0\x4e\x2c\x40" |
3014 | 0xf6, 0xa8, 0x2e, 0x3e, 0x9d, 0xf4, 0x66, 0xa5, | 3038 | "\xf6\xa8\x2e\x3e\x9d\xf4\x66\xa5" |
3015 | 0x76, 0x12, 0x73, 0x44, 0x1a, 0x56, 0xd7, 0x72, | 3039 | "\x76\x12\x73\x44\x1a\x56\xd7\x72" |
3016 | 0x88, 0xcd, 0x21, 0x8c, 0x4c, 0x0f, 0xfe, 0xda, | 3040 | "\x88\xcd\x21\x8c\x4c\x0f\xfe\xda" |
3017 | 0x95, 0xe0, 0x3a, 0xa6, 0xa5, 0x84, 0x46, 0xcd, | 3041 | "\x95\xe0\x3a\xa6\xa5\x84\x46\xcd" |
3018 | 0xd5, 0x3e, 0x9d, 0x3a, 0xe2, 0x67, 0xe6, 0x60, | 3042 | "\xd5\x3e\x9d\x3a\xe2\x67\xe6\x60" |
3019 | 0x1a, 0xe2, 0x70, 0x85, 0x58, 0xc2, 0x1b, 0x09, | 3043 | "\x1a\xe2\x70\x85\x58\xc2\x1b\x09" |
3020 | 0xe1, 0xd7, 0x2c, 0xca, 0xad, 0xa8, 0x8f, 0xf9, | 3044 | "\xe1\xd7\x2c\xca\xad\xa8\x8f\xf9" |
3021 | 0xac, 0xb3, 0x0e, 0xdb, 0xca, 0x2e, 0xe2, 0xb8, | 3045 | "\xac\xb3\x0e\xdb\xca\x2e\xe2\xb8" |
3022 | 0x51, 0x71, 0xd9, 0x3c, 0x6c, 0xf1, 0x56, 0xf8, | 3046 | "\x51\x71\xd9\x3c\x6c\xf1\x56\xf8" |
3023 | 0xea, 0x9c, 0xf1, 0xfb, 0x0c, 0xe6, 0xb7, 0x10, | 3047 | "\xea\x9c\xf1\xfb\x0c\xe6\xb7\x10" |
3024 | 0x1c, 0xf8, 0xa9, 0x7c, 0xe8, 0x53, 0x35, 0xc1, | 3048 | "\x1c\xf8\xa9\x7c\xe8\x53\x35\xc1" |
3025 | 0x90, 0x3e, 0x76, 0x4a, 0x74, 0xa4, 0x21, 0x2c, | 3049 | "\x90\x3e\x76\x4a\x74\xa4\x21\x2c" |
3026 | 0xf6, 0x2c, 0x4e, 0x0f, 0x94, 0x3a, 0x88, 0x2e, | 3050 | "\xf6\x2c\x4e\x0f\x94\x3a\x88\x2e" |
3027 | 0x41, 0x09, 0x6a, 0x33, 0x7d, 0xf6, 0xdd, 0x3f, | 3051 | "\x41\x09\x6a\x33\x7d\xf6\xdd\x3f" |
3028 | 0x8d, 0x23, 0x31, 0x74, 0x84, 0xeb, 0x88, 0x6e, | 3052 | "\x8d\x23\x31\x74\x84\xeb\x88\x6e" |
3029 | 0xcc, 0xb9, 0xbc, 0x22, 0x83, 0x19, 0x07, 0x22, | 3053 | "\xcc\xb9\xbc\x22\x83\x19\x07\x22" |
3030 | 0xa5, 0x2d, 0xdf, 0xa5, 0xf3, 0x80, 0x85, 0x78, | 3054 | "\xa5\x2d\xdf\xa5\xf3\x80\x85\x78" |
3031 | 0x84, 0x39, 0x6a, 0x6d, 0x6a, 0x99, 0x4f, 0xa5, | 3055 | "\x84\x39\x6a\x6d\x6a\x99\x4f\xa5" |
3032 | 0x15, 0xfe, 0x46, 0xb0, 0xe4, 0x6c, 0xa5, 0x41, | 3056 | "\x15\xfe\x46\xb0\xe4\x6c\xa5\x41" |
3033 | 0x3c, 0xce, 0x8f, 0x42, 0x60, 0x71, 0xa7, 0x75, | 3057 | "\x3c\xce\x8f\x42\x60\x71\xa7\x75" |
3034 | 0x08, 0x40, 0x65, 0x8a, 0x82, 0xbf, 0xf5, 0x43, | 3058 | "\x08\x40\x65\x8a\x82\xbf\xf5\x43" |
3035 | 0x71, 0x96, 0xa9, 0x4d, 0x44, 0x8a, 0x20, 0xbe, | 3059 | "\x71\x96\xa9\x4d\x44\x8a\x20\xbe" |
3036 | 0xfa, 0x4d, 0xbb, 0xc0, 0x7d, 0x31, 0x96, 0x65, | 3060 | "\xfa\x4d\xbb\xc0\x7d\x31\x96\x65" |
3037 | 0xe7, 0x75, 0xe5, 0x3e, 0xfd, 0x92, 0x3b, 0xc9, | 3061 | "\xe7\x75\xe5\x3e\xfd\x92\x3b\xc9" |
3038 | 0x55, 0xbb, 0x16, 0x7e, 0xf7, 0xc2, 0x8c, 0xa4, | 3062 | "\x55\xbb\x16\x7e\xf7\xc2\x8c\xa4" |
3039 | 0x40, 0x1d, 0xe5, 0xef, 0x0e, 0xdf, 0xe4, 0x9a, | 3063 | "\x40\x1d\xe5\xef\x0e\xdf\xe4\x9a" |
3040 | 0x62, 0x73, 0x65, 0xfd, 0x46, 0x63, 0x25, 0x3d, | 3064 | "\x62\x73\x65\xfd\x46\x63\x25\x3d" |
3041 | 0x2b, 0xaf, 0xe5, 0x64, 0xfe, 0xa5, 0x5c, 0xcf, | 3065 | "\x2b\xaf\xe5\x64\xfe\xa5\x5c\xcf" |
3042 | 0x24, 0xf3, 0xb4, 0xac, 0x64, 0xba, 0xdf, 0x4b, | 3066 | "\x24\xf3\xb4\xac\x64\xba\xdf\x4b" |
3043 | 0xc6, 0x96, 0x7d, 0x81, 0x2d, 0x8d, 0x97, 0xf7, | 3067 | "\xc6\x96\x7d\x81\x2d\x8d\x97\xf7" |
3044 | 0xc5, 0x68, 0x77, 0x84, 0x32, 0x2b, 0xcc, 0x85, | 3068 | "\xc5\x68\x77\x84\x32\x2b\xcc\x85" |
3045 | 0x74, 0x96, 0xf0, 0x12, 0x77, 0x61, 0xb9, 0xeb, | 3069 | "\x74\x96\xf0\x12\x77\x61\xb9\xeb" |
3046 | 0x71, 0xaa, 0x82, 0xcb, 0x1c, 0xdb, 0x89, 0xc8, | 3070 | "\x71\xaa\x82\xcb\x1c\xdb\x89\xc8" |
3047 | 0xc6, 0xb5, 0xe3, 0x5c, 0x7d, 0x39, 0x07, 0x24, | 3071 | "\xc6\xb5\xe3\x5c\x7d\x39\x07\x24" |
3048 | 0xda, 0x39, 0x87, 0x45, 0xc0, 0x2b, 0xbb, 0x01, | 3072 | "\xda\x39\x87\x45\xc0\x2b\xbb\x01" |
3049 | 0xac, 0xbc, 0x2a, 0x5c, 0x7f, 0xfc, 0xe8, 0xce, | 3073 | "\xac\xbc\x2a\x5c\x7f\xfc\xe8\xce" |
3050 | 0x6d, 0x9c, 0x6f, 0xed, 0xd3, 0xc1, 0xa1, 0xd6, | 3074 | "\x6d\x9c\x6f\xed\xd3\xc1\xa1\xd6" |
3051 | 0xc5, 0x55, 0xa9, 0x66, 0x2f, 0xe1, 0xc8, 0x32, | 3075 | "\xc5\x55\xa9\x66\x2f\xe1\xc8\x32" |
3052 | 0xa6, 0x5d, 0xa4, 0x3a, 0x98, 0x73, 0xe8, 0x45, | 3076 | "\xa6\x5d\xa4\x3a\x98\x73\xe8\x45" |
3053 | 0xa4, 0xc7, 0xa8, 0xb4, 0xf6, 0x13, 0x03, 0xf6, | 3077 | "\xa4\xc7\xa8\xb4\xf6\x13\x03\xf6" |
3054 | 0xe9, 0x2e, 0xc4, 0x29, 0x0f, 0x84, 0xdb, 0xc4, | 3078 | "\xe9\x2e\xc4\x29\x0f\x84\xdb\xc4" |
3055 | 0x21, 0xc4, 0xc2, 0x75, 0x67, 0x89, 0x37, 0x0a }, | 3079 | "\x21\xc4\xc2\x75\x67\x89\x37\x0a", |
3056 | .rlen = 512, | 3080 | .rlen = 512, |
3057 | } | 3081 | } |
3058 | }; | 3082 | }; |
@@ -3060,196 +3084,196 @@ static struct cipher_testvec aes_lrw_dec_tv_template[] = { | |||
3060 | static struct cipher_testvec aes_xts_enc_tv_template[] = { | 3084 | static struct cipher_testvec aes_xts_enc_tv_template[] = { |
3061 | /* http://grouper.ieee.org/groups/1619/email/pdf00086.pdf */ | 3085 | /* http://grouper.ieee.org/groups/1619/email/pdf00086.pdf */ |
3062 | { /* XTS-AES 1 */ | 3086 | { /* XTS-AES 1 */ |
3063 | .key = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3087 | .key = "\x00\x00\x00\x00\x00\x00\x00\x00" |
3064 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3088 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
3065 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3089 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
3066 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 3090 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
3067 | .klen = 32, | 3091 | .klen = 32, |
3068 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3092 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
3069 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 3093 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
3070 | .input = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3094 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00" |
3071 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3095 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
3072 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3096 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
3073 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 3097 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
3074 | .ilen = 32, | 3098 | .ilen = 32, |
3075 | .result = { 0x91, 0x7c, 0xf6, 0x9e, 0xbd, 0x68, 0xb2, 0xec, | 3099 | .result = "\x91\x7c\xf6\x9e\xbd\x68\xb2\xec" |
3076 | 0x9b, 0x9f, 0xe9, 0xa3, 0xea, 0xdd, 0xa6, 0x92, | 3100 | "\x9b\x9f\xe9\xa3\xea\xdd\xa6\x92" |
3077 | 0xcd, 0x43, 0xd2, 0xf5, 0x95, 0x98, 0xed, 0x85, | 3101 | "\xcd\x43\xd2\xf5\x95\x98\xed\x85" |
3078 | 0x8c, 0x02, 0xc2, 0x65, 0x2f, 0xbf, 0x92, 0x2e }, | 3102 | "\x8c\x02\xc2\x65\x2f\xbf\x92\x2e", |
3079 | .rlen = 32, | 3103 | .rlen = 32, |
3080 | }, { /* XTS-AES 2 */ | 3104 | }, { /* XTS-AES 2 */ |
3081 | .key = { 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, | 3105 | .key = "\x11\x11\x11\x11\x11\x11\x11\x11" |
3082 | 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, | 3106 | "\x11\x11\x11\x11\x11\x11\x11\x11" |
3083 | 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, | 3107 | "\x22\x22\x22\x22\x22\x22\x22\x22" |
3084 | 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22 }, | 3108 | "\x22\x22\x22\x22\x22\x22\x22\x22", |
3085 | .klen = 32, | 3109 | .klen = 32, |
3086 | .iv = { 0x33, 0x33, 0x33, 0x33, 0x33, 0x00, 0x00, 0x00, | 3110 | .iv = "\x33\x33\x33\x33\x33\x00\x00\x00" |
3087 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 3111 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
3088 | .input = { 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, | 3112 | .input = "\x44\x44\x44\x44\x44\x44\x44\x44" |
3089 | 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, | 3113 | "\x44\x44\x44\x44\x44\x44\x44\x44" |
3090 | 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, | 3114 | "\x44\x44\x44\x44\x44\x44\x44\x44" |
3091 | 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44 }, | 3115 | "\x44\x44\x44\x44\x44\x44\x44\x44", |
3092 | .ilen = 32, | 3116 | .ilen = 32, |
3093 | .result = { 0xc4, 0x54, 0x18, 0x5e, 0x6a, 0x16, 0x93, 0x6e, | 3117 | .result = "\xc4\x54\x18\x5e\x6a\x16\x93\x6e" |
3094 | 0x39, 0x33, 0x40, 0x38, 0xac, 0xef, 0x83, 0x8b, | 3118 | "\x39\x33\x40\x38\xac\xef\x83\x8b" |
3095 | 0xfb, 0x18, 0x6f, 0xff, 0x74, 0x80, 0xad, 0xc4, | 3119 | "\xfb\x18\x6f\xff\x74\x80\xad\xc4" |
3096 | 0x28, 0x93, 0x82, 0xec, 0xd6, 0xd3, 0x94, 0xf0 }, | 3120 | "\x28\x93\x82\xec\xd6\xd3\x94\xf0", |
3097 | .rlen = 32, | 3121 | .rlen = 32, |
3098 | }, { /* XTS-AES 3 */ | 3122 | }, { /* XTS-AES 3 */ |
3099 | .key = { 0xff, 0xfe, 0xfd, 0xfc, 0xfb, 0xfa, 0xf9, 0xf8, | 3123 | .key = "\xff\xfe\xfd\xfc\xfb\xfa\xf9\xf8" |
3100 | 0xf7, 0xf6, 0xf5, 0xf4, 0xf3, 0xf2, 0xf1, 0xf0, | 3124 | "\xf7\xf6\xf5\xf4\xf3\xf2\xf1\xf0" |
3101 | 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, | 3125 | "\x22\x22\x22\x22\x22\x22\x22\x22" |
3102 | 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22 }, | 3126 | "\x22\x22\x22\x22\x22\x22\x22\x22", |
3103 | .klen = 32, | 3127 | .klen = 32, |
3104 | .iv = { 0x33, 0x33, 0x33, 0x33, 0x33, 0x00, 0x00, 0x00, | 3128 | .iv = "\x33\x33\x33\x33\x33\x00\x00\x00" |
3105 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 3129 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
3106 | .input = { 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, | 3130 | .input = "\x44\x44\x44\x44\x44\x44\x44\x44" |
3107 | 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, | 3131 | "\x44\x44\x44\x44\x44\x44\x44\x44" |
3108 | 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, | 3132 | "\x44\x44\x44\x44\x44\x44\x44\x44" |
3109 | 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44 }, | 3133 | "\x44\x44\x44\x44\x44\x44\x44\x44", |
3110 | .ilen = 32, | 3134 | .ilen = 32, |
3111 | .result = { 0xaf, 0x85, 0x33, 0x6b, 0x59, 0x7a, 0xfc, 0x1a, | 3135 | .result = "\xaf\x85\x33\x6b\x59\x7a\xfc\x1a" |
3112 | 0x90, 0x0b, 0x2e, 0xb2, 0x1e, 0xc9, 0x49, 0xd2, | 3136 | "\x90\x0b\x2e\xb2\x1e\xc9\x49\xd2" |
3113 | 0x92, 0xdf, 0x4c, 0x04, 0x7e, 0x0b, 0x21, 0x53, | 3137 | "\x92\xdf\x4c\x04\x7e\x0b\x21\x53" |
3114 | 0x21, 0x86, 0xa5, 0x97, 0x1a, 0x22, 0x7a, 0x89 }, | 3138 | "\x21\x86\xa5\x97\x1a\x22\x7a\x89", |
3115 | .rlen = 32, | 3139 | .rlen = 32, |
3116 | }, { /* XTS-AES 4 */ | 3140 | }, { /* XTS-AES 4 */ |
3117 | .key = { 0x27, 0x18, 0x28, 0x18, 0x28, 0x45, 0x90, 0x45, | 3141 | .key = "\x27\x18\x28\x18\x28\x45\x90\x45" |
3118 | 0x23, 0x53, 0x60, 0x28, 0x74, 0x71, 0x35, 0x26, | 3142 | "\x23\x53\x60\x28\x74\x71\x35\x26" |
3119 | 0x31, 0x41, 0x59, 0x26, 0x53, 0x58, 0x97, 0x93, | 3143 | "\x31\x41\x59\x26\x53\x58\x97\x93" |
3120 | 0x23, 0x84, 0x62, 0x64, 0x33, 0x83, 0x27, 0x95 }, | 3144 | "\x23\x84\x62\x64\x33\x83\x27\x95", |
3121 | .klen = 32, | 3145 | .klen = 32, |
3122 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3146 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
3123 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 3147 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
3124 | .input = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 3148 | .input = "\x00\x01\x02\x03\x04\x05\x06\x07" |
3125 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 3149 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
3126 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 3150 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
3127 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, | 3151 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f" |
3128 | 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, | 3152 | "\x20\x21\x22\x23\x24\x25\x26\x27" |
3129 | 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, | 3153 | "\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f" |
3130 | 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 3154 | "\x30\x31\x32\x33\x34\x35\x36\x37" |
3131 | 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, | 3155 | "\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f" |
3132 | 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, | 3156 | "\x40\x41\x42\x43\x44\x45\x46\x47" |
3133 | 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, | 3157 | "\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f" |
3134 | 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, | 3158 | "\x50\x51\x52\x53\x54\x55\x56\x57" |
3135 | 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, | 3159 | "\x58\x59\x5a\x5b\x5c\x5d\x5e\x5f" |
3136 | 0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, | 3160 | "\x60\x61\x62\x63\x64\x65\x66\x67" |
3137 | 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, | 3161 | "\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f" |
3138 | 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, | 3162 | "\x70\x71\x72\x73\x74\x75\x76\x77" |
3139 | 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, | 3163 | "\x78\x79\x7a\x7b\x7c\x7d\x7e\x7f" |
3140 | 0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, | 3164 | "\x80\x81\x82\x83\x84\x85\x86\x87" |
3141 | 0x88, 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f, | 3165 | "\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f" |
3142 | 0x90, 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, | 3166 | "\x90\x91\x92\x93\x94\x95\x96\x97" |
3143 | 0x98, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f, | 3167 | "\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f" |
3144 | 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7, | 3168 | "\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7" |
3145 | 0xa8, 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf, | 3169 | "\xa8\xa9\xaa\xab\xac\xad\xae\xaf" |
3146 | 0xb0, 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7, | 3170 | "\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7" |
3147 | 0xb8, 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf, | 3171 | "\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf" |
3148 | 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, | 3172 | "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" |
3149 | 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf, | 3173 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf" |
3150 | 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, | 3174 | "\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7" |
3151 | 0xd8, 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, | 3175 | "\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf" |
3152 | 0xe0, 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7, | 3176 | "\xe0\xe1\xe2\xe3\xe4\xe5\xe6\xe7" |
3153 | 0xe8, 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef, | 3177 | "\xe8\xe9\xea\xeb\xec\xed\xee\xef" |
3154 | 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, | 3178 | "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7" |
3155 | 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff, | 3179 | "\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff" |
3156 | 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 3180 | "\x00\x01\x02\x03\x04\x05\x06\x07" |
3157 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 3181 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
3158 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 3182 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
3159 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, | 3183 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f" |
3160 | 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, | 3184 | "\x20\x21\x22\x23\x24\x25\x26\x27" |
3161 | 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, | 3185 | "\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f" |
3162 | 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 3186 | "\x30\x31\x32\x33\x34\x35\x36\x37" |
3163 | 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, | 3187 | "\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f" |
3164 | 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, | 3188 | "\x40\x41\x42\x43\x44\x45\x46\x47" |
3165 | 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, | 3189 | "\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f" |
3166 | 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, | 3190 | "\x50\x51\x52\x53\x54\x55\x56\x57" |
3167 | 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, | 3191 | "\x58\x59\x5a\x5b\x5c\x5d\x5e\x5f" |
3168 | 0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, | 3192 | "\x60\x61\x62\x63\x64\x65\x66\x67" |
3169 | 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, | 3193 | "\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f" |
3170 | 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, | 3194 | "\x70\x71\x72\x73\x74\x75\x76\x77" |
3171 | 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, | 3195 | "\x78\x79\x7a\x7b\x7c\x7d\x7e\x7f" |
3172 | 0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, | 3196 | "\x80\x81\x82\x83\x84\x85\x86\x87" |
3173 | 0x88, 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f, | 3197 | "\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f" |
3174 | 0x90, 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, | 3198 | "\x90\x91\x92\x93\x94\x95\x96\x97" |
3175 | 0x98, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f, | 3199 | "\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f" |
3176 | 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7, | 3200 | "\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7" |
3177 | 0xa8, 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf, | 3201 | "\xa8\xa9\xaa\xab\xac\xad\xae\xaf" |
3178 | 0xb0, 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7, | 3202 | "\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7" |
3179 | 0xb8, 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf, | 3203 | "\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf" |
3180 | 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, | 3204 | "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" |
3181 | 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf, | 3205 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf" |
3182 | 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, | 3206 | "\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7" |
3183 | 0xd8, 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, | 3207 | "\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf" |
3184 | 0xe0, 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7, | 3208 | "\xe0\xe1\xe2\xe3\xe4\xe5\xe6\xe7" |
3185 | 0xe8, 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef, | 3209 | "\xe8\xe9\xea\xeb\xec\xed\xee\xef" |
3186 | 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, | 3210 | "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7" |
3187 | 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff }, | 3211 | "\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff", |
3188 | .ilen = 512, | 3212 | .ilen = 512, |
3189 | .result = { 0x27, 0xa7, 0x47, 0x9b, 0xef, 0xa1, 0xd4, 0x76, | 3213 | .result = "\x27\xa7\x47\x9b\xef\xa1\xd4\x76" |
3190 | 0x48, 0x9f, 0x30, 0x8c, 0xd4, 0xcf, 0xa6, 0xe2, | 3214 | "\x48\x9f\x30\x8c\xd4\xcf\xa6\xe2" |
3191 | 0xa9, 0x6e, 0x4b, 0xbe, 0x32, 0x08, 0xff, 0x25, | 3215 | "\xa9\x6e\x4b\xbe\x32\x08\xff\x25" |
3192 | 0x28, 0x7d, 0xd3, 0x81, 0x96, 0x16, 0xe8, 0x9c, | 3216 | "\x28\x7d\xd3\x81\x96\x16\xe8\x9c" |
3193 | 0xc7, 0x8c, 0xf7, 0xf5, 0xe5, 0x43, 0x44, 0x5f, | 3217 | "\xc7\x8c\xf7\xf5\xe5\x43\x44\x5f" |
3194 | 0x83, 0x33, 0xd8, 0xfa, 0x7f, 0x56, 0x00, 0x00, | 3218 | "\x83\x33\xd8\xfa\x7f\x56\x00\x00" |
3195 | 0x05, 0x27, 0x9f, 0xa5, 0xd8, 0xb5, 0xe4, 0xad, | 3219 | "\x05\x27\x9f\xa5\xd8\xb5\xe4\xad" |
3196 | 0x40, 0xe7, 0x36, 0xdd, 0xb4, 0xd3, 0x54, 0x12, | 3220 | "\x40\xe7\x36\xdd\xb4\xd3\x54\x12" |
3197 | 0x32, 0x80, 0x63, 0xfd, 0x2a, 0xab, 0x53, 0xe5, | 3221 | "\x32\x80\x63\xfd\x2a\xab\x53\xe5" |
3198 | 0xea, 0x1e, 0x0a, 0x9f, 0x33, 0x25, 0x00, 0xa5, | 3222 | "\xea\x1e\x0a\x9f\x33\x25\x00\xa5" |
3199 | 0xdf, 0x94, 0x87, 0xd0, 0x7a, 0x5c, 0x92, 0xcc, | 3223 | "\xdf\x94\x87\xd0\x7a\x5c\x92\xcc" |
3200 | 0x51, 0x2c, 0x88, 0x66, 0xc7, 0xe8, 0x60, 0xce, | 3224 | "\x51\x2c\x88\x66\xc7\xe8\x60\xce" |
3201 | 0x93, 0xfd, 0xf1, 0x66, 0xa2, 0x49, 0x12, 0xb4, | 3225 | "\x93\xfd\xf1\x66\xa2\x49\x12\xb4" |
3202 | 0x22, 0x97, 0x61, 0x46, 0xae, 0x20, 0xce, 0x84, | 3226 | "\x22\x97\x61\x46\xae\x20\xce\x84" |
3203 | 0x6b, 0xb7, 0xdc, 0x9b, 0xa9, 0x4a, 0x76, 0x7a, | 3227 | "\x6b\xb7\xdc\x9b\xa9\x4a\x76\x7a" |
3204 | 0xae, 0xf2, 0x0c, 0x0d, 0x61, 0xad, 0x02, 0x65, | 3228 | "\xae\xf2\x0c\x0d\x61\xad\x02\x65" |
3205 | 0x5e, 0xa9, 0x2d, 0xc4, 0xc4, 0xe4, 0x1a, 0x89, | 3229 | "\x5e\xa9\x2d\xc4\xc4\xe4\x1a\x89" |
3206 | 0x52, 0xc6, 0x51, 0xd3, 0x31, 0x74, 0xbe, 0x51, | 3230 | "\x52\xc6\x51\xd3\x31\x74\xbe\x51" |
3207 | 0xa1, 0x0c, 0x42, 0x11, 0x10, 0xe6, 0xd8, 0x15, | 3231 | "\xa1\x0c\x42\x11\x10\xe6\xd8\x15" |
3208 | 0x88, 0xed, 0xe8, 0x21, 0x03, 0xa2, 0x52, 0xd8, | 3232 | "\x88\xed\xe8\x21\x03\xa2\x52\xd8" |
3209 | 0xa7, 0x50, 0xe8, 0x76, 0x8d, 0xef, 0xff, 0xed, | 3233 | "\xa7\x50\xe8\x76\x8d\xef\xff\xed" |
3210 | 0x91, 0x22, 0x81, 0x0a, 0xae, 0xb9, 0x9f, 0x91, | 3234 | "\x91\x22\x81\x0a\xae\xb9\x9f\x91" |
3211 | 0x72, 0xaf, 0x82, 0xb6, 0x04, 0xdc, 0x4b, 0x8e, | 3235 | "\x72\xaf\x82\xb6\x04\xdc\x4b\x8e" |
3212 | 0x51, 0xbc, 0xb0, 0x82, 0x35, 0xa6, 0xf4, 0x34, | 3236 | "\x51\xbc\xb0\x82\x35\xa6\xf4\x34" |
3213 | 0x13, 0x32, 0xe4, 0xca, 0x60, 0x48, 0x2a, 0x4b, | 3237 | "\x13\x32\xe4\xca\x60\x48\x2a\x4b" |
3214 | 0xa1, 0xa0, 0x3b, 0x3e, 0x65, 0x00, 0x8f, 0xc5, | 3238 | "\xa1\xa0\x3b\x3e\x65\x00\x8f\xc5" |
3215 | 0xda, 0x76, 0xb7, 0x0b, 0xf1, 0x69, 0x0d, 0xb4, | 3239 | "\xda\x76\xb7\x0b\xf1\x69\x0d\xb4" |
3216 | 0xea, 0xe2, 0x9c, 0x5f, 0x1b, 0xad, 0xd0, 0x3c, | 3240 | "\xea\xe2\x9c\x5f\x1b\xad\xd0\x3c" |
3217 | 0x5c, 0xcf, 0x2a, 0x55, 0xd7, 0x05, 0xdd, 0xcd, | 3241 | "\x5c\xcf\x2a\x55\xd7\x05\xdd\xcd" |
3218 | 0x86, 0xd4, 0x49, 0x51, 0x1c, 0xeb, 0x7e, 0xc3, | 3242 | "\x86\xd4\x49\x51\x1c\xeb\x7e\xc3" |
3219 | 0x0b, 0xf1, 0x2b, 0x1f, 0xa3, 0x5b, 0x91, 0x3f, | 3243 | "\x0b\xf1\x2b\x1f\xa3\x5b\x91\x3f" |
3220 | 0x9f, 0x74, 0x7a, 0x8a, 0xfd, 0x1b, 0x13, 0x0e, | 3244 | "\x9f\x74\x7a\x8a\xfd\x1b\x13\x0e" |
3221 | 0x94, 0xbf, 0xf9, 0x4e, 0xff, 0xd0, 0x1a, 0x91, | 3245 | "\x94\xbf\xf9\x4e\xff\xd0\x1a\x91" |
3222 | 0x73, 0x5c, 0xa1, 0x72, 0x6a, 0xcd, 0x0b, 0x19, | 3246 | "\x73\x5c\xa1\x72\x6a\xcd\x0b\x19" |
3223 | 0x7c, 0x4e, 0x5b, 0x03, 0x39, 0x36, 0x97, 0xe1, | 3247 | "\x7c\x4e\x5b\x03\x39\x36\x97\xe1" |
3224 | 0x26, 0x82, 0x6f, 0xb6, 0xbb, 0xde, 0x8e, 0xcc, | 3248 | "\x26\x82\x6f\xb6\xbb\xde\x8e\xcc" |
3225 | 0x1e, 0x08, 0x29, 0x85, 0x16, 0xe2, 0xc9, 0xed, | 3249 | "\x1e\x08\x29\x85\x16\xe2\xc9\xed" |
3226 | 0x03, 0xff, 0x3c, 0x1b, 0x78, 0x60, 0xf6, 0xde, | 3250 | "\x03\xff\x3c\x1b\x78\x60\xf6\xde" |
3227 | 0x76, 0xd4, 0xce, 0xcd, 0x94, 0xc8, 0x11, 0x98, | 3251 | "\x76\xd4\xce\xcd\x94\xc8\x11\x98" |
3228 | 0x55, 0xef, 0x52, 0x97, 0xca, 0x67, 0xe9, 0xf3, | 3252 | "\x55\xef\x52\x97\xca\x67\xe9\xf3" |
3229 | 0xe7, 0xff, 0x72, 0xb1, 0xe9, 0x97, 0x85, 0xca, | 3253 | "\xe7\xff\x72\xb1\xe9\x97\x85\xca" |
3230 | 0x0a, 0x7e, 0x77, 0x20, 0xc5, 0xb3, 0x6d, 0xc6, | 3254 | "\x0a\x7e\x77\x20\xc5\xb3\x6d\xc6" |
3231 | 0xd7, 0x2c, 0xac, 0x95, 0x74, 0xc8, 0xcb, 0xbc, | 3255 | "\xd7\x2c\xac\x95\x74\xc8\xcb\xbc" |
3232 | 0x2f, 0x80, 0x1e, 0x23, 0xe5, 0x6f, 0xd3, 0x44, | 3256 | "\x2f\x80\x1e\x23\xe5\x6f\xd3\x44" |
3233 | 0xb0, 0x7f, 0x22, 0x15, 0x4b, 0xeb, 0xa0, 0xf0, | 3257 | "\xb0\x7f\x22\x15\x4b\xeb\xa0\xf0" |
3234 | 0x8c, 0xe8, 0x89, 0x1e, 0x64, 0x3e, 0xd9, 0x95, | 3258 | "\x8c\xe8\x89\x1e\x64\x3e\xd9\x95" |
3235 | 0xc9, 0x4d, 0x9a, 0x69, 0xc9, 0xf1, 0xb5, 0xf4, | 3259 | "\xc9\x4d\x9a\x69\xc9\xf1\xb5\xf4" |
3236 | 0x99, 0x02, 0x7a, 0x78, 0x57, 0x2a, 0xee, 0xbd, | 3260 | "\x99\x02\x7a\x78\x57\x2a\xee\xbd" |
3237 | 0x74, 0xd2, 0x0c, 0xc3, 0x98, 0x81, 0xc2, 0x13, | 3261 | "\x74\xd2\x0c\xc3\x98\x81\xc2\x13" |
3238 | 0xee, 0x77, 0x0b, 0x10, 0x10, 0xe4, 0xbe, 0xa7, | 3262 | "\xee\x77\x0b\x10\x10\xe4\xbe\xa7" |
3239 | 0x18, 0x84, 0x69, 0x77, 0xae, 0x11, 0x9f, 0x7a, | 3263 | "\x18\x84\x69\x77\xae\x11\x9f\x7a" |
3240 | 0x02, 0x3a, 0xb5, 0x8c, 0xca, 0x0a, 0xd7, 0x52, | 3264 | "\x02\x3a\xb5\x8c\xca\x0a\xd7\x52" |
3241 | 0xaf, 0xe6, 0x56, 0xbb, 0x3c, 0x17, 0x25, 0x6a, | 3265 | "\xaf\xe6\x56\xbb\x3c\x17\x25\x6a" |
3242 | 0x9f, 0x6e, 0x9b, 0xf1, 0x9f, 0xdd, 0x5a, 0x38, | 3266 | "\x9f\x6e\x9b\xf1\x9f\xdd\x5a\x38" |
3243 | 0xfc, 0x82, 0xbb, 0xe8, 0x72, 0xc5, 0x53, 0x9e, | 3267 | "\xfc\x82\xbb\xe8\x72\xc5\x53\x9e" |
3244 | 0xdb, 0x60, 0x9e, 0xf4, 0xf7, 0x9c, 0x20, 0x3e, | 3268 | "\xdb\x60\x9e\xf4\xf7\x9c\x20\x3e" |
3245 | 0xbb, 0x14, 0x0f, 0x2e, 0x58, 0x3c, 0xb2, 0xad, | 3269 | "\xbb\x14\x0f\x2e\x58\x3c\xb2\xad" |
3246 | 0x15, 0xb4, 0xaa, 0x5b, 0x65, 0x50, 0x16, 0xa8, | 3270 | "\x15\xb4\xaa\x5b\x65\x50\x16\xa8" |
3247 | 0x44, 0x92, 0x77, 0xdb, 0xd4, 0x77, 0xef, 0x2c, | 3271 | "\x44\x92\x77\xdb\xd4\x77\xef\x2c" |
3248 | 0x8d, 0x6c, 0x01, 0x7d, 0xb7, 0x38, 0xb1, 0x8d, | 3272 | "\x8d\x6c\x01\x7d\xb7\x38\xb1\x8d" |
3249 | 0xeb, 0x4a, 0x42, 0x7d, 0x19, 0x23, 0xce, 0x3f, | 3273 | "\xeb\x4a\x42\x7d\x19\x23\xce\x3f" |
3250 | 0xf2, 0x62, 0x73, 0x57, 0x79, 0xa4, 0x18, 0xf2, | 3274 | "\xf2\x62\x73\x57\x79\xa4\x18\xf2" |
3251 | 0x0a, 0x28, 0x2d, 0xf9, 0x20, 0x14, 0x7b, 0xea, | 3275 | "\x0a\x28\x2d\xf9\x20\x14\x7b\xea" |
3252 | 0xbe, 0x42, 0x1e, 0xe5, 0x31, 0x9d, 0x05, 0x68 }, | 3276 | "\xbe\x42\x1e\xe5\x31\x9d\x05\x68", |
3253 | .rlen = 512, | 3277 | .rlen = 512, |
3254 | } | 3278 | } |
3255 | }; | 3279 | }; |
@@ -3257,196 +3281,196 @@ static struct cipher_testvec aes_xts_enc_tv_template[] = { | |||
3257 | static struct cipher_testvec aes_xts_dec_tv_template[] = { | 3281 | static struct cipher_testvec aes_xts_dec_tv_template[] = { |
3258 | /* http://grouper.ieee.org/groups/1619/email/pdf00086.pdf */ | 3282 | /* http://grouper.ieee.org/groups/1619/email/pdf00086.pdf */ |
3259 | { /* XTS-AES 1 */ | 3283 | { /* XTS-AES 1 */ |
3260 | .key = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3284 | .key = "\x00\x00\x00\x00\x00\x00\x00\x00" |
3261 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3285 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
3262 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3286 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
3263 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 3287 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
3264 | .klen = 32, | 3288 | .klen = 32, |
3265 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3289 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
3266 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 3290 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
3267 | .input = { 0x91, 0x7c, 0xf6, 0x9e, 0xbd, 0x68, 0xb2, 0xec, | 3291 | .input = "\x91\x7c\xf6\x9e\xbd\x68\xb2\xec" |
3268 | 0x9b, 0x9f, 0xe9, 0xa3, 0xea, 0xdd, 0xa6, 0x92, | 3292 | "\x9b\x9f\xe9\xa3\xea\xdd\xa6\x92" |
3269 | 0xcd, 0x43, 0xd2, 0xf5, 0x95, 0x98, 0xed, 0x85, | 3293 | "\xcd\x43\xd2\xf5\x95\x98\xed\x85" |
3270 | 0x8c, 0x02, 0xc2, 0x65, 0x2f, 0xbf, 0x92, 0x2e }, | 3294 | "\x8c\x02\xc2\x65\x2f\xbf\x92\x2e", |
3271 | .ilen = 32, | 3295 | .ilen = 32, |
3272 | .result = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3296 | .result = "\x00\x00\x00\x00\x00\x00\x00\x00" |
3273 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3297 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
3274 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3298 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
3275 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 3299 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
3276 | .rlen = 32, | 3300 | .rlen = 32, |
3277 | }, { /* XTS-AES 2 */ | 3301 | }, { /* XTS-AES 2 */ |
3278 | .key = { 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, | 3302 | .key = "\x11\x11\x11\x11\x11\x11\x11\x11" |
3279 | 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, | 3303 | "\x11\x11\x11\x11\x11\x11\x11\x11" |
3280 | 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, | 3304 | "\x22\x22\x22\x22\x22\x22\x22\x22" |
3281 | 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22 }, | 3305 | "\x22\x22\x22\x22\x22\x22\x22\x22", |
3282 | .klen = 32, | 3306 | .klen = 32, |
3283 | .iv = { 0x33, 0x33, 0x33, 0x33, 0x33, 0x00, 0x00, 0x00, | 3307 | .iv = "\x33\x33\x33\x33\x33\x00\x00\x00" |
3284 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 3308 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
3285 | .input = { 0xc4, 0x54, 0x18, 0x5e, 0x6a, 0x16, 0x93, 0x6e, | 3309 | .input = "\xc4\x54\x18\x5e\x6a\x16\x93\x6e" |
3286 | 0x39, 0x33, 0x40, 0x38, 0xac, 0xef, 0x83, 0x8b, | 3310 | "\x39\x33\x40\x38\xac\xef\x83\x8b" |
3287 | 0xfb, 0x18, 0x6f, 0xff, 0x74, 0x80, 0xad, 0xc4, | 3311 | "\xfb\x18\x6f\xff\x74\x80\xad\xc4" |
3288 | 0x28, 0x93, 0x82, 0xec, 0xd6, 0xd3, 0x94, 0xf0 }, | 3312 | "\x28\x93\x82\xec\xd6\xd3\x94\xf0", |
3289 | .ilen = 32, | 3313 | .ilen = 32, |
3290 | .result = { 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, | 3314 | .result = "\x44\x44\x44\x44\x44\x44\x44\x44" |
3291 | 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, | 3315 | "\x44\x44\x44\x44\x44\x44\x44\x44" |
3292 | 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, | 3316 | "\x44\x44\x44\x44\x44\x44\x44\x44" |
3293 | 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44 }, | 3317 | "\x44\x44\x44\x44\x44\x44\x44\x44", |
3294 | .rlen = 32, | 3318 | .rlen = 32, |
3295 | }, { /* XTS-AES 3 */ | 3319 | }, { /* XTS-AES 3 */ |
3296 | .key = { 0xff, 0xfe, 0xfd, 0xfc, 0xfb, 0xfa, 0xf9, 0xf8, | 3320 | .key = "\xff\xfe\xfd\xfc\xfb\xfa\xf9\xf8" |
3297 | 0xf7, 0xf6, 0xf5, 0xf4, 0xf3, 0xf2, 0xf1, 0xf0, | 3321 | "\xf7\xf6\xf5\xf4\xf3\xf2\xf1\xf0" |
3298 | 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, | 3322 | "\x22\x22\x22\x22\x22\x22\x22\x22" |
3299 | 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22, 0x22 }, | 3323 | "\x22\x22\x22\x22\x22\x22\x22\x22", |
3300 | .klen = 32, | 3324 | .klen = 32, |
3301 | .iv = { 0x33, 0x33, 0x33, 0x33, 0x33, 0x00, 0x00, 0x00, | 3325 | .iv = "\x33\x33\x33\x33\x33\x00\x00\x00" |
3302 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 3326 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
3303 | .input = { 0xaf, 0x85, 0x33, 0x6b, 0x59, 0x7a, 0xfc, 0x1a, | 3327 | .input = "\xaf\x85\x33\x6b\x59\x7a\xfc\x1a" |
3304 | 0x90, 0x0b, 0x2e, 0xb2, 0x1e, 0xc9, 0x49, 0xd2, | 3328 | "\x90\x0b\x2e\xb2\x1e\xc9\x49\xd2" |
3305 | 0x92, 0xdf, 0x4c, 0x04, 0x7e, 0x0b, 0x21, 0x53, | 3329 | "\x92\xdf\x4c\x04\x7e\x0b\x21\x53" |
3306 | 0x21, 0x86, 0xa5, 0x97, 0x1a, 0x22, 0x7a, 0x89 }, | 3330 | "\x21\x86\xa5\x97\x1a\x22\x7a\x89", |
3307 | .ilen = 32, | 3331 | .ilen = 32, |
3308 | .result = { 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, | 3332 | .result = "\x44\x44\x44\x44\x44\x44\x44\x44" |
3309 | 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, | 3333 | "\x44\x44\x44\x44\x44\x44\x44\x44" |
3310 | 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, | 3334 | "\x44\x44\x44\x44\x44\x44\x44\x44" |
3311 | 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44, 0x44 }, | 3335 | "\x44\x44\x44\x44\x44\x44\x44\x44", |
3312 | .rlen = 32, | 3336 | .rlen = 32, |
3313 | }, { /* XTS-AES 4 */ | 3337 | }, { /* XTS-AES 4 */ |
3314 | .key = { 0x27, 0x18, 0x28, 0x18, 0x28, 0x45, 0x90, 0x45, | 3338 | .key = "\x27\x18\x28\x18\x28\x45\x90\x45" |
3315 | 0x23, 0x53, 0x60, 0x28, 0x74, 0x71, 0x35, 0x26, | 3339 | "\x23\x53\x60\x28\x74\x71\x35\x26" |
3316 | 0x31, 0x41, 0x59, 0x26, 0x53, 0x58, 0x97, 0x93, | 3340 | "\x31\x41\x59\x26\x53\x58\x97\x93" |
3317 | 0x23, 0x84, 0x62, 0x64, 0x33, 0x83, 0x27, 0x95 }, | 3341 | "\x23\x84\x62\x64\x33\x83\x27\x95", |
3318 | .klen = 32, | 3342 | .klen = 32, |
3319 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3343 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
3320 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 3344 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
3321 | .input = { 0x27, 0xa7, 0x47, 0x9b, 0xef, 0xa1, 0xd4, 0x76, | 3345 | .input = "\x27\xa7\x47\x9b\xef\xa1\xd4\x76" |
3322 | 0x48, 0x9f, 0x30, 0x8c, 0xd4, 0xcf, 0xa6, 0xe2, | 3346 | "\x48\x9f\x30\x8c\xd4\xcf\xa6\xe2" |
3323 | 0xa9, 0x6e, 0x4b, 0xbe, 0x32, 0x08, 0xff, 0x25, | 3347 | "\xa9\x6e\x4b\xbe\x32\x08\xff\x25" |
3324 | 0x28, 0x7d, 0xd3, 0x81, 0x96, 0x16, 0xe8, 0x9c, | 3348 | "\x28\x7d\xd3\x81\x96\x16\xe8\x9c" |
3325 | 0xc7, 0x8c, 0xf7, 0xf5, 0xe5, 0x43, 0x44, 0x5f, | 3349 | "\xc7\x8c\xf7\xf5\xe5\x43\x44\x5f" |
3326 | 0x83, 0x33, 0xd8, 0xfa, 0x7f, 0x56, 0x00, 0x00, | 3350 | "\x83\x33\xd8\xfa\x7f\x56\x00\x00" |
3327 | 0x05, 0x27, 0x9f, 0xa5, 0xd8, 0xb5, 0xe4, 0xad, | 3351 | "\x05\x27\x9f\xa5\xd8\xb5\xe4\xad" |
3328 | 0x40, 0xe7, 0x36, 0xdd, 0xb4, 0xd3, 0x54, 0x12, | 3352 | "\x40\xe7\x36\xdd\xb4\xd3\x54\x12" |
3329 | 0x32, 0x80, 0x63, 0xfd, 0x2a, 0xab, 0x53, 0xe5, | 3353 | "\x32\x80\x63\xfd\x2a\xab\x53\xe5" |
3330 | 0xea, 0x1e, 0x0a, 0x9f, 0x33, 0x25, 0x00, 0xa5, | 3354 | "\xea\x1e\x0a\x9f\x33\x25\x00\xa5" |
3331 | 0xdf, 0x94, 0x87, 0xd0, 0x7a, 0x5c, 0x92, 0xcc, | 3355 | "\xdf\x94\x87\xd0\x7a\x5c\x92\xcc" |
3332 | 0x51, 0x2c, 0x88, 0x66, 0xc7, 0xe8, 0x60, 0xce, | 3356 | "\x51\x2c\x88\x66\xc7\xe8\x60\xce" |
3333 | 0x93, 0xfd, 0xf1, 0x66, 0xa2, 0x49, 0x12, 0xb4, | 3357 | "\x93\xfd\xf1\x66\xa2\x49\x12\xb4" |
3334 | 0x22, 0x97, 0x61, 0x46, 0xae, 0x20, 0xce, 0x84, | 3358 | "\x22\x97\x61\x46\xae\x20\xce\x84" |
3335 | 0x6b, 0xb7, 0xdc, 0x9b, 0xa9, 0x4a, 0x76, 0x7a, | 3359 | "\x6b\xb7\xdc\x9b\xa9\x4a\x76\x7a" |
3336 | 0xae, 0xf2, 0x0c, 0x0d, 0x61, 0xad, 0x02, 0x65, | 3360 | "\xae\xf2\x0c\x0d\x61\xad\x02\x65" |
3337 | 0x5e, 0xa9, 0x2d, 0xc4, 0xc4, 0xe4, 0x1a, 0x89, | 3361 | "\x5e\xa9\x2d\xc4\xc4\xe4\x1a\x89" |
3338 | 0x52, 0xc6, 0x51, 0xd3, 0x31, 0x74, 0xbe, 0x51, | 3362 | "\x52\xc6\x51\xd3\x31\x74\xbe\x51" |
3339 | 0xa1, 0x0c, 0x42, 0x11, 0x10, 0xe6, 0xd8, 0x15, | 3363 | "\xa1\x0c\x42\x11\x10\xe6\xd8\x15" |
3340 | 0x88, 0xed, 0xe8, 0x21, 0x03, 0xa2, 0x52, 0xd8, | 3364 | "\x88\xed\xe8\x21\x03\xa2\x52\xd8" |
3341 | 0xa7, 0x50, 0xe8, 0x76, 0x8d, 0xef, 0xff, 0xed, | 3365 | "\xa7\x50\xe8\x76\x8d\xef\xff\xed" |
3342 | 0x91, 0x22, 0x81, 0x0a, 0xae, 0xb9, 0x9f, 0x91, | 3366 | "\x91\x22\x81\x0a\xae\xb9\x9f\x91" |
3343 | 0x72, 0xaf, 0x82, 0xb6, 0x04, 0xdc, 0x4b, 0x8e, | 3367 | "\x72\xaf\x82\xb6\x04\xdc\x4b\x8e" |
3344 | 0x51, 0xbc, 0xb0, 0x82, 0x35, 0xa6, 0xf4, 0x34, | 3368 | "\x51\xbc\xb0\x82\x35\xa6\xf4\x34" |
3345 | 0x13, 0x32, 0xe4, 0xca, 0x60, 0x48, 0x2a, 0x4b, | 3369 | "\x13\x32\xe4\xca\x60\x48\x2a\x4b" |
3346 | 0xa1, 0xa0, 0x3b, 0x3e, 0x65, 0x00, 0x8f, 0xc5, | 3370 | "\xa1\xa0\x3b\x3e\x65\x00\x8f\xc5" |
3347 | 0xda, 0x76, 0xb7, 0x0b, 0xf1, 0x69, 0x0d, 0xb4, | 3371 | "\xda\x76\xb7\x0b\xf1\x69\x0d\xb4" |
3348 | 0xea, 0xe2, 0x9c, 0x5f, 0x1b, 0xad, 0xd0, 0x3c, | 3372 | "\xea\xe2\x9c\x5f\x1b\xad\xd0\x3c" |
3349 | 0x5c, 0xcf, 0x2a, 0x55, 0xd7, 0x05, 0xdd, 0xcd, | 3373 | "\x5c\xcf\x2a\x55\xd7\x05\xdd\xcd" |
3350 | 0x86, 0xd4, 0x49, 0x51, 0x1c, 0xeb, 0x7e, 0xc3, | 3374 | "\x86\xd4\x49\x51\x1c\xeb\x7e\xc3" |
3351 | 0x0b, 0xf1, 0x2b, 0x1f, 0xa3, 0x5b, 0x91, 0x3f, | 3375 | "\x0b\xf1\x2b\x1f\xa3\x5b\x91\x3f" |
3352 | 0x9f, 0x74, 0x7a, 0x8a, 0xfd, 0x1b, 0x13, 0x0e, | 3376 | "\x9f\x74\x7a\x8a\xfd\x1b\x13\x0e" |
3353 | 0x94, 0xbf, 0xf9, 0x4e, 0xff, 0xd0, 0x1a, 0x91, | 3377 | "\x94\xbf\xf9\x4e\xff\xd0\x1a\x91" |
3354 | 0x73, 0x5c, 0xa1, 0x72, 0x6a, 0xcd, 0x0b, 0x19, | 3378 | "\x73\x5c\xa1\x72\x6a\xcd\x0b\x19" |
3355 | 0x7c, 0x4e, 0x5b, 0x03, 0x39, 0x36, 0x97, 0xe1, | 3379 | "\x7c\x4e\x5b\x03\x39\x36\x97\xe1" |
3356 | 0x26, 0x82, 0x6f, 0xb6, 0xbb, 0xde, 0x8e, 0xcc, | 3380 | "\x26\x82\x6f\xb6\xbb\xde\x8e\xcc" |
3357 | 0x1e, 0x08, 0x29, 0x85, 0x16, 0xe2, 0xc9, 0xed, | 3381 | "\x1e\x08\x29\x85\x16\xe2\xc9\xed" |
3358 | 0x03, 0xff, 0x3c, 0x1b, 0x78, 0x60, 0xf6, 0xde, | 3382 | "\x03\xff\x3c\x1b\x78\x60\xf6\xde" |
3359 | 0x76, 0xd4, 0xce, 0xcd, 0x94, 0xc8, 0x11, 0x98, | 3383 | "\x76\xd4\xce\xcd\x94\xc8\x11\x98" |
3360 | 0x55, 0xef, 0x52, 0x97, 0xca, 0x67, 0xe9, 0xf3, | 3384 | "\x55\xef\x52\x97\xca\x67\xe9\xf3" |
3361 | 0xe7, 0xff, 0x72, 0xb1, 0xe9, 0x97, 0x85, 0xca, | 3385 | "\xe7\xff\x72\xb1\xe9\x97\x85\xca" |
3362 | 0x0a, 0x7e, 0x77, 0x20, 0xc5, 0xb3, 0x6d, 0xc6, | 3386 | "\x0a\x7e\x77\x20\xc5\xb3\x6d\xc6" |
3363 | 0xd7, 0x2c, 0xac, 0x95, 0x74, 0xc8, 0xcb, 0xbc, | 3387 | "\xd7\x2c\xac\x95\x74\xc8\xcb\xbc" |
3364 | 0x2f, 0x80, 0x1e, 0x23, 0xe5, 0x6f, 0xd3, 0x44, | 3388 | "\x2f\x80\x1e\x23\xe5\x6f\xd3\x44" |
3365 | 0xb0, 0x7f, 0x22, 0x15, 0x4b, 0xeb, 0xa0, 0xf0, | 3389 | "\xb0\x7f\x22\x15\x4b\xeb\xa0\xf0" |
3366 | 0x8c, 0xe8, 0x89, 0x1e, 0x64, 0x3e, 0xd9, 0x95, | 3390 | "\x8c\xe8\x89\x1e\x64\x3e\xd9\x95" |
3367 | 0xc9, 0x4d, 0x9a, 0x69, 0xc9, 0xf1, 0xb5, 0xf4, | 3391 | "\xc9\x4d\x9a\x69\xc9\xf1\xb5\xf4" |
3368 | 0x99, 0x02, 0x7a, 0x78, 0x57, 0x2a, 0xee, 0xbd, | 3392 | "\x99\x02\x7a\x78\x57\x2a\xee\xbd" |
3369 | 0x74, 0xd2, 0x0c, 0xc3, 0x98, 0x81, 0xc2, 0x13, | 3393 | "\x74\xd2\x0c\xc3\x98\x81\xc2\x13" |
3370 | 0xee, 0x77, 0x0b, 0x10, 0x10, 0xe4, 0xbe, 0xa7, | 3394 | "\xee\x77\x0b\x10\x10\xe4\xbe\xa7" |
3371 | 0x18, 0x84, 0x69, 0x77, 0xae, 0x11, 0x9f, 0x7a, | 3395 | "\x18\x84\x69\x77\xae\x11\x9f\x7a" |
3372 | 0x02, 0x3a, 0xb5, 0x8c, 0xca, 0x0a, 0xd7, 0x52, | 3396 | "\x02\x3a\xb5\x8c\xca\x0a\xd7\x52" |
3373 | 0xaf, 0xe6, 0x56, 0xbb, 0x3c, 0x17, 0x25, 0x6a, | 3397 | "\xaf\xe6\x56\xbb\x3c\x17\x25\x6a" |
3374 | 0x9f, 0x6e, 0x9b, 0xf1, 0x9f, 0xdd, 0x5a, 0x38, | 3398 | "\x9f\x6e\x9b\xf1\x9f\xdd\x5a\x38" |
3375 | 0xfc, 0x82, 0xbb, 0xe8, 0x72, 0xc5, 0x53, 0x9e, | 3399 | "\xfc\x82\xbb\xe8\x72\xc5\x53\x9e" |
3376 | 0xdb, 0x60, 0x9e, 0xf4, 0xf7, 0x9c, 0x20, 0x3e, | 3400 | "\xdb\x60\x9e\xf4\xf7\x9c\x20\x3e" |
3377 | 0xbb, 0x14, 0x0f, 0x2e, 0x58, 0x3c, 0xb2, 0xad, | 3401 | "\xbb\x14\x0f\x2e\x58\x3c\xb2\xad" |
3378 | 0x15, 0xb4, 0xaa, 0x5b, 0x65, 0x50, 0x16, 0xa8, | 3402 | "\x15\xb4\xaa\x5b\x65\x50\x16\xa8" |
3379 | 0x44, 0x92, 0x77, 0xdb, 0xd4, 0x77, 0xef, 0x2c, | 3403 | "\x44\x92\x77\xdb\xd4\x77\xef\x2c" |
3380 | 0x8d, 0x6c, 0x01, 0x7d, 0xb7, 0x38, 0xb1, 0x8d, | 3404 | "\x8d\x6c\x01\x7d\xb7\x38\xb1\x8d" |
3381 | 0xeb, 0x4a, 0x42, 0x7d, 0x19, 0x23, 0xce, 0x3f, | 3405 | "\xeb\x4a\x42\x7d\x19\x23\xce\x3f" |
3382 | 0xf2, 0x62, 0x73, 0x57, 0x79, 0xa4, 0x18, 0xf2, | 3406 | "\xf2\x62\x73\x57\x79\xa4\x18\xf2" |
3383 | 0x0a, 0x28, 0x2d, 0xf9, 0x20, 0x14, 0x7b, 0xea, | 3407 | "\x0a\x28\x2d\xf9\x20\x14\x7b\xea" |
3384 | 0xbe, 0x42, 0x1e, 0xe5, 0x31, 0x9d, 0x05, 0x68 }, | 3408 | "\xbe\x42\x1e\xe5\x31\x9d\x05\x68", |
3385 | .ilen = 512, | 3409 | .ilen = 512, |
3386 | .result = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 3410 | .result = "\x00\x01\x02\x03\x04\x05\x06\x07" |
3387 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 3411 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
3388 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 3412 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
3389 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, | 3413 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f" |
3390 | 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, | 3414 | "\x20\x21\x22\x23\x24\x25\x26\x27" |
3391 | 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, | 3415 | "\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f" |
3392 | 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 3416 | "\x30\x31\x32\x33\x34\x35\x36\x37" |
3393 | 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, | 3417 | "\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f" |
3394 | 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, | 3418 | "\x40\x41\x42\x43\x44\x45\x46\x47" |
3395 | 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, | 3419 | "\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f" |
3396 | 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, | 3420 | "\x50\x51\x52\x53\x54\x55\x56\x57" |
3397 | 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, | 3421 | "\x58\x59\x5a\x5b\x5c\x5d\x5e\x5f" |
3398 | 0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, | 3422 | "\x60\x61\x62\x63\x64\x65\x66\x67" |
3399 | 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, | 3423 | "\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f" |
3400 | 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, | 3424 | "\x70\x71\x72\x73\x74\x75\x76\x77" |
3401 | 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, | 3425 | "\x78\x79\x7a\x7b\x7c\x7d\x7e\x7f" |
3402 | 0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, | 3426 | "\x80\x81\x82\x83\x84\x85\x86\x87" |
3403 | 0x88, 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f, | 3427 | "\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f" |
3404 | 0x90, 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, | 3428 | "\x90\x91\x92\x93\x94\x95\x96\x97" |
3405 | 0x98, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f, | 3429 | "\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f" |
3406 | 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7, | 3430 | "\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7" |
3407 | 0xa8, 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf, | 3431 | "\xa8\xa9\xaa\xab\xac\xad\xae\xaf" |
3408 | 0xb0, 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7, | 3432 | "\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7" |
3409 | 0xb8, 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf, | 3433 | "\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf" |
3410 | 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, | 3434 | "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" |
3411 | 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf, | 3435 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf" |
3412 | 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, | 3436 | "\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7" |
3413 | 0xd8, 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, | 3437 | "\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf" |
3414 | 0xe0, 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7, | 3438 | "\xe0\xe1\xe2\xe3\xe4\xe5\xe6\xe7" |
3415 | 0xe8, 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef, | 3439 | "\xe8\xe9\xea\xeb\xec\xed\xee\xef" |
3416 | 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, | 3440 | "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7" |
3417 | 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff, | 3441 | "\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff" |
3418 | 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 3442 | "\x00\x01\x02\x03\x04\x05\x06\x07" |
3419 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 3443 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
3420 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 3444 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
3421 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, | 3445 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f" |
3422 | 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, | 3446 | "\x20\x21\x22\x23\x24\x25\x26\x27" |
3423 | 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, | 3447 | "\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f" |
3424 | 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 3448 | "\x30\x31\x32\x33\x34\x35\x36\x37" |
3425 | 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, | 3449 | "\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f" |
3426 | 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, | 3450 | "\x40\x41\x42\x43\x44\x45\x46\x47" |
3427 | 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, | 3451 | "\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f" |
3428 | 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, | 3452 | "\x50\x51\x52\x53\x54\x55\x56\x57" |
3429 | 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, | 3453 | "\x58\x59\x5a\x5b\x5c\x5d\x5e\x5f" |
3430 | 0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, | 3454 | "\x60\x61\x62\x63\x64\x65\x66\x67" |
3431 | 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, | 3455 | "\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f" |
3432 | 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, | 3456 | "\x70\x71\x72\x73\x74\x75\x76\x77" |
3433 | 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, | 3457 | "\x78\x79\x7a\x7b\x7c\x7d\x7e\x7f" |
3434 | 0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, | 3458 | "\x80\x81\x82\x83\x84\x85\x86\x87" |
3435 | 0x88, 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f, | 3459 | "\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f" |
3436 | 0x90, 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, | 3460 | "\x90\x91\x92\x93\x94\x95\x96\x97" |
3437 | 0x98, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f, | 3461 | "\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f" |
3438 | 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7, | 3462 | "\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7" |
3439 | 0xa8, 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf, | 3463 | "\xa8\xa9\xaa\xab\xac\xad\xae\xaf" |
3440 | 0xb0, 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7, | 3464 | "\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7" |
3441 | 0xb8, 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf, | 3465 | "\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf" |
3442 | 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, | 3466 | "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" |
3443 | 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf, | 3467 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf" |
3444 | 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, | 3468 | "\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7" |
3445 | 0xd8, 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, | 3469 | "\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf" |
3446 | 0xe0, 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7, | 3470 | "\xe0\xe1\xe2\xe3\xe4\xe5\xe6\xe7" |
3447 | 0xe8, 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef, | 3471 | "\xe8\xe9\xea\xeb\xec\xed\xee\xef" |
3448 | 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, | 3472 | "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7" |
3449 | 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff }, | 3473 | "\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff", |
3450 | .rlen = 512, | 3474 | .rlen = 512, |
3451 | } | 3475 | } |
3452 | }; | 3476 | }; |
@@ -3454,1836 +3478,1841 @@ static struct cipher_testvec aes_xts_dec_tv_template[] = { | |||
3454 | 3478 | ||
3455 | static struct cipher_testvec aes_ctr_enc_tv_template[] = { | 3479 | static struct cipher_testvec aes_ctr_enc_tv_template[] = { |
3456 | { /* From RFC 3686 */ | 3480 | { /* From RFC 3686 */ |
3457 | .key = { 0xae, 0x68, 0x52, 0xf8, 0x12, 0x10, 0x67, 0xcc, | 3481 | .key = "\xae\x68\x52\xf8\x12\x10\x67\xcc" |
3458 | 0x4b, 0xf7, 0xa5, 0x76, 0x55, 0x77, 0xf3, 0x9e, | 3482 | "\x4b\xf7\xa5\x76\x55\x77\xf3\x9e" |
3459 | 0x00, 0x00, 0x00, 0x30 }, | 3483 | "\x00\x00\x00\x30", |
3460 | .klen = 20, | 3484 | .klen = 20, |
3461 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 3485 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00", |
3462 | .input = { "Single block msg" }, | 3486 | .input = "Single block msg", |
3463 | .ilen = 16, | 3487 | .ilen = 16, |
3464 | .result = { 0xe4, 0x09, 0x5d, 0x4f, 0xb7, 0xa7, 0xb3, 0x79, | 3488 | .result = "\xe4\x09\x5d\x4f\xb7\xa7\xb3\x79" |
3465 | 0x2d, 0x61, 0x75, 0xa3, 0x26, 0x13, 0x11, 0xb8 }, | 3489 | "\x2d\x61\x75\xa3\x26\x13\x11\xb8", |
3466 | .rlen = 16, | 3490 | .rlen = 16, |
3467 | }, { | 3491 | }, { |
3468 | .key = { 0x7e, 0x24, 0x06, 0x78, 0x17, 0xfa, 0xe0, 0xd7, | 3492 | .key = "\x7e\x24\x06\x78\x17\xfa\xe0\xd7" |
3469 | 0x43, 0xd6, 0xce, 0x1f, 0x32, 0x53, 0x91, 0x63, | 3493 | "\x43\xd6\xce\x1f\x32\x53\x91\x63" |
3470 | 0x00, 0x6c, 0xb6, 0xdb }, | 3494 | "\x00\x6c\xb6\xdb", |
3471 | .klen = 20, | 3495 | .klen = 20, |
3472 | .iv = { 0xc0, 0x54, 0x3b, 0x59, 0xda, 0x48, 0xd9, 0x0b }, | 3496 | .iv = "\xc0\x54\x3b\x59\xda\x48\xd9\x0b", |
3473 | .input = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 3497 | .input = "\x00\x01\x02\x03\x04\x05\x06\x07" |
3474 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 3498 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
3475 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 3499 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
3476 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 3500 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
3477 | .ilen = 32, | 3501 | .ilen = 32, |
3478 | .result = { 0x51, 0x04, 0xa1, 0x06, 0x16, 0x8a, 0x72, 0xd9, | 3502 | .result = "\x51\x04\xa1\x06\x16\x8a\x72\xd9" |
3479 | 0x79, 0x0d, 0x41, 0xee, 0x8e, 0xda, 0xd3, 0x88, | 3503 | "\x79\x0d\x41\xee\x8e\xda\xd3\x88" |
3480 | 0xeb, 0x2e, 0x1e, 0xfc, 0x46, 0xda, 0x57, 0xc8, | 3504 | "\xeb\x2e\x1e\xfc\x46\xda\x57\xc8" |
3481 | 0xfc, 0xe6, 0x30, 0xdf, 0x91, 0x41, 0xbe, 0x28 }, | 3505 | "\xfc\xe6\x30\xdf\x91\x41\xbe\x28", |
3482 | .rlen = 32, | 3506 | .rlen = 32, |
3483 | }, { | 3507 | }, { |
3484 | .key = { 0x16, 0xaf, 0x5b, 0x14, 0x5f, 0xc9, 0xf5, 0x79, | 3508 | .key = "\x16\xaf\x5b\x14\x5f\xc9\xf5\x79" |
3485 | 0xc1, 0x75, 0xf9, 0x3e, 0x3b, 0xfb, 0x0e, 0xed, | 3509 | "\xc1\x75\xf9\x3e\x3b\xfb\x0e\xed" |
3486 | 0x86, 0x3d, 0x06, 0xcc, 0xfd, 0xb7, 0x85, 0x15, | 3510 | "\x86\x3d\x06\xcc\xfd\xb7\x85\x15" |
3487 | 0x00, 0x00, 0x00, 0x48 }, | 3511 | "\x00\x00\x00\x48", |
3488 | .klen = 28, | 3512 | .klen = 28, |
3489 | .iv = { 0x36, 0x73, 0x3c, 0x14, 0x7d, 0x6d, 0x93, 0xcb }, | 3513 | .iv = "\x36\x73\x3c\x14\x7d\x6d\x93\xcb", |
3490 | .input = { "Single block msg" }, | 3514 | .input = "Single block msg", |
3491 | .ilen = 16, | 3515 | .ilen = 16, |
3492 | .result = { 0x4b, 0x55, 0x38, 0x4f, 0xe2, 0x59, 0xc9, 0xc8, | 3516 | .result = "\x4b\x55\x38\x4f\xe2\x59\xc9\xc8" |
3493 | 0x4e, 0x79, 0x35, 0xa0, 0x03, 0xcb, 0xe9, 0x28 }, | 3517 | "\x4e\x79\x35\xa0\x03\xcb\xe9\x28", |
3494 | .rlen = 16, | 3518 | .rlen = 16, |
3495 | }, { | 3519 | }, { |
3496 | .key = { 0x7c, 0x5c, 0xb2, 0x40, 0x1b, 0x3d, 0xc3, 0x3c, | 3520 | .key = "\x7c\x5c\xb2\x40\x1b\x3d\xc3\x3c" |
3497 | 0x19, 0xe7, 0x34, 0x08, 0x19, 0xe0, 0xf6, 0x9c, | 3521 | "\x19\xe7\x34\x08\x19\xe0\xf6\x9c" |
3498 | 0x67, 0x8c, 0x3d, 0xb8, 0xe6, 0xf6, 0xa9, 0x1a, | 3522 | "\x67\x8c\x3d\xb8\xe6\xf6\xa9\x1a" |
3499 | 0x00, 0x96, 0xb0, 0x3b }, | 3523 | "\x00\x96\xb0\x3b", |
3500 | .klen = 28, | 3524 | .klen = 28, |
3501 | .iv = { 0x02, 0x0c, 0x6e, 0xad, 0xc2, 0xcb, 0x50, 0x0d }, | 3525 | .iv = "\x02\x0c\x6e\xad\xc2\xcb\x50\x0d", |
3502 | .input = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 3526 | .input = "\x00\x01\x02\x03\x04\x05\x06\x07" |
3503 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 3527 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
3504 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 3528 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
3505 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 3529 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
3506 | .ilen = 32, | 3530 | .ilen = 32, |
3507 | .result = { 0x45, 0x32, 0x43, 0xfc, 0x60, 0x9b, 0x23, 0x32, | 3531 | .result = "\x45\x32\x43\xfc\x60\x9b\x23\x32" |
3508 | 0x7e, 0xdf, 0xaa, 0xfa, 0x71, 0x31, 0xcd, 0x9f, | 3532 | "\x7e\xdf\xaa\xfa\x71\x31\xcd\x9f" |
3509 | 0x84, 0x90, 0x70, 0x1c, 0x5a, 0xd4, 0xa7, 0x9c, | 3533 | "\x84\x90\x70\x1c\x5a\xd4\xa7\x9c" |
3510 | 0xfc, 0x1f, 0xe0, 0xff, 0x42, 0xf4, 0xfb, 0x00 }, | 3534 | "\xfc\x1f\xe0\xff\x42\xf4\xfb\x00", |
3511 | .rlen = 32, | 3535 | .rlen = 32, |
3512 | }, { | 3536 | }, { |
3513 | .key = { 0x77, 0x6b, 0xef, 0xf2, 0x85, 0x1d, 0xb0, 0x6f, | 3537 | .key = "\x77\x6b\xef\xf2\x85\x1d\xb0\x6f" |
3514 | 0x4c, 0x8a, 0x05, 0x42, 0xc8, 0x69, 0x6f, 0x6c, | 3538 | "\x4c\x8a\x05\x42\xc8\x69\x6f\x6c" |
3515 | 0x6a, 0x81, 0xaf, 0x1e, 0xec, 0x96, 0xb4, 0xd3, | 3539 | "\x6a\x81\xaf\x1e\xec\x96\xb4\xd3" |
3516 | 0x7f, 0xc1, 0xd6, 0x89, 0xe6, 0xc1, 0xc1, 0x04, | 3540 | "\x7f\xc1\xd6\x89\xe6\xc1\xc1\x04" |
3517 | 0x00, 0x00, 0x00, 0x60 }, | 3541 | "\x00\x00\x00\x60", |
3518 | .klen = 36, | 3542 | .klen = 36, |
3519 | .iv = { 0xdb, 0x56, 0x72, 0xc9, 0x7a, 0xa8, 0xf0, 0xb2 }, | 3543 | .iv = "\xdb\x56\x72\xc9\x7a\xa8\xf0\xb2", |
3520 | .input = { "Single block msg" }, | 3544 | .input = "Single block msg", |
3521 | .ilen = 16, | 3545 | .ilen = 16, |
3522 | .result = { 0x14, 0x5a, 0xd0, 0x1d, 0xbf, 0x82, 0x4e, 0xc7, | 3546 | .result = "\x14\x5a\xd0\x1d\xbf\x82\x4e\xc7" |
3523 | 0x56, 0x08, 0x63, 0xdc, 0x71, 0xe3, 0xe0, 0xc0 }, | 3547 | "\x56\x08\x63\xdc\x71\xe3\xe0\xc0", |
3524 | .rlen = 16, | 3548 | .rlen = 16, |
3525 | }, { | 3549 | }, { |
3526 | .key = { 0xf6, 0xd6, 0x6d, 0x6b, 0xd5, 0x2d, 0x59, 0xbb, | 3550 | .key = "\xf6\xd6\x6d\x6b\xd5\x2d\x59\xbb" |
3527 | 0x07, 0x96, 0x36, 0x58, 0x79, 0xef, 0xf8, 0x86, | 3551 | "\x07\x96\x36\x58\x79\xef\xf8\x86" |
3528 | 0xc6, 0x6d, 0xd5, 0x1a, 0x5b, 0x6a, 0x99, 0x74, | 3552 | "\xc6\x6d\xd5\x1a\x5b\x6a\x99\x74" |
3529 | 0x4b, 0x50, 0x59, 0x0c, 0x87, 0xa2, 0x38, 0x84, | 3553 | "\x4b\x50\x59\x0c\x87\xa2\x38\x84" |
3530 | 0x00, 0xfa, 0xac, 0x24 }, | 3554 | "\x00\xfa\xac\x24", |
3531 | .klen = 36, | 3555 | .klen = 36, |
3532 | .iv = { 0xc1, 0x58, 0x5e, 0xf1, 0x5a, 0x43, 0xd8, 0x75 }, | 3556 | .iv = "\xc1\x58\x5e\xf1\x5a\x43\xd8\x75", |
3533 | .input = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 3557 | .input = "\x00\x01\x02\x03\x04\x05\x06\x07" |
3534 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 3558 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
3535 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 3559 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
3536 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 3560 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
3537 | .ilen = 32, | 3561 | .ilen = 32, |
3538 | .result = { 0xf0, 0x5e, 0x23, 0x1b, 0x38, 0x94, 0x61, 0x2c, | 3562 | .result = "\xf0\x5e\x23\x1b\x38\x94\x61\x2c" |
3539 | 0x49, 0xee, 0x00, 0x0b, 0x80, 0x4e, 0xb2, 0xa9, | 3563 | "\x49\xee\x00\x0b\x80\x4e\xb2\xa9" |
3540 | 0xb8, 0x30, 0x6b, 0x50, 0x8f, 0x83, 0x9d, 0x6a, | 3564 | "\xb8\x30\x6b\x50\x8f\x83\x9d\x6a" |
3541 | 0x55, 0x30, 0x83, 0x1d, 0x93, 0x44, 0xaf, 0x1c }, | 3565 | "\x55\x30\x83\x1d\x93\x44\xaf\x1c", |
3542 | .rlen = 32, | 3566 | .rlen = 32, |
3543 | }, { | 3567 | }, { |
3544 | // generated using Crypto++ | 3568 | // generated using Crypto++ |
3545 | .key = { | 3569 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
3546 | 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 3570 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
3547 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 3571 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
3548 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 3572 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f" |
3549 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, | 3573 | "\x00\x00\x00\x00", |
3550 | 0x00, 0x00, 0x00, 0x00, | ||
3551 | }, | ||
3552 | .klen = 32 + 4, | 3574 | .klen = 32 + 4, |
3553 | .iv = { | 3575 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00", |
3554 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 3576 | .input = |
3555 | }, | 3577 | "\x00\x01\x02\x03\x04\x05\x06\x07" |
3556 | .input = { | 3578 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
3557 | 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 3579 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
3558 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 3580 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f" |
3559 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 3581 | "\x20\x21\x22\x23\x24\x25\x26\x27" |
3560 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, | 3582 | "\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f" |
3561 | 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, | 3583 | "\x30\x31\x32\x33\x34\x35\x36\x37" |
3562 | 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, | 3584 | "\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f" |
3563 | 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 3585 | "\x40\x41\x42\x43\x44\x45\x46\x47" |
3564 | 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, | 3586 | "\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f" |
3565 | 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, | 3587 | "\x50\x51\x52\x53\x54\x55\x56\x57" |
3566 | 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, | 3588 | "\x58\x59\x5a\x5b\x5c\x5d\x5e\x5f" |
3567 | 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, | 3589 | "\x60\x61\x62\x63\x64\x65\x66\x67" |
3568 | 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, | 3590 | "\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f" |
3569 | 0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, | 3591 | "\x70\x71\x72\x73\x74\x75\x76\x77" |
3570 | 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, | 3592 | "\x78\x79\x7a\x7b\x7c\x7d\x7e\x7f" |
3571 | 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, | 3593 | "\x80\x81\x82\x83\x84\x85\x86\x87" |
3572 | 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, | 3594 | "\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f" |
3573 | 0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, | 3595 | "\x90\x91\x92\x93\x94\x95\x96\x97" |
3574 | 0x88, 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f, | 3596 | "\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f" |
3575 | 0x90, 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, | 3597 | "\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7" |
3576 | 0x98, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f, | 3598 | "\xa8\xa9\xaa\xab\xac\xad\xae\xaf" |
3577 | 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7, | 3599 | "\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7" |
3578 | 0xa8, 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf, | 3600 | "\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf" |
3579 | 0xb0, 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7, | 3601 | "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" |
3580 | 0xb8, 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf, | 3602 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf" |
3581 | 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, | 3603 | "\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7" |
3582 | 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf, | 3604 | "\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf" |
3583 | 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, | 3605 | "\xe0\xe1\xe2\xe3\xe4\xe5\xe6\xe7" |
3584 | 0xd8, 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, | 3606 | "\xe8\xe9\xea\xeb\xec\xed\xee\xef" |
3585 | 0xe0, 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7, | 3607 | "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7" |
3586 | 0xe8, 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef, | 3608 | "\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff" |
3587 | 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, | 3609 | "\x00\x03\x06\x09\x0c\x0f\x12\x15" |
3588 | 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff, | 3610 | "\x18\x1b\x1e\x21\x24\x27\x2a\x2d" |
3589 | 0x00, 0x03, 0x06, 0x09, 0x0c, 0x0f, 0x12, 0x15, | 3611 | "\x30\x33\x36\x39\x3c\x3f\x42\x45" |
3590 | 0x18, 0x1b, 0x1e, 0x21, 0x24, 0x27, 0x2a, 0x2d, | 3612 | "\x48\x4b\x4e\x51\x54\x57\x5a\x5d" |
3591 | 0x30, 0x33, 0x36, 0x39, 0x3c, 0x3f, 0x42, 0x45, | 3613 | "\x60\x63\x66\x69\x6c\x6f\x72\x75" |
3592 | 0x48, 0x4b, 0x4e, 0x51, 0x54, 0x57, 0x5a, 0x5d, | 3614 | "\x78\x7b\x7e\x81\x84\x87\x8a\x8d" |
3593 | 0x60, 0x63, 0x66, 0x69, 0x6c, 0x6f, 0x72, 0x75, | 3615 | "\x90\x93\x96\x99\x9c\x9f\xa2\xa5" |
3594 | 0x78, 0x7b, 0x7e, 0x81, 0x84, 0x87, 0x8a, 0x8d, | 3616 | "\xa8\xab\xae\xb1\xb4\xb7\xba\xbd" |
3595 | 0x90, 0x93, 0x96, 0x99, 0x9c, 0x9f, 0xa2, 0xa5, | 3617 | "\xc0\xc3\xc6\xc9\xcc\xcf\xd2\xd5" |
3596 | 0xa8, 0xab, 0xae, 0xb1, 0xb4, 0xb7, 0xba, 0xbd, | 3618 | "\xd8\xdb\xde\xe1\xe4\xe7\xea\xed" |
3597 | 0xc0, 0xc3, 0xc6, 0xc9, 0xcc, 0xcf, 0xd2, 0xd5, | 3619 | "\xf0\xf3\xf6\xf9\xfc\xff\x02\x05" |
3598 | 0xd8, 0xdb, 0xde, 0xe1, 0xe4, 0xe7, 0xea, 0xed, | 3620 | "\x08\x0b\x0e\x11\x14\x17\x1a\x1d" |
3599 | 0xf0, 0xf3, 0xf6, 0xf9, 0xfc, 0xff, 0x02, 0x05, | 3621 | "\x20\x23\x26\x29\x2c\x2f\x32\x35" |
3600 | 0x08, 0x0b, 0x0e, 0x11, 0x14, 0x17, 0x1a, 0x1d, | 3622 | "\x38\x3b\x3e\x41\x44\x47\x4a\x4d" |
3601 | 0x20, 0x23, 0x26, 0x29, 0x2c, 0x2f, 0x32, 0x35, | 3623 | "\x50\x53\x56\x59\x5c\x5f\x62\x65" |
3602 | 0x38, 0x3b, 0x3e, 0x41, 0x44, 0x47, 0x4a, 0x4d, | 3624 | "\x68\x6b\x6e\x71\x74\x77\x7a\x7d" |
3603 | 0x50, 0x53, 0x56, 0x59, 0x5c, 0x5f, 0x62, 0x65, | 3625 | "\x80\x83\x86\x89\x8c\x8f\x92\x95" |
3604 | 0x68, 0x6b, 0x6e, 0x71, 0x74, 0x77, 0x7a, 0x7d, | 3626 | "\x98\x9b\x9e\xa1\xa4\xa7\xaa\xad" |
3605 | 0x80, 0x83, 0x86, 0x89, 0x8c, 0x8f, 0x92, 0x95, | 3627 | "\xb0\xb3\xb6\xb9\xbc\xbf\xc2\xc5" |
3606 | 0x98, 0x9b, 0x9e, 0xa1, 0xa4, 0xa7, 0xaa, 0xad, | 3628 | "\xc8\xcb\xce\xd1\xd4\xd7\xda\xdd" |
3607 | 0xb0, 0xb3, 0xb6, 0xb9, 0xbc, 0xbf, 0xc2, 0xc5, | 3629 | "\xe0\xe3\xe6\xe9\xec\xef\xf2\xf5" |
3608 | 0xc8, 0xcb, 0xce, 0xd1, 0xd4, 0xd7, 0xda, 0xdd, | 3630 | "\xf8\xfb\xfe\x01\x04\x07\x0a\x0d" |
3609 | 0xe0, 0xe3, 0xe6, 0xe9, 0xec, 0xef, 0xf2, 0xf5, | 3631 | "\x10\x13\x16\x19\x1c\x1f\x22\x25" |
3610 | 0xf8, 0xfb, 0xfe, 0x01, 0x04, 0x07, 0x0a, 0x0d, | 3632 | "\x28\x2b\x2e\x31\x34\x37\x3a\x3d" |
3611 | 0x10, 0x13, 0x16, 0x19, 0x1c, 0x1f, 0x22, 0x25, | 3633 | "\x40\x43\x46\x49\x4c\x4f\x52\x55" |
3612 | 0x28, 0x2b, 0x2e, 0x31, 0x34, 0x37, 0x3a, 0x3d, | 3634 | "\x58\x5b\x5e\x61\x64\x67\x6a\x6d" |
3613 | 0x40, 0x43, 0x46, 0x49, 0x4c, 0x4f, 0x52, 0x55, | 3635 | "\x70\x73\x76\x79\x7c\x7f\x82\x85" |
3614 | 0x58, 0x5b, 0x5e, 0x61, 0x64, 0x67, 0x6a, 0x6d, | 3636 | "\x88\x8b\x8e\x91\x94\x97\x9a\x9d" |
3615 | 0x70, 0x73, 0x76, 0x79, 0x7c, 0x7f, 0x82, 0x85, | 3637 | "\xa0\xa3\xa6\xa9\xac\xaf\xb2\xb5" |
3616 | 0x88, 0x8b, 0x8e, 0x91, 0x94, 0x97, 0x9a, 0x9d, | 3638 | "\xb8\xbb\xbe\xc1\xc4\xc7\xca\xcd" |
3617 | 0xa0, 0xa3, 0xa6, 0xa9, 0xac, 0xaf, 0xb2, 0xb5, | 3639 | "\xd0\xd3\xd6\xd9\xdc\xdf\xe2\xe5" |
3618 | 0xb8, 0xbb, 0xbe, 0xc1, 0xc4, 0xc7, 0xca, 0xcd, | 3640 | "\xe8\xeb\xee\xf1\xf4\xf7\xfa\xfd" |
3619 | 0xd0, 0xd3, 0xd6, 0xd9, 0xdc, 0xdf, 0xe2, 0xe5, | 3641 | "\x00\x05\x0a\x0f\x14\x19\x1e\x23" |
3620 | 0xe8, 0xeb, 0xee, 0xf1, 0xf4, 0xf7, 0xfa, 0xfd, | 3642 | "\x28\x2d\x32\x37\x3c\x41\x46\x4b" |
3621 | 0x00, 0x05, 0x0a, 0x0f, 0x14, 0x19, 0x1e, 0x23, | 3643 | "\x50\x55\x5a\x5f\x64\x69\x6e\x73" |
3622 | 0x28, 0x2d, 0x32, 0x37, 0x3c, 0x41, 0x46, 0x4b, | 3644 | "\x78\x7d\x82\x87\x8c\x91\x96\x9b" |
3623 | 0x50, 0x55, 0x5a, 0x5f, 0x64, 0x69, 0x6e, 0x73, | 3645 | "\xa0\xa5\xaa\xaf\xb4\xb9\xbe\xc3" |
3624 | 0x78, 0x7d, 0x82, 0x87, 0x8c, 0x91, 0x96, 0x9b, | 3646 | "\xc8\xcd\xd2\xd7\xdc\xe1\xe6\xeb" |
3625 | 0xa0, 0xa5, 0xaa, 0xaf, 0xb4, 0xb9, 0xbe, 0xc3, | 3647 | "\xf0\xf5\xfa\xff\x04\x09\x0e\x13" |
3626 | 0xc8, 0xcd, 0xd2, 0xd7, 0xdc, 0xe1, 0xe6, 0xeb, | 3648 | "\x18\x1d\x22\x27\x2c\x31\x36\x3b" |
3627 | 0xf0, 0xf5, 0xfa, 0xff, 0x04, 0x09, 0x0e, 0x13, | 3649 | "\x40\x45\x4a\x4f\x54\x59\x5e\x63" |
3628 | 0x18, 0x1d, 0x22, 0x27, 0x2c, 0x31, 0x36, 0x3b, | 3650 | "\x68\x6d\x72\x77\x7c\x81\x86\x8b" |
3629 | 0x40, 0x45, 0x4a, 0x4f, 0x54, 0x59, 0x5e, 0x63, | 3651 | "\x90\x95\x9a\x9f\xa4\xa9\xae\xb3" |
3630 | 0x68, 0x6d, 0x72, 0x77, 0x7c, 0x81, 0x86, 0x8b, | 3652 | "\xb8\xbd\xc2\xc7\xcc\xd1\xd6\xdb" |
