path
stringlengths 14
112
| content
stringlengths 0
6.32M
| size
int64 0
6.32M
| max_lines
int64 1
100k
| repo_name
stringclasses 2
values | autogenerated
bool 1
class |
---|---|---|---|---|---|
cosmopolitan/third_party/mbedtls/test/test_suite_gcm.aes128_de.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_gcm.aes128_de.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_gcm.function
* Test suite data : suites/test_suite_gcm.aes128_de.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
void test_gcm_bad_parameters( int cipher_id, int direction,
data_t *key_str, data_t *src_str,
data_t *iv_str, data_t *add_str,
int tag_len_bits, int gcm_result )
{
unsigned char output[128];
unsigned char tag_output[16];
mbedtls_gcm_context ctx;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset( output, 0x00, sizeof( output ) );
memset( tag_output, 0x00, sizeof( tag_output ) );
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == 0 );
TEST_ASSERT( mbedtls_gcm_crypt_and_tag( &ctx, direction, src_str->len, iv_str->x, iv_str->len,
add_str->x, add_str->len, src_str->x, output, tag_len, tag_output ) == gcm_result );
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_bad_parameters_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_gcm_bad_parameters( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
void test_gcm_encrypt_and_tag( int cipher_id, data_t * key_str,
data_t * src_str, data_t * iv_str,
data_t * add_str, data_t * dst,
int tag_len_bits, data_t * tag,
int init_result )
{
unsigned char output[128];
unsigned char tag_output[16];
mbedtls_gcm_context ctx;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset(output, 0x00, 128);
memset(tag_output, 0x00, 16);
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == init_result );
if( init_result == 0 )
{
TEST_ASSERT( mbedtls_gcm_crypt_and_tag( &ctx, MBEDTLS_GCM_ENCRYPT, src_str->len, iv_str->x, iv_str->len, add_str->x, add_str->len, src_str->x, output, tag_len, tag_output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( tag_output, tag->x,
tag_len, tag->len ) == 0 );
}
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_encrypt_and_tag_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_gcm_encrypt_and_tag( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, *( (int *) params[11] ), &data12, *( (int *) params[14] ) );
}
void test_gcm_decrypt_and_verify( int cipher_id, data_t * key_str,
data_t * src_str, data_t * iv_str,
data_t * add_str, int tag_len_bits,
data_t * tag_str, char * result,
data_t * pt_result, int init_result )
{
unsigned char output[128];
mbedtls_gcm_context ctx;
int ret;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset(output, 0x00, 128);
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == init_result );
if( init_result == 0 )
{
ret = mbedtls_gcm_auth_decrypt( &ctx, src_str->len, iv_str->x, iv_str->len, add_str->x, add_str->len, tag_str->x, tag_len, src_str->x, output );
if( strcmp( "FAIL", result ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_GCM_AUTH_FAILED );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, pt_result->x,
src_str->len,
pt_result->len ) == 0 );
}
}
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_decrypt_and_verify_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data13 = {(uint8_t *) params[13], *( (uint32_t *) params[14] )};
test_gcm_decrypt_and_verify( *( (int *) params[0] ), &data1, &data3, &data5, &data7, *( (int *) params[9] ), &data10, (char *) params[12], &data13, *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_gcm_invalid_param( )
{
mbedtls_gcm_context ctx;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 };
mbedtls_cipher_id_t valid_cipher = MBEDTLS_CIPHER_ID_AES;
int valid_mode = MBEDTLS_GCM_ENCRYPT;
int valid_len = sizeof(valid_buffer);
int valid_bitlen = 128, invalid_bitlen = 1;
mbedtls_gcm_init( &ctx );
/* mbedtls_gcm_init() */
TEST_INVALID_PARAM( mbedtls_gcm_init( NULL ) );
/* mbedtls_gcm_setkey */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( NULL, valid_cipher, valid_buffer, valid_bitlen ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( &ctx, valid_cipher, NULL, valid_bitlen ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( &ctx, valid_cipher, valid_buffer, invalid_bitlen ) );
/* mbedtls_gcm_crypt_and_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( NULL, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, NULL,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, NULL ) );
/* mbedtls_gcm_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, NULL) );
/* mbedtls_gcm_starts() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( NULL, valid_mode,
valid_buffer, valid_len,
valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( &ctx, valid_mode,
NULL, valid_len,
valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( &ctx, valid_mode,
valid_buffer, valid_len,
NULL, valid_len ) );
/* mbedtls_gcm_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( NULL, valid_len,
valid_buffer, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( &ctx, valid_len,
NULL, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( &ctx, valid_len,
valid_buffer, NULL ) );
/* mbedtls_gcm_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_finish( NULL, valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_finish( &ctx, NULL, valid_len ) );
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_invalid_param_wrapper( void ** params )
{
(void)params;
test_gcm_invalid_param( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_gcm_valid_param( )
{
TEST_VALID_PARAM( mbedtls_gcm_free( NULL ) );
exit:
return;
}
void test_gcm_valid_param_wrapper( void ** params )
{
(void)params;
test_gcm_valid_param( );
}
#if defined(MBEDTLS_SELF_TEST)
void test_gcm_selftest( )
{
TEST_ASSERT( mbedtls_gcm_self_test( 1 ) == 0 );
exit:
;
}
void test_gcm_selftest_wrapper( void ** params )
{
(void)params;
test_gcm_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_GCM_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_GCM_C)
case 0:
{
*out_value = MBEDTLS_CIPHER_ID_AES;
}
break;
case 1:
{
*out_value = MBEDTLS_GCM_DECRYPT;
}
break;
case 2:
{
*out_value = MBEDTLS_ERR_GCM_BAD_INPUT;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_GCM_C)
case 0:
{
#if defined(MBEDTLS_AES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_GCM_C)
test_gcm_bad_parameters_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_GCM_C)
test_gcm_encrypt_and_tag_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_GCM_C)
test_gcm_decrypt_and_verify_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_GCM_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_gcm_invalid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_GCM_C)
test_gcm_valid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_GCM_C) && defined(MBEDTLS_SELF_TEST)
test_gcm_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_gcm.aes128_de.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 21,330 | 643 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_gcm.aes256_de.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_gcm.aes256_de.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_gcm.function
* Test suite data : suites/test_suite_gcm.aes256_de.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
void test_gcm_bad_parameters( int cipher_id, int direction,
data_t *key_str, data_t *src_str,
data_t *iv_str, data_t *add_str,
int tag_len_bits, int gcm_result )
{
unsigned char output[128];
unsigned char tag_output[16];
mbedtls_gcm_context ctx;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset( output, 0x00, sizeof( output ) );
memset( tag_output, 0x00, sizeof( tag_output ) );
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == 0 );
TEST_ASSERT( mbedtls_gcm_crypt_and_tag( &ctx, direction, src_str->len, iv_str->x, iv_str->len,
add_str->x, add_str->len, src_str->x, output, tag_len, tag_output ) == gcm_result );
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_bad_parameters_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_gcm_bad_parameters( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
void test_gcm_encrypt_and_tag( int cipher_id, data_t * key_str,
data_t * src_str, data_t * iv_str,
data_t * add_str, data_t * dst,
int tag_len_bits, data_t * tag,
int init_result )
{
unsigned char output[128];
unsigned char tag_output[16];
mbedtls_gcm_context ctx;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset(output, 0x00, 128);
memset(tag_output, 0x00, 16);
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == init_result );
if( init_result == 0 )
{
TEST_ASSERT( mbedtls_gcm_crypt_and_tag( &ctx, MBEDTLS_GCM_ENCRYPT, src_str->len, iv_str->x, iv_str->len, add_str->x, add_str->len, src_str->x, output, tag_len, tag_output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( tag_output, tag->x,
tag_len, tag->len ) == 0 );
}
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_encrypt_and_tag_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_gcm_encrypt_and_tag( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, *( (int *) params[11] ), &data12, *( (int *) params[14] ) );
}
void test_gcm_decrypt_and_verify( int cipher_id, data_t * key_str,
data_t * src_str, data_t * iv_str,
data_t * add_str, int tag_len_bits,
data_t * tag_str, char * result,
data_t * pt_result, int init_result )
{
unsigned char output[128];
mbedtls_gcm_context ctx;
int ret;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset(output, 0x00, 128);
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == init_result );
if( init_result == 0 )
{
ret = mbedtls_gcm_auth_decrypt( &ctx, src_str->len, iv_str->x, iv_str->len, add_str->x, add_str->len, tag_str->x, tag_len, src_str->x, output );
if( strcmp( "FAIL", result ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_GCM_AUTH_FAILED );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, pt_result->x,
src_str->len,
pt_result->len ) == 0 );
}
}
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_decrypt_and_verify_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data13 = {(uint8_t *) params[13], *( (uint32_t *) params[14] )};
test_gcm_decrypt_and_verify( *( (int *) params[0] ), &data1, &data3, &data5, &data7, *( (int *) params[9] ), &data10, (char *) params[12], &data13, *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_gcm_invalid_param( )
{
mbedtls_gcm_context ctx;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 };
mbedtls_cipher_id_t valid_cipher = MBEDTLS_CIPHER_ID_AES;
int valid_mode = MBEDTLS_GCM_ENCRYPT;
int valid_len = sizeof(valid_buffer);
int valid_bitlen = 128, invalid_bitlen = 1;
mbedtls_gcm_init( &ctx );
/* mbedtls_gcm_init() */
TEST_INVALID_PARAM( mbedtls_gcm_init( NULL ) );
/* mbedtls_gcm_setkey */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( NULL, valid_cipher, valid_buffer, valid_bitlen ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( &ctx, valid_cipher, NULL, valid_bitlen ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( &ctx, valid_cipher, valid_buffer, invalid_bitlen ) );
/* mbedtls_gcm_crypt_and_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( NULL, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, NULL,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, NULL ) );
/* mbedtls_gcm_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, NULL) );
/* mbedtls_gcm_starts() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( NULL, valid_mode,
valid_buffer, valid_len,
valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( &ctx, valid_mode,
NULL, valid_len,
valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( &ctx, valid_mode,
valid_buffer, valid_len,
NULL, valid_len ) );
/* mbedtls_gcm_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( NULL, valid_len,
valid_buffer, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( &ctx, valid_len,
NULL, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( &ctx, valid_len,
valid_buffer, NULL ) );
/* mbedtls_gcm_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_finish( NULL, valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_finish( &ctx, NULL, valid_len ) );
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_invalid_param_wrapper( void ** params )
{
(void)params;
test_gcm_invalid_param( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_gcm_valid_param( )
{
TEST_VALID_PARAM( mbedtls_gcm_free( NULL ) );
exit:
return;
}
void test_gcm_valid_param_wrapper( void ** params )
{
(void)params;
test_gcm_valid_param( );
}
#if defined(MBEDTLS_SELF_TEST)
void test_gcm_selftest( )
{
TEST_ASSERT( mbedtls_gcm_self_test( 1 ) == 0 );
exit:
;
}
void test_gcm_selftest_wrapper( void ** params )
{
(void)params;
test_gcm_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_GCM_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_GCM_C)
case 0:
{
*out_value = MBEDTLS_CIPHER_ID_AES;
}
break;
case 1:
{
*out_value = MBEDTLS_GCM_DECRYPT;
}
break;
case 2:
{
*out_value = MBEDTLS_ERR_GCM_BAD_INPUT;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_GCM_C)
case 0:
{
#if defined(MBEDTLS_AES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_GCM_C)
test_gcm_bad_parameters_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_GCM_C)
test_gcm_encrypt_and_tag_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_GCM_C)
test_gcm_decrypt_and_verify_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_GCM_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_gcm_invalid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_GCM_C)
test_gcm_valid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_GCM_C) && defined(MBEDTLS_SELF_TEST)
test_gcm_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_gcm.aes256_de.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 21,330 | 643 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_hmac_drbg.misc.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_hmac_drbg.misc.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_hmac_drbg.function
* Test suite data : suites/test_suite_hmac_drbg.misc.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_HMAC_DRBG_C)
#include "third_party/mbedtls/hmac_drbg.h"
typedef struct
{
unsigned char *p;
size_t len;
} entropy_ctx;
static int mbedtls_test_entropy_func( void *data, unsigned char *buf, size_t len )
{
entropy_ctx *ctx = (entropy_ctx *) data;
if( len > ctx->len )
return( -1 );
memcpy( buf, ctx->p, len );
ctx->p += len;
ctx->len -= len;
return( 0 );
}
void test_hmac_drbg_entropy_usage( int md_alg )
{
unsigned char out[16];
unsigned char buf[1024];
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
entropy_ctx entropy;
size_t i, reps = 10;
size_t default_entropy_len;
size_t expected_consumed_entropy = 0;
mbedtls_hmac_drbg_init( &ctx );
memset( buf, 0, sizeof( buf ) );
memset( out, 0, sizeof( out ) );
entropy.len = sizeof( buf );
entropy.p = buf;
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
if( mbedtls_md_get_size( md_info ) <= 20 )
default_entropy_len = 16;
else if( mbedtls_md_get_size( md_info ) <= 28 )
default_entropy_len = 24;
else
default_entropy_len = 32;
/* Set reseed interval before seed */
mbedtls_hmac_drbg_set_reseed_interval( &ctx, 2 * reps );
/* Init must use entropy */
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info, mbedtls_test_entropy_func, &entropy,
NULL, 0 ) == 0 );
/* default_entropy_len of entropy, plus half as much for the nonce */
expected_consumed_entropy += default_entropy_len * 3 / 2;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* By default, PR is off, and reseed interval was set to
* 2 * reps so the next few calls should not use entropy */
for( i = 0; i < reps; i++ )
{
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) - 4 ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, out, sizeof( out ) - 4,
buf, 16 ) == 0 );
}
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* While at it, make sure we didn't write past the requested length */
TEST_ASSERT( out[sizeof( out ) - 4] == 0 );
TEST_ASSERT( out[sizeof( out ) - 3] == 0 );
TEST_ASSERT( out[sizeof( out ) - 2] == 0 );
TEST_ASSERT( out[sizeof( out ) - 1] == 0 );
/* There have been 2 * reps calls to random. The next call should reseed */
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_consumed_entropy += default_entropy_len;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* Set reseed interval after seed */
mbedtls_hmac_drbg_set_reseed_interval( &ctx, 4 * reps + 1);
/* The new few calls should not reseed */
for( i = 0; i < (2 * reps); i++ )
{
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, out, sizeof( out ) ,
buf, 16 ) == 0 );
}
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* Now enable PR, so the next few calls should all reseed */
mbedtls_hmac_drbg_set_prediction_resistance( &ctx, MBEDTLS_HMAC_DRBG_PR_ON );
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_consumed_entropy += default_entropy_len;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* Finally, check setting entropy_len */
mbedtls_hmac_drbg_set_entropy_len( &ctx, 42 );
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_consumed_entropy += 42;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
mbedtls_hmac_drbg_set_entropy_len( &ctx, 13 );
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_consumed_entropy += 13;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_entropy_usage_wrapper( void ** params )
{
test_hmac_drbg_entropy_usage( *( (int *) params[0] ) );
}
#if defined(MBEDTLS_FS_IO)
void test_hmac_drbg_seed_file( int md_alg, char * path, int ret )
{
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
mbedtls_hmac_drbg_init( &ctx );
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info,
mbedtls_test_rnd_std_rand, NULL,
NULL, 0 ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_write_seed_file( &ctx, path ) == ret );
TEST_ASSERT( mbedtls_hmac_drbg_update_seed_file( &ctx, path ) == ret );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_seed_file_wrapper( void ** params )
{
test_hmac_drbg_seed_file( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ) );
}
#endif /* MBEDTLS_FS_IO */
void test_hmac_drbg_buf( int md_alg )
{
unsigned char out[16];
unsigned char buf[100];
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
size_t i;
mbedtls_hmac_drbg_init( &ctx );
memset( buf, 0, sizeof( buf ) );
memset( out, 0, sizeof( out ) );
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT( mbedtls_hmac_drbg_seed_buf( &ctx, md_info, buf, sizeof( buf ) ) == 0 );
/* Make sure it never tries to reseed (would segfault otherwise) */
mbedtls_hmac_drbg_set_reseed_interval( &ctx, 3 );
mbedtls_hmac_drbg_set_prediction_resistance( &ctx, MBEDTLS_HMAC_DRBG_PR_ON );
for( i = 0; i < 30; i++ )
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_buf_wrapper( void ** params )
{
test_hmac_drbg_buf( *( (int *) params[0] ) );
}
void test_hmac_drbg_no_reseed( int md_alg, data_t * entropy,
data_t * custom, data_t * add1,
data_t * add2, data_t * output )
{
unsigned char data[1024];
unsigned char my_output[512];
entropy_ctx p_entropy;
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
mbedtls_hmac_drbg_init( &ctx );
p_entropy.p = entropy->x;
p_entropy.len = entropy->len;
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
/* Test the simplified buffer-based variant */
memcpy( data, entropy->x, p_entropy.len );
memcpy( data + p_entropy.len, custom->x, custom->len );
TEST_ASSERT( mbedtls_hmac_drbg_seed_buf( &ctx, md_info,
data, p_entropy.len + custom->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add1->x, add1->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add2->x, add2->len ) == 0 );
/* Reset context for second run */
mbedtls_hmac_drbg_free( &ctx );
TEST_ASSERT( memcmp( my_output, output->x, output->len ) == 0 );
/* And now the normal entropy-based variant */
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info, mbedtls_test_entropy_func, &p_entropy,
custom->x, custom->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add1->x, add1->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add2->x, add2->len ) == 0 );
TEST_ASSERT( memcmp( my_output, output->x, output->len ) == 0 );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_no_reseed_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
test_hmac_drbg_no_reseed( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9 );
}
void test_hmac_drbg_nopr( int md_alg, data_t * entropy, data_t * custom,
data_t * add1, data_t * add2, data_t * add3,
data_t * output )
{
unsigned char my_output[512];
entropy_ctx p_entropy;
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
mbedtls_hmac_drbg_init( &ctx );
p_entropy.p = entropy->x;
p_entropy.len = entropy->len;
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info, mbedtls_test_entropy_func, &p_entropy,
custom->x, custom->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_reseed( &ctx, add1->x, add1->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add2->x, add2->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add3->x, add3->len ) == 0 );
TEST_ASSERT( memcmp( my_output, output->x, output->len ) == 0 );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_nopr_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data11 = {(uint8_t *) params[11], *( (uint32_t *) params[12] )};
test_hmac_drbg_nopr( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, &data11 );
}
void test_hmac_drbg_pr( int md_alg, data_t * entropy, data_t * custom,
data_t * add1, data_t * add2, data_t * output )
{
unsigned char my_output[512];
entropy_ctx p_entropy;
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
mbedtls_hmac_drbg_init( &ctx );
p_entropy.p = entropy->x;
p_entropy.len = entropy->len;
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info, mbedtls_test_entropy_func, &p_entropy,
custom->x, custom->len ) == 0 );
mbedtls_hmac_drbg_set_prediction_resistance( &ctx, MBEDTLS_HMAC_DRBG_PR_ON );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add1->x, add1->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add2->x, add2->len ) == 0 );
TEST_ASSERT( memcmp( my_output, output->x, output->len ) == 0 );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_pr_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
test_hmac_drbg_pr( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9 );
}
#if defined(MBEDTLS_SELF_TEST)
void test_hmac_drbg_selftest( )
{
TEST_ASSERT( mbedtls_hmac_drbg_self_test( 1 ) == 0 );
exit:
;
}
void test_hmac_drbg_selftest_wrapper( void ** params )
{
(void)params;
test_hmac_drbg_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_HMAC_DRBG_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_HMAC_DRBG_C)
case 0:
{
*out_value = MBEDTLS_MD_SHA1;
}
break;
case 1:
{
*out_value = MBEDTLS_MD_SHA224;
}
break;
case 2:
{
*out_value = MBEDTLS_MD_SHA256;
}
break;
case 3:
{
*out_value = MBEDTLS_MD_SHA384;
}
break;
case 4:
{
*out_value = MBEDTLS_MD_SHA512;
}
break;
case 5:
{
*out_value = MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_HMAC_DRBG_C)
case 0:
{
#if defined(MBEDTLS_SHA1_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_SHA256_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_SHA512_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if !defined(MBEDTLS_SHA512_NO_SHA384)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_entropy_usage_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_HMAC_DRBG_C) && defined(MBEDTLS_FS_IO)
test_hmac_drbg_seed_file_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_no_reseed_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_nopr_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_pr_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_HMAC_DRBG_C) && defined(MBEDTLS_SELF_TEST)
test_hmac_drbg_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_hmac_drbg.misc.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 21,978 | 701 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_random.datax | Generate random twice with CTR_DRBG
0
Generate random twice with HMAC_DRBG(SHA-1)
depends_on:0
1:exp:0
Generate random twice with HMAC_DRBG(SHA-256)
depends_on:1
1:exp:1
Generate random twice with HMAC_DRBG(SHA-512)
depends_on:2
1:exp:2
Generate random twice with PSA classic wrapper
2
Generate random twice with PSA API
3
PSA classic wrapper: 0 bytes
5:int:0
PSA classic wrapper: 1 byte
5:int:1
PSA classic wrapper: 256 bytes
5:int:256
PSA classic wrapper: external RNG large
depends_on:3
5:int:1024
PSA classic wrapper: CTR_DRBG max
depends_on:4:5
5:exp:3
PSA classic wrapper: HMAC_DRBG max
depends_on:4:6:7
5:exp:4
PSA classic wrapper: ECDSA signature (SECP256R1)
depends_on:8
6:exp:5
| 701 | 47 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_gcm.aes192_en.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_gcm.aes192_en.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_gcm.function
* Test suite data : suites/test_suite_gcm.aes192_en.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
void test_gcm_bad_parameters( int cipher_id, int direction,
data_t *key_str, data_t *src_str,
data_t *iv_str, data_t *add_str,
int tag_len_bits, int gcm_result )
{
unsigned char output[128];
unsigned char tag_output[16];
mbedtls_gcm_context ctx;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset( output, 0x00, sizeof( output ) );
memset( tag_output, 0x00, sizeof( tag_output ) );
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == 0 );
TEST_ASSERT( mbedtls_gcm_crypt_and_tag( &ctx, direction, src_str->len, iv_str->x, iv_str->len,
add_str->x, add_str->len, src_str->x, output, tag_len, tag_output ) == gcm_result );
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_bad_parameters_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_gcm_bad_parameters( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
void test_gcm_encrypt_and_tag( int cipher_id, data_t * key_str,
data_t * src_str, data_t * iv_str,
data_t * add_str, data_t * dst,
int tag_len_bits, data_t * tag,
int init_result )
{
unsigned char output[128];
unsigned char tag_output[16];
mbedtls_gcm_context ctx;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset(output, 0x00, 128);
memset(tag_output, 0x00, 16);
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == init_result );
if( init_result == 0 )
{
TEST_ASSERT( mbedtls_gcm_crypt_and_tag( &ctx, MBEDTLS_GCM_ENCRYPT, src_str->len, iv_str->x, iv_str->len, add_str->x, add_str->len, src_str->x, output, tag_len, tag_output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( tag_output, tag->x,
tag_len, tag->len ) == 0 );
}
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_encrypt_and_tag_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_gcm_encrypt_and_tag( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, *( (int *) params[11] ), &data12, *( (int *) params[14] ) );
}
void test_gcm_decrypt_and_verify( int cipher_id, data_t * key_str,
data_t * src_str, data_t * iv_str,
data_t * add_str, int tag_len_bits,
data_t * tag_str, char * result,
data_t * pt_result, int init_result )
{
unsigned char output[128];
mbedtls_gcm_context ctx;
int ret;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset(output, 0x00, 128);
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == init_result );
if( init_result == 0 )
{
ret = mbedtls_gcm_auth_decrypt( &ctx, src_str->len, iv_str->x, iv_str->len, add_str->x, add_str->len, tag_str->x, tag_len, src_str->x, output );
if( strcmp( "FAIL", result ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_GCM_AUTH_FAILED );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, pt_result->x,
src_str->len,
pt_result->len ) == 0 );
}
}
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_decrypt_and_verify_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data13 = {(uint8_t *) params[13], *( (uint32_t *) params[14] )};
test_gcm_decrypt_and_verify( *( (int *) params[0] ), &data1, &data3, &data5, &data7, *( (int *) params[9] ), &data10, (char *) params[12], &data13, *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_gcm_invalid_param( )
{
mbedtls_gcm_context ctx;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 };
mbedtls_cipher_id_t valid_cipher = MBEDTLS_CIPHER_ID_AES;
int valid_mode = MBEDTLS_GCM_ENCRYPT;
int valid_len = sizeof(valid_buffer);
int valid_bitlen = 128, invalid_bitlen = 1;
mbedtls_gcm_init( &ctx );
/* mbedtls_gcm_init() */
TEST_INVALID_PARAM( mbedtls_gcm_init( NULL ) );
/* mbedtls_gcm_setkey */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( NULL, valid_cipher, valid_buffer, valid_bitlen ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( &ctx, valid_cipher, NULL, valid_bitlen ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( &ctx, valid_cipher, valid_buffer, invalid_bitlen ) );
/* mbedtls_gcm_crypt_and_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( NULL, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, NULL,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, NULL ) );
/* mbedtls_gcm_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, NULL) );
/* mbedtls_gcm_starts() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( NULL, valid_mode,
valid_buffer, valid_len,
valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( &ctx, valid_mode,
NULL, valid_len,
valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( &ctx, valid_mode,
valid_buffer, valid_len,
NULL, valid_len ) );
/* mbedtls_gcm_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( NULL, valid_len,
valid_buffer, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( &ctx, valid_len,
NULL, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( &ctx, valid_len,
valid_buffer, NULL ) );
/* mbedtls_gcm_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_finish( NULL, valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_finish( &ctx, NULL, valid_len ) );
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_invalid_param_wrapper( void ** params )
{
(void)params;
test_gcm_invalid_param( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_gcm_valid_param( )
{
TEST_VALID_PARAM( mbedtls_gcm_free( NULL ) );
exit:
return;
}
void test_gcm_valid_param_wrapper( void ** params )
{
(void)params;
test_gcm_valid_param( );
}
#if defined(MBEDTLS_SELF_TEST)
void test_gcm_selftest( )
{
TEST_ASSERT( mbedtls_gcm_self_test( 1 ) == 0 );
exit:
;
}
void test_gcm_selftest_wrapper( void ** params )
{
(void)params;
test_gcm_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_GCM_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_GCM_C)
case 0:
{
*out_value = MBEDTLS_CIPHER_ID_AES;
}
break;
case 1:
{
*out_value = MBEDTLS_GCM_ENCRYPT;
}
break;
case 2:
{
*out_value = MBEDTLS_ERR_GCM_BAD_INPUT;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_GCM_C)
case 0:
{
#if defined(MBEDTLS_AES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_GCM_C)
test_gcm_bad_parameters_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_GCM_C)
test_gcm_encrypt_and_tag_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_GCM_C)
test_gcm_decrypt_and_verify_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_GCM_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_gcm_invalid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_GCM_C)
test_gcm_valid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_GCM_C) && defined(MBEDTLS_SELF_TEST)
test_gcm_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_gcm.aes192_en.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 21,330 | 643 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_gcm.misc.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_gcm.misc.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_gcm.function
* Test suite data : suites/test_suite_gcm.misc.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
void test_gcm_bad_parameters( int cipher_id, int direction,
data_t *key_str, data_t *src_str,
data_t *iv_str, data_t *add_str,
int tag_len_bits, int gcm_result )
{
unsigned char output[128];
unsigned char tag_output[16];
mbedtls_gcm_context ctx;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset( output, 0x00, sizeof( output ) );
memset( tag_output, 0x00, sizeof( tag_output ) );
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == 0 );
TEST_ASSERT( mbedtls_gcm_crypt_and_tag( &ctx, direction, src_str->len, iv_str->x, iv_str->len,
add_str->x, add_str->len, src_str->x, output, tag_len, tag_output ) == gcm_result );
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_bad_parameters_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_gcm_bad_parameters( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
void test_gcm_encrypt_and_tag( int cipher_id, data_t * key_str,
data_t * src_str, data_t * iv_str,
data_t * add_str, data_t * dst,
int tag_len_bits, data_t * tag,
int init_result )
{
unsigned char output[128];
unsigned char tag_output[16];
mbedtls_gcm_context ctx;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset(output, 0x00, 128);
memset(tag_output, 0x00, 16);
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == init_result );
if( init_result == 0 )
{
TEST_ASSERT( mbedtls_gcm_crypt_and_tag( &ctx, MBEDTLS_GCM_ENCRYPT, src_str->len, iv_str->x, iv_str->len, add_str->x, add_str->len, src_str->x, output, tag_len, tag_output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( tag_output, tag->x,
tag_len, tag->len ) == 0 );
}
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_encrypt_and_tag_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_gcm_encrypt_and_tag( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, *( (int *) params[11] ), &data12, *( (int *) params[14] ) );
}
void test_gcm_decrypt_and_verify( int cipher_id, data_t * key_str,
data_t * src_str, data_t * iv_str,
data_t * add_str, int tag_len_bits,
data_t * tag_str, char * result,
data_t * pt_result, int init_result )
{
unsigned char output[128];
mbedtls_gcm_context ctx;
int ret;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset(output, 0x00, 128);
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == init_result );
if( init_result == 0 )
{
ret = mbedtls_gcm_auth_decrypt( &ctx, src_str->len, iv_str->x, iv_str->len, add_str->x, add_str->len, tag_str->x, tag_len, src_str->x, output );
if( strcmp( "FAIL", result ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_GCM_AUTH_FAILED );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, pt_result->x,
src_str->len,
pt_result->len ) == 0 );
}
}
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_decrypt_and_verify_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data13 = {(uint8_t *) params[13], *( (uint32_t *) params[14] )};
test_gcm_decrypt_and_verify( *( (int *) params[0] ), &data1, &data3, &data5, &data7, *( (int *) params[9] ), &data10, (char *) params[12], &data13, *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_gcm_invalid_param( )
{
mbedtls_gcm_context ctx;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 };
mbedtls_cipher_id_t valid_cipher = MBEDTLS_CIPHER_ID_AES;
int valid_mode = MBEDTLS_GCM_ENCRYPT;
int valid_len = sizeof(valid_buffer);
int valid_bitlen = 128, invalid_bitlen = 1;
mbedtls_gcm_init( &ctx );
/* mbedtls_gcm_init() */
TEST_INVALID_PARAM( mbedtls_gcm_init( NULL ) );
/* mbedtls_gcm_setkey */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( NULL, valid_cipher, valid_buffer, valid_bitlen ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( &ctx, valid_cipher, NULL, valid_bitlen ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( &ctx, valid_cipher, valid_buffer, invalid_bitlen ) );
/* mbedtls_gcm_crypt_and_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( NULL, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, NULL,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, NULL ) );
/* mbedtls_gcm_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, NULL) );
/* mbedtls_gcm_starts() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( NULL, valid_mode,
valid_buffer, valid_len,
valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( &ctx, valid_mode,
NULL, valid_len,
valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( &ctx, valid_mode,
valid_buffer, valid_len,
NULL, valid_len ) );
/* mbedtls_gcm_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( NULL, valid_len,
valid_buffer, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( &ctx, valid_len,
NULL, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( &ctx, valid_len,
valid_buffer, NULL ) );
/* mbedtls_gcm_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_finish( NULL, valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_finish( &ctx, NULL, valid_len ) );
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_invalid_param_wrapper( void ** params )
{
(void)params;
test_gcm_invalid_param( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_gcm_valid_param( )
{
TEST_VALID_PARAM( mbedtls_gcm_free( NULL ) );
exit:
return;
}
void test_gcm_valid_param_wrapper( void ** params )
{
(void)params;
test_gcm_valid_param( );
}
#if defined(MBEDTLS_SELF_TEST)
void test_gcm_selftest( )
{
TEST_ASSERT( mbedtls_gcm_self_test( 1 ) == 0 );
exit:
;
}
void test_gcm_selftest_wrapper( void ** params )
{
(void)params;
test_gcm_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_GCM_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_GCM_C)
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_GCM_C)
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_GCM_C)
test_gcm_bad_parameters_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_GCM_C)
test_gcm_encrypt_and_tag_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_GCM_C)
test_gcm_decrypt_and_verify_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_GCM_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_gcm_invalid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_GCM_C)
test_gcm_valid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_GCM_C) && defined(MBEDTLS_SELF_TEST)
test_gcm_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_gcm.misc.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 20,773 | 619 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_dhm.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_dhm.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_dhm.function
* Test suite data : suites/test_suite_dhm.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_DHM_C)
#if defined(MBEDTLS_BIGNUM_C)
#include "third_party/mbedtls/dhm.h"
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_dhm_invalid_params( )
{
mbedtls_dhm_context ctx;
unsigned char buf[42] = { 0 };
unsigned char *buf_null = NULL;
mbedtls_mpi X;
size_t const buflen = sizeof( buf );
size_t len;
TEST_INVALID_PARAM( mbedtls_dhm_init( NULL ) );
TEST_VALID_PARAM( mbedtls_dhm_free( NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_read_params( NULL,
(unsigned char**) &buf,
buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_read_params( &ctx, &buf_null, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_read_params( &ctx, NULL, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_read_params( &ctx,
(unsigned char**) &buf,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_make_params( NULL, buflen,
buf, &len,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_make_params( &ctx, buflen,
NULL, &len,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_make_params( &ctx, buflen,
buf, NULL,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_make_params( &ctx, buflen,
buf, &len,
NULL,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_set_group( NULL, &X, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_set_group( &ctx, NULL, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_set_group( &ctx, &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_read_public( NULL, buf, buflen ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_read_public( &ctx, NULL, buflen ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_make_public( NULL, buflen,
buf, buflen,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_make_public( &ctx, buflen,
NULL, buflen,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_make_public( &ctx, buflen,
buf, buflen,
NULL,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_calc_secret( NULL, buf, buflen, &len,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_calc_secret( &ctx, NULL, buflen, &len,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_calc_secret( &ctx, buf, buflen, NULL,
mbedtls_test_rnd_std_rand,
NULL ) );
#if defined(MBEDTLS_ASN1_PARSE_C)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_parse_dhm( NULL, buf, buflen ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_parse_dhm( &ctx, NULL, buflen ) );
#if defined(MBEDTLS_FS_IO)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_parse_dhmfile( NULL, "" ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
mbedtls_dhm_parse_dhmfile( &ctx, NULL ) );
#endif /* MBEDTLS_FS_IO */
#endif /* MBEDTLS_ASN1_PARSE_C */
exit:
return;
}
void test_dhm_invalid_params_wrapper( void ** params )
{
(void)params;
test_dhm_invalid_params( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_dhm_do_dhm( int radix_P, char *input_P,
int radix_G, char *input_G, int result )
{
mbedtls_dhm_context ctx_srv;
mbedtls_dhm_context ctx_cli;
unsigned char ske[1000];
unsigned char *p = ske;
unsigned char pub_cli[1000];
unsigned char sec_srv[1000];
unsigned char sec_cli[1000];
size_t ske_len = 0;
size_t pub_cli_len = 0;
size_t sec_srv_len;
size_t sec_cli_len;
int x_size, i;
mbedtls_test_rnd_pseudo_info rnd_info;
mbedtls_dhm_init( &ctx_srv );
mbedtls_dhm_init( &ctx_cli );
memset( ske, 0x00, 1000 );
memset( pub_cli, 0x00, 1000 );
memset( sec_srv, 0x00, 1000 );
memset( sec_cli, 0x00, 1000 );
memset( &rnd_info, 0x00, sizeof( mbedtls_test_rnd_pseudo_info ) );
/*
* Set params
*/
TEST_ASSERT( mbedtls_mpi_read_string( &ctx_srv.P, radix_P, input_P ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &ctx_srv.G, radix_G, input_G ) == 0 );
x_size = mbedtls_mpi_size( &ctx_srv.P );
pub_cli_len = x_size;
/*
* First key exchange
*/
TEST_ASSERT( mbedtls_dhm_make_params( &ctx_srv, x_size, ske, &ske_len,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == result );
if ( result != 0 )
goto exit;
ske[ske_len++] = 0;
ske[ske_len++] = 0;
TEST_ASSERT( mbedtls_dhm_read_params( &ctx_cli, &p, ske + ske_len ) == 0 );
TEST_ASSERT( mbedtls_dhm_make_public( &ctx_cli, x_size, pub_cli, pub_cli_len,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_dhm_read_public( &ctx_srv, pub_cli, pub_cli_len ) == 0 );
TEST_ASSERT( mbedtls_dhm_calc_secret( &ctx_srv, sec_srv, sizeof( sec_srv ),
&sec_srv_len,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_dhm_calc_secret( &ctx_cli, sec_cli, sizeof( sec_cli ), &sec_cli_len, NULL, NULL ) == 0 );
TEST_ASSERT( sec_srv_len == sec_cli_len );
TEST_ASSERT( sec_srv_len != 0 );
TEST_ASSERT( timingsafe_bcmp( sec_srv, sec_cli, sec_srv_len ) == 0 );
/* Re-do calc_secret on server a few times to test update of blinding values */
for( i = 0; i < 3; i++ )
{
sec_srv_len = 1000;
TEST_ASSERT( mbedtls_dhm_calc_secret( &ctx_srv, sec_srv,
sizeof( sec_srv ), &sec_srv_len,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( sec_srv_len == sec_cli_len );
TEST_ASSERT( sec_srv_len != 0 );
TEST_ASSERT( timingsafe_bcmp( sec_srv, sec_cli, sec_srv_len ) == 0 );
}
/*
* Second key exchange to test change of blinding values on server
*/
p = ske;
TEST_ASSERT( mbedtls_dhm_make_params( &ctx_srv, x_size, ske, &ske_len,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
ske[ske_len++] = 0;
ske[ske_len++] = 0;
TEST_ASSERT( mbedtls_dhm_read_params( &ctx_cli, &p, ske + ske_len ) == 0 );
TEST_ASSERT( mbedtls_dhm_make_public( &ctx_cli, x_size, pub_cli, pub_cli_len,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_dhm_read_public( &ctx_srv, pub_cli, pub_cli_len ) == 0 );
TEST_ASSERT( mbedtls_dhm_calc_secret( &ctx_srv, sec_srv, sizeof( sec_srv ),
&sec_srv_len,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_dhm_calc_secret( &ctx_cli, sec_cli, sizeof( sec_cli ), &sec_cli_len, NULL, NULL ) == 0 );
TEST_ASSERT( sec_srv_len == sec_cli_len );
TEST_ASSERT( sec_srv_len != 0 );
TEST_ASSERT( timingsafe_bcmp( sec_srv, sec_cli, sec_srv_len ) == 0 );
exit:
mbedtls_dhm_free( &ctx_srv );
mbedtls_dhm_free( &ctx_cli );
}
void test_dhm_do_dhm_wrapper( void ** params )
{
test_dhm_do_dhm( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ) );
}
void test_dhm_make_public( int P_bytes, int radix_G, char *input_G, int result )
{
mbedtls_mpi P, G;
mbedtls_dhm_context ctx;
unsigned char output[MBEDTLS_MPI_MAX_SIZE];
mbedtls_mpi_init( &P );
mbedtls_mpi_init( &G );
mbedtls_dhm_init( &ctx );
TEST_ASSERT( mbedtls_mpi_lset( &P, 1 ) == 0 );
TEST_ASSERT( mbedtls_mpi_shift_l( &P, ( P_bytes * 8 ) - 1 ) == 0 );
TEST_ASSERT( mbedtls_mpi_set_bit( &P, 0, 1 ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &G, radix_G, input_G ) == 0 );
TEST_ASSERT( mbedtls_dhm_set_group( &ctx, &P, &G ) == 0 );
TEST_ASSERT( mbedtls_dhm_make_public( &ctx, (int) mbedtls_mpi_size( &P ),
output, sizeof(output),
&mbedtls_test_rnd_pseudo_rand,
NULL ) == result );
exit:
mbedtls_mpi_free( &P );
mbedtls_mpi_free( &G );
mbedtls_dhm_free( &ctx );
}
void test_dhm_make_public_wrapper( void ** params )
{
test_dhm_make_public( *( (int *) params[0] ), *( (int *) params[1] ), (char *) params[2], *( (int *) params[3] ) );
}
#if defined(MBEDTLS_FS_IO)
void test_dhm_file( char * filename, char * p, char * g, int len )
{
mbedtls_dhm_context ctx;
mbedtls_mpi P, G;
mbedtls_dhm_init( &ctx );
mbedtls_mpi_init( &P ); mbedtls_mpi_init( &G );
TEST_ASSERT( mbedtls_mpi_read_string( &P, 16, p ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &G, 16, g ) == 0 );
TEST_ASSERT( mbedtls_dhm_parse_dhmfile( &ctx, filename ) == 0 );
TEST_ASSERT( ctx.len == (size_t) len );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &ctx.P, &P ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &ctx.G, &G ) == 0 );
exit:
mbedtls_mpi_free( &P ); mbedtls_mpi_free( &G );
mbedtls_dhm_free( &ctx );
}
void test_dhm_file_wrapper( void ** params )
{
test_dhm_file( (char *) params[0], (char *) params[1], (char *) params[2], *( (int *) params[3] ) );
}
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_SELF_TEST)
void test_dhm_selftest( )
{
TEST_ASSERT( mbedtls_dhm_self_test( 1 ) == 0 );
exit:
;
}
void test_dhm_selftest_wrapper( void ** params )
{
(void)params;
test_dhm_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_BIGNUM_C */
#endif /* MBEDTLS_DHM_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_BIGNUM_C)
case 0:
{
*out_value = MBEDTLS_ERR_DHM_BAD_INPUT_DATA;
}
break;
case 1:
{
*out_value = MBEDTLS_ERR_DHM_MAKE_PARAMS_FAILED;
}
break;
case 2:
{
*out_value = MBEDTLS_MPI_MAX_SIZE;
}
break;
case 3:
{
*out_value = MBEDTLS_MPI_MAX_SIZE + 1;
}
break;
case 4:
{
*out_value = MBEDTLS_ERR_DHM_MAKE_PUBLIC_FAILED+MBEDTLS_ERR_MPI_BAD_INPUT_DATA;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_BIGNUM_C)
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_dhm_invalid_params_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_BIGNUM_C)
test_dhm_do_dhm_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_BIGNUM_C)
test_dhm_make_public_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO)
test_dhm_file_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_SELF_TEST)
test_dhm_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_dhm.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 21,552 | 622 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_gcm.aes128_en.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_gcm.aes128_en.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_gcm.function
* Test suite data : suites/test_suite_gcm.aes128_en.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
void test_gcm_bad_parameters( int cipher_id, int direction,
data_t *key_str, data_t *src_str,
data_t *iv_str, data_t *add_str,
int tag_len_bits, int gcm_result )
{
unsigned char output[128];
unsigned char tag_output[16];
mbedtls_gcm_context ctx;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset( output, 0x00, sizeof( output ) );
memset( tag_output, 0x00, sizeof( tag_output ) );
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == 0 );
TEST_ASSERT( mbedtls_gcm_crypt_and_tag( &ctx, direction, src_str->len, iv_str->x, iv_str->len,
add_str->x, add_str->len, src_str->x, output, tag_len, tag_output ) == gcm_result );
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_bad_parameters_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_gcm_bad_parameters( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
void test_gcm_encrypt_and_tag( int cipher_id, data_t * key_str,
data_t * src_str, data_t * iv_str,
data_t * add_str, data_t * dst,
int tag_len_bits, data_t * tag,
int init_result )
{
unsigned char output[128];
unsigned char tag_output[16];
mbedtls_gcm_context ctx;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset(output, 0x00, 128);
memset(tag_output, 0x00, 16);
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == init_result );
if( init_result == 0 )
{
TEST_ASSERT( mbedtls_gcm_crypt_and_tag( &ctx, MBEDTLS_GCM_ENCRYPT, src_str->len, iv_str->x, iv_str->len, add_str->x, add_str->len, src_str->x, output, tag_len, tag_output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( tag_output, tag->x,
tag_len, tag->len ) == 0 );
}
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_encrypt_and_tag_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_gcm_encrypt_and_tag( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, *( (int *) params[11] ), &data12, *( (int *) params[14] ) );
}
void test_gcm_decrypt_and_verify( int cipher_id, data_t * key_str,
data_t * src_str, data_t * iv_str,
data_t * add_str, int tag_len_bits,
data_t * tag_str, char * result,
data_t * pt_result, int init_result )
{
unsigned char output[128];
mbedtls_gcm_context ctx;
int ret;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset(output, 0x00, 128);
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == init_result );
if( init_result == 0 )
{
ret = mbedtls_gcm_auth_decrypt( &ctx, src_str->len, iv_str->x, iv_str->len, add_str->x, add_str->len, tag_str->x, tag_len, src_str->x, output );
if( strcmp( "FAIL", result ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_GCM_AUTH_FAILED );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, pt_result->x,
src_str->len,
pt_result->len ) == 0 );
}
}
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_decrypt_and_verify_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data13 = {(uint8_t *) params[13], *( (uint32_t *) params[14] )};
test_gcm_decrypt_and_verify( *( (int *) params[0] ), &data1, &data3, &data5, &data7, *( (int *) params[9] ), &data10, (char *) params[12], &data13, *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_gcm_invalid_param( )
{
mbedtls_gcm_context ctx;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 };
mbedtls_cipher_id_t valid_cipher = MBEDTLS_CIPHER_ID_AES;
int valid_mode = MBEDTLS_GCM_ENCRYPT;
int valid_len = sizeof(valid_buffer);
int valid_bitlen = 128, invalid_bitlen = 1;
mbedtls_gcm_init( &ctx );
/* mbedtls_gcm_init() */
TEST_INVALID_PARAM( mbedtls_gcm_init( NULL ) );
/* mbedtls_gcm_setkey */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( NULL, valid_cipher, valid_buffer, valid_bitlen ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( &ctx, valid_cipher, NULL, valid_bitlen ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( &ctx, valid_cipher, valid_buffer, invalid_bitlen ) );
/* mbedtls_gcm_crypt_and_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( NULL, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, NULL,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, NULL ) );
/* mbedtls_gcm_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, NULL) );
/* mbedtls_gcm_starts() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( NULL, valid_mode,
valid_buffer, valid_len,
valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( &ctx, valid_mode,
NULL, valid_len,
valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( &ctx, valid_mode,
valid_buffer, valid_len,
NULL, valid_len ) );
/* mbedtls_gcm_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( NULL, valid_len,
valid_buffer, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( &ctx, valid_len,
NULL, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( &ctx, valid_len,
valid_buffer, NULL ) );
/* mbedtls_gcm_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_finish( NULL, valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_finish( &ctx, NULL, valid_len ) );
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_invalid_param_wrapper( void ** params )
{
(void)params;
test_gcm_invalid_param( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_gcm_valid_param( )
{
TEST_VALID_PARAM( mbedtls_gcm_free( NULL ) );
exit:
return;
}
void test_gcm_valid_param_wrapper( void ** params )
{
(void)params;
test_gcm_valid_param( );
}
#if defined(MBEDTLS_SELF_TEST)
void test_gcm_selftest( )
{
TEST_ASSERT( mbedtls_gcm_self_test( 1 ) == 0 );
exit:
;
}
void test_gcm_selftest_wrapper( void ** params )
{
(void)params;
test_gcm_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_GCM_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_GCM_C)
case 0:
{
*out_value = MBEDTLS_CIPHER_ID_AES;
}
break;
case 1:
{
*out_value = MBEDTLS_GCM_ENCRYPT;
}
break;
case 2:
{
*out_value = MBEDTLS_ERR_GCM_BAD_INPUT;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_GCM_C)
case 0:
{
#if defined(MBEDTLS_AES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_GCM_C)
test_gcm_bad_parameters_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_GCM_C)
test_gcm_encrypt_and_tag_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_GCM_C)
test_gcm_decrypt_and_verify_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_GCM_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_gcm_invalid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_GCM_C)
test_gcm_valid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_GCM_C) && defined(MBEDTLS_SELF_TEST)
test_gcm_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_gcm.aes128_en.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 21,330 | 643 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_gcm.aes256_en.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_gcm.aes256_en.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_gcm.function
* Test suite data : suites/test_suite_gcm.aes256_en.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
void test_gcm_bad_parameters( int cipher_id, int direction,
data_t *key_str, data_t *src_str,
data_t *iv_str, data_t *add_str,
int tag_len_bits, int gcm_result )
{
unsigned char output[128];
unsigned char tag_output[16];
mbedtls_gcm_context ctx;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset( output, 0x00, sizeof( output ) );
memset( tag_output, 0x00, sizeof( tag_output ) );
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == 0 );
TEST_ASSERT( mbedtls_gcm_crypt_and_tag( &ctx, direction, src_str->len, iv_str->x, iv_str->len,
add_str->x, add_str->len, src_str->x, output, tag_len, tag_output ) == gcm_result );
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_bad_parameters_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_gcm_bad_parameters( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
void test_gcm_encrypt_and_tag( int cipher_id, data_t * key_str,
data_t * src_str, data_t * iv_str,
data_t * add_str, data_t * dst,
int tag_len_bits, data_t * tag,
int init_result )
{
unsigned char output[128];
unsigned char tag_output[16];
mbedtls_gcm_context ctx;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset(output, 0x00, 128);
memset(tag_output, 0x00, 16);
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == init_result );
if( init_result == 0 )
{
TEST_ASSERT( mbedtls_gcm_crypt_and_tag( &ctx, MBEDTLS_GCM_ENCRYPT, src_str->len, iv_str->x, iv_str->len, add_str->x, add_str->len, src_str->x, output, tag_len, tag_output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( tag_output, tag->x,
tag_len, tag->len ) == 0 );
}
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_encrypt_and_tag_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_gcm_encrypt_and_tag( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, *( (int *) params[11] ), &data12, *( (int *) params[14] ) );
}
void test_gcm_decrypt_and_verify( int cipher_id, data_t * key_str,
data_t * src_str, data_t * iv_str,
data_t * add_str, int tag_len_bits,
data_t * tag_str, char * result,
data_t * pt_result, int init_result )
{
unsigned char output[128];
mbedtls_gcm_context ctx;
int ret;
size_t tag_len = tag_len_bits / 8;
mbedtls_gcm_init( &ctx );
memset(output, 0x00, 128);
TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == init_result );
if( init_result == 0 )
{
ret = mbedtls_gcm_auth_decrypt( &ctx, src_str->len, iv_str->x, iv_str->len, add_str->x, add_str->len, tag_str->x, tag_len, src_str->x, output );
if( strcmp( "FAIL", result ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_GCM_AUTH_FAILED );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, pt_result->x,
src_str->len,
pt_result->len ) == 0 );
}
}
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_decrypt_and_verify_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data13 = {(uint8_t *) params[13], *( (uint32_t *) params[14] )};
test_gcm_decrypt_and_verify( *( (int *) params[0] ), &data1, &data3, &data5, &data7, *( (int *) params[9] ), &data10, (char *) params[12], &data13, *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_gcm_invalid_param( )
{
mbedtls_gcm_context ctx;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 };
mbedtls_cipher_id_t valid_cipher = MBEDTLS_CIPHER_ID_AES;
int valid_mode = MBEDTLS_GCM_ENCRYPT;
int valid_len = sizeof(valid_buffer);
int valid_bitlen = 128, invalid_bitlen = 1;
mbedtls_gcm_init( &ctx );
/* mbedtls_gcm_init() */
TEST_INVALID_PARAM( mbedtls_gcm_init( NULL ) );
/* mbedtls_gcm_setkey */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( NULL, valid_cipher, valid_buffer, valid_bitlen ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( &ctx, valid_cipher, NULL, valid_bitlen ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_setkey( &ctx, valid_cipher, valid_buffer, invalid_bitlen ) );
/* mbedtls_gcm_crypt_and_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( NULL, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_buffer,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, NULL,
valid_len, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_crypt_and_tag( &ctx, valid_mode, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer,
valid_len, NULL ) );
/* mbedtls_gcm_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_len,
valid_buffer, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
NULL, valid_buffer) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_auth_decrypt( &ctx, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, valid_len,
valid_buffer, NULL) );
/* mbedtls_gcm_starts() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( NULL, valid_mode,
valid_buffer, valid_len,
valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( &ctx, valid_mode,
NULL, valid_len,
valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_starts( &ctx, valid_mode,
valid_buffer, valid_len,
NULL, valid_len ) );
/* mbedtls_gcm_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( NULL, valid_len,
valid_buffer, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( &ctx, valid_len,
NULL, valid_buffer ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_update( &ctx, valid_len,
valid_buffer, NULL ) );
/* mbedtls_gcm_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_finish( NULL, valid_buffer, valid_len ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_GCM_BAD_INPUT,
mbedtls_gcm_finish( &ctx, NULL, valid_len ) );
exit:
mbedtls_gcm_free( &ctx );
}
void test_gcm_invalid_param_wrapper( void ** params )
{
(void)params;
test_gcm_invalid_param( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_gcm_valid_param( )
{
TEST_VALID_PARAM( mbedtls_gcm_free( NULL ) );
exit:
return;
}
void test_gcm_valid_param_wrapper( void ** params )
{
(void)params;
test_gcm_valid_param( );
}
#if defined(MBEDTLS_SELF_TEST)
void test_gcm_selftest( )
{
TEST_ASSERT( mbedtls_gcm_self_test( 1 ) == 0 );
exit:
;
}
void test_gcm_selftest_wrapper( void ** params )
{
(void)params;
test_gcm_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_GCM_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_GCM_C)
case 0:
{
*out_value = MBEDTLS_CIPHER_ID_AES;
}
break;
case 1:
{
*out_value = MBEDTLS_GCM_DECRYPT;
}
break;
case 2:
{
*out_value = MBEDTLS_ERR_GCM_BAD_INPUT;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_GCM_C)
case 0:
{
#if defined(MBEDTLS_AES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_GCM_C)
test_gcm_bad_parameters_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_GCM_C)
test_gcm_encrypt_and_tag_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_GCM_C)
test_gcm_decrypt_and_verify_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_GCM_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_gcm_invalid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_GCM_C)
test_gcm_valid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_GCM_C) && defined(MBEDTLS_SELF_TEST)
test_gcm_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_gcm.aes256_en.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 21,330 | 643 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_x509write.datax | Certificate Request check Server1 SHA1
depends_on:0:1:2
0:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"/zip/third_party/mbedtls/test/data/server1.req.sha1":exp:0:int:0:int:0:int:0:int:0
Certificate Request check Server1 SHA224
depends_on:3:1:2
0:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"/zip/third_party/mbedtls/test/data/server1.req.sha224":exp:1:int:0:int:0:int:0:int:0
Certificate Request check Server1 SHA256
depends_on:3:1:2
0:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"/zip/third_party/mbedtls/test/data/server1.req.sha256":exp:2:int:0:int:0:int:0:int:0
Certificate Request check Server1 SHA384
depends_on:4:5:1:2
0:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"/zip/third_party/mbedtls/test/data/server1.req.sha384":exp:3:int:0:int:0:int:0:int:0
Certificate Request check Server1 SHA512
depends_on:4:1:2
0:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"/zip/third_party/mbedtls/test/data/server1.req.sha512":exp:4:int:0:int:0:int:0:int:0
Certificate Request check Server1 MD4
depends_on:6:1:2
0:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"/zip/third_party/mbedtls/test/data/server1.req.md4":exp:5:int:0:int:0:int:0:int:0
Certificate Request check Server1 MD5
depends_on:7:1:2
0:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"/zip/third_party/mbedtls/test/data/server1.req.md5":exp:6:int:0:int:0:int:0:int:0
Certificate Request check Server1 key_usage
depends_on:0:1:2
0:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"/zip/third_party/mbedtls/test/data/server1.req.key_usage":exp:0:exp:7:int:1:int:0:int:0
Certificate Request check Server1 key_usage empty
depends_on:0:1:2
0:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"/zip/third_party/mbedtls/test/data/server1.req.key_usage_empty":exp:0:int:0:int:1:int:0:int:0
Certificate Request check Server1 ns_cert_type
depends_on:0:1:2
0:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"/zip/third_party/mbedtls/test/data/server1.req.cert_type":exp:0:int:0:int:0:exp:8:int:1
Certificate Request check Server1 ns_cert_type empty
depends_on:0:1:2
0:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"/zip/third_party/mbedtls/test/data/server1.req.cert_type_empty":exp:0:int:0:int:0:int:0:int:1
Certificate Request check Server1 key_usage + ns_cert_type
depends_on:0:1:2
0:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"/zip/third_party/mbedtls/test/data/server1.req.ku-ct":exp:0:exp:7:int:1:exp:8:int:1
Certificate Request check Server5 ECDSA, key_usage
depends_on:0:8:9:10
0:char*:"/zip/third_party/mbedtls/test/data/server5.key":char*:"/zip/third_party/mbedtls/test/data/server5.req.ku.sha1":exp:0:exp:9:int:1:int:0:int:0
Certificate Request check opaque Server5 ECDSA, key_usage
depends_on:3:8:10
1:char*:"/zip/third_party/mbedtls/test/data/server5.key":exp:2:exp:9:int:0
Certificate write check Server1 SHA1
depends_on:0:1:2:11:12:7
2:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"":char*:"C=NL,O=PolarSSL,CN=PolarSSL Server 1":char*:"/zip/third_party/mbedtls/test/data/test-ca.key":char*:"PolarSSLTest":char*:"C=NL,O=PolarSSL,CN=PolarSSL Test CA":char*:"1":char*:"20190210144406":char*:"20290210144406":exp:0:int:0:int:0:int:0:int:0:int:1:exp:10:char*:"/zip/third_party/mbedtls/test/data/server1.crt":int:0:int:0
Certificate write check Server1 SHA1, key_usage
depends_on:0:1:2:11:12:7
2:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"":char*:"C=NL,O=PolarSSL,CN=PolarSSL Server 1":char*:"/zip/third_party/mbedtls/test/data/test-ca.key":char*:"PolarSSLTest":char*:"C=NL,O=PolarSSL,CN=PolarSSL Test CA":char*:"1":char*:"20190210144406":char*:"20290210144406":exp:0:exp:7:int:1:int:0:int:0:int:1:exp:10:char*:"/zip/third_party/mbedtls/test/data/server1.key_usage.crt":int:0:int:0
Certificate write check Server1 SHA1, ns_cert_type
depends_on:0:1:2:11:12:7
2:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"":char*:"C=NL,O=PolarSSL,CN=PolarSSL Server 1":char*:"/zip/third_party/mbedtls/test/data/test-ca.key":char*:"PolarSSLTest":char*:"C=NL,O=PolarSSL,CN=PolarSSL Test CA":char*:"1":char*:"20190210144406":char*:"20290210144406":exp:0:int:0:int:0:exp:8:int:1:int:1:exp:10:char*:"/zip/third_party/mbedtls/test/data/server1.cert_type.crt":int:0:int:0
Certificate write check Server1 SHA1, version 1
depends_on:0:1:2:11:12:7
2:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"":char*:"C=NL,O=PolarSSL,CN=PolarSSL Server 1":char*:"/zip/third_party/mbedtls/test/data/test-ca.key":char*:"PolarSSLTest":char*:"C=NL,O=PolarSSL,CN=PolarSSL Test CA":char*:"1":char*:"20190210144406":char*:"20290210144406":exp:0:int:0:int:0:int:0:int:0:int:1:exp:11:char*:"/zip/third_party/mbedtls/test/data/server1.v1.crt":int:0:int:0
Certificate write check Server1 SHA1, CA
depends_on:0:1:2:11:12:7
2:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"":char*:"C=NL,O=PolarSSL,CN=PolarSSL Server 1":char*:"/zip/third_party/mbedtls/test/data/test-ca.key":char*:"PolarSSLTest":char*:"C=NL,O=PolarSSL,CN=PolarSSL Test CA":char*:"1":char*:"20190210144406":char*:"20290210144406":exp:0:int:0:int:0:int:0:int:0:int:1:exp:10:char*:"/zip/third_party/mbedtls/test/data/server1.ca.crt":int:0:int:1
Certificate write check Server1 SHA1, RSA_ALT
depends_on:0:1:2:11:12:7
2:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"":char*:"C=NL,O=PolarSSL,CN=PolarSSL Server 1":char*:"/zip/third_party/mbedtls/test/data/test-ca.key":char*:"PolarSSLTest":char*:"C=NL,O=PolarSSL,CN=PolarSSL Test CA":char*:"1":char*:"20190210144406":char*:"20290210144406":exp:0:int:0:int:0:int:0:int:0:int:0:exp:10:char*:"/zip/third_party/mbedtls/test/data/server1.noauthid.crt":int:1:int:0
Certificate write check Server1 SHA1, RSA_ALT, key_usage
depends_on:0:1:2:11:12:7
2:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"":char*:"C=NL,O=PolarSSL,CN=PolarSSL Server 1":char*:"/zip/third_party/mbedtls/test/data/test-ca.key":char*:"PolarSSLTest":char*:"C=NL,O=PolarSSL,CN=PolarSSL Test CA":char*:"1":char*:"20190210144406":char*:"20290210144406":exp:0:exp:7:int:1:int:0:int:0:int:0:exp:10:char*:"/zip/third_party/mbedtls/test/data/server1.key_usage_noauthid.crt":int:1:int:0
Certificate write check Server1 SHA1, RSA_ALT, ns_cert_type
depends_on:0:1:2:11:12:7
2:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"":char*:"C=NL,O=PolarSSL,CN=PolarSSL Server 1":char*:"/zip/third_party/mbedtls/test/data/test-ca.key":char*:"PolarSSLTest":char*:"C=NL,O=PolarSSL,CN=PolarSSL Test CA":char*:"1":char*:"20190210144406":char*:"20290210144406":exp:0:int:0:int:0:exp:8:int:1:int:0:exp:10:char*:"/zip/third_party/mbedtls/test/data/server1.cert_type_noauthid.crt":int:1:int:0
Certificate write check Server1 SHA1, RSA_ALT, version 1
depends_on:0:1:2:11:12:7
2:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"":char*:"C=NL,O=PolarSSL,CN=PolarSSL Server 1":char*:"/zip/third_party/mbedtls/test/data/test-ca.key":char*:"PolarSSLTest":char*:"C=NL,O=PolarSSL,CN=PolarSSL Test CA":char*:"1":char*:"20190210144406":char*:"20290210144406":exp:0:int:0:int:0:int:0:int:0:int:0:exp:11:char*:"/zip/third_party/mbedtls/test/data/server1.v1.crt":int:1:int:0
Certificate write check Server1 SHA1, RSA_ALT, CA
depends_on:0:1:2:11:12:7
2:char*:"/zip/third_party/mbedtls/test/data/server1.key":char*:"":char*:"C=NL,O=PolarSSL,CN=PolarSSL Server 1":char*:"/zip/third_party/mbedtls/test/data/test-ca.key":char*:"PolarSSLTest":char*:"C=NL,O=PolarSSL,CN=PolarSSL Test CA":char*:"1":char*:"20190210144406":char*:"20290210144406":exp:0:int:0:int:0:int:0:int:0:int:0:exp:10:char*:"/zip/third_party/mbedtls/test/data/server1.ca_noauthid.crt":int:1:int:1
X509 String to Names #1
3:char*:"C=NL,O=Offspark\, Inc., OU=PolarSSL":char*:"C=NL, O=Offspark, Inc., OU=PolarSSL":int:0
X509 String to Names #2
3:char*:"C=NL, O=Offspark, Inc., OU=PolarSSL":char*:"":exp:12
X509 String to Names #3 (Name precisely 255 bytes)
3:char*:"C=NL, O=123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345,OU=PolarSSL":char*:"C=NL, O=123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345, OU=PolarSSL":int:0
X509 String to Names #4 (Name larger than 255 bytes)
3:char*:"C=NL, O=1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456, OU=PolarSSL":char*:"":exp:13
X509 String to Names #5 (Escape non-allowed characters)
3:char*:"C=NL, O=Offspark\a Inc., OU=PolarSSL":char*:"":exp:13
X509 String to Names #6 (Escape at end)
3:char*:"C=NL, O=Offspark\"":char*:"":exp:13
| 9,140 | 114 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_mdx.datax | mbedtls_md2 Test vector RFC1319 #1
0:char*:"":hex:"8350e5a3e24c153df2275c9f80692773"
mbedtls_md2 Test vector RFC1319 #2
0:char*:"a":hex:"32ec01ec4a6dac72c0ab96fb34c0b5d1"
mbedtls_md2 Test vector RFC1319 #3
0:char*:"abc":hex:"da853b0d3f88d99b30283a69e6ded6bb"
mbedtls_md2 Test vector RFC1319 #4
0:char*:"message digest":hex:"ab4f496bfb2a530b219ff33031fe06b0"
mbedtls_md2 Test vector RFC1319 #5
0:char*:"abcdefghijklmnopqrstuvwxyz":hex:"4e8ddff3650292ab5a4108c3aa47940b"
mbedtls_md2 Test vector RFC1319 #6
0:char*:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789":hex:"da33def2a42df13975352846c30338cd"
mbedtls_md2 Test vector RFC1319 #7
0:char*:"12345678901234567890123456789012345678901234567890123456789012345678901234567890":hex:"d5976f79d83d3a0dc9806c3c66f3efd8"
mbedtls_md4 Test vector RFC1320 #1
1:char*:"":hex:"31d6cfe0d16ae931b73c59d7e0c089c0"
mbedtls_md4 Test vector RFC1320 #2
1:char*:"a":hex:"bde52cb31de33e46245e05fbdbd6fb24"
mbedtls_md4 Test vector RFC1320 #3
1:char*:"abc":hex:"a448017aaf21d8525fc10ae87aa6729d"
mbedtls_md4 Test vector RFC1320 #4
1:char*:"message digest":hex:"d9130a8164549fe818874806e1c7014b"
mbedtls_md4 Test vector RFC1320 #5
1:char*:"abcdefghijklmnopqrstuvwxyz":hex:"d79e1c308aa5bbcdeea8ed63df412da9"
mbedtls_md4 Test vector RFC1320 #6
1:char*:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789":hex:"043f8582f241db351ce627e153e7f0e4"
mbedtls_md4 Test vector RFC1320 #7
1:char*:"12345678901234567890123456789012345678901234567890123456789012345678901234567890":hex:"e33b4ddc9c38f2199c3e7b164fcc0536"
mbedtls_md5 Test vector RFC1321 #1
2:char*:"":hex:"d41d8cd98f00b204e9800998ecf8427e"
mbedtls_md5 Test vector RFC1321 #2
2:char*:"a":hex:"0cc175b9c0f1b6a831c399e269772661"
mbedtls_md5 Test vector RFC1321 #3
2:char*:"abc":hex:"900150983cd24fb0d6963f7d28e17f72"
mbedtls_md5 Test vector RFC1321 #4
2:char*:"message digest":hex:"f96b697d7cb7938d525a2f31aaf161d0"
mbedtls_md5 Test vector RFC1321 #5
2:char*:"abcdefghijklmnopqrstuvwxyz":hex:"c3fcd3d76192e4007dfb496cca67e13b"
mbedtls_md5 Test vector RFC1321 #6
2:char*:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789":hex:"d174ab98d277d9f5a5611c2c9f419d9f"
mbedtls_md5 Test vector RFC1321 #7
2:char*:"12345678901234567890123456789012345678901234567890123456789012345678901234567890":hex:"57edf4a22be3c955ac49da2e2107b67a"
mbedtls_ripemd160 Test vector from paper #1
3:char*:"":hex:"9c1185a5c5e9fc54612808977ee8f548b2258d31"
mbedtls_ripemd160 Test vector from paper #2
3:char*:"a":hex:"0bdc9d2d256b3ee9daae347be6f4dc835a467ffe"
mbedtls_ripemd160 Test vector from paper #3
3:char*:"abc":hex:"8eb208f7e05d987a9b044a8e98c6b087f15a0bfc"
mbedtls_ripemd160 Test vector from paper #4
3:char*:"message digest":hex:"5d0689ef49d2fae572b881b123a85ffa21595f36"
mbedtls_ripemd160 Test vector from paper #5
3:char*:"abcdefghijklmnopqrstuvwxyz":hex:"f71c27109c692c1b56bbdceb5b9d2865b3708dbc"
mbedtls_ripemd160 Test vector from paper #6
3:char*:"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq":hex:"12a053384a9c0c88e405a06c27dcf49ada62eb2b"
mbedtls_ripemd160 Test vector from paper #7
3:char*:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789":hex:"b0e20b6e3116640286ed3a87a5713079b21f5189"
mbedtls_ripemd160 Test vector from paper #8
3:char*:"12345678901234567890123456789012345678901234567890123456789012345678901234567890":hex:"9b752e45573d4b39f4dbd3323cab82bf63326bfb"
MD2 Selftest
4
MD4 Selftest
5
MD5 Selftest
6
RIPEMD160 Selftest
7
| 3,500 | 100 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_shax.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_shax.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_shax.function
* Test suite data : suites/test_suite_shax.data
*
*/
#define TEST_SUITE_ACTIVE
#include "third_party/mbedtls/sha1.h"
#include "third_party/mbedtls/sha256.h"
#include "third_party/mbedtls/sha512.h"
#if defined(MBEDTLS_SHA1_C)
void test_sha1_valid_param( )
{
TEST_VALID_PARAM( mbedtls_sha1_free( NULL ) );
exit:
;
}
void test_sha1_valid_param_wrapper( void ** params )
{
(void)params;
test_sha1_valid_param( );
}
#endif /* MBEDTLS_SHA1_C */
#if defined(MBEDTLS_SHA1_C)
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_sha1_invalid_param( )
{
mbedtls_sha1_context ctx;
unsigned char buf[64] = { 0 };
size_t const buflen = sizeof( buf );
TEST_INVALID_PARAM( mbedtls_sha1_init( NULL ) );
TEST_INVALID_PARAM( mbedtls_sha1_clone( NULL, &ctx ) );
TEST_INVALID_PARAM( mbedtls_sha1_clone( &ctx, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA,
mbedtls_sha1_starts_ret( NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA,
mbedtls_sha1_update_ret( NULL, buf, buflen ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA,
mbedtls_sha1_update_ret( &ctx, NULL, buflen ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA,
mbedtls_sha1_finish_ret( NULL, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA,
mbedtls_sha1_finish_ret( &ctx, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA,
mbedtls_internal_sha1_process( NULL, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA,
mbedtls_internal_sha1_process( &ctx, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA,
mbedtls_sha1_ret( NULL, buflen, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA,
mbedtls_sha1_ret( buf, buflen, NULL ) );
exit:
return;
}
void test_sha1_invalid_param_wrapper( void ** params )
{
(void)params;
test_sha1_invalid_param( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
#endif /* MBEDTLS_SHA1_C */
#if defined(MBEDTLS_SHA1_C)
void test_mbedtls_sha1( data_t * src_str, data_t * hash )
{
unsigned char output[41];
memset(output, 0x00, 41);
TEST_ASSERT( mbedtls_sha1_ret( src_str->x, src_str->len, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 20, hash->len ) == 0 );
exit:
;
}
void test_mbedtls_sha1_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_mbedtls_sha1( &data0, &data2 );
}
#endif /* MBEDTLS_SHA1_C */
#if defined(MBEDTLS_SHA256_C)
void test_sha256_valid_param( )
{
TEST_VALID_PARAM( mbedtls_sha256_free( NULL ) );
exit:
;
}
void test_sha256_valid_param_wrapper( void ** params )
{
(void)params;
test_sha256_valid_param( );
}
#endif /* MBEDTLS_SHA256_C */
#if defined(MBEDTLS_SHA256_C)
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_sha256_invalid_param( )
{
mbedtls_sha256_context ctx;
unsigned char buf[64] = { 0 };
size_t const buflen = sizeof( buf );
int valid_type = 0;
int invalid_type = 42;
TEST_INVALID_PARAM( mbedtls_sha256_init( NULL ) );
TEST_INVALID_PARAM( mbedtls_sha256_clone( NULL, &ctx ) );
TEST_INVALID_PARAM( mbedtls_sha256_clone( &ctx, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
mbedtls_sha256_starts_ret( NULL, valid_type ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
mbedtls_sha256_starts_ret( &ctx, invalid_type ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
mbedtls_sha256_update_ret( NULL, buf, buflen ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
mbedtls_sha256_update_ret( &ctx, NULL, buflen ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
mbedtls_sha256_finish_ret( NULL, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
mbedtls_sha256_finish_ret( &ctx, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
mbedtls_internal_sha256_process( NULL, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
mbedtls_internal_sha256_process( &ctx, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
mbedtls_sha256_ret( NULL, buflen,
buf, valid_type ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
mbedtls_sha256_ret( buf, buflen,
NULL, valid_type ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
mbedtls_sha256_ret( buf, buflen,
buf, invalid_type ) );
exit:
return;
}
void test_sha256_invalid_param_wrapper( void ** params )
{
(void)params;
test_sha256_invalid_param( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
#endif /* MBEDTLS_SHA256_C */
#if defined(MBEDTLS_SHA256_C)
void test_sha224( data_t * src_str, data_t * hash )
{
unsigned char output[57];
memset(output, 0x00, 57);
TEST_ASSERT( mbedtls_sha256_ret( src_str->x, src_str->len, output, 1 ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 28, hash->len ) == 0 );
exit:
;
}
void test_sha224_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_sha224( &data0, &data2 );
}
#endif /* MBEDTLS_SHA256_C */
#if defined(MBEDTLS_SHA256_C)
void test_mbedtls_sha256( data_t * src_str, data_t * hash )
{
unsigned char output[65];
memset(output, 0x00, 65);
TEST_ASSERT( mbedtls_sha256_ret( src_str->x, src_str->len, output, 0 ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 32, hash->len ) == 0 );
exit:
;
}
void test_mbedtls_sha256_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_mbedtls_sha256( &data0, &data2 );
}
#endif /* MBEDTLS_SHA256_C */
#if defined(MBEDTLS_SHA512_C)
void test_sha512_valid_param( )
{
TEST_VALID_PARAM( mbedtls_sha512_free( NULL ) );
exit:
;
}
void test_sha512_valid_param_wrapper( void ** params )
{
(void)params;
test_sha512_valid_param( );
}
#endif /* MBEDTLS_SHA512_C */
#if defined(MBEDTLS_SHA512_C)
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_sha512_invalid_param( )
{
mbedtls_sha512_context ctx;
unsigned char buf[64] = { 0 };
size_t const buflen = sizeof( buf );
int valid_type = 0;
int invalid_type = 42;
TEST_INVALID_PARAM( mbedtls_sha512_init( NULL ) );
TEST_INVALID_PARAM( mbedtls_sha512_clone( NULL, &ctx ) );
TEST_INVALID_PARAM( mbedtls_sha512_clone( &ctx, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
mbedtls_sha512_starts_ret( NULL, valid_type ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
mbedtls_sha512_starts_ret( &ctx, invalid_type ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
mbedtls_sha512_update_ret( NULL, buf, buflen ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
mbedtls_sha512_update_ret( &ctx, NULL, buflen ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
mbedtls_sha512_finish_ret( NULL, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
mbedtls_sha512_finish_ret( &ctx, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
mbedtls_internal_sha512_process( NULL, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
mbedtls_internal_sha512_process( &ctx, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
mbedtls_sha512_ret( NULL, buflen,
buf, valid_type ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
mbedtls_sha512_ret( buf, buflen,
NULL, valid_type ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
mbedtls_sha512_ret( buf, buflen,
buf, invalid_type ) );
exit:
return;
}
void test_sha512_invalid_param_wrapper( void ** params )
{
(void)params;
test_sha512_invalid_param( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
#endif /* MBEDTLS_SHA512_C */
#if defined(MBEDTLS_SHA512_C)
void test_sha384( data_t * src_str, data_t * hash )
{
unsigned char output[97];
memset(output, 0x00, 97);
TEST_ASSERT( mbedtls_sha512_ret( src_str->x, src_str->len, output, 1 ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 48, hash->len ) == 0 );
exit:
;
}
void test_sha384_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_sha384( &data0, &data2 );
}
#endif /* MBEDTLS_SHA512_C */
#if defined(MBEDTLS_SHA512_C)
void test_mbedtls_sha512( data_t * src_str, data_t * hash )
{
unsigned char output[129];
memset(output, 0x00, 129);
TEST_ASSERT( mbedtls_sha512_ret( src_str->x, src_str->len, output, 0 ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 64, hash->len ) == 0 );
exit:
;
}
void test_mbedtls_sha512_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_mbedtls_sha512( &data0, &data2 );
}
#endif /* MBEDTLS_SHA512_C */
#if defined(MBEDTLS_SHA1_C)
#if defined(MBEDTLS_SELF_TEST)
void test_sha1_selftest( )
{
TEST_ASSERT( mbedtls_sha1_self_test( 1 ) == 0 );
exit:
;
}
void test_sha1_selftest_wrapper( void ** params )
{
(void)params;
test_sha1_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_SHA1_C */
#if defined(MBEDTLS_SHA256_C)
#if defined(MBEDTLS_SELF_TEST)
void test_sha256_selftest( )
{
TEST_ASSERT( mbedtls_sha256_self_test( 1 ) == 0 );
exit:
;
}
void test_sha256_selftest_wrapper( void ** params )
{
(void)params;
test_sha256_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_SHA256_C */
#if defined(MBEDTLS_SHA512_C)
#if defined(MBEDTLS_SELF_TEST)
void test_sha512_selftest( )
{
TEST_ASSERT( mbedtls_sha512_self_test( 1 ) == 0 );
exit:
;
}
void test_sha512_selftest_wrapper( void ** params )
{
(void)params;
test_sha512_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_SHA512_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
case 0:
{
#if defined(MBEDTLS_SHA1_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_SHA256_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_SHA512_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if !defined(MBEDTLS_SHA512_NO_SHA384)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 4:
{
#if defined(MBEDTLS_SELF_TEST)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_SHA1_C)
test_sha1_valid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_SHA1_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_sha1_invalid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_SHA1_C)
test_mbedtls_sha1_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_SHA256_C)
test_sha256_valid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_SHA256_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_sha256_invalid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_SHA256_C)
test_sha224_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_SHA256_C)
test_mbedtls_sha256_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_SHA512_C)
test_sha512_valid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_SHA512_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_sha512_invalid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_SHA512_C)
test_sha384_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_SHA512_C)
test_mbedtls_sha512_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_SHA1_C) && defined(MBEDTLS_SELF_TEST)
test_sha1_selftest_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_SHA256_C) && defined(MBEDTLS_SELF_TEST)
test_sha256_selftest_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_SHA512_C) && defined(MBEDTLS_SELF_TEST)
test_sha512_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_shax.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 21,632 | 770 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_pkwrite.datax | Public key write check RSA
depends_on:0:1
0:char*:"/zip/third_party/mbedtls/test/data/server1.pubkey"
Public key write check RSA 4096
depends_on:0:1
0:char*:"/zip/third_party/mbedtls/test/data/rsa4096_pub.pem"
Public key write check EC 192 bits
depends_on:2:1:3
0:char*:"/zip/third_party/mbedtls/test/data/ec_pub.pem"
Public key write check EC 521 bits
depends_on:2:1:4
0:char*:"/zip/third_party/mbedtls/test/data/ec_521_pub.pem"
Public key write check EC Brainpool 512 bits
depends_on:2:1:5
0:char*:"/zip/third_party/mbedtls/test/data/ec_bp512_pub.pem"
Private key write check RSA
depends_on:0:1
1:char*:"/zip/third_party/mbedtls/test/data/server1.key"
Private key write check RSA 4096
depends_on:0:1
1:char*:"/zip/third_party/mbedtls/test/data/rsa4096_prv.pem"
Private key write check EC 192 bits
depends_on:2:1:3
1:char*:"/zip/third_party/mbedtls/test/data/ec_prv.sec1.pem"
Private key write check EC 256 bits (top bit set)
depends_on:2:1:6
1:char*:"/zip/third_party/mbedtls/test/data/ec_256_long_prv.pem"
Private key write check EC 521 bits
depends_on:2:1:4
1:char*:"/zip/third_party/mbedtls/test/data/ec_521_prv.pem"
Private key write check EC 521 bits (top byte is 0)
depends_on:2:1:4
1:char*:"/zip/third_party/mbedtls/test/data/ec_521_short_prv.pem"
Private key write check EC Brainpool 512 bits
depends_on:2:1:5
1:char*:"/zip/third_party/mbedtls/test/data/ec_bp512_prv.pem"
| 1,394 | 49 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_blowfish.datax | BLOWFISH - Valid parameters
0
BLOWFISH - Invalid parameters
1
BLOWFISH-ECB Encrypt SSLeay reference #1
2:hex:"0000000000000000":hex:"0000000000000000":hex:"4ef997456198dd78":int:0
BLOWFISH-ECB Encrypt SSLeay reference #2
2:hex:"ffffffffffffffff":hex:"ffffffffffffffff":hex:"51866fd5b85ecb8a":int:0
BLOWFISH-ECB Encrypt SSLeay reference #3
2:hex:"3000000000000000":hex:"1000000000000001":hex:"7d856f9a613063f2":int:0
BLOWFISH-ECB Encrypt SSLeay reference #4
2:hex:"1111111111111111":hex:"1111111111111111":hex:"2466dd878b963c9d":int:0
BLOWFISH-ECB Encrypt SSLeay reference #5
2:hex:"0123456789abcdef":hex:"1111111111111111":hex:"61f9c3802281b096":int:0
BLOWFISH-ECB Encrypt SSLeay reference #6
2:hex:"1111111111111111":hex:"0123456789abcdef":hex:"7d0cc630afda1ec7":int:0
BLOWFISH-ECB Encrypt SSLeay reference #7
2:hex:"0000000000000000":hex:"0000000000000000":hex:"4ef997456198dd78":int:0
BLOWFISH-ECB Encrypt SSLeay reference #8
2:hex:"fedcba9876543210":hex:"0123456789abcdef":hex:"0aceab0fc6a0a28d":int:0
BLOWFISH-ECB Encrypt SSLeay reference #9
2:hex:"7ca110454a1a6e57":hex:"01a1d6d039776742":hex:"59c68245eb05282b":int:0
BLOWFISH-ECB Encrypt SSLeay reference #10
2:hex:"0131d9619dc1376e":hex:"5cd54ca83def57da":hex:"b1b8cc0b250f09a0":int:0
BLOWFISH-ECB Encrypt SSLeay reference #11
2:hex:"07a1133e4a0b2686":hex:"0248d43806f67172":hex:"1730e5778bea1da4":int:0
BLOWFISH-ECB Encrypt SSLeay reference #12
2:hex:"3849674c2602319e":hex:"51454b582ddf440a":hex:"a25e7856cf2651eb":int:0
BLOWFISH-ECB Encrypt SSLeay reference #13
2:hex:"04b915ba43feb5b6":hex:"42fd443059577fa2":hex:"353882b109ce8f1a":int:0
BLOWFISH-ECB Encrypt SSLeay reference #14
2:hex:"0113b970fd34f2ce":hex:"059b5e0851cf143a":hex:"48f4d0884c379918":int:0
BLOWFISH-ECB Encrypt SSLeay reference #15
2:hex:"0170f175468fb5e6":hex:"0756d8e0774761d2":hex:"432193b78951fc98":int:0
BLOWFISH-ECB Encrypt SSLeay reference #16
2:hex:"43297fad38e373fe":hex:"762514b829bf486a":hex:"13f04154d69d1ae5":int:0
BLOWFISH-ECB Encrypt SSLeay reference #17
2:hex:"07a7137045da2a16":hex:"3bdd119049372802":hex:"2eedda93ffd39c79":int:0
BLOWFISH-ECB Encrypt SSLeay reference #18
2:hex:"04689104c2fd3b2f":hex:"26955f6835af609a":hex:"d887e0393c2da6e3":int:0
BLOWFISH-ECB Encrypt SSLeay reference #19
2:hex:"37d06bb516cb7546":hex:"164d5e404f275232":hex:"5f99d04f5b163969":int:0
BLOWFISH-ECB Encrypt SSLeay reference #20
2:hex:"1f08260d1ac2465e":hex:"6b056e18759f5cca":hex:"4a057a3b24d3977b":int:0
BLOWFISH-ECB Encrypt SSLeay reference #21
2:hex:"584023641aba6176":hex:"004bd6ef09176062":hex:"452031c1e4fada8e":int:0
BLOWFISH-ECB Encrypt SSLeay reference #22
2:hex:"025816164629b007":hex:"480d39006ee762f2":hex:"7555ae39f59b87bd":int:0
BLOWFISH-ECB Encrypt SSLeay reference #23
2:hex:"49793ebc79b3258f":hex:"437540c8698f3cfa":hex:"53c55f9cb49fc019":int:0
BLOWFISH-ECB Encrypt SSLeay reference #24
2:hex:"4fb05e1515ab73a7":hex:"072d43a077075292":hex:"7a8e7bfa937e89a3":int:0
BLOWFISH-ECB Encrypt SSLeay reference #25
2:hex:"49e95d6d4ca229bf":hex:"02fe55778117f12a":hex:"cf9c5d7a4986adb5":int:0
BLOWFISH-ECB Encrypt SSLeay reference #26
2:hex:"018310dc409b26d6":hex:"1d9d5c5018f728c2":hex:"d1abb290658bc778":int:0
BLOWFISH-ECB Encrypt SSLeay reference #27
2:hex:"1c587f1c13924fef":hex:"305532286d6f295a":hex:"55cb3774d13ef201":int:0
BLOWFISH-ECB Encrypt SSLeay reference #28
2:hex:"0101010101010101":hex:"0123456789abcdef":hex:"fa34ec4847b268b2":int:0
BLOWFISH-ECB Encrypt SSLeay reference #29
2:hex:"1f1f1f1f0e0e0e0e":hex:"0123456789abcdef":hex:"a790795108ea3cae":int:0
BLOWFISH-ECB Encrypt SSLeay reference #30
2:hex:"e0fee0fef1fef1fe":hex:"0123456789abcdef":hex:"c39e072d9fac631d":int:0
BLOWFISH-ECB Encrypt SSLeay reference #31
2:hex:"0000000000000000":hex:"ffffffffffffffff":hex:"014933e0cdaff6e4":int:0
BLOWFISH-ECB Encrypt SSLeay reference #32
2:hex:"ffffffffffffffff":hex:"0000000000000000":hex:"f21e9a77b71c49bc":int:0
BLOWFISH-ECB Encrypt SSLeay reference #33
2:hex:"0123456789abcdef":hex:"0000000000000000":hex:"245946885754369a":int:0
BLOWFISH-ECB Encrypt SSLeay reference #34
2:hex:"fedcba9876543210":hex:"ffffffffffffffff":hex:"6b5c5a9c5d9e0a5a":int:0
BLOWFISH-ECB Decrypt SSLeay reference #1
3:hex:"0000000000000000":hex:"4ef997456198dd78":hex:"0000000000000000":int:0
BLOWFISH-ECB Decrypt SSLeay reference #2
3:hex:"ffffffffffffffff":hex:"51866fd5b85ecb8a":hex:"ffffffffffffffff":int:0
BLOWFISH-ECB Decrypt SSLeay reference #3
3:hex:"3000000000000000":hex:"7d856f9a613063f2":hex:"1000000000000001":int:0
BLOWFISH-ECB Decrypt SSLeay reference #4
3:hex:"1111111111111111":hex:"2466dd878b963c9d":hex:"1111111111111111":int:0
BLOWFISH-ECB Decrypt SSLeay reference #5
3:hex:"0123456789abcdef":hex:"61f9c3802281b096":hex:"1111111111111111":int:0
BLOWFISH-ECB Decrypt SSLeay reference #6
3:hex:"1111111111111111":hex:"7d0cc630afda1ec7":hex:"0123456789abcdef":int:0
BLOWFISH-ECB Decrypt SSLeay reference #7
3:hex:"0000000000000000":hex:"4ef997456198dd78":hex:"0000000000000000":int:0
BLOWFISH-ECB Decrypt SSLeay reference #8
3:hex:"fedcba9876543210":hex:"0aceab0fc6a0a28d":hex:"0123456789abcdef":int:0
BLOWFISH-ECB Decrypt SSLeay reference #9
3:hex:"7ca110454a1a6e57":hex:"59c68245eb05282b":hex:"01a1d6d039776742":int:0
BLOWFISH-ECB Decrypt SSLeay reference #10
3:hex:"0131d9619dc1376e":hex:"b1b8cc0b250f09a0":hex:"5cd54ca83def57da":int:0
BLOWFISH-ECB Decrypt SSLeay reference #11
3:hex:"07a1133e4a0b2686":hex:"1730e5778bea1da4":hex:"0248d43806f67172":int:0
BLOWFISH-ECB Decrypt SSLeay reference #12
3:hex:"3849674c2602319e":hex:"a25e7856cf2651eb":hex:"51454b582ddf440a":int:0
BLOWFISH-ECB Decrypt SSLeay reference #13
3:hex:"04b915ba43feb5b6":hex:"353882b109ce8f1a":hex:"42fd443059577fa2":int:0
BLOWFISH-ECB Decrypt SSLeay reference #14
3:hex:"0113b970fd34f2ce":hex:"48f4d0884c379918":hex:"059b5e0851cf143a":int:0
BLOWFISH-ECB Decrypt SSLeay reference #15
3:hex:"0170f175468fb5e6":hex:"432193b78951fc98":hex:"0756d8e0774761d2":int:0
BLOWFISH-ECB Decrypt SSLeay reference #16
3:hex:"43297fad38e373fe":hex:"13f04154d69d1ae5":hex:"762514b829bf486a":int:0
BLOWFISH-ECB Decrypt SSLeay reference #17
3:hex:"07a7137045da2a16":hex:"2eedda93ffd39c79":hex:"3bdd119049372802":int:0
BLOWFISH-ECB Decrypt SSLeay reference #18
3:hex:"04689104c2fd3b2f":hex:"d887e0393c2da6e3":hex:"26955f6835af609a":int:0
BLOWFISH-ECB Decrypt SSLeay reference #19
3:hex:"37d06bb516cb7546":hex:"5f99d04f5b163969":hex:"164d5e404f275232":int:0
BLOWFISH-ECB Decrypt SSLeay reference #20
3:hex:"1f08260d1ac2465e":hex:"4a057a3b24d3977b":hex:"6b056e18759f5cca":int:0
BLOWFISH-ECB Decrypt SSLeay reference #21
3:hex:"584023641aba6176":hex:"452031c1e4fada8e":hex:"004bd6ef09176062":int:0
BLOWFISH-ECB Decrypt SSLeay reference #22
3:hex:"025816164629b007":hex:"7555ae39f59b87bd":hex:"480d39006ee762f2":int:0
BLOWFISH-ECB Decrypt SSLeay reference #23
3:hex:"49793ebc79b3258f":hex:"53c55f9cb49fc019":hex:"437540c8698f3cfa":int:0
BLOWFISH-ECB Decrypt SSLeay reference #24
3:hex:"4fb05e1515ab73a7":hex:"7a8e7bfa937e89a3":hex:"072d43a077075292":int:0
BLOWFISH-ECB Decrypt SSLeay reference #25
3:hex:"49e95d6d4ca229bf":hex:"cf9c5d7a4986adb5":hex:"02fe55778117f12a":int:0
BLOWFISH-ECB Decrypt SSLeay reference #26
3:hex:"018310dc409b26d6":hex:"d1abb290658bc778":hex:"1d9d5c5018f728c2":int:0
BLOWFISH-ECB Decrypt SSLeay reference #27
3:hex:"1c587f1c13924fef":hex:"55cb3774d13ef201":hex:"305532286d6f295a":int:0
BLOWFISH-ECB Decrypt SSLeay reference #28
3:hex:"0101010101010101":hex:"fa34ec4847b268b2":hex:"0123456789abcdef":int:0
BLOWFISH-ECB Decrypt SSLeay reference #29
3:hex:"1f1f1f1f0e0e0e0e":hex:"a790795108ea3cae":hex:"0123456789abcdef":int:0
BLOWFISH-ECB Decrypt SSLeay reference #30
3:hex:"e0fee0fef1fef1fe":hex:"c39e072d9fac631d":hex:"0123456789abcdef":int:0
BLOWFISH-ECB Decrypt SSLeay reference #31
3:hex:"0000000000000000":hex:"014933e0cdaff6e4":hex:"ffffffffffffffff":int:0
BLOWFISH-ECB Decrypt SSLeay reference #32
3:hex:"ffffffffffffffff":hex:"f21e9a77b71c49bc":hex:"0000000000000000":int:0
BLOWFISH-ECB Decrypt SSLeay reference #33
3:hex:"0123456789abcdef":hex:"245946885754369a":hex:"0000000000000000":int:0
BLOWFISH-ECB Decrypt SSLeay reference #34
3:hex:"fedcba9876543210":hex:"6b5c5a9c5d9e0a5a":hex:"ffffffffffffffff":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #1
2:hex:"f0":hex:"fedcba9876543210":hex:"":exp:0
BLOWFISH-SETKEY Setkey SSLeay reference #2
2:hex:"f0e1":hex:"fedcba9876543210":hex:"":exp:0
BLOWFISH-SETKEY Setkey SSLeay reference #3
2:hex:"f0e1d2":hex:"fedcba9876543210":hex:"":exp:0
BLOWFISH-SETKEY Setkey SSLeay reference #4
2:hex:"f0e1d2c3":hex:"fedcba9876543210":hex:"be1e639408640f05":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #5
2:hex:"f0e1d2c3b4":hex:"fedcba9876543210":hex:"b39e44481bdb1e6e":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #6
2:hex:"f0e1d2c3b4a5":hex:"fedcba9876543210":hex:"9457aa83b1928c0d":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #7
2:hex:"f0e1d2c3b4a596":hex:"fedcba9876543210":hex:"8bb77032f960629d":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #8
2:hex:"f0e1d2c3b4a59687":hex:"fedcba9876543210":hex:"e87a244e2cc85e82":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #9
2:hex:"f0e1d2c3b4a5968778":hex:"fedcba9876543210":hex:"15750e7a4f4ec577":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #10
2:hex:"f0e1d2c3b4a596877869":hex:"fedcba9876543210":hex:"122ba70b3ab64ae0":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #11
2:hex:"f0e1d2c3b4a5968778695a":hex:"fedcba9876543210":hex:"3a833c9affc537f6":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #12
2:hex:"f0e1d2c3b4a5968778695a4b":hex:"fedcba9876543210":hex:"9409da87a90f6bf2":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #13
2:hex:"f0e1d2c3b4a5968778695a4b3c":hex:"fedcba9876543210":hex:"884f80625060b8b4":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #14
2:hex:"f0e1d2c3b4a5968778695a4b3c2d":hex:"fedcba9876543210":hex:"1f85031c19e11968":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #15
2:hex:"f0e1d2c3b4a5968778695a4b3c2d1e":hex:"fedcba9876543210":hex:"79d9373a714ca34f":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #16
2:hex:"f0e1d2c3b4a5968778695a4b3c2d1e0f":hex:"fedcba9876543210":hex:"93142887ee3be15c":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #17
2:hex:"f0e1d2c3b4a5968778695a4b3c2d1e0f00":hex:"fedcba9876543210":hex:"03429e838ce2d14b":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #18
2:hex:"f0e1d2c3b4a5968778695a4b3c2d1e0f0011":hex:"fedcba9876543210":hex:"a4299e27469ff67b":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #19
2:hex:"f0e1d2c3b4a5968778695a4b3c2d1e0f001122":hex:"fedcba9876543210":hex:"afd5aed1c1bc96a8":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #20
2:hex:"f0e1d2c3b4a5968778695a4b3c2d1e0f00112233":hex:"fedcba9876543210":hex:"10851c0e3858da9f":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #21
2:hex:"f0e1d2c3b4a5968778695a4b3c2d1e0f0011223344":hex:"fedcba9876543210":hex:"e6f51ed79b9db21f":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #22
2:hex:"f0e1d2c3b4a5968778695a4b3c2d1e0f001122334455":hex:"fedcba9876543210":hex:"64a6e14afd36b46f":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #23
2:hex:"f0e1d2c3b4a5968778695a4b3c2d1e0f00112233445566":hex:"fedcba9876543210":hex:"80c7d7d45a5479ad":int:0
BLOWFISH-SETKEY Setkey SSLeay reference #24
2:hex:"f0e1d2c3b4a5968778695a4b3c2d1e0f0011223344556677":hex:"fedcba9876543210":hex:"05044b62fa52d080":int:0
BLOWFISH-SETKEY Setkey 440 bits
2:hex:"f0e1d2c3b4a5968778695a4b3c2d1e0f00112233445566778899aabbccddeeff0123456789abcdef0102030405060708090a0b0c0d0e0f":hex:"fedcba9876543210":hex:"9a2ab8f1b00c73d2":int:0
BLOWFISH-SETKEY Setkey 448 bits
2:hex:"f0e1d2c3b4a5968778695a4b3c2d1e0f00112233445566778899aabbccddeeff0123456789abcdef0102030405060708090a0b0c0d0e0fff":hex:"fedcba9876543210":hex:"2fb3ab7f0ee91b69":int:0
BLOWFISH-SETKEY Setkey 456 bits
2:hex:"f0e1d2c3b4a5968778695a4b3c2d1e0f00112233445566778899aabbccddeeff0123456789abcdef0102030405060708090a0b0c0d0e0fffff":hex:"fedcba9876543210":hex:"":exp:0
BLOWFISH-CBC Encrypt [#1]
4:hex:"0123456789ABCDEFF0E1D2C3B4A59687":hex:"FEDCBA9876543210":hex:"37363534333231204E6F77206973207468652074696D6520666F722000000000":hex:"6b77b4d63006dee605b156e27403979358deb9e7154616d959f1652bd5ff92cc":int:0
BLOWFISH-CBC Decrypt [#1]
5:hex:"0123456789ABCDEFF0E1D2C3B4A59687":hex:"FEDCBA9876543210":hex:"6B77B4D63006DEE605B156E27403979358DEB9E7154616D959F1652BD5FF92CC":hex:"37363534333231204e6f77206973207468652074696d6520666f722000000000":int:0
BLOWFISH-CBC Encrypt [#2]
4:hex:"0123456789ABCDEFF0E1D2C3B4A59687":hex:"FEDCBA9876543210":hex:"37363534333231204E6F77206973207468652074696D6520666F7220000000":hex:"":exp:1
BLOWFISH-CBC Decrypt [#2]
5:hex:"0123456789ABCDEFF0E1D2C3B4A59687":hex:"FEDCBA9876543210":hex:"6B77B4D63006DEE605B156E27403979358DEB9E7154616D959F1652BD5FF92CC00":hex:"":exp:1
BLOWFISH-CFB Encrypt
6:hex:"0123456789ABCDEFF0E1D2C3B4A59687":hex:"FEDCBA9876543210":hex:"37363534333231204E6F77206973207468652074696D6520666F722000":hex:"e73214a2822139caf26ecf6d2eb9e76e3da3de04d1517200519d57a6c3"
BLOWFISH-CFB Decrypt
7:hex:"0123456789ABCDEFF0E1D2C3B4A59687":hex:"FEDCBA9876543210":hex:"E73214A2822139CAF26ECF6D2EB9E76E3DA3DE04D1517200519D57A6C3":hex:"37363534333231204e6f77206973207468652074696d6520666f722000"
BLOWFISH-CTR Encrypt
8:hex:"0123456789ABCDEFF0E1D2C3B4A59687":hex:"FEDCBA9876543210":hex:"37363534333231204E6F77206973207468652074696D6520666F722000":hex:"e73214a2822139ca60254740dd8c5b8acf5e9569c4affeb944b8fc020e"
BLOWFISH-CTR Decrypt
8:hex:"0123456789ABCDEFF0E1D2C3B4A59687":hex:"FEDCBA9876543210":hex:"e73214a2822139ca60254740dd8c5b8acf5e9569c4affeb944b8fc020e":hex:"37363534333231204e6f77206973207468652074696d6520666f722000"
| 13,587 | 316 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_pem.datax | Standard PEM write
0:char*:"-----START TEST-----\n":char*:"-----END TEST-----\n":hex:"000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F":char*:"-----START TEST-----\nAAECAwQFBgcICQoLDA0ODwABAgMEBQYHCAkKCwwNDg8=\n-----END TEST-----\n"
PEM write (zero data)
0:char*:"-----START TEST-----\n":char*:"-----END TEST-----\n":hex:"":char*:"-----START TEST-----\n-----END TEST-----\n"
PEM write (one byte)
0:char*:"-----START TEST-----\n":char*:"-----END TEST-----\n":hex:"00":char*:"-----START TEST-----\nAA==\n-----END TEST-----\n"
PEM write (more than line size)
0:char*:"-----START TEST-----\n":char*:"-----END TEST-----\n":hex:"000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F":char*:"-----START TEST-----\nAAECAwQFBgcICQoLDA0ODwABAgMEBQYHCAkKCwwNDg8AAQIDBAUGBwgJCgsMDQ4P\nAAECAwQFBgcICQoLDA0ODwABAgMEBQYHCAkKCwwNDg8=\n-----END TEST-----\n"
PEM write (exactly two lines)
0:char*:"-----START TEST-----\n":char*:"-----END TEST-----\n":hex:"000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F":char*:"-----START TEST-----\nAAECAwQFBgcICQoLDA0ODwABAgMEBQYHCAkKCwwNDg8AAQIDBAUGBwgJCgsMDQ4P\nAAECAwQFBgcICQoLDA0ODwABAgMEBQYHCAkKCwwNDg8AAQIDBAUGBwgJCgsMDQ4P\n-----END TEST-----\n"
PEM write (exactly two lines + 1)
0:char*:"-----START TEST-----\n":char*:"-----END TEST-----\n":hex:"000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F00":char*:"-----START TEST-----\nAAECAwQFBgcICQoLDA0ODwABAgMEBQYHCAkKCwwNDg8AAQIDBAUGBwgJCgsMDQ4P\nAAECAwQFBgcICQoLDA0ODwABAgMEBQYHCAkKCwwNDg8AAQIDBAUGBwgJCgsMDQ4P\nAA==\n-----END TEST-----\n"
PEM read (DES-EDE3-CBC + invalid iv)
1:char*:"^":char*:"$":char*:"^\nProc-Type\: 4,ENCRYPTED\nDEK-Info\: DES-EDE3-CBC,00$":char*:"pwd":exp:0
PEM read (DES-CBC + invalid iv)
1:char*:"^":char*:"$":char*:"^\nProc-Type\: 4,ENCRYPTED\nDEK-Info\: DES-CBC,00$":char*:"pwd":exp:0
PEM read (unknown encryption algorithm)
1:char*:"^":char*:"$":char*:"^\nProc-Type\: 4,ENCRYPTED\nDEK-Info\: AES-,00$":char*:"pwd":exp:1
PEM read (malformed PEM DES-CBC)
depends_on:0:1
1:char*:"-----BEGIN EC PRIVATE KEY-----":char*:"-----END EC PRIVATE KEY-----":char*:"-----BEGIN EC PRIVATE KEY-----\nProc-Type\: 4,ENCRYPTED\nDEK-Info\: DES-CBC,AA94892A169FA426\n\nMAAA\n-----END EC PRIVATE KEY-----":char*:"pwd":exp:2
PEM read (malformed PEM DES-EDE3-CBC)
depends_on:0:1
1:char*:"-----BEGIN EC PRIVATE KEY-----":char*:"-----END EC PRIVATE KEY-----":char*:"-----BEGIN EC PRIVATE KEY-----\nProc-Type\: 4,ENCRYPTED\nDEK-Info\: DES-EDE3-CBC,AA94892A169FA426\n\nMAAA\n-----END EC PRIVATE KEY-----":char*:"pwd":exp:2
PEM read (malformed PEM AES-128-CBC)
depends_on:2:1
1:char*:"-----BEGIN EC PRIVATE KEY-----":char*:"-----END EC PRIVATE KEY-----":char*:"-----BEGIN EC PRIVATE KEY-----\nProc-Type\: 4,ENCRYPTED\nDEK-Info\: AES-128-CBC,AA94892A169FA426AA94892A169FA426\n\nMAAA\n-----END EC PRIVATE KEY-----":char*:"pwd":exp:3
| 3,227 | 40 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_poly1305.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_poly1305.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_poly1305.function
* Test suite data : suites/test_suite_poly1305.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_POLY1305_C)
#include "third_party/mbedtls/poly1305.h"
void test_mbedtls_poly1305( data_t *key, data_t *expected_mac, data_t *src_str )
{
unsigned char mac[16]; /* size set by the standard */
mbedtls_poly1305_context ctx;
memset( mac, 0x00, sizeof( mac ) );
/*
* Test the integrated API
*/
TEST_ASSERT( mbedtls_poly1305_mac( key->x, src_str->x,
src_str->len, mac ) == 0 );
ASSERT_COMPARE( mac, expected_mac->len,
expected_mac->x, expected_mac->len );
/*
* Test the streaming API
*/
mbedtls_poly1305_init( &ctx );
TEST_ASSERT( mbedtls_poly1305_starts( &ctx, key->x ) == 0 );
TEST_ASSERT( mbedtls_poly1305_update( &ctx, src_str->x, src_str->len ) == 0 );
TEST_ASSERT( mbedtls_poly1305_finish( &ctx, mac ) == 0 );
ASSERT_COMPARE( mac, expected_mac->len,
expected_mac->x, expected_mac->len );
/*
* Test the streaming API again, piecewise
*/
/* Don't free/init the context, in order to test that starts() does the
* right thing. */
if( src_str->len >= 1 )
{
TEST_ASSERT( mbedtls_poly1305_starts( &ctx, key->x ) == 0 );
TEST_ASSERT( mbedtls_poly1305_update( &ctx, src_str->x, 1 ) == 0 );
TEST_ASSERT( mbedtls_poly1305_update( &ctx, src_str->x + 1, src_str->len - 1 ) == 0 );
TEST_ASSERT( mbedtls_poly1305_finish( &ctx, mac ) == 0 );
ASSERT_COMPARE( mac, expected_mac->len,
expected_mac->x, expected_mac->len );
}
/*
* Again with more pieces
*/
if( src_str->len >= 2 )
{
TEST_ASSERT( mbedtls_poly1305_starts( &ctx, key->x ) == 0 );
TEST_ASSERT( mbedtls_poly1305_update( &ctx, src_str->x, 1 ) == 0 );
TEST_ASSERT( mbedtls_poly1305_update( &ctx, src_str->x + 1, 1 ) == 0 );
TEST_ASSERT( mbedtls_poly1305_update( &ctx, src_str->x + 2, src_str->len - 2 ) == 0 );
TEST_ASSERT( mbedtls_poly1305_finish( &ctx, mac ) == 0 );
ASSERT_COMPARE( mac, expected_mac->len,
expected_mac->x, expected_mac->len );
}
mbedtls_poly1305_free( &ctx );
exit:
;
}
void test_mbedtls_poly1305_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
test_mbedtls_poly1305( &data0, &data2, &data4 );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_poly1305_bad_params()
{
unsigned char src[1];
unsigned char key[32];
unsigned char mac[16];
size_t src_len = sizeof( src );
mbedtls_poly1305_context ctx;
TEST_INVALID_PARAM( mbedtls_poly1305_init( NULL ) );
TEST_VALID_PARAM( mbedtls_poly1305_free( NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_poly1305_starts( NULL, key ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_poly1305_starts( &ctx, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_poly1305_update( NULL, src, 0 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_poly1305_update( &ctx, NULL, src_len ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_poly1305_finish( NULL, mac ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_poly1305_finish( &ctx, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_poly1305_mac( NULL, src, 0, mac ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_poly1305_mac( key, NULL, src_len, mac ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_poly1305_mac( key, src, 0, NULL ) );
exit:
return;
}
void test_poly1305_bad_params_wrapper( void ** params )
{
(void)params;
test_poly1305_bad_params( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
#if defined(MBEDTLS_SELF_TEST)
void test_poly1305_selftest()
{
TEST_ASSERT( mbedtls_poly1305_self_test( 1 ) == 0 );
exit:
;
}
void test_poly1305_selftest_wrapper( void ** params )
{
(void)params;
test_poly1305_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_POLY1305_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_POLY1305_C)
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_POLY1305_C)
case 0:
{
#if defined(MBEDTLS_SELF_TEST)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_POLY1305_C)
test_mbedtls_poly1305_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_POLY1305_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_poly1305_bad_params_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_POLY1305_C) && defined(MBEDTLS_SELF_TEST)
test_poly1305_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_poly1305.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 12,567 | 427 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_pk.datax | PK invalid parameters
3
PK valid parameters
1
PK write valid parameters
depends_on:0
2:hex:"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"
PK utils: RSA 512-bit
depends_on:0:1
4:exp:0:int:512:int:512:int:64:char*:"RSA"
PK utils: ECKEY SECP192R1
depends_on:2:3
4:exp:1:exp:2:int:192:int:24:char*:"EC"
PK utils: ECKEY_DH SECP192R1
depends_on:2:3
4:exp:3:exp:2:int:192:int:24:char*:"EC_DH"
PK utils: ECKEY_DH Curve25519
depends_on:2:4
4:exp:3:exp:4:int:255:int:32:char*:"EC_DH"
PK utils: ECKEY_DH Curve448
depends_on:2:5
4:exp:3:exp:5:int:448:int:56:char*:"EC_DH"
PK utils: ECDSA SECP192R1
depends_on:6:3
4:exp:6:exp:2:int:192:int:24:char*:"ECDSA"
PK utils: ECDSA SECP256R1
depends_on:6:7
4:exp:6:exp:7:int:256:int:32:char*:"ECDSA"
PK utils: ECDSA SECP384R1
depends_on:6:8
4:exp:6:exp:8:int:384:int:48:char*:"ECDSA"
PK utils: ECDSA SECP521R1
depends_on:6:9
4:exp:6:exp:9:int:521:int:66:char*:"ECDSA"
PK PSA utilities: setup/free, info functions, unsupported operations
0
RSA verify test vector #1 (good)
depends_on:10:11
6:hex:"206ef4bf396c6087f8229ef196fd35f37ccb8de5efcdb238f20d556668f114257a11fbe038464a67830378e62ae9791453953dac1dbd7921837ba98e84e856eb80ed9487e656d0b20c28c8ba5e35db1abbed83ed1c7720a97701f709e3547a4bfcabca9c89c57ad15c3996577a0ae36d7c7b699035242f37954646c1cd5c08ac":exp:10:int:1024:int:16:char*:"e28a13548525e5f36dccb24ecb7cc332cc689dfd64012604c9c7816d72a16c3f5fcdc0e86e7c03280b1c69b586ce0cd8aec722cc73a5d3b730310bf7dfebdc77ce5d94bbc369dc18a2f7b07bd505ab0f82224aef09fdc1e5063234255e0b3c40a52e9e8ae60898eb88a766bdd788fe9493d8fd86bcdd2884d5c06216c65469e5":int:16:char*:"3":hex:"5abc01f5de25b70867ff0c24e222c61f53c88daf42586fddcd56f3c4588f074be3c328056c063388688b6385a8167957c6e5355a510e005b8a851d69c96b36ec6036644078210e5d7d326f96365ee0648882921492bc7b753eb9c26cdbab37555f210df2ca6fec1b25b463d38b81c0dcea202022b04af5da58aa03d77be949b7":int:0
RSA verify test vector #2 (bad)
depends_on:10:11
6:hex:"d6248c3e96b1a7e5fea978870fcc4c9786b4e5156e16b7faef4557d667f730b8bc4c784ef00c624df5309513c3a5de8ca94c2152e0459618666d3148092562ebc256ffca45b27fd2d63c68bd5e0a0aefbe496e9e63838a361b1db6fc272464f191490bf9c029643c49d2d9cd08833b8a70b4b3431f56fb1eb55ccd39e77a9c92":exp:10:int:1024:int:16:char*:"e28a13548525e5f36dccb24ecb7cc332cc689dfd64012604c9c7816d72a16c3f5fcdc0e86e7c03280b1c69b586ce0cd8aec722cc73a5d3b730310bf7dfebdc77ce5d94bbc369dc18a2f7b07bd505ab0f82224aef09fdc1e5063234255e0b3c40a52e9e8ae60898eb88a766bdd788fe9493d8fd86bcdd2884d5c06216c65469e5":int:16:char*:"3":hex:"3203b7647fb7e345aa457681e5131777f1adc371f2fba8534928c4e52ef6206a856425d6269352ecbf64db2f6ad82397768cafdd8cd272e512d617ad67992226da6bc291c31404c17fd4b7e2beb20eff284a44f4d7af47fd6629e2c95809fa7f2241a04f70ac70d3271bb13258af1ed5c5988c95df7fa26603515791075feccd":exp:11
ECDSA verify test vector #1 (good)
depends_on:3
8:exp:6:exp:2:hex:"046FDD3028FA94A863CD4F78DBFF8B3AA561FC6D9CCBBCA88E0AE6FA437F5415F957542D0717FF8B84562DAE99872EF841":hex:"546869732073686F756C64206265207468652068617368206F662061206D6573736167652E00":hex:"30350218185B2A7FB5CD9C9A8488B119B68B47D6EC833509CE9FA1FF021900FB7D259A744A2348BD45D241A39DC915B81CC2084100FA24":int:0
ECDSA verify test vector #2 (bad)
depends_on:3
8:exp:6:exp:2:hex:"046FDD3028FA94A863CD4F78DBFF8B3AA561FC6D9CCBBCA88E0AE6FA437F5415F957542D0717FF8B84562DAE99872EF841":hex:"546869732073686F756C64206265207468652068617368206F662061206D6573736167652E00":hex:"30350218185B2A7FB5CD9C9A8488B119B68B47D6EC833509CE9FA1FF021900FB7D259A744A2348BD45D241A39DC915B81CC2084100FA25":exp:12
EC(DSA) verify test vector #1 (good)
depends_on:3
8:exp:1:exp:2:hex:"046FDD3028FA94A863CD4F78DBFF8B3AA561FC6D9CCBBCA88E0AE6FA437F5415F957542D0717FF8B84562DAE99872EF841":hex:"546869732073686F756C64206265207468652068617368206F662061206D6573736167652E00":hex:"30350218185B2A7FB5CD9C9A8488B119B68B47D6EC833509CE9FA1FF021900FB7D259A744A2348BD45D241A39DC915B81CC2084100FA24":int:0
EC(DSA) verify test vector #2 (bad)
depends_on:3
8:exp:1:exp:2:hex:"046FDD3028FA94A863CD4F78DBFF8B3AA561FC6D9CCBBCA88E0AE6FA437F5415F957542D0717FF8B84562DAE99872EF841":hex:"546869732073686F756C64206265207468652068617368206F662061206D6573736167652E00":hex:"30350218185B2A7FB5CD9C9A8488B119B68B47D6EC833509CE9FA1FF021900FB7D259A744A2348BD45D241A39DC915B81CC2084100FA25":exp:12
EC(DSA) verify test vector: good, bitlen(r) = 256
depends_on:7
8:exp:1:exp:7:hex:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":hex:"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":hex:"3046022100faecc085c6c5362b91ff1fd6dd77da80bc071bee9ff1ac0ef9509c017f13267c022100a7d0b908c938d3dd6c6a9cdc5b0a4a4ee455c519c1ff6cda959806b7e7461ba0":int:0
EC(DSA) verify test vector: good, bitlen(r) = 255
depends_on:7
8:exp:1:exp:7:hex:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":hex:"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":hex:"30450220639f36215b2ff09bb2beb871e122de74c8d5e29ce8a105aa2b95661f42803e72022100becd8f81b2c186f9d5d2c92378d7b9452ce6de231b0c8d17bac2d8537d2331fd":int:0
EC(DSA) verify test vector: good, bitlen(r) = 248
depends_on:7
8:exp:1:exp:7:hex:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":hex:"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":hex:"30450220009109f967f9082abc9c46e5ea07936529b82023a1a49b872c046f430983db2602210085f0b1960d61f8d75109b5b7ff991d3171320d2ab547104f864048455a965090":int:0
EC(DSA) verify test vector: good, bitlen(r) = 247
depends_on:7
8:exp:1:exp:7:hex:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":hex:"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":hex:"3044021f461786833b50247b07194da6cedbd3caefbcd19c73b6283ccff5097cd0d73b022100d85d20b0b8c3b596eb1cdb0381e681fa0a8bccde4e89c139020af3b0f88e099c":int:0
EC(DSA) verify test vector: good, bitlen(s) = 256
depends_on:7
8:exp:1:exp:7:hex:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":hex:"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":hex:"30450220639f36215b2ff09bb2beb871e122de74c8d5e29ce8a105aa2b95661f42803e72022100becd8f81b2c186f9d5d2c92378d7b9452ce6de231b0c8d17bac2d8537d2331fd":int:0
EC(DSA) verify test vector: good, bitlen(s) = 255
depends_on:7
8:exp:1:exp:7:hex:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":hex:"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":hex:"304402206ae26950c606d08fe5e1682efdccfb3a7213ca46bd523ffd20c4213fe1400d3402207612106ada7055926167650b257da7f4c42c190b8aa9e3b680f8751fe90c63a5":int:0
EC(DSA) verify test vector: good, bitlen(s) = 248
depends_on:7
8:exp:1:exp:7:hex:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":hex:"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":hex:"3045022100fd4d718ab483827492e10b89745fad100d2dd257102b99aff179ee596a569f1f022000a1b777e32a8b4909763b615b805e59194e6196eb05719287a36eb5f17aa485":int:0
EC(DSA) verify test vector: good, bitlen(s) = 247
depends_on:7
8:exp:1:exp:7:hex:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":hex:"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":hex:"30430220685a6994daa6a14e4411b5267edc2a00beee907f2dddd956b2a5a1df791c15f8021f675db4538c000c734489ac737fddd5a739c5a23cd6c6eceea70c286ca4fac9":int:0
ECDSA sign-verify: SECP192R1
depends_on:6:3
10:exp:6:exp:2:int:0:int:0
ECDSA sign-verify: SECP256R1
depends_on:6:7
10:exp:6:exp:7:int:0:int:0
ECDSA sign-verify: SECP384R1
depends_on:6:8
10:exp:6:exp:8:int:0:int:0
ECDSA sign-verify: SECP521R1
depends_on:6:9
10:exp:6:exp:9:int:0:int:0
ECDSA sign-verify: BP256R1
depends_on:6:12
10:exp:6:exp:13:int:0:int:0
ECDSA sign-verify: BP512R1
depends_on:6:13
10:exp:6:exp:14:int:0:int:0
EC(DSA) sign-verify: SECP192R1
depends_on:6:3
10:exp:1:exp:2:int:0:int:0
EC_DH (no) sign-verify: SECP192R1
depends_on:2:3
10:exp:3:exp:2:exp:15:exp:15
RSA sign-verify
depends_on:0:11:1
10:exp:0:int:512:int:0:int:0
RSA encrypt test vector
depends_on:11
11:hex:"4E636AF98E40F3ADCFCCB698F4E80B9F":int:2048:int:16:char*:"b38ac65c8141f7f5c96e14470e851936a67bf94cc6821a39ac12c05f7c0b06d9e6ddba2224703b02e25f31452f9c4a8417b62675fdc6df46b94813bc7b9769a892c482b830bfe0ad42e46668ace68903617faf6681f4babf1cc8e4b0420d3c7f61dc45434c6b54e2c3ee0fc07908509d79c9826e673bf8363255adb0add2401039a7bcd1b4ecf0fbe6ec8369d2da486eec59559dd1d54c9b24190965eafbdab203b35255765261cd0909acf93c3b8b8428cbb448de4715d1b813d0c94829c229543d391ce0adab5351f97a3810c1f73d7b1458b97daed4209c50e16d064d2d5bfda8c23893d755222793146d0a78c3d64f35549141486c3b0961a7b4c1a2034f":int:16:char*:"3":hex:"b0c0b193ba4a5b4502bfacd1a9c2697da5510f3e3ab7274cf404418afd2c62c89b98d83bbc21c8c1bf1afe6d8bf40425e053e9c03e03a3be0edbe1eda073fade1cc286cc0305a493d98fe795634c3cad7feb513edb742d66d910c87d07f6b0055c3488bb262b5fd1ce8747af64801fb39d2d3a3e57086ffe55ab8d0a2ca86975629a0f85767a4990c532a7c2dab1647997ebb234d0b28a0008bfebfc905e7ba5b30b60566a5e0190417465efdbf549934b8f0c5c9f36b7c5b6373a47ae553ced0608a161b1b70dfa509375cf7a3598223a6d7b7a1d1a06ac74d345a9bb7c0e44c8388858a4f1d8115f2bd769ffa69020385fa286302c80e950f9e2751308666c":int:0
RSA decrypt test vector #1
depends_on:11
12:hex:"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":int:2048:int:16:char*:"e79a373182bfaa722eb035f772ad2a9464bd842de59432c18bbab3a7dfeae318c9b915ee487861ab665a40bd6cda560152578e8579016c929df99fea05b4d64efca1d543850bc8164b40d71ed7f3fa4105df0fb9b9ad2a18ce182c8a4f4f975bea9aa0b9a1438a27a28e97ac8330ef37383414d1bd64607d6979ac050424fd17":int:16:char*:"c6749cbb0db8c5a177672d4728a8b22392b2fc4d3b8361d5c0d5055a1b4e46d821f757c24eef2a51c561941b93b3ace7340074c058c9bb48e7e7414f42c41da4cccb5c2ba91deb30c586b7fb18af12a52995592ad139d3be429add6547e044becedaf31fa3b39421e24ee034fbf367d11f6b8f88ee483d163b431e1654ad3e89":int:16:char*:"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":int:16:char*:"3":hex:"4E636AF98E40F3ADCFCCB698F4E80B9F":int:0
RSA decrypt test vector #2
depends_on:11
12:hex:"a42eda41e56235e666e7faaa77100197f657288a1bf183e4820f0c37ce2c456b960278d6003e0bbcd4be4a969f8e8fd9231e1f492414f00ed09844994c86ec32db7cde3bec7f0c3dbf6ae55baeb2712fa609f5fc3207a824eb3dace31849cd6a6084318523912bccb84cf42e3c6d6d1685131d69bb545acec827d2b0dfdd5568b7dcc4f5a11d6916583fefa689d367f8c9e1d95dcd2240895a9470b0c1730f97cd6e8546860bd254801769f54be96e16362ddcbf34d56035028890199e0f48db38642cb66a4181e028a6443a404feb284ce02b4614b683367d40874e505611d23142d49f06feea831d52d347b13610b413c4efc43a6de9f0b08d2a951dc503b6":int:2048:int:16:char*:"e79a373182bfaa722eb035f772ad2a9464bd842de59432c18bbab3a7dfeae318c9b915ee487861ab665a40bd6cda560152578e8579016c929df99fea05b4d64efca1d543850bc8164b40d71ed7f3fa4105df0fb9b9ad2a18ce182c8a4f4f975bea9aa0b9a1438a27a28e97ac8330ef37383414d1bd64607d6979ac050424fd17":int:16:char*:"c6749cbb0db8c5a177672d4728a8b22392b2fc4d3b8361d5c0d5055a1b4e46d821f757c24eef2a51c561941b93b3ace7340074c058c9bb48e7e7414f42c41da4cccb5c2ba91deb30c586b7fb18af12a52995592ad139d3be429add6547e044becedaf31fa3b39421e24ee034fbf367d11f6b8f88ee483d163b431e1654ad3e89":int:16:char*:"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":int:16:char*:"3":hex:"4E636AF98E40F3ADCFCCB698F4E80B9F":exp:16
EC nocrypt
depends_on:2
13:exp:1
EC-DH nocrypt
depends_on:2
13:exp:3
ECDSA nocrypt
depends_on:6
13:exp:6
RSA_ALT consistency
depends_on:0:11:1
15
Verify ext RSA #1 (PKCS1 v2.1, salt_len = ANY, OK)
depends_on:14:15
7:hex:"54657374206d657373616765":exp:17:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":hex:"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":exp:18:exp:17:exp:19:int:0
Verify ext RSA #2 (PKCS1 v2.1, salt_len = ANY, wrong message)
depends_on:14:15
7:hex:"54657374206d657373616766":exp:17:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":hex:"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":exp:18:exp:17:exp:19:exp:11
Verify ext RSA #3 (PKCS1 v2.1, salt_len = 0, OK)
depends_on:14:15
7:hex:"54657374206d657373616765":exp:17:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":hex:"7fc506d26ca3b22922a1ce39faaedd273161b82d9443c56f1a034f131ae4a18cae1474271cb4b66a17d9707ca58b0bdbd3c406b7e65bbcc9bbbce94dc45de807b4989b23b3e4db74ca29298137837eb90cc83d3219249bc7d480fceaf075203a86e54c4ecfa4e312e39f8f69d76534089a36ed9049ca9cfd5ab1db1fa75fe5c8":exp:18:exp:17:int:0:int:0
Verify ext RSA #4 (PKCS1 v2.1, salt_len = max, OK)
depends_on:14:15
7:hex:"54657374206d657373616765":exp:17:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":hex:"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":exp:18:exp:17:int:94:int:0
Verify ext RSA #5 (PKCS1 v2.1, wrong salt_len)
depends_on:14:15
7:hex:"54657374206d657373616765":exp:17:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":hex:"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":exp:18:exp:17:int:32:exp:16
Verify ext RSA #6 (PKCS1 v2.1, MGF1 alg != MSG hash alg)
depends_on:14:15
7:hex:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":exp:20:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":hex:"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":exp:18:exp:17:exp:19:int:0
Verify ext RSA #7 (PKCS1 v2.1, wrong MGF1 alg != MSG hash alg)
depends_on:14:15:10
7:hex:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":exp:20:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":hex:"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":exp:18:exp:10:exp:19:exp:16
Verify ext RSA #8 (PKCS1 v2.1, RSASSA-PSS without options)
depends_on:14:15
7:hex:"54657374206d657373616765":exp:17:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":hex:"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":exp:18:exp:21:exp:19:exp:22
Verify ext RSA #9 (PKCS1 v1.5, RSA with options)
depends_on:11:15
7:hex:"54657374206d657373616765":exp:17:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":hex:"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":exp:0:exp:17:exp:19:exp:22
Verify ext RSA #10 (PKCS1 v1.5, RSA without options)
depends_on:11:15
7:hex:"54657374206d657373616765":exp:17:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":hex:"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":exp:0:exp:21:exp:19:exp:11
Verify ext RSA #11 (PKCS1 v2.1, asking for ECDSA)
depends_on:6:15
7:hex:"54657374206d657373616765":exp:17:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":hex:"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":exp:6:exp:21:exp:19:exp:15
Verify ext RSA #12 (PKCS1 v1.5, good)
depends_on:10:11
7:hex:"206ef4bf396c6087f8229ef196fd35f37ccb8de5efcdb238f20d556668f114257a11fbe038464a67830378e62ae9791453953dac1dbd7921837ba98e84e856eb80ed9487e656d0b20c28c8ba5e35db1abbed83ed1c7720a97701f709e3547a4bfcabca9c89c57ad15c3996577a0ae36d7c7b699035242f37954646c1cd5c08ac":exp:10:int:1024:int:16:char*:"e28a13548525e5f36dccb24ecb7cc332cc689dfd64012604c9c7816d72a16c3f5fcdc0e86e7c03280b1c69b586ce0cd8aec722cc73a5d3b730310bf7dfebdc77ce5d94bbc369dc18a2f7b07bd505ab0f82224aef09fdc1e5063234255e0b3c40a52e9e8ae60898eb88a766bdd788fe9493d8fd86bcdd2884d5c06216c65469e5":int:16:char*:"3":hex:"5abc01f5de25b70867ff0c24e222c61f53c88daf42586fddcd56f3c4588f074be3c328056c063388688b6385a8167957c6e5355a510e005b8a851d69c96b36ec6036644078210e5d7d326f96365ee0648882921492bc7b753eb9c26cdbab37555f210df2ca6fec1b25b463d38b81c0dcea202022b04af5da58aa03d77be949b7":exp:0:exp:21:exp:19:int:0
Check pair #1 (EC, OK)
depends_on:2:7
5:char*:"/zip/third_party/mbedtls/test/data/ec_256_pub.pem":char*:"/zip/third_party/mbedtls/test/data/ec_256_prv.pem":int:0
Check pair #2 (EC, bad)
depends_on:2:7
5:char*:"/zip/third_party/mbedtls/test/data/ec_256_pub.pem":char*:"/zip/third_party/mbedtls/test/data/server5.key":exp:23
Check pair #3 (RSA, OK)
depends_on:0:11
5:char*:"/zip/third_party/mbedtls/test/data/server1.pubkey":char*:"/zip/third_party/mbedtls/test/data/server1.key":int:0
Check pair #4 (RSA, bad)
depends_on:0:11
5:char*:"/zip/third_party/mbedtls/test/data/server1.pubkey":char*:"/zip/third_party/mbedtls/test/data/server2.key":exp:24
Check pair #5 (RSA vs EC)
depends_on:2:7:0
5:char*:"/zip/third_party/mbedtls/test/data/ec_256_pub.pem":char*:"/zip/third_party/mbedtls/test/data/server1.key":exp:15
RSA hash_len overflow (size_t vs unsigned int)
depends_on:0:16
14
ECDSA restartable sign/verify: ECDSA, max_ops=0 (disabled)
depends_on:7:15
9:exp:6:exp:7:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":char*:"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":char*:"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":exp:17:char*:"test":hex:"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":int:0:int:0:int:0
ECDSA restartable sign/verify: ECKEY, max_ops=0 (disabled)
depends_on:7:15
9:exp:1:exp:7:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":char*:"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":char*:"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":exp:17:char*:"test":hex:"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":int:0:int:0:int:0
ECDSA restartable sign/verify: ECDSA, max_ops=1
depends_on:7:15
9:exp:6:exp:7:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":char*:"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":char*:"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":exp:17:char*:"test":hex:"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":int:1:int:1:int:10000
ECDSA restartable sign/verify: ECKEY, max_ops=1
depends_on:7:15
9:exp:1:exp:7:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":char*:"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":char*:"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":exp:17:char*:"test":hex:"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":int:1:int:1:int:10000
ECDSA restartable sign/verify: ECDSA, max_ops=10000
depends_on:7:15
9:exp:6:exp:7:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":char*:"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":char*:"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":exp:17:char*:"test":hex:"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":int:10000:int:0:int:0
ECDSA restartable sign/verify: ECKEY, max_ops=10000
depends_on:7:15
9:exp:1:exp:7:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":char*:"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":char*:"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":exp:17:char*:"test":hex:"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":int:10000:int:0:int:0
ECDSA restartable sign/verify: ECDSA, max_ops=250
depends_on:7:15
9:exp:6:exp:7:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":char*:"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":char*:"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":exp:17:char*:"test":hex:"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":int:250:int:2:int:64
ECDSA restartable sign/verify: ECKEY, max_ops=250
depends_on:7:15
9:exp:1:exp:7:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":char*:"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":char*:"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":exp:17:char*:"test":hex:"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":int:250:int:2:int:64
PSA wrapped sign: SECP256R1
depends_on:7
16:exp:7:exp:25:int:256
PSA wrapped sign: SECP384R1
depends_on:8
16:exp:8:exp:25:int:384
PSA wrapped sign: SECP521R1
depends_on:9
16:exp:9:exp:25:int:521
PSA wrapped sign: SECP192K1
depends_on:17
16:exp:26:exp:27:int:192
PSA wrapped sign: SECP256K1
depends_on:18
16:exp:28:exp:27:int:256
PSA wrapped sign: BP256R1
depends_on:12
16:exp:13:exp:29:int:256
PSA wrapped sign: BP384R1
depends_on:19
16:exp:30:exp:29:int:384
PSA wrapped sign: BP512R1
depends_on:13
16:exp:14:exp:29:int:512
| 29,618 | 306 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.des.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_cipher.des.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_cipher.function
* Test suite data : suites/test_suite_cipher.des.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_CIPHER_C)
#include "third_party/mbedtls/cipher.h"
#if defined(MBEDTLS_AES_C)
#include "third_party/mbedtls/aes.h"
#endif
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
#endif
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
#define MBEDTLS_CIPHER_AUTH_CRYPT
#endif
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
/* Helper for resetting key/direction
*
* The documentation doesn't explicitly say whether calling
* mbedtls_cipher_setkey() twice is allowed or not. This currently works with
* the default software implementation, but only by accident. It isn't
* guaranteed to work with new ciphers or with alternative implementations of
* individual ciphers, and it doesn't work with the PSA wrappers. So don't do
* it, and instead start with a fresh context.
*/
static int cipher_reset_key( mbedtls_cipher_context_t *ctx, int cipher_id,
int use_psa, size_t tag_len, const data_t *key, int direction )
{
mbedtls_cipher_free( ctx );
mbedtls_cipher_init( ctx );
TEST_ASSERT( 0 == mbedtls_cipher_setup( ctx, mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( ctx, key->x, 8 * key->len, direction ) );
return( 1 );
exit:
return( 0 );
}
/*
* Check if a buffer is all-0 bytes:
* return 1 if it is,
* 0 if it isn't.
*/
int buffer_is_all_zero( const uint8_t *buf, size_t size )
{
for( size_t i = 0; i < size; i++ )
if( buf[i] != 0 )
return 0;
return 1;
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_mbedtls_cipher_list( )
{
const int *cipher_type;
for( cipher_type = mbedtls_cipher_list(); *cipher_type != 0; cipher_type++ )
TEST_ASSERT( mbedtls_cipher_info_from_type( *cipher_type ) != NULL );
exit:
;
}
void test_mbedtls_cipher_list_wrapper( void ** params )
{
(void)params;
test_mbedtls_cipher_list( );
}
void test_cipher_invalid_param_unconditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_cipher_context_t invalid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
mbedtls_cipher_init( &valid_ctx );
mbedtls_cipher_setup( &valid_ctx, valid_info );
mbedtls_cipher_init( &invalid_ctx );
/* mbedtls_cipher_setup() */
TEST_ASSERT( mbedtls_cipher_setup( &valid_ctx, NULL ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_get_block_size() */
TEST_ASSERT( mbedtls_cipher_get_block_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_cipher_mode() */
TEST_ASSERT( mbedtls_cipher_get_cipher_mode( &invalid_ctx ) ==
MBEDTLS_MODE_NONE );
/* mbedtls_cipher_get_iv_size() */
TEST_ASSERT( mbedtls_cipher_get_iv_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_type() */
TEST_ASSERT(
mbedtls_cipher_get_type( &invalid_ctx ) ==
MBEDTLS_CIPHER_NONE);
/* mbedtls_cipher_get_name() */
TEST_ASSERT( mbedtls_cipher_get_name( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_key_bitlen() */
TEST_ASSERT( mbedtls_cipher_get_key_bitlen( &invalid_ctx ) ==
MBEDTLS_KEY_LENGTH_NONE );
/* mbedtls_cipher_get_operation() */
TEST_ASSERT( mbedtls_cipher_get_operation( &invalid_ctx ) ==
MBEDTLS_OPERATION_NONE );
/* mbedtls_cipher_setkey() */
TEST_ASSERT(
mbedtls_cipher_setkey( &invalid_ctx,
valid_buffer,
valid_bitlen,
valid_operation ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_set_iv() */
TEST_ASSERT(
mbedtls_cipher_set_iv( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_reset() */
TEST_ASSERT( mbedtls_cipher_reset( &invalid_ctx ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_ASSERT(
mbedtls_cipher_update_ad( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_ASSERT( mbedtls_cipher_set_padding_mode( &invalid_ctx, valid_mode ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif
/* mbedtls_cipher_update() */
TEST_ASSERT(
mbedtls_cipher_update( &invalid_ctx,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_finish() */
TEST_ASSERT(
mbedtls_cipher_finish( &invalid_ctx,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_ASSERT(
mbedtls_cipher_write_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_check_tag() */
TEST_ASSERT(
mbedtls_cipher_check_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
exit:
mbedtls_cipher_free( &invalid_ctx );
mbedtls_cipher_free( &valid_ctx );
}
void test_cipher_invalid_param_unconditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_unconditional( );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_cipher_invalid_param_conditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_operation_t invalid_operation = 100;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
/* mbedtls_cipher_init() */
TEST_VALID_PARAM( mbedtls_cipher_init( &valid_ctx ) );
TEST_INVALID_PARAM( mbedtls_cipher_init( NULL ) );
/* mbedtls_cipher_setup() */
TEST_VALID_PARAM( mbedtls_cipher_setup( &valid_ctx, valid_info ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setup( NULL, valid_info ) );
/* mbedtls_cipher_get_block_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_block_size( NULL ) );
/* mbedtls_cipher_get_cipher_mode() */
TEST_INVALID_PARAM_RET(
MBEDTLS_MODE_NONE,
mbedtls_cipher_get_cipher_mode( NULL ) );
/* mbedtls_cipher_get_iv_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_iv_size( NULL ) );
/* mbedtls_cipher_get_type() */
TEST_INVALID_PARAM_RET(
MBEDTLS_CIPHER_NONE,
mbedtls_cipher_get_type( NULL ) );
/* mbedtls_cipher_get_name() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_name( NULL ) );
/* mbedtls_cipher_get_key_bitlen() */
TEST_INVALID_PARAM_RET(
MBEDTLS_KEY_LENGTH_NONE,
mbedtls_cipher_get_key_bitlen( NULL ) );
/* mbedtls_cipher_get_operation() */
TEST_INVALID_PARAM_RET(
MBEDTLS_OPERATION_NONE,
mbedtls_cipher_get_operation( NULL ) );
/* mbedtls_cipher_setkey() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( NULL,
valid_buffer,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
NULL,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
valid_buffer,
valid_bitlen,
invalid_operation ) );
/* mbedtls_cipher_set_iv() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_reset() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_reset( NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_padding_mode( NULL, valid_mode ) );
#endif
/* mbedtls_cipher_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( NULL,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
NULL, valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
valid_buffer,
NULL ) );
/* mbedtls_cipher_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( NULL,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
valid_buffer,
NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_check_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
/* mbedtls_cipher_crypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_AEAD)
/* mbedtls_cipher_auth_encrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
/* mbedtls_cipher_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
#endif /* defined(MBEDTLS_CIPHER_MODE_AEAD) */
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
/* mbedtls_cipher_auth_encrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
/* mbedtls_cipher_auth_decrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
#endif /* MBEDTLS_CIPHER_MODE_AEAD || MBEDTLS_NIST_KW_C */
/* mbedtls_cipher_free() */
TEST_VALID_PARAM( mbedtls_cipher_free( NULL ) );
exit:
TEST_VALID_PARAM( mbedtls_cipher_free( &valid_ctx ) );
}
void test_cipher_invalid_param_conditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_conditional( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
#if defined(MBEDTLS_AES_C)
void test_cipher_special_behaviours( )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char input[32];
unsigned char output[32];
#if defined (MBEDTLS_CIPHER_MODE_CBC)
unsigned char iv[32];
#endif
size_t olen = 0;
mbedtls_cipher_init( &ctx );
mbedtls_platform_zeroize( input, sizeof( input ) );
mbedtls_platform_zeroize( output, sizeof( output ) );
#if defined(MBEDTLS_CIPHER_MODE_CBC)
memset( iv, 0, sizeof( iv ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_CBC );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* IV too big */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, MBEDTLS_MAX_IV_LENGTH + 1 )
== MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
/* IV too small */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, 0 )
== MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_cipher_free( &ctx );
mbedtls_cipher_init( &ctx );
#endif /* MBEDTLS_CIPHER_MODE_CBC */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_ECB );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* Update ECB with partial block */
TEST_ASSERT( mbedtls_cipher_update( &ctx, input, 1, output, &olen )
== MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED );
exit:
mbedtls_cipher_free( &ctx );
}
void test_cipher_special_behaviours_wrapper( void ** params )
{
(void)params;
test_cipher_special_behaviours( );
}
#endif /* MBEDTLS_AES_C */
void test_enc_dec_buf( int cipher_id, char * cipher_string, int key_len,
int length_val, int pad_mode )
{
size_t length = length_val, outlen, total_len, i, block_size;
unsigned char key[64];
unsigned char iv[16];
unsigned char ad[13];
unsigned char tag[16];
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
/*
* Prepare contexts
*/
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( key, 0x2a, sizeof( key ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( mbedtls_cipher_info_from_string( cipher_string ) == cipher_info );
/* Initialise enc and dec contexts */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
/*
* Do a few encode/decode cycles
*/
for( i = 0; i < 3; i++ )
{
memset( iv , 0x00 + i, sizeof( iv ) );
memset( ad, 0x10 + i, sizeof( ad ) );
memset( inbuf, 0x20 + i, sizeof( inbuf ) );
memset( encbuf, 0, sizeof( encbuf ) );
memset( decbuf, 0, sizeof( decbuf ) );
memset( tag, 0, sizeof( tag ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, ad, sizeof( ad ) - i ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, ad, sizeof( ad ) - i ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, length, encbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_write_tag( &ctx_enc, tag, sizeof( tag ) ) );
#endif
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len > length &&
total_len <= length + block_size ) );
/* decode the previously encoded string */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, total_len, decbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_check_tag( &ctx_dec, tag, sizeof( tag ) ) );
#endif
/* check result */
TEST_ASSERT( total_len == length );
TEST_ASSERT( 0 == timingsafe_bcmp(inbuf, decbuf, length) );
}
/*
* Done
*/
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_wrapper( void ** params )
{
test_enc_dec_buf( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_enc_fail( int cipher_id, int pad_mode, int key_len, int length_val,
int ret )
{
size_t length = length_val;
unsigned char key[32];
unsigned char iv[16];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char inbuf[64];
unsigned char encbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
/* Initialise context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, NULL, 0 ) );
#endif
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, inbuf, length, encbuf, &outlen ) );
TEST_ASSERT( ret == mbedtls_cipher_finish( &ctx, encbuf + outlen, &outlen ) );
/* done */
exit:
mbedtls_cipher_free( &ctx );
}
void test_enc_fail_wrapper( void ** params )
{
test_enc_fail( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_dec_empty_buf( int cipher,
int expected_update_ret,
int expected_finish_ret )
{
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
const mbedtls_cipher_info_t *cipher_info;
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise context */
cipher_info = mbedtls_cipher_info_from_type( cipher );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( sizeof(key) * 8 >= cipher_info->key_bitlen );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec,
key, cipher_info->key_bitlen,
MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
#endif
/* decode 0-byte string */
TEST_ASSERT( expected_update_ret ==
mbedtls_cipher_update( &ctx_dec, encbuf, 0, decbuf, &outlen ) );
TEST_ASSERT( 0 == outlen );
if ( expected_finish_ret == 0 &&
( cipher_info->mode == MBEDTLS_MODE_CBC ||
cipher_info->mode == MBEDTLS_MODE_ECB ) )
{
/* Non-CBC and non-ECB ciphers are OK with decrypting empty buffers and
* return success, not MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED, when
* decrypting an empty buffer.
* On the other hand, CBC and ECB ciphers need a full block of input.
*/
expected_finish_ret = MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED;
}
TEST_ASSERT( expected_finish_ret == mbedtls_cipher_finish(
&ctx_dec, decbuf + outlen, &outlen ) );
TEST_ASSERT( 0 == outlen );
exit:
mbedtls_cipher_free( &ctx_dec );
}
void test_dec_empty_buf_wrapper( void ** params )
{
test_dec_empty_buf( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
void test_enc_dec_buf_multipart( int cipher_id, int key_len, int first_length_val,
int second_length_val, int pad_mode,
int first_encrypt_output_len, int second_encrypt_output_len,
int first_decrypt_output_len, int second_decrypt_output_len )
{
size_t first_length = first_length_val;
size_t second_length = second_length_val;
size_t length = first_length + second_length;
size_t block_size;
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
const mbedtls_cipher_info_t *cipher_info;
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
size_t totaloutlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise enc and dec contexts */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, NULL, 0 ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, first_length, encbuf, &outlen ) );
TEST_ASSERT( (size_t)first_encrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf + first_length, second_length, encbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_encrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen > length &&
totaloutlen <= length + block_size ) );
/* decode the previously encoded string */
second_length = totaloutlen - first_length;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, first_length, decbuf, &outlen ) );
TEST_ASSERT( (size_t)first_decrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf + first_length, second_length, decbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_decrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length );
TEST_ASSERT( 0 == timingsafe_bcmp(inbuf, decbuf, length) );
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_multipart_wrapper( void ** params )
{
test_enc_dec_buf_multipart( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ), *( (int *) params[6] ), *( (int *) params[7] ), *( (int *) params[8] ) );
}
void test_decrypt_test_vec( int cipher_id, int pad_mode, data_t * key,
data_t * iv, data_t * cipher,
data_t * clear, data_t * ad, data_t * tag,
int finish_result, int tag_result )
{
unsigned char output[265];
mbedtls_cipher_context_t ctx;
size_t outlen, total_len;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
#if !defined(MBEDTLS_GCM_C) && !defined(MBEDTLS_CHACHAPOLY_C)
((void) ad);
((void) tag);
#endif
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, MBEDTLS_DECRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( pad_mode != -1 )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv->x, iv->len ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, ad->x, ad->len ) );
#endif
/* decode buffer and check tag->x */
total_len = 0;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, cipher->x, cipher->len, output, &outlen ) );
total_len += outlen;
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( tag_result == mbedtls_cipher_check_tag( &ctx, tag->x, tag->len ) );
#endif
/* check plaintext only if everything went fine */
if( 0 == finish_result && 0 == tag_result )
{
TEST_ASSERT( total_len == clear->len );
TEST_ASSERT( 0 == timingsafe_bcmp( output, clear->x, clear->len ) );
}
exit:
mbedtls_cipher_free( &ctx );
}
void test_decrypt_test_vec_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_decrypt_test_vec( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, &data10, &data12, *( (int *) params[14] ), *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
void test_auth_crypt_tv( int cipher_id, data_t * key, data_t * iv,
data_t * ad, data_t * cipher, data_t * tag,
char * result, data_t * clear, int use_psa )
{
/*
* Take an AEAD ciphertext + tag and perform a pair
* of AEAD decryption and AEAD encryption. Check that
* this results in the expected plaintext, and that
* decryption and encryption are inverse to one another.
*
* Do that twice:
* - once with legacy functions auth_decrypt/auth_encrypt
* - once with new functions auth_decrypt_ext/auth_encrypt_ext
* This allows testing both without duplicating test cases.
*/
int ret;
int using_nist_kw, using_nist_kw_padding;
mbedtls_cipher_context_t ctx;
size_t outlen;
unsigned char *cipher_plus_tag = NULL;
size_t cipher_plus_tag_len;
unsigned char *decrypt_buf = NULL;
size_t decrypt_buf_len = 0;
unsigned char *encrypt_buf = NULL;
size_t encrypt_buf_len = 0;
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
unsigned char *tmp_tag = NULL;
unsigned char *tmp_cipher = NULL;
unsigned char *tag_buf = NULL;
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
/* Null pointers are documented as valid for inputs of length 0.
* The test framework passes non-null pointers, so set them to NULL.
* key, cipher and tag can't be empty. */
if( iv->len == 0 )
iv->x = NULL;
if( ad->len == 0 )
ad->x = NULL;
if( clear->len == 0 )
clear->x = NULL;
mbedtls_cipher_init( &ctx );
/*
* Are we using NIST_KW? with padding?
*/
using_nist_kw_padding = cipher_id == MBEDTLS_CIPHER_AES_128_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_192_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_256_KWP;
using_nist_kw = cipher_id == MBEDTLS_CIPHER_AES_128_KW ||
cipher_id == MBEDTLS_CIPHER_AES_192_KW ||
cipher_id == MBEDTLS_CIPHER_AES_256_KW ||
using_nist_kw_padding;
/****************************************************************
* *
* Part 1: non-deprecated API *
* *
****************************************************************/
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* prepare buffer for decryption
* (we need the tag appended to the ciphertext)
*/
cipher_plus_tag_len = cipher->len + tag->len;
ASSERT_ALLOC( cipher_plus_tag, cipher_plus_tag_len );
memcpy( cipher_plus_tag, cipher->x, cipher->len );
memcpy( cipher_plus_tag + cipher->len, tag->x, tag->len );
/*
* Compute length of output buffer according to the documentation
*/
if( using_nist_kw )
decrypt_buf_len = cipher_plus_tag_len - 8;
else
decrypt_buf_len = cipher_plus_tag_len - tag->len;
/*
* Try decrypting to a buffer that's 1B too small
*/
if( decrypt_buf_len != 0 )
{
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len, &outlen, tag->len );
if( strcmp( result, "FAIL" ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, decrypt_buf_len ) );
}
else
{
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
/* Free this, but keep cipher_plus_tag for deprecated function with PSA */
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/*
* Compute size of output buffer according to documentation
*/
if( using_nist_kw )
{
encrypt_buf_len = clear->len + 8;
if( using_nist_kw_padding && encrypt_buf_len % 8 != 0 )
encrypt_buf_len += 8 - encrypt_buf_len % 8;
}
else
{
encrypt_buf_len = clear->len + tag->len;
}
/*
* Try encrypting with an output buffer that's 1B too small
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret != 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
/*
* Encrypt and check the result
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len, &outlen, tag->len );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len + tag->len );
TEST_ASSERT( timingsafe_bcmp( encrypt_buf, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( timingsafe_bcmp( encrypt_buf + cipher->len,
tag->x, tag->len ) == 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
}
/****************************************************************
* *
* Part 2: deprecated API *
* *
****************************************************************/
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* Prepare pointers for decryption
*/
tmp_cipher = cipher->x;
tmp_tag = tag->x;
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, cipher->len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
tmp_cipher, cipher->len, decrypt_buf, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
/* NIST_KW with legacy API */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else if( strcmp( result, "FAIL" ) == 0 )
{
/* unauthentic message */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, cipher->len ) );
}
else
{
/* authentic message: is the plaintext correct? */
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
mbedtls_free( cipher_plus_tag );
cipher_plus_tag = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/* prepare buffers for encryption */
ASSERT_ALLOC( encrypt_buf, cipher->len );
ASSERT_ALLOC( tag_buf, tag->len );
tmp_cipher = encrypt_buf;
tmp_tag = tag_buf;
/*
* Encrypt and check the result
*/
outlen = 0;
ret = mbedtls_cipher_auth_encrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
clear->x, clear->len, tmp_cipher, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len );
if( cipher->len != 0 )
TEST_ASSERT( timingsafe_bcmp( tmp_cipher, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( timingsafe_bcmp( tmp_tag, tag->x, tag->len ) == 0 );
}
}
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
exit:
mbedtls_cipher_free( &ctx );
mbedtls_free( decrypt_buf );
mbedtls_free( encrypt_buf );
mbedtls_free( cipher_plus_tag );
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
mbedtls_free( tag_buf );
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
}
void test_auth_crypt_tv_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_auth_crypt_tv( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, (char *) params[11], &data12, *( (int *) params[14] ) );
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_test_vec_ecb( int cipher_id, int operation, data_t * key,
data_t * input, data_t * result, int finish_result
)
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, input->x,
mbedtls_cipher_get_block_size( &ctx ),
output, &outlen ) );
TEST_ASSERT( outlen == mbedtls_cipher_get_block_size( &ctx ) );
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
TEST_ASSERT( 0 == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == timingsafe_bcmp( output, result->x,
mbedtls_cipher_get_block_size( &ctx ) ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_test_vec_ecb_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_test_vec_ecb( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, *( (int *) params[8] ) );
}
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_test_vec_crypt( int cipher_id, int operation, data_t *key,
data_t *iv, data_t *input, data_t *result,
int finish_result, int use_psa )
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
if( MBEDTLS_MODE_CBC == ctx.cipher_info->mode )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, MBEDTLS_PADDING_NONE ) );
TEST_ASSERT( finish_result == mbedtls_cipher_crypt( &ctx, iv->len ? iv->x : NULL,
iv->len, input->x, input->len,
output, &outlen ) );
TEST_ASSERT( result->len == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == timingsafe_bcmp( output, result->x, outlen ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_test_vec_crypt_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_test_vec_crypt( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_set_padding( int cipher_id, int pad_mode, int ret )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
mbedtls_cipher_init( &ctx );
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( ret == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_set_padding_wrapper( void ** params )
{
test_set_padding( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_check_padding( int pad_mode, data_t * input, int ret, int dlen_check
)
{
mbedtls_cipher_info_t cipher_info;
mbedtls_cipher_context_t ctx;
size_t dlen;
/* build a fake context just for getting access to get_padding */
mbedtls_cipher_init( &ctx );
cipher_info.mode = MBEDTLS_MODE_CBC;
ctx.cipher_info = &cipher_info;
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
TEST_ASSERT( ret == ctx.get_padding( input->x, input->len, &dlen ) );
if( 0 == ret )
TEST_ASSERT( dlen == (size_t) dlen_check );
exit:
;
}
void test_check_padding_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_check_padding( *( (int *) params[0] ), &data1, *( (int *) params[3] ), *( (int *) params[4] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#endif /* MBEDTLS_CIPHER_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
*out_value = MBEDTLS_CIPHER_DES_CBC;
}
break;
case 1:
{
*out_value = MBEDTLS_CIPHER_DES_EDE_CBC;
}
break;
case 2:
{
*out_value = MBEDTLS_CIPHER_DES_EDE3_CBC;
}
break;
case 3:
{
*out_value = -1;
}
break;
case 4:
{
*out_value = MBEDTLS_PADDING_ONE_AND_ZEROS;
}
break;
case 5:
{
*out_value = MBEDTLS_PADDING_ZEROS_AND_LEN;
}
break;
case 6:
{
*out_value = MBEDTLS_PADDING_ZEROS;
}
break;
case 7:
{
*out_value = MBEDTLS_PADDING_NONE;
}
break;
case 8:
{
*out_value = MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED;
}
break;
case 9:
{
*out_value = MBEDTLS_CIPHER_DES_ECB;
}
break;
case 10:
{
*out_value = MBEDTLS_ENCRYPT;
}
break;
case 11:
{
*out_value = MBEDTLS_DECRYPT;
}
break;
case 12:
{
*out_value = MBEDTLS_CIPHER_DES_EDE_ECB;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
#if defined(MBEDTLS_DES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_CIPHER_MODE_CBC)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_CIPHER_C)
test_mbedtls_cipher_list_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_CIPHER_C)
test_cipher_invalid_param_unconditional_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_cipher_invalid_param_conditional_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_AES_C)
test_cipher_special_behaviours_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_fail_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_CIPHER_C)
test_dec_empty_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_multipart_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_CIPHER_C)
test_decrypt_test_vec_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_AUTH_CRYPT)
test_auth_crypt_tv_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_CIPHER_C)
test_test_vec_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_test_vec_crypt_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_set_padding_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_check_padding_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_cipher.des.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 71,610 | 2,032 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.chacha20.datax | Chacha20 RFC 7539 Test Vector #1
depends_on:0
8:exp:0:exp:1:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"000000000000000000000000":hex:"76b8e0ada0f13d90405d6ae55386bd28bdd219b8a08ded1aa836efcc8b770dc7da41597c5157488d7724e03fb8d84a376a43b8f41518a11cc387b669b2ee6586":hex:"00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000":hex:"":hex:"":int:0:int:0
ChaCha20 Encrypt and decrypt 0 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:0:exp:1
ChaCha20 Encrypt and decrypt 1 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:1:exp:1
ChaCha20 Encrypt and decrypt 2 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:2:exp:1
ChaCha20 Encrypt and decrypt 7 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:7:exp:1
ChaCha20 Encrypt and decrypt 8 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:8:exp:1
ChaCha20 Encrypt and decrypt 9 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:9:exp:1
ChaCha20 Encrypt and decrypt 15 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:15:exp:1
ChaCha20 Encrypt and decrypt 16 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:16:exp:1
ChaCha20 Encrypt and decrypt 17 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:17:exp:1
ChaCha20 Encrypt and decrypt 31 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:31:exp:1
ChaCha20 Encrypt and decrypt 32 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:32:exp:1
ChaCha20 Encrypt and decrypt 33 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:33:exp:1
ChaCha20 Encrypt and decrypt 47 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:47:exp:1
ChaCha20 Encrypt and decrypt 48 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:48:exp:1
ChaCha20 Encrypt and decrypt 49 bytes
depends_on:0
4:exp:0:char*:"CHACHA20":int:256:int:49:exp:1
ChaCha20 Encrypt and decrypt 0 bytes in multiple parts 1
depends_on:0
7:exp:0:int:256:int:0:int:0:exp:1:int:0:int:0:int:0:int:0
ChaCha20 Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:0
7:exp:0:int:256:int:1:int:0:exp:1:int:1:int:0:int:1:int:0
ChaCha20 Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:0
7:exp:0:int:256:int:0:int:1:exp:1:int:0:int:1:int:0:int:1
ChaCha20 Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:0
7:exp:0:int:256:int:16:int:0:exp:1:int:16:int:0:int:16:int:0
ChaCha20 Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:0
7:exp:0:int:256:int:0:int:16:exp:1:int:0:int:16:int:0:int:16
ChaCha20 Encrypt and decrypt 16 bytes in multiple parts 3
depends_on:0
7:exp:0:int:256:int:1:int:15:exp:1:int:1:int:15:int:1:int:15
ChaCha20 Encrypt and decrypt 16 bytes in multiple parts 4
depends_on:0
7:exp:0:int:256:int:15:int:1:exp:1:int:15:int:1:int:15:int:1
ChaCha20 Encrypt and decrypt 22 bytes in multiple parts 1
depends_on:0
7:exp:0:int:256:int:15:int:7:exp:1:int:15:int:7:int:15:int:7
ChaCha20 Encrypt and decrypt 22 bytes in multiple parts 2
depends_on:0
7:exp:0:int:256:int:7:int:15:exp:1:int:7:int:15:int:7:int:15
ChaCha20 Encrypt and decrypt 22 bytes in multiple parts 3
depends_on:0
7:exp:0:int:256:int:16:int:6:exp:1:int:16:int:6:int:16:int:6
ChaCha20 Encrypt and decrypt 22 bytes in multiple parts 4
depends_on:0
7:exp:0:int:256:int:6:int:16:exp:1:int:6:int:16:int:6:int:16
ChaCha20 Encrypt and decrypt 32 bytes in multiple parts
depends_on:0
7:exp:0:int:256:int:16:int:16:exp:1:int:16:int:16:int:16:int:16
| 3,502 | 113 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_ecdsa.datax | ECDSA Parameter validation
0
ECDSA primitive random #1
depends_on:0
1:exp:0
ECDSA primitive random #2
depends_on:1
1:exp:1
ECDSA primitive random #3
depends_on:2
1:exp:2
ECDSA primitive random #4
depends_on:3
1:exp:3
ECDSA primitive random #5
depends_on:4
1:exp:4
ECDSA primitive rfc 4754 p256
depends_on:2
2:exp:2:char*:"DC51D3866A15BACDE33D96F992FCA99DA7E6EF0934E7097559C27F1614C88A7F":char*:"2442A5CC0ECD015FA3CA31DC8E2BBC70BF42D60CBCA20085E0822CB04235E970":char*:"6FC98BD7E50211A4A27102FA3549DF79EBCB4BF246B80945CDDFE7D509BBFD7D":hex:"9E56F509196784D963D1C0A401510EE7ADA3DCC5DEE04B154BF61AF1D5A6DECE":hex:"BA7816BF8F01CFEA414140DE5DAE2223B00361A396177A9CB410FF61F20015AD":char*:"CB28E0999B9C7715FD0A80D8E47A77079716CBBF917DD72E97566EA1C066957C":char*:"86FA3BB4E26CAD5BF90B7F81899256CE7594BB1EA0C89212748BFF3B3D5B0315":int:0
ECDSA primitive rfc 4754 p384
depends_on:3
2:exp:3:char*:"0BEB646634BA87735D77AE4809A0EBEA865535DE4C1E1DCB692E84708E81A5AF62E528C38B2A81B35309668D73524D9F":char*:"96281BF8DD5E0525CA049C048D345D3082968D10FEDF5C5ACA0C64E6465A97EA5CE10C9DFEC21797415710721F437922":char*:"447688BA94708EB6E2E4D59F6AB6D7EDFF9301D249FE49C33096655F5D502FAD3D383B91C5E7EDAA2B714CC99D5743CA":hex:"B4B74E44D71A13D568003D7489908D564C7761E229C58CBFA18950096EB7463B854D7FA992F934D927376285E63414FA":hex:"CB00753F45A35E8BB5A03D699AC65007272C32AB0EDED1631A8B605A43FF5BED8086072BA1E7CC2358BAECA134C825A7":char*:"FB017B914E29149432D8BAC29A514640B46F53DDAB2C69948084E2930F1C8F7E08E07C9C63F2D21A07DCB56A6AF56EB3":char*:"B263A1305E057F984D38726A1B46874109F417BCA112674C528262A40A629AF1CBB9F516CE0FA7D2FF630863A00E8B9F":int:0
ECDSA primitive rfc 4754 p521
depends_on:4
2:exp:4:char*:"0065FDA3409451DCAB0A0EAD45495112A3D813C17BFD34BDF8C1209D7DF5849120597779060A7FF9D704ADF78B570FFAD6F062E95C7E0C5D5481C5B153B48B375FA1":char*:"0151518F1AF0F563517EDD5485190DF95A4BF57B5CBA4CF2A9A3F6474725A35F7AFE0A6DDEB8BEDBCD6A197E592D40188901CECD650699C9B5E456AEA5ADD19052A8":char*:"006F3B142EA1BFFF7E2837AD44C9E4FF6D2D34C73184BBAD90026DD5E6E85317D9DF45CAD7803C6C20035B2F3FF63AFF4E1BA64D1C077577DA3F4286C58F0AEAE643":hex:"00C1C2B305419F5A41344D7E4359933D734096F556197A9B244342B8B62F46F9373778F9DE6B6497B1EF825FF24F42F9B4A4BD7382CFC3378A540B1B7F0C1B956C2F":hex:"DDAF35A193617ABACC417349AE20413112E6FA4E89A97EA20A9EEEE64B55D39A2192992A274FC1A836BA3C23A3FEEBBD454D4423643CE80E2A9AC94FA54CA49F":char*:"0154FD3836AF92D0DCA57DD5341D3053988534FDE8318FC6AAAAB68E2E6F4339B19F2F281A7E0B22C269D93CF8794A9278880ED7DBB8D9362CAEACEE544320552251":char*:"017705A7030290D1CEB605A9A1BB03FF9CDD521E87A696EC926C8C10C8362DF4975367101F67D1CF9BCCBF2F3D239534FA509E70AAC851AE01AAC68D62F866472660":int:0
ECDSA write-read random #1
depends_on:0
4:exp:0
ECDSA write-read random #2
depends_on:1
4:exp:1
ECDSA write-read random #3
depends_on:2
4:exp:2
ECDSA write-read random #4
depends_on:3
4:exp:3
ECDSA write-read random #5
depends_on:4
4:exp:4
ECDSA deterministic test vector rfc 6979 p192 sha1 [#1]
depends_on:0:5
3:exp:0:char*:"6FAB034934E4C0FC9AE67F5B5659A9D7D1FEFD187EE09FD4":exp:5:char*:"sample":char*:"98C6BD12B23EAF5E2A2045132086BE3EB8EBD62ABF6698FF":char*:"57A22B07DEA9530F8DE9471B1DC6624472E8E2844BC25B64"
ECDSA deterministic test vector rfc 6979 p192 sha224 [#1]
depends_on:0:6
3:exp:0:char*:"6FAB034934E4C0FC9AE67F5B5659A9D7D1FEFD187EE09FD4":exp:6:char*:"sample":char*:"A1F00DAD97AEEC91C95585F36200C65F3C01812AA60378F5":char*:"E07EC1304C7C6C9DEBBE980B9692668F81D4DE7922A0F97A"
ECDSA deterministic test vector rfc 6979 p192 sha256 [#1]
depends_on:0:6
3:exp:0:char*:"6FAB034934E4C0FC9AE67F5B5659A9D7D1FEFD187EE09FD4":exp:7:char*:"sample":char*:"4B0B8CE98A92866A2820E20AA6B75B56382E0F9BFD5ECB55":char*:"CCDB006926EA9565CBADC840829D8C384E06DE1F1E381B85"
ECDSA deterministic test vector rfc 6979 p192 sha384 [#1]
depends_on:0:7:8
3:exp:0:char*:"6FAB034934E4C0FC9AE67F5B5659A9D7D1FEFD187EE09FD4":exp:8:char*:"sample":char*:"DA63BF0B9ABCF948FBB1E9167F136145F7A20426DCC287D5":char*:"C3AA2C960972BD7A2003A57E1C4C77F0578F8AE95E31EC5E"
ECDSA deterministic test vector rfc 6979 p192 sha512 [#1]
depends_on:0:7
3:exp:0:char*:"6FAB034934E4C0FC9AE67F5B5659A9D7D1FEFD187EE09FD4":exp:9:char*:"sample":char*:"4D60C5AB1996BD848343B31C00850205E2EA6922DAC2E4B8":char*:"3F6E837448F027A1BF4B34E796E32A811CBB4050908D8F67"
ECDSA deterministic test vector rfc 6979 p192 sha1 [#2]
depends_on:0:5
3:exp:0:char*:"6FAB034934E4C0FC9AE67F5B5659A9D7D1FEFD187EE09FD4":exp:5:char*:"test":char*:"0F2141A0EBBC44D2E1AF90A50EBCFCE5E197B3B7D4DE036D":char*:"EB18BC9E1F3D7387500CB99CF5F7C157070A8961E38700B7"
ECDSA deterministic test vector rfc 6979 p192 sha224 [#2]
depends_on:0:6
3:exp:0:char*:"6FAB034934E4C0FC9AE67F5B5659A9D7D1FEFD187EE09FD4":exp:6:char*:"test":char*:"6945A1C1D1B2206B8145548F633BB61CEF04891BAF26ED34":char*:"B7FB7FDFC339C0B9BD61A9F5A8EAF9BE58FC5CBA2CB15293"
ECDSA deterministic test vector rfc 6979 p192 sha256 [#2]
depends_on:0:6
3:exp:0:char*:"6FAB034934E4C0FC9AE67F5B5659A9D7D1FEFD187EE09FD4":exp:7:char*:"test":char*:"3A718BD8B4926C3B52EE6BBE67EF79B18CB6EB62B1AD97AE":char*:"5662E6848A4A19B1F1AE2F72ACD4B8BBE50F1EAC65D9124F"
ECDSA deterministic test vector rfc 6979 p192 sha384 [#2]
depends_on:0:7:8
3:exp:0:char*:"6FAB034934E4C0FC9AE67F5B5659A9D7D1FEFD187EE09FD4":exp:8:char*:"test":char*:"B234B60B4DB75A733E19280A7A6034BD6B1EE88AF5332367":char*:"7994090B2D59BB782BE57E74A44C9A1C700413F8ABEFE77A"
ECDSA deterministic test vector rfc 6979 p192 sha512 [#2]
depends_on:0:7
3:exp:0:char*:"6FAB034934E4C0FC9AE67F5B5659A9D7D1FEFD187EE09FD4":exp:9:char*:"test":char*:"FE4F4AE86A58B6507946715934FE2D8FF9D95B6B098FE739":char*:"74CF5605C98FBA0E1EF34D4B5A1577A7DCF59457CAE52290"
ECDSA deterministic test vector rfc 6979 p224 sha1 [#1]
depends_on:1:5
3:exp:1:char*:"F220266E1105BFE3083E03EC7A3A654651F45E37167E88600BF257C1":exp:5:char*:"sample":char*:"22226F9D40A96E19C4A301CE5B74B115303C0F3A4FD30FC257FB57AC":char*:"66D1CDD83E3AF75605DD6E2FEFF196D30AA7ED7A2EDF7AF475403D69"
ECDSA deterministic test vector rfc 6979 p224 sha224 [#1]
depends_on:1:6
3:exp:1:char*:"F220266E1105BFE3083E03EC7A3A654651F45E37167E88600BF257C1":exp:6:char*:"sample":char*:"1CDFE6662DDE1E4A1EC4CDEDF6A1F5A2FB7FBD9145C12113E6ABFD3E":char*:"A6694FD7718A21053F225D3F46197CA699D45006C06F871808F43EBC"
ECDSA deterministic test vector rfc 6979 p224 sha256 [#1]
depends_on:1:6
3:exp:1:char*:"F220266E1105BFE3083E03EC7A3A654651F45E37167E88600BF257C1":exp:7:char*:"sample":char*:"61AA3DA010E8E8406C656BC477A7A7189895E7E840CDFE8FF42307BA":char*:"BC814050DAB5D23770879494F9E0A680DC1AF7161991BDE692B10101"
ECDSA deterministic test vector rfc 6979 p224 sha384 [#1]
depends_on:1:7:8
3:exp:1:char*:"F220266E1105BFE3083E03EC7A3A654651F45E37167E88600BF257C1":exp:8:char*:"sample":char*:"0B115E5E36F0F9EC81F1325A5952878D745E19D7BB3EABFABA77E953":char*:"830F34CCDFE826CCFDC81EB4129772E20E122348A2BBD889A1B1AF1D"
ECDSA deterministic test vector rfc 6979 p224 sha512 [#1]
depends_on:1:7
3:exp:1:char*:"F220266E1105BFE3083E03EC7A3A654651F45E37167E88600BF257C1":exp:9:char*:"sample":char*:"074BD1D979D5F32BF958DDC61E4FB4872ADCAFEB2256497CDAC30397":char*:"A4CECA196C3D5A1FF31027B33185DC8EE43F288B21AB342E5D8EB084"
ECDSA deterministic test vector rfc 6979 p224 sha1 [#2]
depends_on:1:5
3:exp:1:char*:"F220266E1105BFE3083E03EC7A3A654651F45E37167E88600BF257C1":exp:5:char*:"test":char*:"DEAA646EC2AF2EA8AD53ED66B2E2DDAA49A12EFD8356561451F3E21C":char*:"95987796F6CF2062AB8135271DE56AE55366C045F6D9593F53787BD2"
ECDSA deterministic test vector rfc 6979 p224 sha224 [#2]
depends_on:1:6
3:exp:1:char*:"F220266E1105BFE3083E03EC7A3A654651F45E37167E88600BF257C1":exp:6:char*:"test":char*:"C441CE8E261DED634E4CF84910E4C5D1D22C5CF3B732BB204DBEF019":char*:"902F42847A63BDC5F6046ADA114953120F99442D76510150F372A3F4"
ECDSA deterministic test vector rfc 6979 p224 sha256 [#2]
depends_on:1:6
3:exp:1:char*:"F220266E1105BFE3083E03EC7A3A654651F45E37167E88600BF257C1":exp:7:char*:"test":char*:"AD04DDE87B84747A243A631EA47A1BA6D1FAA059149AD2440DE6FBA6":char*:"178D49B1AE90E3D8B629BE3DB5683915F4E8C99FDF6E666CF37ADCFD"
ECDSA deterministic test vector rfc 6979 p224 sha384 [#2]
depends_on:1:7:8
3:exp:1:char*:"F220266E1105BFE3083E03EC7A3A654651F45E37167E88600BF257C1":exp:8:char*:"test":char*:"389B92682E399B26518A95506B52C03BC9379A9DADF3391A21FB0EA4":char*:"414A718ED3249FF6DBC5B50C27F71F01F070944DA22AB1F78F559AAB"
ECDSA deterministic test vector rfc 6979 p224 sha512 [#2]
depends_on:1:7
3:exp:1:char*:"F220266E1105BFE3083E03EC7A3A654651F45E37167E88600BF257C1":exp:9:char*:"test":char*:"049F050477C5ADD858CAC56208394B5A55BAEBBE887FDF765047C17C":char*:"077EB13E7005929CEFA3CD0403C7CDCC077ADF4E44F3C41B2F60ECFF"
ECDSA deterministic test vector rfc 6979 p256 sha1 [#1]
depends_on:2:5
3:exp:2:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":exp:5:char*:"sample":char*:"61340C88C3AAEBEB4F6D667F672CA9759A6CCAA9FA8811313039EE4A35471D32":char*:"6D7F147DAC089441BB2E2FE8F7A3FA264B9C475098FDCF6E00D7C996E1B8B7EB"
ECDSA deterministic test vector rfc 6979 p256 sha224 [#1]
depends_on:2:6
3:exp:2:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":exp:6:char*:"sample":char*:"53B2FFF5D1752B2C689DF257C04C40A587FABABB3F6FC2702F1343AF7CA9AA3F":char*:"B9AFB64FDC03DC1A131C7D2386D11E349F070AA432A4ACC918BEA988BF75C74C"
ECDSA deterministic test vector rfc 6979 p256 sha256 [#1]
depends_on:2:6
3:exp:2:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":exp:7:char*:"sample":char*:"EFD48B2AACB6A8FD1140DD9CD45E81D69D2C877B56AAF991C34D0EA84EAF3716":char*:"F7CB1C942D657C41D436C7A1B6E29F65F3E900DBB9AFF4064DC4AB2F843ACDA8"
ECDSA deterministic test vector rfc 6979 p256 sha384 [#1]
depends_on:2:7:8
3:exp:2:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":exp:8:char*:"sample":char*:"0EAFEA039B20E9B42309FB1D89E213057CBF973DC0CFC8F129EDDDC800EF7719":char*:"4861F0491E6998B9455193E34E7B0D284DDD7149A74B95B9261F13ABDE940954"
ECDSA deterministic test vector rfc 6979 p256 sha512 [#1]
depends_on:2:7
3:exp:2:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":exp:9:char*:"sample":char*:"8496A60B5E9B47C825488827E0495B0E3FA109EC4568FD3F8D1097678EB97F00":char*:"2362AB1ADBE2B8ADF9CB9EDAB740EA6049C028114F2460F96554F61FAE3302FE"
ECDSA deterministic test vector rfc 6979 p256 sha1 [#2]
depends_on:2:5
3:exp:2:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":exp:5:char*:"test":char*:"0CBCC86FD6ABD1D99E703E1EC50069EE5C0B4BA4B9AC60E409E8EC5910D81A89":char*:"01B9D7B73DFAA60D5651EC4591A0136F87653E0FD780C3B1BC872FFDEAE479B1"
ECDSA deterministic test vector rfc 6979 p256 sha224 [#2]
depends_on:2:6
3:exp:2:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":exp:6:char*:"test":char*:"C37EDB6F0AE79D47C3C27E962FA269BB4F441770357E114EE511F662EC34A692":char*:"C820053A05791E521FCAAD6042D40AEA1D6B1A540138558F47D0719800E18F2D"
ECDSA deterministic test vector rfc 6979 p256 sha256 [#2]
depends_on:2:6
3:exp:2:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":exp:7:char*:"test":char*:"F1ABB023518351CD71D881567B1EA663ED3EFCF6C5132B354F28D3B0B7D38367":char*:"019F4113742A2B14BD25926B49C649155F267E60D3814B4C0CC84250E46F0083"
ECDSA deterministic test vector rfc 6979 p256 sha384 [#2]
depends_on:2:7:8
3:exp:2:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":exp:8:char*:"test":char*:"83910E8B48BB0C74244EBDF7F07A1C5413D61472BD941EF3920E623FBCCEBEB6":char*:"8DDBEC54CF8CD5874883841D712142A56A8D0F218F5003CB0296B6B509619F2C"
ECDSA deterministic test vector rfc 6979 p256 sha512 [#2]
depends_on:2:7
3:exp:2:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":exp:9:char*:"test":char*:"461D93F31B6540894788FD206C07CFA0CC35F46FA3C91816FFF1040AD1581A04":char*:"39AF9F15DE0DB8D97E72719C74820D304CE5226E32DEDAE67519E840D1194E55"
ECDSA deterministic test vector rfc 6979 p384 sha1 [#1]
depends_on:3:5
3:exp:3:char*:"6B9D3DAD2E1B8C1C05B19875B6659F4DE23C3B667BF297BA9AA47740787137D896D5724E4C70A825F872C9EA60D2EDF5":exp:5:char*:"sample":char*:"EC748D839243D6FBEF4FC5C4859A7DFFD7F3ABDDF72014540C16D73309834FA37B9BA002899F6FDA3A4A9386790D4EB2":char*:"A3BCFA947BEEF4732BF247AC17F71676CB31A847B9FF0CBC9C9ED4C1A5B3FACF26F49CA031D4857570CCB5CA4424A443"
ECDSA deterministic test vector rfc 6979 p384 sha224 [#1]
depends_on:3:6
3:exp:3:char*:"6B9D3DAD2E1B8C1C05B19875B6659F4DE23C3B667BF297BA9AA47740787137D896D5724E4C70A825F872C9EA60D2EDF5":exp:6:char*:"sample":char*:"42356E76B55A6D9B4631C865445DBE54E056D3B3431766D0509244793C3F9366450F76EE3DE43F5A125333A6BE060122":char*:"9DA0C81787064021E78DF658F2FBB0B042BF304665DB721F077A4298B095E4834C082C03D83028EFBF93A3C23940CA8D"
ECDSA deterministic test vector rfc 6979 p384 sha256 [#1]
depends_on:3:6
3:exp:3:char*:"6B9D3DAD2E1B8C1C05B19875B6659F4DE23C3B667BF297BA9AA47740787137D896D5724E4C70A825F872C9EA60D2EDF5":exp:7:char*:"sample":char*:"21B13D1E013C7FA1392D03C5F99AF8B30C570C6F98D4EA8E354B63A21D3DAA33BDE1E888E63355D92FA2B3C36D8FB2CD":char*:"F3AA443FB107745BF4BD77CB3891674632068A10CA67E3D45DB2266FA7D1FEEBEFDC63ECCD1AC42EC0CB8668A4FA0AB0"
ECDSA deterministic test vector rfc 6979 p384 sha384 [#1]
depends_on:3:7:8
3:exp:3:char*:"6B9D3DAD2E1B8C1C05B19875B6659F4DE23C3B667BF297BA9AA47740787137D896D5724E4C70A825F872C9EA60D2EDF5":exp:8:char*:"sample":char*:"94EDBB92A5ECB8AAD4736E56C691916B3F88140666CE9FA73D64C4EA95AD133C81A648152E44ACF96E36DD1E80FABE46":char*:"99EF4AEB15F178CEA1FE40DB2603138F130E740A19624526203B6351D0A3A94FA329C145786E679E7B82C71A38628AC8"
ECDSA deterministic test vector rfc 6979 p384 sha512 [#1]
depends_on:3:7
3:exp:3:char*:"6B9D3DAD2E1B8C1C05B19875B6659F4DE23C3B667BF297BA9AA47740787137D896D5724E4C70A825F872C9EA60D2EDF5":exp:9:char*:"sample":char*:"ED0959D5880AB2D869AE7F6C2915C6D60F96507F9CB3E047C0046861DA4A799CFE30F35CC900056D7C99CD7882433709":char*:"512C8CCEEE3890A84058CE1E22DBC2198F42323CE8ACA9135329F03C068E5112DC7CC3EF3446DEFCEB01A45C2667FDD5"
ECDSA deterministic test vector rfc 6979 p384 sha1 [#2]
depends_on:3:5
3:exp:3:char*:"6B9D3DAD2E1B8C1C05B19875B6659F4DE23C3B667BF297BA9AA47740787137D896D5724E4C70A825F872C9EA60D2EDF5":exp:5:char*:"test":char*:"4BC35D3A50EF4E30576F58CD96CE6BF638025EE624004A1F7789A8B8E43D0678ACD9D29876DAF46638645F7F404B11C7":char*:"D5A6326C494ED3FF614703878961C0FDE7B2C278F9A65FD8C4B7186201A2991695BA1C84541327E966FA7B50F7382282"
ECDSA deterministic test vector rfc 6979 p384 sha224 [#2]
depends_on:3:6
3:exp:3:char*:"6B9D3DAD2E1B8C1C05B19875B6659F4DE23C3B667BF297BA9AA47740787137D896D5724E4C70A825F872C9EA60D2EDF5":exp:6:char*:"test":char*:"E8C9D0B6EA72A0E7837FEA1D14A1A9557F29FAA45D3E7EE888FC5BF954B5E62464A9A817C47FF78B8C11066B24080E72":char*:"07041D4A7A0379AC7232FF72E6F77B6DDB8F09B16CCE0EC3286B2BD43FA8C6141C53EA5ABEF0D8231077A04540A96B66"
ECDSA deterministic test vector rfc 6979 p384 sha256 [#2]
depends_on:3:6
3:exp:3:char*:"6B9D3DAD2E1B8C1C05B19875B6659F4DE23C3B667BF297BA9AA47740787137D896D5724E4C70A825F872C9EA60D2EDF5":exp:7:char*:"test":char*:"6D6DEFAC9AB64DABAFE36C6BF510352A4CC27001263638E5B16D9BB51D451559F918EEDAF2293BE5B475CC8F0188636B":char*:"2D46F3BECBCC523D5F1A1256BF0C9B024D879BA9E838144C8BA6BAEB4B53B47D51AB373F9845C0514EEFB14024787265"
ECDSA deterministic test vector rfc 6979 p384 sha384 [#2]
depends_on:3:7:8
3:exp:3:char*:"6B9D3DAD2E1B8C1C05B19875B6659F4DE23C3B667BF297BA9AA47740787137D896D5724E4C70A825F872C9EA60D2EDF5":exp:8:char*:"test":char*:"8203B63D3C853E8D77227FB377BCF7B7B772E97892A80F36AB775D509D7A5FEB0542A7F0812998DA8F1DD3CA3CF023DB":char*:"DDD0760448D42D8A43AF45AF836FCE4DE8BE06B485E9B61B827C2F13173923E06A739F040649A667BF3B828246BAA5A5"
ECDSA deterministic test vector rfc 6979 p384 sha512 [#2]
depends_on:3:7
3:exp:3:char*:"6B9D3DAD2E1B8C1C05B19875B6659F4DE23C3B667BF297BA9AA47740787137D896D5724E4C70A825F872C9EA60D2EDF5":exp:9:char*:"test":char*:"A0D5D090C9980FAF3C2CE57B7AE951D31977DD11C775D314AF55F76C676447D06FB6495CD21B4B6E340FC236584FB277":char*:"976984E59B4C77B0E8E4460DCA3D9F20E07B9BB1F63BEEFAF576F6B2E8B224634A2092CD3792E0159AD9CEE37659C736"
ECDSA deterministic test vector rfc 6979 p521 sha1 [#1]
depends_on:4:5
3:exp:4:char*:"0FAD06DAA62BA3B25D2FB40133DA757205DE67F5BB0018FEE8C86E1B68C7E75CAA896EB32F1F47C70855836A6D16FCC1466F6D8FBEC67DB89EC0C08B0E996B83538":exp:5:char*:"sample":char*:"0343B6EC45728975EA5CBA6659BBB6062A5FF89EEA58BE3C80B619F322C87910FE092F7D45BB0F8EEE01ED3F20BABEC079D202AE677B243AB40B5431D497C55D75D":char*:"0E7B0E675A9B24413D448B8CC119D2BF7B2D2DF032741C096634D6D65D0DBE3D5694625FB9E8104D3B842C1B0E2D0B98BEA19341E8676AEF66AE4EBA3D5475D5D16"
ECDSA deterministic test vector rfc 6979 p521 sha224 [#1]
depends_on:4:6
3:exp:4:char*:"0FAD06DAA62BA3B25D2FB40133DA757205DE67F5BB0018FEE8C86E1B68C7E75CAA896EB32F1F47C70855836A6D16FCC1466F6D8FBEC67DB89EC0C08B0E996B83538":exp:6:char*:"sample":char*:"1776331CFCDF927D666E032E00CF776187BC9FDD8E69D0DABB4109FFE1B5E2A30715F4CC923A4A5E94D2503E9ACFED92857B7F31D7152E0F8C00C15FF3D87E2ED2E":char*:"050CB5265417FE2320BBB5A122B8E1A32BD699089851128E360E620A30C7E17BA41A666AF126CE100E5799B153B60528D5300D08489CA9178FB610A2006C254B41F"
ECDSA deterministic test vector rfc 6979 p521 sha256 [#1]
depends_on:4:6
3:exp:4:char*:"0FAD06DAA62BA3B25D2FB40133DA757205DE67F5BB0018FEE8C86E1B68C7E75CAA896EB32F1F47C70855836A6D16FCC1466F6D8FBEC67DB89EC0C08B0E996B83538":exp:7:char*:"sample":char*:"1511BB4D675114FE266FC4372B87682BAECC01D3CC62CF2303C92B3526012659D16876E25C7C1E57648F23B73564D67F61C6F14D527D54972810421E7D87589E1A7":char*:"04A171143A83163D6DF460AAF61522695F207A58B95C0644D87E52AA1A347916E4F7A72930B1BC06DBE22CE3F58264AFD23704CBB63B29B931F7DE6C9D949A7ECFC"
ECDSA deterministic test vector rfc 6979 p521 sha384 [#1]
depends_on:4:7:8
3:exp:4:char*:"0FAD06DAA62BA3B25D2FB40133DA757205DE67F5BB0018FEE8C86E1B68C7E75CAA896EB32F1F47C70855836A6D16FCC1466F6D8FBEC67DB89EC0C08B0E996B83538":exp:8:char*:"sample":char*:"1EA842A0E17D2DE4F92C15315C63DDF72685C18195C2BB95E572B9C5136CA4B4B576AD712A52BE9730627D16054BA40CC0B8D3FF035B12AE75168397F5D50C67451":char*:"1F21A3CEE066E1961025FB048BD5FE2B7924D0CD797BABE0A83B66F1E35EEAF5FDE143FA85DC394A7DEE766523393784484BDF3E00114A1C857CDE1AA203DB65D61"
ECDSA deterministic test vector rfc 6979 p521 sha512 [#1]
depends_on:4:7
3:exp:4:char*:"0FAD06DAA62BA3B25D2FB40133DA757205DE67F5BB0018FEE8C86E1B68C7E75CAA896EB32F1F47C70855836A6D16FCC1466F6D8FBEC67DB89EC0C08B0E996B83538":exp:9:char*:"sample":char*:"0C328FAFCBD79DD77850370C46325D987CB525569FB63C5D3BC53950E6D4C5F174E25A1EE9017B5D450606ADD152B534931D7D4E8455CC91F9B15BF05EC36E377FA":char*:"0617CCE7CF5064806C467F678D3B4080D6F1CC50AF26CA209417308281B68AF282623EAA63E5B5C0723D8B8C37FF0777B1A20F8CCB1DCCC43997F1EE0E44DA4A67A"
ECDSA deterministic test vector rfc 6979 p521 sha1 [#2]
depends_on:4:5
3:exp:4:char*:"0FAD06DAA62BA3B25D2FB40133DA757205DE67F5BB0018FEE8C86E1B68C7E75CAA896EB32F1F47C70855836A6D16FCC1466F6D8FBEC67DB89EC0C08B0E996B83538":exp:5:char*:"test":char*:"13BAD9F29ABE20DE37EBEB823C252CA0F63361284015A3BF430A46AAA80B87B0693F0694BD88AFE4E661FC33B094CD3B7963BED5A727ED8BD6A3A202ABE009D0367":char*:"1E9BB81FF7944CA409AD138DBBEE228E1AFCC0C890FC78EC8604639CB0DBDC90F717A99EAD9D272855D00162EE9527567DD6A92CBD629805C0445282BBC916797FF"
ECDSA deterministic test vector rfc 6979 p521 sha224 [#2]
depends_on:4:6
3:exp:4:char*:"0FAD06DAA62BA3B25D2FB40133DA757205DE67F5BB0018FEE8C86E1B68C7E75CAA896EB32F1F47C70855836A6D16FCC1466F6D8FBEC67DB89EC0C08B0E996B83538":exp:6:char*:"test":char*:"1C7ED902E123E6815546065A2C4AF977B22AA8EADDB68B2C1110E7EA44D42086BFE4A34B67DDC0E17E96536E358219B23A706C6A6E16BA77B65E1C595D43CAE17FB":char*:"177336676304FCB343CE028B38E7B4FBA76C1C1B277DA18CAD2A8478B2A9A9F5BEC0F3BA04F35DB3E4263569EC6AADE8C92746E4C82F8299AE1B8F1739F8FD519A4"
ECDSA deterministic test vector rfc 6979 p521 sha256 [#2]
depends_on:4:6
3:exp:4:char*:"0FAD06DAA62BA3B25D2FB40133DA757205DE67F5BB0018FEE8C86E1B68C7E75CAA896EB32F1F47C70855836A6D16FCC1466F6D8FBEC67DB89EC0C08B0E996B83538":exp:7:char*:"test":char*:"00E871C4A14F993C6C7369501900C4BC1E9C7B0B4BA44E04868B30B41D8071042EB28C4C250411D0CE08CD197E4188EA4876F279F90B3D8D74A3C76E6F1E4656AA8":char*:"0CD52DBAA33B063C3A6CD8058A1FB0A46A4754B034FCC644766CA14DA8CA5CA9FDE00E88C1AD60CCBA759025299079D7A427EC3CC5B619BFBC828E7769BCD694E86"
ECDSA deterministic test vector rfc 6979 p521 sha384 [#2]
depends_on:4:7:8
3:exp:4:char*:"0FAD06DAA62BA3B25D2FB40133DA757205DE67F5BB0018FEE8C86E1B68C7E75CAA896EB32F1F47C70855836A6D16FCC1466F6D8FBEC67DB89EC0C08B0E996B83538":exp:8:char*:"test":char*:"14BEE21A18B6D8B3C93FAB08D43E739707953244FDBE924FA926D76669E7AC8C89DF62ED8975C2D8397A65A49DCC09F6B0AC62272741924D479354D74FF6075578C":char*:"133330865C067A0EAF72362A65E2D7BC4E461E8C8995C3B6226A21BD1AA78F0ED94FE536A0DCA35534F0CD1510C41525D163FE9D74D134881E35141ED5E8E95B979"
ECDSA deterministic test vector rfc 6979 p521 sha512 [#2]
depends_on:4:7
3:exp:4:char*:"0FAD06DAA62BA3B25D2FB40133DA757205DE67F5BB0018FEE8C86E1B68C7E75CAA896EB32F1F47C70855836A6D16FCC1466F6D8FBEC67DB89EC0C08B0E996B83538":exp:9:char*:"test":char*:"13E99020ABF5CEE7525D16B69B229652AB6BDF2AFFCAEF38773B4B7D08725F10CDB93482FDCC54EDCEE91ECA4166B2A7C6265EF0CE2BD7051B7CEF945BABD47EE6D":char*:"1FBD0013C674AA79CB39849527916CE301C66EA7CE8B80682786AD60F98F7E78A19CA69EFF5C57400E3B3A0AD66CE0978214D13BAF4E9AC60752F7B155E2DE4DCE3"
ECDSA restartable read-verify: max_ops=0 (disabled)
depends_on:2
5:exp:2:hex:"04e8f573412a810c5f81ecd2d251bb94387e72f28af70dced90ebe75725c97a6428231069c2b1ef78509a22c59044319f6ed3cb750dfe64c2a282b35967a458ad6":hex:"dee9d4d8b0e40a034602d6e638197998060f6e9f353ae1d10c94cd56476d3c92":hex:"304502210098a5a1392abe29e4b0a4da3fefe9af0f8c32e5b839ab52ba6a05da9c3b7edd0f0220596f0e195ae1e58c1e53e9e7f0f030b274348a8c11232101778d89c4943f5ad2":int:0:int:0:int:0
ECDSA restartable read-verify: max_ops=1
depends_on:2
5:exp:2:hex:"04e8f573412a810c5f81ecd2d251bb94387e72f28af70dced90ebe75725c97a6428231069c2b1ef78509a22c59044319f6ed3cb750dfe64c2a282b35967a458ad6":hex:"dee9d4d8b0e40a034602d6e638197998060f6e9f353ae1d10c94cd56476d3c92":hex:"304502210098a5a1392abe29e4b0a4da3fefe9af0f8c32e5b839ab52ba6a05da9c3b7edd0f0220596f0e195ae1e58c1e53e9e7f0f030b274348a8c11232101778d89c4943f5ad2":int:1:int:42:int:10000
ECDSA restartable read-verify: max_ops=10000
depends_on:2
5:exp:2:hex:"04e8f573412a810c5f81ecd2d251bb94387e72f28af70dced90ebe75725c97a6428231069c2b1ef78509a22c59044319f6ed3cb750dfe64c2a282b35967a458ad6":hex:"dee9d4d8b0e40a034602d6e638197998060f6e9f353ae1d10c94cd56476d3c92":hex:"304502210098a5a1392abe29e4b0a4da3fefe9af0f8c32e5b839ab52ba6a05da9c3b7edd0f0220596f0e195ae1e58c1e53e9e7f0f030b274348a8c11232101778d89c4943f5ad2":int:10000:int:0:int:0
ECDSA restartable read-verify: max_ops=250
depends_on:2
5:exp:2:hex:"04e8f573412a810c5f81ecd2d251bb94387e72f28af70dced90ebe75725c97a6428231069c2b1ef78509a22c59044319f6ed3cb750dfe64c2a282b35967a458ad6":hex:"dee9d4d8b0e40a034602d6e638197998060f6e9f353ae1d10c94cd56476d3c92":hex:"304502210098a5a1392abe29e4b0a4da3fefe9af0f8c32e5b839ab52ba6a05da9c3b7edd0f0220596f0e195ae1e58c1e53e9e7f0f030b274348a8c11232101778d89c4943f5ad2":int:250:int:4:int:64
ECDSA restartable sign-write: secp256r1 max_ops=0 (disabled)
depends_on:2:6
6:exp:2:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":exp:7:char*:"test":hex:"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":int:0:int:0:int:0
ECDSA restartable sign-write: secp256r1 restart max_ops=1
depends_on:2:6
6:exp:2:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":exp:7:char*:"test":hex:"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":int:1:int:1:int:10000
ECDSA restartable sign-write: secp256r1 restart max_ops=10000
depends_on:2:6
6:exp:2:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":exp:7:char*:"test":hex:"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":int:10000:int:0:int:0
ECDSA restartable sign-write: secp256r1 restart max_ops=250
depends_on:2:6
6:exp:2:char*:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":exp:7:char*:"test":hex:"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":int:250:int:2:int:32
ECDSA zero private parameter p192
depends_on:0
2:exp:0:char*:"0":char*:"2442A5CC0ECD015FA3CA31DC8E2BBC70BF42D60CBCA20085":char*:"6FC98BD7E50211A4A27102FA3549DF79EBCB4BF246B80945":hex:"9E56F509196784D963D1C0A401510EE7ADA3DCC5DEE04B15":hex:"BA7816BF8F01CFEA414140DE5DAE2223B00361A396177A9C":char*:"98C6BD12B23EAF5E2A2045132086BE3EB8EBD62ABF6698FF":char*:"57A22B07DEA9530F8DE9471B1DC6624472E8E2844BC25B64":exp:10
ECDSA private parameter greater than n p192
depends_on:0
2:exp:0:char*:"6FAB034934E4C0FC9AE67F5B5659A9D7D1FEFD187EE09FD41":char*:"2442A5CC0ECD015FA3CA31DC8E2BBC70BF42D60CBCA20085":char*:"6FC98BD7E50211A4A27102FA3549DF79EBCB4BF246B80945":hex:"9E56F509196784D963D1C0A401510EE7ADA3DCC5DEE04B15":hex:"BA7816BF8F01CFEA414140DE5DAE2223B00361A396177A9CB410FF61":char*:"98C6BD12B23EAF5E2A2045132086BE3EB8EBD62ABF6698FF":char*:"57A22B07DEA9530F8DE9471B1DC6624472E8E2844BC25B64":exp:10
ECDSA zero private parameter p224
depends_on:1
2:exp:1:char*:"0":char*:"2442A5CC0ECD015FA3CA31DC8E2BBC70BF42D60CBCA20085E0822CB04235E970":char*:"6FC98BD7E50211A4A27102FA3549DF79EBCB4BF246B80945CDDFE7D5":hex:"9E56F509196784D963D1C0A401510EE7ADA3DCC5DEE04B154BF61AF1":hex:"BA7816BF8F01CFEA414140DE5DAE2223B00361A396177A9CB410FF61":char*:"22226F9D40A96E19C4A301CE5B74B115303C0F3A4FD30FC257FB57AC":char*:"66D1CDD83E3AF75605DD6E2FEFF196D30AA7ED7A2EDF7AF475403D69":exp:10
ECDSA private parameter greater than n p224
depends_on:1
2:exp:1:char*:"F220266E1105BFE3083E03EC7A3A654651F45E37167E88600BF257C11":char*:"2442A5CC0ECD015FA3CA31DC8E2BBC70BF42D60CBCA20085E0822CB04235E970":char*:"6FC98BD7E50211A4A27102FA3549DF79EBCB4BF246B80945CDDFE7D5":hex:"9E56F509196784D963D1C0A401510EE7ADA3DCC5DEE04B154BF61AF1":hex:"BA7816BF8F01CFEA414140DE5DAE2223B00361A396177A9CB410FF61F20015AD":char*:"22226F9D40A96E19C4A301CE5B74B115303C0F3A4FD30FC257FB57AC":char*:"66D1CDD83E3AF75605DD6E2FEFF196D30AA7ED7A2EDF7AF475403D69":exp:10
ECDSA zero private parameter p256
depends_on:2
2:exp:2:char*:"0":char*:"2442A5CC0ECD015FA3CA31DC8E2BBC70BF42D60CBCA20085E0822CB04235E970":char*:"6FC98BD7E50211A4A27102FA3549DF79EBCB4BF246B80945CDDFE7D509BBFD7D":hex:"9E56F509196784D963D1C0A401510EE7ADA3DCC5DEE04B154BF61AF1D5A6DECE":hex:"BA7816BF8F01CFEA414140DE5DAE2223B00361A396177A9CB410FF61F20015AD":char*:"CB28E0999B9C7715FD0A80D8E47A77079716CBBF917DD72E97566EA1C066957C":char*:"86FA3BB4E26CAD5BF90B7F81899256CE7594BB1EA0C89212748BFF3B3D5B0315":exp:10
ECDSA private parameter greater than n p256
depends_on:2
2:exp:2:char*:"DC51D3866A15BACDE33D96F992FCA99DA7E6EF0934E7097559C27F1614C88A7F1":char*:"2442A5CC0ECD015FA3CA31DC8E2BBC70BF42D60CBCA20085E0822CB04235E970":char*:"6FC98BD7E50211A4A27102FA3549DF79EBCB4BF246B80945CDDFE7D509BBFD7D":hex:"9E56F509196784D963D1C0A401510EE7ADA3DCC5DEE04B154BF61AF1D5A6DECE":hex:"BA7816BF8F01CFEA414140DE5DAE2223B00361A396177A9CB410FF61F20015AD":char*:"CB28E0999B9C7715FD0A80D8E47A77079716CBBF917DD72E97566EA1C066957C":char*:"86FA3BB4E26CAD5BF90B7F81899256CE7594BB1EA0C89212748BFF3B3D5B0315":exp:10
ECDSA zero private parameter p384
depends_on:3
2:exp:3:char*:"0":char*:"96281BF8DD5E0525CA049C048D345D3082968D10FEDF5C5ACA0C64E6465A97EA5CE10C9DFEC21797415710721F437922":char*:"447688BA94708EB6E2E4D59F6AB6D7EDFF9301D249FE49C33096655F5D502FAD3D383B91C5E7EDAA2B714CC99D5743CA":hex:"B4B74E44D71A13D568003D7489908D564C7761E229C58CBFA18950096EB7463B854D7FA992F934D927376285E63414FA":hex:"CB00753F45A35E8BB5A03D699AC65007272C32AB0EDED1631A8B605A43FF5BED8086072BA1E7CC2358BAECA134C825A7":char*:"FB017B914E29149432D8BAC29A514640B46F53DDAB2C69948084E2930F1C8F7E08E07C9C63F2D21A07DCB56A6AF56EB3":char*:"B263A1305E057F984D38726A1B46874109F417BCA112674C528262A40A629AF1CBB9F516CE0FA7D2FF630863A00E8B9F":exp:10
ECDSA private parameter greater than n p384
depends_on:3
2:exp:3:char*:"10BEB646634BA87735D77AE4809A0EBEA865535DE4C1E1DCB692E84708E81A5AF62E528C38B2A81B35309668D73524D9F":char*:"96281BF8DD5E0525CA049C048D345D3082968D10FEDF5C5ACA0C64E6465A97EA5CE10C9DFEC21797415710721F437922":char*:"447688BA94708EB6E2E4D59F6AB6D7EDFF9301D249FE49C33096655F5D502FAD3D383B91C5E7EDAA2B714CC99D5743CA":hex:"B4B74E44D71A13D568003D7489908D564C7761E229C58CBFA18950096EB7463B854D7FA992F934D927376285E63414FA":hex:"CB00753F45A35E8BB5A03D699AC65007272C32AB0EDED1631A8B605A43FF5BED8086072BA1E7CC2358BAECA134C825A7":char*:"FB017B914E29149432D8BAC29A514640B46F53DDAB2C69948084E2930F1C8F7E08E07C9C63F2D21A07DCB56A6AF56EB3":char*:"B263A1305E057F984D38726A1B46874109F417BCA112674C528262A40A629AF1CBB9F516CE0FA7D2FF630863A00E8B9F":exp:10
ECDSA zero private parameter p521
depends_on:4
2:exp:4:char*:"0":char*:"0151518F1AF0F563517EDD5485190DF95A4BF57B5CBA4CF2A9A3F6474725A35F7AFE0A6DDEB8BEDBCD6A197E592D40188901CECD650699C9B5E456AEA5ADD19052A8":char*:"006F3B142EA1BFFF7E2837AD44C9E4FF6D2D34C73184BBAD90026DD5E6E85317D9DF45CAD7803C6C20035B2F3FF63AFF4E1BA64D1C077577DA3F4286C58F0AEAE643":hex:"00C1C2B305419F5A41344D7E4359933D734096F556197A9B244342B8B62F46F9373778F9DE6B6497B1EF825FF24F42F9B4A4BD7382CFC3378A540B1B7F0C1B956C2F":hex:"DDAF35A193617ABACC417349AE20413112E6FA4E89A97EA20A9EEEE64B55D39A2192992A274FC1A836BA3C23A3FEEBBD454D4423643CE80E2A9AC94FA54CA49F":char*:"0154FD3836AF92D0DCA57DD5341D3053988534FDE8318FC6AAAAB68E2E6F4339B19F2F281A7E0B22C269D93CF8794A9278880ED7DBB8D9362CAEACEE544320552251":char*:"017705A7030290D1CEB605A9A1BB03FF9CDD521E87A696EC926C8C10C8362DF4975367101F67D1CF9BCCBF2F3D239534FA509E70AAC851AE01AAC68D62F866472660":exp:10
ECDSA private parameter greater than n p521
depends_on:4
2:exp:4:char*:"0065FDA3409451DCAB0A0EAD45495112A3D813C17BFD34BDF8C1209D7DF5849120597779060A7FF9D704ADF78B570FFAD6F062E95C7E0C5D5481C5B153B48B375FA11":char*:"0151518F1AF0F563517EDD5485190DF95A4BF57B5CBA4CF2A9A3F6474725A35F7AFE0A6DDEB8BEDBCD6A197E592D40188901CECD650699C9B5E456AEA5ADD19052A8":char*:"006F3B142EA1BFFF7E2837AD44C9E4FF6D2D34C73184BBAD90026DD5E6E85317D9DF45CAD7803C6C20035B2F3FF63AFF4E1BA64D1C077577DA3F4286C58F0AEAE643":hex:"00C1C2B305419F5A41344D7E4359933D734096F556197A9B244342B8B62F46F9373778F9DE6B6497B1EF825FF24F42F9B4A4BD7382CFC3378A540B1B7F0C1B956C2F":hex:"DDAF35A193617ABACC417349AE20413112E6FA4E89A97EA20A9EEEE64B55D39A2192992A274FC1A836BA3C23A3FEEBBD454D4423643CE80E2A9AC94FA54CA49F":char*:"0154FD3836AF92D0DCA57DD5341D3053988534FDE8318FC6AAAAB68E2E6F4339B19F2F281A7E0B22C269D93CF8794A9278880ED7DBB8D9362CAEACEE544320552251":char*:"017705A7030290D1CEB605A9A1BB03FF9CDD521E87A696EC926C8C10C8362DF4975367101F67D1CF9BCCBF2F3D239534FA509E70AAC851AE01AAC68D62F866472660":exp:10
| 30,823 | 328 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_x509parse.datax | X509 CRT information #1
depends_on:0:1:2
1:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
X509 CRT information #1 (DER)
depends_on:1:2
1:char*:"/zip/third_party/mbedtls/test/data/server1.crt.der":char*:"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
X509 CRT information #2
depends_on:0:1:2
1:char*:"/zip/third_party/mbedtls/test/data/server2.crt":char*:"cert. version \: 3\nserial number \: 02\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
X509 CRT information #2 (DER)
depends_on:1:2
1:char*:"/zip/third_party/mbedtls/test/data/server2.crt.der":char*:"cert. version \: 3\nserial number \: 02\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
X509 CRT information #3
depends_on:0:1:2
1:char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"cert. version \: 3\nserial number \: 03\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-02-10 14\:44\:00\nexpires on \: 2029-02-10 14\:44\:00\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\n"
X509 CRT information #3 (DER)
depends_on:1:2
1:char*:"/zip/third_party/mbedtls/test/data/test-ca.crt.der":char*:"cert. version \: 3\nserial number \: 03\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-02-10 14\:44\:00\nexpires on \: 2029-02-10 14\:44\:00\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\n"
X509 CRT information MD2 Digest
depends_on:0:1:3
1:char*:"/zip/third_party/mbedtls/test/data/cert_md2.crt":char*:"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD2\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD2\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
X509 CRT information MD4 Digest
depends_on:0:1:4
1:char*:"/zip/third_party/mbedtls/test/data/cert_md4.crt":char*:"cert. version \: 3\nserial number \: 05\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD4\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD4\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
X509 CRT information MD5 Digest
depends_on:0:1:5
1:char*:"/zip/third_party/mbedtls/test/data/cert_md5.crt":char*:"cert. version \: 3\nserial number \: 06\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert MD5\nissued on \: 2000-01-01 12\:12\:12\nexpires on \: 2030-01-01 12\:12\:12\nsigned using \: RSA with MD5\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
X509 CRT information SHA1 Digest
depends_on:0:1:2
1:char*:"/zip/third_party/mbedtls/test/data/cert_sha1.crt":char*:"cert. version \: 3\nserial number \: 07\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
X509 CRT information SHA224 Digest
depends_on:0:1:6
1:char*:"/zip/third_party/mbedtls/test/data/cert_sha224.crt":char*:"cert. version \: 3\nserial number \: 08\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA224\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA-224\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
X509 CRT information SHA256 Digest
depends_on:0:1:6
1:char*:"/zip/third_party/mbedtls/test/data/cert_sha256.crt":char*:"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA256\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
X509 CRT information SHA384 Digest
depends_on:0:1:7:8
1:char*:"/zip/third_party/mbedtls/test/data/cert_sha384.crt":char*:"cert. version \: 3\nserial number \: 0A\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA384\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA-384\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
X509 CRT information SHA512 Digest
depends_on:0:1:7
1:char*:"/zip/third_party/mbedtls/test/data/cert_sha512.crt":char*:"cert. version \: 3\nserial number \: 0B\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Cert SHA512\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA-512\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
X509 CRT information RSA-PSS, SHA1 Digest
depends_on:0:9:2
1:char*:"/zip/third_party/mbedtls/test/data/server9.crt":char*:"cert. version \: 3\nserial number \: 16\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:38\:16\nexpires on \: 2024-01-18 13\:38\:16\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0xEA)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
X509 CRT information RSA-PSS, SHA224 Digest
depends_on:0:9:6
1:char*:"/zip/third_party/mbedtls/test/data/server9-sha224.crt":char*:"cert. version \: 3\nserial number \: 17\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:36\nexpires on \: 2024-01-18 13\:57\:36\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0xE2)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
X509 CRT information RSA-PSS, SHA256 Digest
depends_on:0:9:6
1:char*:"/zip/third_party/mbedtls/test/data/server9-sha256.crt":char*:"cert. version \: 3\nserial number \: 18\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:45\nexpires on \: 2024-01-18 13\:57\:45\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0xDE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
X509 CRT information RSA-PSS, SHA384 Digest
depends_on:0:9:7:8
1:char*:"/zip/third_party/mbedtls/test/data/server9-sha384.crt":char*:"cert. version \: 3\nserial number \: 19\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:57\:58\nexpires on \: 2024-01-18 13\:57\:58\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0xCE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
X509 CRT information RSA-PSS, SHA512 Digest
depends_on:0:9:7
1:char*:"/zip/third_party/mbedtls/test/data/server9-sha512.crt":char*:"cert. version \: 3\nserial number \: 1A\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2014-01-20 13\:58\:12\nexpires on \: 2024-01-18 13\:58\:12\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0xBE)\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\n"
X509 CRT information EC, SHA1 Digest
depends_on:0:10:11:2
1:char*:"/zip/third_party/mbedtls/test/data/server5-sha1.crt":char*:"cert. version \: 3\nserial number \: 12\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
X509 CRT information EC, SHA224 Digest
depends_on:0:10:11:6
1:char*:"/zip/third_party/mbedtls/test/data/server5-sha224.crt":char*:"cert. version \: 3\nserial number \: 13\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA224\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
X509 CRT information EC, SHA256 Digest
depends_on:0:10:11:6
1:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"cert. version \: 3\nserial number \: 09\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 15\:52\:04\nexpires on \: 2023-09-22 15\:52\:04\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
X509 CRT information EC, SHA384 Digest
depends_on:0:10:11:7:8
1:char*:"/zip/third_party/mbedtls/test/data/server5-sha384.crt":char*:"cert. version \: 3\nserial number \: 14\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA384\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
X509 CRT information EC, SHA512 Digest
depends_on:0:10:11:7
1:char*:"/zip/third_party/mbedtls/test/data/server5-sha512.crt":char*:"cert. version \: 3\nserial number \: 15\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 16\:21\:27\nexpires on \: 2023-09-22 16\:21\:27\nsigned using \: ECDSA with SHA512\nEC key size \: 256 bits\nbasic constraints \: CA=false\n"
X509 CRT information EC, SHA256 Digest, hardware module name SAN
depends_on:0:10:11:6
1:char*:"/zip/third_party/mbedtls/test/data/server5-othername.crt":char*:"cert. version \: 3\nserial number \: 4D\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS othername SAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS othername SAN\nissued on \: 2019-03-24 09\:06\:02\nexpires on \: 2029-03-21 09\:06\:02\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nsubject alt name \:\n otherName \:\n hardware module name \:\n hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 123456\n"
X509 CRT information, NS Cert Type
depends_on:0:1:2
1:char*:"/zip/third_party/mbedtls/test/data/server1.cert_type.crt":char*:"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\ncert. type \: SSL Server\n"
X509 CRT information, Key Usage
depends_on:0:1:2
1:char*:"/zip/third_party/mbedtls/test/data/server1.key_usage.crt":char*:"cert. version \: 3\nserial number \: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2019-02-10 14\:44\:06\nexpires on \: 2029-02-10 14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\n"
X509 CRT information, Key Usage with decipherOnly
depends_on:0:1:2
1:char*:"/zip/third_party/mbedtls/test/data/keyUsage.decipherOnly.crt":char*:"cert. version \: 3\nserial number \: 9B\:13\:CE\:4C\:A5\:6F\:DE\:52\nissuer name \: C=GB, L=Cambridge, O=Default Company Ltd\nsubject name \: C=GB, L=Cambridge, O=Default Company Ltd\nissued on \: 2015-05-12 10\:36\:55\nexpires on \: 2018-05-11 10\:36\:55\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment, Decipher Only\n"
X509 CRT information, Subject Alt Name
depends_on:0:1:6
1:char*:"/zip/third_party/mbedtls/test/data/cert_example_multi.crt":char*:"cert. version \: 3\nserial number \: 11\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=www.example.com\nissued on \: 2019-07-10 11\:27\:52\nexpires on \: 2029-07-10 11\:27\:52\nsigned using \: RSA with SHA-256\nRSA key size \: 1024 bits\nsubject alt name \:\n dNSName \: example.com\n dNSName \: example.net\n dNSName \: *.example.org\n"
X509 CRT information, Multiple different Subject Alt Name
depends_on:0:10:11:6
1:char*:"/zip/third_party/mbedtls/test/data/multiple_san.crt":char*:"cert. version \: 3\nserial number \: 04\nissuer name \: C=UK, O=Mbed TLS, CN=Mbed TLS multiple othername SAN\nsubject name \: C=UK, O=Mbed TLS, CN=Mbed TLS multiple othername SAN\nissued on \: 2019-04-22 16\:10\:48\nexpires on \: 2029-04-19 16\:10\:48\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\nsubject alt name \:\n dNSName \: example.com\n otherName \:\n hardware module name \:\n hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 123456\n dNSName \: example.net\n dNSName \: *.example.org\n"
X509 CRT information, Subject Alt Name + Key Usage
depends_on:0:1:2
1:char*:"/zip/third_party/mbedtls/test/data/cert_example_multi_nocn.crt":char*:"cert. version \: 3\nserial number \: F7\:C6\:7F\:F8\:E9\:A9\:63\:F9\nissuer name \: C=NL\nsubject name \: C=NL\nissued on \: 2014-01-22 10\:04\:33\nexpires on \: 2024-01-22 10\:04\:33\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\nbasic constraints \: CA=false\nsubject alt name \:\n dNSName \: www.shotokan-braunschweig.de\n dNSName \: www.massimo-abate.eu\n iPAddress \: 192.168.1.1\n iPAddress \: 192.168.69.144\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\n"
X509 CRT information, RSA Certificate Policy any
depends_on:0:1:6
1:char*:"/zip/third_party/mbedtls/test/data/test-ca-any_policy.crt":char*:"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-03-21 16\:40\:59\nexpires on \: 2029-03-21 16\:40\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncert policies \: Any Policy\n"
X509 CRT information, ECDSA Certificate Policy any
depends_on:0:10:12:6
1:char*:"/zip/third_party/mbedtls/test/data/test-ca-any_policy_ec.crt":char*:"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-03-25 09\:02\:45\nexpires on \: 2029-03-25 09\:02\:45\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncert policies \: Any Policy\n"
X509 CRT information, RSA Certificate Policy any with qualifier
depends_on:0:1:6
1:char*:"/zip/third_party/mbedtls/test/data/test-ca-any_policy_with_qualifier.crt":char*:"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 13\:14\:31\nexpires on \: 2029-04-28 13\:14\:31\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncert policies \: Any Policy\n"
X509 CRT information, ECDSA Certificate Policy any with qualifier
depends_on:0:10:12:6
1:char*:"/zip/third_party/mbedtls/test/data/test-ca-any_policy_with_qualifier_ec.crt":char*:"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 10\:16\:05\nexpires on \: 2029-04-28 10\:16\:05\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncert policies \: Any Policy\n"
X509 CRT information, RSA Certificate multiple Policies
depends_on:0:1:6
1:char*:"/zip/third_party/mbedtls/test/data/test-ca-multi_policy.crt":char*:"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 12\:59\:19\nexpires on \: 2029-04-28 12\:59\:19\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncert policies \: 1.2.3.4, Any Policy\n"
X509 CRT information, ECDSA Certificate multiple Policies
depends_on:0:10:12:6
1:char*:"/zip/third_party/mbedtls/test/data/test-ca-multi_policy_ec.crt":char*:"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 12\:59\:51\nexpires on \: 2029-04-28 12\:59\:51\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncert policies \: 1.2.3.4, Any Policy\n"
X509 CRT information, RSA Certificate unsupported policy
depends_on:0:1:6
1:char*:"/zip/third_party/mbedtls/test/data/test-ca-unsupported_policy.crt":char*:"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nissued on \: 2019-04-28 13\:00\:13\nexpires on \: 2029-04-28 13\:00\:13\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\ncert policies \: 1.2.3.4\n"
X509 CRT information, ECDSA Certificate unsupported policy
depends_on:0:10:12:6
1:char*:"/zip/third_party/mbedtls/test/data/test-ca-unsupported_policy_ec.crt":char*:"cert. version \: 3\nserial number \: 00\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nissued on \: 2019-04-28 13\:00\:19\nexpires on \: 2029-04-28 13\:00\:19\nsigned using \: ECDSA with SHA256\nEC key size \: 384 bits\nbasic constraints \: CA=true\ncert policies \: 1.2.3.4\n"
X509 CRT information, Key Usage + Extended Key Usage
depends_on:0:1:6
1:char*:"/zip/third_party/mbedtls/test/data/server1.ext_ku.crt":char*:"cert. version \: 3\nserial number \: 21\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nissued on \: 2014-04-01 14\:44\:43\nexpires on \: 2024-03-29 14\:44\:43\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nkey usage \: Digital Signature, Non Repudiation, Key Encipherment\next key usage \: TLS Web Server Authentication\n"
X509 CRT information RSA signed by EC
depends_on:0:1:6:10
1:char*:"/zip/third_party/mbedtls/test/data/server4.crt":char*:"cert. version \: 3\nserial number \: 08\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-09-24 15\:52\:04\nexpires on \: 2023-09-22 15\:52\:04\nsigned using \: ECDSA with SHA256\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\n"
X509 CRT information EC signed by RSA
depends_on:0:10:13:2:1
1:char*:"/zip/third_party/mbedtls/test/data/server3.crt":char*:"cert. version \: 3\nserial number \: 0D\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nissued on \: 2013-08-09 09\:17\:03\nexpires on \: 2023-08-07 09\:17\:03\nsigned using \: RSA with SHA1\nEC key size \: 192 bits\nbasic constraints \: CA=false\n"
X509 CRT information Bitstring in subject name
depends_on:0:1:2
1:char*:"/zip/third_party/mbedtls/test/data/bitstring-in-dn.pem":char*:"cert. version \: 3\nserial number \: 02\nissuer name \: CN=Test CA 01, ST=Ecnivorp, C=XX, [email protected], O=Test CA Authority\nsubject name \: C=XX, O=tca, ST=Ecnivorp, OU=TCA, CN=Client, [email protected], serialNumber=7101012255, uniqueIdentifier=?7101012255\nissued on \: 2015-03-11 12\:06\:51\nexpires on \: 2025-03-08 12\:06\:51\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints \: CA=false\nsubject alt name \:\n rfc822Name \: [email protected]\next key usage \: TLS Web Client Authentication\n"
X509 CRT information Non-ASCII string in issuer name and subject name
depends_on:0:1:6
1:char*:"/zip/third_party/mbedtls/test/data/non-ascii-string-in-issuer.crt":char*:"cert. version \: 3\nserial number \: 05\:E6\:53\:E7\:1B\:74\:F0\:B5\:D3\:84\:6D\:0C\:6D\:DC\:FA\:3F\:A4\:5A\:2B\:E0\nissuer name \: C=JP, ST=Tokyo, O=?????????????????? Ltd, CN=?????????????????? CA\nsubject name \: C=JP, ST=Tokyo, O=?????????????????? Ltd, CN=?????????????????? CA\nissued on \: 2020-05-20 16\:17\:23\nexpires on \: 2020-06-19 16\:17\:23\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\n"
X509 certificate v1 with extension
depends_on:0:1:14:2
1:char*:"/zip/third_party/mbedtls/test/data/cert_v1_with_ext.crt":char*:"cert. version \: 1\nserial number \: BD\:ED\:44\:C7\:D2\:3E\:C2\:A4\nissuer name \: C=XX, ST=XX, L=XX, O=XX, OU=XX, [email protected], CN=identity-check.org\nsubject name \: C=XX, ST=XX, L=XX, O=XX, OU=XX, [email protected], CN=identity-check.org\nissued on \: 2013-07-04 16\:17\:02\nexpires on \: 2014-07-04 16\:17\:02\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nsubject alt name \:\n dNSName \: identity-check.org\n dNSName \: www.identity-check.org\n <unsupported>\n"
X509 SAN parsing otherName
depends_on:0:10:11:6
0:char*:"/zip/third_party/mbedtls/test/data/server5-othername.crt":char*:"type \: 0\notherName \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 123456\n"
X509 SAN parsing dNSName
depends_on:0:1:6
0:char*:"/zip/third_party/mbedtls/test/data/cert_example_multi.crt":char*:"type \: 2\ndNSName \: example.com\ntype \: 2\ndNSName \: example.net\ntype \: 2\ndNSName \: *.example.org\n"
X509 SAN parsing Multiple different types
depends_on:0:10:11:6
0:char*:"/zip/third_party/mbedtls/test/data/multiple_san.crt":char*:"type \: 2\ndNSName \: example.com\ntype \: 0\notherName \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 123456\ntype \: 2\ndNSName \: example.net\ntype \: 2\ndNSName \: *.example.org\n"
X509 SAN parsing, no subject alt name
depends_on:0:1:6:10
0:char*:"/zip/third_party/mbedtls/test/data/server4.crt":char*:""
X509 SAN parsing, unsupported otherName name
depends_on:0:10:11:6
0:char*:"/zip/third_party/mbedtls/test/data/server5-unsupported_othername.crt":char*:""
X509 CRL information #1
depends_on:0:2:1
2:char*:"/zip/third_party/mbedtls/test/data/crl_expired.pem":char*:"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-20 10\:24\:19\nnext update \: 2011-02-20 11\:24\:19\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA1\n"
X509 CRL Information MD2 Digest
depends_on:0:3:1
2:char*:"/zip/third_party/mbedtls/test/data/crl_md2.pem":char*:"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2009-07-19 19\:56\:37\nnext update \: 2009-09-17 19\:56\:37\nRevoked certificates\:\nserial number\: 01 revocation date\: 2009-02-09 21\:12\:36\nserial number\: 03 revocation date\: 2009-02-09 21\:12\:36\nsigned using \: RSA with MD2\n"
X509 CRL Information MD4 Digest
depends_on:0:4
2:char*:"/zip/third_party/mbedtls/test/data/crl_md4.pem":char*:"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with MD4\n"
X509 CRL Information MD5 Digest
depends_on:0:5:1
2:char*:"/zip/third_party/mbedtls/test/data/crl_md5.pem":char*:"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with MD5\n"
X509 CRL Information SHA1 Digest
depends_on:0:2:1
2:char*:"/zip/third_party/mbedtls/test/data/crl_sha1.pem":char*:"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA1\n"
X509 CRL Information SHA224 Digest
depends_on:0:6:1
2:char*:"/zip/third_party/mbedtls/test/data/crl_sha224.pem":char*:"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-224\n"
X509 CRL Information SHA256 Digest
depends_on:0:6:1
2:char*:"/zip/third_party/mbedtls/test/data/crl_sha256.pem":char*:"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-256\n"
X509 CRL Information SHA384 Digest
depends_on:0:7:8:1
2:char*:"/zip/third_party/mbedtls/test/data/crl_sha384.pem":char*:"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-384\n"
X509 CRL Information SHA512 Digest
depends_on:0:7:1
2:char*:"/zip/third_party/mbedtls/test/data/crl_sha512.pem":char*:"CRL version \: 1\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2011-02-12 14\:44\:07\nnext update \: 2011-04-13 14\:44\:07\nRevoked certificates\:\nserial number\: 01 revocation date\: 2011-02-12 14\:44\:07\nserial number\: 03 revocation date\: 2011-02-12 14\:44\:07\nsigned using \: RSA with SHA-512\n"
X509 CRL information RSA-PSS, SHA1 Digest
depends_on:0:9:2
2:char*:"/zip/third_party/mbedtls/test/data/crl-rsa-pss-sha1.pem":char*:"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:46\:35\nnext update \: 2024-01-18 13\:46\:35\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0xEA)\n"
X509 CRL information RSA-PSS, SHA224 Digest
depends_on:0:9:6
2:char*:"/zip/third_party/mbedtls/test/data/crl-rsa-pss-sha224.pem":char*:"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:06\nnext update \: 2024-01-18 13\:56\:06\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0xE2)\n"
X509 CRL information RSA-PSS, SHA256 Digest
depends_on:0:9:6
2:char*:"/zip/third_party/mbedtls/test/data/crl-rsa-pss-sha256.pem":char*:"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:16\nnext update \: 2024-01-18 13\:56\:16\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0xDE)\n"
X509 CRL information RSA-PSS, SHA384 Digest
depends_on:0:9:7:8
2:char*:"/zip/third_party/mbedtls/test/data/crl-rsa-pss-sha384.pem":char*:"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:28\nnext update \: 2024-01-18 13\:56\:28\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0xCE)\n"
X509 CRL information RSA-PSS, SHA512 Digest
depends_on:0:9:7
2:char*:"/zip/third_party/mbedtls/test/data/crl-rsa-pss-sha512.pem":char*:"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2014-01-20 13\:56\:38\nnext update \: 2024-01-18 13\:56\:38\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nserial number\: 16 revocation date\: 2014-01-20 13\:43\:05\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0xBE)\n"
X509 CRL Information EC, SHA1 Digest
depends_on:0:2:10
2:char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA1\n"
X509 CRL Information EC, SHA224 Digest
depends_on:0:6:10
2:char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha224.pem":char*:"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA224\n"
X509 CRL Information EC, SHA256 Digest
depends_on:0:6:10
2:char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA256\n"
X509 CRL Information EC, SHA384 Digest
depends_on:0:7:8:10
2:char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha384.pem":char*:"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA384\n"
X509 CRL Information EC, SHA512 Digest
depends_on:0:7:10
2:char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha512.pem":char*:"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nthis update \: 2013-09-24 16\:31\:08\nnext update \: 2023-09-22 16\:31\:08\nRevoked certificates\:\nserial number\: 0A revocation date\: 2013-09-24 16\:28\:38\nsigned using \: ECDSA with SHA512\n"
X509 CRL Malformed Input (trailing spaces at end of file)
depends_on:0:2:7:10
3:char*:"/zip/third_party/mbedtls/test/data/crl-malformed-trailing-spaces.pem":exp:0
X509 CRL Unsupported critical extension (issuingDistributionPoint)
depends_on:0:1:6
3:char*:"/zip/third_party/mbedtls/test/data/crl-idp.pem":exp:1
X509 CRL Unsupported non-critical extension (issuingDistributionPoint)
depends_on:0:1:6
3:char*:"/zip/third_party/mbedtls/test/data/crl-idpnc.pem":int:0
X509 CSR Information RSA with MD4
depends_on:0:4:1
4:char*:"/zip/third_party/mbedtls/test/data/server1.req.md4":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with MD4\nRSA key size \: 2048 bits\n"
X509 CSR Information RSA with MD5
depends_on:0:5:1
4:char*:"/zip/third_party/mbedtls/test/data/server1.req.md5":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with MD5\nRSA key size \: 2048 bits\n"
X509 CSR Information RSA with SHA1
depends_on:0:2:1
4:char*:"/zip/third_party/mbedtls/test/data/server1.req.sha1":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\n"
X509 CSR Information RSA with SHA224
depends_on:0:6:1
4:char*:"/zip/third_party/mbedtls/test/data/server1.req.sha224":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-224\nRSA key size \: 2048 bits\n"
X509 CSR Information RSA with SHA-256
depends_on:0:6:1
4:char*:"/zip/third_party/mbedtls/test/data/server1.req.sha256":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\n"
X509 CSR Information RSA with SHA384
depends_on:0:7:8:1
4:char*:"/zip/third_party/mbedtls/test/data/server1.req.sha384":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-384\nRSA key size \: 2048 bits\n"
X509 CSR Information RSA with SHA512
depends_on:0:7:1
4:char*:"/zip/third_party/mbedtls/test/data/server1.req.sha512":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-512\nRSA key size \: 2048 bits\n"
X509 CSR Information EC with SHA1
depends_on:10:0:11:2
4:char*:"/zip/third_party/mbedtls/test/data/server5.req.sha1":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\n"
X509 CSR Information EC with SHA224
depends_on:10:0:11:6
4:char*:"/zip/third_party/mbedtls/test/data/server5.req.sha224":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA224\nEC key size \: 256 bits\n"
X509 CSR Information EC with SHA256
depends_on:10:0:11:6
4:char*:"/zip/third_party/mbedtls/test/data/server5.req.sha256":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA256\nEC key size \: 256 bits\n"
X509 CSR Information EC with SHA384
depends_on:10:0:11:7:8
4:char*:"/zip/third_party/mbedtls/test/data/server5.req.sha384":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA384\nEC key size \: 256 bits\n"
X509 CSR Information EC with SHA512
depends_on:10:0:11:7
4:char*:"/zip/third_party/mbedtls/test/data/server5.req.sha512":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA512\nEC key size \: 256 bits\n"
X509 CSR Information RSA-PSS with SHA1
depends_on:0:9:2
4:char*:"/zip/third_party/mbedtls/test/data/server9.req.sha1":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA1, MGF1-SHA1, 0x6A)\nRSA key size \: 1024 bits\n"
X509 CSR Information RSA-PSS with SHA224
depends_on:0:9:6
4:char*:"/zip/third_party/mbedtls/test/data/server9.req.sha224":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA224, MGF1-SHA224, 0x62)\nRSA key size \: 1024 bits\n"
X509 CSR Information RSA-PSS with SHA256
depends_on:0:9:6
4:char*:"/zip/third_party/mbedtls/test/data/server9.req.sha256":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA256, MGF1-SHA256, 0x5E)\nRSA key size \: 1024 bits\n"
X509 CSR Information RSA-PSS with SHA384
depends_on:0:9:7:8
4:char*:"/zip/third_party/mbedtls/test/data/server9.req.sha384":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA384, MGF1-SHA384, 0x4E)\nRSA key size \: 1024 bits\n"
X509 CSR Information RSA-PSS with SHA512
depends_on:0:9:7
4:char*:"/zip/third_party/mbedtls/test/data/server9.req.sha512":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: RSASSA-PSS (SHA512, MGF1-SHA512, 0x3E)\nRSA key size \: 1024 bits\n"
X509 CSR Information RSA with SHA-256 - Microsoft header
depends_on:0:6:1
4:char*:"/zip/third_party/mbedtls/test/data/server1-ms.req.sha256":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=PolarSSL Server 1\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\n"
X509 Verify Information: empty
5:int:0:char*:"":char*:""
X509 Verify Information: one issue
5:exp:2:char*:"":char*:"Certificate was missing\n"
X509 Verify Information: two issues
5:exp:3:char*:"":char*:"The certificate validity has expired\nThe CRL is expired\n"
X509 Verify Information: two issues, one unknown
5:exp:4:char*:"":char*:"Other reason (can be used by verify callback)\nUnknown reason (this should not happen)\n"
X509 Verify Information: empty, with prefix
5:int:0:char*:" ! ":char*:""
X509 Verify Information: one issue, with prefix
5:exp:2:char*:" ! ":char*:" ! Certificate was missing\n"
X509 Verify Information: two issues, with prefix
5:exp:3:char*:" ! ":char*:" ! The certificate validity has expired\n ! The CRL is expired\n"
X509 Get Distinguished Name #1
depends_on:0:1:2
10:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"subject":char*:"C=NL, O=PolarSSL, CN=PolarSSL Server 1"
X509 Get Distinguished Name #2
depends_on:0:1:2
10:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"issuer":char*:"C=NL, O=PolarSSL, CN=PolarSSL Test CA"
X509 Get Distinguished Name #3
depends_on:0:1:2
10:char*:"/zip/third_party/mbedtls/test/data/server2.crt":char*:"subject":char*:"C=NL, O=PolarSSL, CN=localhost"
X509 Get Distinguished Name #4
depends_on:0:1:2
10:char*:"/zip/third_party/mbedtls/test/data/server2.crt":char*:"issuer":char*:"C=NL, O=PolarSSL, CN=PolarSSL Test CA"
X509 Time Expired #1
depends_on:0:1:15:2
11:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"valid_from":int:1
X509 Time Expired #2
depends_on:0:1:15:2
11:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"valid_to":int:0
X509 Time Expired #3
depends_on:0:1:15:2
11:char*:"/zip/third_party/mbedtls/test/data/server2.crt":char*:"valid_from":int:1
X509 Time Expired #4
depends_on:0:1:15:2
11:char*:"/zip/third_party/mbedtls/test/data/server2.crt":char*:"valid_to":int:0
X509 Time Expired #5
depends_on:0:1:15:2
11:char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"valid_from":int:1
X509 Time Expired #6
depends_on:0:1:15:2
11:char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"valid_to":int:0
X509 Time Future #1
depends_on:0:10:11:15:6
12:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"valid_from":int:0
X509 Time Future #2
depends_on:0:10:11:15:6
12:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"valid_to":int:1
X509 Time Future #3
depends_on:0:10:11:15:6
12:char*:"/zip/third_party/mbedtls/test/data/server5-future.crt":char*:"valid_from":int:1
X509 Time Future #4
depends_on:0:10:11:15:6
12:char*:"/zip/third_party/mbedtls/test/data/server5-future.crt":char*:"valid_to":int:1
X509 Time Future #5
depends_on:0:10:12:15:6
12:char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"valid_from":int:0
X509 Time Future #6
depends_on:0:10:12:15:6
12:char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"valid_to":int:1
X509 CRT verification #1 (Revoked Cert, Expired CRL, no CN)
depends_on:0:2:1:16:15
7:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl_expired.pem":char*:"NULL":exp:5:exp:6:char*:"compat":char*:"NULL"
X509 CRT verification #1a (Revoked Cert, Future CRL, no CN)
depends_on:0:6:10:11:12:2:15
7:char*:"/zip/third_party/mbedtls/test/data/server6.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-future.pem":char*:"NULL":exp:5:exp:7:char*:"compat":char*:"NULL"
X509 CRT verification #2 (Revoked Cert, Expired CRL)
depends_on:0:2:1:16:15
7:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl_expired.pem":char*:"PolarSSL Server 1":exp:5:exp:6:char*:"compat":char*:"NULL"
X509 CRT verification #2a (Revoked Cert, Future CRL)
depends_on:0:6:10:11:12:2:15
7:char*:"/zip/third_party/mbedtls/test/data/server6.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-future.pem":char*:"localhost":exp:5:exp:7:char*:"compat":char*:"NULL"
X509 CRT verification #3 (Revoked Cert, Future CRL, CN Mismatch)
depends_on:0:2:1:16:15
7:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl_expired.pem":char*:"PolarSSL Wrong CN":exp:5:exp:8:char*:"compat":char*:"NULL"
X509 CRT verification #3a (Revoked Cert, Expired CRL, CN Mismatch)
depends_on:0:6:10:11:12:2:15
7:char*:"/zip/third_party/mbedtls/test/data/server6.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-future.pem":char*:"Wrong CN":exp:5:exp:9:char*:"compat":char*:"NULL"
X509 CRT verification #4 (Valid Cert, Expired CRL)
depends_on:0:2:1:16:15
7:char*:"/zip/third_party/mbedtls/test/data/server2.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl_expired.pem":char*:"NULL":exp:5:exp:10:char*:"compat":char*:"NULL"
X509 CRT verification #4a (Revoked Cert, Future CRL)
depends_on:0:6:10:11:12:2:15
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-future.pem":char*:"NULL":exp:5:exp:11:char*:"compat":char*:"NULL"
X509 CRT verification #5 (Revoked Cert)
depends_on:0:2:1:16:15
7:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:12:char*:"compat":char*:"NULL"
X509 CRT verification #5' (Revoked Cert, differing DN string formats #1)
depends_on:0:2:1:16:15
7:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_utf8.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:12:char*:"compat":char*:"NULL"
X509 CRT verification #5'' (Revoked Cert, differing DN string formats #2)
depends_on:0:2:1:16:15
7:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_printable.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:12:char*:"compat":char*:"NULL"
X509 CRT verification #5''' (Revoked Cert, differing upper and lower case)
depends_on:0:2:1:16:15
7:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_uppercase.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:12:char*:"compat":char*:"NULL"
X509 CRT verification #6 (Revoked Cert)
depends_on:0:2:1:16:15
7:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"PolarSSL Server 1":exp:5:exp:12:char*:"compat":char*:"NULL"
X509 CRT verification #7 (Revoked Cert, CN Mismatch)
depends_on:0:2:1:16:15
7:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"PolarSSL Wrong CN":exp:5:exp:13:char*:"compat":char*:"NULL"
X509 CRT verification #8 (Valid Cert)
depends_on:0:6:10:11:12:2
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #8a (Expired Cert)
depends_on:0:6:10:11:12:2:15
7:char*:"/zip/third_party/mbedtls/test/data/server5-expired.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"NULL":exp:5:exp:14:char*:"compat":char*:"NULL"
X509 CRT verification #8b (Future Cert)
depends_on:0:6:10:11:12:2:15
7:char*:"/zip/third_party/mbedtls/test/data/server5-future.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"NULL":exp:5:exp:15:char*:"compat":char*:"NULL"
X509 CRT verification #8c (Expired Cert, longer chain)
depends_on:0:6:10:11:12:2:1:16:15
7:char*:"/zip/third_party/mbedtls/test/data/server7-expired.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"NULL":exp:5:exp:14:char*:"compat":char*:"NULL"
X509 CRT verification #8d (Future Cert, longer chain)
depends_on:0:6:10:11:12:2:1:16:15
7:char*:"/zip/third_party/mbedtls/test/data/server7-future.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"NULL":exp:5:exp:15:char*:"compat":char*:"NULL"
X509 CRT verification #9 (Not trusted Cert)
depends_on:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/server2.crt":char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #10 (Not trusted Cert, Expired CRL)
depends_on:0:1:16:2
7:char*:"/zip/third_party/mbedtls/test/data/server2.crt":char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/crl_expired.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #12 (Valid Cert MD2 Digest, MD2 forbidden)
depends_on:3:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_md2.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:17:char*:"compat":char*:"NULL"
X509 CRT verification #12 (Valid Cert MD4 Digest, MD4 forbidden)
depends_on:4:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_md4.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:17:char*:"compat":char*:"NULL"
X509 CRT verification #13 (Valid Cert MD5 Digest, MD5 forbidden)
depends_on:5:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_md5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:17:char*:"compat":char*:"NULL"
X509 CRT verification #12 (Valid Cert MD2 Digest, MD2 allowed)
depends_on:3:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_md2.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"all":char*:"NULL"
X509 CRT verification #12 (Valid Cert MD4 Digest, MD4 allowed)
depends_on:4:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_md4.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"all":char*:"NULL"
X509 CRT verification #13 (Valid Cert MD5 Digest, MD5 allowed)
depends_on:5:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_md5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"all":char*:"NULL"
X509 CRT verification #14 (Valid Cert SHA1 Digest explicitly allowed in profile)
depends_on:2:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_sha1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #14 (Valid Cert SHA1 Digest allowed in compile-time default profile)
depends_on:2:0:2:1:16:17
7:char*:"/zip/third_party/mbedtls/test/data/cert_sha1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"":char*:"NULL"
X509 CRT verification #14 (Valid Cert SHA1 Digest forbidden in default profile)
depends_on:2:0:2:1:16:18
7:char*:"/zip/third_party/mbedtls/test/data/cert_sha1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:18:char*:"":char*:"NULL"
X509 CRT verification #15 (Valid Cert SHA224 Digest)
depends_on:6:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_sha224.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #16 (Valid Cert SHA256 Digest)
depends_on:6:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_sha256.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #17 (Valid Cert SHA384 Digest)
depends_on:7:8:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_sha384.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #18 (Valid Cert SHA512 Digest)
depends_on:7:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_sha512.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #19 (Valid Cert, denying callback)
depends_on:7:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_sha512.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:19:char*:"compat":char*:"verify_none"
X509 CRT verification #19 (Not trusted Cert, allowing callback)
depends_on:0:1:16:2
7:char*:"/zip/third_party/mbedtls/test/data/server2.crt":char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/crl_expired.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"verify_all"
X509 CRT verification #21 (domain matching wildcard certificate, case insensitive)
depends_on:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_example_wildcard.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"mail.ExAmPlE.com":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #22 (domain not matching wildcard certificate)
depends_on:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_example_wildcard.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"mail.example.net":exp:5:exp:20:char*:"compat":char*:"NULL"
X509 CRT verification #23 (domain not matching wildcard certificate)
depends_on:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_example_wildcard.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"example.com":exp:5:exp:20:char*:"compat":char*:"NULL"
X509 CRT verification #24 (domain matching CN of multi certificate)
depends_on:0:2:6:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_example_multi.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"www.example.com":exp:5:exp:20:char*:"compat":char*:"NULL"
X509 CRT verification #25 (domain matching multi certificate)
depends_on:0:2:6:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_example_multi.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"example.net":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #26 (domain not matching multi certificate)
depends_on:0:2:6:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_example_multi.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"www.example.net":exp:5:exp:20:char*:"compat":char*:"NULL"
X509 CRT verification #27.1 (domain not matching multi certificate: suffix)
depends_on:0:2:6:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_example_multi.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"xample.net":exp:5:exp:20:char*:"compat":char*:"NULL"
X509 CRT verification #27.2 (domain not matching multi certificate: head junk)
depends_on:0:2:6:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_example_multi.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"bexample.net":exp:5:exp:20:char*:"compat":char*:"NULL"
X509 CRT verification #28 (domain not matching wildcard in multi certificate)
depends_on:0:2:6:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_example_multi.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"example.org":exp:5:exp:20:char*:"compat":char*:"NULL"
X509 CRT verification #29 (domain matching wildcard in multi certificate)
depends_on:0:2:6:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_example_multi.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"mail.example.org":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #30 (domain matching multi certificate without CN)
depends_on:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_example_multi_nocn.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"www.shotokan-braunschweig.de":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #31 (domain not matching multi certificate without CN)
depends_on:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/cert_example_multi_nocn.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"www.example.net":exp:5:exp:21:char*:"compat":char*:"NULL"
X509 CRT verification #32 (Valid, EC cert, RSA CA)
depends_on:0:1:10:13:1:16:2
7:char*:"/zip/third_party/mbedtls/test/data/server3.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #33 (Valid, RSA cert, EC CA)
depends_on:0:1:10:6:11:1:16:12
7:char*:"/zip/third_party/mbedtls/test/data/server4.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #34 (Valid, EC cert, EC CA)
depends_on:0:10:6:11:12
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #35 (Revoked, EC CA)
depends_on:0:10:6:11:12:15
7:char*:"/zip/third_party/mbedtls/test/data/server6.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":exp:5:exp:12:char*:"compat":char*:"NULL"
X509 CRT verification #36 (Valid, EC CA, SHA1 Digest)
depends_on:0:10:6:11:12:2
7:char*:"/zip/third_party/mbedtls/test/data/server5-sha1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #37 (Valid, EC CA, SHA224 Digest)
depends_on:0:10:6:11:12
7:char*:"/zip/third_party/mbedtls/test/data/server5-sha224.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #38 (Valid, EC CA, SHA384 Digest)
depends_on:0:10:6:7:8:11:12
7:char*:"/zip/third_party/mbedtls/test/data/server5-sha384.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #39 (Valid, EC CA, SHA512 Digest)
depends_on:0:10:6:7:11:12
7:char*:"/zip/third_party/mbedtls/test/data/server5-sha512.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #40 (Valid, depth 0, RSA, CA)
depends_on:0:1:16:6:2
7:char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #41 (Valid, depth 0, EC, CA)
depends_on:0:10:11:12:6
7:char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #42 (Depth 0, not CA, RSA)
depends_on:0:1:16:2
7:char*:"/zip/third_party/mbedtls/test/data/server2.crt":char*:"/zip/third_party/mbedtls/test/data/server2.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #43 (Depth 0, not CA, EC)
depends_on:0:10:11:6
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #44 (Corrupted signature, EC)
depends_on:0:10:11:12:6
7:char*:"/zip/third_party/mbedtls/test/data/server5-badsign.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #45 (Corrupted signature, RSA)
depends_on:0:1:16:2
7:char*:"/zip/third_party/mbedtls/test/data/server2-badsign.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #45b (Corrupted signature, intermediate CA)
depends_on:0:1:16:2:10:11:12:6
7:char*:"/zip/third_party/mbedtls/test/data/server7-badsign.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #46 (Valid, depth 2, EC-RSA-EC)
depends_on:0:10:1:11:12:1:16:6
7:char*:"/zip/third_party/mbedtls/test/data/server7_int-ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #47 (Untrusted, depth 2, EC-RSA-EC)
depends_on:0:10:1:11:1:16:2:6
7:char*:"/zip/third_party/mbedtls/test/data/server7_int-ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #48 (Missing intermediate CA, EC-RSA-EC)
depends_on:0:10:1:11:1:16:2:6
7:char*:"/zip/third_party/mbedtls/test/data/server7.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #49 (Valid, depth 2, RSA-EC-RSA)
depends_on:0:10:1:12:1:16:6:2
7:char*:"/zip/third_party/mbedtls/test/data/server8_int-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #50 (Valid, multiple CAs)
depends_on:0:1:16:10:12:2:6
7:char*:"/zip/third_party/mbedtls/test/data/server2.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_cat12.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #51 (Valid, multiple CAs, reverse order)
depends_on:0:1:16:10:12:2:6
7:char*:"/zip/third_party/mbedtls/test/data/server2.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_cat21.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #52 (CA keyUsage valid)
depends_on:0:10:6:11:12
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.ku-crt_crl.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #53 (CA keyUsage missing cRLSign)
depends_on:0:10:6:19:11:12
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.ku-crt.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":exp:5:exp:22:char*:"compat":char*:"NULL"
X509 CRT verification #54 (CA keyUsage missing cRLSign, no CRL)
depends_on:0:10:6:11:12:2:1
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.ku-crt.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #55 (CA keyUsage missing keyCertSign)
depends_on:0:10:6:19:11:12
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.ku-crl.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #56 (CA keyUsage plain wrong)
depends_on:0:10:6:19:11:12
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.ku-ds.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #57 (Valid, RSASSA-PSS, SHA-1)
depends_on:0:9:2:16
7:char*:"/zip/third_party/mbedtls/test/data/server9.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #58 (Valid, RSASSA-PSS, SHA-224)
depends_on:0:9:6:2
7:char*:"/zip/third_party/mbedtls/test/data/server9-sha224.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl-rsa-pss-sha224.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #59 (Valid, RSASSA-PSS, SHA-256)
depends_on:0:9:6:2
7:char*:"/zip/third_party/mbedtls/test/data/server9-sha256.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl-rsa-pss-sha256.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #60 (Valid, RSASSA-PSS, SHA-384)
depends_on:0:9:7:8:2
7:char*:"/zip/third_party/mbedtls/test/data/server9-sha384.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl-rsa-pss-sha384.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #61 (Valid, RSASSA-PSS, SHA-512)
depends_on:0:9:7:2
7:char*:"/zip/third_party/mbedtls/test/data/server9-sha512.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl-rsa-pss-sha512.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #62 (Revoked, RSASSA-PSS, SHA-1)
depends_on:0:9:2:15
7:char*:"/zip/third_party/mbedtls/test/data/server9.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl-rsa-pss-sha1.pem":char*:"NULL":exp:5:exp:12:char*:"compat":char*:"NULL"
X509 CRT verification #63 (Revoked, RSASSA-PSS, SHA-1, CRL badsign)
depends_on:0:9:2
7:char*:"/zip/third_party/mbedtls/test/data/server9.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl-rsa-pss-sha1-badsign.pem":char*:"NULL":exp:5:exp:22:char*:"compat":char*:"NULL"
X509 CRT verification #64 (Valid, RSASSA-PSS, SHA-1, not top)
depends_on:0:9:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/server9-with-ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #65 (RSASSA-PSS, SHA1, bad cert signature)
depends_on:0:9:2
7:char*:"/zip/third_party/mbedtls/test/data/server9-badsign.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #66 (RSASSA-PSS, SHA1, no RSA CA)
depends_on:0:9:2:10:12:6
7:char*:"/zip/third_party/mbedtls/test/data/server9.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #67 (Valid, RSASSA-PSS, all defaults)
depends_on:0:9:2
7:char*:"/zip/third_party/mbedtls/test/data/server9-defaults.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl-rsa-pss-sha1.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #68 (RSASSA-PSS, wrong salt_len)
depends_on:0:9:6:2
7:char*:"/zip/third_party/mbedtls/test/data/server9-bad-saltlen.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #69 (RSASSA-PSS, wrong mgf_hash)
depends_on:0:9:6:2
7:char*:"/zip/third_party/mbedtls/test/data/server9-bad-mgfhash.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #70 (v1 trusted CA)
depends_on:0:1:16:6:2
7:char*:"/zip/third_party/mbedtls/test/data/server1-v1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca-v1.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #71 (v1 trusted CA, other)
depends_on:0:1:16:6:2
7:char*:"/zip/third_party/mbedtls/test/data/server2-v1.crt":char*:"/zip/third_party/mbedtls/test/data/server1-v1.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #72 (v1 chain)
depends_on:0:1:16:6:2
7:char*:"/zip/third_party/mbedtls/test/data/server2-v1-chain.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca-v1.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #73 (selfsigned trusted without CA bit)
depends_on:0:10:6:11:2:1
7:char*:"/zip/third_party/mbedtls/test/data/server5-selfsigned.crt":char*:"/zip/third_party/mbedtls/test/data/server5-selfsigned.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #74 (signed by selfsigned trusted without CA bit)
depends_on:0:10:6:11:2:1
7:char*:"/zip/third_party/mbedtls/test/data/server6-ss-child.crt":char*:"/zip/third_party/mbedtls/test/data/server5-selfsigned.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:16:char*:"compat":char*:"NULL"
X509 CRT verification #75 (encoding mismatch)
depends_on:0:2:1:16
7:char*:"/zip/third_party/mbedtls/test/data/enco-cert-utf8str.pem":char*:"/zip/third_party/mbedtls/test/data/enco-ca-prstr.pem":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #76 (multiple CRLs, not revoked)
depends_on:0:10:12:11:6:1:2
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_cat12.crt":char*:"/zip/third_party/mbedtls/test/data/crl_cat_ec-rsa.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #77 (multiple CRLs, revoked)
depends_on:0:10:12:11:6:1:2:15
7:char*:"/zip/third_party/mbedtls/test/data/server6.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_cat12.crt":char*:"/zip/third_party/mbedtls/test/data/crl_cat_ec-rsa.pem":char*:"NULL":exp:5:exp:12:char*:"compat":char*:"NULL"
X509 CRT verification #78 (multiple CRLs, revoked by second)
depends_on:0:10:12:11:6:1:2:15
7:char*:"/zip/third_party/mbedtls/test/data/server6.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_cat12.crt":char*:"/zip/third_party/mbedtls/test/data/crl_cat_rsa-ec.pem":char*:"NULL":exp:5:exp:12:char*:"compat":char*:"NULL"
X509 CRT verification #79 (multiple CRLs, revoked by future)
depends_on:0:10:12:11:6:1:2:15
7:char*:"/zip/third_party/mbedtls/test/data/server6.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_cat12.crt":char*:"/zip/third_party/mbedtls/test/data/crl_cat_ecfut-rsa.pem":char*:"NULL":exp:5:exp:23:char*:"compat":char*:"NULL"
X509 CRT verification #80 (multiple CRLs, first future, revoked by second)
depends_on:0:10:12:11:6:1:16:2:15
7:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_cat12.crt":char*:"/zip/third_party/mbedtls/test/data/crl_cat_ecfut-rsa.pem":char*:"NULL":exp:5:exp:12:char*:"compat":char*:"NULL"
X509 CRT verification #81 (multiple CRLs, none relevant)
depends_on:0:10:12:11:6:1:16:2
7:char*:"/zip/third_party/mbedtls/test/data/enco-cert-utf8str.pem":char*:"/zip/third_party/mbedtls/test/data/enco-ca-prstr.pem":char*:"/zip/third_party/mbedtls/test/data/crl_cat_rsa-ec.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #82 (Not yet valid CA and valid CA)
depends_on:0:10:11:12:2:6
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2_cat-future-present.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #83 (valid CA and Not yet valid CA)
depends_on:0:10:11:12:2:6
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2_cat-present-future.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #84 (valid CA and Not yet valid CA)
depends_on:0:10:11:12:2:6
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2_cat-present-past.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #85 (Not yet valid CA and valid CA)
depends_on:0:10:11:12:2:6
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2_cat-past-present.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #86 (Not yet valid CA and invalid CA)
depends_on:0:10:11:12:2:6:15
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2_cat-future-invalid.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"NULL":exp:5:exp:15:char*:"compat":char*:"NULL"
X509 CRT verification #87 (Expired CA and invalid CA)
depends_on:0:10:11:12:2:6:15
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2_cat-past-invalid.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"NULL":exp:5:exp:14:char*:"compat":char*:"NULL"
X509 CRT verification #88 (Spurious cert in the chain)
depends_on:0:10:11:12:2:6:1:16
7:char*:"/zip/third_party/mbedtls/test/data/server7_spurious_int-ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #89 (Spurious cert later in the chain)
depends_on:0:10:11:12:2:6:1:16
7:char*:"/zip/third_party/mbedtls/test/data/server10_int3_spurious_int-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #90 (EE with same name as trusted root)
depends_on:0:10:11:6:2
7:char*:"/zip/third_party/mbedtls/test/data/server5-ss-forgeca.crt":char*:"/zip/third_party/mbedtls/test/data/test-int-ca3.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha1.pem":char*:"NULL":exp:5:exp:16:char*:"":char*:"NULL"
X509 CRT verification #91 (same CA with good then bad key)
depends_on:0:2:1:16:6:10
7:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca-good-alt.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #91 (same CA with bad then good key)
depends_on:0:2:1:16:6:10
7:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca-alt-good.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":int:0:int:0:char*:"compat":char*:"NULL"
X509 CRT verification #92 (bad name, allowing callback)
depends_on:0:10:6:11:12
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"globalhost":int:0:int:0:char*:"":char*:"verify_all"
X509 CRT verification #93 (Suite B invalid, EC cert, RSA CA)
depends_on:0:1:20:13:16:2
7:char*:"/zip/third_party/mbedtls/test/data/server3.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:24:char*:"suite_b":char*:"NULL"
X509 CRT verification #94 (Suite B invalid, RSA cert, EC CA)
depends_on:0:1:10:6:11:16:12
7:char*:"/zip/third_party/mbedtls/test/data/server4.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":exp:5:exp:25:char*:"suite_b":char*:"NULL"
X509 CRT verification #95 (Suite B Valid, EC cert, EC CA)
depends_on:0:10:6:11:12
7:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":int:0:int:0:char*:"suite_b":char*:"NULL"
X509 CRT verification #96 (next profile Invalid Cert SHA224 Digest)
depends_on:6:0:1:16:2
7:char*:"/zip/third_party/mbedtls/test/data/cert_sha224.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl.pem":char*:"NULL":exp:5:exp:26:char*:"next":char*:"NULL"
X509 CRT verification #97 (next profile Valid Cert SHA256 Digest)
depends_on:6:0:1:16:10:2
7:char*:"/zip/third_party/mbedtls/test/data/cert_sha256.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl-ec-sha256.pem":char*:"NULL":int:0:int:0:char*:"next":char*:"NULL"
X509 CRT verification #98 (Revoked Cert, revocation date in the future, _with_ MBEDTLS_HAVE_TIME_DATE)
depends_on:0:2:1:16:15
7:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl-futureRevocationDate.pem":char*:"NULL":exp:5:exp:23:char*:"compat":char*:"NULL"
X509 CRT verification #99 (Revoked Cert, revocation date in the future, _without_ MBEDTLS_HAVE_TIME_DATE)
depends_on:0:2:1:16:21
7:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"/zip/third_party/mbedtls/test/data/crl-futureRevocationDate.pem":char*:"NULL":exp:5:exp:12:char*:"compat":char*:"NULL"
X509 CRT verification: domain identical to IPv4 in SubjectAltName
depends_on:0:10:6:11:1
7:char*:"/zip/third_party/mbedtls/test/data/server5-tricky-ip-san.crt":char*:"/zip/third_party/mbedtls/test/data/server5-tricky-ip-san.crt":char*:"/zip/third_party/mbedtls/test/data/crl_sha256.pem":char*:"abcd":exp:5:exp:20:char*:"":char*:"NULL"
X509 CRT verification: domain identical to IPv6 in SubjectAltName
depends_on:0:10:6:11:1
7:char*:"/zip/third_party/mbedtls/test/data/server5-tricky-ip-san.crt":char*:"/zip/third_party/mbedtls/test/data/server5-tricky-ip-san.crt":char*:"/zip/third_party/mbedtls/test/data/crl_sha256.pem":char*:"abcd.example.com":exp:5:exp:20:char*:"":char*:"NULL"
X509 CRT verification with ca callback: failure
depends_on:0:2:1:16:22
8:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"NULL":exp:27
X509 CRT verification callback: bad name
depends_on:0:10:6:11:12
9:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"globalhost":exp:5:char*:"depth 1 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000004\n"
X509 CRT verification callback: trusted EE cert
depends_on:0:10:6:11
9:char*:"/zip/third_party/mbedtls/test/data/server5-selfsigned.crt":char*:"/zip/third_party/mbedtls/test/data/server5-selfsigned.crt":char*:"NULL":int:0:char*:"depth 0 - serial 53\:A2\:CB\:4B\:12\:4E\:AD\:83\:7D\:A8\:94\:B2 - subject CN=selfsigned, OU=testing, O=PolarSSL, C=NL - flags 0x00000000\n"
X509 CRT verification callback: trusted EE cert, expired
depends_on:0:10:6:11:15
9:char*:"/zip/third_party/mbedtls/test/data/server5-ss-expired.crt":char*:"/zip/third_party/mbedtls/test/data/server5-ss-expired.crt":char*:"NULL":exp:5:char*:"depth 0 - serial D8\:64\:61\:05\:E3\:A3\:CD\:78 - subject C=UK, O=mbed TLS, OU=testsuite, CN=localhost - flags 0x00000001\n"
X509 CRT verification callback: simple
depends_on:0:2:1:16
9:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":char*:"NULL":int:0:char*:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n"
X509 CRT verification callback: simple, EE expired
depends_on:0:6:10:11:12:2:15
9:char*:"/zip/third_party/mbedtls/test/data/server5-expired.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"NULL":exp:5:char*:"depth 1 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 1E - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000001\n"
X509 CRT verification callback: simple, root expired
depends_on:0:6:10:11:12:2:15
9:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2-expired.crt":char*:"NULL":exp:5:char*:"depth 1 - serial 01 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
X509 CRT verification callback: two trusted roots
depends_on:0:2:1:16:10:12:6
9:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_cat12.crt":char*:"NULL":int:0:char*:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n"
X509 CRT verification callback: two trusted roots, reversed order
depends_on:0:2:1:16:10:12:6
9:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_cat21.crt":char*:"NULL":int:0:char*:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n"
X509 CRT verification callback: root included
depends_on:0:2:1:16:10:12:6
9:char*:"/zip/third_party/mbedtls/test/data/server1_ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_cat21.crt":char*:"NULL":int:0:char*:"depth 1 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=PolarSSL Server 1 - flags 0x00000000\n"
X509 CRT verification callback: intermediate ca
depends_on:0:10:1:11:12:1:16:6:2
9:char*:"/zip/third_party/mbedtls/test/data/server7_int-ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_cat12.crt":char*:"NULL":int:0:char*:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
X509 CRT verification callback: intermediate ca, root included
depends_on:0:10:1:11:12:1:16:6:2
9:char*:"/zip/third_party/mbedtls/test/data/server7_int-ca_ca2.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_cat12.crt":char*:"NULL":int:0:char*:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
X509 CRT verification callback: intermediate ca trusted
depends_on:0:10:1:11:12:1:16:6
9:char*:"/zip/third_party/mbedtls/test/data/server7_int-ca_ca2.crt":char*:"/zip/third_party/mbedtls/test/data/test-int-ca.crt":char*:"NULL":int:0:char*:"depth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
X509 CRT verification callback: intermediate ca, EE expired
depends_on:0:10:1:11:12:1:16:6:2:15
9:char*:"/zip/third_party/mbedtls/test/data/server7-expired.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"NULL":exp:5:char*:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000001\n"
X509 CRT verification callback: intermediate ca, int expired
depends_on:0:10:1:11:12:1:16:6:2:15
9:char*:"/zip/third_party/mbedtls/test/data/server7_int-ca-exp.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"NULL":exp:5:char*:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000001\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
X509 CRT verification callback: intermediate ca, root expired
depends_on:0:10:1:11:12:1:16:6:2:15
9:char*:"/zip/third_party/mbedtls/test/data/server7_int-ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2-expired.crt":char*:"NULL":exp:5:char*:"depth 2 - serial 01 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000000\n"
X509 CRT verification callback: two intermediates
depends_on:0:10:1:11:12:1:16:6:2
9:char*:"/zip/third_party/mbedtls/test/data/server10_int3_int-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_cat21.crt":char*:"NULL":int:0:char*:"depth 3 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n"
X509 CRT verification callback: two intermediates, root included
depends_on:0:10:1:11:12:1:16:6:2
9:char*:"/zip/third_party/mbedtls/test/data/server10_int3_int-ca2_ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca_cat21.crt":char*:"NULL":int:0:char*:"depth 3 - serial 03 - subject C=NL, O=PolarSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n"
X509 CRT verification callback: two intermediates, top int trusted
depends_on:0:10:1:11:12:1:16:6
9:char*:"/zip/third_party/mbedtls/test/data/server10_int3_int-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/test-int-ca2.crt":char*:"NULL":int:0:char*:"depth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA - flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n"
X509 CRT verification callback: two intermediates, low int trusted
depends_on:0:10:1:11:12:1:16:6:2
9:char*:"/zip/third_party/mbedtls/test/data/server10_int3_int-ca2_ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-int-ca3.crt":char*:"NULL":int:0:char*:"depth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3 - flags 0x00000000\ndepth 0 - serial 4B - subject CN=localhost - flags 0x00000000\n"
X509 CRT verification callback: no intermediate, bad signature
depends_on:0:10:6:11:12
9:char*:"/zip/third_party/mbedtls/test/data/server5-badsign.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"NULL":exp:5:char*:"depth 0 - serial 09 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000008\n"
X509 CRT verification callback: one intermediate, bad signature
depends_on:0:1:16:2:10:11:12:6
9:char*:"/zip/third_party/mbedtls/test/data/server7-badsign.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"NULL":exp:5:char*:"depth 2 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA - flags 0x00000000\ndepth 0 - serial 10 - subject C=NL, O=PolarSSL, CN=localhost - flags 0x00000008\n"
X509 Parse Selftest
depends_on:2:0:23:1:16
27
X509 CRT ASN1 (Empty Certificate)
14:hex:"":char*:"":exp:28
X509 CRT ASN1 (inv Certificate, bad tag)
14:hex:"0500":char*:"":exp:28
X509 CRT ASN1 (inv Certificate, no length)
14:hex:"30":char*:"":exp:28
X509 CRT ASN1 (inv Certificate, bad length encoding)
14:hex:"3085":char*:"":exp:28
X509 CRT ASN1 (inv Certificate, length data incomplete)
14:hex:"308200":char*:"":exp:28
X509 CRT ASN1 (inv Certificate, length out of bounds)
14:hex:"3001":char*:"":exp:28
X509 CRT ASN1 (inv TBS, invalid tag)
14:hex:"30020500":char*:"":exp:29
X509 CRT ASN1 (inv TBS, length missing)
14:hex:"300130":char*:"":exp:30
X509 CRT ASN1 (inv TBS, invalid length encoding)
14:hex:"30023085":char*:"":exp:31
X509 CRT ASN1 (inv TBS, length data incomplete)
14:hex:"300430839999":char*:"":exp:30
X509 CRT ASN1 (inv TBS, length out of bounds)
14:hex:"30023003":char*:"":exp:30
X509 CRT ASN1 (TBS empty)
depends_on:6:1
14:hex:"30153000300d06092a864886f70d01010b0500030200ff":char*:"":exp:30
X509 CRT ASN1 (TBS, invalid version tag, serial missing)
depends_on:6:1
14:hex:"301730020500300d06092a864886f70d01010b0500030200ff":char*:"":exp:32
X509 CRT ASN1 (TBS, valid outer version tag, no outer length)
depends_on:6:1
14:hex:"30163001a0300d06092a864886f70d01010b0500030200ff":char*:"":exp:30
X509 CRT ASN1 (TBS, inv inner version tag)
depends_on:6:1
14:hex:"30193004a0020500300d06092a864886f70d01010b0500030200ff":char*:"":exp:33
X509 CRT ASN1 (TBS, valid inner version tag, no inner length)
depends_on:6:1
14:hex:"30183003a00102300d06092a864886f70d01010b0500030200ff":char*:"":exp:34
X509 CRT ASN1 (TBS, valid inner version tag, inv inner length encoding)
depends_on:6:1
14:hex:"30193004a0020285300d06092a864886f70d01010b0500030200ff":char*:"":exp:35
X509 CRT ASN1 (TBS, valid inner version tag, inner length too large for int)
depends_on:6:1
14:hex:"30293014a012021001000000000000000000000000000000300d06092a864886f70d01010b0500030200ff":char*:"":exp:35
X509 CRT ASN1 (TBS, valid inner version tag, inner vs. outer length mismatch)
depends_on:6:1
14:hex:"301b3006a00402010200300d06092a864886f70d01010b0500030200ff":char*:"":exp:36
X509 CRT ASN1 (TBS, valid version tag, length exceeds TBS)
depends_on:6:1
14:hex:"30293014a012021100000000000000000000000000000000300d06092a864886f70d01010b0500030200ff":char*:"":exp:34
X509 CRT ASN1 (TBS, valid version tag + length, unknown version number 3)
depends_on:6:1
14:hex:"308196308180a0030201038204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:37
X509 CRT ASN1 (TBS, valid version tag + length, unknown version number 4)
depends_on:6:1
14:hex:"308196308180a0030201048204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:37
X509 CRT ASN1 (TBS, valid version tag + length, version number overflow)
depends_on:6:1
14:hex:"308199308183a00602047FFFFFFF8204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:37
X509 CRT ASN1 (TBS, serial missing)
depends_on:6:1
14:hex:"301a3005a003020102300d06092a864886f70d01010b0500030200ff":char*:"":exp:38
X509 CRT ASN1 (TBS, inv serial, tag wrong)
depends_on:6:1
14:hex:"301c3007a0030201020500300d06092a864886f70d01010b0500030200ff":char*:"":exp:32
X509 CRT ASN1 (TBS, inv serial, length missing)
depends_on:6:1
14:hex:"301b3006a00302010282300d06092a864886f70d01010b0500030200ff":char*:"":exp:38
X509 CRT ASN1 (TBS, inv serial, inv length encoding)
depends_on:6:1
14:hex:"301c3007a0030201028285300d06092a864886f70d01010b0500030200ff":char*:"":exp:39
X509 CRT ASN1 (TBS, inv serial, length out of bounds)
depends_on:6:1
14:hex:"301c3007a0030201028201300d06092a864886f70d01010b0500030200ff":char*:"":exp:38
X509 CRT ASN1 (TBS, AlgID missing)
depends_on:6:1
14:hex:"3020300ba0030201028204deadbeef300d06092a864886f70d01010b0500030200ff":char*:"":exp:40
X509 CRT ASN1 (TBS, inv AlgID, tag wrong)
depends_on:6:1
14:hex:"3022300da0030201028204deadbeef0500300d06092a864886f70d01010b0500030200ff":char*:"":exp:41
X509 CRT ASN1 (TBS, inv AlgID, OID missing)
depends_on:6:1
14:hex:"307b3073a0030201008204deadbeef3000300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff3000030200ff":char*:"":exp:40
X509 CRT ASN1 (TBS, inv AlgID, OID tag wrong)
depends_on:6:1
14:hex:"307f3075a0030201008204deadbeef30020500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020500030200ff":char*:"":exp:41
X509 CRT ASN1 (TBS, inv AlgID, OID inv length encoding)
depends_on:6:1
14:hex:"307f3075a0030201008204deadbeef30020685300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020685030200ff":char*:"":exp:42
X509 CRT ASN1 (TBS, inv AlgID, OID length out of bounds)
depends_on:6:1
14:hex:"307f3075a0030201008204deadbeef30020601300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020601030200ff":char*:"":exp:40
X509 CRT ASN1 (TBS, inv AlgID, OID empty)
depends_on:6:1
14:hex:"307f3075a0030201008204deadbeef30020600300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30020600030200ff":char*:"":exp:43
X509 CRT ASN1 (TBS, inv AlgID, OID unknown)
depends_on:6:1
14:hex:"3081873079a0030201008204deadbeef30060604deadbeef300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff30060604deadbeef030200ff":char*:"":exp:43
X509 CRT ASN1 (TBS, inv AlgID, param inv length encoding)
depends_on:6:1
14:hex:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0685300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0685030200ff":char*:"":exp:42
X509 CRT ASN1 (TBS, inv AlgID, param length out of bounds)
depends_on:6:1
14:hex:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0601300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0601030200ff":char*:"":exp:40
X509 CRT ASN1 (TBS, inv AlgID, param length mismatch)
depends_on:6:1
14:hex:"30819a308182a0030201008204deadbeef300f06092a864886f70d01010b06010000300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300f06092a864886f70d01010b06010000030200ff":char*:"":exp:44
X509 CRT ASN1 (TBS, inv AlgID, params present but empty)
depends_on:6:1
14:hex:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0600300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0600030200ff":char*:"":exp:45
X509 CRT ASN1 (TBS, inv AlgID, bad RSASSA-PSS params)
depends_on:6:9
14:hex:"308196308180a0030201008204deadbeef300d06092a864886f70d01010a3100300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010a3100030200ff":char*:"":exp:41
X509 CRT ASN1 (TBS, Issuer missing)
depends_on:6:1
14:hex:"302f301aa0030201008204deadbeef300d06092a864886f70d01010b0500300d06092a864886f70d01010b0500030200ff":char*:"":exp:30
X509 CRT ASN1 (TBS, inv Issuer, RDNSequence inv tag)
depends_on:6:1
14:hex:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05000500300d06092a864886f70d01010b0500030200ff":char*:"":exp:29
X509 CRT ASN1 (TBS, inv Issuer, RDNSequence length missing)
depends_on:6:1
14:hex:"3030301ba0030201008204deadbeef300d06092a864886f70d01010b050030300d06092a864886f70d01010b0500030200ff":char*:"":exp:30
X509 CRT ASN1 (TBS, inv Issuer, RDNSequence inv length encoding)
depends_on:6:1
14:hex:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05003085300d06092a864886f70d01010b0500030200ff":char*:"":exp:31
X509 CRT ASN1 (TBS, inv Issuer, RDNSequence length out of bounds)
depends_on:6:1
14:hex:"3031301ca0030201008204deadbeef300d06092a864886f70d01010b05003001300d06092a864886f70d01010b0500030200ff":char*:"":exp:30
X509 CRT ASN1 (TBS, inv Issuer, RDNSequence empty)
depends_on:1:6
14:hex:"3081893074a0030201028204deadbeef300d06092a864886f70d01010b05003000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Issuer, RDN inv tag)
depends_on:1:6
14:hex:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:47
X509 CRT ASN1 (TBS, inv Issuer, RDN inv length encoding)
depends_on:1:6
14:hex:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023185301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:48
X509 CRT ASN1 (TBS, inv Issuer, RDN length out of bounds)
depends_on:1:6
14:hex:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023101301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Issuer, RDN empty)
depends_on:1:6
14:hex:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b050030023100301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue inv tag)
depends_on:1:6
14:hex:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:47
X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue inv length encoding)
depends_on:1:6
14:hex:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023085301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:48
X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue length out of bounds)
depends_on:1:6
14:hex:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023001301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue empty)
depends_on:1:6
14:hex:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300431023000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv tag)
depends_on:1:6
14:hex:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:47
X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv no length data)
depends_on:1:6
14:hex:"30818e3079a0030201028204deadbeef300d06092a864886f70d01010b050030053103300106301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type inv length encoding)
depends_on:1:6
14:hex:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020685301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:48
X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue type length out of bounds)
depends_on:1:6
14:hex:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020601301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value missing)
depends_on:1:6
14:hex:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b05003006310430020600301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value inv tag)
depends_on:1:6
14:hex:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000500301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:49
X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length missing)
depends_on:1:6
14:hex:"308190307ba0030201028204deadbeef300d06092a864886f70d01010b050030073105300306000c301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value inv length encoding)
depends_on:1:6
14:hex:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000C85301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:48
X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length out of bounds)
depends_on:1:6
14:hex:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b050030083106300406000c01301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Issuer, AttrTypeAndValue value length mismatch)
depends_on:1:6
14:hex:"308193307ea0030201028204deadbeef300d06092a864886f70d01010b0500300a3108300606000c010000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:50
X509 CRT ASN1 (TBS, inv Issuer, 2nd AttributeTypeValue empty)
depends_on:1:6
14:hex:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300e310c300806000c04546573743000301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, Validity missing)
depends_on:1:6
14:hex:"303d3028a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c0454657374300d06092a864886f70d01010b0500030200ff":char*:"":exp:51
X509 CRT ASN1 (TBS, inv Validity, inv tag)
depends_on:1:6
14:hex:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573740500300d06092a864886f70d01010b0500030200ff":char*:"":exp:52
X509 CRT ASN1 (TBS, inv Validity, length field missing)
depends_on:1:6
14:hex:"303e3029a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430300d06092a864886f70d01010b0500030200ff":char*:"":exp:51
X509 CRT ASN1 (TBS, inv Validity, inv length encoding)
depends_on:1:6
14:hex:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743085300d06092a864886f70d01010b0500030200ff":char*:"":exp:53
X509 CRT ASN1 (TBS, inv Validity, length out of bounds)
depends_on:1:6
14:hex:"303f302aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743001300d06092a864886f70d01010b0500030200ff":char*:"":exp:51
X509 CRT ASN1 (TBS, inv Validity, notBefore missing)
depends_on:1:6
14:hex:"30793064a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743000300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:51
X509 CRT ASN1 (TBS, inv Validity, notBefore inv tag)
depends_on:1:6
14:hex:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430020500300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:52
X509 CRT ASN1 (TBS, inv Validity, notBefore no length)
depends_on:1:6
14:hex:"307a3065a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c0454657374300117300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:51
X509 CRT ASN1 (TBS, inv Validity, notBefore inv length encoding)
depends_on:1:6
14:hex:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c04546573743002178f300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:53
X509 CRT ASN1 (TBS, inv Validity, notBefore length out of bounds)
depends_on:1:6
14:hex:"307b3066a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a300806000c045465737430021701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:51
X509 CRT ASN1 (TBS, inv Validity, notBefore empty)
depends_on:1:6
14:hex:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a3008060013045465737430101700170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:54
X509 CRT ASN1 (TBS, inv Validity, notBefore invalid)
depends_on:1:6
14:hex:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303000000000170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:54
X509 CRT ASN1 (TBS, inv Validity, notAfter missing)
depends_on:1:6
14:hex:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374300e170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:51
X509 CRT ASN1 (TBS, inv Validity, notAfter inv tag)
depends_on:1:6
14:hex:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935390500300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:52
X509 CRT ASN1 (TBS, inv Validity, notAfter length missing)
depends_on:1:6
14:hex:"3081883073a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374300f170c30393132333132333539353917300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:51
X509 CRT ASN1 (TBS, inv Validity, notAfter inv length encoding)
depends_on:1:6
14:hex:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391785300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:53
X509 CRT ASN1 (TBS, inv Validity, notAfter length out of bounds)
depends_on:1:6
14:hex:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391701300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:51
X509 CRT ASN1 (TBS, inv Validity, notAfter empty)
depends_on:1:6
14:hex:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a300806001304546573743010170c3039313233313233353935391700300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:54
X509 CRT ASN1 (TBS, inv Validity, notAfter invalid)
depends_on:1:6
14:hex:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303931323331323335393539170c303930313031303000000000300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:54
X509 CRT ASN1 (TBS, inv Validity, data remaining after 'notAfter')
depends_on:1:6
14:hex:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e170c303930313031303030303030170c3039313233313233353935391700300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:55
X509 CRT ASN1 (TBS, Subject missing)
depends_on:1:6
14:hex:"305b3046a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300d06092a864886f70d01010b0500030200ff":char*:"":exp:30
X509 CRT ASN1 (TBS, inv Subject, RDNSequence inv tag)
depends_on:1:6
14:hex:"305c3047a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353900300d06092a864886f70d01010b0500030200ff":char*:"":exp:29
X509 CRT ASN1 (TBS, inv Subject, RDNSequence length missing)
depends_on:1:6
14:hex:"305c3047a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930300d06092a864886f70d01010b0500030200ff":char*:"":exp:30
X509 CRT ASN1 (TBS, inv Subject, RDNSequence inv length encoding)
depends_on:1:6
14:hex:"305d3048a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393085300d06092a864886f70d01010b0500030200ff":char*:"":exp:31
X509 CRT ASN1 (TBS, inv Subject, RDNSequence length out of bounds)
depends_on:1:6
14:hex:"305d3048a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393001300d06092a864886f70d01010b0500030200ff":char*:"":exp:30
X509 CRT ASN1 (TBS, inv Subject, RDN inv tag)
depends_on:1:6
14:hex:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:47
X509 CRT ASN1 (TBS, inv Subject, RDN inv length encoding)
depends_on:1:6
14:hex:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023185302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:48
X509 CRT ASN1 (TBS, inv Subject, RDN length out of bounds)
depends_on:1:6
14:hex:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023101302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Subject, RDN empty)
depends_on:1:6
14:hex:"30818b3076a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930023100302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue inv tag)
depends_on:1:6
14:hex:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:47
X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue inv length encoding)
depends_on:1:6
14:hex:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023085302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:48
X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue length out of bounds)
depends_on:1:6
14:hex:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023001302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue empty)
depends_on:1:6
14:hex:"30818d3078a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300431023000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv tag)
depends_on:1:6
14:hex:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:47
X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv no length data)
depends_on:1:6
14:hex:"30818e3079a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930053103300106302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type inv length encoding)
depends_on:1:6
14:hex:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020685302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:48
X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue type length out of bounds )
depends_on:1:6
14:hex:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020601302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value missing)
depends_on:1:6
14:hex:"30818f307aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c3039313233313233353935393006310430020600302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value inv tag)
depends_on:1:6
14:hex:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000500302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:49
X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length missing)
depends_on:1:6
14:hex:"308190307ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930073105300306000c302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value inv length encoding)
depends_on:1:6
14:hex:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000C85302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:48
X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length out of bounds)
depends_on:1:6
14:hex:"308191307ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c30393132333132333539353930083106300406000c01302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, inv Subject, AttrTypeAndValue value length mismatch)
depends_on:1:6
14:hex:"308193307ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300a3108300606000c010000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:50
X509 CRT ASN1 (TBS, inv Subject, 2nd AttributeTypeValue empty)
depends_on:1:6
14:hex:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300e310c300806000c04546573743000302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:46
X509 CRT ASN1 (TBS, SubPubKeyInfo missing)
depends_on:1:6
14:hex:"30693054a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300d06092a864886f70d01010b0500030200ff":char*:"":exp:56
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv tag)
depends_on:1:6
14:hex:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573740500300d06092a864886f70d01010b0500030200ff":char*:"":exp:57
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, length missing)
depends_on:1:6
14:hex:"306a3055a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430300d06092a864886f70d01010b0500030200ff":char*:"":exp:56
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv length encoding)
depends_on:1:6
14:hex:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743085300d06092a864886f70d01010b0500030200ff":char*:"":exp:58
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, length out of bounds)
depends_on:1:6
14:hex:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743001300d06092a864886f70d01010b0500030200ff":char*:"":exp:56
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, empty)
depends_on:1:6
14:hex:"306b3056a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743000300d06092a864886f70d01010b0500030200ff":char*:"":exp:59
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv algorithm tag)
depends_on:1:6
14:hex:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430020500300d06092a864886f70d01010b0500030200ff":char*:"":exp:60
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm length missing)
depends_on:1:6
14:hex:"306c3057a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300130300d06092a864886f70d01010b0500030200ff":char*:"":exp:59
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm inv length encoding)
depends_on:1:6
14:hex:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430023085300d06092a864886f70d01010b0500030200ff":char*:"":exp:61
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm length out of bounds)
depends_on:1:6
14:hex:"306d3058a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a3008060013045465737430023001300d06092a864886f70d01010b0500030200ff":char*:"":exp:59
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm empty)
depends_on:1:6
14:hex:"3081883073a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301d300003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:59
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, algorithm unknown)
depends_on:1:6
14:hex:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010100050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:62
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring missing)
depends_on:1:6
14:hex:"307a3065a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374300f300d06092A864886F70D0101010500300d06092a864886f70d01010b0500030200ff":char*:"":exp:63
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring inv tag)
depends_on:1:6
14:hex:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000500300d06092a864886f70d01010b0500030200ff":char*:"":exp:64
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring length missing)
depends_on:1:6
14:hex:"307b3066a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743010300d06092A864886F70D010101050003300d06092a864886f70d01010b0500030200ff":char*:"":exp:63
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring inv length encoding)
depends_on:1:6
14:hex:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000385300d06092a864886f70d01010b0500030200ff":char*:"":exp:65
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, bitstring length out of bounds)
depends_on:1:6
14:hex:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000301300d06092a864886f70d01010b0500030200ff":char*:"":exp:63
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, no bitstring data)
depends_on:1:6
14:hex:"307c3067a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743011300d06092A864886F70D01010105000300300d06092a864886f70d01010b0500030200ff":char*:"":exp:66
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv bitstring start)
depends_on:1:6
14:hex:"307d3068a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743012300d06092A864886F70D0101010500030101300d06092a864886f70d01010b0500030200ff":char*:"":exp:66
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv internal bitstring length)
depends_on:1:6
14:hex:"308180306ba0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743015300d06092A864886F70D0101010500030400300000300d06092a864886f70d01010b0500030200ff":char*:"":exp:67
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv internal bitstring tag)
depends_on:1:6
14:hex:"308180306ba0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a300806001304546573743015300d06092A864886F70D0101010500030400310000300d06092a864886f70d01010b0500030200ff":char*:"":exp:64
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, inv RSA modulus)
depends_on:1:6
14:hex:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301c300d06092A864886F70D0101010500030b0030080202ffff0302ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:64
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, total length mismatch)
depends_on:1:6
14:hex:"3081893074a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301e300d06092A864886F70D0101010500030b0030080202ffff0202ffff0500300d06092a864886f70d01010b0500030200ff":char*:"":exp:67
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, check failed)
depends_on:1:6
14:hex:"3081873072a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374301c300d06092A864886F70D0101010500030b0030080202ffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:68
X509 CRT ASN1 (TBS, inv SubPubKeyInfo, check failed, expanded length notation)
depends_on:1:6
14:hex:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210fffffffffffffffffffffffffffffffe0202ffff300d06092a864886f70d01010b0500030200ff":char*:"":exp:68
X509 CRT ASN1 (TBS, inv IssuerID, inv tag)
depends_on:1:6
14:hex:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff0500300d06092a864886f70d01010b0500030200ff":char*:"":exp:1
X509 CRT ASN1 (TBS, inv IssuerID, length missing)
depends_on:1:6
14:hex:"308197308181a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa1300d06092a864886f70d01010b0500030200ff":char*:"":exp:30
X509 CRT ASN1 (TBS, inv IssuerID, inv length encoding)
depends_on:1:6
14:hex:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa185300d06092a864886f70d01010b0500030200ff":char*:"":exp:31
X509 CRT ASN1 (TBS, inv IssuerID, length out of bounds)
depends_on:1:6
14:hex:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa101300d06092a864886f70d01010b0500030200ff":char*:"":exp:30
X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, length missing)
depends_on:1:6
14:hex:"308197308181a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa2300d06092a864886f70d01010b0500030200ff":char*:"":exp:30
X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, inv length encoding)
depends_on:1:6
14:hex:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa285300d06092a864886f70d01010b0500030200ff":char*:"":exp:31
X509 CRT ASN1 (TBS, no IssuerID, inv SubjectID, length out of bounds)
depends_on:1:6
14:hex:"308198308182a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa201300d06092a864886f70d01010b0500030200ff":char*:"":exp:30
X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, inv tag)
depends_on:24:1:6
14:hex:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa1000500300d06092a864886f70d01010b0500030200ff":char*:"":exp:69
X509 CRT ASN1 (TBSCertificate v3, ext SubjectAlternativeName malformed)
depends_on:1:2
14:hex:"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":char*:"":exp:70
X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, length missing)
depends_on:1:6
14:hex:"308199308183a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a2300d06092a864886f70d01010b0500030200ff":char*:"":exp:30
X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, inv length encoding)
depends_on:1:6
14:hex:"30819a308184a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a285300d06092a864886f70d01010b0500030200ff":char*:"":exp:31
X509 CRT ASN1 (TBS, valid IssuerID, inv SubjectID, length out of bounds)
depends_on:1:6
14:hex:"30819a308184a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a201300d06092a864886f70d01010b0500030200ff":char*:"":exp:30
X509 CRT ASN1 (TBS, IssuerID unsupported in v1 CRT)
depends_on:24:1:6
14:hex:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a201300d06092a864886f70d01010b0500030200ff":char*:"":exp:69
X509 CRT ASN1 (TBS, IssuerID unsupported in v1 CRT, ALLOW_EXTENSIONS_NON_V3)
depends_on:14:1:6
14:hex:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a201300d06092a864886f70d01010b0500030200ff":char*:"":exp:1
X509 CRT ASN1 (TBS, SubjectID unsupported in v1 CRT)
depends_on:24:1:6
14:hex:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa200a201300d06092a864886f70d01010b0500030200ff":char*:"":exp:69
X509 CRT ASN1 (TBS, SubjectID unsupported in v1 CRT, ALLOW_EXTENSIONS_NON_V3)
depends_on:14:1:6
14:hex:"30819a308184a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa200a201300d06092a864886f70d01010b0500030200ff":char*:"":exp:1
X509 CRT ASN1 (TBS, inv v3Ext, inv tag)
depends_on:1:6
14:hex:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a2000500300d06092a864886f70d01010b0500030200ff":char*:"":exp:1
X509 CRT ASN1 (TBS, inv v3Ext, outer length missing)
depends_on:1:6
14:hex:"30819b308185a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, outer length inv encoding)
depends_on:1:6
14:hex:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a385300d06092a864886f70d01010b0500030200ff":char*:"":exp:71
X509 CRT ASN1 (TBS, inv v3Ext, outer length out of bounds)
depends_on:1:6
14:hex:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a301300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, outer length 0)
depends_on:1:6
14:hex:"30819c308186a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a300300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, inner tag invalid)
depends_on:1:6
14:hex:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3020500300d06092a864886f70d01010b0500030200ff":char*:"":exp:1
X509 CRT ASN1 (TBS, inv v3Ext, inner length missing)
depends_on:1:6
14:hex:"30819d308187a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30130300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, inner length inv encoding)
depends_on:1:6
14:hex:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3023085300d06092a864886f70d01010b0500030200ff":char*:"":exp:71
X509 CRT ASN1 (TBS, inv v3Ext, inner length out of bounds)
depends_on:1:6
14:hex:"30819e308188a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3023001300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, inner/outer length mismatch)
depends_on:1:6
14:hex:"30819f308189a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a303300000300d06092a864886f70d01010b0500030200ff":char*:"":exp:72
X509 CRT ASN1 (TBS, inv v3Ext, first ext inv tag)
depends_on:1:6
14:hex:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430020500300d06092a864886f70d01010b0500030200ff":char*:"":exp:1
X509 CRT ASN1 (TBS, inv v3Ext, first ext length missing)
depends_on:1:6
14:hex:"30819f308189a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a303300130300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, inv first ext length encoding)
depends_on:1:6
14:hex:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023085300d06092a864886f70d01010b0500030200ff":char*:"":exp:71
X509 CRT ASN1 (TBS, inv v3Ext, first ext length out of bounds)
depends_on:1:6
14:hex:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023001300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, first ext empty)
depends_on:1:6
14:hex:"3081a030818aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30430023000300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv tag)
depends_on:1:6
14:hex:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020500300d06092a864886f70d01010b0500030200ff":char*:"":exp:1
X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length missing)
depends_on:1:6
14:hex:"3081a130818ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3053003300106300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv length encoding)
depends_on:1:6
14:hex:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020685300d06092a864886f70d01010b0500030200ff":char*:"":exp:71
X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length out of bounds)
depends_on:1:6
14:hex:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020601300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, no extnValue)
depends_on:1:6
14:hex:"3081a230818ca0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a306300430020600300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, inv critical tag)
depends_on:1:6
14:hex:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000500300d06092a864886f70d01010b0500030200ff":char*:"":exp:1
X509 CRT ASN1 (TBS, inv v3Ext, critical length missing)
depends_on:1:6
14:hex:"3081a330818da0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30730053003060001300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, critical inv length encoding)
depends_on:1:6
14:hex:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000185300d06092a864886f70d01010b0500030200ff":char*:"":exp:71
X509 CRT ASN1 (TBS, inv v3Ext, critical length out of bounds)
depends_on:1:6
14:hex:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000101300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, critical length 0)
depends_on:1:6
14:hex:"3081a430818ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3083006300406000100300d06092a864886f70d01010b0500030200ff":char*:"":exp:71
X509 CRT ASN1 (TBS, inv v3Ext, critical length 2)
depends_on:1:6
14:hex:"3081a6308190a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30a30083006060001020000300d06092a864886f70d01010b0500030200ff":char*:"":exp:71
X509 CRT ASN1 (TBS, inv v3Ext, extnValue inv tag)
depends_on:1:6
14:hex:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000500300d06092a864886f70d01010b0500030200ff":char*:"":exp:1
X509 CRT ASN1 (TBS, inv v3Ext, extnValue length missing)
depends_on:1:6
14:hex:"3081a6308190a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30a30083006060001010004300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, extnValue length inv encoding)
depends_on:1:6
14:hex:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000485300d06092a864886f70d01010b0500030200ff":char*:"":exp:71
X509 CRT ASN1 (TBS, inv v3Ext, extnValue length out of bounds)
depends_on:1:6
14:hex:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b3009300706000101000401300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv v3Ext, data remaining after extnValue)
depends_on:1:6
14:hex:"3081a9308193a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30d300b3009060001010004000500300d06092a864886f70d01010b0500030200ff":char*:"":exp:72
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, data missing)
depends_on:1:6
14:hex:"3081a7308191a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30b300930070603551d200400300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, invalid outer tag)
depends_on:1:6
14:hex:"3081a9308193a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30d300b30090603551d2004020500300d06092a864886f70d01010b0500030200ff":char*:"":exp:1
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, outer length missing)
depends_on:1:6
14:hex:"3081a8308192a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30c300a30080603551d20040130300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, outer length inv encoding)
depends_on:1:6
14:hex:"3081a9308193a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30d300b30090603551d2004023085300d06092a864886f70d01010b0500030200ff":char*:"":exp:71
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, outer length out of bounds)
depends_on:1:6
14:hex:"3081a9308193a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30d300b30090603551d2004023001300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, no policies)
depends_on:1:6
14:hex:"3081a9308193a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30d300b30090603551d2004023000300d06092a864886f70d01010b0500030200ff":char*:"":exp:72
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy invalid tag)
depends_on:1:6
14:hex:"3081ab308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30f300d300b0603551d20040430020500300d06092a864886f70d01010b0500030200ff":char*:"":exp:1
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy length missing)
depends_on:1:6
14:hex:"3081aa308194a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30e300c300a0603551d200403300130300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy length inv encoding)
depends_on:1:6
14:hex:"3081ab308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30f300d300b0603551d20040430023085300d06092a864886f70d01010b0500030200ff":char*:"":exp:71
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy length out of bounds)
depends_on:1:6
14:hex:"3081ab308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30f300d300b0603551d20040430023001300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, empty policy)
depends_on:1:6
14:hex:"3081ab308195a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a30f300d300b0603551d20040430023000300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy invalid OID tag)
depends_on:1:6
14:hex:"3081ad308197a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a311300f300d0603551d200406300430020500300d06092a864886f70d01010b0500030200ff":char*:"":exp:1
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy no OID length)
depends_on:1:6
14:hex:"3081ac308196a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a310300e300c0603551d2004053003300106300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy OID length inv encoding)
depends_on:1:6
14:hex:"3081ad308197a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a311300f300d0603551d200406300430020685300d06092a864886f70d01010b0500030200ff":char*:"":exp:71
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy OID length out of bounds)
depends_on:1:6
14:hex:"3081ad308197a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a311300f300d0603551d200406300430020601300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, unknown critical policy)
depends_on:1:6:25
14:hex:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d20010101040730053003060100300d06092a864886f70d01010b0500030200ff":char*:"":exp:73
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy qualifier invalid tag)
depends_on:1:6
14:hex:"3081b030819aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a314301230100603551d200409300730050601000500300d06092a864886f70d01010b0500030200ff":char*:"":exp:1
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy qualifier no length)
depends_on:1:6
14:hex:"3081af308199a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a3133011300f0603551d2004083006300406010030300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy qualifier inv length encoding)
depends_on:1:6
14:hex:"3081b030819aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a314301230100603551d200409300730050601003085300d06092a864886f70d01010b0500030200ff":char*:"":exp:71
X509 CRT ASN1 (TBSCertificate v3, inv CertificatePolicies, policy qualifier length out of bounds)
depends_on:1:6
14:hex:"3081b030819aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a314301230100603551d200409300730050601003001300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv extBasicConstraint, no pathlen length)
depends_on:1:6
14:hex:"3081b030819aa0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a314301230100603551d130101010406300402010102300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (inv extBasicConstraint, pathlen is INT_MAX)
depends_on:1:6:2
13:char*:"/zip/third_party/mbedtls/test/data/server1_pathlen_int_max.crt":exp:71
X509 CRT ASN1 (pathlen is INT_MAX-1)
depends_on:1:6:2
13:char*:"/zip/third_party/mbedtls/test/data/server1_pathlen_int_max-1.crt":int:0
X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen inv length encoding)
depends_on:1:6
14:hex:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010285300d06092a864886f70d01010b0500030200ff":char*:"":exp:71
X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen length out of bounds)
depends_on:1:6
14:hex:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010201300d06092a864886f70d01010b0500030200ff":char*:"":exp:70
X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen empty)
depends_on:1:6
14:hex:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d13010101040730050201010200300d06092a864886f70d01010b0500030200ff":char*:"":exp:71
X509 CRT ASN1 (TBS, inv extBasicConstraint, pathlen length mismatch)
depends_on:1:6
14:hex:"3081b430819ea0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a318301630140603551d13010101040a30080201010201010500300d06092a864886f70d01010b0500030200ff":char*:"":exp:72
X509 CRT ASN1 (TBS, inv v3Ext, ExtKeyUsage bad second tag)
depends_on:1:6
14:hex:"3081bd3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d250416301406082b0601050507030107082b06010505070302300d06092a864886f70d01010b0500030200ff":char*:"":exp:1
X509 CRT ASN1 (TBS, inv v3Ext, SubjectAltName repeated)
depends_on:1:6
14:hex:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a340303e301d0603551d11041630148208666f6f2e7465737482086261722e74657374301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":char*:"":exp:74
X509 CRT ASN1 (TBS, inv v3Ext, ExtKeyUsage repeated)
depends_on:1:6
14:hex:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a340303e301d0603551d250416301406082b0601050507030106082b06010505070302301d0603551d250416301406082b0601050507030106082b06010505070302300d06092a864886f70d01010b0500030200ff":char*:"":exp:74
X509 CRT ASN1 (TBS, inv v3Ext, SubjectAltName repeated outside Extensions)
depends_on:1:6
14:hex:"3081dc3081c6a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":char*:"":exp:69
X509 CRT (TBS, valid v3Ext in v1 CRT, ALLOW_EXTENSIONS_NON_V3)
depends_on:14:1:6
14:hex:"3081b93081a3a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\nsubject alt name \:\n dNSName \: foo.test\n dNSName \: bar.test\n":int:0
X509 CRT (TBS, valid v3Ext in v2 CRT, ALLOW_EXTENSIONS_NON_V3)
depends_on:14:1:6
14:hex:"3081b93081a3a0030201018204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 2\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\nsubject alt name \:\n dNSName \: foo.test\n dNSName \: bar.test\n":int:0
X509 CRT (TBS, valid v3Ext in v3 CRT)
depends_on:1:6
14:hex:"3081b93081a3a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 3\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\nsubject alt name \:\n dNSName \: foo.test\n dNSName \: bar.test\n":int:0
X509 CRT ASN1 (TBS, valid v3Ext in v1 CRT)
depends_on:24:1:6
14:hex:"3081b93081a3a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":char*:"":exp:69
X509 CRT ASN1 (TBS, valid v3Ext in v2 CRT)
depends_on:24:1:6
14:hex:"3081b93081a3a0030201018204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff":char*:"":exp:69
X509 CRT ASN1 (TBS, valid SubjectID, valid IssuerID, inv v3Ext, SubjectAltName repeated outside Extensions, inv SubjectAltNames tag)
depends_on:1:2
14:hex:"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":char*:"":exp:1
X509 CRT ASN1 (SignatureAlgorithm missing)
depends_on:1:6
14:hex:"3081aa3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374":char*:"":exp:40
X509 CRT ASN1 (inv SignatureAlgorithm, bad tag)
depends_on:1:6
14:hex:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573740500":char*:"":exp:41
X509 CRT ASN1 (inv SignatureAlgorithm, length missing)
depends_on:1:6
14:hex:"3081ab3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e7465737430":char*:"":exp:40
X509 CRT ASN1 (inv SignatureAlgorithm, inv length encoding)
depends_on:1:6
14:hex:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573743085":char*:"":exp:42
X509 CRT ASN1 (inv SignatureAlgorithm, length out of bounds)
depends_on:1:6
14:hex:"3081ac3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e746573743001":char*:"":exp:40
X509 CRT ASN1 (inv SignatureAlgorithm, not the same as SignatureAlgorithm in TBS)
depends_on:1:6
14:hex:"3081bd3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010a0500030200ff":char*:"":exp:75
X509 CRT ASN1 (Signature missing)
depends_on:1:6
14:hex:"3081b93081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500":char*:"":exp:76
X509 CRT ASN1 (inv Signature, bad tag)
depends_on:1:6
14:hex:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000500":char*:"":exp:77
X509 CRT ASN1 (inv Signature, length missing)
depends_on:1:6
14:hex:"3081ba3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b050003":char*:"":exp:76
X509 CRT ASN1 (inv Signature, inv length encoding)
depends_on:1:6
14:hex:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000385":char*:"":exp:78
X509 CRT ASN1 (inv Signature, length out of bounds)
depends_on:1:6
14:hex:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000301":char*:"":exp:76
X509 CRT ASN1 (inv Signature, inv data #1)
depends_on:1:6
14:hex:"3081bb3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b05000300":char*:"":exp:79
X509 CRT ASN1 (inv Signature, inv data #2)
depends_on:1:6
14:hex:"3081bc3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030108":char*:"":exp:79
X509 CRT ASN1 (empty Signature)
depends_on:1:6
14:hex:"3081bc3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030100":char*:"cert. version \: 3\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\nsubject alt name \:\n dNSName \: foo.test\n dNSName \: bar.test\n":int:0
X509 CRT ASN1 (dummy 24-bit Signature)
depends_on:1:6
14:hex:"3081bf3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030400666f6f":char*:"cert. version \: 3\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\nsubject alt name \:\n dNSName \: foo.test\n dNSName \: bar.test\n":int:0
X509 CRT ASN1 (inv Signature: not octet-aligned)
depends_on:1:6
14:hex:"3081bf3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030401666f6e":char*:"":exp:79
X509 CRT ASN1 (inv Signature, length mismatch)
depends_on:1:6
14:hex:"3081be3081a7a0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a321301f301d0603551d11041630148208666f6f2e7465737482086261722e74657374300d06092a864886f70d01010b0500030200ff00":char*:"":exp:69
X509 CRT ASN1 (well-formed)
depends_on:1:6
14:hex:"308196308180a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":int:0
X509 CRT ASN1 (GeneralizedTime in notBefore, UTCTime in notAfter)
depends_on:1:6
14:hex:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e180e3230313030313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2010-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":int:0
X509 CRT ASN1 (UTCTime in notBefore, GeneralizedTime in notAfter)
depends_on:1:6
14:hex:"308198308182a0030201008204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301e170c303931323331323335393539180e3230313030313031303030303030300c310a30080600130454657374302a300d06092A864886F70D010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-12-31 23\:59\:59\nexpires on \: 2010-01-01 00\:00\:00\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":int:0
X509 CRT ASN1 (Name with X520 CN)
depends_on:1:6
14:hex:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550403130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: CN=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":int:0
X509 CRT ASN1 (Name with X520 C)
depends_on:1:6
14:hex:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550406130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: C=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":int:0
X509 CRT ASN1 (Name with X520 L)
depends_on:1:6
14:hex:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550407130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: L=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":int:0
X509 CRT ASN1 (Name with X520 ST)
depends_on:1:6
14:hex:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b0603550408130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ST=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":int:0
X509 CRT ASN1 (Name with X520 O)
depends_on:1:6
14:hex:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b060355040a130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: O=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":int:0
X509 CRT ASN1 (Name with X520 OU)
depends_on:1:6
14:hex:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b060355040b130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: OU=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":int:0
X509 CRT ASN1 (Name with unknown X520 part)
depends_on:1:6
14:hex:"308199308183a0030201008204deadbeef300d06092a864886f70d01010b0500300f310d300b06035504de130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":int:0
X509 CRT ASN1 (Name with composite RDN)
depends_on:1:2
14:hex:"3082029f30820208a00302010202044c20e3bd300d06092a864886f70d01010505003056310b3009060355040613025553310b300906035504080c0243413121301f060355040a0c18496e7465726e6574205769646769747320507479204c74643117301506035504030c0e4672616e6b656e63657274204341301e170d3133303830323135313433375a170d3135303831373035353433315a3081d1310b3009060355040613025553311330110603550408130a57617368696e67746f6e31133011060b2b0601040182373c0201031302555331193017060b2b0601040182373c020102130844656c6177617265311a3018060355040a1311417574686f72697a652e4e6574204c4c43311d301b060355040f131450726976617465204f7267616e697a6174696f6e312a300e06035504051307343336393139313018060355040313117777772e617574686f72697a652e6e6574311630140603550407130d53616e204672616e636973636f30819f300d06092a864886f70d010101050003818d0030818902818100d885c62e209b6ac005c64f0bcfdaac1f2b67a18802f75b08851ff933deed888b7b68a62fcabdb21d4a8914becfeaaa1b7e08a09ffaf9916563586dc95e2877262b0b5f5ec27eb4d754aa6facd1d39d25b38a2372891bacdd3e919f791ed25704e8920e380e5623a38e6a23935978a3aec7a8e761e211d42effa2713e44e7de0b0203010001300d06092a864886f70d010105050003818100092f7424d3f6da4b8553829d958ed1980b9270b42c0d3d5833509a28c66bb207df9f3c51d122065e00b87c08c2730d2745fe1c279d16fae4d53b4bf5bdfa3631fceeb2e772b6b08a3eca5a2e2c687aefd23b4b73bf77ac6099711342cf070b35c6f61333a7cbf613d8dd4bd73e9df34bcd4284b0b4df57c36c450613f11e5dac":char*:"cert. version \: 3\nserial number \: 4C\:20\:E3\:BD\nissuer name \: C=US, ST=CA, O=Internet Widgits Pty Ltd, CN=Frankencert CA\nsubject name \: C=US, ST=Washington, ??=US, ??=Delaware, O=Authorize.Net LLC, ??=Private Organization, serialNumber=4369191 + CN=www.authorize.net, L=San Francisco\nissued on \: 2013-08-02 15\:14\:37\nexpires on \: 2015-08-17 05\:54\:31\nsigned using \: RSA with SHA1\nRSA key size \: 1024 bits\n":int:0
X509 CRT ASN1 (Name with PKCS9 email)
depends_on:1:6
14:hex:"30819f308189a0030201008204deadbeef300d06092a864886f70d01010b050030153113301106092a864886f70d010901130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: emailAddress=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":int:0
X509 CRT ASN1 (Name with unknown PKCS9 part)
depends_on:1:6
14:hex:"30819f308189a0030201008204deadbeef300d06092a864886f70d01010b050030153113301106092a864886f70d0109ab130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffff300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 1\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ?\?=Test\nsubject name \: ?\?=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\n":int:0
X509 CRT ASN1 (ECDSA signature, RSA key)
depends_on:1:2:10
14:hex:"3081e630819e020103300906072a8648ce3d0401300f310d300b0603550403130454657374301e170d3133303731303039343631385a170d3233303730383039343631385a300f310d300b0603550403130454657374304c300d06092a864886f70d0101010500033b003038023100e8f546061d3b49bc2f6b7524b7ea4d73a8d5293ee8c64d9407b70b5d16baebc32b8205591eab4e1eb57e9241883701250203010001300906072a8648ce3d0401033800303502186e18209afbed14a0d9a796efcad68891e3ccd5f75815c833021900e92b4fd460b1994693243b9ffad54729de865381bda41d25":char*:"cert. version \: 1\nserial number \: 03\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 09\:46\:18\nexpires on \: 2023-07-08 09\:46\:18\nsigned using \: ECDSA with SHA1\nRSA key size \: 384 bits\n":int:0
X509 CRT ASN1 (ECDSA signature, EC key)
depends_on:10:13:2
14:hex:"3081eb3081a3020900f41534662ec7e912300906072a8648ce3d0401300f310d300b0603550403130454657374301e170d3133303731303039343031395a170d3233303730383039343031395a300f310d300b06035504031304546573743049301306072a8648ce3d020106082a8648ce3d030101033200042137969fabd4e370624a0e1a33e379cab950cce00ef8c3c3e2adaeb7271c8f07659d65d3d777dcf21614363ae4b6e617300906072a8648ce3d04010338003035021858cc0f957946fe6a303d92885a456aa74c743c7b708cbd37021900fe293cac21af352d16b82eb8ea54e9410b3abaadd9f05dd6":char*:"cert. version \: 1\nserial number \: F4\:15\:34\:66\:2E\:C7\:E9\:12\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 09\:40\:19\nexpires on \: 2023-07-08 09\:40\:19\nsigned using \: ECDSA with SHA1\nEC key size \: 192 bits\n":int:0
X509 CRT ASN1 (RSA signature, EC key)
depends_on:10:13:2:1
14:hex:"3081e430819f020104300d06092a864886f70d0101050500300f310d300b0603550403130454657374301e170d3133303731303135303233375a170d3233303730383135303233375a300f310d300b06035504031304546573743049301306072a8648ce3d020106082a8648ce3d03010103320004e962551a325b21b50cf6b990e33d4318fd16677130726357a196e3efe7107bcb6bdc6d9db2a4df7c964acfe81798433d300d06092a864886f70d01010505000331001a6c18cd1e457474b2d3912743f44b571341a7859a0122774a8e19a671680878936949f904c9255bdd6fffdb33a7e6d8":char*:"cert. version \: 1\nserial number \: 04\nissuer name \: CN=Test\nsubject name \: CN=Test\nissued on \: 2013-07-10 15\:02\:37\nexpires on \: 2023-07-08 15\:02\:37\nsigned using \: RSA with SHA1\nEC key size \: 192 bits\n":int:0
X509 CRT ASN1 (Unsupported critical extension)
depends_on:1:6:25
14:hex:"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":char*:"":exp:1
X509 CRT ASN1 (Unsupported critical extension recognized by callback)
depends_on:1:6
15:hex:"308203353082021da00302010202104d3ebbb8a870f9c78c55a8a7e12fd516300d06092a864886f70d01010b05003010310e300c06035504030c0564756d6d79301e170d3230303432383137343234335a170d3230303632373137343234335a3010310e300c06035504030c0564756d6d7930820122300d06092a864886f70d01010105000382010f003082010a0282010100a51b75b3f7da2d60ea1b0fc077f0dbb2bbb6fe1b474028368af8dc2664672896efff171033b0aede0b323a89d5c6db4d517404bc97b65264e41b9e9e86a6f40ace652498d4b3b859544d1bacfd7f86325503eed046f517406545c0ffb5560f83446dedce0fcafcc41ac8495488a6aa912ae45192ef7e3efa20d0f7403b0baa62c7e2e5404c620c5793623132aa20f624f08d88fbf0985af39433f5a24d0b908e5219d8ba6a404d3ee8418203b62a40c8eb18837354d50281a6a2bf5012e505c419482787b7a81e5935613ceea0c6d93e86f76282b6aa406fb3a1796c56b32e8a22afc3f7a3c9daa8f0e2846ff0d50abfc862a52f6cf0aaece6066c860376f3ed0203010001a3818a308187300c0603551d13040530030101ff30130603551d110101ff04093007820564756d6d79301206082b0601050507011f0101ff0403040100300e0603551d0f0101ff040403020184301d0603551d0e04160414e6e451ec8d19d9677b2d272a9d73b939fa2d915a301f0603551d23041830168014e6e451ec8d19d9677b2d272a9d73b939fa2d915a300d06092a864886f70d01010b0500038201010056d06047b7f48683e2347ca726997d9700b4f2cf1d8bc0ef17addac8445d38ffd7f8079055ead878b6a74c8384d0e30150c8990aa74f59cda6ebcb49465d8991ffa16a4c927a26e4639d1875a3ac396c7455c7eda40dbe66054a03d27f961c15e86bd5b06db6b26572977bcda93453b6b6a88ef96b31996a7bd17323525b33050d28deec9c33a3f9765a11fb99d0e222bd39a6db3a788474c9ca347377688f837d42f5841667bffcbe6b473e6f229f286a0829963e591a99aa7f67e9d20c36ccd2ac84cb85b7a8b3396a6cbe59a573ffff726f373197c230de5c92a52c5bc87e29c20bdf6e89609764a60c649022aabd768f3557661b083ae00e6afc8a5bf2ed":char*:"cert. version \: 3\nserial number \: 4D\:3E\:BB\:B8\:A8\:70\:F9\:C7\:8C\:55\:A8\:A7\:E1\:2F\:D5\:16\nissuer name \: CN=dummy\nsubject name \: CN=dummy\nissued on \: 2020-04-28 17\:42\:43\nexpires on \: 2020-06-27 17\:42\:43\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\nsubject alt name \:\n dNSName \: dummy\nkey usage \: Digital Signature, Key Cert Sign\n":int:0
X509 CRT ASN1 (Unsupported critical extension not recognized by callback)
depends_on:1:6
15:hex:"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":char*:"":exp:1
X509 CRT ASN1 (Unsupported non critical extension recognized by callback)
depends_on:1:6
15:hex:"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":char*:"cert. version \: 3\nserial number \: 4D\:3E\:BB\:B8\:A8\:70\:F9\:C7\:8C\:55\:A8\:A7\:E1\:2F\:D5\:16\nissuer name \: CN=dummy\nsubject name \: CN=dummy\nissued on \: 2020-04-28 17\:42\:43\nexpires on \: 2020-06-27 17\:42\:43\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\nsubject alt name \:\n dNSName \: dummy\nkey usage \: Digital Signature, Key Cert Sign\n":int:0
X509 CRT ASN1 (Unsupported non critical extension not recognized by callback)
depends_on:1:6
15:hex:"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":char*:"cert. version \: 3\nserial number \: 4D\:3E\:BB\:B8\:A8\:70\:F9\:C7\:8C\:55\:A8\:A7\:E1\:2F\:D5\:16\nissuer name \: CN=dummy\nsubject name \: CN=dummy\nissued on \: 2020-04-28 17\:42\:43\nexpires on \: 2020-06-27 17\:42\:43\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints \: CA=true\nsubject alt name \:\n dNSName \: dummy\nkey usage \: Digital Signature, Key Cert Sign\n":int:0
X509 CRT ASN1 (Unsupported critical policy recognized by callback)
depends_on:1:6
15:hex:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d20010101040730053003060101300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 3\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\ncert policies \: 0.1\n":int:0
X509 CRT ASN1 (Unsupported critical policy not recognized by callback)
depends_on:1:6
15:hex:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d20010101040730053003060100300d06092a864886f70d01010b0500030200ff":char*:"":exp:73
X509 CRT ASN1 (Unsupported non critical policy recognized by callback)
depends_on:1:6
15:hex:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d20010100040730053003060101300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 3\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\ncert policies \: 0.1\n":int:0
X509 CRT ASN1 (Unsupported non critical policy not recognized by callback)
depends_on:1:6
15:hex:"3081b130819ba0030201028204deadbeef300d06092a864886f70d01010b0500300c310a30080600130454657374301c170c303930313031303030303030170c303931323331323335393539300c310a30080600130454657374302a300d06092a864886f70d010101050003190030160210ffffffffffffffffffffffffffffffff0202ffffa100a200a315301330110603551d20010100040730053003060100300d06092a864886f70d01010b0500030200ff":char*:"cert. version \: 3\nserial number \: DE\:AD\:BE\:EF\nissuer name \: ??=Test\nsubject name \: ??=Test\nissued on \: 2009-01-01 00\:00\:00\nexpires on \: 2009-12-31 23\:59\:59\nsigned using \: RSA with SHA-256\nRSA key size \: 128 bits\ncert policies \: 0.0\n":int:0
X509 CRL ASN1 (Incorrect first tag)
16:hex:"":char*:"":exp:28
X509 CRL ASN1 (Correct first tag, data length does not match)
16:hex:"300000":char*:"":exp:69
X509 CRL ASN1 (TBSCertList, tag missing)
16:hex:"3000":char*:"":exp:30
X509 CRL ASN1 (TBSCertList, version tag len missing)
16:hex:"3003300102":char*:"":exp:34
X509 CRL ASN1 (TBSCertList, version correct, alg missing)
16:hex:"30053003020100":char*:"":exp:40
X509 CRL ASN1 (TBSCertList, alg correct, incorrect version)
16:hex:"300b3009020102300406000500":char*:"":exp:37
X509 CRL ASN1 (TBSCertList, correct version, sig_oid1 unknown)
16:hex:"300b3009020100300406000500":char*:"":exp:80
X509 CRL ASN1 (TBSCertList, sig_oid1 id unknown)
16:hex:"30143012020100300d06092a864886f70d01010f0500":char*:"":exp:80
X509 CRL ASN1 (TBSCertList, sig_oid1 correct, issuer missing)
depends_on:1:6
16:hex:"30143012020100300d06092a864886f70d01010e0500":char*:"":exp:30
X509 CRL ASN1 (TBSCertList, issuer set missing)
depends_on:1:6
16:hex:"30163014020100300d06092a864886f70d01010e05003000":char*:"":exp:46
X509 CRL ASN1 (TBSCertList, correct issuer, thisUpdate missing)
depends_on:1:6
16:hex:"30253023020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344":char*:"":exp:51
X509 CRL ASN1 (TBSCertList, correct thisUpdate, nextUpdate missing, entries length missing)
depends_on:1:6
16:hex:"30343032020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c30393031303130303030303030":char*:"":exp:81
X509 CRL ASN1 (TBSCertList, entries present, invalid sig_alg)
depends_on:1:6
16:hex:"304a3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c30383132333132333539353900":char*:"":exp:41
X509 CRL ASN1 (TBSCertList, entries present, date in entry invalid)
depends_on:1:6
16:hex:"304a3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd190c30383132333132333539353900":char*:"":exp:52
X509 CRL ASN1 (TBSCertList, sig_alg present, sig_alg does not match)
depends_on:1:6
16:hex:"30583047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010d0500":char*:"":exp:75
X509 CRL ASN1 (TBSCertList, sig present, len mismatch)
depends_on:1:6
16:hex:"305d3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010e05000302000100":char*:"":exp:69
X509 CRL ASN1 (TBSCertList, sig present)
depends_on:1:6
16:hex:"305c3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010e050003020001":char*:"CRL version \: 1\nissuer name \: CN=ABCD\nthis update \: 2009-01-01 00\:00\:00\nnext update \: 0000-00-00 00\:00\:00\nRevoked certificates\:\nserial number\: AB\:CD revocation date\: 2008-12-31 23\:59\:59\nsigned using \: RSA with SHA-224\n":int:0
X509 CRL ASN1 (TBSCertList, signatureValue missing)
depends_on:1:6
16:hex:"30583047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539300d06092a864886f70d01010e0500":char*:"":exp:76
X509 CRL ASN1 (TBSCertList, signatureAlgorithm missing)
depends_on:1:6
16:hex:"30493047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd170c303831323331323335393539":char*:"":exp:40
X509 CRL ASN1 (TBSCertList, single empty entry at end)
depends_on:1:6
16:hex:"30373035020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c30393031303130303030303030023000":char*:"":exp:38
X509 CRL ASN1 (TBSCertList, good entry then empty entry at end)
depends_on:1:6
16:hex:"304b3049020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301630128202abcd170c3038313233313233353935393000":char*:"":exp:38
X509 CRL ASN1 (TBSCertList, missing time in entry)
depends_on:1:6
16:hex:"304e3039020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300630048202abcd300d06092a864886f70d01010e050003020001":char*:"":exp:51
X509 CRL ASN1 (TBSCertList, missing time in entry at end)
depends_on:1:6
16:hex:"303b3039020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300630048202abcd":char*:"":exp:51
X509 CRL ASN1 (TBSCertList, invalid tag for time in entry)
depends_on:1:6
16:hex:"305c3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128202abcd190c303831323331323335393539300d06092a864886f70d01010e050003020001":char*:"":exp:52
X509 CRL ASN1 (TBSCertList, invalid tag for serial)
depends_on:1:6
16:hex:"305c3047020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030301430128402abcd170c303831323331323335393539300d06092a864886f70d01010e050003020001":char*:"":exp:32
X509 CRL ASN1 (TBSCertList, no entries)
depends_on:1:6
16:hex:"30463031020100300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":char*:"CRL version \: 1\nissuer name \: CN=ABCD\nthis update \: 2009-01-01 00\:00\:00\nnext update \: 0000-00-00 00\:00\:00\nRevoked certificates\:\nsigned using \: RSA with SHA-224\n":int:0
X509 CRL ASN1 (invalid version 2)
16:hex:"30463031020102300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":char*:"":exp:37
X509 CRL ASN1 (invalid version overflow)
16:hex:"3049303102047fffffff300d06092a864886f70d01010e0500300f310d300b0603550403130441424344170c303930313031303030303030300d06092a864886f70d01010e050003020001":char*:"":exp:37
X509 CRL ASN1 (extension seq too long, crl-idp.pem byte 121)
depends_on:0:1:6
16:hex:"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":char*:"":exp:70
X509 CRL ASN1 (extension oid too long, crl-idp.pem byte 123)
depends_on:0:1:6
16:hex:"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":char*:"":exp:70
X509 CRL ASN1 (extension critical invalid length, crl-idp.pem byte 128)
depends_on:0:1:6
16:hex:"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":char*:"":exp:71
X509 CRL ASN1 (extension data too long, crl-idp.pem byte 131)
depends_on:0:1:6
16:hex:"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":char*:"":exp:70
X509 CRL ASN1 (extension data too short, crl-idp.pem byte 131)
depends_on:0:1:6
16:hex:"308201b330819c020101300d06092a864886f70d01010b0500303b310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c3119301706035504031310506f6c617253534c2054657374204341170d3138303331343037333134385a170d3238303331343037333134385aa02d302b30290603551d1c0101ff041e301da01ba0198617687474703a2f2f706b692e6578616d706c652e636f6d2f300d06092a864886f70d01010b05000382010100b3fbe9d586eaf4b8ff60cf8edae06a85135db78f78198498719725b5b403c0b803c2c150f52faae7306d6a7871885dc2e9dc83a164bac7263776474ef642b660040b35a1410ac291ac8f6f18ab85e7fd6e22bd1af1c41ca95cf2448f6e2b42a018493dfc03c6b6aa1b9e3fe7b76af2182fb2121db4166bf0167d6f379c5a58adee5082423434d97be2909f5e7488053f996646db10dd49782626da53ad8eada01813c031b2bacdb0203bc017aac1735951a11d013ee4d1d5f7143ccbebf2371e66a1bec6e1febe69148f50784eef8adbb66664c96196d7e0c0bcdc807f447b54e058f37642a3337995bfbcd332208bd6016936705c82263eabd7affdba92fae3":char*:"":exp:72
X509 CRL ASN1 (extension not critical explicit, crl-idp.pem byte 129)
depends_on:0:1:6
16:hex:"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":char*:"CRL version \: 2\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nthis update \: 2018-03-14 07\:31\:48\nnext update \: 2028-03-14 07\:31\:48\nRevoked certificates\:\nsigned using \: RSA with SHA-256\n":int:0
X509 CRT parse path #2 (one cert)
depends_on:2:1
18:char*:"/zip/third_party/mbedtls/test/data/dir1":int:0:int:1
X509 CRT parse path #3 (two certs)
depends_on:2:1:6:10:12
18:char*:"/zip/third_party/mbedtls/test/data/dir2":int:0:int:2
X509 CRT parse path #4 (two certs, one non-cert)
depends_on:2:1:6:10:12
18:char*:"/zip/third_party/mbedtls/test/data/dir3":int:1:int:2
X509 CRT verify long chain (max intermediate CA, trusted)
depends_on:6:10:11
19:char*:"/zip/third_party/mbedtls/test/data/dir-maxpath/00.crt":char*:"/zip/third_party/mbedtls/test/data/dir-maxpath":exp:82:int:0:int:0
X509 CRT verify long chain (max intermediate CA, untrusted)
depends_on:6:10:11:12
19:char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/dir-maxpath":exp:83:exp:5:exp:16
X509 CRT verify long chain (max intermediate CA + 1)
depends_on:6:10:11
19:char*:"/zip/third_party/mbedtls/test/data/dir-maxpath/00.crt":char*:"/zip/third_party/mbedtls/test/data/dir-maxpath":exp:84:exp:27:exp:85
X509 CRT verify chain #1 (zero pathlen intermediate)
depends_on:6:1
20:char*:"/zip/third_party/mbedtls/test/data/dir4/cert14.crt /zip/third_party/mbedtls/test/data/dir4/cert13.crt /zip/third_party/mbedtls/test/data/dir4/cert12.crt":char*:"/zip/third_party/mbedtls/test/data/dir4/cert11.crt":exp:16:exp:5:char*:"":int:0
X509 CRT verify chain #2 (zero pathlen root)
depends_on:6:1
20:char*:"/zip/third_party/mbedtls/test/data/dir4/cert23.crt /zip/third_party/mbedtls/test/data/dir4/cert22.crt":char*:"/zip/third_party/mbedtls/test/data/dir4/cert21.crt":exp:16:exp:5:char*:"":int:0
X509 CRT verify chain #3 (nonzero pathlen root)
depends_on:6:1
20:char*:"/zip/third_party/mbedtls/test/data/dir4/cert34.crt /zip/third_party/mbedtls/test/data/dir4/cert33.crt /zip/third_party/mbedtls/test/data/dir4/cert32.crt":char*:"/zip/third_party/mbedtls/test/data/dir4/cert31.crt":exp:16:exp:5:char*:"":int:0
X509 CRT verify chain #4 (nonzero pathlen intermediate)
depends_on:6:1
20:char*:"/zip/third_party/mbedtls/test/data/dir4/cert45.crt /zip/third_party/mbedtls/test/data/dir4/cert44.crt /zip/third_party/mbedtls/test/data/dir4/cert43.crt /zip/third_party/mbedtls/test/data/dir4/cert42.crt":char*:"/zip/third_party/mbedtls/test/data/dir4/cert41.crt":exp:16:exp:5:char*:"":int:0
X509 CRT verify chain #5 (nonzero maxpathlen intermediate)
depends_on:6:1:16
20:char*:"/zip/third_party/mbedtls/test/data/dir4/cert54.crt /zip/third_party/mbedtls/test/data/dir4/cert53.crt /zip/third_party/mbedtls/test/data/dir4/cert52.crt":char*:"/zip/third_party/mbedtls/test/data/dir4/cert51.crt":int:0:int:0:char*:"":int:0
X509 CRT verify chain #6 (nonzero maxpathlen root)
depends_on:6:1:16
20:char*:"/zip/third_party/mbedtls/test/data/dir4/cert63.crt /zip/third_party/mbedtls/test/data/dir4/cert62.crt":char*:"/zip/third_party/mbedtls/test/data/dir4/cert61.crt":int:0:int:0:char*:"":int:0
X509 CRT verify chain #7 (maxpathlen root, self signed in path)
depends_on:6:1:16
20:char*:"/zip/third_party/mbedtls/test/data/dir4/cert74.crt /zip/third_party/mbedtls/test/data/dir4/cert73.crt /zip/third_party/mbedtls/test/data/dir4/cert72.crt":char*:"/zip/third_party/mbedtls/test/data/dir4/cert71.crt":int:0:int:0:char*:"":int:0
X509 CRT verify chain #8 (self signed maxpathlen root)
depends_on:6:1:16
20:char*:"/zip/third_party/mbedtls/test/data/dir4/cert61.crt /zip/third_party/mbedtls/test/data/dir4/cert63.crt /zip/third_party/mbedtls/test/data/dir4/cert62.crt":char*:"/zip/third_party/mbedtls/test/data/dir4/cert61.crt":int:0:int:0:char*:"":int:0
X509 CRT verify chain #9 (zero pathlen first intermediate, valid)
depends_on:6:10:11
20:char*:"/zip/third_party/mbedtls/test/data/dir4/cert83.crt /zip/third_party/mbedtls/test/data/dir4/cert82.crt":char*:"/zip/third_party/mbedtls/test/data/dir4/cert81.crt":int:0:int:0:char*:"":int:0
X509 CRT verify chain #10 (zero pathlen root, valid)
depends_on:6:10:11
20:char*:"/zip/third_party/mbedtls/test/data/dir4/cert92.crt":char*:"/zip/third_party/mbedtls/test/data/dir4/cert91.crt":int:0:int:0:char*:"":int:0
X509 CRT verify chain #11 (valid chain, missing profile)
depends_on:6:10:11
20:char*:"/zip/third_party/mbedtls/test/data/dir4/cert92.crt":char*:"/zip/third_party/mbedtls/test/data/dir4/cert91.crt":exp:85:exp:86:char*:"nonesuch":int:0
X509 CRT verify chain #12 (suiteb profile, RSA root)
depends_on:6:1:16:10:13:2
20:char*:"/zip/third_party/mbedtls/test/data/server3.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":exp:87:exp:5:char*:"suiteb":int:0
X509 CRT verify chain #13 (RSA only profile, EC root)
depends_on:6:1:10:12
20:char*:"/zip/third_party/mbedtls/test/data/server4.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":exp:88:exp:5:char*:"rsa3072":int:0
X509 CRT verify chain #13 (RSA only profile, EC trusted EE)
depends_on:6:1:10:11
20:char*:"/zip/third_party/mbedtls/test/data/server5-selfsigned.crt":char*:"/zip/third_party/mbedtls/test/data/server5-selfsigned.crt":exp:88:exp:5:char*:"rsa3072":int:0
X509 CRT verify chain #14 (RSA-3072 profile, root key too small)
depends_on:6:1:16:2
20:char*:"/zip/third_party/mbedtls/test/data/server1.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":exp:89:exp:5:char*:"rsa3072":int:0
X509 CRT verify chain #15 (suiteb profile, rsa intermediate)
depends_on:6:1:16:10:12:11
20:char*:"/zip/third_party/mbedtls/test/data/server7.crt /zip/third_party/mbedtls/test/data/test-int-ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":exp:25:exp:5:char*:"suiteb":int:0
X509 CRT verify chain #16 (RSA-only profile, EC intermediate)
depends_on:6:1:16:10:12:11:2
20:char*:"/zip/third_party/mbedtls/test/data/server8.crt /zip/third_party/mbedtls/test/data/test-int-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":exp:88:exp:5:char*:"rsa3072":int:0
X509 CRT verify chain #17 (SHA-512 profile)
depends_on:6:1:16:10:11:12
20:char*:"/zip/third_party/mbedtls/test/data/server7.crt /zip/third_party/mbedtls/test/data/test-int-ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":exp:17:exp:5:char*:"sha512":int:0
X509 CRT verify chain #18 (len=1, vrfy fatal on depth 1)
depends_on:6:10:11:12:7
20:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":exp:85:exp:90:char*:"":int:2
X509 CRT verify chain #19 (len=0, vrfy fatal on depth 0)
depends_on:6:10:11:12:7
20:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":exp:85:exp:85:char*:"":int:1
X509 CRT verify chain #20 (len=1, vrfy fatal on depth 0)
depends_on:6:10:11:12:7:2:1
20:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":exp:85:exp:85:char*:"":int:1
X509 CRT verify chain #21 (len=3, vrfy fatal on depth 3)
depends_on:6:10:11:1:16:2:12
20:char*:"/zip/third_party/mbedtls/test/data/server10_int3_int-ca2_ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":exp:85:exp:91:char*:"":int:8
X509 CRT verify chain #22 (len=3, vrfy fatal on depth 2)
depends_on:6:10:11:1:2:12
20:char*:"/zip/third_party/mbedtls/test/data/server10_int3_int-ca2_ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":exp:85:exp:92:char*:"":int:4
X509 CRT verify chain #23 (len=3, vrfy fatal on depth 1)
depends_on:6:10:11:1:2:12
20:char*:"/zip/third_party/mbedtls/test/data/server10_int3_int-ca2_ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":exp:85:exp:90:char*:"":int:2
X509 CRT verify chain #24 (len=3, vrfy fatal on depth 0)
depends_on:6:10:11:1:2:12
20:char*:"/zip/third_party/mbedtls/test/data/server10_int3_int-ca2_ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca.crt":exp:85:exp:85:char*:"":int:1
X509 CRT verify chain #25 (len=3, vrfy fatal on depth 3, untrusted)
depends_on:6:10:11:1:2:12
20:char*:"/zip/third_party/mbedtls/test/data/server10_int3_int-ca2_ca.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":exp:85:exp:91:char*:"":int:8
X509 OID description #1
21:hex:"2b06010505070301":char*:"TLS Web Server Authentication"
X509 OID description #2
21:hex:"2b0601050507030f":char*:"notfound"
X509 OID description #3
21:hex:"2b0601050507030100":char*:"notfound"
X509 OID numstring #1 (wide buffer)
22:hex:"2b06010505070301":char*:"1.3.6.1.5.5.7.3.1":int:20:int:17
X509 OID numstring #2 (buffer just fits)
22:hex:"2b06010505070301":char*:"1.3.6.1.5.5.7.3.1":int:18:int:17
X509 OID numstring #3 (buffer too small)
22:hex:"2b06010505070301":char*:"1.3.6.1.5.5.7.3.1":int:17:exp:93
X509 OID numstring #4 (larger number)
22:hex:"2a864886f70d":char*:"1.2.840.113549":int:15:int:14
X509 OID numstring #5 (arithmetic overflow)
22:hex:"2a8648f9f8f7f6f5f4f3f2f1f001":char*:"":int:100:exp:93
X509 CRT keyUsage #1 (no extension, expected KU)
depends_on:1:2
23:char*:"/zip/third_party/mbedtls/test/data/server1.crt":exp:94:int:0
X509 CRT keyUsage #2 (no extension, surprising KU)
depends_on:1:2
23:char*:"/zip/third_party/mbedtls/test/data/server1.crt":exp:95:int:0
X509 CRT keyUsage #3 (extension present, no KU)
depends_on:1:2
23:char*:"/zip/third_party/mbedtls/test/data/server1.key_usage.crt":int:0:int:0
X509 CRT keyUsage #4 (extension present, single KU present)
depends_on:1:2
23:char*:"/zip/third_party/mbedtls/test/data/server1.key_usage.crt":exp:96:int:0
X509 CRT keyUsage #5 (extension present, single KU absent)
depends_on:1:2
23:char*:"/zip/third_party/mbedtls/test/data/server1.key_usage.crt":exp:95:exp:86
X509 CRT keyUsage #6 (extension present, combined KU present)
depends_on:1:2
23:char*:"/zip/third_party/mbedtls/test/data/server1.key_usage.crt":exp:94:int:0
X509 CRT keyUsage #7 (extension present, combined KU both absent)
depends_on:1:2
23:char*:"/zip/third_party/mbedtls/test/data/server1.key_usage.crt":exp:97:exp:86
X509 CRT keyUsage #8 (extension present, combined KU one absent)
depends_on:1:2
23:char*:"/zip/third_party/mbedtls/test/data/server1.key_usage.crt":exp:98:exp:86
X509 CRT keyUsage #9 (extension present, decOnly allowed absent)
depends_on:1:2
23:char*:"/zip/third_party/mbedtls/test/data/server1.key_usage.crt":exp:99:int:0
X509 CRT keyUsage #10 (extension present, decOnly non-allowed present)
depends_on:1:2
23:char*:"/zip/third_party/mbedtls/test/data/keyUsage.decipherOnly.crt":exp:94:exp:86
X509 CRT keyUsage #11 (extension present, decOnly allowed present)
depends_on:1:2
23:char*:"/zip/third_party/mbedtls/test/data/keyUsage.decipherOnly.crt":exp:99:int:0
X509 CRT extendedKeyUsage #1 (no extension, serverAuth)
depends_on:10:11:6
24:char*:"/zip/third_party/mbedtls/test/data/server5.crt":hex:"2b06010505070301":int:0
X509 CRT extendedKeyUsage #2 (single value, present)
depends_on:10:11:6
24:char*:"/zip/third_party/mbedtls/test/data/server5.eku-srv.crt":hex:"2b06010505070301":int:0
X509 CRT extendedKeyUsage #3 (single value, absent)
depends_on:10:11:6
24:char*:"/zip/third_party/mbedtls/test/data/server5.eku-cli.crt":hex:"2b06010505070301":exp:86
X509 CRT extendedKeyUsage #4 (two values, first)
depends_on:10:11:6
24:char*:"/zip/third_party/mbedtls/test/data/server5.eku-srv_cli.crt":hex:"2b06010505070301":int:0
X509 CRT extendedKeyUsage #5 (two values, second)
depends_on:10:11:6
24:char*:"/zip/third_party/mbedtls/test/data/server5.eku-srv_cli.crt":hex:"2b06010505070302":int:0
X509 CRT extendedKeyUsage #6 (two values, other)
depends_on:10:11:6
24:char*:"/zip/third_party/mbedtls/test/data/server5.eku-srv_cli.crt":hex:"2b06010505070303":exp:86
X509 CRT extendedKeyUsage #7 (any, random)
depends_on:10:11:6
24:char*:"/zip/third_party/mbedtls/test/data/server5.eku-cs_any.crt":hex:"2b060105050703ff":int:0
X509 RSASSA-PSS parameters ASN1 (good, all defaults)
26:hex:"":exp:100:exp:101:exp:101:int:20:int:0
X509 RSASSA-PSS parameters ASN1 (wrong initial tag)
26:hex:"":exp:102:exp:101:exp:101:int:20:exp:41
X509 RSASSA-PSS parameters ASN1 (unknown tag in top-level sequence)
26:hex:"a400":exp:100:exp:101:exp:101:int:20:exp:44
X509 RSASSA-PSS parameters ASN1 (good, HashAlg SHA256)
depends_on:1:6
26:hex:"a00d300b0609608648016503040201":exp:100:exp:103:exp:101:int:20:int:0
X509 RSASSA-PSS parameters ASN1 (good, explicit HashAlg = default)
depends_on:1:2
26:hex:"a009300706052b0e03021a":exp:100:exp:101:exp:101:int:20:int:0
X509 RSASSA-PSS parameters ASN1 (HashAlg wrong len #1)
26:hex:"a00a300706052b0e03021a":exp:100:exp:101:exp:101:int:20:exp:40
X509 RSASSA-PSS parameters ASN1 (HashAlg wrong len #2)
depends_on:1:2
26:hex:"a00a300706052b0e03021a00":exp:100:exp:101:exp:101:int:20:exp:44
X509 RSASSA-PSS parameters ASN1 (HashAlg with parameters)
26:hex:"a00f300d06096086480165030402013000":exp:100:exp:103:exp:101:int:20:exp:104
X509 RSASSA-PSS parameters ASN1 (HashAlg unknown OID)
26:hex:"a00d300b06096086480165030402ff":exp:100:exp:103:exp:101:int:20:exp:105
X509 RSASSA-PSS parameters ASN1 (good, MGAlg = MGF1-SHA256)
depends_on:1:6
26:hex:"a11a301806092a864886f70d010108300b0609608648016503040201":exp:100:exp:101:exp:103:int:20:int:0
X509 RSASSA-PSS parameters ASN1 (good, explicit MGAlg = default)
depends_on:1:2
26:hex:"a116301406092a864886f70d010108300706052b0e03021a":exp:100:exp:101:exp:101:int:20:int:0
X509 RSASSA-PSS parameters ASN1 (MGAlg wrong len #1)
26:hex:"a11b301806092a864886f70d010108300b0609608648016503040201":exp:100:exp:101:exp:103:int:20:exp:40
X509 RSASSA-PSS parameters ASN1 (MGAlg wrong len #2)
depends_on:1:6
26:hex:"a11b301806092a864886f70d010108300b060960864801650304020100":exp:100:exp:101:exp:103:int:20:exp:44
X509 RSASSA-PSS parameters ASN1 (MGAlg AlgId wrong len #1)
26:hex:"a11a301906092a864886f70d010108300b0609608648016503040201":exp:100:exp:101:exp:103:int:20:exp:40
X509 RSASSA-PSS parameters ASN1 (MGAlg OID != MGF1)
26:hex:"a11a301806092a864886f70d010109300b0609608648016503040201":exp:100:exp:101:exp:103:int:20:exp:106
X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong tag)
26:hex:"a11a301806092a864886f70d010108310b0609608648016503040201":exp:100:exp:101:exp:103:int:20:exp:41
X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1a)
26:hex:"a10f300d06092a864886f70d0101083000":exp:100:exp:101:exp:103:int:20:exp:40
X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1b)
26:hex:"a11b301906092a864886f70d010108300c0609608648016503040201":exp:100:exp:101:exp:103:int:20:exp:40
X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg not an OID)
26:hex:"a11a301806092a864886f70d010108300b0709608648016503040201":exp:100:exp:101:exp:103:int:20:exp:41
X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg unknown OID)
26:hex:"a11a301806092a864886f70d010108300b06096086480165030402ff":exp:100:exp:101:exp:103:int:20:exp:105
X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params NULL)
depends_on:1:6
26:hex:"a11c301a06092a864886f70d010108300d06096086480165030402010500":exp:100:exp:101:exp:103:int:20:int:0
X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params wrong tag)
depends_on:1:6
26:hex:"a11c301a06092a864886f70d010108300d06096086480165030402013000":exp:100:exp:101:exp:103:int:20:exp:41
X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1c)
26:hex:"a11d301b06092a864886f70d010108300e06096086480165030402010500":exp:100:exp:101:exp:103:int:20:exp:40
X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #2)
depends_on:1:6
26:hex:"a11d301b06092a864886f70d010108300e0609608648016503040201050000":exp:100:exp:101:exp:103:int:20:exp:44
X509 RSASSA-PSS parameters ASN1 (good, saltLen = 94)
26:hex:"a20302015e":exp:100:exp:101:exp:101:int:94:int:0
X509 RSASSA-PSS parameters ASN1 (good, explicit saltLen = default)
26:hex:"a203020114":exp:100:exp:101:exp:101:int:20:int:0
X509 RSASSA-PSS parameters ASN1 (saltLen wrong len #1)
26:hex:"a20402015e":exp:100:exp:101:exp:101:int:94:exp:40
X509 RSASSA-PSS parameters ASN1 (saltLen wrong len #2)
26:hex:"a20402015e00":exp:100:exp:101:exp:101:int:94:exp:44
X509 RSASSA-PSS parameters ASN1 (saltLen not an int)
26:hex:"a2023000":exp:100:exp:101:exp:101:int:94:exp:41
X509 RSASSA-PSS parameters ASN1 (good, explicit trailerField = default)
26:hex:"a303020101":exp:100:exp:101:exp:101:int:20:int:0
X509 RSASSA-PSS parameters ASN1 (trailerField wrong len #1)
26:hex:"a304020101":exp:100:exp:101:exp:101:int:20:exp:40
X509 RSASSA-PSS parameters ASN1 (trailerField wrong len #2)
26:hex:"a30402010100":exp:100:exp:101:exp:101:int:20:exp:44
X509 RSASSA-PSS parameters ASN1 (trailerField not an int)
26:hex:"a3023000":exp:100:exp:101:exp:101:int:20:exp:41
X509 RSASSA-PSS parameters ASN1 (trailerField not 1)
26:hex:"a303020102":exp:100:exp:101:exp:101:int:20:exp:45
X509 CSR ASN.1 (OK)
depends_on:10:11:2
17:hex:"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":char*:"CSR version \: 1\nsubject name \: C=NL, O=PolarSSL, CN=localhost\nsigned using \: ECDSA with SHA1\nEC key size \: 256 bits\n":int:0
X509 CSR ASN.1 (bad first tag)
17:hex:"3100":char*:"":exp:28
X509 CSR ASN.1 (bad sequence: overlong)
17:hex:"3001":char*:"":exp:28
X509 CSR ASN.1 (total length mistmatch)
17:hex:"30010000":char*:"":exp:69
X509 CSR ASN.1 (bad CRI: not a sequence)
17:hex:"30023100":char*:"":exp:29
X509 CSR ASN.1 (bad CRI: overlong)
17:hex:"30023001":char*:"":exp:30
X509 CSR ASN.1 (bad CRI.Version: overlong)
17:hex:"30053002020100":char*:"":exp:34
X509 CSR ASN.1 (bad CRI.Version: not v1)
17:hex:"30053003020101":char*:"":exp:37
X509 CSR ASN.1 (bad CRI.Name: not a sequence)
17:hex:"300730050201003100":char*:"":exp:29
X509 CSR ASN.1 (bad CRI.Name: overlong)
17:hex:"30083005020100300100":char*:"":exp:30
X509 CSR ASN.1 (bad CRI.Name payload: not a set)
17:hex:"3009300702010030023000":char*:"":exp:47
X509 CSR ASN.1 (bad CRI.Name payload: overlong)
17:hex:"300a30080201003002310100":char*:"":exp:46
X509 CSR ASN.1 (bad SubjectPublicKeyInfo: missing)
17:hex:"30143012020100300d310b3009060355040613024e4c":char*:"":exp:56
X509 CSR ASN.1 (bad SubjectPublicKeyInfo: not a sequence)
17:hex:"30163014020100300d310b3009060355040613024e4c3100":char*:"":exp:57
X509 CSR ASN.1 (bad SubjectPublicKeyInfo: overlong)
17:hex:"30173014020100300d310b3009060355040613024e4c300100":char*:"":exp:56
X509 CSR ASN.1 (bad attributes: missing)
depends_on:10:11
17:hex:"3081973081940201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":char*:"":exp:30
X509 CSR ASN.1 (bad attributes: bad tag)
depends_on:10:11
17:hex:"3081993081960201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff0500":char*:"":exp:29
X509 CSR ASN.1 (bad attributes: overlong)
depends_on:10:11
17:hex:"30819a3081960201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa00100":char*:"":exp:30
X509 CSR ASN.1 (bad sigAlg: missing)
depends_on:10:11
17:hex:"3081c23081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0":char*:"":exp:40
X509 CSR ASN.1 (bad sigAlg: not a sequence)
depends_on:10:11
17:hex:"3081c43081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e03100":char*:"":exp:41
X509 CSR ASN.1 (bad sigAlg: overlong)
depends_on:10:11
17:hex:"3081c43081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e03001":char*:"":exp:40
X509 CSR ASN.1 (bad sigAlg: unknown)
depends_on:10:11
17:hex:"3081cd3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04ff":char*:"":exp:80
X509 CSR ASN.1 (bad sig: missing)
depends_on:10:11:2
17:hex:"3081cd3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d0401":char*:"":exp:76
X509 CSR ASN.1 (bad sig: not a bit string)
depends_on:10:11:2
17:hex:"3081cf3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04010400":char*:"":exp:77
X509 CSR ASN.1 (bad sig: overlong)
depends_on:10:11:2
17:hex:"3081cf3081bf0201003034310b3009060355040613024e4c3111300f060355040a1308506f6c617253534c31123010060355040313096c6f63616c686f73743059301306072a8648ce3d020106082a8648ce3d0301070342000437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edffa029302706092a864886f70d01090e311a301830090603551d1304023000300b0603551d0f0404030205e0300906072a8648ce3d04010301":char*:"":exp:76
X509 CSR ASN.1 (extra data after signature)
depends_on:10:11:2
17:hex:"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":char*:"":exp:69
X509 CSR ASN.1 (invalid version overflow)
17:hex:"3008300602047fffffff":char*:"":exp:37
X509 File parse (no issues)
depends_on:10:11:6:1
13:char*:"/zip/third_party/mbedtls/test/data/server7_int-ca.crt":int:0
X509 File parse (extra space in one certificate)
depends_on:10:6:1
13:char*:"/zip/third_party/mbedtls/test/data/server7_pem_space.crt":int:1
X509 File parse (all certificates fail)
depends_on:10:1
13:char*:"/zip/third_party/mbedtls/test/data/server7_all_space.crt":exp:107
X509 File parse (trailing spaces, OK)
depends_on:10:11:6:1
13:char*:"/zip/third_party/mbedtls/test/data/server7_trailing_space.crt":int:0
X509 File parse (Algorithm Params Tag mismatch)
depends_on:6:1
13:char*:"/zip/third_party/mbedtls/test/data/cli-rsa-sha256-badalg.crt.der":exp:75
X509 Get time (UTC no issues)
depends_on:26
25:exp:108:char*:"500101000000Z":int:0:int:1950:int:1:int:1:int:0:int:0:int:0
X509 Get time (Generalized Time no issues)
depends_on:26
25:exp:109:char*:"99991231235959Z":int:0:int:9999:int:12:int:31:int:23:int:59:int:59
X509 Get time (UTC year without leap day)
depends_on:26
25:exp:108:char*:"490229121212Z":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC year with leap day)
depends_on:26
25:exp:108:char*:"000229121212Z":int:0:int:2000:int:2:int:29:int:12:int:12:int:12
X509 Get time (UTC invalid day of month #1)
depends_on:26
25:exp:108:char*:"000132121212Z":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC invalid day of month #2)
depends_on:26
25:exp:108:char*:"001131121212Z":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC invalid hour)
depends_on:26
25:exp:108:char*:"001130241212Z":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC invalid min)
depends_on:26
25:exp:108:char*:"001130236012Z":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC invalid sec)
depends_on:26
25:exp:108:char*:"001130235960Z":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC without time zone)
depends_on:26
25:exp:108:char*:"000229121212":int:0:int:2000:int:2:int:29:int:12:int:12:int:12
X509 Get time (UTC with invalid time zone #1)
depends_on:26
25:exp:108:char*:"000229121212J":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC with invalid time zone #2)
depends_on:26
25:exp:108:char*:"000229121212+0300":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (Date with invalid tag)
depends_on:26
25:exp:110:char*:"000229121212":exp:111:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC, truncated)
depends_on:26
25:exp:108:char*:"000229121":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (Generalized Time, truncated)
depends_on:26
25:exp:109:char*:"20000229121":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC without seconds)
depends_on:26
25:exp:108:char*:"0002291212":exp:54:int:2000:int:2:int:29:int:12:int:12:int:0
X509 Get time (UTC without seconds and with invalid time zone #1)
depends_on:26
25:exp:108:char*:"0002291212J":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC without second and with invalid time zone #2)
depends_on:26
25:exp:108:char*:"0002291212+0300":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC invalid character in year)
depends_on:26
25:exp:108:char*:"0\1130231212Z":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC invalid character in month)
depends_on:26
25:exp:108:char*:"001%30231212Z":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC invalid character in day)
depends_on:26
25:exp:108:char*:"0011`0231212Z":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC invalid character in hour)
depends_on:26
25:exp:108:char*:"0011302h1212Z":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC invalid character in min)
depends_on:26
25:exp:108:char*:"00113023u012Z":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (UTC invalid character in sec)
depends_on:26
25:exp:108:char*:"0011302359n0Z":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (Generalized Time, year multiple of 100 but not 400 is not a leap year)
depends_on:26
25:exp:109:char*:"19000229000000Z":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 Get time (Generalized Time, year multiple of 4 but not 100 is a leap year)
depends_on:26
25:exp:109:char*:"19920229000000Z":int:0:int:1992:int:2:int:29:int:0:int:0:int:0
X509 Get time (Generalized Time, year multiple of 400 is a leap year)
depends_on:26
25:exp:109:char*:"20000229000000Z":int:0:int:2000:int:2:int:29:int:0:int:0:int:0
X509 Get time (Generalized Time invalid leap year not multiple of 4, 100 or 400)
depends_on:26
25:exp:109:char*:"19910229000000Z":exp:54:int:0:int:0:int:0:int:0:int:0:int:0
X509 CRT verify restart: trusted EE, max_ops=0 (disabled)
depends_on:0:10:6:11
6:char*:"/zip/third_party/mbedtls/test/data/server5-selfsigned.crt":char*:"/zip/third_party/mbedtls/test/data/server5-selfsigned.crt":int:0:int:0:int:0:int:0:int:0
X509 CRT verify restart: trusted EE, max_ops=1
depends_on:0:10:6:11
6:char*:"/zip/third_party/mbedtls/test/data/server5-selfsigned.crt":char*:"/zip/third_party/mbedtls/test/data/server5-selfsigned.crt":int:0:int:0:int:1:int:0:int:0
X509 CRT verify restart: no intermediate, max_ops=0 (disabled)
depends_on:0:10:6:11:12
6:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":int:0:int:0:int:0:int:0:int:0
X509 CRT verify restart: no intermediate, max_ops=1
depends_on:0:10:6:11:12
6:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":int:0:int:0:int:1:int:100:int:10000
X509 CRT verify restart: no intermediate, max_ops=40000
depends_on:0:10:6:11:12
6:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":int:0:int:0:int:40000:int:0:int:0
X509 CRT verify restart: no intermediate, max_ops=500
depends_on:0:10:6:11:12
6:char*:"/zip/third_party/mbedtls/test/data/server5.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":int:0:int:0:int:500:int:20:int:80
X509 CRT verify restart: no intermediate, badsign, max_ops=0 (disabled)
depends_on:0:10:6:11:12
6:char*:"/zip/third_party/mbedtls/test/data/server5-badsign.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":exp:5:exp:16:int:0:int:0:int:0
X509 CRT verify restart: no intermediate, badsign, max_ops=1
depends_on:0:10:6:11:12
6:char*:"/zip/third_party/mbedtls/test/data/server5-badsign.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":exp:5:exp:16:int:1:int:100:int:10000
X509 CRT verify restart: no intermediate, badsign, max_ops=40000
depends_on:0:10:6:11:12
6:char*:"/zip/third_party/mbedtls/test/data/server5-badsign.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":exp:5:exp:16:int:40000:int:0:int:0
X509 CRT verify restart: no intermediate, badsign, max_ops=500
depends_on:0:10:6:11:12
6:char*:"/zip/third_party/mbedtls/test/data/server5-badsign.crt":char*:"/zip/third_party/mbedtls/test/data/test-ca2.crt":exp:5:exp:16:int:500:int:20:int:80
X509 CRT verify restart: one int, max_ops=0 (disabled)
depends_on:0:10:6:11:12:1
6:char*:"/zip/third_party/mbedtls/test/data/server10_int3_int-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/test-int-ca2.crt":int:0:int:0:int:0:int:0:int:0
X509 CRT verify restart: one int, max_ops=1
depends_on:0:10:6:11:12:1
6:char*:"/zip/third_party/mbedtls/test/data/server10_int3_int-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/test-int-ca2.crt":int:0:int:0:int:1:int:100:int:10000
X509 CRT verify restart: one int, max_ops=30000
depends_on:0:10:6:11:12:1
6:char*:"/zip/third_party/mbedtls/test/data/server10_int3_int-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/test-int-ca2.crt":int:0:int:0:int:30000:int:0:int:0
X509 CRT verify restart: one int, max_ops=500
depends_on:0:10:6:11:12:1
6:char*:"/zip/third_party/mbedtls/test/data/server10_int3_int-ca2.crt":char*:"/zip/third_party/mbedtls/test/data/test-int-ca2.crt":int:0:int:0:int:500:int:25:int:100
X509 CRT verify restart: one int, EE badsign, max_ops=0 (disabled)
depends_on:0:10:6:11:12:1
6:char*:"/zip/third_party/mbedtls/test/data/server10-bs_int3.pem":char*:"/zip/third_party/mbedtls/test/data/test-int-ca2.crt":exp:5:exp:16:int:0:int:0:int:0
X509 CRT verify restart: one int, EE badsign, max_ops=1
depends_on:0:10:6:11:12:1
6:char*:"/zip/third_party/mbedtls/test/data/server10-bs_int3.pem":char*:"/zip/third_party/mbedtls/test/data/test-int-ca2.crt":exp:5:exp:16:int:1:int:100:int:10000
X509 CRT verify restart: one int, EE badsign, max_ops=30000
depends_on:0:10:6:11:12:1
6:char*:"/zip/third_party/mbedtls/test/data/server10-bs_int3.pem":char*:"/zip/third_party/mbedtls/test/data/test-int-ca2.crt":exp:5:exp:16:int:30000:int:0:int:0
X509 CRT verify restart: one int, EE badsign, max_ops=500
depends_on:0:10:6:11:12:1
6:char*:"/zip/third_party/mbedtls/test/data/server10-bs_int3.pem":char*:"/zip/third_party/mbedtls/test/data/test-int-ca2.crt":exp:5:exp:16:int:500:int:25:int:100
X509 CRT verify restart: one int, int badsign, max_ops=0 (disabled)
depends_on:0:10:6:11:12:1
6:char*:"/zip/third_party/mbedtls/test/data/server10_int3-bs.pem":char*:"/zip/third_party/mbedtls/test/data/test-int-ca2.crt":exp:5:exp:16:int:0:int:0:int:0
X509 CRT verify restart: one int, int badsign, max_ops=1
depends_on:0:10:6:11:12:1
6:char*:"/zip/third_party/mbedtls/test/data/server10_int3-bs.pem":char*:"/zip/third_party/mbedtls/test/data/test-int-ca2.crt":exp:5:exp:16:int:1:int:100:int:10000
X509 CRT verify restart: one int, int badsign, max_ops=30000
depends_on:0:10:6:11:12:1
6:char*:"/zip/third_party/mbedtls/test/data/server10_int3-bs.pem":char*:"/zip/third_party/mbedtls/test/data/test-int-ca2.crt":exp:5:exp:16:int:30000:int:0:int:0
X509 CRT verify restart: one int, int badsign, max_ops=500
depends_on:0:10:6:11:12:1
6:char*:"/zip/third_party/mbedtls/test/data/server10_int3-bs.pem":char*:"/zip/third_party/mbedtls/test/data/test-int-ca2.crt":exp:5:exp:16:int:500:int:25:int:100
| 252,716 | 2,825 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.gcm.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_cipher.gcm.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_cipher.function
* Test suite data : suites/test_suite_cipher.gcm.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_CIPHER_C)
#include "third_party/mbedtls/cipher.h"
#if defined(MBEDTLS_AES_C)
#include "third_party/mbedtls/aes.h"
#endif
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
#endif
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
#define MBEDTLS_CIPHER_AUTH_CRYPT
#endif
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
/* Helper for resetting key/direction
*
* The documentation doesn't explicitly say whether calling
* mbedtls_cipher_setkey() twice is allowed or not. This currently works with
* the default software implementation, but only by accident. It isn't
* guaranteed to work with new ciphers or with alternative implementations of
* individual ciphers, and it doesn't work with the PSA wrappers. So don't do
* it, and instead start with a fresh context.