3631 | 0x90, 0x95, 0x9a, 0x9f, 0xa4, 0xa9, 0xae, 0xb3, | 3653 | "\xe0\xe5\xea\xef\xf4\xf9\xfe\x03" |
3632 | 0xb8, 0xbd, 0xc2, 0xc7, 0xcc, 0xd1, 0xd6, 0xdb, | 3654 | "\x08\x0d\x12\x17\x1c\x21\x26\x2b" |
3633 | 0xe0, 0xe5, 0xea, 0xef, 0xf4, 0xf9, 0xfe, 0x03, | 3655 | "\x30\x35\x3a\x3f\x44\x49\x4e\x53" |
3634 | 0x08, 0x0d, 0x12, 0x17, 0x1c, 0x21, 0x26, 0x2b, | 3656 | "\x58\x5d\x62\x67\x6c\x71\x76\x7b" |
3635 | 0x30, 0x35, 0x3a, 0x3f, 0x44, 0x49, 0x4e, 0x53, | 3657 | "\x80\x85\x8a\x8f\x94\x99\x9e\xa3" |
3636 | 0x58, 0x5d, 0x62, 0x67, 0x6c, 0x71, 0x76, 0x7b, | 3658 | "\xa8\xad\xb2\xb7\xbc\xc1\xc6\xcb" |
3637 | 0x80, 0x85, 0x8a, 0x8f, 0x94, 0x99, 0x9e, 0xa3, | 3659 | "\xd0\xd5\xda\xdf\xe4\xe9\xee\xf3" |
3638 | 0xa8, 0xad, 0xb2, 0xb7, 0xbc, 0xc1, 0xc6, 0xcb, | 3660 | "\xf8\xfd\x02\x07\x0c\x11\x16\x1b" |
3639 | 0xd0, 0xd5, 0xda, 0xdf, 0xe4, 0xe9, 0xee, 0xf3, | 3661 | "\x20\x25\x2a\x2f\x34\x39\x3e\x43" |
3640 | 0xf8, 0xfd, 0x02, 0x07, 0x0c, 0x11, 0x16, 0x1b, | 3662 | "\x48\x4d\x52\x57\x5c\x61\x66\x6b" |
3641 | 0x20, 0x25, 0x2a, 0x2f, 0x34, 0x39, 0x3e, 0x43, | 3663 | "\x70\x75\x7a\x7f\x84\x89\x8e\x93" |
3642 | 0x48, 0x4d, 0x52, 0x57, 0x5c, 0x61, 0x66, 0x6b, | 3664 | "\x98\x9d\xa2\xa7\xac\xb1\xb6\xbb" |
3643 | 0x70, 0x75, 0x7a, 0x7f, 0x84, 0x89, 0x8e, 0x93, | 3665 | "\xc0\xc5\xca\xcf\xd4\xd9\xde\xe3" |
3644 | 0x98, 0x9d, 0xa2, 0xa7, 0xac, 0xb1, 0xb6, 0xbb, | 3666 | "\xe8\xed\xf2\xf7\xfc\x01\x06\x0b" |
3645 | 0xc0, 0xc5, 0xca, 0xcf, 0xd4, 0xd9, 0xde, 0xe3, | 3667 | "\x10\x15\x1a\x1f\x24\x29\x2e\x33" |
3646 | 0xe8, 0xed, 0xf2, 0xf7, 0xfc, 0x01, 0x06, 0x0b, | 3668 | "\x38\x3d\x42\x47\x4c\x51\x56\x5b" |
3647 | 0x10, 0x15, 0x1a, 0x1f, 0x24, 0x29, 0x2e, 0x33, | 3669 | "\x60\x65\x6a\x6f\x74\x79\x7e\x83" |
3648 | 0x38, 0x3d, 0x42, 0x47, 0x4c, 0x51, 0x56, 0x5b, | 3670 | "\x88\x8d\x92\x97\x9c\xa1\xa6\xab" |
3649 | 0x60, 0x65, 0x6a, 0x6f, 0x74, 0x79, 0x7e, 0x83, | 3671 | "\xb0\xb5\xba\xbf\xc4\xc9\xce\xd3" |
3650 | 0x88, 0x8d, 0x92, 0x97, 0x9c, 0xa1, 0xa6, 0xab, | 3672 | "\xd8\xdd\xe2\xe7\xec\xf1\xf6\xfb" |
3651 | 0xb0, 0xb5, 0xba, 0xbf, 0xc4, 0xc9, 0xce, 0xd3, | 3673 | "\x00\x07\x0e\x15\x1c\x23\x2a\x31" |
3652 | 0xd8, 0xdd, 0xe2, 0xe7, 0xec, 0xf1, 0xf6, 0xfb, | 3674 | "\x38\x3f\x46\x4d\x54\x5b\x62\x69" |
3653 | 0x00, 0x07, 0x0e, 0x15, 0x1c, 0x23, 0x2a, 0x31, | 3675 | "\x70\x77\x7e\x85\x8c\x93\x9a\xa1" |
3654 | 0x38, 0x3f, 0x46, 0x4d, 0x54, 0x5b, 0x62, 0x69, | 3676 | "\xa8\xaf\xb6\xbd\xc4\xcb\xd2\xd9" |
3655 | 0x70, 0x77, 0x7e, 0x85, 0x8c, 0x93, 0x9a, 0xa1, | 3677 | "\xe0\xe7\xee\xf5\xfc\x03\x0a\x11" |
3656 | 0xa8, 0xaf, 0xb6, 0xbd, 0xc4, 0xcb, 0xd2, 0xd9, | 3678 | "\x18\x1f\x26\x2d\x34\x3b\x42\x49" |
3657 | 0xe0, 0xe7, 0xee, 0xf5, 0xfc, 0x03, 0x0a, 0x11, | 3679 | "\x50\x57\x5e\x65\x6c\x73\x7a\x81" |
3658 | 0x18, 0x1f, 0x26, 0x2d, 0x34, 0x3b, 0x42, 0x49, | 3680 | "\x88\x8f\x96\x9d\xa4\xab\xb2\xb9" |
3659 | 0x50, 0x57, 0x5e, 0x65, 0x6c, 0x73, 0x7a, 0x81, | 3681 | "\xc0\xc7\xce\xd5\xdc\xe3\xea\xf1" |
3660 | 0x88, 0x8f, 0x96, 0x9d, 0xa4, 0xab, 0xb2, 0xb9, | 3682 | "\xf8\xff\x06\x0d\x14\x1b\x22\x29" |
3661 | 0xc0, 0xc7, 0xce, 0xd5, 0xdc, 0xe3, 0xea, 0xf1, | 3683 | "\x30\x37\x3e\x45\x4c\x53\x5a\x61" |
3662 | 0xf8, 0xff, 0x06, 0x0d, 0x14, 0x1b, 0x22, 0x29, | 3684 | "\x68\x6f\x76\x7d\x84\x8b\x92\x99" |
3663 | 0x30, 0x37, 0x3e, 0x45, 0x4c, 0x53, 0x5a, 0x61, | 3685 | "\xa0\xa7\xae\xb5\xbc\xc3\xca\xd1" |
3664 | 0x68, 0x6f, 0x76, 0x7d, 0x84, 0x8b, 0x92, 0x99, | 3686 | "\xd8\xdf\xe6\xed\xf4\xfb\x02\x09" |
3665 | 0xa0, 0xa7, 0xae, 0xb5, 0xbc, 0xc3, 0xca, 0xd1, | 3687 | "\x10\x17\x1e\x25\x2c\x33\x3a\x41" |
3666 | 0xd8, 0xdf, 0xe6, 0xed, 0xf4, 0xfb, 0x02, 0x09, | 3688 | "\x48\x4f\x56\x5d\x64\x6b\x72\x79" |
3667 | 0x10, 0x17, 0x1e, 0x25, 0x2c, 0x33, 0x3a, 0x41, | 3689 | "\x80\x87\x8e\x95\x9c\xa3\xaa\xb1" |
3668 | 0x48, 0x4f, 0x56, 0x5d, 0x64, 0x6b, 0x72, 0x79, | 3690 | "\xb8\xbf\xc6\xcd\xd4\xdb\xe2\xe9" |
3669 | 0x80, 0x87, 0x8e, 0x95, 0x9c, 0xa3, 0xaa, 0xb1, | 3691 | "\xf0\xf7\xfe\x05\x0c\x13\x1a\x21" |
3670 | 0xb8, 0xbf, 0xc6, 0xcd, 0xd4, 0xdb, 0xe2, 0xe9, | 3692 | "\x28\x2f\x36\x3d\x44\x4b\x52\x59" |
3671 | 0xf0, 0xf7, 0xfe, 0x05, 0x0c, 0x13, 0x1a, 0x21, | 3693 | "\x60\x67\x6e\x75\x7c\x83\x8a\x91" |
3672 | 0x28, 0x2f, 0x36, 0x3d, 0x44, 0x4b, 0x52, 0x59, | 3694 | "\x98\x9f\xa6\xad\xb4\xbb\xc2\xc9" |
3673 | 0x60, 0x67, 0x6e, 0x75, 0x7c, 0x83, 0x8a, 0x91, | 3695 | "\xd0\xd7\xde\xe5\xec\xf3\xfa\x01" |
3674 | 0x98, 0x9f, 0xa6, 0xad, 0xb4, 0xbb, 0xc2, 0xc9, | 3696 | "\x08\x0f\x16\x1d\x24\x2b\x32\x39" |
3675 | 0xd0, 0xd7, 0xde, 0xe5, 0xec, 0xf3, 0xfa, 0x01, | 3697 | "\x40\x47\x4e\x55\x5c\x63\x6a\x71" |
3676 | 0x08, 0x0f, 0x16, 0x1d, 0x24, 0x2b, 0x32, 0x39, | 3698 | "\x78\x7f\x86\x8d\x94\x9b\xa2\xa9" |
3677 | 0x40, 0x47, 0x4e, 0x55, 0x5c, 0x63, 0x6a, 0x71, | 3699 | "\xb0\xb7\xbe\xc5\xcc\xd3\xda\xe1" |
3678 | 0x78, 0x7f, 0x86, 0x8d, 0x94, 0x9b, 0xa2, 0xa9, | 3700 | "\xe8\xef\xf6\xfd\x04\x0b\x12\x19" |
3679 | 0xb0, 0xb7, 0xbe, 0xc5, 0xcc, 0xd3, 0xda, 0xe1, | 3701 | "\x20\x27\x2e\x35\x3c\x43\x4a\x51" |
3680 | 0xe8, 0xef, 0xf6, 0xfd, 0x04, 0x0b, 0x12, 0x19, | 3702 | "\x58\x5f\x66\x6d\x74\x7b\x82\x89" |
3681 | 0x20, 0x27, 0x2e, 0x35, 0x3c, 0x43, 0x4a, 0x51, | 3703 | "\x90\x97\x9e\xa5\xac\xb3\xba\xc1" |
3682 | 0x58, 0x5f, 0x66, 0x6d, 0x74, 0x7b, 0x82, 0x89, | 3704 | "\xc8\xcf\xd6\xdd\xe4\xeb\xf2\xf9" |
3683 | 0x90, 0x97, 0x9e, 0xa5, 0xac, 0xb3, 0xba, 0xc1, | 3705 | "\x00\x09\x12\x1b\x24\x2d\x36\x3f" |
3684 | 0xc8, 0xcf, 0xd6, 0xdd, 0xe4, 0xeb, 0xf2, 0xf9, | 3706 | "\x48\x51\x5a\x63\x6c\x75\x7e\x87" |
3685 | 0x00, 0x09, 0x12, 0x1b, 0x24, 0x2d, 0x36, 0x3f, | 3707 | "\x90\x99\xa2\xab\xb4\xbd\xc6\xcf" |
3686 | 0x48, 0x51, 0x5a, 0x63, 0x6c, 0x75, 0x7e, 0x87, | 3708 | "\xd8\xe1\xea\xf3\xfc\x05\x0e\x17" |
3687 | 0x90, 0x99, 0xa2, 0xab, 0xb4, 0xbd, 0xc6, 0xcf, | 3709 | "\x20\x29\x32\x3b\x44\x4d\x56\x5f" |
3688 | 0xd8, 0xe1, 0xea, 0xf3, 0xfc, 0x05, 0x0e, 0x17, | 3710 | "\x68\x71\x7a\x83\x8c\x95\x9e\xa7" |
3689 | 0x20, 0x29, 0x32, 0x3b, 0x44, 0x4d, 0x56, 0x5f, | 3711 | "\xb0\xb9\xc2\xcb\xd4\xdd\xe6\xef" |
3690 | 0x68, 0x71, 0x7a, 0x83, 0x8c, 0x95, 0x9e, 0xa7, | 3712 | "\xf8\x01\x0a\x13\x1c\x25\x2e\x37" |
3691 | 0xb0, 0xb9, 0xc2, 0xcb, 0xd4, 0xdd, 0xe6, 0xef, | 3713 | "\x40\x49\x52\x5b\x64\x6d\x76\x7f" |
3692 | 0xf8, 0x01, 0x0a, 0x13, 0x1c, 0x25, 0x2e, 0x37, | 3714 | "\x88\x91\x9a\xa3\xac\xb5\xbe\xc7" |
3693 | 0x40, 0x49, 0x52, 0x5b, 0x64, 0x6d, 0x76, 0x7f, | 3715 | "\xd0\xd9\xe2\xeb\xf4\xfd\x06\x0f" |
3694 | 0x88, 0x91, 0x9a, 0xa3, 0xac, 0xb5, 0xbe, 0xc7, | 3716 | "\x18\x21\x2a\x33\x3c\x45\x4e\x57" |
3695 | 0xd0, 0xd9, 0xe2, 0xeb, 0xf4, 0xfd, 0x06, 0x0f, | 3717 | "\x60\x69\x72\x7b\x84\x8d\x96\x9f" |
3696 | 0x18, 0x21, 0x2a, 0x33, 0x3c, 0x45, 0x4e, 0x57, | 3718 | "\xa8\xb1\xba\xc3\xcc\xd5\xde\xe7" |
3697 | 0x60, 0x69, 0x72, 0x7b, 0x84, 0x8d, 0x96, 0x9f, | 3719 | "\xf0\xf9\x02\x0b\x14\x1d\x26\x2f" |
3698 | 0xa8, 0xb1, 0xba, 0xc3, 0xcc, 0xd5, 0xde, 0xe7, | 3720 | "\x38\x41\x4a\x53\x5c\x65\x6e\x77" |
3699 | 0xf0, 0xf9, 0x02, 0x0b, 0x14, 0x1d, 0x26, 0x2f, | 3721 | "\x80\x89\x92\x9b\xa4\xad\xb6\xbf" |
3700 | 0x38, 0x41, 0x4a, 0x53, 0x5c, 0x65, 0x6e, 0x77, | 3722 | "\xc8\xd1\xda\xe3\xec\xf5\xfe\x07" |
3701 | 0x80, 0x89, 0x92, 0x9b, 0xa4, 0xad, 0xb6, 0xbf, | 3723 | "\x10\x19\x22\x2b\x34\x3d\x46\x4f" |
3702 | 0xc8, 0xd1, 0xda, 0xe3, 0xec, 0xf5, 0xfe, 0x07, | 3724 | "\x58\x61\x6a\x73\x7c\x85\x8e\x97" |
3703 | 0x10, 0x19, 0x22, 0x2b, 0x34, 0x3d, 0x46, 0x4f, | 3725 | "\xa0\xa9\xb2\xbb\xc4\xcd\xd6\xdf" |
3704 | 0x58, 0x61, 0x6a, 0x73, 0x7c, 0x85, 0x8e, 0x97, | 3726 | "\xe8\xf1\xfa\x03\x0c\x15\x1e\x27" |
3705 | 0xa0, 0xa9, 0xb2, 0xbb, 0xc4, 0xcd, 0xd6, 0xdf, | 3727 | "\x30\x39\x42\x4b\x54\x5d\x66\x6f" |
3706 | 0xe8, 0xf1, 0xfa, 0x03, 0x0c, 0x15, 0x1e, 0x27, | 3728 | "\x78\x81\x8a\x93\x9c\xa5\xae\xb7" |
3707 | 0x30, 0x39, 0x42, 0x4b, 0x54, 0x5d, 0x66, 0x6f, | 3729 | "\xc0\xc9\xd2\xdb\xe4\xed\xf6\xff" |
3708 | 0x78, 0x81, 0x8a, 0x93, 0x9c, 0xa5, 0xae, 0xb7, | 3730 | "\x08\x11\x1a\x23\x2c\x35\x3e\x47" |
3709 | 0xc0, 0xc9, 0xd2, 0xdb, 0xe4, 0xed, 0xf6, 0xff, | 3731 | "\x50\x59\x62\x6b\x74\x7d\x86\x8f" |
3710 | 0x08, 0x11, 0x1a, 0x23, 0x2c, 0x35, 0x3e, 0x47, | 3732 | "\x98\xa1\xaa\xb3\xbc\xc5\xce\xd7" |
3711 | 0x50, 0x59, 0x62, 0x6b, 0x74, 0x7d, 0x86, 0x8f, | 3733 | "\xe0\xe9\xf2\xfb\x04\x0d\x16\x1f" |
3712 | 0x98, 0xa1, 0xaa, 0xb3, 0xbc, 0xc5, 0xce, 0xd7, | 3734 | "\x28\x31\x3a\x43\x4c\x55\x5e\x67" |
3713 | 0xe0, 0xe9, 0xf2, 0xfb, 0x04, 0x0d, 0x16, 0x1f, | 3735 | "\x70\x79\x82\x8b\x94\x9d\xa6\xaf" |
3714 | 0x28, 0x31, 0x3a, 0x43, 0x4c, 0x55, 0x5e, 0x67, | 3736 | "\xb8\xc1\xca\xd3\xdc\xe5\xee\xf7" |
3715 | 0x70, 0x79, 0x82, 0x8b, 0x94, 0x9d, 0xa6, 0xaf, | 3737 | "\x00\x0b\x16\x21\x2c\x37\x42\x4d" |
3716 | 0xb8, 0xc1, 0xca, 0xd3, 0xdc, 0xe5, 0xee, 0xf7, | 3738 | "\x58\x63\x6e\x79\x84\x8f\x9a\xa5" |
3717 | 0x00, 0x0b, 0x16, 0x21, 0x2c, 0x37, 0x42, 0x4d, | 3739 | "\xb0\xbb\xc6\xd1\xdc\xe7\xf2\xfd" |
3718 | 0x58, 0x63, 0x6e, 0x79, 0x84, 0x8f, 0x9a, 0xa5, | 3740 | "\x08\x13\x1e\x29\x34\x3f\x4a\x55" |
3719 | 0xb0, 0xbb, 0xc6, 0xd1, 0xdc, 0xe7, 0xf2, 0xfd, | 3741 | "\x60\x6b\x76\x81\x8c\x97\xa2\xad" |
3720 | 0x08, 0x13, 0x1e, 0x29, 0x34, 0x3f, 0x4a, 0x55, | 3742 | "\xb8\xc3\xce\xd9\xe4\xef\xfa\x05" |
3721 | 0x60, 0x6b, 0x76, 0x81, 0x8c, 0x97, 0xa2, 0xad, | 3743 | "\x10\x1b\x26\x31\x3c\x47\x52\x5d" |
3722 | 0xb8, 0xc3, 0xce, 0xd9, 0xe4, 0xef, 0xfa, 0x05, | 3744 | "\x68\x73\x7e\x89\x94\x9f\xaa\xb5" |
3723 | 0x10, 0x1b, 0x26, 0x31, 0x3c, 0x47, 0x52, 0x5d, | 3745 | "\xc0\xcb\xd6\xe1\xec\xf7\x02\x0d" |
3724 | 0x68, 0x73, 0x7e, 0x89, 0x94, 0x9f, 0xaa, 0xb5, | 3746 | "\x18\x23\x2e\x39\x44\x4f\x5a\x65" |
3725 | 0xc0, 0xcb, 0xd6, 0xe1, 0xec, 0xf7, 0x02, 0x0d, | 3747 | "\x70\x7b\x86\x91\x9c\xa7\xb2\xbd" |
3726 | 0x18, 0x23, 0x2e, 0x39, 0x44, 0x4f, 0x5a, 0x65, | 3748 | "\xc8\xd3\xde\xe9\xf4\xff\x0a\x15" |
3727 | 0x70, 0x7b, 0x86, 0x91, 0x9c, 0xa7, 0xb2, 0xbd, | 3749 | "\x20\x2b\x36\x41\x4c\x57\x62\x6d" |
3728 | 0xc8, 0xd3, 0xde, 0xe9, 0xf4, 0xff, 0x0a, 0x15, | 3750 | "\x78\x83\x8e\x99\xa4\xaf\xba\xc5" |
3729 | 0x20, 0x2b, 0x36, 0x41, 0x4c, 0x57, 0x62, 0x6d, | 3751 | "\xd0\xdb\xe6\xf1\xfc\x07\x12\x1d" |
3730 | 0x78, 0x83, 0x8e, 0x99, 0xa4, 0xaf, 0xba, 0xc5, | 3752 | "\x28\x33\x3e\x49\x54\x5f\x6a\x75" |
3731 | 0xd0, 0xdb, 0xe6, 0xf1, 0xfc, 0x07, 0x12, 0x1d, | 3753 | "\x80\x8b\x96\xa1\xac\xb7\xc2\xcd" |
3732 | 0x28, 0x33, 0x3e, 0x49, 0x54, 0x5f, 0x6a, 0x75, | 3754 | "\xd8\xe3\xee\xf9\x04\x0f\x1a\x25" |
3733 | 0x80, 0x8b, 0x96, 0xa1, 0xac, 0xb7, 0xc2, 0xcd, | 3755 | "\x30\x3b\x46\x51\x5c\x67\x72\x7d" |
3734 | 0xd8, 0xe3, 0xee, 0xf9, 0x04, 0x0f, 0x1a, 0x25, | 3756 | "\x88\x93\x9e\xa9\xb4\xbf\xca\xd5" |
3735 | 0x30, 0x3b, 0x46, 0x51, 0x5c, 0x67, 0x72, 0x7d, | 3757 | "\xe0\xeb\xf6\x01\x0c\x17\x22\x2d" |
3736 | 0x88, 0x93, 0x9e, 0xa9, 0xb4, 0xbf, 0xca, 0xd5, | 3758 | "\x38\x43\x4e\x59\x64\x6f\x7a\x85" |
3737 | 0xe0, 0xeb, 0xf6, 0x01, 0x0c, 0x17, 0x22, 0x2d, | 3759 | "\x90\x9b\xa6\xb1\xbc\xc7\xd2\xdd" |
3738 | 0x38, 0x43, 0x4e, 0x59, 0x64, 0x6f, 0x7a, 0x85, | 3760 | "\xe8\xf3\xfe\x09\x14\x1f\x2a\x35" |
3739 | 0x90, 0x9b, 0xa6, 0xb1, 0xbc, 0xc7, 0xd2, 0xdd, | 3761 | "\x40\x4b\x56\x61\x6c\x77\x82\x8d" |
3740 | 0xe8, 0xf3, 0xfe, 0x09, 0x14, 0x1f, 0x2a, 0x35, | 3762 | "\x98\xa3\xae\xb9\xc4\xcf\xda\xe5" |
3741 | 0x40, 0x4b, 0x56, 0x61, 0x6c, 0x77, 0x82, 0x8d, | 3763 | "\xf0\xfb\x06\x11\x1c\x27\x32\x3d" |
3742 | 0x98, 0xa3, 0xae, 0xb9, 0xc4, 0xcf, 0xda, 0xe5, | 3764 | "\x48\x53\x5e\x69\x74\x7f\x8a\x95" |
3743 | 0xf0, 0xfb, 0x06, 0x11, 0x1c, 0x27, 0x32, 0x3d, | 3765 | "\xa0\xab\xb6\xc1\xcc\xd7\xe2\xed" |
3744 | 0x48, 0x53, 0x5e, 0x69, 0x74, 0x7f, 0x8a, 0x95, | 3766 | "\xf8\x03\x0e\x19\x24\x2f\x3a\x45" |
3745 | 0xa0, 0xab, 0xb6, 0xc1, 0xcc, 0xd7, 0xe2, 0xed, | 3767 | "\x50\x5b\x66\x71\x7c\x87\x92\x9d" |
3746 | 0xf8, 0x03, 0x0e, 0x19, 0x24, 0x2f, 0x3a, 0x45, | 3768 | "\xa8\xb3\xbe\xc9\xd4\xdf\xea\xf5" |
3747 | 0x50, 0x5b, 0x66, 0x71, 0x7c, 0x87, 0x92, 0x9d, | 3769 | "\x00\x0d\x1a\x27\x34\x41\x4e\x5b" |
3748 | 0xa8, 0xb3, 0xbe, 0xc9, 0xd4, 0xdf, 0xea, 0xf5, | 3770 | "\x68\x75\x82\x8f\x9c\xa9\xb6\xc3" |
3749 | 0x00, 0x0d, 0x1a, 0x27, 0x34, 0x41, 0x4e, 0x5b, | 3771 | "\xd0\xdd\xea\xf7\x04\x11\x1e\x2b" |
3750 | 0x68, 0x75, 0x82, 0x8f, 0x9c, 0xa9, 0xb6, 0xc3, | 3772 | "\x38\x45\x52\x5f\x6c\x79\x86\x93" |
3751 | 0xd0, 0xdd, 0xea, 0xf7, 0x04, 0x11, 0x1e, 0x2b, | 3773 | "\xa0\xad\xba\xc7\xd4\xe1\xee\xfb" |
3752 | 0x38, 0x45, 0x52, 0x5f, 0x6c, 0x79, 0x86, 0x93, | 3774 | "\x08\x15\x22\x2f\x3c\x49\x56\x63" |
3753 | 0xa0, 0xad, 0xba, 0xc7, 0xd4, 0xe1, 0xee, 0xfb, | 3775 | "\x70\x7d\x8a\x97\xa4\xb1\xbe\xcb" |
3754 | 0x08, 0x15, 0x22, 0x2f, 0x3c, 0x49, 0x56, 0x63, | 3776 | "\xd8\xe5\xf2\xff\x0c\x19\x26\x33" |
3755 | 0x70, 0x7d, 0x8a, 0x97, 0xa4, 0xb1, 0xbe, 0xcb, | 3777 | "\x40\x4d\x5a\x67\x74\x81\x8e\x9b" |
3756 | 0xd8, 0xe5, 0xf2, 0xff, 0x0c, 0x19, 0x26, 0x33, | 3778 | "\xa8\xb5\xc2\xcf\xdc\xe9\xf6\x03" |
3757 | 0x40, 0x4d, 0x5a, 0x67, 0x74, 0x81, 0x8e, 0x9b, | 3779 | "\x10\x1d\x2a\x37\x44\x51\x5e\x6b" |
3758 | 0xa8, 0xb5, 0xc2, 0xcf, 0xdc, 0xe9, 0xf6, 0x03, | 3780 | "\x78\x85\x92\x9f\xac\xb9\xc6\xd3" |
3759 | 0x10, 0x1d, 0x2a, 0x37, 0x44, 0x51, 0x5e, 0x6b, | 3781 | "\xe0\xed\xfa\x07\x14\x21\x2e\x3b" |
3760 | 0x78, 0x85, 0x92, 0x9f, 0xac, 0xb9, 0xc6, 0xd3, | 3782 | "\x48\x55\x62\x6f\x7c\x89\x96\xa3" |
3761 | 0xe0, 0xed, 0xfa, 0x07, 0x14, 0x21, 0x2e, 0x3b, | 3783 | "\xb0\xbd\xca\xd7\xe4\xf1\xfe\x0b" |
3762 | 0x48, 0x55, 0x62, 0x6f, 0x7c, 0x89, 0x96, 0xa3, | 3784 | "\x18\x25\x32\x3f\x4c\x59\x66\x73" |
3763 | 0xb0, 0xbd, 0xca, 0xd7, 0xe4, 0xf1, 0xfe, 0x0b, | 3785 | "\x80\x8d\x9a\xa7\xb4\xc1\xce\xdb" |
3764 | 0x18, 0x25, 0x32, 0x3f, 0x4c, 0x59, 0x66, 0x73, | 3786 | "\xe8\xf5\x02\x0f\x1c\x29\x36\x43" |
3765 | 0x80, 0x8d, 0x9a, 0xa7, 0xb4, 0xc1, 0xce, 0xdb, | 3787 | "\x50\x5d\x6a\x77\x84\x91\x9e\xab" |
3766 | 0xe8, 0xf5, 0x02, 0x0f, 0x1c, 0x29, 0x36, 0x43, | 3788 | "\xb8\xc5\xd2\xdf\xec\xf9\x06\x13" |
3767 | 0x50, 0x5d, 0x6a, 0x77, 0x84, 0x91, 0x9e, 0xab, | 3789 | "\x20\x2d\x3a\x47\x54\x61\x6e\x7b" |
3768 | 0xb8, 0xc5, 0xd2, 0xdf, 0xec, 0xf9, 0x06, 0x13, | 3790 | "\x88\x95\xa2\xaf\xbc\xc9\xd6\xe3" |
3769 | 0x20, 0x2d, 0x3a, 0x47, 0x54, 0x61, 0x6e, 0x7b, | 3791 | "\xf0\xfd\x0a\x17\x24\x31\x3e\x4b" |
3770 | 0x88, 0x95, 0xa2, 0xaf, 0xbc, 0xc9, 0xd6, 0xe3, | 3792 | "\x58\x65\x72\x7f\x8c\x99\xa6\xb3" |
3771 | 0xf0, 0xfd, 0x0a, 0x17, 0x24, 0x31, 0x3e, 0x4b, | 3793 | "\xc0\xcd\xda\xe7\xf4\x01\x0e\x1b" |
3772 | 0x58, 0x65, 0x72, 0x7f, 0x8c, 0x99, 0xa6, 0xb3, | 3794 | "\x28\x35\x42\x4f\x5c\x69\x76\x83" |
3773 | 0xc0, 0xcd, 0xda, 0xe7, 0xf4, 0x01, 0x0e, 0x1b, | 3795 | "\x90\x9d\xaa\xb7\xc4\xd1\xde\xeb" |
3774 | 0x28, 0x35, 0x42, 0x4f, 0x5c, 0x69, 0x76, 0x83, | 3796 | "\xf8\x05\x12\x1f\x2c\x39\x46\x53" |
3775 | 0x90, 0x9d, 0xaa, 0xb7, 0xc4, 0xd1, 0xde, 0xeb, | 3797 | "\x60\x6d\x7a\x87\x94\xa1\xae\xbb" |
3776 | 0xf8, 0x05, 0x12, 0x1f, 0x2c, 0x39, 0x46, 0x53, | 3798 | "\xc8\xd5\xe2\xef\xfc\x09\x16\x23" |
3777 | 0x60, 0x6d, 0x7a, 0x87, 0x94, 0xa1, 0xae, 0xbb, | 3799 | "\x30\x3d\x4a\x57\x64\x71\x7e\x8b" |
3778 | 0xc8, 0xd5, 0xe2, 0xef, 0xfc, 0x09, 0x16, 0x23, | 3800 | "\x98\xa5\xb2\xbf\xcc\xd9\xe6\xf3" |
3779 | 0x30, 0x3d, 0x4a, 0x57, 0x64, 0x71, 0x7e, 0x8b, | 3801 | "\x00\x0f\x1e\x2d\x3c\x4b\x5a\x69" |
3780 | 0x98, 0xa5, 0xb2, 0xbf, 0xcc, 0xd9, 0xe6, 0xf3, | 3802 | "\x78\x87\x96\xa5\xb4\xc3\xd2\xe1" |
3781 | 0x00, 0x0f, 0x1e, 0x2d, 0x3c, 0x4b, 0x5a, 0x69, | 3803 | "\xf0\xff\x0e\x1d\x2c\x3b\x4a\x59" |
3782 | 0x78, 0x87, 0x96, 0xa5, 0xb4, 0xc3, 0xd2, 0xe1, | 3804 | "\x68\x77\x86\x95\xa4\xb3\xc2\xd1" |
3783 | 0xf0, 0xff, 0x0e, 0x1d, 0x2c, 0x3b, 0x4a, 0x59, | 3805 | "\xe0\xef\xfe\x0d\x1c\x2b\x3a\x49" |
3784 | 0x68, 0x77, 0x86, 0x95, 0xa4, 0xb3, 0xc2, 0xd1, | 3806 | "\x58\x67\x76\x85\x94\xa3\xb2\xc1" |
3785 | 0xe0, 0xef, 0xfe, 0x0d, 0x1c, 0x2b, 0x3a, 0x49, | 3807 | "\xd0\xdf\xee\xfd\x0c\x1b\x2a\x39" |
3786 | 0x58, 0x67, 0x76, 0x85, 0x94, 0xa3, 0xb2, 0xc1, | 3808 | "\x48\x57\x66\x75\x84\x93\xa2\xb1" |
3787 | 0xd0, 0xdf, 0xee, 0xfd, 0x0c, 0x1b, 0x2a, 0x39, | 3809 | "\xc0\xcf\xde\xed\xfc\x0b\x1a\x29" |
3788 | 0x48, 0x57, 0x66, 0x75, 0x84, 0x93, 0xa2, 0xb1, | 3810 | "\x38\x47\x56\x65\x74\x83\x92\xa1" |
3789 | 0xc0, 0xcf, 0xde, 0xed, 0xfc, 0x0b, 0x1a, 0x29, | 3811 | "\xb0\xbf\xce\xdd\xec\xfb\x0a\x19" |
3790 | 0x38, 0x47, 0x56, 0x65, 0x74, 0x83, 0x92, 0xa1, | 3812 | "\x28\x37\x46\x55\x64\x73\x82\x91" |
3791 | 0xb0, 0xbf, 0xce, 0xdd, 0xec, 0xfb, 0x0a, 0x19, | 3813 | "\xa0\xaf\xbe\xcd\xdc\xeb\xfa\x09" |
3792 | 0x28, 0x37, 0x46, 0x55, 0x64, 0x73, 0x82, 0x91, | 3814 | "\x18\x27\x36\x45\x54\x63\x72\x81" |
3793 | 0xa0, 0xaf, 0xbe, 0xcd, 0xdc, 0xeb, 0xfa, 0x09, | 3815 | "\x90\x9f\xae\xbd\xcc\xdb\xea\xf9" |
3794 | 0x18, 0x27, 0x36, 0x45, 0x54, 0x63, 0x72, 0x81, | 3816 | "\x08\x17\x26\x35\x44\x53\x62\x71" |
3795 | 0x90, 0x9f, 0xae, 0xbd, 0xcc, 0xdb, 0xea, 0xf9, | 3817 | "\x80\x8f\x9e\xad\xbc\xcb\xda\xe9" |
3796 | 0x08, 0x17, 0x26, 0x35, 0x44, 0x53, 0x62, 0x71, | 3818 | "\xf8\x07\x16\x25\x34\x43\x52\x61" |
3797 | 0x80, 0x8f, 0x9e, 0xad, 0xbc, 0xcb, 0xda, 0xe9, | 3819 | "\x70\x7f\x8e\x9d\xac\xbb\xca\xd9" |
3798 | 0xf8, 0x07, 0x16, 0x25, 0x34, 0x43, 0x52, 0x61, | 3820 | "\xe8\xf7\x06\x15\x24\x33\x42\x51" |
3799 | 0x70, 0x7f, 0x8e, 0x9d, 0xac, 0xbb, 0xca, 0xd9, | 3821 | "\x60\x6f\x7e\x8d\x9c\xab\xba\xc9" |
3800 | 0xe8, 0xf7, 0x06, 0x15, 0x24, 0x33, 0x42, 0x51, | 3822 | "\xd8\xe7\xf6\x05\x14\x23\x32\x41" |
3801 | 0x60, 0x6f, 0x7e, 0x8d, 0x9c, 0xab, 0xba, 0xc9, | 3823 | "\x50\x5f\x6e\x7d\x8c\x9b\xaa\xb9" |
3802 | 0xd8, 0xe7, 0xf6, 0x05, 0x14, 0x23, 0x32, 0x41, | 3824 | "\xc8\xd7\xe6\xf5\x04\x13\x22\x31" |
3803 | 0x50, 0x5f, 0x6e, 0x7d, 0x8c, 0x9b, 0xaa, 0xb9, | 3825 | "\x40\x4f\x5e\x6d\x7c\x8b\x9a\xa9" |
3804 | 0xc8, 0xd7, 0xe6, 0xf5, 0x04, 0x13, 0x22, 0x31, | 3826 | "\xb8\xc7\xd6\xe5\xf4\x03\x12\x21" |
3805 | 0x40, 0x4f, 0x5e, 0x6d, 0x7c, 0x8b, 0x9a, 0xa9, | 3827 | "\x30\x3f\x4e\x5d\x6c\x7b\x8a\x99" |
3806 | 0xb8, 0xc7, 0xd6, 0xe5, 0xf4, 0x03, 0x12, 0x21, | 3828 | "\xa8\xb7\xc6\xd5\xe4\xf3\x02\x11" |
3807 | 0x30, 0x3f, 0x4e, 0x5d, 0x6c, 0x7b, 0x8a, 0x99, | 3829 | "\x20\x2f\x3e\x4d\x5c\x6b\x7a\x89" |
3808 | 0xa8, 0xb7, 0xc6, 0xd5, 0xe4, 0xf3, 0x02, 0x11, | 3830 | "\x98\xa7\xb6\xc5\xd4\xe3\xf2\x01" |
3809 | 0x20, 0x2f, 0x3e, 0x4d, 0x5c, 0x6b, 0x7a, 0x89, | 3831 | "\x10\x1f\x2e\x3d\x4c\x5b\x6a\x79" |
3810 | 0x98, 0xa7, 0xb6, 0xc5, 0xd4, 0xe3, 0xf2, 0x01, | 3832 | "\x88\x97\xa6\xb5\xc4\xd3\xe2\xf1" |
3811 | 0x10, 0x1f, 0x2e, 0x3d, 0x4c, 0x5b, 0x6a, 0x79, | 3833 | "\x00\x11\x22\x33\x44\x55\x66\x77" |
3812 | 0x88, 0x97, 0xa6, 0xb5, 0xc4, 0xd3, 0xe2, 0xf1, | 3834 | "\x88\x99\xaa\xbb\xcc\xdd\xee\xff" |
3813 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 3835 | "\x10\x21\x32\x43\x54\x65\x76\x87" |
3814 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, | 3836 | "\x98\xa9\xba\xcb\xdc\xed\xfe\x0f" |
3815 | 0x10, 0x21, 0x32, 0x43, 0x54, 0x65, 0x76, 0x87, | 3837 | "\x20\x31\x42\x53\x64\x75\x86\x97" |
3816 | 0x98, 0xa9, 0xba, 0xcb, 0xdc, 0xed, 0xfe, 0x0f, | 3838 | "\xa8\xb9\xca\xdb\xec\xfd\x0e\x1f" |
3817 | 0x20, 0x31, 0x42, 0x53, 0x64, 0x75, 0x86, 0x97, | 3839 | "\x30\x41\x52\x63\x74\x85\x96\xa7" |
3818 | 0xa8, 0xb9, 0xca, 0xdb, 0xec, 0xfd, 0x0e, 0x1f, | 3840 | "\xb8\xc9\xda\xeb\xfc\x0d\x1e\x2f" |
3819 | 0x30, 0x41, 0x52, 0x63, 0x74, 0x85, 0x96, 0xa7, | 3841 | "\x40\x51\x62\x73\x84\x95\xa6\xb7" |
3820 | 0xb8, 0xc9, 0xda, 0xeb, 0xfc, 0x0d, 0x1e, 0x2f, | 3842 | "\xc8\xd9\xea\xfb\x0c\x1d\x2e\x3f" |
3821 | 0x40, 0x51, 0x62, 0x73, 0x84, 0x95, 0xa6, 0xb7, | 3843 | "\x50\x61\x72\x83\x94\xa5\xb6\xc7" |
3822 | 0xc8, 0xd9, 0xea, 0xfb, 0x0c, 0x1d, 0x2e, 0x3f, | 3844 | "\xd8\xe9\xfa\x0b\x1c\x2d\x3e\x4f" |
3823 | 0x50, 0x61, 0x72, 0x83, 0x94, 0xa5, 0xb6, 0xc7, | 3845 | "\x60\x71\x82\x93\xa4\xb5\xc6\xd7" |
3824 | 0xd8, 0xe9, 0xfa, 0x0b, 0x1c, 0x2d, 0x3e, 0x4f, | 3846 | "\xe8\xf9\x0a\x1b\x2c\x3d\x4e\x5f" |
3825 | 0x60, 0x71, 0x82, 0x93, 0xa4, 0xb5, 0xc6, 0xd7, | 3847 | "\x70\x81\x92\xa3\xb4\xc5\xd6\xe7" |
3826 | 0xe8, 0xf9, 0x0a, 0x1b, 0x2c, 0x3d, 0x4e, 0x5f, | 3848 | "\xf8\x09\x1a\x2b\x3c\x4d\x5e\x6f" |
3827 | 0x70, 0x81, 0x92, 0xa3, 0xb4, 0xc5, 0xd6, 0xe7, | 3849 | "\x80\x91\xa2\xb3\xc4\xd5\xe6\xf7" |
3828 | 0xf8, 0x09, 0x1a, 0x2b, 0x3c, 0x4d, 0x5e, 0x6f, | 3850 | "\x08\x19\x2a\x3b\x4c\x5d\x6e\x7f" |
3829 | 0x80, 0x91, 0xa2, 0xb3, 0xc4, 0xd5, 0xe6, 0xf7, | 3851 | "\x90\xa1\xb2\xc3\xd4\xe5\xf6\x07" |
3830 | 0x08, 0x19, 0x2a, 0x3b, 0x4c, 0x5d, 0x6e, 0x7f, | 3852 | "\x18\x29\x3a\x4b\x5c\x6d\x7e\x8f" |
3831 | 0x90, 0xa1, 0xb2, 0xc3, 0xd4, 0xe5, 0xf6, 0x07, | 3853 | "\xa0\xb1\xc2\xd3\xe4\xf5\x06\x17" |
3832 | 0x18, 0x29, 0x3a, 0x4b, 0x5c, 0x6d, 0x7e, 0x8f, | 3854 | "\x28\x39\x4a\x5b\x6c\x7d\x8e\x9f" |
3833 | 0xa0, 0xb1, 0xc2, 0xd3, 0xe4, 0xf5, 0x06, 0x17, | 3855 | "\xb0\xc1\xd2\xe3\xf4\x05\x16\x27" |
3834 | 0x28, 0x39, 0x4a, 0x5b, 0x6c, 0x7d, 0x8e, 0x9f, | 3856 | "\x38\x49\x5a\x6b\x7c\x8d\x9e\xaf" |
3835 | 0xb0, 0xc1, 0xd2, 0xe3, 0xf4, 0x05, 0x16, 0x27, | 3857 | "\xc0\xd1\xe2\xf3\x04\x15\x26\x37" |
3836 | 0x38, 0x49, 0x5a, 0x6b, 0x7c, 0x8d, 0x9e, 0xaf, | 3858 | "\x48\x59\x6a\x7b\x8c\x9d\xae\xbf" |
3837 | 0xc0, 0xd1, 0xe2, 0xf3, 0x04, 0x15, 0x26, 0x37, | 3859 | "\xd0\xe1\xf2\x03\x14\x25\x36\x47" |
3838 | 0x48, 0x59, 0x6a, 0x7b, 0x8c, 0x9d, 0xae, 0xbf, | 3860 | "\x58\x69\x7a\x8b\x9c\xad\xbe\xcf" |
3839 | 0xd0, 0xe1, 0xf2, 0x03, 0x14, 0x25, 0x36, 0x47, | 3861 | "\xe0\xf1\x02\x13\x24\x35\x46\x57" |
3840 | 0x58, 0x69, 0x7a, 0x8b, 0x9c, 0xad, 0xbe, 0xcf, | 3862 | "\x68\x79\x8a\x9b\xac\xbd\xce\xdf" |
3841 | 0xe0, 0xf1, 0x02, 0x13, 0x24, 0x35, 0x46, 0x57, | 3863 | "\xf0\x01\x12\x23\x34\x45\x56\x67" |
3842 | 0x68, 0x79, 0x8a, 0x9b, 0xac, 0xbd, 0xce, 0xdf, | 3864 | "\x78\x89\x9a\xab\xbc\xcd\xde\xef" |
3843 | 0xf0, 0x01, 0x12, 0x23, 0x34, 0x45, 0x56, 0x67, | 3865 | "\x00\x13\x26\x39\x4c\x5f\x72\x85" |
3844 | 0x78, 0x89, 0x9a, 0xab, 0xbc, 0xcd, 0xde, 0xef, | 3866 | "\x98\xab\xbe\xd1\xe4\xf7\x0a\x1d" |
3845 | 0x00, 0x13, 0x26, 0x39, 0x4c, 0x5f, 0x72, 0x85, | 3867 | "\x30\x43\x56\x69\x7c\x8f\xa2\xb5" |
3846 | 0x98, 0xab, 0xbe, 0xd1, 0xe4, 0xf7, 0x0a, 0x1d, | 3868 | "\xc8\xdb\xee\x01\x14\x27\x3a\x4d" |
3847 | 0x30, 0x43, 0x56, 0x69, 0x7c, 0x8f, 0xa2, 0xb5, | 3869 | "\x60\x73\x86\x99\xac\xbf\xd2\xe5" |
3848 | 0xc8, 0xdb, 0xee, 0x01, 0x14, 0x27, 0x3a, 0x4d, | 3870 | "\xf8\x0b\x1e\x31\x44\x57\x6a\x7d" |
3849 | 0x60, 0x73, 0x86, 0x99, 0xac, 0xbf, 0xd2, 0xe5, | 3871 | "\x90\xa3\xb6\xc9\xdc\xef\x02\x15" |
3850 | 0xf8, 0x0b, 0x1e, 0x31, 0x44, 0x57, 0x6a, 0x7d, | 3872 | "\x28\x3b\x4e\x61\x74\x87\x9a\xad" |
3851 | 0x90, 0xa3, 0xb6, 0xc9, 0xdc, 0xef, 0x02, 0x15, | 3873 | "\xc0\xd3\xe6\xf9\x0c\x1f\x32\x45" |
3852 | 0x28, 0x3b, 0x4e, 0x61, 0x74, 0x87, 0x9a, 0xad, | 3874 | "\x58\x6b\x7e\x91\xa4\xb7\xca\xdd" |
3853 | 0xc0, 0xd3, 0xe6, 0xf9, 0x0c, 0x1f, 0x32, 0x45, | 3875 | "\xf0\x03\x16\x29\x3c\x4f\x62\x75" |
3854 | 0x58, 0x6b, 0x7e, 0x91, 0xa4, 0xb7, 0xca, 0xdd, | 3876 | "\x88\x9b\xae\xc1\xd4\xe7\xfa\x0d" |
3855 | 0xf0, 0x03, 0x16, 0x29, 0x3c, 0x4f, 0x62, 0x75, | 3877 | "\x20\x33\x46\x59\x6c\x7f\x92\xa5" |
3856 | 0x88, 0x9b, 0xae, 0xc1, 0xd4, 0xe7, 0xfa, 0x0d, | 3878 | "\xb8\xcb\xde\xf1\x04\x17\x2a\x3d" |
3857 | 0x20, 0x33, 0x46, 0x59, 0x6c, 0x7f, 0x92, 0xa5, | 3879 | "\x50\x63\x76\x89\x9c\xaf\xc2\xd5" |
3858 | 0xb8, 0xcb, 0xde, 0xf1, 0x04, 0x17, 0x2a, 0x3d, | 3880 | "\xe8\xfb\x0e\x21\x34\x47\x5a\x6d" |
3859 | 0x50, 0x63, 0x76, 0x89, 0x9c, 0xaf, 0xc2, 0xd5, | 3881 | "\x80\x93\xa6\xb9\xcc\xdf\xf2\x05" |
3860 | 0xe8, 0xfb, 0x0e, 0x21, 0x34, 0x47, 0x5a, 0x6d, | 3882 | "\x18\x2b\x3e\x51\x64\x77\x8a\x9d" |
3861 | 0x80, 0x93, 0xa6, 0xb9, 0xcc, 0xdf, 0xf2, 0x05, | 3883 | "\xb0\xc3\xd6\xe9\xfc\x0f\x22\x35" |
3862 | 0x18, 0x2b, 0x3e, 0x51, 0x64, 0x77, 0x8a, 0x9d, | 3884 | "\x48\x5b\x6e\x81\x94\xa7\xba\xcd" |
3863 | 0xb0, 0xc3, 0xd6, 0xe9, 0xfc, 0x0f, 0x22, 0x35, | 3885 | "\xe0\xf3\x06\x19\x2c\x3f\x52\x65" |
3864 | 0x48, 0x5b, 0x6e, 0x81, 0x94, 0xa7, 0xba, 0xcd, | 3886 | "\x78\x8b\x9e\xb1\xc4\xd7\xea\xfd" |
3865 | 0xe0, 0xf3, 0x06, 0x19, 0x2c, 0x3f, 0x52, 0x65, | 3887 | "\x10\x23\x36\x49\x5c\x6f\x82\x95" |
3866 | 0x78, 0x8b, 0x9e, 0xb1, 0xc4, 0xd7, 0xea, 0xfd, | 3888 | "\xa8\xbb\xce\xe1\xf4\x07\x1a\x2d" |
3867 | 0x10, 0x23, 0x36, 0x49, 0x5c, 0x6f, 0x82, 0x95, | 3889 | "\x40\x53\x66\x79\x8c\x9f\xb2\xc5" |
3868 | 0xa8, 0xbb, 0xce, 0xe1, 0xf4, 0x07, 0x1a, 0x2d, | 3890 | "\xd8\xeb\xfe\x11\x24\x37\x4a\x5d" |
3869 | 0x40, 0x53, 0x66, 0x79, 0x8c, 0x9f, 0xb2, 0xc5, | 3891 | "\x70\x83\x96\xa9\xbc\xcf\xe2\xf5" |
3870 | 0xd8, 0xeb, 0xfe, 0x11, 0x24, 0x37, 0x4a, 0x5d, | 3892 | "\x08\x1b\x2e\x41\x54\x67\x7a\x8d" |
3871 | 0x70, 0x83, 0x96, 0xa9, 0xbc, 0xcf, 0xe2, 0xf5, | 3893 | "\xa0\xb3\xc6\xd9\xec\xff\x12\x25" |
3872 | 0x08, 0x1b, 0x2e, 0x41, 0x54, 0x67, 0x7a, 0x8d, | 3894 | "\x38\x4b\x5e\x71\x84\x97\xaa\xbd" |
3873 | 0xa0, 0xb3, 0xc6, 0xd9, 0xec, 0xff, 0x12, 0x25, | 3895 | "\xd0\xe3\xf6\x09\x1c\x2f\x42\x55" |
3874 | 0x38, 0x4b, 0x5e, 0x71, 0x84, 0x97, 0xaa, 0xbd, | 3896 | "\x68\x7b\x8e\xa1\xb4\xc7\xda\xed" |
3875 | 0xd0, 0xe3, 0xf6, 0x09, 0x1c, 0x2f, 0x42, 0x55, | 3897 | "\x00\x15\x2a\x3f\x54\x69\x7e\x93" |
3876 | 0x68, 0x7b, 0x8e, 0xa1, 0xb4, 0xc7, 0xda, 0xed, | 3898 | "\xa8\xbd\xd2\xe7\xfc\x11\x26\x3b" |
3877 | 0x00, 0x15, 0x2a, 0x3f, 0x54, 0x69, 0x7e, 0x93, | 3899 | "\x50\x65\x7a\x8f\xa4\xb9\xce\xe3" |
3878 | 0xa8, 0xbd, 0xd2, 0xe7, 0xfc, 0x11, 0x26, 0x3b, | 3900 | "\xf8\x0d\x22\x37\x4c\x61\x76\x8b" |
3879 | 0x50, 0x65, 0x7a, 0x8f, 0xa4, 0xb9, 0xce, 0xe3, | 3901 | "\xa0\xb5\xca\xdf\xf4\x09\x1e\x33" |
3880 | 0xf8, 0x0d, 0x22, 0x37, 0x4c, 0x61, 0x76, 0x8b, | 3902 | "\x48\x5d\x72\x87\x9c\xb1\xc6\xdb" |
3881 | 0xa0, 0xb5, 0xca, 0xdf, 0xf4, 0x09, 0x1e, 0x33, | 3903 | "\xf0\x05\x1a\x2f\x44\x59\x6e\x83" |
3882 | 0x48, 0x5d, 0x72, 0x87, 0x9c, 0xb1, 0xc6, 0xdb, | 3904 | "\x98\xad\xc2\xd7\xec\x01\x16\x2b" |
3883 | 0xf0, 0x05, 0x1a, 0x2f, 0x44, 0x59, 0x6e, 0x83, | 3905 | "\x40\x55\x6a\x7f\x94\xa9\xbe\xd3" |
3884 | 0x98, 0xad, 0xc2, 0xd7, 0xec, 0x01, 0x16, 0x2b, | 3906 | "\xe8\xfd\x12\x27\x3c\x51\x66\x7b" |
3885 | 0x40, 0x55, 0x6a, 0x7f, 0x94, 0xa9, 0xbe, 0xd3, | 3907 | "\x90\xa5\xba\xcf\xe4\xf9\x0e\x23" |
3886 | 0xe8, 0xfd, 0x12, 0x27, 0x3c, 0x51, 0x66, 0x7b, | 3908 | "\x38\x4d\x62\x77\x8c\xa1\xb6\xcb" |
3887 | 0x90, 0xa5, 0xba, 0xcf, 0xe4, 0xf9, 0x0e, 0x23, | 3909 | "\xe0\xf5\x0a\x1f\x34\x49\x5e\x73" |
3888 | 0x38, 0x4d, 0x62, 0x77, 0x8c, 0xa1, 0xb6, 0xcb, | 3910 | "\x88\x9d\xb2\xc7\xdc\xf1\x06\x1b" |
3889 | 0xe0, 0xf5, 0x0a, 0x1f, 0x34, 0x49, 0x5e, 0x73, | 3911 | "\x30\x45\x5a\x6f\x84\x99\xae\xc3" |
3890 | 0x88, 0x9d, 0xb2, 0xc7, 0xdc, 0xf1, 0x06, 0x1b, | 3912 | "\xd8\xed\x02\x17\x2c\x41\x56\x6b" |
3891 | 0x30, 0x45, 0x5a, 0x6f, 0x84, 0x99, 0xae, 0xc3, | 3913 | "\x80\x95\xaa\xbf\xd4\xe9\xfe\x13" |
3892 | 0xd8, 0xed, 0x02, 0x17, 0x2c, 0x41, 0x56, 0x6b, | 3914 | "\x28\x3d\x52\x67\x7c\x91\xa6\xbb" |
3893 | 0x80, 0x95, 0xaa, 0xbf, 0xd4, 0xe9, 0xfe, 0x13, | 3915 | "\xd0\xe5\xfa\x0f\x24\x39\x4e\x63" |
3894 | 0x28, 0x3d, 0x52, 0x67, 0x7c, 0x91, 0xa6, 0xbb, | 3916 | "\x78\x8d\xa2\xb7\xcc\xe1\xf6\x0b" |
3895 | 0xd0, 0xe5, 0xfa, 0x0f, 0x24, 0x39, 0x4e, 0x63, | 3917 | "\x20\x35\x4a\x5f\x74\x89\x9e\xb3" |
3896 | 0x78, 0x8d, 0xa2, 0xb7, 0xcc, 0xe1, 0xf6, 0x0b, | 3918 | "\xc8\xdd\xf2\x07\x1c\x31\x46\x5b" |
3897 | 0x20, 0x35, 0x4a, 0x5f, 0x74, 0x89, 0x9e, 0xb3, | 3919 | "\x70\x85\x9a\xaf\xc4\xd9\xee\x03" |
3898 | 0xc8, 0xdd, 0xf2, 0x07, 0x1c, 0x31, 0x46, 0x5b, | 3920 | "\x18\x2d\x42\x57\x6c\x81\x96\xab" |
3899 | 0x70, 0x85, 0x9a, 0xaf, 0xc4, 0xd9, 0xee, 0x03, | 3921 | "\xc0\xd5\xea\xff\x14\x29\x3e\x53" |
3900 | 0x18, 0x2d, 0x42, 0x57, 0x6c, 0x81, 0x96, 0xab, | 3922 | "\x68\x7d\x92\xa7\xbc\xd1\xe6\xfb" |
3901 | 0xc0, 0xd5, 0xea, 0xff, 0x14, 0x29, 0x3e, 0x53, | 3923 | "\x10\x25\x3a\x4f\x64\x79\x8e\xa3" |
3902 | 0x68, 0x7d, 0x92, 0xa7, 0xbc, 0xd1, 0xe6, 0xfb, | 3924 | "\xb8\xcd\xe2\xf7\x0c\x21\x36\x4b" |
3903 | 0x10, 0x25, 0x3a, 0x4f, 0x64, 0x79, 0x8e, 0xa3, | 3925 | "\x60\x75\x8a\x9f\xb4\xc9\xde\xf3" |
3904 | 0xb8, 0xcd, 0xe2, 0xf7, 0x0c, 0x21, 0x36, 0x4b, | 3926 | "\x08\x1d\x32\x47\x5c\x71\x86\x9b" |
3905 | 0x60, 0x75, 0x8a, 0x9f, 0xb4, 0xc9, 0xde, 0xf3, | 3927 | "\xb0\xc5\xda\xef\x04\x19\x2e\x43" |
3906 | 0x08, 0x1d, 0x32, 0x47, 0x5c, 0x71, 0x86, 0x9b, | 3928 | "\x58\x6d\x82\x97\xac\xc1\xd6\xeb" |
3907 | 0xb0, 0xc5, 0xda, 0xef, 0x04, 0x19, 0x2e, 0x43, | 3929 | "\x00\x17\x2e\x45\x5c\x73\x8a\xa1" |
3908 | 0x58, 0x6d, 0x82, 0x97, 0xac, 0xc1, 0xd6, 0xeb, | 3930 | "\xb8\xcf\xe6\xfd\x14\x2b\x42\x59" |
3909 | 0x00, 0x17, 0x2e, 0x45, 0x5c, 0x73, 0x8a, 0xa1, | 3931 | "\x70\x87\x9e\xb5\xcc\xe3\xfa\x11" |
3910 | 0xb8, 0xcf, 0xe6, 0xfd, 0x14, 0x2b, 0x42, 0x59, | 3932 | "\x28\x3f\x56\x6d\x84\x9b\xb2\xc9" |
3911 | 0x70, 0x87, 0x9e, 0xb5, 0xcc, 0xe3, 0xfa, 0x11, | 3933 | "\xe0\xf7\x0e\x25\x3c\x53\x6a\x81" |
3912 | 0x28, 0x3f, 0x56, 0x6d, 0x84, 0x9b, 0xb2, 0xc9, | 3934 | "\x98\xaf\xc6\xdd\xf4\x0b\x22\x39" |
3913 | 0xe0, 0xf7, 0x0e, 0x25, 0x3c, 0x53, 0x6a, 0x81, | 3935 | "\x50\x67\x7e\x95\xac\xc3\xda\xf1" |
3914 | 0x98, 0xaf, 0xc6, 0xdd, 0xf4, 0x0b, 0x22, 0x39, | 3936 | "\x08\x1f\x36\x4d\x64\x7b\x92\xa9" |
3915 | 0x50, 0x67, 0x7e, 0x95, 0xac, 0xc3, 0xda, 0xf1, | 3937 | "\xc0\xd7\xee\x05\x1c\x33\x4a\x61" |
3916 | 0x08, 0x1f, 0x36, 0x4d, 0x64, 0x7b, 0x92, 0xa9, | 3938 | "\x78\x8f\xa6\xbd\xd4\xeb\x02\x19" |
3917 | 0xc0, 0xd7, 0xee, 0x05, 0x1c, 0x33, 0x4a, 0x61, | 3939 | "\x30\x47\x5e\x75\x8c\xa3\xba\xd1" |
3918 | 0x78, 0x8f, 0xa6, 0xbd, 0xd4, 0xeb, 0x02, 0x19, | 3940 | "\xe8\xff\x16\x2d\x44\x5b\x72\x89" |
3919 | 0x30, 0x47, 0x5e, 0x75, 0x8c, 0xa3, 0xba, 0xd1, | 3941 | "\xa0\xb7\xce\xe5\xfc\x13\x2a\x41" |
3920 | 0xe8, 0xff, 0x16, 0x2d, 0x44, 0x5b, 0x72, 0x89, | 3942 | "\x58\x6f\x86\x9d\xb4\xcb\xe2\xf9" |
3921 | 0xa0, 0xb7, 0xce, 0xe5, 0xfc, 0x13, 0x2a, 0x41, | 3943 | "\x10\x27\x3e\x55\x6c\x83\x9a\xb1" |
3922 | 0x58, 0x6f, 0x86, 0x9d, 0xb4, 0xcb, 0xe2, 0xf9, | 3944 | "\xc8\xdf\xf6\x0d\x24\x3b\x52\x69" |
3923 | 0x10, 0x27, 0x3e, 0x55, 0x6c, 0x83, 0x9a, 0xb1, | 3945 | "\x80\x97\xae\xc5\xdc\xf3\x0a\x21" |
3924 | 0xc8, 0xdf, 0xf6, 0x0d, 0x24, 0x3b, 0x52, 0x69, | 3946 | "\x38\x4f\x66\x7d\x94\xab\xc2\xd9" |
3925 | 0x80, 0x97, 0xae, 0xc5, 0xdc, 0xf3, 0x0a, 0x21, | 3947 | "\xf0\x07\x1e\x35\x4c\x63\x7a\x91" |
3926 | 0x38, 0x4f, 0x66, 0x7d, 0x94, 0xab, 0xc2, 0xd9, | 3948 | "\xa8\xbf\xd6\xed\x04\x1b\x32\x49" |
3927 | 0xf0, 0x07, 0x1e, 0x35, 0x4c, 0x63, 0x7a, 0x91, | 3949 | "\x60\x77\x8e\xa5\xbc\xd3\xea\x01" |
3928 | 0xa8, 0xbf, 0xd6, 0xed, 0x04, 0x1b, 0x32, 0x49, | 3950 | "\x18\x2f\x46\x5d\x74\x8b\xa2\xb9" |
3929 | 0x60, 0x77, 0x8e, 0xa5, 0xbc, 0xd3, 0xea, 0x01, | 3951 | "\xd0\xe7\xfe\x15\x2c\x43\x5a\x71" |
3930 | 0x18, 0x2f, 0x46, 0x5d, 0x74, 0x8b, 0xa2, 0xb9, | 3952 | "\x88\x9f\xb6\xcd\xe4\xfb\x12\x29" |
3931 | 0xd0, 0xe7, 0xfe, 0x15, 0x2c, 0x43, 0x5a, 0x71, | 3953 | "\x40\x57\x6e\x85\x9c\xb3\xca\xe1" |
3932 | 0x88, 0x9f, 0xb6, 0xcd, 0xe4, 0xfb, 0x12, 0x29, | 3954 | "\xf8\x0f\x26\x3d\x54\x6b\x82\x99" |
3933 | 0x40, 0x57, 0x6e, 0x85, 0x9c, 0xb3, 0xca, 0xe1, | 3955 | "\xb0\xc7\xde\xf5\x0c\x23\x3a\x51" |
3934 | 0xf8, 0x0f, 0x26, 0x3d, 0x54, 0x6b, 0x82, 0x99, | 3956 | "\x68\x7f\x96\xad\xc4\xdb\xf2\x09" |
3935 | 0xb0, 0xc7, 0xde, 0xf5, 0x0c, 0x23, 0x3a, 0x51, | 3957 | "\x20\x37\x4e\x65\x7c\x93\xaa\xc1" |
3936 | 0x68, 0x7f, 0x96, 0xad, 0xc4, 0xdb, 0xf2, 0x09, | 3958 | "\xd8\xef\x06\x1d\x34\x4b\x62\x79" |
3937 | 0x20, 0x37, 0x4e, 0x65, 0x7c, 0x93, 0xaa, 0xc1, | 3959 | "\x90\xa7\xbe\xd5\xec\x03\x1a\x31" |
3938 | 0xd8, 0xef, 0x06, 0x1d, 0x34, 0x4b, 0x62, 0x79, | 3960 | "\x48\x5f\x76\x8d\xa4\xbb\xd2\xe9" |
3939 | 0x90, 0xa7, 0xbe, 0xd5, 0xec, 0x03, 0x1a, 0x31, | 3961 | "\x00\x19\x32\x4b\x64\x7d\x96\xaf" |
3940 | 0x48, 0x5f, 0x76, 0x8d, 0xa4, 0xbb, 0xd2, 0xe9, | 3962 | "\xc8\xe1\xfa\x13\x2c\x45\x5e\x77" |
3941 | 0x00, 0x19, 0x32, 0x4b, 0x64, 0x7d, 0x96, 0xaf, | 3963 | "\x90\xa9\xc2\xdb\xf4\x0d\x26\x3f" |
3942 | 0xc8, 0xe1, 0xfa, 0x13, 0x2c, 0x45, 0x5e, 0x77, | 3964 | "\x58\x71\x8a\xa3\xbc\xd5\xee\x07" |
3943 | 0x90, 0xa9, 0xc2, 0xdb, 0xf4, 0x0d, 0x26, 0x3f, | 3965 | "\x20\x39\x52\x6b\x84\x9d\xb6\xcf" |
3944 | 0x58, 0x71, 0x8a, 0xa3, 0xbc, 0xd5, 0xee, 0x07, | 3966 | "\xe8\x01\x1a\x33\x4c\x65\x7e\x97" |
3945 | 0x20, 0x39, 0x52, 0x6b, 0x84, 0x9d, 0xb6, 0xcf, | 3967 | "\xb0\xc9\xe2\xfb\x14\x2d\x46\x5f" |
3946 | 0xe8, 0x01, 0x1a, 0x33, 0x4c, 0x65, 0x7e, 0x97, | 3968 | "\x78\x91\xaa\xc3\xdc\xf5\x0e\x27" |
3947 | 0xb0, 0xc9, 0xe2, 0xfb, 0x14, 0x2d, 0x46, 0x5f, | 3969 | "\x40\x59\x72\x8b\xa4\xbd\xd6\xef" |
3948 | 0x78, 0x91, 0xaa, 0xc3, 0xdc, 0xf5, 0x0e, 0x27, | 3970 | "\x08\x21\x3a\x53\x6c\x85\x9e\xb7" |
3949 | 0x40, 0x59, 0x72, 0x8b, 0xa4, 0xbd, 0xd6, 0xef, | 3971 | "\xd0\xe9\x02\x1b\x34\x4d\x66\x7f" |
3950 | 0x08, 0x21, 0x3a, 0x53, 0x6c, 0x85, 0x9e, 0xb7, | 3972 | "\x98\xb1\xca\xe3\xfc\x15\x2e\x47" |
3951 | 0xd0, 0xe9, 0x02, 0x1b, 0x34, 0x4d, 0x66, 0x7f, | 3973 | "\x60\x79\x92\xab\xc4\xdd\xf6\x0f" |
3952 | 0x98, 0xb1, 0xca, 0xe3, 0xfc, 0x15, 0x2e, 0x47, | 3974 | "\x28\x41\x5a\x73\x8c\xa5\xbe\xd7" |
3953 | 0x60, 0x79, 0x92, 0xab, 0xc4, 0xdd, 0xf6, 0x0f, | 3975 | "\xf0\x09\x22\x3b\x54\x6d\x86\x9f" |
3954 | 0x28, 0x41, 0x5a, 0x73, 0x8c, 0xa5, 0xbe, 0xd7, | 3976 | "\xb8\xd1\xea\x03\x1c\x35\x4e\x67" |
3955 | 0xf0, 0x09, 0x22, 0x3b, 0x54, 0x6d, 0x86, 0x9f, | 3977 | "\x80\x99\xb2\xcb\xe4\xfd\x16\x2f" |
3956 | 0xb8, 0xd1, 0xea, 0x03, 0x1c, 0x35, 0x4e, 0x67, | 3978 | "\x48\x61\x7a\x93\xac\xc5\xde\xf7" |
3957 | 0x80, 0x99, 0xb2, 0xcb, 0xe4, 0xfd, 0x16, 0x2f, | 3979 | "\x10\x29\x42\x5b\x74\x8d\xa6\xbf" |
3958 | 0x48, 0x61, 0x7a, 0x93, 0xac, 0xc5, 0xde, 0xf7, | 3980 | "\xd8\xf1\x0a\x23\x3c\x55\x6e\x87" |
3959 | 0x10, 0x29, 0x42, 0x5b, 0x74, 0x8d, 0xa6, 0xbf, | 3981 | "\xa0\xb9\xd2\xeb\x04\x1d\x36\x4f" |
3960 | 0xd8, 0xf1, 0x0a, 0x23, 0x3c, 0x55, 0x6e, 0x87, | 3982 | "\x68\x81\x9a\xb3\xcc\xe5\xfe\x17" |
3961 | 0xa0, 0xb9, 0xd2, 0xeb, 0x04, 0x1d, 0x36, 0x4f, | 3983 | "\x30\x49\x62\x7b\x94\xad\xc6\xdf" |
3962 | 0x68, 0x81, 0x9a, 0xb3, 0xcc, 0xe5, 0xfe, 0x17, | 3984 | "\xf8\x11\x2a\x43\x5c\x75\x8e\xa7" |
3963 | 0x30, 0x49, 0x62, 0x7b, 0x94, 0xad, 0xc6, 0xdf, | 3985 | "\xc0\xd9\xf2\x0b\x24\x3d\x56\x6f" |
3964 | 0xf8, 0x11, 0x2a, 0x43, 0x5c, 0x75, 0x8e, 0xa7, | 3986 | "\x88\xa1\xba\xd3\xec\x05\x1e\x37" |
3965 | 0xc0, 0xd9, 0xf2, 0x0b, 0x24, 0x3d, 0x56, 0x6f, | 3987 | "\x50\x69\x82\x9b\xb4\xcd\xe6\xff" |
3966 | 0x88, 0xa1, 0xba, 0xd3, 0xec, 0x05, 0x1e, 0x37, | 3988 | "\x18\x31\x4a\x63\x7c\x95\xae\xc7" |
3967 | 0x50, 0x69, 0x82, 0x9b, 0xb4, 0xcd, 0xe6, 0xff, | 3989 | "\xe0\xf9\x12\x2b\x44\x5d\x76\x8f" |
3968 | 0x18, 0x31, 0x4a, 0x63, 0x7c, 0x95, 0xae, 0xc7, | 3990 | "\xa8\xc1\xda\xf3\x0c\x25\x3e\x57" |
3969 | 0xe0, 0xf9, 0x12, 0x2b, 0x44, 0x5d, 0x76, 0x8f, | 3991 | "\x70\x89\xa2\xbb\xd4\xed\x06\x1f" |
3970 | 0xa8, 0xc1, 0xda, 0xf3, 0x0c, 0x25, 0x3e, 0x57, | 3992 | "\x38\x51\x6a\x83\x9c\xb5\xce\xe7" |
3971 | 0x70, 0x89, 0xa2, 0xbb, 0xd4, 0xed, 0x06, 0x1f, | 3993 | "\x00\x1b\x36\x51\x6c\x87\xa2\xbd" |
3972 | 0x38, 0x51, 0x6a, 0x83, 0x9c, 0xb5, 0xce, 0xe7, | 3994 | "\xd8\xf3\x0e\x29\x44\x5f\x7a\x95" |
3973 | 0x00, 0x1b, 0x36, 0x51, 0x6c, 0x87, 0xa2, 0xbd, | 3995 | "\xb0\xcb\xe6\x01\x1c\x37\x52\x6d" |
3974 | 0xd8, 0xf3, 0x0e, 0x29, 0x44, 0x5f, 0x7a, 0x95, | 3996 | "\x88\xa3\xbe\xd9\xf4\x0f\x2a\x45" |
3975 | 0xb0, 0xcb, 0xe6, 0x01, 0x1c, 0x37, 0x52, 0x6d, | 3997 | "\x60\x7b\x96\xb1\xcc\xe7\x02\x1d" |
3976 | 0x88, 0xa3, 0xbe, 0xd9, 0xf4, 0x0f, 0x2a, 0x45, | 3998 | "\x38\x53\x6e\x89\xa4\xbf\xda\xf5" |
3977 | 0x60, 0x7b, 0x96, 0xb1, 0xcc, 0xe7, 0x02, 0x1d, | 3999 | "\x10\x2b\x46\x61\x7c\x97\xb2\xcd" |
3978 | 0x38, 0x53, 0x6e, 0x89, 0xa4, 0xbf, 0xda, 0xf5, | 4000 | "\xe8\x03\x1e\x39\x54\x6f\x8a\xa5" |
3979 | 0x10, 0x2b, 0x46, 0x61, 0x7c, 0x97, 0xb2, 0xcd, | 4001 | "\xc0\xdb\xf6\x11\x2c\x47\x62\x7d" |
3980 | 0xe8, 0x03, 0x1e, 0x39, 0x54, 0x6f, 0x8a, 0xa5, | 4002 | "\x98\xb3\xce\xe9\x04\x1f\x3a\x55" |
3981 | 0xc0, 0xdb, 0xf6, 0x11, 0x2c, 0x47, 0x62, 0x7d, | 4003 | "\x70\x8b\xa6\xc1\xdc\xf7\x12\x2d" |
3982 | 0x98, 0xb3, 0xce, 0xe9, 0x04, 0x1f, 0x3a, 0x55, | 4004 | "\x48\x63\x7e\x99\xb4\xcf\xea\x05" |
3983 | 0x70, 0x8b, 0xa6, 0xc1, 0xdc, 0xf7, 0x12, 0x2d, | 4005 | "\x20\x3b\x56\x71\x8c\xa7\xc2\xdd" |
3984 | 0x48, 0x63, 0x7e, 0x99, 0xb4, 0xcf, 0xea, 0x05, | 4006 | "\xf8\x13\x2e\x49\x64\x7f\x9a\xb5" |
3985 | 0x20, 0x3b, 0x56, 0x71, 0x8c, 0xa7, 0xc2, 0xdd, | 4007 | "\xd0\xeb\x06\x21\x3c\x57\x72\x8d" |
3986 | 0xf8, 0x13, 0x2e, 0x49, 0x64, 0x7f, 0x9a, 0xb5, | 4008 | "\xa8\xc3\xde\xf9\x14\x2f\x4a\x65" |
3987 | 0xd0, 0xeb, 0x06, 0x21, 0x3c, 0x57, 0x72, 0x8d, | 4009 | "\x80\x9b\xb6\xd1\xec\x07\x22\x3d" |
3988 | 0xa8, 0xc3, 0xde, 0xf9, 0x14, 0x2f, 0x4a, 0x65, | 4010 | "\x58\x73\x8e\xa9\xc4\xdf\xfa\x15" |
3989 | 0x80, 0x9b, 0xb6, 0xd1, 0xec, 0x07, 0x22, 0x3d, | 4011 | "\x30\x4b\x66\x81\x9c\xb7\xd2\xed" |
3990 | 0x58, 0x73, 0x8e, 0xa9, 0xc4, 0xdf, 0xfa, 0x15, | 4012 | "\x08\x23\x3e\x59\x74\x8f\xaa\xc5" |
3991 | 0x30, 0x4b, 0x66, 0x81, 0x9c, 0xb7, 0xd2, 0xed, | 4013 | "\xe0\xfb\x16\x31\x4c\x67\x82\x9d" |
3992 | 0x08, 0x23, 0x3e, 0x59, 0x74, 0x8f, 0xaa, 0xc5, | 4014 | "\xb8\xd3\xee\x09\x24\x3f\x5a\x75" |
3993 | 0xe0, 0xfb, 0x16, 0x31, 0x4c, 0x67, 0x82, 0x9d, | 4015 | "\x90\xab\xc6\xe1\xfc\x17\x32\x4d" |
3994 | 0xb8, 0xd3, 0xee, 0x09, 0x24, 0x3f, 0x5a, 0x75, | 4016 | "\x68\x83\x9e\xb9\xd4\xef\x0a\x25" |
3995 | 0x90, 0xab, 0xc6, 0xe1, 0xfc, 0x17, 0x32, 0x4d, | 4017 | "\x40\x5b\x76\x91\xac\xc7\xe2\xfd" |
3996 | 0x68, 0x83, 0x9e, 0xb9, 0xd4, 0xef, 0x0a, 0x25, | 4018 | "\x18\x33\x4e\x69\x84\x9f\xba\xd5" |
3997 | 0x40, 0x5b, 0x76, 0x91, 0xac, 0xc7, 0xe2, 0xfd, | 4019 | "\xf0\x0b\x26\x41\x5c\x77\x92\xad" |
3998 | 0x18, 0x33, 0x4e, 0x69, 0x84, 0x9f, 0xba, 0xd5, | 4020 | "\xc8\xe3\xfe\x19\x34\x4f\x6a\x85" |
3999 | 0xf0, 0x0b, 0x26, 0x41, 0x5c, 0x77, 0x92, 0xad, | 4021 | "\xa0\xbb\xd6\xf1\x0c\x27\x42\x5d" |
4000 | 0xc8, 0xe3, 0xfe, 0x19, 0x34, 0x4f, 0x6a, 0x85, | 4022 | "\x78\x93\xae\xc9\xe4\xff\x1a\x35" |
4001 | 0xa0, 0xbb, 0xd6, 0xf1, 0x0c, 0x27, 0x42, 0x5d, | 4023 | "\x50\x6b\x86\xa1\xbc\xd7\xf2\x0d" |
4002 | 0x78, 0x93, 0xae, 0xc9, 0xe4, 0xff, 0x1a, 0x35, | 4024 | "\x28\x43\x5e\x79\x94\xaf\xca\xe5" |
4003 | 0x50, 0x6b, 0x86, 0xa1, 0xbc, 0xd7, 0xf2, 0x0d, | 4025 | "\x00\x1d\x3a\x57\x74\x91\xae\xcb" |
4004 | 0x28, 0x43, 0x5e, 0x79, 0x94, 0xaf, 0xca, 0xe5, | 4026 | "\xe8\x05\x22\x3f\x5c\x79\x96\xb3" |
4005 | 0x00, 0x1d, 0x3a, 0x57, 0x74, 0x91, 0xae, 0xcb, | 4027 | "\xd0\xed\x0a\x27\x44\x61\x7e\x9b" |
4006 | 0xe8, 0x05, 0x22, 0x3f, 0x5c, 0x79, 0x96, 0xb3, | 4028 | "\xb8\xd5\xf2\x0f\x2c\x49\x66\x83" |
4007 | 0xd0, 0xed, 0x0a, 0x27, 0x44, 0x61, 0x7e, 0x9b, | 4029 | "\xa0\xbd\xda\xf7\x14\x31\x4e\x6b" |
4008 | 0xb8, 0xd5, 0xf2, 0x0f, 0x2c, 0x49, 0x66, 0x83, | 4030 | "\x88\xa5\xc2\xdf\xfc\x19\x36\x53" |
4009 | 0xa0, 0xbd, 0xda, 0xf7, 0x14, 0x31, 0x4e, 0x6b, | 4031 | "\x70\x8d\xaa\xc7\xe4\x01\x1e\x3b" |
4010 | 0x88, 0xa5, 0xc2, 0xdf, 0xfc, 0x19, 0x36, 0x53, | 4032 | "\x58\x75\x92\xaf\xcc\xe9\x06\x23" |
4011 | 0x70, 0x8d, 0xaa, 0xc7, 0xe4, 0x01, 0x1e, 0x3b, | 4033 | "\x40\x5d\x7a\x97\xb4\xd1\xee\x0b" |
4012 | 0x58, 0x75, 0x92, 0xaf, 0xcc, 0xe9, 0x06, 0x23, | 4034 | "\x28\x45\x62\x7f\x9c\xb9\xd6\xf3" |
4013 | 0x40, 0x5d, 0x7a, 0x97, 0xb4, 0xd1, 0xee, 0x0b, | 4035 | "\x10\x2d\x4a\x67\x84\xa1\xbe\xdb" |
4014 | 0x28, 0x45, 0x62, 0x7f, 0x9c, 0xb9, 0xd6, 0xf3, | 4036 | "\xf8\x15\x32\x4f\x6c\x89\xa6\xc3" |
4015 | 0x10, 0x2d, 0x4a, 0x67, 0x84, 0xa1, 0xbe, 0xdb, | 4037 | "\xe0\xfd\x1a\x37\x54\x71\x8e\xab" |
4016 | 0xf8, 0x15, 0x32, 0x4f, 0x6c, 0x89, 0xa6, 0xc3, | 4038 | "\xc8\xe5\x02\x1f\x3c\x59\x76\x93" |
4017 | 0xe0, 0xfd, 0x1a, 0x37, 0x54, 0x71, 0x8e, 0xab, | 4039 | "\xb0\xcd\xea\x07\x24\x41\x5e\x7b" |
4018 | 0xc8, 0xe5, 0x02, 0x1f, 0x3c, 0x59, 0x76, 0x93, | 4040 | "\x98\xb5\xd2\xef\x0c\x29\x46\x63" |
4019 | 0xb0, 0xcd, 0xea, 0x07, 0x24, 0x41, 0x5e, 0x7b, | 4041 | "\x80\x9d\xba\xd7\xf4\x11\x2e\x4b" |
4020 | 0x98, 0xb5, 0xd2, 0xef, 0x0c, 0x29, 0x46, 0x63, | 4042 | "\x68\x85\xa2\xbf\xdc\xf9\x16\x33" |
4021 | 0x80, 0x9d, 0xba, 0xd7, 0xf4, 0x11, 0x2e, 0x4b, | 4043 | "\x50\x6d\x8a\xa7\xc4\xe1\xfe\x1b" |
4022 | 0x68, 0x85, 0xa2, 0xbf, 0xdc, 0xf9, 0x16, 0x33, | 4044 | "\x38\x55\x72\x8f\xac\xc9\xe6\x03" |
4023 | 0x50, 0x6d, 0x8a, 0xa7, 0xc4, 0xe1, 0xfe, 0x1b, | 4045 | "\x20\x3d\x5a\x77\x94\xb1\xce\xeb" |
4024 | 0x38, 0x55, 0x72, 0x8f, 0xac, 0xc9, 0xe6, 0x03, | 4046 | "\x08\x25\x42\x5f\x7c\x99\xb6\xd3" |
4025 | 0x20, 0x3d, 0x5a, 0x77, 0x94, 0xb1, 0xce, 0xeb, | 4047 | "\xf0\x0d\x2a\x47\x64\x81\x9e\xbb" |
4026 | 0x08, 0x25, 0x42, 0x5f, 0x7c, 0x99, 0xb6, 0xd3, | 4048 | "\xd8\xf5\x12\x2f\x4c\x69\x86\xa3" |
4027 | 0xf0, 0x0d, 0x2a, 0x47, 0x64, 0x81, 0x9e, 0xbb, | 4049 | "\xc0\xdd\xfa\x17\x34\x51\x6e\x8b" |
4028 | 0xd8, 0xf5, 0x12, 0x2f, 0x4c, 0x69, 0x86, 0xa3, | 4050 | "\xa8\xc5\xe2\xff\x1c\x39\x56\x73" |
4029 | 0xc0, 0xdd, 0xfa, 0x17, 0x34, 0x51, 0x6e, 0x8b, | 4051 | "\x90\xad\xca\xe7\x04\x21\x3e\x5b" |
4030 | 0xa8, 0xc5, 0xe2, 0xff, 0x1c, 0x39, 0x56, 0x73, | 4052 | "\x78\x95\xb2\xcf\xec\x09\x26\x43" |
4031 | 0x90, 0xad, 0xca, 0xe7, 0x04, 0x21, 0x3e, 0x5b, | 4053 | "\x60\x7d\x9a\xb7\xd4\xf1\x0e\x2b" |
4032 | 0x78, 0x95, 0xb2, 0xcf, 0xec, 0x09, 0x26, 0x43, | 4054 | "\x48\x65\x82\x9f\xbc\xd9\xf6\x13" |
4033 | 0x60, 0x7d, 0x9a, 0xb7, 0xd4, 0xf1, 0x0e, 0x2b, | 4055 | "\x30\x4d\x6a\x87\xa4\xc1\xde\xfb" |
4034 | 0x48, 0x65, 0x82, 0x9f, 0xbc, 0xd9, 0xf6, 0x13, | 4056 | "\x18\x35\x52\x6f\x8c\xa9\xc6\xe3" |
4035 | 0x30, 0x4d, 0x6a, 0x87, 0xa4, 0xc1, 0xde, 0xfb, | 4057 | "\x00\x1f\x3e\x5d\x7c\x9b\xba\xd9" |
4036 | 0x18, 0x35, 0x52, 0x6f, 0x8c, 0xa9, 0xc6, 0xe3, | 4058 | "\xf8\x17\x36\x55\x74\x93\xb2\xd1" |
4037 | 0x00, 0x1f, 0x3e, 0x5d, 0x7c, 0x9b, 0xba, 0xd9, | 4059 | "\xf0\x0f\x2e\x4d\x6c\x8b\xaa\xc9" |
4038 | 0xf8, 0x17, 0x36, 0x55, 0x74, 0x93, 0xb2, 0xd1, | 4060 | "\xe8\x07\x26\x45\x64\x83\xa2\xc1" |
4039 | 0xf0, 0x0f, 0x2e, 0x4d, 0x6c, 0x8b, 0xaa, 0xc9, | 4061 | "\xe0\xff\x1e\x3d\x5c\x7b\x9a\xb9" |
4040 | 0xe8, 0x07, 0x26, 0x45, 0x64, 0x83, 0xa2, 0xc1, | 4062 | "\xd8\xf7\x16\x35\x54\x73\x92\xb1" |
4041 | 0xe0, 0xff, 0x1e, 0x3d, 0x5c, 0x7b, 0x9a, 0xb9, | 4063 | "\xd0\xef\x0e\x2d\x4c\x6b\x8a\xa9" |
4042 | 0xd8, 0xf7, 0x16, 0x35, 0x54, 0x73, 0x92, 0xb1, | 4064 | "\xc8\xe7\x06\x25\x44\x63\x82\xa1" |
4043 | 0xd0, 0xef, 0x0e, 0x2d, 0x4c, 0x6b, 0x8a, 0xa9, | 4065 | "\xc0\xdf\xfe\x1d\x3c\x5b\x7a\x99" |
4044 | 0xc8, 0xe7, 0x06, 0x25, 0x44, 0x63, 0x82, 0xa1, | 4066 | "\xb8\xd7\xf6\x15\x34\x53\x72\x91" |
4045 | 0xc0, 0xdf, 0xfe, 0x1d, 0x3c, 0x5b, 0x7a, 0x99, | 4067 | "\xb0\xcf\xee\x0d\x2c\x4b\x6a\x89" |
4046 | 0xb8, 0xd7, 0xf6, 0x15, 0x34, 0x53, 0x72, 0x91, | 4068 | "\xa8\xc7\xe6\x05\x24\x43\x62\x81" |
4047 | 0xb0, 0xcf, 0xee, 0x0d, 0x2c, 0x4b, 0x6a, 0x89, | 4069 | "\xa0\xbf\xde\xfd\x1c\x3b\x5a\x79" |
4048 | 0xa8, 0xc7, 0xe6, 0x05, 0x24, 0x43, 0x62, 0x81, | 4070 | "\x98\xb7\xd6\xf5\x14\x33\x52\x71" |
4049 | 0xa0, 0xbf, 0xde, 0xfd, 0x1c, 0x3b, 0x5a, 0x79, | 4071 | "\x90\xaf\xce\xed\x0c\x2b\x4a\x69" |
4050 | 0x98, 0xb7, 0xd6, 0xf5, 0x14, 0x33, 0x52, 0x71, | 4072 | "\x88\xa7\xc6\xe5\x04\x23\x42\x61" |
4051 | 0x90, 0xaf, 0xce, 0xed, 0x0c, 0x2b, 0x4a, 0x69, | 4073 | "\x80\x9f\xbe\xdd\xfc\x1b\x3a\x59" |
4052 | 0x88, 0xa7, 0xc6, 0xe5, 0x04, 0x23, 0x42, 0x61, | 4074 | "\x78\x97\xb6\xd5\xf4\x13\x32\x51" |
4053 | 0x80, 0x9f, 0xbe, 0xdd, 0xfc, 0x1b, 0x3a, 0x59, | 4075 | "\x70\x8f\xae\xcd\xec\x0b\x2a\x49" |
4054 | 0x78, 0x97, 0xb6, 0xd5, 0xf4, 0x13, 0x32, 0x51, | 4076 | "\x68\x87\xa6\xc5\xe4\x03\x22\x41" |
4055 | 0x70, 0x8f, 0xae, 0xcd, 0xec, 0x0b, 0x2a, 0x49, | 4077 | "\x60\x7f\x9e\xbd\xdc\xfb\x1a\x39" |
4056 | 0x68, 0x87, 0xa6, 0xc5, 0xe4, 0x03, 0x22, 0x41, | 4078 | "\x58\x77\x96\xb5\xd4\xf3\x12\x31" |
4057 | 0x60, 0x7f, 0x9e, 0xbd, 0xdc, 0xfb, 0x1a, 0x39, | 4079 | "\x50\x6f\x8e\xad\xcc\xeb\x0a\x29" |
4058 | 0x58, 0x77, 0x96, 0xb5, 0xd4, 0xf3, 0x12, 0x31, | 4080 | "\x48\x67\x86\xa5\xc4\xe3\x02\x21" |
4059 | 0x50, 0x6f, 0x8e, 0xad, 0xcc, 0xeb, 0x0a, 0x29, | 4081 | "\x40\x5f\x7e\x9d\xbc\xdb\xfa\x19" |
4060 | 0x48, 0x67, 0x86, 0xa5, 0xc4, 0xe3, 0x02, 0x21, | 4082 | "\x38\x57\x76\x95\xb4\xd3\xf2\x11" |
4061 | 0x40, 0x5f, 0x7e, 0x9d, 0xbc, 0xdb, 0xfa, 0x19, | 4083 | "\x30\x4f\x6e\x8d\xac\xcb\xea\x09" |
4062 | 0x38, 0x57, 0x76, 0x95, 0xb4, 0xd3, 0xf2, 0x11, | 4084 | "\x28\x47\x66\x85\xa4\xc3\xe2\x01" |
4063 | 0x30, 0x4f, 0x6e, 0x8d, 0xac, 0xcb, 0xea, 0x09, | 4085 | "\x20\x3f\x5e\x7d\x9c\xbb\xda\xf9" |
4064 | 0x28, 0x47, 0x66, 0x85, 0xa4, 0xc3, 0xe2, 0x01, | 4086 | "\x18\x37\x56\x75\x94\xb3\xd2\xf1" |
4065 | 0x20, 0x3f, 0x5e, 0x7d, 0x9c, 0xbb, 0xda, 0xf9, | 4087 | "\x10\x2f\x4e\x6d\x8c\xab\xca\xe9" |
4066 | 0x18, 0x37, 0x56, 0x75, 0x94, 0xb3, 0xd2, 0xf1, | 4088 | "\x08\x27\x46\x65\x84\xa3\xc2\xe1" |
4067 | 0x10, 0x2f, 0x4e, 0x6d, 0x8c, 0xab, 0xca, 0xe9, | 4089 | "\x00\x21\x42\x63", |
4068 | 0x08, 0x27, 0x46, 0x65, 0x84, 0xa3, 0xc2, 0xe1, | ||
4069 | 0x00, 0x21, 0x42, 0x63, | ||
4070 | }, | ||
4071 | .ilen = 4100, | 4090 | .ilen = 4100, |
4072 | .result = { | 4091 | .result = |
4073 | 0xf0, 0x5c, 0x74, 0xad, 0x4e, 0xbc, 0x99, 0xe2, | 4092 | "\xf0\x5c\x74\xad\x4e\xbc\x99\xe2" |
4074 | 0xae, 0xff, 0x91, 0x3a, 0x44, 0xcf, 0x38, 0x32, | 4093 | "\xae\xff\x91\x3a\x44\xcf\x38\x32" |
4075 | 0x1e, 0xad, 0xa7, 0xcd, 0xa1, 0x39, 0x95, 0xaa, | 4094 | "\x1e\xad\xa7\xcd\xa1\x39\x95\xaa" |
4076 | 0x10, 0xb1, 0xb3, 0x2e, 0x04, 0x31, 0x8f, 0x86, | 4095 | "\x10\xb1\xb3\x2e\x04\x31\x8f\x86" |
4077 | 0xf2, 0x62, 0x74, 0x70, 0x0c, 0xa4, 0x46, 0x08, | 4096 | "\xf2\x62\x74\x70\x0c\xa4\x46\x08" |
4078 | 0xa8, 0xb7, 0x99, 0xa8, 0xe9, 0xd2, 0x73, 0x79, | 4097 | "\xa8\xb7\x99\xa8\xe9\xd2\x73\x79" |
4079 | 0x7e, 0x6e, 0xd4, 0x8f, 0x1e, 0xc7, 0x8e, 0x31, | 4098 | "\x7e\x6e\xd4\x8f\x1e\xc7\x8e\x31" |
4080 | 0x0b, 0xfa, 0x4b, 0xce, 0xfd, 0xf3, 0x57, 0x71, | 4099 | "\x0b\xfa\x4b\xce\xfd\xf3\x57\x71" |
4081 | 0xe9, 0x46, 0x03, 0xa5, 0x3d, 0x34, 0x00, 0xe2, | 4100 | "\xe9\x46\x03\xa5\x3d\x34\x00\xe2" |
4082 | 0x18, 0xff, 0x75, 0x6d, 0x06, 0x2d, 0x00, 0xab, | 4101 | "\x18\xff\x75\x6d\x06\x2d\x00\xab" |
4083 | 0xb9, 0x3e, 0x6c, 0x59, 0xc5, 0x84, 0x06, 0xb5, | 4102 | "\xb9\x3e\x6c\x59\xc5\x84\x06\xb5" |
4084 | 0x8b, 0xd0, 0x89, 0x9c, 0x4a, 0x79, 0x16, 0xc6, | 4103 | "\x8b\xd0\x89\x9c\x4a\x79\x16\xc6" |
4085 | 0x3d, 0x74, 0x54, 0xfa, 0x44, 0xcd, 0x23, 0x26, | 4104 | "\x3d\x74\x54\xfa\x44\xcd\x23\x26" |
4086 | 0x5c, 0xcf, 0x7e, 0x28, 0x92, 0x32, 0xbf, 0xdf, | 4105 | "\x5c\xcf\x7e\x28\x92\x32\xbf\xdf" |
4087 | 0xa7, 0x20, 0x3c, 0x74, 0x58, 0x2a, 0x9a, 0xde, | 4106 | "\xa7\x20\x3c\x74\x58\x2a\x9a\xde" |
4088 | 0x61, 0x00, 0x1c, 0x4f, 0xff, 0x59, 0xc4, 0x22, | 4107 | "\x61\x00\x1c\x4f\xff\x59\xc4\x22" |
4089 | 0xac, 0x3c, 0xd0, 0xe8, 0x6c, 0xf9, 0x97, 0x1b, | 4108 | "\xac\x3c\xd0\xe8\x6c\xf9\x97\x1b" |
4090 | 0x58, 0x9b, 0xad, 0x71, 0xe8, 0xa9, 0xb5, 0x0d, | 4109 | "\x58\x9b\xad\x71\xe8\xa9\xb5\x0d" |
4091 | 0xee, 0x2f, 0x04, 0x1f, 0x7f, 0xbc, 0x99, 0xee, | 4110 | "\xee\x2f\x04\x1f\x7f\xbc\x99\xee" |
4092 | 0x84, 0xff, 0x42, 0x60, 0xdc, 0x3a, 0x18, 0xa5, | 4111 | "\x84\xff\x42\x60\xdc\x3a\x18\xa5" |
4093 | 0x81, 0xf9, 0xef, 0xdc, 0x7a, 0x0f, 0x65, 0x41, | 4112 | "\x81\xf9\xef\xdc\x7a\x0f\x65\x41" |
4094 | 0x2f, 0xa3, 0xd3, 0xf9, 0xc2, 0xcb, 0xc0, 0x4d, | 4113 | "\x2f\xa3\xd3\xf9\xc2\xcb\xc0\x4d" |
4095 | 0x8f, 0xd3, 0x76, 0x96, 0xad, 0x49, 0x6d, 0x38, | 4114 | "\x8f\xd3\x76\x96\xad\x49\x6d\x38" |
4096 | 0x3d, 0x39, 0x0b, 0x6c, 0x80, 0xb7, 0x54, 0x69, | 4115 | "\x3d\x39\x0b\x6c\x80\xb7\x54\x69" |
4097 | 0xf0, 0x2c, 0x90, 0x02, 0x29, 0x0d, 0x1c, 0x12, | 4116 | "\xf0\x2c\x90\x02\x29\x0d\x1c\x12" |
4098 | 0xad, 0x55, 0xc3, 0x8b, 0x68, 0xd9, 0xcc, 0xb3, | 4117 | "\xad\x55\xc3\x8b\x68\xd9\xcc\xb3" |
4099 | 0xb2, 0x64, 0x33, 0x90, 0x5e, 0xca, 0x4b, 0xe2, | 4118 | "\xb2\x64\x33\x90\x5e\xca\x4b\xe2" |
4100 | 0xfb, 0x75, 0xdc, 0x63, 0xf7, 0x9f, 0x82, 0x74, | 4119 | "\xfb\x75\xdc\x63\xf7\x9f\x82\x74" |
4101 | 0xf0, 0xc9, 0xaa, 0x7f, 0xe9, 0x2a, 0x9b, 0x33, | 4120 | "\xf0\xc9\xaa\x7f\xe9\x2a\x9b\x33" |
4102 | 0xbc, 0x88, 0x00, 0x7f, 0xca, 0xb2, 0x1f, 0x14, | 4121 | "\xbc\x88\x00\x7f\xca\xb2\x1f\x14" |
4103 | 0xdb, 0xc5, 0x8e, 0x7b, 0x11, 0x3c, 0x3e, 0x08, | 4122 | "\xdb\xc5\x8e\x7b\x11\x3c\x3e\x08" |
4104 | 0xf3, 0x83, 0xe8, 0xe0, 0x94, 0x86, 0x2e, 0x92, | 4123 | "\xf3\x83\xe8\xe0\x94\x86\x2e\x92" |
4105 | 0x78, 0x6b, 0x01, 0xc9, 0xc7, 0x83, 0xba, 0x21, | 4124 | "\x78\x6b\x01\xc9\xc7\x83\xba\x21" |
4106 | 0x6a, 0x25, 0x15, 0x33, 0x4e, 0x45, 0x08, 0xec, | 4125 | "\x6a\x25\x15\x33\x4e\x45\x08\xec" |
4107 | 0x35, 0xdb, 0xe0, 0x6e, 0x31, 0x51, 0x79, 0xa9, | 4126 | "\x35\xdb\xe0\x6e\x31\x51\x79\xa9" |
4108 | 0x42, 0x44, 0x65, 0xc1, 0xa0, 0xf1, 0xf9, 0x2a, | 4127 | "\x42\x44\x65\xc1\xa0\xf1\xf9\x2a" |
4109 | 0x70, 0xd5, 0xb6, 0xc6, 0xc1, 0x8c, 0x39, 0xfc, | 4128 | "\x70\xd5\xb6\xc6\xc1\x8c\x39\xfc" |
4110 | 0x25, 0xa6, 0x55, 0xd9, 0xdd, 0x2d, 0x4c, 0xec, | 4129 | "\x25\xa6\x55\xd9\xdd\x2d\x4c\xec" |
4111 | 0x49, 0xc6, 0xeb, 0x0e, 0xa8, 0x25, 0x2a, 0x16, | 4130 | "\x49\xc6\xeb\x0e\xa8\x25\x2a\x16" |
4112 | 0x1b, 0x66, 0x84, 0xda, 0xe2, 0x92, 0xe5, 0xc0, | 4131 | "\x1b\x66\x84\xda\xe2\x92\xe5\xc0" |
4113 | 0xc8, 0x53, 0x07, 0xaf, 0x80, 0x84, 0xec, 0xfd, | 4132 | "\xc8\x53\x07\xaf\x80\x84\xec\xfd" |
4114 | 0xcd, 0xd1, 0x6e, 0xcd, 0x6f, 0x6a, 0xf5, 0x36, | 4133 | "\xcd\xd1\x6e\xcd\x6f\x6a\xf5\x36" |
4115 | 0xc5, 0x15, 0xe5, 0x25, 0x7d, 0x77, 0xd1, 0x1a, | 4134 | "\xc5\x15\xe5\x25\x7d\x77\xd1\x1a" |
4116 | 0x93, 0x36, 0xa9, 0xcf, 0x7c, 0xa4, 0x54, 0x4a, | 4135 | "\x93\x36\xa9\xcf\x7c\xa4\x54\x4a" |
4117 | 0x06, 0x51, 0x48, 0x4e, 0xf6, 0x59, 0x87, 0xd2, | 4136 | "\x06\x51\x48\x4e\xf6\x59\x87\xd2" |
4118 | 0x04, 0x02, 0xef, 0xd3, 0x44, 0xde, 0x76, 0x31, | 4137 | "\x04\x02\xef\xd3\x44\xde\x76\x31" |
4119 | 0xb3, 0x34, 0x17, 0x1b, 0x9d, 0x66, 0x11, 0x9f, | 4138 | "\xb3\x34\x17\x1b\x9d\x66\x11\x9f" |
4120 | 0x1e, 0xcc, 0x17, 0xe9, 0xc7, 0x3c, 0x1b, 0xe7, | 4139 | "\x1e\xcc\x17\xe9\xc7\x3c\x1b\xe7" |
4121 | 0xcb, 0x50, 0x08, 0xfc, 0xdc, 0x2b, 0x24, 0xdb, | 4140 | "\xcb\x50\x08\xfc\xdc\x2b\x24\xdb" |
4122 | 0x65, 0x83, 0xd0, 0x3b, 0xe3, 0x30, 0xea, 0x94, | 4141 | "\x65\x83\xd0\x3b\xe3\x30\xea\x94" |
4123 | 0x6c, 0xe7, 0xe8, 0x35, 0x32, 0xc7, 0xdb, 0x64, | 4142 | "\x6c\xe7\xe8\x35\x32\xc7\xdb\x64" |
4124 | 0xb4, 0x01, 0xab, 0x36, 0x2c, 0x77, 0x13, 0xaf, | 4143 | "\xb4\x01\xab\x36\x2c\x77\x13\xaf" |
4125 | 0xf8, 0x2b, 0x88, 0x3f, 0x54, 0x39, 0xc4, 0x44, | 4144 | "\xf8\x2b\x88\x3f\x54\x39\xc4\x44" |
4126 | 0xfe, 0xef, 0x6f, 0x68, 0x34, 0xbe, 0x0f, 0x05, | 4145 | "\xfe\xef\x6f\x68\x34\xbe\x0f\x05" |
4127 | 0x16, 0x6d, 0xf6, 0x0a, 0x30, 0xe7, 0xe3, 0xed, | 4146 | "\x16\x6d\xf6\x0a\x30\xe7\xe3\xed" |
4128 | 0xc4, 0xde, 0x3c, 0x1b, 0x13, 0xd8, 0xdb, 0xfe, | 4147 | "\xc4\xde\x3c\x1b\x13\xd8\xdb\xfe" |
4129 | 0x41, 0x62, 0xe5, 0x28, 0xd4, 0x8d, 0xa3, 0xc7, | 4148 | "\x41\x62\xe5\x28\xd4\x8d\xa3\xc7" |
4130 | 0x93, 0x97, 0xc6, 0x48, 0x45, 0x1d, 0x9f, 0x83, | 4149 | "\x93\x97\xc6\x48\x45\x1d\x9f\x83" |
4131 | 0xdf, 0x4b, 0x40, 0x3e, 0x42, 0x25, 0x87, 0x80, | 4150 | "\xdf\x4b\x40\x3e\x42\x25\x87\x80" |
4132 | 0x4c, 0x7d, 0xa8, 0xd4, 0x98, 0x23, 0x95, 0x75, | 4151 | "\x4c\x7d\xa8\xd4\x98\x23\x95\x75" |
4133 | 0x41, 0x8c, 0xda, 0x41, 0x9b, 0xd4, 0xa7, 0x06, | 4152 | "\x41\x8c\xda\x41\x9b\xd4\xa7\x06" |
4134 | 0xb5, 0xf1, 0x71, 0x09, 0x53, 0xbe, 0xca, 0xbf, | 4153 | "\xb5\xf1\x71\x09\x53\xbe\xca\xbf" |
4135 | 0x32, 0x03, 0xed, 0xf0, 0x50, 0x1c, 0x56, 0x39, | 4154 | "\x32\x03\xed\xf0\x50\x1c\x56\x39" |
4136 | 0x5b, 0xa4, 0x75, 0x18, 0xf7, 0x9b, 0x58, 0xef, | 4155 | "\x5b\xa4\x75\x18\xf7\x9b\x58\xef" |
4137 | 0x53, 0xfc, 0x2a, 0x38, 0x23, 0x15, 0x75, 0xcd, | 4156 | "\x53\xfc\x2a\x38\x23\x15\x75\xcd" |
4138 | 0x45, 0xe5, 0x5a, 0x82, 0x55, 0xba, 0x21, 0xfa, | 4157 | "\x45\xe5\x5a\x82\x55\xba\x21\xfa" |
4139 | 0xd4, 0xbd, 0xc6, 0x94, 0x7c, 0xc5, 0x80, 0x12, | 4158 | "\xd4\xbd\xc6\x94\x7c\xc5\x80\x12" |
4140 | 0xf7, 0x4b, 0x32, 0xc4, 0x9a, 0x82, 0xd8, 0x28, | 4159 | "\xf7\x4b\x32\xc4\x9a\x82\xd8\x28" |
4141 | 0x8f, 0xd9, 0xc2, 0x0f, 0x60, 0x03, 0xbe, 0x5e, | 4160 | "\x8f\xd9\xc2\x0f\x60\x03\xbe\x5e" |
4142 | 0x21, 0xd6, 0x5f, 0x58, 0xbf, 0x5c, 0xb1, 0x32, | 4161 | "\x21\xd6\x5f\x58\xbf\x5c\xb1\x32" |
4143 | 0x82, 0x8d, 0xa9, 0xe5, 0xf2, 0x66, 0x1a, 0xc0, | 4162 | "\x82\x8d\xa9\xe5\xf2\x66\x1a\xc0" |
4144 | 0xa0, 0xbc, 0x58, 0x2f, 0x71, 0xf5, 0x2f, 0xed, | 4163 | "\xa0\xbc\x58\x2f\x71\xf5\x2f\xed" |
4145 | 0xd1, 0x26, 0xb9, 0xd8, 0x49, 0x5a, 0x07, 0x19, | 4164 | "\xd1\x26\xb9\xd8\x49\x5a\x07\x19" |
4146 | 0x01, 0x7c, 0x59, 0xb0, 0xf8, 0xa4, 0xb7, 0xd3, | 4165 | "\x01\x7c\x59\xb0\xf8\xa4\xb7\xd3" |
4147 | 0x7b, 0x1a, 0x8c, 0x38, 0xf4, 0x50, 0xa4, 0x59, | 4166 | "\x7b\x1a\x8c\x38\xf4\x50\xa4\x59" |
4148 | 0xb0, 0xcc, 0x41, 0x0b, 0x88, 0x7f, 0xe5, 0x31, | 4167 | "\xb0\xcc\x41\x0b\x88\x7f\xe5\x31" |
4149 | 0xb3, 0x42, 0xba, 0xa2, 0x7e, 0xd4, 0x32, 0x71, | 4168 | "\xb3\x42\xba\xa2\x7e\xd4\x32\x71" |
4150 | 0x45, 0x87, 0x48, 0xa9, 0xc2, 0xf2, 0x89, 0xb3, | 4169 | "\x45\x87\x48\xa9\xc2\xf2\x89\xb3" |
4151 | 0xe4, 0xa7, 0x7e, 0x52, 0x15, 0x61, 0xfa, 0xfe, | 4170 | "\xe4\xa7\x7e\x52\x15\x61\xfa\xfe" |
4152 | 0xc9, 0xdd, 0x81, 0xeb, 0x13, 0xab, 0xab, 0xc3, | 4171 | "\xc9\xdd\x81\xeb\x13\xab\xab\xc3" |
4153 | 0x98, 0x59, 0xd8, 0x16, 0x3d, 0x14, 0x7a, 0x1c, | 4172 | "\x98\x59\xd8\x16\x3d\x14\x7a\x1c" |
4154 | 0x3c, 0x41, 0x9a, 0x16, 0x16, 0x9b, 0xd2, 0xd2, | 4173 | "\x3c\x41\x9a\x16\x16\x9b\xd2\xd2" |
4155 | 0x69, 0x3a, 0x29, 0x23, 0xac, 0x86, 0x32, 0xa5, | 4174 | "\x69\x3a\x29\x23\xac\x86\x32\xa5" |
4156 | 0x48, 0x9c, 0x9e, 0xf3, 0x47, 0x77, 0x81, 0x70, | 4175 | "\x48\x9c\x9e\xf3\x47\x77\x81\x70" |
4157 | 0x24, 0xe8, 0x85, 0xd2, 0xf5, 0xb5, 0xfa, 0xff, | 4176 | "\x24\xe8\x85\xd2\xf5\xb5\xfa\xff" |
4158 | 0x59, 0x6a, 0xd3, 0x50, 0x59, 0x43, 0x59, 0xde, | 4177 | "\x59\x6a\xd3\x50\x59\x43\x59\xde" |
4159 | 0xd9, 0xf1, 0x55, 0xa5, 0x0c, 0xc3, 0x1a, 0x1a, | 4178 | "\xd9\xf1\x55\xa5\x0c\xc3\x1a\x1a" |
4160 | 0x18, 0x34, 0x0d, 0x1a, 0x63, 0x33, 0xed, 0x10, | 4179 | "\x18\x34\x0d\x1a\x63\x33\xed\x10" |
4161 | 0xe0, 0x1d, 0x2a, 0x18, 0xd2, 0xc0, 0x54, 0xa8, | 4180 | "\xe0\x1d\x2a\x18\xd2\xc0\x54\xa8" |
4162 | 0xca, 0xb5, 0x9a, 0xd3, 0xdd, 0xca, 0x45, 0x84, | 4181 | "\xca\xb5\x9a\xd3\xdd\xca\x45\x84" |
4163 | 0x50, 0xe7, 0x0f, 0xfe, 0xa4, 0x99, 0x5a, 0xbe, | 4182 | "\x50\xe7\x0f\xfe\xa4\x99\x5a\xbe" |
4164 | 0x43, 0x2d, 0x9a, 0xcb, 0x92, 0x3f, 0x5a, 0x1d, | 4183 | "\x43\x2d\x9a\xcb\x92\x3f\x5a\x1d" |
4165 | 0x85, 0xd8, 0xc9, 0xdf, 0x68, 0xc9, 0x12, 0x80, | 4184 | "\x85\xd8\xc9\xdf\x68\xc9\x12\x80" |
4166 | 0x56, 0x0c, 0xdc, 0x00, 0xdc, 0x3a, 0x7d, 0x9d, | 4185 | "\x56\x0c\xdc\x00\xdc\x3a\x7d\x9d" |
4167 | 0xa3, 0xa2, 0xe8, 0x4d, 0xbf, 0xf9, 0x70, 0xa0, | 4186 | "\xa3\xa2\xe8\x4d\xbf\xf9\x70\xa0" |
4168 | 0xa4, 0x13, 0x4f, 0x6b, 0xaf, 0x0a, 0x89, 0x7f, | 4187 | "\xa4\x13\x4f\x6b\xaf\x0a\x89\x7f" |
4169 | 0xda, 0xf0, 0xbf, 0x9b, 0xc8, 0x1d, 0xe5, 0xf8, | 4188 | "\xda\xf0\xbf\x9b\xc8\x1d\xe5\xf8" |
4170 | 0x2e, 0x8b, 0x07, 0xb5, 0x73, 0x1b, 0xcc, 0xa2, | 4189 | "\x2e\x8b\x07\xb5\x73\x1b\xcc\xa2" |
4171 | 0xa6, 0xad, 0x30, 0xbc, 0x78, 0x3c, 0x5b, 0x10, | 4190 | "\xa6\xad\x30\xbc\x78\x3c\x5b\x10" |
4172 | 0xfa, 0x5e, 0x62, 0x2d, 0x9e, 0x64, 0xb3, 0x33, | 4191 | "\xfa\x5e\x62\x2d\x9e\x64\xb3\x33" |
4173 | 0xce, 0xf9, 0x1f, 0x86, 0xe7, 0x8b, 0xa2, 0xb8, | 4192 | "\xce\xf9\x1f\x86\xe7\x8b\xa2\xb8" |
4174 | 0xe8, 0x99, 0x57, 0x8c, 0x11, 0xed, 0x66, 0xd9, | 4193 | "\xe8\x99\x57\x8c\x11\xed\x66\xd9" |
4175 | 0x3c, 0x72, 0xb9, 0xc3, 0xe6, 0x4e, 0x17, 0x3a, | 4194 | "\x3c\x72\xb9\xc3\xe6\x4e\x17\x3a" |
4176 | 0x6a, 0xcb, 0x42, 0x24, 0x06, 0xed, 0x3e, 0x4e, | 4195 | "\x6a\xcb\x42\x24\x06\xed\x3e\x4e" |
4177 | 0xa3, 0xe8, 0x6a, 0x94, 0xda, 0x0d, 0x4e, 0xd5, | 4196 | "\xa3\xe8\x6a\x94\xda\x0d\x4e\xd5" |
4178 | 0x14, 0x19, 0xcf, 0xb6, 0x26, 0xd8, 0x2e, 0xcc, | 4197 | "\x14\x19\xcf\xb6\x26\xd8\x2e\xcc" |
4179 | 0x64, 0x76, 0x38, 0x49, 0x4d, 0xfe, 0x30, 0x6d, | 4198 | "\x64\x76\x38\x49\x4d\xfe\x30\x6d" |
4180 | 0xe4, 0xc8, 0x8c, 0x7b, 0xc4, 0xe0, 0x35, 0xba, | 4199 | "\xe4\xc8\x8c\x7b\xc4\xe0\x35\xba" |
4181 | 0x22, 0x6e, 0x76, 0xe1, 0x1a, 0xf2, 0x53, 0xc3, | 4200 | "\x22\x6e\x76\xe1\x1a\xf2\x53\xc3" |
4182 | 0x28, 0xa2, 0x82, 0x1f, 0x61, 0x69, 0xad, 0xc1, | 4201 | "\x28\xa2\x82\x1f\x61\x69\xad\xc1" |
4183 | 0x7b, 0x28, 0x4b, 0x1e, 0x6c, 0x85, 0x95, 0x9b, | 4202 | "\x7b\x28\x4b\x1e\x6c\x85\x95\x9b" |
4184 | 0x51, 0xb5, 0x17, 0x7f, 0x12, 0x69, 0x8c, 0x24, | 4203 | "\x51\xb5\x17\x7f\x12\x69\x8c\x24" |
4185 | 0xd5, 0xc7, 0x5a, 0x5a, 0x11, 0x54, 0xff, 0x5a, | 4204 | "\xd5\xc7\x5a\x5a\x11\x54\xff\x5a" |
4186 | 0xf7, 0x16, 0xc3, 0x91, 0xa6, 0xf0, 0xdc, 0x0a, | 4205 | "\xf7\x16\xc3\x91\xa6\xf0\xdc\x0a" |
4187 | 0xb6, 0xa7, 0x4a, 0x0d, 0x7a, 0x58, 0xfe, 0xa5, | 4206 | "\xb6\xa7\x4a\x0d\x7a\x58\xfe\xa5" |
4188 | 0xf5, 0xcb, 0x8f, 0x7b, 0x0e, 0xea, 0x57, 0xe7, | 4207 | "\xf5\xcb\x8f\x7b\x0e\xea\x57\xe7" |
4189 | 0xbd, 0x79, 0xd6, 0x1c, 0x88, 0x23, 0x6c, 0xf2, | 4208 | "\xbd\x79\xd6\x1c\x88\x23\x6c\xf2" |
4190 | 0x4d, 0x29, 0x77, 0x53, 0x35, 0x6a, 0x00, 0x8d, | 4209 | "\x4d\x29\x77\x53\x35\x6a\x00\x8d" |
4191 | 0xcd, 0xa3, 0x58, 0xbe, 0x77, 0x99, 0x18, 0xf8, | 4210 | "\xcd\xa3\x58\xbe\x77\x99\x18\xf8" |
4192 | 0xe6, 0xe1, 0x8f, 0xe9, 0x37, 0x8f, 0xe3, 0xe2, | 4211 | "\xe6\xe1\x8f\xe9\x37\x8f\xe3\xe2" |
4193 | 0x5a, 0x8a, 0x93, 0x25, 0xaf, 0xf3, 0x78, 0x80, | 4212 | "\x5a\x8a\x93\x25\xaf\xf3\x78\x80" |
4194 | 0xbe, 0xa6, 0x1b, 0xc6, 0xac, 0x8b, 0x1c, 0x91, | 4213 | "\xbe\xa6\x1b\xc6\xac\x8b\x1c\x91" |
4195 | 0x58, 0xe1, 0x9f, 0x89, 0x35, 0x9d, 0x1d, 0x21, | 4214 | "\x58\xe1\x9f\x89\x35\x9d\x1d\x21" |
4196 | 0x29, 0x9f, 0xf4, 0x99, 0x02, 0x27, 0x0f, 0xa8, | 4215 | "\x29\x9f\xf4\x99\x02\x27\x0f\xa8" |
4197 | 0x4f, 0x79, 0x94, 0x2b, 0x33, 0x2c, 0xda, 0xa2, | 4216 | "\x4f\x79\x94\x2b\x33\x2c\xda\xa2" |
4198 | 0x26, 0x39, 0x83, 0x94, 0xef, 0x27, 0xd8, 0x53, | 4217 | "\x26\x39\x83\x94\xef\x27\xd8\x53" |
4199 | 0x8f, 0x66, 0x0d, 0xe4, 0x41, 0x7d, 0x34, 0xcd, | 4218 | "\x8f\x66\x0d\xe4\x41\x7d\x34\xcd" |
4200 | 0x43, 0x7c, 0x95, 0x0a, 0x53, 0xef, 0x66, 0xda, | 4219 | "\x43\x7c\x95\x0a\x53\xef\x66\xda" |
4201 | 0x7e, 0x9b, 0xf3, 0x93, 0xaf, 0xd0, 0x73, 0x71, | 4220 | "\x7e\x9b\xf3\x93\xaf\xd0\x73\x71" |
4202 | 0xba, 0x40, 0x9b, 0x74, 0xf8, 0xd7, 0xd7, 0x41, | 4221 | "\xba\x40\x9b\x74\xf8\xd7\xd7\x41" |
4203 | 0x6d, 0xaf, 0x72, 0x9c, 0x8d, 0x21, 0x87, 0x3c, | 4222 | "\x6d\xaf\x72\x9c\x8d\x21\x87\x3c" |
4204 | 0xfd, 0x0a, 0x90, 0xa9, 0x47, 0x96, 0x9e, 0xd3, | 4223 | "\xfd\x0a\x90\xa9\x47\x96\x9e\xd3" |
4205 | 0x88, 0xee, 0x73, 0xcf, 0x66, 0x2f, 0x52, 0x56, | 4224 | "\x88\xee\x73\xcf\x66\x2f\x52\x56" |
4206 | 0x6d, 0xa9, 0x80, 0x4c, 0xe2, 0x6f, 0x62, 0x88, | 4225 | "\x6d\xa9\x80\x4c\xe2\x6f\x62\x88" |
4207 | 0x3f, 0x0e, 0x54, 0x17, 0x48, 0x80, 0x5d, 0xd3, | 4226 | "\x3f\x0e\x54\x17\x48\x80\x5d\xd3" |
4208 | 0xc3, 0xda, 0x25, 0x3d, 0xa1, 0xc8, 0xcb, 0x9f, | 4227 | "\xc3\xda\x25\x3d\xa1\xc8\xcb\x9f" |
4209 | 0x9b, 0x70, 0xb3, 0xa1, 0xeb, 0x04, 0x52, 0xa1, | 4228 | "\x9b\x70\xb3\xa1\xeb\x04\x52\xa1" |
4210 | 0xf2, 0x22, 0x0f, 0xfc, 0xc8, 0x18, 0xfa, 0xf9, | 4229 | "\xf2\x22\x0f\xfc\xc8\x18\xfa\xf9" |
4211 | 0x85, 0x9c, 0xf1, 0xac, 0xeb, 0x0c, 0x02, 0x46, | 4230 | "\x85\x9c\xf1\xac\xeb\x0c\x02\x46" |
4212 | 0x75, 0xd2, 0xf5, 0x2c, 0xe3, 0xd2, 0x59, 0x94, | 4231 | "\x75\xd2\xf5\x2c\xe3\xd2\x59\x94" |
4213 | 0x12, 0xf3, 0x3c, 0xfc, 0xd7, 0x92, 0xfa, 0x36, | 4232 | "\x12\xf3\x3c\xfc\xd7\x92\xfa\x36" |
4214 | 0xba, 0x61, 0x34, 0x38, 0x7c, 0xda, 0x48, 0x3e, | 4233 | "\xba\x61\x34\x38\x7c\xda\x48\x3e" |
4215 | 0x08, 0xc9, 0x39, 0x23, 0x5e, 0x02, 0x2c, 0x1a, | 4234 | "\x08\xc9\x39\x23\x5e\x02\x2c\x1a" |
4216 | 0x18, 0x7e, 0xb4, 0xd9, 0xfd, 0x9e, 0x40, 0x02, | 4235 | "\x18\x7e\xb4\xd9\xfd\x9e\x40\x02" |
4217 | 0xb1, 0x33, 0x37, 0x32, 0xe7, 0xde, 0xd6, 0xd0, | 4236 | "\xb1\x33\x37\x32\xe7\xde\xd6\xd0" |
4218 | 0x7c, 0x58, 0x65, 0x4b, 0xf8, 0x34, 0x27, 0x9c, | 4237 | "\x7c\x58\x65\x4b\xf8\x34\x27\x9c" |
4219 | 0x44, 0xb4, 0xbd, 0xe9, 0xe9, 0x4c, 0x78, 0x7d, | 4238 | "\x44\xb4\xbd\xe9\xe9\x4c\x78\x7d" |
4220 | 0x4b, 0x9f, 0xce, 0xb1, 0xcd, 0x47, 0xa5, 0x37, | 4239 | "\x4b\x9f\xce\xb1\xcd\x47\xa5\x37" |
4221 | 0xe5, 0x6d, 0xbd, 0xb9, 0x43, 0x94, 0x0a, 0xd4, | 4240 | "\xe5\x6d\xbd\xb9\x43\x94\x0a\xd4" |
4222 | 0xd6, 0xf9, 0x04, 0x5f, 0xb5, 0x66, 0x6c, 0x1a, | 4241 | "\xd6\xf9\x04\x5f\xb5\x66\x6c\x1a" |
4223 | 0x35, 0x12, 0xe3, 0x36, 0x28, 0x27, 0x36, 0x58, | 4242 | "\x35\x12\xe3\x36\x28\x27\x36\x58" |
4224 | 0x01, 0x2b, 0x79, 0xe4, 0xba, 0x6d, 0x10, 0x7d, | 4243 | "\x01\x2b\x79\xe4\xba\x6d\x10\x7d" |
4225 | 0x65, 0xdf, 0x84, 0x95, 0xf4, 0xd5, 0xb6, 0x8f, | 4244 | "\x65\xdf\x84\x95\xf4\xd5\xb6\x8f" |
4226 | 0x2b, 0x9f, 0x96, 0x00, 0x86, 0x60, 0xf0, 0x21, | 4245 | "\x2b\x9f\x96\x00\x86\x60\xf0\x21" |
4227 | 0x76, 0xa8, 0x6a, 0x8c, 0x28, 0x1c, 0xb3, 0x6b, | 4246 | "\x76\xa8\x6a\x8c\x28\x1c\xb3\x6b" |
4228 | 0x97, 0xd7, 0xb6, 0x53, 0x2a, 0xcc, 0xab, 0x40, | 4247 | "\x97\xd7\xb6\x53\x2a\xcc\xab\x40" |
4229 | 0x9d, 0x62, 0x79, 0x58, 0x52, 0xe6, 0x65, 0xb7, | 4248 | "\x9d\x62\x79\x58\x52\xe6\x65\xb7" |
4230 | 0xab, 0x55, 0x67, 0x9c, 0x89, 0x7c, 0x03, 0xb0, | 4249 | "\xab\x55\x67\x9c\x89\x7c\x03\xb0" |
4231 | 0x73, 0x59, 0xc5, 0x81, 0xf5, 0x18, 0x17, 0x5c, | 4250 | "\x73\x59\xc5\x81\xf5\x18\x17\x5c" |
4232 | 0x89, 0xf3, 0x78, 0x35, 0x44, 0x62, 0x78, 0x72, | 4251 | "\x89\xf3\x78\x35\x44\x62\x78\x72" |
4233 | 0xd0, 0x96, 0xeb, 0x31, 0xe7, 0x87, 0x77, 0x14, | 4252 | "\xd0\x96\xeb\x31\xe7\x87\x77\x14" |
4234 | 0x99, 0x51, 0xf2, 0x59, 0x26, 0x9e, 0xb5, 0xa6, | 4253 | "\x99\x51\xf2\x59\x26\x9e\xb5\xa6" |
4235 | 0x45, 0xfe, 0x6e, 0xbd, 0x07, 0x4c, 0x94, 0x5a, | 4254 | "\x45\xfe\x6e\xbd\x07\x4c\x94\x5a" |
4236 | 0xa5, 0x7d, 0xfc, 0xf1, 0x2b, 0x77, 0xe2, 0xfe, | 4255 | "\xa5\x7d\xfc\xf1\x2b\x77\xe2\xfe" |
4237 | 0x17, 0xd4, 0x84, 0xa0, 0xac, 0xb5, 0xc7, 0xda, | 4256 | "\x17\xd4\x84\xa0\xac\xb5\xc7\xda" |
4238 | 0xa9, 0x1a, 0xb6, 0xf3, 0x74, 0x11, 0xb4, 0x9d, | 4257 | "\xa9\x1a\xb6\xf3\x74\x11\xb4\x9d" |
4239 | 0xfb, 0x79, 0x2e, 0x04, 0x2d, 0x50, 0x28, 0x83, | 4258 | "\xfb\x79\x2e\x04\x2d\x50\x28\x83" |
4240 | 0xbf, 0xc6, 0x52, 0xd3, 0x34, 0xd6, 0xe8, 0x7a, | 4259 | "\xbf\xc6\x52\xd3\x34\xd6\xe8\x7a" |
4241 | 0xb6, 0xea, 0xe7, 0xa8, 0x6c, 0x15, 0x1e, 0x2c, | 4260 | "\xb6\xea\xe7\xa8\x6c\x15\x1e\x2c" |
4242 | 0x57, 0xbc, 0x48, 0x4e, 0x5f, 0x5c, 0xb6, 0x92, | 4261 | "\x57\xbc\x48\x4e\x5f\x5c\xb6\x92" |
4243 | 0xd2, 0x49, 0x77, 0x81, 0x6d, 0x90, 0x70, 0xae, | 4262 | "\xd2\x49\x77\x81\x6d\x90\x70\xae" |
4244 | 0x98, 0xa1, 0x03, 0x0d, 0x6b, 0xb9, 0x77, 0x14, | 4263 | "\x98\xa1\x03\x0d\x6b\xb9\x77\x14" |
4245 | 0xf1, 0x4e, 0x23, 0xd3, 0xf8, 0x68, 0xbd, 0xc2, | 4264 | "\xf1\x4e\x23\xd3\xf8\x68\xbd\xc2" |
4246 | 0xfe, 0x04, 0xb7, 0x5c, 0xc5, 0x17, 0x60, 0x8f, | 4265 | "\xfe\x04\xb7\x5c\xc5\x17\x60\x8f" |
4247 | 0x65, 0x54, 0xa4, 0x7a, 0x42, 0xdc, 0x18, 0x0d, | 4266 | "\x65\x54\xa4\x7a\x42\xdc\x18\x0d" |
4248 | 0xb5, 0xcf, 0x0f, 0xd3, 0xc7, 0x91, 0x66, 0x1b, | 4267 | "\xb5\xcf\x0f\xd3\xc7\x91\x66\x1b" |
4249 | 0x45, 0x42, 0x27, 0x75, 0x50, 0xe5, 0xee, 0xb8, | 4268 | "\x45\x42\x27\x75\x50\xe5\xee\xb8" |
4250 | 0x7f, 0x33, 0x2c, 0xba, 0x4a, 0x92, 0x4d, 0x2c, | 4269 | "\x7f\x33\x2c\xba\x4a\x92\x4d\x2c" |
4251 | 0x3c, 0xe3, 0x0d, 0x80, 0x01, 0xba, 0x0d, 0x29, | 4270 | "\x3c\xe3\x0d\x80\x01\xba\x0d\x29" |
4252 | 0xd8, 0x3c, 0xe9, 0x13, 0x16, 0x57, 0xe6, 0xea, | 4271 | "\xd8\x3c\xe9\x13\x16\x57\xe6\xea" |
4253 | 0x94, 0x52, 0xe7, 0x00, 0x4d, 0x30, 0xb0, 0x0f, | 4272 | "\x94\x52\xe7\x00\x4d\x30\xb0\x0f" |
4254 | 0x35, 0xb8, 0xb8, 0xa7, 0xb1, 0xb5, 0x3b, 0x44, | 4273 | "\x35\xb8\xb8\xa7\xb1\xb5\x3b\x44" |
4255 | 0xe1, 0x2f, 0xfd, 0x88, 0xed, 0x43, 0xe7, 0x52, | 4274 | "\xe1\x2f\xfd\x88\xed\x43\xe7\x52" |
4256 | 0x10, 0x93, 0xb3, 0x8a, 0x30, 0x6b, 0x0a, 0xf7, | 4275 | "\x10\x93\xb3\x8a\x30\x6b\x0a\xf7" |
4257 | 0x23, 0xc6, 0x50, 0x9d, 0x4a, 0xb0, 0xde, 0xc3, | 4276 | "\x23\xc6\x50\x9d\x4a\xb0\xde\xc3" |