*/
static int cipher_reset_key( mbedtls_cipher_context_t *ctx, int cipher_id,
int use_psa, size_t tag_len, const data_t *key, int direction )
{
mbedtls_cipher_free( ctx );
mbedtls_cipher_init( ctx );
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
(void) tag_len;
#else
if( use_psa == 1 )
{
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( ctx,
mbedtls_cipher_info_from_type( cipher_id ),
tag_len ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
TEST_ASSERT( 0 == mbedtls_cipher_setup( ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
}
TEST_ASSERT( 0 == mbedtls_cipher_setkey( ctx, key->x, 8 * key->len,
direction ) );
return( 1 );
exit:
return( 0 );
}
/*
* Check if a buffer is all-0 bytes:
* return 1 if it is,
* 0 if it isn't.
*/
int buffer_is_all_zero( const uint8_t *buf, size_t size )
{
for( size_t i = 0; i < size; i++ )
if( buf[i] != 0 )
return 0;
return 1;
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_mbedtls_cipher_list( )
{
const int *cipher_type;
for( cipher_type = mbedtls_cipher_list(); *cipher_type != 0; cipher_type++ )
TEST_ASSERT( mbedtls_cipher_info_from_type( *cipher_type ) != NULL );
exit:
;
}
void test_mbedtls_cipher_list_wrapper( void ** params )
{
(void)params;
test_mbedtls_cipher_list( );
}
void test_cipher_invalid_param_unconditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_cipher_context_t invalid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
mbedtls_cipher_init( &valid_ctx );
mbedtls_cipher_setup( &valid_ctx, valid_info );
mbedtls_cipher_init( &invalid_ctx );
/* mbedtls_cipher_setup() */
TEST_ASSERT( mbedtls_cipher_setup( &valid_ctx, NULL ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_get_block_size() */
TEST_ASSERT( mbedtls_cipher_get_block_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_cipher_mode() */
TEST_ASSERT( mbedtls_cipher_get_cipher_mode( &invalid_ctx ) ==
MBEDTLS_MODE_NONE );
/* mbedtls_cipher_get_iv_size() */
TEST_ASSERT( mbedtls_cipher_get_iv_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_type() */
TEST_ASSERT(
mbedtls_cipher_get_type( &invalid_ctx ) ==
MBEDTLS_CIPHER_NONE);
/* mbedtls_cipher_get_name() */
TEST_ASSERT( mbedtls_cipher_get_name( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_key_bitlen() */
TEST_ASSERT( mbedtls_cipher_get_key_bitlen( &invalid_ctx ) ==
MBEDTLS_KEY_LENGTH_NONE );
/* mbedtls_cipher_get_operation() */
TEST_ASSERT( mbedtls_cipher_get_operation( &invalid_ctx ) ==
MBEDTLS_OPERATION_NONE );
/* mbedtls_cipher_setkey() */
TEST_ASSERT(
mbedtls_cipher_setkey( &invalid_ctx,
valid_buffer,
valid_bitlen,
valid_operation ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_set_iv() */
TEST_ASSERT(
mbedtls_cipher_set_iv( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_reset() */
TEST_ASSERT( mbedtls_cipher_reset( &invalid_ctx ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_ASSERT(
mbedtls_cipher_update_ad( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_ASSERT( mbedtls_cipher_set_padding_mode( &invalid_ctx, valid_mode ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif
/* mbedtls_cipher_update() */
TEST_ASSERT(
mbedtls_cipher_update( &invalid_ctx,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_finish() */
TEST_ASSERT(
mbedtls_cipher_finish( &invalid_ctx,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_ASSERT(
mbedtls_cipher_write_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_check_tag() */
TEST_ASSERT(
mbedtls_cipher_check_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
exit:
mbedtls_cipher_free( &invalid_ctx );
mbedtls_cipher_free( &valid_ctx );
}
void test_cipher_invalid_param_unconditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_unconditional( );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_cipher_invalid_param_conditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_operation_t invalid_operation = 100;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
/* mbedtls_cipher_init() */
TEST_VALID_PARAM( mbedtls_cipher_init( &valid_ctx ) );
TEST_INVALID_PARAM( mbedtls_cipher_init( NULL ) );
/* mbedtls_cipher_setup() */
TEST_VALID_PARAM( mbedtls_cipher_setup( &valid_ctx, valid_info ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setup( NULL, valid_info ) );
/* mbedtls_cipher_get_block_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_block_size( NULL ) );
/* mbedtls_cipher_get_cipher_mode() */
TEST_INVALID_PARAM_RET(
MBEDTLS_MODE_NONE,
mbedtls_cipher_get_cipher_mode( NULL ) );
/* mbedtls_cipher_get_iv_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_iv_size( NULL ) );
/* mbedtls_cipher_get_type() */
TEST_INVALID_PARAM_RET(
MBEDTLS_CIPHER_NONE,
mbedtls_cipher_get_type( NULL ) );
/* mbedtls_cipher_get_name() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_name( NULL ) );
/* mbedtls_cipher_get_key_bitlen() */
TEST_INVALID_PARAM_RET(
MBEDTLS_KEY_LENGTH_NONE,
mbedtls_cipher_get_key_bitlen( NULL ) );
/* mbedtls_cipher_get_operation() */
TEST_INVALID_PARAM_RET(
MBEDTLS_OPERATION_NONE,
mbedtls_cipher_get_operation( NULL ) );
/* mbedtls_cipher_setkey() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( NULL,
valid_buffer,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
NULL,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
valid_buffer,
valid_bitlen,
invalid_operation ) );
/* mbedtls_cipher_set_iv() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_reset() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_reset( NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_padding_mode( NULL, valid_mode ) );
#endif
/* mbedtls_cipher_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( NULL,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
NULL, valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
valid_buffer,
NULL ) );
/* mbedtls_cipher_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( NULL,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
valid_buffer,
NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_check_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
/* mbedtls_cipher_crypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_AEAD)
/* mbedtls_cipher_auth_encrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
/* mbedtls_cipher_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
#endif /* defined(MBEDTLS_CIPHER_MODE_AEAD) */
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
/* mbedtls_cipher_auth_encrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
/* mbedtls_cipher_auth_decrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
#endif /* MBEDTLS_CIPHER_MODE_AEAD || MBEDTLS_NIST_KW_C */
/* mbedtls_cipher_free() */
TEST_VALID_PARAM( mbedtls_cipher_free( NULL ) );
exit:
TEST_VALID_PARAM( mbedtls_cipher_free( &valid_ctx ) );
}
void test_cipher_invalid_param_conditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_conditional( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
#if defined(MBEDTLS_AES_C)
void test_cipher_special_behaviours( )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char input[32];
unsigned char output[32];
#if defined (MBEDTLS_CIPHER_MODE_CBC)
unsigned char iv[32];
#endif
size_t olen = 0;
mbedtls_cipher_init( &ctx );
memset( input, 0, sizeof( input ) );
memset( output, 0, sizeof( output ) );
#if defined(MBEDTLS_CIPHER_MODE_CBC)
memset( iv, 0, sizeof( iv ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_CBC );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* IV too big */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, MBEDTLS_MAX_IV_LENGTH + 1 )
== MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
/* IV too small */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, 0 )
== MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_cipher_free( &ctx );
mbedtls_cipher_init( &ctx );
#endif /* MBEDTLS_CIPHER_MODE_CBC */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_ECB );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* Update ECB with partial block */
TEST_ASSERT( mbedtls_cipher_update( &ctx, input, 1, output, &olen )
== MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED );
exit:
mbedtls_cipher_free( &ctx );
}
void test_cipher_special_behaviours_wrapper( void ** params )
{
(void)params;
test_cipher_special_behaviours( );
}
#endif /* MBEDTLS_AES_C */
void test_enc_dec_buf( int cipher_id, char * cipher_string, int key_len,
int length_val, int pad_mode )
{
size_t length = length_val, outlen, total_len, i, block_size;
unsigned char key[64];
unsigned char iv[16];
unsigned char ad[13];
unsigned char tag[16];
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
/*
* Prepare contexts
*/
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( key, 0x2a, sizeof( key ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( mbedtls_cipher_info_from_string( cipher_string ) == cipher_info );
/* Initialise enc and dec contexts */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
/*
* Do a few encode/decode cycles
*/
for( i = 0; i < 3; i++ )
{
memset( iv , 0x00 + i, sizeof( iv ) );
memset( ad, 0x10 + i, sizeof( ad ) );
memset( inbuf, 0x20 + i, sizeof( inbuf ) );
memset( encbuf, 0, sizeof( encbuf ) );
memset( decbuf, 0, sizeof( decbuf ) );
memset( tag, 0, sizeof( tag ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, ad, sizeof( ad ) - i ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, ad, sizeof( ad ) - i ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, length, encbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_write_tag( &ctx_enc, tag, sizeof( tag ) ) );
#endif
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len > length &&
total_len <= length + block_size ) );
/* decode the previously encoded string */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, total_len, decbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_check_tag( &ctx_dec, tag, sizeof( tag ) ) );
#endif
/* check result */
TEST_ASSERT( total_len == length );
TEST_ASSERT( 0 == memcmp(inbuf, decbuf, length) );
}
/*
* Done
*/
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_wrapper( void ** params )
{
test_enc_dec_buf( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_enc_fail( int cipher_id, int pad_mode, int key_len, int length_val,
int ret )
{
size_t length = length_val;
unsigned char key[32];
unsigned char iv[16];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char inbuf[64];
unsigned char encbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
/* Initialise context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, NULL, 0 ) );
#endif
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, inbuf, length, encbuf, &outlen ) );
TEST_ASSERT( ret == mbedtls_cipher_finish( &ctx, encbuf + outlen, &outlen ) );
/* done */
exit:
mbedtls_cipher_free( &ctx );
}
void test_enc_fail_wrapper( void ** params )
{
test_enc_fail( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_dec_empty_buf( int cipher,
int expected_update_ret,
int expected_finish_ret )
{
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
const mbedtls_cipher_info_t *cipher_info;
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise context */
cipher_info = mbedtls_cipher_info_from_type( cipher );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( sizeof(key) * 8 >= cipher_info->key_bitlen );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec,
key, cipher_info->key_bitlen,
MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
#endif
/* decode 0-byte string */
TEST_ASSERT( expected_update_ret ==
mbedtls_cipher_update( &ctx_dec, encbuf, 0, decbuf, &outlen ) );
TEST_ASSERT( 0 == outlen );
if ( expected_finish_ret == 0 &&
( cipher_info->mode == MBEDTLS_MODE_CBC ||
cipher_info->mode == MBEDTLS_MODE_ECB ) )
{
/* Non-CBC and non-ECB ciphers are OK with decrypting empty buffers and
* return success, not MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED, when
* decrypting an empty buffer.
* On the other hand, CBC and ECB ciphers need a full block of input.
*/
expected_finish_ret = MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED;
}
TEST_ASSERT( expected_finish_ret == mbedtls_cipher_finish(
&ctx_dec, decbuf + outlen, &outlen ) );
TEST_ASSERT( 0 == outlen );
exit:
mbedtls_cipher_free( &ctx_dec );
}
void test_dec_empty_buf_wrapper( void ** params )
{
test_dec_empty_buf( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
void test_enc_dec_buf_multipart( int cipher_id, int key_len, int first_length_val,
int second_length_val, int pad_mode,
int first_encrypt_output_len, int second_encrypt_output_len,
int first_decrypt_output_len, int second_decrypt_output_len )
{
size_t first_length = first_length_val;
size_t second_length = second_length_val;
size_t length = first_length + second_length;
size_t block_size;
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
const mbedtls_cipher_info_t *cipher_info;
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
size_t totaloutlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise enc and dec contexts */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, NULL, 0 ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, first_length, encbuf, &outlen ) );
TEST_ASSERT( (size_t)first_encrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf + first_length, second_length, encbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_encrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen > length &&
totaloutlen <= length + block_size ) );
/* decode the previously encoded string */
second_length = totaloutlen - first_length;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, first_length, decbuf, &outlen ) );
TEST_ASSERT( (size_t)first_decrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf + first_length, second_length, decbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_decrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length );
TEST_ASSERT( 0 == memcmp(inbuf, decbuf, length) );
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_multipart_wrapper( void ** params )
{
test_enc_dec_buf_multipart( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ), *( (int *) params[6] ), *( (int *) params[7] ), *( (int *) params[8] ) );
}
void test_decrypt_test_vec( int cipher_id, int pad_mode, data_t * key,
data_t * iv, data_t * cipher,
data_t * clear, data_t * ad, data_t * tag,
int finish_result, int tag_result )
{
unsigned char output[265];
mbedtls_cipher_context_t ctx;
size_t outlen, total_len;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
#if !defined(MBEDTLS_GCM_C) && !defined(MBEDTLS_CHACHAPOLY_C)
((void) ad);
((void) tag);
#endif
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, MBEDTLS_DECRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( pad_mode != -1 )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv->x, iv->len ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, ad->x, ad->len ) );
#endif
/* decode buffer and check tag->x */
total_len = 0;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, cipher->x, cipher->len, output, &outlen ) );
total_len += outlen;
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( tag_result == mbedtls_cipher_check_tag( &ctx, tag->x, tag->len ) );
#endif
/* check plaintext only if everything went fine */
if( 0 == finish_result && 0 == tag_result )
{
TEST_ASSERT( total_len == clear->len );
TEST_ASSERT( 0 == memcmp( output, clear->x, clear->len ) );
}
exit:
mbedtls_cipher_free( &ctx );
}
void test_decrypt_test_vec_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_decrypt_test_vec( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, &data10, &data12, *( (int *) params[14] ), *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
void test_auth_crypt_tv( int cipher_id, data_t * key, data_t * iv,
data_t * ad, data_t * cipher, data_t * tag,
char * result, data_t * clear, int use_psa )
{
/*
* Take an AEAD ciphertext + tag and perform a pair
* of AEAD decryption and AEAD encryption. Check that
* this results in the expected plaintext, and that
* decryption and encryption are inverse to one another.
*
* Do that twice:
* - once with legacy functions auth_decrypt/auth_encrypt
* - once with new functions auth_decrypt_ext/auth_encrypt_ext
* This allows testing both without duplicating test cases.
*/
int ret;
int using_nist_kw, using_nist_kw_padding;
mbedtls_cipher_context_t ctx;
size_t outlen;
unsigned char *cipher_plus_tag = NULL;
size_t cipher_plus_tag_len;
unsigned char *decrypt_buf = NULL;
size_t decrypt_buf_len = 0;
unsigned char *encrypt_buf = NULL;
size_t encrypt_buf_len = 0;
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
unsigned char *tmp_tag = NULL;
unsigned char *tmp_cipher = NULL;
unsigned char *tag_buf = NULL;
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
/* Null pointers are documented as valid for inputs of length 0.
* The test framework passes non-null pointers, so set them to NULL.
* key, cipher and tag can't be empty. */
if( iv->len == 0 )
iv->x = NULL;
if( ad->len == 0 )
ad->x = NULL;
if( clear->len == 0 )
clear->x = NULL;
mbedtls_cipher_init( &ctx );
/* Initialize PSA Crypto */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_ASSERT( psa_crypto_init( ) );
#else
(void) use_psa;
#endif
/*
* Are we using NIST_KW? with padding?
*/
using_nist_kw_padding = cipher_id == MBEDTLS_CIPHER_AES_128_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_192_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_256_KWP;
using_nist_kw = cipher_id == MBEDTLS_CIPHER_AES_128_KW ||
cipher_id == MBEDTLS_CIPHER_AES_192_KW ||
cipher_id == MBEDTLS_CIPHER_AES_256_KW ||
using_nist_kw_padding;
/****************************************************************
* *
* Part 1: non-deprecated API *
* *
****************************************************************/
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* prepare buffer for decryption
* (we need the tag appended to the ciphertext)
*/
cipher_plus_tag_len = cipher->len + tag->len;
ASSERT_ALLOC( cipher_plus_tag, cipher_plus_tag_len );
memcpy( cipher_plus_tag, cipher->x, cipher->len );
memcpy( cipher_plus_tag + cipher->len, tag->x, tag->len );
/*
* Compute length of output buffer according to the documentation
*/
if( using_nist_kw )
decrypt_buf_len = cipher_plus_tag_len - 8;
else
decrypt_buf_len = cipher_plus_tag_len - tag->len;
/*
* Try decrypting to a buffer that's 1B too small
*/
if( decrypt_buf_len != 0 )
{
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len, &outlen, tag->len );
if( strcmp( result, "FAIL" ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, decrypt_buf_len ) );
}
else
{
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
/* Free this, but keep cipher_plus_tag for deprecated function with PSA */
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/*
* Compute size of output buffer according to documentation
*/
if( using_nist_kw )
{
encrypt_buf_len = clear->len + 8;
if( using_nist_kw_padding && encrypt_buf_len % 8 != 0 )
encrypt_buf_len += 8 - encrypt_buf_len % 8;
}
else
{
encrypt_buf_len = clear->len + tag->len;
}
/*
* Try encrypting with an output buffer that's 1B too small
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret != 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
/*
* Encrypt and check the result
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len, &outlen, tag->len );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len + tag->len );
TEST_ASSERT( memcmp( encrypt_buf, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( memcmp( encrypt_buf + cipher->len,
tag->x, tag->len ) == 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
}
/****************************************************************
* *
* Part 2: deprecated API *
* *
****************************************************************/
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* Prepare pointers for decryption
*/
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
{
/* PSA requires that the tag immediately follows the ciphertext.
* Fortunately, we already have that from testing the new API. */
tmp_cipher = cipher_plus_tag;
tmp_tag = tmp_cipher + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
tmp_cipher = cipher->x;
tmp_tag = tag->x;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, cipher->len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
tmp_cipher, cipher->len, decrypt_buf, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
/* NIST_KW with legacy API */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else if( strcmp( result, "FAIL" ) == 0 )
{
/* unauthentic message */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, cipher->len ) );
}
else
{
/* authentic message: is the plaintext correct? */
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
mbedtls_free( cipher_plus_tag );
cipher_plus_tag = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/* prepare buffers for encryption */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa )
{
ASSERT_ALLOC( cipher_plus_tag, cipher->len + tag->len );
tmp_cipher = cipher_plus_tag;
tmp_tag = cipher_plus_tag + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
ASSERT_ALLOC( encrypt_buf, cipher->len );
ASSERT_ALLOC( tag_buf, tag->len );
tmp_cipher = encrypt_buf;
tmp_tag = tag_buf;
}
/*
* Encrypt and check the result
*/
outlen = 0;
ret = mbedtls_cipher_auth_encrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
clear->x, clear->len, tmp_cipher, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len );
if( cipher->len != 0 )
TEST_ASSERT( memcmp( tmp_cipher, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( memcmp( tmp_tag, tag->x, tag->len ) == 0 );
}
}
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
exit:
mbedtls_cipher_free( &ctx );
mbedtls_free( decrypt_buf );
mbedtls_free( encrypt_buf );
mbedtls_free( cipher_plus_tag );
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
mbedtls_free( tag_buf );
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_auth_crypt_tv_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_auth_crypt_tv( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, (char *) params[11], &data12, *( (int *) params[14] ) );
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_test_vec_ecb( int cipher_id, int operation, data_t * key,
data_t * input, data_t * result, int finish_result
)
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, input->x,
mbedtls_cipher_get_block_size( &ctx ),
output, &outlen ) );
TEST_ASSERT( outlen == mbedtls_cipher_get_block_size( &ctx ) );
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
TEST_ASSERT( 0 == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == memcmp( output, result->x,
mbedtls_cipher_get_block_size( &ctx ) ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_test_vec_ecb_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_test_vec_ecb( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, *( (int *) params[8] ) );
}
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_test_vec_crypt( int cipher_id, int operation, data_t *key,
data_t *iv, data_t *input, data_t *result,
int finish_result, int use_psa )
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
#else
if( use_psa == 1 )
{
PSA_ASSERT( psa_crypto_init( ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( &ctx,
mbedtls_cipher_info_from_type( cipher_id ), 0 ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
if( MBEDTLS_MODE_CBC == ctx.cipher_info->mode )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, MBEDTLS_PADDING_NONE ) );
TEST_ASSERT( finish_result == mbedtls_cipher_crypt( &ctx, iv->len ? iv->x : NULL,
iv->len, input->x, input->len,
output, &outlen ) );
TEST_ASSERT( result->len == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == memcmp( output, result->x, outlen ) );
exit:
mbedtls_cipher_free( &ctx );
#if defined(MBEDTLS_USE_PSA_CRYPTO)
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_test_vec_crypt_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_test_vec_crypt( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_set_padding( int cipher_id, int pad_mode, int ret )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
mbedtls_cipher_init( &ctx );
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( ret == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_set_padding_wrapper( void ** params )
{
test_set_padding( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_check_padding( int pad_mode, data_t * input, int ret, int dlen_check
)
{
mbedtls_cipher_info_t cipher_info;
mbedtls_cipher_context_t ctx;
size_t dlen;
/* build a fake context just for getting access to get_padding */
mbedtls_cipher_init( &ctx );
cipher_info.mode = MBEDTLS_MODE_CBC;
ctx.cipher_info = &cipher_info;
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
TEST_ASSERT( ret == ctx.get_padding( input->x, input->len, &dlen ) );
if( 0 == ret )
TEST_ASSERT( dlen == (size_t) dlen_check );
exit:
;
}
void test_check_padding_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_check_padding( *( (int *) params[0] ), &data1, *( (int *) params[3] ), *( (int *) params[4] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#endif /* MBEDTLS_CIPHER_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
*out_value = MBEDTLS_CIPHER_CAMELLIA_128_GCM;
}
break;
case 1:
{
*out_value = MBEDTLS_CIPHER_AES_128_GCM;
}
break;
case 2:
{
*out_value = MBEDTLS_CIPHER_ARIA_128_GCM;
}
break;
case 3:
{
*out_value = -1;
}
break;
case 4:
{
*out_value = MBEDTLS_ERR_CIPHER_AUTH_FAILED;
}
break;
case 5:
{
*out_value = MBEDTLS_CIPHER_AES_192_GCM;
}
break;
case 6:
{
*out_value = MBEDTLS_CIPHER_AES_256_GCM;
}
break;
case 7:
{
*out_value = MBEDTLS_CIPHER_CAMELLIA_192_GCM;
}
break;
case 8:
{
*out_value = MBEDTLS_CIPHER_CAMELLIA_256_GCM;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
#if defined(MBEDTLS_CAMELLIA_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_GCM_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_AES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if defined(MBEDTLS_ARIA_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 4:
{
#if defined(MBEDTLS_USE_PSA_CRYPTO)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_CIPHER_C)
test_mbedtls_cipher_list_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_CIPHER_C)
test_cipher_invalid_param_unconditional_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_cipher_invalid_param_conditional_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_AES_C)
test_cipher_special_behaviours_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_fail_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_CIPHER_C)
test_dec_empty_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_multipart_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_CIPHER_C)
test_decrypt_test_vec_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_AUTH_CRYPT)
test_auth_crypt_tv_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_CIPHER_C)
test_test_vec_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_test_vec_crypt_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_set_padding_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_check_padding_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_cipher.gcm.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 73,259 | 2,100 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_mpi.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_mpi.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_mpi.function
* Test suite data : suites/test_suite_mpi.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_BIGNUM_C)
#include "third_party/mbedtls/bignum.h"
#include "third_party/mbedtls/entropy.h"
#if MBEDTLS_MPI_MAX_BITS > 792
#define MPI_MAX_BITS_LARGER_THAN_792
#endif
typedef struct mbedtls_test_mpi_random
{
data_t *data;
size_t pos;
size_t chunk_len;
} mbedtls_test_mpi_random;
/*
* This function is called by the Miller-Rabin primality test each time it
* chooses a random witness. The witnesses (or non-witnesses as provided by the
* test) are stored in the data member of the state structure. Each number is in
* the format that mbedtls_mpi_read_string understands and is chunk_len long.
*/
int mbedtls_test_mpi_miller_rabin_determinizer( void* state,
unsigned char* buf,
size_t len )
{
mbedtls_test_mpi_random *random = (mbedtls_test_mpi_random*) state;
if( random == NULL || random->data->x == NULL || buf == NULL )
return( -1 );
if( random->pos + random->chunk_len > random->data->len
|| random->chunk_len > len )
{
return( -1 );
}
memset( buf, 0, len );
/* The witness is written to the end of the buffer, since the buffer is
* used as big endian, unsigned binary data in mbedtls_mpi_read_binary.
* Writing the witness to the start of the buffer would result in the
* buffer being 'witness 000...000', which would be treated as
* witness * 2^n for some n. */
memcpy( buf + len - random->chunk_len, &random->data->x[random->pos],
random->chunk_len );
random->pos += random->chunk_len;
return( 0 );
}
/* Random generator that is told how many bytes to return. */
static int f_rng_bytes_left( void *state, unsigned char *buf, size_t len )
{
size_t *bytes_left = state;
size_t i;
for( i = 0; i < len; i++ )
{
if( *bytes_left == 0 )
return( MBEDTLS_ERR_ENTROPY_SOURCE_FAILED );
buf[i] = *bytes_left & 0xff;
--( *bytes_left );
}
return( 0 );
}
void test_mpi_valid_param( )
{
TEST_VALID_PARAM( mbedtls_mpi_free( NULL ) );
exit:
;
}
void test_mpi_valid_param_wrapper( void ** params )
{
(void)params;
test_mpi_valid_param( );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_mpi_invalid_param( )
{
mbedtls_mpi X;
const char *s_in = "00101000101010";
char s_out[16] = { 0 };
unsigned char u_out[16] = { 0 };
unsigned char u_in[16] = { 0 };
size_t olen;
mbedtls_mpi_uint mpi_uint;
TEST_INVALID_PARAM( mbedtls_mpi_init( NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_grow( NULL, 42 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_copy( NULL, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_copy( &X, NULL ) );
TEST_INVALID_PARAM( mbedtls_mpi_swap( NULL, &X ) );
TEST_INVALID_PARAM( mbedtls_mpi_swap( &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_safe_cond_assign( NULL, &X, 0 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_safe_cond_assign( &X, NULL, 0 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_safe_cond_swap( NULL, &X, 0 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_safe_cond_swap( &X, NULL, 0 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_lset( NULL, 42 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_get_bit( NULL, 42 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_set_bit( NULL, 42, 0 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_read_string( NULL, 2, s_in ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_read_string( &X, 2, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_write_string( NULL, 2,
s_out, sizeof( s_out ),
&olen ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_write_string( &X, 2,
NULL, sizeof( s_out ),
&olen ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_write_string( &X, 2,
s_out, sizeof( s_out ),
NULL ) );
#if defined(MBEDTLS_FS_IO)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_read_file( NULL, 2, stdin ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_read_file( &X, 2, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_write_file( "", NULL, 2, NULL ) );
#endif /* MBEDTLS_FS_IO */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_read_binary( NULL, u_in,
sizeof( u_in ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_read_binary( &X, NULL,
sizeof( u_in ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_write_binary( NULL, u_out,
sizeof( u_out ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_write_binary( &X, NULL,
sizeof( u_out ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_shift_l( NULL, 42 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_shift_r( NULL, 42 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_cmp_abs( NULL, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_cmp_abs( &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_cmp_mpi( NULL, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_cmp_mpi( &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_cmp_int( NULL, 42 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_add_abs( NULL, &X, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_add_abs( &X, NULL, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_add_abs( &X, &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_sub_abs( NULL, &X, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_sub_abs( &X, NULL, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_sub_abs( &X, &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_add_mpi( NULL, &X, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_add_mpi( &X, NULL, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_add_mpi( &X, &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_sub_mpi( NULL, &X, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_sub_mpi( &X, NULL, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_sub_mpi( &X, &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_add_int( NULL, &X, 42 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_add_int( &X, NULL, 42 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_sub_int( NULL, &X, 42 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_sub_int( &X, NULL, 42 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_mul_mpi( NULL, &X, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_mul_mpi( &X, NULL, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_mul_mpi( &X, &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_mul_int( NULL, &X, 42 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_mul_int( &X, NULL, 42 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_div_mpi( &X, &X, NULL, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_div_mpi( &X, &X, &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_div_int( &X, &X, NULL, 42 ) );
TEST_INVALID_PARAM_RET( 0, mbedtls_mpi_lsb( NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_mod_mpi( NULL, &X, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_mod_mpi( &X, NULL, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_mod_mpi( &X, &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_mod_int( NULL, &X, 42 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_mod_int( &mpi_uint, NULL, 42 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_exp_mod( NULL, &X, &X, &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_exp_mod( &X, NULL, &X, &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_exp_mod( &X, &X, NULL, &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_exp_mod( &X, &X, &X, NULL, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_fill_random( NULL, 42,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_fill_random( &X, 42, NULL, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_gcd( NULL, &X, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_gcd( &X, NULL, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_gcd( &X, &X, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_inv_mod( NULL, &X, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_inv_mod( &X, NULL, &X ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_MPI_BAD_INPUT_DATA,
mbedtls_mpi_inv_mod( &X, &X, NULL ) );
exit:
return;
}
void test_mpi_invalid_param_wrapper( void ** params )
{
(void)params;
test_mpi_invalid_param( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_mpi_null( )
{
mbedtls_mpi X, Y, Z;
mbedtls_mpi_init( &X );
mbedtls_mpi_init( &Y );
mbedtls_mpi_init( &Z );
TEST_ASSERT( mbedtls_mpi_get_bit( &X, 42 ) == 0 );
TEST_ASSERT( mbedtls_mpi_lsb( &X ) == 0 );
TEST_ASSERT( mbedtls_mpi_bitlen( &X ) == 0 );
TEST_ASSERT( mbedtls_mpi_size( &X ) == 0 );
exit:
mbedtls_mpi_free( &X );
}
void test_mpi_null_wrapper( void ** params )
{
(void)params;
test_mpi_null( );
}
void test_mpi_read_write_string( int radix_X, char * input_X, int radix_A,
char * input_A, int output_size, int result_read,
int result_write )
{
mbedtls_mpi X;
char str[1000];
size_t len;
mbedtls_mpi_init( &X );
memset( str, '!', sizeof( str ) );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == result_read );
if( result_read == 0 )
{
TEST_ASSERT( mbedtls_mpi_write_string( &X, radix_A, str, output_size, &len ) == result_write );
if( result_write == 0 )
{
TEST_ASSERT( strcasecmp( str, input_A ) == 0 );
TEST_ASSERT( str[len] == '!' );
}
}
exit:
mbedtls_mpi_free( &X );
}
void test_mpi_read_write_string_wrapper( void ** params )
{
test_mpi_read_write_string( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ), *( (int *) params[5] ), *( (int *) params[6] ) );
}
void test_mbedtls_mpi_read_binary( data_t * buf, int radix_A, char * input_A )
{
mbedtls_mpi X;
char str[1000];
size_t len;
mbedtls_mpi_init( &X );
TEST_ASSERT( mbedtls_mpi_read_binary( &X, buf->x, buf->len ) == 0 );
TEST_ASSERT( mbedtls_mpi_write_string( &X, radix_A, str, sizeof( str ), &len ) == 0 );
TEST_ASSERT( strcmp( (char *) str, input_A ) == 0 );
exit:
mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_read_binary_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_mbedtls_mpi_read_binary( &data0, *( (int *) params[2] ), (char *) params[3] );
}
void test_mbedtls_mpi_read_binary_le( data_t * buf, int radix_A, char * input_A )
{
mbedtls_mpi X;
char str[1000];
size_t len;
mbedtls_mpi_init( &X );
TEST_ASSERT( mbedtls_mpi_read_binary_le( &X, buf->x, buf->len ) == 0 );
TEST_ASSERT( mbedtls_mpi_write_string( &X, radix_A, str, sizeof( str ), &len ) == 0 );
TEST_ASSERT( strcmp( (char *) str, input_A ) == 0 );
exit:
mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_read_binary_le_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_mbedtls_mpi_read_binary_le( &data0, *( (int *) params[2] ), (char *) params[3] );
}
void test_mbedtls_mpi_write_binary( int radix_X, char * input_X,
data_t * input_A, int output_size,
int result )
{
mbedtls_mpi X;
unsigned char buf[1000];
size_t buflen;
memset( buf, 0x00, 1000 );
mbedtls_mpi_init( &X );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
buflen = mbedtls_mpi_size( &X );
if( buflen > (size_t) output_size )
buflen = (size_t) output_size;
TEST_ASSERT( mbedtls_mpi_write_binary( &X, buf, buflen ) == result );
if( result == 0)
{
TEST_ASSERT( mbedtls_test_hexcmp( buf, input_A->x,
buflen, input_A->len ) == 0 );
}
exit:
mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_write_binary_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_mbedtls_mpi_write_binary( *( (int *) params[0] ), (char *) params[1], &data2, *( (int *) params[4] ), *( (int *) params[5] ) );
}
void test_mbedtls_mpi_write_binary_le( int radix_X, char * input_X,
data_t * input_A, int output_size,
int result )
{
mbedtls_mpi X;
unsigned char buf[1000];
size_t buflen;
memset( buf, 0x00, 1000 );
mbedtls_mpi_init( &X );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
buflen = mbedtls_mpi_size( &X );
if( buflen > (size_t) output_size )
buflen = (size_t) output_size;
TEST_ASSERT( mbedtls_mpi_write_binary_le( &X, buf, buflen ) == result );
if( result == 0)
{
TEST_ASSERT( mbedtls_test_hexcmp( buf, input_A->x,
buflen, input_A->len ) == 0 );
}
exit:
mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_write_binary_le_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_mbedtls_mpi_write_binary_le( *( (int *) params[0] ), (char *) params[1], &data2, *( (int *) params[4] ), *( (int *) params[5] ) );
}
#if defined(MBEDTLS_FS_IO)
void test_mbedtls_mpi_read_file( int radix_X, char * input_file,
data_t * input_A, int result )
{
mbedtls_mpi X;
unsigned char buf[1000];
size_t buflen;
FILE *file;
int ret;
memset( buf, 0x00, 1000 );
mbedtls_mpi_init( &X );
file = fopen( input_file, "r" );
TEST_ASSERT( file != NULL );
ret = mbedtls_mpi_read_file( &X, radix_X, file );
fclose(file);
TEST_ASSERT( ret == result );
if( result == 0 )
{
buflen = mbedtls_mpi_size( &X );
TEST_ASSERT( mbedtls_mpi_write_binary( &X, buf, buflen ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( buf, input_A->x,
buflen, input_A->len ) == 0 );
}
exit:
mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_read_file_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_mbedtls_mpi_read_file( *( (int *) params[0] ), (char *) params[1], &data2, *( (int *) params[4] ) );
}
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_FS_IO)
void test_mbedtls_mpi_write_file( int radix_X, char * input_X, int output_radix,
char * output_file )
{
mbedtls_mpi X, Y;
FILE *file_out, *file_in;
int ret;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
file_out = fopen( output_file, "w" );
TEST_ASSERT( file_out != NULL );
ret = mbedtls_mpi_write_file( NULL, &X, output_radix, file_out );
fclose(file_out);
TEST_ASSERT( ret == 0 );
file_in = fopen( output_file, "r" );
TEST_ASSERT( file_in != NULL );
ret = mbedtls_mpi_read_file( &Y, output_radix, file_in );
fclose(file_in);
TEST_ASSERT( ret == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &Y ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y );
}
void test_mbedtls_mpi_write_file_wrapper( void ** params )
{
test_mbedtls_mpi_write_file( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3] );
}
#endif /* MBEDTLS_FS_IO */
void test_mbedtls_mpi_get_bit( int radix_X, char * input_X, int pos, int val )
{
mbedtls_mpi X;
mbedtls_mpi_init( &X );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_get_bit( &X, pos ) == val );
exit:
mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_get_bit_wrapper( void ** params )
{
test_mbedtls_mpi_get_bit( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ) );
}
void test_mbedtls_mpi_set_bit( int radix_X, char * input_X, int pos, int val,
int radix_Y, char * output_Y, int result )
{
mbedtls_mpi X, Y;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, radix_Y, output_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_set_bit( &X, pos, val ) == result );
if( result == 0 )
{
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &Y ) == 0 );
}
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y );
}
void test_mbedtls_mpi_set_bit_wrapper( void ** params )
{
test_mbedtls_mpi_set_bit( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), (char *) params[5], *( (int *) params[6] ) );
}
void test_mbedtls_mpi_lsb( int radix_X, char * input_X, int nr_bits )
{
mbedtls_mpi X;
mbedtls_mpi_init( &X );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_lsb( &X ) == (size_t) nr_bits );
exit:
mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_lsb_wrapper( void ** params )
{
test_mbedtls_mpi_lsb( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ) );
}
void test_mbedtls_mpi_bitlen( int radix_X, char * input_X, int nr_bits )
{
mbedtls_mpi X;
mbedtls_mpi_init( &X );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_bitlen( &X ) == (size_t) nr_bits );
exit:
mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_bitlen_wrapper( void ** params )
{
test_mbedtls_mpi_bitlen( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ) );
}
void test_mbedtls_mpi_gcd( int radix_X, char * input_X, int radix_Y,
char * input_Y, int radix_A, char * input_A )
{
mbedtls_mpi A, X, Y, Z;
mbedtls_mpi_init( &A ); mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, radix_Y, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
TEST_ASSERT( mbedtls_mpi_gcd( &Z, &X, &Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Z, &A ) == 0 );
exit:
mbedtls_mpi_free( &A ); mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &Z );
}
void test_mbedtls_mpi_gcd_wrapper( void ** params )
{
test_mbedtls_mpi_gcd( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ), (char *) params[5] );
}
void test_mbedtls_mpi_cmp_int( int input_X, int input_A, int result_CMP )
{
mbedtls_mpi X;
mbedtls_mpi_init( &X );
TEST_ASSERT( mbedtls_mpi_lset( &X, input_X ) == 0);
TEST_ASSERT( mbedtls_mpi_cmp_int( &X, input_A ) == result_CMP);
exit:
mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_cmp_int_wrapper( void ** params )
{
test_mbedtls_mpi_cmp_int( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
void test_mbedtls_mpi_cmp_mpi( int radix_X, char * input_X, int radix_Y,
char * input_Y, int input_A )
{
mbedtls_mpi X, Y;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, radix_Y, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &Y ) == input_A );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y );
}
void test_mbedtls_mpi_cmp_mpi_wrapper( void ** params )
{
test_mbedtls_mpi_cmp_mpi( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ) );
}
void test_mbedtls_mpi_lt_mpi_ct( int size_X, char * input_X,
int size_Y, char * input_Y,
int input_ret, int input_err )
{
unsigned ret = -1;
unsigned input_uret = input_ret;
mbedtls_mpi X, Y;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y );
TEST_ASSERT( mbedtls_mpi_read_string( &X, 16, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, 16, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_grow( &X, size_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_grow( &Y, size_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_lt_mpi_ct( &X, &Y, &ret ) == input_err );
if( input_err == 0 )
TEST_ASSERT( ret == input_uret );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y );
}
void test_mbedtls_mpi_lt_mpi_ct_wrapper( void ** params )
{
test_mbedtls_mpi_lt_mpi_ct( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ), *( (int *) params[5] ) );
}
void test_mbedtls_mpi_cmp_abs( int radix_X, char * input_X, int radix_Y,
char * input_Y, int input_A )
{
mbedtls_mpi X, Y;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, radix_Y, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_abs( &X, &Y ) == input_A );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y );
}
void test_mbedtls_mpi_cmp_abs_wrapper( void ** params )
{
test_mbedtls_mpi_cmp_abs( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ) );
}
void test_mbedtls_mpi_copy_sint( int input_X, int input_Y )
{
mbedtls_mpi X, Y;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y );
TEST_ASSERT( mbedtls_mpi_lset( &X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_lset( &Y, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_copy( &Y, &X ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_int( &X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_int( &Y, input_X ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y );
}
void test_mbedtls_mpi_copy_sint_wrapper( void ** params )
{
test_mbedtls_mpi_copy_sint( *( (int *) params[0] ), *( (int *) params[1] ) );
}
void test_mbedtls_mpi_copy_binary( data_t *input_X, data_t *input_Y )
{
mbedtls_mpi X, Y, X0;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &X0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &X, input_X->x, input_X->len ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &Y, input_Y->x, input_Y->len ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &X0, input_X->x, input_X->len ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &X0 ) == 0 );
TEST_ASSERT( mbedtls_mpi_copy( &Y, &X ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &X0 ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Y, &X0 ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &X0 );
}
void test_mbedtls_mpi_copy_binary_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_mbedtls_mpi_copy_binary( &data0, &data2 );
}
void test_mpi_copy_self( int input_X )
{
mbedtls_mpi X;
mbedtls_mpi_init( &X );
TEST_ASSERT( mbedtls_mpi_lset( &X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_copy( &X, &X ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_int( &X, input_X ) == 0 );
exit:
mbedtls_mpi_free( &X );
}
void test_mpi_copy_self_wrapper( void ** params )
{
test_mpi_copy_self( *( (int *) params[0] ) );
}
void test_mbedtls_mpi_shrink( int before, int used, int min, int after )
{
mbedtls_mpi X;
mbedtls_mpi_init( &X );
TEST_ASSERT( mbedtls_mpi_grow( &X, before ) == 0 );
TEST_ASSERT( used <= before );
memset( X.p, 0x2a, used * sizeof( mbedtls_mpi_uint ) );
TEST_ASSERT( mbedtls_mpi_shrink( &X, min ) == 0 );
TEST_ASSERT( X.n == (size_t) after );
exit:
mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_shrink_wrapper( void ** params )
{
test_mbedtls_mpi_shrink( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ) );
}
void test_mbedtls_mpi_safe_cond_assign( int x_sign, char * x_str, int y_sign,
char * y_str )
{
mbedtls_mpi X, Y, XX;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &XX );
TEST_ASSERT( mbedtls_mpi_read_string( &X, 16, x_str ) == 0 );
X.s = x_sign;
TEST_ASSERT( mbedtls_mpi_read_string( &Y, 16, y_str ) == 0 );
Y.s = y_sign;
TEST_ASSERT( mbedtls_mpi_copy( &XX, &X ) == 0 );
TEST_ASSERT( mbedtls_mpi_safe_cond_assign( &X, &Y, 0 ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &XX ) == 0 );
TEST_ASSERT( mbedtls_mpi_safe_cond_assign( &X, &Y, 1 ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &Y ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &XX );
}
void test_mbedtls_mpi_safe_cond_assign_wrapper( void ** params )
{
test_mbedtls_mpi_safe_cond_assign( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3] );
}
void test_mbedtls_mpi_safe_cond_swap( int x_sign, char * x_str, int y_sign,
char * y_str )
{
mbedtls_mpi X, Y, XX, YY;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y );
mbedtls_mpi_init( &XX ); mbedtls_mpi_init( &YY );
TEST_ASSERT( mbedtls_mpi_read_string( &X, 16, x_str ) == 0 );
X.s = x_sign;
TEST_ASSERT( mbedtls_mpi_read_string( &Y, 16, y_str ) == 0 );
Y.s = y_sign;
TEST_ASSERT( mbedtls_mpi_copy( &XX, &X ) == 0 );
TEST_ASSERT( mbedtls_mpi_copy( &YY, &Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_safe_cond_swap( &X, &Y, 0 ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &XX ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Y, &YY ) == 0 );
TEST_ASSERT( mbedtls_mpi_safe_cond_swap( &X, &Y, 1 ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Y, &XX ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &YY ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y );
mbedtls_mpi_free( &XX ); mbedtls_mpi_free( &YY );
}
void test_mbedtls_mpi_safe_cond_swap_wrapper( void ** params )
{
test_mbedtls_mpi_safe_cond_swap( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3] );
}
void test_mbedtls_mpi_swap_sint( int input_X, int input_Y )
{
mbedtls_mpi X, Y;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y );
TEST_ASSERT( mbedtls_mpi_lset( &X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_lset( &Y, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_int( &X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_int( &Y, input_Y ) == 0 );
mbedtls_mpi_swap( &X, &Y );
TEST_ASSERT( mbedtls_mpi_cmp_int( &X, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_int( &Y, input_X ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y );
}
void test_mbedtls_mpi_swap_sint_wrapper( void ** params )
{
test_mbedtls_mpi_swap_sint( *( (int *) params[0] ), *( (int *) params[1] ) );
}
void test_mbedtls_mpi_swap_binary( data_t *input_X, data_t *input_Y )
{
mbedtls_mpi X, Y, X0, Y0;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y );
mbedtls_mpi_init( &X0 ); mbedtls_mpi_init( &Y0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &X, input_X->x, input_X->len ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &Y, input_Y->x, input_Y->len ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &X0, input_X->x, input_X->len ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &Y0, input_Y->x, input_Y->len ) == 0 );
mbedtls_mpi_swap( &X, &Y );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &Y0 ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Y, &X0 ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y );
mbedtls_mpi_free( &X0 ); mbedtls_mpi_free( &Y0 );
}
void test_mbedtls_mpi_swap_binary_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_mbedtls_mpi_swap_binary( &data0, &data2 );
}
void test_mpi_swap_self( data_t *input_X )
{
mbedtls_mpi X, X0;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &X0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &X, input_X->x, input_X->len ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &X0, input_X->x, input_X->len ) == 0 );
mbedtls_mpi_swap( &X, &X );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &X0 ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &X0 );
}
void test_mpi_swap_self_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_mpi_swap_self( &data0 );
}
void test_mbedtls_mpi_add_mpi( int radix_X, char * input_X, int radix_Y,
char * input_Y, int radix_A, char * input_A )
{
mbedtls_mpi X, Y, Z, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &A );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, radix_Y, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
TEST_ASSERT( mbedtls_mpi_add_mpi( &Z, &X, &Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Z, &A ) == 0 );
/* result == first operand */
TEST_ASSERT( mbedtls_mpi_add_mpi( &X, &X, &Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &A ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
/* result == second operand */
TEST_ASSERT( mbedtls_mpi_add_mpi( &Y, &X, &Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Y, &A ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &Z ); mbedtls_mpi_free( &A );
}
void test_mbedtls_mpi_add_mpi_wrapper( void ** params )
{
test_mbedtls_mpi_add_mpi( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ), (char *) params[5] );
}
void test_mbedtls_mpi_add_mpi_inplace( int radix_X, char * input_X, int radix_A,
char * input_A )
{
mbedtls_mpi X, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &A );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_sub_abs( &X, &X, &X ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_int( &X, 0 ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_add_abs( &X, &X, &X ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &A ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_add_mpi( &X, &X, &X ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &A ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &A );
}
void test_mbedtls_mpi_add_mpi_inplace_wrapper( void ** params )
{
test_mbedtls_mpi_add_mpi_inplace( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3] );
}
void test_mbedtls_mpi_add_abs( int radix_X, char * input_X, int radix_Y,
char * input_Y, int radix_A, char * input_A )
{
mbedtls_mpi X, Y, Z, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &A );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, radix_Y, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
TEST_ASSERT( mbedtls_mpi_add_abs( &Z, &X, &Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Z, &A ) == 0 );
/* result == first operand */
TEST_ASSERT( mbedtls_mpi_add_abs( &X, &X, &Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &A ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
/* result == second operand */
TEST_ASSERT( mbedtls_mpi_add_abs( &Y, &X, &Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Y, &A ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &Z ); mbedtls_mpi_free( &A );
}
void test_mbedtls_mpi_add_abs_wrapper( void ** params )
{
test_mbedtls_mpi_add_abs( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ), (char *) params[5] );
}
void test_mbedtls_mpi_add_int( int radix_X, char * input_X, int input_Y,
int radix_A, char * input_A )
{
mbedtls_mpi X, Z, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &A );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
TEST_ASSERT( mbedtls_mpi_add_int( &Z, &X, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Z, &A ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Z ); mbedtls_mpi_free( &A );
}
void test_mbedtls_mpi_add_int_wrapper( void ** params )
{
test_mbedtls_mpi_add_int( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), (char *) params[4] );
}
void test_mbedtls_mpi_sub_mpi( int radix_X, char * input_X, int radix_Y,
char * input_Y, int radix_A, char * input_A )
{
mbedtls_mpi X, Y, Z, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &A );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, radix_Y, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
TEST_ASSERT( mbedtls_mpi_sub_mpi( &Z, &X, &Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Z, &A ) == 0 );
/* result == first operand */
TEST_ASSERT( mbedtls_mpi_sub_mpi( &X, &X, &Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &A ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
/* result == second operand */
TEST_ASSERT( mbedtls_mpi_sub_mpi( &Y, &X, &Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Y, &A ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &Z ); mbedtls_mpi_free( &A );
}
void test_mbedtls_mpi_sub_mpi_wrapper( void ** params )
{
test_mbedtls_mpi_sub_mpi( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ), (char *) params[5] );
}
void test_mbedtls_mpi_sub_abs( int radix_X, char * input_X, int radix_Y,
char * input_Y, int radix_A, char * input_A,
int sub_result )
{
mbedtls_mpi X, Y, Z, A;
int res;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &A );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, radix_Y, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
res = mbedtls_mpi_sub_abs( &Z, &X, &Y );
TEST_ASSERT( res == sub_result );
if( res == 0 )
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Z, &A ) == 0 );
/* result == first operand */
TEST_ASSERT( mbedtls_mpi_sub_abs( &X, &X, &Y ) == sub_result );
if( sub_result == 0 )
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &A ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
/* result == second operand */
TEST_ASSERT( mbedtls_mpi_sub_abs( &Y, &X, &Y ) == sub_result );
if( sub_result == 0 )
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Y, &A ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &Z ); mbedtls_mpi_free( &A );
}
void test_mbedtls_mpi_sub_abs_wrapper( void ** params )
{
test_mbedtls_mpi_sub_abs( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ), (char *) params[5], *( (int *) params[6] ) );
}
void test_mbedtls_mpi_sub_int( int radix_X, char * input_X, int input_Y,
int radix_A, char * input_A )
{
mbedtls_mpi X, Z, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &A );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
TEST_ASSERT( mbedtls_mpi_sub_int( &Z, &X, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Z, &A ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Z ); mbedtls_mpi_free( &A );
}
void test_mbedtls_mpi_sub_int_wrapper( void ** params )
{
test_mbedtls_mpi_sub_int( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), (char *) params[4] );
}
void test_mbedtls_mpi_mul_mpi( int radix_X, char * input_X, int radix_Y,
char * input_Y, int radix_A, char * input_A )
{
mbedtls_mpi X, Y, Z, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &A );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, radix_Y, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
TEST_ASSERT( mbedtls_mpi_mul_mpi( &Z, &X, &Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Z, &A ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &Z ); mbedtls_mpi_free( &A );
}
void test_mbedtls_mpi_mul_mpi_wrapper( void ** params )
{
test_mbedtls_mpi_mul_mpi( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ), (char *) params[5] );
}
void test_mbedtls_mpi_mul_int( int radix_X, char * input_X, int input_Y,
int radix_A, char * input_A,
char * result_comparison )
{
mbedtls_mpi X, Z, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &A );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
TEST_ASSERT( mbedtls_mpi_mul_int( &Z, &X, input_Y ) == 0 );
if( strcmp( result_comparison, "==" ) == 0 )
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Z, &A ) == 0 );
else if( strcmp( result_comparison, "!=" ) == 0 )
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Z, &A ) != 0 );
else
TEST_ASSERT( "unknown operator" == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Z ); mbedtls_mpi_free( &A );
}
void test_mbedtls_mpi_mul_int_wrapper( void ** params )
{
test_mbedtls_mpi_mul_int( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), (char *) params[4], (char *) params[5] );
}
void test_mbedtls_mpi_div_mpi( int radix_X, char * input_X, int radix_Y,
char * input_Y, int radix_A, char * input_A,
int radix_B, char * input_B, int div_result )
{
mbedtls_mpi X, Y, Q, R, A, B;
int res;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &R );
mbedtls_mpi_init( &A ); mbedtls_mpi_init( &B );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, radix_Y, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &B, radix_B, input_B ) == 0 );
res = mbedtls_mpi_div_mpi( &Q, &R, &X, &Y );
TEST_ASSERT( res == div_result );
if( res == 0 )
{
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Q, &A ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R, &B ) == 0 );
}
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &Q ); mbedtls_mpi_free( &R );
mbedtls_mpi_free( &A ); mbedtls_mpi_free( &B );
}
void test_mbedtls_mpi_div_mpi_wrapper( void ** params )
{
test_mbedtls_mpi_div_mpi( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ), (char *) params[5], *( (int *) params[6] ), (char *) params[7], *( (int *) params[8] ) );
}
void test_mbedtls_mpi_div_int( int radix_X, char * input_X, int input_Y,
int radix_A, char * input_A, int radix_B,
char * input_B, int div_result )
{
mbedtls_mpi X, Q, R, A, B;
int res;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &R ); mbedtls_mpi_init( &A );
mbedtls_mpi_init( &B );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &B, radix_B, input_B ) == 0 );
res = mbedtls_mpi_div_int( &Q, &R, &X, input_Y );
TEST_ASSERT( res == div_result );
if( res == 0 )
{
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Q, &A ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R, &B ) == 0 );
}
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Q ); mbedtls_mpi_free( &R ); mbedtls_mpi_free( &A );
mbedtls_mpi_free( &B );
}
void test_mbedtls_mpi_div_int_wrapper( void ** params )
{
test_mbedtls_mpi_div_int( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), (char *) params[4], *( (int *) params[5] ), (char *) params[6], *( (int *) params[7] ) );
}
void test_mbedtls_mpi_mod_mpi( int radix_X, char * input_X, int radix_Y,
char * input_Y, int radix_A, char * input_A,
int div_result )
{
mbedtls_mpi X, Y, A;
int res;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &A );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, radix_Y, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
res = mbedtls_mpi_mod_mpi( &X, &X, &Y );
TEST_ASSERT( res == div_result );
if( res == 0 )
{
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &A ) == 0 );
}
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &A );
}
void test_mbedtls_mpi_mod_mpi_wrapper( void ** params )
{
test_mbedtls_mpi_mod_mpi( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ), (char *) params[5], *( (int *) params[6] ) );
}
void test_mbedtls_mpi_mod_int( int radix_X, char * input_X, int input_Y,
int input_A, int div_result )
{
mbedtls_mpi X;
int res;
mbedtls_mpi_uint r;
mbedtls_mpi_init( &X );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
res = mbedtls_mpi_mod_int( &r, &X, input_Y );
TEST_ASSERT( res == div_result );
if( res == 0 )
{
TEST_ASSERT( r == (mbedtls_mpi_uint) input_A );
}
exit:
mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_mod_int_wrapper( void ** params )
{
test_mbedtls_mpi_mod_int( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_mbedtls_mpi_exp_mod( int radix_A, char * input_A, int radix_E,
char * input_E, int radix_N, char * input_N,
int radix_RR, char * input_RR, int radix_X,
char * input_X, int div_result )
{
mbedtls_mpi A, E, N, RR, Z, X;
int res;
mbedtls_mpi_init( &A ); mbedtls_mpi_init( &E ); mbedtls_mpi_init( &N );
mbedtls_mpi_init( &RR ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &X );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &E, radix_E, input_E ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &N, radix_N, input_N ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
if( strlen( input_RR ) )
TEST_ASSERT( mbedtls_mpi_read_string( &RR, radix_RR, input_RR ) == 0 );
res = mbedtls_mpi_exp_mod( &Z, &A, &E, &N, &RR );
TEST_ASSERT( res == div_result );
if( res == 0 )
{
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Z, &X ) == 0 );
}
exit:
mbedtls_mpi_free( &A ); mbedtls_mpi_free( &E ); mbedtls_mpi_free( &N );
mbedtls_mpi_free( &RR ); mbedtls_mpi_free( &Z ); mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_exp_mod_wrapper( void ** params )
{
test_mbedtls_mpi_exp_mod( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ), (char *) params[5], *( (int *) params[6] ), (char *) params[7], *( (int *) params[8] ), (char *) params[9], *( (int *) params[10] ) );
}
void test_mbedtls_mpi_exp_mod_size( int A_bytes, int E_bytes, int N_bytes,
int radix_RR, char * input_RR, int exp_result )
{
mbedtls_mpi A, E, N, RR, Z;
mbedtls_mpi_init( &A ); mbedtls_mpi_init( &E ); mbedtls_mpi_init( &N );
mbedtls_mpi_init( &RR ); mbedtls_mpi_init( &Z );
/* Set A to 2^(A_bytes - 1) + 1 */
TEST_ASSERT( mbedtls_mpi_lset( &A, 1 ) == 0 );
TEST_ASSERT( mbedtls_mpi_shift_l( &A, ( A_bytes * 8 ) - 1 ) == 0 );
TEST_ASSERT( mbedtls_mpi_set_bit( &A, 0, 1 ) == 0 );
/* Set E to 2^(E_bytes - 1) + 1 */
TEST_ASSERT( mbedtls_mpi_lset( &E, 1 ) == 0 );
TEST_ASSERT( mbedtls_mpi_shift_l( &E, ( E_bytes * 8 ) - 1 ) == 0 );
TEST_ASSERT( mbedtls_mpi_set_bit( &E, 0, 1 ) == 0 );
/* Set N to 2^(N_bytes - 1) + 1 */
TEST_ASSERT( mbedtls_mpi_lset( &N, 1 ) == 0 );
TEST_ASSERT( mbedtls_mpi_shift_l( &N, ( N_bytes * 8 ) - 1 ) == 0 );
TEST_ASSERT( mbedtls_mpi_set_bit( &N, 0, 1 ) == 0 );
if( strlen( input_RR ) )
TEST_ASSERT( mbedtls_mpi_read_string( &RR, radix_RR, input_RR ) == 0 );
TEST_ASSERT( mbedtls_mpi_exp_mod( &Z, &A, &E, &N, &RR ) == exp_result );
exit:
mbedtls_mpi_free( &A ); mbedtls_mpi_free( &E ); mbedtls_mpi_free( &N );
mbedtls_mpi_free( &RR ); mbedtls_mpi_free( &Z );
}
void test_mbedtls_mpi_exp_mod_size_wrapper( void ** params )
{
test_mbedtls_mpi_exp_mod_size( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), (char *) params[4], *( (int *) params[5] ) );
}
void test_mbedtls_mpi_inv_mod( int radix_X, char * input_X, int radix_Y,
char * input_Y, int radix_A, char * input_A,
int div_result )
{
mbedtls_mpi X, Y, Z, A;
int res;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z ); mbedtls_mpi_init( &A );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, radix_Y, input_Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
res = mbedtls_mpi_inv_mod( &Z, &X, &Y );
TEST_ASSERT( res == div_result );
if( res == 0 )
{
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &Z, &A ) == 0 );
}
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &Z ); mbedtls_mpi_free( &A );
}
void test_mbedtls_mpi_inv_mod_wrapper( void ** params )
{
test_mbedtls_mpi_inv_mod( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ), (char *) params[5], *( (int *) params[6] ) );
}
#if defined(MBEDTLS_GENPRIME)
void test_mbedtls_mpi_is_prime( int radix_X, char * input_X, int div_result )
{
mbedtls_mpi X;
int res;
mbedtls_mpi_init( &X );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
res = mbedtls_mpi_is_prime_ext( &X, 40, mbedtls_test_rnd_std_rand, NULL );
TEST_ASSERT( res == div_result );
exit:
mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_is_prime_wrapper( void ** params )
{
test_mbedtls_mpi_is_prime( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ) );
}
#endif /* MBEDTLS_GENPRIME */
#if defined(MBEDTLS_GENPRIME)
void test_mbedtls_mpi_is_prime_det( data_t * input_X, data_t * witnesses,
int chunk_len, int rounds )
{
mbedtls_mpi X;
int res;
mbedtls_test_mpi_random rand;
mbedtls_mpi_init( &X );
rand.data = witnesses;
rand.pos = 0;
rand.chunk_len = chunk_len;
TEST_ASSERT( mbedtls_mpi_read_binary( &X, input_X->x, input_X->len ) == 0 );
res = mbedtls_mpi_is_prime_ext( &X, rounds - 1,
mbedtls_test_mpi_miller_rabin_determinizer,
&rand );
TEST_ASSERT( res == 0 );
rand.data = witnesses;
rand.pos = 0;
rand.chunk_len = chunk_len;
res = mbedtls_mpi_is_prime_ext( &X, rounds,
mbedtls_test_mpi_miller_rabin_determinizer,
&rand );
TEST_ASSERT( res == MBEDTLS_ERR_MPI_NOT_ACCEPTABLE );
exit:
mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_is_prime_det_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_mbedtls_mpi_is_prime_det( &data0, &data2, *( (int *) params[4] ), *( (int *) params[5] ) );
}
#endif /* MBEDTLS_GENPRIME */
#if defined(MBEDTLS_GENPRIME)
void test_mbedtls_mpi_gen_prime( int bits, int flags, int ref_ret )
{
mbedtls_mpi X;
int my_ret;
mbedtls_mpi_init( &X );
my_ret = mbedtls_mpi_gen_prime( &X, bits, flags,
mbedtls_test_rnd_std_rand, NULL );
TEST_ASSERT( my_ret == ref_ret );
if( ref_ret == 0 )
{
size_t actual_bits = mbedtls_mpi_bitlen( &X );
TEST_ASSERT( actual_bits >= (size_t) bits );
TEST_ASSERT( actual_bits <= (size_t) bits + 1 );
TEST_ASSERT( mbedtls_mpi_is_prime_ext( &X, 40,
mbedtls_test_rnd_std_rand,
NULL ) == 0 );
if( flags & MBEDTLS_MPI_GEN_PRIME_FLAG_DH )
{
/* X = ( X - 1 ) / 2 */
TEST_ASSERT( mbedtls_mpi_shift_r( &X, 1 ) == 0 );
TEST_ASSERT( mbedtls_mpi_is_prime_ext( &X, 40,
mbedtls_test_rnd_std_rand,
NULL ) == 0 );
}
}
exit:
mbedtls_mpi_free( &X );
}
void test_mbedtls_mpi_gen_prime_wrapper( void ** params )
{
test_mbedtls_mpi_gen_prime( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
#endif /* MBEDTLS_GENPRIME */
void test_mbedtls_mpi_shift_l( int radix_X, char * input_X, int shift_X,
int radix_A, char * input_A )
{
mbedtls_mpi X, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &A );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
TEST_ASSERT( mbedtls_mpi_shift_l( &X, shift_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &A ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &A );
}
void test_mbedtls_mpi_shift_l_wrapper( void ** params )
{
test_mbedtls_mpi_shift_l( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), (char *) params[4] );
}
void test_mbedtls_mpi_shift_r( int radix_X, char * input_X, int shift_X,
int radix_A, char * input_A )
{
mbedtls_mpi X, A;
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &A );
TEST_ASSERT( mbedtls_mpi_read_string( &X, radix_X, input_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &A, radix_A, input_A ) == 0 );
TEST_ASSERT( mbedtls_mpi_shift_r( &X, shift_X ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &X, &A ) == 0 );
exit:
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &A );
}
void test_mbedtls_mpi_shift_r_wrapper( void ** params )
{
test_mbedtls_mpi_shift_r( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), (char *) params[4] );
}
void test_mpi_fill_random( int wanted_bytes, int rng_bytes, int expected_ret )
{
mbedtls_mpi X;
int ret;
size_t bytes_left = rng_bytes;
mbedtls_mpi_init( &X );
ret = mbedtls_mpi_fill_random( &X, wanted_bytes,
f_rng_bytes_left, &bytes_left );
TEST_ASSERT( ret == expected_ret );
if( expected_ret == 0 )
{
/* mbedtls_mpi_fill_random is documented to use bytes from the RNG
* as a big-endian representation of the number. We know when
* our RNG function returns null bytes, so we know how many
* leading zero bytes the number has. */
size_t leading_zeros = 0;
if( wanted_bytes > 0 && rng_bytes % 256 == 0 )
leading_zeros = 1;
TEST_ASSERT( mbedtls_mpi_size( &X ) + leading_zeros ==
(size_t) wanted_bytes );
TEST_ASSERT( (int) bytes_left == rng_bytes - wanted_bytes );
}
exit:
mbedtls_mpi_free( &X );
}
void test_mpi_fill_random_wrapper( void ** params )
{
test_mpi_fill_random( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
#if defined(MBEDTLS_SELF_TEST)
void test_mpi_selftest( )
{
TEST_ASSERT( mbedtls_mpi_self_test( 1 ) == 0 );
exit:
;
}
void test_mpi_selftest_wrapper( void ** params )
{
(void)params;
test_mpi_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_BIGNUM_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_BIGNUM_C)
case 0:
{
*out_value = MBEDTLS_ERR_MPI_INVALID_CHARACTER;
}
break;
case 1:
{
*out_value = MBEDTLS_ERR_MPI_BAD_INPUT_DATA;
}
break;
case 2:
{
*out_value = MBEDTLS_ERR_MPI_BUFFER_TOO_SMALL;
}
break;
case 3:
{
*out_value = MBEDTLS_ERR_MPI_FILE_IO_ERROR;
}
break;
case 4:
{
*out_value = -1;
}
break;
case 5:
{
*out_value = -2;
}
break;
case 6:
{
*out_value = -3;
}
break;
case 7:
{
*out_value = -1500;
}
break;
case 8:
{
*out_value = -42;
}
break;
case 9:
{
*out_value = +1;
}
break;
case 10:
{
*out_value = -9871232;
}
break;
case 11:
{
*out_value = MBEDTLS_ERR_MPI_NEGATIVE_VALUE;
}
break;
case 12:
{
*out_value = MBEDTLS_ERR_MPI_DIVISION_BY_ZERO;
}
break;
case 13:
{
*out_value = -13;
}
break;
case 14:
{
*out_value = -34;
}
break;
case 15:
{
*out_value = MBEDTLS_MPI_MAX_SIZE;
}
break;
case 16:
{
*out_value = MBEDTLS_MPI_MAX_SIZE + 1;
}
break;
case 17:
{
*out_value = MBEDTLS_ERR_MPI_NOT_ACCEPTABLE;
}
break;
case 18:
{
*out_value = MBEDTLS_MPI_GEN_PRIME_FLAG_DH;
}
break;
case 19:
{
*out_value = MBEDTLS_MPI_GEN_PRIME_FLAG_DH | MBEDTLS_MPI_GEN_PRIME_FLAG_LOW_ERR;
}
break;
case 20:
{
*out_value = MBEDTLS_MPI_GEN_PRIME_FLAG_LOW_ERR;
}
break;
case 21:
{
*out_value = MBEDTLS_MPI_MAX_SIZE - 7;
}
break;
case 22:
{
*out_value = MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
}
break;
case 23:
{
*out_value = MBEDTLS_MPI_MAX_SIZE-1;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_BIGNUM_C)
case 0:
{
#if defined(MPI_MAX_BITS_LARGER_THAN_792)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_GENPRIME)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_SELF_TEST)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_BIGNUM_C)
test_mpi_valid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_mpi_invalid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_BIGNUM_C)
test_mpi_null_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_BIGNUM_C)
test_mpi_read_write_string_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_read_binary_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_read_binary_le_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_write_binary_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_write_binary_le_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO)
test_mbedtls_mpi_read_file_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO)
test_mbedtls_mpi_write_file_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_get_bit_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_set_bit_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_lsb_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_bitlen_wrapper,
#else
NULL,
#endif
/* Function Id: 14 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_gcd_wrapper,
#else
NULL,
#endif
/* Function Id: 15 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_cmp_int_wrapper,
#else
NULL,
#endif
/* Function Id: 16 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_cmp_mpi_wrapper,
#else
NULL,
#endif
/* Function Id: 17 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_lt_mpi_ct_wrapper,
#else
NULL,
#endif
/* Function Id: 18 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_cmp_abs_wrapper,
#else
NULL,
#endif
/* Function Id: 19 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_copy_sint_wrapper,
#else
NULL,
#endif
/* Function Id: 20 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_copy_binary_wrapper,
#else
NULL,
#endif
/* Function Id: 21 */
#if defined(MBEDTLS_BIGNUM_C)
test_mpi_copy_self_wrapper,
#else
NULL,
#endif
/* Function Id: 22 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_shrink_wrapper,
#else
NULL,
#endif
/* Function Id: 23 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_safe_cond_assign_wrapper,
#else
NULL,
#endif
/* Function Id: 24 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_safe_cond_swap_wrapper,
#else
NULL,
#endif
/* Function Id: 25 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_swap_sint_wrapper,
#else
NULL,
#endif
/* Function Id: 26 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_swap_binary_wrapper,
#else
NULL,
#endif
/* Function Id: 27 */
#if defined(MBEDTLS_BIGNUM_C)
test_mpi_swap_self_wrapper,
#else
NULL,
#endif
/* Function Id: 28 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_add_mpi_wrapper,
#else
NULL,
#endif
/* Function Id: 29 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_add_mpi_inplace_wrapper,
#else
NULL,
#endif
/* Function Id: 30 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_add_abs_wrapper,
#else
NULL,
#endif
/* Function Id: 31 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_add_int_wrapper,
#else
NULL,
#endif
/* Function Id: 32 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_sub_mpi_wrapper,
#else
NULL,
#endif
/* Function Id: 33 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_sub_abs_wrapper,
#else
NULL,
#endif
/* Function Id: 34 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_sub_int_wrapper,
#else
NULL,
#endif
/* Function Id: 35 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_mul_mpi_wrapper,
#else
NULL,
#endif
/* Function Id: 36 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_mul_int_wrapper,
#else
NULL,
#endif
/* Function Id: 37 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_div_mpi_wrapper,
#else
NULL,
#endif
/* Function Id: 38 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_div_int_wrapper,
#else
NULL,
#endif
/* Function Id: 39 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_mod_mpi_wrapper,
#else
NULL,
#endif
/* Function Id: 40 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_mod_int_wrapper,
#else
NULL,
#endif
/* Function Id: 41 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_exp_mod_wrapper,
#else
NULL,
#endif
/* Function Id: 42 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_exp_mod_size_wrapper,
#else
NULL,
#endif
/* Function Id: 43 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_inv_mod_wrapper,
#else
NULL,
#endif
/* Function Id: 44 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_GENPRIME)
test_mbedtls_mpi_is_prime_wrapper,
#else
NULL,
#endif
/* Function Id: 45 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_GENPRIME)
test_mbedtls_mpi_is_prime_det_wrapper,
#else
NULL,
#endif
/* Function Id: 46 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_GENPRIME)
test_mbedtls_mpi_gen_prime_wrapper,
#else
NULL,
#endif
/* Function Id: 47 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_shift_l_wrapper,
#else
NULL,
#endif
/* Function Id: 48 */
#if defined(MBEDTLS_BIGNUM_C)
test_mbedtls_mpi_shift_r_wrapper,
#else
NULL,
#endif
/* Function Id: 49 */
#if defined(MBEDTLS_BIGNUM_C)
test_mpi_fill_random_wrapper,
#else
NULL,
#endif
/* Function Id: 50 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_SELF_TEST)
test_mpi_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_mpi.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 74,763 | 2,345 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_hmac_drbg.no_reseed.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_hmac_drbg.no_reseed.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_hmac_drbg.function
* Test suite data : suites/test_suite_hmac_drbg.no_reseed.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_HMAC_DRBG_C)
#include "third_party/mbedtls/hmac_drbg.h"
typedef struct
{
unsigned char *p;
size_t len;
} entropy_ctx;
static int mbedtls_test_entropy_func( void *data, unsigned char *buf, size_t len )
{
entropy_ctx *ctx = (entropy_ctx *) data;
if( len > ctx->len )
return( -1 );
memcpy( buf, ctx->p, len );
ctx->p += len;
ctx->len -= len;
return( 0 );
}
void test_hmac_drbg_entropy_usage( int md_alg )
{
unsigned char out[16];
unsigned char buf[1024];
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
entropy_ctx entropy;
size_t i, reps = 10;
size_t default_entropy_len;
size_t expected_consumed_entropy = 0;
mbedtls_hmac_drbg_init( &ctx );
memset( buf, 0, sizeof( buf ) );
memset( out, 0, sizeof( out ) );
entropy.len = sizeof( buf );
entropy.p = buf;
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
if( mbedtls_md_get_size( md_info ) <= 20 )
default_entropy_len = 16;
else if( mbedtls_md_get_size( md_info ) <= 28 )
default_entropy_len = 24;
else
default_entropy_len = 32;
/* Set reseed interval before seed */
mbedtls_hmac_drbg_set_reseed_interval( &ctx, 2 * reps );
/* Init must use entropy */
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info, mbedtls_test_entropy_func, &entropy,
NULL, 0 ) == 0 );
/* default_entropy_len of entropy, plus half as much for the nonce */
expected_consumed_entropy += default_entropy_len * 3 / 2;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* By default, PR is off, and reseed interval was set to
* 2 * reps so the next few calls should not use entropy */
for( i = 0; i < reps; i++ )
{
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) - 4 ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, out, sizeof( out ) - 4,
buf, 16 ) == 0 );
}
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* While at it, make sure we didn't write past the requested length */
TEST_ASSERT( out[sizeof( out ) - 4] == 0 );
TEST_ASSERT( out[sizeof( out ) - 3] == 0 );
TEST_ASSERT( out[sizeof( out ) - 2] == 0 );
TEST_ASSERT( out[sizeof( out ) - 1] == 0 );
/* There have been 2 * reps calls to random. The next call should reseed */
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_consumed_entropy += default_entropy_len;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* Set reseed interval after seed */
mbedtls_hmac_drbg_set_reseed_interval( &ctx, 4 * reps + 1);
/* The new few calls should not reseed */
for( i = 0; i < (2 * reps); i++ )
{
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, out, sizeof( out ) ,
buf, 16 ) == 0 );
}
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* Now enable PR, so the next few calls should all reseed */
mbedtls_hmac_drbg_set_prediction_resistance( &ctx, MBEDTLS_HMAC_DRBG_PR_ON );
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_consumed_entropy += default_entropy_len;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* Finally, check setting entropy_len */
mbedtls_hmac_drbg_set_entropy_len( &ctx, 42 );
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_consumed_entropy += 42;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
mbedtls_hmac_drbg_set_entropy_len( &ctx, 13 );
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_consumed_entropy += 13;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_entropy_usage_wrapper( void ** params )
{
test_hmac_drbg_entropy_usage( *( (int *) params[0] ) );
}
#if defined(MBEDTLS_FS_IO)
void test_hmac_drbg_seed_file( int md_alg, char * path, int ret )
{
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
mbedtls_hmac_drbg_init( &ctx );
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info,
mbedtls_test_rnd_std_rand, NULL,
NULL, 0 ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_write_seed_file( &ctx, path ) == ret );
TEST_ASSERT( mbedtls_hmac_drbg_update_seed_file( &ctx, path ) == ret );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_seed_file_wrapper( void ** params )
{
test_hmac_drbg_seed_file( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ) );
}
#endif /* MBEDTLS_FS_IO */
void test_hmac_drbg_buf( int md_alg )
{
unsigned char out[16];
unsigned char buf[100];
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
size_t i;
mbedtls_hmac_drbg_init( &ctx );
memset( buf, 0, sizeof( buf ) );
memset( out, 0, sizeof( out ) );
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT( mbedtls_hmac_drbg_seed_buf( &ctx, md_info, buf, sizeof( buf ) ) == 0 );
/* Make sure it never tries to reseed (would segfault otherwise) */
mbedtls_hmac_drbg_set_reseed_interval( &ctx, 3 );
mbedtls_hmac_drbg_set_prediction_resistance( &ctx, MBEDTLS_HMAC_DRBG_PR_ON );
for( i = 0; i < 30; i++ )
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_buf_wrapper( void ** params )
{
test_hmac_drbg_buf( *( (int *) params[0] ) );
}
void test_hmac_drbg_no_reseed( int md_alg, data_t * entropy,
data_t * custom, data_t * add1,
data_t * add2, data_t * output )
{
unsigned char data[1024];
unsigned char my_output[512];
entropy_ctx p_entropy;
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
mbedtls_hmac_drbg_init( &ctx );
p_entropy.p = entropy->x;
p_entropy.len = entropy->len;
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
/* Test the simplified buffer-based variant */
memcpy( data, entropy->x, p_entropy.len );
memcpy( data + p_entropy.len, custom->x, custom->len );
TEST_ASSERT( mbedtls_hmac_drbg_seed_buf( &ctx, md_info,
data, p_entropy.len + custom->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add1->x, add1->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add2->x, add2->len ) == 0 );
/* Reset context for second run */
mbedtls_hmac_drbg_free( &ctx );
TEST_ASSERT( memcmp( my_output, output->x, output->len ) == 0 );
/* And now the normal entropy-based variant */
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info, mbedtls_test_entropy_func, &p_entropy,
custom->x, custom->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add1->x, add1->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add2->x, add2->len ) == 0 );
TEST_ASSERT( memcmp( my_output, output->x, output->len ) == 0 );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_no_reseed_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
test_hmac_drbg_no_reseed( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9 );
}
void test_hmac_drbg_nopr( int md_alg, data_t * entropy, data_t * custom,
data_t * add1, data_t * add2, data_t * add3,
data_t * output )
{
unsigned char my_output[512];
entropy_ctx p_entropy;
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
mbedtls_hmac_drbg_init( &ctx );
p_entropy.p = entropy->x;
p_entropy.len = entropy->len;
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info, mbedtls_test_entropy_func, &p_entropy,
custom->x, custom->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_reseed( &ctx, add1->x, add1->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add2->x, add2->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add3->x, add3->len ) == 0 );
TEST_ASSERT( memcmp( my_output, output->x, output->len ) == 0 );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_nopr_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data11 = {(uint8_t *) params[11], *( (uint32_t *) params[12] )};
test_hmac_drbg_nopr( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, &data11 );
}
void test_hmac_drbg_pr( int md_alg, data_t * entropy, data_t * custom,
data_t * add1, data_t * add2, data_t * output )
{
unsigned char my_output[512];
entropy_ctx p_entropy;
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
mbedtls_hmac_drbg_init( &ctx );
p_entropy.p = entropy->x;
p_entropy.len = entropy->len;
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info, mbedtls_test_entropy_func, &p_entropy,
custom->x, custom->len ) == 0 );
mbedtls_hmac_drbg_set_prediction_resistance( &ctx, MBEDTLS_HMAC_DRBG_PR_ON );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add1->x, add1->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add2->x, add2->len ) == 0 );
TEST_ASSERT( memcmp( my_output, output->x, output->len ) == 0 );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_pr_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
test_hmac_drbg_pr( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9 );
}
#if defined(MBEDTLS_SELF_TEST)
void test_hmac_drbg_selftest( )
{
TEST_ASSERT( mbedtls_hmac_drbg_self_test( 1 ) == 0 );
exit:
;
}
void test_hmac_drbg_selftest_wrapper( void ** params )
{
(void)params;
test_hmac_drbg_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_HMAC_DRBG_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_HMAC_DRBG_C)
case 0:
{
*out_value = MBEDTLS_MD_SHA1;
}
break;
case 1:
{
*out_value = MBEDTLS_MD_SHA224;
}
break;
case 2:
{
*out_value = MBEDTLS_MD_SHA256;
}
break;
case 3:
{
*out_value = MBEDTLS_MD_SHA384;
}
break;
case 4:
{
*out_value = MBEDTLS_MD_SHA512;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_HMAC_DRBG_C)
case 0:
{
#if defined(MBEDTLS_SHA1_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_SHA256_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_SHA512_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if !defined(MBEDTLS_SHA512_NO_SHA384)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_entropy_usage_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_HMAC_DRBG_C) && defined(MBEDTLS_FS_IO)
test_hmac_drbg_seed_file_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_no_reseed_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_nopr_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_pr_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_HMAC_DRBG_C) && defined(MBEDTLS_SELF_TEST)
test_hmac_drbg_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_hmac_drbg.no_reseed.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 21,864 | 696 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_aes.ofb.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_aes.ofb.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_aes.function
* Test suite data : suites/test_suite_aes.ofb.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_AES_C)
#include "third_party/mbedtls/aes.h"
void test_aes_encrypt_ecb( data_t * key_str, data_t * src_str,
data_t * dst, int setkey_result )
{
unsigned char output[100];
mbedtls_aes_context ctx;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
TEST_ASSERT( mbedtls_aes_setkey_enc( &ctx, key_str->x, key_str->len * 8 ) == setkey_result );
if( setkey_result == 0 )
{
TEST_ASSERT( mbedtls_aes_crypt_ecb( &ctx, MBEDTLS_AES_ENCRYPT, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, 16, dst->len ) == 0 );
}
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_encrypt_ecb_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
test_aes_encrypt_ecb( &data0, &data2, &data4, *( (int *) params[6] ) );
}
void test_aes_decrypt_ecb( data_t * key_str, data_t * src_str,
data_t * dst, int setkey_result )
{
unsigned char output[100];
mbedtls_aes_context ctx;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
TEST_ASSERT( mbedtls_aes_setkey_dec( &ctx, key_str->x, key_str->len * 8 ) == setkey_result );
if( setkey_result == 0 )
{
TEST_ASSERT( mbedtls_aes_crypt_ecb( &ctx, MBEDTLS_AES_DECRYPT, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, 16, dst->len ) == 0 );
}
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_decrypt_ecb_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
test_aes_decrypt_ecb( &data0, &data2, &data4, *( (int *) params[6] ) );
}
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_aes_encrypt_cbc( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst,
int cbc_result )
{
unsigned char output[100];
mbedtls_aes_context ctx;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
mbedtls_aes_setkey_enc( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_aes_crypt_cbc( &ctx, MBEDTLS_AES_ENCRYPT, src_str->len, iv_str->x, src_str->x, output ) == cbc_result );
if( cbc_result == 0 )
{
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
}
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_encrypt_cbc_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_aes_encrypt_cbc( &data0, &data2, &data4, &data6, *( (int *) params[8] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_aes_decrypt_cbc( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst,
int cbc_result )
{
unsigned char output[100];
mbedtls_aes_context ctx;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
mbedtls_aes_setkey_dec( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_aes_crypt_cbc( &ctx, MBEDTLS_AES_DECRYPT, src_str->len, iv_str->x, src_str->x, output ) == cbc_result );
if( cbc_result == 0)
{
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
}
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_decrypt_cbc_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_aes_decrypt_cbc( &data0, &data2, &data4, &data6, *( (int *) params[8] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#if defined(MBEDTLS_CIPHER_MODE_XTS)
void test_aes_encrypt_xts( char *hex_key_string, char *hex_data_unit_string,
char *hex_src_string, char *hex_dst_string )
{
enum { AES_BLOCK_SIZE = 16 };
unsigned char *data_unit = NULL;
unsigned char *key = NULL;
unsigned char *src = NULL;
unsigned char *dst = NULL;
unsigned char *output = NULL;
mbedtls_aes_xts_context ctx;
size_t key_len, src_len, dst_len, data_unit_len;
mbedtls_aes_xts_init( &ctx );
data_unit = mbedtls_test_unhexify_alloc( hex_data_unit_string,
&data_unit_len );
TEST_ASSERT( data_unit_len == AES_BLOCK_SIZE );
key = mbedtls_test_unhexify_alloc( hex_key_string, &key_len );
TEST_ASSERT( key_len % 2 == 0 );
src = mbedtls_test_unhexify_alloc( hex_src_string, &src_len );
dst = mbedtls_test_unhexify_alloc( hex_dst_string, &dst_len );
TEST_ASSERT( src_len == dst_len );
output = mbedtls_test_zero_alloc( dst_len );
TEST_ASSERT( mbedtls_aes_xts_setkey_enc( &ctx, key, key_len * 8 ) == 0 );
TEST_ASSERT( mbedtls_aes_crypt_xts( &ctx, MBEDTLS_AES_ENCRYPT, src_len,
data_unit, src, output ) == 0 );
TEST_ASSERT( memcmp( output, dst, dst_len ) == 0 );
exit:
mbedtls_aes_xts_free( &ctx );
mbedtls_free( data_unit );
mbedtls_free( key );
mbedtls_free( src );
mbedtls_free( dst );
mbedtls_free( output );
}
void test_aes_encrypt_xts_wrapper( void ** params )
{
test_aes_encrypt_xts( (char *) params[0], (char *) params[1], (char *) params[2], (char *) params[3] );
}
#endif /* MBEDTLS_CIPHER_MODE_XTS */
#if defined(MBEDTLS_CIPHER_MODE_XTS)
void test_aes_decrypt_xts( char *hex_key_string, char *hex_data_unit_string,
char *hex_dst_string, char *hex_src_string )
{
enum { AES_BLOCK_SIZE = 16 };
unsigned char *data_unit = NULL;
unsigned char *key = NULL;
unsigned char *src = NULL;
unsigned char *dst = NULL;
unsigned char *output = NULL;
mbedtls_aes_xts_context ctx;
size_t key_len, src_len, dst_len, data_unit_len;
mbedtls_aes_xts_init( &ctx );
data_unit = mbedtls_test_unhexify_alloc( hex_data_unit_string,
&data_unit_len );
TEST_ASSERT( data_unit_len == AES_BLOCK_SIZE );
key = mbedtls_test_unhexify_alloc( hex_key_string, &key_len );
TEST_ASSERT( key_len % 2 == 0 );
src = mbedtls_test_unhexify_alloc( hex_src_string, &src_len );
dst = mbedtls_test_unhexify_alloc( hex_dst_string, &dst_len );
TEST_ASSERT( src_len == dst_len );
output = mbedtls_test_zero_alloc( dst_len );
TEST_ASSERT( mbedtls_aes_xts_setkey_dec( &ctx, key, key_len * 8 ) == 0 );
TEST_ASSERT( mbedtls_aes_crypt_xts( &ctx, MBEDTLS_AES_DECRYPT, src_len,
data_unit, src, output ) == 0 );
TEST_ASSERT( memcmp( output, dst, dst_len ) == 0 );
exit:
mbedtls_aes_xts_free( &ctx );
mbedtls_free( data_unit );
mbedtls_free( key );
mbedtls_free( src );
mbedtls_free( dst );
mbedtls_free( output );
}
void test_aes_decrypt_xts_wrapper( void ** params )
{
test_aes_decrypt_xts( (char *) params[0], (char *) params[1], (char *) params[2], (char *) params[3] );
}
#endif /* MBEDTLS_CIPHER_MODE_XTS */
#if defined(MBEDTLS_CIPHER_MODE_XTS)
void test_aes_crypt_xts_size( int size, int retval )
{
mbedtls_aes_xts_context ctx;
const unsigned char src[16] = { 0 };
unsigned char output[16];
unsigned char data_unit[16];
size_t length = size;
mbedtls_aes_xts_init( &ctx );
memset( data_unit, 0x00, sizeof( data_unit ) );
/* Valid pointers are passed for builds with MBEDTLS_CHECK_PARAMS, as
* otherwise we wouldn't get to the size check we're interested in. */
TEST_ASSERT( mbedtls_aes_crypt_xts( &ctx, MBEDTLS_AES_ENCRYPT, length, data_unit, src, output ) == retval );
exit:
;
}
void test_aes_crypt_xts_size_wrapper( void ** params )
{
test_aes_crypt_xts_size( *( (int *) params[0] ), *( (int *) params[1] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_XTS */
#if defined(MBEDTLS_CIPHER_MODE_XTS)
void test_aes_crypt_xts_keysize( int size, int retval )
{
mbedtls_aes_xts_context ctx;
const unsigned char key[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 };
size_t key_len = size;
mbedtls_aes_xts_init( &ctx );
TEST_ASSERT( mbedtls_aes_xts_setkey_enc( &ctx, key, key_len * 8 ) == retval );
TEST_ASSERT( mbedtls_aes_xts_setkey_dec( &ctx, key, key_len * 8 ) == retval );
exit:
mbedtls_aes_xts_free( &ctx );
}
void test_aes_crypt_xts_keysize_wrapper( void ** params )
{
test_aes_crypt_xts_keysize( *( (int *) params[0] ), *( (int *) params[1] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_XTS */
#if defined(MBEDTLS_CIPHER_MODE_CFB)
void test_aes_encrypt_cfb128( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst )
{
unsigned char output[100];
mbedtls_aes_context ctx;
size_t iv_offset = 0;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
mbedtls_aes_setkey_enc( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_aes_crypt_cfb128( &ctx, MBEDTLS_AES_ENCRYPT, 16, &iv_offset, iv_str->x, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, 16, dst->len ) == 0 );
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_encrypt_cfb128_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_aes_encrypt_cfb128( &data0, &data2, &data4, &data6 );
}
#endif /* MBEDTLS_CIPHER_MODE_CFB */
#if defined(MBEDTLS_CIPHER_MODE_CFB)
void test_aes_decrypt_cfb128( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst )
{
unsigned char output[100];
mbedtls_aes_context ctx;
size_t iv_offset = 0;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
mbedtls_aes_setkey_enc( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_aes_crypt_cfb128( &ctx, MBEDTLS_AES_DECRYPT, 16, &iv_offset, iv_str->x, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, 16, dst->len ) == 0 );
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_decrypt_cfb128_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_aes_decrypt_cfb128( &data0, &data2, &data4, &data6 );
}
#endif /* MBEDTLS_CIPHER_MODE_CFB */
#if defined(MBEDTLS_CIPHER_MODE_CFB)
void test_aes_encrypt_cfb8( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst )
{
unsigned char output[100];
mbedtls_aes_context ctx;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
mbedtls_aes_setkey_enc( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_aes_crypt_cfb8( &ctx, MBEDTLS_AES_ENCRYPT, src_str->len, iv_str->x, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_encrypt_cfb8_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_aes_encrypt_cfb8( &data0, &data2, &data4, &data6 );
}
#endif /* MBEDTLS_CIPHER_MODE_CFB */
#if defined(MBEDTLS_CIPHER_MODE_CFB)
void test_aes_decrypt_cfb8( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst )
{
unsigned char output[100];
mbedtls_aes_context ctx;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
mbedtls_aes_setkey_enc( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_aes_crypt_cfb8( &ctx, MBEDTLS_AES_DECRYPT, src_str->len, iv_str->x, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_decrypt_cfb8_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_aes_decrypt_cfb8( &data0, &data2, &data4, &data6 );
}
#endif /* MBEDTLS_CIPHER_MODE_CFB */
#if defined(MBEDTLS_CIPHER_MODE_OFB)
void test_aes_encrypt_ofb( int fragment_size, data_t *key_str,
data_t *iv_str, data_t *src_str,
data_t *expected_output )
{
unsigned char output[32];
mbedtls_aes_context ctx;
size_t iv_offset = 0;
int in_buffer_len;
unsigned char* src_str_next;
memset( output, 0x00, sizeof( output ) );
mbedtls_aes_init( &ctx );
TEST_ASSERT( (size_t)fragment_size < sizeof( output ) );
TEST_ASSERT( mbedtls_aes_setkey_enc( &ctx, key_str->x,
key_str->len * 8 ) == 0 );
in_buffer_len = src_str->len;
src_str_next = src_str->x;
while( in_buffer_len > 0 )
{
TEST_ASSERT( mbedtls_aes_crypt_ofb( &ctx, fragment_size, &iv_offset,
iv_str->x, src_str_next, output ) == 0 );
TEST_ASSERT( memcmp( output, expected_output->x, fragment_size ) == 0 );
in_buffer_len -= fragment_size;
expected_output->x += fragment_size;
src_str_next += fragment_size;
if( in_buffer_len < fragment_size )
fragment_size = in_buffer_len;
}
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_encrypt_ofb_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
test_aes_encrypt_ofb( *( (int *) params[0] ), &data1, &data3, &data5, &data7 );
}
#endif /* MBEDTLS_CIPHER_MODE_OFB */
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_aes_check_params( )
{
mbedtls_aes_context aes_ctx;
#if defined(MBEDTLS_CIPHER_MODE_XTS)
mbedtls_aes_xts_context xts_ctx;
#endif
const unsigned char key[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 };
const unsigned char in[16] = { 0 };
unsigned char out[16];
size_t size;
const int valid_mode = MBEDTLS_AES_ENCRYPT;
const int invalid_mode = 42;
TEST_INVALID_PARAM( mbedtls_aes_init( NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_XTS)
TEST_INVALID_PARAM( mbedtls_aes_xts_init( NULL ) );
#endif
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_setkey_enc( NULL, key, 128 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_setkey_enc( &aes_ctx, NULL, 128 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_setkey_dec( NULL, key, 128 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_setkey_dec( &aes_ctx, NULL, 128 ) );
#if defined(MBEDTLS_CIPHER_MODE_XTS)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_xts_setkey_enc( NULL, key, 128 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_xts_setkey_enc( &xts_ctx, NULL, 128 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_xts_setkey_dec( NULL, key, 128 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_xts_setkey_dec( &xts_ctx, NULL, 128 ) );
#endif
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ecb( NULL,
valid_mode, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ecb( &aes_ctx,
invalid_mode, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ecb( &aes_ctx,
valid_mode, NULL, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ecb( &aes_ctx,
valid_mode, in, NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_CBC)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cbc( NULL,
valid_mode, 16,
out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cbc( &aes_ctx,
invalid_mode, 16,
out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cbc( &aes_ctx,
valid_mode, 16,
NULL, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cbc( &aes_ctx,
valid_mode, 16,
out, NULL, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cbc( &aes_ctx,
valid_mode, 16,
out, in, NULL ) );
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#if defined(MBEDTLS_CIPHER_MODE_XTS)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_xts( NULL,
valid_mode, 16,
in, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_xts( &xts_ctx,
invalid_mode, 16,
in, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_xts( &xts_ctx,
valid_mode, 16,
NULL, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_xts( &xts_ctx,
valid_mode, 16,
in, NULL, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_xts( &xts_ctx,
valid_mode, 16,
in, in, NULL ) );
#endif /* MBEDTLS_CIPHER_MODE_XTS */
#if defined(MBEDTLS_CIPHER_MODE_CFB)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb128( NULL,
valid_mode, 16,
&size, out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb128( &aes_ctx,
invalid_mode, 16,
&size, out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb128( &aes_ctx,
valid_mode, 16,
NULL, out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb128( &aes_ctx,
valid_mode, 16,
&size, NULL, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb128( &aes_ctx,
valid_mode, 16,
&size, out, NULL, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb128( &aes_ctx,
valid_mode, 16,
&size, out, in, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb8( NULL,
valid_mode, 16,
out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb8( &aes_ctx,
invalid_mode, 16,
out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb8( &aes_ctx,
valid_mode, 16,
NULL, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb8( &aes_ctx,
valid_mode, 16,
out, NULL, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb8( &aes_ctx,
valid_mode, 16,
out, in, NULL ) );
#endif /* MBEDTLS_CIPHER_MODE_CFB */
#if defined(MBEDTLS_CIPHER_MODE_OFB)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ofb( NULL, 16,
&size, out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ofb( &aes_ctx, 16,
NULL, out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ofb( &aes_ctx, 16,
&size, NULL, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ofb( &aes_ctx, 16,
&size, out, NULL, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ofb( &aes_ctx, 16,
&size, out, in, NULL ) );
#endif /* MBEDTLS_CIPHER_MODE_OFB */
#if defined(MBEDTLS_CIPHER_MODE_CTR)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ctr( NULL, 16, &size, out,
out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ctr( &aes_ctx, 16, NULL, out,
out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ctr( &aes_ctx, 16, &size, NULL,
out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ctr( &aes_ctx, 16, &size, out,
NULL, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ctr( &aes_ctx, 16, &size, out,
out, NULL, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ctr( &aes_ctx, 16, &size, out,
out, in, NULL ) );
#endif /* MBEDTLS_CIPHER_MODE_CTR */
exit:
;
}
void test_aes_check_params_wrapper( void ** params )
{
(void)params;
test_aes_check_params( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_aes_misc_params( )
{
#if defined(MBEDTLS_CIPHER_MODE_CBC) || \
defined(MBEDTLS_CIPHER_MODE_XTS) || \
defined(MBEDTLS_CIPHER_MODE_CFB) || \
defined(MBEDTLS_CIPHER_MODE_OFB)
mbedtls_aes_context aes_ctx;
const unsigned char in[16] = { 0 };
unsigned char out[16];
#endif
#if defined(MBEDTLS_CIPHER_MODE_XTS)
mbedtls_aes_xts_context xts_ctx;
#endif
#if defined(MBEDTLS_CIPHER_MODE_CFB) || \
defined(MBEDTLS_CIPHER_MODE_OFB)
size_t size;
#endif
/* These calls accept NULL */
TEST_VALID_PARAM( mbedtls_aes_free( NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_XTS)
TEST_VALID_PARAM( mbedtls_aes_xts_free( NULL ) );
#endif
#if defined(MBEDTLS_CIPHER_MODE_CBC)
TEST_ASSERT( mbedtls_aes_crypt_cbc( &aes_ctx, MBEDTLS_AES_ENCRYPT,
15,
out, in, out )
== MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH );
TEST_ASSERT( mbedtls_aes_crypt_cbc( &aes_ctx, MBEDTLS_AES_ENCRYPT,
17,
out, in, out )
== MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH );
#endif
#if defined(MBEDTLS_CIPHER_MODE_XTS)
TEST_ASSERT( mbedtls_aes_crypt_xts( &xts_ctx, MBEDTLS_AES_ENCRYPT,
15,
in, in, out )
== MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH );
TEST_ASSERT( mbedtls_aes_crypt_xts( &xts_ctx, MBEDTLS_AES_ENCRYPT,
(1 << 24) + 1,
in, in, out )
== MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH );
#endif
#if defined(MBEDTLS_CIPHER_MODE_CFB)
size = 16;
TEST_ASSERT( mbedtls_aes_crypt_cfb128( &aes_ctx, MBEDTLS_AES_ENCRYPT, 16,
&size, out, in, out )
== MBEDTLS_ERR_AES_BAD_INPUT_DATA );
#endif
#if defined(MBEDTLS_CIPHER_MODE_OFB)
size = 16;
TEST_ASSERT( mbedtls_aes_crypt_ofb( &aes_ctx, 16, &size, out, in, out )
== MBEDTLS_ERR_AES_BAD_INPUT_DATA );
#endif
exit:
;
}
void test_aes_misc_params_wrapper( void ** params )
{
(void)params;
test_aes_misc_params( );
}
#if defined(MBEDTLS_SELF_TEST)
void test_aes_selftest( )
{
TEST_ASSERT( mbedtls_aes_self_test( 1 ) == 0 );
exit:
;
}
void test_aes_selftest_wrapper( void ** params )
{
(void)params;
test_aes_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_AES_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_AES_C)
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_AES_C)
case 0:
{
#if defined(MBEDTLS_CIPHER_MODE_OFB)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_AES_C)
test_aes_encrypt_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_AES_C)
test_aes_decrypt_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_aes_encrypt_cbc_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_aes_decrypt_cbc_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_XTS)
test_aes_encrypt_xts_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_XTS)
test_aes_decrypt_xts_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_XTS)
test_aes_crypt_xts_size_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_XTS)
test_aes_crypt_xts_keysize_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_CFB)
test_aes_encrypt_cfb128_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_CFB)
test_aes_decrypt_cfb128_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_CFB)
test_aes_encrypt_cfb8_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_CFB)
test_aes_decrypt_cfb8_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_OFB)
test_aes_encrypt_ofb_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_aes_check_params_wrapper,
#else
NULL,
#endif
/* Function Id: 14 */
#if defined(MBEDTLS_AES_C)
test_aes_misc_params_wrapper,
#else
NULL,
#endif
/* Function Id: 15 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_SELF_TEST)
test_aes_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_aes.ofb.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 38,340 | 1,109 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/lib.h | #ifndef COSMOPOLITAN_THIRD_PARTY_MBEDTLS_TEST_LIB_H_
#define COSMOPOLITAN_THIRD_PARTY_MBEDTLS_TEST_LIB_H_
#include "libc/str/str.h"
#include "libc/x/x.h"
#include "libc/x/xasprintf.h"
#include "third_party/mbedtls/config.h"
#include "third_party/mbedtls/platform.h"
#define DEPENDENCY_SUPPORTED 0
#define KEY_VALUE_MAPPING_FOUND 0
#define DISPATCH_TEST_SUCCESS 0
#define KEY_VALUE_MAPPING_NOT_FOUND -1
#define DEPENDENCY_NOT_SUPPORTED -2
#define DISPATCH_TEST_FN_NOT_FOUND -3
#define DISPATCH_INVALID_TEST_DATA -4
#define DISPATCH_UNSUPPORTED_SUITE -5
#define PSA_ECC_FAMILY_SECP_R1 0x12
#define PSA_ECC_FAMILY_SECP_K1 0x17
#define PSA_ECC_FAMILY_BRAINPOOL_P_R1 0x30
#if defined(MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN)
#include <sanitizer/msan_interface.h>
#define TEST_CF_SECRET __msan_allocated_memory
#define TEST_CF_PUBLIC __msan_unpoison
#elif defined(MBEDTLS_TEST_CONSTANT_FLOW_VALGRIND)
#include <valgrind/memcheck.h>
#define TEST_CF_SECRET VALGRIND_MAKE_MEM_UNDEFINED
#define TEST_CF_PUBLIC VALGRIND_MAKE_MEM_DEFINED
#else
#define TEST_CF_SECRET(ptr, size)
#define TEST_CF_PUBLIC(ptr, size)
#endif
#if defined(MBEDTLS_TEST_NULL_ENTROPY) || \
(!defined(MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES) && \
(!defined(MBEDTLS_NO_PLATFORM_ENTROPY) || defined(MBEDTLS_HAVEGE_C) || \
defined(MBEDTLS_ENTROPY_HARDWARE_ALT) || defined(ENTROPY_NV_SEED)))
#define ENTROPY_HAVE_STRONG
#else
#error oh no entropy
#endif
#if !(__ASSEMBLER__ + __LINKER__ + 0)
COSMOPOLITAN_C_START_
#define WRITE mbedtls_test_write
#define TEST_ASSERT(TEST) \
do { \
if (!(TEST)) { \
mbedtls_test_fail(#TEST, __LINE__, __FILE__); \
goto exit; \
} \
} while (0)
#define TEST_ASSERT_STREQ(A, B) \
do { \
const char *StrA = (A); \
const char *StrB = (B); \
if (strcmp(StrA, StrB)) { \
mbedtls_test_fail( \
xasprintf("!strcmp(%`'s,\n %`'s)", StrA, StrB), __LINE__, \
__FILE__); \
goto exit; \
} \
} while (0)
#define TEST_EQUAL(A, B) \
do { \
long Ax = (long)(A); \
long Bx = (long)(B); \
if (Ax != Bx) { \
mbedtls_test_fail(xasprintf("TEST_EQUAL(%s, %s)\n" \
" Wanted: %,ld (-0x%04lx %s)\n" \
" Got: %,ld (-0x%04lx %s)", \
#A, #B, Ax, -Ax, GetTlsError(Ax), Bx, -Bx, \
GetTlsError(Bx)), \
__LINE__, __FILE__); \
goto exit; \
} \
} while (0)
#define ASSERT_ALLOC(pointer, length) \
do { \
TEST_ASSERT((pointer) == NULL); \
if ((length) != 0) { \
(pointer) = mbedtls_calloc(sizeof(*(pointer)), (length)); \
TEST_ASSERT((pointer) != NULL); \
} \
} while (0)
#define ASSERT_ALLOC_WEAK(pointer, length) \
do { \
TEST_ASSERT((pointer) == NULL); \
if ((length) != 0) { \
(pointer) = mbedtls_calloc(sizeof(*(pointer)), (length)); \
TEST_ASSUME((pointer) != NULL); \
} \
} while (0)
#define ASSERT_COMPARE(p1, size1, p2, size2) \
do { \
TEST_ASSERT((size1) == (size2)); \
if ((size1) != 0) TEST_ASSERT(memcmp((p1), (p2), (size1)) == 0); \
} while (0)
#define TEST_ASSUME(TEST) \
do { \
if (!(TEST)) { \
mbedtls_test_skip(#TEST, __LINE__, __FILE__); \
goto exit; \
} \
} while (0)
#define TEST_INVALID_PARAM_RET(PARAM_ERR_VALUE, TEST) \
do { \
mbedtls_test_param_failed_expect_call(); \
if (((TEST) != (PARAM_ERR_VALUE)) || \
(mbedtls_test_param_failed_check_expected_call() != 0)) { \
mbedtls_test_fail(#TEST, __LINE__, __FILE__); \
goto exit; \
} \
mbedtls_test_param_failed_check_expected_call(); \
} while (0)
#define TEST_INVALID_PARAM(TEST) \
do { \
memcpy(jmp_tmp, mbedtls_test_param_failed_get_state_buf(), \
sizeof(jmp_tmp)); \
if (setjmp(mbedtls_test_param_failed_get_state_buf()) == 0) { \
TEST; \
mbedtls_test_fail(#TEST, __LINE__, __FILE__); \
goto exit; \
} \
mbedtls_test_param_failed_reset_state(); \
} while (0)
#define TEST_VALID_PARAM(TEST) TEST_ASSERT((TEST, 1));
#define ASSERT_ALLOC(pointer, length) \
do { \
TEST_ASSERT((pointer) == NULL); \
if ((length) != 0) { \
(pointer) = mbedtls_calloc(sizeof(*(pointer)), (length)); \
TEST_ASSERT((pointer) != NULL); \
} \
} while (0)
#define TEST_HELPER_ASSERT(a) \
if (!(a)) { \
WRITE("%s:%d: assertion failed: %s\n", __FILE__, __LINE__, #a); \
exit(1); \
}
#define ARRAY_LENGTH_UNSAFE(array) (sizeof(array) / sizeof(*(array)))
#ifdef __GNUC__
#define IS_ARRAY_NOT_POINTER(arg) \
(!__builtin_types_compatible_p(__typeof__(arg), __typeof__(&(arg)[0])))
#define STATIC_ASSERT_EXPR(const_expr) \
(0 && sizeof(struct { unsigned int STATIC_ASSERT : 1 - 2 * !(const_expr); }))
#define STATIC_ASSERT_THEN_RETURN(condition, value) \
(STATIC_ASSERT_EXPR(condition) ? 0 : (value))
#define ARRAY_LENGTH(array) \
(STATIC_ASSERT_THEN_RETURN(IS_ARRAY_NOT_POINTER(array), \
ARRAY_LENGTH_UNSAFE(array)))
#else
#define ARRAY_LENGTH(array) ARRAY_LENGTH_UNSAFE(array)
#endif
#define USE_PSA_INIT() ((void)0)
#define USE_PSA_DONE() ((void)0)
typedef enum {
MBEDTLS_TEST_RESULT_SUCCESS = 0,
MBEDTLS_TEST_RESULT_FAILED,
MBEDTLS_TEST_RESULT_SKIPPED
} mbedtls_test_result_t;
typedef struct {
mbedtls_test_result_t result;
const char *test;
const char *filename;
int line_no;
unsigned long step;
} mbedtls_test_info_t;
extern mbedtls_test_info_t mbedtls_test_info;
typedef struct {
const char *failure_condition;
const char *file;
int line;
} mbedtls_test_param_failed_location_record_t;
typedef struct {
unsigned char *buf;
size_t length;
} mbedtls_test_rnd_buf_info;
typedef struct data_tag {
uint8_t *x;
uint32_t len;
} data_t;
/**
* Info structure for the pseudo random function
*
* Key should be set at the start to a test-unique value.
* Do not forget endianness!
* State( v0, v1 ) should be set to zero.
*/
typedef struct {
uint32_t key[16];
uint32_t v0, v1;
} mbedtls_test_rnd_pseudo_info;
extern jmp_buf jmp_tmp;
int mbedtls_test_platform_setup(void);
void mbedtls_test_platform_teardown(void);
int mbedtls_test_hexcmp(uint8_t *, uint8_t *, uint32_t, uint32_t);
void mbedtls_test_fail(const char *, int, const char *);
void mbedtls_test_skip(const char *, int, const char *);
void mbedtls_test_set_step(unsigned long);
void mbedtls_test_info_reset(void);
int mbedtls_test_unhexify(unsigned char *, size_t, const char *, size_t *);
void mbedtls_test_hexify(unsigned char *, const unsigned char *, int);
unsigned char *mbedtls_test_zero_alloc(size_t);
unsigned char *mbedtls_test_unhexify_alloc(const char *, size_t *);
void mbedtls_test_param_failed_get_location_record(
mbedtls_test_param_failed_location_record_t *);
void mbedtls_test_param_failed_expect_call(void);
int mbedtls_test_param_failed_check_expected_call(void);
void *mbedtls_test_param_failed_get_state_buf(void);
void mbedtls_test_param_failed_reset_state(void);
int mbedtls_test_rnd_std_rand(void *, unsigned char *, size_t);
int mbedtls_test_rnd_zero_rand(void *, unsigned char *, size_t);
int mbedtls_test_rnd_buffer_rand(void *, unsigned char *, size_t);
int mbedtls_test_rnd_pseudo_rand(void *, unsigned char *, size_t);
int mbedtls_test_write(const char *, ...);
int execute_tests(int, const char **, const char *);
int get_expression(int32_t, int32_t *);
int dispatch_test(size_t, void **);
int dep_check(int);
int check_test(size_t);
char *GetTlsError(long);
COSMOPOLITAN_C_END_
#endif /* !(__ASSEMBLER__ + __LINKER__ + 0) */
#endif /* COSMOPOLITAN_THIRD_PARTY_MBEDTLS_TEST_LIB_H_ */
| 10,721 | 254 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_chacha20.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_chacha20.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_chacha20.function
* Test suite data : suites/test_suite_chacha20.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_CHACHA20_C)
#include "third_party/mbedtls/chacha20.h"
void test_chacha20_crypt( data_t *key_str,
data_t *nonce_str,
int counter,
data_t *src_str,
data_t *expected_output_str )
{
unsigned char output[375];
mbedtls_chacha20_context ctx;
memset( output, 0x00, sizeof( output ) );
TEST_ASSERT( src_str->len == expected_output_str->len );
TEST_ASSERT( key_str->len == 32U );
TEST_ASSERT( nonce_str->len == 12U );
/*
* Test the integrated API
*/
TEST_ASSERT( mbedtls_chacha20_crypt( key_str->x, nonce_str->x, counter, src_str->len, src_str->x, output ) == 0 );
ASSERT_COMPARE( output, expected_output_str->len,
expected_output_str->x, expected_output_str->len );
/*
* Test the streaming API
*/
mbedtls_chacha20_init( &ctx );
TEST_ASSERT( mbedtls_chacha20_setkey( &ctx, key_str->x ) == 0 );
TEST_ASSERT( mbedtls_chacha20_starts( &ctx, nonce_str->x, counter ) == 0 );
memset( output, 0x00, sizeof( output ) );
TEST_ASSERT( mbedtls_chacha20_update( &ctx, src_str->len, src_str->x, output ) == 0 );
ASSERT_COMPARE( output, expected_output_str->len,
expected_output_str->x, expected_output_str->len );
/*
* Test the streaming API again, piecewise
*/
/* Don't free/init the context nor set the key again,
* in order to test that starts() does the right thing. */
TEST_ASSERT( mbedtls_chacha20_starts( &ctx, nonce_str->x, counter ) == 0 );
memset( output, 0x00, sizeof( output ) );
TEST_ASSERT( mbedtls_chacha20_update( &ctx, 1, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_chacha20_update( &ctx, src_str->len - 1,
src_str->x + 1, output + 1 ) == 0 );
ASSERT_COMPARE( output, expected_output_str->len,
expected_output_str->x, expected_output_str->len );
mbedtls_chacha20_free( &ctx );
exit:
;
}
void test_chacha20_crypt_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
test_chacha20_crypt( &data0, &data2, *( (int *) params[4] ), &data5, &data7 );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_chacha20_bad_params()
{
unsigned char key[32];
unsigned char nonce[12];
unsigned char src[1];
unsigned char dst[1];
uint32_t counter = 0;
size_t len = sizeof( src );
mbedtls_chacha20_context ctx;
TEST_INVALID_PARAM( mbedtls_chacha20_init( NULL ) );
TEST_VALID_PARAM( mbedtls_chacha20_free( NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA,
mbedtls_chacha20_setkey( NULL, key ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA,
mbedtls_chacha20_setkey( &ctx, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA,
mbedtls_chacha20_starts( NULL, nonce, counter ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA,
mbedtls_chacha20_starts( &ctx, NULL, counter ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA,
mbedtls_chacha20_update( NULL, 0, src, dst ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA,
mbedtls_chacha20_update( &ctx, len, NULL, dst ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA,
mbedtls_chacha20_update( &ctx, len, src, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA,
mbedtls_chacha20_crypt( NULL, nonce, counter, 0, src, dst ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA,
mbedtls_chacha20_crypt( key, NULL, counter, 0, src, dst ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA,
mbedtls_chacha20_crypt( key, nonce, counter, len, NULL, dst ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA,
mbedtls_chacha20_crypt( key, nonce, counter, len, src, NULL ) );
exit:
return;
}
void test_chacha20_bad_params_wrapper( void ** params )
{
(void)params;
test_chacha20_bad_params( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
#if defined(MBEDTLS_SELF_TEST)
void test_chacha20_self_test()
{
TEST_ASSERT( mbedtls_chacha20_self_test( 1 ) == 0 );
exit:
;
}
void test_chacha20_self_test_wrapper( void ** params )
{
(void)params;
test_chacha20_self_test( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_CHACHA20_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_CHACHA20_C)
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_CHACHA20_C)
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_CHACHA20_C)
test_chacha20_crypt_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_CHACHA20_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_chacha20_bad_params_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_CHACHA20_C) && defined(MBEDTLS_SELF_TEST)
test_chacha20_self_test_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_chacha20.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 12,823 | 414 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_hkdf.datax | HKDF extract fails with hash_len of 0
3:int:0:exp:0
HKDF expand fails with NULL okm
4:int:32:int:32:int:0:exp:0
HKDF expand fails with hash_len of 0
4:int:0:int:32:int:32:exp:0
HKDF expand fails with prk_len < hash_len
4:int:32:int:16:int:32:exp:0
HKDF expand fails with okm_len / hash_len > 255
4:int:32:int:32:int:8192:exp:0
HKDF RFC5869 Test Vector #1
depends_on:0
0:int:6:hex:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":hex:"000102030405060708090a0b0c":hex:"f0f1f2f3f4f5f6f7f8f9":hex:"3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007208d5b887185865"
HKDF RFC5869 Test Vector #2
depends_on:0
0:int:6:hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f":hex:"606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf":hex:"b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff":hex:"b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c59045a99cac7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71cc30c58179ec3e87c14c01d5c1f3434f1d87"
HKDF RFC5869 Test Vector #3
depends_on:0
0:int:6:hex:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":hex:"":hex:"":hex:"8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d9d201395faa4b61a96c8"
HKDF RFC5869 Test Vector #4
depends_on:1
0:int:4:hex:"0b0b0b0b0b0b0b0b0b0b0b":hex:"000102030405060708090a0b0c":hex:"f0f1f2f3f4f5f6f7f8f9":hex:"085a01ea1b10f36933068b56efa5ad81a4f14b822f5b091568a9cdd4f155fda2c22e422478d305f3f896"
HKDF RFC5869 Test Vector #5
depends_on:1
0:int:4:hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f":hex:"606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf":hex:"b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff":hex:"0bd770a74d1160f7c9f12cd5912a06ebff6adcae899d92191fe4305673ba2ffe8fa3f1a4e5ad79f3f334b3b202b2173c486ea37ce3d397ed034c7f9dfeb15c5e927336d0441f4c4300e2cff0d0900b52d3b4"
HKDF RFC5869 Test Vector #6
depends_on:1
0:int:4:hex:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":hex:"":hex:"":hex:"0ac1af7002b3d761d1e55298da9d0506b9ae52057220a306e07b6b87e8df21d0ea00033de03984d34918"
HKDF RFC5869 Test Vector #7
depends_on:1
0:int:4:hex:"0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c":hex:"":hex:"":hex:"2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5673a081d70cce7acfc48"
HKDF RFC5869 Test Vector #1 Extract
depends_on:0
1:int:6:char*:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":char*:"000102030405060708090a0b0c":char*:"077709362c2e32df0ddc3f0dc47bba6390b6c73bb50f9c3122ec844ad7c2b3e5"
HKDF RFC5869 Test Vector #2 Extract
depends_on:0
1:int:6:char*:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f":char*:"606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf":char*:"06a6b88c5853361a06104c9ceb35b45cef760014904671014a193f40c15fc244"
HKDF RFC5869 Test Vector #3 Extract
depends_on:0
1:int:6:char*:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":char*:"":char*:"19ef24a32c717b167f33a91d6f648bdf96596776afdb6377ac434c1c293ccb04"
HKDF RFC5869 Test Vector #4 Extract
depends_on:1
1:int:4:char*:"0b0b0b0b0b0b0b0b0b0b0b":char*:"000102030405060708090a0b0c":char*:"9b6c18c432a7bf8f0e71c8eb88f4b30baa2ba243"
HKDF RFC5869 Test Vector #5 Extract
depends_on:1
1:int:4:char*:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f":char*:"606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf":char*:"8adae09a2a307059478d309b26c4115a224cfaf6"
HKDF RFC5869 Test Vector #6 Extract
depends_on:1
1:int:4:char*:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":char*:"":char*:"da8c8a73c7fa77288ec6f5e7c297786aa0d32d01"
HKDF RFC5869 Test Vector #7 Extract
depends_on:1
1:int:4:char*:"0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c":char*:"":char*:"2adccada18779e7c2077ad2eb19d3f3e731385dd"
HKDF RFC5869 Test Vector #1 Expand
depends_on:0
2:int:6:char*:"f0f1f2f3f4f5f6f7f8f9":char*:"077709362c2e32df0ddc3f0dc47bba6390b6c73bb50f9c3122ec844ad7c2b3e5":char*:"3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007208d5b887185865"
HKDF RFC5869 Test Vector #2 Expand
depends_on:0
2:int:6:char*:"b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff":char*:"06a6b88c5853361a06104c9ceb35b45cef760014904671014a193f40c15fc244":char*:"b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c59045a99cac7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71cc30c58179ec3e87c14c01d5c1f3434f1d87"
HKDF RFC5869 Test Vector #3 Expand
depends_on:0
2:int:6:char*:"":char*:"19ef24a32c717b167f33a91d6f648bdf96596776afdb6377ac434c1c293ccb04":char*:"8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d9d201395faa4b61a96c8"
HKDF RFC5869 Test Vector #4 Expand
depends_on:1
2:int:4:char*:"f0f1f2f3f4f5f6f7f8f9":char*:"9b6c18c432a7bf8f0e71c8eb88f4b30baa2ba243":char*:"085a01ea1b10f36933068b56efa5ad81a4f14b822f5b091568a9cdd4f155fda2c22e422478d305f3f896"
HKDF RFC5869 Test Vector #5 Expand
depends_on:1
2:int:4:char*:"b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff":char*:"8adae09a2a307059478d309b26c4115a224cfaf6":char*:"0bd770a74d1160f7c9f12cd5912a06ebff6adcae899d92191fe4305673ba2ffe8fa3f1a4e5ad79f3f334b3b202b2173c486ea37ce3d397ed034c7f9dfeb15c5e927336d0441f4c4300e2cff0d0900b52d3b4"
HKDF RFC5869 Test Vector #6 Expand
depends_on:1
2:int:4:char*:"":char*:"da8c8a73c7fa77288ec6f5e7c297786aa0d32d01":char*:"0ac1af7002b3d761d1e55298da9d0506b9ae52057220a306e07b6b87e8df21d0ea00033de03984d34918"
HKDF RFC5869 Test Vector #7 Expand
depends_on:1
2:int:4:char*:"":char*:"2adccada18779e7c2077ad2eb19d3f3e731385dd":char*:"2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5673a081d70cce7acfc48"
| 6,761 | 100 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_md.datax | MD process
0
MD NULL/uninitialised arguments
1
Information on MD2
depends_on:0
2:exp:0:char*:"MD2":int:16
Information on MD4
depends_on:1
2:exp:1:char*:"MD4":int:16
Information on MD5
depends_on:2
2:exp:2:char*:"MD5":int:16
Information on RIPEMD160
depends_on:3
2:exp:3:char*:"RIPEMD160":int:20
Information on SHA1
depends_on:4
2:exp:4:char*:"SHA1":int:20
Information on SHA224
depends_on:5
2:exp:5:char*:"SHA224":int:28
Information on SHA256
depends_on:5
2:exp:6:char*:"SHA256":int:32
Information on SHA384
depends_on:6:7
2:exp:7:char*:"SHA384":int:48
Information on SHA512
depends_on:6
2:exp:8:char*:"SHA512":int:64
generic mbedtls_md2 Test vector RFC1319 #1
depends_on:0
3:char*:"MD2":char*:"":hex:"8350e5a3e24c153df2275c9f80692773"
generic mbedtls_md2 Test vector RFC1319 #2
depends_on:0
3:char*:"MD2":char*:"a":hex:"32ec01ec4a6dac72c0ab96fb34c0b5d1"
generic mbedtls_md2 Test vector RFC1319 #3
depends_on:0
3:char*:"MD2":char*:"abc":hex:"da853b0d3f88d99b30283a69e6ded6bb"
generic mbedtls_md2 Test vector RFC1319 #4
depends_on:0
3:char*:"MD2":char*:"message digest":hex:"ab4f496bfb2a530b219ff33031fe06b0"
generic mbedtls_md2 Test vector RFC1319 #5
depends_on:0
3:char*:"MD2":char*:"abcdefghijklmnopqrstuvwxyz":hex:"4e8ddff3650292ab5a4108c3aa47940b"
generic mbedtls_md2 Test vector RFC1319 #6
depends_on:0
3:char*:"MD2":char*:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789":hex:"da33def2a42df13975352846c30338cd"
generic mbedtls_md2 Test vector RFC1319 #7
depends_on:0
3:char*:"MD2":char*:"12345678901234567890123456789012345678901234567890123456789012345678901234567890":hex:"d5976f79d83d3a0dc9806c3c66f3efd8"
generic mbedtls_md4 Test vector RFC1320 #1
depends_on:1
3:char*:"MD4":char*:"":hex:"31d6cfe0d16ae931b73c59d7e0c089c0"
generic mbedtls_md4 Test vector RFC1320 #2
depends_on:1
3:char*:"MD4":char*:"a":hex:"bde52cb31de33e46245e05fbdbd6fb24"
generic mbedtls_md4 Test vector RFC1320 #3
depends_on:1
3:char*:"MD4":char*:"abc":hex:"a448017aaf21d8525fc10ae87aa6729d"
generic mbedtls_md4 Test vector RFC1320 #4
depends_on:1
3:char*:"MD4":char*:"message digest":hex:"d9130a8164549fe818874806e1c7014b"
generic mbedtls_md4 Test vector RFC1320 #5
depends_on:1
3:char*:"MD4":char*:"abcdefghijklmnopqrstuvwxyz":hex:"d79e1c308aa5bbcdeea8ed63df412da9"
generic mbedtls_md4 Test vector RFC1320 #6
depends_on:1
3:char*:"MD4":char*:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789":hex:"043f8582f241db351ce627e153e7f0e4"
generic mbedtls_md4 Test vector RFC1320 #7
depends_on:1
3:char*:"MD4":char*:"12345678901234567890123456789012345678901234567890123456789012345678901234567890":hex:"e33b4ddc9c38f2199c3e7b164fcc0536"
generic mbedtls_md5 Test vector RFC1321 #1
depends_on:2
3:char*:"MD5":char*:"":hex:"d41d8cd98f00b204e9800998ecf8427e"
generic mbedtls_md5 Test vector RFC1321 #2
depends_on:2
3:char*:"MD5":char*:"a":hex:"0cc175b9c0f1b6a831c399e269772661"
generic mbedtls_md5 Test vector RFC1321 #3
depends_on:2
3:char*:"MD5":char*:"abc":hex:"900150983cd24fb0d6963f7d28e17f72"
generic mbedtls_md5 Test vector RFC1321 #4
depends_on:2
3:char*:"MD5":char*:"message digest":hex:"f96b697d7cb7938d525a2f31aaf161d0"
generic mbedtls_md5 Test vector RFC1321 #5
depends_on:2
3:char*:"MD5":char*:"abcdefghijklmnopqrstuvwxyz":hex:"c3fcd3d76192e4007dfb496cca67e13b"
generic mbedtls_md5 Test vector RFC1321 #6
depends_on:2
3:char*:"MD5":char*:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789":hex:"d174ab98d277d9f5a5611c2c9f419d9f"
generic mbedtls_md5 Test vector RFC1321 #7
depends_on:2
3:char*:"MD5":char*:"12345678901234567890123456789012345678901234567890123456789012345678901234567890":hex:"57edf4a22be3c955ac49da2e2107b67a"
generic mbedtls_ripemd160 Test vector from paper #1
depends_on:3
3:char*:"RIPEMD160":char*:"":hex:"9c1185a5c5e9fc54612808977ee8f548b2258d31"
generic mbedtls_ripemd160 Test vector from paper #2
depends_on:3
3:char*:"RIPEMD160":char*:"a":hex:"0bdc9d2d256b3ee9daae347be6f4dc835a467ffe"
generic mbedtls_ripemd160 Test vector from paper #3
depends_on:3
3:char*:"RIPEMD160":char*:"abc":hex:"8eb208f7e05d987a9b044a8e98c6b087f15a0bfc"
generic mbedtls_ripemd160 Test vector from paper #4
depends_on:3
3:char*:"RIPEMD160":char*:"message digest":hex:"5d0689ef49d2fae572b881b123a85ffa21595f36"
generic mbedtls_ripemd160 Test vector from paper #5
depends_on:3
3:char*:"RIPEMD160":char*:"abcdefghijklmnopqrstuvwxyz":hex:"f71c27109c692c1b56bbdceb5b9d2865b3708dbc"
generic mbedtls_ripemd160 Test vector from paper #6
depends_on:3
3:char*:"RIPEMD160":char*:"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq":hex:"12a053384a9c0c88e405a06c27dcf49ada62eb2b"
generic mbedtls_ripemd160 Test vector from paper #7
depends_on:3
3:char*:"RIPEMD160":char*:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789":hex:"b0e20b6e3116640286ed3a87a5713079b21f5189"
generic mbedtls_ripemd160 Test vector from paper #8
depends_on:3
3:char*:"RIPEMD160":char*:"12345678901234567890123456789012345678901234567890123456789012345678901234567890":hex:"9b752e45573d4b39f4dbd3323cab82bf63326bfb"
generic HMAC-MD2 Hash File OpenSSL test #1
depends_on:0
7:char*:"MD2":int:16:hex:"61616161616161616161616161616161":hex:"b91ce5ac77d33c234e61002ed6":hex:"d5732582f494f5ddf35efd166c85af9c"
generic HMAC-MD2 Hash File OpenSSL test #2
depends_on:0
7:char*:"MD2":int:16:hex:"61616161616161616161616161616161":hex:"270fcf11f27c27448457d7049a7edb084a3e554e0b2acf5806982213f0ad516402e4c869c4ff2171e18e3489baa3125d2c3056ebb616296f9b6aa97ef68eeabcdc0b6dde47775004096a241efcf0a90d19b34e898cc7340cdc940f8bdd46e23e352f34bca131d4d67a7c2ddb8d0d68b67f06152a128168e1c341c37e0a66c5018999b7059bcc300beed2c19dd1152d2fe062853293b8f3c8b5":hex:"54ab68503f7d1b5c7741340dff2722a9"
generic HMAC-MD2 Hash File OpenSSL test #3
depends_on:0
7:char*:"MD2":int:16:hex:"61616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161":hex:"b91ce5ac77d33c234e61002ed6":hex:"d850e5f554558cf0fe79a0612e1d0365"
generic HMAC-MD4 Hash File OpenSSL test #1
depends_on:1
7:char*:"MD4":int:16:hex:"61616161616161616161616161616161":hex:"b91ce5ac77d33c234e61002ed6":hex:"eabd0fbefb82fb0063a25a6d7b8bdc0f"
generic HMAC-MD4 Hash File OpenSSL test #2
depends_on:1
7:char*:"MD4":int:16:hex:"61616161616161616161616161616161":hex:"270fcf11f27c27448457d7049a7edb084a3e554e0b2acf5806982213f0ad516402e4c869c4ff2171e18e3489baa3125d2c3056ebb616296f9b6aa97ef68eeabcdc0b6dde47775004096a241efcf0a90d19b34e898cc7340cdc940f8bdd46e23e352f34bca131d4d67a7c2ddb8d0d68b67f06152a128168e1c341c37e0a66c5018999b7059bcc300beed2c19dd1152d2fe062853293b8f3c8b5":hex:"cec3c5e421a7b783aa89cacf78daf6dc"
generic HMAC-MD4 Hash File OpenSSL test #3
depends_on:1
7:char*:"MD4":int:16:hex:"61616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161":hex:"b91ce5ac77d33c234e61002ed6":hex:"ad5f0a04116109b397b57f9cc9b6df4b"
generic HMAC-MD5 Hash File OpenSSL test #1
depends_on:2
7:char*:"MD5":int:16:hex:"61616161616161616161616161616161":hex:"b91ce5ac77d33c234e61002ed6":hex:"42552882f00bd4633ea81135a184b284"
generic HMAC-MD5 Hash File OpenSSL test #2
depends_on:2
7:char*:"MD5":int:16:hex:"61616161616161616161616161616161":hex:"270fcf11f27c27448457d7049a7edb084a3e554e0b2acf5806982213f0ad516402e4c869c4ff2171e18e3489baa3125d2c3056ebb616296f9b6aa97ef68eeabcdc0b6dde47775004096a241efcf0a90d19b34e898cc7340cdc940f8bdd46e23e352f34bca131d4d67a7c2ddb8d0d68b67f06152a128168e1c341c37e0a66c5018999b7059bcc300beed2c19dd1152d2fe062853293b8f3c8b5":hex:"a16a842891786d01fe50ba7731db7464"
generic HMAC-MD5 Hash File OpenSSL test #3
depends_on:2
7:char*:"MD5":int:16:hex:"61616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161":hex:"b91ce5ac77d33c234e61002ed6":hex:"e97f623936f98a7f741c4bd0612fecc2"
HMAC-MD2 Bouncy Castle test #1
depends_on:0
7:char*:"MD2":int:16:hex:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":hex:"4869205468657265":hex:"dc1923ef5f161d35bef839ca8c807808"
HMAC-MD4 Bouncy Castle test #1
depends_on:1
7:char*:"MD4":int:16:hex:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":hex:"4869205468657265":hex:"5570ce964ba8c11756cdc3970278ff5a"
HMAC-MD5 Bouncy Castle test #1
depends_on:2
7:char*:"MD5":int:16:hex:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":hex:"4869205468657265":hex:"5ccec34ea9656392457fa1ac27f08fbc"
generic HMAC-MD5 Test Vector RFC2202 #1
depends_on:2
7:char*:"MD5":int:16:hex:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":hex:"4869205468657265":hex:"9294727a3638bb1c13f48ef8158bfc9d"
generic HMAC-MD5 Test Vector RFC2202 #2
depends_on:2
7:char*:"MD5":int:16:hex:"4a656665":hex:"7768617420646f2079612077616e7420666f72206e6f7468696e673f":hex:"750c783e6ab0b503eaa86e310a5db738"
generic HMAC-MD5 Test Vector RFC2202 #3
depends_on:2
7:char*:"MD5":int:16:hex:"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa":hex:"dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd":hex:"56be34521d144c88dbb8c733f0e8b3f6"
generic HMAC-MD5 Test Vector RFC2202 #4
depends_on:2
7:char*:"MD5":int:16:hex:"0102030405060708090a0b0c0d0e0f10111213141516171819":hex:"cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd":hex:"697eaf0aca3a3aea3a75164746ffaa79"
generic HMAC-MD5 Test Vector RFC2202 #5
depends_on:2
7:char*:"MD5":int:12:hex:"0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c":hex:"546573742057697468205472756e636174696f6e":hex:"56461ef2342edc00f9bab995"
generic HMAC-MD5 Test Vector RFC2202 #6
depends_on:2
7:char*:"MD5":int:16:hex:"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa":hex:"54657374205573696e67204c6172676572205468616e20426c6f636b2d53697a65204b6579202d2048617368204b6579204669727374":hex:"6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd"
generic HMAC-MD5 Test Vector RFC2202 #7
depends_on:2
7:char*:"MD5":int:16:hex:"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa":hex:"54657374205573696e67204c6172676572205468616e20426c6f636b2d53697a65204b657920616e64204c6172676572205468616e204f6e6520426c6f636b2d53697a652044617461":hex:"6f630fad67cda0ee1fb1f562db3aa53e"
generic HMAC-RIPEMD160 Test vector RFC 2286 #1
depends_on:3
7:char*:"RIPEMD160":int:20:hex:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":hex:"4869205468657265":hex:"24cb4bd67d20fc1a5d2ed7732dcc39377f0a5668"
generic HMAC-RIPEMD160 Test vector RFC 2286 #2
depends_on:3
7:char*:"RIPEMD160":int:20:hex:"4a656665":hex:"7768617420646f2079612077616e7420666f72206e6f7468696e673f":hex:"dda6c0213a485a9e24f4742064a7f033b43c4069"
generic HMAC-RIPEMD160 Test vector RFC 2286 #3
depends_on:3
7:char*:"RIPEMD160":int:20:hex:"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa":hex:"dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd":hex:"b0b105360de759960ab4f35298e116e295d8e7c1"
generic HMAC-RIPEMD160 Test vector RFC 2286 #4
depends_on:3
7:char*:"RIPEMD160":int:20:hex:"0102030405060708090a0b0c0d0e0f10111213141516171819":hex:"cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd":hex:"d5ca862f4d21d5e610e18b4cf1beb97a4365ecf4"
generic HMAC-RIPEMD160 Test vector RFC 2286 #5
depends_on:3
7:char*:"RIPEMD160":int:20:hex:"0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c":hex:"546573742057697468205472756e636174696f6e":hex:"7619693978f91d90539ae786500ff3d8e0518e39"
generic HMAC-RIPEMD160 Test vector RFC 2286 #6
depends_on:3
7:char*:"RIPEMD160":int:20:hex:"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa":hex:"54657374205573696e67204c6172676572205468616e20426c6f636b2d53697a65204b6579202d2048617368204b6579204669727374":hex:"6466ca07ac5eac29e1bd523e5ada7605b791fd8b"
generic HMAC-RIPEMD160 Test vector RFC 2286 #7
depends_on:3
7:char*:"RIPEMD160":int:20:hex:"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa":hex:"54657374205573696e67204c6172676572205468616e20426c6f636b2d53697a65204b657920616e64204c6172676572205468616e204f6e6520426c6f636b2d53697a652044617461":hex:"69ea60798d71616cce5fd0871e23754cd75d5a0a"
generic multi step mbedtls_md2 Test vector RFC1319 #1
depends_on:8:0
5:char*:"MD2":char*:"":hex:"8350e5a3e24c153df2275c9f80692773"
generic multi step mbedtls_md2 Test vector RFC1319 #2
depends_on:0
5:char*:"MD2":char*:"a":hex:"32ec01ec4a6dac72c0ab96fb34c0b5d1"
generic multi step mbedtls_md2 Test vector RFC1319 #3
depends_on:0
5:char*:"MD2":char*:"abc":hex:"da853b0d3f88d99b30283a69e6ded6bb"
generic multi step mbedtls_md2 Test vector RFC1319 #4
depends_on:0
5:char*:"MD2":char*:"message digest":hex:"ab4f496bfb2a530b219ff33031fe06b0"
generic multi step mbedtls_md2 Test vector RFC1319 #5
depends_on:0
5:char*:"MD2":char*:"abcdefghijklmnopqrstuvwxyz":hex:"4e8ddff3650292ab5a4108c3aa47940b"
generic multi step mbedtls_md2 Test vector RFC1319 #6
depends_on:0
5:char*:"MD2":char*:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789":hex:"da33def2a42df13975352846c30338cd"
generic multi step mbedtls_md2 Test vector RFC1319 #7
depends_on:0
5:char*:"MD2":char*:"12345678901234567890123456789012345678901234567890123456789012345678901234567890":hex:"d5976f79d83d3a0dc9806c3c66f3efd8"
generic multi step mbedtls_md4 Test vector RFC1320 #1
depends_on:1
5:char*:"MD4":char*:"":hex:"31d6cfe0d16ae931b73c59d7e0c089c0"
generic multi step mbedtls_md4 Test vector RFC1320 #2
depends_on:1
5:char*:"MD4":char*:"a":hex:"bde52cb31de33e46245e05fbdbd6fb24"
generic multi step mbedtls_md4 Test vector RFC1320 #3
depends_on:1
5:char*:"MD4":char*:"abc":hex:"a448017aaf21d8525fc10ae87aa6729d"
generic multi step mbedtls_md4 Test vector RFC1320 #4
depends_on:1
5:char*:"MD4":char*:"message digest":hex:"d9130a8164549fe818874806e1c7014b"
generic multi step mbedtls_md4 Test vector RFC1320 #5
depends_on:1
5:char*:"MD4":char*:"abcdefghijklmnopqrstuvwxyz":hex:"d79e1c308aa5bbcdeea8ed63df412da9"
generic multi step mbedtls_md4 Test vector RFC1320 #6
depends_on:1
5:char*:"MD4":char*:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789":hex:"043f8582f241db351ce627e153e7f0e4"
generic multi step mbedtls_md4 Test vector RFC1320 #7
depends_on:1
5:char*:"MD4":char*:"12345678901234567890123456789012345678901234567890123456789012345678901234567890":hex:"e33b4ddc9c38f2199c3e7b164fcc0536"
generic multi step mbedtls_md5 Test vector RFC1321 #1
depends_on:2
5:char*:"MD5":char*:"":hex:"d41d8cd98f00b204e9800998ecf8427e"
generic multi step mbedtls_md5 Test vector RFC1321 #2
depends_on:2
5:char*:"MD5":char*:"a":hex:"0cc175b9c0f1b6a831c399e269772661"
generic multi step mbedtls_md5 Test vector RFC1321 #3
depends_on:2
5:char*:"MD5":char*:"abc":hex:"900150983cd24fb0d6963f7d28e17f72"
generic multi step mbedtls_md5 Test vector RFC1321 #4
depends_on:2
5:char*:"MD5":char*:"message digest":hex:"f96b697d7cb7938d525a2f31aaf161d0"
generic multi step mbedtls_md5 Test vector RFC1321 #5
depends_on:2
5:char*:"MD5":char*:"abcdefghijklmnopqrstuvwxyz":hex:"c3fcd3d76192e4007dfb496cca67e13b"
generic multi step mbedtls_md5 Test vector RFC1321 #6
depends_on:2
5:char*:"MD5":char*:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789":hex:"d174ab98d277d9f5a5611c2c9f419d9f"
generic multi step mbedtls_md5 Test vector RFC1321 #7
depends_on:2
5:char*:"MD5":char*:"12345678901234567890123456789012345678901234567890123456789012345678901234567890":hex:"57edf4a22be3c955ac49da2e2107b67a"
generic multi step mbedtls_ripemd160 Test vector from paper #1
depends_on:3
5:char*:"RIPEMD160":char*:"":hex:"9c1185a5c5e9fc54612808977ee8f548b2258d31"
generic multi step mbedtls_ripemd160 Test vector from paper #2
depends_on:3
5:char*:"RIPEMD160":char*:"a":hex:"0bdc9d2d256b3ee9daae347be6f4dc835a467ffe"
generic multi step mbedtls_ripemd160 Test vector from paper #3
depends_on:3
5:char*:"RIPEMD160":char*:"abc":hex:"8eb208f7e05d987a9b044a8e98c6b087f15a0bfc"
generic multi step mbedtls_ripemd160 Test vector from paper #4
depends_on:3
5:char*:"RIPEMD160":char*:"message digest":hex:"5d0689ef49d2fae572b881b123a85ffa21595f36"
generic multi step mbedtls_ripemd160 Test vector from paper #5
depends_on:3
5:char*:"RIPEMD160":char*:"abcdefghijklmnopqrstuvwxyz":hex:"f71c27109c692c1b56bbdceb5b9d2865b3708dbc"
generic multi step mbedtls_ripemd160 Test vector from paper #6
depends_on:3
5:char*:"RIPEMD160":char*:"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq":hex:"12a053384a9c0c88e405a06c27dcf49ada62eb2b"
generic multi step mbedtls_ripemd160 Test vector from paper #7
depends_on:3
5:char*:"RIPEMD160":char*:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789":hex:"b0e20b6e3116640286ed3a87a5713079b21f5189"
generic multi step mbedtls_ripemd160 Test vector from paper #8
depends_on:3
5:char*:"RIPEMD160":char*:"12345678901234567890123456789012345678901234567890123456789012345678901234567890":hex:"9b752e45573d4b39f4dbd3323cab82bf63326bfb"
generic multi step HMAC-MD2 Hash File OpenSSL test #1
depends_on:0
8:char*:"MD2":int:16:hex:"61616161616161616161616161616161":hex:"b91ce5ac77d33c234e61002ed6":hex:"d5732582f494f5ddf35efd166c85af9c"
generic multi step HMAC-MD2 Hash File OpenSSL test #2
depends_on:0
8:char*:"MD2":int:16:hex:"61616161616161616161616161616161":hex:"270fcf11f27c27448457d7049a7edb084a3e554e0b2acf5806982213f0ad516402e4c869c4ff2171e18e3489baa3125d2c3056ebb616296f9b6aa97ef68eeabcdc0b6dde47775004096a241efcf0a90d19b34e898cc7340cdc940f8bdd46e23e352f34bca131d4d67a7c2ddb8d0d68b67f06152a128168e1c341c37e0a66c5018999b7059bcc300beed2c19dd1152d2fe062853293b8f3c8b5":hex:"54ab68503f7d1b5c7741340dff2722a9"
generic multi step HMAC-MD2 Hash File OpenSSL test #3
depends_on:0
8:char*:"MD2":int:16:hex:"61616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161":hex:"b91ce5ac77d33c234e61002ed6":hex:"d850e5f554558cf0fe79a0612e1d0365"
generic multi step HMAC-MD4 Hash File OpenSSL test #1
depends_on:1
8:char*:"MD4":int:16:hex:"61616161616161616161616161616161":hex:"b91ce5ac77d33c234e61002ed6":hex:"eabd0fbefb82fb0063a25a6d7b8bdc0f"
generic multi step HMAC-MD4 Hash File OpenSSL test #2
depends_on:1
8:char*:"MD4":int:16:hex:"61616161616161616161616161616161":hex:"270fcf11f27c27448457d7049a7edb084a3e554e0b2acf5806982213f0ad516402e4c869c4ff2171e18e3489baa3125d2c3056ebb616296f9b6aa97ef68eeabcdc0b6dde47775004096a241efcf0a90d19b34e898cc7340cdc940f8bdd46e23e352f34bca131d4d67a7c2ddb8d0d68b67f06152a128168e1c341c37e0a66c5018999b7059bcc300beed2c19dd1152d2fe062853293b8f3c8b5":hex:"cec3c5e421a7b783aa89cacf78daf6dc"
generic multi step HMAC-MD4 Hash File OpenSSL test #3
depends_on:1
8:char*:"MD4":int:16:hex:"61616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161":hex:"b91ce5ac77d33c234e61002ed6":hex:"ad5f0a04116109b397b57f9cc9b6df4b"
generic multi step HMAC-MD5 Hash File OpenSSL test #1
depends_on:2
8:char*:"MD5":int:16:hex:"61616161616161616161616161616161":hex:"b91ce5ac77d33c234e61002ed6":hex:"42552882f00bd4633ea81135a184b284"
generic multi step HMAC-MD5 Hash File OpenSSL test #2
depends_on:2
8:char*:"MD5":int:16:hex:"61616161616161616161616161616161":hex:"270fcf11f27c27448457d7049a7edb084a3e554e0b2acf5806982213f0ad516402e4c869c4ff2171e18e3489baa3125d2c3056ebb616296f9b6aa97ef68eeabcdc0b6dde47775004096a241efcf0a90d19b34e898cc7340cdc940f8bdd46e23e352f34bca131d4d67a7c2ddb8d0d68b67f06152a128168e1c341c37e0a66c5018999b7059bcc300beed2c19dd1152d2fe062853293b8f3c8b5":hex:"a16a842891786d01fe50ba7731db7464"
generic multi step HMAC-MD5 Hash File OpenSSL test #3
depends_on:2
8:char*:"MD5":int:16:hex:"61616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161":hex:"b91ce5ac77d33c234e61002ed6":hex:"e97f623936f98a7f741c4bd0612fecc2"
generic multi step HMAC-MD5 Test Vector RFC2202 #1
depends_on:2
8:char*:"MD5":int:16:hex:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":hex:"4869205468657265":hex:"9294727a3638bb1c13f48ef8158bfc9d"
generic multi step HMAC-MD5 Test Vector RFC2202 #2
depends_on:2
8:char*:"MD5":int:16:hex:"4a656665":hex:"7768617420646f2079612077616e7420666f72206e6f7468696e673f":hex:"750c783e6ab0b503eaa86e310a5db738"
generic multi step HMAC-MD5 Test Vector RFC2202 #3
depends_on:2
8:char*:"MD5":int:16:hex:"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa":hex:"dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd":hex:"56be34521d144c88dbb8c733f0e8b3f6"
generic multi step HMAC-MD5 Test Vector RFC2202 #4
depends_on:2
8:char*:"MD5":int:16:hex:"0102030405060708090a0b0c0d0e0f10111213141516171819":hex:"cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd":hex:"697eaf0aca3a3aea3a75164746ffaa79"
generic multi step HMAC-MD5 Test Vector RFC2202 #5
depends_on:2
8:char*:"MD5":int:12:hex:"0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c":hex:"546573742057697468205472756e636174696f6e":hex:"56461ef2342edc00f9bab995"
generic multi step HMAC-MD5 Test Vector RFC2202 #6
depends_on:2
8:char*:"MD5":int:16:hex:"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa":hex:"54657374205573696e67204c6172676572205468616e20426c6f636b2d53697a65204b6579202d2048617368204b6579204669727374":hex:"6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd"
generic multi step HMAC-MD5 Test Vector RFC2202 #7
depends_on:2
8:char*:"MD5":int:16:hex:"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa":hex:"54657374205573696e67204c6172676572205468616e20426c6f636b2d53697a65204b657920616e64204c6172676572205468616e204f6e6520426c6f636b2d53697a652044617461":hex:"6f630fad67cda0ee1fb1f562db3aa53e"
generic multi step HMAC-RIPEMD160 Test vector RFC 2286 #1
depends_on:3
8:char*:"RIPEMD160":int:20:hex:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":hex:"4869205468657265":hex:"24cb4bd67d20fc1a5d2ed7732dcc39377f0a5668"
generic multi step HMAC-RIPEMD160 Test vector RFC 2286 #2
depends_on:3
8:char*:"RIPEMD160":int:20:hex:"4a656665":hex:"7768617420646f2079612077616e7420666f72206e6f7468696e673f":hex:"dda6c0213a485a9e24f4742064a7f033b43c4069"
generic multi step HMAC-RIPEMD160 Test vector RFC 2286 #3
depends_on:3
8:char*:"RIPEMD160":int:20:hex:"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa":hex:"dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd":hex:"b0b105360de759960ab4f35298e116e295d8e7c1"
generic multi step HMAC-RIPEMD160 Test vector RFC 2286 #4
depends_on:3
8:char*:"RIPEMD160":int:20:hex:"0102030405060708090a0b0c0d0e0f10111213141516171819":hex:"cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd":hex:"d5ca862f4d21d5e610e18b4cf1beb97a4365ecf4"
generic multi step HMAC-RIPEMD160 Test vector RFC 2286 #5
depends_on:3
8:char*:"RIPEMD160":int:20:hex:"0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c":hex:"546573742057697468205472756e636174696f6e":hex:"7619693978f91d90539ae786500ff3d8e0518e39"
generic multi step HMAC-RIPEMD160 Test vector RFC 2286 #6
depends_on:3
8:char*:"RIPEMD160":int:20:hex:"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa":hex:"54657374205573696e67204c6172676572205468616e20426c6f636b2d53697a65204b6579202d2048617368204b6579204669727374":hex:"6466ca07ac5eac29e1bd523e5ada7605b791fd8b"
generic multi step HMAC-RIPEMD160 Test vector RFC 2286 #7
depends_on:3
8:char*:"RIPEMD160":int:20:hex:"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa":hex:"54657374205573696e67204c6172676572205468616e20426c6f636b2d53697a65204b657920616e64204c6172676572205468616e204f6e6520426c6f636b2d53697a652044617461":hex:"69ea60798d71616cce5fd0871e23754cd75d5a0a"
generic MD2 Hash file #1
depends_on:0
9:char*:"MD2":char*:"/zip/third_party/mbedtls/test/data/hash_file_1":hex:"b593c098712d2e21628c8986695451a8"
generic MD2 Hash file #2
depends_on:0
9:char*:"MD2":char*:"/zip/third_party/mbedtls/test/data/hash_file_2":hex:"3c027b7409909a4c4b26bbab69ad9f4f"
generic MD2 Hash file #3
depends_on:0
9:char*:"MD2":char*:"/zip/third_party/mbedtls/test/data/hash_file_3":hex:"6bb43eb285e81f414083a94cdbe2989d"
generic MD2 Hash file #4
depends_on:0
9:char*:"MD2":char*:"/zip/third_party/mbedtls/test/data/hash_file_4":hex:"8350e5a3e24c153df2275c9f80692773"
generic MD4 Hash file #1
depends_on:1
9:char*:"MD4":char*:"/zip/third_party/mbedtls/test/data/hash_file_1":hex:"8d19772c176bd27153b9486715e2c0b9"
generic MD4 Hash file #2
depends_on:1
9:char*:"MD4":char*:"/zip/third_party/mbedtls/test/data/hash_file_2":hex:"f2ac53b8542882a5a0007c6f84b4d9fd"
generic MD4 Hash file #3
depends_on:1
9:char*:"MD4":char*:"/zip/third_party/mbedtls/test/data/hash_file_3":hex:"195c15158e2d07881d9a654095ce4a42"
generic MD4 Hash file #4
depends_on:1
9:char*:"MD4":char*:"/zip/third_party/mbedtls/test/data/hash_file_4":hex:"31d6cfe0d16ae931b73c59d7e0c089c0"
generic MD5 Hash file #1
depends_on:2
9:char*:"MD5":char*:"/zip/third_party/mbedtls/test/data/hash_file_1":hex:"52bcdc983c9ed64fc148a759b3c7a415"
generic MD5 Hash file #2
depends_on:2
9:char*:"MD5":char*:"/zip/third_party/mbedtls/test/data/hash_file_2":hex:"d17d466f15891df10542207ae78277f0"
generic MD5 Hash file #3
depends_on:2
9:char*:"MD5":char*:"/zip/third_party/mbedtls/test/data/hash_file_3":hex:"d945bcc6200ea95d061a2a818167d920"
generic MD5 Hash file #4
depends_on:2
9:char*:"MD5":char*:"/zip/third_party/mbedtls/test/data/hash_file_4":hex:"d41d8cd98f00b204e9800998ecf8427e"
generic RIPEMD160 Hash file #0 (from paper)
depends_on:3
9:char*:"RIPEMD160":char*:"/zip/third_party/mbedtls/test/data/hash_file_5":hex:"52783243c1697bdbe16d37f97f68f08325dc1528"
generic RIPEMD160 Hash file #1
depends_on:3
9:char*:"RIPEMD160":char*:"/zip/third_party/mbedtls/test/data/hash_file_1":hex:"82f1d072f0ec0c2b353703a7b575a04c113af1a6"
generic RIPEMD160 Hash file #2
depends_on:3
9:char*:"RIPEMD160":char*:"/zip/third_party/mbedtls/test/data/hash_file_2":hex:"996fbc8b79206ba7393ebcd246584069b1c08f0f"
generic RIPEMD160 Hash file #3
depends_on:3
9:char*:"RIPEMD160":char*:"/zip/third_party/mbedtls/test/data/hash_file_3":hex:"8653b46d65998fa8c8846efa17937e742533ae48"
generic RIPEMD160 Hash file #4
depends_on:3
9:char*:"RIPEMD160":char*:"/zip/third_party/mbedtls/test/data/hash_file_4":hex:"9c1185a5c5e9fc54612808977ee8f548b2258d31"
generic HMAC-SHA-1 Test Vector FIPS-198a #1
depends_on:4
7:char*:"SHA1":int:20:hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f":hex:"53616d706c65202331":hex:"4f4ca3d5d68ba7cc0a1208c9c61e9c5da0403c0a"
generic HMAC-SHA-1 Test Vector FIPS-198a #2
depends_on:4
7:char*:"SHA1":int:20:hex:"303132333435363738393a3b3c3d3e3f40414243":hex:"53616d706c65202332":hex:"0922d3405faa3d194f82a45830737d5cc6c75d24"
generic HMAC-SHA-1 Test Vector FIPS-198a #3
depends_on:4
7:char*:"SHA1":int:20:hex:"505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3":hex:"53616d706c65202333":hex:"bcf41eab8bb2d802f3d05caf7cb092ecf8d1a3aa"
generic HMAC-SHA-1 Test Vector FIPS-198a #4
depends_on:4
7:char*:"SHA1":int:12:hex:"707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0":hex:"53616d706c65202334":hex:"9ea886efe268dbecce420c75"
generic HMAC-SHA-1 Test Vector NIST CAVS #1
depends_on:4
7:char*:"SHA1":int:10:hex:"7b10f4124b15c82e":hex:"27dcb5b1daf60cfd3e2f73d4d64ca9c684f8bf71fc682a46793b1790afa4feb100ca7aaff26f58f0e1d0ed42f1cdad1f474afa2e79d53a0c42892c4d7b327cbe46b295ed8da3b6ecab3d4851687a6f812b79df2f6b20f11f6706f5301790ca99625aad7391d84f78043d2a0a239b1477984c157bbc9276064e7a1a406b0612ca":hex:"4ead12c2fe3d6ea43acb"
generic HMAC-SHA-1 Test Vector NIST CAVS #2
depends_on:4
7:char*:"SHA1":int:10:hex:"4fe9fb902172a21b":hex:"4ceb3a7c13659c22fe51134f03dce4c239d181b63c6b0b59d367157fd05cab98384f92dfa482d2d5e78e72eef1b1838af4696026c54233d484ecbbe87f904df5546419f8567eafd232e6c2fcd3ee2b7682c63000524b078dbb2096f585007deae752562df1fe3b01278089e16f3be46e2d0f7cabac2d8e6cc02a2d0ca953425f":hex:"564428a67be1924b5793"
generic HMAC-SHA-1 Test Vector NIST CAVS #3
depends_on:4
7:char*:"SHA1":int:10:hex:"d1f01455f78c4fb4":hex:"00d40f67b57914bec456a3e3201ef1464be319a8d188c02e157af4b54f9b5a66d67f898a9bdbb19ff63a80aba6f246d013575721d52eb1b47a65def884011c49b257bcc2817fc853f106e8138ce386d7a5ac3103de0a3fa0ed6bb7af9ff66ebd1cc46fb86e4da0013d20a3c2dcd8fb828a4b70f7f104b41bf3f44682a66497ea":hex:"56a665a7cdfe610f9fc5"
generic HMAC-SHA-1 Test Vector NIST CAVS #4
depends_on:4
7:char*:"SHA1":int:10:hex:"4e5ef77fdf033a5b":hex:"e59326464e3201d195e29f2a3446ec1b1c9ff31154e2a4d0e40ed466f1bc855d29f76835624fa0127d29c9b1915939a046f385af7e5d47a23ba91f28bd22f811ea258dbbf3332bcd3543b8285d5df41bd064ffd64a341c22c4edb44f9c8d9e6df0c59dbf4a052a6c83da7478e179a6f3839c6870ff8ca8b9497f9ac1d725fdda":hex:"981c0a7a8423b63a8fa6"
generic HMAC-SHA-1 Test Vector NIST CAVS #5
depends_on:4
7:char*:"SHA1":int:10:hex:"bcd9ff8aa60be2be":hex:"51be4d0eb37bab714f92e19e9d70390655b363e8cd346a748245e731f437759cb8206412c8dab2ef1d4f36f880f41ff69d949da4594fdecb65e23cac1329b59e69e29bf875b38c31df6fa546c595f35cc2192aa750679a8a51a65e00e839d73a8d8c598a610d237fbe78955213589d80efcb73b95b8586f96d17b6f51a71c3b8":hex:"84633f9f5040c8971478"
generic HMAC-SHA-1 Test Vector NIST CAVS #6
depends_on:4
7:char*:"SHA1":int:10:hex:"4a661bce6ed86d21":hex:"5ff6c744f1aab1bc29697d71f67541b8b3cec3c7079183b10a83fb98a9ee251d4bac3e1cb581ca972aaed8efd7c2875a6fb4c991132f67c9742d45e53bc7e8eaa94b35b37a907be61086b426cd11088ac118934e85d968c9667fd69fc6f6ea38c0fe34710b7ece91211b9b7ea00acd31f022aa6726368f9928a1352f122233f1":hex:"739df59353ac6694e55e"
generic HMAC-SHA-1 Test Vector NIST CAVS #7
depends_on:4
7:char*:"SHA1":int:10:hex:"1287e1565a57b547":hex:"390ffdccc6171c11568d85b8f913e019bf4cd982ca9cd21ea730d41bdf3fcc0bc88ff48ba13a8f23deb2d96ec1033e7b2a58ca72b0c1e17bf03330db25d1e360fa6918009c4294bd1215b5ccd159a8f58bc3dc3d490eb7c3b9f887e8c98dbbb274a75373dcb695a59abd0219529d88518a96f92abc0bbcbda985c388f1fbbcc9":hex:"d78ddf08077c7d9e2ba6"
generic HMAC-SHA-224 Test Vector NIST CAVS #1
depends_on:5
7:char*:"SHA224":int:14:hex:"e055eb756697ee573fd3214811a9f7fa":hex:"3875847012ee42fe54a0027bdf38cca7021b83a2ed0503af69ef6c37c637bc1114fba40096c5947d736e19b7af3c68d95a4e3b8b073adbbb80f47e9db8f2d4f0018ddd847fabfdf9dd9b52c93e40458977725f6b7ba15f0816bb895cdf50401268f5d702b7e6a5f9faef57b8768c8a3fc14f9a4b3182b41d940e337d219b29ff":hex:"40a453133361cc48da11baf616ee"
generic HMAC-SHA-224 Test Vector NIST CAVS #2
depends_on:5
7:char*:"SHA224":int:14:hex:"88e5258b55b1623385eb9632fa7c57d6":hex:"ada76bb604be14326551701cf30e48a65eee80b44f0b9d4a07b1844543b7844a621097fdc99de57387458ae9354899b620d0617eabcaefa9eef3d413a33628054335ce656c26fa2986e0f111a6351096b283101ec7868871d770b370973c7405983f9756b3005a3eab492cfd0e7eb42e5c2e15fa6be8718c0a50acc4e5717230":hex:"81c783af538015cef3c60095df53"
generic HMAC-SHA-224 Test Vector NIST CAVS #3
depends_on:5
7:char*:"SHA224":int:14:hex:"85d402d822114d31abf75526e2538705":hex:"8020d8d98cc2e2298b32879c51c751e1dd5558fe2eabb8f158604297d6d072ce2261a1d6830b7cfe2617b57c7126f99c9476211d6161acd75d266da217ec8174b80484c9dc6f0448a0a036a3fc82e8bf54bdb71549368258d5d41f57978a4c266b92e8783ef66350215573d99be4089144b383ad8f3222bae8f3bf80ffb1bb2b":hex:"2aa0340ac9deafe3be38129daca0"
generic HMAC-SHA-224 Test Vector NIST CAVS #4
depends_on:5
7:char*:"SHA224":int:14:hex:"545c6eecc5ee46fa17c59f91a94f81ae":hex:"8fb7f3565593170152ddb2021874784e951977cfdd22f8b72a72a61320a8f2a35697b5e913f717805559b1af1861ee3ed42fb788481e4fd276b17bdbefcae7b4501dc5d20de5b7626dd5efdcd65294db4bdf682c33d9a9255c6435383fa5f1c886326a3acbc6bd50a33ab5b2dbb034ce0112d4e226bbcd57e3731a519aa1d784":hex:"3eb566eac54c4a3a9ef092469f24"
generic HMAC-SHA-224 Test Vector NIST CAVS #5
depends_on:5
7:char*:"SHA224":int:14:hex:"4466ab4dc438841a9750c7f173dff02e":hex:"2534c11c78c99cffaec8f722f04adc7045c7324d58ce98e37cfa94b6ed21ed7f58ce55379ef24b72d6d640ee9154f96c614734be9c408e225d7ba4cecc1179cc9f6e1808e1067aa8f244a99bd0c3267594c1887a40d167f8b7cf78db0d19f97b01fc50b8c86def490dfa7a5135002c33e71d77a8cce8ea0f93e0580439a33733":hex:"59f44a9bbed4875b892d22d6b5ab"
generic HMAC-SHA-224 Test Vector NIST CAVS #6
depends_on:5
7:char*:"SHA224":int:28:hex:"0e3dd9bb5e4cf0f09a4c11600af56d8d":hex:"f4589fa76c328ea25cf8bae582026ba40a59d45a546ff31cf80eb826088f69bb954c452c74586836416dee90a5255bc5d56d3b405b3705a5197045688b32fa984c3a3dfbdc9c2460a0b5e6312a624048bb6f170306535e9b371a3ab134a2642a230ad03d2c688cca80baeaee9a20e1d4c548b1cede29c6a45bf4df2c8c476f1a":hex:"12175b93e3da4c58217145e4dc0a1cf142fab9319bb501e037b350ba"
generic HMAC-SHA-224 Test Vector NIST CAVS #7
depends_on:5
7:char*:"SHA224":int:28:hex:"cda5187b0c5dcb0f8e5a8beed2306584":hex:"9011ae29b44c49b347487ce972965f16ade3c15be0856ce9c853a9739dba07e4f20d594ddc1dfe21560a65a4e458cfa17745575b915a30c7a9412ff8d1d689db9680dd2428c27588bb0dc92d2cd9445fe8f44b840a197c52c3c4333fff45533945134398df6436513cfab06c924046b8c795a5bd92e8d5f2de85bf306f2eed67":hex:"4aaba92b40e2a600feab176eb9b292d814864195c03342aad6f67f08"
generic HMAC-SHA-256 Test Vector NIST CAVS #1
depends_on:5
7:char*:"SHA256":int:16:hex:"cdffd34e6b16fdc0":hex:"d83e78b99ab61709608972b36e76a575603db742269cc5dd4e7d5ca7816e26b65151c92632550cb4c5253c885d5fce53bc47459a1dbd5652786c4aac0145a532f12c05138af04cbb558101a7af5df478834c2146594dd73690d01a4fe72545894335f427ac70204798068cb86c5a600b40b414ede23590b41e1192373df84fe3":hex:"c6f0dde266cb4a26d41e8259d33499cc"
generic HMAC-SHA-256 Test Vector NIST CAVS #2
depends_on:5
7:char*:"SHA256":int:16:hex:"6d97bb5892245be2":hex:"13c2b391d59c0252ca5d2302beaaf88c4bcd779bb505ad9a122003dfae4cc123ad2bd036f225c4f040021a6b9fb8bd6f0281cf2e2631a732bdc71693cc42ef6d52b6c6912a9ef77b3274eb85ad7f965ae6ed44ac1721962a884ec7acfb4534b1488b1c0c45afa4dae8da1eb7b0a88a3240365d7e4e7d826abbde9f9203fd99d7":hex:"31588e241b015319a5ab8c4527296498"
generic HMAC-SHA-256 Test Vector NIST CAVS #3
depends_on:5
7:char*:"SHA256":int:16:hex:"3c7fc8a70b49007a":hex:"60024e428a39c8b8bb2e9591bad9dc2115dfbfd716b6eb7af30a6eb34560caccbbfa47b710fa8d523aca71e9e5ba10fc1feb1a43556d71f07ea4f33496f093044e8caf1d02b79e46eb1288d5964a7a7494f6b92574c35784eece054c6151281d80822f7d47b8231c35d07f5cb5cf4310ddc844845a01c6bfab514c048eccaf9f":hex:"1c98c94a32bec9f253c21070f82f8438"
generic HMAC-SHA-256 Test Vector NIST CAVS #4
depends_on:5
7:char*:"SHA256":int:24:hex:"369f33f85b927a07":hex:"ae8e2a94ca386d448cbacdb0e9040ae3cb297c296363052cc157455da29a0c95897315fc11e3f12b81e2418da1ec280bccbc00e847584ce9d14deeba7b3c9b8dba958b04bba37551f6c9ba9c060be1a4b8cf43aa62e5078b76c6512c5619b71a6a7cf5727180e1ff14f5a1a3c1691bf8b6ebad365c151e58d749d57adb3a4986":hex:"60b90383286533d309de46593e6ce39fc51fb00a8d88278c"
generic HMAC-SHA-256 Test Vector NIST CAVS #5
depends_on:5
7:char*:"SHA256":int:24:hex:"e5179687582b4dc4":hex:"ce103bdacdf32f614f6727bcb31ca1c2824a850d00f5585b016fb234fe1ef2cd687f302d3c6b738ed89a24060d65c36675d0d96307c72ef3e8a83bfa8402e226de9d5d1724ba75c4879bf41a4a465ce61887d9f49a34757849b48bae81c27ebed76faae2ad669bca04747d409148d40812776e0ae2c395b3cb9c89981ce72d5c":hex:"509581f6816df4b8cc9f2cf42b7cc6e6a5a1e375a16f2412"
generic HMAC-SHA-256 Test Vector NIST CAVS #6
depends_on:5
7:char*:"SHA256":int:24:hex:"63cec6246aeb1b61":hex:"c178db908a405fa88aa255b8cad22b4057016585f139ee930388b083d86062fa0b3ea1f23f8a43bd11bee8464bcbd19b5ab9f6a8038d5245516f8274d20c8ee3033a07b908da528fa00343bb595deed500cab9745c4cb6391c23300f0d3584b090b3326c4cfa342620b78f9f5b4f27f7307ed770643ec1764aeae3dcf1a3ec69":hex:"64f3dd861b7c7d29fce9ae0ce9ed954b5d7141806ee9eec7"
generic HMAC-SHA-384 Test Vector NIST CAVS #1
depends_on:6:7
7:char*:"SHA384":int:32:hex:"91a7401817386948ca952f9a20ee55dc":hex:"2fea5b91035d6d501f3a834fa178bff4e64b99a8450432dafd32e4466b0e1e7781166f8a73f7e036b3b0870920f559f47bd1400a1a906e85e0dcf00a6c26862e9148b23806680f285f1fe4f93cdaf924c181a965465739c14f2268c8be8b471847c74b222577a1310bcdc1a85ef1468aa1a3fd4031213c97324b7509c9050a3d":hex:"6d7be9490058cf413cc09fd043c224c2ec4fa7859b13783000a9a593c9f75838"
generic HMAC-SHA-384 Test Vector NIST CAVS #2
depends_on:6:7
7:char*:"SHA384":int:32:hex:"d6cac19657061aa90a6da11cd2e9ea47":hex:"9f482e4655173135dfaa22a11bbbe6af263db48716406c5aec162ba3c4b41cad4f5a91558377521191c7343118beee65982929802913d67b6de5c4bdc3d27299bd722219d5ad2efa5bdb9ff7b229fc4bbc3f60719320cf2e7a51cad1133d21bad2d80919b1836ef825308b7c51c6b7677ac782e2bc30007afba065681cbdd215":hex:"f3d5f3c008175321aa7b2ea379eaa4f8b9dcc60f895ec8940b8162f80a7dfe9f"
generic HMAC-SHA-384 Test Vector NIST CAVS #3
depends_on:6:7
7:char*:"SHA384":int:32:hex:"e06366ad149b8442cd4c1abdddd0afde":hex:"2d140a194c02a5598f69174834679b8371234a0d505491f1bd03e128dd91a8bca2fb812e9d5da71613b5b00952ea78bf450d5b7547dea79135925085c7d3e6f52009c51ca3d88c6c09e9d074b0ee110736e0ec9b478b93efb34d7bf1c41b54decec43eab077a3aa4998ede53f67b4ea36c266745f9643d5360bdc8337c70dabf":hex:"c19c67eda6fe29f3667bee1c897c333ce7683094ae77e84b4c16378d290895a1"
generic HMAC-SHA-384 Test Vector NIST CAVS #4
depends_on:6:7
7:char*:"SHA384":int:48:hex:"01ac59f42f8bb91d1bd10fe6990d7a87":hex:"3caf18c476edd5615f343ac7b7d3a9da9efade755672d5ba4b8ae8a7505539ea2c124ff755ec0457fbe49e43480b3c71e7f4742ec3693aad115d039f90222b030fdc9440313691716d5302005808c07627483b916fdf61983063c2eb1268f2deeef42fc790334456bc6bad256e31fc9066de7cc7e43d1321b1866db45e905622":hex:"1985fa2163a5943fc5d92f1fe8831215e7e91f0bff5332bc713a072bdb3a8f9e5c5157463a3bfeb36231416e65973e64"
generic HMAC-SHA-384 Test Vector NIST CAVS #5 [#1]
depends_on:6:7
7:char*:"SHA384":int:48:hex:"fd74b9d9e102a3a80df1baf0cb35bace":hex:"1a068917584813d1689ccbd0370c2114d537cdc8cc52bf6db16d5535f8f7d1ad0c850a9fa0cf62373ffbf7642b1f1e8164010d350721d798d9f99e9724830399c2fce26377e83d38845675457865c03d4a07d741a505ef028343eb29fd46d0f761f3792886998c1e5c32ac3bc7e6f08faed194b34f06eff4d5d4a5b42c481e0e":hex:"a981eaf5de3d78b20ebd4414a4edd0657e3667cd808a0dbc430cf7252f73a5b24efa136039207bd59806897457d74e0c"
generic HMAC-SHA-384 Test Vector NIST CAVS #5 [#2]
depends_on:6:7
7:char*:"SHA384":int:48:hex:"9fe794f0e26b669fa5f6883149377c6c":hex:"6010c9745e8f1d44cfdc99e7e0fd79bc4271944c2d1d84dba589073dfc4ca5eb98c59356f60cd87bef28aeb83a832bde339b2087daf942aa1f67876c5d5ed33924bed4143bc12a2be532ccaf64daa7e2bc3c8872b9823b0533b6f5159135effe8c61545536975d7c3a61ba7365ec35f165bc92b4d19eb9156ade17dfa1bb4161":hex:"915ae61f8754698c2b6ef9629e93441f8541bd4258a5e05372d19136cfaefc0473b48d96119291b38eb1a3cb1982a986"
generic HMAC-SHA-512 Test Vector NIST CAVS #1
depends_on:6
7:char*:"SHA512":int:32:hex:"c95a17c09940a691ed2d621571b0eb844ede55a9":hex:"99cd28262e81f34878cdcebf4128e05e2098a7009278a66f4c785784d0e5678f3f2b22f86e982d273b6273a222ec61750b4556d766f1550a7aedfe83faedbc4bdae83fa560d62df17eb914d05fdaa48940551bac81d700f5fca7147295e386e8120d66742ec65c6ee8d89a92217a0f6266d0ddc60bb20ef679ae8299c8502c2f":hex:"6bc1379d156559ddee2ed420ea5d5c5ff3e454a1059b7ba72c350e77b6e9333c"
generic HMAC-SHA-512 Test Vector NIST CAVS #2
depends_on:6
7:char*:"SHA512":int:32:hex:"3b10b8fa718840d1dea8e9fc317476bcf55875fd":hex:"f04f5b7073d7d0274e8354433b390306c5607632f5f589c12edb62d55673aff2366d2e6b24de731adf92e654baa30b1cfd4a069788f65ec1b99b015d904d8832110dbd74eae35a81562d14ce4136d820ad0a55ff5489ba678fbbc1c27663ec1349d70e740f0e0ec27cfbe8971819f4789e486b50a2d7271d77e2aaea50de62fd":hex:"fc3c38c7a17e3ce06db033f1c172866f01a00045db55f2e234f71c82264f2ba2"
generic HMAC-SHA-512 Test Vector NIST CAVS #3
depends_on:6
7:char*:"SHA512":int:32:hex:"4803d311394600dc1e0d8fc8cedeb8bde3fe7c42":hex:"a10c125dd702a97153ad923ba5e9889cfac1ba169de370debe51f233735aa6effcc9785c4b5c7e48c477dc5c411ae6a959118584e26adc94b42c2b29b046f3cf01c65b24a24bd2e620bdf650a23bb4a72655b1100d7ce9a4dab697c6379754b4396c825de4b9eb73f2e6a6c0d0353bbdeaf706612800e137b858fdb30f3311c6":hex:"7cd8236c55102e6385f52279506df6fcc388ab75092da21395ce14a82b202ffa"
generic HMAC-SHA-512 Test Vector NIST CAVS #4
depends_on:6
7:char*:"SHA512":int:48:hex:"aeb2f3b977fa6c8e71e07c5a5c74ff58166de092":hex:"22457355dc76095abd46846b41cfe49a06ce42ac8857b4702fc771508dfb3626e0bfe851df897a07b36811ec433766e4b4166c26301b3493e7440d4554b0ef6ac20f1a530e58fac8aeba4e9ff2d4898d8a28783b49cd269c2965fd7f8e4f2d60cf1e5284f2495145b72382aad90e153a90ecae125ad75336fb128825c23fb8b0":hex:"fa39bd8fcc3bfa218f9dea5d3b2ce10a7619e31678a56d8a9d927b1fe703b125af445debe9a89a07db6194d27b44d85a"
generic HMAC-SHA-512 Test Vector NIST CAVS #5
depends_on:6
7:char*:"SHA512":int:48:hex:"4285d3d7744da52775bb44ca436a3154f7980309":hex:"208f0b6f2de2e5aa5df11927ddc6df485edc1193181c484d0f0a434a95418803101d4de9fdb798f93516a6916fa38a8207de1666fe50fe3441c03b112eaaae6954ed063f7ac4e3c1e3f73b20d153fe9e4857f5e91430f0a70ee820529adac2467469fd18adf10e2af0fea27c0abc83c5a9af77c364a466cffce8bab4e2b70bc1":hex:"fe7603f205b2774fe0f14ecfa3e338e90608a806d11ca459dff5ce36b1b264ecd3af5f0492a7521d8da3102ba20927a5"
generic HMAC-SHA-512 Test Vector NIST CAVS #6
depends_on:6
7:char*:"SHA512":int:48:hex:"8ab783d5acf32efa0d9c0a21abce955e96630d89":hex:"17371e013dce839963d54418e97be4bd9fa3cb2a368a5220f5aa1b8aaddfa3bdefc91afe7c717244fd2fb640f5cb9d9bf3e25f7f0c8bc758883b89dcdce6d749d9672fed222277ece3e84b3ec01b96f70c125fcb3cbee6d19b8ef0873f915f173bdb05d81629ba187cc8ac1934b2f75952fb7616ae6bd812946df694bd2763af":hex:"9ac7ca8d1aefc166b046e4cf7602ebe181a0e5055474bff5b342106731da0d7e48e4d87bc0a6f05871574289a1b099f8"
generic multi step HMAC-SHA-1 Test Vector FIPS-198a #1
depends_on:4
8:char*:"SHA1":int:20:hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f":hex:"53616d706c65202331":hex:"4f4ca3d5d68ba7cc0a1208c9c61e9c5da0403c0a"
generic multi step HMAC-SHA-1 Test Vector FIPS-198a #2
depends_on:4
8:char*:"SHA1":int:20:hex:"303132333435363738393a3b3c3d3e3f40414243":hex:"53616d706c65202332":hex:"0922d3405faa3d194f82a45830737d5cc6c75d24"
generic multi step HMAC-SHA-1 Test Vector FIPS-198a #3
depends_on:4
8:char*:"SHA1":int:20:hex:"505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3":hex:"53616d706c65202333":hex:"bcf41eab8bb2d802f3d05caf7cb092ecf8d1a3aa"
generic multi step HMAC-SHA-1 Test Vector FIPS-198a #4
depends_on:4
8:char*:"SHA1":int:12:hex:"707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0":hex:"53616d706c65202334":hex:"9ea886efe268dbecce420c75"
generic multi step HMAC-SHA-1 Test Vector NIST CAVS #1
depends_on:4
8:char*:"SHA1":int:10:hex:"7b10f4124b15c82e":hex:"27dcb5b1daf60cfd3e2f73d4d64ca9c684f8bf71fc682a46793b1790afa4feb100ca7aaff26f58f0e1d0ed42f1cdad1f474afa2e79d53a0c42892c4d7b327cbe46b295ed8da3b6ecab3d4851687a6f812b79df2f6b20f11f6706f5301790ca99625aad7391d84f78043d2a0a239b1477984c157bbc9276064e7a1a406b0612ca":hex:"4ead12c2fe3d6ea43acb"
generic multi step HMAC-SHA-1 Test Vector NIST CAVS #2
depends_on:4
8:char*:"SHA1":int:10:hex:"4fe9fb902172a21b":hex:"4ceb3a7c13659c22fe51134f03dce4c239d181b63c6b0b59d367157fd05cab98384f92dfa482d2d5e78e72eef1b1838af4696026c54233d484ecbbe87f904df5546419f8567eafd232e6c2fcd3ee2b7682c63000524b078dbb2096f585007deae752562df1fe3b01278089e16f3be46e2d0f7cabac2d8e6cc02a2d0ca953425f":hex:"564428a67be1924b5793"
generic multi step HMAC-SHA-1 Test Vector NIST CAVS #3
depends_on:4
8:char*:"SHA1":int:10:hex:"d1f01455f78c4fb4":hex:"00d40f67b57914bec456a3e3201ef1464be319a8d188c02e157af4b54f9b5a66d67f898a9bdbb19ff63a80aba6f246d013575721d52eb1b47a65def884011c49b257bcc2817fc853f106e8138ce386d7a5ac3103de0a3fa0ed6bb7af9ff66ebd1cc46fb86e4da0013d20a3c2dcd8fb828a4b70f7f104b41bf3f44682a66497ea":hex:"56a665a7cdfe610f9fc5"
generic multi step HMAC-SHA-1 Test Vector NIST CAVS #4
depends_on:4
8:char*:"SHA1":int:10:hex:"4e5ef77fdf033a5b":hex:"e59326464e3201d195e29f2a3446ec1b1c9ff31154e2a4d0e40ed466f1bc855d29f76835624fa0127d29c9b1915939a046f385af7e5d47a23ba91f28bd22f811ea258dbbf3332bcd3543b8285d5df41bd064ffd64a341c22c4edb44f9c8d9e6df0c59dbf4a052a6c83da7478e179a6f3839c6870ff8ca8b9497f9ac1d725fdda":hex:"981c0a7a8423b63a8fa6"
generic multi step HMAC-SHA-1 Test Vector NIST CAVS #5
depends_on:4
8:char*:"SHA1":int:10:hex:"bcd9ff8aa60be2be":hex:"51be4d0eb37bab714f92e19e9d70390655b363e8cd346a748245e731f437759cb8206412c8dab2ef1d4f36f880f41ff69d949da4594fdecb65e23cac1329b59e69e29bf875b38c31df6fa546c595f35cc2192aa750679a8a51a65e00e839d73a8d8c598a610d237fbe78955213589d80efcb73b95b8586f96d17b6f51a71c3b8":hex:"84633f9f5040c8971478"
generic multi step HMAC-SHA-1 Test Vector NIST CAVS #6
depends_on:4
8:char*:"SHA1":int:10:hex:"4a661bce6ed86d21":hex:"5ff6c744f1aab1bc29697d71f67541b8b3cec3c7079183b10a83fb98a9ee251d4bac3e1cb581ca972aaed8efd7c2875a6fb4c991132f67c9742d45e53bc7e8eaa94b35b37a907be61086b426cd11088ac118934e85d968c9667fd69fc6f6ea38c0fe34710b7ece91211b9b7ea00acd31f022aa6726368f9928a1352f122233f1":hex:"739df59353ac6694e55e"
generic multi step HMAC-SHA-1 Test Vector NIST CAVS #7
depends_on:4
8:char*:"SHA1":int:10:hex:"1287e1565a57b547":hex:"390ffdccc6171c11568d85b8f913e019bf4cd982ca9cd21ea730d41bdf3fcc0bc88ff48ba13a8f23deb2d96ec1033e7b2a58ca72b0c1e17bf03330db25d1e360fa6918009c4294bd1215b5ccd159a8f58bc3dc3d490eb7c3b9f887e8c98dbbb274a75373dcb695a59abd0219529d88518a96f92abc0bbcbda985c388f1fbbcc9":hex:"d78ddf08077c7d9e2ba6"
generic multi step HMAC-SHA-224 Test Vector NIST CAVS #1
depends_on:5
8:char*:"SHA224":int:14:hex:"e055eb756697ee573fd3214811a9f7fa":hex:"3875847012ee42fe54a0027bdf38cca7021b83a2ed0503af69ef6c37c637bc1114fba40096c5947d736e19b7af3c68d95a4e3b8b073adbbb80f47e9db8f2d4f0018ddd847fabfdf9dd9b52c93e40458977725f6b7ba15f0816bb895cdf50401268f5d702b7e6a5f9faef57b8768c8a3fc14f9a4b3182b41d940e337d219b29ff":hex:"40a453133361cc48da11baf616ee"
generic multi step HMAC-SHA-224 Test Vector NIST CAVS #2
depends_on:5
8:char*:"SHA224":int:14:hex:"88e5258b55b1623385eb9632fa7c57d6":hex:"ada76bb604be14326551701cf30e48a65eee80b44f0b9d4a07b1844543b7844a621097fdc99de57387458ae9354899b620d0617eabcaefa9eef3d413a33628054335ce656c26fa2986e0f111a6351096b283101ec7868871d770b370973c7405983f9756b3005a3eab492cfd0e7eb42e5c2e15fa6be8718c0a50acc4e5717230":hex:"81c783af538015cef3c60095df53"
generic multi step HMAC-SHA-224 Test Vector NIST CAVS #3
depends_on:5
8:char*:"SHA224":int:14:hex:"85d402d822114d31abf75526e2538705":hex:"8020d8d98cc2e2298b32879c51c751e1dd5558fe2eabb8f158604297d6d072ce2261a1d6830b7cfe2617b57c7126f99c9476211d6161acd75d266da217ec8174b80484c9dc6f0448a0a036a3fc82e8bf54bdb71549368258d5d41f57978a4c266b92e8783ef66350215573d99be4089144b383ad8f3222bae8f3bf80ffb1bb2b":hex:"2aa0340ac9deafe3be38129daca0"
generic multi step HMAC-SHA-224 Test Vector NIST CAVS #4
depends_on:5
8:char*:"SHA224":int:14:hex:"545c6eecc5ee46fa17c59f91a94f81ae":hex:"8fb7f3565593170152ddb2021874784e951977cfdd22f8b72a72a61320a8f2a35697b5e913f717805559b1af1861ee3ed42fb788481e4fd276b17bdbefcae7b4501dc5d20de5b7626dd5efdcd65294db4bdf682c33d9a9255c6435383fa5f1c886326a3acbc6bd50a33ab5b2dbb034ce0112d4e226bbcd57e3731a519aa1d784":hex:"3eb566eac54c4a3a9ef092469f24"
generic multi step HMAC-SHA-224 Test Vector NIST CAVS #5
depends_on:5
8:char*:"SHA224":int:14:hex:"4466ab4dc438841a9750c7f173dff02e":hex:"2534c11c78c99cffaec8f722f04adc7045c7324d58ce98e37cfa94b6ed21ed7f58ce55379ef24b72d6d640ee9154f96c614734be9c408e225d7ba4cecc1179cc9f6e1808e1067aa8f244a99bd0c3267594c1887a40d167f8b7cf78db0d19f97b01fc50b8c86def490dfa7a5135002c33e71d77a8cce8ea0f93e0580439a33733":hex:"59f44a9bbed4875b892d22d6b5ab"
generic multi step HMAC-SHA-224 Test Vector NIST CAVS #6
depends_on:5
8:char*:"SHA224":int:28:hex:"0e3dd9bb5e4cf0f09a4c11600af56d8d":hex:"f4589fa76c328ea25cf8bae582026ba40a59d45a546ff31cf80eb826088f69bb954c452c74586836416dee90a5255bc5d56d3b405b3705a5197045688b32fa984c3a3dfbdc9c2460a0b5e6312a624048bb6f170306535e9b371a3ab134a2642a230ad03d2c688cca80baeaee9a20e1d4c548b1cede29c6a45bf4df2c8c476f1a":hex:"12175b93e3da4c58217145e4dc0a1cf142fab9319bb501e037b350ba"
generic multi step HMAC-SHA-224 Test Vector NIST CAVS #7
depends_on:5
8:char*:"SHA224":int:28:hex:"cda5187b0c5dcb0f8e5a8beed2306584":hex:"9011ae29b44c49b347487ce972965f16ade3c15be0856ce9c853a9739dba07e4f20d594ddc1dfe21560a65a4e458cfa17745575b915a30c7a9412ff8d1d689db9680dd2428c27588bb0dc92d2cd9445fe8f44b840a197c52c3c4333fff45533945134398df6436513cfab06c924046b8c795a5bd92e8d5f2de85bf306f2eed67":hex:"4aaba92b40e2a600feab176eb9b292d814864195c03342aad6f67f08"
generic multi step HMAC-SHA-256 Test Vector NIST CAVS #1
depends_on:5
8:char*:"SHA256":int:16:hex:"cdffd34e6b16fdc0":hex:"d83e78b99ab61709608972b36e76a575603db742269cc5dd4e7d5ca7816e26b65151c92632550cb4c5253c885d5fce53bc47459a1dbd5652786c4aac0145a532f12c05138af04cbb558101a7af5df478834c2146594dd73690d01a4fe72545894335f427ac70204798068cb86c5a600b40b414ede23590b41e1192373df84fe3":hex:"c6f0dde266cb4a26d41e8259d33499cc"
generic multi step HMAC-SHA-256 Test Vector NIST CAVS #2
depends_on:5
8:char*:"SHA256":int:16:hex:"6d97bb5892245be2":hex:"13c2b391d59c0252ca5d2302beaaf88c4bcd779bb505ad9a122003dfae4cc123ad2bd036f225c4f040021a6b9fb8bd6f0281cf2e2631a732bdc71693cc42ef6d52b6c6912a9ef77b3274eb85ad7f965ae6ed44ac1721962a884ec7acfb4534b1488b1c0c45afa4dae8da1eb7b0a88a3240365d7e4e7d826abbde9f9203fd99d7":hex:"31588e241b015319a5ab8c4527296498"
generic multi step HMAC-SHA-256 Test Vector NIST CAVS #3
depends_on:5
8:char*:"SHA256":int:16:hex:"3c7fc8a70b49007a":hex:"60024e428a39c8b8bb2e9591bad9dc2115dfbfd716b6eb7af30a6eb34560caccbbfa47b710fa8d523aca71e9e5ba10fc1feb1a43556d71f07ea4f33496f093044e8caf1d02b79e46eb1288d5964a7a7494f6b92574c35784eece054c6151281d80822f7d47b8231c35d07f5cb5cf4310ddc844845a01c6bfab514c048eccaf9f":hex:"1c98c94a32bec9f253c21070f82f8438"
generic multi step HMAC-SHA-256 Test Vector NIST CAVS #4
depends_on:5
8:char*:"SHA256":int:24:hex:"369f33f85b927a07":hex:"ae8e2a94ca386d448cbacdb0e9040ae3cb297c296363052cc157455da29a0c95897315fc11e3f12b81e2418da1ec280bccbc00e847584ce9d14deeba7b3c9b8dba958b04bba37551f6c9ba9c060be1a4b8cf43aa62e5078b76c6512c5619b71a6a7cf5727180e1ff14f5a1a3c1691bf8b6ebad365c151e58d749d57adb3a4986":hex:"60b90383286533d309de46593e6ce39fc51fb00a8d88278c"
generic multi step HMAC-SHA-256 Test Vector NIST CAVS #5
depends_on:5
8:char*:"SHA256":int:24:hex:"e5179687582b4dc4":hex:"ce103bdacdf32f614f6727bcb31ca1c2824a850d00f5585b016fb234fe1ef2cd687f302d3c6b738ed89a24060d65c36675d0d96307c72ef3e8a83bfa8402e226de9d5d1724ba75c4879bf41a4a465ce61887d9f49a34757849b48bae81c27ebed76faae2ad669bca04747d409148d40812776e0ae2c395b3cb9c89981ce72d5c":hex:"509581f6816df4b8cc9f2cf42b7cc6e6a5a1e375a16f2412"
generic multi step HMAC-SHA-256 Test Vector NIST CAVS #6
depends_on:5
8:char*:"SHA256":int:24:hex:"63cec6246aeb1b61":hex:"c178db908a405fa88aa255b8cad22b4057016585f139ee930388b083d86062fa0b3ea1f23f8a43bd11bee8464bcbd19b5ab9f6a8038d5245516f8274d20c8ee3033a07b908da528fa00343bb595deed500cab9745c4cb6391c23300f0d3584b090b3326c4cfa342620b78f9f5b4f27f7307ed770643ec1764aeae3dcf1a3ec69":hex:"64f3dd861b7c7d29fce9ae0ce9ed954b5d7141806ee9eec7"
generic multi step HMAC-SHA-384 Test Vector NIST CAVS #1
depends_on:6:7
8:char*:"SHA384":int:32:hex:"91a7401817386948ca952f9a20ee55dc":hex:"2fea5b91035d6d501f3a834fa178bff4e64b99a8450432dafd32e4466b0e1e7781166f8a73f7e036b3b0870920f559f47bd1400a1a906e85e0dcf00a6c26862e9148b23806680f285f1fe4f93cdaf924c181a965465739c14f2268c8be8b471847c74b222577a1310bcdc1a85ef1468aa1a3fd4031213c97324b7509c9050a3d":hex:"6d7be9490058cf413cc09fd043c224c2ec4fa7859b13783000a9a593c9f75838"
generic multi step HMAC-SHA-384 Test Vector NIST CAVS #2
depends_on:6:7
8:char*:"SHA384":int:32:hex:"d6cac19657061aa90a6da11cd2e9ea47":hex:"9f482e4655173135dfaa22a11bbbe6af263db48716406c5aec162ba3c4b41cad4f5a91558377521191c7343118beee65982929802913d67b6de5c4bdc3d27299bd722219d5ad2efa5bdb9ff7b229fc4bbc3f60719320cf2e7a51cad1133d21bad2d80919b1836ef825308b7c51c6b7677ac782e2bc30007afba065681cbdd215":hex:"f3d5f3c008175321aa7b2ea379eaa4f8b9dcc60f895ec8940b8162f80a7dfe9f"
generic multi step HMAC-SHA-384 Test Vector NIST CAVS #3
depends_on:6:7
8:char*:"SHA384":int:32:hex:"e06366ad149b8442cd4c1abdddd0afde":hex:"2d140a194c02a5598f69174834679b8371234a0d505491f1bd03e128dd91a8bca2fb812e9d5da71613b5b00952ea78bf450d5b7547dea79135925085c7d3e6f52009c51ca3d88c6c09e9d074b0ee110736e0ec9b478b93efb34d7bf1c41b54decec43eab077a3aa4998ede53f67b4ea36c266745f9643d5360bdc8337c70dabf":hex:"c19c67eda6fe29f3667bee1c897c333ce7683094ae77e84b4c16378d290895a1"
generic multi step HMAC-SHA-384 Test Vector NIST CAVS #4
depends_on:6:7
8:char*:"SHA384":int:48:hex:"01ac59f42f8bb91d1bd10fe6990d7a87":hex:"3caf18c476edd5615f343ac7b7d3a9da9efade755672d5ba4b8ae8a7505539ea2c124ff755ec0457fbe49e43480b3c71e7f4742ec3693aad115d039f90222b030fdc9440313691716d5302005808c07627483b916fdf61983063c2eb1268f2deeef42fc790334456bc6bad256e31fc9066de7cc7e43d1321b1866db45e905622":hex:"1985fa2163a5943fc5d92f1fe8831215e7e91f0bff5332bc713a072bdb3a8f9e5c5157463a3bfeb36231416e65973e64"
generic multi step HMAC-SHA-384 Test Vector NIST CAVS #5 [#1]
depends_on:6:7
8:char*:"SHA384":int:48:hex:"fd74b9d9e102a3a80df1baf0cb35bace":hex:"1a068917584813d1689ccbd0370c2114d537cdc8cc52bf6db16d5535f8f7d1ad0c850a9fa0cf62373ffbf7642b1f1e8164010d350721d798d9f99e9724830399c2fce26377e83d38845675457865c03d4a07d741a505ef028343eb29fd46d0f761f3792886998c1e5c32ac3bc7e6f08faed194b34f06eff4d5d4a5b42c481e0e":hex:"a981eaf5de3d78b20ebd4414a4edd0657e3667cd808a0dbc430cf7252f73a5b24efa136039207bd59806897457d74e0c"
generic multi step HMAC-SHA-384 Test Vector NIST CAVS #5 [#2]
depends_on:6:7
8:char*:"SHA384":int:48:hex:"9fe794f0e26b669fa5f6883149377c6c":hex:"6010c9745e8f1d44cfdc99e7e0fd79bc4271944c2d1d84dba589073dfc4ca5eb98c59356f60cd87bef28aeb83a832bde339b2087daf942aa1f67876c5d5ed33924bed4143bc12a2be532ccaf64daa7e2bc3c8872b9823b0533b6f5159135effe8c61545536975d7c3a61ba7365ec35f165bc92b4d19eb9156ade17dfa1bb4161":hex:"915ae61f8754698c2b6ef9629e93441f8541bd4258a5e05372d19136cfaefc0473b48d96119291b38eb1a3cb1982a986"
generic multi step HMAC-SHA-512 Test Vector NIST CAVS #1
depends_on:6
8:char*:"SHA512":int:32:hex:"c95a17c09940a691ed2d621571b0eb844ede55a9":hex:"99cd28262e81f34878cdcebf4128e05e2098a7009278a66f4c785784d0e5678f3f2b22f86e982d273b6273a222ec61750b4556d766f1550a7aedfe83faedbc4bdae83fa560d62df17eb914d05fdaa48940551bac81d700f5fca7147295e386e8120d66742ec65c6ee8d89a92217a0f6266d0ddc60bb20ef679ae8299c8502c2f":hex:"6bc1379d156559ddee2ed420ea5d5c5ff3e454a1059b7ba72c350e77b6e9333c"
generic multi step HMAC-SHA-512 Test Vector NIST CAVS #2
depends_on:6
8:char*:"SHA512":int:32:hex:"3b10b8fa718840d1dea8e9fc317476bcf55875fd":hex:"f04f5b7073d7d0274e8354433b390306c5607632f5f589c12edb62d55673aff2366d2e6b24de731adf92e654baa30b1cfd4a069788f65ec1b99b015d904d8832110dbd74eae35a81562d14ce4136d820ad0a55ff5489ba678fbbc1c27663ec1349d70e740f0e0ec27cfbe8971819f4789e486b50a2d7271d77e2aaea50de62fd":hex:"fc3c38c7a17e3ce06db033f1c172866f01a00045db55f2e234f71c82264f2ba2"
generic multi step HMAC-SHA-512 Test Vector NIST CAVS #3
depends_on:6
8:char*:"SHA512":int:32:hex:"4803d311394600dc1e0d8fc8cedeb8bde3fe7c42":hex:"a10c125dd702a97153ad923ba5e9889cfac1ba169de370debe51f233735aa6effcc9785c4b5c7e48c477dc5c411ae6a959118584e26adc94b42c2b29b046f3cf01c65b24a24bd2e620bdf650a23bb4a72655b1100d7ce9a4dab697c6379754b4396c825de4b9eb73f2e6a6c0d0353bbdeaf706612800e137b858fdb30f3311c6":hex:"7cd8236c55102e6385f52279506df6fcc388ab75092da21395ce14a82b202ffa"
generic multi step HMAC-SHA-512 Test Vector NIST CAVS #4
depends_on:6
8:char*:"SHA512":int:48:hex:"aeb2f3b977fa6c8e71e07c5a5c74ff58166de092":hex:"22457355dc76095abd46846b41cfe49a06ce42ac8857b4702fc771508dfb3626e0bfe851df897a07b36811ec433766e4b4166c26301b3493e7440d4554b0ef6ac20f1a530e58fac8aeba4e9ff2d4898d8a28783b49cd269c2965fd7f8e4f2d60cf1e5284f2495145b72382aad90e153a90ecae125ad75336fb128825c23fb8b0":hex:"fa39bd8fcc3bfa218f9dea5d3b2ce10a7619e31678a56d8a9d927b1fe703b125af445debe9a89a07db6194d27b44d85a"
generic multi step HMAC-SHA-512 Test Vector NIST CAVS #5
depends_on:6
8:char*:"SHA512":int:48:hex:"4285d3d7744da52775bb44ca436a3154f7980309":hex:"208f0b6f2de2e5aa5df11927ddc6df485edc1193181c484d0f0a434a95418803101d4de9fdb798f93516a6916fa38a8207de1666fe50fe3441c03b112eaaae6954ed063f7ac4e3c1e3f73b20d153fe9e4857f5e91430f0a70ee820529adac2467469fd18adf10e2af0fea27c0abc83c5a9af77c364a466cffce8bab4e2b70bc1":hex:"fe7603f205b2774fe0f14ecfa3e338e90608a806d11ca459dff5ce36b1b264ecd3af5f0492a7521d8da3102ba20927a5"
generic multi step HMAC-SHA-512 Test Vector NIST CAVS #6
depends_on:6
8:char*:"SHA512":int:48:hex:"8ab783d5acf32efa0d9c0a21abce955e96630d89":hex:"17371e013dce839963d54418e97be4bd9fa3cb2a368a5220f5aa1b8aaddfa3bdefc91afe7c717244fd2fb640f5cb9d9bf3e25f7f0c8bc758883b89dcdce6d749d9672fed222277ece3e84b3ec01b96f70c125fcb3cbee6d19b8ef0873f915f173bdb05d81629ba187cc8ac1934b2f75952fb7616ae6bd812946df694bd2763af":hex:"9ac7ca8d1aefc166b046e4cf7602ebe181a0e5055474bff5b342106731da0d7e48e4d87bc0a6f05871574289a1b099f8"
generic SHA-1 Test Vector NIST CAVS #1
depends_on:4
4:char*:"SHA1":hex:"":hex:"da39a3ee5e6b4b0d3255bfef95601890afd80709"
generic SHA-1 Test Vector NIST CAVS #2
depends_on:4
4:char*:"SHA1":hex:"a8":hex:"99f2aa95e36f95c2acb0eaf23998f030638f3f15"
generic SHA-1 Test Vector NIST CAVS #3
depends_on:4
4:char*:"SHA1":hex:"3000":hex:"f944dcd635f9801f7ac90a407fbc479964dec024"
generic SHA-1 Test Vector NIST CAVS #4
depends_on:4
4:char*:"SHA1":hex:"42749e":hex:"a444319e9b6cc1e8464c511ec0969c37d6bb2619"
generic SHA-1 Test Vector NIST CAVS #5
depends_on:4
4:char*:"SHA1":hex:"9fc3fe08":hex:"16a0ff84fcc156fd5d3ca3a744f20a232d172253"
generic SHA-1 Test Vector NIST CAVS #6
depends_on:4
4:char*:"SHA1":hex:"b5c1c6f1af":hex:"fec9deebfcdedaf66dda525e1be43597a73a1f93"
generic SHA-1 Test Vector NIST CAVS #7
depends_on:4
4:char*:"SHA1":hex:"ec29561244ede706b6eb30a1c371d74450a105c3f9735f7fa9fe38cf67f304a5736a106e92e17139a6813b1c81a4f3d3fb9546ab4296fa9f722826c066869edacd73b2548035185813e22634a9da44000d95a281ff9f264ecce0a931222162d021cca28db5f3c2aa24945ab1e31cb413ae29810fd794cad5dfaf29ec43cb38d198fe4ae1da2359780221405bd6712a5305da4b1b737fce7cd21c0eb7728d08235a9011":hex:"970111c4e77bcc88cc20459c02b69b4aa8f58217"
generic SHA-1 Test Vector NIST CAVS #8
depends_on:4
4:char*:"SHA1":hex:"5fc2c3f6a7e79dc94be526e5166a238899d54927ce470018fbfd668fd9dd97cbf64e2c91584d01da63be3cc9fdff8adfefc3ac728e1e335b9cdc87f069172e323d094b47fa1e652afe4d6aa147a9f46fda33cacb65f3aa12234746b9007a8c85fe982afed7815221e43dba553d8fe8a022cdac1b99eeeea359e5a9d2e72e382dffa6d19f359f4f27dc3434cd27daeeda8e38594873398678065fbb23665aba9309d946135da0e4a4afdadff14db18e85e71dd93c3bf9faf7f25c8194c4269b1ee3d9934097ab990025d9c3aaf63d5109f52335dd3959d38ae485050e4bbb6235574fc0102be8f7a306d6e8de6ba6becf80f37415b57f9898a5824e77414197422be3d36a6080":hex:"0423dc76a8791107d14e13f5265b343f24cc0f19"
generic SHA-1 Test Vector NIST CAVS #9
depends_on:4
4:char*:"SHA1":hex:"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":hex:"6692a71d73e00f27df976bc56df4970650d90e45"
generic SHA-1 Test Vector NIST CAVS #10
depends_on:4
4:char*:"SHA1":hex:"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":hex:"11863b483809ef88413ca9b0084ac4a5390640af"
generic SHA-224 Test Vector NIST CAVS #1
depends_on:5
4:char*:"SHA224":hex:"":hex:"d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f"
generic SHA-224 Test Vector NIST CAVS #2
depends_on:5
4:char*:"SHA224":hex:"ff":hex:"e33f9d75e6ae1369dbabf81b96b4591ae46bba30b591a6b6c62542b5"
generic SHA-224 Test Vector NIST CAVS #3
depends_on:5
4:char*:"SHA224":hex:"984c":hex:"2fa9df9157d9e027cfbc4c6a9df32e1adc0cbe2328ec2a63c5ae934e"
generic SHA-224 Test Vector NIST CAVS #4
depends_on:5
4:char*:"SHA224":hex:"50efd0":hex:"b5a9820413c2bf8211fbbf5df1337043b32fa4eafaf61a0c8e9ccede"
generic SHA-224 Test Vector NIST CAVS #5
depends_on:5
4:char*:"SHA224":hex:"e5e09924":hex:"fd19e74690d291467ce59f077df311638f1c3a46e510d0e49a67062d"
generic SHA-224 Test Vector NIST CAVS #6
depends_on:5
4:char*:"SHA224":hex:"21ebecb914":hex:"78f4a71c21c694499ce1c7866611b14ace70d905012c356323c7c713"
generic SHA-224 Test Vector NIST CAVS #7
depends_on:5
4:char*:"SHA224":hex:"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":hex:"1302149d1e197c41813b054c942329d420e366530f5517b470e964fe"
generic SHA-256 Test Vector NIST CAVS #1
depends_on:5
4:char*:"SHA256":hex:"":hex:"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
generic SHA-256 Test Vector NIST CAVS #2
depends_on:5
4:char*:"SHA256":hex:"bd":hex:"68325720aabd7c82f30f554b313d0570c95accbb7dc4b5aae11204c08ffe732b"
generic SHA-256 Test Vector NIST CAVS #3
depends_on:5
4:char*:"SHA256":hex:"5fd4":hex:"7c4fbf484498d21b487b9d61de8914b2eadaf2698712936d47c3ada2558f6788"
generic SHA-256 Test Vector NIST CAVS #4
depends_on:5
4:char*:"SHA256":hex:"b0bd69":hex:"4096804221093ddccfbf46831490ea63e9e99414858f8d75ff7f642c7ca61803"
generic SHA-256 Test Vector NIST CAVS #5
depends_on:5
4:char*:"SHA256":hex:"c98c8e55":hex:"7abc22c0ae5af26ce93dbb94433a0e0b2e119d014f8e7f65bd56c61ccccd9504"
generic SHA-256 Test Vector NIST CAVS #6
depends_on:5
4:char*:"SHA256":hex:"81a723d966":hex:"7516fb8bb11350df2bf386bc3c33bd0f52cb4c67c6e4745e0488e62c2aea2605"
generic SHA-256 Test Vector NIST CAVS #7
depends_on:5
4:char*:"SHA256":hex:"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":hex:"4109cdbec3240ad74cc6c37f39300f70fede16e21efc77f7865998714aad0b5e"
generic SHA-384 Test Vector NIST CAVS #1
depends_on:6:7
4:char*:"SHA384":hex:"":hex:"38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b"
generic SHA-384 Test Vector NIST CAVS #2
depends_on:6:7
4:char*:"SHA384":hex:"ab":hex:"fb94d5be118865f6fcbc978b825da82cff188faec2f66cb84b2537d74b4938469854b0ca89e66fa2e182834736629f3d"
generic SHA-384 Test Vector NIST CAVS #3
depends_on:6:7
4:char*:"SHA384":hex:"7c27":hex:"3d80be467df86d63abb9ea1d3f9cb39cd19890e7f2c53a6200bedc5006842b35e820dc4e0ca90ca9b97ab23ef07080fc"
generic SHA-384 Test Vector NIST CAVS #4
depends_on:6:7
4:char*:"SHA384":hex:"31f5ca":hex:"78d54b943421fdf7ba90a7fb9637c2073aa480454bd841d39ff72f4511fc21fb67797b652c0c823229342873d3bef955"
generic SHA-384 Test Vector NIST CAVS #5
depends_on:6:7
4:char*:"SHA384":hex:"7bdee3f8":hex:"8bdafba0777ee446c3431c2d7b1fbb631089f71d2ca417abc1d230e1aba64ec2f1c187474a6f4077d372c14ad407f99a"
generic SHA-384 Test Vector NIST CAVS #6
depends_on:6:7
4:char*:"SHA384":hex:"8f05604915":hex:"504e414bf1db1060f14c8c799e25b1e0c4dcf1504ebbd129998f0ae283e6de86e0d3c7e879c73ec3b1836c3ee89c2649"
generic SHA-384 Test Vector NIST CAVS #7
depends_on:6:7
4:char*:"SHA384":hex:"665da6eda214":hex:"4c022f112010908848312f8b8f1072625fd5c105399d562ea1d56130619a7eac8dfc3748fd05ee37e4b690be9daa9980"
generic SHA-384 Test Vector NIST CAVS #8
depends_on:6:7
4:char*:"SHA384":hex:"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":hex:"cba9e3eb12a6f83db11e8a6ff40d1049854ee094416bc527fea931d8585428a8ed6242ce81f6769b36e2123a5c23483e"
generic SHA-512 Test Vector NIST CAVS #1
depends_on:6
4:char*:"SHA512":hex:"":hex:"cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e"
generic SHA-512 Test Vector NIST CAVS #2
depends_on:6
4:char*:"SHA512":hex:"8f":hex:"e4cd2d19931b5aad9c920f45f56f6ce34e3d38c6d319a6e11d0588ab8b838576d6ce6d68eea7c830de66e2bd96458bfa7aafbcbec981d4ed040498c3dd95f22a"
generic SHA-512 Test Vector NIST CAVS #3
depends_on:6
4:char*:"SHA512":hex:"e724":hex:"7dbb520221a70287b23dbcf62bfc1b73136d858e86266732a7fffa875ecaa2c1b8f673b5c065d360c563a7b9539349f5f59bef8c0c593f9587e3cd50bb26a231"
generic SHA-512 Test Vector NIST CAVS #4
depends_on:6
4:char*:"SHA512":hex:"de4c90":hex:"33ce98281045a5c4c9df0363d8196f1d7dfcd5ee46ac89776fd8a4344c12f123a66788af5bd41ceff1941aa5637654b4064c88c14e00465ab79a2fc6c97e1014"
generic SHA-512 Test Vector NIST CAVS #5
depends_on:6
4:char*:"SHA512":hex:"a801e94b":hex:"dadb1b5a27f9fece8d86adb2a51879beb1787ff28f4e8ce162cad7fee0f942efcabbf738bc6f797fc7cc79a3a75048cd4c82ca0757a324695bfb19a557e56e2f"
generic SHA-512 Test Vector NIST CAVS #6
depends_on:6
4:char*:"SHA512":hex:"94390d3502":hex:"b6175c4c4cccf69e0ce5f0312010886ea6b34d43673f942ae42483f9cbb7da817de4e11b5d58e25a3d9bd721a22cdffe1c40411cc45df1911fa5506129b69297"
generic SHA-512 Test Vector NIST CAVS #7
depends_on:6
4:char*:"SHA512":hex:"49297dd63e5f":hex:"1fcc1e6f6870859d11649f5e5336a9cd16329c029baf04d5a6edf257889a2e9522b497dd656bb402da461307c4ee382e2e89380c8e6e6e7697f1e439f650fa94"
generic SHA-512 Test Vector NIST CAVS #8
depends_on:6
4:char*:"SHA512":hex:"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":hex:"8e4bc6f8b8c60fe4d68c61d9b159c8693c3151c46749af58da228442d927f23359bd6ccd6c2ec8fa3f00a86cecbfa728e1ad60b821ed22fcd309ba91a4138bc9"
generic multi step SHA-1 Test Vector NIST CAVS #1
depends_on:4
6:char*:"SHA1":hex:"":hex:"da39a3ee5e6b4b0d3255bfef95601890afd80709"
generic multi step SHA-1 Test Vector NIST CAVS #2
depends_on:4
6:char*:"SHA1":hex:"a8":hex:"99f2aa95e36f95c2acb0eaf23998f030638f3f15"
generic multi step SHA-1 Test Vector NIST CAVS #3
depends_on:4
6:char*:"SHA1":hex:"3000":hex:"f944dcd635f9801f7ac90a407fbc479964dec024"
generic multi step SHA-1 Test Vector NIST CAVS #4
depends_on:4
6:char*:"SHA1":hex:"42749e":hex:"a444319e9b6cc1e8464c511ec0969c37d6bb2619"
generic multi step SHA-1 Test Vector NIST CAVS #5
depends_on:4
6:char*:"SHA1":hex:"9fc3fe08":hex:"16a0ff84fcc156fd5d3ca3a744f20a232d172253"
generic multi step SHA-1 Test Vector NIST CAVS #6
depends_on:4
6:char*:"SHA1":hex:"b5c1c6f1af":hex:"fec9deebfcdedaf66dda525e1be43597a73a1f93"
generic multi step SHA-1 Test Vector NIST CAVS #7
depends_on:4
6:char*:"SHA1":hex:"ec29561244ede706b6eb30a1c371d74450a105c3f9735f7fa9fe38cf67f304a5736a106e92e17139a6813b1c81a4f3d3fb9546ab4296fa9f722826c066869edacd73b2548035185813e22634a9da44000d95a281ff9f264ecce0a931222162d021cca28db5f3c2aa24945ab1e31cb413ae29810fd794cad5dfaf29ec43cb38d198fe4ae1da2359780221405bd6712a5305da4b1b737fce7cd21c0eb7728d08235a9011":hex:"970111c4e77bcc88cc20459c02b69b4aa8f58217"
generic multi step SHA-1 Test Vector NIST CAVS #8
depends_on:4
6:char*:"SHA1":hex:"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":hex:"0423dc76a8791107d14e13f5265b343f24cc0f19"
generic multi step SHA-1 Test Vector NIST CAVS #9
depends_on:4
6:char*:"SHA1":hex:"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":hex:"6692a71d73e00f27df976bc56df4970650d90e45"
generic multi step SHA-1 Test Vector NIST CAVS #10
depends_on:4
6:char*:"SHA1":hex:"8236153781bd2f1b81ffe0def1beb46f5a70191142926651503f1b3bb1016acdb9e7f7acced8dd168226f118ff664a01a8800116fd023587bfba52a2558393476f5fc69ce9c65001f23e70476d2cc81c97ea19caeb194e224339bcb23f77a83feac5096f9b3090c51a6ee6d204b735aa71d7e996d380b80822e4dfd43683af9c7442498cacbea64842dfda238cb099927c6efae07fdf7b23a4e4456e0152b24853fe0d5de4179974b2b9d4a1cdbefcbc01d8d311b5dda059136176ea698ab82acf20dd490be47130b1235cb48f8a6710473cfc923e222d94b582f9ae36d4ca2a32d141b8e8cc36638845fbc499bce17698c3fecae2572dbbd470552430d7ef30c238c2124478f1f780483839b4fb73d63a9460206824a5b6b65315b21e3c2f24c97ee7c0e78faad3df549c7ca8ef241876d9aafe9a309f6da352bec2caaa92ee8dca392899ba67dfed90aef33d41fc2494b765cb3e2422c8e595dabbfaca217757453fb322a13203f425f6073a9903e2dc5818ee1da737afc345f0057744e3a56e1681c949eb12273a3bfc20699e423b96e44bd1ff62e50a848a890809bfe1611c6787d3d741103308f849a790f9c015098286dbacfc34c1718b2c2b77e32194a75dda37954a320fa68764027852855a7e5b5274eb1e2cbcd27161d98b59ad245822015f48af82a45c0ed59be94f9af03d9736048570d6e3ef63b1770bc98dfb77de84b1bb1708d872b625d9ab9b06c18e5dbbf34399391f0f8aa26ec0dac7ff4cb8ec97b52bcb942fa6db2385dcd1b3b9d567aaeb425d567b0ebe267235651a1ed9bf78fd93d3c1dd077fe340bb04b00529c58f45124b717c168d07e9826e33376988bc5cf62845c2009980a4dfa69fbc7e5a0b1bb20a5958ca967aec68eb31dd8fccca9afcd30a26bab26279f1bf6724ff":hex:"11863b483809ef88413ca9b0084ac4a5390640af"
generic multi step SHA-224 Test Vector NIST CAVS #1
depends_on:5
6:char*:"SHA224":hex:"":hex:"d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f"
generic multi step SHA-224 Test Vector NIST CAVS #2
depends_on:5
6:char*:"SHA224":hex:"ff":hex:"e33f9d75e6ae1369dbabf81b96b4591ae46bba30b591a6b6c62542b5"
generic multi step SHA-224 Test Vector NIST CAVS #3
depends_on:5
6:char*:"SHA224":hex:"984c":hex:"2fa9df9157d9e027cfbc4c6a9df32e1adc0cbe2328ec2a63c5ae934e"
generic multi step SHA-224 Test Vector NIST CAVS #4
depends_on:5
6:char*:"SHA224":hex:"50efd0":hex:"b5a9820413c2bf8211fbbf5df1337043b32fa4eafaf61a0c8e9ccede"
generic multi step SHA-224 Test Vector NIST CAVS #5
depends_on:5
6:char*:"SHA224":hex:"e5e09924":hex:"fd19e74690d291467ce59f077df311638f1c3a46e510d0e49a67062d"
generic multi step SHA-224 Test Vector NIST CAVS #6
depends_on:5
6:char*:"SHA224":hex:"21ebecb914":hex:"78f4a71c21c694499ce1c7866611b14ace70d905012c356323c7c713"
generic multi step SHA-224 Test Vector NIST CAVS #7
depends_on:5
6:char*:"SHA224":hex:"fc488947c1a7a589726b15436b4f3d9556262f98fc6422fc5cdf20f0fad7fe427a3491c86d101ffe6b7514f06268f65b2d269b0f69ad9a97847eff1c16a2438775eb7be6847ccf11cb8b2e8dcd6640b095b49c0693fe3cf4a66e2d9b7ad68bff14f3ad69abf49d0aba36cbe0535202deb6599a47225ef05beb351335cd7bc0f480d691198c7e71305ffd53b39d33242bb79cfd98bfd69e137b5d18b2b89ac9ace01c8dbdcf2533cce3682ecc52118de0c1062ec2126c2e657d6ea3d9e2398e705d4b0b1f1ceecb266dffc4f31bf42744fb1e938dc22a889919ee1e73f463f7871fed720519e32186264b7ef2a0e5d9a18e6c95c0781894f77967f048951dec3b4d892a38710b1e3436d3c29088eb8b3da1789c25db3d3bc6c26081206e7155d210a89b80ca6ea877c41ff9947c0f25625dcb118294a163501f6239c326661a958fd12da4cd15a899f8b88cc723589056eaec5aa04a4cf5dbb6f480f9660423ccf38c486e210707e0fb25e1f126ceb2616f63e147a647dab0af9ebe89d65458bf636154a46e4cab95f5ee62da2c7974cd14b90d3e4f99f81733e85b3c1d5da2b508d9b90f5eed7eff0d9c7649de62bee00375454fee4a39576a5bbfdae428e7f8097bdf7797f167686cb68407e49079e4611ff3402b6384ba7b7e522bd2bb11ce8fd02ea4c1604d163ac4f6dde50b8b1f593f7edaadeac0868ed97df690200680c25f0f5d85431a529e4f339089dcdeda105e4ee51dead704cdf5a605c55fb055c9b0e86b8ba1b564c0dea3eb790a595cb103cb292268b07c5e59371e1a7ef597cd4b22977a820694c9f9aeb55d9de3ef62b75d6e656e3336698d960a3787bf8cf5b926a7faeef52ae128bcb5dc9e66d94b016c7b8e034879171a2d91c381f57e6a815b63b5ee6a6d2ff435b49f14c963966960194430d78f8f87627a67757fb3532b289550894da6dce4817a4e07f4d56877a1102ffcc8befa5c9f8fca6a4574d93ff70376c8861e0f8108cf907fce77ecb49728f86f034f80224b9695682e0824462f76cdb1fd1af151337b0d85419047a7aa284791718a4860cd586f7824b95bc837b6fd4f9be5aade68456e20356aa4d943dac36bf8b67b9e8f9d01a00fcda74b798bafa746c661b010f75b59904b29d0c8041504811c4065f82cf2ead58d2f595cbd8bc3e7043f4d94577b373b7cfe16a36fe564f505c03b70cfeb5e5f411c79481338aa67e86b3f5a2e77c21e454c333ae3da943ab723ab5f4c940395319534a5575f64acba0d0ecc43f60221ed3badf7289c9b3a7b903a2d6c94e15fa4c310dc4fa7faa0c24f405160a1002dbef20e4105d481db982f7243f79400a6e4cd9753c4b9732a47575f504b20c328fe9add7f432a4f075829da07b53b695037dc51737d3cd731934df333cd1a53fcf65aa31baa450ca501a6fae26e322347e618c5a444d92e9fec5a8261ae38b98fee5be77c02cec09ddccd5b3de92036":hex:"1302149d1e197c41813b054c942329d420e366530f5517b470e964fe"
generic multi step SHA-256 Test Vector NIST CAVS #1
depends_on:5
6:char*:"SHA256":hex:"":hex:"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
generic multi step SHA-256 Test Vector NIST CAVS #2
depends_on:5
6:char*:"SHA256":hex:"bd":hex:"68325720aabd7c82f30f554b313d0570c95accbb7dc4b5aae11204c08ffe732b"
generic multi step SHA-256 Test Vector NIST CAVS #3
depends_on:5
6:char*:"SHA256":hex:"5fd4":hex:"7c4fbf484498d21b487b9d61de8914b2eadaf2698712936d47c3ada2558f6788"
generic multi step SHA-256 Test Vector NIST CAVS #4
depends_on:5
6:char*:"SHA256":hex:"b0bd69":hex:"4096804221093ddccfbf46831490ea63e9e99414858f8d75ff7f642c7ca61803"
generic multi step SHA-256 Test Vector NIST CAVS #5
depends_on:5
6:char*:"SHA256":hex:"c98c8e55":hex:"7abc22c0ae5af26ce93dbb94433a0e0b2e119d014f8e7f65bd56c61ccccd9504"
generic multi step SHA-256 Test Vector NIST CAVS #6
depends_on:5
6:char*:"SHA256":hex:"81a723d966":hex:"7516fb8bb11350df2bf386bc3c33bd0f52cb4c67c6e4745e0488e62c2aea2605"
generic multi step SHA-256 Test Vector NIST CAVS #7
depends_on:5
6:char*:"SHA256":hex:"8390cf0be07661cc7669aac54ce09a37733a629d45f5d983ef201f9b2d13800e555d9b1097fec3b783d7a50dcb5e2b644b96a1e9463f177cf34906bf388f366db5c2deee04a30e283f764a97c3b377a034fefc22c259214faa99babaff160ab0aaa7e2ccb0ce09c6b32fe08cbc474694375aba703fadbfa31cf685b30a11c57f3cf4edd321e57d3ae6ebb1133c8260e75b9224fa47a2bb205249add2e2e62f817491482ae152322be0900355cdcc8d42a98f82e961a0dc6f537b7b410eff105f59673bfb787bf042aa071f7af68d944d27371c64160fe9382772372516c230c1f45c0d6b6cca7f274b394da9402d3eafdf733994ec58ab22d71829a98399574d4b5908a447a5a681cb0dd50a31145311d92c22a16de1ead66a5499f2dceb4cae694772ce90762ef8336afec653aa9b1a1c4820b221136dfce80dce2ba920d88a530c9410d0a4e0358a3a11052e58dd73b0b179ef8f56fe3b5a2d117a73a0c38a1392b6938e9782e0d86456ee4884e3c39d4d75813f13633bc79baa07c0d2d555afbf207f52b7dca126d015aa2b9873b3eb065e90b9b065a5373fe1fb1b20d594327d19fba56cb81e7b6696605ffa56eba3c27a438697cc21b201fd7e09f18deea1b3ea2f0d1edc02df0e20396a145412cd6b13c32d2e605641c948b714aec30c0649dc44143511f35ab0fd5dd64c34d06fe86f3836dfe9edeb7f08cfc3bd40956826356242191f99f53473f32b0cc0cf9321d6c92a112e8db90b86ee9e87cc32d0343db01e32ce9eb782cb24efbbbeb440fe929e8f2bf8dfb1550a3a2e742e8b455a3e5730e9e6a7a9824d17acc0f72a7f67eae0f0970f8bde46dcdefaed3047cf807e7f00a42e5fd11d40f5e98533d7574425b7d2bc3b3845c443008b58980e768e464e17cc6f6b3939eee52f713963d07d8c4abf02448ef0b889c9671e2f8a436ddeeffcca7176e9bf9d1005ecd377f2fa67c23ed1f137e60bf46018a8bd613d038e883704fc26e798969df35ec7bbc6a4fe46d8910bd82fa3cded265d0a3b6d399e4251e4d8233daa21b5812fded6536198ff13aa5a1cd46a5b9a17a4ddc1d9f85544d1d1cc16f3df858038c8e071a11a7e157a85a6a8dc47e88d75e7009a8b26fdb73f33a2a70f1e0c259f8f9533b9b8f9af9288b7274f21baeec78d396f8bacdcc22471207d9b4efccd3fedc5c5a2214ff5e51c553f35e21ae696fe51e8df733a8e06f50f419e599e9f9e4b37ce643fc810faaa47989771509d69a110ac916261427026369a21263ac4460fb4f708f8ae28599856db7cb6a43ac8e03d64a9609807e76c5f312b9d1863bfa304e8953647648b4f4ab0ed995e":hex:"4109cdbec3240ad74cc6c37f39300f70fede16e21efc77f7865998714aad0b5e"
generic multi step SHA-384 Test Vector NIST CAVS #1
depends_on:6:7
6:char*:"SHA384":hex:"":hex:"38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b"
generic multi step SHA-384 Test Vector NIST CAVS #2
depends_on:6:7
6:char*:"SHA384":hex:"ab":hex:"fb94d5be118865f6fcbc978b825da82cff188faec2f66cb84b2537d74b4938469854b0ca89e66fa2e182834736629f3d"
generic multi step SHA-384 Test Vector NIST CAVS #3
depends_on:6:7
6:char*:"SHA384":hex:"7c27":hex:"3d80be467df86d63abb9ea1d3f9cb39cd19890e7f2c53a6200bedc5006842b35e820dc4e0ca90ca9b97ab23ef07080fc"
generic multi step SHA-384 Test Vector NIST CAVS #4
depends_on:6:7
6:char*:"SHA384":hex:"31f5ca":hex:"78d54b943421fdf7ba90a7fb9637c2073aa480454bd841d39ff72f4511fc21fb67797b652c0c823229342873d3bef955"
generic multi step SHA-384 Test Vector NIST CAVS #5
depends_on:6:7
6:char*:"SHA384":hex:"7bdee3f8":hex:"8bdafba0777ee446c3431c2d7b1fbb631089f71d2ca417abc1d230e1aba64ec2f1c187474a6f4077d372c14ad407f99a"
generic multi step SHA-384 Test Vector NIST CAVS #6
depends_on:6:7
6:char*:"SHA384":hex:"8f05604915":hex:"504e414bf1db1060f14c8c799e25b1e0c4dcf1504ebbd129998f0ae283e6de86e0d3c7e879c73ec3b1836c3ee89c2649"
generic multi step SHA-384 Test Vector NIST CAVS #7
depends_on:6:7
6:char*:"SHA384":hex:"665da6eda214":hex:"4c022f112010908848312f8b8f1072625fd5c105399d562ea1d56130619a7eac8dfc3748fd05ee37e4b690be9daa9980"
generic multi step SHA-384 Test Vector NIST CAVS #8
depends_on:6:7
6:char*:"SHA384":hex:"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":hex:"cba9e3eb12a6f83db11e8a6ff40d1049854ee094416bc527fea931d8585428a8ed6242ce81f6769b36e2123a5c23483e"
generic multi step SHA-512 Test Vector NIST CAVS #1
depends_on:6
6:char*:"SHA512":hex:"":hex:"cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e"
generic multi step SHA-512 Test Vector NIST CAVS #2
depends_on:6
6:char*:"SHA512":hex:"8f":hex:"e4cd2d19931b5aad9c920f45f56f6ce34e3d38c6d319a6e11d0588ab8b838576d6ce6d68eea7c830de66e2bd96458bfa7aafbcbec981d4ed040498c3dd95f22a"
generic multi step SHA-512 Test Vector NIST CAVS #3
depends_on:6
6:char*:"SHA512":hex:"e724":hex:"7dbb520221a70287b23dbcf62bfc1b73136d858e86266732a7fffa875ecaa2c1b8f673b5c065d360c563a7b9539349f5f59bef8c0c593f9587e3cd50bb26a231"
generic multi step SHA-512 Test Vector NIST CAVS #4
depends_on:6
6:char*:"SHA512":hex:"de4c90":hex:"33ce98281045a5c4c9df0363d8196f1d7dfcd5ee46ac89776fd8a4344c12f123a66788af5bd41ceff1941aa5637654b4064c88c14e00465ab79a2fc6c97e1014"
generic multi step SHA-512 Test Vector NIST CAVS #5
depends_on:6
6:char*:"SHA512":hex:"a801e94b":hex:"dadb1b5a27f9fece8d86adb2a51879beb1787ff28f4e8ce162cad7fee0f942efcabbf738bc6f797fc7cc79a3a75048cd4c82ca0757a324695bfb19a557e56e2f"
generic multi step SHA-512 Test Vector NIST CAVS #6
depends_on:6
6:char*:"SHA512":hex:"94390d3502":hex:"b6175c4c4cccf69e0ce5f0312010886ea6b34d43673f942ae42483f9cbb7da817de4e11b5d58e25a3d9bd721a22cdffe1c40411cc45df1911fa5506129b69297"
generic multi step SHA-512 Test Vector NIST CAVS #7
depends_on:6
6:char*:"SHA512":hex:"49297dd63e5f":hex:"1fcc1e6f6870859d11649f5e5336a9cd16329c029baf04d5a6edf257889a2e9522b497dd656bb402da461307c4ee382e2e89380c8e6e6e7697f1e439f650fa94"
generic multi step SHA-512 Test Vector NIST CAVS #8
depends_on:6
6:char*:"SHA512":hex:"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":hex:"8e4bc6f8b8c60fe4d68c61d9b159c8693c3151c46749af58da228442d927f23359bd6ccd6c2ec8fa3f00a86cecbfa728e1ad60b821ed22fcd309ba91a4138bc9"
generic SHA1 Hash file #1
depends_on:4
9:char*:"SHA1":char*:"/zip/third_party/mbedtls/test/data/hash_file_1":hex:"d21c965b1e768bd7a6aa6869f5f821901d255f9f"
generic SHA1 Hash file #2
depends_on:4
9:char*:"SHA1":char*:"/zip/third_party/mbedtls/test/data/hash_file_2":hex:"353f34271f2aef49d23a8913d4a6bd82b2cecdc6"
generic SHA1 Hash file #3
depends_on:4
9:char*:"SHA1":char*:"/zip/third_party/mbedtls/test/data/hash_file_3":hex:"93640ed592076328096270c756db2fba9c486b35"
generic SHA1 Hash file #4
depends_on:4
9:char*:"SHA1":char*:"/zip/third_party/mbedtls/test/data/hash_file_4":hex:"da39a3ee5e6b4b0d3255bfef95601890afd80709"
generic SHA-224 Hash file #1
depends_on:5
9:char*:"SHA224":char*:"/zip/third_party/mbedtls/test/data/hash_file_1":hex:"8606da018870f0c16834a21bc3385704cb1683b9dbab04c5ddb90a48"
generic SHA-224 Hash file #2
depends_on:5
9:char*:"SHA224":char*:"/zip/third_party/mbedtls/test/data/hash_file_2":hex:"733b2ab97b6f63f2e29b9a2089756d81e14c93fe4cc9615c0d5e8a03"
generic SHA-224 Hash file #3
depends_on:5
9:char*:"SHA224":char*:"/zip/third_party/mbedtls/test/data/hash_file_3":hex:"e1df95867580e2cc2100e9565bf9c2e42c24fe5250c19efe33d1c4fe"
generic SHA-224 Hash file #4
depends_on:5
9:char*:"SHA224":char*:"/zip/third_party/mbedtls/test/data/hash_file_4":hex:"d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f"
generic SHA-256 Hash file #1
depends_on:5
9:char*:"SHA256":char*:"/zip/third_party/mbedtls/test/data/hash_file_1":hex:"975d0c620d3936886f8a3665e585a3e84aa0501f4225bf53029710242823e391"
generic SHA-256 Hash file #2
depends_on:5
9:char*:"SHA256":char*:"/zip/third_party/mbedtls/test/data/hash_file_2":hex:"11fcbf1baa36ca45745f10cc5467aee86f066f80ba2c46806d876bf783022ad2"
generic SHA-256 Hash file #3
depends_on:5
9:char*:"SHA256":char*:"/zip/third_party/mbedtls/test/data/hash_file_3":hex:"9ae4b369f9f4f03b86505b46a5469542e00aaff7cf7417a71af6d6d0aba3b70c"
generic SHA-256 Hash file #4
depends_on:5
9:char*:"SHA256":char*:"/zip/third_party/mbedtls/test/data/hash_file_4":hex:"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
generic SHA-384 Hash file #1
depends_on:6:7
9:char*:"SHA384":char*:"/zip/third_party/mbedtls/test/data/hash_file_1":hex:"e0a3e6259d6378001b54ef82f5dd087009c5fad86d8db226a9fe1d14ecbe33a6fc916e3a4b16f5f286424de15d5a8e0e"
generic SHA-384 Hash file #2
depends_on:6:7
9:char*:"SHA384":char*:"/zip/third_party/mbedtls/test/data/hash_file_2":hex:"eff727afc8495c92e2f370f97a317f93c3350324b0646b0f0e264708b3c97d3d332d3c5390e1e47130f5c92f1ef4b9cf"
generic SHA-384 Hash file #3
depends_on:6:7
9:char*:"SHA384":char*:"/zip/third_party/mbedtls/test/data/hash_file_3":hex:"6fc10ebda96a1ccf61777cac72f6034f92533d42052a4bf9f9d929c672973c71e5aeb1213268043c21527ac0f7f349c4"
generic SHA-384 Hash file #4
depends_on:6:7
9:char*:"SHA384":char*:"/zip/third_party/mbedtls/test/data/hash_file_4":hex:"38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b"
generic SHA-512 Hash file #1
depends_on:6
9:char*:"SHA512":char*:"/zip/third_party/mbedtls/test/data/hash_file_1":hex:"d8207a2e1ff2b424f2c4163fe1b723c9bd42e464061eb411e8df730bcd24a7ab3956a6f3ff044a52eb2d262f9e4ca6b524092b544ab78f14d6f9c4cc8ddf335a"
generic SHA-512 Hash file #2
depends_on:6
9:char*:"SHA512":char*:"/zip/third_party/mbedtls/test/data/hash_file_2":hex:"ecbb7f0ed8a702b49f16ad3088bcc06ea93451912a7187db15f64d93517b09630b039293aed418d4a00695777b758b1f381548c2fd7b92ce5ed996b32c8734e7"
generic SHA-512 Hash file #3
depends_on:6
9:char*:"SHA512":char*:"/zip/third_party/mbedtls/test/data/hash_file_3":hex:"7ccc9b2da71ffde9966c3ce44d7f20945fccf33b1fade4da152b021f1afcc7293382944aa6c09eac67af25f22026758e2bf6bed86ae2a43592677ee50f8eea41"
generic SHA-512 Hash file #4
depends_on:6
9:char*:"SHA512":char*:"/zip/third_party/mbedtls/test/data/hash_file_4":hex:"cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e"
| 97,196 | 1,227 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_des.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_des.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_des.function
* Test suite data : suites/test_suite_des.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_DES_C)
#include "third_party/mbedtls/des.h"
void test_des_check_weak( data_t * key, int ret )
{
TEST_ASSERT( mbedtls_des_key_check_weak( key->x ) == ret );
exit:
;
}
void test_des_check_weak_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_des_check_weak( &data0, *( (int *) params[2] ) );
}
void test_des_encrypt_ecb( data_t * key_str, data_t * src_str, data_t * dst )
{
unsigned char output[100];
mbedtls_des_context ctx;
memset(output, 0x00, 100);
mbedtls_des_init( &ctx );
mbedtls_des_setkey_enc( &ctx, key_str->x );
TEST_ASSERT( mbedtls_des_crypt_ecb( &ctx, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, 8, dst->len ) == 0 );
exit:
mbedtls_des_free( &ctx );
}
void test_des_encrypt_ecb_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
test_des_encrypt_ecb( &data0, &data2, &data4 );
}
void test_des_decrypt_ecb( data_t * key_str, data_t * src_str, data_t * dst )
{
unsigned char output[100];
mbedtls_des_context ctx;
memset(output, 0x00, 100);
mbedtls_des_init( &ctx );
mbedtls_des_setkey_dec( &ctx, key_str->x );
TEST_ASSERT( mbedtls_des_crypt_ecb( &ctx, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, 8, dst->len ) == 0 );
exit:
mbedtls_des_free( &ctx );
}
void test_des_decrypt_ecb_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
test_des_decrypt_ecb( &data0, &data2, &data4 );
}
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_des_encrypt_cbc( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst, int cbc_result )
{
unsigned char output[100];
mbedtls_des_context ctx;
memset(output, 0x00, 100);
mbedtls_des_init( &ctx );
mbedtls_des_setkey_enc( &ctx, key_str->x );
TEST_ASSERT( mbedtls_des_crypt_cbc( &ctx, MBEDTLS_DES_ENCRYPT, src_str->len, iv_str->x, src_str->x, output ) == cbc_result );
if( cbc_result == 0 )
{
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, src_str->len,
dst->len ) == 0 );
}
exit:
mbedtls_des_free( &ctx );
}
void test_des_encrypt_cbc_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_des_encrypt_cbc( &data0, &data2, &data4, &data6, *( (int *) params[8] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_des_decrypt_cbc( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst,
int cbc_result )
{
unsigned char output[100];
mbedtls_des_context ctx;
memset(output, 0x00, 100);
mbedtls_des_init( &ctx );
mbedtls_des_setkey_dec( &ctx, key_str->x );
TEST_ASSERT( mbedtls_des_crypt_cbc( &ctx, MBEDTLS_DES_DECRYPT, src_str->len, iv_str->x, src_str->x, output ) == cbc_result );
if( cbc_result == 0 )
{
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, src_str->len,
dst->len ) == 0 );
}
exit:
mbedtls_des_free( &ctx );
}
void test_des_decrypt_cbc_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_des_decrypt_cbc( &data0, &data2, &data4, &data6, *( (int *) params[8] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
void test_des3_encrypt_ecb( int key_count, data_t * key_str,
data_t * src_str, data_t * dst )
{
unsigned char output[100];
mbedtls_des3_context ctx;
memset(output, 0x00, 100);
mbedtls_des3_init( &ctx );
if( key_count == 2 )
mbedtls_des3_set2key_enc( &ctx, key_str->x );
else if( key_count == 3 )
mbedtls_des3_set3key_enc( &ctx, key_str->x );
else
TEST_ASSERT( 0 );
TEST_ASSERT( mbedtls_des3_crypt_ecb( &ctx, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, 8, dst->len ) == 0 );
exit:
mbedtls_des3_free( &ctx );
}
void test_des3_encrypt_ecb_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
test_des3_encrypt_ecb( *( (int *) params[0] ), &data1, &data3, &data5 );
}
void test_des3_decrypt_ecb( int key_count, data_t * key_str,
data_t * src_str, data_t * dst )
{
unsigned char output[100];
mbedtls_des3_context ctx;
memset(output, 0x00, 100);
mbedtls_des3_init( &ctx );
if( key_count == 2 )
mbedtls_des3_set2key_dec( &ctx, key_str->x );
else if( key_count == 3 )
mbedtls_des3_set3key_dec( &ctx, key_str->x );
else
TEST_ASSERT( 0 );
TEST_ASSERT( mbedtls_des3_crypt_ecb( &ctx, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, 8, dst->len ) == 0 );
exit:
mbedtls_des3_free( &ctx );
}
void test_des3_decrypt_ecb_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
test_des3_decrypt_ecb( *( (int *) params[0] ), &data1, &data3, &data5 );
}
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_des3_encrypt_cbc( int key_count, data_t * key_str,
data_t * iv_str, data_t * src_str,
data_t * dst, int cbc_result )
{
unsigned char output[100];
mbedtls_des3_context ctx;
memset(output, 0x00, 100);
mbedtls_des3_init( &ctx );
if( key_count == 2 )
mbedtls_des3_set2key_enc( &ctx, key_str->x );
else if( key_count == 3 )
mbedtls_des3_set3key_enc( &ctx, key_str->x );
else
TEST_ASSERT( 0 );
TEST_ASSERT( mbedtls_des3_crypt_cbc( &ctx, MBEDTLS_DES_ENCRYPT, src_str->len, iv_str->x, src_str->x, output ) == cbc_result );
if( cbc_result == 0 )
{
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
}
exit:
mbedtls_des3_free( &ctx );
}
void test_des3_encrypt_cbc_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
test_des3_encrypt_cbc( *( (int *) params[0] ), &data1, &data3, &data5, &data7, *( (int *) params[9] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_des3_decrypt_cbc( int key_count, data_t * key_str,
data_t * iv_str, data_t * src_str,
data_t * dst, int cbc_result )
{
unsigned char output[100];
mbedtls_des3_context ctx;
memset(output, 0x00, 100);
mbedtls_des3_init( &ctx );
if( key_count == 2 )
mbedtls_des3_set2key_dec( &ctx, key_str->x );
else if( key_count == 3 )
mbedtls_des3_set3key_dec( &ctx, key_str->x );
else
TEST_ASSERT( 0 );
TEST_ASSERT( mbedtls_des3_crypt_cbc( &ctx, MBEDTLS_DES_DECRYPT, src_str->len, iv_str->x, src_str->x, output ) == cbc_result );
if( cbc_result == 0 )
{
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, src_str->len,
dst->len ) == 0 );
}
exit:
mbedtls_des3_free( &ctx );
}
void test_des3_decrypt_cbc_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
test_des3_decrypt_cbc( *( (int *) params[0] ), &data1, &data3, &data5, &data7, *( (int *) params[9] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
void test_des_key_parity_run( )
{
int i, j, cnt;
unsigned char key[MBEDTLS_DES_KEY_SIZE];
unsigned int parity;
memset( key, 0, MBEDTLS_DES_KEY_SIZE );
cnt = 0;
// Iterate through all possible byte values
//
for( i = 0; i < 32; i++ )
{
for( j = 0; j < 8; j++ )
key[j] = cnt++;
// Set the key parity according to the table
//
mbedtls_des_key_set_parity( key );
// Check the parity with a function
//
for( j = 0; j < 8; j++ )
{
parity = key[j] ^ ( key[j] >> 4 );
parity = parity ^
( parity >> 1 ) ^
( parity >> 2 ) ^
( parity >> 3 );
parity &= 1;
if( parity != 1 )
TEST_ASSERT( 0 );
}
// Check the parity with the table
//
TEST_ASSERT( mbedtls_des_key_check_key_parity( key ) == 0 );
}
exit:
;
}
void test_des_key_parity_run_wrapper( void ** params )
{
(void)params;
test_des_key_parity_run( );
}
#if defined(MBEDTLS_SELF_TEST)
void test_des_selftest( )
{
TEST_ASSERT( mbedtls_des_self_test( 1 ) == 0 );
exit:
;
}
void test_des_selftest_wrapper( void ** params )
{
(void)params;
test_des_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_DES_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_DES_C)
case 0:
{
*out_value = MBEDTLS_ERR_DES_INVALID_INPUT_LENGTH;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_DES_C)
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_DES_C)
test_des_check_weak_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_DES_C)
test_des_encrypt_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_DES_C)
test_des_decrypt_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_DES_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_des_encrypt_cbc_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_DES_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_des_decrypt_cbc_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_DES_C)
test_des3_encrypt_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_DES_C)
test_des3_decrypt_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_DES_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_des3_encrypt_cbc_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_DES_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_des3_decrypt_cbc_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_DES_C)
test_des_key_parity_run_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_DES_C) && defined(MBEDTLS_SELF_TEST)
test_des_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_des.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 19,170 | 686 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_gcm.aes256_en.datax | AES-GCM NIST Validation (AES-256,128,0,0,128) #0 [#1]
depends_on:0
1:exp:0:hex:"fb8094dd2eddb3d8004bb79134023ca2be4de9b668a9e4608abdf2130e8becb8":hex:"":hex:"491a14e13b591cf2f39da96b6882b5e5":hex:"":hex:"":int:128:hex:"80883f2c925434a5edfcefd5b123d520":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #1 [#1]
depends_on:0
1:exp:0:hex:"725313f4cb3f6a0d29cefc174b7e4f43cef11b761ef75e1995cb64c1306795f1":hex:"":hex:"27d1ed08aba23d79fc49ad8d92a2a0ea":hex:"":hex:"":int:128:hex:"d5d6637ba35ef2ad88e9725f938d3d2d":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #2 [#1]
depends_on:0
1:exp:0:hex:"4e766584ce0e885e1bba1327e5335796de0831a40f74a5cec178081dd15bfd10":hex:"":hex:"cece0dea024ff47851af0500d146cbfe":hex:"":hex:"":int:128:hex:"1abe16eeab56bd0fb1ab909b8d528771":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #0 [#1]
depends_on:0
1:exp:0:hex:"ce7f2207f83a952451e714ba3807ddb3ed67c2739a628980411aa68366b1f2f5":hex:"":hex:"652fd951ace288db397020687135a5d1":hex:"":hex:"":int:120:hex:"985227b14de16722987a3d34976442":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #1 [#1]
depends_on:0
1:exp:0:hex:"855f8fa4ec6a1206173509d504d0b29dfbfbfa9aa528254b189cd72e6ebc1c1f":hex:"":hex:"1ad1507e6463e4e2e1a63155ac0e638f":hex:"":hex:"":int:120:hex:"693146a8b833f324c1d4cbeeb8c146":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #2 [#1]
depends_on:0
1:exp:0:hex:"ef8dd1294a85dd39e366f65e1076d53e046188c06c96b2c9e84ebc81f5c9f550":hex:"":hex:"9698a07447552d1a4ecd2b4c47858f06":hex:"":hex:"":int:120:hex:"b00590cac6e398eeb3dcb98abe1912":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #0 [#1]
depends_on:0
1:exp:0:hex:"25896e587570ff1823639e1e51e9c89192d551b573dd747e7c0c1c10916ece4c":hex:"":hex:"f0516457c09c372c358064eb6b470146":hex:"":hex:"":int:112:hex:"5a7cadec600a180e696d946425b0":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #1 [#1]
depends_on:0
1:exp:0:hex:"02fc9cfffbe72e7954182993088e09d24ea8cad91a8ca9a336d9f1fe4156486d":hex:"":hex:"0e189e162e097eb2060b30c46d9afa70":hex:"":hex:"":int:112:hex:"7d3d5cc55e6182ec5413ef622d4f":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #2 [#1]
depends_on:0
1:exp:0:hex:"f24e3d631d8961d3d4b9912d4fa7a317db837a7b81cd52f90c703a4835c632e2":hex:"":hex:"510740bfa2562ce99ca3839229145a46":hex:"":hex:"":int:112:hex:"1402ddc1854e5adb33664be85ad1":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #0 [#1]
depends_on:0
1:exp:0:hex:"720ab5aceb80ff1f864379add9b0d63607227f7c3f58425dd6ec3d4cea3fe2ea":hex:"":hex:"58f2317afb64d894243c192ef5191300":hex:"":hex:"":int:104:hex:"e8e772402cc6bfd96a140b24c1":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #1 [#1]
depends_on:0
1:exp:0:hex:"f57dd16fa92a8f8c09d8f13cb5b6633a43b8762e90c670232f55949cdfdf700c":hex:"":hex:"3b7c14ee357b3c6b0dc09e3209ab69f2":hex:"":hex:"":int:104:hex:"43e609664e48ad1f5478087f24":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #2 [#1]
depends_on:0
1:exp:0:hex:"87c17ab919a4bc0d50343c0bb282a969283c2ada25f9a96d2858c7f89bc5139a":hex:"":hex:"02813d3faf30d3e186d119e89fe36574":hex:"":hex:"":int:104:hex:"d1a1f82a8462c783b15c92b57e":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #0 [#1]
depends_on:0
1:exp:0:hex:"dd8d5b6c5c938c905c17eab9f5ab7cd68d27f3f09d75177119010d070b91e646":hex:"":hex:"1df1c3ad363c973bffe29975574ffdf6":hex:"":hex:"":int:96:hex:"749ac7ffda825fc973475b83":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #1 [#1]
depends_on:0
1:exp:0:hex:"4d60a14cb789099c77b8991e7b0b40f787d3458f448501e8108e4d76110f94ef":hex:"":hex:"ca6b3485eb5dcd9dbfa7cffcdb22daa5":hex:"":hex:"":int:96:hex:"3f868b6510d64098adc1d640":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #2 [#1]
depends_on:0
1:exp:0:hex:"405b690717de993ad945d80159c2800848060de0b7d2b277efd0350a99ba609a":hex:"":hex:"63730acb957869f0c091f22d964cc6a3":hex:"":hex:"":int:96:hex:"739688362337d61dab2591f0":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #0 [#1]
depends_on:0
1:exp:0:hex:"ab5563a387e72d7d10468c99df590e1de25ec10363aa90d1448a9ffcd1de6867":hex:"":hex:"c511406701bad20a2fa29b1e76924d2f":hex:"":hex:"":int:64:hex:"390291ed142ba760":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #1 [#1]
depends_on:0
1:exp:0:hex:"abef7c24daaa21f308a5af03df936ba3f70aa525190af0d959d6e50d836f4624":hex:"":hex:"e9f15950130b9524e2b09f77be39109a":hex:"":hex:"":int:64:hex:"db2fb2b004bc8dc4":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #2 [#1]
depends_on:0
1:exp:0:hex:"6ca630b0b6779a8de7a19e5279eac94bf29f76f8b0cf8ecf8f11c4f8eb04aa0d":hex:"":hex:"7373befc2c8007f42eef47be1086842f":hex:"":hex:"":int:64:hex:"e2b8620bcc7472a8":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #0 [#1]
depends_on:0
1:exp:0:hex:"acea7818a71df2c9840aef1c10ecbe2bac7e92216388416a2f36119a0745d883":hex:"":hex:"6d46aa39fb5a6117e9adf7ee72bc50ff":hex:"":hex:"":int:32:hex:"fd5ff17b":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #1 [#1]
depends_on:0
1:exp:0:hex:"b301036d4b2b28b8a4502925986861eba2b67c24cb0c79c63fd62195d9b67506":hex:"":hex:"bb6f398e5aed51590e3df02f5419e44d":hex:"":hex:"":int:32:hex:"47f3a906":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #2 [#1]
depends_on:0
1:exp:0:hex:"89576d2aac554c8982c7df0053be9ab19f4bd80ba9f3dd433c1c054d68e68795":hex:"":hex:"aedbd482a401a7c12d4755077c8dd26e":hex:"":hex:"":int:32:hex:"506fa18d":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #0 [#1]
depends_on:0
1:exp:0:hex:"43c9e209da3c1971d986a45b92f2fa0d2d155183730d21d71ed8e2284ec308e3":hex:"":hex:"78bef655dfd8990b04d2a25678d7086d":hex:"9d8c6734546797c581b9b1d0d4f05b27fe0539bd01655d2d1a8a1489cdf804228753d77272bf6ded19d47a6abd6281ea9591d4bcc1be222305fdf689c5faa4c11331cffbf42215469b81f61b40415d81cc37161e5c0258a67642b9b8ac627d6e39f43e485e1ff522ac742a07defa3569aeb59990cb44c4f3d952f8119ff1111d":hex:"":int:128:hex:"f15ddf938bbf52c2977adabaf4120de8":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #1 [#1]
depends_on:0
1:exp:0:hex:"fbe2d52b7f50bf23a16ff8cd864215034fdfbf4d1506ca3c1ffb015653efe33a":hex:"":hex:"b155f8ab1a8c0327789cfb8310051f19":hex:"ed8d14adf1c362bbaf0d569c8083278e8225f883d75d237a4abcd775a49780603e50c00a1b5b5946c085e57a749b4946f6aca96eda04ac9944a7d3d47adc88326ed30a34d879dd02fb88182f9e2deefaeee1c306b897539fa9075bda03ba07b4ffff71ce732ef3c4befac0f18c85a0652d34524ccb1a4747ab8f72ed1c24d8fc":hex:"":int:128:hex:"c5fe27ca90e5c8b321cc391ee7f1f796":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #2 [#1]
depends_on:0
1:exp:0:hex:"8e888721514fd01fb67513cb56bfd29af67a9ce525e3e697af47450f02053161":hex:"":hex:"9f6bd4a93e4f3f2f5f4a7c2c5b4790bf":hex:"867d50923967535ce6f00395930083523c22f373cfb6c8817764f5623cd60b555572404e54f2fe7083ef32b9a4593a1f70a736d6e8fe61b77def51f3b1d8f679d3a8d50d0aad49e51ec1eb4d4a25f13d14f3e5253555c73eac759e484c6131cc868b46c18b26acd040c3e1cb27afecba7b7fc3f5ff4883f4eafc26c7f3084751":hex:"":int:128:hex:"ea269094330b6926627889fcdb06aab4":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #0 [#1]
depends_on:0
1:exp:0:hex:"d8f82b07e7319ca607c9aa0352070ca883dd7b32af370a774f63b0270f44835a":hex:"":hex:"e89e4484497cb728f86585d8918b7fae":hex:"42340d96e1852de3ed5e30eb4a05e1fb222480b450e2bf4e2cf0fb2a525eb6602ef43a896adc5c52ea5381c642b2175691c014e7a6dae91fa6ff5b95c18a2dd2e8838d3abd46ace0b305f3f22d30a0bd82a81bbf6753362b54b0624c76c0d753e30eb636365f0df7e1bf8bf130cf36062ec23f58a3f7ed0ae7bfbbd68460cd76":hex:"":int:120:hex:"b234b28917372374e7f304f1462b49":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #1 [#1]
depends_on:0
1:exp:0:hex:"b49b04a54a08d28b077ea54c18bfa53e916723e91453b47f88e399046b9b4dcc":hex:"":hex:"6276c577c530f91b434ce5719e1c59de":hex:"6b73f996c49e368fc4d21816153aefb081509f9dc0916dbe4fdf77f39867a2bd617b8a75f39f515b1bc1454009d5247efcd90ba0d4a6743c6f12a929b666584f3b55254c32e2bab2321f94fa843dc5124c341dd509788a158191ee141eb0bc4e1b96f6987bafe664a0f9ac6d85c59cee9564a27bcc37dffae80c57fbf7e748ce":hex:"":int:120:hex:"69dd5bdeb15fdbc3a70c44b150f70e":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #2 [#1]
depends_on:0
1:exp:0:hex:"398bb37bb991898c7dad7bf5930dbad20d121f68d5ec6c56ffe66f23c0c37f8e":hex:"":hex:"0c3bd55b54c1221b0cf25d88ea4dfe24":hex:"4c48b929f31180e697ea6199cd96c47cecc95c9ed4c442d6a23ca3a23d4b4833601ac4bbcdbc333cd1b3a0cd90338e1c88ef8561fed7ad0f4f54120b76281958995c95e4c9daabff75d71e2d5770420211c341c6b062b6c8b31b8fe8990588fbad1e651a49b0badd9a8d8042206337a1f2aa980b3ba3b5ee8e3396a2b9150a34":hex:"":int:120:hex:"8528950bd5371681a78176ae1ea5dc":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #0 [#1]
depends_on:0
1:exp:0:hex:"8e8f7c317b22dea8eabe7eaa87413a98ff56570720985b6743a5f9af56387cca":hex:"":hex:"3a9a5a839045723afdfb2d5df968bfcb":hex:"a87d95f8f47e45a1c7c5c58d16055b52b3256c52713fd092bcd6cbc44e2c84669f23ca2a19e34163ee297f592f6054dbc88863a896c2217e93a660d55a6cd9588a7275d05649940d96815c7ddfa5fc4394c75349f05f1bcaff804095783726c0eceb79833a48cefd346b223f4e5401789684e5caeda187a323962a1f32f63f02":hex:"":int:112:hex:"faad6a9731430e148ace27214e68":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #1 [#1]
depends_on:0
1:exp:0:hex:"67c95e57197f0e0bbaaa866d337fcc37f3a10dc55a059f5ea498de204d2fff61":hex:"":hex:"5f171d203c653a316cac43df99f4033a":hex:"84f281b388ca18bc97323657a723a56260731234720b02b6dde00ea134bd84a1893bec38af80214c4da01b93958ab00f3b648c975371e565d5b6bf2a8f63c0f3cfcd557c9f63574390b6ae533085aca51fa9d46cd2478b7648b6dcbbac7e61197a425778debe351ac2110ba510a17e2c351ba75d5a755ef547cf9acc54650222":hex:"":int:112:hex:"9ea9c716e06a274d15a3595a0c41":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #2 [#1]
depends_on:0
1:exp:0:hex:"9143f00e31c72bd9fced31585d047f67f1004e6244c3d9c10c8ae005feeabc84":hex:"":hex:"e49cd6af9a2f0da2a7198317da92ab2f":hex:"ab9193a155140d265aabfe2dd5efca7d3fa6129498532bccd77f09fa1a480702620b3ab53df91b01262122f1a6fc387b5fc55dadfcdb99ada83d4a5b0666c8526de309f41eb54d69b52595c43550a6bf7b4b8f0e0c48311b521762eaa567744c4c4704dd977f84068b59db98a67e33cc65302ba59360d600a22138c5ad3317f3":hex:"":int:112:hex:"8293e361fe0308a067f89aea393f":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #0 [#1]
depends_on:0
1:exp:0:hex:"d0ba180075c373116bb037907b512add00ba9a4693a8ecc14ca0d79adada90e3":hex:"":hex:"5c1501b19cce5404dccc9217ac8253b7":hex:"3a161605ec0055c479dd48cdaeed5981b8b60fb7b7781cc4e580218c7014c3060a9f706e6e16cf4021e4d38deb512534b484ff23b701975bdf901146ccaece9c3ffbbeeb172cfb64a915ae0dbe7a082b9077776a387b58559a881b9b79b90aa28ad1ac0f2bece314169a2f79ea4c08389f7f7dd10ee2d9a844fee79e7bf38bcf":hex:"":int:104:hex:"0541262fddfd5d01ff0f3c2fb4":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #1 [#1]
depends_on:0
1:exp:0:hex:"c975c7e59133c231d1b84c696761c413ba20aff7fb7d854c6947e65db3cc57b4":hex:"":hex:"d8fedda4cccaf6b0818edcfa7b1f03fa":hex:"cb4cc9171367d6422abfaf2b4452da267eb9ccf1c4c97d21a0a125de486997832d16c7e412cb109eb9ac90c81dfe1a1dd9f79af7a14e91669b47f94e07d4e9bd645d9daa703b493179ca05ddd45433def98cf499ff11849cc88b58befbdd388728632469d8b28df4451fc671f4a3d69526a80c2e53e4fdee6300d27d97baf5f4":hex:"":int:104:hex:"77ac205d959ec10ae8cee13eed":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #2 [#1]
depends_on:0
1:exp:0:hex:"a86ec688222c50c07274ed2d2c8ae6f883e25f8f95d404a7538fd83224199327":hex:"":hex:"99c73fdb8f97f225f7a17cf79c011112":hex:"cf5f707de0357262c0997fa3ebfe6e07192df8db5f029e418989e85e6b71e186b00c612ecedbfe3c847e58081847f39697337ae7c815d2cd0263986d06bf3a5d2db4e986dbe69071fd4b80a580f5a2cf734fc56c6d70202ea3494f67539797252d87cd7646296932959c99797a0446532f264d3089dd5f4bcceaaa7289a54380":hex:"":int:104:hex:"c2093ad4705e613b09eee74057":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #0 [#1]
depends_on:0
1:exp:0:hex:"d3981f0aa1ed8cb369d9b0d7b0e529ec6089ff2d226c542885b1bff55276e891":hex:"":hex:"7331f91bd1a67c21c9dd336a2a922839":hex:"406d9cf45fc8618d564154241dc9c006ecdcd847406e5a6e7127ac96e7bb93f4c339ff612c514b6f66df95a0845035d7535212a2aaeeb0ee512d1f4375c9a527e4e499389c2d7f7f7439c913ea91580e7303767b989c4d619df7888baf789efd489b08eda223f27da5e177cd704c638f5fc8bf1fecfcd1cab4f4adfbc9d1d8ba":hex:"":int:96:hex:"dbb7ec852c692c9a0e1a5acd":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #1 [#1]
depends_on:0
1:exp:0:hex:"8436967f97c59ca73b760b73c6e088d1da4e76b712188ab4781d8d849505ae47":hex:"":hex:"9401dd0998914645668d06d518bfe7d7":hex:"a5f40906177417097c19a0a21dbb457a694e173141837f695b09c8eb58ac2ce28aace4e59275b6266da9369a9905b389e968aefc64d78c7e1d2f034ef413d3458edcb955f5cd7971c28cd67dc9901ef3a2abc6121704bb5ecd87a6568d0506abbc87a2f10205dc8eb0cd1b5109158d0e743c2c3a342d60b8d55bbcb8d8507ed1":hex:"":int:96:hex:"dd6d988d352decc4e70375d8":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #2 [#1]
depends_on:0
1:exp:0:hex:"ce6b846bcedc6ae747e66e72cd9f7664e6cad9627ba5f1f1923f3d3a6ed590d1":hex:"":hex:"ac865ff8a6255e501b347a6650510d05":hex:"1658b9f8469af1dfa60458cf8107db1edd1e4bba70a0bd23e13e1bba0d397abf51af8348f983fcdfcc8315ef1ffc9a26371377c62ddba08363bd2bf0ff7d0c3b603fad10be24ecee97b36d2255a8b2efc63f037123cef4bb4fe384aa0c58548b2f317c36ef3ef204b24769de6ba3e9d89e159e2bf1f9d79aeb3eb80c42eb255e":hex:"":int:96:hex:"7ee87acd138c558455fff063":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #0 [#1]
depends_on:0
1:exp:0:hex:"0038ecf1407bbf0d73afa5e010769b71e8649c4249345dcf923ef9da0254c6af":hex:"":hex:"74c6b98fc6ced3a59bd9c42d31d71095":hex:"467f483c71c3404fe7f09d6f6b6b64c3b7613a0dd32470cf24bc590d3994a48f3e8cd5dc19ea8ca7d5366ad7c5ad31cc9612dafedaea109dde2aedfe5fc2a0db2c903dd1dc1a13949720a10babf37fba5a0ed7cb5f3dc9eb5a4d8331f218e98763e7794b3e63705d414ef332160b0b1799f1ff5cbe129a75e5c4e0a4ed35e382":hex:"":int:64:hex:"62fe088d9129450b":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #1 [#1]
depends_on:0
1:exp:0:hex:"19fc4c22151ee8515036c38bc5926c0e0bbd93db5d0fc522b2a6bf6298fed391":hex:"":hex:"9547f056c6fb9ef72b908f527cb500c1":hex:"511b15c25b2a324159e71c3b8e47f52d3e71e5bc35e774c39067250f4494c9c4eb184ecbe8638de9418672d9ae2c6a0e7f54c017879ffb2a371de1639693d654a43cb86e94a7350508490191790d1265b99e7b3253838b302aae33590949a8761a3bb2aeb1ba798cddeb00a53daad05a33389d4a19269d65116a84f12dba5830":hex:"":int:64:hex:"04623912bb70810e":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #2 [#1]
depends_on:0
1:exp:0:hex:"3b5d3b1920b5a105b148153ae1f1027c6d48bc99640ea853f5955fed4eb3d625":hex:"":hex:"9a4091c2eb7e88759bd9169fee303485":hex:"aa680d07143ba49a9099d555105fc3cfcb898cec11ade96776dc9778cc50fe972e1e83c52c837b71e27f81d1577f9bd09afe2260dfd9a5d9dfbd3b8b09a346a2ab48647f5dd2ff43700aecce7fa6f4aeea6ea01b2463c4e82ec116e4d92b309c5879fb4e2ca820d0183a2057ae4ad96f38a7d50643a835511aedd0442b290be3":hex:"":int:64:hex:"033bfee6b228d59b":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #0 [#1]
depends_on:0
1:exp:0:hex:"f6c4ad8e27764157789252f4bc4a04145cb9721955330a2f6a2a3b65cacf22bc":hex:"":hex:"3de136cbd75061c888226efab136849d":hex:"0f6951c127d6bc8970e2ad2799e26c7fb9ca31d223155f88374984b5660626c83276ffa6c160f75e0e1bcfa96616188f3945b15fc1b82a4e0ee44000a684b3c3840465aebe051208379ef3afe9f569ee94973d15f0a40c6f564fa4ba11d6e33cf8ae17854a9e12360a2b8495e2cceec463f5e3705c74069ba37ba6d725f458c0":hex:"":int:32:hex:"f658c689":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #1 [#1]
depends_on:0
1:exp:0:hex:"30cd99fed9706c409e366d47fefc191f79bcc47a28be78f9890fd90d4864eb85":hex:"":hex:"8c7ce34691503bf14c776f8809f24e61":hex:"4b6b10c2e2905ab356769b6453dd160a08e8623b0878fcc1c1d64822f0aea1f4f5b4698ded5d23ebafa11bc1e4ce9e5cd7d7c7b13de02d11a945ba8361b102ba49cdcfd6a416e3db774cd7bda024fccd1ad3087560dc15bbfe9b1a5c6c71fae17a329f104f6c2cba7eb6a7459535ca328146d0ccc0a9bd28a3d1c961947a3876":hex:"":int:32:hex:"7777c224":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #2 [#1]
depends_on:0
1:exp:0:hex:"9472f2452933dcfac4bb22831ce83c6a1ddf25ef8d2d3ba59d72b0d173a986e8":hex:"":hex:"18fb2c34b0955d712960009617d300ef":hex:"d283dd75cd4689c266c8e0b4b6586278aa2583c7c41bf12bd1cfdef21d349acbbabc0a2204dc4130f922949206c4fbdce3786ab8614e32908838a13b6990453abf14b84f5812e6093644accdd35f7ad611ea15aefae28b3cf1fc5da410bcea4f0a50d377fdcceffe488805bc5a71fab019b12fa8725d6e7c91e6faf12fbaf493":hex:"":int:32:hex:"c53b16a1":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #0 [#1]
depends_on:0
1:exp:0:hex:"e06d5319210f4107ea7267fa2e8183fcbf74fd3b0579b856577177d9cb307d42":hex:"2b9179d21cb884581b0e4f462455167f1f7899717245d4aed3d8db5983daccccebfc2130a20c284563bea5997cc0438c83d8fa7bb9e3588efed285a0fcc31456dc9a3122b97bb22f7edc36973475925828c323565e417ec95190db63b21881016b5332f2e400bb4724c86a8ee0247149370ee5412f743dc6bf7ca5bcc31afa0f":hex:"f2b0564705430bc672964b049115e122":hex:"":hex:"3fa342a76cb5d501e6a6fade14aab54a76620e4ea2287147d4ca2b9d62d2a643591e5df570ef474ee88ad22401c1059e3130a904e9bf359c4a6151ff2f3e4f78ef27a67d527da8e448b0ef5cdcfec85f3525e35f8d024540387e4cdcb1018c281a1af7d4a3688a0fec4d9f473c816f7d4c4c369f70d7dfe8f1b7fa4f581098a1":int:128:hex:"18f186ed1ee1f4f8b29db495587d0ab0":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #1 [#1]
depends_on:0
1:exp:0:hex:"0dfa834e98b6c51ee925dd9edc9be72c209ddcd9099ded57b533f2236895a229":hex:"7f4e4f11091bf51976c0fc71ecbcd0985cdad2135549c818c09567801d8a9a42c719aab7dc2cb58a10b5067d14c52cabe6bb9b939e7b9cd395eaf10ba6a53fd2e6446e1e501440134e04e662ef7ebb1c9c78bbd3fd7cb9de8b985418be1b43ebb5d7902ccb4c299c325c8a7cc1de9174f544bc60828c1eebad49287caa4108a0":hex:"a101b13b238cfac6964fd6a43daea5a7":hex:"":hex:"bc60d2047fd8712144e95cb8de1ffd9f13de7fda995f845b1a4246a4403f61ca896bd635a1570d2eb5b8740d365225c3310bf8cea3f5597826c65876b0cbcfa0e2181575be8e4dd222d236d8a8064a10a56262056906c1ac3c4e7100a92f3f00dab5a9ba139c72519b136d387da71fefe2564d9f1aa85b206a205267b4cfa538":int:128:hex:"c4cc1dbd1b7ff2e36f9f9f64e2385b9e":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #2 [#1]
depends_on:0
1:exp:0:hex:"ce59144b114ac5587a7a8079dc0e26f1b203338bb3e4b1d1d987bddc24150a82":hex:"bc7aa1b735a5f465cffeccd8dd4b0a33a571e9f006dc63b2a6f4df272a673bb2cc00e603248ab6be5627eebc10934fe4d1dc5cd120a475936eefa2c7bddea9f36c6c794d2c6bd2594094e56cac12d8f03e38f222a7ee4fc6c2adffe71c9c13003e301c31ff3a0405dde89bb213044d41782c4bb4eb3c262595d1c0e00522047c":hex:"fdc5a40677110737febae4465b1a76cc":hex:"":hex:"084c31c8aef8c089867f6e0ce6e0aadafa3016c33c00ca520f28d45aac8f4d02a519b8ebafd13b9606ab9db4f2572f396091bc5a1d9910119ca662d476c2d875a4ab62d31ff5f875678f25a4775fa7fc85b1a3d442fb2c5047a3d349d56d85f85f172965e6477439045849a0b58014d9d442e2cae74709ed8594f0ec119d1d39":int:128:hex:"4c39e0d17030a5f06ecd5f4c26e79b31":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #0 [#1]
depends_on:0
1:exp:0:hex:"e7a6b459a5370ceec4d429bba9472a49db07697dc66dbc2f294d3e62ffc8aac1":hex:"cb959e5611a636317feb5265d33b315c2f5af64159029f0032e338babbdb0a525ba6b92cb3be7db9f0077561e6cffe1247bad32dea8918f562dc3cd83225cdbcaed652b87c62fea8eff153638a3a14ef9f9a88bcc8c9a6b65fa9dcc53f63d1b14fb9bb0baf17e7bfb95690c25cca2c3097497e41f7e2299a8518d5d1c5f6264e":hex:"92468d42ad377affa7e808d95d8c673a":hex:"":hex:"599dbc47e2f2e3b06b641c510b238417b01869f0e7d08619752f6d9f4b08585731deaeb439ff26e02d7e51b45ca5e3d4a779fe4cfc9572d1d6407f98de69a8fca60bf01d1a769130bb38a67933a2be3aa3ea1470d8f32a34dc863dc800feb7ef71588edd9489bd59a23685ff5358f9b562fc0bbad9e11db7a6fedbd79225539d":int:120:hex:"e853262ed43e4d40fea6f3835d4381":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #1 [#1]
depends_on:0
1:exp:0:hex:"9818904a99e3d80c95dc71a16483ade1b9b8e7df638ce6a4c1d709a24416cbe9":hex:"2c073cdc11a8d58fb55e1dadbbc0372dde86c387fa99c9249bd04cb2f2d239de01bec8c8771a9fb33664ee06ea81c37a824525664054173b63a2894d8d7ffc60b9e93052802478a189be5835d979a28ce7025b219add0622f97c9bcf3ecf629b56408ed002a141061320400409345e94a7a7e3906611305f96f2abc9d62cc435":hex:"96a301ab6bc0309be9735bd21cc9e10d":hex:"":hex:"4876e449b0cac09a37bb7e4b8da238f4c699af9714ec4fcf21a07c5aee8783311a13149d837a949c594a472dda01e8b6c064755b6328e3ef8d6063f8d8f19cfda3147b563b0f5fb8556ace49cb0f872822a63b06f261b6970f7c18be19372a852beadf02288c0b4079587c0f8eab1858eeec11c6ba8d64448282068fddd8a63d":int:120:hex:"e1e8b62ce427e5192348b1f09183c9":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #2 [#1]
depends_on:0
1:exp:0:hex:"9b34f137e3f37addad8a6573b8b6dac9a29e97db53c0a7610f37c72a0efaebfa":hex:"c1e09c432c68a2c119aeb3b19c21180e3c8e428e12033f416a92862036f5e8a39a8893b10fe5476e388d079143ee0b79b183a3400db779cfbf1467d69887306b124a8578c173cd5308d4448eefcf1d57f117eb12bc28bd1d0ff5c3702139655197d7305bda70181c85376e1a90fb2c5b036d9ea5d318d3219132ea6c5edf7b7d":hex:"50dddb2ebe4f8763509a63d07322277e":hex:"":hex:"793e1b06e1593b8c0ba13a38ff23afaa6007482262bc2d0de9fb910f349eff88d3dd05d56eb9a089eed801eae851676b7a401991b72bf45ac005c89e906a37ed7231df4aeeeb1fcf206ca1311117e7e7348faf1d58acc69c5702f802287083d3ed9e16cf87adcdfa1bb0c21c40c2102fd0def91985f92285e6ea1cdd550e7f50":int:120:hex:"b3c6ae17274faaca657dcb172dc1fb":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #0 [#1]
depends_on:0
1:exp:0:hex:"66b40e2e671bdf244b45644d1a5adc63011b32156ba9f5e03dffacc1a9165061":hex:"985546ee12ba89d95988ad8a4153c4f9d3c91c0e3633a95b4f9b588bba0032006c93210514357c91d574b436da13dc9f68194a981e7b65eb79e56be9cf1dabfdf531407727c034a3c7743bb22aa02b26f159c2eff3c7ed52027de2e8b8b2fefb72c04fbf20a1ffe10d6dda790a9812cdbe9f2ed6706d7a2639e851a42870efb8":hex:"4e090871e889b4be36db5e1df1ea283d":hex:"":hex:"f93eebffeddfd16b4618b893d57b459b704b894b38a5eaf6cce54026c80090be8328e12261e1b10e81c73ac8261c2982bb25603c12f5ffff5c70b2199515c17200db2d950a3f2064d7b362607adbf3686f27420ec15e18467e86faa1efa946a73c8888b8fdc825742b8fbec6e48cdabbb45f3cd2b6b6e536b6fbf3429aebe934":int:112:hex:"ed88c856c41cac49f4767909ac79":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #1 [#1]
depends_on:0
1:exp:0:hex:"18c5105a9651144ce965b4270398b982120b885850114571ef8e2cbc5d2f5e04":hex:"00c5ea3d91248bfe30c5a6d26dbdf0609f977afcfa842b603c1061b2a473c9a79b421b2509550309e4be9c5015c51c6def9ee68c242f6e206b3027ce8e58b7ab96aaa50ced1d78c2dfcbc2589575bec2ce3b6a5066276fe7dca4f1118808d1e5cac062667053c15350289da03cd073377c2d66c01e3098ed01b75788c7e1f9e7":hex:"a3a5f82748acc887e33328fd7f4ce1fd":hex:"":hex:"d91ed6886a269dc1eb0745dc4b97fc54cbea5e6857d10a303a3caf828b4e0e20bb742bca17021b7852d09a6d7d3a56ad82298c15a2082fed0e0e326bb16dd677ee262ead93a24147de3c07eb8a95b108abf17357155f1de79171689407b6545c9fdf8ab4486576490430c0e043e21e7c40ce88e752cb006cb3c59479a7e56cf7":int:112:hex:"add4e086d612a119c6aae46ba9e5":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #2 [#1]
depends_on:0
1:exp:0:hex:"4667cabeb3a644e371cbbe9195413daab025cc6efc12298bfaea0dd9bc028f9f":hex:"9772ec47f3cd26f091bf117e085f2394db258c2c460dc3b1402edcb60a8f70517f82aa669607b78c2ad79c662c3b376cee1b9f34c4ec5d15319c33de78a440e7f2a4108c3c9da51604adde2025ff1dc336c49279c13a7153931df675df0e78f17a4d72973311af74fe755c85c7869baf3896bb738925942dc67f1b6e690c9d48":hex:"7e8927c69951d901494539ab95ac5906":hex:"":hex:"5d62fa69cfbfdec30193408dad15cf983ad707ee921068b817676eca9f70f9ca4623a8c113df5fba86131415f4ec546c7f1a94ff9d02cb8ddcf421c7cc85ed87ce712fcd8d5f45460749ced0d900fe0368c59b1c082bd5811c1a648a51768d5e4bfbc23cada3791f289d8b61fd494398be1ad9ee9ff471abb547000ac2c1a5d1":int:112:hex:"0ae6bd5e8c25d1585e4d4c266048":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #0 [#1]
depends_on:0
1:exp:0:hex:"3d58cd514de36ca7848aad1bf4d314b3b3415cae1ce9a169021ae84a67d4ab69":hex:"e1c2e79e3f64c5c64f853ac9ba1a853fbf1bfd3001d48f7e73e0e97aa1b8ed1f1a7066178e75df688c5edb1c42e270ea38ab0e246c6a47fde4c3141436fe4b34beb9033ba7eebfc53cf1f6c8ae1794e9bb536152d196e1b96803316a05f1dcb9016c8b35bf4da06cd18da6243acc3a3dc641d3a1332b1915932ca89937cb0327":hex:"4a1c2e7a3f9788c3c2fdd0dcc0cfe84b":hex:"":hex:"50d63c660a2b4f8e87276c5f58556cdf15d0fbb2c8ea5e3266d28c515643109aa7fc950d6d48f504dad52457e16576b581d37574574cd8b7ac12b7d59b819992c941a27e23ef9f257ed0c4ea4eda6c1f3b28b44decb63a92fae84c3556dcb9d6458e729dad6a7db9f7411690fce971b3b240f8f9979ed992f87d76e227fd7384":int:104:hex:"ac842579bdd1ac77c84dffac2d":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #1 [#1]
depends_on:0
1:exp:0:hex:"b7e4cd80f03a7ed092c776b243dfad7776d9caf3e679939038e33ac94d8931de":hex:"102e2d2c0d01dbc69733d2451d1ac1817d60418685d4ae8aa44e1ede1c1e08d2f71f0aef41a72bd9f052ea4a9a057330c95d964f8c3679b80fc9c0952b46f38e2ef055cb33703d686757400210fa5a39bc7e3bb9b8b9cc20c95d5607e2f10bb5501507680ef3aaad96553333b1d27bf2f7ac102c983eede2262a5c6237c1d754":hex:"af160a983d674b7d19294f89c3c9307d":hex:"":hex:"6bdfae299d796ef36850327b091ba7bb02e29b643ca4c8bc199eb91ecbaf88426412cfd5570e0042cab735cc46ec648b0877955b3f9a5707d56c478aa77ae5510749beb1e44dbbb37791f18477123436a985e5e9f79fda0a057504847e4ecae841f24e1b53076d3efc6bdea2ebb336ee0e4b5e6ea973e3e50a27b5c2e6fee3e2":int:104:hex:"fdf21e2ac356e507745a07fc96":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #2 [#1]
depends_on:0
1:exp:0:hex:"3a0c46eacfe85cbc0c5f527b87cd075bdeb386d0ca6de816a87cfddcb8a87ae8":hex:"6d1203dc8395e35a35e234203625ea9d37d1c009db2ac8b1d5b29021997b5421f1d172f4c9a7eb7dbb67f0002720fc412f5b1550c739a2d7ba4387a1f978bd548fe6169d9473893782b10fab99198cb8b4553dfe27583c017136fd8c95070d8d7f9a602d15248d38d728157a0b26404e662f9a5554d3e1582bc0e12f0054792f":hex:"b1cde63ad2ad4b8a7bfb36ab78385c3d":hex:"":hex:"9de3a45c976d32ed2af5074ef13b1f86f35b1689b1c698b2e427d5dd62556eb14439f77cd8fcbe686a9a08a922e3f54a78e86fd284de493a740586360b63da09bc1d001777582969c679db54a0ddb8d7dfdb46750edc882804a1c00e417912b72b4cad54dffa1897eba6188b3e61ebf0c3dfab292c2686dcb9db3012e0788c7f":int:104:hex:"641896daab917ea3c82524c194":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #0 [#1]
depends_on:0
1:exp:0:hex:"4d540e0ba27103667eb4511ce9d243592bccb8515ab59896c9922cb5f1b47a02":hex:"d79f9b1c74e3141f188704c8d5bdaaf6083642be50d00f20c97b56646863895250d131e00db0ecf4f035d42f08cfe20f401c2d3062a38daa0b9e7c19fa7c5d344680aff48d506daa181451f6b34ed9099b9a5b39c0166e93ac4463c9ad51f48e3063b1c16793615336f55d516d079f6c510c2891b97aaa95e5f621e3b5202620":hex:"a2ed37daa797522a39b01dd206d06514":hex:"":hex:"6a891bd289ec05990424a2775287f4725aecefe1ab21fa0ca643f37829cae9fcbbf805b883f807102ff12f1a85964df818057daedd41c7349ef32b24642186c45d2858c3260d5b90594969e26b691963ac7fbd2eb4eef466ae690ca274d9194dfc4df1c3baec02abc38fbfc0e2c7c4fcafed227d4f6607329f57ee439435c714":int:96:hex:"9074ecf66bbd582318495158":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #1 [#1]
depends_on:0
1:exp:0:hex:"151d7e4db9e21c87bef65c2ac6aab5b6b045b7dadaf6424644a91e04ba810585":hex:"0984c5d3f68beba1db4e6ade429cb8954cccaba9fcf4d852897ef69f8483428932c8f18a891f54b68f7d49a03c57f7144d802eb996d233cec930d5eb19f43d0faf9c94a2d7aaca40c8066a2882481f521bb5f6ba15b213810da373817eab3d52b5dd143a1521239482fbf4a07fe68c3d35c90c6ce27b55e40abcf432a261dc58":hex:"49e0e0d089e3574fa5a33c963b403ccd":hex:"":hex:"6938d8a7625d1291f249ef1e086bb030ccdc844a9271fee16db60e7acfe4aedd720de76345109d5e6849fd1576c0fe0c34e73dca4011f8565cffccef427198c927f19f63b821f43844d008ceee0566f0d8062d7860e92ebdf21dcde80039a04504cd8ee94874b2eeb038962a74ac9902d9d7ce09afdac7aa706bf3892de19531":int:96:hex:"48d3a8116213f92bfbe86bfe":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #2 [#1]
depends_on:0
1:exp:0:hex:"3e9615515ca45109316cc02bbf3a23406eeeab2092dc6614db76e4e047a3b023":hex:"46c4c6bad0f21172094ae07a47fd76477b69ca75cc08970e8dbf7b8644d4bcdce96f9d15dd3fba5fba3f851af145652ad004ee525d180d2f3e03bc0ec1c0e8ffebc1474c342732b7247f657ba87ffcef9333857123f29c4976b048c89c24107529dc5dd69004fd176eb0ca6ddae1df7be7d28b3b9da976413588f20c1fff488a":hex:"c1facf73da64e16e4acee3fdc3cc6b10":hex:"":hex:"4415dc96d3daf703d392ba1318254143a58870e691570ca6b1be6074dd9c1feae12c72f9314fc3d19b6affb59b642ade6c4e64b7c99f850bff781de193cc0a321a29356addcb0918a282e53801541b5b01383fa7624c36d1f67423f02d2b54f58deca582b7031d192a4d32bc154ae1149cb3c5b48538c803a8d01fa7cfc1683f":int:96:hex:"322d8d1b475a7fd3d0c45609":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #0 [#1]
depends_on:0