4258 | 0xdc, 0x9b, 0x2f, 0x01, 0x56, 0x36, 0x09, 0xc5, | 4277 | "\xdc\x9b\x2f\x01\x56\x36\x09\xc5" |
4259 | 0x2f, 0x6b, 0xfe, 0xf1, 0xd8, 0x27, 0x45, 0x03, | 4278 | "\x2f\x6b\xfe\xf1\xd8\x27\x45\x03" |
4260 | 0x30, 0x5e, 0x5c, 0x5b, 0xb4, 0x62, 0x0e, 0x1a, | 4279 | "\x30\x5e\x5c\x5b\xb4\x62\x0e\x1a" |
4261 | 0xa9, 0x21, 0x2b, 0x92, 0x94, 0x87, 0x62, 0x57, | 4280 | "\xa9\x21\x2b\x92\x94\x87\x62\x57" |
4262 | 0x4c, 0x10, 0x74, 0x1a, 0xf1, 0x0a, 0xc5, 0x84, | 4281 | "\x4c\x10\x74\x1a\xf1\x0a\xc5\x84" |
4263 | 0x3b, 0x9e, 0x72, 0x02, 0xd7, 0xcc, 0x09, 0x56, | 4282 | "\x3b\x9e\x72\x02\xd7\xcc\x09\x56" |
4264 | 0xbd, 0x54, 0xc1, 0xf0, 0xc3, 0xe3, 0xb3, 0xf8, | 4283 | "\xbd\x54\xc1\xf0\xc3\xe3\xb3\xf8" |
4265 | 0xd2, 0x0d, 0x61, 0xcb, 0xef, 0xce, 0x0d, 0x05, | 4284 | "\xd2\x0d\x61\xcb\xef\xce\x0d\x05" |
4266 | 0xb0, 0x98, 0xd9, 0x8e, 0x4f, 0xf9, 0xbc, 0x93, | 4285 | "\xb0\x98\xd9\x8e\x4f\xf9\xbc\x93" |
4267 | 0xa6, 0xea, 0xc8, 0xcf, 0x10, 0x53, 0x4b, 0xf1, | 4286 | "\xa6\xea\xc8\xcf\x10\x53\x4b\xf1" |
4268 | 0xec, 0xfc, 0x89, 0xf9, 0x64, 0xb0, 0x22, 0xbf, | 4287 | "\xec\xfc\x89\xf9\x64\xb0\x22\xbf" |
4269 | 0x9e, 0x55, 0x46, 0x9f, 0x7c, 0x50, 0x8e, 0x84, | 4288 | "\x9e\x55\x46\x9f\x7c\x50\x8e\x84" |
4270 | 0x54, 0x20, 0x98, 0xd7, 0x6c, 0x40, 0x1e, 0xdb, | 4289 | "\x54\x20\x98\xd7\x6c\x40\x1e\xdb" |
4271 | 0x69, 0x34, 0x78, 0x61, 0x24, 0x21, 0x9c, 0x8a, | 4290 | "\x69\x34\x78\x61\x24\x21\x9c\x8a" |
4272 | 0xb3, 0x62, 0x31, 0x8b, 0x6e, 0xf5, 0x2a, 0x35, | 4291 | "\xb3\x62\x31\x8b\x6e\xf5\x2a\x35" |
4273 | 0x86, 0x13, 0xb1, 0x6c, 0x64, 0x2e, 0x41, 0xa5, | 4292 | "\x86\x13\xb1\x6c\x64\x2e\x41\xa5" |
4274 | 0x05, 0xf2, 0x42, 0xba, 0xd2, 0x3a, 0x0d, 0x8e, | 4293 | "\x05\xf2\x42\xba\xd2\x3a\x0d\x8e" |
4275 | 0x8a, 0x59, 0x94, 0x3c, 0xcf, 0x36, 0x27, 0x82, | 4294 | "\x8a\x59\x94\x3c\xcf\x36\x27\x82" |
4276 | 0xc2, 0x45, 0xee, 0x58, 0xcd, 0x88, 0xb4, 0xec, | 4295 | "\xc2\x45\xee\x58\xcd\x88\xb4\xec" |
4277 | 0xde, 0xb2, 0x96, 0x0a, 0xaf, 0x38, 0x6f, 0x88, | 4296 | "\xde\xb2\x96\x0a\xaf\x38\x6f\x88" |
4278 | 0xd7, 0xd8, 0xe1, 0xdf, 0xb9, 0x96, 0xa9, 0x0a, | 4297 | "\xd7\xd8\xe1\xdf\xb9\x96\xa9\x0a" |
4279 | 0xb1, 0x95, 0x28, 0x86, 0x20, 0xe9, 0x17, 0x49, | 4298 | "\xb1\x95\x28\x86\x20\xe9\x17\x49" |
4280 | 0xa2, 0x29, 0x38, 0xaa, 0xa5, 0xe9, 0x6e, 0xf1, | 4299 | "\xa2\x29\x38\xaa\xa5\xe9\x6e\xf1" |
4281 | 0x19, 0x27, 0xc0, 0xd5, 0x2a, 0x22, 0xc3, 0x0b, | 4300 | "\x19\x27\xc0\xd5\x2a\x22\xc3\x0b" |
4282 | 0xdb, 0x7c, 0x73, 0x10, 0xb9, 0xba, 0x89, 0x76, | 4301 | "\xdb\x7c\x73\x10\xb9\xba\x89\x76" |
4283 | 0x54, 0xae, 0x7d, 0x71, 0xb3, 0x93, 0xf6, 0x32, | 4302 | "\x54\xae\x7d\x71\xb3\x93\xf6\x32" |
4284 | 0xe6, 0x47, 0x43, 0x55, 0xac, 0xa0, 0x0d, 0xc2, | 4303 | "\xe6\x47\x43\x55\xac\xa0\x0d\xc2" |
4285 | 0x93, 0x27, 0x4a, 0x8e, 0x0e, 0x74, 0x15, 0xc7, | 4304 | "\x93\x27\x4a\x8e\x0e\x74\x15\xc7" |
4286 | 0x0b, 0x85, 0xd9, 0x0c, 0xa9, 0x30, 0x7a, 0x3e, | 4305 | "\x0b\x85\xd9\x0c\xa9\x30\x7a\x3e" |
4287 | 0xea, 0x8f, 0x85, 0x6d, 0x3a, 0x12, 0x4f, 0x72, | 4306 | "\xea\x8f\x85\x6d\x3a\x12\x4f\x72" |
4288 | 0x69, 0x58, 0x7a, 0x80, 0xbb, 0xb5, 0x97, 0xf3, | 4307 | "\x69\x58\x7a\x80\xbb\xb5\x97\xf3" |
4289 | 0xcf, 0x70, 0xd2, 0x5d, 0xdd, 0x4d, 0x21, 0x79, | 4308 | "\xcf\x70\xd2\x5d\xdd\x4d\x21\x79" |
4290 | 0x54, 0x4d, 0xe4, 0x05, 0xe8, 0xbd, 0xc2, 0x62, | 4309 | "\x54\x4d\xe4\x05\xe8\xbd\xc2\x62" |
4291 | 0xb1, 0x3b, 0x77, 0x1c, 0xd6, 0x5c, 0xf3, 0xa0, | 4310 | "\xb1\x3b\x77\x1c\xd6\x5c\xf3\xa0" |
4292 | 0x79, 0x00, 0xa8, 0x6c, 0x29, 0xd9, 0x18, 0x24, | 4311 | "\x79\x00\xa8\x6c\x29\xd9\x18\x24" |
4293 | 0x36, 0xa2, 0x46, 0xc0, 0x96, 0x65, 0x7f, 0xbd, | 4312 | "\x36\xa2\x46\xc0\x96\x65\x7f\xbd" |
4294 | 0x2a, 0xed, 0x36, 0x16, 0x0c, 0xaa, 0x9f, 0xf4, | 4313 | "\x2a\xed\x36\x16\x0c\xaa\x9f\xf4" |
4295 | 0xc5, 0xb4, 0xe2, 0x12, 0xed, 0x69, 0xed, 0x4f, | 4314 | "\xc5\xb4\xe2\x12\xed\x69\xed\x4f" |
4296 | 0x26, 0x2c, 0x39, 0x52, 0x89, 0x98, 0xe7, 0x2c, | 4315 | "\x26\x2c\x39\x52\x89\x98\xe7\x2c" |
4297 | 0x99, 0xa4, 0x9e, 0xa3, 0x9b, 0x99, 0x46, 0x7a, | 4316 | "\x99\xa4\x9e\xa3\x9b\x99\x46\x7a" |
4298 | 0x3a, 0xdc, 0xa8, 0x59, 0xa3, 0xdb, 0xc3, 0x3b, | 4317 | "\x3a\xdc\xa8\x59\xa3\xdb\xc3\x3b" |
4299 | 0x95, 0x0d, 0x3b, 0x09, 0x6e, 0xee, 0x83, 0x5d, | 4318 | "\x95\x0d\x3b\x09\x6e\xee\x83\x5d" |
4300 | 0x32, 0x4d, 0xed, 0xab, 0xfa, 0x98, 0x14, 0x4e, | 4319 | "\x32\x4d\xed\xab\xfa\x98\x14\x4e" |
4301 | 0xc3, 0x15, 0x45, 0x53, 0x61, 0xc4, 0x93, 0xbd, | 4320 | "\xc3\x15\x45\x53\x61\xc4\x93\xbd" |
4302 | 0x90, 0xf4, 0x99, 0x95, 0x4c, 0xe6, 0x76, 0x92, | 4321 | "\x90\xf4\x99\x95\x4c\xe6\x76\x92" |
4303 | 0x29, 0x90, 0x46, 0x30, 0x92, 0x69, 0x7d, 0x13, | 4322 | "\x29\x90\x46\x30\x92\x69\x7d\x13" |
4304 | 0xf2, 0xa5, 0xcd, 0x69, 0x49, 0x44, 0xb2, 0x0f, | 4323 | "\xf2\xa5\xcd\x69\x49\x44\xb2\x0f" |
4305 | 0x63, 0x40, 0x36, 0x5f, 0x09, 0xe2, 0x78, 0xf8, | 4324 | "\x63\x40\x36\x5f\x09\xe2\x78\xf8" |
4306 | 0x91, 0xe3, 0xe2, 0xfa, 0x10, 0xf7, 0xc8, 0x24, | 4325 | "\x91\xe3\xe2\xfa\x10\xf7\xc8\x24" |
4307 | 0xa8, 0x89, 0x32, 0x5c, 0x37, 0x25, 0x1d, 0xb2, | 4326 | "\xa8\x89\x32\x5c\x37\x25\x1d\xb2" |
4308 | 0xea, 0x17, 0x8a, 0x0a, 0xa9, 0x64, 0xc3, 0x7c, | 4327 | "\xea\x17\x8a\x0a\xa9\x64\xc3\x7c" |
4309 | 0x3c, 0x7c, 0xbd, 0xc6, 0x79, 0x34, 0xe7, 0xe2, | 4328 | "\x3c\x7c\xbd\xc6\x79\x34\xe7\xe2" |
4310 | 0x85, 0x8e, 0xbf, 0xf8, 0xde, 0x92, 0xa0, 0xae, | 4329 | "\x85\x8e\xbf\xf8\xde\x92\xa0\xae" |
4311 | 0x20, 0xc4, 0xf6, 0xbb, 0x1f, 0x38, 0x19, 0x0e, | 4330 | "\x20\xc4\xf6\xbb\x1f\x38\x19\x0e" |
4312 | 0xe8, 0x79, 0x9c, 0xa1, 0x23, 0xe9, 0x54, 0x7e, | 4331 | "\xe8\x79\x9c\xa1\x23\xe9\x54\x7e" |
4313 | 0x37, 0x2f, 0xe2, 0x94, 0x32, 0xaf, 0xa0, 0x23, | 4332 | "\x37\x2f\xe2\x94\x32\xaf\xa0\x23" |
4314 | 0x49, 0xe4, 0xc0, 0xb3, 0xac, 0x00, 0x8f, 0x36, | 4333 | "\x49\xe4\xc0\xb3\xac\x00\x8f\x36" |
4315 | 0x05, 0xc4, 0xa6, 0x96, 0xec, 0x05, 0x98, 0x4f, | 4334 | "\x05\xc4\xa6\x96\xec\x05\x98\x4f" |
4316 | 0x96, 0x67, 0x57, 0x1f, 0x20, 0x86, 0x1b, 0x2d, | 4335 | "\x96\x67\x57\x1f\x20\x86\x1b\x2d" |
4317 | 0x69, 0xe4, 0x29, 0x93, 0x66, 0x5f, 0xaf, 0x6b, | 4336 | "\x69\xe4\x29\x93\x66\x5f\xaf\x6b" |
4318 | 0x88, 0x26, 0x2c, 0x67, 0x02, 0x4b, 0x52, 0xd0, | 4337 | "\x88\x26\x2c\x67\x02\x4b\x52\xd0" |
4319 | 0x83, 0x7a, 0x43, 0x1f, 0xc0, 0x71, 0x15, 0x25, | 4338 | "\x83\x7a\x43\x1f\xc0\x71\x15\x25" |
4320 | 0x77, 0x65, 0x08, 0x60, 0x11, 0x76, 0x4c, 0x8d, | 4339 | "\x77\x65\x08\x60\x11\x76\x4c\x8d" |
4321 | 0xed, 0xa9, 0x27, 0xc6, 0xb1, 0x2a, 0x2c, 0x6a, | 4340 | "\xed\xa9\x27\xc6\xb1\x2a\x2c\x6a" |
4322 | 0x4a, 0x97, 0xf5, 0xc6, 0xb7, 0x70, 0x42, 0xd3, | 4341 | "\x4a\x97\xf5\xc6\xb7\x70\x42\xd3" |
4323 | 0x03, 0xd1, 0x24, 0x95, 0xec, 0x6d, 0xab, 0x38, | 4342 | "\x03\xd1\x24\x95\xec\x6d\xab\x38" |
4324 | 0x72, 0xce, 0xe2, 0x8b, 0x33, 0xd7, 0x51, 0x09, | 4343 | "\x72\xce\xe2\x8b\x33\xd7\x51\x09" |
4325 | 0xdc, 0x45, 0xe0, 0x09, 0x96, 0x32, 0xf3, 0xc4, | 4344 | "\xdc\x45\xe0\x09\x96\x32\xf3\xc4" |
4326 | 0x84, 0xdc, 0x73, 0x73, 0x2d, 0x1b, 0x11, 0x98, | 4345 | "\x84\xdc\x73\x73\x2d\x1b\x11\x98" |
4327 | 0xc5, 0x0e, 0x69, 0x28, 0x94, 0xc7, 0xb5, 0x4d, | 4346 | "\xc5\x0e\x69\x28\x94\xc7\xb5\x4d" |
4328 | 0xc8, 0x8a, 0xd0, 0xaa, 0x13, 0x2e, 0x18, 0x74, | 4347 | "\xc8\x8a\xd0\xaa\x13\x2e\x18\x74" |
4329 | 0xdd, 0xd1, 0x1e, 0xf3, 0x90, 0xe8, 0xfc, 0x9a, | 4348 | "\xdd\xd1\x1e\xf3\x90\xe8\xfc\x9a" |
4330 | 0x72, 0x4a, 0x0e, 0xd1, 0xe4, 0xfb, 0x0d, 0x96, | 4349 | "\x72\x4a\x0e\xd1\xe4\xfb\x0d\x96" |
4331 | 0xd1, 0x0c, 0x79, 0x85, 0x1b, 0x1c, 0xfe, 0xe1, | 4350 | "\xd1\x0c\x79\x85\x1b\x1c\xfe\xe1" |
4332 | 0x62, 0x8f, 0x7a, 0x73, 0x32, 0xab, 0xc8, 0x18, | 4351 | "\x62\x8f\x7a\x73\x32\xab\xc8\x18" |
4333 | 0x69, 0xe3, 0x34, 0x30, 0xdf, 0x13, 0xa6, 0xe5, | 4352 | "\x69\xe3\x34\x30\xdf\x13\xa6\xe5" |
4334 | 0xe8, 0x0e, 0x67, 0x7f, 0x81, 0x11, 0xb4, 0x60, | 4353 | "\xe8\x0e\x67\x7f\x81\x11\xb4\x60" |
4335 | 0xc7, 0xbd, 0x79, 0x65, 0x50, 0xdc, 0xc4, 0x5b, | 4354 | "\xc7\xbd\x79\x65\x50\xdc\xc4\x5b" |
4336 | 0xde, 0x39, 0xa4, 0x01, 0x72, 0x63, 0xf3, 0xd1, | 4355 | "\xde\x39\xa4\x01\x72\x63\xf3\xd1" |
4337 | 0x64, 0x4e, 0xdf, 0xfc, 0x27, 0x92, 0x37, 0x0d, | 4356 | "\x64\x4e\xdf\xfc\x27\x92\x37\x0d" |
4338 | 0x57, 0xcd, 0x11, 0x4f, 0x11, 0x04, 0x8e, 0x1d, | 4357 | "\x57\xcd\x11\x4f\x11\x04\x8e\x1d" |
4339 | 0x16, 0xf7, 0xcd, 0x92, 0x9a, 0x99, 0x30, 0x14, | 4358 | "\x16\xf7\xcd\x92\x9a\x99\x30\x14" |
4340 | 0xf1, 0x7c, 0x67, 0x1b, 0x1f, 0x41, 0x0b, 0xe8, | 4359 | "\xf1\x7c\x67\x1b\x1f\x41\x0b\xe8" |
4341 | 0x32, 0xe8, 0xb8, 0xc1, 0x4f, 0x54, 0x86, 0x4f, | 4360 | "\x32\xe8\xb8\xc1\x4f\x54\x86\x4f" |
4342 | 0xe5, 0x79, 0x81, 0x73, 0xcd, 0x43, 0x59, 0x68, | 4361 | "\xe5\x79\x81\x73\xcd\x43\x59\x68" |
4343 | 0x73, 0x02, 0x3b, 0x78, 0x21, 0x72, 0x43, 0x00, | 4362 | "\x73\x02\x3b\x78\x21\x72\x43\x00" |
4344 | 0x49, 0x17, 0xf7, 0x00, 0xaf, 0x68, 0x24, 0x53, | 4363 | "\x49\x17\xf7\x00\xaf\x68\x24\x53" |
4345 | 0x05, 0x0a, 0xc3, 0x33, 0xe0, 0x33, 0x3f, 0x69, | 4364 | "\x05\x0a\xc3\x33\xe0\x33\x3f\x69" |
4346 | 0xd2, 0x84, 0x2f, 0x0b, 0xed, 0xde, 0x04, 0xf4, | 4365 | "\xd2\x84\x2f\x0b\xed\xde\x04\xf4" |
4347 | 0x11, 0x94, 0x13, 0x69, 0x51, 0x09, 0x28, 0xde, | 4366 | "\x11\x94\x13\x69\x51\x09\x28\xde" |
4348 | 0x57, 0x5c, 0xef, 0xdc, 0x9a, 0x49, 0x1c, 0x17, | 4367 | "\x57\x5c\xef\xdc\x9a\x49\x1c\x17" |
4349 | 0x97, 0xf3, 0x96, 0xc1, 0x7f, 0x5d, 0x2e, 0x7d, | 4368 | "\x97\xf3\x96\xc1\x7f\x5d\x2e\x7d" |
4350 | 0x55, 0xb8, 0xb3, 0x02, 0x09, 0xb3, 0x1f, 0xe7, | 4369 | "\x55\xb8\xb3\x02\x09\xb3\x1f\xe7" |
4351 | 0xc9, 0x8d, 0xa3, 0x36, 0x34, 0x8a, 0x77, 0x13, | 4370 | "\xc9\x8d\xa3\x36\x34\x8a\x77\x13" |
4352 | 0x30, 0x63, 0x4c, 0xa5, 0xcd, 0xc3, 0xe0, 0x7e, | 4371 | "\x30\x63\x4c\xa5\xcd\xc3\xe0\x7e" |
4353 | 0x05, 0xa1, 0x7b, 0x0c, 0xcb, 0x74, 0x47, 0x31, | 4372 | "\x05\xa1\x7b\x0c\xcb\x74\x47\x31" |
4354 | 0x62, 0x03, 0x43, 0xf1, 0x87, 0xb4, 0xb0, 0x85, | 4373 | "\x62\x03\x43\xf1\x87\xb4\xb0\x85" |
4355 | 0x87, 0x8e, 0x4b, 0x25, 0xc7, 0xcf, 0xae, 0x4b, | 4374 | "\x87\x8e\x4b\x25\xc7\xcf\xae\x4b" |
4356 | 0x36, 0x46, 0x3e, 0x62, 0xbc, 0x6f, 0xeb, 0x5f, | 4375 | "\x36\x46\x3e\x62\xbc\x6f\xeb\x5f" |
4357 | 0x73, 0xac, 0xe6, 0x07, 0xee, 0xc1, 0xa1, 0xd6, | 4376 | "\x73\xac\xe6\x07\xee\xc1\xa1\xd6" |
4358 | 0xc4, 0xab, 0xc9, 0xd6, 0x89, 0x45, 0xe1, 0xf1, | 4377 | "\xc4\xab\xc9\xd6\x89\x45\xe1\xf1" |
4359 | 0x04, 0x4e, 0x1a, 0x6f, 0xbb, 0x4f, 0x3a, 0xa3, | 4378 | "\x04\x4e\x1a\x6f\xbb\x4f\x3a\xa3" |
4360 | 0xa0, 0xcb, 0xa3, 0x0a, 0xd8, 0x71, 0x35, 0x55, | 4379 | "\xa0\xcb\xa3\x0a\xd8\x71\x35\x55" |
4361 | 0xe4, 0xbc, 0x2e, 0x04, 0x06, 0xe6, 0xff, 0x5b, | 4380 | "\xe4\xbc\x2e\x04\x06\xe6\xff\x5b" |
4362 | 0x1c, 0xc0, 0x11, 0x7c, 0xc5, 0x17, 0xf3, 0x38, | 4381 | "\x1c\xc0\x11\x7c\xc5\x17\xf3\x38" |
4363 | 0xcf, 0xe9, 0xba, 0x0f, 0x0e, 0xef, 0x02, 0xc2, | 4382 | "\xcf\xe9\xba\x0f\x0e\xef\x02\xc2" |
4364 | 0x8d, 0xc6, 0xbc, 0x4b, 0x67, 0x20, 0x95, 0xd7, | 4383 | "\x8d\xc6\xbc\x4b\x67\x20\x95\xd7" |
4365 | 0x2c, 0x45, 0x5b, 0x86, 0x44, 0x8c, 0x6f, 0x2e, | 4384 | "\x2c\x45\x5b\x86\x44\x8c\x6f\x2e" |
4366 | 0x7e, 0x9f, 0x1c, 0x77, 0xba, 0x6b, 0x0e, 0xa3, | 4385 | "\x7e\x9f\x1c\x77\xba\x6b\x0e\xa3" |
4367 | 0x69, 0xdc, 0xab, 0x24, 0x57, 0x60, 0x47, 0xc1, | 4386 | "\x69\xdc\xab\x24\x57\x60\x47\xc1" |
4368 | 0xd1, 0xa5, 0x9d, 0x23, 0xe6, 0xb1, 0x37, 0xfe, | 4387 | "\xd1\xa5\x9d\x23\xe6\xb1\x37\xfe" |
4369 | 0x93, 0xd2, 0x4c, 0x46, 0xf9, 0x0c, 0xc6, 0xfb, | 4388 | "\x93\xd2\x4c\x46\xf9\x0c\xc6\xfb" |
4370 | 0xd6, 0x9d, 0x99, 0x69, 0xab, 0x7a, 0x07, 0x0c, | 4389 | "\xd6\x9d\x99\x69\xab\x7a\x07\x0c" |
4371 | 0x65, 0xe7, 0xc4, 0x08, 0x96, 0xe2, 0xa5, 0x01, | 4390 | "\x65\xe7\xc4\x08\x96\xe2\xa5\x01" |
4372 | 0x3f, 0x46, 0x07, 0x05, 0x7e, 0xe8, 0x9a, 0x90, | 4391 | "\x3f\x46\x07\x05\x7e\xe8\x9a\x90" |
4373 | 0x50, 0xdc, 0xe9, 0x7a, 0xea, 0xa1, 0x39, 0x6e, | 4392 | "\x50\xdc\xe9\x7a\xea\xa1\x39\x6e" |
4374 | 0x66, 0xe4, 0x6f, 0xa5, 0x5f, 0xb2, 0xd9, 0x5b, | 4393 | "\x66\xe4\x6f\xa5\x5f\xb2\xd9\x5b" |
4375 | 0xf5, 0xdb, 0x2a, 0x32, 0xf0, 0x11, 0x6f, 0x7c, | 4394 | "\xf5\xdb\x2a\x32\xf0\x11\x6f\x7c" |
4376 | 0x26, 0x10, 0x8f, 0x3d, 0x80, 0xe9, 0x58, 0xf7, | 4395 | "\x26\x10\x8f\x3d\x80\xe9\x58\xf7" |
4377 | 0xe0, 0xa8, 0x57, 0xf8, 0xdb, 0x0e, 0xce, 0x99, | 4396 | "\xe0\xa8\x57\xf8\xdb\x0e\xce\x99" |
4378 | 0x63, 0x19, 0x3d, 0xd5, 0xec, 0x1b, 0x77, 0x69, | 4397 | "\x63\x19\x3d\xd5\xec\x1b\x77\x69" |
4379 | 0x98, 0xf6, 0xe4, 0x5f, 0x67, 0x17, 0x4b, 0x09, | 4398 | "\x98\xf6\xe4\x5f\x67\x17\x4b\x09" |
4380 | 0x85, 0x62, 0x82, 0x70, 0x18, 0xe2, 0x9a, 0x78, | 4399 | "\x85\x62\x82\x70\x18\xe2\x9a\x78" |
4381 | 0xe2, 0x62, 0xbd, 0xb4, 0xf1, 0x42, 0xc6, 0xfb, | 4400 | "\xe2\x62\xbd\xb4\xf1\x42\xc6\xfb" |
4382 | 0x08, 0xd0, 0xbd, 0xeb, 0x4e, 0x09, 0xf2, 0xc8, | 4401 | "\x08\xd0\xbd\xeb\x4e\x09\xf2\xc8" |
4383 | 0x1e, 0xdc, 0x3d, 0x32, 0x21, 0x56, 0x9c, 0x4f, | 4402 | "\x1e\xdc\x3d\x32\x21\x56\x9c\x4f" |
4384 | 0x35, 0xf3, 0x61, 0x06, 0x72, 0x84, 0xc4, 0x32, | 4403 | "\x35\xf3\x61\x06\x72\x84\xc4\x32" |
4385 | 0xf2, 0xf1, 0xfa, 0x0b, 0x2f, 0xc3, 0xdb, 0x02, | 4404 | "\xf2\xf1\xfa\x0b\x2f\xc3\xdb\x02" |
4386 | 0x04, 0xc2, 0xde, 0x57, 0x64, 0x60, 0x8d, 0xcf, | 4405 | "\x04\xc2\xde\x57\x64\x60\x8d\xcf" |
4387 | 0xcb, 0x86, 0x5d, 0x97, 0x3e, 0xb1, 0x9c, 0x01, | 4406 | "\xcb\x86\x5d\x97\x3e\xb1\x9c\x01" |
4388 | 0xd6, 0x28, 0x8f, 0x99, 0xbc, 0x46, 0xeb, 0x05, | 4407 | "\xd6\x28\x8f\x99\xbc\x46\xeb\x05" |
4389 | 0xaf, 0x7e, 0xb8, 0x21, 0x2a, 0x56, 0x85, 0x1c, | 4408 | "\xaf\x7e\xb8\x21\x2a\x56\x85\x1c" |
4390 | 0xb3, 0x71, 0xa0, 0xde, 0xca, 0x96, 0xf1, 0x78, | 4409 | "\xb3\x71\xa0\xde\xca\x96\xf1\x78" |
4391 | 0x49, 0xa2, 0x99, 0x81, 0x80, 0x5c, 0x01, 0xf5, | 4410 | "\x49\xa2\x99\x81\x80\x5c\x01\xf5" |
4392 | 0xa0, 0xa2, 0x56, 0x63, 0xe2, 0x70, 0x07, 0xa5, | 4411 | "\xa0\xa2\x56\x63\xe2\x70\x07\xa5" |
4393 | 0x95, 0xd6, 0x85, 0xeb, 0x36, 0x9e, 0xa9, 0x51, | 4412 | "\x95\xd6\x85\xeb\x36\x9e\xa9\x51" |
4394 | 0x66, 0x56, 0x5f, 0x1d, 0x02, 0x19, 0xe2, 0xf6, | 4413 | "\x66\x56\x5f\x1d\x02\x19\xe2\xf6" |
4395 | 0x4f, 0x73, 0x38, 0x09, 0x75, 0x64, 0x48, 0xe0, | 4414 | "\x4f\x73\x38\x09\x75\x64\x48\xe0" |
4396 | 0xf1, 0x7e, 0x0e, 0xe8, 0x9d, 0xf9, 0xed, 0x94, | 4415 | "\xf1\x7e\x0e\xe8\x9d\xf9\xed\x94" |
4397 | 0xfe, 0x16, 0x26, 0x62, 0x49, 0x74, 0xf4, 0xb0, | 4416 | "\xfe\x16\x26\x62\x49\x74\xf4\xb0" |
4398 | 0xd4, 0xa9, 0x6c, 0xb0, 0xfd, 0x53, 0xe9, 0x81, | 4417 | "\xd4\xa9\x6c\xb0\xfd\x53\xe9\x81" |
4399 | 0xe0, 0x7a, 0xbf, 0xcf, 0xb5, 0xc4, 0x01, 0x81, | 4418 | "\xe0\x7a\xbf\xcf\xb5\xc4\x01\x81" |
4400 | 0x79, 0x99, 0x77, 0x01, 0x3b, 0xe9, 0xa2, 0xb6, | 4419 | "\x79\x99\x77\x01\x3b\xe9\xa2\xb6" |
4401 | 0xe6, 0x6a, 0x8a, 0x9e, 0x56, 0x1c, 0x8d, 0x1e, | 4420 | "\xe6\x6a\x8a\x9e\x56\x1c\x8d\x1e" |
4402 | 0x8f, 0x06, 0x55, 0x2c, 0x6c, 0xdc, 0x92, 0x87, | 4421 | "\x8f\x06\x55\x2c\x6c\xdc\x92\x87" |
4403 | 0x64, 0x3b, 0x4b, 0x19, 0xa1, 0x13, 0x64, 0x1d, | 4422 | "\x64\x3b\x4b\x19\xa1\x13\x64\x1d" |
4404 | 0x4a, 0xe9, 0xc0, 0x00, 0xb8, 0x95, 0xef, 0x6b, | 4423 | "\x4a\xe9\xc0\x00\xb8\x95\xef\x6b" |
4405 | 0x1a, 0x86, 0x6d, 0x37, 0x52, 0x02, 0xc2, 0xe0, | 4424 | "\x1a\x86\x6d\x37\x52\x02\xc2\xe0" |
4406 | 0xc8, 0xbb, 0x42, 0x0c, 0x02, 0x21, 0x4a, 0xc9, | 4425 | "\xc8\xbb\x42\x0c\x02\x21\x4a\xc9" |
4407 | 0xef, 0xa0, 0x54, 0xe4, 0x5e, 0x16, 0x53, 0x81, | 4426 | "\xef\xa0\x54\xe4\x5e\x16\x53\x81" |
4408 | 0x70, 0x62, 0x10, 0xaf, 0xde, 0xb8, 0xb5, 0xd3, | 4427 | "\x70\x62\x10\xaf\xde\xb8\xb5\xd3" |
4409 | 0xe8, 0x5e, 0x6c, 0xc3, 0x8a, 0x3e, 0x18, 0x07, | 4428 | "\xe8\x5e\x6c\xc3\x8a\x3e\x18\x07" |
4410 | 0xf2, 0x2f, 0x7d, 0xa7, 0xe1, 0x3d, 0x4e, 0xb4, | 4429 | "\xf2\x2f\x7d\xa7\xe1\x3d\x4e\xb4" |
4411 | 0x26, 0xa7, 0xa3, 0x93, 0x86, 0xb2, 0x04, 0x1e, | 4430 | "\x26\xa7\xa3\x93\x86\xb2\x04\x1e" |
4412 | 0x53, 0x5d, 0x86, 0xd6, 0xde, 0x65, 0xca, 0xe3, | 4431 | "\x53\x5d\x86\xd6\xde\x65\xca\xe3" |
4413 | 0x4e, 0xc1, 0xcf, 0xef, 0xc8, 0x70, 0x1b, 0x83, | 4432 | "\x4e\xc1\xcf\xef\xc8\x70\x1b\x83" |
4414 | 0x13, 0xdd, 0x18, 0x8b, 0x0d, 0x76, 0xd2, 0xf6, | 4433 | "\x13\xdd\x18\x8b\x0d\x76\xd2\xf6" |
4415 | 0x37, 0x7a, 0x93, 0x7a, 0x50, 0x11, 0x9f, 0x96, | 4434 | "\x37\x7a\x93\x7a\x50\x11\x9f\x96" |
4416 | 0x86, 0x25, 0xfd, 0xac, 0xdc, 0xbe, 0x18, 0x93, | 4435 | "\x86\x25\xfd\xac\xdc\xbe\x18\x93" |
4417 | 0x19, 0x6b, 0xec, 0x58, 0x4f, 0xb9, 0x75, 0xa7, | 4436 | "\x19\x6b\xec\x58\x4f\xb9\x75\xa7" |
4418 | 0xdd, 0x3f, 0x2f, 0xec, 0xc8, 0x5a, 0x84, 0xab, | 4437 | "\xdd\x3f\x2f\xec\xc8\x5a\x84\xab" |
4419 | 0xd5, 0xe4, 0x8a, 0x07, 0xf6, 0x4d, 0x23, 0xd6, | 4438 | "\xd5\xe4\x8a\x07\xf6\x4d\x23\xd6" |
4420 | 0x03, 0xfb, 0x03, 0x6a, 0xea, 0x66, 0xbf, 0xd4, | 4439 | "\x03\xfb\x03\x6a\xea\x66\xbf\xd4" |
4421 | 0xb1, 0x34, 0xfb, 0x78, 0xe9, 0x55, 0xdc, 0x7c, | 4440 | "\xb1\x34\xfb\x78\xe9\x55\xdc\x7c" |
4422 | 0x3d, 0x9c, 0xe5, 0x9a, 0xac, 0xc3, 0x7a, 0x80, | 4441 | "\x3d\x9c\xe5\x9a\xac\xc3\x7a\x80" |
4423 | 0x24, 0x6d, 0xa0, 0xef, 0x25, 0x7c, 0xb7, 0xea, | 4442 | "\x24\x6d\xa0\xef\x25\x7c\xb7\xea" |
4424 | 0xce, 0x4d, 0x5f, 0x18, 0x60, 0xce, 0x87, 0x22, | 4443 | "\xce\x4d\x5f\x18\x60\xce\x87\x22" |
4425 | 0x66, 0x2f, 0xd5, 0xdd, 0xdd, 0x02, 0x21, 0x75, | 4444 | "\x66\x2f\xd5\xdd\xdd\x02\x21\x75" |
4426 | 0x82, 0xa0, 0x1f, 0x58, 0xc6, 0xd3, 0x62, 0xf7, | 4445 | "\x82\xa0\x1f\x58\xc6\xd3\x62\xf7" |
4427 | 0x32, 0xd8, 0xaf, 0x1e, 0x07, 0x77, 0x51, 0x96, | 4446 | "\x32\xd8\xaf\x1e\x07\x77\x51\x96" |
4428 | 0xd5, 0x6b, 0x1e, 0x7e, 0x80, 0x02, 0xe8, 0x67, | 4447 | "\xd5\x6b\x1e\x7e\x80\x02\xe8\x67" |
4429 | 0xea, 0x17, 0x0b, 0x10, 0xd2, 0x3f, 0x28, 0x25, | 4448 | "\xea\x17\x0b\x10\xd2\x3f\x28\x25" |
4430 | 0x4f, 0x05, 0x77, 0x02, 0x14, 0x69, 0xf0, 0x2c, | 4449 | "\x4f\x05\x77\x02\x14\x69\xf0\x2c" |
4431 | 0xbe, 0x0c, 0xf1, 0x74, 0x30, 0xd1, 0xb9, 0x9b, | 4450 | "\xbe\x0c\xf1\x74\x30\xd1\xb9\x9b" |
4432 | 0xfc, 0x8c, 0xbb, 0x04, 0x16, 0xd9, 0xba, 0xc3, | 4451 | "\xfc\x8c\xbb\x04\x16\xd9\xba\xc3" |
4433 | 0xbc, 0x91, 0x8a, 0xc4, 0x30, 0xa4, 0xb0, 0x12, | 4452 | "\xbc\x91\x8a\xc4\x30\xa4\xb0\x12" |
4434 | 0x4c, 0x21, 0x87, 0xcb, 0xc9, 0x1d, 0x16, 0x96, | 4453 | "\x4c\x21\x87\xcb\xc9\x1d\x16\x96" |
4435 | 0x07, 0x6f, 0x23, 0x54, 0xb9, 0x6f, 0x79, 0xe5, | 4454 | "\x07\x6f\x23\x54\xb9\x6f\x79\xe5" |
4436 | 0x64, 0xc0, 0x64, 0xda, 0xb1, 0xae, 0xdd, 0x60, | 4455 | "\x64\xc0\x64\xda\xb1\xae\xdd\x60" |
4437 | 0x6c, 0x1a, 0x9d, 0xd3, 0x04, 0x8e, 0x45, 0xb0, | 4456 | "\x6c\x1a\x9d\xd3\x04\x8e\x45\xb0" |
4438 | 0x92, 0x61, 0xd0, 0x48, 0x81, 0xed, 0x5e, 0x1d, | 4457 | "\x92\x61\xd0\x48\x81\xed\x5e\x1d" |
4439 | 0xa0, 0xc9, 0xa4, 0x33, 0xc7, 0x13, 0x51, 0x5d, | 4458 | "\xa0\xc9\xa4\x33\xc7\x13\x51\x5d" |
4440 | 0x7f, 0x83, 0x73, 0xb6, 0x70, 0x18, 0x65, 0x3e, | 4459 | "\x7f\x83\x73\xb6\x70\x18\x65\x3e" |
4441 | 0x2f, 0x0e, 0x7a, 0x12, 0x39, 0x98, 0xab, 0xd8, | 4460 | "\x2f\x0e\x7a\x12\x39\x98\xab\xd8" |
4442 | 0x7e, 0x6f, 0xa3, 0xd1, 0xba, 0x56, 0xad, 0xbd, | 4461 | "\x7e\x6f\xa3\xd1\xba\x56\xad\xbd" |
4443 | 0xf0, 0x03, 0x01, 0x1c, 0x85, 0x35, 0x9f, 0xeb, | 4462 | "\xf0\x03\x01\x1c\x85\x35\x9f\xeb" |
4444 | 0x19, 0x63, 0xa1, 0xaf, 0xfe, 0x2d, 0x35, 0x50, | 4463 | "\x19\x63\xa1\xaf\xfe\x2d\x35\x50" |
4445 | 0x39, 0xa0, 0x65, 0x7c, 0x95, 0x7e, 0x6b, 0xfe, | 4464 | "\x39\xa0\x65\x7c\x95\x7e\x6b\xfe" |
4446 | 0xc1, 0xac, 0x07, 0x7c, 0x98, 0x4f, 0xbe, 0x57, | 4465 | "\xc1\xac\x07\x7c\x98\x4f\xbe\x57" |
4447 | 0xa7, 0x22, 0xec, 0xe2, 0x7e, 0x29, 0x09, 0x53, | 4466 | "\xa7\x22\xec\xe2\x7e\x29\x09\x53" |
4448 | 0xe8, 0xbf, 0xb4, 0x7e, 0x3f, 0x8f, 0xfc, 0x14, | 4467 | "\xe8\xbf\xb4\x7e\x3f\x8f\xfc\x14" |
4449 | 0xce, 0x54, 0xf9, 0x18, 0x58, 0xb5, 0xff, 0x44, | 4468 | "\xce\x54\xf9\x18\x58\xb5\xff\x44" |
4450 | 0x05, 0x9d, 0xce, 0x1b, 0xb6, 0x82, 0x23, 0xc8, | 4469 | "\x05\x9d\xce\x1b\xb6\x82\x23\xc8" |
4451 | 0x2e, 0xbc, 0x69, 0xbb, 0x4a, 0x29, 0x0f, 0x65, | 4470 | "\x2e\xbc\x69\xbb\x4a\x29\x0f\x65" |
4452 | 0x94, 0xf0, 0x63, 0x06, 0x0e, 0xef, 0x8c, 0xbd, | 4471 | "\x94\xf0\x63\x06\x0e\xef\x8c\xbd" |
4453 | 0xff, 0xfd, 0xb0, 0x21, 0x6e, 0x57, 0x05, 0x75, | 4472 | "\xff\xfd\xb0\x21\x6e\x57\x05\x75" |
4454 | 0xda, 0xd5, 0xc4, 0xeb, 0x8d, 0x32, 0xf7, 0x50, | 4473 | "\xda\xd5\xc4\xeb\x8d\x32\xf7\x50" |
4455 | 0xd3, 0x6f, 0x22, 0xed, 0x5f, 0x8e, 0xa2, 0x5b, | 4474 | "\xd3\x6f\x22\xed\x5f\x8e\xa2\x5b" |
4456 | 0x80, 0x8c, 0xc8, 0x78, 0x40, 0x24, 0x4b, 0x89, | 4475 | "\x80\x8c\xc8\x78\x40\x24\x4b\x89" |
4457 | 0x30, 0xce, 0x7a, 0x97, 0x0e, 0xc4, 0xaf, 0xef, | 4476 | "\x30\xce\x7a\x97\x0e\xc4\xaf\xef" |
4458 | 0x9b, 0xb4, 0xcd, 0x66, 0x74, 0x14, 0x04, 0x2b, | 4477 | "\x9b\xb4\xcd\x66\x74\x14\x04\x2b" |
4459 | 0xf7, 0xce, 0x0b, 0x1c, 0x6e, 0xc2, 0x78, 0x8c, | 4478 | "\xf7\xce\x0b\x1c\x6e\xc2\x78\x8c" |
4460 | 0xca, 0xc5, 0xd0, 0x1c, 0x95, 0x4a, 0x91, 0x2d, | 4479 | "\xca\xc5\xd0\x1c\x95\x4a\x91\x2d" |
4461 | 0xa7, 0x20, 0xeb, 0x86, 0x52, 0xb7, 0x67, 0xd8, | 4480 | "\xa7\x20\xeb\x86\x52\xb7\x67\xd8" |
4462 | 0x0c, 0xd6, 0x04, 0x14, 0xde, 0x51, 0x74, 0x75, | 4481 | "\x0c\xd6\x04\x14\xde\x51\x74\x75" |
4463 | 0xe7, 0x11, 0xb4, 0x87, 0xa3, 0x3d, 0x2d, 0xad, | 4482 | "\xe7\x11\xb4\x87\xa3\x3d\x2d\xad" |
4464 | 0x4f, 0xef, 0xa0, 0x0f, 0x70, 0x00, 0x6d, 0x13, | 4483 | "\x4f\xef\xa0\x0f\x70\x00\x6d\x13" |
4465 | 0x19, 0x1d, 0x41, 0x50, 0xe9, 0xd8, 0xf0, 0x32, | 4484 | "\x19\x1d\x41\x50\xe9\xd8\xf0\x32" |
4466 | 0x71, 0xbc, 0xd3, 0x11, 0xf2, 0xac, 0xbe, 0xaf, | 4485 | "\x71\xbc\xd3\x11\xf2\xac\xbe\xaf" |
4467 | 0x75, 0x46, 0x65, 0x4e, 0x07, 0x34, 0x37, 0xa3, | 4486 | "\x75\x46\x65\x4e\x07\x34\x37\xa3" |
4468 | 0x89, 0xfe, 0x75, 0xd4, 0x70, 0x4c, 0xc6, 0x3f, | 4487 | "\x89\xfe\x75\xd4\x70\x4c\xc6\x3f" |
4469 | 0x69, 0x24, 0x0e, 0x38, 0x67, 0x43, 0x8c, 0xde, | 4488 | "\x69\x24\x0e\x38\x67\x43\x8c\xde" |
4470 | 0x06, 0xb5, 0xb8, 0xe7, 0xc4, 0xf0, 0x41, 0x8f, | 4489 | "\x06\xb5\xb8\xe7\xc4\xf0\x41\x8f" |
4471 | 0xf0, 0xbd, 0x2f, 0x0b, 0xb9, 0x18, 0xf8, 0xde, | 4490 | "\xf0\xbd\x2f\x0b\xb9\x18\xf8\xde" |
4472 | 0x64, 0xb1, 0xdb, 0xee, 0x00, 0x50, 0x77, 0xe1, | 4491 | "\x64\xb1\xdb\xee\x00\x50\x77\xe1" |
4473 | 0xc7, 0xff, 0xa6, 0xfa, 0xdd, 0x70, 0xf4, 0xe3, | 4492 | "\xc7\xff\xa6\xfa\xdd\x70\xf4\xe3" |
4474 | 0x93, 0xe9, 0x77, 0x35, 0x3d, 0x4b, 0x2f, 0x2b, | 4493 | "\x93\xe9\x77\x35\x3d\x4b\x2f\x2b" |
4475 | 0x6d, 0x55, 0xf0, 0xfc, 0x88, 0x54, 0x4e, 0x89, | 4494 | "\x6d\x55\xf0\xfc\x88\x54\x4e\x89" |
4476 | 0xc1, 0x8a, 0x23, 0x31, 0x2d, 0x14, 0x2a, 0xb8, | 4495 | "\xc1\x8a\x23\x31\x2d\x14\x2a\xb8" |
4477 | 0x1b, 0x15, 0xdd, 0x9e, 0x6e, 0x7b, 0xda, 0x05, | 4496 | "\x1b\x15\xdd\x9e\x6e\x7b\xda\x05" |
4478 | 0x91, 0x7d, 0x62, 0x64, 0x96, 0x72, 0xde, 0xfc, | 4497 | "\x91\x7d\x62\x64\x96\x72\xde\xfc" |
4479 | 0xc1, 0xec, 0xf0, 0x23, 0x51, 0x6f, 0xdb, 0x5b, | 4498 | "\xc1\xec\xf0\x23\x51\x6f\xdb\x5b" |
4480 | 0x1d, 0x08, 0x57, 0xce, 0x09, 0xb8, 0xf6, 0xcd, | 4499 | "\x1d\x08\x57\xce\x09\xb8\xf6\xcd" |
4481 | 0x8d, 0x95, 0xf2, 0x20, 0xbf, 0x0f, 0x20, 0x57, | 4500 | "\x8d\x95\xf2\x20\xbf\x0f\x20\x57" |
4482 | 0x98, 0x81, 0x84, 0x4f, 0x15, 0x5c, 0x76, 0xe7, | 4501 | "\x98\x81\x84\x4f\x15\x5c\x76\xe7" |
4483 | 0x3e, 0x0a, 0x3a, 0x6c, 0xc4, 0x8a, 0xbe, 0x78, | 4502 | "\x3e\x0a\x3a\x6c\xc4\x8a\xbe\x78" |
4484 | 0x74, 0x77, 0xc3, 0x09, 0x4b, 0x5d, 0x48, 0xe4, | 4503 | "\x74\x77\xc3\x09\x4b\x5d\x48\xe4" |
4485 | 0xc8, 0xcb, 0x0b, 0xea, 0x17, 0x28, 0xcf, 0xcf, | 4504 | "\xc8\xcb\x0b\xea\x17\x28\xcf\xcf" |
4486 | 0x31, 0x32, 0x44, 0xa4, 0xe5, 0x0e, 0x1a, 0x98, | 4505 | "\x31\x32\x44\xa4\xe5\x0e\x1a\x98" |
4487 | 0x94, 0xc4, 0xf0, 0xff, 0xae, 0x3e, 0x44, 0xe8, | 4506 | "\x94\xc4\xf0\xff\xae\x3e\x44\xe8" |
4488 | 0xa5, 0xb3, 0xb5, 0x37, 0x2f, 0xe8, 0xaf, 0x6f, | 4507 | "\xa5\xb3\xb5\x37\x2f\xe8\xaf\x6f" |
4489 | 0x28, 0xc1, 0x37, 0x5f, 0x31, 0xd2, 0xb9, 0x33, | 4508 | "\x28\xc1\x37\x5f\x31\xd2\xb9\x33" |
4490 | 0xb1, 0xb2, 0x52, 0x94, 0x75, 0x2c, 0x29, 0x59, | 4509 | "\xb1\xb2\x52\x94\x75\x2c\x29\x59" |
4491 | 0x06, 0xc2, 0x25, 0xe8, 0x71, 0x65, 0x4e, 0xed, | 4510 | "\x06\xc2\x25\xe8\x71\x65\x4e\xed" |
4492 | 0xc0, 0x9c, 0xb1, 0xbb, 0x25, 0xdc, 0x6c, 0xe7, | 4511 | "\xc0\x9c\xb1\xbb\x25\xdc\x6c\xe7" |
4493 | 0x4b, 0xa5, 0x7a, 0x54, 0x7a, 0x60, 0xff, 0x7a, | 4512 | "\x4b\xa5\x7a\x54\x7a\x60\xff\x7a" |
4494 | 0xe0, 0x50, 0x40, 0x96, 0x35, 0x63, 0xe4, 0x0b, | 4513 | "\xe0\x50\x40\x96\x35\x63\xe4\x0b" |
4495 | 0x76, 0xbd, 0xa4, 0x65, 0x00, 0x1b, 0x57, 0x88, | 4514 | "\x76\xbd\xa4\x65\x00\x1b\x57\x88" |
4496 | 0xae, 0xed, 0x39, 0x88, 0x42, 0x11, 0x3c, 0xed, | 4515 | "\xae\xed\x39\x88\x42\x11\x3c\xed" |
4497 | 0x85, 0x67, 0x7d, 0xb9, 0x68, 0x82, 0xe9, 0x43, | 4516 | "\x85\x67\x7d\xb9\x68\x82\xe9\x43" |
4498 | 0x3c, 0x47, 0x53, 0xfa, 0xe8, 0xf8, 0x9f, 0x1f, | 4517 | "\x3c\x47\x53\xfa\xe8\xf8\x9f\x1f" |
4499 | 0x9f, 0xef, 0x0f, 0xf7, 0x30, 0xd9, 0x30, 0x0e, | 4518 | "\x9f\xef\x0f\xf7\x30\xd9\x30\x0e" |
4500 | 0xb9, 0x9f, 0x69, 0x18, 0x2f, 0x7e, 0xf8, 0xf8, | 4519 | "\xb9\x9f\x69\x18\x2f\x7e\xf8\xf8" |
4501 | 0xf8, 0x8c, 0x0f, 0xd4, 0x02, 0x4d, 0xea, 0xcd, | 4520 | "\xf8\x8c\x0f\xd4\x02\x4d\xea\xcd" |
4502 | 0x0a, 0x9c, 0x6f, 0x71, 0x6d, 0x5a, 0x4c, 0x60, | 4521 | "\x0a\x9c\x6f\x71\x6d\x5a\x4c\x60" |
4503 | 0xce, 0x20, 0x56, 0x32, 0xc6, 0xc5, 0x99, 0x1f, | 4522 | "\xce\x20\x56\x32\xc6\xc5\x99\x1f" |
4504 | 0x09, 0xe6, 0x4e, 0x18, 0x1a, 0x15, 0x13, 0xa8, | 4523 | "\x09\xe6\x4e\x18\x1a\x15\x13\xa8" |
4505 | 0x7d, 0xb1, 0x6b, 0xc0, 0xb2, 0x6d, 0xf8, 0x26, | 4524 | "\x7d\xb1\x6b\xc0\xb2\x6d\xf8\x26" |
4506 | 0x66, 0xf8, 0x3d, 0x18, 0x74, 0x70, 0x66, 0x7a, | 4525 | "\x66\xf8\x3d\x18\x74\x70\x66\x7a" |
4507 | 0x34, 0x17, 0xde, 0xba, 0x47, 0xf1, 0x06, 0x18, | 4526 | "\x34\x17\xde\xba\x47\xf1\x06\x18" |
4508 | 0xcb, 0xaf, 0xeb, 0x4a, 0x1e, 0x8f, 0xa7, 0x77, | 4527 | "\xcb\xaf\xeb\x4a\x1e\x8f\xa7\x77" |
4509 | 0xe0, 0x3b, 0x78, 0x62, 0x66, 0xc9, 0x10, 0xea, | 4528 | "\xe0\x3b\x78\x62\x66\xc9\x10\xea" |
4510 | 0x1f, 0xb7, 0x29, 0x0a, 0x45, 0xa1, 0x1d, 0x1e, | 4529 | "\x1f\xb7\x29\x0a\x45\xa1\x1d\x1e" |
4511 | 0x1d, 0xe2, 0x65, 0x61, 0x50, 0x9c, 0xd7, 0x05, | 4530 | "\x1d\xe2\x65\x61\x50\x9c\xd7\x05" |
4512 | 0xf2, 0x0b, 0x5b, 0x12, 0x61, 0x02, 0xc8, 0xe5, | 4531 | "\xf2\x0b\x5b\x12\x61\x02\xc8\xe5" |
4513 | 0x63, 0x4f, 0x20, 0x0c, 0x07, 0x17, 0x33, 0x5e, | 4532 | "\x63\x4f\x20\x0c\x07\x17\x33\x5e" |
4514 | 0x03, 0x9a, 0x53, 0x0f, 0x2e, 0x55, 0xfe, 0x50, | 4533 | "\x03\x9a\x53\x0f\x2e\x55\xfe\x50" |
4515 | 0x43, 0x7d, 0xd0, 0xb6, 0x7e, 0x5a, 0xda, 0xae, | 4534 | "\x43\x7d\xd0\xb6\x7e\x5a\xda\xae" |
4516 | 0x58, 0xef, 0x15, 0xa9, 0x83, 0xd9, 0x46, 0xb1, | 4535 | "\x58\xef\x15\xa9\x83\xd9\x46\xb1" |
4517 | 0x42, 0xaa, 0xf5, 0x02, 0x6c, 0xce, 0x92, 0x06, | 4536 | "\x42\xaa\xf5\x02\x6c\xce\x92\x06" |
4518 | 0x1b, 0xdb, 0x66, 0x45, 0x91, 0x79, 0xc2, 0x2d, | 4537 | "\x1b\xdb\x66\x45\x91\x79\xc2\x2d" |
4519 | 0xe6, 0x53, 0xd3, 0x14, 0xfd, 0xbb, 0x44, 0x63, | 4538 | "\xe6\x53\xd3\x14\xfd\xbb\x44\x63" |
4520 | 0xc6, 0xd7, 0x3d, 0x7a, 0x0c, 0x75, 0x78, 0x9d, | 4539 | "\xc6\xd7\x3d\x7a\x0c\x75\x78\x9d" |
4521 | 0x5c, 0xa6, 0x39, 0xb3, 0xe5, 0x63, 0xca, 0x8b, | 4540 | "\x5c\xa6\x39\xb3\xe5\x63\xca\x8b" |
4522 | 0xfe, 0xd3, 0xef, 0x60, 0x83, 0xf6, 0x8e, 0x70, | 4541 | "\xfe\xd3\xef\x60\x83\xf6\x8e\x70" |
4523 | 0xb6, 0x67, 0xc7, 0x77, 0xed, 0x23, 0xef, 0x4c, | 4542 | "\xb6\x67\xc7\x77\xed\x23\xef\x4c" |
4524 | 0xf0, 0xed, 0x2d, 0x07, 0x59, 0x6f, 0xc1, 0x01, | 4543 | "\xf0\xed\x2d\x07\x59\x6f\xc1\x01" |
4525 | 0x34, 0x37, 0x08, 0xab, 0xd9, 0x1f, 0x09, 0xb1, | 4544 | "\x34\x37\x08\xab\xd9\x1f\x09\xb1" |
4526 | 0xce, 0x5b, 0x17, 0xff, 0x74, 0xf8, 0x9c, 0xd5, | 4545 | "\xce\x5b\x17\xff\x74\xf8\x9c\xd5" |
4527 | 0x2c, 0x56, 0x39, 0x79, 0x0f, 0x69, 0x44, 0x75, | 4546 | "\x2c\x56\x39\x79\x0f\x69\x44\x75" |
4528 | 0x58, 0x27, 0x01, 0xc4, 0xbf, 0xa7, 0xa1, 0x1d, | 4547 | "\x58\x27\x01\xc4\xbf\xa7\xa1\x1d" |
4529 | 0x90, 0x17, 0x77, 0x86, 0x5a, 0x3f, 0xd9, 0xd1, | 4548 | "\x90\x17\x77\x86\x5a\x3f\xd9\xd1" |
4530 | 0x0e, 0xa0, 0x10, 0xf8, 0xec, 0x1e, 0xa5, 0x7f, | 4549 | "\x0e\xa0\x10\xf8\xec\x1e\xa5\x7f" |
4531 | 0x5e, 0x36, 0xd1, 0xe3, 0x04, 0x2c, 0x70, 0xf7, | 4550 | "\x5e\x36\xd1\xe3\x04\x2c\x70\xf7" |
4532 | 0x8e, 0xc0, 0x98, 0x2f, 0x6c, 0x94, 0x2b, 0x41, | 4551 | "\x8e\xc0\x98\x2f\x6c\x94\x2b\x41" |
4533 | 0xb7, 0x60, 0x00, 0xb7, 0x2e, 0xb8, 0x02, 0x8d, | 4552 | "\xb7\x60\x00\xb7\x2e\xb8\x02\x8d" |
4534 | 0xb8, 0xb0, 0xd3, 0x86, 0xba, 0x1d, 0xd7, 0x90, | 4553 | "\xb8\xb0\xd3\x86\xba\x1d\xd7\x90" |
4535 | 0xd6, 0xb6, 0xe1, 0xfc, 0xd7, 0xd8, 0x28, 0x06, | 4554 | "\xd6\xb6\xe1\xfc\xd7\xd8\x28\x06" |
4536 | 0x63, 0x9b, 0xce, 0x61, 0x24, 0x79, 0xc0, 0x70, | 4555 | "\x63\x9b\xce\x61\x24\x79\xc0\x70" |
4537 | 0x52, 0xd0, 0xb6, 0xd4, 0x28, 0x95, 0x24, 0x87, | 4556 | "\x52\xd0\xb6\xd4\x28\x95\x24\x87" |
4538 | 0x03, 0x1f, 0xb7, 0x9a, 0xda, 0xa3, 0xfb, 0x52, | 4557 | "\x03\x1f\xb7\x9a\xda\xa3\xfb\x52" |
4539 | 0x5b, 0x68, 0xe7, 0x4c, 0x8c, 0x24, 0xe1, 0x42, | 4558 | "\x5b\x68\xe7\x4c\x8c\x24\xe1\x42" |
4540 | 0xf7, 0xd5, 0xfd, 0xad, 0x06, 0x32, 0x9f, 0xba, | 4559 | "\xf7\xd5\xfd\xad\x06\x32\x9f\xba" |
4541 | 0xc1, 0xfc, 0xdd, 0xc6, 0xfc, 0xfc, 0xb3, 0x38, | 4560 | "\xc1\xfc\xdd\xc6\xfc\xfc\xb3\x38" |
4542 | 0x74, 0x56, 0x58, 0x40, 0x02, 0x37, 0x52, 0x2c, | 4561 | "\x74\x56\x58\x40\x02\x37\x52\x2c" |
4543 | 0x55, 0xcc, 0xb3, 0x9e, 0x7a, 0xe9, 0xd4, 0x38, | 4562 | "\x55\xcc\xb3\x9e\x7a\xe9\xd4\x38" |
4544 | 0x41, 0x5e, 0x0c, 0x35, 0xe2, 0x11, 0xd1, 0x13, | 4563 | "\x41\x5e\x0c\x35\xe2\x11\xd1\x13" |
4545 | 0xf8, 0xb7, 0x8d, 0x72, 0x6b, 0x22, 0x2a, 0xb0, | 4564 | "\xf8\xb7\x8d\x72\x6b\x22\x2a\xb0" |
4546 | 0xdb, 0x08, 0xba, 0x35, 0xb9, 0x3f, 0xc8, 0xd3, | 4565 | "\xdb\x08\xba\x35\xb9\x3f\xc8\xd3" |
4547 | 0x24, 0x90, 0xec, 0x58, 0xd2, 0x09, 0xc7, 0x2d, | 4566 | "\x24\x90\xec\x58\xd2\x09\xc7\x2d" |
4548 | 0xed, 0x38, 0x80, 0x36, 0x72, 0x43, 0x27, 0x49, | 4567 | "\xed\x38\x80\x36\x72\x43\x27\x49" |
4549 | 0x4a, 0x80, 0x8a, 0xa2, 0xe8, 0xd3, 0xda, 0x30, | 4568 | "\x4a\x80\x8a\xa2\xe8\xd3\xda\x30" |
4550 | 0x7d, 0xb6, 0x82, 0x37, 0x86, 0x92, 0x86, 0x3e, | 4569 | "\x7d\xb6\x82\x37\x86\x92\x86\x3e" |
4551 | 0x08, 0xb2, 0x28, 0x5a, 0x55, 0x44, 0x24, 0x7d, | 4570 | "\x08\xb2\x28\x5a\x55\x44\x24\x7d" |
4552 | 0x40, 0x48, 0x8a, 0xb6, 0x89, 0x58, 0x08, 0xa0, | 4571 | "\x40\x48\x8a\xb6\x89\x58\x08\xa0" |
4553 | 0xd6, 0x6d, 0x3a, 0x17, 0xbf, 0xf6, 0x54, 0xa2, | 4572 | "\xd6\x6d\x3a\x17\xbf\xf6\x54\xa2" |
4554 | 0xf5, 0xd3, 0x8c, 0x0f, 0x78, 0x12, 0x57, 0x8b, | 4573 | "\xf5\xd3\x8c\x0f\x78\x12\x57\x8b" |
4555 | 0xd5, 0xc2, 0xfd, 0x58, 0x5b, 0x7f, 0x38, 0xe3, | 4574 | "\xd5\xc2\xfd\x58\x5b\x7f\x38\xe3" |
4556 | 0xcc, 0xb7, 0x7c, 0x48, 0xb3, 0x20, 0xe8, 0x81, | 4575 | "\xcc\xb7\x7c\x48\xb3\x20\xe8\x81" |
4557 | 0x14, 0x32, 0x45, 0x05, 0xe0, 0xdb, 0x9f, 0x75, | 4576 | "\x14\x32\x45\x05\xe0\xdb\x9f\x75" |
4558 | 0x85, 0xb4, 0x6a, 0xfc, 0x95, 0xe3, 0x54, 0x22, | 4577 | "\x85\xb4\x6a\xfc\x95\xe3\x54\x22" |
4559 | 0x12, 0xee, 0x30, 0xfe, 0xd8, 0x30, 0xef, 0x34, | 4578 | "\x12\xee\x30\xfe\xd8\x30\xef\x34" |
4560 | 0x50, 0xab, 0x46, 0x30, 0x98, 0x2f, 0xb7, 0xc0, | 4579 | "\x50\xab\x46\x30\x98\x2f\xb7\xc0" |
4561 | 0x15, 0xa2, 0x83, 0xb6, 0xf2, 0x06, 0x21, 0xa2, | 4580 | "\x15\xa2\x83\xb6\xf2\x06\x21\xa2" |
4562 | 0xc3, 0x26, 0x37, 0x14, 0xd1, 0x4d, 0xb5, 0x10, | 4581 | "\xc3\x26\x37\x14\xd1\x4d\xb5\x10" |
4563 | 0x52, 0x76, 0x4d, 0x6a, 0xee, 0xb5, 0x2b, 0x15, | 4582 | "\x52\x76\x4d\x6a\xee\xb5\x2b\x15" |
4564 | 0xb7, 0xf9, 0x51, 0xe8, 0x2a, 0xaf, 0xc7, 0xfa, | 4583 | "\xb7\xf9\x51\xe8\x2a\xaf\xc7\xfa" |
4565 | 0x77, 0xaf, 0xb0, 0x05, 0x4d, 0xd1, 0x68, 0x8e, | 4584 | "\x77\xaf\xb0\x05\x4d\xd1\x68\x8e" |
4566 | 0x74, 0x05, 0x9f, 0x9d, 0x93, 0xa5, 0x3e, 0x7f, | 4585 | "\x74\x05\x9f\x9d\x93\xa5\x3e\x7f" |
4567 | 0x4e, 0x5f, 0x9d, 0xcb, 0x09, 0xc7, 0x83, 0xe3, | 4586 | "\x4e\x5f\x9d\xcb\x09\xc7\x83\xe3" |
4568 | 0x02, 0x9d, 0x27, 0x1f, 0xef, 0x85, 0x05, 0x8d, | 4587 | "\x02\x9d\x27\x1f\xef\x85\x05\x8d" |
4569 | 0xec, 0x55, 0x88, 0x0f, 0x0d, 0x7c, 0x4c, 0xe8, | 4588 | "\xec\x55\x88\x0f\x0d\x7c\x4c\xe8" |
4570 | 0xa1, 0x75, 0xa0, 0xd8, 0x06, 0x47, 0x14, 0xef, | 4589 | "\xa1\x75\xa0\xd8\x06\x47\x14\xef" |
4571 | 0xaa, 0x61, 0xcf, 0x26, 0x15, 0xad, 0xd8, 0xa3, | 4590 | "\xaa\x61\xcf\x26\x15\xad\xd8\xa3" |
4572 | 0xaa, 0x75, 0xf2, 0x78, 0x4a, 0x5a, 0x61, 0xdf, | 4591 | "\xaa\x75\xf2\x78\x4a\x5a\x61\xdf" |
4573 | 0x8b, 0xc7, 0x04, 0xbc, 0xb2, 0x32, 0xd2, 0x7e, | 4592 | "\x8b\xc7\x04\xbc\xb2\x32\xd2\x7e" |
4574 | 0x42, 0xee, 0xb4, 0x2f, 0x51, 0xff, 0x7b, 0x2e, | 4593 | "\x42\xee\xb4\x2f\x51\xff\x7b\x2e" |
4575 | 0xd3, 0x02, 0xe8, 0xdc, 0x5d, 0x0d, 0x50, 0xdc, | 4594 | "\xd3\x02\xe8\xdc\x5d\x0d\x50\xdc" |
4576 | 0xae, 0xb7, 0x46, 0xf9, 0xa8, 0xe6, 0xd0, 0x16, | 4595 | "\xae\xb7\x46\xf9\xa8\xe6\xd0\x16" |
4577 | 0xcc, 0xe6, 0x2c, 0x81, 0xc7, 0xad, 0xe9, 0xf0, | 4596 | "\xcc\xe6\x2c\x81\xc7\xad\xe9\xf0" |
4578 | 0x05, 0x72, 0x6d, 0x3d, 0x0a, 0x7a, 0xa9, 0x02, | 4597 | "\x05\x72\x6d\x3d\x0a\x7a\xa9\x02" |
4579 | 0xac, 0x82, 0x93, 0x6e, 0xb6, 0x1c, 0x28, 0xfc, | 4598 | "\xac\x82\x93\x6e\xb6\x1c\x28\xfc" |
4580 | 0x44, 0x12, 0xfb, 0x73, 0x77, 0xd4, 0x13, 0x39, | 4599 | "\x44\x12\xfb\x73\x77\xd4\x13\x39" |
4581 | 0x29, 0x88, 0x8a, 0xf3, 0x5c, 0xa6, 0x36, 0xa0, | 4600 | "\x29\x88\x8a\xf3\x5c\xa6\x36\xa0" |
4582 | 0x2a, 0xed, 0x7e, 0xb1, 0x1d, 0xd6, 0x4c, 0x6b, | 4601 | "\x2a\xed\x7e\xb1\x1d\xd6\x4c\x6b" |
4583 | 0x41, 0x01, 0x18, 0x5d, 0x5d, 0x07, 0x97, 0xa6, | 4602 | "\x41\x01\x18\x5d\x5d\x07\x97\xa6" |
4584 | 0x4b, 0xef, 0x31, 0x18, 0xea, 0xac, 0xb1, 0x84, | 4603 | "\x4b\xef\x31\x18\xea\xac\xb1\x84" |
4585 | 0x21, 0xed, 0xda, 0x86, | 4604 | "\x21\xed\xda\x86", |
4586 | }, | ||
4587 | .rlen = 4100, | 4605 | .rlen = 4100, |
4588 | }, | 4606 | }, |
4589 | }; | 4607 | }; |
4590 | 4608 | ||
4591 | static struct cipher_testvec aes_ctr_dec_tv_template[] = { | 4609 | static struct cipher_testvec aes_ctr_dec_tv_template[] = { |
4592 | { /* From RFC 3686 */ | 4610 | { /* From RFC 3686 */ |
4593 | .key = { 0xae, 0x68, 0x52, 0xf8, 0x12, 0x10, 0x67, 0xcc, | 4611 | .key = "\xae\x68\x52\xf8\x12\x10\x67\xcc" |
4594 | 0x4b, 0xf7, 0xa5, 0x76, 0x55, 0x77, 0xf3, 0x9e, | 4612 | "\x4b\xf7\xa5\x76\x55\x77\xf3\x9e" |
4595 | 0x00, 0x00, 0x00, 0x30 }, | 4613 | "\x00\x00\x00\x30", |
4596 | .klen = 20, | 4614 | .klen = 20, |
4597 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 4615 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00", |
4598 | .input = { 0xe4, 0x09, 0x5d, 0x4f, 0xb7, 0xa7, 0xb3, 0x79, | 4616 | .input = "\xe4\x09\x5d\x4f\xb7\xa7\xb3\x79" |
4599 | 0x2d, 0x61, 0x75, 0xa3, 0x26, 0x13, 0x11, 0xb8 }, | 4617 | "\x2d\x61\x75\xa3\x26\x13\x11\xb8", |
4600 | .ilen = 16, | 4618 | .ilen = 16, |
4601 | .result = { "Single block msg" }, | 4619 | .result = "Single block msg", |
4602 | .rlen = 16, | 4620 | .rlen = 16, |
4603 | }, { | 4621 | }, { |
4604 | .key = { 0x7e, 0x24, 0x06, 0x78, 0x17, 0xfa, 0xe0, 0xd7, | 4622 | .key = "\x7e\x24\x06\x78\x17\xfa\xe0\xd7" |
4605 | 0x43, 0xd6, 0xce, 0x1f, 0x32, 0x53, 0x91, 0x63, | 4623 | "\x43\xd6\xce\x1f\x32\x53\x91\x63" |
4606 | 0x00, 0x6c, 0xb6, 0xdb }, | 4624 | "\x00\x6c\xb6\xdb", |
4607 | .klen = 20, | 4625 | .klen = 20, |
4608 | .iv = { 0xc0, 0x54, 0x3b, 0x59, 0xda, 0x48, 0xd9, 0x0b }, | 4626 | .iv = "\xc0\x54\x3b\x59\xda\x48\xd9\x0b", |
4609 | .input = { 0x51, 0x04, 0xa1, 0x06, 0x16, 0x8a, 0x72, 0xd9, | 4627 | .input = "\x51\x04\xa1\x06\x16\x8a\x72\xd9" |
4610 | 0x79, 0x0d, 0x41, 0xee, 0x8e, 0xda, 0xd3, 0x88, | 4628 | "\x79\x0d\x41\xee\x8e\xda\xd3\x88" |
4611 | 0xeb, 0x2e, 0x1e, 0xfc, 0x46, 0xda, 0x57, 0xc8, | 4629 | "\xeb\x2e\x1e\xfc\x46\xda\x57\xc8" |
4612 | 0xfc, 0xe6, 0x30, 0xdf, 0x91, 0x41, 0xbe, 0x28 }, | 4630 | "\xfc\xe6\x30\xdf\x91\x41\xbe\x28", |
4613 | .ilen = 32, | 4631 | .ilen = 32, |
4614 | .result = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 4632 | .result = "\x00\x01\x02\x03\x04\x05\x06\x07" |
4615 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 4633 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
4616 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 4634 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
4617 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 4635 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
4618 | .rlen = 32, | 4636 | .rlen = 32, |
4619 | }, { | 4637 | }, { |
4620 | .key = { 0x16, 0xaf, 0x5b, 0x14, 0x5f, 0xc9, 0xf5, 0x79, | 4638 | .key = "\x16\xaf\x5b\x14\x5f\xc9\xf5\x79" |
4621 | 0xc1, 0x75, 0xf9, 0x3e, 0x3b, 0xfb, 0x0e, 0xed, | 4639 | "\xc1\x75\xf9\x3e\x3b\xfb\x0e\xed" |
4622 | 0x86, 0x3d, 0x06, 0xcc, 0xfd, 0xb7, 0x85, 0x15, | 4640 | "\x86\x3d\x06\xcc\xfd\xb7\x85\x15" |
4623 | 0x00, 0x00, 0x00, 0x48 }, | 4641 | "\x00\x00\x00\x48", |
4624 | .klen = 28, | 4642 | .klen = 28, |
4625 | .iv = { 0x36, 0x73, 0x3c, 0x14, 0x7d, 0x6d, 0x93, 0xcb }, | 4643 | .iv = "\x36\x73\x3c\x14\x7d\x6d\x93\xcb", |
4626 | .input = { 0x4b, 0x55, 0x38, 0x4f, 0xe2, 0x59, 0xc9, 0xc8, | 4644 | .input = "\x4b\x55\x38\x4f\xe2\x59\xc9\xc8" |
4627 | 0x4e, 0x79, 0x35, 0xa0, 0x03, 0xcb, 0xe9, 0x28 }, | 4645 | "\x4e\x79\x35\xa0\x03\xcb\xe9\x28", |
4628 | .ilen = 16, | 4646 | .ilen = 16, |
4629 | .result = { "Single block msg" }, | 4647 | .result = "Single block msg", |
4630 | .rlen = 16, | 4648 | .rlen = 16, |
4631 | }, { | 4649 | }, { |
4632 | .key = { 0x7c, 0x5c, 0xb2, 0x40, 0x1b, 0x3d, 0xc3, 0x3c, | 4650 | .key = "\x7c\x5c\xb2\x40\x1b\x3d\xc3\x3c" |
4633 | 0x19, 0xe7, 0x34, 0x08, 0x19, 0xe0, 0xf6, 0x9c, | 4651 | "\x19\xe7\x34\x08\x19\xe0\xf6\x9c" |
4634 | 0x67, 0x8c, 0x3d, 0xb8, 0xe6, 0xf6, 0xa9, 0x1a, | 4652 | "\x67\x8c\x3d\xb8\xe6\xf6\xa9\x1a" |
4635 | 0x00, 0x96, 0xb0, 0x3b }, | 4653 | "\x00\x96\xb0\x3b", |
4636 | .klen = 28, | 4654 | .klen = 28, |
4637 | .iv = { 0x02, 0x0c, 0x6e, 0xad, 0xc2, 0xcb, 0x50, 0x0d }, | 4655 | .iv = "\x02\x0c\x6e\xad\xc2\xcb\x50\x0d", |
4638 | .input = { 0x45, 0x32, 0x43, 0xfc, 0x60, 0x9b, 0x23, 0x32, | 4656 | .input = "\x45\x32\x43\xfc\x60\x9b\x23\x32" |
4639 | 0x7e, 0xdf, 0xaa, 0xfa, 0x71, 0x31, 0xcd, 0x9f, | 4657 | "\x7e\xdf\xaa\xfa\x71\x31\xcd\x9f" |
4640 | 0x84, 0x90, 0x70, 0x1c, 0x5a, 0xd4, 0xa7, 0x9c, | 4658 | "\x84\x90\x70\x1c\x5a\xd4\xa7\x9c" |
4641 | 0xfc, 0x1f, 0xe0, 0xff, 0x42, 0xf4, 0xfb, 0x00 }, | 4659 | "\xfc\x1f\xe0\xff\x42\xf4\xfb\x00", |
4642 | .ilen = 32, | 4660 | .ilen = 32, |
4643 | .result = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 4661 | .result = "\x00\x01\x02\x03\x04\x05\x06\x07" |
4644 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 4662 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
4645 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 4663 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
4646 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 4664 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
4647 | .rlen = 32, | 4665 | .rlen = 32, |
4648 | }, { | 4666 | }, { |
4649 | .key = { 0x77, 0x6b, 0xef, 0xf2, 0x85, 0x1d, 0xb0, 0x6f, | 4667 | .key = "\x77\x6b\xef\xf2\x85\x1d\xb0\x6f" |
4650 | 0x4c, 0x8a, 0x05, 0x42, 0xc8, 0x69, 0x6f, 0x6c, | 4668 | "\x4c\x8a\x05\x42\xc8\x69\x6f\x6c" |
4651 | 0x6a, 0x81, 0xaf, 0x1e, 0xec, 0x96, 0xb4, 0xd3, | 4669 | "\x6a\x81\xaf\x1e\xec\x96\xb4\xd3" |
4652 | 0x7f, 0xc1, 0xd6, 0x89, 0xe6, 0xc1, 0xc1, 0x04, | 4670 | "\x7f\xc1\xd6\x89\xe6\xc1\xc1\x04" |
4653 | 0x00, 0x00, 0x00, 0x60 }, | 4671 | "\x00\x00\x00\x60", |
4654 | .klen = 36, | 4672 | .klen = 36, |
4655 | .iv = { 0xdb, 0x56, 0x72, 0xc9, 0x7a, 0xa8, 0xf0, 0xb2 }, | 4673 | .iv = "\xdb\x56\x72\xc9\x7a\xa8\xf0\xb2", |
4656 | .input = { 0x14, 0x5a, 0xd0, 0x1d, 0xbf, 0x82, 0x4e, 0xc7, | 4674 | .input = "\x14\x5a\xd0\x1d\xbf\x82\x4e\xc7" |
4657 | 0x56, 0x08, 0x63, 0xdc, 0x71, 0xe3, 0xe0, 0xc0 }, | 4675 | "\x56\x08\x63\xdc\x71\xe3\xe0\xc0", |
4658 | .ilen = 16, | 4676 | .ilen = 16, |
4659 | .result = { "Single block msg" }, | 4677 | .result = "Single block msg", |
4660 | .rlen = 16, | 4678 | .rlen = 16, |
4661 | }, { | 4679 | }, { |
4662 | .key = { 0xf6, 0xd6, 0x6d, 0x6b, 0xd5, 0x2d, 0x59, 0xbb, | 4680 | .key = "\xf6\xd6\x6d\x6b\xd5\x2d\x59\xbb" |
4663 | 0x07, 0x96, 0x36, 0x58, 0x79, 0xef, 0xf8, 0x86, | 4681 | "\x07\x96\x36\x58\x79\xef\xf8\x86" |
4664 | 0xc6, 0x6d, 0xd5, 0x1a, 0x5b, 0x6a, 0x99, 0x74, | 4682 | "\xc6\x6d\xd5\x1a\x5b\x6a\x99\x74" |
4665 | 0x4b, 0x50, 0x59, 0x0c, 0x87, 0xa2, 0x38, 0x84, | 4683 | "\x4b\x50\x59\x0c\x87\xa2\x38\x84" |
4666 | 0x00, 0xfa, 0xac, 0x24 }, | 4684 | "\x00\xfa\xac\x24", |
4667 | .klen = 36, | 4685 | .klen = 36, |
4668 | .iv = { 0xc1, 0x58, 0x5e, 0xf1, 0x5a, 0x43, 0xd8, 0x75 }, | 4686 | .iv = "\xc1\x58\x5e\xf1\x5a\x43\xd8\x75", |
4669 | .input = { 0xf0, 0x5e, 0x23, 0x1b, 0x38, 0x94, 0x61, 0x2c, | 4687 | .input = "\xf0\x5e\x23\x1b\x38\x94\x61\x2c" |
4670 | 0x49, 0xee, 0x00, 0x0b, 0x80, 0x4e, 0xb2, 0xa9, | 4688 | "\x49\xee\x00\x0b\x80\x4e\xb2\xa9" |
4671 | 0xb8, 0x30, 0x6b, 0x50, 0x8f, 0x83, 0x9d, 0x6a, | 4689 | "\xb8\x30\x6b\x50\x8f\x83\x9d\x6a" |
4672 | 0x55, 0x30, 0x83, 0x1d, 0x93, 0x44, 0xaf, 0x1c }, | 4690 | "\x55\x30\x83\x1d\x93\x44\xaf\x1c", |
4673 | .ilen = 32, | 4691 | .ilen = 32, |
4674 | .result = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 4692 | .result = "\x00\x01\x02\x03\x04\x05\x06\x07" |
4675 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 4693 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
4676 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 4694 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
4677 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 4695 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
4678 | .rlen = 32, | 4696 | .rlen = 32, |
4679 | }, | 4697 | }, |
4680 | }; | 4698 | }; |
4681 | 4699 | ||
4682 | static struct aead_testvec aes_gcm_enc_tv_template[] = { | 4700 | static struct aead_testvec aes_gcm_enc_tv_template[] = { |
4683 | { /* From McGrew & Viega - http://citeseer.ist.psu.edu/656989.html */ | 4701 | { /* From McGrew & Viega - http://citeseer.ist.psu.edu/656989.html */ |
4702 | .key = zeroed_string, | ||
4684 | .klen = 16, | 4703 | .klen = 16, |
4685 | .result = { 0x58, 0xe2, 0xfc, 0xce, 0xfa, 0x7e, 0x30, 0x61, | 4704 | .result = "\x58\xe2\xfc\xce\xfa\x7e\x30\x61" |
4686 | 0x36, 0x7f, 0x1d, 0x57, 0xa4, 0xe7, 0x45, 0x5a }, | 4705 | "\x36\x7f\x1d\x57\xa4\xe7\x45\x5a", |
4687 | .rlen = 16, | 4706 | .rlen = 16, |
4688 | }, { | 4707 | }, { |
4708 | .key = zeroed_string, | ||
4689 | .klen = 16, | 4709 | .klen = 16, |
4710 | .input = zeroed_string, | ||
4690 | .ilen = 16, | 4711 | .ilen = 16, |
4691 | .result = { 0x03, 0x88, 0xda, 0xce, 0x60, 0xb6, 0xa3, 0x92, | 4712 | .result = "\x03\x88\xda\xce\x60\xb6\xa3\x92" |
4692 | 0xf3, 0x28, 0xc2, 0xb9, 0x71, 0xb2, 0xfe, 0x78, | 4713 | "\xf3\x28\xc2\xb9\x71\xb2\xfe\x78" |
4693 | 0xab, 0x6e, 0x47, 0xd4, 0x2c, 0xec, 0x13, 0xbd, | 4714 | "\xab\x6e\x47\xd4\x2c\xec\x13\xbd" |
4694 | 0xf5, 0x3a, 0x67, 0xb2, 0x12, 0x57, 0xbd, 0xdf }, | 4715 | "\xf5\x3a\x67\xb2\x12\x57\xbd\xdf", |
4695 | .rlen = 32, | 4716 | .rlen = 32, |
4696 | }, { | 4717 | }, { |
4697 | .key = { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, | 4718 | .key = "\xfe\xff\xe9\x92\x86\x65\x73\x1c" |
4698 | 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08 }, | 4719 | "\x6d\x6a\x8f\x94\x67\x30\x83\x08", |
4699 | .klen = 16, | 4720 | .klen = 16, |
4700 | .iv = { 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad, | 4721 | .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad" |
4701 | 0xde, 0xca, 0xf8, 0x88 }, | 4722 | "\xde\xca\xf8\x88", |
4702 | .input = { 0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5, | 4723 | .input = "\xd9\x31\x32\x25\xf8\x84\x06\xe5" |
4703 | 0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a, | 4724 | "\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" |
4704 | 0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda, | 4725 | "\x86\xa7\xa9\x53\x15\x34\xf7\xda" |
4705 | 0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72, | 4726 | "\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" |
4706 | 0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53, | 4727 | "\x1c\x3c\x0c\x95\x95\x68\x09\x53" |
4707 | 0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25, | 4728 | "\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" |
4708 | 0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57, | 4729 | "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57" |
4709 | 0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55 }, | 4730 | "\xba\x63\x7b\x39\x1a\xaf\xd2\x55", |
4710 | .ilen = 64, | 4731 | .ilen = 64, |
4711 | .result = { 0x42, 0x83, 0x1e, 0xc2, 0x21, 0x77, 0x74, 0x24, | 4732 | .result = "\x42\x83\x1e\xc2\x21\x77\x74\x24" |
4712 | 0x4b, 0x72, 0x21, 0xb7, 0x84, 0xd0, 0xd4, 0x9c, | 4733 | "\x4b\x72\x21\xb7\x84\xd0\xd4\x9c" |
4713 | 0xe3, 0xaa, 0x21, 0x2f, 0x2c, 0x02, 0xa4, 0xe0, | 4734 | "\xe3\xaa\x21\x2f\x2c\x02\xa4\xe0" |
4714 | 0x35, 0xc1, 0x7e, 0x23, 0x29, 0xac, 0xa1, 0x2e, | 4735 | "\x35\xc1\x7e\x23\x29\xac\xa1\x2e" |
4715 | 0x21, 0xd5, 0x14, 0xb2, 0x54, 0x66, 0x93, 0x1c, | 4736 | "\x21\xd5\x14\xb2\x54\x66\x93\x1c" |
4716 | 0x7d, 0x8f, 0x6a, 0x5a, 0xac, 0x84, 0xaa, 0x05, | 4737 | "\x7d\x8f\x6a\x5a\xac\x84\xaa\x05" |
4717 | 0x1b, 0xa3, 0x0b, 0x39, 0x6a, 0x0a, 0xac, 0x97, | 4738 | "\x1b\xa3\x0b\x39\x6a\x0a\xac\x97" |
4718 | 0x3d, 0x58, 0xe0, 0x91, 0x47, 0x3f, 0x59, 0x85, | 4739 | "\x3d\x58\xe0\x91\x47\x3f\x59\x85" |
4719 | 0x4d, 0x5c, 0x2a, 0xf3, 0x27, 0xcd, 0x64, 0xa6, | 4740 | "\x4d\x5c\x2a\xf3\x27\xcd\x64\xa6" |
4720 | 0x2c, 0xf3, 0x5a, 0xbd, 0x2b, 0xa6, 0xfa, 0xb4 }, | 4741 | "\x2c\xf3\x5a\xbd\x2b\xa6\xfa\xb4", |
4721 | .rlen = 80, | 4742 | .rlen = 80, |
4722 | }, { | 4743 | }, { |
4723 | .key = { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, | 4744 | .key = "\xfe\xff\xe9\x92\x86\x65\x73\x1c" |
4724 | 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08 }, | 4745 | "\x6d\x6a\x8f\x94\x67\x30\x83\x08", |
4725 | .klen = 16, | 4746 | .klen = 16, |
4726 | .iv = { 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad, | 4747 | .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad" |
4727 | 0xde, 0xca, 0xf8, 0x88 }, | 4748 | "\xde\xca\xf8\x88", |
4728 | .input = { 0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5, | 4749 | .input = "\xd9\x31\x32\x25\xf8\x84\x06\xe5" |
4729 | 0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a, | 4750 | "\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" |
4730 | 0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda, | 4751 | "\x86\xa7\xa9\x53\x15\x34\xf7\xda" |
4731 | 0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72, | 4752 | "\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" |
4732 | 0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53, | 4753 | "\x1c\x3c\x0c\x95\x95\x68\x09\x53" |
4733 | 0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25, | 4754 | "\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" |
4734 | 0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57, | 4755 | "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57" |
4735 | 0xba, 0x63, 0x7b, 0x39 }, | 4756 | "\xba\x63\x7b\x39", |
4736 | .ilen = 60, | 4757 | .ilen = 60, |
4737 | .assoc = { 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef, | 4758 | .assoc = "\xfe\xed\xfa\xce\xde\xad\xbe\xef" |
4738 | 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef, | 4759 | "\xfe\xed\xfa\xce\xde\xad\xbe\xef" |
4739 | 0xab, 0xad, 0xda, 0xd2 }, | 4760 | "\xab\xad\xda\xd2", |
4740 | .alen = 20, | 4761 | .alen = 20, |
4741 | .result = { 0x42, 0x83, 0x1e, 0xc2, 0x21, 0x77, 0x74, 0x24, | 4762 | .result = "\x42\x83\x1e\xc2\x21\x77\x74\x24" |
4742 | 0x4b, 0x72, 0x21, 0xb7, 0x84, 0xd0, 0xd4, 0x9c, | 4763 | "\x4b\x72\x21\xb7\x84\xd0\xd4\x9c" |
4743 | 0xe3, 0xaa, 0x21, 0x2f, 0x2c, 0x02, 0xa4, 0xe0, | 4764 | "\xe3\xaa\x21\x2f\x2c\x02\xa4\xe0" |
4744 | 0x35, 0xc1, 0x7e, 0x23, 0x29, 0xac, 0xa1, 0x2e, | 4765 | "\x35\xc1\x7e\x23\x29\xac\xa1\x2e" |
4745 | 0x21, 0xd5, 0x14, 0xb2, 0x54, 0x66, 0x93, 0x1c, | 4766 | "\x21\xd5\x14\xb2\x54\x66\x93\x1c" |
4746 | 0x7d, 0x8f, 0x6a, 0x5a, 0xac, 0x84, 0xaa, 0x05, | 4767 | "\x7d\x8f\x6a\x5a\xac\x84\xaa\x05" |
4747 | 0x1b, 0xa3, 0x0b, 0x39, 0x6a, 0x0a, 0xac, 0x97, | 4768 | "\x1b\xa3\x0b\x39\x6a\x0a\xac\x97" |
4748 | 0x3d, 0x58, 0xe0, 0x91, | 4769 | "\x3d\x58\xe0\x91" |
4749 | 0x5b, 0xc9, 0x4f, 0xbc, 0x32, 0x21, 0xa5, 0xdb, | 4770 | "\x5b\xc9\x4f\xbc\x32\x21\xa5\xdb" |
4750 | 0x94, 0xfa, 0xe9, 0x5a, 0xe7, 0x12, 0x1a, 0x47 }, | 4771 | "\x94\xfa\xe9\x5a\xe7\x12\x1a\x47", |
4751 | .rlen = 76, | 4772 | .rlen = 76, |
4752 | }, { | 4773 | }, { |
4774 | .key = zeroed_string, | ||
4753 | .klen = 24, | 4775 | .klen = 24, |
4754 | .result = { 0xcd, 0x33, 0xb2, 0x8a, 0xc7, 0x73, 0xf7, 0x4b, | 4776 | .result = "\xcd\x33\xb2\x8a\xc7\x73\xf7\x4b" |
4755 | 0xa0, 0x0e, 0xd1, 0xf3, 0x12, 0x57, 0x24, 0x35 }, | 4777 | "\xa0\x0e\xd1\xf3\x12\x57\x24\x35", |
4756 | .rlen = 16, | 4778 | .rlen = 16, |
4757 | }, { | 4779 | }, { |
4780 | .key = zeroed_string, | ||
4758 | .klen = 24, | 4781 | .klen = 24, |
4782 | .input = zeroed_string, | ||
4759 | .ilen = 16, | 4783 | .ilen = 16, |
4760 | .result = { 0x98, 0xe7, 0x24, 0x7c, 0x07, 0xf0, 0xfe, 0x41, | 4784 | .result = "\x98\xe7\x24\x7c\x07\xf0\xfe\x41" |
4761 | 0x1c, 0x26, 0x7e, 0x43, 0x84, 0xb0, 0xf6, 0x00, | 4785 | "\x1c\x26\x7e\x43\x84\xb0\xf6\x00" |
4762 | 0x2f, 0xf5, 0x8d, 0x80, 0x03, 0x39, 0x27, 0xab, | 4786 | "\x2f\xf5\x8d\x80\x03\x39\x27\xab" |
4763 | 0x8e, 0xf4, 0xd4, 0x58, 0x75, 0x14, 0xf0, 0xfb }, | 4787 | "\x8e\xf4\xd4\x58\x75\x14\xf0\xfb", |
4764 | .rlen = 32, | 4788 | .rlen = 32, |
4765 | }, { | 4789 | }, { |
4766 | .key = { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, | 4790 | .key = "\xfe\xff\xe9\x92\x86\x65\x73\x1c" |
4767 | 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08, | 4791 | "\x6d\x6a\x8f\x94\x67\x30\x83\x08" |
4768 | 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c }, | 4792 | "\xfe\xff\xe9\x92\x86\x65\x73\x1c", |
4769 | .klen = 24, | 4793 | .klen = 24, |
4770 | .iv = { 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad, | 4794 | .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad" |
4771 | 0xde, 0xca, 0xf8, 0x88 }, | 4795 | "\xde\xca\xf8\x88", |
4772 | .input = { 0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5, | 4796 | .input = "\xd9\x31\x32\x25\xf8\x84\x06\xe5" |
4773 | 0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a, | 4797 | "\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" |
4774 | 0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda, | 4798 | "\x86\xa7\xa9\x53\x15\x34\xf7\xda" |
4775 | 0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72, | 4799 | "\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" |
4776 | 0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53, | 4800 | "\x1c\x3c\x0c\x95\x95\x68\x09\x53" |
4777 | 0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25, | 4801 | "\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" |
4778 | 0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57, | 4802 | "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57" |
4779 | 0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55 }, | 4803 | "\xba\x63\x7b\x39\x1a\xaf\xd2\x55", |
4780 | .ilen = 64, | 4804 | .ilen = 64, |
4781 | .result = { 0x39, 0x80, 0xca, 0x0b, 0x3c, 0x00, 0xe8, 0x41, | 4805 | .result = "\x39\x80\xca\x0b\x3c\x00\xe8\x41" |
4782 | 0xeb, 0x06, 0xfa, 0xc4, 0x87, 0x2a, 0x27, 0x57, | 4806 | "\xeb\x06\xfa\xc4\x87\x2a\x27\x57" |
4783 | 0x85, 0x9e, 0x1c, 0xea, 0xa6, 0xef, 0xd9, 0x84, | 4807 | "\x85\x9e\x1c\xea\xa6\xef\xd9\x84" |
4784 | 0x62, 0x85, 0x93, 0xb4, 0x0c, 0xa1, 0xe1, 0x9c, | 4808 | "\x62\x85\x93\xb4\x0c\xa1\xe1\x9c" |
4785 | 0x7d, 0x77, 0x3d, 0x00, 0xc1, 0x44, 0xc5, 0x25, | 4809 | "\x7d\x77\x3d\x00\xc1\x44\xc5\x25" |
4786 | 0xac, 0x61, 0x9d, 0x18, 0xc8, 0x4a, 0x3f, 0x47, | 4810 | "\xac\x61\x9d\x18\xc8\x4a\x3f\x47" |
4787 | 0x18, 0xe2, 0x44, 0x8b, 0x2f, 0xe3, 0x24, 0xd9, | 4811 | "\x18\xe2\x44\x8b\x2f\xe3\x24\xd9" |
4788 | 0xcc, 0xda, 0x27, 0x10, 0xac, 0xad, 0xe2, 0x56, | 4812 | "\xcc\xda\x27\x10\xac\xad\xe2\x56" |
4789 | 0x99, 0x24, 0xa7, 0xc8, 0x58, 0x73, 0x36, 0xbf, | 4813 | "\x99\x24\xa7\xc8\x58\x73\x36\xbf" |
4790 | 0xb1, 0x18, 0x02, 0x4d, 0xb8, 0x67, 0x4a, 0x14 }, | 4814 | "\xb1\x18\x02\x4d\xb8\x67\x4a\x14", |
4791 | .rlen = 80, | 4815 | .rlen = 80, |
4792 | }, { | 4816 | }, { |
4793 | .key = { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, | 4817 | .key = "\xfe\xff\xe9\x92\x86\x65\x73\x1c" |
4794 | 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08, | 4818 | "\x6d\x6a\x8f\x94\x67\x30\x83\x08" |
4795 | 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c }, | 4819 | "\xfe\xff\xe9\x92\x86\x65\x73\x1c", |
4796 | .klen = 24, | 4820 | .klen = 24, |
4797 | .iv = { 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad, | 4821 | .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad" |
4798 | 0xde, 0xca, 0xf8, 0x88 }, | 4822 | "\xde\xca\xf8\x88", |
4799 | .input = { 0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5, | 4823 | .input = "\xd9\x31\x32\x25\xf8\x84\x06\xe5" |
4800 | 0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a, | 4824 | "\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" |
4801 | 0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda, | 4825 | "\x86\xa7\xa9\x53\x15\x34\xf7\xda" |
4802 | 0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72, | 4826 | "\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" |
4803 | 0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53, | 4827 | "\x1c\x3c\x0c\x95\x95\x68\x09\x53" |
4804 | 0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25, | 4828 | "\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" |
4805 | 0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57, | 4829 | "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57" |
4806 | 0xba, 0x63, 0x7b, 0x39 }, | 4830 | "\xba\x63\x7b\x39", |
4807 | .ilen = 60, | 4831 | .ilen = 60, |
4808 | .assoc = { 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef, | 4832 | .assoc = "\xfe\xed\xfa\xce\xde\xad\xbe\xef" |
4809 | 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef, | 4833 | "\xfe\xed\xfa\xce\xde\xad\xbe\xef" |
4810 | 0xab, 0xad, 0xda, 0xd2 }, | 4834 | "\xab\xad\xda\xd2", |
4811 | .alen = 20, | 4835 | .alen = 20, |
4812 | .result = { 0x39, 0x80, 0xca, 0x0b, 0x3c, 0x00, 0xe8, 0x41, | 4836 | .result = "\x39\x80\xca\x0b\x3c\x00\xe8\x41" |
4813 | 0xeb, 0x06, 0xfa, 0xc4, 0x87, 0x2a, 0x27, 0x57, | 4837 | "\xeb\x06\xfa\xc4\x87\x2a\x27\x57" |
4814 | 0x85, 0x9e, 0x1c, 0xea, 0xa6, 0xef, 0xd9, 0x84, | 4838 | "\x85\x9e\x1c\xea\xa6\xef\xd9\x84" |
4815 | 0x62, 0x85, 0x93, 0xb4, 0x0c, 0xa1, 0xe1, 0x9c, | 4839 | "\x62\x85\x93\xb4\x0c\xa1\xe1\x9c" |
4816 | 0x7d, 0x77, 0x3d, 0x00, 0xc1, 0x44, 0xc5, 0x25, | 4840 | "\x7d\x77\x3d\x00\xc1\x44\xc5\x25" |
4817 | 0xac, 0x61, 0x9d, 0x18, 0xc8, 0x4a, 0x3f, 0x47, | 4841 | "\xac\x61\x9d\x18\xc8\x4a\x3f\x47" |
4818 | 0x18, 0xe2, 0x44, 0x8b, 0x2f, 0xe3, 0x24, 0xd9, | 4842 | "\x18\xe2\x44\x8b\x2f\xe3\x24\xd9" |
4819 | 0xcc, 0xda, 0x27, 0x10, | 4843 | "\xcc\xda\x27\x10" |
4820 | 0x25, 0x19, 0x49, 0x8e, 0x80, 0xf1, 0x47, 0x8f, | 4844 | "\x25\x19\x49\x8e\x80\xf1\x47\x8f" |
4821 | 0x37, 0xba, 0x55, 0xbd, 0x6d, 0x27, 0x61, 0x8c }, | 4845 | "\x37\xba\x55\xbd\x6d\x27\x61\x8c", |
4822 | .rlen = 76, | 4846 | .rlen = 76, |
4823 | .np = 2, | 4847 | .np = 2, |
4824 | .tap = { 32, 28 }, | 4848 | .tap = { 32, 28 }, |
4825 | .anp = 2, | 4849 | .anp = 2, |
4826 | .atap = { 8, 12 } | 4850 | .atap = { 8, 12 } |
4827 | }, { | 4851 | }, { |
4852 | .key = zeroed_string, | ||
4828 | .klen = 32, | 4853 | .klen = 32, |
4829 | .result = { 0x53, 0x0f, 0x8a, 0xfb, 0xc7, 0x45, 0x36, 0xb9, | 4854 | .result = "\x53\x0f\x8a\xfb\xc7\x45\x36\xb9" |
4830 | 0xa9, 0x63, 0xb4, 0xf1, 0xc4, 0xcb, 0x73, 0x8b }, | 4855 | "\xa9\x63\xb4\xf1\xc4\xcb\x73\x8b", |
4831 | .rlen = 16, | 4856 | .rlen = 16, |
4832 | } | 4857 | } |
4833 | }; | 4858 | }; |
4834 | 4859 | ||
4835 | static struct aead_testvec aes_gcm_dec_tv_template[] = { | 4860 | static struct aead_testvec aes_gcm_dec_tv_template[] = { |
4836 | { /* From McGrew & Viega - http://citeseer.ist.psu.edu/656989.html */ | 4861 | { /* From McGrew & Viega - http://citeseer.ist.psu.edu/656989.html */ |
4862 | .key = zeroed_string, | ||
4837 | .klen = 32, | 4863 | .klen = 32, |
4838 | .input = { 0xce, 0xa7, 0x40, 0x3d, 0x4d, 0x60, 0x6b, 0x6e, | 4864 | .input = "\xce\xa7\x40\x3d\x4d\x60\x6b\x6e" |
4839 | 0x07, 0x4e, 0xc5, 0xd3, 0xba, 0xf3, 0x9d, 0x18, | 4865 | "\x07\x4e\xc5\xd3\xba\xf3\x9d\x18" |
4840 | 0xd0, 0xd1, 0xc8, 0xa7, 0x99, 0x99, 0x6b, 0xf0, | 4866 | "\xd0\xd1\xc8\xa7\x99\x99\x6b\xf0" |
4841 | 0x26, 0x5b, 0x98, 0xb5, 0xd4, 0x8a, 0xb9, 0x19 }, | 4867 | "\x26\x5b\x98\xb5\xd4\x8a\xb9\x19", |
4842 | .ilen = 32, | 4868 | .ilen = 32, |
4869 | .result = zeroed_string, | ||
4843 | .rlen = 16, | 4870 | .rlen = 16, |
4844 | }, { | 4871 | }, { |
4845 | .key = { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, | 4872 | .key = "\xfe\xff\xe9\x92\x86\x65\x73\x1c" |
4846 | 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08, | 4873 | "\x6d\x6a\x8f\x94\x67\x30\x83\x08" |
4847 | 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, | 4874 | "\xfe\xff\xe9\x92\x86\x65\x73\x1c" |
4848 | 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08 }, | 4875 | "\x6d\x6a\x8f\x94\x67\x30\x83\x08", |
4849 | .klen = 32, | 4876 | .klen = 32, |
4850 | .iv = { 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad, | 4877 | .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad" |
4851 | 0xde, 0xca, 0xf8, 0x88 }, | 4878 | "\xde\xca\xf8\x88", |
4852 | .input = { 0x52, 0x2d, 0xc1, 0xf0, 0x99, 0x56, 0x7d, 0x07, | 4879 | .input = "\x52\x2d\xc1\xf0\x99\x56\x7d\x07" |
4853 | 0xf4, 0x7f, 0x37, 0xa3, 0x2a, 0x84, 0x42, 0x7d, | 4880 | "\xf4\x7f\x37\xa3\x2a\x84\x42\x7d" |
4854 | 0x64, 0x3a, 0x8c, 0xdc, 0xbf, 0xe5, 0xc0, 0xc9, | 4881 | "\x64\x3a\x8c\xdc\xbf\xe5\xc0\xc9" |
4855 | 0x75, 0x98, 0xa2, 0xbd, 0x25, 0x55, 0xd1, 0xaa, | 4882 | "\x75\x98\xa2\xbd\x25\x55\xd1\xaa" |
4856 | 0x8c, 0xb0, 0x8e, 0x48, 0x59, 0x0d, 0xbb, 0x3d, | 4883 | "\x8c\xb0\x8e\x48\x59\x0d\xbb\x3d" |
4857 | 0xa7, 0xb0, 0x8b, 0x10, 0x56, 0x82, 0x88, 0x38, | 4884 | "\xa7\xb0\x8b\x10\x56\x82\x88\x38" |
4858 | 0xc5, 0xf6, 0x1e, 0x63, 0x93, 0xba, 0x7a, 0x0a, | 4885 | "\xc5\xf6\x1e\x63\x93\xba\x7a\x0a" |
4859 | 0xbc, 0xc9, 0xf6, 0x62, 0x89, 0x80, 0x15, 0xad, | 4886 | "\xbc\xc9\xf6\x62\x89\x80\x15\xad" |
4860 | 0xb0, 0x94, 0xda, 0xc5, 0xd9, 0x34, 0x71, 0xbd, | 4887 | "\xb0\x94\xda\xc5\xd9\x34\x71\xbd" |
4861 | 0xec, 0x1a, 0x50, 0x22, 0x70, 0xe3, 0xcc, 0x6c }, | 4888 | "\xec\x1a\x50\x22\x70\xe3\xcc\x6c", |
4862 | .ilen = 80, | 4889 | .ilen = 80, |
4863 | .result = { 0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5, | 4890 | .result = "\xd9\x31\x32\x25\xf8\x84\x06\xe5" |
4864 | 0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a, | 4891 | "\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" |
4865 | 0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda, | 4892 | "\x86\xa7\xa9\x53\x15\x34\xf7\xda" |
4866 | 0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72, | 4893 | "\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" |
4867 | 0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53, | 4894 | "\x1c\x3c\x0c\x95\x95\x68\x09\x53" |
4868 | 0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25, | 4895 | "\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" |
4869 | 0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57, | 4896 | "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57" |
4870 | 0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55 }, | 4897 | "\xba\x63\x7b\x39\x1a\xaf\xd2\x55", |
4871 | .rlen = 64, | 4898 | .rlen = 64, |
4872 | }, { | 4899 | }, { |
4873 | .key = { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, | 4900 | .key = "\xfe\xff\xe9\x92\x86\x65\x73\x1c" |
4874 | 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08, | 4901 | "\x6d\x6a\x8f\x94\x67\x30\x83\x08" |
4875 | 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, | 4902 | "\xfe\xff\xe9\x92\x86\x65\x73\x1c" |
4876 | 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08 }, | 4903 | "\x6d\x6a\x8f\x94\x67\x30\x83\x08", |
4877 | .klen = 32, | 4904 | .klen = 32, |
4878 | .iv = { 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad, | 4905 | .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad" |
4879 | 0xde, 0xca, 0xf8, 0x88 }, | 4906 | "\xde\xca\xf8\x88", |
4880 | .input = { 0x52, 0x2d, 0xc1, 0xf0, 0x99, 0x56, 0x7d, 0x07, | 4907 | .input = "\x52\x2d\xc1\xf0\x99\x56\x7d\x07" |
4881 | 0xf4, 0x7f, 0x37, 0xa3, 0x2a, 0x84, 0x42, 0x7d, | 4908 | "\xf4\x7f\x37\xa3\x2a\x84\x42\x7d" |
4882 | 0x64, 0x3a, 0x8c, 0xdc, 0xbf, 0xe5, 0xc0, 0xc9, | 4909 | "\x64\x3a\x8c\xdc\xbf\xe5\xc0\xc9" |
4883 | 0x75, 0x98, 0xa2, 0xbd, 0x25, 0x55, 0xd1, 0xaa, | 4910 | "\x75\x98\xa2\xbd\x25\x55\xd1\xaa" |
4884 | 0x8c, 0xb0, 0x8e, 0x48, 0x59, 0x0d, 0xbb, 0x3d, | 4911 | "\x8c\xb0\x8e\x48\x59\x0d\xbb\x3d" |
4885 | 0xa7, 0xb0, 0x8b, 0x10, 0x56, 0x82, 0x88, 0x38, | 4912 | "\xa7\xb0\x8b\x10\x56\x82\x88\x38" |
4886 | 0xc5, 0xf6, 0x1e, 0x63, 0x93, 0xba, 0x7a, 0x0a, | 4913 | "\xc5\xf6\x1e\x63\x93\xba\x7a\x0a" |
4887 | 0xbc, 0xc9, 0xf6, 0x62, | 4914 | "\xbc\xc9\xf6\x62" |
4888 | 0x76, 0xfc, 0x6e, 0xce, 0x0f, 0x4e, 0x17, 0x68, | 4915 | "\x76\xfc\x6e\xce\x0f\x4e\x17\x68" |
4889 | 0xcd, 0xdf, 0x88, 0x53, 0xbb, 0x2d, 0x55, 0x1b }, | 4916 | "\xcd\xdf\x88\x53\xbb\x2d\x55\x1b", |
4890 | .ilen = 76, | 4917 | .ilen = 76, |
4891 | .assoc = { 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef, | 4918 | .assoc = "\xfe\xed\xfa\xce\xde\xad\xbe\xef" |
4892 | 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef, | 4919 | "\xfe\xed\xfa\xce\xde\xad\xbe\xef" |
4893 | 0xab, 0xad, 0xda, 0xd2 }, | 4920 | "\xab\xad\xda\xd2", |
4894 | .alen = 20, | 4921 | .alen = 20, |
4895 | .result = { 0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5, | 4922 | .result = "\xd9\x31\x32\x25\xf8\x84\x06\xe5" |
4896 | 0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a, | 4923 | "\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" |
4897 | 0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda, | 4924 | "\x86\xa7\xa9\x53\x15\x34\xf7\xda" |
4898 | 0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72, | 4925 | "\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" |
4899 | 0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53, | 4926 | "\x1c\x3c\x0c\x95\x95\x68\x09\x53" |
4900 | 0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25, | 4927 | "\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" |
4901 | 0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57, | 4928 | "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57" |
4902 | 0xba, 0x63, 0x7b, 0x39 }, | 4929 | "\xba\x63\x7b\x39", |
4903 | .rlen = 60, | 4930 | .rlen = 60, |
4904 | .np = 2, | 4931 | .np = 2, |
4905 | .tap = { 48, 28 }, | 4932 | .tap = { 48, 28 }, |
4906 | .anp = 3, | 4933 | .anp = 3, |
4907 | .atap = { 8, 8, 4 } | 4934 | .atap = { 8, 8, 4 } |
4908 | }, { | 4935 | }, { |
4909 | .key = { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, | 4936 | .key = "\xfe\xff\xe9\x92\x86\x65\x73\x1c" |
4910 | 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08 }, | 4937 | "\x6d\x6a\x8f\x94\x67\x30\x83\x08", |
4911 | .klen = 16, | 4938 | .klen = 16, |
4912 | .iv = { 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad, | 4939 | .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad" |
4913 | 0xde, 0xca, 0xf8, 0x88 }, | 4940 | "\xde\xca\xf8\x88", |
4914 | .input = { 0x42, 0x83, 0x1e, 0xc2, 0x21, 0x77, 0x74, 0x24, | 4941 | .input = "\x42\x83\x1e\xc2\x21\x77\x74\x24" |
4915 | 0x4b, 0x72, 0x21, 0xb7, 0x84, 0xd0, 0xd4, 0x9c, | 4942 | "\x4b\x72\x21\xb7\x84\xd0\xd4\x9c" |
4916 | 0xe3, 0xaa, 0x21, 0x2f, 0x2c, 0x02, 0xa4, 0xe0, | 4943 | "\xe3\xaa\x21\x2f\x2c\x02\xa4\xe0" |
4917 | 0x35, 0xc1, 0x7e, 0x23, 0x29, 0xac, 0xa1, 0x2e, | 4944 | "\x35\xc1\x7e\x23\x29\xac\xa1\x2e" |
4918 | 0x21, 0xd5, 0x14, 0xb2, 0x54, 0x66, 0x93, 0x1c, | 4945 | "\x21\xd5\x14\xb2\x54\x66\x93\x1c" |
4919 | 0x7d, 0x8f, 0x6a, 0x5a, 0xac, 0x84, 0xaa, 0x05, | 4946 | "\x7d\x8f\x6a\x5a\xac\x84\xaa\x05" |
4920 | 0x1b, 0xa3, 0x0b, 0x39, 0x6a, 0x0a, 0xac, 0x97, | 4947 | "\x1b\xa3\x0b\x39\x6a\x0a\xac\x97" |
4921 | 0x3d, 0x58, 0xe0, 0x91, 0x47, 0x3f, 0x59, 0x85, | 4948 | "\x3d\x58\xe0\x91\x47\x3f\x59\x85" |
4922 | 0x4d, 0x5c, 0x2a, 0xf3, 0x27, 0xcd, 0x64, 0xa6, | 4949 | "\x4d\x5c\x2a\xf3\x27\xcd\x64\xa6" |
4923 | 0x2c, 0xf3, 0x5a, 0xbd, 0x2b, 0xa6, 0xfa, 0xb4 }, | 4950 | "\x2c\xf3\x5a\xbd\x2b\xa6\xfa\xb4", |
4924 | .ilen = 80, | 4951 | .ilen = 80, |
4925 | .result = { 0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5, | 4952 | .result = "\xd9\x31\x32\x25\xf8\x84\x06\xe5" |
4926 | 0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a, | 4953 | "\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" |
4927 | 0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda, | 4954 | "\x86\xa7\xa9\x53\x15\x34\xf7\xda" |
4928 | 0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72, | 4955 | "\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" |
4929 | 0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53, | 4956 | "\x1c\x3c\x0c\x95\x95\x68\x09\x53" |
4930 | 0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25, | 4957 | "\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" |
4931 | 0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57, | 4958 | "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57" |
4932 | 0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55 }, | 4959 | "\xba\x63\x7b\x39\x1a\xaf\xd2\x55", |
4933 | .rlen = 64, | 4960 | .rlen = 64, |
4934 | }, { | 4961 | }, { |
4935 | .key = { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, | 4962 | .key = "\xfe\xff\xe9\x92\x86\x65\x73\x1c" |
4936 | 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08 }, | 4963 | "\x6d\x6a\x8f\x94\x67\x30\x83\x08", |
4937 | .klen = 16, | 4964 | .klen = 16, |
4938 | .iv = { 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad, | 4965 | .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad" |
4939 | 0xde, 0xca, 0xf8, 0x88 }, | 4966 | "\xde\xca\xf8\x88", |
4940 | .input = { 0x42, 0x83, 0x1e, 0xc2, 0x21, 0x77, 0x74, 0x24, | 4967 | .input = "\x42\x83\x1e\xc2\x21\x77\x74\x24" |
4941 | 0x4b, 0x72, 0x21, 0xb7, 0x84, 0xd0, 0xd4, 0x9c, | 4968 | "\x4b\x72\x21\xb7\x84\xd0\xd4\x9c" |
4942 | 0xe3, 0xaa, 0x21, 0x2f, 0x2c, 0x02, 0xa4, 0xe0, | 4969 | "\xe3\xaa\x21\x2f\x2c\x02\xa4\xe0" |
4943 | 0x35, 0xc1, 0x7e, 0x23, 0x29, 0xac, 0xa1, 0x2e, | 4970 | "\x35\xc1\x7e\x23\x29\xac\xa1\x2e" |
4944 | 0x21, 0xd5, 0x14, 0xb2, 0x54, 0x66, 0x93, 0x1c, | 4971 | "\x21\xd5\x14\xb2\x54\x66\x93\x1c" |
4945 | 0x7d, 0x8f, 0x6a, 0x5a, 0xac, 0x84, 0xaa, 0x05, | 4972 | "\x7d\x8f\x6a\x5a\xac\x84\xaa\x05" |
4946 | 0x1b, 0xa3, 0x0b, 0x39, 0x6a, 0x0a, 0xac, 0x97, | 4973 | "\x1b\xa3\x0b\x39\x6a\x0a\xac\x97" |
4947 | 0x3d, 0x58, 0xe0, 0x91, | 4974 | "\x3d\x58\xe0\x91" |
4948 | 0x5b, 0xc9, 0x4f, 0xbc, 0x32, 0x21, 0xa5, 0xdb, | 4975 | "\x5b\xc9\x4f\xbc\x32\x21\xa5\xdb" |
4949 | 0x94, 0xfa, 0xe9, 0x5a, 0xe7, 0x12, 0x1a, 0x47 }, | 4976 | "\x94\xfa\xe9\x5a\xe7\x12\x1a\x47", |
4950 | .ilen = 76, | 4977 | .ilen = 76, |
4951 | .assoc = { 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef, | 4978 | .assoc = "\xfe\xed\xfa\xce\xde\xad\xbe\xef" |
4952 | 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef, | 4979 | "\xfe\xed\xfa\xce\xde\xad\xbe\xef" |
4953 | 0xab, 0xad, 0xda, 0xd2 }, | 4980 | "\xab\xad\xda\xd2", |
4954 | .alen = 20, | 4981 | .alen = 20, |
4955 | .result = { 0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5, | 4982 | .result = "\xd9\x31\x32\x25\xf8\x84\x06\xe5" |
4956 | 0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a, | 4983 | "\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" |
4957 | 0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda, | 4984 | "\x86\xa7\xa9\x53\x15\x34\xf7\xda" |
4958 | 0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72, | 4985 | "\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" |
4959 | 0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53, | 4986 | "\x1c\x3c\x0c\x95\x95\x68\x09\x53" |
4960 | 0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25, | 4987 | "\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" |
4961 | 0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57, | 4988 | "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57" |
4962 | 0xba, 0x63, 0x7b, 0x39 }, | 4989 | "\xba\x63\x7b\x39", |
4963 | .rlen = 60, | 4990 | .rlen = 60, |
4964 | }, { | 4991 | }, { |
4992 | .key = zeroed_string, | ||
4965 | .klen = 24, | 4993 | .klen = 24, |
4966 | .input = { 0x98, 0xe7, 0x24, 0x7c, 0x07, 0xf0, 0xfe, 0x41, | 4994 | .input = "\x98\xe7\x24\x7c\x07\xf0\xfe\x41" |
4967 | 0x1c, 0x26, 0x7e, 0x43, 0x84, 0xb0, 0xf6, 0x00, | 4995 | "\x1c\x26\x7e\x43\x84\xb0\xf6\x00" |
4968 | 0x2f, 0xf5, 0x8d, 0x80, 0x03, 0x39, 0x27, 0xab, | 4996 | "\x2f\xf5\x8d\x80\x03\x39\x27\xab" |
4969 | 0x8e, 0xf4, 0xd4, 0x58, 0x75, 0x14, 0xf0, 0xfb }, | 4997 | "\x8e\xf4\xd4\x58\x75\x14\xf0\xfb", |
4970 | .ilen = 32, | 4998 | .ilen = 32, |
4999 | .result = zeroed_string, | ||
4971 | .rlen = 16, | 5000 | .rlen = 16, |
4972 | }, { | 5001 | }, { |
4973 | .key = { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, | 5002 | .key = "\xfe\xff\xe9\x92\x86\x65\x73\x1c" |
4974 | 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08, | 5003 | "\x6d\x6a\x8f\x94\x67\x30\x83\x08" |
4975 | 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c }, | 5004 | "\xfe\xff\xe9\x92\x86\x65\x73\x1c", |
4976 | .klen = 24, | 5005 | .klen = 24, |
4977 | .iv = { 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad, | 5006 | .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad" |
4978 | 0xde, 0xca, 0xf8, 0x88 }, | 5007 | "\xde\xca\xf8\x88", |
4979 | .input = { 0x39, 0x80, 0xca, 0x0b, 0x3c, 0x00, 0xe8, 0x41, | 5008 | .input = "\x39\x80\xca\x0b\x3c\x00\xe8\x41" |
4980 | 0xeb, 0x06, 0xfa, 0xc4, 0x87, 0x2a, 0x27, 0x57, | 5009 | "\xeb\x06\xfa\xc4\x87\x2a\x27\x57" |
4981 | 0x85, 0x9e, 0x1c, 0xea, 0xa6, 0xef, 0xd9, 0x84, | 5010 | "\x85\x9e\x1c\xea\xa6\xef\xd9\x84" |
4982 | 0x62, 0x85, 0x93, 0xb4, 0x0c, 0xa1, 0xe1, 0x9c, | 5011 | "\x62\x85\x93\xb4\x0c\xa1\xe1\x9c" |
4983 | 0x7d, 0x77, 0x3d, 0x00, 0xc1, 0x44, 0xc5, 0x25, | 5012 | "\x7d\x77\x3d\x00\xc1\x44\xc5\x25" |
4984 | 0xac, 0x61, 0x9d, 0x18, 0xc8, 0x4a, 0x3f, 0x47, | 5013 | "\xac\x61\x9d\x18\xc8\x4a\x3f\x47" |
4985 | 0x18, 0xe2, 0x44, 0x8b, 0x2f, 0xe3, 0x24, 0xd9, | 5014 | "\x18\xe2\x44\x8b\x2f\xe3\x24\xd9" |
4986 | 0xcc, 0xda, 0x27, 0x10, 0xac, 0xad, 0xe2, 0x56, | 5015 | "\xcc\xda\x27\x10\xac\xad\xe2\x56" |
4987 | 0x99, 0x24, 0xa7, 0xc8, 0x58, 0x73, 0x36, 0xbf, | 5016 | "\x99\x24\xa7\xc8\x58\x73\x36\xbf" |
4988 | 0xb1, 0x18, 0x02, 0x4d, 0xb8, 0x67, 0x4a, 0x14 }, | 5017 | "\xb1\x18\x02\x4d\xb8\x67\x4a\x14", |
4989 | .ilen = 80, | 5018 | .ilen = 80, |
4990 | .result = { 0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5, | 5019 | .result = "\xd9\x31\x32\x25\xf8\x84\x06\xe5" |
4991 | 0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a, | 5020 | "\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" |
4992 | 0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda, | 5021 | "\x86\xa7\xa9\x53\x15\x34\xf7\xda" |
4993 | 0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72, | 5022 | "\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" |
4994 | 0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53, | 5023 | "\x1c\x3c\x0c\x95\x95\x68\x09\x53" |
4995 | 0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25, | 5024 | "\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" |
4996 | 0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57, | 5025 | "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57" |
4997 | 0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55 }, | 5026 | "\xba\x63\x7b\x39\x1a\xaf\xd2\x55", |
4998 | .rlen = 64, | 5027 | .rlen = 64, |
4999 | }, { | 5028 | }, { |
5000 | .key = { 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c, | 5029 | .key = "\xfe\xff\xe9\x92\x86\x65\x73\x1c" |
5001 | 0x6d, 0x6a, 0x8f, 0x94, 0x67, 0x30, 0x83, 0x08, | 5030 | "\x6d\x6a\x8f\x94\x67\x30\x83\x08" |
5002 | 0xfe, 0xff, 0xe9, 0x92, 0x86, 0x65, 0x73, 0x1c }, | 5031 | "\xfe\xff\xe9\x92\x86\x65\x73\x1c", |
5003 | .klen = 24, | 5032 | .klen = 24, |
5004 | .iv = { 0xca, 0xfe, 0xba, 0xbe, 0xfa, 0xce, 0xdb, 0xad, | 5033 | .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad" |
5005 | 0xde, 0xca, 0xf8, 0x88 }, | 5034 | "\xde\xca\xf8\x88", |
5006 | .input = { 0x39, 0x80, 0xca, 0x0b, 0x3c, 0x00, 0xe8, 0x41, | 5035 | .input = "\x39\x80\xca\x0b\x3c\x00\xe8\x41" |
5007 | 0xeb, 0x06, 0xfa, 0xc4, 0x87, 0x2a, 0x27, 0x57, | 5036 | "\xeb\x06\xfa\xc4\x87\x2a\x27\x57" |
5008 | 0x85, 0x9e, 0x1c, 0xea, 0xa6, 0xef, 0xd9, 0x84, | 5037 | "\x85\x9e\x1c\xea\xa6\xef\xd9\x84" |
5009 | 0x62, 0x85, 0x93, 0xb4, 0x0c, 0xa1, 0xe1, 0x9c, | 5038 | "\x62\x85\x93\xb4\x0c\xa1\xe1\x9c" |
5010 | 0x7d, 0x77, 0x3d, 0x00, 0xc1, 0x44, 0xc5, 0x25, | 5039 | "\x7d\x77\x3d\x00\xc1\x44\xc5\x25" |
5011 | 0xac, 0x61, 0x9d, 0x18, 0xc8, 0x4a, 0x3f, 0x47, | 5040 | "\xac\x61\x9d\x18\xc8\x4a\x3f\x47" |
5012 | 0x18, 0xe2, 0x44, 0x8b, 0x2f, 0xe3, 0x24, 0xd9, | 5041 | "\x18\xe2\x44\x8b\x2f\xe3\x24\xd9" |
5013 | 0xcc, 0xda, 0x27, 0x10, | 5042 | "\xcc\xda\x27\x10" |
5014 | 0x25, 0x19, 0x49, 0x8e, 0x80, 0xf1, 0x47, 0x8f, | 5043 | "\x25\x19\x49\x8e\x80\xf1\x47\x8f" |
5015 | 0x37, 0xba, 0x55, 0xbd, 0x6d, 0x27, 0x61, 0x8c }, | 5044 | "\x37\xba\x55\xbd\x6d\x27\x61\x8c", |
5016 | .ilen = 76, | 5045 | .ilen = 76, |
5017 | .assoc = { 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef, | 5046 | .assoc = "\xfe\xed\xfa\xce\xde\xad\xbe\xef" |
5018 | 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef, | 5047 | "\xfe\xed\xfa\xce\xde\xad\xbe\xef" |
5019 | 0xab, 0xad, 0xda, 0xd2 }, | 5048 | "\xab\xad\xda\xd2", |
5020 | .alen = 20, | 5049 | .alen = 20, |
5021 | .result = { 0xd9, 0x31, 0x32, 0x25, 0xf8, 0x84, 0x06, 0xe5, | 5050 | .result = "\xd9\x31\x32\x25\xf8\x84\x06\xe5" |
5022 | 0xa5, 0x59, 0x09, 0xc5, 0xaf, 0xf5, 0x26, 0x9a, | 5051 | "\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" |
5023 | 0x86, 0xa7, 0xa9, 0x53, 0x15, 0x34, 0xf7, 0xda, | 5052 | "\x86\xa7\xa9\x53\x15\x34\xf7\xda" |
5024 | 0x2e, 0x4c, 0x30, 0x3d, 0x8a, 0x31, 0x8a, 0x72, | 5053 | "\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" |
5025 | 0x1c, 0x3c, 0x0c, 0x95, 0x95, 0x68, 0x09, 0x53, | 5054 | "\x1c\x3c\x0c\x95\x95\x68\x09\x53" |
5026 | 0x2f, 0xcf, 0x0e, 0x24, 0x49, 0xa6, 0xb5, 0x25, | 5055 | "\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" |
5027 | 0xb1, 0x6a, 0xed, 0xf5, 0xaa, 0x0d, 0xe6, 0x57, | 5056 | "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57" |
5028 | 0xba, 0x63, 0x7b, 0x39 }, | 5057 | "\xba\x63\x7b\x39", |
5029 | .rlen = 60, | 5058 | .rlen = 60, |
5030 | } | 5059 | } |
5031 | }; | 5060 | }; |
5032 | 5061 | ||
5033 | static struct aead_testvec aes_ccm_enc_tv_template[] = { | 5062 | static struct aead_testvec aes_ccm_enc_tv_template[] = { |
5034 | { /* From RFC 3610 */ | 5063 | { /* From RFC 3610 */ |
5035 | .key = { 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, | 5064 | .key = "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" |
5036 | 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf }, | 5065 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf", |
5037 | .klen = 16, | 5066 | .klen = 16, |
5038 | .iv = { 0x01, 0x00, 0x00, 0x00, 0x03, 0x02, 0x01, 0x00, | 5067 | .iv = "\x01\x00\x00\x00\x03\x02\x01\x00" |
5039 | 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0x00, 0x00 }, | 5068 | "\xa0\xa1\xa2\xa3\xa4\xa5\x00\x00", |
5040 | .assoc = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 }, | 5069 | .assoc = "\x00\x01\x02\x03\x04\x05\x06\x07", |
5041 | .alen = 8, | 5070 | .alen = 8, |
5042 | .input = { 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 5071 | .input = "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
5043 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 5072 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
5044 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e }, | 5073 | "\x18\x19\x1a\x1b\x1c\x1d\x1e", |
5045 | .ilen = 23, | 5074 | .ilen = 23, |
5046 | .result = { 0x58, 0x8c, 0x97, 0x9a, 0x61, 0xc6, 0x63, 0xd2, | 5075 | .result = "\x58\x8c\x97\x9a\x61\xc6\x63\xd2" |
5047 | 0xf0, 0x66, 0xd0, 0xc2, 0xc0, 0xf9, 0x89, 0x80, | 5076 | "\xf0\x66\xd0\xc2\xc0\xf9\x89\x80" |
5048 | 0x6d, 0x5f, 0x6b, 0x61, 0xda, 0xc3, 0x84, 0x17, | 5077 | "\x6d\x5f\x6b\x61\xda\xc3\x84\x17" |
5049 | 0xe8, 0xd1, 0x2c, 0xfd, 0xf9, 0x26, 0xe0 }, | 5078 | "\xe8\xd1\x2c\xfd\xf9\x26\xe0", |
5050 | .rlen = 31, | 5079 | .rlen = 31, |
5051 | }, { | 5080 | }, { |
5052 | .key = { 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, | 5081 | .key = "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" |
5053 | 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf }, | 5082 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf", |
5054 | .klen = 16, | 5083 | .klen = 16, |
5055 | .iv = { 0x01, 0x00, 0x00, 0x00, 0x07, 0x06, 0x05, 0x04, | 5084 | .iv = "\x01\x00\x00\x00\x07\x06\x05\x04" |
5056 | 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0x00, 0x00 }, | 5085 | "\xa0\xa1\xa2\xa3\xa4\xa5\x00\x00", |
5057 | .assoc = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 5086 | .assoc = "\x00\x01\x02\x03\x04\x05\x06\x07" |
5058 | 0x08, 0x09, 0x0a, 0x0b }, | 5087 | "\x08\x09\x0a\x0b", |
5059 | .alen = 12, | 5088 | .alen = 12, |
5060 | .input = { 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, | 5089 | .input = "\x0c\x0d\x0e\x0f\x10\x11\x12\x13" |
5061 | 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, | 5090 | "\x14\x15\x16\x17\x18\x19\x1a\x1b" |
5062 | 0x1c, 0x1d, 0x1e, 0x1f }, | 5091 | "\x1c\x1d\x1e\x1f", |
5063 | .ilen = 20, | 5092 | .ilen = 20, |
5064 | .result = { 0xdc, 0xf1, 0xfb, 0x7b, 0x5d, 0x9e, 0x23, 0xfb, | 5093 | .result = "\xdc\xf1\xfb\x7b\x5d\x9e\x23\xfb" |
5065 | 0x9d, 0x4e, 0x13, 0x12, 0x53, 0x65, 0x8a, 0xd8, | 5094 | "\x9d\x4e\x13\x12\x53\x65\x8a\xd8" |
5066 | 0x6e, 0xbd, 0xca, 0x3e, 0x51, 0xe8, 0x3f, 0x07, | 5095 | "\x6e\xbd\xca\x3e\x51\xe8\x3f\x07" |
5067 | 0x7d, 0x9c, 0x2d, 0x93 }, | 5096 | "\x7d\x9c\x2d\x93", |
5068 | .rlen = 28, | 5097 | .rlen = 28, |
5069 | }, { | 5098 | }, { |
5070 | .key = { 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, | 5099 | .key = "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" |
5071 | 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf }, | 5100 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf", |
5072 | .klen = 16, | 5101 | .klen = 16, |
5073 | .iv = { 0x01, 0x00, 0x00, 0x00, 0x0b, 0x0a, 0x09, 0x08, | 5102 | .iv = "\x01\x00\x00\x00\x0b\x0a\x09\x08" |
5074 | 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0x00, 0x00 }, | 5103 | "\xa0\xa1\xa2\xa3\xa4\xa5\x00\x00", |
5075 | .assoc = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 }, | 5104 | .assoc = "\x00\x01\x02\x03\x04\x05\x06\x07", |
5076 | .alen = 8, | 5105 | .alen = 8, |
5077 | .input = { 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 5106 | .input = "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
5078 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 5107 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
5079 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, | 5108 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f" |
5080 | 0x20 }, | 5109 | "\x20", |
5081 | .ilen = 25, | 5110 | .ilen = 25, |
5082 | .result = { 0x82, 0x53, 0x1a, 0x60, 0xcc, 0x24, 0x94, 0x5a, | 5111 | .result = "\x82\x53\x1a\x60\xcc\x24\x94\x5a" |
5083 | 0x4b, 0x82, 0x79, 0x18, 0x1a, 0xb5, 0xc8, 0x4d, | 5112 | "\x4b\x82\x79\x18\x1a\xb5\xc8\x4d" |
5084 | 0xf2, 0x1c, 0xe7, 0xf9, 0xb7, 0x3f, 0x42, 0xe1, | 5113 | "\xf2\x1c\xe7\xf9\xb7\x3f\x42\xe1" |
5085 | 0x97, 0xea, 0x9c, 0x07, 0xe5, 0x6b, 0x5e, 0xb1, | 5114 | "\x97\xea\x9c\x07\xe5\x6b\x5e\xb1" |
5086 | 0x7e, 0x5f, 0x4e }, | 5115 | "\x7e\x5f\x4e", |
5087 | .rlen = 35, | 5116 | .rlen = 35, |
5088 | }, { | 5117 | }, { |
5089 | .key = { 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, | 5118 | .key = "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" |
5090 | 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf }, | 5119 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf", |
5091 | .klen = 16, | 5120 | .klen = 16, |
5092 | .iv = { 0x01, 0x00, 0x00, 0x00, 0x0c, 0x0b, 0x0a, 0x09, | 5121 | .iv = "\x01\x00\x00\x00\x0c\x0b\x0a\x09" |
5093 | 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0x00, 0x00 }, | 5122 | "\xa0\xa1\xa2\xa3\xa4\xa5\x00\x00", |
5094 | .assoc = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 5123 | .assoc = "\x00\x01\x02\x03\x04\x05\x06\x07" |
5095 | 0x08, 0x09, 0x0a, 0x0b }, | 5124 | "\x08\x09\x0a\x0b", |
5096 | .alen = 12, | 5125 | .alen = 12, |
5097 | .input = { 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, | 5126 | .input = "\x0c\x0d\x0e\x0f\x10\x11\x12\x13" |
5098 | 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, | 5127 | "\x14\x15\x16\x17\x18\x19\x1a\x1b" |
5099 | 0x1c, 0x1d, 0x1e }, | 5128 | "\x1c\x1d\x1e", |
5100 | .ilen = 19, | 5129 | .ilen = 19, |
5101 | .result = { 0x07, 0x34, 0x25, 0x94, 0x15, 0x77, 0x85, 0x15, | 5130 | .result = "\x07\x34\x25\x94\x15\x77\x85\x15" |
5102 | 0x2b, 0x07, 0x40, 0x98, 0x33, 0x0a, 0xbb, 0x14, | 5131 | "\x2b\x07\x40\x98\x33\x0a\xbb\x14" |
5103 | 0x1b, 0x94, 0x7b, 0x56, 0x6a, 0xa9, 0x40, 0x6b, | 5132 | "\x1b\x94\x7b\x56\x6a\xa9\x40\x6b" |
5104 | 0x4d, 0x99, 0x99, 0x88, 0xdd }, | 5133 | "\x4d\x99\x99\x88\xdd", |
5105 | .rlen = 29, | 5134 | .rlen = 29, |
5106 | }, { | 5135 | }, { |
5107 | .key = { 0xd7, 0x82, 0x8d, 0x13, 0xb2, 0xb0, 0xbd, 0xc3, | 5136 | .key = "\xd7\x82\x8d\x13\xb2\xb0\xbd\xc3" |
5108 | 0x25, 0xa7, 0x62, 0x36, 0xdf, 0x93, 0xcc, 0x6b }, | 5137 | "\x25\xa7\x62\x36\xdf\x93\xcc\x6b", |
5109 | .klen = 16, | 5138 | .klen = 16, |
5110 | .iv = { 0x01, 0x00, 0x33, 0x56, 0x8e, 0xf7, 0xb2, 0x63, | 5139 | .iv = "\x01\x00\x33\x56\x8e\xf7\xb2\x63" |
5111 | 0x3c, 0x96, 0x96, 0x76, 0x6c, 0xfa, 0x00, 0x00 }, | 5140 | "\x3c\x96\x96\x76\x6c\xfa\x00\x00", |
5112 | .assoc = { 0x63, 0x01, 0x8f, 0x76, 0xdc, 0x8a, 0x1b, 0xcb }, | 5141 | .assoc = "\x63\x01\x8f\x76\xdc\x8a\x1b\xcb", |
5113 | .alen = 8, | 5142 | .alen = 8, |
5114 | .input = { 0x90, 0x20, 0xea, 0x6f, 0x91, 0xbd, 0xd8, 0x5a, | 5143 | .input = "\x90\x20\xea\x6f\x91\xbd\xd8\x5a" |
5115 | 0xfa, 0x00, 0x39, 0xba, 0x4b, 0xaf, 0xf9, 0xbf, | 5144 | "\xfa\x00\x39\xba\x4b\xaf\xf9\xbf" |
5116 | 0xb7, 0x9c, 0x70, 0x28, 0x94, 0x9c, 0xd0, 0xec }, | 5145 | "\xb7\x9c\x70\x28\x94\x9c\xd0\xec", |
5117 | .ilen = 24, | 5146 | .ilen = 24, |
5118 | .result = { 0x4c, 0xcb, 0x1e, 0x7c, 0xa9, 0x81, 0xbe, 0xfa, | 5147 | .result = "\x4c\xcb\x1e\x7c\xa9\x81\xbe\xfa" |
5119 | 0xa0, 0x72, 0x6c, 0x55, 0xd3, 0x78, 0x06, 0x12, | 5148 | "\xa0\x72\x6c\x55\xd3\x78\x06\x12" |
5120 | 0x98, 0xc8, 0x5c, 0x92, 0x81, 0x4a, 0xbc, 0x33, | 5149 | "\x98\xc8\x5c\x92\x81\x4a\xbc\x33" |
5121 | 0xc5, 0x2e, 0xe8, 0x1d, 0x7d, 0x77, 0xc0, 0x8a }, | 5150 | "\xc5\x2e\xe8\x1d\x7d\x77\xc0\x8a", |
5122 | .rlen = 32, | 5151 | .rlen = 32, |
5123 | }, { | 5152 | }, { |
5124 | .key = { 0xd7, 0x82, 0x8d, 0x13, 0xb2, 0xb0, 0xbd, 0xc3, | 5153 | .key = "\xd7\x82\x8d\x13\xb2\xb0\xbd\xc3" |
5125 | 0x25, 0xa7, 0x62, 0x36, 0xdf, 0x93, 0xcc, 0x6b }, | 5154 | "\x25\xa7\x62\x36\xdf\x93\xcc\x6b", |
5126 | .klen = 16, | 5155 | .klen = 16, |
5127 | .iv = { 0x01, 0x00, 0xd5, 0x60, 0x91, 0x2d, 0x3f, 0x70, | 5156 | .iv = "\x01\x00\xd5\x60\x91\x2d\x3f\x70" |
5128 | 0x3c, 0x96, 0x96, 0x76, 0x6c, 0xfa, 0x00, 0x00 }, | 5157 | "\x3c\x96\x96\x76\x6c\xfa\x00\x00", |
5129 | .assoc = { 0xcd, 0x90, 0x44, 0xd2, 0xb7, 0x1f, 0xdb, 0x81, | 5158 | .assoc = "\xcd\x90\x44\xd2\xb7\x1f\xdb\x81" |
5130 | 0x20, 0xea, 0x60, 0xc0 }, | 5159 | "\x20\xea\x60\xc0", |
5131 | .alen = 12, | 5160 | .alen = 12, |
5132 | .input = { 0x64, 0x35, 0xac, 0xba, 0xfb, 0x11, 0xa8, 0x2e, | 5161 | .input = "\x64\x35\xac\xba\xfb\x11\xa8\x2e" |
5133 | 0x2f, 0x07, 0x1d, 0x7c, 0xa4, 0xa5, 0xeb, 0xd9, | 5162 | "\x2f\x07\x1d\x7c\xa4\xa5\xeb\xd9" |
5134 | 0x3a, 0x80, 0x3b, 0xa8, 0x7f }, | 5163 | "\x3a\x80\x3b\xa8\x7f", |
5135 | .ilen = 21, | 5164 | .ilen = 21, |
5136 | .result = { 0x00, 0x97, 0x69, 0xec, 0xab, 0xdf, 0x48, 0x62, | 5165 | .result = "\x00\x97\x69\xec\xab\xdf\x48\x62" |
5137 | 0x55, 0x94, 0xc5, 0x92, 0x51, 0xe6, 0x03, 0x57, | 5166 | "\x55\x94\xc5\x92\x51\xe6\x03\x57" |
5138 | 0x22, 0x67, 0x5e, 0x04, 0xc8, 0x47, 0x09, 0x9e, | 5167 | "\x22\x67\x5e\x04\xc8\x47\x09\x9e" |
5139 | 0x5a, 0xe0, 0x70, 0x45, 0x51 }, | 5168 | "\x5a\xe0\x70\x45\x51", |
5140 | .rlen = 29, | 5169 | .rlen = 29, |
5141 | }, { | 5170 | }, { |
5142 | .key = { 0xd7, 0x82, 0x8d, 0x13, 0xb2, 0xb0, 0xbd, 0xc3, | 5171 | .key = "\xd7\x82\x8d\x13\xb2\xb0\xbd\xc3" |
5143 | 0x25, 0xa7, 0x62, 0x36, 0xdf, 0x93, 0xcc, 0x6b }, | 5172 | "\x25\xa7\x62\x36\xdf\x93\xcc\x6b", |
5144 | .klen = 16, | 5173 | .klen = 16, |
5145 | .iv = { 0x01, 0x00, 0x42, 0xff, 0xf8, 0xf1, 0x95, 0x1c, | 5174 | .iv = "\x01\x00\x42\xff\xf8\xf1\x95\x1c" |
5146 | 0x3c, 0x96, 0x96, 0x76, 0x6c, 0xfa, 0x00, 0x00 }, | 5175 | "\x3c\x96\x96\x76\x6c\xfa\x00\x00", |
5147 | .assoc = { 0xd8, 0x5b, 0xc7, 0xe6, 0x9f, 0x94, 0x4f, 0xb8 }, | 5176 | .assoc = "\xd8\x5b\xc7\xe6\x9f\x94\x4f\xb8", |
5148 | .alen = 8, | 5177 | .alen = 8, |
5149 | .input = { 0x8a, 0x19, 0xb9, 0x50, 0xbc, 0xf7, 0x1a, 0x01, | 5178 | .input = "\x8a\x19\xb9\x50\xbc\xf7\x1a\x01" |
5150 | 0x8e, 0x5e, 0x67, 0x01, 0xc9, 0x17, 0x87, 0x65, | 5179 | "\x8e\x5e\x67\x01\xc9\x17\x87\x65" |
5151 | 0x98, 0x09, 0xd6, 0x7d, 0xbe, 0xdd, 0x18 }, | 5180 | "\x98\x09\xd6\x7d\xbe\xdd\x18", |
5152 | .ilen = 23, | 5181 | .ilen = 23, |
5153 | .result = { 0xbc, 0x21, 0x8d, 0xaa, 0x94, 0x74, 0x27, 0xb6, | 5182 | .result = "\xbc\x21\x8d\xaa\x94\x74\x27\xb6" |
5154 | 0xdb, 0x38, 0x6a, 0x99, 0xac, 0x1a, 0xef, 0x23, | 5183 | "\xdb\x38\x6a\x99\xac\x1a\xef\x23" |
5155 | 0xad, 0xe0, 0xb5, 0x29, 0x39, 0xcb, 0x6a, 0x63, | 5184 | "\xad\xe0\xb5\x29\x39\xcb\x6a\x63" |
5156 | 0x7c, 0xf9, 0xbe, 0xc2, 0x40, 0x88, 0x97, 0xc6, | 5185 | "\x7c\xf9\xbe\xc2\x40\x88\x97\xc6" |
5157 | 0xba }, | 5186 | "\xba", |
5158 | .rlen = 33, | 5187 | .rlen = 33, |
5159 | }, | 5188 | }, |
5160 | }; | 5189 | }; |
5161 | 5190 | ||
5162 | static struct aead_testvec aes_ccm_dec_tv_template[] = { | 5191 | static struct aead_testvec aes_ccm_dec_tv_template[] = { |
5163 | { /* From RFC 3610 */ | 5192 | { /* From RFC 3610 */ |
5164 | .key = { 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, | 5193 | .key = "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" |
5165 | 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf }, | 5194 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf", |
5166 | .klen = 16, | 5195 | .klen = 16, |
5167 | .iv = { 0x01, 0x00, 0x00, 0x00, 0x03, 0x02, 0x01, 0x00, | 5196 | .iv = "\x01\x00\x00\x00\x03\x02\x01\x00" |
5168 | 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0x00, 0x00 }, | 5197 | "\xa0\xa1\xa2\xa3\xa4\xa5\x00\x00", |
5169 | .assoc = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 }, | 5198 | .assoc = "\x00\x01\x02\x03\x04\x05\x06\x07", |
5170 | .alen = 8, | 5199 | .alen = 8, |
5171 | .input = { 0x58, 0x8c, 0x97, 0x9a, 0x61, 0xc6, 0x63, 0xd2, | 5200 | .input = "\x58\x8c\x97\x9a\x61\xc6\x63\xd2" |
5172 | 0xf0, 0x66, 0xd0, 0xc2, 0xc0, 0xf9, 0x89, 0x80, | 5201 | "\xf0\x66\xd0\xc2\xc0\xf9\x89\x80" |
5173 | 0x6d, 0x5f, 0x6b, 0x61, 0xda, 0xc3, 0x84, 0x17, | 5202 | "\x6d\x5f\x6b\x61\xda\xc3\x84\x17" |
5174 | 0xe8, 0xd1, 0x2c, 0xfd, 0xf9, 0x26, 0xe0 }, | 5203 | "\xe8\xd1\x2c\xfd\xf9\x26\xe0", |
5175 | .ilen = 31, | 5204 | .ilen = 31, |
5176 | .result = { 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 5205 | .result = "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
5177 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 5206 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
5178 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e }, | 5207 | "\x18\x19\x1a\x1b\x1c\x1d\x1e", |
5179 | .rlen = 23, | 5208 | .rlen = 23, |
5180 | }, { | 5209 | }, { |
5181 | .key = { 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, | 5210 | .key = "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" |
5182 | 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf }, | 5211 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf", |
5183 | .klen = 16, | 5212 | .klen = 16, |
5184 | .iv = { 0x01, 0x00, 0x00, 0x00, 0x07, 0x06, 0x05, 0x04, | 5213 | .iv = "\x01\x00\x00\x00\x07\x06\x05\x04" |
5185 | 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0x00, 0x00 }, | 5214 | "\xa0\xa1\xa2\xa3\xa4\xa5\x00\x00", |
5186 | .assoc = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 5215 | .assoc = "\x00\x01\x02\x03\x04\x05\x06\x07" |
5187 | 0x08, 0x09, 0x0a, 0x0b }, | 5216 | "\x08\x09\x0a\x0b", |
5188 | .alen = 12, | 5217 | .alen = 12, |
5189 | .input = { 0xdc, 0xf1, 0xfb, 0x7b, 0x5d, 0x9e, 0x23, 0xfb, | 5218 | .input = "\xdc\xf1\xfb\x7b\x5d\x9e\x23\xfb" |
5190 | 0x9d, 0x4e, 0x13, 0x12, 0x53, 0x65, 0x8a, 0xd8, | 5219 | "\x9d\x4e\x13\x12\x53\x65\x8a\xd8" |
5191 | 0x6e, 0xbd, 0xca, 0x3e, 0x51, 0xe8, 0x3f, 0x07, | 5220 | "\x6e\xbd\xca\x3e\x51\xe8\x3f\x07" |
5192 | 0x7d, 0x9c, 0x2d, 0x93 }, | 5221 | "\x7d\x9c\x2d\x93", |
5193 | .ilen = 28, | 5222 | .ilen = 28, |
5194 | .result = { 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, | 5223 | .result = "\x0c\x0d\x0e\x0f\x10\x11\x12\x13" |
5195 | 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, | 5224 | "\x14\x15\x16\x17\x18\x19\x1a\x1b" |
5196 | 0x1c, 0x1d, 0x1e, 0x1f }, | 5225 | "\x1c\x1d\x1e\x1f", |
5197 | .rlen = 20, | 5226 | .rlen = 20, |
5198 | }, { | 5227 | }, { |
5199 | .key = { 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, | 5228 | .key = "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" |
5200 | 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf }, | 5229 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf", |
5201 | .klen = 16, | 5230 | .klen = 16, |
5202 | .iv = { 0x01, 0x00, 0x00, 0x00, 0x0b, 0x0a, 0x09, 0x08, | 5231 | .iv = "\x01\x00\x00\x00\x0b\x0a\x09\x08" |
5203 | 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0x00, 0x00 }, | 5232 | "\xa0\xa1\xa2\xa3\xa4\xa5\x00\x00", |
5204 | .assoc = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 }, | 5233 | .assoc = "\x00\x01\x02\x03\x04\x05\x06\x07", |
5205 | .alen = 8, | 5234 | .alen = 8, |
5206 | .input = { 0x82, 0x53, 0x1a, 0x60, 0xcc, 0x24, 0x94, 0x5a, | 5235 | .input = "\x82\x53\x1a\x60\xcc\x24\x94\x5a" |
5207 | 0x4b, 0x82, 0x79, 0x18, 0x1a, 0xb5, 0xc8, 0x4d, | 5236 | "\x4b\x82\x79\x18\x1a\xb5\xc8\x4d" |
5208 | 0xf2, 0x1c, 0xe7, 0xf9, 0xb7, 0x3f, 0x42, 0xe1, | 5237 | "\xf2\x1c\xe7\xf9\xb7\x3f\x42\xe1" |
5209 | 0x97, 0xea, 0x9c, 0x07, 0xe5, 0x6b, 0x5e, 0xb1, | 5238 | "\x97\xea\x9c\x07\xe5\x6b\x5e\xb1" |
5210 | 0x7e, 0x5f, 0x4e }, | 5239 | "\x7e\x5f\x4e", |
5211 | .ilen = 35, | 5240 | .ilen = 35, |
5212 | .result = { 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 5241 | .result = "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
5213 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 5242 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
5214 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, | 5243 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f" |
5215 | 0x20 }, | 5244 | "\x20", |
5216 | .rlen = 25, | 5245 | .rlen = 25, |
5217 | }, { | 5246 | }, { |
5218 | .key = { 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, | 5247 | .key = "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" |
5219 | 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf }, | 5248 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf", |
5220 | .klen = 16, | 5249 | .klen = 16, |
5221 | .iv = { 0x01, 0x00, 0x00, 0x00, 0x0c, 0x0b, 0x0a, 0x09, | 5250 | .iv = "\x01\x00\x00\x00\x0c\x0b\x0a\x09" |
5222 | 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0x00, 0x00 }, | 5251 | "\xa0\xa1\xa2\xa3\xa4\xa5\x00\x00", |
5223 | .assoc = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 5252 | .assoc = "\x00\x01\x02\x03\x04\x05\x06\x07" |
5224 | 0x08, 0x09, 0x0a, 0x0b }, | 5253 | "\x08\x09\x0a\x0b", |
5225 | .alen = 12, | 5254 | .alen = 12, |
5226 | .input = { 0x07, 0x34, 0x25, 0x94, 0x15, 0x77, 0x85, 0x15, | 5255 | .input = "\x07\x34\x25\x94\x15\x77\x85\x15" |
5227 | 0x2b, 0x07, 0x40, 0x98, 0x33, 0x0a, 0xbb, 0x14, | 5256 | "\x2b\x07\x40\x98\x33\x0a\xbb\x14" |
5228 | 0x1b, 0x94, 0x7b, 0x56, 0x6a, 0xa9, 0x40, 0x6b, | 5257 | "\x1b\x94\x7b\x56\x6a\xa9\x40\x6b" |
5229 | 0x4d, 0x99, 0x99, 0x88, 0xdd }, | 5258 | "\x4d\x99\x99\x88\xdd", |
5230 | .ilen = 29, | 5259 | .ilen = 29, |
5231 | .result = { 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, | 5260 | .result = "\x0c\x0d\x0e\x0f\x10\x11\x12\x13" |
5232 | 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, | 5261 | "\x14\x15\x16\x17\x18\x19\x1a\x1b" |
5233 | 0x1c, 0x1d, 0x1e }, | 5262 | "\x1c\x1d\x1e", |
5234 | .rlen = 19, | 5263 | .rlen = 19, |
5235 | }, { | 5264 | }, { |
5236 | .key = { 0xd7, 0x82, 0x8d, 0x13, 0xb2, 0xb0, 0xbd, 0xc3, | 5265 | .key = "\xd7\x82\x8d\x13\xb2\xb0\xbd\xc3" |
5237 | 0x25, 0xa7, 0x62, 0x36, 0xdf, 0x93, 0xcc, 0x6b }, | 5266 | "\x25\xa7\x62\x36\xdf\x93\xcc\x6b", |
5238 | .klen = 16, | 5267 | .klen = 16, |
5239 | .iv = { 0x01, 0x00, 0x33, 0x56, 0x8e, 0xf7, 0xb2, 0x63, | 5268 | .iv = "\x01\x00\x33\x56\x8e\xf7\xb2\x63" |
5240 | 0x3c, 0x96, 0x96, 0x76, 0x6c, 0xfa, 0x00, 0x00 }, | 5269 | "\x3c\x96\x96\x76\x6c\xfa\x00\x00", |
5241 | .assoc = { 0x63, 0x01, 0x8f, 0x76, 0xdc, 0x8a, 0x1b, 0xcb }, | 5270 | .assoc = "\x63\x01\x8f\x76\xdc\x8a\x1b\xcb", |
5242 | .alen = 8, | 5271 | .alen = 8, |
5243 | .input = { 0x4c, 0xcb, 0x1e, 0x7c, 0xa9, 0x81, 0xbe, 0xfa, | 5272 | .input = "\x4c\xcb\x1e\x7c\xa9\x81\xbe\xfa" |
5244 | 0xa0, 0x72, 0x6c, 0x55, 0xd3, 0x78, 0x06, 0x12, | 5273 | "\xa0\x72\x6c\x55\xd3\x78\x06\x12" |
5245 | 0x98, 0xc8, 0x5c, 0x92, 0x81, 0x4a, 0xbc, 0x33, | 5274 | "\x98\xc8\x5c\x92\x81\x4a\xbc\x33" |
5246 | 0xc5, 0x2e, 0xe8, 0x1d, 0x7d, 0x77, 0xc0, 0x8a }, | 5275 | "\xc5\x2e\xe8\x1d\x7d\x77\xc0\x8a", |
5247 | .ilen = 32, | 5276 | .ilen = 32, |
5248 | .result = { 0x90, 0x20, 0xea, 0x6f, 0x91, 0xbd, 0xd8, 0x5a, | 5277 | .result = "\x90\x20\xea\x6f\x91\xbd\xd8\x5a" |
5249 | 0xfa, 0x00, 0x39, 0xba, 0x4b, 0xaf, 0xf9, 0xbf, | 5278 | "\xfa\x00\x39\xba\x4b\xaf\xf9\xbf" |
5250 | 0xb7, 0x9c, 0x70, 0x28, 0x94, 0x9c, 0xd0, 0xec }, | 5279 | "\xb7\x9c\x70\x28\x94\x9c\xd0\xec", |
5251 | .rlen = 24, | 5280 | .rlen = 24, |
5252 | }, { | 5281 | }, { |
5253 | .key = { 0xd7, 0x82, 0x8d, 0x13, 0xb2, 0xb0, 0xbd, 0xc3, | 5282 | .key = "\xd7\x82\x8d\x13\xb2\xb0\xbd\xc3" |
5254 | 0x25, 0xa7, 0x62, 0x36, 0xdf, 0x93, 0xcc, 0x6b }, | 5283 | "\x25\xa7\x62\x36\xdf\x93\xcc\x6b", |
5255 | .klen = 16, | 5284 | .klen = 16, |
5256 | .iv = { 0x01, 0x00, 0xd5, 0x60, 0x91, 0x2d, 0x3f, 0x70, | 5285 | .iv = "\x01\x00\xd5\x60\x91\x2d\x3f\x70" |
5257 | 0x3c, 0x96, 0x96, 0x76, 0x6c, 0xfa, 0x00, 0x00 }, | 5286 | "\x3c\x96\x96\x76\x6c\xfa\x00\x00", |
5258 | .assoc = { 0xcd, 0x90, 0x44, 0xd2, 0xb7, 0x1f, 0xdb, 0x81, | 5287 | .assoc = "\xcd\x90\x44\xd2\xb7\x1f\xdb\x81" |
5259 | 0x20, 0xea, 0x60, 0xc0 }, | 5288 | "\x20\xea\x60\xc0", |
5260 | .alen = 12, | 5289 | .alen = 12, |
5261 | .input = { 0x00, 0x97, 0x69, 0xec, 0xab, 0xdf, 0x48, 0x62, | 5290 | .input = "\x00\x97\x69\xec\xab\xdf\x48\x62" |
5262 | 0x55, 0x94, 0xc5, 0x92, 0x51, 0xe6, 0x03, 0x57, | 5291 | "\x55\x94\xc5\x92\x51\xe6\x03\x57" |
5263 | 0x22, 0x67, 0x5e, 0x04, 0xc8, 0x47, 0x09, 0x9e, | 5292 | "\x22\x67\x5e\x04\xc8\x47\x09\x9e" |
5264 | 0x5a, 0xe0, 0x70, 0x45, 0x51 }, | 5293 | "\x5a\xe0\x70\x45\x51", |
5265 | .ilen = 29, | 5294 | .ilen = 29, |
5266 | .result = { 0x64, 0x35, 0xac, 0xba, 0xfb, 0x11, 0xa8, 0x2e, | 5295 | .result = "\x64\x35\xac\xba\xfb\x11\xa8\x2e" |
5267 | 0x2f, 0x07, 0x1d, 0x7c, 0xa4, 0xa5, 0xeb, 0xd9, | 5296 | "\x2f\x07\x1d\x7c\xa4\xa5\xeb\xd9" |
5268 | 0x3a, 0x80, 0x3b, 0xa8, 0x7f }, | 5297 | "\x3a\x80\x3b\xa8\x7f", |
5269 | .rlen = 21, | 5298 | .rlen = 21, |
5270 | }, { | 5299 | }, { |
5271 | .key = { 0xd7, 0x82, 0x8d, 0x13, 0xb2, 0xb0, 0xbd, 0xc3, | 5300 | .key = "\xd7\x82\x8d\x13\xb2\xb0\xbd\xc3" |
5272 | 0x25, 0xa7, 0x62, 0x36, 0xdf, 0x93, 0xcc, 0x6b }, | 5301 | "\x25\xa7\x62\x36\xdf\x93\xcc\x6b", |
5273 | .klen = 16, | 5302 | .klen = 16, |
5274 | .iv = { 0x01, 0x00, 0x42, 0xff, 0xf8, 0xf1, 0x95, 0x1c, | 5303 | .iv = "\x01\x00\x42\xff\xf8\xf1\x95\x1c" |
5275 | 0x3c, 0x96, 0x96, 0x76, 0x6c, 0xfa, 0x00, 0x00 }, | 5304 | "\x3c\x96\x96\x76\x6c\xfa\x00\x00", |
5276 | .assoc = { 0xd8, 0x5b, 0xc7, 0xe6, 0x9f, 0x94, 0x4f, 0xb8 }, | 5305 | .assoc = "\xd8\x5b\xc7\xe6\x9f\x94\x4f\xb8", |
5277 | .alen = 8, | 5306 | .alen = 8, |
5278 | .input = { 0xbc, 0x21, 0x8d, 0xaa, 0x94, 0x74, 0x27, 0xb6, | 5307 | .input = "\xbc\x21\x8d\xaa\x94\x74\x27\xb6" |
5279 | 0xdb, 0x38, 0x6a, 0x99, 0xac, 0x1a, 0xef, 0x23, | 5308 | "\xdb\x38\x6a\x99\xac\x1a\xef\x23" |
5280 | 0xad, 0xe0, 0xb5, 0x29, 0x39, 0xcb, 0x6a, 0x63, | 5309 | "\xad\xe0\xb5\x29\x39\xcb\x6a\x63" |
5281 | 0x7c, 0xf9, 0xbe, 0xc2, 0x40, 0x88, 0x97, 0xc6, | 5310 | "\x7c\xf9\xbe\xc2\x40\x88\x97\xc6" |
5282 | 0xba }, | 5311 | "\xba", |
5283 | .ilen = 33, | 5312 | .ilen = 33, |
5284 | .result = { 0x8a, 0x19, 0xb9, 0x50, 0xbc, 0xf7, 0x1a, 0x01, | 5313 | .result = "\x8a\x19\xb9\x50\xbc\xf7\x1a\x01" |
5285 | 0x8e, 0x5e, 0x67, 0x01, 0xc9, 0x17, 0x87, 0x65, | 5314 | "\x8e\x5e\x67\x01\xc9\x17\x87\x65" |
5286 | 0x98, 0x09, 0xd6, 0x7d, 0xbe, 0xdd, 0x18 }, | 5315 | "\x98\x09\xd6\x7d\xbe\xdd\x18", |
5287 | .rlen = 23, | 5316 | .rlen = 23, |
5288 | }, | 5317 | }, |
5289 | }; | 5318 | }; |
@@ -5294,54 +5323,54 @@ static struct aead_testvec aes_ccm_dec_tv_template[] = { | |||
5294 | 5323 | ||
5295 | static struct cipher_testvec cast5_enc_tv_template[] = { | 5324 | static struct cipher_testvec cast5_enc_tv_template[] = { |
5296 | { | 5325 | { |
5297 | .key = { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78, | 5326 | .key = "\x01\x23\x45\x67\x12\x34\x56\x78" |
5298 | 0x23, 0x45, 0x67, 0x89, 0x34, 0x56, 0x78, 0x9a }, | 5327 | "\x23\x45\x67\x89\x34\x56\x78\x9a", |
5299 | .klen = 16, | 5328 | .klen = 16, |
5300 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 5329 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
5301 | .ilen = 8, | 5330 | .ilen = 8, |
5302 | .result = { 0x23, 0x8b, 0x4f, 0xe5, 0x84, 0x7e, 0x44, 0xb2 }, | 5331 | .result = "\x23\x8b\x4f\xe5\x84\x7e\x44\xb2", |
5303 | .rlen = 8, | 5332 | .rlen = 8, |
5304 | }, { | 5333 | }, { |
5305 | .key = { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78, | 5334 | .key = "\x01\x23\x45\x67\x12\x34\x56\x78" |
5306 | 0x23, 0x45 }, | 5335 | "\x23\x45", |
5307 | .klen = 10, | 5336 | .klen = 10, |
5308 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 5337 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
5309 | .ilen = 8, | 5338 | .ilen = 8, |
5310 | .result = { 0xeb, 0x6a, 0x71, 0x1a, 0x2c, 0x02, 0x27, 0x1b }, | 5339 | .result = "\xeb\x6a\x71\x1a\x2c\x02\x27\x1b", |
5311 | .rlen = 8, | 5340 | .rlen = 8, |
5312 | }, { | 5341 | }, { |
5313 | .key = { 0x01, 0x23, 0x45, 0x67, 0x12 }, | 5342 | .key = "\x01\x23\x45\x67\x12", |
5314 | .klen = 5, | 5343 | .klen = 5, |
5315 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 5344 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
5316 | .ilen = 8, | 5345 | .ilen = 8, |
5317 | .result = { 0x7a, 0xc8, 0x16, 0xd1, 0x6e, 0x9b, 0x30, 0x2e }, | 5346 | .result = "\x7a\xc8\x16\xd1\x6e\x9b\x30\x2e", |
5318 | .rlen = 8, | 5347 | .rlen = 8, |
5319 | }, | 5348 | }, |
5320 | }; | 5349 | }; |
5321 | 5350 | ||
5322 | static struct cipher_testvec cast5_dec_tv_template[] = { | 5351 | static struct cipher_testvec cast5_dec_tv_template[] = { |
5323 | { | 5352 | { |
5324 | .key = { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78, | 5353 | .key = "\x01\x23\x45\x67\x12\x34\x56\x78" |
5325 | 0x23, 0x45, 0x67, 0x89, 0x34, 0x56, 0x78, 0x9a }, | 5354 | "\x23\x45\x67\x89\x34\x56\x78\x9a", |
5326 | .klen = 16, | 5355 | .klen = 16, |
5327 | .input = { 0x23, 0x8b, 0x4f, 0xe5, 0x84, 0x7e, 0x44, 0xb2 }, | 5356 | .input = "\x23\x8b\x4f\xe5\x84\x7e\x44\xb2", |
5328 | .ilen = 8, | 5357 | .ilen = 8, |
5329 | .result = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 5358 | .result = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
5330 | .rlen = 8, | 5359 | .rlen = 8, |
5331 | }, { | 5360 | }, { |
5332 | .key = { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78, | 5361 | .key = "\x01\x23\x45\x67\x12\x34\x56\x78" |
5333 | 0x23, 0x45 }, | 5362 | "\x23\x45", |
5334 | .klen = 10, | 5363 | .klen = 10, |
5335 | .input = { 0xeb, 0x6a, 0x71, 0x1a, 0x2c, 0x02, 0x27, 0x1b }, | 5364 | .input = "\xeb\x6a\x71\x1a\x2c\x02\x27\x1b", |
5336 | .ilen = 8, | 5365 | .ilen = 8, |
5337 | .result = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 5366 | .result = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
5338 | .rlen = 8, | 5367 | .rlen = 8, |
5339 | }, { | 5368 | }, { |
5340 | .key = { 0x01, 0x23, 0x45, 0x67, 0x12 }, | 5369 | .key = "\x01\x23\x45\x67\x12", |
5341 | .klen = 5, | 5370 | .klen = 5, |
5342 | .input = { 0x7a, 0xc8, 0x16, 0xd1, 0x6e, 0x9b, 0x30, 0x2e }, | 5371 | .input = "\x7a\xc8\x16\xd1\x6e\x9b\x30\x2e", |
5343 | .ilen = 8, | 5372 | .ilen = 8, |
5344 | .result = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 5373 | .result = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
5345 | .rlen = 8, | 5374 | .rlen = 8, |
5346 | }, | 5375 | }, |
5347 | }; | 5376 | }; |
@@ -5354,132 +5383,132 @@ static struct cipher_testvec cast5_dec_tv_template[] = { | |||
5354 | 5383 | ||
5355 | static struct cipher_testvec arc4_enc_tv_template[] = { | 5384 | static struct cipher_testvec arc4_enc_tv_template[] = { |
5356 | { | 5385 | { |
5357 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 5386 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
5358 | .klen = 8, | 5387 | .klen = 8, |
5359 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 5388 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
5360 | .ilen = 8, | 5389 | .ilen = 8, |
5361 | .result = { 0x75, 0xb7, 0x87, 0x80, 0x99, 0xe0, 0xc5, 0x96 }, | 5390 | .result = "\x75\xb7\x87\x80\x99\xe0\xc5\x96", |
5362 | .rlen = 8, | 5391 | .rlen = 8, |
5363 | }, { | 5392 | }, { |
5364 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 5393 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
5365 | .klen = 8, | 5394 | .klen = 8, |
5366 | .input = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 5395 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00", |
5367 | .ilen = 8, | 5396 | .ilen = 8, |
5368 | .result = { 0x74, 0x94, 0xc2, 0xe7, 0x10, 0x4b, 0x08, 0x79 }, | 5397 | .result = "\x74\x94\xc2\xe7\x10\x4b\x08\x79", |
5369 | .rlen = 8, | 5398 | .rlen = 8, |
5370 | }, { | 5399 | }, { |
5371 | .key = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 5400 | .key = "\x00\x00\x00\x00\x00\x00\x00\x00", |
5372 | .klen = 8, | 5401 | .klen = 8, |
5373 | .input = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 5402 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00", |
5374 | .ilen = 8, | 5403 | .ilen = 8, |
5375 | .result = { 0xde, 0x18, 0x89, 0x41, 0xa3, 0x37, 0x5d, 0x3a }, | 5404 | .result = "\xde\x18\x89\x41\xa3\x37\x5d\x3a", |
5376 | .rlen = 8, | 5405 | .rlen = 8, |
5377 | }, { | 5406 | }, { |
5378 | .key = { 0xef, 0x01, 0x23, 0x45}, | 5407 | .key = "\xef\x01\x23\x45", |
5379 | .klen = 4, | 5408 | .klen = 4, |
5380 | .input = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 5409 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00" |
5381 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 5410 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
5382 | 0x00, 0x00, 0x00, 0x00 }, | 5411 | "\x00\x00\x00\x00", |
5383 | .ilen = 20, | 5412 | .ilen = 20, |
5384 | .result = { 0xd6, 0xa1, 0x41, 0xa7, 0xec, 0x3c, 0x38, 0xdf, | 5413 | .result = "\xd6\xa1\x41\xa7\xec\x3c\x38\xdf" |
5385 | 0xbd, 0x61, 0x5a, 0x11, 0x62, 0xe1, 0xc7, 0xba, | 5414 | "\xbd\x61\x5a\x11\x62\xe1\xc7\xba" |
5386 | 0x36, 0xb6, 0x78, 0x58 }, | 5415 | "\x36\xb6\x78\x58", |
5387 | .rlen = 20, | 5416 | .rlen = 20, |
5388 | }, { | 5417 | }, { |
5389 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 5418 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
5390 | .klen = 8, | 5419 | .klen = 8, |
5391 | .input = { 0x12, 0x34, 0x56, 0x78, 0x9A, 0xBC, 0xDE, 0xF0, | 5420 | .input = "\x12\x34\x56\x78\x9A\xBC\xDE\xF0" |
5392 | 0x12, 0x34, 0x56, 0x78, 0x9A, 0xBC, 0xDE, 0xF0, | 5421 | "\x12\x34\x56\x78\x9A\xBC\xDE\xF0" |
5393 | 0x12, 0x34, 0x56, 0x78, 0x9A, 0xBC, 0xDE, 0xF0, | 5422 | "\x12\x34\x56\x78\x9A\xBC\xDE\xF0" |
5394 | 0x12, 0x34, 0x56, 0x78 }, | 5423 | "\x12\x34\x56\x78", |
5395 | .ilen = 28, | 5424 | .ilen = 28, |
5396 | .result = { 0x66, 0xa0, 0x94, 0x9f, 0x8a, 0xf7, 0xd6, 0x89, | 5425 | .result = "\x66\xa0\x94\x9f\x8a\xf7\xd6\x89" |
5397 | 0x1f, 0x7f, 0x83, 0x2b, 0xa8, 0x33, 0xc0, 0x0c, | 5426 | "\x1f\x7f\x83\x2b\xa8\x33\xc0\x0c" |
5398 | 0x89, 0x2e, 0xbe, 0x30, 0x14, 0x3c, 0xe2, 0x87, | 5427 | "\x89\x2e\xbe\x30\x14\x3c\xe2\x87" |
5399 | 0x40, 0x01, 0x1e, 0xcf }, | 5428 | "\x40\x01\x1e\xcf", |
5400 | .rlen = 28, | 5429 | .rlen = 28, |
5401 | }, { | 5430 | }, { |
5402 | .key = { 0xef, 0x01, 0x23, 0x45 }, | 5431 | .key = "\xef\x01\x23\x45", |
5403 | .klen = 4, | 5432 | .klen = 4, |
5404 | .input = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 5433 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00" |
5405 | 0x00, 0x00 }, | 5434 | "\x00\x00", |
5406 | .ilen = 10, | 5435 | .ilen = 10, |
5407 | .result = { 0xd6, 0xa1, 0x41, 0xa7, 0xec, 0x3c, 0x38, 0xdf, | 5436 | .result = "\xd6\xa1\x41\xa7\xec\x3c\x38\xdf" |
5408 | 0xbd, 0x61 }, | 5437 | "\xbd\x61", |
5409 | .rlen = 10, | 5438 | .rlen = 10, |
5410 | }, { | 5439 | }, { |
5411 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, | 5440 | .key = "\x01\x23\x45\x67\x89\xAB\xCD\xEF" |
5412 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 5441 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
5413 | .klen = 16, | 5442 | .klen = 16, |
5414 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF }, | 5443 | .input = "\x01\x23\x45\x67\x89\xAB\xCD\xEF", |
5415 | .ilen = 8, | 5444 | .ilen = 8, |
5416 | .result = { 0x69, 0x72, 0x36, 0x59, 0x1B, 0x52, 0x42, 0xB1 }, | 5445 | .result = "\x69\x72\x36\x59\x1B\x52\x42\xB1", |
5417 | .rlen = 8, | 5446 | .rlen = 8, |
5418 | }, | 5447 | }, |
5419 | }; | 5448 | }; |
5420 | 5449 | ||
5421 | static struct cipher_testvec arc4_dec_tv_template[] = { | 5450 | static struct cipher_testvec arc4_dec_tv_template[] = { |
5422 | { | 5451 | { |
5423 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 5452 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
5424 | .klen = 8, | 5453 | .klen = 8, |
5425 | .input = { 0x75, 0xb7, 0x87, 0x80, 0x99, 0xe0, 0xc5, 0x96 }, | 5454 | .input = "\x75\xb7\x87\x80\x99\xe0\xc5\x96", |
5426 | .ilen = 8, | 5455 | .ilen = 8, |
5427 | .result = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 5456 | .result = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
5428 | .rlen = 8, | 5457 | .rlen = 8, |
5429 | }, { | 5458 | }, { |
5430 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 5459 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
5431 | .klen = 8, | 5460 | .klen = 8, |
5432 | .input = { 0x74, 0x94, 0xc2, 0xe7, 0x10, 0x4b, 0x08, 0x79 }, | 5461 | .input = "\x74\x94\xc2\xe7\x10\x4b\x08\x79", |
5433 | .ilen = 8, | 5462 | .ilen = 8, |
5434 | .result = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 5463 | .result = "\x00\x00\x00\x00\x00\x00\x00\x00", |
5435 | .rlen = 8, | 5464 | .rlen = 8, |
5436 | }, { | 5465 | }, { |
5437 | .key = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 5466 | .key = "\x00\x00\x00\x00\x00\x00\x00\x00", |
5438 | .klen = 8, | 5467 | .klen = 8, |
5439 | .input = { 0xde, 0x18, 0x89, 0x41, 0xa3, 0x37, 0x5d, 0x3a }, | 5468 | .input = "\xde\x18\x89\x41\xa3\x37\x5d\x3a", |
5440 | .ilen = 8, | 5469 | .ilen = 8, |
5441 | .result = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 5470 | .result = "\x00\x00\x00\x00\x00\x00\x00\x00", |
5442 | .rlen = 8, | 5471 | .rlen = 8, |
5443 | }, { | 5472 | }, { |
5444 | .key = { 0xef, 0x01, 0x23, 0x45}, | 5473 | .key = "\xef\x01\x23\x45", |
5445 | .klen = 4, | 5474 | .klen = 4, |
5446 | .input = { 0xd6, 0xa1, 0x41, 0xa7, 0xec, 0x3c, 0x38, 0xdf, | 5475 | .input = "\xd6\xa1\x41\xa7\xec\x3c\x38\xdf" |
5447 | 0xbd, 0x61, 0x5a, 0x11, 0x62, 0xe1, 0xc7, 0xba, | 5476 | "\xbd\x61\x5a\x11\x62\xe1\xc7\xba" |
5448 | 0x36, 0xb6, 0x78, 0x58 }, | 5477 | "\x36\xb6\x78\x58", |
5449 | .ilen = 20, | 5478 | .ilen = 20, |
5450 | .result = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 5479 | .result = "\x00\x00\x00\x00\x00\x00\x00\x00" |
5451 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 5480 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
5452 | 0x00, 0x00, 0x00, 0x00 }, | 5481 | "\x00\x00\x00\x00", |
5453 | .rlen = 20, | 5482 | .rlen = 20, |
5454 | }, { | 5483 | }, { |
5455 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef }, | 5484 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef", |
5456 | .klen = 8, | 5485 | .klen = 8, |
5457 | .input = { 0x66, 0xa0, 0x94, 0x9f, 0x8a, 0xf7, 0xd6, 0x89, | 5486 | .input = "\x66\xa0\x94\x9f\x8a\xf7\xd6\x89" |
5458 | 0x1f, 0x7f, 0x83, 0x2b, 0xa8, 0x33, 0xc0, 0x0c, | 5487 | "\x1f\x7f\x83\x2b\xa8\x33\xc0\x0c" |
5459 | 0x89, 0x2e, 0xbe, 0x30, 0x14, 0x3c, 0xe2, 0x87, | 5488 | "\x89\x2e\xbe\x30\x14\x3c\xe2\x87" |
5460 | 0x40, 0x01, 0x1e, 0xcf }, | 5489 | "\x40\x01\x1e\xcf", |
5461 | .ilen = 28, | 5490 | .ilen = 28, |
5462 | .result = { 0x12, 0x34, 0x56, 0x78, 0x9A, 0xBC, 0xDE, 0xF0, | 5491 | .result = "\x12\x34\x56\x78\x9A\xBC\xDE\xF0" |
5463 | 0x12, 0x34, 0x56, 0x78, 0x9A, 0xBC, 0xDE, 0xF0, | 5492 | "\x12\x34\x56\x78\x9A\xBC\xDE\xF0" |
5464 | 0x12, 0x34, 0x56, 0x78, 0x9A, 0xBC, 0xDE, 0xF0, | 5493 | "\x12\x34\x56\x78\x9A\xBC\xDE\xF0" |
5465 | 0x12, 0x34, 0x56, 0x78 }, | 5494 | "\x12\x34\x56\x78", |
5466 | .rlen = 28, | 5495 | .rlen = 28, |
5467 | }, { | 5496 | }, { |
5468 | .key = { 0xef, 0x01, 0x23, 0x45 }, | 5497 | .key = "\xef\x01\x23\x45", |
5469 | .klen = 4, | 5498 | .klen = 4, |
5470 | .input = { 0xd6, 0xa1, 0x41, 0xa7, 0xec, 0x3c, 0x38, 0xdf, | 5499 | .input = "\xd6\xa1\x41\xa7\xec\x3c\x38\xdf" |
5471 | 0xbd, 0x61 }, | 5500 | "\xbd\x61", |
5472 | .ilen = 10, | 5501 | .ilen = 10, |
5473 | .result = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 5502 | .result = "\x00\x00\x00\x00\x00\x00\x00\x00" |
5474 | 0x00, 0x00 }, | 5503 | "\x00\x00", |
5475 | .rlen = 10, | 5504 | .rlen = 10, |
5476 | }, { | 5505 | }, { |
5477 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, | 5506 | .key = "\x01\x23\x45\x67\x89\xAB\xCD\xEF" |
5478 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 5507 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
5479 | .klen = 16, | 5508 | .klen = 16, |
5480 | .input = { 0x69, 0x72, 0x36, 0x59, 0x1B, 0x52, 0x42, 0xB1 }, | 5509 | .input = "\x69\x72\x36\x59\x1B\x52\x42\xB1", |
5481 | .ilen = 8, | 5510 | .ilen = 8, |
5482 | .result = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF }, | 5511 | .result = "\x01\x23\x45\x67\x89\xAB\xCD\xEF", |
5483 | .rlen = 8, | 5512 | .rlen = 8, |
5484 | }, | 5513 | }, |
5485 | }; | 5514 | }; |
@@ -5492,86 +5521,86 @@ static struct cipher_testvec arc4_dec_tv_template[] = { | |||
5492 | 5521 | ||
5493 | static struct cipher_testvec tea_enc_tv_template[] = { | 5522 | static struct cipher_testvec tea_enc_tv_template[] = { |
5494 | { | 5523 | { |
5495 | .key = { [0 ... 15] = 0x00 }, | 5524 | .key = zeroed_string, |
5496 | .klen = 16, | 5525 | .klen = 16, |
5497 | .input = { [0 ... 8] = 0x00 }, | 5526 | .input = zeroed_string, |
5498 | .ilen = 8, | 5527 | .ilen = 8, |
5499 | .result = { 0x0a, 0x3a, 0xea, 0x41, 0x40, 0xa9, 0xba, 0x94 }, | 5528 | .result = "\x0a\x3a\xea\x41\x40\xa9\xba\x94", |
5500 | .rlen = 8, | 5529 | .rlen = 8, |
5501 | }, { | 5530 | }, { |
5502 | .key = { 0x2b, 0x02, 0x05, 0x68, 0x06, 0x14, 0x49, 0x76, | 5531 | .key = "\x2b\x02\x05\x68\x06\x14\x49\x76" |
5503 | 0x77, 0x5d, 0x0e, 0x26, 0x6c, 0x28, 0x78, 0x43 }, | 5532 | "\x77\x5d\x0e\x26\x6c\x28\x78\x43", |
5504 | .klen = 16, | 5533 | .klen = 16, |
5505 | .input = { 0x74, 0x65, 0x73, 0x74, 0x20, 0x6d, 0x65, 0x2e }, | 5534 | .input = "\x74\x65\x73\x74\x20\x6d\x65\x2e", |
5506 | .ilen = 8, | 5535 | .ilen = 8, |
5507 | .result = { 0x77, 0x5d, 0x2a, 0x6a, 0xf6, 0xce, 0x92, 0x09 }, | 5536 | .result = "\x77\x5d\x2a\x6a\xf6\xce\x92\x09", |
5508 | .rlen = 8, | 5537 | .rlen = 8, |
5509 | }, { | 5538 | }, { |
5510 | .key = { 0x09, 0x65, 0x43, 0x11, 0x66, 0x44, 0x39, 0x25, | 5539 | .key = "\x09\x65\x43\x11\x66\x44\x39\x25" |
5511 | 0x51, 0x3a, 0x16, 0x10, 0x0a, 0x08, 0x12, 0x6e }, | 5540 | "\x51\x3a\x16\x10\x0a\x08\x12\x6e", |
5512 | .klen = 16, | 5541 | .klen = 16, |
5513 | .input = { 0x6c, 0x6f, 0x6e, 0x67, 0x65, 0x72, 0x5f, 0x74, | 5542 | .input = "\x6c\x6f\x6e\x67\x65\x72\x5f\x74" |
5514 | 0x65, 0x73, 0x74, 0x5f, 0x76, 0x65, 0x63, 0x74 }, | 5543 | "\x65\x73\x74\x5f\x76\x65\x63\x74", |
5515 | .ilen = 16, | 5544 | .ilen = 16, |
5516 | .result = { 0xbe, 0x7a, 0xbb, 0x81, 0x95, 0x2d, 0x1f, 0x1e, | 5545 | .result = "\xbe\x7a\xbb\x81\x95\x2d\x1f\x1e" |
5517 | 0xdd, 0x89, 0xa1, 0x25, 0x04, 0x21, 0xdf, 0x95 }, | 5546 | "\xdd\x89\xa1\x25\x04\x21\xdf\x95", |
5518 | .rlen = 16, | 5547 | .rlen = 16, |
5519 | }, { | 5548 | }, { |
5520 | .key = { 0x4d, 0x76, 0x32, 0x17, 0x05, 0x3f, 0x75, 0x2c, | 5549 | .key = "\x4d\x76\x32\x17\x05\x3f\x75\x2c" |
5521 | 0x5d, 0x04, 0x16, 0x36, 0x15, 0x72, 0x63, 0x2f }, | 5550 | "\x5d\x04\x16\x36\x15\x72\x63\x2f", |
5522 | .klen = 16, | 5551 | .klen = 16, |
5523 | .input = { 0x54, 0x65, 0x61, 0x20, 0x69, 0x73, 0x20, 0x67, | 5552 | .input = "\x54\x65\x61\x20\x69\x73\x20\x67" |
5524 | 0x6f, 0x6f, 0x64, 0x20, 0x66, 0x6f, 0x72, 0x20, | 5553 | "\x6f\x6f\x64\x20\x66\x6f\x72\x20" |
5525 | 0x79, 0x6f, 0x75, 0x21, 0x21, 0x21, 0x20, 0x72, | 5554 | "\x79\x6f\x75\x21\x21\x21\x20\x72" |
5526 | 0x65, 0x61, 0x6c, 0x6c, 0x79, 0x21, 0x21, 0x21 }, | 5555 | "\x65\x61\x6c\x6c\x79\x21\x21\x21", |
5527 | .ilen = 32, | 5556 | .ilen = 32, |
5528 | .result = { 0xe0, 0x4d, 0x5d, 0x3c, 0xb7, 0x8c, 0x36, 0x47, | 5557 | .result = "\xe0\x4d\x5d\x3c\xb7\x8c\x36\x47" |
5529 | 0x94, 0x18, 0x95, 0x91, 0xa9, 0xfc, 0x49, 0xf8, | 5558 | "\x94\x18\x95\x91\xa9\xfc\x49\xf8" |
5530 | 0x44, 0xd1, 0x2d, 0xc2, 0x99, 0xb8, 0x08, 0x2a, | 5559 | "\x44\xd1\x2d\xc2\x99\xb8\x08\x2a" |
5531 | 0x07, 0x89, 0x73, 0xc2, 0x45, 0x92, 0xc6, 0x90 }, | 5560 | "\x07\x89\x73\xc2\x45\x92\xc6\x90", |
5532 | .rlen = 32, | 5561 | .rlen = 32, |
5533 | } | 5562 | } |
5534 | }; | 5563 | }; |
5535 | 5564 | ||
5536 | static struct cipher_testvec tea_dec_tv_template[] = { | 5565 | static struct cipher_testvec tea_dec_tv_template[] = { |
5537 | { | 5566 | { |
5538 | .key = { [0 ... 15] = 0x00 }, | 5567 | .key = zeroed_string, |
5539 | .klen = 16, | 5568 | .klen = 16, |
5540 | .input = { 0x0a, 0x3a, 0xea, 0x41, 0x40, 0xa9, 0xba, 0x94 }, | 5569 | .input = "\x0a\x3a\xea\x41\x40\xa9\xba\x94", |
5541 | .ilen = 8, | 5570 | .ilen = 8, |
5542 | .result = { [0 ... 8] = 0x00 }, | 5571 | .result = zeroed_string, |
5543 | .rlen = 8, | 5572 | .rlen = 8, |
5544 | }, { | 5573 | }, { |
5545 | .key = { 0x2b, 0x02, 0x05, 0x68, 0x06, 0x14, 0x49, 0x76, | 5574 | .key = "\x2b\x02\x05\x68\x06\x14\x49\x76" |
5546 | 0x77, 0x5d, 0x0e, 0x26, 0x6c, 0x28, 0x78, 0x43 }, | 5575 | "\x77\x5d\x0e\x26\x6c\x28\x78\x43", |
5547 | .klen = 16, | 5576 | .klen = 16, |
5548 | .input = { 0x77, 0x5d, 0x2a, 0x6a, 0xf6, 0xce, 0x92, 0x09 }, | 5577 | .input = "\x77\x5d\x2a\x6a\xf6\xce\x92\x09", |
5549 | .ilen = 8, | 5578 | .ilen = 8, |
5550 | .result = { 0x74, 0x65, 0x73, 0x74, 0x20, 0x6d, 0x65, 0x2e }, | 5579 | .result = "\x74\x65\x73\x74\x20\x6d\x65\x2e", |
5551 | .rlen = 8, | 5580 | .rlen = 8, |
5552 | }, { | 5581 | }, { |
5553 | .key = { 0x09, 0x65, 0x43, 0x11, 0x66, 0x44, 0x39, 0x25, | 5582 | .key = "\x09\x65\x43\x11\x66\x44\x39\x25" |
5554 | 0x51, 0x3a, 0x16, 0x10, 0x0a, 0x08, 0x12, 0x6e }, | 5583 | "\x51\x3a\x16\x10\x0a\x08\x12\x6e", |
5555 | .klen = 16, | 5584 | .klen = 16, |
5556 | .input = { 0xbe, 0x7a, 0xbb, 0x81, 0x95, 0x2d, 0x1f, 0x1e, | 5585 | .input = "\xbe\x7a\xbb\x81\x95\x2d\x1f\x1e" |
5557 | 0xdd, 0x89, 0xa1, 0x25, 0x04, 0x21, 0xdf, 0x95 }, | 5586 | "\xdd\x89\xa1\x25\x04\x21\xdf\x95", |
5558 | .ilen = 16, | 5587 | .ilen = 16, |
5559 | .result = { 0x6c, 0x6f, 0x6e, 0x67, 0x65, 0x72, 0x5f, 0x74, | 5588 | .result = "\x6c\x6f\x6e\x67\x65\x72\x5f\x74" |
5560 | 0x65, 0x73, 0x74, 0x5f, 0x76, 0x65, 0x63, 0x74 }, | 5589 | "\x65\x73\x74\x5f\x76\x65\x63\x74", |
5561 | .rlen = 16, | 5590 | .rlen = 16, |
5562 | }, { | 5591 | }, { |
5563 | .key = { 0x4d, 0x76, 0x32, 0x17, 0x05, 0x3f, 0x75, 0x2c, | 5592 | .key = "\x4d\x76\x32\x17\x05\x3f\x75\x2c" |
5564 | 0x5d, 0x04, 0x16, 0x36, 0x15, 0x72, 0x63, 0x2f }, | 5593 | "\x5d\x04\x16\x36\x15\x72\x63\x2f", |
5565 | .klen = 16, | 5594 | .klen = 16, |
5566 | .input = { 0xe0, 0x4d, 0x5d, 0x3c, 0xb7, 0x8c, 0x36, 0x47, | 5595 | .input = "\xe0\x4d\x5d\x3c\xb7\x8c\x36\x47" |
5567 | 0x94, 0x18, 0x95, 0x91, 0xa9, 0xfc, 0x49, 0xf8, | 5596 | "\x94\x18\x95\x91\xa9\xfc\x49\xf8" |
5568 | 0x44, 0xd1, 0x2d, 0xc2, 0x99, 0xb8, 0x08, 0x2a, | 5597 | "\x44\xd1\x2d\xc2\x99\xb8\x08\x2a" |
5569 | 0x07, 0x89, 0x73, 0xc2, 0x45, 0x92, 0xc6, 0x90 }, | 5598 | "\x07\x89\x73\xc2\x45\x92\xc6\x90", |
5570 | .ilen = 32, | 5599 | .ilen = 32, |
5571 | .result = { 0x54, 0x65, 0x61, 0x20, 0x69, 0x73, 0x20, 0x67, | 5600 | .result = "\x54\x65\x61\x20\x69\x73\x20\x67" |
5572 | 0x6f, 0x6f, 0x64, 0x20, 0x66, 0x6f, 0x72, 0x20, | 5601 | "\x6f\x6f\x64\x20\x66\x6f\x72\x20" |
5573 | 0x79, 0x6f, 0x75, 0x21, 0x21, 0x21, 0x20, 0x72, | 5602 | "\x79\x6f\x75\x21\x21\x21\x20\x72" |
5574 | 0x65, 0x61, 0x6c, 0x6c, 0x79, 0x21, 0x21, 0x21 }, | 5603 | "\x65\x61\x6c\x6c\x79\x21\x21\x21", |
5575 | .rlen = 32, | 5604 | .rlen = 32, |
5576 | } | 5605 | } |
5577 | }; | 5606 | }; |
@@ -5584,86 +5613,86 @@ static struct cipher_testvec tea_dec_tv_template[] = { | |||
5584 | 5613 | ||
5585 | static struct cipher_testvec xtea_enc_tv_template[] = { | 5614 | static struct cipher_testvec xtea_enc_tv_template[] = { |
5586 | { | 5615 | { |
5587 | .key = { [0 ... 15] = 0x00 }, | 5616 | .key = zeroed_string, |
5588 | .klen = 16, | 5617 | .klen = 16, |
5589 | .input = { [0 ... 8] = 0x00 }, | 5618 | .input = zeroed_string, |
5590 | .ilen = 8, | 5619 | .ilen = 8, |
5591 | .result = { 0xd8, 0xd4, 0xe9, 0xde, 0xd9, 0x1e, 0x13, 0xf7 }, | 5620 | .result = "\xd8\xd4\xe9\xde\xd9\x1e\x13\xf7", |
5592 | .rlen = 8, | 5621 | .rlen = 8, |
5593 | }, { | 5622 | }, { |
5594 | .key = { 0x2b, 0x02, 0x05, 0x68, 0x06, 0x14, 0x49, 0x76, | 5623 | .key = "\x2b\x02\x05\x68\x06\x14\x49\x76" |
5595 | 0x77, 0x5d, 0x0e, 0x26, 0x6c, 0x28, 0x78, 0x43 }, | 5624 | "\x77\x5d\x0e\x26\x6c\x28\x78\x43", |
5596 | .klen = 16, | 5625 | .klen = 16, |
5597 | .input = { 0x74, 0x65, 0x73, 0x74, 0x20, 0x6d, 0x65, 0x2e }, | 5626 | .input = "\x74\x65\x73\x74\x20\x6d\x65\x2e", |
5598 | .ilen = 8, | 5627 | .ilen = 8, |
5599 | .result = { 0x94, 0xeb, 0xc8, 0x96, 0x84, 0x6a, 0x49, 0xa8 }, | 5628 | .result = "\x94\xeb\xc8\x96\x84\x6a\x49\xa8", |
5600 | .rlen = 8, | 5629 | .rlen = 8, |
5601 | }, { | 5630 | }, { |
5602 | .key = { 0x09, 0x65, 0x43, 0x11, 0x66, 0x44, 0x39, 0x25, | 5631 | .key = "\x09\x65\x43\x11\x66\x44\x39\x25" |
5603 | 0x51, 0x3a, 0x16, 0x10, 0x0a, 0x08, 0x12, 0x6e }, | 5632 | "\x51\x3a\x16\x10\x0a\x08\x12\x6e", |
5604 | .klen = 16, | 5633 | .klen = 16, |
5605 | .input = { 0x3e, 0xce, 0xae, 0x22, 0x60, 0x56, 0xa8, 0x9d, | 5634 | .input = "\x6c\x6f\x6e\x67\x65\x72\x5f\x74" |
5606 | 0x65, 0x73, 0x74, 0x5f, 0x76, 0x65, 0x63, 0x74 }, | 5635 | "\x65\x73\x74\x5f\x76\x65\x63\x74", |
5607 | .ilen = 16, | 5636 | .ilen = 16, |
5608 | .result = { 0xe2, 0x04, 0xdb, 0xf2, 0x89, 0x85, 0x9e, 0xea, | 5637 | .result = "\x3e\xce\xae\x22\x60\x56\xa8\x9d" |
5609 | 0x61, 0x35, 0xaa, 0xed, 0xb5, 0xcb, 0x71, 0x2c }, | 5638 | "\x77\x4d\xd4\xb4\x87\x24\xe3\x9a", |
5610 | .rlen = 16, | 5639 | .rlen = 16, |
5611 | }, { | 5640 | }, { |
5612 | .key = { 0x4d, 0x76, 0x32, 0x17, 0x05, 0x3f, 0x75, 0x2c, | 5641 | .key = "\x4d\x76\x32\x17\x05\x3f\x75\x2c" |
5613 | 0x5d, 0x04, 0x16, 0x36, 0x15, 0x72, 0x63, 0x2f }, | 5642 | "\x5d\x04\x16\x36\x15\x72\x63\x2f", |
5614 | .klen = 16, | 5643 | .klen = 16, |
5615 | .input = { 0x54, 0x65, 0x61, 0x20, 0x69, 0x73, 0x20, 0x67, | 5644 | .input = "\x54\x65\x61\x20\x69\x73\x20\x67" |
5616 | 0x6f, 0x6f, 0x64, 0x20, 0x66, 0x6f, 0x72, 0x20, | 5645 | "\x6f\x6f\x64\x20\x66\x6f\x72\x20" |
5617 | 0x79, 0x6f, 0x75, 0x21, 0x21, 0x21, 0x20, 0x72, | 5646 | "\x79\x6f\x75\x21\x21\x21\x20\x72" |
5618 | 0x65, 0x61, 0x6c, 0x6c, 0x79, 0x21, 0x21, 0x21 }, | 5647 | "\x65\x61\x6c\x6c\x79\x21\x21\x21", |
5619 | .ilen = 32, | 5648 | .ilen = 32, |
5620 | .result = { 0x99, 0x81, 0x9f, 0x5d, 0x6f, 0x4b, 0x31, 0x3a, | 5649 | .result = "\x99\x81\x9f\x5d\x6f\x4b\x31\x3a" |
5621 | 0x86, 0xff, 0x6f, 0xd0, 0xe3, 0x87, 0x70, 0x07, | 5650 | "\x86\xff\x6f\xd0\xe3\x87\x70\x07" |
5622 | 0x4d, 0xb8, 0xcf, 0xf3, 0x99, 0x50, 0xb3, 0xd4, | 5651 | "\x4d\xb8\xcf\xf3\x99\x50\xb3\xd4" |
5623 | 0x73, 0xa2, 0xfa, 0xc9, 0x16, 0x59, 0x5d, 0x81 }, | 5652 | "\x73\xa2\xfa\xc9\x16\x59\x5d\x81", |
5624 | .rlen = 32, | 5653 | .rlen = 32, |
5625 | } | 5654 | } |
5626 | }; | 5655 | }; |
5627 | 5656 | ||
5628 | static struct cipher_testvec xtea_dec_tv_template[] = { | 5657 | static struct cipher_testvec xtea_dec_tv_template[] = { |
5629 | { | 5658 | { |
5630 | .key = { [0 ... 15] = 0x00 }, | 5659 | .key = zeroed_string, |
5631 | .klen = 16, | 5660 | .klen = 16, |
5632 | .input = { 0xd8, 0xd4, 0xe9, 0xde, 0xd9, 0x1e, 0x13, 0xf7 }, | 5661 | .input = "\xd8\xd4\xe9\xde\xd9\x1e\x13\xf7", |
5633 | .ilen = 8, | 5662 | .ilen = 8, |
5634 | .result = { [0 ... 8] = 0x00 }, | 5663 | .result = zeroed_string, |
5635 | .rlen = 8, | 5664 | .rlen = 8, |
5636 | }, { | 5665 | }, { |
5637 | .key = { 0x2b, 0x02, 0x05, 0x68, 0x06, 0x14, 0x49, 0x76, | 5666 | .key = "\x2b\x02\x05\x68\x06\x14\x49\x76" |
5638 | 0x77, 0x5d, 0x0e, 0x26, 0x6c, 0x28, 0x78, 0x43 }, | 5667 | "\x77\x5d\x0e\x26\x6c\x28\x78\x43", |
5639 | .klen = 16, | 5668 | .klen = 16, |
5640 | .input = { 0x94, 0xeb, 0xc8, 0x96, 0x84, 0x6a, 0x49, 0xa8 }, | 5669 | .input = "\x94\xeb\xc8\x96\x84\x6a\x49\xa8", |
5641 | .ilen = 8, | 5670 | .ilen = 8, |
5642 | .result = { 0x74, 0x65, 0x73, 0x74, 0x20, 0x6d, 0x65, 0x2e }, | 5671 | .result = "\x74\x65\x73\x74\x20\x6d\x65\x2e", |
5643 | .rlen = 8, | 5672 | .rlen = 8, |
5644 | }, { | 5673 | }, { |
5645 | .key = { 0x09, 0x65, 0x43, 0x11, 0x66, 0x44, 0x39, 0x25, | 5674 | .key = "\x09\x65\x43\x11\x66\x44\x39\x25" |
5646 | 0x51, 0x3a, 0x16, 0x10, 0x0a, 0x08, 0x12, 0x6e }, | 5675 | "\x51\x3a\x16\x10\x0a\x08\x12\x6e", |
5647 | .klen = 16, | 5676 | .klen = 16, |
5648 | .input = { 0x3e, 0xce, 0xae, 0x22, 0x60, 0x56, 0xa8, 0x9d, | 5677 | .input = "\x3e\xce\xae\x22\x60\x56\xa8\x9d" |
5649 | 0x77, 0x4d, 0xd4, 0xb4, 0x87, 0x24, 0xe3, 0x9a }, | 5678 | "\x77\x4d\xd4\xb4\x87\x24\xe3\x9a", |
5650 | .ilen = 16, | 5679 | .ilen = 16, |
5651 | .result = { 0x6c, 0x6f, 0x6e, 0x67, 0x65, 0x72, 0x5f, 0x74, | 5680 | .result = "\x6c\x6f\x6e\x67\x65\x72\x5f\x74" |
5652 | 0x65, 0x73, 0x74, 0x5f, 0x76, 0x65, 0x63, 0x74 }, | 5681 | "\x65\x73\x74\x5f\x76\x65\x63\x74", |
5653 | .rlen = 16, | 5682 | .rlen = 16, |
5654 | }, { | 5683 | }, { |
5655 | .key = { 0x4d, 0x76, 0x32, 0x17, 0x05, 0x3f, 0x75, 0x2c, | 5684 | .key = "\x4d\x76\x32\x17\x05\x3f\x75\x2c" |
5656 | 0x5d, 0x04, 0x16, 0x36, 0x15, 0x72, 0x63, 0x2f }, | 5685 | "\x5d\x04\x16\x36\x15\x72\x63\x2f", |
5657 | .klen = 16, | 5686 | .klen = 16, |
5658 | .input = { 0x99, 0x81, 0x9f, 0x5d, 0x6f, 0x4b, 0x31, 0x3a, | 5687 | .input = "\x99\x81\x9f\x5d\x6f\x4b\x31\x3a" |
5659 | 0x86, 0xff, 0x6f, 0xd0, 0xe3, 0x87, 0x70, 0x07, | 5688 | "\x86\xff\x6f\xd0\xe3\x87\x70\x07" |
5660 | 0x4d, 0xb8, 0xcf, 0xf3, 0x99, 0x50, 0xb3, 0xd4, | 5689 | "\x4d\xb8\xcf\xf3\x99\x50\xb3\xd4" |
5661 | 0x73, 0xa2, 0xfa, 0xc9, 0x16, 0x59, 0x5d, 0x81 }, | 5690 | "\x73\xa2\xfa\xc9\x16\x59\x5d\x81", |
5662 | .ilen = 32, | 5691 | .ilen = 32, |
5663 | .result = { 0x54, 0x65, 0x61, 0x20, 0x69, 0x73, 0x20, 0x67, | 5692 | .result = "\x54\x65\x61\x20\x69\x73\x20\x67" |
5664 | 0x6f, 0x6f, 0x64, 0x20, 0x66, 0x6f, 0x72, 0x20, | 5693 | "\x6f\x6f\x64\x20\x66\x6f\x72\x20" |
5665 | 0x79, 0x6f, 0x75, 0x21, 0x21, 0x21, 0x20, 0x72, | 5694 | "\x79\x6f\x75\x21\x21\x21\x20\x72" |
5666 | 0x65, 0x61, 0x6c, 0x6c, 0x79, 0x21, 0x21, 0x21 }, | 5695 | "\x65\x61\x6c\x6c\x79\x21\x21\x21", |
5667 | .rlen = 32, | 5696 | .rlen = 32, |
5668 | } | 5697 | } |
5669 | }; | 5698 | }; |
@@ -5676,92 +5705,92 @@ static struct cipher_testvec xtea_dec_tv_template[] = { | |||
5676 | 5705 | ||
5677 | static struct cipher_testvec khazad_enc_tv_template[] = { | 5706 | static struct cipher_testvec khazad_enc_tv_template[] = { |
5678 | { | 5707 | { |
5679 | .key = { 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 5708 | .key = "\x80\x00\x00\x00\x00\x00\x00\x00" |
5680 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 5709 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
5681 | .klen = 16, | 5710 | .klen = 16, |
5682 | .input = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 5711 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00", |
5683 | .ilen = 8, | 5712 | .ilen = 8, |
5684 | .result = { 0x49, 0xa4, 0xce, 0x32, 0xac, 0x19, 0x0e, 0x3f }, | 5713 | .result = "\x49\xa4\xce\x32\xac\x19\x0e\x3f", |
5685 | .rlen = 8, | 5714 | .rlen = 8, |
5686 | }, { | 5715 | }, { |
5687 | .key = { 0x38, 0x38, 0x38, 0x38, 0x38, 0x38, 0x38, 0x38, | 5716 | .key = "\x38\x38\x38\x38\x38\x38\x38\x38" |
5688 | 0x38, 0x38, 0x38, 0x38, 0x38, 0x38, 0x38, 0x38 }, | 5717 | "\x38\x38\x38\x38\x38\x38\x38\x38", |
5689 | .klen = 16, | 5718 | .klen = 16, |
5690 | .input = { 0x38, 0x38, 0x38, 0x38, 0x38, 0x38, 0x38, 0x38 }, | 5719 | .input = "\x38\x38\x38\x38\x38\x38\x38\x38", |
5691 | .ilen = 8, | 5720 | .ilen = 8, |
5692 | .result = { 0x7e, 0x82, 0x12, 0xa1, 0Xd9, 0X5b, 0Xe4, 0Xf9 }, | 5721 | .result = "\x7e\x82\x12\xa1\xd9\x5b\xe4\xf9", |
5693 | .rlen = 8, | 5722 | .rlen = 8, |
5694 | }, { | 5723 | }, { |
5695 | .key = { 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, | 5724 | .key = "\xa2\xa2\xa2\xa2\xa2\xa2\xa2\xa2" |
5696 | 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2 }, | 5725 | "\xa2\xa2\xa2\xa2\xa2\xa2\xa2\xa2", |
5697 | .klen = 16, | 5726 | .klen = 16, |
5698 | .input = { 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2 }, | 5727 | .input = "\xa2\xa2\xa2\xa2\xa2\xa2\xa2\xa2", |
5699 | .ilen = 8, | 5728 | .ilen = 8, |
5700 | .result = { 0Xaa, 0Xbe, 0Xc1, 0X95, 0Xc5, 0X94, 0X1a, 0X9c }, | 5729 | .result = "\xaa\xbe\xc1\x95\xc5\x94\x1a\x9c", |
5701 | .rlen = 8, | 5730 | .rlen = 8, |
5702 | }, { | 5731 | }, { |
5703 | .key = { 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, | 5732 | .key = "\x2f\x2f\x2f\x2f\x2f\x2f\x2f\x2f" |
5704 | 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f }, | 5733 | "\x2f\x2f\x2f\x2f\x2f\x2f\x2f\x2f", |
5705 | .klen = 16, | 5734 | .klen = 16, |