1:exp:0:hex:"52c1a14b4ed57cbfa317fe0db87528f4c5551deb9ffc88932589e3255b1d3477":hex:"eb9081e19b63c94b5f3a696c5fc2c0b7f434e1574394d0b41dd67dfac28a73d4ba26c86b3728b2802fb9d0930c89586b09602900d33eddc5a00a4e98881b5acd5597aae9b80b1569ede74042948f2cd66c3eeae227ae10241df001c85dfe8a5fda0aa21142ecade76290dfdd4a27b6ff3a932dacc0b5f461501239ae8d6d5f41":hex:"36d02604b5b24f49b08bb01053a23425":hex:"":hex:"12fbea9e2830ba28551b681c3c0b04ac242dbbde318f79e1cb52dba6bdde58f28f75f2fb378b89f53cef2534a72870a1f526b41619c4b9f811333e8ee639be1250a5c7e47ecbee215b6927ecffaf7d714327b2c4e8b362b1a4f018ff96f67557ca25799adfac04dd980e8e33f993051f975f14e05be8b7342578d0c9d45b237a":int:64:hex:"01e6af272386cf1a":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #1 [#1]
depends_on:0
1:exp:0:hex:"4d08a07b3e94025523a4a6415029c8f9e11fbbfd72564964c53b8f56f865af0d":hex:"4ac7c27b07a4aebe5caf1de0538d13a56e8c11bc73713bf78c7abbad3b9f6d690e00487267da108e2f2ae67c24b4657e77bb83e2d5e4b244cf34e924cf7bdb443f87ac8cdb374147449f8d06eb517a25dc86f03a389f34190aed5a7faace03ebf646fec2b173b2c15fd5cbe7c5affb6c3ee6d1cace8b00dd8f668a2336da5bfc":hex:"98b745c7f231ba3515eddf68f7dc80f4":hex:"":hex:"337693c5c746d8fcdf7cd44d8f76a4db899402b891176e85b4c549c366ad709322874e986d6b939a350d2a0e3b77924d6d15454d882d1d3c94469d749a20d8f0116504cb31888a1e81d3abf25dbb7a7f9e7def26b9151ee649c059da1955f1716423c734dcd26a548844abb6b64c44383ec698e59361b6582c6883b77c338342":int:64:hex:"7a9266c4e5ae48f1":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #2 [#1]
depends_on:0
1:exp:0:hex:"b9d9fc42b58deafe9bc9734f4129dcad34a2e55ee5ad8abcc3f7bc42dd2c0e05":hex:"11dbcd6cd53d2af766a1b6e4af2bc8bac2811ef818da2d1f81c140ab6e0298e958fef033736bc6e0dccd660b9a3e4222bdf3f89a95b206785d22852201e6dd00b44232ef3c03393893813dccf1960410b50cf50602ead8bd246fad88e66c88b50821578004779b6c45c13d8211df1cfc0fb2d7a342f58e4f2f3623fd31b12c30":hex:"67931493096f4550633c322622bc1376":hex:"":hex:"66ab6e7a547705d8ae8ac3cb9bc5fbbc18cd220f89aec7dfbf4f72e7bc59b483c50c9471523c3772efc5deee3a9c34c96b098842cc42f9b7d7c0d2530f45900eeb9502e4dd15363b0543c91765121fd82fcc9db88fe6a531b718c1fe94b96a27856d07707fced3021cca9cf4740833d47091797cc87f57f5388b48e2296ff352":int:64:hex:"0de60d4126733404":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #0 [#1]
depends_on:0
1:exp:0:hex:"97e736a63870546ec9c2325a8e367c8ea17a7ffa71f6cadd6909a5bb9eb12814":hex:"608280a9dcbd6dd66100a9fdd00e6dac2183e32c945b2b4d255c048243bfea15aad1a10ff3eec0ba79c531239b489a5dc155dc2775519f8d3d2ed82fa7ac653fb7c77e0dfad1c175b6c69963f5c12ff9840f18e0202502e9d1e3b170965cd86ae411af20e6d69a608c99ca8dae3cb3bcce666841132a99429bcde490d9f0b6b5":hex:"d35192b4d233507b70c6d32f8e224577":hex:"":hex:"568a0d584fc66c876b7beb9ef8709954a2c426fb8c1936b9024181ca2cd3a7684c412715c11eab80a181be0238e32a2b689e9db36a2ac87db651058080531e7b1110938dcb09615e385d7b224b11222469145f6fb5f4c0e87b08bb3006bc5b6d2ce0a15be7fc29b27c10c645afd9d8253c094fc0f775086bdf2adac265b474d7":int:32:hex:"af18c065":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #1 [#1]
depends_on:0
1:exp:0:hex:"6d05193cc0885f7b74057ead3a0738b74eb3118b1a7e74c5c941ce0011197122":hex:"c58f51bad815a43a5705c311de4a846ea2a70cbdd2c30d709a2ae0ddf82b7c889dc599fb6e0328fad21555a99530be6deeeb5b1beb333322c2b747288e52fad008513f8040a4735cab3c8cf32c4e18bd57339c85cf5dd71e382067bee7e9ccaf68e767d77fb005a3b73a51acf942fc3b2c5c9eec6189d01a26c6ffb070165874":hex:"5160b65bf7a2ccf77fa2e3e0b3866f26":hex:"":hex:"64dc5834a63be414c3714f1b34feddbacd568c6466cbd06f665aa269187a160db79306a53b629fedc1247bd892998fe3208b3105f6273676bbdbff6e254de332d02bc8842ef98d6b79994792eeb5be3a807452b14ae5b5027db81421cc22936ccaa7ae1b77a145462634e424ccf2dfaf001ed4477b804e204120a1416b449b8c":int:32:hex:"364ef0b5":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #2 [#1]
depends_on:0
1:exp:0:hex:"6e8006983712ddfedfebf95e6cc3b0aadc23077055e500ae49fae7705787f2e3":hex:"e3ba14c4e39ebad925997649872b8331f1700c8f98f80e58d92c85a84f2a427094d9d771b276a0d35b17c0c030734399070a57345d4dcf082b96c7eb580618f7af8bdf036296e20379e74e29f905b52a0c46fe7d46201a075e7de7e1a523a0492c1f228102fdb89f019bcd4571e041c5d37159dc487ec139fa37d33142fc8082":hex:"e36e39d787394f1401fc4b173e247db0":hex:"":hex:"4d5db4b65a1ca31f3d980cc30037b5d79d28280a31cc5d0274be77dad70dcd37f652f2ca999c9aecf08fd2a02d382457a277002a1a286ab66f9e437adee00c3bab04f831dd52147005a989606171b6017d28970c8986899fb58900e23d1bc6a9ac0bd4d8b5d6e3fcaebc9903923e68adae7d61cf929388e0e357c7223523d1ff":int:32:hex:"d21637c0":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #0 [#1]
depends_on:0
1:exp:0:hex:"cd8ec237009eab590dbd9b31e76513dfa3501701b1a706982944441d996e1839":hex:"9eef7c9a0fa3e9a7fcc4b2f9d210a97d6653ded7913f2fb2de825a0dfd78ae1cca68c040f2328009fffe62937d630ee9d6e0e67bc12c38c0b3d035697d4c2311371aacf41cce0d523016ee436a47d93af0df77011131856d072c718c310f0995b71530d70a3da881481f46f21dda62e3e4c898bb9f819b22f816b7c4e2fb6729":hex:"a3cae7aa59edb5f91ee21231002db8e2":hex:"45fa52a0e8321d82caea95bd9506f7331923e2aa95e9238908f3ff30e17a96389dfea75e225e34e1605354eaaf999a950f469c6e2e8722da5ad9daded6722baca00e5d1b8e63266ad1b42cae161b9c089f4ffdfbbaa2f1fb0245d1a4c306d46e215e8c6c6ae37652a8f6016f92adb7695d40bde8c202ab9c2d70a96220b4b01b":hex:"833d58f0bbd735c6164ecaa295e95ad1143c564d24817d5f6dded5d2d9b2bed2dc05da4a8a16e20fdf90f839370832f9ddc94e4e564db3ae647068537669b168cc418ea7d0e55b2bb8fd861f9f893a3fdba6aace498bc6afe400fea6b2a8c58924c71ce5db98cfce835161a5cf6187870aa32f522d406c52f91c30543ea6aa16":int:128:hex:"c1df4ee60b10f79173032e9baaf04d3f":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #1 [#1]
depends_on:0
1:exp:0:hex:"5f0b24f054f7455f5821fdc6e9ca728d680e8004fe59b131bb9c7cddb0effa51":hex:"d406138587fbcb498e8ec37f0f3d7f6b2faa02e6880424e74cdba67ae3468b6823d37fd917a7fede6b34a2f0fc47c520e4088766ba82a989f0d8051a3a80cc8b1e3e1e2b1c6620b90e99b27e65951aeb3936263fc2f76c1c8effa742f53987f8a38c731a411fa53b9f6c81340e0d7ce395c4190b364d9188dc5923f3126546c3":hex:"f52f7a2051047f45ec6183b7c66e8b98":hex:"756cf485b6a8e672d90d930a653c69fdbf260d3ea18cd3d0c02175d3966a88b70ab8235d998b745a0eb6a5c92899f41e8c0b7aa4ec132c8cbb1bac97a45766a03923c9b93c2a055abd0127a83f81e6df603a375ca8cc1a2ee0a8b7fd226226b0b19bd2e81f73c34dfafa4fcea08dd93dd4ab7e4b437408af91bff566068a5f34":hex:"e58a03f664003d0ef5bdb28931afd16e7747cff62dcc85bf4eed6e573ea973cf615e4ebee40f35d44e18e391b391e98dca5669a5b0abbfa67834836b122d1909b53acd50e053d5ca836894414bb865b1fb811d8af68b88b4a302fdedf27fdd27456e9aaf34a8d53c9c8587e75843e09776392dbb0501ef41359c01e8980e5221":int:128:hex:"258492b9f549d1b90555eafbe5292806":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #2 [#1]
depends_on:0
1:exp:0:hex:"6f50efb3946f6a6dfe63f12780f764bb6ebcf2127d3804610e11f0bd9b68ce0f":hex:"bfc89d5049a5b4015c9eb64fdaf9fe9f4be7229e67c713a7b368f0550b3a5e12ba3a4399c64f60b7157e1b289b154a494deadecff0d0686ab44fae2a34ae4cb120a7f00268ab551f41c16a05f8999157be1103464127a8a9bccf736c32db045124178c90472e664d8e67a2ade0efe9a3b048c453d2fb5292dd8d29e62d52c5b5":hex:"63c1192ab7fc75c17e7812fd960f296e":hex:"335cc5c8fb5920b09e0263133eb481fd97f8d9f29db8689fb63034bc40959a176ccdca6725e1f94f822e4d871138fc39776fbe062f07bf80e5c8891c2e1007efeb77c158ced8d6c002b04442ed35c40a2187a59c02339c05762942208e3be964736a431017f472dfd5fdaf8fb8c645cdb684f9632057b9eb755253b4b75e3688":hex:"ca974942ae0f4955ca0736218e4e356145c1ef42135b1142b55ccb3fc5caeec630eb50e69b5a6f97c11d4b604189b27496623bb0365ae69f4150e201e72bad8e7b883185588d0a31c44273bae87194b1610114a83ec47ba68a02e29891de43204977fcd0d551778335fc77fcfdf3fd63e9e5e0c02930a0321ffb093c521cd0ed":int:128:hex:"2f11a01cb0ef8dcefad9233bec44d6f0":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #0 [#1]
depends_on:0
1:exp:0:hex:"ec566324ad9d4cd015821e2cd4ed4d3d507bdb3c65bd50acc85f690ef06740fa":hex:"348d35768d7192415cbb92c5625f10edd79f24c56d4b821aaf80d7dc83e901ede6be94d1efe11a3acd16ac00aea8d0d4875c47522332fed11cdf0816b26978de431c89d2fe6d122b2d4980f1d53a97edc15e490a44e73cba9394ca4bbb871675c729c39de80d6678c71b1bd220e4647bfd20a7ddbefe2b7eec7276b87c92ba77":hex:"95c8a544c4b94e9fbfd76e66f40bb975":hex:"fa6f38f8e562a54bb2281dc9a7cbe0b981292fb00dc0053185550a300661852179d0f2beb4e7759b81316fbfead5c858e6fce73f3cd2c2462925dbb199a4e6c121d051b1b5ebf60e16d1e30f6973b19cf31830da30588fdfff6115a4a1f6d977a72583379a56055724581be5232b0d1b0ae88bab5d4a031b058bc8d03078dcd5":hex:"8b4da79f3ae1ea35a80af2f52fc640055e6a3b92617ddfa79fe5d8a49f28ddf36a82a17ca0b3cdf1726700f7ffc09ae5b412d064fd52a90a76bacc74a0b89e38dc474e880a2b768ffa91fef34c47759a7b8fd7faa32a4fcb258349495e4438c7b2055a8f462729fa4e7223aa9b47087695e3aabf43afb32e272d536b257b748a":int:120:hex:"b1faec277697add8f756391dd9c7f4":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #1 [#1]
depends_on:0
1:exp:0:hex:"dd6aa4ff63efad53772e07e0fa7d6eda5e73be167620fd7c9f3997cf46cd25a9":hex:"592b3a6f09841483770b767bed73498c286896d2ad3d8bd91f83f92f489b1e83b0456a54e067a79e1bf59eefc1d3bd35cecfba940811d06a06e9b8f774bfeff557bd7e3f0864cb6bd3f867efbe3f040d2384ae8e1a0e20ed38caa668159d3e33c4669478d00963a1152305aa2037a5e06cac52d84021234a7f5d46ab060bd03a":hex:"6386e03bcb6ac98140ee0706b54c8492":hex:"0ccdaa4f54cfea1026a4d26338b1e6d50a70b00c46147fe906c95f0a2fb5d92456ca3aa28a257c079eceb852b819e46646997df87b873bc567f69a2fae471df03b0e5b94511189eaeedd238a991b326963c46d53080f420ec9fd1a74145a0b155cbcc0b5e47fa69450c7eb447080e34868d640f923923b91a9e13a05c73550ca":hex:"c1be540448f1e3f432a10b3cc1a913cc4046595f5a57bf57c9d856cdf381832e914088d3388199018ff26327e3001678ab363da9457ba2084f5aa81320f1a0343491e0b44424018765861c5db917ce14e91a77f7e805d7a97a17a288ee66567c5c01ee61dc46a9aa8b281438ed377b792e9539e311676f81c567339cf92b8e1e":int:120:hex:"ce7e361713630ecaff81866c20fce6":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #2 [#1]
depends_on:0
1:exp:0:hex:"ad3990cd57ce4e95342cdca4f07d7e35d575eb19f224a7c821b1f5a8c54d4bc3":hex:"732809c29b5eeda974039b122b875aec2823e082ef637294658cc54f9bca88eb7eea87a366234f89919975d0e7dd2f8ea83198d5a6e349149a016a4b177ba43df2f3ca28e27b8566591d225ac25dfd9ea431cf1fb3ea530d65dac93aad47764a6aef8ec6903b6d145ea9a2663034d2a320690b92afd8032084b754be97604382":hex:"fd4ed75d861da2cc14fd1054976c8566":hex:"ab44689839fdf47e887b70fc1b0422dbbe5c1b50f4e704f9a435967ba8b70cf1e144a025d37292f628f9f7dd9d05557b65340090503201e8cf2cea2d6a73ea4850bd0931b90fd4a4306ba84b8aec99fed47ca1b16daee6c95c97e4ba0dd1fb130cd13f5ef77c5af96f61fa05305a3aca3775e927f72f08fc34bc994e69abaad8":hex:"f48721b08101b35cde1c4ce08a8ba0049185b9dd48b66ab9971fd67dee24f89b456e9ca19ac8a9b5b3b088cbd53898a8c2ac1129752fb7fc55a0c3e2e7266ff40f7a9d63ebc4ab65f47422fc17cbe07fcfda582fd1b8f50e840ae89837e84add8be17d4cac3d2be26bef4aa8438daec9d2b139e442f99c32f2789378c8029ad9":int:120:hex:"da6da2af0fc14b591a86359b552e20":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #0 [#1]
depends_on:0
1:exp:0:hex:"30823396ac90db573b6587676564d09fa680906bd6eaa6b8597e2e7549c9d848":hex:"c55be5a0b8559e02de4667ba5656f7e46f5627af13fd34d327f6fbfc4f3a9273036fce2fb21232f8e2ed115b39b0ecb9a119c8fc17070bbe4e34d3544d7117ffda5e1ef05e063b5a8fceb23158d7824d6a1eb4d90a1d0360c6bd78fb24fdd4cfa35924beb4e090891d06f53fc52cdcaa6b8bba6772d549eb95b64ebf3756ae45":hex:"496ac734afadcd54f1a4372ceb5645fc":hex:"2d582131f7071e80cde1b11106b7d79bb208743de759d40b897efdab018f4eff1f91d2fe67e27af25a13f201bbe4446f20ac6b942ff7b32cf10ad1cea36945b67ac08b114fc616175a87437ee05f3a8b6566e9edfbc1beec0ed8696b5d5c41a25ac43bf3ce2920dd262233ab3405d46f523894dcbfb6c90b6e911ceb93bb7fa6":hex:"c9da3df66111dcbabf731c6891eb698ac3283780f526e81383e201244efe4eca7a1c84a3bfa9ba5616afb15c1f1af0f3af2e071df6c1d34a343c3e3440f1a3e1b6620243d9e7d9a4dbda5981c3e876fd07f392d44bf3e0a4edbd884462ec2f71d36bde4a1b5792629da09a1fb01bfdbd532fbac71887a05a7077fc119a4638d4":int:112:hex:"cec973a27c42e31b779a6a91aa34":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #1 [#1]
depends_on:0
1:exp:0:hex:"815f2b2f0b1621aa198eef2761380f10ac9872a5adbdf6286bdf3386e56aae4e":hex:"d16930c570414bb620e0eaa2e9b5d96e4424127e16461aaa5885c616a02ae974fb2890e73bade9ffa5066eb88a46ac7fcf258d55733d315951b1b71c5e3c13d78d60344ce921966297a0f6361cfeab03b346a7fa4f83a7a0eaf37576fa33a496102446f9f31b06ed91b51672c879cb18d4e38fa86e156d5b1dbff27925922470":hex:"0843984bbaa565ca24f148e57a7d9c57":hex:"1514b99c0ad3493c36fe1216d1a887a69ea0340101aebb03f60d7ed26893119e81e8b8c3f0bb4af5e10a3bf4edcf257473be9dcebb44a9d912f04d97a556ecf020c0bed7ccef2bfd5580f1fc74b706fea45f8c63d8de6f8deccc47a02dc86d3f0624e52f6f1dcd09de8000f2d98a4cc0896da6a564b92263673adf390ed909fa":hex:"7506175acd64224b39f890e498ee5013bb46fc571dc2b125ed5891b8ce8bcf42342f015fd2df5f4b9cc220aab52386bf2247d4163951e86467633f96c28bdda166d778855a7f60465dd2983232c9e53d5f89432407807b0402a10f155f80055c339451a106ac54438ae4a945e60d5320eab0adad9a1e66d59b9d3cc53887811d":int:112:hex:"28d9d780052b36dbe80a25d41d5b":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #2 [#1]
depends_on:0
1:exp:0:hex:"d1325ecedb8fc0fe449de558fbc11ddebef660e47aabb84edfe69837a6a9066c":hex:"f9a4f7029feae5cf5bdb8385d6ad7d7da6a243c5026818e5a794c6cffb8dad3227964501c5a049b5a94a7ea2e24434e086800094118444c5a971bbe575324fb6b51c5939f81e78bb11d85d324742b462ce8d13584b3882617d0c94776f328a554f9d532b6515ade9fbbd2de1c12ab53671b7f7edaa7e20223f4c371c1f229568":hex:"8aff702c40a8c974cf24bf3c645169a5":hex:"9ec2e851dee3834d4843aafa740f3aac4cfb1e4d3a7e3e77349113f5200768c3e9dc37481d6292ebeebd2372db02ef8ac7180830c7187995c815d1d1520c3e2f8cf2a94993b18c828b53485073c8a845066772615b26d7a3d7d3e7d81ad1725797153f7ba5e313bdec582c5482adf76b31c871cd42a313018f40d7e23f1a7f33":hex:"3a93663aab93c6cd236cba4db2c03942d9ebc669633936370c2834357e76f6555c34d40dfaab1e78a105da9092acdba8be89e2dbf72e89518d55e09eb2fa1ea7da505484ad4531dba3eb853d1ae1a477355ea9448067b0adbc782d64ec342c7cb781d9dd8dc2b14dc1c9ab5542b679782b8bb9b45ff6a4e36c513df169c8eddc":int:112:hex:"7e682b0ddbe6c55091838616c352":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #0 [#1]
depends_on:0
1:exp:0:hex:"4b92242268e598ddcf3a5a0de26d74356693c4dbca354e44be401f3d6804ea1e":hex:"72dc75bc4c8f5bbbd9c639fbdb34afbb84706404c9e67eaee1959aa4b51eac0db4f975cb3ed8d8ca27f72f61c8562ec953a7b8745826121a7016e60e877dcdb046f236af3826c1ddf5b929c5bd9a92b0d5c23cf8983bf2459ced6595882b3dd0cd25da7eba981bba122623dae22dbdce05cf4e5d82d2cc54eb4f68e9e8eff02b":hex:"3c292bbcc16c94b0a263f4d22f328915":hex:"167dfab08aac8350574693b31210138f6b99cfb61ba7ade2e2abffe2255837a913c9afe332e8fc4b2463310df46492e7d982dcb70fdda2a8b03911e6be9a5c5621d0ae8ecd1cb390910b6702aad33394c25d1160b86687e25bb6cdc4811e3158bb85ba75548329dacc19287d9c004a0473029b77ca290fc47c1f96d9583bcd67":hex:"c2dd42ab9bf3fda78032f73cbf7d28dd8e32c582a3b7ee79795551f133234d62ea6571a466b8e1af0b3d354b71a6582c9c8013d5f8a2c34eb3e848360adac1d5005cede58eae7784f32a31c40eec5a3f03cc1e7263d8515b36225b3515ebcf8dca2a77172c797d347ed3921ca0bc73e8ae56347134a6a2a06ae084f1ebb7b0fe":int:104:hex:"02fb002d8e4a1d11bb0f0b64d7":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #1 [#1]
depends_on:0
1:exp:0:hex:"c5c50059a61692a8f1ffae1c616158c67d276dcd4a029ce197ed48567e5ff889":hex:"ab7e13923e66d0f600accd2462af74192c3de6c718a27052ef7c1302239c7fb2413df7c662657ca18228575ed138bc54f31663df548618e98d64402feab529d5bf6a678431c714df1fe24ea80017f455a8312bb5b710df8dd3571970404a806ec493dcb1f3f1ac980663f0b9c9823e0d0304ed90689f70d4a24da7d8504c5b0b":hex:"920d82c6b97a7bea121f64f83b75dc65":hex:"a9bd57db2bbe83177287e5f614dab977071abfe0b538067f7d0c5acd59bfba95dfb725b8e1af4573ff10ce135148a3bab044552348378d5ff0c4f8be1aef7ed60bb9a374a6c7b8097d7c1804fdf078f212e63e9f11d7404ad0d1a9cb28d5ba199aec3a6c41b9e523b541ad38cea763159836ede6371357ab1aeaedaaf4481c29":hex:"8f7e87e3ff4f7ccd1cedc1df125199cfb588339119a5ea5f9bdb918f89ca35f9dc16c6465fb25ea250eaaa8e7f00aca2199f92a2c244642bd15cbc9b62caa58115ef01d0b4a9e02527e035744b20892f79b07aa47b6c6db1332f82434764c43124b27148f2f611766781df8e4cc0b5ba99b858c13c233646dcb2b8749a194f08":int:104:hex:"65da88676d2ab3f9c6d590eb80":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #2 [#1]
depends_on:0
1:exp:0:hex:"4c7cc3588436ad9e877de72578d30026d32746817ca7a8fb7df9870650aa48d8":hex:"00c2845fc495b89f870bce714f8604a7e7a96ede92c4b9bdcf044c9a176f66a28761089c083d5e2d613c746711238477c0efdf475e18af99e88cf76d04d4e40495ea16c462801443cd7f69c5d36ac9f337e828c308f1d1938b1fac732274459827cf9806c1661a247167948a93eb6e998a4cea76bb825baa27e4180e52633bb3":hex:"5e82285a3b332c693e427f9410564489":hex:"9971b8e234fc3e1e9644545e383eb065e1866e2faa6513278d3972add5ec0e71b1558329fe1ee038a27919e43bfdac8cf08141ab540528f74f9d5bc8c400bb6ee7867e4dbc2aa081d9126ac374dc62b10004d0e233dc93376b93c0da415e7d3e09851f2084a99feeb25939e21893056870cefe7cdfaf49f728a91ea0eef605af":hex:"ab7bac4ddede796576e1fc265c3c598055827be74dc7ed8ef172d00a648da56727767d68fcbe6c44e7272dc8cb15f03a26dc439178849b0e9ad6c7410dd4cca3f9ef40ec7c280042bbc199155c7341e88d35e5e8d0b42856e618c6c30e43d49506ccc3518585c951a3898409315e8b3b4d0adccdb561ddcf1b9d3b2cf3de9750":int:104:hex:"2474c830c6ebe9c6dcb393a32d":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #0 [#1]
depends_on:0
1:exp:0:hex:"9d73aec506e022c0692892f6dbc3b4d41e86b97fb377c1956ee27b9c9ab3b32a":hex:"f02bf60f10ed876a803a96e75f3fe17b4e355246135a0cd5497baad2a40a523c27e27bf848f0cb5d0c6428d08bec9590b17fca5e697990d2a6f7d21080ab614f378a07461e7a6207229e0a087e285841ef2f119cac7d8a2d3abbb1e7272a0d7dd493c8c4f797e160c36e086227ceae4923658365b2d3a3fbea11aa2fab3499cb":hex:"bbacc081a6107364dcdac83abceddbfb":hex:"77e1da090e4d3a892baf1afbc12a56201a4362d8f09cda5e9bdb23411e6908915301d66403acb3524898c1c51d6970a71878accd0048cb6cfbd4bf941c174ee05eca2c4a29f1c24e936d3a63cb6cfa710617af1bbb41d755b2f79e135db914a7dd00c590cf741078eb72c3ab559787213202dcc0a4734bdd612b917e372f0e61":hex:"d78fa4024b8d073899ac09b8151c29b10a37793b76f04921bdc7dd3d2ef530a831e53cf6a7ddeec0e033ceeabb525bf5ef57bf9b3661ffb57d3bd4024252fa11dd569102c787c2d8489a1ad1290dca2e8edf82fbe6b5f83bcc0e888045b895e20c8556ee80430cc8640fc070491d2bb81a1209428938cd8e7a27e0e858029421":int:96:hex:"2235d00a47d57cfbd383b69d":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #1 [#1]
depends_on:0
1:exp:0:hex:"73198dfd92d26283637e451af6e26ff56e3b7d355ed7ab8b2059c1022e0ea904":hex:"2471b3c4cc1d6884d333d1c998c7c441808ca884cb88173a225569e1689ef39e266e9ad381926adeafc2daccbdd3c9457ea1bdc3bb05168ef1eead1504d1d44dde34f96e1a7f2a5d3fb33cf5292d52fa9412800419570db0eb24fb74d55de202f5df74073c5a2eb9eb726393996eaeb32072bebb00593de41b97ecbab2554186":hex:"e36403ce1acc63bf50b47387250ef533":hex:"cad023cfb73d08e5b082c3061f3a6502a1c1d53038cfb19074d0ec26c9b272db93094147ef0ab2bdce440a2b3233bb0429add47601f011df679698264c0f81444aba14576a1a565e5c169f967c7571bfb32a2a4d7fcae897863d78964c5b1a040cc845494c0ad8ff4353317b28ca3798e6252d5015b58e99354ce6dfbe8b7a95":hex:"32afd6d6fdab2019ce40771b5298aaadf753d1c4cb221f01e4dfc8b1968f898188fa4d448d8364510a7e68c7393168efb4b4ead1db1c254c5cea568a84a997a76dbc925a6c19a9092002629f1d9c52737005232e5c7620b95ed64741598a65a9ec95f2c97b6b78bd85380811c11386074b1e1e63b9a7e99d1cb2807bfaa17f0e":int:96:hex:"e22deb1276a73e05feb1c6a0":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #2 [#1]
depends_on:0
1:exp:0:hex:"1dcbd278480434135fb838ffcdc8e7716e95ea99a1cc36d544096dff9e9aeba0":hex:"da3b8c9e4aa8443535b321c3e9bde3c6742cd9f228c971257430b27293ebeb635917d6cba976c81934c3077902911169e8c6197b2d56a046b7ff03b482c38172accac98aacc90076370df28bc8a2044c393c7541b7b69b0fb852746dcf3140ace4e76861975814d2b5966f7714fb6cfe3e4299d79182fc63a345067a0aa54d8b":hex:"b737bcdee4ef83aa83f124cf7208a671":hex:"49a544aae76b04e62211428a2cc3719e4451f3dbf9a23b6ac824fc472e95e38386d267415c1472a8b0707b0573b9eb2a39a5d5a13464947cc3a7a7dd3b7196f11e87ab5233944f7cea3f4d62b088febf8b82a44d4ca6148be1ba24905432b7ac2bb4ebaf22d3bce97ac2bd34158b6011fbac77ee1fa96ca0c9c9e0207044fbbd":hex:"061b491b73f9250798a0fb1fdcd72a70eddc9cb48c1f10119387d45c50d5fbb8b85592a7977487e45342fddeb8d481eef3b99463972f66acb38fe04953c223c5f3e02611c8f33cb9ad7466860895fae585d40bc78ec14d1cf17b4c5b75e4d8c6341f1eaf80da4a78aaaa30d3bc8bff15f234aacbee4067a947e42275b12e0bdb":int:96:hex:"b897da3061c77aab5eb54622":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #0 [#1]
depends_on:0
1:exp:0:hex:"2e00467f18536ea6b4d582b2480ebee883e4f56bd91af3ad7a47ceea3ece9acc":hex:"d5334398318ade59e6bda5cfce8e11b25c9ccefa2f651eb16f66c03d84dcc900dc7c85e6d2b778b155ae4591af0698df7f3b8b9f64d4442ecc82035f7d8e71a5f61c515a963f2fba077f3cb8276e91b31b3f8aa193988a16a86ccaec4a688ad68b5146925ec21d55ded407709d34d140f37e1f87d955619453c3704e83918088":hex:"aa6716e6b7107876a3321d807a810e11":hex:"5606a0b77cc9020955c7efda33b7080e9c0e9fd374c4201b4324b3e6523b0407171141e8246d01292a34dc69331f7177d6b7238e16e0303e85741f9cea5698e42fc79217d9e141474068d6c192713c04b1ba3573e93480f69e4cbf72090d46d62d5b52e4a7613af8fcf0010d0024ea11c19cb04571c6d7045a1157cf81df18d1":hex:"249119ace4e292ffdfebb433d5b57fa1518af3389eb832146c3adc2dc62fcc9121d7f6461a53ee107ce7edf362b365d8bc18e50cf9c328cb7c7aa7b4e8bfa07c34dc81c38fe0982bbc3b543485ea4b0ce5a76c988cdfcd241911cd66f5a5f9e0c97332bb0f3926117c0437470717c63957aeba1c55d96b1ff0f4d6045f908cd4":int:64:hex:"70e986fced03ae67":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #1 [#1]
depends_on:0
1:exp:0:hex:"a18240f6135e7b6eac071546ee58bb52394bc34ad4e91ee678b72e4514fddcf7":hex:"02f288eea5588e7a011f4d91eca232af70f60ae3d9302cae5a8a58798c1b4e973e3b1d07695934ae871201682554ef6a5b94976c6a1aa73d354f1d65e3f025bb2a3f1e93009e822a87590dbfd1965904223049c5ac0da8596955199ff767b92df10d1f9c05c40bd8204846c719c5594000cabd87342f0447e4e466c3788723f8":hex:"149da8186ca73941582532ede16edf3d":hex:"4d46e1e87322ca84d5bb92d58670f644083db06bdffd99fab0055a62b64a30b5a5673a108f0b9f114d379d3fe63a1f63407881c5b5cb03142109c158af42a00eb24d3b1873edd2284a94a06b79d672bc8f13358f324af2622e9aa0da2b11e33567927e81aea24f3605168e602b532fa2cf9bde5f8cc0b51329e0930cf22e3752":hex:"36cddac99e2673588ba783d3c085b9935626687a2dbac9ad10deb4867c577d6f80453266b2400afd773e4edeb743c32562e85f7f8f43dfd87b10a2dd79eddf6e580aeb4cea92ac21cf49ca97398cc23c02b0ca59257643fb2bc6462b9cf04658352d53c2ee50d87cc5ca2ecb722d950f0daecfa0b7c33aaa2c91dd8b093916cb":int:64:hex:"73cbe40df3927e80":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #2 [#1]
depends_on:0
1:exp:0:hex:"4b64bded6c658090a85b5d889679c6a00579498aa82be1e3a628a1cd001e52a6":hex:"182cd59dc1934199d2d2a2712157438c347e286f66b5a2b8b5149aa41ff7ba82adc3751be379741124dfcf05c531416a64f25f0d28abb6f7bf98c80762f0fa363da679437621dcf61bce43ef4d63178779d1a3ebffb82044d427ef522cbd2643cf1f5617a0f23103cd2a164a59f182b151f47b303c4eb7387ee5cb97cabdf985":hex:"99aa6f359534da409a18540d82fb3026":hex:"f55fd6255d8a188ce9a4a2727699ce16c8bc5c6adba88d94106038b74deb79c9d43bfaa47375148d843a5ce248d70193c8017196941b2d9e2dfd4375a3390c19d2f833b0b265dab30f26adee07ab0aeeb930dc3a9fbcf719a707fac724deb28dee2a6788b17fa3505290c2797c6dbf930b41eca1f6d54d75b820e62ec7023e93":hex:"5a1211218174e60690334856483a3066e2e8d996fe8ab86d0f8fef09aba9ef0acff9d3e1e5cc27efb5464bc23bea9c778fc74206ae3a16e5fdbf99694ab7096f23c4b395d7a7b8d6675e56b5505ff62f52bf183bcc4433298296e41662d6519d9c1f0a5fb3140376c8890547eae72afe75c338ba97fad9f0184dd311bbdaf3cc":int:64:hex:"8dbdc0746074b486":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #0 [#1]
depends_on:0
1:exp:0:hex:"cadef353122cec1fdbc236c0ab195fc4d732655cef444c00b6cba5c61e01c614":hex:"a3d5e55fa3110a268cf1414a483adab6d58ec8762a6e6be81269c0369e8840333503bc3688c7be001cdb84d163fa1dfb05f3b01ffff31151f1af780c796822e3d564f785964a546bcc2a320d81a2bc61058652a8594ae9b9b0917400e08d4a99fa161376ac53cba54c92889fd3497e233aff4e12cd85d57375c7c89e92cdf5f5":hex:"d765b5954e5b486885dc78ce6801516e":hex:"ba0405745971eaec5d337fd22e0ad287551e7084f1c9c38231d675719e3980356e183a99a3c760ecf7a8ede5e0dac8d2bc13e135570ff6e91a854ea3b457263b0e77896fdf7bdf0b53c8276cfd1ea3e8e22450ff2665eacd24e5fb2be89373349fc9e2967763d43cbd7adc9a376b1b4ab956ddf8b1a56d9385fb7e861bc34df7":hex:"9b99f984ae26f9cad5b3c8058757a0a5caef0fb86b8ecef0c1bca6b99bc72b0d5345a00ae75e37d4e651008bb733105d2172edaaf5bda4ad950a49de55a514e882a470dca7c7bbfddde40d38fef4e1f3864fd7e212bbc0383d0bc29ab2303c8935d49c35d7d73df2fba0daeb5f37f9ab0d541766da71b33da1018a3f287ba312":int:32:hex:"c374cd77":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #1 [#1]
depends_on:0
1:exp:0:hex:"0cfc42773fe2d16a59da52234af5015271332344448c214a2b4a0bb53b07a0a0":hex:"dfbf9eaa46c368b28ef50227db97f29b5d9ed599760bb83f5d52f92ef5522815d6952ebb0d9b4efe8844216d37510746caf8c775d2c862bad8d67effe109a0cbcdd14ba8e31fa420a475e55ac6b02908346ad1b064d5b6b869503e08d057ae65e9dc2a2a26345917b18d1b715a2372e8e114a071eced0c29cc9966d7205ae010":hex:"45afb3ba2db9287f06cf48405764a955":hex:"16d3ad553cc0fde3f32112bdb478450c65c854927b198914649a2820a9e3d01131b693765d40bd2bb74a50eb4cd7bc8dd8dbac9c6a61acaf5e4cf81570814b30a6a11877a8f9c5df342f70008cbf0576bd27a50bfaf6e22a40bd77435da16b666a06d172aa981bdcae0d25b8ab002c6c1994a356d3c3b7e4dd7b99892b0784f6":hex:"e29db2c4bccef2dda828ce652791d424a86cd5790e6ece67bc029ba9520bd8f35a214a73d8b86564df0eccdb60eafee4170da2694eb563e5a854b25d7ba0a4c53465fdc15c6e267be2e54263f97aa3edbe2358f3d9b8d28997388a57aa427a239a74534393593196253de1c2946b7a437a00480ecb2eb08dbe55ca2b3641c36f":int:32:hex:"39e01fa0":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #2 [#1]
depends_on:0
1:exp:0:hex:"2a840df4be22c70786c873058d2a6e16dd9895cbfb55b9c9e98f958cfe62e65d":hex:"313eddc53f3986927a261f498283b6dc4a39d26f98c7428127237d79a11c5e626e2e9cdb68f72aa3168ab23dfa2f5e03bc65a68d781f23fb9e295909cd9f0f3e5648cf82f3f6b3b509b0a333cb7d9f2b6e444c351a318f8f200a921ccb409def21b87bc55ec211a76a518350e6ee21d7379edd004b3bfd1ce9086b9c66d80ec1":hex:"ebf155f7cf55e6aabdc1171c95c45293":hex:"8abb8843de1766cfb8d6474496acda2f7a14e78a5e4c787ac89e6bc06cfd42173c35b3a75ddff644f4a58aa7502fedada38a7156457365b4c3c07bc12a8f9061331139b9a2b8d840829b876beb84f27d5a64093c270fe6c310ca3afe987bbc5ec4dc06358d5bf77c7b4e4fe4078c6d3ec28e9a281318da88949c478094c0065b":hex:"769869a55754eb5d6d42e22a2b5271b38533fc0c79642e250347d34566eeca732e0565f80672054bd10cbd3067730dbc567039c730d8bc32a2bdaad09885651533a4f03174d4e6510547c1e1dd51be6070ab0ca0cceeaccf64a46d0ef87c0311bd09973f3b588a4dfb39c85086ea5d67dc531c287b83c161dcb25e07b671343f":int:32:hex:"c364c089":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #0 [#2]
depends_on:0
1:exp:0:hex:"461566cac74f9220df97c1ab2f8bb74189a634bc752f7f04526923d30506949c":hex:"":hex:"546d821e437371061cf3207f3d866c15":hex:"":hex:"":int:128:hex:"44193072791c435d6e8ea7756a0bd7bf":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #1 [#2]
depends_on:0
1:exp:0:hex:"7736dbb38f1fe351a7fa101d91da62124c22ac02ee06b9413f56691067572f73":hex:"":hex:"5f01779e5e4471cd95a591f08445eb5b":hex:"":hex:"":int:128:hex:"1a1f08c8f40b93e7b5a63008dff54777":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #2 [#2]
depends_on:0
1:exp:0:hex:"eedcae924105c86190032650e2d66cf6927dd314de96a339db48e2081d19ad4a":hex:"":hex:"a39d400ee763a22d2a97c1983a8a06a6":hex:"":hex:"":int:128:hex:"3b4294d34352743c4b48c40794047bea":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #0 [#2]
depends_on:0
1:exp:0:hex:"714df4b69dc00067c4ab550f37ff72358b0a905dea2c01f00be28cec130313c2":hex:"":hex:"c46d63d6fead2cee03bd033fbc2e6478":hex:"":hex:"":int:120:hex:"2a0271b0666889d2d0b34e82bf17d8":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #1 [#2]
depends_on:0
1:exp:0:hex:"454021ece9a87a9543a1626820d39edd1eff3dca38a287d8fb68bd315a7a2677":hex:"":hex:"51de54b633a7c9f3b7b2c1e4b47d26a4":hex:"":hex:"":int:120:hex:"114708102a434e3a30088b5944c272":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #2 [#2]
depends_on:0
1:exp:0:hex:"d7e90b539c99e8c2187ed72823258c1149890a69a9c0081ff8c66e1cdea9f2f6":hex:"":hex:"6dba3273560f30f118a2e0251f7b7d76":hex:"":hex:"":int:120:hex:"5f45e00181cd2d7feb4723e0cdca24":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #0 [#2]
depends_on:0
1:exp:0:hex:"2948233eec9bf8adf7250b20d62df9219d30e314c5932383203805ff9f3dc5cf":hex:"":hex:"d6b8e723272e26922b78756d66e03432":hex:"":hex:"":int:112:hex:"14c9a9a217a33d4c0b8e627641fe":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #1 [#2]
depends_on:0
1:exp:0:hex:"c73fb5e732ebc1dc7c91ac25de0d01d427de12baf05ff251c04d3290d77c34d1":hex:"":hex:"c31220835b11d61920ae2c91e335907e":hex:"":hex:"":int:112:hex:"9eb18097d3e6b6b7d5e161ae4e96":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #2 [#2]
depends_on:0
1:exp:0:hex:"a46aff2121825814c603b258f71d47bd9c9d3db4c6fe0f900e0e99d36c8f8d66":hex:"":hex:"7cb5550a20d958490739be8a5c72440f":hex:"":hex:"":int:112:hex:"8c76eebda0f1fd57f05a62c5f93d":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #0 [#2]
depends_on:0
1:exp:0:hex:"61a612c76de551f794a146962d913f60fbd4431365b711217aaa4beaa115f726":hex:"":hex:"2d25462c90ad9a21073729e5efc99957":hex:"":hex:"":int:104:hex:"e4d3b277dc9a107c0392ca1e5b":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #1 [#2]
depends_on:0
1:exp:0:hex:"4b233480239fabd2035a7c9207a8e1ab2da45a90a472b30848fe4b4757c628db":hex:"":hex:"50d45096afd0571e171e1ab1ffb3720f":hex:"":hex:"":int:104:hex:"5393bc06b8c5ecef1264fd6084":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #2 [#2]
depends_on:0
1:exp:0:hex:"dc051ac63e6b051594158399291ed101a3efbb1701b98819c4835a4863734371":hex:"":hex:"1f304d4d7f84ab560366215649b0a064":hex:"":hex:"":int:104:hex:"1081dda9e0a793916dc82f7848":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #0 [#2]
depends_on:0
1:exp:0:hex:"75f76df772af8e3019a4c1588a7d59925f80ce0d5647030f29548374e7bcc9e8":hex:"":hex:"d407264e09fbc853b131c8a9f808f1de":hex:"":hex:"":int:96:hex:"d515522db52bb872a4d3f9d1":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #1 [#2]
depends_on:0
1:exp:0:hex:"608d7592c094322b31d4583a430986bdf6aa639cc4b4a0b3903e588b45c38d38":hex:"":hex:"6a631952e4990ae6bdd51052eb407168":hex:"":hex:"":int:96:hex:"eb8851cfdd4fc841173c4985":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #2 [#2]
depends_on:0
1:exp:0:hex:"86a90631e5341e67dfa55e68b07522507b437fbab7f3e2e26cfc6e89ef9d2410":hex:"":hex:"67763ee1890e4bb430ac3c0dbc2af997":hex:"":hex:"":int:96:hex:"c6d11901b53cf6b13ac03cc5":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #0 [#2]
depends_on:0
1:exp:0:hex:"b8d12783ba2548b499ea56e77491d2794057e05fd7af7da597241d91d832b33a":hex:"":hex:"0365436099fe57b4c027c7e58182e0b9":hex:"":hex:"":int:64:hex:"41fc42d8c9999d8c":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #1 [#2]
depends_on:0
1:exp:0:hex:"eb17c1bbcd356070ca58fc3899bb3751eea5b9f3663c8e51d32c1fc3060b7ac2":hex:"":hex:"aca76b23575d4ec1a52a3d7214a4da2f":hex:"":hex:"":int:64:hex:"fbcfd13a2126b2af":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #2 [#2]
depends_on:0
1:exp:0:hex:"916aea7c3283aadb60908ec747bcf82364c1827ec29bedcbadacbb9b935221c1":hex:"":hex:"e4aefe6f81872729ff5a3acf164922aa":hex:"":hex:"":int:64:hex:"2035a7ce818b1eb4":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #0 [#2]
depends_on:0
1:exp:0:hex:"47b4b7feb91582a2f6121d12fd465967352e58d9f3d1bf27478da39514510055":hex:"":hex:"137bc31639a8a5d6b3c410151078c662":hex:"":hex:"":int:32:hex:"822955ba":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #1 [#2]
depends_on:0
1:exp:0:hex:"8955cddce65978bd64ef5228308317a1ba6a9fbb5a80cf5905f3aed03058b797":hex:"":hex:"1370e72b56d97b9b9531ec02e2a5a937":hex:"":hex:"":int:32:hex:"b2f779e8":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #2 [#2]
depends_on:0
1:exp:0:hex:"7795d631f7e988bf53020d2b4607c04d1fab338a58b09484fe6659c500fd846b":hex:"":hex:"f3f5cc7c1ec0b7b113442269e478ed81":hex:"":hex:"":int:32:hex:"e4e6dfcc":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #0 [#2]
depends_on:0
1:exp:0:hex:"f9aab5d2ea01b9dc35c728ae24e07c54e6d1452e49d9644776f65878199bc5e4":hex:"":hex:"96ec2252e51ebfb731b680729be73297":hex:"983a102a67359f4eecac465b0d65908a487c98c593be89494a39b721728edc991726e1fba49607eed1f8ba75ae9ab82a1a95b65ebdf48d7ee3c4a2b56832f21a483d48c8400dea71537f4c459d1cfcf9d2cc97b32eb7c5146cbf44d7e5ac779e9be0ae758eafff2138d4c5370b8cb62d70ebb713dfd2fd7772fa250590609844":hex:"":int:128:hex:"766b6dcf491a5836ef90f47ac6ab91ec":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #1 [#2]
depends_on:0
1:exp:0:hex:"d713b33af57762f933d6abfecbac7fb0dc1e545dd7c01638b0e1510af719769a":hex:"":hex:"5da52833b6fc73c0e4b1403e1c3c10a2":hex:"374dd4ebdfe74450abe26d9e53556092abe36f47bbb574e8184b4e0f64d16d99eaf0666fa3d9b0723c868cf6f77e641c47ac60f0ee13dd0c1046ef202e652b652f4b5de611989223b0acf1ead9b3537bba17ccf865a4a0fda1a20b00e3c828b9726bbd0b0e92fa8ed970eed50c885e6d69604278375af7b9ae47fbce4fed7d03":hex:"":int:128:hex:"6151956162348eb397e2b1077b61ee25":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #2 [#2]
depends_on:0
1:exp:0:hex:"77a1e4ddfbe77a0ca3513fc654e7c41609cb974a306234add2fc77770a4a9e16":hex:"":hex:"30d6ec88433a6bdd7786dc4d3693bde8":hex:"69beef4dbdcdf4e8eeb9bf8ae6caff8433949afc2ffef777e2b71a99fde974797dfed2254b959430ecc48db72cee16c7ef41fa4165ce4a0636ad4e40875d193a3c6c56a6bca5a55bce3a057a2d3ac223eba76e30e7415f00e6a7643fda9a1bf4d4b96ce597ffe30c3f780dd767cb5681bb7a3fd11668380e272bdd70e66f18b6":hex:"":int:128:hex:"d4a3c91e02a94fd183cb0c9de241c7d1":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #0 [#2]
depends_on:0
1:exp:0:hex:"303930b8ba50f65a50c33eccd879990d5d87b569e46f1a59db54371fcbda7fd6":hex:"":hex:"2b2b28d8a5c94b6f7ee50e130268a078":hex:"c2ff20441d96bae4d2d760dcbae636ca7e01d263c28db5faed201bdb39bcacc82ebdc943968aa0accd920d258709c270df65d46d3f09910d2ea701c018ec9a68af7fb3d76a9b360de266b2ac05e95c538417fec59cec1f07d47c03511751978baebd2e0e4f7483f7351b5e61c2a60138c97b751f6a8c8323970f6be05357aeb2":hex:"":int:120:hex:"b597491dfe599eaa414b71c54063ed":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #1 [#2]
depends_on:0
1:exp:0:hex:"1e3b94f5883239c45ed4df6930c453c9ffd70b1c6cee845bbcfe6f29a762713b":hex:"":hex:"61155f27c629dcb6cf49b192b0b505d6":hex:"5b7482e9b638cb23dba327cc08309bdb40d38100a407c36091457971bad3ab263efa8f36d8d04fdc4dea38369efe7ae5e8b9c190dad2688bda857e48dfd400748a359cfe1b2a3f3d5be7ae0f64a3f44738a7c7cf840a2e6b90ec43f8c9322c60dd91e4f27fa12197fab7ed092990879e964ce014f6be2a1ef70bfefe880a75d5":hex:"":int:120:hex:"7003f04d6b6d9dc794be27b9c5d5e5":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #2 [#2]
depends_on:0
1:exp:0:hex:"9080effb27994ef831689da10600e7a219db93d690647457702c217b08057eb3":hex:"":hex:"f45514696ff5ee1e6e5797f7bcff05c0":hex:"5251f800f7c7106c008c0122971f0070d6325b7343a82fc35f3853d25c878215e7a929bf63cc8996f0ffb817174a351b71d691f23021f58777f962fd1d45ff849e4612e3304ae3303ace7b8ca1a43f54e662071c183a1695873f5567397587283433d1e76cec1103ee76f8e0472814424b8981caea1f624131fb7353afcd2cd2":hex:"":int:120:hex:"cfb6d9bccf0378fabae08fd230edc1":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #0 [#2]
depends_on:0
1:exp:0:hex:"8c291f0ad78908377039f59591d0e305bdc915a3e5bfb0b4364e1af9946339c0":hex:"":hex:"a9830d5663418add5f3c0b1140967b06":hex:"e43c04e1f7304c1d83235120e24429af8dc29dc94399474d06047fd09d61ddc682684776c81ef08d97f06db6e4cfb02daea728ec6ac637e1ecfdb5d48f0440d8d8ffee43146f58a396e5151701b0d61d5f713b2816d3f56d6ee19f038ccc36493d9ad1809a49aa5798e181679d82cba22b0b4e064f56af5ec05c012b132bda87":hex:"":int:112:hex:"275480889efe55c4b9a08cef720b":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #1 [#2]
depends_on:0
1:exp:0:hex:"96c77c11a3336a41b61ffdc1724a80735bbe91dd4c741fdbcc36e21c53335852":hex:"":hex:"655502d70119326405d8cc0a2c7a572c":hex:"c01034fc6b7708128fbf4d6ffa4b4b280a1493b9e1dd07079f509479b365f55ae9290689f1c4bdfa439344e3abb17f3fd3d5e2f8b317517747714a82f0a9ace04938591d3ade6d6095491a440322d347e8634008cc4fd8add7c1c4764afdb2b098b3f5604e449e8049a46b6192647d19cf88fa5ed1abab7f313b4285560cba44":hex:"":int:112:hex:"b4d581464c4bb23433699c418ddc":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #2 [#2]
depends_on:0
1:exp:0:hex:"e2a3957393669278f052ff2df4e658e17f2fe32811e32b3f62a31a3938930764":hex:"":hex:"a6f5a1f1f1ac77a1cb010d2dd4325cbe":hex:"ce9c268429ca9c35c958ca3e81935ec60166aea0be15975baf69103251efafd54cbcc0bed76a8b44a5b947199cd3c2dee6878dd14a5a491a4a3d45788405d0129354e59c047b5367f1158bcf4e066a276951d2586bafc3c11f8a982ca7c3ba4677a938498bd51171552ea032fe1bd85cfeaeb87e87168f7a28e979b08358f841":hex:"":int:112:hex:"cd5986df8e9761d52cb578e96b1b":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #0 [#2]
depends_on:0
1:exp:0:hex:"2b17652f7f04073afe9d9eb8b2615c7550968b9776b139fcc4f9b0300912cbdb":hex:"":hex:"9a8ac23ea74b292b7386138666a0fb60":hex:"2732107241e6136f1dd28d233373079d75d6ac13828ae7afc751b6f9c57e77268c52ae91f4ab3016af2764597994573cd6b41f72e21b60ffbb3aafc9487ac19d0ffe8db2ae2c7505ae5963b032d1ee1bffb4c5bd88bb0c9a350ba26ee3eb8dc0a157955333e4f28c5ec7349c39229dff9f440da72909f2870aea873a76545ee8":hex:"":int:104:hex:"f7b94229439088142619a1a6bc":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #1 [#2]
depends_on:0
1:exp:0:hex:"16fe502e20d6473ed9a27569b63a768ecd428738904cf0b337df510775804619":hex:"":hex:"431a8d78b91414737e7c6188328a6d37":hex:"934bcacbac10ea4ff6ee94b17bd7379b88489fbf123bf496c78c9b6b02ee97dd62eedd05b8f44f4912764920129e711701628991a0009ebc7017a1a19b177ec9bc3b0f280eeefadfa310708dfe214428a184147b4523e66f2d62630d4a12fd3e366d27c3b7d1566553c9b434ed193db083160da1f241de190bcbd36f435e30f4":hex:"":int:104:hex:"1dd3e6d610f359cc4e98d36244":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #2 [#2]
depends_on:0
1:exp:0:hex:"ccc545fd330cf17e27d75582db28807ec972b897f812d6ed4726d2a18daac76a":hex:"":hex:"caf2f56584a59c42a51fdbfe4ad78f3c":hex:"e85ae6b27778893f36f130694af0b40f62a05aa386b30fc415e292761cab36fdc39bf5687a513e25ed149414f059e706d8a719b7165044fcbd48c773eae546380b8e667b56824e23685173ad9015a9449bc1cd0b767981efe09da43a07bf1aeee08ba05d387b8a00199e18c874fb3a91f77ba448c3bff971593f94747fce9cbd":hex:"":int:104:hex:"5cf5c7ca6fbfee63854f3bcd15":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #0 [#2]
depends_on:0
1:exp:0:hex:"8340d604770c778ee83d0fdd5703b1fb304c3bffeb6f4c65e2dd0e12c19bddcc":hex:"":hex:"c0a580465b1b2e8344f795a6578a5151":hex:"799f228962ef87865dfcfa0addde7366de2e4aa78029dbc8d57d7e50fa7c74343458df3465103556a3bfc5ce217fbbb5b2835c9f76b70240b40fd605bcfa6b790d5985a8ba54354e0625263c628e8746c451504fc58a179f90f77f2b293d8dbf5582b031082025c806e60143da9ebb6133ac8367376d0572b32569ee799540ae":hex:"":int:96:hex:"318f56bd0f3832d043ef700a":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #1 [#2]
depends_on:0
1:exp:0:hex:"74de45262fe09e12c9ee7100030352112a6532d1874cc6792b4da6950677eb2a":hex:"":hex:"9f7fc7367f9afdb67fd1afffac058e2a":hex:"289ac6f5beecbbcbde5cb3b0fdf4a27ba237fca33719f774ed33a5fd35d7e49f76d3e88c53fd35561655c35469f3eefb5b2f776ff2799aab346522d3f003154e53f4ef075f016aaa500c76870e6659a5f9af197c9a8f5b9e0416ed894e868463cc4386a7442bb0c089a9ab84981313c01fec4fc0ba35829b3cf49c6447f56a4b":hex:"":int:96:hex:"bc1b8b94ff478d9e197551cd":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #2 [#2]
depends_on:0
1:exp:0:hex:"441ec8afce630805d0ce98b200e59f5656a5ce19e5ef58241e6ef16cac7646b9":hex:"":hex:"a1cbeffaf55708c375dcfeb496b21f4e":hex:"5a6ba5d3f5a7a4b317c6c716564c648f0e6bc6b0f9a4c27affca6d5af04b7b13d989b7a2cb42ce8eedd710be70c04c0e40977ca1c2f536aa70677038e737064fb0e23d3dd48bc00ebdd7f988f57141e164e3c18db81e9565a62e28c73770666ff3bfd725eebd98946fed02f31d500b0b7ab4dafeb14e8cc85731a87f50d95fae":hex:"":int:96:hex:"aa4bb3d555dabaaeb4d81fcd":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #0 [#2]
depends_on:0
1:exp:0:hex:"d643111c973ffb7f56bfbf394eedac54be2c556963b181cf661ba144f7893a62":hex:"":hex:"4575b00b9af2195a0cc75855d396e4e8":hex:"b2c53efe59c84c651979bcc1bc76b0bbf5e52b5c3115849abdbc469a063e2b1699bd292e5fcb3476e849c9edbe6ea14c2ab948ed7d21a21f69406621d3d412b043eaf813be722d92739a33a361ed8081c0eb00400c3c7d4e329f5ba4f7b75d534500f42f178048cf2e95b768ffed79c350f2ff72cb355abdb30af0a1363c0b4a":hex:"":int:64:hex:"9d1d182630d7aeee":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #1 [#2]
depends_on:0
1:exp:0:hex:"91301ee0ca694ae6971ee705f53c7ec467f4c88257d6466f6f8159a8970384b9":hex:"":hex:"345fb57e88124a414828730a85f57871":hex:"c13623824a204385f352388098f5e2db23426f00a73c60c1bf1047ce2c7cdf7f7cc8475781fe7075d1226ad18871e12f0156f35e6ce7032efe3bade1c807f9eedc720fff7a27a2f4690f904be9c99b54a65509eab60e97c4283596eeefa2b2517e95de7620382e3f780efa1dbf5d3908373adfe784a4faf298681e171bade4b3":hex:"":int:64:hex:"325d08c5b96068c1":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #2 [#2]
depends_on:0
1:exp:0:hex:"b6ba5c11daed7f868da9bfd7754d555a147a1ffd98c940c1cd5d136680e05c10":hex:"":hex:"b0c92b79d78547496d770678e1ce1552":hex:"5b1ac8ff687f6fd2429dc90a8913f5826d143a16a372cca787845cea86d9b4778708bc0aa538f98e1031850f7c1d97fb64fe29adce6e1d51ca7f5203fc0358fe0bc54347e777dddfe04e3d7a66a1d1e2bdb8b8929e2100daf073845db5dc0b243819754c4c08f4fc3631d1cbd79ac7604746d677ff035930fcd6bd652e7864db":hex:"":int:64:hex:"b1819b6f2d788616":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #0 [#2]
depends_on:0
1:exp:0:hex:"5fcae1759209e784dae5a8278b267c414a03ce7c803df1db7815b2910d10ce19":hex:"":hex:"24c5c349b3effebfd076c88a591b8301":hex:"ca2778e39fffce7fbe8f912e69d55931848dd5ab0d1bd32e7b94af453251a47f5408ebacd7b50ddd1103fab1c72acc0a02f404c5661d8450746d781e2c0861b6974ade9ee2515da88b470f16d5f06007f35ce97cfc17fd015e438af39ca6127db240babe9c42ed5717715f14e72f0ef6ff4ce512de95a179e60d6393e73f216a":hex:"":int:32:hex:"8e59f30b":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #1 [#2]
depends_on:0
1:exp:0:hex:"8d71a70fd58125b0da8dddf8d23ddbe0bc44743753bdf259448d58aae54775a6":hex:"":hex:"d15b02572dec98398ba9e68e1a463738":hex:"81313be1eda9f27e01b30877ca90e825f55ef60b15548c45c786c44b024e7198f333be7ddd2c3f593a9b77b68e6a7ac4cfc015aeec66f4823d9be7152f02a533f375554309a4db0fea8e76255144458e488fd19106d9a9614e828ae306fe82af89e7981369b2259c49bae77f8ec2b1f169ef0449ad083d11907234b72ed2e464":hex:"":int:32:hex:"99df1b8d":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #2 [#2]
depends_on:0
1:exp:0:hex:"b52398c7c75e1b146cc9998eb203159925cf6fc0b1c993ba46528e2f8e8087f0":hex:"":hex:"afc9a60ab8448b77fb05e8410d0a26e8":hex:"770b3782f0e3a19d7d6bb98fa3eb0b916928a2970701c0f4a372a0ecd63499444ae02fd269ddb7d92e11a9e11d0e0b8bc60096a4be79a1e063174b710c5d739d8d05ab5c8ba119ff40843cf8c5dc4e1bd6fcad8389de3b606284c902422108d85eb3589524776641b175946c9ade1465e0d1064c5ae073be90e3261878a9af98":hex:"":int:32:hex:"32d6b756":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #0 [#2]
depends_on:0
1:exp:0:hex:"6793869513ac886ed66e5897bcfa263877d8465fc762b1ed929ba3d08615fdd5":hex:"cda45e29f487f21b820e1af2c8e6d34a8bdf3f72d564a4625a6e06f9bae1c2eac3bbd5c5958fd75cf389a1a31391211745029dcd4cb2575f40ab04710a909b88c2d430cdee279f54cf7c0ff6638d1e0e631f526ee198cfd6e5cdf73d1a11b69de01d640f385fd829616cd2c0e78f09b5f64012e42dee9eb0245b72aba1404e0c":hex:"a43de15dae25c606da1e7a4152f0df71":hex:"":hex:"385834c853772af70675b6be2d5087df84f88b6a303ea594a170e6dd0398ae270fcec61661ca373f4653d8dcc9e71767568c0fb03023b163bdc9ae8a08ea858cbb03b8182b4674147cb35ffda14a2f50ed9eb48d5351f00eb2fa433fdfed6f94833bcf656a7e350eb978a0aaf7a91674145f28f64693197a116b21328e273dca":int:128:hex:"159ffdb05615941e11f0db46ac8f23de":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #1 [#2]
depends_on:0
1:exp:0:hex:"9f77c141b234907b38fb45f1b3602f3c29de1ed839bb7ba51f6192aa8baaa287":hex:"96dcb74a78e99676a71673e3c9f94c34b34dad2748a6e42cc70ea50e41ef8b86b5992295d2cbc8d621fefce09e8948de7e696b9788377d598796afd002a82b628d9890db78359e1edc075cbc0d3f11d544bfdf5c8a838390cb856735942dff260189c00accfabf720e5fef1d9b7131a6b2b769f67374602d1a7ed9b899b2c398":hex:"1b49005788148665cef20d8dcde41889":hex:"":hex:"b4ca59caaa94749317789b92257f2ef1dd3d9b1f4ee9540927a6ae7bf5bb0b348fcf25ba8ddda79a89d3174ac1713421291910c8926cfbb4ec1e59be7dd50e816ff586f165c605371ee6077ba4ac0ce10499f9a2a44866ce6319fce22652226164cc0a813c3147c4461dd0410e3701d4647d5a003090082e367cb9249cf1be47":int:128:hex:"8048ae0c35a656fcaa2f4c1b6be250e2":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #2 [#2]
depends_on:0
1:exp:0:hex:"2419fd9dbe58655122ac1022956a023446b7f4756163769fc1b99eaf8fba1474":hex:"93bc33dc647c7321152b12303f38937bd191ab3ce3b3a43a29f6853b33e415667d97192fcab2d1baa017042b301d03bae2f657505cc58e3aa4bd849d1ce85ede0e192a373a3894c41c54edbae29a209e16c87c81445d43968595297b50b55659f8b92d7282a2b3ca85e4b5d4ac4ff5062635103f2c7806fcc7378d5c2013be72":hex:"94ef13dbfe9f362da35209f6d62b38a4":hex:"":hex:"3db23c161cf352ba267dab6a55f611eb5fff78a75288779a167cd0e4db6e75d21f11f4ff2928abcb1b46d82c2a0b1f647c60da61f9a72565f629b06a7b3fe96e4141a6886436859f610724bbe43fb99fac9b78b1e0138e2d57ce5fcfac1599bdba5701cb424535fad9ac482ab381eadca074e7376101b4b436f9c43ed760a0a6":int:128:hex:"ecd4a7370096dc781c3eb3f7e5985ef1":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #0 [#2]
depends_on:0
1:exp:0:hex:"08e11a8b4b24e63060c5002713725bb5b4a412f1d76eac13989738ce94e19642":hex:"d5598f4e37274f3b617aa4f9cf6b8547b4eb1e0eac79f6eedd6cd5364f8891f66b8d0cb09f54777d461bbf92d6fd74b3fac412b77f2c48e1024cf09b83c1e71bb86f0a20f82d296883ffee62a4a192b184bc6d7ba0448c1519310c83b18c00e71153137afad14f096b43d454f205ba6b6c2ec162aa992cebf50735dd9bb37c7c":hex:"c6f1e6a39cabda1089048b536e39cf67":hex:"":hex:"1fdaf0156456b6b2a68d66091bf2260792748acf3e7bbb7906af8e0df3b569a7c03ee3a48bdfdff7ccd52433d0bbe8c5fe30d93633bb9d591dfad7d81bf8efd4d4a3c5c0bf2ac9832f0a8687f16be640fcf9b19169c251f46b97167d95115acdee3d4443df416275f5597a52c17a4b8c4b723d4b35a7fd0b380fdebd44df8bd5":int:120:hex:"cb9f4d4610c67acfe612af5508bb8c":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #1 [#2]
depends_on:0
1:exp:0:hex:"da2dae0107c284ec2aaf6e7306959df1e92d3932b88954f119ab677c6b9dcdb5":hex:"277675044caf1713109d4d3abf50c6fb67dc67f7fa584fb1a41c833feead03177cf4b42edac139807ede16eb1d9bed27db741f9542d437781405608de18418c9f7269ab3fd88f6a922a31eab5a3b8b2aa75ee4315fcea80c4954ea6613b1360b1c7c6b6da815e3f6e50f72b7e69c3b6cb3d154855e3f83cbd1947eb54018155a":hex:"2005f79d55b12e6dfbab7fedecc50e2d":hex:"":hex:"c2aaab524d1738b5244af642bbd16b32ba954e69ae51acc804a6b0f89f6cb77ba2db2b0e109cda6036786f9cec5587b01e306ee8b3d588748c61ad7fce1266165729d0153ee189746b107ce15ced667279a484294725e120dc1803d2c751784436ab8ff1d5a537628ee35742d1917dc51f8cb46c2d6b983bdec502e99b85e5b5":int:120:hex:"52b4d7f2cc44f0725ee903551f681d":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #2 [#2]
depends_on:0
1:exp:0:hex:"637807b3e472e2287b09d5a3ee62f791a416419ba35e11c49b24dbadc209f0ba":hex:"e91a0a7320329dabb0d0fd7f099a4d313724aeeebcffe6fcea5b00af27d258cf9774845d29aaf5dad634c6f087c3311b1c92775fda8df8820c91186da30dc79747be6ec6230f2c261063143f4fc89d94c7efc145e68bfdbd58fb14e856578ed57ee5b3cba2cc67dd6497f05d1570efa496b46f5bcbf82ff9c6a414f76fcf3f5c":hex:"46909d8dba6c82b86c7a2aca3c9e71e0":hex:"":hex:"13b4ad9c51063a7f697f3fc68030144aee0aeef0b5a52c9d4920a7185b0452159cf13e64ca216ff16637d0946a75fb5da283fcd263dd7ef2c8f14cf75537742d1f0e48846fcdbf03bc343203f7c31cf61b36374033462a7b813f4dbe9386e57874591fde606fbc150d4916c339f1950b09b1911b1b9119c3ff4053e05910ffb2":int:120:hex:"6a5c83f807401d1a9a3a2688289f61":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #0 [#2]
depends_on:0
1:exp:0:hex:"33613dc6e029df0f3ab9ca66fa96cdeaa84c1261dd586723b1ce873545565f7a":hex:"775862b39c2a509afd3470a56891fbb79bdb7dacfdb9ac72ba4730cb936d364e1aed3c92c01a018cfcd7953f751003934c15bdfdf2826e9947ea8e521f55fd2a04c75156e4910f38932c9732eb3e60423e849d34c55e3fd00b48d83028e3b4f35686016126ff16c942ec859d3c3aa2ee6d322a92dc9fa9b0247423416f5a4b47":hex:"59484fbc27cdbd917bb55f815f9faab6":hex:"":hex:"069f80826dbee03e6a3437e7c6d16eb6022bd14827b8e45bd440d9b1a8ddae09999388ba0b1be0a6bafdb96f26dad523a3592fa610d5091f68380f4c1c3fa9ef7a0796ab183e8a82c2bf1f76300f98ce983eab7a93ddb18f1c10534fdb61ace83cae37e225930ab870a46285e733788e907255ca391945d409d2e53dd8a28390":int:112:hex:"9f31f8f8459eb03dc3654caba5c2":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #1 [#2]
depends_on:0
1:exp:0:hex:"75d8132f70ef3f2d8946d296c83014683eb2a4a58b555c0f48e4bfa5774d6672":hex:"a5be88fd43dc761838f3a9c7d62923c38414fa61b3678313cbc8fa9c2e5effb6cad7d5be5f39a71a28ff327b68a69f7e6a6bcb90eccacaf3a8659aeb905dd3e38efe57f2bd0d19daacae238baa01a7051084da6598fc5a3783a18decefc8efc8d46c7b1887f87d6d70c909df49340bcc680832faac3dd23cab5bcd80553dd485":hex:"5ff41f3e75c25cedda1b08a41b89c4b4":hex:"":hex:"959396b86913337f2b1fb19767b787c18f00661c5d601bc65e884e15ac8043081459e889453e906ee267cb5d04fbaf250144a56c820eca34469967c73daf50796184ecf74f3c054bfa63bdd0c32425a8e10546ac342bb8e38a186e42a403cb80110aefd5f2d0bcdd353daa4430b8e7ec2134925c454745e2f708cd0b90d9d672":int:112:hex:"ca0889a0eb12995079cf9ba77019":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #2 [#2]
depends_on:0
1:exp:0:hex:"8d44344d2ff9a02b1c75785bc84f16e4d23614bf43b2b9a87798b418e905c532":hex:"e5689cef9f8258a748a615070fcbf40ed0b24c077e2f9a362cb536737ffbc5383bcafed278d4c5e0f3c83fdd5cde79483c2c178f6fef05ab50f2b8db680027a175bc6d702d249efcd6cbc425b736f1905307c9303a4bd8aca620b57e3bb4b68f2a515259b06cf5365b675edff3457e2e915d7da1e0802f7300b3d56c4644f4ad":hex:"256a983cd6d6eb4e80b5c1d1cd2a9f21":hex:"":hex:"13eeadbecc4c9991e2aa0b1ca819572ef28517528320db970739a16994f82cd8b5bb53d889f298f65c63dcc07089dbf7e9d00612d2cc8220b5630ca0262a698836d906256896eea446f6de4506e558b4f20950528c8c397b6b5b04890204b77a163e46c80c96b3e268fd2754e0380e7330782d606c771d6085b34200a80335f0":int:112:hex:"b33ab1e4029998e2566583dd550d":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #0 [#2]
depends_on:0
1:exp:0:hex:"3999a6a394943be3d6e5732af5faf26caf483a3fd42c13b7f4f02132e93a990d":hex:"8907e8832553264d7e92afa1595842ac661ddfec3f4294567faa0af61b3d0fdf76a922a2f3affb36b3b3b97f18d5172aec0b8f6f01239bb750c0fdd5da1e1244473cdfade83797037ca46d83123e6105c5c54071971f190da0c59821b0bf87242502bd19d19c7f463145bab0e687a18ffb2216c4a2ad2caf9488801c33c78c03":hex:"76e2a5141d094b3a77765ba328f33576":hex:"":hex:"995189a396486b451db0167cf6990557287074def46eef872e6cfe1a297e256bdff2b71668ff0184eedf00ff1a3ec91358874718f0af88acf2bdb191e97332dc544d940412363840d4c03c7b2231852393c62d625093011ef314e4f755b1d0ee37690b4dfb55194a1465714cc3cbcdf93af39e666be0407508b8764f7ee95d3c":int:104:hex:"87c8f61f459fd4a09d9ee8b331":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #1 [#2]
depends_on:0
1:exp:0:hex:"4359a62d54c43770c3a0d51da25cc32fd985d9b41c282887299d2e348aa25a36":hex:"f020c9cafba399009bd920c3ffc165d4db47a9ee15ca8c1f51c65e306ccccd3f1d694071a3c765b5255eba6ef6a280f6095f8c195ebdfbee6968b57366e62e16d05b1768825ab7fe66300941270aa121b4fc02ab970ca6e32170cdbccb46fc548620fa1777049343b1600bfb1bdecec6682f0aa7244a0852adbc7aacedfba446":hex:"5fefa85c958417b6bc8a61b5496fea93":hex:"":hex:"3b8f829aa1cc1532a434bfbbd25f42480311657215946b9216846704fd5da5e886ca9d130df466c3b58f5259102ea6b9ad756e9f484a38dd0ed289fea083ab99fefbc2747100071744f10e362351d4ffac6c7c1f5a49ef3c78e2dc667f6b3bfd0fec454c4e3139443da71e514540d7a228db193a4c35d639ec13c1198ee7f81e":int:104:hex:"591db861b9060869edb228a324":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #2 [#2]
depends_on:0
1:exp:0:hex:"0d798a357de5a686d06c329e451d7384bfbd462063fb8ea7d77a13dfa1f2aac2":hex:"d920785bd7d7b1a2c9c20139380a6ac5f27a11b614ae110da14203146c2615d81e97649e95edb0eda71a0fa1589244ed42fd9449962a92942e38001ac64b212c7e06c113129712a01556577ae02325a26eb92581c0a690a894225e83ff1e36776f22b600508d6d96a0d1c55316b518df8d09769df5e8340cbeabaa0bf7752870":hex:"50a003c0cb50ae8a3183cd640ea4c6f6":hex:"":hex:"9af6a5341cde4b7e1b88346ec481024b40ad95a51533cdd8e09e4809a20684f18eaf243e1df56f02ace9667264cc1c6af6b0914f154b332234f6468cc471ecb2078a9f81c17f4ade83d326b670795458d110e4c4b4cd7fe7f9f5f4d4fb23a038969e4ff4f74839b1edc270fc81fcdc8a0b15b9c2f0561567c471b783b4322ebf":int:104:hex:"6c2f01264f9dbf29962122daff":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #0 [#2]
depends_on:0
1:exp:0:hex:"29b01b6d15f6e68fc2e7079429dde5363888a6410191d603941bed272daef7ed":hex:"123b6da306978f745d1dd86d7df32d9421523a7f329dd29ad98d2c309145844010295ef443a18d37ffe093080682fb96ba9c2c92105d35d77897b589e2abc7269aba8752c2a48c843bebad2c0fa281015ba85f5f709f6aee9b1d49236d5695f7f7d01554b193c89adcd1a91749138952cb3f0ec8b5f046328b3113aaa0715ef4":hex:"cb4ac8373bcbf1b14cf2a6a6a16a422a":hex:"":hex:"caf71e09395d596d5a7b091c9e87ba6d522e974451e41f33f3e7ded554f24daa9da719e87793424eca9a3eb3972983354041091ba4b16c5c8c14913e1f6cbda09779188e9b5512917a0adf4b4344f119736ba6328897726a317989cddc66f16bab64707564bb0064fe6ab7b2b5cce143e94d4b6d739f58c47b6d4850697f8101":int:96:hex:"f635ff3d8bfbfb49694e05ec":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #1 [#2]
depends_on:0
1:exp:0:hex:"f96d8cdcc21884e050f762c049930d78360b56cef5b99ae232c9a8c6e8fa89f7":hex:"9cf05e5065531d2539d92ae76a43da1fa3614ffa4b1c73ddc2358f8d71345c01260060239edf629efc3650e0d13174af4294b6da0f39cc7fbecfa324afff89dd7d203416bd144c5e03df60a287fd4a8d54ef9b4b44b3d6de1d9de07418b8a34ec5c28cec3c5b2fb861583178a68ea0af89f2dfbfbd86f7cf1e572e1c8d4b0675":hex:"5a7eb964b6bc9e75450b721b4d1f8f92":hex:"":hex:"566abaa23b8d464d6f107699453740e9e189254145c5132fe46989a6654de297398913daacb4083b29f7b31832079616e9a43c9c2878df1df451e49f1e629c8b9de2fb0e4ae9df48e3e8880f3f1ff5ace8842d2695e702dd1b7bfa7c25b0539b8c80d31ac91856796beced082c213e8be56efd646dae932f5bf503af46f491d8":int:96:hex:"c049cce29c401d3d198773b6":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #2 [#2]
depends_on:0
1:exp:0:hex:"253234c3dc9cb3d50a80598c5cde0e37b6b13bf834f3595a9458dee698a6d19b":hex:"686ad2740bdad507ebe97aa5bdbef25b8b030c4cdcaccb0d3b675ca91279db3ea75aa222c0ae98f86c24b10038cbb4fe9f897e1145b2f58cd3e9120f9a5620f38aa1e1f63906f557ff4a4c3223f5bb13dca34f8a1c6419e24ea57d114c62fec6fb9eee58a16b9e6a6bd930aa6fedcfc591311250e7167d43cca5916d5beead27":hex:"9d156414acb63d11cb34870b937c837d":hex:"":hex:"96abd56d2f8aefe6c687f035df46c3f952a9933b8a51698e47d973b7d47c65ca3ba2474cb419c84a4c3cefb49e78cee1443a8fbbdaaecf73e9059ef34ac5a0df3fc152ecde2286da8840ad4617fd6ebc1e126314204bdc0a17b958430eb9f727498ff1db17aabbdaf43acca0945342d2ba9346da5373b2372b3081605e895c99":int:96:hex:"3d998e5be9df433da001a686":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #0 [#2]
depends_on:0
1:exp:0:hex:"1054d48d52693d2797c80d3f10509d1c808f36a4d65e8fd968e5d56239f856bc":hex:"a708e9d2d27ed4228e5b23d358561a77d684d855db9827be2bc102f2278f1961d3f056fb76f76204b2c96b916eb5e407f98e58edfed06de2388521832d97211d851d3e29658df738e3a15593b9db016d9e46fe9df98ce972d59f7058d484886ffaec7b9fd973c55644831241c1ce85bb478e83ccefd26b9718bfe910ac311ecc":hex:"87611b936873b63abeaea990d6637a22":hex:"":hex:"94473e84659bc18eddcebe3112f55426f48ca4d670291fdedd42cc15a7415aa6795fb75b39434884eb266677e1fa7f530c6f3aaa733c0d9c06291bd7dff4c4e5857b2ee9e9f1f61a85571ad32dc9a3259017abe9eb5111e56df2913535669f3b2d722bd35fcdbd6541918885d9677cccaa902b9d3599cd4f0df1f35f4d11b8cf":int:64:hex:"9bd7cfe1023448ac":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #1 [#2]
depends_on:0
1:exp:0:hex:"a95dc5127b9cb1c82d558d5b24ae049e24447fd676a49350089951afe01dc797":hex:"45f81fa4780a256c40a0efec9547310406904d8991bcf964aa35ec9af457e2a642c1343827839f1f4b42f2b226da351731f416a4b4151f07927c278b371404f027bb2058e1765b367f5433a43fa4153883351041db3f066ef284a3eabd584d1d0b1d594b4ce7b5bca1708fbc661d95a9ac0d77dc29547f022eedc582fc7158c3":hex:"0b177d01993ec726fff082ec88c64a31":hex:"":hex:"16c77b7f541d2dc4e8d31da23e04f18f4254aa283e8cee5b776f3d9a27584f459d0747955efff8945f807209ddaa6421846647d4198534b244498fe13a9073d372171d1b2fc38af66204f3de04000c093ebe659173b8d78dcfb8ca9003d2cd44ed168e6aaf55a06f29e83ceb32b98bafb59f109599f88b5c0f0557bd2b28f03f":int:64:hex:"19eb5f808d65989d":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #2 [#2]
depends_on:0
1:exp:0:hex:"53d6393dd7ecc40f2d52460ecdb0607133ad843ef53f380cd3a2755bfa567abe":hex:"72199c54dd5efb28c104e3b7210855506f6577d15c4eccdaa6a621a572e15f5845d648cf71b9fafef3411f6c1a664c7974fe71126a5cbab907e2caa342d8d7a05bc68a72c824896ec40e520e90b704dea441d22c5918f98803a88293384f64f92f11650c2cf4d3b062d30e14d149160742f59a473faf8fe00f4bdab9128c3281":hex:"db7e93da21f0c9840c54c56e9c6ceba3":hex:"":hex:"5e83f559fa54926b731334f815783914530bbcc472d4bbd5e65908fb1c421442cb4c57329f2e4ba3d146a6499f34d8f1ec6d43e0cf98bdba923f404b914700edb235b08b0330097ea4162fd0baa1b7177ef0b29d5a6689bc56b8f975d6b6067ade4b8baf1d47a2eeb5b2ed28ebeded381d55d280cb2fb65ce4d82b69cce0594d":int:64:hex:"4e65dde857a0f5c7":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #0 [#2]
depends_on:0
1:exp:0:hex:"aa4a53c7764a254b06e1d8003810300b70f5729306effba9fb6210f97648a499":hex:"19f3a8c298478d6868bf3b31785eb62e844c37200672e6ef1ecc05c616d981e02c333dbc3f86dbb7ab9ba40e9e57e133e6d1d595fcc6d8e9886a84517212669d5d7ce0f1383cb58681b92dc180c06caa1a7ac1ec974dcd7f2bca7ad2ab2789c9a3a487d64c484319bffa56d854a6d40c62b02d0c7898f641f106ff50d22a12e7":hex:"c32288f97af9b6e31aa7e40d9ef8d016":hex:"":hex:"1fa6aec7a28767c8961363dc4264e6ab97014264f6fe1dda7e9db8646ce9a5463f69e91aad2fce696f9b641d75635bfb0f97ed2d7beaca944cf8bd9dbfffe77b5ae9fd032575e5333c7ce27538c609922843de87b960ebca7c2a2ef9702dd0c32f787b4d7df248fdf526d594a90bad0d6a8dffe212246c36db71e2d348326624":int:32:hex:"1699444e":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #1 [#2]
depends_on:0
1:exp:0:hex:"f420b6ef96d9bfe46dcf18246ee230790a6fc854e730f1dd2d1ffd0e8b5c4776":hex:"658a954d6c61d0d6f0e81a3c1cc65684483fdc95f280b6d4c964358596c25ca41c389932d74a1a3a17d041e89b7110ea315fadb3128c2c469c350bf9b4723aa9c8abd9065ebbd12c317bfb7090f09633f8c1184f0c4fbe10f5486dbfb847536c886f7d144ed07272a7e62fb523a04111e5ea9e1ab415fd17e72143006db14e9e":hex:"4982f502a37eea8bcf316ced466c9fb1":hex:"":hex:"8630aa78aabe35d9360a44bb2094209b6f70d46d71e3949803cf54e33dafd54c6e49eda9e26dc5c0c1e34908f5281c8cb2a1aeee81186cf45d3eb22f486320c7ee0fb7bf3c211b232a8426e7e82f3e05881bf7d9454cddec7f28e5358cd0e9ea2e9cff938be044c1b21911d50b2ae23ab1aef377511ea657adcb560c34209f8b":int:32:hex:"3aa91b73":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #2 [#2]
depends_on:0
1:exp:0:hex:"50f3b822dfc70382d8695811e6b0a2896ea2bcd4d5268778cd484053c8a19288":hex:"15bfb3a562ced63c92561a78374af40c88a08ce02392419e03d7543365c5b6525951ef2dec5927474a0ef85f519e5ef795881db3eafa765ec38e6be7b565a878c13d90c02889dc50cbe87081d9225a515504c7be15bf97f5d72a4d81f218a148a46fbd42983ab002fce0a54719bfe301bb761753cb330dc25be517b87d0428d9":hex:"980810c11abd3aff43408ec9a69abcb3":hex:"":hex:"12632296f27eb2439009f6032a3f648370303dcebaac311b684de2496f399b271347b19e045c1060802f3f742b6c780d20b9d589cc082d7d0d580dfb7231171cfb612227fcdee7feae4f8defd34c89fb0d68570e782192a7bdd9a5464f35dc6a4282cf9cc3fdfac988d129eddf8e0795ccc24a113f872ada88834c974df8bc69":int:32:hex:"32c1c4c5":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #0 [#2]
depends_on:0
1:exp:0:hex:"29072ab5bad2c1425ca8dd0ae56f27e93f8d26b320b08f77b8bd3fa9d03edc6c":hex:"3c7afc5cfc5a1e141587e93fef8427d4f21d892b983b7c9b6e9de3ee168837a1533847c8a2e2ab0706ac1474e9aa54ab57e7860bca9ebb83bd6d3ae26ca5387abdb9a60c4a9928484742a91294b13ab8f51eb4f599a30e9cb1894aca32a62a4c2793ee6793df473f43234c9eafb44d585a7d92a50aebef80c73c86ef67f5b5a4":hex:"0201edf80475d2f969a90848f639528c":hex:"4c8ff3edeaa68e47bbc8724b37822216d42e2669ca127da14b7b488fde31a49c7d357fb9aecc1991b3c6f63a4ce43959a22de70545e6aee8674d812ecaaef93ad03b5d4c99bdef6d52f21fc7fdbeb1c5629a76df59620aaefda81a8e73cebe4c646beffd7f4a98a5283cc7bc5e78b2a70f43e0cab0b7772e03a5f048ec75081a":hex:"f3755aae6813e4e4b84a089ca1496564676655ba3c94e59c5f682adbbfed21e76aed0db78390258cf5fbf15f06c6b6468414cb6493c8b9b953b4954ecaf07ecaf8586ae001710d4069da6d21810bcdcbb831f7041cdbb984b7c55878598a6658883178dcc0fa03394519b8b9c3bed0e5c073429f5dd071a9184b015cbbbc62e1":int:128:hex:"0549dd9f2a123bd6d58e5cd16c0624a1":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #1 [#2]
depends_on:0
1:exp:0:hex:"aa9999af53720d0c1288fd3fe307a471160635287eebf41dd77c82d1f9cc9d61":hex:"6ce6f2dc202750219e15a24e1ff0678ffdde55b27cdcab6da188bd5235a3bdc677f72f106579d02c2970d4542e4e2372886e1a6d74c596ce735f51f2ee6aff4d62bd24112ec7cd1adc7c660561f163170cdf047c241c53b8a5b2e03fde48c249a319bb90c2693c468c9dd136e94e05f067cd1d68244ce50be318ae0464b79acd":hex:"6299d651a032bdf3a7e6b25ace660e30":hex:"afab0a3d1960ac973ee2f4461dacd10d189412b37e572cad7888bb4d2453f1eefbd6725aadd5f982393dfa59c3cf1ee342dd91e1fbfab10a802e3a0eda226fde2686e7db1015405a3d33c921e5aa857bfda53ca3aed3ff0e18c289406740a7c5d9f86ce43db40c9032e98ab126c7c0364e2efc008312b7641d36503d183fa5a5":hex:"a8059fe6ff711616afb591b5e5de497b3b7813f9de658c7b47cc3e7b07d0805c1ba05856d98341869b8394f3b5df2876ae19837edb3931eebeb0f26eb6c4a2ea78003d82a98111305208ccaceaf77e5d71996cca4f9a5eb712dd916b71455f741ec2dde51f56828667b7a2da015e1886fba71e496a542d94a38efbcb5353fb89":int:128:hex:"2ff4d8d00400ad63a6ae7842eefb16eb":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #2 [#2]
depends_on:0
1:exp:0:hex:"31721e5e3a748a7f7369f3dffc1cbb570ceac868ef9d1f29b944b7e86a26d273":hex:"6afc1d22233a60c3e6851447de89152a0dbadcd87e35fc947ca4bc886f1f87549ea106b097e2655136833d06dfb879a85732298860c149c5e5ff03bb2a95d9cd3deeb8ffdf951ea5f97e32c1ed75271d2ea58d158ae6d568bf197d69130977e330ebfef33f222bfd5b56bc6b0382dc99c4f0e42b0aa7a117b43f96d43f6e02dd":hex:"523247d56cc67c752b20eab7a28f85fe":hex:"11eb41aeae3611f0de77bfa1221ef5b7d254faf893dbdaead926a61605f8a86f20f1fb84e0c5acd195143bc5a4f297bf729129f898a2013175b3db7004115a6120134d8e354afe36699a6c6618d739c805b5b91739df67de7667729f1d6eae1a0609897999d474be4d8b826df901c6f39d522570d38d2d1aa828382932a177b1":hex:"39e7f32bb3e8436d97a1d86a22750768001fe3a805516d3f800352323afd221991105d12da69ce7430402fa7923958ad5ed85506b968c4dd89516d6e3d02e722db3954ce098ec3299ef4f2ed4a89f383408dceca9dabc6f8eefe5a1f80093961c29a94b222d1a04d2c1e453d2e02977f3dd77a4659e2bde2fdbba8e2829db4f1":int:128:hex:"506883db674fa0417e0832efc040227c":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #0 [#2]
depends_on:0
1:exp:0:hex:"100bd2bf9c8b24cc2e8d57697cd131c846b55ad6ff0b214c0de14104b465b58b":hex:"81c3370da989f774c1962f60c57299747481bea0e6b91df846e6ef93cada977bc742ee33ce085ae33eb9f7393a0943b647205a7e1ffb2a6a803a1ce7a88902456d66612362962b97c7152b57f1d54de94a39f07c1a8098da4ea5e498d426b7036c642fbeebefda50b8c421a7a33b1a8499dc35011d80a51d34285824d6f01722":hex:"363e8af6f38307ec126e466e7056cc45":hex:"471f7e9a0b505b12996747ec9e32731f11911ee95d70795bbd1bba34cf782d4100ce30a85b23f9f817f30e8f314e1a23e101201c920ce12ce732cc3fe01c74a9ee8d3e1599aa22f2398c3265d4dbda626a8ff4262889009e087fbef6babe33d7300e5cfc4c0056f3562a913d2594fee8e44959cf728599a9d3e7ee4a9ecd6694":hex:"9494d01966ac887b8295bde61f0e7d006ea7b5c984a29cf5d849194f35d7b0f6ddb3bbd9646d7b9b961c515179901d2b04cb7cf7b6c8736d1d472ae8bb9a6dc9194b03b3f5373551a5ae0c0f023967669c873f0acfb02c0ae3a384e70f7a7ca05861f257f36a2ad5fbb591473dfc3ae1264dca0e889e0ddbf93dadf75db2059b":int:120:hex:"5c78d914cac78c514e275a244d0ea4":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #1 [#2]
depends_on:0
1:exp:0:hex:"614dd1762deb5c726eadf0e6587f9f38fa63d16bca1926955404f1b9f83e241a":hex:"1ae828a1693d3c24651ab8ba59fb1185d08e6cc4a964f30dac59cd81ff4bdfce8023ab1b6dffb594a4250d25f611763efb4152cd35b937ca11373d237f1f8b3c0e21b942beb1f4ffe5014198c9ff59896ddfbb55e69963e3ef6b03d3fa134977870cd6f3ac10bbf59bdcc9f103cc2d58f294ef5f007a9f903c7bada08cb454e6":hex:"10d079a86894b0c17bfcc8ffc4ecf7bc":hex:"c4035f80b6d2ea288afd4ddaec1eb232b78be5a86583fa85f791d546102c97ace9716c2702483d762c8e4eda12f3dd10a9a49a2d72cd4694fa794477b54b4367be6b548675aee4c351e3f66c7e113aecfbcc57b8bbab4a039f28488237c75313e62612847b915ef9b582e146b2bfabbfce576a984f5ce4be0e6bff5480584fc3":hex:"bf5fb0445aab46aba504801d5356455f28c98f300670a731bdd0c901a1d5564aa31f5d467e5f80dadbfeca61d2bf72b570f3935ba04c45a2ff7994bac6cabf84db2a42cd5db2a4f160c97c76817cc5cb62d4006d895fcdb218c1464b5caaadbd1f61779938e9a84440615eae050cd6f1713cfbd695d78818b2af78157339e9d9":int:120:hex:"6d815ee12813875ce74e3aed3c7b73":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #2 [#2]
depends_on:0
1:exp:0:hex:"12e97fafff7d397ea34efc0a8528afcd51c1b2ccda680ae9049edc8359b78ec0":hex:"9fbf0141cd50bd1b3ccaf137b808b698570642ab20c32120901622b34173d7ad119abca3c61bbf1e6dd5cb182a079f3e01b0e5263d984c6186f01792125dd6c47c30033008ca2e0377f990285094f652c55a348242dfaa59f76989fcf86033c8d9c0b2a526bf46cca207e055e1dbc7cf3d0b7a840c8fb5f85784c9e4563f71de":hex:"8eb11abfe350c0d5a6b02477b44867e9":hex:"0a830029d450e20aaef484d4abee9dadeabbd6feaf800b3a693b4746db059efb7d110405b45e45a9e5acf90957c154674dfb2c1cd787af371e01bafc4e8475d0268b969d25756a1121a519afa61f3d6ecded4e0640f0ddd471f5b8e82029fd2887df4e65af9580390b6924022e39acfede7530e5f0e54f0285ba565ff49af542":hex:"067cd6ff8461ac80217ef70a91dcf6edb2fbdd31856815cf356fffa63ba3f5cb293d7f1ed32ae40248693617f27839a34e871fdde635c04d1e66743f730a06e2be25cafe1d67d804879fe38e009268ec50a0294da445c795742ff1e924170e4c2e0e9ef3bdc26c251f5537218d295d93d57baccc4dee6185c235d7ec5c9926a6":int:120:hex:"931f44f10993c836e534a59c1aeb98":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #0 [#2]
depends_on:0
1:exp:0:hex:"c732da000262de558bd3ea65e66e20e11605170c90b67708bda43f40abed74fe":hex:"7d6c981c30ef87a46f53aecb4c97124fb94b45057635d5bf1d4f3a3bdb534e9ab62b4a425de9dc52537575ed9ff406cfbf75403d3d9cdbd9fcd520d62065f81483427fa27964642cc1a07822da0f6234a689eb30e8425d7709abfd18666c76c963eecef20503ee77c96802c120abea1428cc64a08fc20860527854fecc571a6c":hex:"523dd34ea263c31c2215053986626d02":hex:"f170556ac5d38f0661bae33e0826356c8488218903eba1bfa49b16882537ef78283fd9351f37f44a7687049a608c3ddcc82817d4ba96a40d05807a38ee3f2d5cb8b1121db61318fe22bfd3afb319e84c4e2f94570a92433db29bd2193485449c719a2c6030696f53ac729df90678eb018783b25740d806d1ef6980e10d396595":hex:"3470d4544f7bfa3ac0627a56e66c56fa062188440834b9238bd20e89dfc701fe6cfe0bf4ea2387014bd83c63ab7c912e1c0dce7c2d92eaea155f886b574bc94a8f4f275dffe2d84173a05b99d8029c36dd3c35c12709d33f55c3bcd96e9a815f77a4fe8e50639d8f195a526486f1209d7bf7e86ac3dfc4a1d2cbddb6d330e5db":int:112:hex:"5924f3ceff0207fc8ba8179a9925":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #1 [#2]
depends_on:0
1:exp:0:hex:"2684bccf2b845314a0c4b8b5a780f91aa7ed1177539122dc8717c14bb50e2dff":hex:"1a4174d4e18ae0b6434f35dcd9c86cf158c42ce00ceb12f4356ec118d659820518c326a1b2ab92279d949f74c45219c660cb84fb6b10b14d56a501173fd3b129ac89db0de22874d92bec724e94751f91a817a42a28e8e15672172c0b0db4ead46b14d4bc21ad8f5ba1f9e7e0fcc867700681349b8102a208d76ae4ef7df5b56e":hex:"8433b59b41fe0cdc5b30e4e87c5028ec":hex:"280026eeebf05e26e84955e4a36352d4f97f3193dce0795d526d05645bf5d2eec4b92ee8dce54d78fd3fc3e36bc79d5bf9ee3b2699310a75dbc5007bdacb4dc88d06515995f8f5b1aa90cb8fc036b763a5e819db70c091802fb7f24b9c2a68ff194032fffc4ef798936aabccbb43f22a2bbd7e1ab9d0434d443dac4929b84193":hex:"cc155e04472c0872d5ccf8910d34496f380954da7653a1e1d3c460fbbc791c9b82e35176e938b7e21eb4690ed9fca74ba45a03dac4abc4f625ffdfad02e1acccf18b5a1878f911fb6f6e09ce0d4c6a0bb87226e914879a1b3085c30e8328aa6e0d1c49c21b760b82e469981b40ea102f3998c81dd9799f484ab89b19396ab7e1":int:112:hex:"5a80008e6da40c71b316b84ae284":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #2 [#2]
depends_on:0
1:exp:0:hex:"484a33ba0b97c2887a86a1476f274e236eb37a72e05f9e74348248877ea99e98":hex:"4d81cec14b398257a31ad1e3581c00d05e12b37b71260bdd95bc0b6981b614598ffbbb3ec4bb7deb5673a1020139877122f88504c9c53265706fe76623a9b488a3dfdd4cbc1b7b46c7fce9d7378e164964c0a377337a5c172e5e4de6206375164cd7beb0305d7a90f5c73e12f445326e1bc9ac5acd1bd4bcbe4662524891a2e9":hex:"c3a5cc19aef6d64b656d66fad697b829":hex:"30f276f96a50e17b452dcb5e1b4ab666dc7c4c72d0d9ab2abaf77eae2e3bab7dbe5ac005d7eac5480e1bae13646b59155528abdc148b3b71f06d017c4b12d64aa3990cc96941eaac14b60eb347e0be873de2b6fe2b86e2c2fc063b29511b70144ecd315b9491001b122701b9c8cc1d85427b6c60663ccd9d1fa84e1c2f609f36":hex:"579fd8fb50d795b5b208c2d5b0a8b1804f754a30a1003025301655aebcda2d2ff30d29a16d0fb17a28401127750fc87c9e3aa08540817228b049c387253ea2359035b8063ab4bf54504ca5ad93b54b8ac5bd0c1ef3c6769fb1ed239bb76f3e0bc51d356aa91b494d22749c8e4cdb1629e93f7c6e46ff9145916c1275669ae5ba":int:112:hex:"1c39aac1d5ffe7916a08ab2ce279":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #0 [#2]
depends_on:0
1:exp:0:hex:"4a5f5321b515cfcde493148ee4c44c693b1979b3a3ba522a2a80e5d27c93fd1b":hex:"962b8504feb57ae73e93c2e8962c9562f409c908e51f9904df1623eaa0c6b998db6ee8919d805b6ffcc37da51300c1ae16bca21f8f6f63af989a813ae8fe28c3fb012f003dab7e71b08d757799208806062d62b4ac937712409f9fafff3e3579a4d92d4437a6f0b263e1da7e4651e0a521be5f6f49ff5a0778f07bd5d3dac696":hex:"c2cb0166046bad0cf0a107af83921d7a":hex:"e48abfb657ab33f58eeda8c58a20e7e299bc3e7481f704c326529408580f9a5130cf6f7368502d20b03ba6c3b8f6f28c076a3ef7b8e987750dc972be953e712483e6f328da57e4b5c501fa7c720593eb89ff9644fbdc45478f80ee89f096694dcb44a9b3a6aca0904d4aa4e475b4b24771df9fd6ef9557f4f5c842ac241b212f":hex:"11bd55d969603ff3d46355cb19c69557b99825a4c23eeafc8eed8422dab537c0fa9753191c49a6fd9e0d6760ed816a49e7f5704b5936a498544e2bbba7875c513c031f11527ca1b9b579960be6964fba9119dcece8205c174be07ebffada83375678de76fc012b0ee179787b4aa9fb6e2b459575260eb01f23786dc24d1d45ef":int:104:hex:"36853a029b5163ca76c72d4fec":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #1 [#2]
depends_on:0
1:exp:0:hex:"c8f7b7e6295fc8e33740bf2807caeaf4b90817cc3ef3d9f38f704d9f6164e41d":hex:"4c26e489069b487ce9dc0e295d5e89760401185374041b0efca5bbf758e7d010ccbfe5999e2a817776aa8f49c1e5d43bcdade2989fe5be635dab54cb0e390a21b832b30f688857b9e09c346bcc5397e51cf71acbe1bfcaa1ecd7e87fe5dfde180d951922e60dd8203ff210c995eb54bb981f7e931f0b1f52dce0cf1b2eba503f":hex:"903b2eeb9d0b3794acb7439d341cfe0d":hex:"83e99497bfbe9393b065b0b18c13f99b67f1fdd724fd5d70cdccd2b8dd658499cb9f57e1a1fe39634ab0869182de085722a79eaabf057aac7b3f3230f51a2f9b48b49d592f02246dacbe915ff9d9a53f7e5332f7a9d89649050b075c07e5e74f281ca1a0dbe632c0aecf3b1911cd6ec4f8facc2777d0d14784bf5951a1c62c33":hex:"63e2941bf4a13374627be66bdd4e57119149f81f4c1a8a321d27a4a79e7d61e2dcec9d7b13fcccf12f5b059cc209f8414ae81966462a266e92b4b3c25198ee240e0bc6f6197df1e24e8d4379fcae89e6240a7f9c7bab886e79990b846e98e4bacb8b3b17422249943e9973de42da5e38e4eb52830b1facce766b3389a5312476":int:104:hex:"6e31c5db3146ae45ef5d50485e":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #2 [#2]
depends_on:0
1:exp:0:hex:"dec062efc1bd2556b87a81143d025abbaa532c586d5ebb065859a2071f8f07e4":hex:"02191bcb060e61827dbddac6c2961dbab8812cdc2ac77bf0275628e8e36bae18ad4deb77b2682ade0aef76afd4592173ba29dae4d0735963c803856eaa6f60a6c21785358e87f3c4a91e321c59e04c150297de873679194ba5ca857f7d91ffc358e73810d555ebd4dbd1fe4fbc4ffa4ff38e4b41db9af0a84fe9828708631469":hex:"19abd0361443c3ac2a46f2606eeb1a69":hex:"c3785e7c0095726fd1f3ca842057b0ea2baf9c3fe1119c2147609158a2039f26cedf8a44e046955ba7e7cad9f48cb49274fc53b109d7897e080af252e7dc64807c276bcf668d2cd505c9ce8e584609d293ebd2a4515bfbaf78c413d6e29dc90974db38b564ffe9a40d3955dba9f19b6f39bf942669cf80e4676d6c10df566ca1":hex:"91a16c7fe029e3fddacf0809dde7d041c438977b89192e6fed7605d0133f3d9e810355d186432f6529bd2c4cb9dadb4fedf5128cb45e25a3a46bf74ed93f31349f64a69dbe86592d76e437947f1c1d7270d1cffe80afe10ae8523541961eacee1838c168a2ab76703ea4674a68a96b8a298a672ffc140e98e452d501fd57f000":int:104:hex:"5b4071a4be0543aaa59b56de35":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #0 [#2]
depends_on:0
1:exp:0:hex:"9b7b700d978e33ae9311b206347f488e2832fad5ce7e6026ad5e24fb47104fcb":hex:"37aef6e4200c6abc3d161daaf9dd6ede002ce8c63d9ed54e8ac56bdc8d36906bea663d2857d8d543166ba150827735ec78e37f92e682275e268d377b1880970df232162e55c9311882f889e7d183e5cf4972691c85f81c47e1224b9c97ee3963d75c6a032270ad6d713c999913f0b58a2d4f42b85a3b0b40541a31398cdfb4b0":hex:"d0bbc284af767af9a31b863d66cb6138":hex:"dfb87a65ab2d99d7d753042aa47448ad830e546d298d6ad52b85207bbb0cbe8cf3cdb12b3544f1fc228fdae04a241abf9e71de8ae14f2de2c261469c383c682e13582e07cddb1ed9bff1fd2aa0be7978096a914676dfbe7bec6edd927362f656ce1de86229bc511cfec4cda77a1e761e7ab8664e4df08cb820ebdb604c2cdbb0":hex:"dcd5575d94fffc647d4c081e3ce03928651419a32ada2af02de2f58d68fa98eb1fd5ef671875719a9c65b9ecc69513408a79a0a5d57cabd04f8e651f5b8fc1ff42ce58d8a212ac2bcb83c5c53c542c282553a62b4e3d7d4f049ab13172739a0f46e0a2fd9aec54eb0c84141c6b341783754372df69d39e48cc24eb3d9ddb21a9":int:96:hex:"4a7ac79db94b27469b92343a":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #1 [#2]
depends_on:0
1:exp:0:hex:"ce15e61edd9320ceacbf3984d87c707159caa738e7e76285be00b5a95954b523":hex:"8af4a7d92441ce931815fa4e24d69f66256fec7e62f79a029b684b5db304a46b2a3d3a7ee8d6b7ae38caa7de526d5c0f28dc65a0913a383b7ee1640cbe24997ba95b9b12fa1e9ce9f9100d883c16b6286dce17e381af15113f56197c97fe6b45be00a3df05045f476829d7b303211ac97cf989a18c16e27fbf23570d9d18f04b":hex:"b1269c8495ea1469ff41d8154ae6765e":hex:"0ad26a08a5cc2ec825347d7ffd5aac795eb68aa7e22970d991c863fa6d1fa720137aa5cde4e382625a0038e6ed72da3b5003c1b2a953c2b2138e0cf870cca4afb595c0451aa793fb0a2bc43834a0aca1e760590cca765ad672ead975993f82ae6765c5afbddc6062d7c4babebf650ab097db1a1d9a2a99e8fd2e0eb8a7b916f6":hex:"ad0ab4e77257866e4a57cf44fa4049428e56a6e8b8fd47b4cd00bfce84fa8f5a43f1df2061b0a37311b4a1436bad0d61d52ced5e262ed41a7eb125d61cec2e3fbaa95e533b43f318048096ebc8466f0cd609bb5e7c3fc6e5701aace546618a170f88c0b7ed76b63759ca4e4b931a86ac379dd12ad2cba7d47a19a3ae7c242fb0":int:96:hex:"fb1e988f9c97358a17e35e6f":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #2 [#2]
depends_on:0
1:exp:0:hex:"aef24b8205d4085d978505f04724293c2819ef9f3f03a6c758078690fc4bf7c8":hex:"db26453170db2f984312e0cf961d1a7df1154f0525c31f166be5c9f516736501f9f2dd8096a69b6441888ce27aaceacb0b365a38e4e01e2e34027c023206e814f22d46fd2fa69f87509ddced4b8852a76b2532b92f069b8c922ac13b2b7f19cb7c524657a4ee6e989cf2598bef674aa31576776853fb7f9a2704d6b3ee7fbcbb":hex:"81456baa337c3dfd162d9c5f72a2e216":hex:"484a5f4772643cf74ccdced0e5d80862f9300f26ae3139968649d3d7bb761b313f2ba63798b2040d397c3d1569285fee8498fd9254851c15b98af5bd351fa72e7d574c62ede0d728e1279e8b4e4784fd63ea7851e99d1d2356bcbf868528f8d0a90fc3b884ece631648d916ec97abadca1b0dd7670e6ad42245021570582ec7c":hex:"da95c61cd2bb88fea78c059c254d2b949d4fc291c73ac178ace44c1e6a339f64931c857d3a7cb276a04993620adb6918dfd3f9083edad384a8e6c1d4799d526a1c969d8deb0e2667d6d06f559baf914b49fc463244528aa6522d19699065438d939521d7d7bb149835298f2054bcaae6d786f6dde133b640697a3d37c697579a":int:96:hex:"bc1c1cbcad2e1a66ace079a2":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #0 [#2]
depends_on:0
1:exp:0:hex:"9685aea9aaebbd691e679779034729306d5887bee4c1f90f6ee3a397a0ff3ece":hex:"ae3b2fa1e209f72c167eb16bc15b7669b87d4ab516e428157810b87a83e90d56e267bd4996522b5b22c2a349d3765ca27ea27057dd71f7c18ddd053033bd780b6cb689f48c383e9c717b9b265cb9e32c70c4a7d8fb933e986d996b5ad914cd645b74c47ac3a0de952ee3fc73ada83d896da7ca0b2a0b10e4f701fa13cba9ec50":hex:"b1bc140531ae8c69e2ffc784e0988038":hex:"294ff858fa6efc82ca3be4d05332bbb951a71a7ddfa4b78472e1582b445312eec11793d8d6e1e858d9cb078b5fc9083ac8a3e3bd82964cb07c08450567922299f68fd47663c7a77c29f2b5347f229301433d5a75263158a0d80095859e7e45476b99b23412046bfbe4eafff9f7820ba49919d2c987cf00c286c784e7669d8fe8":hex:"6575128b576e68f7b3709e325b3d616783b42ff7f7631eb62b90cb0c8a86bd324756f43af53c33cbdaf9cf64ea94cf1b7fab5003f00c1d07f3fc8eb1931d759f9c43477ba22311a111488092c42b7786facf42b861a824cd1bcdc603a77d11253f15206a929a3e16e8737d080b8e5f0da8896226989a9964d72e491187250472":int:64:hex:"f78c4dd37c06b197":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #1 [#2]
depends_on:0
1:exp:0:hex:"3adf0da24394a98c7beae01d28f261a9cbd887aeeecc0c29e84540264d5a6bad":hex:"8cf023d717b0f82f2b81750b53fb665c1c90f4740af4a3534b36b847df33ba5eec19eb24ead70a4b613a82572878216181d59b0c4c4df99be08d021cf182724d8ff5ec4e85884d0f69c16238fbbdbc5529ffcc4e418405e4e95139f79d3115a1ac56820cd39fc413ab72f7d447f947cb0541fc2be261f1246c0a786199013b22":hex:"ad41288817577316df2d881ac93fcdef":hex:"ad33ce922372fbe3531c0dece69f85f18eb1bbfb09a178403832308de0e54b1010db2636c4b7d9caa478138f61db5149c9fd7f3b45b7a1876729fe67622a37f0b322ef9cf6043b301a5d4c81e6f347d22bd3e40722059d3be945845c6b0629fbcfcaf885c7f393aa81f242c48c61a439574761ef6b671972cac664403250750e":hex:"9d465e9c4228323946b1261892243d8455edb9eb8633d026d4033fa3965d20730979ba6952c0f6f2c5768f03c19256b64bc759d2e7b92424bbc668308504ba34384c2bb37baaf91a3a4f0952a050a3d69853141b49e86eda3bf0c4db4ebcd1c41e7f13eca20bf574a47ec45b8c98def17c0741805bf8f37923ba2b5221428578":int:64:hex:"507618cec6d03964":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #2 [#2]
depends_on:0
1:exp:0:hex:"9ef64b4132db54668568e2ae66ab61f62a820c7002a67a7e42006280a373feba":hex:"4b96dce753273188c4cca3386a7415d5d9263757376e1f32797df47992e92e1bc0ab0833363b3acffde22602d4e47307bc8f252944414a15e1398693fd3b8bf4d8101cdcf70ce2c9de8cb7f5bb17cd83f09b1bc78ba07c34b9214e250c5940e9794199cb392309027d5ab4f32b51c533db6732024bd412f2cb0c5178d5296aa5":hex:"07a86dbe2cce040eccdad79b3d211ecc":hex:"af7a75748ee293015b600ca82ccc7718f4ecc20c3a2357ee02fb726330a0d79ca8bb97979bc0c89f4c60d7154f8bd29ba6ec5f2f4be286ea8a258cf6bd39b4f42d6db8e70c99ec3af26bb4d8003dc6fd0fdfbbc620d511d4d5f09ddf975a1663ac2979ae0978b0bc1e7bfcd660ae4ac7f1a8f6d8ee35752ed59a604f07dfda53":hex:"e3e862146b6fb48b01ababc462dd560298eea7bfe5f3248e28a908d1de08c7e91fcf63922c394e7a51b64f4382225093e78598c050e588ff4ad38f3e83dc07b77ce569c6ab8f8a9cb0056b3155aa1503cebeb64c86d6d9cdbb178ea9a01a8ba33a1c48beb92ee4cf60e7dedf986019e19089cd186c98c229b0ff42c9e1aca571":int:64:hex:"8614c216055c0660":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #0 [#2]
depends_on:0
1:exp:0:hex:"f14ac79f35bc5a685433eea5bb7fd69fc959aabda24cbd8b7795fb2e41f90ab0":hex:"8a20da14819079960b77ed5e548d0aa0bdcffb752817c1abe4195e612cfbb58c8e5a8af69f75bad10ee8afdf0b0d5c46c4dc11c32bff16d5e7e82e77fd80e475c6a5a0be36718af232697ab22314306b8ee32484b3461da657710c06170e80a6a8844f898c2be29366c8430f2392d100ffd419603cbce406dc7315577e6e9ee2":hex:"353e1d08edce44c966430513cb7a0383":hex:"cb1dde4ff5a6867038c170192fc2d292f5bb349d5b9a903cf3d88c09ce78fb1f4a776ff7588a25abb5e5f6a44791d7296afef3f32ed31db1def37dd25be0570a204955121f9c65b79a3ea88fc452dbcb82719243c11bc27e3408adf802b6e8b4e701ee4e9dfd140cb3277bf605bd5fb757d2325f7805fc6f0d1ea5a6207fac5f":hex:"49b5e4ea0421034c074cde67dd39a0310c3f31e8138672ba2ecc0777be542f1c6529836d5206b79dac83d96aab56787a35c584b31228f007f11630328c3f40a57be37487689ee5babb576e7d14ff0f1f1ba6e4be11637352a4336327681058b99df2e44f9772de4e0e456d2e34dec5eeb335b238e862841d166e0612cc0f18f3":int:32:hex:"88aed643":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #1 [#2]
depends_on:0
1:exp:0:hex:"b55ac909e73989e310ae37d13c54bbd5a126f419a3b01a2ad8961d89bd247f81":hex:"8a663e8b21a027c4a9545d145d42d9c67b4fcd5d0e39aa68822aedbd609e2c681f60e6315035321de739858b2b082bc05551fe9b8456c2e89c6151282c6068b915eae5762e4d6d765d667de58a315e061b3d60035ada50f59258eb6e2a1cd6b52eea7eb9d404fd96e71f19feff65b74a4b4f07061adf7c1b0e54e2ece7a2cd49":hex:"9328abab0d3f63c75ddafd8559d96b4f":hex:"cbae20aa1996abb62471aac91cd78080953fbe3b165d4c9435832ef1106e7e3424db8850f44a431c289ab4f2bbbea9e5c0c7aaf2e8de69c0ced176283662cadd280d8fda0c859551f0f90893ca57695c95803a1546826922ac78703d7ccae285b7ccd4bbab551756cccc6869dcf34b6af8d8b80c25c6fb1d2caa7f28161fb854":hex:"457e13ff4eeaaae75d14bbf1bff91706c3168b9b146aed29dbe31b12ad90c1c158833be95701229ac6e4a13997e0a2d961d4a0021c4d8920ec54a9a935e5ea73b17e8fa60559df76bd07d966dfa7d86d1a77a313228b2ae7f66b5b696726c02af2c808bf75e0b9591a220e762f57c680ca68f20b2b5413b07731bbd49de039bf":int:32:hex:"5de0434a":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #2 [#2]
depends_on:0
1:exp:0:hex:"1477e189fb3546efac5cc144f25e132ffd0081be76e912e25cbce7ad63f1c2c4":hex:"7bd3ea956f4b938ebe83ef9a75ddbda16717e924dd4e45202560bf5f0cffbffcdd23be3ae08ff30503d698ed08568ff6b3f6b9fdc9ea79c8e53a838cc8566a8b52ce7c21b2b067e778925a066c970a6c37b8a6cfc53145f24bf698c352078a7f0409b53196e00c619237454c190b970842bb6629c0def7f166d19565127cbce0":hex:"c109f35893aff139db8ed51c85fee237":hex:"8f7f9f71a4b2bb0aaf55fced4eb43c57415526162070919b5f8c08904942181820d5847dfd54d9ba707c5e893a888d5a38d0130f7f52c1f638b0119cf7bc5f2b68f51ff5168802e561dff2cf9c5310011c809eba002b2fa348718e8a5cb732056273cc7d01cce5f5837ab0b09b6c4c5321a7f30a3a3cd21f29da79fce3f3728b":hex:"7841e3d78746f07e5614233df7175931e3c257e09ebd7b78545fae484d835ffe3db3825d3aa1e5cc1541fe6cac90769dc5aaeded0c148b5b4f397990eb34b39ee7881804e5a66ccc8d4afe907948780c4e646cc26479e1da874394cb3537a8f303e0aa13bd3cc36f6cc40438bcd41ef8b6a1cdee425175dcd17ee62611d09b02":int:32:hex:"cb13ce59":int:0
AES-GCM Bad IV (AES-256,128,0,0,32) #0
depends_on:0
0:exp:0:exp:1:hex:"ca264e7caecad56ee31c8bf8dde9592f753a6299e76c60ac1e93cff3b3de8ce9":hex:"":hex:"":hex:"":int:32:exp:2
AES-GCM Selftest
depends_on:0
5
| 107,317 | 681 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.blowfish.datax | BLOWFISH CBC Decrypt empty buffer
depends_on:0:1:2
6:exp:0:int:0:int:0
BLOWFISH Encrypt and decrypt 0 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:0:exp:1
BLOWFISH Encrypt and decrypt 1 byte [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:1:exp:1
BLOWFISH Encrypt and decrypt 2 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:2:exp:1
BLOWFISH Encrypt and decrypt 7 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:7:exp:1
BLOWFISH Encrypt and decrypt 8 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:8:exp:1
BLOWFISH Encrypt and decrypt 9 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:9:exp:1
BLOWFISH Encrypt and decrypt 15 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:15:exp:1
BLOWFISH Encrypt and decrypt 16 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:16:exp:1
BLOWFISH Encrypt and decrypt 17 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:17:exp:1
BLOWFISH Encrypt and decrypt 31 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:31:exp:1
BLOWFISH Encrypt and decrypt 32 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:32:exp:1
BLOWFISH Encrypt and decrypt 32 bytes [#2]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:33:exp:1
BLOWFISH Encrypt and decrypt 47 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:47:exp:1
BLOWFISH Encrypt and decrypt 48 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:48:exp:1
BLOWFISH Encrypt and decrypt 49 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:49:exp:1
BLOWFISH Encrypt and decrypt 0 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:0:exp:2
BLOWFISH Encrypt and decrypt 1 byte with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:1:exp:2
BLOWFISH Encrypt and decrypt 2 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:2:exp:2
BLOWFISH Encrypt and decrypt 7 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:7:exp:2
BLOWFISH Encrypt and decrypt 8 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:8:exp:2
BLOWFISH Encrypt and decrypt 9 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:9:exp:2
BLOWFISH Encrypt and decrypt 15 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:15:exp:2
BLOWFISH Encrypt and decrypt 16 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:16:exp:2
BLOWFISH Encrypt and decrypt 17 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:17:exp:2
BLOWFISH Encrypt and decrypt 31 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:31:exp:2
BLOWFISH Encrypt and decrypt 32 bytes with one and zeros padding [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:32:exp:2
BLOWFISH Encrypt and decrypt 32 bytes with one and zeros padding [#2]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:33:exp:2
BLOWFISH Encrypt and decrypt 47 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:47:exp:2
BLOWFISH Encrypt and decrypt 48 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:48:exp:2
BLOWFISH Encrypt and decrypt 49 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:49:exp:2
BLOWFISH Encrypt and decrypt 0 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:0:exp:3
BLOWFISH Encrypt and decrypt 1 byte with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:1:exp:3
BLOWFISH Encrypt and decrypt 2 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:2:exp:3
BLOWFISH Encrypt and decrypt 7 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:7:exp:3
BLOWFISH Encrypt and decrypt 8 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:8:exp:3
BLOWFISH Encrypt and decrypt 9 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:9:exp:3
BLOWFISH Encrypt and decrypt 15 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:15:exp:3
BLOWFISH Encrypt and decrypt 16 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:16:exp:3
BLOWFISH Encrypt and decrypt 17 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:17:exp:3
BLOWFISH Encrypt and decrypt 31 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:31:exp:3
BLOWFISH Encrypt and decrypt 32 bytes with zeros and len padding [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:32:exp:3
BLOWFISH Encrypt and decrypt 32 bytes with zeros and len padding [#2]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:33:exp:3
BLOWFISH Encrypt and decrypt 47 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:47:exp:3
BLOWFISH Encrypt and decrypt 48 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:48:exp:3
BLOWFISH Encrypt and decrypt 49 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:49:exp:3
BLOWFISH Encrypt and decrypt 0 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:0:exp:4
BLOWFISH Encrypt and decrypt 1 byte with zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:1:exp:4
BLOWFISH Encrypt and decrypt 2 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:2:exp:4
BLOWFISH Encrypt and decrypt 7 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:7:exp:4
BLOWFISH Encrypt and decrypt 8 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:8:exp:4
BLOWFISH Encrypt and decrypt 9 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:9:exp:4
BLOWFISH Encrypt and decrypt 15 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:15:exp:4
BLOWFISH Encrypt and decrypt 16 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:16:exp:4
BLOWFISH Encrypt and decrypt 17 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:17:exp:4
BLOWFISH Encrypt and decrypt 31 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:31:exp:4
BLOWFISH Encrypt and decrypt 32 bytes with zeros padding [#1]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:32:exp:4
BLOWFISH Encrypt and decrypt 32 bytes with zeros padding [#2]
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:33:exp:4
BLOWFISH Encrypt and decrypt 47 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:47:exp:4
BLOWFISH Encrypt and decrypt 48 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:48:exp:4
BLOWFISH Encrypt and decrypt 49 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:49:exp:4
BLOWFISH Encrypt and decrypt 0 bytes with no padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:0:exp:5
BLOWFISH Encrypt and decrypt 8 bytes with no padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:8:exp:5
BLOWFISH Encrypt and decrypt 16 bytes with no padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:16:exp:5
BLOWFISH Encrypt and decrypt 32 bytes with no padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:32:exp:5
BLOWFISH Encrypt and decrypt 48 bytes with no padding
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:128:int:48:exp:5
BLOWFISH Try encrypting 1 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:5:int:128:int:1:exp:6
BLOWFISH Try encrypting 2 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:5:int:128:int:2:exp:6
BLOWFISH Try encrypting 7 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:5:int:128:int:7:exp:6
BLOWFISH Try encrypting 9 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:5:int:128:int:9:exp:6
BLOWFISH Try encrypting 15 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:5:int:128:int:15:exp:6
BLOWFISH Try encrypting 17 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:5:int:128:int:17:exp:6
BLOWFISH Try encrypting 31 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:5:int:128:int:31:exp:6
BLOWFISH Try encrypting 33 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:5:int:128:int:33:exp:6
BLOWFISH Try encrypting 47 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:5:int:128:int:47:exp:6
BLOWFISH Try encrypting 49 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:5:int:128:int:49:exp:6
BLOWFISH Encrypt and decrypt 0 bytes in multiple parts [#1]
depends_on:0:1:2
7:exp:0:int:128:int:0:int:0:exp:1:int:0:int:0:int:0:int:0
BLOWFISH Encrypt and decrypt 1 bytes in multiple parts 1 [#1]
depends_on:0:1:2
7:exp:0:int:128:int:1:int:0:exp:1:int:0:int:0:int:0:int:0
BLOWFISH Encrypt and decrypt 1 bytes in multiple parts 2 [#1]
depends_on:0:1:2
7:exp:0:int:128:int:0:int:1:exp:1:int:0:int:0:int:0:int:0
BLOWFISH Encrypt and decrypt 16 bytes in multiple parts 1 [#1]
depends_on:0:1:2
7:exp:0:int:128:int:16:int:0:exp:1:int:16:int:0:int:8:int:8
BLOWFISH Encrypt and decrypt 16 bytes in multiple parts 2 [#1]
depends_on:0:1:2
7:exp:0:int:128:int:0:int:16:exp:1:int:0:int:16:int:0:int:16
BLOWFISH Encrypt and decrypt 16 bytes in multiple parts 3 [#1]
depends_on:0:1:2
7:exp:0:int:128:int:1:int:15:exp:1:int:0:int:16:int:0:int:16
BLOWFISH Encrypt and decrypt 16 bytes in multiple parts 4 [#1]
depends_on:0:1:2
7:exp:0:int:128:int:15:int:1:exp:1:int:8:int:8:int:8:int:8
BLOWFISH Encrypt and decrypt 22 bytes in multiple parts 1 [#1]
depends_on:0:1:2
7:exp:0:int:128:int:15:int:7:exp:1:int:8:int:8:int:8:int:8
BLOWFISH Encrypt and decrypt 22 bytes in multiple parts 1 [#2]
depends_on:0:1:2
7:exp:0:int:128:int:16:int:6:exp:1:int:16:int:0:int:8:int:8
BLOWFISH Encrypt and decrypt 22 bytes in multiple parts 1 [#3]
depends_on:0:1:2
7:exp:0:int:128:int:17:int:6:exp:1:int:16:int:0:int:16:int:0
BLOWFISH Encrypt and decrypt 32 bytes in multiple parts 1 [#1]
depends_on:0:1:2
7:exp:0:int:128:int:16:int:16:exp:1:int:16:int:16:int:8:int:24
BLOWFISH Encrypt and decrypt 0 bytes [#2]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:0:exp:1
BLOWFISH Encrypt and decrypt 1 byte [#2]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:1:exp:1
BLOWFISH Encrypt and decrypt 2 bytes [#2]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:2:exp:1
BLOWFISH Encrypt and decrypt 7 bytes [#2]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:7:exp:1
BLOWFISH Encrypt and decrypt 8 bytes [#2]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:8:exp:1
BLOWFISH Encrypt and decrypt 9 bytes [#2]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:9:exp:1
BLOWFISH Encrypt and decrypt 15 bytes [#2]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:15:exp:1
BLOWFISH Encrypt and decrypt 16 bytes [#2]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:16:exp:1
BLOWFISH Encrypt and decrypt 17 bytes [#2]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:17:exp:1
BLOWFISH Encrypt and decrypt 31 bytes [#2]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:31:exp:1
BLOWFISH Encrypt and decrypt 32 bytes [#3]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:32:exp:1
BLOWFISH Encrypt and decrypt 32 bytes [#4]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:33:exp:1
BLOWFISH Encrypt and decrypt 47 bytes [#2]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:47:exp:1
BLOWFISH Encrypt and decrypt 48 bytes [#2]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:48:exp:1
BLOWFISH Encrypt and decrypt 49 bytes [#2]
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:128:int:49:exp:1
BLOWFISH Encrypt and decrypt 0 bytes in multiple parts [#2]
depends_on:0:3
7:exp:7:int:128:int:0:int:0:exp:1:int:0:int:0:int:0:int:0
BLOWFISH Encrypt and decrypt 1 bytes in multiple parts 1 [#2]
depends_on:0:3
7:exp:7:int:128:int:1:int:0:exp:1:int:1:int:0:int:1:int:0
BLOWFISH Encrypt and decrypt 1 bytes in multiple parts 2 [#2]
depends_on:0:3
7:exp:7:int:128:int:0:int:1:exp:1:int:0:int:1:int:0:int:1
BLOWFISH Encrypt and decrypt 16 bytes in multiple parts 1 [#2]
depends_on:0:3
7:exp:7:int:128:int:16:int:0:exp:1:int:16:int:0:int:16:int:0
BLOWFISH Encrypt and decrypt 16 bytes in multiple parts 2 [#2]
depends_on:0:3
7:exp:7:int:128:int:0:int:16:exp:1:int:0:int:16:int:0:int:16
BLOWFISH Encrypt and decrypt 16 bytes in multiple parts 3 [#2]
depends_on:0:3
7:exp:7:int:128:int:1:int:15:exp:1:int:1:int:15:int:1:int:15
BLOWFISH Encrypt and decrypt 16 bytes in multiple parts 4 [#2]
depends_on:0:3
7:exp:7:int:128:int:15:int:1:exp:1:int:15:int:1:int:15:int:1
BLOWFISH Encrypt and decrypt 22 bytes in multiple parts 1 [#4]
depends_on:0:3
7:exp:7:int:128:int:15:int:7:exp:1:int:15:int:7:int:15:int:7
BLOWFISH Encrypt and decrypt 22 bytes in multiple parts 1 [#5]
depends_on:0:3
7:exp:7:int:128:int:16:int:6:exp:1:int:16:int:6:int:16:int:6
BLOWFISH Encrypt and decrypt 22 bytes in multiple parts 1 [#6]
depends_on:0:3
7:exp:7:int:128:int:17:int:6:exp:1:int:17:int:6:int:17:int:6
BLOWFISH Encrypt and decrypt 32 bytes in multiple parts 1 [#2]
depends_on:0:3
7:exp:7:int:128:int:16:int:16:exp:1:int:16:int:16:int:16:int:16
BLOWFISH Encrypt and decrypt 0 bytes [#3]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:0:exp:1
BLOWFISH Encrypt and decrypt 1 byte [#3]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:1:exp:1
BLOWFISH Encrypt and decrypt 2 bytes [#3]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:2:exp:1
BLOWFISH Encrypt and decrypt 7 bytes [#3]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:7:exp:1
BLOWFISH Encrypt and decrypt 8 bytes [#3]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:8:exp:1
BLOWFISH Encrypt and decrypt 9 bytes [#3]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:9:exp:1
BLOWFISH Encrypt and decrypt 15 bytes [#3]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:15:exp:1
BLOWFISH Encrypt and decrypt 16 bytes [#3]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:16:exp:1
BLOWFISH Encrypt and decrypt 17 bytes [#3]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:17:exp:1
BLOWFISH Encrypt and decrypt 31 bytes [#3]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:31:exp:1
BLOWFISH Encrypt and decrypt 32 bytes [#5]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:32:exp:1
BLOWFISH Encrypt and decrypt 32 bytes [#6]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:33:exp:1
BLOWFISH Encrypt and decrypt 47 bytes [#3]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:47:exp:1
BLOWFISH Encrypt and decrypt 48 bytes [#3]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:48:exp:1
BLOWFISH Encrypt and decrypt 49 bytes [#3]
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:128:int:49:exp:1
BLOWFISH Encrypt and decrypt 0 bytes in multiple parts [#3]
depends_on:0:4
7:exp:8:int:128:int:0:int:0:exp:1:int:0:int:0:int:0:int:0
BLOWFISH Encrypt and decrypt 1 bytes in multiple parts 1 [#3]
depends_on:0:4
7:exp:8:int:128:int:1:int:0:exp:1:int:1:int:0:int:1:int:0
BLOWFISH Encrypt and decrypt 1 bytes in multiple parts 2 [#3]
depends_on:0:4
7:exp:8:int:128:int:0:int:1:exp:1:int:0:int:1:int:0:int:1
BLOWFISH Encrypt and decrypt 16 bytes in multiple parts 1 [#3]
depends_on:0:4
7:exp:8:int:128:int:16:int:0:exp:1:int:16:int:0:int:16:int:0
BLOWFISH Encrypt and decrypt 16 bytes in multiple parts 2 [#3]
depends_on:0:4
7:exp:8:int:128:int:0:int:16:exp:1:int:0:int:16:int:0:int:16
BLOWFISH Encrypt and decrypt 16 bytes in multiple parts 3 [#3]
depends_on:0:4
7:exp:8:int:128:int:1:int:15:exp:1:int:1:int:15:int:1:int:15
BLOWFISH Encrypt and decrypt 16 bytes in multiple parts 4 [#3]
depends_on:0:4
7:exp:8:int:128:int:15:int:1:exp:1:int:15:int:1:int:15:int:1
BLOWFISH Encrypt and decrypt 22 bytes in multiple parts 1 [#7]
depends_on:0:4
7:exp:8:int:128:int:15:int:7:exp:1:int:15:int:7:int:15:int:7
BLOWFISH Encrypt and decrypt 22 bytes in multiple parts 1 [#8]
depends_on:0:4
7:exp:8:int:128:int:16:int:6:exp:1:int:16:int:6:int:16:int:6
BLOWFISH Encrypt and decrypt 22 bytes in multiple parts 1 [#9]
depends_on:0:4
7:exp:8:int:128:int:17:int:6:exp:1:int:17:int:6:int:17:int:6
BLOWFISH Encrypt and decrypt 32 bytes in multiple parts 1 [#3]
depends_on:0:4
7:exp:8:int:128:int:16:int:16:exp:1:int:16:int:16:int:16:int:16
BLOWFISH CBC Encrypt and decrypt 7 bytes, 192-bits key
depends_on:0:1:2
4:exp:0:char*:"BLOWFISH-CBC":int:192:int:7:exp:1
BLOWFISH CTR Encrypt and decrypt 7 bytes, 192-bits key
depends_on:0:4
4:exp:8:char*:"BLOWFISH-CTR":int:192:int:7:exp:1
BLOWFISH CFB64 Encrypt and decrypt 7 bytes, 192-bits key
depends_on:0:3
4:exp:7:char*:"BLOWFISH-CFB64":int:192:int:7:exp:1
BLOWFISH ECB Encrypt test vector (SSLeay) #1
depends_on:0
10:exp:9:exp:10:hex:"00000000000000000000000000000000":hex:"0000000000000000":hex:"4ef997456198dd78":int:0
BLOWFISH ECB Encrypt test vector (SSLeay) #2
depends_on:0
10:exp:9:exp:10:hex:"ffffffffffffffffffffffffffffffff":hex:"ffffffffffffffff":hex:"51866fd5b85ecb8a":int:0
BLOWFISH ECB Encrypt test vector (SSLeay) #3
depends_on:0
10:exp:9:exp:10:hex:"fedcba9876543210fedcba9876543210":hex:"0123456789abcdef":hex:"0aceab0fc6a0a28d":int:0
BLOWFISH ECB Encrypt test vector (SSLeay) #3, 64-bit key
depends_on:0
10:exp:9:exp:10:hex:"fedcba9876543210":hex:"0123456789abcdef":hex:"0aceab0fc6a0a28d":int:0
BLOWFISH ECB Encrypt test vector (SSLeay) #3, 192-bit key
depends_on:0
10:exp:9:exp:10:hex:"fedcba9876543210fedcba9876543210fedcba9876543210":hex:"0123456789abcdef":hex:"0aceab0fc6a0a28d":int:0
BLOWFISH ECB Decrypt test vector (SSLeay) #1
depends_on:0
10:exp:9:exp:11:hex:"00000000000000000000000000000000":hex:"4ef997456198dd78":hex:"0000000000000000":int:0
BLOWFISH ECB Decrypt test vector (SSLeay) #2
depends_on:0
10:exp:9:exp:11:hex:"ffffffffffffffffffffffffffffffff":hex:"51866fd5b85ecb8a":hex:"ffffffffffffffff":int:0
BLOWFISH ECB Decrypt test vector (SSLeay) #3
depends_on:0
10:exp:9:exp:11:hex:"3849674c2602319e3849674c2602319e":hex:"a25e7856cf2651eb":hex:"51454b582ddf440a":int:0
BLOWFISH ECB Decrypt test vector (SSLeay) #3, 64-bit key
depends_on:0
10:exp:9:exp:11:hex:"3849674c2602319e":hex:"a25e7856cf2651eb":hex:"51454b582ddf440a":int:0
BLOWFISH ECB Decrypt test vector (SSLeay) #3, 192-bit key
depends_on:0
10:exp:9:exp:11:hex:"3849674c2602319e3849674c2602319e3849674c2602319e":hex:"a25e7856cf2651eb":hex:"51454b582ddf440a":int:0
| 19,150 | 609 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.des.datax | DES CBC Decrypt empty buffer
depends_on:0:1:2
6:exp:0:int:0:int:0
DES EDE CBC Decrypt empty buffer
depends_on:0:1:2
6:exp:1:int:0:int:0
DES EDE3 CBC Decrypt empty buffer
depends_on:0:1:2
6:exp:2:int:0:int:0
DES Encrypt and decrypt 0 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:0:exp:3
DES Encrypt and decrypt 1 byte
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:1:exp:3
DES Encrypt and decrypt 2 bytes
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:2:exp:3
DES Encrypt and decrypt 7 bytes
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:7:exp:3
DES Encrypt and decrypt 8 bytes
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:8:exp:3
DES Encrypt and decrypt 9 bytes
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:9:exp:3
DES Encrypt and decrypt 15 bytes
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:15:exp:3
DES Encrypt and decrypt 16 bytes
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:16:exp:3
DES Encrypt and decrypt 17 bytes
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:17:exp:3
DES Encrypt and decrypt 31 bytes
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:31:exp:3
DES Encrypt and decrypt 32 bytes [#1]
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:32:exp:3
DES Encrypt and decrypt 32 bytes [#2]
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:33:exp:3
DES Encrypt and decrypt 47 bytes
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:47:exp:3
DES Encrypt and decrypt 48 bytes
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:48:exp:3
DES Encrypt and decrypt 49 bytes
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:49:exp:3
DES Encrypt and decrypt 0 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:0:exp:4
DES Encrypt and decrypt 1 byte with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:1:exp:4
DES Encrypt and decrypt 2 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:2:exp:4
DES Encrypt and decrypt 7 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:7:exp:4
DES Encrypt and decrypt 8 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:8:exp:4
DES Encrypt and decrypt 9 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:9:exp:4
DES Encrypt and decrypt 15 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:15:exp:4
DES Encrypt and decrypt 16 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:16:exp:4
DES Encrypt and decrypt 17 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:17:exp:4
DES Encrypt and decrypt 31 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:31:exp:4
DES Encrypt and decrypt 32 bytes with one and zeros padding [#1]
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:32:exp:4
DES Encrypt and decrypt 32 bytes with one and zeros padding [#2]
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:33:exp:4
DES Encrypt and decrypt 47 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:47:exp:4
DES Encrypt and decrypt 48 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:48:exp:4
DES Encrypt and decrypt 49 bytes with one and zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:49:exp:4
DES Encrypt and decrypt 0 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:0:exp:5
DES Encrypt and decrypt 1 byte with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:1:exp:5
DES Encrypt and decrypt 2 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:2:exp:5
DES Encrypt and decrypt 7 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:7:exp:5
DES Encrypt and decrypt 8 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:8:exp:5
DES Encrypt and decrypt 9 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:9:exp:5
DES Encrypt and decrypt 15 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:15:exp:5
DES Encrypt and decrypt 16 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:16:exp:5
DES Encrypt and decrypt 17 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:17:exp:5
DES Encrypt and decrypt 31 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:31:exp:5
DES Encrypt and decrypt 32 bytes with zeros and len padding [#1]
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:32:exp:5
DES Encrypt and decrypt 32 bytes with zeros and len padding [#2]
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:33:exp:5
DES Encrypt and decrypt 47 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:47:exp:5
DES Encrypt and decrypt 48 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:48:exp:5
DES Encrypt and decrypt 49 bytes with zeros and len padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:49:exp:5
DES Encrypt and decrypt 0 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:0:exp:6
DES Encrypt and decrypt 1 byte with zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:1:exp:6
DES Encrypt and decrypt 2 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:2:exp:6
DES Encrypt and decrypt 7 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:7:exp:6
DES Encrypt and decrypt 8 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:8:exp:6
DES Encrypt and decrypt 9 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:9:exp:6
DES Encrypt and decrypt 15 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:15:exp:6
DES Encrypt and decrypt 16 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:16:exp:6
DES Encrypt and decrypt 17 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:17:exp:6
DES Encrypt and decrypt 31 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:31:exp:6
DES Encrypt and decrypt 32 bytes with zeros padding [#1]
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:32:exp:6
DES Encrypt and decrypt 32 bytes with zeros padding [#2]
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:33:exp:6
DES Encrypt and decrypt 47 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:47:exp:6
DES Encrypt and decrypt 48 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:48:exp:6
DES Encrypt and decrypt 49 bytes with zeros padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:49:exp:6
DES Encrypt and decrypt 0 bytes with no padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:0:exp:7
DES Encrypt and decrypt 8 bytes with no padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:8:exp:7
DES Encrypt and decrypt 16 bytes with no padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:16:exp:7
DES Encrypt and decrypt 32 bytes with no padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:32:exp:7
DES Encrypt and decrypt 48 bytes with no padding
depends_on:0:1:2
4:exp:0:char*:"DES-CBC":int:64:int:48:exp:7
DES Try encrypting 1 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:64:int:1:exp:8
DES Try encrypting 2 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:64:int:2:exp:8
DES Try encrypting 7 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:64:int:7:exp:8
DES Try encrypting 9 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:64:int:9:exp:8
DES Try encrypting 15 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:64:int:15:exp:8
DES Try encrypting 17 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:64:int:17:exp:8
DES Try encrypting 31 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:64:int:31:exp:8
DES Try encrypting 33 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:64:int:33:exp:8
DES Try encrypting 47 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:64:int:47:exp:8
DES Try encrypting 49 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:64:int:49:exp:8
DES Encrypt and decrypt 0 bytes in multiple parts
depends_on:0:1:2
7:exp:0:int:64:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
DES Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:0:1:2
7:exp:0:int:64:int:1:int:0:exp:3:int:0:int:0:int:0:int:0
DES Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:0:1:2
7:exp:0:int:64:int:0:int:1:exp:3:int:0:int:0:int:0:int:0
DES Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:0:1:2
7:exp:0:int:64:int:16:int:0:exp:3:int:16:int:0:int:8:int:8
DES Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:0:1:2
7:exp:0:int:64:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
DES Encrypt and decrypt 16 bytes in multiple parts 3
depends_on:0:1:2
7:exp:0:int:64:int:1:int:15:exp:3:int:0:int:16:int:0:int:16
DES Encrypt and decrypt 16 bytes in multiple parts 4
depends_on:0:1:2
7:exp:0:int:64:int:15:int:1:exp:3:int:8:int:8:int:8:int:8
DES Encrypt and decrypt 22 bytes in multiple parts 1 [#1]
depends_on:0:1:2
7:exp:0:int:64:int:15:int:7:exp:3:int:8:int:8:int:8:int:8
DES Encrypt and decrypt 22 bytes in multiple parts 1 [#2]
depends_on:0:1:2
7:exp:0:int:64:int:16:int:6:exp:3:int:16:int:0:int:8:int:8
DES Encrypt and decrypt 22 bytes in multiple parts 1 [#3]
depends_on:0:1:2
7:exp:0:int:64:int:17:int:6:exp:3:int:16:int:0:int:16:int:0
DES Encrypt and decrypt 32 bytes in multiple parts 1
depends_on:0:1:2
7:exp:0:int:64:int:16:int:16:exp:3:int:16:int:16:int:8:int:24
DES Encrypt and decrypt 0 bytes [#2]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:0:exp:3
DES3 Encrypt and decrypt 1 byte [#1]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:1:exp:3
DES3 Encrypt and decrypt 2 bytes [#1]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:2:exp:3
DES3 Encrypt and decrypt 7 bytes [#1]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:7:exp:3
DES3 Encrypt and decrypt 8 bytes [#1]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:8:exp:3
DES3 Encrypt and decrypt 9 bytes [#1]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:9:exp:3
DES3 Encrypt and decrypt 15 bytes [#1]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:15:exp:3
DES3 Encrypt and decrypt 16 bytes [#1]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:16:exp:3
DES3 Encrypt and decrypt 17 bytes [#1]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:17:exp:3
DES3 Encrypt and decrypt 31 bytes [#1]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:31:exp:3
DES3 Encrypt and decrypt 32 bytes [#1]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:32:exp:3
DES3 Encrypt and decrypt 32 bytes [#2]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:33:exp:3
DES3 Encrypt and decrypt 47 bytes [#1]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:47:exp:3
DES3 Encrypt and decrypt 48 bytes [#1]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:48:exp:3
DES3 Encrypt and decrypt 49 bytes [#1]
depends_on:0:1:2
4:exp:1:char*:"DES-EDE-CBC":int:128:int:49:exp:3
DES3 Encrypt and decrypt 0 bytes in multiple parts [#1]
depends_on:0:1:2
7:exp:1:int:128:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
DES3 Encrypt and decrypt 1 bytes in multiple parts 1 [#1]
depends_on:0:1:2
7:exp:1:int:128:int:1:int:0:exp:3:int:0:int:0:int:0:int:0
DES3 Encrypt and decrypt 1 bytes in multiple parts 2 [#1]
depends_on:0:1:2
7:exp:1:int:128:int:0:int:1:exp:3:int:0:int:0:int:0:int:0
DES3 Encrypt and decrypt 16 bytes in multiple parts 1 [#1]
depends_on:0:1:2
7:exp:1:int:128:int:16:int:0:exp:3:int:16:int:0:int:8:int:8
DES3 Encrypt and decrypt 16 bytes in multiple parts 2 [#1]
depends_on:0:1:2
7:exp:1:int:128:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
DES3 Encrypt and decrypt 16 bytes in multiple parts 3 [#1]
depends_on:0:1:2
7:exp:1:int:128:int:1:int:15:exp:3:int:0:int:16:int:0:int:16
DES3 Encrypt and decrypt 16 bytes in multiple parts 4 [#1]
depends_on:0:1:2
7:exp:1:int:128:int:15:int:1:exp:3:int:8:int:8:int:8:int:8
DES3 Encrypt and decrypt 22 bytes in multiple parts 1 [#1]
depends_on:0:1:2
7:exp:1:int:128:int:15:int:7:exp:3:int:8:int:8:int:8:int:8
DES3 Encrypt and decrypt 22 bytes in multiple parts 1 [#2]
depends_on:0:1:2
7:exp:1:int:128:int:16:int:6:exp:3:int:16:int:0:int:8:int:8
DES3 Encrypt and decrypt 22 bytes in multiple parts 1 [#3]
depends_on:0:1:2
7:exp:1:int:128:int:17:int:6:exp:3:int:16:int:0:int:16:int:0
DES3 Encrypt and decrypt 32 bytes in multiple parts 1 [#1]
depends_on:0:1:2
7:exp:1:int:128:int:16:int:16:exp:3:int:16:int:16:int:8:int:24
DES3 Encrypt and decrypt 0 bytes
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:0:exp:3
DES3 Encrypt and decrypt 1 byte [#2]
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:1:exp:3
DES3 Encrypt and decrypt 2 bytes [#2]
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:2:exp:3
DES3 Encrypt and decrypt 7 bytes [#2]
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:7:exp:3
DES3 Encrypt and decrypt 8 bytes [#2]
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:8:exp:3
DES3 Encrypt and decrypt 9 bytes [#2]
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:9:exp:3
DES3 Encrypt and decrypt 15 bytes [#2]
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:15:exp:3
DES3 Encrypt and decrypt 16 bytes [#2]
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:16:exp:3
DES3 Encrypt and decrypt 17 bytes [#2]
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:17:exp:3
DES3 Encrypt and decrypt 31 bytes [#2]
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:31:exp:3
DES3 Encrypt and decrypt 32 bytes [#3]
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:32:exp:3
DES3 Encrypt and decrypt 32 bytes [#4]
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:33:exp:3
DES3 Encrypt and decrypt 47 bytes [#2]
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:47:exp:3
DES3 Encrypt and decrypt 48 bytes [#2]
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:48:exp:3
DES3 Encrypt and decrypt 49 bytes [#2]
depends_on:0:1:2
4:exp:2:char*:"DES-EDE3-CBC":int:192:int:49:exp:3
DES3 Encrypt and decrypt 0 bytes in multiple parts [#2]
depends_on:0:1:2
7:exp:2:int:192:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
DES3 Encrypt and decrypt 1 bytes in multiple parts 1 [#2]
depends_on:0:1:2
7:exp:2:int:192:int:1:int:0:exp:3:int:0:int:0:int:0:int:0
DES3 Encrypt and decrypt 1 bytes in multiple parts 2 [#2]
depends_on:0:1:2
7:exp:2:int:192:int:0:int:1:exp:3:int:0:int:0:int:0:int:0
DES3 Encrypt and decrypt 16 bytes in multiple parts 1 [#2]
depends_on:0:1:2
7:exp:2:int:192:int:16:int:0:exp:3:int:16:int:0:int:8:int:8
DES3 Encrypt and decrypt 16 bytes in multiple parts 2 [#2]
depends_on:0:1:2
7:exp:2:int:192:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
DES3 Encrypt and decrypt 16 bytes in multiple parts 3 [#2]
depends_on:0:1:2
7:exp:2:int:192:int:1:int:15:exp:3:int:0:int:16:int:0:int:16
DES3 Encrypt and decrypt 16 bytes in multiple parts 4 [#2]
depends_on:0:1:2
7:exp:2:int:192:int:15:int:1:exp:3:int:8:int:8:int:8:int:8
DES3 Encrypt and decrypt 22 bytes in multiple parts 1 [#4]
depends_on:0:1:2
7:exp:2:int:192:int:15:int:7:exp:3:int:8:int:8:int:8:int:8
DES3 Encrypt and decrypt 22 bytes in multiple parts 1 [#5]
depends_on:0:1:2
7:exp:2:int:192:int:16:int:6:exp:3:int:16:int:0:int:8:int:8
DES3 Encrypt and decrypt 22 bytes in multiple parts 1 [#6]
depends_on:0:1:2
7:exp:2:int:192:int:17:int:6:exp:3:int:16:int:0:int:16:int:0
DES3 Encrypt and decrypt 32 bytes in multiple parts 1 [#2]
depends_on:0:1:2
7:exp:2:int:192:int:16:int:16:exp:3:int:16:int:16:int:8:int:24
DES ECB Encrypt test vector (OpenSSL) #1
depends_on:0
10:exp:9:exp:10:hex:"0000000000000000":hex:"0000000000000000":hex:"8CA64DE9C1B123A7":int:0
DES ECB Encrypt test vector (OpenSSL) #2
depends_on:0
10:exp:9:exp:10:hex:"FFFFFFFFFFFFFFFF":hex:"FFFFFFFFFFFFFFFF":hex:"7359B2163E4EDC58":int:0
DES ECB Encrypt test vector (OpenSSL) #3
depends_on:0
10:exp:9:exp:10:hex:"FEDCBA9876543210":hex:"0123456789ABCDEF":hex:"ED39D950FA74BCC4":int:0
DES ECB Decrypt test vector (OpenSSL) #1
depends_on:0
10:exp:9:exp:11:hex:"0000000000000000":hex:"8CA64DE9C1B123A7":hex:"0000000000000000":int:0
DES ECB Decrypt test vector (OpenSSL) #2
depends_on:0
10:exp:9:exp:11:hex:"FFFFFFFFFFFFFFFF":hex:"7359B2163E4EDC58":hex:"FFFFFFFFFFFFFFFF":int:0
DES ECB Decrypt test vector (OpenSSL) #3
depends_on:0
10:exp:9:exp:11:hex:"43297FAD38E373FE":hex:"EA676B2CB7DB2B7A":hex:"762514B829BF486A":int:0
DES3-EDE ECB Encrypt test vector (OpenSSL) #1
depends_on:0
10:exp:12:exp:10:hex:"0000000000000000FFFFFFFFFFFFFFFF":hex:"0000000000000000":hex:"9295B59BB384736E":int:0
DES3-EDE ECB Encrypt test vector (OpenSSL) #2
depends_on:0
10:exp:12:exp:10:hex:"FFFFFFFFFFFFFFFF3000000000000000":hex:"FFFFFFFFFFFFFFFF":hex:"199E9D6DF39AA816":int:0
DES3-EDE ECB Decrypt test vector (OpenSSL) #1
depends_on:0
10:exp:12:exp:11:hex:"0000000000000000FFFFFFFFFFFFFFFF":hex:"9295B59BB384736E":hex:"0000000000000000":int:0
DES3-EDE ECB Decrypt test vector (OpenSSL) #2
depends_on:0
10:exp:12:exp:11:hex:"FFFFFFFFFFFFFFFF3000000000000000":hex:"199E9D6DF39AA816":hex:"FFFFFFFFFFFFFFFF":int:0
| 17,650 | 605 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.padding.datax | Cipher list
0
Set padding with AES-CBC
depends_on:0:1:2
12:exp:0:exp:1:int:0
Set padding with AES-CFB
depends_on:0:3
12:exp:2:exp:1:exp:3
Set padding with AES-CTR
depends_on:0:4
12:exp:4:exp:1:exp:3
Set padding with CAMELLIA-CBC
depends_on:5:1:2
12:exp:5:exp:1:int:0
Set padding with CAMELLIA-CFB
depends_on:5:3
12:exp:6:exp:1:exp:3
Set padding with CAMELLIA-CTR
depends_on:5:4
12:exp:7:exp:1:exp:3
Set padding with DES-CBC
depends_on:6:1:2
12:exp:8:exp:1:int:0
Set padding with BLOWFISH-CBC
depends_on:7:1:2
12:exp:9:exp:1:int:0
Set padding with BLOWFISH-CFB
depends_on:7:3
12:exp:10:exp:1:exp:3
Set padding with BLOWFISH-CTR
depends_on:7:4
12:exp:11:exp:1:exp:3
Set padding with NULL
depends_on:8
12:exp:12:exp:1:exp:3
Set non-existent padding with AES-CBC
depends_on:0:1
12:exp:0:exp:13:exp:14
Set non-existent padding with CAMELLIA-CBC
depends_on:5:1
12:exp:5:exp:13:exp:14
Set non-existent padding with DES-CBC
depends_on:6:1
12:exp:8:exp:13:exp:14
Set non-existent padding with BLOWFISH-CBC
depends_on:7:1
12:exp:9:exp:13:exp:14
Check PKCS padding #1 (correct)
depends_on:2
13:exp:1:hex:"DABBAD0004040404":int:0:int:4
Check PKCS padding #2 (correct)
depends_on:2
13:exp:1:hex:"DABBAD0001":int:0:int:4
Check PKCS padding #3 (correct)
depends_on:2
13:exp:1:hex:"DABBAD000101":int:0:int:5
Check PKCS padding #4 (correct)
depends_on:2
13:exp:1:hex:"030303":int:0:int:0
Check PKCS padding #5 (null padding)
depends_on:2
13:exp:1:hex:"DABBAD0000":exp:15:int:0
Check PKCS padding #6 (too few padding bytes)
depends_on:2
13:exp:1:hex:"DABBAD0002":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #1)
depends_on:2
13:exp:1:hex:"DABBAD00030203":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #2)
depends_on:2
13:exp:1:hex:"DABBAD00030103":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #3)
depends_on:2
13:exp:1:hex:"DABBAD00030703":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #4)
depends_on:2
13:exp:1:hex:"DABBAD00030b03":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #5)
depends_on:2
13:exp:1:hex:"DABBAD00031303":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #6)
depends_on:2
13:exp:1:hex:"DABBAD00032303":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #7)
depends_on:2
13:exp:1:hex:"DABBAD00034203":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #8)
depends_on:2
13:exp:1:hex:"DABBAD00038303":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #9)
depends_on:2
13:exp:1:hex:"DABBAD00020303":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #10)
depends_on:2
13:exp:1:hex:"DABBAD00010303":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #11)
depends_on:2
13:exp:1:hex:"DABBAD00070303":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #12)
depends_on:2
13:exp:1:hex:"DABBAD000b0303":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #13)
depends_on:2
13:exp:1:hex:"DABBAD00130303":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #14)
depends_on:2
13:exp:1:hex:"DABBAD00230303":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #15)
depends_on:2
13:exp:1:hex:"DABBAD00420303":exp:15:int:0
Check PKCS padding #7 (non-uniform padding bytes #16)
depends_on:2
13:exp:1:hex:"DABBAD00830303":exp:15:int:0
Check PKCS padding #8 (overlong)
depends_on:2
13:exp:1:hex:"040404":exp:15:int:0
Check one and zeros padding #1 (correct)
depends_on:9
13:exp:16:hex:"DABBAD0080":int:0:int:4
Check one and zeros padding #2 (correct)
depends_on:9
13:exp:16:hex:"DABBAD008000":int:0:int:4
Check one and zeros padding #3 (correct)
depends_on:9
13:exp:16:hex:"DABBAD00800000":int:0:int:4
Check one and zeros padding #4 (correct)
depends_on:9
13:exp:16:hex:"DABBAD00808000":int:0:int:5
Check one and zeros padding #5 (correct)
depends_on:9
13:exp:16:hex:"800000":int:0:int:0
Check one and zeros padding #6 (missing one)
depends_on:9
13:exp:16:hex:"DABBAD0000":exp:15:int:4
Check one and zeros padding #7 (overlong)
depends_on:9
13:exp:16:hex:"0000000000":exp:15:int:4
Check one and zeros padding #8 (last byte 0x80 | x)
depends_on:9
13:exp:16:hex:"0000000082":exp:15:int:4
Check zeros and len padding #1 (correct)
depends_on:10
13:exp:17:hex:"DABBAD0001":int:0:int:4
Check zeros and len padding #2 (correct)
depends_on:10
13:exp:17:hex:"DABBAD000002":int:0:int:4
Check zeros and len padding #3 (correct)
depends_on:10
13:exp:17:hex:"DABBAD000003":int:0:int:3
Check zeros and len padding #4 (correct)
depends_on:10
13:exp:17:hex:"000003":int:0:int:0
Check zeros and len padding #5 (overlong)
depends_on:10
13:exp:17:hex:"000004":exp:15:int:0
Check zeros and len padding #6 (not enough zeros)
depends_on:10
13:exp:17:hex:"DABBAD000004":exp:15:int:0
Check zeros padding #1 (correct)
depends_on:11
13:exp:18:hex:"DABBAD00":int:0:int:3
Check zeros padding #2 (correct)
depends_on:11
13:exp:18:hex:"DABBAD0000":int:0:int:3
Check zeros padding #3 (correct)
depends_on:11
13:exp:18:hex:"DABBAD":int:0:int:3
Check zeros padding #4 (correct)
depends_on:11
13:exp:18:hex:"000000":int:0:int:0
Check no padding #1 (correct by definition)
13:exp:19:hex:"DABBAD00":int:0:int:4
Check no padding #2 (correct by definition)
13:exp:19:hex:"DABBAD0001":int:0:int:5
Check no padding #3 (correct by definition)
13:exp:19:hex:"":int:0:int:0
| 5,364 | 237 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_gcm.misc.datax | GCM - Invalid parameters
3
GCM - Valid parameters
4
| 54 | 7 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.aes.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_cipher.aes.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_cipher.function
* Test suite data : suites/test_suite_cipher.aes.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_CIPHER_C)
#include "third_party/mbedtls/cipher.h"
#if defined(MBEDTLS_AES_C)
#include "third_party/mbedtls/aes.h"
#endif
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
#endif
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
#define MBEDTLS_CIPHER_AUTH_CRYPT
#endif
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
/* Helper for resetting key/direction
*
* The documentation doesn't explicitly say whether calling
* mbedtls_cipher_setkey() twice is allowed or not. This currently works with
* the default software implementation, but only by accident. It isn't
* guaranteed to work with new ciphers or with alternative implementations of
* individual ciphers, and it doesn't work with the PSA wrappers. So don't do
* it, and instead start with a fresh context.
*/
static int cipher_reset_key( mbedtls_cipher_context_t *ctx, int cipher_id,
int use_psa, size_t tag_len, const data_t *key, int direction )
{
mbedtls_cipher_free( ctx );
mbedtls_cipher_init( ctx );
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
(void) tag_len;
#else
if( use_psa == 1 )
{
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( ctx,
mbedtls_cipher_info_from_type( cipher_id ),
tag_len ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
TEST_ASSERT( 0 == mbedtls_cipher_setup( ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
}
TEST_ASSERT( 0 == mbedtls_cipher_setkey( ctx, key->x, 8 * key->len,
direction ) );
return( 1 );
exit:
return( 0 );
}
/*
* Check if a buffer is all-0 bytes:
* return 1 if it is,
* 0 if it isn't.
*/
int buffer_is_all_zero( const uint8_t *buf, size_t size )
{
for( size_t i = 0; i < size; i++ )
if( buf[i] != 0 )
return 0;
return 1;
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_mbedtls_cipher_list( )
{
const int *cipher_type;
for( cipher_type = mbedtls_cipher_list(); *cipher_type != 0; cipher_type++ )
TEST_ASSERT( mbedtls_cipher_info_from_type( *cipher_type ) != NULL );
exit:
;
}
void test_mbedtls_cipher_list_wrapper( void ** params )
{
(void)params;
test_mbedtls_cipher_list( );
}
void test_cipher_invalid_param_unconditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_cipher_context_t invalid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
mbedtls_cipher_init( &valid_ctx );
mbedtls_cipher_setup( &valid_ctx, valid_info );
mbedtls_cipher_init( &invalid_ctx );
/* mbedtls_cipher_setup() */
TEST_ASSERT( mbedtls_cipher_setup( &valid_ctx, NULL ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_get_block_size() */
TEST_ASSERT( mbedtls_cipher_get_block_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_cipher_mode() */
TEST_ASSERT( mbedtls_cipher_get_cipher_mode( &invalid_ctx ) ==
MBEDTLS_MODE_NONE );
/* mbedtls_cipher_get_iv_size() */
TEST_ASSERT( mbedtls_cipher_get_iv_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_type() */
TEST_ASSERT(
mbedtls_cipher_get_type( &invalid_ctx ) ==
MBEDTLS_CIPHER_NONE);
/* mbedtls_cipher_get_name() */
TEST_ASSERT( mbedtls_cipher_get_name( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_key_bitlen() */
TEST_ASSERT( mbedtls_cipher_get_key_bitlen( &invalid_ctx ) ==
MBEDTLS_KEY_LENGTH_NONE );
/* mbedtls_cipher_get_operation() */
TEST_ASSERT( mbedtls_cipher_get_operation( &invalid_ctx ) ==
MBEDTLS_OPERATION_NONE );
/* mbedtls_cipher_setkey() */
TEST_ASSERT(
mbedtls_cipher_setkey( &invalid_ctx,
valid_buffer,
valid_bitlen,
valid_operation ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_set_iv() */
TEST_ASSERT(
mbedtls_cipher_set_iv( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_reset() */
TEST_ASSERT( mbedtls_cipher_reset( &invalid_ctx ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_ASSERT(
mbedtls_cipher_update_ad( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_ASSERT( mbedtls_cipher_set_padding_mode( &invalid_ctx, valid_mode ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif
/* mbedtls_cipher_update() */
TEST_ASSERT(
mbedtls_cipher_update( &invalid_ctx,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_finish() */
TEST_ASSERT(
mbedtls_cipher_finish( &invalid_ctx,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_ASSERT(
mbedtls_cipher_write_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_check_tag() */
TEST_ASSERT(
mbedtls_cipher_check_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
exit:
mbedtls_cipher_free( &invalid_ctx );
mbedtls_cipher_free( &valid_ctx );
}
void test_cipher_invalid_param_unconditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_unconditional( );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_cipher_invalid_param_conditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_operation_t invalid_operation = 100;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
/* mbedtls_cipher_init() */
TEST_VALID_PARAM( mbedtls_cipher_init( &valid_ctx ) );
TEST_INVALID_PARAM( mbedtls_cipher_init( NULL ) );
/* mbedtls_cipher_setup() */
TEST_VALID_PARAM( mbedtls_cipher_setup( &valid_ctx, valid_info ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setup( NULL, valid_info ) );
/* mbedtls_cipher_get_block_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_block_size( NULL ) );
/* mbedtls_cipher_get_cipher_mode() */
TEST_INVALID_PARAM_RET(
MBEDTLS_MODE_NONE,
mbedtls_cipher_get_cipher_mode( NULL ) );
/* mbedtls_cipher_get_iv_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_iv_size( NULL ) );
/* mbedtls_cipher_get_type() */
TEST_INVALID_PARAM_RET(
MBEDTLS_CIPHER_NONE,
mbedtls_cipher_get_type( NULL ) );
/* mbedtls_cipher_get_name() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_name( NULL ) );
/* mbedtls_cipher_get_key_bitlen() */
TEST_INVALID_PARAM_RET(
MBEDTLS_KEY_LENGTH_NONE,
mbedtls_cipher_get_key_bitlen( NULL ) );
/* mbedtls_cipher_get_operation() */
TEST_INVALID_PARAM_RET(
MBEDTLS_OPERATION_NONE,
mbedtls_cipher_get_operation( NULL ) );
/* mbedtls_cipher_setkey() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( NULL,
valid_buffer,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
NULL,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
valid_buffer,
valid_bitlen,
invalid_operation ) );
/* mbedtls_cipher_set_iv() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_reset() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_reset( NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_padding_mode( NULL, valid_mode ) );
#endif
/* mbedtls_cipher_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( NULL,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
NULL, valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
valid_buffer,
NULL ) );
/* mbedtls_cipher_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( NULL,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
valid_buffer,
NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_check_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
/* mbedtls_cipher_crypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_AEAD)
/* mbedtls_cipher_auth_encrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
/* mbedtls_cipher_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
#endif /* defined(MBEDTLS_CIPHER_MODE_AEAD) */
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
/* mbedtls_cipher_auth_encrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
/* mbedtls_cipher_auth_decrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
#endif /* MBEDTLS_CIPHER_MODE_AEAD || MBEDTLS_NIST_KW_C */
/* mbedtls_cipher_free() */
TEST_VALID_PARAM( mbedtls_cipher_free( NULL ) );
exit:
TEST_VALID_PARAM( mbedtls_cipher_free( &valid_ctx ) );
}
void test_cipher_invalid_param_conditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_conditional( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
#if defined(MBEDTLS_AES_C)
void test_cipher_special_behaviours( )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char input[32];
unsigned char output[32];
#if defined (MBEDTLS_CIPHER_MODE_CBC)
unsigned char iv[32];
#endif
size_t olen = 0;
mbedtls_cipher_init( &ctx );
memset( input, 0, sizeof( input ) );
memset( output, 0, sizeof( output ) );
#if defined(MBEDTLS_CIPHER_MODE_CBC)
memset( iv, 0, sizeof( iv ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_CBC );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* IV too big */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, MBEDTLS_MAX_IV_LENGTH + 1 )
== MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
/* IV too small */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, 0 )
== MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_cipher_free( &ctx );
mbedtls_cipher_init( &ctx );
#endif /* MBEDTLS_CIPHER_MODE_CBC */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_ECB );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* Update ECB with partial block */
TEST_ASSERT( mbedtls_cipher_update( &ctx, input, 1, output, &olen )
== MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED );
exit:
mbedtls_cipher_free( &ctx );
}
void test_cipher_special_behaviours_wrapper( void ** params )
{
(void)params;
test_cipher_special_behaviours( );
}
#endif /* MBEDTLS_AES_C */
void test_enc_dec_buf( int cipher_id, char * cipher_string, int key_len,
int length_val, int pad_mode )
{
size_t length = length_val, outlen, total_len, i, block_size;
unsigned char key[64];
unsigned char iv[16];
unsigned char ad[13];
unsigned char tag[16];
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
/*
* Prepare contexts
*/
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( key, 0x2a, sizeof( key ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_EQUAL( cipher_info, mbedtls_cipher_info_from_string( cipher_string ) );
/* Initialise enc and dec contexts */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
/*
* Do a few encode/decode cycles
*/
for( i = 0; i < 3; i++ )
{
memset( iv , 0x00 + i, sizeof( iv ) );
memset( ad, 0x10 + i, sizeof( ad ) );
memset( inbuf, 0x20 + i, sizeof( inbuf ) );
memset( encbuf, 0, sizeof( encbuf ) );
memset( decbuf, 0, sizeof( decbuf ) );
memset( tag, 0, sizeof( tag ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, ad, sizeof( ad ) - i ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, ad, sizeof( ad ) - i ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, length, encbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_write_tag( &ctx_enc, tag, sizeof( tag ) ) );
#endif
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len > length &&
total_len <= length + block_size ) );
/* decode the previously encoded string */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, total_len, decbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_check_tag( &ctx_dec, tag, sizeof( tag ) ) );
#endif
/* check result */
TEST_ASSERT( total_len == length );
TEST_ASSERT( 0 == memcmp(inbuf, decbuf, length) );
}
/*
* Done
*/
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_wrapper( void ** params )
{
test_enc_dec_buf( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_enc_fail( int cipher_id, int pad_mode, int key_len, int length_val,
int ret )
{
size_t length = length_val;
unsigned char key[32];
unsigned char iv[16];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char inbuf[64];
unsigned char encbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
/* Initialise context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, NULL, 0 ) );
#endif
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, inbuf, length, encbuf, &outlen ) );
TEST_ASSERT( ret == mbedtls_cipher_finish( &ctx, encbuf + outlen, &outlen ) );
/* done */
exit:
mbedtls_cipher_free( &ctx );
}
void test_enc_fail_wrapper( void ** params )
{
test_enc_fail( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_dec_empty_buf( int cipher,
int expected_update_ret,
int expected_finish_ret )
{
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
const mbedtls_cipher_info_t *cipher_info;
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise context */
cipher_info = mbedtls_cipher_info_from_type( cipher );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( sizeof(key) * 8 >= cipher_info->key_bitlen );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec,
key, cipher_info->key_bitlen,
MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
#endif
/* decode 0-byte string */
TEST_ASSERT( expected_update_ret ==
mbedtls_cipher_update( &ctx_dec, encbuf, 0, decbuf, &outlen ) );
TEST_ASSERT( 0 == outlen );
if ( expected_finish_ret == 0 &&
( cipher_info->mode == MBEDTLS_MODE_CBC ||
cipher_info->mode == MBEDTLS_MODE_ECB ) )
{
/* Non-CBC and non-ECB ciphers are OK with decrypting empty buffers and
* return success, not MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED, when
* decrypting an empty buffer.
* On the other hand, CBC and ECB ciphers need a full block of input.
*/
expected_finish_ret = MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED;
}
TEST_ASSERT( expected_finish_ret == mbedtls_cipher_finish(
&ctx_dec, decbuf + outlen, &outlen ) );
TEST_ASSERT( 0 == outlen );
exit:
mbedtls_cipher_free( &ctx_dec );
}
void test_dec_empty_buf_wrapper( void ** params )
{
test_dec_empty_buf( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
void test_enc_dec_buf_multipart( int cipher_id, int key_len, int first_length_val,
int second_length_val, int pad_mode,
int first_encrypt_output_len, int second_encrypt_output_len,
int first_decrypt_output_len, int second_decrypt_output_len )
{
size_t first_length = first_length_val;
size_t second_length = second_length_val;
size_t length = first_length + second_length;
size_t block_size;
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
const mbedtls_cipher_info_t *cipher_info;
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
size_t totaloutlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise enc and dec contexts */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, NULL, 0 ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, first_length, encbuf, &outlen ) );
TEST_ASSERT( (size_t)first_encrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf + first_length, second_length, encbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_encrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen > length &&
totaloutlen <= length + block_size ) );
/* decode the previously encoded string */
second_length = totaloutlen - first_length;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, first_length, decbuf, &outlen ) );
TEST_ASSERT( (size_t)first_decrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf + first_length, second_length, decbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_decrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length );
TEST_ASSERT( 0 == memcmp(inbuf, decbuf, length) );
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_multipart_wrapper( void ** params )
{
test_enc_dec_buf_multipart( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ), *( (int *) params[6] ), *( (int *) params[7] ), *( (int *) params[8] ) );
}
void test_decrypt_test_vec( int cipher_id, int pad_mode, data_t * key,
data_t * iv, data_t * cipher,
data_t * clear, data_t * ad, data_t * tag,
int finish_result, int tag_result )
{
unsigned char output[265];
mbedtls_cipher_context_t ctx;
size_t outlen, total_len;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
#if !defined(MBEDTLS_GCM_C) && !defined(MBEDTLS_CHACHAPOLY_C)
((void) ad);
((void) tag);
#endif
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, MBEDTLS_DECRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( pad_mode != -1 )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv->x, iv->len ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, ad->x, ad->len ) );
#endif
/* decode buffer and check tag->x */
total_len = 0;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, cipher->x, cipher->len, output, &outlen ) );
total_len += outlen;
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( tag_result == mbedtls_cipher_check_tag( &ctx, tag->x, tag->len ) );
#endif
/* check plaintext only if everything went fine */
if( 0 == finish_result && 0 == tag_result )
{
TEST_ASSERT( total_len == clear->len );
TEST_ASSERT( 0 == memcmp( output, clear->x, clear->len ) );
}
exit:
mbedtls_cipher_free( &ctx );
}
void test_decrypt_test_vec_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_decrypt_test_vec( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, &data10, &data12, *( (int *) params[14] ), *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
void test_auth_crypt_tv( int cipher_id, data_t * key, data_t * iv,
data_t * ad, data_t * cipher, data_t * tag,
char * result, data_t * clear, int use_psa )
{
/*
* Take an AEAD ciphertext + tag and perform a pair
* of AEAD decryption and AEAD encryption. Check that
* this results in the expected plaintext, and that
* decryption and encryption are inverse to one another.
*
* Do that twice:
* - once with legacy functions auth_decrypt/auth_encrypt
* - once with new functions auth_decrypt_ext/auth_encrypt_ext
* This allows testing both without duplicating test cases.
*/
int ret;
int using_nist_kw, using_nist_kw_padding;
mbedtls_cipher_context_t ctx;
size_t outlen;
unsigned char *cipher_plus_tag = NULL;
size_t cipher_plus_tag_len;
unsigned char *decrypt_buf = NULL;
size_t decrypt_buf_len = 0;
unsigned char *encrypt_buf = NULL;
size_t encrypt_buf_len = 0;
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
unsigned char *tmp_tag = NULL;
unsigned char *tmp_cipher = NULL;
unsigned char *tag_buf = NULL;
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
/* Null pointers are documented as valid for inputs of length 0.
* The test framework passes non-null pointers, so set them to NULL.
* key, cipher and tag can't be empty. */
if( iv->len == 0 )
iv->x = NULL;
if( ad->len == 0 )
ad->x = NULL;
if( clear->len == 0 )
clear->x = NULL;
mbedtls_cipher_init( &ctx );
/* Initialize PSA Crypto */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_ASSERT( psa_crypto_init( ) );
#else
(void) use_psa;
#endif
/*
* Are we using NIST_KW? with padding?
*/
using_nist_kw_padding = cipher_id == MBEDTLS_CIPHER_AES_128_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_192_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_256_KWP;
using_nist_kw = cipher_id == MBEDTLS_CIPHER_AES_128_KW ||
cipher_id == MBEDTLS_CIPHER_AES_192_KW ||
cipher_id == MBEDTLS_CIPHER_AES_256_KW ||
using_nist_kw_padding;
/****************************************************************
* *
* Part 1: non-deprecated API *
* *
****************************************************************/
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* prepare buffer for decryption
* (we need the tag appended to the ciphertext)
*/
cipher_plus_tag_len = cipher->len + tag->len;
ASSERT_ALLOC( cipher_plus_tag, cipher_plus_tag_len );
memcpy( cipher_plus_tag, cipher->x, cipher->len );
memcpy( cipher_plus_tag + cipher->len, tag->x, tag->len );
/*
* Compute length of output buffer according to the documentation
*/
if( using_nist_kw )
decrypt_buf_len = cipher_plus_tag_len - 8;
else
decrypt_buf_len = cipher_plus_tag_len - tag->len;
/*
* Try decrypting to a buffer that's 1B too small
*/
if( decrypt_buf_len != 0 )
{
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len, &outlen, tag->len );
if( strcmp( result, "FAIL" ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, decrypt_buf_len ) );
}
else
{
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
/* Free this, but keep cipher_plus_tag for deprecated function with PSA */
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/*
* Compute size of output buffer according to documentation
*/
if( using_nist_kw )
{
encrypt_buf_len = clear->len + 8;
if( using_nist_kw_padding && encrypt_buf_len % 8 != 0 )
encrypt_buf_len += 8 - encrypt_buf_len % 8;
}
else
{
encrypt_buf_len = clear->len + tag->len;
}
/*
* Try encrypting with an output buffer that's 1B too small
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret != 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
/*
* Encrypt and check the result
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len, &outlen, tag->len );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len + tag->len );
TEST_ASSERT( memcmp( encrypt_buf, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( memcmp( encrypt_buf + cipher->len,
tag->x, tag->len ) == 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
}
/****************************************************************
* *
* Part 2: deprecated API *
* *
****************************************************************/
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* Prepare pointers for decryption
*/
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
{
/* PSA requires that the tag immediately follows the ciphertext.
* Fortunately, we already have that from testing the new API. */
tmp_cipher = cipher_plus_tag;
tmp_tag = tmp_cipher + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
tmp_cipher = cipher->x;
tmp_tag = tag->x;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, cipher->len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
tmp_cipher, cipher->len, decrypt_buf, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
/* NIST_KW with legacy API */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else if( strcmp( result, "FAIL" ) == 0 )
{
/* unauthentic message */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, cipher->len ) );
}
else
{
/* authentic message: is the plaintext correct? */
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
mbedtls_free( cipher_plus_tag );
cipher_plus_tag = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/* prepare buffers for encryption */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa )
{
ASSERT_ALLOC( cipher_plus_tag, cipher->len + tag->len );
tmp_cipher = cipher_plus_tag;
tmp_tag = cipher_plus_tag + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
ASSERT_ALLOC( encrypt_buf, cipher->len );
ASSERT_ALLOC( tag_buf, tag->len );
tmp_cipher = encrypt_buf;
tmp_tag = tag_buf;
}
/*
* Encrypt and check the result
*/
outlen = 0;
ret = mbedtls_cipher_auth_encrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
clear->x, clear->len, tmp_cipher, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len );
if( cipher->len != 0 )
TEST_ASSERT( memcmp( tmp_cipher, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( memcmp( tmp_tag, tag->x, tag->len ) == 0 );
}
}
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
exit:
mbedtls_cipher_free( &ctx );
mbedtls_free( decrypt_buf );
mbedtls_free( encrypt_buf );
mbedtls_free( cipher_plus_tag );
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
mbedtls_free( tag_buf );
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_auth_crypt_tv_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_auth_crypt_tv( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, (char *) params[11], &data12, *( (int *) params[14] ) );
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_test_vec_ecb( int cipher_id, int operation, data_t * key,
data_t * input, data_t * result, int finish_result
)
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, input->x,
mbedtls_cipher_get_block_size( &ctx ),
output, &outlen ) );
TEST_ASSERT( outlen == mbedtls_cipher_get_block_size( &ctx ) );
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
TEST_ASSERT( 0 == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == memcmp( output, result->x,
mbedtls_cipher_get_block_size( &ctx ) ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_test_vec_ecb_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_test_vec_ecb( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, *( (int *) params[8] ) );
}
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_test_vec_crypt( int cipher_id, int operation, data_t *key,
data_t *iv, data_t *input, data_t *result,
int finish_result, int use_psa )
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
#else
if( use_psa == 1 )
{
PSA_ASSERT( psa_crypto_init( ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( &ctx,
mbedtls_cipher_info_from_type( cipher_id ), 0 ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
if( MBEDTLS_MODE_CBC == ctx.cipher_info->mode )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, MBEDTLS_PADDING_NONE ) );
TEST_ASSERT( finish_result == mbedtls_cipher_crypt( &ctx, iv->len ? iv->x : NULL,
iv->len, input->x, input->len,
output, &outlen ) );
TEST_ASSERT( result->len == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == memcmp( output, result->x, outlen ) );
exit:
mbedtls_cipher_free( &ctx );
#if defined(MBEDTLS_USE_PSA_CRYPTO)
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_test_vec_crypt_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_test_vec_crypt( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_set_padding( int cipher_id, int pad_mode, int ret )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
mbedtls_cipher_init( &ctx );
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( ret == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_set_padding_wrapper( void ** params )
{
test_set_padding( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_check_padding( int pad_mode, data_t * input, int ret, int dlen_check
)
{
mbedtls_cipher_info_t cipher_info;
mbedtls_cipher_context_t ctx;
size_t dlen;
/* build a fake context just for getting access to get_padding */
mbedtls_cipher_init( &ctx );
cipher_info.mode = MBEDTLS_MODE_CBC;
ctx.cipher_info = &cipher_info;
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
TEST_ASSERT( ret == ctx.get_padding( input->x, input->len, &dlen ) );
if( 0 == ret )
TEST_ASSERT( dlen == (size_t) dlen_check );
exit:
;
}
void test_check_padding_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_check_padding( *( (int *) params[0] ), &data1, *( (int *) params[3] ), *( (int *) params[4] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#endif /* MBEDTLS_CIPHER_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
*out_value = MBEDTLS_CIPHER_AES_128_CBC;
}
break;
case 1:
{
*out_value = MBEDTLS_CIPHER_AES_128_XTS;
}
break;
case 2:
{
*out_value = MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH;
}
break;
case 3:
{
*out_value = -1;
}
break;
case 4:
{
*out_value = MBEDTLS_PADDING_ONE_AND_ZEROS;
}
break;
case 5:
{
*out_value = MBEDTLS_PADDING_ZEROS_AND_LEN;
}
break;
case 6:
{
*out_value = MBEDTLS_PADDING_ZEROS;
}
break;
case 7:
{
*out_value = MBEDTLS_PADDING_NONE;
}
break;
case 8:
{
*out_value = MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED;
}
break;
case 9:
{
*out_value = MBEDTLS_PADDING_PKCS7;
}
break;
case 10:
{
*out_value = MBEDTLS_CIPHER_AES_128_CFB128;
}
break;
case 11:
{
*out_value = MBEDTLS_CIPHER_AES_128_OFB;
}
break;
case 12:
{
*out_value = MBEDTLS_CIPHER_AES_192_OFB;
}
break;
case 13:
{
*out_value = MBEDTLS_CIPHER_AES_256_OFB;
}
break;
case 14:
{
*out_value = MBEDTLS_CIPHER_AES_256_XTS;
}
break;
case 15:
{
*out_value = MBEDTLS_CIPHER_AES_128_CTR;
}
break;
case 16:
{
*out_value = MBEDTLS_CIPHER_AES_192_CBC;
}
break;
case 17:
{
*out_value = MBEDTLS_CIPHER_AES_256_CBC;
}
break;
case 18:
{
*out_value = MBEDTLS_ERR_CIPHER_INVALID_PADDING;
}
break;
case 19:
{
*out_value = MBEDTLS_CIPHER_AES_192_CFB128;
}
break;
case 20:
{
*out_value = MBEDTLS_CIPHER_AES_256_CFB128;
}
break;
case 21:
{
*out_value = MBEDTLS_CIPHER_AES_128_ECB;
}
break;
case 22:
{
*out_value = MBEDTLS_ENCRYPT;
}
break;
case 23:
{
*out_value = MBEDTLS_DECRYPT;
}
break;
case 24:
{
*out_value = MBEDTLS_CIPHER_AES_192_ECB;
}
break;
case 25:
{
*out_value = MBEDTLS_CIPHER_AES_256_ECB;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
#if defined(MBEDTLS_AES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_CIPHER_MODE_CBC)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if defined(MBEDTLS_CIPHER_MODE_XTS)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 4:
{
#if defined(MBEDTLS_CIPHER_PADDING_ONE_AND_ZEROS)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 5:
{
#if defined(MBEDTLS_CIPHER_PADDING_ZEROS_AND_LEN)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 6:
{
#if defined(MBEDTLS_CIPHER_PADDING_ZEROS)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 7:
{
#if defined(MBEDTLS_CIPHER_MODE_CFB)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 8:
{
#if defined(MBEDTLS_CIPHER_MODE_OFB)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 9:
{
#if defined(MBEDTLS_CIPHER_MODE_CTR)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 10:
{
#if defined(MBEDTLS_USE_PSA_CRYPTO)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_CIPHER_C)
test_mbedtls_cipher_list_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_CIPHER_C)
test_cipher_invalid_param_unconditional_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_cipher_invalid_param_conditional_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_AES_C)
test_cipher_special_behaviours_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_fail_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_CIPHER_C)
test_dec_empty_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_multipart_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_CIPHER_C)
test_decrypt_test_vec_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_AUTH_CRYPT)
test_auth_crypt_tv_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_CIPHER_C)
test_test_vec_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_test_vec_crypt_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_set_padding_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_check_padding_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_cipher.aes.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 76,590 | 2,239 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_mpi.datax | MPI - Valid parameters
0
MPI - Invalid parameters
1
Arguments with no value
2
Base test mpi_read_write_string #1
3:int:10:char*:"128":int:10:char*:"128":int:100:int:0:int:0
Base test mpi_read_write_string #2
3:int:10:char*:"128":int:16:char*:"80":int:100:int:0:int:0
Base test mpi_read_write_string #3 (Read zero)
3:int:10:char*:"0":int:10:char*:"0":int:100:int:0:int:0
Base test mpi_read_write_string #3 (Negative decimal) [#1]
3:int:10:char*:"-23":int:10:char*:"-23":int:100:int:0:int:0
Base test mpi_read_write_string #3 (Negative hex)
3:int:16:char*:"-20":int:10:char*:"-32":int:100:int:0:int:0
Base test mpi_read_write_string #3 (Negative decimal) [#2]
3:int:16:char*:"-23":int:16:char*:"-23":int:100:int:0:int:0
Base test mpi_read_write_string #4 (Buffer just fits)
3:int:16:char*:"-4":int:4:char*:"-10":int:4:int:0:int:0
Test mpi_read_write_string #1 (Invalid character)
3:int:10:char*:"a28":int:0:char*:"":int:100:exp:0:int:0
Test mpi_read_write_string #2 (Illegal input radix)
3:int:19:char*:"a28":int:0:char*:"":int:100:exp:1:int:0
Test mpi_read_write_string #3 (Buffer just fits)
3:int:16:char*:"-23":int:16:char*:"-23":int:4:int:0:int:0
Test mpi_read_write_string #4 (Buffer too small)
3:int:16:char*:"-23":int:16:char*:"-23":int:3:int:0:exp:2
Test mpi_read_write_string #5 (Illegal output radix)
3:int:16:char*:"-23":int:17:char*:"-23":int:4:int:0:exp:1
Test mpi_read_write_string #6 (Output radix of 15)
3:int:10:char*:"29":int:15:char*:"1e":int:100:int:0:int:0
Test mpi_read_write_string #7
3:int:10:char*:"56125680981752282334141896320372489490613963693556392520816017892111350604111697682705498319512049040516698827829292076808006940873974979584527073481012636016353913462376755556720019831187364993587901952757307830896531678727717924":int:16:char*:"0941379d00fed1491fe15df284dfde4a142f68aa8d412023195cee66883e6290ffe703f4ea5963bf212713cee46b107c09182b5edcd955adac418bf4918e2889af48e1099d513830cec85c26ac1e158b52620e33ba8692f893efbb2f958b4424":int:200:int:0:int:0
Test mpi_read_write_string #8 (Empty MPI -> hex)
3:int:16:char*:"":int:16:char*:"00":int:4:int:0:int:0
Test mpi_read_write_string #9 (Empty MPI -> dec)
3:int:16:char*:"":int:10:char*:"0":int:4:int:0:int:0
Test mpi_write_string #10 (Negative hex with odd number of digits)
3:int:16:char*:"-1":int:16:char*:"":int:3:int:0:exp:2
Base test mbedtls_mpi_read_binary #1
4:hex:"0941379d00fed1491fe15df284dfde4a142f68aa8d412023195cee66883e6290ffe703f4ea5963bf212713cee46b107c09182b5edcd955adac418bf4918e2889af48e1099d513830cec85c26ac1e158b52620e33ba8692f893efbb2f958b4424":int:10:char*:"56125680981752282334141896320372489490613963693556392520816017892111350604111697682705498319512049040516698827829292076808006940873974979584527073481012636016353913462376755556720019831187364993587901952757307830896531678727717924"
Base test mbedtls_mpi_read_binary_le #1
5:hex:"0941379d00fed1491fe15df284dfde4a142f68aa8d412023195cee66883e6290ffe703f4ea5963bf212713cee46b107c09182b5edcd955adac418bf4918e2889af48e1099d513830cec85c26ac1e158b52620e33ba8692f893efbb2f958b4424":int:10:char*:"219946662473865722255717126709915431768051735954189829340600976826409773245337023925691629251672268961177825243440202069039100741562168093042339401187848509859789949044607421190014088260008793380554914226244485299326152319899746569"
Base test mbedtls_mpi_write_binary #1
6:int:10:char*:"56125680981752282334141896320372489490613963693556392520816017892111350604111697682705498319512049040516698827829292076808006940873974979584527073481012636016353913462376755556720019831187364993587901952757307830896531678727717924":hex:"0941379d00fed1491fe15df284dfde4a142f68aa8d412023195cee66883e6290ffe703f4ea5963bf212713cee46b107c09182b5edcd955adac418bf4918e2889af48e1099d513830cec85c26ac1e158b52620e33ba8692f893efbb2f958b4424":int:200:int:0
Test mbedtls_mpi_write_binary #1 (Buffer just fits)
6:int:16:char*:"123123123123123123123123123":hex:"0123123123123123123123123123":int:14:int:0
Test mbedtls_mpi_write_binary #2 (Buffer too small)
6:int:16:char*:"123123123123123123123123123":hex:"23123123123123123123123123":int:13:exp:2
Base test mbedtls_mpi_write_binary_le #1
7:int:10:char*:"56125680981752282334141896320372489490613963693556392520816017892111350604111697682705498319512049040516698827829292076808006940873974979584527073481012636016353913462376755556720019831187364993587901952757307830896531678727717924":hex:"24448b952fbbef93f89286ba330e62528b151eac265cc8ce3038519d09e148af89288e91f48b41acad55d9dc5e2b18097c106be4ce132721bf6359eaf403e7ff90623e8866ee5c192320418daa682f144adedf84f25de11f49d1fe009d374109":int:200:int:0
Test mbedtls_mpi_write_binary_le #1 (Buffer just fits)
7:int:16:char*:"123123123123123123123123123":hex:"2331122331122331122331122301":int:14:int:0
Test mbedtls_mpi_write_binary_le #2 (Buffer too small)
7:int:16:char*:"123123123123123123123123123":hex:"23311223311223311223311223":int:13:exp:2
Base test mbedtls_mpi_read_file #1
8:int:10:char*:"/zip/third_party/mbedtls/test/data/mpi_10":hex:"01f55332c3a48b910f9942f6c914e58bef37a47ee45cb164a5b6b8d1006bf59a059c21449939ebebfdf517d2e1dbac88010d7b1f141e997bd6801ddaec9d05910f4f2de2b2c4d714e2c14a72fc7f17aa428d59c531627f09":int:0
Test mbedtls_mpi_read_file #1 (Empty file)
8:int:10:char*:"/zip/third_party/mbedtls/test/data/hash_file_4":hex:"":exp:3
Test mbedtls_mpi_read_file #2 (Illegal input)
8:int:10:char*:"/zip/third_party/mbedtls/test/data/hash_file_3":hex:"":int:0
Test mbedtls_mpi_read_file #3 (Input too big)
8:int:10:char*:"/zip/third_party/mbedtls/test/data/mpi_too_big":hex:"":exp:2
Base test mbedtls_mpi_write_file #1
9:int:10:char*:"56125680981752282334141896320372489490613963693556392520816017892111350604111697682705498319512049040516698827829292076808006940873974979584527073481012636016353913462376755556720019831187364993587901952757307830896531678727717924":int:16:char*:"o/tmp/test_suite_mpi_write"
Base test mbedtls_mpi_lsb #1
12:int:10:char*:"56125680981752282334141896320372489490613963693556392520816017892111350604111697682705498319512049040516698827829292076808006940873974979584527073481012636016353913462376755556720019831187364993587901952757307830896531678727717924":int:2
Base test mbedtls_mpi_lsb #2
12:int:10:char*:"24":int:3
Base test mbedtls_mpi_lsb #3
12:int:16:char*:"24":int:2
Base test mbedtls_mpi_lsb #4
12:int:16:char*:"2000":int:13
Base test mbedtls_mpi_bitlen #1
13:int:10:char*:"56125680981752282334141896320372489490613963693556392520816017892111350604111697682705498319512049040516698827829292076808006940873974979584527073481012636016353913462376755556720019831187364993587901952757307830896531678727717924":int:764
Base test mbedtls_mpi_bitlen #2
13:int:10:char*:"24":int:5
Base test mbedtls_mpi_bitlen #3
13:int:10:char*:"1":int:1
Base test mbedtls_mpi_bitlen #4
13:int:10:char*:"15":int:4
Base test mbedtls_mpi_bitlen #5
13:int:10:char*:"16":int:5
Base test mbedtls_mpi_bitlen #6
13:int:10:char*:"10":int:4
Base test mbedtls_mpi_bitlen #7
13:int:10:char*:"0":int:0
Base test mbedtls_mpi_cmp_int #1
15:int:693:int:693:int:0
Base test mbedtls_mpi_cmp_int #2
15:int:693:int:692:int:1
Base test mbedtls_mpi_cmp_int #3
15:int:693:int:694:exp:4
Base test mbedtls_mpi_cmp_int (Negative values) #1
15:exp:5:exp:5:int:0
Base test mbedtls_mpi_cmp_int (Negative values) #2
15:exp:5:exp:6:int:1
Base test mbedtls_mpi_cmp_int (Negative values) #3
15:exp:5:exp:4:exp:4
Base test mbedtls_mpi_cmp_mpi #1
16:int:10:char*:"693":int:10:char*:"693":int:0
Base test mbedtls_mpi_cmp_mpi #2
16:int:10:char*:"693":int:10:char*:"692":int:1
Base test mbedtls_mpi_cmp_mpi #3
16:int:10:char*:"693":int:10:char*:"694":exp:4
Base test mbedtls_mpi_cmp_mpi (Negative values) #1
16:int:10:char*:"-2":int:10:char*:"-2":int:0
Base test mbedtls_mpi_cmp_mpi (Negative values) #2
16:int:10:char*:"-2":int:10:char*:"-3":int:1
Base test mbedtls_mpi_cmp_mpi (Negative values) #3
16:int:10:char*:"-2":int:10:char*:"-1":exp:4
Base test mbedtls_mpi_cmp_mpi (Mixed values) #4
16:int:10:char*:"-3":int:10:char*:"2":exp:4
Base test mbedtls_mpi_cmp_mpi (Mixed values) #5
16:int:10:char*:"2":int:10:char*:"-3":int:1
Base test mbedtls_mpi_cmp_mpi (Mixed values) #6
16:int:10:char*:"-2":int:10:char*:"31231231289798":exp:4
Base test mbedtls_mpi_lt_mpi_ct #1
17:int:1:char*:"2B5":int:1:char*:"2B5":int:0:int:0
Base test mbedtls_mpi_lt_mpi_ct #2
17:int:1:char*:"2B5":int:1:char*:"2B4":int:0:int:0
Base test mbedtls_mpi_lt_mpi_ct #3
17:int:1:char*:"2B5":int:1:char*:"2B6":int:1:int:0
Base test mbedtls_mpi_lt_mpi_ct (Negative values) #1
17:int:1:char*:"-2":int:1:char*:"-2":int:0:int:0
Base test mbedtls_mpi_lt_mpi_ct (Negative values) #2
17:int:1:char*:"-2":int:1:char*:"-3":int:0:int:0
Base test mbedtls_mpi_lt_mpi_ct (Negative values) #3
17:int:1:char*:"-2":int:1:char*:"-1":int:1:int:0
Base test mbedtls_mpi_lt_mpi_ct (Mixed values) #1
17:int:1:char*:"-3":int:1:char*:"2":int:1:int:0
Base test mbedtls_mpi_lt_mpi_ct (Mixed values) #2
17:int:1:char*:"2":int:1:char*:"-3":int:0:int:0
Base test mbedtls_mpi_lt_mpi_ct (Mixed values) #3
17:int:2:char*:"-2":int:2:char*:"1C67967269C6":int:1:int:0
Base test mbedtls_mpi_lt_mpi_ct (X is longer in storage)
17:int:3:char*:"2B5":int:2:char*:"2B5":int:0:exp:1
Base test mbedtls_mpi_lt_mpi_ct (Y is longer in storage)
17:int:3:char*:"2B5":int:4:char*:"2B5":int:0:exp:1
Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #1
17:int:2:char*:"7FFFFFFFFFFFFFFF":int:2:char*:"FF":int:0:int:0
Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #2
17:int:2:char*:"8000000000000000":int:2:char*:"7FFFFFFFFFFFFFFF":int:0:int:0
Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #3
17:int:2:char*:"8000000000000000":int:2:char*:"1":int:0:int:0
Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #4
17:int:2:char*:"8000000000000000":int:2:char*:"0":int:0:int:0
Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #5
17:int:2:char*:"FFFFFFFFFFFFFFFF":int:2:char*:"FF":int:0:int:0
Base test mbedtls_mpi_lt_mpi_ct (corner case - 32 bit) #1
17:int:1:char*:"7FFFFFFF":int:1:char*:"FF":int:0:int:0
Base test mbedtls_mpi_lt_mpi_ct (corner case - 32 bit) #2
17:int:1:char*:"80000000":int:1:char*:"7FFFFFFF":int:0:int:0
Base test mbedtls_mpi_lt_mpi_ct (corner case - 32 bit) #3
17:int:1:char*:"80000000":int:1:char*:"1":int:0:int:0
Base test mbedtls_mpi_lt_mpi_ct (corner case - 32 bit) #4
17:int:1:char*:"80000000":int:1:char*:"0":int:0:int:0
Base test mbedtls_mpi_lt_mpi_ct (corner case - 32 bit) #5
17:int:1:char*:"FFFFFFFF":int:1:char*:"FF":int:0:int:0
Multi-limb mbedtls_mpi_lt_mpi_ct (X<Y, zero vs non-zero MS limb)
17:int:2:char*:"0FFFFFFFFFFFFFFFF":int:2:char*:"1FFFFFFFFFFFFFFFF":int:1:int:0
Multi-limb mbedtls_mpi_lt_mpi_ct (X>Y, equal MS limbs)
17:int:2:char*:"-EEFFFFFFFFFFFFFFF1":int:2:char*:"-EEFFFFFFFFFFFFFFFF":int:0:int:0
Multi-limb mbedtls_mpi_lt_mpi_ct (X=Y)
17:int:2:char*:"EEFFFFFFFFFFFFFFFF":int:2:char*:"EEFFFFFFFFFFFFFFFF":int:0:int:0
Multi-limb mbedtls_mpi_lt_mpi_ct (X=-Y)
17:int:2:char*:"-EEFFFFFFFFFFFFFFFF":int:2:char*:"EEFFFFFFFFFFFFFFFF":int:1:int:0
Multi-limb mbedtls_mpi_lt_mpi_ct (Alternating limbs) #1
17:int:2:char*:"11FFFFFFFFFFFFFFFF":int:2:char*:"FF1111111111111111":int:1:int:0
Multi-limb mbedtls_mpi_lt_mpi_ct (Alternating limbs) #2
17:int:2:char*:"FF1111111111111111":int:2:char*:"11FFFFFFFFFFFFFFFF":int:0:int:0
Multi-limb mbedtls_mpi_lt_mpi_ct (Alternating limbs) #3
17:int:2:char*:"-11FFFFFFFFFFFFFFFF":int:2:char*:"-FF1111111111111111":int:0:int:0
Multi-limb mbedtls_mpi_lt_mpi_ct (Alternating limbs) #4
17:int:2:char*:"-FF1111111111111111":int:2:char*:"-11FFFFFFFFFFFFFFFF":int:1:int:0
Base test mbedtls_mpi_cmp_abs #1
18:int:10:char*:"693":int:10:char*:"693":int:0
Base test mbedtls_mpi_cmp_abs #2
18:int:10:char*:"693":int:10:char*:"692":int:1
Base test mbedtls_mpi_cmp_abs #3
18:int:10:char*:"693":int:10:char*:"694":exp:4
Base test mbedtls_mpi_cmp_abs (Negative values) #1
18:int:10:char*:"-2":int:10:char*:"-2":int:0
Base test mbedtls_mpi_cmp_abs (Negative values) #2
18:int:10:char*:"-2":int:10:char*:"-3":exp:4
Base test mbedtls_mpi_cmp_abs (Negative values) #3
18:int:10:char*:"-2":int:10:char*:"-1":int:1
Base test mbedtls_mpi_cmp_abs (Zero and Zero) #4
18:int:10:char*:"0":int:10:char*:"0":int:0
Base test mbedtls_mpi_cmp_abs (Mix values) #1
18:int:10:char*:"-2":int:10:char*:"2":int:0
Base test mbedtls_mpi_cmp_abs (Mix values) #2
18:int:10:char*:"2":int:10:char*:"-3":exp:4
Base test mbedtls_mpi_cmp_abs (Mix values) #3
18:int:10:char*:"-2":int:10:char*:"1":int:1
Copy zero (1 limb) to positive (1 limb)
19:int:0:int:1500
Copy zero (1 limb) to negative (1 limb)
19:int:0:exp:7
Copy positive (1 limb) to zero (1 limb)
19:int:1500:int:0
Copy negative (1 limb) to zero (1 limb)
19:exp:7:int:0
Copy positive (1 limb) to negative (1 limb)
19:int:1500:exp:8
Copy negative (1 limb) to positive (1 limb)
19:exp:8:int:1500
Copy zero (null) to zero (null)
20:hex:"":hex:""
Copy zero (null) to positive (1 limb)
20:hex:"":hex:"1234"
Copy positive (1 limb) to zero (null)
20:hex:"1234":hex:""
Copy positive to larger
20:hex:"bead":hex:"ca5cadedb01dfaceacc01ade"
Copy positive to smaller
20:hex:"ca5cadedb01dfaceacc01ade":hex:"bead"
Copy self: positive (1 limb)
21:int:14
Copy self: zero (1 limb)
21:int:0
Swap zero (1 limb) with positive (1 limb)
25:int:0:int:1500
Swap zero (1 limb) with negative (1 limb)
25:int:0:exp:7
Swap positive (1 limb) with zero (1 limb)
25:int:1500:int:0
Swap negative (1 limb) with zero (1 limb)
25:exp:7:int:0
Swap positive (1 limb) with negative (1 limb)
25:int:1500:exp:8
Swap negative (1 limb) with positive (1 limb)
25:exp:8:int:1500
Swap zero (null) with zero (null)
26:hex:"":hex:""
Swap zero (null) with positive (1 limb)
26:hex:"":hex:"1234"
Swap positive (1 limb) with zero (null)
26:hex:"1234":hex:""
Swap positive with larger
26:hex:"bead":hex:"ca5cadedb01dfaceacc01ade"
Swap positive with smaller
26:hex:"ca5cadedb01dfaceacc01ade":hex:"bead"
Swap self: 1 limb
27:hex:"face"
Swap self: null
27:hex:""
Shrink 2 limbs in a buffer of size 2 to 4
22:int:2:int:2:int:4:int:4
Shrink 2 limbs in a buffer of size 4 to 4
22:int:4:int:2:int:4:int:4
Shrink 2 limbs in a buffer of size 8 to 4
22:int:8:int:2:int:4:int:4
Shrink 4 limbs in a buffer of size 8 to 4
22:int:8:int:4:int:4:int:4
Shrink 6 limbs in a buffer of size 8 to 4 yielding 6
22:int:8:int:6:int:4:int:6
Shrink 2 limbs in a buffer of size 4 to 0 yielding 2
22:int:4:int:2:int:0:int:2
Shrink 1 limbs in a buffer of size 4 to 0 yielding 1
22:int:4:int:1:int:0:int:1
Shrink 0 limbs in a buffer of size 4 to 0 yielding 1
22:int:4:int:0:int:0:int:1
Test mbedtls_mpi_safe_cond_assign #1
23:exp:9:char*:"01":exp:9:char*:"02"
Test mbedtls_mpi_safe_cond_assign #2
23:exp:9:char*:"FF000000000000000001":exp:9:char*:"02"
Test mbedtls_mpi_safe_cond_assign #3
23:exp:9:char*:"01":exp:9:char*:"FF000000000000000002"
Test mbedtls_mpi_safe_cond_assign #4
23:exp:9:char*:"01":exp:4:char*:"02"
Test mbedtls_mpi_safe_cond_assign #5
23:exp:4:char*:"01":exp:9:char*:"02"
Test mbedtls_mpi_safe_cond_assign #6
23:exp:4:char*:"01":exp:4:char*:"02"
Test mbedtls_mpi_safe_cond_swap #1
24:exp:9:char*:"01":exp:9:char*:"02"
Test mbedtls_mpi_safe_cond_swap #2
24:exp:9:char*:"FF000000000000000001":exp:9:char*:"02"
Test mbedtls_mpi_safe_cond_swap #3
24:exp:9:char*:"01":exp:9:char*:"FF000000000000000002"
Test mbedtls_mpi_safe_cond_swap #4
24:exp:9:char*:"01":exp:4:char*:"02"
Test mbedtls_mpi_safe_cond_swap #5
24:exp:4:char*:"01":exp:9:char*:"02"
Test mbedtls_mpi_safe_cond_swap #6
24:exp:4:char*:"01":exp:4:char*:"02"
Base test mbedtls_mpi_add_abs #1
30:int:10:char*:"12345678":int:10:char*:"642531":int:10:char*:"12988209"
Base test mbedtls_mpi_add_abs #2
30:int:10:char*:"-12345678":int:10:char*:"642531":int:10:char*:"12988209"
Base test mbedtls_mpi_add_abs #3
30:int:10:char*:"12345678":int:10:char*:"-642531":int:10:char*:"12988209"
Base test mbedtls_mpi_add_abs #4
30:int:10:char*:"-12345678":int:10:char*:"-642531":int:10:char*:"12988209"
Test mbedtls_mpi_add_abs #1
30:int:10:char*:"-643808006803554439230129854961492699151386107534013432918073439524138264842370630061369715394739134090922937332590384720397133335969549256322620979036686633213903952966175107096769180017646161851573147596390153":int:10:char*:"56125680981752282333498088313568935051383833838594899821664631784577337171193624243181360054669678410455329112434552942717084003541384594864129940145043086760031292483340068923506115878221189886491132772739661669044958531131327771":int:10:char*:"56125680981752282334141896320372489490613963693556392520816017892111350604111697682705498319512049040516698827829292076808006940873974979584527073481012636016353913462376755556720019831187364993587901952757307830896531678727717924"
Regression mbedtls_mpi_add_abs (add small to very large MPI with carry rollover) [#1]
30:int:16:char*:"FFFFFFFFFFFFFFFFFFFFFFFFFFFFF8":int:16:char*:"08":int:16:char*:"1000000000000000000000000000000"
Regression mbedtls_mpi_add_abs (add small to very large MPI with carry rollover) [#2]
30:int:16:char*:"08":int:16:char*:"FFFFFFFFFFFFFFFFFFFFFFFFFFFFF8":int:16:char*:"1000000000000000000000000000000"
Base test mbedtls_mpi_add_mpi #1
28:int:10:char*:"12345678":int:10:char*:"642531":int:10:char*:"12988209"
Base test mbedtls_mpi_add_mpi #2
28:int:10:char*:"-12345678":int:10:char*:"642531":int:10:char*:"-11703147"
Base test mbedtls_mpi_add_mpi #3
28:int:10:char*:"12345678":int:10:char*:"-642531":int:10:char*:"11703147"
Base test mbedtls_mpi_add_mpi #4
28:int:10:char*:"-12345678":int:10:char*:"-642531":int:10:char*:"-12988209"
Test mbedtls_mpi_add_mpi #1
28:int:10:char*:"203956878356401977405765866929034577280193993314348263094772646453283062722701277632936616063144088173312372882677123879538709400158306567338328279154499698366071906766440037074217117805690872792848149112022286332144876183376326512083574821647933992961249917319836219304274280243803104015000563790123":int:10:char*:"531872289054204184185084734375133399408303613982130856645299464930952178606045848877129147820387996428175564228204785846141207532462936339834139412401975338705794646595487324365194792822189473092273993580587964571659678084484152603881094176995594813302284232006001752128168901293560051833646881436219":int:10:char*:"735829167410606161590850601304167976688497607296479119740072111384235241328747126510065763883532084601487937110881909725679916932621242907172467691556475037071866553361927361439411910627880345885122142692610250903804554267860479115964668998643528806263534149325837971432443181537363155848647445226342"
Test mbedtls_mpi_add_mpi #2
28:int:10:char*:"643808006803554439230129854961492699151386107534013432918073439524138264842370630061369715394739134090922937332590384720397133335969549256322620979036686633213903952966175107096769180017646161851573147596390153":int:10:char*:"56125680981752282333498088313568935051383833838594899821664631784577337171193624243181360054669678410455329112434552942717084003541384594864129940145043086760031292483340068923506115878221189886491132772739661669044958531131327771":int:10:char*:"56125680981752282334141896320372489490613963693556392520816017892111350604111697682705498319512049040516698827829292076808006940873974979584527073481012636016353913462376755556720019831187364993587901952757307830896531678727717924"
Base test mbedtls_mpi_add_mpi inplace #1
29:int:10:char*:"12345678":int:10:char*:"24691356"
Test mbedtls_mpi_add_mpi inplace #2
29:int:10:char*:"643808006803554439230129854961492699151386107534013432918073439524138264842370630061369715394739134090922937332590384720397133335969549256322620979036686633213903952966175107096769180017646161851573147596390153":int:10:char*:"1287616013607108878460259709922985398302772215068026865836146879048276529684741260122739430789478268181845874665180769440794266671939098512645241958073373266427807905932350214193538360035292323703146295192780306"
Test mbedtls_mpi_add_mpi inplace #3
29:int:16:char*:"ffffffffffffffffffffffffffffffff":int:16:char*:"01fffffffffffffffffffffffffffffffe"
Test mbedtls_mpi_add_int #1
31:int:10:char*:"2039568783564019774057658669290345772801939933143482630947726464532830627227012776329":int:9871232:int:10:char*:"2039568783564019774057658669290345772801939933143482630947726464532830627227022647561"
Test mbedtls_mpi_add_int #2
31:int:10:char*:"2039568783564019774057658669290345772801939933143482630947726464532830627227012776329":exp:10:int:10:char*:"2039568783564019774057658669290345772801939933143482630947726464532830627227002905097"
Base test mbedtls_mpi_sub_abs #1 (|B| > |A|)
33:int:10:char*:"5":int:10:char*:"7":int:10:char*:"0":exp:11
Base test mbedtls_mpi_sub_abs #2 (|B| > |A|)
33:int:10:char*:"-5":int:10:char*:"-7":int:10:char*:"0":exp:11
Base test mbedtls_mpi_sub_abs #3 (|B| > |A|)
33:int:10:char*:"-5":int:10:char*:"7":int:10:char*:"0":exp:11
Base test mbedtls_mpi_sub_abs #4 (|B| > |A|)
33:int:10:char*:"5":int:10:char*:"-7":int:10:char*:"0":exp:11
Base test mbedtls_mpi_sub_abs #1 (|B| >> |A| with more limbs)
33:int:10:char*:"5":int:16:char*:"123456789abcdef01":int:10:char*:"0":exp:11
Base test mbedtls_mpi_sub_abs #2 (|B| >> |A| with more limbs)
33:int:10:char*:"-5":int:16:char*:"-123456789abcdef01":int:10:char*:"0":exp:11
Base test mbedtls_mpi_sub_abs #3 (|B| >> |A| with more limbs)
33:int:10:char*:"-5":int:16:char*:"123456789abcdef01":int:10:char*:"0":exp:11
Base test mbedtls_mpi_sub_abs #4 (|B| >> |A| with more limbs)
33:int:10:char*:"5":int:16:char*:"-123456789abcdef01":int:10:char*:"0":exp:11
Base test mbedtls_mpi_sub_abs #1
33:int:10:char*:"7":int:10:char*:"5":int:10:char*:"2":int:0
Base test mbedtls_mpi_sub_abs #2
33:int:10:char*:"-7":int:10:char*:"-5":int:10:char*:"2":int:0
Base test mbedtls_mpi_sub_abs #3
33:int:10:char*:"-7":int:10:char*:"5":int:10:char*:"2":int:0
Base test mbedtls_mpi_sub_abs #4
33:int:10:char*:"7":int:10:char*:"-5":int:10:char*:"2":int:0
Test mbedtls_mpi_sub_abs #1
33:int:16:char*:"FFFFFFFFFF":int:16:char*:"01":int:16:char*:"FFFFFFFFFE":int:0
Test mbedtls_mpi_sub_abs #2
33:int:16:char*:"FFFFFFFFF0":int:16:char*:"01":int:16:char*:"FFFFFFFFEF":int:0
Test mbedtls_mpi_sub_abs #3
33:int:16:char*:"FF00000000":int:16:char*:"0F00000000":int:16:char*:"F000000000":int:0
Test mbedtls_mpi_sub_abs #4
33:int:16:char*:"FF00000000":int:16:char*:"0F00000001":int:16:char*:"EFFFFFFFFF":int:0
Base test mbedtls_mpi_sub_mpi #1 (Test with negative result)
32:int:10:char*:"5":int:10:char*:"7":int:10:char*:"-2"
Base test mbedtls_mpi_sub_mpi #2 (Test with negative inputs)
32:int:10:char*:"-5":int:10:char*:"-7":int:10:char*:"2"
Base test mbedtls_mpi_sub_mpi #3 (Test with negative base)
32:int:10:char*:"-5":int:10:char*:"7":int:10:char*:"-12"
Base test mbedtls_mpi_sub_mpi #4 (Test with negative subtraction)
32:int:10:char*:"5":int:10:char*:"-7":int:10:char*:"12"
Test mbedtls_mpi_sub_mpi #1
32:int:10:char*:"531872289054204184185084734375133399408303613982130856645299464930952178606045848877129147820387996428175564228204785846141207532462936339834139412401975338705794646595487324365194792822189473092273993580587964571659678084484152603881094176995594813302284232006001752128168901293560051833646881436219":int:10:char*:"203956878356401977405765866929034577280193993314348263094772646453283062722701277632936616063144088173312372882677123879538709400158306567338328279154499698366071906766440037074217117805690872792848149112022286332144876183376326512083574821647933992961249917319836219304274280243803104015000563790123":int:10:char*:"327915410697802206779318867446098822128109620667782593550526818477669115883344571244192531757243908254863191345527661966602498132304629772495811133247475640339722739829047287290977675016498600299425844468565678239514801901107826091797519355347660820341034314686165532823894621049756947818646317646096"
Test mbedtls_mpi_sub_mpi #2 (Test for negative result)
32:int:10:char*:"643808006803554439230129854961492699151386107534013432918073439524138264842370630061369715394739134090922937332590384720397133335969549256322620979036686633213903952966175107096769180017646161851573147596390153":int:10:char*:"56125680981752282333498088313568935051383833838594899821664631784577337171193624243181360054669678410455329112434552942717084003541384594864129940145043086760031292483340068923506115878221189886491132772739661669044958531131327771":int:10:char*:"-56125680981752282332854280306765380612153703983633407122513245677043323738275550803657221789827307780393959397039813808626161066208794210143732806809073537503708671504303382290292211925255014779394363592722015507193385383534937618"
Test mbedtls_mpi_sub_int #1
34:int:10:char*:"2039568783564019774057658669290345772801939933143482630947726464532830627227012776329":exp:10:int:10:char*:"2039568783564019774057658669290345772801939933143482630947726464532830627227022647561"
Test mbedtls_mpi_sub_int #2
34:int:10:char*:"2039568783564019774057658669290345772801939933143482630947726464532830627227012776329":int:9871232:int:10:char*:"2039568783564019774057658669290345772801939933143482630947726464532830627227002905097"
Test mbedtls_mpi_shift_l #1
47:int:10:char*:"64":int:1:int:10:char*:"128"
Test mbedtls_mpi_shift_l #2
47:int:10:char*:"658385546911733550164516088405238961461880256029834598831972039469421755117818013653494814438931957316403111689187691446941406788869098983929874080332195117465344344350008880118042764943201875870917468833709791733282363323948005998269792207":int:37:int:10:char*:"90487820548639020691922304619723076305400961610119884872723190678642804168382367856686134531865643066983017249846286450251272364365605022750900439437595355052945035915579216557330505438734955340526145476988250171181404966718289259743378883640981192704"
Test mbedtls_mpi_shift_r #1
48:int:10:char*:"128":int:1:int:10:char*:"64"
Test mbedtls_mpi_shift_r #2
48:int:10:char*:"120815570979701484704906977000760567182871429114712069861589084706550626575967516787438008593490722779337547394120718248995900363209947025063336882559539208430319216688889117222633155838468458047056355241515415159736436403445579777425189969":int:45:int:10:char*:"3433785053053426415343295076376096153094051405637175942660777670498379921354157795219578264137985649407981651226029903483433269093721578004287291678324982297860947730012217028349628999378309630601971640587504883789518896817457"
Test mbedtls_mpi_shift_r #4 [#1]
48:int:16:char*:"FFFFFFFFFFFFFFFF":int:63:int:16:char*:"01"
Test mbedtls_mpi_shift_r #4 [#2]
48:int:16:char*:"FFFFFFFFFFFFFFFF":int:64:int:16:char*:"00"
Test mbedtls_mpi_shift_r #6
48:int:16:char*:"FFFFFFFFFFFFFFFF":int:65:int:16:char*:"00"
Test mbedtls_mpi_shift_r #7
48:int:16:char*:"FFFFFFFFFFFFFFFF":int:128:int:16:char*:"00"
Base test mbedtls_mpi_mul_mpi #1
35:int:10:char*:"5":int:10:char*:"7":int:10:char*:"35"
Base test mbedtls_mpi_mul_mpi #2
35:int:10:char*:"-5":int:10:char*:"7":int:10:char*:"-35"
Base test mbedtls_mpi_mul_mpi #3
35:int:10:char*:"5":int:10:char*:"-7":int:10:char*:"-35"
Base test mbedtls_mpi_mul_mpi #4
35:int:10:char*:"-5":int:10:char*:"-7":int:10:char*:"35"
Test mbedtls_mpi_mul_mpi #1
35:int:10:char*:"28911710017320205966167820725313234361535259163045867986277478145081076845846493521348693253530011243988160148063424837895971948244167867236923919506962312185829914482993478947657472351461336729641485069323635424692930278888923450060546465883490944265147851036817433970984747733020522259537":int:10:char*:"16471581891701794764704009719057349996270239948993452268812975037240586099924712715366967486587417803753916334331355573776945238871512026832810626226164346328807407669366029926221415383560814338828449642265377822759768011406757061063524768140567867350208554439342320410551341675119078050953":int:10:char*:"476221599179424887669515829231223263939342135681791605842540429321038144633323941248706405375723482912535192363845116154236465184147599697841273424891410002781967962186252583311115708128167171262206919514587899883547279647025952837516324649656913580411611297312678955801899536937577476819667861053063432906071315727948826276092545739432005962781562403795455162483159362585281248265005441715080197800335757871588045959754547836825977169125866324128449699877076762316768127816074587766799018626179199776188490087103869164122906791440101822594139648973454716256383294690817576188761"
Test mbedtls_mpi_mul_int #1
36:int:10:char*:"2039568783564019774057658669290345772801939933143482630947726464532830627227012776329":int:9871232:int:10:char*:"20133056642518226042310730101376278483547239130123806338055387803943342738063359782107667328":char*:"=="
Test mbedtls_mpi_mul_int #2 (Unsigned, thus failure)
36:int:10:char*:"2039568783564019774057658669290345772801939933143482630947726464532830627227012776329":exp:10:int:10:char*:"-20133056642518226042310730101376278483547239130123806338055387803943342738063359782107667328":char*:"!="
Test mbedtls_mpi_mul_int #3
36:int:10:char*:"-2039568783564019774057658669290345772801939933143482630947726464532830627227012776329":int:9871232:int:10:char*:"-20133056642518226042310730101376278483547239130123806338055387803943342738063359782107667328":char*:"=="
Test mbedtls_mpi_mul_int #4 (Unsigned, thus failure)
36:int:10:char*:"-2039568783564019774057658669290345772801939933143482630947726464532830627227012776329":exp:10:int:10:char*:"20133056642518226042310730101376278483547239130123806338055387803943342738063359782107667328":char*:"!="
Base test mbedtls_mpi_div_mpi #1
37:int:10:char*:"1000":int:10:char*:"13":int:10:char*:"76":int:10:char*:"12":int:0
Base test mbedtls_mpi_div_mpi #2 (Divide by zero)
37:int:10:char*:"1000":int:10:char*:"0":int:10:char*:"1":int:10:char*:"1":exp:12
Base test mbedtls_mpi_div_mpi #3
37:int:10:char*:"1000":int:10:char*:"-13":int:10:char*:"-76":int:10:char*:"12":int:0
Test mbedtls_mpi_div_mpi #1
37:int:10:char*:"20133056642518226042310730101376278483547239130123806338055387803943342738063359782107667328":int:10:char*:"34":int:10:char*:"592148724779947824773845002981655249516095268533053127589864347174804198178334111238460803":int:10:char*:"26":int:0
Test mbedtls_mpi_div_mpi #2
37:int:10:char*:"476221599179424887669515829231223263939342135681791605842540429321038144633323941248706405375723482912535192363845116154236465184147599697841273424891410002781967962186252583311115708128167171262206919514587899883547279647025952837516324649656913580411611297312678955801899536937577476819667861053063432906071315727948826276092545739432005962781562403795455162483159362585281248265005441715080197800335757871588045959754547836825977169125866324128449699877076762316768127816074587766799018626179199776188490087103869164122906791440101822594139648973454716256383294690817576188762":int:10:char*:"28911710017320205966167820725313234361535259163045867986277478145081076845846493521348693253530011243988160148063424837895971948244167867236923919506962312185829914482993478947657472351461336729641485069323635424692930278888923450060546465883490944265147851036817433970984747733020522259537":int:10:char*:"16471581891701794764704009719057349996270239948993452268812975037240586099924712715366967486587417803753916334331355573776945238871512026832810626226164346328807407669366029926221415383560814338828449642265377822759768011406757061063524768140567867350208554439342320410551341675119078050953":int:10:char*:"1":int:0
Test mbedtls_mpi_div_mpi #3
37:int:10:char*:"1000":int:10:char*:"7":int:10:char*:"142":int:10:char*:"6":int:0
Test mbedtls_mpi_div_mpi #4
37:int:10:char*:"777":int:10:char*:"7":int:10:char*:"111":int:10:char*:"0":int:0
Base test mbedtls_mpi_div_int #1
38:int:10:char*:"1000":int:13:int:10:char*:"76":int:10:char*:"12":int:0
Base test mbedtls_mpi_div_int #2 (Divide by zero)
38:int:10:char*:"1000":int:0:int:10:char*:"1":int:10:char*:"1":exp:12
Base test mbedtls_mpi_div_int #3
38:int:10:char*:"1000":exp:13:int:10:char*:"-76":int:10:char*:"12":int:0
Test mbedtls_mpi_div_int #1
38:int:10:char*:"20133056642518226042310730101376278483547239130123806338055387803943342738063359782107667328":int:34:int:10:char*:"592148724779947824773845002981655249516095268533053127589864347174804198178334111238460803":int:10:char*:"26":int:0
Test mbedtls_mpi_div_int #2
38:int:10:char*:"20133056642518226042310730101376278483547239130123806338055387803943342738063359782107667328":exp:14:int:10:char*:"-592148724779947824773845002981655249516095268533053127589864347174804198178334111238460803":int:10:char*:"26":int:0
Base test mbedtls_mpi_mod_mpi #1
39:int:10:char*:"1000":int:10:char*:"13":int:10:char*:"12":int:0
Base test mbedtls_mpi_mod_mpi #2 (Divide by zero)
39:int:10:char*:"1000":int:10:char*:"0":int:10:char*:"0":exp:12
Base test mbedtls_mpi_mod_mpi #3
39:int:10:char*:"-1000":int:10:char*:"13":int:10:char*:"1":int:0
Base test mbedtls_mpi_mod_mpi #4 (Negative modulo)
39:int:10:char*:"1000":int:10:char*:"-13":int:10:char*:"-1":exp:11
Base test mbedtls_mpi_mod_mpi #5 (Negative modulo)
39:int:10:char*:"-1000":int:10:char*:"-13":int:10:char*:"-12":exp:11
Base test mbedtls_mpi_mod_int #1
40:int:10:char*:"1000":int:13:int:12:int:0
Base test mbedtls_mpi_mod_int #2 (Divide by zero)
40:int:10:char*:"1000":int:0:int:0:exp:12
Base test mbedtls_mpi_mod_int #3
40:int:10:char*:"-1000":int:13:int:1:int:0
Base test mbedtls_mpi_mod_int #4 (Negative modulo)
40:int:10:char*:"1000":exp:13:int:0:exp:11
Base test mbedtls_mpi_mod_int #5 (Negative modulo)
40:int:10:char*:"-1000":exp:13:int:0:exp:11
Base test mbedtls_mpi_mod_int #6 (By 1)
40:int:10:char*:"1000":int:1:int:0:int:0
Base test mbedtls_mpi_mod_int #7 (By 2)
40:int:10:char*:"1001":int:2:int:1:int:0
Base test mbedtls_mpi_mod_int #8 (By 2)
40:int:10:char*:"1000":int:2:int:0:int:0
Base test mbedtls_mpi_exp_mod #1
41:int:10:char*:"23":int:10:char*:"13":int:10:char*:"29":int:10:char*:"":int:10:char*:"24":int:0
Base test mbedtls_mpi_exp_mod #2 (Even N)
41:int:10:char*:"23":int:10:char*:"13":int:10:char*:"30":int:10:char*:"":int:10:char*:"0":exp:1
Base test mbedtls_mpi_exp_mod #3 (Negative N)
41:int:10:char*:"23":int:10:char*:"13":int:10:char*:"-29":int:10:char*:"":int:10:char*:"0":exp:1
Base test mbedtls_mpi_exp_mod #4 (Negative base)
41:int:10:char*:"-23":int:10:char*:"13":int:10:char*:"29":int:10:char*:"":int:10:char*:"5":int:0
Base test mbedtls_mpi_exp_mod #5 (Negative exponent)
41:int:10:char*:"23":int:10:char*:"-13":int:10:char*:"29":int:10:char*:"":int:10:char*:"0":exp:1
Base test mbedtls_mpi_exp_mod #6 (Negative base + exponent)
41:int:10:char*:"-23":int:10:char*:"-13":int:10:char*:"29":int:10:char*:"":int:10:char*:"0":exp:1
Test mbedtls_mpi_exp_mod: MAX_SIZE exponent
42:int:2:exp:15:int:10:int:10:char*:"":int:0
Test mbedtls_mpi_exp_mod: MAX_SIZE + 1 exponent
42:int:2:exp:16:int:10:int:10:char*:"":exp:1
Test mbedtls_mpi_exp_mod: MAX_SIZE modulus
42:int:2:int:2:exp:15:int:10:char*:"":int:0
Test mbedtls_mpi_exp_mod: MAX_SIZE + 1 modulus
42:int:2:int:2:exp:16:int:10:char*:"":exp:1
Test mbedtls_mpi_exp_mod: MAX_SIZE exponent and modulus
42:int:2:exp:15:exp:15:int:10:char*:"":int:0
Test mbedtls_mpi_exp_mod: MAX_SIZE + 1 exponent and modulus
42:int:2:exp:16:exp:16:int:10:char*:"":exp:1
Test mbedtls_mpi_exp_mod #1
depends_on:0
41:int:10:char*:"433019240910377478217373572959560109819648647016096560523769010881172869083338285573756574557395862965095016483867813043663981946477698466501451832407592327356331263124555137732393938242285782144928753919588632679050799198937132922145084847":int:10:char*:"5781538327977828897150909166778407659250458379645823062042492461576758526757490910073628008613977550546382774775570888130029763571528699574717583228939535960234464230882573615930384979100379102915657483866755371559811718767760594919456971354184113721":int:10:char*:"583137007797276923956891216216022144052044091311388601652961409557516421612874571554415606746479105795833145583959622117418531166391184939066520869800857530421873250114773204354963864729386957427276448683092491947566992077136553066273207777134303397724679138833126700957":int:10:char*:"":int:10:char*:"114597449276684355144920670007147953232659436380163461553186940113929777196018164149703566472936578890991049344459204199888254907113495794730452699842273939581048142004834330369483813876618772578869083248061616444392091693787039636316845512292127097865026290173004860736":int:0
Test mbedtls_mpi_exp_mod (Negative base) [#1]
41:int:10:char*:"-10000000000":int:10:char*:"10000000000":int:10:char*:"99999":int:10:char*:"":int:10:char*:"1":int:0
Test mbedtls_mpi_exp_mod (Negative base) [#2]
depends_on:0
41:int:16:char*:"-9f13012cd92aa72fb86ac8879d2fde4f7fd661aaae43a00971f081cc60ca277059d5c37e89652e2af2585d281d66ef6a9d38a117e9608e9e7574cd142dc55278838a2161dd56db9470d4c1da2d5df15a908ee2eb886aaa890f23be16de59386663a12f1afbb325431a3e835e3fd89b98b96a6f77382f458ef9a37e1f84a03045c8676ab55291a94c2228ea15448ee96b626b998":int:16:char*:"40a54d1b9e86789f06d9607fb158672d64867665c73ee9abb545fc7a785634b354c7bae5b962ce8040cf45f2c1f3d3659b2ee5ede17534c8fc2ec85c815e8df1fe7048d12c90ee31b88a68a081f17f0d8ce5f4030521e9400083bcea73a429031d4ca7949c2000d597088e0c39a6014d8bf962b73bb2e8083bd0390a4e00b9b3":int:16:char*:"eeaf0ab9adb38dd69c33f80afa8fc5e86072618775ff3c0b9ea2314c9c256576d674df7496ea81d3383b4813d692c6e0e0d5d8e250b98be48e495c1d6089dad15dc7d7b46154d6b6ce8ef4ad69b15d4982559b297bcf1885c529f566660e57ec68edbc3c05726cc02fd4cbf4976eaa9afd5138fe8376435b9fc61d2fc0eb06e3":int:16:char*:"":int:16:char*:"21acc7199e1b90f9b4844ffe12c19f00ec548c5d32b21c647d48b6015d8eb9ec9db05b4f3d44db4227a2b5659c1a7cceb9d5fa8fa60376047953ce7397d90aaeb7465e14e820734f84aa52ad0fc66701bcbb991d57715806a11531268e1e83dd48288c72b424a6287e9ce4e5cc4db0dd67614aecc23b0124a5776d36e5c89483":int:0
Base test GCD #1
14:int:10:char*:"693":int:10:char*:"609":int:10:char*:"21"
Base test GCD #2
14:int:10:char*:"1764":int:10:char*:"868":int:10:char*:"28"
Base test GCD #3
14:int:10:char*:"768454923":int:10:char*:"542167814":int:10:char*:"1"
Test GCD #1
14:int:10:char*:"433019240910377478217373572959560109819648647016096560523769010881172869083338285573756574557395862965095016483867813043663981946477698466501451832407592327356331263124555137732393938242285782144928753919588632679050799198937132922145084847":int:10:char*:"5781538327977828897150909166778407659250458379645823062042492461576758526757490910073628008613977550546382774775570888130029763571528699574717583228939535960234464230882573615930384979100379102915657483866755371559811718767760594919456971354184113721":int:10:char*:"1"
Base test mbedtls_mpi_inv_mod #1
43:int:10:char*:"3":int:10:char*:"11":int:10:char*:"4":int:0
Base test mbedtls_mpi_inv_mod #2
43:int:10:char*:"3":int:10:char*:"0":int:10:char*:"0":exp:1
Base test mbedtls_mpi_inv_mod #3
43:int:10:char*:"3":int:10:char*:"-11":int:10:char*:"4":exp:1
Base test mbedtls_mpi_inv_mod #4
43:int:10:char*:"2":int:10:char*:"4":int:10:char*:"0":exp:17
Base test mbedtls_mpi_inv_mod #5
43:int:10:char*:"3":int:10:char*:"1":int:10:char*:"0":exp:1
Test mbedtls_mpi_inv_mod #1
43:int:16:char*:"aa4df5cb14b4c31237f98bd1faf527c283c2d0f3eec89718664ba33f9762907c":int:16:char*:"fffbbd660b94412ae61ead9c2906a344116e316a256fd387874c6c675b1d587d":int:16:char*:"8d6a5c1d7adeae3e94b9bcd2c47e0d46e778bc8804a2cc25c02d775dc3d05b0c":int:0
Base test mbedtls_mpi_is_prime #1
depends_on:1
44:int:10:char*:"0":exp:17
Base test mbedtls_mpi_is_prime #2
depends_on:1
44:int:10:char*:"1":exp:17
Base test mbedtls_mpi_is_prime #3
depends_on:1
44:int:10:char*:"2":int:0
Base test mbedtls_mpi_is_prime #4
depends_on:1
44:int:10:char*:"3":int:0
Base test mbedtls_mpi_is_prime #5
depends_on:1
44:int:10:char*:"4":exp:17
Base test mbedtls_mpi_is_prime #6
depends_on:1
44:int:10:char*:"5":int:0
Base test mbedtls_mpi_is_prime #7
depends_on:1
44:int:10:char*:"27":exp:17
Base test mbedtls_mpi_is_prime #8
depends_on:1
44:int:10:char*:"47":int:0
Test mbedtls_mpi_is_prime #1a
depends_on:1
44:int:10:char*:"83726728883146151979668243326097049289208482987685965276439157162337476477581":exp:17
Test mbedtls_mpi_is_prime #1b
depends_on:1
44:int:10:char*:"81248637410584921454869308488899267096530643632730258201256092582281263244641":exp:17
Test mbedtls_mpi_is_prime #2a
depends_on:1
44:int:10:char*:"827131507221654563937832686696200995595835694437983658840870036586124168186967796809117749047430768825822857042432722828096779098498192459819306321073968735177531164565305635281198148032612029767584644305912099":int:0
Test mbedtls_mpi_is_prime #2b
depends_on:1
44:int:10:char*:"827131507221654563937832686696200995595835694437983658840870036586124168186967796809117749047430768825822857042432722828096779098498192459819306321073968735177531164565305635281198148032612029767584644305912001":exp:17
Test mbedtls_mpi_is_prime #3
depends_on:1
44:int:10:char*:"2833419889721787128217599":int:0
Test mbedtls_mpi_is_prime #4
depends_on:1
44:int:10:char*:"195845982777569926302400511":int:0
Test mbedtls_mpi_is_prime #5 [#1]
depends_on:1
44:int:10:char*:"4776913109852041418248056622882488319":int:0
Test mbedtls_mpi_is_prime #5 [#2]
depends_on:1
44:int:10:char*:"768614336404564651":int:0
Test mbedtls_mpi_is_prime #6
depends_on:1
44:int:10:char*:"201487636602438195784363":int:0
Test mbedtls_mpi_is_prime #7
depends_on:1
44:int:10:char*:"845100400152152934331135470251":int:0
Test mbedtls_mpi_is_prime #8
depends_on:1
44:int:10:char*:"56713727820156410577229101238628035243":int:0
Test mbedtls_mpi_is_prime #9
depends_on:1
44:int:10:char*:"203956878356401977405765866929034577280193993314348263094772646453283062722701277632936616063144088173312372882677123879538709400158306567338328279154499698366071906766440037074217117805690872792848149112022286332144876183376326512083574821647933992961249917319836219304274280243803104015000563790123":int:0
Test mbedtls_mpi_is_prime #10
depends_on:1
44:int:10:char*:"531872289054204184185084734375133399408303613982130856645299464930952178606045848877129147820387996428175564228204785846141207532462936339834139412401975338705794646595487324365194792822189473092273993580587964571659678084484152603881094176995594813302284232006001752128168901293560051833646881436219":int:0
Test mbedtls_mpi_is_prime #11
depends_on:1
44:int:10:char*:"319705304701141539155720137200974664666792526059405792539680974929469783512821793995613718943171723765238853752439032835985158829038528214925658918372196742089464683960239919950882355844766055365179937610326127675178857306260955550407044463370239890187189750909036833976197804646589380690779463976173":int:0
Test mbedtls_mpi_is_prime #12
depends_on:1
44:int:10:char*:"200603822195324642393516294012917598972967449320074999667103434371470616000652036570009912021332527788252300901905236578801044680456930305350440933538867383130165841118050781326291059830545891570648243241795871":int:0
Test mbedtls_mpi_is_prime #13
depends_on:1
44:int:10:char*:"827131507221654563937832686696200995595835694437983658840870036586124168186967796809117749047430768825822857042432722828096779098498192459819306321073968735177531164565305635281198148032612029767584644305912099":int:0
Test mbedtls_mpi_is_prime #14
depends_on:1
44:int:10:char*:"964274047248418797145090983157197980855078966882276492572788532954904112655338439361306213898569516593744267391754033306465125919199692703323878557833023573312685002670662846477592597659826113460619815244721311":int:0
Test mbedtls_mpi_is_prime #15
depends_on:1
44:int:10:char*:"170141183460469231731687303715884105727":int:0
Test mbedtls_mpi_is_prime #16
depends_on:1
44:int:10:char*:"2147483647":int:0
Test mbedtls_mpi_is_prime #17
depends_on:1
44:int:10:char*:"961748941":int:0
Test mbedtls_mpi_is_prime #18
depends_on:1
44:int:10:char*:"179424691":int:0
Test mbedtls_mpi_is_prime #19
depends_on:1
44:int:10:char*:"32452867":int:0
Test mbedtls_mpi_is_prime #20
depends_on:1
44:int:10:char*:"49979687":int:0
Test mbedtls_mpi_is_prime_det (4 non-witnesses)
depends_on:1
45:hex:"043BD64BA10B11DA83FBD296B04BCA9E0552FAF6E09CAC74E2D7E735ED0DB09FC47ED76145644203EE0C826013BC602F560BCDAAED557D04683859A65D659FF828A245A2C5B1AC41E01E4669A525A45E23AF":hex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int:82:int:5
Test mbedtls_mpi_is_prime_det (39 non-witnesses)
depends_on:1
45:hex:"155102B67930FBE8858DF6C0642D77D419A7B7968E622CC7500F3E3F2C5168368C50E0083187":hex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int:38:int:40
Test mbedtls_mpi_gen_prime (Too small)
depends_on:1
46:int:2:int:0:exp:1
Test mbedtls_mpi_gen_prime (OK, minimum size)
depends_on:1
46:int:3:int:0:int:0
Test mbedtls_mpi_gen_prime (corner case limb size -1 bits)
depends_on:1
46:int:63:int:0:int:0
Test mbedtls_mpi_gen_prime (corner case limb size)
depends_on:1
46:int:64:int:0:int:0
Test mbedtls_mpi_gen_prime (corner case limb size +1 bits)
depends_on:1
46:int:65:int:0:int:0
Test mbedtls_mpi_gen_prime (Larger)
depends_on:1
46:int:128:int:0:int:0
Test mbedtls_mpi_gen_prime (Safe)
depends_on:1
46:int:128:exp:18:int:0
Test mbedtls_mpi_gen_prime (Safe with lower error rate)
depends_on:1
46:int:128:exp:19:int:0
Test mbedtls_mpi_gen_prime standard RSA #1 (lower error rate)
depends_on:1
46:int:1024:exp:20:int:0
Test mbedtls_mpi_gen_prime standard RSA #2 (lower error rate)
depends_on:1
46:int:1536:exp:20:int:0
Test bit getting (Value bit 25)
10:int:10:char*:"49979687":int:25:int:1
Test bit getting (Larger but same limb)
10:int:10:char*:"49979687":int:26:int:0
Test bit getting (Larger and non-existing limb)
10:int:10:char*:"49979687":int:500:int:0
Test bit getting (Value bit 24)
10:int:10:char*:"49979687":int:24:int:0
Test bit getting (Value bit 23)
10:int:10:char*:"49979687":int:23:int:1
Test bit set (Change existing value with a 1)
11:int:10:char*:"49979687":int:24:int:1:int:10:char*:"66756903":int:0
Test bit set (Change existing value with a 0)
11:int:10:char*:"49979687":int:25:int:0:int:10:char*:"16425255":int:0
Test bit set (Add above existing limbs with a 0)
11:int:10:char*:"49979687":int:80:int:0:int:10:char*:"49979687":int:0
Test bit set (Add above existing limbs with a 1)
11:int:10:char*:"49979687":int:80:int:1:int:10:char*:"1208925819614629224685863":int:0
Test bit set (Bit index larger than 31 with a 0)
11:int:16:char*:"FFFFFFFFFFFFFFFF":int:32:int:0:int:16:char*:"FFFFFFFEFFFFFFFF":int:0
Test bit set (Bit index larger than 31 with a 1)
11:int:16:char*:"00":int:32:int:1:int:16:char*:"0100000000":int:0
Test bit set (Invalid bit value)
11:int:16:char*:"00":int:5:int:2:int:16:char*:"00":exp:1
Fill random: 0 bytes
49:int:0:int:0:int:0
Fill random: 1 byte, good
49:int:1:int:1:int:0
Fill random: 2 bytes, good, no leading zero
49:int:2:int:2:int:0
Fill random: 2 bytes, good, 1 leading zero
49:int:2:int:256:int:0
Fill random: MAX_SIZE - 7, good
49:exp:21:exp:21:int:0
Fill random: MAX_SIZE, good
49:exp:15:exp:15:int:0
Fill random: 1 byte, RNG failure
49:int:1:int:0:exp:22
Fill random: 2 bytes, RNG failure after 1 byte
49:int:2:int:1:exp:22
Fill random: 4 bytes, RNG failure after 3 bytes
49:int:4:int:3:exp:22
Fill random: 8 bytes, RNG failure after 7 bytes
49:int:8:int:7:exp:22
Fill random: 16 bytes, RNG failure after 1 bytes
49:int:16:int:1:exp:22
Fill random: 16 bytes, RNG failure after 8 bytes
49:int:16:int:8:exp:22
Fill random: 16 bytes, RNG failure after 15 bytes
49:int:16:int:15:exp:22
Fill random: MAX_SIZE bytes, RNG failure after MAX_SIZE-1 bytes
49:exp:15:exp:23:exp:22
MPI Selftest
depends_on:2
50
| 51,048 | 1,016 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.misc.datax | CIPHER - Conditional invalid parameter checks
2
CIPHER - Unconditional invalid parameter checks
1
| 100 | 7 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_gcm.aes192_de.datax | AES-GCM NIST Validation (AES-192,128,0,0,128) #0 [#1]
depends_on:0
2:exp:0:hex:"806766a4d2b6507cc4113bc0e46eebe120eacd948c24dc7f":hex:"":hex:"4f801c772395c4519ec830980c8ca5a4":hex:"":int:128:hex:"8fa16452b132bebc6aa521e92cb3b0ea":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,128) #1 [#1]
depends_on:0
2:exp:0:hex:"0c2abdcd2e4ae4137509761a38e6ca436b99c21b141f28f5":hex:"":hex:"335ca01a07081fea4e605eb5f23a778e":hex:"":int:128:hex:"d7f475dfcb92a75bc8521c12bb2e8b86":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,128) #2 [#1]
depends_on:0
2:exp:0:hex:"eef490a0c2ecb32472e1654184340cc7433c34da981c062d":hex:"":hex:"d9172c3344d37ff93d2dcb2170ea5d01":hex:"":int:128:hex:"017fef05260a496654896d4703db3888":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,120) #0 [#1]
depends_on:0
2:exp:0:hex:"fe0c3490f1f0dba23cf5c64e6e1740d06f85e0afec6772f3":hex:"":hex:"f47e915163fa3df7f6c15b9d69f53907":hex:"":int:120:hex:"14e1a057a2e7ffbd2208e9c25dbba1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,120) #1 [#1]
depends_on:0
2:exp:0:hex:"4356b3b1f308df3573509945afe5268984f9d953f01096de":hex:"":hex:"a35b397b34a14a8e24d05a37be4d1822":hex:"":int:120:hex:"e045ecba220d22c80826b77a21b013":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,120) #2 [#1]
depends_on:0
2:exp:0:hex:"e2898937cc575c8bb7444413884deafe8eaf326be8849e42":hex:"":hex:"169a449ccb3eb29805b15304d603b132":hex:"":int:120:hex:"3a807251f3d6242849a69972b14f6d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,112) #0 [#1]
depends_on:0
2:exp:0:hex:"75683c7df0442e10b5368fcd6bb481f0bff8d95aae90487e":hex:"":hex:"538641f7d1cc5c68715971cee607da73":hex:"":int:112:hex:"07d68fffe417adc3397706d73b95":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,112) #1 [#1]
depends_on:0
2:exp:0:hex:"0724ee1f317997ce77bb659446fcb5a557490f40597341c7":hex:"":hex:"0d8eb78032d83c676820b2ef5ccc2cc8":hex:"":int:112:hex:"7da181563b26c7aefeb29e71cc69":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,112) #2 [#1]
depends_on:0
2:exp:0:hex:"be2f0f4ae4ab851b258ec5602628df261b6a69e309ff9043":hex:"":hex:"646a91d83ae72b9b9e9fce64135cbf73":hex:"":int:112:hex:"169e717e2bae42e3eb61d0a1a29b":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,104) #0 [#1]
depends_on:0
2:exp:0:hex:"583c328daecd18c2ac5c83a0c263de194a4c73aa4700fe76":hex:"":hex:"55e10d5e9b438b02505d30f211b16fea":hex:"":int:104:hex:"95c0a4ea9e80f91a4acce500f7":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,104) #1 [#1]
depends_on:0
2:exp:0:hex:"b40857e7e6f26050f1e9a6cbe05e15a0ba07c2055634ad47":hex:"":hex:"e25ef162a4295d7d24de75a673172346":hex:"":int:104:hex:"89ea4d1f34edb716b322ea7f6f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,104) #2 [#1]
depends_on:0
2:exp:0:hex:"627008956e31fea497fb120b438a2a043c23b1b38dc6bc10":hex:"":hex:"08ea464baac54469b0498419d83820e6":hex:"":int:104:hex:"ab064a8d380fe2cda38e61f9e1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,96) #0 [#1]
depends_on:0
2:exp:0:hex:"8c386d67d7c2bfd46b8571d8685b35741e87a3ed4a46c9db":hex:"":hex:"766996fb67ace9e6a22d7f802455d4ef":hex:"":int:96:hex:"9a641be173dc3557ea015372":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,96) #1 [#1]
depends_on:0
2:exp:0:hex:"711bc5aa6b94fa3287fad0167ac1a9ef5e8e01c16a79e95a":hex:"":hex:"75cdb8b83017f3dc5ac8733016ab47c7":hex:"":int:96:hex:"81e3a5580234d8e0b2204bc3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,96) #2 [#1]
depends_on:0
2:exp:0:hex:"c74620828402e0bdf3f7a5353668505dc1550a31debce59a":hex:"":hex:"cfbefe265583ab3a2285e8080141ba48":hex:"":int:96:hex:"355a43bcebbe7f72b6cd27ea":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,64) #0 [#1]
depends_on:0
2:exp:0:hex:"1eb53aa548b41bfdc85c657ebdebdae0c7e525a6432bc012":hex:"":hex:"37ffc64d4b2d9c82dd17d1ad3076d82b":hex:"":int:64:hex:"34b8e037084b3f2d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,64) #1 [#1]
depends_on:0
2:exp:0:hex:"50d077575f6db91024a8e564db83324539e9b7add7bb98e4":hex:"":hex:"118d0283294d4084127cce4b0cd5b5fa":hex:"":int:64:hex:"507a361d8ac59882":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,64) #2 [#1]
depends_on:0
2:exp:0:hex:"d9ddca0807305025d61919ed7893d7d5c5a3c9f012f4842f":hex:"":hex:"b78d518b6c41a9e031a00b10fb178327":hex:"":int:64:hex:"f401d546c8b739ff":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,32) #0 [#1]
depends_on:0
2:exp:0:hex:"6ed8d8afde4dc3872cbc274d7c47b719205518496dd7951d":hex:"":hex:"14eb280288740d464e3b8f296c642daa":hex:"":int:32:hex:"39e64d7a":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,32) #1 [#1]
depends_on:0
2:exp:0:hex:"80aace5ab74f261bc09ac6f66898f69e7f348f805d52404d":hex:"":hex:"f54bf4aac8fb631c8b6ff5e96465fae6":hex:"":int:32:hex:"1ec1c1a1":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,32) #2 [#1]
depends_on:0
2:exp:0:hex:"23b76efd0dbc8d501885ab7d43a7dacde91edd9cde1e1048":hex:"":hex:"75532d15e582e6c477b411e727d4171e":hex:"":int:32:hex:"76a0e017":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,128) #0 [#1]
depends_on:0
2:exp:0:hex:"94c50453dd3ef7f7ea763ae13fa34debb9c1198abbf32326":hex:"":hex:"1afe962bc46e36099165552ddb329ac6":hex:"b2920dd9b0325a87e8edda8db560bfe287e44df79cf61edba3b2c95e34629638ecb86584f05a303603065e63323523f6ccc5b605679d1722cde5561f89d268d5f8db8e6bdffda4839c4a04982e8314da78e89f8f8ad9c0fee86332906bf78d2f20afcaabdc282008c6d09df2bfe9be2c9027bb49268b8be8936be39fa8b1ae03":int:128:hex:"51e1f19a7dea5cfe9b9ca9d09096c3e7":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,128) #1 [#1]
depends_on:0
2:exp:0:hex:"c6a98102af3d875bcdebe594661d3a6b376970c02b11d019":hex:"":hex:"bea8cd85a28a2c05bf7406b8eef1efcc":hex:"f2f80e2c042092cc7240b598ab30fad055bce85408aa0f8cefaf8a7204f0e2acb87c78f46a5867b1f1c19461cbf5ed5d2ca21c96a63fb1f42f10f394952e63520795c56df77d6a04cb5ad006ee865a47dc2349a814a630b3d4c4e0fd149f51e8fa846656ea569fd29a1ebafc061446eb80ec182f833f1f6d9083545abf52fa4c":int:128:hex:"04b80f25ae9d07f5fd8220263ac3f2f7":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,128) #2 [#1]
depends_on:0
2:exp:0:hex:"ec3cc45a22fdc7cc79ed658d9e9dbc138dcc7d6e795cba1a":hex:"":hex:"b10d9c70205e142704f9d1f74caee0f6":hex:"714994017c169c574aaff2f8bad15f8fa6a385117f5405f74846eca873ca4a8f4876adf704f2fcaff2dfa75c17afefd08a4707292debc6d9fafda6244ca509bc52b0c6b70f09b14c0d7c667583c091d4064e241ba1f82dd43dc3ea4b8922be65faf5583f6b21ff5b22d3632eb4a426675648250e4b3e37c688d6129b954ef6a8":int:128:hex:"d22407fd3ae1921d1b380461d2e60210":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,120) #0 [#1]
depends_on:0
2:exp:0:hex:"5a32ebc7a2338038ced36d2b85cbc6c45cca9845a7c5aa99":hex:"":hex:"9afe0882e418c9af205eeb90e131d212":hex:"61ff8a8bc22803f17e8e9f01aff865bc7d3083ff413ce392a989e46ebed5114894de906f7d36439024d8f2e69cc815ac043fff2f75169f6c9aa9761ff32d10a1353213ac756cb84bd3613f8261ef390e1d00c3a8fb82764b0cda4e0049219e87d2e92c38f78ffac242391f838a248f608bb2b56b31bbb453d1098e99d079ea1b":int:120:hex:"fcbb932ddb0128df78a71971c52838":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,120) #1 [#1]
depends_on:0
2:exp:0:hex:"9bf22885e7f13bcc63bb0a2ca90c20e5c86001f05edf85d8":hex:"":hex:"99dec21f4781284722b5074ea567c171":hex:"9f4176dacf26e27aa0e669cd4d44bca41f83468c70b54c745a601408a214bf876941ae2ae4d26929113f5de2e7d15a7bb656541292137bf2129fdc31f06f070e3cfaf0a7b30d93d8d3c76a981d75cd0ffa0bcacb34597d5be1a055c35eefeddc07ee098603e48ad88eb7a2ec19c1aefc5c7be9a237797397aa27590d5261f67a":int:120:hex:"18fd1feec5e3bbf0985312dd6100d1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,120) #2 [#1]
depends_on:0
2:exp:0:hex:"cfd75a9d3788d965895553ab5fb7a8ff0aa383b7594850a6":hex:"":hex:"a6df69e5f77f4d99d5318c45c87451b2":hex:"041aeb2fa0f7df027cd7709a992e041179d499f5dbccd389035bf7e514a38b5f8368379d2d7b5015d4fa6fadfd7c75abd2d855f5ea4220315fad2c2d435d910253bf76f252a21c57fe74f7247dac32f4276d793d30d48dd61d0e14a4b7f07a56c94d3799d04324dfb2b27a22a5077e280422d4f014f253d138e74c9ac3428a7b":int:120:hex:"fd78b9956e4e4522605db410f97e84":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,112) #0 [#1]
depends_on:0
2:exp:0:hex:"b0b21ae138485591c6bef7b3d5a0aa0e9762c30a50e4bba2":hex:"":hex:"56dc980e1cba1bc2e3b4a0733d7897ca":hex:"a38458e5cc71f22f6f5880dc018c5777c0e6c8a1301e7d0300c02c976423c2b65f522db4a90401035346d855c892cbf27092c81b969e99cb2b6198e450a95c547bb0145652c9720aaf72a975e4cb5124b483a42f84b5cd022367802c5f167a7dfc885c1f983bb4525a88c8257df3067b6d36d2dbf6323df80c3eaeffc2d176a5":int:112:hex:"b11f5c0e8cb6fea1a170c9342437":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,112) #1 [#1]
depends_on:0
2:exp:0:hex:"8775665aba345b1c3e626128b5afa3d0da8f4d36b8cf1ca6":hex:"":hex:"cd17f761670e1f104f8ea4fb0cec7166":hex:"2ee08a51ceaca1dbbb3ee09b72f57427fd34bd95da5b4c0933cbb0fc2f7270cffd3476aa05deeb892a7e6a8a3407e61f8631d1a00e47d46efb918393ee5099df7d65c12ab8c9640bfcb3a6cce00c3243d0b3f316f0822cfeae05ee67b419393cc81846b60c42aeb5c53f0ede1280dc36aa8ef59addd10668dd61557ce760c544":int:112:hex:"6cdf60e62c91a6a944fa80da1854":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,112) #2 [#1]
depends_on:0
2:exp:0:hex:"cc9922299b47725952f06272168b728218d2443028d81597":hex:"":hex:"9b2f1a40717afcdbb6a95d6e335c9e4d":hex:"bcfca8420bc7b9df0290d8c1bcf4e3e66d3a4be1c947af82dd541336e44e2c4fa7c6b456980b174948de30b694232b03f8eb990f849b5f57762886b449671e4f0b5e7a173f12910393bdf5c162163584c774ad3bba39794767a4cc45f4a582d307503960454631cdf551e528a863f2e014b1fca4955a78bd545dec831e4d71c7":int:112:hex:"dd515e5a8b41ecc441443a749b31":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,104) #0 [#1]
depends_on:0
2:exp:0:hex:"5a27d718f21c5cbdc52a745b931bc77bd1afa8b1231f8815":hex:"":hex:"59661051912fba45023aef4e6f9380a5":hex:"2b7ce5cea81300ed23501493310f1316581ef8a50e37eaadd4bb5f527add6deb09e7dcc67652e44ac889b48726d8c0ae80e2b3a89dd34232eb1da32f7f4fcd5bf8e920d286db8604f23ab06eab3e6f99beb55fe3725107e9d67a491cdada1580717bbf64c28799c9ab67922da9194747f32fd84197070a86838d1c9ebae379b7":int:104:hex:"f33e8f42b58f45a0456f83a13e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,104) #1 [#1]
depends_on:0
2:exp:0:hex:"b83e933cf54ac58f8c7e5ed18e4ed2213059158ed9cb2c30":hex:"":hex:"8710af55dd79da45a4b24f6e972bc60a":hex:"b7a428bc68696cee06f2f8b43f63b47914e29f04a4a40c0eec6193a9a24bbe012d68bea5573382dd579beeb0565b0e0334cce6724997138b198fce8325f07069d6890ac4c052e127aa6e70a6248e6536d1d3c6ac60d8cd14d9a45200f6540305f882df5fca2cac48278f94fe502b5abe2992fa2719b0ce98b7ef1b5582e0151c":int:104:hex:"380128ad7f35be87a17c9590fa":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,104) #2 [#1]
depends_on:0
2:exp:0:hex:"d2f85f92092385f15da43a086cff64c7448b4ee5a83ed72e":hex:"":hex:"9026dfd09e4553cd51c4c13ce70830de":hex:"3c8de64c14df73c1b470a9d8aa693af96e487d548d03a92ce59c0baec8576129945c722586a66f03deb5029cbda029fb22d355952c3dadfdede20b63f4221f27c8e5d710e2b335c2d9a9b7ca899597a03c41ee6508e40a6d74814441ac3acb64a20f48a61e8a18f4bbcbd3e7e59bb3cd2be405afd6ac80d47ce6496c4b9b294c":int:104:hex:"e9e5beea7d39c9250347a2a33d":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,96) #0 [#1]
depends_on:0
2:exp:0:hex:"de7df44ce007c99f7baad6a6955195f14e60999ed9818707":hex:"":hex:"4d209e414965fe99636c1c6493bba3a3":hex:"da3bc6bdd414a1e07e00981cf9199371192a1fb2eaae20f7091e5fe5368e26d61b981f7f1d29f1a9085ad2789d101155a980de98d961c093941502268adb70537ad9783e6c7d5157c939f59b8ad474c3d7fc1fcc91165cdf8dd9d6ec70d6400086d564b68ebead0d03ebd3aa66ded555692b8de0baf43bc0ddef42e3a9eb34ab":int:96:hex:"24483a57c20826a709b7d10a":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,96) #1 [#1]
depends_on:0
2:exp:0:hex:"1dfa5ff20046c775b5e768c2bd9775066ae766345b7befc3":hex:"":hex:"2d49409b869b8b9fc5b67767979ca8cd":hex:"e35d34478b228bc903ea2423697e603cc077967d7cfb062e95bc11d89fbe0a1f1d4569f89b2a7047300c1f5131d91564ec9bce014d18ba605a1c1e4e15e3e5c18413b8b59cbb25ab8f088885225de1235c16c7d9a8d06a23cb0b38fd1d5c6c19617fe08fd6bf01c965ed593149a1c6295435e98463e4f03a511d1a7e82c11f01":int:96:hex:"23012503febbf26dc2d872dc":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,96) #2 [#1]
depends_on:0
2:exp:0:hex:"2df3ee3a6484c48fdd0d37bab443228c7d873c984529dfb4":hex:"":hex:"dc6aeb41415c115d66443fbd7acdfc8f":hex:"eafc6007fafb461d3b151bdff459e56dd09b7b48b93ea730c85e5424f762b4a9080de44497a7c56dd7855628ffc61c7b4faeb7d6f413d464fe5ec6401f3028427ae3e62db3ff39cd0f5333a664d3505ff42caa8899b96a92ec01934d4b59556feb9055e8dfb81f55e60135345bfce3e4199bfcdb3ce42523e7d24be2a04cdb67":int:96:hex:"e8e80bf6e5c4a55e7964f455":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,64) #0 [#1]
depends_on:0
2:exp:0:hex:"ce0787f65e6c24a1c444c35dcd38195197530aa20f1f6f3b":hex:"":hex:"55300431b1eaac0375681d7821e1eb7a":hex:"84a699a34a1e597061ef95e8ec3c21b592e9236ddb98c68d7e05f1e709937b48ec34a4b88d99708d133a2cc33f5cf6819d5e7b82888e49faa5d54147d36c9e486630aa68fef88d55537119db1d57df0402f56e219f7ece7b4bb5f996dbe1c664a75174c880a00b0f2a56e35d17b69c550921961505afabf4bfd66cf04dc596d1":int:64:hex:"74264163131d16ac":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,64) #1 [#1]
depends_on:0
2:exp:0:hex:"3a15541b5857a668dc9899b2e198d2416e83bac13282ca46":hex:"":hex:"89bf8ab0cea6f59616eeb9b314d7c333":hex:"4d2843f34f9ea13a1ac521479457005178bcf8b2ebeaeb09097ea4471da9f6cc60a532bcda1c18cab822af541de3b87de606999e994ace3951f58a02de0d6620c9ae04549326da449a3e90364a17b90b6b17debc0f454bb0e7e98aef56a1caccf8c91614d1616db30fc8223dbcd8e77bf55d8253efe034fd66f7191e0303c52f":int:64:hex:"8f4877806daff10e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,64) #2 [#1]
depends_on:0
2:exp:0:hex:"b61cdfd19c136ee2acbe09b7993a4683a713427518f8e559":hex:"":hex:"4066118061c904ed1e866d4f31d11234":hex:"153c075ecdd184fd8a0fca25cae8f720201361ef84f3c638b148ca32c51d091a0e394236d0b51c1d2ee601914120c56dfea1289af470dbc9ef462ec5f974e455e6a83e215a2c8e27c0c5b5b45b662b7f58635a29866e8f76ab41ee628c12a24ab4d5f7954665c3e4a3a346739f20393fc5700ec79d2e3c2722c3fb3c77305337":int:64:hex:"4eff7227b42f9a7d":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,32) #0 [#1]
depends_on:0
2:exp:0:hex:"ce175a7df7e429fcc233540e6b8524323e91f40f592ba144":hex:"":hex:"c34484b4857b93e309df8e1a0e1ec9a3":hex:"ce8d8775f047b543a6cc0d9ef9bc0db5ac5d610dc3ff6e12e0ad7cd3a399ebb762331e3c1101a189b3433a7ff4cd880a0639d2581b71e398dd982f55a11bf0f4e6ee95bacd897e8ec34649e1c256ee6ccecb33e36c76927cc5124bc2962713ad44cbd435ae3c1143796d3037fa1d659e5dad7ebf3c8cbdb5b619113d7ce8c483":int:32:hex:"ff355f10":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,32) #1 [#1]
depends_on:0
2:exp:0:hex:"5f659ed236ba60494e9bf1ee2cb40edcf3f25a2bac2e5bc5":hex:"":hex:"ad49f12f202320255406c2f40e55b034":hex:"6da62892f436dfe9790e72d26f4858ca156d1d655c9cc4336fcf282b0f3f0b201e47f799c3019109af89ef5fd48a4811980930e82cd95f86b1995d977c847bbb06ecdcc98b1aae100b23c9c2f0dcf317a1fb36f14e90e396e6c0c594bcc0dc5f3ebf86ce7ecd4b06d1c43202734d53f55751a6e6bbda982104102af240def4eb":int:32:hex:"cb4d8c1d":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,32) #2 [#1]
depends_on:0
2:exp:0:hex:"a73f318b1e298ba4ac0ab2aed74f73543b1017cccbd1b240":hex:"":hex:"abe33b7e8d88bd30deb96d1e90c4e951":hex:"6de616b000047b14b6759015183dd753c61499c0e665d06a89e4fb0cd0dd3064ff8651582e901ef5d0cdf3344c29c70c3aabc2aaf83cb3f284c6fe4104906d389b027e7d9ca60d010f06ef8cd9e55db2483d06552ddbe3fc43b24c55085cd998eae3edec36673445bf626e933c15b6af08ea21cbace4720b0b68fe1a374877d5":int:32:hex:"4a28ec97":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,128) #0 [#1]
depends_on:0
2:exp:0:hex:"73d5be74615bc5b627eedfb95746fb5f17cbf25b500a597f":hex:"fc40993eb8559e6b127315c03103ce31b70fc0e07a766d9eecf2e4e8d973faa4afd3053c9ebef0282c9e3d2289d21b6c339748273fa1edf6d6ef5c8f1e1e9301b250297092d9ac4f4843125ea7299d5370f7f49c258eac2a58cc9df14c162604ba0801728994dc82cb625981130c3ca8cdb3391658d4e034691e62ece0a6e407":hex:"eb16ed8de81efde2915a901f557fba95":hex:"":int:128:hex:"804056dca9f102c4a13a930c81d77eca":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,128) #1 [#1]
depends_on:0
2:exp:0:hex:"a249135c9f2f5a8b1af66442a4d4e101771a918ef8acee05":hex:"c62b39b937edbdc9b644321d5d284e62eaa4154010c7a3208c1ef4706fba90223da04b2f686a28b975eff17386598ba77e212855692f384782c1f3c00be011e466e145f6f8b65c458e41409e01a019b290773992e19334ffaca544e28fc9044a5e86bcd2fa5ad2e76f2be3f014d8c387456a8fcfded3ae4d1194d0e3e53a2031":hex:"80b6e48fe4a3b08d40c1636b25dfd2c4":hex:"":int:128:hex:"951c1c89b6d95661630d739dd9120a73":char*:"":hex:"b865f8dd64a6f51a500bcfc8cadbc9e9f5d54d2d27d815ecfe3d5731e1b230c587b46958c6187e41b52ff187a14d26aa41c5f9909a3b77859429232e5bd6c6dc22cf5590402476d033a32682e8ab8dc7ed0b089c5ab20ab9a8c5d6a3be9ea7aa56c9d3ab08de4a4a019abb447db448062f16a533d416951a8ff6f13ed5608f77":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,128) #2 [#1]
depends_on:0
2:exp:0:hex:"fa832a4b37dcb3c0879a771bb8ae734f0d88b9be497797a8":hex:"0f1105f9ec24121232b60b6ef3c3e8ca9eec1a3d7625004b857d1d77f292b6ec065d92f5bb97e0dc2fdfdf823a5db275109a9472690caea04730e4bd732c33548718e9f7658bbf3e30b8d07790cd540c5754486ed8e4d6920cefaeb1c182c4d67ebed0d205ba0bd9441a599d55e45094b380f3478bcfca9646a0d7aa18d08e52":hex:"70835abab9f945c84ef4e97cdcf2a694":hex:"":int:128:hex:"a459be0b349f6e8392c2a86edd8a9da5":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,120) #0 [#1]
depends_on:0
2:exp:0:hex:"dda216287910d1f5c0a312f63c243612388bc510cb76c5ba":hex:"d6617d583344d4fe472099d2a688297857215a3e31b47d1bf355ccfe9cf2398a3eba362c670c88f8c7162903275dfd4761d095900bd97eba72200d4045d72bd239bda156829c36b38b1ff5e4230125e5695f623e129829721e889da235bb7d4b9da07cce8c3ceb96964fd2f9dd1ff0997e1a3e253a688ceb1bfec76a7c567266":hex:"7f770140df5b8678bc9c4b962b8c9034":hex:"":int:120:hex:"9823e3242b3f890c6a456f1837e039":char*:"":hex:"b4910277224025f58a5d0f37385b03fcd488dfef7580eb5c270c10bd7a6f6d9c7ddc2d1368d68d4e04f90e3df029ed028432a09f710be1610b2a75bd05f31bae83920573929573affd0eb03c63e0cec7a027deab792f43ee6307fd3c5078d43d5b1407ac023824d41c9437d66eeec172488f28d700aa4b54931aad7cd458456f":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,120) #1 [#1]
depends_on:0
2:exp:0:hex:"c5afa1e61d4594b1c2fa637f64f18dd557e4df3255b47f24":hex:"5c772cdf19571cd51d71fc166d33a0b892fbca4eae36ab0ac94e6164d51acb2d4e60d4f3a19c3757a93960e7fd90b9a6cdf98bdf259b370ed6c7ef8cb96dba7e3a875e6e7fe6abc76aabad30c8743b3e47c8de5d604c748eeb16806c2e75180a96af7741904eca61769d39e943eb4c4c25f2afd68e9472043de2bb03e9edae20":hex:"151fd3ba32f5bde72adce6291bcf63ea":hex:"":int:120:hex:"f0626cc07f2ed1a7570386a4110fc1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,120) #2 [#1]
depends_on:0
2:exp:0:hex:"febd4ff0fedd9f16bccb62380d59cd41b8eff1834347d8fa":hex:"dc971c8f65ece2ea4130afd4db38fc657c085ea19c76fef50f5bd0f8dd364cc22471c2fa36be8cde78529f58a78888e9de10961760a01af005e42fc5b03e6f64962e6b18eaedea979d33d1b06e2038b1aad8993e5b20cae6cc93f3f7cf2ad658fbba633d74f21a2003dded5f5dda3b46ed7424845c11bab439fbb987f0be09f8":hex:"743699d3759781e82a3d21c7cd7991c8":hex:"":int:120:hex:"1da347f9b6341049e63140395ad445":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,112) #0 [#1]
depends_on:0
2:exp:0:hex:"d280d079110c1c826cc77f490d807dd8d508eb579a160c49":hex:"a286d19610a990d64f3accd329fc005d468465a98cfa2f3606c6d0fbeb9732879bad3ca8094322a334a43155baed02d8e13a2fbf259d80066c6f418a1a74b23e0f6238f505b2b3dc906ffcb4910ce6c878b595bb4e5f8f3e2ede912b38dbafdf4659a93b056a1a67cb0ec1dbf00d93223f3b20b3f64a157105c5445b61628abf":hex:"85b241d516b94759c9ef975f557bccea":hex:"":int:112:hex:"bbf289df539f78c3a912b141da3a":char*:"":hex:"b9286ab91645c20de040a805020fed53c612d493a8ce9c71649ae16bd50eab6fb7f3a9180e1651d5413aa542608d7ecbf9fc7378c0bef4d439bc35434b6cf803976b8783aecc83a91e95cea72c2a26a883b710252e0c2a6baa115739a0692c85f6d34ff06234fbdc79b8c4a8ea0a7056fb48c18f73aaf5084868abb0dfaa287d":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,112) #1 [#1]
depends_on:0
2:exp:0:hex:"5e80f87fa2156c62df7be2ad16c4890de5ee5868a684fcf9":hex:"c829073efd5c5150d2b7e2cdaeff979830d1aa983c747724ade6472c647a6e8e5033046e0359ea62fc26b4c95bccb3ac416fdf54e95815c35bf86d3fdd7856abbb618fe8fcd35a9295114926a0c9df92317d44ba1885a0c67c10b9ba24b8b2f3a464308c5578932247bf9c79d939aa3576376d2d6b4f14a378ab775531fe8abf":hex:"9769f71c76b5b6c60462a845d2c123ad":hex:"":int:112:hex:"394b6c631a69be3ed8c90770f3d4":char*:"":hex:"f886bd92ca9d73a52e626b0c63a3daa138faaacf7809086d04f5c0c899362aa22e25d8659653b59c3103668461d9785bb425c6c1026ad9c924271cec9f27a9b341f708ca86f1d82a77aae88b25da9061b78b97276f3216720352629bd1a27ebf890da6f42d8c63d68342a93c382442d49dd4b62219504785cee89dffdc36f868":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,112) #2 [#1]
depends_on:0
2:exp:0:hex:"d8a7b99e53f5e5b197364d4516cace4b928de50e571315e3":hex:"d0db0ac5e14bf03729125f3137d4854b4d8ce2d264f8646da17402bdad7034c0d84d7a80f107eb202aeadbfdf063904ae9793c6ae91ee8bcc0fc0674d8111f6aea6607633f92e4be3cfbb64418101db8b0a9225c83e60ffcf7a7f71f77149a13f8c5227cd92855241e11ee363062a893a76ac282fb47b523b306cd8235cd81c2":hex:"4b12c6701534098e23e1b4659f684d6f":hex:"":int:112:hex:"729b31c65d8699c93d741caac8e3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,104) #0 [#1]
depends_on:0
2:exp:0:hex:"c874b427b7181b0c90b887147c36f242827149324fd5c945":hex:"bdd90190d587a564af022f06c8bd1a68735b6f18f04113fdcec24c6027aaf0271b183336fb713d247a173d9e095dae6e9badb0ab069712302875406f14320151fd43b90a3d6f35cc856636b1a6f98afc797cb5259567e2e9b7ce62d7b3370b5ee852722faf740edf815b3af460cdd7de90ca6ab6cd173844216c064b16ea3696":hex:"4b8dda046a5b7c46abeeca2f2f9bcaf8":hex:"":int:104:hex:"fe1e427bcb15ce026413a0da87":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,104) #1 [#1]
depends_on:0
2:exp:0:hex:"56543cd6e2ebb1e3dc136a826bfc37eddb12f7a26430a1b4":hex:"d541dd3acec2da042e6ea26fb90ff9a3861191926423b6dc99c5110b3bf150b362017159d0b85ffea397106a0d8299ec22791cb06103cd44036eed0d6d9f953724fb003068b3c3d97da129c28d97f09e6300cbea06ba66f410ca61c3311ce334c55f077c37acb3b7129c481748f79c958bc3bbeb2d3ff445ad361ed4bbc79f0a":hex:"927ce8a596ed28c85d9cb8e688a829e6":hex:"":int:104:hex:"3a98f471112a8a646460e8efd0":char*:"":hex:"a602d61e7a35cbe0e463119bb66fd4bb6c75d1fe0b211b9d6a0a6e9e84b0794282318f0d33ec053f2cfba1623e865681affeaf29f3da3113995e87d51a5ab4872bb05b5be8ef2b14dfc3df5a48cbc9b10853a708ee4886a7390e8e4d286740a0dd41c025c8d72eda3f73f3cec5c33d5e50b643afd7691213cccccc2c41b9bd7a":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,104) #2 [#1]
depends_on:0
2:exp:0:hex:"caaf81cd380f3af7885ef0d6196a1688c9372c5850dc5b0b":hex:"6f269929b92c6281e00672eaec183f187b2ddecc11c9045319521d245b595ab154dd50f045a660c4d53ae07d1b7a7fd6b21da10976eb5ffcddda08c1e9075a3b4d785faa003b4dd243f379e0654740b466704d9173bc43292ae0e279a903a955ce33b299bf2842b3461f7c9a2bd311f3e87254b5413d372ec543d6efa237b95a":hex:"508c55f1726896f5b9f0a7024fe2fad0":hex:"":int:104:hex:"3b8026268caf599ee677ecfd70":char*:"":hex:"c4a96fb08d7c2eebd17046172b98569bc2441929fc0d6876aa1f389b80c05e2ede74dc6f8c3896a2ccf518e1b375ee75e4967f7cca21fa81ee176f8fb8753381ce03b2df873897131adc62a0cbebf718c8e0bb8eeed3104535f17a9c706d178d95a1b232e9dac31f2d1bdb3a1b098f3056f0e3d18be36bd746675779c0f80a10":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,96) #0 [#1]
depends_on:0
2:exp:0:hex:"2fc9d9ac8469cfc718add2b03a4d8c8dcc2eeca08e5ff7bc":hex:"bc84d8a962a9cfd179d242788473d980d177abd0af9edccb14c6dc41535439a1768978158eeed99466574ea820dbedea68c819ffd9f9915ca8392c2e03049d7198baeca1d3491fe2345e64c1012aff03985b86c831ad516d4f5eb538109fff25383c7b0fa6b940ae19b0987d8c3e4a37ccbbd2034633c1eb0df1e9ddf3a8239e":hex:"b2a7c0d52fc60bacc3d1a94f33087095":hex:"":int:96:hex:"0a7a36ec128d0deb60869893":char*:"":hex:"fc3cd6486dfe944f7cb035787573a554f4fe010c15bd08d6b09f73066f6f272ff84474f3845337b6e429c947d419c511c2945ffb181492c5465940cef85077e8a6a272a07e310a2f3808f11be03d96162913c613d9c3f25c3893c2bd2a58a619a9757fd16cc20c1308f2140557330379f07dbfd8979b26b075977805f1885acc":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,96) #1 [#1]
depends_on:0
2:exp:0:hex:"81ff729efa4a9aa2eccc37c5f846235b53d3b93c79c709c8":hex:"3992ad29eeb97d17bd5c0f04d8589903ee23ccb2b1adc2992a48a2eb62c2644c0df53b4afe4ace60dc5ec249c0c083473ebac3323539a575c14fa74c8381d1ac90cb501240f96d1779b287f7d8ba8775281d453aae37c803185f2711d21f5c00eb45cad37587ed196d1633f1eb0b33abef337447d03ec09c0e3f7fd32e8c69f0":hex:"1bd17f04d1dc2e447b41665952ad9031":hex:"":int:96:hex:"01b0a815dc6da3e32851e1fb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,96) #2 [#1]
depends_on:0
2:exp:0:hex:"068500e8d4f8d4af9035cdaa8e005a648352e8f28bdafc8a":hex:"98e32428d9d21c4b60e690a2ce1cf70bee90df31302d1819b7d27fd577dd990f7ffe6ba5ef117caac718cc1880b4ca98f72db281c9609e189307302dc2866f20be3a545a565521368a6881e2642cba63b3cf4c8b5e5a8eabeb3e8b004618b8f77667c111e5402c5d7c66afd297c575ce5092e898d5831031d225cee668c186a1":hex:"5ea9198b860679759357befdbb106b62":hex:"":int:96:hex:"d58752f66b2cb9bb2bc388eb":char*:"":hex:"2ef3a17fcdb154f60d5e80263b7301a8526d2de451ea49adb441aa2541986b868dab24027178f48759dbe874ae7aa7b27fb19461c6678a0ba84bbcd8567ba2412a55179e15e7c1a1392730ac392b59c51d48f8366d45b933880095800e1f36ff1ac00753f6363b0e854f494552f1f2efe028d969e6b1a8080149dd853aa6751e":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,64) #0 [#1]
depends_on:0
2:exp:0:hex:"7474d9b07739001b25baf6867254994e06e54c578508232f":hex:"1cbab2b6e4274caa80987072914f667b887198f7aaf4574608b91b5274f5afc3eb05a457554ff5d346d460f92c068bc626fd301d0bb15cb3726504b3d88ecd46a15077728ddc2b698a2e8c5ea5885fc534ac227b8f103d193f1977badf4f853a0931398da01f8019a9b1ff271b3a783ff0fae6f54db425af6e3a345ba7512cbf":hex:"3ade6c92fe2dc575c136e3fbbba5c484":hex:"":int:64:hex:"67c25240b8e39b63":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,64) #1 [#1]
depends_on:0
2:exp:0:hex:"d50d4c7d442d8a92d0489a96e897d50dda6fbe47ca7713ee":hex:"b36b4caf1d47b0d10652824bd57b603ec1c16f4720ce7d43edde8af1b9737f61b68b882566e04da50136f27d9af4c4c57fff4c8465c8a85f0aeadc17e02709cc9ba818d9a272709e5fb65dd5612a5c5d700da399b3668a00041a51c23de616ea3f72093d85ecbfd9dd0b5d02b541fb605dcffe81e9f45a5c0c191cc0b92ac56d":hex:"41b37c04ab8a80f5a8d9d82a3a444772":hex:"":int:64:hex:"4ee54d280829e6ef":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,64) #2 [#1]
depends_on:0
2:exp:0:hex:"38f3ec3ec775dac76ae484d5b6ca61c695c7beafba4606ca":hex:"49726b8cefc842a02f2d7bef099871f38257cc8ea096c9ac50baced6d940acb4e8baf932bec379a973a2c3a3bc49f60f7e9eef45eafdd15bda1dd1557f068e81226af503934eb96564d14c03f0f351974c8a54fb104fb07417fe79272e4b0c0072b9f89b770326562e4e1b14cad784a2cd1b4ae1dc43623ec451a1cae55f6f84":hex:"9af53cf6891a749ab286f5c34238088a":hex:"":int:64:hex:"6f6f344dd43b0d20":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,32) #0 [#1]
depends_on:0
2:exp:0:hex:"6db4ef061513ef6690d57aef50d8011e0dd7eb4432d82374":hex:"b7f9206995bc97311855ee832e2b40c41ab2d1a40d9263683c95b14dcc51c74d2de7b6198f9d4766c659e7619fe2693a5b188fac464ccbd5e632c5fd248cedba4028a92de12ed91415077e94cfe7a60f117052dea8916dfe0a51d92c1c03927e93012dbacd29bbbc50ce537a8173348ca904ac86df55940e9394c2895a9fe563":hex:"623df5a0922d1e8c883debb2e0e5e0b1":hex:"":int:32:hex:"14f690d7":char*:"":hex:"a6414daa9be693e7ebb32480a783c54292e57feef4abbb3636bebbc3074bfc608ad55896fe9bd5ab875e52a43f715b98f52c07fc9fa6194ea0cd8ed78404f251639069c5a313ccfc6b94fb1657153ff48f16f6e22b3c4a0b7f88e188c90176447fe27fa7ddc2bac3d2b7edecad5f7605093ac4280b38ae6a4c040d2d4d491b42":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,32) #1 [#1]
depends_on:0
2:exp:0:hex:"8901bec4d3c64071d8c30c720c093221e05efed71da280bf":hex:"7c447e700db7367260dffa42050e612eff062eb0c8a6b4fe34858800bcb8ec2f622cb5213767b5771433783e9b0fa617c9ffb7fde09845dafc16dfc0df61215c0ca1191eabf43293db6603d5285859de7ef3329f5e71201586fb0188f0840ed5b877043ca06039768c77ff8687c5cfc2fd013a0b8da48344c568fce6b39e2b19":hex:"9265abe966cb83838d7fd9302938f49d":hex:"":int:32:hex:"6f6c38bc":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,32) #2 [#1]
depends_on:0
2:exp:0:hex:"2c57eb763f886154d3846cc333fc8ae8b3c7c9c3705f9872":hex:"9fe7d210221773ba4a163850bab290ba9b7bf5e825760ac940c290a1b40cd6dd5b9fb6385ae1a79d35ee7b355b34275857d5b847bef4ac7a58f6f0e9de68687807009f5dc26244935d7bcafc7aed18316ce6c375192d2a7bf0bee8a632fe4f412440292e39339b94b28281622842f88048be4640486f2b21a119658c294ce32e":hex:"9b3781165e7ff113ecd1d83d1df2366d":hex:"":int:32:hex:"62f32d4e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,128) #0 [#1]
depends_on:0
2:exp:0:hex:"307d31a594e54f673bea2f977835670aca4f3d45c9c376cc":hex:"d7385a7bd0cb76e1e242fa547c474370bcc7cc7cf3e3fa37b00fe08a56383ca31d023d8c493f6d42e482b0f32e4f244dd100ea08eee6535e5bb8d27f76dbb7eead6ba8e031ccd0eaeb649edee92aeaf0f027d59efd4e39b1f34b15ceb8b592ee0f171b1773b308c0e747790b0e6ace90fc661caa5f942bdc197067f28fbe87d1":hex:"0bdaa353c4904d32432926f27534c73c":hex:"aa39f04559ccc2cae3d563dda831fb238b2582cb2c2bb28cff20cc20200724c8771b9805ef7464b8fc06c7b8060c6920fd2779fbc807c2292c8c1f88f8088755609a1732ff8c0b06606452b970c79997b985889404fd907c4668a0bcc11ba617175f4525523494a244da60b238468c863055f04db20ea489adf545d56c0a71d8":int:128:hex:"2ddda790aae2ca427f5fb032c29673e6":char*:"":hex:"0b92262759897f4bd5624a891187eba6040d79322a2a5a60fb75c6c6a5badd117abe40c6d963931bbc72dca1a1bf1f5388030fe323b3b24bd408334b95908177fb59af57c5cc6b31825bc7097eec7fec19f9cdb41c0264fd22f71893bcf881c1510feb8057e64880f1ea2df8dc60bb300fd06b0a582f7be534e522caadc4a2c7":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,128) #1 [#1]
depends_on:0
2:exp:0:hex:"23c201968def551817f20e49b09dbb5aae0033305bef68a0":hex:"77bc8af42d1b64ee39012df5fc33c554af32bfef6d9182804dcfe370dfc4b9d059bdbc55f6ba4eacb8e3a491d96a65360d790864ba60acf1a605f6b28a6591513ea3cfd768ff47aee242a8e9bdfac399b452231bfd59d81c9b91f8dc589ad751d8f9fdad01dd00631f0cb51cb0248332f24194b577e5571ceb5c037a6d0bcfe8":hex:"bd2952d215aed5e915d863e7f7696b3e":hex:"23f35fac583897519b94998084ad6d77666e13595109e874625bc6ccc6d0c7816a62d64b02e670fa664e3bb52c276b1bafbeb44e5f9cc3ae028daf1d787344482f31fce5d2800020732b381a8b11c6837f428204b7ed2f4c4810067f2d4da99987b66e6525fc6b9217a8f6933f1681b7cfa857e102f616a7c84adc2f676e3a8f":int:128:hex:"bb9ba3a9ac7d63e67bd78d71dc3133b3":char*:"":hex:"17d93c921009c6b0b3ecf243d08b701422983f2dcaec9c8d7604a2d5565ed96ce5cddcb183cd5882f8d61d3202c9015d207fed16a4c1195ba712428c727601135315fc504e80c253c3a2e4a5593fc6c4a206edce1fd7104e8a888385bbb396d3cdf1eb2b2aa4d0c9e45451e99550d9cfa05aafe6e7b5319c73c33fd6f98db3c5":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,128) #2 [#1]
depends_on:0
2:exp:0:hex:"6baec0669add30acb8f678ce477a2b171f89d1f41935c491":hex:"5712b84c4c97d75f84edd50561bc1d3f1ba451cc3b358b2403b5e528290954348cf7a235b4dc11a72ddbc503191204e98a9744d85419508c8ca76438c13305f716f1e239a6d9f6423c27217a0057aa75f6d7e2fb356e7194f271459ab5482589ea311b33e3d3845952ff4067dd2b9bcc2e8f83630b0a219e904040abd643d839":hex:"b1472f92f552ca0d62496b8fa622c569":hex:"5ae64edf11b4dbc7294d3d01bc9faf310dc08a92b28e664e0a7525f938d32ef033033f1de8931f39a58df0eabc8784423f0a6355efcff008cae62c1d8e5b7baefd360a5a2aa1b7068522faf8e437e6419be305ada05715bf21d73bd227531fea4bc31a6ce1662aec49f1961ee28e33ae00eb20013fd84b51cfe0d5adbdaff592":int:128:hex:"29a2d607b2d2d9c96d093000b401a94f":char*:"":hex:"beb687f062ae7f5159d07609dd58d7b81c478d180bc0b4c07ae799626ff1da2be2e0d78b2a2a1f563257f161491a5ac500cd719da6379e30d0f6d0a7a33203381e058f487fc60989923afbee76e703c03abc73bb01bd262ff6f0ac931f771e9b4f2980e7d8c0a9e939fa6e1094796894f2c78f453e4abe64cb285016435ef0e8":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,120) #0 [#1]
depends_on:0
2:exp:0:hex:"7b882a2df81fdb9275fb05d120f32417e8ffedd07457e938":hex:"0aae7213da279b34d6dcf2a691b2d0333112ea22de0c3c68d47cf9f9f4ed8ad4e03d4a60ec18c3a04ac9c2abb73e1023051029b5e8705bb69c4c50afc84deb0379db5077be1f663652f8bd8958271af2c1ac4a87e08cb526bab8a030652f2a29af8055d0f31e35475caee27f84c156ef8642e5bfef89192f5bde3c54279ffe06":hex:"5c064d3418b89388fb21c61d8c74d2c5":hex:"5bfa7113d34e00f34713cf07c386d055e889bb42d7f6c8631ffce5668e98cb19bed8820b90ecb2b35df7134f975700347e5514287cfef7ffa2b0ff48b1de0769b03dca6610995d67cb80052cb2e5914eb4ed43ef5861f4b9364314fde6ad2b82fbba7fd849dfa6e46ecc12edc8cabfff28d9bd23c2bcc8ab3661c9ba4d5fee06":int:120:hex:"0943abb85adee47741540900cc833f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,120) #1 [#1]
depends_on:0
2:exp:0:hex:"51d94d21482c00bb5bc7e7e03aa017ba58f5a23494b72c2a":hex:"3a9c69c1ed2340bfde1495658dbf4f54731a19b3922a1d535df8d0b2582f5e803b5891e8ad1aa256c923956dcda2430d0c0696bce63295fb61183e040566e459338f908d23ae51f64020c1ef3d192428f23312b285fc4111d50d1add58f4a49008a22c90d3365230e9158cd56f9d84f079bdd673555d4dc76c74b02fa9920e7d":hex:"fb21cd763e6f25540f8ad455deaccdf0":hex:"019d1db5569eeff83306f65d653b01064854c1be8446cd2516336667c6557e7844fc349adea64a12dc19ac7e8e40b0520a48fac64571a93d669045607085ac9fa78fed99bbf644908d7763fe5f7f503947a9fe8661b7c6aef8da101acca0aed758ca1580eeb2f26ae3bf2de06ce8827a91a694179991a993cdf814efbcc61ca5":int:120:hex:"a93bd682b57e1d1bf4af97e93b8927":char*:"":hex:"7093f44703f2cbb3d12d9872b07a8cd44deb62dae48bc573b11a1ee1c9f3105223423fac3181c312a8a61757a432d92719f486c21e311b840aa63cf530710c873df27fecda0956075923f1ecc39bffb862706f48bde2de15612930fc8630d2036e9e4cfc1c69779171bd23d9e1d5de50a9e0a0de4bd82ed3efc45299980bb4cc":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,120) #2 [#1]
depends_on:0
2:exp:0:hex:"e6756470937f5d9af76f2abe6df2d0bc15ff8e39b5154071":hex:"afae92bd56c426c095d76633701aa9bea5ce05490482c6c64ac24468c3e1af6e6030a6bb6649745b011c6729bde985b9242e22105322fbb8853dcabbd00165d0b07d7b499e0238b6513bf6351eb40635a798f7e6e2d31125dda45ffe8964596fdbff55df22d4e9025bd4f39e7c9b90e74b3ee58d6901f113900ee47a4df5afd7":hex:"4500193711a5d817a9f48deafda39772":hex:"92fa22dba0eee6b1de1ddd24713b1be44c7105df90e6e7a54dcbf19025e560eb4986ee080cf613898a1a69d5ab460a3b8aa2723a95ac4a4af48224b011b55fb7582ae18f6746591eab2bd33d82a8dbbae3f7877e28afef9857a623530b31d8198b2df43f903d6e48ddae0848741f9eaae7b5504c67ad13791818f3c55c9b3d1e":int:120:hex:"7d9f97c97c3424c79966f5b45af090":char*:"":hex:"62258d60f0138c0405df4b2ec1e308b374603a9eace45932fdc2999e9e2261de8b1099473d1fc741c46c334023aa5d9359f7ef966240aaf7e310d874b5956fd180fb1124cbeb91cf86020c78a1a0335f5f029bd34677dd2d5076482f3b3e85808f54998f4bac8b8fa968febceec3458fb882fc0530271f144fb3e2ab8c1a6289":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,112) #0 [#1]
depends_on:0
2:exp:0:hex:"30db73d46b518669c45b81bc67b93bed3d0864f7e9e8e789":hex:"750bc1d2f91d786bb1e621192a376f552538ba8c07d50d9e10b9345f31b3e5f9d8ad7c719c03d8548a3b184b741cd06c49d7fb6fe80258d60c01c2987c337c823211cee7c1cf82077266889bc7767475e0eeabb2ef6b5a1de2089aaef77565d40a1c2c470a880c911e77a186eacca173b25970574f05c0bdcd5428b39b52af7f":hex:"5069e2d2f82b36de8c2eb171f301135d":hex:"ef781dce556b84188adee2b6e1d64dac2751dd8592abc6c72af7b998dfae40cbe692a4cae0b4aa2c95910e270600550fca1e83640c64efb1eb0e0a90a6fc475ae1db863a64ce9cc272f00abac8a63d48dd9f1c0a5f4586224befed05be4afae5bd92249833d565cc6b65fd8955cb8a7d7bd9f4b6a229e3881212871a52c15d1c":int:112:hex:"a5100c5e9a16aedf0e1bd8604335":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,112) #1 [#1]
depends_on:0
2:exp:0:hex:"209f0478f1a62cb54c551181cbd4d24b796e95f3a06b6cb9":hex:"66db7cc97b4a8266c0a2228e8028e38d8986e79fcbcc3caff3050fdd2de87b7ff7a6895b988b0bdb7fcc4d6e2d538dcfaad43ce2f98b6d32500f5a6e6183d84cb19157a699cdde1266d6d75a251ee1a2eb97bfe6405d50be2b17a58ba6eafaee0a023a28d568fd1c914f06041a49c79b9df9efe63d56883cbbbeaba809273d2e":hex:"7be1768f6ffb31599eb6def7d1daa41c":hex:"9cb49357536ebe087e1475a5387907a9e51ad1550697f13c6cc04384ec8a67dea13376bdd5e26b815c84a78f921b506b9e2086de50f849185f05ba7c3041e49e42c0673df856da109a78b8e0ce918c25836f7e781e6b16168e4e5976d27ebc83f20b7bf4beadecb9b4f17a7a0d3a3db27fc65288a754b5031a2f5a1394801e6e":int:112:hex:"4d2ac05bfd4b59b15a6f70ea7cd0":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,112) #2 [#1]
depends_on:0
2:exp:0:hex:"1bfa30b315e7b908263330140fa2d66ed57104784a43cc70":hex:"8eeee9865e23fa51dbbf197fa41776b7edbdb9381a22c935299cd959a46190788ae82f4e645b0362df89bfc00241964784bc7ef70f6f97e81687d52e552a33af20ae34a3005e0a7b85d094368d707c3c4cd3ef31c0daf3ccaa1676609ed199327f4139d0c120977e6babceed28896d2cb3129630f3ee135572dc39433057e26a":hex:"b7081a3010b524218390ba6dd460a1ec":hex:"8c1f42b5931d69ae351fcde7d2b4136d4898a4fa8ba62d55cef721dadf19beaabf9d1900bdf2e58ee568b808684eecbf7aa3c890f65c54b967b94484be082193b2d8393007389abaa9debbb49d727a2ac16b4dab2c8f276840e9c65a47974d9b04f2e63adf38b6aad763f0d7cdb2c3d58691adde6e51e0a85093a4c4944f5bf2":int:112:hex:"4da85b8ec861dd8be54787bb83f1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,104) #0 [#1]
depends_on:0
2:exp:0:hex:"fc47156a693e59a1dea0618c41441fe669fc65dcfb7d0726":hex:"3e4f0a586bad532a08c8863ebba01fd25014baa907e6032ee43d4a7dfc7c3171916dcdf9faee0531f27527872ae4e127b6b9aaee93f5e74d0ab23f3874aa0e291564bc97f17085dd7d5eb9a85d9f44574e5952929eda08863b64c85dd395c91b01fe5bef66e3fa8f9ee5bf62c25d80dc84fbe002ecfd218430b26f3549f734a1":hex:"ea1935ed014883cc427983d7962d9992":hex:"0d85b8513becfe8c91d0f6ffb65ec31f2cf406c51c0da88893c43d1327fd8ad1f4bab2d7b5e27438d643397034a72f8666bf641b6781bc90f764db387eae6720b5723d510194570ccd773e1b3bebfc333cc099d078583e8dac60d174d332925a24a45110c8d2abe8924ea677ac74db66ea789e2838efc96c78bceaa6236c0a67":int:104:hex:"8781b045a509c4239b9f44624e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,104) #1 [#1]
depends_on:0
2:exp:0:hex:"b5fcd780a03ba80341081ef96b440c0e4348afde4d60c1d5":hex:"6316f3beb32f6f3bf8f2ff6a2c160b432bafd3036d3eefa1e4ec204f24892e37dc4d75c7ce9a24b5c49fb4df901f35ef9d5955f7dc289c56cb74753f4d6b2982267d5269d12237e21202a65061849c65e90e6702dda03a35ace3a3a098d16b4bfbb85b7232404baee37776a9b51af6b3059a5f170f4ebe4ecf11061ca3c1f1f3":hex:"ad20cce056e74ec5d0a76d6280998f15":hex:"28f8fcf23b9c1ba40c19ffc1092632e35f234c1e8b82bcd5309d37bf849a2ce401413d1f242cf255ed597f9a93a1d6e50676997f95aa612e580d88234a86ddc404292746f0b2f5cf15abebcea6659f998ec6a1cb5a9914fee5aa1aa5d04b3c20914e45095e4141ce9c173653dd91c3ebe4ed4a9a28f3915d7b2edba34c2a58d8":int:104:hex:"2ad4520ddc3b907414d934cc1d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,104) #2 [#1]
depends_on:0
2:exp:0:hex:"4382507dddccf1385fc831da8924147563416d0656e168ec":hex:"e5c5430b960aa35dc8540215c2772d66811270859e33dd4477904759e7e5eb2986a52a4ccc9f592e614147b5ea2ead6636a15c6426336b2995d9a31ab36d76578c3540bc6693842a4bc0491c7963ee9cda2317951cf93244bd30bcdfec69a4767004636fe7d1be7300c35e80627bab9236a075a803e9e1080b9159060c643a78":hex:"a37687c9cd4bdc1ead4e6b8f78bee7f5":hex:"fa9ae30509cbb6fe104c21480ae7b8ec9f12f1afb17320d77b77cdf32ce8c5a3f7f927e501118c7ccd6975b79225059cef530a4fcb0a9719f5e2d3bebe7bb6ec0855e495a31e5075eb50aa6c1227e48b03e3fdf780084ac4912eb3a5674cca9dd6ac037366b230ae631a8580d2d117942dee5d5ddbbb2233afeca53289cc4f68":int:104:hex:"4221818d4be45306e205813789":char*:"":hex:"b5b36719bc4d13a5fbf37188ea814cdf3c97a430784330540325c899570e15482300bc82c5b8163074e0544c5132e3ce93bba68bd7a8d2db81d1431b424b697c1158c4d70625666d5ff99145ca34856815c905b5a0fd95806df56b9cd5b384bda3e394b409048eb1037144cc071539c02397e931da28a43cc354d584643afd4f":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,96) #0 [#1]
depends_on:0
2:exp:0:hex:"7a66db3450dac9a1e63d2639f34c5c6a3fbfb3c8e8230199":hex:"6463a7eb2496379bc8a5635541525926a6f9fa718e338221952118ae4cf03a85f2074b4ebaf108b9c725809be1e6309c3a444b66f12286f6ea9d80c3413706b234b26372e8f00783819314a994c9e3ecf6abdd255cbfe01b3865e1390a35dcd2853a3d99ed992e82ec67ba245f088cb090adade74bdbc8a1bad0f06cbea766a6":hex:"21f8341529b210ade7f2c6055e13007a":hex:"1699bc8c198ab03e22d9bc4f3682aad335c6e35f3f616bb69769a9d5a202511797e770ae0d8d8528ef7b2bb25b4294d47427b43f0580fa71d93fdef667f4f4196f84e41c0b1978796d0de74a94420fb8571bff39137fa231c572b31be9ae72338288bef5f8c992121dc918538551f346e279a9047df14ec9fc0fd399cd3bd8d8":int:96:hex:"4af02b81b26104d1d31e295a":char*:"":hex:"53fe6a34d280f2c96d1ae2b2e8baf6abd67cedf7d214312f75dd4a1bec28a641dda3e71aa398726b2b0b1f515e1f4259ee97acaf17f122db9ec7814c2de6a88d36c3ac106396ad03d337c2cd2d2b9b4b7170e23a5848ca7ea129838f967dfdfe83b45ff2a9be699bfb2346115465d59f074f09e24d8fcbd9ece0018c92776c43":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,96) #1 [#1]
depends_on:0
2:exp:0:hex:"1f5c818f24d201f9fb23fcca211b0545eee5c5c9b440810d":hex:"9a7566817a06f792e96a6a2ba8e0a01f8837e2de06796e68b0782cc54ed0b04fc5e24a1ad37d5ffb035548b882d88150e89915b89f57cde2bf3c43ab9dae356927daef6bd61cc9edd5e1b7a4abea2f71313677f1b2fdf3d8d4a7e9814ea820fbc3e5c83947db961839a985a57ced7f5e4a1efffcfd17a2c806d4cdc1e79162da":hex:"3a163067bdd90fce0406d1c198a88771":hex:"a5e94e233d04fe0c4b6c4684b386902fe05096702237dfbe76f73befa69b6f30394cf9fe3358997942df65842748fb4f075a3dc06e147bd8d67fc4371113a4d75c70219257c650a6f38a136659e20a1cf3a119397835c304e0fb2a33aa3c3019175c86463043d5edc6992874f61e81cd0d26af8b62cf8c8626901d4f16d84236":int:96:hex:"b124eea927e2a62a875494a1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,96) #2 [#1]
depends_on:0
2:exp:0:hex:"9a301f7edf83da63bcf37216a3a33d7613331c3210281dd7":hex:"e09cc8543db7804870004706a26e94b457c125bd648b581a196f962f2ae8fa55d9bc66530ba5020e22d282080b4720dc9a2096a11c0fcc3d9a67cd1cf95cd7cd2417ba308c761e64be24347a14c9423447094a5c72a0043c288b35e753ba0aa748f208381249fb1c8d195a472192404b6c8172663ee4b4d4ecfa426e1fb003f2":hex:"d73a546b0fa307633ac89506fa86138b":hex:"f57fe548cf4a551a216ffb24a1dcf1b79c95f9abf06443fd58af042d287c2165db373c82a94172db517840f22e45e966e3ead91ce1ddad132bcb844e406e84b76a0b5b0ee23064b66a229f32a2d3b9c71103f020c4ba57fc0f0608b7114914cf2ada0c5a9bc4afbfa9ce5da320f34beb2211d569a142f53bfd262f6d149c4350":int:96:hex:"f536a3b8c333b1aa520d6440":char*:"":hex:"124a327a8c22b7652886dac2c84b8997ca8a6f61c9ba9c094b5aea41eaa050a6df6cbf280259e5466071bcfa53b4ebc76c3cc4afc8c0385189a5382933aa57c89aab78dca84331e0fe8f0aab3a7857d3e13f08dcd90ec5f0684f82088ef8eb7fd67e75de43b67afc3a0beb458f5ebd61b2c779e6c539d795c667bb7dcc2b762e":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,64) #0 [#1]
depends_on:0
2:exp:0:hex:"fd40e8226fd13cb95ba50b7cdf0f07f7ab7037cf8705ca50":hex:"75aa7df5c3c443d48ee998064b6fd112c20d2d90c98e00d025ef08d1ad3595385be99de47fa627549b827c48bc79eb1dcaf2f1be95a45f7e55755b952aee5ae0748e68bee1b014a628f3f7dc88e0ebac1d1d00e268355f5101838ce125c57003aebc02a1c9d6ae2cd6e2592f52c0be38cef21a680ae35c909cab99dce9837aef":hex:"3406e70cbe16b047fedaa537eb892279":hex:"390b18d22d5ecc0b5a524ae9afac6fd948ac72d1360775a88b385aa862cce8a27f3e4b420e539bec6e8958f8c1b5416c313fa0a16f921149a2bfeae29ad2348949b29a73970e5be925ec0c35218b82a020cf21bb68c6931f86b29e01b85500a73f3ee7eb78da60078f42550da83b2e301d151d69b273a050f89e57dfc4787cbf":int:64:hex:"69e06c72ead69501":char*:"":hex:"6e8d661cd320b1b39f8494836fcf738b0ab82873d3903c9ee34d74f618aea36099926b54c1589225ec9a9d48ca53657f10d9289c31f199c37c48fb9cbe1cda1e790aaeedf73871f66a3761625cca3c4f642bc4f254868f6b903e80ceeeb015569ace23376567d3712ad16d1289dc504f15d9b2751b23e7722b9e6d8e0827859f":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,64) #1 [#1]
depends_on:0
2:exp:0:hex:"a85ab87563b809b01725764d64ba4cc6a143e2e0362f0c52":hex:"ef43629721b50bd3656b7ae31b6e4b4ba1cf2c72ed0460ee7d9fb416631ddc597e5f9aebbcf4442b95cc46e28476a464dd87caf9c1c1d6c99d3e3e059dc23f8d2fe155ff5e59c50d640bc052c62adee3aa1295b38732e3458f379e98a8dbdfed04c22a5761792e87fa67ecbcbf3b90eb1bcd1d3f49e60132452f28afece83e90":hex:"9f991ff16a3e3eb164a4f819c9f1821a":hex:"df289511f78d8fa2505afc4c71ab1d7c31a8d15d1e5fcbb29d70f0e56f89c4d7b30f1b3b4745b5d2cc7af34fb4c95461372bf516ec192b400dc8fdb0ca9fe1f30f5320d0fadf20155cfcddcf09233c6f591c1c89917e38a003f56b94a1e2429d1f2b6297db790d7dce84d9fa13d2d86a0e4d100e154050b07178bee4cdf18126":int:64:hex:"dc4c97fe8cc53350":char*:"":hex:"ff0e531c7344f0425d62d5fbedf4bc8d3d5cc80647e67b852c1a58ad1516d376d954cb8dda739f6a4df3cf1507e59696610bcb6b34340d6313028e00d7197845d392e73331aaf168b474a67364d8f9dab740509fabf92af75045f0afabc1b5829264d138820952bbc484d1100d058a4de32b4ece82746b2b4a85fb2993d4add8":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,64) #2 [#1]
depends_on:0
2:exp:0:hex:"f4f1e03abb927ffd0b081b9dce83a56a6dd419a6313ac34f":hex:"0e70421499bc4bcb3851afa34cdf5be374722815abdd9bcee5f332dbe890bdc1c0210ab10667e5bb924bf3c1120e25a0c074da620076f143940989e222086d1b34a1200d09aea1f810ef6de7d8520c65eef9539fde5a6422606c588fce6264e5f91f934ede6397c4b307d2d7e07a518fce577a427fa92923cbba637ae495afad":hex:"d1e29bb51a3c4e871d15bb0cd86257e2":hex:"ae2911cdaaad1194c5d7868b6d8f30287105df132eb0cecca14b6e23ec7ac39cc01da1c567a0219cca7b902cc2e825e30f9524a473eb6e1d4d1beff5ab4f29103b2c7522a33dd33182fa955c4f09a75196b1072a6f0340fc55a802d29c7067f05219c21857ebff89ada11f648c1f28dfbfdaab56028f05509de17e2381457ebc":int:64:hex:"44f760787f7bc3c0":char*:"":hex:"2199fa5051461b67581429ab19de2ccb50b8b02e12c0e1d81a8a14929f84e09d9715b7d198e77e632de4af1c08c5041276204a7ed76646385e288e96e1a4b0b0f2b1a9df7f0892beaea3cb58d9632720158f6daa4cbbfc0ebdc56ff6a5175768ff2abd24cb7669bc3fe40f8aba7869d2dd7dac86b6ebc4e4ce261edbec88db17":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,32) #0 [#1]
depends_on:0
2:exp:0:hex:"33efe20433c6a1ad261a1fed494961749e5bf9d35809b59d":hex:"cfbeb61be50def25f513346498f75984bfe797a8ad56be34f2461e2d673f6ce14e7479a59777267b75dadc6b9522599ebe5d7b079495a58ca187ec47796f6ee8c322278ad7451b038c938928adcff6105a8ea3780aedc45b6a3323d3ae6fbce5da4fb59ca5ec0a16a70494c3c4859672348532505e44f915e0b9b8a296ef5225":hex:"dc94673b0c49c6d3b4611e278212c748":hex:"919f7397a6d03836423b7cac53177fcfbe457d4aa4348646f646aae1bc5a15568cdb8c96fabef278ace248aca531110a4f4f9e8ab0c32525ad816ae3facf03175232dc84addcd6065f9cc1f513966b63fd27e91a09f1921b95d6bd8f08f1dbce073bcf827847f774514b478b9d7fb5426847dd4dee6f39b5768c1fb729b32d03":int:32:hex:"c5098340":char*:"":hex:"c5e47d8c60b04df1974b68a14095d9bc8429a413d21960b15bae4fd7356bf7872e0da0a1a385ca2982d3aa3182e63ea4bb8ca01410cd4e71ddad34aa1f12c1387902b3d56634f89c619a2e6756648ab3bf90e9bc945afc9140eb935b633bae96bb067e9ee421697bcf80b14b1b88dbf13e010b472a7ca5411db36848b9c7a37f":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,32) #1 [#1]
depends_on:0
2:exp:0:hex:"3ed5dadefa0f6d14fedd1a3cdbab109f6660896a952ac5ab":hex:"aef617f69724e020309ec39d9587520efda68a8e303686c3a41ef700cba05b7c6e43e95aadb1a566f61650c87845835e789eb2366941e3bfef6d9846af0e0dbc43249117ad6f299bbc40669ac383cdf79289ada6ccd8ccfe329a0dc6a38eea1a99550457102d10f641cda50c21f533b1f981663f74a0a7c657c04d9fc6696ff4":hex:"553a14f1e1619f9d7bd07cd823961f25":hex:"eb8ea81d3e328a1113942cd5efd0f2b5e7f088791c8fc05690a34584101c4d493628ee7d0099a2865ac194b9124c3fb924de0c4428d0a1c26ea3ad9a0bc89187a16673e3b6f7e370dfb2dc26e8a56a9cf91f9c2088c020a766efe0d0c91689743a603f2cd1e300a6a84828b3b515a4b9a06e6bb20457bf124cd6ce4ac8b83d51":int:32:hex:"dc413c4c":char*:"":hex:"bc1f34991a48aabb0fea513f790f0d223e9feac4c99fa1e8427f01ab8b4b2827cfaf239342de36051a846af0306a3f82e7aed98dd0416fb078bc7f3b617b00ceb2cea4ddafc22dd022efa8303e9804510e0e888065d8427345156d823f796f74130c06db9f9934435552b4fefd051953e20ecba3a4514ac121d7d2097d597439":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,32) #2 [#1]