5706 | .input = { 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f }, | 5735 | .input = "\x2f\x2f\x2f\x2f\x2f\x2f\x2f\x2f", |
5707 | .ilen = 8, | 5736 | .ilen = 8, |
5708 | .result = { 0X04, 0X74, 0Xf5, 0X70, 0X50, 0X16, 0Xd3, 0Xb8 }, | 5737 | .result = "\x04\x74\xf5\x70\x50\x16\xd3\xb8", |
5709 | .rlen = 8, | 5738 | .rlen = 8, |
5710 | }, { | 5739 | }, { |
5711 | .key = { 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, | 5740 | .key = "\x2f\x2f\x2f\x2f\x2f\x2f\x2f\x2f" |
5712 | 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f }, | 5741 | "\x2f\x2f\x2f\x2f\x2f\x2f\x2f\x2f", |
5713 | .klen = 16, | 5742 | .klen = 16, |
5714 | .input = { 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f , | 5743 | .input = "\x2f\x2f\x2f\x2f\x2f\x2f\x2f\x2f" |
5715 | 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f }, | 5744 | "\x2f\x2f\x2f\x2f\x2f\x2f\x2f\x2f", |
5716 | .ilen = 16, | 5745 | .ilen = 16, |
5717 | .result = { 0X04, 0X74, 0Xf5, 0X70, 0X50, 0X16, 0Xd3, 0Xb8 , | 5746 | .result = "\x04\x74\xf5\x70\x50\x16\xd3\xb8" |
5718 | 0X04, 0X74, 0Xf5, 0X70, 0X50, 0X16, 0Xd3, 0Xb8 }, | 5747 | "\x04\x74\xf5\x70\x50\x16\xd3\xb8", |
5719 | .rlen = 16, | 5748 | .rlen = 16, |
5720 | }, | 5749 | }, |
5721 | }; | 5750 | }; |
5722 | 5751 | ||
5723 | static struct cipher_testvec khazad_dec_tv_template[] = { | 5752 | static struct cipher_testvec khazad_dec_tv_template[] = { |
5724 | { | 5753 | { |
5725 | .key = { 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 5754 | .key = "\x80\x00\x00\x00\x00\x00\x00\x00" |
5726 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 5755 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
5727 | .klen = 16, | 5756 | .klen = 16, |
5728 | .input = { 0X49, 0Xa4, 0Xce, 0X32, 0Xac, 0X19, 0X0e, 0X3f }, | 5757 | .input = "\x49\xa4\xce\x32\xac\x19\x0e\x3f", |
5729 | .ilen = 8, | 5758 | .ilen = 8, |
5730 | .result = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 5759 | .result = "\x00\x00\x00\x00\x00\x00\x00\x00", |
5731 | .rlen = 8, | 5760 | .rlen = 8, |
5732 | }, { | 5761 | }, { |
5733 | .key = { 0x38, 0x38, 0x38, 0x38, 0x38, 0x38, 0x38, 0x38, | 5762 | .key = "\x38\x38\x38\x38\x38\x38\x38\x38" |
5734 | 0x38, 0x38, 0x38, 0x38, 0x38, 0x38, 0x38, 0x38 }, | 5763 | "\x38\x38\x38\x38\x38\x38\x38\x38", |
5735 | .klen = 16, | 5764 | .klen = 16, |
5736 | .input = { 0X7e, 0X82, 0X12, 0Xa1, 0Xd9, 0X5b, 0Xe4, 0Xf9 }, | 5765 | .input = "\x7e\x82\x12\xa1\xd9\x5b\xe4\xf9", |
5737 | .ilen = 8, | 5766 | .ilen = 8, |
5738 | .result = { 0x38, 0x38, 0x38, 0x38, 0x38, 0x38, 0x38, 0x38 }, | 5767 | .result = "\x38\x38\x38\x38\x38\x38\x38\x38", |
5739 | .rlen = 8, | 5768 | .rlen = 8, |
5740 | }, { | 5769 | }, { |
5741 | .key = { 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, | 5770 | .key = "\xa2\xa2\xa2\xa2\xa2\xa2\xa2\xa2" |
5742 | 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2 }, | 5771 | "\xa2\xa2\xa2\xa2\xa2\xa2\xa2\xa2", |
5743 | .klen = 16, | 5772 | .klen = 16, |
5744 | .input = { 0Xaa, 0Xbe, 0Xc1, 0X95, 0Xc5, 0X94, 0X1a, 0X9c }, | 5773 | .input = "\xaa\xbe\xc1\x95\xc5\x94\x1a\x9c", |
5745 | .ilen = 8, | 5774 | .ilen = 8, |
5746 | .result = { 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2, 0Xa2 }, | 5775 | .result = "\xa2\xa2\xa2\xa2\xa2\xa2\xa2\xa2", |
5747 | .rlen = 8, | 5776 | .rlen = 8, |
5748 | }, { | 5777 | }, { |
5749 | .key = { 0x2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, | 5778 | .key = "\x2f\x2f\x2f\x2f\x2f\x2f\x2f\x2f" |
5750 | 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f }, | 5779 | "\x2f\x2f\x2f\x2f\x2f\x2f\x2f\x2f", |
5751 | .klen = 16, | 5780 | .klen = 16, |
5752 | .input = { 0X04, 0X74, 0Xf5, 0X70, 0X50, 0X16, 0Xd3, 0Xb8 }, | 5781 | .input = "\x04\x74\xf5\x70\x50\x16\xd3\xb8", |
5753 | .ilen = 8, | 5782 | .ilen = 8, |
5754 | .result = { 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f }, | 5783 | .result = "\x2f\x2f\x2f\x2f\x2f\x2f\x2f\x2f", |
5755 | .rlen = 8, | 5784 | .rlen = 8, |
5756 | }, { | 5785 | }, { |
5757 | .key = { 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, | 5786 | .key = "\x2f\x2f\x2f\x2f\x2f\x2f\x2f\x2f" |
5758 | 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f }, | 5787 | "\x2f\x2f\x2f\x2f\x2f\x2f\x2f\x2f", |
5759 | .klen = 16, | 5788 | .klen = 16, |
5760 | .input = { 0X04, 0X74, 0Xf5, 0X70, 0X50, 0X16, 0Xd3, 0Xb8 , | 5789 | .input = "\x04\x74\xf5\x70\x50\x16\xd3\xb8" |
5761 | 0X04, 0X74, 0Xf5, 0X70, 0X50, 0X16, 0Xd3, 0Xb8 }, | 5790 | "\x04\x74\xf5\x70\x50\x16\xd3\xb8", |
5762 | .ilen = 16, | 5791 | .ilen = 16, |
5763 | .result = { 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f , | 5792 | .result = "\x2f\x2f\x2f\x2f\x2f\x2f\x2f\x2f" |
5764 | 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f, 0X2f }, | 5793 | "\x2f\x2f\x2f\x2f\x2f\x2f\x2f\x2f", |
5765 | .rlen = 16, | 5794 | .rlen = 16, |
5766 | }, | 5795 | }, |
5767 | }; | 5796 | }; |
@@ -5777,196 +5806,196 @@ static struct cipher_testvec khazad_dec_tv_template[] = { | |||
5777 | 5806 | ||
5778 | static struct cipher_testvec anubis_enc_tv_template[] = { | 5807 | static struct cipher_testvec anubis_enc_tv_template[] = { |
5779 | { | 5808 | { |
5780 | .key = { 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, | 5809 | .key = "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe" |
5781 | 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe }, | 5810 | "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe", |
5782 | .klen = 16, | 5811 | .klen = 16, |
5783 | .input = { 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, | 5812 | .input = "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe" |
5784 | 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe }, | 5813 | "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe", |
5785 | .ilen = 16, | 5814 | .ilen = 16, |
5786 | .result = { 0x6d, 0xc5, 0xda, 0xa2, 0x26, 0x7d, 0x62, 0x6f, | 5815 | .result = "\x6d\xc5\xda\xa2\x26\x7d\x62\x6f" |
5787 | 0x08, 0xb7, 0x52, 0x8e, 0x6e, 0x6e, 0x86, 0x90 }, | 5816 | "\x08\xb7\x52\x8e\x6e\x6e\x86\x90", |
5788 | .rlen = 16, | 5817 | .rlen = 16, |
5789 | }, { | 5818 | }, { |
5790 | 5819 | ||
5791 | .key = { 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, | 5820 | .key = "\x03\x03\x03\x03\x03\x03\x03\x03" |
5792 | 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, | 5821 | "\x03\x03\x03\x03\x03\x03\x03\x03" |
5793 | 0x03, 0x03, 0x03, 0x03 }, | 5822 | "\x03\x03\x03\x03", |
5794 | .klen = 20, | 5823 | .klen = 20, |
5795 | .input = { 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, | 5824 | .input = "\x03\x03\x03\x03\x03\x03\x03\x03" |
5796 | 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03 }, | 5825 | "\x03\x03\x03\x03\x03\x03\x03\x03", |
5797 | .ilen = 16, | 5826 | .ilen = 16, |
5798 | .result = { 0xdb, 0xf1, 0x42, 0xf4, 0xd1, 0x8a, 0xc7, 0x49, | 5827 | .result = "\xdb\xf1\x42\xf4\xd1\x8a\xc7\x49" |
5799 | 0x87, 0x41, 0x6f, 0x82, 0x0a, 0x98, 0x64, 0xae }, | 5828 | "\x87\x41\x6f\x82\x0a\x98\x64\xae", |
5800 | .rlen = 16, | 5829 | .rlen = 16, |
5801 | }, { | 5830 | }, { |
5802 | .key = { 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, | 5831 | .key = "\x24\x24\x24\x24\x24\x24\x24\x24" |
5803 | 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, | 5832 | "\x24\x24\x24\x24\x24\x24\x24\x24" |
5804 | 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, | 5833 | "\x24\x24\x24\x24\x24\x24\x24\x24" |
5805 | 0x24, 0x24, 0x24, 0x24 }, | 5834 | "\x24\x24\x24\x24", |
5806 | .klen = 28, | 5835 | .klen = 28, |
5807 | .input = { 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, | 5836 | .input = "\x24\x24\x24\x24\x24\x24\x24\x24" |
5808 | 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24 }, | 5837 | "\x24\x24\x24\x24\x24\x24\x24\x24", |
5809 | .ilen = 16, | 5838 | .ilen = 16, |
5810 | .result = { 0xfd, 0x1b, 0x4a, 0xe3, 0xbf, 0xf0, 0xad, 0x3d, | 5839 | .result = "\xfd\x1b\x4a\xe3\xbf\xf0\xad\x3d" |
5811 | 0x06, 0xd3, 0x61, 0x27, 0xfd, 0x13, 0x9e, 0xde }, | 5840 | "\x06\xd3\x61\x27\xfd\x13\x9e\xde", |
5812 | .rlen = 16, | 5841 | .rlen = 16, |
5813 | }, { | 5842 | }, { |
5814 | .key = { 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, | 5843 | .key = "\x25\x25\x25\x25\x25\x25\x25\x25" |
5815 | 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, | 5844 | "\x25\x25\x25\x25\x25\x25\x25\x25" |
5816 | 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, | 5845 | "\x25\x25\x25\x25\x25\x25\x25\x25" |
5817 | 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25 }, | 5846 | "\x25\x25\x25\x25\x25\x25\x25\x25", |
5818 | .klen = 32, | 5847 | .klen = 32, |
5819 | .input = { 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, | 5848 | .input = "\x25\x25\x25\x25\x25\x25\x25\x25" |
5820 | 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25 }, | 5849 | "\x25\x25\x25\x25\x25\x25\x25\x25", |
5821 | .ilen = 16, | 5850 | .ilen = 16, |
5822 | .result = { 0x1a, 0x91, 0xfb, 0x2b, 0xb7, 0x78, 0x6b, 0xc4, | 5851 | .result = "\x1a\x91\xfb\x2b\xb7\x78\x6b\xc4" |
5823 | 0x17, 0xd9, 0xff, 0x40, 0x3b, 0x0e, 0xe5, 0xfe }, | 5852 | "\x17\xd9\xff\x40\x3b\x0e\xe5\xfe", |
5824 | .rlen = 16, | 5853 | .rlen = 16, |
5825 | }, { | 5854 | }, { |
5826 | .key = { 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5855 | .key = "\x35\x35\x35\x35\x35\x35\x35\x35" |
5827 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5856 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5828 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5857 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5829 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5858 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5830 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35 }, | 5859 | "\x35\x35\x35\x35\x35\x35\x35\x35", |
5831 | .klen = 40, | 5860 | .klen = 40, |
5832 | .input = { 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5861 | .input = "\x35\x35\x35\x35\x35\x35\x35\x35" |
5833 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35 }, | 5862 | "\x35\x35\x35\x35\x35\x35\x35\x35", |
5834 | .ilen = 16, | 5863 | .ilen = 16, |
5835 | .result = { 0xa5, 0x2c, 0x85, 0x6f, 0x9c, 0xba, 0xa0, 0x97, | 5864 | .result = "\xa5\x2c\x85\x6f\x9c\xba\xa0\x97" |
5836 | 0x9e, 0xc6, 0x84, 0x0f, 0x17, 0x21, 0x07, 0xee }, | 5865 | "\x9e\xc6\x84\x0f\x17\x21\x07\xee", |
5837 | .rlen = 16, | 5866 | .rlen = 16, |
5838 | }, | 5867 | }, |
5839 | }; | 5868 | }; |
5840 | 5869 | ||
5841 | static struct cipher_testvec anubis_dec_tv_template[] = { | 5870 | static struct cipher_testvec anubis_dec_tv_template[] = { |
5842 | { | 5871 | { |
5843 | .key = { 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, | 5872 | .key = "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe" |
5844 | 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe }, | 5873 | "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe", |
5845 | .klen = 16, | 5874 | .klen = 16, |
5846 | .input = { 0x6d, 0xc5, 0xda, 0xa2, 0x26, 0x7d, 0x62, 0x6f, | 5875 | .input = "\x6d\xc5\xda\xa2\x26\x7d\x62\x6f" |
5847 | 0x08, 0xb7, 0x52, 0x8e, 0x6e, 0x6e, 0x86, 0x90 }, | 5876 | "\x08\xb7\x52\x8e\x6e\x6e\x86\x90", |
5848 | .ilen = 16, | 5877 | .ilen = 16, |
5849 | .result = { 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, | 5878 | .result = "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe" |
5850 | 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe }, | 5879 | "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe", |
5851 | .rlen = 16, | 5880 | .rlen = 16, |
5852 | }, { | 5881 | }, { |
5853 | 5882 | ||
5854 | .key = { 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, | 5883 | .key = "\x03\x03\x03\x03\x03\x03\x03\x03" |
5855 | 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, | 5884 | "\x03\x03\x03\x03\x03\x03\x03\x03" |
5856 | 0x03, 0x03, 0x03, 0x03 }, | 5885 | "\x03\x03\x03\x03", |
5857 | .klen = 20, | 5886 | .klen = 20, |
5858 | .input = { 0xdb, 0xf1, 0x42, 0xf4, 0xd1, 0x8a, 0xc7, 0x49, | 5887 | .input = "\xdb\xf1\x42\xf4\xd1\x8a\xc7\x49" |
5859 | 0x87, 0x41, 0x6f, 0x82, 0x0a, 0x98, 0x64, 0xae }, | 5888 | "\x87\x41\x6f\x82\x0a\x98\x64\xae", |
5860 | .ilen = 16, | 5889 | .ilen = 16, |
5861 | .result = { 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, | 5890 | .result = "\x03\x03\x03\x03\x03\x03\x03\x03" |
5862 | 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03, 0x03 }, | 5891 | "\x03\x03\x03\x03\x03\x03\x03\x03", |
5863 | .rlen = 16, | 5892 | .rlen = 16, |
5864 | }, { | 5893 | }, { |
5865 | .key = { 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, | 5894 | .key = "\x24\x24\x24\x24\x24\x24\x24\x24" |
5866 | 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, | 5895 | "\x24\x24\x24\x24\x24\x24\x24\x24" |
5867 | 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, | 5896 | "\x24\x24\x24\x24\x24\x24\x24\x24" |
5868 | 0x24, 0x24, 0x24, 0x24 }, | 5897 | "\x24\x24\x24\x24", |
5869 | .klen = 28, | 5898 | .klen = 28, |
5870 | .input = { 0xfd, 0x1b, 0x4a, 0xe3, 0xbf, 0xf0, 0xad, 0x3d, | 5899 | .input = "\xfd\x1b\x4a\xe3\xbf\xf0\xad\x3d" |
5871 | 0x06, 0xd3, 0x61, 0x27, 0xfd, 0x13, 0x9e, 0xde }, | 5900 | "\x06\xd3\x61\x27\xfd\x13\x9e\xde", |
5872 | .ilen = 16, | 5901 | .ilen = 16, |
5873 | .result = { 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, | 5902 | .result = "\x24\x24\x24\x24\x24\x24\x24\x24" |
5874 | 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24, 0x24 }, | 5903 | "\x24\x24\x24\x24\x24\x24\x24\x24", |
5875 | .rlen = 16, | 5904 | .rlen = 16, |
5876 | }, { | 5905 | }, { |
5877 | .key = { 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, | 5906 | .key = "\x25\x25\x25\x25\x25\x25\x25\x25" |
5878 | 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, | 5907 | "\x25\x25\x25\x25\x25\x25\x25\x25" |
5879 | 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, | 5908 | "\x25\x25\x25\x25\x25\x25\x25\x25" |
5880 | 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25 }, | 5909 | "\x25\x25\x25\x25\x25\x25\x25\x25", |
5881 | .klen = 32, | 5910 | .klen = 32, |
5882 | .input = { 0x1a, 0x91, 0xfb, 0x2b, 0xb7, 0x78, 0x6b, 0xc4, | 5911 | .input = "\x1a\x91\xfb\x2b\xb7\x78\x6b\xc4" |
5883 | 0x17, 0xd9, 0xff, 0x40, 0x3b, 0x0e, 0xe5, 0xfe }, | 5912 | "\x17\xd9\xff\x40\x3b\x0e\xe5\xfe", |
5884 | .ilen = 16, | 5913 | .ilen = 16, |
5885 | .result = { 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, | 5914 | .result = "\x25\x25\x25\x25\x25\x25\x25\x25" |
5886 | 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25, 0x25 }, | 5915 | "\x25\x25\x25\x25\x25\x25\x25\x25", |
5887 | .rlen = 16, | 5916 | .rlen = 16, |
5888 | }, { | 5917 | }, { |
5889 | .key = { 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5918 | .key = "\x35\x35\x35\x35\x35\x35\x35\x35" |
5890 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5919 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5891 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5920 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5892 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5921 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5893 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35 }, | 5922 | "\x35\x35\x35\x35\x35\x35\x35\x35", |
5894 | .input = { 0xa5, 0x2c, 0x85, 0x6f, 0x9c, 0xba, 0xa0, 0x97, | 5923 | .input = "\xa5\x2c\x85\x6f\x9c\xba\xa0\x97" |
5895 | 0x9e, 0xc6, 0x84, 0x0f, 0x17, 0x21, 0x07, 0xee }, | 5924 | "\x9e\xc6\x84\x0f\x17\x21\x07\xee", |
5896 | .klen = 40, | 5925 | .klen = 40, |
5897 | .ilen = 16, | 5926 | .ilen = 16, |
5898 | .result = { 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5927 | .result = "\x35\x35\x35\x35\x35\x35\x35\x35" |
5899 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35 }, | 5928 | "\x35\x35\x35\x35\x35\x35\x35\x35", |
5900 | .rlen = 16, | 5929 | .rlen = 16, |
5901 | }, | 5930 | }, |
5902 | }; | 5931 | }; |
5903 | 5932 | ||
5904 | static struct cipher_testvec anubis_cbc_enc_tv_template[] = { | 5933 | static struct cipher_testvec anubis_cbc_enc_tv_template[] = { |
5905 | { | 5934 | { |
5906 | .key = { 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, | 5935 | .key = "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe" |
5907 | 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe }, | 5936 | "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe", |
5908 | .klen = 16, | 5937 | .klen = 16, |
5909 | .input = { 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, | 5938 | .input = "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe" |
5910 | 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, | 5939 | "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe" |
5911 | 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, | 5940 | "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe" |
5912 | 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe }, | 5941 | "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe", |
5913 | .ilen = 32, | 5942 | .ilen = 32, |
5914 | .result = { 0x6d, 0xc5, 0xda, 0xa2, 0x26, 0x7d, 0x62, 0x6f, | 5943 | .result = "\x6d\xc5\xda\xa2\x26\x7d\x62\x6f" |
5915 | 0x08, 0xb7, 0x52, 0x8e, 0x6e, 0x6e, 0x86, 0x90, | 5944 | "\x08\xb7\x52\x8e\x6e\x6e\x86\x90" |
5916 | 0x86, 0xd8, 0xb5, 0x6f, 0x98, 0x5e, 0x8a, 0x66, | 5945 | "\x86\xd8\xb5\x6f\x98\x5e\x8a\x66" |
5917 | 0x4f, 0x1f, 0x78, 0xa1, 0xbb, 0x37, 0xf1, 0xbe }, | 5946 | "\x4f\x1f\x78\xa1\xbb\x37\xf1\xbe", |
5918 | .rlen = 32, | 5947 | .rlen = 32, |
5919 | }, { | 5948 | }, { |
5920 | .key = { 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5949 | .key = "\x35\x35\x35\x35\x35\x35\x35\x35" |
5921 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5950 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5922 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5951 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5923 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5952 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5924 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35 }, | 5953 | "\x35\x35\x35\x35\x35\x35\x35\x35", |
5925 | .klen = 40, | 5954 | .klen = 40, |
5926 | .input = { 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5955 | .input = "\x35\x35\x35\x35\x35\x35\x35\x35" |
5927 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5956 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5928 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5957 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5929 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35 }, | 5958 | "\x35\x35\x35\x35\x35\x35\x35\x35", |
5930 | .ilen = 32, | 5959 | .ilen = 32, |
5931 | .result = { 0xa5, 0x2c, 0x85, 0x6f, 0x9c, 0xba, 0xa0, 0x97, | 5960 | .result = "\xa5\x2c\x85\x6f\x9c\xba\xa0\x97" |
5932 | 0x9e, 0xc6, 0x84, 0x0f, 0x17, 0x21, 0x07, 0xee, | 5961 | "\x9e\xc6\x84\x0f\x17\x21\x07\xee" |
5933 | 0xa2, 0xbc, 0x06, 0x98, 0xc6, 0x4b, 0xda, 0x75, | 5962 | "\xa2\xbc\x06\x98\xc6\x4b\xda\x75" |
5934 | 0x2e, 0xaa, 0xbe, 0x58, 0xce, 0x01, 0x5b, 0xc7 }, | 5963 | "\x2e\xaa\xbe\x58\xce\x01\x5b\xc7", |
5935 | .rlen = 32, | 5964 | .rlen = 32, |
5936 | }, | 5965 | }, |
5937 | }; | 5966 | }; |
5938 | 5967 | ||
5939 | static struct cipher_testvec anubis_cbc_dec_tv_template[] = { | 5968 | static struct cipher_testvec anubis_cbc_dec_tv_template[] = { |
5940 | { | 5969 | { |
5941 | .key = { 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, | 5970 | .key = "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe" |
5942 | 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe }, | 5971 | "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe", |
5943 | .klen = 16, | 5972 | .klen = 16, |
5944 | .input = { 0x6d, 0xc5, 0xda, 0xa2, 0x26, 0x7d, 0x62, 0x6f, | 5973 | .input = "\x6d\xc5\xda\xa2\x26\x7d\x62\x6f" |
5945 | 0x08, 0xb7, 0x52, 0x8e, 0x6e, 0x6e, 0x86, 0x90, | 5974 | "\x08\xb7\x52\x8e\x6e\x6e\x86\x90" |
5946 | 0x86, 0xd8, 0xb5, 0x6f, 0x98, 0x5e, 0x8a, 0x66, | 5975 | "\x86\xd8\xb5\x6f\x98\x5e\x8a\x66" |
5947 | 0x4f, 0x1f, 0x78, 0xa1, 0xbb, 0x37, 0xf1, 0xbe }, | 5976 | "\x4f\x1f\x78\xa1\xbb\x37\xf1\xbe", |
5948 | .ilen = 32, | 5977 | .ilen = 32, |
5949 | .result = { 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, | 5978 | .result = "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe" |
5950 | 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, | 5979 | "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe" |
5951 | 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, | 5980 | "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe" |
5952 | 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe, 0xfe }, | 5981 | "\xfe\xfe\xfe\xfe\xfe\xfe\xfe\xfe", |
5953 | .rlen = 32, | 5982 | .rlen = 32, |
5954 | }, { | 5983 | }, { |
5955 | .key = { 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5984 | .key = "\x35\x35\x35\x35\x35\x35\x35\x35" |
5956 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5985 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5957 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5986 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5958 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5987 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5959 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35 }, | 5988 | "\x35\x35\x35\x35\x35\x35\x35\x35", |
5960 | .klen = 40, | 5989 | .klen = 40, |
5961 | .input = { 0xa5, 0x2c, 0x85, 0x6f, 0x9c, 0xba, 0xa0, 0x97, | 5990 | .input = "\xa5\x2c\x85\x6f\x9c\xba\xa0\x97" |
5962 | 0x9e, 0xc6, 0x84, 0x0f, 0x17, 0x21, 0x07, 0xee, | 5991 | "\x9e\xc6\x84\x0f\x17\x21\x07\xee" |
5963 | 0xa2, 0xbc, 0x06, 0x98, 0xc6, 0x4b, 0xda, 0x75, | 5992 | "\xa2\xbc\x06\x98\xc6\x4b\xda\x75" |
5964 | 0x2e, 0xaa, 0xbe, 0x58, 0xce, 0x01, 0x5b, 0xc7 }, | 5993 | "\x2e\xaa\xbe\x58\xce\x01\x5b\xc7", |
5965 | .ilen = 32, | 5994 | .ilen = 32, |
5966 | .result = { 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5995 | .result = "\x35\x35\x35\x35\x35\x35\x35\x35" |
5967 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5996 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5968 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, | 5997 | "\x35\x35\x35\x35\x35\x35\x35\x35" |
5969 | 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35, 0x35 }, | 5998 | "\x35\x35\x35\x35\x35\x35\x35\x35", |
5970 | .rlen = 32, | 5999 | .rlen = 32, |
5971 | }, | 6000 | }, |
5972 | }; | 6001 | }; |
@@ -5979,86 +6008,86 @@ static struct cipher_testvec anubis_cbc_dec_tv_template[] = { | |||
5979 | 6008 | ||
5980 | static struct cipher_testvec xeta_enc_tv_template[] = { | 6009 | static struct cipher_testvec xeta_enc_tv_template[] = { |
5981 | { | 6010 | { |
5982 | .key = { [0 ... 15] = 0x00 }, | 6011 | .key = zeroed_string, |
5983 | .klen = 16, | 6012 | .klen = 16, |
5984 | .input = { [0 ... 8] = 0x00 }, | 6013 | .input = zeroed_string, |
5985 | .ilen = 8, | 6014 | .ilen = 8, |
5986 | .result = { 0xaa, 0x22, 0x96, 0xe5, 0x6c, 0x61, 0xf3, 0x45 }, | 6015 | .result = "\xaa\x22\x96\xe5\x6c\x61\xf3\x45", |
5987 | .rlen = 8, | 6016 | .rlen = 8, |
5988 | }, { | 6017 | }, { |
5989 | .key = { 0x2b, 0x02, 0x05, 0x68, 0x06, 0x14, 0x49, 0x76, | 6018 | .key = "\x2b\x02\x05\x68\x06\x14\x49\x76" |
5990 | 0x77, 0x5d, 0x0e, 0x26, 0x6c, 0x28, 0x78, 0x43 }, | 6019 | "\x77\x5d\x0e\x26\x6c\x28\x78\x43", |
5991 | .klen = 16, | 6020 | .klen = 16, |
5992 | .input = { 0x74, 0x65, 0x73, 0x74, 0x20, 0x6d, 0x65, 0x2e }, | 6021 | .input = "\x74\x65\x73\x74\x20\x6d\x65\x2e", |
5993 | .ilen = 8, | 6022 | .ilen = 8, |
5994 | .result = { 0x82, 0x3e, 0xeb, 0x35, 0xdc, 0xdd, 0xd9, 0xc3 }, | 6023 | .result = "\x82\x3e\xeb\x35\xdc\xdd\xd9\xc3", |
5995 | .rlen = 8, | 6024 | .rlen = 8, |
5996 | }, { | 6025 | }, { |
5997 | .key = { 0x09, 0x65, 0x43, 0x11, 0x66, 0x44, 0x39, 0x25, | 6026 | .key = "\x09\x65\x43\x11\x66\x44\x39\x25" |
5998 | 0x51, 0x3a, 0x16, 0x10, 0x0a, 0x08, 0x12, 0x6e }, | 6027 | "\x51\x3a\x16\x10\x0a\x08\x12\x6e", |
5999 | .klen = 16, | 6028 | .klen = 16, |
6000 | .input = { 0x6c, 0x6f, 0x6e, 0x67, 0x65, 0x72, 0x5f, 0x74, | 6029 | .input = "\x6c\x6f\x6e\x67\x65\x72\x5f\x74" |
6001 | 0x65, 0x73, 0x74, 0x5f, 0x76, 0x65, 0x63, 0x74 }, | 6030 | "\x65\x73\x74\x5f\x76\x65\x63\x74", |
6002 | .ilen = 16, | 6031 | .ilen = 16, |
6003 | .result = { 0xe2, 0x04, 0xdb, 0xf2, 0x89, 0x85, 0x9e, 0xea, | 6032 | .result = "\xe2\x04\xdb\xf2\x89\x85\x9e\xea" |
6004 | 0x61, 0x35, 0xaa, 0xed, 0xb5, 0xcb, 0x71, 0x2c }, | 6033 | "\x61\x35\xaa\xed\xb5\xcb\x71\x2c", |
6005 | .rlen = 16, | 6034 | .rlen = 16, |
6006 | }, { | 6035 | }, { |
6007 | .key = { 0x4d, 0x76, 0x32, 0x17, 0x05, 0x3f, 0x75, 0x2c, | 6036 | .key = "\x4d\x76\x32\x17\x05\x3f\x75\x2c" |
6008 | 0x5d, 0x04, 0x16, 0x36, 0x15, 0x72, 0x63, 0x2f }, | 6037 | "\x5d\x04\x16\x36\x15\x72\x63\x2f", |
6009 | .klen = 16, | 6038 | .klen = 16, |
6010 | .input = { 0x54, 0x65, 0x61, 0x20, 0x69, 0x73, 0x20, 0x67, | 6039 | .input = "\x54\x65\x61\x20\x69\x73\x20\x67" |
6011 | 0x6f, 0x6f, 0x64, 0x20, 0x66, 0x6f, 0x72, 0x20, | 6040 | "\x6f\x6f\x64\x20\x66\x6f\x72\x20" |
6012 | 0x79, 0x6f, 0x75, 0x21, 0x21, 0x21, 0x20, 0x72, | 6041 | "\x79\x6f\x75\x21\x21\x21\x20\x72" |
6013 | 0x65, 0x61, 0x6c, 0x6c, 0x79, 0x21, 0x21, 0x21 }, | 6042 | "\x65\x61\x6c\x6c\x79\x21\x21\x21", |
6014 | .ilen = 32, | 6043 | .ilen = 32, |
6015 | .result = { 0x0b, 0x03, 0xcd, 0x8a, 0xbe, 0x95, 0xfd, 0xb1, | 6044 | .result = "\x0b\x03\xcd\x8a\xbe\x95\xfd\xb1" |
6016 | 0xc1, 0x44, 0x91, 0x0b, 0xa5, 0xc9, 0x1b, 0xb4, | 6045 | "\xc1\x44\x91\x0b\xa5\xc9\x1b\xb4" |
6017 | 0xa9, 0xda, 0x1e, 0x9e, 0xb1, 0x3e, 0x2a, 0x8f, | 6046 | "\xa9\xda\x1e\x9e\xb1\x3e\x2a\x8f" |
6018 | 0xea, 0xa5, 0x6a, 0x85, 0xd1, 0xf4, 0xa8, 0xa5 }, | 6047 | "\xea\xa5\x6a\x85\xd1\xf4\xa8\xa5", |
6019 | .rlen = 32, | 6048 | .rlen = 32, |
6020 | } | 6049 | } |
6021 | }; | 6050 | }; |
6022 | 6051 | ||
6023 | static struct cipher_testvec xeta_dec_tv_template[] = { | 6052 | static struct cipher_testvec xeta_dec_tv_template[] = { |
6024 | { | 6053 | { |
6025 | .key = { [0 ... 15] = 0x00 }, | 6054 | .key = zeroed_string, |
6026 | .klen = 16, | 6055 | .klen = 16, |
6027 | .input = { 0xaa, 0x22, 0x96, 0xe5, 0x6c, 0x61, 0xf3, 0x45 }, | 6056 | .input = "\xaa\x22\x96\xe5\x6c\x61\xf3\x45", |
6028 | .ilen = 8, | 6057 | .ilen = 8, |
6029 | .result = { [0 ... 8] = 0x00 }, | 6058 | .result = zeroed_string, |
6030 | .rlen = 8, | 6059 | .rlen = 8, |
6031 | }, { | 6060 | }, { |
6032 | .key = { 0x2b, 0x02, 0x05, 0x68, 0x06, 0x14, 0x49, 0x76, | 6061 | .key = "\x2b\x02\x05\x68\x06\x14\x49\x76" |
6033 | 0x77, 0x5d, 0x0e, 0x26, 0x6c, 0x28, 0x78, 0x43 }, | 6062 | "\x77\x5d\x0e\x26\x6c\x28\x78\x43", |
6034 | .klen = 16, | 6063 | .klen = 16, |
6035 | .input = { 0x82, 0x3e, 0xeb, 0x35, 0xdc, 0xdd, 0xd9, 0xc3 }, | 6064 | .input = "\x82\x3e\xeb\x35\xdc\xdd\xd9\xc3", |
6036 | .ilen = 8, | 6065 | .ilen = 8, |
6037 | .result = { 0x74, 0x65, 0x73, 0x74, 0x20, 0x6d, 0x65, 0x2e }, | 6066 | .result = "\x74\x65\x73\x74\x20\x6d\x65\x2e", |
6038 | .rlen = 8, | 6067 | .rlen = 8, |
6039 | }, { | 6068 | }, { |
6040 | .key = { 0x09, 0x65, 0x43, 0x11, 0x66, 0x44, 0x39, 0x25, | 6069 | .key = "\x09\x65\x43\x11\x66\x44\x39\x25" |
6041 | 0x51, 0x3a, 0x16, 0x10, 0x0a, 0x08, 0x12, 0x6e }, | 6070 | "\x51\x3a\x16\x10\x0a\x08\x12\x6e", |
6042 | .klen = 16, | 6071 | .klen = 16, |
6043 | .input = { 0xe2, 0x04, 0xdb, 0xf2, 0x89, 0x85, 0x9e, 0xea, | 6072 | .input = "\xe2\x04\xdb\xf2\x89\x85\x9e\xea" |
6044 | 0x61, 0x35, 0xaa, 0xed, 0xb5, 0xcb, 0x71, 0x2c }, | 6073 | "\x61\x35\xaa\xed\xb5\xcb\x71\x2c", |
6045 | .ilen = 16, | 6074 | .ilen = 16, |
6046 | .result = { 0x6c, 0x6f, 0x6e, 0x67, 0x65, 0x72, 0x5f, 0x74, | 6075 | .result = "\x6c\x6f\x6e\x67\x65\x72\x5f\x74" |
6047 | 0x65, 0x73, 0x74, 0x5f, 0x76, 0x65, 0x63, 0x74 }, | 6076 | "\x65\x73\x74\x5f\x76\x65\x63\x74", |
6048 | .rlen = 16, | 6077 | .rlen = 16, |
6049 | }, { | 6078 | }, { |
6050 | .key = { 0x4d, 0x76, 0x32, 0x17, 0x05, 0x3f, 0x75, 0x2c, | 6079 | .key = "\x4d\x76\x32\x17\x05\x3f\x75\x2c" |
6051 | 0x5d, 0x04, 0x16, 0x36, 0x15, 0x72, 0x63, 0x2f }, | 6080 | "\x5d\x04\x16\x36\x15\x72\x63\x2f", |
6052 | .klen = 16, | 6081 | .klen = 16, |
6053 | .input = { 0x0b, 0x03, 0xcd, 0x8a, 0xbe, 0x95, 0xfd, 0xb1, | 6082 | .input = "\x0b\x03\xcd\x8a\xbe\x95\xfd\xb1" |
6054 | 0xc1, 0x44, 0x91, 0x0b, 0xa5, 0xc9, 0x1b, 0xb4, | 6083 | "\xc1\x44\x91\x0b\xa5\xc9\x1b\xb4" |
6055 | 0xa9, 0xda, 0x1e, 0x9e, 0xb1, 0x3e, 0x2a, 0x8f, | 6084 | "\xa9\xda\x1e\x9e\xb1\x3e\x2a\x8f" |
6056 | 0xea, 0xa5, 0x6a, 0x85, 0xd1, 0xf4, 0xa8, 0xa5 }, | 6085 | "\xea\xa5\x6a\x85\xd1\xf4\xa8\xa5", |
6057 | .ilen = 32, | 6086 | .ilen = 32, |
6058 | .result = { 0x54, 0x65, 0x61, 0x20, 0x69, 0x73, 0x20, 0x67, | 6087 | .result = "\x54\x65\x61\x20\x69\x73\x20\x67" |
6059 | 0x6f, 0x6f, 0x64, 0x20, 0x66, 0x6f, 0x72, 0x20, | 6088 | "\x6f\x6f\x64\x20\x66\x6f\x72\x20" |
6060 | 0x79, 0x6f, 0x75, 0x21, 0x21, 0x21, 0x20, 0x72, | 6089 | "\x79\x6f\x75\x21\x21\x21\x20\x72" |
6061 | 0x65, 0x61, 0x6c, 0x6c, 0x79, 0x21, 0x21, 0x21 }, | 6090 | "\x65\x61\x6c\x6c\x79\x21\x21\x21", |
6062 | .rlen = 32, | 6091 | .rlen = 32, |
6063 | } | 6092 | } |
6064 | }; | 6093 | }; |
@@ -6071,59 +6100,59 @@ static struct cipher_testvec xeta_dec_tv_template[] = { | |||
6071 | 6100 | ||
6072 | static struct cipher_testvec fcrypt_pcbc_enc_tv_template[] = { | 6101 | static struct cipher_testvec fcrypt_pcbc_enc_tv_template[] = { |
6073 | { /* http://www.openafs.org/pipermail/openafs-devel/2000-December/005320.html */ | 6102 | { /* http://www.openafs.org/pipermail/openafs-devel/2000-December/005320.html */ |
6074 | .key = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 6103 | .key = "\x00\x00\x00\x00\x00\x00\x00\x00", |
6075 | .klen = 8, | 6104 | .klen = 8, |
6076 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 6105 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00", |
6077 | .input = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 6106 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00", |
6078 | .ilen = 8, | 6107 | .ilen = 8, |
6079 | .result = { 0x0E, 0x09, 0x00, 0xC7, 0x3E, 0xF7, 0xED, 0x41 }, | 6108 | .result = "\x0E\x09\x00\xC7\x3E\xF7\xED\x41", |
6080 | .rlen = 8, | 6109 | .rlen = 8, |
6081 | }, { | 6110 | }, { |
6082 | .key = { 0x11, 0x44, 0x77, 0xAA, 0xDD, 0x00, 0x33, 0x66 }, | 6111 | .key = "\x11\x44\x77\xAA\xDD\x00\x33\x66", |
6083 | .klen = 8, | 6112 | .klen = 8, |
6084 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 6113 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00", |
6085 | .input = { 0x12, 0x34, 0x56, 0x78, 0x9A, 0xBC, 0xDE, 0xF0 }, | 6114 | .input = "\x12\x34\x56\x78\x9A\xBC\xDE\xF0", |
6086 | .ilen = 8, | 6115 | .ilen = 8, |
6087 | .result = { 0xD8, 0xED, 0x78, 0x74, 0x77, 0xEC, 0x06, 0x80 }, | 6116 | .result = "\xD8\xED\x78\x74\x77\xEC\x06\x80", |
6088 | .rlen = 8, | 6117 | .rlen = 8, |
6089 | }, { /* From Arla */ | 6118 | }, { /* From Arla */ |
6090 | .key = { 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87 }, | 6119 | .key = "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87", |
6091 | .klen = 8, | 6120 | .klen = 8, |
6092 | .iv = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 6121 | .iv = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
6093 | .input = "The quick brown fox jumps over the lazy dogs.\0\0", | 6122 | .input = "The quick brown fox jumps over the lazy dogs.\0\0", |
6094 | .ilen = 48, | 6123 | .ilen = 48, |
6095 | .result = { 0x00, 0xf0, 0xe, 0x11, 0x75, 0xe6, 0x23, 0x82, | 6124 | .result = "\x00\xf0\x0e\x11\x75\xe6\x23\x82" |
6096 | 0xee, 0xac, 0x98, 0x62, 0x44, 0x51, 0xe4, 0x84, | 6125 | "\xee\xac\x98\x62\x44\x51\xe4\x84" |
6097 | 0xc3, 0x59, 0xd8, 0xaa, 0x64, 0x60, 0xae, 0xf7, | 6126 | "\xc3\x59\xd8\xaa\x64\x60\xae\xf7" |
6098 | 0xd2, 0xd9, 0x13, 0x79, 0x72, 0xa3, 0x45, 0x03, | 6127 | "\xd2\xd9\x13\x79\x72\xa3\x45\x03" |
6099 | 0x23, 0xb5, 0x62, 0xd7, 0x0c, 0xf5, 0x27, 0xd1, | 6128 | "\x23\xb5\x62\xd7\x0c\xf5\x27\xd1" |
6100 | 0xf8, 0x91, 0x3c, 0xac, 0x44, 0x22, 0x92, 0xef }, | 6129 | "\xf8\x91\x3c\xac\x44\x22\x92\xef", |
6101 | .rlen = 48, | 6130 | .rlen = 48, |
6102 | }, { | 6131 | }, { |
6103 | .key = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 6132 | .key = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
6104 | .klen = 8, | 6133 | .klen = 8, |
6105 | .iv = { 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87 }, | 6134 | .iv = "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87", |
6106 | .input = "The quick brown fox jumps over the lazy dogs.\0\0", | 6135 | .input = "The quick brown fox jumps over the lazy dogs.\0\0", |
6107 | .ilen = 48, | 6136 | .ilen = 48, |
6108 | .result = { 0xca, 0x90, 0xf5, 0x9d, 0xcb, 0xd4, 0xd2, 0x3c, | 6137 | .result = "\xca\x90\xf5\x9d\xcb\xd4\xd2\x3c" |
6109 | 0x01, 0x88, 0x7f, 0x3e, 0x31, 0x6e, 0x62, 0x9d, | 6138 | "\x01\x88\x7f\x3e\x31\x6e\x62\x9d" |
6110 | 0xd8, 0xe0, 0x57, 0xa3, 0x06, 0x3a, 0x42, 0x58, | 6139 | "\xd8\xe0\x57\xa3\x06\x3a\x42\x58" |
6111 | 0x2a, 0x28, 0xfe, 0x72, 0x52, 0x2f, 0xdd, 0xe0, | 6140 | "\x2a\x28\xfe\x72\x52\x2f\xdd\xe0" |
6112 | 0x19, 0x89, 0x09, 0x1c, 0x2a, 0x8e, 0x8c, 0x94, | 6141 | "\x19\x89\x09\x1c\x2a\x8e\x8c\x94" |
6113 | 0xfc, 0xc7, 0x68, 0xe4, 0x88, 0xaa, 0xde, 0x0f }, | 6142 | "\xfc\xc7\x68\xe4\x88\xaa\xde\x0f", |
6114 | .rlen = 48, | 6143 | .rlen = 48, |
6115 | }, { /* split-page version */ | 6144 | }, { /* split-page version */ |
6116 | .key = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 6145 | .key = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
6117 | .klen = 8, | 6146 | .klen = 8, |
6118 | .iv = { 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87 }, | 6147 | .iv = "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87", |
6119 | .input = "The quick brown fox jumps over the lazy dogs.\0\0", | 6148 | .input = "The quick brown fox jumps over the lazy dogs.\0\0", |
6120 | .ilen = 48, | 6149 | .ilen = 48, |
6121 | .result = { 0xca, 0x90, 0xf5, 0x9d, 0xcb, 0xd4, 0xd2, 0x3c, | 6150 | .result = "\xca\x90\xf5\x9d\xcb\xd4\xd2\x3c" |
6122 | 0x01, 0x88, 0x7f, 0x3e, 0x31, 0x6e, 0x62, 0x9d, | 6151 | "\x01\x88\x7f\x3e\x31\x6e\x62\x9d" |
6123 | 0xd8, 0xe0, 0x57, 0xa3, 0x06, 0x3a, 0x42, 0x58, | 6152 | "\xd8\xe0\x57\xa3\x06\x3a\x42\x58" |
6124 | 0x2a, 0x28, 0xfe, 0x72, 0x52, 0x2f, 0xdd, 0xe0, | 6153 | "\x2a\x28\xfe\x72\x52\x2f\xdd\xe0" |
6125 | 0x19, 0x89, 0x09, 0x1c, 0x2a, 0x8e, 0x8c, 0x94, | 6154 | "\x19\x89\x09\x1c\x2a\x8e\x8c\x94" |
6126 | 0xfc, 0xc7, 0x68, 0xe4, 0x88, 0xaa, 0xde, 0x0f }, | 6155 | "\xfc\xc7\x68\xe4\x88\xaa\xde\x0f", |
6127 | .rlen = 48, | 6156 | .rlen = 48, |
6128 | .np = 2, | 6157 | .np = 2, |
6129 | .tap = { 20, 28 }, | 6158 | .tap = { 20, 28 }, |
@@ -6132,57 +6161,57 @@ static struct cipher_testvec fcrypt_pcbc_enc_tv_template[] = { | |||
6132 | 6161 | ||
6133 | static struct cipher_testvec fcrypt_pcbc_dec_tv_template[] = { | 6162 | static struct cipher_testvec fcrypt_pcbc_dec_tv_template[] = { |
6134 | { /* http://www.openafs.org/pipermail/openafs-devel/2000-December/005320.html */ | 6163 | { /* http://www.openafs.org/pipermail/openafs-devel/2000-December/005320.html */ |
6135 | .key = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 6164 | .key = "\x00\x00\x00\x00\x00\x00\x00\x00", |
6136 | .klen = 8, | 6165 | .klen = 8, |
6137 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 6166 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00", |
6138 | .input = { 0x0E, 0x09, 0x00, 0xC7, 0x3E, 0xF7, 0xED, 0x41 }, | 6167 | .input = "\x0E\x09\x00\xC7\x3E\xF7\xED\x41", |
6139 | .ilen = 8, | 6168 | .ilen = 8, |
6140 | .result = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 6169 | .result = "\x00\x00\x00\x00\x00\x00\x00\x00", |
6141 | .rlen = 8, | 6170 | .rlen = 8, |
6142 | }, { | 6171 | }, { |
6143 | .key = { 0x11, 0x44, 0x77, 0xAA, 0xDD, 0x00, 0x33, 0x66 }, | 6172 | .key = "\x11\x44\x77\xAA\xDD\x00\x33\x66", |
6144 | .klen = 8, | 6173 | .klen = 8, |
6145 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 6174 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00", |
6146 | .input = { 0xD8, 0xED, 0x78, 0x74, 0x77, 0xEC, 0x06, 0x80 }, | 6175 | .input = "\xD8\xED\x78\x74\x77\xEC\x06\x80", |
6147 | .ilen = 8, | 6176 | .ilen = 8, |
6148 | .result = { 0x12, 0x34, 0x56, 0x78, 0x9A, 0xBC, 0xDE, 0xF0 }, | 6177 | .result = "\x12\x34\x56\x78\x9A\xBC\xDE\xF0", |
6149 | .rlen = 8, | 6178 | .rlen = 8, |
6150 | }, { /* From Arla */ | 6179 | }, { /* From Arla */ |
6151 | .key = { 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87 }, | 6180 | .key = "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87", |
6152 | .klen = 8, | 6181 | .klen = 8, |
6153 | .iv = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 6182 | .iv = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
6154 | .input = { 0x00, 0xf0, 0xe, 0x11, 0x75, 0xe6, 0x23, 0x82, | 6183 | .input = "\x00\xf0\x0e\x11\x75\xe6\x23\x82" |
6155 | 0xee, 0xac, 0x98, 0x62, 0x44, 0x51, 0xe4, 0x84, | 6184 | "\xee\xac\x98\x62\x44\x51\xe4\x84" |
6156 | 0xc3, 0x59, 0xd8, 0xaa, 0x64, 0x60, 0xae, 0xf7, | 6185 | "\xc3\x59\xd8\xaa\x64\x60\xae\xf7" |
6157 | 0xd2, 0xd9, 0x13, 0x79, 0x72, 0xa3, 0x45, 0x03, | 6186 | "\xd2\xd9\x13\x79\x72\xa3\x45\x03" |
6158 | 0x23, 0xb5, 0x62, 0xd7, 0x0c, 0xf5, 0x27, 0xd1, | 6187 | "\x23\xb5\x62\xd7\x0c\xf5\x27\xd1" |
6159 | 0xf8, 0x91, 0x3c, 0xac, 0x44, 0x22, 0x92, 0xef }, | 6188 | "\xf8\x91\x3c\xac\x44\x22\x92\xef", |
6160 | .ilen = 48, | 6189 | .ilen = 48, |
6161 | .result = "The quick brown fox jumps over the lazy dogs.\0\0", | 6190 | .result = "The quick brown fox jumps over the lazy dogs.\0\0", |
6162 | .rlen = 48, | 6191 | .rlen = 48, |
6163 | }, { | 6192 | }, { |
6164 | .key = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 6193 | .key = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
6165 | .klen = 8, | 6194 | .klen = 8, |
6166 | .iv = { 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87 }, | 6195 | .iv = "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87", |
6167 | .input = { 0xca, 0x90, 0xf5, 0x9d, 0xcb, 0xd4, 0xd2, 0x3c, | 6196 | .input = "\xca\x90\xf5\x9d\xcb\xd4\xd2\x3c" |
6168 | 0x01, 0x88, 0x7f, 0x3e, 0x31, 0x6e, 0x62, 0x9d, | 6197 | "\x01\x88\x7f\x3e\x31\x6e\x62\x9d" |
6169 | 0xd8, 0xe0, 0x57, 0xa3, 0x06, 0x3a, 0x42, 0x58, | 6198 | "\xd8\xe0\x57\xa3\x06\x3a\x42\x58" |
6170 | 0x2a, 0x28, 0xfe, 0x72, 0x52, 0x2f, 0xdd, 0xe0, | 6199 | "\x2a\x28\xfe\x72\x52\x2f\xdd\xe0" |
6171 | 0x19, 0x89, 0x09, 0x1c, 0x2a, 0x8e, 0x8c, 0x94, | 6200 | "\x19\x89\x09\x1c\x2a\x8e\x8c\x94" |
6172 | 0xfc, 0xc7, 0x68, 0xe4, 0x88, 0xaa, 0xde, 0x0f }, | 6201 | "\xfc\xc7\x68\xe4\x88\xaa\xde\x0f", |
6173 | .ilen = 48, | 6202 | .ilen = 48, |
6174 | .result = "The quick brown fox jumps over the lazy dogs.\0\0", | 6203 | .result = "The quick brown fox jumps over the lazy dogs.\0\0", |
6175 | .rlen = 48, | 6204 | .rlen = 48, |
6176 | }, { /* split-page version */ | 6205 | }, { /* split-page version */ |
6177 | .key = { 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 6206 | .key = "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
6178 | .klen = 8, | 6207 | .klen = 8, |
6179 | .iv = { 0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87 }, | 6208 | .iv = "\xf0\xe1\xd2\xc3\xb4\xa5\x96\x87", |
6180 | .input = { 0xca, 0x90, 0xf5, 0x9d, 0xcb, 0xd4, 0xd2, 0x3c, | 6209 | .input = "\xca\x90\xf5\x9d\xcb\xd4\xd2\x3c" |
6181 | 0x01, 0x88, 0x7f, 0x3e, 0x31, 0x6e, 0x62, 0x9d, | 6210 | "\x01\x88\x7f\x3e\x31\x6e\x62\x9d" |
6182 | 0xd8, 0xe0, 0x57, 0xa3, 0x06, 0x3a, 0x42, 0x58, | 6211 | "\xd8\xe0\x57\xa3\x06\x3a\x42\x58" |
6183 | 0x2a, 0x28, 0xfe, 0x72, 0x52, 0x2f, 0xdd, 0xe0, | 6212 | "\x2a\x28\xfe\x72\x52\x2f\xdd\xe0" |
6184 | 0x19, 0x89, 0x09, 0x1c, 0x2a, 0x8e, 0x8c, 0x94, | 6213 | "\x19\x89\x09\x1c\x2a\x8e\x8c\x94" |
6185 | 0xfc, 0xc7, 0x68, 0xe4, 0x88, 0xaa, 0xde, 0x0f }, | 6214 | "\xfc\xc7\x68\xe4\x88\xaa\xde\x0f", |
6186 | .ilen = 48, | 6215 | .ilen = 48, |
6187 | .result = "The quick brown fox jumps over the lazy dogs.\0\0", | 6216 | .result = "The quick brown fox jumps over the lazy dogs.\0\0", |
6188 | .rlen = 48, | 6217 | .rlen = 48, |
@@ -6201,136 +6230,136 @@ static struct cipher_testvec fcrypt_pcbc_dec_tv_template[] = { | |||
6201 | 6230 | ||
6202 | static struct cipher_testvec camellia_enc_tv_template[] = { | 6231 | static struct cipher_testvec camellia_enc_tv_template[] = { |
6203 | { | 6232 | { |
6204 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 6233 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
6205 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 6234 | "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
6206 | .klen = 16, | 6235 | .klen = 16, |
6207 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 6236 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
6208 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 6237 | "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
6209 | .ilen = 16, | 6238 | .ilen = 16, |
6210 | .result = { 0x67, 0x67, 0x31, 0x38, 0x54, 0x96, 0x69, 0x73, | 6239 | .result = "\x67\x67\x31\x38\x54\x96\x69\x73" |
6211 | 0x08, 0x57, 0x06, 0x56, 0x48, 0xea, 0xbe, 0x43 }, | 6240 | "\x08\x57\x06\x56\x48\xea\xbe\x43", |
6212 | .rlen = 16, | 6241 | .rlen = 16, |
6213 | }, { | 6242 | }, { |
6214 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 6243 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
6215 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, | 6244 | "\xfe\xdc\xba\x98\x76\x54\x32\x10" |
6216 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77 }, | 6245 | "\x00\x11\x22\x33\x44\x55\x66\x77", |
6217 | .klen = 24, | 6246 | .klen = 24, |
6218 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 6247 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
6219 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 6248 | "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
6220 | .ilen = 16, | 6249 | .ilen = 16, |
6221 | .result = { 0xb4, 0x99, 0x34, 0x01, 0xb3, 0xe9, 0x96, 0xf8, | 6250 | .result = "\xb4\x99\x34\x01\xb3\xe9\x96\xf8" |
6222 | 0x4e, 0xe5, 0xce, 0xe7, 0xd7, 0x9b, 0x09, 0xb9 }, | 6251 | "\x4e\xe5\xce\xe7\xd7\x9b\x09\xb9", |
6223 | .rlen = 16, | 6252 | .rlen = 16, |
6224 | }, { | 6253 | }, { |
6225 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 6254 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
6226 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, | 6255 | "\xfe\xdc\xba\x98\x76\x54\x32\x10" |
6227 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 6256 | "\x00\x11\x22\x33\x44\x55\x66\x77" |
6228 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, | 6257 | "\x88\x99\xaa\xbb\xcc\xdd\xee\xff", |
6229 | .klen = 32, | 6258 | .klen = 32, |
6230 | .input = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 6259 | .input = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
6231 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 6260 | "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
6232 | .ilen = 16, | 6261 | .ilen = 16, |
6233 | .result = { 0x9a, 0xcc, 0x23, 0x7d, 0xff, 0x16, 0xd7, 0x6c, | 6262 | .result = "\x9a\xcc\x23\x7d\xff\x16\xd7\x6c" |
6234 | 0x20, 0xef, 0x7c, 0x91, 0x9e, 0x3a, 0x75, 0x09 }, | 6263 | "\x20\xef\x7c\x91\x9e\x3a\x75\x09", |
6235 | .rlen = 16, | 6264 | .rlen = 16, |
6236 | }, | 6265 | }, |
6237 | }; | 6266 | }; |
6238 | 6267 | ||
6239 | static struct cipher_testvec camellia_dec_tv_template[] = { | 6268 | static struct cipher_testvec camellia_dec_tv_template[] = { |
6240 | { | 6269 | { |
6241 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 6270 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
6242 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 6271 | "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
6243 | .klen = 16, | 6272 | .klen = 16, |
6244 | .input = { 0x67, 0x67, 0x31, 0x38, 0x54, 0x96, 0x69, 0x73, | 6273 | .input = "\x67\x67\x31\x38\x54\x96\x69\x73" |
6245 | 0x08, 0x57, 0x06, 0x56, 0x48, 0xea, 0xbe, 0x43 }, | 6274 | "\x08\x57\x06\x56\x48\xea\xbe\x43", |
6246 | .ilen = 16, | 6275 | .ilen = 16, |
6247 | .result = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 6276 | .result = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
6248 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 6277 | "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
6249 | .rlen = 16, | 6278 | .rlen = 16, |
6250 | }, { | 6279 | }, { |
6251 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 6280 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
6252 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, | 6281 | "\xfe\xdc\xba\x98\x76\x54\x32\x10" |
6253 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77 }, | 6282 | "\x00\x11\x22\x33\x44\x55\x66\x77", |
6254 | .klen = 24, | 6283 | .klen = 24, |
6255 | .input = { 0xb4, 0x99, 0x34, 0x01, 0xb3, 0xe9, 0x96, 0xf8, | 6284 | .input = "\xb4\x99\x34\x01\xb3\xe9\x96\xf8" |
6256 | 0x4e, 0xe5, 0xce, 0xe7, 0xd7, 0x9b, 0x09, 0xb9 }, | 6285 | "\x4e\xe5\xce\xe7\xd7\x9b\x09\xb9", |
6257 | .ilen = 16, | 6286 | .ilen = 16, |
6258 | .result = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 6287 | .result = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
6259 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 6288 | "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
6260 | .rlen = 16, | 6289 | .rlen = 16, |
6261 | }, { | 6290 | }, { |
6262 | .key = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 6291 | .key = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
6263 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, | 6292 | "\xfe\xdc\xba\x98\x76\x54\x32\x10" |
6264 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 6293 | "\x00\x11\x22\x33\x44\x55\x66\x77" |
6265 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, | 6294 | "\x88\x99\xaa\xbb\xcc\xdd\xee\xff", |
6266 | .klen = 32, | 6295 | .klen = 32, |
6267 | .input = { 0x9a, 0xcc, 0x23, 0x7d, 0xff, 0x16, 0xd7, 0x6c, | 6296 | .input = "\x9a\xcc\x23\x7d\xff\x16\xd7\x6c" |
6268 | 0x20, 0xef, 0x7c, 0x91, 0x9e, 0x3a, 0x75, 0x09 }, | 6297 | "\x20\xef\x7c\x91\x9e\x3a\x75\x09", |
6269 | .ilen = 16, | 6298 | .ilen = 16, |
6270 | .result = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, | 6299 | .result = "\x01\x23\x45\x67\x89\xab\xcd\xef" |
6271 | 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }, | 6300 | "\xfe\xdc\xba\x98\x76\x54\x32\x10", |
6272 | .rlen = 16, | 6301 | .rlen = 16, |
6273 | }, | 6302 | }, |
6274 | }; | 6303 | }; |
6275 | 6304 | ||
6276 | static struct cipher_testvec camellia_cbc_enc_tv_template[] = { | 6305 | static struct cipher_testvec camellia_cbc_enc_tv_template[] = { |
6277 | { | 6306 | { |
6278 | .key = { 0x06, 0xa9, 0x21, 0x40, 0x36, 0xb8, 0xa1, 0x5b, | 6307 | .key = "\x06\xa9\x21\x40\x36\xb8\xa1\x5b" |
6279 | 0x51, 0x2e, 0x03, 0xd5, 0x34, 0x12, 0x00, 0x06 }, | 6308 | "\x51\x2e\x03\xd5\x34\x12\x00\x06", |
6280 | .klen = 16, | 6309 | .klen = 16, |
6281 | .iv = { 0x3d, 0xaf, 0xba, 0x42, 0x9d, 0x9e, 0xb4, 0x30, | 6310 | .iv = "\x3d\xaf\xba\x42\x9d\x9e\xb4\x30" |
6282 | 0xb4, 0x22, 0xda, 0x80, 0x2c, 0x9f, 0xac, 0x41 }, | 6311 | "\xb4\x22\xda\x80\x2c\x9f\xac\x41", |
6283 | .input = { "Single block msg" }, | 6312 | .input = "Single block msg", |
6284 | .ilen = 16, | 6313 | .ilen = 16, |
6285 | .result = { 0xea, 0x32, 0x12, 0x76, 0x3b, 0x50, 0x10, 0xe7, | 6314 | .result = "\xea\x32\x12\x76\x3b\x50\x10\xe7" |
6286 | 0x18, 0xf6, 0xfd, 0x5d, 0xf6, 0x8f, 0x13, 0x51 }, | 6315 | "\x18\xf6\xfd\x5d\xf6\x8f\x13\x51", |
6287 | .rlen = 16, | 6316 | .rlen = 16, |
6288 | }, { | 6317 | }, { |
6289 | .key = { 0xc2, 0x86, 0x69, 0x6d, 0x88, 0x7c, 0x9a, 0xa0, | 6318 | .key = "\xc2\x86\x69\x6d\x88\x7c\x9a\xa0" |
6290 | 0x61, 0x1b, 0xbb, 0x3e, 0x20, 0x25, 0xa4, 0x5a }, | 6319 | "\x61\x1b\xbb\x3e\x20\x25\xa4\x5a", |
6291 | .klen = 16, | 6320 | .klen = 16, |
6292 | .iv = { 0x56, 0x2e, 0x17, 0x99, 0x6d, 0x09, 0x3d, 0x28, | 6321 | .iv = "\x56\x2e\x17\x99\x6d\x09\x3d\x28" |
6293 | 0xdd, 0xb3, 0xba, 0x69, 0x5a, 0x2e, 0x6f, 0x58 }, | 6322 | "\xdd\xb3\xba\x69\x5a\x2e\x6f\x58", |
6294 | .input = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 6323 | .input = "\x00\x01\x02\x03\x04\x05\x06\x07" |
6295 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 6324 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
6296 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 6325 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
6297 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 6326 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
6298 | .ilen = 32, | 6327 | .ilen = 32, |
6299 | .result = { 0xa5, 0xdf, 0x6e, 0x50, 0xda, 0x70, 0x6c, 0x01, | 6328 | .result = "\xa5\xdf\x6e\x50\xda\x70\x6c\x01" |
6300 | 0x4a, 0xab, 0xf3, 0xf2, 0xd6, 0xfc, 0x6c, 0xfd, | 6329 | "\x4a\xab\xf3\xf2\xd6\xfc\x6c\xfd" |
6301 | 0x19, 0xb4, 0x3e, 0x57, 0x1c, 0x02, 0x5e, 0xa0, | 6330 | "\x19\xb4\x3e\x57\x1c\x02\x5e\xa0" |
6302 | 0x15, 0x78, 0xe0, 0x5e, 0xf2, 0xcb, 0x87, 0x16 }, | 6331 | "\x15\x78\xe0\x5e\xf2\xcb\x87\x16", |
6303 | .rlen = 32, | 6332 | .rlen = 32, |
6304 | }, | 6333 | }, |
6305 | }; | 6334 | }; |
6306 | 6335 | ||
6307 | static struct cipher_testvec camellia_cbc_dec_tv_template[] = { | 6336 | static struct cipher_testvec camellia_cbc_dec_tv_template[] = { |
6308 | { | 6337 | { |
6309 | .key = { 0x06, 0xa9, 0x21, 0x40, 0x36, 0xb8, 0xa1, 0x5b, | 6338 | .key = "\x06\xa9\x21\x40\x36\xb8\xa1\x5b" |
6310 | 0x51, 0x2e, 0x03, 0xd5, 0x34, 0x12, 0x00, 0x06 }, | 6339 | "\x51\x2e\x03\xd5\x34\x12\x00\x06", |
6311 | .klen = 16, | 6340 | .klen = 16, |
6312 | .iv = { 0x3d, 0xaf, 0xba, 0x42, 0x9d, 0x9e, 0xb4, 0x30, | 6341 | .iv = "\x3d\xaf\xba\x42\x9d\x9e\xb4\x30" |
6313 | 0xb4, 0x22, 0xda, 0x80, 0x2c, 0x9f, 0xac, 0x41 }, | 6342 | "\xb4\x22\xda\x80\x2c\x9f\xac\x41", |
6314 | .input = { 0xea, 0x32, 0x12, 0x76, 0x3b, 0x50, 0x10, 0xe7, | 6343 | .input = "\xea\x32\x12\x76\x3b\x50\x10\xe7" |
6315 | 0x18, 0xf6, 0xfd, 0x5d, 0xf6, 0x8f, 0x13, 0x51 }, | 6344 | "\x18\xf6\xfd\x5d\xf6\x8f\x13\x51", |
6316 | .ilen = 16, | 6345 | .ilen = 16, |
6317 | .result = { "Single block msg" }, | 6346 | .result = "Single block msg", |
6318 | .rlen = 16, | 6347 | .rlen = 16, |
6319 | }, { | 6348 | }, { |
6320 | .key = { 0xc2, 0x86, 0x69, 0x6d, 0x88, 0x7c, 0x9a, 0xa0, | 6349 | .key = "\xc2\x86\x69\x6d\x88\x7c\x9a\xa0" |
6321 | 0x61, 0x1b, 0xbb, 0x3e, 0x20, 0x25, 0xa4, 0x5a }, | 6350 | "\x61\x1b\xbb\x3e\x20\x25\xa4\x5a", |
6322 | .klen = 16, | 6351 | .klen = 16, |
6323 | .iv = { 0x56, 0x2e, 0x17, 0x99, 0x6d, 0x09, 0x3d, 0x28, | 6352 | .iv = "\x56\x2e\x17\x99\x6d\x09\x3d\x28" |
6324 | 0xdd, 0xb3, 0xba, 0x69, 0x5a, 0x2e, 0x6f, 0x58 }, | 6353 | "\xdd\xb3\xba\x69\x5a\x2e\x6f\x58", |
6325 | .input = { 0xa5, 0xdf, 0x6e, 0x50, 0xda, 0x70, 0x6c, 0x01, | 6354 | .input = "\xa5\xdf\x6e\x50\xda\x70\x6c\x01" |
6326 | 0x4a, 0xab, 0xf3, 0xf2, 0xd6, 0xfc, 0x6c, 0xfd, | 6355 | "\x4a\xab\xf3\xf2\xd6\xfc\x6c\xfd" |
6327 | 0x19, 0xb4, 0x3e, 0x57, 0x1c, 0x02, 0x5e, 0xa0, | 6356 | "\x19\xb4\x3e\x57\x1c\x02\x5e\xa0" |
6328 | 0x15, 0x78, 0xe0, 0x5e, 0xf2, 0xcb, 0x87, 0x16 }, | 6357 | "\x15\x78\xe0\x5e\xf2\xcb\x87\x16", |
6329 | .ilen = 32, | 6358 | .ilen = 32, |
6330 | .result = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 6359 | .result = "\x00\x01\x02\x03\x04\x05\x06\x07" |
6331 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 6360 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
6332 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 6361 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
6333 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, | 6362 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
6334 | .rlen = 32, | 6363 | .rlen = 32, |
6335 | }, | 6364 | }, |
6336 | }; | 6365 | }; |
@@ -6343,84 +6372,84 @@ static struct cipher_testvec camellia_cbc_dec_tv_template[] = { | |||
6343 | 6372 | ||
6344 | static struct cipher_testvec seed_enc_tv_template[] = { | 6373 | static struct cipher_testvec seed_enc_tv_template[] = { |
6345 | { | 6374 | { |
6346 | .key = { [0 ... 15] = 0x00 }, | 6375 | .key = zeroed_string, |
6347 | .klen = 16, | 6376 | .klen = 16, |
6348 | .input = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 6377 | .input = "\x00\x01\x02\x03\x04\x05\x06\x07" |
6349 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 6378 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
6350 | .ilen = 16, | 6379 | .ilen = 16, |
6351 | .result = { 0x5e, 0xba, 0xc6, 0xe0, 0x05, 0x4e, 0x16, 0x68, | 6380 | .result = "\x5e\xba\xc6\xe0\x05\x4e\x16\x68" |
6352 | 0x19, 0xaf, 0xf1, 0xcc, 0x6d, 0x34, 0x6c, 0xdb }, | 6381 | "\x19\xaf\xf1\xcc\x6d\x34\x6c\xdb", |
6353 | .rlen = 16, | 6382 | .rlen = 16, |
6354 | }, { | 6383 | }, { |
6355 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 6384 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
6356 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 6385 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
6357 | .klen = 16, | 6386 | .klen = 16, |
6358 | .input = { [0 ... 15] = 0x00 }, | 6387 | .input = zeroed_string, |
6359 | .ilen = 16, | 6388 | .ilen = 16, |
6360 | .result = { 0xc1, 0x1f, 0x22, 0xf2, 0x01, 0x40, 0x50, 0x50, | 6389 | .result = "\xc1\x1f\x22\xf2\x01\x40\x50\x50" |
6361 | 0x84, 0x48, 0x35, 0x97, 0xe4, 0x37, 0x0f, 0x43 }, | 6390 | "\x84\x48\x35\x97\xe4\x37\x0f\x43", |
6362 | .rlen = 16, | 6391 | .rlen = 16, |
6363 | }, { | 6392 | }, { |
6364 | .key = { 0x47, 0x06, 0x48, 0x08, 0x51, 0xe6, 0x1b, 0xe8, | 6393 | .key = "\x47\x06\x48\x08\x51\xe6\x1b\xe8" |
6365 | 0x5d, 0x74, 0xbf, 0xb3, 0xfd, 0x95, 0x61, 0x85 }, | 6394 | "\x5d\x74\xbf\xb3\xfd\x95\x61\x85", |
6366 | .klen = 16, | 6395 | .klen = 16, |
6367 | .input = { 0x83, 0xa2, 0xf8, 0xa2, 0x88, 0x64, 0x1f, 0xb9, | 6396 | .input = "\x83\xa2\xf8\xa2\x88\x64\x1f\xb9" |
6368 | 0xa4, 0xe9, 0xa5, 0xcc, 0x2f, 0x13, 0x1c, 0x7d }, | 6397 | "\xa4\xe9\xa5\xcc\x2f\x13\x1c\x7d", |
6369 | .ilen = 16, | 6398 | .ilen = 16, |
6370 | .result = { 0xee, 0x54, 0xd1, 0x3e, 0xbc, 0xae, 0x70, 0x6d, | 6399 | .result = "\xee\x54\xd1\x3e\xbc\xae\x70\x6d" |
6371 | 0x22, 0x6b, 0xc3, 0x14, 0x2c, 0xd4, 0x0d, 0x4a }, | 6400 | "\x22\x6b\xc3\x14\x2c\xd4\x0d\x4a", |
6372 | .rlen = 16, | 6401 | .rlen = 16, |
6373 | }, { | 6402 | }, { |
6374 | .key = { 0x28, 0xdb, 0xc3, 0xbc, 0x49, 0xff, 0xd8, 0x7d, | 6403 | .key = "\x28\xdb\xc3\xbc\x49\xff\xd8\x7d" |
6375 | 0xcf, 0xa5, 0x09, 0xb1, 0x1d, 0x42, 0x2b, 0xe7 }, | 6404 | "\xcf\xa5\x09\xb1\x1d\x42\x2b\xe7", |
6376 | .klen = 16, | 6405 | .klen = 16, |
6377 | .input = { 0xb4, 0x1e, 0x6b, 0xe2, 0xeb, 0xa8, 0x4a, 0x14, | 6406 | .input = "\xb4\x1e\x6b\xe2\xeb\xa8\x4a\x14" |
6378 | 0x8e, 0x2e, 0xed, 0x84, 0x59, 0x3c, 0x5e, 0xc7 }, | 6407 | "\x8e\x2e\xed\x84\x59\x3c\x5e\xc7", |
6379 | .ilen = 16, | 6408 | .ilen = 16, |
6380 | .result = { 0x9b, 0x9b, 0x7b, 0xfc, 0xd1, 0x81, 0x3c, 0xb9, | 6409 | .result = "\x9b\x9b\x7b\xfc\xd1\x81\x3c\xb9" |
6381 | 0x5d, 0x0b, 0x36, 0x18, 0xf4, 0x0f, 0x51, 0x22 }, | 6410 | "\x5d\x0b\x36\x18\xf4\x0f\x51\x22", |
6382 | .rlen = 16, | 6411 | .rlen = 16, |
6383 | } | 6412 | } |
6384 | }; | 6413 | }; |
6385 | 6414 | ||
6386 | static struct cipher_testvec seed_dec_tv_template[] = { | 6415 | static struct cipher_testvec seed_dec_tv_template[] = { |
6387 | { | 6416 | { |
6388 | .key = { [0 ... 15] = 0x00 }, | 6417 | .key = zeroed_string, |
6389 | .klen = 16, | 6418 | .klen = 16, |
6390 | .input = { 0x5e, 0xba, 0xc6, 0xe0, 0x05, 0x4e, 0x16, 0x68, | 6419 | .input = "\x5e\xba\xc6\xe0\x05\x4e\x16\x68" |
6391 | 0x19, 0xaf, 0xf1, 0xcc, 0x6d, 0x34, 0x6c, 0xdb }, | 6420 | "\x19\xaf\xf1\xcc\x6d\x34\x6c\xdb", |
6392 | .ilen = 16, | 6421 | .ilen = 16, |
6393 | .result = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 6422 | .result = "\x00\x01\x02\x03\x04\x05\x06\x07" |
6394 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 6423 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
6395 | .rlen = 16, | 6424 | .rlen = 16, |
6396 | }, { | 6425 | }, { |
6397 | .key = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 6426 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
6398 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, | 6427 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f", |
6399 | .klen = 16, | 6428 | .klen = 16, |
6400 | .input = { 0xc1, 0x1f, 0x22, 0xf2, 0x01, 0x40, 0x50, 0x50, | 6429 | .input = "\xc1\x1f\x22\xf2\x01\x40\x50\x50" |
6401 | 0x84, 0x48, 0x35, 0x97, 0xe4, 0x37, 0x0f, 0x43 }, | 6430 | "\x84\x48\x35\x97\xe4\x37\x0f\x43", |
6402 | .ilen = 16, | 6431 | .ilen = 16, |
6403 | .result = { [0 ... 15] = 0x00 }, | 6432 | .result = zeroed_string, |
6404 | .rlen = 16, | 6433 | .rlen = 16, |
6405 | }, { | 6434 | }, { |
6406 | .key = { 0x47, 0x06, 0x48, 0x08, 0x51, 0xe6, 0x1b, 0xe8, | 6435 | .key = "\x47\x06\x48\x08\x51\xe6\x1b\xe8" |
6407 | 0x5d, 0x74, 0xbf, 0xb3, 0xfd, 0x95, 0x61, 0x85 }, | 6436 | "\x5d\x74\xbf\xb3\xfd\x95\x61\x85", |
6408 | .klen = 16, | 6437 | .klen = 16, |
6409 | .input = { 0xee, 0x54, 0xd1, 0x3e, 0xbc, 0xae, 0x70, 0x6d, | 6438 | .input = "\xee\x54\xd1\x3e\xbc\xae\x70\x6d" |
6410 | 0x22, 0x6b, 0xc3, 0x14, 0x2c, 0xd4, 0x0d, 0x4a }, | 6439 | "\x22\x6b\xc3\x14\x2c\xd4\x0d\x4a", |
6411 | .ilen = 16, | 6440 | .ilen = 16, |
6412 | .result = { 0x83, 0xa2, 0xf8, 0xa2, 0x88, 0x64, 0x1f, 0xb9, | 6441 | .result = "\x83\xa2\xf8\xa2\x88\x64\x1f\xb9" |
6413 | 0xa4, 0xe9, 0xa5, 0xcc, 0x2f, 0x13, 0x1c, 0x7d }, | 6442 | "\xa4\xe9\xa5\xcc\x2f\x13\x1c\x7d", |
6414 | .rlen = 16, | 6443 | .rlen = 16, |
6415 | }, { | 6444 | }, { |
6416 | .key = { 0x28, 0xdb, 0xc3, 0xbc, 0x49, 0xff, 0xd8, 0x7d, | 6445 | .key = "\x28\xdb\xc3\xbc\x49\xff\xd8\x7d" |
6417 | 0xcf, 0xa5, 0x09, 0xb1, 0x1d, 0x42, 0x2b, 0xe7 }, | 6446 | "\xcf\xa5\x09\xb1\x1d\x42\x2b\xe7", |
6418 | .klen = 16, | 6447 | .klen = 16, |
6419 | .input = { 0x9b, 0x9b, 0x7b, 0xfc, 0xd1, 0x81, 0x3c, 0xb9, | 6448 | .input = "\x9b\x9b\x7b\xfc\xd1\x81\x3c\xb9" |
6420 | 0x5d, 0x0b, 0x36, 0x18, 0xf4, 0x0f, 0x51, 0x22 }, | 6449 | "\x5d\x0b\x36\x18\xf4\x0f\x51\x22", |
6421 | .ilen = 16, | 6450 | .ilen = 16, |
6422 | .result = { 0xb4, 0x1e, 0x6b, 0xe2, 0xeb, 0xa8, 0x4a, 0x14, | 6451 | .result = "\xb4\x1e\x6b\xe2\xeb\xa8\x4a\x14" |
6423 | 0x8e, 0x2e, 0xed, 0x84, 0x59, 0x3c, 0x5e, 0xc7 }, | 6452 | "\x8e\x2e\xed\x84\x59\x3c\x5e\xc7", |
6424 | .rlen = 16, | 6453 | .rlen = 16, |
6425 | } | 6454 | } |
6426 | }; | 6455 | }; |
@@ -6433,1204 +6462,1376 @@ static struct cipher_testvec salsa20_stream_enc_tv_template[] = { | |||
6433 | * of input length. | 6462 | * of input length. |
6434 | */ | 6463 | */ |
6435 | { /* Set 3, vector 0 */ | 6464 | { /* Set 3, vector 0 */ |
6436 | .key = { | 6465 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
6437 | 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 6466 | "\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", |
6438 | 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F | ||
6439 | }, | ||
6440 | .klen = 16, | 6467 | .klen = 16, |
6441 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 6468 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00", |
6442 | .input = { | 6469 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00" |
6443 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6470 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6444 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6471 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6445 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6472 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6446 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6473 | "\x00\x00\x00\x00\x00\x00\x00", |
6447 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | ||
6448 | }, | ||
6449 | .ilen = 39, | 6474 | .ilen = 39, |
6450 | .result = { | 6475 | .result = "\x2D\xD5\xC3\xF7\xBA\x2B\x20\xF7" |
6451 | 0x2D, 0xD5, 0xC3, 0xF7, 0xBA, 0x2B, 0x20, 0xF7, | 6476 | "\x68\x02\x41\x0C\x68\x86\x88\x89" |
6452 | 0x68, 0x02, 0x41, 0x0C, 0x68, 0x86, 0x88, 0x89, | 6477 | "\x5A\xD8\xC1\xBD\x4E\xA6\xC9\xB1" |
6453 | 0x5A, 0xD8, 0xC1, 0xBD, 0x4E, 0xA6, 0xC9, 0xB1, | 6478 | "\x40\xFB\x9B\x90\xE2\x10\x49\xBF" |
6454 | 0x40, 0xFB, 0x9B, 0x90, 0xE2, 0x10, 0x49, 0xBF, | 6479 | "\x58\x3F\x52\x79\x70\xEB\xC1", |
6455 | 0x58, 0x3F, 0x52, 0x79, 0x70, 0xEB, 0xC1, | ||
6456 | }, | ||
6457 | .rlen = 39, | 6480 | .rlen = 39, |
6458 | }, { /* Set 5, vector 0 */ | 6481 | }, { /* Set 5, vector 0 */ |
6459 | .key = { | 6482 | .key = "\x00\x00\x00\x00\x00\x00\x00\x00" |
6460 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6483 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
6461 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 | ||
6462 | }, | ||
6463 | .klen = 16, | 6484 | .klen = 16, |
6464 | .iv = { 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 6485 | .iv = "\x80\x00\x00\x00\x00\x00\x00\x00", |
6465 | .input = { | 6486 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00" |
6466 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6487 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6467 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6488 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6468 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6489 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6469 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6490 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6470 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6491 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6471 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6492 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6472 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6493 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
6473 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | ||
6474 | }, | ||
6475 | .ilen = 64, | 6494 | .ilen = 64, |
6476 | .result = { | 6495 | .result = "\xB6\x6C\x1E\x44\x46\xDD\x95\x57" |
6477 | 0xB6, 0x6C, 0x1E, 0x44, 0x46, 0xDD, 0x95, 0x57, | 6496 | "\xE5\x78\xE2\x23\xB0\xB7\x68\x01" |
6478 | 0xE5, 0x78, 0xE2, 0x23, 0xB0, 0xB7, 0x68, 0x01, | 6497 | "\x7B\x23\xB2\x67\xBB\x02\x34\xAE" |
6479 | 0x7B, 0x23, 0xB2, 0x67, 0xBB, 0x02, 0x34, 0xAE, | 6498 | "\x46\x26\xBF\x44\x3F\x21\x97\x76" |
6480 | 0x46, 0x26, 0xBF, 0x44, 0x3F, 0x21, 0x97, 0x76, | 6499 | "\x43\x6F\xB1\x9F\xD0\xE8\x86\x6F" |
6481 | 0x43, 0x6F, 0xB1, 0x9F, 0xD0, 0xE8, 0x86, 0x6F, | 6500 | "\xCD\x0D\xE9\xA9\x53\x8F\x4A\x09" |
6482 | 0xCD, 0x0D, 0xE9, 0xA9, 0x53, 0x8F, 0x4A, 0x09, | 6501 | "\xCA\x9A\xC0\x73\x2E\x30\xBC\xF9" |
6483 | 0xCA, 0x9A, 0xC0, 0x73, 0x2E, 0x30, 0xBC, 0xF9, | 6502 | "\x8E\x4F\x13\xE4\xB9\xE2\x01\xD9", |
6484 | 0x8E, 0x4F, 0x13, 0xE4, 0xB9, 0xE2, 0x01, 0xD9, | ||
6485 | }, | ||
6486 | .rlen = 64, | 6503 | .rlen = 64, |
6487 | }, { /* Set 3, vector 27 */ | 6504 | }, { /* Set 3, vector 27 */ |
6488 | .key = { | 6505 | .key = "\x1B\x1C\x1D\x1E\x1F\x20\x21\x22" |
6489 | 0x1B, 0x1C, 0x1D, 0x1E, 0x1F, 0x20, 0x21, 0x22, | 6506 | "\x23\x24\x25\x26\x27\x28\x29\x2A" |
6490 | 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2A, | 6507 | "\x2B\x2C\x2D\x2E\x2F\x30\x31\x32" |
6491 | 0x2B, 0x2C, 0x2D, 0x2E, 0x2F, 0x30, 0x31, 0x32, | 6508 | "\x33\x34\x35\x36\x37\x38\x39\x3A", |
6492 | 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3A | ||
6493 | }, | ||
6494 | .klen = 32, | 6509 | .klen = 32, |
6495 | .iv = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 6510 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00", |
6496 | .input = { | 6511 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00" |
6497 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6512 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6498 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6513 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6499 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6514 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6500 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6515 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6501 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6516 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6502 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6517 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6503 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6518 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6504 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6519 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6505 | 6520 | "\x00\x00\x00\x00\x00\x00\x00\x00" | |
6506 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6521 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6507 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6522 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6508 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6523 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6509 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6524 | "\x00\x00\x00\x00\x00\x00\x00", |
6510 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | ||
6511 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | ||
6512 | }, | ||
6513 | .ilen = 111, | 6525 | .ilen = 111, |
6514 | .result = { | 6526 | .result = "\xAE\x39\x50\x8E\xAC\x9A\xEC\xE7" |
6515 | 0xAE, 0x39, 0x50, 0x8E, 0xAC, 0x9A, 0xEC, 0xE7, | 6527 | "\xBF\x97\xBB\x20\xB9\xDE\xE4\x1F" |
6516 | 0xBF, 0x97, 0xBB, 0x20, 0xB9, 0xDE, 0xE4, 0x1F, | 6528 | "\x87\xD9\x47\xF8\x28\x91\x35\x98" |
6517 | 0x87, 0xD9, 0x47, 0xF8, 0x28, 0x91, 0x35, 0x98, | 6529 | "\xDB\x72\xCC\x23\x29\x48\x56\x5E" |
6518 | 0xDB, 0x72, 0xCC, 0x23, 0x29, 0x48, 0x56, 0x5E, | 6530 | "\x83\x7E\x0B\xF3\x7D\x5D\x38\x7B" |
6519 | 0x83, 0x7E, 0x0B, 0xF3, 0x7D, 0x5D, 0x38, 0x7B, | 6531 | "\x2D\x71\x02\xB4\x3B\xB5\xD8\x23" |
6520 | 0x2D, 0x71, 0x02, 0xB4, 0x3B, 0xB5, 0xD8, 0x23, | 6532 | "\xB0\x4A\xDF\x3C\xEC\xB6\xD9\x3B" |
6521 | 0xB0, 0x4A, 0xDF, 0x3C, 0xEC, 0xB6, 0xD9, 0x3B, | 6533 | "\x9B\xA7\x52\xBE\xC5\xD4\x50\x59" |
6522 | 0x9B, 0xA7, 0x52, 0xBE, 0xC5, 0xD4, 0x50, 0x59, | 6534 | "\x15\x14\xB4\x0E\x40\xE6\x53\xD1" |
6523 | 6535 | "\x83\x9C\x5B\xA0\x92\x29\x6B\x5E" | |
6524 | 0x15, 0x14, 0xB4, 0x0E, 0x40, 0xE6, 0x53, 0xD1, | 6536 | "\x96\x5B\x1E\x2F\xD3\xAC\xC1\x92" |
6525 | 0x83, 0x9C, 0x5B, 0xA0, 0x92, 0x29, 0x6B, 0x5E, | 6537 | "\xB1\x41\x3F\x19\x2F\xC4\x3B\xC6" |
6526 | 0x96, 0x5B, 0x1E, 0x2F, 0xD3, 0xAC, 0xC1, 0x92, | 6538 | "\x95\x46\x45\x54\xE9\x75\x03\x08" |
6527 | 0xB1, 0x41, 0x3F, 0x19, 0x2F, 0xC4, 0x3B, 0xC6, | 6539 | "\x44\xAF\xE5\x8A\x81\x12\x09", |
6528 | 0x95, 0x46, 0x45, 0x54, 0xE9, 0x75, 0x03, 0x08, | ||
6529 | 0x44, 0xAF, 0xE5, 0x8A, 0x81, 0x12, 0x09, | ||
6530 | }, | ||
6531 | .rlen = 111, | 6540 | .rlen = 111, |
6532 | |||
6533 | }, { /* Set 5, vector 27 */ | 6541 | }, { /* Set 5, vector 27 */ |
6534 | .key = { | 6542 | .key = "\x00\x00\x00\x00\x00\x00\x00\x00" |
6535 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6543 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6536 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6544 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6537 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6545 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
6538 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 | ||
6539 | }, | ||
6540 | .klen = 32, | 6546 | .klen = 32, |
6541 | .iv = { 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, 0x00 }, | 6547 | .iv = "\x00\x00\x00\x10\x00\x00\x00\x00", |
6542 | .input = { | 6548 | .input = "\x00\x00\x00\x00\x00\x00\x00\x00" |
6543 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6549 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6544 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6550 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6545 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6551 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6546 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6552 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6547 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6553 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6548 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6554 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6549 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6555 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6550 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6556 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6551 | 6557 | "\x00\x00\x00\x00\x00\x00\x00\x00" | |
6552 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6558 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6553 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6559 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6554 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6560 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6555 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6561 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6556 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6562 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6557 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6563 | "\x00\x00\x00\x00\x00\x00\x00\x00" |
6558 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6564 | "\x00", |
6559 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | ||
6560 | |||
6561 | 0x00, | ||
6562 | }, | ||
6563 | .ilen = 129, | 6565 | .ilen = 129, |
6564 | .result = { | 6566 | .result = "\xD2\xDB\x1A\x5C\xF1\xC1\xAC\xDB" |
6565 | 0xD2, 0xDB, 0x1A, 0x5C, 0xF1, 0xC1, 0xAC, 0xDB, | 6567 | "\xE8\x1A\x7A\x43\x40\xEF\x53\x43" |
6566 | 0xE8, 0x1A, 0x7A, 0x43, 0x40, 0xEF, 0x53, 0x43, | 6568 | "\x5E\x7F\x4B\x1A\x50\x52\x3F\x8D" |
6567 | 0x5E, 0x7F, 0x4B, 0x1A, 0x50, 0x52, 0x3F, 0x8D, | 6569 | "\x28\x3D\xCF\x85\x1D\x69\x6E\x60" |
6568 | 0x28, 0x3D, 0xCF, 0x85, 0x1D, 0x69, 0x6E, 0x60, | 6570 | "\xF2\xDE\x74\x56\x18\x1B\x84\x10" |
6569 | 0xF2, 0xDE, 0x74, 0x56, 0x18, 0x1B, 0x84, 0x10, | 6571 | "\xD4\x62\xBA\x60\x50\xF0\x61\xF2" |
6570 | 0xD4, 0x62, 0xBA, 0x60, 0x50, 0xF0, 0x61, 0xF2, | 6572 | "\x1C\x78\x7F\xC1\x24\x34\xAF\x58" |
6571 | 0x1C, 0x78, 0x7F, 0xC1, 0x24, 0x34, 0xAF, 0x58, | 6573 | "\xBF\x2C\x59\xCA\x90\x77\xF3\xB0" |
6572 | 0xBF, 0x2C, 0x59, 0xCA, 0x90, 0x77, 0xF3, 0xB0, | 6574 | "\x5B\x4A\xDF\x89\xCE\x2C\x2F\xFC" |
6573 | 6575 | "\x67\xF0\xE3\x45\xE8\xB3\xB3\x75" | |
6574 | 0x5B, 0x4A, 0xDF, 0x89, 0xCE, 0x2C, 0x2F, 0xFC, | 6576 | "\xA0\x95\x71\xA1\x29\x39\x94\xCA" |
6575 | 0x67, 0xF0, 0xE3, 0x45, 0xE8, 0xB3, 0xB3, 0x75, | 6577 | "\x45\x2F\xBD\xCB\x10\xB6\xBE\x9F" |
6576 | 0xA0, 0x95, 0x71, 0xA1, 0x29, 0x39, 0x94, 0xCA, | 6578 | "\x8E\xF9\xB2\x01\x0A\x5A\x0A\xB7" |
6577 | 0x45, 0x2F, 0xBD, 0xCB, 0x10, 0xB6, 0xBE, 0x9F, | 6579 | "\x6B\x9D\x70\x8E\x4B\xD6\x2F\xCD" |
6578 | 0x8E, 0xF9, 0xB2, 0x01, 0x0A, 0x5A, 0x0A, 0xB7, | 6580 | "\x2E\x40\x48\x75\xE9\xE2\x21\x45" |
6579 | 0x6B, 0x9D, 0x70, 0x8E, 0x4B, 0xD6, 0x2F, 0xCD, | 6581 | "\x0B\xC9\xB6\xB5\x66\xBC\x9A\x59" |
6580 | 0x2E, 0x40, 0x48, 0x75, 0xE9, 0xE2, 0x21, 0x45, | 6582 | "\x5A", |
6581 | 0x0B, 0xC9, 0xB6, 0xB5, 0x66, 0xBC, 0x9A, 0x59, | ||
6582 | |||
6583 | 0x5A, | ||
6584 | }, | ||
6585 | .rlen = 129, | 6583 | .rlen = 129, |
6586 | }, { /* large test vector generated using Crypto++ */ | 6584 | }, { /* large test vector generated using Crypto++ */ |
6587 | .key = { | 6585 | .key = "\x00\x01\x02\x03\x04\x05\x06\x07" |
6588 | 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 6586 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
6589 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 6587 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
6590 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 6588 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f", |
6591 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, | ||
6592 | }, | ||
6593 | .klen = 32, | 6589 | .klen = 32, |
6594 | .iv = { | 6590 | .iv = "\x00\x00\x00\x00\x00\x00\x00\x00" |
6595 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6591 | "\x00\x00\x00\x00\x00\x00\x00\x00", |
6596 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | 6592 | .input = |
6597 | }, | 6593 | "\x00\x01\x02\x03\x04\x05\x06\x07" |
6598 | .input = { | 6594 | "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" |
6599 | 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | 6595 | "\x10\x11\x12\x13\x14\x15\x16\x17" |
6600 | 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | 6596 | "\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f" |
6601 | 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | 6597 | "\x20\x21\x22\x23\x24\x25\x26\x27" |
6602 | 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, | 6598 | "\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f" |
6603 | 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, | 6599 | "\x30\x31\x32\x33\x34\x35\x36\x37" |
6604 | 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, | 6600 | "\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f" |
6605 | 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | 6601 | "\x40\x41\x42\x43\x44\x45\x46\x47" |
6606 | 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, | 6602 | "\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f" |
6607 | 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, | 6603 | "\x50\x51\x52\x53\x54\x55\x56\x57" |
6608 | 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, | 6604 | "\x58\x59\x5a\x5b\x5c\x5d\x5e\x5f" |
6609 | 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, | 6605 | "\x60\x61\x62\x63\x64\x65\x66\x67" |
6610 | 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, | 6606 | "\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f" |
6611 | 0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, | 6607 | "\x70\x71\x72\x73\x74\x75\x76\x77" |
6612 | 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, | 6608 | "\x78\x79\x7a\x7b\x7c\x7d\x7e\x7f" |
6613 | 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, | 6609 | "\x80\x81\x82\x83\x84\x85\x86\x87" |
6614 | 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, | 6610 | "\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f" |
6615 | 0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, | 6611 | "\x90\x91\x92\x93\x94\x95\x96\x97" |
6616 | 0x88, 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f, | 6612 | "\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f" |
6617 | 0x90, 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, | 6613 | "\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7" |
6618 | 0x98, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f, | 6614 | "\xa8\xa9\xaa\xab\xac\xad\xae\xaf" |
6619 | 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7, | 6615 | "\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7" |
6620 | 0xa8, 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf, | 6616 | "\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf" |
6621 | 0xb0, 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7, | 6617 | "\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7" |
6622 | 0xb8, 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf, | 6618 | "\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf" |
6623 | 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, | 6619 | "\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7" |
6624 | 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf, | 6620 | "\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf" |
6625 | 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, | 6621 | "\xe0\xe1\xe2\xe3\xe4\xe5\xe6\xe7" |
6626 | 0xd8, 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, | 6622 | "\xe8\xe9\xea\xeb\xec\xed\xee\xef" |
6627 | 0xe0, 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7, | 6623 | "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7" |
6628 | 0xe8, 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef, | 6624 | "\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff" |
6629 | 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, | 6625 | "\x00\x03\x06\x09\x0c\x0f\x12\x15" |
6630 | 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff, | 6626 | "\x18\x1b\x1e\x21\x24\x27\x2a\x2d" |
6631 | 0x00, 0x03, 0x06, 0x09, 0x0c, 0x0f, 0x12, 0x15, | 6627 | "\x30\x33\x36\x39\x3c\x3f\x42\x45" |
6632 | 0x18, 0x1b, 0x1e, 0x21, 0x24, 0x27, 0x2a, 0x2d, | 6628 | "\x48\x4b\x4e\x51\x54\x57\x5a\x5d" |
6633 | 0x30, 0x33, 0x36, 0x39, 0x3c, 0x3f, 0x42, 0x45, | 6629 | "\x60\x63\x66\x69\x6c\x6f\x72\x75" |
6634 | 0x48, 0x4b, 0x4e, 0x51, 0x54, 0x57, 0x5a, 0x5d, | 6630 | "\x78\x7b\x7e\x81\x84\x87\x8a\x8d" |
6635 | 0x60, 0x63, 0x66, 0x69, 0x6c, 0x6f, 0x72, 0x75, | 6631 | "\x90\x93\x96\x99\x9c\x9f\xa2\xa5" |
6636 | 0x78, 0x7b, 0x7e, 0x81, 0x84, 0x87, 0x8a, 0x8d, | 6632 | "\xa8\xab\xae\xb1\xb4\xb7\xba\xbd" |
6637 | 0x90, 0x93, 0x96, 0x99, 0x9c, 0x9f, 0xa2, 0xa5, | 6633 | "\xc0\xc3\xc6\xc9\xcc\xcf\xd2\xd5" |
6638 | 0xa8, 0xab, 0xae, 0xb1, 0xb4, 0xb7, 0xba, 0xbd, | 6634 | "\xd8\xdb\xde\xe1\xe4\xe7\xea\xed" |
6639 | 0xc0, 0xc3, 0xc6, 0xc9, 0xcc, 0xcf, 0xd2, 0xd5, | 6635 | "\xf0\xf3\xf6\xf9\xfc\xff\x02\x05" |
6640 | 0xd8, 0xdb, 0xde, 0xe1, 0xe4, 0xe7, 0xea, 0xed, | 6636 | "\x08\x0b\x0e\x11\x14\x17\x1a\x1d" |
6641 | 0xf0, 0xf3, 0xf6, 0xf9, 0xfc, 0xff, 0x02, 0x05, | 6637 | "\x20\x23\x26\x29\x2c\x2f\x32\x35" |
6642 | 0x08, 0x0b, 0x0e, 0x11, 0x14, 0x17, 0x1a, 0x1d, | 6638 | "\x38\x3b\x3e\x41\x44\x47\x4a\x4d" |
6643 | 0x20, 0x23, 0x26, 0x29, 0x2c, 0x2f, 0x32, 0x35, | 6639 | "\x50\x53\x56\x59\x5c\x5f\x62\x65" |
6644 | 0x38, 0x3b, 0x3e, 0x41, 0x44, 0x47, 0x4a, 0x4d, | 6640 | "\x68\x6b\x6e\x71\x74\x77\x7a\x7d" |
6645 | 0x50, 0x53, 0x56, 0x59, 0x5c, 0x5f, 0x62, 0x65, | 6641 | "\x80\x83\x86\x89\x8c\x8f\x92\x95" |
6646 | 0x68, 0x6b, 0x6e, 0x71, 0x74, 0x77, 0x7a, 0x7d, | 6642 | "\x98\x9b\x9e\xa1\xa4\xa7\xaa\xad" |
6647 | 0x80, 0x83, 0x86, 0x89, 0x8c, 0x8f, 0x92, 0x95, | 6643 | "\xb0\xb3\xb6\xb9\xbc\xbf\xc2\xc5" |
6648 | 0x98, 0x9b, 0x9e, 0xa1, 0xa4, 0xa7, 0xaa, 0xad, | 6644 | "\xc8\xcb\xce\xd1\xd4\xd7\xda\xdd" |
6649 | 0xb0, 0xb3, 0xb6, 0xb9, 0xbc, 0xbf, 0xc2, 0xc5, | 6645 | "\xe0\xe3\xe6\xe9\xec\xef\xf2\xf5" |
6650 | 0xc8, 0xcb, 0xce, 0xd1, 0xd4, 0xd7, 0xda, 0xdd, | 6646 | "\xf8\xfb\xfe\x01\x04\x07\x0a\x0d" |
6651 | 0xe0, 0xe3, 0xe6, 0xe9, 0xec, 0xef, 0xf2, 0xf5, | 6647 | "\x10\x13\x16\x19\x1c\x1f\x22\x25" |
6652 | 0xf8, 0xfb, 0xfe, 0x01, 0x04, 0x07, 0x0a, 0x0d, | 6648 | "\x28\x2b\x2e\x31\x34\x37\x3a\x3d" |
6653 | 0x10, 0x13, 0x16, 0x19, 0x1c, 0x1f, 0x22, 0x25, | 6649 | "\x40\x43\x46\x49\x4c\x4f\x52\x55" |
6654 | 0x28, 0x2b, 0x2e, 0x31, 0x34, 0x37, 0x3a, 0x3d, | 6650 | "\x58\x5b\x5e\x61\x64\x67\x6a\x6d" |
6655 | 0x40, 0x43, 0x46, 0x49, 0x4c, 0x4f, 0x52, 0x55, | 6651 | "\x70\x73\x76\x79\x7c\x7f\x82\x85" |
6656 | 0x58, 0x5b, 0x5e, 0x61, 0x64, 0x67, 0x6a, 0x6d, | 6652 | "\x88\x8b\x8e\x91\x94\x97\x9a\x9d" |
6657 | 0x70, 0x73, 0x76, 0x79, 0x7c, 0x7f, 0x82, 0x85, | 6653 | "\xa0\xa3\xa6\xa9\xac\xaf\xb2\xb5" |
6658 | 0x88, 0x8b, 0x8e, 0x91, 0x94, 0x97, 0x9a, 0x9d, | 6654 | "\xb8\xbb\xbe\xc1\xc4\xc7\xca\xcd" |
6659 | 0xa0, 0xa3, 0xa6, 0xa9, 0xac, 0xaf, 0xb2, 0xb5, | 6655 | "\xd0\xd3\xd6\xd9\xdc\xdf\xe2\xe5" |
6660 | 0xb8, 0xbb, 0xbe, 0xc1, 0xc4, 0xc7, 0xca, 0xcd, | 6656 | "\xe8\xeb\xee\xf1\xf4\xf7\xfa\xfd" |
6661 | 0xd0, 0xd3, 0xd6, 0xd9, 0xdc, 0xdf, 0xe2, 0xe5, | 6657 | "\x00\x05\x0a\x0f\x14\x19\x1e\x23" |
6662 | 0xe8, 0xeb, 0xee, 0xf1, 0xf4, 0xf7, 0xfa, 0xfd, | 6658 | "\x28\x2d\x32\x37\x3c\x41\x46\x4b" |
6663 | 0x00, 0x05, 0x0a, 0x0f, 0x14, 0x19, 0x1e, 0x23, | 6659 | "\x50\x55\x5a\x5f\x64\x69\x6e\x73" |
6664 | 0x28, 0x2d, 0x32, 0x37, 0x3c, 0x41, 0x46, 0x4b, | 6660 | "\x78\x7d\x82\x87\x8c\x91\x96\x9b" |
6665 | 0x50, 0x55, 0x5a, 0x5f, 0x64, 0x69, 0x6e, 0x73, | 6661 | "\xa0\xa5\xaa\xaf\xb4\xb9\xbe\xc3" |
6666 | 0x78, 0x7d, 0x82, 0x87, 0x8c, 0x91, 0x96, 0x9b, | 6662 | "\xc8\xcd\xd2\xd7\xdc\xe1\xe6\xeb" |
6667 | 0xa0, 0xa5, 0xaa, 0xaf, 0xb4, 0xb9, 0xbe, 0xc3, | 6663 | "\xf0\xf5\xfa\xff\x04\x09\x0e\x13" |
6668 | 0xc8, 0xcd, 0xd2, 0xd7, 0xdc, 0xe1, 0xe6, 0xeb, | 6664 | "\x18\x1d\x22\x27\x2c\x31\x36\x3b" |
6669 | 0xf0, 0xf5, 0xfa, 0xff, 0x04, 0x09, 0x0e, 0x13, | 6665 | "\x40\x45\x4a\x4f\x54\x59\x5e\x63" |
6670 | 0x18, 0x1d, 0x22, 0x27, 0x2c, 0x31, 0x36, 0x3b, | 6666 | "\x68\x6d\x72\x77\x7c\x81\x86\x8b" |
6671 | 0x40, 0x45, 0x4a, 0x4f, 0x54, 0x59, 0x5e, 0x63, | 6667 | "\x90\x95\x9a\x9f\xa4\xa9\xae\xb3" |
6672 | 0x68, 0x6d, 0x72, 0x77, 0x7c, 0x81, 0x86, 0x8b, | 6668 | "\xb8\xbd\xc2\xc7\xcc\xd1\xd6\xdb" |
6673 | 0x90, 0x95, 0x9a, 0x9f, 0xa4, 0xa9, 0xae, 0xb3, | 6669 | "\xe0\xe5\xea\xef\xf4\xf9\xfe\x03" |
6674 | 0xb8, 0xbd, 0xc2, 0xc7, 0xcc, 0xd1, 0xd6, 0xdb, | 6670 | "\x08\x0d\x12\x17\x1c\x21\x26\x2b" |
6675 | 0xe0, 0xe5, 0xea, 0xef, 0xf4, 0xf9, 0xfe, 0x03, | 6671 | "\x30\x35\x3a\x3f\x44\x49\x4e\x53" |
6676 | 0x08, 0x0d, 0x12, 0x17, 0x1c, 0x21, 0x26, 0x2b, | 6672 | "\x58\x5d\x62\x67\x6c\x71\x76\x7b" |
6677 | 0x30, 0x35, 0x3a, 0x3f, 0x44, 0x49, 0x4e, 0x53, | 6673 | "\x80\x85\x8a\x8f\x94\x99\x9e\xa3" |
6678 | 0x58, 0x5d, 0x62, 0x67, 0x6c, 0x71, 0x76, 0x7b, | 6674 | "\xa8\xad\xb2\xb7\xbc\xc1\xc6\xcb" |
6679 | 0x80, 0x85, 0x8a, 0x8f, 0x94, 0x99, 0x9e, 0xa3, | 6675 | "\xd0\xd5\xda\xdf\xe4\xe9\xee\xf3" |
6680 | 0xa8, 0xad, 0xb2, 0xb7, 0xbc, 0xc1, 0xc6, 0xcb, | 6676 | "\xf8\xfd\x02\x07\x0c\x11\x16\x1b" |
6681 | 0xd0, 0xd5, 0xda, 0xdf, 0xe4, 0xe9, 0xee, 0xf3, | 6677 | "\x20\x25\x2a\x2f\x34\x39\x3e\x43" |
6682 | 0xf8, 0xfd, 0x02, 0x07, 0x0c, 0x11, 0x16, 0x1b, | 6678 | "\x48\x4d\x52\x57\x5c\x61\x66\x6b" |
6683 | 0x20, 0x25, 0x2a, 0x2f, 0x34, 0x39, 0x3e, 0x43, | 6679 | "\x70\x75\x7a\x7f\x84\x89\x8e\x93" |
6684 | 0x48, 0x4d, 0x52, 0x57, 0x5c, 0x61, 0x66, 0x6b, | 6680 | "\x98\x9d\xa2\xa7\xac\xb1\xb6\xbb" |
6685 | 0x70, 0x75, 0x7a, 0x7f, 0x84, 0x89, 0x8e, 0x93, | 6681 | "\xc0\xc5\xca\xcf\xd4\xd9\xde\xe3" |
6686 | 0x98, 0x9d, 0xa2, 0xa7, 0xac, 0xb1, 0xb6, 0xbb, | 6682 | "\xe8\xed\xf2\xf7\xfc\x01\x06\x0b" |
6687 | 0xc0, 0xc5, 0xca, 0xcf, 0xd4, 0xd9, 0xde, 0xe3, | 6683 | "\x10\x15\x1a\x1f\x24\x29\x2e\x33" |
6688 | 0xe8, 0xed, 0xf2, 0xf7, 0xfc, 0x01, 0x06, 0x0b, | 6684 | "\x38\x3d\x42\x47\x4c\x51\x56\x5b" |
6689 | 0x10, 0x15, 0x1a, 0x1f, 0x24, 0x29, 0x2e, 0x33, | 6685 | "\x60\x65\x6a\x6f\x74\x79\x7e\x83" |
6690 | 0x38, 0x3d, 0x42, 0x47, 0x4c, 0x51, 0x56, 0x5b, | 6686 | "\x88\x8d\x92\x97\x9c\xa1\xa6\xab" |
6691 | 0x60, 0x65, 0x6a, 0x6f, 0x74, 0x79, 0x7e, 0x83, | 6687 | "\xb0\xb5\xba\xbf\xc4\xc9\xce\xd3" |
6692 | 0x88, 0x8d, 0x92, 0x97, 0x9c, 0xa1, 0xa6, 0xab, | 6688 | "\xd8\xdd\xe2\xe7\xec\xf1\xf6\xfb" |
6693 | 0xb0, 0xb5, 0xba, 0xbf, 0xc4, 0xc9, 0xce, 0xd3, | 6689 | "\x00\x07\x0e\x15\x1c\x23\x2a\x31" |
6694 | 0xd8, 0xdd, 0xe2, 0xe7, 0xec, 0xf1, 0xf6, 0xfb, | 6690 | "\x38\x3f\x46\x4d\x54\x5b\x62\x69" |
6695 | 0x00, 0x07, 0x0e, 0x15, 0x1c, 0x23, 0x2a, 0x31, | 6691 | "\x70\x77\x7e\x85\x8c\x93\x9a\xa1" |
6696 | 0x38, 0x3f, 0x46, 0x4d, 0x54, 0x5b, 0x62, 0x69, | 6692 | "\xa8\xaf\xb6\xbd\xc4\xcb\xd2\xd9" |
6697 | 0x70, 0x77, 0x7e, 0x85, 0x8c, 0x93, 0x9a, 0xa1, | 6693 | "\xe0\xe7\xee\xf5\xfc\x03\x0a\x11" |
6698 | 0xa8, 0xaf, 0xb6, 0xbd, 0xc4, 0xcb, 0xd2, 0xd9, | 6694 | "\x18\x1f\x26\x2d\x34\x3b\x42\x49" |
6699 | 0xe0, 0xe7, 0xee, 0xf5, 0xfc, 0x03, 0x0a, 0x11, | 6695 | "\x50\x57\x5e\x65\x6c\x73\x7a\x81" |
6700 | 0x18, 0x1f, 0x26, 0x2d, 0x34, 0x3b, 0x42, 0x49, | 6696 | "\x88\x8f\x96\x9d\xa4\xab\xb2\xb9" |
6701 | 0x50, 0x57, 0x5e, 0x65, 0x6c, 0x73, 0x7a, 0x81, | 6697 | "\xc0\xc7\xce\xd5\xdc\xe3\xea\xf1" |
6702 | 0x88, 0x8f, 0x96, 0x9d, 0xa4, 0xab, 0xb2, 0xb9, | 6698 | "\xf8\xff\x06\x0d\x14\x1b\x22\x29" |
6703 | 0xc0, 0xc7, 0xce, 0xd5, 0xdc, 0xe3, 0xea, 0xf1, | 6699 | "\x30\x37\x3e\x45\x4c\x53\x5a\x61" |
6704 | 0xf8, 0xff, 0x06, 0x0d, 0x14, 0x1b, 0x22, 0x29, | 6700 | "\x68\x6f\x76\x7d\x84\x8b\x92\x99" |
6705 | 0x30, 0x37, 0x3e, 0x45, 0x4c, 0x53, 0x5a, 0x61, | 6701 | "\xa0\xa7\xae\xb5\xbc\xc3\xca\xd1" |
6706 | 0x68, 0x6f, 0x76, 0x7d, 0x84, 0x8b, 0x92, 0x99, | 6702 | "\xd8\xdf\xe6\xed\xf4\xfb\x02\x09" |
6707 | 0xa0, 0xa7, 0xae, 0xb5, 0xbc, 0xc3, 0xca, 0xd1, | 6703 | "\x10\x17\x1e\x25\x2c\x33\x3a\x41" |
6708 | 0xd8, 0xdf, 0xe6, 0xed, 0xf4, 0xfb, 0x02, 0x09, | 6704 | "\x48\x4f\x56\x5d\x64\x6b\x72\x79" |
6709 | 0x10, 0x17, 0x1e, 0x25, 0x2c, 0x33, 0x3a, 0x41, | 6705 | "\x80\x87\x8e\x95\x9c\xa3\xaa\xb1" |
6710 | 0x48, 0x4f, 0x56, 0x5d, 0x64, 0x6b, 0x72, 0x79, | 6706 | "\xb8\xbf\xc6\xcd\xd4\xdb\xe2\xe9" |
6711 | 0x80, 0x87, 0x8e, 0x95, 0x9c, 0xa3, 0xaa, 0xb1, | 6707 | "\xf0\xf7\xfe\x05\x0c\x13\x1a\x21" |
6712 | 0xb8, 0xbf, 0xc6, 0xcd, 0xd4, 0xdb, 0xe2, 0xe9, | 6708 | "\x28\x2f\x36\x3d\x44\x4b\x52\x59" |
6713 | 0xf0, 0xf7, 0xfe, 0x05, 0x0c, 0x13, 0x1a, 0x21, | 6709 | "\x60\x67\x6e\x75\x7c\x83\x8a\x91" |
6714 | 0x28, 0x2f, 0x36, 0x3d, 0x44, 0x4b, 0x52, 0x59, | 6710 | "\x98\x9f\xa6\xad\xb4\xbb\xc2\xc9" |
6715 | 0x60, 0x67, 0x6e, 0x75, 0x7c, 0x83, 0x8a, 0x91, | 6711 | "\xd0\xd7\xde\xe5\xec\xf3\xfa\x01" |
6716 | 0x98, 0x9f, 0xa6, 0xad, 0xb4, 0xbb, 0xc2, 0xc9, | 6712 | "\x08\x0f\x16\x1d\x24\x2b\x32\x39" |
6717 | 0xd0, 0xd7, 0xde, 0xe5, 0xec, 0xf3, 0xfa, 0x01, | 6713 | "\x40\x47\x4e\x55\x5c\x63\x6a\x71" |
6718 | 0x08, 0x0f, 0x16, 0x1d, 0x24, 0x2b, 0x32, 0x39, | 6714 | "\x78\x7f\x86\x8d\x94\x9b\xa2\xa9" |
6719 | 0x40, 0x47, 0x4e, 0x55, 0x5c, 0x63, 0x6a, 0x71, | 6715 | "\xb0\xb7\xbe\xc5\xcc\xd3\xda\xe1" |
6720 | 0x78, 0x7f, 0x86, 0x8d, 0x94, 0x9b, 0xa2, 0xa9, | 6716 | "\xe8\xef\xf6\xfd\x04\x0b\x12\x19" |
6721 | 0xb0, 0xb7, 0xbe, 0xc5, 0xcc, 0xd3, 0xda, 0xe1, | 6717 | "\x20\x27\x2e\x35\x3c\x43\x4a\x51" |
6722 | 0xe8, 0xef, 0xf6, 0xfd, 0x04, 0x0b, 0x12, 0x19, | 6718 | "\x58\x5f\x66\x6d\x74\x7b\x82\x89" |
6723 | 0x20, 0x27, 0x2e, 0x35, 0x3c, 0x43, 0x4a, 0x51, | 6719 | "\x90\x97\x9e\xa5\xac\xb3\xba\xc1" |
6724 | 0x58, 0x5f, 0x66, 0x6d, 0x74, 0x7b, 0x82, 0x89, | 6720 | "\xc8\xcf\xd6\xdd\xe4\xeb\xf2\xf9" |
6725 | 0x90, 0x97, 0x9e, 0xa5, 0xac, 0xb3, 0xba, 0xc1, | 6721 | "\x00\x09\x12\x1b\x24\x2d\x36\x3f" |
6726 | 0xc8, 0xcf, 0xd6, 0xdd, 0xe4, 0xeb, 0xf2, 0xf9, | 6722 | "\x48\x51\x5a\x63\x6c\x75\x7e\x87" |
6727 | 0x00, 0x09, 0x12, 0x1b, 0x24, 0x2d, 0x36, 0x3f, | 6723 | "\x90\x99\xa2\xab\xb4\xbd\xc6\xcf" |
6728 | 0x48, 0x51, 0x5a, 0x63, 0x6c, 0x75, 0x7e, 0x87, | 6724 | "\xd8\xe1\xea\xf3\xfc\x05\x0e\x17" |
6729 | 0x90, 0x99, 0xa2, 0xab, 0xb4, 0xbd, 0xc6, 0xcf, | 6725 | "\x20\x29\x32\x3b\x44\x4d\x56\x5f" |
6730 | 0xd8, 0xe1, 0xea, 0xf3, 0xfc, 0x05, 0x0e, 0x17, | 6726 | "\x68\x71\x7a\x83\x8c\x95\x9e\xa7" |
6731 | 0x20, 0x29, 0x32, 0x3b, 0x44, 0x4d, 0x56, 0x5f, | 6727 | "\xb0\xb9\xc2\xcb\xd4\xdd\xe6\xef" |
6732 | 0x68, 0x71, 0x7a, 0x83, 0x8c, 0x95, 0x9e, 0xa7, | 6728 | "\xf8\x01\x0a\x13\x1c\x25\x2e\x37" |
6733 | 0xb0, 0xb9, 0xc2, 0xcb, 0xd4, 0xdd, 0xe6, 0xef, | 6729 | "\x40\x49\x52\x5b\x64\x6d\x76\x7f" |
6734 | 0xf8, 0x01, 0x0a, 0x13, 0x1c, 0x25, 0x2e, 0x37, | 6730 | "\x88\x91\x9a\xa3\xac\xb5\xbe\xc7" |
6735 | 0x40, 0x49, 0x52, 0x5b, 0x64, 0x6d, 0x76, 0x7f, | 6731 | "\xd0\xd9\xe2\xeb\xf4\xfd\x06\x0f" |
6736 | 0x88, 0x91, 0x9a, 0xa3, 0xac, 0xb5, 0xbe, 0xc7, | 6732 | "\x18\x21\x2a\x33\x3c\x45\x4e\x57" |
6737 | 0xd0, 0xd9, 0xe2, 0xeb, 0xf4, 0xfd, 0x06, 0x0f, | 6733 | "\x60\x69\x72\x7b\x84\x8d\x96\x9f" |
6738 | 0x18, 0x21, 0x2a, 0x33, 0x3c, 0x45, 0x4e, 0x57, | 6734 | "\xa8\xb1\xba\xc3\xcc\xd5\xde\xe7" |
6739 | 0x60, 0x69, 0x72, 0x7b, 0x84, 0x8d, 0x96, 0x9f, | 6735 | "\xf0\xf9\x02\x0b\x14\x1d\x26\x2f" |
6740 | 0xa8, 0xb1, 0xba, 0xc3, 0xcc, 0xd5, 0xde, 0xe7, | 6736 | "\x38\x41\x4a\x53\x5c\x65\x6e\x77" |
6741 | 0xf0, 0xf9, 0x02, 0x0b, 0x14, 0x1d, 0x26, 0x2f, | 6737 | "\x80\x89\x92\x9b\xa4\xad\xb6\xbf" |
6742 | 0x38, 0x41, 0x4a, 0x53, 0x5c, 0x65, 0x6e, 0x77, | 6738 | "\xc8\xd1\xda\xe3\xec\xf5\xfe\x07" |
6743 | 0x80, 0x89, 0x92, 0x9b, 0xa4, 0xad, 0xb6, 0xbf, | 6739 | "\x10\x19\x22\x2b\x34\x3d\x46\x4f" |
6744 | 0xc8, 0xd1, 0xda, 0xe3, 0xec, 0xf5, 0xfe, 0x07, | 6740 | "\x58\x61\x6a\x73\x7c\x85\x8e\x97" |
6745 | 0x10, 0x19, 0x22, 0x2b, 0x34, 0x3d, 0x46, 0x4f, | 6741 | "\xa0\xa9\xb2\xbb\xc4\xcd\xd6\xdf" |
6746 | 0x58, 0x61, 0x6a, 0x73, 0x7c, 0x85, 0x8e, 0x97, | 6742 | "\xe8\xf1\xfa\x03\x0c\x15\x1e\x27" |
6747 | 0xa0, 0xa9, 0xb2, 0xbb, 0xc4, 0xcd, 0xd6, 0xdf, | 6743 | "\x30\x39\x42\x4b\x54\x5d\x66\x6f" |
6748 | 0xe8, 0xf1, 0xfa, 0x03, 0x0c, 0x15, 0x1e, 0x27, | 6744 | "\x78\x81\x8a\x93\x9c\xa5\xae\xb7" |
6749 | 0x30, 0x39, 0x42, 0x4b, 0x54, 0x5d, 0x66, 0x6f, | 6745 | "\xc0\xc9\xd2\xdb\xe4\xed\xf6\xff" |
6750 | 0x78, 0x81, 0x8a, 0x93, 0x9c, 0xa5, 0xae, 0xb7, | 6746 | "\x08\x11\x1a\x23\x2c\x35\x3e\x47" |
6751 | 0xc0, 0xc9, 0xd2, 0xdb, 0xe4, 0xed, 0xf6, 0xff, | 6747 | "\x50\x59\x62\x6b\x74\x7d\x86\x8f" |
6752 | 0x08, 0x11, 0x1a, 0x23, 0x2c, 0x35, 0x3e, 0x47, | 6748 | "\x98\xa1\xaa\xb3\xbc\xc5\xce\xd7" |
6753 | 0x50, 0x59, 0x62, 0x6b, 0x74, 0x7d, 0x86, 0x8f, | 6749 | "\xe0\xe9\xf2\xfb\x04\x0d\x16\x1f" |
6754 | 0x98, 0xa1, 0xaa, 0xb3, 0xbc, 0xc5, 0xce, 0xd7, | 6750 | "\x28\x31\x3a\x43\x4c\x55\x5e\x67" |
6755 | 0xe0, 0xe9, 0xf2, 0xfb, 0x04, 0x0d, 0x16, 0x1f, | 6751 | "\x70\x79\x82\x8b\x94\x9d\xa6\xaf" |
6756 | 0x28, 0x31, 0x3a, 0x43, 0x4c, 0x55, 0x5e, 0x67, | 6752 | "\xb8\xc1\xca\xd3\xdc\xe5\xee\xf7" |
6757 | 0x70, 0x79, 0x82, 0x8b, 0x94, 0x9d, 0xa6, 0xaf, | 6753 | "\x00\x0b\x16\x21\x2c\x37\x42\x4d" |
6758 | 0xb8, 0xc1, 0xca, 0xd3, 0xdc, 0xe5, 0xee, 0xf7, | 6754 | "\x58\x63\x6e\x79\x84\x8f\x9a\xa5" |
6759 | 0x00, 0x0b, 0x16, 0x21, 0x2c, 0x37, 0x42, 0x4d, | 6755 | "\xb0\xbb\xc6\xd1\xdc\xe7\xf2\xfd" |
6760 | 0x58, 0x63, 0x6e, 0x79, 0x84, 0x8f, 0x9a, 0xa5, | 6756 | "\x08\x13\x1e\x29\x34\x3f\x4a\x55" |
6761 | 0xb0, 0xbb, 0xc6, 0xd1, 0xdc, 0xe7, 0xf2, 0xfd, | 6757 | "\x60\x6b\x76\x81\x8c\x97\xa2\xad" |
6762 | 0x08, 0x13, 0x1e, 0x29, 0x34, 0x3f, 0x4a, 0x55, | 6758 | "\xb8\xc3\xce\xd9\xe4\xef\xfa\x05" |
6763 | 0x60, 0x6b, 0x76, 0x81, 0x8c, 0x97, 0xa2, 0xad, | 6759 | "\x10\x1b\x26\x31\x3c\x47\x52\x5d" |
6764 | 0xb8, 0xc3, 0xce, 0xd9, 0xe4, 0xef, 0xfa, 0x05, | 6760 | "\x68\x73\x7e\x89\x94\x9f\xaa\xb5" |
6765 | 0x10, 0x1b, 0x26, 0x31, 0x3c, 0x47, 0x52, 0x5d, | 6761 | "\xc0\xcb\xd6\xe1\xec\xf7\x02\x0d" |
6766 | 0x68, 0x73, 0x7e, 0x89, 0x94, 0x9f, 0xaa, 0xb5, | 6762 | "\x18\x23\x2e\x39\x44\x4f\x5a\x65" |
6767 | 0xc0, 0xcb, 0xd6, 0xe1, 0xec, 0xf7, 0x02, 0x0d, | 6763 | "\x70\x7b\x86\x91\x9c\xa7\xb2\xbd" |
6768 | 0x18, 0x23, 0x2e, 0x39, 0x44, 0x4f, 0x5a, 0x65, | 6764 | "\xc8\xd3\xde\xe9\xf4\xff\x0a\x15" |
6769 | 0x70, 0x7b, 0x86, 0x91, 0x9c, 0xa7, 0xb2, 0xbd, | 6765 | "\x20\x2b\x36\x41\x4c\x57\x62\x6d" |
6770 | 0xc8, 0xd3, 0xde, 0xe9, 0xf4, 0xff, 0x0a, 0x15, | 6766 | "\x78\x83\x8e\x99\xa4\xaf\xba\xc5" |
6771 | 0x20, 0x2b, 0x36, 0x41, 0x4c, 0x57, 0x62, 0x6d, | 6767 | "\xd0\xdb\xe6\xf1\xfc\x07\x12\x1d" |
6772 | 0x78, 0x83, 0x8e, 0x99, 0xa4, 0xaf, 0xba, 0xc5, | 6768 | "\x28\x33\x3e\x49\x54\x5f\x6a\x75" |
6773 | 0xd0, 0xdb, 0xe6, 0xf1, 0xfc, 0x07, 0x12, 0x1d, | 6769 | "\x80\x8b\x96\xa1\xac\xb7\xc2\xcd" |
6774 | 0x28, 0x33, 0x3e, 0x49, 0x54, 0x5f, 0x6a, 0x75, | 6770 | "\xd8\xe3\xee\xf9\x04\x0f\x1a\x25" |
6775 | 0x80, 0x8b, 0x96, 0xa1, 0xac, 0xb7, 0xc2, 0xcd, | 6771 | "\x30\x3b\x46\x51\x5c\x67\x72\x7d" |
6776 | 0xd8, 0xe3, 0xee, 0xf9, 0x04, 0x0f, 0x1a, 0x25, | 6772 | "\x88\x93\x9e\xa9\xb4\xbf\xca\xd5" |
6777 | 0x30, 0x3b, 0x46, 0x51, 0x5c, 0x67, 0x72, 0x7d, | 6773 | "\xe0\xeb\xf6\x01\x0c\x17\x22\x2d" |
6778 | 0x88, 0x93, 0x9e, 0xa9, 0xb4, 0xbf, 0xca, 0xd5, | 6774 | "\x38\x43\x4e\x59\x64\x6f\x7a\x85" |
6779 | 0xe0, 0xeb, 0xf6, 0x01, 0x0c, 0x17, 0x22, 0x2d, | 6775 | "\x90\x9b\xa6\xb1\xbc\xc7\xd2\xdd" |
6780 | 0x38, 0x43, 0x4e, 0x59, 0x64, 0x6f, 0x7a, 0x85, | 6776 | "\xe8\xf3\xfe\x09\x14\x1f\x2a\x35" |
6781 | 0x90, 0x9b, 0xa6, 0xb1, 0xbc, 0xc7, 0xd2, 0xdd, | 6777 | "\x40\x4b\x56\x61\x6c\x77\x82\x8d" |
6782 | 0xe8, 0xf3, 0xfe, 0x09, 0x14, 0x1f, 0x2a, 0x35, | 6778 | "\x98\xa3\xae\xb9\xc4\xcf\xda\xe5" |
6783 | 0x40, 0x4b, 0x56, 0x61, 0x6c, 0x77, 0x82, 0x8d, | 6779 | "\xf0\xfb\x06\x11\x1c\x27\x32\x3d" |
6784 | 0x98, 0xa3, 0xae, 0xb9, 0xc4, 0xcf, 0xda, 0xe5, | 6780 | "\x48\x53\x5e\x69\x74\x7f\x8a\x95" |
6785 | 0xf0, 0xfb, 0x06, 0x11, 0x1c, 0x27, 0x32, 0x3d, | 6781 | "\xa0\xab\xb6\xc1\xcc\xd7\xe2\xed" |
6786 | 0x48, 0x53, 0x5e, 0x69, 0x74, 0x7f, 0x8a, 0x95, | 6782 | "\xf8\x03\x0e\x19\x24\x2f\x3a\x45" |
6787 | 0xa0, 0xab, 0xb6, 0xc1, 0xcc, 0xd7, 0xe2, 0xed, | 6783 | "\x50\x5b\x66\x71\x7c\x87\x92\x9d" |
6788 | 0xf8, 0x03, 0x0e, 0x19, 0x24, 0x2f, 0x3a, 0x45, | 6784 | "\xa8\xb3\xbe\xc9\xd4\xdf\xea\xf5" |
6789 | 0x50, 0x5b, 0x66, 0x71, 0x7c, 0x87, 0x92, 0x9d, | 6785 | "\x00\x0d\x1a\x27\x34\x41\x4e\x5b" |
6790 | 0xa8, 0xb3, 0xbe, 0xc9, 0xd4, 0xdf, 0xea, 0xf5, | 6786 | "\x68\x75\x82\x8f\x9c\xa9\xb6\xc3" |
6791 | 0x00, 0x0d, 0x1a, 0x27, 0x34, 0x41, 0x4e, 0x5b, | 6787 | "\xd0\xdd\xea\xf7\x04\x11\x1e\x2b" |
6792 | 0x68, 0x75, 0x82, 0x8f, 0x9c, 0xa9, 0xb6, 0xc3, | 6788 | "\x38\x45\x52\x5f\x6c\x79\x86\x93" |
6793 | 0xd0, 0xdd, 0xea, 0xf7, 0x04, 0x11, 0x1e, 0x2b, | 6789 | "\xa0\xad\xba\xc7\xd4\xe1\xee\xfb" |
6794 | 0x38, 0x45, 0x52, 0x5f, 0x6c, 0x79, 0x86, 0x93, | 6790 | "\x08\x15\x22\x2f\x3c\x49\x56\x63" |
6795 | 0xa0, 0xad, 0xba, 0xc7, 0xd4, 0xe1, 0xee, 0xfb, | 6791 | "\x70\x7d\x8a\x97\xa4\xb1\xbe\xcb" |
6796 | 0x08, 0x15, 0x22, 0x2f, 0x3c, 0x49, 0x56, 0x63, | 6792 | "\xd8\xe5\xf2\xff\x0c\x19\x26\x33" |
6797 | 0x70, 0x7d, 0x8a, 0x97, 0xa4, 0xb1, 0xbe, 0xcb, | 6793 | "\x40\x4d\x5a\x67\x74\x81\x8e\x9b" |
6798 | 0xd8, 0xe5, 0xf2, 0xff, 0x0c, 0x19, 0x26, 0x33, | 6794 | "\xa8\xb5\xc2\xcf\xdc\xe9\xf6\x03" |
6799 | 0x40, 0x4d, 0x5a, 0x67, 0x74, 0x81, 0x8e, 0x9b, | 6795 | "\x10\x1d\x2a\x37\x44\x51\x5e\x6b" |
6800 | 0xa8, 0xb5, 0xc2, 0xcf, 0xdc, 0xe9, 0xf6, 0x03, | 6796 | "\x78\x85\x92\x9f\xac\xb9\xc6\xd3" |
6801 | 0x10, 0x1d, 0x2a, 0x37, 0x44, 0x51, 0x5e, 0x6b, | 6797 | "\xe0\xed\xfa\x07\x14\x21\x2e\x3b" |
6802 | 0x78, 0x85, 0x92, 0x9f, 0xac, 0xb9, 0xc6, 0xd3, | 6798 | "\x48\x55\x62\x6f\x7c\x89\x96\xa3" |
6803 | 0xe0, 0xed, 0xfa, 0x07, 0x14, 0x21, 0x2e, 0x3b, | 6799 | "\xb0\xbd\xca\xd7\xe4\xf1\xfe\x0b" |
6804 | 0x48, 0x55, 0x62, 0x6f, 0x7c, 0x89, 0x96, 0xa3, | 6800 | "\x18\x25\x32\x3f\x4c\x59\x66\x73" |
6805 | 0xb0, 0xbd, 0xca, 0xd7, 0xe4, 0xf1, 0xfe, 0x0b, | 6801 | "\x80\x8d\x9a\xa7\xb4\xc1\xce\xdb" |
6806 | 0x18, 0x25, 0x32, 0x3f, 0x4c, 0x59, 0x66, 0x73, | 6802 | "\xe8\xf5\x02\x0f\x1c\x29\x36\x43" |
6807 | 0x80, 0x8d, 0x9a, 0xa7, 0xb4, 0xc1, 0xce, 0xdb, | 6803 | "\x50\x5d\x6a\x77\x84\x91\x9e\xab" |
6808 | 0xe8, 0xf5, 0x02, 0x0f, 0x1c, 0x29, 0x36, 0x43, | 6804 | "\xb8\xc5\xd2\xdf\xec\xf9\x06\x13" |
6809 | 0x50, 0x5d, 0x6a, 0x77, 0x84, 0x91, 0x9e, 0xab, | 6805 | "\x20\x2d\x3a\x47\x54\x61\x6e\x7b" |
6810 | 0xb8, 0xc5, 0xd2, 0xdf, 0xec, 0xf9, 0x06, 0x13, | 6806 | "\x88\x95\xa2\xaf\xbc\xc9\xd6\xe3" |
6811 | 0x20, 0x2d, 0x3a, 0x47, 0x54, 0x61, 0x6e, 0x7b, | 6807 | "\xf0\xfd\x0a\x17\x24\x31\x3e\x4b" |
6812 | 0x88, 0x95, 0xa2, 0xaf, 0xbc, 0xc9, 0xd6, 0xe3, | 6808 | "\x58\x65\x72\x7f\x8c\x99\xa6\xb3" |
6813 | 0xf0, 0xfd, 0x0a, 0x17, 0x24, 0x31, 0x3e, 0x4b, | 6809 | "\xc0\xcd\xda\xe7\xf4\x01\x0e\x1b" |
6814 | 0x58, 0x65, 0x72, 0x7f, 0x8c, 0x99, 0xa6, 0xb3, | 6810 | "\x28\x35\x42\x4f\x5c\x69\x76\x83" |
6815 | 0xc0, 0xcd, 0xda, 0xe7, 0xf4, 0x01, 0x0e, 0x1b, | 6811 | "\x90\x9d\xaa\xb7\xc4\xd1\xde\xeb" |
6816 | 0x28, 0x35, 0x42, 0x4f, 0x5c, 0x69, 0x76, 0x83, | 6812 | "\xf8\x05\x12\x1f\x2c\x39\x46\x53" |
6817 | 0x90, 0x9d, 0xaa, 0xb7, 0xc4, 0xd1, 0xde, 0xeb, | 6813 | "\x60\x6d\x7a\x87\x94\xa1\xae\xbb" |
6818 | 0xf8, 0x05, 0x12, 0x1f, 0x2c, 0x39, 0x46, 0x53, | 6814 | "\xc8\xd5\xe2\xef\xfc\x09\x16\x23" |
6819 | 0x60, 0x6d, 0x7a, 0x87, 0x94, 0xa1, 0xae, 0xbb, | 6815 | "\x30\x3d\x4a\x57\x64\x71\x7e\x8b" |
6820 | 0xc8, 0xd5, 0xe2, 0xef, 0xfc, 0x09, 0x16, 0x23, | 6816 | "\x98\xa5\xb2\xbf\xcc\xd9\xe6\xf3" |
6821 | 0x30, 0x3d, 0x4a, 0x57, 0x64, 0x71, 0x7e, 0x8b, | 6817 | "\x00\x0f\x1e\x2d\x3c\x4b\x5a\x69" |
6822 | 0x98, 0xa5, 0xb2, 0xbf, 0xcc, 0xd9, 0xe6, 0xf3, | 6818 | "\x78\x87\x96\xa5\xb4\xc3\xd2\xe1" |
6823 | 0x00, 0x0f, 0x1e, 0x2d, 0x3c, 0x4b, 0x5a, 0x69, | 6819 | "\xf0\xff\x0e\x1d\x2c\x3b\x4a\x59" |
6824 | 0x78, 0x87, 0x96, 0xa5, 0xb4, 0xc3, 0xd2, 0xe1, | 6820 | "\x68\x77\x86\x95\xa4\xb3\xc2\xd1" |
6825 | 0xf0, 0xff, 0x0e, 0x1d, 0x2c, 0x3b, 0x4a, 0x59, | 6821 | "\xe0\xef\xfe\x0d\x1c\x2b\x3a\x49" |
6826 | 0x68, 0x77, 0x86, 0x95, 0xa4, 0xb3, 0xc2, 0xd1, | 6822 | "\x58\x67\x76\x85\x94\xa3\xb2\xc1" |
6827 | 0xe0, 0xef, 0xfe, 0x0d, 0x1c, 0x2b, 0x3a, 0x49, | 6823 | "\xd0\xdf\xee\xfd\x0c\x1b\x2a\x39" |
6828 | 0x58, 0x67, 0x76, 0x85, 0x94, 0xa3, 0xb2, 0xc1, | 6824 | "\x48\x57\x66\x75\x84\x93\xa2\xb1" |
6829 | 0xd0, 0xdf, 0xee, 0xfd, 0x0c, 0x1b, 0x2a, 0x39, | 6825 | "\xc0\xcf\xde\xed\xfc\x0b\x1a\x29" |
6830 | 0x48, 0x57, 0x66, 0x75, 0x84, 0x93, 0xa2, 0xb1, | 6826 | "\x38\x47\x56\x65\x74\x83\x92\xa1" |
6831 | 0xc0, 0xcf, 0xde, 0xed, 0xfc, 0x0b, 0x1a, 0x29, | 6827 | "\xb0\xbf\xce\xdd\xec\xfb\x0a\x19" |
6832 | 0x38, 0x47, 0x56, 0x65, 0x74, 0x83, 0x92, 0xa1, | 6828 | "\x28\x37\x46\x55\x64\x73\x82\x91" |
6833 | 0xb0, 0xbf, 0xce, 0xdd, 0xec, 0xfb, 0x0a, 0x19, | 6829 | "\xa0\xaf\xbe\xcd\xdc\xeb\xfa\x09" |
6834 | 0x28, 0x37, 0x46, 0x55, 0x64, 0x73, 0x82, 0x91, | 6830 | "\x18\x27\x36\x45\x54\x63\x72\x81" |
6835 | 0xa0, 0xaf, 0xbe, 0xcd, 0xdc, 0xeb, 0xfa, 0x09, | 6831 | "\x90\x9f\xae\xbd\xcc\xdb\xea\xf9" |
6836 | 0x18, 0x27, 0x36, 0x45, 0x54, 0x63, 0x72, 0x81, | 6832 | "\x08\x17\x26\x35\x44\x53\x62\x71" |
6837 | 0x90, 0x9f, 0xae, 0xbd, 0xcc, 0xdb, 0xea, 0xf9, | 6833 | "\x80\x8f\x9e\xad\xbc\xcb\xda\xe9" |
6838 | 0x08, 0x17, 0x26, 0x35, 0x44, 0x53, 0x62, 0x71, | 6834 | "\xf8\x07\x16\x25\x34\x43\x52\x61" |
6839 | 0x80, 0x8f, 0x9e, 0xad, 0xbc, 0xcb, 0xda, 0xe9, | 6835 | "\x70\x7f\x8e\x9d\xac\xbb\xca\xd9" |
6840 | 0xf8, 0x07, 0x16, 0x25, 0x34, 0x43, 0x52, 0x61, | 6836 | "\xe8\xf7\x06\x15\x24\x33\x42\x51" |
6841 | 0x70, 0x7f, 0x8e, 0x9d, 0xac, 0xbb, 0xca, 0xd9, | 6837 | "\x60\x6f\x7e\x8d\x9c\xab\xba\xc9" |
6842 | 0xe8, 0xf7, 0x06, 0x15, 0x24, 0x33, 0x42, 0x51, | 6838 | "\xd8\xe7\xf6\x05\x14\x23\x32\x41" |
6843 | 0x60, 0x6f, 0x7e, 0x8d, 0x9c, 0xab, 0xba, 0xc9, | 6839 | "\x50\x5f\x6e\x7d\x8c\x9b\xaa\xb9" |
6844 | 0xd8, 0xe7, 0xf6, 0x05, 0x14, 0x23, 0x32, 0x41, | 6840 | "\xc8\xd7\xe6\xf5\x04\x13\x22\x31" |
6845 | 0x50, 0x5f, 0x6e, 0x7d, 0x8c, 0x9b, 0xaa, 0xb9, | 6841 | "\x40\x4f\x5e\x6d\x7c\x8b\x9a\xa9" |
6846 | 0xc8, 0xd7, 0xe6, 0xf5, 0x04, 0x13, 0x22, 0x31, | 6842 | "\xb8\xc7\xd6\xe5\xf4\x03\x12\x21" |
6847 | 0x40, 0x4f, 0x5e, 0x6d, 0x7c, 0x8b, 0x9a, 0xa9, | 6843 | "\x30\x3f\x4e\x5d\x6c\x7b\x8a\x99" |
6848 | 0xb8, 0xc7, 0xd6, 0xe5, 0xf4, 0x03, 0x12, 0x21, | 6844 | "\xa8\xb7\xc6\xd5\xe4\xf3\x02\x11" |
6849 | 0x30, 0x3f, 0x4e, 0x5d, 0x6c, 0x7b, 0x8a, 0x99, | 6845 | "\x20\x2f\x3e\x4d\x5c\x6b\x7a\x89" |
6850 | 0xa8, 0xb7, 0xc6, 0xd5, 0xe4, 0xf3, 0x02, 0x11, | 6846 | "\x98\xa7\xb6\xc5\xd4\xe3\xf2\x01" |
6851 | 0x20, 0x2f, 0x3e, 0x4d, 0x5c, 0x6b, 0x7a, 0x89, | 6847 | "\x10\x1f\x2e\x3d\x4c\x5b\x6a\x79" |
6852 | 0x98, 0xa7, 0xb6, 0xc5, 0xd4, 0xe3, 0xf2, 0x01, | 6848 | "\x88\x97\xa6\xb5\xc4\xd3\xe2\xf1" |
6853 | 0x10, 0x1f, 0x2e, 0x3d, 0x4c, 0x5b, 0x6a, 0x79, | 6849 | "\x00\x11\x22\x33\x44\x55\x66\x77" |
6854 | 0x88, 0x97, 0xa6, 0xb5, 0xc4, 0xd3, 0xe2, 0xf1, | 6850 | "\x88\x99\xaa\xbb\xcc\xdd\xee\xff" |
6855 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 6851 | "\x10\x21\x32\x43\x54\x65\x76\x87" |
6856 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, | 6852 | "\x98\xa9\xba\xcb\xdc\xed\xfe\x0f" |
6857 | 0x10, 0x21, 0x32, 0x43, 0x54, 0x65, 0x76, 0x87, | 6853 | "\x20\x31\x42\x53\x64\x75\x86\x97" |
6858 | 0x98, 0xa9, 0xba, 0xcb, 0xdc, 0xed, 0xfe, 0x0f, | 6854 | "\xa8\xb9\xca\xdb\xec\xfd\x0e\x1f" |
6859 | 0x20, 0x31, 0x42, 0x53, 0x64, 0x75, 0x86, 0x97, | 6855 | "\x30\x41\x52\x63\x74\x85\x96\xa7" |
6860 | 0xa8, 0xb9, 0xca, 0xdb, 0xec, 0xfd, 0x0e, 0x1f, | 6856 | "\xb8\xc9\xda\xeb\xfc\x0d\x1e\x2f" |
6861 | 0x30, 0x41, 0x52, 0x63, 0x74, 0x85, 0x96, 0xa7, | 6857 | "\x40\x51\x62\x73\x84\x95\xa6\xb7" |
6862 | 0xb8, 0xc9, 0xda, 0xeb, 0xfc, 0x0d, 0x1e, 0x2f, | 6858 | "\xc8\xd9\xea\xfb\x0c\x1d\x2e\x3f" |
6863 | 0x40, 0x51, 0x62, 0x73, 0x84, 0x95, 0xa6, 0xb7, | 6859 | "\x50\x61\x72\x83\x94\xa5\xb6\xc7" |
6864 | 0xc8, 0xd9, 0xea, 0xfb, 0x0c, 0x1d, 0x2e, 0x3f, | 6860 | "\xd8\xe9\xfa\x0b\x1c\x2d\x3e\x4f" |
6865 | 0x50, 0x61, 0x72, 0x83, 0x94, 0xa5, 0xb6, 0xc7, | 6861 | "\x60\x71\x82\x93\xa4\xb5\xc6\xd7" |
6866 | 0xd8, 0xe9, 0xfa, 0x0b, 0x1c, 0x2d, 0x3e, 0x4f, | 6862 | "\xe8\xf9\x0a\x1b\x2c\x3d\x4e\x5f" |
6867 | 0x60, 0x71, 0x82, 0x93, 0xa4, 0xb5, 0xc6, 0xd7, | 6863 | "\x70\x81\x92\xa3\xb4\xc5\xd6\xe7" |
6868 | 0xe8, 0xf9, 0x0a, 0x1b, 0x2c, 0x3d, 0x4e, 0x5f, | 6864 | "\xf8\x09\x1a\x2b\x3c\x4d\x5e\x6f" |
6869 | 0x70, 0x81, 0x92, 0xa3, 0xb4, 0xc5, 0xd6, 0xe7, | 6865 | "\x80\x91\xa2\xb3\xc4\xd5\xe6\xf7" |
6870 | 0xf8, 0x09, 0x1a, 0x2b, 0x3c, 0x4d, 0x5e, 0x6f, | 6866 | "\x08\x19\x2a\x3b\x4c\x5d\x6e\x7f" |
6871 | 0x80, 0x91, 0xa2, 0xb3, 0xc4, 0xd5, 0xe6, 0xf7, | 6867 | "\x90\xa1\xb2\xc3\xd4\xe5\xf6\x07" |
6872 | 0x08, 0x19, 0x2a, 0x3b, 0x4c, 0x5d, 0x6e, 0x7f, | 6868 | "\x18\x29\x3a\x4b\x5c\x6d\x7e\x8f" |
6873 | 0x90, 0xa1, 0xb2, 0xc3, 0xd4, 0xe5, 0xf6, 0x07, | 6869 | "\xa0\xb1\xc2\xd3\xe4\xf5\x06\x17" |
6874 | 0x18, 0x29, 0x3a, 0x4b, 0x5c, 0x6d, 0x7e, 0x8f, | 6870 | "\x28\x39\x4a\x5b\x6c\x7d\x8e\x9f" |
6875 | 0xa0, 0xb1, 0xc2, 0xd3, 0xe4, 0xf5, 0x06, 0x17, | 6871 | "\xb0\xc1\xd2\xe3\xf4\x05\x16\x27" |
6876 | 0x28, 0x39, 0x4a, 0x5b, 0x6c, 0x7d, 0x8e, 0x9f, | 6872 | "\x38\x49\x5a\x6b\x7c\x8d\x9e\xaf" |
6877 | 0xb0, 0xc1, 0xd2, 0xe3, 0xf4, 0x05, 0x16, 0x27, | 6873 | "\xc0\xd1\xe2\xf3\x04\x15\x26\x37" |
6878 | 0x38, 0x49, 0x5a, 0x6b, 0x7c, 0x8d, 0x9e, 0xaf, | 6874 | "\x48\x59\x6a\x7b\x8c\x9d\xae\xbf" |
6879 | 0xc0, 0xd1, 0xe2, 0xf3, 0x04, 0x15, 0x26, 0x37, | 6875 | "\xd0\xe1\xf2\x03\x14\x25\x36\x47" |
6880 | 0x48, 0x59, 0x6a, 0x7b, 0x8c, 0x9d, 0xae, 0xbf, | 6876 | "\x58\x69\x7a\x8b\x9c\xad\xbe\xcf" |
6881 | 0xd0, 0xe1, 0xf2, 0x03, 0x14, 0x25, 0x36, 0x47, | 6877 | "\xe0\xf1\x02\x13\x24\x35\x46\x57" |
6882 | 0x58, 0x69, 0x7a, 0x8b, 0x9c, 0xad, 0xbe, 0xcf, | 6878 | "\x68\x79\x8a\x9b\xac\xbd\xce\xdf" |
6883 | 0xe0, 0xf1, 0x02, 0x13, 0x24, 0x35, 0x46, 0x57, | 6879 | "\xf0\x01\x12\x23\x34\x45\x56\x67" |
6884 | 0x68, 0x79, 0x8a, 0x9b, 0xac, 0xbd, 0xce, 0xdf, | 6880 | "\x78\x89\x9a\xab\xbc\xcd\xde\xef" |
6885 | 0xf0, 0x01, 0x12, 0x23, 0x34, 0x45, 0x56, 0x67, | 6881 | "\x00\x13\x26\x39\x4c\x5f\x72\x85" |
6886 | 0x78, 0x89, 0x9a, 0xab, 0xbc, 0xcd, 0xde, 0xef, | 6882 | "\x98\xab\xbe\xd1\xe4\xf7\x0a\x1d" |
6887 | 0x00, 0x13, 0x26, 0x39, 0x4c, 0x5f, 0x72, 0x85, | 6883 | "\x30\x43\x56\x69\x7c\x8f\xa2\xb5" |
6888 | 0x98, 0xab, 0xbe, 0xd1, 0xe4, 0xf7, 0x0a, 0x1d, | 6884 | "\xc8\xdb\xee\x01\x14\x27\x3a\x4d" |
6889 | 0x30, 0x43, 0x56, 0x69, 0x7c, 0x8f, 0xa2, 0xb5, | 6885 | "\x60\x73\x86\x99\xac\xbf\xd2\xe5" |
6890 | 0xc8, 0xdb, 0xee, 0x01, 0x14, 0x27, 0x3a, 0x4d, | 6886 | "\xf8\x0b\x1e\x31\x44\x57\x6a\x7d" |
6891 | 0x60, 0x73, 0x86, 0x99, 0xac, 0xbf, 0xd2, 0xe5, | 6887 | "\x90\xa3\xb6\xc9\xdc\xef\x02\x15" |
6892 | 0xf8, 0x0b, 0x1e, 0x31, 0x44, 0x57, 0x6a, 0x7d, | 6888 | "\x28\x3b\x4e\x61\x74\x87\x9a\xad" |
6893 | 0x90, 0xa3, 0xb6, 0xc9, 0xdc, 0xef, 0x02, 0x15, | 6889 | "\xc0\xd3\xe6\xf9\x0c\x1f\x32\x45" |
6894 | 0x28, 0x3b, 0x4e, 0x61, 0x74, 0x87, 0x9a, 0xad, | 6890 | "\x58\x6b\x7e\x91\xa4\xb7\xca\xdd" |
6895 | 0xc0, 0xd3, 0xe6, 0xf9, 0x0c, 0x1f, 0x32, 0x45, | 6891 | "\xf0\x03\x16\x29\x3c\x4f\x62\x75" |
6896 | 0x58, 0x6b, 0x7e, 0x91, 0xa4, 0xb7, 0xca, 0xdd, | 6892 | "\x88\x9b\xae\xc1\xd4\xe7\xfa\x0d" |
6897 | 0xf0, 0x03, 0x16, 0x29, 0x3c, 0x4f, 0x62, 0x75, | 6893 | "\x20\x33\x46\x59\x6c\x7f\x92\xa5" |
6898 | 0x88, 0x9b, 0xae, 0xc1, 0xd4, 0xe7, 0xfa, 0x0d, | 6894 | "\xb8\xcb\xde\xf1\x04\x17\x2a\x3d" |
6899 | 0x20, 0x33, 0x46, 0x59, 0x6c, 0x7f, 0x92, 0xa5, | 6895 | "\x50\x63\x76\x89\x9c\xaf\xc2\xd5" |
6900 | 0xb8, 0xcb, 0xde, 0xf1, 0x04, 0x17, 0x2a, 0x3d, | 6896 | "\xe8\xfb\x0e\x21\x34\x47\x5a\x6d" |
6901 | 0x50, 0x63, 0x76, 0x89, 0x9c, 0xaf, 0xc2, 0xd5, | 6897 | "\x80\x93\xa6\xb9\xcc\xdf\xf2\x05" |
6902 | 0xe8, 0xfb, 0x0e, 0x21, 0x34, 0x47, 0x5a, 0x6d, | 6898 | "\x18\x2b\x3e\x51\x64\x77\x8a\x9d" |
6903 | 0x80, 0x93, 0xa6, 0xb9, 0xcc, 0xdf, 0xf2, 0x05, | 6899 | "\xb0\xc3\xd6\xe9\xfc\x0f\x22\x35" |
6904 | 0x18, 0x2b, 0x3e, 0x51, 0x64, 0x77, 0x8a, 0x9d, | 6900 | "\x48\x5b\x6e\x81\x94\xa7\xba\xcd" |
6905 | 0xb0, 0xc3, 0xd6, 0xe9, 0xfc, 0x0f, 0x22, 0x35, | 6901 | "\xe0\xf3\x06\x19\x2c\x3f\x52\x65" |
6906 | 0x48, 0x5b, 0x6e, 0x81, 0x94, 0xa7, 0xba, 0xcd, | 6902 | "\x78\x8b\x9e\xb1\xc4\xd7\xea\xfd" |
6907 | 0xe0, 0xf3, 0x06, 0x19, 0x2c, 0x3f, 0x52, 0x65, | 6903 | "\x10\x23\x36\x49\x5c\x6f\x82\x95" |
6908 | 0x78, 0x8b, 0x9e, 0xb1, 0xc4, 0xd7, 0xea, 0xfd, | 6904 | "\xa8\xbb\xce\xe1\xf4\x07\x1a\x2d" |
6909 | 0x10, 0x23, 0x36, 0x49, 0x5c, 0x6f, 0x82, 0x95, | 6905 | "\x40\x53\x66\x79\x8c\x9f\xb2\xc5" |
6910 | 0xa8, 0xbb, 0xce, 0xe1, 0xf4, 0x07, 0x1a, 0x2d, | 6906 | "\xd8\xeb\xfe\x11\x24\x37\x4a\x5d" |
6911 | 0x40, 0x53, 0x66, 0x79, 0x8c, 0x9f, 0xb2, 0xc5, | 6907 | "\x70\x83\x96\xa9\xbc\xcf\xe2\xf5" |
6912 | 0xd8, 0xeb, 0xfe, 0x11, 0x24, 0x37, 0x4a, 0x5d, | 6908 | "\x08\x1b\x2e\x41\x54\x67\x7a\x8d" |
6913 | 0x70, 0x83, 0x96, 0xa9, 0xbc, 0xcf, 0xe2, 0xf5, | 6909 | "\xa0\xb3\xc6\xd9\xec\xff\x12\x25" |
6914 | 0x08, 0x1b, 0x2e, 0x41, 0x54, 0x67, 0x7a, 0x8d, | 6910 | "\x38\x4b\x5e\x71\x84\x97\xaa\xbd" |
6915 | 0xa0, 0xb3, 0xc6, 0xd9, 0xec, 0xff, 0x12, 0x25, | 6911 | "\xd0\xe3\xf6\x09\x1c\x2f\x42\x55" |
6916 | 0x38, 0x4b, 0x5e, 0x71, 0x84, 0x97, 0xaa, 0xbd, | 6912 | "\x68\x7b\x8e\xa1\xb4\xc7\xda\xed" |
6917 | 0xd0, 0xe3, 0xf6, 0x09, 0x1c, 0x2f, 0x42, 0x55, | 6913 | "\x00\x15\x2a\x3f\x54\x69\x7e\x93" |
6918 | 0x68, 0x7b, 0x8e, 0xa1, 0xb4, 0xc7, 0xda, 0xed, | 6914 | "\xa8\xbd\xd2\xe7\xfc\x11\x26\x3b" |
6919 | 0x00, 0x15, 0x2a, 0x3f, 0x54, 0x69, 0x7e, 0x93, | 6915 | "\x50\x65\x7a\x8f\xa4\xb9\xce\xe3" |
6920 | 0xa8, 0xbd, 0xd2, 0xe7, 0xfc, 0x11, 0x26, 0x3b, | 6916 | "\xf8\x0d\x22\x37\x4c\x61\x76\x8b" |
6921 | 0x50, 0x65, 0x7a, 0x8f, 0xa4, 0xb9, 0xce, 0xe3, | 6917 | "\xa0\xb5\xca\xdf\xf4\x09\x1e\x33" |
6922 | 0xf8, 0x0d, 0x22, 0x37, 0x4c, 0x61, 0x76, 0x8b, | 6918 | "\x48\x5d\x72\x87\x9c\xb1\xc6\xdb" |
6923 | 0xa0, 0xb5, 0xca, 0xdf, 0xf4, 0x09, 0x1e, 0x33, | 6919 | "\xf0\x05\x1a\x2f\x44\x59\x6e\x83" |
6924 | 0x48, 0x5d, 0x72, 0x87, 0x9c, 0xb1, 0xc6, 0xdb, | 6920 | "\x98\xad\xc2\xd7\xec\x01\x16\x2b" |
6925 | 0xf0, 0x05, 0x1a, 0x2f, 0x44, 0x59, 0x6e, 0x83, | 6921 | "\x40\x55\x6a\x7f\x94\xa9\xbe\xd3" |
6926 | 0x98, 0xad, 0xc2, 0xd7, 0xec, 0x01, 0x16, 0x2b, | 6922 | "\xe8\xfd\x12\x27\x3c\x51\x66\x7b" |
6927 | 0x40, 0x55, 0x6a, 0x7f, 0x94, 0xa9, 0xbe, 0xd3, | 6923 | "\x90\xa5\xba\xcf\xe4\xf9\x0e\x23" |
6928 | 0xe8, 0xfd, 0x12, 0x27, 0x3c, 0x51, 0x66, 0x7b, | 6924 | "\x38\x4d\x62\x77\x8c\xa1\xb6\xcb" |
6929 | 0x90, 0xa5, 0xba, 0xcf, 0xe4, 0xf9, 0x0e, 0x23, | 6925 | "\xe0\xf5\x0a\x1f\x34\x49\x5e\x73" |
6930 | 0x38, 0x4d, 0x62, 0x77, 0x8c, 0xa1, 0xb6, 0xcb, | 6926 | "\x88\x9d\xb2\xc7\xdc\xf1\x06\x1b" |
6931 | 0xe0, 0xf5, 0x0a, 0x1f, 0x34, 0x49, 0x5e, 0x73, | 6927 | "\x30\x45\x5a\x6f\x84\x99\xae\xc3" |
6932 | 0x88, 0x9d, 0xb2, 0xc7, 0xdc, 0xf1, 0x06, 0x1b, | 6928 | "\xd8\xed\x02\x17\x2c\x41\x56\x6b" |
6933 | 0x30, 0x45, 0x5a, 0x6f, 0x84, 0x99, 0xae, 0xc3, | 6929 | "\x80\x95\xaa\xbf\xd4\xe9\xfe\x13" |
6934 | 0xd8, 0xed, 0x02, 0x17, 0x2c, 0x41, 0x56, 0x6b, | 6930 | "\x28\x3d\x52\x67\x7c\x91\xa6\xbb" |
6935 | 0x80, 0x95, 0xaa, 0xbf, 0xd4, 0xe9, 0xfe, 0x13, | 6931 | "\xd0\xe5\xfa\x0f\x24\x39\x4e\x63" |
6936 | 0x28, 0x3d, 0x52, 0x67, 0x7c, 0x91, 0xa6, 0xbb, | 6932 | "\x78\x8d\xa2\xb7\xcc\xe1\xf6\x0b" |
6937 | 0xd0, 0xe5, 0xfa, 0x0f, 0x24, 0x39, 0x4e, 0x63, | 6933 | "\x20\x35\x4a\x5f\x74\x89\x9e\xb3" |
6938 | 0x78, 0x8d, 0xa2, 0xb7, 0xcc, 0xe1, 0xf6, 0x0b, | 6934 | "\xc8\xdd\xf2\x07\x1c\x31\x46\x5b" |
6939 | 0x20, 0x35, 0x4a, 0x5f, 0x74, 0x89, 0x9e, 0xb3, | 6935 | "\x70\x85\x9a\xaf\xc4\xd9\xee\x03" |
6940 | 0xc8, 0xdd, 0xf2, 0x07, 0x1c, 0x31, 0x46, 0x5b, | 6936 | "\x18\x2d\x42\x57\x6c\x81\x96\xab" |
6941 | 0x70, 0x85, 0x9a, 0xaf, 0xc4, 0xd9, 0xee, 0x03, | 6937 | "\xc0\xd5\xea\xff\x14\x29\x3e\x53" |
6942 | 0x18, 0x2d, 0x42, 0x57, 0x6c, 0x81, 0x96, 0xab, | 6938 | "\x68\x7d\x92\xa7\xbc\xd1\xe6\xfb" |
6943 | 0xc0, 0xd5, 0xea, 0xff, 0x14, 0x29, 0x3e, 0x53, | 6939 | "\x10\x25\x3a\x4f\x64\x79\x8e\xa3" |
6944 | 0x68, 0x7d, 0x92, 0xa7, 0xbc, 0xd1, 0xe6, 0xfb, | 6940 | "\xb8\xcd\xe2\xf7\x0c\x21\x36\x4b" |
6945 | 0x10, 0x25, 0x3a, 0x4f, 0x64, 0x79, 0x8e, 0xa3, | 6941 | "\x60\x75\x8a\x9f\xb4\xc9\xde\xf3" |
6946 | 0xb8, 0xcd, 0xe2, 0xf7, 0x0c, 0x21, 0x36, 0x4b, | 6942 | "\x08\x1d\x32\x47\x5c\x71\x86\x9b" |
6947 | 0x60, 0x75, 0x8a, 0x9f, 0xb4, 0xc9, 0xde, 0xf3, | 6943 | "\xb0\xc5\xda\xef\x04\x19\x2e\x43" |
6948 | 0x08, 0x1d, 0x32, 0x47, 0x5c, 0x71, 0x86, 0x9b, | 6944 | "\x58\x6d\x82\x97\xac\xc1\xd6\xeb" |
6949 | 0xb0, 0xc5, 0xda, 0xef, 0x04, 0x19, 0x2e, 0x43, | 6945 | "\x00\x17\x2e\x45\x5c\x73\x8a\xa1" |
6950 | 0x58, 0x6d, 0x82, 0x97, 0xac, 0xc1, 0xd6, 0xeb, | 6946 | "\xb8\xcf\xe6\xfd\x14\x2b\x42\x59" |
6951 | 0x00, 0x17, 0x2e, 0x45, 0x5c, 0x73, 0x8a, 0xa1, | 6947 | "\x70\x87\x9e\xb5\xcc\xe3\xfa\x11" |
6952 | 0xb8, 0xcf, 0xe6, 0xfd, 0x14, 0x2b, 0x42, 0x59, | 6948 | "\x28\x3f\x56\x6d\x84\x9b\xb2\xc9" |
6953 | 0x70, 0x87, 0x9e, 0xb5, 0xcc, 0xe3, 0xfa, 0x11, | 6949 | "\xe0\xf7\x0e\x25\x3c\x53\x6a\x81" |
6954 | 0x28, 0x3f, 0x56, 0x6d, 0x84, 0x9b, 0xb2, 0xc9, | 6950 | "\x98\xaf\xc6\xdd\xf4\x0b\x22\x39" |
6955 | 0xe0, 0xf7, 0x0e, 0x25, 0x3c, 0x53, 0x6a, 0x81, | 6951 | "\x50\x67\x7e\x95\xac\xc3\xda\xf1" |
6956 | 0x98, 0xaf, 0xc6, 0xdd, 0xf4, 0x0b, 0x22, 0x39, | 6952 | "\x08\x1f\x36\x4d\x64\x7b\x92\xa9" |
6957 | 0x50, 0x67, 0x7e, 0x95, 0xac, 0xc3, 0xda, 0xf1, | 6953 | "\xc0\xd7\xee\x05\x1c\x33\x4a\x61" |
6958 | 0x08, 0x1f, 0x36, 0x4d, 0x64, 0x7b, 0x92, 0xa9, | 6954 | "\x78\x8f\xa6\xbd\xd4\xeb\x02\x19" |
6959 | 0xc0, 0xd7, 0xee, 0x05, 0x1c, 0x33, 0x4a, 0x61, | 6955 | "\x30\x47\x5e\x75\x8c\xa3\xba\xd1" |
6960 | 0x78, 0x8f, 0xa6, 0xbd, 0xd4, 0xeb, 0x02, 0x19, | 6956 | "\xe8\xff\x16\x2d\x44\x5b\x72\x89" |
6961 | 0x30, 0x47, 0x5e, 0x75, 0x8c, 0xa3, 0xba, 0xd1, | 6957 | "\xa0\xb7\xce\xe5\xfc\x13\x2a\x41" |
6962 | 0xe8, 0xff, 0x16, 0x2d, 0x44, 0x5b, 0x72, 0x89, | 6958 | "\x58\x6f\x86\x9d\xb4\xcb\xe2\xf9" |
6963 | 0xa0, 0xb7, 0xce, 0xe5, 0xfc, 0x13, 0x2a, 0x41, | 6959 | "\x10\x27\x3e\x55\x6c\x83\x9a\xb1" |
6964 | 0x58, 0x6f, 0x86, 0x9d, 0xb4, 0xcb, 0xe2, 0xf9, | 6960 | "\xc8\xdf\xf6\x0d\x24\x3b\x52\x69" |
6965 | 0x10, 0x27, 0x3e, 0x55, 0x6c, 0x83, 0x9a, 0xb1, | 6961 | "\x80\x97\xae\xc5\xdc\xf3\x0a\x21" |
6966 | 0xc8, 0xdf, 0xf6, 0x0d, 0x24, 0x3b, 0x52, 0x69, | 6962 | "\x38\x4f\x66\x7d\x94\xab\xc2\xd9" |
6967 | 0x80, 0x97, 0xae, 0xc5, 0xdc, 0xf3, 0x0a, 0x21, | 6963 | "\xf0\x07\x1e\x35\x4c\x63\x7a\x91" |
6968 | 0x38, 0x4f, 0x66, 0x7d, 0x94, 0xab, 0xc2, 0xd9, | 6964 | "\xa8\xbf\xd6\xed\x04\x1b\x32\x49" |
6969 | 0xf0, 0x07, 0x1e, 0x35, 0x4c, 0x63, 0x7a, 0x91, | 6965 | "\x60\x77\x8e\xa5\xbc\xd3\xea\x01" |
6970 | 0xa8, 0xbf, 0xd6, 0xed, 0x04, 0x1b, 0x32, 0x49, | 6966 | "\x18\x2f\x46\x5d\x74\x8b\xa2\xb9" |
6971 | 0x60, 0x77, 0x8e, 0xa5, 0xbc, 0xd3, 0xea, 0x01, | 6967 | "\xd0\xe7\xfe\x15\x2c\x43\x5a\x71" |
6972 | 0x18, 0x2f, 0x46, 0x5d, 0x74, 0x8b, 0xa2, 0xb9, | 6968 | "\x88\x9f\xb6\xcd\xe4\xfb\x12\x29" |
6973 | 0xd0, 0xe7, 0xfe, 0x15, 0x2c, 0x43, 0x5a, 0x71, | 6969 | "\x40\x57\x6e\x85\x9c\xb3\xca\xe1" |
6974 | 0x88, 0x9f, 0xb6, 0xcd, 0xe4, 0xfb, 0x12, 0x29, | 6970 | "\xf8\x0f\x26\x3d\x54\x6b\x82\x99" |
6975 | 0x40, 0x57, 0x6e, 0x85, 0x9c, 0xb3, 0xca, 0xe1, | 6971 | "\xb0\xc7\xde\xf5\x0c\x23\x3a\x51" |
6976 | 0xf8, 0x0f, 0x26, 0x3d, 0x54, 0x6b, 0x82, 0x99, | 6972 | "\x68\x7f\x96\xad\xc4\xdb\xf2\x09" |
6977 | 0xb0, 0xc7, 0xde, 0xf5, 0x0c, 0x23, 0x3a, 0x51, | 6973 | "\x20\x37\x4e\x65\x7c\x93\xaa\xc1" |
6978 | 0x68, 0x7f, 0x96, 0xad, 0xc4, 0xdb, 0xf2, 0x09, | 6974 | "\xd8\xef\x06\x1d\x34\x4b\x62\x79" |
6979 | 0x20, 0x37, 0x4e, 0x65, 0x7c, 0x93, 0xaa, 0xc1, | 6975 | "\x90\xa7\xbe\xd5\xec\x03\x1a\x31" |
6980 | 0xd8, 0xef, 0x06, 0x1d, 0x34, 0x4b, 0x62, 0x79, | 6976 | "\x48\x5f\x76\x8d\xa4\xbb\xd2\xe9" |
6981 | 0x90, 0xa7, 0xbe, 0xd5, 0xec, 0x03, 0x1a, 0x31, | 6977 | "\x00\x19\x32\x4b\x64\x7d\x96\xaf" |
6982 | 0x48, 0x5f, 0x76, 0x8d, 0xa4, 0xbb, 0xd2, 0xe9, | 6978 | "\xc8\xe1\xfa\x13\x2c\x45\x5e\x77" |
6983 | 0x00, 0x19, 0x32, 0x4b, 0x64, 0x7d, 0x96, 0xaf, | 6979 | "\x90\xa9\xc2\xdb\xf4\x0d\x26\x3f" |
6984 | 0xc8, 0xe1, 0xfa, 0x13, 0x2c, 0x45, 0x5e, 0x77, | 6980 | "\x58\x71\x8a\xa3\xbc\xd5\xee\x07" |
6985 | 0x90, 0xa9, 0xc2, 0xdb, 0xf4, 0x0d, 0x26, 0x3f, | 6981 | "\x20\x39\x52\x6b\x84\x9d\xb6\xcf" |
6986 | 0x58, 0x71, 0x8a, 0xa3, 0xbc, 0xd5, 0xee, 0x07, | 6982 | "\xe8\x01\x1a\x33\x4c\x65\x7e\x97" |
6987 | 0x20, 0x39, 0x52, 0x6b, 0x84, 0x9d, 0xb6, 0xcf, | 6983 | "\xb0\xc9\xe2\xfb\x14\x2d\x46\x5f" |
6988 | 0xe8, 0x01, 0x1a, 0x33, 0x4c, 0x65, 0x7e, 0x97, | 6984 | "\x78\x91\xaa\xc3\xdc\xf5\x0e\x27" |
6989 | 0xb0, 0xc9, 0xe2, 0xfb, 0x14, 0x2d, 0x46, 0x5f, | 6985 | "\x40\x59\x72\x8b\xa4\xbd\xd6\xef" |
6990 | 0x78, 0x91, 0xaa, 0xc3, 0xdc, 0xf5, 0x0e, 0x27, | 6986 | "\x08\x21\x3a\x53\x6c\x85\x9e\xb7" |
6991 | 0x40, 0x59, 0x72, 0x8b, 0xa4, 0xbd, 0xd6, 0xef, | 6987 | "\xd0\xe9\x02\x1b\x34\x4d\x66\x7f" |
6992 | 0x08, 0x21, 0x3a, 0x53, 0x6c, 0x85, 0x9e, 0xb7, | 6988 | "\x98\xb1\xca\xe3\xfc\x15\x2e\x47" |
6993 | 0xd0, 0xe9, 0x02, 0x1b, 0x34, 0x4d, 0x66, 0x7f, | 6989 | "\x60\x79\x92\xab\xc4\xdd\xf6\x0f" |
6994 | 0x98, 0xb1, 0xca, 0xe3, 0xfc, 0x15, 0x2e, 0x47, | 6990 | "\x28\x41\x5a\x73\x8c\xa5\xbe\xd7" |
6995 | 0x60, 0x79, 0x92, 0xab, 0xc4, 0xdd, 0xf6, 0x0f, | 6991 | "\xf0\x09\x22\x3b\x54\x6d\x86\x9f" |
6996 | 0x28, 0x41, 0x5a, 0x73, 0x8c, 0xa5, 0xbe, 0xd7, | 6992 | "\xb8\xd1\xea\x03\x1c\x35\x4e\x67" |
6997 | 0xf0, 0x09, 0x22, 0x3b, 0x54, 0x6d, 0x86, 0x9f, | 6993 | "\x80\x99\xb2\xcb\xe4\xfd\x16\x2f" |
6998 | 0xb8, 0xd1, 0xea, 0x03, 0x1c, 0x35, 0x4e, 0x67, | 6994 | "\x48\x61\x7a\x93\xac\xc5\xde\xf7" |
6999 | 0x80, 0x99, 0xb2, 0xcb, 0xe4, 0xfd, 0x16, 0x2f, | 6995 | "\x10\x29\x42\x5b\x74\x8d\xa6\xbf" |
7000 | 0x48, 0x61, 0x7a, 0x93, 0xac, 0xc5, 0xde, 0xf7, | 6996 | "\xd8\xf1\x0a\x23\x3c\x55\x6e\x87" |
7001 | 0x10, 0x29, 0x42, 0x5b, 0x74, 0x8d, 0xa6, 0xbf, | 6997 | "\xa0\xb9\xd2\xeb\x04\x1d\x36\x4f" |
7002 | 0xd8, 0xf1, 0x0a, 0x23, 0x3c, 0x55, 0x6e, 0x87, | 6998 | "\x68\x81\x9a\xb3\xcc\xe5\xfe\x17" |
7003 | 0xa0, 0xb9, 0xd2, 0xeb, 0x04, 0x1d, 0x36, 0x4f, | 6999 | "\x30\x49\x62\x7b\x94\xad\xc6\xdf" |
7004 | 0x68, 0x81, 0x9a, 0xb3, 0xcc, 0xe5, 0xfe, 0x17, | 7000 | "\xf8\x11\x2a\x43\x5c\x75\x8e\xa7" |
7005 | 0x30, 0x49, 0x62, 0x7b, 0x94, 0xad, 0xc6, 0xdf, | 7001 | "\xc0\xd9\xf2\x0b\x24\x3d\x56\x6f" |
7006 | 0xf8, 0x11, 0x2a, 0x43, 0x5c, 0x75, 0x8e, 0xa7, | 7002 | "\x88\xa1\xba\xd3\xec\x05\x1e\x37" |
7007 | 0xc0, 0xd9, 0xf2, 0x0b, 0x24, 0x3d, 0x56, 0x6f, | 7003 | "\x50\x69\x82\x9b\xb4\xcd\xe6\xff" |
7008 | 0x88, 0xa1, 0xba, 0xd3, 0xec, 0x05, 0x1e, 0x37, | 7004 | "\x18\x31\x4a\x63\x7c\x95\xae\xc7" |
7009 | 0x50, 0x69, 0x82, 0x9b, 0xb4, 0xcd, 0xe6, 0xff, | 7005 | "\xe0\xf9\x12\x2b\x44\x5d\x76\x8f" |
7010 | 0x18, 0x31, 0x4a, 0x63, 0x7c, 0x95, 0xae, 0xc7, | 7006 | "\xa8\xc1\xda\xf3\x0c\x25\x3e\x57" |
7011 | 0xe0, 0xf9, 0x12, 0x2b, 0x44, 0x5d, 0x76, 0x8f, | 7007 | "\x70\x89\xa2\xbb\xd4\xed\x06\x1f" |
7012 | 0xa8, 0xc1, 0xda, 0xf3, 0x0c, 0x25, 0x3e, 0x57, | 7008 | "\x38\x51\x6a\x83\x9c\xb5\xce\xe7" |
7013 | 0x70, 0x89, 0xa2, 0xbb, 0xd4, 0xed, 0x06, 0x1f, | 7009 | "\x00\x1b\x36\x51\x6c\x87\xa2\xbd" |
7014 | 0x38, 0x51, 0x6a, 0x83, 0x9c, 0xb5, 0xce, 0xe7, | 7010 | "\xd8\xf3\x0e\x29\x44\x5f\x7a\x95" |
7015 | 0x00, 0x1b, 0x36, 0x51, 0x6c, 0x87, 0xa2, 0xbd, | 7011 | "\xb0\xcb\xe6\x01\x1c\x37\x52\x6d" |
7016 | 0xd8, 0xf3, 0x0e, 0x29, 0x44, 0x5f, 0x7a, 0x95, | 7012 | "\x88\xa3\xbe\xd9\xf4\x0f\x2a\x45" |
7017 | 0xb0, 0xcb, 0xe6, 0x01, 0x1c, 0x37, 0x52, 0x6d, | 7013 | "\x60\x7b\x96\xb1\xcc\xe7\x02\x1d" |
7018 | 0x88, 0xa3, 0xbe, 0xd9, 0xf4, 0x0f, 0x2a, 0x45, | 7014 | "\x38\x53\x6e\x89\xa4\xbf\xda\xf5" |
7019 | 0x60, 0x7b, 0x96, 0xb1, 0xcc, 0xe7, 0x02, 0x1d, | 7015 | "\x10\x2b\x46\x61\x7c\x97\xb2\xcd" |
7020 | 0x38, 0x53, 0x6e, 0x89, 0xa4, 0xbf, 0xda, 0xf5, | 7016 | "\xe8\x03\x1e\x39\x54\x6f\x8a\xa5" |
7021 | 0x10, 0x2b, 0x46, 0x61, 0x7c, 0x97, 0xb2, 0xcd, | 7017 | "\xc0\xdb\xf6\x11\x2c\x47\x62\x7d" |
7022 | 0xe8, 0x03, 0x1e, 0x39, 0x54, 0x6f, 0x8a, 0xa5, | 7018 | "\x98\xb3\xce\xe9\x04\x1f\x3a\x55" |
7023 | 0xc0, 0xdb, 0xf6, 0x11, 0x2c, 0x47, 0x62, 0x7d, | 7019 | "\x70\x8b\xa6\xc1\xdc\xf7\x12\x2d" |
7024 | 0x98, 0xb3, 0xce, 0xe9, 0x04, 0x1f, 0x3a, 0x55, | 7020 | "\x48\x63\x7e\x99\xb4\xcf\xea\x05" |
7025 | 0x70, 0x8b, 0xa6, 0xc1, 0xdc, 0xf7, 0x12, 0x2d, | 7021 | "\x20\x3b\x56\x71\x8c\xa7\xc2\xdd" |
7026 | 0x48, 0x63, 0x7e, 0x99, 0xb4, 0xcf, 0xea, 0x05, | 7022 | "\xf8\x13\x2e\x49\x64\x7f\x9a\xb5" |
7027 | 0x20, 0x3b, 0x56, 0x71, 0x8c, 0xa7, 0xc2, 0xdd, | 7023 | "\xd0\xeb\x06\x21\x3c\x57\x72\x8d" |
7028 | 0xf8, 0x13, 0x2e, 0x49, 0x64, 0x7f, 0x9a, 0xb5, | 7024 | "\xa8\xc3\xde\xf9\x14\x2f\x4a\x65" |
7029 | 0xd0, 0xeb, 0x06, 0x21, 0x3c, 0x57, 0x72, 0x8d, | 7025 | "\x80\x9b\xb6\xd1\xec\x07\x22\x3d" |
7030 | 0xa8, 0xc3, 0xde, 0xf9, 0x14, 0x2f, 0x4a, 0x65, | 7026 | "\x58\x73\x8e\xa9\xc4\xdf\xfa\x15" |
7031 | 0x80, 0x9b, 0xb6, 0xd1, 0xec, 0x07, 0x22, 0x3d, | 7027 | "\x30\x4b\x66\x81\x9c\xb7\xd2\xed" |
7032 | 0x58, 0x73, 0x8e, 0xa9, 0xc4, 0xdf, 0xfa, 0x15, | 7028 | "\x08\x23\x3e\x59\x74\x8f\xaa\xc5" |
7033 | 0x30, 0x4b, 0x66, 0x81, 0x9c, 0xb7, 0xd2, 0xed, | 7029 | "\xe0\xfb\x16\x31\x4c\x67\x82\x9d" |
7034 | 0x08, 0x23, 0x3e, 0x59, 0x74, 0x8f, 0xaa, 0xc5, | 7030 | "\xb8\xd3\xee\x09\x24\x3f\x5a\x75" |
7035 | 0xe0, 0xfb, 0x16, 0x31, 0x4c, 0x67, 0x82, 0x9d, | 7031 | "\x90\xab\xc6\xe1\xfc\x17\x32\x4d" |
7036 | 0xb8, 0xd3, 0xee, 0x09, 0x24, 0x3f, 0x5a, 0x75, | 7032 | "\x68\x83\x9e\xb9\xd4\xef\x0a\x25" |
7037 | 0x90, 0xab, 0xc6, 0xe1, 0xfc, 0x17, 0x32, 0x4d, | 7033 | "\x40\x5b\x76\x91\xac\xc7\xe2\xfd" |
7038 | 0x68, 0x83, 0x9e, 0xb9, 0xd4, 0xef, 0x0a, 0x25, | 7034 | "\x18\x33\x4e\x69\x84\x9f\xba\xd5" |
7039 | 0x40, 0x5b, 0x76, 0x91, 0xac, 0xc7, 0xe2, 0xfd, | 7035 | "\xf0\x0b\x26\x41\x5c\x77\x92\xad" |
7040 | 0x18, 0x33, 0x4e, 0x69, 0x84, 0x9f, 0xba, 0xd5, | 7036 | "\xc8\xe3\xfe\x19\x34\x4f\x6a\x85" |
7041 | 0xf0, 0x0b, 0x26, 0x41, 0x5c, 0x77, 0x92, 0xad, | 7037 | "\xa0\xbb\xd6\xf1\x0c\x27\x42\x5d" |
7042 | 0xc8, 0xe3, 0xfe, 0x19, 0x34, 0x4f, 0x6a, 0x85, | 7038 | "\x78\x93\xae\xc9\xe4\xff\x1a\x35" |
7043 | 0xa0, 0xbb, 0xd6, 0xf1, 0x0c, 0x27, 0x42, 0x5d, | 7039 | "\x50\x6b\x86\xa1\xbc\xd7\xf2\x0d" |
7044 | 0x78, 0x93, 0xae, 0xc9, 0xe4, 0xff, 0x1a, 0x35, | 7040 | "\x28\x43\x5e\x79\x94\xaf\xca\xe5" |
7045 | 0x50, 0x6b, 0x86, 0xa1, 0xbc, 0xd7, 0xf2, 0x0d, | 7041 | "\x00\x1d\x3a\x57\x74\x91\xae\xcb" |
7046 | 0x28, 0x43, 0x5e, 0x79, 0x94, 0xaf, 0xca, 0xe5, | 7042 | "\xe8\x05\x22\x3f\x5c\x79\x96\xb3" |
7047 | 0x00, 0x1d, 0x3a, 0x57, 0x74, 0x91, 0xae, 0xcb, | 7043 | "\xd0\xed\x0a\x27\x44\x61\x7e\x9b" |
7048 | 0xe8, 0x05, 0x22, 0x3f, 0x5c, 0x79, 0x96, 0xb3, | 7044 | "\xb8\xd5\xf2\x0f\x2c\x49\x66\x83" |
7049 | 0xd0, 0xed, 0x0a, 0x27, 0x44, 0x61, 0x7e, 0x9b, | 7045 | "\xa0\xbd\xda\xf7\x14\x31\x4e\x6b" |
7050 | 0xb8, 0xd5, 0xf2, 0x0f, 0x2c, 0x49, 0x66, 0x83, | 7046 | "\x88\xa5\xc2\xdf\xfc\x19\x36\x53" |
7051 | 0xa0, 0xbd, 0xda, 0xf7, 0x14, 0x31, 0x4e, 0x6b, | 7047 | "\x70\x8d\xaa\xc7\xe4\x01\x1e\x3b" |
7052 | 0x88, 0xa5, 0xc2, 0xdf, 0xfc, 0x19, 0x36, 0x53, | 7048 | "\x58\x75\x92\xaf\xcc\xe9\x06\x23" |
7053 | 0x70, 0x8d, 0xaa, 0xc7, 0xe4, 0x01, 0x1e, 0x3b, | 7049 | "\x40\x5d\x7a\x97\xb4\xd1\xee\x0b" |
7054 | 0x58, 0x75, 0x92, 0xaf, 0xcc, 0xe9, 0x06, 0x23, | 7050 | "\x28\x45\x62\x7f\x9c\xb9\xd6\xf3" |
7055 | 0x40, 0x5d, 0x7a, 0x97, 0xb4, 0xd1, 0xee, 0x0b, | 7051 | "\x10\x2d\x4a\x67\x84\xa1\xbe\xdb" |
7056 | 0x28, 0x45, 0x62, 0x7f, 0x9c, 0xb9, 0xd6, 0xf3, | 7052 | "\xf8\x15\x32\x4f\x6c\x89\xa6\xc3" |
7057 | 0x10, 0x2d, 0x4a, 0x67, 0x84, 0xa1, 0xbe, 0xdb, | 7053 | "\xe0\xfd\x1a\x37\x54\x71\x8e\xab" |
7058 | 0xf8, 0x15, 0x32, 0x4f, 0x6c, 0x89, 0xa6, 0xc3, | 7054 | "\xc8\xe5\x02\x1f\x3c\x59\x76\x93" |
7059 | 0xe0, 0xfd, 0x1a, 0x37, 0x54, 0x71, 0x8e, 0xab, | 7055 | "\xb0\xcd\xea\x07\x24\x41\x5e\x7b" |
7060 | 0xc8, 0xe5, 0x02, 0x1f, 0x3c, 0x59, 0x76, 0x93, | 7056 | "\x98\xb5\xd2\xef\x0c\x29\x46\x63" |
7061 | 0xb0, 0xcd, 0xea, 0x07, 0x24, 0x41, 0x5e, 0x7b, | 7057 | "\x80\x9d\xba\xd7\xf4\x11\x2e\x4b" |
7062 | 0x98, 0xb5, 0xd2, 0xef, 0x0c, 0x29, 0x46, 0x63, | 7058 | "\x68\x85\xa2\xbf\xdc\xf9\x16\x33" |
7063 | 0x80, 0x9d, 0xba, 0xd7, 0xf4, 0x11, 0x2e, 0x4b, | 7059 | "\x50\x6d\x8a\xa7\xc4\xe1\xfe\x1b" |
7064 | 0x68, 0x85, 0xa2, 0xbf, 0xdc, 0xf9, 0x16, 0x33, | 7060 | "\x38\x55\x72\x8f\xac\xc9\xe6\x03" |
7065 | 0x50, 0x6d, 0x8a, 0xa7, 0xc4, 0xe1, 0xfe, 0x1b, | 7061 | "\x20\x3d\x5a\x77\x94\xb1\xce\xeb" |
7066 | 0x38, 0x55, 0x72, 0x8f, 0xac, 0xc9, 0xe6, 0x03, | 7062 | "\x08\x25\x42\x5f\x7c\x99\xb6\xd3" |
7067 | 0x20, 0x3d, 0x5a, 0x77, 0x94, 0xb1, 0xce, 0xeb, | 7063 | "\xf0\x0d\x2a\x47\x64\x81\x9e\xbb" |
7068 | 0x08, 0x25, 0x42, 0x5f, 0x7c, 0x99, 0xb6, 0xd3, | 7064 | "\xd8\xf5\x12\x2f\x4c\x69\x86\xa3" |
7069 | 0xf0, 0x0d, 0x2a, 0x47, 0x64, 0x81, 0x9e, 0xbb, | 7065 | "\xc0\xdd\xfa\x17\x34\x51\x6e\x8b" |
7070 | 0xd8, 0xf5, 0x12, 0x2f, 0x4c, 0x69, 0x86, 0xa3, | 7066 | "\xa8\xc5\xe2\xff\x1c\x39\x56\x73" |
7071 | 0xc0, 0xdd, 0xfa, 0x17, 0x34, 0x51, 0x6e, 0x8b, | 7067 | "\x90\xad\xca\xe7\x04\x21\x3e\x5b" |
7072 | 0xa8, 0xc5, 0xe2, 0xff, 0x1c, 0x39, 0x56, 0x73, | 7068 | "\x78\x95\xb2\xcf\xec\x09\x26\x43" |
7073 | 0x90, 0xad, 0xca, 0xe7, 0x04, 0x21, 0x3e, 0x5b, | 7069 | "\x60\x7d\x9a\xb7\xd4\xf1\x0e\x2b" |
7074 | 0x78, 0x95, 0xb2, 0xcf, 0xec, 0x09, 0x26, 0x43, | 7070 | "\x48\x65\x82\x9f\xbc\xd9\xf6\x13" |
7075 | 0x60, 0x7d, 0x9a, 0xb7, 0xd4, 0xf1, 0x0e, 0x2b, | 7071 | "\x30\x4d\x6a\x87\xa4\xc1\xde\xfb" |
7076 | 0x48, 0x65, 0x82, 0x9f, 0xbc, 0xd9, 0xf6, 0x13, | 7072 | "\x18\x35\x52\x6f\x8c\xa9\xc6\xe3" |
7077 | 0x30, 0x4d, 0x6a, 0x87, 0xa4, 0xc1, 0xde, 0xfb, | 7073 | "\x00\x1f\x3e\x5d\x7c\x9b\xba\xd9" |
7078 | 0x18, 0x35, 0x52, 0x6f, 0x8c, 0xa9, 0xc6, 0xe3, | 7074 | "\xf8\x17\x36\x55\x74\x93\xb2\xd1" |
7079 | 0x00, 0x1f, 0x3e, 0x5d, 0x7c, 0x9b, 0xba, 0xd9, | 7075 | "\xf0\x0f\x2e\x4d\x6c\x8b\xaa\xc9" |
7080 | 0xf8, 0x17, 0x36, 0x55, 0x74, 0x93, 0xb2, 0xd1, | 7076 | "\xe8\x07\x26\x45\x64\x83\xa2\xc1" |
7081 | 0xf0, 0x0f, 0x2e, 0x4d, 0x6c, 0x8b, 0xaa, 0xc9, | 7077 | "\xe0\xff\x1e\x3d\x5c\x7b\x9a\xb9" |
7082 | 0xe8, 0x07, 0x26, 0x45, 0x64, 0x83, 0xa2, 0xc1, | 7078 | "\xd8\xf7\x16\x35\x54\x73\x92\xb1" |
7083 | 0xe0, 0xff, 0x1e, 0x3d, 0x5c, 0x7b, 0x9a, 0xb9, | 7079 | "\xd0\xef\x0e\x2d\x4c\x6b\x8a\xa9" |
7084 | 0xd8, 0xf7, 0x16, 0x35, 0x54, 0x73, 0x92, 0xb1, | 7080 | "\xc8\xe7\x06\x25\x44\x63\x82\xa1" |
7085 | 0xd0, 0xef, 0x0e, 0x2d, 0x4c, 0x6b, 0x8a, 0xa9, | 7081 | "\xc0\xdf\xfe\x1d\x3c\x5b\x7a\x99" |
7086 | 0xc8, 0xe7, 0x06, 0x25, 0x44, 0x63, 0x82, 0xa1, | 7082 | "\xb8\xd7\xf6\x15\x34\x53\x72\x91" |
7087 | 0xc0, 0xdf, 0xfe, 0x1d, 0x3c, 0x5b, 0x7a, 0x99, | 7083 | "\xb0\xcf\xee\x0d\x2c\x4b\x6a\x89" |
7088 | 0xb8, 0xd7, 0xf6, 0x15, 0x34, 0x53, 0x72, 0x91, | 7084 | "\xa8\xc7\xe6\x05\x24\x43\x62\x81" |
7089 | 0xb0, 0xcf, 0xee, 0x0d, 0x2c, 0x4b, 0x6a, 0x89, | 7085 | "\xa0\xbf\xde\xfd\x1c\x3b\x5a\x79" |
7090 | 0xa8, 0xc7, 0xe6, 0x05, 0x24, 0x43, 0x62, 0x81, | 7086 | "\x98\xb7\xd6\xf5\x14\x33\x52\x71" |
7091 | 0xa0, 0xbf, 0xde, 0xfd, 0x1c, 0x3b, 0x5a, 0x79, | 7087 | "\x90\xaf\xce\xed\x0c\x2b\x4a\x69" |
7092 | 0x98, 0xb7, 0xd6, 0xf5, 0x14, 0x33, 0x52, 0x71, | 7088 | "\x88\xa7\xc6\xe5\x04\x23\x42\x61" |
7093 | 0x90, 0xaf, 0xce, 0xed, 0x0c, 0x2b, 0x4a, 0x69, | 7089 | "\x80\x9f\xbe\xdd\xfc\x1b\x3a\x59" |
7094 | 0x88, 0xa7, 0xc6, 0xe5, 0x04, 0x23, 0x42, 0x61, | 7090 | "\x78\x97\xb6\xd5\xf4\x13\x32\x51" |
7095 | 0x80, 0x9f, 0xbe, 0xdd, 0xfc, 0x1b, 0x3a, 0x59, | 7091 | "\x70\x8f\xae\xcd\xec\x0b\x2a\x49" |
7096 | 0x78, 0x97, 0xb6, 0xd5, 0xf4, 0x13, 0x32, 0x51, | 7092 | "\x68\x87\xa6\xc5\xe4\x03\x22\x41" |
7097 | 0x70, 0x8f, 0xae, 0xcd, 0xec, 0x0b, 0x2a, 0x49, | 7093 | "\x60\x7f\x9e\xbd\xdc\xfb\x1a\x39" |
7098 | 0x68, 0x87, 0xa6, 0xc5, 0xe4, 0x03, 0x22, 0x41, | 7094 | "\x58\x77\x96\xb5\xd4\xf3\x12\x31" |
7099 | 0x60, 0x7f, 0x9e, 0xbd, 0xdc, 0xfb, 0x1a, 0x39, | 7095 | "\x50\x6f\x8e\xad\xcc\xeb\x0a\x29" |
7100 | 0x58, 0x77, 0x96, 0xb5, 0xd4, 0xf3, 0x12, 0x31, | 7096 | "\x48\x67\x86\xa5\xc4\xe3\x02\x21" |
7101 | 0x50, 0x6f, 0x8e, 0xad, 0xcc, 0xeb, 0x0a, 0x29, | 7097 | "\x40\x5f\x7e\x9d\xbc\xdb\xfa\x19" |
7102 | 0x48, 0x67, 0x86, 0xa5, 0xc4, 0xe3, 0x02, 0x21, | 7098 | "\x38\x57\x76\x95\xb4\xd3\xf2\x11" |
7103 | 0x40, 0x5f, 0x7e, 0x9d, 0xbc, 0xdb, 0xfa, 0x19, | 7099 | "\x30\x4f\x6e\x8d\xac\xcb\xea\x09" |
7104 | 0x38, 0x57, 0x76, 0x95, 0xb4, 0xd3, 0xf2, 0x11, | 7100 | "\x28\x47\x66\x85\xa4\xc3\xe2\x01" |
7105 | 0x30, 0x4f, 0x6e, 0x8d, 0xac, 0xcb, 0xea, 0x09, | 7101 | "\x20\x3f\x5e\x7d\x9c\xbb\xda\xf9" |
7106 | 0x28, 0x47, 0x66, 0x85, 0xa4, 0xc3, 0xe2, 0x01, | 7102 | "\x18\x37\x56\x75\x94\xb3\xd2\xf1" |
7107 | 0x20, 0x3f, 0x5e, 0x7d, 0x9c, 0xbb, 0xda, 0xf9, | 7103 | "\x10\x2f\x4e\x6d\x8c\xab\xca\xe9" |
7108 | 0x18, 0x37, 0x56, 0x75, 0x94, 0xb3, 0xd2, 0xf1, | 7104 | "\x08\x27\x46\x65\x84\xa3\xc2\xe1" |
7109 | 0x10, 0x2f, 0x4e, 0x6d, 0x8c, 0xab, 0xca, 0xe9, | 7105 | "\x00\x21\x42\x63", |
7110 | 0x08, 0x27, 0x46, 0x65, 0x84, 0xa3, 0xc2, 0xe1, | ||
7111 | 0x00, 0x21, 0x42, 0x63, | ||
7112 | }, | ||
7113 | .ilen = 4100, | 7106 | .ilen = 4100, |
7114 | .result = { | 7107 | .result = |
7115 | 0xb5, 0x81, 0xf5, 0x64, 0x18, 0x73, 0xe3, 0xf0, | 7108 | "\xb5\x81\xf5\x64\x18\x73\xe3\xf0" |
7116 | 0x4c, 0x13, 0xf2, 0x77, 0x18, 0x60, 0x65, 0x5e, | 7109 | "\x4c\x13\xf2\x77\x18\x60\x65\x5e" |
7117 | 0x29, 0x01, 0xce, 0x98, 0x55, 0x53, 0xf9, 0x0c, | 7110 | "\x29\x01\xce\x98\x55\x53\xf9\x0c" |
7118 | 0x2a, 0x08, 0xd5, 0x09, 0xb3, 0x57, 0x55, 0x56, | 7111 | "\x2a\x08\xd5\x09\xb3\x57\x55\x56" |
7119 | 0xc5, 0xe9, 0x56, 0x90, 0xcb, 0x6a, 0xa3, 0xc0, | 7112 | "\xc5\xe9\x56\x90\xcb\x6a\xa3\xc0" |
7120 | 0xff, 0xc4, 0x79, 0xb4, 0xd2, 0x97, 0x5d, 0xc4, | 7113 | "\xff\xc4\x79\xb4\xd2\x97\x5d\xc4" |
7121 | 0x43, 0xd1, 0xfe, 0x94, 0x7b, 0x88, 0x06, 0x5a, | 7114 | "\x43\xd1\xfe\x94\x7b\x88\x06\x5a" |
7122 | 0xb2, 0x9e, 0x2c, 0xfc, 0x44, 0x03, 0xb7, 0x90, | 7115 | "\xb2\x9e\x2c\xfc\x44\x03\xb7\x90" |
7123 | 0xa0, 0xc1, 0xba, 0x6a, 0x33, 0xb8, 0xc7, 0xb2, | 7116 | "\xa0\xc1\xba\x6a\x33\xb8\xc7\xb2" |
7124 | 0x9d, 0xe1, 0x12, 0x4f, 0xc0, 0x64, 0xd4, 0x01, | 7117 | "\x9d\xe1\x12\x4f\xc0\x64\xd4\x01" |
7125 | 0xfe, 0x8c, 0x7a, 0x66, 0xf7, 0xe6, 0x5a, 0x91, | 7118 | "\xfe\x8c\x7a\x66\xf7\xe6\x5a\x91" |
7126 | 0xbb, 0xde, 0x56, 0x86, 0xab, 0x65, 0x21, 0x30, | 7119 | "\xbb\xde\x56\x86\xab\x65\x21\x30" |
7127 | 0x00, 0x84, 0x65, 0x24, 0xa5, 0x7d, 0x85, 0xb4, | 7120 | "\x00\x84\x65\x24\xa5\x7d\x85\xb4" |
7128 | 0xe3, 0x17, 0xed, 0x3a, 0xb7, 0x6f, 0xb4, 0x0b, | 7121 | "\xe3\x17\xed\x3a\xb7\x6f\xb4\x0b" |
7129 | 0x0b, 0xaf, 0x15, 0xae, 0x5a, 0x8f, 0xf2, 0x0c, | 7122 | "\x0b\xaf\x15\xae\x5a\x8f\xf2\x0c" |
7130 | 0x2f, 0x27, 0xf4, 0x09, 0xd8, 0xd2, 0x96, 0xb7, | 7123 | "\x2f\x27\xf4\x09\xd8\xd2\x96\xb7" |
7131 | 0x71, 0xf2, 0xc5, 0x99, 0x4d, 0x7e, 0x7f, 0x75, | 7124 | "\x71\xf2\xc5\x99\x4d\x7e\x7f\x75" |
7132 | 0x77, 0x89, 0x30, 0x8b, 0x59, 0xdb, 0xa2, 0xb2, | 7125 | "\x77\x89\x30\x8b\x59\xdb\xa2\xb2" |
7133 | 0xa0, 0xf3, 0x19, 0x39, 0x2b, 0xc5, 0x7e, 0x3f, | 7126 | "\xa0\xf3\x19\x39\x2b\xc5\x7e\x3f" |
7134 | 0x4f, 0xd9, 0xd3, 0x56, 0x28, 0x97, 0x44, 0xdc, | 7127 | "\x4f\xd9\xd3\x56\x28\x97\x44\xdc" |
7135 | 0xc0, 0x8b, 0x77, 0x24, 0xd9, 0x52, 0xe7, 0xc5, | 7128 | "\xc0\x8b\x77\x24\xd9\x52\xe7\xc5" |