depends_on:0
2:exp:0:hex:"6d97e8bff3923a778504fb917dbc1428a1328587047697d9":hex:"dc1a81efd51e967767f5bdd7e2e425732c1d28451f2bf5bdf3f5a6492279330594d360dd8a193e5dbde1be49bf143a35c38bcd059f762ada65c5119e097f0976891347f4d829b087bd72daa3494b344cbd3370c4459ca243bd57aeda4cb86cdd0bf274f07830cdbf5e5be4eb9b742ddffef8aa35626d2b9ea0a29d3c3d058b28":hex:"0c28dc4cd53725091c2fb68a476c2e40":hex:"f3932f5e82d75a1e3eba1591c17769e1a45819ccf057c31e76fa810b93678766d25905e859775c244e96bcafbc75c4a2d95e7d02868ccb2f65e49276f0b645ac8cf6e3758402304a3c25ce2de0a49f401b1acadaff8b57589b45cc79130ddc8387f41cc383e33ef38eec019152051c756198d6f782ccf56297b9fe944269a65a":int:32:hex:"e6d6df7a":char*:"":hex:"39327836e9d8cfb59397adcf045a85644c52c3563290795811f26350c8bce8f55ca779cbcd15479efd8144b8a39ef611153955c70bf3a7da9d4d944c2407a0d735784fcb68de1083eebf6940ebc9cf92f9f139c01404b503ff64e61126a94e881351473507884357040fd32714b872c254349071069644e2bd642905521b944e":int:0
AES-GCM NIST Validation (AES-192,128,0,0,128) #0 [#2]
depends_on:0
2:exp:0:hex:"2c78e29971e90a01bb65973f81260b9344fa835751f5f142":hex:"":hex:"f1a23ce6e2bc9088a62c887abecd30ae":hex:"":int:128:hex:"d4d5c22f993c8c610145fcbe4e021687":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,128) #1 [#2]
depends_on:0
2:exp:0:hex:"8c582d5b6a40ef0e4048ec20f0263572d7cc82704e380851":hex:"":hex:"ef221a1c66fda17906190b7c99ab60b8":hex:"":int:128:hex:"6327dcb46ffb3d0fd8fbf3d2848a8f01":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,128) #2 [#2]
depends_on:0
2:exp:0:hex:"3a58abadd29e946e23ca9eb09af059913d5394971bda6a4f":hex:"":hex:"7c29b3196d44df78fa514a1967fcd3a6":hex:"":int:128:hex:"fc123944bbea6c5075a5f987aed9cf99":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,120) #0 [#2]
depends_on:0
2:exp:0:hex:"04bdde4c35c385783715d8a883640851b860ce0e8436ec19":hex:"":hex:"783f9a3c36b6d0c9fd57c15105316535":hex:"":int:120:hex:"23e21a803cac5237777014686564f2":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,120) #1 [#2]
depends_on:0
2:exp:0:hex:"4ba5fba0c22fbe10c2d1690c5d99938522de9c5186721bac":hex:"":hex:"2acc2073089a34d4651eee39a262e8ae":hex:"":int:120:hex:"7ac742c859a02a543b50464c66dcf5":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,120) #2 [#2]
depends_on:0
2:exp:0:hex:"f12890b0a8819faa5a8e0e487f7f064af42fa6d5519d009f":hex:"":hex:"c937615675738f4b3227c799833d1e61":hex:"":int:120:hex:"88300bd65b12dcb341f1f6d8a15584":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,112) #0 [#2]
depends_on:0
2:exp:0:hex:"51878f3630298a81297f4a21514fea637faa3815d4f26fae":hex:"":hex:"1f939226feab012dabfc2193637d15b1":hex:"":int:112:hex:"eed5fcb7607c038b354746d91c5b":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,112) #1 [#2]
depends_on:0
2:exp:0:hex:"ae596e74840a600556a06f97b13b89e38f67c152f1a1b930":hex:"":hex:"e2076e1050070d468659885ea77e88d0":hex:"":int:112:hex:"b4586bdbd4b6b899648f2333eee0":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,112) #2 [#2]
depends_on:0
2:exp:0:hex:"fd33b7a0efae34339ca987b5eb8075385fd1276e63cc8530":hex:"":hex:"2d07bb8616fc0bbb71755a1bd256e7fb":hex:"":int:112:hex:"6b60d645220cfde42d88296ac193":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,104) #0 [#2]
depends_on:0
2:exp:0:hex:"5685b12a6617d554c36b62af5b8ff2239cb3ffb1d2c40e14":hex:"":hex:"6c31194df99d08881fa5b1dd33b45a92":hex:"":int:104:hex:"69431593c376c9f8052bf10747":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,104) #1 [#2]
depends_on:0
2:exp:0:hex:"036ae037410dae9f0741608516d03b855c9c1851df8c54a4":hex:"":hex:"73599275f8237f14c4a52b283c07275d":hex:"":int:104:hex:"6f7249d25c9f273434c4720275":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,104) #2 [#2]
depends_on:0
2:exp:0:hex:"ac144f39ebd6124bad85c9c7fb4f75bff389ece2e8085d83":hex:"":hex:"d0871bfc3693245be478e6a257c79efb":hex:"":int:104:hex:"5a99d59631d0e12f58b7b95ccd":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,96) #0 [#2]
depends_on:0
2:exp:0:hex:"a8a541ff11a1b8548e832d9e015edeccc94b87dadc156065":hex:"":hex:"c72bb300b624c27cded863eba56e7587":hex:"":int:96:hex:"ea2528e7439be2ed0a0d6b2a":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,96) #1 [#2]
depends_on:0
2:exp:0:hex:"30dd8f400335e9c688e13cc0b1007bd21736a6d395d152e2":hex:"":hex:"28899601fa95f532b030f11bbeb87011":hex:"":int:96:hex:"35625638589bb7f6ccdb0222":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,96) #2 [#2]
depends_on:0
2:exp:0:hex:"cb8f672b04d706d7d4125d6830fff5d2ec069569bea050ce":hex:"":hex:"375d4134e8649367f4db9bdb07aa8594":hex:"":int:96:hex:"70610bf329683e15ecf8c79f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,64) #0 [#2]
depends_on:0
2:exp:0:hex:"bf71e5b1cd6eb363ecd89a4958675a1166c10749e1ff1f44":hex:"":hex:"9f502fb5ac90ff5f5616dd1fa837387d":hex:"":int:64:hex:"a4b5138122e1209d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,64) #1 [#2]
depends_on:0
2:exp:0:hex:"5b9d1dfb2303b66848e363793bdca0e5ada8599cb2c09e24":hex:"":hex:"2ee96384dd29f8a4c4a6102549a026ab":hex:"":int:64:hex:"3b33a10189338c3b":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,64) #2 [#2]
depends_on:0
2:exp:0:hex:"a35ae271f70ebacb28173b37b921f5abcad1712a1cf5d5db":hex:"":hex:"8d97f354564d8185b57f7727626850a0":hex:"":int:64:hex:"813d2f98a760130c":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,32) #0 [#2]
depends_on:0
2:exp:0:hex:"9bdd0cb826d5d28c2ab9777d5a0c1558e7c8227c53ed4c4f":hex:"":hex:"daf13501a47ee73c0197d8b774eec399":hex:"":int:32:hex:"a6d108c0":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,32) #1 [#2]
depends_on:0
2:exp:0:hex:"81b4d5ee4e1cbee1d8966fb3946409e6e64319a4b83231f5":hex:"":hex:"bc2f9320d6b62eea29ebc9cf7fc9f04a":hex:"":int:32:hex:"a47cdadd":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,32) #2 [#2]
depends_on:0
2:exp:0:hex:"5813627d26d568dfe5a0f8184cf561fe455eb98b98841fe0":hex:"":hex:"817199254a912880405c9729d75ed391":hex:"":int:32:hex:"d81d9b41":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,128) #0 [#2]
depends_on:0
2:exp:0:hex:"94f160e2325da2330fbe4e15910d33c2014f01ace58e5b24":hex:"":hex:"80a1b99750980bf2be84a17032fc2721":hex:"066fdd980cf043a732403ee5f65c82ca81e3fc858ad3cfa343014a8426fd3806770f127e2041efb42e31506ce83390ac5d76de2fe1806df24ce6e4bb894972a107ef99e51e4acfb0e325ab053f9824514b5941ab1ec598fbb57a5d18ed34d72992a19215d914e34ad1a22326e493d1ff2da7bc271c96ad3ab66d0c32bd711293":int:128:hex:"dd153cfd7aa946280660c445f586fa28":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,128) #1 [#2]
depends_on:0
2:exp:0:hex:"4785846f7c0524e78f3eb137fd433e1808af64549af69183":hex:"":hex:"5334476a5fa3fa50dcc4b12f8ac00b51":hex:"e70f82d1e3361ac5a5c9a087e47984d5533ba296f9b7e4a192a4ab28a833cdbbd5cece3415cf6fbb2f8055560b5c31c98d83d139954e1c03a464739f1eb5ad982c4371cf20b8984bbd97d5f40b336f5e96df3d272b95f7547be15c3bc05b3caac7d08c5eb5de8bdd246e74f6caa6bff76ea0417730ce72b911867f88fdcf73a0":int:128:hex:"c59231ddaae98e0e8db6b3fe8f4d3427":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,128) #2 [#2]
depends_on:0
2:exp:0:hex:"49b085fe1a8e1ae769ed09fc585d29eb24d589689992e6c5":hex:"":hex:"899878b0684fb865d30190821817b88c":hex:"f789eafe3d02826b619ca4fbca7bb1919e5c6f7c33824a2f7f815dc50e329979705f7ef61e9adf7899d34f1b8840384ff62ef6d29eea38c45d12be9249aca69a02222cd744d81958c6816304ff0d81d6714a2023b3dd9d940db5c50afd89c52774d28d6afde2b6c68425b6acbe34682531a2e57e2b9a7729b3e8d96a729b15cc":int:128:hex:"2c84bf7a8947ab93b10ae408243b4993":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,120) #0 [#2]
depends_on:0
2:exp:0:hex:"75847588760ecb6ca548747b743914c89fea367a5ccb81b6":hex:"":hex:"7d8a9fd254e2061c01e39eb574951924":hex:"b03c57dfd49152401a225357f1d6e533f3a423e5cfce07b8ae7ca9daf68645e5bd67b3ca2421eac447530b27c6dc6bd9c7f1b22441b8cc8c4ac26cec2c9c0d665a35b66d779a3772d714f802d6b6272984808d0740344b6abdb63e626ef4e1ab0469da521c7908b2c95a0fd07437c0e9d4d2451ae189ad61ff19f4efb405127c":int:120:hex:"e8aac14b53cdbc2028d330fc8d92a7":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,120) #1 [#2]
depends_on:0
2:exp:0:hex:"e3a18a96d2e45d2f60780dc39cee7160e28cb810bf09858c":hex:"":hex:"26a4d659665ded39b7a1583de756d0ad":hex:"83f8d9c58169b4c68032321197077ff5c8ee4ebb732b040748e1b55dcf53375ae86fb9646a672b5c5bc805a92c475cbb6d0ed689a58abdf2230250a7d3fbd8cfab07835fa85e738a7f74bc3e93616d844b1ec61b79f23dfea62e1815f295d43f61d7b5956103b31ca88afb0b3d37eb42cf77232dbf2258065232971c397dcbcb":int:120:hex:"dc034564d4be7de243ff059b5f9160":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,120) #2 [#2]
depends_on:0
2:exp:0:hex:"7be3909170ea7a2ff76f9f28241d8cc48ddeafa8517c6f8c":hex:"":hex:"8dee7e29350c60c5bcfec89da6617d2e":hex:"f6e9e7a7f9716760eb43060d5c80236a0f118b0f750ebd5df01fd2dba95c556ecd2e54a3f337767321abf569c8137a8e48c5b44037ba62951e9f9f709e6e4540a36d769f3945d01a20a2ed1891c415a16d95cab7ddf9bcebf18842c830067509a2a5d49a9684324c433d53824d2f8fd326b149af17f40e5bf5e49185738fba60":int:120:hex:"942b52277e9dc0a30d737d00f5e597":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,112) #0 [#2]
depends_on:0
2:exp:0:hex:"1fe413bafc4753e1511b580c830449bee56e0e5b9acb852c":hex:"":hex:"e30829f64f3eda13bfb2ac572aceb3de":hex:"6c772d08b4d7507e35804572fa697c646c77301954cc5c160941e49e230697ed8c23338b9f30c3ead69b1c1a2329ff025dcd3c0d0a9cc83fee4979448aa71ddb9d569bedc8c497a2a4ac3b60d087d7872f0a110bf90493ae7da03b0953734223156cd2d6c562e4a978a6dd5cdb229dd58dd4d0f50ac015f2f5e89dac4aa29a19":int:112:hex:"87737873b82586bb29b406946cae":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,112) #1 [#2]
depends_on:0
2:exp:0:hex:"b4bc4378d423931f9b320bb57df584c641406c1daa7448ad":hex:"":hex:"eca70e10c0358838a3f4a45c4b016ccd":hex:"68d1c045c1604e3c3dd4f7c7543240aca8dbc5266dc18c5a8071e8b09e3700b7cf819044b2722d8db92021f42a0afb295d7b16ecf4e4704a50a527a2e72d7f53617c358e3b7be3d7fecda612ce6842fcfaa68f2d1b8a59d8b8391779f2fab99f820862c94029f444abe62367c5de0a4becc359660e4a5366f7d482bdc362b866":int:112:hex:"06f95ca69c222a8985887925b15e":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,112) #2 [#2]
depends_on:0
2:exp:0:hex:"1cd4414ffd24e830e2dc49727efa592e430a6a75391cf111":hex:"":hex:"a08e32ad7d63f975de314ad2c0fa13fc":hex:"20a271f1f4c6bea8f1584ab39a7179ec448650e2ff67a7338d1bc9fab7f73b2ce5222cd07ded947d135d9d0670dc368f0a4b50ece85cbf641877f9fe0ac6a7e6afb32fdb1b3cd35360bb80cfffc34cfb94dbcbee9ca5be98a0ca846394a135860fba57c6f0125dcb9fb8b61be681ada31a997638ee172525c03dd13171534a91":int:112:hex:"c68842cafc50070799f7c8acd62a":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,104) #0 [#2]
depends_on:0
2:exp:0:hex:"9e0ef9ed5e6f00a721a9893e1f0d9079c5aa667a4cdd2a52":hex:"":hex:"5f015fd556e87ff0d0df586fb452306d":hex:"b82986135e49e03f6f8f3ce4048ded2e63ee0c31ddc84929e022ee8561159179b3bb4403ebdafdf6beae51ac5bf4abed4dbc251433417ece3228b260eca5134e5390cba49a0b6fcbbbabb085378374e4e671d9ba265298e9864bfce256884247c36f9bddceb79b6a3e700cb3dd40088ba7bb6ab6aa11b6be261a7e5348f4a7d1":int:104:hex:"ec9a79a88a164e1a6253d8312e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,104) #1 [#2]
depends_on:0
2:exp:0:hex:"9bc8f15d98e089d60d4db00808700053f78b33c31652c3e4":hex:"":hex:"5cc0ff9bb7d5b9b2aa06f6ecf669d5bb":hex:"24ac95a6ed2f78853f9ab20f53de47e7f662f72aea454141e2131aace7ed2daeb395bbccdbf004e23ce04ad85909f30151b6526c1ce7934726f99997bbab27055b379e5e43b80ad546e2d1655d1adad4cbe51282643bb4df086deb1b48c1bd3ac3b53c4a406be2687174028ecf7e7976e5c7a11c9a3827813ade32baef9f15ec":int:104:hex:"9779b7c3ece6c23d5813e243ec":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,104) #2 [#2]
depends_on:0
2:exp:0:hex:"19afc43a4481f796d77561f80b5b2e1514c96c5d1d86e64c":hex:"":hex:"d4c06595fefd4a81bbbd4b40c2e1989d":hex:"98fcca51352998d0126b5539e3fb9a238ac31c05954fc206d381909aee70983b6ab99d3f3efe8530a1c3cfe3b62756321b1d0771a5940055eba1e71fa64f29291aa5e5b0af0fcc8e6f5a02688d9e93417225eded791a35217822ffb346d3fa2809b65abe729448316be30cf661137d3c0e49846cb0df598d90eda545afb64a5e":int:104:hex:"ca82448429106009094c21d70b":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,96) #0 [#2]
depends_on:0
2:exp:0:hex:"b4fc31dcfef6203fdb296cc928c13b7df56bfe6f32583057":hex:"":hex:"6308a78dc8f3c90442dc52196649c38e":hex:"2567d80c253b080c0158102558551445d8ce4d5ddee2014a2be5cbad62e1717a0fd4d2059447c3151192951eb11a4a7b19a952f6ba261c87f10f4c9032028de3cc5a2a573a4e993a690fc8954daa3ec92743e7343e75b646c4fa9cbc3fceb4f5d59bb439c23754c4d9666fbc16c90c0cac91679b6ad1bfe5dcf6bd1a8a67c6b5":int:96:hex:"9d1603799e2485a03e7b05a0":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,96) #1 [#2]
depends_on:0
2:exp:0:hex:"1c2d9412486c381440213e1588b6bb58b0da53300b9d3089":hex:"":hex:"727ed8846daab874d5a9918b47d016f4":hex:"656430f0c1423018b5e2efbb1e32a5385c1a9a1779c4dbd585dea91edc39ea8752ebfc2d8064251a8a5ae71e1845f24a7e42c6371c2ecb31e2229d5f4923bffc21d4804575a84836f3cf90ec6047bb360b558a41a975ece111b5284dfa2441705a6df54fc66ca6cc1af9163ecc46902fac337d5f67f563fde8e8e7e64b8588b7":int:96:hex:"05ee6ce13711535864674a5b":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,96) #2 [#2]
depends_on:0
2:exp:0:hex:"abf7a97569427225a4bd5143c716a22e62f84c145bb51511":hex:"":hex:"e255088cdfe8ae5c9fea86d74d2f1b7d":hex:"b850993300f54d078f83ceb9aef7345bbf758f92365b6625c210f61dad4f2a2319f51d883a383a706392d3dfca1706eba585a6fac8bd4294c0bb2cb3f6b454d5c97819e8e5c926754840261b07ec4ef1f87cf281d75c187839689944230306e1903047915e086043990745864819ad713d34a244aa4e9d755fdb137105d7eed8":int:96:hex:"0c9c17388d0610f99d0a093f":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,64) #0 [#2]
depends_on:0
2:exp:0:hex:"45a6df655e88bc880acff41520aafd0cc8aa8aeb8952fd06":hex:"":hex:"1125e1de94970c9e7be70e58e7626ef4":hex:"fe9838a445b8edef19b3e9f33c8c0c265b3a12c97b8ec57ceb94f65ae5227177de38f1e338dccb2b24e5bd0f0eb8127f83eba0f1ddfa55198789df0cdd1d977fcb985ad9c7d51b96e749d2cf3cc7a1ec4dfcbc641a1a022d55def328e081af890a7e699f2dbafdf506389e045aa1219239d5868ba675a3925602b6fb6f6e6d37":int:64:hex:"1c3bd1e0d4918e36":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,64) #1 [#2]
depends_on:0
2:exp:0:hex:"279f4f2ab4b70778fdb9ca7800cd20e323601d7aa2c75366":hex:"":hex:"0f7b402560735cf03d5da58de5b6c685":hex:"7dd9a8c848bbcf5127161c8a419a436a0dad559f7c1613cdf41594e177016acb1ccf44be852185c42e7120902a42efe83855995ab52cf5c190d499fcfd698c671fd72949dc3ea7ddb874e586a3aa455a021cec7b5f8608462ca66f926aba76e60a5846d4eb204155cd3c1328da51ba35c3007b8bb394f34e3a8b81ddd2ea1115":int:64:hex:"dab612351f75e2cb":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,64) #2 [#2]
depends_on:0
2:exp:0:hex:"6716ab937755684af7403e6fba5452c1b11568a9047bb50f":hex:"":hex:"2fd5a446dd564619ef75b6e00905ffe0":hex:"20d261d3192996c21da69e979c26f5f937e6ea4cb7b05c6ef556ce4d86ca0fe85ec2425d274c43b5212fe9d27bb48b04e887461a9f45f524059b87eaea2e287a8d4537f338b0212012a9d4b6610e8c97dd554e0b3c3133e05c14d0ddab3524c93fd527e223b1996b4cff0a4a7438f1d54890bf573cd803941b69e5fc6212c5d2":int:64:hex:"f1d743b7e1b73af5":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,32) #0 [#2]
depends_on:0
2:exp:0:hex:"7dc94b5bbd6315ad8d2b67f0c683d10cf456f822a3ebb024":hex:"":hex:"6f3eedeb57dcf12bfb3cd80849893c90":hex:"ee1ff367f4b23c156e3dccff84ae4bf2b8ecec1fb5ffd25ccaa93b6c6834389bd79655bd4bac75238eb0f65d3603ecc57c8774798309e85b6677e78ed2077b712cf28795d0dc8fee994f97373a82338ef67c62378136a79a990ecbcd6367445e805efa98f9168826e57cb8dd7e7b1d5c89ad98358646fa56dd2a71c40e0275a1":int:32:hex:"4dc74971":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,32) #1 [#2]
depends_on:0
2:exp:0:hex:"3bbe223e253bf272599e28af6861013ecd0c88710947ed41":hex:"":hex:"4fbf09ffaffb600f0de38fb12315cab5":hex:"5388146f6479f7b3b280f45655a95b847ee27c734fb2fd91f6c009b1ab1810c772c7435d3221069f9490d251b76e740147906ac1db1c209c175b21aa10881c44fb307d4d2900aa3b1d56fb0edb9f2a58505653a17fee350e12755b9656bc65c78c1593d5cb7178e29f82209caf53e60fddf725f6957cc9718bf410c4a0229ed4":int:32:hex:"fb845ab7":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,32) #2 [#2]
depends_on:0
2:exp:0:hex:"461877813acfe6e9979eab729b52e3d192b3236758bb6563":hex:"":hex:"6985cf77b75a47a3978dd6412d59200b":hex:"385551854a89ab37063ba0ed911501b3d632153c5c2992e154c0a334bc36620476f11495437b842409e0954f7352cbf288d158bdbbaf72621ea2ce75b708bc276f796c5aa7fd0071e522c5f175a9e7787deef79f6362101aa3607b4588f2e1df7127f617c6073593a1c792b959e201e4a7a43ea8b1c3af026376439ef629266c":int:32:hex:"c840d994":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,128) #0 [#2]
depends_on:0
2:exp:0:hex:"09770f9114120a2c1c3cc416fe0eb8699e07141158a5bdff":hex:"875e2e5b5c02e0a33e71b678aa29c15ce18ec259cf4b41874893ed3112daa56ff2a7475681b8b3d9028ef184d30658e881c908f3588f69899962074db4ddfc0597f8debb66c8388a1bccf0ffe2cf9f078dc1c93f8191f920754442ad4a325985c62de1a57a25de4e9ed5c2fd0f2c8af33f3b140bac12bf60fdb33e0ec557955b":hex:"cff291d2364fc06a3a89e867b0e67e56":hex:"":int:128:hex:"81f1eb568d0af29680518df7378ba3e8":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,128) #1 [#2]
depends_on:0
2:exp:0:hex:"4fbf1c785c087ad06b43d4163cf9b9396deffd3712856379":hex:"96a690e5319c94d94923988025307e543f16fd970aec24524cf9808dc62b093359287251503f4231bf52cd1a16a80bfa82d8f585d96855dc1932f4919a92da2618d6448fc18a234f9acb386ab4ab4a9e38ea341e7c54faceff38c162d74e7fabbca13aadb71e9c8ae6072e7bef4073cf08aa7faaa6d639f98d15bad4ed183ced":hex:"1c8f41424acaf009996ceaa815b24ad4":hex:"":int:128:hex:"9f3c0349c5a4a740a82d6d63bf00fb17":char*:"":hex:"6100b091e52366fb422251d9b68974b6c666a62a8bb77a1ffd7c7d1ae586a6ee763b84dc11aace02a25af91d194b70b3265ec46872fded54275b7ddb26ee1f20c857328f46a694fb1dce68bcaecbd587ece5b505d658d57d50333e30b639eea1f6537b37c175f62497c6c84e3cfddae214285d2d68d90dd5cd8ce2273d25c8ca":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,128) #2 [#2]
depends_on:0
2:exp:0:hex:"3e0ce4fb4fe4bb2fdf97b23084ff5671b9b899624184acef":hex:"df89974b1534f0ba262bbea5efe39d8b72820cc8a720cc99520fedbf667515c3f6d8c3e25c72c48c1cff042171df58421741aacb2a49f23167257be7d7004d56b14901b2075eaca85946e9fbf1bbf4ae98227efc62bf255a25dd0402d37c67ba553531c699dd89ff797e7a5b5b9a9aa51e73ca2dacfda0f814152aa8ed8c79f9":hex:"a950ab0dd84115e3829ab0ad3bbb1193":hex:"":int:128:hex:"25cfde73e7a29115828dfe1617f8b53e":char*:"":hex:"847b54e176ccc83081cb966efc4b4a3bf7809ce0b4885009f620f61fafcaa78feee91a835ae6c1a942571811108b1e81b4c4ddac46aaff599c14988c9a1fb9f387ab7f1357b581568b7b34e167ac2c8c2b2b8a4df3fd7ad8947a363c1c0cb782ec54b1901e928821cf319669dd77eb37b15c67f13ad787ff74312812731ca3e6":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,120) #0 [#2]
depends_on:0
2:exp:0:hex:"6be3c66b20e5e66ababbfba1b38e5a716eafce23a1767b69":hex:"de1cd978354a499415176f260021abe0a8c5bc34d166f53d20e02e413e1377ce4ef5d7f58337c62251a3b4ddea0dea23c40e5de037fd5dd8a558eb53bffa4e8ce94899afa8284afab503c1a485999a154d23777f9d8a031b7ad5c6d23d6abbe3b775c77876ad50f6bed14ac0b2b88fb19c438e4b7eb03f7d4d3fcca90dd01260":hex:"3a2acf69bba19f5d1d1947af2cfda781":hex:"":int:120:hex:"f826d212f7c1212fb8a8bf23996826":char*:"":hex:"fd1f7b56e5664cf4c91e58f7c50f6c5e98e42ca2e4adcc00348cee6f662b382ad4022da54a47d8faeb9b76a24dfc4f493c27fc0bc421a4648fad7b14b0df95d8752013feb033b1fd971daa2c9a5df898bece6a3b8fa078dd130071df20a68cd0f394be25dcbb3e85bdfa0df4797fa6f01f5f0da7a6e86320207ddb5b3be53ae0":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,120) #1 [#2]
depends_on:0
2:exp:0:hex:"d16abb9f5b38d7f5abba9dc36995ce6ce928ed822a07b7c4":hex:"e72f29b1fc1dbfc2d93a0f3b79ea4b9806ce9b2c4d490ac5c0c3c793df9dc7df5471e834b84d18afa5a7516f9a6a813a9b65ae2f083a854730547e28a1f60fe97d8dba1d2d433e11847b9bffd8873ec634e64365530c905dd6f274e45c9795ac127a6f356f63cc6c116c5dd8c628e7e17e1fadc58f8452bf21f53c4133198118":hex:"3cd95429c6de1d327b9eb3c45424a87c":hex:"":int:120:hex:"13521236f190f78e75c0897c5fb237":char*:"":hex:"cd8bb97c28df092b6783ef653fd26f2bdc27c442bab0a4c7bee2789f389dcd1b280c0231672721bfbbc939a0449557678ec61ba0afb2e5817e6f7d94387f84ecafbfa1216d65e7f5025f47b0d2905cff7c99adf8306a3d9850c5908be05f87cb1d36a4837dba428aac97d7fbc18e3778f8d81a319259504c87fc94bd0766ed93":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,120) #2 [#2]
depends_on:0
2:exp:0:hex:"0bc344b1a4078807e5f53a6e7e1e36fa83108473ae2fb4c2":hex:"8bd73f94c71e3765bc7d17fdc90a9ba6aff9648b46300e4048985fbbd7c60c39c3766f7c524780bfc2296dc11e1132134921760a373104edc376eab6e91e9a60a5c4a5972935df12eadae074722bdc0147c3caf6a62fd449ef37d76b65f6d210283c94ac524cf13186e444d80a70b01e4373cc0462546f1caee6b49e738a742c":hex:"bd505fcba464e6e2c58fdf29f5695fb9":hex:"":int:120:hex:"8510fff71bb879f56ea2fe43f6ff50":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,112) #0 [#2]
depends_on:0
2:exp:0:hex:"c8097398fc21f93eea6a95aa93a3231096817b65520bc549":hex:"80b0abbaebbd537a0810ed75cd172d29d50f5982e4d01f8664ddb2dfda8f57fa0ed87e64a779a1d7f5e568b6acfdc739572a7176752307b430fb1fa1c3c2c346477cebe7d01b16745ca6c8929a7f446c03ad9a9e8a5a935de78ca6c701e8c1c5e6d2550c42949cf5342fb5ef4c6ab9bb02ace8388b16edf72a1237e5d1d0e820":hex:"776248381941e16908f52d19207881f5":hex:"":int:112:hex:"7fc4388b2f8eab0f0c2d6a08527e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,112) #1 [#2]
depends_on:0
2:exp:0:hex:"76d4bb5694faaf344db83bc6d6c47d56bb6ab52700826f2d":hex:"9e31fda6a171f0d4a5f2af2c4f827b1312d9dda5d78fa329b8f1b6373b9b29be358601e5bb0d0c615aef4b9e441c811219f1f2ff2d0ab23e0cd829a88b5b615ee72e5e3ea604fa26cc6438ec4c30e90f7348e9116adf8e8efb7498320d2da16679fa546b1aa9afc7720b074c4e48e06862d41428c9e71a4772c2e195a6f36978":hex:"603977845d82faccb401817ecce6e2fe":hex:"":int:112:hex:"c955a3bc316841be07e406d289c8":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,112) #2 [#2]
depends_on:0
2:exp:0:hex:"a3e5020695587984074d78d9c98b8e1a5719e5f88372740e":hex:"c0bfe3b2dc4dad17ec5a7662d86847fb67e582cc0baf469bc9baa7a075d48a8b97521a1072c2798bfbdae5ca3752eda1cb96fe5cf24af989eb77a2948aae3d8b70d83d93f84c49347f788480f34051621c358c03cf8159a70fc72cb8bc02876234ffe76b181da8b22b8796c87b0904da1af46de519c20d8d1b1dc7cc24e39ba5":hex:"4cd56de54e5140a587be7dfd02d3a39e":hex:"":int:112:hex:"1a29527a41330259f918d99d7509":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,104) #0 [#2]
depends_on:0
2:exp:0:hex:"afe986ead799727063958e2ce13ca846f76c51605439f839":hex:"7c1b354a5bb214bd95147e32d81e658705089c38035d0ea423eb1a5c82f97443c6903d2cf1ba7a007eec7c8ff98b8f82b073d9636a79bd47c7f2f639a8eb4e92076f9ed615766f43ac3a4f1687301ed7d507766605e0e332880ae740ab72e861a2cb6dce1df1ff8be1873d25845ee7c665e712c5bbe029a1788634bce122836c":hex:"f85a95ed10b69623162ab68d1098de94":hex:"":int:104:hex:"3cf1cdb4a4fdc48da78a8b4e81":char*:"":hex:"a7f252ad7983e7083260598051bffd83f40f4d4a8b580cc2388d720a0979dde71549ddcb86b0a62c4964fca591d0982f3a203f2f8884ff4991f17e20f759ea7125ba2bb4d993722f23938994eb2709c850f33ed9889e5a3966f9d7b76add46aedf230e8f417425f9db79ccd46b5660361de7c5d87f71a9d82c491c0c3daaf56c":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,104) #1 [#2]
depends_on:0
2:exp:0:hex:"2cfaa215841826a977ae6adfdd993346210c49dd04d5d493":hex:"e8eb3b6edd0ca4201b49a6a83036445aba1a1db040f3e74511363bce769760a9914e05a067f555ca15a57c6e02e66fbe4e04dd8c8db8d6d14ebc01cc7d84a20ff0aacb69bb3679d6b7d9d2e07deda7c2d4fe4c584fe1166e78d21dc56b9cdad93709c03b9145b887f87b4f605f24f989d5e0534fc71a58e8a8619ee99f69e5f5":hex:"537a4ee307af3072e745570aaaadce34":hex:"":int:104:hex:"df01cffbd3978850e07328e6b8":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,104) #2 [#2]
depends_on:0
2:exp:0:hex:"128ddc83d2170c403a517615056dceec0d19d6fd7632e738":hex:"cfe9f7797ee37bfc4f564419bf2268c964479efa7435970874154432930f3b2736438da4dc9c76200009651340e23044bc9d200a32acfd4df2e1b98b0bae3e9ff9d6e8181d926d2d03f89768edc35b963d341931ac57d2739b270ce254f042b64ceac4b75223b233602c9a4bdc925967b051440c28805d816abe76fc9d593f5a":hex:"5124b410c43d875eca6ce298c45994a7":hex:"":int:104:hex:"56ad9c1653f11a41fd649cccd8":char*:"":hex:"cf91f087fd7faf362caacf4a68cff51ec57b3075563e4ad0955df20b366e92bd75c3762cf4a6f0eb859872667a5c55aa5d94f5ac9479b1b9c9345b50f82379d551506a2ab02b0441b14b28b78a12b38500d703a8c19888fe612d4710eec7cd18c16d6a4b55d3c69760e2bed99efc8b551dbe2ac9b9b64715f87180b8e14d1795":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,96) #0 [#2]
depends_on:0
2:exp:0:hex:"98581c28983c4da321ce0c419cc0d476d539e77da513c894":hex:"bdef5b65b5111b29e781a6b71a0160179c52b5bccb1ac5c0377b26cf3f61432f3ccd67633a836357c24b5099db0510a7f8110f59e8227cacd11f17ea1798b5d4d68902ca6c6eccd319fef14545edd135078b38d43b61c9af269fc72f7a209ba7897e4c6dbd21bb71d7e93d2d2426ffa1557cae28e74059d3baf06ba419a47b39":hex:"ff10234524433b871202c2cca6acb194":hex:"":int:96:hex:"984943355a7aef15c4fb8033":char*:"":hex:"808e28bfd441cb8890416a757d252c986daa8d607ac9cadd2f4fd29eddbcf3b859ba298e14a4ccefe2c2752b123f87b98d6708fde48faca4bc7dd818a7ea76cfa4357932e59cb6be0e9283bdfb49454b86b9fd04aa8cdef503c65d13fcff42e9cd8f142f8c06cf7daa6d8ef8b9c9d69c39e8afd980048fecf731fd674b2a814b":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,96) #1 [#2]
depends_on:0
2:exp:0:hex:"167b8b6df8014c8f3de912b77f5a0c113580aa42d785298f":hex:"4f787de12ba907a589edf74c8e7a6cdaaabebddd465a86e170e1efc289240298b516fddc43c7fd9bb1c51720a4455db4dd630b59aebaa82bd578eb3cb19f8b23ee6897c1fefaef820430efa6eb7d6ff04de4d8b079605fb520b0d33e96c28f0cd71983c4ce76c0ea62fd7209d21ec7b416881d545824a73d1f9f8d3323fdb90c":hex:"49da91e926091a448d57d521cc90f3c0":hex:"":int:96:hex:"99198f55f9fa763651bba58e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,96) #2 [#2]
depends_on:0
2:exp:0:hex:"71f5f8505fba62f08fa0557dd5407fc83a852c6007ccecc8":hex:"3e19ec02365e450e946123a3362f9859352eb52902a6bcb8a782285dfac9d2b282f56302b60d6e9f53fddd16bbf04976cf4eb84ef3b6583e9dc2f805276a7b7340dec7abde4916fb94b0ed9c9af6d4917b27e44d25f3952d0444cd32a4a574e165a23fa8c93229ceb48345171a4f20d610b5be7d9e40dcf7209128f029fed6bf":hex:"b5efb9feae3de41b5ce9aa75583b8d21":hex:"":int:96:hex:"9604d031fa43dcd0853e641c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,64) #0 [#2]
depends_on:0
2:exp:0:hex:"4cdb38f8185a4186fc983e58a776a6454b92ecf0bffefe98":hex:"1ca72c50a093076e9a9dfa09888b9c89eb36a942072fc536a81713f05a2669b39fdb2871b82ca47dcaf18393ca81dcb499aafcc4ed57ea79f8d4f9bd63540610215b2c65481b294638cec41264a7fdca4230df5fe1e7e3d8d26dcd0c435fec8e9bf778f9e6f13482157a9722761601e08425f6160d3bb626ae39ee1117b0353c":hex:"aef257dd44d14d0bc75f9311ef24e85a":hex:"":int:64:hex:"d951becb0d55f9fb":char*:"":hex:"2eaa7e922dbd8963e2078aae216636276f3f7cb5d7f35fa759e91bddb6e247a93c388241ba1d0d37040c0b9e447c67d35b4991c1acce97914f3bc22ee50171bc5922299983ee70af79303265bc1ae1e7334202460618b4a8891d1a7eaaac5cac1e4dce024ce662d14849993f89e771fb873644b552120fd346250df39aaaa403":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,64) #1 [#2]
depends_on:0
2:exp:0:hex:"ee8d3aced3aa3cb2166aa66c4a252c12dc0978830d0bc75b":hex:"ee69b2421d43a9f383d99f9802ba4d6cf1c537b42041c86cce681049bb475e5098d4181f1902b0a49c202bf34ef70ea7b787fa685ab8f824fcc27282146d8158925bfef47ccba89aa81c0565eacb087b46b8706c9f886b7edf863701003051d6fb57e45e61d33412591ec818d016eec7dee4254636615a43dacb4f1e6ec35702":hex:"c15c9c0b0b70c7321df044bfde2b15fb":hex:"":int:64:hex:"c5c9851a6bf686d0":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,64) #2 [#2]
depends_on:0
2:exp:0:hex:"4a8538d609444e3197ab740cd33b66db1cf53600096b94e0":hex:"8c2b8fb775d1b21c41a3dcf48ad6d68ab05be3879f9b94b305a6ce4d799e3a992c1c3a65a3e4eab563edb57424927c90c76e49386e29dd5e7de2800fcc0eefbc8b4f977f71be3754c006ee93dc09b1cfa59c424b6b3987aeb56feefc21004c63e8284b6845e395bc8843cca0917267fb4a8f2db1f7daafe7a9da95083a44de70":hex:"0bd64d222532dae8ab63dc299355bf2a":hex:"":int:64:hex:"3477cad1fd4098b2":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,32) #0 [#2]
depends_on:0
2:exp:0:hex:"447f0f065771b6129952e52206a64fe0844658ed685e39cd":hex:"fea5d227869e527882c63a68a6623f4a699df82b3dc715c7260a5554336df8376744c05ae89ec27d40da02d9f1c5e9e29405579fd4132143cb21cdbe3edfaaab62128ecc28018725c8dd309d2376223d2e2edfea9765699b2630ff5d9fe9bec416c0ca6418b938d195d31a08e4034c49d79e3a249edd65f985230b33c444dd02":hex:"37e3a300542d9caf3975c6429cb8a2e8":hex:"":int:32:hex:"06bfca29":char*:"":hex:"e1bdd1c212b159b87e41a5f64dcba6b27aa0f5c8871fabfb588df0e06bd7730ec1beb0e3388f96c992a573ff69b34870f83c53fb65b420c1c6f92e2aa6f03917e8203d77c7f5ee08baf9fab12f9d38fc0ffb83807ba781c3dd7b62edca2121f68ef230b42b8adbd4cea072209d02713789ed559b83739a54cfde69e68bdc4128":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,32) #1 [#2]
depends_on:0
2:exp:0:hex:"f465e95f6fc19fe6968b98319b547104d0c01c17105f8fc0":hex:"2426f108368a00d2a49670a3b64b4f0569c6da9660163e7b209ec3f8d058ee11f7818a8c5030c5f4ce6e1e5a93faa3e5ae3d0bd5d712fbc891cfeb20845707edcf5e29719a5246a3b024fb12d37bd1b81df3812fd50b1dfb3e948ce546dd165cc77f903c07fe32bc7da7fbc25036679017317ce94cd8a00c1bce7379774f1714":hex:"6cba4efc8d4840aa044a92d03d6b4d69":hex:"":int:32:hex:"92750ac9":char*:"":hex:"2e59b104c1a6f6d651000396adbfa009bf4cf8cbf714da8e4d3b4a62bd7f522d614decf090c7552a4b9e8d7ee457ba642d5100c0c81c14cbba8c8ff49b12827f6ebd41504ccb6dfc97cdf8532d1f7f7e603c609efa72d2ae0dce036ec4ab36849a0c06f8737d9710075a1daaed3867ca0a7e22111c0e7afae91f553b6fd66c6e":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,32) #2 [#2]
depends_on:0
2:exp:0:hex:"f08e3e9f7b3a20ccdc4d98b56f2b567399a28a6b3908deab":hex:"a986e816f1eafb532c716a555cca1839a1b0523410134ea0426ab309520b339fc1fdeb40478ae76823cee4e03b8d3450e6be92d5ff17b2f78400f0176e6d6a3930bd076a7a3c87c3397dcc0520c6b7b4ff9059ea21e71c91912a74aac2ca70eec422b507cc5c60860bb8baca01eec2a3003970ba84011efe576804b2820e306c":hex:"4f4636d1b283bfa72c82809eb4f12519":hex:"":int:32:hex:"16c80a62":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,128) #0 [#2]
depends_on:0
2:exp:0:hex:"87b5372571fb244648053c99405999130f87a7c178052297":hex:"ae078d1554fc6a14447a28c3dd753e790f7ef9b53e35c3e0fe63a7b1b326bc56034847f8a31c2d6358049aae990bfe7575b439db370aa515e225e0ec730488c700a7b0a96a7b8e4e8e4c6afec20decd16fe3c0f3f8d7a6cf7a8711d170829d14c706cceb00e133b8c65c8e08cd984b884662eddd2258ce629abf6b9dd28688c9":hex:"a1cc81b87bd36affe3af50546e361c9e":hex:"684ce23f59632308d7db14f7f6eddaf4d83271fb0c27401b09518a775b36252540f14305f0dae13ff6c0dc565c9e570759e070c8ac73dfb97abd3285689a7cdcfc941f6271be3b418740b42ba4a114421065a785be3dfa944c86af56da8209779e8736e62529c418b507c6d8ae002cbc0431747722afd64521734f99273de455":int:128:hex:"98177b3428e64bc98631375905c0100f":char*:"":hex:"8be7df33a86b1162464af738de582a357d0ce8e213bba1b7913c0d13ad759d62c3bf4366f5130b3af2b255b7ad530b4977627f9e76b07e360c079d0f763dabbd22e976b98cd5495c6182f95bc963aad4b719446f49d3a448d11cac5bfcba4b675b8e4d88a389e2580e8f383f95bf85c72e698680d2a2bc993c9ee1ce0d1f1ac3":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,128) #1 [#2]
depends_on:0
2:exp:0:hex:"a2d069b826455d5e79e65db4f1d2b6a29ae9f401bc623917":hex:"acd6225dc5b9109d56ea565ab38dd4db432a7ec08f0db04f1c6b691c96d2eaaa6be62da7cc7fd75f931716c7f39705ea7cf828f1a5a325955e9b2c77e7fb2d562be6a89b3351b1b3d1355b43b73ed425049430314c16bf0836ed580e9390a3b8e2a652fddbfa939ca4c3c99765b09db7f30bf2ef88e1aa030e68958722cb0da3":hex:"6d40a0c7813bc0410ff73f19bb5d89c9":hex:"9960376b1898618d98c327c1761959d045488cc6198238bbe72662f276d47b41e8aebc06dbce63da5adcb302a61ade140c72b9cf9f6dfad6ecedd7401c9509fae349d3c7debe35117776227ba167f2b75921d7321d79f4ebca13d20af1638a1567043365f179f4162795fe4fd80b5d832e4ca70e7bf9830bc272b82182f70d2e":int:128:hex:"010195091d4e1684029e58439039d91e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,128) #2 [#2]
depends_on:0
2:exp:0:hex:"f3252351fe8e7c628c418c1a49709bf1f8e20add82539948":hex:"7e8d2816d280c91d232bad43b6610e2d0532a9f670f221a3a975fb16472c2e83b168115e87a487bcd14b37f075e1faa59c42515c353cdefc728ac617b7d273fa96778e3fb5f7a1132f8e2add4a57015b15d1984338b7862356243d1c5aa628406f4a507498eda12d2f652c55e8e58113ed828783b82505790654f036b610f89a":hex:"eacd2b1c3cf01bf4ea7582d8ee2675d5":hex:"141cb39a2fb8e735e0c97207f1b618a4b98f6b9bf8c44a1c8e9ea575a7759cc2a02301274553e7744408b2c577b4c8c2a00e18f8717fd8a6d2f46a44eeb05d685fbef7edeb4229e7ea9b8e419ffcb504d33583b3ae421c84caeca9f9789047dd7b1810318d3765307233567bc40e003401c9f4e1b07a2a7162889e1a092aedc1":int:128:hex:"63a310b4f43b421a863fb00fafd7eac4":char*:"":hex:"699c146927ae29025e5b20088b20af27bc75449e4725ee6b7d5dc60b44ba8a06f7d265330c16060fbd6def244630d056c82676be2dc85d891c63d005804085c93ce88f3f57c2d2c0371c31027d0a4a0031e3f473cb373db63d4ff8f65be9ebe74045de813a4e6c688110d000f6b12406881c08085c9348e1f0315038907e33f7":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,120) #0 [#2]
depends_on:0
2:exp:0:hex:"e462957f2c500bf2d6bfa9af97938fdd8930e360ea4175e7":hex:"82a7a6dd82a5ea3d9a8e9541d854978487eda298b483df02b45c76b8b38bac98ffd969dd160a2765595b19d4ea3e64351ce95764a903f595dd673d13facf5a5594e01be1d60a0c6d28b866a1f93a63a74fecb6d73ac6fb26b20c008b93db53e9dc1d3e3902359fd47734fe22a5c6958f97e9001cc4e8b6484d9542dbbdfcfcdc":hex:"b380584a3f4e0e59add4753c282f2cf7":hex:"682b0af6592eef173e559407e7f56574c069251b92092570cbb7f5a2f05e88bed0af48dcda45b2930b1ee7d5da78dc43ec3598a38593df7c548058eda3c9275c1304489aff95f33a6cd79e724e8d12ca0ae92b20273eb3736efcd50dc49e803ad631dcbf64376a45a687eb4e417aef08a3f5f8230d3f0b266ea732c21ed2eed7":int:120:hex:"28a43253d8b37795433140641e9ffd":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,120) #1 [#2]
depends_on:0
2:exp:0:hex:"4a62ddd87f41c6df756e8da0985dcd8c91e73ba395b3d79b":hex:"37a83ee6dbdece212446739ea353cb957b9aa409c88bee042bbc3a6e5199aeb28f2b4b00ff433c0c68d6db5a197566019db8a4c7a792e2839a19a302ee02bee046adce04c1fbbd5b0c457d7cbe277992ce2c153d132269e2d1f12b084cf3026a202b4664bc9d11832e9b99c7cc5035dcfde5991dd41aeb4fbf8bec5126a9f524":hex:"1d1843e2118772d76a0244a2c33c60bd":hex:"028b92727b75b14cb8dfeb7a86a7fec50cd5de46aa4a34645754918b8606819d4bf8a2e7531a05ae5505492ca6cbc8c0e6d6ab2dea23bff1fdf581bb780b4a3312aa39639383fd10bcf92489801954733f16b021c2e84809345216f8f28a99773341e40c4a64305a2098eaa39f26a93bd556c97f02090e1a6c181a4e13e17d3a":int:120:hex:"ab738073228bdf1e8fd4430b5c7d79":char*:"":hex:"e702f1bb9a1f395c74fca0ce9cdf29e7332c14acaca45200cd432a5767be38929ef8de43d0e1a5e7300c1eb669ac1ab997b31cb1403af8451e77e63505920af0f8c3abf5a9450ea47371039ba1cf2d65a14fa5f013b7ce1d175859404dcf6461a36e8bc260e7abf739d8951ddf1a3754e2d65e0aa31320a5ffca822023bc0906":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,120) #2 [#2]
depends_on:0
2:exp:0:hex:"fc46976d38a581a7042a94ea4b5bfe3587ddc65d1162d71e":hex:"4b9e858fc8f01903e426112192d4ae4686b1ae4d683b75afb2b8c63590275943d0d6d6a23b6d35796a2f101203acba107474ca6f4ff6dd87d6b77785ad1d160ef2755d84092dc70c86db5e639b689943b15efa646aff44b3f51f5d3f4cf6c8f7fc5adfe7bf2d72f75b93b8ee94ef3fa69ea0fc0bb77b3983901fdcd30bcd36f5":hex:"b5e92563dd0339df00b7ffa2239d21bc":hex:"7b6f6e104acbcd7188161477d8e425ff99add22df4d22de7f28d0a0075ca4ef848f68d07ed22d3165c08e40890ce04d1bd05b1a6ccb2fec8193d5f7dffc93d97a0c036b3748f708b011b68247a0249b9e1a60b652164e5c2fd7210377de804ac010c8aa08a11f40af97e8370a59f936cd14c22ea7a236d904145adc04a241fc0":int:120:hex:"d4356cb417953b01f7b1110c8aa3eb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,112) #0 [#2]
depends_on:0
2:exp:0:hex:"403e49feadd4db763652ed5c4b1e12680cfe0abc30f4696d":hex:"221c61d769febce3913bfead9a201a805f11005ddcac185cbae00ce749de9c4362889b1b0d9546e91598e0ddedb88b673a90acca65d7e71a85636be052f361839a646dc8b834c02f3e2261d370e6bac9636b7536225b5ea77881200c8a3450d21bfd1e11afb3a470e178ecfe944a25a7cd0254e04a42b67723aac8afffd56fee":hex:"1a60258a56e15f92814b4d372255a80d":hex:"a4ffa9e3c612103224c86515dad4343cbca7a7daf277f5828670834f4d9af67b9a935c71b2130dfbc929c4409bffb7974ffa87523b58890770439c33342880b33319c626bf776c1c0aeb9c2a348a7681572f4ff711d94c192f3450e8b1275f9d02c742a2c9f1da316e9918bf787f22699172986cb9b10fc56d5f6b8392ff92b8":int:112:hex:"62646fc8bfe38b3ba6d62f9011e3":char*:"":hex:"5c76c90dea7d659804ad873960906259fbdda3614277ec575d9eec730e747a2e7b9df6716b4c38d3451e319eeecee74d1f4918266fc9239de87080f1ad437b47c6904ed2d5514161ad25e3e237655e00e53fe18d452576580e89b2f1f0f6aa7e40a337fd8c48d690fe013a67264a80e9b5dfd009a9152d559aa02a68f401a09b":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,112) #1 [#2]
depends_on:0
2:exp:0:hex:"c3471259512d1f03ce44c1ddac186e9a56c1434a6ac567c6":hex:"dd5b98b3b3cf03fb92be579068a885afd984630692eb5f155fa6b49f2b1690b803d34b90e8de3cc39c2e61650ffffb51e7ef36d35ad17dc4d91f336363b0734996b162b509c9954cab3dd959bde7e437e9100d84c44104c61e29dbe12492a0272ce6eea2906d390de7808d337e8c650b3301af04a9ed52ab9ea208f3c7439d6c":hex:"50164c63d466148ab371376d5c2b6b72":hex:"11d1f523888bea1fbc680d34bc9b66957d651efa59e788db3d3f6f50e72184b9d14e9ff9bc05fb687520cf423d681812e007025eedf0e78e7e8191e6b62404e8eb400cf837d762a31aa248553367263d6de091fcf7abedc3e69fc118b7efb0594c89b96c387b7c28ed9a7b75db60b6b5133949b891ff81eca5790a265f12a58c":int:112:hex:"6c5f38232e8a43871ab72a3419ad":char*:"":hex:"50438ee712720abf2089331e4c058b30c30c3d17834c507c0010ac3f974a256d01b14a45e9ce5193c5cede41330cf31e1a07a1f5e3ceca515cc971bfda0fbe0b823450efc30563e8ed941b0350f146ec75cd31a2c7e1e469c2dd860c0fd5b286219018d4fbacda164a40d2980aa3a27aa95f8b8e2cd8e2f5f20d79a22c3ff028":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,112) #2 [#2]
depends_on:0
2:exp:0:hex:"ec326a1e0fe6a99421398df4fc7d8fea67b67e5f5fcd50ad":hex:"6d5016c434a0f4b4a5d9e0b6b8e2d848a94f132f055d2d847e54601a4c9cfc5966a654d696f8a3529a48a90b491ea0d31c08eae8ef364f71f8ec7ae7f7e39bb9c331137b2578362ff165628099944ba8deb0d99ac660d5ed2215b9a7626ff1fa6173cd8dd676c988d16c9cf750a0d793f584c3c8f5fd5d167bc278f4d77a629c":hex:"c94aa4baa840a044dbd5942787a0c951":hex:"f8401c578f20d9c250ea86eb945184e007a0190462c7abddf238ce1ceddcc230756aa222386d8ba66ebbba13de008ced140896ac55bc47c231cc81370ca9feadc225e017d59890e6291cc4cca27db3078c0cd6cbb51afb62210226a76837c5454728cb5ce3afe7352e7fe75421f94986e6b7b26321bbca15c75ac7c13dc15f50":int:112:hex:"3269922affb9d767f5abe041cc8e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,104) #0 [#2]
depends_on:0
2:exp:0:hex:"a7ef81652f604e88a72416924c53979dc73cadd3575eda1c":hex:"9ecd19a8eba9fba843486e1bbfb8d9053c5e04b24e30174d4aa89d8307439d653f8630edddafd51719c744bcb4bce3e444847567bd2cdde2995870d0634cc0ba2bde4b6bc2bc583062fb83874a1c25b50aeb945bd109a151772c077438c4d1caaeb5b0c56390ac23c6d117f3a00fd616306fc2ffc4c1e76f934b30fbbc52eec2":hex:"0cc9ae54c9a85f3e9325c5f3658ab3b2":hex:"d0195b744351aa25a57a99df9573dfa3cebe9850139149b64f7e4af37756a430dda8af98e4ed480e913aa82821c01c1f75b187e105a8f39621757d522c083a8d81d7d8bfe6cf15c439d0692b6affd655a11bcd2457046fae996a1075c66029867b88cd23c503ae04037dd41f27bafd5000d1f516002f9fcc0f2500e8c1b27de0":int:104:hex:"22c2efeddfd5d9cb528861c4eb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,104) #1 [#2]
depends_on:0
2:exp:0:hex:"605271a41e263c92dc14fe9df5203e79d58cc2d1289dc361":hex:"2bda3448a283ecba31e0299c0a9e44628cb2b41fa7b1a41107e107cabc381083bdbe048f2804568fdd5fe016f4d607f694042a459ba03a2deda4cccc8cbe4612d8ed0d4575e48bc9f59843369dbe2af6d048e65ff4250e1eef61d7b1b378fe2f3305b133ddc7e37d95ca6de89a971730fc80da943a767ff137707a8d8a24329c":hex:"7f128092a777fc503adc7f6b85eb2006":hex:"aef9f984fb645e08d5f0aa07a31c114d2f8e9eca047e4a8d5471378cfc2ced1159dc093d174788e58447a854be58942ed9a3fd45f3f4a1af7351e087369a267797c525f134e79709097e733b9003b9be0c569fc70ee3462b815b6410e19954ce2efac121300c06fd9e00542a9c6a5a682fe1010c145acbbb8b82333bdb5ddfd9":int:104:hex:"673afea592b2ce16bd058469f1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,104) #2 [#2]
depends_on:0
2:exp:0:hex:"fa076f36cb678e2275561e9553ebdf397360e5a5e44791c4":hex:"513305e86c0cb046c5d3720b25a406392766bd1fb7de2758de370ff2e68281e211922890c61f3659460f22c45a57895b424441262a3ba0606df4e2701f38281fd3436a4d0e0f8efecd231808a9ea063dfb725015a91f27cadfe7909a0ee109eac391ac807afed1767ae0515b9c1b51ae9a48b38fe7fec7fe0ddee562c945e5ae":hex:"1ecd53d94fe287047ff184e8b9b71a26":hex:"5ff25f7bac5f76f533f9edffdfd2b2991d7fc4cd5a0452a1031da6094cd498297fb2a05ae8db71cb3451e4ac33a01172619035a9621d2d54f812ef5343e14b9dedc93838e4cf30e223d215b4d2476ea961a17ac7295069f25b2a12d6e2efe76d91f45632c6d4e61ff19a95d5ae36af960d95050ce98b5791df0b7e322411c884":int:104:hex:"079e8db9c3e6eddb0335b1cf64":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,96) #0 [#2]
depends_on:0
2:exp:0:hex:"ce9dafa0e7e53a8766fc0bc38fba807d04e14e5ed61bc234":hex:"b585b8bf634757dac015f2f69f2ae674372a664f2115ad2d03bd3e0c335306b02d0947d3cda5991f5c0c25f12ead2c3cc2d65d575fd67091c70bc93ddb4b1e21f7b0fc6e6ae652dea93a6564ff13489f927942e64dd94bf8f821c7ffdef16df58bd8306a957821ac256da6f19c9d96e48eee87f88acb83bae05d693b70b9337b":hex:"fd0751af49814ee98b2b0cdf730adaa6":hex:"1cba488a0fc8a012f9a336cc7b01cbcc504178eeb08237dbedbc6c7ac68fdf3a6742751a207e43d43068abf6ef4e12a5e3c17e5a2f9398fc04ced67377cbb858fd6020fad675a880adb249e4aba94b96efa515d1cdf5c0c3071a27a3245968867ea94b2bfc2028a67be34c84c3f475944497aa8ca1ab009f8e4b11c8308c1996":int:96:hex:"e5dc92f4ad4000e9b62fb637":char*:"":hex:"95f4324b0656bef19eca5570548fc6a7a9923f4e2a7e42066891bc132fd73bc1c9089755d996756de0072824e69c43f2db8ba2bf6f90d3c4eafc0721ceaccce1af896f9fb15fb19c4746979b6d945f593fad61d550f81d12b5945ed728c02931d7f8d917285c22a3af748d75a6bf163fddd84b941d8564c1a63192c816ad6d6d":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,96) #1 [#2]
depends_on:0
2:exp:0:hex:"8a328554fed68dc4838fbc89fd162c99ec105b36651abbc9":hex:"75986f56972c045c850ed68aeb229f203b228fdfc36cad6b16d9bd12037c48700d20d8062a983ffeca76b8d36a67ef51bc8853706e83a34e4e23ff4f4a4eb943f19dbe85e454043d7906be6587a85079f9ccd27962d2905117d2dbeaf725d6ffe87bef52b2138da153ef29b18065b3342b3f9d07837d57b8bc5f2597de06c54f":hex:"e4f7c69a1d026eeebfc45e77bd7b3538":hex:"e349dcedb0bfcc771c820f0d510b80cef32ae3326484e25aa183015941e7844bc46f617d5e61fd64fa71759e90fcb72ae220bcd507f0fb389b689dd3fa29b3b937eded85f26ada9e0f3f5109f82fef47c7eba7313049750ad17969e7550c0d4093ed18ee27843d082bcee8bf3fc7833d569b7723998595a5a1d871089fd238da":int:96:hex:"8e8320912fff628f47e92430":char*:"":hex:"a1ed65cfc7e1aeccd0531bce1dc749c7aa84451ec0f29856f12f22c4105888c7d62e2e2fc8ad7a62748610b16e57490f061ad063c88800037d7244ee59e109d445205280473390336d7b6089f3a78218447b1b2398c4d0b3aac8b57a35891ad60dc1b69ad75e2e86248ceac7bb4cf3caade4a896e5ee8c76893ef990f6f65266":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,96) #2 [#2]
depends_on:0
2:exp:0:hex:"6e7f6feb4022312de5c804ed1d7a37580d74499107f8cc8b":hex:"4f5bbdf575ab8f778549f749f2265e17dc7225713e73ee6d7be163ff7071557dcc2240b0705c079008605f81396414ac64f06b1b637876e04c3fca8d0fa576cef4dd3dc553fd6808eaf120f837f9bb1d9dbbd5cf67ed497167fc7db89d3a84151b81aeab0e921057f121583df5ed7f976b206ece17a913f23485385f64c462a8":hex:"6ce13485ffbc80567b02dd542344d7ef":hex:"c6804a2bd8c34de14fe485c8b7caa2564adaf9fcbb754bd2cc1d88ba9183f13d110c762a3c5d2afc0fbc80aedcb91e45efe43d9320075420ee85ab22505f20e77fa4624b0387346c1bd944e9cd54055b5135c7fc92e85390ecf45a7091136b47e3d68d9076594cfad36c36047538e652178c375a2fe59a246a79784577860189":int:96:hex:"974bd0c4a8cac1563a0e0ce0":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,64) #0 [#2]
depends_on:0
2:exp:0:hex:"46d6e982feff0e7d04a84384c56739b69626dde500e4b7fb":hex:"a5160fb2d397b55a7eba02df33a042404188f02f4492d46f4edc03fc67723d64f5f7fed3a60728438703c60454a30f473ac918ffc8f98be5c5e9779ee984415e415ce3c71f9acc3f808d215be58535d3144cebe7982b9b527edbe41446161094d6fc74dec2e0a1c644bbc2cf5779a22bd4117a7edb11d13e35e95feeb418d3f0":hex:"71a6d1e022a6bdff6460c674fb0cf048":hex:"67a8455c7d3fbfdba3c5ec5f40e0be935fbb9417e805771832ffad06ba38a61b8377997af1f586dc0fa1e3da0b39facd520db1f0ec2bdf1904a3a897f0b507c901fab30a85de51effa9f7d4703ceeb2ca72abe0bd146ba0bd3ffdee11628310db7d65ea1343b018084ea2414995f86fefb45ba91a9dc2236d92078b4305671b5":int:64:hex:"84f1efd34ff84e83":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,64) #1 [#2]
depends_on:0
2:exp:0:hex:"991dcaa2e8fdad2b4e6e462a3c06c96067ef5e9fb133496a":hex:"9cd0c27f0c2011c1ab947400d28516c7f46d22a409a18fd35c1babf693b8030dfd7822d9ba03bb8fd56a00f9c7149c056640dde690889d2f23978eeeb28ccc26e2fc251220a3682c963f5580c654c1a6736cccb1b8ed104ec7390021d244bd9f92abde89e39a4b83eff8211c8a6259bd6ac2af1da7dfb8cf1355238056c60381":hex:"978913d2c822ba7cc758041d5ee46759":hex:"5a94dc81af011a8af263318b60215b9752292b194b89f6fc013b0fe8e29133de631d981862f2c131ee34905bd93caffc3b8f91aeb0264b27a509e5c6a41ae781209f8c5895d0d35b3c5e1ae34a1a92a2b979e0e62132051394940ea4d9bfffb8d89ba1e8331b15bdf05c41db83a57745a4a651a757cc8648acdcf850a2f25367":int:64:hex:"15d456da7645abf2":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,64) #2 [#2]
depends_on:0
2:exp:0:hex:"f29cff00781f5916930f125489c87d21f6593324d1506f65":hex:"a3e8595747b7147d471ac4fe38014bf4a409931e3f419ff88ae249ba7a7f51bd0ede371bf153bab4b28020b7a82a8ca30b75f1e3bcfee3c13db813cbc85138ef05874dedb14a6e5b6d06d7589a83bd5e052dc64433a8e24c1188b9470ddb2536d13b4b7bff0c5afcfaa9aa0157c3aae3b1774df2df14f965d6dee4332edba67e":hex:"50db7ee25a9f815c784236f908bfd7f2":hex:"ec1482e18692bcd6894a364c4a6abb9c3b9818bb17e5e1fc9ec0b41702c423f3a60907e94c888fad8e78f51e1f724b39969ba7b11d31b503504b304d5c4b4cbd42634f4ec5080a9fe51c82e121ae191270dd2c307af84c82d892d982413a50ccce33698054f761a3fa93da9a1fca321296b378a50d458ba78e57a70da4676150":int:64:hex:"a1e19ef2f0d4b9f1":char*:"":hex:"eea18261a4de31d8619e77005ebbb3998c5dcfac2bc120ae465e29d6b4c46de7e6c044c8b148ffe4eda7629c243df8af4e7ceb512d5751a3ee58defb0690b6f26b51086dedfde38748f6f0bbe6b495f4304373188e5d2dc93461bd51bf720149a7d3aa543623b122b9af0123b2cdc9020136b041a49498ec4aa696c2d3c46d06":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,32) #0 [#2]
depends_on:0
2:exp:0:hex:"2087e14092dad6df8996715cb1cfca90094f030328080ffd":hex:"6d039513061980fb195bdf2f7c7079ca4b7e0fdd50d948cbfab5ba10b99e3aea27f08abd000c428851de82cacb0d64c146cd9567e9d55b89819876d6a635bd68bcaf47ffa41e02d9ee97f5a2363bfe6131ae7a21ea5130ae953a64d57d6cbfd45260c5f1946388d445ce97d23ab7ba31a5069a4896bc940a71de32bde02bc18d":hex:"d30504afb6f8b6ac444b4a76115d79d1":hex:"d95845d268c8d8f9135d310c39e30f55f83ef7ffee69e6ba1f80d08e92ed473b5ac12cc8f7a872bfc8b325e6b8e374609c90beaf52d975f71caeef5ee4c13de08dce80d358ee1cd091faea209a24e3392adcfe01aeb2b2e1738bc75d4a9b7cd31df7f878141cf278d150f6faa83fb3a2fd1225542a39c900606c602f15c06a4f":int:32:hex:"5412f25c":char*:"":hex:"1e81a4c10a3440d0002ddc1bfa42ebb08e504fcc8f0497915c51b6f5f75fee3f0cd3e9c5a81ff6528e0fecd68a36192114f17fa1a4cfe21918dac46e3ba1383c2678c7a6889a980024ee2a21bcf737f7723b5735e1ebe78996f7c7eace2802ebb8284216867d73b53a370a57d5b587d070a96db34b5b4f5afe7f39830498c112":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,32) #1 [#2]
depends_on:0
2:exp:0:hex:"3fc76d627c775de2f789279dc7b67979a9f1cc23c8dcabc9":hex:"92a60d38fc687b92d44635aafee416a142d11a025680e5aa42e9ba5aa010462991ad3dd7328ca4a693673410f9bba37f05a551b949ab0d43fc61ef3b8996dd3fc1b325e66eec6cc61ea667500f82a83e699756a139d14be6ca9747ed38cd9b1d9da032ece311331bdcd698666ddc970b8be2b746ec55fe60e65d7ae47c6f853c":hex:"8f6fd53eb97e12dcd4d40f2843e25365":hex:"e56995df73e52606a11de9df6c7bfb0ef93b86bf6766e319aea59372060294b0e1b13c6288c2310a4bef725a2dddb174f3e1228649861757903c4497a0eec9c141454fc75f101439a2150e368857c4f0f6e5161c42c77f632bf1c229a52595cbf16e9018de9a8f6a1e6b8b18bd244f93f001eb2eb315405d223c0d27ece9d4d9":int:32:hex:"613ba486":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,32) #2 [#2]
depends_on:0
2:exp:0:hex:"b10979797fb8f418a126120d45106e1779b4538751a19bf6":hex:"e3dc64e3c02731fe6e6ec0e899183018da347bf8bd476aa7746d7a7729d83a95f64bb732ba987468d0cede154e28169f7bafa36559200795037ee38279e0e4ca40f9cfa85aa0c8035df9649345c8fdffd1c31528b485dfe443c1923180cc8fae5196d16f822be4ad07e3f1234e1d218e7c8fb37a0e4480dc6717c9c09ff5c45f":hex:"ca362e615024a1fe11286668646cc1de":hex:"237d95d86a5ad46035870f576a1757eded636c7234d5ed0f8039f6f59f1333cc31cb893170d1baa98bd4e79576de920120ead0fdecfb343edbc2fcc556540a91607388a05d43bdb8b55f1327552feed3b620614dfcccb2b342083896cbc81dc9670b761add998913ca813163708a45974e6d7b56dfd0511a72eb879f239d6a6d":int:32:hex:"28d730ea":char*:"":hex:"dafde27aa8b3076bfa16ab1d89207d339c4997f8a756cc3eb62c0b023976de808ab640ba4467f2b2ea83d238861229c73387594cd43770386512ea595a70888b4c38863472279e06b923e7cf32438199b3e054ac4bc21baa8df39ddaa207ebb17fa4cad6e83ea58c3a92ec74e6e01b0a8979af145dd31d5df29750bb91b42d45":int:0
AES-GCM Bad IV (AES-192,128,0,0,32) #0
depends_on:0
0:exp:0:exp:1:hex:"b10979797fb8f418a126120d45106e1779b4538751a19bf6":hex:"":hex:"":hex:"":int:32:exp:2
AES-GCM Selftest
depends_on:0
5
| 95,977 | 681 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_x509parse.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
#include "libc/testlib/testlib.h"
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_x509parse.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_x509parse.function
* Test suite data : suites/test_suite_x509parse.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_BIGNUM_C)
#include "third_party/mbedtls/bignum.h"
#include "third_party/mbedtls/x509.h"
#include "third_party/mbedtls/x509_crt.h"
#include "third_party/mbedtls/x509_crl.h"
#include "third_party/mbedtls/x509_csr.h"
#include "third_party/mbedtls/pem.h"
#include "third_party/mbedtls/oid.h"
#include "third_party/mbedtls/base64.h"
#if MBEDTLS_X509_MAX_INTERMEDIATE_CA > 19
#error "The value of MBEDTLS_X509_MAX_INTERMEDIATE_C is larger \
than the current threshold 19. To test larger values, please \
adapt the script tests/data_files/dir-max/long.sh."
#endif
/* Test-only profile allowing all digests, PK algorithms, and curves. */
const mbedtls_x509_crt_profile profile_all =
{
0xFFFFFFFF, /* Any MD */
0xFFFFFFFF, /* Any PK alg */
0xFFFFFFFF, /* Any curve */
1024,
};
/* Profile for backward compatibility. Allows SHA-1, unlike the default
profile. */
const mbedtls_x509_crt_profile compat_profile =
{
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA1 ) |
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_RIPEMD160 ) |
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA224 ) |
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA256 ) |
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA384 ) |
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA512 ),
0xFFFFFFF, /* Any PK alg */
0xFFFFFFF, /* Any curve */
1024,
};
const mbedtls_x509_crt_profile profile_rsa3072 =
{
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA256 ) |
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA384 ) |
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA512 ),
MBEDTLS_X509_ID_FLAG( MBEDTLS_PK_RSA ),
0,
3072,
};
const mbedtls_x509_crt_profile profile_sha512 =
{
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA512 ),
0xFFFFFFF, /* Any PK alg */
0xFFFFFFF, /* Any curve */
1024,
};
int verify_none( void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags )
{
((void) data);
((void) crt);
((void) certificate_depth);
*flags |= MBEDTLS_X509_BADCERT_OTHER;
return 0;
}
int verify_all( void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags )
{
((void) data);
((void) crt);
((void) certificate_depth);
*flags = 0;
return 0;
}
#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
int ca_callback_fail( void *data, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidates )
{
((void) data);
((void) child);
((void) candidates);
return -1;
}
int ca_callback( void *data, mbedtls_x509_crt const *child,
mbedtls_x509_crt **candidates )
{
int ret = 0;
mbedtls_x509_crt *ca = (mbedtls_x509_crt *) data;
mbedtls_x509_crt *first;
/* This is a test-only implementation of the CA callback
* which always returns the entire list of trusted certificates.
* Production implementations managing a large number of CAs
* should use an efficient presentation and lookup for the
* set of trusted certificates (such as a hashtable) and only
* return those trusted certificates which satisfy basic
* parental checks, such as the matching of child `Issuer`
* and parent `Subject` field. */
((void) child);
first = mbedtls_calloc( 1, sizeof( mbedtls_x509_crt ) );
if( first == NULL )
{
ret = -1;
goto exit;
}
mbedtls_x509_crt_init( first );
if( mbedtls_x509_crt_parse_der( first, ca->raw.p, ca->raw.len ) != 0 )
{
ret = -1;
goto exit;
}
while( ca->next != NULL )
{
ca = ca->next;
if( mbedtls_x509_crt_parse_der( first, ca->raw.p, ca->raw.len ) != 0 )
{
ret = -1;
goto exit;
}
}
exit:
if( ret != 0 )
{
mbedtls_x509_crt_free( first );
mbedtls_free( first );
first = NULL;
}
*candidates = first;
return( ret );
}
#endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
int verify_fatal( void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags )
{
int *levels = (int *) data;
((void) crt);
((void) certificate_depth);
/* Simulate a fatal error in the callback */
if( *levels & ( 1 << certificate_depth ) )
{
*flags |= ( 1 << certificate_depth );
return( -1 - certificate_depth );
}
return( 0 );
}
/* strsep() not available on Windows */
char *mystrsep(char **stringp, const char *delim)
{
const char *p;
char *ret = *stringp;
if( *stringp == NULL )
return( NULL );
for( ; ; (*stringp)++ )
{
if( **stringp == '\0' )
{
*stringp = NULL;
goto done;
}
for( p = delim; *p != '\0'; p++ )
if( **stringp == *p )
{
**stringp = '\0';
(*stringp)++;
goto done;
}
}
done:
return( ret );
}
#if defined(MBEDTLS_X509_CRT_PARSE_C)
typedef struct {
char buf[512];
char *p;
} verify_print_context;
void verify_print_init( verify_print_context *ctx )
{
memset( ctx, 0, sizeof( verify_print_context ) );
ctx->p = ctx->buf;
}
int verify_print( void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags )
{
int ret;
verify_print_context *ctx = (verify_print_context *) data;
char *p = ctx->p;
size_t n = ctx->buf + sizeof( ctx->buf ) - ctx->p;
((void) flags);
ret = mbedtls_snprintf( p, n, "depth %d - serial ", certificate_depth );
MBEDTLS_X509_SAFE_SNPRINTF;
ret = mbedtls_x509_serial_gets( p, n, &crt->serial );
MBEDTLS_X509_SAFE_SNPRINTF;
ret = mbedtls_snprintf( p, n, " - subject " );
MBEDTLS_X509_SAFE_SNPRINTF;
ret = mbedtls_x509_dn_gets( p, n, &crt->subject );
MBEDTLS_X509_SAFE_SNPRINTF;
ret = mbedtls_snprintf( p, n, " - flags 0x%08x\n", *flags );
MBEDTLS_X509_SAFE_SNPRINTF;
ctx->p = p;
return( 0 );
}
int verify_parse_san( mbedtls_x509_subject_alternative_name *san,
char **buf, size_t *size )
{
int ret;
size_t i;
char *p = *buf;
size_t n = *size;
ret = mbedtls_snprintf( p, n, "type : %d", san->type );
MBEDTLS_X509_SAFE_SNPRINTF;
switch( san->type )
{
case( MBEDTLS_X509_SAN_OTHER_NAME ):
ret = mbedtls_snprintf( p, n, "\notherName :");
MBEDTLS_X509_SAFE_SNPRINTF;
if( MBEDTLS_OID_CMP( MBEDTLS_OID_ON_HW_MODULE_NAME,
&san->san.other_name.value.hardware_module_name.oid ) != 0 )
{
ret = mbedtls_snprintf( p, n, " hardware module name :" );
MBEDTLS_X509_SAFE_SNPRINTF;
ret = mbedtls_snprintf( p, n, " hardware type : " );
MBEDTLS_X509_SAFE_SNPRINTF;
ret = mbedtls_oid_get_numeric_string( p, n,
&san->san.other_name.value.hardware_module_name.oid );
MBEDTLS_X509_SAFE_SNPRINTF;
ret = mbedtls_snprintf( p, n, ", hardware serial number : " );
MBEDTLS_X509_SAFE_SNPRINTF;
if( san->san.other_name.value.hardware_module_name.val.len >= n )
{
*p = '\0';
return( MBEDTLS_ERR_X509_BUFFER_TOO_SMALL );
}
for( i=0; i < san->san.other_name.value.hardware_module_name.val.len; i++ )
{
*p++ = san->san.other_name.value.hardware_module_name.val.p[i];
}
n -= san->san.other_name.value.hardware_module_name.val.len;
}
break;/* MBEDTLS_OID_ON_HW_MODULE_NAME */
case( MBEDTLS_X509_SAN_DNS_NAME ):
ret = mbedtls_snprintf( p, n, "\ndNSName : " );
MBEDTLS_X509_SAFE_SNPRINTF;
if( san->san.unstructured_name.len >= n )
{
*p = '\0';
return( MBEDTLS_ERR_X509_BUFFER_TOO_SMALL );
}
n -= san->san.unstructured_name.len;
for( i = 0; i < san->san.unstructured_name.len; i++ )
*p++ = san->san.unstructured_name.p[i];
break;/* MBEDTLS_X509_SAN_DNS_NAME */
default:
/*
* Should not happen.
*/
return( -1 );
}
ret = mbedtls_snprintf( p, n, "\n" );
MBEDTLS_X509_SAFE_SNPRINTF;
*size = n;
*buf = p;
return( 0 );
}
int parse_crt_ext_cb( void *p_ctx, mbedtls_x509_crt const *crt, mbedtls_x509_buf const *oid,
int critical, const unsigned char *cp, const unsigned char *end )
{
( void ) crt;
( void ) critical;
mbedtls_x509_buf *new_oid = (mbedtls_x509_buf *)p_ctx;
if( oid->tag == MBEDTLS_ASN1_OID &&
MBEDTLS_OID_CMP( MBEDTLS_OID_CERTIFICATE_POLICIES, oid ) == 0 )
{
/* Handle unknown certificate policy */
int ret, parse_ret = 0;
size_t len;
unsigned char **p = (unsigned char **)&cp;
/* Get main sequence tag */
ret = mbedtls_asn1_get_tag( p, end, &len,
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE );
if( ret != 0 )
return( MBEDTLS_ERR_X509_INVALID_EXTENSIONS + ret );
if( *p + len != end )
return( MBEDTLS_ERR_X509_INVALID_EXTENSIONS +
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
/*
* Cannot be an empty sequence.
*/
if( len == 0 )
return( MBEDTLS_ERR_X509_INVALID_EXTENSIONS +
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
while( *p < end )
{
const unsigned char *policy_end;
/*
* Get the policy sequence
*/
if( ( ret = mbedtls_asn1_get_tag( p, end, &len,
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
return( MBEDTLS_ERR_X509_INVALID_EXTENSIONS + ret );
policy_end = *p + len;
if( ( ret = mbedtls_asn1_get_tag( p, policy_end, &len,
MBEDTLS_ASN1_OID ) ) != 0 )
return( MBEDTLS_ERR_X509_INVALID_EXTENSIONS + ret );
/*
* Recognize exclusively the policy with OID 1
*/
if( len != 1 || *p[0] != 1 )
parse_ret = MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE;
*p += len;
/*
* If there is an optional qualifier, then *p < policy_end
* Check the Qualifier len to verify it doesn't exceed policy_end.
*/
if( *p < policy_end )
{
if( ( ret = mbedtls_asn1_get_tag( p, policy_end, &len,
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
return( MBEDTLS_ERR_X509_INVALID_EXTENSIONS + ret );
/*
* Skip the optional policy qualifiers.
*/
*p += len;
}
if( *p != policy_end )
return( MBEDTLS_ERR_X509_INVALID_EXTENSIONS +
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
}
if( *p != end )
return( MBEDTLS_ERR_X509_INVALID_EXTENSIONS +
MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
return( parse_ret );
}
else if( new_oid != NULL && new_oid->tag == oid->tag && new_oid->len == oid->len &&
timingsafe_bcmp( new_oid->p, oid->p, oid->len ) == 0 )
return( 0 );
else
return( MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG );
}
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRT_PARSE_C)
void test_x509_parse_san( char * crt_file, char * result_str )
{
int ret;
mbedtls_x509_crt crt;
mbedtls_x509_subject_alternative_name san;
mbedtls_x509_sequence *cur = NULL;
char buf[2000];
char *p = buf;
size_t n = sizeof( buf );
mbedtls_x509_crt_init( &crt );
memset( buf, 0, 2000 );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
if( crt.ext_types & MBEDTLS_X509_EXT_SUBJECT_ALT_NAME )
{
cur = &crt.subject_alt_names;
while( cur != NULL )
{
ret = mbedtls_x509_parse_subject_alt_name( &cur->buf, &san );
TEST_ASSERT( ret == 0 || ret == MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE );
/*
* If san type not supported, ignore.
*/
if( ret == 0)
TEST_ASSERT( verify_parse_san( &san, &p, &n ) == 0 );
cur = cur->next;
}
}
TEST_ASSERT_STREQ( buf, result_str );
exit:
mbedtls_x509_crt_free( &crt );
}
void test_x509_parse_san_wrapper( void ** params )
{
test_x509_parse_san( (char *) params[0], (char *) params[1] );
}
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRT_PARSE_C)
void test_x509_cert_info( char * crt_file, char * result_str )
{
mbedtls_x509_crt crt;
char buf[2000];
int res;
mbedtls_x509_crt_init( &crt );
memset( buf, 0, 2000 );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
res = mbedtls_x509_crt_info( buf, 2000, "", &crt );
TEST_ASSERT( res != -1 );
TEST_ASSERT( res != -2 );
TEST_ASSERT_STREQ( buf, result_str );
exit:
mbedtls_x509_crt_free( &crt );
}
void test_x509_cert_info_wrapper( void ** params )
{
test_x509_cert_info( (char *) params[0], (char *) params[1] );
}
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRL_PARSE_C)
void test_mbedtls_x509_crl_info( char * crl_file, char * result_str )
{
mbedtls_x509_crl crl;
char buf[2000];
int res;
mbedtls_x509_crl_init( &crl );
memset( buf, 0, 2000 );
TEST_ASSERT( mbedtls_x509_crl_parse_file( &crl, crl_file ) == 0 );
res = mbedtls_x509_crl_info( buf, 2000, "", &crl );
TEST_ASSERT( res != -1 );
TEST_ASSERT( res != -2 );
TEST_ASSERT_STREQ( buf, result_str );
exit:
mbedtls_x509_crl_free( &crl );
}
void test_mbedtls_x509_crl_info_wrapper( void ** params )
{
test_mbedtls_x509_crl_info( (char *) params[0], (char *) params[1] );
}
#endif /* MBEDTLS_X509_CRL_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRL_PARSE_C)
void test_mbedtls_x509_crl_parse( char * crl_file, int result )
{
mbedtls_x509_crl crl;
char buf[2000];
mbedtls_x509_crl_init( &crl );
memset( buf, 0, 2000 );
TEST_ASSERT( mbedtls_x509_crl_parse_file( &crl, crl_file ) == result );
exit:
mbedtls_x509_crl_free( &crl );
}
void test_mbedtls_x509_crl_parse_wrapper( void ** params )
{
test_mbedtls_x509_crl_parse( (char *) params[0], *( (int *) params[1] ) );
}
#endif /* MBEDTLS_X509_CRL_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CSR_PARSE_C)
void test_mbedtls_x509_csr_info( char * csr_file, char * result_str )
{
mbedtls_x509_csr csr;
char buf[2000];
int res;
mbedtls_x509_csr_init( &csr );
memset( buf, 0, 2000 );
TEST_ASSERT( mbedtls_x509_csr_parse_file( &csr, csr_file ) == 0 );
res = mbedtls_x509_csr_info( buf, 2000, "", &csr );
TEST_ASSERT( res != -1 );
TEST_ASSERT( res != -2 );
TEST_ASSERT_STREQ( buf, result_str );
exit:
mbedtls_x509_csr_free( &csr );
}
void test_mbedtls_x509_csr_info_wrapper( void ** params )
{
test_mbedtls_x509_csr_info( (char *) params[0], (char *) params[1] );
}
#endif /* MBEDTLS_X509_CSR_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_X509_CRT_PARSE_C)
void test_x509_verify_info( int flags, char * prefix, char * result_str )
{
char buf[2000];
int res;
memset( buf, 0, sizeof( buf ) );
res = mbedtls_x509_crt_verify_info( buf, sizeof( buf ), prefix, flags );
TEST_ASSERT( res >= 0 );
TEST_ASSERT_STREQ( buf, result_str );
exit:
;
}
void test_x509_verify_info_wrapper( void ** params )
{
test_x509_verify_info( *( (int *) params[0] ), (char *) params[1], (char *) params[2] );
}
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRT_PARSE_C)
#if defined(MBEDTLS_X509_CRL_PARSE_C)
#if defined(MBEDTLS_ECP_RESTARTABLE)
#if defined(MBEDTLS_ECDSA_C)
void test_x509_verify_restart( char *crt_file, char *ca_file,
int result, int flags_result,
int max_ops, int min_restart, int max_restart )
{
int ret, cnt_restart;
mbedtls_x509_crt_restart_ctx rs_ctx;
mbedtls_x509_crt crt;
mbedtls_x509_crt ca;
uint32_t flags = 0;
/*
* See comments on ecp_test_vect_restart() for op count precision.
*
* For reference, with mbed TLS 2.6 and default settings:
* - ecdsa_verify() for P-256: ~ 6700
* - ecdsa_verify() for P-384: ~ 18800
* - x509_verify() for server5 -> test-ca2: ~ 18800
* - x509_verify() for server10 -> int-ca3 -> int-ca2: ~ 25500
*/
mbedtls_x509_crt_restart_init( &rs_ctx );
mbedtls_x509_crt_init( &crt );
mbedtls_x509_crt_init( &ca );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &ca, ca_file ) == 0 );
mbedtls_ecp_set_max_ops( max_ops );
cnt_restart = 0;
do {
ret = mbedtls_x509_crt_verify_restartable( &crt, &ca, NULL,
&mbedtls_x509_crt_profile_default, NULL, &flags,
NULL, NULL, &rs_ctx );
} while( ret == MBEDTLS_ERR_ECP_IN_PROGRESS && ++cnt_restart );
TEST_ASSERT( ret == result );
TEST_ASSERT( flags == (uint32_t) flags_result );
TEST_ASSERT( cnt_restart >= min_restart );
TEST_ASSERT( cnt_restart <= max_restart );
/* Do we leak memory when aborting? */
ret = mbedtls_x509_crt_verify_restartable( &crt, &ca, NULL,
&mbedtls_x509_crt_profile_default, NULL, &flags,
NULL, NULL, &rs_ctx );
TEST_ASSERT( ret == result || ret == MBEDTLS_ERR_ECP_IN_PROGRESS );
exit:
mbedtls_x509_crt_restart_free( &rs_ctx );
mbedtls_x509_crt_free( &crt );
mbedtls_x509_crt_free( &ca );
}
void test_x509_verify_restart_wrapper( void ** params )
{
test_x509_verify_restart( (char *) params[0], (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ), *( (int *) params[6] ) );
}
#endif /* MBEDTLS_ECDSA_C */
#endif /* MBEDTLS_ECP_RESTARTABLE */
#endif /* MBEDTLS_X509_CRL_PARSE_C */
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRT_PARSE_C)
#if defined(MBEDTLS_X509_CRL_PARSE_C)
void test_x509_verify( char *crt_file, char *ca_file, char *crl_file,
char *cn_name_str, int result, int flags_result,
char *profile_str,
char *verify_callback )
{
mbedtls_x509_crt crt;
mbedtls_x509_crt ca;
mbedtls_x509_crl crl;
uint32_t flags = 0;
int res;
int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *) = NULL;
char * cn_name = NULL;
const mbedtls_x509_crt_profile *profile;
mbedtls_x509_crt_init( &crt );
mbedtls_x509_crt_init( &ca );
mbedtls_x509_crl_init( &crl );
USE_PSA_INIT( );
if( strcmp( cn_name_str, "NULL" ) != 0 )
cn_name = cn_name_str;
if( strcmp( profile_str, "" ) == 0 )
profile = &mbedtls_x509_crt_profile_default;
else if( strcmp( profile_str, "next" ) == 0 )
profile = &mbedtls_x509_crt_profile_next;
else if( strcmp( profile_str, "suite_b" ) == 0 )
profile = &mbedtls_x509_crt_profile_suiteb;
else if( strcmp( profile_str, "compat" ) == 0 )
profile = &compat_profile;
else if( strcmp( profile_str, "all" ) == 0 )
profile = &profile_all;
else
TEST_ASSERT( "Unknown algorithm profile" == 0 );
if( strcmp( verify_callback, "NULL" ) == 0 )
f_vrfy = NULL;
else if( strcmp( verify_callback, "verify_none" ) == 0 )
f_vrfy = verify_none;
else if( strcmp( verify_callback, "verify_all" ) == 0 )
f_vrfy = verify_all;
else
TEST_ASSERT( "No known verify callback selected" == 0 );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &ca, ca_file ) == 0 );
TEST_ASSERT( mbedtls_x509_crl_parse_file( &crl, crl_file ) == 0 );
res = mbedtls_x509_crt_verify_with_profile( &crt, &ca, &crl, profile, cn_name, &flags, f_vrfy, NULL );
TEST_EQUAL( res, result );
TEST_ASSERT( flags == (uint32_t)( flags_result ) );
#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
/* CRLs aren't supported with CA callbacks, so skip the CA callback
* version of the test if CRLs are in use. */
if( crl_file == NULL || strcmp( crl_file, "" ) == 0 )
{
flags = 0;
res = mbedtls_x509_crt_verify_with_ca_cb( &crt, ca_callback, &ca, profile, cn_name, &flags, f_vrfy, NULL );
TEST_ASSERT( res == ( result ) );
TEST_ASSERT( flags == (uint32_t)( flags_result ) );
}
#endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
exit:
mbedtls_x509_crt_free( &crt );
mbedtls_x509_crt_free( &ca );
mbedtls_x509_crl_free( &crl );
USE_PSA_DONE( );
}
void test_x509_verify_wrapper( void ** params )
{
test_x509_verify( (char *) params[0], (char *) params[1], (char *) params[2], (char *) params[3], *( (int *) params[4] ), *( (int *) params[5] ), (char *) params[6], (char *) params[7] );
}
#endif /* MBEDTLS_X509_CRL_PARSE_C */
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRT_PARSE_C)
#if defined(MBEDTLS_X509_CRL_PARSE_C)
#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
void test_x509_verify_ca_cb_failure( char *crt_file, char *ca_file, char *name,
int exp_ret )
{
int ret;
mbedtls_x509_crt crt;
mbedtls_x509_crt ca;
uint32_t flags = 0;
mbedtls_x509_crt_init( &crt );
mbedtls_x509_crt_init( &ca );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &ca, ca_file ) == 0 );
if( strcmp( name, "NULL" ) == 0 )
name = NULL;
ret = mbedtls_x509_crt_verify_with_ca_cb( &crt, ca_callback_fail, &ca,
&compat_profile, name, &flags,
NULL, NULL );
TEST_ASSERT( ret == exp_ret );
TEST_ASSERT( flags == (uint32_t)( -1 ) );
exit:
mbedtls_x509_crt_free( &crt );
mbedtls_x509_crt_free( &ca );
}
void test_x509_verify_ca_cb_failure_wrapper( void ** params )
{
test_x509_verify_ca_cb_failure( (char *) params[0], (char *) params[1], (char *) params[2], *( (int *) params[3] ) );
}
#endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
#endif /* MBEDTLS_X509_CRL_PARSE_C */
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRT_PARSE_C)
void test_x509_verify_callback( char *crt_file, char *ca_file, char *name,
int exp_ret, char *exp_vrfy_out )
{
int ret;
mbedtls_x509_crt crt;
mbedtls_x509_crt ca;
uint32_t flags = 0;
verify_print_context vrfy_ctx;
mbedtls_x509_crt_init( &crt );
mbedtls_x509_crt_init( &ca );
verify_print_init( &vrfy_ctx );
USE_PSA_INIT( );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &ca, ca_file ) == 0 );
if( strcmp( name, "NULL" ) == 0 )
name = NULL;
ret = mbedtls_x509_crt_verify_with_profile( &crt, &ca, NULL,
&compat_profile,
name, &flags,
verify_print, &vrfy_ctx );
TEST_ASSERT( ret == exp_ret );
TEST_ASSERT( strcmp( vrfy_ctx.buf, exp_vrfy_out ) == 0 );
exit:
mbedtls_x509_crt_free( &crt );
mbedtls_x509_crt_free( &ca );
USE_PSA_DONE( );
}
void test_x509_verify_callback_wrapper( void ** params )
{
test_x509_verify_callback( (char *) params[0], (char *) params[1], (char *) params[2], *( (int *) params[3] ), (char *) params[4] );
}
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRT_PARSE_C)
void test_mbedtls_x509_dn_gets( char * crt_file, char * entity, char * result_str )
{
mbedtls_x509_crt crt;
char buf[2000];
int res = 0;
mbedtls_x509_crt_init( &crt );
memset( buf, 0, 2000 );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
if( strcmp( entity, "subject" ) == 0 )
res = mbedtls_x509_dn_gets( buf, 2000, &crt.subject );
else if( strcmp( entity, "issuer" ) == 0 )
res = mbedtls_x509_dn_gets( buf, 2000, &crt.issuer );
else
TEST_ASSERT( "Unknown entity" == 0 );
TEST_ASSERT( res != -1 );
TEST_ASSERT( res != -2 );
TEST_ASSERT_STREQ( buf, result_str );
exit:
mbedtls_x509_crt_free( &crt );
}
void test_mbedtls_x509_dn_gets_wrapper( void ** params )
{
test_mbedtls_x509_dn_gets( (char *) params[0], (char *) params[1], (char *) params[2] );
}
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRT_PARSE_C)
void test_mbedtls_x509_time_is_past( char * crt_file, char * entity, int result )
{
mbedtls_x509_crt crt;
mbedtls_x509_crt_init( &crt );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
if( strcmp( entity, "valid_from" ) == 0 )
TEST_ASSERT( mbedtls_x509_time_is_past( &crt.valid_from ) == result );
else if( strcmp( entity, "valid_to" ) == 0 )
TEST_ASSERT( mbedtls_x509_time_is_past( &crt.valid_to ) == result );
else
TEST_ASSERT( "Unknown entity" == 0 );
exit:
mbedtls_x509_crt_free( &crt );
}
void test_mbedtls_x509_time_is_past_wrapper( void ** params )
{
test_mbedtls_x509_time_is_past( (char *) params[0], (char *) params[1], *( (int *) params[2] ) );
}
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRT_PARSE_C)
void test_mbedtls_x509_time_is_future( char * crt_file, char * entity, int result )
{
mbedtls_x509_crt crt;
mbedtls_x509_crt_init( &crt );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
if( strcmp( entity, "valid_from" ) == 0 )
TEST_ASSERT( mbedtls_x509_time_is_future( &crt.valid_from ) == result );
else if( strcmp( entity, "valid_to" ) == 0 )
TEST_ASSERT( mbedtls_x509_time_is_future( &crt.valid_to ) == result );
else
TEST_ASSERT( "Unknown entity" == 0 );
exit:
mbedtls_x509_crt_free( &crt );
}
void test_mbedtls_x509_time_is_future_wrapper( void ** params )
{
test_mbedtls_x509_time_is_future( (char *) params[0], (char *) params[1], *( (int *) params[2] ) );
}
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_X509_CRT_PARSE_C)
#if defined(MBEDTLS_FS_IO)
void test_x509parse_crt_file( char * crt_file, int result )
{
mbedtls_x509_crt crt;
mbedtls_x509_crt_init( &crt );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == result );
exit:
mbedtls_x509_crt_free( &crt );
}
void test_x509parse_crt_file_wrapper( void ** params )
{
test_x509parse_crt_file( (char *) params[0], *( (int *) params[1] ) );
}
#endif /* MBEDTLS_FS_IO */
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#if defined(MBEDTLS_X509_CRT_PARSE_C)
void test_x509parse_crt( data_t * buf, char * result_str, int result )
{
mbedtls_x509_crt crt;
unsigned char output[2000];
int res;
mbedtls_x509_crt_init( &crt );
memset( output, 0, 2000 );
TEST_ASSERT( mbedtls_x509_crt_parse_der( &crt, buf->x, buf->len ) == ( result ) );
if( ( result ) == 0 )
{
res = mbedtls_x509_crt_info( (char *) output, 2000, "", &crt );
TEST_ASSERT( res != -1 );
TEST_ASSERT( res != -2 );
TEST_ASSERT_STREQ( (char *) output, result_str );
}
mbedtls_x509_crt_free( &crt );
mbedtls_x509_crt_init( &crt );
memset( output, 0, 2000 );
TEST_ASSERT( mbedtls_x509_crt_parse_der_nocopy( &crt, buf->x, buf->len ) == ( result ) );
if( ( result ) == 0 )
{
res = mbedtls_x509_crt_info( (char *) output, 2000, "", &crt );
TEST_ASSERT( res != -1 );
TEST_ASSERT( res != -2 );
TEST_ASSERT_STREQ( (char *) output, result_str );
}
mbedtls_x509_crt_free( &crt );
mbedtls_x509_crt_init( &crt );
memset( output, 0, 2000 );
TEST_ASSERT( mbedtls_x509_crt_parse_der_with_ext_cb( &crt, buf->x, buf->len, 0, NULL, NULL ) == ( result ) );
if( ( result ) == 0 )
{
res = mbedtls_x509_crt_info( (char *) output, 2000, "", &crt );
TEST_ASSERT( res != -1 );
TEST_ASSERT( res != -2 );
TEST_ASSERT_STREQ( (char *) output, result_str );
}
mbedtls_x509_crt_free( &crt );
mbedtls_x509_crt_init( &crt );
memset( output, 0, 2000 );
TEST_ASSERT( mbedtls_x509_crt_parse_der_with_ext_cb( &crt, buf->x, buf->len, 1, NULL, NULL ) == ( result ) );
if( ( result ) == 0 )
{
res = mbedtls_x509_crt_info( (char *) output, 2000, "", &crt );
TEST_ASSERT( res != -1 );
TEST_ASSERT( res != -2 );
TEST_ASSERT_STREQ( (char *) output, result_str );
}
exit:
mbedtls_x509_crt_free( &crt );
}
void test_x509parse_crt_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_x509parse_crt( &data0, (char *) params[2], *( (int *) params[3] ) );
}
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#if defined(MBEDTLS_X509_CRT_PARSE_C)
void test_x509parse_crt_cb( data_t * buf, char * result_str, int result )
{
mbedtls_x509_crt crt;
mbedtls_x509_buf oid;
unsigned char output[2000];
int res;
oid.tag = MBEDTLS_ASN1_OID;
oid.len = MBEDTLS_OID_SIZE(MBEDTLS_OID_PKIX "\x01\x1F");
oid.p = (unsigned char *)MBEDTLS_OID_PKIX "\x01\x1F";
mbedtls_x509_crt_init( &crt );
memset( output, 0, 2000 );
TEST_ASSERT( mbedtls_x509_crt_parse_der_with_ext_cb( &crt, buf->x, buf->len, 0, parse_crt_ext_cb, &oid ) == ( result ) );
if( ( result ) == 0 )
{
res = mbedtls_x509_crt_info( (char *) output, 2000, "", &crt );
TEST_ASSERT( res != -1 );
TEST_ASSERT( res != -2 );
TEST_ASSERT_STREQ( (char *) output, result_str );
}
mbedtls_x509_crt_free( &crt );
mbedtls_x509_crt_init( &crt );
memset( output, 0, 2000 );
TEST_ASSERT( mbedtls_x509_crt_parse_der_with_ext_cb( &crt, buf->x, buf->len, 1, parse_crt_ext_cb, &oid ) == ( result ) );
if( ( result ) == 0 )
{
res = mbedtls_x509_crt_info( (char *) output, 2000, "", &crt );
TEST_ASSERT( res != -1 );
TEST_ASSERT( res != -2 );
TEST_ASSERT_STREQ( (char *) output, result_str );
}
exit:
mbedtls_x509_crt_free( &crt );
}
void test_x509parse_crt_cb_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_x509parse_crt_cb( &data0, (char *) params[2], *( (int *) params[3] ) );
}
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#if defined(MBEDTLS_X509_CRL_PARSE_C)
void test_x509parse_crl( data_t * buf, char * result_str, int result )
{
mbedtls_x509_crl crl;
unsigned char output[2000];
int res;
mbedtls_x509_crl_init( &crl );
memset( output, 0, 2000 );
TEST_ASSERT( mbedtls_x509_crl_parse( &crl, buf->x, buf->len ) == ( result ) );
if( ( result ) == 0 )
{
res = mbedtls_x509_crl_info( (char *) output, 2000, "", &crl );
TEST_ASSERT( res != -1 );
TEST_ASSERT( res != -2 );
TEST_ASSERT_STREQ( (char *) output, result_str );
}
exit:
mbedtls_x509_crl_free( &crl );
}
void test_x509parse_crl_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_x509parse_crl( &data0, (char *) params[2], *( (int *) params[3] ) );
}
#endif /* MBEDTLS_X509_CRL_PARSE_C */
#if defined(MBEDTLS_X509_CSR_PARSE_C)
void test_mbedtls_x509_csr_parse( data_t * csr_der, char * ref_out, int ref_ret )
{
mbedtls_x509_csr csr;
char my_out[1000];
int my_ret;
mbedtls_x509_csr_init( &csr );
memset( my_out, 0, sizeof( my_out ) );
my_ret = mbedtls_x509_csr_parse_der( &csr, csr_der->x, csr_der->len );
TEST_ASSERT( my_ret == ref_ret );
if( ref_ret == 0 )
{
size_t my_out_len = mbedtls_x509_csr_info( my_out, sizeof( my_out ), "", &csr );
TEST_ASSERT( my_out_len == strlen( ref_out ) );
TEST_ASSERT( strcmp( my_out, ref_out ) == 0 );
}
exit:
mbedtls_x509_csr_free( &csr );
}
void test_mbedtls_x509_csr_parse_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_mbedtls_x509_csr_parse( &data0, (char *) params[2], *( (int *) params[3] ) );
}
#endif /* MBEDTLS_X509_CSR_PARSE_C */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRT_PARSE_C)
void test_mbedtls_x509_crt_parse_path( char * crt_path, int ret, int nb_crt )
{
mbedtls_x509_crt chain, *cur;
int i;
mbedtls_x509_crt_init( &chain );
TEST_ASSERT( mbedtls_x509_crt_parse_path( &chain, crt_path ) == ret );
/* Check how many certs we got */
for( i = 0, cur = &chain; cur != NULL; cur = cur->next )
if( cur->raw.p != NULL )
i++;
TEST_ASSERT( i == nb_crt );
exit:
mbedtls_x509_crt_free( &chain );
}
void test_mbedtls_x509_crt_parse_path_wrapper( void ** params )
{
test_mbedtls_x509_crt_parse_path( (char *) params[0], *( (int *) params[1] ), *( (int *) params[2] ) );
}
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRT_PARSE_C)
void test_mbedtls_x509_crt_verify_max( char *ca_file, char *chain_dir, int nb_int,
int ret_chk, int flags_chk )
{
char file_buf[128];
int ret;
uint32_t flags;
mbedtls_x509_crt trusted, chain;
/*
* We expect chain_dir to contain certificates 00.crt, 01.crt, etc.
* with NN.crt signed by NN-1.crt
*/
mbedtls_x509_crt_init( &trusted );
mbedtls_x509_crt_init( &chain );
USE_PSA_INIT( );
/* Load trusted root */
TEST_ASSERT( mbedtls_x509_crt_parse_file( &trusted, ca_file ) == 0 );
/* Load a chain with nb_int intermediates (from 01 to nb_int),
* plus one "end-entity" cert (nb_int + 1) */
ret = mbedtls_snprintf( file_buf, sizeof file_buf, "%s/c%02d.pem", chain_dir,
nb_int + 1 );
TEST_ASSERT( ret > 0 && (size_t) ret < sizeof file_buf );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &chain, file_buf ) == 0 );
/* Try to verify that chain */
ret = mbedtls_x509_crt_verify( &chain, &trusted, NULL, NULL, &flags,
NULL, NULL );
TEST_ASSERT( ret == ret_chk );
TEST_ASSERT( flags == (uint32_t) flags_chk );
exit:
mbedtls_x509_crt_free( &chain );
mbedtls_x509_crt_free( &trusted );
USE_PSA_DONE( );
}
void test_mbedtls_x509_crt_verify_max_wrapper( void ** params )
{
test_mbedtls_x509_crt_verify_max( (char *) params[0], (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRT_PARSE_C)
void test_mbedtls_x509_crt_verify_chain( char *chain_paths, char *trusted_ca,
int flags_result, int result,
char *profile_name, int vrfy_fatal_lvls )
{
char* act;
uint32_t flags;
int res;
mbedtls_x509_crt trusted, chain;
const mbedtls_x509_crt_profile *profile = NULL;
mbedtls_x509_crt_init( &chain );
mbedtls_x509_crt_init( &trusted );
USE_PSA_INIT( );
while( ( act = mystrsep( &chain_paths, " " ) ) != NULL )
TEST_ASSERT( mbedtls_x509_crt_parse_file( &chain, act ) == 0 );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &trusted, trusted_ca ) == 0 );
if( strcmp( profile_name, "" ) == 0 )
profile = &mbedtls_x509_crt_profile_default;
else if( strcmp( profile_name, "next" ) == 0 )
profile = &mbedtls_x509_crt_profile_next;
else if( strcmp( profile_name, "suiteb" ) == 0 )
profile = &mbedtls_x509_crt_profile_suiteb;
else if( strcmp( profile_name, "rsa3072" ) == 0 )
profile = &profile_rsa3072;
else if( strcmp( profile_name, "sha512" ) == 0 )
profile = &profile_sha512;
res = mbedtls_x509_crt_verify_with_profile( &chain, &trusted, NULL, profile,
NULL, &flags, verify_fatal, &vrfy_fatal_lvls );
TEST_ASSERT( res == ( result ) );
TEST_ASSERT( flags == (uint32_t)( flags_result ) );
exit:
mbedtls_x509_crt_free( &trusted );
mbedtls_x509_crt_free( &chain );
USE_PSA_DONE( );
}
void test_mbedtls_x509_crt_verify_chain_wrapper( void ** params )
{
test_mbedtls_x509_crt_verify_chain( (char *) params[0], (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), (char *) params[4], *( (int *) params[5] ) );
}
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_X509_USE_C)
void test_x509_oid_desc( data_t * buf, char * ref_desc )
{
mbedtls_x509_buf oid;
const char *desc = NULL;
int ret;
oid.tag = MBEDTLS_ASN1_OID;
oid.p = buf->x;
oid.len = buf->len;
ret = mbedtls_oid_get_extended_key_usage( &oid, &desc );
if( strcmp( ref_desc, "notfound" ) == 0 )
{
TEST_ASSERT( ret != 0 );
TEST_ASSERT( desc == NULL );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( desc != NULL );
TEST_ASSERT( strcmp( desc, ref_desc ) == 0 );
}
exit:
;
}
void test_x509_oid_desc_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_x509_oid_desc( &data0, (char *) params[2] );
}
#endif /* MBEDTLS_X509_USE_C */
#if defined(MBEDTLS_X509_USE_C)
void test_x509_oid_numstr( data_t * oid_buf, char * numstr, int blen, int ret )
{
mbedtls_x509_buf oid;
char num_buf[100];
memset( num_buf, 0x2a, sizeof num_buf );
oid.tag = MBEDTLS_ASN1_OID;
oid.p = oid_buf->x;
oid.len = oid_buf->len;
TEST_ASSERT( (size_t) blen <= sizeof num_buf );
TEST_ASSERT( mbedtls_oid_get_numeric_string( num_buf, blen, &oid ) == ret );
if( ret >= 0 )
{
TEST_ASSERT( num_buf[ret] == 0 );
TEST_ASSERT( strcmp( num_buf, numstr ) == 0 );
}
exit:
;
}
void test_x509_oid_numstr_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_x509_oid_numstr( &data0, (char *) params[2], *( (int *) params[3] ), *( (int *) params[4] ) );
}
#endif /* MBEDTLS_X509_USE_C */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRT_PARSE_C)
#if defined(MBEDTLS_X509_CHECK_KEY_USAGE)
void test_x509_check_key_usage( char * crt_file, int usage, int ret )
{
mbedtls_x509_crt crt;
mbedtls_x509_crt_init( &crt );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
TEST_ASSERT( mbedtls_x509_crt_check_key_usage( &crt, usage ) == ret );
exit:
mbedtls_x509_crt_free( &crt );
}
void test_x509_check_key_usage_wrapper( void ** params )
{
test_x509_check_key_usage( (char *) params[0], *( (int *) params[1] ), *( (int *) params[2] ) );
}
#endif /* MBEDTLS_X509_CHECK_KEY_USAGE */
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_FS_IO)
#if defined(MBEDTLS_X509_CRT_PARSE_C)
#if defined(MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE)
void test_x509_check_extended_key_usage( char * crt_file, data_t * oid, int ret
)
{
mbedtls_x509_crt crt;
mbedtls_x509_crt_init( &crt );
TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
TEST_ASSERT( mbedtls_x509_crt_check_extended_key_usage( &crt, (const char *)oid->x, oid->len ) == ret );
exit:
mbedtls_x509_crt_free( &crt );
}
void test_x509_check_extended_key_usage_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_x509_check_extended_key_usage( (char *) params[0], &data1, *( (int *) params[3] ) );
}
#endif /* MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE */
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_X509_USE_C)
void test_x509_get_time( int tag, char * time_str, int ret, int year, int mon,
int day, int hour, int min, int sec )
{
mbedtls_x509_time time;
unsigned char buf[21];
unsigned char* start = buf;
unsigned char* end = buf;
memset( &time, 0x00, sizeof( time ) );
*end = (unsigned char)tag; end++;
*end = strlen( time_str );
TEST_ASSERT( *end < 20 );
end++;
memcpy( end, time_str, (size_t)*(end - 1) );
end += *(end - 1);
TEST_ASSERT( mbedtls_x509_get_time( &start, end, &time ) == ret );
if( ret == 0 )
{
TEST_ASSERT( year == time.year );
TEST_ASSERT( mon == time.mon );
TEST_ASSERT( day == time.day );
TEST_ASSERT( hour == time.hour );
TEST_ASSERT( min == time.min );
TEST_ASSERT( sec == time.sec );
}
exit:
;
}
void test_x509_get_time_wrapper( void ** params )
{
test_x509_get_time( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ), *( (int *) params[6] ), *( (int *) params[7] ), *( (int *) params[8] ) );
}
#endif /* MBEDTLS_X509_USE_C */
#if defined(MBEDTLS_X509_CRT_PARSE_C)
#if defined(MBEDTLS_X509_RSASSA_PSS_SUPPORT)
void test_x509_parse_rsassa_pss_params( data_t * params, int params_tag,
int ref_msg_md, int ref_mgf_md,
int ref_salt_len, int ref_ret )
{
int my_ret;
mbedtls_x509_buf buf;
mbedtls_md_type_t my_msg_md, my_mgf_md;
int my_salt_len;
buf.p = params->x;
buf.len = params->len;
buf.tag = params_tag;
my_ret = mbedtls_x509_get_rsassa_pss_params( &buf, &my_msg_md, &my_mgf_md,
&my_salt_len );
TEST_ASSERT( my_ret == ref_ret );
if( ref_ret == 0 )
{
TEST_ASSERT( my_msg_md == (mbedtls_md_type_t) ref_msg_md );
TEST_ASSERT( my_mgf_md == (mbedtls_md_type_t) ref_mgf_md );
TEST_ASSERT( my_salt_len == ref_salt_len );
}
exit:
;;
}
void test_x509_parse_rsassa_pss_params_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_x509_parse_rsassa_pss_params( &data0, *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ), *( (int *) params[6] ) );
}
#endif /* MBEDTLS_X509_RSASSA_PSS_SUPPORT */
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#if defined(MBEDTLS_X509_CRT_PARSE_C)
#if defined(MBEDTLS_SELF_TEST)
void test_x509_selftest( )
{
TEST_ASSERT( mbedtls_x509_self_test( 1 ) == 0 );
exit:
;
}
void test_x509_selftest_wrapper( void ** params )
{
(void)params;
test_x509_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_X509_CRT_PARSE_C */
#endif /* MBEDTLS_BIGNUM_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_BIGNUM_C)
case 0:
{
*out_value = MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT;
}
break;
case 1:
{
*out_value = MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
}
break;
case 2:
{
*out_value = MBEDTLS_X509_BADCERT_MISSING;
}
break;
case 3:
{
*out_value = MBEDTLS_X509_BADCERT_EXPIRED | MBEDTLS_X509_BADCRL_EXPIRED;
}
break;
case 4:
{
*out_value = MBEDTLS_X509_BADCERT_OTHER | 0x80000000;
}
break;
case 5:
{
*out_value = MBEDTLS_ERR_X509_CERT_VERIFY_FAILED;
}
break;
case 6:
{
*out_value = MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED;
}
break;
case 7:
{
*out_value = MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE;
}
break;
case 8:
{
*out_value = MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_EXPIRED | MBEDTLS_X509_BADCERT_CN_MISMATCH;
}
break;
case 9:
{
*out_value = MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCRL_FUTURE | MBEDTLS_X509_BADCERT_CN_MISMATCH;
}
break;
case 10:
{
*out_value = MBEDTLS_X509_BADCRL_EXPIRED;
}
break;
case 11:
{
*out_value = MBEDTLS_X509_BADCRL_FUTURE;
}
break;
case 12:
{
*out_value = MBEDTLS_X509_BADCERT_REVOKED;
}
break;
case 13:
{
*out_value = MBEDTLS_X509_BADCERT_REVOKED | MBEDTLS_X509_BADCERT_CN_MISMATCH;
}
break;
case 14:
{
*out_value = MBEDTLS_X509_BADCERT_EXPIRED;
}
break;
case 15:
{
*out_value = MBEDTLS_X509_BADCERT_FUTURE;
}
break;
case 16:
{
*out_value = MBEDTLS_X509_BADCERT_NOT_TRUSTED;
}
break;
case 17:
{
*out_value = MBEDTLS_X509_BADCERT_BAD_MD;
}
break;
case 18:
{
*out_value = MBEDTLS_X509_BADCRL_BAD_MD | MBEDTLS_X509_BADCERT_BAD_MD;
}
break;
case 19:
{
*out_value = MBEDTLS_X509_BADCERT_OTHER;
}
break;
case 20:
{
*out_value = MBEDTLS_X509_BADCERT_CN_MISMATCH;
}
break;
case 21:
{
*out_value = MBEDTLS_X509_BADCERT_CN_MISMATCH + MBEDTLS_X509_BADCERT_NOT_TRUSTED;
}
break;
case 22:
{
*out_value = MBEDTLS_X509_BADCRL_NOT_TRUSTED;
}
break;
case 23:
{
*out_value = MBEDTLS_X509_BADCERT_REVOKED|MBEDTLS_X509_BADCRL_FUTURE;
}
break;
case 24:
{
*out_value = MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY|MBEDTLS_X509_BADCRL_BAD_MD|MBEDTLS_X509_BADCRL_BAD_PK;
}
break;
case 25:
{
*out_value = MBEDTLS_X509_BADCERT_BAD_PK;
}
break;
case 26:
{
*out_value = MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCRL_BAD_MD;
}
break;
case 27:
{
*out_value = MBEDTLS_ERR_X509_FATAL_ERROR;
}
break;
case 28:
{
*out_value = MBEDTLS_ERR_X509_INVALID_FORMAT;
}
break;
case 29:
{
*out_value = MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
}
break;
case 30:
{
*out_value = MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA;
}
break;
case 31:
{
*out_value = MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
break;
case 32:
{
*out_value = MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
}
break;
case 33:
{
*out_value = MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
}
break;
case 34:
{
*out_value = MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_OUT_OF_DATA;
}
break;
case 35:
{
*out_value = MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
break;
case 36:
{
*out_value = MBEDTLS_ERR_X509_INVALID_VERSION + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH;
}
break;
case 37:
{
*out_value = MBEDTLS_ERR_X509_UNKNOWN_VERSION;
}
break;
case 38:
{
*out_value = MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_OUT_OF_DATA;
}
break;
case 39:
{
*out_value = MBEDTLS_ERR_X509_INVALID_SERIAL + MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
break;
case 40:
{
*out_value = MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA;
}
break;
case 41:
{
*out_value = MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
}
break;
case 42:
{
*out_value = MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
break;
case 43:
{
*out_value = MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + MBEDTLS_ERR_OID_NOT_FOUND;
}
break;
case 44:
{
*out_value = MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH;
}
break;
case 45:
{
*out_value = MBEDTLS_ERR_X509_INVALID_ALG;
}
break;
case 46:
{
*out_value = MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_OUT_OF_DATA;
}
break;
case 47:
{
*out_value = MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
}
break;
case 48:
{
*out_value = MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
break;
case 49:
{
*out_value = MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;;
}
break;
case 50:
{
*out_value = MBEDTLS_ERR_X509_INVALID_NAME + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH;
}
break;
case 51:
{
*out_value = MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_OUT_OF_DATA;
}
break;
case 52:
{
*out_value = MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
}
break;
case 53:
{
*out_value = MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
break;
case 54:
{
*out_value = MBEDTLS_ERR_X509_INVALID_DATE;
}
break;
case 55:
{
*out_value = MBEDTLS_ERR_X509_INVALID_DATE + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH;
}
break;
case 56:
{
*out_value = MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA;
}
break;
case 57:
{
*out_value = MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
}
break;
case 58:
{
*out_value = MBEDTLS_ERR_PK_KEY_INVALID_FORMAT + MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
break;
case 59:
{
*out_value = MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_OUT_OF_DATA;
}
break;
case 60:
{
*out_value = MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
}
break;
case 61:
{
*out_value = MBEDTLS_ERR_PK_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
break;
case 62:
{
*out_value = MBEDTLS_ERR_PK_UNKNOWN_PK_ALG;
}
break;
case 63:
{
*out_value = MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_OUT_OF_DATA;
}
break;
case 64:
{
*out_value = MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
}
break;
case 65:
{
*out_value = MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
break;
case 66:
{
*out_value = MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_INVALID_DATA;
}
break;
case 67:
{
*out_value = MBEDTLS_ERR_PK_INVALID_PUBKEY + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH;
}
break;
case 68:
{
*out_value = MBEDTLS_ERR_PK_INVALID_PUBKEY;
}
break;
case 69:
{
*out_value = MBEDTLS_ERR_X509_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH;
}
break;
case 70:
{
*out_value = MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_OUT_OF_DATA;
}
break;
case 71:
{
*out_value = MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
break;
case 72:
{
*out_value = MBEDTLS_ERR_X509_INVALID_EXTENSIONS + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH;
}
break;
case 73:
{
*out_value = MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE;
}
break;
case 74:
{
*out_value = MBEDTLS_ERR_X509_INVALID_EXTENSIONS;
}
break;
case 75:
{
*out_value = MBEDTLS_ERR_X509_SIG_MISMATCH;
}
break;
case 76:
{
*out_value = MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_OUT_OF_DATA;
}
break;
case 77:
{
*out_value = MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
}
break;
case 78:
{
*out_value = MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
break;
case 79:
{
*out_value = MBEDTLS_ERR_X509_INVALID_SIGNATURE + MBEDTLS_ERR_ASN1_INVALID_DATA;
}
break;
case 80:
{
*out_value = MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG;
}
break;
case 81:
{
*out_value = MBEDTLS_ERR_ASN1_OUT_OF_DATA;
}
break;
case 82:
{
*out_value = MBEDTLS_X509_MAX_INTERMEDIATE_CA;
}
break;
case 83:
{
*out_value = MBEDTLS_X509_MAX_INTERMEDIATE_CA-1;
}
break;
case 84:
{
*out_value = MBEDTLS_X509_MAX_INTERMEDIATE_CA+1;
}
break;
case 85:
{
*out_value = -1;
}
break;
case 86:
{
*out_value = MBEDTLS_ERR_X509_BAD_INPUT_DATA;
}
break;
case 87:
{
*out_value = MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY;
}
break;
case 88:
{
*out_value = MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY;
}
break;
case 89:
{
*out_value = MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_KEY;
}
break;
case 90:
{
*out_value = -2;
}
break;
case 91:
{
*out_value = -4;
}
break;
case 92:
{
*out_value = -3;
}
break;
case 93:
{
*out_value = MBEDTLS_ERR_OID_BUF_TOO_SMALL;
}
break;
case 94:
{
*out_value = MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT;
}
break;
case 95:
{
*out_value = MBEDTLS_X509_KU_KEY_CERT_SIGN;
}
break;
case 96:
{
*out_value = MBEDTLS_X509_KU_DIGITAL_SIGNATURE;
}
break;
case 97:
{
*out_value = MBEDTLS_X509_KU_KEY_CERT_SIGN|MBEDTLS_X509_KU_CRL_SIGN;
}
break;
case 98:
{
*out_value = MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_KEY_AGREEMENT;
}
break;
case 99:
{
*out_value = MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X509_KU_DECIPHER_ONLY;
}
break;
case 100:
{
*out_value = MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE;
}
break;
case 101:
{
*out_value = MBEDTLS_MD_SHA1;
}
break;
case 102:
{
*out_value = MBEDTLS_ASN1_SEQUENCE;
}
break;
case 103:
{
*out_value = MBEDTLS_MD_SHA256;
}
break;
case 104:
{
*out_value = MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_ASN1_INVALID_DATA;
}
break;
case 105:
{
*out_value = MBEDTLS_ERR_X509_INVALID_ALG + MBEDTLS_ERR_OID_NOT_FOUND;
}
break;
case 106:
{
*out_value = MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE + MBEDTLS_ERR_OID_NOT_FOUND;
}
break;
case 107:
{
*out_value = MBEDTLS_ERR_PEM_INVALID_DATA + MBEDTLS_ERR_BASE64_INVALID_CHARACTER;
}
break;
case 108:
{
*out_value = MBEDTLS_ASN1_UTC_TIME;
}
break;
case 109:
{
*out_value = MBEDTLS_ASN1_GENERALIZED_TIME;
}
break;
case 110:
{
*out_value = MBEDTLS_ASN1_CONTEXT_SPECIFIC;
}
break;
case 111:
{
*out_value = MBEDTLS_ERR_X509_INVALID_DATE+MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_BIGNUM_C)
case 0:
{
#if defined(MBEDTLS_PEM_PARSE_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_RSA_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_SHA1_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if defined(MBEDTLS_MD2_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 4:
{
#if defined(MBEDTLS_MD4_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 5:
{
#if defined(MBEDTLS_MD5_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 6:
{
#if defined(MBEDTLS_SHA256_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 7:
{
#if defined(MBEDTLS_SHA512_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 8:
{
#if !defined(MBEDTLS_SHA512_NO_SHA384)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 9:
{
#if defined(MBEDTLS_X509_RSASSA_PSS_SUPPORT)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 10:
{
#if defined(MBEDTLS_ECDSA_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 11:
{
#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 12:
{
#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 13:
{
#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 14:
{
#if defined(MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 15:
{
#if defined(MBEDTLS_HAVE_TIME_DATE)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 16:
{
#if defined(MBEDTLS_PKCS1_V15)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 17:
{
#if defined(MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 18:
{
#if !defined(MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 19:
{
#if defined(MBEDTLS_X509_CHECK_KEY_USAGE)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 20:
{
#if defined(MBEDTLS_ECP_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 21:
{
#if !defined(MBEDTLS_HAVE_TIME_DATE)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 22:
{
#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 23:
{
#if defined(MBEDTLS_CERTS_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 24:
{
#if !defined(MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 25:
{
#if !defined(MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 26:
{
#if defined(MBEDTLS_X509_USE_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRT_PARSE_C)
test_x509_parse_san_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRT_PARSE_C)
test_x509_cert_info_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRL_PARSE_C)
test_mbedtls_x509_crl_info_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRL_PARSE_C)
test_mbedtls_x509_crl_parse_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CSR_PARSE_C)
test_mbedtls_x509_csr_info_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_X509_CRT_PARSE_C)
test_x509_verify_info_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_X509_CRL_PARSE_C) && defined(MBEDTLS_ECP_RESTARTABLE) && defined(MBEDTLS_ECDSA_C)
test_x509_verify_restart_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_X509_CRL_PARSE_C)
test_x509_verify_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_X509_CRL_PARSE_C) && defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
test_x509_verify_ca_cb_failure_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRT_PARSE_C)
test_x509_verify_callback_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRT_PARSE_C)
test_mbedtls_x509_dn_gets_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRT_PARSE_C)
test_mbedtls_x509_time_is_past_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRT_PARSE_C)
test_mbedtls_x509_time_is_future_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_FS_IO)
test_x509parse_crt_file_wrapper,
#else
NULL,
#endif
/* Function Id: 14 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_X509_CRT_PARSE_C)
test_x509parse_crt_wrapper,
#else
NULL,
#endif
/* Function Id: 15 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_X509_CRT_PARSE_C)
test_x509parse_crt_cb_wrapper,
#else
NULL,
#endif
/* Function Id: 16 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_X509_CRL_PARSE_C)
test_x509parse_crl_wrapper,
#else
NULL,
#endif
/* Function Id: 17 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_X509_CSR_PARSE_C)
test_mbedtls_x509_csr_parse_wrapper,
#else
NULL,
#endif
/* Function Id: 18 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRT_PARSE_C)
test_mbedtls_x509_crt_parse_path_wrapper,
#else
NULL,
#endif
/* Function Id: 19 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRT_PARSE_C)
test_mbedtls_x509_crt_verify_max_wrapper,
#else
NULL,
#endif
/* Function Id: 20 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRT_PARSE_C)
test_mbedtls_x509_crt_verify_chain_wrapper,
#else
NULL,
#endif
/* Function Id: 21 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_X509_USE_C)
test_x509_oid_desc_wrapper,
#else
NULL,
#endif
/* Function Id: 22 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_X509_USE_C)
test_x509_oid_numstr_wrapper,
#else
NULL,
#endif
/* Function Id: 23 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_X509_CHECK_KEY_USAGE)
test_x509_check_key_usage_wrapper,
#else
NULL,
#endif
/* Function Id: 24 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_FS_IO) && defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE)
test_x509_check_extended_key_usage_wrapper,
#else
NULL,
#endif
/* Function Id: 25 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_X509_USE_C)
test_x509_get_time_wrapper,
#else
NULL,
#endif
/* Function Id: 26 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_X509_RSASSA_PSS_SUPPORT)
test_x509_parse_rsassa_pss_params_wrapper,
#else
NULL,
#endif
/* Function Id: 27 */
#if defined(MBEDTLS_BIGNUM_C) && defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_SELF_TEST)
test_x509_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_x509parse.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 78,084 | 2,720 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.null.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_cipher.null.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_cipher.function
* Test suite data : suites/test_suite_cipher.null.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_CIPHER_C)
#include "third_party/mbedtls/cipher.h"
#if defined(MBEDTLS_AES_C)
#include "third_party/mbedtls/aes.h"
#endif
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
#endif
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
#define MBEDTLS_CIPHER_AUTH_CRYPT
#endif
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
/* Helper for resetting key/direction
*
* The documentation doesn't explicitly say whether calling
* mbedtls_cipher_setkey() twice is allowed or not. This currently works with
* the default software implementation, but only by accident. It isn't
* guaranteed to work with new ciphers or with alternative implementations of
* individual ciphers, and it doesn't work with the PSA wrappers. So don't do
* it, and instead start with a fresh context.
*/
static int cipher_reset_key( mbedtls_cipher_context_t *ctx, int cipher_id,
int use_psa, size_t tag_len, const data_t *key, int direction )
{
mbedtls_cipher_free( ctx );
mbedtls_cipher_init( ctx );
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
(void) tag_len;
#else
if( use_psa == 1 )
{
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( ctx,
mbedtls_cipher_info_from_type( cipher_id ),
tag_len ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
TEST_ASSERT( 0 == mbedtls_cipher_setup( ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
}
TEST_ASSERT( 0 == mbedtls_cipher_setkey( ctx, key->x, 8 * key->len,
direction ) );
return( 1 );
exit:
return( 0 );
}
/*
* Check if a buffer is all-0 bytes:
* return 1 if it is,
* 0 if it isn't.
*/
int buffer_is_all_zero( const uint8_t *buf, size_t size )
{
for( size_t i = 0; i < size; i++ )
if( buf[i] != 0 )
return 0;
return 1;
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_mbedtls_cipher_list( )
{
const int *cipher_type;
for( cipher_type = mbedtls_cipher_list(); *cipher_type != 0; cipher_type++ )
TEST_ASSERT( mbedtls_cipher_info_from_type( *cipher_type ) != NULL );
exit:
;
}
void test_mbedtls_cipher_list_wrapper( void ** params )
{
(void)params;
test_mbedtls_cipher_list( );
}
void test_cipher_invalid_param_unconditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_cipher_context_t invalid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
mbedtls_cipher_init( &valid_ctx );
mbedtls_cipher_setup( &valid_ctx, valid_info );
mbedtls_cipher_init( &invalid_ctx );
/* mbedtls_cipher_setup() */
TEST_ASSERT( mbedtls_cipher_setup( &valid_ctx, NULL ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_get_block_size() */
TEST_ASSERT( mbedtls_cipher_get_block_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_cipher_mode() */
TEST_ASSERT( mbedtls_cipher_get_cipher_mode( &invalid_ctx ) ==
MBEDTLS_MODE_NONE );
/* mbedtls_cipher_get_iv_size() */
TEST_ASSERT( mbedtls_cipher_get_iv_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_type() */
TEST_ASSERT(
mbedtls_cipher_get_type( &invalid_ctx ) ==
MBEDTLS_CIPHER_NONE);
/* mbedtls_cipher_get_name() */
TEST_ASSERT( mbedtls_cipher_get_name( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_key_bitlen() */
TEST_ASSERT( mbedtls_cipher_get_key_bitlen( &invalid_ctx ) ==
MBEDTLS_KEY_LENGTH_NONE );
/* mbedtls_cipher_get_operation() */
TEST_ASSERT( mbedtls_cipher_get_operation( &invalid_ctx ) ==
MBEDTLS_OPERATION_NONE );
/* mbedtls_cipher_setkey() */
TEST_ASSERT(
mbedtls_cipher_setkey( &invalid_ctx,
valid_buffer,
valid_bitlen,
valid_operation ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_set_iv() */
TEST_ASSERT(
mbedtls_cipher_set_iv( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_reset() */
TEST_ASSERT( mbedtls_cipher_reset( &invalid_ctx ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_ASSERT(
mbedtls_cipher_update_ad( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_ASSERT( mbedtls_cipher_set_padding_mode( &invalid_ctx, valid_mode ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif
/* mbedtls_cipher_update() */
TEST_ASSERT(
mbedtls_cipher_update( &invalid_ctx,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_finish() */
TEST_ASSERT(
mbedtls_cipher_finish( &invalid_ctx,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_ASSERT(
mbedtls_cipher_write_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_check_tag() */
TEST_ASSERT(
mbedtls_cipher_check_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
exit:
mbedtls_cipher_free( &invalid_ctx );
mbedtls_cipher_free( &valid_ctx );
}
void test_cipher_invalid_param_unconditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_unconditional( );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_cipher_invalid_param_conditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_operation_t invalid_operation = 100;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
/* mbedtls_cipher_init() */
TEST_VALID_PARAM( mbedtls_cipher_init( &valid_ctx ) );
TEST_INVALID_PARAM( mbedtls_cipher_init( NULL ) );
/* mbedtls_cipher_setup() */
TEST_VALID_PARAM( mbedtls_cipher_setup( &valid_ctx, valid_info ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setup( NULL, valid_info ) );
/* mbedtls_cipher_get_block_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_block_size( NULL ) );
/* mbedtls_cipher_get_cipher_mode() */
TEST_INVALID_PARAM_RET(
MBEDTLS_MODE_NONE,
mbedtls_cipher_get_cipher_mode( NULL ) );
/* mbedtls_cipher_get_iv_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_iv_size( NULL ) );
/* mbedtls_cipher_get_type() */
TEST_INVALID_PARAM_RET(
MBEDTLS_CIPHER_NONE,
mbedtls_cipher_get_type( NULL ) );
/* mbedtls_cipher_get_name() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_name( NULL ) );
/* mbedtls_cipher_get_key_bitlen() */
TEST_INVALID_PARAM_RET(
MBEDTLS_KEY_LENGTH_NONE,
mbedtls_cipher_get_key_bitlen( NULL ) );
/* mbedtls_cipher_get_operation() */
TEST_INVALID_PARAM_RET(
MBEDTLS_OPERATION_NONE,
mbedtls_cipher_get_operation( NULL ) );
/* mbedtls_cipher_setkey() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( NULL,
valid_buffer,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
NULL,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
valid_buffer,
valid_bitlen,
invalid_operation ) );
/* mbedtls_cipher_set_iv() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_reset() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_reset( NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_padding_mode( NULL, valid_mode ) );
#endif
/* mbedtls_cipher_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( NULL,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
NULL, valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
valid_buffer,
NULL ) );
/* mbedtls_cipher_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( NULL,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
valid_buffer,
NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_check_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
/* mbedtls_cipher_crypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_AEAD)
/* mbedtls_cipher_auth_encrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
/* mbedtls_cipher_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
#endif /* defined(MBEDTLS_CIPHER_MODE_AEAD) */
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
/* mbedtls_cipher_auth_encrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
/* mbedtls_cipher_auth_decrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
#endif /* MBEDTLS_CIPHER_MODE_AEAD || MBEDTLS_NIST_KW_C */
/* mbedtls_cipher_free() */
TEST_VALID_PARAM( mbedtls_cipher_free( NULL ) );
exit:
TEST_VALID_PARAM( mbedtls_cipher_free( &valid_ctx ) );
}
void test_cipher_invalid_param_conditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_conditional( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
#if defined(MBEDTLS_AES_C)
void test_cipher_special_behaviours( )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char input[32];
unsigned char output[32];
#if defined (MBEDTLS_CIPHER_MODE_CBC)
unsigned char iv[32];
#endif
size_t olen = 0;
mbedtls_cipher_init( &ctx );
memset( input, 0, sizeof( input ) );
memset( output, 0, sizeof( output ) );
#if defined(MBEDTLS_CIPHER_MODE_CBC)
memset( iv, 0, sizeof( iv ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_CBC );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* IV too big */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, MBEDTLS_MAX_IV_LENGTH + 1 )
== MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
/* IV too small */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, 0 )
== MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_cipher_free( &ctx );
mbedtls_cipher_init( &ctx );
#endif /* MBEDTLS_CIPHER_MODE_CBC */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_ECB );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* Update ECB with partial block */
TEST_ASSERT( mbedtls_cipher_update( &ctx, input, 1, output, &olen )
== MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED );
exit:
mbedtls_cipher_free( &ctx );
}
void test_cipher_special_behaviours_wrapper( void ** params )
{
(void)params;
test_cipher_special_behaviours( );
}
#endif /* MBEDTLS_AES_C */
void test_enc_dec_buf( int cipher_id, char * cipher_string, int key_len,
int length_val, int pad_mode )
{
size_t length = length_val, outlen, total_len, i, block_size;
unsigned char key[64];
unsigned char iv[16];
unsigned char ad[13];
unsigned char tag[16];
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
/*
* Prepare contexts
*/
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( key, 0x2a, sizeof( key ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( mbedtls_cipher_info_from_string( cipher_string ) == cipher_info );
/* Initialise enc and dec contexts */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
/*
* Do a few encode/decode cycles
*/
for( i = 0; i < 3; i++ )
{
memset( iv , 0x00 + i, sizeof( iv ) );
memset( ad, 0x10 + i, sizeof( ad ) );
memset( inbuf, 0x20 + i, sizeof( inbuf ) );
memset( encbuf, 0, sizeof( encbuf ) );
memset( decbuf, 0, sizeof( decbuf ) );
memset( tag, 0, sizeof( tag ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, ad, sizeof( ad ) - i ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, ad, sizeof( ad ) - i ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, length, encbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_write_tag( &ctx_enc, tag, sizeof( tag ) ) );
#endif
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len > length &&
total_len <= length + block_size ) );
/* decode the previously encoded string */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, total_len, decbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_check_tag( &ctx_dec, tag, sizeof( tag ) ) );
#endif
/* check result */
TEST_ASSERT( total_len == length );
TEST_ASSERT( 0 == memcmp(inbuf, decbuf, length) );
}
/*
* Done
*/
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_wrapper( void ** params )
{
test_enc_dec_buf( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_enc_fail( int cipher_id, int pad_mode, int key_len, int length_val,
int ret )
{
size_t length = length_val;
unsigned char key[32];
unsigned char iv[16];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char inbuf[64];
unsigned char encbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
/* Initialise context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, NULL, 0 ) );
#endif
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, inbuf, length, encbuf, &outlen ) );
TEST_ASSERT( ret == mbedtls_cipher_finish( &ctx, encbuf + outlen, &outlen ) );
/* done */
exit:
mbedtls_cipher_free( &ctx );
}
void test_enc_fail_wrapper( void ** params )
{
test_enc_fail( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_dec_empty_buf( int cipher,
int expected_update_ret,
int expected_finish_ret )
{
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
const mbedtls_cipher_info_t *cipher_info;
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise context */
cipher_info = mbedtls_cipher_info_from_type( cipher );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( sizeof(key) * 8 >= cipher_info->key_bitlen );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec,
key, cipher_info->key_bitlen,
MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
#endif
/* decode 0-byte string */
TEST_ASSERT( expected_update_ret ==
mbedtls_cipher_update( &ctx_dec, encbuf, 0, decbuf, &outlen ) );
TEST_ASSERT( 0 == outlen );
if ( expected_finish_ret == 0 &&
( cipher_info->mode == MBEDTLS_MODE_CBC ||
cipher_info->mode == MBEDTLS_MODE_ECB ) )
{
/* Non-CBC and non-ECB ciphers are OK with decrypting empty buffers and
* return success, not MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED, when
* decrypting an empty buffer.
* On the other hand, CBC and ECB ciphers need a full block of input.
*/
expected_finish_ret = MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED;
}
TEST_ASSERT( expected_finish_ret == mbedtls_cipher_finish(
&ctx_dec, decbuf + outlen, &outlen ) );
TEST_ASSERT( 0 == outlen );
exit:
mbedtls_cipher_free( &ctx_dec );
}
void test_dec_empty_buf_wrapper( void ** params )
{
test_dec_empty_buf( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
void test_enc_dec_buf_multipart( int cipher_id, int key_len, int first_length_val,
int second_length_val, int pad_mode,
int first_encrypt_output_len, int second_encrypt_output_len,
int first_decrypt_output_len, int second_decrypt_output_len )
{
size_t first_length = first_length_val;
size_t second_length = second_length_val;
size_t length = first_length + second_length;
size_t block_size;
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
const mbedtls_cipher_info_t *cipher_info;
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
size_t totaloutlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise enc and dec contexts */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, NULL, 0 ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, first_length, encbuf, &outlen ) );
TEST_ASSERT( (size_t)first_encrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf + first_length, second_length, encbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_encrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen > length &&
totaloutlen <= length + block_size ) );
/* decode the previously encoded string */
second_length = totaloutlen - first_length;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, first_length, decbuf, &outlen ) );
TEST_ASSERT( (size_t)first_decrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf + first_length, second_length, decbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_decrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length );
TEST_ASSERT( 0 == memcmp(inbuf, decbuf, length) );
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_multipart_wrapper( void ** params )
{
test_enc_dec_buf_multipart( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ), *( (int *) params[6] ), *( (int *) params[7] ), *( (int *) params[8] ) );
}
void test_decrypt_test_vec( int cipher_id, int pad_mode, data_t * key,
data_t * iv, data_t * cipher,
data_t * clear, data_t * ad, data_t * tag,
int finish_result, int tag_result )
{
unsigned char output[265];
mbedtls_cipher_context_t ctx;
size_t outlen, total_len;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
#if !defined(MBEDTLS_GCM_C) && !defined(MBEDTLS_CHACHAPOLY_C)
((void) ad);
((void) tag);
#endif
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, MBEDTLS_DECRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( pad_mode != -1 )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv->x, iv->len ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, ad->x, ad->len ) );
#endif
/* decode buffer and check tag->x */
total_len = 0;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, cipher->x, cipher->len, output, &outlen ) );
total_len += outlen;
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( tag_result == mbedtls_cipher_check_tag( &ctx, tag->x, tag->len ) );
#endif
/* check plaintext only if everything went fine */
if( 0 == finish_result && 0 == tag_result )
{
TEST_ASSERT( total_len == clear->len );
TEST_ASSERT( 0 == memcmp( output, clear->x, clear->len ) );
}
exit:
mbedtls_cipher_free( &ctx );
}
void test_decrypt_test_vec_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_decrypt_test_vec( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, &data10, &data12, *( (int *) params[14] ), *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
void test_auth_crypt_tv( int cipher_id, data_t * key, data_t * iv,
data_t * ad, data_t * cipher, data_t * tag,
char * result, data_t * clear, int use_psa )
{
/*
* Take an AEAD ciphertext + tag and perform a pair
* of AEAD decryption and AEAD encryption. Check that
* this results in the expected plaintext, and that
* decryption and encryption are inverse to one another.
*
* Do that twice:
* - once with legacy functions auth_decrypt/auth_encrypt
* - once with new functions auth_decrypt_ext/auth_encrypt_ext
* This allows testing both without duplicating test cases.
*/
int ret;
int using_nist_kw, using_nist_kw_padding;
mbedtls_cipher_context_t ctx;
size_t outlen;
unsigned char *cipher_plus_tag = NULL;
size_t cipher_plus_tag_len;
unsigned char *decrypt_buf = NULL;
size_t decrypt_buf_len = 0;
unsigned char *encrypt_buf = NULL;
size_t encrypt_buf_len = 0;
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
unsigned char *tmp_tag = NULL;
unsigned char *tmp_cipher = NULL;
unsigned char *tag_buf = NULL;
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
/* Null pointers are documented as valid for inputs of length 0.
* The test framework passes non-null pointers, so set them to NULL.
* key, cipher and tag can't be empty. */
if( iv->len == 0 )
iv->x = NULL;
if( ad->len == 0 )
ad->x = NULL;
if( clear->len == 0 )
clear->x = NULL;
mbedtls_cipher_init( &ctx );
/* Initialize PSA Crypto */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_ASSERT( psa_crypto_init( ) );
#else
(void) use_psa;
#endif
/*
* Are we using NIST_KW? with padding?
*/
using_nist_kw_padding = cipher_id == MBEDTLS_CIPHER_AES_128_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_192_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_256_KWP;
using_nist_kw = cipher_id == MBEDTLS_CIPHER_AES_128_KW ||
cipher_id == MBEDTLS_CIPHER_AES_192_KW ||
cipher_id == MBEDTLS_CIPHER_AES_256_KW ||
using_nist_kw_padding;
/****************************************************************
* *
* Part 1: non-deprecated API *
* *
****************************************************************/
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* prepare buffer for decryption
* (we need the tag appended to the ciphertext)
*/
cipher_plus_tag_len = cipher->len + tag->len;
ASSERT_ALLOC( cipher_plus_tag, cipher_plus_tag_len );
memcpy( cipher_plus_tag, cipher->x, cipher->len );
memcpy( cipher_plus_tag + cipher->len, tag->x, tag->len );
/*
* Compute length of output buffer according to the documentation
*/
if( using_nist_kw )
decrypt_buf_len = cipher_plus_tag_len - 8;
else
decrypt_buf_len = cipher_plus_tag_len - tag->len;
/*
* Try decrypting to a buffer that's 1B too small
*/
if( decrypt_buf_len != 0 )
{
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len, &outlen, tag->len );
if( strcmp( result, "FAIL" ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, decrypt_buf_len ) );
}
else
{
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
/* Free this, but keep cipher_plus_tag for deprecated function with PSA */
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/*
* Compute size of output buffer according to documentation
*/
if( using_nist_kw )
{
encrypt_buf_len = clear->len + 8;
if( using_nist_kw_padding && encrypt_buf_len % 8 != 0 )
encrypt_buf_len += 8 - encrypt_buf_len % 8;
}
else
{
encrypt_buf_len = clear->len + tag->len;
}
/*
* Try encrypting with an output buffer that's 1B too small
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret != 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
/*
* Encrypt and check the result
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len, &outlen, tag->len );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len + tag->len );
TEST_ASSERT( memcmp( encrypt_buf, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( memcmp( encrypt_buf + cipher->len,
tag->x, tag->len ) == 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
}
/****************************************************************
* *
* Part 2: deprecated API *
* *
****************************************************************/
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* Prepare pointers for decryption
*/
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
{
/* PSA requires that the tag immediately follows the ciphertext.
* Fortunately, we already have that from testing the new API. */
tmp_cipher = cipher_plus_tag;
tmp_tag = tmp_cipher + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
tmp_cipher = cipher->x;
tmp_tag = tag->x;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, cipher->len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
tmp_cipher, cipher->len, decrypt_buf, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
/* NIST_KW with legacy API */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else if( strcmp( result, "FAIL" ) == 0 )
{
/* unauthentic message */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, cipher->len ) );
}
else
{
/* authentic message: is the plaintext correct? */
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
mbedtls_free( cipher_plus_tag );
cipher_plus_tag = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/* prepare buffers for encryption */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa )
{
ASSERT_ALLOC( cipher_plus_tag, cipher->len + tag->len );
tmp_cipher = cipher_plus_tag;
tmp_tag = cipher_plus_tag + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
ASSERT_ALLOC( encrypt_buf, cipher->len );
ASSERT_ALLOC( tag_buf, tag->len );
tmp_cipher = encrypt_buf;
tmp_tag = tag_buf;
}
/*
* Encrypt and check the result
*/
outlen = 0;
ret = mbedtls_cipher_auth_encrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
clear->x, clear->len, tmp_cipher, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len );
if( cipher->len != 0 )
TEST_ASSERT( memcmp( tmp_cipher, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( memcmp( tmp_tag, tag->x, tag->len ) == 0 );
}
}
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
exit:
mbedtls_cipher_free( &ctx );
mbedtls_free( decrypt_buf );
mbedtls_free( encrypt_buf );
mbedtls_free( cipher_plus_tag );
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
mbedtls_free( tag_buf );
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_auth_crypt_tv_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_auth_crypt_tv( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, (char *) params[11], &data12, *( (int *) params[14] ) );
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_test_vec_ecb( int cipher_id, int operation, data_t * key,
data_t * input, data_t * result, int finish_result
)
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, input->x,
mbedtls_cipher_get_block_size( &ctx ),
output, &outlen ) );
TEST_ASSERT( outlen == mbedtls_cipher_get_block_size( &ctx ) );
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
TEST_ASSERT( 0 == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == memcmp( output, result->x,
mbedtls_cipher_get_block_size( &ctx ) ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_test_vec_ecb_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_test_vec_ecb( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, *( (int *) params[8] ) );
}
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_test_vec_crypt( int cipher_id, int operation, data_t *key,
data_t *iv, data_t *input, data_t *result,
int finish_result, int use_psa )
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
#else
if( use_psa == 1 )
{
PSA_ASSERT( psa_crypto_init( ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( &ctx,
mbedtls_cipher_info_from_type( cipher_id ), 0 ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
if( MBEDTLS_MODE_CBC == ctx.cipher_info->mode )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, MBEDTLS_PADDING_NONE ) );
TEST_ASSERT( finish_result == mbedtls_cipher_crypt( &ctx, iv->len ? iv->x : NULL,
iv->len, input->x, input->len,
output, &outlen ) );
TEST_ASSERT( result->len == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == memcmp( output, result->x, outlen ) );
exit:
mbedtls_cipher_free( &ctx );
#if defined(MBEDTLS_USE_PSA_CRYPTO)
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_test_vec_crypt_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_test_vec_crypt( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_set_padding( int cipher_id, int pad_mode, int ret )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
mbedtls_cipher_init( &ctx );
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( ret == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_set_padding_wrapper( void ** params )
{
test_set_padding( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_check_padding( int pad_mode, data_t * input, int ret, int dlen_check
)
{
mbedtls_cipher_info_t cipher_info;
mbedtls_cipher_context_t ctx;
size_t dlen;
/* build a fake context just for getting access to get_padding */
mbedtls_cipher_init( &ctx );
cipher_info.mode = MBEDTLS_MODE_CBC;
ctx.cipher_info = &cipher_info;
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
TEST_ASSERT( ret == ctx.get_padding( input->x, input->len, &dlen ) );
if( 0 == ret )
TEST_ASSERT( dlen == (size_t) dlen_check );
exit:
;
}
void test_check_padding_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_check_padding( *( (int *) params[0] ), &data1, *( (int *) params[3] ), *( (int *) params[4] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#endif /* MBEDTLS_CIPHER_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
*out_value = MBEDTLS_CIPHER_NULL;
}
break;
case 1:
{
*out_value = -1;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
#if defined(MBEDTLS_CIPHER_NULL_CIPHER)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_CIPHER_C)
test_mbedtls_cipher_list_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_CIPHER_C)
test_cipher_invalid_param_unconditional_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_cipher_invalid_param_conditional_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_AES_C)
test_cipher_special_behaviours_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_fail_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_CIPHER_C)
test_dec_empty_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_multipart_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_CIPHER_C)
test_decrypt_test_vec_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_AUTH_CRYPT)
test_auth_crypt_tv_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_CIPHER_C)
test_test_vec_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_test_vec_crypt_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_set_padding_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_check_padding_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_cipher.null.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 71,613 | 2,029 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.chachapoly.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_cipher.chachapoly.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_cipher.function
* Test suite data : suites/test_suite_cipher.chachapoly.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_CIPHER_C)
#include "third_party/mbedtls/cipher.h"
#if defined(MBEDTLS_AES_C)
#include "third_party/mbedtls/aes.h"
#endif
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
#endif
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
#define MBEDTLS_CIPHER_AUTH_CRYPT
#endif
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
/* Helper for resetting key/direction
*
* The documentation doesn't explicitly say whether calling
* mbedtls_cipher_setkey() twice is allowed or not. This currently works with
* the default software implementation, but only by accident. It isn't
* guaranteed to work with new ciphers or with alternative implementations of
* individual ciphers, and it doesn't work with the PSA wrappers. So don't do
* it, and instead start with a fresh context.
*/
static int cipher_reset_key( mbedtls_cipher_context_t *ctx, int cipher_id,
int use_psa, size_t tag_len, const data_t *key, int direction )
{
mbedtls_cipher_free( ctx );
mbedtls_cipher_init( ctx );
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
(void) tag_len;
#else
if( use_psa == 1 )
{
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( ctx,
mbedtls_cipher_info_from_type( cipher_id ),
tag_len ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
TEST_ASSERT( 0 == mbedtls_cipher_setup( ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
}
TEST_ASSERT( 0 == mbedtls_cipher_setkey( ctx, key->x, 8 * key->len,
direction ) );
return( 1 );
exit:
return( 0 );
}
/*
* Check if a buffer is all-0 bytes:
* return 1 if it is,
* 0 if it isn't.
*/
int buffer_is_all_zero( const uint8_t *buf, size_t size )
{
for( size_t i = 0; i < size; i++ )
if( buf[i] != 0 )
return 0;
return 1;
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_mbedtls_cipher_list( )
{
const int *cipher_type;
for( cipher_type = mbedtls_cipher_list(); *cipher_type != 0; cipher_type++ )
TEST_ASSERT( mbedtls_cipher_info_from_type( *cipher_type ) != NULL );
exit:
;
}
void test_mbedtls_cipher_list_wrapper( void ** params )
{
(void)params;
test_mbedtls_cipher_list( );
}
void test_cipher_invalid_param_unconditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_cipher_context_t invalid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
mbedtls_cipher_init( &valid_ctx );
mbedtls_cipher_setup( &valid_ctx, valid_info );
mbedtls_cipher_init( &invalid_ctx );
/* mbedtls_cipher_setup() */
TEST_ASSERT( mbedtls_cipher_setup( &valid_ctx, NULL ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_get_block_size() */
TEST_ASSERT( mbedtls_cipher_get_block_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_cipher_mode() */
TEST_ASSERT( mbedtls_cipher_get_cipher_mode( &invalid_ctx ) ==
MBEDTLS_MODE_NONE );
/* mbedtls_cipher_get_iv_size() */
TEST_ASSERT( mbedtls_cipher_get_iv_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_type() */
TEST_ASSERT(
mbedtls_cipher_get_type( &invalid_ctx ) ==
MBEDTLS_CIPHER_NONE);
/* mbedtls_cipher_get_name() */
TEST_ASSERT( mbedtls_cipher_get_name( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_key_bitlen() */
TEST_ASSERT( mbedtls_cipher_get_key_bitlen( &invalid_ctx ) ==
MBEDTLS_KEY_LENGTH_NONE );
/* mbedtls_cipher_get_operation() */
TEST_ASSERT( mbedtls_cipher_get_operation( &invalid_ctx ) ==
MBEDTLS_OPERATION_NONE );
/* mbedtls_cipher_setkey() */
TEST_ASSERT(
mbedtls_cipher_setkey( &invalid_ctx,
valid_buffer,
valid_bitlen,
valid_operation ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_set_iv() */
TEST_ASSERT(
mbedtls_cipher_set_iv( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_reset() */
TEST_ASSERT( mbedtls_cipher_reset( &invalid_ctx ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_ASSERT(
mbedtls_cipher_update_ad( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_ASSERT( mbedtls_cipher_set_padding_mode( &invalid_ctx, valid_mode ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif
/* mbedtls_cipher_update() */
TEST_ASSERT(
mbedtls_cipher_update( &invalid_ctx,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_finish() */
TEST_ASSERT(
mbedtls_cipher_finish( &invalid_ctx,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_ASSERT(
mbedtls_cipher_write_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_check_tag() */
TEST_ASSERT(
mbedtls_cipher_check_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
exit:
mbedtls_cipher_free( &invalid_ctx );
mbedtls_cipher_free( &valid_ctx );
}
void test_cipher_invalid_param_unconditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_unconditional( );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_cipher_invalid_param_conditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_operation_t invalid_operation = 100;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
/* mbedtls_cipher_init() */
TEST_VALID_PARAM( mbedtls_cipher_init( &valid_ctx ) );
TEST_INVALID_PARAM( mbedtls_cipher_init( NULL ) );
/* mbedtls_cipher_setup() */
TEST_VALID_PARAM( mbedtls_cipher_setup( &valid_ctx, valid_info ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setup( NULL, valid_info ) );
/* mbedtls_cipher_get_block_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_block_size( NULL ) );
/* mbedtls_cipher_get_cipher_mode() */
TEST_INVALID_PARAM_RET(
MBEDTLS_MODE_NONE,
mbedtls_cipher_get_cipher_mode( NULL ) );
/* mbedtls_cipher_get_iv_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_iv_size( NULL ) );
/* mbedtls_cipher_get_type() */
TEST_INVALID_PARAM_RET(
MBEDTLS_CIPHER_NONE,
mbedtls_cipher_get_type( NULL ) );
/* mbedtls_cipher_get_name() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_name( NULL ) );
/* mbedtls_cipher_get_key_bitlen() */
TEST_INVALID_PARAM_RET(
MBEDTLS_KEY_LENGTH_NONE,
mbedtls_cipher_get_key_bitlen( NULL ) );
/* mbedtls_cipher_get_operation() */
TEST_INVALID_PARAM_RET(
MBEDTLS_OPERATION_NONE,
mbedtls_cipher_get_operation( NULL ) );
/* mbedtls_cipher_setkey() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( NULL,
valid_buffer,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
NULL,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
valid_buffer,
valid_bitlen,
invalid_operation ) );
/* mbedtls_cipher_set_iv() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_reset() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_reset( NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_padding_mode( NULL, valid_mode ) );
#endif
/* mbedtls_cipher_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( NULL,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
NULL, valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
valid_buffer,
NULL ) );
/* mbedtls_cipher_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( NULL,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
valid_buffer,
NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_check_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
/* mbedtls_cipher_crypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_AEAD)
/* mbedtls_cipher_auth_encrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
/* mbedtls_cipher_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
#endif /* defined(MBEDTLS_CIPHER_MODE_AEAD) */
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
/* mbedtls_cipher_auth_encrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
/* mbedtls_cipher_auth_decrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
#endif /* MBEDTLS_CIPHER_MODE_AEAD || MBEDTLS_NIST_KW_C */
/* mbedtls_cipher_free() */
TEST_VALID_PARAM( mbedtls_cipher_free( NULL ) );
exit:
TEST_VALID_PARAM( mbedtls_cipher_free( &valid_ctx ) );
}
void test_cipher_invalid_param_conditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_conditional( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
#if defined(MBEDTLS_AES_C)
void test_cipher_special_behaviours( )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char input[32];
unsigned char output[32];
#if defined (MBEDTLS_CIPHER_MODE_CBC)
unsigned char iv[32];
#endif
size_t olen = 0;
mbedtls_cipher_init( &ctx );
memset( input, 0, sizeof( input ) );
memset( output, 0, sizeof( output ) );
#if defined(MBEDTLS_CIPHER_MODE_CBC)
memset( iv, 0, sizeof( iv ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_CBC );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* IV too big */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, MBEDTLS_MAX_IV_LENGTH + 1 )
== MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
/* IV too small */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, 0 )
== MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_cipher_free( &ctx );
mbedtls_cipher_init( &ctx );
#endif /* MBEDTLS_CIPHER_MODE_CBC */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_ECB );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* Update ECB with partial block */
TEST_ASSERT( mbedtls_cipher_update( &ctx, input, 1, output, &olen )
== MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED );
exit:
mbedtls_cipher_free( &ctx );
}
void test_cipher_special_behaviours_wrapper( void ** params )
{
(void)params;
test_cipher_special_behaviours( );
}
#endif /* MBEDTLS_AES_C */
void test_enc_dec_buf( int cipher_id, char * cipher_string, int key_len,
int length_val, int pad_mode )
{
size_t length = length_val, outlen, total_len, i, block_size;
unsigned char key[64];
unsigned char iv[16];
unsigned char ad[13];
unsigned char tag[16];
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
/*
* Prepare contexts
*/
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( key, 0x2a, sizeof( key ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( mbedtls_cipher_info_from_string( cipher_string ) == cipher_info );
/* Initialise enc and dec contexts */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
/*
* Do a few encode/decode cycles
*/
for( i = 0; i < 3; i++ )
{
memset( iv , 0x00 + i, sizeof( iv ) );
memset( ad, 0x10 + i, sizeof( ad ) );
memset( inbuf, 0x20 + i, sizeof( inbuf ) );
memset( encbuf, 0, sizeof( encbuf ) );
memset( decbuf, 0, sizeof( decbuf ) );
memset( tag, 0, sizeof( tag ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, ad, sizeof( ad ) - i ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, ad, sizeof( ad ) - i ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, length, encbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_write_tag( &ctx_enc, tag, sizeof( tag ) ) );
#endif
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len > length &&
total_len <= length + block_size ) );
/* decode the previously encoded string */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, total_len, decbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_check_tag( &ctx_dec, tag, sizeof( tag ) ) );
#endif
/* check result */
TEST_ASSERT( total_len == length );
TEST_ASSERT( 0 == memcmp(inbuf, decbuf, length) );
}
/*
* Done
*/
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_wrapper( void ** params )
{
test_enc_dec_buf( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_enc_fail( int cipher_id, int pad_mode, int key_len, int length_val,
int ret )
{
size_t length = length_val;
unsigned char key[32];
unsigned char iv[16];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char inbuf[64];
unsigned char encbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
/* Initialise context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, NULL, 0 ) );
#endif
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, inbuf, length, encbuf, &outlen ) );
TEST_ASSERT( ret == mbedtls_cipher_finish( &ctx, encbuf + outlen, &outlen ) );
/* done */
exit:
mbedtls_cipher_free( &ctx );
}
void test_enc_fail_wrapper( void ** params )
{
test_enc_fail( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_dec_empty_buf( int cipher,
int expected_update_ret,
int expected_finish_ret )
{
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
const mbedtls_cipher_info_t *cipher_info;
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise context */
cipher_info = mbedtls_cipher_info_from_type( cipher );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( sizeof(key) * 8 >= cipher_info->key_bitlen );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec,
key, cipher_info->key_bitlen,
MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
#endif
/* decode 0-byte string */
TEST_ASSERT( expected_update_ret ==
mbedtls_cipher_update( &ctx_dec, encbuf, 0, decbuf, &outlen ) );
TEST_ASSERT( 0 == outlen );
if ( expected_finish_ret == 0 &&
( cipher_info->mode == MBEDTLS_MODE_CBC ||
cipher_info->mode == MBEDTLS_MODE_ECB ) )
{
/* Non-CBC and non-ECB ciphers are OK with decrypting empty buffers and
* return success, not MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED, when
* decrypting an empty buffer.
* On the other hand, CBC and ECB ciphers need a full block of input.
*/
expected_finish_ret = MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED;
}
TEST_ASSERT( expected_finish_ret == mbedtls_cipher_finish(
&ctx_dec, decbuf + outlen, &outlen ) );
TEST_ASSERT( 0 == outlen );
exit:
mbedtls_cipher_free( &ctx_dec );
}
void test_dec_empty_buf_wrapper( void ** params )
{
test_dec_empty_buf( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
void test_enc_dec_buf_multipart( int cipher_id, int key_len, int first_length_val,
int second_length_val, int pad_mode,
int first_encrypt_output_len, int second_encrypt_output_len,
int first_decrypt_output_len, int second_decrypt_output_len )
{
size_t first_length = first_length_val;
size_t second_length = second_length_val;
size_t length = first_length + second_length;
size_t block_size;
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
const mbedtls_cipher_info_t *cipher_info;
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
size_t totaloutlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise enc and dec contexts */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, NULL, 0 ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, first_length, encbuf, &outlen ) );
TEST_ASSERT( (size_t)first_encrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf + first_length, second_length, encbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_encrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen > length &&
totaloutlen <= length + block_size ) );
/* decode the previously encoded string */
second_length = totaloutlen - first_length;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, first_length, decbuf, &outlen ) );
TEST_ASSERT( (size_t)first_decrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf + first_length, second_length, decbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_decrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length );
TEST_ASSERT( 0 == memcmp(inbuf, decbuf, length) );
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_multipart_wrapper( void ** params )
{
test_enc_dec_buf_multipart( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ), *( (int *) params[6] ), *( (int *) params[7] ), *( (int *) params[8] ) );
}
void test_decrypt_test_vec( int cipher_id, int pad_mode, data_t * key,
data_t * iv, data_t * cipher,
data_t * clear, data_t * ad, data_t * tag,
int finish_result, int tag_result )
{
unsigned char output[265];
mbedtls_cipher_context_t ctx;
size_t outlen, total_len;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
#if !defined(MBEDTLS_GCM_C) && !defined(MBEDTLS_CHACHAPOLY_C)
((void) ad);
((void) tag);
#endif
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, MBEDTLS_DECRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( pad_mode != -1 )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv->x, iv->len ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, ad->x, ad->len ) );
#endif
/* decode buffer and check tag->x */
total_len = 0;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, cipher->x, cipher->len, output, &outlen ) );
total_len += outlen;
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( tag_result == mbedtls_cipher_check_tag( &ctx, tag->x, tag->len ) );
#endif
/* check plaintext only if everything went fine */
if( 0 == finish_result && 0 == tag_result )
{
TEST_ASSERT( total_len == clear->len );
TEST_ASSERT( 0 == memcmp( output, clear->x, clear->len ) );
}
exit:
mbedtls_cipher_free( &ctx );
}
void test_decrypt_test_vec_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_decrypt_test_vec( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, &data10, &data12, *( (int *) params[14] ), *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
void test_auth_crypt_tv( int cipher_id, data_t * key, data_t * iv,
data_t * ad, data_t * cipher, data_t * tag,
char * result, data_t * clear, int use_psa )
{
/*
* Take an AEAD ciphertext + tag and perform a pair
* of AEAD decryption and AEAD encryption. Check that
* this results in the expected plaintext, and that
* decryption and encryption are inverse to one another.
*
* Do that twice:
* - once with legacy functions auth_decrypt/auth_encrypt
* - once with new functions auth_decrypt_ext/auth_encrypt_ext
* This allows testing both without duplicating test cases.
*/
int ret;
int using_nist_kw, using_nist_kw_padding;
mbedtls_cipher_context_t ctx;
size_t outlen;
unsigned char *cipher_plus_tag = NULL;
size_t cipher_plus_tag_len;
unsigned char *decrypt_buf = NULL;
size_t decrypt_buf_len = 0;
unsigned char *encrypt_buf = NULL;
size_t encrypt_buf_len = 0;
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
unsigned char *tmp_tag = NULL;
unsigned char *tmp_cipher = NULL;
unsigned char *tag_buf = NULL;
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
/* Null pointers are documented as valid for inputs of length 0.
* The test framework passes non-null pointers, so set them to NULL.
* key, cipher and tag can't be empty. */
if( iv->len == 0 )
iv->x = NULL;
if( ad->len == 0 )
ad->x = NULL;
if( clear->len == 0 )
clear->x = NULL;
mbedtls_cipher_init( &ctx );
/* Initialize PSA Crypto */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_ASSERT( psa_crypto_init( ) );
#else
(void) use_psa;
#endif
/*
* Are we using NIST_KW? with padding?
*/
using_nist_kw_padding = cipher_id == MBEDTLS_CIPHER_AES_128_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_192_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_256_KWP;
using_nist_kw = cipher_id == MBEDTLS_CIPHER_AES_128_KW ||
cipher_id == MBEDTLS_CIPHER_AES_192_KW ||
cipher_id == MBEDTLS_CIPHER_AES_256_KW ||
using_nist_kw_padding;
/****************************************************************
* *
* Part 1: non-deprecated API *
* *
****************************************************************/
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* prepare buffer for decryption
* (we need the tag appended to the ciphertext)
*/
cipher_plus_tag_len = cipher->len + tag->len;
ASSERT_ALLOC( cipher_plus_tag, cipher_plus_tag_len );
memcpy( cipher_plus_tag, cipher->x, cipher->len );
memcpy( cipher_plus_tag + cipher->len, tag->x, tag->len );
/*
* Compute length of output buffer according to the documentation
*/
if( using_nist_kw )
decrypt_buf_len = cipher_plus_tag_len - 8;
else
decrypt_buf_len = cipher_plus_tag_len - tag->len;
/*
* Try decrypting to a buffer that's 1B too small
*/
if( decrypt_buf_len != 0 )
{
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len, &outlen, tag->len );
if( strcmp( result, "FAIL" ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, decrypt_buf_len ) );
}
else
{
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
/* Free this, but keep cipher_plus_tag for deprecated function with PSA */
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/*
* Compute size of output buffer according to documentation
*/
if( using_nist_kw )
{
encrypt_buf_len = clear->len + 8;
if( using_nist_kw_padding && encrypt_buf_len % 8 != 0 )
encrypt_buf_len += 8 - encrypt_buf_len % 8;
}
else
{
encrypt_buf_len = clear->len + tag->len;
}
/*
* Try encrypting with an output buffer that's 1B too small
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret != 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
/*
* Encrypt and check the result
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len, &outlen, tag->len );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len + tag->len );
TEST_ASSERT( memcmp( encrypt_buf, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( memcmp( encrypt_buf + cipher->len,
tag->x, tag->len ) == 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
}
/****************************************************************
* *
* Part 2: deprecated API *
* *
****************************************************************/
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* Prepare pointers for decryption
*/
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
{
/* PSA requires that the tag immediately follows the ciphertext.
* Fortunately, we already have that from testing the new API. */
tmp_cipher = cipher_plus_tag;
tmp_tag = tmp_cipher + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
tmp_cipher = cipher->x;
tmp_tag = tag->x;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, cipher->len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
tmp_cipher, cipher->len, decrypt_buf, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
/* NIST_KW with legacy API */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else if( strcmp( result, "FAIL" ) == 0 )
{
/* unauthentic message */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, cipher->len ) );
}
else
{
/* authentic message: is the plaintext correct? */
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
mbedtls_free( cipher_plus_tag );
cipher_plus_tag = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/* prepare buffers for encryption */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa )
{
ASSERT_ALLOC( cipher_plus_tag, cipher->len + tag->len );
tmp_cipher = cipher_plus_tag;
tmp_tag = cipher_plus_tag + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
ASSERT_ALLOC( encrypt_buf, cipher->len );
ASSERT_ALLOC( tag_buf, tag->len );
tmp_cipher = encrypt_buf;
tmp_tag = tag_buf;
}
/*
* Encrypt and check the result
*/
outlen = 0;
ret = mbedtls_cipher_auth_encrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
clear->x, clear->len, tmp_cipher, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len );
if( cipher->len != 0 )
TEST_ASSERT( memcmp( tmp_cipher, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( memcmp( tmp_tag, tag->x, tag->len ) == 0 );
}
}
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
exit:
mbedtls_cipher_free( &ctx );
mbedtls_free( decrypt_buf );
mbedtls_free( encrypt_buf );
mbedtls_free( cipher_plus_tag );
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
mbedtls_free( tag_buf );
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_auth_crypt_tv_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_auth_crypt_tv( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, (char *) params[11], &data12, *( (int *) params[14] ) );
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_test_vec_ecb( int cipher_id, int operation, data_t * key,
data_t * input, data_t * result, int finish_result
)
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, input->x,
mbedtls_cipher_get_block_size( &ctx ),
output, &outlen ) );
TEST_ASSERT( outlen == mbedtls_cipher_get_block_size( &ctx ) );
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
TEST_ASSERT( 0 == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == memcmp( output, result->x,
mbedtls_cipher_get_block_size( &ctx ) ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_test_vec_ecb_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_test_vec_ecb( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, *( (int *) params[8] ) );
}
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_test_vec_crypt( int cipher_id, int operation, data_t *key,
data_t *iv, data_t *input, data_t *result,
int finish_result, int use_psa )
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
#else
if( use_psa == 1 )
{
PSA_ASSERT( psa_crypto_init( ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( &ctx,
mbedtls_cipher_info_from_type( cipher_id ), 0 ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
if( MBEDTLS_MODE_CBC == ctx.cipher_info->mode )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, MBEDTLS_PADDING_NONE ) );
TEST_ASSERT( finish_result == mbedtls_cipher_crypt( &ctx, iv->len ? iv->x : NULL,
iv->len, input->x, input->len,
output, &outlen ) );
TEST_ASSERT( result->len == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == memcmp( output, result->x, outlen ) );
exit:
mbedtls_cipher_free( &ctx );
#if defined(MBEDTLS_USE_PSA_CRYPTO)
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_test_vec_crypt_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_test_vec_crypt( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_set_padding( int cipher_id, int pad_mode, int ret )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
mbedtls_cipher_init( &ctx );
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( ret == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_set_padding_wrapper( void ** params )
{
test_set_padding( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_check_padding( int pad_mode, data_t * input, int ret, int dlen_check
)
{
mbedtls_cipher_info_t cipher_info;
mbedtls_cipher_context_t ctx;
size_t dlen;
/* build a fake context just for getting access to get_padding */
mbedtls_cipher_init( &ctx );
cipher_info.mode = MBEDTLS_MODE_CBC;
ctx.cipher_info = &cipher_info;
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
TEST_ASSERT( ret == ctx.get_padding( input->x, input->len, &dlen ) );
if( 0 == ret )
TEST_ASSERT( dlen == (size_t) dlen_check );
exit:
;
}
void test_check_padding_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_check_padding( *( (int *) params[0] ), &data1, *( (int *) params[3] ), *( (int *) params[4] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#endif /* MBEDTLS_CIPHER_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
*out_value = MBEDTLS_CIPHER_CHACHA20_POLY1305;
}
break;
case 1:
{
*out_value = -1;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
#if defined(MBEDTLS_CHACHAPOLY_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_CIPHER_C)
test_mbedtls_cipher_list_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_CIPHER_C)
test_cipher_invalid_param_unconditional_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_cipher_invalid_param_conditional_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_AES_C)
test_cipher_special_behaviours_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_fail_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_CIPHER_C)
test_dec_empty_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_multipart_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_CIPHER_C)
test_decrypt_test_vec_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_AUTH_CRYPT)
test_auth_crypt_tv_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_CIPHER_C)
test_test_vec_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_test_vec_crypt_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_set_padding_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_check_padding_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_cipher.chachapoly.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 71,638 | 2,029 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_aes.ecb.datax | AES-128-ECB Encrypt NIST KAT #1
0:hex:"00000000000000000000000000000000":hex:"f34481ec3cc627bacd5dc3fb08f273e6":hex:"0336763e966d92595a567cc9ce537f5e":int:0
AES-128-ECB Encrypt NIST KAT #2
0:hex:"00000000000000000000000000000000":hex:"9798c4640bad75c7c3227db910174e72":hex:"a9a1631bf4996954ebc093957b234589":int:0
AES-128-ECB Encrypt NIST KAT #3
0:hex:"00000000000000000000000000000000":hex:"96ab5c2ff612d9dfaae8c31f30c42168":hex:"ff4f8391a6a40ca5b25d23bedd44a597":int:0
AES-128-ECB Encrypt NIST KAT #4
0:hex:"e0000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"72a1da770f5d7ac4c9ef94d822affd97":int:0
AES-128-ECB Encrypt NIST KAT #5
0:hex:"f0000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"970014d634e2b7650777e8e84d03ccd8":int:0
AES-128-ECB Encrypt NIST KAT #6
0:hex:"f8000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"f17e79aed0db7e279e955b5f493875a7":int:0
AES-128-ECB Encrypt NIST KAT #7
0:hex:"fffffffffffff0000000000000000000":hex:"00000000000000000000000000000000":hex:"7b90785125505fad59b13c186dd66ce3":int:0
AES-128-ECB Encrypt NIST KAT #8
0:hex:"fffffffffffff8000000000000000000":hex:"00000000000000000000000000000000":hex:"8b527a6aebdaec9eaef8eda2cb7783e5":int:0
AES-128-ECB Encrypt NIST KAT #9
0:hex:"fffffffffffffc000000000000000000":hex:"00000000000000000000000000000000":hex:"43fdaf53ebbc9880c228617d6a9b548b":int:0
AES-128-ECB Encrypt NIST KAT #10
0:hex:"ffffffffffffffffffffffffffffc000":hex:"00000000000000000000000000000000":hex:"70c46bb30692be657f7eaa93ebad9897":int:0
AES-128-ECB Encrypt NIST KAT #11
0:hex:"ffffffffffffffffffffffffffffe000":hex:"00000000000000000000000000000000":hex:"323994cfb9da285a5d9642e1759b224a":int:0
AES-128-ECB Encrypt NIST KAT #12
0:hex:"fffffffffffffffffffffffffffff000":hex:"00000000000000000000000000000000":hex:"1dbf57877b7b17385c85d0b54851e371":int:0
AES-128-ECB Encrypt NIST KAT #13
0:hex:"00000000000000000000000000000000":hex:"ffffffffffffffc00000000000000000":hex:"3a4d354f02bb5a5e47d39666867f246a":int:0
AES-128-ECB Encrypt NIST KAT #14
0:hex:"00000000000000000000000000000000":hex:"ffffffffffffffe00000000000000000":hex:"d451b8d6e1e1a0ebb155fbbf6e7b7dc3":int:0
AES-128-ECB Encrypt NIST KAT #15
0:hex:"00000000000000000000000000000000":hex:"fffffffffffffff00000000000000000":hex:"6898d4f42fa7ba6a10ac05e87b9f2080":int:0
AES-128-ECB Encrypt NIST KAT #16
0:hex:"00000000000000000000000000000000":hex:"ffffffffffffffffffffffffe0000000":hex:"082eb8be35f442fb52668e16a591d1d6":int:0
AES-128-ECB Encrypt NIST KAT #17
0:hex:"00000000000000000000000000000000":hex:"fffffffffffffffffffffffff0000000":hex:"e656f9ecf5fe27ec3e4a73d00c282fb3":int:0
AES-128-ECB Encrypt NIST KAT #18
0:hex:"00000000000000000000000000000000":hex:"fffffffffffffffffffffffff8000000":hex:"2ca8209d63274cd9a29bb74bcd77683a":int:0
AES-128-ECB Decrypt NIST KAT #1
1:hex:"00000000000000000000000000000000":hex:"db4f1aa530967d6732ce4715eb0ee24b":hex:"ff000000000000000000000000000000":int:0
AES-128-ECB Decrypt NIST KAT #2
1:hex:"00000000000000000000000000000000":hex:"a81738252621dd180a34f3455b4baa2f":hex:"ff800000000000000000000000000000":int:0
AES-128-ECB Decrypt NIST KAT #3
1:hex:"00000000000000000000000000000000":hex:"77e2b508db7fd89234caf7939ee5621a":hex:"ffc00000000000000000000000000000":int:0
AES-128-ECB Decrypt NIST KAT #4
1:hex:"00000000000000000000000000000000":hex:"dc43be40be0e53712f7e2bf5ca707209":hex:"6a118a874519e64e9963798a503f1d35":int:0
AES-128-ECB Decrypt NIST KAT #5
1:hex:"00000000000000000000000000000000":hex:"92beedab1895a94faa69b632e5cc47ce":hex:"cb9fceec81286ca3e989bd979b0cb284":int:0
AES-128-ECB Decrypt NIST KAT #6
1:hex:"00000000000000000000000000000000":hex:"459264f4798f6a78bacb89c15ed3d601":hex:"b26aeb1874e47ca8358ff22378f09144":int:0
AES-128-ECB Decrypt NIST KAT #7
1:hex:"b69418a85332240dc82492353956ae0c":hex:"a303d940ded8f0baff6f75414cac5243":hex:"00000000000000000000000000000000":int:0
AES-128-ECB Decrypt NIST KAT #8
1:hex:"71b5c08a1993e1362e4d0ce9b22b78d5":hex:"c2dabd117f8a3ecabfbb11d12194d9d0":hex:"00000000000000000000000000000000":int:0
AES-128-ECB Decrypt NIST KAT #9
1:hex:"e234cdca2606b81f29408d5f6da21206":hex:"fff60a4740086b3b9c56195b98d91a7b":hex:"00000000000000000000000000000000":int:0
AES-128-ECB Decrypt NIST KAT #10
1:hex:"ffffffffffffffff0000000000000000":hex:"84be19e053635f09f2665e7bae85b42d":hex:"00000000000000000000000000000000":int:0
AES-128-ECB Decrypt NIST KAT #11
1:hex:"ffffffffffffffff8000000000000000":hex:"32cd652842926aea4aa6137bb2be2b5e":hex:"00000000000000000000000000000000":int:0
AES-192-ECB Encrypt NIST KAT #1
0:hex:"000000000000000000000000000000000000000000000000":hex:"fffffffffffffffffffff80000000000":hex:"156f07767a85a4312321f63968338a01":int:0
AES-192-ECB Encrypt NIST KAT #2
0:hex:"000000000000000000000000000000000000000000000000":hex:"fffffffffffffffffffffc0000000000":hex:"15eec9ebf42b9ca76897d2cd6c5a12e2":int:0
AES-192-ECB Encrypt NIST KAT #3
0:hex:"000000000000000000000000000000000000000000000000":hex:"fffffffffffffffffffffe0000000000":hex:"db0d3a6fdcc13f915e2b302ceeb70fd8":int:0
AES-192-ECB Encrypt NIST KAT #4
0:hex:"000000000000000000000000000000000000000000000000":hex:"51719783d3185a535bd75adc65071ce1":hex:"4f354592ff7c8847d2d0870ca9481b7c":int:0
AES-192-ECB Encrypt NIST KAT #5
0:hex:"000000000000000000000000000000000000000000000000":hex:"26aa49dcfe7629a8901a69a9914e6dfd":hex:"d5e08bf9a182e857cf40b3a36ee248cc":int:0
AES-192-ECB Encrypt NIST KAT #6
0:hex:"000000000000000000000000000000000000000000000000":hex:"941a4773058224e1ef66d10e0a6ee782":hex:"067cd9d3749207791841562507fa9626":int:0
AES-192-ECB Encrypt NIST KAT #7
0:hex:"d2926527e0aa9f37b45e2ec2ade5853ef807576104c7ace3":hex:"00000000000000000000000000000000":hex:"dd619e1cf204446112e0af2b9afa8f8c":int:0
AES-192-ECB Encrypt NIST KAT #8
0:hex:"982215f4e173dfa0fcffe5d3da41c4812c7bcc8ed3540f93":hex:"00000000000000000000000000000000":hex:"d4f0aae13c8fe9339fbf9e69ed0ad74d":int:0
AES-192-ECB Encrypt NIST KAT #9
0:hex:"98c6b8e01e379fbd14e61af6af891596583565f2a27d59e9":hex:"00000000000000000000000000000000":hex:"19c80ec4a6deb7e5ed1033dda933498f":int:0
AES-192-ECB Encrypt NIST KAT #10
0:hex:"fffffffffffffffffffffffffff800000000000000000000":hex:"00000000000000000000000000000000":hex:"8dd274bd0f1b58ae345d9e7233f9b8f3":int:0
AES-192-ECB Encrypt NIST KAT #11
0:hex:"fffffffffffffffffffffffffffc00000000000000000000":hex:"00000000000000000000000000000000":hex:"9d6bdc8f4ce5feb0f3bed2e4b9a9bb0b":int:0
AES-192-ECB Encrypt NIST KAT #12
0:hex:"fffffffffffffffffffffffffffe00000000000000000000":hex:"00000000000000000000000000000000":hex:"fd5548bcf3f42565f7efa94562528d46":int:0
AES-192-ECB Decrypt NIST KAT #1
1:hex:"fffffffffffffffffffffffffffffffff000000000000000":hex:"bb2852c891c5947d2ed44032c421b85f":hex:"00000000000000000000000000000000":int:0
AES-192-ECB Decrypt NIST KAT #2
1:hex:"fffffffffffffffffffffffffffffffff800000000000000":hex:"1b9f5fbd5e8a4264c0a85b80409afa5e":hex:"00000000000000000000000000000000":int:0
AES-192-ECB Decrypt NIST KAT #3
1:hex:"fffffffffffffffffffffffffffffffffc00000000000000":hex:"30dab809f85a917fe924733f424ac589":hex:"00000000000000000000000000000000":int:0
AES-192-ECB Decrypt NIST KAT #4
1:hex:"61257134a518a0d57d9d244d45f6498cbc32f2bafc522d79":hex:"cfe4d74002696ccf7d87b14a2f9cafc9":hex:"00000000000000000000000000000000":int:0
AES-192-ECB Decrypt NIST KAT #5
1:hex:"b0ab0a6a818baef2d11fa33eac947284fb7d748cfb75e570":hex:"d2eafd86f63b109b91f5dbb3a3fb7e13":hex:"00000000000000000000000000000000":int:0
AES-192-ECB Decrypt NIST KAT #6
1:hex:"ee053aa011c8b428cdcc3636313c54d6a03cac01c71579d6":hex:"9b9fdd1c5975655f539998b306a324af":hex:"00000000000000000000000000000000":int:0
AES-192-ECB Decrypt NIST KAT #7
1:hex:"000000000000000000000000000000000000000000000000":hex:"275cfc0413d8ccb70513c3859b1d0f72":hex:"1b077a6af4b7f98229de786d7516b639":int:0
AES-192-ECB Decrypt NIST KAT #8
1:hex:"000000000000000000000000000000000000000000000000":hex:"c9b8135ff1b5adc413dfd053b21bd96d":hex:"9c2d8842e5f48f57648205d39a239af1":int:0
AES-192-ECB Decrypt NIST KAT #9
1:hex:"000000000000000000000000000000000000000000000000":hex:"4a3650c3371ce2eb35e389a171427440":hex:"bff52510095f518ecca60af4205444bb":int:0
AES-192-ECB Decrypt NIST KAT #10
1:hex:"000000000000000000000000000000000000000000000000":hex:"b2099795e88cc158fd75ea133d7e7fbe":hex:"ffffffffffffffffffffc00000000000":int:0
AES-192-ECB Decrypt NIST KAT #11
1:hex:"000000000000000000000000000000000000000000000000":hex:"a6cae46fb6fadfe7a2c302a34242817b":hex:"ffffffffffffffffffffe00000000000":int:0
AES-192-ECB Decrypt NIST KAT #12
1:hex:"000000000000000000000000000000000000000000000000":hex:"026a7024d6a902e0b3ffccbaa910cc3f":hex:"fffffffffffffffffffff00000000000":int:0
AES-256-ECB Encrypt NIST KAT #1
0:hex:"c1cc358b449909a19436cfbb3f852ef8bcb5ed12ac7058325f56e6099aab1a1c":hex:"00000000000000000000000000000000":hex:"352065272169abf9856843927d0674fd":int:0
AES-256-ECB Encrypt NIST KAT #2
0:hex:"984ca75f4ee8d706f46c2d98c0bf4a45f5b00d791c2dfeb191b5ed8e420fd627":hex:"00000000000000000000000000000000":hex:"4307456a9e67813b452e15fa8fffe398":int:0
AES-256-ECB Encrypt NIST KAT #3
0:hex:"b43d08a447ac8609baadae4ff12918b9f68fc1653f1269222f123981ded7a92f":hex:"00000000000000000000000000000000":hex:"4663446607354989477a5c6f0f007ef4":int:0
AES-256-ECB Encrypt NIST KAT #4
0:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"0b24af36193ce4665f2825d7b4749c98":hex:"a9ff75bd7cf6613d3731c77c3b6d0c04":int:0
AES-256-ECB Encrypt NIST KAT #5
0:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"761c1fe41a18acf20d241650611d90f1":hex:"623a52fcea5d443e48d9181ab32c7421":int:0
AES-256-ECB Encrypt NIST KAT #6
0:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"8a560769d605868ad80d819bdba03771":hex:"38f2c7ae10612415d27ca190d27da8b4":int:0
AES-256-ECB Encrypt NIST KAT #7
0:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"ffffff80000000000000000000000000":hex:"36aff0ef7bf3280772cf4cac80a0d2b2":int:0
AES-256-ECB Encrypt NIST KAT #8
0:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"ffffffc0000000000000000000000000":hex:"1f8eedea0f62a1406d58cfc3ecea72cf":int:0
AES-256-ECB Encrypt NIST KAT #9
0:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"ffffffe0000000000000000000000000":hex:"abf4154a3375a1d3e6b1d454438f95a6":int:0
AES-256-ECB Encrypt NIST KAT #10
0:hex:"ffffffffffffffffffffffffffffffffffff8000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"45d089c36d5c5a4efc689e3b0de10dd5":int:0
AES-256-ECB Encrypt NIST KAT #11
0:hex:"ffffffffffffffffffffffffffffffffffffc000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"b4da5df4becb5462e03a0ed00d295629":int:0
AES-256-ECB Encrypt NIST KAT #12
0:hex:"ffffffffffffffffffffffffffffffffffffe000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"dcf4e129136c1a4b7a0f38935cc34b2b":int:0
AES-256-ECB Decrypt NIST KAT #1
1:hex:"fffffffffffffffffffffffffffffffffffffffffffffff00000000000000000":hex:"edf61ae362e882ddc0167474a7a77f3a":hex:"00000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #2
1:hex:"fffffffffffffffffffffffffffffffffffffffffffffff80000000000000000":hex:"6168b00ba7859e0970ecfd757efecf7c":hex:"00000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #3
1:hex:"fffffffffffffffffffffffffffffffffffffffffffffffc0000000000000000":hex:"d1415447866230d28bb1ea18a4cdfd02":hex:"00000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #4
1:hex:"f8be9ba615c5a952cabbca24f68f8593039624d524c816acda2c9183bd917cb9":hex:"a3944b95ca0b52043584ef02151926a8":hex:"00000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #5
1:hex:"797f8b3d176dac5b7e34a2d539c4ef367a16f8635f6264737591c5c07bf57a3e":hex:"a74289fe73a4c123ca189ea1e1b49ad5":hex:"00000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #6
1:hex:"6838d40caf927749c13f0329d331f448e202c73ef52c5f73a37ca635d4c47707":hex:"b91d4ea4488644b56cf0812fa7fcf5fc":hex:"00000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #7
1:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"623a52fcea5d443e48d9181ab32c7421":hex:"761c1fe41a18acf20d241650611d90f1":int:0
AES-256-ECB Decrypt NIST KAT #8
1:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"38f2c7ae10612415d27ca190d27da8b4":hex:"8a560769d605868ad80d819bdba03771":int:0
AES-256-ECB Decrypt NIST KAT #9
1:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"1bc704f1bce135ceb810341b216d7abe":hex:"91fbef2d15a97816060bee1feaa49afe":int:0
AES-256-ECB Decrypt NIST KAT #10
1:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"ddc6bf790c15760d8d9aeb6f9a75fd4e":hex:"80000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #11
1:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"0a6bdc6d4c1e6280301fd8e97ddbe601":hex:"c0000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #12
1:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"9b80eefb7ebe2d2b16247aa0efc72f5d":hex:"e0000000000000000000000000000000":int:0
| 13,341 | 232 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_aes.cfb.datax | AES-128-CFB128 Encrypt NIST KAT #1
depends_on:0
8:hex:"f0000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"970014d634e2b7650777e8e84d03ccd8"
AES-128-CFB128 Encrypt NIST KAT #2
depends_on:0
8:hex:"f8000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"f17e79aed0db7e279e955b5f493875a7"
AES-128-CFB128 Encrypt NIST KAT #3
depends_on:0
8:hex:"fc000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"9ed5a75136a940d0963da379db4af26a"
AES-128-CFB128 Encrypt NIST KAT #4
depends_on:0
8:hex:"64cf9c7abc50b888af65f49d521944b2":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"f7efc89d5dba578104016ce5ad659c05"
AES-128-CFB128 Encrypt NIST KAT #5
depends_on:0
8:hex:"47d6742eefcc0465dc96355e851b64d9":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"0306194f666d183624aa230a8b264ae7"
AES-128-CFB128 Encrypt NIST KAT #6
depends_on:0
8:hex:"3eb39790678c56bee34bbcdeccf6cdb5":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"858075d536d79ccee571f7d7204b1f67"
AES-128-CFB128 Encrypt NIST KAT #7
depends_on:0
8:hex:"00000000000000000000000000000000":hex:"6a118a874519e64e9963798a503f1d35":hex:"00000000000000000000000000000000":hex:"dc43be40be0e53712f7e2bf5ca707209"
AES-128-CFB128 Encrypt NIST KAT #8
depends_on:0
8:hex:"00000000000000000000000000000000":hex:"cb9fceec81286ca3e989bd979b0cb284":hex:"00000000000000000000000000000000":hex:"92beedab1895a94faa69b632e5cc47ce"
AES-128-CFB128 Encrypt NIST KAT #9
depends_on:0
8:hex:"00000000000000000000000000000000":hex:"b26aeb1874e47ca8358ff22378f09144":hex:"00000000000000000000000000000000":hex:"459264f4798f6a78bacb89c15ed3d601"
AES-128-CFB128 Encrypt NIST KAT #10
depends_on:0
8:hex:"00000000000000000000000000000000":hex:"fffffffffffffffffffffffffffffff0":hex:"00000000000000000000000000000000":hex:"f9b0fda0c4a898f5b9e6f661c4ce4d07"
AES-128-CFB128 Encrypt NIST KAT #11
depends_on:0
8:hex:"00000000000000000000000000000000":hex:"fffffffffffffffffffffffffffffff8":hex:"00000000000000000000000000000000":hex:"8ade895913685c67c5269f8aae42983e"
AES-128-CFB128 Encrypt NIST KAT #12
depends_on:0
8:hex:"00000000000000000000000000000000":hex:"fffffffffffffffffffffffffffffffc":hex:"00000000000000000000000000000000":hex:"39bde67d5c8ed8a8b1c37eb8fa9f5ac0"
AES-128-CFB128 Decrypt NIST KAT #1
depends_on:0
9:hex:"fffffffe000000000000000000000000":hex:"00000000000000000000000000000000":hex:"1114bc2028009b923f0b01915ce5e7c4":hex:"00000000000000000000000000000000"
AES-128-CFB128 Decrypt NIST KAT #2
depends_on:0
9:hex:"ffffffff000000000000000000000000":hex:"00000000000000000000000000000000":hex:"9c28524a16a1e1c1452971caa8d13476":hex:"00000000000000000000000000000000"
AES-128-CFB128 Decrypt NIST KAT #3
depends_on:0
9:hex:"ffffffff800000000000000000000000":hex:"00000000000000000000000000000000":hex:"ed62e16363638360fdd6ad62112794f0":hex:"00000000000000000000000000000000"
AES-128-CFB128 Decrypt NIST KAT #4
depends_on:0
9:hex:"3071a2a48fe6cbd04f1a129098e308f8":hex:"00000000000000000000000000000000":hex:"4b98e06d356deb07ebb824e5713f7be3":hex:"00000000000000000000000000000000"
AES-128-CFB128 Decrypt NIST KAT #5
depends_on:0
9:hex:"90f42ec0f68385f2ffc5dfc03a654dce":hex:"00000000000000000000000000000000":hex:"7a20a53d460fc9ce0423a7a0764c6cf2":hex:"00000000000000000000000000000000"
AES-128-CFB128 Decrypt NIST KAT #6
depends_on:0
9:hex:"febd9a24d8b65c1c787d50a4ed3619a9":hex:"00000000000000000000000000000000":hex:"f4a70d8af877f9b02b4c40df57d45b17":hex:"00000000000000000000000000000000"
AES-128-CFB128 Decrypt NIST KAT #7
depends_on:0
9:hex:"00000000000000000000000000000000":hex:"f34481ec3cc627bacd5dc3fb08f273e6":hex:"0336763e966d92595a567cc9ce537f5e":hex:"00000000000000000000000000000000"
AES-128-CFB128 Decrypt NIST KAT #8
depends_on:0
9:hex:"00000000000000000000000000000000":hex:"9798c4640bad75c7c3227db910174e72":hex:"a9a1631bf4996954ebc093957b234589":hex:"00000000000000000000000000000000"
AES-128-CFB128 Decrypt NIST KAT #9
depends_on:0
9:hex:"00000000000000000000000000000000":hex:"96ab5c2ff612d9dfaae8c31f30c42168":hex:"ff4f8391a6a40ca5b25d23bedd44a597":hex:"00000000000000000000000000000000"
AES-128-CFB128 Decrypt NIST KAT #10
depends_on:0
9:hex:"00000000000000000000000000000000":hex:"ffffffffffffffff0000000000000000":hex:"f807c3e7985fe0f5a50e2cdb25c5109e":hex:"00000000000000000000000000000000"
AES-128-CFB128 Decrypt NIST KAT #11
depends_on:0
9:hex:"00000000000000000000000000000000":hex:"ffffffffffffffff8000000000000000":hex:"41f992a856fb278b389a62f5d274d7e9":hex:"00000000000000000000000000000000"
AES-128-CFB128 Decrypt NIST KAT #12
depends_on:0
9:hex:"00000000000000000000000000000000":hex:"ffffffffffffffffc000000000000000":hex:"10d3ed7a6fe15ab4d91acbc7d0767ab1":hex:"00000000000000000000000000000000"
AES-192-CFB128 Encrypt NIST KAT #1
depends_on:0
8:hex:"fffffffffffffffffffc0000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"8dfd999be5d0cfa35732c0ddc88ff5a5"
AES-192-CFB128 Encrypt NIST KAT #2
depends_on:0
8:hex:"fffffffffffffffffffe0000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"02647c76a300c3173b841487eb2bae9f"
AES-192-CFB128 Encrypt NIST KAT #3
depends_on:0
8:hex:"ffffffffffffffffffff0000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"172df8b02f04b53adab028b4e01acd87"
AES-192-CFB128 Encrypt NIST KAT #4
depends_on:0
8:hex:"d184c36cf0dddfec39e654195006022237871a47c33d3198":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"2e19fb60a3e1de0166f483c97824a978"
AES-192-CFB128 Encrypt NIST KAT #5
depends_on:0
8:hex:"4c6994ffa9dcdc805b60c2c0095334c42d95a8fc0ca5b080":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"7656709538dd5fec41e0ce6a0f8e207d"
AES-192-CFB128 Encrypt NIST KAT #6
depends_on:0
8:hex:"c88f5b00a4ef9a6840e2acaf33f00a3bdc4e25895303fa72":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"a67cf333b314d411d3c0ae6e1cfcd8f5"
AES-192-CFB128 Encrypt NIST KAT #7
depends_on:0
8:hex:"000000000000000000000000000000000000000000000000":hex:"9c2d8842e5f48f57648205d39a239af1":hex:"00000000000000000000000000000000":hex:"c9b8135ff1b5adc413dfd053b21bd96d"
AES-192-CFB128 Encrypt NIST KAT #8
depends_on:0
8:hex:"000000000000000000000000000000000000000000000000":hex:"bff52510095f518ecca60af4205444bb":hex:"00000000000000000000000000000000":hex:"4a3650c3371ce2eb35e389a171427440"
AES-192-CFB128 Encrypt NIST KAT #9
depends_on:0
8:hex:"000000000000000000000000000000000000000000000000":hex:"51719783d3185a535bd75adc65071ce1":hex:"00000000000000000000000000000000":hex:"4f354592ff7c8847d2d0870ca9481b7c"
AES-192-CFB128 Encrypt NIST KAT #10
depends_on:0
8:hex:"000000000000000000000000000000000000000000000000":hex:"ffffffffffffffe00000000000000000":hex:"00000000000000000000000000000000":hex:"f34e4a6324ea4a5c39a661c8fe5ada8f"
AES-192-CFB128 Encrypt NIST KAT #11
depends_on:0
8:hex:"000000000000000000000000000000000000000000000000":hex:"fffffffffffffff00000000000000000":hex:"00000000000000000000000000000000":hex:"0882a16f44088d42447a29ac090ec17e"
AES-192-CFB128 Encrypt NIST KAT #12
depends_on:0
8:hex:"000000000000000000000000000000000000000000000000":hex:"fffffffffffffff80000000000000000":hex:"00000000000000000000000000000000":hex:"3a3c15bfc11a9537c130687004e136ee"
AES-192-CFB128 Decrypt NIST KAT #1
depends_on:0
9:hex:"ffffffffffffffffffffffffffffffffffffffffffe00000":hex:"00000000000000000000000000000000":hex:"60136703374f64e860b48ce31f930716":hex:"00000000000000000000000000000000"
AES-192-CFB128 Decrypt NIST KAT #2
depends_on:0
9:hex:"fffffffffffffffffffffffffffffffffffffffffff00000":hex:"00000000000000000000000000000000":hex:"8d63a269b14d506ccc401ab8a9f1b591":hex:"00000000000000000000000000000000"
AES-192-CFB128 Decrypt NIST KAT #3
depends_on:0
9:hex:"fffffffffffffffffffffffffffffffffffffffffff80000":hex:"00000000000000000000000000000000":hex:"d317f81dc6aa454aee4bd4a5a5cff4bd":hex:"00000000000000000000000000000000"
AES-192-CFB128 Decrypt NIST KAT #4
depends_on:0
9:hex:"98c6b8e01e379fbd14e61af6af891596583565f2a27d59e9":hex:"00000000000000000000000000000000":hex:"19c80ec4a6deb7e5ed1033dda933498f":hex:"00000000000000000000000000000000"
AES-192-CFB128 Decrypt NIST KAT #5
depends_on:0
9:hex:"b3ad5cea1dddc214ca969ac35f37dae1a9a9d1528f89bb35":hex:"00000000000000000000000000000000":hex:"3cf5e1d21a17956d1dffad6a7c41c659":hex:"00000000000000000000000000000000"
AES-192-CFB128 Decrypt NIST KAT #6
depends_on:0
9:hex:"45899367c3132849763073c435a9288a766c8b9ec2308516":hex:"00000000000000000000000000000000":hex:"69fd12e8505f8ded2fdcb197a121b362":hex:"00000000000000000000000000000000"
AES-192-CFB128 Decrypt NIST KAT #7
depends_on:0
9:hex:"000000000000000000000000000000000000000000000000":hex:"1b077a6af4b7f98229de786d7516b639":hex:"275cfc0413d8ccb70513c3859b1d0f72":hex:"00000000000000000000000000000000"
AES-192-CFB128 Decrypt NIST KAT #8
depends_on:0
9:hex:"000000000000000000000000000000000000000000000000":hex:"9c2d8842e5f48f57648205d39a239af1":hex:"c9b8135ff1b5adc413dfd053b21bd96d":hex:"00000000000000000000000000000000"
AES-192-CFB128 Decrypt NIST KAT #9
depends_on:0
9:hex:"000000000000000000000000000000000000000000000000":hex:"bff52510095f518ecca60af4205444bb":hex:"4a3650c3371ce2eb35e389a171427440":hex:"00000000000000000000000000000000"
AES-192-CFB128 Decrypt NIST KAT #10
depends_on:0
9:hex:"000000000000000000000000000000000000000000000000":hex:"ffffffffffffffffffff000000000000":hex:"54d632d03aba0bd0f91877ebdd4d09cb":hex:"00000000000000000000000000000000"
AES-192-CFB128 Decrypt NIST KAT #11
depends_on:0
9:hex:"000000000000000000000000000000000000000000000000":hex:"ffffffffffffffffffff800000000000":hex:"d3427be7e4d27cd54f5fe37b03cf0897":hex:"00000000000000000000000000000000"
AES-192-CFB128 Decrypt NIST KAT #12
depends_on:0
9:hex:"000000000000000000000000000000000000000000000000":hex:"ffffffffffffffffffffc00000000000":hex:"b2099795e88cc158fd75ea133d7e7fbe":hex:"00000000000000000000000000000000"
AES-256-CFB128 Encrypt NIST KAT #1
depends_on:0
8:hex:"ffffffe000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"bbd1097a62433f79449fa97d4ee80dbf"
AES-256-CFB128 Encrypt NIST KAT #2
depends_on:0
8:hex:"fffffff000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"07058e408f5b99b0e0f061a1761b5b3b"
AES-256-CFB128 Encrypt NIST KAT #3
depends_on:0
8:hex:"fffffff800000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"5fd1f13fa0f31e37fabde328f894eac2"
AES-256-CFB128 Encrypt NIST KAT #4
depends_on:0
8:hex:"13428b5e4c005e0636dd338405d173ab135dec2a25c22c5df0722d69dcc43887":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"649a71545378c783e368c9ade7114f6c"
AES-256-CFB128 Encrypt NIST KAT #5
depends_on:0
8:hex:"07eb03a08d291d1b07408bf3512ab40c91097ac77461aad4bb859647f74f00ee":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"47cb030da2ab051dfc6c4bf6910d12bb"
AES-256-CFB128 Encrypt NIST KAT #6
depends_on:0
8:hex:"90143ae20cd78c5d8ebdd6cb9dc1762427a96c78c639bccc41a61424564eafe1":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"798c7c005dee432b2c8ea5dfa381ecc3"
AES-256-CFB128 Encrypt NIST KAT #7
depends_on:0
8:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"0b24af36193ce4665f2825d7b4749c98":hex:"00000000000000000000000000000000":hex:"a9ff75bd7cf6613d3731c77c3b6d0c04"
AES-256-CFB128 Encrypt NIST KAT #8
depends_on:0
8:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"761c1fe41a18acf20d241650611d90f1":hex:"00000000000000000000000000000000":hex:"623a52fcea5d443e48d9181ab32c7421"
AES-256-CFB128 Encrypt NIST KAT #9
depends_on:0
8:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"8a560769d605868ad80d819bdba03771":hex:"00000000000000000000000000000000":hex:"38f2c7ae10612415d27ca190d27da8b4"
AES-256-CFB128 Encrypt NIST KAT #10
depends_on:0
8:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"ffffffffffffffffffffffffe0000000":hex:"00000000000000000000000000000000":hex:"2be1fae5048a25582a679ca10905eb80"
AES-256-CFB128 Encrypt NIST KAT #11
depends_on:0
8:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"fffffffffffffffffffffffff0000000":hex:"00000000000000000000000000000000":hex:"da86f292c6f41ea34fb2068df75ecc29"
AES-256-CFB128 Encrypt NIST KAT #12
depends_on:0
8:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"fffffffffffffffffffffffff8000000":hex:"00000000000000000000000000000000":hex:"220df19f85d69b1b562fa69a3c5beca5"
AES-256-CFB128 Decrypt NIST KAT #1
depends_on:0
9:hex:"ffffffffff800000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"be66cfea2fecd6bf0ec7b4352c99bcaa":hex:"00000000000000000000000000000000"
AES-256-CFB128 Decrypt NIST KAT #2
depends_on:0
9:hex:"ffffffffffc00000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"df31144f87a2ef523facdcf21a427804":hex:"00000000000000000000000000000000"
AES-256-CFB128 Decrypt NIST KAT #3
depends_on:0
9:hex:"ffffffffffe00000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"b5bb0f5629fb6aae5e1839a3c3625d63":hex:"00000000000000000000000000000000"
AES-256-CFB128 Decrypt NIST KAT #4
depends_on:0
9:hex:"1d85a181b54cde51f0e098095b2962fdc93b51fe9b88602b3f54130bf76a5bd9":hex:"00000000000000000000000000000000":hex:"531c2c38344578b84d50b3c917bbb6e1":hex:"00000000000000000000000000000000"
AES-256-CFB128 Decrypt NIST KAT #5
depends_on:0
9:hex:"dc0eba1f2232a7879ded34ed8428eeb8769b056bbaf8ad77cb65c3541430b4cf":hex:"00000000000000000000000000000000":hex:"fc6aec906323480005c58e7e1ab004ad":hex:"00000000000000000000000000000000"
AES-256-CFB128 Decrypt NIST KAT #6
depends_on:0
9:hex:"f8be9ba615c5a952cabbca24f68f8593039624d524c816acda2c9183bd917cb9":hex:"00000000000000000000000000000000":hex:"a3944b95ca0b52043584ef02151926a8":hex:"00000000000000000000000000000000"
AES-256-CFB128 Decrypt NIST KAT #7
depends_on:0
9:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"761c1fe41a18acf20d241650611d90f1":hex:"623a52fcea5d443e48d9181ab32c7421":hex:"00000000000000000000000000000000"
AES-256-CFB128 Decrypt NIST KAT #8
depends_on:0
9:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"8a560769d605868ad80d819bdba03771":hex:"38f2c7ae10612415d27ca190d27da8b4":hex:"00000000000000000000000000000000"
AES-256-CFB128 Decrypt NIST KAT #9
depends_on:0
9:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"91fbef2d15a97816060bee1feaa49afe":hex:"1bc704f1bce135ceb810341b216d7abe":hex:"00000000000000000000000000000000"
AES-256-CFB128 Decrypt NIST KAT #10
depends_on:0
9:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"e0000000000000000000000000000000":hex:"9b80eefb7ebe2d2b16247aa0efc72f5d":hex:"00000000000000000000000000000000"
AES-256-CFB128 Decrypt NIST KAT #11
depends_on:0
9:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"f0000000000000000000000000000000":hex:"7f2c5ece07a98d8bee13c51177395ff7":hex:"00000000000000000000000000000000"
AES-256-CFB128 Decrypt NIST KAT #12
depends_on:0
9:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"f8000000000000000000000000000000":hex:"7818d800dcf6f4be1e0e94f403d1e4c2":hex:"00000000000000000000000000000000"
AES-128-CFB8 Encrypt NIST MMT #0
10:hex:"c57d699d89df7cfbef71c080a6b10ac3":hex:"fcb2bc4c006b87483978796a2ae2c42e":hex:"61":hex:"24"
AES-128-CFB8 Encrypt NIST MMT #1
10:hex:"0d8f3dc3edee60db658bb97faf46fba3":hex:"e481fdc42e606b96a383c0a1a5520ebb":hex:"aacd":hex:"5066"
AES-128-CFB8 Encrypt NIST MMT #2
10:hex:"c8fe9bf77b930f46d2078b8c0e657cd4":hex:"f475c64991b20eaee183a22629e21e22":hex:"c90635":hex:"d27691"
AES-128-CFB8 Encrypt NIST MMT #3
10:hex:"280cf81af5cc7e7363579c1da03390e6":hex:"5d6cf4722d0e21f1d9ced53a0e36c342":hex:"b2a22ced":hex:"73f3aebf"
AES-128-CFB8 Encrypt NIST MMT #4
10:hex:"5d5e7f20e0a66d3e09e0e5a9912f8a46":hex:"052d7ea0ad1f2956a23b27afe1d87b6b":hex:"b84a90fc6d":hex:"1a9a61c307"
AES-128-CFB8 Encrypt NIST MMT #5
10:hex:"ec89fb348787cf902ca973c47081438d":hex:"528fe95c711bd13f37bc52cc9e96d45c":hex:"14253472e99d":hex:"cfc247e33a3b"
AES-128-CFB8 Encrypt NIST MMT #6
10:hex:"6607987c354809cba818639dcd185147":hex:"552c101a0b7c0ca143af258453937fa3":hex:"9b1a5a1369166e":hex:"b7ab2a4cc71904"
AES-128-CFB8 Encrypt NIST MMT #7
10:hex:"c028e6bf2b749ffa86759f2f84e93cb0":hex:"288c752d9faccf367e5d0cca1fa6ec3b":hex:"324015878cdc82bf":hex:"873250152fc6a5bb"
AES-128-CFB8 Encrypt NIST MMT #8
10:hex:"d01da95d2c2a61da06ea78cfba59cc30":hex:"f9a393ad90814faf262e3a5b1d97592e":hex:"57c1a30e48166d9640":hex:"e9a8c3b776edd39e3d"
AES-128-CFB8 Encrypt NIST MMT #9
10:hex:"3a6f9159263fa6cef2a075caface5817":hex:"0fc23662b7dbf73827f0c7de321ca36e":hex:"87efeb8d559ed3367728":hex:"8e9c50425614d540ce11"
AES-128-CFB8 Decrypt NIST MMT #0
11:hex:"03edfe082550bd5ac8ddf64f42a0547f":hex:"52acd8dab62c981da08e51939cc08dab":hex:"21":hex:"09"
AES-128-CFB8 Decrypt NIST MMT #1
11:hex:"38cf776750162edc63c3b5dbe311ab9f":hex:"98fbbd288872c40f1926b16ecaec1561":hex:"4878":hex:"eb24"
AES-128-CFB8 Decrypt NIST MMT #2
11:hex:"c9053c87c3e56bc5e52bd31f6545f991":hex:"b8f9640d0923da13fe6eb87b01f0cfa0":hex:"aeb6d2":hex:"910949"
AES-128-CFB8 Decrypt NIST MMT #3
11:hex:"e96771f5f20a89ee871261d2d18e1e46":hex:"6e86403e33396655907ae06ef192262f":hex:"83cab2f3":hex:"3b7f1f1c"
AES-128-CFB8 Decrypt NIST MMT #4
11:hex:"92ad13ecb60bde1bb3b34ce07867672b":hex:"f95a4060b8f80e3f839d4c3ca33dad94":hex:"49f73e652b":hex:"17b9b9e16d"
AES-128-CFB8 Decrypt NIST MMT #5
11:hex:"eb57b8dd076e7bbb33d4bfc4d7ecb27e":hex:"51135997a067dcd2e016c57134c5fa52":hex:"b0eacbf2ca46":hex:"ca989fa4e818"
AES-128-CFB8 Decrypt NIST MMT #6
11:hex:"70abc48bb1be490183f0fe3df56195ff":hex:"e251f179174b71ee1e488ab3dd200483":hex:"08fbef9b2a369a":hex:"5405da1186b7e0"
AES-128-CFB8 Decrypt NIST MMT #7
11:hex:"1273b8e0eee1a1ca827059b4d0a3a55d":hex:"622cab49092d026f554dd98a6441dc26":hex:"b3cb9d8892423aeb":hex:"d497df73afb9787c"
AES-128-CFB8 Decrypt NIST MMT #8
11:hex:"49437e06b6faa5f20fd98bf71f8ff554":hex:"63c818e0d3cb5b7054ef3e1e87df0e12":hex:"01992a986279c3685e":hex:"f203bcd402b65919da"
AES-128-CFB8 Decrypt NIST MMT #9
11:hex:"6399c1dc068ba3509845628fa9ed1a96":hex:"1157c2766c86b754df485be9dd5851df":hex:"c9c284e9abbfe6fb11fe":hex:"feff4e2e2458addf2a54"
AES-192-CFB8 Encrypt NIST MMT #0
10:hex:"32a1b0e3da368db563d7316b9779d3327e53d9a6d287ed97":hex:"3dd0e7e21f09d5842f3a699da9b57346":hex:"54":hex:"6d"
AES-192-CFB8 Encrypt NIST MMT #1
10:hex:"a6381dcc18dd85d7729c1dce90743bbe1df580d857f5b9c4":hex:"c0ac501fad7f4a1465daf32e18fc1a4f":hex:"a456":hex:"8fb6"
AES-192-CFB8 Encrypt NIST MMT #2
10:hex:"d08dbee4732c7ffc544c1695b201d30e795037325ef0aa18":hex:"a1e39aeeb972a8d70aa0fc7d6fac6eac":hex:"fd115d":hex:"c4c016"
AES-192-CFB8 Encrypt NIST MMT #3
10:hex:"277185a4a440869920f523c4d578fc5bedd33aee8d2ebaf7":hex:"67be00572f82aabc13d6e5a2e51d1f08":hex:"88e07061":hex:"8bb630ba"
AES-192-CFB8 Encrypt NIST MMT #4
10:hex:"83f70fdce47306fcbb8c21b6a8b3209f7ec185fef4deebd4":hex:"ff73b310cf7e62ce6f501092fa6cc888":hex:"36664e222d":hex:"20855555d1"
AES-192-CFB8 Encrypt NIST MMT #5
10:hex:"c5be271a29f4a29e085e8e98196601dcb88ccc03e559a304":hex:"9f51fa2eb8a084718f7240e47d135dce":hex:"b57f12342a62":hex:"73ff9bf3ec4b"
AES-192-CFB8 Encrypt NIST MMT #6
10:hex:"9c55322e6d495be01076d4b80371ad1479ae5636ff9861f5":hex:"2b79cfc1ff37254dedf5924a6b61e3e0":hex:"6dcede43c2ee65":hex:"7c897658282220"
AES-192-CFB8 Encrypt NIST MMT #7
10:hex:"6e78ccece7d1b2a3c08cf0de738bee33cbbbf78d9bf4922c":hex:"4bbe15b1e94a7b97250a2136d8804e46":hex:"ceda42527871f802":hex:"d92ff89045b1917f"
AES-192-CFB8 Encrypt NIST MMT #8
10:hex:"13c98665746f7825b37b404916240adbd1e4364be1d05c63":hex:"0e479fbd5f3961f38b8a26be1f2d65c5":hex:"1b0a63d73464ab3c8a":hex:"5485847e5d3c2e2cc4"
AES-192-CFB8 Encrypt NIST MMT #9
10:hex:"537e7bf661fd4024a024613f15b13690f7d0c847c1e18965":hex:"3a81f9d9d3c155b0caad5d73349476fc":hex:"d3d8b9b984adc24237ee":hex:"3879fea72ac99929e53a"
AES-192-CFB8 Decrypt NIST MMT #0
11:hex:"7dbdc15ad4034ed828dc862799b7adc9abd68eaf9d526d5d":hex:"4359683af5a3a85c248fb7f5506f317b":hex:"25":hex:"2d"
AES-192-CFB8 Decrypt NIST MMT #1
11:hex:"3a2cdf9c9608c1dd6233d03dd855293b0885915114b25279":hex:"e7a28ee34acc52128ddae658ec6398a2":hex:"0678":hex:"7b04"
AES-192-CFB8 Decrypt NIST MMT #2
11:hex:"c984b99a6cc5bc88003143cbe4b755e6e30ba94114f7ad1e":hex:"41e3b8fd138f8c358dfeef420302f634":hex:"037cf6":hex:"658d0a"
AES-192-CFB8 Decrypt NIST MMT #3
11:hex:"39747da225bdc0c53c3463fd686dbe19d14157535171f91d":hex:"77d3a5ad8bbdb169f8d29e5f21798651":hex:"0fb0cee2":hex:"2d191f2f"
AES-192-CFB8 Decrypt NIST MMT #4
11:hex:"4cd13179dfa16d01c6a8633dfc8783e723e72114c9b0d50a":hex:"6657c46c99d642474c330d8016b71dbe":hex:"09d914cf0b":hex:"105a64c872"
AES-192-CFB8 Decrypt NIST MMT #5
11:hex:"5dcc9b8d8a456e9917cd8d54d7f7100b34964b4ed2d398a0":hex:"4fa295a8987f1b010ce4e011fbf94156":hex:"288c752d9fac":hex:"98f332d37b78"
AES-192-CFB8 Decrypt NIST MMT #6
11:hex:"c8baf0204ef80b8e0125efe43a0bccdfd0f356b62e6c75fe":hex:"e9144bf2cbc5720a1b4cb6f37d11edff":hex:"c9981a34b7aa89":hex:"56bb4c3cae53b3"
AES-192-CFB8 Decrypt NIST MMT #7
11:hex:"64e40763f38a63ae378c32052b0ae3aa538bb868a04ac985":hex:"aacf65089e4b285438451ffdcd0f6389":hex:"d8fcf83a88510a0d":hex:"b567411bc61b0a76"
AES-192-CFB8 Decrypt NIST MMT #8
11:hex:"7bfdca9605f17253f203efffc92da96fde023007d22cdad0":hex:"45c09e44036070f8a7737a5176b8cf26":hex:"9c195b1944c4af5bfb":hex:"89358df65c3ef14d26"
AES-192-CFB8 Decrypt NIST MMT #9
11:hex:"baf08b76317a65c5f07ae6f57eb0e65488659324d29709e3":hex:"0a02846b62abb693ef31d754842eed29":hex:"729c0b6deb75fa6eb5e8":hex:"9895932402393dc33a60"
AES-256-CFB8 Encrypt NIST MMT #0
10:hex:"34e8091cee09f1bd3ebf1e8f05f51bfbd4899ef2ae006a3a0f7875052cdd46c8":hex:"43eb4dcc4b04a80216a20e4a09a7abb5":hex:"f9":hex:"28"
AES-256-CFB8 Encrypt NIST MMT #1
10:hex:"e04e43173113109e1343393842fe6caef3f8a2e506d7f55f83dcb10444c6ad23":hex:"a38b88a293b077fb5546636aad90d663":hex:"2914":hex:"69a6"
AES-256-CFB8 Encrypt NIST MMT #2
10:hex:"064874092f7a13cc4462247ad423d0e96edf42e8b67a5a23b7a0a6477b098e66":hex:"338c552ff1eca14408e05d8cf9f3b31b":hex:"b974fa":hex:"1cff95"
AES-256-CFB8 Encrypt NIST MMT #3
10:hex:"56794adb0ef04aeddeabd650de736531d408837954b919002c33edfdff976cc2":hex:"71b5526facea4236d33f1f4107e4b04f":hex:"db774912":hex:"f04d9d4f"
AES-256-CFB8 Encrypt NIST MMT #4
10:hex:"dddd7f234e7d0e6ec64560b96430986a856f2ee9805443a7946e31601ef6679d":hex:"e20f39db0025eb24491bd06012887108":hex:"ad1d5311ea":hex:"19cc97a662"
AES-256-CFB8 Encrypt NIST MMT #5
10:hex:"ec73a760272c83f91771b3ab7b188715c6d6afb9c554feae83856e966a3863d0":hex:"ae7bfa38fd25778fcf66ce8157f6e42e":hex:"02fe724fbc5d":hex:"b0eca63405f4"
AES-256-CFB8 Encrypt NIST MMT #6
10:hex:"a66874ca0b70fb98b37c033ec96413f339adae02acade015b9f016b459db3309":hex:"6ed480d9e4ed031cf66bb1e07f8d5514":hex:"b4777e6bcd9a05":hex:"8c017397ad5bab"
AES-256-CFB8 Encrypt NIST MMT #7
10:hex:"a3dbbb775ada92b0b8ed1632444e21c1c86ff3eba8f628307306e766b8c15b5c":hex:"4ec56a8e541f5cfe7b8ab947bfa4fd08":hex:"1d70a5a82badf5ea":hex:"1e22bebebeacd81d"
AES-256-CFB8 Encrypt NIST MMT #8
10:hex:"64135e67c0ca1acef3360d930afcd726c5b04861a69c1b6a48bde1daf20f3b1f":hex:"5377a154d5f948189f9aa57b466c16b2":hex:"a36ca5ea382a322eef":hex:"3105016567d3174aed"
AES-256-CFB8 Encrypt NIST MMT #9
10:hex:"ebbb4566b5e182e0f072466b0b311df38f9175bc0213a5530bce2ec4d74f400d":hex:"0956a48e01002c9e16376d6e308dbad1":hex:"b0fe25ac8d3d28a2f471":hex:"638c6823e7256fb5626e"
AES-256-CFB8 Decrypt NIST MMT #0
11:hex:"1687831580cb764321a9d674dbd0a9640f668b0f58ef01b87a710b3095d5f855":hex:"6cd5bec6d6e1fd23afc543b8f80d3f89":hex:"6f":hex:"98"
AES-256-CFB8 Decrypt NIST MMT #1
11:hex:"b6b504e8b7065373ea31cd549e52eda7cb96fd1db14eddacbc420085ab48b747":hex:"870ecd45b1241803ddaf8bad15a025d7":hex:"17d4":hex:"3572"
AES-256-CFB8 Decrypt NIST MMT #2
11:hex:"6ad3105e15fb5b742bf4fe1eb8e98c6c1ffea653107c84f6b42ed1232a0bbc21":hex:"17534c89c4eae5dea6ea353dde7b1623":hex:"a9841e":hex:"f9411a"
AES-256-CFB8 Decrypt NIST MMT #3
11:hex:"758f3fa8b2b289f19fd59e7316be40b904eff7f565caac4570f972360e0da787":hex:"b21335ae980898fa92c4b3069e532973":hex:"84b35e25":hex:"47887872"
AES-256-CFB8 Decrypt NIST MMT #4
11:hex:"802e854eb799500975d960a67885820d195e02ab23d51f15e5cdbcee86a1580c":hex:"94478c4e44e2fa8d2e6bc43d384597e6":hex:"d1e96bf1e8":hex:"ed414b5689"
AES-256-CFB8 Decrypt NIST MMT #5
11:hex:"3a0c03ca9d1e5d49bb37f9041f88d159c3f1d5ce26c798f59ed54a93f0a0e600":hex:"9aae38ba832e4b093b50444074517d20":hex:"74410ccd12da":hex:"8207eee2a7ab"
AES-256-CFB8 Decrypt NIST MMT #6
11:hex:"ee05462128fea75e919f6f436cb198f222847d698a283f5767df682d33d3ce77":hex:"d2ad55e41887075184635112a22fc093":hex:"ff039e89877b44":hex:"aff3aa4c24e353"
AES-256-CFB8 Decrypt NIST MMT #7
11:hex:"08abbdcc3eb9c1717db1faa38dcd0893afd5e16e2596747af58f8d61ebedf9cd":hex:"b925c8dc9a9b55a4372ea6d37d21c1eb":hex:"e176ba99ea602fd9":hex:"b7370050288bf600"
AES-256-CFB8 Decrypt NIST MMT #8
11:hex:"56d404a893fb3b3f594aab18939230b096646a37a781629fbd9270f3891a5cea":hex:"e5906b36f2d97e6f2db19b6c7a3ce319":hex:"c55a9a917a809a784b":hex:"e44995bbb0fff40fee"
AES-256-CFB8 Decrypt NIST MMT #9
11:hex:"ec13062551e4d7291e320f565b749eea1809b663b26f2c4d53b52058b833e0ad":hex:"fbfa5a528e20863012790c2abafb5a0c":hex:"2bfc3f0209307140101a":hex:"547bfd642cf6e12ed942"
| 26,094 | 469 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_md.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_md.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_md.function
* Test suite data : suites/test_suite_md.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_MD_C)
#include "third_party/mbedtls/md.h"
void test_mbedtls_md_process( )
{
const uint8_t *md_type_ptr;
const mbedtls_md_info_t *info;
mbedtls_md_context_t ctx;
unsigned char buf[150];
mbedtls_md_init( &ctx );
/*
* Very minimal testing of mbedtls_md_process, just make sure the various
* xxx_process_wrap() function pointers are valid. (Testing that they
* indeed do the right thing whould require messing with the internal
* state of the underlying mbedtls_md/sha context.)
*
* Also tests that mbedtls_md_list() only returns valid MDs.
*/
for( md_type_ptr = mbedtls_md_list(); *md_type_ptr != 0; md_type_ptr++ )
{
info = mbedtls_md_info_from_type( *md_type_ptr );
TEST_ASSERT( info != NULL );
TEST_ASSERT( mbedtls_md_setup( &ctx, info, 0 ) == 0 );
TEST_ASSERT( mbedtls_md_process( &ctx, buf ) == 0 );
mbedtls_md_free( &ctx );
}
exit:
mbedtls_md_free( &ctx );
}
void test_mbedtls_md_process_wrapper( void ** params )
{
(void)params;
test_mbedtls_md_process( );
}
void test_md_null_args( )
{
mbedtls_md_context_t ctx;
const mbedtls_md_info_t *info = mbedtls_md_info_from_type( *( mbedtls_md_list() ) );
unsigned char buf[1] = { 0 };
mbedtls_md_init( &ctx );
TEST_ASSERT( mbedtls_md_get_size( NULL ) == 0 );
TEST_ASSERT( mbedtls_md_get_type( NULL ) == MBEDTLS_MD_NONE );
TEST_ASSERT( mbedtls_md_get_name( NULL ) == NULL );
TEST_ASSERT( mbedtls_md_info_from_string( NULL ) == NULL );
TEST_ASSERT( mbedtls_md_setup( &ctx, NULL, 0 ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_setup( NULL, info, 0 ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_starts( NULL ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_starts( &ctx ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_update( NULL, buf, 1 ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_update( &ctx, buf, 1 ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_finish( NULL, buf ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_finish( &ctx, buf ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md( NULL, buf, 1, buf ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
#if defined(MBEDTLS_FS_IO)
TEST_ASSERT( mbedtls_md_file( NULL, "", buf ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
#endif
TEST_ASSERT( mbedtls_md_hmac_starts( NULL, buf, 1 )
== MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_hmac_starts( &ctx, buf, 1 )
== MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_hmac_update( NULL, buf, 1 )
== MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_hmac_update( &ctx, buf, 1 )
== MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_hmac_finish( NULL, buf )
== MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_hmac_finish( &ctx, buf )
== MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_hmac_reset( NULL ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_hmac_reset( &ctx ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_hmac( NULL, buf, 1, buf, 1, buf )
== MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_process( NULL, buf ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
TEST_ASSERT( mbedtls_md_process( &ctx, buf ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
/* Ok, this is not NULL arg but NULL return... */
TEST_ASSERT( mbedtls_md_info_from_type( MBEDTLS_MD_NONE ) == NULL );
TEST_ASSERT( mbedtls_md_info_from_string( "no such md" ) == NULL );
exit:
;
}
void test_md_null_args_wrapper( void ** params )
{
(void)params;
test_md_null_args( );
}
void test_md_info( int md_type, char * md_name, int md_size )
{
const mbedtls_md_info_t *md_info;
const uint8_t *md_type_ptr;
int found;
md_info = mbedtls_md_info_from_type( md_type );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT( md_info == mbedtls_md_info_from_string( md_name ) );
TEST_ASSERT( mbedtls_md_get_type( md_info ) == (mbedtls_md_type_t) md_type );
TEST_ASSERT( mbedtls_md_get_size( md_info ) == (unsigned char) md_size );
TEST_ASSERT( strcmp( mbedtls_md_get_name( md_info ), md_name ) == 0 );
found = 0;
for( md_type_ptr = mbedtls_md_list(); *md_type_ptr != 0; md_type_ptr++ )
if( *md_type_ptr == md_type )
found = 1;
TEST_ASSERT( found == 1 );
exit:
;
}
void test_md_info_wrapper( void ** params )
{
test_md_info( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ) );
}
void test_md_text( char * text_md_name, char * text_src_string,
data_t * hash )
{
char md_name[100];
unsigned char src_str[1000];
unsigned char output[100];
const mbedtls_md_info_t *md_info = NULL;
memset( md_name, 0x00, 100 );
memset( src_str, 0x00, 1000 );
memset( output, 0x00, 100 );
strncpy( (char *) src_str, text_src_string, sizeof( src_str ) - 1 );
strncpy( (char *) md_name, text_md_name, sizeof( md_name ) - 1 );
md_info = mbedtls_md_info_from_string(md_name);
TEST_ASSERT( md_info != NULL );
TEST_ASSERT ( 0 == mbedtls_md( md_info, src_str, strlen( (char *) src_str ), output ) );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x,
mbedtls_md_get_size( md_info ),
hash->len ) == 0 );
exit:
;
}
void test_md_text_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_md_text( (char *) params[0], (char *) params[1], &data2 );
}
void test_md_hex( char * text_md_name, data_t * src_str, data_t * hash )
{
char md_name[100];
unsigned char output[100];
const mbedtls_md_info_t *md_info = NULL;
memset( md_name, 0x00, 100 );
memset( output, 0x00, 100 );
strncpy( (char *) md_name, text_md_name, sizeof( md_name ) - 1 );
md_info = mbedtls_md_info_from_string( md_name );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT ( 0 == mbedtls_md( md_info, src_str->x, src_str->len, output ) );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x,
mbedtls_md_get_size( md_info ),
hash->len ) == 0 );
exit:
;
}
void test_md_hex_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
test_md_hex( (char *) params[0], &data1, &data3 );
}
void test_md_text_multi( char * text_md_name, char * text_src_string,
data_t * hash )
{
char md_name[100];
unsigned char src_str[1000];
unsigned char output[100];
int halfway, len;
const mbedtls_md_info_t *md_info = NULL;
mbedtls_md_context_t ctx, ctx_copy;
mbedtls_md_init( &ctx );
mbedtls_md_init( &ctx_copy );
memset( md_name, 0x00, 100 );
memset( src_str, 0x00, 1000 );
memset( output, 0x00, 100 );
strncpy( (char *) src_str, text_src_string, sizeof(src_str) - 1 );
strncpy( (char *) md_name, text_md_name, sizeof(md_name) - 1 );
len = strlen( (char *) src_str );
halfway = len / 2;
md_info = mbedtls_md_info_from_string(md_name);
TEST_ASSERT( md_info != NULL );
TEST_ASSERT ( 0 == mbedtls_md_setup( &ctx, md_info, 0 ) );
TEST_ASSERT ( 0 == mbedtls_md_setup( &ctx_copy, md_info, 0 ) );
TEST_ASSERT ( 0 == mbedtls_md_starts( &ctx ) );
TEST_ASSERT ( ctx.md_ctx != NULL );
TEST_ASSERT ( 0 == mbedtls_md_update( &ctx, src_str, halfway ) );
TEST_ASSERT ( 0 == mbedtls_md_clone( &ctx_copy, &ctx ) );
TEST_ASSERT ( 0 == mbedtls_md_update( &ctx, src_str + halfway, len - halfway ) );
TEST_ASSERT ( 0 == mbedtls_md_finish( &ctx, output ) );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x,
mbedtls_md_get_size( md_info ),
hash->len) == 0 );
/* Test clone */
memset( output, 0x00, 100 );
TEST_ASSERT ( 0 == mbedtls_md_update( &ctx_copy, src_str + halfway, len - halfway ) );
TEST_ASSERT ( 0 == mbedtls_md_finish( &ctx_copy, output ) );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x,
mbedtls_md_get_size( md_info ),
hash->len ) == 0 );
exit:
mbedtls_md_free( &ctx );
mbedtls_md_free( &ctx_copy );
}
void test_md_text_multi_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_md_text_multi( (char *) params[0], (char *) params[1], &data2 );
}
void test_md_hex_multi( char * text_md_name, data_t * src_str, data_t * hash )
{
char md_name[100];
unsigned char output[100];
const mbedtls_md_info_t *md_info = NULL;
mbedtls_md_context_t ctx, ctx_copy;
int halfway;
mbedtls_md_init( &ctx );
mbedtls_md_init( &ctx_copy );
memset( md_name, 0x00, 100 );
memset( output, 0x00, 100 );
strncpy( (char *) md_name, text_md_name, sizeof( md_name ) - 1 );
md_info = mbedtls_md_info_from_string(md_name);
TEST_ASSERT( md_info != NULL );
TEST_ASSERT ( 0 == mbedtls_md_setup( &ctx, md_info, 0 ) );
TEST_ASSERT ( 0 == mbedtls_md_setup( &ctx_copy, md_info, 0 ) );
halfway = src_str->len / 2;
TEST_ASSERT ( 0 == mbedtls_md_starts( &ctx ) );
TEST_ASSERT ( ctx.md_ctx != NULL );
TEST_ASSERT ( 0 == mbedtls_md_update( &ctx, src_str->x, halfway ) );
TEST_ASSERT ( 0 == mbedtls_md_clone( &ctx_copy, &ctx ) );
TEST_ASSERT ( 0 == mbedtls_md_update( &ctx, src_str->x + halfway, src_str->len - halfway) );
TEST_ASSERT ( 0 == mbedtls_md_finish( &ctx, output ) );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x,
mbedtls_md_get_size( md_info ),
hash->len ) == 0 );
/* Test clone */
memset( output, 0x00, 100 );
TEST_ASSERT ( 0 == mbedtls_md_update( &ctx_copy, src_str->x + halfway, src_str->len - halfway ) );
TEST_ASSERT ( 0 == mbedtls_md_finish( &ctx_copy, output ) );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x,
mbedtls_md_get_size( md_info ),
hash->len ) == 0 );
exit:
mbedtls_md_free( &ctx );
mbedtls_md_free( &ctx_copy );
}
void test_md_hex_multi_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
test_md_hex_multi( (char *) params[0], &data1, &data3 );
}
void test_mbedtls_md_hmac( char * text_md_name, int trunc_size,
data_t * key_str, data_t * src_str,
data_t * hash )
{
char md_name[100];
unsigned char output[100];
const mbedtls_md_info_t *md_info = NULL;
memset( md_name, 0x00, 100 );
memset( output, 0x00, 100 );
strncpy( (char *) md_name, text_md_name, sizeof( md_name ) - 1 );
md_info = mbedtls_md_info_from_string( md_name );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT ( mbedtls_md_hmac( md_info, key_str->x, key_str->len, src_str->x, src_str->len, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x,
trunc_size, hash->len ) == 0 );
exit:
;
}
void test_mbedtls_md_hmac_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_mbedtls_md_hmac( (char *) params[0], *( (int *) params[1] ), &data2, &data4, &data6 );
}
void test_md_hmac_multi( char * text_md_name, int trunc_size, data_t * key_str,
data_t * src_str, data_t * hash )
{
char md_name[100];
unsigned char output[100];
const mbedtls_md_info_t *md_info = NULL;
mbedtls_md_context_t ctx;
int halfway;
mbedtls_md_init( &ctx );
memset( md_name, 0x00, 100 );
memset( output, 0x00, 100 );
strncpy( (char *) md_name, text_md_name, sizeof( md_name ) - 1 );
md_info = mbedtls_md_info_from_string( md_name );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT ( 0 == mbedtls_md_setup( &ctx, md_info, 1 ) );
halfway = src_str->len / 2;
TEST_ASSERT ( 0 == mbedtls_md_hmac_starts( &ctx, key_str->x, key_str->len ) );
TEST_ASSERT ( ctx.md_ctx != NULL );
TEST_ASSERT ( 0 == mbedtls_md_hmac_update( &ctx, src_str->x, halfway ) );
TEST_ASSERT ( 0 == mbedtls_md_hmac_update( &ctx, src_str->x + halfway, src_str->len - halfway ) );
TEST_ASSERT ( 0 == mbedtls_md_hmac_finish( &ctx, output ) );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x,
trunc_size, hash->len ) == 0 );
/* Test again, for reset() */
memset( output, 0x00, 100 );
TEST_ASSERT ( 0 == mbedtls_md_hmac_reset( &ctx ) );
TEST_ASSERT ( 0 == mbedtls_md_hmac_update( &ctx, src_str->x, halfway ) );
TEST_ASSERT ( 0 == mbedtls_md_hmac_update( &ctx, src_str->x + halfway, src_str->len - halfway ) );
TEST_ASSERT ( 0 == mbedtls_md_hmac_finish( &ctx, output ) );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x,
trunc_size, hash->len ) == 0 );
exit:
mbedtls_md_free( &ctx );
}
void test_md_hmac_multi_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_md_hmac_multi( (char *) params[0], *( (int *) params[1] ), &data2, &data4, &data6 );
}
#if defined(MBEDTLS_FS_IO)
void test_mbedtls_md_file( char * text_md_name, char * filename,
data_t * hash )
{
char md_name[100];
unsigned char output[100];
const mbedtls_md_info_t *md_info = NULL;
memset( md_name, 0x00, 100 );
memset( output, 0x00, 100 );
strncpy( (char *) md_name, text_md_name, sizeof( md_name ) - 1 );
md_info = mbedtls_md_info_from_string( md_name );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT( mbedtls_md_file( md_info, filename, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x,
mbedtls_md_get_size( md_info ),
hash->len ) == 0 );
exit:
;
}
void test_mbedtls_md_file_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_mbedtls_md_file( (char *) params[0], (char *) params[1], &data2 );
}
#endif /* MBEDTLS_FS_IO */
#endif /* MBEDTLS_MD_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_MD_C)
case 0:
{
*out_value = MBEDTLS_MD_MD2;
}
break;
case 1:
{
*out_value = MBEDTLS_MD_MD4;
}
break;
case 2:
{
*out_value = MBEDTLS_MD_MD5;
}
break;
case 3:
{
*out_value = MBEDTLS_MD_RIPEMD160;
}
break;
case 4:
{
*out_value = MBEDTLS_MD_SHA1;
}
break;
case 5:
{
*out_value = MBEDTLS_MD_SHA224;
}
break;
case 6:
{
*out_value = MBEDTLS_MD_SHA256;
}
break;
case 7:
{
*out_value = MBEDTLS_MD_SHA384;
}
break;
case 8:
{
*out_value = MBEDTLS_MD_SHA512;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_MD_C)
case 0:
{
#if defined(MBEDTLS_MD2_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_MD4_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_MD5_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if defined(MBEDTLS_RIPEMD160_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 4:
{
#if defined(MBEDTLS_SHA1_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 5:
{
#if defined(MBEDTLS_SHA256_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 6:
{
#if defined(MBEDTLS_SHA512_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 7:
{
#if !defined(MBEDTLS_SHA512_NO_SHA384)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 8:
{
#if defined(MBEDTLS_MD_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_MD_C)
test_mbedtls_md_process_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_MD_C)
test_md_null_args_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_MD_C)
test_md_info_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_MD_C)
test_md_text_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_MD_C)
test_md_hex_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_MD_C)
test_md_text_multi_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_MD_C)
test_md_hex_multi_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_MD_C)
test_mbedtls_md_hmac_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_MD_C)
test_md_hmac_multi_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_MD_C) && defined(MBEDTLS_FS_IO)
test_mbedtls_md_file_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_md.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 26,125 | 876 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_version.datax | Check compiletime library version
0:char*:"2.26.0"
Check runtime library version
1:char*:"2.26.0"
Check for MBEDTLS_VERSION_C
2:char*:"MBEDTLS_VERSION_C":int:0
Check for MBEDTLS_AES_C when already present
depends_on:0
2:char*:"MBEDTLS_AES_C":int:0
Check for unknown define
2:char*:"MBEDTLS_UNKNOWN":exp:0
| 310 | 17 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_pem.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_pem.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_pem.function
* Test suite data : suites/test_suite_pem.data
*
*/
#define TEST_SUITE_ACTIVE
#include "third_party/mbedtls/base64.h"
#include "third_party/mbedtls/pem.h"
#include "third_party/mbedtls/des.h"
#include "third_party/mbedtls/aes.h"
#if defined(MBEDTLS_PEM_WRITE_C)
void test_mbedtls_pem_write_buffer( char * start, char * end, data_t * buf,
char * result_str )
{
unsigned char *check_buf = NULL;
int ret;
size_t olen = 0, olen2 = 0;
ret = mbedtls_pem_write_buffer( start, end, buf->x, buf->len, NULL, 0, &olen );
TEST_ASSERT( ret == MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL );
check_buf = (unsigned char *) mbedtls_calloc( 1, olen );
TEST_ASSERT( check_buf != NULL );
ret = mbedtls_pem_write_buffer( start, end, buf->x, buf->len, check_buf, olen, &olen2 );
TEST_ASSERT( olen2 <= olen );
TEST_ASSERT( olen > strlen( (char*) result_str ) );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( strncmp( (char *) check_buf, (char *) result_str, olen ) == 0 );
exit:
mbedtls_free( check_buf );
}
void test_mbedtls_pem_write_buffer_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_mbedtls_pem_write_buffer( (char *) params[0], (char *) params[1], &data2, (char *) params[4] );
}
#endif /* MBEDTLS_PEM_WRITE_C */
#if defined(MBEDTLS_PEM_PARSE_C)
#if defined(MBEDTLS_AES_C)
#if defined(MBEDTLS_DES_C)
#if defined(MBEDTLS_MD5_C)
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_mbedtls_pem_read_buffer( char *header, char *footer, char *data,
char *pwd, int res )
{
mbedtls_pem_context ctx;
int ret;
size_t use_len = 0;
size_t pwd_len = strlen( pwd );
mbedtls_pem_init( &ctx );
ret = mbedtls_pem_read_buffer( &ctx, header, footer, (unsigned char *)data,
(unsigned char *)pwd, pwd_len, &use_len );
TEST_ASSERT( ret == res );
exit:
mbedtls_pem_free( &ctx );
}
void test_mbedtls_pem_read_buffer_wrapper( void ** params )
{
test_mbedtls_pem_read_buffer( (char *) params[0], (char *) params[1], (char *) params[2], (char *) params[3], *( (int *) params[4] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#endif /* MBEDTLS_MD5_C */
#endif /* MBEDTLS_DES_C */
#endif /* MBEDTLS_AES_C */
#endif /* MBEDTLS_PEM_PARSE_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
case 0:
{
*out_value = MBEDTLS_ERR_PEM_INVALID_ENC_IV;
}
break;
case 1:
{
*out_value = MBEDTLS_ERR_PEM_UNKNOWN_ENC_ALG;
}
break;
case 2:
{
*out_value = MBEDTLS_ERR_DES_INVALID_INPUT_LENGTH;
}
break;
case 3:
{
*out_value = MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH;
}
break;
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
case 0:
{
#if defined(MBEDTLS_DES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_CIPHER_MODE_CBC)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_AES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_PEM_WRITE_C)
test_mbedtls_pem_write_buffer_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_PEM_PARSE_C) && defined(MBEDTLS_AES_C) && defined(MBEDTLS_DES_C) && defined(MBEDTLS_MD5_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_mbedtls_pem_read_buffer_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_pem.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 10,947 | 376 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.misc.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_cipher.misc.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_cipher.function
* Test suite data : suites/test_suite_cipher.misc.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_CIPHER_C)
#include "third_party/mbedtls/cipher.h"
#if defined(MBEDTLS_AES_C)
#include "third_party/mbedtls/aes.h"
#endif
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
#endif
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
#define MBEDTLS_CIPHER_AUTH_CRYPT
#endif
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
/* Helper for resetting key/direction
*
* The documentation doesn't explicitly say whether calling
* mbedtls_cipher_setkey() twice is allowed or not. This currently works with
* the default software implementation, but only by accident. It isn't
* guaranteed to work with new ciphers or with alternative implementations of
* individual ciphers, and it doesn't work with the PSA wrappers. So don't do
* it, and instead start with a fresh context.
*/
static int cipher_reset_key( mbedtls_cipher_context_t *ctx, int cipher_id,
int use_psa, size_t tag_len, const data_t *key, int direction )
{
mbedtls_cipher_free( ctx );
mbedtls_cipher_init( ctx );
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
(void) tag_len;
#else
if( use_psa == 1 )
{
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( ctx,
mbedtls_cipher_info_from_type( cipher_id ),
tag_len ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
TEST_ASSERT( 0 == mbedtls_cipher_setup( ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
}
TEST_ASSERT( 0 == mbedtls_cipher_setkey( ctx, key->x, 8 * key->len,
direction ) );
return( 1 );
exit:
return( 0 );
}
/*
* Check if a buffer is all-0 bytes:
* return 1 if it is,
* 0 if it isn't.
*/
int buffer_is_all_zero( const uint8_t *buf, size_t size )
{
for( size_t i = 0; i < size; i++ )
if( buf[i] != 0 )
return 0;
return 1;
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_mbedtls_cipher_list( )
{
const int *cipher_type;
for( cipher_type = mbedtls_cipher_list(); *cipher_type != 0; cipher_type++ )
TEST_ASSERT( mbedtls_cipher_info_from_type( *cipher_type ) != NULL );
exit:
;
}
void test_mbedtls_cipher_list_wrapper( void ** params )
{
(void)params;
test_mbedtls_cipher_list( );
}
void test_cipher_invalid_param_unconditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_cipher_context_t invalid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
mbedtls_cipher_init( &valid_ctx );
mbedtls_cipher_setup( &valid_ctx, valid_info );
mbedtls_cipher_init( &invalid_ctx );
/* mbedtls_cipher_setup() */
TEST_ASSERT( mbedtls_cipher_setup( &valid_ctx, NULL ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_get_block_size() */
TEST_ASSERT( mbedtls_cipher_get_block_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_cipher_mode() */
TEST_ASSERT( mbedtls_cipher_get_cipher_mode( &invalid_ctx ) ==
MBEDTLS_MODE_NONE );
/* mbedtls_cipher_get_iv_size() */
TEST_ASSERT( mbedtls_cipher_get_iv_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_type() */
TEST_ASSERT(
mbedtls_cipher_get_type( &invalid_ctx ) ==
MBEDTLS_CIPHER_NONE);
/* mbedtls_cipher_get_name() */
TEST_ASSERT( mbedtls_cipher_get_name( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_key_bitlen() */
TEST_ASSERT( mbedtls_cipher_get_key_bitlen( &invalid_ctx ) ==
MBEDTLS_KEY_LENGTH_NONE );
/* mbedtls_cipher_get_operation() */
TEST_ASSERT( mbedtls_cipher_get_operation( &invalid_ctx ) ==
MBEDTLS_OPERATION_NONE );
/* mbedtls_cipher_setkey() */
TEST_ASSERT(
mbedtls_cipher_setkey( &invalid_ctx,
valid_buffer,
valid_bitlen,
valid_operation ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_set_iv() */
TEST_ASSERT(
mbedtls_cipher_set_iv( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_reset() */
TEST_ASSERT( mbedtls_cipher_reset( &invalid_ctx ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_ASSERT(
mbedtls_cipher_update_ad( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_ASSERT( mbedtls_cipher_set_padding_mode( &invalid_ctx, valid_mode ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif
/* mbedtls_cipher_update() */
TEST_ASSERT(
mbedtls_cipher_update( &invalid_ctx,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_finish() */
TEST_ASSERT(
mbedtls_cipher_finish( &invalid_ctx,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_ASSERT(
mbedtls_cipher_write_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_check_tag() */
TEST_ASSERT(
mbedtls_cipher_check_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
exit:
mbedtls_cipher_free( &invalid_ctx );
mbedtls_cipher_free( &valid_ctx );
}
void test_cipher_invalid_param_unconditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_unconditional( );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_cipher_invalid_param_conditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_operation_t invalid_operation = 100;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
/* mbedtls_cipher_init() */
TEST_VALID_PARAM( mbedtls_cipher_init( &valid_ctx ) );
TEST_INVALID_PARAM( mbedtls_cipher_init( NULL ) );
/* mbedtls_cipher_setup() */
TEST_VALID_PARAM( mbedtls_cipher_setup( &valid_ctx, valid_info ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setup( NULL, valid_info ) );
/* mbedtls_cipher_get_block_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_block_size( NULL ) );
/* mbedtls_cipher_get_cipher_mode() */
TEST_INVALID_PARAM_RET(
MBEDTLS_MODE_NONE,
mbedtls_cipher_get_cipher_mode( NULL ) );
/* mbedtls_cipher_get_iv_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_iv_size( NULL ) );
/* mbedtls_cipher_get_type() */
TEST_INVALID_PARAM_RET(
MBEDTLS_CIPHER_NONE,
mbedtls_cipher_get_type( NULL ) );
/* mbedtls_cipher_get_name() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_name( NULL ) );
/* mbedtls_cipher_get_key_bitlen() */
TEST_INVALID_PARAM_RET(
MBEDTLS_KEY_LENGTH_NONE,
mbedtls_cipher_get_key_bitlen( NULL ) );
/* mbedtls_cipher_get_operation() */
TEST_INVALID_PARAM_RET(
MBEDTLS_OPERATION_NONE,
mbedtls_cipher_get_operation( NULL ) );
/* mbedtls_cipher_setkey() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( NULL,
valid_buffer,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
NULL,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
valid_buffer,
valid_bitlen,
invalid_operation ) );
/* mbedtls_cipher_set_iv() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_reset() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_reset( NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_padding_mode( NULL, valid_mode ) );
#endif
/* mbedtls_cipher_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( NULL,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
NULL, valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
valid_buffer,
NULL ) );
/* mbedtls_cipher_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( NULL,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
valid_buffer,
NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_check_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
/* mbedtls_cipher_crypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_AEAD)
/* mbedtls_cipher_auth_encrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
/* mbedtls_cipher_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
#endif /* defined(MBEDTLS_CIPHER_MODE_AEAD) */
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
/* mbedtls_cipher_auth_encrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
/* mbedtls_cipher_auth_decrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
#endif /* MBEDTLS_CIPHER_MODE_AEAD || MBEDTLS_NIST_KW_C */
/* mbedtls_cipher_free() */
TEST_VALID_PARAM( mbedtls_cipher_free( NULL ) );
exit:
TEST_VALID_PARAM( mbedtls_cipher_free( &valid_ctx ) );
}
void test_cipher_invalid_param_conditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_conditional( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
#if defined(MBEDTLS_AES_C)
void test_cipher_special_behaviours( )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char input[32];
unsigned char output[32];
#if defined (MBEDTLS_CIPHER_MODE_CBC)
unsigned char iv[32];
#endif
size_t olen = 0;
mbedtls_cipher_init( &ctx );
memset( input, 0, sizeof( input ) );
memset( output, 0, sizeof( output ) );
#if defined(MBEDTLS_CIPHER_MODE_CBC)
memset( iv, 0, sizeof( iv ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_CBC );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* IV too big */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, MBEDTLS_MAX_IV_LENGTH + 1 )
== MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
/* IV too small */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, 0 )
== MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_cipher_free( &ctx );
mbedtls_cipher_init( &ctx );
#endif /* MBEDTLS_CIPHER_MODE_CBC */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_ECB );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* Update ECB with partial block */
TEST_ASSERT( mbedtls_cipher_update( &ctx, input, 1, output, &olen )
== MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED );
exit:
mbedtls_cipher_free( &ctx );
}
void test_cipher_special_behaviours_wrapper( void ** params )
{
(void)params;
test_cipher_special_behaviours( );
}
#endif /* MBEDTLS_AES_C */
void test_enc_dec_buf( int cipher_id, char * cipher_string, int key_len,
int length_val, int pad_mode )
{
size_t length = length_val, outlen, total_len, i, block_size;
unsigned char key[64];
unsigned char iv[16];
unsigned char ad[13];
unsigned char tag[16];
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
/*
* Prepare contexts
*/
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( key, 0x2a, sizeof( key ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( mbedtls_cipher_info_from_string( cipher_string ) == cipher_info );
/* Initialise enc and dec contexts */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
/*
* Do a few encode/decode cycles
*/
for( i = 0; i < 3; i++ )
{
memset( iv , 0x00 + i, sizeof( iv ) );
memset( ad, 0x10 + i, sizeof( ad ) );
memset( inbuf, 0x20 + i, sizeof( inbuf ) );
memset( encbuf, 0, sizeof( encbuf ) );
memset( decbuf, 0, sizeof( decbuf ) );
memset( tag, 0, sizeof( tag ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, ad, sizeof( ad ) - i ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, ad, sizeof( ad ) - i ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, length, encbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_write_tag( &ctx_enc, tag, sizeof( tag ) ) );
#endif
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len > length &&
total_len <= length + block_size ) );
/* decode the previously encoded string */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, total_len, decbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_check_tag( &ctx_dec, tag, sizeof( tag ) ) );
#endif
/* check result */
TEST_ASSERT( total_len == length );
TEST_ASSERT( 0 == memcmp(inbuf, decbuf, length) );
}
/*
* Done
*/
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_wrapper( void ** params )
{
test_enc_dec_buf( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_enc_fail( int cipher_id, int pad_mode, int key_len, int length_val,
int ret )
{
size_t length = length_val;
unsigned char key[32];
unsigned char iv[16];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char inbuf[64];
unsigned char encbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
/* Initialise context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, NULL, 0 ) );
#endif
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, inbuf, length, encbuf, &outlen ) );
TEST_ASSERT( ret == mbedtls_cipher_finish( &ctx, encbuf + outlen, &outlen ) );
/* done */
exit:
mbedtls_cipher_free( &ctx );
}
void test_enc_fail_wrapper( void ** params )
{
test_enc_fail( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_dec_empty_buf( int cipher,
int expected_update_ret,
int expected_finish_ret )
{
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
const mbedtls_cipher_info_t *cipher_info;
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise context */
cipher_info = mbedtls_cipher_info_from_type( cipher );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( sizeof(key) * 8 >= cipher_info->key_bitlen );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec,
key, cipher_info->key_bitlen,
MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
#endif
/* decode 0-byte string */
TEST_ASSERT( expected_update_ret ==
mbedtls_cipher_update( &ctx_dec, encbuf, 0, decbuf, &outlen ) );
TEST_ASSERT( 0 == outlen );
if ( expected_finish_ret == 0 &&
( cipher_info->mode == MBEDTLS_MODE_CBC ||
cipher_info->mode == MBEDTLS_MODE_ECB ) )
{
/* Non-CBC and non-ECB ciphers are OK with decrypting empty buffers and
* return success, not MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED, when
* decrypting an empty buffer.
* On the other hand, CBC and ECB ciphers need a full block of input.
*/
expected_finish_ret = MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED;
}
TEST_ASSERT( expected_finish_ret == mbedtls_cipher_finish(
&ctx_dec, decbuf + outlen, &outlen ) );
TEST_ASSERT( 0 == outlen );
exit:
mbedtls_cipher_free( &ctx_dec );
}
void test_dec_empty_buf_wrapper( void ** params )
{
test_dec_empty_buf( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
void test_enc_dec_buf_multipart( int cipher_id, int key_len, int first_length_val,
int second_length_val, int pad_mode,
int first_encrypt_output_len, int second_encrypt_output_len,
int first_decrypt_output_len, int second_decrypt_output_len )
{
size_t first_length = first_length_val;
size_t second_length = second_length_val;
size_t length = first_length + second_length;
size_t block_size;
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
const mbedtls_cipher_info_t *cipher_info;
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
size_t totaloutlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise enc and dec contexts */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, NULL, 0 ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, first_length, encbuf, &outlen ) );
TEST_ASSERT( (size_t)first_encrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf + first_length, second_length, encbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_encrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen > length &&
totaloutlen <= length + block_size ) );
/* decode the previously encoded string */
second_length = totaloutlen - first_length;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, first_length, decbuf, &outlen ) );
TEST_ASSERT( (size_t)first_decrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf + first_length, second_length, decbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_decrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length );
TEST_ASSERT( 0 == memcmp(inbuf, decbuf, length) );
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_multipart_wrapper( void ** params )
{
test_enc_dec_buf_multipart( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ), *( (int *) params[6] ), *( (int *) params[7] ), *( (int *) params[8] ) );
}
void test_decrypt_test_vec( int cipher_id, int pad_mode, data_t * key,
data_t * iv, data_t * cipher,
data_t * clear, data_t * ad, data_t * tag,
int finish_result, int tag_result )
{
unsigned char output[265];
mbedtls_cipher_context_t ctx;
size_t outlen, total_len;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
#if !defined(MBEDTLS_GCM_C) && !defined(MBEDTLS_CHACHAPOLY_C)
((void) ad);
((void) tag);
#endif
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, MBEDTLS_DECRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( pad_mode != -1 )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv->x, iv->len ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, ad->x, ad->len ) );
#endif
/* decode buffer and check tag->x */
total_len = 0;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, cipher->x, cipher->len, output, &outlen ) );
total_len += outlen;
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( tag_result == mbedtls_cipher_check_tag( &ctx, tag->x, tag->len ) );
#endif
/* check plaintext only if everything went fine */
if( 0 == finish_result && 0 == tag_result )
{
TEST_ASSERT( total_len == clear->len );
TEST_ASSERT( 0 == memcmp( output, clear->x, clear->len ) );
}
exit:
mbedtls_cipher_free( &ctx );
}
void test_decrypt_test_vec_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_decrypt_test_vec( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, &data10, &data12, *( (int *) params[14] ), *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
void test_auth_crypt_tv( int cipher_id, data_t * key, data_t * iv,
data_t * ad, data_t * cipher, data_t * tag,
char * result, data_t * clear, int use_psa )
{
/*
* Take an AEAD ciphertext + tag and perform a pair
* of AEAD decryption and AEAD encryption. Check that
* this results in the expected plaintext, and that
* decryption and encryption are inverse to one another.
*
* Do that twice:
* - once with legacy functions auth_decrypt/auth_encrypt
* - once with new functions auth_decrypt_ext/auth_encrypt_ext
* This allows testing both without duplicating test cases.
*/
int ret;
int using_nist_kw, using_nist_kw_padding;
mbedtls_cipher_context_t ctx;
size_t outlen;
unsigned char *cipher_plus_tag = NULL;
size_t cipher_plus_tag_len;
unsigned char *decrypt_buf = NULL;
size_t decrypt_buf_len = 0;
unsigned char *encrypt_buf = NULL;
size_t encrypt_buf_len = 0;
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
unsigned char *tmp_tag = NULL;
unsigned char *tmp_cipher = NULL;
unsigned char *tag_buf = NULL;
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
/* Null pointers are documented as valid for inputs of length 0.
* The test framework passes non-null pointers, so set them to NULL.
* key, cipher and tag can't be empty. */
if( iv->len == 0 )
iv->x = NULL;
if( ad->len == 0 )
ad->x = NULL;
if( clear->len == 0 )
clear->x = NULL;
mbedtls_cipher_init( &ctx );
/* Initialize PSA Crypto */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_ASSERT( psa_crypto_init( ) );
#else
(void) use_psa;
#endif
/*
* Are we using NIST_KW? with padding?
*/
using_nist_kw_padding = cipher_id == MBEDTLS_CIPHER_AES_128_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_192_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_256_KWP;
using_nist_kw = cipher_id == MBEDTLS_CIPHER_AES_128_KW ||
cipher_id == MBEDTLS_CIPHER_AES_192_KW ||
cipher_id == MBEDTLS_CIPHER_AES_256_KW ||
using_nist_kw_padding;
/****************************************************************
* *
* Part 1: non-deprecated API *
* *
****************************************************************/
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* prepare buffer for decryption
* (we need the tag appended to the ciphertext)
*/
cipher_plus_tag_len = cipher->len + tag->len;
ASSERT_ALLOC( cipher_plus_tag, cipher_plus_tag_len );
memcpy( cipher_plus_tag, cipher->x, cipher->len );
memcpy( cipher_plus_tag + cipher->len, tag->x, tag->len );
/*
* Compute length of output buffer according to the documentation
*/
if( using_nist_kw )
decrypt_buf_len = cipher_plus_tag_len - 8;
else
decrypt_buf_len = cipher_plus_tag_len - tag->len;
/*
* Try decrypting to a buffer that's 1B too small
*/
if( decrypt_buf_len != 0 )
{
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len, &outlen, tag->len );
if( strcmp( result, "FAIL" ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, decrypt_buf_len ) );
}
else
{
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
/* Free this, but keep cipher_plus_tag for deprecated function with PSA */
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/*
* Compute size of output buffer according to documentation
*/
if( using_nist_kw )
{
encrypt_buf_len = clear->len + 8;
if( using_nist_kw_padding && encrypt_buf_len % 8 != 0 )
encrypt_buf_len += 8 - encrypt_buf_len % 8;
}
else
{
encrypt_buf_len = clear->len + tag->len;
}
/*
* Try encrypting with an output buffer that's 1B too small
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret != 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
/*
* Encrypt and check the result
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len, &outlen, tag->len );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len + tag->len );
TEST_ASSERT( memcmp( encrypt_buf, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( memcmp( encrypt_buf + cipher->len,
tag->x, tag->len ) == 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
}
/****************************************************************
* *
* Part 2: deprecated API *
* *
****************************************************************/
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* Prepare pointers for decryption
*/
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
{
/* PSA requires that the tag immediately follows the ciphertext.
* Fortunately, we already have that from testing the new API. */
tmp_cipher = cipher_plus_tag;
tmp_tag = tmp_cipher + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
tmp_cipher = cipher->x;
tmp_tag = tag->x;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, cipher->len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
tmp_cipher, cipher->len, decrypt_buf, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
/* NIST_KW with legacy API */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else if( strcmp( result, "FAIL" ) == 0 )
{
/* unauthentic message */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, cipher->len ) );
}
else
{
/* authentic message: is the plaintext correct? */
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
mbedtls_free( cipher_plus_tag );
cipher_plus_tag = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/* prepare buffers for encryption */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa )
{
ASSERT_ALLOC( cipher_plus_tag, cipher->len + tag->len );
tmp_cipher = cipher_plus_tag;
tmp_tag = cipher_plus_tag + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
ASSERT_ALLOC( encrypt_buf, cipher->len );
ASSERT_ALLOC( tag_buf, tag->len );
tmp_cipher = encrypt_buf;
tmp_tag = tag_buf;
}
/*
* Encrypt and check the result
*/
outlen = 0;
ret = mbedtls_cipher_auth_encrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
clear->x, clear->len, tmp_cipher, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len );
if( cipher->len != 0 )
TEST_ASSERT( memcmp( tmp_cipher, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( memcmp( tmp_tag, tag->x, tag->len ) == 0 );
}
}
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
exit:
mbedtls_cipher_free( &ctx );
mbedtls_free( decrypt_buf );
mbedtls_free( encrypt_buf );
mbedtls_free( cipher_plus_tag );
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
mbedtls_free( tag_buf );
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_auth_crypt_tv_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_auth_crypt_tv( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, (char *) params[11], &data12, *( (int *) params[14] ) );
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_test_vec_ecb( int cipher_id, int operation, data_t * key,
data_t * input, data_t * result, int finish_result
)
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, input->x,
mbedtls_cipher_get_block_size( &ctx ),
output, &outlen ) );
TEST_ASSERT( outlen == mbedtls_cipher_get_block_size( &ctx ) );
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
TEST_ASSERT( 0 == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == memcmp( output, result->x,
mbedtls_cipher_get_block_size( &ctx ) ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_test_vec_ecb_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_test_vec_ecb( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, *( (int *) params[8] ) );
}
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_test_vec_crypt( int cipher_id, int operation, data_t *key,
data_t *iv, data_t *input, data_t *result,
int finish_result, int use_psa )
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
#else
if( use_psa == 1 )
{
PSA_ASSERT( psa_crypto_init( ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( &ctx,
mbedtls_cipher_info_from_type( cipher_id ), 0 ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
if( MBEDTLS_MODE_CBC == ctx.cipher_info->mode )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, MBEDTLS_PADDING_NONE ) );
TEST_ASSERT( finish_result == mbedtls_cipher_crypt( &ctx, iv->len ? iv->x : NULL,
iv->len, input->x, input->len,
output, &outlen ) );
TEST_ASSERT( result->len == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == memcmp( output, result->x, outlen ) );
exit:
mbedtls_cipher_free( &ctx );
#if defined(MBEDTLS_USE_PSA_CRYPTO)
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_test_vec_crypt_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_test_vec_crypt( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_set_padding( int cipher_id, int pad_mode, int ret )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
mbedtls_cipher_init( &ctx );
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( ret == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_set_padding_wrapper( void ** params )
{
test_set_padding( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_check_padding( int pad_mode, data_t * input, int ret, int dlen_check
)
{
mbedtls_cipher_info_t cipher_info;
mbedtls_cipher_context_t ctx;
size_t dlen;
/* build a fake context just for getting access to get_padding */
mbedtls_cipher_init( &ctx );
cipher_info.mode = MBEDTLS_MODE_CBC;
ctx.cipher_info = &cipher_info;
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
TEST_ASSERT( ret == ctx.get_padding( input->x, input->len, &dlen ) );
if( 0 == ret )
TEST_ASSERT( dlen == (size_t) dlen_check );
exit:
;
}
void test_check_padding_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_check_padding( *( (int *) params[0] ), &data1, *( (int *) params[3] ), *( (int *) params[4] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#endif /* MBEDTLS_CIPHER_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_CIPHER_C)
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_CIPHER_C)
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_CIPHER_C)
test_mbedtls_cipher_list_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_CIPHER_C)
test_cipher_invalid_param_unconditional_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_cipher_invalid_param_conditional_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_AES_C)
test_cipher_special_behaviours_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_fail_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_CIPHER_C)
test_dec_empty_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_multipart_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_CIPHER_C)
test_decrypt_test_vec_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_AUTH_CRYPT)
test_auth_crypt_tv_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_CIPHER_C)
test_test_vec_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_test_vec_crypt_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_set_padding_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_check_padding_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_cipher.misc.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 71,196 | 2,010 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/everest_test.c | /*-*- mode:c;indent-tabs-mode:nil;c-basic-offset:2;tab-width:8;coding:utf-8 -*-â
âvi: set net ft=c ts=2 sts=2 sw=2 fenc=utf-8 :viâ
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ¡
â Copyright 2021 Justine Alexandra Roberts Tunney â
â â
â Permission to use, copy, modify, and/or distribute this software for â
â any purpose with or without fee is hereby granted, provided that the â
â above copyright notice and this permission notice appear in all copies. â
â â
â THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL â
â WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED â
â WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE â
â AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL â
â DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR â
â PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER â
â TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR â
â PERFORMANCE OF THIS SOFTWARE. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ*/
#include "libc/stdio/rand.h"
#include "libc/stdio/stdio.h"
#include "libc/str/str.h"
#include "libc/testlib/ezbench.h"
#include "libc/testlib/testlib.h"
#include "third_party/mbedtls/config.h"
#include "third_party/mbedtls/endian.h"
void Hacl_Curve25519_crypto_scalarmult(uint8_t *, uint8_t *, uint8_t *);
void curve25519(uint8_t[32], uint8_t[32], uint8_t[32]);
const uint64_t kNumbers[] = {
0x0000000000000000, //
0x0000000000000001, //
0x0000000000001000, //
0x0000000002000000, //
0x0000004000000000, //
0x0008000000000000, //
0x8000000000000000, //
0x0007ffffffffffff, //
0x0000003fffffffff, //
0x0000000001ffffff, //
0x0000000000000fff, //
0xffffffffffffffff, //
0xfff8000000000000, //
};
TEST(everest, tinierVersionBehavesTheSame) {
size_t i;
uint8_t secret[32], bpoint[32], public[2][32];
for (i = 0; i < 500; ++i) {
rngset(secret, sizeof(secret), _rand64, -1);
rngset(bpoint, sizeof(bpoint), _rand64, -1);
Hacl_Curve25519_crypto_scalarmult(public[0], secret, bpoint);
curve25519(public[1], secret, bpoint);
ASSERT_EQ(0, memcmp(public[0], public[1], sizeof(public[0])));
}
for (i = 0; i < 500; ++i) {
Write64le(secret + 000, kNumbers[rand() % ARRAYLEN(kNumbers)]);
Write64le(secret + 010, kNumbers[rand() % ARRAYLEN(kNumbers)]);
Write64le(secret + 020, kNumbers[rand() % ARRAYLEN(kNumbers)]);
Write64le(secret + 030, kNumbers[rand() % ARRAYLEN(kNumbers)]);
Write64le(bpoint + 000, kNumbers[rand() % ARRAYLEN(kNumbers)]);
Write64le(bpoint + 010, kNumbers[rand() % ARRAYLEN(kNumbers)]);
Write64le(bpoint + 020, kNumbers[rand() % ARRAYLEN(kNumbers)]);
Write64le(bpoint + 030, kNumbers[rand() % ARRAYLEN(kNumbers)]);
Hacl_Curve25519_crypto_scalarmult(public[0], secret, bpoint);
curve25519(public[1], secret, bpoint);
ASSERT_EQ(0, memcmp(public[0], public[1], sizeof(public[0])));
}
}
BENCH(everest, bench) {
uint8_t secret[32], bpoint[32], public[32];
rngset(secret, sizeof(secret), _rand64, -1);
rngset(bpoint, sizeof(bpoint), _rand64, -1);
EZBENCH2("everest", donothing,
Hacl_Curve25519_crypto_scalarmult(public, secret, bpoint));
EZBENCH2("mariana", donothing, curve25519(public, secret, bpoint));
}
| 4,109 | 79 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_timing.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_timing.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_timing.function
* Test suite data : suites/test_suite_timing.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_TIMING_C)
/* This test module exercises the timing module. Since, depending on the
* underlying operating system, the timing routines are not always reliable,
* this suite only performs very basic sanity checks of the timing API.
*/
void test_timing_hardclock( )
{
(void) mbedtls_timing_hardclock();
/* This goto is added to avoid warnings from the generated code. */
goto exit;
exit:
;
}
void test_timing_hardclock_wrapper( void ** params )
{
(void)params;
test_timing_hardclock( );
}
void test_timing_get_timer( )
{
struct mbedtls_timing_hr_time time;
(void) mbedtls_timing_get_timer( &time, 1 );
(void) mbedtls_timing_get_timer( &time, 0 );
/* This goto is added to avoid warnings from the generated code. */
goto exit;
exit:
;
}
void test_timing_get_timer_wrapper( void ** params )
{
(void)params;
test_timing_get_timer( );
}
void test_timing_set_alarm( int seconds )
{
if( seconds == 0 )
{
mbedtls_set_alarm( seconds );
TEST_ASSERT( mbedtls_timing_alarmed == 1 );
}
else
{
mbedtls_set_alarm( seconds );
TEST_ASSERT( mbedtls_timing_alarmed == 0 ||
mbedtls_timing_alarmed == 1 );
}
exit:
;
}
void test_timing_set_alarm_wrapper( void ** params )
{
test_timing_set_alarm( *( (int *) params[0] ) );
}
void test_timing_delay( int fin_ms )
{
mbedtls_timing_delay_context ctx;
int result;
if( fin_ms == 0 )
{
mbedtls_timing_set_delay( &ctx, 0, 0 );
result = mbedtls_timing_get_delay( &ctx );
TEST_ASSERT( result == -1 );
}
else
{
mbedtls_timing_set_delay( &ctx, fin_ms / 2, fin_ms );
result = mbedtls_timing_get_delay( &ctx );
TEST_ASSERT( result >= 0 && result <= 2 );
}
exit:
;
}
void test_timing_delay_wrapper( void ** params )
{
test_timing_delay( *( (int *) params[0] ) );
}
#endif /* MBEDTLS_TIMING_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_TIMING_C)
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_TIMING_C)
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_TIMING_C)
test_timing_hardclock_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_TIMING_C)
test_timing_get_timer_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_TIMING_C)
test_timing_set_alarm_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_TIMING_C)
test_timing_delay_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_timing.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 9,747 | 367 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_ecdh.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_ecdh.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_ecdh.function
* Test suite data : suites/test_suite_ecdh.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_ECDH_C)
#include "third_party/mbedtls/ecdh.h"
static int load_public_key( int grp_id, data_t *point,
mbedtls_ecp_keypair *ecp )
{
int ok = 0;
TEST_ASSERT( mbedtls_ecp_group_load( &ecp->grp, grp_id ) == 0 );
TEST_ASSERT( mbedtls_ecp_point_read_binary( &ecp->grp,
&ecp->Q,
point->x,
point->len ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &ecp->grp,
&ecp->Q ) == 0 );
ok = 1;
exit:
return( ok );
}
static int load_private_key( int grp_id, data_t *private_key,
mbedtls_ecp_keypair *ecp,
mbedtls_test_rnd_pseudo_info *rnd_info )
{
int ok = 0;
TEST_ASSERT( mbedtls_ecp_read_key( grp_id, ecp,
private_key->x,
private_key->len ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_privkey( &ecp->grp, &ecp->d ) == 0 );
/* Calculate the public key from the private key. */
TEST_ASSERT( mbedtls_ecp_mul( &ecp->grp, &ecp->Q, &ecp->d,
&ecp->grp.G,
&mbedtls_test_rnd_pseudo_rand,
rnd_info ) == 0 );
ok = 1;
exit:
return( ok );
}
void test_ecdh_valid_param( )
{
TEST_VALID_PARAM( mbedtls_ecdh_free( NULL ) );
exit:
;
}
void test_ecdh_valid_param_wrapper( void ** params )
{
(void)params;
test_ecdh_valid_param( );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_ecdh_invalid_param( )
{
mbedtls_ecp_group grp;
mbedtls_ecdh_context ctx;
mbedtls_mpi m;
mbedtls_ecp_point P;
mbedtls_ecp_keypair kp;
size_t olen;
unsigned char buf[42] = { 0 };
const unsigned char *buf_null = NULL;
size_t const buflen = sizeof( buf );
int invalid_side = 42;
mbedtls_ecp_group_id valid_grp = MBEDTLS_ECP_DP_SECP192R1;
TEST_INVALID_PARAM( mbedtls_ecdh_init( NULL ) );
#if defined(MBEDTLS_ECP_RESTARTABLE)
TEST_INVALID_PARAM( mbedtls_ecdh_enable_restart( NULL ) );
#endif /* MBEDTLS_ECP_RESTARTABLE */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_gen_public( NULL, &m, &P,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_gen_public( &grp, NULL, &P,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_gen_public( &grp, &m, NULL,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_gen_public( &grp, &m, &P,
NULL, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_compute_shared( NULL, &m, &P, &m,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_compute_shared( &grp, NULL, &P, &m,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_compute_shared( &grp, &m, NULL, &m,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_compute_shared( &grp, &m, &P, NULL,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_setup( NULL, valid_grp ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_make_params( NULL, &olen, buf, buflen,
mbedtls_test_rnd_std_rand, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_make_params( &ctx, NULL, buf, buflen,
mbedtls_test_rnd_std_rand, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_make_params( &ctx, &olen, NULL, buflen,
mbedtls_test_rnd_std_rand, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_make_params( &ctx, &olen, buf, buflen, NULL, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_read_params( NULL,
(const unsigned char**) &buf,
buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_read_params( &ctx, &buf_null,
buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_read_params( &ctx, NULL, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_read_params( &ctx,
(const unsigned char**) &buf,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_get_params( NULL, &kp,
MBEDTLS_ECDH_OURS ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_get_params( &ctx, NULL,
MBEDTLS_ECDH_OURS ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_get_params( &ctx, &kp,
invalid_side ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_make_public( NULL, &olen, buf, buflen,
mbedtls_test_rnd_std_rand, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_make_public( &ctx, NULL, buf, buflen,
mbedtls_test_rnd_std_rand, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_make_public( &ctx, &olen, NULL, buflen,
mbedtls_test_rnd_std_rand, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_make_public( &ctx, &olen, buf, buflen, NULL, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_read_public( NULL, buf, buflen ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_read_public( &ctx, NULL, buflen ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_calc_secret( NULL, &olen, buf, buflen,
mbedtls_test_rnd_std_rand, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_calc_secret( &ctx, NULL, buf, buflen,
mbedtls_test_rnd_std_rand, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdh_calc_secret( &ctx, &olen, NULL, buflen,
mbedtls_test_rnd_std_rand, NULL ) );
exit:
return;
}
void test_ecdh_invalid_param_wrapper( void ** params )
{
(void)params;
test_ecdh_invalid_param( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_ecdh_primitive_random( int id )
{
mbedtls_ecp_group grp;
mbedtls_ecp_point qA, qB;
mbedtls_mpi dA, dB, zA, zB;
mbedtls_test_rnd_pseudo_info rnd_info;
mbedtls_ecp_group_init( &grp );
mbedtls_ecp_point_init( &qA ); mbedtls_ecp_point_init( &qB );
mbedtls_mpi_init( &dA ); mbedtls_mpi_init( &dB );
mbedtls_mpi_init( &zA ); mbedtls_mpi_init( &zB );
memset( &rnd_info, 0x00, sizeof( mbedtls_test_rnd_pseudo_info ) );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_EQUAL( 0, mbedtls_ecdh_gen_public( &grp, &dA, &qA,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) );
TEST_ASSERT( mbedtls_ecdh_gen_public( &grp, &dB, &qB,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecdh_compute_shared( &grp, &zA, &qB, &dA,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecdh_compute_shared( &grp, &zB, &qA, &dB,
NULL, NULL ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &zA, &zB ) == 0 );
exit:
mbedtls_ecp_group_free( &grp );
mbedtls_ecp_point_free( &qA ); mbedtls_ecp_point_free( &qB );
mbedtls_mpi_free( &dA ); mbedtls_mpi_free( &dB );
mbedtls_mpi_free( &zA ); mbedtls_mpi_free( &zB );
}
void test_ecdh_primitive_random_wrapper( void ** params )
{
test_ecdh_primitive_random( *( (int *) params[0] ) );
}
void test_ecdh_primitive_testvec( int id, data_t * rnd_buf_A, char * xA_str,
char * yA_str, data_t * rnd_buf_B,
char * xB_str, char * yB_str, char * z_str )
{
mbedtls_ecp_group grp;
mbedtls_ecp_point qA, qB;
mbedtls_mpi dA, dB, zA, zB, check;
mbedtls_test_rnd_buf_info rnd_info_A, rnd_info_B;
mbedtls_ecp_group_init( &grp );
mbedtls_ecp_point_init( &qA ); mbedtls_ecp_point_init( &qB );
mbedtls_mpi_init( &dA ); mbedtls_mpi_init( &dB );
mbedtls_mpi_init( &zA ); mbedtls_mpi_init( &zB ); mbedtls_mpi_init( &check );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
rnd_info_A.buf = rnd_buf_A->x;
rnd_info_A.length = rnd_buf_A->len;
/* Fix rnd_buf_A->x by shifting it left if necessary */
if( grp.nbits % 8 != 0 )
{
unsigned char shift = 8 - ( grp.nbits % 8 );
size_t i;
for( i = 0; i < rnd_info_A.length - 1; i++ )
rnd_buf_A->x[i] = rnd_buf_A->x[i] << shift
| rnd_buf_A->x[i+1] >> ( 8 - shift );
rnd_buf_A->x[rnd_info_A.length-1] <<= shift;
}
rnd_info_B.buf = rnd_buf_B->x;
rnd_info_B.length = rnd_buf_B->len;
/* Fix rnd_buf_B->x by shifting it left if necessary */
if( grp.nbits % 8 != 0 )
{
unsigned char shift = 8 - ( grp.nbits % 8 );
size_t i;
for( i = 0; i < rnd_info_B.length - 1; i++ )
rnd_buf_B->x[i] = rnd_buf_B->x[i] << shift
| rnd_buf_B->x[i+1] >> ( 8 - shift );
rnd_buf_B->x[rnd_info_B.length-1] <<= shift;
}
TEST_ASSERT( mbedtls_ecdh_gen_public( &grp, &dA, &qA,
mbedtls_test_rnd_buffer_rand,
&rnd_info_A ) == 0 );
TEST_ASSERT( !mbedtls_ecp_is_zero( &qA ) );
TEST_ASSERT( mbedtls_mpi_read_string( &check, 16, xA_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &qA.X, &check ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &check, 16, yA_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &qA.Y, &check ) == 0 );
TEST_ASSERT( mbedtls_ecdh_gen_public( &grp, &dB, &qB,
mbedtls_test_rnd_buffer_rand,
&rnd_info_B ) == 0 );
TEST_ASSERT( !mbedtls_ecp_is_zero( &qB ) );
TEST_ASSERT( mbedtls_mpi_read_string( &check, 16, xB_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &qB.X, &check ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &check, 16, yB_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &qB.Y, &check ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &check, 16, z_str ) == 0 );
TEST_ASSERT( mbedtls_ecdh_compute_shared( &grp, &zA, &qB, &dA, NULL, NULL ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &zA, &check ) == 0 );
TEST_ASSERT( mbedtls_ecdh_compute_shared( &grp, &zB, &qA, &dB, NULL, NULL ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &zB, &check ) == 0 );
exit:
mbedtls_ecp_group_free( &grp );
mbedtls_ecp_point_free( &qA ); mbedtls_ecp_point_free( &qB );
mbedtls_mpi_free( &dA ); mbedtls_mpi_free( &dB );
mbedtls_mpi_free( &zA ); mbedtls_mpi_free( &zB ); mbedtls_mpi_free( &check );
}
void test_ecdh_primitive_testvec_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
test_ecdh_primitive_testvec( *( (int *) params[0] ), &data1, (char *) params[3], (char *) params[4], &data5, (char *) params[7], (char *) params[8], (char *) params[9] );
}
void test_ecdh_exchange( int id )
{
mbedtls_ecdh_context srv, cli;
unsigned char buf[1000];
const unsigned char *vbuf;
size_t len;
mbedtls_test_rnd_pseudo_info rnd_info;
unsigned char res_buf[1000];
size_t res_len;
mbedtls_ecdh_init( &srv );
mbedtls_ecdh_init( &cli );
memset( &rnd_info, 0x00, sizeof( mbedtls_test_rnd_pseudo_info ) );
TEST_ASSERT( mbedtls_ecdh_setup( &srv, id ) == 0 );
memset( buf, 0x00, sizeof( buf ) ); vbuf = buf;
TEST_ASSERT( mbedtls_ecdh_make_params( &srv, &len, buf, 1000,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecdh_read_params( &cli, &vbuf, buf + len ) == 0 );
memset( buf, 0x00, sizeof( buf ) );
TEST_ASSERT( mbedtls_ecdh_make_public( &cli, &len, buf, 1000,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecdh_read_public( &srv, buf, len ) == 0 );
TEST_ASSERT( mbedtls_ecdh_calc_secret( &srv, &len, buf, 1000,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecdh_calc_secret( &cli, &res_len, res_buf, 1000,
NULL, NULL ) == 0 );
TEST_ASSERT( len == res_len );
TEST_ASSERT( memcmp( buf, res_buf, len ) == 0 );
exit:
mbedtls_ecdh_free( &srv );
mbedtls_ecdh_free( &cli );
}
void test_ecdh_exchange_wrapper( void ** params )
{
test_ecdh_exchange( *( (int *) params[0] ) );
}
#if defined(MBEDTLS_ECP_RESTARTABLE)
void test_ecdh_restart( int id, data_t *dA, data_t *dB, data_t *z,
int enable, int max_ops, int min_restart, int max_restart )
{
int ret;
mbedtls_ecdh_context srv, cli;
unsigned char buf[1000];
const unsigned char *vbuf;
size_t len;
mbedtls_test_rnd_buf_info rnd_info_A, rnd_info_B;
int cnt_restart;
mbedtls_ecp_group grp;
mbedtls_ecp_group_init( &grp );
mbedtls_ecdh_init( &srv );
mbedtls_ecdh_init( &cli );
rnd_info_A.buf = dA->x;
rnd_info_A.length = dA->len;
rnd_info_B.buf = dB->x;
rnd_info_B.length = dB->len;
/* The ECDH context is not guaranteed ot have an mbedtls_ecp_group structure
* in every configuration, therefore we load it separately. */
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
/* Otherwise we would have to fix the random buffer,
* as in ecdh_primitive_testvec. */
TEST_ASSERT( grp.nbits % 8 == 0 );
TEST_ASSERT( mbedtls_ecdh_setup( &srv, id ) == 0 );
/* set up restart parameters */
mbedtls_ecp_set_max_ops( max_ops );
if( enable )
{
mbedtls_ecdh_enable_restart( &srv );
mbedtls_ecdh_enable_restart( &cli );
}
/* server writes its parameters */
memset( buf, 0x00, sizeof( buf ) );
len = 0;
cnt_restart = 0;
do {
ret = mbedtls_ecdh_make_params( &srv, &len, buf, sizeof( buf ),
mbedtls_test_rnd_buffer_rand,
&rnd_info_A );
} while( ret == MBEDTLS_ERR_ECP_IN_PROGRESS && ++cnt_restart );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( cnt_restart >= min_restart );
TEST_ASSERT( cnt_restart <= max_restart );
/* client read server params */
vbuf = buf;
TEST_ASSERT( mbedtls_ecdh_read_params( &cli, &vbuf, buf + len ) == 0 );
/* client writes its key share */
memset( buf, 0x00, sizeof( buf ) );
len = 0;
cnt_restart = 0;
do {
ret = mbedtls_ecdh_make_public( &cli, &len, buf, sizeof( buf ),
mbedtls_test_rnd_buffer_rand,
&rnd_info_B );
} while( ret == MBEDTLS_ERR_ECP_IN_PROGRESS && ++cnt_restart );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( cnt_restart >= min_restart );
TEST_ASSERT( cnt_restart <= max_restart );
/* server reads client key share */
TEST_ASSERT( mbedtls_ecdh_read_public( &srv, buf, len ) == 0 );
/* server computes shared secret */
memset( buf, 0, sizeof( buf ) );
len = 0;
cnt_restart = 0;
do {
ret = mbedtls_ecdh_calc_secret( &srv, &len, buf, sizeof( buf ),
NULL, NULL );
} while( ret == MBEDTLS_ERR_ECP_IN_PROGRESS && ++cnt_restart );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( cnt_restart >= min_restart );
TEST_ASSERT( cnt_restart <= max_restart );
TEST_ASSERT( len == z->len );
TEST_ASSERT( memcmp( buf, z->x, len ) == 0 );
/* client computes shared secret */
memset( buf, 0, sizeof( buf ) );
len = 0;
cnt_restart = 0;
do {
ret = mbedtls_ecdh_calc_secret( &cli, &len, buf, sizeof( buf ),
NULL, NULL );
} while( ret == MBEDTLS_ERR_ECP_IN_PROGRESS && ++cnt_restart );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( cnt_restart >= min_restart );
TEST_ASSERT( cnt_restart <= max_restart );
TEST_ASSERT( len == z->len );
TEST_ASSERT( memcmp( buf, z->x, len ) == 0 );
exit:
mbedtls_ecp_group_free( &grp );
mbedtls_ecdh_free( &srv );
mbedtls_ecdh_free( &cli );
}
void test_ecdh_restart_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
test_ecdh_restart( *( (int *) params[0] ), &data1, &data3, &data5, *( (int *) params[7] ), *( (int *) params[8] ), *( (int *) params[9] ), *( (int *) params[10] ) );
}
#endif /* MBEDTLS_ECP_RESTARTABLE */
#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
void test_ecdh_exchange_legacy( int id )
{
mbedtls_ecdh_context srv, cli;
unsigned char buf[1000];
const unsigned char *vbuf;
size_t len;
mbedtls_test_rnd_pseudo_info rnd_info;
mbedtls_ecdh_init( &srv );
mbedtls_ecdh_init( &cli );
memset( &rnd_info, 0x00, sizeof( mbedtls_test_rnd_pseudo_info ) );
TEST_ASSERT( mbedtls_ecp_group_load( &srv.grp, id ) == 0 );
memset( buf, 0x00, sizeof( buf ) ); vbuf = buf;
TEST_ASSERT( mbedtls_ecdh_make_params( &srv, &len, buf, 1000,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecdh_read_params( &cli, &vbuf, buf + len ) == 0 );
memset( buf, 0x00, sizeof( buf ) );
TEST_ASSERT( mbedtls_ecdh_make_public( &cli, &len, buf, 1000,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecdh_read_public( &srv, buf, len ) == 0 );
TEST_ASSERT( mbedtls_ecdh_calc_secret( &srv, &len, buf, 1000,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecdh_calc_secret( &cli, &len, buf, 1000, NULL,
NULL ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &srv.z, &cli.z ) == 0 );
exit:
mbedtls_ecdh_free( &srv );
mbedtls_ecdh_free( &cli );
}
void test_ecdh_exchange_legacy_wrapper( void ** params )
{
test_ecdh_exchange_legacy( *( (int *) params[0] ) );
}
#endif /* MBEDTLS_ECDH_LEGACY_CONTEXT */
void test_ecdh_exchange_calc_secret( int grp_id,
data_t *our_private_key,
data_t *their_point,
int ours_first,
data_t *expected )
{
mbedtls_test_rnd_pseudo_info rnd_info;
mbedtls_ecp_keypair our_key;
mbedtls_ecp_keypair their_key;
mbedtls_ecdh_context ecdh;
unsigned char shared_secret[MBEDTLS_ECP_MAX_BYTES];
size_t shared_secret_length = 0;
memset( &rnd_info, 0x00, sizeof( mbedtls_test_rnd_pseudo_info ) );
mbedtls_ecdh_init( &ecdh );
mbedtls_ecp_keypair_init( &our_key );
mbedtls_ecp_keypair_init( &their_key );
if( ! load_private_key( grp_id, our_private_key, &our_key, &rnd_info ) )
goto exit;
if( ! load_public_key( grp_id, their_point, &their_key ) )
goto exit;
/* Import the keys to the ECDH calculation. */
if( ours_first )
{
TEST_ASSERT( mbedtls_ecdh_get_params(
&ecdh, &our_key, MBEDTLS_ECDH_OURS ) == 0 );
TEST_ASSERT( mbedtls_ecdh_get_params(
&ecdh, &their_key, MBEDTLS_ECDH_THEIRS ) == 0 );
}
else
{
TEST_ASSERT( mbedtls_ecdh_get_params(
&ecdh, &their_key, MBEDTLS_ECDH_THEIRS ) == 0 );
TEST_ASSERT( mbedtls_ecdh_get_params(
&ecdh, &our_key, MBEDTLS_ECDH_OURS ) == 0 );
}
/* Perform the ECDH calculation. */
TEST_ASSERT( mbedtls_ecdh_calc_secret(
&ecdh,
&shared_secret_length,
shared_secret, sizeof( shared_secret ),
&mbedtls_test_rnd_pseudo_rand, &rnd_info ) == 0 );
TEST_ASSERT( shared_secret_length == expected->len );
TEST_ASSERT( memcmp( expected->x, shared_secret,
shared_secret_length ) == 0 );
exit:
mbedtls_ecdh_free( &ecdh );
mbedtls_ecp_keypair_free( &our_key );
mbedtls_ecp_keypair_free( &their_key );
}
void test_ecdh_exchange_calc_secret_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_ecdh_exchange_calc_secret( *( (int *) params[0] ), &data1, &data3, *( (int *) params[5] ), &data6 );
}
void test_ecdh_exchange_get_params_fail( int our_grp_id,
data_t *our_private_key,
int their_grp_id,
data_t *their_point,
int ours_first,
int expected_ret )
{
mbedtls_test_rnd_pseudo_info rnd_info;
mbedtls_ecp_keypair our_key;
mbedtls_ecp_keypair their_key;
mbedtls_ecdh_context ecdh;
memset( &rnd_info, 0x00, sizeof( mbedtls_test_rnd_pseudo_info ) );
mbedtls_ecdh_init( &ecdh );
mbedtls_ecp_keypair_init( &our_key );
mbedtls_ecp_keypair_init( &their_key );
if( ! load_private_key( our_grp_id, our_private_key, &our_key, &rnd_info ) )
goto exit;
if( ! load_public_key( their_grp_id, their_point, &their_key ) )
goto exit;
if( ours_first )
{
TEST_ASSERT( mbedtls_ecdh_get_params(
&ecdh, &our_key, MBEDTLS_ECDH_OURS ) == 0 );
TEST_ASSERT( mbedtls_ecdh_get_params(
&ecdh, &their_key, MBEDTLS_ECDH_THEIRS ) ==
expected_ret );
}
else
{
TEST_ASSERT( mbedtls_ecdh_get_params(
&ecdh, &their_key, MBEDTLS_ECDH_THEIRS ) == 0 );
TEST_ASSERT( mbedtls_ecdh_get_params(
&ecdh, &our_key, MBEDTLS_ECDH_OURS ) ==
expected_ret );
}
exit:
mbedtls_ecdh_free( &ecdh );
mbedtls_ecp_keypair_free( &our_key );
mbedtls_ecp_keypair_free( &their_key );
}
void test_ecdh_exchange_get_params_fail_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
test_ecdh_exchange_get_params_fail( *( (int *) params[0] ), &data1, *( (int *) params[3] ), &data4, *( (int *) params[6] ), *( (int *) params[7] ) );
}
#endif /* MBEDTLS_ECDH_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_ECDH_C)
case 0:
{
*out_value = MBEDTLS_ECP_DP_SECP192R1;
}
break;
case 1:
{
*out_value = MBEDTLS_ECP_DP_SECP224R1;
}
break;
case 2:
{
*out_value = MBEDTLS_ECP_DP_SECP256R1;
}
break;
case 3:
{
*out_value = MBEDTLS_ECP_DP_SECP384R1;
}
break;
case 4:
{
*out_value = MBEDTLS_ECP_DP_SECP521R1;
}
break;
case 5:
{
*out_value = MBEDTLS_ECP_DP_CURVE25519;
}
break;
case 6:
{
*out_value = MBEDTLS_ECP_DP_BP256R1;
}
break;
case 7:
{
*out_value = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_ECDH_C)
case 0:
{
#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 4:
{
#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 5:
{
#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 6:
{
#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_ECDH_C)
test_ecdh_valid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_ECDH_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_ecdh_invalid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_ECDH_C)
test_ecdh_primitive_random_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_ECDH_C)
test_ecdh_primitive_testvec_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_ECDH_C)
test_ecdh_exchange_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_ECDH_C) && defined(MBEDTLS_ECP_RESTARTABLE)
test_ecdh_restart_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_ECDH_C) && defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
test_ecdh_exchange_legacy_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_ECDH_C)
test_ecdh_exchange_calc_secret_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_ECDH_C)
test_ecdh_exchange_get_params_fail_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_ecdh.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 36,649 | 1,074 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_random.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_random.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_random.function
* Test suite data : suites/test_suite_random.data
*
*/
#define TEST_SUITE_ACTIVE
/* Test random generation as a whole. */
#include "third_party/mbedtls/bignum.h"
#include "third_party/mbedtls/ctr_drbg.h"
#include "third_party/mbedtls/ecdsa.h"
#include "third_party/mbedtls/entropy.h"
#include "third_party/mbedtls/hmac_drbg.h"
/* How many bytes to generate in each test case for repeated generation.
* This must be high enough that the probability of generating the same
* output twice is infinitesimal, but low enough that random generators
* are willing to deliver that much. */
#define OUTPUT_SIZE 32
#if defined(MBEDTLS_ENTROPY_C)
#if !defined(MBEDTLS_TEST_NULL_ENTROPY)
#if defined(MBEDTLS_CTR_DRBG_C)
void test_random_twice_with_ctr_drbg( )
{
mbedtls_entropy_context entropy;
mbedtls_ctr_drbg_context drbg;
unsigned char output1[OUTPUT_SIZE];
unsigned char output2[OUTPUT_SIZE];
/* First round */
mbedtls_entropy_init( &entropy );
mbedtls_ctr_drbg_init( &drbg );
TEST_EQUAL( 0, mbedtls_ctr_drbg_seed( &drbg,
mbedtls_entropy_func, &entropy,
NULL, 0 ) );
TEST_EQUAL( 0, mbedtls_ctr_drbg_random( &drbg,
output1, sizeof( output1 ) ) );
mbedtls_ctr_drbg_free( &drbg );
mbedtls_entropy_free( &entropy );
/* Second round */
mbedtls_entropy_init( &entropy );
mbedtls_ctr_drbg_init( &drbg );
TEST_EQUAL( 0, mbedtls_ctr_drbg_seed( &drbg,
mbedtls_entropy_func, &entropy,
NULL, 0 ) );
TEST_EQUAL( 0, mbedtls_ctr_drbg_random( &drbg,
output2, sizeof( output2 ) ) );
mbedtls_ctr_drbg_free( &drbg );
mbedtls_entropy_free( &entropy );
/* The two rounds must generate different random data. */
TEST_ASSERT( timingsafe_bcmp( output1, output2, OUTPUT_SIZE ) != 0 );
exit:
mbedtls_ctr_drbg_free( &drbg );
mbedtls_entropy_free( &entropy );
}
void test_random_twice_with_ctr_drbg_wrapper( void ** params )
{
(void)params;
test_random_twice_with_ctr_drbg( );
}
#endif /* MBEDTLS_CTR_DRBG_C */
#endif /* !MBEDTLS_TEST_NULL_ENTROPY */
#endif /* MBEDTLS_ENTROPY_C */
#if defined(MBEDTLS_ENTROPY_C)
#if !defined(MBEDTLS_TEST_NULL_ENTROPY)
#if defined(MBEDTLS_HMAC_DRBG_C)
void test_random_twice_with_hmac_drbg( int md_type )
{
mbedtls_entropy_context entropy;
mbedtls_hmac_drbg_context drbg;
unsigned char output1[OUTPUT_SIZE];
unsigned char output2[OUTPUT_SIZE];
const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type( md_type );
/* First round */
mbedtls_entropy_init( &entropy );
mbedtls_hmac_drbg_init( &drbg );
TEST_EQUAL( 0, mbedtls_hmac_drbg_seed( &drbg, md_info,
mbedtls_entropy_func, &entropy,
NULL, 0 ) );
TEST_EQUAL( 0, mbedtls_hmac_drbg_random( &drbg,
output1, sizeof( output1 ) ) );
mbedtls_hmac_drbg_free( &drbg );
mbedtls_entropy_free( &entropy );
/* Second round */
mbedtls_entropy_init( &entropy );
mbedtls_hmac_drbg_init( &drbg );
TEST_EQUAL( 0, mbedtls_hmac_drbg_seed( &drbg, md_info,
mbedtls_entropy_func, &entropy,
NULL, 0 ) );
TEST_EQUAL( 0, mbedtls_hmac_drbg_random( &drbg,
output2, sizeof( output2 ) ) );
mbedtls_hmac_drbg_free( &drbg );
mbedtls_entropy_free( &entropy );
/* The two rounds must generate different random data. */
TEST_ASSERT( timingsafe_bcmp( output1, output2, OUTPUT_SIZE ) != 0 );
exit:
mbedtls_hmac_drbg_free( &drbg );
mbedtls_entropy_free( &entropy );
}
void test_random_twice_with_hmac_drbg_wrapper( void ** params )
{
test_random_twice_with_hmac_drbg( *( (int *) params[0] ) );
}
#endif /* MBEDTLS_HMAC_DRBG_C */
#endif /* !MBEDTLS_TEST_NULL_ENTROPY */
#endif /* MBEDTLS_ENTROPY_C */
#if defined(MBEDTLS_PSA_CRYPTO_C)
#if !defined(MBEDTLS_TEST_NULL_ENTROPY)
#if !defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
void test_random_twice_with_psa_from_classic( )
{
unsigned char output1[OUTPUT_SIZE];
unsigned char output2[OUTPUT_SIZE];
/* First round */
PSA_ASSERT( psa_crypto_init( ) );
TEST_EQUAL( 0, mbedtls_psa_get_random( MBEDTLS_PSA_RANDOM_STATE,
output1, sizeof( output1 ) ) );
PSA_DONE( );
/* Second round */
PSA_ASSERT( psa_crypto_init( ) );
TEST_EQUAL( 0, mbedtls_psa_get_random( MBEDTLS_PSA_RANDOM_STATE,
output2, sizeof( output2 ) ) );
PSA_DONE( );
/* The two rounds must generate different random data. */
TEST_ASSERT( timingsafe_bcmp( output1, output2, OUTPUT_SIZE ) != 0 );
exit:
PSA_DONE( );
}
void test_random_twice_with_psa_from_classic_wrapper( void ** params )
{
(void)params;
test_random_twice_with_psa_from_classic( );
}
#endif /* !MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
#endif /* !MBEDTLS_TEST_NULL_ENTROPY */
#endif /* MBEDTLS_PSA_CRYPTO_C */
#if defined(MBEDTLS_PSA_CRYPTO_C)
#if !defined(MBEDTLS_TEST_NULL_ENTROPY)
#if !defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
void test_random_twice_with_psa_from_psa( )
{
unsigned char output1[OUTPUT_SIZE];
unsigned char output2[OUTPUT_SIZE];
/* First round */
PSA_ASSERT( psa_crypto_init( ) );
PSA_ASSERT( psa_generate_random( output1, sizeof( output1 ) ) );
PSA_DONE( );
/* Second round */
PSA_ASSERT( psa_crypto_init( ) );
PSA_ASSERT( psa_generate_random( output2, sizeof( output2 ) ) );
PSA_DONE( );
/* The two rounds must generate different random data. */
TEST_ASSERT( timingsafe_bcmp( output1, output2, OUTPUT_SIZE ) != 0 );
exit:
PSA_DONE( );
}
void test_random_twice_with_psa_from_psa_wrapper( void ** params )
{
(void)params;
test_random_twice_with_psa_from_psa( );
}
#endif /* !MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
#endif /* !MBEDTLS_TEST_NULL_ENTROPY */
#endif /* MBEDTLS_PSA_CRYPTO_C */
#if defined(MBEDTLS_PSA_CRYPTO_C)
void test_mbedtls_psa_get_random_no_init( )
{
unsigned char output[1];
TEST_ASSERT( mbedtls_psa_get_random( MBEDTLS_PSA_RANDOM_STATE,
output, sizeof( output ) ) != 0 );
exit:
;
}
void test_mbedtls_psa_get_random_no_init_wrapper( void ** params )
{
(void)params;
test_mbedtls_psa_get_random_no_init( );
}
#endif /* MBEDTLS_PSA_CRYPTO_C */
#if defined(MBEDTLS_PSA_CRYPTO_C)
void test_mbedtls_psa_get_random_length( int n )
{
unsigned char *output = NULL;
PSA_ASSERT( psa_crypto_init( ) );
ASSERT_ALLOC( output, n );
TEST_EQUAL( 0, mbedtls_psa_get_random( MBEDTLS_PSA_RANDOM_STATE,
output, n ) );
exit:
mbedtls_free( output );
PSA_DONE( );
}
void test_mbedtls_psa_get_random_length_wrapper( void ** params )
{
test_mbedtls_psa_get_random_length( *( (int *) params[0] ) );
}
#endif /* MBEDTLS_PSA_CRYPTO_C */
#if defined(MBEDTLS_PSA_CRYPTO_C)
#if defined(MBEDTLS_ECDSA_C)
void test_mbedtls_psa_get_random_ecdsa_sign( int curve )
{
mbedtls_ecp_group grp;
mbedtls_mpi d, r, s;
unsigned char buf[] = "This is not a hash.";
mbedtls_ecp_group_init( &grp );
mbedtls_mpi_init( &d );
mbedtls_mpi_init( &r );
mbedtls_mpi_init( &s );
TEST_EQUAL( 0, mbedtls_mpi_lset( &d, 123456789 ) );
TEST_EQUAL( 0, mbedtls_ecp_group_load( &grp, curve ) );
PSA_ASSERT( psa_crypto_init( ) );
TEST_EQUAL( 0, mbedtls_ecdsa_sign( &grp, &r, &s, &d,
buf, sizeof( buf ),
mbedtls_psa_get_random,
MBEDTLS_PSA_RANDOM_STATE ) );
exit:
mbedtls_mpi_free( &d );
mbedtls_mpi_free( &r );
mbedtls_mpi_free( &s );
mbedtls_ecp_group_free( &grp );
PSA_DONE( );
}
void test_mbedtls_psa_get_random_ecdsa_sign_wrapper( void ** params )
{
test_mbedtls_psa_get_random_ecdsa_sign( *( (int *) params[0] ) );
}
#endif /* MBEDTLS_ECDSA_C */
#endif /* MBEDTLS_PSA_CRYPTO_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
case 0:
{
*out_value = MBEDTLS_MD_SHA1;
}
break;
case 1:
{
*out_value = MBEDTLS_MD_SHA256;
}
break;
case 2:
{
*out_value = MBEDTLS_MD_SHA512;
}
break;
case 3:
{
*out_value = MBEDTLS_CTR_DRBG_MAX_REQUEST;
}
break;
case 4:
{
*out_value = MBEDTLS_HMAC_DRBG_MAX_REQUEST;
}
break;
case 5:
{
*out_value = MBEDTLS_ECP_DP_SECP256R1;
}
break;
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
case 0:
{
#if defined(MBEDTLS_SHA1_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_SHA256_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_SHA512_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 4:
{
#if !defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 5:
{
#if defined(MBEDTLS_CTR_DRBG_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 6:
{
#if !defined(MBEDTLS_CTR_DRBG_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 7:
{
#if defined(MBEDTLS_HMAC_DRBG_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 8:
{
#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_ENTROPY_C) && !defined(MBEDTLS_TEST_NULL_ENTROPY) && defined(MBEDTLS_CTR_DRBG_C)
test_random_twice_with_ctr_drbg_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_ENTROPY_C) && !defined(MBEDTLS_TEST_NULL_ENTROPY) && defined(MBEDTLS_HMAC_DRBG_C)
test_random_twice_with_hmac_drbg_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_PSA_CRYPTO_C) && !defined(MBEDTLS_TEST_NULL_ENTROPY) && !defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
test_random_twice_with_psa_from_classic_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_PSA_CRYPTO_C) && !defined(MBEDTLS_TEST_NULL_ENTROPY) && !defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
test_random_twice_with_psa_from_psa_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_PSA_CRYPTO_C)
test_mbedtls_psa_get_random_no_init_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_PSA_CRYPTO_C)
test_mbedtls_psa_get_random_length_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_PSA_CRYPTO_C) && defined(MBEDTLS_ECDSA_C)
test_mbedtls_psa_get_random_ecdsa_sign_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_random.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 19,244 | 662 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_base64.datax | Test case mbedtls_base64_encode #1 buffer just right
0:char*:"":char*:"":int:0:int:0
Test case mbedtls_base64_encode #2 buffer just right
0:char*:"f":char*:"Zg==":int:5:int:0
Test case mbedtls_base64_encode #2 buffer too small
0:char*:"f":char*:"Zg==":int:4:exp:0
Test case mbedtls_base64_encode #3 buffer just right
0:char*:"fo":char*:"Zm8=":int:5:int:0
Test case mbedtls_base64_encode #3 buffer too small
0:char*:"fo":char*:"Zm8=":int:4:exp:0
Test case mbedtls_base64_encode #4 buffer just right
0:char*:"foo":char*:"Zm9v":int:5:int:0
Test case mbedtls_base64_encode #4 buffer too small
0:char*:"foo":char*:"Zm9v":int:4:exp:0
Test case mbedtls_base64_encode #5 buffer just right
0:char*:"foob":char*:"Zm9vYg==":int:9:int:0
Test case mbedtls_base64_encode #5 buffer too small
0:char*:"foob":char*:"Zm9vYg==":int:8:exp:0
Test case mbedtls_base64_encode #6 buffer just right
0:char*:"fooba":char*:"Zm9vYmE=":int:9:int:0
Test case mbedtls_base64_encode #6 buffer too small
0:char*:"fooba":char*:"Zm9vYmE=":int:8:exp:0
Test case mbedtls_base64_encode #7 buffer just right
0:char*:"foobar":char*:"Zm9vYmFy":int:9:int:0
Test case mbedtls_base64_encode #7 buffer too small
0:char*:"foobar":char*:"Zm9vYmFy":int:8:exp:0
Test case mbedtls_base64_decode #1
1:char*:"":char*:"":int:0
Test case mbedtls_base64_decode #2
1:char*:"Zg==":char*:"f":int:0
Test case mbedtls_base64_decode #3
1:char*:"Zm8=":char*:"fo":int:0
Test case mbedtls_base64_decode #4
1:char*:"Zm9v":char*:"foo":int:0
Test case mbedtls_base64_decode #5
1:char*:"Zm9vYg==":char*:"foob":int:0
Test case mbedtls_base64_decode #6
1:char*:"Zm9vYmE=":char*:"fooba":int:0
Test case mbedtls_base64_decode #7
1:char*:"Zm9vYmFy":char*:"foobar":int:0
Base64 decode (Illegal character)
1:char*:"zm#=":char*:"":exp:1
Base64 decode (Too much equal signs)
1:char*:"zm===":char*:"":exp:1
Base64 decode (Invalid char after equal signs)
1:char*:"zm=masd":char*:"":exp:1
Base64 decode (Space inside string)
1:char*:"zm masd":char*:"":exp:1
Base64 decode "Zm9vYmFy" (no newline nor '\0' at end)
4:hex:"5a6d3976596d4679":char*:"foobar":int:0
Base64 decode "Zm9vYmFy\n" (LF at end)
4:hex:"5a6d3976596d46790a":char*:"foobar":int:0
Base64 decode "Zm9vYmFy\r\n" (CRLF at end)
4:hex:"5a6d3976596d46790d0a":char*:"foobar":int:0
Base64 decode "Zm9vYmFy\r" (CR at end)
4:hex:"5a6d3976596d46790d":char*:"":exp:1
Base64 decode "Zm9vYmFy " (SP at end)
4:hex:"5a6d3976596d467920":char*:"foobar":int:0
Base64 decode "Zm9vYmFy \n" (SP+LF at end)
4:hex:"5a6d3976596d4679200a":char*:"foobar":int:0
Base64 decode "Zm9vYmFy \r\n" (SP+CRLF at end)
4:hex:"5a6d3976596d4679200d0a":char*:"foobar":int:0
Base64 decode "Zm9vYmFy \r" (SP+CR at end)
4:hex:"5a6d3976596d4679200d":char*:"":exp:1
Base64 decode "Zm9vYmFy " (2SP at end)
4:hex:"5a6d3976596d46792020":char*:"foobar":int:0
Base64 decode "Zm9vYmFy \n" (2SP+LF at end)
4:hex:"5a6d3976596d467920200a":char*:"foobar":int:0
Base64 decode "Zm9vYmFy \r\n" (2SP+CRLF at end)
4:hex:"5a6d3976596d467920200d0a":char*:"foobar":int:0
Base64 decode "Zm9vYmFy \r" (2SP+CR at end)
4:hex:"5a6d3976596d467920200d":char*:"":exp:1
Base64 decode "Zm9vYmF\ny" (LF inside)
4:hex:"5a6d3976596d460a79":char*:"foobar":int:0
Base64 decode "Zm9vYmF\ry" (CRLF inside)
4:hex:"5a6d3976596d460d0a79":char*:"foobar":int:0
Base64 decode "Zm9vYmF\ry" (CR inside)
4:hex:"5a6d3976596d460d79":char*:"":exp:1
Base64 decode "Zm9vYmF y" (SP inside)
4:hex:"5a6d3976596d462079":char*:"":exp:1
Base64 decode "Zm9vYmF \ny" (SP+LF inside)
4:hex:"5a6d3976596d46200a79":char*:"foobar":int:0
Base64 decode "Zm9vYmF \ry" (SP+CRLF inside)
4:hex:"5a6d3976596d46200d0a79":char*:"foobar":int:0
Base64 decode "Zm9vYmF \ry" (SP+CR inside)
4:hex:"5a6d3976596d46200d79":char*:"":exp:1
Base64 decode "Zm9vYmF y" (2SP inside)
4:hex:"5a6d3976596d46202079":char*:"":exp:1
Base64 decode "Zm9vYmF \ny" (2SP+LF inside)
4:hex:"5a6d3976596d4620200a79":char*:"foobar":int:0
Base64 decode "Zm9vYmF \ry" (2SP+CRLF inside)
4:hex:"5a6d3976596d4620200d0a79":char*:"foobar":int:0
Base64 decode "Zm9vYmF \ry" (2SP+CR inside)
4:hex:"5a6d3976596d4620200d79":char*:"":exp:1
Base64 encode hex #1
2:hex:"010203040506070809":char*:"AQIDBAUGBwgJ":int:13:int:0
Base64 encode hex #2 (buffer too small)
2:hex:"010203040506070809":char*:"AQIDBAUGBwgJ":int:12:exp:0
Base64 encode hex #3
2:hex:"0102030405060708":char*:"AQIDBAUGBwg=":int:13:int:0
Base64 encode hex #4
2:hex:"01020304050607":char*:"AQIDBAUGBw==":int:13:int:0
Base64 encode hex all valid input bytes #0
2:hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff":char*:"AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygpKissLS4vMDEyMzQ1Njc4OTo7PD0+P0BBQkNERUZHSElKS0xNTk9QUVJTVFVWV1hZWltcXV5fYGFiY2RlZmdoaWprbG1ub3BxcnN0dXZ3eHl6e3x9fn+AgYKDhIWGh4iJiouMjY6PkJGSk5SVlpeYmZqbnJ2en6ChoqOkpaanqKmqq6ytrq+wsbKztLW2t7i5uru8vb6/wMHCw8TFxsfIycrLzM3Oz9DR0tPU1dbX2Nna29zd3t/g4eLj5OXm5+jp6uvs7e7v8PHy8/T19vf4+fr7/P3+/w==":int:345:int:0
Base64 encode hex all valid input bytes #1
2:hex:"0102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff00":char*:"AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyAhIiMkJSYnKCkqKywtLi8wMTIzNDU2Nzg5Ojs8PT4/QEFCQ0RFRkdISUpLTE1OT1BRUlNUVVZXWFlaW1xdXl9gYWJjZGVmZ2hpamtsbW5vcHFyc3R1dnd4eXp7fH1+f4CBgoOEhYaHiImKi4yNjo+QkZKTlJWWl5iZmpucnZ6foKGio6SlpqeoqaqrrK2ur7CxsrO0tba3uLm6u7y9vr/AwcLDxMXGx8jJysvMzc7P0NHS09TV1tfY2drb3N3e3+Dh4uPk5ebn6Onq6+zt7u/w8fLz9PX29/j5+vv8/f7/AA==":int:345:int:0
Base64 encode hex all valid input bytes #2
2:hex:"02030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff0001":char*:"AgMEBQYHCAkKCwwNDg8QERITFBUWFxgZGhscHR4fICEiIyQlJicoKSorLC0uLzAxMjM0NTY3ODk6Ozw9Pj9AQUJDREVGR0hJSktMTU5PUFFSU1RVVldYWVpbXF1eX2BhYmNkZWZnaGlqa2xtbm9wcXJzdHV2d3h5ent8fX5/gIGCg4SFhoeIiYqLjI2Oj5CRkpOUlZaXmJmam5ydnp+goaKjpKWmp6ipqqusra6vsLGys7S1tre4ubq7vL2+v8DBwsPExcbHyMnKy8zNzs/Q0dLT1NXW19jZ2tvc3d7f4OHi4+Tl5ufo6err7O3u7/Dx8vP09fb3+Pn6+/z9/v8AAQ==":int:345:int:0
Base64 encode all valid output characters at all offsets
2:hex:"00108310518720928b30d38f41149351559761969b71d79f8218a39259a7a29aabb2dbafc31cb3d35db7e39ebbf3dfbff800420c41461c824a2cc34e3d04524d45565d865a6dc75e7e08628e49669e8a6aaecb6ebf0c72cf4d76df8e7aefcf7effe00108310518720928b30d38f41149351559761969b71d79f8218a39259a7a29aabb2dbafc31cb3d35db7e39ebbf3dfbff800420c41461c824a2cc34e3d04524d45565d865a6dc75e7e08628e49669e8a6aaecb6ebf0c72cf4d76df8e7aefcf7efd0":char*:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/+ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/+ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/+ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/Q":int:261:int:0
Base64 decode hex #1
3:char*:"AQIDBAUGBwgJ":hex:"010203040506070809":int:9:int:0
Base64 decode hex #2 (buffer too small)
3:char*:"AQIDBAUGBwgJ":hex:"010203040506070809":int:8:exp:0
Base64 decode hex #3
3:char*:"AQIDBAUGBwg=":hex:"0102030405060708":int:8:int:0
Base64 decode hex #4
3:char*:"AQIDBAUGBw==":hex:"01020304050607":int:7:int:0
Base64 decode hex #5 (buffer too small)
3:char*:"AQIDBAUGBw==":hex:"01020304050607":int:6:exp:0
Base64 decode all valid input characters at all offsets
3:char*:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/+ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/+ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/+ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/Q":hex:"00108310518720928b30d38f41149351559761969b71d79f8218a39259a7a29aabb2dbafc31cb3d35db7e39ebbf3dfbff800420c41461c824a2cc34e3d04524d45565d865a6dc75e7e08628e49669e8a6aaecb6ebf0c72cf4d76df8e7aefcf7effe00108310518720928b30d38f41149351559761969b71d79f8218a39259a7a29aabb2dbafc31cb3d35db7e39ebbf3dfbff800420c41461c824a2cc34e3d04524d45565d865a6dc75e7e08628e49669e8a6aaecb6ebf0c72cf4d76df8e7aefcf7efd0":int:195:int:0
Base64 Selftest
depends_on:0
5
| 9,211 | 188 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_chachapoly.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_chachapoly.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_chachapoly.function
* Test suite data : suites/test_suite_chachapoly.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_CHACHAPOLY_C)
#include "third_party/mbedtls/chachapoly.h"
void test_mbedtls_chachapoly_enc( data_t *key_str, data_t *nonce_str, data_t *aad_str, data_t *input_str, data_t *output_str, data_t *mac_str )
{
unsigned char output[265];
unsigned char mac[16]; /* size set by the standard */
mbedtls_chachapoly_context ctx;
TEST_ASSERT( key_str->len == 32 );
TEST_ASSERT( nonce_str->len == 12 );
TEST_ASSERT( mac_str->len == 16 );
mbedtls_chachapoly_init( &ctx );
TEST_ASSERT( mbedtls_chachapoly_setkey( &ctx, key_str->x ) == 0 );
TEST_ASSERT( mbedtls_chachapoly_encrypt_and_tag( &ctx,
input_str->len, nonce_str->x,
aad_str->x, aad_str->len,
input_str->x, output, mac ) == 0 );
TEST_ASSERT( memcmp( output_str->x, output, output_str->len ) == 0 );
TEST_ASSERT( memcmp( mac_str->x, mac, 16U ) == 0 );
exit:
mbedtls_chachapoly_free( &ctx );
}
void test_mbedtls_chachapoly_enc_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
test_mbedtls_chachapoly_enc( &data0, &data2, &data4, &data6, &data8, &data10 );
}
void test_mbedtls_chachapoly_dec( data_t *key_str, data_t *nonce_str, data_t *aad_str, data_t *input_str, data_t *output_str, data_t *mac_str, int ret_exp )
{
unsigned char output[265];
int ret;
mbedtls_chachapoly_context ctx;
TEST_ASSERT( key_str->len == 32 );
TEST_ASSERT( nonce_str->len == 12 );
TEST_ASSERT( mac_str->len == 16 );
mbedtls_chachapoly_init( &ctx );
TEST_ASSERT( mbedtls_chachapoly_setkey( &ctx, key_str->x ) == 0 );
ret = mbedtls_chachapoly_auth_decrypt( &ctx,
input_str->len, nonce_str->x,
aad_str->x, aad_str->len,
mac_str->x, input_str->x, output );
TEST_ASSERT( ret == ret_exp );
if( ret_exp == 0 )
{
TEST_ASSERT( memcmp( output_str->x, output, output_str->len ) == 0 );
}
exit:
mbedtls_chachapoly_free( &ctx );
}
void test_mbedtls_chachapoly_dec_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
test_mbedtls_chachapoly_dec( &data0, &data2, &data4, &data6, &data8, &data10, *( (int *) params[12] ) );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_chachapoly_bad_params()
{
unsigned char key[32];
unsigned char nonce[12];
unsigned char aad[1];
unsigned char input[1];
unsigned char output[1];
unsigned char mac[16];
size_t input_len = sizeof( input );
size_t aad_len = sizeof( aad );
mbedtls_chachapoly_context ctx;
memset( key, 0x00, sizeof( key ) );
memset( nonce, 0x00, sizeof( nonce ) );
memset( aad, 0x00, sizeof( aad ) );
memset( input, 0x00, sizeof( input ) );
memset( output, 0x00, sizeof( output ) );
memset( mac, 0x00, sizeof( mac ) );
TEST_INVALID_PARAM( mbedtls_chachapoly_init( NULL ) );
TEST_VALID_PARAM( mbedtls_chachapoly_free( NULL ) );
/* setkey */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_setkey( NULL, key ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_setkey( &ctx, NULL ) );
/* encrypt_and_tag */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_encrypt_and_tag( NULL,
0, nonce,
aad, 0,
input, output, mac ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_encrypt_and_tag( &ctx,
0, NULL,
aad, 0,
input, output, mac ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_encrypt_and_tag( &ctx,
0, nonce,
NULL, aad_len,
input, output, mac ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_encrypt_and_tag( &ctx,
input_len, nonce,
aad, 0,
NULL, output, mac ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_encrypt_and_tag( &ctx,
input_len, nonce,
aad, 0,
input, NULL, mac ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_encrypt_and_tag( &ctx,
0, nonce,
aad, 0,
input, output, NULL ) );
/* auth_decrypt */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_auth_decrypt( NULL,
0, nonce,
aad, 0,
mac, input, output ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_auth_decrypt( &ctx,
0, NULL,
aad, 0,
mac, input, output ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_auth_decrypt( &ctx,
0, nonce,
NULL, aad_len,
mac, input, output ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_auth_decrypt( &ctx,
0, nonce,
aad, 0,
NULL, input, output ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_auth_decrypt( &ctx,
input_len, nonce,
aad, 0,
mac, NULL, output ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_auth_decrypt( &ctx,
input_len, nonce,
aad, 0,
mac, input, NULL ) );
/* starts */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_starts( NULL, nonce,
MBEDTLS_CHACHAPOLY_ENCRYPT ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_starts( &ctx, NULL,
MBEDTLS_CHACHAPOLY_ENCRYPT ) );
/* update_aad */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_update_aad( NULL, aad,
aad_len ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_update_aad( &ctx, NULL,
aad_len ) );
/* update */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_update( NULL, input_len,
input, output ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_update( &ctx, input_len,
NULL, output ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_update( &ctx, input_len,
input, NULL ) );
/* finish */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_finish( NULL, mac ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA,
mbedtls_chachapoly_finish( &ctx, NULL ) );
exit:
return;
}
void test_chachapoly_bad_params_wrapper( void ** params )
{
(void)params;
test_chachapoly_bad_params( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_chachapoly_state()
{
unsigned char key[32];
unsigned char nonce[12];
unsigned char aad[1];
unsigned char input[1];
unsigned char output[1];
unsigned char mac[16];
size_t input_len = sizeof( input );
size_t aad_len = sizeof( aad );
mbedtls_chachapoly_context ctx;
memset( key, 0x00, sizeof( key ) );
memset( nonce, 0x00, sizeof( nonce ) );
memset( aad, 0x00, sizeof( aad ) );
memset( input, 0x00, sizeof( input ) );
memset( output, 0x00, sizeof( output ) );
memset( mac, 0x00, sizeof( mac ) );
/* Initial state: finish, update, update_aad forbidden */
mbedtls_chachapoly_init( &ctx );
TEST_ASSERT( mbedtls_chachapoly_finish( &ctx, mac )
== MBEDTLS_ERR_CHACHAPOLY_BAD_STATE );
TEST_ASSERT( mbedtls_chachapoly_update( &ctx, input_len, input, output )
== MBEDTLS_ERR_CHACHAPOLY_BAD_STATE );
TEST_ASSERT( mbedtls_chachapoly_update_aad( &ctx, aad, aad_len )
== MBEDTLS_ERR_CHACHAPOLY_BAD_STATE );
/* Still initial state: finish, update, update_aad forbidden */
TEST_ASSERT( mbedtls_chachapoly_setkey( &ctx, key )
== 0 );
TEST_ASSERT( mbedtls_chachapoly_finish( &ctx, mac )
== MBEDTLS_ERR_CHACHAPOLY_BAD_STATE );
TEST_ASSERT( mbedtls_chachapoly_update( &ctx, input_len, input, output )
== MBEDTLS_ERR_CHACHAPOLY_BAD_STATE );
TEST_ASSERT( mbedtls_chachapoly_update_aad( &ctx, aad, aad_len )
== MBEDTLS_ERR_CHACHAPOLY_BAD_STATE );
/* Starts -> finish OK */
TEST_ASSERT( mbedtls_chachapoly_starts( &ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT )
== 0 );
TEST_ASSERT( mbedtls_chachapoly_finish( &ctx, mac )
== 0 );
/* After finish: update, update_aad forbidden */
TEST_ASSERT( mbedtls_chachapoly_update( &ctx, input_len, input, output )
== MBEDTLS_ERR_CHACHAPOLY_BAD_STATE );
TEST_ASSERT( mbedtls_chachapoly_update_aad( &ctx, aad, aad_len )
== MBEDTLS_ERR_CHACHAPOLY_BAD_STATE );
/* Starts -> update* OK */
TEST_ASSERT( mbedtls_chachapoly_starts( &ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT )
== 0 );
TEST_ASSERT( mbedtls_chachapoly_update( &ctx, input_len, input, output )
== 0 );
TEST_ASSERT( mbedtls_chachapoly_update( &ctx, input_len, input, output )
== 0 );
/* After update: update_aad forbidden */
TEST_ASSERT( mbedtls_chachapoly_update_aad( &ctx, aad, aad_len )
== MBEDTLS_ERR_CHACHAPOLY_BAD_STATE );
/* Starts -> update_aad* -> finish OK */
TEST_ASSERT( mbedtls_chachapoly_starts( &ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT )
== 0 );
TEST_ASSERT( mbedtls_chachapoly_update_aad( &ctx, aad, aad_len )
== 0 );
TEST_ASSERT( mbedtls_chachapoly_update_aad( &ctx, aad, aad_len )
== 0 );
TEST_ASSERT( mbedtls_chachapoly_finish( &ctx, mac )
== 0 );
exit:
mbedtls_chachapoly_free( &ctx );
}
void test_chachapoly_state_wrapper( void ** params )
{
(void)params;
test_chachapoly_state( );
}
#if defined(MBEDTLS_SELF_TEST)
void test_chachapoly_selftest()
{
TEST_ASSERT( mbedtls_chachapoly_self_test( 1 ) == 0 );
exit:
;
}
void test_chachapoly_selftest_wrapper( void ** params )
{
(void)params;
test_chachapoly_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_CHACHAPOLY_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_CHACHAPOLY_C)
case 0:
{
*out_value = MBEDTLS_ERR_CHACHAPOLY_AUTH_FAILED;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_CHACHAPOLY_C)
case 0:
{
#if defined(MBEDTLS_SELF_TEST)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_CHACHAPOLY_C)
test_mbedtls_chachapoly_enc_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_CHACHAPOLY_C)
test_mbedtls_chachapoly_dec_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_CHACHAPOLY_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_chachapoly_bad_params_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_CHACHAPOLY_C)
test_chachapoly_state_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_CHACHAPOLY_C) && defined(MBEDTLS_SELF_TEST)
test_chachapoly_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_chachapoly.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 21,811 | 620 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_hmac_drbg.nopr.datax | HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #0
depends_on:0
4:exp:0:hex:"79349bbf7cdda5799557866621c913831146733abf8c35c8c7215b5b96c48e9b338c74e3e99dfedf":hex:"":hex:"":hex:"":hex:"":hex:"c6a16ab8d420706f0f34ab7fec5adca9d8ca3a133e159ca6ac43c6f8a2be22834a4c0a0affb10d7194f1c1a5cf7322ec1ae0964ed4bf122746e087fdb5b3e91b3493d5bb98faed49e85f130fc8a459b7"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #1
depends_on:0
4:exp:0:hex:"ee57fc23600fb9029a9ec6c82e7b51e43e9721e4393ef9ad841d276ca9519061d92d7ddfa6628ca3":hex:"":hex:"":hex:"":hex:"":hex:"ee26a5c8ef08a1ca8f14154d67c88f5e7ed8219d931b9842ac0039f2145539f2142b44117a998c22f590f6c9b38b465b783ecff13a7750201f7ecf1b8ab393604c73b2389336609af3440cde43298b84"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #2
depends_on:0
4:exp:0:hex:"ebfdad13c8f941d279dbb4de8d7706ddfdaa279f5e4428d6f785c5b2f833b69b09b71a57cf5701d4":hex:"":hex:"":hex:"":hex:"":hex:"66e35f9b8e05a861a0b3d01c66c416d5e8b77d4d21328c625cff9163ffc92e753015aa9d7f36ae3a961681d39f271d0b627787868cec3dedc520ecb303f96a43cec67369117af268a19f5284880cb3be"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #3
depends_on:0
4:exp:0:hex:"4fc0ec777ec5a5f3b9ea06831a36acbb9e9add057dbb73a83367ba7c163f7b99a56ab64274ee64cd":hex:"":hex:"":hex:"":hex:"":hex:"7910a801b68a20570ab0e593bd565021c8a543ba3942bd726021a7198f1d84c8806a6f9cc12d196e1cbfebf325d0e1971746921b4d55483fc366d2ca837c4fc9751fadea7b04c0a47d1e37649f7beb6b"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #4
depends_on:0
4:exp:0:hex:"85a41bafaa923240dcf613a53e28d8535474e05fb59ba1eaccb5e28b1f2493675cc4f63475a69b0d":hex:"":hex:"":hex:"":hex:"":hex:"2735fb69bfcac5b2f7f64e747c27d9957fc6a3cd0b3eee984641b2677655606e6b0ad6c875c7bf1333ab1f9b15ab1d522968059f78eaa05a70437c6974ec8e29c8ca5a0eae5464b32e9474e4fa5d4236"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #5
depends_on:0
4:exp:0:hex:"b64416ea406772f955fbd7da30c67f6a42e0b9a889d55454e03a88205eaafdd584dd54a40ea5c7df":hex:"":hex:"":hex:"":hex:"":hex:"44bc26482a49da5249e8785a4e44d91ccdc6103fd666b480350ea3a09d8a8cf9e30c103f53559cbf55e13078b7c6949e4e90e1ef79ddd234166981f715b8649834c27b17bdf0f0689ed18eb850b43e85"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #6
depends_on:0
4:exp:0:hex:"b3d4041201f4345e0a818de136c6aa7e6b0612e1ac6b3f2f26f6ec328ac7f8966dca90e162c297ef":hex:"":hex:"":hex:"":hex:"":hex:"d9245a4a0ab0ca97e747c0d29098979e8248e53f0ec6b91678972f3b5691e7995ad2eb99640d3e9a8364891d0ff179732d633f762d6592a4d49c4e667c699b2678929c81d9bdfc74d6575f5b727f4d65"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #7
depends_on:0
4:exp:0:hex:"06dbf57699df40ff67287ec11573b75b47e40e643c47f4db89bb41a3cb66446449b503b38a1e21fe":hex:"":hex:"":hex:"":hex:"":hex:"0d06c663f9105198a34229b0e3fcffd0de9a445f4fc5d5bb58b55e43cacaf0c27c07e5a9c3734e8a8e0885dd78cd1bde0777e3330d2fb3b04203f6c2749a45cb96bafba3bf9d1875dcbc46b6af558228"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #8
depends_on:0
4:exp:0:hex:"cc1ca95eadbd1bdb2459f44c6653c441f225685240438aff26a3447e8f504be4c42beeeffd884455":hex:"":hex:"":hex:"":hex:"":hex:"e8f3cbe8e1f8738b4fef6ae67662524c99cefdf7b416eafc15750054ffd7c288af1c13ee9a61d19f7163aa21f92207b66348228b56d64438ad7eec55670860fda3da9bb0773f5647c2bd03378d795c71"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #9
depends_on:0
4:exp:0:hex:"e68bbe5c6bb3a37207e6742ddb79c0b1640fcd3512909acd16aea846c8db1d76ede51d5562f20639":hex:"":hex:"":hex:"":hex:"":hex:"5cfad20546a1cc19922f0be7b7d04ba7d8335684354541b1ec8ce0adf3607446c8742d7737a566c92fcf3b2fde205197e9aa95c739d677631e28403eafed1cf45f22fe29d3979126eaaa46a4040a4c55"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #10
depends_on:0
4:exp:0:hex:"ac79be87bfbab344797fa6da775516be0923da6ca517407e790d1e3cb052983146f9a757fa910ce7":hex:"":hex:"":hex:"":hex:"":hex:"5b4444cb58df47502374fd6bda064cf1d70d253b994f1a6e5d4e62741846472d9f1cf14a2468aafd4ca7875b31987b8ba0de9144648a82602c19e293f2668c9519be3eb8a12f15543395348aa51697b2"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #11
depends_on:0
4:exp:0:hex:"cddc43355e651255dedf171c9aa1334452e3e830cc4c21605e927085657e7422b68bffab74d8f78e":hex:"":hex:"":hex:"":hex:"":hex:"e57f32e6a8a847f033802a92e6282c967eb18f3c9837b8bbe5f5e8d9d6fbc4d571412b873944d20bb8a354f787c3004d0b5dd5a92bdbab600f55d1ccc52275715df239a1e2a79040862680f34f5cd4f1"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #12
depends_on:0
4:exp:0:hex:"eb1a31c96683124985c9b412d16dd899d5da8c43273b3173417ca1a9392265b273221bbe87831466":hex:"":hex:"":hex:"":hex:"":hex:"59e4d915349514f4aace3d9eebfd30b58e8246c7dce23bd4c4e47bb9ac8c2696441d5b5bb2fbb2a1b585373ec5ee55071f2ea868b2df342b5f2df48cd026ddac9114f9142db999fbcde7a0c23403fb37"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #13
depends_on:0
4:exp:0:hex:"6a086e671327087dde91396dd73d5400d59a4fc5b26c0558b7d5321e4f22584409b7e6e014e7d062":hex:"":hex:"":hex:"":hex:"":hex:"70e17ca71ad75e40ed31629cae3fa9c23374f78e020c56e551907f2252706bd4cd4c47d099dbc072429ae53e34ed208fdae5e6ec13e5cd9b435c1b25dcbd099132570491e7c3544cf8ff2fba553c197d"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 0) #14
depends_on:0
4:exp:0:hex:"8b7086efac1e3c3c87c3798471d4afd028b8bab0217d403fb61206715d219a93505b62cd619be51b":hex:"":hex:"":hex:"":hex:"":hex:"0dcd502c6e884a366b50f208a1b8c59ffb85dbcd72a6e2d75aea94c9692a55a45fa7c2900a277dcd38b79cf463ac8961fe54df47bcfe5a60555ee4ea2be76faefedae3ce65db4b3f04301cf5c43ada43"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #0
depends_on:0
4:exp:0:hex:"7d7052a776fd2fb3d7191f733304ee8bbe4a0ceedca8020749047e879d610955eed916e4060e00c9":hex:"":hex:"fd8bb33aab2f6cdfbc541811861d518d":hex:"99afe347540461ddf6abeb491e0715b4":hex:"02f773482dd7ae66f76e381598a64ef0":hex:"a736343844fc92511391db0addd9064dbee24c8976aa259a9e3b6368aa6de4c9bf3a0effcda9cb0e9dc33652ab58ecb7650ed80467f76a849fb1cfc1ed0a09f7155086064db324b1e124f3fc9e614fcb"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #1
depends_on:0
4:exp:0:hex:"29c62afa3c52208a3fdecb43fa613f156c9eb59ac3c2d48bbd87be99d184165412314140d4027141":hex:"":hex:"433ddaf259d14bcf897630ccaa27338c":hex:"141146d404f284c2d02b6a10156e3382":hex:"edc343dbffe71ab4114ac3639d445b65":hex:"8c730f0526694d5a9a45dbab057a1975357d65afd3eff303320bd14061f9ad38759102b6c60116f6db7a6e8e7ab94c05500b4d1e357df8e957ac8937b05fb3d080a0f90674d44de1bd6f94d295c4519d"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #2
depends_on:0
4:exp:0:hex:"0c0d1c0328a384e697678ac87303dd62c8780b4ac33f18674ea4dce5b190d4e381eb7a5b5e12b4f1":hex:"":hex:"0557bc052aa8eabab0baa42ca38fbbe9":hex:"985865c180e0bfb7cdbed11b58b5e509":hex:"f40452f8c5b8f4cbc1675f70bb803740":hex:"4a1f442eae6c861b622014b079dfd47543176b82bc60826cfa02d3923ef0563f8deba8362c8d1950a70e80d67189fb4d904b855ed0ac39942aa8673e0951b4876354b849a6c1c51d0c35a3f4ed4e2f22"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #3
depends_on:0
4:exp:0:hex:"7cad65e5cc2888ae4e960f5d143c1425fc0785db471cc55e66451d29cf65d899a281905ff9b29e87":hex:"":hex:"800d583b2560d2a2300132ee2d13f19f":hex:"42eae705c2225d212fa0554ac6ac564b":hex:"72081e7e70200f1982c3ad9cb1d3ddbe":hex:"953e92258be7ff61b97077252ab9835231e366dfa5b635fb889c337562a2641d3aa9e46feeb2a4ea03cb73f1f801594c3cc71d2945c11a52bb0e93419df5d0854ad5f2e36d223c119e145cad507495a7"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #4
depends_on:0
4:exp:0:hex:"3084c8811564168bf7834d9a6c9d0ad0821b13a0b66dddc5ec2c90278236c08b6f657611a16636d7":hex:"":hex:"9a7665b3883bed37a48b07f98efa4b8b":hex:"28bfe9605ba856073ee69145ccdda4e0":hex:"c26d7c962574aa587b3eb7a8c29b2e08":hex:"36908adee4c1e7ea4e2f266b65aa7d7b5113e4b4377adadf4406bc573e04374a7e8b9b9b36eb0384e9336a9e7b4f308b463bd7aa9476154ab13181da5c2da9675a376b9c82ace5391e378fdd0cd4ef28"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #5
depends_on:0
4:exp:0:hex:"a0410a32703720abf2e28e252b5b9176cb96935082bc9ef4ca7bcab78fce7da97b0158379041bd6c":hex:"":hex:"b70982af7b5e337cfe989703bffc09e9":hex:"8df8b08f648518f7526c24bb95df1e44":hex:"6775865f451ee055ed2242076debe237":hex:"548f66f0acd9ed887ceb7f95d1c9a0c29e2f6007b92c581e615139256bea63d0fcd7a9b950e3e89419d2142c5d8f5bbcc2ba5b0dd67689b7ade01d984e303a529165dbdd140edd69c3ec6a4ddd63e091"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #6
depends_on:0
4:exp:0:hex:"c2e9a6e2e29f47dee0e808660c446a4faff465073a97862c2ab6787095e944c5276d29bbbbd7a777":hex:"":hex:"358ffeab6a24f932abd4c9577f84cb13":hex:"37578c2d9b68d43d6c83164a4c43ce37":hex:"02a7c9575d9527a33df9fb566373db3a":hex:"fcd318c83563f72e5a21d4a93a84254e0c3bb6d3ded55c3d5939dbd5d1525062fd587a422012437aeb88589e669e5a5d57f7ebb16e30590f6debd0eced84f8e57d47a3d123a52361145a8fab258ed19b"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #7
depends_on:0
4:exp:0:hex:"c93859e7fed1163b070bbefcf5ffb0a66a6f5b986116adbd959d37ea3b79a197449169bb01e0143d":hex:"":hex:"c62840816ae06eb725be9dd3e2954cd5":hex:"5dc60578a6a309fae33ebf162c22fab4":hex:"00d0fac12a9b66b7ea936411f1645d4b":hex:"ca2eb212b29d5a38cf72409cd8cb4bc401eacbc6e59c84551cdfa12c1c8fb39c29c9d49905b25953f727ac24453ccf1c6f20a4c3fa7c33b052e4e82c7fcbab70ade865d249b6a27e0b5eddccf0567d6d"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #8
depends_on:0
4:exp:0:hex:"237a566e4a46994fb13af5b2d4321a03fdf5cc54f461daf30949f86b7b223fc341ddbe525c533339":hex:"":hex:"bc252901f8f5c9357722a424b0af1bb1":hex:"6020d93df16b10c31d8802f6bb9ddfac":hex:"f9104117190d905a30c65c0a76148c7a":hex:"70e0611f1cf70ba93e3cc53da83fc3d6064b293e90c117ec12cc79c5e4edf845b6a5e2c4ce75ffce5d18a75e24bf51300bae6443f04a71047a8f522edb370689ef1b2cc13769865b69dc232963d90419"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #9
depends_on:0
4:exp:0:hex:"80c2b6fbd576cd57c38d1d1197b9e7ad43216111a1ec8b5f31dfc1a4e05c15ed96288386d0768951":hex:"":hex:"1af215d9b991e4f7ddc2a89fe23388a1":hex:"d889e43410eeb2a83cb6982f38077756":hex:"c77e7bb93115c10a56db1245e610e8b6":hex:"af9f8c34654f44f42914070dcf1e971884902b428c7332913ddf2e342e776e01dc2fc73cd803b3a492edb15e7cc755babc23d8a5007bb0bebd7f02bd168d055948e6a5b66a3016951697617eaad371a8"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #10
depends_on:0
4:exp:0:hex:"d8041e31215f7c843effaec3ab722e1d271753acf2ec9ace8b5730e21c0c30f9daa98580695c4572":hex:"":hex:"347fc86229e2e6f6af2ead186248c2f9":hex:"a09c1b813fd11102df392d116f127de1":hex:"0ab6c5c7f689bda8a3a7f406bf6df33d":hex:"e09414c8f5ff2d8d6b6523729556dc1b4bba6e4cfc7a929e4561cfd32e5484918c7f21e0b533c3e3827bb8e115cc6a2aa5def3d946001564eda8cb36fa5aa771651e4837ae60beba32e01f5d59c0be0c"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #11
depends_on:0
4:exp:0:hex:"b0f69a20531c5b186bf8c16b25fa1de8d6817ba362a9a00ea3aa59b018b7ce8648b7f84ab925050f":hex:"":hex:"2905e4b0803d221ccfba43bb4f1e3338":hex:"0460c4ba1738dd7c662e0f4337a454c5":hex:"b5a7870dc99f5c2ead93dae773ab55c6":hex:"a542a3ba51f4024d3876a32fd6fdaa136c024ff36b9662ed82cf580bb1d33b531b124c0e28fd0b8ec06e50dcc11132062a55bdb961a908688ddccda12be8f1242f8a5ada53939e32d8c0381250134686"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #12
depends_on:0
4:exp:0:hex:"188ae42fbe0f4e9e17c7b0432712aaefb1667157132f8d6240fd9d19ba9f5f56f58bd08e9842e2a1":hex:"":hex:"88560712277f73d457f62b3769189381":hex:"892957bfbacc684af6d31c8befca8e4d":hex:"a9e8986ff89479fa506780b07b09c2c9":hex:"e77187930ac661bd1a422e29cae4c67370d9e8ab0e44ea9dd86b11b2a1c5271162513587ed02df4c91b0e04158406763e72a443a196b6a2e22af72ef2732e3916cabf518fa58ab89fea5528153818a6c"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #13
depends_on:0
4:exp:0:hex:"ad490819bbb9e937e0d0a749eb83465470fe146ad9f3ae0b104810bbb28773e538b466319bef5d6a":hex:"":hex:"e01882c8b9bc52d584274912d93367e8":hex:"20a03700499444028da4c8fc5ba42d8f":hex:"6574be269d5ccb5d10ad5fd6add77e2d":hex:"5662845711b5a6c04715dcb3293f091709d87703f1a449858f074858958260ccd833d9699fcd0bcba7956f9036808984828a3a9db2041556c77b1644a7566bd8892ed53e418cb74bca1a8d65f545c3e1"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 0, 128) #14
depends_on:0
4:exp:0:hex:"aa4ea001160441917ac60f6231468f7da993e136dcce82083cc6c81b69e67ead392721ea79b63e97":hex:"":hex:"50f89606e793786a14ed11b3026313ce":hex:"2445d7b670fd77bb62e0c1db75671863":hex:"32b79488b44093ee7fdb4441bc302b70":hex:"1b803314c8ed124bf6550bc63babf09f189e59df3d8d4103567c442b6783c32b236a107d4accd7ab3e465d29f6216349baa298ebeafd3c5cc198f0880868b8c9b67d94fd53626651200f5dfc939d4128"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #0
depends_on:0
4:exp:0:hex:"11c0a7e1472cec70fa8c1ca15759ac5bb1c73c22db39cd7bc6ab59ff708a5c1f598e75df060e1981":hex:"b24e392cb1f3c18af2cb50feac733e32":hex:"":hex:"":hex:"":hex:"070e603cd48d56430a5ab461a751ec2a4a6aa6fb6ee52efe9a41e4611eafdfc957184b47bbb017e484ac34c7de56cd7813feb301b5befce573ad0a254e6cfe35b77c30be6b7cb5e7efa72813c7546ba5"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #1
depends_on:0
4:exp:0:hex:"e05141adb678c297eebd8136885b67345b9c0c54a0ff74d826e26c9323a3da3af6e5a5a1f351cb54":hex:"4814ea71a8e11845716b22085cc65f2b":hex:"":hex:"":hex:"":hex:"5ef29a2e7e821d529d1928e6bab16fb80d6491a98dd53695473dadead4e5142c146f1e29b101c6b1a57d8315ce34db17040c02572c6455d902303dcfcb2ad3052166de790ce0c94af78a51864efd4b12"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #2
depends_on:0
4:exp:0:hex:"9747f5a2a27c65b0bd9202f0743afbfd247b3b05fce7d31cd3e34742cffe1c6d55f8f98dfc57953c":hex:"c3fc8430972dfa880e2bfa66862bffde":hex:"":hex:"":hex:"":hex:"92137ebf7518354bd65d87235a81c79e13cb53e46b47fa091cfe342f0253e5ee4634e8fe5fcb967bfcdbdfaa60614bf96826875608c0f1b55967619db6df24efedc86498cad733e29ee9d9e3d6277273"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #3
depends_on:0
4:exp:0:hex:"a9a8a0a7b8a58c239e083fa1cd2a8c968cfc5f074bbc31473cb71f26b82cdae4223fa32702f57ee3":hex:"3fb4c2f37714039a1a2e6c68e4818eee":hex:"":hex:"":hex:"":hex:"1b5986ccdbac7da7fe7e792ddd445ca894b6ec08424a17fed5385ff8bd03ba782b42bc5a9676acd5be8061d535930a487902923148710ff17908fcb03db7ddc0e4b10be16c0a0365db387529a2398552"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #4
depends_on:0
4:exp:0:hex:"99d1822bc16f2e7bbeb6556c5215489ea6039f54a175ae86aaf4cef7d80ffedc37e3c68c7de03ddd":hex:"e80fa03bd7c8f5acdda5754ef00cdb5c":hex:"":hex:"":hex:"":hex:"2236568252a384a7e75cefba04a94381941035b28de764d5b2518a98ba4e8f1d50e8230953df40db602b8959ee8f1b8831b29516f937aaf561679bac0ffb11207030ef33b26da28af93ba552c08bff97"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #5
depends_on:0
4:exp:0:hex:"305a4478bb85b0cdcb99618d8753494beee617d70aec26501eef2f751cad0b1cde509806d4064422":hex:"c3fa490a01511e8410577021a307c31b":hex:"":hex:"":hex:"":hex:"f23ceadb881b945029b78366a173c20af93e43fd8c3be0588f811af31a7ddd653610cdfc3cd875a0f114fc1b887e4fe5042eb0dc0c36746961b1b7126950aff4c01245c215156715c7efd14c76539a0d"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #6
depends_on:0
4:exp:0:hex:"15c178375c839866ab31b38b900ba889325baf19b84c8fadf2f78da359af10da64c42130f79f3054":hex:"a4d50496711dcabde8e0ff21d3da7535":hex:"":hex:"":hex:"":hex:"3f38257370353677dee9127862305158b1c5b607741d62906cebf8babee4fc6cf1dee3f821d1d750c69f3ff5683d266df0a669d291f6816d86cd222b56a351c240afbb443e886ca194994b4deddc54bb"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #7
depends_on:0
4:exp:0:hex:"7efb63ed1e07cf853fce80468049dd5ed5e55a8b58bbdd32341f137867c451d8d4e327733de89c94":hex:"d89028d21cee2b223d634a9927ec036b":hex:"":hex:"":hex:"":hex:"477a1612c19b1c2fee232385ccdb5b2f32c845c07fa216ee410cca20245239d3220ac48770017c4d52f99a267d53e0acdf69e8f4bd1d76d463e9bdddc16bef7faf9d9baa9b9de3d397d740d685c158a0"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #8
depends_on:0
4:exp:0:hex:"c7209755b92bff93a059db79883b2866b51bae337aeec9e58c87e68de33545fa20870e5e70a190f6":hex:"34aee961eccf0b92b833f2448720bdc9":hex:"":hex:"":hex:"":hex:"285692468053547638e65dfb7c8b69aac43e16be5a4ce9898ae0d0c8f567dc27945ef6e21f36d456ca248577829b90f96a887f96e9c2a6ff2616e21c7ec93093d68f60d2cb99f2c7632f856e33ea8ff4"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #9
depends_on:0
4:exp:0:hex:"1ceecebbc42f9ea1faf7494076f7937ba827b4666d0433ecc028ee75d4f55de2b223e92625e399ad":hex:"b431a36c996ccdb5e936da7ebd216c20":hex:"":hex:"":hex:"":hex:"64d4bacdf185dd8f6eba35dc8f79fa2cab155113e020d1f12b32bbc4bfb9c85881692a5d8933a40d9fe8f6629f74bba8a99e8db0228a13c8d7776459f73dba8e59e9820ae72f8c425ac3044079c1ebfc"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #10
depends_on:0
4:exp:0:hex:"d5b264cec1c7acd78b902dc14a457d30b79acd3e06a12f57cf0c3e1b8fb1befb5abb9af1f58cc9ee":hex:"12e4101d6d4505cd43710b05d52a9194":hex:"":hex:"":hex:"":hex:"b53d3bbf4a9561904ad9e100b2601db2660f415fc5caebbb1a628b7095e6de4a3895ac5da6f2c1e1c6655d76fa5b8f75f52de41564d79b09c9d2c76c1c486f462a7164ecd76f0dfa7b5f53c0c25b7730"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #11
depends_on:0
4:exp:0:hex:"f440671bcbbb1bdafb22c06482ff670374cdbd69535d07980f43cfaf10aad2453d884ce5852dbb32":hex:"8a69144ebeca59c330c9a4e0e644a7ab":hex:"":hex:"":hex:"":hex:"a5b42447f4d02504536df9e0ca8d98642a21b64a6b84bde4b2bc186c28b0f740ebdf2d60c664d4d89a867207bb8d4c62f1745cb3c971b4b2622423a4291e1cc97fce7128e3ecb3ec13ce08987f59b77c"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #12
depends_on:0
4:exp:0:hex:"bef3995f0d2b1051554cf7b3235809fcd2989cafbad081630c538a7ba0695ffd95f3abeabf2a867d":hex:"e807cfc52494119188f86bfea878f2cd":hex:"":hex:"":hex:"":hex:"527bca6b945db8f2cda7f795763eb5767cfa1a4195a9d9ae70dd8129158138e687a056b64f00d29e11c37a9740d19fbd16429ce4dae79029018b984a22c1a2b2b988558b133651234b35f21ff42edcb2"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #13
depends_on:0
4:exp:0:hex:"5fc1cea988adf1f7c090b14370ce169300a008a687475c464eab4611cbf3ea5583a967ef0c0ee2e7":hex:"7fed039d998bbfa3ad62aab86c176d6a":hex:"":hex:"":hex:"":hex:"f096f7f631882f5e5a6e708d71534c19eea20a57fc210155d49fe9b872b18cc04a73cb652a03ecfa0c6dfbc174811efd0897f4bd92c916a5c835bdfb5e126048f7c17daf00a845ff024641499047097d"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 0) #14
depends_on:0
4:exp:0:hex:"9c88099af48f9053abec455b7bbb015364fd593a0f40175d9d7b6301d86b259606fbca7de73ce63a":hex:"79e501b77f967a676fe398eb7c81cdde":hex:"":hex:"":hex:"":hex:"e8d53bd119d23cc57245a8b9b2d111811dc661555e389180e367e41f8c815ab4e7aaf5a238479117402ba17ea41c1104f475e11bb97cdc414409ac516b3b28b62f284c7d4093975279d3c31320c61061"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #0
depends_on:0
4:exp:0:hex:"03e7b41c95818eb0b667bfa8a175a82466a1e417a9b6b92fd17e98c2e50ee0db00d25c3364451e95":hex:"126dded5eb0bc81be37c10bcd9d5f793":hex:"dc596d188e2343802240bc7f5cc60516":hex:"14c8ec10f5bdde6b9e75898d7f9f03d0":hex:"31aa842afcc1daa94098241a87d6ddfc":hex:"4739b1bcf87404a2290829bd7a61f0b391a794c71c055c7cc513b28dcb5fdc88645bc9cb490f41fab134c6b33ce9336571762754343961de671b02a47960b4b4e23c5bfb87dcc19b260b3bcb921ae325"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #1
depends_on:0
4:exp:0:hex:"5810043ca63ef5e573e118abd09d5e9caa873d3a2a2a1c7eb574167bab56e4d1ab5c1725421be3aa":hex:"0ef00fe3e9126bc53dd61b8d2cb9a2a4":hex:"4e19f01001d1f550ce0dd0bd4cd3e216":hex:"684183426fb6d102f8e2ce55c599b740":hex:"1a80710e25c78cafb81cc119adb0a2f9":hex:"eb4c7059612d0ab63c0f28ceb7b8f89760c3d2b508f98441412bbe0ac133cafa7e2981ac2750272ebe503622b477c67e86930c9198fe21f7288394b2e11a5302e3db03b59780c49907ef720199ea1362"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #2
depends_on:0
4:exp:0:hex:"c27d1abc5afd30a3025d42bf9efeb8a6f2608470db9a90f8ec4ad2a126b799402ec8a1f210d708d1":hex:"804004607012ed7b40ff0ad8f5ca085c":hex:"eb2393df0be0ff471d354343c43bf2ea":hex:"92618320cace6c075dcd69a634e76666":hex:"da54736df5d2e0daef664e905864cc1b":hex:"eeff317050aa3bda57bdfef2d46408b3fb2e64d34d4696254c9d8a09fa1b325bb3e3a973efe7918eb03489865f5e13e9a28a0bbb43822b9ca3b209ccaa1cd5bfa5139fe59e16248e1f468f944a0228cd"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #3
depends_on:0
4:exp:0:hex:"3f34680939ba128c07c5dc5aa161a8703a45440ca68c8d5c2b706e7af101ae4a669b46dfa262ada2":hex:"e423dd11cf92c537509499eb891ef5f3":hex:"cd32c88c56858cc5f6d39199abaf4543":hex:"2b24bc6db1ece7a32cfe57df3f6ff74c":hex:"3c6dc6fb353ce7e131f8d09635465d2b":hex:"9dce0b5b3c8201c98f54501afce1595eaaa6e3e6b89abb6f6112b5bd5d1fcf549bd13e51fee87f0aab345571cfe7d7b61069660bd8cb8ea33406b6026ba28d02457e2bd3ecbe836829a4d91481fc0f75"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #4
depends_on:0
4:exp:0:hex:"94b31b718bc40b28cc5a67ea5e891c14e1683d0e243c4868db7a613beadf1433550003dcedbd227c":hex:"5dd27ab3ea94ac5c04f4f8c13c767354":hex:"fe1fbaabe7a2bdf4ffdcfac0e7e214e4":hex:"d71d9f2a6887681bef91f5c1aaca50b8":hex:"06cfc99087437ab7754c5d626ba07083":hex:"4186f2a9518371d123473a4c96d23a44c89af9bafe17eb2ea702902b5a955a42b05188b8daf7ec7baee352b365f46a3b880810af5c9678df5503b5e2cf9d02897be81e409145c0cdbfb83949ef327f4f"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #5
depends_on:0
4:exp:0:hex:"6b90e0e1496de9735239ab6ec28766669c65e1a4bc0f5c04e446388a90d86a1f060ad436666204fa":hex:"99455a5df2b13410dcb912f37c266093":hex:"a47f245fa6f0d928c17ed8956d1535a6":hex:"a88cdbf82362f1a2ea78ef5bbcbec7f2":hex:"eb8da8a49c4917d71df7facd8e9399c4":hex:"99b09a0bf4d00539f7c1f3c28b60cd86b47a33961da7a649e810a97c1388bbd712c6eb0f7df4b68cccc01b25defbec42b67f4a341c0460e7b20ab67abb34cc2a3ce5b5d7d06a186f48d95a7607ba0510"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #6
depends_on:0
4:exp:0:hex:"05474cf1bfa15e12bbea7cfa9852d152ea29f8442291c64a8c9dda22ca653f755d5a5f128972d4a5":hex:"70d00e37a88b30c450580eaed5d4d60b":hex:"651f8ad6d3ed2bf04262dc79ecf164a3":hex:"3e693ddf993d63cd4c9d464f2c84c8a1":hex:"53db0c0c12363bab7b1ed57d420998ac":hex:"590e747956e6d01eadd1c9b7b1387bfb5c20693dac84f70e2c2931459b3ca9534325d84eeef1b245d17b8cd059e05a3bf998ffb517feba0b047553633dad642e8cce5c4b7110bf57aa6416edd204f780"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #7
depends_on:0
4:exp:0:hex:"7e9a4732f5841617395ee04ade213b80785d2e4fef267d51fe13973b675bfac30716d753cf2f6232":hex:"0e725f5e2e3f5b9cb5ec36c4a4f99e0a":hex:"02592ab8e4e2096733e6b300eac278ca":hex:"2f3f8e2504bfe008aa1fee1150b47f05":hex:"2491177e84e06c3c6b48235b29c316c4":hex:"ca50da0839de54bd9fec1a4b1d6edba1e68b47970adc36fbf88e7757af6962d9b8ead266f8aad696f920a1bfc702d8ca43c4504cfa42d7a603a55fa524c62fe49e698f21eda7025c9b840ec1b9795066"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #8
depends_on:0
4:exp:0:hex:"fc16d69df6254a9b7743ca43a64e9d1f5986d771b6cb069a65484fb4311a80479a4d00a42ce16cd6":hex:"82fdba5fb4c04bd550eb5a8e2e4b0a31":hex:"998b27a8e314b99b4ca06593bf9d4a17":hex:"b97706d6068cbf8df35b28a2bcba3b55":hex:"c24e22cf478a61f1adf5beece947e16a":hex:"29573d54e80e43625024d149e6ea55cce5728bb456e86b75175d38ad95aeb4ae5c47270ae774374ca44e2230c5d1861ff954f9fd432a5e8367abe49a88ed8eda504b991747ea9c4cf448ba504cb7de14"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #9
depends_on:0
4:exp:0:hex:"e917537e534f9433e40f8271a799f859524ce9bb84a53caaf9eea9984d8ebff701eb7c5f627074bf":hex:"682088f3ce89ee635f5c8ec25ea8c8c8":hex:"085a9d20a2d017c4d3e57d20cba52714":hex:"b07122c8eeb299295858a2fd1d3b6098":hex:"1637261b4b3e7761b5923048a46d1eb0":hex:"be40786139aa3966fcb85198d861f5239cbf8886ae8e814571217dd4454c8646c4c8428558ee3d80c5297add64d6d1a991c4fdcd72cf42f82d73a89b8bd2364cd119821b1bf54f69acd01a7586c53925"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #10
depends_on:0
4:exp:0:hex:"85ed8611ac58af2d6b878ebca74256d3f2f20a7a4f174822de6ea8d0cd0bdf18d395785f0797d371":hex:"f2612085c5d8338c9b77b9b1eb8092af":hex:"f414629fe7ae0a21b211e09fb66512b9":hex:"b943191d1882a390032339bdefd19351":hex:"4adac9816998cb105d1c4f7cd3d53764":hex:"dd79426f61e81d86561a98853b7e187eff7db3e8958944cc10a74e7b12db3b08bb4436bf64694c5b8bf1857e791ae7194554aef6b48d2b33ad6854bd2e9771bbea3e08c2c083a82cb07d7242ce22db2d"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #11
depends_on:0
4:exp:0:hex:"6652b1c0403ef16416db88e49456119115d3901cd7dce343c718324222094c25d85c33857daf5b28":hex:"a580613da8ff7b06580db9a42bc0cdbb":hex:"923014039cd117f924900cd330607d0d":hex:"8b42f93d2ccdfea272f7a03bf37b831d":hex:"28ce97668d6cc92da8ee25077cb25de9":hex:"d31dd59237b3c8b2885838840261727ac116bae673b554fe9c8b0c64b1573a25bc4a14c1942d80563fb4165c57e1aef5c94c1f6b1f88ec6bb2bbc10ccd8149d175e4965d07341aba06a9426df0d0fee3"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #12
depends_on:0
4:exp:0:hex:"f297186aab4f63f6fb85c4f29d659d6e48fab200424d67dd52fcacfe725ad65c0a47de25690c0ac5":hex:"9414f702fd050f7edb9a648cd833f8c9":hex:"91d5eb7962ec1051004041f5d23ffc34":hex:"94afc7023650c2edcd8c957e320b04f0":hex:"b6b79df82780297261e00ef05389b693":hex:"ebbdde904350c6d803fe258a3aa7a63622f2e9540f03b1cf687e20ef35fc5ba6b616254710cd4515eaf69abfba0ba778b87e4ce1f9f1fef34402c6e8d23efbdeb7da53a3db733e69527d36f24000251c"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #13
depends_on:0
4:exp:0:hex:"90899d2da97759cc609f956f5f391a0edbb422f45afa0c7274a2ef5da636fec70c6d926b2670b88d":hex:"23261c0e7226d749a0d7d0166e92dae9":hex:"8ea2e411827c5d8b54b24da8ab41a841":hex:"b9ee1c9923240523e7e4745ef93581bb":hex:"bb0f785972cf68222a5eff4c7dd3e28e":hex:"2af35b1fba0c62aae991c12d50c86ce2cc633224b158b157459c41a5444072e918b4c777bfc84f8000aa238a46c5d5258057866f2484971d2708c33497191a2686f8ee9e3657616e00dfca61e0ffb8ff"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-1, 128, 128) #14
depends_on:0
4:exp:0:hex:"4e8227e8422d674cdb79e52cc30b7b84f81cc05b03339704dba3e731fc81949e679a4257c5fd68a7":hex:"2d6e4af02acaf230bf746157ec624ba7":hex:"deebb368a79c1788528b589056b1194b":hex:"1dbbc7a131e98344fd748edc6fec11a0":hex:"0266e8a066dcabaf6991c7a91e1c6e56":hex:"e51fc833a60b099e56996a66820368f5332822c8f9dffe8459c80d2512d451e1669ecf6e562a1c295fa6981fa651fdd3d8d936c18f88d5844393a2a371aaac8f485cfe92926f1a54980500edc43a0a6c"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #0
depends_on:1
4:exp:1:hex:"09effa3906a5e93d05530edc71e62b39c5e4da020537176c23823da52dbdbae8307656cdaf8f861471dba14533c880505874098917e338f20ef8d8a1":hex:"":hex:"":hex:"":hex:"":hex:"d5de8a3388b11e45085f6d9a009462947631c4e74523080ccd03a0196aa56b63a93a2939f490e9456e9fce3e9000e58190991b9aed6d145ac18f65cf2b1c17eb021acc5256eb6a7e9023f62aed87d15ea4e4b328f265cc34adbc062d54524365cc9c5073a8371f35dc2f459e1d027515"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #1
depends_on:1
4:exp:1:hex:"29a7071e686936e60c392061f71b68500dd6f11c563732fca9dec3b2f859e06a857fd94e3ca1817872d94c2b7c2f283a0d2d12a6443e95f7e700a910":hex:"":hex:"":hex:"":hex:"":hex:"72c0f3cb7792bfebbc1ee6f65d40d118a6a1c4e04e589c8f70273b4c7b718c9df383658572b894838a311fc0aa2aa6258758b33783e192b0c3c1d322809375dc925a05605fed8c7e8fb878fb63c84ce639fd277d9955f91602a9f4777b7c3b15404c4e761ec8d466674e32136c7b8bdb"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #2
depends_on:1
4:exp:1:hex:"abd3dafc85b23025792bcdaf9f410829d3201c1e8ca450e217e13ec2e3b744e8c54107174a6e69ad05f643ee5cec49cd47ea88c80b96a0944154b458":hex:"":hex:"":hex:"":hex:"":hex:"152333e16b04283dfb8c43dbb3be43b5db2ec49a399facb65cebdf7ca3ed267792ba308cdb0649b0c19cb1126b144d5766b5afeca98036a1f85cd2cfe3b8071011b69b2aec382f8562d9dd4331a554f3a3ee632cff308488b30a7416be8bbdee7e250cd12f371d069a097e9eac43031a"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #3
depends_on:1
4:exp:1:hex:"caa286c160d22af10922ee6088c269d0c963034e5fd2a85d2fc171d0c4ba0833b630a64ab09965f132a744656631bf2dd27430c7c2d1e59cdcf43a97":hex:"":hex:"":hex:"":hex:"":hex:"4d6132b9ce70470dd36f551584ada639e74b85fb9bd3c3e350011d99f2dc0371f874e6b9d92eba3fceafe34e574c1441d0d476c475b704755a28733e31637962cae67e849bed18d77501383cdbc27ab6f60d5d8d26634ef39e2c60fcbb04a9bdda8bcfb9b2d3aeec12a21279ed553343"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #4
depends_on:1
4:exp:1:hex:"f79156a2321ba930e15109501ead80a3b26c1747b7a9aeb922d1a9d474df64a1fc3483f10e88a7fcdde91dc06940c58bf4d747b5a9cd8cad2c2e9870":hex:"":hex:"":hex:"":hex:"":hex:"1b3aeaff973b2e20cee947ff283277991842a22f45cce9d22c1705daa51a56ab43aaae1b51bad7a7363edc7b548a0cec6b376b925a6e35bc7dc3b4a33a7f3b57d66b1b35256908bd2d8f0495caf2539ba4475d766c21c2c2e4acff87fefb07c662eb344d9c99ed407165f8a09a22816a"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #5
depends_on:1
4:exp:1:hex:"2dfeb70fc433426e23378d048b836f899cbff52d4a92c6d7d218e3aa54c06793339a752f86f03b7fcf89bef725339f16ab1cd28ec85c20594bbdf3be":hex:"":hex:"":hex:"":hex:"":hex:"d403dd8a6f3a914933253db9cd043421e54243a34043f5ee11a3b6a627e25d944434eac22a00172caa607ebf7de55b4c4305c2b93428d5fb4cf0a649451ec7fc5da65c4894cf4d2f3d52e90993544237e5c58745441c9cb2e047513ff81d9cf980d8b12769c21cc8c06f6d583b8be3dd"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #6
depends_on:1
4:exp:1:hex:"2c6ba987bb61c4131138bb8acd877763c2c7e1f86289a81b6b54d1d8b399b5a5ac7171c0c9c0b5943bd7f54bf72b20307834e971bb637b351a756823":hex:"":hex:"":hex:"":hex:"":hex:"7ff01def84626825fc22a62cfe28f5f95403bb2618eff22529b6531aaf1032100944d5f9703496d165c5756c0aac55b1812a72940aa5317fb6a2944d124e7f65766f231b6bda06100c5ad0d1b37c488e0e9f11a6d8f7e4cf7337e04d094ea9de2db1bbecf40e0cc8d1fc1cf5a01cd081"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #7
depends_on:1
4:exp:1:hex:"ba08acc3a00b9b40d2bad8cca4909d3bbec5471f78d0bf89a805d839b8b29fb753c9e5d3674365a7055a187a238ea1cd04f482d24d856b67eb54d71a":hex:"":hex:"":hex:"":hex:"":hex:"9ec6ad840270051313c5825295a6f7527a8b1b9b3e7c867e5642a984b11911be60614e5737d3a0d109eea4223f0d2ee63cb19be702291a771b2e2c277f2d4559176fc5adccea52492e3d3ba7d17bad5b5f487d783639467997d7668ce2173ef777f9e31dbecb6ee716b5cedc8bc5098a"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #8
depends_on:1
4:exp:1:hex:"95413345228eadb85b67674b9981af34bd6a4ae04866229921be928c06e6a6a6fde8d31a6a88f24d6a1114ccbe08ded9d7c50c3360bcb8908a615381":hex:"":hex:"":hex:"":hex:"":hex:"d4dc08e36f94e88f8bfb1919c13186139591edc681affb61c421d32dfda69e507d59495bcadd39b73c4036ef440dc598e339473caba60e0770ac4729264b1dbfdaf32ca6d136ef6810a6660fa5cbac91940a28053c0fa405c7b6ca5e3f147b5e0096f36b67da9fce64247cfdaad70fc0"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #9
depends_on:1
4:exp:1:hex:"9b6bb9589f41e8ed6969dbf1a3b3d242dd5e133711f72549334c74190e4efb1d0452016ed4fffca9561aaf219e6793bfb6fd3dd9500bd61e6a62db66":hex:"":hex:"":hex:"":hex:"":hex:"cee02e4fe0980afe6ccbb1b0d80041ba9841461397494f0fae5188228fbe9822e3ffc5397b7caa29950d95536e7000e1249e5bb93a593e659a49689add16d2f5e02ff251c76716dc426010c2961a176bd63c29397f6e36cd4de2f2b11e1260b9f9a00bd49b4b6617fb056b82c92c471d"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #10
depends_on:1
4:exp:1:hex:"f276ba0da08274a082f3b8ad989a713908873b742f96bbbf8c81b4e1a7e4857bc99aeceabe534c45105306b14860883cd56f2438a7812b43f0d911f7":hex:"":hex:"":hex:"":hex:"":hex:"24dd3eea9a8e1f9929ebbbc2a68379caec77fb42531a97f7f3a75d16ad053799ffc25cace4f4553c271ae360eca1f5131ef87bf0390b26785880db0d92bb351e6e22409d600f6dab5cbb2278b8784e67a40be4d8ea6d994115c67b7224d721d1b3c7fc5b24e15f97eb3bbe33798d1bb8"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #11
depends_on:1
4:exp:1:hex:"fa5ed9189f21d7e94764bddeff23050112868cfe35220b863e8112f691c57e6d6c4a91c752c5f0b37b97d5f3e383480054877f319a568b064e6562a4":hex:"":hex:"":hex:"":hex:"":hex:"55eb5ef1248b5a34c741f2076ea5d568da630ce4720b7e2c86a9dd535b48faece2229866a36024fd4114249be4730e554b772d557ce3f8b9d4d86d91202582213a676a076b87f941351c7606a452816db5d0f8194825d402d2fe7ebb2815532091b3830a9616918bb0e3298faf037bf6"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #12
depends_on:1
4:exp:1:hex:"d0c5003a6168163f707b25191b51211dc1ae361df1e069d0f284f66967aca4199809dc89368164213ae17285674e5574851582372fcae8cd2733bf4a":hex:"":hex:"":hex:"":hex:"":hex:"24910e1a9304471d053af458bc3fdef527e8796e33133f5af005106b203e8fdefb274f1c0e8ff44e92c63bef3082c6e5607a7981a6076f1a1d15368f4330c7012509d5f61b4349224a87960bce9873725145f187aa931394c449f502d12b60655a0ab2a221134a51786c3683f9ffa2b2"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #13
depends_on:1
4:exp:1:hex:"bf5b5d1c891f7a6f2dd3f4d486d693fbf67f49584b7f053aa96ddacd9fc0cdea0fab8209d8f4335820ce68bfa04899b63cda15242e9cd3f7acb1f103":hex:"":hex:"":hex:"":hex:"":hex:"710c8b33ab034b50a29de657b93f3c71df4727a5219a474350c88b4e3974ffd0d3452e8c4d26f579e348f39cfe0d20045a70a866c5e16a0c22aa0d69b739f74cbe8b046bc14cf82b86498460bfb26af0771371c2750f7c59320c6f6fe1d04cfb40c048686b6c1b69dc641b8957c2c341"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 0) #14
depends_on:1
4:exp:1:hex:"525615164dce0dac5397b357546aad049dbe5982da2c215a233557553460f8505a3e7c8224af561190099ee21a06d62f9f00e282b32b486e8d0e338f":hex:"":hex:"":hex:"":hex:"":hex:"3fe96c9b10c4c8e43cf3cd76ced4ad85ae576f32ea6671ef284f7c97491b72152a18a1060145e4f5e7c0c373c396cb4c8c0b6d625c1f0d2ae95b0691cb1c80a3dd5eaa21632a82aaa28e09a2bbdeff7fd8812fae46deae14bbb16da24d06878fc417b3554fb47b0ef9fe18d1b9d4f4ca"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #0
depends_on:1
4:exp:1:hex:"ca81953d50430bfb09537a318a1a7b90a9200077abb721e55d9ac28946fbf75d9cebc81f11cf6d4db712a3b91d479e00ba30d736a763cbfe40b91448":hex:"":hex:"e50aa8bec96339cf2608bb82cf038d5fd6bf93e65271cb72":hex:"5c5eed0d98c7fc7eb30acddfee002d5b99c965949d4e2095":hex:"a1a7cbc79bfaf4571cd8020da094118d241b3f018ec823ba":hex:"c8b7d9c15624ae018a8612edf6444354c45c6a788272281c16526c689a3dac36679e44d89c4acd7eb58ff40a577c3d1a9f4d0175feef9ac5674c115d5e4cd17f2369e0135e33b018bdc99e4099713ace986a145ef55e868f74846feb3592d44ca3ebba6044a928e9284b5ea75063ae81"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #1
depends_on:1
4:exp:1:hex:"b96ca1202fa959ef55a683a9021068e14c75376e15d1f0394b1c091a8b6dd6b98b6f63747dae58c29186179b4155b868f5a81ca206a5086a5759b025":hex:"":hex:"a35096086c1fdeb1fb60dd84fa730eccedd53e5b127eecf9":hex:"a3269fa749e55850d4aa9e466bced0beab2edf86b926c2ae":hex:"29f6799f7c78fdfa2d0dbdde8381aec5af249556903f6313":hex:"c63ea73e1ddc9d55bd64a63cf73f730136ab4f6d688a9cd56b945f9875ef4ff48cdbdd8b78b898486a685d8af8cccbc2a834a9804e566ee7138c7dbf488d263fbd387041f835ea46ad27cbd66721428ed5795f6ed044cdb17c8e7e3ecbf61dd68239e8fd644ae85776050afbaa06caf7"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #2
depends_on:1
4:exp:1:hex:"59af1213cfcaeea29e31400ab6b30f108d4a9a77d3b370972d29032cdc612b7c360c41f16b0c9d794219300fe0551e0e66d634a4eec396c50ec9604c":hex:"":hex:"66ed9352bed73224d35508754aab68fcea10aac06d60e888":hex:"198a3526a67a0ce31ad0348bbdfecede4f82d4203d1d5ca1":hex:"03faa2f4c34577cd8b2ed53e10c68c83c1ebc8d877379178":hex:"5e24f1a9083f13274ed1020ab6935222cca644d0920839c2b142e2780983204453d2e6c58518cb351188bc3e5e3b64015882130d745511f004cfb6b64831139e01ae5bba64b74f1a1ede7e220a6d29b1067d7c68ba3543f4dda2fc97a3dd23590c2c18b85662618462ba2c05231534b6"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #3
depends_on:1
4:exp:1:hex:"e6cc94c72f37999f28b5fe350bff622b433ae19111786c747d954adaecba47abacfea8cdf5eab05e2f750c0a679cfb9c2c2c071461178a054af40967":hex:"":hex:"3032528703dd66e42c7b6b5881483eca41e9eea503852eda":hex:"ce8c03b0a05982ceadb516b1fe513da2403a9e6dcd7a39f0":hex:"3f7ccb55376f23dfac1dc13be617894931f9c13d15fd3dcb":hex:"558656cad7da2ad87a7a29ec5e612addcca96d72ac7b224cde80ce386c6efda12113fe9aa8e511714a42edab53ea0289c75d34b42f2313ac366f51f5dd3f6968bbd4c09ebf840dfd03852dedc1e3b6209d932889cb04062c644482106cf8b7a237d2937840f0c4d752d52725b5590d15"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #4
depends_on:1
4:exp:1:hex:"cd4dcc8fb50672611f19e0cc8adcf9285f9d76e7e28bcac34e931163f8057b9f86424e5d514a13c0a25bbb49ee485501ec5e21061e006ad1569d2610":hex:"":hex:"24480094a44067b86ef47db38ec3e62914351196358bd9d7":hex:"c6ac3b879adb6c150a8ee44428c333574ed9b0d6806848d8":hex:"92bdc1514d87daaa321655d56c6302878c2bde37700163e8":hex:"21c51a1568aafb56af1fd424f6fa146113d14d6d63e1a24e3168130ebc10dd84925bc4077c41897aa8b3c73aeb5bcf392d496dedcb6487379bfb3e12bc07fcf5c196d59fcc1fa730e55c00edaa2bca7b1e32a40ba06500ed3dd7fcab361995319979a0fa9cdc406a4d20650814e8bfac"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #5
depends_on:1
4:exp:1:hex:"fdca0039e8485a06e6a9afbde5b07a1bbe49e13659a2164034289639d23dcf3f9874b8fb1a1af8495b6b2129b88475cc529c96271bc1bbb5c7c2ea03":hex:"":hex:"841f765ed5f00be838a270730ce5926659cd7cd9d5b93ca5":hex:"825fa13ed554973768aab55917cc880183c3ebb33a532305":hex:"736e9de931198dd1c5f18a7da3887f685fbfa22b1d6ab638":hex:"dd8596a62847a77da81818dbbeaf0393bd5e135069ba169f8987f01dc756689342cba61d87a79d4bce2311790069d10709c3a53df974c7d6793ae1298253f13ecdbb5680928579b73d73afdcd24a703dc9b391f303d8835ba1129c3d46237ede5e44732a74f8f23b60a3a45ce42f042a"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #6
depends_on:1
4:exp:1:hex:"e246e3f95d89c166768aac69fc95fb49eec49aa633adb938ce1705b68987aeb0fae7f57b7e99e4f3e3e1b1db2d1fedf443bd2618e95193cefd905e1d":hex:"":hex:"130701f88cc1e7545980e6c6f6cc76b0336f089bb66cc347":hex:"95533f4cc247c887d6a7cc0ca753009bf034ba95b7b1d3b2":hex:"464fd16f011eb2986d9982879d79349a3ce4f5905bbfe832":hex:"0d4e6b03af7a648337abec2efa585908af40e88d1f104b3e8c352aa29ac79fe8e448f36b0dfd701a1fc0f1d86dcab7e8a8ecada6ba218d9aaea1c40aa442ca51f3116ced3c9b8ba7546688ed4f3a1378f76b8a29ec763784fc82906dc0f688c5e60d59e6d5284fcd96f361bc5b285465"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #7
depends_on:1
4:exp:1:hex:"cb0405e58270cecb34a9951adeb694c5513c499cf310f6a99985d4fb3973463e907705740e01aed4ca221d4b03ef30e69fd8dbfb4ea919a913800a1a":hex:"":hex:"0b57e688472e9a05baa3920417a2e8f9a9c12555fd0abc00":hex:"cac05f79d9837c97bb39f751792624983c397fd288dd1d95":hex:"344d2aa2b3bad1485429b66606bf215acb0a65bf2a318f6d":hex:"b2a13d75ad389514149763199d711092a9b0e4f1e50809355cfefc1884a94f4d4a50ac5c5da0b4e9bd7537e413bb451fdd2fa77f1f894444cb5c81e4c43978ebfd96900a2c8986c885d0faf89a2ad5c6ef922dfba1b5219b0f3c4ac2095340c3b8bf0db037171b6545741c76217b2aa5"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #8
depends_on:1
4:exp:1:hex:"e38ea7584fea31e48ab085c44f46b4cf68ff24b4a6b0b25867463e4a46ddc9a4de23f7272af1e9c4e0391aa9491ce7cdb5f96292e0d65cb9a9a4a3cc":hex:"":hex:"afe267e1491de3934054b8419b88b16731217eb4ee74c854":hex:"bd0f3c43229a0ffc9e143e16738111e16d6a06ebf3eaa5b0":hex:"23bd14ef8cf797cff7ff787df8ed8b87684fe7a9a33bf695":hex:"c27a6ee5bab8f8e93783840e72894f3b024c7d3206a4a1869ce6fa8b5674bcbd24d4aab30f9866d797d850423c57684b7697913b9ef7bc0be933d0e21535bd50fea0feeb293985261fb9d4eb1ef97ab5ec6b691a08db4c8171e63745d14fb4c3a03c41f906daaa2877b7622b254f0449"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #9
depends_on:1
4:exp:1:hex:"71dc625242dcb94e6ba2bd013beb2112cfca576774e102830503b7aeda24c2c9d862f5212975ccc019ad2ea0442595f74d1d37dbcba0719d8ea32ba1":hex:"":hex:"0fef9f0934bb4485bfab2431f8811d963ec7fa7953ffc213":hex:"a6a7501c4a5a93c396ef8cc969ebd93cac1c30b4783a0617":hex:"c58ea233f35a22fd9b01592c6026aa17922070b3604c7118":hex:"a1452d85799b54370cff65fd6dd74b575199606cc8fa64880b26972c913c372010b4c3f4ce9b7b565a8f5305072404c7b9d70f7aef6e2709c1694eefae66ffa80f16eb4b91f8041f4487427e69daa437e183e83d3b9718ba6a23fb90365884899e0d2f0bef56b27249f65e1c00c5411a"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #10
depends_on:1
4:exp:1:hex:"36c1e048d16f9d6035c6b62515afb929633f356fed6a654282663e2284fd4132116d21eef66d29629bc712965d960f18cf3f7dcbf8a3ccd61b5b5fb5":hex:"":hex:"93bb372b7ae1035de6f13b2a36c3ae5682b9a3ea8f444383":hex:"9715b72e4755993762e11a93857f1d50a051e70d094339a5":hex:"2f1e73945863b237f49d6d20d0999a0203f295b9a046dca2":hex:"ca135891b47f27c26ac891df49c80d085f90c13d236a60f1372eefd81eafc5819f4ae5aee5b32d46681be01629b078ae965f67b81a5268ef0b303d09e048f4449f5aaa11af51f80151b4697b13700930167cdcb3b6e8260eeb8bec7f6a67a2050a6ea569c825d61d4858a1cd15f70fb3"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #11
depends_on:1
4:exp:1:hex:"582425e13356e7a840cae9fa435b220af6a96fb53ac91e7ee22023cf6a0eef3923907883ae540be816e0631c894520b86e8c6adb8152e55cb6aed5ad":hex:"":hex:"227762e137f9eec6d2b3c63476b404dc5b0c68613a93034a":hex:"fba72c01a9e51c93ac00c1232c717d32fd4d4c791556e716":hex:"f5258bf318457769a93ef5b3ba95fa2753ad1c5c1b81a785":hex:"c753a84ba7f41af2ab757ac1e4c9c450d2112767ff55a9af8f58edc05c2adcaef7b5bf696e5c64f71d5685593f254a87625065ee0df51ab4f7bba38faf5799c567d783fa047957f3f965571a7b4cb477566d1c434d6b2e22ae16fdf473a6c03057d934a7e25f0ea3537be97238d74bc4"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #12
depends_on:1
4:exp:1:hex:"836f5d7521f26d884dc34af2ca56ab4a752ea18b909085a87cb6d07dba32b654390a25b68ea7ba8fb790271c712f387145052ca46cb40534355c1666":hex:"":hex:"99d9aec334666d7c399e453455ef6ae884c2173e12e31cf2":hex:"d74d20dc22c55c35f0b66a464dfbe8f349616916fc726298":hex:"407b0951404079fb3b54559c0286143d9cb18957bed7fb1d":hex:"809f372d1af60ff972049193fe9f173684a2fc9828b60b32164c1b6738e1ba6aa12cf739287a74c6ad528a3ec00095b590b44705b4975236a0b7ea02c1213f0e830f275f53bb79efd98679c4766cad27738e6fb777e98cdd606b971fa60745289d5ef72a99e1919686a53a241fe36cf0"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #13
depends_on:1
4:exp:1:hex:"e555ed6c7ab344fea68d73c6432e4e6da2e67d8b33ab79e5719a2def258a852d17d93212840583fe23900949c301a29fc92095f4716018144e64583b":hex:"":hex:"5262cccd138256fa8424801435d118f39b9aa1db4d11ca9f":hex:"9b55d76b743bd7fc5700fde8ffca956c0ed6091df1a22aed":hex:"f8c99af8029110c41a6a01fd2d3d12b7103aa39cbeea90c8":hex:"d1ec06e38af7c6e0a70b73ac62bc3556183f99a47bfea0f0c4a59e7ba4b0718df5438e369ba14be84db40d5ffe8a1a5952edfb83f61ee4d984e3d2fa67f557aacc58291cc688fa29be530e66c228e68607e25c013473b4ffbcfeda721ee35f5dfc8809528eaddad8969ce719a411216f"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 0, 192) #14
depends_on:1
4:exp:1:hex:"12f2cabd3b6f640daaf27ed6cf6bd7d06e2ac372733c6971739e36afe2ba1ebf4e7e5e9f5591480e3fae752fa59bb99a1949bdeccf0c100f6afe886d":hex:"":hex:"7766c36e6583cc8e3c26a8058fa0923bfeb3ee22033f46c0":hex:"63e60d1bba9aa29adc3f3b8a5db53f3b703c7ae69bcbc2f7":hex:"f416f36717ba5f0a78125ca52ccd004b2f4f2dcdd401f595":hex:"6196b2b4adff14a26d64f440b6c160210266d7f5b77d5e292e94b8c67bd9cc774274741e7c0c9a7ab21c31f1194ef4218ddcbbe94059042d22ef44ecfecef214a73db64505d46d5493d7475d0684fc0e431c5265c12b35310d4404b3c4db6029facbaec88b0c0ae9799e5af0aa49e842"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #0
depends_on:1
4:exp:1:hex:"2c50da90a1f7987d5216950ea22689584b237647d96c1239f9251942f4d13d16f418b0cf7265b91c4ad97a7acbbda065a48bc1bc5c7a9ee1523c50e3":hex:"a74c108fe870b91a2defa971fa1efcb7a209f293d29bb5ea":hex:"":hex:"":hex:"":hex:"8853eb47c4ada94a3d58a1b517784bccc8f831d02dd5239c740fd7caa3869c5ff7bbf522a78be2d510c49c496a6657a09f0ede00daee9fd77061b0f04e7342518dc6ec1f4a7ff99dd7c783882b58f5e8bc467516c6b85985fab65c6761d4fe756ffc27fd62cfb92778391a258d3b0b0e"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #1
depends_on:1
4:exp:1:hex:"4606e3e19a8a53e8aba05d9d1fda1ddf15e7709aa2bae8b54efc4a14e734b45a5cbbad00a749d2bde540258de74ff8fe886d05570300af2086d0b9a2":hex:"23ef5fbde4b270c084a745e0e299a5eba228a37074fd4f07":hex:"":hex:"":hex:"":hex:"8caf86df25de5cbc3749fee4b64fe041cf4ef2859e20704bb01abe126a90ead8cffc427c2f98aac400aab97184846125a2a66888dea9c8aa108e96e03b05bbd30e566fb90c661dc1990ebfe75f73f5b0de7be419c225bfcba3713805455dffbe5d6fcc98141743b59c2cbd70e78f5977"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #2
depends_on:1
4:exp:1:hex:"08e2e2175fb34e4111179fc2580c05afa16d224440cc7eff24082beb16133a992fc4f4e2762634fbf68177dc3f11c4d057b71661ade56e7768ab9e6b":hex:"0a4af33e2501ba409b132459ba97603888e727aca0a0cee0":hex:"":hex:"":hex:"":hex:"39c60b6d9f85cb69b2128bde86aca2b055e21ffd7716d789f834ecacc69a043893b09459991793571d3d8070f03382a11bd1c1bf38e86fae13a932c6dc82c540fab8c8eff478e598d3295663ab75ee8a56376c0d607fe43b74ac39479b8f694a3a13826b1b96344ec67b9eb0a5858eec"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #3
depends_on:1
4:exp:1:hex:"b436ebeda1119de3fb2b2e532f7ebf59fac632a4d784d904f844bb73f2cade5a88d4790c8c1d5973fc73f6b7f929303b62d30b6818a25ddf705bdb9e":hex:"07de5589726c49dc5a764de9b41bce74675e4ca3c71769a6":hex:"":hex:"":hex:"":hex:"2099fc754ecd19a19de8afd21d2ae2ce456c32d6ce7772a98e37ed47f54001f44fad8e9b591a70d3bb28f19bca22940321ba17c33193613b7b5be1ec54efa470b70cbd6be2931193c35cc73d80c139bb4e670e1a2cb74d3bedd3610e9d0f9d154372a70b608fef824c346fb16241b301"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #4
depends_on:1
4:exp:1:hex:"4d3e993c296c66983b9c751d2c0aa2d519f801a764ac9f1fd8d86b57eb226bdd9f69efd9ad29bf16af483e7dc170f8af65c16426c2ab7c0fa9df0175":hex:"52ae4cfe985348408d3678d60259a78369aac02953911e74":hex:"":hex:"":hex:"":hex:"bead2cfc29315133e6f5ba2e85bd7778dcf9908081032ee634f90b0124ed9371c9009419b9e2a409fe4abd6295cad57cddcb6042986cc98f2fafdff99f7cc1185f3ba0d5f1e5f5452ee5f9df03c0e8a4f8426ca246afafe81079c2f0d165b87056e7c8528e8cccac5f49d0bb5ccfbefc"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #5
depends_on:1
4:exp:1:hex:"c7c4e18c56e9191ba43c967cebe48e55bf9aff4d6449c3e6a1f9846bfd7f92d535bb7386c0155cdc5aa2beec888de0d432f695ec79b1c78841ad941e":hex:"c36a381b1b36e6ab00ea80557b5e7451ec9771101dc22580":hex:"":hex:"":hex:"":hex:"da74b23d309fc7cf7670d7feb6cb6ff4da1b763ae2e8616edeec12c71511f5a24b9c466532283f4151a902ffa5ae211d7c1efa84477b93fc393ac95522f3673f97aa9e379e48d198d5929684875150633fcf8a0918d2050551d8daa91887f3d2685737b6456d0c61c0a117413f193346"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #6
depends_on:1
4:exp:1:hex:"78426f865483ffbcc6330db2ccd65bf8f247706cedf68d4cbcc289bacb1ef32e5caf05f28a21146a9b18e77b3a7ed0d24a0803c9af7264fe4e23d692":hex:"e5026090f9806ff6f158c4a834588f6a39e9b4a44ef2dfa6":hex:"":hex:"":hex:"":hex:"111cd64a9950cc6f20a1b38811fce4a08929ca2654bed66c0cdebab0b81552826c06ef12ce463fc9c91c81a35d2ca0553905922b9a4975fa8fee2c7f9ffa9f2ed8cb2609f4b7d32a44927c7b5baa8f43dda137aba9b49a2b0394f7f67d37b7f71a5e4f4c151db6b96e8e4dd9cd0bd84d"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #7
depends_on:1
4:exp:1:hex:"43ca11d53ad0198e4db5e136de8136bc461851a30ce59521f931ad0596d13365bd8297a68dd42b7dab7f40808b3ce6c12f14d4de741ce451b6637a10":hex:"532b05891fe406ce72421013aceb434581be8a3a13549dfa":hex:"":hex:"":hex:"":hex:"4c42f791dc8322d779f9a1ed9a28b0cf352601a4ef6d74e4e822ee5d9eef06e700314acb7a47dcbb62805babdcfdd236e3022374defd44bbf747764f72fbfccae10893b54b29966aba448435987c22ace4c931d01dc945091860cae7744365bd9b619059b8b646b229878966049cf83f"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #8
depends_on:1
4:exp:1:hex:"ddcb3024b681e30e16e05026d8e23977497fd0b2c0ac24017de2744edcb097d3a104d4e3c6b8adcb554746f9a43671f0692c01a8f89fa98ec3a54ac7":hex:"bd9e41974f6627ac5bbb21ec690eece459e1dcedefb327f9":hex:"":hex:"":hex:"":hex:"741b2a8e82aa3ca9f3a609d05a6e2d570be463ef957f235344cdf9e0f89b3610951aa1ef0b9406785b75e59c2de8349d435e4db82fc2a4a8b94e366f4eb13c432fcf8fac08f0c7fdbe67a44e81706b53b460f78befb8cb6dd2a0ffd13c87df84f8a5197ed47158cee171e5323593df4e"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #9
depends_on:1
4:exp:1:hex:"f81c4ba8605dc14072e2bda2d2ef64e71ad856061056b8d8374fff5a6fd9a54a814fd725bda8944037197492c52c62b97ea02df33325b35b91726839":hex:"217137084f4519d046ec896144cf2c301baf911e1440852e":hex:"":hex:"":hex:"":hex:"14efd71fa13dfbd498bbe13ffa24e646d04ee0ef32c99c11004c3e9d8f748ac2f956f9899a72c8d97ae988d06275855f77a92bc30f1b957dbcfc93fffec3852715c239c5313e765affbed257d302b6d1b74977b8012522b69902adb86efc1ad768d99d657a5375dff720b4cad886877a"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #10
depends_on:1
4:exp:1:hex:"8181fd2cc5f7ae2d4ed2c96b9511aeeef33e50ecf164afc4eddebaf76a96d97bfb40377959e1edc44d24df041749ec6239ff226e40d5a5feccdbeda6":hex:"7d6ca5ab652a37cd79367d84299f1ff2c5a3c2331c77b98e":hex:"":hex:"":hex:"":hex:"5a2cac8110a24e1d8c5f8bff3e82857ec8cfcd469c316fa18b0f65a0d30866e49fed2a228121f50901dbbba561732c4fe82a98f341bbc0a397fd257a5f8a4a9122c991648b1a6507c82f866d26f9b22e0ee7c9a51c4d8e5104f0b4570043c9257bb9dd6f3730f1daf94f80baf8907acb"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #11
depends_on:1
4:exp:1:hex:"a0ad012a978bed2268d05086b823f5d0dc9bb98ee03980d755bce968f9ac81db886a2a05b59df40d8346334a0276b73f528db03a118545acb7f2d70e":hex:"1a8aca3c118f2bc0c2196df81ef22c267d20ed7c607cdae0":hex:"":hex:"":hex:"":hex:"b9dc0eb1e4aeb482dea1b4a5e6f6ef9636366face696811db2d912e9430b303f23ac95d65682694ef9513ac5b3e56a053b2e1a2ffbcb901c375cd122cab47d31fca5a0606daf8cc2e5e6e99b90fc8ab4fa67794caad91985cc92b2187dd2965be0980240d9be2fb1c4bf06e60f58f547"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #12
depends_on:1
4:exp:1:hex:"f28b143468ab87794230cef4361d047236444180d0cfda58cbb9494cd1ad21be96297ff799011042013789a928f18831ffb0169126dd046c774a4fce":hex:"ea7fc50e1eea3d84bffcbf83b240e921348b532e7b33f094":hex:"":hex:"":hex:"":hex:"5c22e92f25acaf98f55ff06e1bd80d382da754d1d33cffb6fca933583ba758200357551640c439770f77f843e9ce1e9a054f69588d76acb9cb92b7a2fa2903bc51391bd7001ccc1da67a4cce9e5dd08c2d489295c36de2c148ce27311d0789310de1cab2641e92f859b036383a8058a4"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #13
depends_on:1
4:exp:1:hex:"b628cb448e477cb439a2de687861a992e738db6b2b25cc6c27aadfc3a0a640b3411de49c920407303e80abd7a1d4f45c4749980fe1550bff69518210":hex:"d5f4f8266da9b7f17ac97734201544104a5c0acb53c6bf22":hex:"":hex:"":hex:"":hex:"34a834dbb7da0b6a2e2353bd9795bef369cdde4d172b3feae7b1d9fdfb0446454cfb1adeff423d0a143c33c0e0d8e7905bd1720889e8b1121f1ef82cf15443c2f9c8999c5573e7df60b52ef395ca1d1b60e7eb721c012c344d06b336d519fa2b7b6dfbed8383456504bd0b4893bf2ba2"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 0) #14
depends_on:1
4:exp:1:hex:"5c7c9690a1926a4580c691c2e5327e736d5c3aec0ce8f5d32d4946bc4b607f712a8759428b010ba1b268b0de64fc5eb32d3f7fa9b8d4f20fab45c72d":hex:"0310b2d8b5655cbb0fc2041ad15a248a7b1f2ac78845e29b":hex:"":hex:"":hex:"":hex:"6f8b6df55d9d8acf87dc2af20b7f4512f9425987495f512975de8059135e7ebb8698cb0301a8816e7299e76053cb66051c8b35bd2b00b4695cff4847f168d2d60697495cd9007ab7dd74ee7f61ee90b7827543f624b7c1412bba3d6df1242e6ffd90534ed393341429fc00bd97d9bcb7"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #0
depends_on:1
4:exp:1:hex:"96ae702af50c50c7c38818a5133938bd7ce51197fc78e21815b6c5a7ff9c0395d764159f707d5813e5bf47c1b8232b44a007bf7decfef499d758ed53":hex:"e96554644097e9932585b7f4bb14d101f24c8b0376f38c05":hex:"3f698a5f6f4fe67ef2ddf23bd5a67c1a2df4f3b19425fb85":hex:"fe1f6a90fc0ed396bca21c0d40a1bb583eb63df78c98adac":hex:"5942b56148f27dd5388f00caa47ffd4925e854237fe14454":hex:"150b9260ce9aa419fe1860332ae7c9f42d9ada1649679b53f46bc9d20de3431186a54afb5df7b6269cdc05540a93fdd50a2cd3a862372d862841768df02846b057993dd6aa32f874b7220a5a1fd9cb573d720a54af5715cedfc16f0d9a467735e253b2b1a6e97421fcee1f2d670dec1a"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #1
depends_on:1
4:exp:1:hex:"4834717f669d9b599f0ee526129057b5a7c5680724ae0459ceb0e0d4eda21e5fe92e63fd23f08f8a0b094a85f3f377fdf1018ada0c461b5a05c334e8":hex:"870b7857dae97cd361a005c3005013e4dd55ca76e46b62bd":hex:"522534ba1a09cf9abf29bde66ce1dacd0e273e8954eccafb":hex:"45f54169665f59d92211f266892009958ee515f14d09581a":hex:"4633819c2ae83c71059ec8ae41ed2c68cadf9b2085a5b8bb":hex:"7afd6cfafd9a7bad155b59a8bb2094f76b915b93764e92858821d5c32ff4a29493788d3dc1627ffe7980950394349eba88b9c2f6869ac5086296366b6f4ee37e8529d291c9d962e30662423faf375b7820e0b650db03e3c99791d8042da790cce1a1997ea21441dba4b936bd8b393300"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #2
depends_on:1
4:exp:1:hex:"f5d1d27eb344b63e907d82a2e57494b25dabcae440ac88738512d9602ac8bca243018f2495599e618dde0261e43ea38d45e7c09ccdc4bf3dd8e5c100":hex:"12ff844e5c5bb3fd871feb37ab796002846ffaca5a741c54":hex:"f642c19602754584afa3083f567d80fdcd1e5c29202ac3ad":hex:"cb6dbad8ce1a5677b4825cca934336b936ccf841ff98d894":hex:"c11fcc157c643a943e54274f1d942d998fd1ea0333e21588":hex:"6f25ae8bf8c26d5f0b9d2a81acaf221790a09241b6e83c9e527c7784881d1f7398c2d7771174f92aab45134b4633ad96430df30b130ae34af52de90b425405959ba24a41685a04d2411e2f0e8564bf5bf3280cb6d75d0b910d06c73a625cd56646eebff14fcff81411c055921cdfb4c0"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #3
depends_on:1
4:exp:1:hex:"49a10569d87a790d34bcc3c8fd77d075a1cef9eff337e8929b51bdb8d6c5df3ad31045684fd1dabb1fe6f052fc9886384fe43c0a7abc7adca043d35e":hex:"34d6ad434a436a690e7644f0dc2207131148192ceb2e91b6":hex:"8707328fc5a1721e4d72b23c2b8ca3c30ddd95664ac478aa":hex:"82c8d83a9f5d5639a6a1ce26d244bd30dceb1cc978627e19":hex:"2a53b0b80b29c7d071983b65ba835e4eda66bcfe7b3d90b5":hex:"08e24ccaae3b44b7248b2d735af985dcadb84f74d202bca726de1cd663bb5ea1bb67c669126ac97218a9ca45491df90beb387615474249bba1afd4534be7a74c61fef308f13661ddfcce40f24b410cffb1cc3cbba2c6d20a5e4c4814d44bef07bb697cfcf1e9932e43349376dc04865d"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #4
depends_on:1
4:exp:1:hex:"9a4232a59cc579867f8330c288a9218251030c00ebe50c9cd97d6cff6e49ad079df509644ec2ebe3ad4e515654af383da265d7b348dd4b89ddd49cbd":hex:"b4498a32f664d4b489c2b47e67845d2d2bed5096e88f86de":hex:"b8471ee87531817d81ee32578d27fa3a190df33561da7a2d":hex:"2e74194aa62ef911599b37a51fa742817e3a4e6c254ec179":hex:"afc7f13ae55e738cceb976ebdd01698de4d103db797f799b":hex:"340c28cb7cf4c3e143dac3e133de864b1f458c76e3d47f3cbb6845f940be174b8819fc539f42005f4485fddc657f064c34873094e25a9bf7ec341a98cb97014a1d694b1694170ca5a8976e86f6e4e41232f526ec8536facd02394f492fbcc7c298ef0eddb3c5a148399ded7677366cf3"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #5
depends_on:1
4:exp:1:hex:"b89744009793d2c118365b1d2f343d6b6c59374b41dbd805e793f27882467c5342015cf968b080a88a15fd6a7be3757b05313528525ab1e2cbd08ffd":hex:"f3c02be0a880e194013c21b09b6703a61a7ccf7a73e8a541":hex:"bca27f10060bb8d16d499b3f6ca05ed8462b51b0b43a1fd7":hex:"eb6fcf75884be9112219d359013f45fcb1959ea971bd0bc8":hex:"50a03bc3652f50cb9ed1167ea70ec1e74f896f81a8090216":hex:"d2a529722365e7ff3e660964eeb27040a0e92a4d19bbe94592cfebad71047414676ca6ca72234f5127f313cb7f5be613b44d989fe141c9a0ec1f0b4d83c36e744cfb1c72c32a02b68c21d28832da008c57664046255ef18488ed750ec5e73b18eead939f932d2809f12939670c3c1033"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #6
depends_on:1
4:exp:1:hex:"6d2918c15be7871cad99dc9e06f73253ef905d9705c4e4ec38664043b04f9a150fe5953bfa7aebd926be162b7edd72fdc14ff97e67dae6257ad654f4":hex:"489243eaac215f76a573b92f0709d116bd3c817eb95c2c39":hex:"0a84cad7a1cd21a5afe6557d7d2875d9c62183cbbf49a123":hex:"0c14578ac9504902cb9aa654086246d113039f926a87b325":hex:"1aaab1e3a29e144cec825d29c3f42dc945cf2772ed30cb5b":hex:"33438ba4edd0c38db99f2b6a50b35dd89aecb3491990ec4e60460bb32eb0186ff9fdc973b1b0df23ae65da31b8af5a37a69f81ab3e577a4c2c31e51cfcc4e844b044fb597e937524f59a0019ad5120c460329c982fc93e8e7a4b4e1de5619103b23a7a579633fc925d147d8fb856a277"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #7
depends_on:1
4:exp:1:hex:"1330c4aef54ff84387e0372f7c8d273cecf0af2ceb32ef6edb6a4f1ace802f3b95fa69cf578e2cda1d6060ec2554eb3152507387f325d8e26009bd80":hex:"89d7bf8f5754cedc2e1a249f693e29276170f62c29c5edae":hex:"a6b58f33d57570f4df05bbfb792a00087d331e17417e09ef":hex:"f57fc701e4f8f5cc2181b5357824f932f6e07679ec0d3cc7":hex:"586c4e8c5769156cbb54c025fb01aad0b61aa6238c231656":hex:"0bcb6ad4f2acefb549c46271d5a4ed41d7decc095137e2044b60273388c6c6d79cb89016abcad1d6a138621720b71fc11ef82fae04026e08926e94042694a0c008f99281e03da580fbb6543aca2b4596d39699b97f1fe65ec60a70b88770eb825b716a10ce41383f31db596079a9d54e"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #8
depends_on:1
4:exp:1:hex:"3f0564b9ceee32c8944c8f2bc4b4d2179b38acc880bdb91eed466b881e2cc21df77bc3901ab5ce5ecf029a066784503f80d1857979b09c4563944433":hex:"5d54fc715556c20f5b2d01d6b0992f1c596e5ad77f81da75":hex:"35cb6d07862fbab4f50038097cb463aadf14e519c8834651":hex:"abb21e501e85ad1edc66108e3b88380fddf810b10b883317":hex:"3c690cdd997dfa9c5677bee976fa93cac21f5bbf382f7f53":hex:"bae872c9d221b1531f85c15f466b7a3af3fa9c9c6b72bb8f5dad77f3d12df52d10347ba5d6504cd0a285c3be578bb67f0a9f0137463dc01cdcb847e7853c5db4cbb6a115ebff7b80db0406baccb0e3e68a4a4a95364c2da29466e160fece7b8ddb65dfab000c66cc8109380a601d5ed9"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #9
depends_on:1
4:exp:1:hex:"115c973d6df41ead464e22572dbe0761dcdb9aad930b2e55a5558075fb7c51c94efc5f8fe5dfe24d30175a89f1bbcf146037a07b324f572d0d4c27e4":hex:"d3079ee3a3c9b2d69ee0fd316a6448bc7d8e3b730948c46d":hex:"2348ee87bd5a3bb45d51a7b6a109043a9b6ee3db011dda28":hex:"937fe1a7a790754bff99ad51782e8ef5b4928d0057b0c380":hex:"3e89899f4aad241a9189ffa127c87c15b5e3bcfd80bc316d":hex:"0ffc883aa19b3cbdeb39039fd3760160a93cd663b8b358e9fbb6300df164689303ee5f2489ab4ab2d522f6a33c93350eab553a2499b15f8ca198303ff45e946a06d8a40959f33a759c5381b3a59da22e68032abf3da3da6aadb410cb41f54b3146ce57f9bb5d28bc823e3e03c0294794"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #10
depends_on:1
4:exp:1:hex:"c28541425a7cf33e29adaa91f326f216de89976031977f104f44fcbcdcf4579337434613801fe4661642392db29f15f0924566e72b596b23ff7b18d5":hex:"44650a29972aa8521d6fb9dffeb15c00903a283f20ea9914":hex:"43cf4de0276483be1382f3cecc6a803551a40602584cd84b":hex:"03eaa10612895db8f66d50a2210d73d1f563c3ca929d9f54":hex:"8d2b20abc4e8890c772bcaa05cb7b3eb5025ac4cacb5f7ce":hex:"aed27ff8eb54a7d2787e73ed2a51877c1250c0d4eaf10aaddb30409624289a9b7742cdebba54218c7c448b57f209182e214014cd180916a8c125ad438af2e5f5ca5b00f9cf063f0c307560ed4378382b4572b97088f8d24e0bdf0fc3489f64074f1155fbb1163b54c93098b841257c30"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #11
depends_on:1
4:exp:1:hex:"dfa52082afb4dd137cb5209f6771f04eda25794280983ba1d8cd2f3d7f9dee556ac26d8a5a368d29096ed643089b65e9ab17b5f58ec816570499fbff":hex:"16ccfd20408082829aaf8a818885164581c9a1bd09e9fc12":hex:"abe13d12a9f0133bdebe14785dfef5f08a133a6cb5c26a92":hex:"485dad7804de594356cf3c571d5f22263c0b7cbd4dca1f1b":hex:"5961f8177b6015ae0119d22e0a45a4aa1bcdc580f7e7f975":hex:"ee48e57f1b5bd72c99c911d3353952c2c143689c3cd9b474a46e4ada83811efc67f2557d323723526809825aa338a80e833c95297d6b16490db633ac1f1648071c3ad4cdcea056c41b4eb157ffc83c3454b0cf001f1e01c31e48a61587381e293e6cff97270c1f157b069df3e591c2f9"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #12
depends_on:1
4:exp:1:hex:"95f3a1aeacd07218a2ccee44c807f790e568e0032a42fdc7c8dc9a71f76bd725aa909ddbdf5457f1dc4e69746426a9c56fbec603867633ee36a7fe62":hex:"658b7326cf6adbf7208d37cd69547805bc3f58fdd874e143":hex:"d44350c7a668e64873ff97c31d79cb23b0f1620aed7c9d23":hex:"dfefff80f10c3143b82de3392c395ab94ac8a2f4c0a30048":hex:"a6d21a762aaaddcdbae9b9ecefbcb3149d514c94fe83eb21":hex:"4f5e544491b72b84a0d0532d7f9ce01ec2de6a05ab5056fc75d8f73bbcac5ffc38e20745d0e8aa1eacdefea6dcbb92475b5cf9ce0a617e5603b7b9fe34f4f4cb04ade2db35cce1fd315140e3e4ab8472216c7cfdaf004181351f210b397c3147dcd279f6fc2ebd96050e996f77ad6ba1"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #13
depends_on:1
4:exp:1:hex:"29a1897d6ea5de66e551f8c106f601e421ddd940812530df00f634682f249aebdaf86938c895c11f9fcb0bd1fcdb183b4f8cf86b3429a5372caafe1d":hex:"d655a179edaf4b8381a9f6a332ed5b754dbf34f650d19867":hex:"31c87be686b6f90f3d1b0ea90c541e16f3430292a5c4755f":hex:"ed49403700cebec30d1057503be7baacbeb45bcdfd9a43a2":hex:"952763380af3243c6c327f23cb74f8368919e0b6b9c25934":hex:"fb29067bdb23c0f0153932523edf32d0e3c18e46616e07f39a4b78091eca90349f636ffcf26b68a4cd0902431f2ada91bcc86dc223db4aa7a42e7cb57a852095704a27f9f07962880a50d2ce16c125be1e8d4f54a0cc5eaf63150c32408db6f39b22fc93b853caaba9e49581f13a8815"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-224, 192, 192) #14
depends_on:1
4:exp:1:hex:"387e31bcfffa51323a92d90713b438a1f4ded69707be3aa517e1e72d448abbdf0a17989b3de7c43c621e904f52db52ad823daabff9c10b3fca93acfa":hex:"e08fff320a493d70ea4cc85a4cc604664a0deec8f6c7666d":hex:"969cafc33e99964833c4d0f88f906f5429b5daa552f53bf0":hex:"8d6e6f05301ef5cefba752f3d0ef58a25775d6b69f6c15a4":hex:"72292aaa69fbef6f010fa4d5bb63d6d7a595395d79a8c110":hex:"77ead908484044482da529f9a6f4ca6e6d8d49954d2e2d5c7dc455e03bebf484021673727bbc40adc8812600201b8c2de8e658191422b80d23502329c84c0ca061b212952fdb2ecf3106dd20e6455f1f231e1dad1cfbf2fa019dfe9c162a670ae20b252ae2e5a4ca0eaae1c679a7fd3b"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #0
depends_on:1
4:exp:2:hex:"06032cd5eed33f39265f49ecb142c511da9aff2af71203bffaf34a9ca5bd9c0d0e66f71edc43e42a45ad3c6fc6cdc4df01920a4e669ed3a85ae8a33b35a74ad7fb2a6bb4cf395ce00334a9c9a5a5d552":hex:"":hex:"":hex:"":hex:"":hex:"76fc79fe9b50beccc991a11b5635783a83536add03c157fb30645e611c2898bb2b1bc215000209208cd506cb28da2a51bdb03826aaf2bd2335d576d519160842e7158ad0949d1a9ec3e66ea1b1a064b005de914eac2e9d4f2d72a8616a80225422918250ff66a41bd2f864a6a38cc5b6499dc43f7f2bd09e1e0f8f5885935124"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #1
depends_on:1
4:exp:2:hex:"aadcf337788bb8ac01976640726bc51635d417777fe6939eded9ccc8a378c76a9ccc9d80c89ac55a8cfe0f99942f5a4d03a57792547e0c98ea1776e4ba80c007346296a56a270a35fd9ea2845c7e81e2":hex:"":hex:"":hex:"":hex:"":hex:"17d09f40a43771f4a2f0db327df637dea972bfff30c98ebc8842dc7a9e3d681c61902f71bffaf5093607fbfba9674a70d048e562ee88f027f630a78522ec6f706bb44ae130e05c8d7eac668bf6980d99b4c0242946452399cb032cc6f9fd96284709bd2fa565b9eb9f2004be6c9ea9ff9128c3f93b60dc30c5fc8587a10de68c"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #2
depends_on:1
4:exp:2:hex:"62cda441dd802c7652c00b99cac3652a64fc75388dc9adcf763530ac31df92145fdc897a0c1c482204ef07e0805c014bbd9bbf717467bf4b5db2aa344dd0d90997c8201b2265f4451270128f5ac05a1a":hex:"":hex:"":hex:"":hex:"":hex:"7e41f9647a5e6750eb8acf13a02f23f3be77611e51992cedb6602c314531aff2a6e4c557da0777d4e85faefcb143f1a92e0dbac8de8b885ced62a124f0b10620f1409ae87e228994b830eca638ccdceedd3fcd07d024b646704f44d5d9c4c3a7b705f37104b45b9cfc2d933ae43c12f53e3e6f798c51be5f640115d45cf919a4"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #3
depends_on:1
4:exp:2:hex:"6bdc6ca8eef0e3533abd02580ebbc8a92f382c5b1c8e3eaa12566ecfb90389a38f8481cc7735827477e0e4acb7f4a0fa72eca6f1560720e6bd1ff0152c12eeff1f959462fd62c72b7dde96abcb7f79fb":hex:"":hex:"":hex:"":hex:"":hex:"d5a2e2f254b5ae65590d4fd1ff5c758e425be4bacdeede7989669f0a22d34274fdfc2bf87135e30abdae2691629c2f6f425bd4e119904d4785ecd9328f15259563e5a71f915ec0c02b66655471067b01016fdf934a47b017e07c21332641400bbe5719050dba22c020b9b2d2cdb933dbc70f76fec4b1d83980fd1a13c4565836"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #4
depends_on:1
4:exp:2:hex:"096ef37294d369face1add3eb8b425895e921626495705c5a03ee566b34158ec6e2e0825534d2989715cc85956e0148d1b4f7125f472c253837fa787d5acf0382a3b89c3f41c211d263052402dcc62c5":hex:"":hex:"":hex:"":hex:"":hex:"4541f24f759b5f2ac2b57b51125077cc740b3859a719a9bab1196e6c0ca2bd057af9d3892386a1813fc8875d8d364f15e7fd69d1cc6659470415278164df656295ba9cfcee79f6cbe26ee136e6b45ec224ad379c6079b10a2e0cb5f7f785ef0ab7a7c3fcd9cb6506054d20e2f3ec610cbba9b045a248af56e4f6d3f0c8d96a23"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #5
depends_on:1
4:exp:2:hex:"a7dccdd431ae5726b83585b54eae4108f7b7a25c70187c0acbb94c96cc277aa894c8f4b8e195a47356a89a50d1389ab551733eee2e922f4055e53939e222e71fae730eb037443db2c7679708abb86a65":hex:"":hex:"":hex:"":hex:"":hex:"99ba2691a622afecc9472418e6a8f9f1cdc1e3583c3bc7a2a650a1ab79dcbccbd656636c573179276e782569420c97438c06be898867f628b1c01eb570263d2c0f09c7aab536f6fba7df6aad19e05c236b645674667c03d1b6a04d7fc11177fe78933b309679f5bf26a4632b9a13e314c4bf4532428d3d95c689002b6dc1fbb1"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #6
depends_on:1
4:exp:2:hex:"c286425ecf543a49bcc9196b0db1a80bc54e4948adba6f41712a350a02891fa6957a659a4ec2e0b7ad185483c220fd6108c2129813eea0776fba72788fdf2718759cc3c4207fa20a5fe23ac6e32cc28e":hex:"":hex:"":hex:"":hex:"":hex:"8e1020a4fd84c99e0fc7e3f7ce48de5ed9ec9a5c2ccd624dbe6f30e2f688a31dc55957630357a5d48ca2a456241a28bfb16d8bb000877697a7ce24d9ad4d22b0c15117996f1f270b94f46d7a9bdfa7608fa1dd849177a9b8049e51b6b7a2742623854a1fddb5efc447eed1ea1aed6f02b4b2754ecf71ea0509da2e54f524a7e7"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #7
depends_on:1
4:exp:2:hex:"02818bd7c1ec456ace55beeba99f646a6d3aa0ea78356ea726b763ff0dd2d656c482687d508c9b5c2a75f7ce390014e8cf319bfa63980e3cb997fd28771bb5614e3acb1149ba45c133ffbbab17433193":hex:"":hex:"":hex:"":hex:"":hex:"19a231ff26c1865ce75d7a7185c30dd0b333126433d0c8cbf1be0d2b384d4eb3a8aff03540fbfa5f5496521a4e4a64071b44c78bd0b7e68fac9e5695c5c13fd3b9dbe7f7739781a4c8f0b980f1b17d99bce17ceb52b56866ae02456ffef83399c8cf7826f3c45c8a19315890919d20f40fc4e18d07e9c8ccd16c3327b5988f71"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #8
depends_on:1
4:exp:2:hex:"77a5c86d99be7bc2502870f4025f9f7563e9174ec67c5f481f21fcf2b41cae4bed044ad72ee822506a6d0b1211502967778100749f01a4d35c3b4a958aafe296877e0acafd089f50bc7797a42a33ab71":hex:"":hex:"":hex:"":hex:"":hex:"831a4da566f46289904893ef1cc1cd4ad19ee48f3857e2b69e936d10afbdc29822e85d02663d346ef3e09a848b1d9cc04f4c4c6e3b3b0e56a034e2334d34ca08f8097be307ba41d020bc94f8c1937fe85644eeb5592c2b5a2138f7ded9a5b44b200c8b5beb27597c790f94d660eb61e8248391edc3ae2d77656cbe8354275b13"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #9
depends_on:1
4:exp:2:hex:"0ea458cff8bfd1dd8b1addcba9c01317d53039e533104e32f96e7d342e6c7b9b935a4b66fc74c2a48757a99c399e64e36c5f3708e7b714c4ed139b4fa9e8c763af01773484005109a85e33653bb0ce98":hex:"":hex:"":hex:"":hex:"":hex:"373a37af84fddec13645a9768d6a785ae5a2589d64cd9b37980dde2541499210c4f408335de1d585349064f3f53a2b4c5ec6dc2a09591f99ad9fad528ac83474164b45497bf167f81e66fa08463ffea917f6891e48f149fafc20622bb1172f34886feb45c26fd446a4a4e2891b4bc594186896141aaaeeb301b49e7c1a26fec7"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #10
depends_on:1
4:exp:2:hex:"bfb68be4ce1756d25bdfad5e0c2f8bec29360901cc4da51d423d1591cc57e1ba98afe4bd194c143e099680c504cceaabb97caf210e82498c3408790d41c320dd4a72007778389b44b7bc3c1c4b8c53f8":hex:"":hex:"":hex:"":hex:"":hex:"409e0aa949fb3b38231bf8732e7959e943a338ea399026b744df15cbfeff8d71b3da023dcce059a88cf0d4b7475f628e4764c8bef13c70cfbbbb6da2a18aabcad919db09d04fc59765edb165147c88dd473a0f3c5ee19237ca955697e001ba654c5ee0bd26761b49333154426bc63286298a8be634fe0d72cfdeef0f3fc48eca"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #11
depends_on:1
4:exp:2:hex:"4f6880a64610004463031d67d7924fa446c39138d4d41007e8df3d65691a93676b33b2c13600f4b1df6ca3d1960e8dd457b87b8c8f48312b5333d43b367730c0a5ad4725a16778fcb53fe136d136cbfd":hex:"":hex:"":hex:"":hex:"":hex:"73d0f324ed186e2ad06bd1800e262bdbda79ba54e626761bd60f74f43e3bb62958ec1e2f1d940af163e1cadc124e7ebaba2f72e67efd746c7f6d0cad53ef03d859d93cff778a32ee5be172fe7fdbdc232ded360d704a6fa0f70bebe942e56478345492f49dc5c6fc346b88a58947ad250e688e8c626fe1efe7624620e571976e"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #12
depends_on:1
4:exp:2:hex:"aae352e111843219cae8f70e7b8f6eb9bb53d246cbec1e4f07d42757143295b4b84485dccd1bf93210e322eafcbebcd9f9237f00d744d8fbff21b9d0043c258e8731817e6a5fb7b4bf5011680e5bc642":hex:"":hex:"":hex:"":hex:"":hex:"cfb28b93522c7d61d8d3ce3f080e435e4c83c7e13a9dab788db8fef0407267a14fbc9324e090e24df5491fedfa81116869983938d4d4d7324a310c3af33a6f7938f602c5e4e63f1771cdaabdab0782b5affb54eb53047c109a9606739dd0065bd21eca33132986554878354f5f9f852e674dd690163b0ff74c7a25e6bae8ce39"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #13
depends_on:1
4:exp:2:hex:"589e79e339b7d2a1b879f0b0e1a7d1ad2474eaa8025b070f1ffa877b7124d4ff0961ed64dbd62065d96e75de6d2ff9d6e928388d3af48c2968527a4d2f9c2626fbc3f3f5a5d84e0583ab6f78e7f8b081":hex:"":hex:"":hex:"":hex:"":hex:"fce6ced1ecf474d181ab331f79c3d2cc8a768ec2818de5b3fc7cf418322716d6a6853733561a497c0c25cb288d2c9fcfbca891bafd5a834c85f3603f402acf1a7b1ea92db847ed5c252a862ad4ab5e259715f1fc81da67f5230bf8be50ee8069758095f7d0e559e03f2c6072290e61794458437609e473eb66580cddaad19b71"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 0) #14
depends_on:1
4:exp:2:hex:"714277d408ad87fde317f0a94732fce62f1352bdc90936673b4f1daa0925aa26d16582a99f23010b4248b88d86485419bd9fc7cb2fd5063b2c3c0c4f346ad2e3879371a9c805e59b9f2cd2cc2a40894f":hex:"":hex:"":hex:"":hex:"":hex:"62ef7a431288252e0d736c1d4e36cc9ac37107dcd0d0e971a22444a4adae73a41eff0b11c8625e118dbc9226142fd0a6aa10ac9b190919bda44e7248d6c88874612abd77fb3716ea515a2d563237c446e2a282e7c3b0a3aef27d3427cc7d0a7d38714659c3401dbc91d3595159318ebca01ae7d7fd1c89f6ad6b604173b0c744"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #0
depends_on:1
4:exp:2:hex:"05ac9fc4c62a02e3f90840da5616218c6de5743d66b8e0fbf833759c5928b53d2b89a17904922ed8f017a630448485452791126b8b52ee1fd9392a0a13e0083bed4186dc649b739607ac70ec8dcecf9b":hex:"":hex:"43bac13bae715092cf7eb280a2e10a962faf7233c41412f69bc74a35a584e54c":hex:"3f2fed4b68d506ecefa21f3f5bb907beb0f17dbc30f6ffbba5e5861408c53a1e":hex:"529030df50f410985fde068df82b935ec23d839cb4b269414c0ede6cffea5b68":hex:"02ddff5173da2fcffa10215b030d660d61179e61ecc22609b1151a75f1cbcbb4363c3a89299b4b63aca5e581e73c860491010aa35de3337cc6c09ebec8c91a6287586f3a74d9694b462d2720ea2e11bbd02af33adefb4a16e6b370fa0effd57d607547bdcfbb7831f54de7073ad2a7da987a0016a82fa958779a168674b56524"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #1
depends_on:1
4:exp:2:hex:"1bea3296f24e9242b96ed00648ac6255007c91f7c1a5088b2482c28c834942bf71073136a5cc1eb5b5fa09e1790a0bedd714329f3fbea1df9d0b0b0d88dfe3774beb63d011935923d048e521b710dc6f":hex:"":hex:"4ef872fd211a426ea1085ab39eb220cc698fdfeabe49b8835d620ab7885de7a4":hex:"d74d1669e89875852d9ccbf11c20fe3c13a621ebcb3f7edeea39a2b3379fdcf5":hex:"0c8aa67ca310bd8e58c16aba35880f747266dbf624e88ec8f9ee9be5d08fdeb1":hex:"ce95b98f13adcdf7a32aa34709d6e02f658ae498d2ab01ce920f69e7e42c4be1d005acf0ca6b17891dfafc620dd4cd3894f8492a5c846089b9b452483eb0b91f3649ec0b6f98d1aaabc2e42cd39c2b25081b85ab50cb723007a0fd83550f32c210b7c4150b5a6bb3b0c9e3c971a09d43acb48e410a77f824b957092aa8ef98bc"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #2
depends_on:1
4:exp:2:hex:"a7ea449b49db48601fc3a3d5d77081fab092b8d420ed1b266f704f94352dd726d11a159b60af8d20a0e37d27e6c74aa350916ab47e8cb5dc843f9fba80639103711f86be8e3aa94f8a64a3fe0e6e5b35":hex:"":hex:"e2bb6768120555e7b9e0d573537a82f8f32f54560e1050b6abb1588fb3441e66":hex:"a50cec9d1ecddb2c163d24019e81c31a2b350ccd3ad8181fd31bb8d1f64fa50e":hex:"591dbbd48b51abced67f9c6269cf0133cd3dcbb5cfafcb6ef758569c555a5773":hex:"0a464abcc8685158372d544635b953fcb1d3821c30aaa93982f9b788935f00f88115aad61d5cee003b3d1cb50f3e961a501e2dd0fc7e1724778b184a4bdf9f64e110dda7446e5544a30bd49a400ea1a5411800e1edfeea349323618afc5dc5782dc4b71d2da4d6a4785f8dd346feb9c8740ffd26bf644e3e4323ff24c30b9f10"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #3
depends_on:1
4:exp:2:hex:"14683ec508a29d7812e0f04a3e9d87897000dc07b4fbcfda58eb7cdabc492e58b2243e744eb980b3ece25ce76383fd4618590e0ef4ee2bdae462f76d9324b3002559f74c370cfccf96a571d6955703a7":hex:"":hex:"9ea3ccca1e8d791d22fcda621fc4d51b882df32d94ea8f20ee449313e6909b78":hex:"16366a578b5ea4d0cb547790ef5b4fd45d7cd845bc8a7c45e99419c8737debb4":hex:"a68caa29a53f1ba857e484d095805dc319fe6963e4c4daaf355f722eba746b92":hex:"c4e7532ee816789c2d3da9ff9f4b37139a8515dbf8f9e1d0bf00c12addd79ebbd76236f75f2aa705a09f7955038ebff0d566911c5ea13214e2c2eeb46d23ad86a33b60f7b9448d63eec3e1d59f48b39552857447dc5d7944667a230e3dbfa30ca322f6eacaf7536a286706a627c5083c32de0658b9073857c30fb1d86eb8ad1b"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #4
depends_on:1
4:exp:2:hex:"fa261fb230e2822458532ca2d5c39758750e6819a6fcebef10579ba995096959564e1c9fbcb12878df2bd49202cbf821bf7de29e99e7f0e1b9f96f3b1902fb4049c8c6234d20de8316ebe66d97725457":hex:"":hex:"8b7326621f6afbd44a726de48d03bcc5331f7306026c229ea9523497fbeaa88d":hex:"33b00b31623d6160c4c6740363a96481be14b19bc47be95641227284c366922a":hex:"2d812c8203575790ad6b6f2ed91a49d57460de779a3e881bef3be12e8766dc91":hex:"5574e0b4efc17e8ce136e592beabfe32551072bddd740929e698467b40b3991f028a22c760f7034853cc53007e3793e3c4a600d9e9d94528f8dc09aeba86146cdde2b7f71255ae0efc529b49be2205979dba6525bfe155e8819e8e2aeeaa285704242da90b4c4535101cc47d94b0e388a1b2e63ad0cbe158b9e1bbae9cc0007c"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #5
depends_on:1
4:exp:2:hex:"61f1471ced56aa04c57e1b512307d4cb92497d9592d7e9e35356e99d585cab1b84714e960c403a4fac06b2828cc564d97bf97db3c102edc81596d4757045fe6bdc008f35792fc6290b77d889c09c33a8":hex:"":hex:"5b8bdc41f76d98cfa71ed976ea3994706375c8841adb8b6b3b6418e3132e8832":hex:"94c8a8fdf38a6ccb8571c89420d899adab169214bb0dfcd43a04622e289935b2":hex:"8a4b46e0a7a55907365f82d4ab9376509bd44728cab8cbafb0da901012ad8dcd":hex:"933eb159a6af7455b60e40586c064f05f1970f564281b1ebc4662701ac1f299e4eb908c4afcb2e065191281ab576f684aefedd6904bad04d96bd93c0516c62a496c3073a0cda0676a11cc08866b0cc74f62cb9d3db48673b2c3fbeada69f922b4b795ccba22df12ef7125909381f7d681f6b9caba02fb913c5437b98c040c576"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #6
depends_on:1
4:exp:2:hex:"a1d5bb7d70621dee6b668b28c56d5610c2f8ced30284cc3e0e48de331af0506288a49e3e54c5ea54c98b95de81bcc807b4e2426e98f6eed97a6cdf690a89ee109e84c3dca16c883c26fa4ac671638d8d":hex:"":hex:"5bd1e086ed228cfd8b55c1731fea40c3a63d022599ca2da4bb23118f4821ba62":hex:"b754b53ac226e8ebe47a3d31496ec822de06fca2e7ef5bf1dec6c83d05368ec3":hex:"fa7e76b2805d90b3d89fff545010d84f67aa3a2c9eb2ba232e75f4d53267dac3":hex:"df6b2460688fa537df3ddfe5575fca5eb8abad56cbc4e5a618a2b4a7daf6e215c3a497974c502f9d0ec35de3fc2ea5d4f10de9b2aee66dcc7e7ae6357983095959b817f0383e3030771bd2ed97406acf78a1a4a5f30fa0992289c9202e69e3eb1eabe227c11409ff430f6dfca1a923a8b17bc4b87e908007f5e9759c41482b01"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #7
depends_on:1
4:exp:2:hex:"68f21d14525d56233c7e263482d344c388a840103a77fb20ac60ce463cabdc7959fa80ae570f3e0c60ac7e2578cec3cb7584b4166530442f06e241dd904f562167e2fdae3247ab853a4a9d4884a5fa46":hex:"":hex:"f6a5482f139045c5389c9246d772c782c4ebf79c3a84b5cf779f458a69a52914":hex:"9d37b1ce99f8079993ddf0bd54bab218016685b22655a678ce4300105f3a45b7":hex:"4c97c67026ff43c2ee730e7b2ce8cce4794fd0588deb16185fa6792ddd0d46de":hex:"e5f8874be0a8345aabf2f829a7c06bb40e60869508c2bdef071d73692c0265f6a5bf9ca6cf47d75cbd9df88b9cb236cdfce37d2fd4913f177dbd41887dae116edfbdad4fd6e4c1a51aad9f9d6afe7fcafced45a4913d742a7ec00fd6170d63a68f986d8c2357765e4d38835d3fea301afab43a50bd9edd2dec6a979732b25292"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #8
depends_on:1
4:exp:2:hex:"7988146cbf9598d74cf88dc314af6b25c3f7de96ae9892fb0756318cea01987e280bc1ae9bfdf8a73c2df07b82a32c9c2bbc607085232e5e12ccf7c0c19a5dc80e45eb4b3d4a147fe941fa6c13333474":hex:"":hex:"f3f5c1bb5da59252861753c4980c23f72be1732f899fdea7183b5c024c858a12":hex:"44d0cfc4f56ab38fa465a659151b3461b65b2462d1ad6b3463b5cf96ad9dc577":hex:"34fb9a3cdacc834ff6241474c4f6e73ed6f5d9ea0337ab2b7468f01ad8a26e93":hex:"4caec9e760c4d468e47613fe50de4a366ae20ba76793744a4e14433ea4de79dc188601eb86c803b094641ab2337b99d459d37decc7d27473057be45ba848868ee0fb5f1cf303d2fcd0b3e0c36f65a65f81b3fee8778a1f22302e25dfe34e6d587fa8864e621121880f7cd55f350531c4ce0530099eec2d0059706dcd657708d9"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #9
depends_on:1
4:exp:2:hex:"1c974c953fa2a057c9fc9409a6843f6f839aa544bca4fa11e48afd77931d4656ed7c08285464af7a5dbdc10b944a127078146ad135acb836360d36afc50653dcc36c21662da2a6f6ae05222e75f34000":hex:"":hex:"263c4984c238ded333c86472866353817379502157172cfa51371d82b1efd7b5":hex:"79b591529f9a26a0d7c8f8fd64e354b0c134ef1f757e43f9463b3dbb7a3da1ab":hex:"7d8f7204b0b5401ddce9e88dcf5facb9a44660a9f5f1c862748e7269c29f7964":hex:"72e2ca257b9edaf59b50e05a144f56fb517832fb9ad3489b1e664e3d5412cbf6b2883e891703b2e73aff9ab56da1009fcdef010ab4cdab996795c8f7c47fb1192bb160353997ad39d7d5fd0e2efc9103a7c3f158246afd53fe53ca6782f809698ef5f1f0d85536780a3fd6a8bafa475891c09213088bd1a3dc169257c34a517a"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #10
depends_on:1
4:exp:2:hex:"56216d71984a77154569122c777ce57e1d101a6025b28163a25971d39c1c5d0f5cd148ba7e54f4975ac8e3e0f9b5d06a3580f8ca974626c77259c6e37383cb8150b4d0ab0b30e377bed0dc9d1ff1a1bf":hex:"":hex:"15633e3a62b21594d49d3d26c4c3509f96011d4dbb9d48bbbea1b61c453f6abe":hex:"6068eaca85c14165b101bb3e8c387c41d3f298918c7f3da2a28786ab0738a6fc":hex:"e34f92d2b6aeeeea4ff49bfe7e4b1f462eabb853f0e86fbae0e8b3d51409ce49":hex:"587fdb856abc19ede9078797ecb44099e07aadcd83acdcb2b090601d653f4a14c68ab2ebdda63578c5633a825bae4c0c818f89aac58d30fd7b0b5d459a0f3d86fcad78f4bb14dfff08ad81e4ea9f487cb426e91d6e80dfed436ba38fce8d6f21ca2151c92dd5c323b077d6139c66395558f0537026c4a028affa271ef4e7ea23"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #11
depends_on:1
4:exp:2:hex:"83eb48bedc1e9294866ab8e5322ef83f6f271f8188e8fdabe5817788bd31570dd6ed90bc692237f132441ede857a6629a4e5e127f992bd5ca79ee56bb8a9bccf74c21814bfaf97ffd052211e802e12e4":hex:"":hex:"84136e403d9ed7f4515c188213abcfaca35715fa55de6d734aec63c4606a68f1":hex:"fe9d8ef26e2d2e94b99943148392b2b33a581b4b97a8d7a0ecd41660a61dd10b":hex:"594dad642183ce2cdc9494d6bcb358e0e7b767c5a0fa33e456971b8754a9abd5":hex:"86715d43ba95fbbca9b7193ea977a820f4b61ba1b7e3b8d161b6c51b09dfd5040d94c04338b14d97ed25af577186b36ae7251a486c8a2d24a35e84a95c89d669d49e307b4a368b72164135ac54d020a970a180dfbed135d2c86f01270846d5301bd73db2c431a8aa10a0a3d03d146e5fafb9a2aa0b4efc80edab06ff3b532236"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #12
depends_on:1
4:exp:2:hex:"ba2c94203dab2e6499d8c50dca7b5c34a6b4764834f9816631aa21b9f9c3736167db133bdefb25e395085bceee5a0afcfa8984d16d35302cda35a3a355ab9242ec96fec0652d39282d4a0abf0a80df87":hex:"":hex:"b6fed10255a3fea6772ae1ae6d9f6cbb9bfaa34804e58a5b786f9bc60b348ccd":hex:"445e072244edc716d3528f0e0a20ff0cd8f819c0d031736c8da122748f24d6c6":hex:"1f856e403c4fa035bac9aa81a20e347c7d8b213aab699d69d9d6186a06ac45c1":hex:"79f33fc36b3b47d9ac805bdbbe699909a8d0beb689a8b2723c291bd5bf7f3ce61343d4722a14e4add36312dbb0594910c8828aff1abc159915d498106f9ffb31147478d8c9ef75d1536ba5036506b313f6e85033f8f6fea2a4de817c867a59378c53c70a2f108275daedd415c05b61c4fd5d48c54be9adb9dea6c40a2ec99ee0"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #13
depends_on:1
4:exp:2:hex:"0db4c51492db4fe973b4bb1c52a1e873b58fc6bb37a3a4bfc252b03b994495d1a2a3900f169bba3f78a42526c700de6229d5aab356876447e3a20d81c7e3fc6975e2b984180a91493044442999e1ca3a":hex:"":hex:"40b34183b4e72cdff5952b317b3d45943d0fdcfa0527f3563055f7c73ae8f892":hex:"dc94220c99ffb595c7c4d6de8de5a6bb4b38847169e24a557ef6d879ad84149d":hex:"b2376626fd2f5218b3ed4a5609b43aa24d371cd2176ea017c2b99cf868060021":hex:"f0bd6bc4c506d9427a09352d9c1970b146360732841a6323f4cb602c87dedfb5ff7e6964b9144933af3c5c83017ccd6a94bdca467a504564aaa7b452591a16ff6a1e7e94ddc98f9a58016cdcb8caaed6c80671ba48cc81a832d341093dda1d4e5001ec6bf66348b21e3692a13df92538ad572bb2023822072fc95f9590293ffc"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 0, 256) #14
depends_on:1
4:exp:2:hex:"593845f0adfeffa7c169f8a610147ae8a08c0072fc0c14c3977d3de0d00b55af9e0eb2507342ee01c02beadee7d077bdaefe591697eab678c52e20013aa424b95cfd217b259757fbe17335563f5b5706":hex:"":hex:"cbb5be0ef9bf0555ee58955c4d971fb9baa6d6070c3f7244a4eb88b48f0793bf":hex:"6dd878394abdc0402146ba07005327c55f4d821bfebca08d04e66824e3760ab4":hex:"ba86a691d6cbf452b1e2fd1dfb5d31ef9ea5b8be92c4988dc5f560733b371f69":hex:"00735cbfafac5df82e5cb28fc619b01e2ba9571dc0023d26f09c37fb37d0e809066165a97e532bf86fa7d148078e865fe1a09e27a6889be1533b459cd9cd229494b5cf4d2abf28c38180278d47281f13820276ec85effb8d45284eb9eef5d179ab4880023ab2bd08ee3f766f990286bf32430c042f5521bbfd0c7ee09e2254d7"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #0
depends_on:1
4:exp:2:hex:"fa0ee1fe39c7c390aa94159d0de97564342b591777f3e5f6a4ba2aea342ec840dd0820655cb2ffdb0da9e9310a67c9e5e0629b6d7975ddfa96a399648740e60f1f9557dc58b3d7415f9ba9d4dbb501f6":hex:"f2e58fe60a3afc59dad37595415ffd318ccf69d67780f6fa0797dc9aa43e144c":hex:"":hex:"":hex:"":hex:"f92d4cf99a535b20222a52a68db04c5af6f5ffc7b66a473a37a256bd8d298f9b4aa4af7e8d181e02367903f93bdb744c6c2f3f3472626b40ce9bd6a70e7b8f93992a16a76fab6b5f162568e08ee6c3e804aefd952ddd3acb791c50f2ad69e9a04028a06a9c01d3a62aca2aaf6efe69ed97a016213a2dd642b4886764072d9cbe"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #1
depends_on:1
4:exp:2:hex:"cff72f345115376a57f4db8a5c9f64053e7379171a5a1e81e82aad3448d17d44d1e971ec795d098b3dae14ffcbeecfd945ec80f0c00cad0ff0b7616d2a930af3f5cf23cd61be7fbf7c65be0031e93e38":hex:"6ec0c798c240f22740cad7e27b41f5e42dccaf66def3b7f341c4d827294f83c9":hex:"":hex:"":hex:"":hex:"17a7901e2550de088f472518d377cc4cc6979f4a64f4975c74344215e4807a1234eefef99f64cb8abc3fb86209f6fc7ddd03e94f83746c5abe5360cdde4f2525ccf7167e6f0befae05b38fd6089a2ab83719874ce8f670480d5f3ed9bf40538a15aaad112db1618a58b10687b68875f00f139a72bdf043f736e4a320c06efd2c"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #2
depends_on:1
4:exp:2:hex:"b7099b06fc7a8a74c58219729db6b0f780d7b4fa307bc3d3f9f22bfb763596a3b8772059a135a6b61da72f375411de269aec4f56ec5e96fbd96048b9a63ac8d047aedbbeea7712e241133b1a357ecfc4":hex:"2ac1bfb24e0b8c6ac2803e89261822b7f72a0320df2b199171b79bcbdb40b719":hex:"":hex:"":hex:"":hex:"0e1f2bfef778f5e5be671ecb4971624ec784ed2732abc4fbb98a8b482fb68737df91fd15acfad2951403ac77c5ca3edffc1e03398ae6cf6ac24a91678db5c7290abc3fa001aa02d50399326f85d2b8942199a1575f6746364740a5910552c639804d7530c0d41339345a58ff0080eccf1711895192a3817a8dc3f00f28cc10cc"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #3
depends_on:1
4:exp:2:hex:"7ba02a734c8744b15ef8b4074fe639b32e4431762ab5b7cd4d5df675ea90672b8a424f32108607c8f1f45d97f500ee12d8f02b59b6a3dd276bc69cba68efcf11ab83ead1397afd9841786bd1bb5da97a":hex:"3ad627433f465187c48141e30c2678106091e7a680229a534b851b8d46feb957":hex:"":hex:"":hex:"":hex:"1fb91186ba4b4459d994b4b9f4ca252c7be6294d6cdb5fe56f8ff784d4b190a1c6456e0a41223bbbdf83ed8e7cfbfa765d9d8bc7ea5f4d79ea7eccb4928081a21de4cca36620d6267f55d9a352b76fc0a57375884112c31f65ff28e76d315698c29e6c4c05cb58b0a07ae66143b4abc78b9d25c78b4121e1e45bef1a6c1793e2"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #4
depends_on:1
4:exp:2:hex:"9a8865dfe053ae77cb6a9365b88f34eec17ea5cbfb0b1f04d1459e7fa9c4f3cb180c0a74da3ec464df11fac172d1c63275b95108eff1fabe83613e1c4de575e72a5cdc4bb9311dd006f971a052386692":hex:"336372ec82d0d68befad83691966ef6ffc65105388eb2d6eed826c2285037c77":hex:"":hex:"":hex:"":hex:"3c683f6d4f8f5a4018d01633dfee74266aaa68ed6fc649e81b64dfdf5f75e75d5c058d66cf5fd01a4f143a6ff695517a4a43bd3adfd1fb2c28ba9a41063140bedbffdb4d21b1ace1550d59209ec61f1e2dbacb2a9116a79cb1410bf2deca5218080aacd9c68e1d6557721a8913e23f617e30f2e594f61267d5ed81464ee730b2"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #5
depends_on:1
4:exp:2:hex:"22c1af2f2a4c885f06988567da9fc90f34f80f6dd5101c281beef497a6a1b2f83fafdecf79a4174801f133131629037bf95a0e4bd24f0e2e9e444f511b7632868ead0d5bb3846771264e03f8ab8ed074":hex:"80327dac486111b8a8b2c8e8381fb2d713a67695c2e660b2b0d4af696cc3e1de":hex:"":hex:"":hex:"":hex:"77a7fea2f35a188f6d1bfdd49b569d8c45e2dd431d35a18c6f432c724f1e33ae92cb89a9cf91519e50705a53199f5b572dc85c1aef8f28fb52dc7986228f66954d54eda84a86962cf25cf765bd9949876349291b1aae5f88fcf4b376912d205add4f53b2770c657946c0d824281f441509153f48356d9d43f8a927e0693db8fc"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #6
depends_on:1
4:exp:2:hex:"d0840e3a8d629d5b883d33e053a341b21c674e67e1999f068c497ecfaabfd6f6071de7244ecb2fdf7ab27f2d84aa7b7a1dd1a8b59856c49a388f594c5f42cc2e4a56b3ccb8a65e7066e44c12f4344d50":hex:"90d609527fad96ffe64ab153860346f3d237c8940555ae17b47842d82d3b0943":hex:"":hex:"":hex:"":hex:"7ab28a9b2d3ae999195553e6550cced4c2daccbe7ec9dcbb0d467fabba185b727fbfd9830242cd098f4db3cf4a85e8bf8e8d5974b62b28550922b32ed5bfc1a522b6605cf93bf8d90bdec1c5b9e59c6fc37a817d437068a87254be1f7c4618ada46fbc3a2efb02e44524e21d91be7534cf05fbfd858304b706d6a91ea1cc6ad5"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #7
depends_on:1
4:exp:2:hex:"2e2dd56869104492767a59778652831919e1c8b970f84e824ae4116597a0ab7f01c42a7e983641de46c82fd09b4f2f767306507cd3ca7eec667e640d270cfbb033063d97520b6b7e38ff3cea0e79d12b":hex:"bcd9e1508fcc22820a8be07180fea5045367333b569e111b011cd57dc1858765":hex:"":hex:"":hex:"":hex:"b915726c7b8c5dc3975f1a334684b973abf6a9495d930088cf5d071548e4fd29a67b55cc561ed6949ad28150a9fb4307c1fa5f783a7ea872e8d7c7e67ff0c2906081ee915737d813c25be5c30b952a36f393e6baa56ab01adc2b4776ad7b5d036a53659877c7a4e5220a897d6c0799af37beeed91173fbe9c613c3b6b9bb28e5"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #8
depends_on:1
4:exp:2:hex:"d1aab0f16bd47a5ccd67c22e094daa3735eae21aa57f0bcd9e053d9d0d545cb8199310dfe1b01265b8c0d2b46d6c7c9ff50cabae4e060f3971096b78e550cda2837a26a693d905db2d992d589b268f44":hex:"625b4b8f4de72ea9cb6f70556322dc2a19d6b2b32de623f557e419a084ba60fd":hex:"":hex:"":hex:"":hex:"987e1fdfe004c619cf1e9034576707eccd849400e19c87a1fef5b0179ec51c42a2f8c45d7942d0023a023c89f188b2634362703985695369863322f58619c50a7385a2dc91fc78f94b59f0131dc2b56a0d7c699d427285da1c104b0ad1739da10d8071c23993787045dc21f0070e1e9aa1658fc8e3add73dac7262e80e0aa2ee"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #9
depends_on:1
4:exp:2:hex:"449480eaa100aff6f48dc6286a5a81b9728b084864f78a9da98f606a00a6a41fe53c6c5ac3da9f4726389a03f97bb64073a6d64e1966ae324388dc12c14544e9dc5ae4fcb331e99d350c456ff16f9aa0":hex:"6b8fedc084d8e28d333aef6db3702b6351f0d24e30908cccb63794282655886b":hex:"":hex:"":hex:"":hex:"a06912d362da7eb25598857f6d65344c3e23ec3deb80c6e43158845b95eaeca241c0bbbd67ac385e24693444455cc1c2c08c1134d956b8bc93b28be9c2d3322b3e09252979dfb8d39d04c94f81bebda5c73110605a237b561216bda9ee9bdee1cc0c7728bcc8304682334ca944e467a27a85313fa5395a9c790e35defd2edb12"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #10
depends_on:1
4:exp:2:hex:"9a6174166e97aa4981ddf580bc01c96754b9f0ba042750aabfda1cffe56e8581d7512ff6b7db7ce141b2bb01dcd0425e6888b9277e57dc57663d402eba8d03cf56a070dc868e6a128b18040002baf690":hex:"ed75288f23275f9422444da5d3b53ccb3c4ac8acfb659a1e9b7655c2db52f879":hex:"":hex:"":hex:"":hex:"03519dfb2ff88cc2b53eecc48ae2a18ddcf91a5d69d5aefcdda8444e6df790a5240e67b2a4de75b4bb8a31f0f8aeb5e785ffb7a1341bb52fe00a05ee66fa2d44ea9956e055f9ffa6647c3bfe851ab364ade71a0d356de710ddafb7622b1da1bc53fd4d3210407289c68d8aeb346bf15806dbe787e781b94f63da3e1f61b5ac60"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #11
depends_on:1
4:exp:2:hex:"9c6ae1002ee1b0add0be563ce50f899da936e13efa620d08c2688c192514763afde7db5160c73044be73e9d4c1b22d86bcc28fd58e397f53f494ad8132df82c5d8c4c22ea0b7139bd81eeba65667bb69":hex:"8fdaaeffd64e53f7b4374d902d441209964e12b65d29afec258e65db6de167ca":hex:"":hex:"":hex:"":hex:"021d938c9b4db780c7d8134aeff1053e5b8843370b8ae9a6749fca7199d809810f1bc8dfa49426470c30c3616f903e35fbacb23420a32f1bee567cc32300f704246ddc0217f236ef52c3ec9e2433ca66f05c25721f7661c43f22c1a125ed5db531bd0836eb435c27eefc7424ce9d845e1d4cc4c503097b4ffca788e674a5cb53"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #12
depends_on:1
4:exp:2:hex:"fe96a85b69d46b540918927bb609dc57642eeaefd46bb5da2163a0bc60294b5822195a410d24db45589448dfe979d3fd09cb870879d3f734214f6a4bd2e08c62a2a954bebe559416d8c3551aafe71d6a":hex:"20f698833a4472fd7b78fb9b0c4eb68604f166a2694c4af48dac2b2376790e1e":hex:"":hex:"":hex:"":hex:"d3e96dbe29e1fcb8ed83b19dbfb240e6f41679fbe83853aa71446617e63e5af78cf98b331d15bccb8c673c4e5d5dcec467a1fe26a6cd1696d0c9bc49f78139d051287df7f3ae0dbb4bbf581cb8211931063c3f4612ced53f59d1b4ebb875729139f5d2a7d60642e8f2835eed888b7e3e49c0dffd012cd746abfa3e1c5c2308c6"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #13
depends_on:1
4:exp:2:hex:"a4fd693ff0a8af24bcec352d3196549fd0da5ee5d99ca58416ca03ce4c50f38e8cd67f2bf71d4366ce61396642531ff583d2be9a0d74e6a42159ae630acebf4e15271ef7f14f3de14752be0e0e822b11":hex:"368969c15a4849d7593be8b162113b9298a535c148ff668a9e8b147fb3af4eba":hex:"":hex:"":hex:"":hex:"e9188fc0eaec74b2608e21e3a40be94aaf4ae08eb684de8f8bba2d5fd3b073aa5531c938c0fc628da65725c54b5c68bb91d7d326565e96685e0a4e7b220c50e0caf1628edba5bd755b31894f8cb90afa76e88c5eb9e61b4932444c1397dee3e32241a3fb70a3929e49f6da02eea54812abb3d6b5cee18f03af1e0b4958430ab3"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 0) #14
depends_on:1
4:exp:2:hex:"254ff5687a6dad3f1d237dc762f58d24ef2e2c084d0a48d26a3dc81e5490cda3f2ec392acca491e03ce47b95963a49fcb8494b1c1f1752fb6f80d732a89b08115857f7cc96e7dff05ebb822706889917":hex:"f806b9b4a56682c61b55cb6a334caf87ffe135adfea6d0c3fc22b39898fbd078":hex:"":hex:"":hex:"":hex:"0e527e00494d55564f9d9b28e7110f9a61ce36c883b5be2dcb055444164cdddd1a9f2731716f22d6ff476ce413c77abfc0e946871d5481345c2e97b4bfdd12ac03df606fc56bdb99ac7b71a69b5b9160373bbec3e9dde477180af454e7acc6bc58dc0afb4281c0de4354c1bf599054e3800c6d60d892858865b5361f50bfca9b"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #0
depends_on:1
4:exp:2:hex:"cdb0d9117cc6dbc9ef9dcb06a97579841d72dc18b2d46a1cb61e314012bdf416d0c0d01d156016d0eb6b7e9c7c3c8da88ec6f7d5a8e2e88f43986f70b86e050d07c84b931bcf18e601c5a3eee3064c82":hex:"6f0fb9eab3f9ea7ab0a719bfa879bf0aaed683307fda0c6d73ce018b6e34faaa":hex:"1ab4ca9014fa98a55938316de8ba5a68c629b0741bdd058c4d70c91cda5099b3":hex:"16e2d0721b58d839a122852abd3bf2c942a31c84d82fca74211871880d7162ff":hex:"53686f042a7b087d5d2eca0d2a96de131f275ed7151189f7ca52deaa78b79fb2":hex:"dda04a2ca7b8147af1548f5d086591ca4fd951a345ce52b3cd49d47e84aa31a183e31fbc42a1ff1d95afec7143c8008c97bc2a9c091df0a763848391f68cb4a366ad89857ac725a53b303ddea767be8dc5f605b1b95f6d24c9f06be65a973a089320b3cc42569dcfd4b92b62a993785b0301b3fc452445656fce22664827b88f"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #1
depends_on:1
4:exp:2:hex:"3e42348bf76c0559cce9a44704308c85d9c205b676af0ac6ba377a5da12d32449af783973c632a490f03dbb4b4852b1e45718ac567fd2660b91c8f5f1f8f186c58c6284b6968eadc9810b7beeca148a1":hex:"2e51c7a8ac70adc37fc7e40d59a8e5bf8dfd8f7b027c77e6ec648bd0c41a78de":hex:"63a107246a2070739aa4bed6746439d8c2ce678a54fc887c5aba29c502da7ba9":hex:"e4576291b1cde51c5044fdc5375624cebf63333c58c7457ca7490da037a9556e":hex:"b5a3fbd57784b15fd875e0b0c5e59ec5f089829fac51620aa998fff003534d6f":hex:"c624d26087ffb8f39836c067ba37217f1977c47172d5dcb7d40193a1cfe20158b774558cbee8eb6f9c62d629e1bcf70a1439e46c5709ba4c94a006ba94994796e10660d6cb1e150a243f7ba5d35c8572fd96f43c08490131797e86d3ed8467b692f92f668631b1d32862c3dc43bfba686fe72fdd947db2792463e920522eb4bc"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #2
depends_on:1
4:exp:2:hex:"b63fdd83c674699ba473faab9c358434771c5fa0348ca0faf7ebd7cf5891826b5fd204e2598d9626edab4158a8cfd95fadea5ba92f8010bb1a6a4b6fae2caa0b384165adf721253afd635d6021f764af":hex:"2a5dfad8494306d9d4648a805c4602216a746ae3493492693a50a86d1ba05c64":hex:"07c69d8d2b8aa1454c5c48083dd41477fda6bfcf0385638379933a60ed2e0a77":hex:"a14e902247a3d6493d3fbc8519518b71a660e5502cf7ecfc796cfaa5b4ee4baa":hex:"60e690e4a1eba14aec5187112a383e9991347fab7bac7cb2a40a52579a0d2718":hex:"792b47b6ed221623bb187d63e3f039c6983d94efd5771dc9b4c40bee65924513485a6332baeda6a96f9bb431f592d73462b61d9d914a72b56fa9d87597426fb246424ebcd7abd51b2eefec8f5b839c0b3c34015342ace296b5f2218fa194b50aea1c89663460292c92c45f112ddbf6b9406f6e7ccee9c47ed2d90a27be5dd73e"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #3
depends_on:1
4:exp:2:hex:"dab85f98eaf0cfba013b97de4d9c264ca6fe120366cb83e8b3113c68b34e39d5d05108e1028ae67b4ea63bdc6d75eb881794885a64470744198b7d0bc24472ffe8daf3c7eb219df6ddf180e484fe0aa5":hex:"09fed3822f6f5e5b9e575d31dc215de1607b0dfc927412618c2d8f79166dbaba":hex:"8d74d01b582f70b92f53b43468084e1586d9b36465d333d5faaf6911e62fe40e":hex:"ef7f6b6eb479ab05b3f9ab6dd72eac8b1e86d887f1bcae363cae386d0275a06f":hex:"7442b2a792a6a29559bb8a515d56916ee18200580aa02e1237dd358619382d8f":hex:"49d2cbfa0897b7d961c293c1e572fb26f28e7b956e746f6eda90454c1370a29e25303ceadc7837514dc638553b487ef9487c977c10625409178ad6506d103c487a66655d08659d92a4d5994d1c8ddb28fe60f2e49577d6e80cae1478068c98268f45e6293c9326c7f726ec89601351c0a26fd3a6549f8a41c6f58692c86594c0"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #4
depends_on:1
4:exp:2:hex:"0f0aa84ef12e10ae2b279e799c683441862457b9bc25581c2cd3d5b58a5b3246f74f4230c2427a52f01f39e825d250ac5222b26e79f7c3b7066d581185b1a1f6376796f3d67f59d025dd2a7b1886d258":hex:"d02b2f53da48b923c2921e0f75bd7e6139d7030aead5aeebe46c20b9ca47a38a":hex:"d11512457bf3b92d1b1c0923989911f58f74e136b1436f00bad440dd1d6f1209":hex:"54d9ea7d40b7255ef3d0ab16ea9fdf29b9a281920962b5c72d97b0e371b9d816":hex:"601cef261da8864f1e30196c827143e4c363d3fa865b808e9450b13e251d47fa":hex:"e9847cefea3b88062ea63f92dc9e96767ce9202a6e049c98dc1dcbc6d707687bd0e98ed2cc215780c454936292e44a7c6856d664581220b8c8ca1d413a2b81120380bfd0da5ff2bf737b602727709523745c2ced8daef6f47d1e93ef9bc141a135674cba23045e1f99aa78f8cead12eeffff20de2008878b1f806a2652db565a"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #5
depends_on:1
4:exp:2:hex:"6a868ce39a3adcd189bd704348ba732936628f083de8208640dbd42731447d4eefdde4e22b376e5e7385e790243506990174f7f456ac06c1d789facc071701f8b60e9accebced73a634a6ad0e1a697d4":hex:"f7285cd5647ff0e2c71a9b54b57f04392641a4bde4a4024fa11c859fecaad713":hex:"5463bb2241d10c970b68c3abc356c0fe5ef87439fc6457c5ee94be0a3fb89834":hex:"3ab62cdbc638c1b2b50533d28f31b1758c3b8435fe24bb6d4740005a73e54ce6":hex:"2dbf4c9123e97177969139f5d06466c272f60d067fefadf326ccc47971115469":hex:"8afce49dccc4ff64c65a83d8c0638bd8e3b7c13c52c3c59d110a8198753e96da512c7e03aeed30918706f3ad3b819e6571cfa87369c179fb9c9bbc88110baa490032a9d41f9931434e80c40ae0051400b7498810d769fb42dddbc7aa19bdf79603172efe9c0f5d1a65372b463a31178cbae581fa287f39c4fbf8434051b7419f"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #6
depends_on:1
4:exp:2:hex:"bb6b339eae26072487084ec9e4b53f2f1d4267d205042e74c77fb9ca0591ba50c0e7bf6eb07feccbc494af4098e59d30f47fc60afbeb807236f7974d837335bc0b22288ef09ddfcb684e16b4c36a050b":hex:"34aeec7ed0cae83701b6477709c8654a1114212401dc91cbe7de39d71f0c06e1":hex:"e8071ccd84ac4527e5c6e85b0709ed867776f25ae0e04180dcb7105ecd3e3490":hex:"fbac45b5952200ad7c4232500f2417a1c14723bdd1cc078821bc2fe138b86597":hex:"c4292d7dbef3ba7c18bf46bcf26776add22ab8ee206d6c722665dec6576b1bc0":hex:"228aa2a314fcbfe63089ce953ac457093deaa39dd9ce2a4ece56a6028a476a98129be516d6979eff5587c032cdf4739d7ac712970f600fa781a8e542e399661183e34e4b90c59ec5dc5cad86f91083529d41c77b8f36c5a8e28ba1a548223a02eaed8426f6fe9f349ebec11bc743e767482e3472ec2799c1f530ebdc6c03bc4b"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #7
depends_on:1
4:exp:2:hex:"be658e56f80436039e2a9c0a62952dd7d70842244b5ab10f3b8a87d36104e62933c9627455dfde91865aee93e5071147bef24dc9a5aa23003d3825f9b2b00e7dab571ea6ad86415dbd30c0bbdce7b972":hex:"d3a6eb29b180b791984deb056d72c0608a2c9044237aecf100ccb03700064c5e":hex:"047c29e4d1584fa70cb66e2aa148a2aa29837c5eee64dcac60fdba356cdf90bb":hex:"41c4792161b1b00d410cb79cd56bd311a714fb78dc3471c25bdd7479f2e9a952":hex:"cd4936d7bc3ea0e7201bcbefbc908215a97680ca6ce8672360aea600b6564308":hex:"2c25557f6db07db057f56ad5b6dc0427d1a0e825c48c19a526f9a65087c6d1ead7c78363a61616c84f1022653af65173a3f9ec3275f2b0a0d0bc750194673c0eaa6c623cd88abb0c8979baee4cd85bfce2e4a20bfebf2c3be61676563767dfe229e0b7be67ad6fcd116dd0b460708b1b0e5c3d60f3dd8138030404d197375d75"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #8
depends_on:1
4:exp:2:hex:"ae537f31a28ca14500e759716bc207983bfeab60b25079fa30b77b8d41244cb9fca9e27d8ab84cf9b9ce491ec5d8cb671eb52777be480f05115ae6370f30159a94d50ffcc64454678ab1d1ac6f166fa7":hex:"8c9cb2b19aa3abe83c8fe7da96e9c11648252653a29dcd5bf0ac334ac587f032":hex:"9cdf6f1a2bc07acd4b0f43b5f2b892a1153e2669f237d257923636094fb40b54":hex:"692d512722de6ba720fd23c8994ac63179b5f7e611addf9cfacd60e06e144a6a":hex:"bbeea7b2bea821f339f494947c0b4bae8056119db69a3cbef21914953729cdef":hex:"c0c4fb7080c0fbe425c1b756fb3a090cb0d08c7027d1bb82ed3b07613e2a757f83a78d42f9d8653954b489f800a5e058ebc4f5a1747526541d8448cb72e2232db20569dc96342c36672c4be625b363b4587f44557e58cedb4597cb57d006fda27e027818ae89e15b4c6382b9e7a4453290ea43163b4f9cae38b1023de6a47f7b"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #9
depends_on:1
4:exp:2:hex:"2f8994c949e08862db0204008f55d3561f3e0362df13b9d9a70fda39938f2d331bf3e94ea858160b832fe85d301256f55ecdb1e8fe12260b9bfe12d6e6f161474fa2311e12e39b0beb0fcd92a6737b73":hex:"b46671cf7fa142e7012ed261e1fe86714711c246c7d1c0330fa692141e86d5d1":hex:"3ce9a29f0207d079e6dc81fb830356e555f96a23ea71424972ea9308965786d3":hex:"db950000c0776cc0e049929ce021020adc42d29cd9b5d8f7117fbe6bde3e594f":hex:"fc18ee6dd3dac2306774f0ac36cd789e33462d72a8c75df9057123db33e5f7bc":hex:"8546362cc8af9b78dd6e8eb2c37db96e70708852bfd9380abedc7f324575a167bea18f632f3e19d099cfbf310773f9719eec036d2e09f393a023add8ebdc4fb87af43b2fe6c7eaa4d39f8022ce247aa45fdc84d1b92cacce6eae8252a03ec2ec5330c01f56d113fd2ec3d0240af0afcf13ddde205bb5e7c2d912dcb4aee5dcf3"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #10
depends_on:1
4:exp:2:hex:"0c85e31487de1d7ba4a7b998ac56dc42c6dc0eae7bf5c8aaf1e4e78875f5fb47de878f728f73f83dc2a2f550b96c8b972d5ca8af1a70cfdccd015ee3bf0665dd1941fc6a7317b9d0d06658f5744cfbd9":hex:"9aac37bce1a6a81dc7934e23747991e3cf48c55ffe5a57781c41768a35220a01":hex:"db881e6d0dc3b62793d7da5fe5a18e33be9b93f4a63a00a878dfbecf0d383bd2":hex:"f743ce1b72f3de4c901369eed581c626ed3081ca707e6634fdaff46721ce0878":hex:"cd52da3ec8a839c537dacdea8506a3eeee879de388ff5e513322d6d1bb3ff694":hex:"a5bdd57cb8fde6298e7c5e563afcca60dd472eca484bd8c3cc17f3307be09b601744dd3ab9e8a44107c5868824575f850c0f399b280cf198006f83ede8c0b537e9be227fa140b65995ad9dfa1f2303d560c3b7f59bedd93c1282ea263924469411c2653f87fd814c74cb91c148430481d64bad0fec3cbb3dd1f39aa55c36f81b"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #11
depends_on:1
4:exp:2:hex:"93161b2dc08cb0fd50171141c865a841ca935cfdd2b5907d6ff8ab0348c4ceb05cb9f6e5912b90c3349a50ab881b35a1d8e9be44b5f293482548d4787762ebfb03c73c40e45385e8b98907cd66f493dd":hex:"0dceb4a36326c4df1685df43fddeecb5d0c76f00eb44826694f27e610290f6e1":hex:"105a8f85d6959f3e043ef508cfea21d52123f03b7aea8034c4eec761eaba1fee":hex:"bf781f7e489d9b4b5aa5ee6d1796468af672a8d25f311edf3c4b4dbf433d703f":hex:"c81d6bcf1e5bf37e39dda1735c6f193df115b1a854a12e7cafe060afe4589335":hex:"4306628124d0100fade7eaaf5edf227d50771f9e5f2e1e983800eef9a39fde0b0c280e63c8728d836b5b93ea794a32c1c04cfc54bd5300e3febb5fe2e1023eded8d7cd180279a598f76823e8d5a7dffcc93a09deec5d1f80838e938fba4de9f47e94b99382ae55f116df9c3b3ddf7e50516e203645852a415796f03a86418107"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #12
depends_on:1
4:exp:2:hex:"1ae12a5e4e9a4a5bfa79da30a9e6c62ffc639572ef1254194d129a16eb53c7165399b3481fdf24d373222267790a0fec681554ff702658122e91ba017450cfdfc8e3f4911153f7bcc428403e9c7b9d68":hex:"8280cfdcd7a575816e0199e115da0ea77cae9d30b49c891a6c225e9037ba67e2":hex:"226732b7a457cf0ac0ef09fd4f81296573b49a68de5e7ac3070e148c95e8e323":hex:"45942b5e9a1a128e85e12c34596374ddc85fd7502e5633c7390fc6e6f1e5ef56":hex:"6fc59929b41e77072886aff45f737b449b105ed7eacbd74c7cbfedf533dbeaa1":hex:"b7547332e1509663fcfea2128f7f3a3df484cd8df034b00199157d35d61e35f1a9d481c7d2e81305616d70fc371ee459b0b2267d627e928590edcac3231898b24ef378aa9c3d381619f665379be76c7c1bd535505c563db3725f034786e35bdd90429305fd71d7bf680e8cdd6d4c348d97078f5cf5e89dee2dc410fad4f2a30f"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #13
depends_on:1
4:exp:2:hex:"29e20d724dfa459960df21c6ec76b1e6cabd23a9e9456d6c591d7e4529da0ef895df1f837eba47a1687aa5c4ddcf8aaf2a2a312626ca3e20034fc4f28033c7d573f66ef61ab2ea0c7bf0411a9d247264":hex:"3713b601e164b1a51dda1ca9242ff477514648e90d311a06e10ce5aa15da5d7f":hex:"ec68be33ac8ff3dd127e051604898c0f9a501271859376653a0516336180993d":hex:"9935499661d699a00c622a875441b4df5204958fe95892c8ce67f7dfb2be3e4a":hex:"256a4ba9e8f439d5487fa5eb45efcf1bc1120491724db3abe328d951f2739fc9":hex:"73114cb3624d687d4cd49a6e769dfc7a3f8901dc41f6ad1df4ce480536fa82e52ae958d0528640d92b8bb981b755058e32c4733682e5c4c0df41f3505a1643a0dd49cfdeaf7a18adffca88256c6d2cceb838af6c92a64bc21cb7a760a0391291bfe3575e014fc156323f8eb5e86518c669dad8d29ad5fd4ef6e296f4a0764c26"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-256, 256, 256) #14
depends_on:1
4:exp:2:hex:"1353f3543eb1134980e061fc4382394975dbc74f1f1ea5ecc02780a813ac5ee6cf584db2447afbe2c8fa0c15575ee391ba60219332a67b95d90ec9de6b8453d4c8af991ae9277461ff3af1b92fc985d3":hex:"345b0cc016f2765a8c33fc24f1dcfa182cbe29d7eacbcdc9bcda988521458fc2":hex:"6964b9b9842aec9c7ec2aad926d701f30eec76fe699265ae2a7765d716958069":hex:"6a03c28a9365c558c33d3fdc7e5ebf0b4d32caac70df71403fd70ced09757528":hex:"a58546c72a0b4d47c9bd6c19e7cf4ab73b2d7ba36c6c6dc08606f608795ebd29":hex:"5b029ef68b6799868b04dc28dbea26bc2fa9fcc8c2b2795aafeed0127b7297fa19a4ef2ba60c42ff8259d5a759f92bd90fdfb27145e82d798bb3ab7fd60bfaefb7aefb116ca2a4fa8b01d96a03c47c8d987fdd33c460e560b138891278313bb619d0c3c6f9d7c5a37e88fce83e94943705c6ff68e00484e74ad4097b0c9e5f10"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #0
depends_on:2:3
4:exp:3:hex:"096349506f3a7653d54db7ec1d09e93413edd175b6ddbeb00e56752a520ac8fffc7983b918acadaa71a67e1624f1b5024260a0495fdaba58aae41df82505012d480c8e4f751fd7ebc39f9becd694b2a3":hex:"":hex:"":hex:"":hex:"":hex:"f4c7bec0c26cf3892d214549ac6f3d82f34c6966d4295099ee56166e879a70ecae130251facda351e903d877b6c5eab5153ce87ba6c7cf8bcc61cbd14cfbe34cf1ed43678aee69cd87b60e6bcb6ff48ebd44ce9e31982d8fe20aec34fa51d625f845f61056575969bf785c2ffab4dcc754f13de63423e94bad8d5e166d96a62a602d3ee4045df162028b89cac45e6207d9097f2b3ac0ab17729251985f276f1287f5c56cc9ba1a79fbdbb291f3a945fbfdbd63cf13b82ec91f7b1085b33279e3"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #1
depends_on:2:3
4:exp:3:hex:"aece2087b713992ff49d3bf404dcda18403e015632ac03735fed29102cfea6ec1b574952687c9bad0e9aedcfc1da568be632162a83c802ab94f32bbd87f6cf4af1f2703f4a02af7d60e22383a770b9ac":hex:"":hex:"":hex:"":hex:"":hex:"c0344807d5e3ea29fef73afb2b83dfe0aae186047fab6b603d8608df49476be18bf1f0f4707198fefa18804404887ea3c598d887e938440e1fbb8ed0a1a330cff84d952cc6405b12e7bf51b0c67d5e4896006dedb44637e393a97925890fd5176252f69d43920043844a91d0840844d89b8715052cec31e257c121d3fc0ee807b84afabee59624a00703f464b0079f12884a6e888ae4959c5423604f8ae2e6b57f4428e10b680cb74cf20417380dd5378449a24ef95d9438b0fee386badee962"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #2
depends_on:2:3
4:exp:3:hex:"c39e77d579755aacd454ab7ca6528596c397f28bcd5467cc7e0fb47f398e875da83892a840381c1bc03b7a223e92904a714dff45759124fa33464a97d7f0d7fd2d1c6c21663d31fe80abdad59458c228":hex:"":hex:"":hex:"":hex:"":hex:"10f8ec63a550c31ecdaf2fb1b373f71f18d146ea033dd65cec2ec0b73b55bb6f3fbb7136dd045e09c4073247f093493cf26b6683bc9ebc98025f75fa405fb8deecbffeb0236a33f0ed6c7600d992ce5a268c86085adadf68047178ed89d93d739351f892723d8d6e4f428946e4e6dad1d640a9c11de23ce9b793324e31dfacfd367d86855a28cc544f88b8a91506753fa061cefcb9d77bccc15a23a84dba644089ee03db8374fee91dc23af6672159b0d2db219ffd07390b69879910b5c336a5"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #3
depends_on:2:3
4:exp:3:hex:"d2e8a25249ac850fd3b01f62cd1eae3dd94d38e724f8e2644b7bb510c37f203890242b11be773beb202e9ee93899b60a00ebf08db1648c8750b14d7b784cdf0a6d4e7cdc816469cbdc3a08d6d32503b7":hex:"":hex:"":hex:"":hex:"":hex:"019f74eeef674ef100ba4a1835bddeb925fe6fffa97113dc00d7d8c0ed486a73e831561ae44c5bd90e189fbe2bb1bfb84f3e82ec8809699ee8c2fad80b464b6b344999c364868300c1edb065ae86109dc29516f2bdfe2a046ebc8725044c382d93990f1cba185f61f71fd22fbd076d727de32a6c1d2f430bed491c9d09eb6ee669a1dc4f8048c7be199c7cbb5aa4f14d1423c8a54763869f5dee947f776ef2543ebb88d3004739089efd86b7b22327ae952747068b35d4b3d86cac1debce3e41"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #4
depends_on:2:3
4:exp:3:hex:"cffc6c44279e641856c39f14ed35440ea2f149c77459106f960caf910af21c109067c0f9445320adfc0aaf0c86120a38584747b4049588e5d93569fcecd358c51507bed59f96145bb8db6bfb4ade3a2e":hex:"":hex:"":hex:"":hex:"":hex:"928d6d9f9128b0af64028d5d2e94414af9f8dddd353e4155f42a5d08f3e530930e01ec0dddf25d65de7f49de702791372c71fcaf5f20bdb24eb999752bfdfca28525b16308d46cefb0bc3b260490115778161db2faebbd687b940ba098e3d5be640565b81ed9d434b6861fbb4cf034ba77380562119aa3164dc53653d4e82ec84cf351c35b1b668343faf17f172eb4c0cc3999d7d24aaba58dedf11225336b5bd747825d2ae9100cf6da3276f26cec198e52edf9194162483aa4a45fa348d0cb"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #5
depends_on:2:3
4:exp:3:hex:"3a1f0474c279548c086de9e12ed754c49a0322e6631f7f441c8024fea654bb6ce245c357b13ae94064d1b41c23e5e0496199e8ac9d535f8d95fcf85fdbd31eb33c20793f35075c412ba7213194a873fb":hex:"":hex:"":hex:"":hex:"":hex:"954b58042d028abd00f7ce3d39fdb61e0cff6c40391ef8629e87101915771b8d0c7e24292751aab1219645743c6f54306866775e28b54818c759a6bf807c4982eddd4be5e22fe35a303cd503d122cc3fc5cffe50b03117457e2efc1fd91a9768964552116811b0e65856e8f8256681c722ea2652deaa2498025e84262a3fdd78bd33bc36c057e198327a33232ecd36501a0acf997d0149b4a833153b710b90c8722b232a574d22e7026a89a4d9cc3506cc9942705a162b34db9f49301a087dfe"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #6
depends_on:2:3
4:exp:3:hex:"e5f4fa500982bdf8b023788f9a5532482b29b12e8ae776111adaa617a958ce8977873caee6e82c5098ae77287bde1d8295b8aa125923dd7f8e05df78adc29898836be76df7c5aafba6493b211cbf8b94":hex:"":hex:"":hex:"":hex:"":hex:"5b3fc1a7ea418debe79994bc0a8c86f487ed2f320c34293db950a1a026c239b8da6226d1dea509a0fe76f5a811c9391a622343324c293a0090587c10193a2961e358d1e71c269827e0d44e93d87984f47acf5b4751c8c066156da1c44662af4826cdfb5f7cf98b1f0200d3a0d7b99fea7f1b17dee7acfa5baee8f95ae4e0bc050bee2eeea7c09baa729e6e02ed19476ba3f8f5a8c1660de0353df8723efcd98f5fcaa56f6eda77f2d15c76d26989aa998c4afdc53ffcde47dafba8fe5818e8ee"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #7
depends_on:2:3
4:exp:3:hex:"b9444339a8738df6cfe95b6dc28980d02799b2ec5c8dba9ca98fa8075621a04172b0c9e414ea33c8bc4b3beeb536161cdb9a2a516f3e87bcc9f92ebbf4ac1a900559756903b72c4c1b5f9082d8b341f5":hex:"":hex:"":hex:"":hex:"":hex:"09465004f009ed378f440c10fb122a265f464d373e7f1a1719c713f6bf38d28fb5447c269c127a0c10081533a847c0e19f4b640be0b1edf84d95025d56679e5880922f29c942e7284296a9309b4fab1b5bd9957d470db28d3d36a3585fd37573e8e3355d03690241d6f7211d8c6b054a813ba25f9cda76202d3270bf12f66d2e5ba5a946c7d28dd22d55d34a30a040aa9782d1e494603143d436cbb0212fa0df6d1bbf4f19818b99a68d9cb062aaee8fa05636fc60a072ec6e5ef24566c6b96a"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #8
depends_on:2:3
4:exp:3:hex:"2aa822efa22d4cd65359107c46309033984b8e9c3ecb1b77078a09ad9ec746ef4f64b287bcc3064867b678f81ab209db3ee132a11f8c9246ce0a3d6deb3345f9b15e4cd048289991c64a21afc46ac98e":hex:"":hex:"":hex:"":hex:"":hex:"7b79baf0126782bebf1794fb48633dc69ba88d63504d27a206d974854d446737da4ca1fc5bbc54368966b583dc441b105bb30b3be19f2778ed31564acf333b7c4cb1727480aa985afd80396866e10f6da31287cce07358d6308e56e3bbce8613bbf472aeaecb27e66305e34af593c8631508cf7d2c512df7c9b3ab04a4ede436b9d2e6919c03a525dceba10afbf6e8a641591d09e8a90543f1905b08537b8868337c774c20ed47df32d115a7f3306d808bb82d06bcbdc81042d0a16a3fc8d0b6"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #9
depends_on:2:3
4:exp:3:hex:"a32ac0aaaee05d57cb3a626fd26854ef08a3ad42a3c688ec6a9f9b67bbff02f86df150db0de2e3612cf106d9f158fb570901e1efb12252666e7a680513cf22bc0172c4f8c0d8b2eecfa1d471c10c9ef8":hex:"":hex:"":hex:"":hex:"":hex:"8271bd7aaa795b58d8f741bc207332335a68feb66ac9c3bfd5dac72f20807029f555c3bcac629d228c3a77d596d99c5d545a8dcdd0a2fb2a5eed5c3492618dab4f763ecd7c6580817c6a7acca42d81831bfc13f38ed56ed42055877c7f31dfad35a73eb2052f6f9183dfc89b5926680dc2aa85995d42a0c073c881f1ed332794a784553493bfd842225030e0056d76e52810236b17f6f067d1272372395ffe9c2df3145cc65ed2c6f2f121dfc6c1eb8fa6132b44ee0373c7c027af80383d4a7f"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #10
depends_on:2:3
4:exp:3:hex:"c586e0f5999f107281dd5c7ca1ff88d4617b4fd1bb61313895dd4bede875c27b5b0e6c5ba15e8725eba8fa009406aa3d8b8b66f13e07c8918c0f3f55262debfbedfc641329e1fcd6442c245626cfd206":hex:"":hex:"":hex:"":hex:"":hex:"9d4f4f688406d8e57d96369553ee39267a9df9020d7fa78b39e1f246675b70a8080cac5aa6967e78c55071241e20a9446a82507a215a6c5faa3a2ea3c05c12905558d98a8eef90c8abffe6cf8b874c5ef057e365fdf179438de6a78b4dcc075b41aace875a5dd35a44f2d2b17d6ef6aa91f79354931c4d487142f7ac2120fd78caa6c7ff5298729de16c0e8285d73a3c6a95ada99f329dc9aa0924b0059a6585853296789b7e1129432baef4bbd2240a8ef7b19046fba104a85d43aee0ebf021"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #11
depends_on:2:3
4:exp:3:hex:"bcac6c2160455e7db38a9c94ebd329c1ac043b6ff607a9c76a86156974d30251b4f4b14e6cf01d407cb426ad61608d1599a6b7ba9402756bea2709cf3b162cbf040d0f5f38fc4584cb9cf4e6a7bb3984":hex:"":hex:"":hex:"":hex:"":hex:"37d76ebbab0d4c8354086a5c5edd5aa6314a4770749d468b9e5d3454f2dbc9b25432f2d5d9f4b88bea7f9835edb22f8a7b09bd604703870abee1160369d0575bdd3847ee5fa93a9fe9aaaac0d436022f94d1b96655ab00feba1f40202425e51b084e372249fbc37f49410fc9d4d16173a9bc29181b62e342a8835f818d2647c45b6ce6c5b6f29add13d57e80513f767339575671bccdccdc9d093dbd72c91ba07d81c58ab5256b6744a94f0e75482e3848de891dabf384322d1419814cfe1590"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #12
depends_on:2:3
4:exp:3:hex:"4b667d35a481779ad919956ca06e07366a974738c09a5685fa23b3fcc1a54260cd39d725a7f2661ea86a2d57cfcd2a91e08419476bdc5534df58c6c3b077d3acd27ace0472f91854c164de7f76a9b1ac":hex:"":hex:"":hex:"":hex:"":hex:"c82e5e2fb08171c233670e9e5403b07c600be4e91ff5b57ae284c4d733139b56ece720e82d3f9ac185e37d0f44d5281224cb5f9d230dbdfcaf1756389fe752575a2764f6ae775d0a82f2eb1d901ab04b59b54b5fadb2acc9b9af3e829ef19571dc416752b1bb0935ea2f3ad69dc452285c2f08412b11794134ba3bda0a10425576e88ea7b069b74b436aca93fe9dd1dafc78da1227b13d70157f60c9bee644451f8765e4c8badddad6c779d6b42d4e8b5ba65269186b04c38db348ab5f7a4146"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #13
depends_on:2:3
4:exp:3:hex:"c0db9453f84c2aa74bf93ef21b9e7802bb8995f6fa5e634cd4064ca2a0075319a969bad1345bb5432df63412807a646d2008394d83989cb4a506990f59f8da80e6b3a1df3fb8d726639d59cbaed1562f":hex:"":hex:"":hex:"":hex:"":hex:"120bc268ca0d3f55d5aff5b360ca4d29a4b8ec5cb624f9674ef0a67b90bb70c238b94b2bf804fe74ca18f8364ff8b1e50b2315f8aa0c3fea663e93c80544284136de1d162e9078e9a074a50b493bcc7e0c83a0047199164a2d32133db57abb05b751a357abd3ad5298773be21c534f98645e94f0935afa53729462acbe55993b7d801bd6b0cbc8eeb5a1c5f0c0d690702f8de0a1a78dcca8862538201fafbefee55cd5be62afa8e5111c89f1f68d0f1760cecc86bf6675cb09b20e097bace037"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 0) #14
depends_on:2:3
4:exp:3:hex:"31836d292cb46aad594171e76237a3422844f62fb14d0cdf63ba587e73501051c7cbb280d4b46412e10927c9523bed1beeb5163737db7f910e444e5d5221c5469655fda4ab7218e63e1451f461b4fc70":hex:"":hex:"":hex:"":hex:"":hex:"1cf3b49f28b791e7c81706fb1a870f1af134a0fb0d2aacfcd6e446caf0a91c04dc160f080ebd5503fb7c16ad9229bf0a7bffcaad07329d5bde4576870758a4bffebb6b5c309114688db8e59a55413b4b37689df38d72bc5358291bbcc0b05af487a33934ce626efde918d0ed5f2deb75a17bd8912a31dccd783354477fa850520c3b97b56c6d2b9e4a05d49bc36e6683271f2322c9a546fca88c502187a5f4a2035bf5c527aa312f16c357c37162d722510b52ff8357490a096692572cfd8b0f"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #0
depends_on:2:3
4:exp:3:hex:"a0c341ddf73d9404177a5fde32cbe21319c318f35cc9afca9ad41a3b06e13491e843cc6afdf2bcd00ce77ff06ce3d8a54772c46baf142e569ecd9131d6185af3575bb62a41cb646bdcae8a7a9fe60cc5":hex:"":hex:"b83491ec1bd89f3fc84acf1aad6fbeb8ef6ab949f41adc6d0dedc53722c171fe":hex:"b76cec3d6300ecc4a02e810296c7e70bd9b4e7121fc5e971cbb94337980fddbd":hex:"2a25cb0ecf913749ad46b585c76097739a14ca7b59f1f3ce4f79bc8a4afd1378":hex:"98c01d4527fd131cc327e9632104d9eee10407cd73ab607228d37b9b72ca2c987aa794804d505d072561ccd5016bd4189ac9e3db9187822877dd533347b5d2071818bb7683312e1e8806e9b73b021777f7f878bb7d304ec58ce92e5e36d3d05a7383dc77f3fe6eb84b615f3f290bf8a43c34ef5478a30a6ad616157c9d7dd046aa66b522bcef61c9d19382c32425d38ed3fc049e73035af1e8b97388de22c4dcba0bdc09fd36ab7eb3f67659cbd92b8d7f6d74b56fc8daf17068c65fb016e29f"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #1
depends_on:2:3
4:exp:3:hex:"7817fe880c0a4224eaed0da5f3962727e4b3be567021d37d3b6d4cd779274378f1cdab91c4e7c1433dcdcd0afbe4b43c32a2b5ffc520ac3721bfd5352fed023d04439c176288521319b5e315b6e5e85a":hex:"":hex:"c7708c25003e6587fc8c8116c500d37299f5d5ffcad3405349351d4fed623874":hex:"45f88f2df43c4b9c3d829b7cfe61904ddf658c16043271f01c5f06ad3ec7bc32":hex:"883cfd717ad8466035e6d3f3c04813e21657ad62eeaca449785aeb0836ac94f8":hex:"6e0633c532099ebf0b10d4ad35d78a48b82fbce37913e655484ae40e29772a25630a7ab37f1d0ecdce27773a2ce88521b171432c07c02269df1822d2b6cde0d9f768375d9c60e688f497fb7ae262cdd5f7e8b84b84411d619c36529b41576ac456a240ed94d750fa722db874098ef7200c74c3234a3e5f21fcbc2cb5d50c4297d1e70901b8936964ccd242098002f4c8ed7dbf49de8c2a924c737f248d46ac1469f676377ca52cba12f28d9b534504d6e8423b5404b7e14de954b4225bb53551"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #2
depends_on:2:3
4:exp:3:hex:"f2bb6edec000982bfdb301d1d88a23ce840e496a4f595a662e4127571264f1d7e9e283c567f11e7e266459fa781c6fd95339015836ebd69aa42857010f44e8a72b81f501c96931fb491dc1192f6f6a27":hex:"":hex:"ecd5ea33146cb74a707eedb8df881eddb1797cbb7b16c16f8d741d23795774fc":hex:"d410d6e2e848f2241ee45c9870064ac0217d97f59a8e80f6b5107ff0e4240bd0":hex:"8a8c58fde3b8c9711757cb17e46587d0c5187f758d64478e9968604af0367136":hex:"990b1f68152b3607f3011f8d04ea33a3e8fc479c8a6eaeb589133569048fe1284ab44d51bdcf4f0cd4c8d64f4c6337cdbe5f4f497ea90ee4204845bebca2ffde7831cf49892829322644c4e20a45a9885ff619bdf5e79ee53c26f47072e20a46d2b108d180d6ba5859a696f472bfaa80b2fcc7eda374a3f91ac0b06c9f13afac1af244a389cab4489d0ee04a0598f9c5168f39b40e7127dad9f20d69ede6cae7683b25ded1cf9d903541fb4b0a804d7c163ab068d22949f28a8f4e853e691e51"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #3
depends_on:2:3
4:exp:3:hex:"6968f5b87019b4cdafcc9f3a89321f25ef5d8d70fd0781c9e3bb01b3ada18c8b61d9142b639aa75f5f9d798ca538475d09b121048e8a0cc4b2286efa12fa8b4b959938261a1ec8e607526b7a27931191":hex:"":hex:"fbe6b8af6685422eeeafc32327a99104b45ca5602513aed0a5c6235328e8a7a5":hex:"04f137391e27caffecd4413c775117feda27cad839aa900ff2af47c700034b08":hex:"f185925cc180e556a0703a5956ab6d846121f9d9cff97f65bbed3bc44904cb5f":hex:"c8bbe16192bda74ef89d9859b248ac658896bd40b5491c90e923cab6815ec3d2126c62410370f5f44e01fbf1d1653064aed835604d5fd0633c8b71cdde6c831cd91d69e420db83e6d5d82c26c47a11f2ede616a2885a884835cf2142a6ae4cabe989700125df12902374bcce04f3fd78f034e50398d9bcf463dde6796627820c75a7efee82fe4e16375af57ad3154973042e0a92110ef745f468377f6cbec5fa1a1470eac80408f8e96d37248b100ef8476c2a85cccdfca5696ffefeeecda9e0"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #4
depends_on:2:3
4:exp:3:hex:"e8e99ffcf08aad8e50386f5d079d79d3db783a74165c6126b42b3140f744a7c723541930c8c772adb62981dbef8d054ecdcf1c30228904bd7ba31798bfbbd64757aa251ac9a1ae8c20a050670feac59b":hex:"":hex:"546e04247d6cb5212a57b62f99e1cca767a5768cf79296f45f0db24732ba6368":hex:"fd45f66c8dede41387373c38674605f3e075c9b7cfc66123a5478b8f8e3ab276":hex:"39911a79c6edbbc805a50d2aa018742094177a8e216d647c64428c00169ab2d6":hex:"871577ddf34b29e5caf132aa82e1d2f1586b76e39aab62acd02f6d4440908a772ac5f6fd48c5f55f1ebe0e76221ac46b834a8a4f5dd9958721ee053ba3aef1574ebd980a5da6a94693662717ee548af0f921421d1afb814e4d1799d351889d2a1bdd57570a913e428e6613b16e158c1cfed038f6578920d60db73dc10a40da9bc363a0206b4e7e49670eccea866efd9a05bc237042cf052f2a4140f9377e3c6792b88ea06323fcebb99c643fc1c3653758d6866cdb148837fb0fdf77de1564cf"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #5
depends_on:2:3
4:exp:3:hex:"c7774e199b5a8c0b306ca236163249044ec2153dc89bd1c1459cfd40cc6069fd1921837aaa80f4dff34a97b4dd7e94c0143efa24f34924fa52abb4275a63cae7048a7fbb8b76300fa8d109f9561f1699":hex:"":hex:"1f437f758512071bd23d091c2b1ad8d51b99acc663e1d037fc5421092cbb1a45":hex:"c622ac1071b50e4f899e4760cfed476adc013b6ff95c9b7be671f79cd2487ba5":hex:"f973f45f75fb0d68e0bc5a723a72e722e6c8f3fea08d785141c78786da5101c6":hex:"9475c697af430e94ed396c707bb7d5ee5bff18405131a0e898ed38065abc28ebdc1dc33d767c4dab69c846e3350bb414ef2d43798710958a6ff3e6b55de93c2ac31793a1dd4b07379e364ce72553323b9bcaa8839cbbbd347b4a82010b78967219b84c6fe9f9285ff741a0036aba6bfa7dd0d5a4ffc1936341b0e2a31082123b6d2af6740cb3ff43bb4a87ee74ef7eb06030745453d2ec225c8f31d214f1dead0f29af01ebfe90d2f8a8bf5e031242ebfcbd136b3e3db1f63a46f69a26d6159f"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #6
depends_on:2:3
4:exp:3:hex:"898963d0237c58e4b7b6e894ab271555407d3ae8c1c4599f5f5490ad5701984a6e5ddd58d311b547f6fd2d4d67addb4ca6b86839b83978baef72b8cfbdd0cf180518af0e32e52ad4a73db460af05e187":hex:"":hex:"cbe5f14445cd310aecc97113232a0121ed2082f2c4152b4be68448f36c91b1f4":hex:"efe0ef028e4179ae10b378bcda3d96056ff21d94404bfe022b563cb6690ad563":hex:"98cf6a771c05f904b53ff9b12709d20bc3f1821385cf27ace7a4a584e73866c2":hex:"5682b6bd667b45dcf16527a817852b52a7f5d0fa8c962f3dd3af63e7e71990da92b75e9fcf5de59b1565f525a734e978ba74dd80fe89a2e527960ce4207b9ca514d933676ad93e6dff5d57314a45889637a623eb7832854c3897faa511ed6dd246d2b8280e7d0524647d4bf7715b5546e0a9a1dec246b1680adea2eecdc354fb3122654102cd0bf94ac9333caef3fdc369e7649653352739783d048e08e8d231b332fa1558745e2ce89dd76d1dc442a71dc3d5eb7d3481558941e261f989b097"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #7
depends_on:2:3
4:exp:3:hex:"426bfdd4ead656611ce49bfd9f213843c194bb6863534ebc258415148f457e6e685fcf539922aade348a2af678038610af676246632dd70920d661518d4dc5221381b2fbf1c2f3bfed01cbb930398095":hex:"":hex:"971785b18e244d03e25b9a80c2c2204f5bab6dcbcaec986342450eb9b376bb5e":hex:"5de582cba43a610866578604c9f2a542831f41c277d50b324f4edf1e2e5d498b":hex:"46e4c325d2c45e00a3c17ab35115b5370abbae61337eb2da4e6aa91f951f55e9":hex:"f2e8be2e994b74a4945fedabb167778523865ed27826f9c26ca2b49bf32af1626ae62bfeaab13e9bc52a081f365062a5cdbed0872f6479cfec5a5e79171d97ea898e8d10ed71203882d1d7b7d28c5d59b8872985abc628e73622f616c4c0904ecb1e4518be8b4398662dff8806c3f43750cc9be95aaac2a4730f40323d63af157d13555d043c4d0d7cb53f202df282fdfc5544a234f71121e893814f4bfa926351c5e9427e90f1117a3bce7a16f0e08cd06c3d7c458f9d07ca3269e015733aa1"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #8
depends_on:2:3
4:exp:3:hex:"ddfb3d1d93e977aecd08efbd71dd48168e67658d93596b742670ed7c8804bd3e730d34a80ca1fb4ad2471ee22461bbda670337d675a17721ac63c3793153830a26b1871b316a3e10e49c555f44719577":hex:"":hex:"390c53a5ec1db52996eb042f9a76e45f0bca76ef6ea31b4642f00658342e601d":hex:"b5436e880c15f03c3bb846d90f3ee5fc5bf5393865a112a4317d724738f5dd25":hex:"d193f932af858698ab086bda36d04dfdbfaf487fae4298b38fef97bccdf63f38":hex:"bdf9e1ba1fbafdb8f4628098aefae4810ee7fd565d0d285ddc3840f8e24a9985c2de57edf5a511079ba6c952c95c626e296fd62f3579ad03db536238fe69158317c9c26d373816343505c60a48e07a00edff8fbfef0ce69ed176e5484d056af02a270bb6fce7bae0b223bfd98ad359d53b159f3295be3fd630a568d2363121c7021ec23b14693be48f5b55e06be3d729c2a80948194b1266da96317bc592362809409a7666d5c168125b99de26da741f17ca52d63685ee8d8260d45764fc78ea"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #9
depends_on:2:3
4:exp:3:hex:"457e49a71da81a2a08bb19b97ba8e62ae4b5ad4ae64daf758a83a75506f9251149b2bd7180f69b9217346f8165b7cd8f100e0b1066e2877f5e5da21b037c2bbf178611dae627d9beaee64a9d0186462a":hex:"":hex:"c3181f694695c21405588f600ac33871b519e2b8e3b876424b32753da483d6ec":hex:"68e717410f99ae13712175e402b51058b7625b7da27224414b472f9622d163d5":hex:"f2cf13d05e853a13ed47c5d0eeb9c0416688050342f0d345ac1bb21d5ae675fe":hex:"fc23aad02870885394ca831b72201d76cf736f08f6132b12178e8e3b016fef8d3bbb849e5d935ab732054ca701154e7d3e87d1b51b7392ccfaa19c4ad28638c67bd149ff67a93c09ee1fa5c2ef7bf9d40844baae79169e52e9990c93f099e036b63b000fb8ea67a13167b045c8f9163045beabe0575fef00b89fd90390b0124961698f4ad8884a1e1faf576de7a179c03221402279b31c93136b9436f9a07b5a67b1c199e7c6cbd0b5f53ee5bd0ef845243077c6eda0e021ac9219f6db5ad503"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #10
depends_on:2:3
4:exp:3:hex:"79e96cc8e77d8fe72cd6c66becb52753cea28bf71680fa541f345b83be79973db4081201bf23c94d1828e9ca1e825ac18aedc5ceb87a4c1b0c333c88d97e0f12d61b338e5ace5e15f71283d31a1ea90f":hex:"":hex:"4304ccb2666b227c92e2b00659ce0b34dbb53451591e32914a60d6e6cbbbfdd6":hex:"d6e74777c02252b0613357b9a582f4d8cd7e436daf1674a663561b62d8ee7143":hex:"0de123897d5f090b52db88e4c0f9fe736ccf27c134b0f5eac61b200d15e07986":hex:"55a369d136e2d903c179472eebfc45ae236994669c46cd318401bc662f38a1f714f78ac9f15c819d2bd876a7af51e6caecff3c650a3e661e5d137a354cb16aed5b1554545bde08c10baaa5bce22284083b43a6dd9941a37f1a18929ced61181c137e9e38c79d107465a5a12f2a2f37788c8e398ac48b2be944d6dd3562c05922c25569c26a1203fdd244920e6c268028dbcf6807c05bbf1559969981467a479d7117a91f210118c1159749a1dbce4d8a0d5f2f8232c5152cbaa6441865ac3a88"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #11
depends_on:2:3
4:exp:3:hex:"b37180874dd4a7e08b1256966ed5845001b0773b5136956dca7194cd12a9d9e1f1dd35534f579307de11c1e64875e9377081de3095d83ced0ea3df2ee8d5be4daee545b431dc908bc10efc04db16ab4e":hex:"":hex:"d3c8aa88cc8d5b59af3685177cf3826cd675854deddcb9b501c40c4288cd9cdf":hex:"6783f5bd86fe178e6a4d303342374ed32853925f143a5ad083c04a9c298feb99":hex:"4774e5d062eda04b680d717f652d87bf5cf635f597287b76fc35e2d5ce593d08":hex:"e478d45fd3eb6f4c398a0ec84f93ea6861f00666753c143506c5e417100077e2c4c9ece450d98c9372d68aeffe9e57ef9176d4084f9c6d02479b516942dd4792a90ffe1e4e49a8156bdd872f1f05facc06e71e581f919cd94fb97208515ba284fcd255ea6f1d1ebb7d351e1ceea1cdee631072d3fc3f4ef9d5fc57a9ca98c88b81003d858cb5be0a3520c34e52d3beeadf91388ec9a495b1fc7ff7a6799ab0af211abf52c15467274c04bd104df14033df000d8624acd253a6c954c0d89b7238"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #12
depends_on:2:3
4:exp:3:hex:"2779f20c02d086d30d53dbd6e7396a35e677214650e39f2ae83077fad70c068005faef347e7f73efb53a92f0629e012c7e1246d07b4e1bea7008dd8ecc7546e3f0a6e0e950e083373fde3fd994e114a4":hex:"":hex:"55edb840b85b391d4f1940be52a3e3824119349c780811c570d2c88dbefcea16":hex:"e83ef56f09f82af4dd91a0b887d3f182dccd973435b74b7b3c432b39a61fe720":hex:"eb9f30f2886d0486c5240f43104e426b36aae0006c4b9c64dab1bb713bcef7e3":hex:"68c3feda06172a191184e0bb77a8f3c9096048bf71ed95b20cba1b1726660900d7d9f97b7ac648c76b50b921c28eee3d401ba81c8a46fabf82301fda8ffe9d76bd93cb275638f7c2088cfde88620661eb844cf953cc141b31e946338a0203c8ae67c2af1330a53251818aebef893010f16a519fcf22060a9aa9c597f3409465cf3c9ccf753db8c0bd3b465b028adfc447e37b5129c17ae9e8bd01f762662c466491fe57384825c163ab8a26d67efdda01b053c19d3bc6545c3661f2ad1df1e33"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #13
depends_on:2:3
4:exp:3:hex:"71c9fb2eb8cca98860f955a8bb3669c70b6f5374256da23fcbc4ffc2e90bc0a043b8ecbf1cb0c7b65a2cb7a47211541f2675512138964d0db8074727158bfb4f0d3c093f1e2c2bf697a48c2ebd27153b":hex:"":hex:"13b1d552e2c8c84f66961ac8c919166a248bc62fb896cff0b8b001cd7e147bd7":hex:"27d626121ef579d9969809762c77068e4573af44b6e947a2892337a11404c133":hex:"456ea206c38662750af39aed5fe0a39760f4dac85b83d7ccbc335f53a160a0c9":hex:"464aee8af42ae68ee776780113805cade246b83a698c34bf4c92e5d81f28829ecdb808884bc7d784397f2b2f8c76a2e3517b53bcdc7257f44ec9357d014af4e8ddb44df98da72775567356f363fb85885f8f22505e5b5a80c824b4a0bc48029e3419d3d2f161b1469cead730cb123ca8387a2c8276635a91d0dcb2220797ae2702468587ac3a70b927625f3a6e2980d6fae6fddf4b380ca0d91eb4aee37b98644bdeac345f49523a241ca392972da02d70364f9401c21fcf39eeaf414a09fdfe"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 0, 256) #14
depends_on:2:3
4:exp:3:hex:"c9e54bcebbbdf44051e80b91cd10c87dc24267923350b6770406551a5069ea2255201f3f15bc3a2e4caaf0b45510f19db299a41db8d56ce993ade44323c455fb1a3f504124c35a9e907d9765e810c939":hex:"":hex:"2819b3ee279d57145ea1020ebc77c46031d69524a843158192e081f2ac91512b":hex:"269ac853ccd332fef61330af7e80a33791ec44b6cbb83006e5ca0670597b35b1":hex:"fdf031b1e0a8016bdf6a6ebb533dddaae1a3a5b14b9cf52a1a8028cc720b10c4":hex:"a1c4c1d6e72dae5e4714bddf4a1cb8d01cff8a3973b12022011270c0de7ceb85ffb6a6aedfa54d0521ff33d748fdef8f29c52c7c414e692a30dfd0013776b58f58421605369c83d4d891a19c782a2d036f9638aba9e24b0eacdee87d4a8011699b638c287f0a12f11ede86a946be9c00d21a31584a2a0da536dcbf86e2df63be9a7b771999c9c7a6b748de713b7da757de2d731a8d980b75136b0fdc75ca7aef47cd36bb9370c5ca0ef81b9a04fdc78698720f68e5d54e1a777e557a1dfb4c22"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #0
depends_on:2:3
4:exp:3:hex:"4d95f31b9606a5f6d04dff1d89b50becfd0882e6cf51c1c5d24ad843bc12d977eba4582c39d793a63eadb63f292568c7fc4270e6c9aec83186a20819a7d35e7f1155ea108794302d593c53ce9d25422b":hex:"43bf6f32b3b5f580b54179e4102d063536e7c47681d6de3cfe88fd8ec66e4873":hex:"":hex:"":hex:"":hex:"e991d000b24ebdf838ba11f9849591b0029feff33604bc4d71acd94301f8d045eeb1f81f3a101a297403a35859113c099939638680d481c86067f54762892f82146f61cce7bc2c85d395348f3ea2aba6bb3e59dbcf8e41a81918b6cab304d44ea1e32573cd6936f38cdc11d3c2f96290cc27b0dfa3bbbafa9394acdf2f4435170b428563427c4b02ed25924226edf8d5a5eca4eec4aecf98ef2e6f75caa70bdd84877df2e637b7fad621c6170ca5bd86e21d0bb01cc90fe2e76353a9d5687bea"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #1
depends_on:2:3
4:exp:3:hex:"1378443dfec3c03d36b16bacc480edfcb1a4a509c17cf4b35787dae3bc91ade6c113a1e0df927a4449ff9e2f4f1cd9a27b07f57ccd6777f6d6bbfc9655f0676d7b4f91712efd43315be7c7f30e51da89":hex:"f67cd35afbc96756499c68a5ea19991cd1ad4880fdc13afaa817608a141e9646":hex:"":hex:"":hex:"":hex:"b32d9838b3f45e3c4b3ede1181bf0aadab96d22790d8536f5913fe95c3ec0179dd1c7ae69430bc8c68f4f30105199b785a11adf7abec007d18abcee2e65df5a211adfda35fed8b9389a61d2fad33fe020119e72c782a316f17f8a588239567315bda461f5f4518a1aece4d0ae028c153d67a8d4ce620e571faa0403c56bcaa864822e4d8ae6d14feafefccbe879ce4baeca70d436218e0eb3a62bf15c018fd4cf66a50e3d9d7cc9e4744e29e9c945eabf03a6a2c4ca57e582b60914417da57f6"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #2
depends_on:2:3
4:exp:3:hex:"69e9396c58ed867eb52fcd046504922e2e9a9b059234cdd3f0a09eee9fdfd45dedf5d3860b25115f8a3d0e2f3f543890a23a5aa278f836577956944a098d18f05900d1b076d30ea745be745b9efc0dcc":hex:"1b6e1bb613d199a5e6f1b5c2ed041cf6f6633e2ef4d50ecad89b28102bf70554":hex:"":hex:"":hex:"":hex:"ee09f7b24cdc6b51a8212ca00613633c1a5f044fa921bec31baf679f5ba66bfd723721a03e0f260a44ad5cc4c580080667a781427a34c3d2fdfaceb4b040ee675491c4dd0c0d13abbe81336384806e37f2729e7fd080fd57011b54b664d58534c831c90d182d4d955676938d484087b0086d2bf2737a912afb66101575ca2bc5acf845f4970bb1ce4441eb667d5096319d6282714a8a9708ef9964cadf596ac3e7b1ba18fdec7e2e22f5e6352e825e965a494cb880aae78477aa3bcba9428107"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #3
depends_on:2:3
4:exp:3:hex:"d2f390fde0b50ea4afe6baf29a75e698fb0275c04c481df03910d238f4e72c6f63a6231df89123c2dbecfe0cb0313db34288f4143694ce2df2484d20884dbca097e35c3fd8ddee5273b53c1149bf5070":hex:"2bc38d852d1ddee2e89b7174032d96c0b97f955e16bc61716c5c64248eb6232f":hex:"":hex:"":hex:"":hex:"e62346c72ef393a2904e982158992df4ccab03142c41d8d29c1454794926c48570eef34bd021d44cc9106401e9cbce6ddbb6c92257e89a787499d7f7a2dd527833307e02f44645ddbcb1303f1da95382c89805c76a2f12eb13d2b0205b7ec0ef21f596c98af608a2f2a2c5e3534e01a23ba25bd5fcba0481482e1ec8138fb1c86840060919d7620cb7b879d1096f64aecae1ea085a793a9f4dd665449ce73cb3036dd5f2a49138ce88c461a0a9e2f0c1fb8338f5eea53ab0a0ca8a8df9c315c4"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #4
depends_on:2:3
4:exp:3:hex:"0cf86ffa1456c453b53305353ce43ad3ba44ebf4c6943cde8613cdc417ee9f6e759c0bf4676f1ebd05c519eb84dfcd3e379ce61016e48cccde24753878f7d8fd5da72518253b2f836f32e5b594d54ad6":hex:"088c917f84679641f491aaf105eea0f02d0a8ae0b7add69645d1ef304c74b417":hex:"":hex:"":hex:"":hex:"79e71d9a974cb88d9022d35997032bb5fbf8f0daff411467217837a836aa44c493f868a333d1ebf66689895b53c9e01d58019dd1da2354fb966c88d2d6adbe66ac0b8901595a24dddba609478ec36e497f6fb6b4bcaa88b1e9a9c87088f66611446e8c2873e89ee1006b6d92d2eac54714fc6481e7782b38ed4b18d5f9714ae6a544110cb6063c8a9964c52a7026f52af448783c3427092e0339efd7d1a8522848a2faa8aa19c21363a537766c05505cb979269c73ee90679feaef8df13b6506"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #5
depends_on:2:3
4:exp:3:hex:"7179c434bffa377d9b6821da9571667c8b962196f7d8aad062e75b6091a34a454e8f4d14a60fb5253ae373cf50edca93b8d2eb2075076ec8c7a42b7adbe7723a6ba8b51a55fadb16fc3a6fe9da020482":hex:"bc1c39e646afc1bb62685b746007148494209a419b733e938c1a5d02e2350860":hex:"":hex:"":hex:"":hex:"3093a2e1f502d44d8be4f35b386774162f0e10870f9cd34e3b9d4e77c7ec7cd10cdfa0bf8228be96cb5741f069440a6b6f9ec155d88ba66b7fa84959c53d3574bf1cf9f1561006c776223b881dd396e9e9830af2c1b5f7457fc45e823b411c5c2ba3b11219aefe5508f75cbdb5e40edf6b1f61453541ac98dad9ed502bf1a8afa79604261c7a89e78cf2941d520e0c10bed18820da6c23a5ed1c0dffbb04cdcc9c3284d400644e9365c995d8c99eebf444f2cb051bb62f231301d31ea815c338"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #6
depends_on:2:3
4:exp:3:hex:"b063333128a6ab4f433f151ae8aec4283ab6d1cbf4a69447850fa1a25930ec0f4204da52752a9bdc788c5cee6d8b92e1b8530dbe0c81b1d34037ee53f20758d5750d9863ed60c762ae2a8b4c973acc22":hex:"067708b24df7a34811993d5c65d5348eea73e6c6680293afab5804b4328e7a96":hex:"":hex:"":hex:"":hex:"5f74a1d199f30fa22f2020baf036fc61b1cc2acaa80b48ddff1cf85fe5dd200a9afbd8bc51dd1829636fa335660f36d5d2a516e4c38e8ef0c3cad979e79e7e226b820634ef1d76ae81bc3e3807913eb0731b2e959c43afa83feb1d8da31dcdcb3dc3a4cf8f454c4ec41bbc822e58023f0d797c844bd8f20034b31d99579bff142cf53d2651d7a31b212d2b9d5705b048860d6c4e3f45ef1bf2d5e46433fec593b9f68be8b1e928ea04ddc4ce2fcecb737bb8f9d054c2ba5060fae5e5fc21a650"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #7
depends_on:2:3
4:exp:3:hex:"e23fa0c86c8a7b99ba0d3ec3ca47349a57798c07587b666cc4ae1c9eff83b8cbffb49d1910bf05db3c7d0db7e27285ae9f6b4411d84364b27a66398f5b0a897ee2085526d3ac4f65e70800067d57a51e":hex:"7ffdef21683a75484f6ac304801c213dc8cb7e3cf0f94c358a2e1ccc9969e834":hex:"":hex:"":hex:"":hex:"f952956cb8c528efe2c831c67b69e8aa7e79c013161497b9c55415fd40c7fae778a6fa82109a40dd72fb2f4d92e1cbc47f52d055485c99d893fbea1cf28dab35be1f162494cb79ea45c44a63a1685217cd3733dcfa88bb6de65c68f2390e479c0fcc6b398dc5498ac93002e7e7f360535d082c8e46386611075665060845c4f8bdee38c23d2f90d2b1d78217e865ecfb6df02498db837fe581c43382cd1d3a508b6dc052ef7c4d20349679db8d8bf8dedd763da8e5df775d133970be062a9ced"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #8
depends_on:2:3
4:exp:3:hex:"4889013333cd1e2b3b8c4365bde690b66e06bcccbea25f04132a0962f13a7d458e823f5ec0ea091a07065593ca44fe49611602d165a35aacb352206844acdf41dc2c88b63b36912ae81875bfd3e098e3":hex:"b4761d82a93e17d8a0a461ec8205932edf218157459a25a7f26ceddb59992192":hex:"":hex:"":hex:"":hex:"72aa3601986e6c970b8c2253118b8381264577e391e48bddff0cceeb5101975391a2c731f5611316b255c2a6c0554ed6cbf8acbbcd8609e3f99c3cec38aa060eedb863563442b7beb78f35221736c608a933aeb0d4a7cc050fbcca351cf780d42c5380284a6163520a80896ee7f71d2961d7629d673791f8fac10bd01d32d95e8efbd65381424c378bbf54b532a70c285d98bdbb559c9f37d6eae889b82d5006fba2892ae16acab103aff1b247711ef92dbc6e516c92e388fda4243808f95170"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #9
depends_on:2:3
4:exp:3:hex:"cc32ef3ea3b0db89c69312cad56b1ddea73ba4c302b85ff3c6605d1899a96f49909c6a54d98baf096ea5bd46abc2535309676d9d6bb9917271bf8c86c8852e29bf3ff5b2fe56ac094fa35dcc51547f62":hex:"cb80942bfbcd8f112ed601cb12a5ca52cc0f280522db11da92ac6c76be3932fd":hex:"":hex:"":hex:"":hex:"2c972cfe1537bae42ecc46b1b41a691350f6e63c202245347e91602b93a4cbd5c8829e5a4f63f7ee0e29adb69386e8b659dca2e6000aa03beab132db6dada8dc35ab68433671cf621fe4593018b1eafd3a2191507fe015e2a5694fdfe2c3182fada71d18c5fdeed065089862249c5508f055ebeceb9fcfe5d16e4479dc17e2b59b5a0aa31cf21fc6b5925569b0ca63d1a5cd268a4d409f1039d902556236fb06e61c1c054ed3798cbe4d8c2a7b2d18206212591174cec9da519fb876c583a20f"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #10
depends_on:2:3
4:exp:3:hex:"142bff9332c48103221359040cda6632baa92cfbd1ae7f8b3d0e33d6a8193939d9d20d17fdf6edd1b3ca9ff600fe965746b0ba1b61e9aa5141edb77ade0f191b87f0b33c0f3620801a755dca02698883":hex:"8dbbcf0c190783122aa6da6e05ec9d82ee29f8e74e59f8fe6eb9492fe410df6a":hex:"":hex:"":hex:"":hex:"2537a8638d5759201cbc225e844208c1d08443b055fafe23329aed5eb2d814703b0fdbd0a89c2d62f8f4ea7746905b9bd90706b734060c96e4e406675576bae84317bf36d8523babab72236b71fc6087dfcfcbe765de13cd1ed316f495e3bd08d780cd6a58849c929ef24b41e9561868158046ffe8d2a89d169ba31331611f0872c6d075b9938e5170a3b8612f9ecff4743c0db5ae365fdc2678ec262eed3b7c337e65dd1ff24a867574ee460bec7c374fc6b3fe9b0eb7bd9f5507ec5988d313"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #11
depends_on:2:3
4:exp:3:hex:"821ed44bd793a4af223aebf52413ba5e0e231b2029b3d71475ac028d8c10f86d2382eb9c62bab540be847e22344704d339b798248d0bf2990c0621316e3c98ec07f05bba8887783adaebe8fcecc48fed":hex:"8d2c8cdb2ddd6934271941f071ea47dfab869a5671dff9d424b916c1ccabb02d":hex:"":hex:"":hex:"":hex:"a5fcf13e4a6b9829ac30171920478a7878aeda658803f2e314f9ef8cf42c9c1933cbd8dfe5053abd30df644ca062070662f4b7e7851d28ff801cc4b878523b4610891abb29c095a70665de1199182fa193439665cb19cbdb00aaf3fd0fefaa2278194e79ebf652713a28c36f2cdb83f96c8eb1e85c9969381b52bc3444e8ad5d82c94964544b3e6649ae3f532d25a2e370e9fc8c77753239f130091c43720ffcd2bbcdb70a75223cfd9346091e8c056227f66648941552efaa5a0a369291e9ee"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #12
depends_on:2:3
4:exp:3:hex:"977bad4c5d1d16a2439863af8bb6fdbc206ad0bf20c4036c044645962c36e2e853f0d702a54b70421a509c25de124f27e330eba581fc82efca522e43956187c9ee4f58f971e4b91ed51cc8aeea26fdc3":hex:"51cb91cb7ff1b39e18aacc0baad20443522bf869f26d9d7182005b5cb1d018de":hex:"":hex:"":hex:"":hex:"df4acafbe4f28ee47acc5134ef665a50deb68de9b3c7e075b26d5731049f13ffd00cda05f612f20fd901ff127277f269c069607442ed9f7b41892711a72b83ac592048bfb28ab2c64c6b9f5eb4427450f4475b1c04dd4665998b638d06fe8f463e2f07ff46073003132b66a5d4d19a65bd08230d1db0234fbd09a98864f8ca824e7a0ca9f1d1662027a60c7e95382122674d88224fb192cfc129952ed6515912aded9c72a49a39a00f9f9a16abbd361b20a12b5f3c4de54012aeb1b42f6fa3bc"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #13
depends_on:2:3
4:exp:3:hex:"3116ef07685eafff1c77f185fa840bb5627fb9a5d79f72f8007cdcdfbfefc56bb1769991d78e9e48fca4c97b01d720d1d3ea6fa6ffbe2569da94b6bb36cd34d72c37d0218b3d02c391e0653e286b24b8":hex:"f138ca3ec867cb7ed7d5fdb0868d7470de5f802fdb941dc400ad524d9032e23a":hex:"":hex:"":hex:"":hex:"59f01ec06c97a49cc5de469cc2b39c28db7612029e0e24e3c2b24f92c0af2383bfb9a0dccbeefdaec4bbd2607dc582ee7eaae6a4ffab251404e3c59c95e5460ccc8d8dea4db73e924ccd7528708e1b6a9d62d485c93764686f93df6fb8a9ae86bbda1e038697b5485e27e0bac9a18126bff1e7b104401306cc424e783f55ebe9940176d7123ef58c9460e5fb8311f745fdccd39ce552547adccdcd853bfba87aeb87dfe8ae72080fb7b3e5c4718e743c9f576d7752e3db1fdb29f160bde115f3"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 0) #14
depends_on:2:3
4:exp:3:hex:"f5ba27c487a40dfe342fe18e7f9c72bebc1ea229c7634cce87defd7aa11448e3f584d1769f3e76a017430e6e9bae6bb6c79170925e1156275311d86d4a03cfe3dfbf85f80bbd70ea98af76220833a0be":hex:"34fd124aad5a10b852b2fe8481cd0ec46dc2d02ed9583f6e282a4c908e319024":hex:"":hex:"":hex:"":hex:"977fa5b70f4ca3c04b6f495de3bfdb4b8aef93bd14c82653e30a00a4678c602aa889766ab7caa434d9c15bd68bd14e66cdc609289a691dbcb391611be66c2056f8e675de5db9b2e2f15e5a330d00a8886eb8b8eed4076306d443ca292d783fb056186aa86e1dc9f18a113e015e535dffea954319cd26e5572f4173766207ed7d9b8b2c42a741340c1850a07139c0b358cab942bec51b159e50f5aa9d8fbe7ca9d1d2127a98fbf0f8c3094bea4e3039f7f7ab083fc9d050e29e7d4cc2d3d44caf"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #0
depends_on:2:3
4:exp:3:hex:"c4868db5c46fde0a10008838b5be62c349209fded42fab461b01e11723c8242a618faba54acba1e0afd4b27cbd731ed9d30016b5827dc2bfe4034c6654d69775fe98432b19e3da373213d939d391f54a":hex:"135132cf2b8a57554bdc13c68e90dc434353e4f65a4d5ca07c3e0a13c62e7265":hex:"a0bbd02f6aa71a06d1642ca2cc7cdc5e8857e431b176bcf1ecd20f041467bd2d":hex:"93ee30a9e7a0e244aa91da62f2215c7233bdfc415740d2770780cbbad61b9ba2":hex:"36d922cacca00ae89db8f0c1cae5a47d2de8e61ae09357ca431c28a07907fce1":hex:"2aac4cebed080c68ef0dcff348506eca568180f7370c020deda1a4c9050ce94d4db90fd827165846d6dd6cb2031eec1634b0e7f3e0e89504e34d248e23a8fb31cd32ff39a486946b2940f54c968f96cfc508cd871c84e68458ca7dccabc6dcfb1e9fbef9a47caae14c5239c28686e0fc0942b0c847c9d8d987970c1c5f5f06eaa8385575dacb1e925c0ed85e13edbb9922083f9bbbb79405411ff5dfe70615685df1f1e49867d0b6ed69afe8ac5e76ffab6ff3d71b4dae998faf8c7d5bc6ae4d"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #1
depends_on:2:3
4:exp:3:hex:"46c82cb81de474ae02cccfac1555d06e5dc44b6ef526e0e28356ffc8bc6c0fd0628d4d942834b94fc977609c8ec0a6392c0693130c6215d55e37da43d67def719051e99871db68128e245217d2aa3230":hex:"5de51e3f49951bab36460724a63f046e75f6f610be7405f55016c93a59f1890a":hex:"5dbb13f5b4eb275cb757513e6b8af6fefd7c9c9e0f5304fdd9b4c0968458f22b":hex:"3ebceff3232e75c6beb79d97c78e93244a257f0772f82e234518c50e322630eb":hex:"dc64e5a1fc7b32f0294db138dc131946e5602266f4cdf00037ffe513a44ff83c":hex:"e3480544036a3684a88e23ff41a4bbd810f827021ca45e800aaaa36ed0b9bffcbbcc99a1ef1f1528b4bfe39514c7a390ba132d1681138c4b1b9f1a0fa1758837dde35d0f6c38683ba47a904937dc5ee3d3b75f909e5fb6311c6cda5e1121edc774e66092aa1dbde83e4680ff95c0bbc2946aa4d46770f247caa7b71bdefac9641ee99700fbd1e560f9f7fbd462ede64e009ced90c44c6ff03b890e16c79c7b8c959a27defa6f062168891977c637ec22ecfe20601d499443f1fb0ecc7d9505b7"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #2
depends_on:2:3
4:exp:3:hex:"df8053def0260ae71f67e197ae8b547a228e9b67ba7909fc1cb3adca51058b15f6d5951f0b60c972d139b75dc44a3680127a84799fd7672e429f20876c175d135e5f894edc7a4da334eb8b73a334be61":hex:"26890036a9b17d8e805c38568630e1c196091faad546ba8eb976f3aa031a8905":hex:"40ea6bebb0cb94b7e527787e17ef9f7d3efb889fc1e47e49893ac5c4bba988c2":hex:"090271c307b43b951c20ad3f081d2838df0936a4bbdc5eb6f2e16b1db482b1ac":hex:"c203cc1a3af668e45653bab6b1aa39ba0669491a06d00cd39c97b777a8bfd4d7":hex:"0d68d903c85c0172419dc9f782c5d67a0b3367d13cb2f734fed95c7fc082291edbf4fa83354c6588227e40bbff082be2dd276c264823a8f31ba18b00955d7a1fd612a2f37d824bc82cdec972d3f8384dfc78b51dca61e815766c877ef3d2113704c805a250aee7b55b849af048feb3536fe73ec4f0bee97006881d5eed8ea38ba1b8d16a3bcd91fda749b77d688997bff09f104a2d8cd8e133ea4aa764b237787358dadae1c25092cfe09f79efeb8eb6e20c39cafdceed90e602f221fe6b1d69"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #3
depends_on:2:3
4:exp:3:hex:"b1a1b468e1d59716a23fb028e295588f17be6a79e589027237681fe9ce354860b1cc33918a64c8be171e595ee6a3b1ef46c2ef21df2815528482ab4c7a32449b97ac75a51dfa1c7e67a763f17e97bcd6":hex:"77e5a3eb6ab38419f84b57997627c6bea79703c95bc1cd24ea73eba2edbed540":hex:"52aa0be951816d21a2ede89f53913f6d5d70cc580a1cda8a49f8e49a6befa909":hex:"5bd8e4ac61bdfe752b5a66cf2e048e812a8aeae8e20c3c8c43f31180e4b18303":hex:"af5eab21e4dd9443b1b16f40413faebdb0e086991dd3c53c8a51bc434348311b":hex:"d477404bcaf0ed53788354705f0fa9f46c4e2bef2cd94932b614b3c34e0b0c7c28d7483075c9745bfbd4e31e587fb1db77d557fcdfd3fea47da3f01e42635ed3fd87cf6c98a2f20aa833a1bb74a15b158e47841cebe53e4d5d8c85cae78ade156e025a7737aa9197b122e73a29ce0a881c7adc8ec228f4c14e56c722acb0165b1595f010266151801812c031efcee4a7739876777816af8baf4d29496912a012f1f33c07107b2db5ebd681722dfd76f3a58e9d7426e7fa75e326eaa416c5d820"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #4
depends_on:2:3
4:exp:3:hex:"098b8c107fbf943bcdd2199dfd15f130a20d518e95dc81988748e1f0ecc5c45f74622ca2940807df86fb05f0aab4727525f19d1d3bda1f70825f3e1fcb18d29e8e410616c105fda9324f4617af39f021":hex:"220bbf23394c3cef156f683d05739b76f37538a0d360600bd52f0076425b5f5f":hex:"af88f076ab39db1dd0e7002bae187965cd144382a3d1ca7b1ecd65d346f7c090":hex:"bab9d09dce5073d11fcdf9539501dc998b6fffa8a0716edcf583a7d7385ff41c":hex:"caf8d4e10513e5ceacad6f9f145a6f79e5c245aed4965ae85e2e7c5914f97510":hex:"f556494b3849d78b06ae75571f0b9c8c108885fcb041dbd7892bf639d8ff6c82e19e8ce2d5aeb58e8b964ce4f75976a0a9c7f3ec8373b83150b88d6c58ff9b810124d4ac62d955aa64d194afef2f77de6994642ec86cee40aa7a5591e99a63edbd8bbdb22fc3c2506beee6d507fe34fdb4d4f525dcbe30b5747ff920a13f9e230899ffffbc5615e994ee96a1bfd8890cf607379be1a39d173662d0967c9dfea33b14d78cc8818c2a1956197f85e92bc11133ac4f7657f2db20eceecae8ca636a"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #5
depends_on:2:3
4:exp:3:hex:"f54e9df92752d30eec01c3756d569bdb39abcdedab80b0aacac76ab406723f480bb359a5fc6c7aeebb6719ab44114a75afd340af202be3ca30e4de794b826237105202dcff5d1291cdaf266673275825":hex:"b69f77d5a08850a13f8e6d06847c4bec181ac0f6b720be3c06c0b67d44843c6e":hex:"40f14c3340e7092b898758ea3c36750943acac7fbb6a83f0df3392f7936749cb":hex:"5bcfb0786c447675032d2a32b304f25737de59cd07c84d3875c45475b15797d4":hex:"656ab204e2c1834f346d89c37a30164db414827d83ca732c71ec71efa8182c28":hex:"6eb8f276a8ff516f789d94d997f33c2e40b227776fae0681c83fde659462b72d37cd48c95899530ca072bf2470986ef29dfb193be7ee9ab3f8cde2317c9bf02a5f901ccb62bb665bc3a109eab7e3910888a522c765eb49b11d1ad0fbcc45abe3841e9bb4fc0e73188497cffba54f3ff82260767d0f70ea1668f45192e6719102e75aa5cc43084c50bdbd1ba491bb61ee9e5175092c1f50d56bfb68977a567e41c1e05d2d1523c198ded737079131fb12dcf847219d71fbedb5659411d7aff2bc"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #6
depends_on:2:3
4:exp:3:hex:"2cc330b34c976c859936c21e2ad88bb60ff153e41131567f58ad34bff5c9cb418939fed56356af7fe215986a5d0ed8e9a078dcb1d3fcee6b99714eea3bfcefb37a344a69d414965539ddce9df239be2f":hex:"bf531083f35066ebfaeabd67b82d392ef6b121e7d9603a5407c5bc74cd596023":hex:"51f223dc461ac2df1c4877f65ca876d635d50939fa9dd586c176d8ab73c6d605":hex:"ff9d6807d71ded1305d9e2cdc811dac2d73746b001b53ec8a5509c4ce0a07efa":hex:"f5222c8966659974dd8a7244d2cee588b6c9a2700f338683fff9ccc45b6d3807":hex:"981abda0e405c976435ec7f938570d911e5bbb32add52a8b94e528486e9dafae139eb15cc2b56fedfb9e4b2d10dbcaa5e6ab985be16c62b9b75a037684986843a7a0e3baabc34859253df2a053dcb0352a0554fd2d4530de0251b1b852d1d3b6e08548e215902ec8dc46ee89f3fc262c7a35aef8216b3def65bd56f0482a18a329f96863afd951307740fd8653d333f932940e2a87523afbc162c5c1d2bbe16f33a4b0ee0ec75bcfa6aee6d8348265938738be638f78506ab731d3e9ab345551"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #7
depends_on:2:3
4:exp:3:hex:"b4e5aad9bf4fb03ded64e4bf40ecc6fe2214049bd5889a5aeea0bf47be8670d329e6ed04538dd6d207767c367406d482ba7ad29231fd944f00b8d9b762935b93819ec62e0ccfd48f619ac40c9c208304":hex:"67826d2bf9651404d5df4db84ea64dcab10697ecb90c68041f421452109af3c3":hex:"67d6983465facf33369eebe0be12dc65fe736969e8f41478e44ec25d461e4435":hex:"65f97c99140c8c9ba2ce37710b06f822cc0eaa03589157a3b575bc9c423afc3f":hex:"19c37886d613d24b0592ea0b3a465ec8f8a9229abde3fb5e0122032e1ac8dfc5":hex:"05777487bc152260a852e1b31a091f8e929ed22d8a652a77e4391abce7efcf0570df3d466d56dc51ef14bbc55309c6831655ba97c6050e563083fd1f2fe65b43d0cf8762ef6598d967b473b68c4143287f70d096a6ea120e3c07f2a95b80b393ffeafac2d0309d349bff017a49b9ea547a5776b5c38b9e981ed0a4825853cafcdf0f17269b9df6189fabc30388a383e3c28949625ef3d59a2c371ef416ace8658adc0e0b0104f1acd4b349b91b660d64412168d3c9e29680a5e324e4d0ab9258"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #8
depends_on:2:3
4:exp:3:hex:"27ae2120824f3d416bbea1f987440c507a4f01fed08a1be27e6ec16390c92c4f8dab04203543caa3981373fb991d855340c29baf439f23bfb599a5eeb95ec2059af24dd86c0825957ea8392ce3d980f1":hex:"cd646b0d1971f249f4c4d1eaa17e60c311d813057e0b71819a503aa41e5c6b21":hex:"90ee2d0bf06cb94190e6505a75d12dd77c266497dc99c5f89bde60be6789099e":hex:"7d82b50cdfaab9b5d23fb6618b59dd28cf1a83c77ff2993d9f1edb87ed7bc388":hex:"f7f728d8ef6af8c5e77cef1e837030a6aa5c12bc81423b0ecb07a2db95a32a28":hex:"4b25aaf436eb600a103d3fae8e301d2755132b3de3c8b4c442129a88ebb3ab20c4d3a54078ecc4197994ff04bf0e460919978d47e45c7d10d76a1e63ae34624e2f64125ae1bef304efb1af688f20d8e212f6df4e11243a49177e4b6456010d784d0e4a94e75371a75c4050b27e48359549f8268dd2a2290ebde22282d96b2f38e3f06103dafae5f54f0019bfb013df39a76482ec7f878d26ef0e34c9c21e67fbcc3412aa0739e875da0e9ea1340592144eb232385fc7e605ecd10fee45524718"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #9
depends_on:2:3
4:exp:3:hex:"dbd5f508e8226acb957bbc4914ab13810b9b5b2b51a1b55cd4ac60f6b6d4c370963448fd323968c27d97e005b1a079c9e3ba151887006c56593eca7809b23cb768f5b3701b456bdc85fb5672a81db2d9":hex:"0cda5d501072cf482d3c56c49a3c929b423f6e15a3e835888b3a9873647ffddc":hex:"d3f38ca5c0bbcef46976c6a5965a8493f714aa2c8a2c817576cbc0bd6652beb0":hex:"20014421f9af259892f017dd5392cc973f103d4736f3866e66329e5e7704e0f8":hex:"686aba6c9c6c221b2b4a7de766963e4d9880676e7e6ac8e644dd273fcee519bc":hex:"b720c7c56e10c9e436036fa8e1f1d1c0c0b7246c28bd36e5f3e88f988684b95a01127bc64cbcf12b9689f718baa52042b0837fea791391ee2ae42e54acc571239e5b654486a025ac25f46f10280ecdc65ed098e65e07dc3870b17af8bfd58edba026dc12b4ff04830ef132d07dcd7c62f67172caf2620a204869a81e39809db7befa25c5ed8a74b6d306c21cfd3778180d444bd99314a430ff4ef6b7061832df9b82603d6a0f646b398e7dcd8bb33a7926bdfa085a450d3de68c1e8cb2ee4524"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #10
depends_on:2:3
4:exp:3:hex:"7093224d6bcf0915eb75360ab4bb789c15834a371baa24deeceb33f86e8bfb46f4e34325ddcbee671f9e45f7887c1481238993ec4a309e10d3f8e3952c840d564644062534f985a6b4e38688d2c800a3":hex:"e7cf1f32ba369cf5545ee672cd6746ea9a336de7039ecbb25419259eabdfa44c":hex:"bb186a460387baae27c11aa8c65d6ee003577eac47b259254a933f82ac683250":hex:"d823535ed974b7ff9f19dc38b9494aa99f88143e3383b5a183ec00c925bdfedf":hex:"56548af797f4a07ec42273f895822d877a311bf1f8dd5c96fd8449732a13a921":hex:"159c6923fb71f9670db4eef12dadd143ee701bec9b0f76b56e9b1b8c473eecc3e38cf06c8f3b0c3d49580e49caeac0fd48da5f53d0d3e9c829c253fac4e4f09730177a63e0e759f043169e91459c9cf959d2230c7b94be168cf4fa02588d78aefbc855d55e444d671a69d274c66ad1851c56c0d880416bcbad08523cefa2fb384dd0f9f188e8a601ce0a92d42faaed0a299d6a9c86958854712427b35e73a0817193b50f3557e66d64ad80fa9ff87427b7de5b7e6312d1d9988ba77be90d4cca"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #11
depends_on:2:3
4:exp:3:hex:"ea96f8787458e505f5858e31bb85b6e335206f6d6d04bd9d333029193bd2a04e5f85ad152675ecc090119aff7720739bdbe34551ebbef10e822cd29e9ade1488c21fd9e798369d585d6f58168d509d94":hex:"ba45df1a14e23361201a467d2cfb7a3dce3128069a8a59a9a388b8e31c48efb4":hex:"d551272e5a60aa1232fcb4765e853de2ccec08941acc75188eca37120fa49aac":hex:"c1b34347691ae9f1bf6be396e8b49aaedb38307526627399fc10c48748c3a7bc":hex:"722c0efa445262f5800abf75e43d9daa44e3dcee7a7528f7313ee52fca9f1803":hex:"e2f873758c4e71704d8545dd1eab51206ac11dfdb00dfd1ec9e53bdc7f6b57f5209727049d4d781059b0bc4b6091c9bdee947127b8c8f03f1ee5f3665720a4f6c6777682ef1937719052254aeb97e3a17b6b552bcbc9154551a7ed41d837a27b6c37b426508409b75236cc156dad89d896f25c54467fd45f9698a11c7ce01bfb1fe171e4d33faf73a30c8992c51a838e9c0537354371bf79146a79a6d42d4e987b9773377fbf384979690b2c04c332f22567fb0921c3e33088d3b011921fca6a"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #12
depends_on:2:3
4:exp:3:hex:"92ac19b133398b7d8ddfba3c6046421b3618923241097b8f68b6c7430b6d232ae9ad8f864f358afa7cac72bbc4fd90f16ebc9c15913c11094bf7aaa510e6241face016a99ca08de6525a570bd1741dc7":hex:"0517ea7410bde64edcc70df48f3c87f578b38b8c7087def16031e52760037df0":hex:"439c97f62d6b7aadac64057c0003a41a44ee549f60afa92797ee7c9aebfc8164":hex:"669d42f9901e029bce7584bbd22a13a74e6f6ba50441a2633773bf5ac745122a":hex:"8bf3c1a08b2d8459df96d6abfa90725f1a735809da78bf99f7fded0230771804":hex:"3b832a7f1df591bba571bf7662914b0e5a3b34d38228e377e4e7dcb4b9cb396ac268d71fbfd2e1a5cff4429feba36f55c7e45cdac49a5fc8a787292011c61f4f102bb9a5d9c8fe1cf047956f21c74987d80968d2e4cfa29bd92a35cb96dd372d9baaed8d31ba3462b42084dc1841a4042311abfe4b3358f56c9e0c69e233638d3be56d0d269cf110d5200759eceb63fdf3b0ad25937857d129b68f038fc73a842046cc7c45292d6ec3766aafbc22f1491774624751f2c50fee830e24a34a27b5"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #13
depends_on:2:3
4:exp:3:hex:"7a346bd6d853803d07844ca348f3c4837fce3e3a727f712223da248cd82db6ed4a9710cd8b9f2e7b593cca42da7b1a1285a78d0c764b24c3e4b21d25919c5400b4adaf0684c787326c19010728bc6f94":hex:"3e8de39ab206ed166b203c97103059e6a9317d47f7a76bf4511829cc2e27a4cc":hex:"327976aef239b20833d36b7f352e8e6570f8f325b568975a661b54b8ada49128":hex:"9419cdf1c59abc03013d7d443c734aff57a6d97c870a03762c50b459d38f5e09":hex:"f2c9c49c76bd683d42dd9de9d45a97b78710f39f2ee482e877e3b0844647f9e1":hex:"24a83991f9455a0410213cc138696cf4eece7b2caca0a627c6ce023b7f912c115768ab8aad0fb10e35591d370e0372fe020823365b5bbe713417bc2f050cbf86fd626caf91323271eeebd5f2aae36fd0aced63779565604ef2653a0770fe4e42649eceb6089bb7662ca3d744fe178f5ac5bc20ce7a90325497f55ffd9b25c59a6b82f07553c080f0c45fed23ce47d972605a2f603b72d09d608548a04031dd2bbae9ff898201e4460479548d70b176e917ff3e3683e49f3330cfa77a25cc48fe"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-384, 256, 256) #14
depends_on:2:3
4:exp:3:hex:"2d8fb8796d8a1764f8c824c55b880c53d2205559afbdf1cecda3dc2d05bf001e6252076dac013c7094ae72ca80cafce2cab30a160ce49dbd646710bc429c163231d73fe0e121f8cef8c02f70598fa853":hex:"feea8ae0b299d5f79315383d938bcf9b536d11e036b28056bcbbc7fcede21cfc":hex:"1a0fc47fa95cdafd2036eb5314e0f56266e58abb0f03b5e679638945b1fbcd58":hex:"30707f376333df203eafba7fc52b40d8f1d97521a71d579c8b8457ac1328cacc":hex:"f179c19e45c4a4f3cad8b545d116ca29e45f322580b7fc9715313be53f047658":hex:"eaf7523b910b653a305f9122363d96e17fd22ccb9b6158cc42aceea40c34eac73e496827dd5fe4312f102ba6aa7aee934d1f41609bf3e14c29aa3aca210e3cabe70744a09f4c180f3d1ddf8be0b530403c5238761226f2c2c7ae29b24439afd65d6d5a0aa8daa11abce36df02ce61d352ab08965122e16708731d72a9fb5de071c20c6cb039273498ff1588c901d997151edbbd41870031ee337b38233edfd78aab389fae2bd280e4bc85d1bd6655269c3359753b17fdac502c3a2e871149fbf"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #0
depends_on:2
4:exp:4:hex:"48c121b18733af15c27e1dd9ba66a9a81a5579cdba0f5b657ec53c2b9e90bbf6bbb7c777428068fad9970891f879b1afe0ffefdadb9ccf990504d568bdb4d862cbe17ccce6e22dfcab8b4804fd21421a":hex:"":hex:"":hex:"":hex:"":hex:"05da6aac7d980da038f65f392841476d37fe70fbd3e369d1f80196e66e54b8fadb1d60e1a0f3d4dc173769d75fc3410549d7a843270a54a068b4fe767d7d9a59604510a875ad1e9731c8afd0fd50b825e2c50d062576175106a9981be37e02ec7c5cd0a69aa0ca65bddaee1b0de532e10cfa1f5bf6a026e47379736a099d6750ab121dbe3622b841baf8bdcbe875c85ba4b586b8b5b57b0fecbec08c12ff2a9453c47c6e32a52103d972c62ab9affb8e728a31fcefbbccc556c0f0a35f4b10ace2d96b906e36cbb72233201e536d3e13b045187b417d2449cad1edd192e061f12d22147b0a176ea8d9c4c35404395b6502ef333a813b6586037479e0fa3c6a23"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #1
depends_on:2
4:exp:4:hex:"8802d43f70294f532d2af0be0852b7a9ef6584e8b1631845306b583ab059111c0a88cc670b8a827e5057b902563840b6ba6f6919295f2206bc8738eee2b4e7b4d3d492b945150c76edf466cdfede4868":hex:"":hex:"":hex:"":hex:"":hex:"caa3a5f9822f497fc3335c3a4262294846cd4a6842cdb290a011a94b6c3c27a83622dfc7e5c9954e91feae5ca8034083e2fcb493e210e5caf31ceb63a7f3d59dcfc3a859dac5c250981f7b663e4ef7222eded353c7f42923c6c6db006e927b4b5f44b73e986ddc4176ac03a5ec619b3ebc923d4a6d9430e5b9adf75a5298e76a110d0a2a4e2f7841f900c4067cf7ee68c356c4f5d13be8885801d1e578ca4d2cc32d48b5e6303a0bc417afac033758f3e812693c49128e0db1bc9ea2fa2f2c45cb35792123af63f42dda3abc7cf8bf5dac17987178cc0a64b0fde5c9ff2012bcf57e93103f08db1e3a9f727e1cf753ea44d62ead2aa5410b9e37812c43d60eb1"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #2
depends_on:2
4:exp:4:hex:"a53adcd8c8ea16ba80a57d9a55955197ce0d957bc92d8a0b548bedca149d78ffa9dddb64710d5dee89f1edd37d8b55dc2f50bd67e4a6ad0f3a01947e3673b10688178710ba2e7bb5f3dbd826c792c9d8":hex:"":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #3
depends_on:2
4:exp:4:hex:"edcddc13604e036f16687e36bb576cecd71b20dc78f070033d8b6f1f8125ba2d2d3efdd9f01a93910ec29fc4718420a21385f8798218e1aebb810379a0871b534e067b04d6ec9d523f7cdc8d45bed4d2":hex:"":hex:"":hex:"":hex:"":hex:"df02ec9bccc25feb7aa4787f5f63a92ec05b2cc13fb92c20924aba9e1723436469c87673b8987ef19be99ebafde91d293ca6ec7c1fa4cc8902a57417338538fbf897772cb96085768e893c5a09327354006074992cd6a517d6c57c7af5495a3d645798eb1962c0b56ff0c8c98e18c0963e5a581230909981b301797d779703f31b264f90d6483eabd8a41fec8ea69a57befe1f53d470fc82bc35029a4d089eec7ca3986485a51ad1e56cdf2dea5fc3d39aa997a53a9924777eb6f3bf1056a578fd32aca125a74c8d24acb7b99c37f34081850712edf1b6851f0a5e640ae7193d3f49f3654aad3cd106e41e78f1e93a8a2d01acde0e6ceb3f19e0ab49f4bcbe40"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #4
depends_on:2
4:exp:4:hex:"7ee0378eb594bd2ef129f35c9c1d87727c71ae472363a596467a2d71871863d8476b636e2ffdc0db70be5f7792ae8a8cd40d3f03347700d3ca515880cfd7962f8ce1dcdfc5ff134daf552f8c2a911758":hex:"":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #5
depends_on:2
4:exp:4:hex:"fb35f3ad6b7618735ddd273d95b442a362b6822502a217e893be3e36fd7be4553cfde0edf5d9b5f15be9288ff78fd0c09ebac49e71484169170f343f4b21e244d1391f963112dc061075d9b7d26cd171":hex:"":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #6
depends_on:2
4:exp:4:hex:"a8db61234723da2f0883224563a1bc04c7b4d040a7de3b659dea0086bab7f454c73d1f918ff29e2f98cee562e05f5ad6f2781f5786228cf0cbb50d2c8d94a1307383d41229a90c0dcf142b94b704c56a":hex:"":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #7
depends_on:2
4:exp:4:hex:"95d7851bcd43fc71cd9656737a0b05b5f83e55451c4672061230b9b34bff71c025bd51ccc3f4c2a14407d5d569d250b840e24828c319c1b7fe093e5551f8acd20167b2839c8d5ce9710532d69812b8a6":hex:"":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #8
depends_on:2
4:exp:4:hex:"ee7a62efc8403a0f988711436efacc44b5098f9a3526dac49ad9343c80c98eec51f064968eb37d1a8bc8604e3324e5a64a99315401a2df8d8935e94fea3fc5990107bae19af886415edd6eccc95ee942":hex:"":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #9
depends_on:2
4:exp:4:hex:"bf02755e4c3db98cd26c0abededb5ce360495c1a2ecf194e922d87decef4173584a3788dad5b308c50e7c0a0a10c7a42f3c7b2a52df2230cb8dc7bd71c35d448fc5b1eb4f903ec6342cde118ac284c2f":hex:"":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #10
depends_on:2
4:exp:4:hex:"a188065c9ee936384c5572b0910360ecd984cd0ea926c86b269f38f1040d41679bf9a91bd4e986f500036cfafc583edfff1170cea9f22a3140e7f4d198630fa353626518062340fd2f5b0f6b4fe7e217":hex:"":hex:"":hex:"":hex:"":hex:"ea19cc91d80d37b8f16388fa62fe8e1f114f32f2a6108140b60c1994432b18445cdc131b21c884c74d155aea2aa7f62c7ffdf128886cdeebb395e5b8819dddc8c7834475d19162cd6a9c037995e3f9381cd582eada424ea6b67ad734c216f8380bfc8f5dc0e7a1d93c406870bd64a190a670a8ca94dfc0c02b61365a1d908a6b980627af6bce02a42dd9dee90dba722cf6bd7ab86cc4200af93ed226cdae14f28e242c6f96db866631b258be010d47c2eb95f01fcba4fd71646e6db54947a0d4dff86a107e226b1e4343d8a1d233369f8b560f78c865426d341f5f0713748b3ac4031d3d84bb057cded60b11de44cb221869e42bb054127388740e52535a11ac"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #11
depends_on:2
4:exp:4:hex:"58ebcec4539f4af1b32a854181dd0f512b8c704fa47537096a769eff28c59165a18226cfc779efc9550f7be02006d83c230cd6e6909e301d1e99ecd1fff2b2cd00a56c7a684c8907bbb13ce3e9a0cbce":hex:"":hex:"":hex:"":hex:"":hex:"6f4e86f309f69144603961c5366e4f9b16d10c10593ea689a8e7435a327d2524f4468813ea7f3248d8d4bbe17b175cfc40617149983928b267dc0c4db46d2c17fe8bc0764386758af1a824e12eb897feafc1c7ef66f80ffcd993aa016e139991cde8435ee6bb0de45a7fb61eb1a6beb76e012b848ea003f687537e4bd00ced37efdda66333b53a8dd5220c281fbf68bfd9e72285e78197881efc540da4c1ba80a226013a2d7098d34af4112e7b8c865af15409f6901b952fee4a474e4027051e1dce879ddf5e84f3947dc9b94119d67e6b48ed6fd6b1f813c13d3ff30e121efce7918533925f50c8e381e87ea685f993619bacc9efc0aebc884b450646eeaa5e"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #12
depends_on:2
4:exp:4:hex:"acad606154f6ae06738d67f517cef4c8dd8dbb2ea333bac9e69bc0a4cb98877bfca3d906739d442608bfe66ca48c3d7d01f7d410f46764bf2ba4268713ba76bf7026203e35313ee75add608509de867c":hex:"":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #13
depends_on:2
4:exp:4:hex:"d2715947b420ca136a4cd5c921b8fae20900679d87ffde5bdadc7b0fb532f35e100d8d0b59810bf3222b07fac3a3c334e4ffd96983e51ad04c2c5bb7fea15e8a03e36b92f487b314a191b5ae4862cfe9":hex:"":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 0) #14
depends_on:2
4:exp:4:hex:"e1d2d72e7907e7214cb266f1ef641395e54b39e8365304661b0bee371f3246528417ffd58420e48ec063de5df4462e39e6cae1b5f3a3a12faaaf39b98ee592c8d4f56b9d4534add5104b357d788c23ab":hex:"":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #0
depends_on:2
4:exp:4:hex:"4686a959e17dfb96c294b09c0f7a60efb386416cfb4c8972bcc55e44a151607a5226543b4c89321bbfb0f11f18ee34625ef50daaf29929047870235c17762f5df5d9ab1af656e0e215fcc6fd9fc0d85d":hex:"":hex:"d2383c3e528492269e6c3b3aaa2b54fbf48731f5aa52150ce7fc644679a5e7c6":hex:"c841e7a2d9d13bdb8644cd7f5d91d241a369e12dc6c9c2be50d1ed29484bff98":hex:"9054cf9216af66a788d3bf6757b8987e42d4e49b325e728dc645d5e107048245":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #1
depends_on:2
4:exp:4:hex:"0bfd73a55c96ecbb6104fc1f91d8601e7b57cdf85d6e6b5360920b4e7d1cd02629bb1c55e637fae1608f389d179f4fd2650251a37ad27c2b5264b1605ed5a51df949086c10ece31255701733ee1c8539":hex:"":hex:"15b3816392285fc665572c48a168068a10994cbe4ceaa1955f07075039c73b4a":hex:"374241cf3073e2f82956c76897944ae9c43907fd6781202b10e953c3aab1cfb1":hex:"4d434031e2a2b1e1ac5ec98081be46d05de1b4d25e3b4dbc8f040b627f8a6f7f":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #2
depends_on:2
4:exp:4:hex:"da5589e7fee0a023e01a50aa54987c5b6d70503b78403762cdb53c9ae7ec65f853df14cd7e30ba0eb703b912387469bf7f000e5dd78dd80722e194a4616aa373be2e093d23f2a4e7224b841ef550772d":hex:"":hex:"4c74a4655dcbebd1331b86bc224be30e6c3386ba844716d1a6938447ca7a317d":hex:"6397e8fe13b3ebb08c0b7ce460b5a149b23433e110b881a9c095cf24d236cee9":hex:"6aba359faab473d0d51f21bbe7b2ffef3a03b64364777a48f80698643d9b2504":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #3
depends_on:2
4:exp:4:hex:"8a36af663dfcbbece9653be51c8dedd7ceb125d59dbd143ab4c37f21d8cca464920dd161245835ed81ff1ef1d09e367ed43118910c2b62d4bb980d0e4305b07e8b321c5a04b46d4a7dd4611aa328543b":hex:"":hex:"59c96d6ec4e49b8185f275057047153ef626456085dd77a01cb89cda060bcf3a":hex:"1492daff48d8c7c9e9e8f38130b8ab2de6e02c6cdccc25fbcd92d8aff1fdc66b":hex:"d2f40e7dbdface320825d0b766d0317f47c74fb55a5a325d66a5834db70d5eca":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #4
depends_on:2
4:exp:4:hex:"dda69dd5af052570a7cbc2fd378eeae936cd301b197d23dcf21ce06161f411320566cf1f231111c1ef883a88f356d94f2ba7e42d84574f39ba1946450fe7394e5f3b9a21005d797dd03f27e0477ba74a":hex:"":hex:"0cc796ceee78dfd667c309499dc4ca1003b2d923026c65826f280946e9f3f1f0":hex:"2483640ad6b242e5c6576df18db137a3cf0e4a3eb44bfdeadb9bb650ec816200":hex:"ed978c3f50c3ebbf4b70a75771a940f03eaf7c468e9c4e9af5f8bf9f947a9352":hex:"9bf785c4a1006da21f66ae308e6f23de2d1b01521c40404da9b605e1ff1577ca1d1300f0e47e922d02331c79b7c0b1e060926564979e0ebf77ee3e1f54907770baa80ea8dedb7aed1948df550b6ee95f2f71a28ec2eb5baa76eeaf0062e757500ec255369a9db75c242924d64a391af1536c3a9a6951aa991f02b7415a2ca77582e8d25bbdd023e4d0a0537c0074f5abe3ad34d24f5b98aac29a62c1c2648eb124af18c619dcda701e7a277ff1e00a8a267392419dfc1fdde4ee865c9f3744d92fb86b8aaa872b0142762bfcb7f9a45dcdf5bee93bd631b73e3acf9edfde744e7492b77fe38adbe631e7ffb2d1708f213136483ce6845398409b8550e7467b6c"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #5
depends_on:2
4:exp:4:hex:"346e27bad2b0c0029148c5db5419a124583d2021fb74677b37b13e8643ee7aa9e9bc52f5c2689ae2bacdb7c8c8d22f5a4bbd2f0ad3479decf2dfe2e9312dbd682d96e199e07f5fd4d22deedd83c77673":hex:"":hex:"65262e1bda7014866794713ce6bc1ae4f0dce523c82ce43e6e0cf9a64983964f":hex:"c68c54bf2cad027cda08a3380f3bd525e354c4288a7beda1a7ed8d62931aac8a":hex:"cbd0049d6546baf0a8df2de5f15b29b77ad07f59b4dfe6a872f0bc1cad71771c":hex:"b8c344a8004072f76582e494f70ad0f7d21fdd13cccc387622ef04ca03a0a14faddbcecf8869e0f23b6f13fe58d9d769f3ac96ab9b9967150fb81cb5d773ca44960e9267e858ec9df23228fe2dc239caaff0f948d189248f5c075c3250270af7031dc0aebb327b004d84d0de699f5b02da1af448df0d13ae19f77586db22ede3f6d3d032d10ef2d7e2efdde2ce66a8bdc07126cd49241faff097d1467d862efc2a2e198e74b2e3293d4a99bac75e328a1dea3477f3f4c95edacdee48b14d26b054b5a268e242a2908449135825faa7b4fc0c9c877ffe7bb90faa7c3f136b2b4c78fad9f44c829bbf7eb8f747d501e150bedcdf4cdd6fcc86fc409a21e6e90e86"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #6
depends_on:2
4:exp:4:hex:"09587ae0ccf5c580b44e390e68e6a0a6daf45e7162ea0418135828599918ecef9abdecba73d8c6d56bdfe005485be3b1ff284a85b127b00185f2f935356c3f87d076599f6b0fb7f93abf45f0d0bffb3f":hex:"":hex:"4e703f5f59cecd926fc0d94100d1c54fc8b19d165bfef16437d7be92802b38d5":hex:"59ccdafc72e5727e303d2284b80e9224c95ce5ed0edcd816c18a55aef681b203":hex:"36d72751e4d6a7c6cb2ead12eef191254df53622f6c0fd1f33187f09e87880e9":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #7
depends_on:2
4:exp:4:hex:"1ad037daea8ae2b9131f4490ccb453b670596978e097c7b2342c5ad8bda53de10f696e07bf91bb091c21898a1f728bf5873089840b5f022441b355f8e5cee75917400c5ca597d6fdb8f52874cba1ffae":hex:"":hex:"27b4177957fbb40bccb4832fd95be75ed8df2307be3cdd692e8878bad14ca8cb":hex:"c7dd83bc2e99c2428bb243c35e2544b10857620fcdf8964b65b62c58b5069a16":hex:"ba57de1455a25c66dfed3f8d2e3e198fc6ebfd7927f590c702d3a5ae81e80ac9":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #8
depends_on:2
4:exp:4:hex:"fd2d1b1f4150cbbf6ee3d8667e7f508b341b3c251c8b0abf3178d2fa5a80ed170a15bf55a6570f979080ead216effa5802b2e7404ad93c5cc41e17eb78168859388738fa935d1cd6b06422867a30b552":hex:"":hex:"8937c389fc1b905660861a4062c4e6542cc2c587284a279cbc86c432edf541f9":hex:"c1f79f883f51e1de95afdea8392e121a9591674063411ba79b098e0869dbce33":hex:"0ef847924d2fffbbdea4f12acd441e52ad39ff291e80c7a24802c4f03f09c8e9":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #9
depends_on:2
4:exp:4:hex:"d4f64d9c63708f9294fe1b1de82e160274dc7ea857f8ab6f4ed629cc5c4fed94bd2ca16570134810e71a3a7a38fdee4e4aaf3aa82871142efe6b7d7a4888b4f0c745bdf649f6c84fe5a6519ace6336c3":hex:"":hex:"a8acefe33c7d7933ca6fc3c8495bb315bd4edd94668084de3a4f742ac5ca1fa1":hex:"095006f15ac6f8f649ab217dfadd426a60ddab70c114cf7d52f5e6762a47e679":hex:"9f095084b18d6eec18bb6ba7ff6a876344f0d6d7916c10bd510e2e0d546c4a3e":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #10
depends_on:2
4:exp:4:hex:"f30723bc93a3fac546286c2ec8faf54498eea6f8d723c32c7b648265dc75d8dc14634281f7a7d1870208bac4896e22fc72bec353ce3bbe4fe2672c0b9f6266408008d0d1fff6c9c797e93ccdbc72dd95":hex:"":hex:"ebc2b572f365a726531b3ddf7344590cc5f779771134ef7bd7aec4af95bfb532":hex:"0941303cfaba20f7c7c4ee745ec65be3c4f6d217f8e6c9a1f5e6db94949645a5":hex:"6039cc999268f1fdd5ee2979e76b584b85069f144507723e2a47e3af1d8c2355":hex:"eb7797a46743e552e682c0c7ff02e1a06d5aaccbd1a54075cb1a9332e76570d6aa5dd7423dab5f12b1bbfcba8b6396f2bbc5a1bc4c7f1fc306b32037b503a1a26b509e7c736b035108f90e4b3ae880bcb1eada72644119f9ae9a73eada21f9de1d2b1356a90f83c6ff97978bdce08aa6412535b401dda98c4ce72534f6ed75383d51922e0a4763c5903baaf75e5baaa355b3448e101ca3229f5eecd346f450c2f2b11503bbf23bf5d8f79392cf1425ae1cbcdd5bce53ca7ee0b59647a0a4b8cbabde28a7368fd46965ec0f55c8cff034ab3b733d19ceedf2b8f38e541da2bbb51e04cc5506d1ef8ab0ec3b43c34dca722e830d745ce631652976dd6fd9a6aadb"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #11
depends_on:2
4:exp:4:hex:"070a6da7f4f59da9ecbba2daf690ee9ad0c9cad330600b7ce7b95d5c1336c96b47bcbbf8eb4d8918cebe861e959d68d7e5fa7ce34adaa38de3e36f425832e6bb0a23fe21d10c78800506d9054766ce52":hex:"":hex:"3b4d05963c2fb8315371c2f35f375b6e39ffec667303cd96642fdf6ff5f99102":hex:"4189cc93c021bc2f958daa737a17f78c03ca09a1a4a73faa8a74f3f109bf2800":hex:"5da2d3a69f10cf9a2f5276d3d54bbba4ec02826f6ee0440608ff4fd6b1ec962c":hex:"f8d6d5d7aee571a9d75923c6a2ed73f3e77901cb025d3e609c7cbf83b6478899b410756f66546bbf38ac3309f02fc870e056772e56abe76a99a147d12f1fc60ef50cf87baad21f5ccdb43ba43ef0ed777be5de30ca312f814ff05ebb93bd523716b8f8ad0411aa732d2116040d46cffd9bc2e463664433ef1f7fc56105b393915106d8ae860aeaafa934975d446ef95d697e1761017bf102e9e175c7d6d3a3aee0ce877f1ce7709d08c2c84a34d85d17f77e06a5f72269c9f18f94a9d9e635ba1a1b62ca5499e717423ae4bab477eba48143028ea7818d64563bdea3fde587daefd59fe7059f4f6db16a61837876946eebcd846fb5acf07507c38410e2ac3f22"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #12
depends_on:2
4:exp:4:hex:"09b75284b738d600dcd3322b91d380db45d3efdf2dc8e9fec64cf07d7a606531ab41f05d85e3eed5f62d55c5132c75f151437d4f93dcb41145b2f95125d1daa7dd1f75dad6dc32e9e42a21dfaf35726b":hex:"":hex:"7ebffa04f7f0c939e1bfb4c8686ebe4ffd7a1ec3fb4aa114946a6650f2b449ea":hex:"8d9ccf3526b655cb923ae3e1416e84af5e458a2ae4bd55aa98e900353f8bce65":hex:"d78edf2f7211f49b70db778b0fb0eaa217860f9197ad1242cda264c3ffa3e2db":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #13
depends_on:2
4:exp:4:hex:"773a12318265c2de4d6a80ce936d4c8a13d81b646fb197d7ade8d8dca38988e6bf4fe25d32c137ff50f5e20e987ca8c5c7ca4c2bfc9f68c1a79e8a0f9bf2a1dce0c09dee4134b39f1e51f0bc10359fca":hex:"":hex:"4d995d9addb816122b70226a068c457ed4635e7ac9ce41f1594ff84160c1c06d":hex:"f068497d26966dfdd57d5a8ea1a05c1db2ac2d72248dd59d17bca9c6fff28817":hex:"641d5482fad78093210f7e542f45a8d17fdc856be5860c45465b0775bc45ed7a":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 0, 256) #14
depends_on:2
4:exp:4:hex:"eadb3322979308075d4bafb69cafc6dff5d55b97c4a73dd9943a0a9e4ac01b78ced5ab91508b9718f6de9da47fd7bd54797cd5a5f6365c28b1a56cd5d74721afc4424a7ca53ed8e97a2c15a727a682e6":hex:"":hex:"8ced860d74040dceedc0fd0f3bd36ecaf36f91e4c56372ed1a54d25d65180d42":hex:"a19980a1c86e9ee4db41f6467144b0dff4c0692141916d46bdb7c2ab79992116":hex:"1cdee366e7c3e7e853caabc4320ca2b63616ae86343fc5ec2a21b6c24c04ec39":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #0
depends_on:2
4:exp:4:hex:"97aef935ea33717e8e8644bb8c4789f375c48a945ded08771149e828a22dc86682580f51070ba1e991d9803f51fd9a6f63cd91c1ebb2caa15f2837df8f35cbb6fe96df2674a136990a5976cbbab63bc1":hex:"212300f93899ff7cb144f20426028b976380a348253bcc3ff42b528cd1972549":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #1
depends_on:2
4:exp:4:hex:"549ada8de63982fcbec1d27162a51764dbd770f1da46d87759b2ced52d0ab2e8d1e8b2883fdeb221380e17ea387b3a065cd6dbb671f1caeb7b5a4bab5b901088f081afcdde5ecea10acd810735b95532":hex:"0e7f0664ee95e3de9ef4f9d8faada0851bd1de3a3a767f85a74ba26f7fe8201d":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #2
depends_on:2
4:exp:4:hex:"d3f2af83ed1071e6895b1d57d0969ec7fba3d6316df5031e452c26daababdabb58107846a2a6921ce3502614ae6cc94b9d246a8ceeece6a9cead94cd297838ca96b74a88dcbe24000f8eb719f939a3bc":hex:"0d4223285e53c9e7d743dfafd08fa75c81582d0c507c38cdaa6fa1b398e342e8":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #3
depends_on:2
4:exp:4:hex:"43de428b90ddf2dda3280fc3628c289ea7e623b63a0ad5f568c459eb7d62f739c106327c0f3a8f59e5bed661224e433594f78b3604b10fa048e04181eed885db9665c4eb92d0cb82969a1e5dbdf11fbf":hex:"e9cf65c1c1d8d1fb07a0a66821b810fe8893339949b50909fb9b72883a530ffd":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #4
depends_on:2
4:exp:4:hex:"af0abf3d221f4af4a4571eae06287c994beeffcd8f5df5da72eab03cf108d67f71b91ff2d70698a8578d058c181bfe715d244f5321660dcec025897d9e9b037bdb406bd97fa9c3ce5e6d01d0840cfbfd":hex:"7ee295c84488c3f5d3b2798777f92afcfcfac175a937cb50444831ca60a58650":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #5
depends_on:2
4:exp:4:hex:"54c0128113a4f3e76311736c83581e6c3fa45659c20bc622132ce4f9dcc348e76575da4b0142beddbdcf51904d1febb248a116378bc69acf6d1b4b25d94e9d76145fea73f8bee448964486c39e88034c":hex:"b147253bc1d28e988f99a53a73f5b86868b43c6ca73ec7d559f40f572f2bb74e":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #6
depends_on:2
4:exp:4:hex:"20f4687b717a31f5e818c872952385cd9ac2137abd2e49b9849f01cc2551dcd7f53dddb2449c1a9e793fb8a0447b303dd6da6110768f5d32766e3e3f171305fc68c4948dc6762d3c4d27c66fdf962cef":hex:"0516d63709deee72cc6751191ea05d6aae7ef016dee1ad62159af167a785b353":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #7
depends_on:2
4:exp:4:hex:"ef41067a7ca9b6946155247ce8dbb619795f028d678ccf8f5f5b40e33e8cd15634db8c9141bc2cb0590a545ccd02cef6e1e96fea14fb8a55411d9ebf03633dae0ad449a2121d1c78fbc0e9cd8a78a34b":hex:"7b90a2baa4c139e29c48db6c5b51ccf088fda54e4187611dab44409ce1c36f4b":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #8
depends_on:2
4:exp:4:hex:"4d1a72a7a7efab609c6ea16e4a1150a8c1f8bcf19ec3225ad2eb10c761268d6d2c9b09f982710768aaff9d5e3337b028596f31842fd23e75a668063bdb03cf1d7e1ff419252d44335712f16720aff52b":hex:"e5c9712ec583b2dbbfe76d5eea90b9e3b6815c2e38782192983c6a02efd91afa":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #9
depends_on:2
4:exp:4:hex:"5c9f5de1e3bbb5193bbdabc6211e797dd89eac092995a5539ede5ee3f769c4c3e221e65efd6daebaf2b68e4353c23d08bbfe26b69abd8dbda8e41f4f9057ad7148541cca28ab0c3ea512aadcc65eef28":hex:"17f703c54499fe53e688c6d48b4a0604ed9f6c71b1cb4fb9cde37eb8fd2a2ee0":hex:"":hex:"":hex:"":hex:"11c40f20930a9ae087d5ae4cd93c6d8defc073888f4f8e153b163e7ded25a3313a55b341d40315d78527ae87c932c9071ad6416823d266fe23000e1e33463d2f67c73c6883aa301e5f12820640ffb50b680c3aded1f6b93d21c3c1a9ea01ecc9642f1e653551d6e8fa8af6a8ef626def69c65571f4a26a7d8b7bad126d945961797c8147c3ecad4637f915f8a3a73b3ff235aa3c71273f0cc0e023fa26b8a567db56a456d58536807817d5f9b04fbbb99dca16164652526b4e84781f08f1501364a1e3b709894f010693523facd0ec9c61c41ad9847a9ae47f3b5ee57cdd63aa179caf1cc4957b59461aff01f08180a53334ed436697688c55608a12fddf7239"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #10
depends_on:2
4:exp:4:hex:"c5de35ca4848615697693d839616a4272900db5c894bb13fa3a43afb9e2a714c47a61871bed42c6c2a9d190b946f7201b671991c43e5da4325666b140bf96f0548a7220edf2dbd9bf0bde719061c11e6":hex:"0678789f954ea314dabfce48d090bf93acaa2f89f7e1a92e6ee0f7afb19788fd":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #11
depends_on:2
4:exp:4:hex:"cf72dc871545003348cb2e458c6f4fd6df5220ce389a792f854498cabff1b5c88e3732f6aa95eaca2b318a4d29d2d33f3a289ceb1bd858e3c86c7404825c0c0a812064a05325e09d34553a691a601866":hex:"d8df317e505af016e86297f02fba94059b4cd31529d8c1ee1b33107df753d89d":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #12
depends_on:2
4:exp:4:hex:"c89dc15467ae09d5c514a0941f3945b1f4a1670a4df9910d14c68aa6d3c36e8f5bae0abaefd8fe5300b56a7bc38083b55602025c221e1f0d1671f2ae92bb0c86fde571ccfe8b8b5be8a94f3f1d027ee2":hex:"8109ddb29d8395e938aa210852da6bf1f1a3d00be9df74b372e081d538983174":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #13
depends_on:2
4:exp:4:hex:"1a100ec0da9544326286b38705523ac970b896ef6e6306b2124e283a8851e46d3a4b2bc6a8152ec9b0f88d0e2bd1528b13ea307a3384c10d1fead60b90bf25c305a91558c1537e2a7ac74a85240208f4":hex:"005612d87b6df0204c3d879b5ca30bfc49df4e189285307e2926b367ebac30ff":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 0) #14
depends_on:2
4:exp:4:hex:"47c42df62b4dd570efd3c2722ad39a2df5f969a13f645fd27b5290877ba70916c591934d4f66000ebf8c508fafc44f75d16a2c72c63580b9bcf156862214533a47b1686c871a0165604fdd00a412a484":hex:"94822903cb5c2003c31c6d072ab0dda435add0de7d8f9d5f08b5cba410d888fd":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #0
depends_on:2