7136 | 0xaf, 0xf6, 0x7d, 0x59, 0xb2, 0x44, 0x05, 0x1d, | 7129 | "\xaf\xf6\x7d\x59\xb2\x44\x05\x1d" |
7137 | 0xb1, 0xb0, 0x11, 0xa5, 0x0f, 0xec, 0x33, 0xe1, | 7130 | "\xb1\xb0\x11\xa5\x0f\xec\x33\xe1" |
7138 | 0x6d, 0x1b, 0x4e, 0x1f, 0xff, 0x57, 0x91, 0xb4, | 7131 | "\x6d\x1b\x4e\x1f\xff\x57\x91\xb4" |
7139 | 0x5b, 0x9a, 0x96, 0xc5, 0x53, 0xbc, 0xae, 0x20, | 7132 | "\x5b\x9a\x96\xc5\x53\xbc\xae\x20" |
7140 | 0x3c, 0xbb, 0x14, 0xe2, 0xe8, 0x22, 0x33, 0xc1, | 7133 | "\x3c\xbb\x14\xe2\xe8\x22\x33\xc1" |
7141 | 0x5e, 0x76, 0x9e, 0x46, 0x99, 0xf6, 0x2a, 0x15, | 7134 | "\x5e\x76\x9e\x46\x99\xf6\x2a\x15" |
7142 | 0xc6, 0x97, 0x02, 0xa0, 0x66, 0x43, 0xd1, 0xa6, | 7135 | "\xc6\x97\x02\xa0\x66\x43\xd1\xa6" |
7143 | 0x31, 0xa6, 0x9f, 0xfb, 0xf4, 0xd3, 0x69, 0xe5, | 7136 | "\x31\xa6\x9f\xfb\xf4\xd3\x69\xe5" |
7144 | 0xcd, 0x76, 0x95, 0xb8, 0x7a, 0x82, 0x7f, 0x21, | 7137 | "\xcd\x76\x95\xb8\x7a\x82\x7f\x21" |
7145 | 0x45, 0xff, 0x3f, 0xce, 0x55, 0xf6, 0x95, 0x10, | 7138 | "\x45\xff\x3f\xce\x55\xf6\x95\x10" |
7146 | 0x08, 0x77, 0x10, 0x43, 0xc6, 0xf3, 0x09, 0xe5, | 7139 | "\x08\x77\x10\x43\xc6\xf3\x09\xe5" |
7147 | 0x68, 0xe7, 0x3c, 0xad, 0x00, 0x52, 0x45, 0x0d, | 7140 | "\x68\xe7\x3c\xad\x00\x52\x45\x0d" |
7148 | 0xfe, 0x2d, 0xc6, 0xc2, 0x94, 0x8c, 0x12, 0x1d, | 7141 | "\xfe\x2d\xc6\xc2\x94\x8c\x12\x1d" |
7149 | 0xe6, 0x25, 0xae, 0x98, 0x12, 0x8e, 0x19, 0x9c, | 7142 | "\xe6\x25\xae\x98\x12\x8e\x19\x9c" |
7150 | 0x81, 0x68, 0xb1, 0x11, 0xf6, 0x69, 0xda, 0xe3, | 7143 | "\x81\x68\xb1\x11\xf6\x69\xda\xe3" |
7151 | 0x62, 0x08, 0x18, 0x7a, 0x25, 0x49, 0x28, 0xac, | 7144 | "\x62\x08\x18\x7a\x25\x49\x28\xac" |
7152 | 0xba, 0x71, 0x12, 0x0b, 0xe4, 0xa2, 0xe5, 0xc7, | 7145 | "\xba\x71\x12\x0b\xe4\xa2\xe5\xc7" |
7153 | 0x5d, 0x8e, 0xec, 0x49, 0x40, 0x21, 0xbf, 0x5a, | 7146 | "\x5d\x8e\xec\x49\x40\x21\xbf\x5a" |
7154 | 0x98, 0xf3, 0x02, 0x68, 0x55, 0x03, 0x7f, 0x8a, | 7147 | "\x98\xf3\x02\x68\x55\x03\x7f\x8a" |
7155 | 0xe5, 0x94, 0x0c, 0x32, 0x5c, 0x07, 0x82, 0x63, | 7148 | "\xe5\x94\x0c\x32\x5c\x07\x82\x63" |
7156 | 0xaf, 0x6f, 0x91, 0x40, 0x84, 0x8e, 0x52, 0x25, | 7149 | "\xaf\x6f\x91\x40\x84\x8e\x52\x25" |
7157 | 0xd0, 0xb0, 0x29, 0x53, 0x05, 0xe2, 0x50, 0x7a, | 7150 | "\xd0\xb0\x29\x53\x05\xe2\x50\x7a" |
7158 | 0x34, 0xeb, 0xc9, 0x46, 0x20, 0xa8, 0x3d, 0xde, | 7151 | "\x34\xeb\xc9\x46\x20\xa8\x3d\xde" |
7159 | 0x7f, 0x16, 0x5f, 0x36, 0xc5, 0x2e, 0xdc, 0xd1, | 7152 | "\x7f\x16\x5f\x36\xc5\x2e\xdc\xd1" |
7160 | 0x15, 0x47, 0xc7, 0x50, 0x40, 0x6d, 0x91, 0xc5, | 7153 | "\x15\x47\xc7\x50\x40\x6d\x91\xc5" |
7161 | 0xe7, 0x93, 0x95, 0x1a, 0xd3, 0x57, 0xbc, 0x52, | 7154 | "\xe7\x93\x95\x1a\xd3\x57\xbc\x52" |
7162 | 0x33, 0xee, 0x14, 0x19, 0x22, 0x52, 0x89, 0xa7, | 7155 | "\x33\xee\x14\x19\x22\x52\x89\xa7" |
7163 | 0x4a, 0x25, 0x56, 0x77, 0x4b, 0xca, 0xcf, 0x0a, | 7156 | "\x4a\x25\x56\x77\x4b\xca\xcf\x0a" |
7164 | 0xe1, 0xf5, 0x35, 0x85, 0x30, 0x7e, 0x59, 0x4a, | 7157 | "\xe1\xf5\x35\x85\x30\x7e\x59\x4a" |
7165 | 0xbd, 0x14, 0x5b, 0xdf, 0xe3, 0x46, 0xcb, 0xac, | 7158 | "\xbd\x14\x5b\xdf\xe3\x46\xcb\xac" |
7166 | 0x1f, 0x6c, 0x96, 0x0e, 0xf4, 0x81, 0xd1, 0x99, | 7159 | "\x1f\x6c\x96\x0e\xf4\x81\xd1\x99" |
7167 | 0xca, 0x88, 0x63, 0x3d, 0x02, 0x58, 0x6b, 0xa9, | 7160 | "\xca\x88\x63\x3d\x02\x58\x6b\xa9" |
7168 | 0xe5, 0x9f, 0xb3, 0x00, 0xb2, 0x54, 0xc6, 0x74, | 7161 | "\xe5\x9f\xb3\x00\xb2\x54\xc6\x74" |
7169 | 0x1c, 0xbf, 0x46, 0xab, 0x97, 0xcc, 0xf8, 0x54, | 7162 | "\x1c\xbf\x46\xab\x97\xcc\xf8\x54" |
7170 | 0x04, 0x07, 0x08, 0x52, 0xe6, 0xc0, 0xda, 0x93, | 7163 | "\x04\x07\x08\x52\xe6\xc0\xda\x93" |
7171 | 0x74, 0x7d, 0x93, 0x99, 0x5d, 0x78, 0x68, 0xa6, | 7164 | "\x74\x7d\x93\x99\x5d\x78\x68\xa6" |
7172 | 0x2e, 0x6b, 0xd3, 0x6a, 0x69, 0xcc, 0x12, 0x6b, | 7165 | "\x2e\x6b\xd3\x6a\x69\xcc\x12\x6b" |
7173 | 0xd4, 0xc7, 0xa5, 0xc6, 0xe7, 0xf6, 0x03, 0x04, | 7166 | "\xd4\xc7\xa5\xc6\xe7\xf6\x03\x04" |
7174 | 0x5d, 0xcd, 0x61, 0x5e, 0x17, 0x40, 0xdc, 0xd1, | 7167 | "\x5d\xcd\x61\x5e\x17\x40\xdc\xd1" |
7175 | 0x5c, 0xf5, 0x08, 0xdf, 0x5c, 0x90, 0x85, 0xa4, | 7168 | "\x5c\xf5\x08\xdf\x5c\x90\x85\xa4" |
7176 | 0xaf, 0xf6, 0x78, 0xbb, 0x0d, 0xf1, 0xf4, 0xa4, | 7169 | "\xaf\xf6\x78\xbb\x0d\xf1\xf4\xa4" |
7177 | 0x54, 0x26, 0x72, 0x9e, 0x61, 0xfa, 0x86, 0xcf, | 7170 | "\x54\x26\x72\x9e\x61\xfa\x86\xcf" |
7178 | 0xe8, 0x9e, 0xa1, 0xe0, 0xc7, 0x48, 0x23, 0xae, | 7171 | "\xe8\x9e\xa1\xe0\xc7\x48\x23\xae" |
7179 | 0x5a, 0x90, 0xae, 0x75, 0x0a, 0x74, 0x18, 0x89, | 7172 | "\x5a\x90\xae\x75\x0a\x74\x18\x89" |
7180 | 0x05, 0xb1, 0x92, 0xb2, 0x7f, 0xd0, 0x1b, 0xa6, | 7173 | "\x05\xb1\x92\xb2\x7f\xd0\x1b\xa6" |
7181 | 0x62, 0x07, 0x25, 0x01, 0xc7, 0xc2, 0x4f, 0xf9, | 7174 | "\x62\x07\x25\x01\xc7\xc2\x4f\xf9" |
7182 | 0xe8, 0xfe, 0x63, 0x95, 0x80, 0x07, 0xb4, 0x26, | 7175 | "\xe8\xfe\x63\x95\x80\x07\xb4\x26" |
7183 | 0xcc, 0xd1, 0x26, 0xb6, 0xc4, 0x3f, 0x9e, 0xcb, | 7176 | "\xcc\xd1\x26\xb6\xc4\x3f\x9e\xcb" |
7184 | 0x8e, 0x3b, 0x2e, 0x44, 0x16, 0xd3, 0x10, 0x9a, | 7177 | "\x8e\x3b\x2e\x44\x16\xd3\x10\x9a" |
7185 | 0x95, 0x08, 0xeb, 0xc8, 0xcb, 0xeb, 0xbf, 0x6f, | 7178 | "\x95\x08\xeb\xc8\xcb\xeb\xbf\x6f" |
7186 | 0x0b, 0xcd, 0x1f, 0xc8, 0xca, 0x86, 0xaa, 0xec, | 7179 | "\x0b\xcd\x1f\xc8\xca\x86\xaa\xec" |
7187 | 0x33, 0xe6, 0x69, 0xf4, 0x45, 0x25, 0x86, 0x3a, | 7180 | "\x33\xe6\x69\xf4\x45\x25\x86\x3a" |
7188 | 0x22, 0x94, 0x4f, 0x00, 0x23, 0x6a, 0x44, 0xc2, | 7181 | "\x22\x94\x4f\x00\x23\x6a\x44\xc2" |
7189 | 0x49, 0x97, 0x33, 0xab, 0x36, 0x14, 0x0a, 0x70, | 7182 | "\x49\x97\x33\xab\x36\x14\x0a\x70" |
7190 | 0x24, 0xc3, 0xbe, 0x04, 0x3b, 0x79, 0xa0, 0xf9, | 7183 | "\x24\xc3\xbe\x04\x3b\x79\xa0\xf9" |
7191 | 0xb8, 0xe7, 0x76, 0x29, 0x22, 0x83, 0xd7, 0xf2, | 7184 | "\xb8\xe7\x76\x29\x22\x83\xd7\xf2" |
7192 | 0x94, 0xf4, 0x41, 0x49, 0xba, 0x5f, 0x7b, 0x07, | 7185 | "\x94\xf4\x41\x49\xba\x5f\x7b\x07" |
7193 | 0xb5, 0xfb, 0xdb, 0x03, 0x1a, 0x9f, 0xb6, 0x4c, | 7186 | "\xb5\xfb\xdb\x03\x1a\x9f\xb6\x4c" |
7194 | 0xc2, 0x2e, 0x37, 0x40, 0x49, 0xc3, 0x38, 0x16, | 7187 | "\xc2\x2e\x37\x40\x49\xc3\x38\x16" |
7195 | 0xe2, 0x4f, 0x77, 0x82, 0xb0, 0x68, 0x4c, 0x71, | 7188 | "\xe2\x4f\x77\x82\xb0\x68\x4c\x71" |
7196 | 0x1d, 0x57, 0x61, 0x9c, 0xd9, 0x4e, 0x54, 0x99, | 7189 | "\x1d\x57\x61\x9c\xd9\x4e\x54\x99" |
7197 | 0x47, 0x13, 0x28, 0x73, 0x3c, 0xbb, 0x00, 0x90, | 7190 | "\x47\x13\x28\x73\x3c\xbb\x00\x90" |
7198 | 0xf3, 0x4d, 0xc9, 0x0e, 0xfd, 0xe7, 0xb1, 0x71, | 7191 | "\xf3\x4d\xc9\x0e\xfd\xe7\xb1\x71" |
7199 | 0xd3, 0x15, 0x79, 0xbf, 0xcc, 0x26, 0x2f, 0xbd, | 7192 | "\xd3\x15\x79\xbf\xcc\x26\x2f\xbd" |
7200 | 0xad, 0x6c, 0x50, 0x69, 0x6c, 0x3e, 0x6d, 0x80, | 7193 | "\xad\x6c\x50\x69\x6c\x3e\x6d\x80" |
7201 | 0x9a, 0xea, 0x78, 0xaf, 0x19, 0xb2, 0x0d, 0x4d, | 7194 | "\x9a\xea\x78\xaf\x19\xb2\x0d\x4d" |
7202 | 0xad, 0x04, 0x07, 0xae, 0x22, 0x90, 0x4a, 0x93, | 7195 | "\xad\x04\x07\xae\x22\x90\x4a\x93" |
7203 | 0x32, 0x0e, 0x36, 0x9b, 0x1b, 0x46, 0xba, 0x3b, | 7196 | "\x32\x0e\x36\x9b\x1b\x46\xba\x3b" |
7204 | 0xb4, 0xac, 0xc6, 0xd1, 0xa2, 0x31, 0x53, 0x3b, | 7197 | "\xb4\xac\xc6\xd1\xa2\x31\x53\x3b" |
7205 | 0x2a, 0x3d, 0x45, 0xfe, 0x03, 0x61, 0x10, 0x85, | 7198 | "\x2a\x3d\x45\xfe\x03\x61\x10\x85" |
7206 | 0x17, 0x69, 0xa6, 0x78, 0xcc, 0x6c, 0x87, 0x49, | 7199 | "\x17\x69\xa6\x78\xcc\x6c\x87\x49" |
7207 | 0x53, 0xf9, 0x80, 0x10, 0xde, 0x80, 0xa2, 0x41, | 7200 | "\x53\xf9\x80\x10\xde\x80\xa2\x41" |
7208 | 0x6a, 0xc3, 0x32, 0x02, 0xad, 0x6d, 0x3c, 0x56, | 7201 | "\x6a\xc3\x32\x02\xad\x6d\x3c\x56" |
7209 | 0x00, 0x71, 0x51, 0x06, 0xa7, 0xbd, 0xfb, 0xef, | 7202 | "\x00\x71\x51\x06\xa7\xbd\xfb\xef" |
7210 | 0x3c, 0xb5, 0x9f, 0xfc, 0x48, 0x7d, 0x53, 0x7c, | 7203 | "\x3c\xb5\x9f\xfc\x48\x7d\x53\x7c" |
7211 | 0x66, 0xb0, 0x49, 0x23, 0xc4, 0x47, 0x10, 0x0e, | 7204 | "\x66\xb0\x49\x23\xc4\x47\x10\x0e" |
7212 | 0xe5, 0x6c, 0x74, 0x13, 0xe6, 0xc5, 0x3f, 0xaa, | 7205 | "\xe5\x6c\x74\x13\xe6\xc5\x3f\xaa" |
7213 | 0xde, 0xff, 0x07, 0x44, 0xdd, 0x56, 0x1b, 0xad, | 7206 | "\xde\xff\x07\x44\xdd\x56\x1b\xad" |
7214 | 0x09, 0x77, 0xfb, 0x5b, 0x12, 0xb8, 0x0d, 0x38, | 7207 | "\x09\x77\xfb\x5b\x12\xb8\x0d\x38" |
7215 | 0x17, 0x37, 0x35, 0x7b, 0x9b, 0xbc, 0xfe, 0xd4, | 7208 | "\x17\x37\x35\x7b\x9b\xbc\xfe\xd4" |
7216 | 0x7e, 0x8b, 0xda, 0x7e, 0x5b, 0x04, 0xa7, 0x22, | 7209 | "\x7e\x8b\xda\x7e\x5b\x04\xa7\x22" |
7217 | 0xa7, 0x31, 0xa1, 0x20, 0x86, 0xc7, 0x1b, 0x99, | 7210 | "\xa7\x31\xa1\x20\x86\xc7\x1b\x99" |
7218 | 0xdb, 0xd1, 0x89, 0xf4, 0x94, 0xa3, 0x53, 0x69, | 7211 | "\xdb\xd1\x89\xf4\x94\xa3\x53\x69" |
7219 | 0x8d, 0xe7, 0xe8, 0x74, 0x11, 0x8d, 0x74, 0xd6, | 7212 | "\x8d\xe7\xe8\x74\x11\x8d\x74\xd6" |
7220 | 0x07, 0x37, 0x91, 0x9f, 0xfd, 0x67, 0x50, 0x3a, | 7213 | "\x07\x37\x91\x9f\xfd\x67\x50\x3a" |
7221 | 0xc9, 0xe1, 0xf4, 0x36, 0xd5, 0xa0, 0x47, 0xd1, | 7214 | "\xc9\xe1\xf4\x36\xd5\xa0\x47\xd1" |
7222 | 0xf9, 0xe5, 0x39, 0xa3, 0x31, 0xac, 0x07, 0x36, | 7215 | "\xf9\xe5\x39\xa3\x31\xac\x07\x36" |
7223 | 0x23, 0xf8, 0x66, 0x18, 0x14, 0x28, 0x34, 0x0f, | 7216 | "\x23\xf8\x66\x18\x14\x28\x34\x0f" |
7224 | 0xb8, 0xd0, 0xe7, 0x29, 0xb3, 0x04, 0x4b, 0x55, | 7217 | "\xb8\xd0\xe7\x29\xb3\x04\x4b\x55" |
7225 | 0x01, 0x41, 0xb2, 0x75, 0x8d, 0xcb, 0x96, 0x85, | 7218 | "\x01\x41\xb2\x75\x8d\xcb\x96\x85" |
7226 | 0x3a, 0xfb, 0xab, 0x2b, 0x9e, 0xfa, 0x58, 0x20, | 7219 | "\x3a\xfb\xab\x2b\x9e\xfa\x58\x20" |
7227 | 0x44, 0x1f, 0xc0, 0x14, 0x22, 0x75, 0x61, 0xe8, | 7220 | "\x44\x1f\xc0\x14\x22\x75\x61\xe8" |
7228 | 0xaa, 0x19, 0xcf, 0xf1, 0x82, 0x56, 0xf4, 0xd7, | 7221 | "\xaa\x19\xcf\xf1\x82\x56\xf4\xd7" |
7229 | 0x78, 0x7b, 0x3d, 0x5f, 0xb3, 0x9e, 0x0b, 0x8a, | 7222 | "\x78\x7b\x3d\x5f\xb3\x9e\x0b\x8a" |
7230 | 0x57, 0x50, 0xdb, 0x17, 0x41, 0x65, 0x4d, 0xa3, | 7223 | "\x57\x50\xdb\x17\x41\x65\x4d\xa3" |
7231 | 0x02, 0xc9, 0x9c, 0x9c, 0x53, 0xfb, 0x39, 0x39, | 7224 | "\x02\xc9\x9c\x9c\x53\xfb\x39\x39" |
7232 | 0x9b, 0x1d, 0x72, 0x24, 0xda, 0xb7, 0x39, 0xbe, | 7225 | "\x9b\x1d\x72\x24\xda\xb7\x39\xbe" |
7233 | 0x13, 0x3b, 0xfa, 0x29, 0xda, 0x9e, 0x54, 0x64, | 7226 | "\x13\x3b\xfa\x29\xda\x9e\x54\x64" |
7234 | 0x6e, 0xba, 0xd8, 0xa1, 0xcb, 0xb3, 0x36, 0xfa, | 7227 | "\x6e\xba\xd8\xa1\xcb\xb3\x36\xfa" |
7235 | 0xcb, 0x47, 0x85, 0xe9, 0x61, 0x38, 0xbc, 0xbe, | 7228 | "\xcb\x47\x85\xe9\x61\x38\xbc\xbe" |
7236 | 0xc5, 0x00, 0x38, 0x2a, 0x54, 0xf7, 0xc4, 0xb9, | 7229 | "\xc5\x00\x38\x2a\x54\xf7\xc4\xb9" |
7237 | 0xb3, 0xd3, 0x7b, 0xa0, 0xa0, 0xf8, 0x72, 0x7f, | 7230 | "\xb3\xd3\x7b\xa0\xa0\xf8\x72\x7f" |
7238 | 0x8c, 0x8e, 0x82, 0x0e, 0xc6, 0x1c, 0x75, 0x9d, | 7231 | "\x8c\x8e\x82\x0e\xc6\x1c\x75\x9d" |
7239 | 0xca, 0x8e, 0x61, 0x87, 0xde, 0xad, 0x80, 0xd2, | 7232 | "\xca\x8e\x61\x87\xde\xad\x80\xd2" |
7240 | 0xf5, 0xf9, 0x80, 0xef, 0x15, 0x75, 0xaf, 0xf5, | 7233 | "\xf5\xf9\x80\xef\x15\x75\xaf\xf5" |
7241 | 0x80, 0xfb, 0xff, 0x6d, 0x1e, 0x25, 0xb7, 0x40, | 7234 | "\x80\xfb\xff\x6d\x1e\x25\xb7\x40" |
7242 | 0x61, 0x6a, 0x39, 0x5a, 0x6a, 0xb5, 0x31, 0xab, | 7235 | "\x61\x6a\x39\x5a\x6a\xb5\x31\xab" |
7243 | 0x97, 0x8a, 0x19, 0x89, 0x44, 0x40, 0xc0, 0xa6, | 7236 | "\x97\x8a\x19\x89\x44\x40\xc0\xa6" |
7244 | 0xb4, 0x4e, 0x30, 0x32, 0x7b, 0x13, 0xe7, 0x67, | 7237 | "\xb4\x4e\x30\x32\x7b\x13\xe7\x67" |
7245 | 0xa9, 0x8b, 0x57, 0x04, 0xc2, 0x01, 0xa6, 0xf4, | 7238 | "\xa9\x8b\x57\x04\xc2\x01\xa6\xf4" |
7246 | 0x28, 0x99, 0xad, 0x2c, 0x76, 0xa3, 0x78, 0xc2, | 7239 | "\x28\x99\xad\x2c\x76\xa3\x78\xc2" |
7247 | 0x4a, 0xe6, 0xca, 0x5c, 0x50, 0x6a, 0xc1, 0xb0, | 7240 | "\x4a\xe6\xca\x5c\x50\x6a\xc1\xb0" |
7248 | 0x62, 0x4b, 0x10, 0x8e, 0x7c, 0x17, 0x43, 0xb3, | 7241 | "\x62\x4b\x10\x8e\x7c\x17\x43\xb3" |
7249 | 0x17, 0x66, 0x1c, 0x3e, 0x8d, 0x69, 0xf0, 0x5a, | 7242 | "\x17\x66\x1c\x3e\x8d\x69\xf0\x5a" |
7250 | 0x71, 0xf5, 0x97, 0xdc, 0xd1, 0x45, 0xdd, 0x28, | 7243 | "\x71\xf5\x97\xdc\xd1\x45\xdd\x28" |
7251 | 0xf3, 0x5d, 0xdf, 0x53, 0x7b, 0x11, 0xe5, 0xbc, | 7244 | "\xf3\x5d\xdf\x53\x7b\x11\xe5\xbc" |
7252 | 0x4c, 0xdb, 0x1b, 0x51, 0x6b, 0xe9, 0xfb, 0x3d, | 7245 | "\x4c\xdb\x1b\x51\x6b\xe9\xfb\x3d" |
7253 | 0xc1, 0xc3, 0x2c, 0xb9, 0x71, 0xf5, 0xb6, 0xb2, | 7246 | "\xc1\xc3\x2c\xb9\x71\xf5\xb6\xb2" |
7254 | 0x13, 0x36, 0x79, 0x80, 0x53, 0xe8, 0xd3, 0xa6, | 7247 | "\x13\x36\x79\x80\x53\xe8\xd3\xa6" |
7255 | 0x0a, 0xaf, 0xfd, 0x56, 0x97, 0xf7, 0x40, 0x8e, | 7248 | "\x0a\xaf\xfd\x56\x97\xf7\x40\x8e" |
7256 | 0x45, 0xce, 0xf8, 0xb0, 0x9e, 0x5c, 0x33, 0x82, | 7249 | "\x45\xce\xf8\xb0\x9e\x5c\x33\x82" |
7257 | 0xb0, 0x44, 0x56, 0xfc, 0x05, 0x09, 0xe9, 0x2a, | 7250 | "\xb0\x44\x56\xfc\x05\x09\xe9\x2a" |
7258 | 0xac, 0x26, 0x80, 0x14, 0x1d, 0xc8, 0x3a, 0x35, | 7251 | "\xac\x26\x80\x14\x1d\xc8\x3a\x35" |
7259 | 0x4c, 0x82, 0x97, 0xfd, 0x76, 0xb7, 0xa9, 0x0a, | 7252 | "\x4c\x82\x97\xfd\x76\xb7\xa9\x0a" |
7260 | 0x35, 0x58, 0x79, 0x8e, 0x0f, 0x66, 0xea, 0xaf, | 7253 | "\x35\x58\x79\x8e\x0f\x66\xea\xaf" |
7261 | 0x51, 0x6c, 0x09, 0xa9, 0x6e, 0x9b, 0xcb, 0x9a, | 7254 | "\x51\x6c\x09\xa9\x6e\x9b\xcb\x9a" |
7262 | 0x31, 0x47, 0xa0, 0x2f, 0x7c, 0x71, 0xb4, 0x4a, | 7255 | "\x31\x47\xa0\x2f\x7c\x71\xb4\x4a" |
7263 | 0x11, 0xaa, 0x8c, 0x66, 0xc5, 0x64, 0xe6, 0x3a, | 7256 | "\x11\xaa\x8c\x66\xc5\x64\xe6\x3a" |
7264 | 0x54, 0xda, 0x24, 0x6a, 0xc4, 0x41, 0x65, 0x46, | 7257 | "\x54\xda\x24\x6a\xc4\x41\x65\x46" |
7265 | 0x82, 0xa0, 0x0a, 0x0f, 0x5f, 0xfb, 0x25, 0xd0, | 7258 | "\x82\xa0\x0a\x0f\x5f\xfb\x25\xd0" |
7266 | 0x2c, 0x91, 0xa7, 0xee, 0xc4, 0x81, 0x07, 0x86, | 7259 | "\x2c\x91\xa7\xee\xc4\x81\x07\x86" |
7267 | 0x75, 0x5e, 0x33, 0x69, 0x97, 0xe4, 0x2c, 0xa8, | 7260 | "\x75\x5e\x33\x69\x97\xe4\x2c\xa8" |
7268 | 0x9d, 0x9f, 0x0b, 0x6a, 0xbe, 0xad, 0x98, 0xda, | 7261 | "\x9d\x9f\x0b\x6a\xbe\xad\x98\xda" |
7269 | 0x6d, 0x94, 0x41, 0xda, 0x2c, 0x1e, 0x89, 0xc4, | 7262 | "\x6d\x94\x41\xda\x2c\x1e\x89\xc4" |
7270 | 0xc2, 0xaf, 0x1e, 0x00, 0x05, 0x0b, 0x83, 0x60, | 7263 | "\xc2\xaf\x1e\x00\x05\x0b\x83\x60" |
7271 | 0xbd, 0x43, 0xea, 0x15, 0x23, 0x7f, 0xb9, 0xac, | 7264 | "\xbd\x43\xea\x15\x23\x7f\xb9\xac" |
7272 | 0xee, 0x4f, 0x2c, 0xaf, 0x2a, 0xf3, 0xdf, 0xd0, | 7265 | "\xee\x4f\x2c\xaf\x2a\xf3\xdf\xd0" |
7273 | 0xf3, 0x19, 0x31, 0xbb, 0x4a, 0x74, 0x84, 0x17, | 7266 | "\xf3\x19\x31\xbb\x4a\x74\x84\x17" |
7274 | 0x52, 0x32, 0x2c, 0x7d, 0x61, 0xe4, 0xcb, 0xeb, | 7267 | "\x52\x32\x2c\x7d\x61\xe4\xcb\xeb" |
7275 | 0x80, 0x38, 0x15, 0x52, 0xcb, 0x6f, 0xea, 0xe5, | 7268 | "\x80\x38\x15\x52\xcb\x6f\xea\xe5" |
7276 | 0x73, 0x9c, 0xd9, 0x24, 0x69, 0xc6, 0x95, 0x32, | 7269 | "\x73\x9c\xd9\x24\x69\xc6\x95\x32" |
7277 | 0x21, 0xc8, 0x11, 0xe4, 0xdc, 0x36, 0xd7, 0x93, | 7270 | "\x21\xc8\x11\xe4\xdc\x36\xd7\x93" |
7278 | 0x38, 0x66, 0xfb, 0xb2, 0x7f, 0x3a, 0xb9, 0xaf, | 7271 | "\x38\x66\xfb\xb2\x7f\x3a\xb9\xaf" |
7279 | 0x31, 0xdd, 0x93, 0x75, 0x78, 0x8a, 0x2c, 0x94, | 7272 | "\x31\xdd\x93\x75\x78\x8a\x2c\x94" |
7280 | 0x87, 0x1a, 0x58, 0xec, 0x9e, 0x7d, 0x4d, 0xba, | 7273 | "\x87\x1a\x58\xec\x9e\x7d\x4d\xba" |
7281 | 0xe1, 0xe5, 0x4d, 0xfc, 0xbc, 0xa4, 0x2a, 0x14, | 7274 | "\xe1\xe5\x4d\xfc\xbc\xa4\x2a\x14" |
7282 | 0xef, 0xcc, 0xa7, 0xec, 0xab, 0x43, 0x09, 0x18, | 7275 | "\xef\xcc\xa7\xec\xab\x43\x09\x18" |
7283 | 0xd3, 0xab, 0x68, 0xd1, 0x07, 0x99, 0x44, 0x47, | 7276 | "\xd3\xab\x68\xd1\x07\x99\x44\x47" |
7284 | 0xd6, 0x83, 0x85, 0x3b, 0x30, 0xea, 0xa9, 0x6b, | 7277 | "\xd6\x83\x85\x3b\x30\xea\xa9\x6b" |
7285 | 0x63, 0xea, 0xc4, 0x07, 0xfb, 0x43, 0x2f, 0xa4, | 7278 | "\x63\xea\xc4\x07\xfb\x43\x2f\xa4" |
7286 | 0xaa, 0xb0, 0xab, 0x03, 0x89, 0xce, 0x3f, 0x8c, | 7279 | "\xaa\xb0\xab\x03\x89\xce\x3f\x8c" |
7287 | 0x02, 0x7c, 0x86, 0x54, 0xbc, 0x88, 0xaf, 0x75, | 7280 | "\x02\x7c\x86\x54\xbc\x88\xaf\x75" |
7288 | 0xd2, 0xdc, 0x63, 0x17, 0xd3, 0x26, 0xf6, 0x96, | 7281 | "\xd2\xdc\x63\x17\xd3\x26\xf6\x96" |
7289 | 0xa9, 0x3c, 0xf1, 0x61, 0x8c, 0x11, 0x18, 0xcc, | 7282 | "\xa9\x3c\xf1\x61\x8c\x11\x18\xcc" |
7290 | 0xd6, 0xea, 0x5b, 0xe2, 0xcd, 0xf0, 0xf1, 0xb2, | 7283 | "\xd6\xea\x5b\xe2\xcd\xf0\xf1\xb2" |
7291 | 0xe5, 0x35, 0x90, 0x1f, 0x85, 0x4c, 0x76, 0x5b, | 7284 | "\xe5\x35\x90\x1f\x85\x4c\x76\x5b" |
7292 | 0x66, 0xce, 0x44, 0xa4, 0x32, 0x9f, 0xe6, 0x7b, | 7285 | "\x66\xce\x44\xa4\x32\x9f\xe6\x7b" |
7293 | 0x71, 0x6e, 0x9f, 0x58, 0x15, 0x67, 0x72, 0x87, | 7286 | "\x71\x6e\x9f\x58\x15\x67\x72\x87" |
7294 | 0x64, 0x8e, 0x3a, 0x44, 0x45, 0xd4, 0x76, 0xfa, | 7287 | "\x64\x8e\x3a\x44\x45\xd4\x76\xfa" |
7295 | 0xc2, 0xf6, 0xef, 0x85, 0x05, 0x18, 0x7a, 0x9b, | 7288 | "\xc2\xf6\xef\x85\x05\x18\x7a\x9b" |
7296 | 0xba, 0x41, 0x54, 0xac, 0xf0, 0xfc, 0x59, 0x12, | 7289 | "\xba\x41\x54\xac\xf0\xfc\x59\x12" |
7297 | 0x3f, 0xdf, 0xa0, 0xe5, 0x8a, 0x65, 0xfd, 0x3a, | 7290 | "\x3f\xdf\xa0\xe5\x8a\x65\xfd\x3a" |
7298 | 0x62, 0x8d, 0x83, 0x2c, 0x03, 0xbe, 0x05, 0x76, | 7291 | "\x62\x8d\x83\x2c\x03\xbe\x05\x76" |
7299 | 0x2e, 0x53, 0x49, 0x97, 0x94, 0x33, 0xae, 0x40, | 7292 | "\x2e\x53\x49\x97\x94\x33\xae\x40" |
7300 | 0x81, 0x15, 0xdb, 0x6e, 0xad, 0xaa, 0xf5, 0x4b, | 7293 | "\x81\x15\xdb\x6e\xad\xaa\xf5\x4b" |
7301 | 0xe3, 0x98, 0x70, 0xdf, 0xe0, 0x7c, 0xcd, 0xdb, | 7294 | "\xe3\x98\x70\xdf\xe0\x7c\xcd\xdb" |
7302 | 0x02, 0xd4, 0x7d, 0x2f, 0xc1, 0xe6, 0xb4, 0xf3, | 7295 | "\x02\xd4\x7d\x2f\xc1\xe6\xb4\xf3" |
7303 | 0xd7, 0x0d, 0x7a, 0xd9, 0x23, 0x9e, 0x87, 0x2d, | 7296 | "\xd7\x0d\x7a\xd9\x23\x9e\x87\x2d" |
7304 | 0xce, 0x87, 0xad, 0xcc, 0x72, 0x05, 0x00, 0x29, | 7297 | "\xce\x87\xad\xcc\x72\x05\x00\x29" |
7305 | 0xdc, 0x73, 0x7f, 0x64, 0xc1, 0x15, 0x0e, 0xc2, | 7298 | "\xdc\x73\x7f\x64\xc1\x15\x0e\xc2" |
7306 | 0xdf, 0xa7, 0x5f, 0xeb, 0x41, 0xa1, 0xcd, 0xef, | 7299 | "\xdf\xa7\x5f\xeb\x41\xa1\xcd\xef" |
7307 | 0x5c, 0x50, 0x79, 0x2a, 0x56, 0x56, 0x71, 0x8c, | 7300 | "\x5c\x50\x79\x2a\x56\x56\x71\x8c" |
7308 | 0xac, 0xc0, 0x79, 0x50, 0x69, 0xca, 0x59, 0x32, | 7301 | "\xac\xc0\x79\x50\x69\xca\x59\x32" |
7309 | 0x65, 0xf2, 0x54, 0xe4, 0x52, 0x38, 0x76, 0xd1, | 7302 | "\x65\xf2\x54\xe4\x52\x38\x76\xd1" |
7310 | 0x5e, 0xde, 0x26, 0x9e, 0xfb, 0x75, 0x2e, 0x11, | 7303 | "\x5e\xde\x26\x9e\xfb\x75\x2e\x11" |
7311 | 0xb5, 0x10, 0xf4, 0x17, 0x73, 0xf5, 0x89, 0xc7, | 7304 | "\xb5\x10\xf4\x17\x73\xf5\x89\xc7" |
7312 | 0x4f, 0x43, 0x5c, 0x8e, 0x7c, 0xb9, 0x05, 0x52, | 7305 | "\x4f\x43\x5c\x8e\x7c\xb9\x05\x52" |
7313 | 0x24, 0x40, 0x99, 0xfe, 0x9b, 0x85, 0x0b, 0x6c, | 7306 | "\x24\x40\x99\xfe\x9b\x85\x0b\x6c" |
7314 | 0x22, 0x3e, 0x8b, 0xae, 0x86, 0xa1, 0xd2, 0x79, | 7307 | "\x22\x3e\x8b\xae\x86\xa1\xd2\x79" |
7315 | 0x05, 0x68, 0x6b, 0xab, 0xe3, 0x41, 0x49, 0xed, | 7308 | "\x05\x68\x6b\xab\xe3\x41\x49\xed" |
7316 | 0x15, 0xa1, 0x8d, 0x40, 0x2d, 0x61, 0xdf, 0x1a, | 7309 | "\x15\xa1\x8d\x40\x2d\x61\xdf\x1a" |
7317 | 0x59, 0xc9, 0x26, 0x8b, 0xef, 0x30, 0x4c, 0x88, | 7310 | "\x59\xc9\x26\x8b\xef\x30\x4c\x88" |
7318 | 0x4b, 0x10, 0xf8, 0x8d, 0xa6, 0x92, 0x9f, 0x4b, | 7311 | "\x4b\x10\xf8\x8d\xa6\x92\x9f\x4b" |
7319 | 0xf3, 0xc4, 0x53, 0x0b, 0x89, 0x5d, 0x28, 0x92, | 7312 | "\xf3\xc4\x53\x0b\x89\x5d\x28\x92" |
7320 | 0xcf, 0x78, 0xb2, 0xc0, 0x5d, 0xed, 0x7e, 0xfc, | 7313 | "\xcf\x78\xb2\xc0\x5d\xed\x7e\xfc" |
7321 | 0xc0, 0x12, 0x23, 0x5f, 0x5a, 0x78, 0x86, 0x43, | 7314 | "\xc0\x12\x23\x5f\x5a\x78\x86\x43" |
7322 | 0x6e, 0x27, 0xf7, 0x5a, 0xa7, 0x6a, 0xed, 0x19, | 7315 | "\x6e\x27\xf7\x5a\xa7\x6a\xed\x19" |
7323 | 0x04, 0xf0, 0xb3, 0x12, 0xd1, 0xbd, 0x0e, 0x89, | 7316 | "\x04\xf0\xb3\x12\xd1\xbd\x0e\x89" |
7324 | 0x6e, 0xbc, 0x96, 0xa8, 0xd8, 0x49, 0x39, 0x9f, | 7317 | "\x6e\xbc\x96\xa8\xd8\x49\x39\x9f" |
7325 | 0x7e, 0x67, 0xf0, 0x2e, 0x3e, 0x01, 0xa9, 0xba, | 7318 | "\x7e\x67\xf0\x2e\x3e\x01\xa9\xba" |
7326 | 0xec, 0x8b, 0x62, 0x8e, 0xcb, 0x4a, 0x70, 0x43, | 7319 | "\xec\x8b\x62\x8e\xcb\x4a\x70\x43" |
7327 | 0xc7, 0xc2, 0xc4, 0xca, 0x82, 0x03, 0x73, 0xe9, | 7320 | "\xc7\xc2\xc4\xca\x82\x03\x73\xe9" |
7328 | 0x11, 0xdf, 0xcf, 0x54, 0xea, 0xc9, 0xb0, 0x95, | 7321 | "\x11\xdf\xcf\x54\xea\xc9\xb0\x95" |
7329 | 0x51, 0xc0, 0x13, 0x3d, 0x92, 0x05, 0xfa, 0xf4, | 7322 | "\x51\xc0\x13\x3d\x92\x05\xfa\xf4" |
7330 | 0xa9, 0x34, 0xc8, 0xce, 0x6c, 0x3d, 0x54, 0xcc, | 7323 | "\xa9\x34\xc8\xce\x6c\x3d\x54\xcc" |
7331 | 0xc4, 0xaf, 0xf1, 0xdc, 0x11, 0x44, 0x26, 0xa2, | 7324 | "\xc4\xaf\xf1\xdc\x11\x44\x26\xa2" |
7332 | 0xaf, 0xf1, 0x85, 0x75, 0x7d, 0x03, 0x61, 0x68, | 7325 | "\xaf\xf1\x85\x75\x7d\x03\x61\x68" |
7333 | 0x4e, 0x78, 0xc6, 0x92, 0x7d, 0x86, 0x7d, 0x77, | 7326 | "\x4e\x78\xc6\x92\x7d\x86\x7d\x77" |
7334 | 0xdc, 0x71, 0x72, 0xdb, 0xc6, 0xae, 0xa1, 0xcb, | 7327 | "\xdc\x71\x72\xdb\xc6\xae\xa1\xcb" |
7335 | 0x70, 0x9a, 0x0b, 0x19, 0xbe, 0x4a, 0x6c, 0x2a, | 7328 | "\x70\x9a\x0b\x19\xbe\x4a\x6c\x2a" |
7336 | 0xe2, 0xba, 0x6c, 0x64, 0x9a, 0x13, 0x28, 0xdf, | 7329 | "\xe2\xba\x6c\x64\x9a\x13\x28\xdf" |
7337 | 0x85, 0x75, 0xe6, 0x43, 0xf6, 0x87, 0x08, 0x68, | 7330 | "\x85\x75\xe6\x43\xf6\x87\x08\x68" |
7338 | 0x6e, 0xba, 0x6e, 0x79, 0x9f, 0x04, 0xbc, 0x23, | 7331 | "\x6e\xba\x6e\x79\x9f\x04\xbc\x23" |
7339 | 0x50, 0xf6, 0x33, 0x5c, 0x1f, 0x24, 0x25, 0xbe, | 7332 | "\x50\xf6\x33\x5c\x1f\x24\x25\xbe" |
7340 | 0x33, 0x47, 0x80, 0x45, 0x56, 0xa3, 0xa7, 0xd7, | 7333 | "\x33\x47\x80\x45\x56\xa3\xa7\xd7" |
7341 | 0x7a, 0xb1, 0x34, 0x0b, 0x90, 0x3c, 0x9c, 0xad, | 7334 | "\x7a\xb1\x34\x0b\x90\x3c\x9c\xad" |
7342 | 0x44, 0x5f, 0x9e, 0x0e, 0x9d, 0xd4, 0xbd, 0x93, | 7335 | "\x44\x5f\x9e\x0e\x9d\xd4\xbd\x93" |
7343 | 0x5e, 0xfa, 0x3c, 0xe0, 0xb0, 0xd9, 0xed, 0xf3, | 7336 | "\x5e\xfa\x3c\xe0\xb0\xd9\xed\xf3" |
7344 | 0xd6, 0x2e, 0xff, 0x24, 0xd8, 0x71, 0x6c, 0xed, | 7337 | "\xd6\x2e\xff\x24\xd8\x71\x6c\xed" |
7345 | 0xaf, 0x55, 0xeb, 0x22, 0xac, 0x93, 0x68, 0x32, | 7338 | "\xaf\x55\xeb\x22\xac\x93\x68\x32" |
7346 | 0x05, 0x5b, 0x47, 0xdd, 0xc6, 0x4a, 0xcb, 0xc7, | 7339 | "\x05\x5b\x47\xdd\xc6\x4a\xcb\xc7" |
7347 | 0x10, 0xe1, 0x3c, 0x92, 0x1a, 0xf3, 0x23, 0x78, | 7340 | "\x10\xe1\x3c\x92\x1a\xf3\x23\x78" |
7348 | 0x2b, 0xa1, 0xd2, 0x80, 0xf4, 0x12, 0xb1, 0x20, | 7341 | "\x2b\xa1\xd2\x80\xf4\x12\xb1\x20" |
7349 | 0x8f, 0xff, 0x26, 0x35, 0xdd, 0xfb, 0xc7, 0x4e, | 7342 | "\x8f\xff\x26\x35\xdd\xfb\xc7\x4e" |
7350 | 0x78, 0xf1, 0x2d, 0x50, 0x12, 0x77, 0xa8, 0x60, | 7343 | "\x78\xf1\x2d\x50\x12\x77\xa8\x60" |
7351 | 0x7c, 0x0f, 0xf5, 0x16, 0x2f, 0x63, 0x70, 0x2a, | 7344 | "\x7c\x0f\xf5\x16\x2f\x63\x70\x2a" |
7352 | 0xc0, 0x96, 0x80, 0x4e, 0x0a, 0xb4, 0x93, 0x35, | 7345 | "\xc0\x96\x80\x4e\x0a\xb4\x93\x35" |
7353 | 0x5d, 0x1d, 0x3f, 0x56, 0xf7, 0x2f, 0xbb, 0x90, | 7346 | "\x5d\x1d\x3f\x56\xf7\x2f\xbb\x90" |
7354 | 0x11, 0x16, 0x8f, 0xa2, 0xec, 0x47, 0xbe, 0xac, | 7347 | "\x11\x16\x8f\xa2\xec\x47\xbe\xac" |
7355 | 0x56, 0x01, 0x26, 0x56, 0xb1, 0x8c, 0xb2, 0x10, | 7348 | "\x56\x01\x26\x56\xb1\x8c\xb2\x10" |
7356 | 0xf9, 0x1a, 0xca, 0xf5, 0xd1, 0xb7, 0x39, 0x20, | 7349 | "\xf9\x1a\xca\xf5\xd1\xb7\x39\x20" |
7357 | 0x63, 0xf1, 0x69, 0x20, 0x4f, 0x13, 0x12, 0x1f, | 7350 | "\x63\xf1\x69\x20\x4f\x13\x12\x1f" |
7358 | 0x5b, 0x65, 0xfc, 0x98, 0xf7, 0xc4, 0x7a, 0xbe, | 7351 | "\x5b\x65\xfc\x98\xf7\xc4\x7a\xbe" |
7359 | 0xf7, 0x26, 0x4d, 0x2b, 0x84, 0x7b, 0x42, 0xad, | 7352 | "\xf7\x26\x4d\x2b\x84\x7b\x42\xad" |
7360 | 0xd8, 0x7a, 0x0a, 0xb4, 0xd8, 0x74, 0xbf, 0xc1, | 7353 | "\xd8\x7a\x0a\xb4\xd8\x74\xbf\xc1" |
7361 | 0xf0, 0x6e, 0xb4, 0x29, 0xa3, 0xbb, 0xca, 0x46, | 7354 | "\xf0\x6e\xb4\x29\xa3\xbb\xca\x46" |
7362 | 0x67, 0x70, 0x6a, 0x2d, 0xce, 0x0e, 0xa2, 0x8a, | 7355 | "\x67\x70\x6a\x2d\xce\x0e\xa2\x8a" |
7363 | 0xa9, 0x87, 0xbf, 0x05, 0xc4, 0xc1, 0x04, 0xa3, | 7356 | "\xa9\x87\xbf\x05\xc4\xc1\x04\xa3" |
7364 | 0xab, 0xd4, 0x45, 0x43, 0x8c, 0xb6, 0x02, 0xb0, | 7357 | "\xab\xd4\x45\x43\x8c\xb6\x02\xb0" |
7365 | 0x41, 0xc8, 0xfc, 0x44, 0x3d, 0x59, 0xaa, 0x2e, | 7358 | "\x41\xc8\xfc\x44\x3d\x59\xaa\x2e" |
7366 | 0x44, 0x21, 0x2a, 0x8d, 0x88, 0x9d, 0x57, 0xf4, | 7359 | "\x44\x21\x2a\x8d\x88\x9d\x57\xf4" |
7367 | 0xa0, 0x02, 0x77, 0xb8, 0xa6, 0xa0, 0xe6, 0x75, | 7360 | "\xa0\x02\x77\xb8\xa6\xa0\xe6\x75" |
7368 | 0x5c, 0x82, 0x65, 0x3e, 0x03, 0x5c, 0x29, 0x8f, | 7361 | "\x5c\x82\x65\x3e\x03\x5c\x29\x8f" |
7369 | 0x38, 0x55, 0xab, 0x33, 0x26, 0xef, 0x9f, 0x43, | 7362 | "\x38\x55\xab\x33\x26\xef\x9f\x43" |
7370 | 0x52, 0xfd, 0x68, 0xaf, 0x36, 0xb4, 0xbb, 0x9a, | 7363 | "\x52\xfd\x68\xaf\x36\xb4\xbb\x9a" |
7371 | 0x58, 0x09, 0x09, 0x1b, 0xc3, 0x65, 0x46, 0x46, | 7364 | "\x58\x09\x09\x1b\xc3\x65\x46\x46" |
7372 | 0x1d, 0xa7, 0x94, 0x18, 0x23, 0x50, 0x2c, 0xca, | 7365 | "\x1d\xa7\x94\x18\x23\x50\x2c\xca" |
7373 | 0x2c, 0x55, 0x19, 0x97, 0x01, 0x9d, 0x93, 0x3b, | 7366 | "\x2c\x55\x19\x97\x01\x9d\x93\x3b" |
7374 | 0x63, 0x86, 0xf2, 0x03, 0x67, 0x45, 0xd2, 0x72, | 7367 | "\x63\x86\xf2\x03\x67\x45\xd2\x72" |
7375 | 0x28, 0x52, 0x6c, 0xf4, 0xe3, 0x1c, 0xb5, 0x11, | 7368 | "\x28\x52\x6c\xf4\xe3\x1c\xb5\x11" |
7376 | 0x13, 0xf1, 0xeb, 0x21, 0xc7, 0xd9, 0x56, 0x82, | 7369 | "\x13\xf1\xeb\x21\xc7\xd9\x56\x82" |
7377 | 0x2b, 0x82, 0x39, 0xbd, 0x69, 0x54, 0xed, 0x62, | 7370 | "\x2b\x82\x39\xbd\x69\x54\xed\x62" |
7378 | 0xc3, 0xe2, 0xde, 0x73, 0xd4, 0x6a, 0x12, 0xae, | 7371 | "\xc3\xe2\xde\x73\xd4\x6a\x12\xae" |
7379 | 0x13, 0x21, 0x7f, 0x4b, 0x5b, 0xfc, 0xbf, 0xe8, | 7372 | "\x13\x21\x7f\x4b\x5b\xfc\xbf\xe8" |
7380 | 0x2b, 0xbe, 0x56, 0xba, 0x68, 0x8b, 0x9a, 0xb1, | 7373 | "\x2b\xbe\x56\xba\x68\x8b\x9a\xb1" |
7381 | 0x6e, 0xfa, 0xbf, 0x7e, 0x5a, 0x4b, 0xf1, 0xac, | 7374 | "\x6e\xfa\xbf\x7e\x5a\x4b\xf1\xac" |
7382 | 0x98, 0x65, 0x85, 0xd1, 0x93, 0x53, 0xd3, 0x7b, | 7375 | "\x98\x65\x85\xd1\x93\x53\xd3\x7b" |
7383 | 0x09, 0xdd, 0x4b, 0x10, 0x6d, 0x84, 0xb0, 0x13, | 7376 | "\x09\xdd\x4b\x10\x6d\x84\xb0\x13" |
7384 | 0x65, 0xbd, 0xcf, 0x52, 0x09, 0xc4, 0x85, 0xe2, | 7377 | "\x65\xbd\xcf\x52\x09\xc4\x85\xe2" |
7385 | 0x84, 0x74, 0x15, 0x65, 0xb7, 0xf7, 0x51, 0xaf, | 7378 | "\x84\x74\x15\x65\xb7\xf7\x51\xaf" |
7386 | 0x55, 0xad, 0xa4, 0xd1, 0x22, 0x54, 0x70, 0x94, | 7379 | "\x55\xad\xa4\xd1\x22\x54\x70\x94" |
7387 | 0xa0, 0x1c, 0x90, 0x41, 0xfd, 0x99, 0xd7, 0x5a, | 7380 | "\xa0\x1c\x90\x41\xfd\x99\xd7\x5a" |
7388 | 0x31, 0xef, 0xaa, 0x25, 0xd0, 0x7f, 0x4f, 0xea, | 7381 | "\x31\xef\xaa\x25\xd0\x7f\x4f\xea" |
7389 | 0x1d, 0x55, 0x42, 0xe5, 0x49, 0xb0, 0xd0, 0x46, | 7382 | "\x1d\x55\x42\xe5\x49\xb0\xd0\x46" |
7390 | 0x62, 0x36, 0x43, 0xb2, 0x82, 0x15, 0x75, 0x50, | 7383 | "\x62\x36\x43\xb2\x82\x15\x75\x50" |
7391 | 0xa4, 0x72, 0xeb, 0x54, 0x27, 0x1f, 0x8a, 0xe4, | 7384 | "\xa4\x72\xeb\x54\x27\x1f\x8a\xe4" |
7392 | 0x7d, 0xe9, 0x66, 0xc5, 0xf1, 0x53, 0xa4, 0xd1, | 7385 | "\x7d\xe9\x66\xc5\xf1\x53\xa4\xd1" |
7393 | 0x0c, 0xeb, 0xb8, 0xf8, 0xbc, 0xd4, 0xe2, 0xe7, | 7386 | "\x0c\xeb\xb8\xf8\xbc\xd4\xe2\xe7" |
7394 | 0xe1, 0xf8, 0x4b, 0xcb, 0xa9, 0xa1, 0xaf, 0x15, | 7387 | "\xe1\xf8\x4b\xcb\xa9\xa1\xaf\x15" |
7395 | 0x83, 0xcb, 0x72, 0xd0, 0x33, 0x79, 0x00, 0x2d, | 7388 | "\x83\xcb\x72\xd0\x33\x79\x00\x2d" |
7396 | 0x9f, 0xd7, 0xf1, 0x2e, 0x1e, 0x10, 0xe4, 0x45, | 7389 | "\x9f\xd7\xf1\x2e\x1e\x10\xe4\x45" |
7397 | 0xc0, 0x75, 0x3a, 0x39, 0xea, 0x68, 0xf7, 0x5d, | 7390 | "\xc0\x75\x3a\x39\xea\x68\xf7\x5d" |
7398 | 0x1b, 0x73, 0x8f, 0xe9, 0x8e, 0x0f, 0x72, 0x47, | 7391 | "\x1b\x73\x8f\xe9\x8e\x0f\x72\x47" |
7399 | 0xae, 0x35, 0x0a, 0x31, 0x7a, 0x14, 0x4d, 0x4a, | 7392 | "\xae\x35\x0a\x31\x7a\x14\x4d\x4a" |
7400 | 0x6f, 0x47, 0xf7, 0x7e, 0x91, 0x6e, 0x74, 0x8b, | 7393 | "\x6f\x47\xf7\x7e\x91\x6e\x74\x8b" |
7401 | 0x26, 0x47, 0xf9, 0xc3, 0xf9, 0xde, 0x70, 0xf5, | 7394 | "\x26\x47\xf9\xc3\xf9\xde\x70\xf5" |
7402 | 0x61, 0xab, 0xa9, 0x27, 0x9f, 0x82, 0xe4, 0x9c, | 7395 | "\x61\xab\xa9\x27\x9f\x82\xe4\x9c" |
7403 | 0x89, 0x91, 0x3f, 0x2e, 0x6a, 0xfd, 0xb5, 0x49, | 7396 | "\x89\x91\x3f\x2e\x6a\xfd\xb5\x49" |
7404 | 0xe9, 0xfd, 0x59, 0x14, 0x36, 0x49, 0x40, 0x6d, | 7397 | "\xe9\xfd\x59\x14\x36\x49\x40\x6d" |
7405 | 0x32, 0xd8, 0x85, 0x42, 0xf3, 0xa5, 0xdf, 0x0c, | 7398 | "\x32\xd8\x85\x42\xf3\xa5\xdf\x0c" |
7406 | 0xa8, 0x27, 0xd7, 0x54, 0xe2, 0x63, 0x2f, 0xf2, | 7399 | "\xa8\x27\xd7\x54\xe2\x63\x2f\xf2" |
7407 | 0x7e, 0x8b, 0x8b, 0xe7, 0xf1, 0x9a, 0x95, 0x35, | 7400 | "\x7e\x8b\x8b\xe7\xf1\x9a\x95\x35" |
7408 | 0x43, 0xdc, 0x3a, 0xe4, 0xb6, 0xf4, 0xd0, 0xdf, | 7401 | "\x43\xdc\x3a\xe4\xb6\xf4\xd0\xdf" |
7409 | 0x9c, 0xcb, 0x94, 0xf3, 0x21, 0xa0, 0x77, 0x50, | 7402 | "\x9c\xcb\x94\xf3\x21\xa0\x77\x50" |
7410 | 0xe2, 0xc6, 0xc4, 0xc6, 0x5f, 0x09, 0x64, 0x5b, | 7403 | "\xe2\xc6\xc4\xc6\x5f\x09\x64\x5b" |
7411 | 0x92, 0x90, 0xd8, 0xe1, 0xd1, 0xed, 0x4b, 0x42, | 7404 | "\x92\x90\xd8\xe1\xd1\xed\x4b\x42" |
7412 | 0xd7, 0x37, 0xaf, 0x65, 0x3d, 0x11, 0x39, 0xb6, | 7405 | "\xd7\x37\xaf\x65\x3d\x11\x39\xb6" |
7413 | 0x24, 0x8a, 0x60, 0xae, 0xd6, 0x1e, 0xbf, 0x0e, | 7406 | "\x24\x8a\x60\xae\xd6\x1e\xbf\x0e" |
7414 | 0x0d, 0xd7, 0xdc, 0x96, 0x0e, 0x65, 0x75, 0x4e, | 7407 | "\x0d\xd7\xdc\x96\x0e\x65\x75\x4e" |
7415 | 0x29, 0x06, 0x9d, 0xa4, 0x51, 0x3a, 0x10, 0x63, | 7408 | "\x29\x06\x9d\xa4\x51\x3a\x10\x63" |
7416 | 0x8f, 0x17, 0x07, 0xd5, 0x8e, 0x3c, 0xf4, 0x28, | 7409 | "\x8f\x17\x07\xd5\x8e\x3c\xf4\x28" |
7417 | 0x00, 0x5a, 0x5b, 0x05, 0x19, 0xd8, 0xc0, 0x6c, | 7410 | "\x00\x5a\x5b\x05\x19\xd8\xc0\x6c" |
7418 | 0xe5, 0x15, 0xe4, 0x9c, 0x9d, 0x71, 0x9d, 0x5e, | 7411 | "\xe5\x15\xe4\x9c\x9d\x71\x9d\x5e" |
7419 | 0x94, 0x29, 0x1a, 0xa7, 0x80, 0xfa, 0x0e, 0x33, | 7412 | "\x94\x29\x1a\xa7\x80\xfa\x0e\x33" |
7420 | 0x03, 0xdd, 0xb7, 0x3e, 0x9a, 0xa9, 0x26, 0x18, | 7413 | "\x03\xdd\xb7\x3e\x9a\xa9\x26\x18" |
7421 | 0x37, 0xa9, 0x64, 0x08, 0x4d, 0x94, 0x5a, 0x88, | 7414 | "\x37\xa9\x64\x08\x4d\x94\x5a\x88" |
7422 | 0xca, 0x35, 0xce, 0x81, 0x02, 0xe3, 0x1f, 0x1b, | 7415 | "\xca\x35\xce\x81\x02\xe3\x1f\x1b" |
7423 | 0x89, 0x1a, 0x77, 0x85, 0xe3, 0x41, 0x6d, 0x32, | 7416 | "\x89\x1a\x77\x85\xe3\x41\x6d\x32" |
7424 | 0x42, 0x19, 0x23, 0x7d, 0xc8, 0x73, 0xee, 0x25, | 7417 | "\x42\x19\x23\x7d\xc8\x73\xee\x25" |
7425 | 0x85, 0x0d, 0xf8, 0x31, 0x25, 0x79, 0x1b, 0x6f, | 7418 | "\x85\x0d\xf8\x31\x25\x79\x1b\x6f" |
7426 | 0x79, 0x25, 0xd2, 0xd8, 0xd4, 0x23, 0xfd, 0xf7, | 7419 | "\x79\x25\xd2\xd8\xd4\x23\xfd\xf7" |
7427 | 0x82, 0x36, 0x6a, 0x0c, 0x46, 0x22, 0x15, 0xe9, | 7420 | "\x82\x36\x6a\x0c\x46\x22\x15\xe9" |
7428 | 0xff, 0x72, 0x41, 0x91, 0x91, 0x7d, 0x3a, 0xb7, | 7421 | "\xff\x72\x41\x91\x91\x7d\x3a\xb7" |
7429 | 0xdd, 0x65, 0x99, 0x70, 0xf6, 0x8d, 0x84, 0xf8, | 7422 | "\xdd\x65\x99\x70\xf6\x8d\x84\xf8" |
7430 | 0x67, 0x15, 0x20, 0x11, 0xd6, 0xb2, 0x55, 0x7b, | 7423 | "\x67\x15\x20\x11\xd6\xb2\x55\x7b" |
7431 | 0xdb, 0x87, 0xee, 0xef, 0x55, 0x89, 0x2a, 0x59, | 7424 | "\xdb\x87\xee\xef\x55\x89\x2a\x59" |
7432 | 0x2b, 0x07, 0x8f, 0x43, 0x8a, 0x59, 0x3c, 0x01, | 7425 | "\x2b\x07\x8f\x43\x8a\x59\x3c\x01" |
7433 | 0x8b, 0x65, 0x54, 0xa1, 0x66, 0xd5, 0x38, 0xbd, | 7426 | "\x8b\x65\x54\xa1\x66\xd5\x38\xbd" |
7434 | 0xc6, 0x30, 0xa9, 0xcc, 0x49, 0xb6, 0xa8, 0x1b, | 7427 | "\xc6\x30\xa9\xcc\x49\xb6\xa8\x1b" |
7435 | 0xb8, 0xc0, 0x0e, 0xe3, 0x45, 0x28, 0xe2, 0xff, | 7428 | "\xb8\xc0\x0e\xe3\x45\x28\xe2\xff" |
7436 | 0x41, 0x9f, 0x7e, 0x7c, 0xd1, 0xae, 0x9e, 0x25, | 7429 | "\x41\x9f\x7e\x7c\xd1\xae\x9e\x25" |
7437 | 0x3f, 0x4c, 0x7c, 0x7c, 0xf4, 0xa8, 0x26, 0x4d, | 7430 | "\x3f\x4c\x7c\x7c\xf4\xa8\x26\x4d" |
7438 | 0x5c, 0xfd, 0x4b, 0x27, 0x18, 0xf9, 0x61, 0x76, | 7431 | "\x5c\xfd\x4b\x27\x18\xf9\x61\x76" |
7439 | 0x48, 0xba, 0x0c, 0x6b, 0xa9, 0x4d, 0xfc, 0xf5, | 7432 | "\x48\xba\x0c\x6b\xa9\x4d\xfc\xf5" |
7440 | 0x3b, 0x35, 0x7e, 0x2f, 0x4a, 0xa9, 0xc2, 0x9a, | 7433 | "\x3b\x35\x7e\x2f\x4a\xa9\xc2\x9a" |
7441 | 0xae, 0xab, 0x86, 0x09, 0x89, 0xc9, 0xc2, 0x40, | 7434 | "\xae\xab\x86\x09\x89\xc9\xc2\x40" |
7442 | 0x39, 0x2c, 0x81, 0xb3, 0xb8, 0x17, 0x67, 0xc2, | 7435 | "\x39\x2c\x81\xb3\xb8\x17\x67\xc2" |
7443 | 0x0d, 0x32, 0x4a, 0x3a, 0x67, 0x81, 0xd7, 0x1a, | 7436 | "\x0d\x32\x4a\x3a\x67\x81\xd7\x1a" |
7444 | 0x34, 0x52, 0xc5, 0xdb, 0x0a, 0xf5, 0x63, 0x39, | 7437 | "\x34\x52\xc5\xdb\x0a\xf5\x63\x39" |
7445 | 0xea, 0x1f, 0xe1, 0x7c, 0xa1, 0x9e, 0xc1, 0x35, | 7438 | "\xea\x1f\xe1\x7c\xa1\x9e\xc1\x35" |
7446 | 0xe3, 0xb1, 0x18, 0x45, 0x67, 0xf9, 0x22, 0x38, | 7439 | "\xe3\xb1\x18\x45\x67\xf9\x22\x38" |
7447 | 0x95, 0xd9, 0x34, 0x34, 0x86, 0xc6, 0x41, 0x94, | 7440 | "\x95\xd9\x34\x34\x86\xc6\x41\x94" |
7448 | 0x15, 0xf9, 0x5b, 0x41, 0xa6, 0x87, 0x8b, 0xf8, | 7441 | "\x15\xf9\x5b\x41\xa6\x87\x8b\xf8" |
7449 | 0xd5, 0xe1, 0x1b, 0xe2, 0x5b, 0xf3, 0x86, 0x10, | 7442 | "\xd5\xe1\x1b\xe2\x5b\xf3\x86\x10" |
7450 | 0xff, 0xe6, 0xae, 0x69, 0x76, 0xbc, 0x0d, 0xb4, | 7443 | "\xff\xe6\xae\x69\x76\xbc\x0d\xb4" |
7451 | 0x09, 0x90, 0x0c, 0xa2, 0x65, 0x0c, 0xad, 0x74, | 7444 | "\x09\x90\x0c\xa2\x65\x0c\xad\x74" |
7452 | 0xf5, 0xd7, 0xff, 0xda, 0xc1, 0xce, 0x85, 0xbe, | 7445 | "\xf5\xd7\xff\xda\xc1\xce\x85\xbe" |
7453 | 0x00, 0xa7, 0xff, 0x4d, 0x2f, 0x65, 0xd3, 0x8c, | 7446 | "\x00\xa7\xff\x4d\x2f\x65\xd3\x8c" |
7454 | 0x86, 0x2d, 0x05, 0xe8, 0xed, 0x3e, 0x6b, 0x8b, | 7447 | "\x86\x2d\x05\xe8\xed\x3e\x6b\x8b" |
7455 | 0x0f, 0x3d, 0x83, 0x8c, 0xf1, 0x1d, 0x5b, 0x96, | 7448 | "\x0f\x3d\x83\x8c\xf1\x1d\x5b\x96" |
7456 | 0x2e, 0xb1, 0x9c, 0xc2, 0x98, 0xe1, 0x70, 0xb9, | 7449 | "\x2e\xb1\x9c\xc2\x98\xe1\x70\xb9" |
7457 | 0xba, 0x5c, 0x8a, 0x43, 0xd6, 0x34, 0xa7, 0x2d, | 7450 | "\xba\x5c\x8a\x43\xd6\x34\xa7\x2d" |
7458 | 0xc9, 0x92, 0xae, 0xf2, 0xa5, 0x7b, 0x05, 0x49, | 7451 | "\xc9\x92\xae\xf2\xa5\x7b\x05\x49" |
7459 | 0xa7, 0x33, 0x34, 0x86, 0xca, 0xe4, 0x96, 0x23, | 7452 | "\xa7\x33\x34\x86\xca\xe4\x96\x23" |
7460 | 0x76, 0x5b, 0xf2, 0xc6, 0xf1, 0x51, 0x28, 0x42, | 7453 | "\x76\x5b\xf2\xc6\xf1\x51\x28\x42" |
7461 | 0x7b, 0xcc, 0x76, 0x8f, 0xfa, 0xa2, 0xad, 0x31, | 7454 | "\x7b\xcc\x76\x8f\xfa\xa2\xad\x31" |
7462 | 0xd4, 0xd6, 0x7a, 0x6d, 0x25, 0x25, 0x54, 0xe4, | 7455 | "\xd4\xd6\x7a\x6d\x25\x25\x54\xe4" |
7463 | 0x3f, 0x50, 0x59, 0xe1, 0x5c, 0x05, 0xb7, 0x27, | 7456 | "\x3f\x50\x59\xe1\x5c\x05\xb7\x27" |
7464 | 0x48, 0xbf, 0x07, 0xec, 0x1b, 0x13, 0xbe, 0x2b, | 7457 | "\x48\xbf\x07\xec\x1b\x13\xbe\x2b" |
7465 | 0xa1, 0x57, 0x2b, 0xd5, 0xab, 0xd7, 0xd0, 0x4c, | 7458 | "\xa1\x57\x2b\xd5\xab\xd7\xd0\x4c" |
7466 | 0x1e, 0xcb, 0x71, 0x9b, 0xc5, 0x90, 0x85, 0xd3, | 7459 | "\x1e\xcb\x71\x9b\xc5\x90\x85\xd3" |
7467 | 0xde, 0x59, 0xec, 0x71, 0xeb, 0x89, 0xbb, 0xd0, | 7460 | "\xde\x59\xec\x71\xeb\x89\xbb\xd0" |
7468 | 0x09, 0x50, 0xe1, 0x16, 0x3f, 0xfd, 0x1c, 0x34, | 7461 | "\x09\x50\xe1\x16\x3f\xfd\x1c\x34" |
7469 | 0xc3, 0x1c, 0xa1, 0x10, 0x77, 0x53, 0x98, 0xef, | 7462 | "\xc3\x1c\xa1\x10\x77\x53\x98\xef" |
7470 | 0xf2, 0xfd, 0xa5, 0x01, 0x59, 0xc2, 0x9b, 0x26, | 7463 | "\xf2\xfd\xa5\x01\x59\xc2\x9b\x26" |
7471 | 0xc7, 0x42, 0xd9, 0x49, 0xda, 0x58, 0x2b, 0x6e, | 7464 | "\xc7\x42\xd9\x49\xda\x58\x2b\x6e" |
7472 | 0x9f, 0x53, 0x19, 0x76, 0x7e, 0xd9, 0xc9, 0x0e, | 7465 | "\x9f\x53\x19\x76\x7e\xd9\xc9\x0e" |
7473 | 0x68, 0xc8, 0x7f, 0x51, 0x22, 0x42, 0xef, 0x49, | 7466 | "\x68\xc8\x7f\x51\x22\x42\xef\x49" |
7474 | 0xa4, 0x55, 0xb6, 0x36, 0xac, 0x09, 0xc7, 0x31, | 7467 | "\xa4\x55\xb6\x36\xac\x09\xc7\x31" |
7475 | 0x88, 0x15, 0x4b, 0x2e, 0x8f, 0x3a, 0x08, 0xf7, | 7468 | "\x88\x15\x4b\x2e\x8f\x3a\x08\xf7" |
7476 | 0xd8, 0xf7, 0xa8, 0xc5, 0xa9, 0x33, 0xa6, 0x45, | 7469 | "\xd8\xf7\xa8\xc5\xa9\x33\xa6\x45" |
7477 | 0xe4, 0xc4, 0x94, 0x76, 0xf3, 0x0d, 0x8f, 0x7e, | 7470 | "\xe4\xc4\x94\x76\xf3\x0d\x8f\x7e" |
7478 | 0xc8, 0xf6, 0xbc, 0x23, 0x0a, 0xb6, 0x4c, 0xd3, | 7471 | "\xc8\xf6\xbc\x23\x0a\xb6\x4c\xd3" |
7479 | 0x6a, 0xcd, 0x36, 0xc2, 0x90, 0x5c, 0x5c, 0x3c, | 7472 | "\x6a\xcd\x36\xc2\x90\x5c\x5c\x3c" |
7480 | 0x65, 0x7b, 0xc2, 0xd6, 0xcc, 0xe6, 0x0d, 0x87, | 7473 | "\x65\x7b\xc2\xd6\xcc\xe6\x0d\x87" |
7481 | 0x73, 0x2e, 0x71, 0x79, 0x16, 0x06, 0x63, 0x28, | 7474 | "\x73\x2e\x71\x79\x16\x06\x63\x28" |
7482 | 0x09, 0x15, 0xd8, 0x89, 0x38, 0x38, 0x3d, 0xb5, | 7475 | "\x09\x15\xd8\x89\x38\x38\x3d\xb5" |
7483 | 0x42, 0x1c, 0x08, 0x24, 0xf7, 0x2a, 0xd2, 0x9d, | 7476 | "\x42\x1c\x08\x24\xf7\x2a\xd2\x9d" |
7484 | 0xc8, 0xca, 0xef, 0xf9, 0x27, 0xd8, 0x07, 0x86, | 7477 | "\xc8\xca\xef\xf9\x27\xd8\x07\x86" |
7485 | 0xf7, 0x43, 0x0b, 0x55, 0x15, 0x3f, 0x9f, 0x83, | 7478 | "\xf7\x43\x0b\x55\x15\x3f\x9f\x83" |
7486 | 0xef, 0xdc, 0x49, 0x9d, 0x2a, 0xc1, 0x54, 0x62, | 7479 | "\xef\xdc\x49\x9d\x2a\xc1\x54\x62" |
7487 | 0xbd, 0x9b, 0x66, 0x55, 0x9f, 0xb7, 0x12, 0xf3, | 7480 | "\xbd\x9b\x66\x55\x9f\xb7\x12\xf3" |
7488 | 0x1b, 0x4d, 0x9d, 0x2a, 0x5c, 0xed, 0x87, 0x75, | 7481 | "\x1b\x4d\x9d\x2a\x5c\xed\x87\x75" |
7489 | 0x87, 0x26, 0xec, 0x61, 0x2c, 0xb4, 0x0f, 0x89, | 7482 | "\x87\x26\xec\x61\x2c\xb4\x0f\x89" |
7490 | 0xb0, 0xfb, 0x2e, 0x68, 0x5d, 0x15, 0xc7, 0x8d, | 7483 | "\xb0\xfb\x2e\x68\x5d\x15\xc7\x8d" |
7491 | 0x2e, 0xc0, 0xd9, 0xec, 0xaf, 0x4f, 0xd2, 0x25, | 7484 | "\x2e\xc0\xd9\xec\xaf\x4f\xd2\x25" |
7492 | 0x29, 0xe8, 0xd2, 0x26, 0x2b, 0x67, 0xe9, 0xfc, | 7485 | "\x29\xe8\xd2\x26\x2b\x67\xe9\xfc" |
7493 | 0x2b, 0xa8, 0x67, 0x96, 0x12, 0x1f, 0x5b, 0x96, | 7486 | "\x2b\xa8\x67\x96\x12\x1f\x5b\x96" |
7494 | 0xc6, 0x14, 0x53, 0xaf, 0x44, 0xea, 0xd6, 0xe2, | 7487 | "\xc6\x14\x53\xaf\x44\xea\xd6\xe2" |
7495 | 0x94, 0x98, 0xe4, 0x12, 0x93, 0x4c, 0x92, 0xe0, | 7488 | "\x94\x98\xe4\x12\x93\x4c\x92\xe0" |
7496 | 0x18, 0xa5, 0x8d, 0x2d, 0xe4, 0x71, 0x3c, 0x47, | 7489 | "\x18\xa5\x8d\x2d\xe4\x71\x3c\x47" |
7497 | 0x4c, 0xf7, 0xe6, 0x47, 0x9e, 0xc0, 0x68, 0xdf, | 7490 | "\x4c\xf7\xe6\x47\x9e\xc0\x68\xdf" |
7498 | 0xd4, 0xf5, 0x5a, 0x74, 0xb1, 0x2b, 0x29, 0x03, | 7491 | "\xd4\xf5\x5a\x74\xb1\x2b\x29\x03" |
7499 | 0x19, 0x07, 0xaf, 0x90, 0x62, 0x5c, 0x68, 0x98, | 7492 | "\x19\x07\xaf\x90\x62\x5c\x68\x98" |
7500 | 0x48, 0x16, 0x11, 0x02, 0x9d, 0xee, 0xb4, 0x9b, | 7493 | "\x48\x16\x11\x02\x9d\xee\xb4\x9b" |
7501 | 0xe5, 0x42, 0x7f, 0x08, 0xfd, 0x16, 0x32, 0x0b, | 7494 | "\xe5\x42\x7f\x08\xfd\x16\x32\x0b" |
7502 | 0xd0, 0xb3, 0xfa, 0x2b, 0xb7, 0x99, 0xf9, 0x29, | 7495 | "\xd0\xb3\xfa\x2b\xb7\x99\xf9\x29" |
7503 | 0xcd, 0x20, 0x45, 0x9f, 0xb3, 0x1a, 0x5d, 0xa2, | 7496 | "\xcd\x20\x45\x9f\xb3\x1a\x5d\xa2" |
7504 | 0xaf, 0x4d, 0xe0, 0xbd, 0x42, 0x0d, 0xbc, 0x74, | 7497 | "\xaf\x4d\xe0\xbd\x42\x0d\xbc\x74" |
7505 | 0x99, 0x9c, 0x8e, 0x53, 0x1a, 0xb4, 0x3e, 0xbd, | 7498 | "\x99\x9c\x8e\x53\x1a\xb4\x3e\xbd" |
7506 | 0xa2, 0x9a, 0x2d, 0xf7, 0xf8, 0x39, 0x0f, 0x67, | 7499 | "\xa2\x9a\x2d\xf7\xf8\x39\x0f\x67" |
7507 | 0x63, 0xfc, 0x6b, 0xc0, 0xaf, 0xb3, 0x4b, 0x4f, | 7500 | "\x63\xfc\x6b\xc0\xaf\xb3\x4b\x4f" |
7508 | 0x55, 0xc4, 0xcf, 0xa7, 0xc8, 0x04, 0x11, 0x3e, | 7501 | "\x55\xc4\xcf\xa7\xc8\x04\x11\x3e" |
7509 | 0x14, 0x32, 0xbb, 0x1b, 0x38, 0x77, 0xd6, 0x7f, | 7502 | "\x14\x32\xbb\x1b\x38\x77\xd6\x7f" |
7510 | 0x54, 0x4c, 0xdf, 0x75, 0xf3, 0x07, 0x2d, 0x33, | 7503 | "\x54\x4c\xdf\x75\xf3\x07\x2d\x33" |
7511 | 0x9b, 0xa8, 0x20, 0xe1, 0x7b, 0x12, 0xb5, 0xf3, | 7504 | "\x9b\xa8\x20\xe1\x7b\x12\xb5\xf3" |
7512 | 0xef, 0x2f, 0xce, 0x72, 0xe5, 0x24, 0x60, 0xc1, | 7505 | "\xef\x2f\xce\x72\xe5\x24\x60\xc1" |
7513 | 0x30, 0xe2, 0xab, 0xa1, 0x8e, 0x11, 0x09, 0xa8, | 7506 | "\x30\xe2\xab\xa1\x8e\x11\x09\xa8" |
7514 | 0x21, 0x33, 0x44, 0xfe, 0x7f, 0x35, 0x32, 0x93, | 7507 | "\x21\x33\x44\xfe\x7f\x35\x32\x93" |
7515 | 0x39, 0xa7, 0xad, 0x8b, 0x79, 0x06, 0xb2, 0xcb, | 7508 | "\x39\xa7\xad\x8b\x79\x06\xb2\xcb" |
7516 | 0x4e, 0xa9, 0x5f, 0xc7, 0xba, 0x74, 0x29, 0xec, | 7509 | "\x4e\xa9\x5f\xc7\xba\x74\x29\xec" |
7517 | 0x93, 0xa0, 0x4e, 0x54, 0x93, 0xc0, 0xbc, 0x55, | 7510 | "\x93\xa0\x4e\x54\x93\xc0\xbc\x55" |
7518 | 0x64, 0xf0, 0x48, 0xe5, 0x57, 0x99, 0xee, 0x75, | 7511 | "\x64\xf0\x48\xe5\x57\x99\xee\x75" |
7519 | 0xd6, 0x79, 0x0f, 0x66, 0xb7, 0xc6, 0x57, 0x76, | 7512 | "\xd6\x79\x0f\x66\xb7\xc6\x57\x76" |
7520 | 0xf7, 0xb7, 0xf3, 0x9c, 0xc5, 0x60, 0xe8, 0x7f, | 7513 | "\xf7\xb7\xf3\x9c\xc5\x60\xe8\x7f" |
7521 | 0x83, 0x76, 0xd6, 0x0e, 0xaa, 0xe6, 0x90, 0x39, | 7514 | "\x83\x76\xd6\x0e\xaa\xe6\x90\x39" |
7522 | 0x1d, 0xa6, 0x32, 0x6a, 0x34, 0xe3, 0x55, 0xf8, | 7515 | "\x1d\xa6\x32\x6a\x34\xe3\x55\xf8" |
7523 | 0x58, 0xa0, 0x58, 0x7d, 0x33, 0xe0, 0x22, 0x39, | 7516 | "\x58\xa0\x58\x7d\x33\xe0\x22\x39" |
7524 | 0x44, 0x64, 0x87, 0x86, 0x5a, 0x2f, 0xa7, 0x7e, | 7517 | "\x44\x64\x87\x86\x5a\x2f\xa7\x7e" |
7525 | 0x0f, 0x38, 0xea, 0xb0, 0x30, 0xcc, 0x61, 0xa5, | 7518 | "\x0f\x38\xea\xb0\x30\xcc\x61\xa5" |
7526 | 0x6a, 0x32, 0xae, 0x1e, 0xf7, 0xe9, 0xd0, 0xa9, | 7519 | "\x6a\x32\xae\x1e\xf7\xe9\xd0\xa9" |
7527 | 0x0c, 0x32, 0x4b, 0xb5, 0x49, 0x28, 0xab, 0x85, | 7520 | "\x0c\x32\x4b\xb5\x49\x28\xab\x85" |
7528 | 0x2f, 0x8e, 0x01, 0x36, 0x38, 0x52, 0xd0, 0xba, | 7521 | "\x2f\x8e\x01\x36\x38\x52\xd0\xba" |
7529 | 0xd6, 0x02, 0x78, 0xf8, 0x0e, 0x3e, 0x9c, 0x8b, | 7522 | "\xd6\x02\x78\xf8\x0e\x3e\x9c\x8b" |
7530 | 0x6b, 0x45, 0x99, 0x3f, 0x5c, 0xfe, 0x58, 0xf1, | 7523 | "\x6b\x45\x99\x3f\x5c\xfe\x58\xf1" |
7531 | 0x5c, 0x94, 0x04, 0xe1, 0xf5, 0x18, 0x6d, 0x51, | 7524 | "\x5c\x94\x04\xe1\xf5\x18\x6d\x51" |
7532 | 0xb2, 0x5d, 0x18, 0x20, 0xb6, 0xc2, 0x9a, 0x42, | 7525 | "\xb2\x5d\x18\x20\xb6\xc2\x9a\x42" |
7533 | 0x1d, 0xb3, 0xab, 0x3c, 0xb6, 0x3a, 0x13, 0x03, | 7526 | "\x1d\xb3\xab\x3c\xb6\x3a\x13\x03" |
7534 | 0xb2, 0x46, 0x82, 0x4f, 0xfc, 0x64, 0xbc, 0x4f, | 7527 | "\xb2\x46\x82\x4f\xfc\x64\xbc\x4f" |
7535 | 0xca, 0xfa, 0x9c, 0xc0, 0xd5, 0xa7, 0xbd, 0x11, | 7528 | "\xca\xfa\x9c\xc0\xd5\xa7\xbd\x11" |
7536 | 0xb7, 0xe4, 0x5a, 0xf6, 0x6f, 0x4d, 0x4d, 0x54, | 7529 | "\xb7\xe4\x5a\xf6\x6f\x4d\x4d\x54" |
7537 | 0xea, 0xa4, 0x98, 0x66, 0xd4, 0x22, 0x3b, 0xd3, | 7530 | "\xea\xa4\x98\x66\xd4\x22\x3b\xd3" |
7538 | 0x8f, 0x34, 0x47, 0xd9, 0x7c, 0xf4, 0x72, 0x3b, | 7531 | "\x8f\x34\x47\xd9\x7c\xf4\x72\x3b" |
7539 | 0x4d, 0x02, 0x77, 0xf6, 0xd6, 0xdd, 0x08, 0x0a, | 7532 | "\x4d\x02\x77\xf6\xd6\xdd\x08\x0a" |
7540 | 0x81, 0xe1, 0x86, 0x89, 0x3e, 0x56, 0x10, 0x3c, | 7533 | "\x81\xe1\x86\x89\x3e\x56\x10\x3c" |
7541 | 0xba, 0xd7, 0x81, 0x8c, 0x08, 0xbc, 0x8b, 0xe2, | 7534 | "\xba\xd7\x81\x8c\x08\xbc\x8b\xe2" |
7542 | 0x53, 0xec, 0xa7, 0x89, 0xee, 0xc8, 0x56, 0xb5, | 7535 | "\x53\xec\xa7\x89\xee\xc8\x56\xb5" |
7543 | 0x36, 0x2c, 0xb2, 0x03, 0xba, 0x99, 0xdd, 0x7c, | 7536 | "\x36\x2c\xb2\x03\xba\x99\xdd\x7c" |
7544 | 0x48, 0xa0, 0xb0, 0xbc, 0x91, 0x33, 0xe9, 0xa8, | 7537 | "\x48\xa0\xb0\xbc\x91\x33\xe9\xa8" |
7545 | 0xcb, 0xcd, 0xcf, 0x59, 0x5f, 0x1f, 0x15, 0xe2, | 7538 | "\xcb\xcd\xcf\x59\x5f\x1f\x15\xe2" |
7546 | 0x56, 0xf5, 0x4e, 0x01, 0x35, 0x27, 0x45, 0x77, | 7539 | "\x56\xf5\x4e\x01\x35\x27\x45\x77" |
7547 | 0x47, 0xc8, 0xbc, 0xcb, 0x7e, 0x39, 0xc1, 0x97, | 7540 | "\x47\xc8\xbc\xcb\x7e\x39\xc1\x97" |
7548 | 0x28, 0xd3, 0x84, 0xfc, 0x2c, 0x3e, 0xc8, 0xad, | 7541 | "\x28\xd3\x84\xfc\x2c\x3e\xc8\xad" |
7549 | 0x9c, 0xf8, 0x8a, 0x61, 0x9c, 0x28, 0xaa, 0xc5, | 7542 | "\x9c\xf8\x8a\x61\x9c\x28\xaa\xc5" |
7550 | 0x99, 0x20, 0x43, 0x85, 0x9d, 0xa5, 0xe2, 0x8b, | 7543 | "\x99\x20\x43\x85\x9d\xa5\xe2\x8b" |
7551 | 0xb8, 0xae, 0xeb, 0xd0, 0x32, 0x0d, 0x52, 0x78, | 7544 | "\xb8\xae\xeb\xd0\x32\x0d\x52\x78" |
7552 | 0x09, 0x56, 0x3f, 0xc7, 0xd8, 0x7e, 0x26, 0xfc, | 7545 | "\x09\x56\x3f\xc7\xd8\x7e\x26\xfc" |
7553 | 0x37, 0xfb, 0x6f, 0x04, 0xfc, 0xfa, 0x92, 0x10, | 7546 | "\x37\xfb\x6f\x04\xfc\xfa\x92\x10" |
7554 | 0xac, 0xf8, 0x3e, 0x21, 0xdc, 0x8c, 0x21, 0x16, | 7547 | "\xac\xf8\x3e\x21\xdc\x8c\x21\x16" |
7555 | 0x7d, 0x67, 0x6e, 0xf6, 0xcd, 0xda, 0xb6, 0x98, | 7548 | "\x7d\x67\x6e\xf6\xcd\xda\xb6\x98" |
7556 | 0x23, 0xab, 0x23, 0x3c, 0xb2, 0x10, 0xa0, 0x53, | 7549 | "\x23\xab\x23\x3c\xb2\x10\xa0\x53" |
7557 | 0x5a, 0x56, 0x9f, 0xc5, 0xd0, 0xff, 0xbb, 0xe4, | 7550 | "\x5a\x56\x9f\xc5\xd0\xff\xbb\xe4" |
7558 | 0x98, 0x3c, 0x69, 0x1e, 0xdb, 0x38, 0x8f, 0x7e, | 7551 | "\x98\x3c\x69\x1e\xdb\x38\x8f\x7e" |
7559 | 0x0f, 0xd2, 0x98, 0x88, 0x81, 0x8b, 0x45, 0x67, | 7552 | "\x0f\xd2\x98\x88\x81\x8b\x45\x67" |
7560 | 0xea, 0x33, 0xf1, 0xeb, 0xe9, 0x97, 0x55, 0x2e, | 7553 | "\xea\x33\xf1\xeb\xe9\x97\x55\x2e" |
7561 | 0xd9, 0xaa, 0xeb, 0x5a, 0xec, 0xda, 0xe1, 0x68, | 7554 | "\xd9\xaa\xeb\x5a\xec\xda\xe1\x68" |
7562 | 0xa8, 0x9d, 0x3c, 0x84, 0x7c, 0x05, 0x3d, 0x62, | 7555 | "\xa8\x9d\x3c\x84\x7c\x05\x3d\x62" |
7563 | 0x87, 0x8f, 0x03, 0x21, 0x28, 0x95, 0x0c, 0x89, | 7556 | "\x87\x8f\x03\x21\x28\x95\x0c\x89" |
7564 | 0x25, 0x22, 0x4a, 0xb0, 0x93, 0xa9, 0x50, 0xa2, | 7557 | "\x25\x22\x4a\xb0\x93\xa9\x50\xa2" |
7565 | 0x2f, 0x57, 0x6e, 0x18, 0x42, 0x19, 0x54, 0x0c, | 7558 | "\x2f\x57\x6e\x18\x42\x19\x54\x0c" |
7566 | 0x55, 0x67, 0xc6, 0x11, 0x49, 0xf4, 0x5c, 0xd2, | 7559 | "\x55\x67\xc6\x11\x49\xf4\x5c\xd2" |
7567 | 0xe9, 0x3d, 0xdd, 0x8b, 0x48, 0x71, 0x21, 0x00, | 7560 | "\xe9\x3d\xdd\x8b\x48\x71\x21\x00" |
7568 | 0xc3, 0x9a, 0x6c, 0x85, 0x74, 0x28, 0x83, 0x4a, | 7561 | "\xc3\x9a\x6c\x85\x74\x28\x83\x4a" |
7569 | 0x1b, 0x31, 0x05, 0xe1, 0x06, 0x92, 0xe7, 0xda, | 7562 | "\x1b\x31\x05\xe1\x06\x92\xe7\xda" |
7570 | 0x85, 0x73, 0x78, 0x45, 0x20, 0x7f, 0xae, 0x13, | 7563 | "\x85\x73\x78\x45\x20\x7f\xae\x13" |
7571 | 0x7c, 0x33, 0x06, 0x22, 0xf4, 0x83, 0xf9, 0x35, | 7564 | "\x7c\x33\x06\x22\xf4\x83\xf9\x35" |
7572 | 0x3f, 0x6c, 0x71, 0xa8, 0x4e, 0x48, 0xbe, 0x9b, | 7565 | "\x3f\x6c\x71\xa8\x4e\x48\xbe\x9b" |
7573 | 0xce, 0x8a, 0xba, 0xda, 0xbe, 0x28, 0x08, 0xf7, | 7566 | "\xce\x8a\xba\xda\xbe\x28\x08\xf7" |
7574 | 0xe2, 0x14, 0x8c, 0x71, 0xea, 0x72, 0xf9, 0x33, | 7567 | "\xe2\x14\x8c\x71\xea\x72\xf9\x33" |
7575 | 0xf2, 0x88, 0x3f, 0xd7, 0xbb, 0x69, 0x6c, 0x29, | 7568 | "\xf2\x88\x3f\xd7\xbb\x69\x6c\x29" |
7576 | 0x19, 0xdc, 0x84, 0xce, 0x1f, 0x12, 0x4f, 0xc8, | 7569 | "\x19\xdc\x84\xce\x1f\x12\x4f\xc8" |
7577 | 0xaf, 0xa5, 0x04, 0xba, 0x5a, 0xab, 0xb0, 0xd9, | 7570 | "\xaf\xa5\x04\xba\x5a\xab\xb0\xd9" |
7578 | 0x14, 0x1f, 0x6c, 0x68, 0x98, 0x39, 0x89, 0x7a, | 7571 | "\x14\x1f\x6c\x68\x98\x39\x89\x7a" |
7579 | 0xd9, 0xd8, 0x2f, 0xdf, 0xa8, 0x47, 0x4a, 0x25, | 7572 | "\xd9\xd8\x2f\xdf\xa8\x47\x4a\x25" |
7580 | 0xe2, 0xfb, 0x33, 0xf4, 0x59, 0x78, 0xe1, 0x68, | 7573 | "\xe2\xfb\x33\xf4\x59\x78\xe1\x68" |
7581 | 0x85, 0xcf, 0xfe, 0x59, 0x20, 0xd4, 0x05, 0x1d, | 7574 | "\x85\xcf\xfe\x59\x20\xd4\x05\x1d" |
7582 | 0x80, 0x99, 0xae, 0xbc, 0xca, 0xae, 0x0f, 0x2f, | 7575 | "\x80\x99\xae\xbc\xca\xae\x0f\x2f" |
7583 | 0x65, 0x43, 0x34, 0x8e, 0x7e, 0xac, 0xd3, 0x93, | 7576 | "\x65\x43\x34\x8e\x7e\xac\xd3\x93" |
7584 | 0x2f, 0xac, 0x6d, 0x14, 0x3d, 0x02, 0x07, 0x70, | 7577 | "\x2f\xac\x6d\x14\x3d\x02\x07\x70" |
7585 | 0x9d, 0xa4, 0xf3, 0x1b, 0x5c, 0x36, 0xfc, 0x01, | 7578 | "\x9d\xa4\xf3\x1b\x5c\x36\xfc\x01" |
7586 | 0x73, 0x34, 0x85, 0x0c, 0x6c, 0xd6, 0xf1, 0xbd, | 7579 | "\x73\x34\x85\x0c\x6c\xd6\xf1\xbd" |
7587 | 0x3f, 0xdf, 0xee, 0xf5, 0xd9, 0xba, 0x56, 0xef, | 7580 | "\x3f\xdf\xee\xf5\xd9\xba\x56\xef" |
7588 | 0xf4, 0x9b, 0x6b, 0xee, 0x9f, 0x5a, 0x78, 0x6d, | 7581 | "\xf4\x9b\x6b\xee\x9f\x5a\x78\x6d" |
7589 | 0x32, 0x19, 0xf4, 0xf7, 0xf8, 0x4c, 0x69, 0x0b, | 7582 | "\x32\x19\xf4\xf7\xf8\x4c\x69\x0b" |
7590 | 0x4b, 0xbc, 0xbb, 0xb7, 0xf2, 0x85, 0xaf, 0x70, | 7583 | "\x4b\xbc\xbb\xb7\xf2\x85\xaf\x70" |
7591 | 0x75, 0x24, 0x6c, 0x54, 0xa7, 0x0e, 0x4d, 0x1d, | 7584 | "\x75\x24\x6c\x54\xa7\x0e\x4d\x1d" |
7592 | 0x01, 0xbf, 0x08, 0xac, 0xcf, 0x7f, 0x2c, 0xe3, | 7585 | "\x01\xbf\x08\xac\xcf\x7f\x2c\xe3" |
7593 | 0x14, 0x89, 0x5e, 0x70, 0x5a, 0x99, 0x92, 0xcd, | 7586 | "\x14\x89\x5e\x70\x5a\x99\x92\xcd" |
7594 | 0x01, 0x84, 0xc8, 0xd2, 0xab, 0xe5, 0x4f, 0x58, | 7587 | "\x01\x84\xc8\xd2\xab\xe5\x4f\x58" |
7595 | 0xe7, 0x0f, 0x2f, 0x0e, 0xff, 0x68, 0xea, 0xfd, | 7588 | "\xe7\x0f\x2f\x0e\xff\x68\xea\xfd" |
7596 | 0x15, 0xb3, 0x17, 0xe6, 0xb0, 0xe7, 0x85, 0xd8, | 7589 | "\x15\xb3\x17\xe6\xb0\xe7\x85\xd8" |
7597 | 0x23, 0x2e, 0x05, 0xc7, 0xc9, 0xc4, 0x46, 0x1f, | 7590 | "\x23\x2e\x05\xc7\xc9\xc4\x46\x1f" |
7598 | 0xe1, 0x9e, 0x49, 0x20, 0x23, 0x24, 0x4d, 0x7e, | 7591 | "\xe1\x9e\x49\x20\x23\x24\x4d\x7e" |
7599 | 0x29, 0x65, 0xff, 0xf4, 0xb6, 0xfd, 0x1a, 0x85, | 7592 | "\x29\x65\xff\xf4\xb6\xfd\x1a\x85" |
7600 | 0xc4, 0x16, 0xec, 0xfc, 0xea, 0x7b, 0xd6, 0x2c, | 7593 | "\xc4\x16\xec\xfc\xea\x7b\xd6\x2c" |
7601 | 0x43, 0xf8, 0xb7, 0xbf, 0x79, 0xc0, 0x85, 0xcd, | 7594 | "\x43\xf8\xb7\xbf\x79\xc0\x85\xcd" |
7602 | 0xef, 0xe1, 0x98, 0xd3, 0xa5, 0xf7, 0x90, 0x8c, | 7595 | "\xef\xe1\x98\xd3\xa5\xf7\x90\x8c" |
7603 | 0xe9, 0x7f, 0x80, 0x6b, 0xd2, 0xac, 0x4c, 0x30, | 7596 | "\xe9\x7f\x80\x6b\xd2\xac\x4c\x30" |
7604 | 0xa7, 0xc6, 0x61, 0x6c, 0xd2, 0xf9, 0x2c, 0xff, | 7597 | "\xa7\xc6\x61\x6c\xd2\xf9\x2c\xff" |
7605 | 0x30, 0xbc, 0x22, 0x81, 0x7d, 0x93, 0x12, 0xe4, | 7598 | "\x30\xbc\x22\x81\x7d\x93\x12\xe4" |
7606 | 0x0a, 0xcd, 0xaf, 0xdd, 0xe8, 0xab, 0x0a, 0x1e, | 7599 | "\x0a\xcd\xaf\xdd\xe8\xab\x0a\x1e" |
7607 | 0x13, 0xa4, 0x27, 0xc3, 0x5f, 0xf7, 0x4b, 0xbb, | 7600 | "\x13\xa4\x27\xc3\x5f\xf7\x4b\xbb" |
7608 | 0x37, 0x09, 0x4b, 0x91, 0x6f, 0x92, 0x4f, 0xaf, | 7601 | "\x37\x09\x4b\x91\x6f\x92\x4f\xaf" |
7609 | 0x52, 0xee, 0xdf, 0xef, 0x09, 0x6f, 0xf7, 0x5c, | 7602 | "\x52\xee\xdf\xef\x09\x6f\xf7\x5c" |
7610 | 0x6e, 0x12, 0x17, 0x72, 0x63, 0x57, 0xc7, 0xba, | 7603 | "\x6e\x12\x17\x72\x63\x57\xc7\xba" |
7611 | 0x3b, 0x6b, 0x38, 0x32, 0x73, 0x1b, 0x9c, 0x80, | 7604 | "\x3b\x6b\x38\x32\x73\x1b\x9c\x80" |
7612 | 0xc1, 0x7a, 0xc6, 0xcf, 0xcd, 0x35, 0xc0, 0x6b, | 7605 | "\xc1\x7a\xc6\xcf\xcd\x35\xc0\x6b" |
7613 | 0x31, 0x1a, 0x6b, 0xe9, 0xd8, 0x2c, 0x29, 0x3f, | 7606 | "\x31\x1a\x6b\xe9\xd8\x2c\x29\x3f" |
7614 | 0x96, 0xfb, 0xb6, 0xcd, 0x13, 0x91, 0x3b, 0xc2, | 7607 | "\x96\xfb\xb6\xcd\x13\x91\x3b\xc2" |
7615 | 0xd2, 0xa3, 0x31, 0x8d, 0xa4, 0xcd, 0x57, 0xcd, | 7608 | "\xd2\xa3\x31\x8d\xa4\xcd\x57\xcd" |
7616 | 0x13, 0x3d, 0x64, 0xfd, 0x06, 0xce, 0xe6, 0xdc, | 7609 | "\x13\x3d\x64\xfd\x06\xce\xe6\xdc" |
7617 | 0x0c, 0x24, 0x43, 0x31, 0x40, 0x57, 0xf1, 0x72, | 7610 | "\x0c\x24\x43\x31\x40\x57\xf1\x72" |
7618 | 0x17, 0xe3, 0x3a, 0x63, 0x6d, 0x35, 0xcf, 0x5d, | 7611 | "\x17\xe3\x3a\x63\x6d\x35\xcf\x5d" |
7619 | 0x97, 0x40, 0x59, 0xdd, 0xf7, 0x3c, 0x02, 0xf7, | 7612 | "\x97\x40\x59\xdd\xf7\x3c\x02\xf7" |
7620 | 0x1c, 0x7e, 0x05, 0xbb, 0xa9, 0x0d, 0x01, 0xb1, | 7613 | "\x1c\x7e\x05\xbb\xa9\x0d\x01\xb1" |
7621 | 0x8e, 0xc0, 0x30, 0xa9, 0x53, 0x24, 0xc9, 0x89, | 7614 | "\x8e\xc0\x30\xa9\x53\x24\xc9\x89" |
7622 | 0x84, 0x6d, 0xaa, 0xd0, 0xcd, 0x91, 0xc2, 0x4d, | 7615 | "\x84\x6d\xaa\xd0\xcd\x91\xc2\x4d" |
7623 | 0x91, 0xb0, 0x89, 0xe2, 0xbf, 0x83, 0x44, 0xaa, | 7616 | "\x91\xb0\x89\xe2\xbf\x83\x44\xaa" |
7624 | 0x28, 0x72, 0x23, 0xa0, 0xc2, 0xad, 0xad, 0x1c, | 7617 | "\x28\x72\x23\xa0\xc2\xad\xad\x1c" |
7625 | 0xfc, 0x3f, 0x09, 0x7a, 0x0b, 0xdc, 0xc5, 0x1b, | 7618 | "\xfc\x3f\x09\x7a\x0b\xdc\xc5\x1b" |
7626 | 0x87, 0x13, 0xc6, 0x5b, 0x59, 0x8d, 0xf2, 0xc8, | 7619 | "\x87\x13\xc6\x5b\x59\x8d\xf2\xc8" |
7627 | 0xaf, 0xdf, 0x11, 0x95, | 7620 | "\xaf\xdf\x11\x95", |
7628 | }, | ||
7629 | .rlen = 4100, | 7621 | .rlen = 4100, |
7630 | }, | 7622 | }, |
7631 | }; | 7623 | }; |
7632 | 7624 | ||
7633 | /* | 7625 | /* |
7626 | * CTS (Cipher Text Stealing) mode tests | ||
7627 | */ | ||
7628 | #define CTS_MODE_ENC_TEST_VECTORS 6 | ||
7629 | #define CTS_MODE_DEC_TEST_VECTORS 6 | ||
7630 | static struct cipher_testvec cts_mode_enc_tv_template[] = { | ||
7631 | { /* from rfc3962 */ | ||
7632 | .klen = 16, | ||
7633 | .key = "\x63\x68\x69\x63\x6b\x65\x6e\x20" | ||
7634 | "\x74\x65\x72\x69\x79\x61\x6b\x69", | ||
7635 | .ilen = 17, | ||
7636 | .input = "\x49\x20\x77\x6f\x75\x6c\x64\x20" | ||
7637 | "\x6c\x69\x6b\x65\x20\x74\x68\x65" | ||
7638 | "\x20", | ||
7639 | .rlen = 17, | ||
7640 | .result = "\xc6\x35\x35\x68\xf2\xbf\x8c\xb4" | ||
7641 | "\xd8\xa5\x80\x36\x2d\xa7\xff\x7f" | ||
7642 | "\x97", | ||
7643 | }, { | ||
7644 | .klen = 16, | ||
7645 | .key = "\x63\x68\x69\x63\x6b\x65\x6e\x20" | ||
7646 | "\x74\x65\x72\x69\x79\x61\x6b\x69", | ||
7647 | .ilen = 31, | ||
7648 | .input = "\x49\x20\x77\x6f\x75\x6c\x64\x20" | ||
7649 | "\x6c\x69\x6b\x65\x20\x74\x68\x65" | ||
7650 | "\x20\x47\x65\x6e\x65\x72\x61\x6c" | ||
7651 | "\x20\x47\x61\x75\x27\x73\x20", | ||
7652 | .rlen = 31, | ||
7653 | .result = "\xfc\x00\x78\x3e\x0e\xfd\xb2\xc1" | ||
7654 | "\xd4\x45\xd4\xc8\xef\xf7\xed\x22" | ||
7655 | "\x97\x68\x72\x68\xd6\xec\xcc\xc0" | ||
7656 | "\xc0\x7b\x25\xe2\x5e\xcf\xe5", | ||
7657 | }, { | ||
7658 | .klen = 16, | ||
7659 | .key = "\x63\x68\x69\x63\x6b\x65\x6e\x20" | ||
7660 | "\x74\x65\x72\x69\x79\x61\x6b\x69", | ||
7661 | .ilen = 32, | ||
7662 | .input = "\x49\x20\x77\x6f\x75\x6c\x64\x20" | ||
7663 | "\x6c\x69\x6b\x65\x20\x74\x68\x65" | ||
7664 | "\x20\x47\x65\x6e\x65\x72\x61\x6c" | ||
7665 | "\x20\x47\x61\x75\x27\x73\x20\x43", | ||
7666 | .rlen = 32, | ||
7667 | .result = "\x39\x31\x25\x23\xa7\x86\x62\xd5" | ||
7668 | "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8" | ||
7669 | "\x97\x68\x72\x68\xd6\xec\xcc\xc0" | ||
7670 | "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84", | ||
7671 | }, { | ||
7672 | .klen = 16, | ||
7673 | .key = "\x63\x68\x69\x63\x6b\x65\x6e\x20" | ||
7674 | "\x74\x65\x72\x69\x79\x61\x6b\x69", | ||
7675 | .ilen = 47, | ||
7676 | .input = "\x49\x20\x77\x6f\x75\x6c\x64\x20" | ||
7677 | "\x6c\x69\x6b\x65\x20\x74\x68\x65" | ||
7678 | "\x20\x47\x65\x6e\x65\x72\x61\x6c" | ||
7679 | "\x20\x47\x61\x75\x27\x73\x20\x43" | ||
7680 | "\x68\x69\x63\x6b\x65\x6e\x2c\x20" | ||
7681 | "\x70\x6c\x65\x61\x73\x65\x2c", | ||
7682 | .rlen = 47, | ||
7683 | .result = "\x97\x68\x72\x68\xd6\xec\xcc\xc0" | ||
7684 | "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84" | ||
7685 | "\xb3\xff\xfd\x94\x0c\x16\xa1\x8c" | ||
7686 | "\x1b\x55\x49\xd2\xf8\x38\x02\x9e" | ||
7687 | "\x39\x31\x25\x23\xa7\x86\x62\xd5" | ||
7688 | "\xbe\x7f\xcb\xcc\x98\xeb\xf5", | ||
7689 | }, { | ||
7690 | .klen = 16, | ||
7691 | .key = "\x63\x68\x69\x63\x6b\x65\x6e\x20" | ||
7692 | "\x74\x65\x72\x69\x79\x61\x6b\x69", | ||
7693 | .ilen = 48, | ||
7694 | .input = "\x49\x20\x77\x6f\x75\x6c\x64\x20" | ||
7695 | "\x6c\x69\x6b\x65\x20\x74\x68\x65" | ||
7696 | "\x20\x47\x65\x6e\x65\x72\x61\x6c" | ||
7697 | "\x20\x47\x61\x75\x27\x73\x20\x43" | ||
7698 | "\x68\x69\x63\x6b\x65\x6e\x2c\x20" | ||
7699 | "\x70\x6c\x65\x61\x73\x65\x2c\x20", | ||
7700 | .rlen = 48, | ||
7701 | .result = "\x97\x68\x72\x68\xd6\xec\xcc\xc0" | ||
7702 | "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84" | ||
7703 | "\x9d\xad\x8b\xbb\x96\xc4\xcd\xc0" | ||
7704 | "\x3b\xc1\x03\xe1\xa1\x94\xbb\xd8" | ||
7705 | "\x39\x31\x25\x23\xa7\x86\x62\xd5" | ||
7706 | "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8", | ||
7707 | }, { | ||
7708 | .klen = 16, | ||
7709 | .key = "\x63\x68\x69\x63\x6b\x65\x6e\x20" | ||
7710 | "\x74\x65\x72\x69\x79\x61\x6b\x69", | ||
7711 | .ilen = 64, | ||
7712 | .input = "\x49\x20\x77\x6f\x75\x6c\x64\x20" | ||
7713 | "\x6c\x69\x6b\x65\x20\x74\x68\x65" | ||
7714 | "\x20\x47\x65\x6e\x65\x72\x61\x6c" | ||
7715 | "\x20\x47\x61\x75\x27\x73\x20\x43" | ||
7716 | "\x68\x69\x63\x6b\x65\x6e\x2c\x20" | ||
7717 | "\x70\x6c\x65\x61\x73\x65\x2c\x20" | ||
7718 | "\x61\x6e\x64\x20\x77\x6f\x6e\x74" | ||
7719 | "\x6f\x6e\x20\x73\x6f\x75\x70\x2e", | ||
7720 | .rlen = 64, | ||
7721 | .result = "\x97\x68\x72\x68\xd6\xec\xcc\xc0" | ||
7722 | "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84" | ||
7723 | "\x39\x31\x25\x23\xa7\x86\x62\xd5" | ||
7724 | "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8" | ||
7725 | "\x48\x07\xef\xe8\x36\xee\x89\xa5" | ||
7726 | "\x26\x73\x0d\xbc\x2f\x7b\xc8\x40" | ||
7727 | "\x9d\xad\x8b\xbb\x96\xc4\xcd\xc0" | ||
7728 | "\x3b\xc1\x03\xe1\xa1\x94\xbb\xd8", | ||
7729 | } | ||
7730 | }; | ||
7731 | |||
7732 | static struct cipher_testvec cts_mode_dec_tv_template[] = { | ||
7733 | { /* from rfc3962 */ | ||
7734 | .klen = 16, | ||
7735 | .key = "\x63\x68\x69\x63\x6b\x65\x6e\x20" | ||
7736 | "\x74\x65\x72\x69\x79\x61\x6b\x69", | ||
7737 | .rlen = 17, | ||
7738 | .result = "\x49\x20\x77\x6f\x75\x6c\x64\x20" | ||
7739 | "\x6c\x69\x6b\x65\x20\x74\x68\x65" | ||
7740 | "\x20", | ||
7741 | .ilen = 17, | ||
7742 | .input = "\xc6\x35\x35\x68\xf2\xbf\x8c\xb4" | ||
7743 | "\xd8\xa5\x80\x36\x2d\xa7\xff\x7f" | ||
7744 | "\x97", | ||
7745 | }, { | ||
7746 | .klen = 16, | ||
7747 | .key = "\x63\x68\x69\x63\x6b\x65\x6e\x20" | ||
7748 | "\x74\x65\x72\x69\x79\x61\x6b\x69", | ||
7749 | .rlen = 31, | ||
7750 | .result = "\x49\x20\x77\x6f\x75\x6c\x64\x20" | ||
7751 | "\x6c\x69\x6b\x65\x20\x74\x68\x65" | ||
7752 | "\x20\x47\x65\x6e\x65\x72\x61\x6c" | ||
7753 | "\x20\x47\x61\x75\x27\x73\x20", | ||
7754 | .ilen = 31, | ||
7755 | .input = "\xfc\x00\x78\x3e\x0e\xfd\xb2\xc1" | ||
7756 | "\xd4\x45\xd4\xc8\xef\xf7\xed\x22" | ||
7757 | "\x97\x68\x72\x68\xd6\xec\xcc\xc0" | ||
7758 | "\xc0\x7b\x25\xe2\x5e\xcf\xe5", | ||
7759 | }, { | ||
7760 | .klen = 16, | ||
7761 | .key = "\x63\x68\x69\x63\x6b\x65\x6e\x20" | ||
7762 | "\x74\x65\x72\x69\x79\x61\x6b\x69", | ||
7763 | .rlen = 32, | ||
7764 | .result = "\x49\x20\x77\x6f\x75\x6c\x64\x20" | ||
7765 | "\x6c\x69\x6b\x65\x20\x74\x68\x65" | ||
7766 | "\x20\x47\x65\x6e\x65\x72\x61\x6c" | ||
7767 | "\x20\x47\x61\x75\x27\x73\x20\x43", | ||
7768 | .ilen = 32, | ||
7769 | .input = "\x39\x31\x25\x23\xa7\x86\x62\xd5" | ||
7770 | "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8" | ||
7771 | "\x97\x68\x72\x68\xd6\xec\xcc\xc0" | ||
7772 | "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84", | ||
7773 | }, { | ||
7774 | .klen = 16, | ||
7775 | .key = "\x63\x68\x69\x63\x6b\x65\x6e\x20" | ||
7776 | "\x74\x65\x72\x69\x79\x61\x6b\x69", | ||
7777 | .rlen = 47, | ||
7778 | .result = "\x49\x20\x77\x6f\x75\x6c\x64\x20" | ||
7779 | "\x6c\x69\x6b\x65\x20\x74\x68\x65" | ||
7780 | "\x20\x47\x65\x6e\x65\x72\x61\x6c" | ||
7781 | "\x20\x47\x61\x75\x27\x73\x20\x43" | ||
7782 | "\x68\x69\x63\x6b\x65\x6e\x2c\x20" | ||
7783 | "\x70\x6c\x65\x61\x73\x65\x2c", | ||
7784 | .ilen = 47, | ||
7785 | .input = "\x97\x68\x72\x68\xd6\xec\xcc\xc0" | ||
7786 | "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84" | ||
7787 | "\xb3\xff\xfd\x94\x0c\x16\xa1\x8c" | ||
7788 | "\x1b\x55\x49\xd2\xf8\x38\x02\x9e" | ||
7789 | "\x39\x31\x25\x23\xa7\x86\x62\xd5" | ||
7790 | "\xbe\x7f\xcb\xcc\x98\xeb\xf5", | ||
7791 | }, { | ||
7792 | .klen = 16, | ||
7793 | .key = "\x63\x68\x69\x63\x6b\x65\x6e\x20" | ||
7794 | "\x74\x65\x72\x69\x79\x61\x6b\x69", | ||
7795 | .rlen = 48, | ||
7796 | .result = "\x49\x20\x77\x6f\x75\x6c\x64\x20" | ||
7797 | "\x6c\x69\x6b\x65\x20\x74\x68\x65" | ||
7798 | "\x20\x47\x65\x6e\x65\x72\x61\x6c" | ||
7799 | "\x20\x47\x61\x75\x27\x73\x20\x43" | ||
7800 | "\x68\x69\x63\x6b\x65\x6e\x2c\x20" | ||
7801 | "\x70\x6c\x65\x61\x73\x65\x2c\x20", | ||
7802 | .ilen = 48, | ||
7803 | .input = "\x97\x68\x72\x68\xd6\xec\xcc\xc0" | ||
7804 | "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84" | ||
7805 | "\x9d\xad\x8b\xbb\x96\xc4\xcd\xc0" | ||
7806 | "\x3b\xc1\x03\xe1\xa1\x94\xbb\xd8" | ||
7807 | "\x39\x31\x25\x23\xa7\x86\x62\xd5" | ||
7808 | "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8", | ||
7809 | }, { | ||
7810 | .klen = 16, | ||
7811 | .key = "\x63\x68\x69\x63\x6b\x65\x6e\x20" | ||
7812 | "\x74\x65\x72\x69\x79\x61\x6b\x69", | ||
7813 | .rlen = 64, | ||
7814 | .result = "\x49\x20\x77\x6f\x75\x6c\x64\x20" | ||
7815 | "\x6c\x69\x6b\x65\x20\x74\x68\x65" | ||
7816 | "\x20\x47\x65\x6e\x65\x72\x61\x6c" | ||
7817 | "\x20\x47\x61\x75\x27\x73\x20\x43" | ||
7818 | "\x68\x69\x63\x6b\x65\x6e\x2c\x20" | ||
7819 | "\x70\x6c\x65\x61\x73\x65\x2c\x20" | ||
7820 | "\x61\x6e\x64\x20\x77\x6f\x6e\x74" | ||
7821 | "\x6f\x6e\x20\x73\x6f\x75\x70\x2e", | ||
7822 | .ilen = 64, | ||
7823 | .input = "\x97\x68\x72\x68\xd6\xec\xcc\xc0" | ||
7824 | "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84" | ||
7825 | "\x39\x31\x25\x23\xa7\x86\x62\xd5" | ||
7826 | "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8" | ||
7827 | "\x48\x07\xef\xe8\x36\xee\x89\xa5" | ||
7828 | "\x26\x73\x0d\xbc\x2f\x7b\xc8\x40" | ||
7829 | "\x9d\xad\x8b\xbb\x96\xc4\xcd\xc0" | ||
7830 | "\x3b\xc1\x03\xe1\xa1\x94\xbb\xd8", | ||
7831 | } | ||
7832 | }; | ||
7833 | |||
7834 | /* | ||
7634 | * Compression stuff. | 7835 | * Compression stuff. |
7635 | */ | 7836 | */ |
7636 | #define COMP_BUF_SIZE 512 | 7837 | #define COMP_BUF_SIZE 512 |
@@ -7652,35 +7853,35 @@ static struct comp_testvec deflate_comp_tv_template[] = { | |||
7652 | { | 7853 | { |
7653 | .inlen = 70, | 7854 | .inlen = 70, |
7654 | .outlen = 38, | 7855 | .outlen = 38, |
7655 | .input = "Join us now and share the software " | 7856 | .input = "Join us now and share the software " |
7656 | "Join us now and share the software ", | 7857 | "Join us now and share the software ", |
7657 | .output = { 0xf3, 0xca, 0xcf, 0xcc, 0x53, 0x28, 0x2d, 0x56, | 7858 | .output = "\xf3\xca\xcf\xcc\x53\x28\x2d\x56" |
7658 | 0xc8, 0xcb, 0x2f, 0x57, 0x48, 0xcc, 0x4b, 0x51, | 7859 | "\xc8\xcb\x2f\x57\x48\xcc\x4b\x51" |
7659 | 0x28, 0xce, 0x48, 0x2c, 0x4a, 0x55, 0x28, 0xc9, | 7860 | "\x28\xce\x48\x2c\x4a\x55\x28\xc9" |
7660 | 0x48, 0x55, 0x28, 0xce, 0x4f, 0x2b, 0x29, 0x07, | 7861 | "\x48\x55\x28\xce\x4f\x2b\x29\x07" |
7661 | 0x71, 0xbc, 0x08, 0x2b, 0x01, 0x00 }, | 7862 | "\x71\xbc\x08\x2b\x01\x00", |
7662 | }, { | 7863 | }, { |
7663 | .inlen = 191, | 7864 | .inlen = 191, |
7664 | .outlen = 122, | 7865 | .outlen = 122, |
7665 | .input = "This document describes a compression method based on the DEFLATE" | 7866 | .input = "This document describes a compression method based on the DEFLATE" |
7666 | "compression algorithm. This document defines the application of " | 7867 | "compression algorithm. This document defines the application of " |
7667 | "the DEFLATE algorithm to the IP Payload Compression Protocol.", | 7868 | "the DEFLATE algorithm to the IP Payload Compression Protocol.", |
7668 | .output = { 0x5d, 0x8d, 0x31, 0x0e, 0xc2, 0x30, 0x10, 0x04, | 7869 | .output = "\x5d\x8d\x31\x0e\xc2\x30\x10\x04" |
7669 | 0xbf, 0xb2, 0x2f, 0xc8, 0x1f, 0x10, 0x04, 0x09, | 7870 | "\xbf\xb2\x2f\xc8\x1f\x10\x04\x09" |
7670 | 0x89, 0xc2, 0x85, 0x3f, 0x70, 0xb1, 0x2f, 0xf8, | 7871 | "\x89\xc2\x85\x3f\x70\xb1\x2f\xf8" |
7671 | 0x24, 0xdb, 0x67, 0xd9, 0x47, 0xc1, 0xef, 0x49, | 7872 | "\x24\xdb\x67\xd9\x47\xc1\xef\x49" |
7672 | 0x68, 0x12, 0x51, 0xae, 0x76, 0x67, 0xd6, 0x27, | 7873 | "\x68\x12\x51\xae\x76\x67\xd6\x27" |
7673 | 0x19, 0x88, 0x1a, 0xde, 0x85, 0xab, 0x21, 0xf2, | 7874 | "\x19\x88\x1a\xde\x85\xab\x21\xf2" |
7674 | 0x08, 0x5d, 0x16, 0x1e, 0x20, 0x04, 0x2d, 0xad, | 7875 | "\x08\x5d\x16\x1e\x20\x04\x2d\xad" |
7675 | 0xf3, 0x18, 0xa2, 0x15, 0x85, 0x2d, 0x69, 0xc4, | 7876 | "\xf3\x18\xa2\x15\x85\x2d\x69\xc4" |
7676 | 0x42, 0x83, 0x23, 0xb6, 0x6c, 0x89, 0x71, 0x9b, | 7877 | "\x42\x83\x23\xb6\x6c\x89\x71\x9b" |
7677 | 0xef, 0xcf, 0x8b, 0x9f, 0xcf, 0x33, 0xca, 0x2f, | 7878 | "\xef\xcf\x8b\x9f\xcf\x33\xca\x2f" |
7678 | 0xed, 0x62, 0xa9, 0x4c, 0x80, 0xff, 0x13, 0xaf, | 7879 | "\xed\x62\xa9\x4c\x80\xff\x13\xaf" |
7679 | 0x52, 0x37, 0xed, 0x0e, 0x52, 0x6b, 0x59, 0x02, | 7880 | "\x52\x37\xed\x0e\x52\x6b\x59\x02" |
7680 | 0xd9, 0x4e, 0xe8, 0x7a, 0x76, 0x1d, 0x02, 0x98, | 7881 | "\xd9\x4e\xe8\x7a\x76\x1d\x02\x98" |
7681 | 0xfe, 0x8a, 0x87, 0x83, 0xa3, 0x4f, 0x56, 0x8a, | 7882 | "\xfe\x8a\x87\x83\xa3\x4f\x56\x8a" |
7682 | 0xb8, 0x9e, 0x8e, 0x5c, 0x57, 0xd3, 0xa0, 0x79, | 7883 | "\xb8\x9e\x8e\x5c\x57\xd3\xa0\x79" |
7683 | 0xfa, 0x02 }, | 7884 | "\xfa\x02", |
7684 | }, | 7885 | }, |
7685 | }; | 7886 | }; |
7686 | 7887 | ||
@@ -7688,35 +7889,35 @@ static struct comp_testvec deflate_decomp_tv_template[] = { | |||
7688 | { | 7889 | { |
7689 | .inlen = 122, | 7890 | .inlen = 122, |
7690 | .outlen = 191, | 7891 | .outlen = 191, |
7691 | .input = { 0x5d, 0x8d, 0x31, 0x0e, 0xc2, 0x30, 0x10, 0x04, | 7892 | .input = "\x5d\x8d\x31\x0e\xc2\x30\x10\x04" |
7692 | 0xbf, 0xb2, 0x2f, 0xc8, 0x1f, 0x10, 0x04, 0x09, | 7893 | "\xbf\xb2\x2f\xc8\x1f\x10\x04\x09" |
7693 | 0x89, 0xc2, 0x85, 0x3f, 0x70, 0xb1, 0x2f, 0xf8, | 7894 | "\x89\xc2\x85\x3f\x70\xb1\x2f\xf8" |
7694 | 0x24, 0xdb, 0x67, 0xd9, 0x47, 0xc1, 0xef, 0x49, | 7895 | "\x24\xdb\x67\xd9\x47\xc1\xef\x49" |
7695 | 0x68, 0x12, 0x51, 0xae, 0x76, 0x67, 0xd6, 0x27, | 7896 | "\x68\x12\x51\xae\x76\x67\xd6\x27" |
7696 | 0x19, 0x88, 0x1a, 0xde, 0x85, 0xab, 0x21, 0xf2, | 7897 | "\x19\x88\x1a\xde\x85\xab\x21\xf2" |
7697 | 0x08, 0x5d, 0x16, 0x1e, 0x20, 0x04, 0x2d, 0xad, | 7898 | "\x08\x5d\x16\x1e\x20\x04\x2d\xad" |