4:exp:4:hex:"da740cbc36057a8e282ae717fe7dfbb245e9e5d49908a0119c5dbcf0a1f2d5ab46561ff612217ba3ff91baa06d4b54401d61d4d8a41c3254b92104fd555adae0569d1835bb52657ec7fbba0fe03579c5":hex:"fc227293523ecb5b1e28c87863626627d958acc558a672b148ce19e2abd2dde4":hex:"b9ed8e35ad018a375b61189c8d365b00507cb1b4510d21cac212356b5bbaa8b2":hex:"b7998998eaf9e5d34e64ff7f03de765b31f407899d20535573e670c1b402c26a":hex:"2089d49d63e0c4df58879d0cb1ba998e5b3d1a7786b785e7cf13ca5ea5e33cfd":hex:"5b70f3e4da95264233efbab155b828d4e231b67cc92757feca407cc9615a660871cb07ad1a2e9a99412feda8ee34dc9c57fa08d3f8225b30d29887d20907d12330fffd14d1697ba0756d37491b0a8814106e46c8677d49d9157109c402ad0c247a2f50cd5d99e538c850b906937a05dbb8888d984bc77f6ca00b0e3bc97b16d6d25814a54aa12143afddd8b2263690565d545f4137e593bb3ca88a37b0aadf79726b95c61906257e6dc47acd5b6b7e4b534243b13c16ad5a0a1163c0099fce43f428cd27c3e6463cf5e9a9621f4b3d0b3d4654316f4707675df39278d5783823049477dcce8c57fdbd576711c91301e9bd6bb0d3e72dc46d480ed8f61fd63811"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #1
depends_on:2
4:exp:4:hex:"c2ff911b4c93846d07e0d00eeead3423845c7215c8b5fe315aa638745e63ca26f1062321318087bf045903cd4f5cc9e61a318c2861c6a93948d779ab45f14d451bcef2d43a5ac752995bc0b365bc3fbc":hex:"b62f8ed28a72c28d80b41e016f559bbda0a2a447f8e146eb93a509b302e03c42":hex:"77aa1ff77bf037ae26e60d412f3341715afcc1fcd3bf971a481a15d45c794331":hex:"55ca83dff075f4de57588dcec9bcf0fd1fa267bc280d3c48f1f1f749e1997cc2":hex:"e42e4aeca6716181c71ebd462082309868f6faafb5d9c82357c785283f6d5285":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #2
depends_on:2
4:exp:4:hex:"e1a333ffe4bce7b9f6bbc8dad8787a82ad66ca9b25a64f04b166face945c249b5f45cdd318c0588c7cbcd14846523943a59119683628020e901a0a7fefc21625864ecb1d76ec119a10821b49a3431348":hex:"ce1466063de221c4fa1cc308442db476acfd8ff34b2a0dbbbe0eceeaff210293":hex:"d481e022a80f3e60687bf153524a33bd6fe42c54c39a377a9fc27e047df53f14":hex:"26a88acf67d5ed00184baad664c6b2d4a91d437a121c3cad9eabf3d7e676b0d0":hex:"524e4896a22bedc62820c500ed7da2bbbb4c1ef9f07b5f374d0fb4ae9bbe50e1":hex:"3c3cfdebca060f534a952e4933c2c00f9ee0fcb825a58abb6aebc952e160668f711068881ba8a6817500bba1c28867cf21a12a50e46792abeb9f41bc02322bce1e77d236b7a45a7807fe22b8ea9e2859d2b0164783d364f6ad84f4b9341c576cd6ab2ab249246bd76910e0abf115e4c59e37074de5f4defd03fa61ce1733e33c98849ec28ca61b845035218afa7ee2867b32ba1efc50907d76ccca5a7ba69e9700875b200cec5d1fadaac77a0960c4eb899c06134cd9cb663c62b69446a460bc9e3df7eaf2a34df00fcd838e882f5af1aa701d35dacec0cafbe74cf6dde7893b880071d3f1c9e53b205bdfde9807999e73468264d6172c952a7f5f88a836b1c3"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #3
depends_on:2
4:exp:4:hex:"73cc8caea7f1f2129bd035b77bba2309ca3bec73e9f993fbcce7e3f148670bca656e3f17e5a8ce9bfe3665f4b6ca8ac8111fe051ee0e760b295b73470da27081ff17bfcd6ff9085c5e064ab844927f84":hex:"eef338ebdf4d9399441655090136becbcaf277e5ac73426f79552b3f27819ab6":hex:"2114d320b65a5906d04c5166ee82e727cc53f0ba33ed54a3229ad9592995695d":hex:"e3fce46cd5c90936f20252e0065dee1940c7902198ae105017a8f50d143a50f6":hex:"7ad27ea94de6ec7ad7cc1895381c735f007f6087d688a070b4cdfaecdd2a3345":hex:"858108fe1adf90fb3238363ce3532362675a462563e5c12df97d054267df0b205ed3960d86893c93d2b1997d95abd9179512289297b00cacd1a51202923c4224561e9986d0242f50ea4667fd6402e29d18c184028cc6c85836b1455e2d2e9b389e0d65bcd2c78d5e42ad9e47707c9dd4617e6ef2d64590d0e0be5e4465eb611d91b1a45bca1af04632fc8dd045a5f5ba3ec1fc09e3aaa1d03719181e11c80dcd1c4d1aac3ca69d89b9d2c6ff7575d78843fc4695c1954fc663732418bddba4b20439da03d0428fa047f99a378447f9e563fe405fd8f9c32d580aa6dc1560b9df1530fcc7b337072cb60007b4e2762dc61a08e6511e7c93b91303aa3d46c14483"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #4
depends_on:2
4:exp:4:hex:"5eedd039764e7af96c3ef7d9e094e861dc0839c2a2642c4082afd09f2761c392a4eb8fb607ca7c5d7d4eb8e871aa995037a297af07ba36a59572e3975138fcfea667e06d9a4bfd2e9c570e61fbc09006":hex:"92a258c0ca5a9c030dd469ca5d8883ae5f3fdaf7d8e0fb23867d150f3d24a0a9":hex:"954a9431a4f9b34f6c28fc41be05fefa3449c8ce0265a19b8a422935690b50c7":hex:"1765c701b279cde38b469bf0948f500b5afea8f7eaac3f100ae5f0b147005ea2":hex:"1f6d382b8a8967efb9feffb8557f1cf40f4f65b5fa7d9846cab0601f5150430b":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #5
depends_on:2
4:exp:4:hex:"95e33e3e1e5d24dcfbc5a534ad0e6ab6ab15dd6b094b7642e2187aba9a303137b5b7dc3d70253c3a8b446b591fab6950c4f6a33de5257fdc474a46ebbd367465127e6a9eaa97e17851f9a4d55fe4e954":hex:"7080c7d4ddd8e32fda42ea23adddf7a4d3893be2cb87d6c7293bff521c252189":hex:"611ec30b87ddd1096396d539ec973dcb7c408a62e6c37bfbe563dbb60d9f4932":hex:"8a4a0f9eee67c54e3dfd846ea92981cd769a8c7ff4f2646c85e80a03fc556bc3":hex:"05dc36b5d354f4c3b950053f925616c27e2317f886d2af09ec1eb7ac5397977a":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #6
depends_on:2
4:exp:4:hex:"b43301c1af024ba6cd7eadf985cb1c6c303479ec3ab47797392d4220788f4daec2b1f5ac6138bcb83e938be66b3232f7f022f4e548b93e7a8aa4d853fc1b4c42ed9b182ae582f6876beb268ba23c4105":hex:"ad7fcba1f90b243689b85a4ea1dc150bbeca4093dd8b9a0a491a678011ad807d":hex:"0410527589e72024491d4b5328b5659a330d9b167a1a27251363e262f393eb57":hex:"5de8fac62063a676904aa9628046fe71f080ce285ef964acdcd11260734f2d90":hex:"2f14a327bdbb9be4d9a813dd73445c8a8c911a874daf08a551e867f54983de2f":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #7
depends_on:2
4:exp:4:hex:"837e9048e5564df02e25f7b7585ac5600ce4cd6a6de8311c6b3c6084356ad0f9fcddad47e7bb6ad7ac9f33145de135605866611c2b083fd1f9e5cea98f2725cdcfb0d2ff6f0adb74d6fb61f8a6ca02b0":hex:"1d194d69897c5a7e8c36cc4cd97784312c9b6599274e3b20d022b1349ac45c58":hex:"b6a8880d415cc4b2aadaad6d7d2dc73484b70909345bd209520c05fe7f5cdc80":hex:"31bd3fc264c252bd3f8102529763d5ad3e45a4e068677423e698160db284bf11":hex:"0b845cf842d1ccc15c2fa7224ad121b9b5f8acd1e07b16c143c931da56620906":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #8
depends_on:2
4:exp:4:hex:"f840c75ce0cdb200a3bd980d6cedf1c7321e5f303cd0446c7afd2d2d66657447b215333b15d55326bc9bebae6ae36efea3a337c6fbeb6a979a4783f2b7f0f0dd6d3a9d3747de639a9047248a04a19f5b":hex:"6d5ca4b1edf6c0afbdce02ecb30923b2f4f2b33121e21b2ffee964cc7de1abe8":hex:"f56d2b1584ba2f129c77b29590c4e1dfdab5527b1791e3e445750ca6d4ae3542":hex:"05bd799249411b37b80590d49f3348631b06a2408a61635c70687003a8485302":hex:"12d26ac3b87924cda5d78a3e3c0bd81280e340723643ed1b2ebf2dfd52f5dc43":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #9
depends_on:2
4:exp:4:hex:"c91db86e3984dbaa25ae5d851ef341eb647bd1df0517e171fb86069cf6183c19a386746ccd0a7e81f3557038711db7259926089317ab7142d6ab6050b1f7dfc21080910d43a702cce93cb1d3b155d22e":hex:"a4585c13c83f962df72b58230ea123846df652b2810766bb671f675b96125a4d":hex:"fb31319b4e622dedaa88b64aed93bb108362234c3d3ecefc78f796aeadd9c8e8":hex:"877bafbab3bf9c20b1a85a5f4b3dd11a5c486042b807c39d59fde1eaed89cced":hex:"89a5af332718418758129b8212643750542bf957bf35c64d6b0a276238c808f3":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #10
depends_on:2
4:exp:4:hex:"3e4c40b9b33063edbfd21bc4e34c5bc1f454d7ed176e4f6edc3ab056a3b0d1a79170479fd91d6e30caf99166842e0175b2941a7186d8c3f54e6f5f9884e47dd22a161a3fc5e00c1c9ca5a744c6a7f7b2":hex:"7a3d7511b93842159162176b7016106e61573aa42c57aca7bbfc97b3388c28b3":hex:"d88781b3afe2e1500b6881aa9cc23dd150054da57be0ca127e101a9fbc4decce":hex:"6231b0f5cf182c6f108491c5b7ebed9b2a015e9698e860623e9a12e691a38899":hex:"bda666c5ac006d6efc2aa0da52e74eded88955f8f064bfaa52d9f2524a195f59":hex:"2d7d62310bfc4a3347122e23655a10dfc54fac51349f0c8d586aad39236a20368f4d96623e58987f7c1184148d586022a4b96976f72636eb1aa92ad221c5866b6c6803cbf6c982e1de12bc89618aeb3f844b2a518a578714e2380075acb828685a57683179753fd1ebd2d8aa1672940446756829d6ac1cafbb21858465789adc024b8fa544bea09cd4f1f3ed35f298d4619a5f92a6e4f712a0032307ed781166d7a6af2a352694be7fd3bc8a151ea848f8b14da8150eb22e264d76e655fdb3638bf250546eb29ff27850d2b5697932c6a876743561e0894a01ce8435cef74800f11e4bf44fa5149a6fa4f4ca43267a47d3841722ae7efd09676f341a54ff1bc7"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #11
depends_on:2
4:exp:4:hex:"fe4f5247dc405c12133e9cf7fe00483649d0e7b70fdb1b39f8e8ed0a4789a0c9ab78417816b54d47cf98c0aa4246ab0d68028d1e7441ab77c5eaaf9aba0f2ac6e1be2af480026d44d5eec0e46fdd31b1":hex:"5c5a5e517b3acb6d6d75742bc293e4d091d7b0bf37559f75df98d6306bcc2d22":hex:"5f56dc4800297a3fa8e2b38483c29505485628866ff175b19d4abaf4526bad92":hex:"d9bc081026ea5e35a52b9d1868688e03aed785af201e355cf51e6e8cec917c34":hex:"bcec655ee8c482e725c5b915b4085a9d678ea26b71c1ce0a85f741f9fb3c3607":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #12
depends_on:2
4:exp:4:hex:"9d129142ba466c27f348d5949fafb79675e334fc3a1948e5d008ee265076467bfa435596b661c527a82e5a064fd56cb6f17f549c77a0a6a998712ef0e1f41ba4eeb354f77565f7a7627eaeab83ea48fe":hex:"ac23c42315f2bbe54eba535a7299113cfc88216727ede9f154d7bddd88041259":hex:"7f029d2430d49de4909a758a2bda4f219d37eff01c96de7ca2a4071d128a1c9d":hex:"4b6a443312f10348f6aba088d1f81206c696508a75836e98951604e93fa6db51":hex:"bc128051ddc96eef9fbc3a23ff458240d11a229d1a75888d622ceb7519e1db6a":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #13
depends_on:2
4:exp:4:hex:"2fba8ed5b2be9af95fb02183ca8ae0dcca90b209be73511a5dab31ec81e939117e529fca4f95a483bd307838ef0d779dbbfe77df481d807b309da929f319b39287d3ae0994f77ff616f0a763f35d44a3":hex:"2de698d32010618c25ed86cccad2ea4d9fb9adf7b3dc400a2b1b4c975651d103":hex:"f9ffcfd5bc9a08f6f9059f4bb7f49e093f404aa7fe736bbf4018734071c26334":hex:"a309fb1f43a520a22946a6418500929e19d2b3316fb1a8c1aa5d047ddfdb8d49":hex:"c1dbfdb9bdd4a3321074b57e11e5ec6dfc374248a918242fb3e22cc6612b3239":hex:"3eee1bdb63433c55971297e15ac1691cbdfed576b1d2ada27cab33e660a3c8575fe989ef73e13058c9a3777c35bff1dab25e1991b78cc446738ccce723eb02136fcb24a0dd2597c3fd0a75774c4a21409689e9309e962be1e8b096c2dde59ad9dc6750051058ff6a18d57a19ec2775882ea0af65b172ed718678d841fb51437aa3133b2b328df0f4ac916a01d88c740981bf71c4664789ca4e9d3f7fdbe7379231b64683fc891c5222f8b396a446f3b50dde823f95177b7284663402fe5452fe7bdee304abe34d71172170ff3a911782b72b2556f2337d1d23d9d632bf6831d3c173fea3ca8eb5d7993a58a4b9f8f64d5c89319acbc847576b383fae0178a097"
HMAC_DRBG NIST CAVS 14.3 PR False (SHA-512, 256, 256) #14
depends_on:2
4:exp:4:hex:"a9fd18764900768b7909db87dd4c7b87baa2cae6b0f62a8c2ee3e4c550041ca7435c7b35ecc6ef373dde3d989420b92c2bb32f9fc8c766ab840f5d0c73558dcac87e2102c28193e7ffd3381bc30e1d31":hex:"8bfc5a65fa21396081d92c3d7206f92637389c60cd7a14f11811c91535c0083e":hex:"404236bfe24b471ac7df938be6a96b8ebf8bc758787714d226ce727e9d2b4bd6":hex:"8151ae3237ca06ca5b0373039681a9d3cf799e98c3fa2efb576822f1fe0aaa06":hex:"11f0f8a2c16b1bc15fc93ff4793894f22d7494d11c94dde5ead2f0fb09bae6cb":hex:"9c636c3228432fb70d521eaed3ba8e436507e29163de0f5b7e0aa9a5177aa1a3930b95f72fb0561353db7213cde9ebdbd9485a5df93ff416966e09c1e61d8f805e6a082d6372d58301660a9a0181e2ef906a5a8a999c88002eb4b4132b34efd21618871ce28be5e66a65a1782de11e8e11c57a2debc85b0068ab553400b26a0a0f948ccb4e8bbc1173dcdab388c20ef6e2c9ac796d8816572ebc134396d38d71ba8e986eeb063a7baf5ccdcf583a723ba56bec38d4cd3e7bea563b4132f19b730189f559300091e9171a61469460ca82d39b5148e4d288037f6926e96f384eaaa0efdacf2ad93f0da4fdca0bc5ec0f0d7c0e8dadffae4e46ae96a6511735a80e"
| 201,400 | 1,201 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_chacha20.datax | ChaCha20 RFC 7539 Example and Test Vector (Encrypt)
0:hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f":hex:"000000000000004a00000000":int:1:hex:"4c616469657320616e642047656e746c656d656e206f662074686520636c617373206f66202739393a204966204920636f756c64206f6666657220796f75206f6e6c79206f6e652074697020666f7220746865206675747572652c2073756e73637265656e20776f756c642062652069742e":hex:"6e2e359a2568f98041ba0728dd0d6981e97e7aec1d4360c20a27afccfd9fae0bf91b65c5524733ab8f593dabcd62b3571639d624e65152ab8f530c359f0861d807ca0dbf500d6a6156a38e088a22b65e52bc514d16ccf806818ce91ab77937365af90bbf74a35be6b40b8eedf2785e42874d"
ChaCha20 RFC 7539 Example and Test Vector (Decrypt)
0:hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f":hex:"000000000000004a00000000":int:1:hex:"6e2e359a2568f98041ba0728dd0d6981e97e7aec1d4360c20a27afccfd9fae0bf91b65c5524733ab8f593dabcd62b3571639d624e65152ab8f530c359f0861d807ca0dbf500d6a6156a38e088a22b65e52bc514d16ccf806818ce91ab77937365af90bbf74a35be6b40b8eedf2785e42874d":hex:"4c616469657320616e642047656e746c656d656e206f662074686520636c617373206f66202739393a204966204920636f756c64206f6666657220796f75206f6e6c79206f6e652074697020666f7220746865206675747572652c2073756e73637265656e20776f756c642062652069742e"
ChaCha20 RFC 7539 Test Vector #1 (Encrypt)
0:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"000000000000000000000000":int:0:hex:"00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000":hex:"76b8e0ada0f13d90405d6ae55386bd28bdd219b8a08ded1aa836efcc8b770dc7da41597c5157488d7724e03fb8d84a376a43b8f41518a11cc387b669b2ee6586"
ChaCha20 RFC 7539 Test Vector #1 (Decrypt)
0:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"000000000000000000000000":int:0:hex:"76b8e0ada0f13d90405d6ae55386bd28bdd219b8a08ded1aa836efcc8b770dc7da41597c5157488d7724e03fb8d84a376a43b8f41518a11cc387b669b2ee6586":hex:"00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"
ChaCha20 RFC 7539 Test Vector #2 (Encrypt)
0:hex:"0000000000000000000000000000000000000000000000000000000000000001":hex:"000000000000000000000002":int:1:hex:"416e79207375626d697373696f6e20746f20746865204945544620696e74656e6465642062792074686520436f6e7472696275746f7220666f72207075626c69636174696f6e20617320616c6c206f722070617274206f6620616e204945544620496e7465726e65742d4472616674206f722052464320616e6420616e792073746174656d656e74206d6164652077697468696e2074686520636f6e74657874206f6620616e204945544620616374697669747920697320636f6e7369646572656420616e20224945544620436f6e747269627574696f6e222e20537563682073746174656d656e747320696e636c756465206f72616c2073746174656d656e747320696e20494554462073657373696f6e732c2061732077656c6c206173207772697474656e20616e6420656c656374726f6e696320636f6d6d756e69636174696f6e73206d61646520617420616e792074696d65206f7220706c6163652c207768696368206172652061646472657373656420746f":hex:"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"
ChaCha20 RFC 7539 Test Vector #2 (Decrypt)
0:hex:"0000000000000000000000000000000000000000000000000000000000000001":hex:"000000000000000000000002":int:1:hex:"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":hex:"416e79207375626d697373696f6e20746f20746865204945544620696e74656e6465642062792074686520436f6e7472696275746f7220666f72207075626c69636174696f6e20617320616c6c206f722070617274206f6620616e204945544620496e7465726e65742d4472616674206f722052464320616e6420616e792073746174656d656e74206d6164652077697468696e2074686520636f6e74657874206f6620616e204945544620616374697669747920697320636f6e7369646572656420616e20224945544620436f6e747269627574696f6e222e20537563682073746174656d656e747320696e636c756465206f72616c2073746174656d656e747320696e20494554462073657373696f6e732c2061732077656c6c206173207772697474656e20616e6420656c656374726f6e696320636f6d6d756e69636174696f6e73206d61646520617420616e792074696d65206f7220706c6163652c207768696368206172652061646472657373656420746f"
ChaCha20 RFC 7539 Test Vector #3 (Encrypt)
0:hex:"1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0":hex:"000000000000000000000002":int:42:hex:"2754776173206272696c6c69672c20616e642074686520736c6974687920746f7665730a446964206779726520616e642067696d626c6520696e2074686520776162653a0a416c6c206d696d737920776572652074686520626f726f676f7665732c0a416e6420746865206d6f6d65207261746873206f757467726162652e":hex:"62e6347f95ed87a45ffae7426f27a1df5fb69110044c0d73118effa95b01e5cf166d3df2d721caf9b21e5fb14c616871fd84c54f9d65b283196c7fe4f60553ebf39c6402c42234e32a356b3e764312a61a5532055716ead6962568f87d3f3f7704c6a8d1bcd1bf4d50d6154b6da731b187b58dfd728afa36757a797ac188d1"
ChaCha20 RFC 7539 Test Vector #3 (Decrypt)
0:hex:"1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0":hex:"000000000000000000000002":int:42:hex:"62e6347f95ed87a45ffae7426f27a1df5fb69110044c0d73118effa95b01e5cf166d3df2d721caf9b21e5fb14c616871fd84c54f9d65b283196c7fe4f60553ebf39c6402c42234e32a356b3e764312a61a5532055716ead6962568f87d3f3f7704c6a8d1bcd1bf4d50d6154b6da731b187b58dfd728afa36757a797ac188d1":hex:"2754776173206272696c6c69672c20616e642074686520736c6974687920746f7665730a446964206779726520616e642067696d626c6520696e2074686520776162653a0a416c6c206d696d737920776572652074686520626f726f676f7665732c0a416e6420746865206d6f6d65207261746873206f757467726162652e"
ChaCha20 Paremeter Validation
1
ChaCha20 Selftest
2
| 6,858 | 31 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.chachapoly.datax | Decrypt empty buffer
depends_on:0
6:exp:0:int:0:int:0
ChaCha20+Poly1305 Encrypt and decrypt 0 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:0:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 1 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:1:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 2 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:2:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 7 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:7:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 8 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:8:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 9 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:9:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 15 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:15:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 16 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:16:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 17 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:17:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 31 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:31:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 32 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:32:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 33 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:33:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 47 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:47:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 48 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:48:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 49 bytes
depends_on:0
4:exp:0:char*:"CHACHA20-POLY1305":int:256:int:49:exp:1
ChaCha20+Poly1305 Encrypt and decrypt 0 bytes in multiple parts 1
depends_on:0
7:exp:0:int:256:int:0:int:0:exp:1:int:0:int:0:int:0:int:0
ChaCha20+Poly1305 Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:0
7:exp:0:int:256:int:1:int:0:exp:1:int:1:int:0:int:1:int:0
ChaCha20+Poly1305 Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:0
7:exp:0:int:256:int:0:int:1:exp:1:int:0:int:1:int:0:int:1
ChaCha20+Poly1305 Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:0
7:exp:0:int:256:int:16:int:0:exp:1:int:16:int:0:int:16:int:0
ChaCha20+Poly1305 Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:0
7:exp:0:int:256:int:0:int:16:exp:1:int:0:int:16:int:0:int:16
ChaCha20+Poly1305 Encrypt and decrypt 16 bytes in multiple parts 3
depends_on:0
7:exp:0:int:256:int:1:int:15:exp:1:int:1:int:15:int:1:int:15
ChaCha20+Poly1305 Encrypt and decrypt 16 bytes in multiple parts 4
depends_on:0
7:exp:0:int:256:int:15:int:1:exp:1:int:15:int:1:int:15:int:1
ChaCha20+Poly1305 Encrypt and decrypt 22 bytes in multiple parts 1
depends_on:0
7:exp:0:int:256:int:15:int:7:exp:1:int:15:int:7:int:15:int:7
ChaCha20+Poly1305 Encrypt and decrypt 22 bytes in multiple parts 2
depends_on:0
7:exp:0:int:256:int:7:int:15:exp:1:int:7:int:15:int:7:int:15
ChaCha20+Poly1305 Encrypt and decrypt 22 bytes in multiple parts 3
depends_on:0
7:exp:0:int:256:int:16:int:6:exp:1:int:16:int:6:int:16:int:6
ChaCha20+Poly1305 Encrypt and decrypt 22 bytes in multiple parts 4
depends_on:0
7:exp:0:int:256:int:6:int:16:exp:1:int:6:int:16:int:6:int:16
ChaCha20+Poly1305 Encrypt and decrypt 32 bytes in multiple parts
depends_on:0
7:exp:0:int:256:int:16:int:16:exp:1:int:16:int:16:int:16:int:16
ChaCha20+Poly1305 RFC 7539 Test Vector #1
depends_on:0
9:exp:0:hex:"1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0":hex:"000000000102030405060708":hex:"f33388860000000000004e91":hex:"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":hex:"eead9d67890cbb22392336fea1851f38":char*:"":hex:"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":int:0
ChaCha20+Poly1305 RFC 7539 Test Vector #1 Unauthentic (1st bit flipped)
depends_on:0
9:exp:0:hex:"1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0":hex:"000000000102030405060708":hex:"f33388860000000000004e91":hex:"64a0861575861af460f062c79be643bd5e805cfd345cf389f108670ac76c8cb24c6cfc18755d43eea09ee94e382d26b0bdb7b73c321b0100d4f03b7f355894cf332f830e710b97ce98c8a84abd0b948114ad176e008d33bd60f982b1ff37c8559797a06ef4f0ef61c186324e2b3506383606907b6a7c02b0f9f6157b53c867e4b9166c767b804d46a59b5216cde7a4e99040c5a40433225ee282a1b0a06c523eaf4534d7f83fa1155b0047718cbc546a0d072b04b3564eea1b422273f548271a0bb2316053fa76991955ebd63159434ecebb4e466dae5a1073a6727627097a1049e617d91d361094fa68f0ff77987130305beaba2eda04df997b714d6c6f2c29a6ad5cb4022b02709b":hex:"6ead9d67890cbb22392336fea1851f38":char*:"FAIL":hex:"":int:0
Chacha20+Poly1305 RFC 7539 Test Vector #1 (streaming)
depends_on:0
8:exp:0:exp:1:hex:"1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0":hex:"000000000102030405060708":hex:"64a0861575861af460f062c79be643bd5e805cfd345cf389f108670ac76c8cb24c6cfc18755d43eea09ee94e382d26b0bdb7b73c321b0100d4f03b7f355894cf332f830e710b97ce98c8a84abd0b948114ad176e008d33bd60f982b1ff37c8559797a06ef4f0ef61c186324e2b3506383606907b6a7c02b0f9f6157b53c867e4b9166c767b804d46a59b5216cde7a4e99040c5a40433225ee282a1b0a06c523eaf4534d7f83fa1155b0047718cbc546a0d072b04b3564eea1b422273f548271a0bb2316053fa76991955ebd63159434ecebb4e466dae5a1073a6727627097a1049e617d91d361094fa68f0ff77987130305beaba2eda04df997b714d6c6f2c29a6ad5cb4022b02709b":hex:"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":hex:"f33388860000000000004e91":hex:"eead9d67890cbb22392336fea1851f38":int:0:int:0
| 6,970 | 125 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_pkcs1_v21.datax | RSAES-OAEP Encryption Test Vector Int
0:int:1024:int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:0:hex:"d436e99569fd32a7c8a05bbc90d32c49":hex:"aafd12f659cae63489b479e5076ddec2f06cb58f":hex:"1253e04dc0a5397bb44a7ab87e9bf2a039a33d1e996fc82a94ccd30074c95df763722017069e5268da5d1c0b4f872cf653c11df82314a67968dfeae28def04bb6d84b1c31d654a1970e5783bd6eb96a024c2ca2f4a90fe9f2ef5c9c140e5bb48da9536ad8700c84fc9130adea74e558d51a74ddf85d8b50de96838d6063e0955":int:0
RSAES-OAEP Encryption Test Vector Data just fits
0:int:1024:int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:0:hex:"d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd":hex:"aafd12f659cae63489b479e5076ddec2f06cb58f":hex:"3082f2288fff275213d53168f0a272573cff81837c249dc1f380a12ac124c8f217b700708a1ce7dce154265f31a126ebdd9ed3ef9145ae29124a25f4e65aa52c5a9ff34f6cf4de9ba937ae406dc7d1f277af4f6fb7ea73bfbab2bd397b6b2c53570e173ffcf3b9f0bb96837623a4f87bd81b41446c59e681a2f3da81239e9bdf":int:0
RSAES-OAEP Encryption Test Vector Data too long
0:int:1024:int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:0:hex:"d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd00":hex:"aafd12f659cae63489b479e5076ddec2f06cb58f":hex:"1253e04dc0a5397bb44a7ab87e9bf2a039a33d1e996fc82a94ccd30074c95df763722017069e5268da5d1c0b4f872cf653c11df82314a67968dfeae28def04bb6d84b1c31d654a1970e5783bd6eb96a024c2ca2f4a90fe9f2ef5c9c140e5bb48da9536ad8700c84fc9130adea74e558d51a74ddf85d8b50de96838d6063e0955":exp:1
RSAES-OAEP Encryption Test Vector 1_1
0:int:1024:int:16:char*:"a8b3b284af8eb50b387034a860f146c4919f318763cd6c5598c8ae4811a1e0abc4c7e0b082d693a5e7fced675cf4668512772c0cbc64a742c6c630f533c8cc72f62ae833c40bf25842e984bb78bdbf97c0107d55bdb662f5c4e0fab9845cb5148ef7392dd3aaff93ae1e6b667bb3d4247616d4f5ba10d4cfd226de88d39f16fb":int:16:char*:"010001":exp:0:hex:"6628194e12073db03ba94cda9ef9532397d50dba79b987004afefe34":hex:"18b776ea21069d69776a33e96bad48e1dda0a5ef":hex:"354fe67b4a126d5d35fe36c777791a3f7ba13def484e2d3908aff722fad468fb21696de95d0be911c2d3174f8afcc201035f7b6d8e69402de5451618c21a535fa9d7bfc5b8dd9fc243f8cf927db31322d6e881eaa91a996170e657a05a266426d98c88003f8477c1227094a0d9fa1e8c4024309ce1ecccb5210035d47ac72e8a":int:0
RSAES-OAEP Encryption Test Vector 1_2
0:int:1024:int:16:char*:"a8b3b284af8eb50b387034a860f146c4919f318763cd6c5598c8ae4811a1e0abc4c7e0b082d693a5e7fced675cf4668512772c0cbc64a742c6c630f533c8cc72f62ae833c40bf25842e984bb78bdbf97c0107d55bdb662f5c4e0fab9845cb5148ef7392dd3aaff93ae1e6b667bb3d4247616d4f5ba10d4cfd226de88d39f16fb":int:16:char*:"010001":exp:0:hex:"750c4047f547e8e41411856523298ac9bae245efaf1397fbe56f9dd5":hex:"0cc742ce4a9b7f32f951bcb251efd925fe4fe35f":hex:"640db1acc58e0568fe5407e5f9b701dff8c3c91e716c536fc7fcec6cb5b71c1165988d4a279e1577d730fc7a29932e3f00c81515236d8d8e31017a7a09df4352d904cdeb79aa583adcc31ea698a4c05283daba9089be5491f67c1a4ee48dc74bbbe6643aef846679b4cb395a352d5ed115912df696ffe0702932946d71492b44":int:0
RSAES-OAEP Encryption Test Vector 1_3
0:int:1024:int:16:char*:"a8b3b284af8eb50b387034a860f146c4919f318763cd6c5598c8ae4811a1e0abc4c7e0b082d693a5e7fced675cf4668512772c0cbc64a742c6c630f533c8cc72f62ae833c40bf25842e984bb78bdbf97c0107d55bdb662f5c4e0fab9845cb5148ef7392dd3aaff93ae1e6b667bb3d4247616d4f5ba10d4cfd226de88d39f16fb":int:16:char*:"010001":exp:0:hex:"d94ae0832e6445ce42331cb06d531a82b1db4baad30f746dc916df24d4e3c2451fff59a6423eb0e1d02d4fe646cf699dfd818c6e97b051":hex:"2514df4695755a67b288eaf4905c36eec66fd2fd":hex:"423736ed035f6026af276c35c0b3741b365e5f76ca091b4e8c29e2f0befee603595aa8322d602d2e625e95eb81b2f1c9724e822eca76db8618cf09c5343503a4360835b5903bc637e3879fb05e0ef32685d5aec5067cd7cc96fe4b2670b6eac3066b1fcf5686b68589aafb7d629b02d8f8625ca3833624d4800fb081b1cf94eb":int:0
RSAES-OAEP Encryption Test Vector 1_4
0:int:1024:int:16:char*:"a8b3b284af8eb50b387034a860f146c4919f318763cd6c5598c8ae4811a1e0abc4c7e0b082d693a5e7fced675cf4668512772c0cbc64a742c6c630f533c8cc72f62ae833c40bf25842e984bb78bdbf97c0107d55bdb662f5c4e0fab9845cb5148ef7392dd3aaff93ae1e6b667bb3d4247616d4f5ba10d4cfd226de88d39f16fb":int:16:char*:"010001":exp:0:hex:"52e650d98e7f2a048b4f86852153b97e01dd316f346a19f67a85":hex:"c4435a3e1a18a68b6820436290a37cefb85db3fb":hex:"45ead4ca551e662c9800f1aca8283b0525e6abae30be4b4aba762fa40fd3d38e22abefc69794f6ebbbc05ddbb11216247d2f412fd0fba87c6e3acd888813646fd0e48e785204f9c3f73d6d8239562722dddd8771fec48b83a31ee6f592c4cfd4bc88174f3b13a112aae3b9f7b80e0fc6f7255ba880dc7d8021e22ad6a85f0755":int:0
RSAES-OAEP Encryption Test Vector 1_5
0:int:1024:int:16:char*:"a8b3b284af8eb50b387034a860f146c4919f318763cd6c5598c8ae4811a1e0abc4c7e0b082d693a5e7fced675cf4668512772c0cbc64a742c6c630f533c8cc72f62ae833c40bf25842e984bb78bdbf97c0107d55bdb662f5c4e0fab9845cb5148ef7392dd3aaff93ae1e6b667bb3d4247616d4f5ba10d4cfd226de88d39f16fb":int:16:char*:"010001":exp:0:hex:"8da89fd9e5f974a29feffb462b49180f6cf9e802":hex:"b318c42df3be0f83fea823f5a7b47ed5e425a3b5":hex:"36f6e34d94a8d34daacba33a2139d00ad85a9345a86051e73071620056b920e219005855a213a0f23897cdcd731b45257c777fe908202befdd0b58386b1244ea0cf539a05d5d10329da44e13030fd760dcd644cfef2094d1910d3f433e1c7c6dd18bc1f2df7f643d662fb9dd37ead9059190f4fa66ca39e869c4eb449cbdc439":int:0
RSAES-OAEP Encryption Test Vector 1_6
0:int:1024:int:16:char*:"a8b3b284af8eb50b387034a860f146c4919f318763cd6c5598c8ae4811a1e0abc4c7e0b082d693a5e7fced675cf4668512772c0cbc64a742c6c630f533c8cc72f62ae833c40bf25842e984bb78bdbf97c0107d55bdb662f5c4e0fab9845cb5148ef7392dd3aaff93ae1e6b667bb3d4247616d4f5ba10d4cfd226de88d39f16fb":int:16:char*:"010001":exp:0:hex:"26521050844271":hex:"e4ec0982c2336f3a677f6a356174eb0ce887abc2":hex:"42cee2617b1ecea4db3f4829386fbd61dafbf038e180d837c96366df24c097b4ab0fac6bdf590d821c9f10642e681ad05b8d78b378c0f46ce2fad63f74e0ad3df06b075d7eb5f5636f8d403b9059ca761b5c62bb52aa45002ea70baace08ded243b9d8cbd62a68ade265832b56564e43a6fa42ed199a099769742df1539e8255":int:0
RSAES-OAEP Encryption Test Vector 2_1
0:int:1025:int:16:char*:"01947c7fce90425f47279e70851f25d5e62316fe8a1df19371e3e628e260543e4901ef6081f68c0b8141190d2ae8daba7d1250ec6db636e944ec3722877c7c1d0a67f14b1694c5f0379451a43e49a32dde83670b73da91a1c99bc23b436a60055c610f0baf99c1a079565b95a3f1526632d1d4da60f20eda25e653c4f002766f45":int:16:char*:"010001":exp:0:hex:"8ff00caa605c702830634d9a6c3d42c652b58cf1d92fec570beee7":hex:"8c407b5ec2899e5099c53e8ce793bf94e71b1782":hex:"0181af8922b9fcb4d79d92ebe19815992fc0c1439d8bcd491398a0f4ad3a329a5bd9385560db532683c8b7da04e4b12aed6aacdf471c34c9cda891addcc2df3456653aa6382e9ae59b54455257eb099d562bbe10453f2b6d13c59c02e10f1f8abb5da0d0570932dacf2d0901db729d0fefcc054e70968ea540c81b04bcaefe720e":int:0
RSAES-OAEP Encryption Test Vector 2_2
0:int:1025:int:16:char*:"01947c7fce90425f47279e70851f25d5e62316fe8a1df19371e3e628e260543e4901ef6081f68c0b8141190d2ae8daba7d1250ec6db636e944ec3722877c7c1d0a67f14b1694c5f0379451a43e49a32dde83670b73da91a1c99bc23b436a60055c610f0baf99c1a079565b95a3f1526632d1d4da60f20eda25e653c4f002766f45":int:16:char*:"010001":exp:0:hex:"2d":hex:"b600cf3c2e506d7f16778c910d3a8b003eee61d5":hex:"018759ff1df63b2792410562314416a8aeaf2ac634b46f940ab82d64dbf165eee33011da749d4bab6e2fcd18129c9e49277d8453112b429a222a8471b070993998e758861c4d3f6d749d91c4290d332c7a4ab3f7ea35ff3a07d497c955ff0ffc95006b62c6d296810d9bfab024196c7934012c2df978ef299aba239940cba10245":int:0
RSAES-OAEP Encryption Test Vector 2_3
0:int:1025:int:16:char*:"01947c7fce90425f47279e70851f25d5e62316fe8a1df19371e3e628e260543e4901ef6081f68c0b8141190d2ae8daba7d1250ec6db636e944ec3722877c7c1d0a67f14b1694c5f0379451a43e49a32dde83670b73da91a1c99bc23b436a60055c610f0baf99c1a079565b95a3f1526632d1d4da60f20eda25e653c4f002766f45":int:16:char*:"010001":exp:0:hex:"74fc88c51bc90f77af9d5e9a4a70133d4b4e0b34da3c37c7ef8e":hex:"a73768aeeaa91f9d8c1ed6f9d2b63467f07ccae3":hex:"018802bab04c60325e81c4962311f2be7c2adce93041a00719c88f957575f2c79f1b7bc8ced115c706b311c08a2d986ca3b6a9336b147c29c6f229409ddec651bd1fdd5a0b7f610c9937fdb4a3a762364b8b3206b4ea485fd098d08f63d4aa8bb2697d027b750c32d7f74eaf5180d2e9b66b17cb2fa55523bc280da10d14be2053":int:0
RSAES-OAEP Encryption Test Vector 2_4
0:int:1025:int:16:char*:"01947c7fce90425f47279e70851f25d5e62316fe8a1df19371e3e628e260543e4901ef6081f68c0b8141190d2ae8daba7d1250ec6db636e944ec3722877c7c1d0a67f14b1694c5f0379451a43e49a32dde83670b73da91a1c99bc23b436a60055c610f0baf99c1a079565b95a3f1526632d1d4da60f20eda25e653c4f002766f45":int:16:char*:"010001":exp:0:hex:"a7eb2a5036931d27d4e891326d99692ffadda9bf7efd3e34e622c4adc085f721dfe885072c78a203b151739be540fa8c153a10f00a":hex:"9a7b3b0e708bd96f8190ecab4fb9b2b3805a8156":hex:"00a4578cbc176318a638fba7d01df15746af44d4f6cd96d7e7c495cbf425b09c649d32bf886da48fbaf989a2117187cafb1fb580317690e3ccd446920b7af82b31db5804d87d01514acbfa9156e782f867f6bed9449e0e9a2c09bcecc6aa087636965e34b3ec766f2fe2e43018a2fddeb140616a0e9d82e5331024ee0652fc7641":int:0
RSAES-OAEP Encryption Test Vector 2_5
0:int:1025:int:16:char*:"01947c7fce90425f47279e70851f25d5e62316fe8a1df19371e3e628e260543e4901ef6081f68c0b8141190d2ae8daba7d1250ec6db636e944ec3722877c7c1d0a67f14b1694c5f0379451a43e49a32dde83670b73da91a1c99bc23b436a60055c610f0baf99c1a079565b95a3f1526632d1d4da60f20eda25e653c4f002766f45":int:16:char*:"010001":exp:0:hex:"2ef2b066f854c33f3bdcbb5994a435e73d6c6c":hex:"eb3cebbc4adc16bb48e88c8aec0e34af7f427fd3":hex:"00ebc5f5fda77cfdad3c83641a9025e77d72d8a6fb33a810f5950f8d74c73e8d931e8634d86ab1246256ae07b6005b71b7f2fb98351218331ce69b8ffbdc9da08bbc9c704f876deb9df9fc2ec065cad87f9090b07acc17aa7f997b27aca48806e897f771d95141fe4526d8a5301b678627efab707fd40fbebd6e792a25613e7aec":int:0
RSAES-OAEP Encryption Test Vector 2_6
0:int:1025:int:16:char*:"01947c7fce90425f47279e70851f25d5e62316fe8a1df19371e3e628e260543e4901ef6081f68c0b8141190d2ae8daba7d1250ec6db636e944ec3722877c7c1d0a67f14b1694c5f0379451a43e49a32dde83670b73da91a1c99bc23b436a60055c610f0baf99c1a079565b95a3f1526632d1d4da60f20eda25e653c4f002766f45":int:16:char*:"010001":exp:0:hex:"8a7fb344c8b6cb2cf2ef1f643f9a3218f6e19bba89c0":hex:"4c45cf4d57c98e3d6d2095adc51c489eb50dff84":hex:"010839ec20c27b9052e55befb9b77e6fc26e9075d7a54378c646abdf51e445bd5715de81789f56f1803d9170764a9e93cb78798694023ee7393ce04bc5d8f8c5a52c171d43837e3aca62f609eb0aa5ffb0960ef04198dd754f57f7fbe6abf765cf118b4ca443b23b5aab266f952326ac4581100644325f8b721acd5d04ff14ef3a":int:0
RSAES-OAEP Encryption Example 3_1
0:int:1026:int:16:char*:"02b58fec039a860700a4d7b6462f93e6cdd491161ddd74f4e810b40e3c1652006a5c277b2774c11305a4cbab5a78efa57e17a86df7a3fa36fc4b1d2249f22ec7c2dd6a463232accea906d66ebe80b5704b10729da6f833234abb5efdd4a292cbfad33b4d33fa7a14b8c397b56e3acd21203428b77cdfa33a6da706b3d8b0fc43e9":int:16:char*:"010001":exp:0:hex:"087820b569e8fa8d":hex:"8ced6b196290805790e909074015e6a20b0c4894":hex:"026a0485d96aebd96b4382085099b962e6a2bdec3d90c8db625e14372de85e2d5b7baab65c8faf91bb5504fb495afce5c988b3f6a52e20e1d6cbd3566c5cd1f2b8318bb542cc0ea25c4aab9932afa20760eaddec784396a07ea0ef24d4e6f4d37e5052a7a31e146aa480a111bbe926401307e00f410033842b6d82fe5ce4dfae80":int:0
RSAES-OAEP Encryption Example 3_2
0:int:1026:int:16:char*:"02b58fec039a860700a4d7b6462f93e6cdd491161ddd74f4e810b40e3c1652006a5c277b2774c11305a4cbab5a78efa57e17a86df7a3fa36fc4b1d2249f22ec7c2dd6a463232accea906d66ebe80b5704b10729da6f833234abb5efdd4a292cbfad33b4d33fa7a14b8c397b56e3acd21203428b77cdfa33a6da706b3d8b0fc43e9":int:16:char*:"010001":exp:0:hex:"4653acaf171960b01f52a7be63a3ab21dc368ec43b50d82ec3781e04":hex:"b4291d6567550848cc156967c809baab6ca507f0":hex:"024db89c7802989be0783847863084941bf209d761987e38f97cb5f6f1bc88da72a50b73ebaf11c879c4f95df37b850b8f65d7622e25b1b889e80fe80baca2069d6e0e1d829953fc459069de98ea9798b451e557e99abf8fe3d9ccf9096ebbf3e5255d3b4e1c6d2ecadf067a359eea86405acd47d5e165517ccafd47d6dbee4bf5":int:0
RSAES-OAEP Encryption Example 3_3
0:int:1026:int:16:char*:"02b58fec039a860700a4d7b6462f93e6cdd491161ddd74f4e810b40e3c1652006a5c277b2774c11305a4cbab5a78efa57e17a86df7a3fa36fc4b1d2249f22ec7c2dd6a463232accea906d66ebe80b5704b10729da6f833234abb5efdd4a292cbfad33b4d33fa7a14b8c397b56e3acd21203428b77cdfa33a6da706b3d8b0fc43e9":int:16:char*:"010001":exp:0:hex:"d94cd0e08fa404ed89":hex:"ce8928f6059558254008badd9794fadcd2fd1f65":hex:"0239bce681032441528877d6d1c8bb28aa3bc97f1df584563618995797683844ca86664732f4bed7a0aab083aaabfb7238f582e30958c2024e44e57043b97950fd543da977c90cdde5337d618442f99e60d7783ab59ce6dd9d69c47ad1e962bec22d05895cff8d3f64ed5261d92b2678510393484990ba3f7f06818ae6ffce8a3a":int:0
RSAES-OAEP Encryption Example 3_4
0:int:1026:int:16:char*:"02b58fec039a860700a4d7b6462f93e6cdd491161ddd74f4e810b40e3c1652006a5c277b2774c11305a4cbab5a78efa57e17a86df7a3fa36fc4b1d2249f22ec7c2dd6a463232accea906d66ebe80b5704b10729da6f833234abb5efdd4a292cbfad33b4d33fa7a14b8c397b56e3acd21203428b77cdfa33a6da706b3d8b0fc43e9":int:16:char*:"010001":exp:0:hex:"6cc641b6b61e6f963974dad23a9013284ef1":hex:"6e2979f52d6814a57d83b090054888f119a5b9a3":hex:"02994c62afd76f498ba1fd2cf642857fca81f4373cb08f1cbaee6f025c3b512b42c3e8779113476648039dbe0493f9246292fac28950600e7c0f32edf9c81b9dec45c3bde0cc8d8847590169907b7dc5991ceb29bb0714d613d96df0f12ec5d8d3507c8ee7ae78dd83f216fa61de100363aca48a7e914ae9f42ddfbe943b09d9a0":int:0
RSAES-OAEP Encryption Example 3_5
0:int:1026:int:16:char*:"02b58fec039a860700a4d7b6462f93e6cdd491161ddd74f4e810b40e3c1652006a5c277b2774c11305a4cbab5a78efa57e17a86df7a3fa36fc4b1d2249f22ec7c2dd6a463232accea906d66ebe80b5704b10729da6f833234abb5efdd4a292cbfad33b4d33fa7a14b8c397b56e3acd21203428b77cdfa33a6da706b3d8b0fc43e9":int:16:char*:"010001":exp:0:hex:"df5151832b61f4f25891fb4172f328d2eddf8371ffcfdbe997939295f30eca6918017cfda1153bf7a6af87593223":hex:"2d760bfe38c59de34cdc8b8c78a38e66284a2d27":hex:"0162042ff6969592a6167031811a239834ce638abf54fec8b99478122afe2ee67f8c5b18b0339805bfdbc5a4e6720b37c59cfba942464c597ff532a119821545fd2e59b114e61daf71820529f5029cf524954327c34ec5e6f5ba7efcc4de943ab8ad4ed787b1454329f70db798a3a8f4d92f8274e2b2948ade627ce8ee33e43c60":int:0
RSAES-OAEP Encryption Example 3_6
0:int:1026:int:16:char*:"02b58fec039a860700a4d7b6462f93e6cdd491161ddd74f4e810b40e3c1652006a5c277b2774c11305a4cbab5a78efa57e17a86df7a3fa36fc4b1d2249f22ec7c2dd6a463232accea906d66ebe80b5704b10729da6f833234abb5efdd4a292cbfad33b4d33fa7a14b8c397b56e3acd21203428b77cdfa33a6da706b3d8b0fc43e9":int:16:char*:"010001":exp:0:hex:"3c3bad893c544a6d520ab022319188c8d504b7a788b850903b85972eaa18552e1134a7ad6098826254ff7ab672b3d8eb3158fac6d4cbaef1":hex:"f174779c5fd3cfe007badcb7a36c9b55bfcfbf0e":hex:"00112051e75d064943bc4478075e43482fd59cee0679de6893eec3a943daa490b9691c93dfc0464b6623b9f3dbd3e70083264f034b374f74164e1a00763725e574744ba0b9db83434f31df96f6e2a26f6d8eba348bd4686c2238ac07c37aac3785d1c7eea2f819fd91491798ed8e9cef5e43b781b0e0276e37c43ff9492d005730":int:0
RSAES-OAEP Encryption Example 4_1
0:int:1027:int:16:char*:"051240b6cc0004fa48d0134671c078c7c8dec3b3e2f25bc2564467339db38853d06b85eea5b2de353bff42ac2e46bc97fae6ac9618da9537a5c8f553c1e357625991d6108dcd7885fb3a25413f53efcad948cb35cd9b9ae9c1c67626d113d57dde4c5bea76bb5bb7de96c00d07372e9685a6d75cf9d239fa148d70931b5f3fb039":int:16:char*:"010001":exp:0:hex:"4a86609534ee434a6cbca3f7e962e76d455e3264c19f605f6e5ff6137c65c56d7fb344cd52bc93374f3d166c9f0c6f9c506bad19330972d2":hex:"1cac19ce993def55f98203f6852896c95ccca1f3":hex:"04cce19614845e094152a3fe18e54e3330c44e5efbc64ae16886cb1869014cc5781b1f8f9e045384d0112a135ca0d12e9c88a8e4063416deaae3844f60d6e96fe155145f4525b9a34431ca3766180f70e15a5e5d8e8b1a516ff870609f13f896935ced188279a58ed13d07114277d75c6568607e0ab092fd803a223e4a8ee0b1a8":int:0
RSAES-OAEP Encryption Example 4_2
0:int:1027:int:16:char*:"051240b6cc0004fa48d0134671c078c7c8dec3b3e2f25bc2564467339db38853d06b85eea5b2de353bff42ac2e46bc97fae6ac9618da9537a5c8f553c1e357625991d6108dcd7885fb3a25413f53efcad948cb35cd9b9ae9c1c67626d113d57dde4c5bea76bb5bb7de96c00d07372e9685a6d75cf9d239fa148d70931b5f3fb039":int:16:char*:"010001":exp:0:hex:"b0adc4f3fe11da59ce992773d9059943c03046497ee9d9f9a06df1166db46d98f58d27ec074c02eee6cbe2449c8b9fc5080c5c3f4433092512ec46aa793743c8":hex:"f545d5897585e3db71aa0cb8da76c51d032ae963":hex:"0097b698c6165645b303486fbf5a2a4479c0ee85889b541a6f0b858d6b6597b13b854eb4f839af03399a80d79bda6578c841f90d645715b280d37143992dd186c80b949b775cae97370e4ec97443136c6da484e970ffdb1323a20847821d3b18381de13bb49aaea66530c4a4b8271f3eae172cd366e07e6636f1019d2a28aed15e":int:0
RSAES-OAEP Encryption Example 4_3
0:int:1027:int:16:char*:"051240b6cc0004fa48d0134671c078c7c8dec3b3e2f25bc2564467339db38853d06b85eea5b2de353bff42ac2e46bc97fae6ac9618da9537a5c8f553c1e357625991d6108dcd7885fb3a25413f53efcad948cb35cd9b9ae9c1c67626d113d57dde4c5bea76bb5bb7de96c00d07372e9685a6d75cf9d239fa148d70931b5f3fb039":int:16:char*:"010001":exp:0:hex:"bf6d42e701707b1d0206b0c8b45a1c72641ff12889219a82bdea965b5e79a96b0d0163ed9d578ec9ada20f2fbcf1ea3c4089d83419ba81b0c60f3606da99":hex:"ad997feef730d6ea7be60d0dc52e72eacbfdd275":hex:"0301f935e9c47abcb48acbbe09895d9f5971af14839da4ff95417ee453d1fd77319072bb7297e1b55d7561cd9d1bb24c1a9a37c619864308242804879d86ebd001dce5183975e1506989b70e5a83434154d5cbfd6a24787e60eb0c658d2ac193302d1192c6e622d4a12ad4b53923bca246df31c6395e37702c6a78ae081fb9d065":int:0
RSAES-OAEP Encryption Example 4_4
0:int:1027:int:16:char*:"051240b6cc0004fa48d0134671c078c7c8dec3b3e2f25bc2564467339db38853d06b85eea5b2de353bff42ac2e46bc97fae6ac9618da9537a5c8f553c1e357625991d6108dcd7885fb3a25413f53efcad948cb35cd9b9ae9c1c67626d113d57dde4c5bea76bb5bb7de96c00d07372e9685a6d75cf9d239fa148d70931b5f3fb039":int:16:char*:"010001":exp:0:hex:"fb2ef112f5e766eb94019297934794f7be2f6fc1c58e":hex:"136454df5730f73c807a7e40d8c1a312ac5b9dd3":hex:"02d110ad30afb727beb691dd0cf17d0af1a1e7fa0cc040ec1a4ba26a42c59d0a796a2e22c8f357ccc98b6519aceb682e945e62cb734614a529407cd452bee3e44fece8423cc19e55548b8b994b849c7ecde4933e76037e1d0ce44275b08710c68e430130b929730ed77e09b015642c5593f04e4ffb9410798102a8e96ffdfe11e4":int:0
RSAES-OAEP Encryption Example 4_5
0:int:1027:int:16:char*:"051240b6cc0004fa48d0134671c078c7c8dec3b3e2f25bc2564467339db38853d06b85eea5b2de353bff42ac2e46bc97fae6ac9618da9537a5c8f553c1e357625991d6108dcd7885fb3a25413f53efcad948cb35cd9b9ae9c1c67626d113d57dde4c5bea76bb5bb7de96c00d07372e9685a6d75cf9d239fa148d70931b5f3fb039":int:16:char*:"010001":exp:0:hex:"28ccd447bb9e85166dabb9e5b7d1adadc4b9d39f204e96d5e440ce9ad928bc1c2284":hex:"bca8057f824b2ea257f2861407eef63d33208681":hex:"00dbb8a7439d90efd919a377c54fae8fe11ec58c3b858362e23ad1b8a44310799066b99347aa525691d2adc58d9b06e34f288c170390c5f0e11c0aa3645959f18ee79e8f2be8d7ac5c23d061f18dd74b8c5f2a58fcb5eb0c54f99f01a83247568292536583340948d7a8c97c4acd1e98d1e29dc320e97a260532a8aa7a758a1ec2":int:0
RSAES-OAEP Encryption Example 4_6
0:int:1027:int:16:char*:"051240b6cc0004fa48d0134671c078c7c8dec3b3e2f25bc2564467339db38853d06b85eea5b2de353bff42ac2e46bc97fae6ac9618da9537a5c8f553c1e357625991d6108dcd7885fb3a25413f53efcad948cb35cd9b9ae9c1c67626d113d57dde4c5bea76bb5bb7de96c00d07372e9685a6d75cf9d239fa148d70931b5f3fb039":int:16:char*:"010001":exp:0:hex:"f22242751ec6b1":hex:"2e7e1e17f647b5ddd033e15472f90f6812f3ac4e":hex:"00a5ffa4768c8bbecaee2db77e8f2eec99595933545520835e5ba7db9493d3e17cddefe6a5f567624471908db4e2d83a0fbee60608fc84049503b2234a07dc83b27b22847ad8920ff42f674ef79b76280b00233d2b51b8cb2703a9d42bfbc8250c96ec32c051e57f1b4ba528db89c37e4c54e27e6e64ac69635ae887d9541619a9":int:0
RSAES-OAEP Encryption Example 5_1
0:int:1028:int:16:char*:"0aadf3f9c125e5d891f31ac448e993defe580f802b45f9d7f22ba5021e9c47576b5a1e68031ba9db4e6dabe4d96a1d6f3d267268cff408005f118efcadb99888d1c234467166b2a2b849a05a889c060ac0da0c5fae8b55f309ba62e703742fa0326f2d10b011021489ff497770190d895fd39f52293c39efd73a698bdab9f10ed9":int:16:char*:"010001":exp:0:hex:"af71a901e3a61d3132f0fc1fdb474f9ea6579257ffc24d164170145b3dbde8":hex:"44c92e283f77b9499c603d963660c87d2f939461":hex:"036046a4a47d9ed3ba9a89139c105038eb7492b05a5d68bfd53accff4597f7a68651b47b4a4627d927e485eed7b4566420e8b409879e5d606eae251d22a5df799f7920bfc117b992572a53b1263146bcea03385cc5e853c9a101c8c3e1bda31a519807496c6cb5e5efb408823a352b8fa0661fb664efadd593deb99fff5ed000e5":int:0
RSAES-OAEP Encryption Example 5_2
0:int:1028:int:16:char*:"0aadf3f9c125e5d891f31ac448e993defe580f802b45f9d7f22ba5021e9c47576b5a1e68031ba9db4e6dabe4d96a1d6f3d267268cff408005f118efcadb99888d1c234467166b2a2b849a05a889c060ac0da0c5fae8b55f309ba62e703742fa0326f2d10b011021489ff497770190d895fd39f52293c39efd73a698bdab9f10ed9":int:16:char*:"010001":exp:0:hex:"a3b844a08239a8ac41605af17a6cfda4d350136585903a417a79268760519a4b4ac3303ec73f0f87cfb32399":hex:"cb28f5860659fceee49c3eeafce625a70803bd32":hex:"03d6eb654edce615bc59f455265ed4e5a18223cbb9be4e4069b473804d5de96f54dcaaa603d049c5d94aa1470dfcd2254066b7c7b61ff1f6f6770e3215c51399fd4e34ec5082bc48f089840ad04354ae66dc0f1bd18e461a33cc1258b443a2837a6df26759aa2302334986f87380c9cc9d53be9f99605d2c9a97da7b0915a4a7ad":int:0
RSAES-OAEP Encryption Example 5_3
0:int:1028:int:16:char*:"0aadf3f9c125e5d891f31ac448e993defe580f802b45f9d7f22ba5021e9c47576b5a1e68031ba9db4e6dabe4d96a1d6f3d267268cff408005f118efcadb99888d1c234467166b2a2b849a05a889c060ac0da0c5fae8b55f309ba62e703742fa0326f2d10b011021489ff497770190d895fd39f52293c39efd73a698bdab9f10ed9":int:16:char*:"010001":exp:0:hex:"308b0ecbd2c76cb77fc6f70c5edd233fd2f20929d629f026953bb62a8f4a3a314bde195de85b5f816da2aab074d26cb6acddf323ae3b9c678ac3cf12fbdde7":hex:"2285f40d770482f9a9efa2c72cb3ac55716dc0ca":hex:"0770952181649f9f9f07ff626ff3a22c35c462443d905d456a9fd0bff43cac2ca7a9f554e9478b9acc3ac838b02040ffd3e1847de2e4253929f9dd9ee4044325a9b05cabb808b2ee840d34e15d105a3f1f7b27695a1a07a2d73fe08ecaaa3c9c9d4d5a89ff890d54727d7ae40c0ec1a8dd86165d8ee2c6368141016a48b55b6967":int:0
RSAES-OAEP Encryption Example 5_4
0:int:1028:int:16:char*:"0aadf3f9c125e5d891f31ac448e993defe580f802b45f9d7f22ba5021e9c47576b5a1e68031ba9db4e6dabe4d96a1d6f3d267268cff408005f118efcadb99888d1c234467166b2a2b849a05a889c060ac0da0c5fae8b55f309ba62e703742fa0326f2d10b011021489ff497770190d895fd39f52293c39efd73a698bdab9f10ed9":int:16:char*:"010001":exp:0:hex:"15c5b9ee1185":hex:"49fa45d3a78dd10dfd577399d1eb00af7eed5513":hex:"0812b76768ebcb642d040258e5f4441a018521bd96687e6c5e899fcd6c17588ff59a82cc8ae03a4b45b31299af1788c329f7dcd285f8cf4ced82606b97612671a45bedca133442144d1617d114f802857f0f9d739751c57a3f9ee400912c61e2e6992be031a43dd48fa6ba14eef7c422b5edc4e7afa04fdd38f402d1c8bb719abf":int:0
RSAES-OAEP Encryption Example 5_5
0:int:1028:int:16:char*:"0aadf3f9c125e5d891f31ac448e993defe580f802b45f9d7f22ba5021e9c47576b5a1e68031ba9db4e6dabe4d96a1d6f3d267268cff408005f118efcadb99888d1c234467166b2a2b849a05a889c060ac0da0c5fae8b55f309ba62e703742fa0326f2d10b011021489ff497770190d895fd39f52293c39efd73a698bdab9f10ed9":int:16:char*:"010001":exp:0:hex:"21026e6800c7fa728fcaaba0d196ae28d7a2ac4ffd8abce794f0985f60c8a6737277365d3fea11db8923a2029a":hex:"f0287413234cc5034724a094c4586b87aff133fc":hex:"07b60e14ec954bfd29e60d0047e789f51d57186c63589903306793ced3f68241c743529aba6a6374f92e19e0163efa33697e196f7661dfaaa47aac6bde5e51deb507c72c589a2ca1693d96b1460381249b2cdb9eac44769f2489c5d3d2f99f0ee3c7ee5bf64a5ac79c42bd433f149be8cb59548361640595513c97af7bc2509723":int:0
RSAES-OAEP Encryption Example 5_6
0:int:1028:int:16:char*:"0aadf3f9c125e5d891f31ac448e993defe580f802b45f9d7f22ba5021e9c47576b5a1e68031ba9db4e6dabe4d96a1d6f3d267268cff408005f118efcadb99888d1c234467166b2a2b849a05a889c060ac0da0c5fae8b55f309ba62e703742fa0326f2d10b011021489ff497770190d895fd39f52293c39efd73a698bdab9f10ed9":int:16:char*:"010001":exp:0:hex:"541e37b68b6c8872b84c02":hex:"d9fba45c96f21e6e26d29eb2cdcb6585be9cb341":hex:"08c36d4dda33423b2ed6830d85f6411ba1dcf470a1fae0ebefee7c089f256cef74cb96ea69c38f60f39abee44129bcb4c92de7f797623b20074e3d9c2899701ed9071e1efa0bdd84d4c3e5130302d8f0240baba4b84a71cc032f2235a5ff0fae277c3e8f9112bef44c9ae20d175fc9a4058bfc930ba31b02e2e4f444483710f24a":int:0
RSAES-OAEP Encryption Example 6_1
0:int:1029:int:16:char*:"12b17f6dad2ecd19ff46dc13f7860f09e0e0cfb677b38a52592305ceaf022c166db90d04ac29e33f7dd12d9faf66e0816bb63ead267cc7d46c17c37be214bca2a22d723a64e44407436b6fc965729aefc2554f376cd5dcea68293780a62bf39d0029485a160bbb9e5dc0972d21a504f52e5ee028aa416332f510b2e9cff5f722af":int:16:char*:"010001":exp:0:hex:"4046ca8baa3347ca27f49e0d81f9cc1d71be9ba517d4":hex:"dd0f6cfe415e88e5a469a51fbba6dfd40adb4384":hex:"0630eebcd2856c24f798806e41f9e67345eda9ceda386acc9facaea1eeed06ace583709718d9d169fadf414d5c76f92996833ef305b75b1e4b95f662a20faedc3bae0c4827a8bf8a88edbd57ec203a27a841f02e43a615bab1a8cac0701de34debdef62a088089b55ec36ea7522fd3ec8d06b6a073e6df833153bc0aefd93bd1a3":int:0
RSAES-OAEP Encryption Example 6_2
0:int:1029:int:16:char*:"12b17f6dad2ecd19ff46dc13f7860f09e0e0cfb677b38a52592305ceaf022c166db90d04ac29e33f7dd12d9faf66e0816bb63ead267cc7d46c17c37be214bca2a22d723a64e44407436b6fc965729aefc2554f376cd5dcea68293780a62bf39d0029485a160bbb9e5dc0972d21a504f52e5ee028aa416332f510b2e9cff5f722af":int:16:char*:"010001":exp:0:hex:"5cc72c60231df03b3d40f9b57931bc31109f972527f28b19e7480c7288cb3c92b22512214e4be6c914792ddabdf57faa8aa7":hex:"8d14bd946a1351148f5cae2ed9a0c653e85ebd85":hex:"0ebc37376173a4fd2f89cc55c2ca62b26b11d51c3c7ce49e8845f74e7607317c436bc8d23b9667dfeb9d087234b47bc6837175ae5c0559f6b81d7d22416d3e50f4ac533d8f0812f2db9e791fe9c775ac8b6ad0f535ad9ceb23a4a02014c58ab3f8d3161499a260f39348e714ae2a1d3443208fd8b722ccfdfb393e98011f99e63f":int:0
RSAES-OAEP Encryption Example 6_3
0:int:1029:int:16:char*:"12b17f6dad2ecd19ff46dc13f7860f09e0e0cfb677b38a52592305ceaf022c166db90d04ac29e33f7dd12d9faf66e0816bb63ead267cc7d46c17c37be214bca2a22d723a64e44407436b6fc965729aefc2554f376cd5dcea68293780a62bf39d0029485a160bbb9e5dc0972d21a504f52e5ee028aa416332f510b2e9cff5f722af":int:16:char*:"010001":exp:0:hex:"b20e651303092f4bccb43070c0f86d23049362ed96642fc5632c27db4a52e3d831f2ab068b23b149879c002f6bf3feee97591112562c":hex:"6c075bc45520f165c0bf5ea4c5df191bc9ef0e44":hex:"0a98bf1093619394436cf68d8f38e2f158fde8ea54f3435f239b8d06b8321844202476aeed96009492480ce3a8d705498c4c8c68f01501dc81db608f60087350c8c3b0bd2e9ef6a81458b7c801b89f2e4fe99d4900ba6a4b5e5a96d865dc676c7755928794130d6280a8160a190f2df3ea7cf9aa0271d88e9e6905ecf1c5152d65":int:0
RSAES-OAEP Encryption Example 6_4
0:int:1029:int:16:char*:"12b17f6dad2ecd19ff46dc13f7860f09e0e0cfb677b38a52592305ceaf022c166db90d04ac29e33f7dd12d9faf66e0816bb63ead267cc7d46c17c37be214bca2a22d723a64e44407436b6fc965729aefc2554f376cd5dcea68293780a62bf39d0029485a160bbb9e5dc0972d21a504f52e5ee028aa416332f510b2e9cff5f722af":int:16:char*:"010001":exp:0:hex:"684e3038c5c041f7":hex:"3bbc3bd6637dfe12846901029bf5b0c07103439c":hex:"008e7a67cacfb5c4e24bec7dee149117f19598ce8c45808fef88c608ff9cd6e695263b9a3c0ad4b8ba4c95238e96a8422b8535629c8d5382374479ad13fa39974b242f9a759eeaf9c83ad5a8ca18940a0162ba755876df263f4bd50c6525c56090267c1f0e09ce0899a0cf359e88120abd9bf893445b3cae77d3607359ae9a52f8":int:0
RSAES-OAEP Encryption Example 6_5
0:int:1029:int:16:char*:"12b17f6dad2ecd19ff46dc13f7860f09e0e0cfb677b38a52592305ceaf022c166db90d04ac29e33f7dd12d9faf66e0816bb63ead267cc7d46c17c37be214bca2a22d723a64e44407436b6fc965729aefc2554f376cd5dcea68293780a62bf39d0029485a160bbb9e5dc0972d21a504f52e5ee028aa416332f510b2e9cff5f722af":int:16:char*:"010001":exp:0:hex:"32488cb262d041d6e4dd35f987bf3ca696db1f06ac29a44693":hex:"b46b41893e8bef326f6759383a83071dae7fcabc":hex:"00003474416c7b68bdf961c385737944d7f1f40cb395343c693cc0b4fe63b31fedf1eaeeac9ccc0678b31dc32e0977489514c4f09085f6298a9653f01aea4045ff582ee887be26ae575b73eef7f3774921e375a3d19adda0ca31aa1849887c1f42cac9677f7a2f4e923f6e5a868b38c084ef187594dc9f7f048fea2e02955384ab":int:0
RSAES-OAEP Encryption Example 6_6
0:int:1029:int:16:char*:"12b17f6dad2ecd19ff46dc13f7860f09e0e0cfb677b38a52592305ceaf022c166db90d04ac29e33f7dd12d9faf66e0816bb63ead267cc7d46c17c37be214bca2a22d723a64e44407436b6fc965729aefc2554f376cd5dcea68293780a62bf39d0029485a160bbb9e5dc0972d21a504f52e5ee028aa416332f510b2e9cff5f722af":int:16:char*:"010001":exp:0:hex:"50ba14be8462720279c306ba":hex:"0a2403312a41e3d52f060fbc13a67de5cf7609a7":hex:"0a026dda5fc8785f7bd9bf75327b63e85e2c0fdee5dadb65ebdcac9ae1de95c92c672ab433aa7a8e69ce6a6d8897fac4ac4a54de841ae5e5bbce7687879d79634cea7a30684065c714d52409b928256bbf53eabcd5231eb7259504537399bd29164b726d33a46da701360a4168a091ccab72d44a62fed246c0ffea5b1348ab5470":int:0
RSAES-OAEP Encryption Example 7_1
0:int:1030:int:16:char*:"311179f0bcfc9b9d3ca315d00ef30d7bdd3a2cfae9911bfedcb948b3a4782d0732b6ab44aa4bf03741a644dc01bec3e69b01a033e675d8acd7c4925c6b1aec3119051dfd89762d215d45475ffcb59f908148623f37177156f6ae86dd7a7c5f43dc1e1f908254058a284a5f06c0021793a87f1ac5feff7dcaee69c5e51a3789e373":int:16:char*:"010001":exp:0:hex:"47aae909":hex:"43dd09a07ff4cac71caa4632ee5e1c1daee4cd8f":hex:"1688e4ce7794bba6cb7014169ecd559cede2a30b56a52b68d9fe18cf1973ef97b2a03153951c755f6294aa49adbdb55845ab6875fb3986c93ecf927962840d282f9e54ce8b690f7c0cb8bbd73440d9571d1b16cd9260f9eab4783cc482e5223dc60973871783ec27b0ae0fd47732cbc286a173fc92b00fb4ba6824647cd93c85c1":int:0
RSAES-OAEP Encryption Example 7_2
0:int:1030:int:16:char*:"311179f0bcfc9b9d3ca315d00ef30d7bdd3a2cfae9911bfedcb948b3a4782d0732b6ab44aa4bf03741a644dc01bec3e69b01a033e675d8acd7c4925c6b1aec3119051dfd89762d215d45475ffcb59f908148623f37177156f6ae86dd7a7c5f43dc1e1f908254058a284a5f06c0021793a87f1ac5feff7dcaee69c5e51a3789e373":int:16:char*:"010001":exp:0:hex:"1d9b2e2223d9bc13bfb9f162ce735db48ba7c68f6822a0a1a7b6ae165834e7":hex:"3a9c3cec7b84f9bd3adecbc673ec99d54b22bc9b":hex:"1052ed397b2e01e1d0ee1c50bf24363f95e504f4a03434a08fd822574ed6b9736edbb5f390db10321479a8a139350e2bd4977c3778ef331f3e78ae118b268451f20a2f01d471f5d53c566937171b2dbc2d4bde459a5799f0372d6574239b2323d245d0bb81c286b63c89a361017337e4902f88a467f4c7f244bfd5ab46437ff3b6":int:0
RSAES-OAEP Encryption Example 7_3
0:int:1030:int:16:char*:"311179f0bcfc9b9d3ca315d00ef30d7bdd3a2cfae9911bfedcb948b3a4782d0732b6ab44aa4bf03741a644dc01bec3e69b01a033e675d8acd7c4925c6b1aec3119051dfd89762d215d45475ffcb59f908148623f37177156f6ae86dd7a7c5f43dc1e1f908254058a284a5f06c0021793a87f1ac5feff7dcaee69c5e51a3789e373":int:16:char*:"010001":exp:0:hex:"d976fc":hex:"76a75e5b6157a556cf8884bb2e45c293dd545cf5":hex:"2155cd843ff24a4ee8badb7694260028a490813ba8b369a4cbf106ec148e5298707f5965be7d101c1049ea8584c24cd63455ad9c104d686282d3fb803a4c11c1c2e9b91c7178801d1b6640f003f5728df007b8a4ccc92bce05e41a27278d7c85018c52414313a5077789001d4f01910b72aad05d220aa14a58733a7489bc54556b":int:0
RSAES-OAEP Encryption Example 7_4
0:int:1030:int:16:char*:"311179f0bcfc9b9d3ca315d00ef30d7bdd3a2cfae9911bfedcb948b3a4782d0732b6ab44aa4bf03741a644dc01bec3e69b01a033e675d8acd7c4925c6b1aec3119051dfd89762d215d45475ffcb59f908148623f37177156f6ae86dd7a7c5f43dc1e1f908254058a284a5f06c0021793a87f1ac5feff7dcaee69c5e51a3789e373":int:16:char*:"010001":exp:0:hex:"d4738623df223aa43843df8467534c41d013e0c803c624e263666b239bde40a5f29aeb8de79e3daa61dd0370f49bd4b013834b98212aef6b1c5ee373b3cb":hex:"7866314a6ad6f2b250a35941db28f5864b585859":hex:"0ab14c373aeb7d4328d0aaad8c094d88b9eb098b95f21054a29082522be7c27a312878b637917e3d819e6c3c568db5d843802b06d51d9e98a2be0bf40c031423b00edfbff8320efb9171bd2044653a4cb9c5122f6c65e83cda2ec3c126027a9c1a56ba874d0fea23f380b82cf240b8cf540004758c4c77d934157a74f3fc12bfac":int:0
RSAES-OAEP Encryption Example 7_5
0:int:1030:int:16:char*:"311179f0bcfc9b9d3ca315d00ef30d7bdd3a2cfae9911bfedcb948b3a4782d0732b6ab44aa4bf03741a644dc01bec3e69b01a033e675d8acd7c4925c6b1aec3119051dfd89762d215d45475ffcb59f908148623f37177156f6ae86dd7a7c5f43dc1e1f908254058a284a5f06c0021793a87f1ac5feff7dcaee69c5e51a3789e373":int:16:char*:"010001":exp:0:hex:"bb47231ca5ea1d3ad46c99345d9a8a61":hex:"b2166ed472d58db10cab2c6b000cccf10a7dc509":hex:"028387a318277434798b4d97f460068df5298faba5041ba11761a1cb7316b24184114ec500257e2589ed3b607a1ebbe97a6cc2e02bf1b681f42312a33b7a77d8e7855c4a6de03e3c04643f786b91a264a0d6805e2cea91e68177eb7a64d9255e4f27e713b7ccec00dc200ebd21c2ea2bb890feae4942df941dc3f97890ed347478":int:0
RSAES-OAEP Encryption Example 7_6
0:int:1030:int:16:char*:"311179f0bcfc9b9d3ca315d00ef30d7bdd3a2cfae9911bfedcb948b3a4782d0732b6ab44aa4bf03741a644dc01bec3e69b01a033e675d8acd7c4925c6b1aec3119051dfd89762d215d45475ffcb59f908148623f37177156f6ae86dd7a7c5f43dc1e1f908254058a284a5f06c0021793a87f1ac5feff7dcaee69c5e51a3789e373":int:16:char*:"010001":exp:0:hex:"2184827095d35c3f86f600e8e59754013296":hex:"52673bde2ca166c2aa46131ac1dc808d67d7d3b1":hex:"14c678a94ad60525ef39e959b2f3ba5c097a94ff912b67dbace80535c187abd47d075420b1872152bba08f7fc31f313bbf9273c912fc4c0149a9b0cfb79807e346eb332069611bec0ff9bcd168f1f7c33e77313cea454b94e2549eecf002e2acf7f6f2d2845d4fe0aab2e5a92ddf68c480ae11247935d1f62574842216ae674115":int:0
RSAES-OAEP Encryption Example 8_1
0:int:1031:int:16:char*:"5bdf0e30d321dda5147f882408fa69195480df8f80d3f6e8bf5818504f36427ca9b1f5540b9c65a8f6974cf8447a244d9280201bb49fcbbe6378d1944cd227e230f96e3d10f819dcef276c64a00b2a4b6701e7d01de5fabde3b1e9a0df82f4631359cd22669647fbb1717246134ed7b497cfffbdc42b59c73a96ed90166212dff7":int:16:char*:"010001":exp:0:hex:"050b755e5e6880f7b9e9d692a74c37aae449b31bfea6deff83747a897f6c2c825bb1adbf850a3c96994b5de5b33cbc7d4a17913a7967":hex:"7706ffca1ecfb1ebee2a55e5c6e24cd2797a4125":hex:"09b3683d8a2eb0fb295b62ed1fb9290b714457b7825319f4647872af889b30409472020ad12912bf19b11d4819f49614824ffd84d09c0a17e7d17309d12919790410aa2995699f6a86dbe3242b5acc23af45691080d6b1ae810fb3e3057087f0970092ce00be9562ff4053b6262ce0caa93e13723d2e3a5ba075d45f0d61b54b61":int:0
RSAES-OAEP Encryption Example 8_2
0:int:1031:int:16:char*:"5bdf0e30d321dda5147f882408fa69195480df8f80d3f6e8bf5818504f36427ca9b1f5540b9c65a8f6974cf8447a244d9280201bb49fcbbe6378d1944cd227e230f96e3d10f819dcef276c64a00b2a4b6701e7d01de5fabde3b1e9a0df82f4631359cd22669647fbb1717246134ed7b497cfffbdc42b59c73a96ed90166212dff7":int:16:char*:"010001":exp:0:hex:"4eb68dcd93ca9b19df111bd43608f557026fe4aa1d5cfac227a3eb5ab9548c18a06dded23f81825986b2fcd71109ecef7eff88873f075c2aa0c469f69c92bc":hex:"a3717da143b4dcffbc742665a8fa950585548343":hex:"2ecf15c97c5a15b1476ae986b371b57a24284f4a162a8d0c8182e7905e792256f1812ba5f83f1f7a130e42dcc02232844edc14a31a68ee97ae564a383a3411656424c5f62ddb646093c367be1fcda426cf00a06d8acb7e57776fbbd855ac3df506fc16b1d7c3f2110f3d8068e91e186363831c8409680d8da9ecd8cf1fa20ee39d":int:0
RSAES-OAEP Encryption Example 8_3
0:int:1031:int:16:char*:"5bdf0e30d321dda5147f882408fa69195480df8f80d3f6e8bf5818504f36427ca9b1f5540b9c65a8f6974cf8447a244d9280201bb49fcbbe6378d1944cd227e230f96e3d10f819dcef276c64a00b2a4b6701e7d01de5fabde3b1e9a0df82f4631359cd22669647fbb1717246134ed7b497cfffbdc42b59c73a96ed90166212dff7":int:16:char*:"010001":exp:0:hex:"8604ac56328c1ab5ad917861":hex:"ee06209073cca026bb264e5185bf8c68b7739f86":hex:"4bc89130a5b2dabb7c2fcf90eb5d0eaf9e681b7146a38f3173a3d9cfec52ea9e0a41932e648a9d69344c50da763f51a03c95762131e8052254dcd2248cba40fd31667786ce05a2b7b531ac9dac9ed584a59b677c1a8aed8c5d15d68c05569e2be780bf7db638fd2bfd2a85ab276860f3777338fca989ffd743d13ee08e0ca9893f":int:0
RSAES-OAEP Encryption Example 8_4
0:int:1031:int:16:char*:"5bdf0e30d321dda5147f882408fa69195480df8f80d3f6e8bf5818504f36427ca9b1f5540b9c65a8f6974cf8447a244d9280201bb49fcbbe6378d1944cd227e230f96e3d10f819dcef276c64a00b2a4b6701e7d01de5fabde3b1e9a0df82f4631359cd22669647fbb1717246134ed7b497cfffbdc42b59c73a96ed90166212dff7":int:16:char*:"010001":exp:0:hex:"fdda5fbf6ec361a9d9a4ac68af216a0686f438b1e0e5c36b955f74e107f39c0dddcc":hex:"990ad573dc48a973235b6d82543618f2e955105d":hex:"2e456847d8fc36ff0147d6993594b9397227d577752c79d0f904fcb039d4d812fea605a7b574dd82ca786f93752348438ee9f5b5454985d5f0e1699e3e7ad175a32e15f03deb042ab9fe1dd9db1bb86f8c089ccb45e7ef0c5ee7ca9b7290ca6b15bed47039788a8a93ff83e0e8d6244c71006362deef69b6f416fb3c684383fbd0":int:0
RSAES-OAEP Encryption Example 8_5
0:int:1031:int:16:char*:"5bdf0e30d321dda5147f882408fa69195480df8f80d3f6e8bf5818504f36427ca9b1f5540b9c65a8f6974cf8447a244d9280201bb49fcbbe6378d1944cd227e230f96e3d10f819dcef276c64a00b2a4b6701e7d01de5fabde3b1e9a0df82f4631359cd22669647fbb1717246134ed7b497cfffbdc42b59c73a96ed90166212dff7":int:16:char*:"010001":exp:0:hex:"4a5f4914bee25de3c69341de07":hex:"ecc63b28f0756f22f52ac8e6ec1251a6ec304718":hex:"1fb9356fd5c4b1796db2ebf7d0d393cc810adf6145defc2fce714f79d93800d5e2ac211ea8bbecca4b654b94c3b18b30dd576ce34dc95436ef57a09415645923359a5d7b4171ef22c24670f1b229d3603e91f76671b7df97e7317c97734476d5f3d17d21cf82b5ba9f83df2e588d36984fd1b584468bd23b2e875f32f68953f7b2":int:0
RSAES-OAEP Encryption Example 8_6
0:int:1031:int:16:char*:"5bdf0e30d321dda5147f882408fa69195480df8f80d3f6e8bf5818504f36427ca9b1f5540b9c65a8f6974cf8447a244d9280201bb49fcbbe6378d1944cd227e230f96e3d10f819dcef276c64a00b2a4b6701e7d01de5fabde3b1e9a0df82f4631359cd22669647fbb1717246134ed7b497cfffbdc42b59c73a96ed90166212dff7":int:16:char*:"010001":exp:0:hex:"8e07d66f7b880a72563abcd3f35092bc33409fb7f88f2472be":hex:"3925c71b362d40a0a6de42145579ba1e7dd459fc":hex:"3afd9c6600147b21798d818c655a0f4c9212db26d0b0dfdc2a7594ccb3d22f5bf1d7c3e112cd73fc7d509c7a8bafdd3c274d1399009f9609ec4be6477e453f075aa33db382870c1c3409aef392d7386ae3a696b99a94b4da0589447e955d16c98b17602a59bd736279fcd8fb280c4462d590bfa9bf13fed570eafde97330a2c210":int:0
RSAES-OAEP Encryption Example 9_1
0:int:1536:int:16:char*:"cf2cd41e34ca3a728ea5cb8aff64c36d27bdef5364e336fd68d3123c5a196a8c287013e853d5156d58d151954520fb4f6d7b17abb6817765909c576119659d902b1906ed8a2b10c155c24d124528dab9eeae379beac66e4a411786dcb8fd0062ebc030de1219a04c2a8c1b7dd3131e4d6b6caee2e31a5ed41ac1509b2ef1ee2ab18364be568ca941c25ecc84ff9d643b5ec1aaae102a20d73f479b780fd6da91075212d9eac03a0674d899eba2e431f4c44b615b6ba2232bd4b33baed73d625d":int:16:char*:"010001":exp:0:hex:"f735fd55ba92592c3b52b8f9c4f69aaa1cbef8fe88add095595412467f9cf4ec0b896c59eda16210e7549c8abb10cdbc21a12ec9b6b5b8fd2f10399eb6":hex:"8ec965f134a3ec9931e92a1ca0dc8169d5ea705c":hex:"267bcd118acab1fc8ba81c85d73003cb8610fa55c1d97da8d48a7c7f06896a4db751aa284255b9d36ad65f37653d829f1b37f97b8001942545b2fc2c55a7376ca7a1be4b1760c8e05a33e5aa2526b8d98e317088e7834c755b2a59b12631a182c05d5d43ab1779264f8456f515ce57dfdf512d5493dab7b7338dc4b7d78db9c091ac3baf537a69fc7f549d979f0eff9a94fda4169bd4d1d19a69c99e33c3b55490d501b39b1edae118ff6793a153261584d3a5f39f6e682e3d17c8cd1261fa72":int:0
RSAES-OAEP Encryption Example 9_2
0:int:1536:int:16:char*:"cf2cd41e34ca3a728ea5cb8aff64c36d27bdef5364e336fd68d3123c5a196a8c287013e853d5156d58d151954520fb4f6d7b17abb6817765909c576119659d902b1906ed8a2b10c155c24d124528dab9eeae379beac66e4a411786dcb8fd0062ebc030de1219a04c2a8c1b7dd3131e4d6b6caee2e31a5ed41ac1509b2ef1ee2ab18364be568ca941c25ecc84ff9d643b5ec1aaae102a20d73f479b780fd6da91075212d9eac03a0674d899eba2e431f4c44b615b6ba2232bd4b33baed73d625d":int:16:char*:"010001":exp:0:hex:"81b906605015a63aabe42ddf11e1978912f5404c7474b26dce3ed482bf961ecc818bf420c54659":hex:"ecb1b8b25fa50cdab08e56042867f4af5826d16c":hex:"93ac9f0671ec29acbb444effc1a5741351d60fdb0e393fbf754acf0de49761a14841df7772e9bc82773966a1584c4d72baea00118f83f35cca6e537cbd4d811f5583b29783d8a6d94cd31be70d6f526c10ff09c6fa7ce069795a3fcd0511fd5fcb564bcc80ea9c78f38b80012539d8a4ddf6fe81e9cddb7f50dbbbbcc7e5d86097ccf4ec49189fb8bf318be6d5a0715d516b49af191258cd32dc833ce6eb4673c03a19bbace88cc54895f636cc0c1ec89096d11ce235a265ca1764232a689ae8":int:0
RSAES-OAEP Encryption Example 9_3
0:int:1536:int:16:char*:"cf2cd41e34ca3a728ea5cb8aff64c36d27bdef5364e336fd68d3123c5a196a8c287013e853d5156d58d151954520fb4f6d7b17abb6817765909c576119659d902b1906ed8a2b10c155c24d124528dab9eeae379beac66e4a411786dcb8fd0062ebc030de1219a04c2a8c1b7dd3131e4d6b6caee2e31a5ed41ac1509b2ef1ee2ab18364be568ca941c25ecc84ff9d643b5ec1aaae102a20d73f479b780fd6da91075212d9eac03a0674d899eba2e431f4c44b615b6ba2232bd4b33baed73d625d":int:16:char*:"010001":exp:0:hex:"fd326429df9b890e09b54b18b8f34f1e24":hex:"e89bb032c6ce622cbdb53bc9466014ea77f777c0":hex:"81ebdd95054b0c822ef9ad7693f5a87adfb4b4c4ce70df2df84ed49c04da58ba5fc20a19e1a6e8b7a3900b22796dc4e869ee6b42792d15a8eceb56c09c69914e813cea8f6931e4b8ed6f421af298d595c97f4789c7caa612c7ef360984c21b93edc5401068b5af4c78a8771b984d53b8ea8adf2f6a7d4a0ba76c75e1dd9f658f20ded4a46071d46d7791b56803d8fea7f0b0f8e41ae3f09383a6f9585fe7753eaaffd2bf94563108beecc207bbb535f5fcc705f0dde9f708c62f49a9c90371d3":int:0
RSAES-OAEP Encryption Example 9_4
0:int:1536:int:16:char*:"cf2cd41e34ca3a728ea5cb8aff64c36d27bdef5364e336fd68d3123c5a196a8c287013e853d5156d58d151954520fb4f6d7b17abb6817765909c576119659d902b1906ed8a2b10c155c24d124528dab9eeae379beac66e4a411786dcb8fd0062ebc030de1219a04c2a8c1b7dd3131e4d6b6caee2e31a5ed41ac1509b2ef1ee2ab18364be568ca941c25ecc84ff9d643b5ec1aaae102a20d73f479b780fd6da91075212d9eac03a0674d899eba2e431f4c44b615b6ba2232bd4b33baed73d625d":int:16:char*:"010001":exp:0:hex:"f1459b5f0c92f01a0f723a2e5662484d8f8c0a20fc29dad6acd43bb5f3effdf4e1b63e07fdfe6628d0d74ca19bf2d69e4a0abf86d293925a796772f8088e":hex:"606f3b99c0b9ccd771eaa29ea0e4c884f3189ccc":hex:"bcc35f94cde66cb1136625d625b94432a35b22f3d2fa11a613ff0fca5bd57f87b902ccdc1cd0aebcb0715ee869d1d1fe395f6793003f5eca465059c88660d446ff5f0818552022557e38c08a67ead991262254f10682975ec56397768537f4977af6d5f6aaceb7fb25dec5937230231fd8978af49119a29f29e424ab8272b47562792d5c94f774b8829d0b0d9f1a8c9eddf37574d5fa248eefa9c5271fc5ec2579c81bdd61b410fa61fe36e424221c113addb275664c801d34ca8c6351e4a858":int:0
RSAES-OAEP Encryption Example 9_5
0:int:1536:int:16:char*:"cf2cd41e34ca3a728ea5cb8aff64c36d27bdef5364e336fd68d3123c5a196a8c287013e853d5156d58d151954520fb4f6d7b17abb6817765909c576119659d902b1906ed8a2b10c155c24d124528dab9eeae379beac66e4a411786dcb8fd0062ebc030de1219a04c2a8c1b7dd3131e4d6b6caee2e31a5ed41ac1509b2ef1ee2ab18364be568ca941c25ecc84ff9d643b5ec1aaae102a20d73f479b780fd6da91075212d9eac03a0674d899eba2e431f4c44b615b6ba2232bd4b33baed73d625d":int:16:char*:"010001":exp:0:hex:"53e6e8c729d6f9c319dd317e74b0db8e4ccca25f3c8305746e137ac63a63ef3739e7b595abb96e8d55e54f7bd41ab433378ffb911d":hex:"fcbc421402e9ecabc6082afa40ba5f26522c840e":hex:"232afbc927fa08c2f6a27b87d4a5cb09c07dc26fae73d73a90558839f4fd66d281b87ec734bce237ba166698ed829106a7de6942cd6cdce78fed8d2e4d81428e66490d036264cef92af941d3e35055fe3981e14d29cbb9a4f67473063baec79a1179f5a17c9c1832f2838fd7d5e59bb9659d56dce8a019edef1bb3accc697cc6cc7a778f60a064c7f6f5d529c6210262e003de583e81e3167b89971fb8c0e15d44fffef89b53d8d64dd797d159b56d2b08ea5307ea12c241bd58d4ee278a1f2e":int:0
RSAES-OAEP Encryption Example 9_6
0:int:1536:int:16:char*:"cf2cd41e34ca3a728ea5cb8aff64c36d27bdef5364e336fd68d3123c5a196a8c287013e853d5156d58d151954520fb4f6d7b17abb6817765909c576119659d902b1906ed8a2b10c155c24d124528dab9eeae379beac66e4a411786dcb8fd0062ebc030de1219a04c2a8c1b7dd3131e4d6b6caee2e31a5ed41ac1509b2ef1ee2ab18364be568ca941c25ecc84ff9d643b5ec1aaae102a20d73f479b780fd6da91075212d9eac03a0674d899eba2e431f4c44b615b6ba2232bd4b33baed73d625d":int:16:char*:"010001":exp:0:hex:"b6b28ea2198d0c1008bc64":hex:"23aade0e1e08bb9b9a78d2302a52f9c21b2e1ba2":hex:"438cc7dc08a68da249e42505f8573ba60e2c2773d5b290f4cf9dff718e842081c383e67024a0f29594ea987b9d25e4b738f285970d195abb3a8c8054e3d79d6b9c9a8327ba596f1259e27126674766907d8d582ff3a8476154929adb1e6d1235b2ccb4ec8f663ba9cc670a92bebd853c8dbf69c6436d016f61add836e94732450434207f9fd4c43dec2a12a958efa01efe2669899b5e604c255c55fb7166de5589e369597bb09168c06dd5db177e06a1740eb2d5c82faeca6d92fcee9931ba9f":int:0
RSAES-OAEP Encryption Example 10_1
0:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:hex:"8bba6bf82a6c0f86d5f1756e97956870b08953b06b4eb205bc1694ee":hex:"47e1ab7119fee56c95ee5eaad86f40d0aa63bd33":hex:"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":int:0
RSAES-OAEP Encryption Example 10_2
0:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:hex:"e6ad181f053b58a904f2457510373e57":hex:"6d17f5b4c1ffac351d195bf7b09d09f09a4079cf":hex:"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":int:0
RSAES-OAEP Encryption Example 10_3
0:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:hex:"510a2cf60e866fa2340553c94ea39fbc256311e83e94454b4124":hex:"385387514deccc7c740dd8cdf9daee49a1cbfd54":hex:"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":int:0
RSAES-OAEP Encryption Example 10_4
0:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:hex:"bcdd190da3b7d300df9a06e22caae2a75f10c91ff667b7c16bde8b53064a2649a94045c9":hex:"5caca6a0f764161a9684f85d92b6e0ef37ca8b65":hex:"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":int:0
RSAES-OAEP Encryption Example 10_5
0:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:hex:"a7dd6c7dc24b46f9dd5f1e91ada4c3b3df947e877232a9":hex:"95bca9e3859894b3dd869fa7ecd5bbc6401bf3e4":hex:"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":int:0
RSAES-OAEP Encryption Example 10_6
0:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:hex:"eaf1a73a1b0c4609537de69cd9228bbcfb9a8ca8c6c3efaf056fe4a7f4634ed00b7c39ec6922d7b8ea2c04ebac":hex:"9f47ddf42e97eea856a9bdbc714eb3ac22f6eb32":hex:"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":int:0
RSAES-OAEP Encryption input=NULL with length=0
depends_on:0
0:int:2048:int:16:char*:"ae45ed5601cec6b8cc05f803935c674ddbe0d75c4c09fd7951fc6b0caec313a8df39970c518bffba5ed68f3f0d7f22a4029d413f1ae07e4ebe9e4177ce23e7f5404b569e4ee1bdcf3c1fb03ef113802d4f855eb9b5134b5a7c8085adcae6fa2fa1417ec3763be171b0c62b760ede23c12ad92b980884c641f5a8fac26bdad4a03381a22fe1b754885094c82506d4019a535a286afeb271bb9ba592de18dcf600c2aeeae56e02f7cf79fc14cf3bdc7cd84febbbf950ca90304b2219a7aa063aefa2c3c1980e560cd64afe779585b6107657b957857efde6010988ab7de417fc88d8f384c4e6e72c3f943e0c31c0c4a5cc36f879d8a3ac9d7d59860eaada6b83bb":int:16:char*:"010001":exp:0:hex:"":hex:"9f47ddf42e97eea856a9bdbc714eb3ac22f6eb32":hex:"32b75304e631e94d4b02819642c7ffa66116af504cb3c4687420cc4b7f069fc6cc3b1a254611995ce2914a9e88152d38bbf87ccedcad9b9890341284e56e802a1b1f8f6bd3d5c991bd92eb8a8ea0a1d8bae141088ff8dceaebdb73515cf06ce33baa37c53093f1d1edc3502818cc70edcfddb41646374beb5b4f67f7f773e43778d4d31012e5a207c474e762ac3251ea6ede9018ad6e8e9ea65a3528a62b694eb9d8becff220a7c6c70d33eaafa52cf67a8090f67b6f9c43c6fe0b0f2375cbb9e611c0fcfef5312feb5e53d4a89d3d7e06c966e0c92ab9e5838239f390bcfd918d94c224df8e8ccb57ee364389908b6a0e550133f7565016804fbd6cb338314a":int:0
RSAES-OAEP Decryption Test Vector Int
1:int:1024:int:16:char*:"eecfae81b1b9b3c908810b10a1b5600199eb9f44aef4fda493b81a9e3d84f632124ef0236e5d1e3b7e28fae7aa040a2d5b252176459d1f397541ba2a58fb6599":int:16:char*:"c97fb1f027f453f6341233eaaad1d9353f6c42d08866b1d05a0f2035028b9d869840b41666b42e92ea0da3b43204b5cfce3352524d0416a5a441e700af461503":int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:0:hex:"d436e99569fd32a7c8a05bbc90d32c49":char*:"aafd12f659cae63489b479e5076ddec2f06cb58f":hex:"1253e04dc0a5397bb44a7ab87e9bf2a039a33d1e996fc82a94ccd30074c95df763722017069e5268da5d1c0b4f872cf653c11df82314a67968dfeae28def04bb6d84b1c31d654a1970e5783bd6eb96a024c2ca2f4a90fe9f2ef5c9c140e5bb48da9536ad8700c84fc9130adea74e558d51a74ddf85d8b50de96838d6063e0955":int:0
RSAES-OAEP Decryption Test Vector 1_1
1:int:1024:int:16:char*:"d32737e7267ffe1341b2d5c0d150a81b586fb3132bed2f8d5262864a9cb9f30af38be448598d413a172efb802c21acf1c11c520c2f26a471dcad212eac7ca39d":int:16:char*:"cc8853d1d54da630fac004f471f281c7b8982d8224a490edbeb33d3e3d5cc93c4765703d1dd791642f1f116a0dd852be2419b2af72bfe9a030e860b0288b5d77":int:16:char*:"a8b3b284af8eb50b387034a860f146c4919f318763cd6c5598c8ae4811a1e0abc4c7e0b082d693a5e7fced675cf4668512772c0cbc64a742c6c630f533c8cc72f62ae833c40bf25842e984bb78bdbf97c0107d55bdb662f5c4e0fab9845cb5148ef7392dd3aaff93ae1e6b667bb3d4247616d4f5ba10d4cfd226de88d39f16fb":int:16:char*:"010001":exp:0:hex:"6628194e12073db03ba94cda9ef9532397d50dba79b987004afefe34":char*:"18b776ea21069d69776a33e96bad48e1dda0a5ef":hex:"354fe67b4a126d5d35fe36c777791a3f7ba13def484e2d3908aff722fad468fb21696de95d0be911c2d3174f8afcc201035f7b6d8e69402de5451618c21a535fa9d7bfc5b8dd9fc243f8cf927db31322d6e881eaa91a996170e657a05a266426d98c88003f8477c1227094a0d9fa1e8c4024309ce1ecccb5210035d47ac72e8a":int:0
RSAES-OAEP Decryption Test Vector 1_2
1:int:1024:int:16:char*:"d32737e7267ffe1341b2d5c0d150a81b586fb3132bed2f8d5262864a9cb9f30af38be448598d413a172efb802c21acf1c11c520c2f26a471dcad212eac7ca39d":int:16:char*:"cc8853d1d54da630fac004f471f281c7b8982d8224a490edbeb33d3e3d5cc93c4765703d1dd791642f1f116a0dd852be2419b2af72bfe9a030e860b0288b5d77":int:16:char*:"a8b3b284af8eb50b387034a860f146c4919f318763cd6c5598c8ae4811a1e0abc4c7e0b082d693a5e7fced675cf4668512772c0cbc64a742c6c630f533c8cc72f62ae833c40bf25842e984bb78bdbf97c0107d55bdb662f5c4e0fab9845cb5148ef7392dd3aaff93ae1e6b667bb3d4247616d4f5ba10d4cfd226de88d39f16fb":int:16:char*:"010001":exp:0:hex:"750c4047f547e8e41411856523298ac9bae245efaf1397fbe56f9dd5":char*:"0cc742ce4a9b7f32f951bcb251efd925fe4fe35f":hex:"640db1acc58e0568fe5407e5f9b701dff8c3c91e716c536fc7fcec6cb5b71c1165988d4a279e1577d730fc7a29932e3f00c81515236d8d8e31017a7a09df4352d904cdeb79aa583adcc31ea698a4c05283daba9089be5491f67c1a4ee48dc74bbbe6643aef846679b4cb395a352d5ed115912df696ffe0702932946d71492b44":int:0
RSAES-OAEP Decryption Test Vector 1_3
1:int:1024:int:16:char*:"d32737e7267ffe1341b2d5c0d150a81b586fb3132bed2f8d5262864a9cb9f30af38be448598d413a172efb802c21acf1c11c520c2f26a471dcad212eac7ca39d":int:16:char*:"cc8853d1d54da630fac004f471f281c7b8982d8224a490edbeb33d3e3d5cc93c4765703d1dd791642f1f116a0dd852be2419b2af72bfe9a030e860b0288b5d77":int:16:char*:"a8b3b284af8eb50b387034a860f146c4919f318763cd6c5598c8ae4811a1e0abc4c7e0b082d693a5e7fced675cf4668512772c0cbc64a742c6c630f533c8cc72f62ae833c40bf25842e984bb78bdbf97c0107d55bdb662f5c4e0fab9845cb5148ef7392dd3aaff93ae1e6b667bb3d4247616d4f5ba10d4cfd226de88d39f16fb":int:16:char*:"010001":exp:0:hex:"d94ae0832e6445ce42331cb06d531a82b1db4baad30f746dc916df24d4e3c2451fff59a6423eb0e1d02d4fe646cf699dfd818c6e97b051":char*:"2514df4695755a67b288eaf4905c36eec66fd2fd":hex:"423736ed035f6026af276c35c0b3741b365e5f76ca091b4e8c29e2f0befee603595aa8322d602d2e625e95eb81b2f1c9724e822eca76db8618cf09c5343503a4360835b5903bc637e3879fb05e0ef32685d5aec5067cd7cc96fe4b2670b6eac3066b1fcf5686b68589aafb7d629b02d8f8625ca3833624d4800fb081b1cf94eb":int:0
RSAES-OAEP Decryption Test Vector 1_4
1:int:1024:int:16:char*:"d32737e7267ffe1341b2d5c0d150a81b586fb3132bed2f8d5262864a9cb9f30af38be448598d413a172efb802c21acf1c11c520c2f26a471dcad212eac7ca39d":int:16:char*:"cc8853d1d54da630fac004f471f281c7b8982d8224a490edbeb33d3e3d5cc93c4765703d1dd791642f1f116a0dd852be2419b2af72bfe9a030e860b0288b5d77":int:16:char*:"a8b3b284af8eb50b387034a860f146c4919f318763cd6c5598c8ae4811a1e0abc4c7e0b082d693a5e7fced675cf4668512772c0cbc64a742c6c630f533c8cc72f62ae833c40bf25842e984bb78bdbf97c0107d55bdb662f5c4e0fab9845cb5148ef7392dd3aaff93ae1e6b667bb3d4247616d4f5ba10d4cfd226de88d39f16fb":int:16:char*:"010001":exp:0:hex:"52e650d98e7f2a048b4f86852153b97e01dd316f346a19f67a85":char*:"c4435a3e1a18a68b6820436290a37cefb85db3fb":hex:"45ead4ca551e662c9800f1aca8283b0525e6abae30be4b4aba762fa40fd3d38e22abefc69794f6ebbbc05ddbb11216247d2f412fd0fba87c6e3acd888813646fd0e48e785204f9c3f73d6d8239562722dddd8771fec48b83a31ee6f592c4cfd4bc88174f3b13a112aae3b9f7b80e0fc6f7255ba880dc7d8021e22ad6a85f0755":int:0
RSAES-OAEP Decryption Test Vector 1_5
1:int:1024:int:16:char*:"d32737e7267ffe1341b2d5c0d150a81b586fb3132bed2f8d5262864a9cb9f30af38be448598d413a172efb802c21acf1c11c520c2f26a471dcad212eac7ca39d":int:16:char*:"cc8853d1d54da630fac004f471f281c7b8982d8224a490edbeb33d3e3d5cc93c4765703d1dd791642f1f116a0dd852be2419b2af72bfe9a030e860b0288b5d77":int:16:char*:"a8b3b284af8eb50b387034a860f146c4919f318763cd6c5598c8ae4811a1e0abc4c7e0b082d693a5e7fced675cf4668512772c0cbc64a742c6c630f533c8cc72f62ae833c40bf25842e984bb78bdbf97c0107d55bdb662f5c4e0fab9845cb5148ef7392dd3aaff93ae1e6b667bb3d4247616d4f5ba10d4cfd226de88d39f16fb":int:16:char*:"010001":exp:0:hex:"8da89fd9e5f974a29feffb462b49180f6cf9e802":char*:"b318c42df3be0f83fea823f5a7b47ed5e425a3b5":hex:"36f6e34d94a8d34daacba33a2139d00ad85a9345a86051e73071620056b920e219005855a213a0f23897cdcd731b45257c777fe908202befdd0b58386b1244ea0cf539a05d5d10329da44e13030fd760dcd644cfef2094d1910d3f433e1c7c6dd18bc1f2df7f643d662fb9dd37ead9059190f4fa66ca39e869c4eb449cbdc439":int:0
RSAES-OAEP Decryption Test Vector 1_6
1:int:1024:int:16:char*:"d32737e7267ffe1341b2d5c0d150a81b586fb3132bed2f8d5262864a9cb9f30af38be448598d413a172efb802c21acf1c11c520c2f26a471dcad212eac7ca39d":int:16:char*:"cc8853d1d54da630fac004f471f281c7b8982d8224a490edbeb33d3e3d5cc93c4765703d1dd791642f1f116a0dd852be2419b2af72bfe9a030e860b0288b5d77":int:16:char*:"a8b3b284af8eb50b387034a860f146c4919f318763cd6c5598c8ae4811a1e0abc4c7e0b082d693a5e7fced675cf4668512772c0cbc64a742c6c630f533c8cc72f62ae833c40bf25842e984bb78bdbf97c0107d55bdb662f5c4e0fab9845cb5148ef7392dd3aaff93ae1e6b667bb3d4247616d4f5ba10d4cfd226de88d39f16fb":int:16:char*:"010001":exp:0:hex:"26521050844271":char*:"e4ec0982c2336f3a677f6a356174eb0ce887abc2":hex:"42cee2617b1ecea4db3f4829386fbd61dafbf038e180d837c96366df24c097b4ab0fac6bdf590d821c9f10642e681ad05b8d78b378c0f46ce2fad63f74e0ad3df06b075d7eb5f5636f8d403b9059ca761b5c62bb52aa45002ea70baace08ded243b9d8cbd62a68ade265832b56564e43a6fa42ed199a099769742df1539e8255":int:0
RSAES-OAEP Decryption Test Vector 2_1
1:int:1025:int:16:char*:"0159dbde04a33ef06fb608b80b190f4d3e22bcc13ac8e4a081033abfa416edb0b338aa08b57309ea5a5240e7dc6e54378c69414c31d97ddb1f406db3769cc41a43":int:16:char*:"012b652f30403b38b40995fd6ff41a1acc8ada70373236b7202d39b2ee30cfb46db09511f6f307cc61cc21606c18a75b8a62f822df031ba0df0dafd5506f568bd7":int:16:char*:"01947c7fce90425f47279e70851f25d5e62316fe8a1df19371e3e628e260543e4901ef6081f68c0b8141190d2ae8daba7d1250ec6db636e944ec3722877c7c1d0a67f14b1694c5f0379451a43e49a32dde83670b73da91a1c99bc23b436a60055c610f0baf99c1a079565b95a3f1526632d1d4da60f20eda25e653c4f002766f45":int:16:char*:"010001":exp:0:hex:"8ff00caa605c702830634d9a6c3d42c652b58cf1d92fec570beee7":char*:"8c407b5ec2899e5099c53e8ce793bf94e71b1782":hex:"0181af8922b9fcb4d79d92ebe19815992fc0c1439d8bcd491398a0f4ad3a329a5bd9385560db532683c8b7da04e4b12aed6aacdf471c34c9cda891addcc2df3456653aa6382e9ae59b54455257eb099d562bbe10453f2b6d13c59c02e10f1f8abb5da0d0570932dacf2d0901db729d0fefcc054e70968ea540c81b04bcaefe720e":int:0
RSAES-OAEP Decryption Test Vector 2_2
1:int:1025:int:16:char*:"0159dbde04a33ef06fb608b80b190f4d3e22bcc13ac8e4a081033abfa416edb0b338aa08b57309ea5a5240e7dc6e54378c69414c31d97ddb1f406db3769cc41a43":int:16:char*:"012b652f30403b38b40995fd6ff41a1acc8ada70373236b7202d39b2ee30cfb46db09511f6f307cc61cc21606c18a75b8a62f822df031ba0df0dafd5506f568bd7":int:16:char*:"01947c7fce90425f47279e70851f25d5e62316fe8a1df19371e3e628e260543e4901ef6081f68c0b8141190d2ae8daba7d1250ec6db636e944ec3722877c7c1d0a67f14b1694c5f0379451a43e49a32dde83670b73da91a1c99bc23b436a60055c610f0baf99c1a079565b95a3f1526632d1d4da60f20eda25e653c4f002766f45":int:16:char*:"010001":exp:0:hex:"2d":char*:"b600cf3c2e506d7f16778c910d3a8b003eee61d5":hex:"018759ff1df63b2792410562314416a8aeaf2ac634b46f940ab82d64dbf165eee33011da749d4bab6e2fcd18129c9e49277d8453112b429a222a8471b070993998e758861c4d3f6d749d91c4290d332c7a4ab3f7ea35ff3a07d497c955ff0ffc95006b62c6d296810d9bfab024196c7934012c2df978ef299aba239940cba10245":int:0
RSAES-OAEP Decryption Test Vector 2_3
1:int:1025:int:16:char*:"0159dbde04a33ef06fb608b80b190f4d3e22bcc13ac8e4a081033abfa416edb0b338aa08b57309ea5a5240e7dc6e54378c69414c31d97ddb1f406db3769cc41a43":int:16:char*:"012b652f30403b38b40995fd6ff41a1acc8ada70373236b7202d39b2ee30cfb46db09511f6f307cc61cc21606c18a75b8a62f822df031ba0df0dafd5506f568bd7":int:16:char*:"01947c7fce90425f47279e70851f25d5e62316fe8a1df19371e3e628e260543e4901ef6081f68c0b8141190d2ae8daba7d1250ec6db636e944ec3722877c7c1d0a67f14b1694c5f0379451a43e49a32dde83670b73da91a1c99bc23b436a60055c610f0baf99c1a079565b95a3f1526632d1d4da60f20eda25e653c4f002766f45":int:16:char*:"010001":exp:0:hex:"74fc88c51bc90f77af9d5e9a4a70133d4b4e0b34da3c37c7ef8e":char*:"a73768aeeaa91f9d8c1ed6f9d2b63467f07ccae3":hex:"018802bab04c60325e81c4962311f2be7c2adce93041a00719c88f957575f2c79f1b7bc8ced115c706b311c08a2d986ca3b6a9336b147c29c6f229409ddec651bd1fdd5a0b7f610c9937fdb4a3a762364b8b3206b4ea485fd098d08f63d4aa8bb2697d027b750c32d7f74eaf5180d2e9b66b17cb2fa55523bc280da10d14be2053":int:0
RSAES-OAEP Decryption Test Vector 2_4
1:int:1025:int:16:char*:"0159dbde04a33ef06fb608b80b190f4d3e22bcc13ac8e4a081033abfa416edb0b338aa08b57309ea5a5240e7dc6e54378c69414c31d97ddb1f406db3769cc41a43":int:16:char*:"012b652f30403b38b40995fd6ff41a1acc8ada70373236b7202d39b2ee30cfb46db09511f6f307cc61cc21606c18a75b8a62f822df031ba0df0dafd5506f568bd7":int:16:char*:"01947c7fce90425f47279e70851f25d5e62316fe8a1df19371e3e628e260543e4901ef6081f68c0b8141190d2ae8daba7d1250ec6db636e944ec3722877c7c1d0a67f14b1694c5f0379451a43e49a32dde83670b73da91a1c99bc23b436a60055c610f0baf99c1a079565b95a3f1526632d1d4da60f20eda25e653c4f002766f45":int:16:char*:"010001":exp:0:hex:"a7eb2a5036931d27d4e891326d99692ffadda9bf7efd3e34e622c4adc085f721dfe885072c78a203b151739be540fa8c153a10f00a":char*:"9a7b3b0e708bd96f8190ecab4fb9b2b3805a8156":hex:"00a4578cbc176318a638fba7d01df15746af44d4f6cd96d7e7c495cbf425b09c649d32bf886da48fbaf989a2117187cafb1fb580317690e3ccd446920b7af82b31db5804d87d01514acbfa9156e782f867f6bed9449e0e9a2c09bcecc6aa087636965e34b3ec766f2fe2e43018a2fddeb140616a0e9d82e5331024ee0652fc7641":int:0
RSAES-OAEP Decryption Test Vector 2_5
1:int:1025:int:16:char*:"0159dbde04a33ef06fb608b80b190f4d3e22bcc13ac8e4a081033abfa416edb0b338aa08b57309ea5a5240e7dc6e54378c69414c31d97ddb1f406db3769cc41a43":int:16:char*:"012b652f30403b38b40995fd6ff41a1acc8ada70373236b7202d39b2ee30cfb46db09511f6f307cc61cc21606c18a75b8a62f822df031ba0df0dafd5506f568bd7":int:16:char*:"01947c7fce90425f47279e70851f25d5e62316fe8a1df19371e3e628e260543e4901ef6081f68c0b8141190d2ae8daba7d1250ec6db636e944ec3722877c7c1d0a67f14b1694c5f0379451a43e49a32dde83670b73da91a1c99bc23b436a60055c610f0baf99c1a079565b95a3f1526632d1d4da60f20eda25e653c4f002766f45":int:16:char*:"010001":exp:0:hex:"2ef2b066f854c33f3bdcbb5994a435e73d6c6c":char*:"eb3cebbc4adc16bb48e88c8aec0e34af7f427fd3":hex:"00ebc5f5fda77cfdad3c83641a9025e77d72d8a6fb33a810f5950f8d74c73e8d931e8634d86ab1246256ae07b6005b71b7f2fb98351218331ce69b8ffbdc9da08bbc9c704f876deb9df9fc2ec065cad87f9090b07acc17aa7f997b27aca48806e897f771d95141fe4526d8a5301b678627efab707fd40fbebd6e792a25613e7aec":int:0
RSAES-OAEP Decryption Test Vector 2_6
1:int:1025:int:16:char*:"0159dbde04a33ef06fb608b80b190f4d3e22bcc13ac8e4a081033abfa416edb0b338aa08b57309ea5a5240e7dc6e54378c69414c31d97ddb1f406db3769cc41a43":int:16:char*:"012b652f30403b38b40995fd6ff41a1acc8ada70373236b7202d39b2ee30cfb46db09511f6f307cc61cc21606c18a75b8a62f822df031ba0df0dafd5506f568bd7":int:16:char*:"01947c7fce90425f47279e70851f25d5e62316fe8a1df19371e3e628e260543e4901ef6081f68c0b8141190d2ae8daba7d1250ec6db636e944ec3722877c7c1d0a67f14b1694c5f0379451a43e49a32dde83670b73da91a1c99bc23b436a60055c610f0baf99c1a079565b95a3f1526632d1d4da60f20eda25e653c4f002766f45":int:16:char*:"010001":exp:0:hex:"8a7fb344c8b6cb2cf2ef1f643f9a3218f6e19bba89c0":char*:"4c45cf4d57c98e3d6d2095adc51c489eb50dff84":hex:"010839ec20c27b9052e55befb9b77e6fc26e9075d7a54378c646abdf51e445bd5715de81789f56f1803d9170764a9e93cb78798694023ee7393ce04bc5d8f8c5a52c171d43837e3aca62f609eb0aa5ffb0960ef04198dd754f57f7fbe6abf765cf118b4ca443b23b5aab266f952326ac4581100644325f8b721acd5d04ff14ef3a":int:0
RSAES-OAEP Decryption Example 3_1
1:int:1026:int:16:char*:"01bf01d216d73595cf0270c2beb78d40a0d8447d31da919a983f7eea781b77d85fe371b3e9373e7b69217d3150a02d8958de7fad9d555160958b4454127e0e7eaf":int:16:char*:"018d3399658166db3829816d7b295416759e9c91987f5b2d8aecd63b04b48bd7b2fcf229bb7f8a6dc88ba13dd2e39ad55b6d1a06160708f9700be80b8fd3744ce7":int:16:char*:"02b58fec039a860700a4d7b6462f93e6cdd491161ddd74f4e810b40e3c1652006a5c277b2774c11305a4cbab5a78efa57e17a86df7a3fa36fc4b1d2249f22ec7c2dd6a463232accea906d66ebe80b5704b10729da6f833234abb5efdd4a292cbfad33b4d33fa7a14b8c397b56e3acd21203428b77cdfa33a6da706b3d8b0fc43e9":int:16:char*:"010001":exp:0:hex:"087820b569e8fa8d":char*:"8ced6b196290805790e909074015e6a20b0c4894":hex:"026a0485d96aebd96b4382085099b962e6a2bdec3d90c8db625e14372de85e2d5b7baab65c8faf91bb5504fb495afce5c988b3f6a52e20e1d6cbd3566c5cd1f2b8318bb542cc0ea25c4aab9932afa20760eaddec784396a07ea0ef24d4e6f4d37e5052a7a31e146aa480a111bbe926401307e00f410033842b6d82fe5ce4dfae80":int:0
RSAES-OAEP Decryption Example 3_2
1:int:1026:int:16:char*:"01bf01d216d73595cf0270c2beb78d40a0d8447d31da919a983f7eea781b77d85fe371b3e9373e7b69217d3150a02d8958de7fad9d555160958b4454127e0e7eaf":int:16:char*:"018d3399658166db3829816d7b295416759e9c91987f5b2d8aecd63b04b48bd7b2fcf229bb7f8a6dc88ba13dd2e39ad55b6d1a06160708f9700be80b8fd3744ce7":int:16:char*:"02b58fec039a860700a4d7b6462f93e6cdd491161ddd74f4e810b40e3c1652006a5c277b2774c11305a4cbab5a78efa57e17a86df7a3fa36fc4b1d2249f22ec7c2dd6a463232accea906d66ebe80b5704b10729da6f833234abb5efdd4a292cbfad33b4d33fa7a14b8c397b56e3acd21203428b77cdfa33a6da706b3d8b0fc43e9":int:16:char*:"010001":exp:0:hex:"4653acaf171960b01f52a7be63a3ab21dc368ec43b50d82ec3781e04":char*:"b4291d6567550848cc156967c809baab6ca507f0":hex:"024db89c7802989be0783847863084941bf209d761987e38f97cb5f6f1bc88da72a50b73ebaf11c879c4f95df37b850b8f65d7622e25b1b889e80fe80baca2069d6e0e1d829953fc459069de98ea9798b451e557e99abf8fe3d9ccf9096ebbf3e5255d3b4e1c6d2ecadf067a359eea86405acd47d5e165517ccafd47d6dbee4bf5":int:0
RSAES-OAEP Decryption Example 3_3
1:int:1026:int:16:char*:"01bf01d216d73595cf0270c2beb78d40a0d8447d31da919a983f7eea781b77d85fe371b3e9373e7b69217d3150a02d8958de7fad9d555160958b4454127e0e7eaf":int:16:char*:"018d3399658166db3829816d7b295416759e9c91987f5b2d8aecd63b04b48bd7b2fcf229bb7f8a6dc88ba13dd2e39ad55b6d1a06160708f9700be80b8fd3744ce7":int:16:char*:"02b58fec039a860700a4d7b6462f93e6cdd491161ddd74f4e810b40e3c1652006a5c277b2774c11305a4cbab5a78efa57e17a86df7a3fa36fc4b1d2249f22ec7c2dd6a463232accea906d66ebe80b5704b10729da6f833234abb5efdd4a292cbfad33b4d33fa7a14b8c397b56e3acd21203428b77cdfa33a6da706b3d8b0fc43e9":int:16:char*:"010001":exp:0:hex:"d94cd0e08fa404ed89":char*:"ce8928f6059558254008badd9794fadcd2fd1f65":hex:"0239bce681032441528877d6d1c8bb28aa3bc97f1df584563618995797683844ca86664732f4bed7a0aab083aaabfb7238f582e30958c2024e44e57043b97950fd543da977c90cdde5337d618442f99e60d7783ab59ce6dd9d69c47ad1e962bec22d05895cff8d3f64ed5261d92b2678510393484990ba3f7f06818ae6ffce8a3a":int:0
RSAES-OAEP Decryption Example 3_4
1:int:1026:int:16:char*:"01bf01d216d73595cf0270c2beb78d40a0d8447d31da919a983f7eea781b77d85fe371b3e9373e7b69217d3150a02d8958de7fad9d555160958b4454127e0e7eaf":int:16:char*:"018d3399658166db3829816d7b295416759e9c91987f5b2d8aecd63b04b48bd7b2fcf229bb7f8a6dc88ba13dd2e39ad55b6d1a06160708f9700be80b8fd3744ce7":int:16:char*:"02b58fec039a860700a4d7b6462f93e6cdd491161ddd74f4e810b40e3c1652006a5c277b2774c11305a4cbab5a78efa57e17a86df7a3fa36fc4b1d2249f22ec7c2dd6a463232accea906d66ebe80b5704b10729da6f833234abb5efdd4a292cbfad33b4d33fa7a14b8c397b56e3acd21203428b77cdfa33a6da706b3d8b0fc43e9":int:16:char*:"010001":exp:0:hex:"6cc641b6b61e6f963974dad23a9013284ef1":char*:"6e2979f52d6814a57d83b090054888f119a5b9a3":hex:"02994c62afd76f498ba1fd2cf642857fca81f4373cb08f1cbaee6f025c3b512b42c3e8779113476648039dbe0493f9246292fac28950600e7c0f32edf9c81b9dec45c3bde0cc8d8847590169907b7dc5991ceb29bb0714d613d96df0f12ec5d8d3507c8ee7ae78dd83f216fa61de100363aca48a7e914ae9f42ddfbe943b09d9a0":int:0
RSAES-OAEP Decryption Example 3_5
1:int:1026:int:16:char*:"01bf01d216d73595cf0270c2beb78d40a0d8447d31da919a983f7eea781b77d85fe371b3e9373e7b69217d3150a02d8958de7fad9d555160958b4454127e0e7eaf":int:16:char*:"018d3399658166db3829816d7b295416759e9c91987f5b2d8aecd63b04b48bd7b2fcf229bb7f8a6dc88ba13dd2e39ad55b6d1a06160708f9700be80b8fd3744ce7":int:16:char*:"02b58fec039a860700a4d7b6462f93e6cdd491161ddd74f4e810b40e3c1652006a5c277b2774c11305a4cbab5a78efa57e17a86df7a3fa36fc4b1d2249f22ec7c2dd6a463232accea906d66ebe80b5704b10729da6f833234abb5efdd4a292cbfad33b4d33fa7a14b8c397b56e3acd21203428b77cdfa33a6da706b3d8b0fc43e9":int:16:char*:"010001":exp:0:hex:"df5151832b61f4f25891fb4172f328d2eddf8371ffcfdbe997939295f30eca6918017cfda1153bf7a6af87593223":char*:"2d760bfe38c59de34cdc8b8c78a38e66284a2d27":hex:"0162042ff6969592a6167031811a239834ce638abf54fec8b99478122afe2ee67f8c5b18b0339805bfdbc5a4e6720b37c59cfba942464c597ff532a119821545fd2e59b114e61daf71820529f5029cf524954327c34ec5e6f5ba7efcc4de943ab8ad4ed787b1454329f70db798a3a8f4d92f8274e2b2948ade627ce8ee33e43c60":int:0
RSAES-OAEP Decryption Example 3_6
1:int:1026:int:16:char*:"01bf01d216d73595cf0270c2beb78d40a0d8447d31da919a983f7eea781b77d85fe371b3e9373e7b69217d3150a02d8958de7fad9d555160958b4454127e0e7eaf":int:16:char*:"018d3399658166db3829816d7b295416759e9c91987f5b2d8aecd63b04b48bd7b2fcf229bb7f8a6dc88ba13dd2e39ad55b6d1a06160708f9700be80b8fd3744ce7":int:16:char*:"02b58fec039a860700a4d7b6462f93e6cdd491161ddd74f4e810b40e3c1652006a5c277b2774c11305a4cbab5a78efa57e17a86df7a3fa36fc4b1d2249f22ec7c2dd6a463232accea906d66ebe80b5704b10729da6f833234abb5efdd4a292cbfad33b4d33fa7a14b8c397b56e3acd21203428b77cdfa33a6da706b3d8b0fc43e9":int:16:char*:"010001":exp:0:hex:"3c3bad893c544a6d520ab022319188c8d504b7a788b850903b85972eaa18552e1134a7ad6098826254ff7ab672b3d8eb3158fac6d4cbaef1":char*:"f174779c5fd3cfe007badcb7a36c9b55bfcfbf0e":hex:"00112051e75d064943bc4478075e43482fd59cee0679de6893eec3a943daa490b9691c93dfc0464b6623b9f3dbd3e70083264f034b374f74164e1a00763725e574744ba0b9db83434f31df96f6e2a26f6d8eba348bd4686c2238ac07c37aac3785d1c7eea2f819fd91491798ed8e9cef5e43b781b0e0276e37c43ff9492d005730":int:0
RSAES-OAEP Decryption Example 4_1
1:int:1027:int:16:char*:"027458c19ec1636919e736c9af25d609a51b8f561d19c6bf6943dd1ee1ab8a4a3f232100bd40b88decc6ba235548b6ef792a11c9de823d0a7922c7095b6eba5701":int:16:char*:"0210ee9b33ab61716e27d251bd465f4b35a1a232e2da00901c294bf22350ce490d099f642b5375612db63ba1f20386492bf04d34b3c22bceb909d13441b53b5139":int:16:char*:"051240b6cc0004fa48d0134671c078c7c8dec3b3e2f25bc2564467339db38853d06b85eea5b2de353bff42ac2e46bc97fae6ac9618da9537a5c8f553c1e357625991d6108dcd7885fb3a25413f53efcad948cb35cd9b9ae9c1c67626d113d57dde4c5bea76bb5bb7de96c00d07372e9685a6d75cf9d239fa148d70931b5f3fb039":int:16:char*:"010001":exp:0:hex:"4a86609534ee434a6cbca3f7e962e76d455e3264c19f605f6e5ff6137c65c56d7fb344cd52bc93374f3d166c9f0c6f9c506bad19330972d2":char*:"1cac19ce993def55f98203f6852896c95ccca1f3":hex:"04cce19614845e094152a3fe18e54e3330c44e5efbc64ae16886cb1869014cc5781b1f8f9e045384d0112a135ca0d12e9c88a8e4063416deaae3844f60d6e96fe155145f4525b9a34431ca3766180f70e15a5e5d8e8b1a516ff870609f13f896935ced188279a58ed13d07114277d75c6568607e0ab092fd803a223e4a8ee0b1a8":int:0
RSAES-OAEP Decryption Example 4_2
1:int:1027:int:16:char*:"027458c19ec1636919e736c9af25d609a51b8f561d19c6bf6943dd1ee1ab8a4a3f232100bd40b88decc6ba235548b6ef792a11c9de823d0a7922c7095b6eba5701":int:16:char*:"0210ee9b33ab61716e27d251bd465f4b35a1a232e2da00901c294bf22350ce490d099f642b5375612db63ba1f20386492bf04d34b3c22bceb909d13441b53b5139":int:16:char*:"051240b6cc0004fa48d0134671c078c7c8dec3b3e2f25bc2564467339db38853d06b85eea5b2de353bff42ac2e46bc97fae6ac9618da9537a5c8f553c1e357625991d6108dcd7885fb3a25413f53efcad948cb35cd9b9ae9c1c67626d113d57dde4c5bea76bb5bb7de96c00d07372e9685a6d75cf9d239fa148d70931b5f3fb039":int:16:char*:"010001":exp:0:hex:"b0adc4f3fe11da59ce992773d9059943c03046497ee9d9f9a06df1166db46d98f58d27ec074c02eee6cbe2449c8b9fc5080c5c3f4433092512ec46aa793743c8":char*:"f545d5897585e3db71aa0cb8da76c51d032ae963":hex:"0097b698c6165645b303486fbf5a2a4479c0ee85889b541a6f0b858d6b6597b13b854eb4f839af03399a80d79bda6578c841f90d645715b280d37143992dd186c80b949b775cae97370e4ec97443136c6da484e970ffdb1323a20847821d3b18381de13bb49aaea66530c4a4b8271f3eae172cd366e07e6636f1019d2a28aed15e":int:0
RSAES-OAEP Decryption Example 4_3
1:int:1027:int:16:char*:"027458c19ec1636919e736c9af25d609a51b8f561d19c6bf6943dd1ee1ab8a4a3f232100bd40b88decc6ba235548b6ef792a11c9de823d0a7922c7095b6eba5701":int:16:char*:"0210ee9b33ab61716e27d251bd465f4b35a1a232e2da00901c294bf22350ce490d099f642b5375612db63ba1f20386492bf04d34b3c22bceb909d13441b53b5139":int:16:char*:"051240b6cc0004fa48d0134671c078c7c8dec3b3e2f25bc2564467339db38853d06b85eea5b2de353bff42ac2e46bc97fae6ac9618da9537a5c8f553c1e357625991d6108dcd7885fb3a25413f53efcad948cb35cd9b9ae9c1c67626d113d57dde4c5bea76bb5bb7de96c00d07372e9685a6d75cf9d239fa148d70931b5f3fb039":int:16:char*:"010001":exp:0:hex:"bf6d42e701707b1d0206b0c8b45a1c72641ff12889219a82bdea965b5e79a96b0d0163ed9d578ec9ada20f2fbcf1ea3c4089d83419ba81b0c60f3606da99":char*:"ad997feef730d6ea7be60d0dc52e72eacbfdd275":hex:"0301f935e9c47abcb48acbbe09895d9f5971af14839da4ff95417ee453d1fd77319072bb7297e1b55d7561cd9d1bb24c1a9a37c619864308242804879d86ebd001dce5183975e1506989b70e5a83434154d5cbfd6a24787e60eb0c658d2ac193302d1192c6e622d4a12ad4b53923bca246df31c6395e37702c6a78ae081fb9d065":int:0
RSAES-OAEP Decryption Example 4_4
1:int:1027:int:16:char*:"027458c19ec1636919e736c9af25d609a51b8f561d19c6bf6943dd1ee1ab8a4a3f232100bd40b88decc6ba235548b6ef792a11c9de823d0a7922c7095b6eba5701":int:16:char*:"0210ee9b33ab61716e27d251bd465f4b35a1a232e2da00901c294bf22350ce490d099f642b5375612db63ba1f20386492bf04d34b3c22bceb909d13441b53b5139":int:16:char*:"051240b6cc0004fa48d0134671c078c7c8dec3b3e2f25bc2564467339db38853d06b85eea5b2de353bff42ac2e46bc97fae6ac9618da9537a5c8f553c1e357625991d6108dcd7885fb3a25413f53efcad948cb35cd9b9ae9c1c67626d113d57dde4c5bea76bb5bb7de96c00d07372e9685a6d75cf9d239fa148d70931b5f3fb039":int:16:char*:"010001":exp:0:hex:"fb2ef112f5e766eb94019297934794f7be2f6fc1c58e":char*:"136454df5730f73c807a7e40d8c1a312ac5b9dd3":hex:"02d110ad30afb727beb691dd0cf17d0af1a1e7fa0cc040ec1a4ba26a42c59d0a796a2e22c8f357ccc98b6519aceb682e945e62cb734614a529407cd452bee3e44fece8423cc19e55548b8b994b849c7ecde4933e76037e1d0ce44275b08710c68e430130b929730ed77e09b015642c5593f04e4ffb9410798102a8e96ffdfe11e4":int:0
RSAES-OAEP Decryption Example 4_5
1:int:1027:int:16:char*:"027458c19ec1636919e736c9af25d609a51b8f561d19c6bf6943dd1ee1ab8a4a3f232100bd40b88decc6ba235548b6ef792a11c9de823d0a7922c7095b6eba5701":int:16:char*:"0210ee9b33ab61716e27d251bd465f4b35a1a232e2da00901c294bf22350ce490d099f642b5375612db63ba1f20386492bf04d34b3c22bceb909d13441b53b5139":int:16:char*:"051240b6cc0004fa48d0134671c078c7c8dec3b3e2f25bc2564467339db38853d06b85eea5b2de353bff42ac2e46bc97fae6ac9618da9537a5c8f553c1e357625991d6108dcd7885fb3a25413f53efcad948cb35cd9b9ae9c1c67626d113d57dde4c5bea76bb5bb7de96c00d07372e9685a6d75cf9d239fa148d70931b5f3fb039":int:16:char*:"010001":exp:0:hex:"28ccd447bb9e85166dabb9e5b7d1adadc4b9d39f204e96d5e440ce9ad928bc1c2284":char*:"bca8057f824b2ea257f2861407eef63d33208681":hex:"00dbb8a7439d90efd919a377c54fae8fe11ec58c3b858362e23ad1b8a44310799066b99347aa525691d2adc58d9b06e34f288c170390c5f0e11c0aa3645959f18ee79e8f2be8d7ac5c23d061f18dd74b8c5f2a58fcb5eb0c54f99f01a83247568292536583340948d7a8c97c4acd1e98d1e29dc320e97a260532a8aa7a758a1ec2":int:0
RSAES-OAEP Decryption Example 4_6
1:int:1027:int:16:char*:"027458c19ec1636919e736c9af25d609a51b8f561d19c6bf6943dd1ee1ab8a4a3f232100bd40b88decc6ba235548b6ef792a11c9de823d0a7922c7095b6eba5701":int:16:char*:"0210ee9b33ab61716e27d251bd465f4b35a1a232e2da00901c294bf22350ce490d099f642b5375612db63ba1f20386492bf04d34b3c22bceb909d13441b53b5139":int:16:char*:"051240b6cc0004fa48d0134671c078c7c8dec3b3e2f25bc2564467339db38853d06b85eea5b2de353bff42ac2e46bc97fae6ac9618da9537a5c8f553c1e357625991d6108dcd7885fb3a25413f53efcad948cb35cd9b9ae9c1c67626d113d57dde4c5bea76bb5bb7de96c00d07372e9685a6d75cf9d239fa148d70931b5f3fb039":int:16:char*:"010001":exp:0:hex:"f22242751ec6b1":char*:"2e7e1e17f647b5ddd033e15472f90f6812f3ac4e":hex:"00a5ffa4768c8bbecaee2db77e8f2eec99595933545520835e5ba7db9493d3e17cddefe6a5f567624471908db4e2d83a0fbee60608fc84049503b2234a07dc83b27b22847ad8920ff42f674ef79b76280b00233d2b51b8cb2703a9d42bfbc8250c96ec32c051e57f1b4ba528db89c37e4c54e27e6e64ac69635ae887d9541619a9":int:0
RSAES-OAEP Decryption Example 5_1
1:int:1028:int:16:char*:"03b0d3962f6d17549cbfca11294348dcf0e7e39f8c2bc6824f2164b606d687860dae1e632393cfedf513228229069e2f60e4acd7e633a436063f82385f48993707":int:16:char*:"02e4c32e2f517269b7072309f00c0e31365f7ce28b236b82912df239abf39572cf0ed604b02982e53564c52d6a05397de5c052a2fddc141ef7189836346aeb331f":int:16:char*:"0aadf3f9c125e5d891f31ac448e993defe580f802b45f9d7f22ba5021e9c47576b5a1e68031ba9db4e6dabe4d96a1d6f3d267268cff408005f118efcadb99888d1c234467166b2a2b849a05a889c060ac0da0c5fae8b55f309ba62e703742fa0326f2d10b011021489ff497770190d895fd39f52293c39efd73a698bdab9f10ed9":int:16:char*:"010001":exp:0:hex:"af71a901e3a61d3132f0fc1fdb474f9ea6579257ffc24d164170145b3dbde8":char*:"44c92e283f77b9499c603d963660c87d2f939461":hex:"036046a4a47d9ed3ba9a89139c105038eb7492b05a5d68bfd53accff4597f7a68651b47b4a4627d927e485eed7b4566420e8b409879e5d606eae251d22a5df799f7920bfc117b992572a53b1263146bcea03385cc5e853c9a101c8c3e1bda31a519807496c6cb5e5efb408823a352b8fa0661fb664efadd593deb99fff5ed000e5":int:0
RSAES-OAEP Decryption Example 5_2
1:int:1028:int:16:char*:"03b0d3962f6d17549cbfca11294348dcf0e7e39f8c2bc6824f2164b606d687860dae1e632393cfedf513228229069e2f60e4acd7e633a436063f82385f48993707":int:16:char*:"02e4c32e2f517269b7072309f00c0e31365f7ce28b236b82912df239abf39572cf0ed604b02982e53564c52d6a05397de5c052a2fddc141ef7189836346aeb331f":int:16:char*:"0aadf3f9c125e5d891f31ac448e993defe580f802b45f9d7f22ba5021e9c47576b5a1e68031ba9db4e6dabe4d96a1d6f3d267268cff408005f118efcadb99888d1c234467166b2a2b849a05a889c060ac0da0c5fae8b55f309ba62e703742fa0326f2d10b011021489ff497770190d895fd39f52293c39efd73a698bdab9f10ed9":int:16:char*:"010001":exp:0:hex:"a3b844a08239a8ac41605af17a6cfda4d350136585903a417a79268760519a4b4ac3303ec73f0f87cfb32399":char*:"cb28f5860659fceee49c3eeafce625a70803bd32":hex:"03d6eb654edce615bc59f455265ed4e5a18223cbb9be4e4069b473804d5de96f54dcaaa603d049c5d94aa1470dfcd2254066b7c7b61ff1f6f6770e3215c51399fd4e34ec5082bc48f089840ad04354ae66dc0f1bd18e461a33cc1258b443a2837a6df26759aa2302334986f87380c9cc9d53be9f99605d2c9a97da7b0915a4a7ad":int:0
RSAES-OAEP Decryption Example 5_3
1:int:1028:int:16:char*:"03b0d3962f6d17549cbfca11294348dcf0e7e39f8c2bc6824f2164b606d687860dae1e632393cfedf513228229069e2f60e4acd7e633a436063f82385f48993707":int:16:char*:"02e4c32e2f517269b7072309f00c0e31365f7ce28b236b82912df239abf39572cf0ed604b02982e53564c52d6a05397de5c052a2fddc141ef7189836346aeb331f":int:16:char*:"0aadf3f9c125e5d891f31ac448e993defe580f802b45f9d7f22ba5021e9c47576b5a1e68031ba9db4e6dabe4d96a1d6f3d267268cff408005f118efcadb99888d1c234467166b2a2b849a05a889c060ac0da0c5fae8b55f309ba62e703742fa0326f2d10b011021489ff497770190d895fd39f52293c39efd73a698bdab9f10ed9":int:16:char*:"010001":exp:0:hex:"308b0ecbd2c76cb77fc6f70c5edd233fd2f20929d629f026953bb62a8f4a3a314bde195de85b5f816da2aab074d26cb6acddf323ae3b9c678ac3cf12fbdde7":char*:"2285f40d770482f9a9efa2c72cb3ac55716dc0ca":hex:"0770952181649f9f9f07ff626ff3a22c35c462443d905d456a9fd0bff43cac2ca7a9f554e9478b9acc3ac838b02040ffd3e1847de2e4253929f9dd9ee4044325a9b05cabb808b2ee840d34e15d105a3f1f7b27695a1a07a2d73fe08ecaaa3c9c9d4d5a89ff890d54727d7ae40c0ec1a8dd86165d8ee2c6368141016a48b55b6967":int:0
RSAES-OAEP Decryption Example 5_4
1:int:1028:int:16:char*:"03b0d3962f6d17549cbfca11294348dcf0e7e39f8c2bc6824f2164b606d687860dae1e632393cfedf513228229069e2f60e4acd7e633a436063f82385f48993707":int:16:char*:"02e4c32e2f517269b7072309f00c0e31365f7ce28b236b82912df239abf39572cf0ed604b02982e53564c52d6a05397de5c052a2fddc141ef7189836346aeb331f":int:16:char*:"0aadf3f9c125e5d891f31ac448e993defe580f802b45f9d7f22ba5021e9c47576b5a1e68031ba9db4e6dabe4d96a1d6f3d267268cff408005f118efcadb99888d1c234467166b2a2b849a05a889c060ac0da0c5fae8b55f309ba62e703742fa0326f2d10b011021489ff497770190d895fd39f52293c39efd73a698bdab9f10ed9":int:16:char*:"010001":exp:0:hex:"15c5b9ee1185":char*:"49fa45d3a78dd10dfd577399d1eb00af7eed5513":hex:"0812b76768ebcb642d040258e5f4441a018521bd96687e6c5e899fcd6c17588ff59a82cc8ae03a4b45b31299af1788c329f7dcd285f8cf4ced82606b97612671a45bedca133442144d1617d114f802857f0f9d739751c57a3f9ee400912c61e2e6992be031a43dd48fa6ba14eef7c422b5edc4e7afa04fdd38f402d1c8bb719abf":int:0
RSAES-OAEP Decryption Example 5_5
1:int:1028:int:16:char*:"03b0d3962f6d17549cbfca11294348dcf0e7e39f8c2bc6824f2164b606d687860dae1e632393cfedf513228229069e2f60e4acd7e633a436063f82385f48993707":int:16:char*:"02e4c32e2f517269b7072309f00c0e31365f7ce28b236b82912df239abf39572cf0ed604b02982e53564c52d6a05397de5c052a2fddc141ef7189836346aeb331f":int:16:char*:"0aadf3f9c125e5d891f31ac448e993defe580f802b45f9d7f22ba5021e9c47576b5a1e68031ba9db4e6dabe4d96a1d6f3d267268cff408005f118efcadb99888d1c234467166b2a2b849a05a889c060ac0da0c5fae8b55f309ba62e703742fa0326f2d10b011021489ff497770190d895fd39f52293c39efd73a698bdab9f10ed9":int:16:char*:"010001":exp:0:hex:"21026e6800c7fa728fcaaba0d196ae28d7a2ac4ffd8abce794f0985f60c8a6737277365d3fea11db8923a2029a":char*:"f0287413234cc5034724a094c4586b87aff133fc":hex:"07b60e14ec954bfd29e60d0047e789f51d57186c63589903306793ced3f68241c743529aba6a6374f92e19e0163efa33697e196f7661dfaaa47aac6bde5e51deb507c72c589a2ca1693d96b1460381249b2cdb9eac44769f2489c5d3d2f99f0ee3c7ee5bf64a5ac79c42bd433f149be8cb59548361640595513c97af7bc2509723":int:0
RSAES-OAEP Decryption Example 5_6
1:int:1028:int:16:char*:"03b0d3962f6d17549cbfca11294348dcf0e7e39f8c2bc6824f2164b606d687860dae1e632393cfedf513228229069e2f60e4acd7e633a436063f82385f48993707":int:16:char*:"02e4c32e2f517269b7072309f00c0e31365f7ce28b236b82912df239abf39572cf0ed604b02982e53564c52d6a05397de5c052a2fddc141ef7189836346aeb331f":int:16:char*:"0aadf3f9c125e5d891f31ac448e993defe580f802b45f9d7f22ba5021e9c47576b5a1e68031ba9db4e6dabe4d96a1d6f3d267268cff408005f118efcadb99888d1c234467166b2a2b849a05a889c060ac0da0c5fae8b55f309ba62e703742fa0326f2d10b011021489ff497770190d895fd39f52293c39efd73a698bdab9f10ed9":int:16:char*:"010001":exp:0:hex:"541e37b68b6c8872b84c02":char*:"d9fba45c96f21e6e26d29eb2cdcb6585be9cb341":hex:"08c36d4dda33423b2ed6830d85f6411ba1dcf470a1fae0ebefee7c089f256cef74cb96ea69c38f60f39abee44129bcb4c92de7f797623b20074e3d9c2899701ed9071e1efa0bdd84d4c3e5130302d8f0240baba4b84a71cc032f2235a5ff0fae277c3e8f9112bef44c9ae20d175fc9a4058bfc930ba31b02e2e4f444483710f24a":int:0
RSAES-OAEP Decryption Example 6_1
1:int:1029:int:16:char*:"04a6ce8b7358dfa69bdcf742617005afb5385f5f3a58a24ef74a22a8c05cb7cc38ebd4cc9d9a9d789a62cd0f60f0cb941d3423c9692efa4fe3adff290c4749a38b":int:16:char*:"0404c9a803371fedb4c5be39f3c00b009e5e08a63be1e40035cdaca5011cc701cf7eebcb99f0ffe17cfd0a4bf7befd2dd536ac946db797fdbc4abe8f29349b91ed":int:16:char*:"12b17f6dad2ecd19ff46dc13f7860f09e0e0cfb677b38a52592305ceaf022c166db90d04ac29e33f7dd12d9faf66e0816bb63ead267cc7d46c17c37be214bca2a22d723a64e44407436b6fc965729aefc2554f376cd5dcea68293780a62bf39d0029485a160bbb9e5dc0972d21a504f52e5ee028aa416332f510b2e9cff5f722af":int:16:char*:"010001":exp:0:hex:"4046ca8baa3347ca27f49e0d81f9cc1d71be9ba517d4":char*:"dd0f6cfe415e88e5a469a51fbba6dfd40adb4384":hex:"0630eebcd2856c24f798806e41f9e67345eda9ceda386acc9facaea1eeed06ace583709718d9d169fadf414d5c76f92996833ef305b75b1e4b95f662a20faedc3bae0c4827a8bf8a88edbd57ec203a27a841f02e43a615bab1a8cac0701de34debdef62a088089b55ec36ea7522fd3ec8d06b6a073e6df833153bc0aefd93bd1a3":int:0
RSAES-OAEP Decryption Example 6_2
1:int:1029:int:16:char*:"04a6ce8b7358dfa69bdcf742617005afb5385f5f3a58a24ef74a22a8c05cb7cc38ebd4cc9d9a9d789a62cd0f60f0cb941d3423c9692efa4fe3adff290c4749a38b":int:16:char*:"0404c9a803371fedb4c5be39f3c00b009e5e08a63be1e40035cdaca5011cc701cf7eebcb99f0ffe17cfd0a4bf7befd2dd536ac946db797fdbc4abe8f29349b91ed":int:16:char*:"12b17f6dad2ecd19ff46dc13f7860f09e0e0cfb677b38a52592305ceaf022c166db90d04ac29e33f7dd12d9faf66e0816bb63ead267cc7d46c17c37be214bca2a22d723a64e44407436b6fc965729aefc2554f376cd5dcea68293780a62bf39d0029485a160bbb9e5dc0972d21a504f52e5ee028aa416332f510b2e9cff5f722af":int:16:char*:"010001":exp:0:hex:"5cc72c60231df03b3d40f9b57931bc31109f972527f28b19e7480c7288cb3c92b22512214e4be6c914792ddabdf57faa8aa7":char*:"8d14bd946a1351148f5cae2ed9a0c653e85ebd85":hex:"0ebc37376173a4fd2f89cc55c2ca62b26b11d51c3c7ce49e8845f74e7607317c436bc8d23b9667dfeb9d087234b47bc6837175ae5c0559f6b81d7d22416d3e50f4ac533d8f0812f2db9e791fe9c775ac8b6ad0f535ad9ceb23a4a02014c58ab3f8d3161499a260f39348e714ae2a1d3443208fd8b722ccfdfb393e98011f99e63f":int:0
RSAES-OAEP Decryption Example 6_3
1:int:1029:int:16:char*:"04a6ce8b7358dfa69bdcf742617005afb5385f5f3a58a24ef74a22a8c05cb7cc38ebd4cc9d9a9d789a62cd0f60f0cb941d3423c9692efa4fe3adff290c4749a38b":int:16:char*:"0404c9a803371fedb4c5be39f3c00b009e5e08a63be1e40035cdaca5011cc701cf7eebcb99f0ffe17cfd0a4bf7befd2dd536ac946db797fdbc4abe8f29349b91ed":int:16:char*:"12b17f6dad2ecd19ff46dc13f7860f09e0e0cfb677b38a52592305ceaf022c166db90d04ac29e33f7dd12d9faf66e0816bb63ead267cc7d46c17c37be214bca2a22d723a64e44407436b6fc965729aefc2554f376cd5dcea68293780a62bf39d0029485a160bbb9e5dc0972d21a504f52e5ee028aa416332f510b2e9cff5f722af":int:16:char*:"010001":exp:0:hex:"b20e651303092f4bccb43070c0f86d23049362ed96642fc5632c27db4a52e3d831f2ab068b23b149879c002f6bf3feee97591112562c":char*:"6c075bc45520f165c0bf5ea4c5df191bc9ef0e44":hex:"0a98bf1093619394436cf68d8f38e2f158fde8ea54f3435f239b8d06b8321844202476aeed96009492480ce3a8d705498c4c8c68f01501dc81db608f60087350c8c3b0bd2e9ef6a81458b7c801b89f2e4fe99d4900ba6a4b5e5a96d865dc676c7755928794130d6280a8160a190f2df3ea7cf9aa0271d88e9e6905ecf1c5152d65":int:0
RSAES-OAEP Decryption Example 6_4
1:int:1029:int:16:char*:"04a6ce8b7358dfa69bdcf742617005afb5385f5f3a58a24ef74a22a8c05cb7cc38ebd4cc9d9a9d789a62cd0f60f0cb941d3423c9692efa4fe3adff290c4749a38b":int:16:char*:"0404c9a803371fedb4c5be39f3c00b009e5e08a63be1e40035cdaca5011cc701cf7eebcb99f0ffe17cfd0a4bf7befd2dd536ac946db797fdbc4abe8f29349b91ed":int:16:char*:"12b17f6dad2ecd19ff46dc13f7860f09e0e0cfb677b38a52592305ceaf022c166db90d04ac29e33f7dd12d9faf66e0816bb63ead267cc7d46c17c37be214bca2a22d723a64e44407436b6fc965729aefc2554f376cd5dcea68293780a62bf39d0029485a160bbb9e5dc0972d21a504f52e5ee028aa416332f510b2e9cff5f722af":int:16:char*:"010001":exp:0:hex:"684e3038c5c041f7":char*:"3bbc3bd6637dfe12846901029bf5b0c07103439c":hex:"008e7a67cacfb5c4e24bec7dee149117f19598ce8c45808fef88c608ff9cd6e695263b9a3c0ad4b8ba4c95238e96a8422b8535629c8d5382374479ad13fa39974b242f9a759eeaf9c83ad5a8ca18940a0162ba755876df263f4bd50c6525c56090267c1f0e09ce0899a0cf359e88120abd9bf893445b3cae77d3607359ae9a52f8":int:0
RSAES-OAEP Decryption Example 6_5
1:int:1029:int:16:char*:"04a6ce8b7358dfa69bdcf742617005afb5385f5f3a58a24ef74a22a8c05cb7cc38ebd4cc9d9a9d789a62cd0f60f0cb941d3423c9692efa4fe3adff290c4749a38b":int:16:char*:"0404c9a803371fedb4c5be39f3c00b009e5e08a63be1e40035cdaca5011cc701cf7eebcb99f0ffe17cfd0a4bf7befd2dd536ac946db797fdbc4abe8f29349b91ed":int:16:char*:"12b17f6dad2ecd19ff46dc13f7860f09e0e0cfb677b38a52592305ceaf022c166db90d04ac29e33f7dd12d9faf66e0816bb63ead267cc7d46c17c37be214bca2a22d723a64e44407436b6fc965729aefc2554f376cd5dcea68293780a62bf39d0029485a160bbb9e5dc0972d21a504f52e5ee028aa416332f510b2e9cff5f722af":int:16:char*:"010001":exp:0:hex:"32488cb262d041d6e4dd35f987bf3ca696db1f06ac29a44693":char*:"b46b41893e8bef326f6759383a83071dae7fcabc":hex:"00003474416c7b68bdf961c385737944d7f1f40cb395343c693cc0b4fe63b31fedf1eaeeac9ccc0678b31dc32e0977489514c4f09085f6298a9653f01aea4045ff582ee887be26ae575b73eef7f3774921e375a3d19adda0ca31aa1849887c1f42cac9677f7a2f4e923f6e5a868b38c084ef187594dc9f7f048fea2e02955384ab":int:0
RSAES-OAEP Decryption Example 6_6
1:int:1029:int:16:char*:"04a6ce8b7358dfa69bdcf742617005afb5385f5f3a58a24ef74a22a8c05cb7cc38ebd4cc9d9a9d789a62cd0f60f0cb941d3423c9692efa4fe3adff290c4749a38b":int:16:char*:"0404c9a803371fedb4c5be39f3c00b009e5e08a63be1e40035cdaca5011cc701cf7eebcb99f0ffe17cfd0a4bf7befd2dd536ac946db797fdbc4abe8f29349b91ed":int:16:char*:"12b17f6dad2ecd19ff46dc13f7860f09e0e0cfb677b38a52592305ceaf022c166db90d04ac29e33f7dd12d9faf66e0816bb63ead267cc7d46c17c37be214bca2a22d723a64e44407436b6fc965729aefc2554f376cd5dcea68293780a62bf39d0029485a160bbb9e5dc0972d21a504f52e5ee028aa416332f510b2e9cff5f722af":int:16:char*:"010001":exp:0:hex:"50ba14be8462720279c306ba":char*:"0a2403312a41e3d52f060fbc13a67de5cf7609a7":hex:"0a026dda5fc8785f7bd9bf75327b63e85e2c0fdee5dadb65ebdcac9ae1de95c92c672ab433aa7a8e69ce6a6d8897fac4ac4a54de841ae5e5bbce7687879d79634cea7a30684065c714d52409b928256bbf53eabcd5231eb7259504537399bd29164b726d33a46da701360a4168a091ccab72d44a62fed246c0ffea5b1348ab5470":int:0
RSAES-OAEP Decryption Example 7_1
1:int:1030:int:16:char*:"0749262c111cd470ec2566e6b3732fc09329469aa19071d3b9c01906514c6f1d26baa14beab0971c8b7e611a4f79009d6fea776928ca25285b0de3643d1a3f8c71":int:16:char*:"06bc1e50e96c02bf636e9eea8b899bbebf7651de77dd474c3e9bc23bad8182b61904c7d97dfbebfb1e00108878b6e67e415391d67942c2b2bf9b4435f88b0cb023":int:16:char*:"311179f0bcfc9b9d3ca315d00ef30d7bdd3a2cfae9911bfedcb948b3a4782d0732b6ab44aa4bf03741a644dc01bec3e69b01a033e675d8acd7c4925c6b1aec3119051dfd89762d215d45475ffcb59f908148623f37177156f6ae86dd7a7c5f43dc1e1f908254058a284a5f06c0021793a87f1ac5feff7dcaee69c5e51a3789e373":int:16:char*:"010001":exp:0:hex:"47aae909":char*:"43dd09a07ff4cac71caa4632ee5e1c1daee4cd8f":hex:"1688e4ce7794bba6cb7014169ecd559cede2a30b56a52b68d9fe18cf1973ef97b2a03153951c755f6294aa49adbdb55845ab6875fb3986c93ecf927962840d282f9e54ce8b690f7c0cb8bbd73440d9571d1b16cd9260f9eab4783cc482e5223dc60973871783ec27b0ae0fd47732cbc286a173fc92b00fb4ba6824647cd93c85c1":int:0
RSAES-OAEP Decryption Example 7_2
1:int:1030:int:16:char*:"0749262c111cd470ec2566e6b3732fc09329469aa19071d3b9c01906514c6f1d26baa14beab0971c8b7e611a4f79009d6fea776928ca25285b0de3643d1a3f8c71":int:16:char*:"06bc1e50e96c02bf636e9eea8b899bbebf7651de77dd474c3e9bc23bad8182b61904c7d97dfbebfb1e00108878b6e67e415391d67942c2b2bf9b4435f88b0cb023":int:16:char*:"311179f0bcfc9b9d3ca315d00ef30d7bdd3a2cfae9911bfedcb948b3a4782d0732b6ab44aa4bf03741a644dc01bec3e69b01a033e675d8acd7c4925c6b1aec3119051dfd89762d215d45475ffcb59f908148623f37177156f6ae86dd7a7c5f43dc1e1f908254058a284a5f06c0021793a87f1ac5feff7dcaee69c5e51a3789e373":int:16:char*:"010001":exp:0:hex:"1d9b2e2223d9bc13bfb9f162ce735db48ba7c68f6822a0a1a7b6ae165834e7":char*:"3a9c3cec7b84f9bd3adecbc673ec99d54b22bc9b":hex:"1052ed397b2e01e1d0ee1c50bf24363f95e504f4a03434a08fd822574ed6b9736edbb5f390db10321479a8a139350e2bd4977c3778ef331f3e78ae118b268451f20a2f01d471f5d53c566937171b2dbc2d4bde459a5799f0372d6574239b2323d245d0bb81c286b63c89a361017337e4902f88a467f4c7f244bfd5ab46437ff3b6":int:0
RSAES-OAEP Decryption Example 7_3
1:int:1030:int:16:char*:"0749262c111cd470ec2566e6b3732fc09329469aa19071d3b9c01906514c6f1d26baa14beab0971c8b7e611a4f79009d6fea776928ca25285b0de3643d1a3f8c71":int:16:char*:"06bc1e50e96c02bf636e9eea8b899bbebf7651de77dd474c3e9bc23bad8182b61904c7d97dfbebfb1e00108878b6e67e415391d67942c2b2bf9b4435f88b0cb023":int:16:char*:"311179f0bcfc9b9d3ca315d00ef30d7bdd3a2cfae9911bfedcb948b3a4782d0732b6ab44aa4bf03741a644dc01bec3e69b01a033e675d8acd7c4925c6b1aec3119051dfd89762d215d45475ffcb59f908148623f37177156f6ae86dd7a7c5f43dc1e1f908254058a284a5f06c0021793a87f1ac5feff7dcaee69c5e51a3789e373":int:16:char*:"010001":exp:0:hex:"d976fc":char*:"76a75e5b6157a556cf8884bb2e45c293dd545cf5":hex:"2155cd843ff24a4ee8badb7694260028a490813ba8b369a4cbf106ec148e5298707f5965be7d101c1049ea8584c24cd63455ad9c104d686282d3fb803a4c11c1c2e9b91c7178801d1b6640f003f5728df007b8a4ccc92bce05e41a27278d7c85018c52414313a5077789001d4f01910b72aad05d220aa14a58733a7489bc54556b":int:0
RSAES-OAEP Decryption Example 7_4
1:int:1030:int:16:char*:"0749262c111cd470ec2566e6b3732fc09329469aa19071d3b9c01906514c6f1d26baa14beab0971c8b7e611a4f79009d6fea776928ca25285b0de3643d1a3f8c71":int:16:char*:"06bc1e50e96c02bf636e9eea8b899bbebf7651de77dd474c3e9bc23bad8182b61904c7d97dfbebfb1e00108878b6e67e415391d67942c2b2bf9b4435f88b0cb023":int:16:char*:"311179f0bcfc9b9d3ca315d00ef30d7bdd3a2cfae9911bfedcb948b3a4782d0732b6ab44aa4bf03741a644dc01bec3e69b01a033e675d8acd7c4925c6b1aec3119051dfd89762d215d45475ffcb59f908148623f37177156f6ae86dd7a7c5f43dc1e1f908254058a284a5f06c0021793a87f1ac5feff7dcaee69c5e51a3789e373":int:16:char*:"010001":exp:0:hex:"d4738623df223aa43843df8467534c41d013e0c803c624e263666b239bde40a5f29aeb8de79e3daa61dd0370f49bd4b013834b98212aef6b1c5ee373b3cb":char*:"7866314a6ad6f2b250a35941db28f5864b585859":hex:"0ab14c373aeb7d4328d0aaad8c094d88b9eb098b95f21054a29082522be7c27a312878b637917e3d819e6c3c568db5d843802b06d51d9e98a2be0bf40c031423b00edfbff8320efb9171bd2044653a4cb9c5122f6c65e83cda2ec3c126027a9c1a56ba874d0fea23f380b82cf240b8cf540004758c4c77d934157a74f3fc12bfac":int:0
RSAES-OAEP Decryption Example 7_5
1:int:1030:int:16:char*:"0749262c111cd470ec2566e6b3732fc09329469aa19071d3b9c01906514c6f1d26baa14beab0971c8b7e611a4f79009d6fea776928ca25285b0de3643d1a3f8c71":int:16:char*:"06bc1e50e96c02bf636e9eea8b899bbebf7651de77dd474c3e9bc23bad8182b61904c7d97dfbebfb1e00108878b6e67e415391d67942c2b2bf9b4435f88b0cb023":int:16:char*:"311179f0bcfc9b9d3ca315d00ef30d7bdd3a2cfae9911bfedcb948b3a4782d0732b6ab44aa4bf03741a644dc01bec3e69b01a033e675d8acd7c4925c6b1aec3119051dfd89762d215d45475ffcb59f908148623f37177156f6ae86dd7a7c5f43dc1e1f908254058a284a5f06c0021793a87f1ac5feff7dcaee69c5e51a3789e373":int:16:char*:"010001":exp:0:hex:"bb47231ca5ea1d3ad46c99345d9a8a61":char*:"b2166ed472d58db10cab2c6b000cccf10a7dc509":hex:"028387a318277434798b4d97f460068df5298faba5041ba11761a1cb7316b24184114ec500257e2589ed3b607a1ebbe97a6cc2e02bf1b681f42312a33b7a77d8e7855c4a6de03e3c04643f786b91a264a0d6805e2cea91e68177eb7a64d9255e4f27e713b7ccec00dc200ebd21c2ea2bb890feae4942df941dc3f97890ed347478":int:0
RSAES-OAEP Decryption Example 7_6
1:int:1030:int:16:char*:"0749262c111cd470ec2566e6b3732fc09329469aa19071d3b9c01906514c6f1d26baa14beab0971c8b7e611a4f79009d6fea776928ca25285b0de3643d1a3f8c71":int:16:char*:"06bc1e50e96c02bf636e9eea8b899bbebf7651de77dd474c3e9bc23bad8182b61904c7d97dfbebfb1e00108878b6e67e415391d67942c2b2bf9b4435f88b0cb023":int:16:char*:"311179f0bcfc9b9d3ca315d00ef30d7bdd3a2cfae9911bfedcb948b3a4782d0732b6ab44aa4bf03741a644dc01bec3e69b01a033e675d8acd7c4925c6b1aec3119051dfd89762d215d45475ffcb59f908148623f37177156f6ae86dd7a7c5f43dc1e1f908254058a284a5f06c0021793a87f1ac5feff7dcaee69c5e51a3789e373":int:16:char*:"010001":exp:0:hex:"2184827095d35c3f86f600e8e59754013296":char*:"52673bde2ca166c2aa46131ac1dc808d67d7d3b1":hex:"14c678a94ad60525ef39e959b2f3ba5c097a94ff912b67dbace80535c187abd47d075420b1872152bba08f7fc31f313bbf9273c912fc4c0149a9b0cfb79807e346eb332069611bec0ff9bcd168f1f7c33e77313cea454b94e2549eecf002e2acf7f6f2d2845d4fe0aab2e5a92ddf68c480ae11247935d1f62574842216ae674115":int:0
RSAES-OAEP Decryption Example 8_1
1:int:1031:int:16:char*:"0a02ef8448d9fad8bbd0d004c8c2aa9751ef9721c1b0d03236a54b0df947cbaed5a255ee9e8e20d491ea1723fe094704a9762e88afd16ebb5994412ca966dc4f9f":int:16:char*:"092d362e7ed3a0bfd9e9fd0e6c0301b6df29159cf50cc83b9b0cf4d6eea71a61e002b46e0ae9f2de62d25b5d7452d498b81c9ac6fc58593d4c3fb4f5d72dfbb0a9":int:16:char*:"5bdf0e30d321dda5147f882408fa69195480df8f80d3f6e8bf5818504f36427ca9b1f5540b9c65a8f6974cf8447a244d9280201bb49fcbbe6378d1944cd227e230f96e3d10f819dcef276c64a00b2a4b6701e7d01de5fabde3b1e9a0df82f4631359cd22669647fbb1717246134ed7b497cfffbdc42b59c73a96ed90166212dff7":int:16:char*:"010001":exp:0:hex:"050b755e5e6880f7b9e9d692a74c37aae449b31bfea6deff83747a897f6c2c825bb1adbf850a3c96994b5de5b33cbc7d4a17913a7967":char*:"7706ffca1ecfb1ebee2a55e5c6e24cd2797a4125":hex:"09b3683d8a2eb0fb295b62ed1fb9290b714457b7825319f4647872af889b30409472020ad12912bf19b11d4819f49614824ffd84d09c0a17e7d17309d12919790410aa2995699f6a86dbe3242b5acc23af45691080d6b1ae810fb3e3057087f0970092ce00be9562ff4053b6262ce0caa93e13723d2e3a5ba075d45f0d61b54b61":int:0
RSAES-OAEP Decryption Example 8_2
1:int:1031:int:16:char*:"0a02ef8448d9fad8bbd0d004c8c2aa9751ef9721c1b0d03236a54b0df947cbaed5a255ee9e8e20d491ea1723fe094704a9762e88afd16ebb5994412ca966dc4f9f":int:16:char*:"092d362e7ed3a0bfd9e9fd0e6c0301b6df29159cf50cc83b9b0cf4d6eea71a61e002b46e0ae9f2de62d25b5d7452d498b81c9ac6fc58593d4c3fb4f5d72dfbb0a9":int:16:char*:"5bdf0e30d321dda5147f882408fa69195480df8f80d3f6e8bf5818504f36427ca9b1f5540b9c65a8f6974cf8447a244d9280201bb49fcbbe6378d1944cd227e230f96e3d10f819dcef276c64a00b2a4b6701e7d01de5fabde3b1e9a0df82f4631359cd22669647fbb1717246134ed7b497cfffbdc42b59c73a96ed90166212dff7":int:16:char*:"010001":exp:0:hex:"4eb68dcd93ca9b19df111bd43608f557026fe4aa1d5cfac227a3eb5ab9548c18a06dded23f81825986b2fcd71109ecef7eff88873f075c2aa0c469f69c92bc":char*:"a3717da143b4dcffbc742665a8fa950585548343":hex:"2ecf15c97c5a15b1476ae986b371b57a24284f4a162a8d0c8182e7905e792256f1812ba5f83f1f7a130e42dcc02232844edc14a31a68ee97ae564a383a3411656424c5f62ddb646093c367be1fcda426cf00a06d8acb7e57776fbbd855ac3df506fc16b1d7c3f2110f3d8068e91e186363831c8409680d8da9ecd8cf1fa20ee39d":int:0
RSAES-OAEP Decryption Example 8_3
1:int:1031:int:16:char*:"0a02ef8448d9fad8bbd0d004c8c2aa9751ef9721c1b0d03236a54b0df947cbaed5a255ee9e8e20d491ea1723fe094704a9762e88afd16ebb5994412ca966dc4f9f":int:16:char*:"092d362e7ed3a0bfd9e9fd0e6c0301b6df29159cf50cc83b9b0cf4d6eea71a61e002b46e0ae9f2de62d25b5d7452d498b81c9ac6fc58593d4c3fb4f5d72dfbb0a9":int:16:char*:"5bdf0e30d321dda5147f882408fa69195480df8f80d3f6e8bf5818504f36427ca9b1f5540b9c65a8f6974cf8447a244d9280201bb49fcbbe6378d1944cd227e230f96e3d10f819dcef276c64a00b2a4b6701e7d01de5fabde3b1e9a0df82f4631359cd22669647fbb1717246134ed7b497cfffbdc42b59c73a96ed90166212dff7":int:16:char*:"010001":exp:0:hex:"8604ac56328c1ab5ad917861":char*:"ee06209073cca026bb264e5185bf8c68b7739f86":hex:"4bc89130a5b2dabb7c2fcf90eb5d0eaf9e681b7146a38f3173a3d9cfec52ea9e0a41932e648a9d69344c50da763f51a03c95762131e8052254dcd2248cba40fd31667786ce05a2b7b531ac9dac9ed584a59b677c1a8aed8c5d15d68c05569e2be780bf7db638fd2bfd2a85ab276860f3777338fca989ffd743d13ee08e0ca9893f":int:0
RSAES-OAEP Decryption Example 8_4
1:int:1031:int:16:char*:"0a02ef8448d9fad8bbd0d004c8c2aa9751ef9721c1b0d03236a54b0df947cbaed5a255ee9e8e20d491ea1723fe094704a9762e88afd16ebb5994412ca966dc4f9f":int:16:char*:"092d362e7ed3a0bfd9e9fd0e6c0301b6df29159cf50cc83b9b0cf4d6eea71a61e002b46e0ae9f2de62d25b5d7452d498b81c9ac6fc58593d4c3fb4f5d72dfbb0a9":int:16:char*:"5bdf0e30d321dda5147f882408fa69195480df8f80d3f6e8bf5818504f36427ca9b1f5540b9c65a8f6974cf8447a244d9280201bb49fcbbe6378d1944cd227e230f96e3d10f819dcef276c64a00b2a4b6701e7d01de5fabde3b1e9a0df82f4631359cd22669647fbb1717246134ed7b497cfffbdc42b59c73a96ed90166212dff7":int:16:char*:"010001":exp:0:hex:"fdda5fbf6ec361a9d9a4ac68af216a0686f438b1e0e5c36b955f74e107f39c0dddcc":char*:"990ad573dc48a973235b6d82543618f2e955105d":hex:"2e456847d8fc36ff0147d6993594b9397227d577752c79d0f904fcb039d4d812fea605a7b574dd82ca786f93752348438ee9f5b5454985d5f0e1699e3e7ad175a32e15f03deb042ab9fe1dd9db1bb86f8c089ccb45e7ef0c5ee7ca9b7290ca6b15bed47039788a8a93ff83e0e8d6244c71006362deef69b6f416fb3c684383fbd0":int:0
RSAES-OAEP Decryption Example 8_5
1:int:1031:int:16:char*:"0a02ef8448d9fad8bbd0d004c8c2aa9751ef9721c1b0d03236a54b0df947cbaed5a255ee9e8e20d491ea1723fe094704a9762e88afd16ebb5994412ca966dc4f9f":int:16:char*:"092d362e7ed3a0bfd9e9fd0e6c0301b6df29159cf50cc83b9b0cf4d6eea71a61e002b46e0ae9f2de62d25b5d7452d498b81c9ac6fc58593d4c3fb4f5d72dfbb0a9":int:16:char*:"5bdf0e30d321dda5147f882408fa69195480df8f80d3f6e8bf5818504f36427ca9b1f5540b9c65a8f6974cf8447a244d9280201bb49fcbbe6378d1944cd227e230f96e3d10f819dcef276c64a00b2a4b6701e7d01de5fabde3b1e9a0df82f4631359cd22669647fbb1717246134ed7b497cfffbdc42b59c73a96ed90166212dff7":int:16:char*:"010001":exp:0:hex:"4a5f4914bee25de3c69341de07":char*:"ecc63b28f0756f22f52ac8e6ec1251a6ec304718":hex:"1fb9356fd5c4b1796db2ebf7d0d393cc810adf6145defc2fce714f79d93800d5e2ac211ea8bbecca4b654b94c3b18b30dd576ce34dc95436ef57a09415645923359a5d7b4171ef22c24670f1b229d3603e91f76671b7df97e7317c97734476d5f3d17d21cf82b5ba9f83df2e588d36984fd1b584468bd23b2e875f32f68953f7b2":int:0
RSAES-OAEP Decryption Example 8_6
1:int:1031:int:16:char*:"0a02ef8448d9fad8bbd0d004c8c2aa9751ef9721c1b0d03236a54b0df947cbaed5a255ee9e8e20d491ea1723fe094704a9762e88afd16ebb5994412ca966dc4f9f":int:16:char*:"092d362e7ed3a0bfd9e9fd0e6c0301b6df29159cf50cc83b9b0cf4d6eea71a61e002b46e0ae9f2de62d25b5d7452d498b81c9ac6fc58593d4c3fb4f5d72dfbb0a9":int:16:char*:"5bdf0e30d321dda5147f882408fa69195480df8f80d3f6e8bf5818504f36427ca9b1f5540b9c65a8f6974cf8447a244d9280201bb49fcbbe6378d1944cd227e230f96e3d10f819dcef276c64a00b2a4b6701e7d01de5fabde3b1e9a0df82f4631359cd22669647fbb1717246134ed7b497cfffbdc42b59c73a96ed90166212dff7":int:16:char*:"010001":exp:0:hex:"8e07d66f7b880a72563abcd3f35092bc33409fb7f88f2472be":char*:"3925c71b362d40a0a6de42145579ba1e7dd459fc":hex:"3afd9c6600147b21798d818c655a0f4c9212db26d0b0dfdc2a7594ccb3d22f5bf1d7c3e112cd73fc7d509c7a8bafdd3c274d1399009f9609ec4be6477e453f075aa33db382870c1c3409aef392d7386ae3a696b99a94b4da0589447e955d16c98b17602a59bd736279fcd8fb280c4462d590bfa9bf13fed570eafde97330a2c210":int:0
RSAES-OAEP Decryption Example 9_1
1:int:1536:int:16:char*:"fc8d6c04bec4eb9a8192ca7900cbe536e2e8b519decf33b2459798c6909df4f176db7d23190fc72b8865a718af895f1bcd9145298027423b605e70a47cf58390a8c3e88fc8c48e8b32e3da210dfbe3e881ea5674b6a348c21e93f9e55ea65efd":int:16:char*:"d200d45e788aacea606a401d0460f87dd5c1027e12dc1a0d7586e8939d9cf789b40f51ac0442961de7d21cc21e05c83155c1f2aa9193387cfdf956cb48d153ba270406f9bbba537d4987d9e2f9942d7a14cbfffea74fecdda928d23e259f5ee1":int:16:char*:"cf2cd41e34ca3a728ea5cb8aff64c36d27bdef5364e336fd68d3123c5a196a8c287013e853d5156d58d151954520fb4f6d7b17abb6817765909c576119659d902b1906ed8a2b10c155c24d124528dab9eeae379beac66e4a411786dcb8fd0062ebc030de1219a04c2a8c1b7dd3131e4d6b6caee2e31a5ed41ac1509b2ef1ee2ab18364be568ca941c25ecc84ff9d643b5ec1aaae102a20d73f479b780fd6da91075212d9eac03a0674d899eba2e431f4c44b615b6ba2232bd4b33baed73d625d":int:16:char*:"010001":exp:0:hex:"f735fd55ba92592c3b52b8f9c4f69aaa1cbef8fe88add095595412467f9cf4ec0b896c59eda16210e7549c8abb10cdbc21a12ec9b6b5b8fd2f10399eb6":char*:"8ec965f134a3ec9931e92a1ca0dc8169d5ea705c":hex:"267bcd118acab1fc8ba81c85d73003cb8610fa55c1d97da8d48a7c7f06896a4db751aa284255b9d36ad65f37653d829f1b37f97b8001942545b2fc2c55a7376ca7a1be4b1760c8e05a33e5aa2526b8d98e317088e7834c755b2a59b12631a182c05d5d43ab1779264f8456f515ce57dfdf512d5493dab7b7338dc4b7d78db9c091ac3baf537a69fc7f549d979f0eff9a94fda4169bd4d1d19a69c99e33c3b55490d501b39b1edae118ff6793a153261584d3a5f39f6e682e3d17c8cd1261fa72":int:0
RSAES-OAEP Decryption Example 9_2
1:int:1536:int:16:char*:"fc8d6c04bec4eb9a8192ca7900cbe536e2e8b519decf33b2459798c6909df4f176db7d23190fc72b8865a718af895f1bcd9145298027423b605e70a47cf58390a8c3e88fc8c48e8b32e3da210dfbe3e881ea5674b6a348c21e93f9e55ea65efd":int:16:char*:"d200d45e788aacea606a401d0460f87dd5c1027e12dc1a0d7586e8939d9cf789b40f51ac0442961de7d21cc21e05c83155c1f2aa9193387cfdf956cb48d153ba270406f9bbba537d4987d9e2f9942d7a14cbfffea74fecdda928d23e259f5ee1":int:16:char*:"cf2cd41e34ca3a728ea5cb8aff64c36d27bdef5364e336fd68d3123c5a196a8c287013e853d5156d58d151954520fb4f6d7b17abb6817765909c576119659d902b1906ed8a2b10c155c24d124528dab9eeae379beac66e4a411786dcb8fd0062ebc030de1219a04c2a8c1b7dd3131e4d6b6caee2e31a5ed41ac1509b2ef1ee2ab18364be568ca941c25ecc84ff9d643b5ec1aaae102a20d73f479b780fd6da91075212d9eac03a0674d899eba2e431f4c44b615b6ba2232bd4b33baed73d625d":int:16:char*:"010001":exp:0:hex:"81b906605015a63aabe42ddf11e1978912f5404c7474b26dce3ed482bf961ecc818bf420c54659":char*:"ecb1b8b25fa50cdab08e56042867f4af5826d16c":hex:"93ac9f0671ec29acbb444effc1a5741351d60fdb0e393fbf754acf0de49761a14841df7772e9bc82773966a1584c4d72baea00118f83f35cca6e537cbd4d811f5583b29783d8a6d94cd31be70d6f526c10ff09c6fa7ce069795a3fcd0511fd5fcb564bcc80ea9c78f38b80012539d8a4ddf6fe81e9cddb7f50dbbbbcc7e5d86097ccf4ec49189fb8bf318be6d5a0715d516b49af191258cd32dc833ce6eb4673c03a19bbace88cc54895f636cc0c1ec89096d11ce235a265ca1764232a689ae8":int:0
RSAES-OAEP Decryption Example 9_3
1:int:1536:int:16:char*:"fc8d6c04bec4eb9a8192ca7900cbe536e2e8b519decf33b2459798c6909df4f176db7d23190fc72b8865a718af895f1bcd9145298027423b605e70a47cf58390a8c3e88fc8c48e8b32e3da210dfbe3e881ea5674b6a348c21e93f9e55ea65efd":int:16:char*:"d200d45e788aacea606a401d0460f87dd5c1027e12dc1a0d7586e8939d9cf789b40f51ac0442961de7d21cc21e05c83155c1f2aa9193387cfdf956cb48d153ba270406f9bbba537d4987d9e2f9942d7a14cbfffea74fecdda928d23e259f5ee1":int:16:char*:"cf2cd41e34ca3a728ea5cb8aff64c36d27bdef5364e336fd68d3123c5a196a8c287013e853d5156d58d151954520fb4f6d7b17abb6817765909c576119659d902b1906ed8a2b10c155c24d124528dab9eeae379beac66e4a411786dcb8fd0062ebc030de1219a04c2a8c1b7dd3131e4d6b6caee2e31a5ed41ac1509b2ef1ee2ab18364be568ca941c25ecc84ff9d643b5ec1aaae102a20d73f479b780fd6da91075212d9eac03a0674d899eba2e431f4c44b615b6ba2232bd4b33baed73d625d":int:16:char*:"010001":exp:0:hex:"fd326429df9b890e09b54b18b8f34f1e24":char*:"e89bb032c6ce622cbdb53bc9466014ea77f777c0":hex:"81ebdd95054b0c822ef9ad7693f5a87adfb4b4c4ce70df2df84ed49c04da58ba5fc20a19e1a6e8b7a3900b22796dc4e869ee6b42792d15a8eceb56c09c69914e813cea8f6931e4b8ed6f421af298d595c97f4789c7caa612c7ef360984c21b93edc5401068b5af4c78a8771b984d53b8ea8adf2f6a7d4a0ba76c75e1dd9f658f20ded4a46071d46d7791b56803d8fea7f0b0f8e41ae3f09383a6f9585fe7753eaaffd2bf94563108beecc207bbb535f5fcc705f0dde9f708c62f49a9c90371d3":int:0
RSAES-OAEP Decryption Example 9_4
1:int:1536:int:16:char*:"fc8d6c04bec4eb9a8192ca7900cbe536e2e8b519decf33b2459798c6909df4f176db7d23190fc72b8865a718af895f1bcd9145298027423b605e70a47cf58390a8c3e88fc8c48e8b32e3da210dfbe3e881ea5674b6a348c21e93f9e55ea65efd":int:16:char*:"d200d45e788aacea606a401d0460f87dd5c1027e12dc1a0d7586e8939d9cf789b40f51ac0442961de7d21cc21e05c83155c1f2aa9193387cfdf956cb48d153ba270406f9bbba537d4987d9e2f9942d7a14cbfffea74fecdda928d23e259f5ee1":int:16:char*:"cf2cd41e34ca3a728ea5cb8aff64c36d27bdef5364e336fd68d3123c5a196a8c287013e853d5156d58d151954520fb4f6d7b17abb6817765909c576119659d902b1906ed8a2b10c155c24d124528dab9eeae379beac66e4a411786dcb8fd0062ebc030de1219a04c2a8c1b7dd3131e4d6b6caee2e31a5ed41ac1509b2ef1ee2ab18364be568ca941c25ecc84ff9d643b5ec1aaae102a20d73f479b780fd6da91075212d9eac03a0674d899eba2e431f4c44b615b6ba2232bd4b33baed73d625d":int:16:char*:"010001":exp:0:hex:"f1459b5f0c92f01a0f723a2e5662484d8f8c0a20fc29dad6acd43bb5f3effdf4e1b63e07fdfe6628d0d74ca19bf2d69e4a0abf86d293925a796772f8088e":char*:"606f3b99c0b9ccd771eaa29ea0e4c884f3189ccc":hex:"bcc35f94cde66cb1136625d625b94432a35b22f3d2fa11a613ff0fca5bd57f87b902ccdc1cd0aebcb0715ee869d1d1fe395f6793003f5eca465059c88660d446ff5f0818552022557e38c08a67ead991262254f10682975ec56397768537f4977af6d5f6aaceb7fb25dec5937230231fd8978af49119a29f29e424ab8272b47562792d5c94f774b8829d0b0d9f1a8c9eddf37574d5fa248eefa9c5271fc5ec2579c81bdd61b410fa61fe36e424221c113addb275664c801d34ca8c6351e4a858":int:0
RSAES-OAEP Decryption Example 9_5
1:int:1536:int:16:char*:"fc8d6c04bec4eb9a8192ca7900cbe536e2e8b519decf33b2459798c6909df4f176db7d23190fc72b8865a718af895f1bcd9145298027423b605e70a47cf58390a8c3e88fc8c48e8b32e3da210dfbe3e881ea5674b6a348c21e93f9e55ea65efd":int:16:char*:"d200d45e788aacea606a401d0460f87dd5c1027e12dc1a0d7586e8939d9cf789b40f51ac0442961de7d21cc21e05c83155c1f2aa9193387cfdf956cb48d153ba270406f9bbba537d4987d9e2f9942d7a14cbfffea74fecdda928d23e259f5ee1":int:16:char*:"cf2cd41e34ca3a728ea5cb8aff64c36d27bdef5364e336fd68d3123c5a196a8c287013e853d5156d58d151954520fb4f6d7b17abb6817765909c576119659d902b1906ed8a2b10c155c24d124528dab9eeae379beac66e4a411786dcb8fd0062ebc030de1219a04c2a8c1b7dd3131e4d6b6caee2e31a5ed41ac1509b2ef1ee2ab18364be568ca941c25ecc84ff9d643b5ec1aaae102a20d73f479b780fd6da91075212d9eac03a0674d899eba2e431f4c44b615b6ba2232bd4b33baed73d625d":int:16:char*:"010001":exp:0:hex:"53e6e8c729d6f9c319dd317e74b0db8e4ccca25f3c8305746e137ac63a63ef3739e7b595abb96e8d55e54f7bd41ab433378ffb911d":char*:"fcbc421402e9ecabc6082afa40ba5f26522c840e":hex:"232afbc927fa08c2f6a27b87d4a5cb09c07dc26fae73d73a90558839f4fd66d281b87ec734bce237ba166698ed829106a7de6942cd6cdce78fed8d2e4d81428e66490d036264cef92af941d3e35055fe3981e14d29cbb9a4f67473063baec79a1179f5a17c9c1832f2838fd7d5e59bb9659d56dce8a019edef1bb3accc697cc6cc7a778f60a064c7f6f5d529c6210262e003de583e81e3167b89971fb8c0e15d44fffef89b53d8d64dd797d159b56d2b08ea5307ea12c241bd58d4ee278a1f2e":int:0
RSAES-OAEP Decryption Example 9_6
1:int:1536:int:16:char*:"fc8d6c04bec4eb9a8192ca7900cbe536e2e8b519decf33b2459798c6909df4f176db7d23190fc72b8865a718af895f1bcd9145298027423b605e70a47cf58390a8c3e88fc8c48e8b32e3da210dfbe3e881ea5674b6a348c21e93f9e55ea65efd":int:16:char*:"d200d45e788aacea606a401d0460f87dd5c1027e12dc1a0d7586e8939d9cf789b40f51ac0442961de7d21cc21e05c83155c1f2aa9193387cfdf956cb48d153ba270406f9bbba537d4987d9e2f9942d7a14cbfffea74fecdda928d23e259f5ee1":int:16:char*:"cf2cd41e34ca3a728ea5cb8aff64c36d27bdef5364e336fd68d3123c5a196a8c287013e853d5156d58d151954520fb4f6d7b17abb6817765909c576119659d902b1906ed8a2b10c155c24d124528dab9eeae379beac66e4a411786dcb8fd0062ebc030de1219a04c2a8c1b7dd3131e4d6b6caee2e31a5ed41ac1509b2ef1ee2ab18364be568ca941c25ecc84ff9d643b5ec1aaae102a20d73f479b780fd6da91075212d9eac03a0674d899eba2e431f4c44b615b6ba2232bd4b33baed73d625d":int:16:char*:"010001":exp:0:hex:"b6b28ea2198d0c1008bc64":char*:"23aade0e1e08bb9b9a78d2302a52f9c21b2e1ba2":hex:"438cc7dc08a68da249e42505f8573ba60e2c2773d5b290f4cf9dff718e842081c383e67024a0f29594ea987b9d25e4b738f285970d195abb3a8c8054e3d79d6b9c9a8327ba596f1259e27126674766907d8d582ff3a8476154929adb1e6d1235b2ccb4ec8f663ba9cc670a92bebd853c8dbf69c6436d016f61add836e94732450434207f9fd4c43dec2a12a958efa01efe2669899b5e604c255c55fb7166de5589e369597bb09168c06dd5db177e06a1740eb2d5c82faeca6d92fcee9931ba9f":int:0
RSAES-OAEP Decryption Example 10_1
1:int:2048:int:16:char*:"ecf5aecd1e5515fffacbd75a2816c6ebf49018cdfb4638e185d66a7396b6f8090f8018c7fd95cc34b857dc17f0cc6516bb1346ab4d582cadad7b4103352387b70338d084047c9d9539b6496204b3dd6ea442499207bec01f964287ff6336c3984658336846f56e46861881c10233d2176bf15a5e96ddc780bc868aa77d3ce769":int:16:char*:"bc46c464fc6ac4ca783b0eb08a3c841b772f7e9b2f28babd588ae885e1a0c61e4858a0fb25ac299990f35be85164c259ba1175cdd7192707135184992b6c29b746dd0d2cabe142835f7d148cc161524b4a09946d48b828473f1ce76b6cb6886c345c03e05f41d51b5c3a90a3f24073c7d74a4fe25d9cf21c75960f3fc3863183":int:16:char*:"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":int:16:char*:"010001":exp:0:hex:"8bba6bf82a6c0f86d5f1756e97956870b08953b06b4eb205bc1694ee":char*:"47e1ab7119fee56c95ee5eaad86f40d0aa63bd33":hex:"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":int:0
RSAES-OAEP Decryption Example 10_2
1:int:2048:int:16:char*:"ecf5aecd1e5515fffacbd75a2816c6ebf49018cdfb4638e185d66a7396b6f8090f8018c7fd95cc34b857dc17f0cc6516bb1346ab4d582cadad7b4103352387b70338d084047c9d9539b6496204b3dd6ea442499207bec01f964287ff6336c3984658336846f56e46861881c10233d2176bf15a5e96ddc780bc868aa77d3ce769":int:16:char*:"bc46c464fc6ac4ca783b0eb08a3c841b772f7e9b2f28babd588ae885e1a0c61e4858a0fb25ac299990f35be85164c259ba1175cdd7192707135184992b6c29b746dd0d2cabe142835f7d148cc161524b4a09946d48b828473f1ce76b6cb6886c345c03e05f41d51b5c3a90a3f24073c7d74a4fe25d9cf21c75960f3fc3863183":int:16:char*:"ae45ed5601cec6b8cc05f803935c674ddbe0d75c4c09fd7951fc6b0caec313a8df39970c518bffba5ed68f3f0d7f22a4029d413f1ae07e4ebe9e4177ce23e7f5404b569e4ee1bdcf3c1fb03ef113802d4f855eb9b5134b5a7c8085adcae6fa2fa1417ec3763be171b0c62b760ede23c12ad92b980884c641f5a8fac26bdad4a03381a22fe1b754885094c82506d4019a535a286afeb271bb9ba592de18dcf600c2aeeae56e02f7cf79fc14cf3bdc7cd84febbbf950ca90304b2219a7aa063aefa2c3c1980e560cd64afe779585b6107657b957857efde6010988ab7de417fc88d8f384c4e6e72c3f943e0c31c0c4a5cc36f879d8a3ac9d7d59860eaada6b83bb":int:16:char*:"010001":exp:0:hex:"e6ad181f053b58a904f2457510373e57":char*:"6d17f5b4c1ffac351d195bf7b09d09f09a4079cf":hex:"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":int:0
RSAES-OAEP Decryption Example 10_3
1:int:2048:int:16:char*:"ecf5aecd1e5515fffacbd75a2816c6ebf49018cdfb4638e185d66a7396b6f8090f8018c7fd95cc34b857dc17f0cc6516bb1346ab4d582cadad7b4103352387b70338d084047c9d9539b6496204b3dd6ea442499207bec01f964287ff6336c3984658336846f56e46861881c10233d2176bf15a5e96ddc780bc868aa77d3ce769":int:16:char*:"bc46c464fc6ac4ca783b0eb08a3c841b772f7e9b2f28babd588ae885e1a0c61e4858a0fb25ac299990f35be85164c259ba1175cdd7192707135184992b6c29b746dd0d2cabe142835f7d148cc161524b4a09946d48b828473f1ce76b6cb6886c345c03e05f41d51b5c3a90a3f24073c7d74a4fe25d9cf21c75960f3fc3863183":int:16:char*:"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":int:16:char*:"010001":exp:0:hex:"510a2cf60e866fa2340553c94ea39fbc256311e83e94454b4124":char*:"385387514deccc7c740dd8cdf9daee49a1cbfd54":hex:"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":int:0
RSAES-OAEP Decryption Example 10_4
1:int:2048:int:16:char*:"ecf5aecd1e5515fffacbd75a2816c6ebf49018cdfb4638e185d66a7396b6f8090f8018c7fd95cc34b857dc17f0cc6516bb1346ab4d582cadad7b4103352387b70338d084047c9d9539b6496204b3dd6ea442499207bec01f964287ff6336c3984658336846f56e46861881c10233d2176bf15a5e96ddc780bc868aa77d3ce769":int:16:char*:"bc46c464fc6ac4ca783b0eb08a3c841b772f7e9b2f28babd588ae885e1a0c61e4858a0fb25ac299990f35be85164c259ba1175cdd7192707135184992b6c29b746dd0d2cabe142835f7d148cc161524b4a09946d48b828473f1ce76b6cb6886c345c03e05f41d51b5c3a90a3f24073c7d74a4fe25d9cf21c75960f3fc3863183":int:16:char*:"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":int:16:char*:"010001":exp:0:hex:"bcdd190da3b7d300df9a06e22caae2a75f10c91ff667b7c16bde8b53064a2649a94045c9":char*:"5caca6a0f764161a9684f85d92b6e0ef37ca8b65":hex:"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":int:0
RSAES-OAEP Decryption Example 10_5
1:int:2048:int:16:char*:"ecf5aecd1e5515fffacbd75a2816c6ebf49018cdfb4638e185d66a7396b6f8090f8018c7fd95cc34b857dc17f0cc6516bb1346ab4d582cadad7b4103352387b70338d084047c9d9539b6496204b3dd6ea442499207bec01f964287ff6336c3984658336846f56e46861881c10233d2176bf15a5e96ddc780bc868aa77d3ce769":int:16:char*:"bc46c464fc6ac4ca783b0eb08a3c841b772f7e9b2f28babd588ae885e1a0c61e4858a0fb25ac299990f35be85164c259ba1175cdd7192707135184992b6c29b746dd0d2cabe142835f7d148cc161524b4a09946d48b828473f1ce76b6cb6886c345c03e05f41d51b5c3a90a3f24073c7d74a4fe25d9cf21c75960f3fc3863183":int:16:char*:"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":int:16:char*:"010001":exp:0:hex:"a7dd6c7dc24b46f9dd5f1e91ada4c3b3df947e877232a9":char*:"95bca9e3859894b3dd869fa7ecd5bbc6401bf3e4":hex:"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":int:0
RSAES-OAEP Decryption Example 10_6
1:int:2048:int:16:char*:"ecf5aecd1e5515fffacbd75a2816c6ebf49018cdfb4638e185d66a7396b6f8090f8018c7fd95cc34b857dc17f0cc6516bb1346ab4d582cadad7b4103352387b70338d084047c9d9539b6496204b3dd6ea442499207bec01f964287ff6336c3984658336846f56e46861881c10233d2176bf15a5e96ddc780bc868aa77d3ce769":int:16:char*:"bc46c464fc6ac4ca783b0eb08a3c841b772f7e9b2f28babd588ae885e1a0c61e4858a0fb25ac299990f35be85164c259ba1175cdd7192707135184992b6c29b746dd0d2cabe142835f7d148cc161524b4a09946d48b828473f1ce76b6cb6886c345c03e05f41d51b5c3a90a3f24073c7d74a4fe25d9cf21c75960f3fc3863183":int:16:char*:"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":int:16:char*:"010001":exp:0:hex:"eaf1a73a1b0c4609537de69cd9228bbcfb9a8ca8c6c3efaf056fe4a7f4634ed00b7c39ec6922d7b8ea2c04ebac":char*:"9f47ddf42e97eea856a9bdbc714eb3ac22f6eb32":hex:"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":int:0
RSAES-OAEP Decryption empty output with NULL buffer
depends_on:0
1:int:2048:int:16:char*:"ecf5aecd1e5515fffacbd75a2816c6ebf49018cdfb4638e185d66a7396b6f8090f8018c7fd95cc34b857dc17f0cc6516bb1346ab4d582cadad7b4103352387b70338d084047c9d9539b6496204b3dd6ea442499207bec01f964287ff6336c3984658336846f56e46861881c10233d2176bf15a5e96ddc780bc868aa77d3ce769":int:16:char*:"bc46c464fc6ac4ca783b0eb08a3c841b772f7e9b2f28babd588ae885e1a0c61e4858a0fb25ac299990f35be85164c259ba1175cdd7192707135184992b6c29b746dd0d2cabe142835f7d148cc161524b4a09946d48b828473f1ce76b6cb6886c345c03e05f41d51b5c3a90a3f24073c7d74a4fe25d9cf21c75960f3fc3863183":int:16:char*:"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":int:16:char*:"010001":exp:0:hex:"":char*:"9f47ddf42e97eea856a9bdbc714eb3ac22f6eb32":hex:"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":int:0
RSASSA-PSS Signing Test Vector Int
2:int:1024:int:16:char*:"d17f655bf27c8b16d35462c905cc04a26f37e2a67fa9c0ce0dced472394a0df743fe7f929e378efdb368eddff453cf007af6d948e0ade757371f8a711e278f6b":int:16:char*:"c6d92b6fee7414d1358ce1546fb62987530b90bd15e0f14963a5e2635adb69347ec0c01b2ab1763fd8ac1a592fb22757463a982425bb97a3a437c5bf86d03f2f":int:16:char*:"a2ba40ee07e3b2bd2f02ce227f36a195024486e49c19cb41bbbdfbba98b22b0e577c2eeaffa20d883a76e65e394c69d4b3c05a1e8fadda27edb2a42bc000fe888b9b32c22d15add0cd76b3e7936e19955b220dd17d4ea904b1ec102b2e4de7751222aa99151024c7cb41cc5ea21d00eeb41f7c800834d2c6e06bce3bce7ea9a5":int:16:char*:"010001":exp:0:exp:0:hex:"859eef2fd78aca00308bdc471193bf55bf9d78db8f8a672b484634f3c9c26e6478ae10260fe0dd8c082e53a5293af2173cd50c6d5d354febf78b26021c25c02712e78cd4694c9f469777e451e7f8e9e04cd3739c6bbfedae487fb55644e9ca74ff77a53cb729802f6ed4a5ffa8ba159890fc":hex:"e3b5d5d002c1bce50c2b65ef88a188d83bce7e61":hex:"8daa627d3de7595d63056c7ec659e54406f10610128baae821c8b2a0f3936d54dc3bdce46689f6b7951bb18e840542769718d5715d210d85efbb596192032c42be4c29972c856275eb6d5a45f05f51876fc6743deddd28caec9bb30ea99e02c3488269604fe497f74ccd7c7fca1671897123cbd30def5d54a2b5536ad90a747e":int:0
RSASSA-PSS Verification Test Vector Int
3:int:1024:int:16:char*:"a2ba40ee07e3b2bd2f02ce227f36a195024486e49c19cb41bbbdfbba98b22b0e577c2eeaffa20d883a76e65e394c69d4b3c05a1e8fadda27edb2a42bc000fe888b9b32c22d15add0cd76b3e7936e19955b220dd17d4ea904b1ec102b2e4de7751222aa99151024c7cb41cc5ea21d00eeb41f7c800834d2c6e06bce3bce7ea9a5":int:16:char*:"010001":exp:0:exp:0:hex:"859eef2fd78aca00308bdc471193bf55bf9d78db8f8a672b484634f3c9c26e6478ae10260fe0dd8c082e53a5293af2173cd50c6d5d354febf78b26021c25c02712e78cd4694c9f469777e451e7f8e9e04cd3739c6bbfedae487fb55644e9ca74ff77a53cb729802f6ed4a5ffa8ba159890fc":char*:"e3b5d5d002c1bce50c2b65ef88a188d83bce7e61":hex:"8daa627d3de7595d63056c7ec659e54406f10610128baae821c8b2a0f3936d54dc3bdce46689f6b7951bb18e840542769718d5715d210d85efbb596192032c42be4c29972c856275eb6d5a45f05f51876fc6743deddd28caec9bb30ea99e02c3488269604fe497f74ccd7c7fca1671897123cbd30def5d54a2b5536ad90a747e":int:0
RSASSA-PSS Signature RSA-1016, SHA-512: minimum salt size not met
depends_on:1
2:int:1016:int:16:char*:"0e3cb6845e528229e19cfb24611e6859ac1cea7d35992b6e2e796823c52affa03400e42830f90697f084499c3e3587defc19e749e72433dd7b70c28b0c8280b7":int:16:char*:"0c48f9e45ae38fdb4a5143be37d79a10cd4f1f9782ef26a4848a4449c72cfd712c68350818736385cb4a9ab6db5aef8e96c551039cfcc8915821aee069ed660d":int:16:char*:"00aee7874a4db2f1510044405db29f14df0f37bbcf61fcbcc994a3d31caaf858a74cc8f2a40ac9a9ce7aa9a0680f62cf9d8d4b827114533fdbf86f16fc9dfe5cbf857d86135519a4611ffc59cb7473861619a78e3ec314715e804cff82d6f32e9f57ddf390563629883bd34f40e8db413209b151cee97d817a5d65c7da54734b":int:16:char*:"010001":exp:2:exp:2:hex:"d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd00":hex:"e3b5d5d002c1bce50c2b65ef88a188d83bce7e61":hex:"":exp:1
RSASSA-PSS Signature RSA-520, SHA-512: no possible salt size
depends_on:1
2:int:520:int:16:char*:"0feea5f6220fac291b9508ec2ba8ed281eb39aee4d5dc693254106816ebc700ecf":int:16:char*:"0d68918785c3aafe31eaaa2d8d8156dce645940ff7734a457337a51bd00bc88811":int:16:char*:"00d5a06f86e5b9d87428540165ca966fa8893a62e2a59d0bfd7617780bb039f9165a373a8e119d0766f8de556710f33f67019153bad8223775e797d451d48206f3bf":int:16:char*:"010001":exp:2:exp:2:hex:"d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd00":hex:"e3b5d5d002c1bce50c2b65ef88a188d83bce7e61":hex:"":exp:1
RSASSA-PSS Signature RSA-528, SHA-512: zero salt size
depends_on:1
2:int:528:int:16:char*:"00d272aa28ed2085ac6df3c05c6719eed5deb618afa2e4ca4a6f7330b430ad48672d":int:16:char*:"00c578836bab27145db9dd66f17470b62d4a6100f8ca0dedf457ee3639c3b9596325":int:16:char*:"00a2554eba715bf66e5ecdf3d6d718e3e5d907e8666e7bf5a76b415106e04eb827ec4cb2199cff66491d45419082059aa5b54b0cf5eef4443402f3047c0b0e6f025081":int:16:char*:"010001":exp:2:exp:2:hex:"d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd32a7c8a05bbc90d32c49d436e99569fd00":hex:"e3b5d5d002c1bce50c2b65ef88a188d83bce7e61":hex:"":exp:1
RSASSA-PSS Signature Example 1_1
2:int:1024:int:16:char*:"e7e8942720a877517273a356053ea2a1bc0c94aa72d55c6e86296b2dfc967948c0a72cbccca7eacb35706e09a1df55a1535bd9b3cc34160b3b6dcd3eda8e6443":int:16:char*:"b69dca1cf7d4d7ec81e75b90fcca874abcde123fd2700180aa90479b6e48de8d67ed24f9f19d85ba275874f542cd20dc723e6963364a1f9425452b269a6799fd":int:16:char*:"a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137":int:16:char*:"010001":exp:0:exp:0:hex:"cdc87da223d786df3b45e0bbbc721326d1ee2af806cc315475cc6f0d9c66e1b62371d45ce2392e1ac92844c310102f156a0d8d52c1f4c40ba3aa65095786cb769757a6563ba958fed0bcc984e8b517a3d5f515b23b8a41e74aa867693f90dfb061a6e86dfaaee64472c00e5f20945729cbebe77f06ce78e08f4098fba41f9d6193c0317e8b60d4b6084acb42d29e3808a3bc372d85e331170fcbf7cc72d0b71c296648b3a4d10f416295d0807aa625cab2744fd9ea8fd223c42537029828bd16be02546f130fd2e33b936d2676e08aed1b73318b750a0167d0":hex:"dee959c7e06411361420ff80185ed57f3e6776af":hex:"9074308fb598e9701b2294388e52f971faac2b60a5145af185df5287b5ed2887e57ce7fd44dc8634e407c8e0e4360bc226f3ec227f9d9e54638e8d31f5051215df6ebb9c2f9579aa77598a38f914b5b9c1bd83c4e2f9f382a0d0aa3542ffee65984a601bc69eb28deb27dca12c82c2d4c3f66cd500f1ff2b994d8a4e30cbb33c":int:0
RSASSA-PSS Signature Example 1_1 (verify)
3:int:1024:int:16:char*:"a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137":int:16:char*:"010001":exp:0:exp:0:hex:"cdc87da223d786df3b45e0bbbc721326d1ee2af806cc315475cc6f0d9c66e1b62371d45ce2392e1ac92844c310102f156a0d8d52c1f4c40ba3aa65095786cb769757a6563ba958fed0bcc984e8b517a3d5f515b23b8a41e74aa867693f90dfb061a6e86dfaaee64472c00e5f20945729cbebe77f06ce78e08f4098fba41f9d6193c0317e8b60d4b6084acb42d29e3808a3bc372d85e331170fcbf7cc72d0b71c296648b3a4d10f416295d0807aa625cab2744fd9ea8fd223c42537029828bd16be02546f130fd2e33b936d2676e08aed1b73318b750a0167d0":char*:"dee959c7e06411361420ff80185ed57f3e6776af":hex:"9074308fb598e9701b2294388e52f971faac2b60a5145af185df5287b5ed2887e57ce7fd44dc8634e407c8e0e4360bc226f3ec227f9d9e54638e8d31f5051215df6ebb9c2f9579aa77598a38f914b5b9c1bd83c4e2f9f382a0d0aa3542ffee65984a601bc69eb28deb27dca12c82c2d4c3f66cd500f1ff2b994d8a4e30cbb33c":int:0
RSASSA-PSS Signature Example 1_2
2:int:1024:int:16:char*:"e7e8942720a877517273a356053ea2a1bc0c94aa72d55c6e86296b2dfc967948c0a72cbccca7eacb35706e09a1df55a1535bd9b3cc34160b3b6dcd3eda8e6443":int:16:char*:"b69dca1cf7d4d7ec81e75b90fcca874abcde123fd2700180aa90479b6e48de8d67ed24f9f19d85ba275874f542cd20dc723e6963364a1f9425452b269a6799fd":int:16:char*:"a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137":int:16:char*:"010001":exp:0:exp:0:hex:"851384cdfe819c22ed6c4ccb30daeb5cf059bc8e1166b7e3530c4c233e2b5f8f71a1cca582d43ecc72b1bca16dfc7013226b9e":hex:"ef2869fa40c346cb183dab3d7bffc98fd56df42d":hex:"3ef7f46e831bf92b32274142a585ffcefbdca7b32ae90d10fb0f0c729984f04ef29a9df0780775ce43739b97838390db0a5505e63de927028d9d29b219ca2c4517832558a55d694a6d25b9dab66003c4cccd907802193be5170d26147d37b93590241be51c25055f47ef62752cfbe21418fafe98c22c4d4d47724fdb5669e843":int:0
RSASSA-PSS Signature Example 1_2 (verify)
3:int:1024:int:16:char*:"a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137":int:16:char*:"010001":exp:0:exp:0:hex:"851384cdfe819c22ed6c4ccb30daeb5cf059bc8e1166b7e3530c4c233e2b5f8f71a1cca582d43ecc72b1bca16dfc7013226b9e":char*:"ef2869fa40c346cb183dab3d7bffc98fd56df42d":hex:"3ef7f46e831bf92b32274142a585ffcefbdca7b32ae90d10fb0f0c729984f04ef29a9df0780775ce43739b97838390db0a5505e63de927028d9d29b219ca2c4517832558a55d694a6d25b9dab66003c4cccd907802193be5170d26147d37b93590241be51c25055f47ef62752cfbe21418fafe98c22c4d4d47724fdb5669e843":int:0
RSASSA-PSS Signature Example 1_3
2:int:1024:int:16:char*:"e7e8942720a877517273a356053ea2a1bc0c94aa72d55c6e86296b2dfc967948c0a72cbccca7eacb35706e09a1df55a1535bd9b3cc34160b3b6dcd3eda8e6443":int:16:char*:"b69dca1cf7d4d7ec81e75b90fcca874abcde123fd2700180aa90479b6e48de8d67ed24f9f19d85ba275874f542cd20dc723e6963364a1f9425452b269a6799fd":int:16:char*:"a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137":int:16:char*:"010001":exp:0:exp:0:hex:"a4b159941761c40c6a82f2b80d1b94f5aa2654fd17e12d588864679b54cd04ef8bd03012be8dc37f4b83af7963faff0dfa225477437c48017ff2be8191cf3955fc07356eab3f322f7f620e21d254e5db4324279fe067e0910e2e81ca2cab31c745e67a54058eb50d993cdb9ed0b4d029c06d21a94ca661c3ce27fae1d6cb20f4564d66ce4767583d0e5f060215b59017be85ea848939127bd8c9c4d47b51056c031cf336f17c9980f3b8f5b9b6878e8b797aa43b882684333e17893fe9caa6aa299f7ed1a18ee2c54864b7b2b99b72618fb02574d139ef50f019c9eef416971338e7d470":hex:"710b9c4747d800d4de87f12afdce6df18107cc77":hex:"666026fba71bd3e7cf13157cc2c51a8e4aa684af9778f91849f34335d141c00154c4197621f9624a675b5abc22ee7d5baaffaae1c9baca2cc373b3f33e78e6143c395a91aa7faca664eb733afd14d8827259d99a7550faca501ef2b04e33c23aa51f4b9e8282efdb728cc0ab09405a91607c6369961bc8270d2d4f39fce612b1":int:0
RSASSA-PSS Signature Example 1_3 (verify)
3:int:1024:int:16:char*:"a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137":int:16:char*:"010001":exp:0:exp:0:hex:"a4b159941761c40c6a82f2b80d1b94f5aa2654fd17e12d588864679b54cd04ef8bd03012be8dc37f4b83af7963faff0dfa225477437c48017ff2be8191cf3955fc07356eab3f322f7f620e21d254e5db4324279fe067e0910e2e81ca2cab31c745e67a54058eb50d993cdb9ed0b4d029c06d21a94ca661c3ce27fae1d6cb20f4564d66ce4767583d0e5f060215b59017be85ea848939127bd8c9c4d47b51056c031cf336f17c9980f3b8f5b9b6878e8b797aa43b882684333e17893fe9caa6aa299f7ed1a18ee2c54864b7b2b99b72618fb02574d139ef50f019c9eef416971338e7d470":char*:"710b9c4747d800d4de87f12afdce6df18107cc77":hex:"666026fba71bd3e7cf13157cc2c51a8e4aa684af9778f91849f34335d141c00154c4197621f9624a675b5abc22ee7d5baaffaae1c9baca2cc373b3f33e78e6143c395a91aa7faca664eb733afd14d8827259d99a7550faca501ef2b04e33c23aa51f4b9e8282efdb728cc0ab09405a91607c6369961bc8270d2d4f39fce612b1":int:0
RSASSA-PSS Signature Example 1_4
2:int:1024:int:16:char*:"e7e8942720a877517273a356053ea2a1bc0c94aa72d55c6e86296b2dfc967948c0a72cbccca7eacb35706e09a1df55a1535bd9b3cc34160b3b6dcd3eda8e6443":int:16:char*:"b69dca1cf7d4d7ec81e75b90fcca874abcde123fd2700180aa90479b6e48de8d67ed24f9f19d85ba275874f542cd20dc723e6963364a1f9425452b269a6799fd":int:16:char*:"a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137":int:16:char*:"010001":exp:0:exp:0:hex:"bc656747fa9eafb3f0":hex:"056f00985de14d8ef5cea9e82f8c27bef720335e":hex:"4609793b23e9d09362dc21bb47da0b4f3a7622649a47d464019b9aeafe53359c178c91cd58ba6bcb78be0346a7bc637f4b873d4bab38ee661f199634c547a1ad8442e03da015b136e543f7ab07c0c13e4225b8de8cce25d4f6eb8400f81f7e1833b7ee6e334d370964ca79fdb872b4d75223b5eeb08101591fb532d155a6de87":int:0
RSASSA-PSS Signature Example 1_4 (verify)
3:int:1024:int:16:char*:"a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137":int:16:char*:"010001":exp:0:exp:0:hex:"bc656747fa9eafb3f0":char*:"056f00985de14d8ef5cea9e82f8c27bef720335e":hex:"4609793b23e9d09362dc21bb47da0b4f3a7622649a47d464019b9aeafe53359c178c91cd58ba6bcb78be0346a7bc637f4b873d4bab38ee661f199634c547a1ad8442e03da015b136e543f7ab07c0c13e4225b8de8cce25d4f6eb8400f81f7e1833b7ee6e334d370964ca79fdb872b4d75223b5eeb08101591fb532d155a6de87":int:0
RSASSA-PSS Signature Example 1_5
2:int:1024:int:16:char*:"e7e8942720a877517273a356053ea2a1bc0c94aa72d55c6e86296b2dfc967948c0a72cbccca7eacb35706e09a1df55a1535bd9b3cc34160b3b6dcd3eda8e6443":int:16:char*:"b69dca1cf7d4d7ec81e75b90fcca874abcde123fd2700180aa90479b6e48de8d67ed24f9f19d85ba275874f542cd20dc723e6963364a1f9425452b269a6799fd":int:16:char*:"a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137":int:16:char*:"010001":exp:0:exp:0:hex:"b45581547e5427770c768e8b82b75564e0ea4e9c32594d6bff706544de0a8776c7a80b4576550eee1b2acabc7e8b7d3ef7bb5b03e462c11047eadd00629ae575480ac1470fe046f13a2bf5af17921dc4b0aa8b02bee6334911651d7f8525d10f32b51d33be520d3ddf5a709955a3dfe78283b9e0ab54046d150c177f037fdccc5be4ea5f68b5e5a38c9d7edcccc4975f455a6909b4":hex:"80e70ff86a08de3ec60972b39b4fbfdcea67ae8e":hex:"1d2aad221ca4d31ddf13509239019398e3d14b32dc34dc5af4aeaea3c095af73479cf0a45e5629635a53a018377615b16cb9b13b3e09d671eb71e387b8545c5960da5a64776e768e82b2c93583bf104c3fdb23512b7b4e89f633dd0063a530db4524b01c3f384c09310e315a79dcd3d684022a7f31c865a664e316978b759fad":int:0
RSASSA-PSS Signature Example 1_5 (verify)
3:int:1024:int:16:char*:"a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137":int:16:char*:"010001":exp:0:exp:0:hex:"b45581547e5427770c768e8b82b75564e0ea4e9c32594d6bff706544de0a8776c7a80b4576550eee1b2acabc7e8b7d3ef7bb5b03e462c11047eadd00629ae575480ac1470fe046f13a2bf5af17921dc4b0aa8b02bee6334911651d7f8525d10f32b51d33be520d3ddf5a709955a3dfe78283b9e0ab54046d150c177f037fdccc5be4ea5f68b5e5a38c9d7edcccc4975f455a6909b4":char*:"80e70ff86a08de3ec60972b39b4fbfdcea67ae8e":hex:"1d2aad221ca4d31ddf13509239019398e3d14b32dc34dc5af4aeaea3c095af73479cf0a45e5629635a53a018377615b16cb9b13b3e09d671eb71e387b8545c5960da5a64776e768e82b2c93583bf104c3fdb23512b7b4e89f633dd0063a530db4524b01c3f384c09310e315a79dcd3d684022a7f31c865a664e316978b759fad":int:0
RSASSA-PSS Signature Example 1_6
2:int:1024:int:16:char*:"e7e8942720a877517273a356053ea2a1bc0c94aa72d55c6e86296b2dfc967948c0a72cbccca7eacb35706e09a1df55a1535bd9b3cc34160b3b6dcd3eda8e6443":int:16:char*:"b69dca1cf7d4d7ec81e75b90fcca874abcde123fd2700180aa90479b6e48de8d67ed24f9f19d85ba275874f542cd20dc723e6963364a1f9425452b269a6799fd":int:16:char*:"a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137":int:16:char*:"010001":exp:0:exp:0:hex:"10aae9a0ab0b595d0841207b700d48d75faedde3b775cd6b4cc88ae06e4694ec74ba18f8520d4f5ea69cbbe7cc2beba43efdc10215ac4eb32dc302a1f53dc6c4352267e7936cfebf7c8d67035784a3909fa859c7b7b59b8e39c5c2349f1886b705a30267d402f7486ab4f58cad5d69adb17ab8cd0ce1caf5025af4ae24b1fb8794c6070cc09a51e2f9911311e3877d0044c71c57a993395008806b723ac38373d395481818528c1e7053739282053529510e935cd0fa77b8fa53cc2d474bd4fb3cc5c672d6ffdc90a00f9848712c4bcfe46c60573659b11e6457e861f0f604b6138d144f8ce4e2da73":hex:"a8ab69dd801f0074c2a1fc60649836c616d99681":hex:"2a34f6125e1f6b0bf971e84fbd41c632be8f2c2ace7de8b6926e31ff93e9af987fbc06e51e9be14f5198f91f3f953bd67da60a9df59764c3dc0fe08e1cbef0b75f868d10ad3fba749fef59fb6dac46a0d6e504369331586f58e4628f39aa278982543bc0eeb537dc61958019b394fb273f215858a0a01ac4d650b955c67f4c58":int:0
RSASSA-PSS Signature Example 1_6 (verify)
3:int:1024:int:16:char*:"a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137":int:16:char*:"010001":exp:0:exp:0:hex:"10aae9a0ab0b595d0841207b700d48d75faedde3b775cd6b4cc88ae06e4694ec74ba18f8520d4f5ea69cbbe7cc2beba43efdc10215ac4eb32dc302a1f53dc6c4352267e7936cfebf7c8d67035784a3909fa859c7b7b59b8e39c5c2349f1886b705a30267d402f7486ab4f58cad5d69adb17ab8cd0ce1caf5025af4ae24b1fb8794c6070cc09a51e2f9911311e3877d0044c71c57a993395008806b723ac38373d395481818528c1e7053739282053529510e935cd0fa77b8fa53cc2d474bd4fb3cc5c672d6ffdc90a00f9848712c4bcfe46c60573659b11e6457e861f0f604b6138d144f8ce4e2da73":char*:"a8ab69dd801f0074c2a1fc60649836c616d99681":hex:"2a34f6125e1f6b0bf971e84fbd41c632be8f2c2ace7de8b6926e31ff93e9af987fbc06e51e9be14f5198f91f3f953bd67da60a9df59764c3dc0fe08e1cbef0b75f868d10ad3fba749fef59fb6dac46a0d6e504369331586f58e4628f39aa278982543bc0eeb537dc61958019b394fb273f215858a0a01ac4d650b955c67f4c58":int:0
RSASSA-PSS Signature Example 2_1
2:int:1025:int:16:char*:"016601e926a0f8c9e26ecab769ea65a5e7c52cc9e080ef519457c644da6891c5a104d3ea7955929a22e7c68a7af9fcad777c3ccc2b9e3d3650bce404399b7e59d1":int:16:char*:"014eafa1d4d0184da7e31f877d1281ddda625664869e8379e67ad3b75eae74a580e9827abd6eb7a002cb5411f5266797768fb8e95ae40e3e8a01f35ff89e56c079":int:16:char*:"01d40c1bcf97a68ae7cdbd8a7bf3e34fa19dcca4ef75a47454375f94514d88fed006fb829f8419ff87d6315da68a1ff3a0938e9abb3464011c303ad99199cf0c7c7a8b477dce829e8844f625b115e5e9c4a59cf8f8113b6834336a2fd2689b472cbb5e5cabe674350c59b6c17e176874fb42f8fc3d176a017edc61fd326c4b33c9":int:16:char*:"010001":exp:0:exp:0:hex:"daba032066263faedb659848115278a52c44faa3a76f37515ed336321072c40a9d9b53bc05014078adf520875146aae70ff060226dcb7b1f1fc27e9360":hex:"57bf160bcb02bb1dc7280cf0458530b7d2832ff7":hex:"014c5ba5338328ccc6e7a90bf1c0ab3fd606ff4796d3c12e4b639ed9136a5fec6c16d8884bdd99cfdc521456b0742b736868cf90de099adb8d5ffd1deff39ba4007ab746cefdb22d7df0e225f54627dc65466131721b90af445363a8358b9f607642f78fab0ab0f43b7168d64bae70d8827848d8ef1e421c5754ddf42c2589b5b3":int:0
RSASSA-PSS Signature Example 2_1 (verify)
3:int:1025:int:16:char*:"01d40c1bcf97a68ae7cdbd8a7bf3e34fa19dcca4ef75a47454375f94514d88fed006fb829f8419ff87d6315da68a1ff3a0938e9abb3464011c303ad99199cf0c7c7a8b477dce829e8844f625b115e5e9c4a59cf8f8113b6834336a2fd2689b472cbb5e5cabe674350c59b6c17e176874fb42f8fc3d176a017edc61fd326c4b33c9":int:16:char*:"010001":exp:0:exp:0:hex:"daba032066263faedb659848115278a52c44faa3a76f37515ed336321072c40a9d9b53bc05014078adf520875146aae70ff060226dcb7b1f1fc27e9360":char*:"57bf160bcb02bb1dc7280cf0458530b7d2832ff7":hex:"014c5ba5338328ccc6e7a90bf1c0ab3fd606ff4796d3c12e4b639ed9136a5fec6c16d8884bdd99cfdc521456b0742b736868cf90de099adb8d5ffd1deff39ba4007ab746cefdb22d7df0e225f54627dc65466131721b90af445363a8358b9f607642f78fab0ab0f43b7168d64bae70d8827848d8ef1e421c5754ddf42c2589b5b3":int:0
RSASSA-PSS Signature Example 2_2
2:int:1025:int:16:char*:"016601e926a0f8c9e26ecab769ea65a5e7c52cc9e080ef519457c644da6891c5a104d3ea7955929a22e7c68a7af9fcad777c3ccc2b9e3d3650bce404399b7e59d1":int:16:char*:"014eafa1d4d0184da7e31f877d1281ddda625664869e8379e67ad3b75eae74a580e9827abd6eb7a002cb5411f5266797768fb8e95ae40e3e8a01f35ff89e56c079":int:16:char*:"01d40c1bcf97a68ae7cdbd8a7bf3e34fa19dcca4ef75a47454375f94514d88fed006fb829f8419ff87d6315da68a1ff3a0938e9abb3464011c303ad99199cf0c7c7a8b477dce829e8844f625b115e5e9c4a59cf8f8113b6834336a2fd2689b472cbb5e5cabe674350c59b6c17e176874fb42f8fc3d176a017edc61fd326c4b33c9":int:16:char*:"010001":exp:0:exp:0:hex:"e4f8601a8a6da1be34447c0959c058570c3668cfd51dd5f9ccd6ad4411fe8213486d78a6c49f93efc2ca2288cebc2b9b60bd04b1e220d86e3d4848d709d032d1e8c6a070c6af9a499fcf95354b14ba6127c739de1bb0fd16431e46938aec0cf8ad9eb72e832a7035de9b7807bdc0ed8b68eb0f5ac2216be40ce920c0db0eddd3860ed788efaccaca502d8f2bd6d1a7c1f41ff46f1681c8f1f818e9c4f6d91a0c7803ccc63d76a6544d843e084e363b8acc55aa531733edb5dee5b5196e9f03e8b731b3776428d9e457fe3fbcb3db7274442d785890e9cb0854b6444dace791d7273de1889719338a77fe":hex:"7f6dd359e604e60870e898e47b19bf2e5a7b2a90":hex:"010991656cca182b7f29d2dbc007e7ae0fec158eb6759cb9c45c5ff87c7635dd46d150882f4de1e9ae65e7f7d9018f6836954a47c0a81a8a6b6f83f2944d6081b1aa7c759b254b2c34b691da67cc0226e20b2f18b42212761dcd4b908a62b371b5918c5742af4b537e296917674fb914194761621cc19a41f6fb953fbcbb649dea":int:0
RSASSA-PSS Signature Example 2_2 (verify)
3:int:1025:int:16:char*:"01d40c1bcf97a68ae7cdbd8a7bf3e34fa19dcca4ef75a47454375f94514d88fed006fb829f8419ff87d6315da68a1ff3a0938e9abb3464011c303ad99199cf0c7c7a8b477dce829e8844f625b115e5e9c4a59cf8f8113b6834336a2fd2689b472cbb5e5cabe674350c59b6c17e176874fb42f8fc3d176a017edc61fd326c4b33c9":int:16:char*:"010001":exp:0:exp:0:hex:"e4f8601a8a6da1be34447c0959c058570c3668cfd51dd5f9ccd6ad4411fe8213486d78a6c49f93efc2ca2288cebc2b9b60bd04b1e220d86e3d4848d709d032d1e8c6a070c6af9a499fcf95354b14ba6127c739de1bb0fd16431e46938aec0cf8ad9eb72e832a7035de9b7807bdc0ed8b68eb0f5ac2216be40ce920c0db0eddd3860ed788efaccaca502d8f2bd6d1a7c1f41ff46f1681c8f1f818e9c4f6d91a0c7803ccc63d76a6544d843e084e363b8acc55aa531733edb5dee5b5196e9f03e8b731b3776428d9e457fe3fbcb3db7274442d785890e9cb0854b6444dace791d7273de1889719338a77fe":char*:"7f6dd359e604e60870e898e47b19bf2e5a7b2a90":hex:"010991656cca182b7f29d2dbc007e7ae0fec158eb6759cb9c45c5ff87c7635dd46d150882f4de1e9ae65e7f7d9018f6836954a47c0a81a8a6b6f83f2944d6081b1aa7c759b254b2c34b691da67cc0226e20b2f18b42212761dcd4b908a62b371b5918c5742af4b537e296917674fb914194761621cc19a41f6fb953fbcbb649dea":int:0
RSASSA-PSS Signature Example 2_3
2:int:1025:int:16:char*:"016601e926a0f8c9e26ecab769ea65a5e7c52cc9e080ef519457c644da6891c5a104d3ea7955929a22e7c68a7af9fcad777c3ccc2b9e3d3650bce404399b7e59d1":int:16:char*:"014eafa1d4d0184da7e31f877d1281ddda625664869e8379e67ad3b75eae74a580e9827abd6eb7a002cb5411f5266797768fb8e95ae40e3e8a01f35ff89e56c079":int:16:char*:"01d40c1bcf97a68ae7cdbd8a7bf3e34fa19dcca4ef75a47454375f94514d88fed006fb829f8419ff87d6315da68a1ff3a0938e9abb3464011c303ad99199cf0c7c7a8b477dce829e8844f625b115e5e9c4a59cf8f8113b6834336a2fd2689b472cbb5e5cabe674350c59b6c17e176874fb42f8fc3d176a017edc61fd326c4b33c9":int:16:char*:"010001":exp:0:exp:0:hex:"52a1d96c8ac39e41e455809801b927a5b445c10d902a0dcd3850d22a66d2bb0703e67d5867114595aabf5a7aeb5a8f87034bbb30e13cfd4817a9be76230023606d0286a3faf8a4d22b728ec518079f9e64526e3a0cc7941aa338c437997c680ccac67c66bfa1":hex:"fca862068bce2246724b708a0519da17e648688c":hex:"007f0030018f53cdc71f23d03659fde54d4241f758a750b42f185f87578520c30742afd84359b6e6e8d3ed959dc6fe486bedc8e2cf001f63a7abe16256a1b84df0d249fc05d3194ce5f0912742dbbf80dd174f6c51f6bad7f16cf3364eba095a06267dc3793803ac7526aebe0a475d38b8c2247ab51c4898df7047dc6adf52c6c4":int:0
RSASSA-PSS Signature Example 2_3 (verify)
3:int:1025:int:16:char*:"01d40c1bcf97a68ae7cdbd8a7bf3e34fa19dcca4ef75a47454375f94514d88fed006fb829f8419ff87d6315da68a1ff3a0938e9abb3464011c303ad99199cf0c7c7a8b477dce829e8844f625b115e5e9c4a59cf8f8113b6834336a2fd2689b472cbb5e5cabe674350c59b6c17e176874fb42f8fc3d176a017edc61fd326c4b33c9":int:16:char*:"010001":exp:0:exp:0:hex:"52a1d96c8ac39e41e455809801b927a5b445c10d902a0dcd3850d22a66d2bb0703e67d5867114595aabf5a7aeb5a8f87034bbb30e13cfd4817a9be76230023606d0286a3faf8a4d22b728ec518079f9e64526e3a0cc7941aa338c437997c680ccac67c66bfa1":char*:"fca862068bce2246724b708a0519da17e648688c":hex:"007f0030018f53cdc71f23d03659fde54d4241f758a750b42f185f87578520c30742afd84359b6e6e8d3ed959dc6fe486bedc8e2cf001f63a7abe16256a1b84df0d249fc05d3194ce5f0912742dbbf80dd174f6c51f6bad7f16cf3364eba095a06267dc3793803ac7526aebe0a475d38b8c2247ab51c4898df7047dc6adf52c6c4":int:0
RSASSA-PSS Signature Example 2_4
2:int:1025:int:16:char*:"016601e926a0f8c9e26ecab769ea65a5e7c52cc9e080ef519457c644da6891c5a104d3ea7955929a22e7c68a7af9fcad777c3ccc2b9e3d3650bce404399b7e59d1":int:16:char*:"014eafa1d4d0184da7e31f877d1281ddda625664869e8379e67ad3b75eae74a580e9827abd6eb7a002cb5411f5266797768fb8e95ae40e3e8a01f35ff89e56c079":int:16:char*:"01d40c1bcf97a68ae7cdbd8a7bf3e34fa19dcca4ef75a47454375f94514d88fed006fb829f8419ff87d6315da68a1ff3a0938e9abb3464011c303ad99199cf0c7c7a8b477dce829e8844f625b115e5e9c4a59cf8f8113b6834336a2fd2689b472cbb5e5cabe674350c59b6c17e176874fb42f8fc3d176a017edc61fd326c4b33c9":int:16:char*:"010001":exp:0:exp:0:hex:"a7182c83ac18be6570a106aa9d5c4e3dbbd4afaeb0c60c4a23e1969d79ff":hex:"8070ef2de945c02387684ba0d33096732235d440":hex:"009cd2f4edbe23e12346ae8c76dd9ad3230a62076141f16c152ba18513a48ef6f010e0e37fd3df10a1ec629a0cb5a3b5d2893007298c30936a95903b6ba85555d9ec3673a06108fd62a2fda56d1ce2e85c4db6b24a81ca3b496c36d4fd06eb7c9166d8e94877c42bea622b3bfe9251fdc21d8d5371badad78a488214796335b40b":int:0
RSASSA-PSS Signature Example 2_4 (verify)
3:int:1025:int:16:char*:"01d40c1bcf97a68ae7cdbd8a7bf3e34fa19dcca4ef75a47454375f94514d88fed006fb829f8419ff87d6315da68a1ff3a0938e9abb3464011c303ad99199cf0c7c7a8b477dce829e8844f625b115e5e9c4a59cf8f8113b6834336a2fd2689b472cbb5e5cabe674350c59b6c17e176874fb42f8fc3d176a017edc61fd326c4b33c9":int:16:char*:"010001":exp:0:exp:0:hex:"a7182c83ac18be6570a106aa9d5c4e3dbbd4afaeb0c60c4a23e1969d79ff":char*:"8070ef2de945c02387684ba0d33096732235d440":hex:"009cd2f4edbe23e12346ae8c76dd9ad3230a62076141f16c152ba18513a48ef6f010e0e37fd3df10a1ec629a0cb5a3b5d2893007298c30936a95903b6ba85555d9ec3673a06108fd62a2fda56d1ce2e85c4db6b24a81ca3b496c36d4fd06eb7c9166d8e94877c42bea622b3bfe9251fdc21d8d5371badad78a488214796335b40b":int:0
RSASSA-PSS Signature Example 2_5
2:int:1025:int:16:char*:"016601e926a0f8c9e26ecab769ea65a5e7c52cc9e080ef519457c644da6891c5a104d3ea7955929a22e7c68a7af9fcad777c3ccc2b9e3d3650bce404399b7e59d1":int:16:char*:"014eafa1d4d0184da7e31f877d1281ddda625664869e8379e67ad3b75eae74a580e9827abd6eb7a002cb5411f5266797768fb8e95ae40e3e8a01f35ff89e56c079":int:16:char*:"01d40c1bcf97a68ae7cdbd8a7bf3e34fa19dcca4ef75a47454375f94514d88fed006fb829f8419ff87d6315da68a1ff3a0938e9abb3464011c303ad99199cf0c7c7a8b477dce829e8844f625b115e5e9c4a59cf8f8113b6834336a2fd2689b472cbb5e5cabe674350c59b6c17e176874fb42f8fc3d176a017edc61fd326c4b33c9":int:16:char*:"010001":exp:0:exp:0:hex:"86a83d4a72ee932a4f5630af6579a386b78fe88999e0abd2d49034a4bfc854dd94f1094e2e8cd7a179d19588e4aefc1b1bd25e95e3dd461f":hex:"17639a4e88d722c4fca24d079a8b29c32433b0c9":hex:"00ec430824931ebd3baa43034dae98ba646b8c36013d1671c3cf1cf8260c374b19f8e1cc8d965012405e7e9bf7378612dfcc85fce12cda11f950bd0ba8876740436c1d2595a64a1b32efcfb74a21c873b3cc33aaf4e3dc3953de67f0674c0453b4fd9f604406d441b816098cb106fe3472bc251f815f59db2e4378a3addc181ecf":int:0
RSASSA-PSS Signature Example 2_5 (verify)
3:int:1025:int:16:char*:"01d40c1bcf97a68ae7cdbd8a7bf3e34fa19dcca4ef75a47454375f94514d88fed006fb829f8419ff87d6315da68a1ff3a0938e9abb3464011c303ad99199cf0c7c7a8b477dce829e8844f625b115e5e9c4a59cf8f8113b6834336a2fd2689b472cbb5e5cabe674350c59b6c17e176874fb42f8fc3d176a017edc61fd326c4b33c9":int:16:char*:"010001":exp:0:exp:0:hex:"86a83d4a72ee932a4f5630af6579a386b78fe88999e0abd2d49034a4bfc854dd94f1094e2e8cd7a179d19588e4aefc1b1bd25e95e3dd461f":char*:"17639a4e88d722c4fca24d079a8b29c32433b0c9":hex:"00ec430824931ebd3baa43034dae98ba646b8c36013d1671c3cf1cf8260c374b19f8e1cc8d965012405e7e9bf7378612dfcc85fce12cda11f950bd0ba8876740436c1d2595a64a1b32efcfb74a21c873b3cc33aaf4e3dc3953de67f0674c0453b4fd9f604406d441b816098cb106fe3472bc251f815f59db2e4378a3addc181ecf":int:0
RSASSA-PSS Signature Example 2_6
2:int:1025:int:16:char*:"016601e926a0f8c9e26ecab769ea65a5e7c52cc9e080ef519457c644da6891c5a104d3ea7955929a22e7c68a7af9fcad777c3ccc2b9e3d3650bce404399b7e59d1":int:16:char*:"014eafa1d4d0184da7e31f877d1281ddda625664869e8379e67ad3b75eae74a580e9827abd6eb7a002cb5411f5266797768fb8e95ae40e3e8a01f35ff89e56c079":int:16:char*:"01d40c1bcf97a68ae7cdbd8a7bf3e34fa19dcca4ef75a47454375f94514d88fed006fb829f8419ff87d6315da68a1ff3a0938e9abb3464011c303ad99199cf0c7c7a8b477dce829e8844f625b115e5e9c4a59cf8f8113b6834336a2fd2689b472cbb5e5cabe674350c59b6c17e176874fb42f8fc3d176a017edc61fd326c4b33c9":int:16:char*:"010001":exp:0:exp:0:hex:"049f9154d871ac4a7c7ab45325ba7545a1ed08f70525b2667cf1":hex:"37810def1055ed922b063df798de5d0aabf886ee":hex:"00475b1648f814a8dc0abdc37b5527f543b666bb6e39d30e5b49d3b876dccc58eac14e32a2d55c2616014456ad2f246fc8e3d560da3ddf379a1c0bd200f10221df078c219a151bc8d4ec9d2fc2564467811014ef15d8ea01c2ebbff8c2c8efab38096e55fcbe3285c7aa558851254faffa92c1c72b78758663ef4582843139d7a6":int:0
RSASSA-PSS Signature Example 2_6 (verify)
3:int:1025:int:16:char*:"01d40c1bcf97a68ae7cdbd8a7bf3e34fa19dcca4ef75a47454375f94514d88fed006fb829f8419ff87d6315da68a1ff3a0938e9abb3464011c303ad99199cf0c7c7a8b477dce829e8844f625b115e5e9c4a59cf8f8113b6834336a2fd2689b472cbb5e5cabe674350c59b6c17e176874fb42f8fc3d176a017edc61fd326c4b33c9":int:16:char*:"010001":exp:0:exp:0:hex:"049f9154d871ac4a7c7ab45325ba7545a1ed08f70525b2667cf1":char*:"37810def1055ed922b063df798de5d0aabf886ee":hex:"00475b1648f814a8dc0abdc37b5527f543b666bb6e39d30e5b49d3b876dccc58eac14e32a2d55c2616014456ad2f246fc8e3d560da3ddf379a1c0bd200f10221df078c219a151bc8d4ec9d2fc2564467811014ef15d8ea01c2ebbff8c2c8efab38096e55fcbe3285c7aa558851254faffa92c1c72b78758663ef4582843139d7a6":int:0
RSASSA-PSS Signature Example 3_1
2:int:1026:int:16:char*:"01bd36e18ece4b0fdb2e9c9d548bd1a7d6e2c21c6fdc35074a1d05b1c6c8b3d558ea2639c9a9a421680169317252558bd148ad215aac550e2dcf12a82d0ebfe853":int:16:char*:"01b1b656ad86d8e19d5dc86292b3a192fdf6e0dd37877bad14822fa00190cab265f90d3f02057b6f54d6ecb14491e5adeacebc48bf0ebd2a2ad26d402e54f61651":int:16:char*:"02f246ef451ed3eebb9a310200cc25859c048e4be798302991112eb68ce6db674e280da21feded1ae74880ca522b18db249385012827c515f0e466a1ffa691d98170574e9d0eadb087586ca48933da3cc953d95bd0ed50de10ddcb6736107d6c831c7f663e833ca4c097e700ce0fb945f88fb85fe8e5a773172565b914a471a443":int:16:char*:"010001":exp:0:exp:0:hex:"594b37333bbb2c84524a87c1a01f75fcec0e3256f108e38dca36d70d0057":hex:"f31ad6c8cf89df78ed77feacbcc2f8b0a8e4cfaa":hex:"0088b135fb1794b6b96c4a3e678197f8cac52b64b2fe907d6f27de761124964a99a01a882740ecfaed6c01a47464bb05182313c01338a8cd097214cd68ca103bd57d3bc9e816213e61d784f182467abf8a01cf253e99a156eaa8e3e1f90e3c6e4e3aa2d83ed0345b89fafc9c26077c14b6ac51454fa26e446e3a2f153b2b16797f":int:0
RSASSA-PSS Signature Example 3_1 (verify)
3:int:1026:int:16:char*:"02f246ef451ed3eebb9a310200cc25859c048e4be798302991112eb68ce6db674e280da21feded1ae74880ca522b18db249385012827c515f0e466a1ffa691d98170574e9d0eadb087586ca48933da3cc953d95bd0ed50de10ddcb6736107d6c831c7f663e833ca4c097e700ce0fb945f88fb85fe8e5a773172565b914a471a443":int:16:char*:"010001":exp:0:exp:0:hex:"594b37333bbb2c84524a87c1a01f75fcec0e3256f108e38dca36d70d0057":char*:"f31ad6c8cf89df78ed77feacbcc2f8b0a8e4cfaa":hex:"0088b135fb1794b6b96c4a3e678197f8cac52b64b2fe907d6f27de761124964a99a01a882740ecfaed6c01a47464bb05182313c01338a8cd097214cd68ca103bd57d3bc9e816213e61d784f182467abf8a01cf253e99a156eaa8e3e1f90e3c6e4e3aa2d83ed0345b89fafc9c26077c14b6ac51454fa26e446e3a2f153b2b16797f":int:0
RSASSA-PSS Signature Example 3_2
2:int:1026:int:16:char*:"01bd36e18ece4b0fdb2e9c9d548bd1a7d6e2c21c6fdc35074a1d05b1c6c8b3d558ea2639c9a9a421680169317252558bd148ad215aac550e2dcf12a82d0ebfe853":int:16:char*:"01b1b656ad86d8e19d5dc86292b3a192fdf6e0dd37877bad14822fa00190cab265f90d3f02057b6f54d6ecb14491e5adeacebc48bf0ebd2a2ad26d402e54f61651":int:16:char*:"02f246ef451ed3eebb9a310200cc25859c048e4be798302991112eb68ce6db674e280da21feded1ae74880ca522b18db249385012827c515f0e466a1ffa691d98170574e9d0eadb087586ca48933da3cc953d95bd0ed50de10ddcb6736107d6c831c7f663e833ca4c097e700ce0fb945f88fb85fe8e5a773172565b914a471a443":int:16:char*:"010001":exp:0:exp:0:hex:"8b769528884a0d1ffd090cf102993e796dadcfbddd38e44ff6324ca451":hex:"fcf9f0e1f199a3d1d0da681c5b8606fc642939f7":hex:"02a5f0a858a0864a4f65017a7d69454f3f973a2999839b7bbc48bf78641169179556f595fa41f6ff18e286c2783079bc0910ee9cc34f49ba681124f923dfa88f426141a368a5f5a930c628c2c3c200e18a7644721a0cbec6dd3f6279bde3e8f2be5e2d4ee56f97e7ceaf33054be7042bd91a63bb09f897bd41e81197dee99b11af":int:0
RSASSA-PSS Signature Example 3_2 (verify)
3:int:1026:int:16:char*:"02f246ef451ed3eebb9a310200cc25859c048e4be798302991112eb68ce6db674e280da21feded1ae74880ca522b18db249385012827c515f0e466a1ffa691d98170574e9d0eadb087586ca48933da3cc953d95bd0ed50de10ddcb6736107d6c831c7f663e833ca4c097e700ce0fb945f88fb85fe8e5a773172565b914a471a443":int:16:char*:"010001":exp:0:exp:0:hex:"8b769528884a0d1ffd090cf102993e796dadcfbddd38e44ff6324ca451":char*:"fcf9f0e1f199a3d1d0da681c5b8606fc642939f7":hex:"02a5f0a858a0864a4f65017a7d69454f3f973a2999839b7bbc48bf78641169179556f595fa41f6ff18e286c2783079bc0910ee9cc34f49ba681124f923dfa88f426141a368a5f5a930c628c2c3c200e18a7644721a0cbec6dd3f6279bde3e8f2be5e2d4ee56f97e7ceaf33054be7042bd91a63bb09f897bd41e81197dee99b11af":int:0
RSASSA-PSS Signature Example 3_3
2:int:1026:int:16:char*:"01bd36e18ece4b0fdb2e9c9d548bd1a7d6e2c21c6fdc35074a1d05b1c6c8b3d558ea2639c9a9a421680169317252558bd148ad215aac550e2dcf12a82d0ebfe853":int:16:char*:"01b1b656ad86d8e19d5dc86292b3a192fdf6e0dd37877bad14822fa00190cab265f90d3f02057b6f54d6ecb14491e5adeacebc48bf0ebd2a2ad26d402e54f61651":int:16:char*:"02f246ef451ed3eebb9a310200cc25859c048e4be798302991112eb68ce6db674e280da21feded1ae74880ca522b18db249385012827c515f0e466a1ffa691d98170574e9d0eadb087586ca48933da3cc953d95bd0ed50de10ddcb6736107d6c831c7f663e833ca4c097e700ce0fb945f88fb85fe8e5a773172565b914a471a443":int:16:char*:"010001":exp:0:exp:0:hex:"1abdba489c5ada2f995ed16f19d5a94d9e6ec34a8d84f84557d26e5ef9b02b22887e3f9a4b690ad1149209c20c61431f0c017c36c2657b35d7b07d3f5ad8708507a9c1b831df835a56f831071814ea5d3d8d8f6ade40cba38b42db7a2d3d7a29c8f0a79a7838cf58a9757fa2fe4c40df9baa193bfc6f92b123ad57b07ace3e6ac068c9f106afd9eeb03b4f37c25dbfbcfb3071f6f9771766d072f3bb070af6605532973ae25051":hex:"986e7c43dbb671bd41b9a7f4b6afc80e805f2423":hex:"0244bcd1c8c16955736c803be401272e18cb990811b14f72db964124d5fa760649cbb57afb8755dbb62bf51f466cf23a0a1607576e983d778fceffa92df7548aea8ea4ecad2c29dd9f95bc07fe91ecf8bee255bfe8762fd7690aa9bfa4fa0849ef728c2c42c4532364522df2ab7f9f8a03b63f7a499175828668f5ef5a29e3802c":int:0
RSASSA-PSS Signature Example 3_3 (verify)
3:int:1026:int:16:char*:"02f246ef451ed3eebb9a310200cc25859c048e4be798302991112eb68ce6db674e280da21feded1ae74880ca522b18db249385012827c515f0e466a1ffa691d98170574e9d0eadb087586ca48933da3cc953d95bd0ed50de10ddcb6736107d6c831c7f663e833ca4c097e700ce0fb945f88fb85fe8e5a773172565b914a471a443":int:16:char*:"010001":exp:0:exp:0:hex:"1abdba489c5ada2f995ed16f19d5a94d9e6ec34a8d84f84557d26e5ef9b02b22887e3f9a4b690ad1149209c20c61431f0c017c36c2657b35d7b07d3f5ad8708507a9c1b831df835a56f831071814ea5d3d8d8f6ade40cba38b42db7a2d3d7a29c8f0a79a7838cf58a9757fa2fe4c40df9baa193bfc6f92b123ad57b07ace3e6ac068c9f106afd9eeb03b4f37c25dbfbcfb3071f6f9771766d072f3bb070af6605532973ae25051":char*:"986e7c43dbb671bd41b9a7f4b6afc80e805f2423":hex:"0244bcd1c8c16955736c803be401272e18cb990811b14f72db964124d5fa760649cbb57afb8755dbb62bf51f466cf23a0a1607576e983d778fceffa92df7548aea8ea4ecad2c29dd9f95bc07fe91ecf8bee255bfe8762fd7690aa9bfa4fa0849ef728c2c42c4532364522df2ab7f9f8a03b63f7a499175828668f5ef5a29e3802c":int:0
RSASSA-PSS Signature Example 3_4
2:int:1026:int:16:char*:"01bd36e18ece4b0fdb2e9c9d548bd1a7d6e2c21c6fdc35074a1d05b1c6c8b3d558ea2639c9a9a421680169317252558bd148ad215aac550e2dcf12a82d0ebfe853":int:16:char*:"01b1b656ad86d8e19d5dc86292b3a192fdf6e0dd37877bad14822fa00190cab265f90d3f02057b6f54d6ecb14491e5adeacebc48bf0ebd2a2ad26d402e54f61651":int:16:char*:"02f246ef451ed3eebb9a310200cc25859c048e4be798302991112eb68ce6db674e280da21feded1ae74880ca522b18db249385012827c515f0e466a1ffa691d98170574e9d0eadb087586ca48933da3cc953d95bd0ed50de10ddcb6736107d6c831c7f663e833ca4c097e700ce0fb945f88fb85fe8e5a773172565b914a471a443":int:16:char*:"010001":exp:0:exp:0:hex:"8fb431f5ee792b6c2ac7db53cc428655aeb32d03f4e889c5c25de683c461b53acf89f9f8d3aabdf6b9f0c2a1de12e15b49edb3919a652fe9491c25a7fce1f722c2543608b69dc375ec":hex:"f8312d9c8eea13ec0a4c7b98120c87509087c478":hex:"0196f12a005b98129c8df13c4cb16f8aa887d3c40d96df3a88e7532ef39cd992f273abc370bc1be6f097cfebbf0118fd9ef4b927155f3df22b904d90702d1f7ba7a52bed8b8942f412cd7bd676c9d18e170391dcd345c06a730964b3f30bcce0bb20ba106f9ab0eeb39cf8a6607f75c0347f0af79f16afa081d2c92d1ee6f836b8":int:0
RSASSA-PSS Signature Example 3_4 (verify)
3:int:1026:int:16:char*:"02f246ef451ed3eebb9a310200cc25859c048e4be798302991112eb68ce6db674e280da21feded1ae74880ca522b18db249385012827c515f0e466a1ffa691d98170574e9d0eadb087586ca48933da3cc953d95bd0ed50de10ddcb6736107d6c831c7f663e833ca4c097e700ce0fb945f88fb85fe8e5a773172565b914a471a443":int:16:char*:"010001":exp:0:exp:0:hex:"8fb431f5ee792b6c2ac7db53cc428655aeb32d03f4e889c5c25de683c461b53acf89f9f8d3aabdf6b9f0c2a1de12e15b49edb3919a652fe9491c25a7fce1f722c2543608b69dc375ec":char*:"f8312d9c8eea13ec0a4c7b98120c87509087c478":hex:"0196f12a005b98129c8df13c4cb16f8aa887d3c40d96df3a88e7532ef39cd992f273abc370bc1be6f097cfebbf0118fd9ef4b927155f3df22b904d90702d1f7ba7a52bed8b8942f412cd7bd676c9d18e170391dcd345c06a730964b3f30bcce0bb20ba106f9ab0eeb39cf8a6607f75c0347f0af79f16afa081d2c92d1ee6f836b8":int:0
RSASSA-PSS Signature Example 3_5
2:int:1026:int:16:char*:"01bd36e18ece4b0fdb2e9c9d548bd1a7d6e2c21c6fdc35074a1d05b1c6c8b3d558ea2639c9a9a421680169317252558bd148ad215aac550e2dcf12a82d0ebfe853":int:16:char*:"01b1b656ad86d8e19d5dc86292b3a192fdf6e0dd37877bad14822fa00190cab265f90d3f02057b6f54d6ecb14491e5adeacebc48bf0ebd2a2ad26d402e54f61651":int:16:char*:"02f246ef451ed3eebb9a310200cc25859c048e4be798302991112eb68ce6db674e280da21feded1ae74880ca522b18db249385012827c515f0e466a1ffa691d98170574e9d0eadb087586ca48933da3cc953d95bd0ed50de10ddcb6736107d6c831c7f663e833ca4c097e700ce0fb945f88fb85fe8e5a773172565b914a471a443":int:16:char*:"010001":exp:0:exp:0:hex:"fef4161dfaaf9c5295051dfc1ff3810c8c9ec2e866f7075422c8ec4216a9c4ff49427d483cae10c8534a41b2fd15fee06960ec6fb3f7a7e94a2f8a2e3e43dc4a40576c3097ac953b1de86f0b4ed36d644f23ae14425529622464ca0cbf0b1741347238157fab59e4de5524096d62baec63ac64":hex:"50327efec6292f98019fc67a2a6638563e9b6e2d":hex:"021eca3ab4892264ec22411a752d92221076d4e01c0e6f0dde9afd26ba5acf6d739ef987545d16683e5674c9e70f1de649d7e61d48d0caeb4fb4d8b24fba84a6e3108fee7d0705973266ac524b4ad280f7ae17dc59d96d3351586b5a3bdb895d1e1f7820ac6135d8753480998382ba32b7349559608c38745290a85ef4e9f9bd83":int:0
RSASSA-PSS Signature Example 3_5 (verify)
3:int:1026:int:16:char*:"02f246ef451ed3eebb9a310200cc25859c048e4be798302991112eb68ce6db674e280da21feded1ae74880ca522b18db249385012827c515f0e466a1ffa691d98170574e9d0eadb087586ca48933da3cc953d95bd0ed50de10ddcb6736107d6c831c7f663e833ca4c097e700ce0fb945f88fb85fe8e5a773172565b914a471a443":int:16:char*:"010001":exp:0:exp:0:hex:"fef4161dfaaf9c5295051dfc1ff3810c8c9ec2e866f7075422c8ec4216a9c4ff49427d483cae10c8534a41b2fd15fee06960ec6fb3f7a7e94a2f8a2e3e43dc4a40576c3097ac953b1de86f0b4ed36d644f23ae14425529622464ca0cbf0b1741347238157fab59e4de5524096d62baec63ac64":char*:"50327efec6292f98019fc67a2a6638563e9b6e2d":hex:"021eca3ab4892264ec22411a752d92221076d4e01c0e6f0dde9afd26ba5acf6d739ef987545d16683e5674c9e70f1de649d7e61d48d0caeb4fb4d8b24fba84a6e3108fee7d0705973266ac524b4ad280f7ae17dc59d96d3351586b5a3bdb895d1e1f7820ac6135d8753480998382ba32b7349559608c38745290a85ef4e9f9bd83":int:0
RSASSA-PSS Signature Example 3_6
2:int:1026:int:16:char*:"01bd36e18ece4b0fdb2e9c9d548bd1a7d6e2c21c6fdc35074a1d05b1c6c8b3d558ea2639c9a9a421680169317252558bd148ad215aac550e2dcf12a82d0ebfe853":int:16:char*:"01b1b656ad86d8e19d5dc86292b3a192fdf6e0dd37877bad14822fa00190cab265f90d3f02057b6f54d6ecb14491e5adeacebc48bf0ebd2a2ad26d402e54f61651":int:16:char*:"02f246ef451ed3eebb9a310200cc25859c048e4be798302991112eb68ce6db674e280da21feded1ae74880ca522b18db249385012827c515f0e466a1ffa691d98170574e9d0eadb087586ca48933da3cc953d95bd0ed50de10ddcb6736107d6c831c7f663e833ca4c097e700ce0fb945f88fb85fe8e5a773172565b914a471a443":int:16:char*:"010001":exp:0:exp:0:hex:"efd237bb098a443aeeb2bf6c3f8c81b8c01b7fcb3feb":hex:"b0de3fc25b65f5af96b1d5cc3b27d0c6053087b3":hex:"012fafec862f56e9e92f60ab0c77824f4299a0ca734ed26e0644d5d222c7f0bde03964f8e70a5cb65ed44e44d56ae0edf1ff86ca032cc5dd4404dbb76ab854586c44eed8336d08d457ce6c03693b45c0f1efef93624b95b8ec169c616d20e5538ebc0b6737a6f82b4bc0570924fc6b35759a3348426279f8b3d7744e2d222426ce":int:0
RSASSA-PSS Signature Example 3_6 (verify)
3:int:1026:int:16:char*:"02f246ef451ed3eebb9a310200cc25859c048e4be798302991112eb68ce6db674e280da21feded1ae74880ca522b18db249385012827c515f0e466a1ffa691d98170574e9d0eadb087586ca48933da3cc953d95bd0ed50de10ddcb6736107d6c831c7f663e833ca4c097e700ce0fb945f88fb85fe8e5a773172565b914a471a443":int:16:char*:"010001":exp:0:exp:0:hex:"efd237bb098a443aeeb2bf6c3f8c81b8c01b7fcb3feb":char*:"b0de3fc25b65f5af96b1d5cc3b27d0c6053087b3":hex:"012fafec862f56e9e92f60ab0c77824f4299a0ca734ed26e0644d5d222c7f0bde03964f8e70a5cb65ed44e44d56ae0edf1ff86ca032cc5dd4404dbb76ab854586c44eed8336d08d457ce6c03693b45c0f1efef93624b95b8ec169c616d20e5538ebc0b6737a6f82b4bc0570924fc6b35759a3348426279f8b3d7744e2d222426ce":int:0
RSASSA-PSS Signature Example 4_1
2:int:1027:int:16:char*:"029232336d2838945dba9dd7723f4e624a05f7375b927a87abe6a893a1658fd49f47f6c7b0fa596c65fa68a23f0ab432962d18d4343bd6fd671a5ea8d148413995":int:16:char*:"020ef5efe7c5394aed2272f7e81a74f4c02d145894cb1b3cab23a9a0710a2afc7e3329acbb743d01f680c4d02afb4c8fde7e20930811bb2b995788b5e872c20bb1":int:16:char*:"054adb7886447efe6f57e0368f06cf52b0a3370760d161cef126b91be7f89c421b62a6ec1da3c311d75ed50e0ab5fff3fd338acc3aa8a4e77ee26369acb81ba900fa83f5300cf9bb6c53ad1dc8a178b815db4235a9a9da0c06de4e615ea1277ce559e9c108de58c14a81aa77f5a6f8d1335494498848c8b95940740be7bf7c3705":int:16:char*:"010001":exp:0:exp:0:hex:"9fb03b827c8217d9":hex:"ed7c98c95f30974fbe4fbddcf0f28d6021c0e91d":hex:"0323d5b7bf20ba4539289ae452ae4297080feff4518423ff4811a817837e7d82f1836cdfab54514ff0887bddeebf40bf99b047abc3ecfa6a37a3ef00f4a0c4a88aae0904b745c846c4107e8797723e8ac810d9e3d95dfa30ff4966f4d75d13768d20857f2b1406f264cfe75e27d7652f4b5ed3575f28a702f8c4ed9cf9b2d44948":int:0
RSASSA-PSS Signature Example 4_1 (verify)
3:int:1027:int:16:char*:"054adb7886447efe6f57e0368f06cf52b0a3370760d161cef126b91be7f89c421b62a6ec1da3c311d75ed50e0ab5fff3fd338acc3aa8a4e77ee26369acb81ba900fa83f5300cf9bb6c53ad1dc8a178b815db4235a9a9da0c06de4e615ea1277ce559e9c108de58c14a81aa77f5a6f8d1335494498848c8b95940740be7bf7c3705":int:16:char*:"010001":exp:0:exp:0:hex:"9fb03b827c8217d9":char*:"ed7c98c95f30974fbe4fbddcf0f28d6021c0e91d":hex:"0323d5b7bf20ba4539289ae452ae4297080feff4518423ff4811a817837e7d82f1836cdfab54514ff0887bddeebf40bf99b047abc3ecfa6a37a3ef00f4a0c4a88aae0904b745c846c4107e8797723e8ac810d9e3d95dfa30ff4966f4d75d13768d20857f2b1406f264cfe75e27d7652f4b5ed3575f28a702f8c4ed9cf9b2d44948":int:0
RSASSA-PSS Signature Example 4_2
2:int:1027:int:16:char*:"029232336d2838945dba9dd7723f4e624a05f7375b927a87abe6a893a1658fd49f47f6c7b0fa596c65fa68a23f0ab432962d18d4343bd6fd671a5ea8d148413995":int:16:char*:"020ef5efe7c5394aed2272f7e81a74f4c02d145894cb1b3cab23a9a0710a2afc7e3329acbb743d01f680c4d02afb4c8fde7e20930811bb2b995788b5e872c20bb1":int:16:char*:"054adb7886447efe6f57e0368f06cf52b0a3370760d161cef126b91be7f89c421b62a6ec1da3c311d75ed50e0ab5fff3fd338acc3aa8a4e77ee26369acb81ba900fa83f5300cf9bb6c53ad1dc8a178b815db4235a9a9da0c06de4e615ea1277ce559e9c108de58c14a81aa77f5a6f8d1335494498848c8b95940740be7bf7c3705":int:16:char*:"010001":exp:0:exp:0:hex:"0ca2ad77797ece86de5bf768750ddb5ed6a3116ad99bbd17edf7f782f0db1cd05b0f677468c5ea420dc116b10e80d110de2b0461ea14a38be68620392e7e893cb4ea9393fb886c20ff790642305bf302003892e54df9f667509dc53920df583f50a3dd61abb6fab75d600377e383e6aca6710eeea27156e06752c94ce25ae99fcbf8592dbe2d7e27453cb44de07100ebb1a2a19811a478adbeab270f94e8fe369d90b3ca612f9f":hex:"22d71d54363a4217aa55113f059b3384e3e57e44":hex:"049d0185845a264d28feb1e69edaec090609e8e46d93abb38371ce51f4aa65a599bdaaa81d24fba66a08a116cb644f3f1e653d95c89db8bbd5daac2709c8984000178410a7c6aa8667ddc38c741f710ec8665aa9052be929d4e3b16782c1662114c5414bb0353455c392fc28f3db59054b5f365c49e1d156f876ee10cb4fd70598":int:0
RSASSA-PSS Signature Example 4_2 (verify)
3:int:1027:int:16:char*:"054adb7886447efe6f57e0368f06cf52b0a3370760d161cef126b91be7f89c421b62a6ec1da3c311d75ed50e0ab5fff3fd338acc3aa8a4e77ee26369acb81ba900fa83f5300cf9bb6c53ad1dc8a178b815db4235a9a9da0c06de4e615ea1277ce559e9c108de58c14a81aa77f5a6f8d1335494498848c8b95940740be7bf7c3705":int:16:char*:"010001":exp:0:exp:0:hex:"0ca2ad77797ece86de5bf768750ddb5ed6a3116ad99bbd17edf7f782f0db1cd05b0f677468c5ea420dc116b10e80d110de2b0461ea14a38be68620392e7e893cb4ea9393fb886c20ff790642305bf302003892e54df9f667509dc53920df583f50a3dd61abb6fab75d600377e383e6aca6710eeea27156e06752c94ce25ae99fcbf8592dbe2d7e27453cb44de07100ebb1a2a19811a478adbeab270f94e8fe369d90b3ca612f9f":char*:"22d71d54363a4217aa55113f059b3384e3e57e44":hex:"049d0185845a264d28feb1e69edaec090609e8e46d93abb38371ce51f4aa65a599bdaaa81d24fba66a08a116cb644f3f1e653d95c89db8bbd5daac2709c8984000178410a7c6aa8667ddc38c741f710ec8665aa9052be929d4e3b16782c1662114c5414bb0353455c392fc28f3db59054b5f365c49e1d156f876ee10cb4fd70598":int:0
RSASSA-PSS Signature Example 4_3
2:int:1027:int:16:char*:"029232336d2838945dba9dd7723f4e624a05f7375b927a87abe6a893a1658fd49f47f6c7b0fa596c65fa68a23f0ab432962d18d4343bd6fd671a5ea8d148413995":int:16:char*:"020ef5efe7c5394aed2272f7e81a74f4c02d145894cb1b3cab23a9a0710a2afc7e3329acbb743d01f680c4d02afb4c8fde7e20930811bb2b995788b5e872c20bb1":int:16:char*:"054adb7886447efe6f57e0368f06cf52b0a3370760d161cef126b91be7f89c421b62a6ec1da3c311d75ed50e0ab5fff3fd338acc3aa8a4e77ee26369acb81ba900fa83f5300cf9bb6c53ad1dc8a178b815db4235a9a9da0c06de4e615ea1277ce559e9c108de58c14a81aa77f5a6f8d1335494498848c8b95940740be7bf7c3705":int:16:char*:"010001":exp:0:exp:0:hex:"288062afc08fcdb7c5f8650b29837300461dd5676c17a20a3c8fb5148949e3f73d66b3ae82c7240e27c5b3ec4328ee7d6ddf6a6a0c9b5b15bcda196a9d0c76b119d534d85abd123962d583b76ce9d180bce1ca":hex:"4af870fbc6516012ca916c70ba862ac7e8243617":hex:"03fbc410a2ced59500fb99f9e2af2781ada74e13145624602782e2994813eefca0519ecd253b855fb626a90d771eae028b0c47a199cbd9f8e3269734af4163599090713a3fa910fa0960652721432b971036a7181a2bc0cab43b0b598bc6217461d7db305ff7e954c5b5bb231c39e791af6bcfa76b147b081321f72641482a2aad":int:0
RSASSA-PSS Signature Example 4_3 (verify)
3:int:1027:int:16:char*:"054adb7886447efe6f57e0368f06cf52b0a3370760d161cef126b91be7f89c421b62a6ec1da3c311d75ed50e0ab5fff3fd338acc3aa8a4e77ee26369acb81ba900fa83f5300cf9bb6c53ad1dc8a178b815db4235a9a9da0c06de4e615ea1277ce559e9c108de58c14a81aa77f5a6f8d1335494498848c8b95940740be7bf7c3705":int:16:char*:"010001":exp:0:exp:0:hex:"288062afc08fcdb7c5f8650b29837300461dd5676c17a20a3c8fb5148949e3f73d66b3ae82c7240e27c5b3ec4328ee7d6ddf6a6a0c9b5b15bcda196a9d0c76b119d534d85abd123962d583b76ce9d180bce1ca":char*:"4af870fbc6516012ca916c70ba862ac7e8243617":hex:"03fbc410a2ced59500fb99f9e2af2781ada74e13145624602782e2994813eefca0519ecd253b855fb626a90d771eae028b0c47a199cbd9f8e3269734af4163599090713a3fa910fa0960652721432b971036a7181a2bc0cab43b0b598bc6217461d7db305ff7e954c5b5bb231c39e791af6bcfa76b147b081321f72641482a2aad":int:0
RSASSA-PSS Signature Example 4_4
2:int:1027:int:16:char*:"029232336d2838945dba9dd7723f4e624a05f7375b927a87abe6a893a1658fd49f47f6c7b0fa596c65fa68a23f0ab432962d18d4343bd6fd671a5ea8d148413995":int:16:char*:"020ef5efe7c5394aed2272f7e81a74f4c02d145894cb1b3cab23a9a0710a2afc7e3329acbb743d01f680c4d02afb4c8fde7e20930811bb2b995788b5e872c20bb1":int:16:char*:"054adb7886447efe6f57e0368f06cf52b0a3370760d161cef126b91be7f89c421b62a6ec1da3c311d75ed50e0ab5fff3fd338acc3aa8a4e77ee26369acb81ba900fa83f5300cf9bb6c53ad1dc8a178b815db4235a9a9da0c06de4e615ea1277ce559e9c108de58c14a81aa77f5a6f8d1335494498848c8b95940740be7bf7c3705":int:16:char*:"010001":exp:0:exp:0:hex:"6f4f9ab9501199cef55c6cf408fe7b36c557c49d420a4763d2463c8ad44b3cfc5be2742c0e7d9b0f6608f08c7f47b693ee":hex:"40d2e180fae1eac439c190b56c2c0e14ddf9a226":hex:"0486644bc66bf75d28335a6179b10851f43f09bded9fac1af33252bb9953ba4298cd6466b27539a70adaa3f89b3db3c74ab635d122f4ee7ce557a61e59b82ffb786630e5f9db53c77d9a0c12fab5958d4c2ce7daa807cd89ba2cc7fcd02ff470ca67b229fcce814c852c73cc93bea35be68459ce478e9d4655d121c8472f371d4f":int:0
RSASSA-PSS Signature Example 4_4 (verify)
3:int:1027:int:16:char*:"054adb7886447efe6f57e0368f06cf52b0a3370760d161cef126b91be7f89c421b62a6ec1da3c311d75ed50e0ab5fff3fd338acc3aa8a4e77ee26369acb81ba900fa83f5300cf9bb6c53ad1dc8a178b815db4235a9a9da0c06de4e615ea1277ce559e9c108de58c14a81aa77f5a6f8d1335494498848c8b95940740be7bf7c3705":int:16:char*:"010001":exp:0:exp:0:hex:"6f4f9ab9501199cef55c6cf408fe7b36c557c49d420a4763d2463c8ad44b3cfc5be2742c0e7d9b0f6608f08c7f47b693ee":char*:"40d2e180fae1eac439c190b56c2c0e14ddf9a226":hex:"0486644bc66bf75d28335a6179b10851f43f09bded9fac1af33252bb9953ba4298cd6466b27539a70adaa3f89b3db3c74ab635d122f4ee7ce557a61e59b82ffb786630e5f9db53c77d9a0c12fab5958d4c2ce7daa807cd89ba2cc7fcd02ff470ca67b229fcce814c852c73cc93bea35be68459ce478e9d4655d121c8472f371d4f":int:0
RSASSA-PSS Signature Example 4_5
2:int:1027:int:16:char*:"029232336d2838945dba9dd7723f4e624a05f7375b927a87abe6a893a1658fd49f47f6c7b0fa596c65fa68a23f0ab432962d18d4343bd6fd671a5ea8d148413995":int:16:char*:"020ef5efe7c5394aed2272f7e81a74f4c02d145894cb1b3cab23a9a0710a2afc7e3329acbb743d01f680c4d02afb4c8fde7e20930811bb2b995788b5e872c20bb1":int:16:char*:"054adb7886447efe6f57e0368f06cf52b0a3370760d161cef126b91be7f89c421b62a6ec1da3c311d75ed50e0ab5fff3fd338acc3aa8a4e77ee26369acb81ba900fa83f5300cf9bb6c53ad1dc8a178b815db4235a9a9da0c06de4e615ea1277ce559e9c108de58c14a81aa77f5a6f8d1335494498848c8b95940740be7bf7c3705":int:16:char*:"010001":exp:0:exp:0:hex:"e17d20385d501955823c3f666254c1d3dd36ad5168b8f18d286fdcf67a7dad94097085fab7ed86fe2142a28771717997ef1a7a08884efc39356d76077aaf82459a7fad45848875f2819b098937fe923bcc9dc442d72d754d812025090c9bc03db3080c138dd63b355d0b4b85d6688ac19f4de15084a0ba4e373b93ef4a555096691915dc23c00e954cdeb20a47cd55d16c3d8681d46ed7f2ed5ea42795be17baed25f0f4d113b3636addd585f16a8b5aec0c8fa9c5f03cbf3b9b73":hex:"2497dc2b4615dfae5a663d49ffd56bf7efc11304":hex:"022a80045353904cb30cbb542d7d4990421a6eec16a8029a8422adfd22d6aff8c4cc0294af110a0c067ec86a7d364134459bb1ae8ff836d5a8a2579840996b320b19f13a13fad378d931a65625dae2739f0c53670b35d9d3cbac08e733e4ec2b83af4b9196d63e7c4ff1ddeae2a122791a125bfea8deb0de8ccf1f4ffaf6e6fb0a":int:0
RSASSA-PSS Signature Example 4_5 (verify)
3:int:1027:int:16:char*:"054adb7886447efe6f57e0368f06cf52b0a3370760d161cef126b91be7f89c421b62a6ec1da3c311d75ed50e0ab5fff3fd338acc3aa8a4e77ee26369acb81ba900fa83f5300cf9bb6c53ad1dc8a178b815db4235a9a9da0c06de4e615ea1277ce559e9c108de58c14a81aa77f5a6f8d1335494498848c8b95940740be7bf7c3705":int:16:char*:"010001":exp:0:exp:0:hex:"e17d20385d501955823c3f666254c1d3dd36ad5168b8f18d286fdcf67a7dad94097085fab7ed86fe2142a28771717997ef1a7a08884efc39356d76077aaf82459a7fad45848875f2819b098937fe923bcc9dc442d72d754d812025090c9bc03db3080c138dd63b355d0b4b85d6688ac19f4de15084a0ba4e373b93ef4a555096691915dc23c00e954cdeb20a47cd55d16c3d8681d46ed7f2ed5ea42795be17baed25f0f4d113b3636addd585f16a8b5aec0c8fa9c5f03cbf3b9b73":char*:"2497dc2b4615dfae5a663d49ffd56bf7efc11304":hex:"022a80045353904cb30cbb542d7d4990421a6eec16a8029a8422adfd22d6aff8c4cc0294af110a0c067ec86a7d364134459bb1ae8ff836d5a8a2579840996b320b19f13a13fad378d931a65625dae2739f0c53670b35d9d3cbac08e733e4ec2b83af4b9196d63e7c4ff1ddeae2a122791a125bfea8deb0de8ccf1f4ffaf6e6fb0a":int:0
RSASSA-PSS Signature Example 4_6
2:int:1027:int:16:char*:"029232336d2838945dba9dd7723f4e624a05f7375b927a87abe6a893a1658fd49f47f6c7b0fa596c65fa68a23f0ab432962d18d4343bd6fd671a5ea8d148413995":int:16:char*:"020ef5efe7c5394aed2272f7e81a74f4c02d145894cb1b3cab23a9a0710a2afc7e3329acbb743d01f680c4d02afb4c8fde7e20930811bb2b995788b5e872c20bb1":int:16:char*:"054adb7886447efe6f57e0368f06cf52b0a3370760d161cef126b91be7f89c421b62a6ec1da3c311d75ed50e0ab5fff3fd338acc3aa8a4e77ee26369acb81ba900fa83f5300cf9bb6c53ad1dc8a178b815db4235a9a9da0c06de4e615ea1277ce559e9c108de58c14a81aa77f5a6f8d1335494498848c8b95940740be7bf7c3705":int:16:char*:"010001":exp:0:exp:0:hex:"afbc19d479249018fdf4e09f618726440495de11ddeee38872d775fcea74a23896b5343c9c38d46af0dba224d047580cc60a65e9391cf9b59b36a860598d4e8216722f993b91cfae87bc255af89a6a199bca4a391eadbc3a24903c0bd667368f6be78e3feabfb4ffd463122763740ffbbefeab9a25564bc5d1c24c93e422f75073e2ad72bf45b10df00b52a147128e73fee33fa3f0577d77f80fbc2df1bed313290c12777f50":hex:"a334db6faebf11081a04f87c2d621cdec7930b9b":hex:"00938dcb6d583046065f69c78da7a1f1757066a7fa75125a9d2929f0b79a60b627b082f11f5b196f28eb9daa6f21c05e5140f6aef1737d2023075c05ecf04a028c686a2ab3e7d5a0664f295ce12995e890908b6ad21f0839eb65b70393a7b5afd9871de0caa0cedec5b819626756209d13ab1e7bb9546a26ff37e9a51af9fd562e":int:0
RSASSA-PSS Signature Example 4_6 (verify)
3:int:1027:int:16:char*:"054adb7886447efe6f57e0368f06cf52b0a3370760d161cef126b91be7f89c421b62a6ec1da3c311d75ed50e0ab5fff3fd338acc3aa8a4e77ee26369acb81ba900fa83f5300cf9bb6c53ad1dc8a178b815db4235a9a9da0c06de4e615ea1277ce559e9c108de58c14a81aa77f5a6f8d1335494498848c8b95940740be7bf7c3705":int:16:char*:"010001":exp:0:exp:0:hex:"afbc19d479249018fdf4e09f618726440495de11ddeee38872d775fcea74a23896b5343c9c38d46af0dba224d047580cc60a65e9391cf9b59b36a860598d4e8216722f993b91cfae87bc255af89a6a199bca4a391eadbc3a24903c0bd667368f6be78e3feabfb4ffd463122763740ffbbefeab9a25564bc5d1c24c93e422f75073e2ad72bf45b10df00b52a147128e73fee33fa3f0577d77f80fbc2df1bed313290c12777f50":char*:"a334db6faebf11081a04f87c2d621cdec7930b9b":hex:"00938dcb6d583046065f69c78da7a1f1757066a7fa75125a9d2929f0b79a60b627b082f11f5b196f28eb9daa6f21c05e5140f6aef1737d2023075c05ecf04a028c686a2ab3e7d5a0664f295ce12995e890908b6ad21f0839eb65b70393a7b5afd9871de0caa0cedec5b819626756209d13ab1e7bb9546a26ff37e9a51af9fd562e":int:0
RSASSA-PSS Signature Example 5_1
2:int:1028:int:16:char*:"03f2f331f4142d4f24b43aa10279a89652d4e7537221a1a7b2a25deb551e5de9ac497411c227a94e45f91c2d1c13cc046cf4ce14e32d058734210d44a87ee1b73f":int:16:char*:"034f090d73b55803030cf0361a5d8081bfb79f851523feac0a2124d08d4013ff08487771a870d0479dc0686c62f7718dfecf024b17c9267678059171339cc00839":int:16:char*:"0d10f661f29940f5ed39aa260966deb47843679d2b6fb25b3de370f3ac7c19916391fd25fb527ebfa6a4b4df45a1759d996c4bb4ebd18828c44fc52d0191871740525f47a4b0cc8da325ed8aa676b0d0f626e0a77f07692170acac8082f42faa7dc7cd123e730e31a87985204cabcbe6670d43a2dd2b2ddef5e05392fc213bc507":int:16:char*:"010001":exp:0:exp:0:hex:"30c7d557458b436decfdc14d06cb7b96b06718c48d7de57482a868ae7f065870a6216506d11b779323dfdf046cf5775129134b4d5689e4d9c0ce1e12d7d4b06cb5fc5820decfa41baf59bf257b32f025b7679b445b9499c92555145885992f1b76f84891ee4d3be0f5150fd5901e3a4c8ed43fd36b61d022e65ad5008dbf33293c22bfbfd07321f0f1d5fa9fdf0014c2fcb0358aad0e354b0d29":hex:"081b233b43567750bd6e78f396a88b9f6a445151":hex:"0ba373f76e0921b70a8fbfe622f0bf77b28a3db98e361051c3d7cb92ad0452915a4de9c01722f6823eeb6adf7e0ca8290f5de3e549890ac2a3c5950ab217ba58590894952de96f8df111b2575215da6c161590c745be612476ee578ed384ab33e3ece97481a252f5c79a98b5532ae00cdd62f2ecc0cd1baefe80d80b962193ec1d":int:0
RSASSA-PSS Signature Example 5_1 (verify)
3:int:1028:int:16:char*:"0d10f661f29940f5ed39aa260966deb47843679d2b6fb25b3de370f3ac7c19916391fd25fb527ebfa6a4b4df45a1759d996c4bb4ebd18828c44fc52d0191871740525f47a4b0cc8da325ed8aa676b0d0f626e0a77f07692170acac8082f42faa7dc7cd123e730e31a87985204cabcbe6670d43a2dd2b2ddef5e05392fc213bc507":int:16:char*:"010001":exp:0:exp:0:hex:"30c7d557458b436decfdc14d06cb7b96b06718c48d7de57482a868ae7f065870a6216506d11b779323dfdf046cf5775129134b4d5689e4d9c0ce1e12d7d4b06cb5fc5820decfa41baf59bf257b32f025b7679b445b9499c92555145885992f1b76f84891ee4d3be0f5150fd5901e3a4c8ed43fd36b61d022e65ad5008dbf33293c22bfbfd07321f0f1d5fa9fdf0014c2fcb0358aad0e354b0d29":char*:"081b233b43567750bd6e78f396a88b9f6a445151":hex:"0ba373f76e0921b70a8fbfe622f0bf77b28a3db98e361051c3d7cb92ad0452915a4de9c01722f6823eeb6adf7e0ca8290f5de3e549890ac2a3c5950ab217ba58590894952de96f8df111b2575215da6c161590c745be612476ee578ed384ab33e3ece97481a252f5c79a98b5532ae00cdd62f2ecc0cd1baefe80d80b962193ec1d":int:0
RSASSA-PSS Signature Example 5_2
2:int:1028:int:16:char*:"03f2f331f4142d4f24b43aa10279a89652d4e7537221a1a7b2a25deb551e5de9ac497411c227a94e45f91c2d1c13cc046cf4ce14e32d058734210d44a87ee1b73f":int:16:char*:"034f090d73b55803030cf0361a5d8081bfb79f851523feac0a2124d08d4013ff08487771a870d0479dc0686c62f7718dfecf024b17c9267678059171339cc00839":int:16:char*:"0d10f661f29940f5ed39aa260966deb47843679d2b6fb25b3de370f3ac7c19916391fd25fb527ebfa6a4b4df45a1759d996c4bb4ebd18828c44fc52d0191871740525f47a4b0cc8da325ed8aa676b0d0f626e0a77f07692170acac8082f42faa7dc7cd123e730e31a87985204cabcbe6670d43a2dd2b2ddef5e05392fc213bc507":int:16:char*:"010001":exp:0:exp:0:hex:"e7b32e1556ea1b2795046ac69739d22ac8966bf11c116f614b166740e96b90653e5750945fcf772186c03790a07fda323e1a61916b06ee2157db3dff80d67d5e39a53ae268c8f09ed99a732005b0bc6a04af4e08d57a00e7201b3060efaadb73113bfc087fd837093aa25235b8c149f56215f031c24ad5bde7f29960df7d524070f7449c6f785084be1a0f733047f336f9154738674547db02a9f44dfc6e60301081e1ce99847f3b5b601ff06b4d5776a9740b9aa0d34058fd3b906e4f7859dfb07d7173e5e6f6350adac21f27b2307469":hex:"bd0ce19549d0700120cbe51077dbbbb00a8d8b09":hex:"08180de825e4b8b014a32da8ba761555921204f2f90d5f24b712908ff84f3e220ad17997c0dd6e706630ba3e84add4d5e7ab004e58074b549709565d43ad9e97b5a7a1a29e85b9f90f4aafcdf58321de8c5974ef9abf2d526f33c0f2f82e95d158ea6b81f1736db8d1af3d6ac6a83b32d18bae0ff1b2fe27de4c76ed8c7980a34e":int:0
RSASSA-PSS Signature Example 5_2 (verify)
3:int:1028:int:16:char*:"0d10f661f29940f5ed39aa260966deb47843679d2b6fb25b3de370f3ac7c19916391fd25fb527ebfa6a4b4df45a1759d996c4bb4ebd18828c44fc52d0191871740525f47a4b0cc8da325ed8aa676b0d0f626e0a77f07692170acac8082f42faa7dc7cd123e730e31a87985204cabcbe6670d43a2dd2b2ddef5e05392fc213bc507":int:16:char*:"010001":exp:0:exp:0:hex:"e7b32e1556ea1b2795046ac69739d22ac8966bf11c116f614b166740e96b90653e5750945fcf772186c03790a07fda323e1a61916b06ee2157db3dff80d67d5e39a53ae268c8f09ed99a732005b0bc6a04af4e08d57a00e7201b3060efaadb73113bfc087fd837093aa25235b8c149f56215f031c24ad5bde7f29960df7d524070f7449c6f785084be1a0f733047f336f9154738674547db02a9f44dfc6e60301081e1ce99847f3b5b601ff06b4d5776a9740b9aa0d34058fd3b906e4f7859dfb07d7173e5e6f6350adac21f27b2307469":char*:"bd0ce19549d0700120cbe51077dbbbb00a8d8b09":hex:"08180de825e4b8b014a32da8ba761555921204f2f90d5f24b712908ff84f3e220ad17997c0dd6e706630ba3e84add4d5e7ab004e58074b549709565d43ad9e97b5a7a1a29e85b9f90f4aafcdf58321de8c5974ef9abf2d526f33c0f2f82e95d158ea6b81f1736db8d1af3d6ac6a83b32d18bae0ff1b2fe27de4c76ed8c7980a34e":int:0
RSASSA-PSS Signature Example 5_3
2:int:1028:int:16:char*:"03f2f331f4142d4f24b43aa10279a89652d4e7537221a1a7b2a25deb551e5de9ac497411c227a94e45f91c2d1c13cc046cf4ce14e32d058734210d44a87ee1b73f":int:16:char*:"034f090d73b55803030cf0361a5d8081bfb79f851523feac0a2124d08d4013ff08487771a870d0479dc0686c62f7718dfecf024b17c9267678059171339cc00839":int:16:char*:"0d10f661f29940f5ed39aa260966deb47843679d2b6fb25b3de370f3ac7c19916391fd25fb527ebfa6a4b4df45a1759d996c4bb4ebd18828c44fc52d0191871740525f47a4b0cc8da325ed8aa676b0d0f626e0a77f07692170acac8082f42faa7dc7cd123e730e31a87985204cabcbe6670d43a2dd2b2ddef5e05392fc213bc507":int:16:char*:"010001":exp:0:exp:0:hex:"8d8396e36507fe1ef6a19017548e0c716674c2fec233adb2f775665ec41f2bd0ba396b061a9daa7e866f7c23fd3531954300a342f924535ea1498c48f6c879932865fc02000c528723b7ad0335745b51209a0afed932af8f0887c219004d2abd894ea92559ee3198af3a734fe9b9638c263a728ad95a5ae8ce3eb15839f3aa7852bb390706e7760e43a71291a2e3f827237deda851874c517665f545f27238df86557f375d09ccd8bd15d8ccf61f5d78ca5c7f5cde782e6bf5d0057056d4bad98b3d2f9575e824ab7a33ff57b0ac100ab0d6ead7aa0b50f6e4d3e5ec0b966b":hex:"815779a91b3a8bd049bf2aeb920142772222c9ca":hex:"05e0fdbdf6f756ef733185ccfa8ced2eb6d029d9d56e35561b5db8e70257ee6fd019d2f0bbf669fe9b9821e78df6d41e31608d58280f318ee34f559941c8df13287574bac000b7e58dc4f414ba49fb127f9d0f8936638c76e85356c994f79750f7fa3cf4fd482df75e3fb9978cd061f7abb17572e6e63e0bde12cbdcf18c68b979":int:0
RSASSA-PSS Signature Example 5_3 (verify)
3:int:1028:int:16:char*:"0d10f661f29940f5ed39aa260966deb47843679d2b6fb25b3de370f3ac7c19916391fd25fb527ebfa6a4b4df45a1759d996c4bb4ebd18828c44fc52d0191871740525f47a4b0cc8da325ed8aa676b0d0f626e0a77f07692170acac8082f42faa7dc7cd123e730e31a87985204cabcbe6670d43a2dd2b2ddef5e05392fc213bc507":int:16:char*:"010001":exp:0:exp:0:hex:"8d8396e36507fe1ef6a19017548e0c716674c2fec233adb2f775665ec41f2bd0ba396b061a9daa7e866f7c23fd3531954300a342f924535ea1498c48f6c879932865fc02000c528723b7ad0335745b51209a0afed932af8f0887c219004d2abd894ea92559ee3198af3a734fe9b9638c263a728ad95a5ae8ce3eb15839f3aa7852bb390706e7760e43a71291a2e3f827237deda851874c517665f545f27238df86557f375d09ccd8bd15d8ccf61f5d78ca5c7f5cde782e6bf5d0057056d4bad98b3d2f9575e824ab7a33ff57b0ac100ab0d6ead7aa0b50f6e4d3e5ec0b966b":char*:"815779a91b3a8bd049bf2aeb920142772222c9ca":hex:"05e0fdbdf6f756ef733185ccfa8ced2eb6d029d9d56e35561b5db8e70257ee6fd019d2f0bbf669fe9b9821e78df6d41e31608d58280f318ee34f559941c8df13287574bac000b7e58dc4f414ba49fb127f9d0f8936638c76e85356c994f79750f7fa3cf4fd482df75e3fb9978cd061f7abb17572e6e63e0bde12cbdcf18c68b979":int:0
RSASSA-PSS Signature Example 5_4
2:int:1028:int:16:char*:"03f2f331f4142d4f24b43aa10279a89652d4e7537221a1a7b2a25deb551e5de9ac497411c227a94e45f91c2d1c13cc046cf4ce14e32d058734210d44a87ee1b73f":int:16:char*:"034f090d73b55803030cf0361a5d8081bfb79f851523feac0a2124d08d4013ff08487771a870d0479dc0686c62f7718dfecf024b17c9267678059171339cc00839":int:16:char*:"0d10f661f29940f5ed39aa260966deb47843679d2b6fb25b3de370f3ac7c19916391fd25fb527ebfa6a4b4df45a1759d996c4bb4ebd18828c44fc52d0191871740525f47a4b0cc8da325ed8aa676b0d0f626e0a77f07692170acac8082f42faa7dc7cd123e730e31a87985204cabcbe6670d43a2dd2b2ddef5e05392fc213bc507":int:16:char*:"010001":exp:0:exp:0:hex:"328c659e0a6437433cceb73c14":hex:"9aec4a7480d5bbc42920d7ca235db674989c9aac":hex:"0bc989853bc2ea86873271ce183a923ab65e8a53100e6df5d87a24c4194eb797813ee2a187c097dd872d591da60c568605dd7e742d5af4e33b11678ccb63903204a3d080b0902c89aba8868f009c0f1c0cb85810bbdd29121abb8471ff2d39e49fd92d56c655c8e037ad18fafbdc92c95863f7f61ea9efa28fea401369d19daea1":int:0
RSASSA-PSS Signature Example 5_4 (verify)
3:int:1028:int:16:char*:"0d10f661f29940f5ed39aa260966deb47843679d2b6fb25b3de370f3ac7c19916391fd25fb527ebfa6a4b4df45a1759d996c4bb4ebd18828c44fc52d0191871740525f47a4b0cc8da325ed8aa676b0d0f626e0a77f07692170acac8082f42faa7dc7cd123e730e31a87985204cabcbe6670d43a2dd2b2ddef5e05392fc213bc507":int:16:char*:"010001":exp:0:exp:0:hex:"328c659e0a6437433cceb73c14":char*:"9aec4a7480d5bbc42920d7ca235db674989c9aac":hex:"0bc989853bc2ea86873271ce183a923ab65e8a53100e6df5d87a24c4194eb797813ee2a187c097dd872d591da60c568605dd7e742d5af4e33b11678ccb63903204a3d080b0902c89aba8868f009c0f1c0cb85810bbdd29121abb8471ff2d39e49fd92d56c655c8e037ad18fafbdc92c95863f7f61ea9efa28fea401369d19daea1":int:0
RSASSA-PSS Signature Example 5_5
2:int:1028:int:16:char*:"03f2f331f4142d4f24b43aa10279a89652d4e7537221a1a7b2a25deb551e5de9ac497411c227a94e45f91c2d1c13cc046cf4ce14e32d058734210d44a87ee1b73f":int:16:char*:"034f090d73b55803030cf0361a5d8081bfb79f851523feac0a2124d08d4013ff08487771a870d0479dc0686c62f7718dfecf024b17c9267678059171339cc00839":int:16:char*:"0d10f661f29940f5ed39aa260966deb47843679d2b6fb25b3de370f3ac7c19916391fd25fb527ebfa6a4b4df45a1759d996c4bb4ebd18828c44fc52d0191871740525f47a4b0cc8da325ed8aa676b0d0f626e0a77f07692170acac8082f42faa7dc7cd123e730e31a87985204cabcbe6670d43a2dd2b2ddef5e05392fc213bc507":int:16:char*:"010001":exp:0:exp:0:hex:"f37b962379a47d415a376eec8973150bcb34edd5ab654041b61430560c2144582ba133c867d852d6b8e23321901302ecb45b09ec88b1527178fa043263f3067d9ffe973032a99f4cb08ad2c7e0a2456cdd57a7df56fe6053527a5aeb67d7e552063c1ca97b1beffa7b39e997caf27878ea0f62cbebc8c21df4c889a202851e949088490c249b6e9acf1d8063f5be2343989bf95c4da01a2be78b4ab6b378015bc37957f76948b5e58e440c28453d40d7cfd57e7d690600474ab5e75973b1ea0c5f1e45d14190afe2f4eb6d3bdf71f1d2f8bb156a1c295d04aaeb9d689dce79ed62bc443e":hex:"e20c1e9878512c39970f58375e1549a68b64f31d":hex:"0aefa943b698b9609edf898ad22744ac28dc239497cea369cbbd84f65c95c0ad776b594740164b59a739c6ff7c2f07c7c077a86d95238fe51e1fcf33574a4ae0684b42a3f6bf677d91820ca89874467b2c23add77969c80717430d0efc1d3695892ce855cb7f7011630f4df26def8ddf36fc23905f57fa6243a485c770d5681fcd":int:0
RSASSA-PSS Signature Example 5_5 (verify)
3:int:1028:int:16:char*:"0d10f661f29940f5ed39aa260966deb47843679d2b6fb25b3de370f3ac7c19916391fd25fb527ebfa6a4b4df45a1759d996c4bb4ebd18828c44fc52d0191871740525f47a4b0cc8da325ed8aa676b0d0f626e0a77f07692170acac8082f42faa7dc7cd123e730e31a87985204cabcbe6670d43a2dd2b2ddef5e05392fc213bc507":int:16:char*:"010001":exp:0:exp:0:hex:"f37b962379a47d415a376eec8973150bcb34edd5ab654041b61430560c2144582ba133c867d852d6b8e23321901302ecb45b09ec88b1527178fa043263f3067d9ffe973032a99f4cb08ad2c7e0a2456cdd57a7df56fe6053527a5aeb67d7e552063c1ca97b1beffa7b39e997caf27878ea0f62cbebc8c21df4c889a202851e949088490c249b6e9acf1d8063f5be2343989bf95c4da01a2be78b4ab6b378015bc37957f76948b5e58e440c28453d40d7cfd57e7d690600474ab5e75973b1ea0c5f1e45d14190afe2f4eb6d3bdf71f1d2f8bb156a1c295d04aaeb9d689dce79ed62bc443e":char*:"e20c1e9878512c39970f58375e1549a68b64f31d":hex:"0aefa943b698b9609edf898ad22744ac28dc239497cea369cbbd84f65c95c0ad776b594740164b59a739c6ff7c2f07c7c077a86d95238fe51e1fcf33574a4ae0684b42a3f6bf677d91820ca89874467b2c23add77969c80717430d0efc1d3695892ce855cb7f7011630f4df26def8ddf36fc23905f57fa6243a485c770d5681fcd":int:0
RSASSA-PSS Signature Example 5_6
2:int:1028:int:16:char*:"03f2f331f4142d4f24b43aa10279a89652d4e7537221a1a7b2a25deb551e5de9ac497411c227a94e45f91c2d1c13cc046cf4ce14e32d058734210d44a87ee1b73f":int:16:char*:"034f090d73b55803030cf0361a5d8081bfb79f851523feac0a2124d08d4013ff08487771a870d0479dc0686c62f7718dfecf024b17c9267678059171339cc00839":int:16:char*:"0d10f661f29940f5ed39aa260966deb47843679d2b6fb25b3de370f3ac7c19916391fd25fb527ebfa6a4b4df45a1759d996c4bb4ebd18828c44fc52d0191871740525f47a4b0cc8da325ed8aa676b0d0f626e0a77f07692170acac8082f42faa7dc7cd123e730e31a87985204cabcbe6670d43a2dd2b2ddef5e05392fc213bc507":int:16:char*:"010001":exp:0:exp:0:hex:"c6103c330c1ef718c141e47b8fa859be4d5b96259e7d142070ecd485839dba5a8369c17c1114035e532d195c74f44a0476a2d3e8a4da210016caced0e367cb867710a4b5aa2df2b8e5daf5fdc647807d4d5ebb6c56b9763ccdae4dea3308eb0ac2a89501cb209d2639fa5bf87ce790747d3cb2d295e84564f2f637824f0c13028129b0aa4a422d162282":hex:"23291e4a3307e8bbb776623ab34e4a5f4cc8a8db":hex:"02802dccfa8dfaf5279bf0b4a29ba1b157611faeaaf419b8919d15941900c1339e7e92e6fae562c53e6cc8e84104b110bce03ad18525e3c49a0eadad5d3f28f244a8ed89edbafbb686277cfa8ae909714d6b28f4bf8e293aa04c41efe7c0a81266d5c061e2575be032aa464674ff71626219bd74cc45f0e7ed4e3ff96eee758e8f":int:0
RSASSA-PSS Signature Example 5_6 (verify)
3:int:1028:int:16:char*:"0d10f661f29940f5ed39aa260966deb47843679d2b6fb25b3de370f3ac7c19916391fd25fb527ebfa6a4b4df45a1759d996c4bb4ebd18828c44fc52d0191871740525f47a4b0cc8da325ed8aa676b0d0f626e0a77f07692170acac8082f42faa7dc7cd123e730e31a87985204cabcbe6670d43a2dd2b2ddef5e05392fc213bc507":int:16:char*:"010001":exp:0:exp:0:hex:"c6103c330c1ef718c141e47b8fa859be4d5b96259e7d142070ecd485839dba5a8369c17c1114035e532d195c74f44a0476a2d3e8a4da210016caced0e367cb867710a4b5aa2df2b8e5daf5fdc647807d4d5ebb6c56b9763ccdae4dea3308eb0ac2a89501cb209d2639fa5bf87ce790747d3cb2d295e84564f2f637824f0c13028129b0aa4a422d162282":char*:"23291e4a3307e8bbb776623ab34e4a5f4cc8a8db":hex:"02802dccfa8dfaf5279bf0b4a29ba1b157611faeaaf419b8919d15941900c1339e7e92e6fae562c53e6cc8e84104b110bce03ad18525e3c49a0eadad5d3f28f244a8ed89edbafbb686277cfa8ae909714d6b28f4bf8e293aa04c41efe7c0a81266d5c061e2575be032aa464674ff71626219bd74cc45f0e7ed4e3ff96eee758e8f":int:0
RSASSA-PSS Signature Example 6_1
2:int:1029:int:16:char*:"04f0548c9626ab1ebf1244934741d99a06220efa2a5856aa0e75730b2ec96adc86be894fa2803b53a5e85d276acbd29ab823f80a7391bb54a5051672fb04eeb543":int:16:char*:"0483e0ae47915587743ff345362b555d3962d98bb6f15f848b4c92b1771ca8ed107d8d3ee65ec44517dd0faa481a387e902f7a2e747c269e7ea44480bc538b8e5b":int:16:char*:"164ca31cff609f3a0e7101b039f2e4fe6dd37519ab98598d179e174996598071f47d3a04559158d7be373cf1aa53f0aa6ef09039e5678c2a4c63900514c8c4f8aaed5de12a5f10b09c311af8c0ffb5b7a297f2efc63b8d6b0510931f0b98e48bf5fc6ec4e7b8db1ffaeb08c38e02adb8f03a48229c99e969431f61cb8c4dc698d1":int:16:char*:"010001":exp:0:exp:0:hex:"0a20b774addc2fa51245ed7cb9da609e50cac6636a52543f97458eed7340f8d53ffc64918f949078ee03ef60d42b5fec246050bd5505cd8cb597bad3c4e713b0ef30644e76adabb0de01a1561efb255158c74fc801e6e919e581b46f0f0ddd08e4f34c7810b5ed8318f91d7c8c":hex:"5b4ea2ef629cc22f3b538e016904b47b1e40bfd5":hex:"04c0cfacec04e5badbece159a5a1103f69b3f32ba593cb4cc4b1b7ab455916a96a27cd2678ea0f46ba37f7fc9c86325f29733b389f1d97f43e7201c0f348fc45fe42892335362eee018b5b161f2f9393031225c713012a576bc88e23052489868d9010cbf033ecc568e8bc152bdc59d560e41291915d28565208e22aeec9ef85d1":int:0
RSASSA-PSS Signature Example 6_1 (verify)
3:int:1029:int:16:char*:"164ca31cff609f3a0e7101b039f2e4fe6dd37519ab98598d179e174996598071f47d3a04559158d7be373cf1aa53f0aa6ef09039e5678c2a4c63900514c8c4f8aaed5de12a5f10b09c311af8c0ffb5b7a297f2efc63b8d6b0510931f0b98e48bf5fc6ec4e7b8db1ffaeb08c38e02adb8f03a48229c99e969431f61cb8c4dc698d1":int:16:char*:"010001":exp:0:exp:0:hex:"0a20b774addc2fa51245ed7cb9da609e50cac6636a52543f97458eed7340f8d53ffc64918f949078ee03ef60d42b5fec246050bd5505cd8cb597bad3c4e713b0ef30644e76adabb0de01a1561efb255158c74fc801e6e919e581b46f0f0ddd08e4f34c7810b5ed8318f91d7c8c":char*:"5b4ea2ef629cc22f3b538e016904b47b1e40bfd5":hex:"04c0cfacec04e5badbece159a5a1103f69b3f32ba593cb4cc4b1b7ab455916a96a27cd2678ea0f46ba37f7fc9c86325f29733b389f1d97f43e7201c0f348fc45fe42892335362eee018b5b161f2f9393031225c713012a576bc88e23052489868d9010cbf033ecc568e8bc152bdc59d560e41291915d28565208e22aeec9ef85d1":int:0
RSASSA-PSS Signature Example 6_2
2:int:1029:int:16:char*:"04f0548c9626ab1ebf1244934741d99a06220efa2a5856aa0e75730b2ec96adc86be894fa2803b53a5e85d276acbd29ab823f80a7391bb54a5051672fb04eeb543":int:16:char*:"0483e0ae47915587743ff345362b555d3962d98bb6f15f848b4c92b1771ca8ed107d8d3ee65ec44517dd0faa481a387e902f7a2e747c269e7ea44480bc538b8e5b":int:16:char*:"164ca31cff609f3a0e7101b039f2e4fe6dd37519ab98598d179e174996598071f47d3a04559158d7be373cf1aa53f0aa6ef09039e5678c2a4c63900514c8c4f8aaed5de12a5f10b09c311af8c0ffb5b7a297f2efc63b8d6b0510931f0b98e48bf5fc6ec4e7b8db1ffaeb08c38e02adb8f03a48229c99e969431f61cb8c4dc698d1":int:16:char*:"010001":exp:0:exp:0:hex:"2aaff6631f621ce615760a9ebce94bb333077ad86488c861d4b76d29c1f48746c611ae1e03ced4445d7cfa1fe5f62e1b3f08452bde3b6ef81973bafbb57f97bceef873985395b8260589aa88cb7db50ab469262e551bdcd9a56f275a0ac4fe484700c35f3dbf2b469ede864741b86fa59172a360ba95a02e139be50ddfb7cf0b42faeabbfbbaa86a4497699c4f2dfd5b08406af7e14144427c253ec0efa20eaf9a8be8cd49ce1f1bc4e93e619cf2aa8ed4fb39bc8590d0f7b96488f7317ac9abf7bee4e3a0e715":hex:"83146a9e782722c28b014f98b4267bda2ac9504f":hex:"0a2314250cf52b6e4e908de5b35646bcaa24361da8160fb0f9257590ab3ace42b0dc3e77ad2db7c203a20bd952fbb56b1567046ecfaa933d7b1000c3de9ff05b7d989ba46fd43bc4c2d0a3986b7ffa13471d37eb5b47d64707bd290cfd6a9f393ad08ec1e3bd71bb5792615035cdaf2d8929aed3be098379377e777ce79aaa4773":int:0
RSASSA-PSS Signature Example 6_2 (verify)
3:int:1029:int:16:char*:"164ca31cff609f3a0e7101b039f2e4fe6dd37519ab98598d179e174996598071f47d3a04559158d7be373cf1aa53f0aa6ef09039e5678c2a4c63900514c8c4f8aaed5de12a5f10b09c311af8c0ffb5b7a297f2efc63b8d6b0510931f0b98e48bf5fc6ec4e7b8db1ffaeb08c38e02adb8f03a48229c99e969431f61cb8c4dc698d1":int:16:char*:"010001":exp:0:exp:0:hex:"2aaff6631f621ce615760a9ebce94bb333077ad86488c861d4b76d29c1f48746c611ae1e03ced4445d7cfa1fe5f62e1b3f08452bde3b6ef81973bafbb57f97bceef873985395b8260589aa88cb7db50ab469262e551bdcd9a56f275a0ac4fe484700c35f3dbf2b469ede864741b86fa59172a360ba95a02e139be50ddfb7cf0b42faeabbfbbaa86a4497699c4f2dfd5b08406af7e14144427c253ec0efa20eaf9a8be8cd49ce1f1bc4e93e619cf2aa8ed4fb39bc8590d0f7b96488f7317ac9abf7bee4e3a0e715":char*:"83146a9e782722c28b014f98b4267bda2ac9504f":hex:"0a2314250cf52b6e4e908de5b35646bcaa24361da8160fb0f9257590ab3ace42b0dc3e77ad2db7c203a20bd952fbb56b1567046ecfaa933d7b1000c3de9ff05b7d989ba46fd43bc4c2d0a3986b7ffa13471d37eb5b47d64707bd290cfd6a9f393ad08ec1e3bd71bb5792615035cdaf2d8929aed3be098379377e777ce79aaa4773":int:0
RSASSA-PSS Signature Example 6_3
2:int:1029:int:16:char*:"04f0548c9626ab1ebf1244934741d99a06220efa2a5856aa0e75730b2ec96adc86be894fa2803b53a5e85d276acbd29ab823f80a7391bb54a5051672fb04eeb543":int:16:char*:"0483e0ae47915587743ff345362b555d3962d98bb6f15f848b4c92b1771ca8ed107d8d3ee65ec44517dd0faa481a387e902f7a2e747c269e7ea44480bc538b8e5b":int:16:char*:"164ca31cff609f3a0e7101b039f2e4fe6dd37519ab98598d179e174996598071f47d3a04559158d7be373cf1aa53f0aa6ef09039e5678c2a4c63900514c8c4f8aaed5de12a5f10b09c311af8c0ffb5b7a297f2efc63b8d6b0510931f0b98e48bf5fc6ec4e7b8db1ffaeb08c38e02adb8f03a48229c99e969431f61cb8c4dc698d1":int:16:char*:"010001":exp:0:exp:0:hex:"0f6195d04a6e6fc7e2c9600dbf840c39ea8d4d624fd53507016b0e26858a5e0aecd7ada543ae5c0ab3a62599cba0a54e6bf446e262f989978f9ddf5e9a41":hex:"a87b8aed07d7b8e2daf14ddca4ac68c4d0aabff8":hex:"086df6b500098c120f24ff8423f727d9c61a5c9007d3b6a31ce7cf8f3cbec1a26bb20e2bd4a046793299e03e37a21b40194fb045f90b18bf20a47992ccd799cf9c059c299c0526854954aade8a6ad9d97ec91a1145383f42468b231f4d72f23706d9853c3fa43ce8ace8bfe7484987a1ec6a16c8daf81f7c8bf42774707a9df456":int:0
RSASSA-PSS Signature Example 6_3 (verify)
3:int:1029:int:16:char*:"164ca31cff609f3a0e7101b039f2e4fe6dd37519ab98598d179e174996598071f47d3a04559158d7be373cf1aa53f0aa6ef09039e5678c2a4c63900514c8c4f8aaed5de12a5f10b09c311af8c0ffb5b7a297f2efc63b8d6b0510931f0b98e48bf5fc6ec4e7b8db1ffaeb08c38e02adb8f03a48229c99e969431f61cb8c4dc698d1":int:16:char*:"010001":exp:0:exp:0:hex:"0f6195d04a6e6fc7e2c9600dbf840c39ea8d4d624fd53507016b0e26858a5e0aecd7ada543ae5c0ab3a62599cba0a54e6bf446e262f989978f9ddf5e9a41":char*:"a87b8aed07d7b8e2daf14ddca4ac68c4d0aabff8":hex:"086df6b500098c120f24ff8423f727d9c61a5c9007d3b6a31ce7cf8f3cbec1a26bb20e2bd4a046793299e03e37a21b40194fb045f90b18bf20a47992ccd799cf9c059c299c0526854954aade8a6ad9d97ec91a1145383f42468b231f4d72f23706d9853c3fa43ce8ace8bfe7484987a1ec6a16c8daf81f7c8bf42774707a9df456":int:0
RSASSA-PSS Signature Example 6_4
2:int:1029:int:16:char*:"04f0548c9626ab1ebf1244934741d99a06220efa2a5856aa0e75730b2ec96adc86be894fa2803b53a5e85d276acbd29ab823f80a7391bb54a5051672fb04eeb543":int:16:char*:"0483e0ae47915587743ff345362b555d3962d98bb6f15f848b4c92b1771ca8ed107d8d3ee65ec44517dd0faa481a387e902f7a2e747c269e7ea44480bc538b8e5b":int:16:char*:"164ca31cff609f3a0e7101b039f2e4fe6dd37519ab98598d179e174996598071f47d3a04559158d7be373cf1aa53f0aa6ef09039e5678c2a4c63900514c8c4f8aaed5de12a5f10b09c311af8c0ffb5b7a297f2efc63b8d6b0510931f0b98e48bf5fc6ec4e7b8db1ffaeb08c38e02adb8f03a48229c99e969431f61cb8c4dc698d1":int:16:char*:"010001":exp:0:exp:0:hex:"337d25fe9810ebca0de4d4658d3ceb8e0fe4c066aba3bcc48b105d3bf7e0257d44fecea6596f4d0c59a08402833678f70620f9138dfeb7ded905e4a6d5f05c473d55936652e2a5df43c0cfda7bacaf3087f4524b06cf42157d01539739f7fddec9d58125df31a32eab06c19b71f1d5bf":hex:"a37932f8a7494a942d6f767438e724d6d0c0ef18":hex:"0b5b11ad549863ffa9c51a14a1106c2a72cc8b646e5c7262509786105a984776534ca9b54c1cc64bf2d5a44fd7e8a69db699d5ea52087a4748fd2abc1afed1e5d6f7c89025530bdaa2213d7e030fa55df6f34bcf1ce46d2edf4e3ae4f3b01891a068c9e3a44bbc43133edad6ecb9f35400c4252a5762d65744b99cb9f4c559329f":int:0
RSASSA-PSS Signature Example 6_4 (verify)
3:int:1029:int:16:char*:"164ca31cff609f3a0e7101b039f2e4fe6dd37519ab98598d179e174996598071f47d3a04559158d7be373cf1aa53f0aa6ef09039e5678c2a4c63900514c8c4f8aaed5de12a5f10b09c311af8c0ffb5b7a297f2efc63b8d6b0510931f0b98e48bf5fc6ec4e7b8db1ffaeb08c38e02adb8f03a48229c99e969431f61cb8c4dc698d1":int:16:char*:"010001":exp:0:exp:0:hex:"337d25fe9810ebca0de4d4658d3ceb8e0fe4c066aba3bcc48b105d3bf7e0257d44fecea6596f4d0c59a08402833678f70620f9138dfeb7ded905e4a6d5f05c473d55936652e2a5df43c0cfda7bacaf3087f4524b06cf42157d01539739f7fddec9d58125df31a32eab06c19b71f1d5bf":char*:"a37932f8a7494a942d6f767438e724d6d0c0ef18":hex:"0b5b11ad549863ffa9c51a14a1106c2a72cc8b646e5c7262509786105a984776534ca9b54c1cc64bf2d5a44fd7e8a69db699d5ea52087a4748fd2abc1afed1e5d6f7c89025530bdaa2213d7e030fa55df6f34bcf1ce46d2edf4e3ae4f3b01891a068c9e3a44bbc43133edad6ecb9f35400c4252a5762d65744b99cb9f4c559329f":int:0
RSASSA-PSS Signature Example 6_5
2:int:1029:int:16:char*:"04f0548c9626ab1ebf1244934741d99a06220efa2a5856aa0e75730b2ec96adc86be894fa2803b53a5e85d276acbd29ab823f80a7391bb54a5051672fb04eeb543":int:16:char*:"0483e0ae47915587743ff345362b555d3962d98bb6f15f848b4c92b1771ca8ed107d8d3ee65ec44517dd0faa481a387e902f7a2e747c269e7ea44480bc538b8e5b":int:16:char*:"164ca31cff609f3a0e7101b039f2e4fe6dd37519ab98598d179e174996598071f47d3a04559158d7be373cf1aa53f0aa6ef09039e5678c2a4c63900514c8c4f8aaed5de12a5f10b09c311af8c0ffb5b7a297f2efc63b8d6b0510931f0b98e48bf5fc6ec4e7b8db1ffaeb08c38e02adb8f03a48229c99e969431f61cb8c4dc698d1":int:16:char*:"010001":exp:0:exp:0:hex:"84ec502b072e8287789d8f9235829ea3b187afd4d4c785611bda5f9eb3cb96717efa7007227f1c08cbcb972e667235e0fb7d431a6570326d2ecce35adb373dc753b3be5f829b89175493193fab16badb41371b3aac0ae670076f24bef420c135add7cee8d35fbc944d79fafb9e307a13b0f556cb654a06f973ed22672330197ef5a748bf826a5db2383a25364b686b9372bb2339aeb1ac9e9889327d016f1670776db06201adbdcaf8a5e3b74e108b73":hex:"7b790c1d62f7b84e94df6af28917cf571018110e":hex:"02d71fa9b53e4654fefb7f08385cf6b0ae3a817942ebf66c35ac67f0b069952a3ce9c7e1f1b02e480a9500836de5d64cdb7ecde04542f7a79988787e24c2ba05f5fd482c023ed5c30e04839dc44bed2a3a3a4fee01113c891a47d32eb8025c28cb050b5cdb576c70fe76ef523405c08417faf350b037a43c379339fcb18d3a356b":int:0
RSASSA-PSS Signature Example 6_5 (verify)
3:int:1029:int:16:char*:"164ca31cff609f3a0e7101b039f2e4fe6dd37519ab98598d179e174996598071f47d3a04559158d7be373cf1aa53f0aa6ef09039e5678c2a4c63900514c8c4f8aaed5de12a5f10b09c311af8c0ffb5b7a297f2efc63b8d6b0510931f0b98e48bf5fc6ec4e7b8db1ffaeb08c38e02adb8f03a48229c99e969431f61cb8c4dc698d1":int:16:char*:"010001":exp:0:exp:0:hex:"84ec502b072e8287789d8f9235829ea3b187afd4d4c785611bda5f9eb3cb96717efa7007227f1c08cbcb972e667235e0fb7d431a6570326d2ecce35adb373dc753b3be5f829b89175493193fab16badb41371b3aac0ae670076f24bef420c135add7cee8d35fbc944d79fafb9e307a13b0f556cb654a06f973ed22672330197ef5a748bf826a5db2383a25364b686b9372bb2339aeb1ac9e9889327d016f1670776db06201adbdcaf8a5e3b74e108b73":char*:"7b790c1d62f7b84e94df6af28917cf571018110e":hex:"02d71fa9b53e4654fefb7f08385cf6b0ae3a817942ebf66c35ac67f0b069952a3ce9c7e1f1b02e480a9500836de5d64cdb7ecde04542f7a79988787e24c2ba05f5fd482c023ed5c30e04839dc44bed2a3a3a4fee01113c891a47d32eb8025c28cb050b5cdb576c70fe76ef523405c08417faf350b037a43c379339fcb18d3a356b":int:0
RSASSA-PSS Signature Example 6_6
2:int:1029:int:16:char*:"04f0548c9626ab1ebf1244934741d99a06220efa2a5856aa0e75730b2ec96adc86be894fa2803b53a5e85d276acbd29ab823f80a7391bb54a5051672fb04eeb543":int:16:char*:"0483e0ae47915587743ff345362b555d3962d98bb6f15f848b4c92b1771ca8ed107d8d3ee65ec44517dd0faa481a387e902f7a2e747c269e7ea44480bc538b8e5b":int:16:char*:"164ca31cff609f3a0e7101b039f2e4fe6dd37519ab98598d179e174996598071f47d3a04559158d7be373cf1aa53f0aa6ef09039e5678c2a4c63900514c8c4f8aaed5de12a5f10b09c311af8c0ffb5b7a297f2efc63b8d6b0510931f0b98e48bf5fc6ec4e7b8db1ffaeb08c38e02adb8f03a48229c99e969431f61cb8c4dc698d1":int:16:char*:"010001":exp:0:exp:0:hex:"9906d89f97a9fdedd3ccd824db687326f30f00aa25a7fca2afcb3b0f86cd41e73f0e8ff7d2d83f59e28ed31a5a0d551523374de22e4c7e8ff568b386ee3dc41163f10bf67bb006261c9082f9af90bf1d9049a6b9fae71c7f84fbe6e55f02789de774f230f115026a4b4e96c55b04a95da3aacbb2cece8f81764a1f1c99515411087cf7d34aeded0932c183":hex:"fbbe059025b69b89fb14ae2289e7aaafe60c0fcd":hex:"0a40a16e2fe2b38d1df90546167cf9469c9e3c3681a3442b4b2c2f581deb385ce99fc6188bb02a841d56e76d301891e24560550fcc2a26b55f4ccb26d837d350a154bcaca8392d98fa67959e9727b78cad03269f56968fc56b68bd679926d83cc9cb215550645ccda31c760ff35888943d2d8a1d351e81e5d07b86182e751081ef":int:0
RSASSA-PSS Signature Example 6_6 (verify)
3:int:1029:int:16:char*:"164ca31cff609f3a0e7101b039f2e4fe6dd37519ab98598d179e174996598071f47d3a04559158d7be373cf1aa53f0aa6ef09039e5678c2a4c63900514c8c4f8aaed5de12a5f10b09c311af8c0ffb5b7a297f2efc63b8d6b0510931f0b98e48bf5fc6ec4e7b8db1ffaeb08c38e02adb8f03a48229c99e969431f61cb8c4dc698d1":int:16:char*:"010001":exp:0:exp:0:hex:"9906d89f97a9fdedd3ccd824db687326f30f00aa25a7fca2afcb3b0f86cd41e73f0e8ff7d2d83f59e28ed31a5a0d551523374de22e4c7e8ff568b386ee3dc41163f10bf67bb006261c9082f9af90bf1d9049a6b9fae71c7f84fbe6e55f02789de774f230f115026a4b4e96c55b04a95da3aacbb2cece8f81764a1f1c99515411087cf7d34aeded0932c183":char*:"fbbe059025b69b89fb14ae2289e7aaafe60c0fcd":hex:"0a40a16e2fe2b38d1df90546167cf9469c9e3c3681a3442b4b2c2f581deb385ce99fc6188bb02a841d56e76d301891e24560550fcc2a26b55f4ccb26d837d350a154bcaca8392d98fa67959e9727b78cad03269f56968fc56b68bd679926d83cc9cb215550645ccda31c760ff35888943d2d8a1d351e81e5d07b86182e751081ef":int:0
RSASSA-PSS Signature Example 7_1
2:int:1030:int:16:char*:"07eefb424b0e3a40e4208ee5afb280b22317308114dde0b4b64f730184ec68da6ce2867a9f48ed7726d5e2614ed04a5410736c8c714ee702474298c6292af07535":int:16:char*:"070830dbf947eac0228de26314b59b66994cc60e8360e75d3876298f8f8a7d141da064e5ca026a973e28f254738cee669c721b034cb5f8e244dadd7cd1e159d547":int:16:char*:"37c9da4a66c8c408b8da27d0c9d79f8ccb1eafc1d2fe48746d940b7c4ef5dee18ad12647cefaa0c4b3188b221c515386759b93f02024b25ab9242f8357d8f3fd49640ee5e643eaf6c64deefa7089727c8ff03993333915c6ef21bf5975b6e50d118b51008ec33e9f01a0a545a10a836a43ddbca9d8b5c5d3548022d7064ea29ab3":int:16:char*:"010001":exp:0:exp:0:hex:"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":hex:"b7867a59958cb54328f8775e6546ec06d27eaa50":hex:"187f390723c8902591f0154bae6d4ecbffe067f0e8b795476ea4f4d51ccc810520bb3ca9bca7d0b1f2ea8a17d873fa27570acd642e3808561cb9e975ccfd80b23dc5771cdb3306a5f23159dacbd3aa2db93d46d766e09ed15d900ad897a8d274dc26b47e994a27e97e2268a766533ae4b5e42a2fcaf755c1c4794b294c60555823":int:0
RSASSA-PSS Signature Example 7_1 (verify)
3:int:1030:int:16:char*:"37c9da4a66c8c408b8da27d0c9d79f8ccb1eafc1d2fe48746d940b7c4ef5dee18ad12647cefaa0c4b3188b221c515386759b93f02024b25ab9242f8357d8f3fd49640ee5e643eaf6c64deefa7089727c8ff03993333915c6ef21bf5975b6e50d118b51008ec33e9f01a0a545a10a836a43ddbca9d8b5c5d3548022d7064ea29ab3":int:16:char*:"010001":exp:0:exp:0:hex:"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":char*:"b7867a59958cb54328f8775e6546ec06d27eaa50":hex:"187f390723c8902591f0154bae6d4ecbffe067f0e8b795476ea4f4d51ccc810520bb3ca9bca7d0b1f2ea8a17d873fa27570acd642e3808561cb9e975ccfd80b23dc5771cdb3306a5f23159dacbd3aa2db93d46d766e09ed15d900ad897a8d274dc26b47e994a27e97e2268a766533ae4b5e42a2fcaf755c1c4794b294c60555823":int:0
RSASSA-PSS Signature Example 7_2
2:int:1030:int:16:char*:"07eefb424b0e3a40e4208ee5afb280b22317308114dde0b4b64f730184ec68da6ce2867a9f48ed7726d5e2614ed04a5410736c8c714ee702474298c6292af07535":int:16:char*:"070830dbf947eac0228de26314b59b66994cc60e8360e75d3876298f8f8a7d141da064e5ca026a973e28f254738cee669c721b034cb5f8e244dadd7cd1e159d547":int:16:char*:"37c9da4a66c8c408b8da27d0c9d79f8ccb1eafc1d2fe48746d940b7c4ef5dee18ad12647cefaa0c4b3188b221c515386759b93f02024b25ab9242f8357d8f3fd49640ee5e643eaf6c64deefa7089727c8ff03993333915c6ef21bf5975b6e50d118b51008ec33e9f01a0a545a10a836a43ddbca9d8b5c5d3548022d7064ea29ab3":int:16:char*:"010001":exp:0:exp:0:hex:"8d80d2d08dbd19c154df3f14673a14bd03735231f24e86bf153d0e69e74cbff7b1836e664de83f680124370fc0f96c9b65c07a366b644c4ab3":hex:"0c09582266df086310821ba7e18df64dfee6de09":hex:"10fd89768a60a67788abb5856a787c8561f3edcf9a83e898f7dc87ab8cce79429b43e56906941a886194f137e591fe7c339555361fbbe1f24feb2d4bcdb80601f3096bc9132deea60ae13082f44f9ad41cd628936a4d51176e42fc59cb76db815ce5ab4db99a104aafea68f5d330329ebf258d4ede16064bd1d00393d5e1570eb8":int:0
RSASSA-PSS Signature Example 7_2 (verify)
3:int:1030:int:16:char*:"37c9da4a66c8c408b8da27d0c9d79f8ccb1eafc1d2fe48746d940b7c4ef5dee18ad12647cefaa0c4b3188b221c515386759b93f02024b25ab9242f8357d8f3fd49640ee5e643eaf6c64deefa7089727c8ff03993333915c6ef21bf5975b6e50d118b51008ec33e9f01a0a545a10a836a43ddbca9d8b5c5d3548022d7064ea29ab3":int:16:char*:"010001":exp:0:exp:0:hex:"8d80d2d08dbd19c154df3f14673a14bd03735231f24e86bf153d0e69e74cbff7b1836e664de83f680124370fc0f96c9b65c07a366b644c4ab3":char*:"0c09582266df086310821ba7e18df64dfee6de09":hex:"10fd89768a60a67788abb5856a787c8561f3edcf9a83e898f7dc87ab8cce79429b43e56906941a886194f137e591fe7c339555361fbbe1f24feb2d4bcdb80601f3096bc9132deea60ae13082f44f9ad41cd628936a4d51176e42fc59cb76db815ce5ab4db99a104aafea68f5d330329ebf258d4ede16064bd1d00393d5e1570eb8":int:0
RSASSA-PSS Signature Example 7_3
2:int:1030:int:16:char*:"07eefb424b0e3a40e4208ee5afb280b22317308114dde0b4b64f730184ec68da6ce2867a9f48ed7726d5e2614ed04a5410736c8c714ee702474298c6292af07535":int:16:char*:"070830dbf947eac0228de26314b59b66994cc60e8360e75d3876298f8f8a7d141da064e5ca026a973e28f254738cee669c721b034cb5f8e244dadd7cd1e159d547":int:16:char*:"37c9da4a66c8c408b8da27d0c9d79f8ccb1eafc1d2fe48746d940b7c4ef5dee18ad12647cefaa0c4b3188b221c515386759b93f02024b25ab9242f8357d8f3fd49640ee5e643eaf6c64deefa7089727c8ff03993333915c6ef21bf5975b6e50d118b51008ec33e9f01a0a545a10a836a43ddbca9d8b5c5d3548022d7064ea29ab3":int:16:char*:"010001":exp:0:exp:0:hex:"808405cdfc1a58b9bb0397c720722a81fffb76278f335917ef9c473814b3e016ba2973cd2765f8f3f82d6cc38aa7f8551827fe8d1e3884b7e61c94683b8f82f1843bdae2257eeec9812ad4c2cf283c34e0b0ae0fe3cb990cf88f2ef9":hex:"28039dcfe106d3b8296611258c4a56651c9e92dd":hex:"2b31fde99859b977aa09586d8e274662b25a2a640640b457f594051cb1e7f7a911865455242926cf88fe80dfa3a75ba9689844a11e634a82b075afbd69c12a0df9d25f84ad4945df3dc8fe90c3cefdf26e95f0534304b5bdba20d3e5640a2ebfb898aac35ae40f26fce5563c2f9f24f3042af76f3c7072d687bbfb959a88460af1":int:0
RSASSA-PSS Signature Example 7_3 (verify)
3:int:1030:int:16:char*:"37c9da4a66c8c408b8da27d0c9d79f8ccb1eafc1d2fe48746d940b7c4ef5dee18ad12647cefaa0c4b3188b221c515386759b93f02024b25ab9242f8357d8f3fd49640ee5e643eaf6c64deefa7089727c8ff03993333915c6ef21bf5975b6e50d118b51008ec33e9f01a0a545a10a836a43ddbca9d8b5c5d3548022d7064ea29ab3":int:16:char*:"010001":exp:0:exp:0:hex:"808405cdfc1a58b9bb0397c720722a81fffb76278f335917ef9c473814b3e016ba2973cd2765f8f3f82d6cc38aa7f8551827fe8d1e3884b7e61c94683b8f82f1843bdae2257eeec9812ad4c2cf283c34e0b0ae0fe3cb990cf88f2ef9":char*:"28039dcfe106d3b8296611258c4a56651c9e92dd":hex:"2b31fde99859b977aa09586d8e274662b25a2a640640b457f594051cb1e7f7a911865455242926cf88fe80dfa3a75ba9689844a11e634a82b075afbd69c12a0df9d25f84ad4945df3dc8fe90c3cefdf26e95f0534304b5bdba20d3e5640a2ebfb898aac35ae40f26fce5563c2f9f24f3042af76f3c7072d687bbfb959a88460af1":int:0
RSASSA-PSS Signature Example 7_4
2:int:1030:int:16:char*:"07eefb424b0e3a40e4208ee5afb280b22317308114dde0b4b64f730184ec68da6ce2867a9f48ed7726d5e2614ed04a5410736c8c714ee702474298c6292af07535":int:16:char*:"070830dbf947eac0228de26314b59b66994cc60e8360e75d3876298f8f8a7d141da064e5ca026a973e28f254738cee669c721b034cb5f8e244dadd7cd1e159d547":int:16:char*:"37c9da4a66c8c408b8da27d0c9d79f8ccb1eafc1d2fe48746d940b7c4ef5dee18ad12647cefaa0c4b3188b221c515386759b93f02024b25ab9242f8357d8f3fd49640ee5e643eaf6c64deefa7089727c8ff03993333915c6ef21bf5975b6e50d118b51008ec33e9f01a0a545a10a836a43ddbca9d8b5c5d3548022d7064ea29ab3":int:16:char*:"010001":exp:0:exp:0:hex:"f337b9bad937de22a1a052dff11134a8ce26976202981939b91e0715ae5e609649da1adfcef3f4cca59b238360e7d1e496c7bf4b204b5acff9bbd6166a1d87a36ef2247373751039f8a800b8399807b3a85f44893497c0d05fb7017b82228152de6f25e6116dcc7503c786c875c28f3aa607e94ab0f19863ab1b5073770b0cd5f533acde30c6fb953cf3da680264e30fc11bff9a19bffab4779b6223c3fb3fe0f71abade4eb7c09c41e24c22d23fa148e6a173feb63984d1bc6ee3a02d915b752ceaf92a3015eceb38ca586c6801b37c34cefb2cff25ea23c08662dcab26a7a93a285d05d3044c":hex:"a77821ebbbef24628e4e12e1d0ea96de398f7b0f":hex:"32c7ca38ff26949a15000c4ba04b2b13b35a3810e568184d7ecabaa166b7ffabddf2b6cf4ba07124923790f2e5b1a5be040aea36fe132ec130e1f10567982d17ac3e89b8d26c3094034e762d2e031264f01170beecb3d1439e05846f25458367a7d9c02060444672671e64e877864559ca19b2074d588a281b5804d23772fbbe19":int:0
RSASSA-PSS Signature Example 7_4 (verify)
3:int:1030:int:16:char*:"37c9da4a66c8c408b8da27d0c9d79f8ccb1eafc1d2fe48746d940b7c4ef5dee18ad12647cefaa0c4b3188b221c515386759b93f02024b25ab9242f8357d8f3fd49640ee5e643eaf6c64deefa7089727c8ff03993333915c6ef21bf5975b6e50d118b51008ec33e9f01a0a545a10a836a43ddbca9d8b5c5d3548022d7064ea29ab3":int:16:char*:"010001":exp:0:exp:0:hex:"f337b9bad937de22a1a052dff11134a8ce26976202981939b91e0715ae5e609649da1adfcef3f4cca59b238360e7d1e496c7bf4b204b5acff9bbd6166a1d87a36ef2247373751039f8a800b8399807b3a85f44893497c0d05fb7017b82228152de6f25e6116dcc7503c786c875c28f3aa607e94ab0f19863ab1b5073770b0cd5f533acde30c6fb953cf3da680264e30fc11bff9a19bffab4779b6223c3fb3fe0f71abade4eb7c09c41e24c22d23fa148e6a173feb63984d1bc6ee3a02d915b752ceaf92a3015eceb38ca586c6801b37c34cefb2cff25ea23c08662dcab26a7a93a285d05d3044c":char*:"a77821ebbbef24628e4e12e1d0ea96de398f7b0f":hex:"32c7ca38ff26949a15000c4ba04b2b13b35a3810e568184d7ecabaa166b7ffabddf2b6cf4ba07124923790f2e5b1a5be040aea36fe132ec130e1f10567982d17ac3e89b8d26c3094034e762d2e031264f01170beecb3d1439e05846f25458367a7d9c02060444672671e64e877864559ca19b2074d588a281b5804d23772fbbe19":int:0
RSASSA-PSS Signature Example 7_5
2:int:1030:int:16:char*:"07eefb424b0e3a40e4208ee5afb280b22317308114dde0b4b64f730184ec68da6ce2867a9f48ed7726d5e2614ed04a5410736c8c714ee702474298c6292af07535":int:16:char*:"070830dbf947eac0228de26314b59b66994cc60e8360e75d3876298f8f8a7d141da064e5ca026a973e28f254738cee669c721b034cb5f8e244dadd7cd1e159d547":int:16:char*:"37c9da4a66c8c408b8da27d0c9d79f8ccb1eafc1d2fe48746d940b7c4ef5dee18ad12647cefaa0c4b3188b221c515386759b93f02024b25ab9242f8357d8f3fd49640ee5e643eaf6c64deefa7089727c8ff03993333915c6ef21bf5975b6e50d118b51008ec33e9f01a0a545a10a836a43ddbca9d8b5c5d3548022d7064ea29ab3":int:16:char*:"010001":exp:0:exp:0:hex:"45013cebafd960b255476a8e2598b9aa32efbe6dc1f34f4a498d8cf5a2b4548d08c55d5f95f7bcc9619163056f2d58b52fa032":hex:"9d5ad8eb452134b65dc3a98b6a73b5f741609cd6":hex:"07eb651d75f1b52bc263b2e198336e99fbebc4f332049a922a10815607ee2d989db3a4495b7dccd38f58a211fb7e193171a3d891132437ebca44f318b280509e52b5fa98fcce8205d9697c8ee4b7ff59d4c59c79038a1970bd2a0d451ecdc5ef11d9979c9d35f8c70a6163717607890d586a7c6dc01c79f86a8f28e85235f8c2f1":int:0
RSASSA-PSS Signature Example 7_5 (verify)
3:int:1030:int:16:char*:"37c9da4a66c8c408b8da27d0c9d79f8ccb1eafc1d2fe48746d940b7c4ef5dee18ad12647cefaa0c4b3188b221c515386759b93f02024b25ab9242f8357d8f3fd49640ee5e643eaf6c64deefa7089727c8ff03993333915c6ef21bf5975b6e50d118b51008ec33e9f01a0a545a10a836a43ddbca9d8b5c5d3548022d7064ea29ab3":int:16:char*:"010001":exp:0:exp:0:hex:"45013cebafd960b255476a8e2598b9aa32efbe6dc1f34f4a498d8cf5a2b4548d08c55d5f95f7bcc9619163056f2d58b52fa032":char*:"9d5ad8eb452134b65dc3a98b6a73b5f741609cd6":hex:"07eb651d75f1b52bc263b2e198336e99fbebc4f332049a922a10815607ee2d989db3a4495b7dccd38f58a211fb7e193171a3d891132437ebca44f318b280509e52b5fa98fcce8205d9697c8ee4b7ff59d4c59c79038a1970bd2a0d451ecdc5ef11d9979c9d35f8c70a6163717607890d586a7c6dc01c79f86a8f28e85235f8c2f1":int:0
RSASSA-PSS Signature Example 7_6
2:int:1030:int:16:char*:"07eefb424b0e3a40e4208ee5afb280b22317308114dde0b4b64f730184ec68da6ce2867a9f48ed7726d5e2614ed04a5410736c8c714ee702474298c6292af07535":int:16:char*:"070830dbf947eac0228de26314b59b66994cc60e8360e75d3876298f8f8a7d141da064e5ca026a973e28f254738cee669c721b034cb5f8e244dadd7cd1e159d547":int:16:char*:"37c9da4a66c8c408b8da27d0c9d79f8ccb1eafc1d2fe48746d940b7c4ef5dee18ad12647cefaa0c4b3188b221c515386759b93f02024b25ab9242f8357d8f3fd49640ee5e643eaf6c64deefa7089727c8ff03993333915c6ef21bf5975b6e50d118b51008ec33e9f01a0a545a10a836a43ddbca9d8b5c5d3548022d7064ea29ab3":int:16:char*:"010001":exp:0:exp:0:hex:"2358097086c899323e75d9c90d0c09f12d9d54edfbdf70a9c2eb5a04d8f36b9b2bdf2aabe0a5bda1968937f9d6ebd3b6b257efb3136d4131f9acb59b85e2602c2a3fcdc835494a1f4e5ec18b226c80232b36a75a45fdf09a7ea9e98efbde1450d1194bf12e15a4c5f9eb5c0bce5269e0c3b28cfab655d81a61a20b4be2f54459bb25a0db94c52218be109a7426de83014424789aaa90e5056e632a698115e282c1a56410f26c2072f193481a9dcd880572005e64f4082ecf":hex:"3f2efc595880a7d47fcf3cba04983ea54c4b73fb":hex:"18da3cdcfe79bfb77fd9c32f377ad399146f0a8e810620233271a6e3ed3248903f5cdc92dc79b55d3e11615aa056a795853792a3998c349ca5c457e8ca7d29d796aa24f83491709befcfb1510ea513c92829a3f00b104f655634f320752e130ec0ccf6754ff893db302932bb025eb60e87822598fc619e0e981737a9a4c4152d33":int:0
RSASSA-PSS Signature Example 7_6 (verify)
3:int:1030:int:16:char*:"37c9da4a66c8c408b8da27d0c9d79f8ccb1eafc1d2fe48746d940b7c4ef5dee18ad12647cefaa0c4b3188b221c515386759b93f02024b25ab9242f8357d8f3fd49640ee5e643eaf6c64deefa7089727c8ff03993333915c6ef21bf5975b6e50d118b51008ec33e9f01a0a545a10a836a43ddbca9d8b5c5d3548022d7064ea29ab3":int:16:char*:"010001":exp:0:exp:0:hex:"2358097086c899323e75d9c90d0c09f12d9d54edfbdf70a9c2eb5a04d8f36b9b2bdf2aabe0a5bda1968937f9d6ebd3b6b257efb3136d4131f9acb59b85e2602c2a3fcdc835494a1f4e5ec18b226c80232b36a75a45fdf09a7ea9e98efbde1450d1194bf12e15a4c5f9eb5c0bce5269e0c3b28cfab655d81a61a20b4be2f54459bb25a0db94c52218be109a7426de83014424789aaa90e5056e632a698115e282c1a56410f26c2072f193481a9dcd880572005e64f4082ecf":char*:"3f2efc595880a7d47fcf3cba04983ea54c4b73fb":hex:"18da3cdcfe79bfb77fd9c32f377ad399146f0a8e810620233271a6e3ed3248903f5cdc92dc79b55d3e11615aa056a795853792a3998c349ca5c457e8ca7d29d796aa24f83491709befcfb1510ea513c92829a3f00b104f655634f320752e130ec0ccf6754ff893db302932bb025eb60e87822598fc619e0e981737a9a4c4152d33":int:0
RSASSA-PSS Signature Example 8_1
2:int:1031:int:16:char*:"08dad7f11363faa623d5d6d5e8a319328d82190d7127d2846c439b0ab72619b0a43a95320e4ec34fc3a9cea876422305bd76c5ba7be9e2f410c8060645a1d29edb":int:16:char*:"0847e732376fc7900f898ea82eb2b0fc418565fdae62f7d9ec4ce2217b97990dd272db157f99f63c0dcbb9fbacdbd4c4dadb6df67756358ca4174825b48f49706d":int:16:char*:"495370a1fb18543c16d3631e3163255df62be6eee890d5f25509e4f778a8ea6fbbbcdf85dff64e0d972003ab3681fbba6dd41fd541829b2e582de9f2a4a4e0a2d0900bef4753db3cee0ee06c7dfae8b1d53b5953218f9cceea695b08668edeaadced9463b1d790d5ebf27e9115b46cad4d9a2b8efab0561b0810344739ada0733f":int:16:char*:"010001":exp:0:exp:0:hex:"81332f4be62948415ea1d899792eeacf6c6e1db1da8be13b5cea41db2fed467092e1ff398914c714259775f595f8547f735692a575e6923af78f22c6997ddb90fb6f72d7bb0dd5744a31decd3dc3685849836ed34aec596304ad11843c4f88489f209735f5fb7fdaf7cec8addc5818168f880acbf490d51005b7a8e84e43e54287977571dd99eea4b161eb2df1f5108f12a4142a83322edb05a75487a3435c9a78ce53ed93bc550857d7a9fb":hex:"1d65491d79c864b373009be6f6f2467bac4c78fa":hex:"0262ac254bfa77f3c1aca22c5179f8f040422b3c5bafd40a8f21cf0fa5a667ccd5993d42dbafb409c520e25fce2b1ee1e716577f1efa17f3da28052f40f0419b23106d7845aaf01125b698e7a4dfe92d3967bb00c4d0d35ba3552ab9a8b3eef07c7fecdbc5424ac4db1e20cb37d0b2744769940ea907e17fbbca673b20522380c5":int:0
RSASSA-PSS Signature Example 8_1 (verify)
3:int:1031:int:16:char*:"495370a1fb18543c16d3631e3163255df62be6eee890d5f25509e4f778a8ea6fbbbcdf85dff64e0d972003ab3681fbba6dd41fd541829b2e582de9f2a4a4e0a2d0900bef4753db3cee0ee06c7dfae8b1d53b5953218f9cceea695b08668edeaadced9463b1d790d5ebf27e9115b46cad4d9a2b8efab0561b0810344739ada0733f":int:16:char*:"010001":exp:0:exp:0:hex:"81332f4be62948415ea1d899792eeacf6c6e1db1da8be13b5cea41db2fed467092e1ff398914c714259775f595f8547f735692a575e6923af78f22c6997ddb90fb6f72d7bb0dd5744a31decd3dc3685849836ed34aec596304ad11843c4f88489f209735f5fb7fdaf7cec8addc5818168f880acbf490d51005b7a8e84e43e54287977571dd99eea4b161eb2df1f5108f12a4142a83322edb05a75487a3435c9a78ce53ed93bc550857d7a9fb":char*:"1d65491d79c864b373009be6f6f2467bac4c78fa":hex:"0262ac254bfa77f3c1aca22c5179f8f040422b3c5bafd40a8f21cf0fa5a667ccd5993d42dbafb409c520e25fce2b1ee1e716577f1efa17f3da28052f40f0419b23106d7845aaf01125b698e7a4dfe92d3967bb00c4d0d35ba3552ab9a8b3eef07c7fecdbc5424ac4db1e20cb37d0b2744769940ea907e17fbbca673b20522380c5":int:0
RSASSA-PSS Signature Example 8_2
2:int:1031:int:16:char*:"08dad7f11363faa623d5d6d5e8a319328d82190d7127d2846c439b0ab72619b0a43a95320e4ec34fc3a9cea876422305bd76c5ba7be9e2f410c8060645a1d29edb":int:16:char*:"0847e732376fc7900f898ea82eb2b0fc418565fdae62f7d9ec4ce2217b97990dd272db157f99f63c0dcbb9fbacdbd4c4dadb6df67756358ca4174825b48f49706d":int:16:char*:"495370a1fb18543c16d3631e3163255df62be6eee890d5f25509e4f778a8ea6fbbbcdf85dff64e0d972003ab3681fbba6dd41fd541829b2e582de9f2a4a4e0a2d0900bef4753db3cee0ee06c7dfae8b1d53b5953218f9cceea695b08668edeaadced9463b1d790d5ebf27e9115b46cad4d9a2b8efab0561b0810344739ada0733f":int:16:char*:"010001":exp:0:exp:0:hex:"e2f96eaf0e05e7ba326ecca0ba7fd2f7c02356f3cede9d0faabf4fcc8e60a973e5595fd9ea08":hex:"435c098aa9909eb2377f1248b091b68987ff1838":hex:"2707b9ad5115c58c94e932e8ec0a280f56339e44a1b58d4ddcff2f312e5f34dcfe39e89c6a94dcee86dbbdae5b79ba4e0819a9e7bfd9d982e7ee6c86ee68396e8b3a14c9c8f34b178eb741f9d3f121109bf5c8172fada2e768f9ea1433032c004a8aa07eb990000a48dc94c8bac8aabe2b09b1aa46c0a2aa0e12f63fbba775ba7e":int:0
RSASSA-PSS Signature Example 8_2 (verify)
3:int:1031:int:16:char*:"495370a1fb18543c16d3631e3163255df62be6eee890d5f25509e4f778a8ea6fbbbcdf85dff64e0d972003ab3681fbba6dd41fd541829b2e582de9f2a4a4e0a2d0900bef4753db3cee0ee06c7dfae8b1d53b5953218f9cceea695b08668edeaadced9463b1d790d5ebf27e9115b46cad4d9a2b8efab0561b0810344739ada0733f":int:16:char*:"010001":exp:0:exp:0:hex:"e2f96eaf0e05e7ba326ecca0ba7fd2f7c02356f3cede9d0faabf4fcc8e60a973e5595fd9ea08":char*:"435c098aa9909eb2377f1248b091b68987ff1838":hex:"2707b9ad5115c58c94e932e8ec0a280f56339e44a1b58d4ddcff2f312e5f34dcfe39e89c6a94dcee86dbbdae5b79ba4e0819a9e7bfd9d982e7ee6c86ee68396e8b3a14c9c8f34b178eb741f9d3f121109bf5c8172fada2e768f9ea1433032c004a8aa07eb990000a48dc94c8bac8aabe2b09b1aa46c0a2aa0e12f63fbba775ba7e":int:0
RSASSA-PSS Signature Example 8_3
2:int:1031:int:16:char*:"08dad7f11363faa623d5d6d5e8a319328d82190d7127d2846c439b0ab72619b0a43a95320e4ec34fc3a9cea876422305bd76c5ba7be9e2f410c8060645a1d29edb":int:16:char*:"0847e732376fc7900f898ea82eb2b0fc418565fdae62f7d9ec4ce2217b97990dd272db157f99f63c0dcbb9fbacdbd4c4dadb6df67756358ca4174825b48f49706d":int:16:char*:"495370a1fb18543c16d3631e3163255df62be6eee890d5f25509e4f778a8ea6fbbbcdf85dff64e0d972003ab3681fbba6dd41fd541829b2e582de9f2a4a4e0a2d0900bef4753db3cee0ee06c7dfae8b1d53b5953218f9cceea695b08668edeaadced9463b1d790d5ebf27e9115b46cad4d9a2b8efab0561b0810344739ada0733f":int:16:char*:"010001":exp:0:exp:0:hex:"e35c6ed98f64a6d5a648fcab8adb16331db32e5d15c74a40edf94c3dc4a4de792d190889f20f1e24ed12054a6b28798fcb42d1c548769b734c96373142092aed277603f4738df4dc1446586d0ec64da4fb60536db2ae17fc7e3c04bbfbbbd907bf117c08636fa16f95f51a6216934d3e34f85030f17bbbc5ba69144058aff081e0b19cf03c17195c5e888ba58f6fe0a02e5c3bda9719a7":hex:"c6ebbe76df0c4aea32c474175b2f136862d04529":hex:"2ad20509d78cf26d1b6c406146086e4b0c91a91c2bd164c87b966b8faa42aa0ca446022323ba4b1a1b89706d7f4c3be57d7b69702d168ab5955ee290356b8c4a29ed467d547ec23cbadf286ccb5863c6679da467fc9324a151c7ec55aac6db4084f82726825cfe1aa421bc64049fb42f23148f9c25b2dc300437c38d428aa75f96":int:0
RSASSA-PSS Signature Example 8_3 (verify)
3:int:1031:int:16:char*:"495370a1fb18543c16d3631e3163255df62be6eee890d5f25509e4f778a8ea6fbbbcdf85dff64e0d972003ab3681fbba6dd41fd541829b2e582de9f2a4a4e0a2d0900bef4753db3cee0ee06c7dfae8b1d53b5953218f9cceea695b08668edeaadced9463b1d790d5ebf27e9115b46cad4d9a2b8efab0561b0810344739ada0733f":int:16:char*:"010001":exp:0:exp:0:hex:"e35c6ed98f64a6d5a648fcab8adb16331db32e5d15c74a40edf94c3dc4a4de792d190889f20f1e24ed12054a6b28798fcb42d1c548769b734c96373142092aed277603f4738df4dc1446586d0ec64da4fb60536db2ae17fc7e3c04bbfbbbd907bf117c08636fa16f95f51a6216934d3e34f85030f17bbbc5ba69144058aff081e0b19cf03c17195c5e888ba58f6fe0a02e5c3bda9719a7":char*:"c6ebbe76df0c4aea32c474175b2f136862d04529":hex:"2ad20509d78cf26d1b6c406146086e4b0c91a91c2bd164c87b966b8faa42aa0ca446022323ba4b1a1b89706d7f4c3be57d7b69702d168ab5955ee290356b8c4a29ed467d547ec23cbadf286ccb5863c6679da467fc9324a151c7ec55aac6db4084f82726825cfe1aa421bc64049fb42f23148f9c25b2dc300437c38d428aa75f96":int:0
RSASSA-PSS Signature Example 8_4
2:int:1031:int:16:char*:"08dad7f11363faa623d5d6d5e8a319328d82190d7127d2846c439b0ab72619b0a43a95320e4ec34fc3a9cea876422305bd76c5ba7be9e2f410c8060645a1d29edb":int:16:char*:"0847e732376fc7900f898ea82eb2b0fc418565fdae62f7d9ec4ce2217b97990dd272db157f99f63c0dcbb9fbacdbd4c4dadb6df67756358ca4174825b48f49706d":int:16:char*:"495370a1fb18543c16d3631e3163255df62be6eee890d5f25509e4f778a8ea6fbbbcdf85dff64e0d972003ab3681fbba6dd41fd541829b2e582de9f2a4a4e0a2d0900bef4753db3cee0ee06c7dfae8b1d53b5953218f9cceea695b08668edeaadced9463b1d790d5ebf27e9115b46cad4d9a2b8efab0561b0810344739ada0733f":int:16:char*:"010001":exp:0:exp:0:hex:"dbc5f750a7a14be2b93e838d18d14a8695e52e8add9c0ac733b8f56d2747e529a0cca532dd49b902aefed514447f9e81d16195c2853868cb9b30f7d0d495c69d01b5c5d50b27045db3866c2324a44a110b1717746de457d1c8c45c3cd2a92970c3d59632055d4c98a41d6e99e2a3ddd5f7f9979ab3cd18f37505d25141de2a1bff17b3a7dce9419ecc385cf11d72840f19953fd0509251f6cafde2893d0e75c781ba7a5012ca401a4fa99e04b3c3249f926d5afe82cc87dab22c3c1b105de48e34ace9c9124e59597ac7ebf8":hex:"021fdcc6ebb5e19b1cb16e9c67f27681657fe20a":hex:"1e24e6e58628e5175044a9eb6d837d48af1260b0520e87327de7897ee4d5b9f0df0be3e09ed4dea8c1454ff3423bb08e1793245a9df8bf6ab3968c8eddc3b5328571c77f091cc578576912dfebd164b9de5454fe0be1c1f6385b328360ce67ec7a05f6e30eb45c17c48ac70041d2cab67f0a2ae7aafdcc8d245ea3442a6300ccc7":int:0
RSASSA-PSS Signature Example 8_4 (verify)
3:int:1031:int:16:char*:"495370a1fb18543c16d3631e3163255df62be6eee890d5f25509e4f778a8ea6fbbbcdf85dff64e0d972003ab3681fbba6dd41fd541829b2e582de9f2a4a4e0a2d0900bef4753db3cee0ee06c7dfae8b1d53b5953218f9cceea695b08668edeaadced9463b1d790d5ebf27e9115b46cad4d9a2b8efab0561b0810344739ada0733f":int:16:char*:"010001":exp:0:exp:0:hex:"dbc5f750a7a14be2b93e838d18d14a8695e52e8add9c0ac733b8f56d2747e529a0cca532dd49b902aefed514447f9e81d16195c2853868cb9b30f7d0d495c69d01b5c5d50b27045db3866c2324a44a110b1717746de457d1c8c45c3cd2a92970c3d59632055d4c98a41d6e99e2a3ddd5f7f9979ab3cd18f37505d25141de2a1bff17b3a7dce9419ecc385cf11d72840f19953fd0509251f6cafde2893d0e75c781ba7a5012ca401a4fa99e04b3c3249f926d5afe82cc87dab22c3c1b105de48e34ace9c9124e59597ac7ebf8":char*:"021fdcc6ebb5e19b1cb16e9c67f27681657fe20a":hex:"1e24e6e58628e5175044a9eb6d837d48af1260b0520e87327de7897ee4d5b9f0df0be3e09ed4dea8c1454ff3423bb08e1793245a9df8bf6ab3968c8eddc3b5328571c77f091cc578576912dfebd164b9de5454fe0be1c1f6385b328360ce67ec7a05f6e30eb45c17c48ac70041d2cab67f0a2ae7aafdcc8d245ea3442a6300ccc7":int:0
RSASSA-PSS Signature Example 8_5
2:int:1031:int:16:char*:"08dad7f11363faa623d5d6d5e8a319328d82190d7127d2846c439b0ab72619b0a43a95320e4ec34fc3a9cea876422305bd76c5ba7be9e2f410c8060645a1d29edb":int:16:char*:"0847e732376fc7900f898ea82eb2b0fc418565fdae62f7d9ec4ce2217b97990dd272db157f99f63c0dcbb9fbacdbd4c4dadb6df67756358ca4174825b48f49706d":int:16:char*:"495370a1fb18543c16d3631e3163255df62be6eee890d5f25509e4f778a8ea6fbbbcdf85dff64e0d972003ab3681fbba6dd41fd541829b2e582de9f2a4a4e0a2d0900bef4753db3cee0ee06c7dfae8b1d53b5953218f9cceea695b08668edeaadced9463b1d790d5ebf27e9115b46cad4d9a2b8efab0561b0810344739ada0733f":int:16:char*:"010001":exp:0:exp:0:hex:"04dc251be72e88e5723485b6383a637e2fefe07660c519a560b8bc18bdedb86eae2364ea53ba9dca6eb3d2e7d6b806af42b3e87f291b4a8881d5bf572cc9a85e19c86acb28f098f9da0383c566d3c0f58cfd8f395dcf602e5cd40e8c7183f714996e2297ef":hex:"c558d7167cbb4508ada042971e71b1377eea4269":hex:"33341ba3576a130a50e2a5cf8679224388d5693f5accc235ac95add68e5eb1eec31666d0ca7a1cda6f70a1aa762c05752a51950cdb8af3c5379f18cfe6b5bc55a4648226a15e912ef19ad77adeea911d67cfefd69ba43fa4119135ff642117ba985a7e0100325e9519f1ca6a9216bda055b5785015291125e90dcd07a2ca9673ee":int:0
RSASSA-PSS Signature Example 8_5 (verify)
3:int:1031:int:16:char*:"495370a1fb18543c16d3631e3163255df62be6eee890d5f25509e4f778a8ea6fbbbcdf85dff64e0d972003ab3681fbba6dd41fd541829b2e582de9f2a4a4e0a2d0900bef4753db3cee0ee06c7dfae8b1d53b5953218f9cceea695b08668edeaadced9463b1d790d5ebf27e9115b46cad4d9a2b8efab0561b0810344739ada0733f":int:16:char*:"010001":exp:0:exp:0:hex:"04dc251be72e88e5723485b6383a637e2fefe07660c519a560b8bc18bdedb86eae2364ea53ba9dca6eb3d2e7d6b806af42b3e87f291b4a8881d5bf572cc9a85e19c86acb28f098f9da0383c566d3c0f58cfd8f395dcf602e5cd40e8c7183f714996e2297ef":char*:"c558d7167cbb4508ada042971e71b1377eea4269":hex:"33341ba3576a130a50e2a5cf8679224388d5693f5accc235ac95add68e5eb1eec31666d0ca7a1cda6f70a1aa762c05752a51950cdb8af3c5379f18cfe6b5bc55a4648226a15e912ef19ad77adeea911d67cfefd69ba43fa4119135ff642117ba985a7e0100325e9519f1ca6a9216bda055b5785015291125e90dcd07a2ca9673ee":int:0
RSASSA-PSS Signature Example 8_6
2:int:1031:int:16:char*:"08dad7f11363faa623d5d6d5e8a319328d82190d7127d2846c439b0ab72619b0a43a95320e4ec34fc3a9cea876422305bd76c5ba7be9e2f410c8060645a1d29edb":int:16:char*:"0847e732376fc7900f898ea82eb2b0fc418565fdae62f7d9ec4ce2217b97990dd272db157f99f63c0dcbb9fbacdbd4c4dadb6df67756358ca4174825b48f49706d":int:16:char*:"495370a1fb18543c16d3631e3163255df62be6eee890d5f25509e4f778a8ea6fbbbcdf85dff64e0d972003ab3681fbba6dd41fd541829b2e582de9f2a4a4e0a2d0900bef4753db3cee0ee06c7dfae8b1d53b5953218f9cceea695b08668edeaadced9463b1d790d5ebf27e9115b46cad4d9a2b8efab0561b0810344739ada0733f":int:16:char*:"010001":exp:0:exp:0:hex:"0ea37df9a6fea4a8b610373c24cf390c20fa6e2135c400c8a34f5c183a7e8ea4c9ae090ed31759f42dc77719cca400ecdcc517acfc7ac6902675b2ef30c509665f3321482fc69a9fb570d15e01c845d0d8e50d2a24cbf1cf0e714975a5db7b18d9e9e9cb91b5cb16869060ed18b7b56245503f0caf90352b8de81cb5a1d9c6336092f0cd":hex:"76fd4e64fdc98eb927a0403e35a084e76ba9f92a":hex:"1ed1d848fb1edb44129bd9b354795af97a069a7a00d0151048593e0c72c3517ff9ff2a41d0cb5a0ac860d736a199704f7cb6a53986a88bbd8abcc0076a2ce847880031525d449da2ac78356374c536e343faa7cba42a5aaa6506087791c06a8e989335aed19bfab2d5e67e27fb0c2875af896c21b6e8e7309d04e4f6727e69463e":int:0
RSASSA-PSS Signature Example 8_6 (verify)
3:int:1031:int:16:char*:"495370a1fb18543c16d3631e3163255df62be6eee890d5f25509e4f778a8ea6fbbbcdf85dff64e0d972003ab3681fbba6dd41fd541829b2e582de9f2a4a4e0a2d0900bef4753db3cee0ee06c7dfae8b1d53b5953218f9cceea695b08668edeaadced9463b1d790d5ebf27e9115b46cad4d9a2b8efab0561b0810344739ada0733f":int:16:char*:"010001":exp:0:exp:0:hex:"0ea37df9a6fea4a8b610373c24cf390c20fa6e2135c400c8a34f5c183a7e8ea4c9ae090ed31759f42dc77719cca400ecdcc517acfc7ac6902675b2ef30c509665f3321482fc69a9fb570d15e01c845d0d8e50d2a24cbf1cf0e714975a5db7b18d9e9e9cb91b5cb16869060ed18b7b56245503f0caf90352b8de81cb5a1d9c6336092f0cd":char*:"76fd4e64fdc98eb927a0403e35a084e76ba9f92a":hex:"1ed1d848fb1edb44129bd9b354795af97a069a7a00d0151048593e0c72c3517ff9ff2a41d0cb5a0ac860d736a199704f7cb6a53986a88bbd8abcc0076a2ce847880031525d449da2ac78356374c536e343faa7cba42a5aaa6506087791c06a8e989335aed19bfab2d5e67e27fb0c2875af896c21b6e8e7309d04e4f6727e69463e":int:0
RSASSA-PSS Signature Example 9_1
2:int:1536:int:16:char*:"f8eb97e98df12664eefdb761596a69ddcd0e76daece6ed4bf5a1b50ac086f7928a4d2f8726a77e515b74da41988f220b1cc87aa1fc810ce99a82f2d1ce821edced794c6941f42c7a1a0b8c4d28c75ec60b652279f6154a762aed165d47dee367":int:16:char*:"ed4d71d0a6e24b93c2e5f6b4bbe05f5fb0afa042d204fe3378d365c2f288b6a8dad7efe45d153eef40cacc7b81ff934002d108994b94a5e4728cd9c963375ae49965bda55cbf0efed8d6553b4027f2d86208a6e6b489c176128092d629e49d3d":int:16:char*:"e6bd692ac96645790403fdd0f5beb8b9bf92ed10007fc365046419dd06c05c5b5b2f48ecf989e4ce269109979cbb40b4a0ad24d22483d1ee315ad4ccb1534268352691c524f6dd8e6c29d224cf246973aec86c5bf6b1401a850d1b9ad1bb8cbcec47b06f0f8c7f45d3fc8f319299c5433ddbc2b3053b47ded2ecd4a4caefd614833dc8bb622f317ed076b8057fe8de3f84480ad5e83e4a61904a4f248fb397027357e1d30e463139815c6fd4fd5ac5b8172a45230ecb6318a04f1455d84e5a8b":int:16:char*:"010001":exp:0:exp:0:hex:"a88e265855e9d7ca36c68795f0b31b591cd6587c71d060a0b3f7f3eaef43795922028bc2b6ad467cfc2d7f659c5385aa70ba3672cdde4cfe4970cc7904601b278872bf51321c4a972f3c95570f3445d4f57980e0f20df54846e6a52c668f1288c03f95006ea32f562d40d52af9feb32f0fa06db65b588a237b34e592d55cf979f903a642ef64d2ed542aa8c77dc1dd762f45a59303ed75e541ca271e2b60ca709e44fa0661131e8d5d4163fd8d398566ce26de8730e72f9cca737641c244159420637028df0a18079d6208ea8b4711a2c750f5":hex:"c0a425313df8d7564bd2434d311523d5257eed80":hex:"586107226c3ce013a7c8f04d1a6a2959bb4b8e205ba43a27b50f124111bc35ef589b039f5932187cb696d7d9a32c0c38300a5cdda4834b62d2eb240af33f79d13dfbf095bf599e0d9686948c1964747b67e89c9aba5cd85016236f566cc5802cb13ead51bc7ca6bef3b94dcbdbb1d570469771df0e00b1a8a06777472d2316279edae86474668d4e1efff95f1de61c6020da32ae92bbf16520fef3cf4d88f61121f24bbd9fe91b59caf1235b2a93ff81fc403addf4ebdea84934a9cdaf8e1a9e":int:0
RSASSA-PSS Signature Example 9_1 (verify)
3:int:1536:int:16:char*:"e6bd692ac96645790403fdd0f5beb8b9bf92ed10007fc365046419dd06c05c5b5b2f48ecf989e4ce269109979cbb40b4a0ad24d22483d1ee315ad4ccb1534268352691c524f6dd8e6c29d224cf246973aec86c5bf6b1401a850d1b9ad1bb8cbcec47b06f0f8c7f45d3fc8f319299c5433ddbc2b3053b47ded2ecd4a4caefd614833dc8bb622f317ed076b8057fe8de3f84480ad5e83e4a61904a4f248fb397027357e1d30e463139815c6fd4fd5ac5b8172a45230ecb6318a04f1455d84e5a8b":int:16:char*:"010001":exp:0:exp:0:hex:"a88e265855e9d7ca36c68795f0b31b591cd6587c71d060a0b3f7f3eaef43795922028bc2b6ad467cfc2d7f659c5385aa70ba3672cdde4cfe4970cc7904601b278872bf51321c4a972f3c95570f3445d4f57980e0f20df54846e6a52c668f1288c03f95006ea32f562d40d52af9feb32f0fa06db65b588a237b34e592d55cf979f903a642ef64d2ed542aa8c77dc1dd762f45a59303ed75e541ca271e2b60ca709e44fa0661131e8d5d4163fd8d398566ce26de8730e72f9cca737641c244159420637028df0a18079d6208ea8b4711a2c750f5":char*:"c0a425313df8d7564bd2434d311523d5257eed80":hex:"586107226c3ce013a7c8f04d1a6a2959bb4b8e205ba43a27b50f124111bc35ef589b039f5932187cb696d7d9a32c0c38300a5cdda4834b62d2eb240af33f79d13dfbf095bf599e0d9686948c1964747b67e89c9aba5cd85016236f566cc5802cb13ead51bc7ca6bef3b94dcbdbb1d570469771df0e00b1a8a06777472d2316279edae86474668d4e1efff95f1de61c6020da32ae92bbf16520fef3cf4d88f61121f24bbd9fe91b59caf1235b2a93ff81fc403addf4ebdea84934a9cdaf8e1a9e":int:0
RSASSA-PSS Signature Example 9_2
2:int:1536:int:16:char*:"f8eb97e98df12664eefdb761596a69ddcd0e76daece6ed4bf5a1b50ac086f7928a4d2f8726a77e515b74da41988f220b1cc87aa1fc810ce99a82f2d1ce821edced794c6941f42c7a1a0b8c4d28c75ec60b652279f6154a762aed165d47dee367":int:16:char*:"ed4d71d0a6e24b93c2e5f6b4bbe05f5fb0afa042d204fe3378d365c2f288b6a8dad7efe45d153eef40cacc7b81ff934002d108994b94a5e4728cd9c963375ae49965bda55cbf0efed8d6553b4027f2d86208a6e6b489c176128092d629e49d3d":int:16:char*:"e6bd692ac96645790403fdd0f5beb8b9bf92ed10007fc365046419dd06c05c5b5b2f48ecf989e4ce269109979cbb40b4a0ad24d22483d1ee315ad4ccb1534268352691c524f6dd8e6c29d224cf246973aec86c5bf6b1401a850d1b9ad1bb8cbcec47b06f0f8c7f45d3fc8f319299c5433ddbc2b3053b47ded2ecd4a4caefd614833dc8bb622f317ed076b8057fe8de3f84480ad5e83e4a61904a4f248fb397027357e1d30e463139815c6fd4fd5ac5b8172a45230ecb6318a04f1455d84e5a8b":int:16:char*:"010001":exp:0:exp:0:hex:"c8c9c6af04acda414d227ef23e0820c3732c500dc87275e95b0d095413993c2658bc1d988581ba879c2d201f14cb88ced153a01969a7bf0a7be79c84c1486bc12b3fa6c59871b6827c8ce253ca5fefa8a8c690bf326e8e37cdb96d90a82ebab69f86350e1822e8bd536a2e":hex:"b307c43b4850a8dac2f15f32e37839ef8c5c0e91":hex:"80b6d643255209f0a456763897ac9ed259d459b49c2887e5882ecb4434cfd66dd7e1699375381e51cd7f554f2c271704b399d42b4be2540a0eca61951f55267f7c2878c122842dadb28b01bd5f8c025f7e228418a673c03d6bc0c736d0a29546bd67f786d9d692ccea778d71d98c2063b7a71092187a4d35af108111d83e83eae46c46aa34277e06044589903788f1d5e7cee25fb485e92949118814d6f2c3ee361489016f327fb5bc517eb50470bffa1afa5f4ce9aa0ce5b8ee19bf5501b958":int:0
RSASSA-PSS Signature Example 9_2 (verify)
3:int:1536:int:16:char*:"e6bd692ac96645790403fdd0f5beb8b9bf92ed10007fc365046419dd06c05c5b5b2f48ecf989e4ce269109979cbb40b4a0ad24d22483d1ee315ad4ccb1534268352691c524f6dd8e6c29d224cf246973aec86c5bf6b1401a850d1b9ad1bb8cbcec47b06f0f8c7f45d3fc8f319299c5433ddbc2b3053b47ded2ecd4a4caefd614833dc8bb622f317ed076b8057fe8de3f84480ad5e83e4a61904a4f248fb397027357e1d30e463139815c6fd4fd5ac5b8172a45230ecb6318a04f1455d84e5a8b":int:16:char*:"010001":exp:0:exp:0:hex:"c8c9c6af04acda414d227ef23e0820c3732c500dc87275e95b0d095413993c2658bc1d988581ba879c2d201f14cb88ced153a01969a7bf0a7be79c84c1486bc12b3fa6c59871b6827c8ce253ca5fefa8a8c690bf326e8e37cdb96d90a82ebab69f86350e1822e8bd536a2e":char*:"b307c43b4850a8dac2f15f32e37839ef8c5c0e91":hex:"80b6d643255209f0a456763897ac9ed259d459b49c2887e5882ecb4434cfd66dd7e1699375381e51cd7f554f2c271704b399d42b4be2540a0eca61951f55267f7c2878c122842dadb28b01bd5f8c025f7e228418a673c03d6bc0c736d0a29546bd67f786d9d692ccea778d71d98c2063b7a71092187a4d35af108111d83e83eae46c46aa34277e06044589903788f1d5e7cee25fb485e92949118814d6f2c3ee361489016f327fb5bc517eb50470bffa1afa5f4ce9aa0ce5b8ee19bf5501b958":int:0
RSASSA-PSS Signature Example 9_3
2:int:1536:int:16:char*:"f8eb97e98df12664eefdb761596a69ddcd0e76daece6ed4bf5a1b50ac086f7928a4d2f8726a77e515b74da41988f220b1cc87aa1fc810ce99a82f2d1ce821edced794c6941f42c7a1a0b8c4d28c75ec60b652279f6154a762aed165d47dee367":int:16:char*:"ed4d71d0a6e24b93c2e5f6b4bbe05f5fb0afa042d204fe3378d365c2f288b6a8dad7efe45d153eef40cacc7b81ff934002d108994b94a5e4728cd9c963375ae49965bda55cbf0efed8d6553b4027f2d86208a6e6b489c176128092d629e49d3d":int:16:char*:"e6bd692ac96645790403fdd0f5beb8b9bf92ed10007fc365046419dd06c05c5b5b2f48ecf989e4ce269109979cbb40b4a0ad24d22483d1ee315ad4ccb1534268352691c524f6dd8e6c29d224cf246973aec86c5bf6b1401a850d1b9ad1bb8cbcec47b06f0f8c7f45d3fc8f319299c5433ddbc2b3053b47ded2ecd4a4caefd614833dc8bb622f317ed076b8057fe8de3f84480ad5e83e4a61904a4f248fb397027357e1d30e463139815c6fd4fd5ac5b8172a45230ecb6318a04f1455d84e5a8b":int:16:char*:"010001":exp:0:exp:0:hex:"0afad42ccd4fc60654a55002d228f52a4a5fe03b8bbb08ca82daca558b44dbe1266e50c0e745a36d9d2904e3408abcd1fd569994063f4a75cc72f2fee2a0cd893a43af1c5b8b487df0a71610024e4f6ddf9f28ad0813c1aab91bcb3c9064d5ff742deffea657094139369e5ea6f4a96319a5cc8224145b545062758fefd1fe3409ae169259c6cdfd6b5f2958e314faecbe69d2cace58ee55179ab9b3e6d1ecc14a557c5febe988595264fc5da1c571462eca798a18a1a4940cdab4a3e92009ccd42e1e947b1314e32238a2dece7d23a89b5b30c751fd0a4a430d2c548594":hex:"9a2b007e80978bbb192c354eb7da9aedfc74dbf5":hex:"484408f3898cd5f53483f80819efbf2708c34d27a8b2a6fae8b322f9240237f981817aca1846f1084daa6d7c0795f6e5bf1af59c38e1858437ce1f7ec419b98c8736adf6dd9a00b1806d2bd3ad0a73775e05f52dfef3a59ab4b08143f0df05cd1ad9d04bececa6daa4a2129803e200cbc77787caf4c1d0663a6c5987b605952019782caf2ec1426d68fb94ed1d4be816a7ed081b77e6ab330b3ffc073820fecde3727fcbe295ee61a050a343658637c3fd659cfb63736de32d9f90d3c2f63eca":int:0
RSASSA-PSS Signature Example 9_3 (verify)
3:int:1536:int:16:char*:"e6bd692ac96645790403fdd0f5beb8b9bf92ed10007fc365046419dd06c05c5b5b2f48ecf989e4ce269109979cbb40b4a0ad24d22483d1ee315ad4ccb1534268352691c524f6dd8e6c29d224cf246973aec86c5bf6b1401a850d1b9ad1bb8cbcec47b06f0f8c7f45d3fc8f319299c5433ddbc2b3053b47ded2ecd4a4caefd614833dc8bb622f317ed076b8057fe8de3f84480ad5e83e4a61904a4f248fb397027357e1d30e463139815c6fd4fd5ac5b8172a45230ecb6318a04f1455d84e5a8b":int:16:char*:"010001":exp:0:exp:0:hex:"0afad42ccd4fc60654a55002d228f52a4a5fe03b8bbb08ca82daca558b44dbe1266e50c0e745a36d9d2904e3408abcd1fd569994063f4a75cc72f2fee2a0cd893a43af1c5b8b487df0a71610024e4f6ddf9f28ad0813c1aab91bcb3c9064d5ff742deffea657094139369e5ea6f4a96319a5cc8224145b545062758fefd1fe3409ae169259c6cdfd6b5f2958e314faecbe69d2cace58ee55179ab9b3e6d1ecc14a557c5febe988595264fc5da1c571462eca798a18a1a4940cdab4a3e92009ccd42e1e947b1314e32238a2dece7d23a89b5b30c751fd0a4a430d2c548594":char*:"9a2b007e80978bbb192c354eb7da9aedfc74dbf5":hex:"484408f3898cd5f53483f80819efbf2708c34d27a8b2a6fae8b322f9240237f981817aca1846f1084daa6d7c0795f6e5bf1af59c38e1858437ce1f7ec419b98c8736adf6dd9a00b1806d2bd3ad0a73775e05f52dfef3a59ab4b08143f0df05cd1ad9d04bececa6daa4a2129803e200cbc77787caf4c1d0663a6c5987b605952019782caf2ec1426d68fb94ed1d4be816a7ed081b77e6ab330b3ffc073820fecde3727fcbe295ee61a050a343658637c3fd659cfb63736de32d9f90d3c2f63eca":int:0
RSASSA-PSS Signature Example 9_4
2:int:1536:int:16:char*:"f8eb97e98df12664eefdb761596a69ddcd0e76daece6ed4bf5a1b50ac086f7928a4d2f8726a77e515b74da41988f220b1cc87aa1fc810ce99a82f2d1ce821edced794c6941f42c7a1a0b8c4d28c75ec60b652279f6154a762aed165d47dee367":int:16:char*:"ed4d71d0a6e24b93c2e5f6b4bbe05f5fb0afa042d204fe3378d365c2f288b6a8dad7efe45d153eef40cacc7b81ff934002d108994b94a5e4728cd9c963375ae49965bda55cbf0efed8d6553b4027f2d86208a6e6b489c176128092d629e49d3d":int:16:char*:"e6bd692ac96645790403fdd0f5beb8b9bf92ed10007fc365046419dd06c05c5b5b2f48ecf989e4ce269109979cbb40b4a0ad24d22483d1ee315ad4ccb1534268352691c524f6dd8e6c29d224cf246973aec86c5bf6b1401a850d1b9ad1bb8cbcec47b06f0f8c7f45d3fc8f319299c5433ddbc2b3053b47ded2ecd4a4caefd614833dc8bb622f317ed076b8057fe8de3f84480ad5e83e4a61904a4f248fb397027357e1d30e463139815c6fd4fd5ac5b8172a45230ecb6318a04f1455d84e5a8b":int:16:char*:"010001":exp:0:exp:0:hex:"1dfd43b46c93db82629bdae2bd0a12b882ea04c3b465f5cf93023f01059626dbbe99f26bb1be949dddd16dc7f3debb19a194627f0b224434df7d8700e9e98b06e360c12fdbe3d19f51c9684eb9089ecbb0a2f0450399d3f59eac7294085d044f5393c6ce737423d8b86c415370d389e30b9f0a3c02d25d0082e8ad6f3f1ef24a45c3cf82b383367063a4d4613e4264f01b2dac2e5aa42043f8fb5f69fa871d14fb273e767a531c40f02f343bc2fb45a0c7e0f6be2561923a77211d66a6e2dbb43c366350beae22da3ac2c1f5077096fcb5c4bf255f7574351ae0b1e1f03632817c0856d4a8ba97afbdc8b85855402bc56926fcec209f9ea8":hex:"70f382bddf4d5d2dd88b3bc7b7308be632b84045":hex:"84ebeb481be59845b46468bafb471c0112e02b235d84b5d911cbd1926ee5074ae0424495cb20e82308b8ebb65f419a03fb40e72b78981d88aad143053685172c97b29c8b7bf0ae73b5b2263c403da0ed2f80ff7450af7828eb8b86f0028bd2a8b176a4d228cccea18394f238b09ff758cc00bc04301152355742f282b54e663a919e709d8da24ade5500a7b9aa50226e0ca52923e6c2d860ec50ff480fa57477e82b0565f4379f79c772d5c2da80af9fbf325ece6fc20b00961614bee89a183e":int:0
RSASSA-PSS Signature Example 9_4 (verify)
3:int:1536:int:16:char*:"e6bd692ac96645790403fdd0f5beb8b9bf92ed10007fc365046419dd06c05c5b5b2f48ecf989e4ce269109979cbb40b4a0ad24d22483d1ee315ad4ccb1534268352691c524f6dd8e6c29d224cf246973aec86c5bf6b1401a850d1b9ad1bb8cbcec47b06f0f8c7f45d3fc8f319299c5433ddbc2b3053b47ded2ecd4a4caefd614833dc8bb622f317ed076b8057fe8de3f84480ad5e83e4a61904a4f248fb397027357e1d30e463139815c6fd4fd5ac5b8172a45230ecb6318a04f1455d84e5a8b":int:16:char*:"010001":exp:0:exp:0:hex:"1dfd43b46c93db82629bdae2bd0a12b882ea04c3b465f5cf93023f01059626dbbe99f26bb1be949dddd16dc7f3debb19a194627f0b224434df7d8700e9e98b06e360c12fdbe3d19f51c9684eb9089ecbb0a2f0450399d3f59eac7294085d044f5393c6ce737423d8b86c415370d389e30b9f0a3c02d25d0082e8ad6f3f1ef24a45c3cf82b383367063a4d4613e4264f01b2dac2e5aa42043f8fb5f69fa871d14fb273e767a531c40f02f343bc2fb45a0c7e0f6be2561923a77211d66a6e2dbb43c366350beae22da3ac2c1f5077096fcb5c4bf255f7574351ae0b1e1f03632817c0856d4a8ba97afbdc8b85855402bc56926fcec209f9ea8":char*:"70f382bddf4d5d2dd88b3bc7b7308be632b84045":hex:"84ebeb481be59845b46468bafb471c0112e02b235d84b5d911cbd1926ee5074ae0424495cb20e82308b8ebb65f419a03fb40e72b78981d88aad143053685172c97b29c8b7bf0ae73b5b2263c403da0ed2f80ff7450af7828eb8b86f0028bd2a8b176a4d228cccea18394f238b09ff758cc00bc04301152355742f282b54e663a919e709d8da24ade5500a7b9aa50226e0ca52923e6c2d860ec50ff480fa57477e82b0565f4379f79c772d5c2da80af9fbf325ece6fc20b00961614bee89a183e":int:0
RSASSA-PSS Signature Example 9_5
2:int:1536:int:16:char*:"f8eb97e98df12664eefdb761596a69ddcd0e76daece6ed4bf5a1b50ac086f7928a4d2f8726a77e515b74da41988f220b1cc87aa1fc810ce99a82f2d1ce821edced794c6941f42c7a1a0b8c4d28c75ec60b652279f6154a762aed165d47dee367":int:16:char*:"ed4d71d0a6e24b93c2e5f6b4bbe05f5fb0afa042d204fe3378d365c2f288b6a8dad7efe45d153eef40cacc7b81ff934002d108994b94a5e4728cd9c963375ae49965bda55cbf0efed8d6553b4027f2d86208a6e6b489c176128092d629e49d3d":int:16:char*:"e6bd692ac96645790403fdd0f5beb8b9bf92ed10007fc365046419dd06c05c5b5b2f48ecf989e4ce269109979cbb40b4a0ad24d22483d1ee315ad4ccb1534268352691c524f6dd8e6c29d224cf246973aec86c5bf6b1401a850d1b9ad1bb8cbcec47b06f0f8c7f45d3fc8f319299c5433ddbc2b3053b47ded2ecd4a4caefd614833dc8bb622f317ed076b8057fe8de3f84480ad5e83e4a61904a4f248fb397027357e1d30e463139815c6fd4fd5ac5b8172a45230ecb6318a04f1455d84e5a8b":int:16:char*:"010001":exp:0:exp:0:hex:"1bdc6e7c98fb8cf54e9b097b66a831e9cfe52d9d4888448ee4b0978093ba1d7d73ae78b3a62ba4ad95cd289ccb9e005226bb3d178bccaa821fb044a4e21ee97696c14d0678c94c2dae93b0ad73922218553daa7e44ebe57725a7a45cc72b9b2138a6b17c8db411ce8279ee1241aff0a8bec6f77f87edb0c69cb27236e3435a800b192e4f11e519e3fe30fc30eaccca4fbb41769029bf708e817a9e683805be67fa100984683b74838e3bcffa79366eed1d481c76729118838f31ba8a048a93c1be4424598e8df6328b7a77880a3f9c7e2e8dfca8eb5a26fb86bdc556d42bbe01d9fa6ed80646491c9341":hex:"d689257a86effa68212c5e0c619eca295fb91b67":hex:"82102df8cb91e7179919a04d26d335d64fbc2f872c44833943241de8454810274cdf3db5f42d423db152af7135f701420e39b494a67cbfd19f9119da233a23da5c6439b5ba0d2bc373eee3507001378d4a4073856b7fe2aba0b5ee93b27f4afec7d4d120921c83f606765b02c19e4d6a1a3b95fa4c422951be4f52131077ef17179729cddfbdb56950dbaceefe78cb16640a099ea56d24389eef10f8fecb31ba3ea3b227c0a86698bb89e3e9363905bf22777b2a3aa521b65b4cef76d83bde4c":int:0
RSASSA-PSS Signature Example 9_5 (verify)
3:int:1536:int:16:char*:"e6bd692ac96645790403fdd0f5beb8b9bf92ed10007fc365046419dd06c05c5b5b2f48ecf989e4ce269109979cbb40b4a0ad24d22483d1ee315ad4ccb1534268352691c524f6dd8e6c29d224cf246973aec86c5bf6b1401a850d1b9ad1bb8cbcec47b06f0f8c7f45d3fc8f319299c5433ddbc2b3053b47ded2ecd4a4caefd614833dc8bb622f317ed076b8057fe8de3f84480ad5e83e4a61904a4f248fb397027357e1d30e463139815c6fd4fd5ac5b8172a45230ecb6318a04f1455d84e5a8b":int:16:char*:"010001":exp:0:exp:0:hex:"1bdc6e7c98fb8cf54e9b097b66a831e9cfe52d9d4888448ee4b0978093ba1d7d73ae78b3a62ba4ad95cd289ccb9e005226bb3d178bccaa821fb044a4e21ee97696c14d0678c94c2dae93b0ad73922218553daa7e44ebe57725a7a45cc72b9b2138a6b17c8db411ce8279ee1241aff0a8bec6f77f87edb0c69cb27236e3435a800b192e4f11e519e3fe30fc30eaccca4fbb41769029bf708e817a9e683805be67fa100984683b74838e3bcffa79366eed1d481c76729118838f31ba8a048a93c1be4424598e8df6328b7a77880a3f9c7e2e8dfca8eb5a26fb86bdc556d42bbe01d9fa6ed80646491c9341":char*:"d689257a86effa68212c5e0c619eca295fb91b67":hex:"82102df8cb91e7179919a04d26d335d64fbc2f872c44833943241de8454810274cdf3db5f42d423db152af7135f701420e39b494a67cbfd19f9119da233a23da5c6439b5ba0d2bc373eee3507001378d4a4073856b7fe2aba0b5ee93b27f4afec7d4d120921c83f606765b02c19e4d6a1a3b95fa4c422951be4f52131077ef17179729cddfbdb56950dbaceefe78cb16640a099ea56d24389eef10f8fecb31ba3ea3b227c0a86698bb89e3e9363905bf22777b2a3aa521b65b4cef76d83bde4c":int:0
RSASSA-PSS Signature Example 9_6
2:int:1536:int:16:char*:"f8eb97e98df12664eefdb761596a69ddcd0e76daece6ed4bf5a1b50ac086f7928a4d2f8726a77e515b74da41988f220b1cc87aa1fc810ce99a82f2d1ce821edced794c6941f42c7a1a0b8c4d28c75ec60b652279f6154a762aed165d47dee367":int:16:char*:"ed4d71d0a6e24b93c2e5f6b4bbe05f5fb0afa042d204fe3378d365c2f288b6a8dad7efe45d153eef40cacc7b81ff934002d108994b94a5e4728cd9c963375ae49965bda55cbf0efed8d6553b4027f2d86208a6e6b489c176128092d629e49d3d":int:16:char*:"e6bd692ac96645790403fdd0f5beb8b9bf92ed10007fc365046419dd06c05c5b5b2f48ecf989e4ce269109979cbb40b4a0ad24d22483d1ee315ad4ccb1534268352691c524f6dd8e6c29d224cf246973aec86c5bf6b1401a850d1b9ad1bb8cbcec47b06f0f8c7f45d3fc8f319299c5433ddbc2b3053b47ded2ecd4a4caefd614833dc8bb622f317ed076b8057fe8de3f84480ad5e83e4a61904a4f248fb397027357e1d30e463139815c6fd4fd5ac5b8172a45230ecb6318a04f1455d84e5a8b":int:16:char*:"010001":exp:0:exp:0:hex:"88c7a9f1360401d90e53b101b61c5325c3c75db1b411fbeb8e830b75e96b56670ad245404e16793544ee354bc613a90cc9848715a73db5893e7f6d279815c0c1de83ef8e2956e3a56ed26a888d7a9cdcd042f4b16b7fa51ef1a0573662d16a302d0ec5b285d2e03ad96529c87b3d374db372d95b2443d061b6b1a350ba87807ed083afd1eb05c3f52f4eba5ed2227714fdb50b9d9d9dd6814f62f6272fcd5cdbce7a9ef797":hex:"c25f13bf67d081671a0481a1f1820d613bba2276":hex:"a7fdb0d259165ca2c88d00bbf1028a867d337699d061193b17a9648e14ccbbaadeacaacdec815e7571294ebb8a117af205fa078b47b0712c199e3ad05135c504c24b81705115740802487992ffd511d4afc6b854491eb3f0dd523139542ff15c3101ee85543517c6a3c79417c67e2dd9aa741e9a29b06dcb593c2336b3670ae3afbac7c3e76e215473e866e338ca244de00b62624d6b9426822ceae9f8cc460895f41250073fd45c5a1e7b425c204a423a699159f6903e710b37a7bb2bc8049f":int:0
RSASSA-PSS Signature Example 9_6 (verify)
3:int:1536:int:16:char*:"e6bd692ac96645790403fdd0f5beb8b9bf92ed10007fc365046419dd06c05c5b5b2f48ecf989e4ce269109979cbb40b4a0ad24d22483d1ee315ad4ccb1534268352691c524f6dd8e6c29d224cf246973aec86c5bf6b1401a850d1b9ad1bb8cbcec47b06f0f8c7f45d3fc8f319299c5433ddbc2b3053b47ded2ecd4a4caefd614833dc8bb622f317ed076b8057fe8de3f84480ad5e83e4a61904a4f248fb397027357e1d30e463139815c6fd4fd5ac5b8172a45230ecb6318a04f1455d84e5a8b":int:16:char*:"010001":exp:0:exp:0:hex:"88c7a9f1360401d90e53b101b61c5325c3c75db1b411fbeb8e830b75e96b56670ad245404e16793544ee354bc613a90cc9848715a73db5893e7f6d279815c0c1de83ef8e2956e3a56ed26a888d7a9cdcd042f4b16b7fa51ef1a0573662d16a302d0ec5b285d2e03ad96529c87b3d374db372d95b2443d061b6b1a350ba87807ed083afd1eb05c3f52f4eba5ed2227714fdb50b9d9d9dd6814f62f6272fcd5cdbce7a9ef797":char*:"c25f13bf67d081671a0481a1f1820d613bba2276":hex:"a7fdb0d259165ca2c88d00bbf1028a867d337699d061193b17a9648e14ccbbaadeacaacdec815e7571294ebb8a117af205fa078b47b0712c199e3ad05135c504c24b81705115740802487992ffd511d4afc6b854491eb3f0dd523139542ff15c3101ee85543517c6a3c79417c67e2dd9aa741e9a29b06dcb593c2336b3670ae3afbac7c3e76e215473e866e338ca244de00b62624d6b9426822ceae9f8cc460895f41250073fd45c5a1e7b425c204a423a699159f6903e710b37a7bb2bc8049f":int:0
RSASSA-PSS Signature Example 10_1
2:int:2048:int:16:char*:"cfd50283feeeb97f6f08d73cbc7b3836f82bbcd499479f5e6f76fdfcb8b38c4f71dc9e88bd6a6f76371afd65d2af1862b32afb34a95f71b8b132043ffebe3a952baf7592448148c03f9c69b1d68e4ce5cf32c86baf46fed301ca1ab403069b32f456b91f71898ab081cd8c4252ef5271915c9794b8f295851da7510f99cb73eb":int:16:char*:"cc4e90d2a1b3a065d3b2d1f5a8fce31b544475664eab561d2971b99fb7bef844e8ec1f360b8c2ac8359692971ea6a38f723fcc211f5dbcb177a0fdac5164a1d4ff7fbb4e829986353cb983659a148cdd420c7d31ba3822ea90a32be46c030e8c17e1fa0ad37859e06b0aa6fa3b216d9cbe6c0e22339769c0a615913e5da719cf":int:16:char*:"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":int:16:char*:"010001":exp:0:exp:0:hex:"883177e5126b9be2d9a9680327d5370c6f26861f5820c43da67a3ad609":hex:"04e215ee6ff934b9da70d7730c8734abfcecde89":hex:"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":int:0
RSASSA-PSS Signature Example 10_1 (verify)
3:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:exp:0:hex:"883177e5126b9be2d9a9680327d5370c6f26861f5820c43da67a3ad609":char*:"04e215ee6ff934b9da70d7730c8734abfcecde89":hex:"82c2b160093b8aa3c0f7522b19f87354066c77847abf2a9fce542d0e84e920c5afb49ffdfdace16560ee94a1369601148ebad7a0e151cf16331791a5727d05f21e74e7eb811440206935d744765a15e79f015cb66c532c87a6a05961c8bfad741a9a6657022894393e7223739796c02a77455d0f555b0ec01ddf259b6207fd0fd57614cef1a5573baaff4ec00069951659b85f24300a25160ca8522dc6e6727e57d019d7e63629b8fe5e89e25cc15beb3a647577559299280b9b28f79b0409000be25bbd96408ba3b43cc486184dd1c8e62553fa1af4040f60663de7f5e49c04388e257f1ce89c95dab48a315d9b66b1b7628233876ff2385230d070d07e1666":int:0
RSASSA-PSS Signature Example 10_2
2:int:2048:int:16:char*:"cfd50283feeeb97f6f08d73cbc7b3836f82bbcd499479f5e6f76fdfcb8b38c4f71dc9e88bd6a6f76371afd65d2af1862b32afb34a95f71b8b132043ffebe3a952baf7592448148c03f9c69b1d68e4ce5cf32c86baf46fed301ca1ab403069b32f456b91f71898ab081cd8c4252ef5271915c9794b8f295851da7510f99cb73eb":int:16:char*:"cc4e90d2a1b3a065d3b2d1f5a8fce31b544475664eab561d2971b99fb7bef844e8ec1f360b8c2ac8359692971ea6a38f723fcc211f5dbcb177a0fdac5164a1d4ff7fbb4e829986353cb983659a148cdd420c7d31ba3822ea90a32be46c030e8c17e1fa0ad37859e06b0aa6fa3b216d9cbe6c0e22339769c0a615913e5da719cf":int:16:char*:"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":int:16:char*:"010001":exp:0:exp:0:hex:"dd670a01465868adc93f26131957a50c52fb777cdbaa30892c9e12361164ec13979d43048118e4445db87bee58dd987b3425d02071d8dbae80708b039dbb64dbd1de5657d9fed0c118a54143742e0ff3c87f74e45857647af3f79eb0a14c9d75ea9a1a04b7cf478a897a708fd988f48e801edb0b7039df8c23bb3c56f4e821ac":hex:"8b2bdd4b40faf545c778ddf9bc1a49cb57f9b71b":hex:"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":int:0
RSASSA-PSS Signature Example 10_2 (verify)
3:int:2048:int:16:char*:"a5dd867ac4cb02f90b9457d48c14a770ef991c56c39c0ec65fd11afa8937cea57b9be7ac73b45c0017615b82d622e318753b6027c0fd157be12f8090fee2a7adcd0eef759f88ba4997c7a42d58c9aa12cb99ae001fe521c13bb5431445a8d5ae4f5e4c7e948ac227d3604071f20e577e905fbeb15dfaf06d1de5ae6253d63a6a2120b31a5da5dabc9550600e20f27d3739e2627925fea3cc509f21dff04e6eea4549c540d6809ff9307eede91fff58733d8385a237d6d3705a33e391900992070df7adf1357cf7e3700ce3667de83f17b8df1778db381dce09cb4ad058a511001a738198ee27cf55a13b754539906582ec8b174bd58d5d1f3d767c613721ae05":int:16:char*:"010001":exp:0:exp:0:hex:"dd670a01465868adc93f26131957a50c52fb777cdbaa30892c9e12361164ec13979d43048118e4445db87bee58dd987b3425d02071d8dbae80708b039dbb64dbd1de5657d9fed0c118a54143742e0ff3c87f74e45857647af3f79eb0a14c9d75ea9a1a04b7cf478a897a708fd988f48e801edb0b7039df8c23bb3c56f4e821ac":char*:"8b2bdd4b40faf545c778ddf9bc1a49cb57f9b71b":hex:"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":int:0
RSASSA-PSS Signature Example 10_3
2:int:2048:int:16:char*:"cfd50283feeeb97f6f08d73cbc7b3836f82bbcd499479f5e6f76fdfcb8b38c4f71dc9e88bd6a6f76371afd65d2af1862b32afb34a95f71b8b132043ffebe3a952baf7592448148c03f9c69b1d68e4ce5cf32c86baf46fed301ca1ab403069b32f456b91f71898ab081cd8c4252ef5271915c9794b8f295851da7510f99cb73eb":int:16:char*:"cc4e90d2a1b3a065d3b2d1f5a8fce31b544475664eab561d2971b99fb7bef844e8ec1f360b8c2ac8359692971ea6a38f723fcc211f5dbcb177a0fdac5164a1d4ff7fbb4e829986353cb983659a148cdd420c7d31ba3822ea90a32be46c030e8c17e1fa0ad37859e06b0aa6fa3b216d9cbe6c0e22339769c0a615913e5da719cf":int:16:char*:"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":int:16:char*:"010001":exp:0:exp:0:hex:"48b2b6a57a63c84cea859d65c668284b08d96bdcaabe252db0e4a96cb1bac6019341db6fbefb8d106b0e90eda6bcc6c6262f37e7ea9c7e5d226bd7df85ec5e71efff2f54c5db577ff729ff91b842491de2741d0c631607df586b905b23b91af13da12304bf83eca8a73e871ff9db":hex:"4e96fc1b398f92b44671010c0dc3efd6e20c2d73":hex:"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":int:0
RSASSA-PSS Signature Example 10_3 (verify)
3:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:exp:0:hex:"48b2b6a57a63c84cea859d65c668284b08d96bdcaabe252db0e4a96cb1bac6019341db6fbefb8d106b0e90eda6bcc6c6262f37e7ea9c7e5d226bd7df85ec5e71efff2f54c5db577ff729ff91b842491de2741d0c631607df586b905b23b91af13da12304bf83eca8a73e871ff9db":char*:"4e96fc1b398f92b44671010c0dc3efd6e20c2d73":hex:"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":int:0
RSASSA-PSS Signature Example 10_4
2:int:2048:int:16:char*:"cfd50283feeeb97f6f08d73cbc7b3836f82bbcd499479f5e6f76fdfcb8b38c4f71dc9e88bd6a6f76371afd65d2af1862b32afb34a95f71b8b132043ffebe3a952baf7592448148c03f9c69b1d68e4ce5cf32c86baf46fed301ca1ab403069b32f456b91f71898ab081cd8c4252ef5271915c9794b8f295851da7510f99cb73eb":int:16:char*:"cc4e90d2a1b3a065d3b2d1f5a8fce31b544475664eab561d2971b99fb7bef844e8ec1f360b8c2ac8359692971ea6a38f723fcc211f5dbcb177a0fdac5164a1d4ff7fbb4e829986353cb983659a148cdd420c7d31ba3822ea90a32be46c030e8c17e1fa0ad37859e06b0aa6fa3b216d9cbe6c0e22339769c0a615913e5da719cf":int:16:char*:"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":int:16:char*:"010001":exp:0:exp:0:hex:"0b8777c7f839baf0a64bbbdbc5ce79755c57a205b845c174e2d2e90546a089c4e6ec8adffa23a7ea97bae6b65d782b82db5d2b5a56d22a29a05e7c4433e2b82a621abba90add05ce393fc48a840542451a":hex:"c7cd698d84b65128d8835e3a8b1eb0e01cb541ec":hex:"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":int:0
RSASSA-PSS Signature Example 10_4 (verify)
3:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:exp:0:hex:"0b8777c7f839baf0a64bbbdbc5ce79755c57a205b845c174e2d2e90546a089c4e6ec8adffa23a7ea97bae6b65d782b82db5d2b5a56d22a29a05e7c4433e2b82a621abba90add05ce393fc48a840542451a":char*:"c7cd698d84b65128d8835e3a8b1eb0e01cb541ec":hex:"34047ff96c4dc0dc90b2d4ff59a1a361a4754b255d2ee0af7d8bf87c9bc9e7ddeede33934c63ca1c0e3d262cb145ef932a1f2c0a997aa6a34f8eaee7477d82ccf09095a6b8acad38d4eec9fb7eab7ad02da1d11d8e54c1825e55bf58c2a23234b902be124f9e9038a8f68fa45dab72f66e0945bf1d8bacc9044c6f07098c9fcec58a3aab100c805178155f030a124c450e5acbda47d0e4f10b80a23f803e774d023b0015c20b9f9bbe7c91296338d5ecb471cafb032007b67a60be5f69504a9f01abb3cb467b260e2bce860be8d95bf92c0c8e1496ed1e528593a4abb6df462dde8a0968dffe4683116857a232f5ebf6c85be238745ad0f38f767a5fdbf486fb":int:0
RSASSA-PSS Signature Example 10_5
2:int:2048:int:16:char*:"cfd50283feeeb97f6f08d73cbc7b3836f82bbcd499479f5e6f76fdfcb8b38c4f71dc9e88bd6a6f76371afd65d2af1862b32afb34a95f71b8b132043ffebe3a952baf7592448148c03f9c69b1d68e4ce5cf32c86baf46fed301ca1ab403069b32f456b91f71898ab081cd8c4252ef5271915c9794b8f295851da7510f99cb73eb":int:16:char*:"cc4e90d2a1b3a065d3b2d1f5a8fce31b544475664eab561d2971b99fb7bef844e8ec1f360b8c2ac8359692971ea6a38f723fcc211f5dbcb177a0fdac5164a1d4ff7fbb4e829986353cb983659a148cdd420c7d31ba3822ea90a32be46c030e8c17e1fa0ad37859e06b0aa6fa3b216d9cbe6c0e22339769c0a615913e5da719cf":int:16:char*:"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":int:16:char*:"010001":exp:0:exp:0:hex:"f1036e008e71e964dadc9219ed30e17f06b4b68a955c16b312b1eddf028b74976bed6b3f6a63d4e77859243c9cccdc98016523abb02483b35591c33aad81213bb7c7bb1a470aabc10d44256c4d4559d916":hex:"efa8bff96212b2f4a3f371a10d574152655f5dfb":hex:"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":int:0
RSASSA-PSS Signature Example 10_5 (verify)
3:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:exp:0:hex:"f1036e008e71e964dadc9219ed30e17f06b4b68a955c16b312b1eddf028b74976bed6b3f6a63d4e77859243c9cccdc98016523abb02483b35591c33aad81213bb7c7bb1a470aabc10d44256c4d4559d916":char*:"efa8bff96212b2f4a3f371a10d574152655f5dfb":hex:"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":int:0
RSASSA-PSS Signature Example 10_6
2:int:2048:int:16:char*:"cfd50283feeeb97f6f08d73cbc7b3836f82bbcd499479f5e6f76fdfcb8b38c4f71dc9e88bd6a6f76371afd65d2af1862b32afb34a95f71b8b132043ffebe3a952baf7592448148c03f9c69b1d68e4ce5cf32c86baf46fed301ca1ab403069b32f456b91f71898ab081cd8c4252ef5271915c9794b8f295851da7510f99cb73eb":int:16:char*:"cc4e90d2a1b3a065d3b2d1f5a8fce31b544475664eab561d2971b99fb7bef844e8ec1f360b8c2ac8359692971ea6a38f723fcc211f5dbcb177a0fdac5164a1d4ff7fbb4e829986353cb983659a148cdd420c7d31ba3822ea90a32be46c030e8c17e1fa0ad37859e06b0aa6fa3b216d9cbe6c0e22339769c0a615913e5da719cf":int:16:char*:"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":int:16:char*:"010001":exp:0:exp:0:hex:"25f10895a87716c137450bb9519dfaa1f207faa942ea88abf71e9c17980085b555aebab76264ae2a3ab93c2d12981191ddac6fb5949eb36aee3c5da940f00752c916d94608fa7d97ba6a2915b688f20323d4e9d96801d89a72ab5892dc2117c07434fcf972e058cf8c41ca4b4ff554f7d5068ad3155fced0f3125bc04f9193378a8f5c4c3b8cb4dd6d1cc69d30ecca6eaa51e36a05730e9e342e855baf099defb8afd7":hex:"ad8b1523703646224b660b550885917ca2d1df28":hex:"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":int:0
RSASSA-PSS Signature Example 10_6 (verify)
3:int:2048:int:16:char*:"a5dd867ac4cb02f90b9457d48c14a770ef991c56c39c0ec65fd11afa8937cea57b9be7ac73b45c0017615b82d622e318753b6027c0fd157be12f8090fee2a7adcd0eef759f88ba4997c7a42d58c9aa12cb99ae001fe521c13bb5431445a8d5ae4f5e4c7e948ac227d3604071f20e577e905fbeb15dfaf06d1de5ae6253d63a6a2120b31a5da5dabc9550600e20f27d3739e2627925fea3cc509f21dff04e6eea4549c540d6809ff9307eede91fff58733d8385a237d6d3705a33e391900992070df7adf1357cf7e3700ce3667de83f17b8df1778db381dce09cb4ad058a511001a738198ee27cf55a13b754539906582ec8b174bd58d5d1f3d767c613721ae05":int:16:char*:"010001":exp:0:exp:0:hex:"25f10895a87716c137450bb9519dfaa1f207faa942ea88abf71e9c17980085b555aebab76264ae2a3ab93c2d12981191ddac6fb5949eb36aee3c5da940f00752c916d94608fa7d97ba6a2915b688f20323d4e9d96801d89a72ab5892dc2117c07434fcf972e058cf8c41ca4b4ff554f7d5068ad3155fced0f3125bc04f9193378a8f5c4c3b8cb4dd6d1cc69d30ecca6eaa51e36a05730e9e342e855baf099defb8afd7":char*:"ad8b1523703646224b660b550885917ca2d1df28":hex:"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":int:0
RSASSA-PSS Signature verify options #1 (OK)
4:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:exp:0:exp:0:int:20:hex:"25f10895a87716c137450bb9519dfaa1f207faa942ea88abf71e9c17980085b555aebab76264ae2a3ab93c2d12981191ddac6fb5949eb36aee3c5da940f00752c916d94608fa7d97ba6a2915b688f20323d4e9d96801d89a72ab5892dc2117c07434fcf972e058cf8c41ca4b4ff554f7d5068ad3155fced0f3125bc04f9193378a8f5c4c3b8cb4dd6d1cc69d30ecca6eaa51e36a05730e9e342e855baf099defb8afd7":hex:"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":int:0:int:0
RSASSA-PSS Signature verify options #2 (ctx_hash none)
4:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:exp:3:exp:0:int:20:hex:"25f10895a87716c137450bb9519dfaa1f207faa942ea88abf71e9c17980085b555aebab76264ae2a3ab93c2d12981191ddac6fb5949eb36aee3c5da940f00752c916d94608fa7d97ba6a2915b688f20323d4e9d96801d89a72ab5892dc2117c07434fcf972e058cf8c41ca4b4ff554f7d5068ad3155fced0f3125bc04f9193378a8f5c4c3b8cb4dd6d1cc69d30ecca6eaa51e36a05730e9e342e855baf099defb8afd7":hex:"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":int:0:int:0
RSASSA-PSS Signature verify options #3 (ctx_hash diverging)
depends_on:2
4:int:2048:int:16:char*:"a5dd867ac4cb02f90b9457d48c14a770ef991c56c39c0ec65fd11afa8937cea57b9be7ac73b45c0017615b82d622e318753b6027c0fd157be12f8090fee2a7adcd0eef759f88ba4997c7a42d58c9aa12cb99ae001fe521c13bb5431445a8d5ae4f5e4c7e948ac227d3604071f20e577e905fbeb15dfaf06d1de5ae6253d63a6a2120b31a5da5dabc9550600e20f27d3739e2627925fea3cc509f21dff04e6eea4549c540d6809ff9307eede91fff58733d8385a237d6d3705a33e391900992070df7adf1357cf7e3700ce3667de83f17b8df1778db381dce09cb4ad058a511001a738198ee27cf55a13b754539906582ec8b174bd58d5d1f3d767c613721ae05":int:16:char*:"010001":exp:0:exp:4:exp:0:int:20:hex:"25f10895a87716c137450bb9519dfaa1f207faa942ea88abf71e9c17980085b555aebab76264ae2a3ab93c2d12981191ddac6fb5949eb36aee3c5da940f00752c916d94608fa7d97ba6a2915b688f20323d4e9d96801d89a72ab5892dc2117c07434fcf972e058cf8c41ca4b4ff554f7d5068ad3155fced0f3125bc04f9193378a8f5c4c3b8cb4dd6d1cc69d30ecca6eaa51e36a05730e9e342e855baf099defb8afd7":hex:"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":exp:5:int:0
RSASSA-PSS Signature verify options #4 (mgf1_hash diverging)
depends_on:2
4:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:exp:0:exp:4:int:20:hex:"25f10895a87716c137450bb9519dfaa1f207faa942ea88abf71e9c17980085b555aebab76264ae2a3ab93c2d12981191ddac6fb5949eb36aee3c5da940f00752c916d94608fa7d97ba6a2915b688f20323d4e9d96801d89a72ab5892dc2117c07434fcf972e058cf8c41ca4b4ff554f7d5068ad3155fced0f3125bc04f9193378a8f5c4c3b8cb4dd6d1cc69d30ecca6eaa51e36a05730e9e342e855baf099defb8afd7":hex:"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":int:0:exp:5
RSASSA-PSS Signature verify options #5 (wrong msg_hash)
depends_on:2
4:int:2048:int:16:char*:"a5dd867ac4cb02f90b9457d48c14a770ef991c56c39c0ec65fd11afa8937cea57b9be7ac73b45c0017615b82d622e318753b6027c0fd157be12f8090fee2a7adcd0eef759f88ba4997c7a42d58c9aa12cb99ae001fe521c13bb5431445a8d5ae4f5e4c7e948ac227d3604071f20e577e905fbeb15dfaf06d1de5ae6253d63a6a2120b31a5da5dabc9550600e20f27d3739e2627925fea3cc509f21dff04e6eea4549c540d6809ff9307eede91fff58733d8385a237d6d3705a33e391900992070df7adf1357cf7e3700ce3667de83f17b8df1778db381dce09cb4ad058a511001a738198ee27cf55a13b754539906582ec8b174bd58d5d1f3d767c613721ae05":int:16:char*:"010001":exp:4:exp:0:exp:0:int:20:hex:"25f10895a87716c137450bb9519dfaa1f207faa942ea88abf71e9c17980085b555aebab76264ae2a3ab93c2d12981191ddac6fb5949eb36aee3c5da940f00752c916d94608fa7d97ba6a2915b688f20323d4e9d96801d89a72ab5892dc2117c07434fcf972e058cf8c41ca4b4ff554f7d5068ad3155fced0f3125bc04f9193378a8f5c4c3b8cb4dd6d1cc69d30ecca6eaa51e36a05730e9e342e855baf099defb8afd7":hex:"6d3b5b87f67ea657af21f75441977d2180f91b2c5f692de82955696a686730d9b9778d970758ccb26071c2209ffbd6125be2e96ea81b67cb9b9308239fda17f7b2b64ecda096b6b935640a5a1cb42a9155b1c9ef7a633a02c59f0d6ee59b852c43b35029e73c940ff0410e8f114eed46bbd0fae165e42be2528a401c3b28fd818ef3232dca9f4d2a0f5166ec59c42396d6c11dbc1215a56fa17169db9575343ef34f9de32a49cdc3174922f229c23e18e45df9353119ec4319cedce7a17c64088c1f6f52be29634100b3919d38f3d1ed94e6891e66a73b8fb849f5874df59459e298c7bbce2eee782a195aa66fe2d0732b25e595f57d3e061b1fc3e4063bf98f":exp:6:exp:6
RSASSA-PSS Signature verify options #6 (wrong expected_salt_len)
4:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:exp:0:exp:0:int:21:hex:"25f10895a87716c137450bb9519dfaa1f207faa942ea88abf71e9c17980085b555aebab76264ae2a3ab93c2d12981191ddac6fb5949eb36aee3c5da940f00752c916d94608fa7d97ba6a2915b688f20323d4e9d96801d89a72ab5892dc2117c07434fcf972e058cf8c41ca4b4ff554f7d5068ad3155fced0f3125bc04f9193378a8f5c4c3b8cb4dd6d1cc69d30ecca6eaa51e36a05730e9e342e855baf099defb8afd7":hex:"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":int:0:exp:5
RSASSA-PSS Signature verify options #7 (wrong expected_salt_len)
4:int:2048:int:16:char*:"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":int:16:char*:"010001":exp:0:exp:0:exp:0:int:19:hex:"25f10895a87716c137450bb9519dfaa1f207faa942ea88abf71e9c17980085b555aebab76264ae2a3ab93c2d12981191ddac6fb5949eb36aee3c5da940f00752c916d94608fa7d97ba6a2915b688f20323d4e9d96801d89a72ab5892dc2117c07434fcf972e058cf8c41ca4b4ff554f7d5068ad3155fced0f3125bc04f9193378a8f5c4c3b8cb4dd6d1cc69d30ecca6eaa51e36a05730e9e342e855baf099defb8afd7":hex:"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":int:0:exp:5
RSASSA-PSS Signature verify options #8 (non-default salt_len: max)
depends_on:2
4:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":exp:4:exp:4:exp:4:int:94:hex:"54657374206d657373616765":hex:"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":int:0:int:0
RSASSA-PSS Signature verify options #9 (non-default salt_len: 0)
depends_on:2
4:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":exp:4:exp:4:exp:4:int:0:hex:"54657374206d657373616765":hex:"7fc506d26ca3b22922a1ce39faaedd273161b82d9443c56f1a034f131ae4a18cae1474271cb4b66a17d9707ca58b0bdbd3c406b7e65bbcc9bbbce94dc45de807b4989b23b3e4db74ca29298137837eb90cc83d3219249bc7d480fceaf075203a86e54c4ecfa4e312e39f8f69d76534089a36ed9049ca9cfd5ab1db1fa75fe5c8":int:0:int:0
RSASSA-PSS Signature verify options #10 (non-default salt_len: 0, ANY)
depends_on:2
4:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":exp:4:exp:4:exp:4:exp:7:hex:"54657374206d657373616765":hex:"7fc506d26ca3b22922a1ce39faaedd273161b82d9443c56f1a034f131ae4a18cae1474271cb4b66a17d9707ca58b0bdbd3c406b7e65bbcc9bbbce94dc45de807b4989b23b3e4db74ca29298137837eb90cc83d3219249bc7d480fceaf075203a86e54c4ecfa4e312e39f8f69d76534089a36ed9049ca9cfd5ab1db1fa75fe5c8":int:0:int:0
RSASSA-PSS Signature verify options #11 (MGF1 alg != MSG hash alg)
depends_on:2
4:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":exp:3:exp:4:exp:4:exp:7:hex:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":hex:"7fc506d26ca3b22922a1ce39faaedd273161b82d9443c56f1a034f131ae4a18cae1474271cb4b66a17d9707ca58b0bdbd3c406b7e65bbcc9bbbce94dc45de807b4989b23b3e4db74ca29298137837eb90cc83d3219249bc7d480fceaf075203a86e54c4ecfa4e312e39f8f69d76534089a36ed9049ca9cfd5ab1db1fa75fe5c8":int:0:int:0
RSASSA-PSS Signature verify options #12 (MGF1 alg != MSG hash alg, ctx wrong)
depends_on:2
4:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":exp:3:exp:0:exp:4:exp:7:hex:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":hex:"7fc506d26ca3b22922a1ce39faaedd273161b82d9443c56f1a034f131ae4a18cae1474271cb4b66a17d9707ca58b0bdbd3c406b7e65bbcc9bbbce94dc45de807b4989b23b3e4db74ca29298137837eb90cc83d3219249bc7d480fceaf075203a86e54c4ecfa4e312e39f8f69d76534089a36ed9049ca9cfd5ab1db1fa75fe5c8":exp:5:int:0
RSASSA-PSS Signature verify options #13 (MGF1 alg != MSG hash alg, arg wrong)
depends_on:2
4:int:1024:int:16:char*:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":int:16:char*:"010001":exp:3:exp:4:exp:0:exp:7:hex:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":hex:"7fc506d26ca3b22922a1ce39faaedd273161b82d9443c56f1a034f131ae4a18cae1474271cb4b66a17d9707ca58b0bdbd3c406b7e65bbcc9bbbce94dc45de807b4989b23b3e4db74ca29298137837eb90cc83d3219249bc7d480fceaf075203a86e54c4ecfa4e312e39f8f69d76534089a36ed9049ca9cfd5ab1db1fa75fe5c8":int:0:exp:5
RSASSA-PSS verify ext, 512-bit key, empty salt, good signature
depends_on:2
4:int:512:int:16:char*:"00b076d23250816f9aab02307e452b97f0cae7598369b41624e8afc7971a59a13892f64b07eaa6ec928c160b2d6ec8f9d0dd5b63c8b3ac0767b4f65c892f56c10f":int:16:char*:"010001":exp:4:exp:4:exp:4:int:0:hex:"":hex:"ace8b03347da1b9a7a5e94a0d76359bb39c819bb170bef38ea84995ed653446c0ae87ede434cdf9d0cb2d7bf164cf427892363e6855a1d24d0ce5dd72acaf246":int:0:int:0
RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature
depends_on:2
4:int:512:int:16:char*:"00b076d23250816f9aab02307e452b97f0cae7598369b41624e8afc7971a59a13892f64b07eaa6ec928c160b2d6ec8f9d0dd5b63c8b3ac0767b4f65c892f56c10f":int:16:char*:"010001":exp:4:exp:4:exp:4:int:0:hex:"":hex:"ace8b03347da1b9a7a5e94a0d76359bb39c819bb170bef38ea84995ed653446c0ae87ede434cdf9d0cb2d7bf164cf427892363e6855a1d24d0ce5dd72acaf247":exp:5:exp:5
RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature
depends_on:1
4:int:522:int:16:char*:"02d302753e3dda28f42f4d9f92c8647420ea6fbc97c10f8498b966a953f357698d6581060dfe32c8ab98db4bc5ce2acdf0c1e6e404a75a13282550c1aa37d3cdc8bf":int:16:char*:"010001":exp:2:exp:2:exp:2:int:0:hex:"":hex:"016752ae0b5dfbade6bbd3dd37868d48c8d741f92dca41c360aeda553204c2212a117b1a3d77e0d3f48723503c46e16c8a64de00f1dee3e37e478417452630859486":int:0:int:0
RSASSA-PSS verify ext, 522-bit key, SHA-512, saltlen=64, good signature with saltlen=0
depends_on:1
4:int:522:int:16:char*:"02d302753e3dda28f42f4d9f92c8647420ea6fbc97c10f8498b966a953f357698d6581060dfe32c8ab98db4bc5ce2acdf0c1e6e404a75a13282550c1aa37d3cdc8bf":int:16:char*:"010001":exp:2:exp:2:exp:2:int:64:hex:"":hex:"016752ae0b5dfbade6bbd3dd37868d48c8d741f92dca41c360aeda553204c2212a117b1a3d77e0d3f48723503c46e16c8a64de00f1dee3e37e478417452630859486":int:0:exp:5
RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature
depends_on:1
4:int:528:int:16:char*:"00e31c246d46485984261fd174cab3d4357344602ecd793c47dbe54252d37bb350bc634359b19515542080e4724a4b672291be57c7648f51629eaef234e847d99cc65f":int:16:char*:"010001":exp:2:exp:2:exp:2:int:0:hex:"":hex:"a9ad7994ba3a1071124153486924448cc67a5af3a5d34e9261d53770782cc85f58e2edde5f7004652a645e3e9606530eb57de41df7298ae2be9dec69cc0d613ab629":int:0:int:0
RSASSA-PSS verify ext, 528-bit key, SHA-512, saltlen=64, good signature with saltlen=0
depends_on:1
4:int:528:int:16:char*:"00e31c246d46485984261fd174cab3d4357344602ecd793c47dbe54252d37bb350bc634359b19515542080e4724a4b672291be57c7648f51629eaef234e847d99cc65f":int:16:char*:"010001":exp:2:exp:2:exp:2:int:64:hex:"":hex:"a9ad7994ba3a1071124153486924448cc67a5af3a5d34e9261d53770782cc85f58e2edde5f7004652a645e3e9606530eb57de41df7298ae2be9dec69cc0d613ab629":int:0:exp:5
RSASSA-PSS verify ext, 512-bit key, SHA-512 (hash too large)
depends_on:1
4:int:512:int:16:char*:"00b076d23250816f9aab02307e452b97f0cae7598369b41624e8afc7971a59a13892f64b07eaa6ec928c160b2d6ec8f9d0dd5b63c8b3ac0767b4f65c892f56c10f":int:16:char*:"010001":exp:2:exp:2:exp:2:int:0:hex:"":hex:"ace8b03347da1b9a7a5e94a0d76359bb39c819bb170bef38ea84995ed653446c0ae87ede434cdf9d0cb2d7bf164cf427892363e6855a1d24d0ce5dd72acaf246":exp:1:exp:1
RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature
depends_on:1
4:int:521:int:16:char*:"0131b69860f3cb9bf85ea358fdf2bd2990f1b77a80d6a4fdf817a43dd896bdf7dd26af8ac0237f526e0d33b105c971fdbd4ffa9ece99fc469f31ecf429e8f562c1c3":int:16:char*:"010001":exp:2:exp:2:exp:2:int:0:hex:"":hex:"00471794655837da498cbf27242807b40593a353c707eb22fd2cc5a3259e728ac4f1df676043eeec8e16c1175b3d9ac8cae72ec1d5772dd69de71c5677f19031568e":exp:1:exp:1
RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature
depends_on:2
4:int:521:int:16:char*:"0131b69860f3cb9bf85ea358fdf2bd2990f1b77a80d6a4fdf817a43dd896bdf7dd26af8ac0237f526e0d33b105c971fdbd4ffa9ece99fc469f31ecf429e8f562c1c3":int:16:char*:"010001":exp:4:exp:4:exp:4:int:0:hex:"41":hex:"009c4941157fa36288e467310b198ab0c615c40963d611ffeef03000549ded809235955ecc57adba44782e9497c004f480ba2b3d58db8335fe0b391075c02c843a6d":int:0:int:0
RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature
depends_on:2
4:int:521:int:16:char*:"0131b69860f3cb9bf85ea358fdf2bd2990f1b77a80d6a4fdf817a43dd896bdf7dd26af8ac0237f526e0d33b105c971fdbd4ffa9ece99fc469f31ecf429e8f562c1c3":int:16:char*:"010001":exp:4:exp:4:exp:4:int:0:hex:"41":hex:"00e11a2403df681c44a1f73f014b6c9ad17847d0b673f7c2a801cee208d10ab5792c10cd0cd495a4b331aaa521409fca7cb1b0d978b3a84cd67e28078b98753e9466":exp:1:exp:1
RSASSA-PSS verify ext, all-zero padding, automatic salt length
depends_on:2
4:int:512:int:16:char*:"00b076d23250816f9aab02307e452b97f0cae7598369b41624e8afc7971a59a13892f64b07eaa6ec928c160b2d6ec8f9d0dd5b63c8b3ac0767b4f65c892f56c10f":int:16:char*:"010001":exp:3:exp:4:exp:4:exp:7:hex:"":hex:"63a35294577c7e593170378175b7df27c293dae583ec2a971426eb2d66f2af483e897bfae5dc20300a9d61a3644e08c3aee61a463690a3498901563c46041056":exp:5:exp:5
RSASSA-PSS Signature RSA-1024, SHA-512
depends_on:1
2:int:1024:int:16:char*:"00e8f95a716c127d5147dcc241a7c1fe8d5487b3e8b6e95e48a83334d21d00c79ad0a90e29941c0c53065b20059de95e9e406061416f7ac12edca1983b9ee28cc3":int:16:char*:"00d72348b297e7e5dc4329f6ab874b17982584e0ab43174070a9be983c0f040320d6f893c40d2717cb3044380cb3230b7133621eb1c55a3ea56d0e7cee694b5df3":int:16:char*:"00c3c9873548543591c1f947e412c33da56b9d1b94a58c2f410a8a620e9b4f1d9197643ebf527f5f62b202b9d67a32654d05f326a9b61e0106efdf4829673c4f3d23655996e2424059916ab47aa67e406c129679e5979ca46708866608ffa21f619843b959b4442e422598a2faab54a8cef1f131992677d2cf5bcaf2b5564f7419":int:16:char*:"010001":exp:2:exp:2:hex:"e35c6ed98f64a6d5a648fcab8adb16331db32e5d15c74a40edf94c3dc4a4de792d190889f20f1e24ed12054a6b28798fcb42d1c548769b734c96373142092aed277603f4738df4dc1446586d0ec64da4fb60536db2ae17fc7e3c04bbfbbbd907bf117c08636fa16f95f51a6216934d3e34f85030f17bbbc5ba69144058aff081e0b19cf03c17195c5e888ba58f6fe0a02e5c3bda9719a7":hex:"653df9730e14e03f2ffb3374d6b75295aa4a52c38540b2d501adc1eb659a4d7a050769a3d11d0d5d6f3efb734200ade241fdc271c0f5eeed85b4bf00b2327bc8":hex:"655d1cf86a7af5113d1791ab7b6627845ea2aa7efbae82705a3563e5ba0337a1d033cb9283b38c042056e0a1d0529891173e3df6621dd8b184930caec8b3cbe4d1068524dab0ec6854f6638d86b77434cd792ddec0d02327a9eebffcd6911ffd32ad9bcb569d3237398c8169d9c62e7eea81c1b456fd36019aad1e4b268c604d":int:0
RSASSA-PSS Verification RSA-1024, SHA-512
depends_on:1
3:int:1022:int:16:char*:"00c3c9873548543591c1f947e412c33da56b9d1b94a58c2f410a8a620e9b4f1d9197643ebf527f5f62b202b9d67a32654d05f326a9b61e0106efdf4829673c4f3d23655996e2424059916ab47aa67e406c129679e5979ca46708866608ffa21f619843b959b4442e422598a2faab54a8cef1f131992677d2cf5bcaf2b5564f7419":int:16:char*:"010001":exp:2:exp:2:hex:"e35c6ed98f64a6d5a648fcab8adb16331db32e5d15c74a40edf94c3dc4a4de792d190889f20f1e24ed12054a6b28798fcb42d1c548769b734c96373142092aed277603f4738df4dc1446586d0ec64da4fb60536db2ae17fc7e3c04bbfbbbd907bf117c08636fa16f95f51a6216934d3e34f85030f17bbbc5ba69144058aff081e0b19cf03c17195c5e888ba58f6fe0a02e5c3bda9719a7":char*:"653df9730e14e03f2ffb3374d6b75295aa4a52c38540b2d501adc1eb659a4d7a050769a3d11d0d5d6f3efb734200ade241fdc271c0f5eeed85b4bf00b2327bc8":hex:"655d1cf86a7af5113d1791ab7b6627845ea2aa7efbae82705a3563e5ba0337a1d033cb9283b38c042056e0a1d0529891173e3df6621dd8b184930caec8b3cbe4d1068524dab0ec6854f6638d86b77434cd792ddec0d02327a9eebffcd6911ffd32ad9bcb569d3237398c8169d9c62e7eea81c1b456fd36019aad1e4b268c604d":int:0
RSASSA-PSS Signature RSA-1032, SHA-512
depends_on:1
2:int:1032:int:16:char*:"0dfaedb709ada2105223e5e7764a5f31d07ae7a37bdc7b4a56c2499e1173147bcdcb165b8fb01a2528190cb6874656a936491898fca330db8af5a9ed5417268ed7":int:16:char*:"0c339c56797a90c641292560d0ef675f71ac2c99fcaba6260c38e4f167dfd179eb7a9e255f9bdbc549e4181f9a2a19b1f30a80b292d5ef1ad75b9e658eaa6fb0bb":int:16:char*:"00aa94ab91b4c26be257e469528228c4b0b6b4c99e73a84a272b3101892c07406911372b83ec4a7b8191f0ba4b4cb4cb3b732074e96c668297e1323b8ad0822a7e151182def03871a66a47b704b92845c6194142d4eeda19903e04043581f7a835dc288117863d21944c3aeded518458f1a30a41c7638aa4e098a88fdf2c2097270d":int:16:char*:"010001":exp:2:exp:2:hex:"e35c6ed98f64a6d5a648fcab8adb16331db32e5d15c74a40edf94c3dc4a4de792d190889f20f1e24ed12054a6b28798fcb42d1c548769b734c96373142092aed277603f4738df4dc1446586d0ec64da4fb60536db2ae17fc7e3c04bbfbbbd907bf117c08636fa16f95f51a6216934d3e34f85030f17bbbc5ba69144058aff081e0b19cf03c17195c5e888ba58f6fe0a02e5c3bda9719a7":hex:"653df9730e14e03f2ffb3374d6b75295aa4a52c38540b2d501adc1eb659a4d7a050769a3d11d0d5d6f3efb734200ade241fdc271c0f5eeed85b4bf00b2327bc8":hex:"13ad40169494129b907f061d885fbe50ab654fc7b4be657ff8629d7ca291838159e9a7b7adc93560dda2bb9127966eb8d57377fb19d5b043dca67a07ba3c23069b391ddd921b507a8cca2d5eb7ccc84b90089092ca88530e074e629c3cb6902b2d0475000269a28c4cd89cec0dca66571fa7fbe4976373abe905cbe4c66c8d5fbb":int:0
RSASSA-PSS Verification RSA-1032, SHA-512
depends_on:1
3:int:1032:int:16:char*:"00aa94ab91b4c26be257e469528228c4b0b6b4c99e73a84a272b3101892c07406911372b83ec4a7b8191f0ba4b4cb4cb3b732074e96c668297e1323b8ad0822a7e151182def03871a66a47b704b92845c6194142d4eeda19903e04043581f7a835dc288117863d21944c3aeded518458f1a30a41c7638aa4e098a88fdf2c2097270d":int:16:char*:"010001":exp:2:exp:2:hex:"e35c6ed98f64a6d5a648fcab8adb16331db32e5d15c74a40edf94c3dc4a4de792d190889f20f1e24ed12054a6b28798fcb42d1c548769b734c96373142092aed277603f4738df4dc1446586d0ec64da4fb60536db2ae17fc7e3c04bbfbbbd907bf117c08636fa16f95f51a6216934d3e34f85030f17bbbc5ba69144058aff081e0b19cf03c17195c5e888ba58f6fe0a02e5c3bda9719a7":char*:"653df9730e14e03f2ffb3374d6b75295aa4a52c38540b2d501adc1eb659a4d7a050769a3d11d0d5d6f3efb734200ade241fdc271c0f5eeed85b4bf00b2327bc8":hex:"13ad40169494129b907f061d885fbe50ab654fc7b4be657ff8629d7ca291838159e9a7b7adc93560dda2bb9127966eb8d57377fb19d5b043dca67a07ba3c23069b391ddd921b507a8cca2d5eb7ccc84b90089092ca88530e074e629c3cb6902b2d0475000269a28c4cd89cec0dca66571fa7fbe4976373abe905cbe4c66c8d5fbb":int:0
RSASSA-PSS Verification of OpenSSL-generated signature RSA-1032, SHA-512
depends_on:1
3:int:1032:int:16:char*:"00aa94ab91b4c26be257e469528228c4b0b6b4c99e73a84a272b3101892c07406911372b83ec4a7b8191f0ba4b4cb4cb3b732074e96c668297e1323b8ad0822a7e151182def03871a66a47b704b92845c6194142d4eeda19903e04043581f7a835dc288117863d21944c3aeded518458f1a30a41c7638aa4e098a88fdf2c2097270d":int:16:char*:"010001":exp:2:exp:2:hex:"e35c6ed98f64a6d5a648fcab8adb16331db32e5d15c74a40edf94c3dc4a4de792d190889f20f1e24ed12054a6b28798fcb42d1c548769b734c96373142092aed277603f4738df4dc1446586d0ec64da4fb60536db2ae17fc7e3c04bbfbbbd907bf117c08636fa16f95f51a6216934d3e34f85030f17bbbc5ba69144058aff081e0b19cf03c17195c5e888ba58f6fe0a02e5c3bda9719a7":char*:"653df9730e14e03f2ffb3374d6b75295aa4a52c38540b2d501adc1eb659a4d7a050769a3d11d0d5d6f3efb734200ade241fdc271c0f5eeed85b4bf00b2327bc8":hex:"1de40b1c452691dfd8ceb42ecf5f0cbda944d871141b4407c1e30a6657c58c2e496b2a3ad10e025d45ca9606d25602ac1de04af8e0d24aa06e57ec3fea5c961ecf1e0a4e442fda0cdaba42469288cde5d7d0c223facceaf4c7caabe93505acd5664c9b4fae64272af4d5b74326a01724a25fabdb10b177821d2273650a84426dbd":int:0
RSASSA-PSS Signature RSA-1040, SHA-512
depends_on:1
2:int:1040:int:16:char*:"00fc7f4b490b4d3ef729db23fb5afbb5f2fc620a472342d8b8ff310cfdc124be76dc22ab6f4be35a38ddd31f24d7f64d310f67ab3a375e83f4e0559e4cb5dc43e875":int:16:char*:"00d51e8680ab71dc01e1a8a68a298636bb1658cfab8d73ce528a62697722d485ab90cdafc5e27768b761839ff93420458ae55f15a69465dbc0c7b524dc9a385ff925":int:16:char*:"00d2340538231dcd5a61edf83ab94b2e4b3a784394c4ed35a424c050c294157b7625f9aca8258c21e2d0a7aa9b7c9db576404e63090dba50d998f9a3ec72b1a5cf28d83251ab93341c7d2c1a90403d70f67bc1a9e413bc62facccb52441e24c3f2bc9fdeca1a783012e70b9528176260580c4e1026c58209e8dcc4de3bf3f5be5565e9":int:16:char*:"010001":exp:2:exp:2:hex:"e35c6ed98f64a6d5a648fcab8adb16331db32e5d15c74a40edf94c3dc4a4de792d190889f20f1e24ed12054a6b28798fcb42d1c548769b734c96373142092aed277603f4738df4dc1446586d0ec64da4fb60536db2ae17fc7e3c04bbfbbbd907bf117c08636fa16f95f51a6216934d3e34f85030f17bbbc5ba69144058aff081e0b19cf03c17195c5e888ba58f6fe0a02e5c3bda9719a7":hex:"653df9730e14e03f2ffb3374d6b75295aa4a52c38540b2d501adc1eb659a4d7a050769a3d11d0d5d6f3efb734200ade241fdc271c0f5eeed85b4bf00b2327bc8":hex:"13e695948d59ded5a975cd9fb14bffc48e4ff9725576a96a6693da1a3c4c90d17d6811a97a633180d76dba5b957d2244e3b97e7bf3463a77d0b6c39b28a88e0b6739113726cd74937ad5f693ae5a8fd77febc270a115df05c344ddffebc2438ae67a5eea6572f434881bdf350aed4ec8f3a530d279d3fff07bb78e510807114e6ee7":int:0
RSASSA-PSS Verification RSA-1040, SHA-512
depends_on:1
3:int:1040:int:16:char*:"00d2340538231dcd5a61edf83ab94b2e4b3a784394c4ed35a424c050c294157b7625f9aca8258c21e2d0a7aa9b7c9db576404e63090dba50d998f9a3ec72b1a5cf28d83251ab93341c7d2c1a90403d70f67bc1a9e413bc62facccb52441e24c3f2bc9fdeca1a783012e70b9528176260580c4e1026c58209e8dcc4de3bf3f5be5565e9":int:16:char*:"010001":exp:2:exp:2:hex:"e35c6ed98f64a6d5a648fcab8adb16331db32e5d15c74a40edf94c3dc4a4de792d190889f20f1e24ed12054a6b28798fcb42d1c548769b734c96373142092aed277603f4738df4dc1446586d0ec64da4fb60536db2ae17fc7e3c04bbfbbbd907bf117c08636fa16f95f51a6216934d3e34f85030f17bbbc5ba69144058aff081e0b19cf03c17195c5e888ba58f6fe0a02e5c3bda9719a7":char*:"653df9730e14e03f2ffb3374d6b75295aa4a52c38540b2d501adc1eb659a4d7a050769a3d11d0d5d6f3efb734200ade241fdc271c0f5eeed85b4bf00b2327bc8":hex:"13e695948d59ded5a975cd9fb14bffc48e4ff9725576a96a6693da1a3c4c90d17d6811a97a633180d76dba5b957d2244e3b97e7bf3463a77d0b6c39b28a88e0b6739113726cd74937ad5f693ae5a8fd77febc270a115df05c344ddffebc2438ae67a5eea6572f434881bdf350aed4ec8f3a530d279d3fff07bb78e510807114e6ee7":int:0
RSASSA-PSS Signature RSA-1048, SHA-512
depends_on:1
2:int:1048:int:16:char*:"0f39b79809516becc2e3481b6b47584aa2299bd2027ab8a303b9de5b0adcb4a5d38e38edb8c1fac3ea1dbd7e1d50b84323e362cff4df3f5a5182dafa9bb9217a73d7":int:16:char*:"0d18164f8bd0d58d019998c8cb17c4c0354e62b8a9462acca30816894f982c2ae114e73993e30698930437b4eec44adec24d32ccbcbae7cc4c9f8911b1eb2100685b":int:16:char*:"00c75d0f9fa17d1d24b939537a434017f390c6604444c35a13360d6b1fc986baf40159b84275d37b883278df5064dd9eb0f29b0d325acc790c4b59672737dbbf3acb88f5e2f2d54c919cafd072272c494591d52e158993315e71e2ca60b1c74feff8f3d77842b415d4e71734a498206a5cd9315c87b23e583e25eb4ca97056b45c96856d":int:16:char*:"010001":exp:2:exp:2:hex:"e35c6ed98f64a6d5a648fcab8adb16331db32e5d15c74a40edf94c3dc4a4de792d190889f20f1e24ed12054a6b28798fcb42d1c548769b734c96373142092aed277603f4738df4dc1446586d0ec64da4fb60536db2ae17fc7e3c04bbfbbbd907bf117c08636fa16f95f51a6216934d3e34f85030f17bbbc5ba69144058aff081e0b19cf03c17195c5e888ba58f6fe0a02e5c3bda9719a7":hex:"653df9730e14e03f2ffb3374d6b75295aa4a52c38540b2d501adc1eb659a4d7a050769a3d11d0d5d6f3efb734200ade241fdc271c0f5eeed85b4bf00b2327bc8":hex:"9442a8ec48f87ebc81cc1273b03e528e7643c9e2fcc60ed85827d9341c5a36e5c76059baa8e9891df437e44c4047a266b46bcaaad3de1f1d4d3576defff080b791b013491636187fc45a930b70a533ed92abfd168f050df91b4c35d68d160a243ce589807a7d32661fc18b9547cdc0fd86d33acd349c98b34fb016ddd1bff23c58170e":int:0
RSASSA-PSS Verification RSA-1048, SHA-512
depends_on:1
3:int:1048:int:16:char*:"00c75d0f9fa17d1d24b939537a434017f390c6604444c35a13360d6b1fc986baf40159b84275d37b883278df5064dd9eb0f29b0d325acc790c4b59672737dbbf3acb88f5e2f2d54c919cafd072272c494591d52e158993315e71e2ca60b1c74feff8f3d77842b415d4e71734a498206a5cd9315c87b23e583e25eb4ca97056b45c96856d":int:16:char*:"010001":exp:2:exp:2:hex:"e35c6ed98f64a6d5a648fcab8adb16331db32e5d15c74a40edf94c3dc4a4de792d190889f20f1e24ed12054a6b28798fcb42d1c548769b734c96373142092aed277603f4738df4dc1446586d0ec64da4fb60536db2ae17fc7e3c04bbfbbbd907bf117c08636fa16f95f51a6216934d3e34f85030f17bbbc5ba69144058aff081e0b19cf03c17195c5e888ba58f6fe0a02e5c3bda9719a7":char*:"653df9730e14e03f2ffb3374d6b75295aa4a52c38540b2d501adc1eb659a4d7a050769a3d11d0d5d6f3efb734200ade241fdc271c0f5eeed85b4bf00b2327bc8":hex:"9442a8ec48f87ebc81cc1273b03e528e7643c9e2fcc60ed85827d9341c5a36e5c76059baa8e9891df437e44c4047a266b46bcaaad3de1f1d4d3576defff080b791b013491636187fc45a930b70a533ed92abfd168f050df91b4c35d68d160a243ce589807a7d32661fc18b9547cdc0fd86d33acd349c98b34fb016ddd1bff23c58170e":int:0
| 300,609 | 887 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_blowfish.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_blowfish.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_blowfish.function
* Test suite data : suites/test_suite_blowfish.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_BLOWFISH_C)
void test_blowfish_valid_param( )
{
TEST_VALID_PARAM( mbedtls_blowfish_free( NULL ) );
exit:
;
}
void test_blowfish_valid_param_wrapper( void ** params )
{
(void)params;
test_blowfish_valid_param( );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_blowfish_invalid_param( )
{
mbedtls_blowfish_context ctx;
unsigned char buf[16] = { 0 };
size_t const valid_keylength = sizeof( buf ) * 8;
size_t valid_mode = MBEDTLS_BLOWFISH_ENCRYPT;
size_t invalid_mode = 42;
size_t off;
((void) off);
TEST_INVALID_PARAM( mbedtls_blowfish_init( NULL ) );
TEST_VALID_PARAM( mbedtls_blowfish_free( NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_setkey( NULL,
buf,
valid_keylength ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_setkey( &ctx,
NULL,
valid_keylength ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_ecb( NULL,
valid_mode,
buf, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_ecb( &ctx,
invalid_mode,
buf, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_ecb( &ctx,
valid_mode,
NULL, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_ecb( &ctx,
valid_mode,
buf, NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_CBC)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_cbc( NULL,
valid_mode,
sizeof( buf ),
buf, buf, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_cbc( &ctx,
invalid_mode,
sizeof( buf ),
buf, buf, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_cbc( &ctx,
valid_mode,
sizeof( buf ),
NULL, buf, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_cbc( &ctx,
valid_mode,
sizeof( buf ),
buf, NULL, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_cbc( &ctx,
valid_mode,
sizeof( buf ),
buf, buf, NULL ) );
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#if defined(MBEDTLS_CIPHER_MODE_CFB)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_cfb64( NULL,
valid_mode,
sizeof( buf ),
&off, buf,
buf, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_cfb64( &ctx,
invalid_mode,
sizeof( buf ),
&off, buf,
buf, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_cfb64( &ctx,
valid_mode,
sizeof( buf ),
NULL, buf,
buf, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_cfb64( &ctx,
valid_mode,
sizeof( buf ),
&off, NULL,
buf, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_cfb64( &ctx,
valid_mode,
sizeof( buf ),
&off, buf,
NULL, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_cfb64( &ctx,
valid_mode,
sizeof( buf ),
&off, buf,
buf, NULL ) );
#endif /* MBEDTLS_CIPHER_MODE_CFB */
#if defined(MBEDTLS_CIPHER_MODE_CTR)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_ctr( NULL,
sizeof( buf ),
&off,
buf, buf,
buf, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_ctr( &ctx,
sizeof( buf ),
NULL,
buf, buf,
buf, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_ctr( &ctx,
sizeof( buf ),
&off,
NULL, buf,
buf, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_ctr( &ctx,
sizeof( buf ),
&off,
buf, NULL,
buf, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_ctr( &ctx,
sizeof( buf ),
&off,
buf, buf,
NULL, buf ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA,
mbedtls_blowfish_crypt_ctr( &ctx,
sizeof( buf ),
&off,
buf, buf,
buf, NULL ) );
#endif /* MBEDTLS_CIPHER_MODE_CTR */
exit:
return;
}
void test_blowfish_invalid_param_wrapper( void ** params )
{
(void)params;
test_blowfish_invalid_param( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_blowfish_encrypt_ecb( data_t * key_str, data_t * src_str,
data_t * dst, int setkey_result )
{
unsigned char output[100];
mbedtls_blowfish_context ctx;
memset(output, 0x00, 100);
mbedtls_blowfish_init( &ctx );
TEST_ASSERT( mbedtls_blowfish_setkey( &ctx, key_str->x, key_str->len * 8 ) == setkey_result );
if( setkey_result == 0 )
{
TEST_ASSERT( mbedtls_blowfish_crypt_ecb( &ctx, MBEDTLS_BLOWFISH_ENCRYPT, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, 8, dst->len ) == 0 );
}
exit:
mbedtls_blowfish_free( &ctx );
}
void test_blowfish_encrypt_ecb_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
test_blowfish_encrypt_ecb( &data0, &data2, &data4, *( (int *) params[6] ) );
}
void test_blowfish_decrypt_ecb( data_t * key_str, data_t * src_str,
data_t * dst, int setkey_result )
{
unsigned char output[100];
mbedtls_blowfish_context ctx;
memset(output, 0x00, 100);
mbedtls_blowfish_init( &ctx );
TEST_ASSERT( mbedtls_blowfish_setkey( &ctx, key_str->x, key_str->len * 8 ) == setkey_result );
if( setkey_result == 0 )
{
TEST_ASSERT( mbedtls_blowfish_crypt_ecb( &ctx, MBEDTLS_BLOWFISH_DECRYPT, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, 8, dst->len ) == 0 );
}
exit:
mbedtls_blowfish_free( &ctx );
}
void test_blowfish_decrypt_ecb_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
test_blowfish_decrypt_ecb( &data0, &data2, &data4, *( (int *) params[6] ) );
}
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_blowfish_encrypt_cbc( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst,
int cbc_result )
{
unsigned char output[100];
mbedtls_blowfish_context ctx;
memset(output, 0x00, 100);
mbedtls_blowfish_init( &ctx );
mbedtls_blowfish_setkey( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_blowfish_crypt_cbc( &ctx, MBEDTLS_BLOWFISH_ENCRYPT, src_str->len , iv_str->x, src_str->x, output ) == cbc_result );
if( cbc_result == 0 )
{
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
}
exit:
mbedtls_blowfish_free( &ctx );
}
void test_blowfish_encrypt_cbc_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_blowfish_encrypt_cbc( &data0, &data2, &data4, &data6, *( (int *) params[8] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_blowfish_decrypt_cbc( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst,
int cbc_result )
{
unsigned char output[100];
mbedtls_blowfish_context ctx;
memset(output, 0x00, 100);
mbedtls_blowfish_init( &ctx );
mbedtls_blowfish_setkey( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_blowfish_crypt_cbc( &ctx, MBEDTLS_BLOWFISH_DECRYPT, src_str->len , iv_str->x, src_str->x, output ) == cbc_result );
if( cbc_result == 0)
{
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, src_str->len,
dst->len ) == 0 );
}
exit:
mbedtls_blowfish_free( &ctx );
}
void test_blowfish_decrypt_cbc_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_blowfish_decrypt_cbc( &data0, &data2, &data4, &data6, *( (int *) params[8] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#if defined(MBEDTLS_CIPHER_MODE_CFB)
void test_blowfish_encrypt_cfb64( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst )
{
unsigned char output[100];
mbedtls_blowfish_context ctx;
size_t iv_offset = 0;
memset(output, 0x00, 100);
mbedtls_blowfish_init( &ctx );
mbedtls_blowfish_setkey( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_blowfish_crypt_cfb64( &ctx, MBEDTLS_BLOWFISH_ENCRYPT, src_str->len, &iv_offset, iv_str->x, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, src_str->len,
dst->len ) == 0 );
exit:
mbedtls_blowfish_free( &ctx );
}
void test_blowfish_encrypt_cfb64_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_blowfish_encrypt_cfb64( &data0, &data2, &data4, &data6 );
}
#endif /* MBEDTLS_CIPHER_MODE_CFB */
#if defined(MBEDTLS_CIPHER_MODE_CFB)
void test_blowfish_decrypt_cfb64( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst )
{
unsigned char output[100];
mbedtls_blowfish_context ctx;
size_t iv_offset = 0;
memset(output, 0x00, 100);
mbedtls_blowfish_init( &ctx );
mbedtls_blowfish_setkey( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_blowfish_crypt_cfb64( &ctx, MBEDTLS_BLOWFISH_DECRYPT, src_str->len, &iv_offset, iv_str->x, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, src_str->len,
dst->len ) == 0 );
exit:
mbedtls_blowfish_free( &ctx );
}
void test_blowfish_decrypt_cfb64_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_blowfish_decrypt_cfb64( &data0, &data2, &data4, &data6 );
}
#endif /* MBEDTLS_CIPHER_MODE_CFB */
#if defined(MBEDTLS_CIPHER_MODE_CTR)
void test_blowfish_encrypt_ctr( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst )
{
unsigned char stream_str[100];
unsigned char output[100];
mbedtls_blowfish_context ctx;
size_t iv_offset = 0;
memset(stream_str, 0x00, 100);
memset(output, 0x00, 100);
mbedtls_blowfish_init( &ctx );
mbedtls_blowfish_setkey( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_blowfish_crypt_ctr( &ctx, src_str->len, &iv_offset, iv_str->x, stream_str, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, src_str->len,
dst->len ) == 0 );
exit:
mbedtls_blowfish_free( &ctx );
}
void test_blowfish_encrypt_ctr_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_blowfish_encrypt_ctr( &data0, &data2, &data4, &data6 );
}
#endif /* MBEDTLS_CIPHER_MODE_CTR */
#endif /* MBEDTLS_BLOWFISH_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_BLOWFISH_C)
case 0:
{
*out_value = MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA;
}
break;
case 1:
{
*out_value = MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_BLOWFISH_C)
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_BLOWFISH_C)
test_blowfish_valid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_BLOWFISH_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_blowfish_invalid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_BLOWFISH_C)
test_blowfish_encrypt_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_BLOWFISH_C)
test_blowfish_decrypt_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_BLOWFISH_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_blowfish_encrypt_cbc_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_BLOWFISH_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_blowfish_decrypt_cbc_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_BLOWFISH_C) && defined(MBEDTLS_CIPHER_MODE_CFB)
test_blowfish_encrypt_cfb64_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_BLOWFISH_C) && defined(MBEDTLS_CIPHER_MODE_CFB)
test_blowfish_decrypt_cfb64_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_BLOWFISH_C) && defined(MBEDTLS_CIPHER_MODE_CTR)
test_blowfish_encrypt_ctr_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_blowfish.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 26,316 | 729 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_error.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_error.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_error.function
* Test suite data : suites/test_suite_error.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_ERROR_C)
#include "third_party/mbedtls/error.h"
void test_error_strerror( int code, char * result_str )
{
char buf[500];
memset( buf, 0, sizeof( buf ) );
mbedtls_strerror( code, buf, 500 );
TEST_ASSERT( strcmp( buf, result_str ) == 0 );
exit:
;
}
void test_error_strerror_wrapper( void ** params )
{
test_error_strerror( *( (int *) params[0] ), (char *) params[1] );
}
#endif /* MBEDTLS_ERROR_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_ERROR_C)
case 0:
{
*out_value = -0x0020;
}
break;
case 1:
{
*out_value = -0x4080;
}
break;
case 2:
{
*out_value = -0x40A0;
}
break;
case 3:
{
*out_value = -0x8880;
}
break;
case 4:
{
*out_value = -0x007F;
}
break;
case 5:
{
*out_value = -0x88FF;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_ERROR_C)
case 0:
{
#if defined(MBEDTLS_AES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_RSA_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_ERROR_C)
test_error_strerror_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_error.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 8,885 | 329 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_hmac_drbg.no_reseed.datax | HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #0
depends_on:0
3:exp:0:hex:"e91b63309e93d1d08e30e8d556906875f59747c468b0d0da":hex:"":hex:"":hex:"":hex:"b7928f9503a417110788f9d0c2585f8aee6fb73b220a626b3ab9825b7a9facc79723d7e1ba9255e40e65c249b6082a7bc5e3f129d3d8f69b04ed1183419d6c4f2a13b304d2c5743f41c8b0ee73225347"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #1
depends_on:0
3:exp:0:hex:"d0c57f7dc0308115b1ea30e2ea2f770289cebdda617d132c":hex:"":hex:"":hex:"":hex:"b797615a78d1afe74ebedb9d8948d82cf2bb586ed80146b96d41a709f689178b772dd342d29af5449694bf8eaf33a664a24c0ad29a12529eeaba478a799917ab4666de1b6eb2c7332017d67eea6fabd8"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #2
depends_on:0
3:exp:0:hex:"286e9d9e39e4024dea0c885fd6f7f107586b6a1a8ac3ac0e":hex:"":hex:"":hex:"":hex:"ca25aa9ef286a3cd52d101db01cdf0ce14c7add124f1b6a9a8b3a48c74989baf01f6ff704da7c5d5785b6e9c21914892102313e7a15cb2f9977a513ada0d3f242819aef2c1699b72cbd358c59435101f"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #3
depends_on:0
3:exp:0:hex:"6b20dda65a96f564fc0253d38dbc290b813e538d040d8dd9":hex:"":hex:"":hex:"":hex:"66b6ef57a3282838dea05d122ccdfa842dda19333ded2015d381394da38c8309a6e9703ec065335b116efb97daaac9c53ceb7a218ed0db61c3ba969dc629b95f5418eadfa43c58714fb02176bc0b17ec"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #4
depends_on:0
3:exp:0:hex:"32339fc82b655051042e3038e3161c4fb252e495ff396be2":hex:"":hex:"":hex:"":hex:"e95e4551a37e338faae4419e3a70e4c1e3d516be7e554cabb00007c591ba7cb6c3247889a9b08e46c6619f166d996e4e34bbf6cd8a354de9964de906041f73f2ade2eb82c6e82627d3257738c2821fcb"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #5
depends_on:0
3:exp:0:hex:"deaa9d0c2ca7a05cba12eeb7db24277e1605e1d030d76ddc":hex:"":hex:"":hex:"":hex:"bab5be6001da5951c1e7873f4e2be318e879370eae8a51ed8424ed6f12b2d294b45d006b1c2cd8c1ce047fd16f2fbbc09954a8b464cc986f23e86e1d9398d20780190aa5be0505cdfc826c7a01dcab99"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #6
depends_on:0
3:exp:0:hex:"589766be3c03b0a351a81b1203f944e2928e95f8a3bc7452":hex:"":hex:"":hex:"":hex:"5bee2482667220462ac6d3c234f7333703c5abced2ff2ad91d52193e86a61cfa43be0b4f7e831e1e563e260178f23976b2f3e132356ab54567b37580bf9d751223fad7793f0ac11fc450817536116b1f"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #7
depends_on:0
3:exp:0:hex:"07cc4d22b010335045cca142d91494bf4d5e842af4155d17":hex:"":hex:"":hex:"":hex:"8e13a574d17dc8b44382d3b263e857f50816755917603a07ca4987fd40340042a1e6a82a227647130304d73d8704fd9ad4db3ae42daaa55b1f93948e70c451a12724fed870e02a1a8ec4eeab716c6854"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #8
depends_on:0
3:exp:0:hex:"6425624a98ab3018eb4ef827f5a4fbbac1022d70155ef375":hex:"":hex:"":hex:"":hex:"16fd6abb10dba1659ed56d4296b65fe3f2449996bdb8eee5c94b249f04808cdd9563569a4152bd99a32592d35d6a4cc806c228284487fc1e088b178d4c8ecb6b0e3cfaacd7d39d754d8bd4e6662f44a4"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #9
depends_on:0
3:exp:0:hex:"01d11d2b631be240de2f41d10bdce47c89fa32427410cc61":hex:"":hex:"":hex:"":hex:"4640a063e65ef0c0de97f98a39297219e2a1eceed7e6426199719911edbb3d06fbde6fbab83878e9ba9fa8e1d044f7a40f3627d7cfc49d17f101ee64f6b8c6e6154a01b4d39fb9ba6b33ca2c27f9fd52"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #10
depends_on:0
3:exp:0:hex:"5e0a89b3aba1cf5ed94756083726de8db5d79162f73a5031":hex:"":hex:"":hex:"":hex:"cae7b2c25dce1c12e2c4f61b3e53155b9177e92bfb8faefc425d1cbb507713921378ed880986709bfbd7cda66d18dbe0732137a86d47b7e8223e345af0cd9a0219ba290040bc6ff44c1de5b16f32b933"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #11
depends_on:0
3:exp:0:hex:"3b76d32d5982daf6e2164340941a1707441bbb99a2668ba4":hex:"":hex:"":hex:"":hex:"63640e406e16b3b82723a6cb3830657b756fe61cf2ada96f667e0f2df0c9d33c6f164ee78d4976281a84d3024ff67074acecd65391a84aafaec9d6b088bc33616543b61a4c603e5a21bd39e2a72401c8"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #12
depends_on:0
3:exp:0:hex:"45fcafba2278bf8e6d437396f60f0e84654de44e0bd6cb8a":hex:"":hex:"":hex:"":hex:"7e2325cb2ced372b640c2496a3970cb7771fd494e40ae17239bfffd9ea2ab0ee74c2d3c369328a3b465e67bcbea86f50a32f9ff820505df5adbc032d3adb83581443877f85c60b3b701f59b1fc38c063"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #13
depends_on:0
3:exp:0:hex:"4201db977ef90d08f017c8e38204c2995bbb47efe9fa4cad":hex:"":hex:"":hex:"":hex:"101c7318e26693bc11d64b780e9b32d4d958c7475ab99fdd6fe86554dcef54ccdc2ca9f4ec355eb25d7b3f570ff95ec7abc2e9e2fb879bb045debf6c8a98ff46668c0de21bd8d4d18fb9e11550878e32"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,0) #14
depends_on:0
3:exp:0:hex:"5d80883ce24feb3911fdeb8e730f95886a63c01478ecd62b":hex:"":hex:"":hex:"":hex:"9e351b853091add2047e9ea2da07d41fa4ace03db3d4a43217e802352f1c97382ed7afee5cb2cf5848a93ce0a25a28cdc8e96ccdf14875cb9f845790800d542bac81d0be53376385baa5e7cbe2c3b469"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #0
depends_on:0
3:exp:0:hex:"32c1ca125223de8de569697f92a37c6772d4cc4f0544d409":hex:"":hex:"9e98cc8e0f8eb84d1911c1775a5703bb":hex:"593aa3a300e5c907a011dd5a3dcd77e2":hex:"942909a9d380aa5d4e3af69093a8fa513ee545b9bf9e1b81c5f30966db3e5cb52f8b1b6fe440d592e5fe4a972c36aa498035e2442f82910c5cd095c7f4b4c7e7555c4669cca481cdfbfda167b5d6f8d5"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #1
depends_on:0
3:exp:0:hex:"172a2d24ef128dadc93e0b74f277e7c3692f86e6ca5e1117":hex:"":hex:"93b4a1fdbf9dd30996298804dd86c0f7":hex:"69d792dc9b6fe1601f31a68e4d007187":hex:"13f30b4698d6e973556c3f92dff6241bbfbde300ed58d07fd5f64efdcd0c1b62ca3de6358d505dcf972fdce20f7b891c4cab493721d80cb108fcee915835b02dea33041b38e28252c30a71fad85878e6"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #2
depends_on:0
3:exp:0:hex:"4a17b8069ae3a74d77c9c94514ba90cd2abfac0002d2c5da":hex:"":hex:"cc39d1a2a425f00e220d721fbfd5b6e5":hex:"1ccee25f5868e863a05b72d744e64aeb":hex:"d787b355629779ff2916397d6094f44dec06337571ccb0abf5a17b6cfabe00557894e9ddab8caafef467faa4514582b5073e7d1d9fdd6fa34c565d1aca23742ed4e87133253a9664ec085bc6c76965f4"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #3
depends_on:0
3:exp:0:hex:"d60c4860d9ba3ebb64e2095231e07792ba6b5e9e22e14043":hex:"":hex:"776273bb22f5e62a793692127bcbd785":hex:"8795e45f82160cb1096a509fd3572f92":hex:"3122c1d3a6de8b25fd180b159731f975f78601360155e43f694b289822a25948d2c20a673f181be06b59c566960339f25015d2acbf5c7d3f68a2bade779e00faa24623c1313da888dc8cee901fa05573"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #4
depends_on:0
3:exp:0:hex:"494983c04581b811e0b2b846c54bd31824bd70fd182558f1":hex:"":hex:"935200a7edf1e2903581fedb7c04533d":hex:"49c0133cca2457fa7cbbd4c68cc5e78f":hex:"0fd2ec47fa2e31326ee9b894fdd6224818190168640d91a2a0c247b1e27ccfa343e9370d182d95b2b5bd74b4b09c44d04094364a6fd02ba70ee2c55e04d65ad9c6da65b9c0742f9fb5ca95daafa48df1"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #5
depends_on:0
3:exp:0:hex:"77ea86ce59f2466e55ce2057e7855035c09295c02f1c51cb":hex:"":hex:"f36d65f22b5afd3f51e13ea38dcff555":hex:"6b613b56e470b5c2c30c30aab9a772e1":hex:"41cd8ef82609012d33b4e5b51a39ec17eda4317962627796f7845045920becd7caef56d4a2c3a8e849e299babe92367ef34a8910bebd498248ccc2b3f5f63920b31cfe856973e15e48b060871a9cf9a7"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #6
depends_on:0
3:exp:0:hex:"2dffb03703023f65b757b7ee87899a14a9c8ce788fb2bddc":hex:"":hex:"da42b213071252adb755a6cb24094c17":hex:"c83fc2beb60a7ee9b374f3fb7bfc8900":hex:"8f54271e3578e60e8989e49f5b426e1a0296afbfcc7da0ffbdd5dea71ec6b339b6d866bd3756ba745e42c8cddf997cac5fed72b33ac81e5f4d6f2d15f030a41c684552fc94d48c0d97323ef7eb656857"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #7
depends_on:0
3:exp:0:hex:"890e7323502313bc7d617805360d5968b6c68c0280cef5ed":hex:"":hex:"257f1f60cf2d36924c3e7b6e4cc35135":hex:"89235cc472c6e2e1e92c70324459a9d3":hex:"55283453e82662c8d92f54cb4a5d784e83b1b3527bc5e71a53f04508172eb5156ba2a9ba92116cdaceed17118c7637af4b574d364187a52cf0c20d768da518021c3d95cb5ce6bc108b1bef19bad66677"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #8
depends_on:0
3:exp:0:hex:"167ce6bad165eb640eebfece7ca6690ec5c6b5f8c7fa9304":hex:"":hex:"c0e7ef13138ec4a7d52baf8592484ca0":hex:"472a47e3fc098c7cb92fb953a26e25c6":hex:"e2aa2650c84be79ec410ff9bac93e5caff8a46a8c39495856ff64c8c5399e81654ba90c8a8b26cdca2810ce68e4ab646e50a1f6fa7a829cfd72c9a61e1a0b415c031067dcd417baac9553cf7d84a7742"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #9
depends_on:0
3:exp:0:hex:"6b8aeaf70460e83a124899d705dc0900acd811698669fcee":hex:"":hex:"94a53808df5ebaa7693934d7fda92b95":hex:"4d4e7d88f44fe556c5ccdc56f8b2f098":hex:"165aae6bcdd799fe325ddafce3b645900eabc87552c0bb47ee2eb6ad51462a8a4f4498c4bd24fcfc46de5d12351143d5a838060f617258c218035a4f29fb34a54673205b2e1b362991693d7b99972954"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #10
depends_on:0
3:exp:0:hex:"00f30f92bd44a9b2b04a6cae67533ed85b4ae1335b98109a":hex:"":hex:"77ec4274fe5f8f22dbb4a1ed6050811e":hex:"ef041b6516825d51bf76d2f651a55576":hex:"8c664357b01425668ea5daf07a2b5b8c50dbbd71d9f48c50f275a02b6cfc4717eb7db286fa49f17d05d44230f7d82c251a6f0fe0a2add5d2cc9a92a527f63a9bd3c8ec93e9a404e0829629c5eeb997b0"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #11
depends_on:0
3:exp:0:hex:"2eafeebb58a2fb54474280112c5668d61be2aa4df98598af":hex:"":hex:"389a36ecd687080a5d2cace8a326f03a":hex:"495965bdbbb1bb01ba61191e9dd4b038":hex:"f17db045b0af4913d79f99e018c1f726f4fe02f08477cccc0d6a068a808bfc6ccb797e6022dc3b99ea18086a56428884110c49128a51e10c15f6ecbfe0a5a1e97e72a578fefea6c66c436c91a2b6395b"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #12
depends_on:0
3:exp:0:hex:"b6497197b783d1f493a6430748b45932895ea2a9d8204f5d":hex:"":hex:"ac26665e796d1b00951c725da88d992f":hex:"5f08c7951106dfec5096d90097449cc2":hex:"170b58ac3342a968c96aa29f1ce820debe7934d9db46216c03ae3afd304188cd38b6208e1cad5fce5c26179a30a8771015a99d2902d51899ab0c42e0b400d18f1e89411248db96f9d62b466f828de150"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #13
depends_on:0
3:exp:0:hex:"4ffafd1f20dd38699bfca029c0558483fbeed3cb29aa0eb8":hex:"":hex:"96abfcee883d8dcad967c071c12dde19":hex:"9fd7cc292cd55d8364862f5fd675c08b":hex:"5e8612c6ce8f5b6838a1e4fb9e14370fb2d66bc885f6fe8a3ff232f16340c2af58eb2734494e0ce920f36046b7a807f4b55caf3a45bdcaefa4bb23f352601c0769749f0257428918b931606c7b395135"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,0,128) #14
depends_on:0
3:exp:0:hex:"89a6f070afad5ccf4d117c4e44baa2c7b28941fa7e828c04":hex:"":hex:"7206a271499fb2ef9087fb8843b1ed64":hex:"f14b17febd813294b3c4b22b7bae71b0":hex:"49c35814f44b54bf13f0db52bd8a7651d060ddae0b6dde8edbeb003dbc30a7ffea1ea5b08ebe1d50b52410b972bec51fd174190671eecae201568b73deb0454194ef5c7b57b13320a0ac4dd60c04ae3b"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #0
depends_on:0
3:exp:0:hex:"49058e6773ed2b7ab309c0949fdf9c9ea457cb8ec0e7fd01":hex:"dc477641d89c7fc4a30f1430197dd159":hex:"":hex:"":hex:"4e891f4e281100453b70788929ec743a3c5edd9b81dc798bc93771368c39b612037b6f42f60c5d8924b646848151b0c295be491d4a28d1927deed523fd04d3d2dda95ed42166312e5c3392d22893b0dc"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #1
depends_on:0
3:exp:0:hex:"4ccc7d83009a28db14e839176774d45d9345358f336a1622":hex:"e6db32976d9262b1d3dc487f22e1f5b3":hex:"":hex:"":hex:"5a171e9f0065ece37ba53df81ac3d88054d53d0cb695a901e1a1ca91352420b508c461ac91095ccea81621b800ddcff905020f96dad2a50377d3945047420c3b902e8e361f4525c1d4bfa8af164925d2"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #2
depends_on:0
3:exp:0:hex:"fc7d0c3ef1c404ada968dae35581b6cd31e0a46c39ce49dc":hex:"14158a65fc9b3bc1ac04c7854493852d":hex:"":hex:"":hex:"918494f47dadda22667dc1d066f44f3ccbb61d3f84b2eeab7d26f4e999aab94e79d282287ab76d4e3eeeef2ef79c2ad571382abdea55d5d8642f604f8f27f3f73a5bc1413dc87bfdf91da1c6045ec223"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #3
depends_on:0
3:exp:0:hex:"1f0df7933dc99eaf7b284b02ee773ec46461fd762c595408":hex:"abd1d8af4ae46d7e5f1f4e0b71b54edc":hex:"":hex:"":hex:"f1eba7596c6c20118f86017ff86514d745ce7ea02c49719094e5c2a96d3dfa1dd5079b8eff8078ba9793900dba145a260e672837422c351c3f231c201dfaa21e48d3f7ee28bcd08dac680e80bf87ec20"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #4
depends_on:0
3:exp:0:hex:"09988a36abad74c3cf377db9c9200baf6c27be4e21932166":hex:"17b7a40f4c37894bc948456e37ad482a":hex:"":hex:"":hex:"091e5fb9c6c218f2460c514fa215061460ca90cfb35c1a9f5ea125fc49aa0b2beb42dcb0fed865f8510c3141cd51d1b33216e2e72cebcabd3e1bc0eab201d8e72a0d1de1c2b7915a0cf242708092f211"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #5
depends_on:0
3:exp:0:hex:"ce1934b6561ebaaa851accf8ceae5b0dc587922ff68836aa":hex:"602e9086f44d03ce61039c2e81fed620":hex:"":hex:"":hex:"441da7552b2d45533fc924ea985fd4b0b95942fc7997a37128d3e96d4c2792b241dbe921d61f3898852d4f93740cc3649cb5279a7f0f09be3990e9ee599fb0717c308e7a939a441b5c3ba0cb8aa19647"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #6
depends_on:0
3:exp:0:hex:"58f1a9eb935fd08a4c3c894a06ad00ca0576589700a4d50c":hex:"b14f2a74cbe3881069f30507919c6870":hex:"":hex:"":hex:"ae9c6b40d951aab9c2d9cb920a05f3e154898c83e392dfbd7ffcbe2283eb2b75842fa5e7bd9626ad12e814874f1966fea1eb817793d2eb0a9cb9270cc9aa4267118fba0c7b6fcf487a97ebcbadc67496"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #7
depends_on:0
3:exp:0:hex:"0abf2f845295bb1dd283daa24e75fa08c9e9202793c479b3":hex:"f8742f44932bae2d65a032ada2b76382":hex:"":hex:"":hex:"8847696e8edd2c7b751b780a6fc69d8434a3144593936943217465362b3c3f7b25b75149f7c69d10ecd169f00ed98b53e0e498af6d9f600441ee2c01a9e74ed845d24cdab4543dff7d1f7800a278671d"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #8
depends_on:0
3:exp:0:hex:"0f9bc6935e7baf17d560931ec3e75d9fda7b19214e0ffb9c":hex:"c13bb26e9349a56866f821c10a2ae28c":hex:"":hex:"":hex:"12a849651f310fbae04c4da4680a21a50a9889806194be470b8b111a32ea741794cbe725d98ae9d40c0d60c04c8b7b32917f9dc18c27dfb8c64579a176a2c4b23cc32e5237fa5f904ab1249aafa7cd88"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #9
depends_on:0
3:exp:0:hex:"79d96ff5ec92af9fee0af7effdc15ce56b9cbdfbbbe5b49a":hex:"23d1288ae41e65e56e7b783f85ae8b47":hex:"":hex:"":hex:"206c2564950995ac6ca6d2ad51e9cacd7540f254a335d6d7eed7ef17956949cb5d7d3f4e197e82aa4442d08d1d0f933e641f703be1be4a9ca5747e524687a7a034761493dcf2e1101789f135de5d3f49"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #10
depends_on:0
3:exp:0:hex:"94e852ffbff4f20078181221b5fbb8048f3e95de313a52c1":hex:"1841dcabae24c156a17a1d0eda6f8bb2":hex:"":hex:"":hex:"15319b06c05d47deeaeab540e649cc6e2989843de07dcaa966d799a36902f72943585e2773912040185ac1efa060c6edecef800e3116c66ccfeeec9fe7ee70f3dae2ac1c0210310ea164f4c4402d2f77"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #11
depends_on:0
3:exp:0:hex:"473c743205bb375fad15f537dfeb402d879754b2b4987cbd":hex:"4f88f4db50a6806d6899f71981beec49":hex:"":hex:"":hex:"46b0694bc8afc6d86dcb8b80cf8815104007ebedb06050ae625b890060c4dad3d9e2661042d26a3cfded0383829ddcf616ec84d3f32d307480caf0f87ba9b00e88812f5cb2a4e94e354092d0c50b9bc7"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #12
depends_on:0
3:exp:0:hex:"20208c9ac4830512786fce7ebde344a82cee0d7d7a5607d6":hex:"2602c5f52c7ee2620486ce56366cc8eb":hex:"":hex:"":hex:"b0bd2c0739ed1608848dd0e9c1db9f547c64268754af09716da40b2682fbc45f56de954cbce0d8a3f53eb2c3afac9e3afeab4038fe042c897786fd3da70f2d6b62b12981630bf30d76dd879e2926ab40"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #13
depends_on:0
3:exp:0:hex:"3011c31a44ccfd1260ae9e431da41e883b1a6ac9060f2fa4":hex:"6b36a1fcb2a2173fc7e0c120c2627a6f":hex:"":hex:"":hex:"a781d9970c7272e98d941438d311cf7e80d2d56b29eb0b4b1c76d00908401ec5b4bb1c5f159dbf42ab30100933b1628faa92d2e25bd37ead4c3354c823013cd9e331bdf5e2c5c7d11d5bd9f50fd110fc"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,0) #14
depends_on:0
3:exp:0:hex:"ee6d57635e5ab4b3d73a2652c1443b32296bfe331b6578e6":hex:"4fccbf2d3c73a8e1e92273a33e648eaa":hex:"":hex:"":hex:"90dc6e1532022a9fe2161604fc79536b4afd9af06ab8adbb77f7490b355d0db3368d102d723a0d0f70d10475f9e99771fb774f7ad0ba7b5fe22a50bfda89e0215a014dc1f1605939590aa783360eb52e"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #0
depends_on:0
3:exp:0:hex:"c27f80b1d085dd15cb163f0336d077457ecb3f32a90242f7":hex:"4deb622a31b4c530348b5f08008fb7ee":hex:"5a84f94804e2d04ead773d2a324b34d6":hex:"226d9f4d720f580c2be44d4eaf2ec8db":hex:"6db76a0a003a64dec6801dd3271fae8a43aa8ce2e0d205e3830e267072abe28d2a6f707494d15638559fa4282843760daa90eec5d2865ea11e836e60345160d5112445ab1754b578b55471a1d9caf275"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #1
depends_on:0
3:exp:0:hex:"517dadbd6e20fd83aeaced197732b1d5ce221a60f8210685":hex:"bd9911bc192da45c00c47d5ee079473d":hex:"33254154ffeb4983d27ac08980ec4943":hex:"349db52f09422883536d11ac4aaaf7ba":hex:"dd7be811d3a9fdd194e8f8f18b35e1d9f1788844c371d811cb898ebc561d000cc285afc8f486dabe37d6c85e614d3d196c544ca560ac6e0337b0700e1ded8fb28903e66329afdd589308d56c50d73803"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #2
depends_on:0
3:exp:0:hex:"c763149ba95e7d054da52e4d3d06287253bc2f43ae7c9da0":hex:"305d6aa3c6148a0eb2e91b9385de5903":hex:"a36918edaf5add6f0f81d3f991ee30a1":hex:"5c65b09e744317db86d78aaefa66af44":hex:"5560d27fc55b885a29a449a1f8835966549c4956ebb0393ba9fe748e74a5a303f1478bb3e507a9daa1159dd8dd6d171bff2e3830581d7f6fdbccd91a8748d20c1d981cf909c31db6eedf5587722ac257"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #3
depends_on:0
3:exp:0:hex:"b479a14d125fe4601053989439f85200e198df756aff7543":hex:"8f590670f88d8c2c713d63643f93ba55":hex:"cda7c7ee77e667b96ef0ba330c9ca6ac":hex:"a60fd147f6cdfb408d160e388c20d8d8":hex:"5f088bcebd816551c4b22c3024aeab2f75c906dc8fd0ab0c80055e0445c1dc151a06df81bd39b8535261a7a5dcedc7f9b17c062ee6f120f2099f2ab5aa93f27a08d7b5cf1027e26adf54a520916c2cb4"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #4
depends_on:0
3:exp:0:hex:"bd46fc253e9334d4aa8bdff5e21c12e261515159b01a4516":hex:"1735486e5ea8be74fa158b2fea8e5cad":hex:"c3517d58cdbd0262655174cc1d1eb324":hex:"404f7b8eb461d077368e2ff06ddb4189":hex:"7f1cf172b67ec7c566c9e24c071b79b5a4a135a369ded5e78b8cd2467749e30c401bf176d88cc0e05a587bb2b8ed09206bb314df59009e88a01ef007e61eba2e40093aa003dada48314869c0f3b99d50"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #5
depends_on:0
3:exp:0:hex:"600a31b8f55c85ce27ece4705e6fe8cd17a01e7827ec2383":hex:"6deef06a079ad2062e77dba21fef6441":hex:"ca5512ab329ee941b22f327fe0dad499":hex:"c1ffc97289d8d363729daa1628a2c735":hex:"a81cf5563940ffbbee9dbdcaf7db1e7e53b427fd3a0e795c35a1b8eb6f6316e43b804690a44897e0f42fbdfa8c9f1777024d2a530eda994ed038de60b90602545cef99b69f371f79619babda9360c665"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #6
depends_on:0
3:exp:0:hex:"f38b0cd16e9434da916b63e8b7ce1a91883ec208c3baf76d":hex:"534799e3fe51bc370af6568072e2e579":hex:"9520ad24a61d29716342d2b7bd35dd45":hex:"c4e92d6da37a9f6236a396f352c53c86":hex:"5dc0b3bebde5bac6d4d24ec08f1510dc88e1e06c97c3031dc9519f3392e83a09e1a7db99b2148d992a928bb5c1f68265086f7a84e697a7a0aeda4b41590606ed139063def46fa2a625657b17f18845cb"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #7
depends_on:0
3:exp:0:hex:"06a5e76d0ee90ed0206a07a914dc20796a8a2fb2c0ebbf14":hex:"2a49312af91926a37b5f7c009e8047ef":hex:"0cda72090ebb007ab27156957e64e7bf":hex:"24695b221f42a5be6d4399c6444c4aa3":hex:"2b0aeca45ed44ca34a2fc741c5e4e2091e115a4148e71bd8fa90588e32253ffcf360df213b48a19f6f45186b67dcef6327729ac8f3c08d658de89e71539783fb66ae834455407e7827114317299835bb"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #8
depends_on:0
3:exp:0:hex:"6c12df5d2ba1f6a6e1e733baae42daafeb47cc188d1b0be0":hex:"f510139561b292a7a1a0292b7de4b162":hex:"f57a0c1dc69eae7473394ad1b950dc61":hex:"9dded4779fab0c8843fa693146837689":hex:"2be15d2ea87099a8c0430ba8e9451208a898379da075169568196f656eadbab59637c1f949b4506a851ae0394e135542137bd0daf1c188decfce92f6ef2396aa5bb125cf3187230ac81c3864632d9234"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #9
depends_on:0
3:exp:0:hex:"0e6a7843e29e5f16d2bbb4021d6389ae692298b9f62ad22d":hex:"f0434f112699d116cfa7eddad486c544":hex:"146eb042377cdf6a0831558ac17ad971":hex:"b29c26d483fde8489263accafc10d698":hex:"ecf0812aebee7a452339071d9906709fe00fccbb0d94cc101b507646f554ebf3602459a4f20b82325b0e083ca189f59d68c5753dbe942643f07c7afcde99f9d0cc2883923cb80456fcedc535bfa7d647"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #10
depends_on:0
3:exp:0:hex:"b6bc57d663b671868265fdb756e142fe6da9c07dd0821c6e":hex:"f43c5223bfe726a3164afdcabe931eb7":hex:"ddf419d8e074a4ff2daf06a1adad4bed":hex:"e0862e71c4ac52194cd320d196e446a2":hex:"4f9b9e9aab493571160c732881dc358f73a08450a152124775e559889a9298d034ce1882dd2116f4863f1524393e1a3f1aceadcd9c4163dab7c543cd375c3f4b61ed72475d1812017ac83bf22846d14c"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #11
depends_on:0
3:exp:0:hex:"f5649fc184f33c63cf8484011fa27578c1651fcd1a0780c6":hex:"153f7b2c9bc9494a20ed0bf16b97ffdc":hex:"6106fd4fe0e1d894837ba8624cebbe2f":hex:"fdc2988e6b358929645d27594fa98df8":hex:"49130a750b4758e7e8dec8d82bf66ae771d51181c33cbba9d84093ee4f83f6e3aadd3f40fbcc441fcf90ed83b83c9d9671b9092907a36231ec3e2c56775c5699fce16abad104b291dd13f67ad4e1ff4d"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #12
depends_on:0
3:exp:0:hex:"fc3dfb2f29b649391437aff6920760671e470ebf09e8fd68":hex:"4e7d48fe49ecefebed749979b965d8f6":hex:"ae7405de4957947dc09fb1be2227c763":hex:"3fa22158d9bb1948c64102f3ac00bfed":hex:"ffb49be8c714b502595da9248248fb009eace24ff77d298dfe8b05efe6441352213bd236bdf4b3de34fee35b051747f4e549f69bbad8c729f3b5cf2db29a0ab6aeb590857e0f48babff3a9ea3e4079b6"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #13
depends_on:0
3:exp:0:hex:"32018afb07a6141e9a6badda9b647f650090ba3475d0149b":hex:"fa92f66bb7a06a1652d4084c15d2f778":hex:"13c32c456c799cf0808e00c6de7efce0":hex:"693728213798dde84176dabfb50434d5":hex:"12c9d6683e6ebb5136253db60b39b3203f52607e44d13ae80709cdf2fa61ff5befb0838f544e39e135830b573ac5a31b7535c0a2502370400906658e6b1e9a0f5755f360d9bff68fa55ad628b49a8937"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-1,128+64,128,128) #14
depends_on:0
3:exp:0:hex:"3e325daab3301856044f416f250b6161e447e63d85ca084f":hex:"a9d2a53dbd7ef4b9150dd0ed4d002e56":hex:"4de6c923346d7adc16bbe89b9a184a79":hex:"9e9e3412635aec6fcfb9d00da0c49fb3":hex:"48ac8646b334e7434e5f73d60a8f6741e472baabe525257b78151c20872f331c169abe25faf800991f3d0a45c65e71261be0c8e14a1a8a6df9c6a80834a4f2237e23abd750f845ccbb4a46250ab1bb63"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #0
depends_on:1
3:exp:1:hex:"a76e77a969ab92645181f0157802523746c34bf321867641051ed6ba39368033adc93d4e":hex:"":hex:"":hex:"":hex:"8925987db5566e60520f09bdddab488292bed92cd385e5b6fc223e1919640b4e34e34575033e56c0a8f608be21d3d221c67d39abec98d81312f3a2653d55ffbf44c337c82bed314c211be23ec394399ba351c4687dce649e7c2a1ba7b0b5dab125671b1bcf9008da65cad612d95ddc92"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #1
depends_on:1
3:exp:1:hex:"65cdaa5ab147d0c79fdd02b24fc94d0e427f59ef9a31f447458c6befe0c2cde5a58c6b7d":hex:"":hex:"":hex:"":hex:"0d164682b5bb552a53a2a942373639d98576450ca632faebc15060691a4219467c5aa106034cd19a214a0a4f31d402e68c4c565f49b33b680d522ef25f541e8202be779730376fdcf5b7b58fd6ac959204a88f91008651d2c02ada82505f914d4d9b9aea7967784e5320e185e1248270"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #2
depends_on:1
3:exp:1:hex:"650996f1477112af7604386be5ace78232904315d99d87d72a06709d331a6f930b447cf5":hex:"":hex:"":hex:"":hex:"d3341d7767cfd95640a107b3abaed7b4e1855b348e3ae5bcc53a0b0d49d4b4976837ec8f376f38327135578eca7ee583215bd5c79ebf499816f79afcc402ff1e9ffc4ad0f896761c9cff75050bf84baa194c355763b16b5d2648d480a2b48f22662685de39c7cee90aa0b6edf8062e42"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #3
depends_on:1
3:exp:1:hex:"898640ce467201a53e7731bdfb572977f7eb3e49050bc1e367ca74bf0a27376d339d09f4":hex:"":hex:"":hex:"":hex:"4f5eea927023b4abab5d4d9944e84ca001ee081cbc21d4080e1534ee6d1d8a6f60361029ffa983bcc79b5d65d4aaaaaf98983de13ddde39a739f9d95878fb31f57f96184e5f2f3adf654a468c616237fcbc6b2c194e247178cb90294f631c449a01f1fe09c02587c460305be9fc71b5a"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #4
depends_on:1
3:exp:1:hex:"fe405dd73956bf6ec875515eebd8c5ecd60553643da750914c83dfc93611d57390af7324":hex:"":hex:"":hex:"":hex:"d8ae0eb81913a190c439f8ffa56c06155a73f84b20608b2b2e9eab3061202cebad18ab8b3eba81672152c1c02ef573cd6e8623c392facb6a857425c6795cd7999c1e7f56f3fa9accca018076e0bfc106d075df98f5fb66f28933215e9276777dfc479e71a8d506a66197918d9b0f7a8f"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #5
depends_on:1
3:exp:1:hex:"b06892f6f455afddc8eb60aae35b35a64f63b2aa85a2dae4ef489266f7bc354f72d68b71":hex:"":hex:"":hex:"":hex:"fc10c03fc37d3bd5fba6591a97f6354a9ed8ba2b6806744432851f43a3ce6418e39ccb417b8539e349acea588e2abe5da06147c9825c6e50a31f8589a57ca3bfb10f0da9c8e89fe2e372b5af1cf96e0fbeec5d99228770c41a76e587da7d8764d5f235f5d1d6188d84ae61c52c2164fb"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #6
depends_on:1
3:exp:1:hex:"9174e174e9e031f62b2e19ae5c0bef22eed7d5598e6e73504759a2c15b05c2473a721d26":hex:"":hex:"":hex:"":hex:"1962f2d473b31a2576dbd78022f4eeb974641fa2e9cb582f03ab741929f51f0f4663129e68ddc242e1c2ceafacec3dccb97e09527aff46b948f0abcea1451699dc3ae4d3fb5e04c84337e17b504af2fb5f1aa6ec0033ddf138a188ee162c497526563a67da8015275d89f0e1e902b2ef"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #7
depends_on:1
3:exp:1:hex:"eb1d45ba0d8951b7b1d7ce922b7d1f6e94da8b821940126c9da5b0b4382425930743a051":hex:"":hex:"":hex:"":hex:"306b1f733e6f69b6f26b7baa5441af4967a5cad8faad18029440aa989aef6024dbf3ba02dfc2c694dad6496ff760d72ae6914a4dcd5e3a443f4bcb14bf2b64986f35c32449f15e3084d46fadfa2ae213da6b26f787cef89b6a23084a929608a9f6acd8315808c29f8ae435a40202a012"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #8
depends_on:1
3:exp:1:hex:"78cdc1567caf2ff529ef8e3475c0fbb09a48b687a544f7399f503948621f29686fb15216":hex:"":hex:"":hex:"":hex:"2367067d8ec189b0819eda34602768a0698b4b545c7d5214fad58c9787b89809b97f3af5f9349907d2954f8c0dccbdbe63cc019bde3a6fae10497ae57f33e91ed55b6fc4a83fe8a2463552796d5120da8066f7285a8388958817b1218e006d7fc617f453ad0f9217966a0731ba99f093"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #9
depends_on:1
3:exp:1:hex:"25f9ee24ee25ad3d29a974f8f552b178cb292b847a6be80694213a6c0b33e25e29fd3ecc":hex:"":hex:"":hex:"":hex:"32fe251a619d164c217365b12a313a942b6a9c3df007751a5fa9f356412d1142c785c292e3dc9d0b1d77e080892e5d39b91c58fd142458c71182061920a0721db453a32fe7ffc8b2c20bf11894fa37d8f0e9463edd43a97f65362295119be03d5e06f617fdff6accaab8c4da72ac8f81"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #10
depends_on:1
3:exp:1:hex:"0b644221788c266aae00a3b63a87f32ca96a6c32b116cd37caa4f75ff5d7e56be3b4e20f":hex:"":hex:"":hex:"":hex:"dc9245da77502cadd1a8ac4d1cf6a199c8e529deda10c87ab6c69ceea6fdef36d45f4d036021b93fe5b342c52fe1e71d81e617bebc58804af3109bab93dbb2e5c546e108bd0891710128b5e8e4a4f01df2003d038fec8cef426fad7f72dd5e091b4850e9bf4932d60deacb6e9ea3c5e6"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #11
depends_on:1
3:exp:1:hex:"a6677badff70966a3cd2febaad7de7aa5849ba763789b20d0a39b6c569261b826cdb15e8":hex:"":hex:"":hex:"":hex:"e04838c970f5d7208a2a7310da893d65391666a5dc62d9ede71fc30816cfc3e8064ac59cc9aaf30283356078c812676ca20beb044a6d78db6c5ef9718a88559607f225002452c01459944433013cfffea84d6fe404fbbbc2d66bb50a2fa01d8a5d6e4ea9b402dc5256752461bf6fcb7f"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #12
depends_on:1
3:exp:1:hex:"2301d8c053312db04882f4284cf8b47966c1c9b8c49de847d0c11f14c5f70ce19346562b":hex:"":hex:"":hex:"":hex:"b46246526b28f3ad7f6d8732ca3bfc40f005d97a519640a4ce728486d8bf830d661be5a97b11113e89096d9bf15cbef73ec28ac13e3fbeadc9bca500918bbe92ea23e131cc622dbffe2272db16ec5d4ca30e9bd986d1709ae22d10180514bcd11bd6218ea1fbaba101444945a17a4c4b"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #13
depends_on:1
3:exp:1:hex:"78644ea1b0c4c55c4addeb476fc34471ea2c4393697aa4f170726010c443b8e1c4a6b3ea":hex:"":hex:"":hex:"":hex:"ef1b41bd03ee8460d55759db65a4c97758f48e3a09127be04c7ed08bbee5fa5cf119929df42c187e2a347a8df99c502b693a7ae41946f4918d84686880ae29d6d8fbbc4fccc9e295876a249cfa59effd331994e84717b4c76637df36beb960761880daab3d43376341439af2ce8e33cc"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,0) #14
depends_on:1
3:exp:1:hex:"71acb71235e88e3aa6d8bbf27ccef8ef28043ebe8663f7bcf49cb642b3d915cf03b90e65":hex:"":hex:"":hex:"":hex:"144aeb56a11cb648b5ec7d40c2816e368426690db55b559f5633f856b79efe5f784944144756825b8fd7bf98beb758efe2ac1f650d54fc436a4bcd7dfaf3a66c192a7629eea8a357eef24b117a6e7d578797980eaefcf9a961452c4c1315119ca960ad08764fe76e2462ae1a191baeca"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #0
depends_on:1
3:exp:1:hex:"c5c89c26ac4ca8b1106ba90a8ef4d6d687dfd88743caa5fbafa4745d9c1f8371120b10c8":hex:"":hex:"d3483ae5f9ed97efd3f852e4a6f20f25c947a03f39a4b75c":hex:"2cd523c5958cdf403caa61abe5c4739cdb9d40152f0e769a":hex:"1fef4e6abc2778d1c3e3ce00fdb5eae1ebebdd5cff0a7087644c8565d1e8b876b2c05264ca81498468851fc7b9e5a2163a06f377d2ed754c095adc59dc015a77edd69e4eecbe48d9dc127eedfff5cc73ae38127ae3a518fe7fa5abd1a9c53eeaf144420873341e2efa3d81493c69b04e"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #1
depends_on:1
3:exp:1:hex:"6860e44bf582db9818ffbe4c699d4218965c29f463d7a02fe1f36c8442b0a5d103def7a2":hex:"":hex:"e9f598357109e2a532dc980388b8a5991256166d67c3bc01":hex:"58ebbf7402be041724701e5c0132abe604c11a62a9de1d2f":hex:"52fad34b27113c146595a6740f505bc2d3edf6618975cb9c4a5155788eaf08b96d232610d9b4ee06264fd92f319df5a52b8f9e31b016a6c21d27d31d9d42bbb7588a7142f26ece3ddf211c8cf4530947adee302aa71c0d7fe9060c1b25f1c1f2e053598a7fb72c4db55fb1b02352d60a"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #2
depends_on:1
3:exp:1:hex:"27b9f78ae07821f2b5625c8fc3a03ceec4fc8062be860c2db20403dd88a8751dcad56158":hex:"":hex:"1b6c848fce706abd73612dd3fd421c1c7ce9f4c2d0ecc670":hex:"14a43645c1b6ae394f795af6ca2e9084e7e707f3f2cedd7a":hex:"33c592017af545b3a9cf3419ce1c604e9c7c687ebf6418fbef47ec96e61f1951068eec9b60005d24574313f04ffc16c30872ec83e41e248e3d5c6951930d6a88b8931d5502d1142ce50676b3adf48453d1a008189658db8511d19a06ac97b4d5cfac19b54e8e6b899d501715f401ef85"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #3
depends_on:1
3:exp:1:hex:"8d7cf5c2e360ef755c1e9f5b7a44a1e29f09cee7ca44e15925ffe9a47b2d55fd7750b356":hex:"":hex:"0e691c9a435939c615f0686eae88e090ba5c4b3f5e6e00c0":hex:"1e3a452295617e5a9e6f78256d2781feeb3812753b4aad9a":hex:"a307569d8adf3f7e6ee4567a5b2bd338badb9234e7b27c92429ffa75e4c56c0529fdc6c15df5d47c46e3d2eeadcf1b9e93a5dd6cde99a82f04b0d97f7a3bfd05c0e1d8370987222310ab18c980ce48b2679361c3d9011dd355a9b06337c054ee37913d5f4dd30d1fc942cd733a0fa5f8"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #4
depends_on:1
3:exp:1:hex:"1a0d2c734918c539c1b306a464eb6b54f92e958e8636032aec23ba8ae817bec48384461f":hex:"":hex:"b8ad9e613a891fd0db89571fddda77827382e406cd3cdf7e":hex:"1e172a708aa4ffa3618ff0d7b1f9ba341f4811507851dfb4":hex:"674df1f3095d6c87bc54dd9b2aaa2c786bd50e4ddc02493745d820dad8552131fb3e389e99b0709478b65d4268f2a3b468a8447dc572a6ee024be6be9be9d428c12cc92894d15dd1c959d6222dc9ec30478c7a0b57f5bd8bd53868b98d7674738b54cf74100ae215693babb6db3b3890"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #5
depends_on:1
3:exp:1:hex:"95a30a0ca779a4038ea920cccfa4cdd814ca17d560d53a75cf170f4712994f9bcb2efb74":hex:"":hex:"1da6c8726bbfa3c8bee6dcff6f76f2d55d60527c4f0db26b":hex:"595ebd903a596a1f12175080185bd94c2336eb8dd29a387d":hex:"317c19cf4a45b8cf3f645da084ada54d1b1f81379152424fddad22a6dc9bd22841e0c4c5a36bfb7879eafbd1a939121905a938ae034c7fc01afb56607e35f895f46f13e91ce4e8e75b6a87a1e5544e18eb194fd6754b06885ac05e332a05ed436e889965e405e0f2069b04b40ea0f635"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #6
depends_on:1
3:exp:1:hex:"8af8930562510231a592a72587fa6ad7c234e133046965907642fbc785c0b86cba844f0f":hex:"":hex:"9ee7b221064966582dc836437b82386f5204a302a4179079":hex:"473d917f5b66f0f6e3fb4670ba08c2cbd2ea765b46b10838":hex:"5c2fc9cc7148dbe40a692b3636778eb80188949d198bba3e8355386b78b54bfb963f5f2d9202988da20ccbf336a7c737a66c90149b9e8e306477151c4d912f7c61e872de0d0e47701cbe765864de536d599946b8bd65e4d89d4e61deb53de9974fbbe634501800feea100fea573e2e50"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #7
depends_on:1
3:exp:1:hex:"2b9554ecf94c7d647a4e117f43326cab54466eba56a09a52741b2445057c491935c067d2":hex:"":hex:"0144be6978dba85aa645d793c1881dc2deb1bd210811ec9e":hex:"1cd265f3812568274b643954c70923a76dfcc9f123360111":hex:"f7459b0c23966dc1a53e0c6406c9e78ebe728e3484224cd88b6b2ea554522e75eb4a1c8a3fdc66561426464f50b8d0ff95b266677d91776b344a820eb4fd7d554678300558011a7cd85d22e92dc8ec2c2fa15c6330ba157c3e71728304447c1ad4d64f3da4fbf26d92e1e7c58a1b289c"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #8
depends_on:1
3:exp:1:hex:"335ede8603fcde78ea9869da2dbcab4a6e72f1b53439f3085d06b856e627411a9ce1c297":hex:"":hex:"ededc73fe268935c10832c463549f8204a29cf0fe00a4d87":hex:"ef1b8a80dd49d2c263999ddc0d5a1d9205c1b1c66239fd80":hex:"05bfe97c398b1e33ee1c547c0edb5b654b7060b76604195440d06dd2f614a398c6c43f1803893c4c8888bedecdf998367cf992301a25f24c263f5d36bbfc6fe8b839cad293b3617c1d2c60a814bda0359e3f717fa80fc7324af8827d438c88642754b39b10d18cf5bf42f11177a0bc6b"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #9
depends_on:1
3:exp:1:hex:"9b0275d861117553ecd3c4d7cfe762f88df22c4c4190dac8e0be5872818e2dd765261d58":hex:"":hex:"cfc0b07082d514425b17ce3cb334ec62bc1b3be0be58ca4b":hex:"d3c70ab5ff7a364a9e6dc75132ac67e0d373fa2df301afb5":hex:"09fb41bcceb016e754795e1cce582f0cae91d7bb50245975eb75274819e1e4dcdfbc5e2f13fd26b9a9f9e945cd807ffec4e275681ea7bd33eae13efd8a01edbe02562e77b44b6312f416c3dd0be64f2bae0ba4b9bb36fc3a44841d21d8b3571c0ef644d88cf3cc3c851b256a15f4d716"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #10
depends_on:1
3:exp:1:hex:"1981c3f9ca58fd10e8377a8d0eb3cf02102aab6f7a033af3135533d9fd850e29ecb8dc9b":hex:"":hex:"f9978ba41df22894ad5f3849c1bdf21f7bbc0128c782e79b":hex:"b4d57de5e18d393273ee9f3ef9736599c6d639f437239219":hex:"fee23db2fcc71624fb39f573e33a1490efc7230c27e9278188251634f9c045bcb26e79ece6a173491475ae44a957c4269570f5469234ca8b6873cc973c8d97178c58cec658a352bad0d4c6001cae5664258db59ad76eb6304d166267eafb46f4dd536a914fa6d1ac58317e7c557d4653"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #11
depends_on:1
3:exp:1:hex:"c10d4e521350f7cd1853576d03c4bece3e58c8c740859e4e16979499ec1365fc073736a3":hex:"":hex:"78b245520153baacc66846e7a83a2a925f892d4c2ee63c0f":hex:"c8ca7a33de5991d44d7ef7da2d3368cc2cdb93895c394d41":hex:"f92c15f5833800b28dba2d134d4dcfc41abf72f5a700469551e8ccb83bdb0772d14d6b26ba6978169e3ddbe5f214d57930dfcad719bf10d306749246d2624bedd4a18d327b8ae6bee67cf0bfb5f649824bbd0440f042146b95a83e5845ced69a55ba055d5dfc7183c3bb28d61312d274"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #12
depends_on:1
3:exp:1:hex:"7608b5617785995a1f7144ee5229e4f9c138e418bcc3b5e061a422e8cf875f58650e996d":hex:"":hex:"961c2d33039e60a2871e1f5b82097f6b1cb03836dba5f440":hex:"b18cb52d3858ac5bf59f216a28c0ad49f3dc88c67b5870e0":hex:"4b0313ae873ce5ebf08aec160416492e4c4c797a5017061ea42aefa0685ab19b74a7af11f019b9fb63072b797f7ea3354efd32c4abd1e866405a319ed2fa13fc81019d61326e70e503141b9c77b4879a45e9f36f101dbfff4359147282ef814888fee81640def25f551cee41d12609aa"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #13
depends_on:1
3:exp:1:hex:"fef7a43fea2ff1a0f624086985e535778d7a73dbc47bc23e9da92edd5d2f273cdbbc0251":hex:"":hex:"836731a57497a69e31f8db4f729774ad65f31d968dbc55a8":hex:"bcca96d808ba98bb50e90afe58fc88e95dc14c3e90c56004":hex:"4f2c64ecd146689064fbf4fcffce2a2ab3910e72ec4faec277f7b9e9ed510381312b01f21650e175ebe9c45c11e977276f13be015243a0cd16a191abbac6462ba96e4e4a1120b28083da933419e8c8f03099906eb1ee012ae291104c6530f51b5e32e6631cab8ef5aad68c0045255ba9"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,0) #14
depends_on:1
3:exp:1:hex:"00197c70b2f0d3e98e4b387ec42a65c4106a1689ab5de61101ee76f4b5e530e7efeaf964":hex:"":hex:"03015311cddd0961ec7a74cb84d835c058a69b964f18a1c1":hex:"5e0d99e0e7c57769a43ea771c467fb5e2df6d06dae035fd6":hex:"72e8ca7666e440ac6a84ab6f7be7e00a536d77315b119b49e5544bf3ead564bd06740f09f6e20564542e0d597ac15a43b5fb5a0239a3362bc3a9efe1ce358ddd9d4f30b72e12ed9d78340c66b194beb4b12e973213931b9cfd0ccbdf540d2c36ce074e2beac7a4ddac59e06e4c7178d3"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #0
depends_on:1
3:exp:1:hex:"c5c89c26ac4ca8b1106ba90a8ef4d6d687dfd88743caa5fbafa4745d9c1f8371120b10c8":hex:"":hex:"d3483ae5f9ed97efd3f852e4a6f20f25c947a03f39a4b75c":hex:"2cd523c5958cdf403caa61abe5c4739cdb9d40152f0e769a":hex:"1fef4e6abc2778d1c3e3ce00fdb5eae1ebebdd5cff0a7087644c8565d1e8b876b2c05264ca81498468851fc7b9e5a2163a06f377d2ed754c095adc59dc015a77edd69e4eecbe48d9dc127eedfff5cc73ae38127ae3a518fe7fa5abd1a9c53eeaf144420873341e2efa3d81493c69b04e"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #1
depends_on:1
3:exp:1:hex:"6860e44bf582db9818ffbe4c699d4218965c29f463d7a02fe1f36c8442b0a5d103def7a2":hex:"":hex:"e9f598357109e2a532dc980388b8a5991256166d67c3bc01":hex:"58ebbf7402be041724701e5c0132abe604c11a62a9de1d2f":hex:"52fad34b27113c146595a6740f505bc2d3edf6618975cb9c4a5155788eaf08b96d232610d9b4ee06264fd92f319df5a52b8f9e31b016a6c21d27d31d9d42bbb7588a7142f26ece3ddf211c8cf4530947adee302aa71c0d7fe9060c1b25f1c1f2e053598a7fb72c4db55fb1b02352d60a"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #2
depends_on:1
3:exp:1:hex:"27b9f78ae07821f2b5625c8fc3a03ceec4fc8062be860c2db20403dd88a8751dcad56158":hex:"":hex:"1b6c848fce706abd73612dd3fd421c1c7ce9f4c2d0ecc670":hex:"14a43645c1b6ae394f795af6ca2e9084e7e707f3f2cedd7a":hex:"33c592017af545b3a9cf3419ce1c604e9c7c687ebf6418fbef47ec96e61f1951068eec9b60005d24574313f04ffc16c30872ec83e41e248e3d5c6951930d6a88b8931d5502d1142ce50676b3adf48453d1a008189658db8511d19a06ac97b4d5cfac19b54e8e6b899d501715f401ef85"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #3
depends_on:1
3:exp:1:hex:"8d7cf5c2e360ef755c1e9f5b7a44a1e29f09cee7ca44e15925ffe9a47b2d55fd7750b356":hex:"":hex:"0e691c9a435939c615f0686eae88e090ba5c4b3f5e6e00c0":hex:"1e3a452295617e5a9e6f78256d2781feeb3812753b4aad9a":hex:"a307569d8adf3f7e6ee4567a5b2bd338badb9234e7b27c92429ffa75e4c56c0529fdc6c15df5d47c46e3d2eeadcf1b9e93a5dd6cde99a82f04b0d97f7a3bfd05c0e1d8370987222310ab18c980ce48b2679361c3d9011dd355a9b06337c054ee37913d5f4dd30d1fc942cd733a0fa5f8"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #4
depends_on:1
3:exp:1:hex:"1a0d2c734918c539c1b306a464eb6b54f92e958e8636032aec23ba8ae817bec48384461f":hex:"":hex:"b8ad9e613a891fd0db89571fddda77827382e406cd3cdf7e":hex:"1e172a708aa4ffa3618ff0d7b1f9ba341f4811507851dfb4":hex:"674df1f3095d6c87bc54dd9b2aaa2c786bd50e4ddc02493745d820dad8552131fb3e389e99b0709478b65d4268f2a3b468a8447dc572a6ee024be6be9be9d428c12cc92894d15dd1c959d6222dc9ec30478c7a0b57f5bd8bd53868b98d7674738b54cf74100ae215693babb6db3b3890"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #5
depends_on:1
3:exp:1:hex:"95a30a0ca779a4038ea920cccfa4cdd814ca17d560d53a75cf170f4712994f9bcb2efb74":hex:"":hex:"1da6c8726bbfa3c8bee6dcff6f76f2d55d60527c4f0db26b":hex:"595ebd903a596a1f12175080185bd94c2336eb8dd29a387d":hex:"317c19cf4a45b8cf3f645da084ada54d1b1f81379152424fddad22a6dc9bd22841e0c4c5a36bfb7879eafbd1a939121905a938ae034c7fc01afb56607e35f895f46f13e91ce4e8e75b6a87a1e5544e18eb194fd6754b06885ac05e332a05ed436e889965e405e0f2069b04b40ea0f635"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #6
depends_on:1
3:exp:1:hex:"8af8930562510231a592a72587fa6ad7c234e133046965907642fbc785c0b86cba844f0f":hex:"":hex:"9ee7b221064966582dc836437b82386f5204a302a4179079":hex:"473d917f5b66f0f6e3fb4670ba08c2cbd2ea765b46b10838":hex:"5c2fc9cc7148dbe40a692b3636778eb80188949d198bba3e8355386b78b54bfb963f5f2d9202988da20ccbf336a7c737a66c90149b9e8e306477151c4d912f7c61e872de0d0e47701cbe765864de536d599946b8bd65e4d89d4e61deb53de9974fbbe634501800feea100fea573e2e50"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #7
depends_on:1
3:exp:1:hex:"2b9554ecf94c7d647a4e117f43326cab54466eba56a09a52741b2445057c491935c067d2":hex:"":hex:"0144be6978dba85aa645d793c1881dc2deb1bd210811ec9e":hex:"1cd265f3812568274b643954c70923a76dfcc9f123360111":hex:"f7459b0c23966dc1a53e0c6406c9e78ebe728e3484224cd88b6b2ea554522e75eb4a1c8a3fdc66561426464f50b8d0ff95b266677d91776b344a820eb4fd7d554678300558011a7cd85d22e92dc8ec2c2fa15c6330ba157c3e71728304447c1ad4d64f3da4fbf26d92e1e7c58a1b289c"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #8
depends_on:1
3:exp:1:hex:"335ede8603fcde78ea9869da2dbcab4a6e72f1b53439f3085d06b856e627411a9ce1c297":hex:"":hex:"ededc73fe268935c10832c463549f8204a29cf0fe00a4d87":hex:"ef1b8a80dd49d2c263999ddc0d5a1d9205c1b1c66239fd80":hex:"05bfe97c398b1e33ee1c547c0edb5b654b7060b76604195440d06dd2f614a398c6c43f1803893c4c8888bedecdf998367cf992301a25f24c263f5d36bbfc6fe8b839cad293b3617c1d2c60a814bda0359e3f717fa80fc7324af8827d438c88642754b39b10d18cf5bf42f11177a0bc6b"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #9
depends_on:1
3:exp:1:hex:"9b0275d861117553ecd3c4d7cfe762f88df22c4c4190dac8e0be5872818e2dd765261d58":hex:"":hex:"cfc0b07082d514425b17ce3cb334ec62bc1b3be0be58ca4b":hex:"d3c70ab5ff7a364a9e6dc75132ac67e0d373fa2df301afb5":hex:"09fb41bcceb016e754795e1cce582f0cae91d7bb50245975eb75274819e1e4dcdfbc5e2f13fd26b9a9f9e945cd807ffec4e275681ea7bd33eae13efd8a01edbe02562e77b44b6312f416c3dd0be64f2bae0ba4b9bb36fc3a44841d21d8b3571c0ef644d88cf3cc3c851b256a15f4d716"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #10
depends_on:1
3:exp:1:hex:"1981c3f9ca58fd10e8377a8d0eb3cf02102aab6f7a033af3135533d9fd850e29ecb8dc9b":hex:"":hex:"f9978ba41df22894ad5f3849c1bdf21f7bbc0128c782e79b":hex:"b4d57de5e18d393273ee9f3ef9736599c6d639f437239219":hex:"fee23db2fcc71624fb39f573e33a1490efc7230c27e9278188251634f9c045bcb26e79ece6a173491475ae44a957c4269570f5469234ca8b6873cc973c8d97178c58cec658a352bad0d4c6001cae5664258db59ad76eb6304d166267eafb46f4dd536a914fa6d1ac58317e7c557d4653"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #11
depends_on:1
3:exp:1:hex:"c10d4e521350f7cd1853576d03c4bece3e58c8c740859e4e16979499ec1365fc073736a3":hex:"":hex:"78b245520153baacc66846e7a83a2a925f892d4c2ee63c0f":hex:"c8ca7a33de5991d44d7ef7da2d3368cc2cdb93895c394d41":hex:"f92c15f5833800b28dba2d134d4dcfc41abf72f5a700469551e8ccb83bdb0772d14d6b26ba6978169e3ddbe5f214d57930dfcad719bf10d306749246d2624bedd4a18d327b8ae6bee67cf0bfb5f649824bbd0440f042146b95a83e5845ced69a55ba055d5dfc7183c3bb28d61312d274"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #12
depends_on:1
3:exp:1:hex:"7608b5617785995a1f7144ee5229e4f9c138e418bcc3b5e061a422e8cf875f58650e996d":hex:"":hex:"961c2d33039e60a2871e1f5b82097f6b1cb03836dba5f440":hex:"b18cb52d3858ac5bf59f216a28c0ad49f3dc88c67b5870e0":hex:"4b0313ae873ce5ebf08aec160416492e4c4c797a5017061ea42aefa0685ab19b74a7af11f019b9fb63072b797f7ea3354efd32c4abd1e866405a319ed2fa13fc81019d61326e70e503141b9c77b4879a45e9f36f101dbfff4359147282ef814888fee81640def25f551cee41d12609aa"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #13
depends_on:1
3:exp:1:hex:"fef7a43fea2ff1a0f624086985e535778d7a73dbc47bc23e9da92edd5d2f273cdbbc0251":hex:"":hex:"836731a57497a69e31f8db4f729774ad65f31d968dbc55a8":hex:"bcca96d808ba98bb50e90afe58fc88e95dc14c3e90c56004":hex:"4f2c64ecd146689064fbf4fcffce2a2ab3910e72ec4faec277f7b9e9ed510381312b01f21650e175ebe9c45c11e977276f13be015243a0cd16a191abbac6462ba96e4e4a1120b28083da933419e8c8f03099906eb1ee012ae291104c6530f51b5e32e6631cab8ef5aad68c0045255ba9"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,0,192) #14
depends_on:1
3:exp:1:hex:"00197c70b2f0d3e98e4b387ec42a65c4106a1689ab5de61101ee76f4b5e530e7efeaf964":hex:"":hex:"03015311cddd0961ec7a74cb84d835c058a69b964f18a1c1":hex:"5e0d99e0e7c57769a43ea771c467fb5e2df6d06dae035fd6":hex:"72e8ca7666e440ac6a84ab6f7be7e00a536d77315b119b49e5544bf3ead564bd06740f09f6e20564542e0d597ac15a43b5fb5a0239a3362bc3a9efe1ce358ddd9d4f30b72e12ed9d78340c66b194beb4b12e973213931b9cfd0ccbdf540d2c36ce074e2beac7a4ddac59e06e4c7178d3"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #0
depends_on:1
3:exp:1:hex:"e4547261c9dda6bafe9fddf435a80ebc96354c7c2c8847c5d26c6e73a967bfc4ebaf8613":hex:"42849dc8eec611eaa49252067fa60d7d7267d711dc35b576":hex:"815f50fc233f157f96ad0627c355bce407b269dca91af661":hex:"775a1c9da6f58d4eb95b27935ecc01dde31ff17ce2e4e65d":hex:"25adb777523a80a6dbb6ac1fd08e02bfc4b4686cec5efe3ae9aa2d4469eae8c9c3693fdc8e0fc107720b7789ef7331e23fe3799412ec86857ffbba515a5af4d91013b2f17669421c822005b4747942790a11a24c4974f27d54de69727b0ed507b6a48a9d6c53f93e2f3d33df73dd643f"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #1
depends_on:1
3:exp:1:hex:"06d677001d9b3c97fda4d09778aee3de131b4123696b109f81bb6b0d7fbcab3c5842bb83":hex:"f99638d2d4365b662cd83ab4e6a7bbb624e6c72b7b38e81b":hex:"20b7d56f6222bafeeeee59dbca1933d8086218891f3a9bfe":hex:"9de4f2847fe239cb1a3df4b8ff64c25d7b0870f3c9ebe3a3":hex:"e18ff19837ce21e68944659321311b8584dd515ed8a6a1f2b0ac06e69009c3d0cf0489af876201efad962cfd1ba54f540b94131d788d3fea797c4bc079593bc7932baa70abb145a355741a98c584f0fa3298b8310b01e1a6debf5359d7d02b1a6c663100acb56975450bec20e91b736b"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #2
depends_on:1
3:exp:1:hex:"abd38c0465cdfe018f36ffbb7a0ee51d67675ab4f0f1d1e93418bb4cdf6499a371af4d3a":hex:"9a07d5571d841e3c1a9eb3fb48cde3b3e080e1c2e0db6a6d":hex:"a392f79022aebbec0c82b981293627d139dfb5232eb490b4":hex:"f5ce1f6b1e6715c49bea42ff439fdecd9b3b7f2e578133cc":hex:"885c54ad25992fc38260498d6f4d8c73d6159af5f7efef06174da03afcd8384cb28690fd9ded1d26e2dff74aee4dd0c47a0d99c6fc1ec8d8faccbdcf6fdb12a528564ad0d8131bcf5222d7e6c69c52da1acba01b721c98ac5a33725111f12f6d8100009d7cc9efb7ad8d7d95ea4e620d"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #3
depends_on:1
3:exp:1:hex:"b52620e58e0b52b8eed0d6a6c5f4ff6c1483c61fc41dacf72bf475b37d068d061d1edcea":hex:"ef0d233de00d24622b7d4ff4215aa720787fe80aaeb65d7a":hex:"81b735acd3dcb13e65231c2d980fb40ca850370581f230d2":hex:"b2302d024d92cdaed4b12f79b0aeb20c98b2321710fefab2":hex:"ae94204670196baf740768f97b3a095134b384afea667fd90a77a16c8ae390a732ff49a3073a27db0f7a2c8ad5d7cb527d334a37abf0472f292a20f2a28e667d7c9e9f7b8fbdd177f36bf92d66223aee3f712b6c9b064e07ab96f6a77613ea55008fb4f8fbcb2f1ccbb0da75316c1faa"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #4
depends_on:1
3:exp:1:hex:"2592a5ed86ff64b9b4c1fbb81222d1bfbc53f3a639571ecc356084058b8855237da15c50":hex:"a626c51ec99e72431485d2ba027ed9cabcae7b86116abe4f":hex:"c430876552d28776570923c6b74e42c3210f01104006bf11":hex:"fe2ebc239690a4eb18a0b5e75d08831cc2eb07c982c63973":hex:"005045ade7cc15467b5ea784649d9804540a842ffba4db8d44df4f44c69480bd4fe965b645aed09d62190daeb2693a2192aec3d71453a8218e4700201ab922ac35d241d95150b47cc7a051897be4d958f2da5c2ebbfceb1c550cb67b32ff83ce4fd845fd826a0d2469b506f5158765fa"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #5
depends_on:1
3:exp:1:hex:"376785f5ff8a82ceb0aaeb010533cc1089059ec583c302b14bc47e2cb8c2711839ce7f68":hex:"6d345e248339e893f75696c039ac47e5678696fd489a393c":hex:"b0f3fa1131c3fdd5c7fd2de93931e45a66fa030422ac65db":hex:"c66341e3f9fb82e3ba85f229fcb7d34457e4a6ba8396b548":hex:"b92d17e1be94b0385a8cc3e16189811fef7b284a1b0b6b2520fde79af7826c745e746486a70cd8dd9930b163da75f7eea7c216e758d9ed6c745dcd7bde19bb9382c1f7c37cd15b703b884d7d452c255b25048a836844c5ff28aaacf733a52c28904b36e1b51729d7aed81d601c0872dd"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #6
depends_on:1
3:exp:1:hex:"2cc2557582c5a90cd2ad0c4a5578eb0bbc9bde41b126e46d8e9c3563341ba238414eb628":hex:"9d2fbb9153e3ffefae0770c79de10db069a5ff9f50e31787":hex:"2e54e32539e27ef76ac1eeae2e30c2385647652e20903b39":hex:"1f4e01255908c3c8049521f8972c01ede7dc76c425c59640":hex:"7d6ccdfab33f322898c470be02d8257e0e952dd10f407b3a8eaeeba47c541d968d79eca29e15541c1505fe4f19a41797c9ca2280c06261fe9d0c58bab65d16f5794b57566b8795c38c7b43d4761c8fd107beb95147a0fe61ae8dc31e25eb2957e44c0463ca7c1b589ea587f0cae1428c"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #7
depends_on:1
3:exp:1:hex:"e670f896326b76034e43cd85f6f6f11fe6582d3471a8eb88d37a2302de010aac0e556860":hex:"5e218091abee1960ef81f4d5a80415e388bd0cc79bed70cf":hex:"7cf84b9ff30dbd0f608fb21646d7c5b542fba50adb38d5df":hex:"c1c4aabe7616a4c97a4dbdadb08a9b63c6e10cef8d463fd8":hex:"d8fbd557fccf31829b5ee11b05d0353e725bff15fdaac94d21ce95d40eff55edd852b264b515ec6384e2d28d014e47a2df0d4f56a4ec79309b06affc62915e231d62d02bfc60220c72b7ca7ba5671f882839b791ef534e707a04e5274c1011f7941fe1075a5d06a47af9fb2f65c1f211"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #8
depends_on:1
3:exp:1:hex:"0576bb2d4c663b781193509251e2f76b0a8bb792e79449600c2c154feb70cf33ca942508":hex:"ad15e4fce9f4dea43c12ff9f9d50c963b335a01332541154":hex:"3c8a4d6ab96cebf9d02b5663dcb0e0db23699623455cd4b5":hex:"43d2d3a8d023fa1785ce4781a15eb20ad787685a47da08f0":hex:"a68e648cb07da2eb795a8c898c8631e565f33c2fe9c35e686d6f85fef145446cb79bb6d17bdc8224bfe437468a9630ed03c517caf1226c278ae510c869d67d50b6bf1cb378a34035041f290d8dbc123650ab4fbe5cf6074ed0ba90e45d9a8ae08566ea3d3a00ee3741c8ec8f56dcc78c"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #9
depends_on:1
3:exp:1:hex:"f597ce05b9a5b1cf3847bbd4171e5085384cc256f77ac61573b435726cbd538b93de9f55":hex:"573cf859f8fea05f16c6d03cb4e524b91e917f39eeeb1d68":hex:"2a842454870c3f7936f8036b453d219557ca341f261d2519":hex:"7afd8cc269899acd88f5c55af29fb0c4ce678a0d8ebf924f":hex:"8162c16c1ce3d5c6b7c96f0281f4220569a882277935752b86e7d3f54646b276cb77ed96da73799911fca3d19d34c1f0b21068a472afcb77410412eff2abd03c753a009ce02b0e995477546366020294eff0ef0da66f31a413313e2774ca04f09a4d5076e0e85ca97d5bb6faac4c0c27"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #10
depends_on:1
3:exp:1:hex:"d5b5374fe143035c4fea41667bc8bc7d46000998cc82ab32a0040c705e01f9b354e8f16e":hex:"ed8bb219e67515874c5b9e3f6ae6e4dfa9c42d1e69204e8b":hex:"70f03fe6e78cc34ec1678b2708fcd8ae3300183ea15ccfc7":hex:"9c641d7e73d1a2b819e113747d74a979b74c444ed36b7391":hex:"d50df8e3e17c0f5e19673ba2097d1d0c4cf7a9def7465a5b91ac8d49ae1b6a821fe9efde841ec9064555c0e2d6cdfa41f1089f22a5c27090c5a136660d1af586a1e131a853f19bc3c8f4c79aa09e39c2f22b4456c667ec907e2a4124218665e7cce50399ae1e19ba9c2399f470444839"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #11
depends_on:1
3:exp:1:hex:"74d7c8c9b170e59e4f128c8df1955838df5c8071a5e85439d71e785c68b37e10efb39c9a":hex:"be3d54203a1078d051519137774d5d851e81be026155eb78":hex:"23f7b6758d79de580ed3eb995fc173da74939837aa8d9eb4":hex:"6f0d5a333ddea0d38362df0dc3ebaa2be2fe5825ddb0ce84":hex:"4462fc32110b25b3797c5cafaad830e8a4346d9270fed98b30f1345a7a8dde19bf5365d6f3788e7f715feb2762af263839c8c8188908c61120743d977d71c51f6324d887bbda380fc07eff09a31c2332e7b1aa1692c59c3379db95fc21cf711c004c4d385fe14f48f2f2a31bcce6aaec"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #12
depends_on:1
3:exp:1:hex:"eaf27c3f69279fd523c0c3a1da5fc4f01ed64c27ffcfe3c1c596482f5baae1434e8c687c":hex:"b038829fc95dcba8645ce40a306491c893f48139ae30a071":hex:"fbbf7abb8cc2612eeea6d9463efd55c47245e01713332bd6":hex:"ccd7e81f529de1ff4e65fc63d34c262ffde7ee49e6707197":hex:"96dfb7445057633b2f0deb69135d10d0a2dc53faa9cded55ddfb8edc63f5424f8fec7627597a30328177dde7963f76f9e5412b5b440256c6a3f0c7c7fa02ca49e19ea176abac013696e9d529f65e51d4a7348e42dd254bbf19d9632d6c875b8ecd7a4139f1bf020a159d2a30af8d645f"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #13
depends_on:1
3:exp:1:hex:"319cbf2b11b37c831c654b6cec2570dc6d7abeeab185272a518eaef30faa5acf5c8b254d":hex:"9effa141f7466b659eaa50c32c8e683c2640f54027ab6aa5":hex:"63b3acc237588cdf41c0d4bef16c4890cf3d458fcf1de8ea":hex:"573d6a7960aeccc3280a8aee4d72e587e9d196b7b270e329":hex:"8a568086fdd9f01206a5aaee34d253bbc9339112d3170699b9a1392e97062d5d0f16240114dc1789269217c5b4b2974895b20903890f7dacfef46fa4a4d02891c70425ab3b42f53d72f852faf3713ac7b8207dc453279f4df345091b8bfeb54983095c2d190358293ba507bdfdc39b24"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-224,192+96,192,192) #14
depends_on:1
3:exp:1:hex:"56f3f5b08da10ead0c986dd2ae5553e4b2eeeb47ad5d22197b12b89b4a871c51c0d85554":hex:"96c8630a1f4187fb0794601cf51e7e333e71756a0421ff43":hex:"875e5bc9548917a82b6dc95200d92bf4218dba7ab316a5fe":hex:"4d3f5678b00d47bb9d0936486de60407eaf1282fda99f595":hex:"90969961ef9283b9e600aead7985455e692db817165189665f498f219b1e5f277e586b237851305d5205548b565faeb02bb7b5f477c80ba94b0563e24d9309d2957a675848140f5601f698459db5899b20dda68f000ccb18dcd39dfae49955b8478fd50bb59d772045beb338622efa5a"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #0
depends_on:1
3:exp:2:hex:"ca851911349384bffe89de1cbdc46e6831e44d34a4fb935ee285dd14b71a7488659ba96c601dc69fc902940805ec0ca8":hex:"":hex:"":hex:"":hex:"e528e9abf2dece54d47c7e75e5fe302149f817ea9fb4bee6f4199697d04d5b89d54fbb978a15b5c443c9ec21036d2460b6f73ebad0dc2aba6e624abf07745bc107694bb7547bb0995f70de25d6b29e2d3011bb19d27676c07162c8b5ccde0668961df86803482cb37ed6d5c0bb8d50cf1f50d476aa0458bdaba806f48be9dcb8"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #1
depends_on:1
3:exp:2:hex:"79737479ba4e7642a221fcfd1b820b134e9e3540a35bb48ffae29c20f5418ea33593259c092bef4129bc2c6c9e19f343":hex:"":hex:"":hex:"":hex:"cf5ad5984f9e43917aa9087380dac46e410ddc8a7731859c84e9d0f31bd43655b924159413e2293b17610f211e09f770f172b8fb693a35b85d3b9e5e63b1dc252ac0e115002e9bedfb4b5b6fd43f33b8e0eafb2d072e1a6fee1f159df9b51e6c8da737e60d5032dd30544ec51558c6f080bdbdab1de8a939e961e06b5f1aca37"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #2
depends_on:1
3:exp:2:hex:"b340907445b97a8b589264de4a17c0bea11bb53ad72f9f33297f05d2879d898d65cb27735d83c0708f72684ea58f7ee5":hex:"":hex:"":hex:"":hex:"75183aaaf3574bc68003352ad655d0e9ce9dd17552723b47fab0e84ef903694a32987eeddbdc48efd24195dbdac8a46ba2d972f5808f23a869e71343140361f58b243e62722088fe10a98e43372d252b144e00c89c215a76a121734bdc485486f65c0b16b8963524a3a70e6f38f169c12f6cbdd169dd48fe4421a235847a23ff"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #3
depends_on:1
3:exp:2:hex:"8e159f60060a7d6a7e6fe7c9f769c30b98acb1240b25e7ee33f1da834c0858e7c39d35052201bdcce4e127a04f04d644":hex:"":hex:"":hex:"":hex:"62910a77213967ea93d6457e255af51fc79d49629af2fccd81840cdfbb4910991f50a477cbd29edd8a47c4fec9d141f50dfde7c4d8fcab473eff3cc2ee9e7cc90871f180777a97841597b0dd7e779eff9784b9cc33689fd7d48c0dcd341515ac8fecf5c55a6327aea8d58f97220b7462373e84e3b7417a57e80ce946d6120db5"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #4
depends_on:1
3:exp:2:hex:"74755f196305f7fb6689b2fe6835dc1d81484fc481a6b8087f649a1952f4df6ac36387a544a5f2b78007651a7b74b749":hex:"":hex:"":hex:"":hex:"b2896f3af4375dab67e8062d82c1a005ef4ed119d13a9f18371b1b873774418684805fd659bfd69964f83a5cfe08667ddad672cafd16befffa9faed49865214f703951b443e6dca22edb636f3308380144b9333de4bcb0735710e4d9266786342fc53babe7bdbe3c01a3addb7f23c63ce2834729fabbd419b47beceb4a460236"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #5
depends_on:1
3:exp:2:hex:"4b222718f56a3260b3c2625a4cf80950b7d6c1250f170bd5c28b118abdf23b2f7aed52d0016fcaef0b6492bc40bbe0e9":hex:"":hex:"":hex:"":hex:"a6da029b3665cd39fd50a54c553f99fed3626f4902ffe322dc51f0670dfe8742ed48415cf04bbad5ed3b23b18b7892d170a7dcf3ef8052d5717cb0c1a8b3010d9a9ea5de70ae5356249c0e098946030c46d9d3d209864539444374d8fbcae068e1d6548fa59e6562e6b2d1acbda8da0318c23752ebc9be0c1c1c5b3cf66dd967"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #6
depends_on:1
3:exp:2:hex:"b512633f27fb182a076917e39888ba3ff35d23c3742eb8f3c635a044163768e0e2c39b84629a3de5c301db5643af1c21":hex:"":hex:"":hex:"":hex:"fb931d0d0194a97b48d5d4c231fdad5c61aedf1c3a55ac24983ecbf38487b1c93396c6b86ff3920cfa8c77e0146de835ea5809676e702dee6a78100da9aa43d8ec0bf5720befa71f82193205ac2ea403e8d7e0e6270b366dc4200be26afd9f63b7e79286a35c688c57cbff55ac747d4c28bb80a2b2097b3b62ea439950d75dff"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #7
depends_on:1
3:exp:2:hex:"aae3ffc8605a975befefcea0a7a286642bc3b95fb37bd0eb0585a4cabf8b3d1e9504c3c0c4310c1c0746a036c91d9034":hex:"":hex:"":hex:"":hex:"2819bd3b0d216dad59ddd6c354c4518153a2b04374b07c49e64a8e4d055575dfbc9a8fcde68bd257ff1ba5c6000564b46d6dd7ecd9c5d684fd757df62d85211575d3562d7814008ab5c8bc00e7b5a649eae2318665b55d762de36eba00c2906c0e0ec8706edb493e51ca5eb4b9f015dc932f262f52a86b11c41e9a6d5b3bd431"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #8
depends_on:1
3:exp:2:hex:"b9475210b79b87180e746df704b3cbc7bf8424750e416a7fbb5ce3ef25a82cc624baf03599c10df6ef44065d715a93f7":hex:"":hex:"":hex:"":hex:"ae12d784f796183c50db5a1a283aa35ed9a2b685dacea97c596ff8c294906d1b1305ba1f80254eb062b874a8dfffa3378c809ab2869aa51a4e6a489692284a25038908a347342175c38401193b8afc498077e10522bec5c70882b7f760ea5946870bd9fc72961eedbe8bff4fd58c7cc1589bb4f369ed0d3bf26c5bbc62e0b2b2"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #9
depends_on:1
3:exp:2:hex:"27838eb44ceccb4e36210703ebf38f659bc39dd3277cd76b7a9bcd6bc964b62839cfe0210db2e7b0eb52a387476e7ea1":hex:"":hex:"":hex:"":hex:"e5e72a53605d2aaa67832f97536445ab774dd9bff7f13a0d11fd27bf6593bfb52309f2d4f09d147192199ea584503181de87002f4ee085c7dc18bf32ce5315647a3708e6f404d6588c92b2dda599c131aa350d18c747b33dc8eda15cf40e95263d1231e1b4b68f8d829f86054d49cfdb1b8d96ab0465110569c8583a424a099a"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #10
depends_on:1
3:exp:2:hex:"d7129e4f47008ad60c9b5d081ff4ca8eb821a6e4deb91608bf4e2647835373a5a72882773f78c2fc4878295840a53012":hex:"":hex:"":hex:"":hex:"0cbf48585c5de9183b7ff76557f8fc9ebcfdfde07e588a8641156f61b7952725bbee954f87e9b937513b16bba0f2e523d095114658e00f0f3772175acfcb3240a01de631c19c5a834c94cc58d04a6837f0d2782fa53d2f9f65178ee9c837222494c799e64c60406069bd319549b889fa00a0032dd7ba5b1cc9edbf58de82bfcd"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #11
depends_on:1
3:exp:2:hex:"67fe5e300c513371976c80de4b20d4473889c9f1214bce718bc32d1da3ab7532e256d88497738a33923aa003a8d7845c":hex:"":hex:"":hex:"":hex:"b44660d64ef7bcebc7a1ab71f8407a02285c7592d755ae6766059e894f694373ed9c776c0cfc8594413eefb400ed427e158d687e28da3ecc205e0f7370fb089676bbb0fa591ec8d916c3d5f18a3eb4a417120705f3e2198154cd60648dbfcfc901242e15711cacd501b2c2826abe870ba32da785ed6f1fdc68f203d1ab43a64f"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #12
depends_on:1
3:exp:2:hex:"de8142541255c46d66efc6173b0fe3ffaf5936c897a3ce2e9d5835616aafa2cbd01f9002c407127bc3297a561d89b81d":hex:"":hex:"":hex:"":hex:"64d1020929d74716446d8a4e17205d0756b5264867811aa24d0d0da8644db25d5cde474143c57d12482f6bf0f31d10af9d1da4eb6d701bdd605a8db74fb4e77f79aaa9e450afda50b18d19fae68f03db1d7b5f1738d2fdce9ad3ee9461b58ee242daf7a1d72c45c9213eca34e14810a9fca5208d5c56d8066bab1586f1513de7"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #13
depends_on:1
3:exp:2:hex:"4a8e0bd90bdb12f7748ad5f147b115d7385bb1b06aee7d8b76136a25d779bcb77f3cce4af8c8ce3c45bdf23c6b181a00":hex:"":hex:"":hex:"":hex:"320c7ca4bbeb7af977bc054f604b5086a3f237aa5501658112f3e7a33d2231f5536d2c85c1dad9d9b0bf7f619c81be4854661626839c8c10ae7fdc0c0b571be34b58d66da553676167b00e7d8e49f416aacb2926c6eb2c66ec98bffae20864cf92496db15e3b09e530b7b9648be8d3916b3c20a3a779bec7d66da63396849aaf"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,0) #14
depends_on:1
3:exp:2:hex:"451ed024bc4b95f1025b14ec3616f5e42e80824541dc795a2f07500f92adc6652f28e6ee8de5879db1eccd58c994e5f0":hex:"":hex:"":hex:"":hex:"3fb637085ab75f4e95655faae95885166a5fbb423bb03dbf0543be063bcd48799c4f05d4e522634d9275fe02e1edd920e26d9accd43709cb0d8f6e50aa54a5f3bdd618be23cf73ef736ed0ef7524b0d14d5bef8c8aec1cf1ed3e1c38a808b35e61a44078127c7cb3a8fd7addfa50fcf3ff3bc6d6bc355d5436fe9b71eb44f7fd"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #0
depends_on:1
3:exp:2:hex:"d3cc4d1acf3dde0c4bd2290d262337042dc632948223d3a2eaab87da44295fbd0109b0e729f457328aa18569a9224921":hex:"":hex:"3c311848183c9a212a26f27f8c6647e40375e466a0857cc39c4e47575d53f1f6":hex:"fcb9abd19ccfbccef88c9c39bfb3dd7b1c12266c9808992e305bc3cff566e4e4":hex:"9c7b758b212cd0fcecd5daa489821712e3cdea4467b560ef5ddc24ab47749a1f1ffdbbb118f4e62fcfca3371b8fbfc5b0646b83e06bfbbab5fac30ea09ea2bc76f1ea568c9be0444b2cc90517b20ca825f2d0eccd88e7175538b85d90ab390183ca6395535d34473af6b5a5b88f5a59ee7561573337ea819da0dcc3573a22974"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #1
depends_on:1
3:exp:2:hex:"f97a3cfd91faa046b9e61b9493d436c4931f604b22f1081521b3419151e8ff0611f3a7d43595357d58120bd1e2dd8aed":hex:"":hex:"517289afe444a0fe5ed1a41dbbb5eb17150079bdd31e29cf2ff30034d8268e3b":hex:"88028d29ef80b4e6f0fe12f91d7449fe75062682e89c571440c0c9b52c42a6e0":hex:"c6871cff0824fe55ea7689a52229886730450e5d362da5bf590dcf9acd67fed4cb32107df5d03969a66b1f6494fdf5d63d5b4d0d34ea7399a07d0116126d0d518c7c55ba46e12f62efc8fe28a51c9d428e6d371d7397ab319fc73ded4722e5b4f30004032a6128df5e7497ecf82ca7b0a50e867ef6728a4f509a8c859087039c"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #2
depends_on:1
3:exp:2:hex:"0f2f23d64f481cabec7abb01db3aabf125c3173a044b9bf26844300b69dcac8b9a5ae13232b43aa19cfe8d7958b4b590":hex:"":hex:"ec4c7a62acab73385f567da10e892ff395a0929f959231a5628188ce0c26e818":hex:"6b97b8c6b6bb8935e676c410c17caa8042aa3145f856d0a32b641e4ae5298648":hex:"7480a361058bd9afa3db82c9d7586e42269102013f6ec5c269b6d05f17987847748684766b44918fd4b65e1648622fc0e0954178b0279dfc9fa99b66c6f53e51c4860131e9e0644287a4afe4ca8e480417e070db68008a97c3397e4b320b5d1a1d7e1d18a95cfedd7d1e74997052bf649d132deb9ec53aae7dafdab55e6dae93"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #3
depends_on:1
3:exp:2:hex:"53c56660c78481be9c63284e005fcc14fbc7fb27732c9bf1366d01a426765a31dc7a14d0eb5b0b3534e717a0b3c64614":hex:"":hex:"3aa848706ecb877f5bedf4ffc332d57c22e08747a47e75cff6f0fd1316861c95":hex:"9a401afa739b8f752fddacd291e0b854f5eff4a55b515e20cb319852189d3722":hex:"5c0eb420e0bf41ce9323e815310e4e8303cd677a8a8b023f31f0d79f0ca15aeb636099a369fd074d69889865eac1b72ab3cbfebdb8cf460b00072802e2ec648b1349a5303be4ccaadd729f1a9ea17482fd026aaeb93f1602bc1404b9853adde40d6c34b844cf148bc088941ecfc1642c8c0b9778e45f3b07e06e21ee2c9e0300"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #4
depends_on:1
3:exp:2:hex:"f63c804404902db334c54bb298fc271a21d7acd9f770278e089775710bf4fdd73e45009ea9cb2a36ba1aa4bf39178200":hex:"":hex:"d165a13dc8cc43f3f0952c3f5d3de4136954d983683d4a3e6d2dc4c89bf23423":hex:"75106bc86d0336df85097f6af8e80e2da59046a03fa65b06706b8bbc7ffc6785":hex:"6363139bba32c22a0f5cd23ca6d437b5669b7d432f786b8af445471bee0b2d24c9d5f2f93717cbe00d1f010cc3b9c515fc9f7336d53d4d26ba5c0d76a90186663c8582eb739c7b6578a3328bf68dc2cec2cd89b3a90201f6993adcc854df0f5c6974d0f5570765a15fe03dbce28942dd2fd16ba2027e68abac83926969349af8"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #5
depends_on:1
3:exp:2:hex:"2aaca9147da66c176615726b69e3e851cc3537f5f279fe7344233d8e44cfc99d4e171f080af9a6081bee9f183ac9e340":hex:"":hex:"d75a2a6eb66c3833e50f5ec3d2e434cf791448d618026d0c360806d120ded669":hex:"b643b74c15b37612e6577ed7ca2a4c67a78d560af9eb50a4108fca742e87b8d6":hex:"501dcdc977f4ba856f24eaa4968b374bebb3166b280334cb510232c31ebffde10fa47b7840ef3fe3b77725c2272d3a1d4219baf23e0290c622271edcced58838cf428f0517425d2e19e0d8c89377eecfc378245f283236fafa466c914b99672ceafab369e8889a0c866d8bd639db9fb797254262c6fd44cfa9045ad6340a60ef"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #6
depends_on:1
3:exp:2:hex:"a2e4cd48a5cf918d6f55942d95fcb4e8465cdc4f77b7c52b6fae5b16a25ca306bef036716440db6e6d333d9d760b7ca8":hex:"":hex:"bfa591c7287f3f931168f95e38869441d1f9a11035ad8ea625bb61b9ea17591c":hex:"c00c735463bca215adc372cb892b05e939bf669583341c06d4e31d0e5b363a37":hex:"e7d136af69926a5421d4266ee0420fd729f2a4f7c295d3c966bdfa05268180b508b8a2852d1b3a06fd2ab3e13c54005123ef319f42d0c6d3a575e6e7e1496cb28aacadbcf83740fba8f35fcee04bb2ed8a51db3d3362b01094a62fb57e33c99a432f29fce6676cffbbcc05107e794e75e44a02d5e6d9d748c5fbff00a0178d65"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #7
depends_on:1
3:exp:2:hex:"95a67771cba69011a79776e713145d309edae56fad5fd6d41d83eaff89df6e5ebe5b5164e31ecc51ba6f7c3c5199eb33":hex:"":hex:"065f693b229a7c4fd373cd15b3807552dd9bf98c5485cef361949d4e7d774b53":hex:"9afb62406f0e812c4f156d58b19a656c904813c1b4a45a0029ae7f50731f8014":hex:"f61b61a6e79a41183e8ed6647899d2dc85cdaf5c3abf5c7f3bf37685946dc28f4923dc842f2d4326bd6ce0d50a84cb3ba869d72a36e246910eba6512ba36cd7ed3a5437c9245b00a344308c792b668b458d3c3e16dee2fbec41867da31084d46d8ec168de2148ef64fc5b72069abf5a6ada1ead2b7146bb793ff1c9c3690fa56"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #8
depends_on:1
3:exp:2:hex:"a459e1815cbca4514ec8094d5ab2414a557ba6fe10e613c345338d0521e4bf9062221392e2552e76cd0d36df6e6068eb":hex:"":hex:"0a3642b02b23b3ef62c701a63401124022f5b896de86dab6e6c7451497aa1dcc":hex:"c80514865901371c45ba92d9f95d50bb7c9dd1768cb3dfbc45b968da94965c6e":hex:"464e6977b8adaef307c9623e41c357013249c9ffd77f405f3925cebb69f151ce8fbb6a277164002aee7858fc224f6499042aa1e6322deee9a5d133c31d640e12a7487c731ba03ad866a24675badb1d79220c40be689f79c2a0be93cb4dada3e0eac4ab140cb91998b6f11953e68f2319b050c40f71c34de9905ae41b2de1c2f6"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #9
depends_on:1
3:exp:2:hex:"252c2cad613e002478162861880979ee4e323025eebb6fb2e0aa9f200e28e0a1d001bc9a8f2c8c242e4369df0c191989":hex:"":hex:"9bcfc61cb2bc000034bb3db980eb47c76fb5ecdd40553eff113368d639b947fd":hex:"8b0565c767c2610ee0014582e9fbecb96e173005b60e9581503a6dca5637a26e":hex:"e96c15fe8a60692b0a7d67171e0195ff6e1c87aab844221e71700d1bbee75feea695f6a740c9760bbe0e812ecf4061d8f0955bc0195e18c4fd1516ebca50ba6a6db86881737dbab8321707675479b87611db6af2c97ea361a5484555ead454defb1a64335de964fc803d40f3a6f057893d2afc25725754f4f00abc51920743dc"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #10
depends_on:1
3:exp:2:hex:"8be0ca6adc8b3870c9d69d6021bc1f1d8eb9e649073d35ee6c5aa0b7e56ad8a59d1265f7d51fdb65377f1e6edd6ae0e4":hex:"":hex:"da86167ac997c406bb7979f423986a84ec6614d6caa7afc10aff0699a9b2cf7f":hex:"e4baa3c555950b53e2bfdba480cb4c94b59381bac1e33947e0c22e838a9534cf":hex:"64384ecc4ea6b458efc227ca697eac5510092265520c0a0d8a0ccf9ed3ca9d58074671188c6a7ad16d0b050cdc072c125d7298d3a31d9f044a9ee40da0089a84fea28cc7f05f1716db952fad29a0e779635cb7a912a959be67be2f0a4170aace2981802e2ff6467e5b46f0ffbff3b42ba5935fd553c82482ac266acf1cd247d7"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #11
depends_on:1
3:exp:2:hex:"d43a75b6adf26d60322284cb12ac38327792442aa8f040f60a2f331b33ac4a8f0682f8b091f811afacaacaec9b04d279":hex:"":hex:"7fd3b8f512940da7de5d80199d9a7b42670c04a945775a3dba869546cbb9bc65":hex:"2575db20bc7aafc2a90a5dabab760db851d754777bc9f05616af1858b24ff3da":hex:"0da7a8dc73c163014bf0841913d3067806456bbca6d5de92b85534c6545467313648d71ef17c923d090dc92cff8d4d1a9a2bb63e001dc2e8ab1a597999be3d6cf70ff63fee9985801395fbd4f4990430c4259fcae4fa1fcd73dc3187ccc102d04af7c07532885e5a226fc42809c48f22eecf4f6ab996ae4fcb144786957d9f41"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #12
depends_on:1
3:exp:2:hex:"64352f236af5d32067a529a8fd05ba00a338c9de306371a0b00c36e610a48d18df99ed2c7608c870624b962a5dc68acd":hex:"":hex:"da416335e7aaf60cf3d06fb438735ce796aad09034f8969c8f8c3f81e32fef24":hex:"a28c07c21a2297311adf172c19e83ca0a87731bdffb80548978d2d1cd82cf8a3":hex:"132b9f25868729e3853d3c51f99a3b5fae6d4204bea70890daf62e042b776a526c8fb831b80a6d5d3f153237df1fd39b6fd9137963f5516d9cdd4e3f9195c46e9972c15d3edc6606e3368bde1594977fb88d0ca6e6f5f3d057ccadc7d7dab77dfc42658a1e972aa446b20d418286386a52dfc1c714d2ac548713268b0b709729"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #13
depends_on:1
3:exp:2:hex:"282f4d2e05a2cd30e9087f5633089389449f04bac11df718c90bb351cd3653a590a7daf3c0de9ea286081efc4a684dfb":hex:"":hex:"2630b4ccc7271cc379cb580b0aaede3d3aa8c1c7ba002cf791f0752c3d739007":hex:"c31d69de499f1017be44e3d4fa77ecebc6a9b9934749fcf136f267b29115d2cc":hex:"c899094520e0197c37b91dd50778e20a5b950decfb308d39f1db709447ae48f6101d9abe63a783fbb830eec1d359a5f61a2013728966d349213ee96382614aa4135058a967627183810c6622a2158cababe3b8ab99169c89e362108bf5955b4ffc47440f87e4bad0d36bc738e737e072e64d8842e7619f1be0af1141f05afe2d"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,0,256) #14
depends_on:1
3:exp:2:hex:"13c752b9e745ce77bbc7c0dbda982313d3fe66f903e83ebd8dbe4ff0c11380e9f1a533095d6174164bd7c82532464ae7":hex:"":hex:"4f53db89b9ba7fc00767bc751fb8f3c103fe0f76acd6d5c7891ab15b2b7cf67c":hex:"582c2a7d34679088cca6bd28723c99aac07db46c332dc0153d1673256903b446":hex:"6311f4c0c4cd1f86bd48349abb9eb930d4f63df5e5f7217d1d1b91a71d8a6938b0ad2b3e897bd7e3d8703db125fab30e03464fad41e5ddf5bf9aeeb5161b244468cfb26a9d956931a5412c97d64188b0da1bd907819c686f39af82e91cfeef0cbffb5d1e229e383bed26d06412988640706815a6e820796876f416653e464961"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #0
depends_on:1
3:exp:2:hex:"5cacc68165a2e2ee20812f35ec73a79dbf30fd475476ac0c44fc6174cdac2b556f885496c1e63af620becd9e71ecb824":hex:"e72dd8590d4ed5295515c35ed6199e9d211b8f069b3058caa6670b96ef1208d0":hex:"":hex:"":hex:"f1012cf543f94533df27fedfbf58e5b79a3dc517a9c402bdbfc9a0c0f721f9d53faf4aafdc4b8f7a1b580fcaa52338d4bd95f58966a243cdcd3f446ed4bc546d9f607b190dd69954450d16cd0e2d6437067d8b44d19a6af7a7cfa8794e5fbd728e8fb2f2e8db5dd4ff1aa275f35886098e80ff844886060da8b1e7137846b23b"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #1
depends_on:1
3:exp:2:hex:"8df013b4d103523073917ddf6a869793059e9943fc8654549e7ab22f7c29f122da2625af2ddd4abcce3cf4fa4659d84e":hex:"b571e66d7c338bc07b76ad3757bb2f9452bf7e07437ae8581ce7bc7c3ac651a9":hex:"":hex:"":hex:"b91cba4cc84fa25df8610b81b641402768a2097234932e37d590b1154cbd23f97452e310e291c45146147f0da2d81761fe90fba64f94419c0f662b28c1ed94da487bb7e73eec798fbcf981b791d1be4f177a8907aa3c401643a5b62b87b89d66b3a60e40d4a8e4e9d82af6d2700e6f535cdb51f75c321729103741030ccc3a56"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #2
depends_on:1
3:exp:2:hex:"565b2b77937ba46536b0f693b3d5e4a8a24563f9ef1f676e8b5b2ef17823832f4ef3064ec29f5b7f9686d75a23d170e3":hex:"3b722433226c9dba745087270ab3af2c909425ba6d39f5ce46f07256068319d9":hex:"":hex:"":hex:"d144ee7f8363d128872f82c15663fe658413cd42651098e0a7c51a970de75287ec943f9061e902280a5a9e183a7817a44222d198fbfab184881431b4adf35d3d1019da5a90b3696b2349c8fba15a56d0f9d010a88e3f9eeedb67a69bcaa71281b41afa11af576b765e66858f0eb2e4ec4081609ec81da81df0a0eb06787340ea"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #3
depends_on:1
3:exp:2:hex:"fc3832a91b1dcdcaa944f2d93cbceb85c267c491b7b59d017cde4add79a836b6d5e76ce9eabafed06e33a913e395c5e0":hex:"ffc5f6eefd51da64a0f67b5f0cf60d7ab43fc7836bca650022a0cee57a43c148":hex:"":hex:"":hex:"0e713c6cc9a4dbd4249201d12b7bf5c69c3e18eb504bf3252db2f43675e17d99b6a908400cea304011c2e54166dae1f20260008efe4e06a87e0ce525ca482bca223a902a14adcf2374a739a5dfeaf14cadd72efa4d55d15154c974d9521535bcb70658c5b6c944020afb04a87b223b4b8e5d89821704a9985bb010405ba8f3d4"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #4
depends_on:1
3:exp:2:hex:"8009eb2cb49fdf16403bcdfd4a9f952191062acb9cc111eca019f957fb9f4451355598866952394b1eddd85d59f81c9d":hex:"09ff1d4b97d83b223d002e05f754be480d13ba968e5aac306d71cc9fc49cc2dd":hex:"":hex:"":hex:"9550903c2f02cf77c8f9c9a37041d0040ee1e3ef65ba1a1fbbcf44fb7a2172bd6b3aaabe850281c3a1778277bacd09614dfefececac64338ae24a1bf150cbf9d9541173a82ecba08aa19b75abb779eb10efa4257d5252e8afcac414bc3bb5d3006b6f36fb9daea4c8c359ef6cdbeff27c1068571dd3c89dc87eda9190086888d"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #5
depends_on:1
3:exp:2:hex:"a6e4c9a8bd6da23b9c2b10a7748fd08c4f782fadbac7ea501c17efdc6f6087bdacdc47edf1d3b21d0aec7631abb6d7d5":hex:"c16ee0908a5886dccf332fbc61de9ec7b7972d2c4c83c477409ce8a15c623294":hex:"":hex:"":hex:"a52f93ccb363e2bdf0903622c3caedb7cffd04b726052b8d455744c71b76dee1b71db9880dc3c21850489cb29e412d7d80849cfa9151a151dcbf32a32b4a54cac01d3200200ed66a3a5e5c131a49655ffbf1a8824ff7f265690dffb4054df46a707b9213924c631c5bce379944c856c4f7846e281ac89c64fad3a49909dfb92b"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #6
depends_on:1
3:exp:2:hex:"59d6307460a9bdd392dfc0904973991d585696010a71e52d590a5039b4849fa434a0aafb95917cbf8c38fc5548373c05":hex:"0407b7c57bc11361747c3d67526c36e228028a5d0b145d66ab9a2fe4b07507a0":hex:"":hex:"":hex:"299aba0661315211b09d2861855d0b4b125ab24649461341af6abd903ed6f025223b3299f2126fcad44c675166d800619cf49540946b12138989417904324b0ddad121327211a297f11259c9c34ce4c70c322a653675f78d385e4e2443f8058d141195e17e0bd1b9d44bf3e48c376e6eb44ef020b11cf03eb141c46ecb43cf3d"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #7
depends_on:1
3:exp:2:hex:"9ae3506aadbc8358696ba1ba17e876e1157b7048235921503d36d9211b4303429abf7d66afee5d2b811cba358bbc527d":hex:"0d645f6238e9ceb038e4af9772426ca110c5be052f8673b8b5a65c4e53d2f519":hex:"":hex:"":hex:"5f032c7fec6320fe423b6f38085cbad59d826085afe915247b3d546c4c6b174554dd4877c0d671de9554b505393a44e71f209b70f991ac8aa6e08f983fff2a4c817b0cd26c12b2c929378506489a75b2025b358cb5d0400821e7e252ac6376cd94a40c911a7ed8b6087e3de5fa39fa6b314c3ba1c593b864ce4ff281a97c325b"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #8
depends_on:1
3:exp:2:hex:"96ae3b8775b36da2a29b889ad878941f43c7d51295d47440cd0e3c49991931091fe022a6fc0237b055d4d6a7036b18d5":hex:"1e40e97362d0a823d3964c26b81ab53825c56446c5261689011886f19b08e5c2":hex:"":hex:"":hex:"e707cd14b06ce1e6dbcceaedbf08d88891b03f44ad6a797bd12fdeb557d0151df9346a028dec004844ca46adec3051dafb345895fa9f4604d8a13c8ff66ae093fa63c4d9c0816d55a0066d31e8404c841e87b6b2c7b5ae9d7afb6840c2f7b441bf2d3d8bd3f40349c1c014347c1979213c76103e0bece26ad7720601eff42275"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #9
depends_on:1
3:exp:2:hex:"33f5120396336e51ee3b0b619b5f873db05ca57cda86aeae2964f51480d149926f1f6e9807ba5393edcf3cb4e4bb6113":hex:"3709605af44d90196867c927512aa8ba31837063337b4879408d91a05c8efa9f":hex:"":hex:"":hex:"8b8291126ded9acef12516025c99ccce225d844308b584b872c903c7bc6467599a1cead003dc4c70f6d519f5b51ce0da57f53da90dbe8f666a1a1dde297727fee2d44cebd1301fc1ca75956a3fcae0d374e0df6009b668fd21638d2b733e6902d22d5bfb4af1b455975e08eef0ebe4dc87705801e7776583c8de11672729f723"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #10
depends_on:1
3:exp:2:hex:"ad300b799005f290fee7f930eebce158b98fb6cb449987fe433f955456b3530006aa2514e4bd114edf7ac105cfef2772":hex:"87ada711465e4169da2a74c931afb9b5a5b190d07b7af342aa99570401c3ee8a":hex:"":hex:"":hex:"80d7c606ff49415a3a92ba1f2943235c01339c8f9cd0b0511fbfdf3ef23c42ffff008524193faaa4b7f2f2eb0cfa221d9df89bd373fe4e158ec06fad3ecf1eb48b8239b0bb826ee69d773883a3e8edac66254610ff70b6609836860e39ea1f3bfa04596fee1f2baca6cebb244774c6c3eb4af1f02899eba8f4188f91776de16f"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #11
depends_on:1
3:exp:2:hex:"130b044e2c15ab89375e54b72e7baae6d4cad734b013a090f4df057e634f6ff065fd6ac602cd44107d705dbc066e52b6":hex:"f374aba16f34d54aae5e494505b67d3818ef1c08ea24967a76876d4361379aec":hex:"":hex:"":hex:"5d179534fb0dba3526993ed8e27ec9f915183d967336bb24352c67f4ab5d7935d3168e57008da851515efbaecb69904b6d899d3bfa6e9805659aef2942c4903875b8fcbc0d1d24d1c075f0ff667c1fc240d8b410dff582fa71fa30878955ce2ed786ef32ef852706e62439b69921f26e84e0f54f62b938f04905f05fcd7c2204"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #12
depends_on:1
3:exp:2:hex:"716430e999964b35459c17921fe5f60e09bd9ab234cb8f4ba4932bec4a60a1d59533b711e061b07d505da707cafbca03":hex:"372ae616d1a1fc45c5aecad0939c49b9e01c93bfb40c835eebd837af747f079d":hex:"":hex:"":hex:"a80d6a1b2d0ce01fe0d26e70fb73da20d45841cf01bfbd50b90d2751a46114c0e758cb787d281a0a9cf62f5c8ce2ee7ca74fefff330efe74926acca6d6f0646e4e3c1a1e52fce1d57b88beda4a5815896f25f38a652cc240deb582921c8b1d03a1da966dd04c2e7eee274df2cd1837096b9f7a0d89a82434076bc30173229a60"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #13
depends_on:1
3:exp:2:hex:"7679f154296e6d580854826539003a82d1c54e2e062c619d00da6c6ac820789b55d12941b0896462e7d888e5322a99a3":hex:"ba4d1ed696f58ef64596c76cee87cc1ca83069a79e7982b9a06f9d62f4209faf":hex:"":hex:"":hex:"10dc7cd2bb68c2c28f76d1b04ae2aa287071e04c3b688e1986b05cc1209f691daa55868ebb05b633c75a40a32b49663185fe5bb8f906008347ef51590530948b87613920014802e5864e0758f012e1eae31f0c4c031ef823aecfb2f8a73aaa946fc507037f9050b277bdeaa023123f9d22da1606e82cb7e56de34bf009eccb46"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,0) #14
depends_on:1
3:exp:2:hex:"8ca4a964e1ff68753db86753d09222e09b888b500be46f2a3830afa9172a1d6da59394e0af764e2f21cf751f623ffa6c":hex:"eb8164b3bf6c1750a8de8528af16cffdf400856d82260acd5958894a98afeed5":hex:"":hex:"":hex:"fc5701b508f0264f4fdb88414768e1afb0a5b445400dcfdeddd0eba67b4fea8c056d79a69fd050759fb3d626b29adb8438326fd583f1ba0475ce7707bd294ab01743d077605866425b1cbd0f6c7bba972b30fbe9fce0a719b044fcc1394354895a9f8304a2b5101909808ddfdf66df6237142b6566588e4e1e8949b90c27fc1f"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #0
depends_on:1
3:exp:2:hex:"5d3286bc53a258a53ba781e2c4dcd79a790e43bbe0e89fb3eed39086be34174bc5422294b7318952ace7055ab7570abf":hex:"2dba094d008e150d51c4135bb2f03dcde9cbf3468a12908a1b025c120c985b9d":hex:"793a7ef8f6f0482beac542bb785c10f8b7b406a4de92667ab168ecc2cf7573c6":hex:"2238cdb4e23d629fe0c2a83dd8d5144ce1a6229ef41dabe2a99ff722e510b530":hex:"d04678198ae7e1aeb435b45291458ffde0891560748b43330eaf866b5a6385e74c6fa5a5a44bdb284d436e98d244018d6acedcdfa2e9f499d8089e4db86ae89a6ab2d19cb705e2f048f97fb597f04106a1fa6a1416ad3d859118e079a0c319eb95686f4cbcce3b5101c7a0b010ef029c4ef6d06cdfac97efb9773891688c37cf"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #1
depends_on:1
3:exp:2:hex:"c2a566a9a1817b15c5c3b778177ac87c24e797be0a845f11c2fe399dd37732f2cb1894eb2b97b3c56e628329516f86ec":hex:"13ce4d8dd2db9796f94156c8e8f0769b0aa1c82c1323b61536603bca37c9ee29":hex:"413dd83fe56835abd478cb9693d67635901c40239a266462d3133b83e49c820b":hex:"d5c4a71f9d6d95a1bedf0bd2247c277d1f84a4e57a4a8825b82a2d097de63ef1":hex:"b3a3698d777699a0dd9fa3f0a9fa57832d3cefac5df24437c6d73a0fe41040f1729038aef1e926352ea59de120bfb7b073183a34106efed6278ff8ad844ba0448115dfddf3319a82de6bb11d80bd871a9acd35c73645e1270fb9fe4fa88ec0e465409ea0cba809fe2f45e04943a2e396bbb7dd2f4e0795303524cc9cc5ea54a1"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #2
depends_on:1
3:exp:2:hex:"a33288a96f41dd54b945e060c8bd0c094f1e28267cc1dcbba52063c1a9d54c4d36918c977e1a7276a2bb475591c367b7":hex:"6aa528c940962638dc2201738850fd1fe6f5d0eb9f687ff1af39d9c7b36830d9":hex:"37ee633a635e43af59abdb1762c7ea45bfe060ec1d9077ecd2a43a658673f3c7":hex:"2eb96f2e28fa9f674bb03ade703b8f791ee5356e2ee85c7ed5bda96325256c61":hex:"db2f91932767eb846961ce5321c7003431870508e8c6f8d432ca1f9cee5cdc1aed6e0f133d317eb6990c4b3b0a360cdfb5b43a6e712bd46bca04c414868fab22c6a49c4b89c812697c3a7fbfc8ddf10c8aa5ebf13a09fd114eb2a02a07f69786f3ce7fd30231f22779bc8db103b13fa546dbc45a89a86275281172761683d384"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #3
depends_on:1
3:exp:2:hex:"5f37b6e47e1776e735adc03d4b999879477ff4a206231924033d94c0114f911b7d12d62c79c9f6234ae0314156947459":hex:"92d4d9fab5f8bf5119f2663a9df7334f50dcde74fb9d7732f7eba56501e60d54":hex:"c9aef0d7a9ba7345d08b6d5b5ce5645c7495b8685e6b93846ffcf470f5abd40d":hex:"50d9d1f5074f7d9f1a24a9c63aa47b94da5ba78db1b0f18e4d4fe45c6875813c":hex:"20d942bbd7d98700faa37e94d53bf74f2d6bd1d8c95c0b88d842c4857797d59e7c8788aeeac29740122f208f703bf35dc32b0035db0648384feb6aa17a3274bc09b2d2b746c5a06fd82f4469fb86131a49482cb7be7d9b4b95042394cfb18b13f333ec0fe5c227bf1d8f33ecb2e42e358b6c3e034cb585331bd1d27f638029b9"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #4
depends_on:1
3:exp:2:hex:"2311c5afd64c584484b2729e84db80c0b4063fe9ca7edc83350488d7e67264a06a6dfd975a0dc7b72df1f107c4b3b3a6":hex:"2abd870ec5fe26ed14dfa57a3309f920131b70580c3639af2645cd1af93db1b1":hex:"c6e532a3b25653b6002aed5269cc2118749306e736bde039d4d569d4f967773f":hex:"5e7d26c4da769c373092b2b4f72b109fe34bdb7d169ea38f78ebae5df4a15759":hex:"cacaeb1b4ac2305d8714eb50cbe1c67c5a2c0bbc7938fdfdcafef7c85fc40becbf777a4cfb6f14c6eee320943a493d2b0a744a6eb3c256ee9a3763037437df9adce3e2260f0c35e958af0edb5a81debd8bdaf2b8bb2b98b9186e5a222a21609ff58df4cbe1d4898d10d6e7c46f31f5cb1041bfd83a5fb27d5c56c961e91403fc"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #5
depends_on:1
3:exp:2:hex:"362ece9d330e1172a8f9e50258476d0c79c3ee50346524ba12d970ee3a6ef8c5cf11bcb4d9d51311ceacfca8705e833f":hex:"abb5a8edde02e526449284ecc31bc713383df3ed085f752e3b6a32f305861eed":hex:"746302ab1f4a86b17546bea762e929360f2e95c7788a63545a264ef997c8c65e":hex:"b907c5b2a8833a48e56e819228ce9a050b41b3309f5ca37bed720311d92b33af":hex:"73c7131a558350590053580873ef956ff952f2aa6ff1bea452e013d1bc2afddea2311756dbe756e63ba6258480c48f3f6c1319b5f572f67ca530af09e39413d1d432bea8f89206619618cb0e7c88e9f2033639d0eb0efc20616b64f940da99b88231984c3fb23f19e890576f555fde394dbd4351f17a7ffd5c369379001bda03"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #6
depends_on:1
3:exp:2:hex:"cf614bc29946bc0095f415e8bdeda10aab05392f9cc9187a86ea6ec95ee422e177fb5ec22dc0432cc13f4693e2e3bd9a":hex:"e4ce77914ffbc5fddf1fb51edfafdc196109139b84c741354135ec8d314c7c43":hex:"e1e83ee1205acaf6164dc287aec08e5b32789e5be818078db39e53cad589db51":hex:"4e20c0226d5e1e7e805679f03f72452b5bea2d0ba41e0c12329bf60eb3016dd1":hex:"838fdf1418a746aa52ae4005d90c3fd301f648c5770ffef2a9f3912e37a93850cc4b8bfcce910aead0cb75958823b1a62e283901c5e4a3980e4ea36257458e2e4953555819b8852a26489b1d74821f80c9908469b43f124ff7ea62497c36159a47353098a1b9ec32e54800d6704371cc37f357ad74aacc203e9b6db97f94d0c4"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #7
depends_on:1
3:exp:2:hex:"a8da1d3e233f393fd44d204c200202f7d01896e72c5ac652940cfd15b5d4b0bd0a112b4cb0890af0a495e0f49fcf6874":hex:"d2e32799bc822b8d033299bdf63dc35774f7649e935d25be5b10512c430d1bda":hex:"920a82d76fcd2cd106ada64bba232b7b2344f3afe6b1d1d20ee8795144571009":hex:"eeaac5878275372025f8231febed64db6a11273c3c00d625fc80a95f18ad7d3f":hex:"5f6dae489b53d89027b2cc333c700f090152d77b3eaf01d47f56ce6eca9893ef877b4cb560fab0fbdb34e3d1c6cd8480b33c053d2661a10aa531df4961b97d659c7492584236582b3fe701055efa59c328194cd1e07fcffd910d9ee01b7b9e8c8fda7f7ac01a8e203b8b26eb8078a9b9a5021562c44af24089e3ef84c1d5a6bd"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #8
depends_on:1
3:exp:2:hex:"a77b1ed4ecaa650374e1052c405f1d88881c25c87d13dbe1334d8c1a847fa76b05c143e2f145db216fe7be9ed23635d0":hex:"b5c750968ff09ed251d4a1c05342ac843db5246b19045728a634fa4f6e752e54":hex:"ff5937bcd01a363696bf8e40adc8e4ab3e56dbf7e7d09451c99e538785fe6697":hex:"4acb34eea8266badcf8f6557a0eecf3eb4d7a295c876d6175598cb66a388efb8":hex:"ec13eadfcc84e77d2a2efa1a2cd8b1355587cb27feb3d19d75b37f0446333ddb8236e751c63b7a6e595ec24a25051a696dbe8c062dd8896d1446db228a2f10e8094ee07e7ee648ed6bebb2f5ec5aae24c9c640665c28355cc11c116795ecc070790f7fdfc4398900311b6695d5da0175091ed1828d2731085bfb4a20bd86cce0"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #9
depends_on:1
3:exp:2:hex:"491686c781e83eb4e21d9989e8d718100b0d21a2c56295888baef1a65f219651499085296d21065feabf3106101c8d6f":hex:"d208a72f9ae34f0817669fb04f49239dd31700f3dc9a93db8d75fb79f9b686c1":hex:"9ffc61893a293a864008fdd56d3292600d9e2ec8a1ea8f34ac5931e968905a23":hex:"4ff3a397dfdae0912032a302a5e7a07dceca8d9013a21545689319b7c024cd07":hex:"3c258ebf2203fca3b322ad1b016e21c7f5c148425f81e4fb0a0e462dce9dfa569c37a006527768297a5b68461b08912642a341b88c85597e30e7561206886098c4e2d861f11513f0ffdbbc78d3a2dd60c105abbb33c5e05ae27081b690fb8b3610917aa9bf1a4ad74481b5ff8334f14e5ad6a6a1eb2259476078076fb7e3a992"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #10
depends_on:1
3:exp:2:hex:"36a5267eeeb5a1a7d46de0f8f9281f73cd9611f01198fdaa78c5315205e5a177b66b5337970df36219321badacc624eb":hex:"c2a7b164949da102bece44a423197682ff97627d1fe9654266b8527f64e5b386":hex:"a977e2d8637b019c74063d163bb25387dc56f4eb40e502cefc5ae6ad26a6abdc":hex:"c5c9819557b1e7d8a86fa8c60be42993edc3ef539c13d9a51fb64b0de06e145e":hex:"b471711a4fc7ab7247e65d2c2fe49a50169187187b7978cd2fdb0f8318be3ec55fc68ed4577ad9b42cbb57100b5d35ac86c244c4c93a5b28c1a11c2dfe905d608ec7804dec5bb15cf8d79695534d5e13a6a7e18a887ec9cf184da0cbbc6267f3a952a769403bafcdbb559401be0d8b3300ea7258b4026fc892175efd55ba1a67"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #11
depends_on:1
3:exp:2:hex:"a76b0366df89e4073a6b6b9c04da1d6817ce26f1c4825cad4097bdf4d7b9445e773d3cc3290176773847869be528d1a4":hex:"1bfd3bcfb9287a5ad055d1b2b8615fa81c94ac24bc1c219a0f8de58789e0404a":hex:"edd879fa56f21d93029da875b683ce50f6fdc4c0da41da051d000eed2afefefa":hex:"f528ffd29160039260133ed9654589ce60e39e7f667c34f82cda65ddcf5fff14":hex:"39d1ff8848e74dd2cdc6b818ad69823878062116fdf1679942f892c7e191be1c4b6ea268ecdff001b22af0d510f30c2c25b90fc34927f46e3f45d36b0e1848b3a5d54c36c7c65ee7287d325dfbb51b56a438feb6650ce13df88bf06b87ac4a35d2a199ea888629fb0d83f82f0ea160dc79ed220d8ef195b9e80c542f60c2d320"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #12
depends_on:1
3:exp:2:hex:"46571e1df43e5e141235e2a9ec85bb0faf1dc0566031e14d41a2fbd0315653ecb60ef6a3347967519aabeaf748e4e991":hex:"759fd8593e3688b23c4a003b655311770d670789878570eb3b155a8e6c2d8c45":hex:"033128460b449e1accb0e9c54508759ddc2538bc64b51e6277553f0c60a02723":hex:"a5e4a717240bdeac18a0c0e231a11dc04a47d7550f342fa9a7a5ff334eb9327d":hex:"9d222df1d530ea7f8f2297a0c79d637da570b48042ecddded75956bba0f0e70b271ffa3c9a53bada6ee1b8a4203c22bfde82a5e2eb1b150f54c6483458569422c1a34a8997d42cc09750167a78bf52a0bd158397af9f83caabe689185c099bf0a9a4853dd3cf8b8e89efebb6a27dba873e65e9927741b22968f2875789b44e01"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #13
depends_on:1
3:exp:2:hex:"d63980e63bbe4ac08d2ac5646bf085b82c75995e3fdfc23bb9cc734cd85ca7d2d33ed1dcae13fb634ba08272d6697590":hex:"acd0da070072a5340c4f5f4395568e1a36374e074196ae87f3692ee40487e1df":hex:"f567677b5e12e26f3544be3da9314c88fc475bf84804a89a51f12b191392c02b":hex:"c01cc7873e93c86e2bfb8fc984cfc2eab5cc58eeef018fedb5cba5aedd386156":hex:"b133446f633bcb40724bbf9fa187c39a44b9c094a0a0d40e98977e5466dc2c9adf62a5f4551eeb6406a14658de8a0ed7487c3bf6277e811101284a941745ce16176acc875f1435e14161772fa84609e8123c53dd03cbb868030835c0d11d8d6aa04a1b6f908248b028997737f54735ec4ed7a81fc868199ffb61a779d9340334"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-256,256+128,256,256) #14
depends_on:1
3:exp:2:hex:"3d99f9b7ac3a2fbe9cf15d960bf41f5588fc4db1e0d2a5c9c0fe9059f03593fb411f504bb63a9b3afa7ffa1357bb48be":hex:"0bb5ebd55981a25ba69164da49fa92f2871fd3fc65eb30d0f0d0b8d798a4f8f2":hex:"288e948a551284eb3cb23e26299955c2fb8f063c132a92683c1615ecaed80f30":hex:"d975b22f79e34acf5db25a2a167ef60a10682dd9964e15533d75f7fa9efc5dcb":hex:"ee8d707eea9bc7080d58768c8c64a991606bb808600cafab834db8bc884f866941b4a7eb8d0334d876c0f1151bccc7ce8970593dad0c1809075ce6dbca54c4d4667227331eeac97f83ccb76901762f153c5e8562a8ccf12c8a1f2f480ec6f1975ac097a49770219107d4edea54fb5ee23a8403874929d073d7ef0526a647011a"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #0
depends_on:2:3
3:exp:3:hex:"a1dc2dfeda4f3a1124e0e75ebfbe5f98cac11018221dda3fdcf8f9125d68447abae5ea27166540515268a493a96b5187":hex:"":hex:"":hex:"":hex:"228293e59b1e4545a4ff9f232616fc5108a1128debd0f7c20ace837ca105cbf24c0dac1f9847dafd0d0500721ffad3c684a992d110a549a264d14a8911c50be8cd6a7e8fac783ad95b24f64fd8cc4c8b649eac2b15b363e30df79541a6b8a1caac238949b46643694c85e1d5fcbcd9aaae6260acee660b8a79bea48e079ceb6a5eaf4993a82c3f1b758d7c53e3094eeac63dc255be6dcdcc2b51e5ca45d2b20684a5a8fa5806b96f8461ebf51bc515a7dd8c5475c0e70f2fd0faf7869a99ab6c"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #1
depends_on:2:3
3:exp:3:hex:"067fa0e25d71ea392671c24f38ef782ab3587a7b3c77ea756f7bd496b445b7a3ce6acc722768ca0e03784b2217bc60e4":hex:"":hex:"":hex:"":hex:"16eaa49510ffad8cc21ec32858640a0d6f34cb03e8649022aa5c3f566b44e8ace7c3b056cf2a44b242de09ae21dba4275418933611875841b4f0944a8272848c5dc1aad685935e12511d5ee27e9162d4bb968afab53c4b338269c1c77da9d78617911ed4390cb20e88bf30b74fda66fe05df5537a759061d3ffd9231d811e8b34213f22ab0b0ddafff7749a40243a901c310776e09d2e529806d4d6f0655178953c16707519c3c19b9aaa0d09fb676a9d23525c8bc388053bfccfbc368e3eb04"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #2
depends_on:2:3
3:exp:3:hex:"9f76503e84727297bc7056c7af917a1c98baa725295457db4fcf54ed09af7f15f39c46142b85a67b4b323594b7e97bde":hex:"":hex:"":hex:"":hex:"7d6a8bc5a7f057ceed6109bfac2486f80f81373b6b31d062aa1fad6d9eda5874867b9ef007ba5a92ba8f3fca624bfd9f7ee5770bbeb0391394fef783c16a7f003c06e5469bab03445bb28a2111def415d162e40472d3e5ae628c5c63170bb19f741c79a5331c883c12bca429f518bf71b14683a071b6c6e1e55d8c7a0f3942bc12a103556c49ca173e498b3b4a15027145cdaeb195bc8a7e1aa82ebdf6ecd516481a4d21f400d0d71b5894545888fee8beed80d3251647947f5abc4735b47fd0"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #3
depends_on:2:3
3:exp:3:hex:"e242e5b3b49d87289fe02840dc742a2a6cd9490fe2cce581833dddb1edc0d103f987f5de5c68cd345c81b032ea55f36d":hex:"":hex:"":hex:"":hex:"3a858345dfaf00defdf6c83114b760ef53b131fbf14bcc4052cd948820eee78a11cbbd8f4baa308e1d187fced74cbf019c1080d9efffd93fda07df051433876d9900c1f9ad36ea1cb04989bb0c55fd6d01e46923f3bc8887ac00ebd4710212114165355361e240b04232df55a81add3fb363f0d4c9c5e3d313bc7caac7d49dca8517cedacf571fde9686ae93d901fb9b17097a638bb9899cfab0ebc9d1f8a43c2eed7c9f326a711d0f5b9cfc5166c9b561824cbd7775ec601ca712b3ddaaa05b"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #4
depends_on:2:3
3:exp:3:hex:"42cc17365f5ea5fd22bdc4ade715e293064d6794d82bed5b77c4c107a73de1f76d759e4b191ba01e0ed5dea788ab018d":hex:"":hex:"":hex:"":hex:"de06dee8c8fe453aa03ac2546c39f5cda12412864d52ed5cbd0d4905dd226746d50d1af9fd3e1d90de0f16295cb7f6f4d3271ef00564709df4b05eb9f8adc0f8e8522b05b9f32c37d8526813898b9f71db57fc8328e3b79144482e8aa55c83934d6e097e43ec6d0bc32edaf8c0e6ca449b2e8388b32b286e2d4f85266b0605fb99d1a647565c95ff7857bcab73662b7218719189d792514edca2b1d0cdcd9b6347e132ef4c323da24ad5afd5ed6f96d27b0f879288e962fa0baca3d5b72b5c70"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #5
depends_on:2:3
3:exp:3:hex:"d57024a230b825b241c206f7b55e2114461ecc9b75353f12ac1d9ad7e7871481fe401c320f74afdb07f566ea500b0628":hex:"":hex:"":hex:"":hex:"e8930bd55a0a5a6d83a9b3b2cde7085c2ae467ea4a2e65ca303697d492ca878bcb801769eb1b7ec564586ec8b36d350e192c4fbf03a98be0ddecf56d465914ba353ed7734d19a680fc4593d9234c4ac8c23b7dfa1e26b013f590cca43b9fef126121b4842496b11dea3ef5e981cb357341f03f92a546a62609236ded6f7d814456acc0596d555cbdc02cbd47dae2caa1897831ea464225922c6600a8bb92e711653067f83b21e1df054309858948c11a1399736fc8391c5b0fc35629abfa5650"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #6
depends_on:2:3
3:exp:3:hex:"059ded79125b2d56d9d52bcc950bf608d1a2373515dafcc81efb6588005a5722d8f5f4181f9f2a316c93fdfbadf50e75":hex:"":hex:"":hex:"":hex:"db65d2000632c3d7009c227e99c210e5897f4d7edae608a242b5a4f17708613f8c19a4dd65d6bc3ca57737c9bfdcca068288eea49440af768d1fc977c32b065bb71aa3d8c4d77c9e8e8a6166f332a247978a6c41ed253a1b68ad934a3416b40344a681de28638f00b0a0ffb75514c3f62253372f809906043de35e4805b8e962e5eb957f04212835f802b2c0b3e76c7cf239c89adf31909cd6224d542d929f9b20a10ab99a7c631e4e6188fe2ba8f552c9c88fdadb528679fe950431641b8f37"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #7
depends_on:2:3
3:exp:3:hex:"4630406b475b1263b6078e93e5d4282205958d94eb97d1e66b429fb69ec9fccd0dd9982c338df935e929c42fab66adaf":hex:"":hex:"":hex:"":hex:"5d80ec072f550981bcaac6787c0488cc470406249ec80f4bf11050630227f8b5ac6b3b369db237d7c24a0980dffe8d3abd9b64fd4efa492349bd4eb6902edb94553546110227d7de5a864ddae8b9fed8de9f0df9c596e39de903fda323ee6f788831452eb9e49c5eef3e058b5bf84f61f735a93e042bb9e458df6b25f42a6eb8fb03d437cfab757fab4990c721a757eaa5e9048208abbcce6e52f177b20dcf52f1fa551a92b68bcdb01680855b8f79131266378cd1f0c2a4141c9675f01d1e48"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #8
depends_on:2:3
3:exp:3:hex:"6ea9c6f784f12a9707ceac8a7162ee5381dc893ee139f8f4b4d93db266829db4ae92bc52ff860d8ecdc9fc16bd070130":hex:"":hex:"":hex:"":hex:"234366f1591cfe244956f9496cdf446e0d390ba64beaa066945b1b4c5337dded2619dd2bd0133a5d612bab7c251ab79e3951cb134894c422553fc8cc7b3ccb29c20adbf52dda35af779142d7efc735342db2ee067649fda25f3e8a74f8e4f6620cf5a17cb943602609cafb85bdf482873efa4c74928cc0d69444b72aa6bc72694a3a21c6a721aa4e0fccab0a98aef375a37a3e8a15dccad13b6d70b3483581004642d879804aa00cba207b51affca43490bb98f67953265574366ec3829e67aa"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #9
depends_on:2:3
3:exp:3:hex:"5c13056be92a7f71236fcfef460298acc8595dd474310727f5ccb9a7acb2254ac7226f86349e20e2aca737068ab0f2ce":hex:"":hex:"":hex:"":hex:"16d415eddefa4dc295a64adcbbcb8c6fe8c8f123c6b09dc08a56d723cff5978cc120fd0a68a2f4c202c220db372d3128ef52385d5786c12dfc6e60ecfc3461a09fa80453e2b1b6365eaeb4df602d192aacb25ab6b4a59689d4bf8d1c4c42a32779f62b06baca6461f154cf40901f5787c1aa2bf67cbfe7546ef5b2bdff20790d8c72d077d48c59c92d1af90a90ccfcdf643dd9d6cee0b1faf5f2f35cfd01d2077ced5e2d013ec1e09336dfab9d9e51ba9a3a2837306213bca2d79abf8dc3282c"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #10
depends_on:2:3
3:exp:3:hex:"38f08a099fc2d405c32d1e0f867e5450d5ee0d53783c31de9ddeae46d962999da01f13a43320c715612cedb920cf12eb":hex:"":hex:"":hex:"":hex:"079ce7a5b540cae96c2883e95acde3039048a6c45a2d259cc648639e7205392d91fa3ee080e615f1e0741a0e536c9e05844651b93461bfc547fb452fec61f853e1bd6e08eabd0cf1c5f84f85eca9d42b53d1e5bae51be5fd35189e4f1c02b843c6361fccf4ca6648bf30a23ccb8ebc16fcf158746eb39cd96f19d46707c001e11c4e0e8ccbc89fec66c69fc92843b6bb2ee1cc7595b65ba89ccaccd6130a8417faf705e8e203e90ee64ae970c409389b5cd0ca80a4e40b642689741691b20621"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #11
depends_on:2:3
3:exp:3:hex:"0863c868c32442a1a64095a71ab6ae2f9e61c119b58dfa4f34efd26593bbbf68bc407904c43300452dd4e61df47fa98f":hex:"":hex:"":hex:"":hex:"585334828cf531828fc7127fee0c926f85b8e71e8522ea921296dc62b83a09a00397cd45e0664d0f26fa24edd3e3d8ecef8fdd77ab22431d4066f0efaf3882c97f179a7060efe9e8cba5d8145bebd502c0e09ee791231d539983c08860d7783edb58440d193ed82bc77c27723381a0da45bb1fc2a609f8b73b90446e39869a5af5038aff603b44db9771113927a5297fdc3450eaa228e313afe43c31b0a95b476c5ca312b4f589f809749481722cea9990c02b647976aa6c6f02ce1e5e6ea6df"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #12
depends_on:2:3
3:exp:3:hex:"a41ad223e41e2bb9c131ec945ca310600ab00c51f6e4fcddd803bd9ab9be8af5483373838894d32745a81ba9d6967751":hex:"":hex:"":hex:"":hex:"95ca31a7eeebdd2348cf1d43411d2c35faffdbcaed4052d50cf92f0e9d2e757686b72d631a56ca98b68215e7014cfed943abc1e13441c1d660f13adf2188d0975154e1b42a592a62a43b57f82cc21a428873a92fda83abe420efb5233140e4d6c7852cf81e85961fa5c606c5f33e06077f414b0f814cbbe50cc606bffbd474364e608825fdaaf5e74d862795539be8697e2ce05d71446881e3f65bb54ed95e941586988f6e0c34e1beef426696e9dbd9a214013d826a8c99a2a686d8402c583f"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #13
depends_on:2:3
3:exp:3:hex:"62a26c1327c0ebf8b40691fb4c8f812e81f5474b0c7db70aa9424110fee3a05e41c0cf2e87210e34d0c6bffc269bf2ba":hex:"":hex:"":hex:"":hex:"6e20a00df1af37e6cc55e580ba21335111eb375395343618df7d630b9dc234496e3964cd45c5de34bda46a28964f6148704c30925feeaecae0574038434cd33c1dd943207a8dbdcd72dc9ecb76a25728b3c2a8ac13c1de3a126d7d43a46e12e0d0ca8991469e582b78ef6aa691b5a0e3e85cba7d7aea3c1e8e031674e85f5af36546eb2a0a28d4ffbaa316a9a6c944fce291cc0c235e8499882eb62b22b548ae07cf9430329e009f4443cb94f7a14e8661166b0d681dcec867205abed48145e9"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,0) #14
depends_on:2:3
3:exp:3:hex:"fd54cf77ed35022a3fd0dec88e58a207c8c069250066481388f12841d38ad98591f9c02a1d205cdbcdf4d93054fde5f5":hex:"":hex:"":hex:"":hex:"f6d5bf594f44a1c7c9954ae498fe993f67f4e67ef4e349509719b7fd597311f2c123889203d90f147a242cfa863c691dc74cfe7027de25860c67d8ecd06bcd22dfec34f6b6c838e5aab34d89624378fb5598b9f30add2e10bdc439dcb1535878cec90a7cf7251675ccfb9ee37932b1a07cd9b523c07eff45a5e14d888be830c5ab06dcd5032278bf9627ff20dbec322e84038bac3b46229425e954283c4e061383ffe9b0558c59b1ece2a167a4ee27dd59afeeb16b38fbdb3c415f34b1c83a75"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #0
depends_on:2:3
3:exp:3:hex:"5e919d353357671566d2c6ab6e1acd46f47d0c878fe36114d7fea9fecb88a3a27efca9e3d1e1b09d7f16832f3af75141":hex:"":hex:"442f17cb3cb1482a19729bfd58f46f6ef16285554892c01b0718968d6e011082":hex:"f9557c93eb841bfd7b5d4b71da928efcbe3f55e1870493ef90d16eb238380d65":hex:"36902134f1989cfe7eb518a56c06aada98997d9bacd04aee21f879a57b515ca3b5e0c2d5fed05ca1a8b054e8c46b389d9d9186feb0abe8e2e60b3a267281cc5b4b7341116ced35a0e07bc2b0330bbfd8b07f07248fa6d8fc5c9df13445324162bdfa22a91ba71453ab123c92f91c70b8bd540b3b180b11ab45ae2c59e57c7c43dab7576594959a96eb502d182267c86576b1846ccee1a694cabdfb42e0c8214192efb502926fa3c27eed020b7cc8866a5af9d838a57e78bf7acd230e1f4d8361"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #1
depends_on:2:3
3:exp:3:hex:"7a5d1efc9b7043060cabd67de7fe22740bcd6a8ceb355d69f118829a2b3c92006a5633e613f8769c1114b1822ffb5408":hex:"":hex:"f2ad962d992434468681c644587639901ff74e2bbdd8761961ec34edc4a0c36d":hex:"75aae0d1bca9484c89fc4de3d1b34275ef0656775f3f8c96f2bbc50401aaa718":hex:"5ca21af4b399db38f8b74a406aace69f994691f2765bb9c47b240000152739e059b163cd007de5f28bba17e485fcf9ff6f41f76e93998510e302282cbdbde09fe8b1a96187e57c9a3df94e2e748f20026476ca682dfa890b478f7a21f4927f74f99aedd9ae782ba10fcda1dc34c31b4f784722e01cc4679737276f56df23c5bd8c6985797b83c0ccde2b4c7a65c652745de7fc8a235ad7ed0f456f1e7568b2dad475f0bc46f02a7f35c05cfef9d0e2c773ff895e291a2cfc2424b106096d8864"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #2
depends_on:2:3
3:exp:3:hex:"611586ee40cb3ca4a9238ce112a237449bba5422ac9b18ea53480875334d8fa026da9d96c4e87f94b2f9a7c261be3edb":hex:"":hex:"2f835c336a3aa0019b0bf940c24643bc8fca58c9cfa6509aa9241de9e0e1a046":hex:"1911a59c5f2568860ae71e803688889dc44d14ffb0d93e324c39f32d95c1c3ea":hex:"27bf42f50476d8a2cc23f455e9ef477cb8e9c90f2e97c8a483093ebf55b2aee02e0356cff919e2ec9811b42c73498a6c2b96aa5b761ef7e715cbf66ad2e3ff8a6c92419dbf2e653ce70a87b51e26d9f607eb25b45b91f947d0026a38977143c8bbd94076e663b9cee35505b48e453e7cca83e540975ae8a53f26390aa63aaf1e2669410cc83427eea09428776a2d520eebd170602c52dd491c98042018a0372a0b39cb565cbe5e474f927f91515a6a7444fdbe1d89d8ae2c2482a0deb8ff236d"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #3
depends_on:2:3
3:exp:3:hex:"85b1e5da599efd4a20ffcefd4737fa3ea1d2b14be33861c2a4ac3ac2a49d3947b14cf18f4ff426cb6345f1a7653e9630":hex:"":hex:"cf5bbf98d8577077b0b84475dee0f0e9aa95eedd1d916507b5233b688bcc856c":hex:"b333ec111e1e7d78c9ac916e420704832539d2db46aca3bdc4732e8ce72b5e80":hex:"4773d32a9fba37acc6900f3ac70f6978ff1e40039d6e3286c264fb7fc59f1bfe0188c7979380c8922bdd0e363c8e09a49faef59ea85a9f0e400b94c74a8a50687e4e51e25266eabb86276f22628d0d2e19c5696cd221a9b80f94045d001ca4c20dc916ca0ff22c93a41fc822912dd7e247927fd45982e94d3d1fde77cbe78beecba830b753079326ae33274f13fb7cd875e85fb5e9e703e61cbd41bc4ad47d7b4d14afc873a39dd810ad8eed95adff8dce3adb7659b7c1d4e3f62403767940b4"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #4
depends_on:2:3
3:exp:3:hex:"50f986f6efb413fba3e8e0beb84d4948c2db0661ab8e064d9fee8b3c2f0a910fc35d37512f88bdfcfde797a21a006e01":hex:"":hex:"37c7b08222ba63f2136bb28f5ec09b9a899b56371615be41bef49a0b640590e4":hex:"4a1e34a5d60ca08e3e6c0f1b86547ba2d12fa293275e7d75f83a0b846daa48df":hex:"e27738c6fae66125fcaf4e725a0881d5a450fb5b02a55057d6cb7babd91d502c4f4a8431a83352f47ea8e5fd7e815f5080d144318a1dcbc755e0b935785cd5397955da22e3ff633b34a64ac72b2e6b7c51e78ff553731e6e8da911d147a6e05b36b74898cac6d3171bc8650e445ffd19ede2aa8218be17671321c186465d852dd80d73290546b88ef7a978b41c4c549e9c7fc6ef86e47084778fb5aed5d41e794ee0e700b77c0314a307b10df69daba605f3fdbe2dec708ba0b20d6b650befbd"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #5
depends_on:2:3
3:exp:3:hex:"641dbcbf99b61437c2bf65a13dc3e0324eb940335da123870d9429636dfc82979d0cc913c73e8a6321fc3eb9e973c0aa":hex:"":hex:"72580c11a87ce6b4207908aaf5bcaaa1bd217fce3e8bc0726568c64639b70767":hex:"cf9f4527e074b72be735558dcaa1fc82f26ae286bf944b49649f769bf6faf49f":hex:"345395723d048c2270c0eac990498689bcb862a4996e82995b4e7169e671eb03bb2242c4669c874c1aeaffec58aa653c7d7431abd1650f0cbce8cf5db8316693f3ed501fd9b48c1a44b34f7878aa386d65afc31f94f908a322b03d06c2a1074a03bd2b579cafb0f7cee6d6934588ae1ce9e4ed37b03737c553ca19af4b46b5e43767cee2e459ab91407df6cfd13a6f186abdb148b85a5f49bf92ac6674fb055c7fe123e9355a0d33de281c03a56f91891dd496dabfd6eaa6fff6c9cfb4e67c44"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #6
depends_on:2:3
3:exp:3:hex:"b9c305ada943a64a2b00494e869f9a640173eb1c2518dd9be93abc3c93c7e6b5bd0627a199d15f77b188824df00d5997":hex:"":hex:"ffc6760f9af02d35666275c074eda03f53dbcb5690580bb25768a6566b328dfb":hex:"f26f436a820ef71597b75134b8d9dca6e9a6afd9b429222a4c9c878f3b92716e":hex:"e5413a234859511cd837312bb31aac4d31962c5f7f27aec47417f367ca99b8400a4287e60412fc356cb40d96ddf5cb801285ebca42b2f6fe4a711451c1574174c58dccb2cd3342b7092a196ac7d2881a08e7f5de939ccc8f4eedc8f867c81aa88655d96ae50f618279d5009ba2ac4b1df4e63030cc0ec3541b6a94bd9a2ae5d1fcf4d847114a783c997a7c6b9d549010bf7b649abef692cdea3aa8ada14574e0f78b7fcbe17b587ac14980e40264d6de030e429586593d5ce3ae571f95454dcf"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #7
depends_on:2:3
3:exp:3:hex:"9875dbf59b760eab9998bf3341847910526d10071dc179f96081dd793a6001936881e7f39075cd382293a1aaa8c845d2":hex:"":hex:"1196583a99afe1d377b344585c8252a0690704b8f7a2b7582387ec91a60fd7e4":hex:"20147a88e0f9f1e8caa8cb14488c9b5c38e5520a36ae913b4703d15af27218dd":hex:"c808f6f296683d26208359a766fe61bc70ee8b6ed9ffb94ce269578fb5568fe2358d603638324b63b29bb36ae71a542e38ee69a2b93ad7e4a887a27a2852cdcd541a5fa6d0c8b087aa1185bd5788256e7d95c2aa2d5c11407b7bf762f416b01d8e747c45298f875200a2e67679d6d5ff7a7c0e50a010690b1920df1baf0afcfaee7ab0862004e23b5aa1ff47b8273d503bd74a54e7b39ac7e6d6fb0a594d30531cab8a67b22783470a65f24faba1c231b3ba45efae9f0be04e2338529cfec008"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #8
depends_on:2:3
3:exp:3:hex:"ac92a6c791aba0406d6ea8255c3c0901eb711a424501c2c2c847076d78bdcfc3266b7c3bc578c7501daac6dda8366d4f":hex:"":hex:"13379a77d84a0c4cec95e62ac4c8a98ceede0d89b8bd317352a95300963415ed":hex:"04d47ec89a3e1b7f22580167331225a00ff258da72446241a6c09c517ee4d48c":hex:"c2e6528584c6dbec436ffec4075fd3aebe953fdc0b46b4b225a3c2886e60d21879e6ccce3746d881f6d80e33876afad439ab9f68fcc458492de12811fbd57ac49d868754da19279b4c0a38979201a588884def5677392dec97cafc94bccf8914d9f78575711bb6f2adf4116db91c8b54e36e9ac2f5e01caebd300acd7bd45eada69d20f1b4139013a8a614069315a1c99137a6f23e38f91c210e0c156c6fb498056e823dc41a05348ab43c2f6f4ce188d4e05a13d38f8025731ac1670949a040"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #9
depends_on:2:3
3:exp:3:hex:"63954ac7a0f989a458d2b4a6b7013dd66683624584b545060bd03a57b92822ef422764bbbc35fa5d40d34145afe44bec":hex:"":hex:"7b25d875dfb03333cc27b9d4286d00a85ea5921f4b8a4717b957349eb3509053":hex:"8b70d28c5c80086c0cbbd01337ad45297af271d4bafc764b0fc5705700cd419d":hex:"297752e61c4ebc4e1c68391335e2cdb49b0f19dafe359e451f8158fb7958d32a98455a852002d8f05169f438816ae6fccba1eae4d1fdd7a1176b04831d7ce892f711ec825062ea1c6b12144bbd3a0aca7f92520ebb87ac6045d2ac3a4a74fa559926f0daceb59d44fdb39f5fc3b877f34241531e863c153286f3f1b2ba2db4e2c8e2344be40c2a7a8cd01daf168696ce19f83ddb64d50e2313e78c5dfcf077f25e5b4d6f687279119ce856d4131a63ad133cedd020881939bf70f82eabfe46db"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #10
depends_on:2:3
3:exp:3:hex:"d0944e0a3f3604a588271c8eb65913ad9b07ee2b29620f8106ca70ec10aeb896bc9b2b519c77fec5fc419e953ceb0be5":hex:"":hex:"d58593f2488f0a292ab552dac006c94b20ff500dd57af32be808921a5ee251c1":hex:"ea9e579c9dca67f07ffd67d2483ec1fac3d2ec22fefff73c7ac9f125888d7a4b":hex:"ae736da6632a7d8bdcc9e279cb7d3f9101a8f7dddeff253277d1d99b45c76a1a5c193334e912c3dfdff1bc389b209c3b29359a4ca53765a1e40cb900c6055d8a285cf63ebec79b46019efe95d5199f215f11961f3319d225bf3d60734fbfbf3593ab105cec2a17e308af469b3220ef7f055675396d289e6f4f8009881c8a2b4e9de88d53ad13e8bed8b38be6d8988f615b4590fde3d91caf50a86eac3fbf29924743145803978d261132b5975a9f108499250314e098e57c56e2f9327307cff8"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #11
depends_on:2:3
3:exp:3:hex:"1ef53464bc7a441227a27ea7b5c558dbb3f509aaf880213cdef7e8f6a1d287c173cd5b3148d46c48c83c5cad3ccc1f50":hex:"":hex:"b052a66992fd8a8cb02c593edfe4766fcbcd3505af29d698e1f4db398acf717d":hex:"37333448311c2c6edee19aadb8f1036cb60cff2a945c1a0ea087713bff31e915":hex:"4ea7054659cae1cc178ef431aebb64c2c8dda3a965ea940a84c00d9790e2e3a33521395cc4d49038994aa4c7dcaf0b52b44375d93b625ac2281991a85a5acebf3de552355e17b3528faf39d392fed981400f28540f5ca64a4d2eeb952c88856c8f7388a49611810941b46b1000ee4a8aaaadcd39944c4abca9110fd6580093f9303f86a6e129d56b5aeff5422c2261af33523cc6a174e0782e13a026c003c17430b8371bbfc3d51c3e06fbdc30769a278b109238bbe383cd5523053fe589b72e"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #12
depends_on:2:3
3:exp:3:hex:"14148d69d583d4c1758c307e0eb0b762511165823fc54096f9da5513e87df53b96a7be8d31b8a38f24a82d846b0e13ef":hex:"":hex:"e05f81f6402c52dff5c221a2f191155bb56abe160ce7dc8a6bedfa029195a612":hex:"214777e3faee7d953b5c796675e106d50cdc12836b3114d14447ae91cea3c1db":hex:"eb0497b32af8a91ed3959c31b079b8cc5c39db3100913332fffbb6b1d5ebbcdc97d6e67c934f3336197c9b730d80995a7d7445e36cf3047cab22895f244cac803eabd001eb1ff5d5645a803c41ea6dde6c972b47de0372ce901667d03e2e02aa0a5aea809e0bdc7430440365908418ce6066c24191ace05d6a797ef9b94409989cacbb9d9ec31f3cf0112b72e1420b47e0c184a8aacc214d55a0d5e0869d09303e4014de0430c07380006ea75984e6c32b06067d7d7b931e2b74666b4b569f71"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #13
depends_on:2:3
3:exp:3:hex:"27d47020acc3a80a55149fa0ef43f684843ba89fda4bff1c29d20baa2b21956780569b7fa0c4078d9ff71a3790f1be3f":hex:"":hex:"c03ea0b88e2f9b53f902b22746bf4dde09439c190a7a638e3cb990d86739dbed":hex:"3ef05e71487cdbc209b5ab6e808e55f0a93bcc02df766b01c1c1ae5875b1023e":hex:"3ee49e2a58d800d922cfb66284da84bbb5944c85f194d95f1156b673392132a430e47ae74f1ed7c1d0e632d8cb604c88777437d8f37e7d0428b834555a96800540bf5bce6f430328fd328baf4b22b7f8e663c1d8583bc0119248588840510e11203cf47dfc4f6cdf8344170a341fbb7d93999ba86be3fb94d9c03922fd3d75e3fd5b42365aa62606e352676b2a0c51fb030d8d5605e8ac6bac2b4f8417d8e060148e3d4ba67b31e5e704d866bc87741ba877d12b10e8a9b37f3feca908fe1fc4"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,0,256) #14
depends_on:2:3
3:exp:3:hex:"88b6550d49182ca7321d8015f780121223a93343dabaf21978ee2818e7bce6591d32b48eb4642069adcaa5986224e6d3":hex:"":hex:"809639f48ebf6756a530e1b6aad2036082b07b13ed3c13e80dc2b6ea56e70a04":hex:"3395902e0004e584123bb6926f89954a5d03cc13c3c3e3b70fd0cbe975c339a7":hex:"4a5a29bf725c8240ae6558641a6b8f2e584db031ef158124c4d1041fe56988fdaee91ca13925fee6d5e5748b26cc0275d45ef35abb56ad12e65aa6fe1d28a198f5aa7938fca4794c1a35f9a60a37c7360baf860efd20398c72a36b3c4805c67a185e2f099f034b80d04008c54d6a6e7ec727b1cace12e0119c171a02515ab18ea3d0a3463622dd88027b40567be96e5c301469b47d83f5a2056d1dc9341e0de101d6d5f1b78c61cc4a6bfd6f9184ebde7a97ccf53d393f26fd2afcae5ebedb7e"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #0
depends_on:2:3
3:exp:3:hex:"2cd968bacda2bc314d2fb41fe43354fb761134eb19eec60431e2f36755b85126e3dedf2af9382a1e652143e952212d39":hex:"59fa8235108821accbd3c14eaf76856d6a07f43383db4cc6038040b18810d53c":hex:"":hex:"":hex:"06051ce6b2f1c34378e08caf8fe836201ff7ec2db8fc5a2519add2524d90470194b247af3a34a673298e57070b256f59fd098632768e2d55137d6c17b1a53fe45d6ed0e31d49e64820db145014e2f038b69b7220e042a8efc98985706ab9635451230a128aee801d4e3718ff59511c3f3ff1b20f109774a8ddc1fadf41afcc13d40096d997948857a894d0ef8b3235c3213ba85c50c2f3d61b0d104eccfcf36c35fe5e49e7602cb1533de12f0bec613a0ed9633821957e5b7cb32f60b7c02fa4"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #1
depends_on:2:3
3:exp:3:hex:"023f5673dac29f62245510d0a866629c43c64bf35a0bad30f1270050876cfb1ce80b615a5a47ecb51217a46079e11fd3":hex:"a6f797b155d6da01f5d155cb7291442e1b82d4190e93e279fe5b4aaa7d04ecc0":hex:"":hex:"":hex:"507b824443af5db28f746229e03ab00c73cc3ee4956aa14b33eda00dd2b9b645c132dab7dcdbc659c8ba0e1a3575fe7dbc7cf9691f9b714acb1b33bef96943003c992f661e04fe9e8b9f648f4af9a58a45b08b8fa7fa3704e6bdc289abbe14a8c7e1747a52ac916c31ed079de0b900672e658a201279824d0d75ae35dbdd43aeab915653765d83e46f347fcb4fe3321fc28abd2d0d26a662661582ce21b6dc4ea6d1b236e9692a83c8ba0fb299157b80623ad4f448d25d57f537b10e5e30f80b"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #2
depends_on:2:3
3:exp:3:hex:"96b5bc16ce0d101b90d54da6c4b3d85a70ee19d54cf4cde3d048afb5f758a6b52ea2c10c16feb71cedfab9bfa9e462f8":hex:"2ff415e2432d2e6c4279910a5e56c0f5354a5af0099132d891943b4a8901ca6c":hex:"":hex:"":hex:"ecebe717afe6dc08dbff3ed626bb06de0f9784283b70e378dec19d4fbb50e61b7be48ceb69851b2bb94641aec5027d53d314a96500a9bbb38a87c9aa42ebeb96a23cf29a0fbd5e48b399daa1b24dbdc85223f24b7d77332bb1a137ec709d27c008c709696cbe44bb2fc19fb10a2fad4ffd8a9d89492a939f2268d1557f44b6a64e2a57887830fd8bca1b6306aaedbd7f3f476b827995a1ed121388497edc7e639c87d092f6591a45b5647c6c091c15ed39f594b7fc4ae92331f96dd8e17be970"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #3
depends_on:2:3
3:exp:3:hex:"364a833a283a3e0b8a5b681daa50df96d806d4b54828f2b016de5d88597e6287d98cba8fda464d21aa1cfb7b26b9b226":hex:"35b0e7534014dc2d7eb0f20ff78a69d5548d0a64122d4936a6ed177fb3ec66a6":hex:"":hex:"":hex:"df4c799cae37173a81c545d019ffa336ef2c039a5865af425e5b60bc3d7202f4bc1aac5a84022bf4088061abd5c39d0fb047ba80163eb5dc8b9dd515948f16915832c6f76b45acc25b9c01e7f70955c0eb51bf50f00b24bb8e7ff53bd7c051b53d8b1a837a17a00355d7eb21e43b2b5b249dadced37d06e7047c2fd12012705a59d051afd26245ce3a59acb4b996b718c7dc1ae964bf12b1db02fd6c06ac2fec6ee5deb02c2c830110e9bbbd3c778a136b646ce2a0738563555a89409c56b81e"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #4
depends_on:2:3
3:exp:3:hex:"bb4d38c775acdeed663256abb747ec25182bc16efd0de02cb4b05e4ad4749c92be6f1e856e423a8f3bfb0c0f27ad8210":hex:"21591e796b7e68e7913fefbef4872af9c062f21c8023c0dbf47e040c3aed3733":hex:"":hex:"":hex:"12575776e1b9f54b0fbc39e85a77b6912160bace4f1e9f049e3a1c5bcb452cf9be42ea10c028c3cc249401ac236dd3baa53ff327735435f4869d3289bc9465ccf15f826e4e4fff099986bdde0d09bd12e3caddcf452eed6ca1206ae4561b84770a9cc6e962567304ef79d8d3608529a3b5e4067fa83c8c35a06f1855da5f5ea7eb106e4c60181d12ba00cfbf7eac60bda00571d95c45c9d75c43b42e27a238aa5e0f02bbd96cde59a2e572934a99d05c399ffdf15c65f173748734c51999a29e"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #5
depends_on:2:3
3:exp:3:hex:"f9d041d24158f480600c3747cbfd868c3f7e9ac7f74b3760eae5320839e4f5130f8477d88b1d914c0d8b375d089a4c83":hex:"b148049f4093f0032c7f105dae219aa9e3f70487ce3a6b6ecd99429f66be5406":hex:"":hex:"":hex:"84c58bf473061da92fa8d56aab3a75598428f18dca504191a51746eb5fcad8f784eafac5ea81d636d579e330baf7db95c8d706432e9f585e84da090c0eb40dcd819bf10e0d5b8600150d186f732af50b431c596c920eca742e6555129fdf5df96b44005083d7a33087b150d63529bee4b6e1ed4189ae2d93cee8dc671d47c0e74ba04218dfe273484a4bb59a57743ea56843d516ff2c72ef9841996d31b0d6c5beef367a6b44cc84cf4d403a06b40406e4c9f47da401e3cf31412694e6164dcb"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #6
depends_on:2:3
3:exp:3:hex:"c18f511ffc3479a59357c17c2fb3d1e0e6f0edda4c8b567f2413323c2037f2fd140fb0cf33eb59526d8c0dbd216939b5":hex:"7387aa3b0b3d92afb29761d3d5ea16e32a68297b9ea6751e1d54c8612f6351c1":hex:"":hex:"":hex:"949bf03868563c7d1498c69c327686682656374b2efdef6342e69a388229c580ca2217a9332d3ae77c2d1223f5dedf4b34ec50b79d5baa7283168ed7cbe71c6c3c9193bbe01b76e011c39d2d462017c2c74b7e698fa2140e16886a9ec0fc6c36decbae37537638ccf17777f1cfa49d2c2c7ba3aadd0a1565d61942de94aa6fa16ecafc2dafabc9082f23e75a0e2f8f79d1c0a15ce57fef7655f1a4fc6fc4d4a694bf6ca9e333959f35ad354524f614905c6a52ef8f524cdf01c5fadadf207772"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #7
depends_on:2:3
3:exp:3:hex:"6b09295110384eb56726f61474bdc532fdace31ceadb5fc23d587356cfac74338ab6f9d89394b907edb646650865a3fc":hex:"7cafcb4db31ab411c396015b8bbbc990607e08bd1cef3337dfa0e295ae024f9e":hex:"":hex:"":hex:"e51bc5b3a6bb2a2667f5d62c2ff9902dd07b566870b4c14242627da7581449ec985739cdc2bb5ef036033fa798112ce20df06d46d61aad7121b8282fe7556bdd363cdabbf47184e55edd85ee0b7b0be17b9a7f822f4d8906465b525c16385d0899b6c27728ff2a600870aef65f58f9d3777e8987d86e59fdb69cd232e7289fc75cf2174304137f988a17b60c57af84cd8e556aaad458f511fc0b3009516435c0c60098f35fb6a4a90d90bc6071d38000703ef57cbc19d6b78a0f797f3ba044c9"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #8
depends_on:2:3
3:exp:3:hex:"ec6d0f68240f5c47e822d9088364c6cd03ca53808162b4f06f5956da65290946f4d26653d079e50604f836c1d798243d":hex:"b40b5737cc76c5f6d1df0f13bfbac7e26f92aa933125705b6197d9bedb11f2e1":hex:"":hex:"":hex:"207833cf65599e1406ddaf3452f060c872099cbf7483f1f7f14033490f7258ca5fd7f5339f914498b6e61fa426cb872c880a9fda9b8ba590cd8006b990af7ad412f60c8b2ad969c2f9cb0e9d005943d4dd2dd7af9699046ce89d6405597716d43b9ad54641c2278b04b2bcc5b8ecbcd5e2044e4e6ec5a628605fcbd67249e813bb769d7df01b60404d030e69e9672b4fdeddf82a22042b83ca036578b69f9a0ad9702bcf95fe846705b49b0a0795dfbc4f671e0158ded6242bd8f8fbc2410c46"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #9
depends_on:2:3
3:exp:3:hex:"df59ac224e4ba1b6dff348f17bcf9c5a94a3235a54f2799a6cae29d8654b79d18b09b444a28a7d537e1a2bc89e95abd8":hex:"14a0a91e0cfd63ef5fcbe2e8c7a44bcf5769c9f95b6c50bbe9d3b48b82a09053":hex:"":hex:"":hex:"656438e7738d441b9ac116361e9f26adc0e303da7889cf559841b3e44127318edd356051bd0b3ecea78feb2b928227921a0c183c9f56bfd11ef31b28da6c78f3891d8ae1804bc158fa56e8b7a1a46be4954de493ef65a7f9beb46949a323a04e944034db30b19cebd8b70bfc155882ddfaca1bd5acb981c2c1b3e0862c6234d13093ddbcdff15129d586fc24ea2fd20946fe45b467bbbc77a6b6973eb6ea02994607c657eec29e4c4b3915cb730db056babf1779127047b401e25f97f606063b"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #10
depends_on:2:3
3:exp:3:hex:"8da1ad6810c1d6b7ead210e48f51c370d4520547a330a4d591e61a9847aa043463f69d1b237999fda9b5697f1e7aaa07":hex:"291c536dac72409e31e71cafb1b5f55c14421b2c7a44d792cfdc663dc8f62692":hex:"":hex:"":hex:"c2bff571554c26bbd4442fbb3b0f8eb4db09840337658a7425613e0fd4f96e60da39b250c3a77379a53325a56ec02248c4d67fb9154e3b0eb8972a3109aed531eccc027705b267d2b9c037da79860d76e5e980b5b30b7ea588fa221d24d973f6d4c625de65123e91613a1528cdee59993aa827f319a759412f20aad6c50fa79a3debeb346ad92809470daf228cf344e09f03c839a28d580a2b3d7050685ef51e95649aba7228a2f0c82a2dfd89cae6ce549e8b27fd46f02feb473645765018ef"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #11
depends_on:2:3
3:exp:3:hex:"5e8d6571f514519de6c4c0a7cc5b85df616735b8dd09c3bed2377499aaabb296a9b2c94642da10e8fa737cdfb3129334":hex:"6ae29c71b76fc48f14a3d731a0f6f276f73e7672eff631dbb1d22b06463bb236":hex:"":hex:"":hex:"5cadc1264314fb4bc7ed7fa74bfa16aefa624bf2fd60c992d0cba10429c56e0028ebb430b1a1c6662a9b3c7f6de244ca000ae63db9570f1aa3e7ffb1e97a9d848021d8e632fedc037712a29abec4063b9d57c60738f0af0b1aab3844b03f7aacc65d38bec91a11b7c3bf8d970f01e00fed9dbbe9e2e499a21c72a7c5a22864125133ecb073a4c9f6d9fd46024f5c1ee7fa447209afa6ccef1f97ae77ca67fca5959dde209d2597f87af6e154408579cec42c69fa9b7cc075ee3e37ee3d91ad9f"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #12
depends_on:2:3
3:exp:3:hex:"5c9481b2642855fac8931eccd1bd6c5a05b560a55f96d37e865f057a95812d81fe65c84c96a990eb7a302b58de723cb4":hex:"b6a61b9a31207363d62c0b88f1632290f4f18feb41a6dedb85b7450ff9157016":hex:"":hex:"":hex:"9cc77b68e1ac23fdd2e2a6ff697053f816bb48b39b1162f7aa3fdd2dd1867f68b13980c9e5989d4631b7983248501731326bd7bf6e967b3dee7d2d5625d3cc2e198623af9f77f86103491ebb4aefda5c333b51557b8f643e6d6c593fd7e27e4bccca13140f6129cbd024de076e4688567fd7e41dc7b2bd0bd9b3e966d5d3c461502221b52b001a4d2102894da04172efb900171a0eabab1fd134217580cfc33a0a94edc0bc132af91d048c6f5ea4e34ebc9686a99f81d19118ba4da63ae3df7a"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #13
depends_on:2:3
3:exp:3:hex:"c43f883d0adc2b56984d4a497a8ad76813a01df5a0ba22b53144763b65c7bf3f6f722e4ceac59966a6e44ed898e6109b":hex:"769bace2c263edb87101743673724ef67a935e1ae9cace87202b6015d20fd9ca":hex:"":hex:"":hex:"ce61480953190453247d091838dd80117f7f85a7e9a1237c92edf10cfa26b423735788b1e89f33625480d9faae57112ee62c8e4840475a6a738018ad3fd4a77efdd8f15ffb621c429419b6adb20431fd35f9d62fb33d500b87beac4856aa4971eb89710576b609ecfe758f3682dd316e7ee9d6560b444c2446656c8941dca7d6eaa70fdf8a70f18386ee5d4c86738bc261c0e8e5f509dabffd0425a86858ea3c71de5be98570dabd80a37b4f7f954002727c0b712e58693603c23130a45e98df"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,0) #14
depends_on:2:3
3:exp:3:hex:"d083f7f8c65374627ddb51582b3a39e2bf074508d5f28ecce25787f386058de8afafaf2ad7e6449308e176be01edbc59":hex:"ddb4ced192f52bdfa17aa82391f57142ac50e77f428fa191e298c23899611aad":hex:"":hex:"":hex:"b978826b890ce8a264bf1ad1c486aaf5a80aa407428c0201dd047fa1b26e9ea9ff25a9149215b04c2f32b65e007e0059a8efe11481926925061c748678835c0066f596352123f0b883e0c6ab027da2486244da5e6033953af9e41eec02f15bebdb4e1215d964905e67c9e3945ec8177b8c4869efc70a165719b8e1f153c41744d44d3c56a15822d522e69bd277c0c0435fa93e5e1bc49bc9d02aee058a01a04580a6cad821e9f85cf764fc70dfae494cbfa924eab0eff7842e3541bc29156f6b"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #0
depends_on:2:3
3:exp:3:hex:"c2feb900032f2cca98d3f60536f563d8ac9af5fb2e90dba36c371c0a1c58cf5e4a60f2be0fa13b8266b715be8aad128c":hex:"8e6f9be0c692648072d19c750804b10e2ec313c8013abd363de7a467787859f2":hex:"72f54ba3f8e71ad69a040bb8493283acfc8815f17dbcea220ecd68372a2dffae":hex:"adce8157ef60482841dd2ac5ac512bf7649120c1dba81ea75f2a70b7512bb6f3":hex:"e76e4326ac69ddbc6b2408c529b05a96425c65cc65671601191238e9434d2a0147f3a25ce9b6818774f5263c92459bca421d2b492f9a9c2971359baaa1426d6e2c36d8924f39d02ee2fb5502c4e0b206dbe9aeeacd508abe6c055d547b5f9f35de4fdc9c05a2c63ad699a3a7e265598b8f40a8a295d7376b88c49af9edc790b8a5ee221e19877616678e2a5135d7b3756109200439d9ec8bfe0cc5f3c334ca9c022ab9192d5d554dc7ae76af1dc06d814427f46a7cfa2dcc62f4777d07ebde7d"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #1
depends_on:2:3
3:exp:3:hex:"ad500edbe28b9a4338b55451b81c652797eb48fba753c186ce0aa9ad02a84ea2c995b7ade6de0fb4ec97bcbd61b711d5":hex:"5770c41832a4cdc4039a8c332a4b45e7a7b2dabb678ccd2e56452aabeab14925":hex:"d8d5516d158b41cb9d66566b88064900af78183f765f2f72a19548fb797377b2":hex:"60a3a01a72e6b3f33a0c236db08237e7d656bdf4bab1db57ae23b7305569dea5":hex:"c5ac3df66bc664e8bf84c758c7926992f0e8a03cd3f3f5fb8277c85b4da526601e8131f9d205f35594e101a86fb83ccf4c1e98c8e609062256701ff2132e337cb7287f0ee2e8fe3ef11ae703d7efe52e63cf89119ced05950c55aae6c822b6b0a8e1b91b537e5bb2de165a4b5b43a1c41fbfd65fff9bc5329d303caca84f5d1fc6acacee622623ed5dde36aeda0816749557c924d6ed26cd80e456fd0ae2146477ccb63a203fe16ac1d0eb2d12b6a2cabb21d412422e95f2df8ccdc23b4ef0dc"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #2
depends_on:2:3
3:exp:3:hex:"51a29bac53961792077e88ed3603d33bd1f51b3fdb2b5cd1ea131c6f643af65de81eb2e260396d2a69b4184c4eb98a15":hex:"72e5285b92c4ea4458e8a2159687cd46e7df9c1f4513d8b72cc88be41c2e1522":hex:"16a69f7aee34c567595f3d362ccbdbb7b9e9372c4b1729fbb80d9a089eee31a4":hex:"825197262a43f6523182f0a91005d70b17d81c2bb692edfd02ab988130c7d5b9":hex:"f63f531c242a295d7796c3b4844fc74821af5a53e0e7ae822cd8a7f9de91e6164164f3448fd7d18feafb97c9500e0625d501dcb3927e6fb39ef65dd9586d157076436452bd3066cb30d1f47dc0a3ffa5f2e9ab4e183018b40a82b39b0d170aa21b05600eefea906838b95456e04cf046808030a56951d2502c5eb6271228905ed08549bb171d6c0408d88250785f42e349ce1d9e74a6cd0360a008ec804e7ecdcb4d1fe24aa5a18cbb65f4de1619a29c6062b409a386ea6f43e60adb9ea3dd28"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #3
depends_on:2:3
3:exp:3:hex:"b30ff9c6e5b6bd258f1cea0fd5ef9adb81fbec233ff2fab01e79b7422878b2e950604e10ab80ddceb9d2b968d0d37ba9":hex:"e8acd4b380aace0b27572057eaa947e10e6b49516140139c74a1d4f472221dac":hex:"1d2ded0003521e2ba6a4a3e732e0949c1d858fdf0925fedd9cfd7f603e0e692a":hex:"688ac5e7b4400d962c106fd2ce712a1cda6a0b8ac5196ad727f9b882329a3d5a":hex:"c5208fec1d67517311a42bec07782ceb247e9c818e4f5f3bd160c9e53d462b61884feb278cdc8f64e22f59d27dfa98d3a90da8c7c5ba28ca40bd0d18934595a376553d1a8a19de07a83e2e9db42748c982cbcbf4a975c20084ea9cc6c6a41b571faf66b364e4b7e4d32efc80c30b219da1c02a1ea02f6922adbc31a057f999605a2d827f10907835c2bdde4157d7bf2906a0ad27bb72f113c6ec4f23631a2b8517bbce91b560d90d73fbf0699bab21da23e27cfec513bb5e375f50108197d664"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #4
depends_on:2:3
3:exp:3:hex:"56715dcbaa4f5bdbd157bdd950d1c1b46c1f4f8d7818ab321d72c0ff3c0a928064b0439f7bf021dcdc7febf2126e5432":hex:"cd5547991b525f7795e075a59af1701375175bd760db99d316b91463f87f7f3c":hex:"b2e4f02f1c14866f538eddab402356ff3b405abbb9154e88b98483a83be70f7c":hex:"b8db321ab30285eee7f9e377ad62def6caada447d00a4ec882081daafe2ec009":hex:"7ed8c2be58e3553eb65508377d63d7f24518d1a7235dd4c740bd987dd8bc1c1e3ca97a69a37dc9a270ad88989e4868e6cf8e4cf01703c0b1eb6aed8c3f8af431d819e68b6947ae134d360d87e33668cdef0e45e11f5cd79329ff95ed00e4a6952750f1574f489394b5fde3c6f07311a1e5d9c4e070a0943ef9d4a130a9e4b0a80c256e96ca5042961766874898ea0f772b78d1a33e866351a4eb425b822b5ad596cf249bce8ccd6dafb334b71a503fce2c8fa3fbac9943910ce5ff02ebbedde8"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #5
depends_on:2:3
3:exp:3:hex:"1c60a31760019e6a571e2987e57e19adbc1accf3edd44e501061cbec331b197eb68d0fa8fa5e3071d6f8b7c9c0a3c35d":hex:"d4d84dc7311096791dd9c9d7f2cd291071f877afd86b9644427482d09ac9df64":hex:"6473f4430398d7e5a2d218bd05e6aedac1e317269df3e4705d56c22d6e7abb0f":hex:"379649b56a46399b9ab5f3880e1a73993a58cf52821d3cac87890aa0e6322a94":hex:"d34152fa12fa341d0326a525aa838558630013857747f02634d24e9deec2da12f52fb405e7f1b973dc2d982d26eb2ddb4b49c35a9308b06809171dc990a4248e6da0c329a259f495247b9fa8c73af06604db7b629168e34081696a043977dd29a3c0362d5895f9aac24bcba58dd74078ef6f8d33eac864f2e6cdc479da3d224bad8099d011e914b6ccc3631a7369586e18c71a4087de0d47a7c29a09c12438c7de2d4b47768f47685b742c25b860e716c31e2afe4ce6d92bc2fb9f34400602f9"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #6
depends_on:2:3
3:exp:3:hex:"eeccce7f7edc52f0e2559250be36526cd1839151a77c59d527f66fa24ea4d86b3fb298c8d72b6a0a8e191b60259d1fc1":hex:"26d35895723ba3d431991a0e6fb2154ae5bff7e58609c926ee3269afc5cd631f":hex:"227b9a71a6c17ecbf627161fc627f8f6f1a28ce39772b7a3d36064e2cc6dc4d5":hex:"eb59f780c5a955e1355dfe15cc4a4e90a6ec75584e63bd0de734399f47b95070":hex:"78ac77657dc56b23e617a9b38168da945c1cf52b6062c2b10f1d7a3814d9b9efa5545da050b0db5a65a2d2d2e02fa12e97eb970fa8e83c524bc809d675e0db35c9762323f327f1edb9b534ce16d02519750b41ebe51f747e9da43fd1afc60e46c7aba72e15cc7a22fad19ed55189f287a14737483eb6b32d966c3e3969d8198f01f2ed841f20d7d2e156d6285a29e07f6d7fff42bd575806c4092522b03e0d1b8df0cc88f5b82d24a7fd0feff6ada03a60ef2541a4ab041a49aa973c7163bf94"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #7
depends_on:2:3
3:exp:3:hex:"86f8104a081c9565dea5652f20145a068dadff125debf818262d8931cec6ba937fd5b51affcebee952fb67f29f197267":hex:"c7ba5ff828855e6e78fa1732d63aac1f49701ff7ac1f3506e97941f998b4e9d2":hex:"6917bca15db53a5359e5c4d30ab4d37fc6a1bc660faaf2e74864cb4aa52e0e02":hex:"eea8db0cfc04f8de14d6053442b5b4f8733f822df4be5966a0de8b0f7d2036f6":hex:"562b8b2fa3bb15cfc3f7e57f309e31b13c790c928ad6b32a005f5431c28576c5706c4ac0dc2c7a4435bebfa06571278f485932bd94382efcf727b300b230da9b9e9f377d2659ac75dd8247351d5ed8185effa0f255a2a2136e63717e0265d561a34c75ecee1c774c25e33fd938696825686acf9a419c1da3fa1ce8f695e231087aa0927dde6ab487dc61291ad4700c5c608fab1a418f6b30ff97b8b8f01ef8164287849a77b21be5d11d82d0c19056e07d59a30f6c576705c6cedcb9f22d3a8f"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #8
depends_on:2:3
3:exp:3:hex:"0db6f73ab6d31ddf8f78d76961310d68f081c9e6d5985e1883978c2dec48d9f58875ab658b3a8b795bf464af9470a90c":hex:"d886936ad36549a10b5dc5d6e21203abd75ad63f826794b4adaad45a70424c5f":hex:"76993d3bcc32546430efa30e3b30acc34c7672b6e18c7e2e9a1f1cc26f7f7a22":hex:"54c72cf3457e6f5f6b35dc14167fee9383c44c867f233ec9d81f187bce438c0f":hex:"c3523894d273c85d605d39f5b89e3388afad8c20787897b903d8db7e3de7590340174be3abd7598daba7806ab934e0feca02bbe66282d469ec01476bad5ccba59fc14cd9549bf4af49641f4326b1052b179c89194d21bec0501c97ef2c24aaf045fd348b765910fe92c0039612e37baad2445b57d9db6c1e550adf6688a79b117f6b7a37e0209d89f194a1bfe1ff2e3b28f0454b383af8872f32322bd5313a3c9ca48d33eab7c3807bb98f8f402c43b99b2176f0b33be08c7e84c86b26e971ab"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #9
depends_on:2:3
3:exp:3:hex:"3b1ffbfae6ec54a175a80a33c8768fb60f2af9ee2b8620c4e800a17fb9241ae47f77da414f67b5d7b24dd100355d2afb":hex:"0d50cf61e2020a909ba6e36ba4d0a394579d3e4377cd4bf0068967e8d0fe7a78":hex:"5d4efb3f6e6503c5d85a1c43398d0441ce8aefafaabe2f6d86988a24e033f502":hex:"cfb6156a1b139abf21c73001240997ee1a8cad91a4bd777c0372c1e8fcfd3fac":hex:"d3ef776c8d77fcc5e947bf53e0be11777e69c7dce138f24c1a3212d1b6b932580371479b7619fc82f029d92969628f810b54a8fdab8eba799e750945f3545f6a96226bc760ad736101516efff5d8581f5864b38c29885d39843a4adca17046e1e388c890542988797b576da64804eb4101638328d3f8bfa398ffaf83cb7290a2cfd39ead13290ae773a8958b33914ca02c8ff6a069aa25ac8b36f6f0f1dcd8f1c5fc838083a64ae7ae11b85be3a9fa80ed83949b622002e91776273fa32d6cfd"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #10
depends_on:2:3
3:exp:3:hex:"19767ce1f18aea366539642fad400a03a675b2f3c0b1cfd49925e535b2c2779043c5a1c57ef550acae733729516aa62e":hex:"6bfa882c1e895eeffbb85578182653c022a4703091529780c075cd482809b990":hex:"11236df1dca3de6e3e3a57d2741d1b77f15f45b05beb47cc500100b31188a42d":hex:"98708a88fafae56c4f6fa780c6c0e33ca8f2592983b5ae607146cd6e92204416":hex:"b6514a3779dcef2c9ea0ed7ddfa808d045c5907314c358302ca32b2055987a38ef601637cdcf77b1b8f7eac479f8f18972013c2e1a6dfe612e8a586dc529ece486505534c0ff3dc0b2049a0e46d7ac504a1fdfaa9b08d9fa017c5803415fa391ba7eeb576fd6ddba4404feb46e7cde56e090dd280be5edba7d6df9c5ba7d3454bcbd4d443b08fb51a117c1d5916f225dcd6c1c3fe2b2880f4d42962befe3ab76bdc086e29381dd985206e3e00ce722c9c040af5ff4cd4a8183b446d91b310845"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #11
depends_on:2:3
3:exp:3:hex:"f63292bab50668eb14b83975422a0c853fe55714a9edf9d8a817ba0b2f26ec40063a86ee3c79c694273342a02f68ecd0":hex:"3c525956838e26b77b8cfc37f024ec398ed825076dbb749cf49a7d868c201e6d":hex:"d9a41b47c3bf8743099dc8fd228f77dff01ae304761eaf57d751e11cf094bef1":hex:"b790c37dbda20fbeafe9d1339a1151144253bdfbffe17ba87240eae49c606bf3":hex:"3586b63315020b3ba1121314a0fa6c66d57de0ec44abeef7b7325e960832b7944cb0a81a747ee5c5d3163001536d3e5ad2ec869b0e5ceb14aee2e6915073619528c1421b59b80254dfc3cab0584898b0bca72c76ae25f52b7405b9dad38cb2b841e1d6a34fc5b277129db49928b2f6c0dd22900ee786ec128164ed12eb324b502499f1c5c89be2101901476b39c56034cc293e320e63a3e019186d4eaf9a098136e8c0ce7f6326f84ec95992dde2585ad3945a9534aa2954b8c15a48e3324d76"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #12
depends_on:2:3
3:exp:3:hex:"3df74683f298ba48648714e384989145c1b84246736dc275636809d64c75ff603056e703c435eacf21c0bb152d9fc2a0":hex:"371217ca2337db03c4d06714624fa11f90d5dc575bdbe12a457c610be066dc2b":hex:"f26b9cac8df57a33e4b5868c36f2b9322994a98269dcbd7956b93d147dd0aa27":hex:"0a6db86c3abdc39878045b8fc2d5f0f77a8e298efdacb4cb9f74762fc23b96fc":hex:"ff5252b7a39460a73094b9d668b53d1932243caa885c0ecd850612fdbe7e46cb275d079bb75a6b050191282ccb11ef255d52cb763618c4b624560d79bb9a5bc99319783de43c152e7aa7c4cd879a75869285320a9b749c897bf07220cc1bef1edc494bffa6ab93dcf839dc15f6f2e508b9e216e2a1786b75abfb01bb7bdeda722b47af895f551670f9562d9f9b78e98ee7ea5c5ca4f836af5bf153925b2aec055eee8164edf3f7b72e24b1203cfae1834705f74cac8c6043a3c2abf6bdf28fc9"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #13
depends_on:2:3
3:exp:3:hex:"53d70692f0f4dbda23d78660f0f08c7e70ca94441f1440348f76108874d13ea14652725abd1a94d315364416c90e662a":hex:"6deee916ad660811cf05b5652f32df4e97f544ebb57762617359159cc9a425c2":hex:"acda427eea1c8c6791be6e4d2b60be30302abc84d5c5a13be7d510004b8710c9":hex:"d27d7f598a14205c45788665cd062135b6b65547d3188959e38ab675401d2b62":hex:"f77f9de60e95da3f1d0d67b5dde29b31df59ce980ebdbad7b5e0a0051fee39e1d6fc4311f21efa016039bb05f3b009b223be6f2c007b468388a8a19bb468c7b82cc93dab3e160b2b72fda1240fcceea01c2638e9c8bd2d1ed9ff9b55bf69fba4b6ae8e694c150896ac6233b75567993f9a9adf25ca0f0835b9991ff4b8d3f4f1a3e4c5f9866d98b7a75196804f996492a61dbab5bf72f87658e2300a1b0777ef7f43ffe8962f6b6708d2d91dcdf6b430cfaacb3289f74cb0f67370bcc9af249c"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-384,256+128,256,256) #14
depends_on:2:3
3:exp:3:hex:"85186650694f742c3f5f228f943788f05602d4827518908fd09a1fb445d8333db2d65f376d48c66eb9e0498999e1ff49":hex:"499928c41841324749143be9cc769899c38d6f6e6933e56898896fabcd802931":hex:"9574ca51f21865c2fb0efc75cc9d90ec5e9c43104979cd64d00ea5544ea01c96":hex:"c0df840a18d7584b62c70b2f057bf824168edb673cb517cd9dac89a0fc80c9b4":hex:"b31e50202f883a8563cf129a0d5f8a33abad79d8ec8a97167ed7fca778e5892480617cdf50b5e51547f7ec1bede35020a311572c61e33e9c82968e8f69586daea3dc19063bea56503f8ca482918d229949acd6f1c52cccdc5f7f4cd43602a72a5375f3aabfd2834ee0494823beada2daeccbed8d46984d1756fe2207ca92186b506115f6de7d840c0b3b658e4d422dbf07210f620c71545f74cdf39ff82de2b0b6b53fbfa0cf58014038184d34fc9617b71ccd22031b27a8fc5c7b338eeaf0fc"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #0
depends_on:2
3:exp:4:hex:"35049f389a33c0ecb1293238fd951f8ffd517dfde06041d32945b3e26914ba15f7328760be6168e6aa9fb54784989a11":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #1
depends_on:2
3:exp:4:hex:"4cc8214cd7e85a76bfa735bbbfce926c0323fc348de6c05ed1800c2c8f58c6b1001eb1f6b29b35242a3f8fa2e90003f4":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #2
depends_on:2
3:exp:4:hex:"d046270e6b7997cd5f4e9ed1193e55382191f78547a660854cf60bb03d039a3950cd147a3445f6d32d14cbfb9da0c327":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #3
depends_on:2
3:exp:4:hex:"8c7c80b169160c78104c205e4492a9477e6f7ba1c3bb4daa86d222deb6241bfd2d2dcd5c40b46fa553ca6a2f6be96991":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #4
depends_on:2
3:exp:4:hex:"cd394508d86c384c0c998b58cf7017b7124269428e4cf39519b5815cc2d88734fd2cbc87c79063db588d90b9cb1569f3":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #5
depends_on:2
3:exp:4:hex:"a14be417001030f6a9c543f829715b075d0efd8fa35acc7eed02a1401c6f59dfc87b8b9255e62fcda6a35e52fa4a6f9d":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #6
depends_on:2
3:exp:4:hex:"b8ceee088f3b13dbd1e7cf230449f246a456f504d63fd4288838a50ab76576a3f400502913cf57cb2341c5e6a63fe9fa":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #7
depends_on:2
3:exp:4:hex:"3c1e8a0199786fc268ee0ca0c0446d7363bd781069cf3a3faef2592cba06ce1e70c7c691af73d6d59addbd6e3f646d64":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #8
depends_on:2
3:exp:4:hex:"e8a0925bfce66dee7e6a54fe0311d259bd7f7a22b8576d64840cc51c731212cb1763365deab3ab82de9996e5c8570eb9":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #9
depends_on:2
3:exp:4:hex:"c493ad96bb20b2480bd3122b4b1ea51379f5fa2bfd8bc0fed4080995b162c609b6d6197f432c8597163feb9c5439525d":hex:"":hex:"":hex:"":hex:"764d3e4459504b490eb1db7b5ab8e6413601e449750534f4c4f70025026f87217010eb14705eae6e513796c7f20ecace32a063238824b3fd6956810066930bf425a1c585221c8f61ac64aeccfe8a3e33d164d02d5434e9e594b7ff451601874d268a2fd8de9922c36e67d8146fe553889a15f624d499a22f5109896758f30bb98f70eac11da1ad48e99bb4422acc5b97295094324eecf530525c1ba150886d053c84004c265693a4419602e5e59bf120de6ff054d0c7c96bc14e9b5fe1290c08ebebcda21744c04a2e78964cb2b52f8e6a70930fd1ded1f0edbda4deff91a3310019e967df3fdbfa228bec9897412a748201649328b7d784851fcb5ac1251f8b"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #10
depends_on:2
3:exp:4:hex:"1e868c5fe4b59e6d4249854226bf1120a74386ea590e9c35c58d7ccdfad56d71dbf557da684289e96cbdd66cbd9cb879":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #11
depends_on:2
3:exp:4:hex:"55bc1c7358dc334b26412ab472dcf4210740cfa0ea688812d8b1a7fb257b979edbab14240cf59fcc8a7007553ac480eb":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #12
depends_on:2
3:exp:4:hex:"d894820d9cb243859447cd3a3f6cdd125a9c4faece6ad756d288a15c5d24c39d776c5ea9838c4c34f39f12c1a9df6700":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #13
depends_on:2
3:exp:4:hex:"17facdf2fca2e1134674ea8e8daa609b4477f415c6a13a5c157f3fb7727dda6d3c1dd89ad63e781588e4b3f8cb1f2f6e":hex:"":hex:"":hex:"":hex:"f472b4c20bf07c170b3c8eb682469e88680d1fa5561d72b864c5c438c95c4c8a3e61f89fc30d5fb4e843e5ed1230778b48c467fa46ebfb7b56220a610483827f3f7f8ac307f8aa57a68922a06c8fa5de732a0d05835cd48690a2b3f734e4b7e74799ad774579a9eb296112f3e2bb68551af0e9e0e5e0bbb219ccb6c78459dc68a3663987156a50e72aebb219a1e43b5603dbd8055bf1e76a4468caee86489ac9a1a9a66ee7b193484ff3bea84341b62dab124a43e38945cfc99f2c4c15590fe180bb3e6eac544483aef710278213a83da85a38b6d140f33654c9d4f6b8ab3eacef1c57fd2237dbe8adf23b3aef6ab30327ca119b9e1e95ecd068aafae0d07a08"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,0) #14
depends_on:2
3:exp:4:hex:"2c13e44674e89aa105fc11b05e8526769a53ab0b4688f3d0d9cf23af4c8469bb700ac6a616c1d1bb7bd8ff7e96a4d250":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #0
depends_on:2
3:exp:4:hex:"a3da06bc88e2f2ea5181292c194a10b3db38a11d02ac2f9c65951d0c71f63e36c74e5e3d7ba0193bcd6839e9ae93d70d":hex:"":hex:"dbb7270760d8d262557807ce746ff314fd06598143611ab69bfc7e10ca5784b3":hex:"8cdea882f894e5fdc5f0a0b16b7d9ac8cde35ed17bcaf2665564d4ee74059e29":hex:"cb706b90e88380e5c1864458454027821b571dfeba0da83f712efb107b8752099514ef87b4488fbfa3508a00954bb03090766d2bbd399e71c86c7967a4e8ded57095a29d4cfa01f8d28c97e81a4cd4fc5be7fb32a0d6c230cb8760e656b74fa7e18e2063ebee5787958b272fc5de93f0d6837e55f0c360dc593c88fff30a428cae37ded52f825646e04133a19790c304e4b1f040e10439c5edf454e6f71b23eeb43cdbe7b0634b8e283a97806073f7f28a43de2d0d969b3eda380c185b785b9101dc905025c9cdb499e594de0f0d3eb41922c20994fe2c403dd5bf01e4b2c3ee6654d6ab9cca7d4d5ae59525a796119547eae6a3cbf8ad0e9b1de3c4d5a804e4"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #1
depends_on:2
3:exp:4:hex:"462cb274b7def1ac0f9db135c8fa2e48599cfe2badf2ae9f6d06886b25dfb0cc250461f0dadd9e23cc6c08ddf4ae12b9":hex:"":hex:"b087ff5e230284aef4c90b5f9c48fec91b486f3d936d422475a2b12ff47a05b0":hex:"150a4ca383c3863d9ae3212de9ab9da7442fcd5367af157714d74c149f69eb9d":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #2
depends_on:2