7698 | 0xf3, 0x18, 0xa2, 0x15, 0x85, 0x2d, 0x69, 0xc4, | 7899 | "\xf3\x18\xa2\x15\x85\x2d\x69\xc4" |
7699 | 0x42, 0x83, 0x23, 0xb6, 0x6c, 0x89, 0x71, 0x9b, | 7900 | "\x42\x83\x23\xb6\x6c\x89\x71\x9b" |
7700 | 0xef, 0xcf, 0x8b, 0x9f, 0xcf, 0x33, 0xca, 0x2f, | 7901 | "\xef\xcf\x8b\x9f\xcf\x33\xca\x2f" |
7701 | 0xed, 0x62, 0xa9, 0x4c, 0x80, 0xff, 0x13, 0xaf, | 7902 | "\xed\x62\xa9\x4c\x80\xff\x13\xaf" |
7702 | 0x52, 0x37, 0xed, 0x0e, 0x52, 0x6b, 0x59, 0x02, | 7903 | "\x52\x37\xed\x0e\x52\x6b\x59\x02" |
7703 | 0xd9, 0x4e, 0xe8, 0x7a, 0x76, 0x1d, 0x02, 0x98, | 7904 | "\xd9\x4e\xe8\x7a\x76\x1d\x02\x98" |
7704 | 0xfe, 0x8a, 0x87, 0x83, 0xa3, 0x4f, 0x56, 0x8a, | 7905 | "\xfe\x8a\x87\x83\xa3\x4f\x56\x8a" |
7705 | 0xb8, 0x9e, 0x8e, 0x5c, 0x57, 0xd3, 0xa0, 0x79, | 7906 | "\xb8\x9e\x8e\x5c\x57\xd3\xa0\x79" |
7706 | 0xfa, 0x02 }, | 7907 | "\xfa\x02", |
7707 | .output = "This document describes a compression method based on the DEFLATE" | 7908 | .output = "This document describes a compression method based on the DEFLATE" |
7708 | "compression algorithm. This document defines the application of " | 7909 | "compression algorithm. This document defines the application of " |
7709 | "the DEFLATE algorithm to the IP Payload Compression Protocol.", | 7910 | "the DEFLATE algorithm to the IP Payload Compression Protocol.", |
7710 | }, { | 7911 | }, { |
7711 | .inlen = 38, | 7912 | .inlen = 38, |
7712 | .outlen = 70, | 7913 | .outlen = 70, |
7713 | .input = { 0xf3, 0xca, 0xcf, 0xcc, 0x53, 0x28, 0x2d, 0x56, | 7914 | .input = "\xf3\xca\xcf\xcc\x53\x28\x2d\x56" |
7714 | 0xc8, 0xcb, 0x2f, 0x57, 0x48, 0xcc, 0x4b, 0x51, | 7915 | "\xc8\xcb\x2f\x57\x48\xcc\x4b\x51" |
7715 | 0x28, 0xce, 0x48, 0x2c, 0x4a, 0x55, 0x28, 0xc9, | 7916 | "\x28\xce\x48\x2c\x4a\x55\x28\xc9" |
7716 | 0x48, 0x55, 0x28, 0xce, 0x4f, 0x2b, 0x29, 0x07, | 7917 | "\x48\x55\x28\xce\x4f\x2b\x29\x07" |
7717 | 0x71, 0xbc, 0x08, 0x2b, 0x01, 0x00 }, | 7918 | "\x71\xbc\x08\x2b\x01\x00", |
7718 | .output = "Join us now and share the software " | 7919 | .output = "Join us now and share the software " |
7719 | "Join us now and share the software ", | 7920 | "Join us now and share the software ", |
7720 | }, | 7921 | }, |
7721 | }; | 7922 | }; |
7722 | 7923 | ||
@@ -7731,36 +7932,36 @@ static struct comp_testvec lzo_comp_tv_template[] = { | |||
7731 | .inlen = 70, | 7932 | .inlen = 70, |
7732 | .outlen = 46, | 7933 | .outlen = 46, |
7733 | .input = "Join us now and share the software " | 7934 | .input = "Join us now and share the software " |
7734 | "Join us now and share the software ", | 7935 | "Join us now and share the software ", |
7735 | .output = { 0x00, 0x0d, 0x4a, 0x6f, 0x69, 0x6e, 0x20, 0x75, | 7936 | .output = "\x00\x0d\x4a\x6f\x69\x6e\x20\x75" |
7736 | 0x73, 0x20, 0x6e, 0x6f, 0x77, 0x20, 0x61, 0x6e, | 7937 | "\x73\x20\x6e\x6f\x77\x20\x61\x6e" |
7737 | 0x64, 0x20, 0x73, 0x68, 0x61, 0x72, 0x65, 0x20, | 7938 | "\x64\x20\x73\x68\x61\x72\x65\x20" |
7738 | 0x74, 0x68, 0x65, 0x20, 0x73, 0x6f, 0x66, 0x74, | 7939 | "\x74\x68\x65\x20\x73\x6f\x66\x74" |
7739 | 0x77, 0x70, 0x01, 0x01, 0x4a, 0x6f, 0x69, 0x6e, | 7940 | "\x77\x70\x01\x01\x4a\x6f\x69\x6e" |
7740 | 0x3d, 0x88, 0x00, 0x11, 0x00, 0x00 }, | 7941 | "\x3d\x88\x00\x11\x00\x00", |
7741 | }, { | 7942 | }, { |
7742 | .inlen = 159, | 7943 | .inlen = 159, |
7743 | .outlen = 133, | 7944 | .outlen = 133, |
7744 | .input = "This document describes a compression method based on the LZO " | 7945 | .input = "This document describes a compression method based on the LZO " |
7745 | "compression algorithm. This document defines the application of " | 7946 | "compression algorithm. This document defines the application of " |
7746 | "the LZO algorithm used in UBIFS.", | 7947 | "the LZO algorithm used in UBIFS.", |
7747 | .output = { 0x00, 0x2b, 0x54, 0x68, 0x69, 0x73, 0x20, 0x64, | 7948 | .output = "\x00\x2b\x54\x68\x69\x73\x20\x64" |
7748 | 0x6f, 0x63, 0x75, 0x6d, 0x65, 0x6e, 0x74, 0x20, | 7949 | "\x6f\x63\x75\x6d\x65\x6e\x74\x20" |
7749 | 0x64, 0x65, 0x73, 0x63, 0x72, 0x69, 0x62, 0x65, | 7950 | "\x64\x65\x73\x63\x72\x69\x62\x65" |
7750 | 0x73, 0x20, 0x61, 0x20, 0x63, 0x6f, 0x6d, 0x70, | 7951 | "\x73\x20\x61\x20\x63\x6f\x6d\x70" |
7751 | 0x72, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x20, | 7952 | "\x72\x65\x73\x73\x69\x6f\x6e\x20" |
7752 | 0x6d, 0x65, 0x74, 0x68, 0x6f, 0x64, 0x20, 0x62, | 7953 | "\x6d\x65\x74\x68\x6f\x64\x20\x62" |
7753 | 0x61, 0x73, 0x65, 0x64, 0x20, 0x6f, 0x6e, 0x20, | 7954 | "\x61\x73\x65\x64\x20\x6f\x6e\x20" |
7754 | 0x74, 0x68, 0x65, 0x20, 0x4c, 0x5a, 0x4f, 0x2b, | 7955 | "\x74\x68\x65\x20\x4c\x5a\x4f\x2b" |
7755 | 0x8c, 0x00, 0x0d, 0x61, 0x6c, 0x67, 0x6f, 0x72, | 7956 | "\x8c\x00\x0d\x61\x6c\x67\x6f\x72" |
7756 | 0x69, 0x74, 0x68, 0x6d, 0x2e, 0x20, 0x20, 0x54, | 7957 | "\x69\x74\x68\x6d\x2e\x20\x20\x54" |
7757 | 0x68, 0x69, 0x73, 0x2a, 0x54, 0x01, 0x02, 0x66, | 7958 | "\x68\x69\x73\x2a\x54\x01\x02\x66" |
7758 | 0x69, 0x6e, 0x65, 0x73, 0x94, 0x06, 0x05, 0x61, | 7959 | "\x69\x6e\x65\x73\x94\x06\x05\x61" |
7759 | 0x70, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x76, | 7960 | "\x70\x70\x6c\x69\x63\x61\x74\x76" |
7760 | 0x0a, 0x6f, 0x66, 0x88, 0x02, 0x60, 0x09, 0x27, | 7961 | "\x0a\x6f\x66\x88\x02\x60\x09\x27" |
7761 | 0xf0, 0x00, 0x0c, 0x20, 0x75, 0x73, 0x65, 0x64, | 7962 | "\xf0\x00\x0c\x20\x75\x73\x65\x64" |
7762 | 0x20, 0x69, 0x6e, 0x20, 0x55, 0x42, 0x49, 0x46, | 7963 | "\x20\x69\x6e\x20\x55\x42\x49\x46" |
7763 | 0x53, 0x2e, 0x11, 0x00, 0x00 }, | 7964 | "\x53\x2e\x11\x00\x00", |
7764 | }, | 7965 | }, |
7765 | }; | 7966 | }; |
7766 | 7967 | ||
@@ -7768,37 +7969,37 @@ static struct comp_testvec lzo_decomp_tv_template[] = { | |||
7768 | { | 7969 | { |
7769 | .inlen = 133, | 7970 | .inlen = 133, |
7770 | .outlen = 159, | 7971 | .outlen = 159, |
7771 | .input = { 0x00, 0x2b, 0x54, 0x68, 0x69, 0x73, 0x20, 0x64, | 7972 | .input = "\x00\x2b\x54\x68\x69\x73\x20\x64" |
7772 | 0x6f, 0x63, 0x75, 0x6d, 0x65, 0x6e, 0x74, 0x20, | 7973 | "\x6f\x63\x75\x6d\x65\x6e\x74\x20" |
7773 | 0x64, 0x65, 0x73, 0x63, 0x72, 0x69, 0x62, 0x65, | 7974 | "\x64\x65\x73\x63\x72\x69\x62\x65" |
7774 | 0x73, 0x20, 0x61, 0x20, 0x63, 0x6f, 0x6d, 0x70, | 7975 | "\x73\x20\x61\x20\x63\x6f\x6d\x70" |
7775 | 0x72, 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x20, | 7976 | "\x72\x65\x73\x73\x69\x6f\x6e\x20" |
7776 | 0x6d, 0x65, 0x74, 0x68, 0x6f, 0x64, 0x20, 0x62, | 7977 | "\x6d\x65\x74\x68\x6f\x64\x20\x62" |
7777 | 0x61, 0x73, 0x65, 0x64, 0x20, 0x6f, 0x6e, 0x20, | 7978 | "\x61\x73\x65\x64\x20\x6f\x6e\x20" |
7778 | 0x74, 0x68, 0x65, 0x20, 0x4c, 0x5a, 0x4f, 0x2b, | 7979 | "\x74\x68\x65\x20\x4c\x5a\x4f\x2b" |
7779 | 0x8c, 0x00, 0x0d, 0x61, 0x6c, 0x67, 0x6f, 0x72, | 7980 | "\x8c\x00\x0d\x61\x6c\x67\x6f\x72" |
7780 | 0x69, 0x74, 0x68, 0x6d, 0x2e, 0x20, 0x20, 0x54, | 7981 | "\x69\x74\x68\x6d\x2e\x20\x20\x54" |
7781 | 0x68, 0x69, 0x73, 0x2a, 0x54, 0x01, 0x02, 0x66, | 7982 | "\x68\x69\x73\x2a\x54\x01\x02\x66" |
7782 | 0x69, 0x6e, 0x65, 0x73, 0x94, 0x06, 0x05, 0x61, | 7983 | "\x69\x6e\x65\x73\x94\x06\x05\x61" |
7783 | 0x70, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74, 0x76, | 7984 | "\x70\x70\x6c\x69\x63\x61\x74\x76" |
7784 | 0x0a, 0x6f, 0x66, 0x88, 0x02, 0x60, 0x09, 0x27, | 7985 | "\x0a\x6f\x66\x88\x02\x60\x09\x27" |
7785 | 0xf0, 0x00, 0x0c, 0x20, 0x75, 0x73, 0x65, 0x64, | 7986 | "\xf0\x00\x0c\x20\x75\x73\x65\x64" |
7786 | 0x20, 0x69, 0x6e, 0x20, 0x55, 0x42, 0x49, 0x46, | 7987 | "\x20\x69\x6e\x20\x55\x42\x49\x46" |
7787 | 0x53, 0x2e, 0x11, 0x00, 0x00 }, | 7988 | "\x53\x2e\x11\x00\x00", |
7788 | .output = "This document describes a compression method based on the LZO " | 7989 | .output = "This document describes a compression method based on the LZO " |
7789 | "compression algorithm. This document defines the application of " | 7990 | "compression algorithm. This document defines the application of " |
7790 | "the LZO algorithm used in UBIFS.", | 7991 | "the LZO algorithm used in UBIFS.", |
7791 | }, { | 7992 | }, { |
7792 | .inlen = 46, | 7993 | .inlen = 46, |
7793 | .outlen = 70, | 7994 | .outlen = 70, |
7794 | .input = { 0x00, 0x0d, 0x4a, 0x6f, 0x69, 0x6e, 0x20, 0x75, | 7995 | .input = "\x00\x0d\x4a\x6f\x69\x6e\x20\x75" |
7795 | 0x73, 0x20, 0x6e, 0x6f, 0x77, 0x20, 0x61, 0x6e, | 7996 | "\x73\x20\x6e\x6f\x77\x20\x61\x6e" |
7796 | 0x64, 0x20, 0x73, 0x68, 0x61, 0x72, 0x65, 0x20, | 7997 | "\x64\x20\x73\x68\x61\x72\x65\x20" |
7797 | 0x74, 0x68, 0x65, 0x20, 0x73, 0x6f, 0x66, 0x74, | 7998 | "\x74\x68\x65\x20\x73\x6f\x66\x74" |
7798 | 0x77, 0x70, 0x01, 0x01, 0x4a, 0x6f, 0x69, 0x6e, | 7999 | "\x77\x70\x01\x01\x4a\x6f\x69\x6e" |
7799 | 0x3d, 0x88, 0x00, 0x11, 0x00, 0x00 }, | 8000 | "\x3d\x88\x00\x11\x00\x00", |
7800 | .output = "Join us now and share the software " | 8001 | .output = "Join us now and share the software " |
7801 | "Join us now and share the software ", | 8002 | "Join us now and share the software ", |
7802 | }, | 8003 | }, |
7803 | }; | 8004 | }; |
7804 | 8005 | ||
@@ -7809,46 +8010,46 @@ static struct comp_testvec lzo_decomp_tv_template[] = { | |||
7809 | 8010 | ||
7810 | static struct hash_testvec michael_mic_tv_template[] = { | 8011 | static struct hash_testvec michael_mic_tv_template[] = { |
7811 | { | 8012 | { |
7812 | .key = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | 8013 | .key = "\x00\x00\x00\x00\x00\x00\x00\x00", |
7813 | .ksize = 8, | 8014 | .ksize = 8, |
7814 | .plaintext = { }, | 8015 | .plaintext = zeroed_string, |
7815 | .psize = 0, | 8016 | .psize = 0, |
7816 | .digest = { 0x82, 0x92, 0x5c, 0x1c, 0xa1, 0xd1, 0x30, 0xb8 } | 8017 | .digest = "\x82\x92\x5c\x1c\xa1\xd1\x30\xb8", |
7817 | }, | 8018 | }, |
7818 | { | 8019 | { |
7819 | .key = { 0x82, 0x92, 0x5c, 0x1c, 0xa1, 0xd1, 0x30, 0xb8 }, | 8020 | .key = "\x82\x92\x5c\x1c\xa1\xd1\x30\xb8", |
7820 | .ksize = 8, | 8021 | .ksize = 8, |
7821 | .plaintext = { 'M' }, | 8022 | .plaintext = "M", |
7822 | .psize = 1, | 8023 | .psize = 1, |
7823 | .digest = { 0x43, 0x47, 0x21, 0xca, 0x40, 0x63, 0x9b, 0x3f } | 8024 | .digest = "\x43\x47\x21\xca\x40\x63\x9b\x3f", |
7824 | }, | 8025 | }, |
7825 | { | 8026 | { |
7826 | .key = { 0x43, 0x47, 0x21, 0xca, 0x40, 0x63, 0x9b, 0x3f }, | 8027 | .key = "\x43\x47\x21\xca\x40\x63\x9b\x3f", |
7827 | .ksize = 8, | 8028 | .ksize = 8, |
7828 | .plaintext = { 'M', 'i' }, | 8029 | .plaintext = "Mi", |
7829 | .psize = 2, | 8030 | .psize = 2, |
7830 | .digest = { 0xe8, 0xf9, 0xbe, 0xca, 0xe9, 0x7e, 0x5d, 0x29 } | 8031 | .digest = "\xe8\xf9\xbe\xca\xe9\x7e\x5d\x29", |
7831 | }, | 8032 | }, |
7832 | { | 8033 | { |
7833 | .key = { 0xe8, 0xf9, 0xbe, 0xca, 0xe9, 0x7e, 0x5d, 0x29 }, | 8034 | .key = "\xe8\xf9\xbe\xca\xe9\x7e\x5d\x29", |
7834 | .ksize = 8, | 8035 | .ksize = 8, |
7835 | .plaintext = { 'M', 'i', 'c' }, | 8036 | .plaintext = "Mic", |
7836 | .psize = 3, | 8037 | .psize = 3, |
7837 | .digest = { 0x90, 0x03, 0x8f, 0xc6, 0xcf, 0x13, 0xc1, 0xdb } | 8038 | .digest = "\x90\x03\x8f\xc6\xcf\x13\xc1\xdb", |
7838 | }, | 8039 | }, |
7839 | { | 8040 | { |
7840 | .key = { 0x90, 0x03, 0x8f, 0xc6, 0xcf, 0x13, 0xc1, 0xdb }, | 8041 | .key = "\x90\x03\x8f\xc6\xcf\x13\xc1\xdb", |
7841 | .ksize = 8, | 8042 | .ksize = 8, |
7842 | .plaintext = { 'M', 'i', 'c', 'h' }, | 8043 | .plaintext = "Mich", |
7843 | .psize = 4, | 8044 | .psize = 4, |
7844 | .digest = { 0xd5, 0x5e, 0x10, 0x05, 0x10, 0x12, 0x89, 0x86 } | 8045 | .digest = "\xd5\x5e\x10\x05\x10\x12\x89\x86", |
7845 | }, | 8046 | }, |
7846 | { | 8047 | { |
7847 | .key = { 0xd5, 0x5e, 0x10, 0x05, 0x10, 0x12, 0x89, 0x86 }, | 8048 | .key = "\xd5\x5e\x10\x05\x10\x12\x89\x86", |
7848 | .ksize = 8, | 8049 | .ksize = 8, |
7849 | .plaintext = { 'M', 'i', 'c', 'h', 'a', 'e', 'l' }, | 8050 | .plaintext = "Michael", |
7850 | .psize = 7, | 8051 | .psize = 7, |
7851 | .digest = { 0x0a, 0x94, 0x2b, 0x12, 0x4e, 0xca, 0xa5, 0x46 }, | 8052 | .digest = "\x0a\x94\x2b\x12\x4e\xca\xa5\x46", |
7852 | } | 8053 | } |
7853 | }; | 8054 | }; |
7854 | 8055 | ||
@@ -7860,170 +8061,170 @@ static struct hash_testvec michael_mic_tv_template[] = { | |||
7860 | static struct hash_testvec crc32c_tv_template[] = { | 8061 | static struct hash_testvec crc32c_tv_template[] = { |
7861 | { | 8062 | { |
7862 | .psize = 0, | 8063 | .psize = 0, |
7863 | .digest = { 0x00, 0x00, 0x00, 0x00 } | 8064 | .digest = "\x00\x00\x00\x00", |
7864 | }, | 8065 | }, |
7865 | { | 8066 | { |
7866 | .key = { 0x87, 0xa9, 0xcb, 0xed }, | 8067 | .key = "\x87\xa9\xcb\xed", |
7867 | .ksize = 4, | 8068 | .ksize = 4, |
7868 | .psize = 0, | 8069 | .psize = 0, |
7869 | .digest = { 0x78, 0x56, 0x34, 0x12 }, | 8070 | .digest = "\x78\x56\x34\x12", |
7870 | }, | 8071 | }, |
7871 | { | 8072 | { |
7872 | .key = { 0xff, 0xff, 0xff, 0xff }, | 8073 | .key = "\xff\xff\xff\xff", |
7873 | .ksize = 4, | 8074 | .ksize = 4, |
7874 | .plaintext = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, | 8075 | .plaintext = "\x01\x02\x03\x04\x05\x06\x07\x08" |
7875 | 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, | 8076 | "\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10" |
7876 | 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, | 8077 | "\x11\x12\x13\x14\x15\x16\x17\x18" |
7877 | 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, | 8078 | "\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20" |
7878 | 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28 }, | 8079 | "\x21\x22\x23\x24\x25\x26\x27\x28", |
7879 | .psize = 40, | 8080 | .psize = 40, |
7880 | .digest = { 0x7f, 0x15, 0x2c, 0x0e } | 8081 | .digest = "\x7f\x15\x2c\x0e", |
7881 | }, | 8082 | }, |
7882 | { | 8083 | { |
7883 | .key = { 0xff, 0xff, 0xff, 0xff }, | 8084 | .key = "\xff\xff\xff\xff", |
7884 | .ksize = 4, | 8085 | .ksize = 4, |
7885 | .plaintext = { 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, | 8086 | .plaintext = "\x29\x2a\x2b\x2c\x2d\x2e\x2f\x30" |
7886 | 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, | 8087 | "\x31\x32\x33\x34\x35\x36\x37\x38" |
7887 | 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x40, | 8088 | "\x39\x3a\x3b\x3c\x3d\x3e\x3f\x40" |
7888 | 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, | 8089 | "\x41\x42\x43\x44\x45\x46\x47\x48" |
7889 | 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, 0x50 }, | 8090 | "\x49\x4a\x4b\x4c\x4d\x4e\x4f\x50", |
7890 | .psize = 40, | 8091 | .psize = 40, |
7891 | .digest = { 0xf6, 0xeb, 0x80, 0xe9 } | 8092 | .digest = "\xf6\xeb\x80\xe9", |
7892 | }, | 8093 | }, |
7893 | { | 8094 | { |
7894 | .key = { 0xff, 0xff, 0xff, 0xff }, | 8095 | .key = "\xff\xff\xff\xff", |
7895 | .ksize = 4, | 8096 | .ksize = 4, |
7896 | .plaintext = { 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, 0x58, | 8097 | .plaintext = "\x51\x52\x53\x54\x55\x56\x57\x58" |
7897 | 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, 0x60, | 8098 | "\x59\x5a\x5b\x5c\x5d\x5e\x5f\x60" |
7898 | 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, | 8099 | "\x61\x62\x63\x64\x65\x66\x67\x68" |
7899 | 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, 0x70, | 8100 | "\x69\x6a\x6b\x6c\x6d\x6e\x6f\x70" |
7900 | 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78 }, | 8101 | "\x71\x72\x73\x74\x75\x76\x77\x78", |
7901 | .psize = 40, | 8102 | .psize = 40, |
7902 | .digest = { 0xed, 0xbd, 0x74, 0xde } | 8103 | .digest = "\xed\xbd\x74\xde", |
7903 | }, | 8104 | }, |
7904 | { | 8105 | { |
7905 | .key = { 0xff, 0xff, 0xff, 0xff }, | 8106 | .key = "\xff\xff\xff\xff", |
7906 | .ksize = 4, | 8107 | .ksize = 4, |
7907 | .plaintext = { 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x80, | 8108 | .plaintext = "\x79\x7a\x7b\x7c\x7d\x7e\x7f\x80" |
7908 | 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, 0x88, | 8109 | "\x81\x82\x83\x84\x85\x86\x87\x88" |
7909 | 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f, 0x90, | 8110 | "\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90" |
7910 | 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, 0x98, | 8111 | "\x91\x92\x93\x94\x95\x96\x97\x98" |
7911 | 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f, 0xa0 }, | 8112 | "\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0", |
7912 | .psize = 40, | 8113 | .psize = 40, |
7913 | .digest = { 0x62, 0xc8, 0x79, 0xd5 } | 8114 | .digest = "\x62\xc8\x79\xd5", |
7914 | }, | 8115 | }, |
7915 | { | 8116 | { |
7916 | .key = { 0xff, 0xff, 0xff, 0xff }, | 8117 | .key = "\xff\xff\xff\xff", |
7917 | .ksize = 4, | 8118 | .ksize = 4, |
7918 | .plaintext = { 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7, 0xa8, | 8119 | .plaintext = "\xa1\xa2\xa3\xa4\xa5\xa6\xa7\xa8" |
7919 | 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf, 0xb0, | 8120 | "\xa9\xaa\xab\xac\xad\xae\xaf\xb0" |
7920 | 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7, 0xb8, | 8121 | "\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8" |
7921 | 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf, 0xc0, | 8122 | "\xb9\xba\xbb\xbc\xbd\xbe\xbf\xc0" |
7922 | 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8 }, | 8123 | "\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8", |
7923 | .psize = 40, | 8124 | .psize = 40, |
7924 | .digest = { 0xd0, 0x9a, 0x97, 0xba } | 8125 | .digest = "\xd0\x9a\x97\xba", |
7925 | }, | 8126 | }, |
7926 | { | 8127 | { |
7927 | .key = { 0xff, 0xff, 0xff, 0xff }, | 8128 | .key = "\xff\xff\xff\xff", |
7928 | .ksize = 4, | 8129 | .ksize = 4, |
7929 | .plaintext = { 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf, 0xd0, | 8130 | .plaintext = "\xc9\xca\xcb\xcc\xcd\xce\xcf\xd0" |
7930 | 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, 0xd8, | 8131 | "\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8" |
7931 | 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, 0xe0, | 8132 | "\xd9\xda\xdb\xdc\xdd\xde\xdf\xe0" |
7932 | 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7, 0xe8, | 8133 | "\xe1\xe2\xe3\xe4\xe5\xe6\xe7\xe8" |
7933 | 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef, 0xf0 }, | 8134 | "\xe9\xea\xeb\xec\xed\xee\xef\xf0", |
7934 | .psize = 40, | 8135 | .psize = 40, |
7935 | .digest = { 0x13, 0xd9, 0x29, 0x2b } | 8136 | .digest = "\x13\xd9\x29\x2b", |
7936 | }, | 8137 | }, |
7937 | { | 8138 | { |
7938 | .key = { 0x80, 0xea, 0xd3, 0xf1 }, | 8139 | .key = "\x80\xea\xd3\xf1", |
7939 | .ksize = 4, | 8140 | .ksize = 4, |
7940 | .plaintext = { 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, | 8141 | .plaintext = "\x29\x2a\x2b\x2c\x2d\x2e\x2f\x30" |
7941 | 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, | 8142 | "\x31\x32\x33\x34\x35\x36\x37\x38" |
7942 | 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x40, | 8143 | "\x39\x3a\x3b\x3c\x3d\x3e\x3f\x40" |
7943 | 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, | 8144 | "\x41\x42\x43\x44\x45\x46\x47\x48" |
7944 | 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, 0x50 }, | 8145 | "\x49\x4a\x4b\x4c\x4d\x4e\x4f\x50", |
7945 | .psize = 40, | 8146 | .psize = 40, |
7946 | .digest = { 0x0c, 0xb5, 0xe2, 0xa2 } | 8147 | .digest = "\x0c\xb5\xe2\xa2", |
7947 | }, | 8148 | }, |
7948 | { | 8149 | { |
7949 | .key = { 0xf3, 0x4a, 0x1d, 0x5d }, | 8150 | .key = "\xf3\x4a\x1d\x5d", |
7950 | .ksize = 4, | 8151 | .ksize = 4, |
7951 | .plaintext = { 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, 0x58, | 8152 | .plaintext = "\x51\x52\x53\x54\x55\x56\x57\x58" |
7952 | 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, 0x60, | 8153 | "\x59\x5a\x5b\x5c\x5d\x5e\x5f\x60" |
7953 | 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, | 8154 | "\x61\x62\x63\x64\x65\x66\x67\x68" |
7954 | 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, 0x70, | 8155 | "\x69\x6a\x6b\x6c\x6d\x6e\x6f\x70" |
7955 | 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78 }, | 8156 | "\x71\x72\x73\x74\x75\x76\x77\x78", |
7956 | .psize = 40, | 8157 | .psize = 40, |
7957 | .digest = { 0xd1, 0x7f, 0xfb, 0xa6 } | 8158 | .digest = "\xd1\x7f\xfb\xa6", |
7958 | }, | 8159 | }, |
7959 | { | 8160 | { |
7960 | .key = { 0x2e, 0x80, 0x04, 0x59 }, | 8161 | .key = "\x2e\x80\x04\x59", |
7961 | .ksize = 4, | 8162 | .ksize = 4, |
7962 | .plaintext = { 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x80, | 8163 | .plaintext = "\x79\x7a\x7b\x7c\x7d\x7e\x7f\x80" |
7963 | 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, 0x88, | 8164 | "\x81\x82\x83\x84\x85\x86\x87\x88" |
7964 | 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f, 0x90, | 8165 | "\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90" |
7965 | 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, 0x98, | 8166 | "\x91\x92\x93\x94\x95\x96\x97\x98" |
7966 | 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f, 0xa0 }, | 8167 | "\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0", |
7967 | .psize = 40, | 8168 | .psize = 40, |
7968 | .digest = { 0x59, 0x33, 0xe6, 0x7a } | 8169 | .digest = "\x59\x33\xe6\x7a", |
7969 | }, | 8170 | }, |
7970 | { | 8171 | { |
7971 | .key = { 0xa6, 0xcc, 0x19, 0x85 }, | 8172 | .key = "\xa6\xcc\x19\x85", |
7972 | .ksize = 4, | 8173 | .ksize = 4, |
7973 | .plaintext = { 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7, 0xa8, | 8174 | .plaintext = "\xa1\xa2\xa3\xa4\xa5\xa6\xa7\xa8" |
7974 | 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf, 0xb0, | 8175 | "\xa9\xaa\xab\xac\xad\xae\xaf\xb0" |
7975 | 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7, 0xb8, | 8176 | "\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8" |
7976 | 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf, 0xc0, | 8177 | "\xb9\xba\xbb\xbc\xbd\xbe\xbf\xc0" |
7977 | 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8 }, | 8178 | "\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8", |
7978 | .psize = 40, | 8179 | .psize = 40, |
7979 | .digest = { 0xbe, 0x03, 0x01, 0xd2 } | 8180 | .digest = "\xbe\x03\x01\xd2", |
7980 | }, | 8181 | }, |
7981 | { | 8182 | { |
7982 | .key = { 0x41, 0xfc, 0xfe, 0x2d }, | 8183 | .key = "\x41\xfc\xfe\x2d", |
7983 | .ksize = 4, | 8184 | .ksize = 4, |
7984 | .plaintext = { 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf, 0xd0, | 8185 | .plaintext = "\xc9\xca\xcb\xcc\xcd\xce\xcf\xd0" |
7985 | 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, 0xd8, | 8186 | "\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8" |
7986 | 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, 0xe0, | 8187 | "\xd9\xda\xdb\xdc\xdd\xde\xdf\xe0" |
7987 | 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7, 0xe8, | 8188 | "\xe1\xe2\xe3\xe4\xe5\xe6\xe7\xe8" |
7988 | 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef, 0xf0 }, | 8189 | "\xe9\xea\xeb\xec\xed\xee\xef\xf0", |
7989 | .psize = 40, | 8190 | .psize = 40, |
7990 | .digest = { 0x75, 0xd3, 0xc5, 0x24 } | 8191 | .digest = "\x75\xd3\xc5\x24", |
7991 | }, | 8192 | }, |
7992 | { | 8193 | { |
7993 | .key = { 0xff, 0xff, 0xff, 0xff }, | 8194 | .key = "\xff\xff\xff\xff", |
7994 | .ksize = 4, | 8195 | .ksize = 4, |
7995 | .plaintext = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, | 8196 | .plaintext = "\x01\x02\x03\x04\x05\x06\x07\x08" |
7996 | 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, | 8197 | "\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10" |
7997 | 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, | 8198 | "\x11\x12\x13\x14\x15\x16\x17\x18" |
7998 | 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, | 8199 | "\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20" |
7999 | 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, | 8200 | "\x21\x22\x23\x24\x25\x26\x27\x28" |
8000 | 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, | 8201 | "\x29\x2a\x2b\x2c\x2d\x2e\x2f\x30" |
8001 | 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, | 8202 | "\x31\x32\x33\x34\x35\x36\x37\x38" |
8002 | 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x40, | 8203 | "\x39\x3a\x3b\x3c\x3d\x3e\x3f\x40" |
8003 | 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, | 8204 | "\x41\x42\x43\x44\x45\x46\x47\x48" |
8004 | 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, 0x50, | 8205 | "\x49\x4a\x4b\x4c\x4d\x4e\x4f\x50" |
8005 | 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, 0x58, | 8206 | "\x51\x52\x53\x54\x55\x56\x57\x58" |
8006 | 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, 0x60, | 8207 | "\x59\x5a\x5b\x5c\x5d\x5e\x5f\x60" |
8007 | 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, | 8208 | "\x61\x62\x63\x64\x65\x66\x67\x68" |
8008 | 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, 0x70, | 8209 | "\x69\x6a\x6b\x6c\x6d\x6e\x6f\x70" |
8009 | 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, | 8210 | "\x71\x72\x73\x74\x75\x76\x77\x78" |
8010 | 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x80, | 8211 | "\x79\x7a\x7b\x7c\x7d\x7e\x7f\x80" |
8011 | 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, 0x88, | 8212 | "\x81\x82\x83\x84\x85\x86\x87\x88" |
8012 | 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f, 0x90, | 8213 | "\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90" |
8013 | 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, 0x98, | 8214 | "\x91\x92\x93\x94\x95\x96\x97\x98" |
8014 | 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f, 0xa0, | 8215 | "\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0" |
8015 | 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7, 0xa8, | 8216 | "\xa1\xa2\xa3\xa4\xa5\xa6\xa7\xa8" |
8016 | 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf, 0xb0, | 8217 | "\xa9\xaa\xab\xac\xad\xae\xaf\xb0" |
8017 | 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7, 0xb8, | 8218 | "\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8" |
8018 | 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf, 0xc0, | 8219 | "\xb9\xba\xbb\xbc\xbd\xbe\xbf\xc0" |
8019 | 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, | 8220 | "\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8" |
8020 | 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf, 0xd0, | 8221 | "\xc9\xca\xcb\xcc\xcd\xce\xcf\xd0" |
8021 | 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, 0xd8, | 8222 | "\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8" |
8022 | 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, 0xe0, | 8223 | "\xd9\xda\xdb\xdc\xdd\xde\xdf\xe0" |
8023 | 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7, 0xe8, | 8224 | "\xe1\xe2\xe3\xe4\xe5\xe6\xe7\xe8" |
8024 | 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef, 0xf0 }, | 8225 | "\xe9\xea\xeb\xec\xed\xee\xef\xf0", |
8025 | .psize = 240, | 8226 | .psize = 240, |
8026 | .digest = { 0x75, 0xd3, 0xc5, 0x24 }, | 8227 | .digest = "\x75\xd3\xc5\x24", |
8027 | .np = 2, | 8228 | .np = 2, |
8028 | .tap = { 31, 209 } | 8229 | .tap = { 31, 209 } |
8029 | }, | 8230 | }, |
@@ -8032,134 +8233,19 @@ static struct hash_testvec crc32c_tv_template[] = { | |||
8032 | /* | 8233 | /* |
8033 | * Cipher speed tests | 8234 | * Cipher speed tests |
8034 | */ | 8235 | */ |
8035 | static struct cipher_speed aes_speed_template[] = { | 8236 | static u8 speed_template_8[] = {8, 0}; |
8036 | { .klen = 16, .blen = 16, }, | 8237 | static u8 speed_template_24[] = {24, 0}; |
8037 | { .klen = 16, .blen = 64, }, | 8238 | static u8 speed_template_8_32[] = {8, 32, 0}; |
8038 | { .klen = 16, .blen = 256, }, | 8239 | static u8 speed_template_16_32[] = {16, 32, 0}; |
8039 | { .klen = 16, .blen = 1024, }, | 8240 | static u8 speed_template_16_24_32[] = {16, 24, 32, 0}; |
8040 | { .klen = 16, .blen = 8192, }, | 8241 | static u8 speed_template_32_40_48[] = {32, 40, 48, 0}; |
8041 | { .klen = 24, .blen = 16, }, | 8242 | static u8 speed_template_32_48_64[] = {32, 48, 64, 0}; |
8042 | { .klen = 24, .blen = 64, }, | ||
8043 | { .klen = 24, .blen = 256, }, | ||
8044 | { .klen = 24, .blen = 1024, }, | ||
8045 | { .klen = 24, .blen = 8192, }, | ||
8046 | { .klen = 32, .blen = 16, }, | ||
8047 | { .klen = 32, .blen = 64, }, | ||
8048 | { .klen = 32, .blen = 256, }, | ||
8049 | { .klen = 32, .blen = 1024, }, | ||
8050 | { .klen = 32, .blen = 8192, }, | ||
8051 | |||
8052 | /* End marker */ | ||
8053 | { .klen = 0, .blen = 0, } | ||
8054 | }; | ||
8055 | |||
8056 | static struct cipher_speed aes_lrw_speed_template[] = { | ||
8057 | { .klen = 32, .blen = 16, }, | ||
8058 | { .klen = 32, .blen = 64, }, | ||
8059 | { .klen = 32, .blen = 256, }, | ||
8060 | { .klen = 32, .blen = 1024, }, | ||
8061 | { .klen = 32, .blen = 8192, }, | ||
8062 | { .klen = 40, .blen = 16, }, | ||
8063 | { .klen = 40, .blen = 64, }, | ||
8064 | { .klen = 40, .blen = 256, }, | ||
8065 | { .klen = 40, .blen = 1024, }, | ||
8066 | { .klen = 40, .blen = 8192, }, | ||
8067 | { .klen = 48, .blen = 16, }, | ||
8068 | { .klen = 48, .blen = 64, }, | ||
8069 | { .klen = 48, .blen = 256, }, | ||
8070 | { .klen = 48, .blen = 1024, }, | ||
8071 | { .klen = 48, .blen = 8192, }, | ||
8072 | |||
8073 | /* End marker */ | ||
8074 | { .klen = 0, .blen = 0, } | ||
8075 | }; | ||
8076 | |||
8077 | static struct cipher_speed aes_xts_speed_template[] = { | ||
8078 | { .klen = 32, .blen = 16, }, | ||
8079 | { .klen = 32, .blen = 64, }, | ||
8080 | { .klen = 32, .blen = 256, }, | ||
8081 | { .klen = 32, .blen = 1024, }, | ||
8082 | { .klen = 32, .blen = 8192, }, | ||
8083 | { .klen = 48, .blen = 16, }, | ||
8084 | { .klen = 48, .blen = 64, }, | ||
8085 | { .klen = 48, .blen = 256, }, | ||
8086 | { .klen = 48, .blen = 1024, }, | ||
8087 | { .klen = 48, .blen = 8192, }, | ||
8088 | { .klen = 64, .blen = 16, }, | ||
8089 | { .klen = 64, .blen = 64, }, | ||
8090 | { .klen = 64, .blen = 256, }, | ||
8091 | { .klen = 64, .blen = 1024, }, | ||
8092 | { .klen = 64, .blen = 8192, }, | ||
8093 | |||
8094 | /* End marker */ | ||
8095 | { .klen = 0, .blen = 0, } | ||
8096 | }; | ||
8097 | |||
8098 | static struct cipher_speed des3_ede_speed_template[] = { | ||
8099 | { .klen = 24, .blen = 16, }, | ||
8100 | { .klen = 24, .blen = 64, }, | ||
8101 | { .klen = 24, .blen = 256, }, | ||
8102 | { .klen = 24, .blen = 1024, }, | ||
8103 | { .klen = 24, .blen = 8192, }, | ||
8104 | |||
8105 | /* End marker */ | ||
8106 | { .klen = 0, .blen = 0, } | ||
8107 | }; | ||
8108 | |||
8109 | static struct cipher_speed twofish_speed_template[] = { | ||
8110 | { .klen = 16, .blen = 16, }, | ||
8111 | { .klen = 16, .blen = 64, }, | ||
8112 | { .klen = 16, .blen = 256, }, | ||
8113 | { .klen = 16, .blen = 1024, }, | ||
8114 | { .klen = 16, .blen = 8192, }, | ||
8115 | { .klen = 24, .blen = 16, }, | ||
8116 | { .klen = 24, .blen = 64, }, | ||
8117 | { .klen = 24, .blen = 256, }, | ||
8118 | { .klen = 24, .blen = 1024, }, | ||
8119 | { .klen = 24, .blen = 8192, }, | ||
8120 | { .klen = 32, .blen = 16, }, | ||
8121 | { .klen = 32, .blen = 64, }, | ||
8122 | { .klen = 32, .blen = 256, }, | ||
8123 | { .klen = 32, .blen = 1024, }, | ||
8124 | { .klen = 32, .blen = 8192, }, | ||
8125 | |||
8126 | /* End marker */ | ||
8127 | { .klen = 0, .blen = 0, } | ||
8128 | }; | ||
8129 | |||
8130 | static struct cipher_speed blowfish_speed_template[] = { | ||
8131 | /* Don't support blowfish keys > 256 bit in this test */ | ||
8132 | { .klen = 8, .blen = 16, }, | ||
8133 | { .klen = 8, .blen = 64, }, | ||
8134 | { .klen = 8, .blen = 256, }, | ||
8135 | { .klen = 8, .blen = 1024, }, | ||
8136 | { .klen = 8, .blen = 8192, }, | ||
8137 | { .klen = 32, .blen = 16, }, | ||
8138 | { .klen = 32, .blen = 64, }, | ||
8139 | { .klen = 32, .blen = 256, }, | ||
8140 | { .klen = 32, .blen = 1024, }, | ||
8141 | { .klen = 32, .blen = 8192, }, | ||
8142 | |||
8143 | /* End marker */ | ||
8144 | { .klen = 0, .blen = 0, } | ||
8145 | }; | ||
8146 | |||
8147 | static struct cipher_speed des_speed_template[] = { | ||
8148 | { .klen = 8, .blen = 16, }, | ||
8149 | { .klen = 8, .blen = 64, }, | ||
8150 | { .klen = 8, .blen = 256, }, | ||
8151 | { .klen = 8, .blen = 1024, }, | ||
8152 | { .klen = 8, .blen = 8192, }, | ||
8153 | |||
8154 | /* End marker */ | ||
8155 | { .klen = 0, .blen = 0, } | ||
8156 | }; | ||
8157 | 8243 | ||
8158 | /* | 8244 | /* |
8159 | * Digest speed tests | 8245 | * Digest speed tests |
8160 | */ | 8246 | */ |
8161 | static struct hash_speed generic_hash_speed_template[] = { | 8247 | static struct hash_speed generic_hash_speed_template[] = { |
8162 | { .blen = 16, .plen = 16, }, | 8248 | { .blen = 16, .plen = 16, }, |
8163 | { .blen = 64, .plen = 16, }, | 8249 | { .blen = 64, .plen = 16, }, |
8164 | { .blen = 64, .plen = 64, }, | 8250 | { .blen = 64, .plen = 64, }, |
8165 | { .blen = 256, .plen = 16, }, | 8251 | { .blen = 256, .plen = 16, }, |
@@ -8186,41 +8272,4 @@ static struct hash_speed generic_hash_speed_template[] = { | |||
8186 | { .blen = 0, .plen = 0, } | 8272 | { .blen = 0, .plen = 0, } |
8187 | }; | 8273 | }; |
8188 | 8274 | ||
8189 | static struct cipher_speed camellia_speed_template[] = { | ||
8190 | { .klen = 16, .blen = 16, }, | ||
8191 | { .klen = 16, .blen = 64, }, | ||
8192 | { .klen = 16, .blen = 256, }, | ||
8193 | { .klen = 16, .blen = 1024, }, | ||
8194 | { .klen = 16, .blen = 8192, }, | ||
8195 | { .klen = 24, .blen = 16, }, | ||
8196 | { .klen = 24, .blen = 64, }, | ||
8197 | { .klen = 24, .blen = 256, }, | ||
8198 | { .klen = 24, .blen = 1024, }, | ||
8199 | { .klen = 24, .blen = 8192, }, | ||
8200 | { .klen = 32, .blen = 16, }, | ||
8201 | { .klen = 32, .blen = 64, }, | ||
8202 | { .klen = 32, .blen = 256, }, | ||
8203 | { .klen = 32, .blen = 1024, }, | ||
8204 | { .klen = 32, .blen = 8192, }, | ||
8205 | |||
8206 | /* End marker */ | ||
8207 | { .klen = 0, .blen = 0, } | ||
8208 | }; | ||
8209 | |||
8210 | static struct cipher_speed salsa20_speed_template[] = { | ||
8211 | { .klen = 16, .blen = 16, }, | ||
8212 | { .klen = 16, .blen = 64, }, | ||
8213 | { .klen = 16, .blen = 256, }, | ||
8214 | { .klen = 16, .blen = 1024, }, | ||
8215 | { .klen = 16, .blen = 8192, }, | ||
8216 | { .klen = 32, .blen = 16, }, | ||
8217 | { .klen = 32, .blen = 64, }, | ||
8218 | { .klen = 32, .blen = 256, }, | ||
8219 | { .klen = 32, .blen = 1024, }, | ||
8220 | { .klen = 32, .blen = 8192, }, | ||
8221 | |||
8222 | /* End marker */ | ||
8223 | { .klen = 0, .blen = 0, } | ||
8224 | }; | ||
8225 | |||
8226 | #endif /* _CRYPTO_TCRYPT_H */ | 8275 | #endif /* _CRYPTO_TCRYPT_H */ |
diff --git a/crypto/tea.c b/crypto/tea.c index 6893b3fdf9d6..412bc74f8179 100644 --- a/crypto/tea.c +++ b/crypto/tea.c | |||
@@ -267,7 +267,7 @@ static struct crypto_alg xeta_alg = { | |||
267 | .cia_decrypt = xeta_decrypt } } | 267 | .cia_decrypt = xeta_decrypt } } |
268 | }; | 268 | }; |
269 | 269 | ||
270 | static int __init init(void) | 270 | static int __init tea_mod_init(void) |
271 | { | 271 | { |
272 | int ret = 0; | 272 | int ret = 0; |
273 | 273 | ||
@@ -292,7 +292,7 @@ out: | |||
292 | return ret; | 292 | return ret; |
293 | } | 293 | } |
294 | 294 | ||
295 | static void __exit fini(void) | 295 | static void __exit tea_mod_fini(void) |
296 | { | 296 | { |
297 | crypto_unregister_alg(&tea_alg); | 297 | crypto_unregister_alg(&tea_alg); |
298 | crypto_unregister_alg(&xtea_alg); | 298 | crypto_unregister_alg(&xtea_alg); |
@@ -302,8 +302,8 @@ static void __exit fini(void) | |||
302 | MODULE_ALIAS("xtea"); | 302 | MODULE_ALIAS("xtea"); |
303 | MODULE_ALIAS("xeta"); | 303 | MODULE_ALIAS("xeta"); |
304 | 304 | ||
305 | module_init(init); | 305 | module_init(tea_mod_init); |
306 | module_exit(fini); | 306 | module_exit(tea_mod_fini); |
307 | 307 | ||
308 | MODULE_LICENSE("GPL"); | 308 | MODULE_LICENSE("GPL"); |
309 | MODULE_DESCRIPTION("TEA, XTEA & XETA Cryptographic Algorithms"); | 309 | MODULE_DESCRIPTION("TEA, XTEA & XETA Cryptographic Algorithms"); |
diff --git a/crypto/tgr192.c b/crypto/tgr192.c index 2e7ea1680c7f..a92414f24beb 100644 --- a/crypto/tgr192.c +++ b/crypto/tgr192.c | |||
@@ -663,7 +663,7 @@ static struct crypto_alg tgr128 = { | |||
663 | .dia_final = tgr128_final}} | 663 | .dia_final = tgr128_final}} |
664 | }; | 664 | }; |
665 | 665 | ||
666 | static int __init init(void) | 666 | static int __init tgr192_mod_init(void) |
667 | { | 667 | { |
668 | int ret = 0; | 668 | int ret = 0; |
669 | 669 | ||
@@ -688,7 +688,7 @@ static int __init init(void) | |||
688 | return ret; | 688 | return ret; |
689 | } | 689 | } |
690 | 690 | ||
691 | static void __exit fini(void) | 691 | static void __exit tgr192_mod_fini(void) |
692 | { | 692 | { |
693 | crypto_unregister_alg(&tgr192); | 693 | crypto_unregister_alg(&tgr192); |
694 | crypto_unregister_alg(&tgr160); | 694 | crypto_unregister_alg(&tgr160); |
@@ -698,8 +698,8 @@ static void __exit fini(void) | |||
698 | MODULE_ALIAS("tgr160"); | 698 | MODULE_ALIAS("tgr160"); |
699 | MODULE_ALIAS("tgr128"); | 699 | MODULE_ALIAS("tgr128"); |
700 | 700 | ||
701 | module_init(init); | 701 | module_init(tgr192_mod_init); |
702 | module_exit(fini); | 702 | module_exit(tgr192_mod_fini); |
703 | 703 | ||
704 | MODULE_LICENSE("GPL"); | 704 | MODULE_LICENSE("GPL"); |
705 | MODULE_DESCRIPTION("Tiger Message Digest Algorithm"); | 705 | MODULE_DESCRIPTION("Tiger Message Digest Algorithm"); |
diff --git a/crypto/twofish.c b/crypto/twofish.c index 4979a2be48a9..dfcda231f87a 100644 --- a/crypto/twofish.c +++ b/crypto/twofish.c | |||
@@ -197,18 +197,18 @@ static struct crypto_alg alg = { | |||
197 | .cia_decrypt = twofish_decrypt } } | 197 | .cia_decrypt = twofish_decrypt } } |
198 | }; | 198 | }; |
199 | 199 | ||
200 | static int __init init(void) | 200 | static int __init twofish_mod_init(void) |
201 | { | 201 | { |
202 | return crypto_register_alg(&alg); | 202 | return crypto_register_alg(&alg); |
203 | } | 203 | } |
204 | 204 | ||
205 | static void __exit fini(void) | 205 | static void __exit twofish_mod_fini(void) |
206 | { | 206 | { |
207 | crypto_unregister_alg(&alg); | 207 | crypto_unregister_alg(&alg); |
208 | } | 208 | } |
209 | 209 | ||
210 | module_init(init); | 210 | module_init(twofish_mod_init); |
211 | module_exit(fini); | 211 | module_exit(twofish_mod_fini); |
212 | 212 | ||
213 | MODULE_LICENSE("GPL"); | 213 | MODULE_LICENSE("GPL"); |
214 | MODULE_DESCRIPTION ("Twofish Cipher Algorithm"); | 214 | MODULE_DESCRIPTION ("Twofish Cipher Algorithm"); |
diff --git a/crypto/wp512.c b/crypto/wp512.c index f746952b93fc..bff28560d66d 100644 --- a/crypto/wp512.c +++ b/crypto/wp512.c | |||
@@ -1146,7 +1146,7 @@ static struct crypto_alg wp256 = { | |||
1146 | .dia_final = wp256_final } } | 1146 | .dia_final = wp256_final } } |
1147 | }; | 1147 | }; |
1148 | 1148 | ||
1149 | static int __init init(void) | 1149 | static int __init wp512_mod_init(void) |
1150 | { | 1150 | { |
1151 | int ret = 0; | 1151 | int ret = 0; |
1152 | 1152 | ||
@@ -1172,7 +1172,7 @@ out: | |||
1172 | return ret; | 1172 | return ret; |
1173 | } | 1173 | } |
1174 | 1174 | ||
1175 | static void __exit fini(void) | 1175 | static void __exit wp512_mod_fini(void) |
1176 | { | 1176 | { |
1177 | crypto_unregister_alg(&wp512); | 1177 | crypto_unregister_alg(&wp512); |
1178 | crypto_unregister_alg(&wp384); | 1178 | crypto_unregister_alg(&wp384); |
@@ -1182,8 +1182,8 @@ static void __exit fini(void) | |||
1182 | MODULE_ALIAS("wp384"); | 1182 | MODULE_ALIAS("wp384"); |
1183 | MODULE_ALIAS("wp256"); | 1183 | MODULE_ALIAS("wp256"); |
1184 | 1184 | ||
1185 | module_init(init); | 1185 | module_init(wp512_mod_init); |
1186 | module_exit(fini); | 1186 | module_exit(wp512_mod_fini); |
1187 | 1187 | ||
1188 | MODULE_LICENSE("GPL"); | 1188 | MODULE_LICENSE("GPL"); |
1189 | MODULE_DESCRIPTION("Whirlpool Message Digest Algorithm"); | 1189 | MODULE_DESCRIPTION("Whirlpool Message Digest Algorithm"); |
diff --git a/drivers/char/hw_random/omap-rng.c b/drivers/char/hw_random/omap-rng.c index 7e319951fa41..51738bdd834e 100644 --- a/drivers/char/hw_random/omap-rng.c +++ b/drivers/char/hw_random/omap-rng.c | |||
@@ -1,7 +1,5 @@ | |||
1 | /* | 1 | /* |
2 | * drivers/char/hw_random/omap-rng.c | 2 | * omap-rng.c - RNG driver for TI OMAP CPU family |
3 | * | ||
4 | * RNG driver for TI OMAP CPU family | ||
5 | * | 3 | * |
6 | * Author: Deepak Saxena <dsaxena@plexity.net> | 4 | * Author: Deepak Saxena <dsaxena@plexity.net> |
7 | * | 5 | * |
@@ -15,11 +13,6 @@ | |||
15 | * This file is licensed under the terms of the GNU General Public | 13 | * This file is licensed under the terms of the GNU General Public |
16 | * License version 2. This program is licensed "as is" without any | 14 | * License version 2. This program is licensed "as is" without any |
17 | * warranty of any kind, whether express or implied. | 15 | * warranty of any kind, whether express or implied. |
18 | * | ||
19 | * TODO: | ||
20 | * | ||
21 | * - Make status updated be interrupt driven so we don't poll | ||
22 | * | ||
23 | */ | 16 | */ |
24 | 17 | ||
25 | #include <linux/module.h> | 18 | #include <linux/module.h> |
@@ -55,17 +48,16 @@ static void __iomem *rng_base; | |||
55 | static struct clk *rng_ick; | 48 | static struct clk *rng_ick; |
56 | static struct platform_device *rng_dev; | 49 | static struct platform_device *rng_dev; |
57 | 50 | ||
58 | static u32 omap_rng_read_reg(int reg) | 51 | static inline u32 omap_rng_read_reg(int reg) |
59 | { | 52 | { |
60 | return __raw_readl(rng_base + reg); | 53 | return __raw_readl(rng_base + reg); |
61 | } | 54 | } |
62 | 55 | ||
63 | static void omap_rng_write_reg(int reg, u32 val) | 56 | static inline void omap_rng_write_reg(int reg, u32 val) |
64 | { | 57 | { |
65 | __raw_writel(val, rng_base + reg); | 58 | __raw_writel(val, rng_base + reg); |
66 | } | 59 | } |
67 | 60 | ||
68 | /* REVISIT: Does the status bit really work on 16xx? */ | ||
69 | static int omap_rng_data_present(struct hwrng *rng, int wait) | 61 | static int omap_rng_data_present(struct hwrng *rng, int wait) |
70 | { | 62 | { |
71 | int data, i; | 63 | int data, i; |
@@ -74,6 +66,11 @@ static int omap_rng_data_present(struct hwrng *rng, int wait) | |||
74 | data = omap_rng_read_reg(RNG_STAT_REG) ? 0 : 1; | 66 | data = omap_rng_read_reg(RNG_STAT_REG) ? 0 : 1; |
75 | if (data || !wait) | 67 | if (data || !wait) |
76 | break; | 68 | break; |
69 | /* RNG produces data fast enough (2+ MBit/sec, even | ||
70 | * during "rngtest" loads, that these delays don't | ||
71 | * seem to trigger. We *could* use the RNG IRQ, but | ||
72 | * that'd be higher overhead ... so why bother? | ||
73 | */ | ||
77 | udelay(10); | 74 | udelay(10); |
78 | } | 75 | } |
79 | return data; | 76 | return data; |
@@ -101,7 +98,8 @@ static int __init omap_rng_probe(struct platform_device *pdev) | |||
101 | * A bit ugly, and it will never actually happen but there can | 98 | * A bit ugly, and it will never actually happen but there can |
102 | * be only one RNG and this catches any bork | 99 | * be only one RNG and this catches any bork |
103 | */ | 100 | */ |
104 | BUG_ON(rng_dev); | 101 | if (rng_dev) |
102 | return -EBUSY; | ||
105 | 103 | ||
106 | if (cpu_is_omap24xx()) { | 104 | if (cpu_is_omap24xx()) { |
107 | rng_ick = clk_get(NULL, "rng_ick"); | 105 | rng_ick = clk_get(NULL, "rng_ick"); |
@@ -124,7 +122,7 @@ static int __init omap_rng_probe(struct platform_device *pdev) | |||
124 | return -EBUSY; | 122 | return -EBUSY; |
125 | 123 | ||
126 | dev_set_drvdata(&pdev->dev, mem); | 124 | dev_set_drvdata(&pdev->dev, mem); |
127 | rng_base = (u32 __iomem *)io_p2v(res->start); | 125 | rng_base = (u32 __force __iomem *)io_p2v(res->start); |
128 | 126 | ||
129 | ret = hwrng_register(&omap_rng_ops); | 127 | ret = hwrng_register(&omap_rng_ops); |
130 | if (ret) { | 128 | if (ret) { |
@@ -182,6 +180,8 @@ static int omap_rng_resume(struct platform_device *pdev) | |||
182 | 180 | ||
183 | #endif | 181 | #endif |
184 | 182 | ||
183 | /* work with hotplug and coldplug */ | ||
184 | MODULE_ALIAS("platform:omap_rng"); | ||
185 | 185 | ||
186 | static struct platform_driver omap_rng_driver = { | 186 | static struct platform_driver omap_rng_driver = { |
187 | .driver = { | 187 | .driver = { |
diff --git a/drivers/crypto/Kconfig b/drivers/crypto/Kconfig index 6d2f0c8d419a..43b71b69daa5 100644 --- a/drivers/crypto/Kconfig +++ b/drivers/crypto/Kconfig | |||
@@ -27,6 +27,7 @@ config CRYPTO_DEV_PADLOCK_AES | |||
27 | tristate "PadLock driver for AES algorithm" | 27 | tristate "PadLock driver for AES algorithm" |
28 | depends on CRYPTO_DEV_PADLOCK | 28 | depends on CRYPTO_DEV_PADLOCK |
29 | select CRYPTO_BLKCIPHER | 29 | select CRYPTO_BLKCIPHER |
30 | select CRYPTO_AES | ||
30 | help | 31 | help |
31 | Use VIA PadLock for AES algorithm. | 32 | Use VIA PadLock for AES algorithm. |
32 | 33 | ||
@@ -101,6 +102,19 @@ config CRYPTO_SHA256_S390 | |||
101 | This version of SHA implements a 256 bit hash with 128 bits of | 102 | This version of SHA implements a 256 bit hash with 128 bits of |
102 | security against collision attacks. | 103 | security against collision attacks. |
103 | 104 | ||
105 | config CRYPTO_SHA512_S390 | ||
106 | tristate "SHA384 and SHA512 digest algorithm" | ||
107 | depends on S390 | ||
108 | select CRYPTO_ALGAPI | ||
109 | help | ||
110 | This is the s390 hardware accelerated implementation of the | ||
111 | SHA512 secure hash standard. | ||
112 | |||
113 | This version of SHA implements a 512 bit hash with 256 bits of | ||
114 | security against collision attacks. The code also includes SHA-384, | ||
115 | a 384 bit hash with 192 bits of security against collision attacks. | ||
116 | |||
117 | |||
104 | config CRYPTO_DES_S390 | 118 | config CRYPTO_DES_S390 |
105 | tristate "DES and Triple DES cipher algorithms" | 119 | tristate "DES and Triple DES cipher algorithms" |
106 | depends on S390 | 120 | depends on S390 |
diff --git a/drivers/crypto/padlock-aes.c b/drivers/crypto/padlock-aes.c index 2f3ad3f7dfea..bb30eb9b93ef 100644 --- a/drivers/crypto/padlock-aes.c +++ b/drivers/crypto/padlock-aes.c | |||
@@ -5,42 +5,6 @@ | |||
5 | * | 5 | * |
6 | * Copyright (c) 2004 Michal Ludvig <michal@logix.cz> | 6 | * Copyright (c) 2004 Michal Ludvig <michal@logix.cz> |
7 | * | 7 | * |
8 | * Key expansion routine taken from crypto/aes_generic.c | ||
9 | * | ||
10 | * This program is free software; you can redistribute it and/or modify | ||
11 | * it under the terms of the GNU General Public License as published by | ||
12 | * the Free Software Foundation; either version 2 of the License, or | ||
13 | * (at your option) any later version. | ||
14 | * | ||
15 | * --------------------------------------------------------------------------- | ||
16 | * Copyright (c) 2002, Dr Brian Gladman <brg@gladman.me.uk>, Worcester, UK. | ||
17 | * All rights reserved. | ||
18 | * | ||
19 | * LICENSE TERMS | ||
20 | * | ||
21 | * The free distribution and use of this software in both source and binary | ||
22 | * form is allowed (with or without changes) provided that: | ||
23 | * | ||
24 | * 1. distributions of this source code include the above copyright | ||
25 | * notice, this list of conditions and the following disclaimer; | ||
26 | * | ||
27 | * 2. distributions in binary form include the above copyright | ||
28 | * notice, this list of conditions and the following disclaimer | ||
29 | * in the documentation and/or other associated materials; | ||
30 | * | ||
31 | * 3. the copyright holder's name is not used to endorse products | ||
32 | * built using this software without specific written permission. | ||
33 | * | ||
34 | * ALTERNATIVELY, provided that this notice is retained in full, this product | ||
35 | * may be distributed under the terms of the GNU General Public License (GPL), | ||
36 | * in which case the provisions of the GPL apply INSTEAD OF those given above. | ||
37 | * | ||
38 | * DISCLAIMER | ||
39 | * | ||
40 | * This software is provided 'as is' with no explicit or implied warranties | ||
41 | * in respect of its properties, including, but not limited to, correctness | ||
42 | * and/or fitness for purpose. | ||
43 | * --------------------------------------------------------------------------- | ||
44 | */ | 8 | */ |
45 | 9 | ||
46 | #include <crypto/algapi.h> | 10 | #include <crypto/algapi.h> |
@@ -54,9 +18,6 @@ | |||
54 | #include <asm/byteorder.h> | 18 | #include <asm/byteorder.h> |
55 | #include "padlock.h" | 19 | #include "padlock.h" |
56 | 20 | ||
57 | #define AES_EXTENDED_KEY_SIZE 64 /* in uint32_t units */ | ||
58 | #define AES_EXTENDED_KEY_SIZE_B (AES_EXTENDED_KEY_SIZE * sizeof(uint32_t)) | ||
59 | |||
60 | /* Control word. */ | 21 | /* Control word. */ |
61 | struct cword { | 22 | struct cword { |
62 | unsigned int __attribute__ ((__packed__)) | 23 | unsigned int __attribute__ ((__packed__)) |
@@ -70,218 +31,23 @@ struct cword { | |||
70 | 31 | ||
71 | /* Whenever making any changes to the following | 32 | /* Whenever making any changes to the following |
72 | * structure *make sure* you keep E, d_data | 33 | * structure *make sure* you keep E, d_data |
73 | * and cword aligned on 16 Bytes boundaries!!! */ | 34 | * and cword aligned on 16 Bytes boundaries and |
35 | * the Hardware can access 16 * 16 bytes of E and d_data | ||
36 | * (only the first 15 * 16 bytes matter but the HW reads | ||
37 | * more). | ||
38 | */ | ||
74 | struct aes_ctx { | 39 | struct aes_ctx { |
40 | u32 E[AES_MAX_KEYLENGTH_U32] | ||
41 | __attribute__ ((__aligned__(PADLOCK_ALIGNMENT))); | ||
42 | u32 d_data[AES_MAX_KEYLENGTH_U32] | ||
43 | __attribute__ ((__aligned__(PADLOCK_ALIGNMENT))); | ||
75 | struct { | 44 | struct { |
76 | struct cword encrypt; | 45 | struct cword encrypt; |
77 | struct cword decrypt; | 46 | struct cword decrypt; |
78 | } cword; | 47 | } cword; |
79 | u32 *D; | 48 | u32 *D; |
80 | int key_length; | ||
81 | u32 E[AES_EXTENDED_KEY_SIZE] | ||
82 | __attribute__ ((__aligned__(PADLOCK_ALIGNMENT))); | ||
83 | u32 d_data[AES_EXTENDED_KEY_SIZE] | ||
84 | __attribute__ ((__aligned__(PADLOCK_ALIGNMENT))); | ||
85 | }; | 49 | }; |
86 | 50 | ||
87 | /* ====== Key management routines ====== */ | ||
88 | |||
89 | static inline uint32_t | ||
90 | generic_rotr32 (const uint32_t x, const unsigned bits) | ||
91 | { | ||
92 | const unsigned n = bits % 32; | ||
93 | return (x >> n) | (x << (32 - n)); | ||
94 | } | ||
95 | |||
96 | static inline uint32_t | ||
97 | generic_rotl32 (const uint32_t x, const unsigned bits) | ||
98 | { | ||
99 | const unsigned n = bits % 32; | ||
100 | return (x << n) | (x >> (32 - n)); | ||
101 | } | ||
102 | |||
103 | #define rotl generic_rotl32 | ||
104 | #define rotr generic_rotr32 | ||
105 | |||
106 | /* | ||
107 | * #define byte(x, nr) ((unsigned char)((x) >> (nr*8))) | ||
108 | */ | ||
109 | static inline uint8_t | ||
110 | byte(const uint32_t x, const unsigned n) | ||
111 | { | ||
112 | return x >> (n << 3); | ||
113 | } | ||
114 | |||
115 | #define E_KEY ctx->E | ||
116 | #define D_KEY ctx->D | ||
117 | |||
118 | static uint8_t pow_tab[256]; | ||
119 | static uint8_t log_tab[256]; | ||
120 | static uint8_t sbx_tab[256]; | ||
121 | static uint8_t isb_tab[256]; | ||
122 | static uint32_t rco_tab[10]; | ||
123 | static uint32_t ft_tab[4][256]; | ||
124 | static uint32_t it_tab[4][256]; | ||
125 | |||
126 | static uint32_t fl_tab[4][256]; | ||
127 | static uint32_t il_tab[4][256]; | ||
128 | |||
129 | static inline uint8_t | ||
130 | f_mult (uint8_t a, uint8_t b) | ||
131 | { | ||
132 | uint8_t aa = log_tab[a], cc = aa + log_tab[b]; | ||
133 | |||
134 | return pow_tab[cc + (cc < aa ? 1 : 0)]; | ||
135 | } | ||
136 | |||
137 | #define ff_mult(a,b) (a && b ? f_mult(a, b) : 0) | ||
138 | |||
139 | #define f_rn(bo, bi, n, k) \ | ||
140 | bo[n] = ft_tab[0][byte(bi[n],0)] ^ \ | ||
141 | ft_tab[1][byte(bi[(n + 1) & 3],1)] ^ \ | ||
142 | ft_tab[2][byte(bi[(n + 2) & 3],2)] ^ \ | ||
143 | ft_tab[3][byte(bi[(n + 3) & 3],3)] ^ *(k + n) | ||
144 | |||
145 | #define i_rn(bo, bi, n, k) \ | ||
146 | bo[n] = it_tab[0][byte(bi[n],0)] ^ \ | ||
147 | it_tab[1][byte(bi[(n + 3) & 3],1)] ^ \ | ||
148 | it_tab[2][byte(bi[(n + 2) & 3],2)] ^ \ | ||
149 | it_tab[3][byte(bi[(n + 1) & 3],3)] ^ *(k + n) | ||
150 | |||
151 | #define ls_box(x) \ | ||
152 | ( fl_tab[0][byte(x, 0)] ^ \ | ||
153 | fl_tab[1][byte(x, 1)] ^ \ | ||
154 | fl_tab[2][byte(x, 2)] ^ \ | ||
155 | fl_tab[3][byte(x, 3)] ) | ||
156 | |||
157 | #define f_rl(bo, bi, n, k) \ | ||
158 | bo[n] = fl_tab[0][byte(bi[n],0)] ^ \ | ||
159 | fl_tab[1][byte(bi[(n + 1) & 3],1)] ^ \ | ||
160 | fl_tab[2][byte(bi[(n + 2) & 3],2)] ^ \ | ||
161 | fl_tab[3][byte(bi[(n + 3) & 3],3)] ^ *(k + n) | ||
162 | |||
163 | #define i_rl(bo, bi, n, k) \ | ||
164 | bo[n] = il_tab[0][byte(bi[n],0)] ^ \ | ||
165 | il_tab[1][byte(bi[(n + 3) & 3],1)] ^ \ | ||
166 | il_tab[2][byte(bi[(n + 2) & 3],2)] ^ \ | ||
167 | il_tab[3][byte(bi[(n + 1) & 3],3)] ^ *(k + n) | ||
168 | |||
169 | static void | ||
170 | gen_tabs (void) | ||
171 | { | ||
172 | uint32_t i, t; | ||
173 | uint8_t p, q; | ||
174 | |||
175 | /* log and power tables for GF(2**8) finite field with | ||
176 | 0x011b as modular polynomial - the simplest prmitive | ||
177 | root is 0x03, used here to generate the tables */ | ||
178 | |||
179 | for (i = 0, p = 1; i < 256; ++i) { | ||
180 | pow_tab[i] = (uint8_t) p; | ||
181 | log_tab[p] = (uint8_t) i; | ||
182 | |||
183 | p ^= (p << 1) ^ (p & 0x80 ? 0x01b : 0); | ||
184 | } | ||
185 | |||
186 | log_tab[1] = 0; | ||
187 | |||
188 | for (i = 0, p = 1; i < 10; ++i) { | ||
189 | rco_tab[i] = p; | ||
190 | |||
191 | p = (p << 1) ^ (p & 0x80 ? 0x01b : 0); | ||
192 | } | ||
193 | |||
194 | for (i = 0; i < 256; ++i) { | ||
195 | p = (i ? pow_tab[255 - log_tab[i]] : 0); | ||
196 | q = ((p >> 7) | (p << 1)) ^ ((p >> 6) | (p << 2)); | ||
197 | p ^= 0x63 ^ q ^ ((q >> 6) | (q << 2)); | ||
198 | sbx_tab[i] = p; | ||
199 | isb_tab[p] = (uint8_t) i; | ||
200 | } | ||
201 | |||
202 | for (i = 0; i < 256; ++i) { | ||
203 | p = sbx_tab[i]; | ||
204 | |||
205 | t = p; | ||
206 | fl_tab[0][i] = t; | ||
207 | fl_tab[1][i] = rotl (t, 8); | ||
208 | fl_tab[2][i] = rotl (t, 16); | ||
209 | fl_tab[3][i] = rotl (t, 24); | ||
210 | |||
211 | t = ((uint32_t) ff_mult (2, p)) | | ||
212 | ((uint32_t) p << 8) | | ||
213 | ((uint32_t) p << 16) | ((uint32_t) ff_mult (3, p) << 24); | ||
214 | |||
215 | ft_tab[0][i] = t; | ||
216 | ft_tab[1][i] = rotl (t, 8); | ||
217 | ft_tab[2][i] = rotl (t, 16); | ||
218 | ft_tab[3][i] = rotl (t, 24); | ||
219 | |||
220 | p = isb_tab[i]; | ||
221 | |||
222 | t = p; | ||
223 | il_tab[0][i] = t; | ||
224 | il_tab[1][i] = rotl (t, 8); | ||
225 | il_tab[2][i] = rotl (t, 16); | ||
226 | il_tab[3][i] = rotl (t, 24); | ||
227 | |||
228 | t = ((uint32_t) ff_mult (14, p)) | | ||
229 | ((uint32_t) ff_mult (9, p) << 8) | | ||
230 | ((uint32_t) ff_mult (13, p) << 16) | | ||
231 | ((uint32_t) ff_mult (11, p) << 24); | ||
232 | |||
233 | it_tab[0][i] = t; | ||
234 | it_tab[1][i] = rotl (t, 8); | ||
235 | it_tab[2][i] = rotl (t, 16); | ||
236 | it_tab[3][i] = rotl (t, 24); | ||
237 | } | ||
238 | } | ||
239 | |||
240 | #define star_x(x) (((x) & 0x7f7f7f7f) << 1) ^ ((((x) & 0x80808080) >> 7) * 0x1b) | ||
241 | |||
242 | #define imix_col(y,x) \ | ||
243 | u = star_x(x); \ | ||
244 | v = star_x(u); \ | ||
245 | w = star_x(v); \ | ||
246 | t = w ^ (x); \ | ||
247 | (y) = u ^ v ^ w; \ | ||
248 | (y) ^= rotr(u ^ t, 8) ^ \ | ||
249 | rotr(v ^ t, 16) ^ \ | ||
250 | rotr(t,24) | ||
251 | |||
252 | /* initialise the key schedule from the user supplied key */ | ||
253 | |||
254 | #define loop4(i) \ | ||
255 | { t = rotr(t, 8); t = ls_box(t) ^ rco_tab[i]; \ | ||
256 | t ^= E_KEY[4 * i]; E_KEY[4 * i + 4] = t; \ | ||
257 | t ^= E_KEY[4 * i + 1]; E_KEY[4 * i + 5] = t; \ | ||
258 | t ^= E_KEY[4 * i + 2]; E_KEY[4 * i + 6] = t; \ | ||
259 | t ^= E_KEY[4 * i + 3]; E_KEY[4 * i + 7] = t; \ | ||
260 | } | ||
261 | |||
262 | #define loop6(i) \ | ||
263 | { t = rotr(t, 8); t = ls_box(t) ^ rco_tab[i]; \ | ||
264 | t ^= E_KEY[6 * i]; E_KEY[6 * i + 6] = t; \ | ||
265 | t ^= E_KEY[6 * i + 1]; E_KEY[6 * i + 7] = t; \ | ||
266 | t ^= E_KEY[6 * i + 2]; E_KEY[6 * i + 8] = t; \ | ||
267 | t ^= E_KEY[6 * i + 3]; E_KEY[6 * i + 9] = t; \ | ||
268 | t ^= E_KEY[6 * i + 4]; E_KEY[6 * i + 10] = t; \ | ||
269 | t ^= E_KEY[6 * i + 5]; E_KEY[6 * i + 11] = t; \ | ||
270 | } | ||
271 | |||
272 | #define loop8(i) \ | ||
273 | { t = rotr(t, 8); ; t = ls_box(t) ^ rco_tab[i]; \ | ||
274 | t ^= E_KEY[8 * i]; E_KEY[8 * i + 8] = t; \ | ||
275 | t ^= E_KEY[8 * i + 1]; E_KEY[8 * i + 9] = t; \ | ||
276 | t ^= E_KEY[8 * i + 2]; E_KEY[8 * i + 10] = t; \ | ||
277 | t ^= E_KEY[8 * i + 3]; E_KEY[8 * i + 11] = t; \ | ||
278 | t = E_KEY[8 * i + 4] ^ ls_box(t); \ | ||
279 | E_KEY[8 * i + 12] = t; \ | ||
280 | t ^= E_KEY[8 * i + 5]; E_KEY[8 * i + 13] = t; \ | ||
281 | t ^= E_KEY[8 * i + 6]; E_KEY[8 * i + 14] = t; \ | ||
282 | t ^= E_KEY[8 * i + 7]; E_KEY[8 * i + 15] = t; \ | ||
283 | } | ||
284 | |||
285 | /* Tells whether the ACE is capable to generate | 51 | /* Tells whether the ACE is capable to generate |
286 | the extended key for a given key_len. */ | 52 | the extended key for a given key_len. */ |
287 | static inline int | 53 | static inline int |
@@ -321,17 +87,13 @@ static int aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, | |||
321 | struct aes_ctx *ctx = aes_ctx(tfm); | 87 | struct aes_ctx *ctx = aes_ctx(tfm); |
322 | const __le32 *key = (const __le32 *)in_key; | 88 | const __le32 *key = (const __le32 *)in_key; |
323 | u32 *flags = &tfm->crt_flags; | 89 | u32 *flags = &tfm->crt_flags; |
324 | uint32_t i, t, u, v, w; | 90 | struct crypto_aes_ctx gen_aes; |
325 | uint32_t P[AES_EXTENDED_KEY_SIZE]; | ||
326 | uint32_t rounds; | ||
327 | 91 | ||
328 | if (key_len % 8) { | 92 | if (key_len % 8) { |
329 | *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN; | 93 | *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN; |
330 | return -EINVAL; | 94 | return -EINVAL; |
331 | } | 95 | } |
332 | 96 | ||
333 | ctx->key_length = key_len; | ||
334 | |||
335 | /* | 97 | /* |
336 | * If the hardware is capable of generating the extended key | 98 | * If the hardware is capable of generating the extended key |
337 | * itself we must supply the plain key for both encryption | 99 | * itself we must supply the plain key for both encryption |
@@ -339,10 +101,10 @@ static int aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, | |||
339 | */ | 101 | */ |
340 | ctx->D = ctx->E; | 102 | ctx->D = ctx->E; |
341 | 103 | ||
342 | E_KEY[0] = le32_to_cpu(key[0]); | 104 | ctx->E[0] = le32_to_cpu(key[0]); |
343 | E_KEY[1] = le32_to_cpu(key[1]); | 105 | ctx->E[1] = le32_to_cpu(key[1]); |
344 | E_KEY[2] = le32_to_cpu(key[2]); | 106 | ctx->E[2] = le32_to_cpu(key[2]); |
345 | E_KEY[3] = le32_to_cpu(key[3]); | 107 | ctx->E[3] = le32_to_cpu(key[3]); |
346 | 108 | ||
347 | /* Prepare control words. */ | 109 | /* Prepare control words. */ |
348 | memset(&ctx->cword, 0, sizeof(ctx->cword)); | 110 | memset(&ctx->cword, 0, sizeof(ctx->cword)); |
@@ -361,56 +123,13 @@ static int aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, | |||
361 | ctx->cword.encrypt.keygen = 1; | 123 | ctx->cword.encrypt.keygen = 1; |
362 | ctx->cword.decrypt.keygen = 1; | 124 | ctx->cword.decrypt.keygen = 1; |
363 | 125 | ||
364 | switch (key_len) { | 126 | if (crypto_aes_expand_key(&gen_aes, in_key, key_len)) { |
365 | case 16: | 127 | *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN; |
366 | t = E_KEY[3]; | 128 | return -EINVAL; |
367 | for (i = 0; i < 10; ++i) | ||
368 | loop4 (i); | ||
369 | break; | ||
370 | |||
371 | case 24: | ||
372 | E_KEY[4] = le32_to_cpu(key[4]); | ||
373 | t = E_KEY[5] = le32_to_cpu(key[5]); | ||
374 | for (i = 0; i < 8; ++i) | ||
375 | loop6 (i); | ||
376 | break; | ||
377 | |||
378 | case 32: | ||
379 | E_KEY[4] = le32_to_cpu(key[4]); | ||
380 | E_KEY[5] = le32_to_cpu(key[5]); | ||
381 | E_KEY[6] = le32_to_cpu(key[6]); | ||
382 | t = E_KEY[7] = le32_to_cpu(key[7]); | ||
383 | for (i = 0; i < 7; ++i) | ||
384 | loop8 (i); | ||
385 | break; | ||
386 | } | ||
387 | |||
388 | D_KEY[0] = E_KEY[0]; | ||
389 | D_KEY[1] = E_KEY[1]; | ||
390 | D_KEY[2] = E_KEY[2]; | ||
391 | D_KEY[3] = E_KEY[3]; | ||
392 | |||
393 | for (i = 4; i < key_len + 24; ++i) { | ||
394 | imix_col (D_KEY[i], E_KEY[i]); | ||
395 | } | ||
396 | |||
397 | /* PadLock needs a different format of the decryption key. */ | ||
398 | rounds = 10 + (key_len - 16) / 4; | ||
399 | |||
400 | for (i = 0; i < rounds; i++) { | ||
401 | P[((i + 1) * 4) + 0] = D_KEY[((rounds - i - 1) * 4) + 0]; | ||
402 | P[((i + 1) * 4) + 1] = D_KEY[((rounds - i - 1) * 4) + 1]; | ||
403 | P[((i + 1) * 4) + 2] = D_KEY[((rounds - i - 1) * 4) + 2]; | ||
404 | P[((i + 1) * 4) + 3] = D_KEY[((rounds - i - 1) * 4) + 3]; | ||
405 | } | 129 | } |
406 | 130 | ||
407 | P[0] = E_KEY[(rounds * 4) + 0]; | 131 | memcpy(ctx->E, gen_aes.key_enc, AES_MAX_KEYLENGTH); |
408 | P[1] = E_KEY[(rounds * 4) + 1]; | 132 | memcpy(ctx->D, gen_aes.key_dec, AES_MAX_KEYLENGTH); |
409 | P[2] = E_KEY[(rounds * 4) + 2]; | ||
410 | P[3] = E_KEY[(rounds * 4) + 3]; | ||
411 | |||
412 | memcpy(D_KEY, P, AES_EXTENDED_KEY_SIZE_B); | ||
413 | |||
414 | return 0; | 133 | return 0; |
415 | } | 134 | } |
416 | 135 | ||
@@ -675,7 +394,6 @@ static int __init padlock_init(void) | |||
675 | return -ENODEV; | 394 | return -ENODEV; |
676 | } | 395 | } |
677 | 396 | ||
678 | gen_tabs(); | ||
679 | if ((ret = crypto_register_alg(&aes_alg))) | 397 | if ((ret = crypto_register_alg(&aes_alg))) |
680 | goto aes_err; | 398 | goto aes_err; |
681 | 399 | ||
diff --git a/include/crypto/aes.h b/include/crypto/aes.h index d480b76715a8..40008d67ee3d 100644 --- a/include/crypto/aes.h +++ b/include/crypto/aes.h | |||
@@ -14,11 +14,13 @@ | |||
14 | #define AES_KEYSIZE_192 24 | 14 | #define AES_KEYSIZE_192 24 |
15 | #define AES_KEYSIZE_256 32 | 15 | #define AES_KEYSIZE_256 32 |
16 | #define AES_BLOCK_SIZE 16 | 16 | #define AES_BLOCK_SIZE 16 |
17 | #define AES_MAX_KEYLENGTH (15 * 16) | ||
18 | #define AES_MAX_KEYLENGTH_U32 (AES_MAX_KEYLENGTH / sizeof(u32)) | ||
17 | 19 | ||
18 | struct crypto_aes_ctx { | 20 | struct crypto_aes_ctx { |
19 | u32 key_length; | 21 | u32 key_length; |
20 | u32 key_enc[60]; | 22 | u32 key_enc[AES_MAX_KEYLENGTH_U32]; |
21 | u32 key_dec[60]; | 23 | u32 key_dec[AES_MAX_KEYLENGTH_U32]; |
22 | }; | 24 | }; |
23 | 25 | ||
24 | extern u32 crypto_ft_tab[4][256]; | 26 | extern u32 crypto_ft_tab[4][256]; |
@@ -28,4 +30,6 @@ extern u32 crypto_il_tab[4][256]; | |||
28 | 30 | ||
29 | int crypto_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, | 31 | int crypto_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, |
30 | unsigned int key_len); | 32 | unsigned int key_len); |
33 | int crypto_aes_expand_key(struct crypto_aes_ctx *ctx, const u8 *in_key, | ||
34 | unsigned int key_len); | ||
31 | #endif | 35 | #endif |
diff --git a/include/linux/crypto.h b/include/linux/crypto.h index 5e02d1b46370..425824bd49f3 100644 --- a/include/linux/crypto.h +++ b/include/linux/crypto.h | |||
@@ -317,14 +317,7 @@ int crypto_unregister_alg(struct crypto_alg *alg); | |||
317 | /* | 317 | /* |
318 | * Algorithm query interface. | 318 | * Algorithm query interface. |
319 | */ | 319 | */ |
320 | #ifdef CONFIG_CRYPTO | ||
321 | int crypto_has_alg(const char *name, u32 type, u32 mask); | 320 | int crypto_has_alg(const char *name, u32 type, u32 mask); |
322 | #else | ||
323 | static inline int crypto_has_alg(const char *name, u32 type, u32 mask) | ||
324 | { | ||
325 | return 0; | ||
326 | } | ||
327 | #endif | ||
328 | 321 | ||
329 | /* | 322 | /* |
330 | * Transforms: user-instantiated objects which encapsulate algorithms | 323 | * Transforms: user-instantiated objects which encapsulate algorithms |