3:exp:4:hex:"727337765db704e7b9d23dd139e63b5ac97adea990b7d04881b6b2de045c974a0265210aa4e336ac32f4b0a428ff272a":hex:"":hex:"48b452cbaeb990b6ca4ba64ae8f2a91d792ab83ad499093d9c4566ed8c7cee9b":hex:"e7e32096873180e03c9f7bb33c5af4edc3fb9a36113275839302d40f0890dbad":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #3
depends_on:2
3:exp:4:hex:"8ce3f77c4ba4f40d4eb3e80d03f9b138bea725d44f7a47f4a1f7ee3afb45c2a0e8fa75683ba03964a8e3312ccc6e1b66":hex:"":hex:"83260430843b586cfa50ab51120ea5675d63402074d45b0bf80dfbbec74fdc63":hex:"0640b6427bdd6ead525962b228392b3c28abe131719feb0c0f738288ee87acbb":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #4
depends_on:2
3:exp:4:hex:"96b0d3b13a65ae1010bf40e6e2dc6e6585db8fdb8fbd2b272611e51c62e1111ae93babde207a42980c9ac9018ab01153":hex:"":hex:"b67c2ecbc4d4c46c3573883b61311a2655cdff0e01a12a20ea0cfa4e91034c2b":hex:"9ca69103d5af577da056d4d5e95f53be87aae4689918bdf0d011789f2ccba9b5":hex:"63f05a9815c2671298e9caa06b0746767fdcc00884eb1b30e53b16593508bb75dcaff9932230913f9b62cd0361af168993ce7b6b967114e2612c8f9c376104633ad4eae2e968e455b96d1d5ed6928eee9acb21bb8fdee7bf525f143dcc624a66ad42f1bdbafc19b165284f2c771edc57dc9092ffae6ef8acb9f8fdba496607c54b07f3ff4d1721f45db43f8ed5c695716b405b57034cf4f87ab487a01057ed449bd918093c532fe85015f0c5856cbd7a440c33c7968dd25330f78b66248873959967e307f9c9697803e8b0939fae51870ec533ef7d17e227dcb68ccf270299e65ed8483b9077831e010e9dda3a50ef7b008a0762c8ac5ef42b7e2ecba450d7d6"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #5
depends_on:2
3:exp:4:hex:"49913e04b653d82abc54cbddcdf898c409819dbdda4af93bc97b434dd1e319706504b1c76f34ca6d9dfb181c7057ed8c":hex:"":hex:"68b8f6f749ad588ff2c7477fd7c55be648134d57be6846674f2659d75785c39f":hex:"cd7b2d7b24070e501843f0caa20666fbf963760893f4e277d944991ec965fbe3":hex:"67ba01fe694d8f9621d47be0dd9119b8654d028e4c095347629afd02e96fbe6e4535d1666ee0331a6da79e703571ea0983a0d02051bd95dd130c7733012424b79a0bdfbcf72c9cb0c6d6ee408e2f0de45cb084d8182d1b8b4d389b78d0e3fbb7f3c8891ef522f077851b2463bdf1399d178dae3299a43b00f48cd1068e17f42615bd506878eef5fcd5951c24641b58f7a563240abbab5779db1e44bc2c66dd48ea7e746660042bf92b727d622bafebc05de309c24824ddd1d9ae86034a8694ae5962f61ab6e76b435c9dc8b370d708adc4d6fbbfc44644da3f4d4f24d3c95d958de143531c84b188445b6840775726c87b1b058dd8c14e4648973d5a91a152ba"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #6
depends_on:2
3:exp:4:hex:"4687135763568418f6f30af400d37d794f712b10a42087fd832d840b9e8b1f818dadd1aba09e78a1925ecd9ee0d106f2":hex:"":hex:"ac00dc729c5526698fb80f685ffe93e9c25bf93b22424c15c20043e1fcafbc7d":hex:"948555d8a6e0473a769b7019e6909a8565e386a624a47a1f9c96ff5e6609a894":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #7
depends_on:2
3:exp:4:hex:"4ccc3c6cd73101efb7833ce1195b28b3aa3e5628db02be166f2a7f6bf7e8efdad5ff3f1c375ef981336af28252756647":hex:"":hex:"8396edacbe629826be44543bece17ede600f7f877d1138af5e83c3ec44b8b0de":hex:"98545ad6268e604fedeacaa10b727ced0b0e284a00c29081a41c0d2e3675bacf":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #8
depends_on:2
3:exp:4:hex:"85ef33038e0bee3e40ce8eefd3648e89c521ad537b0c8003617824b08a154b75c89f036845a6f24fb9a15513ed28eda2":hex:"":hex:"2c675110a2bbcee5c6096cfd8f363441e3473664cf09577a95996928519a9292":hex:"f1db097abed76cdbb1fe6aaba94bb51c2af8f43c5cdd2eafdf6b40a234d3897d":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #9
depends_on:2
3:exp:4:hex:"77a48fcd8cbea1be145a65c9e20cbc4e660dd439c7ec7e2dabc6f0430c5ba716182f05e834e84e89565714fe8ccf0de6":hex:"":hex:"1b838d460961b8f1623667fb316772cf50aa462ceeb58c36e2a6482ce7aa9f9f":hex:"ccd4048bae7f8166c35e932cf3a09feb2f97dbb31af61a3fe5e4edb881ba6930":hex:"af5afbb8d60d77c36c20a8f4c20b68ccd7fddb703d1ae83b5981605c4483e4f092329bd75aaeeb6fb4e6552540bd772edba5e5a96dd227acef73241257fe8774f757c673dc3370423de5a85b9118b5aa98682db6a89f520174a25e8e4b71f83ef432a91ddd8f69c1431c40d282d7e789427f18d9c5673131d5d3797d1335ffda64319d642f5ea5c1641092893a4008f076b649170916a03e06f0854848607c6c44a9f27bd3b17b293a914a86139e9a1b11c8652eae3757162f9f7161a2ee6f412a40002781e8fc8b80242331528225e70b9b23c6b2c970db12eab61bc290fec9b4c6c13d6454d7336f439d9b4b1df59248ab84e3a79d7f37df07e88c20f9ed92"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #10
depends_on:2
3:exp:4:hex:"71cea1ba7a7dc792ca33288ccfb67570d9b1eab34e35296209db20c6676f174df4e062d1f660522881aeb11a651581f3":hex:"":hex:"c9667d28614fa05f112ec31487cdb3d925f2cb312202f7d85695a8f7336573b9":hex:"6363dc485ddb9bdd61db33fb1beae9bfe2d0e7788a86b50774f8658bac094214":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #11
depends_on:2
3:exp:4:hex:"3a23653a34334db7d3abbf747d9d47d6b18589ab3516b0600bc93517d206a1a9c74a51766beec0563db655273d5dbcf9":hex:"":hex:"89922f45e6637e7fcae0a98d7ccdcf36650bbf7fe3253b7716014047a0983e98":hex:"5d7519b3f442e1246185e1e7a56fd37473f18824f3c9d21656f54f1fa8d2947f":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #12
depends_on:2
3:exp:4:hex:"24cd11e75f2b0ab60c5b7a35020d716cea2e4f5b7748327c0cf355b11805189334889dc3198f13c36cf7beb42b2a1a6f":hex:"":hex:"cf9571fecac5d79d65617a885815703de3459cf739db097f8ff2ee557d0b0745":hex:"2282cbdba64ac2a4053c070efd1dd0638fc31dff97dfa15f76bc077bf173a821":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #13
depends_on:2
3:exp:4:hex:"4931d76a7ceb2238c1f0ed76be24d2fe1a925d1084a392fc8c43d93535da0e9351e52abb58a9bc34c46f254b8313d387":hex:"":hex:"92a8eb05034555680bc937d0d958e820b09785009e5e05739f29d9af17a63976":hex:"d37465a30f837fe05f04f6b7ad4bb1c83bbae83f9c78f027b4831f5e2ad2dd78":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,0,256) #14
depends_on:2
3:exp:4:hex:"ffa596ed725daea92273519c279d0a26be7f77cee1fc4fca44dc99b97ad8125a3172e5a36ebc671df1fcaaa54bd7218a":hex:"":hex:"6cfccdd8253cc5b284701ef8d16f8888f79100373a7df50f43a122591bbddafc":hex:"5795ae5be47a7f793423820352505e3890bac3805c102020e48226deab70140a":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #0
depends_on:2
3:exp:4:hex:"e97a4631d0a08d549cde8af9a1aae058e3e9585575a726c76a27bc62bed18a4b227221d5fe5a5db9810f9afe56a3ee78":hex:"94084b11d55e0f9c2ef577741753af66ad7a25b28524b50ea970105c3545e97d":hex:"24c81d4773938371b906cf4801957ac22f87432b9c8a84bc5ac04ad5b1cc3f57":hex:"c8c878451e2b76577c36393ca253888c1038885bbfdacd8539615a611e2ac00b":hex:"761422dea283262998c0ffffefc77de2d395c818b9cf1ac2bcd1153235e0d8b63199c51e195135a75f1f87b454484ecc560c532c7ba5923c9490a423c177453459d81efc38ce2939226043cb733062eae303a009b48ee0cf3c7e40abe2b57a70a6062c669a9fbff20b4c94b4ecbc5f744a80d7be8134359581d441da921737b1329470b214f3e679fb7ad48baf046bac59a36b5770806cdef28cc4a8fd0e049b924c3c9216e00ba63c2ff771d66b7520dd33a85382a84b622717e594e447c919926a5b2e94d490ee626da9df587fed674067917963fd51d383e55730c17a124555e2e46e1395c9920d07dae4d67ffee5c759b6a326eec6d7b3ba6dee012e4807"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #1
depends_on:2
3:exp:4:hex:"5c96609e9de807efed31d3c2d63e284be5c44c1b5ab84672664de8d8d8e2f8181b95a5290fdafeb05dc902a9a7bd639b":hex:"135aafb3bbc89ef1e00a2a35ef32f122b7511cc55d86e7822a34859b630b4d29":hex:"115774904a953af07936e3efdcf6054b4c534dc8654f563bb10610444d30625f":hex:"4705ec7525e63919f7483fe76cdf7397b19f22d2a9d54b6cf0ff9abcf0a7c46d":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #2
depends_on:2
3:exp:4:hex:"4cbbd0538535994cf00354ff8609ddfd04e80dc4174b9542cdab52385dd968ddbef8157a6e3f26f040229a450f8e564f":hex:"ed81729d1aef522f7bf9c127207d8a680ce4432964ed4025b5bbb12964374f3e":hex:"1259073b57358935b7149fa4349793c5ff28d3ce98b483ec48986aa285451abc":hex:"b350a4e931bb5db50a866aa3c01ead7d48d5859bb97b675e77ebb844ac832eb9":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #3
depends_on:2
3:exp:4:hex:"9b2bb0f34e6f0a31eff00e6604e6ca77643f69895877f77197a06e2b42bf047b3c1ee55a2a28fb3579324a54458310b2":hex:"895e7060956784e5ea113ca785214bcf608e2a53c175e6edf5b78f1ad90e67c6":hex:"c0b1980d57fb797c4907aad1fb5662bcc8d6ee30f6bed951e77c11d1893346e9":hex:"af3357fd21fc04d1d1bd162b94bf129c45d41fee90366a180d98d41325336b5c":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #4
depends_on:2
3:exp:4:hex:"9c8306c6941098408c56518a44d3075c22e02f19a6041d2e9c4e296fda435db917c99d538ab65f6f1bfab0d479a1833a":hex:"3a80e9f5b71b242ae07ce7b617057dabae189c5468da2cf049b5b529abc877d5":hex:"3c151e92dd3121a8d2d11604632df00cf90706d3e843737445de0f2fde1ea924":hex:"f53cb5fe673201f5eaf4115382d48ba45be405b37a31a56e41d1d76202038b06":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #5
depends_on:2
3:exp:4:hex:"87a8fce521df0a2e26f1b1f9c7ec9e98968474915a085a95cbdca7d8c669e08a69b8c3c3df07f9ada368be448938bf92":hex:"b1bfaead04743bdcfdb193d32260918ff803abbcc0d5ddc50439bd01f6e42a3c":hex:"12a07384e9c74fb3f33df1a089dddb7d416151a0270d0c0216e085f1ec4c249b":hex:"9b42567093112cb5889703b77b4b372276b5bbccadf86eeb9ef6d3cd395b2acd":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #6
depends_on:2
3:exp:4:hex:"69d667bde79e41cb78742426ca5ebd48086cf1ded5cad7293fcf910e5ab23cc8cad75bd989c3ffd05817d1aaa5493c05":hex:"5f72346eb50ea82cb111d5b3c91dc9b7c61c92fa1a062177d513fb616b1226d5":hex:"0465b8aa89d9cbbe8e1cfa2e64e64b8d1f5dbec7f710a6d37fce898e3f81e57b":hex:"173135f31c2320cccf513e88a21f2d207e00cbe4330d2f550e0be77405eef47a":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #7
depends_on:2
3:exp:4:hex:"f1f6e5a55fb2180de436d48115aa1aa38a6242eeb0959de3690f259c1d8395a5862d1ac4843404d25215c83bca90f44e":hex:"f467ef083c745a1bfc9be44f1d468b2518e3ff1c0cee6819fdde354d4071b17e":hex:"fdda9f0888c4439cded15a768300d163c1e326ee5571c22ab95ab3e44b1676d2":hex:"6b8d60c565604c8fa8d7adaf0b07ed268a491fb79794d2770356e191daa1cb50":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #8
depends_on:2
3:exp:4:hex:"0db9d437153149e101d5818b263b975735994dfc33d8b3f158a05760867757ab438a5024e1d43006226018c378af55d3":hex:"275bdc5fc78b0d8afb5c8aa5f7854c319a81bb8cc9300210a9990fb7933a352e":hex:"809da54d1830545672f180fa3e0441a0d3fe472e7cd7a6d707fee5af7e9b21c2":hex:"ebe66cee6efbf583c881a25e346ca7d99741dacfce0d8785c659e92774e26ff2":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #9
depends_on:2
3:exp:4:hex:"4106f6ba6a291fa54e4ecfd9fa61b961554e4e8e03e19d9bfd82bd35c3471e8bc5bdcd2f810079c1bbfe906929e88d27":hex:"5a7e61b86ca70939e64af613a667695c7c915e667c79998e76e55eb33fef6d86":hex:"86c7d5883aee568aa74d25782019fbd6f5acf4196752ff3d1dd96ec1e7436424":hex:"3a5d80e739f5a30e6bb507d82b60ff987d5bd9cbbff4b47daff278a3252db3ef":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #10
depends_on:2
3:exp:4:hex:"5d1fcdabb70dad1428c8be291720c92b8565f331ee3438d79bcddc968efedcdb9319f5ee91124b93b965d504211fef04":hex:"6c8c8a066c6208dbc18a40a30b9f689048877e038bf76d65acbdde7ae4c566f8":hex:"bfa2e9ebe0d70d3b62cdbd78c775a62e0e22fa75f168123a336b66b9a2b68c06":hex:"e48b5245ea241baeb7f665a9daaad662d7b2422c3e3711cfbed81d73691864ee":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #11
depends_on:2
3:exp:4:hex:"9fc58d0785adbf033ce6642dcc9a861df44a35e89d06b346b165074a048b500994b4c0b3e27306b8c805c97b0ea14bb5":hex:"e02f7a856266195fb5f4810232cd5c71a4465e1d95625c01e8e7eb69c63f6796":hex:"7cd18b8d035b57bd01464280abe891b7faf55f9ed9910d9a148b030340c67cdb":hex:"918c4d43fecf993227f7c120d239a30d3c315602800d6d58b9e9e0715964cfa3":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #12
depends_on:2
3:exp:4:hex:"d43927d1e633fc3433536cd03617a97a3a10a7ecad3f0c781602829f8ec7feb2dd5922f2a2dee51db93bcf35100a8364":hex:"3335a02aba1ea28d2e56973e21109e0adfb5068613c447e625fd83a8d0e34494":hex:"bfde33c52407d3137123812c4818ca1e4b61878b8f9dbaec47935e3948a88d0d":hex:"42597cf03bbee0e003d8677159918f5318402f7329f08e1d93c850e2a2a2f1bb":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #13
depends_on:2
3:exp:4:hex:"0bd69ce9a0a66dffefba83ae563e8df0fc6c7d7bdf491bf52cbf3f3777025cdf92b32217f550a1fe735b8519b44b040d":hex:"820da3187bc879cd1f40476fd9677f3b67e02b35b6632ab68891e25f10555b69":hex:"903b882de013695b4683316ffbd7c7809288d54c72e369f70cf172bff85e5629":hex:"cfb5f494e76486ceef12dfe1bafd6ccf9b0754d8d2306fb0c41c0f4e921317ef":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,0) #14
depends_on:2
3:exp:4:hex:"45784684d6004731689e33e45b344d7b68dc4fa841133cb2dd65c4b326dffa901109dfac2e48bf17f2fea33b412dc653":hex:"7c6f4675f7a0b8c424d5be9e809efa305493874d9a950cb343afdfb64e77ecb5":hex:"2b2dbe3834d8be93f1396b19be83bd96823dd82740da71c5eeb7b21865021884":hex:"49c322fc1bec86d3e20628d9bdc1644e6f5e0237c7c694746bfee32a00145696":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #0
depends_on:2
3:exp:4:hex:"e97a4631d0a08d549cde8af9a1aae058e3e9585575a726c76a27bc62bed18a4b227221d5fe5a5db9810f9afe56a3ee78":hex:"94084b11d55e0f9c2ef577741753af66ad7a25b28524b50ea970105c3545e97d":hex:"24c81d4773938371b906cf4801957ac22f87432b9c8a84bc5ac04ad5b1cc3f57":hex:"c8c878451e2b76577c36393ca253888c1038885bbfdacd8539615a611e2ac00b":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #1
depends_on:2
3:exp:4:hex:"5c96609e9de807efed31d3c2d63e284be5c44c1b5ab84672664de8d8d8e2f8181b95a5290fdafeb05dc902a9a7bd639b":hex:"135aafb3bbc89ef1e00a2a35ef32f122b7511cc55d86e7822a34859b630b4d29":hex:"115774904a953af07936e3efdcf6054b4c534dc8654f563bb10610444d30625f":hex:"4705ec7525e63919f7483fe76cdf7397b19f22d2a9d54b6cf0ff9abcf0a7c46d":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #2
depends_on:2
3:exp:4:hex:"4cbbd0538535994cf00354ff8609ddfd04e80dc4174b9542cdab52385dd968ddbef8157a6e3f26f040229a450f8e564f":hex:"ed81729d1aef522f7bf9c127207d8a680ce4432964ed4025b5bbb12964374f3e":hex:"1259073b57358935b7149fa4349793c5ff28d3ce98b483ec48986aa285451abc":hex:"b350a4e931bb5db50a866aa3c01ead7d48d5859bb97b675e77ebb844ac832eb9":hex:"215cca589f737df48d60360c4806ed548d44938c2bf5b1707310df987edda51e5092a7d9ca4955303ac59bfa980ba6e1819ed1141978c3d7df1125f5c4abec5b15bb8f5fd0edb1f26bcebea5aa7c8d5d32e8a5b608f609d9dfd765074b23cc524596a91226b726d899e42bdee0321eeb2dbaf63d33cced6890c19b466636df05072f007ae60a2364dde7f82315e3e30e63258b8abd12f18b6ab3d384cc9349e56dff00c3f53a86a301aa7205394199d32382096f6cd9db9646a92e73c3fd1e53c28a91683031c1ac72bb85af50be669d0e1d7b05a3bf1fc9720025c1e39e1f09d18d2e9247f726ac691a1c2321a667e6bacd7d77a57ce46397db1a91e7908ad5"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #3
depends_on:2
3:exp:4:hex:"9b2bb0f34e6f0a31eff00e6604e6ca77643f69895877f77197a06e2b42bf047b3c1ee55a2a28fb3579324a54458310b2":hex:"895e7060956784e5ea113ca785214bcf608e2a53c175e6edf5b78f1ad90e67c6":hex:"c0b1980d57fb797c4907aad1fb5662bcc8d6ee30f6bed951e77c11d1893346e9":hex:"af3357fd21fc04d1d1bd162b94bf129c45d41fee90366a180d98d41325336b5c":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #4
depends_on:2
3:exp:4:hex:"9c8306c6941098408c56518a44d3075c22e02f19a6041d2e9c4e296fda435db917c99d538ab65f6f1bfab0d479a1833a":hex:"3a80e9f5b71b242ae07ce7b617057dabae189c5468da2cf049b5b529abc877d5":hex:"3c151e92dd3121a8d2d11604632df00cf90706d3e843737445de0f2fde1ea924":hex:"f53cb5fe673201f5eaf4115382d48ba45be405b37a31a56e41d1d76202038b06":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #5
depends_on:2
3:exp:4:hex:"87a8fce521df0a2e26f1b1f9c7ec9e98968474915a085a95cbdca7d8c669e08a69b8c3c3df07f9ada368be448938bf92":hex:"b1bfaead04743bdcfdb193d32260918ff803abbcc0d5ddc50439bd01f6e42a3c":hex:"12a07384e9c74fb3f33df1a089dddb7d416151a0270d0c0216e085f1ec4c249b":hex:"9b42567093112cb5889703b77b4b372276b5bbccadf86eeb9ef6d3cd395b2acd":hex:"5ba662260aa0f743a33a9b552ce41d93335a855a55df11b870efacb7f75e39c978e730acce3664c814ac10fa10989fb00a39b584bb14cad2c02c309703c8ea8768d479d9b4e17402ee38cb82c5f4d80125f3e674ac1adb919cc8a988f79f531b08253fbad0a1b27fb1997a4e2c7bd5ff3abf66281e8b60987587327a9101b76cd13771e23ee2f02dc339589b9aac4f5af740afdaf494021c3504fdda8f93f77cdd8262df7d4c48f85b6eb03a7e5279db4d18f645a63eb6f53f9fb123c53a78686f0113a209b6eeef3b10cd4489875a07af863c467f25b69cd13b8e72847465fba025e25fe7bcb41745369f255df0eeffc3e5f066815ef7715680b104e20a7e9e"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #6
depends_on:2
3:exp:4:hex:"69d667bde79e41cb78742426ca5ebd48086cf1ded5cad7293fcf910e5ab23cc8cad75bd989c3ffd05817d1aaa5493c05":hex:"5f72346eb50ea82cb111d5b3c91dc9b7c61c92fa1a062177d513fb616b1226d5":hex:"0465b8aa89d9cbbe8e1cfa2e64e64b8d1f5dbec7f710a6d37fce898e3f81e57b":hex:"173135f31c2320cccf513e88a21f2d207e00cbe4330d2f550e0be77405eef47a":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #7
depends_on:2
3:exp:4:hex:"f1f6e5a55fb2180de436d48115aa1aa38a6242eeb0959de3690f259c1d8395a5862d1ac4843404d25215c83bca90f44e":hex:"f467ef083c745a1bfc9be44f1d468b2518e3ff1c0cee6819fdde354d4071b17e":hex:"fdda9f0888c4439cded15a768300d163c1e326ee5571c22ab95ab3e44b1676d2":hex:"6b8d60c565604c8fa8d7adaf0b07ed268a491fb79794d2770356e191daa1cb50":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #8
depends_on:2
3:exp:4:hex:"0db9d437153149e101d5818b263b975735994dfc33d8b3f158a05760867757ab438a5024e1d43006226018c378af55d3":hex:"275bdc5fc78b0d8afb5c8aa5f7854c319a81bb8cc9300210a9990fb7933a352e":hex:"809da54d1830545672f180fa3e0441a0d3fe472e7cd7a6d707fee5af7e9b21c2":hex:"ebe66cee6efbf583c881a25e346ca7d99741dacfce0d8785c659e92774e26ff2":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #9
depends_on:2
3:exp:4:hex:"4106f6ba6a291fa54e4ecfd9fa61b961554e4e8e03e19d9bfd82bd35c3471e8bc5bdcd2f810079c1bbfe906929e88d27":hex:"5a7e61b86ca70939e64af613a667695c7c915e667c79998e76e55eb33fef6d86":hex:"86c7d5883aee568aa74d25782019fbd6f5acf4196752ff3d1dd96ec1e7436424":hex:"3a5d80e739f5a30e6bb507d82b60ff987d5bd9cbbff4b47daff278a3252db3ef":hex:"fb146146f828e880c6ec7ab5a65fc8ec4e4d7d975c6d7c0a9bc7ce041f49799b11e235d7ac5a4ec4eea721c3323448e686ae96579233ad698a9d6fe3f5b37d87ccfce640192dcdb51c7bf35404c90b705bd97482d95d1c3e3a40152c86ab923588842ab02f4d922318a7fb84453b072c749a7f54e8ad005c29c48af6f01ecdd8fac13295e42b2077c70c7bf54e214317f98003e4cde07755e95c91f1953b29b3eecd49dc753e74aaf2b1c83feae87428be6a5aaa3261f0f65491e04c1fcdfd5481eadab68f057df3c83694c7451fded86a18470b06f1779c38efcac54b576e99eced3b5581eb5c9f7b3340ad5667d1f0d3fead8b9484a032d5f74d900fd64d10"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #10
depends_on:2
3:exp:4:hex:"5d1fcdabb70dad1428c8be291720c92b8565f331ee3438d79bcddc968efedcdb9319f5ee91124b93b965d504211fef04":hex:"6c8c8a066c6208dbc18a40a30b9f689048877e038bf76d65acbdde7ae4c566f8":hex:"bfa2e9ebe0d70d3b62cdbd78c775a62e0e22fa75f168123a336b66b9a2b68c06":hex:"e48b5245ea241baeb7f665a9daaad662d7b2422c3e3711cfbed81d73691864ee":hex:"1586e0761c4a39013dcb552a0e363e709f4303c0e575653c9b240be7449ea26e4bb1dc93f06ec958b6c06217757fc550b356c135063c00fce9d856aec0edd20735b46b7c9a8e7df780db3072fc2b314fa5cda653ba3690132f10d30ee94c8458846be75659ef3868086bcf54ff55a8db1ea65c3e747a8ddab3f2304738e0c75adfc10c23ba651ccf0de64a39cab3beef667f466391a61a87a981afe883f09c4edbd3eae98d51cd3e7b31ee179f8a4e10feac96ea210a4b8415c9f2cfeb2bc8bf51f13801dc542ba1badda1c30141d72abb1bbb35c9bb481d91db5691c44bf3526a02d0bf776304a951858aa2fcf3f45bc656abcaeea94cbdc851a914b4b3a3ea"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #11
depends_on:2
3:exp:4:hex:"9fc58d0785adbf033ce6642dcc9a861df44a35e89d06b346b165074a048b500994b4c0b3e27306b8c805c97b0ea14bb5":hex:"e02f7a856266195fb5f4810232cd5c71a4465e1d95625c01e8e7eb69c63f6796":hex:"7cd18b8d035b57bd01464280abe891b7faf55f9ed9910d9a148b030340c67cdb":hex:"918c4d43fecf993227f7c120d239a30d3c315602800d6d58b9e9e0715964cfa3":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #12
depends_on:2
3:exp:4:hex:"d43927d1e633fc3433536cd03617a97a3a10a7ecad3f0c781602829f8ec7feb2dd5922f2a2dee51db93bcf35100a8364":hex:"3335a02aba1ea28d2e56973e21109e0adfb5068613c447e625fd83a8d0e34494":hex:"bfde33c52407d3137123812c4818ca1e4b61878b8f9dbaec47935e3948a88d0d":hex:"42597cf03bbee0e003d8677159918f5318402f7329f08e1d93c850e2a2a2f1bb":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #13
depends_on:2
3:exp:4:hex:"0bd69ce9a0a66dffefba83ae563e8df0fc6c7d7bdf491bf52cbf3f3777025cdf92b32217f550a1fe735b8519b44b040d":hex:"820da3187bc879cd1f40476fd9677f3b67e02b35b6632ab68891e25f10555b69":hex:"903b882de013695b4683316ffbd7c7809288d54c72e369f70cf172bff85e5629":hex:"cfb5f494e76486ceef12dfe1bafd6ccf9b0754d8d2306fb0c41c0f4e921317ef":hex:"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"
HMAC_DRBG NIST CAVS 14.3 No Reseed (SHA-512,256+128,256,256) #14
depends_on:2
3:exp:4:hex:"45784684d6004731689e33e45b344d7b68dc4fa841133cb2dd65c4b326dffa901109dfac2e48bf17f2fea33b412dc653":hex:"7c6f4675f7a0b8c424d5be9e809efa305493874d9a950cb343afdfb64e77ecb5":hex:"2b2dbe3834d8be93f1396b19be83bd96823dd82740da71c5eeb7b21865021884":hex:"49c322fc1bec86d3e20628d9bdc1644e6f5e0237c7c694746bfee32a00145696":hex:"9110cec7d07e6e32724bf043e73021b3ca0e4516b619d036ac9a00914e12f01ece71989f55c1caccd542c60a9cccffb91e203fd39dca2d92c8eb03ee7ee88abf21dc6891de326c3190f25ee9ab44ca72d178db0f846969465b25a07dcc83777e6b63a7f9f1a8246dd31ce50cd9eb70e6e383c9ad4dae19f7cec8bfe079b36d309c28b10161c28b8d66c357c7ee01f07403a596366725fd5bd3a5de3cb40dcf60aac10635615b866ae633fbdb7ece41695d533757d9d16c6d44fd170fae77c15b7426ed6ec8c9d6e9245cd5e19e8dc3c8c7e671007ce8454413bd07407e8a2248bee95a7669db6ee47377b4490a6251abb60cd4e2e404ab88aa4948e71ecec50c"
| 179,440 | 1,201 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_asn1write.datax | ASN.1 Write NULL
0:hex:"0500"
ASN.1 Write BOOLEAN FALSE
1:int:0:hex:"010100"
ASN.1 Write BOOLEAN TRUE
1:int:1:hex:"0101ff"
ASN.1 Write int 0
2:int:0:hex:"020100"
ASN.1 Write int 1
2:int:1:hex:"020101"
ASN.1 Write int 127
2:int:0x7f:hex:"02017f"
ASN.1 Write int 128
2:int:0x80:hex:"02020080"
ASN.1 Write int 255
2:int:0xff:hex:"020200ff"
ASN.1 Write int 256
2:int:0x100:hex:"02020100"
ASN.1 Write int 32767
2:int:0x7fff:hex:"02027fff"
ASN.1 Write int 32768
2:int:0x8000:hex:"0203008000"
ASN.1 Write int 65535
2:int:0xffff:hex:"020300ffff"
ASN.1 Write int 65536
2:int:0x10000:hex:"0203010000"
ASN.1 Write int 8388607
2:int:0x7fffff:hex:"02037fffff"
ASN.1 Write int 8388608
2:int:0x800000:hex:"020400800000"
ASN.1 Write int 0x12345678
2:int:0x12345678:hex:"020412345678"
ASN.1 Write int 2147483647
2:int:0x7fffffff:hex:"02047fffffff"
ASN.1 Write enum 0
3:int:0:hex:"0A0100"
ASN.1 Write enum 1
3:int:1:hex:"0A0101"
ASN.1 Write enum 127
3:int:0x7f:hex:"0A017f"
ASN.1 Write enum 128
3:int:0x80:hex:"0A020080"
ASN.1 Write enum 255
3:int:0xff:hex:"0A0200ff"
ASN.1 Write enum 256
3:int:0x100:hex:"0A020100"
ASN.1 Write enum 32767
3:int:0x7fff:hex:"0A027fff"
ASN.1 Write enum 32768
3:int:0x8000:hex:"0A03008000"
ASN.1 Write enum 65535
3:int:0xffff:hex:"0A0300ffff"
ASN.1 Write enum 65536
3:int:0x10000:hex:"0A03010000"
ASN.1 Write enum 8388607
3:int:0x7fffff:hex:"0A037fffff"
ASN.1 Write enum 8388608
3:int:0x800000:hex:"0A0400800000"
ASN.1 Write enum 0x12345678
3:int:0x12345678:hex:"0A0412345678"
ASN.1 Write enum 2147483647
3:int:0x7fffffff:hex:"0A047fffffff"
ASN.1 Write mpi 1
4:hex:"01":hex:"020101"
ASN.1 Write mpi 0x7f
4:hex:"7f":hex:"02017f"
ASN.1 Write mpi 0x100
4:hex:"0100":hex:"02020100"
ASN.1 Write mpi, 127*8-1 bits
4:hex:"7f7b16e05c1537de7c41cef1a0985d6a3ced98aec28e091874cbad6b5e40a5c956258f18861c28bed8ba808259339ee34b2e509c4080149474d5d5b86093f90c475a6443fc87e1a293d4151be625d652f1c32a00a018bba10c8a2ae5b2b0ee4be64e053dce9d07ec7919526c9dfcf2ec9fc3db485caa8e5a68a2cd0a427de8":hex:"027f7f7b16e05c1537de7c41cef1a0985d6a3ced98aec28e091874cbad6b5e40a5c956258f18861c28bed8ba808259339ee34b2e509c4080149474d5d5b86093f90c475a6443fc87e1a293d4151be625d652f1c32a00a018bba10c8a2ae5b2b0ee4be64e053dce9d07ec7919526c9dfcf2ec9fc3db485caa8e5a68a2cd0a427de8"
ASN.1 Write mpi, 127*8+1 bits
4:hex:"108446d68934cc1af23c4cd909884d4bd737a1890e12f5ef8bf3d807d72feffa63c0bf2633345f8b8418d144617c871a7a0277ac0150eed4b3db7f9dff21114cd0d7f282400f03c931cb00c367550e374a1ed3762a1801ca714cfc8d5aac69707ca81e0661400ed0014d97cba48f94d835dd681fc3053c51958afbf7583cf49c":hex:"028180108446d68934cc1af23c4cd909884d4bd737a1890e12f5ef8bf3d807d72feffa63c0bf2633345f8b8418d144617c871a7a0277ac0150eed4b3db7f9dff21114cd0d7f282400f03c931cb00c367550e374a1ed3762a1801ca714cfc8d5aac69707ca81e0661400ed0014d97cba48f94d835dd681fc3053c51958afbf7583cf49c"
ASN.1 Write mpi, 255*8-1 bits
4:hex:"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":hex:"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"
ASN.1 Write mpi, 256*8-1 bits
4:hex:"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":hex:"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"
ASN.1 Write OCTET STRING: length=0
5:exp:0:hex:"":hex:"0400"
ASN.1 Write OCTET STRING: length=1
5:exp:0:hex:"41":hex:"040141"
ASN.1 Write OCTET STRING: length=2
5:exp:0:hex:"4142":hex:"04024142"
ASN.1 Write OCTET STRING: length=127
5:exp:0:hex:"99a66790856f7199641f55cadabb660aaed6aa0d9ef8cef4417118c6e8c6e15becbaa21c63faf48726e92357a38b3079a0b9d60be7457ec6552f900dd032577167c91e829927343c3a769b362db4de0ad2ffb8f13cc2eeca9e52dc557118baa88b857477595622bc301a1ae2150030d652c4a482cf88d0ded85d6731ff2d38":hex:"047f99a66790856f7199641f55cadabb660aaed6aa0d9ef8cef4417118c6e8c6e15becbaa21c63faf48726e92357a38b3079a0b9d60be7457ec6552f900dd032577167c91e829927343c3a769b362db4de0ad2ffb8f13cc2eeca9e52dc557118baa88b857477595622bc301a1ae2150030d652c4a482cf88d0ded85d6731ff2d38"
ASN.1 Write OCTET STRING: length=128
5:exp:0:hex:"0199a66790856f7199641f55cadabb660aaed6aa0d9ef8cef4417118c6e8c6e15becbaa21c63faf48726e92357a38b3079a0b9d60be7457ec6552f900dd032577167c91e829927343c3a769b362db4de0ad2ffb8f13cc2eeca9e52dc557118baa88b857477595622bc301a1ae2150030d652c4a482cf88d0ded85d6731ff2d38":hex:"0481800199a66790856f7199641f55cadabb660aaed6aa0d9ef8cef4417118c6e8c6e15becbaa21c63faf48726e92357a38b3079a0b9d60be7457ec6552f900dd032577167c91e829927343c3a769b362db4de0ad2ffb8f13cc2eeca9e52dc557118baa88b857477595622bc301a1ae2150030d652c4a482cf88d0ded85d6731ff2d38"
ASN.1 Write OCTET STRING: length=255
5:exp:0:hex:"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":hex:"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"
ASN.1 Write OCTET STRING: length=256
5:exp:0:hex:"5a633ed2cb0a2915dc4438a4c063017eb336cd9571d2a0585522c5073ca22a30ca7b8c9bd167d89ba1827bc6fb5d6ef6dcc52ee6eecc47e84ee0dd18fa3ebbdb6edfc679f037160d48d46a0d7e571335b24a28c8fd29b7f4a93d013b74e522bc1f5f605096bb99d438814b77b54d6dde608417b0a0ce9a8cb507fbeb95e9926b4bb6eec725599493d4b156ef3a5fd701426456029111c20f1d03c5d8999d2c042277ef91c5114a6c06218c1ba28d41ef08e4870d0cef260cba9de16d7d11ed5889b88fb93073746ebb158a4246cdb8a4ce403a5d1d598a0d11548f22070f833c1344d15e7a1445c133d19b8295b7c071bf2227178938031249d22d21c6f8e53d":hex:"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"
ASN.1 Write UTF8 STRING: length=0
5:exp:1:hex:"":hex:"0c00"
ASN.1 Write UTF8 STRING: length=1
5:exp:1:hex:"41":hex:"0c0141"
ASN.1 Write UTF8 STRING: length=128
5:exp:1:hex:"0199a66790856f7199641f55cadabb660aaed6aa0d9ef8cef4417118c6e8c6e15becbaa21c63faf48726e92357a38b3079a0b9d60be7457ec6552f900dd032577167c91e829927343c3a769b362db4de0ad2ffb8f13cc2eeca9e52dc557118baa88b857477595622bc301a1ae2150030d652c4a482cf88d0ded85d6731ff2d38":hex:"0c81800199a66790856f7199641f55cadabb660aaed6aa0d9ef8cef4417118c6e8c6e15becbaa21c63faf48726e92357a38b3079a0b9d60be7457ec6552f900dd032577167c91e829927343c3a769b362db4de0ad2ffb8f13cc2eeca9e52dc557118baa88b857477595622bc301a1ae2150030d652c4a482cf88d0ded85d6731ff2d38"
ASN.1 Write PRINTABLE STRING: length=0
5:exp:2:hex:"":hex:"1300"
ASN.1 Write PRINTABLE STRING: length=1
5:exp:2:hex:"41":hex:"130141"
ASN.1 Write PRINTABLE STRING: length=128
5:exp:2:hex:"0199a66790856f7199641f55cadabb660aaed6aa0d9ef8cef4417118c6e8c6e15becbaa21c63faf48726e92357a38b3079a0b9d60be7457ec6552f900dd032577167c91e829927343c3a769b362db4de0ad2ffb8f13cc2eeca9e52dc557118baa88b857477595622bc301a1ae2150030d652c4a482cf88d0ded85d6731ff2d38":hex:"1381800199a66790856f7199641f55cadabb660aaed6aa0d9ef8cef4417118c6e8c6e15becbaa21c63faf48726e92357a38b3079a0b9d60be7457ec6552f900dd032577167c91e829927343c3a769b362db4de0ad2ffb8f13cc2eeca9e52dc557118baa88b857477595622bc301a1ae2150030d652c4a482cf88d0ded85d6731ff2d38"
ASN.1 Write IA5 STRING: length=0
5:exp:3:hex:"":hex:"1600"
ASN.1 Write IA5 STRING: length=1
5:exp:3:hex:"41":hex:"160141"
ASN.1 Write IA5 STRING: length=128
5:exp:3:hex:"0199a66790856f7199641f55cadabb660aaed6aa0d9ef8cef4417118c6e8c6e15becbaa21c63faf48726e92357a38b3079a0b9d60be7457ec6552f900dd032577167c91e829927343c3a769b362db4de0ad2ffb8f13cc2eeca9e52dc557118baa88b857477595622bc301a1ae2150030d652c4a482cf88d0ded85d6731ff2d38":hex:"1681800199a66790856f7199641f55cadabb660aaed6aa0d9ef8cef4417118c6e8c6e15becbaa21c63faf48726e92357a38b3079a0b9d60be7457ec6552f900dd032577167c91e829927343c3a769b362db4de0ad2ffb8f13cc2eeca9e52dc557118baa88b857477595622bc301a1ae2150030d652c4a482cf88d0ded85d6731ff2d38"
ASN.1 Write tagged string: length=0
5:exp:4:hex:"":hex:"9600"
ASN.1 Write tagged string: length=1
5:exp:4:hex:"41":hex:"960141"
ASN.1 Write tagged string: length=128
5:exp:4:hex:"0199a66790856f7199641f55cadabb660aaed6aa0d9ef8cef4417118c6e8c6e15becbaa21c63faf48726e92357a38b3079a0b9d60be7457ec6552f900dd032577167c91e829927343c3a769b362db4de0ad2ffb8f13cc2eeca9e52dc557118baa88b857477595622bc301a1ae2150030d652c4a482cf88d0ded85d6731ff2d38":hex:"9681800199a66790856f7199641f55cadabb660aaed6aa0d9ef8cef4417118c6e8c6e15becbaa21c63faf48726e92357a38b3079a0b9d60be7457ec6552f900dd032577167c91e829927343c3a769b362db4de0ad2ffb8f13cc2eeca9e52dc557118baa88b857477595622bc301a1ae2150030d652c4a482cf88d0ded85d6731ff2d38"
ASN.1 Write OID: length=0
5:exp:5:hex:"":hex:"0600"
ASN.1 Write OID: length=1
5:exp:5:hex:"41":hex:"060141"
ASN.1 Write AlgorithmIdentifier, null parameters
6:hex:"4f4944":int:8:hex:"300d06034f4944"
ASN.1 Write AlgorithmIdentifier, parameters (8 bytes)
6:hex:"4f4944":int:8:hex:"300d06034f4944"
ASN.1 Write AlgorithmIdentifier, total length=0x7f
6:hex:"4f4944":int:0x7a:hex:"307f06034f4944"
ASN.1 Write AlgorithmIdentifier, total length=0x80
6:hex:"4f4944":int:0x7b:hex:"30818006034f4944"
ASN.1 Write AlgorithmIdentifier, total length=0xff
6:hex:"4f4944":int:0xfa:hex:"3081ff06034f4944"
ASN.1 Write AlgorithmIdentifier, total length=0x100
6:hex:"4f4944":int:0xfb:hex:"3082010006034f4944"
ASN.1 Write AlgorithmIdentifier, total length=0xffff
6:hex:"4f4944":int:0xfffa:hex:"3082ffff06034f4944"
ASN.1 Write AlgorithmIdentifier, total length=0x10000
6:hex:"4f4944":int:0xfffb:hex:"308301000006034f4944"
ASN.1 Write AlgorithmIdentifier, total length=0xffffff
6:hex:"4f4944":int:0xfffffa:hex:"3083ffffff06034f4944"
ASN.1 Write AlgorithmIdentifier, total length=0x1000000
6:hex:"4f4944":int:0xfffffb:hex:"30840100000006034f4944"
ASN.1 Write / Read Length #0 (Len = 0, short form)
7:int:0:hex:"00":int:1:int:1
ASN.1 Write / Read Length #1 (Len = 127, short form)
7:int:127:hex:"7F":int:1:int:1
ASN.1 Write / Read Length #2 (Len = 127, buffer too small)
7:int:127:hex:"7F":int:0:exp:6
ASN.1 Write / Read Length #3 (Len = 128, long form)
7:int:128:hex:"8180":int:2:int:2
ASN.1 Write / Read Length #4 (Len = 255, long form)
7:int:255:hex:"81FF":int:2:int:2
ASN.1 Write / Read Length #5 (Len = 255, buffer too small)
7:int:255:hex:"81FF":int:1:exp:6
ASN.1 Write / Read Length #6 (Len = 258, byte order)
7:int:258:hex:"820102":int:3:int:3
ASN.1 Write / Read Length #7 (Len = 65535, long form)
7:int:65535:hex:"82FFFF":int:3:int:3
ASN.1 Write / Read Length #8 (Len = 65535, buffer too small)
7:int:65535:hex:"82FFFF":int:2:exp:6
ASN.1 Write / Read Length #9 (Len = 66051, byte order)
7:int:66051:hex:"83010203":int:4:int:4
ASN.1 Write / Read Length #10 (Len = 16777215, long form)
7:int:16777215:hex:"83FFFFFF":int:4:int:4
ASN.1 Write / Read Length #11 (Len = 16777215, buffer too small)
7:int:16777215:hex:"83FFFFFF":int:3:exp:6
ASN.1 Write / Read Length #12 (Len = 16909060, byte order)
7:int:16909060:hex:"8401020304":int:5:int:5
ASN.1 Write / Read Length #12 (Len = 16909060, buffer too small)
7:int:16909060:hex:"8401020304":int:4:exp:6
ASN.1 Write Named Bitstring / Unused bits #0
8:hex:"FF":int:8:hex:"030200FF":int:1
ASN.1 Write Named Bitstring / Unused bits #1
8:hex:"FE":int:8:hex:"030201FE":int:1
ASN.1 Write Named Bitstring / Unused bits #2
8:hex:"FC":int:7:hex:"030202FC":int:1
ASN.1 Write Named Bitstring / Unused bits #3
8:hex:"F8":int:8:hex:"030203F8":int:1
ASN.1 Write Named Bitstring / Unused bits #4
8:hex:"F0":int:6:hex:"030204F0":int:1
ASN.1 Write Named Bitstring / Unused bits #5
8:hex:"E0":int:6:hex:"030205E0":int:1
ASN.1 Write Named Bitstring / Unused bits #6
8:hex:"C0":int:8:hex:"030206C0":int:1
ASN.1 Write Named Bitstring / Unused bits #7
8:hex:"80":int:8:hex:"03020780":int:1
ASN.1 Write Named Bitstring / Empty bitstring
8:hex:"00":int:7:hex:"030100":int:1
ASN.1 Write Named Bitstring / Empty bitstring (bits = 16)
8:hex:"0000":int:16:hex:"030100":int:1
ASN.1 Write Named Bitstring / Empty bitstring (bits = 24)
8:hex:"FFFFFF":int:0:hex:"030100":int:1
ASN.1 Write Named Bitstring / 15 trailing bits all unset
8:hex:"F88000":int:24:hex:"030307F880":int:1
ASN.1 Write Named Bitstring / 15 trailing bits all set
8:hex:"F8FFFF":int:9:hex:"030307F880":int:1
ASN.1 Write Bitstring / Unused bits #0
8:hex:"FF":int:8:hex:"030200FF":int:0
ASN.1 Write Bitstring / Unused bits #1
8:hex:"FF":int:7:hex:"030201FE":int:0
ASN.1 Write Bitstring / Unused bits #2
8:hex:"FF":int:6:hex:"030202FC":int:0
ASN.1 Write Bitstring / Unused bits #3
8:hex:"FF":int:5:hex:"030203F8":int:0
ASN.1 Write Bitstring / Unused bits #4
8:hex:"FF":int:4:hex:"030204F0":int:0
ASN.1 Write Bitstring / Unused bits #5
8:hex:"FF":int:3:hex:"030205E0":int:0
ASN.1 Write Bitstring / Unused bits #6
8:hex:"FF":int:2:hex:"030206C0":int:0
ASN.1 Write Bitstring / Unused bits #7
8:hex:"FF":int:1:hex:"03020780":int:0
ASN.1 Write Bitstring / 1 trailing bit (bits 15)
8:hex:"0003":int:15:hex:"0303010002":int:0
ASN.1 Write Bitstring / 0 bits
8:hex:"":int:0:hex:"030100":int:0
ASN.1 Write Bitstring / long string all bits unset except trailing bits
8:hex:"000000000007":int:45:hex:"030703000000000000":int:0
Store named data: not found
9:hex:"414141":hex:"424242":hex:"434343":hex:"444444":hex:"7f7f7f":int:0:exp:7
Store named data: empty haystack
9:hex:"414141":hex:"424242":hex:"434343":hex:"444444":hex:"7f7f7f":int:4:exp:7
Store named data: first
9:hex:"414141":hex:"424242":hex:"434343":hex:"444444":hex:"414141":int:0:int:0
Store named data: last
9:hex:"414141":hex:"424242":hex:"434343":hex:"444444":hex:"444444":int:0:int:3
Store named data: skip suffix
9:hex:"41414141":hex:"414141":hex:"434343":hex:"444444":hex:"414141":int:0:int:1
Store named data: skip prefix
9:hex:"4141":hex:"414141":hex:"434343":hex:"444444":hex:"414141":int:0:int:1
Store named data: first match
9:hex:"414141":hex:"414141":hex:"434343":hex:"444444":hex:"414141":int:0:int:0
Store named data: found, null to zero
10:int:0:int:0
Store named data: found, null to data
10:int:0:int:9
Store named data: found, data to zero
10:int:9:int:0
Store named data: found, smaller data
10:int:9:int:2
Store named data: found, same-size data
10:int:9:int:9
Store named data: found, larger data
10:int:4:int:9
Store named data: new, val_len=0
11:int:0
Store named data: new, val_len=4
11:int:4
Store named data: new, val_len=4, val=NULL
11:exp:8
| 17,102 | 370 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_ctr_drbg.datax | CTR_DRBG_withDF.pdf: AES-256, PR=no, perso=no, add=no
depends_on:0
1:hex:"202122232425262728292a2b2c2d2e2f":hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f":hex:"":hex:"":hex:"8da6cc59e703ced07d58d96e5b6d7836c32599735b734f88c1a73b53c7a6d82e"
CTR_DRBG_withDF.pdf: AES-256, PR=no, perso=no, add=yes
depends_on:0
1:hex:"202122232425262728292a2b2c2d2e2f":hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f":hex:"606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f":hex:"a0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecf":hex:"81daaf9800c34ff0a104e51d87e36f5b17eb14b9abc5064cadda976ec4f77d34"
CTR_DRBG_withDF.pdf: AES-256, PR=no, perso=yes, add=no
depends_on:0
1:hex:"202122232425262728292a2b2c2d2e2f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f":hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f":hex:"":hex:"":hex:"bb2a0f5f0ca6d30634ba6068eb94aae8701437db7223a1b5afe8771547da3cee"
CTR_DRBG_withDF.pdf: AES-256, PR=no, perso=yes, add=yes
depends_on:0
1:hex:"202122232425262728292a2b2c2d2e2f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f":hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f":hex:"606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f":hex:"a0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecf":hex:"98a28e3b1ba363c9daf0f6887a1cf52b833d3354d77a7c10837dd63dd2e645f8"
CTR_DRBG_withDF.pdf: AES-256, PR=yes, perso=no, add=no
depends_on:0
2:hex:"202122232425262728292a2b2c2d2e2f":hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeef":hex:"":hex:"":hex:"259dc78ccfaec4210c30af815e4f75a5662b7da4b41013bdc00302dfb6076492"
CTR_DRBG_withDF.pdf: AES-256, PR=yes, perso=no, add=yes
depends_on:0
2:hex:"202122232425262728292a2b2c2d2e2f":hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeef":hex:"606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f":hex:"a0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecf":hex:"386debbbf091bbf0502957b0329938fb836b82e594a2f5fdd5eb28d4e35528f4"
CTR_DRBG_withDF.pdf: AES-256, PR=yes, perso=yes, add=no
depends_on:0
2:hex:"202122232425262728292a2b2c2d2e2f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f":hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeef":hex:"":hex:"":hex:"601f95384f0d85946301d1eace8f645a825ce38f1e2565b0c0c439448e9ca8ac"
CTR_DRBG_withDF.pdf: AES-256, PR=yes, perso=yes, add=yes
depends_on:0
2:hex:"202122232425262728292a2b2c2d2e2f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f":hex:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeef":hex:"606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f":hex:"a0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecf":hex:"738e99c95af59519aad37ff3d5180986adebab6e95836725097e50a8d1d0bd28"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #0
depends_on:0
2:hex:"d254fcff021e69d229c9cfad85fa486c":hex:"c18081a65d44021619b3f180b1c920026a546f0c7081498b6ea662526d51b1cb583bfad5375ffbc9ff46d219c7223e95459d82e1e7229f633169d26b57474fa337c9981c0bfb91314d55b9e91c5a5ee49392cfc52312d5562c4a6effdc10d068":hex:"":hex:"":hex:"34011656b429008f3563ecb5f2590723"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #1
depends_on:0
2:hex:"7be87545266dadd1d73546c0927afc8d":hex:"a7f38c750bd6ff41c4e79f5b7dd3024d58ca3f1f4c096486c4a73c4f74a2410c4c9c5143eb8c09df842ba4427f385bbf65c350b0bf2c87242c7a23c8c2e0e419e44e500c250f6bc0dc25ec0ce929c4ad5ffb7a87950c618f8cee1af4831b4b8e":hex:"":hex:"":hex:"d5b1da77f36ce58510b75dfde71dbd5d"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #2
depends_on:0
2:hex:"3771416b162f4d9c5f48a05b7aa73938":hex:"d20a0e5cdb714f01b48e00bae51909f345af05de13217e5d55fc6c2d705aea550420d9a458594d825b71e16b36130020cf5948fe813462061c1a222d1ff0e1e4b3d21ae8eee31d3260330d668d24ef3c8941b8720e8591b7deec4bd35a3a1f1a":hex:"":hex:"":hex:"3cbd7d53ac1772c959311419adad836e"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #3
depends_on:0
2:hex:"f2bad8f7dab3f5886faa1cf6e1f52c87":hex:"4df54a483b4510ed76049faae14b962fbb16459d1f6b4f4dbeca85deded6018361223c893f9442719c51eb5695e1304a1c2be8c05d0846b6510a9525a28831a8efcbd82aa50540d7e7864e2b8a42d44380cdc6e02eebb48d0b5a840b7cdd6e04":hex:"":hex:"":hex:"0062d822bc549bea292c37846340789b"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #4
depends_on:0
2:hex:"1c5760aa0fd4ce308735b28682b67246":hex:"89defd4445061c080e4762afac194b9f79c4bb1ed88c961af41d9d37bd388a1d45c82ca46f404348a2ae5e22ce00aa35ebc7c5051d8800890d44d25284489efcbd1f5e2b16e403f6921f71bbdfcf7b9aeddef65bc92fbd1cb9e4ea389aee5179":hex:"":hex:"":hex:"3baf81155548afca67d57c503d00a5b4"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #5
depends_on:0
2:hex:"b72b9451a5e866e226978623d36b3491":hex:"2713d74affed98e3433559e17d240288bb1a1790904cd7754cad97007e205a157b8ddca704a3624413f2ec8361ccd85442fb0b7cc60a247f0fd102cef44677321514ea4186d0203ab7387925d0222800ce2078c4588bc50cdfccbc04fbecd593":hex:"":hex:"":hex:"047a50890c282e26bfede4c0904f5369"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #6
depends_on:0
2:hex:"91b955a3e7eccd7f07290cba4464baff":hex:"b160465448894c7d5ee1963bb3e1a2f3f75fcd167ffa332c41c4c91c1830b7c07413bd580302958aa6fa81588ad2b3173698a4afafda468acb368dbbd524207196b9a3be37ac21ba7a072b4c8223492ee18b48551524d5c3449c5c8d3517212e":hex:"":hex:"":hex:"af2c062fedb98ee599ae1f47fc202071"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #7
depends_on:0
2:hex:"d08114670c4f6016a4cf9d2da3e3a674":hex:"38dfbfb52c185acf74de00b5a50f0cd9688286747ab340cfe9ad30d38b390fd2443bfd7ea93941d8262ae0f66b0eab4ff64ba59a2ff940c3c26fda103e0d798dbcaa1318e842143975673af8408b5af48dfbaa56ca4f9ddc87100028b4a95549":hex:"":hex:"":hex:"55030fef65c679ecaffb0dc070bfd4d2"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #8
depends_on:0
2:hex:"e2af9abe8770e33798a5f05b22057d24":hex:"88fb2a8020e604ea64a620f4704078857062cc97e24604c30de4c70cbf5e5bea0f0db79d16f4db636a2d6cd992c5890389a40cfe93967eac609e5b9f66788944285758547c7136ef2ee3b38724ed340d61763d0d5991ece4924bb72483b96945":hex:"":hex:"":hex:"a44f0cfa383916811fffb2e0cfc9bfc3"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #9
depends_on:0
2:hex:"ae30f1642753c5cb6e118d7ff5d59f1d":hex:"340def3420b608420d81b4ea8252a3d86d3e1dd7597e6063ed923a73a7b8e981e6079f7f0c42deb9f4ef11d2f3581abadf44b06d882afdc47896777ce8dafd85ec040f7873d0e25c4be709c614a28b708e547266ac8f07f5fdb450d63bc0c999":hex:"":hex:"":hex:"c7e7670145573581842bd1f3e0c6e90b"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #10
depends_on:0
2:hex:"711ecfe467d6f83bcc82e566729669af":hex:"21d6c822706d1af09e4d233c0ebac7f4ec60c7be2500dd41a85a19b2dc5c7da27f8a82164bd2a644218cb5ac283c547da1064784413eed5ecf32fadd00357abaae81225ac8d0391ead533362cff56798825445d639b0b45e0312aa7047c00b4d":hex:"":hex:"":hex:"d3a0d2c457f5e9d1328a9e1d22b6eaf6"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #11
depends_on:0
2:hex:"f9b22152bc0eff1ebf0bfafeea40aecf":hex:"4ee32f0aeadb3936e17f1aa3b18c10f773def5f83500c2ba96f84408a2521c1258f6be9aa5cee528746629aa2b8118ac41dd98ef1b3de31d26b8c2ad3442081203f5ef21df409df3381fbf2e064fbaec64d731dc93b3218e34bb3b03bfd88373":hex:"":hex:"":hex:"86009b14c4906a409abe6ca9b0718cbe"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #12
depends_on:0
2:hex:"5174e76e904ff1471367ccace9c66ed9":hex:"fa81535670275e8ab74121377cf88a4742dd0d7a99cf06eb9c2b4fe2b03423dbe441201144c22a9fc0ca49f5ef614987a2271cc1089d10ee01b25163c090a1f263797e4f130920cdc3b890a078e8abbb070ded2e8fd717f4389f06ff2c10d180":hex:"":hex:"":hex:"18d6fcd35457d2678175df36df5e215d"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #13
depends_on:0
2:hex:"73c372f60519e8eca371eaa13fb54f88":hex:"930c290a797b85d58b52d0d92356436977b2f636f07d5a80c987fb7eea6b750cceb9eb87860547ab4029865a6810fc5c3663c4e369f290994461d2e9c7160a8b5985853bd9088b3e969f988fe6923b3994040eeee09ad353b969d58938237cfe":hex:"":hex:"":hex:"f62c7cfbe74555744790bcc7930e03c3"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,0) #14
depends_on:0
2:hex:"75ba8ddeef24f9f5b00b426a362c4f02":hex:"7065d128ddb2fc6ea31f4110b6c0934ed112c51d74a4a0741a0843d8befac22902a01353322674c3d58935144a0f8f171a99dbeab71272ff7518c46cc7ebb573adbf95bff8ec68eeba5e8ec1221655aed8420086bda89c7de34f217dce73ccab":hex:"":hex:"":hex:"700761857ea2763e8739b8f6f6481d1c"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #0
depends_on:0
2:hex:"14051b57277bc3d3bbae51bdecfb9f5d":hex:"82c80d922c47bbec0f664dd623e22a11a3b84d308351e45e30ee286e89547d22c43e17b3ca0fa08f77eef1001ba696932e9ee890e7aac4661c138e5b5ce36773d3120c35f8c94e0a78ffbf407a63ca435392e17c07461522fdc1f63f037aacff":hex:"b70e7c1c4b8e0f1770e05b29a93f9d7a6540f23ab84136b05b161d85e5f19251":hex:"5a737c128bd69f927f8f3ad68f93f6356d5f4ec0e36b6b50ced43dcd5c44dbc2":hex:"a4e6c754194a09614994b36ecce33b55"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #1
depends_on:0
2:hex:"4526b268128ea35f8558b4e1d08388f2":hex:"952f3f179cbbda27ebd30f4fc31bf96baccb2adbaa9c090bc0f37044a44e85b3bc668cd3533faaf56b5da9242844d65733f7ac1f55c38b175749b88e18d19672b7bdab54e0ababdd4519fb07e0c25578f64ad40d0beb0a26275d5e2f4906aa70":hex:"6b167c7cebea2e585ab974b60c4d305a113102ca8c3dc87651665728c4c675ad":hex:"a038f1ca1f420eae449791f13be4901bfb91e41e052e02635b1f1817bd8969b1":hex:"745ec376282e20fd1f9151f7040ed94a"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #2
depends_on:0
2:hex:"c1aafa90f394e0ba9a528032dc6780d3":hex:"75fd042bfd994de2c92e5aa505945ec93bd7cf366d86a356723fca3c9479ee17fb59c6ca8ba89784d43f06cdad113e5081e02427ee0714439d88dc1a6257fc91d99c1a15e92527847ab10883cc8f471cad8cf0882f5b6d33a846a00dee154012":hex:"c704164ce80a400cb2f54d1b2d7efa20f32b699fa881bfc7b56cfd7c4bee1ea6":hex:"f3baff4b6f42c8e75b70c2a72a027b14a99ae49a5a47c7af0f538843c94e1a69":hex:"7af9113cd607cdb4c6534f401fe4e96c"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #3
depends_on:0
2:hex:"e6e726b72e7b264a36ec0cd60d4578b5":hex:"0c3c6dd706076d6484478347559b495d7ee898c39cde06027bc99f7bf69ce1140ca04602265e1308af6dd6446a1cf151749b22a99e8a05d30cc3ccd00e663bc1bc37e08ee62834fcc52a4bc8c1d6442544187484f81dc729417d5bedfcab5a54":hex:"d84b978483c0bd8f8c231d92ea88ac21e6e667215804b15725a7ed32f7fc5dd7":hex:"9a8971f6c559f7f197c73a94a92f957d1919ad305f4167c56fe729d50e5754a5":hex:"e16ee5bceca30f1fbcadb5de2d7cfc42"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #4
depends_on:0
2:hex:"0272d86db283244eb7ee0ed8c8054b89":hex:"a08ce39f2f671e1f934821a8db9070f39a734a7a20e70307fccca17db15bb4e8a421600df11d1a6e7806a14826739322c8043649ea707180f1d00dea752c2c36398030519465864c4d38163f5b0dd5be07dbc0ae29693ad4a67ca69f28414634":hex:"aa97055cf46ba26465dfb3ef1cf93191625c352768b2d8e34459499a27502e50":hex:"dddd0007eb29fdf942220e920ca0637db4b91cbf898efd2696576ff6bfacb9d1":hex:"9db0057e39ca6e0f16e79b4f8a0ed5c7"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #5
depends_on:0
2:hex:"4ad8f72a0d0e28a758722b20e3017d7e":hex:"89af36a1c53f730c1b818b26aa510627b17e6f9da51c8e53930de883b7cc7a3e8c3c463c910646ac3ff08f05bca8e340daf9a322d133ae453fdf7e6860a27ff4495c89875431ba9de3e4f3247cda8c62acc86f7066448f639d8ba8b5249337f8":hex:"9d060b7ed63bdb59263c75ebe6a54bf3a4ac9c9926ca8fb49caa905a2651eead":hex:"016099232dc44bb7cdb492f4955ab1aabc5dc0b5731447cea2eb1d92e41482d1":hex:"4b658e95adae4bf0c418fded4431c27f"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #6
depends_on:0
2:hex:"aa19b944c2e1b9d27933bc87322bdf14":hex:"dc8c60dd42c85fed86cb32af035bbde5737526eb07991397c853256f2f0cb311bce70e1c5e32fc3510402d7d7e3de36fa5e584234daf391bc53cc651e001ab7fcf760679b3c82057f9d09bfdcab8e158d4daa63b20c0e1102f7a06bf5a2788dd":hex:"6b98fec5f7de8098ff9df80f62473c73831edace832a767abf5965ea8bf789ba":hex:"cc998bd5752f9c96ec35d9658cc8b3833dd6ab80c7accd6777c06c2cf7c01e59":hex:"fc58833e0e27f7705e4937dd2aadb238"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #7
depends_on:0
2:hex:"10c8c17a25041e2ef0d3cc80671e4cfe":hex:"513fb96b6164ece801e52855aad28cb80131e7872d8432d27a974fb62d8d0100bb7ebcb8f5c066e230377a8847d6798c3d8090469b9719a80ac956ac33186b00eb8ca64c5530421f93932bc7c98ee92651e85dab562483bdb189676802726647":hex:"240f36a0a598fe2116ffa682824f25acc35132f137f5221bc0ff05b501f5fd97":hex:"22a5eb5aa00309a762ab60a8c2647eebe1083f8905104b5d375ed1661b4c8478":hex:"145a16109ec39b0615a9916d07f0854e"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #8
depends_on:0
2:hex:"cea0c3c12be683c0f27693650a6a3d7d":hex:"df8bc70e45fe14abb02c1b9a9754c37497fc2f67709edd854196fc4d074b12797ce7cb292f14cb1d6904abf32bf229299db5ccf5a791a3b8cd3e40a64f38f6b57df759a863e09d7676d2f3ff2762cdab221151000dba32a67f38cab93d5b7a55":hex:"bf2ac545d94e318066ff88f39791a8385e1a8539e99ac4fa5a6b97a4caead9d4":hex:"846efef8672d256c63aa05a61de86a1bbc6950de8bfb9808d1c1066aef7f7d70":hex:"8d8f0389d41adcac8ca7b61fc02409c3"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #9
depends_on:0
2:hex:"1b782af2545352631983dc89945ffc37":hex:"51930fb7095edef3fc20aca2a24127f03d3c4b983329e013ad8a35016f581dd7b2d11bafbf971c1fdefd95a0024195e6e90a60ec39b1a8dbe0cb0c3aabf9cf56b662efc722b2dffa6c3be651f199cbc3da2315b4d55aeafd1492283889e1c34f":hex:"1b6295986f6fb55dc4c4c19a3dba41066fdc0297d50fb14e9501ba4378d662ed":hex:"6e66ff63fc457014550b85210a18f00beab765f9e12aa16818f29d1449620d28":hex:"78dfcb662736a831efaa592153a9aff9"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #10
depends_on:0
2:hex:"6580f6df5c8de7c4a105c11ed44435c2":hex:"d37403db6f84a7ba162e1cc351fe2e44d674ae8606280c9dac3e3975f30cbe1c9925e502a9804b91aada5cc97b259b90ccb5b8103394d9a28f0709fc9b5ffe9d73ad3672e02064ea68cebe3face5d823ee605c46c173db591135f564558dab4c":hex:"97486a5e6ce6c6cf9d3f9a313d346cbc34b2bd54db80c5f8d74d6f6939f89519":hex:"8377fcb52556f9974f1aa325d6e141d7b81355bd160abbc86e0007571b3c1904":hex:"77031d3474303470dca9336b1692c504"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #11
depends_on:0
2:hex:"f5303f148d6d6faca90aa88b07ab2ba9":hex:"a0de51b8efa44b8245dba31d78f7840b2b7abced4e265b4cd9628eabc6ebbccb0f118dd8cc958b36dc959e22c4a03dafa212eeedec7d25ee6c5961187bee83b1ed3a75c7bdd9d0713b16cc67e68231f4cb274c8f3dfcc7e5d288c426a0d43b8f":hex:"8d1fddc11dbad007e9b14679a5599e5e8a836197f14d010f3329d164c02d46d6":hex:"9ceb6570568455d42a7397f8ca8b8af7a961a33a73770544cca563c04bc919ca":hex:"9882f0bd1f6129a78b51d108e752b2d9"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #12
depends_on:0
2:hex:"5a799c58985aa2898cc8fe8e5bc4a9f8":hex:"dbdbef9d217e9051025c321b628c1cc823d508ffdd13fc4edbe8677658a57ef5b64395a6b7d62c0e93dc0956ee0217ec48ae054f1d4680023cc1b2af666efa9e1458cf6b0dae72eef2392e93687bd1fb5f366bb2cdd12937ad09724e39db4189":hex:"8c179b35739e75719e74f7c3e038bc06eb3e212d6ade85275cfebf12b2dce2a2":hex:"af617f2e228adde3edaf52a7e5979476dbb9cd2956a1737d93a16563bbbb4888":hex:"49a04f3b4ef052747c7f4e77c91603e8"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #13
depends_on:0
2:hex:"8f5b51983a8156a529f559ac3afebbf0":hex:"bf22b182d39622e941017285adbdfe446c3d1a72601d0e5a15674f3b1b260170b1b2ab6b588a0267d86776a5d4ce80e132d7135a581af75ea6de65153680e28ce35ce78d0917b4932000d62260149e5a3ae72bc250548390b664f53c697dac45":hex:"4cbb5b2d6e666d5dd3dd99b951ea435cae5a75d2e1eb41a48c775829b860e98b":hex:"a4b4171c2592516404434932ad0a8ee67bd776a03479b507c406405b3d8962bc":hex:"cab49631733f06e3fb3e0898e5ad22e7"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,0,256) #14
depends_on:0
2:hex:"9f305a77cbaec1ab408cfc0eb89c6cbb":hex:"1e50fada1e76a0d243e6f64c36a173ddc1f47a1dab834f5cd492568792958d5be22cce3110c8e8958b47f07b5c63f86b254942361d4d553e47d36103f47cd7f0bbee27d2e238b1d85671afe8284ee1fd2a431a5f69b2df73e95341c3a2e4fe4b":hex:"c254f3b40e773eb09053b226820f68cafa3458ad403ad36f715245a854752a93":hex:"699e177b7be3353c45ce7b7a0d573b00087d700a9f2c1cd2e370e05d4ddadc86":hex:"bb6b02b25a496f29245315f58a16febc"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #0
depends_on:0
2:hex:"e09f65dcffc0d3a4d84bacc41617a4e46ce5184eca011049ab657566f728e4aa28315ffac166ebe50e1269b01c95b3a2":hex:"545a783ae97d827ed0b81d9752ad0f7e965f511b1f5dae0f872e9ec37cfe63af86c1d15e153887989b605773b16ad5505e65f617cfa8ef46547c4c3f9d0c4fd0b6e1cff5ca0f1929266fe43ba8f45ad664cfe5e90903a9cb722b42ae8989c148":hex:"":hex:"":hex:"1e77d7cc18775fef9a3d3e00903da01b"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #1
depends_on:0
2:hex:"056cd44c8847d89da05fbef95e9660d589046b0c02f9b42c17fd8b069f831c73cd896005ec080113589b6f07be6e42ea":hex:"dde6c0850fe642602eb222ca7371213c598cef8c3e71e0593ea8edb54e1bed130b9b0aebe0893093b950c52f56eb9b338aa4bd01dae030515726ece1bf751660b4a3602da6400e4b94edebba646b5c3d4e64ceea1c4f14b7a19f0142783247df":hex:"":hex:"":hex:"a790ab939e63555d02ea1e9696051725"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #2
depends_on:0
2:hex:"73c72c7dfe138ef4b9817d41b9722b3940762b59bda26b3f6bb8b30583e01d088a29726b71d36ffeebdb387010cb1bb6":hex:"6fe09520e26f5abece0fceadc54913c650a9f55725af45a9a5f373d09b9970b8706b9041d0189a204f6a4eb527dfa86584a3bee3265b809c3932ae5e7228194a3cf7592fc9301c833b45a53be32b9caec9f0f91ba86519f12b0b235f68419c1e":hex:"":hex:"":hex:"798d997f46ff7cc4206994085340325e"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #3
depends_on:0
2:hex:"cdba7c7033c34852b7bc1a6b33edab36f41d563bd0395d1001c02ffc0c42ec8595ed2b5ddabc923372e3b6bb457833fa":hex:"532960c23c8c8b2146576dde52fadc985134914abf42ca1c5f47206937fda41289ae5d9f935dc4ce45f77cad230a4f345599e3bae4071188324483a0b93593c96d8b6ac6c0d8b52f8795c44171f0d8cd0b1e85dc75ce8abe65d5f25460166ba0":hex:"":hex:"":hex:"9d48160aca60f1a82baaa8a7d804a3d8"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #4
depends_on:0
2:hex:"02cef01aca992f60aa12db4b2c441689e4972a6f9deaf3663082afed642c1502b67b42d490af1c52c7e6eaf459882eca":hex:"9216c9a833f81953792260a688eb7c3dfc85565ae6a6033203741a763db056247808e0ecd5ba1fc4549c3a757eba535adc786e810ddaae9a2714d31f5154f2c3ee81108669f1239f4f4efd6e18aabfa2d88f0ac25f4740108f6cfebffeb2d857":hex:"":hex:"":hex:"d6378bcf43be1ad42da83780c1dab314"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #5
depends_on:0
2:hex:"d7d80084e9d1fbb9315c3bce1510dbf22cf11fa54177d913a3b04b64cb30957395bd6f3d7e3d866d1be41b29db9ed81d":hex:"80d4741e4e646748bb65e1289f1f9b3c21bffec4d0a666b301f199d76b4a83464583057079b069946b03d6ac81ebf9e6fa8d4081120f18bf58286a0c4de7576f36f3c7c353126f481a065ac28bdf28e13cd0c1e7911db6343c47d613f1750dc6":hex:"":hex:"":hex:"9165a92ed92248b2d237d9f46d39bde8"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #6
depends_on:0
2:hex:"df5a68d3bede467fd69716f5f8fbac297594b8573921afb864ba76aaa6dd89e83b89e359a5a0dd1aac9b4acb9573d218":hex:"52df6336f93781115c2a77bd8f99cb717871fe14707947a21f6093dd9205bc378acf61329f8831369b4b1af0a9edfb25d74f5863f26859ad9c920767b113c47ed2690053bf9a2f7c7a67a8d680e08865720b9e9f7b6ae697e3c93e66f24b6ddc":hex:"":hex:"":hex:"c542cf248a163bbceee7b9f1453bd90b"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #7
depends_on:0
2:hex:"2945527372ff71edfa5776f55f7e4a247544aa6de974e81b2eba5552843ab6dfa248695f4f3225a43d4bf3672c3a6b2e":hex:"aa560af2132cbd0624a69c7a7e733cd59a4f2d4e61d2b830087bd88f30fa792c7e4d3168fa86a10f7619d5b9dcf4f7bb08b350ba6a6bfc0fdfb7ee7aca07260c9a11abe49963c36efaefa94d2978ed09472bf93cc873d0f24c000762bb1402cd":hex:"":hex:"":hex:"33af0134eeca279dce5e69c2cda3f3f4"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #8
depends_on:0
2:hex:"b30cb767125674f6099a5cf7cb2e4f5b6c1cd1e32ffc1e393b1c5698b52b37f971f12521a7c1ffaaf3233d5391bc4c86":hex:"2d42b00248d95d9378a2aece40d636bc1ab22edaaa64daa34335195a9efa4c1b58f13ac184ca2be52e15c3a977abde2aa505243fc106c4ea6f0671fe0f209b106ea8965645af73d8ebb8a80251db2967149c701cfe1d157cc189b03bf1bff1ac":hex:"":hex:"":hex:"1e10eff9ceebc7e5f66e5213cb07fca4"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #9
depends_on:0
2:hex:"c962a2da4524f08adcdd5ceddc04e669ad6154aee06164645e80c832506b98f9919451c7ec1d3a6a9704f83def8f6e2d":hex:"a1ff68a85e437475b1b518821dbaac1730071a4ddd3255361778194fb0cfe3293e38df81527d8b8da15d03acb26467b6b53d7952441b79f95b633f4a979d998fd0417b9193023288b657d30c0cb2dada264addf9d13f1f8ed10b74e2dd2b56b3":hex:"":hex:"":hex:"58990069b72b7557c234d5caf4334853"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #10
depends_on:0
2:hex:"a3cc1fe561d03a055e8eedaa0e713be490c4bd4c6839a5b98c2ac0139bf215bdc46783d2a3e6b9d15d9b7a8bfe15104b":hex:"207267911c12125cb3012230e4fafd257777ccbfb91653f77e4c1287574f9b79d81af7fb304790349dd457983cc99b48d5f4677ccd979fcc6e545cbf5b5c8b98102c9a89ae354349dbdee31a362d47c7cdae128034c0f4c3e71e298fe1af33c6":hex:"":hex:"":hex:"ffd1d259acd79111a6fb508181272831"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #11
depends_on:0
2:hex:"ecf186071b81e0ed384d4ebfb5bf261b4054e2e6072b51d21dfb6817adc51ff1c8956ff3612767538cdc8d73fade78b3":hex:"3b9aec9f8bf8495004c5e4e731e5c347988e787caf003f001e68584e3510a6abdedffa15895702c2d57c304300f4f0af80a89bcc36b3cea2f08a0740236b80cfd2ea6e5cfe4144bc4ae09270fb6bc58c313dbaaedc16d643fc0565171f963222":hex:"":hex:"":hex:"a2d917f5ec39a090b55d51713006e49d"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #12
depends_on:0
2:hex:"3fcedba86089709aa638d00713150df781d4a93e85f155338e90ff537bcbf017f37a2d62259f5d8cc40ddfb041592539":hex:"6b1e9d45c2ec598de7527b6414a339f26192fc4e3f5eff4b3a3e2a80ee0f2e9743031804d1be12b3c7ff6fbc222db1d97226890addeef0e1579a860e2279292c2f769416b7068f582f6ffc192ae4c4f1eeb41d5f77f0a612b059c47aef8e3d8e":hex:"":hex:"":hex:"aa414799c51957de97c0070fb00eb919"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #13
depends_on:0
2:hex:"f4c45fb8f58b7ebf73a0cd81c6a26686977558d4b8bf1cedfc6bd3754de6aaed5008fd72208437c54d8feb9a16ce3224":hex:"6d170cf472ea07da6146a7087ed15d3f5b6ad72b8c99e46bae3b89e49a6e63467199ee16096516c2362dbd181bf5343a29fd0932d72eeb019fc3bfea3a3b01ffc2b985e341cfb6479d9dc71e2197b5cffc402587182e5fe93b5a8cf75eac2e42":hex:"":hex:"":hex:"f557f627688fe63c119cf0f25274aa74"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,0) #14
depends_on:0
2:hex:"7120742a7807b66c5a9b50995d5494a5b9451bb795393c0d8a30ae665879269408f8297d49ab87410a7f16a65a54b1cb":hex:"c08a6f9797ea668cd14ba6338cb5d23c0921e637e66a96259f78e33e45aafd035edb44394cb459453b9b48beac1e32d3b6f281473cda42fb6fd6c6b9858e7a4143d81bfc2faf4ef4b632c473be50a87b982815be589a91ca750dc875a0808b89":hex:"":hex:"":hex:"521973eac38e81de4e41ccc35db6193d"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #0
depends_on:0
2:hex:"add2bbbab76589c3216c55332b36ffa46ecae72072d3845a32d34b2472c4632b9d12240c23268e8316370bd1064f686d":hex:"6168fc1af0b5956b85099b743f1378493b85ec93133ba94f96ab2ce4c88fdd6a0b23afdff162d7d34397f87704a84220bdf60fc1172f9f54bb561786680ebaa9bf6c592a0d440fae9a5e0373d8a6e1cf25613824869e53e8a4df56f406079c0f":hex:"7e084abbe3217cc923d2f8b07398ba847423ab068ae222d37bce9bd24a76b8de":hex:"946bc99fab8dc5ec71881d008c8968e4c8077736176d7978c7064e99042829c3":hex:"224ab4b8b6ee7db19ec9f9a0d9e29700"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #1
depends_on:0
2:hex:"8964ebde61f0c4e23f8e91244ae9682ed0b17e424edd4c025b461a2d209a538583f29465df3f89cf04f703b771ff5c90":hex:"4db8e8a27fe7a0378e37d4cc01b6a465d34be91f48c52fdc1023ef2ea1241082f522805bc8777fda6c10e3d441b58f648edcd7d4df3df8c8a398d7b005c4fd6f41c9b033bd38fc5f577069251529b58273f6a9175feb3978798fdeb78a043232":hex:"5eb3fb44784f181852d80fcf7c2e3b8414ae797f7b9b013b59cf86b9d3a19006":hex:"3eec358f7f9e789e4ad5a78dd73987addbf3ae5b06d826cec2d54425289dc9af":hex:"9a66c015d2550e3f78c44b901075fabb"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #2
depends_on:0
2:hex:"98784aa794df5400890e6803f06d886aeb0833b1fea28a5f7952397aa21092ceafdb9194079f3609bc68233147c778e7":hex:"7338521e8e127e70da259b37f5f5cdf83079bdb4024234b8ceecfba8d8c3f1c8510ff91f3bd08f2c54f11b534048a320a15ba0fccec8da34d4ef7f49ade4847814c859831907992d0adab27046324d4d9a853eb986b8de25b34ea74eb3d11048":hex:"b14c5314aac11cb43f45730e474b84fbf5d1480d94d0699b80e3570f6636aa72":hex:"d6208912348236feee1d258092283dd9db75899769dd109cc2f0f26d88dcc6bf":hex:"5ec75fdd1ed3a742328e11344784b681"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #3
depends_on:0
2:hex:"fe9b7df306c4ccd02afd6142c6650418325617945147de436a55e78aa45866116d6678e013a0e2c5a13e0d01fbd84039":hex:"c4da56f4239fde0bc49b1d852cb36c80205f9e99e5995a80be04bbbba15f25b8d054c397a34cff1326a71f0acc4f7942795cabc3fa46339dc54b4bf7f11c095af8503004d97c485acec8815d1404674592c896ecfabefcbf222f4fe5a3ced0af":hex:"086d09a6ee20c69bf5c054ebc6250f06097c8da1a932fb3d4b1fb5f40af6268a":hex:"44e64b14c49ebb75c536329bb41ab198848849ca121c960db99f7b26330b1f6d":hex:"7aa3a7e159d194399fc8ef9eb531a704"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #4
depends_on:0
2:hex:"c0d47ee2328185df2c299d270e11fee26df753a5b4f899fdc0dff79eb50748232f9f79cf3f5e9bd4a26a48e743843b02":hex:"a6b5dd5f1bad95331caae5852be50a26267af655c98feb8b66c45a8ae2ddfca270ab0d8023e43e6e22a7b5904d63482f045e85556b9c105cde0f3eb7b1fff1026086c80b195196803b5f664362b659578894d6551fb7c4566eec02202fdc298f":hex:"3b575d028046e7f6005dfcdfcdcf03ff77a9cacd2516bcdff7f3601a9a951317":hex:"f13b58daed46f5bf3c62b518ab5c508dd2bc3e33d132939049421ff29c31c4f0":hex:"8469dfa89453d1481abedd6cc62e4e44"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #5
depends_on:0
2:hex:"a0db812a939fbf3942b00be018cff4578b9fb62629c766a50f3518fe634100b1cbc4244ae843fe32125c53b653705457":hex:"7e3dca20a7a977b6616a684e309015cf6a37edd0d85819fe91d074c915b0c9540a8aa486f58685b064851d6164150b1c1b0e2e545c6358d28b2f5263b2fd12c503d271ab6de76d4fa4c604cae469335840328008d8ce5545586b9ea6b21da4f9":hex:"554b297bc32866a52884fabfc6d837690de30467b8f9158b258869e6f4ed0831":hex:"4f688cba5908e0699b33b508847f7dac32f233e6f02cf093efdacae74259f3b6":hex:"9696dd6ed5875cdef4a918a6686455a8"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #6
depends_on:0
2:hex:"ff6cd20443a32c9e938f2a617bbb969ba54040b12723b0d452a669b584ba16ffaacbe38af62b5a62e0c67d165d022344":hex:"efcf7536f32932526fe82b3a2333508404727878723fc09cbd902581d82463cf6acf1ddf4217ea6404469193e8db0e7e8c864ae655b49c6a095f80f1ab16985453f0fb729c119d8a3b820034626a93b1f70eb99b6cd8c990dda34a1c6a4b6eea":hex:"8d412208091b987ee0781ff679c50dbab9ef389156f570f27aaf3e699bdade48":hex:"501381ce5e7718c92ee73e9c247965dd5f0bbde013c4b5e625e9af8907e40566":hex:"4f323934adb8a2096f17d5c4d7444078"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #7
depends_on:0
2:hex:"bd14779153ed9696d3e5143c50b2050b6acd3ea2f8b670ef0e5f4bedf01705727bf9e64ae859214abe6ef497163f0236":hex:"bfb0931b05a3fe232614e1b1c3060b3b07fb75d23ac10190a47a7245a6ecad5f3834e6727b75acc37e9d512d01a4a9cef6cb17eb97e4d1d7c1df572296972f0437a89c19894f721cbe085cf3b89767291a82b999bf3925357d860f181a3681ce":hex:"0b5dc1cdfc40cfdc225798da773411dc9a8779316ceb18d1e8f13809466c6366":hex:"843eb7297570e536b5760c3158adb27c0c426c77d798c08314f53b59aa72d08b":hex:"1e703f3122455a40536c39f9ea3ceaa6"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #8
depends_on:0
2:hex:"64b155fd4b8634663a7e8a602e2b9fe2477be74692643ccfd0b316a025ea6f1fc0dfd0833248cb011082be36cba3c5d1":hex:"a5b15cb1e039d7bbe2db80a32d4f402c7d3c59a45b05255401d1122770dbdb9894841964d5cadc9ae9af007d63e870d0510078885ca402bd222f16d2d27892e23292b65cf370b15d5e5a739ddd13e3e27f7c2e2b945f8e21897c3bbf05d8b043":hex:"aea2fe995be77dfdca6ebaa1c05ba4c84d0e6b9a87905c398a3dfe08aeb26d38":hex:"f4e9e7eb0eea4e2d419de6ad2909d36ec06c79097884bf98981e86dedae366ba":hex:"4a28955dc97936b1c0aed0751a1afed5"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #9
depends_on:0
2:hex:"e6c08e8b8d8e418477087911610096f7e0422083a376a77198e9c60fb2dc8c14aff33d7835878b65322f1561738b1ebb":hex:"d4e0347c2158b882eb1e165f7f2aa1324d6606fe259ca730b2a3367435cb93b89108e49bd97355215063f63e78e8926b264c8a97571fd4d55882364915b7bd544254c25c2b67cdd979737c7811bcdeef5b052d8fe05a89b3291ef669d5579a61":hex:"6607541177bc0c5f278c11cb2dcb187fc9f2c9a9e8eefa657ba92dee12d84b07":hex:"7a439c8593b927867cfa853949e592baea0eeb394b0e2fe9ab0876243b7e11e2":hex:"420888122f2e0334757c4af87bbc28a4"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #10
depends_on:0
2:hex:"4413ff775c9b7d9a3003e0b727e34554e0f615471d52aeb4a059777b372d60332a1a4bcaf906e598581bc5a369b2c933":hex:"a21cf567362fed0edddfd0b1c2d85ff6d2db5484fca8bf90a82da2ab76efcac9286e417628496f37effda150ef4912125aac68aac72e6f900a70192d4ef0b4cc4e9419c93ffb245965ae30c5f8abe20f732d76080bde5a1c6b3f075eb35622d1":hex:"b924d145fc3ecd76f000f12638ef0a49a5d4cf887aa93fc9e5c536febc454f2d":hex:"73dbb40b257e6598744f9107c8e7ff51a080407fc9e80d39d9a4db94f167c116":hex:"84457ea753771ad7c97ce9c03ab08f43"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #11
depends_on:0
2:hex:"5e409d56afb6940f9ffa45e0f92ef4972acedd3557b8e0f5418e302f2720ae5289294176045ad3096ea68db634cf5597":hex:"c5a63c886af7ed7496473a6ae2f27f056c7e61c9aca8c5d095af11b2efe1a6b43344f92b37c7b6977ddbef1273e9511d9305fcbe7f32bc6a62f28d34841350362d2717dd00467224a35985b9fecc2739acd198743849dbfa97f458e2e7d6b1dc":hex:"7fda133a23e929b17548a05013ff9c7085c5af9c979057b8f961ba7514509ff3":hex:"bd061292b6bc3d3e71ed01af091f0169f70f23862efccd9e76345ff607dff3ec":hex:"75b35dab3ad5e35c10ee39529a7f840f"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #12
depends_on:0
2:hex:"ed2a52169791d7c7d332cf258ea4847c359335f9a6839ee767a8f76800ba28e94858cc9b7f526e62a93603fa2b1caa6b":hex:"0a6155ff422ff6ae9814f81bf353bd3454d0c9892f9f3d730dcd8c87626f813cbe1dff1922fe73e4a319be53f4ec05e965c27f239b1e51869069a7e7cdd916fc1fd6f640bfe4b761a8040f8db37fb5ee7508e7d226c7695fb2a8bd791fe49ef2":hex:"14073a1b4f07f3b594fa43d0c8781b8089dd2d9b8ad266e0321aaa6b71a0d058":hex:"4247fc6886e8657b84369cf14469b42aa371d57d27093ee724f87bf20fa9e4e6":hex:"f2aea2bc23e7c70f4ee2f7b60c59d24d"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #13
depends_on:0
2:hex:"f0d3a46501da7ab23d8688725f53f4289ce3bfa627646fe301533ec585f866caafb8131e95460566270f68cd25e1f153":hex:"223d49f99a56cfcf2eb8cca39a8a82ee306c6272d521257f3d7d2a87699111e442fc55a399994d57373141f2207d43a8bbc1e086d67343b7dc2a891853c860fe43fb6be32cf035aca582bf5590cb5001b09b4976ea617fa7bd56da81fdef2df9":hex:"7d12673cad5ad5003400fb94547e2b987e934acf6b930c0e7aec72634bfb8388":hex:"e8583b9983b3ac589a6bb7a8405edfc05d7aa5874a8643f9ac30a3d8945a9f96":hex:"ce72c0ea0e76be6bc82331c9bddd7ffb"
CTR_DRBG NIST Validation (AES-256 use df,True,256,128,256,256) #14
depends_on:0
2:hex:"1e4644df1d01f9a0f31d1d0c67bc9fb9a1ee2223fbfb25520d3881cde2b183b73fe1a8cc5f17796cf22aaaed57607420":hex:"cdac62b5e4ccee8609b1f4b7a8733e69068c71219b6292ecb318b9d3479516807af280cfa20e455d5e96eb6794a3b963957f3c099fd1e1199706d36a06011836af890f3b7b15cda6346a06fdd0f194de40bfbec12b021b02eeabaa34d35b30a3":hex:"8169251ea55cce534c6efd0e8a2956d32ed73be71d12477cea8e0f1ab8251b50":hex:"865d14cb37dd160a3f02f56ac32738f9e350da9e789a1f280ee7b7961ec918a7":hex:"ff11ba8349daa9b9c87cf6ab4c2adfd7"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #0 [#1]
depends_on:0
3:hex:"1b54b8ff0642bff521f15c1c0b665f3f":hex:"5a194d5e2b31581454def675fb7958fec7db873e5689fc9d03217c68d8033820f9e65e04d856f3a9c44a4cbdc1d00846f5983d771c1b137e4e0f9d8ef409f92e":hex:"":hex:"":hex:"":hex:"a054303d8a7ea9889d903e077c6f218f"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #1 [#1]
depends_on:0
3:hex:"90bc3b555b9d6b6aeb1774a583f98cad":hex:"93b7055d7888ae234bfb431e379069d00ae810fbd48f2e06c204beae3b0bfaf091d1d0e853525ead0e7f79abb0f0bf68064576339c3585cfd6d9b55d4f39278d":hex:"":hex:"":hex:"":hex:"aaf27fc2bf64b0320dd3564bb9b03377"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #2 [#1]
depends_on:0
3:hex:"4a2a7dcbde58b8b3c3f4697beb67bba2":hex:"58364ceefad37581c518b7d42ac4f9aae22befd84cbc986c08d1fb20d3bd2400a899bafd470278fad8f0a50f8490af29f938471b4075654fda577dad20fa01ca":hex:"":hex:"":hex:"":hex:"20c5117a8aca72ee5ab91468daf44f29"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #3 [#1]
depends_on:0
3:hex:"911faab1347ae2b3093a607c8bc77bfe":hex:"2f044b8651e1c9d99317084cc6c4fa1f502dd62466a57d4b88bc0d703cabc562708201ac19cdb5cf918fae29c009fb1a2cf42fd714cc9a53ca5acb715482456a":hex:"":hex:"":hex:"":hex:"aae0c0ac97f53d222b83578a2b3dd05d"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #4 [#1]
depends_on:0
3:hex:"f959f1bc100ae30088017fae51289d8e":hex:"77d0f0efbc7ca794a51dff96e85b8e7dfd4875fbfb6e5593ae17908bfbddc313e051cb7d659c838180d834fdd987ae3c7f605aaa1b3a936575384b002a35dd98":hex:"":hex:"":hex:"":hex:"5d80bc3fffa42b89ccb390e8447e33e5"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #5 [#1]
depends_on:0
3:hex:"45a8bb33062783eede09b05a35bd44dd":hex:"6bb14dc34f669759f8fa5453c4899eb5ac4e33a69e35e89b19a46dbd0888429d1367f7f3191e911b3b355b6e3b2426e242ef4140ddcc9676371101209662f253":hex:"":hex:"":hex:"":hex:"0dfa9955a13a9c57a3546a04108b8e9e"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #6 [#1]
depends_on:0
3:hex:"0ada129f9948073d628c11274cec3f69":hex:"b3d01bcb1ec747fdb7feb5a7de92807afa4338aba1c81ce1eb50955e125af46b19aed891366ec0f70b079037a5aeb33f07f4c894fdcda3ff41e2867ace1aa05c":hex:"":hex:"":hex:"":hex:"f34710c9ebf9d5aaa5f797fd85a1c413"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #7 [#1]
depends_on:0
3:hex:"052a5ad4cd38de90e5d3c2fc430fa51e":hex:"98482e58e44b8e4a6b09fa02c05fcc491da03a479a7fad13a83b6080d30b3b255e01a43568a9d6dd5cecf99b0ce9fd594d69eff8fa88159b2da24c33ba81a14d":hex:"":hex:"":hex:"":hex:"3f55144eec263aed50f9c9a641538e55"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #8 [#1]
depends_on:0
3:hex:"004cd2f28f083d1cee68975d5cbbbe4f":hex:"6238d448015e86aa16af62cdc287f1c17b78a79809fa00b8c655e06715cd2b935bf4df966e3ec1f14b28cc1d080f882a7215e258430c91a4a0a2aa98d7cd8053":hex:"":hex:"":hex:"":hex:"b137119dbbd9d752a8dfceec05b884b6"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #9 [#1]
depends_on:0
3:hex:"f985b3ea2d8b15db26a71895a2ff57cd":hex:"50d3c4ecb1d6e95aebb87e9e8a5c869c11fb945dfad2e45ee90fb61931fcedd47d6005aa5df24bb9efc11bbb96bb21065d44e2532a1e17493f974a4bf8f8b580":hex:"":hex:"":hex:"":hex:"eb419628fbc441ae6a03e26aeecb34a6"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #10 [#1]
depends_on:0
3:hex:"100f196991b6e96f8b96a3456f6e2baf":hex:"d27cbeac39a6c899938197f0e61dc90be3a3a20fa5c5e1f7a76adde00598e59555c1e9fd102d4b52e1ae9fb004be8944bad85c58e341d1bee014057da98eb3bc":hex:"":hex:"":hex:"":hex:"e3e09d0ed827e4f24a20553fd1087c9d"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #11 [#1]
depends_on:0
3:hex:"88f55d9ba8fef7828483298321133fec":hex:"16f9f5354d624c5ab1f82c750e05f51f2a2eeca7e5b774fd96148ddba3b38d34ba7f1472567c52087252480d305ad1c69e4aac8472a154ae03511d0e8aac905a":hex:"":hex:"":hex:"":hex:"07cd821012ef03f16d8510c23b86baf3"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #12 [#1]
depends_on:0
3:hex:"126479abd70b25acd891e1c4c92044f9":hex:"70afbc83bf9ff09535d6f0ddc51278ad7909f11e6f198b59132c9e269deb41ba901c62346283e293b8714fd3241ae870f974ff33c35f9aff05144be039d24e50":hex:"":hex:"":hex:"":hex:"0f90df350741d88552a5b03b6488e9fb"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #13 [#1]
depends_on:0
3:hex:"a45f2fca553089fe04e7832059dc7976":hex:"5e5a9e1e3cb80738c238464ede1b6b6a321261a3b006a98a79265ad1f635573bba48dccf17b12f6868478252f556b77c3ec57a3bf6bb6599429453db2d050352":hex:"":hex:"":hex:"":hex:"6eb85ae2406c43814b687f74f4e942bc"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #14 [#1]
depends_on:0
3:hex:"52dbb43241002415966eaec2615aba27":hex:"31cfe60e5ed12ff37d7f2270963def598726320c02b910b5c6c795e2209b4b4a95866c64cb097af1d6404d1e6182edf9600e1855345375b201801d6f4c4e4b32":hex:"":hex:"":hex:"":hex:"2a270f5ef815665ddd07527c48719ab1"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #0 [#1]
depends_on:0
3:hex:"176200bb44808b5400b24e1b5f56cf73":hex:"f84d395b1734eac4600dbc36f6b1e1599bc7f2608dc8ecb3a55369d7b1b122a09f5ac9c16d9a2be37d2ff70a9bba732fc3785b23ff4ade3c8404da3f09f95a8f":hex:"aef28c9169e9af74c73432d4aa6f5dff9ea4a53433de2ecb9bf380a8868c86e1":hex:"0626ae19763c5313b627a8d65cf1cfba46dfd6773242738b9b81fde8d566ade1":hex:"63c160ed6a6c1fffd0586f52fa488a9055533930b36d4fa5ea3467cda9ffe198":hex:"e8f91633725d786081625fb99336a993"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #1 [#1]
depends_on:0
3:hex:"19c3d16197ac93bf58c4110c9e864804":hex:"50755cc0178c68ae70befd7744f6f1e3f6a59b3bbe484a744436079c7fae8d83c4965516fb952c63e1d0561d92cccc56037465815c9e549c9adce4a064877128":hex:"5cb82d2c297404f3db1909480c597dd081d94ca282ba9370786a50f3cbab6a9b":hex:"96d130faf1a971920c2bf57bcd6c02d5a4af7d3c840706081e4a50e55f38bf96":hex:"1b0d04f179690a30d501e8f6f82201dbab6d972ece2a0edfb5ca66a8c9bcf47d":hex:"4628b26492e5cb3b21956d4160f0b911"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #2 [#1]
depends_on:0
3:hex:"4b1edd0f53bf4e012def80efd740140b":hex:"e50c31ebbb735c4a53fc0535647ae1fff7a5ac4fa4068ba90f1fa03ca4ddedecd5b1898d5e38185054b0de7e348034b57067a82a478b0057e0c46de4a7280cd9":hex:"e7154ec1f7ac369d0bd41238f603b5315314d1dc82f71191de9e74364226eb09":hex:"9444238bd27c45128a25d55e0734d3adafecccb2c24abdaa50ac2ca479c3830b":hex:"ab2488c8b7e819d8ce5ec1ffb77efc770453970d6b852b496426d5db05c03947":hex:"a488a87c04eb1c7586b8141ed45e7761"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #3 [#1]
depends_on:0
3:hex:"1f89c914649ae8a234c0e9230f3460f9":hex:"5e029c173dc28ab19851a8db008efbcf862f4187fca84e4e6f5ba686e3005dba5b95c5a0bcf78fb35ada347af58ec0aca09ed4799cd8a734739f3c425273e441":hex:"b51f5fd5888552af0e9b667c2750c79106ce37c00c850afbe3776746d8c3bce1":hex:"9b132a2cbffb8407aa06954ae6ebee265f986666757b5453601207e0cbb4871b":hex:"f1c435e2ebf083a222218ee4602263872a2d3e097b536a8cc32a5a2220b8065f":hex:"a065cc203881254ca81bd9595515e705"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #4 [#1]
depends_on:0
3:hex:"0ef2be2d00a16051404fc2a0faa74fdc":hex:"b66c882ae02c5215ed3bcd9e9a40934b09bf48a15fe7558c9d9ceb0ebec63625ea18f7c3ab341d9f7edd8e1d8816edecb34dbd71ae02771327b5ebc74613dadd":hex:"1ebe9893957a5c4a707793906d31bb201e88d88a22abd6baa6461fc61def7ffb":hex:"f81e26744834413cb95af8d438d0050c7c968f929a33e35ee5c6715a0a520950":hex:"687a848b2b6c715a0e613b3f3bb16cf2f056543eb9dd6b8aee8de8aa6fd8a1e6":hex:"a6c4a7e99d08cc847ac0b8c8bcf22ec0"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #5 [#1]
depends_on:0
3:hex:"eb2439d156c4f51fb1943c26f27de8af":hex:"ad153fd266d9f73b21f4e5e88d3d13ba8325abdec427d5d8f671cfccdbd3510e9774d59a14d9b5472b217b7bcf355436a51965d2dff7c4ac586ab812f20d326e":hex:"e24bd6b69a40fa0a02cefbbaa282f8f63a80e154be338d1b913418d4ff7a810d":hex:"fd40baf11d7cdd77641a2b46916cb0c12980e02612ef59fb6fe7dabbbe7a85c0":hex:"a40019e3b85d7d5775e793dd4c09b2bdc8253694b1dcb73e63a18b066a7f7d0c":hex:"7cd8d2710147a0b7f053bb271edf07b5"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #6 [#1]
depends_on:0
3:hex:"b23796d88ee5ae75ff2ba4fbbd5e2de8":hex:"b249d2d9b269b58c5355710aaae98be12d8fb2e79046b4e6deeec28adad7e789999847e20de11f7c3277216374f117e3e006bdf99bb8631aa4c4c542cd482840":hex:"79f0214b6b0c5ffb21b1d521498b71d22c67be4607c16300ab8dde3b52498097":hex:"582be1e080264b3e68ec184347a5b6db1e8be1811578206e14ad84029fe39f71":hex:"f5e9c3356810793f461f889d8c5003b1c0b20a284cb348301ce7b2dd7a1c7dd7":hex:"1aa8cf54994be6b329e9eb897007abf0"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #7 [#1]
depends_on:0
3:hex:"081db0b1620a56afd87c2fd2bebb1db3":hex:"3f1e90d88870a0bd03364036b655495e3e7d51bf67fb64ba0cbf003430af5585f5936b84ab3b8a55c02b8b6c54bea09cf2d77691858c5818991383add5f0c644":hex:"5b98bc83ae8bed5c49cb71689dc39fee38d5d08bdfa2a01cee9d61e9f3d1e115":hex:"aad3e58fdd98aa60fc2cae0df3fc734fff01a07f29f69c5ffeb96d299200d0d8":hex:"bad9039ebb7c3a44061353542a2b1c1a89b3e9b493e9f59e438bfc80de3d1836":hex:"8d01e3dc48b28f016fc34655c54be81f"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #8 [#1]
depends_on:0
3:hex:"a8427443d9c34abcdcca061a2bbcff52":hex:"b0e9b2192adc8912653d90a634d5d40c53ca4383290a8764bdf92667f859d833c3e72ad0ff41e07fe257b1ead11649be655c58a5df233114e7eda2558b7214d7":hex:"c6cad9fb17ada437d195d1f8b6a7fa463e20050e94024170d2ffc34b80a50108":hex:"be461a9c1a72ebaf28ee732219e3ca54cbee36921daaa946917a7c63279a6b0e":hex:"b6d110d6b746d7ccf7a48a4337ba341d52508d0336d017ae20377977163c1a20":hex:"16ccd63dbf7b24b6b427126b863f7c86"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #9 [#1]
depends_on:0
3:hex:"86bd02976e6c50656372b8c212cf0a7a":hex:"89900b0febf6b4e19ab8fc5babb4122a8aad86d658d0c2f98988c99fbd8530ff4ad365bd5fddaa15f96537bd72deb5384405b610e6ebae83e848307051fd6c82":hex:"41bf3794ee54647a48a2588fdfdea686f1af6792e957d42f181f2631b207ac0c":hex:"c4478afbea4eecb225448f069b02a74c2a222698c68e37eb144aff9e457f9610":hex:"41a99e0d3f5b767f9bedcb2f878a5d99d42856bed29042d568b04e347624bf7f":hex:"863337529aac9ab1e9f7f8187ea7aa7d"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #10 [#1]
depends_on:0
3:hex:"e809ef8d4c3d82575833d51ac69481b2":hex:"3e831b7715ce202c95ec85337e2c0061d972169955bd96fbe1f758508c0336b3226260ea5e66f943b538eb115ffe4d5e534cbe58262a610528641629bc12fc75":hex:"4d40c6a961168445c1691fea02ebd693cb4b3f74b03d45a350c65f0aaccb118b":hex:"b07dc50e6ca7544ed6fdebd8f00ed5fa9b1f2213b477de8568eb92dddaabfe3f":hex:"cbac982aa9f1830d0dc7373d9907670f561642adb1888f66b4150d3487bf0b8d":hex:"2814be767d79778ebb82a096976f30db"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #11 [#1]
depends_on:0
3:hex:"ad71caa50420d213b25f5558e0dc1170":hex:"6a3fd23e7dc934e6de6eb4cc846c0dc3cf35ea4be3f561c34666aed1bbd6331004afba5a5b83fff1e7b8a957fbee7cd9f8142326c796ca129ec9fbacf295b882":hex:"3042dd041b89aaa61f185fdda706c77667515c037f2a88c6d47f23ddadc828ae":hex:"9b1e3f72aaab66b202f17c5cc075cfba7242817b2b38c19fe8924ca325b826ea":hex:"8660b503329aaea56acdb73ca83763299bac0f30264702cb9d52cbaf3d71d69d":hex:"c204a3174784d82b664e9a1c0a13ffa6"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #12 [#1]
depends_on:0
3:hex:"5fd6606b08e7e625af788814bef7f263":hex:"baf8750e07194fc7172c736e0fdea0a632810d45602dff17ce37adf106d652f87e31b6bd24d21481c86444d8109586118672a6f93731b7438a3f0f39648b83a3":hex:"3c37193d40e79ce8d569d8aa7ef80aabaa294f1b6d5a8341805f5ac67a6abf42":hex:"c7033b3b68be178d120379e7366980d076c73280e629dd6e82f5af1af258931b":hex:"452218a426a58463940785a67cb34799a1787f39d376c9e56e4a3f2215785dad":hex:"561e16a8b297e458c4ec39ba43f0b67e"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #13 [#1]
depends_on:0
3:hex:"08def734914ecf74b9eccb5dfaa045b8":hex:"6697f889fcf6dae16881dc1e540e5c07f9461d409acee31842b04f93c00efbba670dfbf6040c1c2e29ad89064eae283fd6d431832f356e492bc5b2049f229892":hex:"a6ac87af21efd3508990aac51d36243d46237b3755a0e68680adb59e19e8ae23":hex:"0052152872b21615775431eb51889a264fed6ca44fa0436b72a419b91f92604c":hex:"ebadf71565d9a8cc2621403c36e6411e7bed67193a843b90ccf2f7aa9f229ca2":hex:"c83fa5df210b63f4bf4a0aca63650aab"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #14 [#1]
depends_on:0
3:hex:"6437862e93060def199029ff2182f1e5":hex:"719d1afcb6dc8ca26cba6a7c10f59cf82345b2a0c631a7879812d6f2d2663b49f9e92daecb81ff7c0790205d66694526477d6de54a269f542cb5e77fe4bc8db3":hex:"5c961db0ac2ea8caf62c9acc44465dcfb4d721fcb2cd3e1c76cdcb61bfaa7e75":hex:"24eabd392d37493e306705d0b287be11a4d72dd4b9577ac4098ef0dae69b0000":hex:"9e4f05c1b85613e97958bc3863e521331b2bd78fdf2585f84607bf2238e82415":hex:"21aaae76dc97c9bf7cf858054839653e"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #0 [#1]
depends_on:0
3:hex:"cd7a1981c1b7079c1c38f5aeee86db22207cb9faed8c576b1724ca7817aa6abfb26c42a019eb4c2f4064f0587ea2b952":hex:"7f88c3805ae0857c5cbb085a5d6259d26fb3a88dfe7084172ec959066f26296a800953ce19a24785b6acef451c4ce4c2dfb565cbe057f21b054a28633afbdd97":hex:"":hex:"":hex:"":hex:"76c1cdb0b95af271b52ac3b0c9289146"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #1 [#1]
depends_on:0
3:hex:"0ccdac2fd65a86bf8f8e9ddcabffb9d29a935139f627c165a815b23137eeee94cbb21be86ac5117379177d37728db6fd":hex:"6f61703f92d3192cd982b2e52a8683e0d62918d51b12e084deae06c4a8e08ecfb3d2d30a980a70b083710bc45d9d407966b52829cf3813cc970b859aa4c871fe":hex:"":hex:"":hex:"":hex:"e6c73e159d73c2ba8950cd77acb39c10"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #2 [#1]
depends_on:0
3:hex:"fbbcc4abfd671296de3e0dcf409a139e35deae126c1941bf1afcc8d3da3a2d65f54a6d317bb6d683a3a77f6266b007ff":hex:"c662ed723e7041877542fdcf629533d4a74393eb4dae4f3ec06d2d1c0d37ed7f519609a8485cb8deb578ae4cbb45c98ef7f2f2e677363e89fb3744286db6bfc1":hex:"":hex:"":hex:"":hex:"9d934d34417c6d0858f4a3faacbe759e"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #3 [#1]
depends_on:0
3:hex:"1b824790b6b22b246bcc1bcfbbb61a76045476672f917b72e79cca358e650eb29ed49fb0a5739e097f5f5336d46fc619":hex:"c57a5686486ebacc2422236b19110c754795a869a8157901cf71303de1adc6af16a952190a395d6c20e155e690f41922f6f721dc8e93da81afb844f68714cba7":hex:"":hex:"":hex:"":hex:"13e7bf23d88f3bb5a5106a8227c8c456"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #4 [#1]
depends_on:0
3:hex:"2ea7861e374232cb8ceecbbd9a18fc1f63c31f833fe394f1e19c8ef61092a56f28342fa5b591f7b951583d50c12ef081":hex:"6a0873634094be7028b885c345cd5016295eec5e524f069de6510ae8ac843dba2cc05c10baa8aad75eac8e8d1a8570f4d2a3cf718914a199deb3edf8c993a822":hex:"":hex:"":hex:"":hex:"c008f46a242ae0babad17268c9e0839a"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #5 [#1]
depends_on:0
3:hex:"39caa986b82b5303d98e07b211ddc5ce89a67506095cad1aeed63b8bfe0d9c3d3c906f0c05cfb6b26bab4af7d03c9e1a":hex:"f2059f7fb797e8e22de14dac783c56942a33d092c1ab68a762528ae8d74b7ad0690694ede462edbd6527550677b6d080d80cdabe51c963d5d6830a4ae04c993f":hex:"":hex:"":hex:"":hex:"202d3b2870be8f29b518f2e3e52f1564"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #6 [#1]
depends_on:0
3:hex:"a4e25102c1b04bafd66bfe1ce4a4b340797f776f54a2b3afe351eede44e75c28e3525155f837e7974269d398048c83c3":hex:"0a03b7d026fab3773e9724dacb436197954b770eca3060535f2f8152aa136942915304dede1de0f5e89bd91d8e92531b5e39373013628fea4ee7622b9255d179":hex:"":hex:"":hex:"":hex:"be21cab637218ddffa3510c86271db7f"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #7 [#1]
depends_on:0
3:hex:"6de33a116425ebfe01f0a0124ad3fad382ca28473f5fc53885639788f9b1a470ab523b649bad87e76dee768f6abacb55":hex:"d88312da6acbe792d087012c0bf3c83f363fa6b7a9dd45c3501009fb47b4cfcfeb7b31386155fe3b967f46e2898a00ecf51ec38b6e420852bef0a16081d778cc":hex:"":hex:"":hex:"":hex:"2c285bfd758f0156e782bb4467f6832c"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #8 [#1]
depends_on:0
3:hex:"b8ab42fd3f6306426602cae0c48eb02ffa7053940389900c17846e1d9726251762095383f2ec3406b3381d94a6d53dd8":hex:"6a7873ccb7afb140e923acbec8256fa78232f40c0c8ba3dcbcf7074d26d6d18a7e78fffda328f097706b6d358048ee6a4728c92a6f62b3f2730a753b7bf5ec1f":hex:"":hex:"":hex:"":hex:"13504a2b09474f90d2e9ef40d1f2d0d5"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #9 [#1]
depends_on:0
3:hex:"042b524444b9903c1ecb80af21eef0e884115561a15a1ab2f9f3a322edcbf14174f54d315196a632940c2c6f56612c09":hex:"31ba5f801aeaac790f2480fbd2373a76ba1685ebebc5ae7cd4844733ec3cfb112634b3899104dcc16050e1206f8b3fb787d43d54de2c804fd3d8eb98e512bb00":hex:"":hex:"":hex:"":hex:"0a0484c14e7868178e68d6d5c5f57c5c"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #10 [#1]
depends_on:0
3:hex:"632758f92efaca39615862177c267906ab0424230d481ee0a5aa1a5f66697d3918d4aab3f310b72a7f2d71c0a96b9247":hex:"46dc837620872a5ffa642399213b4eebfb28ca069c5eaaf2a636f5bd647de365c11402b10ecd7780c56d464f56b653e17af8550b90a54adb38173a0b2f9e2ea7":hex:"":hex:"":hex:"":hex:"90432ce3f7b580961abecde259aa5af6"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #11 [#1]
depends_on:0
3:hex:"7b389118af3d0f8336b41cf58c2d810f0e5f9940703fd56a46c10a315fb09aafd7670c9e96ffa61e0cb750cb2aa6a7fe":hex:"76e92e9f00fc7d0c525c48739a8b3601c51f8f5996117a7e07497afee36829636e714dbcb84c8f8d57e0850a361a5bdfc21084a1c30fb7797ce6280e057309b7":hex:"":hex:"":hex:"":hex:"7243964051082c0617e200fcbbe7ff45"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #12 [#1]
depends_on:0
3:hex:"e50d38434e9dfe3601e7ea1765d9fe777d467d9918974b5599ec19f42d7054b70ff6db63a3403d2fd09333eda17a5e76":hex:"c9aa4739011c60f8e99db0580b3cad4269874d1dda1c81ffa872f01669e8f75215aaad1ccc301c12f90cd240bf99ad42bb06965afb0aa2bd3fcb681c710aa375":hex:"":hex:"":hex:"":hex:"28499495c94c6ceec1bd494e364ad97c"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #13 [#1]
depends_on:0
3:hex:"3253cb074d610db602b0a0d2836df1f20c3ee162d80b90b31660bb86ef3f0789fa857af4f45a5897bdd73c2295f879b6":hex:"b06960a92d32a9e9658d9800de87a3800f3595e173fdc46bef22966264953672e2d7c638cc7b1cada747026726baf6cea4c64ba956be8bb1d1801158bee5e5d4":hex:"":hex:"":hex:"":hex:"b6608d6e5fcb4591a718f9149b79f8f1"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #14 [#1]
depends_on:0
3:hex:"83e4733566f90c8d69e6bcbe9fb52521ff3e26f806d9b7b86e9344cca0305dbf106de855240f1d35492cc6d651b8b6ae":hex:"0e0105b12af35ac87cb23cf9ca8fb6a44307c3dcdc5bc890eb5253f4034c1533392a1760c98ba30d7751af93dd865d4bd66fbbeb215d7ff239b700527247775d":hex:"":hex:"":hex:"":hex:"68d64d1522c09a859b9b85b528d0d912"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #0 [#1]
depends_on:0
3:hex:"a94da55afdc50ce51c9a3b8a4c4484408b52a24a93c34ea71e1ca705eb829ba65de4d4e07fa3d86b37845ff1c7d5f6d2":hex:"a53e371017439193591e475087aaddd5c1c386cdca0ddb68e002d80fdc401a47dd40e5987b2716731568d276bf0c6715757903d3dede914642ddd467c879c81e":hex:"20f422edf85ca16a01cfbe5f8d6c947fae12a857db2aa9bfc7b36581808d0d46":hex:"7fd81fbd2ab51c115d834e99f65ca54020ed388ed59ee07593fe125e5d73fb75":hex:"cd2cff14693e4c9efdfe260de986004930bab1c65057772a62392c3b74ebc90d":hex:"4f78beb94d978ce9d097feadfafd355e"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #1 [#1]
depends_on:0
3:hex:"e8649d4f86b3de85fe39ff04d7afe6e4dd00770931330b27e975a7b1e7b5206ee2f247d50401a372c3a27197fec5da46":hex:"78d7d65c457218a63e2eb1eba287f121c5466728ac4f963aeaabf593b9d72b6376daea6436e55415ad097dee10c40a1ff61fca1c30b8ab51ed11ff090d19ef9a":hex:"cc57adc98b2540664403ad6fd50c9042f0bf0e0b54ed33584ee189e072d0fb8f":hex:"ab2f99e2d983aa8dd05336a090584f4f84d485a4763e00ced42ddda72483cd84":hex:"0ecd7680e2e9f0250a43e28f2f8936d7ef16f45d79c0fa3f69e4fafce4aeb362":hex:"08e38625611bb0fb844f43439550bd7a"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #2 [#1]
depends_on:0
3:hex:"6c79e1556889b3c074fc083a120d73784b888c5acb877899f17ce52e424b84178d144441aa9f328c730a951b02b048df":hex:"c78ff6b9fc91cbce246c9fcc2366d5f7dd6d99fb1325d8997f36819232d5fcd12ccafdcbefd01409d90acd0e0ffb7427c820b2d729fe7e845e6a6168fc1af0b5":hex:"60cba10826de22c5e85d06357de63d6b2ff0719694dafca6ab33283f3a4aacdd":hex:"8943c22fb68b30811790a99b9cbb056e1a2c329185a199c76ba5aeceb2fcd769":hex:"70671a50e8387bf232989d904c19215c7535ad2d0c5dec30a744c8d2706be6ec":hex:"f6b94b671cae8dfa8387719bfd75ee84"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #3 [#1]
depends_on:0
3:hex:"f5ab77b2a8e370548b88febfd79772144cd5fc8d78062582addd4ff1e5c10094b390e66b3c4efb087510de1b9d25703f":hex:"21a21c9314b37d4ade4a50a5d85995e0be07e358ed9bca19daa867a8d47847105dca7a424f32f715adb8fea5d3a41cfe388872a42ab18aa5cbcd7bde4adc3f8b":hex:"023d582569a7ff1405e44cf09ceebb9d3254eef72286e4b87e6577a8ab091a06":hex:"39597519872d49fbd186704241ba1dc10b1f84f9296fb61d597dbd655a18f997":hex:"3091c9fe96109b41da63aa5fa00d716b5fa20e96d4f3e0f9c97666a706fa56f1":hex:"1fb57058b3ba8751df5a99f018798983"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #4 [#1]
depends_on:0
3:hex:"f0b79e292d0e393e78b6d6117e06d2e725823fe35bde1146502967a78d99d6bca564f0e2f324272f968be5baab4aeb29":hex:"192054dddac02157a35eb7f75ae8ebdb43d6b969e33942fb16ff06cd6d8a602506c41e4e743b8230e8239b71b31b2d5e3614e3a65d79e91d5b9fc9d2a66f8553":hex:"b12241e90d80f129004287c5b9911a70f7159794e6f9c1023b3b68da9237e8b7":hex:"59e9c3c0f90e91f22c35a3be0c65f16157c569c7e3c78a545d9840f648c60069":hex:"089a59af69f47ddb4191bd27720bb4c29216f738c48c0e14d2b8afd68de63c17":hex:"15287156e544617529e7eede4aa9c70e"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #5 [#1]
depends_on:0
3:hex:"e3f33843aecb35d01001ff92ab9a0f1a5431ba9de3e4f3247cda8c62acc86f7066448f639d8ba8b5249337f8c353bbbd":hex:"ef081af1f62400a3d193969d689a40234998afb646d99a7c4b9cbbf47e650cda93a90e754a16fffa25fc2a2edab09720b4520c47309ec4f6d9f76f0162af6cae":hex:"e7cc55b72862544a8661b5034e15587b1e5a45eb5dc744f5fa1db9b267f1c3ff":hex:"882d30c888eb8e344b1d17057074606fe232ceb42eb71055264ede7bb638f2a2":hex:"9ce65e95c1e735fe950e52c324e7551403d0ef70ad865bd31fef1e22b129fdd6":hex:"205e3a53367c4a5183be74bb875fa717"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #6 [#1]
depends_on:0
3:hex:"f30a18d597d8591a22dee908de95c5af74884b025f39b4f6707d28447d9d0a3114a57bc2d9eed8e621ec75e8ce389a16":hex:"fae3d554d12a14e29de1b622922f27559559ca1518c9f800375a37a212e8b9a653cc3700223e9404d5bf781d15fccf638050a1394592caba001cfc65d61ef90b":hex:"54240edd89016ed27e3bb3977a206836f5ef1fba0f000af95337d79caca9cf71":hex:"250611e51852d933ff1a177b509c05e3228cb9f46dfb7b26848a68aad2ce4779":hex:"f8b602d89fa1a0bfb31d0bd49246b458200a1adb28b64a68f7c197f335d69706":hex:"7b63bfb325bafe7d9ef342cd14ea40a4"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #7 [#1]
depends_on:0
3:hex:"c8dbc3d39beb612811c52e2b46ef76d2b7bd5d3a90ceddf9fb864fe6f44e36687d88158d61014e192f9a3cd474338e13":hex:"8e60115b4af9c8e5606223792539e9ba87e9ef46cd16fcc09046db1ef8d3c036241cae5d61141711818e9e861dbd833632069ebf5af1bd6d4e513f059ab1efd3":hex:"9b56eba0838457f736fc5efa2cfbe698908340f07d4680e279d21dd530fdc8c8":hex:"62c47ece469a7a409e4b2b76d1c793aaf11654e177cc8bf63faff3e6c5a5395c":hex:"4251597013d0c949c53bbd945477b78aa91baa95f1ff757c3a039ccc4e1f4789":hex:"af2f37160940f0cc27d144a043ddf79b"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #8 [#1]
depends_on:0
3:hex:"a37f9ed6c4e8f74ff16046b0678ef7bd24fcdca247b771ea1ce1fd48e3f5d2067e38aaf64ec59f1f49d96fa85e60ef03":hex:"95da91f4185b254322ef0fc852473a9b9e4c274b242ded8a4eae6f1e2badde0664cf57f2128aa3dc83e436f7e80928a01d93bf25011eedf0190d0bf3619cd555":hex:"b4a22f5598f79d34f0b9600763c081b0200ba489da7028ad0283828545c6d594":hex:"fa3edc0962b20a9d9e1d0afcad907c8097c21d7a65c0e47c63d65cea94bf43bd":hex:"49ba791a227e9e391e04225ad67f43f64754daac0b0bb4c6db77320943231ec3":hex:"32f313ded225289793c14a71d1d32c9f"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #9 [#1]
depends_on:0
3:hex:"87f85b9c19eba1d953b6613cf555c21bc74428d9a8fee15e6cd717e240506f3e80860423973a66c61820d4ce1c6bb77d":hex:"f22dd3517350176e35e1b7ecc8c00bea4747f0ac17bda1b1ddf8cdf7be53ff8c326268366e89cf3b023a9646177a0dcca902f0c98bf3840c9cbdf5c0494bee3c":hex:"611caa00f93d4456fd2abb90de4dbcd934afbf1a56c2c4633b704c998f649960":hex:"cba68367dc2fc92250e23e2b1a547fb3231b2beaab5e5a2ee39c5c74c9bab5f5":hex:"f4895c9653b44a96152b893b7c94db80057fb67824d61c5c4186b9d8f16d3d98":hex:"a05de6531a1aa1b2ba3faea8ad6ac209"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #10 [#1]
depends_on:0
3:hex:"9670deb707caabc888a3b0df7270942934732e02be728a4bedb5fc9ca4d675b2f3b47c7132c364ce6292cef7c19b60c7":hex:"bba34e6f4ee27e5d4e885e59f8bbb0dc7353a8912e66637d7515a66e5398d9a8cbd328fed32f71bdd34c73cdf97e0d211be6dabfb0144e1011fd136cf01ea4e4":hex:"9f55da36babd6ea42082f5f5d4330f023440bb864f8ad5498a29cf89757eaeab":hex:"8013a309058c91c80f4d966f98bce1d4291003ad547e915777a3fce8ae2eaf77":hex:"c83106272d44e832e94c7096c9c11f6342e12ec06d5db336424af73d12451406":hex:"bc8d4d00609662c1163dca930901821d"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #11 [#1]
depends_on:0
3:hex:"6d984c8ab923a7e118447fd53ad287b8f01d1e6112cff12bfb338ecd3ed16bafdd634677c600bdd68f852a946f45c3d9":hex:"ed0e524ed2990ef348dbb15b3f964b12ad3109978d6952ae193b21e94510a47406926620798e71a0ffcbdd2e54ec45509d784a8bfc9d59cb733f9f11fc474b5e":hex:"0a3a32260d04dd7a82fb0873ecae7db5e5a4b6a51b09f4bf8a989e1afacbda3b":hex:"3cbcabb83aab5a3e54836bbf12d3a7862a18e2dffeeb8bdd5770936d61fd839a":hex:"f63b30a3efc0273eba03bf3cf90b1e4ac20b00e53a317dbf77b0fe70960e7c60":hex:"ab9af144e8fad6a978a636ad84e0469e"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #12 [#1]
depends_on:0
3:hex:"2c59520d6f8ce946dcc5222f4fc80ba83f38df9dce2861412eebb1614245331626e7fb93eedbad33a12e94c276deff0a":hex:"2882d4a30b22659b87ad2d71db1d7cf093ffca80079a4ef21660de9223940969afec70b0384a54b1de9bcca6b43fb182e58d8dfcad82b0df99a8929201476ae9":hex:"d3c17a2d9c5da051b2d1825120814eaee07dfca65ab4df01195c8b1fcea0ed41":hex:"dcc39555b87f31973ae085f83eaf497441d22ab6d87b69e47296b0ab51733687":hex:"9a8a1b4ccf8230e3d3a1be79e60ae06c393fe6b1ca245281825317468ca114c7":hex:"fba523a09c587ecad4e7e7fd81e5ca39"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #13 [#1]
depends_on:0
3:hex:"1c1207f50b645aaed5c16fe36f6aae83af4924e6b98a7e2a2533a584c1bac123f8b6f0e05109e0132950ae97b389001a":hex:"8ae9a5903da32a38b7c6fed92dd0c6a035ca5104a3528d71a3eacc2f1681379724991a0053e8dac65e35f3deee0435e99f86364577c8ebdba321872973dc9790":hex:"568bfee681d7f9be23a175a3cbf441b513829a9cbdf0706c145fdcd7803ce099":hex:"e32cb5fec72c068894aaeabfc1b8d5e0de0b5acdf287a82e130a46e846770dc2":hex:"d4418c333687a1c15cac7d4021f7d8823a114bb98f92c8a6dccc59ff8ad51c1f":hex:"194e3018377cef71610794006b95def5"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #14 [#1]
depends_on:0
3:hex:"28254014c5d6ebf9bd9e5f3946fc98e55fe351deee8fc70333e4f20f1f7719a522b3ea9a4424afe68208d1cc6c128c47":hex:"98a0db985544c33990aee0f69655dba7198e6720ce56ff9d4662e26f0c6b4ee7ab599932c05295f6c5a4011085c5b2c861a5a8ae4f572ce614ff2dafc0fddb34":hex:"64215cbe384f1f4cf548078ffd51f91eee9a8bae5aacdd19ca16bcaaf354f8ad":hex:"2e21df638dabe24aebf62d97e25f701f781d12d0064f2f5a4a44d320c90b7260":hex:"7f936274f74a466cbf69dbfe46db79f3c349377df683cb461f2da3b842ad438e":hex:"25c469cc8407b82f42e34f11db3d8462"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #0 [#2]
depends_on:0
3:hex:"e26c8a13dae5c2da81023f27ab10b878":hex:"fea104f90c5881df7ad1c863307bad22c98770ecd0d717513a2807682582e3e18e81d7935c8a7bacddd5176e7ca4911b9f8f5b1d9c349152fa215393eb006384":hex:"":hex:"":hex:"":hex:"fd87337c305a0a8ef8eef797601732c2"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #1 [#2]
depends_on:0
3:hex:"8d7dda20a9807804bfc37bd7472d3b0c":hex:"1d723cbc2ff2c115160e7240340adbf31c717696d0fdfecf3ec21150fca00cde477d37e2abbe32f399a505b74d82e502fbff94cecac87e87127d1397d3d76532":hex:"":hex:"":hex:"":hex:"7221761b913b1f50125abca6c3b2f229"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #2 [#2]
depends_on:0
3:hex:"c02e3b6fd4fea7ec517a232f48aaa8cb":hex:"0820fc21cecba6b2fe053a269a34e6a7637dedaf55ef46d266f672ca7cfd9cc21cd807e2b7f6a1c640b4f059952ae6da7282c5c32959fed39f734a5e88a408d2":hex:"":hex:"":hex:"":hex:"667d4dbefe938d6a662440a17965a334"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #3 [#2]
depends_on:0
3:hex:"9aee0326f9b16f88a4114e8d49b8e282":hex:"ef0aae3f9c425253205215e5bf0ad70f141ad8cc72a332247cfe989601ca4fc52ba48b82db4d00fe1f279979b5aed1ae2ec2b02d2c921ee2d9cb89e3a900b97d":hex:"":hex:"":hex:"":hex:"651ad783fe3def80a8456552e405b98d"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #4 [#2]
depends_on:0
3:hex:"1e7a4961d1cd2fd30f571b92a763c2c5":hex:"a9262ed5b54880cc8ecd4119cce9afe3de8875d403f7ca6b8ed8c88559470b29e644fddd83e127c5f938bc8a425db169c33c5c2d0b0c5133c8f87bbc0b0a7d79":hex:"":hex:"":hex:"":hex:"1124c509ca52693977cf461b0f0a0da9"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #5 [#2]
depends_on:0
3:hex:"ae0b0d2e84f48c632f031356cdea60ac":hex:"554cf6fad1c376ad6148cd40b53105c16e2f5dd5fa564865b26faa8c318150bfb2294e711735df5eb86ff4b4e778531793bad42403d93a80d05c5421229a53da":hex:"":hex:"":hex:"":hex:"1212e5d3070b1cdf52c0217866481c58"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #6 [#2]
depends_on:0
3:hex:"16b8c7495d43cd2ff5f65ad2ab48ecef":hex:"7cffe2bef0d42374f7263a386b67fba991e59cefd73590cbcde3a4dc635a5a328f1a8e5edd3ada75854f251ee9f2de6cd247f64c6ca4f6c983805aa0fe9d3106":hex:"":hex:"":hex:"":hex:"d3869a9c5004b8a6ae8d8f0f461b602b"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #7 [#2]
depends_on:0
3:hex:"a2d5eff6f73f98e5b04c01967dffa69b":hex:"59759bb91b3c4feb18c0f086269ec52e097b67698f4dfe91ebe8bef851caa35cadb3fd22d1309f13510e1252856c71394a8e210fdbf3c7aae7998865f98e8744":hex:"":hex:"":hex:"":hex:"a1f99bd9522342e963af2ec8eed25c08"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #8 [#2]
depends_on:0
3:hex:"ea1f47fe5e281136706419ea9b652967":hex:"0ec7c617f85bec74044111020c977be32ab8050b326ebc03715bbbffa5a34622f2264d4b5141b7883281c21ea91981155a64fb7b902e674e9a41a8a86c32052b":hex:"":hex:"":hex:"":hex:"daf75b8288fc66802b23af5fd04a9434"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #9 [#2]
depends_on:0
3:hex:"6f072c681a82c00dcd0d9dd5b7ffa2af":hex:"cd7ce90f0141e80f6bd6ff3d981d8a0a877d0ddae7c98f9091763b5946fc38b64c1ef698485007d53251ad278daf5d4ae94a725d617fc9a45a919a9e785a9849":hex:"":hex:"":hex:"":hex:"39c0144f28c5a490eff6221b62384602"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #10 [#2]
depends_on:0
3:hex:"9d730655366e2aa89ee09332bd0a5053":hex:"854766e842eb165a31551f96008354bca1628a9520d29c3cc4f6a41068bf76d8054b75b7d69f5865266c310b5e9f0290af37c5d94535cb5dc9c854ea1cb36eb7":hex:"":hex:"":hex:"":hex:"baa2a3ed6fdc049d0f158693db8c70ef"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #11 [#2]
depends_on:0
3:hex:"3363881611bfd5d16814360e83d8544f":hex:"6abfab14cbf222d553d0e930a38941f6f271b48943ea6f69e796e30135bc9eb30204b77ab416ac066da0a649c8558e5a0eac62f54f2f6e66c207cab461c71510":hex:"":hex:"":hex:"":hex:"5be410ce54288e881acd3e566964df78"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #12 [#2]
depends_on:0
3:hex:"14e589065423528ff84a1f89507ab519":hex:"0d2e446cad387a962ff2217c7cf4826dcabb997ab7f74f64aa18fbcb69151993f263925ae71f9dfdff122bb61802480f2803930efce01a3f37c97101893c140f":hex:"":hex:"":hex:"":hex:"fc2d3df6c9aae68fb01d8382fcd82104"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #13 [#2]
depends_on:0
3:hex:"974c5ae90347d839475f0f994f2bf01d":hex:"aa04d9fc56349fdd31d868e9efc2938f9104c0291e55ac0aa0c24ec4609731b8e0ac04b42180bde1af6ad1b26faff8a6de60a8a4a828cd6f8758c54b6037a0ee":hex:"":hex:"":hex:"":hex:"3caec482015003643d5a319a2af48fb4"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #14 [#2]
depends_on:0
3:hex:"b3a110587a16c1eafe51128a66816ecf":hex:"203bba645fb5ccee3383cf402e04c713b7a6b6cca8b154e827520daac4ea3a0247bbdc3b2cd853e170587d22c70fb96c320ea71cb80c04826316c7317c797b8a":hex:"":hex:"":hex:"":hex:"9af4f67a30a4346e0cfcf51c45fd2589"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #0 [#2]
depends_on:0
3:hex:"55546068cd524c51496c5fc9622b64c6":hex:"951e712d057028158831ca8c74d4ae303c6e4641c344a1c80292260bdd9d8e2f5b97606370e95903e3124659de3e3f6e021cd9ccc86aa4a619c0e94b2a9aa3cc":hex:"2d6de8661c7a30a0ca6a20c13c4c04421ba200fbef4f6eb499c17aee1561faf1":hex:"41797b2eeaccb8a002538d3480cb0b76060ee5ba9d7e4a2bb2b201154f61c975":hex:"b744980bb0377e176b07f48e7994fffd7b0d8a539e1f02a5535d2f4051f054f3":hex:"65b9f7382ed578af03efa2008dbdd56f"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #1 [#2]
depends_on:0
3:hex:"a0c92565640a3315cac8da6d0458fb07":hex:"6e9b31755c1f45df7d685f86044ab3bc25433a3ff08ab5de7154e06b0867f4e3531ed2e2a15ab63c611fc2894240fdac1d3292d1b36da87caa2080d1c41bcf24":hex:"c6c74690bdee26288d2f87a06435d664431206b23b24f426e847fb892d40d5d5":hex:"4e7dc1adbc8bc16ba7b584c18a0d7e4383c470bff2f320af54ad5ade5f43265b":hex:"c6fb8ee194a339726f5051b91925c6a214079a661ec78358e98fc4f41e8c4724":hex:"c3f849ee7d87291301e11b467fa2162f"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #2 [#2]
depends_on:0
3:hex:"63e143bd6a87065a00eea930593f9b29":hex:"62c2c790cb56518ed2d8d65952bbd4ab85a56463495c940b94f403a93338bdc96129feea9335b1a3e0ada7cf4c207f4732013bc6a52db41407bf5d6fe9183b3c":hex:"7b4e9ff0c8f8c90f8b324c7189226d3adccd79df2d0c22b52fb31dbb5dfefba6":hex:"49e1aecf2b96a366325dc1892c016a5535dd2480360a382e9cc78bf75b2bba37":hex:"f4ce1d27e759f3ba4a56aaab713642b4c56810c9995fbfc04ce285429f95a8f4":hex:"513111abaae3069e599b56f7e5fb91d1"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #3 [#2]
depends_on:0
3:hex:"98dc16e95f97b5b9d8287875774d9d19":hex:"2fab4a629e4b21f27488a0c9ed36fc8e75bee0c386346c6ec59a6f045975e29818440a6638eb3b9e952e19df82d6dc7b8b9c18530aef763d0709b3b55433ddc6":hex:"2e9d2f52a55df05fb8b9549947f8690c9ce410268d1d3aa7d69e63cbb28e4eb8":hex:"57ecdad71d709dcdb1eba6cf36e0ecf04aaccd7527ca44c6f96768968027274f":hex:"7b2da3d1ae252a71bccbb318e0eec95493a236f0dec97f2600de9f0743030529":hex:"841882e4d9346bea32b1216eebc06aac"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #4 [#2]
depends_on:0
3:hex:"5dbac5c313527d4d0e5ca9b6f5596ed7":hex:"c00b28c78da4f9ce159741437fe7f90e4e23ecd01cd292f197202decbbc823d9ce46b8191c11e8f8d007d38e2ecd93b8bd9bbad5812aaf547ddf4c7a6738b777":hex:"460c54f4c3fe49d9b25b069ff6664517ed3b234890175a59cde5c3bc230c0a9e":hex:"bf5187f1f55ae6711c2bc1884324490bf2d29d29e95cad7a1c295045eed5a310":hex:"28fd8277dcb807741d4d5cb255a8d9a32ef56a880ccf2b3dcca54645bd6f1013":hex:"b488f5c13bb017b0d9de2092d577c76e"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #5 [#2]
depends_on:0
3:hex:"254d5f5044415c694a89249b0b6e1a2c":hex:"4c1cc9ebe7a03cde31860637d8222faeefa9cbf789fab62e99a98d83084fef29eafcf7177d62d55435a1acb77e7a61ad86c47d1950b8683e167fe3ece3f8c9e8":hex:"71af584657160f0f0b81740ef93017a37c174bee5a02c8967f087fdbfd33bfde":hex:"96e8522f6ed8e8a9772ffb19e9416a1c6293ad6d1ecd317972e2f6258d7d68dd":hex:"3aaa5e4d6af79055742150e630c5e3a46288e216d6607793c021d6705349f96a":hex:"66629af4a0e90550b9bd3811243d6b86"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #6 [#2]
depends_on:0
3:hex:"b46fceed0fcc29665815cc9459971913":hex:"ff62d52aed55d8e966044f7f7c5013b4915197c73668e01b4487c3243bbf5f9248a4fdd6ef0f63b87fc8d1c5d514ff243319b2fbdfa474d5f83b935399655e15":hex:"994d6b5393fbf0351f0bcfb48e1e763b377b732c73bf8e28dec720a2cadcb8a5":hex:"118bb8c7a43b9c30afaf9ce4db3e6a60a3f9d01c30b9ab3572662955808b41e4":hex:"bb47e443090afc32ee34873bd106bf867650adf5b5d90a2e7d0e58ed0ae83e8a":hex:"1865fee6024db510690725f16b938487"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #7 [#2]
depends_on:0
3:hex:"e1a5dd32fc7cefb281d5d6ce3200f4ca":hex:"bf1ba4166007b53fcaee41f9c54771c8a0b309a52ea7894a005783c1e3e43e2eb9871d7909a1c3567953aabdf75e38c8f5578c51a692d883755102a0c82c7c12":hex:"32e9922bd780303828091a140274d04f879cd821f352bd18bcaa49ffef840010":hex:"01830ddd2f0e323c90830beddedf1480e6c23b0d99c2201871f18cc308ab3139":hex:"f36d792dbde7609b8bf4724d7d71362840b309c5f2961e2537c8b5979a569ae8":hex:"7080e8379a43c2e28e07d0c7ed9705a8"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #8 [#2]
depends_on:0
3:hex:"d1b7be857a422b425ae62c61e90a192a":hex:"6ac34c4ce22b644632283ab13e294df2093e939d32411340b046c26fcc449d0fd6d14132c7205df303dbb663190e6e86ad12e14e145b6603308241f38d94eb5d":hex:"aacfe8553d5ffef6abc3fd8f94d796cae2079ff04f7ab1b41982003f02427c7a":hex:"01d2d1bc29d6a6b52bb29bd6652be772096ca23c838c40730d5b4a4f8f735daa":hex:"27af728ee07d3f5902f4e56453b6a9feb308ef14795eb5630b2651debdd36d5b":hex:"b03fbcd03fa1cc69db0a4e3492a52bad"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #9 [#2]
depends_on:0
3:hex:"a2c49aa6f3f92e36266bf267af5877ed":hex:"5684c3eb99314127078484959314d52b3bc50cb3615c0eef6b48850d98aee04c528b0693be13ed1bb4040e8e96cb13c316143f0815cd68d1bb7931a3d9b88a3d":hex:"566522085426b76bdef152adefd73ef0f76eee4614bc5a4391629ec49e0acffb":hex:"30ef9585148dd2270c41540a4235328de8952f28cf5472df463e88e837419e99":hex:"adc46e0afcf69302f62c84c5c4bfcbb7132f8db118d1a84dc2b910753fe86a2d":hex:"4edc4383977ee91aaa2f5b9ac4257570"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #10 [#2]
depends_on:0
3:hex:"43852c53041a3a4f710435dbd3e4382b":hex:"ab7bca5595084bccdba80ade7ac3df2a0ce198fa49d29414c0249ec3d1c50d271ca74ba5c3521576a89a1964e6deded2d5ba7ff28a364a8f9235981bec1bedfa":hex:"c5612a9540b64fc134074cb36f4c9ea62fff993938709b5d354a917e5265adee":hex:"eee2258aba665aa6d3f5b8c2207f135276f597adb2a0fbfb16a20460e8cc3c68":hex:"a6d6d126bed13dbcf2b327aa884b7260a9c388cb03751dbe9feb28a3fe351d62":hex:"e04c3de51a1ffe8cda89e881c396584b"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #11 [#2]
depends_on:0
3:hex:"52628551ce90c338ed94b655d4f05811":hex:"b3a4a3c4d3d53ffa41b85ce3b8f292b1cc8e5af7488286d4c581005f8c02c5545c09bb08d8470b8cffdf62731b1d4b75c036af7dc4f2f1fc7e9a496f3d235f2d":hex:"f5f9d5b51075b12aa300afdc7b8ea3944fc8cf4d1e95625cc4e42fdfdcbeb169":hex:"60bccbc7345f23733fe8f8eb9760975057238705d9cee33b3269f9bfedd72202":hex:"c0fa3afd6e9decfbffa7ea6678d2481c5f55ec0a35172ff93214b997400e97c3":hex:"5a113906e1ef76b7b75fefbf20d78ef8"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #12 [#2]
depends_on:0
3:hex:"0e4873c4cbcde280abc6711a66dbb81a":hex:"1ab7c7d8fe8f505e1dd7ddb8e7cda962572f7004b2a14c7a7c5bcf24bd16616e2c42c50ae5db9981ccd7d0c79062ac572d3893486bd0ae1f99cbc1d28a9e4c1e":hex:"e4b89e28663e853f8b380c8a4491b54121fe6927340a74342362c37d8d615b66":hex:"619775878879eff9ee2189790ff6f187baed4ed1b156029b80e7a070a1072a09":hex:"ba3d673e5e41bd1abbc7191cc4b9a945201b8fef0016e4774047ee2abf499e74":hex:"4758fd021c34a5cf6bea760ad09438a0"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #13 [#2]
depends_on:0
3:hex:"0684e8ef93c3363ba535c4e573af1c24":hex:"748a5f5fde271c563a8f8d15520d6818f7ed0efb9b434adf2ff9471b391dd225b37868179ffa9a6e58df3b1b765b8945685a2f966d29648dd86a42078339650b":hex:"e90c82153d2280f1ddb55bd65e7752bf6717fbe08c49414f6c129bf608578db7":hex:"c17e97c93cfabe0b925ca5d22615a06430a201b7595ad0d9967cc89a4777947d":hex:"3d554c430c8928dcdb1f6d5e5a4306b309856a9b78c5f431c55d7ebd519443bb":hex:"d3da71af70e196483c951d95eb3f0135"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #14 [#2]
depends_on:0
3:hex:"89b885ddb12abc4f7422334f27c00439":hex:"e2366eec626bfd9cb932bcaa0569de6a7a37cf1dfde1f25d00d1a0c89fe25fea592cbd2af7c8202521fa48e15f7cc7e97e431b222b516a3ad2bb7b55b7fcf7f4":hex:"c77ee92bd17939efe9bee48af66589aee1d9fe4cd6c8ae26b74b3799e35342a6":hex:"23e80d36ca72ecc38551e7e0a4f9502bed0e160f382d802f48fb2714ec6e3315":hex:"6b83f7458dc813ce0b963b231c424e8bced599d002c0ef91a9c20dcc3f172ea5":hex:"81d13a6b79f05137e233e3c3a1091360"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #0 [#2]
depends_on:0
3:hex:"ff568be02a46343113f06949a16cc7d9da315aef82f5681f0459650e5e180e65d1d77b00e5ce3e3f9eb6c18efff4db36":hex:"77de4e5db3b308c38c814228583dfd1eb415771f4ae30f9cc2d35b48075286a4e8c2c6f441d1aac496d0d4be395d078519e31cb77d06d6f7fd4c033bc40fd659":hex:"":hex:"":hex:"":hex:"448ac707ba934c909335425de62944d6"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #1 [#2]
depends_on:0
3:hex:"6f092b85eb9f96427642f69467911172cba6df86e0db08d04e824cde6fb91d9b9af2cea53f42d53c45ee3e69a2327172":hex:"667d3ed9f41a154ea33b55182b8bee4d7d46eff8e890c7036cf7c2665d44c28f9e3a8cff166dabfaf262933d337e729e0b6a60a51d00ba18f877bdc9d0cc659e":hex:"":hex:"":hex:"":hex:"16a200f683ab862947e061cddaac5597"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #2 [#2]
depends_on:0
3:hex:"26e635a6a2b6402b968c1eea13c6a980a0ee9b8497abc14fccdc5bf8439008861f74de2c200505185bf5907d3adc9de2":hex:"80e56f9893beb9f22b2b03caa8f1861d5b31b37f636f2ccbc7e4040ad3073aa20f2f3c6bfefc041df8e57e7100794c42732b6d4b63d8bb51329ca99671d53c7c":hex:"":hex:"":hex:"":hex:"807586c977febcf2ad28fcd45e1a1deb"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #3 [#2]
depends_on:0
3:hex:"b239c485d319ce964d69bd3dbc5b7ab9cc72ac9134a25e641bcd3c8b6f89e7e08ef2d0a45cf67667a4e2e634b32d73ff":hex:"c963e17ef46b7b2c68756019704ec7435ec093c423600b3f2f99dd8989f8539a11b1b0598e93e84d50b65e816e794421ab546b202e4b224a8494538dda85da82":hex:"":hex:"":hex:"":hex:"2a3218b4d59f99bd3825631a6eefb09c"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #4 [#2]
depends_on:0
3:hex:"0239545a23735b803ae7cb7766194917d6cce164f7ec4f65c6ccd5ec1db5297722d4b7466589da4d39f4585856bc1d7e":hex:"71a440b70a2b5ce41b85de27d987fa2a0628d7990dd7cd1460fddc5410ce6e9bb0ae4f90231f45bc71188fd94e4170389a8bbe4a7e781c95c9a97ad78ba7d07b":hex:"":hex:"":hex:"":hex:"9dafaa8b727c4829dda10a831e67419d"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #5 [#2]
depends_on:0
3:hex:"237e8916eadd65e3422fe59ab257b7e6957fe24f760b499fbd052241879e8294b01d2169ec2b98f52660d9f5170dee22":hex:"d8908cfc1ea8518c1442e46731f30fdad85399894db262b8f4fdc0dbcbf11b60b60b25d3108f4b169fcbef621a14c635525fa3af8ccef6b91f808479509967f4":hex:"":hex:"":hex:"":hex:"593c39c56bb9e476550299ee8d85d2fc"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #6 [#2]
depends_on:0
3:hex:"28b6639b415c79012c749dc2a0d18433ec36eda55815f0841241453fa11b9d572b7c29208e01dbb0be91e1075f305d7f":hex:"6767c3eb6ba1b19412c32bfe44e4d0317beba10f3abea328cda7b7c14109b72046c8691c1c7b28487037d381f77a3bbc8464a51b87de68bdc50ec9c658f915ab":hex:"":hex:"":hex:"":hex:"e390806219fa727e74a90011b4835ed6"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #7 [#2]
depends_on:0
3:hex:"ce735a8549fc3f9dfc7b96bf0d48936a711439ac7271d715a278718aca9e2fe3c801030bc74b048ac1e40852345e87cc":hex:"510b0dc06e84ceb901c7195c2f00ad7a04bdd75e0ab52b3d2cd47ddfcd89248dd58e3f1aa8c1ffe306f493905f65369eaed2a5b337dff8ac81c4c1e8903a6ad5":hex:"":hex:"":hex:"":hex:"ba871ba5843083b553a57cf8defa39d7"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #8 [#2]
depends_on:0
3:hex:"841ea92fa42c06769c5c52fe152d07837b8ff0048392caa5dd045054353d363b25439eb5885e96771dded4005f2baf42":hex:"97511ae52590a0b64b75c37e10b89671880d2d6e8f90780ac27263dbc0e32d0824be5e80a88cf8fc3d4c607eb873c0322d09b9ca3498c4015c53ca6fee890093":hex:"":hex:"":hex:"":hex:"a8fb31362bd997adf4d9116e23dbaf10"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #9 [#2]
depends_on:0
3:hex:"55cd76fa5f004b97bb8e14170f79f52715d18c60f142b06d16e8e06c274798190a79c8b325163989d86323c03dbe0d68":hex:"bafc0ba64669c9a36514bde6169034101f29e2a0a4b9a55c0aae7dff0c5aca2371b523e26dc44bf75493bdaa023d1555294178288b70f1ae72150d9f7265b4e6":hex:"":hex:"":hex:"":hex:"fa16dbdaf01b3c202426adabf61fa64a"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #10 [#2]
depends_on:0
3:hex:"ff3f3098fa3d2b23b38ed982e7afb61d46b4848c878b9280f8e5ed6bd81176e76f0a2a85071a411829cf84421c22f23e":hex:"92194e2c700fa724489683d0b6ddcf72c89b9c3f3ff584e802ae426be4908b1ade093bcf9baf7738b988dc0fde1739498a97c9610da853a7c83981c6a7b68096":hex:"":hex:"":hex:"":hex:"f85490426dc243ba09f9719bff73545a"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #11 [#2]
depends_on:0
3:hex:"7242c1020a63770cccf6f8100970990232a9d11d61c9b0d38fe5e7a568a86252a66481212e5d53c868561298dd5bdeec":hex:"7c3806a32ccf3252ac27a92a07209cd7000b160faa70b9024420b903587d1d77f002d3abe28b563d32ccc502b88f83bc5996f3dbbf0f57835839eadd94563b9d":hex:"":hex:"":hex:"":hex:"2232181f08c1569efaad1a82bcb5f3ba"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #12 [#2]
depends_on:0
3:hex:"a2e445290fed8187df6d2a57e68385bb62d700cb8f140410766b53e69e6a0f2939bbfa7ce091525c9051f064e383a2e1":hex:"fdae5f1ea253108fcb255d215a3ce1dc1d101acf89de4423b75a74619e95f3feaa35b5e0bec430b0ad9567df818989c36c77742129af335c90ceb6dd79c7d2c4":hex:"":hex:"":hex:"":hex:"3841e2d795b17cb9a2081d6016a1a71d"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #13 [#2]
depends_on:0
3:hex:"bc885454e385d911336dda9b7a609a6a7079a4a5a860fcd704161c34658bd98685bb03418b7f24f2ed9475eb8ceb232e":hex:"77bef884a91126564b3214029ac6842d86e4c1fa283e33d6828d428377416f66947e39a4a6708e10bfdae8337a6f302420a6649fc109d0f094c18c1e9361375a":hex:"":hex:"":hex:"":hex:"ea20780ed280d8109f811a6a398c3e76"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #14 [#2]
depends_on:0
3:hex:"c1825cf00cdc2da93adb3e7a33c1f3a76c49166887883744ea2683ddca23f31900f25c434364c992a6d913f753a9c42a":hex:"56940a6fc4823c9e42e8ffed63fc3cf46d0a2b305c236a511b0b5ec7005ecd8989bf2006ebe52ed55845f7cc25d3d0086cece95f0bff6fa7e17ddf474704abfe":hex:"":hex:"":hex:"":hex:"b037c7f0f85f4d7eaeeb17f4c8643a74"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #0 [#2]
depends_on:0
3:hex:"19b83c0deea6463a3912d21ffc8d8041a5b30640352abc9652770cfca99dc53c9c09942ddd67b91f4da50a8615462ce4":hex:"5d85c56d0d20ee39958a90f301d2f8bb136fa34d09b41a0c9375114a0df9c1dcdb2a62c4be398d9eaf2440949b806f0e5a977da608eeb652a41711d1e9b72655":hex:"9c1db928b95c84cb674060a6d2f6b7a6a5d43e9ee967e9f821bf309ca5f8821f":hex:"a3111cb57365c617df0b0bb3a1aada49ca789bc75903eeb21e42a7d3d0dd0825":hex:"ce7f557c70676987d13aca60bc4585147efeed97be139871a1b29caa1e180af9":hex:"4a49430277d64446e2fa75763eb79ec6"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #1 [#2]
depends_on:0
3:hex:"239f21be6cda23e8660c8a5e04c79f6dad6f363ac6dcffd9228699ae43fbce5ac3c51645500cb3eae68f0b604dc4472c":hex:"2975a099f7e6530e5576534c25171f39131d6bffb99259f7f2bbf7d77de9fb1e829052b54a9631a733113021692eba1097438347c6de82307a0c2bb308edf065":hex:"d451a54584e6d1d634217379e7e60e67303e19dd4ba63b097899c7349a5a7433":hex:"a33dc24c6a656eb26275415581d568b7c2424a9c5fb9e2944ca35ecbf641f713":hex:"8dfccc62379af46844df136122b72a878d9d61b40ccaa029b09e6b9f0b4d0192":hex:"005e91760d89ecb64b5fc3b0e222fca3"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #2 [#2]
depends_on:0
3:hex:"e326abbe1db3ead3738d2ca4d9f1d62080cd23ff3396f43a0af992bed2420cec6661dfaac83c3c4d83347ac840f7dc14":hex:"37c94d11ed0e93b8199d43d6eb242165dddd12fe39c0bea4cdef6bcfeb5d17bb866f080a9daef128f685fb3bc59c945927fb0aa3e17068515c3c92fbdf04a228":hex:"1ff41405dbb3b12b8ddc973069edc2d2801af0e0dc9bde2cdd35c5b2d4091509":hex:"138b6d2eabef4b32174afb0156ad1df570cf6e5f6ebde5d19cc30daffd9ca4f2":hex:"f27cf7422808c54c58fcdde1cece92f5342c7a10ac43ab3b2e53362b2272e3ad":hex:"506d6fae6fff9f222e65ac86df61a832"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #3 [#2]
depends_on:0
3:hex:"cb0229d2bb72d910b0169e8f93318905aef8dd93ed91a2f8388545db32db3f2489e7988b50de64c49a9f7feb5abe8630":hex:"514ec8c02439290853434e75e3d0bd159eacd5ac13b8f202cfd5c36cdc0fe99b53a1b7a1619e94eb661ac825a48ea5ef8bb9120dd6efc351e39eb7cc5223f637":hex:"a6ed69c9216c551793107f1bdaa04944f6d76fe4474f64bb08b0ebc10a18f337":hex:"e0bc1cc56fdfeef686e0c7ec359e2e8bd48d76c8643c40d12325328170bbf702":hex:"87c5b23aa3c100ff9e368fc47534ff8fa2f9e2bfd3599519ee6f60164485cf6d":hex:"bd419968f636e374268ccdd62403f79c"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #4 [#2]
depends_on:0
3:hex:"bdd156ef3c4e09b77fe8781c446eac55b562e4ee1b7d15515a966882d4c7fadb0fc7b37554ba03908838db40499ded5b":hex:"9facd9f4587819acb358e4936d9f44b67ddf82616e79a44ffd6a2510f652f6b9cebc1424b5c642362b19f63c615f49686df66a8f80ddffb56ce0c0d8540150fb":hex:"35ea316fe302786f626e3831530622b62eb33a3608d4af3384ecfcbd198f3f05":hex:"8d4fae22290b6ef8618ded1c3412e85fab7b8d17fb9cbd09dbc87f97279cc72d":hex:"2f54928372e4ce447201427a3ae05769ae1c54b2e83bdc86d380a90b07f2890c":hex:"8045e8da88b1bc126785c8a771db5354"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #5 [#2]
depends_on:0
3:hex:"154876298a1b63334624b367da984eb31d7260abe79ced41de35ba68a716233a5df0937b90f89dde7fd55a9693c9031f":hex:"36895f574e9e9d08e6c885d305eb4764c1e5689d1f99c2462b3ebdf659e8ce43818dfc886ec797843bfee361b554cd5f969b0c7b0381b53f4afc1bcadbf7eb1c":hex:"c3a46105c50a167a5b0391053f3814a06c90cea2c1fa9329d97fdbc62887ff6d":hex:"54c7d66c65dbddb4665981bff0f503de37d724362aeb67abce6a870fd6a7398a":hex:"58204ca953cbd46dd6c8870b358cba77c436870db49bcd3e2f92697bb580b460":hex:"cd903c0f11ea701214f91715cfec11a3"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #6 [#2]
depends_on:0
3:hex:"94e273fde1e699f84aeef343eb0277c50d169bb5496575301021a2be50df6a555d1422ea88e0e4d905158e93fd8d0089":hex:"1cd97b6e6e7f19401e409aea7b3ec33a8faefd71402b8f34a73c1cb1af215e0e87debe68bce590d41c1f90c6ad9db3d30b3901862e076d765ffdf58776e5fb7e":hex:"6ee75e9f9aee6ac93e20f742f20427e5eb9b4ad2ed06fbba8c7b7870a96941ac":hex:"0ba60399893ede284372bc4e0a37702a23b16aa8e5fe70ea95429af87ff291aa":hex:"94bd2b51c32d29cd14e2123221e45ec0cf1f38766fb6bb0716856d0138f6fa39":hex:"831793686abd406f7b385cd59e497b18"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #7 [#2]
depends_on:0
3:hex:"5a699113ebf98bff9cb780ce29747a61ba2d7581a5716065d018c89348d7c2ed3f5bba32442cd192c1e37b77b98f5791":hex:"de6d2a3b6ad9af07058d3b1d1976cf61d49566b965eb4e9b74a4cad8e286e7a40b254b860e2e209a8cb4cff3a8e615b84f5ae7505957a758e266a4c3e915d251":hex:"ed18c16a61ba5ecc0755f94c286390a6d46e6e26439dadd36c83ebdee42b4b4c":hex:"7c4550d058b85580be2053fd9d933c87041c5c3f62a5b6b303259dafc90d9041":hex:"ebebfcb9b4b3595e516939ca0688422bbdfc4b9f67b0d6619757cb315b7d7908":hex:"1a5a496aa2268483444b3740c9cc4104"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #8 [#2]
depends_on:0
3:hex:"42450f2689b87a3dd940f3b9e3b32d4654c725a24ddd2c22f006694321dacf1980b50f7ac0401626453ec836039bfdc9":hex:"4765399ccbbf3d33433bb992ee29e4381f28d800b05431f1c5b3e949c5db72c582bfe8ba08db1575b866816cabbe5e1d31d8a870ceed49fb75676c97020d1f22":hex:"6ee5a7613c25ecec263a2fd2288948b2df9a05d50040c4031b0653878fdb067f":hex:"68a1038481be7412d6a7c8474d4b2a2535c9b55ea301ee800d5a846127d345cb":hex:"7a1915cf78e6da2dc7840cba40390d668d07571608b77857d2224c4531c17bb8":hex:"80a6c622e64495f9a391f5a8a9c76818"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #9 [#2]
depends_on:0
3:hex:"873869e194201b822b140bdd7797dd1ed408f2190b759c068b7019e6707f60751e101d3465c4ec57dbf9d1ea7597fa44":hex:"d2f92706ca3fb9ced8183c74704440d7eedee1542c2e812f65afc83f4b62dadf1c51fa68f8d5f457a893211c8afc82c93e6a1e15822eff0d4ada6efd25d271a0":hex:"8d0393d2a1ae8930ea88773adfa47b49060f0bf2d3def2acc57786bfbd1e2d6f":hex:"5bcf5ff4fbd9eaabf8bf82ec7c59b043fd64b0025ad1ab2b384e399b9e13147a":hex:"6e2d05e286c90502a3abf2ee72ab7ffb520ce5facfb27e095787a09a412abec3":hex:"e1ceda71b8feb4b0d14d35bbb57a79a2"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #10 [#2]
depends_on:0
3:hex:"1fecb5fe87c2a208b4f193e9c3ff810954c554150d544baea1685fb4774320315d5cb651be493ef120ef6966e3e7518c":hex:"34bc292809674352ffb60786dca59ec799188aa401b366a48cdeddf37c12ee4c666f8fb3a0d53df4cd7191166d50ff01d992f94cd92da7a385ffe5795b197ced":hex:"38249fed34a907768eac49267c2c613a65154eec5b73b541d7d7b314b5080061":hex:"115be9cb914b50480fffe078d8170870b56129a0a74271dee063f8b2049e1be3":hex:"69fa6faf7223f5bb1b55f35a544f78181579b1745990053357916fe507e51db6":hex:"60cc92d3ba3ff0715f5627182334ed1b"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #11 [#2]
depends_on:0
3:hex:"4d283eb5ecd85a1613c975e24832770643613c9a5aee0d8649bc0d68c89cf1ea6ec3a1a22eefd9e212d602c338d64c6e":hex:"4aa6917a5c9f370590d70536fdd89c916fec5e5bcbade8c6a6cfcf5b232c98a6b3e6b79a2dfb0778fbc3f1da7b06044d7b0fa2c04ffc3b71324aca1ee19f936b":hex:"05a7092a684ba7a7fbd33533f9be58a4140a3855d4c5f44a31d665a0720c1739":hex:"557ef1bedc890d1543de6cfeb25642782683d77a46bc8aa0836b07157599c7c3":hex:"e87e45073ff8e36c38b128cd2275a160e431787b5e81f6c2fd7a37909eb72ea5":hex:"31ecfb1bcf3253ba5f71b185a66c7cff"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #12 [#2]
depends_on:0
3:hex:"a6f488104a6c03e354d5d1805c62dcd3016322d218747fa83f9199e20f6ab1cfbc2b889536bda1187f59b7294d557ff2":hex:"22f8ad57a2dfa8010e2865ad6263823652917b84dfea61f639efdb0fdbb35c6341ca7721095d69686212dffe78410c0d0db94f04756d52e7d76165d5a1d516d9":hex:"fb9951d563f7aa88db545874b1a3049c5f79774d486e7a28aed1ed75f59224a5":hex:"b1ea7c6b53e79e4e947e63086dee32dcc17bc4f27fba6142f8215ec081cdd5c9":hex:"0d12cc0a39bfbf87194e4070f6b54caaabbe48fa192b96cfed2a794d95fa299d":hex:"62a1c5678e6e8fc738d375e2ca48751f"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #13 [#2]
depends_on:0
3:hex:"9d67e017e0abdd7c079bc0354f33dab696ad64146802f06d6cefd9cdefbf55b197f5899e5efaa269cc0432c87648ce18":hex:"d8be0ec1119ff959c32c9cf29914e3f7bf2b01bdbf806c2d9ba119ae2a2cfb565871762b02ee7bf68f1d280532fd7ae7368517f6f751739b228d23df2f207f35":hex:"74a5e24477e8759bedfbaa196f398777108392efb8c64c65c0c9ecd6cd3b5f04":hex:"70cbc6cfe1d6ab4bc30d66fa162d5d4b3029e4b1b9d759f3eae17fb508e91a46":hex:"d3c538e042f0eb796b4af9b4e65cd850425c72e2c896fcea741c17172faf27d9":hex:"559a5e04b75cec250aac2433176a725e"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #14 [#2]
depends_on:0
3:hex:"10914608a6d373a26c53ab83014283b678d73dfea65b4a3540af17f2fafa3b3cf698925b423edb9f946b906f43110795":hex:"9ded87d289412dfda8935e5b08ec66b68abd1bae1fc5363e4341f58db954f1f9bc4b681c0d930ba080f85f8fd04c173cb2b77723ce67692efa7ade48b82b6926":hex:"225159b4c679094f277516b2335b1e8b7d0a7ea33fd56822906d481fe412586d":hex:"4967cd401cd466aba0be5f55615ca0d9fb8adbde5cb4e6ae3a0159fcd6c36bf0":hex:"fec14f325b8b458ddf3e7f2e10938f4c2d04c8d9885bb5b9277bdc229c70b354":hex:"1cd5c0bdeb87c79235bead416c565d32"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #0 [#3]
depends_on:0
3:hex:"b023f6a6f73d4749b36eb54867994432":hex:"2462ad760ddbca4e013688bf61381f190c7b2de57cbeeec81d6ab7b6f067b75adc3545887f8d2aa5d9b9dfcbfa425d610faa9c247eb5d71145f302918e908ae5":hex:"":hex:"":hex:"":hex:"c0620c68515a4618e572db6e4c14473d"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #1 [#3]
depends_on:0
3:hex:"7e0fcd953c1c8bb8d03d7a0e918fb59d":hex:"56b2e11d5c2d87d2c9c90c285e0041beb4594a6efdd577580095612e50cf47c0b76208337e1e18453082d725629667d86226ab22944bbfb40c38b7986e489adb":hex:"":hex:"":hex:"":hex:"7194eee0d333fa5282dc44db964ecf5b"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #2 [#3]
depends_on:0
3:hex:"0130217d4a3945402ed99d7b8504fe4b":hex:"28e592fd9db72b40ae4888078aedde260f6de4f0472a7601258e694d7bb6af6810ff4eabdffb332932765fa1d66650fb78cc2be484c0ba803eb9a2502020e865":hex:"":hex:"":hex:"":hex:"4652f0545385fdbe02d05aec21668608"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #3 [#3]
depends_on:0
3:hex:"07854447e33521d2d997d90c0887f42d":hex:"c561ab6acfbfb98879982ac7add92b80471e0154b77ccc9fd98e7c2013c411e8075948e97ab4db7505797a99d456e54e6585042efeff7e3970e399ea0d27537c":hex:"":hex:"":hex:"":hex:"1a14a810c11b4f0af23c6467c47bbde0"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #4 [#3]
depends_on:0
3:hex:"68a8ec01581d6066391f3e5977465026":hex:"747c7e9aace6d4f840c7b5261e0af796c516477421d52850a7072a0ab2c768fcc80c9ba8d18b228e77a7f6131c788a76515fe31aef4ed67376568231a4700fac":hex:"":hex:"":hex:"":hex:"a5723c43743442fae3637bb553891aeb"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #5 [#3]
depends_on:0
3:hex:"1459038c60b70bae7af0da6cfab707a2":hex:"9f7d839310846bd452827a185539c0eb0f106acc7bc4de80d3521a970b23483d57826b1484d329a2d1c2ecfeaf8eeffbaa6e1a305e3f1e47b96ad48a711ad1aa":hex:"":hex:"":hex:"":hex:"5fcd6bf108fe68b85f61f85c0556f5c0"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #6 [#3]
depends_on:0
3:hex:"a3357db173df98da4dd02ee24ce5c303":hex:"f1ce08587ac0338b4d0b8e075b42b6501e77758b30087de028a8622fb7abd7f65e3b4f802d1a472dedb9c1a6dc9263c65918d8b7fafd0ae7e9c39e2e8684af3f":hex:"":hex:"":hex:"":hex:"8a5fa11d8e78fbf1ca4e4ca3e1ae82b8"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #7 [#3]
depends_on:0
3:hex:"212f4c80c7e9287c8d25e3b965f91a3c":hex:"bf1d715b3f56c433827c9cb429bee5ca61c80a8d9b2fd4498e1c86ce703637f8f7f34056ab0039e0baa63320df0ec61de60354f2ece06356d9be3c6d1cdcc4cf":hex:"":hex:"":hex:"":hex:"04ac2f969e828f375b03ee16317e8572"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #8 [#3]
depends_on:0
3:hex:"46e85752e0af82fc63932950120e4b5d":hex:"ae4316424fa765179404188eb8839ce84ad8db92cb12f39089a93a2dbdc371e2fdbef1ad080eb354eecdda3a10ea66ef647aa095afa1786c01bd1c9f70d8da4f":hex:"":hex:"":hex:"":hex:"de576284d8ad36b31bd4f8f3da633e36"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #9 [#3]
depends_on:0
3:hex:"ec2459b1dd7f50df63e14e40aa4a4e66":hex:"b964a24bf98264327c0b9e2e1c99ed1b35f534be801c996f318bc2074ed2500ba8488c4feb442b507c3220523c0041c9543133379365e65e092850a5e3f96cc9":hex:"":hex:"":hex:"":hex:"4d466e2f388aae40d1b31ce1f8ddc5e8"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #10 [#3]
depends_on:0
3:hex:"acf480d54f4c66d611519b72f2c0dca6":hex:"d5b3277cf8badf6be86af27dd36f23ffc580847c5fcb56c4d8a42339336f185c38ffb86f4d8aa7646c1aaed6c2b0c7ae7e4d435f481d62bb01e632f6bbb2abf9":hex:"":hex:"":hex:"":hex:"746aaa5423ef77ea6b1eda47410262dd"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #11 [#3]
depends_on:0
3:hex:"edb80fddc595b234e3c5c03b2be3d721":hex:"94aad8c772201435543efd9013c9f5f022038db6864e9ed4141ea75beb236844da6e6a17109262bc80f528427b37d9da6df03c7dd25be233774384a7f53197ea":hex:"":hex:"":hex:"":hex:"511927f10f800445b705ea3cfe6ec823"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #12 [#3]
depends_on:0
3:hex:"c7790c9888b0e731ca6ccd60c32bb98a":hex:"967050c11050a6d99a5da428d1f0fc8068b29ba4c66965addbfd31b745cb07d2439d268ab32a5fa2b1934bf277ff586506a941768468905ed980537d8baa1d07":hex:"":hex:"":hex:"":hex:"978493f0cece6f94d21863a519e06dbe"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #13 [#3]
depends_on:0
3:hex:"58c75625771df61c48a82590eeed3378":hex:"be3120e8515a98701b4b2fb0667de2bad3f32bcbf10fb9b820956f9aa7ffa1bbbafb70002a9c7fdd1cf7e76a735261798dc60a1163919d58e39ef0c38b54b27b":hex:"":hex:"":hex:"":hex:"90f5c486e7efe932258610e744506487"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,0) #14 [#3]
depends_on:0
3:hex:"d3f64c11aa21bb2d12278847547fb11b":hex:"855c0e3a7567730b11e197c136e5c22b1dc7271d4dbe04bcdfd2fc0ef806b3c05b4264ee6c60d526506622ebf6130738dba4bf35c13ce33db19487312ee691fe":hex:"":hex:"":hex:"":hex:"33ed7089ebae738c6a7e6e2390d573e4"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #0 [#3]
depends_on:0
3:hex:"132ad1c40afb066620f004f08409c59e":hex:"2e5beadd89b663b3903d3a63c3ab5605bfb1a0045a42430e0220243c51a69f7ff7678c2f8edb7bb4a29b646f3edfaca2463f9defd342da87d22b1b8fdb012fd5":hex:"150deb841d1a4d90e66e85b036d9f5a7efca726b907ae3e8f05e1d1338cdfd32":hex:"fb199beeeaf3939be2a5f9e6ba22f97cdd2c7576e81eccc686facbdf8bb4f2aa":hex:"4293341721f57e4548ce8c003531d38622446c8825904e1b868dcddc626c5164":hex:"66d8f3bfb78186b57136ec2c1602e1ef"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #1 [#3]
depends_on:0
3:hex:"1c1502ca97c109399a72a77c8d6cc22b":hex:"1d33b1b257a3ae1210fa2099307916a73dd92270769697ea2d7901f56865e3cae1be94b5024d0da3880bce06f0b31231c5a889f8ba3d92a20844b61009db672d":hex:"23eede46eff4a04b08dcc2133e4537b332351f8469630f11b0c8853fb762a4bc":hex:"6fd9f9da108e68aea9d1cecd81c49bcd0e7bedb348890f2248cb31c4277369f7":hex:"76bcc11bd952123f78dd2ba60dd932d49203e418bb832d60b45c083e1e129834":hex:"a1eee46001616f2bf87729895da0d0d1"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #2 [#3]
depends_on:0
3:hex:"c79c0a1db75e83af258cdf9ead81264d":hex:"5e8cc0fdadc170ed0f5e12f79a6b9e585f9d7c2926c163686a6a724495d88fabcec940d752545cae63f1792dcb966a7325f61997ba8883559ad6f6f8fc09898a":hex:"a2cf6c1c9e4489f504e17f385f08aa82775aa2b0a84abd0b7ee3c6b393d7fd50":hex:"c7529b874e07d4b876196786d510cc038c9e1ab93c461df2474eba484ae6876f":hex:"63c6e7f3548529386c9f47c5aece52ce8454da5db9a807a1b960f7730a61582b":hex:"43b7931e0b3b3769ef8972d0026896a3"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #3 [#3]
depends_on:0
3:hex:"b44d1dd914e88840bc65a94ee199b3ac":hex:"c3dae1863d323cc78f43ccb3f632fde29130e6b23b843ff5a8d79fddc3c1f92b55cd3dcaf7848d40d189c0de7790bebb889e01be05980dcdf30d2b3333426c50":hex:"41e2fce9b48642a1b9bd1695314adcdd38e1a8afe4891e633c5088c6753438a2":hex:"1eb3f8bbacb0c6b901718bfd7eba29f6f87e1fe056ad442d6d38c1351a684e1f":hex:"85570db773f3f5202967376f91a0a9c09c89cd4eddd58cdc6210335fd5e7acef":hex:"bd53036538d9ed904a49966b5428a2a8"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #4 [#3]
depends_on:0
3:hex:"5ef97f7af7df5cc6fa94f8428ec7be5c":hex:"be67434ac4d77f0f50ec5bacc8112d1480bd9f20d6b4ea768d9b51bb69c1dffcd8c30e4412127644aaa6fc453e59fb633f6a5a8c2f69e40d1863e35d4d4c0227":hex:"a64195b1e56cf97fd81e99fa1833d191faf62f534c874def4b8bed0ae7195ac7":hex:"353cd3a8d9cd92bce82cd8d1cc198baa9276db478b0cfe50249e30c3042ee9db":hex:"393ab4726f088fdfeb4df752e1b2aec678e41fa60781bc5e914296227d6b3dfc":hex:"24bdc2cad5dccd2309425f11a24c8c39"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #5 [#3]
depends_on:0
3:hex:"567130da4e7ecc4db0f035d7ecb11878":hex:"cc070df6aa3623f74afd85b59d1bef2b1fcd9c8093362512ff109ebfe992ed75bd58b5ae1561d702b69065eb3cc0bd328ab698d4c6ca274e96d673309b5df5df":hex:"42033054cefa1f20b3443f8ab7d9635ae8f047b833c8529245ba8b4aa07edba3":hex:"72972fb947bff60df291888ddbfd91e698e0c1c26a346b95fc7c5dac596d0073":hex:"af29b6a13602ba9c6b11f8dbdeb6cb52e211f9cd2fc96e63b61e3c1ec631d2ea":hex:"b0849f8317e043271a3fc5f2eaaaaba2"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #6 [#3]
depends_on:0
3:hex:"2c20ae36f1e74542ed8b0a177b8050aa":hex:"c4bf7a39caf26dc3f61311f54ab3095493c626a988f5abee2826c67a4f4b4d6a02329c99a6bcb5e387fa160741c871acc2929c1cc07f2f0a7ce1619eb7da1ec4":hex:"97c148dd10c3dd72b1eaaafbe37a9310ed15b23872e9f2b62d1feb91ea81ffe3":hex:"23df0c30c68bf2eeb55d273a596f1f54ed916271595b906e4f7793b7a52f2573":hex:"22f120fa09215105116919aaf8eebcb69eccd5da42feb737018a05268bf08e46":hex:"b7c73b9ceea2e6ca0be6a3773cdd6886"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #7 [#3]
depends_on:0
3:hex:"2076f9e116a2648e1e664b815b1b3674":hex:"979b5aeafe555aeba152ed66e32e30e110df20ee1f227932a72acfb8218aec767941efaefa091c0128dad9b93b06b28fc76e01f275e8ce1c02f0eb567c914f89":hex:"d12fb10b9fa6d2fd0f39cf76294cd44dcbfa80dca7c2f8537c75453d985ef551":hex:"4228a99faf35547a58c1a4d842301dca374f1f13c6fd067b7c1b815863b73158":hex:"a3a7d5f1e2dcf95a90715ec5fd32e7f88c38b0a452b6ccd1f107458db4f74fd6":hex:"8a63a5002a3636b241f0bec14fd9c2ac"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #8 [#3]
depends_on:0
3:hex:"a71015cf06ddd0a6cd72fa014cf0aee6":hex:"c810cb9db0f169dbc30fda85ccb6d4c40db68d429eeb3653070db7641fbbaba60ef0ff970eaf40887b7e154e2ecd5331de7004689ec604e69927da630a8dd7a7":hex:"5f99f45d8770041703e5a14521c501904fd05ff3340835ac0c41b86442e4939c":hex:"eb7efa6e46ab926ea04c87eb9ce454f5b10717bd9d85305f27d71bea1bc991b3":hex:"cbc80c6171d098fc81023486d327efe2415a0f32e5fa6f6793ce1d0e98783258":hex:"a353f6b350404f3f7b4fb724f84a948a"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #9 [#3]
depends_on:0
3:hex:"395931837614c322d8488ec6a2c4c919":hex:"831fc8d63592b6ce358c08aeac39d67c3e48b4c2617735b6fe5e9fa44d7aee9d60f2fcf549db239d5bed9c608c94e8f8c23b32901442ac53442127377bdcf205":hex:"eb261c737c0a17c8cb1ae055c143f701b74c96c852e4a76ca3ea045e7efdf5ee":hex:"153276007b3843a897efbf022bd1bcabcf655c7eb8acef9baac710b339ecfd99":hex:"a8a5cb17a2945e5b41ff370cc88ac498389b89b6cd82bb3bbde81c212f7c17d4":hex:"537fc2b73183d2c0c106886937a6609c"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #10 [#3]
depends_on:0
3:hex:"9a1983859dd6c4cb602970d705952b2b":hex:"68c5cf31f7959ffaa83af9dd55a75ec001befbf835e42a789ac42d39d96128eb6d9b3f07ced15e57e39760390c065fb4425c19ef7184635c18e5ed28256937e1":hex:"e06497a181a5362980579c91d263f630ad4794519a64261ede8b36cf0ac5e713":hex:"714e4fc52aea763e23a1f5b18949ab8fd949f1768560559bccb49d78d51dfab5":hex:"6b6b7f65fd472ad428df2bbb86b85067d0a6f89d9233eea92f5189a9163d0419":hex:"e32af8a81c59dc44540ed8845b447fdb"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #11 [#3]
depends_on:0
3:hex:"230576e9518fb9a6a8391a84919b0d97":hex:"6193f0e7b33ce19fde922aec9c93f1271ebcdd296d9c8c77029b59afa2064e3159088e07e91c14a4a3dc23b6005dd8ef1425d7d2ae8282a5b30b7498b6754234":hex:"ffaca30a256d18836a0d49bbaad599a28fc7821d71aa91b97158a492d84a6280":hex:"a3da13852d0717afed7c58c52530d2ae047b645a5e7aa8cfabc11478444151ac":hex:"e15fdaeea31c95555fc509d2a266abf78d86ca11aa2f87ce1041142eb9f82bae":hex:"7906f8da1e140345c191dbc2de5ead1b"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #12 [#3]
depends_on:0
3:hex:"e08a3a33adb4399a9be72fead224155f":hex:"cfbe8b1464b00bb9e0d18b04d2040ed9bd822741188812b98a440fbc66ff018ddf6c0ea20c62d01b8237bc7c3da9e3f9fb874fca79a360b4f0f967d8d02083ba":hex:"56f975849197e2eae5a2e6fb445a93c1fadf57280ac27e27c7cbea2cb00c10cc":hex:"0a6d9e2d6e181addab0ea1ee89c65ce557e10fb8e8d43a24cdd27033d3fff507":hex:"823e9400a9f563cc1fa5daf10f4ff1ab8affa18d8371f9cd0e067fcddce8caed":hex:"5ded298f98cffb2e7f5ea97bd50c7e3e"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #13 [#3]
depends_on:0
3:hex:"11c13b917d9f94fd7a008566d8598e89":hex:"f53343a5a455132df3d1b03db39e44d933855b375d7422ad0d07dfdfb352af28946eb29980793456ec8634bf113e75783246bbd05aa8a7cb5886d372fa012f58":hex:"ff1d8d33083023ffbe28f153bddfa9d9f3c221da16f8f20967d2508fa7752b55":hex:"66a98c7d778d798617e1d31d4bdfabf8d381d38b82125838ddf43fb7f5b27dc6":hex:"407c72d7c890c00b249be00a53ae722e5d8033c84b1e1a6a69d4b278ba5db9eb":hex:"67ab88156f20d03b3a1bc363daefc0c6"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,0,256) #14 [#3]
depends_on:0
3:hex:"7b95343a4ac0f8c8b2645c33757a3146":hex:"3d7e2987860cbcba14a12594e1a394ee754c9a7a65cecc990bc79b5e86e672e12f8c144d843e1abca46b4759a11b3d29f4e219077a8696efadee618f254cb80a":hex:"16297534a79c4ae7493178226b29e42a6f1e0066aeaee8b5af65bcefa2ee3ebb":hex:"b429ee986f16fb35fe2c47c03c0918870b4560f4ec4678f9df471cbd7ca6a887":hex:"2b14d612eb00c7fba0d8e23bf91df91daef6f8e279e0050d5497ddf0f3466c76":hex:"8f72c17405163090fe0bd795b65811c6"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #0 [#3]
depends_on:0
3:hex:"327290da2e9a19c840de8d33e425efaa5aa7a7afa4e5a812065965478d640f78520cf3c670b098943fec1914d4c8c411":hex:"80bdf18288cb8adb6e3dacb09c553af2e7317c194d37f433eec27e324a0bad752899bda91fd41e5a08acdfd76007aecabc19c95a8bcede310f7320ce97aaad0e":hex:"":hex:"":hex:"":hex:"c26222662ed3a649a1745dee5df4eef0"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #1 [#3]
depends_on:0
3:hex:"be14f473472db07a43b7f9a517735d7f7ede2aa70dbdb729bc4f578a0dce9d7fe9fd97939cd1ef731262417b5213bd7f":hex:"ac71ff53140c1383eb379e5311e37637af933db494e5e689d065661e9095b8302e4174c392f324fac43695d9381e3cf4626a5347938ed9e21502cbd789cca363":hex:"":hex:"":hex:"":hex:"4bab95f9f05fc36a337b6f2582c2ce98"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #2 [#3]
depends_on:0
3:hex:"88c31e24f4f859b668946ce73f8600621a70731440762b3c267ceab52a9d77a23d6f70ddba0e46a786697a906ccb18a3":hex:"bf9bf25a949d447274a8c72f1ae51399521f8aca39b1b37bb7b4d5cf3c67d55ef8dbacfb71aa9c5949416e2868b968883e517215bc20292894f8406ab39c1ea1":hex:"":hex:"":hex:"":hex:"841aaa0b171d1526ef365b9201adbff3"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #3 [#3]
depends_on:0
3:hex:"8545a0de5ea028c8e5976d5b58fa50079b20ba716f0856cc1af7b98537c895f0266b956542d2b8ca661aef5da1f7f8c5":hex:"686f4f9ee74c3402845fbad9353d7dfeff727584d892eb64bd84b764110cbe4ac8581e7e23acb95caf12979983e8947c570264aec292f1c7b756f7184007dcba":hex:"":hex:"":hex:"":hex:"f6d6ae6449b2984df8bcb69584fb16f3"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #4 [#3]
depends_on:0
3:hex:"d6cd4b4fb9105374605deac7bb49ad792eb225daa560f2a86f66269bf9afc2ea01b6ee6f0eb4926d2f09329df6e90d79":hex:"5d1b8fa0ca2ee127d1bd41423c17b9a8c736715cc2906818e9216dfd81b7637b66c89b772b55ae707c6effa2d9ce7425df26f966646ab613d5599143cf51e5e8":hex:"":hex:"":hex:"":hex:"c36ab451116d733eb4377de3511db5ce"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #5 [#3]
depends_on:0
3:hex:"e73ebae0d0834fdff1829ac3d9722fe9f1bc65b5f652fae5f7615af116440e3d5709b5cddd6065d568c246820de46b09":hex:"2026cf7c1b1fe9645ab8759958ac04fb1d8938b9913c3b7f22da81e398b2c00b1921e1d4edb5d21c4531515cb0f9644fe8068685b9fca813176e6780796e8ded":hex:"":hex:"":hex:"":hex:"98d1dce30593de8a8d5b4d956f6c684b"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #6 [#3]
depends_on:0
3:hex:"a53c1813c06b609eff9ddc77204b085ca985f22170b8ecfcbbf45ea11c45c24fcf25bc33150f9f97ce48244d5beb685c":hex:"1d0dd1a87d59c69f28e118e1083d65f1ee0df31f6308a92dcc47503ec4d20a018d9821c6a7d64385724f0e941231426e028efe6d75e53ff8edf095ef1baf2656":hex:"":hex:"":hex:"":hex:"035cec3a24ba7c44e5c19436c2689a75"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #7 [#3]
depends_on:0
3:hex:"16d5b8290693a5c40c5a526dd6d653ac54cabb5608d77bb2cb7d6270b96c2fe2de076716ae8cf0a5c781edbde861dc70":hex:"aa82a5ea33439d0c16a1cc13cbae53b169f4d369bcbdae81a9a38129c65ae0ea4f720576c012f8d7eb1c0202003c39d28453a22e502b4949cf5ba23a727721bf":hex:"":hex:"":hex:"":hex:"de4ed9d163d11e9b52470d078df4c869"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #8 [#3]
depends_on:0
3:hex:"68bfabdbb821cb978527ff18ce37c96c79ad751756551f36b6991981285a68854ec7f72f548c3395ad3ee40410064d4b":hex:"3da9e9518eb1f1b6268e4597f158844ff672ddb414f7ec23fa66d6c86b90a732a7b3016a3387ec3dbed34eb479413d017932ebf9f2a2fea0b35d2bf4e06718f9":hex:"":hex:"":hex:"":hex:"ec4e3e2b6b8763deb17b8611d1fe7953"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #9 [#3]
depends_on:0
3:hex:"171a74ab694a7d7c2baa3ccf103ad94f11094e07a955ae9ac3bad370f1448753e99b63cc23d1878ab66f94136ec2ecac":hex:"72ebeda7342770d03bc0e531754f946ca5cca684c41f9d089fe9147fad93b6154919c5cb2e6d162fbfde7b9ff0aa590a17993ca6c80bd59eee4134fc2ce944d8":hex:"":hex:"":hex:"":hex:"582ab4f105c3e1fed9593f58fc335fc3"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #10 [#3]
depends_on:0
3:hex:"caed30015b34064762591eba9a59f440566a6621832f650572362229e8a38cd0f5d6d322afd8444132056690d6fa5540":hex:"8e27f0dbeae4613bcf0011105f824ed2ecb150a83a0994f8f6607833755216e016fb175e51d42370afe27b11c18477886b530c95bc31bd1c0f8fe00f61fc15a0":hex:"":hex:"":hex:"":hex:"d42787e97147d457f1590c742443ad92"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #11 [#3]
depends_on:0
3:hex:"c58d62f8145622cd86cfbda66bc26d2ce4c5610cd9cd1c326b99b60355a6fe751783c07f2cc21ba68f1f20ca70f0ad31":hex:"38a8b685e6bbab67824f4cc72995043ea2854f067f2afaec762c9e78ff9d585a25bc63c8d0d075d06d43f3f694733982d26cbe0648b2d0cf8053918b912c303a":hex:"":hex:"":hex:"":hex:"84001709f15a2fd167c161b5d376d86d"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #12 [#3]
depends_on:0
3:hex:"dc9719050d5257152d8a7d60d3ef1fc5b8cb1700bafc7de863c019f244779c464b6214f21a2f6d0aa3ca282007615ce5":hex:"f188a1ba21b1791ebf8a08d8ba555e49423d9178a561bcc1672539c3a7ba1d856eae9922c4d96c181ed045d6f1d15e855690cdae451edac60f1ca2021f1fec57":hex:"":hex:"":hex:"":hex:"7540fed313c96261cac255bf83b5ae99"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #13 [#3]
depends_on:0
3:hex:"ff057781af4a4a1eefeb26ab38f82a2efb6f065de290ebf225bd693dfb1f97455b49143bdb430324c9d945c48824f6cc":hex:"0ddd0f4a43a7b54d9abb0928a2242c378db7a95a0b206baa642afe5cd55108f412f1d727fd591bca2c76355aa62aa8638cfa1916739bc66e02b9459ccd0881ba":hex:"":hex:"":hex:"":hex:"8b6e74a94fcac0d2f212d3594213fbb6"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,0) #14 [#3]
depends_on:0
3:hex:"ef027327e47fc5875c01cb17d798fdc2b27a5c78000727842f8a516f4e8dd34afc167ae145b1e763bebdca51e2f461a7":hex:"128566fe6c5b5595742190519445c25db85ee0ce29371f4cab213400d479d2bfe27655155be0fa237173abb214f0226a2f1770802dd69485adb25e6d837485e1":hex:"":hex:"":hex:"":hex:"76cd1553b2b73d4ef6043a09fb90d679"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #0 [#3]
depends_on:0
3:hex:"8e1a59210f876d017109cb90c7d5dd669b375d971266b7320ba8db9bd79b373bcc895974460e08eadd07a00ce7bdade9":hex:"23677c04a2d6ab446b7b3c582a8071654d27859441b10799f08b788378b926ca4306e7cb5c0f9f104c607fbf0c379be49426e53bf5637225b551f0cc694d6593":hex:"19e914ffbc6d872be010d66b17874010ec8b036a3d60d7f7dda5accc6962a542":hex:"bd7a0c09e780e0ad783fd708355b8df77b4454c3d606fb8de053bffa5ecf9021":hex:"d284dc2caf6d214f8909efc9a75297bccfc04353c2788a96f8b752749c7fec0c":hex:"129d256e7db6269e5a0a160d2278f305"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #1 [#3]
depends_on:0
3:hex:"00674e633670c9971be7af789d37d5a4ef567b3ca4766722cd8f67e09d21cbbfa08d43ea1aa259999c6a307ae6347d62":hex:"ec47b029643f85ea19388b6e9de6ab22705b060ae10cee71262027d0bdff5efd7393af619bc6658612fabc78439a0bd5a01255563a96013fa130dd06fd0f5442":hex:"5b92bce3f87645126daa4704fd7df98b880aa07743a57399b985ad1a00b1f2fc":hex:"8199de1338c688234c77262ef35423f4695b277726c76d8b5f426399c14d83b5":hex:"eb95f5a4d8400cec2d4e0f548b6e92636b5e284fb6b61766a1f35bb9cdc5df0a":hex:"9fbe95817578eb272aa9da2f509c2a06"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #2 [#3]
depends_on:0
3:hex:"2553423c3cb0fae8ca54af56f496e9935d5af4738898f77f789a9bee867dfbc6010c4e5bc68da2b922cdd84eea68e1da":hex:"a9bebd13711c0c22c94b3252654854515a9dc015fe69e688fbac9676b3d77ab67e19b020cd2427ac789ca17f656e499be3ba3ab2075ff95247c6355157eebc79":hex:"e74e45fa28697a06dab08545fde0cc26e7eca31c40aa68ee41c4de402fdcc961":hex:"5aa8abf7062079929d6a131cd3844a5fb6514c07061e25cad67677d867297685":hex:"84819109b2e09b46ba3f5464c34b28ce25a186f0e0fd83fe5fa0ab026c01292a":hex:"3846f3406e49040c48b5cfc9cbc75d1a"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #3 [#3]
depends_on:0
3:hex:"856f1371454bb9aa06be897dcda9b295817c6eeb865a9acb3a89d145bfe29ce5e1b3b12b714571afdfaca7951cd47e33":hex:"a691b8bf6a407c93a36d18aeced4c75f76d8397d4ecbcd4e8f820cb393186897f05c1ef668b027fc78ba6da9bd554cc31a467d47b5e534b5340c7799383ec05c":hex:"2c81d1e94b33164a177d0183d182fe7d23ef4f88444246464e58bdd0de38d82c":hex:"1b5dae81c96771bea091521c0973c5af76a03e3624160e2511e57ff43a1d32a9":hex:"bf5878e2bd139f8f058f3d834acd771514da6d4c5b9ef84466e5a4e0e4b2eaaf":hex:"6a5ea73aad476ce201e173d4d5a7ffcc"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #4 [#3]
depends_on:0
3:hex:"0436075cf8cf62ce623c2301ebd45203c98282611cfa5a12dd7c04525ffa7eb343a607af2f57feb7ce3af97e0abc2285":hex:"1ab9ada5eeebc3fc8e53f358b643476fcfd4dd9f092f21d2bc1c4bb1ffd01a0c5b207aaa09ff76a9cab0aa6ce62b6a65b2650ab448b8bb2e8696a7aa4b6f4e8d":hex:"62f07d1f49e40f7f472985947ac4d8ef2d58216d918f7942b9c70f43daff8972":hex:"37ae758141fbc890ee7e1d0854426b2984fb1c094677e6a61546e9315bab0898":hex:"353d1dd0c8d8656bc418a6a3ace138ecd62819d4e21b8bd87694ea683ec0cc37":hex:"bfee6bb4afc228da981bfe7f0d17578b"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #5 [#3]
depends_on:0
3:hex:"d004a0893bf326d50ee52e04cb3e64409f204f4e9af780d5dd092d04162d088385b1f243000914c62cba3dadf9827c81":hex:"c36004075f5fd078137ea08de6cb15f71aeb9eca21c891cfdf7a8c0d21790c94ffa93be5fa06beb5e82d9fbf173ef9b29c18511fee2455dbbe61d6b01baf024a":hex:"7d313ada131650c7a506d2c194444ed202d568544caa75bbc60e57a0b74c9a10":hex:"791d60238677ff53150cf7074061eac68335c0a7cec7de43ea63a5df0f312cd8":hex:"6754366be264deb9e94f39e92ac2894bd93c1d7e1198d39e6eddccb0ea486f4d":hex:"1c29795f03e3c771603293473e347ab4"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #6 [#3]
depends_on:0
3:hex:"9a8c79b48ada409183f7260aa1415c9ee4e0b662e0fb81b5c56f85d76ed75efac5751dd4de7e7f8b53a36ee0dce2bc9e":hex:"c4d68b76dc0e785823be2da9d339dc900132f12721e8a63ebe92e36d740c5a5e5564c367bff4a52bc70b1c60c86f0bcb7c1d99c414956a259963207184f01246":hex:"04c7060f36569a5d9578c718627fc2695e8d783c0c8aefca2744da6664e67c8c":hex:"1d4b7d587421dea4f7f3e77fcf997607ecfeb6e665a9a184138eb5736b16f516":hex:"8cb8daf9cda230d8d39b829b968aaa5f5d3e3106d8b693227ab1b6201b78a7b8":hex:"faa146098526546927a43fa4a5073e46"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #7 [#3]
depends_on:0
3:hex:"a0736a5a8b0a394625d8985b05e3a9f277c7ba03b253c0e783359a8c4c086121cb46ea469c7756d5f099f5ee8ed16243":hex:"ea7a046fa1760866bcb37fecf9ade7bcea4444662ea782d6f2820b22a96bab97b4c5adcb0a50ced885121b6b85a5074444b1555d9655f4f6ded31fe15281b30e":hex:"47f3655dd05c42454fad68e330aabca49f27c76ba05ef07b6d77fba41153c0ab":hex:"a5d07da3e399cc51d136096599fcbd9779e839b1fd86f21d7d1e23acd91f9fa7":hex:"150b028b64a988fc1ffdfc9e66b4c8dfe4fcd8538ee976c89923638ebad33802":hex:"6ffdc685169b174ad0dd84cdeed050a7"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #8 [#3]
depends_on:0
3:hex:"d445a3d9332c8577715c1e93f119521bd31a464db08cdbd73d50080d62d5a48fba4cef2dd097ec749973037e33e8d6fa":hex:"da5f9b2db13d0555846c00da96115036bb75ace66d56fc582d6cd0171e3e23335c5c2b8691e58af8899ed0204316479f849ca6f47309cae571ccb42d3d35c166":hex:"79346394f795f05c5a5199423649b8b5345355ef11eb4239db1c767c68afa70a":hex:"c22810de9987b228c19680eb044da22a08032148a6015f358849d6d608a214b9":hex:"7747d68ca8bcb43931f1edce4f8c9727dd56c1d1d2600ad1fb767eb4fbc7b2d6":hex:"f5c40babbec97cb60ba65200e82d7a68"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #9 [#3]
depends_on:0
3:hex:"2728be06796e2a77c60a401752cd36e4a051724aa3276a146b4b351017eee79c8257398c612fc1129c0e74ecef455cd3":hex:"d663d2cfcddf40ff61377c3811266d927a5dfc7b73cf549e673e5a15f4056ad1f9733c8ed875ff77928284dc1cdb33accc47971d3626615a45b9a16d9baf426e":hex:"62349efbac4a4747d0e92727c67a6bc7f8404cf746002e7d3eeffb9a9be0bbdc":hex:"381c0cffbdfa61a6af3f11ccd0e543208b584c3f520130e33617564ec7a48cf7":hex:"6974043362f834fd793de07ceebd051599163d50489441005afc9db09a9ab44f":hex:"df7894746c599e02d985b195ca3b4863"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #10 [#3]
depends_on:0
3:hex:"2b65b56de410ee82e55bd2bf80e6cee356a37c3a3aa7042df45fa750a74e097b071fc18d6eed96523dd4fbb677b8c729":hex:"bf03a6b3e8e23ff53369b971217dc3d3f4c1211329c94847347b3aa77dc7a3e0670381573527844a1ade786f18631944558defffb9a00900ca55f97ec726126b":hex:"59255e5cd2221316c945bd614471df76d5b2f394b8829de82e5c30bc178565e2":hex:"5739bc14f0f2ef9d3393928aee67b0908adaf587650928916d8ae78b0077a3b3":hex:"6b236cf0ee0dba0c92b26c60235d3868715a80c0efbc0c898b6f0b1ace8146e9":hex:"8374b571d7f2d94ce2bdadeb9d815397"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #11 [#3]
depends_on:0
3:hex:"8756ee2c5e381c7c1dc530748b76a6274ef6583090e555d85210e2356feb2974a8f15119a04e9b481cd3bc557a197b8e":hex:"19705743eaaaa0e8890a0faa2e0df37c820d556c7a45f04d76276f9f9ce2e7c133258ae6d1ba9cdf7745d01745763d18dcd1af2c9e9b0bed2806e60f0f9b636c":hex:"2b4a92b682e9a557466af97b735e2ffdbac3bfc31fd5be2cd212cfbd4b8d690a":hex:"e86504f10317bbeab346f3b9e4b310cbe9fbd81a42054f358eacd08cccab6eff":hex:"19ffad856a6675268cc464ca6fdb8afd0912143e552668528d1484c9a54592cf":hex:"f347fd58aff2999530e258be77591701"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #12 [#3]
depends_on:0
3:hex:"f58be57e5035d5c455b17a41ccf7542ffd77f5c009e0a737118ed6c4188f78fcbdbe946bf82e1fa50fd81691de82dcf3":hex:"f9939592ab2b31d92ac72673da013a588ea17bbf02cfd6e79d79f8296601633d04ceb005110f266e6100040ef33194858def8b535314c73caa0e48fc4d2f6e2d":hex:"bb1cb21a316d4b88093cbfc7917d614dca97090cdc8bb340d864547cb3e1fef6":hex:"7e42d5439d81680c8edf5c571d548699730cfada33b650a4d510172a42b298bb":hex:"e9e3cf180f72ba2c1a45d0a94b822943612143e0b642398796b0428ae1af6cf5":hex:"d0c83a4bf3517648b441d411ddcb808c"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #13 [#3]
depends_on:0
3:hex:"898064243e44ff67151736ce8bb6f1c759cab4aaca9b87543a1ac984ef955cd5db76c1aa56aff83f1f6799f18fe531cc":hex:"b8d6be3036eeb5657fb10766354d4be897bd27973b3530270ccc02a08169a2e437b30a3635eb6ccb310f319257f58d8aa030c8aab616418e0914a46131306a0c":hex:"37572428df5826e6ae5ce95db4ef63f41e908f685204a7b64edb9f473c41e45c":hex:"28beda0e0e346b447d32208c6b4c42dcd567acfe1e483fb4a95ea82cb8ce55a5":hex:"7a0fffa541d723e16340eeb960b1b9c9aae912477e0ebfac03f8f1a3a8bdc531":hex:"611c9f6fc5193dbe3db96cbcd276168a"
CTR_DRBG NIST Validation (AES-256 use df,False,256,128,256,256) #14 [#3]
depends_on:0
3:hex:"50de72903b9d99764123ffaa0c721e14ad1ab5c46a34c040f25324ba1d937b8ef10467161fcf2978c2a680ac5570c6d2":hex:"5c9954fd0143e62c3bf2d5734052e3c9370f7b9d75c70f58fe33b12e3997ee2c8db84f8467affd7cfd9a9e7ec60da6f31bf9bf32aedf644e4934bd1fc916bc8d":hex:"d5dc4c9fc7171fcbfdaead558a565ffd55d245a58b22ad1666ee05131e33f49e":hex:"ea3114e92e6a19f53b207a0a54cd363a6d053fed0a827f92556f0a8580f7a342":hex:"53686f069b455af4692888d11fac15cf7b4bd38e198de4e62b7098f875198a75":hex:"9fb0df053e0345e5640aa97fedef50a6"
CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,0) block 1 #0
depends_on:0
1:hex:"496f25b0f1301b4f501be30380a137eb":hex:"36401940fa8b1fba91a1661f211d78a0b9389a74e5bccfece8d766af1a6d3b14":hex:"":hex:"":hex:"5862eb38bd558dd978a696e6df164782ddd887e7e9a6c9f3f1fbafb78941b535a64912dfd224c6dc7454e5250b3d97165e16260c2faf1cc7735cb75fb4f07e1d"
CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,256) block 1 #0
depends_on:0
1:hex:"41c71a24d17d974190982bb7515ce7f5":hex:"8148d65d86513ce7d38923ec2f26b9e7c677dcc8997e325b7372619e753ed944":hex:"55b446046c2d14bdd0cdba4b71873fd4762650695a11507949462da8d964ab6a":hex:"91468f1a097d99ee339462ca916cb4a10f63d53850a4f17f598eac490299b02e":hex:"54603d1a506132bbfa05b153a04f22a1d516cc46323cef15111af221f030f38d6841d4670518b4914a4631af682e7421dffaac986a38e94d92bfa758e2eb101f"
CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,0) block 2 #0
depends_on:0
1:hex:"bac0fdc0c417aa269bbdea77e928f9f8":hex:"8b0bcb3f932170416739ea42e7dcdc6fa960645bc018820134f714b3c6912b56":hex:"":hex:"":hex:"d9c4fd81f6621a8cf06d612e9a84b80fa13d098dceaf2c083dc81cd80caedd105c7f2789963a167d72f76e81178001fd93de4623c260fe9eebced89f7b4b047a"
CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,256) block 2 #0
depends_on:0
1:hex:"69ff3310141dbf3ece409ade58745113":hex:"d67439abf1e162e5b25941605a8aeba7d686dec133257f6c220e1c595e954a07":hex:"03e795be8379c481cb32534011ca6bf524dc754978ee5ebee475129ad39eca98":hex:"5685c7330f33004515f8c0ab27f2a1cbe0c8a4a6806d6c8486e0217b43e859f2":hex:"a6d22a4370251c51978fedc7e7753c78179ed1943d2ff1b5a374860106041a304b124d47cfa304c909f7d417843846d52dcc7ebcf5c93afef885c893b40c81ed"
CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,0) block 3 #0
depends_on:0
1:hex:"aaa46610681167ff8d4d2c51e77911d4":hex:"58a5f79da44b9f23a98a39352972ad16031fe13637bd18d6cb6c9f5269d8e240":hex:"":hex:"":hex:"c1714f89459ce746b151509e5066d4811a06ad06c1e9b13b50c0fc7cdd77ceedc233908ebe1ea8140ec2dc262a43201be667008e081e5476b19b27214111d325"
CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,256) block 3 #0
depends_on:0
1:hex:"6ca848651d420fb02f9b66f06b377e59":hex:"001ec3b192ddc765553e15742dffeb21cc7d97a4bcf866e3664d8a5ecb4c2463":hex:"99f139ab5ee4f7eed6148e82d79ad5f2b9fa638d574e5db79b650c0e682ca466":hex:"6e7bf0ae28a797ccbb47101f26bfe5a0b1e450c57aedf731272411fa7b6c4ed4":hex:"865b6dd4363c5940d6228cc90ba8f1a21efbaa99b0c7b37361f7fed7e969a97b68d550dd6ad4bbfaf6626779bfb43c66845c2923df9f55307c8bc9f0a3872fa7"
CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,0) block 4 #0
depends_on:0
1:hex:"1c6a80d82012c39c9f14a808643f08e7":hex:"4ee68b3352b874e1cc29375028851dee9d5dfd88a40664c79e2b724fb11b2808":hex:"":hex:"":hex:"7c58d2a5522a88341fb55facefdb6e24840cae283948d53148a384e13b5407d7712c33434bd3d19448b43270c54860bf3495579057c70bff3084dddff08a091d"
CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,256) block 4 #0
depends_on:0
1:hex:"70bdedbc6825c4fe0a9f7e45290ddd51":hex:"481e505bf7a36f9d96690d49154d98d6a247c14a703dbfed7cf1b7a71bee737f":hex:"5b07610c2c946eda2975a26ddadf7d73e3d287e923d9b1a2d2070776a446d8e6":hex:"2792a988ebb2e768eee0d5c263bcd76a675d6f339e5f1ab2ca595e6b3b4d024a":hex:"303448a355fc0a69a130b6ab194997b220970bf680914913da904e92109dee3d9f23871130c407045cf463ce783a5dfafd603a8384790573af385d479acd7206"
CTR_DRBG CAVS 14.3 (AES-128 use df,no reseed,128,64,0,0) block 1 #0
depends_on:1
1:hex:"aad471ef3ef1d203":hex:"890eb067acf7382eff80b0c73bc872c6":hex:"":hex:"":hex:"a5514ed7095f64f3d0d3a5760394ab42062f373a25072a6ea6bcfd8489e94af6cf18659fea22ed1ca0a9e33f718b115ee536b12809c31b72b08ddd8be1910fa3"
CTR_DRBG CAVS 14.3 (AES-128 use df,no reseed,128,64,0,128) block 1 #0
depends_on:1
1:hex:"026c768fd577b92a":hex:"b408cefb5bc7157d3f26cb95a8b1d7ac":hex:"5737ef81dee365b6dadb3feebf5d1084":hex:"3368a516b3431a3daaa60dc8743c8297":hex:"4e909ebb24147a0004063a5e47ee044fead610d62324bd0f963f756fb91361e8b87e3a76a398143fe88130fe1b547b661a6480c711b739f18a9df3ae51d41bc9"
CTR_DRBG CAVS 14.3 (AES-128 use df,no reseed,128,64,0,0) block 2 #0
depends_on:1
1:hex:"259195269ec11af6":hex:"2d2ab564202918c4ef5b102dda385a18":hex:"":hex:"":hex:"2c5cd79ed87622a91b8654c8903d852242cd49cb5df2d4b4150584301c59f01fd95a702ac157c84cc15f42c8211335672d8ce1291ef9b1def78149a04fa2697c"
CTR_DRBG CAVS 14.3 (AES-128 use df,no reseed,128,64,0,128) block 2 #0
depends_on:1
1:hex:"b25716931b6e3cc1":hex:"adf5711f93d8c8997349429ccaedae0a":hex:"abf8cd66dd39758b01d7dbb99ab17dc3":hex:"4be0f6b2755377c6e881fbb261b56beb":hex:"d420604dee6467492db5957c86207a708fd242ed67942aed299425335c83b41437418582f41bc7fc0ef0d6927f34d83acd67c70133644fd711dd5a65731f9f02"
CTR_DRBG CAVS 14.3 (AES-128 use df,no reseed,128,64,0,0) block 3 #0
depends_on:1
1:hex:"38aa5590f6bfaa4b":hex:"2e1724db482232a3e61f92c1c266faf8":hex:"":hex:"":hex:"4438b48a45fb0141e31f0a9624dfe6fcc2f9edc075c0a52bc5fc46d85a966c853feee6af913234b3f9a679f667898dc15a24aaed89f035bfa5da516e435bbad1"
CTR_DRBG CAVS 14.3 (AES-128 use df,no reseed,128,64,0,128) block 3 #0
depends_on:1
1:hex:"111d8612a0f04e2a":hex:"9bfaefb698b1b5fcc62db2c16498c33a":hex:"aedbe02847b1b08b6a673bdf25b0224c":hex:"9901ead62ce56573b0f71cd020fe3469":hex:"dff8bf2aec531f8532607e738bd79f91d6085cb19568b7b0240ce6a6b371a282bafcdba02137df990535d9ebf0ba77117751626b2678aca7be4decfd6b9d4b38"
CTR_DRBG CAVS 14.3 (AES-128 use df,no reseed,128,64,0,0) block 4 #0
depends_on:1
1:hex:"e78c5571c5f926f9":hex:"6bdf5332bdce4655d45c2cfea897b000":hex:"":hex:"":hex:"e0715688765a3285e7b7db555f277924e7171f7541bf26122b13dbaaa39f9e2b0345c659583ff8c9cfd888f1abd2f3b36a7c9d47c687b01c819a9f9888542e0f"
CTR_DRBG CAVS 14.3 (AES-128 use df,no reseed,128,64,0,128) block 4 #0
depends_on:1
1:hex:"7ee2614ead3c128e":hex:"8b80936e69c67edb771c28f9b9452124":hex:"fc35cba97a1e211bc420e8af53f8e13c":hex:"fba438aaa75a3cd4cd0cce399bfec74a":hex:"6721cc1ada5ebc1713f74c759000765652eeb5f3f9c24fb9341b36a369cec1d27ea80d6b73b56047af07138c5a43c99a87753115c471b8587ea65fa2065e3ce0"
CTR_DRBG CAVS 14.3 (AES-256 use df,False,256,128,0,0) #0
depends_on:0
4:hex:"0bf814b411f65ec4866be1abb59d3c32":hex:"2d4c9f46b981c6a0b2b5d8c69391e569ff13851437ebc0fc00d616340252fed593500fae4fa32b86033b7a7bac9d37e710dcc67ca266bc8607d665937766d207":hex:"":hex:"":hex:"":hex:"322dd28670e75c0ea638f3cb68d6a9d6e50ddfd052b772a7b1d78263a7b8978b6740c2b65a9550c3a76325866fa97e16d74006bc96f26249b9f0a90d076f08e5"
CTR_DRBG CAVS 14.3 (AES-128 use df,False,128,64,0,0) #0
depends_on:1
4:hex:"5209e5b4ed82a234":hex:"0f65da13dca407999d4773c2b4a11d851dea0a12c52bf64339dd291c80d8ca89":hex:"":hex:"":hex:"":hex:"2859cc468a76b08661ffd23b28547ffd0997ad526a0f51261b99ed3a37bd407bf418dbe6c6c3e26ed0ddefcb7474d899bd99f3655427519fc5b4057bcaf306d4"
CTR_DRBG CAVS 14.3 (AES-256 use df,True,256,128,0,0) #0
depends_on:0
2:hex:"a2d015f22d854e29de278d910c573de5":hex:"16a1f035388cd8d956026e3b0117cb524dd3eb563f9a7720bb7dcb0fc6fbe743cf140bcd4d7130e7e3ea14046c56442b57c43b34ad219553e7105c18f6e561afe27c9f0be60d82d6cc474efb7fc737b16a6895d9a3a45b971d19b743c1a4ac8f":hex:"":hex:"":hex:"b4e8395bcb7503410a94633f70e9904a5b30e62c35bc6dd2a03496c4a49932e184fbffdbcf1de1c72c50d36dc2ae8f04f40f96aae159c3fb816ca16df99b6c3e"
CTR_DRBG CAVS 14.3 (AES-128 use df,True,128,64,0,0) #0
depends_on:1
2:hex:"d4f1f4ae08bcb3e1":hex:"5d4041942bcf68864a4997d8171f1f9fef55a769b7eaf03fe082029bb32a2b9d8239e865c0a42e14b964b9c09de85a20":hex:"":hex:"":hex:"4155320287eedcf7d484c2c2a1e2eb64b9c9ce77c87202a1ae1616c7a5cfd1c687c7a0bfcc85bda48fdd4629fd330c22d0a76076f88fc7cd04037ee06b7af602"
CTR_DRBG entropy usage (default entropy_nonce_len)
6:exp:0
CTR_DRBG entropy usage (entropy_nonce_len=0)
6:int:0
CTR_DRBG entropy usage (entropy_nonce_len=7)
6:int:7
CTR_DRBG entropy strength: 128 bits
depends_on:1
5:int:128
CTR_DRBG entropy strength: 256 bits
depends_on:0
5:int:256
CTR_DRBG write/update seed file [#1]
7:char*:"o/tmp/test_suite_ctr_drbg_seed":int:0
CTR_DRBG write/update seed file [#2]
7:char*:"o/tmp/test_suite_ctr_dbg_no_such_dir/file":exp:1
CTR_DRBG Special Behaviours
0
CTR_DRBG self test
8
| 120,988 | 1,102 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.padding.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_cipher.padding.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_cipher.function
* Test suite data : suites/test_suite_cipher.padding.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_CIPHER_C)
#include "third_party/mbedtls/cipher.h"
#if defined(MBEDTLS_AES_C)
#include "third_party/mbedtls/aes.h"
#endif
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
#endif
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
#define MBEDTLS_CIPHER_AUTH_CRYPT
#endif
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
/* Helper for resetting key/direction
*
* The documentation doesn't explicitly say whether calling
* mbedtls_cipher_setkey() twice is allowed or not. This currently works with
* the default software implementation, but only by accident. It isn't
* guaranteed to work with new ciphers or with alternative implementations of
* individual ciphers, and it doesn't work with the PSA wrappers. So don't do
* it, and instead start with a fresh context.
*/
static int cipher_reset_key( mbedtls_cipher_context_t *ctx, int cipher_id,
int use_psa, size_t tag_len, const data_t *key, int direction )
{
mbedtls_cipher_free( ctx );
mbedtls_cipher_init( ctx );
TEST_ASSERT( 0 == mbedtls_cipher_setup( ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( ctx, key->x, 8 * key->len,
direction ) );
return( 1 );
exit:
return( 0 );
}
/*
* Check if a buffer is all-0 bytes:
* return 1 if it is,
* 0 if it isn't.
*/
int buffer_is_all_zero( const uint8_t *buf, size_t size )
{
for( size_t i = 0; i < size; i++ )
if( buf[i] != 0 )
return 0;
return 1;
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_mbedtls_cipher_list( )
{
const int *cipher_type;
for( cipher_type = mbedtls_cipher_list(); *cipher_type != 0; cipher_type++ )
TEST_ASSERT( mbedtls_cipher_info_from_type( *cipher_type ) != NULL );
exit:
;
}
void test_mbedtls_cipher_list_wrapper( void ** params )
{
(void)params;
test_mbedtls_cipher_list( );
}
void test_cipher_invalid_param_unconditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_cipher_context_t invalid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
mbedtls_cipher_init( &valid_ctx );
mbedtls_cipher_setup( &valid_ctx, valid_info );
mbedtls_cipher_init( &invalid_ctx );
/* mbedtls_cipher_setup() */
TEST_ASSERT( mbedtls_cipher_setup( &valid_ctx, NULL ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_get_block_size() */
TEST_ASSERT( mbedtls_cipher_get_block_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_cipher_mode() */
TEST_ASSERT( mbedtls_cipher_get_cipher_mode( &invalid_ctx ) ==
MBEDTLS_MODE_NONE );
/* mbedtls_cipher_get_iv_size() */
TEST_ASSERT( mbedtls_cipher_get_iv_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_type() */
TEST_ASSERT(
mbedtls_cipher_get_type( &invalid_ctx ) ==
MBEDTLS_CIPHER_NONE);
/* mbedtls_cipher_get_name() */
TEST_ASSERT( mbedtls_cipher_get_name( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_key_bitlen() */
TEST_ASSERT( mbedtls_cipher_get_key_bitlen( &invalid_ctx ) ==
MBEDTLS_KEY_LENGTH_NONE );
/* mbedtls_cipher_get_operation() */
TEST_ASSERT( mbedtls_cipher_get_operation( &invalid_ctx ) ==
MBEDTLS_OPERATION_NONE );
/* mbedtls_cipher_setkey() */
TEST_ASSERT(
mbedtls_cipher_setkey( &invalid_ctx,
valid_buffer,
valid_bitlen,
valid_operation ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_set_iv() */
TEST_ASSERT(
mbedtls_cipher_set_iv( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_reset() */
TEST_ASSERT( mbedtls_cipher_reset( &invalid_ctx ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_ASSERT(
mbedtls_cipher_update_ad( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_ASSERT( mbedtls_cipher_set_padding_mode( &invalid_ctx, valid_mode ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif
/* mbedtls_cipher_update() */
TEST_ASSERT(
mbedtls_cipher_update( &invalid_ctx,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_finish() */
TEST_ASSERT(
mbedtls_cipher_finish( &invalid_ctx,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_ASSERT(
mbedtls_cipher_write_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_check_tag() */
TEST_ASSERT(
mbedtls_cipher_check_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
exit:
mbedtls_cipher_free( &invalid_ctx );
mbedtls_cipher_free( &valid_ctx );
}
void test_cipher_invalid_param_unconditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_unconditional( );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_cipher_invalid_param_conditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_operation_t invalid_operation = 100;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
/* mbedtls_cipher_init() */
TEST_VALID_PARAM( mbedtls_cipher_init( &valid_ctx ) );
TEST_INVALID_PARAM( mbedtls_cipher_init( NULL ) );
/* mbedtls_cipher_setup() */
TEST_VALID_PARAM( mbedtls_cipher_setup( &valid_ctx, valid_info ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setup( NULL, valid_info ) );
/* mbedtls_cipher_get_block_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_block_size( NULL ) );
/* mbedtls_cipher_get_cipher_mode() */
TEST_INVALID_PARAM_RET(
MBEDTLS_MODE_NONE,
mbedtls_cipher_get_cipher_mode( NULL ) );
/* mbedtls_cipher_get_iv_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_iv_size( NULL ) );
/* mbedtls_cipher_get_type() */
TEST_INVALID_PARAM_RET(
MBEDTLS_CIPHER_NONE,
mbedtls_cipher_get_type( NULL ) );
/* mbedtls_cipher_get_name() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_name( NULL ) );
/* mbedtls_cipher_get_key_bitlen() */
TEST_INVALID_PARAM_RET(
MBEDTLS_KEY_LENGTH_NONE,
mbedtls_cipher_get_key_bitlen( NULL ) );
/* mbedtls_cipher_get_operation() */
TEST_INVALID_PARAM_RET(
MBEDTLS_OPERATION_NONE,
mbedtls_cipher_get_operation( NULL ) );
/* mbedtls_cipher_setkey() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( NULL,
valid_buffer,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
NULL,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
valid_buffer,
valid_bitlen,
invalid_operation ) );
/* mbedtls_cipher_set_iv() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_reset() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_reset( NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_padding_mode( NULL, valid_mode ) );
#endif
/* mbedtls_cipher_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( NULL,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
NULL, valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
valid_buffer,
NULL ) );
/* mbedtls_cipher_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( NULL,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
valid_buffer,
NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_check_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
/* mbedtls_cipher_crypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_AEAD)
/* mbedtls_cipher_auth_encrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
/* mbedtls_cipher_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
#endif /* defined(MBEDTLS_CIPHER_MODE_AEAD) */
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
/* mbedtls_cipher_auth_encrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
/* mbedtls_cipher_auth_decrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
#endif /* MBEDTLS_CIPHER_MODE_AEAD || MBEDTLS_NIST_KW_C */
/* mbedtls_cipher_free() */
TEST_VALID_PARAM( mbedtls_cipher_free( NULL ) );
exit:
TEST_VALID_PARAM( mbedtls_cipher_free( &valid_ctx ) );
}
void test_cipher_invalid_param_conditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_conditional( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
#if defined(MBEDTLS_AES_C)
void test_cipher_special_behaviours( )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char input[32];
unsigned char output[32];
#if defined (MBEDTLS_CIPHER_MODE_CBC)
unsigned char iv[32];
#endif
size_t olen = 0;
mbedtls_cipher_init( &ctx );
memset( input, 0, sizeof( input ) );
memset( output, 0, sizeof( output ) );
#if defined(MBEDTLS_CIPHER_MODE_CBC)
memset( iv, 0, sizeof( iv ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_CBC );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* IV too big */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, MBEDTLS_MAX_IV_LENGTH + 1 )
== MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
/* IV too small */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, 0 )
== MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_cipher_free( &ctx );
mbedtls_cipher_init( &ctx );
#endif /* MBEDTLS_CIPHER_MODE_CBC */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_ECB );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* Update ECB with partial block */
TEST_ASSERT( mbedtls_cipher_update( &ctx, input, 1, output, &olen )
== MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED );
exit:
mbedtls_cipher_free( &ctx );
}
void test_cipher_special_behaviours_wrapper( void ** params )
{
(void)params;
test_cipher_special_behaviours( );
}
#endif /* MBEDTLS_AES_C */
void test_enc_dec_buf( int cipher_id, char * cipher_string, int key_len,
int length_val, int pad_mode )
{
size_t length = length_val, outlen, total_len, i, block_size;
unsigned char key[64];
unsigned char iv[16];
unsigned char ad[13];
unsigned char tag[16];
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
/*
* Prepare contexts
*/
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( key, 0x2a, sizeof( key ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( mbedtls_cipher_info_from_string( cipher_string ) == cipher_info );
/* Initialise enc and dec contexts */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
/*
* Do a few encode/decode cycles
*/
for( i = 0; i < 3; i++ )
{
memset( iv , 0x00 + i, sizeof( iv ) );
memset( ad, 0x10 + i, sizeof( ad ) );
memset( inbuf, 0x20 + i, sizeof( inbuf ) );
memset( encbuf, 0, sizeof( encbuf ) );
memset( decbuf, 0, sizeof( decbuf ) );
memset( tag, 0, sizeof( tag ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, ad, sizeof( ad ) - i ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, ad, sizeof( ad ) - i ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, length, encbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_write_tag( &ctx_enc, tag, sizeof( tag ) ) );
#endif
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len > length &&
total_len <= length + block_size ) );
/* decode the previously encoded string */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, total_len, decbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_check_tag( &ctx_dec, tag, sizeof( tag ) ) );
#endif
/* check result */
TEST_ASSERT( total_len == length );
TEST_ASSERT( 0 == timingsafe_bcmp(inbuf, decbuf, length) );
}
/*
* Done
*/
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_wrapper( void ** params )
{
test_enc_dec_buf( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_enc_fail( int cipher_id, int pad_mode, int key_len, int length_val,
int ret )
{
size_t length = length_val;
unsigned char key[32];
unsigned char iv[16];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char inbuf[64];
unsigned char encbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
/* Initialise context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, NULL, 0 ) );
#endif
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, inbuf, length, encbuf, &outlen ) );
TEST_ASSERT( ret == mbedtls_cipher_finish( &ctx, encbuf + outlen, &outlen ) );
/* done */
exit:
mbedtls_cipher_free( &ctx );
}
void test_enc_fail_wrapper( void ** params )
{
test_enc_fail( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_dec_empty_buf( int cipher,
int expected_update_ret,
int expected_finish_ret )
{
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
const mbedtls_cipher_info_t *cipher_info;
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise context */
cipher_info = mbedtls_cipher_info_from_type( cipher );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( sizeof(key) * 8 >= cipher_info->key_bitlen );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec,
key, cipher_info->key_bitlen,
MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
#endif
/* decode 0-byte string */
TEST_ASSERT( expected_update_ret ==
mbedtls_cipher_update( &ctx_dec, encbuf, 0, decbuf, &outlen ) );
TEST_ASSERT( 0 == outlen );
if ( expected_finish_ret == 0 &&
( cipher_info->mode == MBEDTLS_MODE_CBC ||
cipher_info->mode == MBEDTLS_MODE_ECB ) )
{
/* Non-CBC and non-ECB ciphers are OK with decrypting empty buffers and
* return success, not MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED, when
* decrypting an empty buffer.
* On the other hand, CBC and ECB ciphers need a full block of input.
*/
expected_finish_ret = MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED;
}
TEST_ASSERT( expected_finish_ret == mbedtls_cipher_finish(
&ctx_dec, decbuf + outlen, &outlen ) );
TEST_ASSERT( 0 == outlen );
exit:
mbedtls_cipher_free( &ctx_dec );
}
void test_dec_empty_buf_wrapper( void ** params )
{
test_dec_empty_buf( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
void test_enc_dec_buf_multipart( int cipher_id, int key_len, int first_length_val,
int second_length_val, int pad_mode,
int first_encrypt_output_len, int second_encrypt_output_len,
int first_decrypt_output_len, int second_decrypt_output_len )
{
size_t first_length = first_length_val;
size_t second_length = second_length_val;
size_t length = first_length + second_length;
size_t block_size;
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
const mbedtls_cipher_info_t *cipher_info;
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
size_t totaloutlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise enc and dec contexts */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, NULL, 0 ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, first_length, encbuf, &outlen ) );
TEST_ASSERT( (size_t)first_encrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf + first_length, second_length, encbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_encrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen > length &&
totaloutlen <= length + block_size ) );
/* decode the previously encoded string */
second_length = totaloutlen - first_length;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, first_length, decbuf, &outlen ) );
TEST_ASSERT( (size_t)first_decrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf + first_length, second_length, decbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_decrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length );
TEST_ASSERT( 0 == timingsafe_bcmp(inbuf, decbuf, length) );
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_multipart_wrapper( void ** params )
{
test_enc_dec_buf_multipart( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ), *( (int *) params[6] ), *( (int *) params[7] ), *( (int *) params[8] ) );
}
void test_decrypt_test_vec( int cipher_id, int pad_mode, data_t * key,
data_t * iv, data_t * cipher,
data_t * clear, data_t * ad, data_t * tag,
int finish_result, int tag_result )
{
unsigned char output[265];
mbedtls_cipher_context_t ctx;
size_t outlen, total_len;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
#if !defined(MBEDTLS_GCM_C) && !defined(MBEDTLS_CHACHAPOLY_C)
((void) ad);
((void) tag);
#endif
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, MBEDTLS_DECRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( pad_mode != -1 )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv->x, iv->len ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, ad->x, ad->len ) );
#endif
/* decode buffer and check tag->x */
total_len = 0;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, cipher->x, cipher->len, output, &outlen ) );
total_len += outlen;
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( tag_result == mbedtls_cipher_check_tag( &ctx, tag->x, tag->len ) );
#endif
/* check plaintext only if everything went fine */
if( 0 == finish_result && 0 == tag_result )
{
TEST_ASSERT( total_len == clear->len );
TEST_ASSERT( 0 == timingsafe_bcmp( output, clear->x, clear->len ) );
}
exit:
mbedtls_cipher_free( &ctx );
}
void test_decrypt_test_vec_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_decrypt_test_vec( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, &data10, &data12, *( (int *) params[14] ), *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
void test_auth_crypt_tv( int cipher_id, data_t * key, data_t * iv,
data_t * ad, data_t * cipher, data_t * tag,
char * result, data_t * clear, int use_psa )
{
/*
* Take an AEAD ciphertext + tag and perform a pair
* of AEAD decryption and AEAD encryption. Check that
* this results in the expected plaintext, and that
* decryption and encryption are inverse to one another.
*
* Do that twice:
* - once with legacy functions auth_decrypt/auth_encrypt
* - once with new functions auth_decrypt_ext/auth_encrypt_ext
* This allows testing both without duplicating test cases.
*/
int ret;
int using_nist_kw, using_nist_kw_padding;
mbedtls_cipher_context_t ctx;
size_t outlen;
unsigned char *cipher_plus_tag = NULL;
size_t cipher_plus_tag_len;
unsigned char *decrypt_buf = NULL;
size_t decrypt_buf_len = 0;
unsigned char *encrypt_buf = NULL;
size_t encrypt_buf_len = 0;
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
unsigned char *tmp_tag = NULL;
unsigned char *tmp_cipher = NULL;
unsigned char *tag_buf = NULL;
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
/* Null pointers are documented as valid for inputs of length 0.
* The test framework passes non-null pointers, so set them to NULL.
* key, cipher and tag can't be empty. */
if( iv->len == 0 )
iv->x = NULL;
if( ad->len == 0 )
ad->x = NULL;
if( clear->len == 0 )
clear->x = NULL;
mbedtls_cipher_init( &ctx );
/* Initialize PSA Crypto */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_ASSERT( psa_crypto_init( ) );
#else
(void) use_psa;
#endif
/*
* Are we using NIST_KW? with padding?
*/
using_nist_kw_padding = cipher_id == MBEDTLS_CIPHER_AES_128_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_192_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_256_KWP;
using_nist_kw = cipher_id == MBEDTLS_CIPHER_AES_128_KW ||
cipher_id == MBEDTLS_CIPHER_AES_192_KW ||
cipher_id == MBEDTLS_CIPHER_AES_256_KW ||
using_nist_kw_padding;
/****************************************************************
* *
* Part 1: non-deprecated API *
* *
****************************************************************/
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* prepare buffer for decryption
* (we need the tag appended to the ciphertext)
*/
cipher_plus_tag_len = cipher->len + tag->len;
ASSERT_ALLOC( cipher_plus_tag, cipher_plus_tag_len );
memcpy( cipher_plus_tag, cipher->x, cipher->len );
memcpy( cipher_plus_tag + cipher->len, tag->x, tag->len );
/*
* Compute length of output buffer according to the documentation
*/
if( using_nist_kw )
decrypt_buf_len = cipher_plus_tag_len - 8;
else
decrypt_buf_len = cipher_plus_tag_len - tag->len;
/*
* Try decrypting to a buffer that's 1B too small
*/
if( decrypt_buf_len != 0 )
{
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len, &outlen, tag->len );
if( strcmp( result, "FAIL" ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, decrypt_buf_len ) );
}
else
{
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
/* Free this, but keep cipher_plus_tag for deprecated function with PSA */
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/*
* Compute size of output buffer according to documentation
*/
if( using_nist_kw )
{
encrypt_buf_len = clear->len + 8;
if( using_nist_kw_padding && encrypt_buf_len % 8 != 0 )
encrypt_buf_len += 8 - encrypt_buf_len % 8;
}
else
{
encrypt_buf_len = clear->len + tag->len;
}
/*
* Try encrypting with an output buffer that's 1B too small
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret != 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
/*
* Encrypt and check the result
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len, &outlen, tag->len );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len + tag->len );
TEST_ASSERT( timingsafe_bcmp( encrypt_buf, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( timingsafe_bcmp( encrypt_buf + cipher->len,
tag->x, tag->len ) == 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
}
/****************************************************************
* *
* Part 2: deprecated API *
* *
****************************************************************/
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* Prepare pointers for decryption
*/
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
{
/* PSA requires that the tag immediately follows the ciphertext.
* Fortunately, we already have that from testing the new API. */
tmp_cipher = cipher_plus_tag;
tmp_tag = tmp_cipher + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
tmp_cipher = cipher->x;
tmp_tag = tag->x;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, cipher->len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
tmp_cipher, cipher->len, decrypt_buf, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
/* NIST_KW with legacy API */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else if( strcmp( result, "FAIL" ) == 0 )
{
/* unauthentic message */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, cipher->len ) );
}
else
{
/* authentic message: is the plaintext correct? */
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
mbedtls_free( cipher_plus_tag );
cipher_plus_tag = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/* prepare buffers for encryption */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa )
{
ASSERT_ALLOC( cipher_plus_tag, cipher->len + tag->len );
tmp_cipher = cipher_plus_tag;
tmp_tag = cipher_plus_tag + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
ASSERT_ALLOC( encrypt_buf, cipher->len );
ASSERT_ALLOC( tag_buf, tag->len );
tmp_cipher = encrypt_buf;
tmp_tag = tag_buf;
}
/*
* Encrypt and check the result
*/
outlen = 0;
ret = mbedtls_cipher_auth_encrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
clear->x, clear->len, tmp_cipher, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len );
if( cipher->len != 0 )
TEST_ASSERT( timingsafe_bcmp( tmp_cipher, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( timingsafe_bcmp( tmp_tag, tag->x, tag->len ) == 0 );
}
}
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
exit:
mbedtls_cipher_free( &ctx );
mbedtls_free( decrypt_buf );
mbedtls_free( encrypt_buf );
mbedtls_free( cipher_plus_tag );
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
mbedtls_free( tag_buf );
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_auth_crypt_tv_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_auth_crypt_tv( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, (char *) params[11], &data12, *( (int *) params[14] ) );
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_test_vec_ecb( int cipher_id, int operation, data_t * key,
data_t * input, data_t * result, int finish_result
)
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, input->x,
mbedtls_cipher_get_block_size( &ctx ),
output, &outlen ) );
TEST_ASSERT( outlen == mbedtls_cipher_get_block_size( &ctx ) );
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
TEST_ASSERT( 0 == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == timingsafe_bcmp( output, result->x,
mbedtls_cipher_get_block_size( &ctx ) ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_test_vec_ecb_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_test_vec_ecb( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, *( (int *) params[8] ) );
}
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_test_vec_crypt( int cipher_id, int operation, data_t *key,
data_t *iv, data_t *input, data_t *result,
int finish_result, int use_psa )
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
#else
if( use_psa == 1 )
{
PSA_ASSERT( psa_crypto_init( ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( &ctx,
mbedtls_cipher_info_from_type( cipher_id ), 0 ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
if( MBEDTLS_MODE_CBC == ctx.cipher_info->mode )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, MBEDTLS_PADDING_NONE ) );
TEST_ASSERT( finish_result == mbedtls_cipher_crypt( &ctx, iv->len ? iv->x : NULL,
iv->len, input->x, input->len,
output, &outlen ) );
TEST_ASSERT( result->len == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == timingsafe_bcmp( output, result->x, outlen ) );
exit:
mbedtls_cipher_free( &ctx );
#if defined(MBEDTLS_USE_PSA_CRYPTO)
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_test_vec_crypt_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_test_vec_crypt( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_set_padding( int cipher_id, int pad_mode, int ret )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
mbedtls_cipher_init( &ctx );
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( ret == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_set_padding_wrapper( void ** params )
{
test_set_padding( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_check_padding( int pad_mode, data_t * input, int ret, int dlen_check
)
{
mbedtls_cipher_info_t cipher_info;
mbedtls_cipher_context_t ctx;
size_t dlen;
/* build a fake context just for getting access to get_padding */
mbedtls_cipher_init( &ctx );
cipher_info.mode = MBEDTLS_MODE_CBC;
ctx.cipher_info = &cipher_info;
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
TEST_ASSERT( ret == ctx.get_padding( input->x, input->len, &dlen ) );
if( 0 == ret )
TEST_ASSERT( dlen == (size_t) dlen_check );
exit:
;
}
void test_check_padding_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_check_padding( *( (int *) params[0] ), &data1, *( (int *) params[3] ), *( (int *) params[4] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#endif /* MBEDTLS_CIPHER_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
*out_value = MBEDTLS_CIPHER_AES_128_CBC;
}
break;
case 1:
{
*out_value = MBEDTLS_PADDING_PKCS7;
}
break;
case 2:
{
*out_value = MBEDTLS_CIPHER_AES_128_CFB128;
}
break;
case 3:
{
*out_value = MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA;
}
break;
case 4:
{
*out_value = MBEDTLS_CIPHER_AES_128_CTR;
}
break;
case 5:
{
*out_value = MBEDTLS_CIPHER_CAMELLIA_128_CBC;
}
break;
case 6:
{
*out_value = MBEDTLS_CIPHER_CAMELLIA_128_CFB128;
}
break;
case 7:
{
*out_value = MBEDTLS_CIPHER_CAMELLIA_128_CTR;
}
break;
case 8:
{
*out_value = MBEDTLS_CIPHER_DES_CBC;
}
break;
case 9:
{
*out_value = MBEDTLS_CIPHER_BLOWFISH_CBC;
}
break;
case 10:
{
*out_value = MBEDTLS_CIPHER_BLOWFISH_CFB64;
}
break;
case 11:
{
*out_value = MBEDTLS_CIPHER_BLOWFISH_CTR;
}
break;
case 12:
{
*out_value = MBEDTLS_CIPHER_NULL;
}
break;
case 13:
{
*out_value = -1;
}
break;
case 14:
{
*out_value = MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE;
}
break;
case 15:
{
*out_value = MBEDTLS_ERR_CIPHER_INVALID_PADDING;
}
break;
case 16:
{
*out_value = MBEDTLS_PADDING_ONE_AND_ZEROS;
}
break;
case 17:
{
*out_value = MBEDTLS_PADDING_ZEROS_AND_LEN;
}
break;
case 18:
{
*out_value = MBEDTLS_PADDING_ZEROS;
}
break;
case 19:
{
*out_value = MBEDTLS_PADDING_NONE;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
#if defined(MBEDTLS_AES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_CIPHER_MODE_CBC)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if defined(MBEDTLS_CIPHER_MODE_CFB)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 4:
{
#if defined(MBEDTLS_CIPHER_MODE_CTR)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 5:
{
#if defined(MBEDTLS_CAMELLIA_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 6:
{
#if defined(MBEDTLS_DES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 7:
{
#if defined(MBEDTLS_BLOWFISH_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 8:
{
#if defined(MBEDTLS_CIPHER_NULL_CIPHER)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 9:
{
#if defined(MBEDTLS_CIPHER_PADDING_ONE_AND_ZEROS)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 10:
{
#if defined(MBEDTLS_CIPHER_PADDING_ZEROS_AND_LEN)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 11:
{
#if defined(MBEDTLS_CIPHER_PADDING_ZEROS)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_CIPHER_C)
test_mbedtls_cipher_list_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_CIPHER_C)
test_cipher_invalid_param_unconditional_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_cipher_invalid_param_conditional_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_AES_C)
test_cipher_special_behaviours_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_fail_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_CIPHER_C)
test_dec_empty_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_multipart_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_CIPHER_C)
test_decrypt_test_vec_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_AUTH_CRYPT)
test_auth_crypt_tv_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_CIPHER_C)
test_test_vec_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_test_vec_crypt_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_set_padding_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_check_padding_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_cipher.padding.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 75,811 | 2,201 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_memory_buffer_alloc.datax | Memory buffer alloc self test
0
Memory buffer alloc - free in middle, alloc at end
1:int:100:int:100:int:100:int:0:int:0:int:1:int:0:int:0:int:200:int:0
Memory buffer alloc - free in middle, realloc
1:int:100:int:100:int:100:int:0:int:0:int:1:int:0:int:0:int:100:int:0
Memory buffer alloc - free in middle, merge, realloc
1:int:100:int:100:int:100:int:100:int:0:int:1:int:1:int:0:int:201:int:0
Memory buffer alloc - free at end, merge, realloc
1:int:100:int:64:int:100:int:100:int:0:int:0:int:0:int:1:int:200:int:0
Memory buffer alloc - Out of Memory test
2
Memory buffer: heap too small (header verification should fail)
3
Memory buffer: attempt to allocate SIZE_MAX
4
| 678 | 25 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_aes.rest.datax | AES-ECB Encrypt (Invalid keylength)
0:hex:"000000000000000000000000000000":hex:"f34481ec3cc627bacd5dc3fb08f273e6":hex:"0336763e966d92595a567cc9ce537f5e":exp:0
AES-ECB Decrypt (Invalid keylength)
1:hex:"000000000000000000000000000000":hex:"f34481ec3cc627bacd5dc3fb08f273e6":hex:"0336763e966d92595a567cc9ce537f5e":exp:0
AES-256-CBC Encrypt (Invalid input length)
2:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"ffffffffffffffe000000000000000":hex:"":exp:1
AES-256-CBC Decrypt (Invalid input length)
3:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"623a52fcea5d443e48d9181ab32c74":hex:"":exp:1
AES - Optional Parameter Validation (MBEDTLS_CHECK_PARAMS)
13
AES - Mandatory Parameter Validation and Valid Parameters
14
AES Selftest
depends_on:0
15
| 887 | 23 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.gcm.datax | CAMELLIA GCM Decrypt empty buffer
depends_on:0:1
6:exp:0:int:0:int:0
AES GCM Decrypt empty buffer
depends_on:2:1
6:exp:1:int:0:int:0
Aria GCM Decrypt empty buffer
depends_on:3:1
6:exp:2:int:0:int:0
AES 128 GCM Encrypt and decrypt 0 bytes
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:0:exp:3
AES 128 GCM Encrypt and decrypt 1 byte
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:1:exp:3
AES 128 GCM Encrypt and decrypt 2 bytes
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:2:exp:3
AES 128 GCM Encrypt and decrypt 7 bytes
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:7:exp:3
AES 128 GCM Encrypt and decrypt 8 bytes
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:8:exp:3
AES 128 GCM Encrypt and decrypt 9 bytes
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:9:exp:3
AES 128 GCM Encrypt and decrypt 15 bytes
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:15:exp:3
AES 128 GCM Encrypt and decrypt 16 bytes
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:16:exp:3
AES 128 GCM Encrypt and decrypt 17 bytes
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:17:exp:3
AES 128 GCM Encrypt and decrypt 31 bytes
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:31:exp:3
AES 128 GCM Encrypt and decrypt 32 bytes [#1]
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:32:exp:3
AES 128 GCM Encrypt and decrypt 32 bytes [#2]
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:33:exp:3
AES 128 GCM Encrypt and decrypt 47 bytes
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:47:exp:3
AES 128 GCM Encrypt and decrypt 48 bytes
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:48:exp:3
AES 128 GCM Encrypt and decrypt 49 bytes
depends_on:2:1
4:exp:1:char*:"AES-128-GCM":int:128:int:49:exp:3
AES 128 GCM Encrypt and decrypt 0 bytes in multiple parts
depends_on:2:1
7:exp:1:int:128:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
AES 128 GCM Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:2:1
7:exp:1:int:128:int:1:int:0:exp:3:int:1:int:0:int:1:int:0
AES 128 GCM Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:2:1
7:exp:1:int:128:int:0:int:1:exp:3:int:0:int:1:int:0:int:1
AES 128 GCM Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:2:1
7:exp:1:int:128:int:16:int:0:exp:3:int:16:int:0:int:16:int:0
AES 128 GCM Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:2:1
7:exp:1:int:128:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
AES 128 GCM Encrypt and decrypt 22 bytes in multiple parts 1
depends_on:2:1
7:exp:1:int:128:int:16:int:6:exp:3:int:16:int:6:int:16:int:6
AES 128 GCM Encrypt and decrypt 22 bytes in multiple parts 2
depends_on:2:1
7:exp:1:int:128:int:0:int:22:exp:3:int:0:int:22:int:0:int:22
AES 128 GCM Encrypt and decrypt 32 bytes in multiple parts 1
depends_on:2:1
7:exp:1:int:128:int:16:int:16:exp:3:int:16:int:16:int:16:int:16
AES 128 GCM Decrypt test vector #1 [#1]
depends_on:2:1
8:exp:1:exp:3:hex:"d785dafea3e966731ef6fc6202262584":hex:"d91a46205ee94058b3b8403997592dd2":hex:"":hex:"":hex:"":hex:"3b92a17c1b9c3578a68cffea5a5b6245":int:0:int:0
AES 128 GCM Decrypt test vector #2 [#1]
depends_on:2:1
8:exp:1:exp:3:hex:"9ab5c8ca905b5fe50461f4a68941144b":hex:"96dd3927a96e16123f2e9d6b367d303f":hex:"":hex:"":hex:"":hex:"6e0c53ef":int:0:int:0
AES 128 GCM Decrypt test vector #3 [#1]
depends_on:2:1
8:exp:1:exp:3:hex:"b5fc7af605721a9cfe61c1ee6a4b3e22":hex:"6b757d4055823d1035d01077666037d6":hex:"":hex:"":hex:"":hex:"e8c09ddd":int:0:exp:4
AES 128 GCM Decrypt test vector #4 [#1]
depends_on:2:1
8:exp:1:exp:3:hex:"03c0b4a6e508a8490db0d086a82c9db7":hex:"ac52f6c1a05030321fa39f87e89fdb5e":hex:"":hex:"":hex:"33316ca79d10a79f4fd038593e8eef09625089dc4e0ffe4bc1f2871554fa6666ab3e7fe7885edef694b410456f3ec0e513bb25f1b48d95e4820c5972c1aabb25c84c08566002dadc36df334c1ce86847964a122016d389ac873bca8c335a7a99bcef91e1b985ae5d488a2d7f78b4bf14e0c2dc715e814f4e24276057cf668172":hex:"756292d8b4653887edef51679b161812":int:0:exp:4
AES 128 GCM Decrypt test vector #5 [#1]
depends_on:2:1
8:exp:1:exp:3:hex:"2bc73fba942ff105823b5dccf6befb1c":hex:"902c3e3b69b1ef8395d7281ff74cce38":hex:"":hex:"":hex:"4adec0b4ac00325a860044d9f9519daa4f7c163229a75819b0fd7d8e23319f030e61dfa8eadabff42ea27bc36bdb6cad249e801ca631b656836448b7172c11126bad2781e6a1aa4f62c4eda53409408b008c057e0b81215cc13ddabbb8f1915f4bbab854f8b00763a530ad5055d265778cd3080d0bd35b76a329bdd5b5a2d268":hex:"ebdd7c8e87fe733138a433543542d1":int:0:int:0
AES 128 GCM Decrypt test vector #6 [#1]
depends_on:2:1
8:exp:1:exp:3:hex:"0dd358bc3f992f26e81e3a2f3aa2d517":hex:"d8c750bb443ee1a169dfe97cfe4d855b":hex:"87cc4fd75788c9d5cc83bae5d764dd249d178ab23224049795d4288b5ed9ea3f317068a39a7574b300c8544226e87b08e008fbe241d094545c211d56ac44437d41491a438272738968c8d371aa7787b5f606c8549a9d868d8a71380e9657d3c0337979feb01de5991fc1470dfc59eb02511efbbff3fcb479a862ba3844a25aaa":hex:"77949b29f085bb3abb71a5386003811233056d3296eb093370f7777dadd306d93d59dcb9754d3857cf2758091ba661f845ef0582f6ae0e134328106f0d5d16b541cd74fdc756dc7b53f4f8a194daeea9369ebb1630c01ccb307b848e9527da20a39898d748fd59206f0b79d0ed946a8958033a45bd9ae673518b32606748eb65":hex:"":hex:"a81d13973baa22a751833d7d3f94b3b1":int:0:int:0
AES 128 GCM Decrypt test vector #7 [#1]
depends_on:2:1
8:exp:1:exp:3:hex:"9a433c612d7e1bdff881e4d63ba8b141":hex:"8b670cf31f470f79a6c0b79e73863ca1":hex:"ce10758332f423228b5e4ae31efda7677586934a1d8f05d9b7a0dc4e2010ec3eaacb71a527a5fff8e787d75ebd24ad163394c891b33477ed9e2a2d853c364cb1c5d0bc317fcaf4010817dbe5f1fd1037c701b291b3a66b164bc818bf5c00a4c210a1671faa574d74c7f3543f6c09aaf117e12e2eb3dae55edb1cc5b4086b617d":hex:"":hex:"":hex:"8526fd25daf890e79946a205b698f287":int:0:exp:4
AES 128 GCM Decrypt test vector #8
depends_on:2:1
8:exp:1:exp:3:hex:"69eedf3777e594c30e94e9c5e2bce467":hex:"a3330638a809ba358d6c098e4342b81e":hex:"5114e9983c96fecec3f7304ca42f52aa16cb7c6aadfb62ad537c93a3188835ca0703dad34c73cf96435b668b68a7a1d056931959316e8d3ab956bf64c4e07479c7767f9d488b0c0c351333ccf400b7e0be19a0fd173e3f2a1ae313f27e516952260fd2da9ab9daca478ebb93cd07d0b7503b32364d8e308d904d966c58f226bb":hex:"208e6321238bf5c6e2ef55a4b8f531cbbfb0d77374fe32df6dd663486cf79beeed39bb6910c3c78dd0cc30707a0a12b226b2d06024db25dcd8a4e620f009cafa5242121e864c7f3f4360aaf1e9d4e548d99615156f156008418c1c41ff2bbc007cecf8f209c73203e6df89b32871de637b3d6af2e277d146ae03f3404d387b77":hex:"df4e3f2b47cf0e8590228fcf9913fb8a5eb9751bba318fd2d57be68c7e788e04fabf303699b99f26313d1c4956105cd2817aad21b91c28f3b9251e9c0b354490fa5abfcea0065aa3cc9b96772eb8af06a1a9054bf12d3ae698dfb01a13f989f8b8a4bb61686cf3adf58f05873a24d403a62a092290c2481e4159588fea6b9a09":hex:"5de3068e1e20eed469265000077b1db9":int:0:int:0
AES 128 GCM Decrypt test vector #9
depends_on:2:1
8:exp:1:exp:3:hex:"45cc35311eedf0ba093bf901931a7036":hex:"fed5084de3c348f5a0adf4c2fd4e848a":hex:"5dc8d7525eaad035c19714ae1b1e538cb66a4089027245351e0ad9297410fb3a0c1155407c10a8bb95a9ca624a9c9925dac003ee78926c6e90ff4ccdba10e8a78bda1c4478162a0e302de5ff05fb0f94c89c3c7429fb94828bdcd97d21333c2ee72963ee6f056ce272b8bab007e653a42b01d1d2041ba627f169c8c0d32e6dae":hex:"":hex:"6e210914e4aed188d576f5ad7fc7e4cf7dd8d82f34ea3bcbdb7267cfd9045f806978dbff3460c4e8ff8c4edb6ad2edba405a8d915729d89aab2116b36a70b54f5920a97f5a571977e0329eda6c696749be940eabfc6d8b0bbd6fbdb87657b3a7695da9f5d3a7384257f20e0becd8512d3705cc246ee6ca1e610921cf92603d79":hex:"266a895fc21da5176b44b446d7d1921d":int:0:exp:4
AES 192 GCM Encrypt and decrypt 0 bytes
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:0:exp:3
AES 192 GCM Encrypt and decrypt 1 byte
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:1:exp:3
AES 192 GCM Encrypt and decrypt 2 bytes
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:2:exp:3
AES 192 GCM Encrypt and decrypt 7 bytes
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:7:exp:3
AES 192 GCM Encrypt and decrypt 8 bytes
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:8:exp:3
AES 192 GCM Encrypt and decrypt 9 bytes
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:9:exp:3
AES 192 GCM Encrypt and decrypt 15 bytes
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:15:exp:3
AES 192 GCM Encrypt and decrypt 16 bytes
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:16:exp:3
AES 192 GCM Encrypt and decrypt 17 bytes
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:17:exp:3
AES 192 GCM Encrypt and decrypt 31 bytes
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:31:exp:3
AES 192 GCM Encrypt and decrypt 32 bytes [#1]
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:32:exp:3
AES 192 GCM Encrypt and decrypt 32 bytes [#2]
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:33:exp:3
AES 192 GCM Encrypt and decrypt 47 bytes
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:47:exp:3
AES 192 GCM Encrypt and decrypt 48 bytes
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:48:exp:3
AES 192 GCM Encrypt and decrypt 49 bytes
depends_on:2:1
4:exp:5:char*:"AES-192-GCM":int:192:int:49:exp:3
AES 192 GCM Encrypt and decrypt 0 bytes in multiple parts
depends_on:2:1
7:exp:5:int:192:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
AES 192 GCM Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:2:1
7:exp:5:int:192:int:1:int:0:exp:3:int:1:int:0:int:1:int:0
AES 192 GCM Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:2:1
7:exp:5:int:192:int:0:int:1:exp:3:int:0:int:1:int:0:int:1
AES 192 GCM Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:2:1
7:exp:5:int:192:int:16:int:0:exp:3:int:16:int:0:int:16:int:0
AES 192 GCM Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:2:1
7:exp:5:int:192:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
AES 192 GCM Encrypt and decrypt 22 bytes in multiple parts 1
depends_on:2:1
7:exp:5:int:192:int:16:int:6:exp:3:int:16:int:6:int:16:int:6
AES 192 GCM Encrypt and decrypt 22 bytes in multiple parts 2
depends_on:2:1
7:exp:5:int:192:int:0:int:22:exp:3:int:0:int:22:int:0:int:22
AES 192 GCM Encrypt and decrypt 32 bytes in multiple parts 1
depends_on:2:1
7:exp:5:int:192:int:16:int:16:exp:3:int:16:int:16:int:16:int:16
AES 192 GCM Decrypt test vector #1
depends_on:2:1
8:exp:5:exp:3:hex:"806766a4d2b6507cc4113bc0e46eebe120eacd948c24dc7f":hex:"4f801c772395c4519ec830980c8ca5a4":hex:"":hex:"":hex:"":hex:"8fa16452b132bebc6aa521e92cb3b0ea":int:0:exp:4
AES 192 GCM Decrypt test vector #2
depends_on:2:1
8:exp:5:exp:3:hex:"be2f0f4ae4ab851b258ec5602628df261b6a69e309ff9043":hex:"646a91d83ae72b9b9e9fce64135cbf73":hex:"":hex:"":hex:"":hex:"169e717e2bae42e3eb61d0a1a29b":int:0:exp:4
AES 192 GCM Decrypt test vector #3
depends_on:2:1
8:exp:5:exp:3:hex:"1eb53aa548b41bfdc85c657ebdebdae0c7e525a6432bc012":hex:"37ffc64d4b2d9c82dd17d1ad3076d82b":hex:"":hex:"":hex:"":hex:"34b8e037084b3f2d":int:0:exp:4
AES 192 GCM Decrypt test vector #4
depends_on:2:1
8:exp:5:exp:3:hex:"c6a98102af3d875bcdebe594661d3a6b376970c02b11d019":hex:"bea8cd85a28a2c05bf7406b8eef1efcc":hex:"":hex:"":hex:"f2f80e2c042092cc7240b598ab30fad055bce85408aa0f8cefaf8a7204f0e2acb87c78f46a5867b1f1c19461cbf5ed5d2ca21c96a63fb1f42f10f394952e63520795c56df77d6a04cb5ad006ee865a47dc2349a814a630b3d4c4e0fd149f51e8fa846656ea569fd29a1ebafc061446eb80ec182f833f1f6d9083545abf52fa4c":hex:"04b80f25ae9d07f5fd8220263ac3f2f7":int:0:int:0
AES 192 GCM Decrypt test vector #5
depends_on:2:1
8:exp:5:exp:3:hex:"a249135c9f2f5a8b1af66442a4d4e101771a918ef8acee05":hex:"80b6e48fe4a3b08d40c1636b25dfd2c4":hex:"c62b39b937edbdc9b644321d5d284e62eaa4154010c7a3208c1ef4706fba90223da04b2f686a28b975eff17386598ba77e212855692f384782c1f3c00be011e466e145f6f8b65c458e41409e01a019b290773992e19334ffaca544e28fc9044a5e86bcd2fa5ad2e76f2be3f014d8c387456a8fcfded3ae4d1194d0e3e53a2031":hex:"b865f8dd64a6f51a500bcfc8cadbc9e9f5d54d2d27d815ecfe3d5731e1b230c587b46958c6187e41b52ff187a14d26aa41c5f9909a3b77859429232e5bd6c6dc22cf5590402476d033a32682e8ab8dc7ed0b089c5ab20ab9a8c5d6a3be9ea7aa56c9d3ab08de4a4a019abb447db448062f16a533d416951a8ff6f13ed5608f77":hex:"":hex:"951c1c89b6d95661630d739dd9120a73":int:0:int:0
AES 192 GCM Decrypt test vector #6
depends_on:2:1
8:exp:5:exp:3:hex:"23c201968def551817f20e49b09dbb5aae0033305bef68a0":hex:"bd2952d215aed5e915d863e7f7696b3e":hex:"77bc8af42d1b64ee39012df5fc33c554af32bfef6d9182804dcfe370dfc4b9d059bdbc55f6ba4eacb8e3a491d96a65360d790864ba60acf1a605f6b28a6591513ea3cfd768ff47aee242a8e9bdfac399b452231bfd59d81c9b91f8dc589ad751d8f9fdad01dd00631f0cb51cb0248332f24194b577e5571ceb5c037a6d0bcfe8":hex:"17d93c921009c6b0b3ecf243d08b701422983f2dcaec9c8d7604a2d5565ed96ce5cddcb183cd5882f8d61d3202c9015d207fed16a4c1195ba712428c727601135315fc504e80c253c3a2e4a5593fc6c4a206edce1fd7104e8a888385bbb396d3cdf1eb2b2aa4d0c9e45451e99550d9cfa05aafe6e7b5319c73c33fd6f98db3c5":hex:"23f35fac583897519b94998084ad6d77666e13595109e874625bc6ccc6d0c7816a62d64b02e670fa664e3bb52c276b1bafbeb44e5f9cc3ae028daf1d787344482f31fce5d2800020732b381a8b11c6837f428204b7ed2f4c4810067f2d4da99987b66e6525fc6b9217a8f6933f1681b7cfa857e102f616a7c84adc2f676e3a8f":hex:"bb9ba3a9ac7d63e67bd78d71dc3133b3":int:0:int:0
AES 256 GCM Encrypt and decrypt 0 bytes
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:0:exp:3
AES 256 GCM Encrypt and decrypt 1 byte
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:1:exp:3
AES 256 GCM Encrypt and decrypt 2 bytes
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:2:exp:3
AES 256 GCM Encrypt and decrypt 7 bytes
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:7:exp:3
AES 256 GCM Encrypt and decrypt 8 bytes
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:8:exp:3
AES 256 GCM Encrypt and decrypt 9 bytes
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:9:exp:3
AES 256 GCM Encrypt and decrypt 15 bytes
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:15:exp:3
AES 256 GCM Encrypt and decrypt 16 bytes
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:16:exp:3
AES 256 GCM Encrypt and decrypt 17 bytes
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:17:exp:3
AES 256 GCM Encrypt and decrypt 31 bytes
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:31:exp:3
AES 256 GCM Encrypt and decrypt 32 bytes [#1]
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:32:exp:3
AES 256 GCM Encrypt and decrypt 32 bytes [#2]
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:33:exp:3
AES 256 GCM Encrypt and decrypt 47 bytes
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:47:exp:3
AES 256 GCM Encrypt and decrypt 48 bytes
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:48:exp:3
AES 256 GCM Encrypt and decrypt 49 bytes
depends_on:2:1
4:exp:6:char*:"AES-256-GCM":int:256:int:49:exp:3
AES 256 GCM Encrypt and decrypt 0 bytes in multiple parts
depends_on:2:1
7:exp:6:int:256:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
AES 256 GCM Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:2:1
7:exp:6:int:256:int:1:int:0:exp:3:int:1:int:0:int:1:int:0
AES 256 GCM Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:2:1
7:exp:6:int:256:int:0:int:1:exp:3:int:0:int:1:int:0:int:1
AES 256 GCM Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:2:1
7:exp:6:int:256:int:16:int:0:exp:3:int:16:int:0:int:16:int:0
AES 256 GCM Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:2:1
7:exp:6:int:256:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
AES 256 GCM Encrypt and decrypt 22 bytes in multiple parts 1
depends_on:2:1
7:exp:6:int:256:int:16:int:6:exp:3:int:16:int:6:int:16:int:6
AES 256 GCM Encrypt and decrypt 22 bytes in multiple parts 2
depends_on:2:1
7:exp:6:int:256:int:0:int:22:exp:3:int:0:int:22:int:0:int:22
AES 256 GCM Encrypt and decrypt 32 bytes in multiple parts 1
depends_on:2:1
7:exp:6:int:256:int:16:int:16:exp:3:int:16:int:16:int:16:int:16
AES 128 GCM Decrypt test vector #0
depends_on:2:1
8:exp:6:exp:3:hex:"2c186654406b2b92c9639a7189d4ab5ab0b9bb87c43005027f3fa832fd3507b1":hex:"3a0324d63a70400490c92e7604a3ba97":hex:"":hex:"":hex:"":hex:"4c61cd2e28a13d78a4e87ea7374dd01a":int:0:exp:4
AES 128 GCM Decrypt test vector #1 [#2]
depends_on:2:1
8:exp:6:exp:3:hex:"c8ae011795c9a60ad7660a31fe354fa6f7e9c2724d7a126436291680cd95c007":hex:"1bd9ea6186450f9cd253ccfed2812b1c":hex:"":hex:"":hex:"":hex:"35214bbc510430e3":int:0:int:0
AES 128 GCM Decrypt test vector #2 [#2]
depends_on:2:1
8:exp:6:exp:3:hex:"449d39f863e4909984b37f2e5c09ea4d4b3e9fac67bd57c299e4e1d1f084aaa3":hex:"d8e9118f331bb5a359f0aa8882861b72":hex:"":hex:"":hex:"4ddcae0bc24d622e12bdeaac73e8d1ab7957af051d27dfaafce53aeed4cdd3f989ea25989a2f41cfb3c38dbd841c5560b0b5ab1861b1fbcd236865d13da55b50219462e021f8a21848a64a85326031fcec8fe47a6ef4a435dd2b2fff637644ffcf3914ef2dfa5dd556421bfd297be150b31db039f0f2cc422b282e659e70cceb":hex:"c595b9d99414891228c9fa5edb5fcce3":int:0:int:0
AES 128 GCM Decrypt test vector #3 [#2]
depends_on:2:1
8:exp:6:exp:3:hex:"1a1bb9122e762ecd7ff861a1d65e52607d98e7ae5bd1c3a944e443710f3b0599":hex:"32f99ea4cbf52c2701c2252e5e6c863d":hex:"":hex:"":hex:"91b7a70c3a06c1f7f2ea584acb5dd76177ba07323c94f2e8f7cbe93fc0bb7c389c3c88e16aa53174f0fc373bc778a6ccf91bf61b6e92c2969d3441eb17a0a835d30dcf882472a6d3cb036533b04d79f05ebfaadf221ae1c14af3f02fa41867acfdfa35f81e8a9d11d42b9a63288c759063c0c3040c3e6ee69cf7c75f9c33fea1":hex:"a8e29e08623a3efdbbe8b111de30a4":int:0:exp:4
AES 128 GCM Decrypt test vector #4 [#2]
depends_on:2:1
8:exp:6:exp:3:hex:"f10965a66255f0c3515af497ccbb257a09f22ec2d57c5edae322a3e6d2d188ef":hex:"c571ce0e911de5d883dc4a0787483235":hex:"91598690edf2de8b27f9bc7461a84e80811cee544f0542923898328cf157590251f0342cb81d359b5dccc5391a12320d1444c26f24178977dd6705c2b365dc1ece0152c42e2f0ee3162cf886ef5529f4f16a77f3bdd2aeccd405b59addf098521d0d38cc25f1991e11be7ecf24caedb48a2a286d2e560a38fa9001c5a228c4d1":hex:"2867996e389e09ec0da94d42e77b1e436b50065b09ca4adf1cd03240444ee699dbb7b3fc081a1869ca607d77d5ff9754fc3c997ff0a4ee17543a2ba77886b88a7128bcc51d3450df58ff3a26671b02c1d213df6adb6f7e853080eb46b504517cbaea162710a9bbc2da8b552eb6b0e0cb98e44fcab0a157312be67974678d143e":hex:"":hex:"6d9d3a5dbc8dce385f092fff14bfffda":int:0:int:0
AES 128 GCM Decrypt test vector #5 [#2]
depends_on:2:1
8:exp:6:exp:3:hex:"4103b1ddff87a508a219c808a04ad4750668688f4c2ee75b92d28d70b98a2c94":hex:"5cea906737518c2cb901016e30206276":hex:"a00a196193ff07006b7df524824bd0971d63f447a3a7bb1b75c1e2d11789482c115cff677b54948d36dc4de34200bce97be0101d88cee39b177857dd5da3cb0d2f9d6e1150f72a3bd655e0bace1d25a657ba9a7f8dff082b4460432075afb20173da22b49beeb6a030d72ba07869ff4389fc1c28d87018d7c1a9829c21932197":hex:"":hex:"":hex:"3a3a771dd5f31c977e154ef5c73a":int:0:exp:4
AES 128 GCM Decrypt test vector #6 [#2]
depends_on:2:1
8:exp:6:exp:3:hex:"df867d1dd8a287821a54479cab6f88636d2aca30e1bf01a5dffc735e17590356":hex:"35019826c51dd1ef07ff915d9ac4ea96":hex:"6517272cac85d7f38902bcb4b96a0c59c4bdc46bfefa6ebacd7f2fb1629b87ca91de2ffefc42ce3cfd34dcbf01b3f7cadcea3f99e6addf35d36c51f2ceb1f85c1f56a04ec9c9fff60cd7fc238674992183ea3de72ef778561b906202b7b83fe6562a0bca9c1e0a18638e8685b998b4192f5120435809ad6e93a0422d00725262":hex:"723be39bc13adbc48c861b07753f64fac1ae28fc8933acba888b6538721df0a8b91c040a26522fe0dbb7335d8f63d209e89f7cde23afa9ca3c584b336d63a91e07fdd8808b14c3214c96a202e665bbaaa34248ff30348f3d79c9f16e66ad6c5903305acd887a89b6244eb7c2d96e18b13a686de935bf3821444ee20f48678be5":hex:"0375ed93f287eefe414ab2968844bd10148860c528dbf571a77aa74f98cc669a7fc317adc9f7cf2d80dda29b19db635b30a044399f3665b6176ed669146d28f5ada03b3d32d53fe46575a8afcd37f20386d9e36f7e090b4fefadfab7f008e02f1b5022c0eeb81d03443a276eae48c038ed173631687d2450b913b02c97243edb":hex:"e49beb083a9b008ae97a17e3825692f0":int:0:int:0
AES 128 GCM Decrypt test vector #7 [#2]
depends_on:2:1
8:exp:6:exp:3:hex:"886c77b80f5f3a21c01932685a540b23629f6d41d5574fc527227ed0bdf2e21b":hex:"5ec506edb1890a5a63b464490450d419":hex:"53a17d7b69f607f08676d6f6dd4e8db08e01333a8355d8c87616e84cdf10ef5b041fc6ddc3f6a245c0f534c2b167064af82f45e4702a5e8dede59579fdecf6713353392433950c9b97c38d9ee515ac97d0970ccf03981954540088567a30941bb2cca08cbed680500f8342faa7aebbc6c143e2ea57ba6b4ac1fd975dcc5d0871":hex:"79ee27adfa9698a97d217c5010ec807806feda37db811e398c3b82abf698aece08561fffc6c601d2691738e279eeb57e5804e1405a9913830e3ba0d7b979213ef40d733a19497d4bb1b8b2c609a8f904e29771fa230c39a48ebb8c3376f07c8013fff6e34f10fe53988a6ec87a9296c0a7cfba769adefe599ec6671012965973":hex:"05b8d820c9f439d7aeae5c7da0ee25fb0dad47cc3e6f3a47e8b984e856201546975f8214531fc3c2e504d2ac10fa49cb948596b9a8fab01b95c49d6f04d1589f93b77b899e803dd20e1f00a51c0b5953e85be639109b14b100e35ca26d84ea629964b0db8260dfa5a150a66261bf37e79de2ec49e9f1b082a7c58ecd3d39b6c9":hex:"ffdf56e1c1a7252b88422787536484":int:0:int:0
CAMELLIA 128 GCM Encrypt and decrypt 0 bytes
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:0:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 1 byte
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:1:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 2 bytes
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:2:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 7 bytes
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:7:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 8 bytes
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:8:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 9 bytes
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:9:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 15 bytes
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:15:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 16 bytes
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:16:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 17 bytes
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:17:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 31 bytes
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:31:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 32 bytes [#1]
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:32:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 32 bytes [#2]
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:33:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 47 bytes
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:47:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 48 bytes
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:48:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 49 bytes
depends_on:0:1
4:exp:0:char*:"CAMELLIA-128-GCM":int:128:int:49:exp:3
CAMELLIA 128 GCM Encrypt and decrypt 0 bytes in multiple parts
depends_on:0:1
7:exp:0:int:128:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
CAMELLIA 128 GCM Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:0:1
7:exp:0:int:128:int:1:int:0:exp:3:int:1:int:0:int:1:int:0
CAMELLIA 128 GCM Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:0:1
7:exp:0:int:128:int:0:int:1:exp:3:int:0:int:1:int:0:int:1
CAMELLIA 128 GCM Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:0:1
7:exp:0:int:128:int:16:int:0:exp:3:int:16:int:0:int:16:int:0
CAMELLIA 128 GCM Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:0:1
7:exp:0:int:128:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
CAMELLIA 128 GCM Encrypt and decrypt 22 bytes in multiple parts 1
depends_on:0:1
7:exp:0:int:128:int:16:int:6:exp:3:int:16:int:6:int:16:int:6
CAMELLIA 128 GCM Encrypt and decrypt 22 bytes in multiple parts 2
depends_on:0:1
7:exp:0:int:128:int:0:int:22:exp:3:int:0:int:22:int:0:int:22
CAMELLIA 128 GCM Encrypt and decrypt 32 bytes in multiple parts 1
depends_on:0:1
7:exp:0:int:128:int:16:int:16:exp:3:int:16:int:16:int:16:int:16
CAMELLIA 128 GCM Decrypt test vector #1
depends_on:0:1
8:exp:0:exp:3:hex:"00000000000000000000000000000000":hex:"000000000000000000000000":hex:"":hex:"":hex:"":hex:"f5574acc3148dfcb9015200631024df8":int:0:exp:4
CAMELLIA 128 GCM Decrypt test vector #2
depends_on:0:1
8:exp:0:exp:3:hex:"00000000000000000000000000000000":hex:"000000000000000000000000":hex:"defe3e0b5c54c94b4f2a0f5a46f6210d":hex:"00000000000000000000000000000000":hex:"":hex:"f672b94d192266c7c8c8dbb427cc989a":int:0:int:0
CAMELLIA 128 GCM Decrypt test vector #3
depends_on:0:1
8:exp:0:exp:3:hex:"feffe9928665731c6d6a8f9467308308":hex:"cafebabefacedbaddecaf889":hex:"d0d94a13b632f337a0cc9955b94fa020c815f903aab12f1efaf2fe9d90f729a6cccbfa986ef2ff2c33de418d9a2529091cf18fe652c1cfde13f8260614bab815":hex:"":hex:"":hex:"86e318012dd8329dc9dae6a170f61b24":int:0:exp:4
CAMELLIA 128 GCM Decrypt test vector #4
depends_on:0:1
8:exp:0:exp:3:hex:"feffe9928665731c6d6a8f9467308308":hex:"cafebabefacedbaddecaf888":hex:"d0d94a13b632f337a0cc9955b94fa020c815f903aab12f1efaf2fe9d90f729a6cccbfa986ef2ff2c33de418d9a2529091cf18fe652c1cfde13f82606":hex:"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39":hex:"feedfacedeadbeeffeedfacedeadbeefabaddad2":hex:"9f458869431576ea6a095456ec6b8101":int:0:int:0
CAMELLIA 128 GCM Decrypt test vector #5
depends_on:0:1
8:exp:0:exp:3:hex:"feffe9928665731c6d6a8f9467308308":hex:"cafebabefacedbad":hex:"28fd7434d5cd424a5353818fc21a982460d20cf632eb1e6c4fbfca17d5abcf6a52111086162fe9570e7774c7a912aca3dfa10067ddaad40688645bdd":hex:"":hex:"feedfadedeadbeeffeedfacedeadbeefabaddad2":hex:"e86f8f2e730c49d536f00fb5225d28b1":int:0:exp:4
CAMELLIA 192 GCM Encrypt and decrypt 0 bytes
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:0:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 1 byte
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:1:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 2 bytes
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:2:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 7 bytes
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:7:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 8 bytes
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:8:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 9 bytes
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:9:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 15 bytes
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:15:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 16 bytes
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:16:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 17 bytes
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:17:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 31 bytes
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:31:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 32 bytes [#1]
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:32:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 32 bytes [#2]
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:33:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 47 bytes
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:47:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 48 bytes
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:48:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 49 bytes
depends_on:0:1
4:exp:7:char*:"CAMELLIA-192-GCM":int:192:int:49:exp:3
CAMELLIA 192 GCM Encrypt and decrypt 0 bytes in multiple parts
depends_on:0:1
7:exp:7:int:192:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
CAMELLIA 192 GCM Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:0:1
7:exp:7:int:192:int:1:int:0:exp:3:int:1:int:0:int:1:int:0
CAMELLIA 192 GCM Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:0:1
7:exp:7:int:192:int:0:int:1:exp:3:int:0:int:1:int:0:int:1
CAMELLIA 192 GCM Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:0:1
7:exp:7:int:192:int:16:int:0:exp:3:int:16:int:0:int:16:int:0
CAMELLIA 192 GCM Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:0:1
7:exp:7:int:192:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
CAMELLIA 192 GCM Encrypt and decrypt 22 bytes in multiple parts 1
depends_on:0:1
7:exp:7:int:192:int:16:int:6:exp:3:int:16:int:6:int:16:int:6
CAMELLIA 192 GCM Encrypt and decrypt 22 bytes in multiple parts 2
depends_on:0:1
7:exp:7:int:192:int:0:int:22:exp:3:int:0:int:22:int:0:int:22
CAMELLIA 192 GCM Encrypt and decrypt 32 bytes in multiple parts 1
depends_on:0:1
7:exp:7:int:192:int:16:int:16:exp:3:int:16:int:16:int:16:int:16
CAMELLIA 192 GCM Decrypt test vector #1
depends_on:0:1
8:exp:7:exp:3:hex:"000000000000000000000000000000000000000000000000":hex:"000000000000000000000000":hex:"":hex:"":hex:"":hex:"ba9ae89fddce4b51131e17c4d65ce587":int:0:int:0
CAMELLIA 192 GCM Decrypt test vector #2
depends_on:0:1
8:exp:7:exp:3:hex:"000000000000000000000000000000000000000000000000":hex:"000000000000000000000000":hex:"8f9c0aa2549714c88bb2665e8af86d42":hex:"":hex:"":hex:"783cff5c5aca7197320658a74279ab37":int:0:exp:4
CAMELLIA 192 GCM Decrypt test vector #3
depends_on:0:1
8:exp:7:exp:3:hex:"feffe9928665731c6d6a8f9467308308feffe9928665731c":hex:"cafebabefacedbaddecaf888":hex:"0f009e88410d84ad93c90d55efbe20ffa855492f4dfd0fb485c4f02f536feffbb4d967729e5c67f1de0750255cc500716ba483eb3b0a2bf607af28f6a60bb2e9":hex:"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b391aafd255":hex:"":hex:"8d645a0b0e48d3c3b60a014157cb49b4":int:0:int:0
CAMELLIA 192 GCM Decrypt test vector #4
depends_on:0:1
8:exp:7:exp:3:hex:"feffe9928665731c6d6a8f9467308308feffe9928665731c":hex:"cafebabefacedbaddecaf888":hex:"0f009e88410d84ad93c90d55efbe20ffa855492f4dfd0fb485c4f02f536feffbb4d967729e5c67f1de0750255cc500716ba483eb3b0a2bf607af28f6":hex:"":hex:"feedfacedeadbeeffeedfacedeadbeefabaddad2":hex:"11b15bb5ab6fac0c422014e91eacbf2b":int:0:exp:4
CAMELLIA 192 GCM Decrypt test vector #5
depends_on:0:1
8:exp:7:exp:3:hex:"feffe9928665731c6d6a8f9467308308feffe9928665731c":hex:"cafebabefacedbad":hex:"678b3dcb270faa206dc5f6fbb5014996e86d6f3e35cdcdfeb03b37b9b06ff4ff2682248823bd3c84124dc76af7bde3dd440c228b5efbc795dd80dfb6":hex:"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39":hex:"feedfacedeadbeeffeedfacedeadbeefabaddad2":hex:"f876143d933214a5035ff0bb96ff650b":int:0:int:0
CAMELLIA 256 GCM Encrypt and decrypt 0 bytes
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:0:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 1 byte
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:1:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 2 bytes
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:2:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 7 bytes
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:7:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 8 bytes
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:8:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 9 bytes
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:9:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 15 bytes
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:15:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 16 bytes
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:16:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 17 bytes
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:17:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 31 bytes
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:31:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 32 bytes [#1]
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:32:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 32 bytes [#2]
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:33:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 47 bytes
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:47:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 48 bytes
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:48:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 49 bytes
depends_on:0:1
4:exp:8:char*:"CAMELLIA-256-GCM":int:256:int:49:exp:3
CAMELLIA 256 GCM Encrypt and decrypt 0 bytes in multiple parts
depends_on:0:1
7:exp:8:int:256:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
CAMELLIA 256 GCM Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:0:1
7:exp:8:int:256:int:1:int:0:exp:3:int:1:int:0:int:1:int:0
CAMELLIA 256 GCM Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:0:1
7:exp:8:int:256:int:0:int:1:exp:3:int:0:int:1:int:0:int:1
CAMELLIA 256 GCM Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:0:1
7:exp:8:int:256:int:16:int:0:exp:3:int:16:int:0:int:16:int:0
CAMELLIA 256 GCM Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:0:1
7:exp:8:int:256:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
CAMELLIA 256 GCM Encrypt and decrypt 22 bytes in multiple parts 1
depends_on:0:1
7:exp:8:int:256:int:16:int:6:exp:3:int:16:int:6:int:16:int:6
CAMELLIA 256 GCM Encrypt and decrypt 22 bytes in multiple parts 2
depends_on:0:1
7:exp:8:int:256:int:0:int:22:exp:3:int:0:int:22:int:0:int:22
CAMELLIA 256 GCM Encrypt and decrypt 32 bytes in multiple parts 1
depends_on:0:1
7:exp:8:int:256:int:16:int:16:exp:3:int:16:int:16:int:16:int:16
CAMELLIA 256 GCM Decrypt test vector #1
depends_on:0:1
8:exp:8:exp:3:hex:"0000000000000000000000000000000000000000000000000000000000000001":hex:"000000000000000000000000":hex:"":hex:"":hex:"":hex:"9cdb269b5d293bc5db9c55b057d9b591":int:0:exp:4
CAMELLIA 256 GCM Decrypt test vector #2
depends_on:0:1
8:exp:8:exp:3:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"000000000000000000000000":hex:"3d4b2cde666761ba5dfb305178e667fb":hex:"00000000000000000000000000000000":hex:"":hex:"284b63bb143c40ce100fb4dea6bb617b":int:0:int:0
CAMELLIA 256 GCM Decrypt test vector #3
depends_on:0:1
8:exp:8:exp:3:hex:"feffe9928665731c6d6a8f9467308308feffe9928665731c6d6a8f9467308308":hex:"cafebabefacedbaddecaf888":hex:"ad142c11579dd95e41f3c1f324dabc255864d920f1b65759d8f560d4949d447758dfdcf77aa9f62581c7ff572a037f810cb1a9c4b3ca6ed638179b776549e092":hex:"":hex:"":hex:"c912686270a2b9966415fca3be75c468":int:0:exp:4
CAMELLIA 256 GCM Decrypt test vector #4
depends_on:0:1
8:exp:8:exp:3:hex:"feffe9928665731c6d6a8f9467308308feffe9928665731c6d6a8f9467308308":hex:"cafebabefacedbaddecaf888":hex:"ad142c11579dd95e41f3c1f324dabc255864d920f1b65759d8f560d4948d447758dfdcf77aa9f62581c7ff572a037f810cb1a9c4b3ca6ed638179b77":hex:"d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39":hex:"feedfacedeadbeeffeedfacedeadbeefabaddad2":hex:"4e4b178d8fe26fdc95e2e7246dd94bec":int:0:int:0
CAMELLIA 256 GCM Decrypt test vector #5
depends_on:0:1
8:exp:8:exp:3:hex:"feffe9928665731c6d6a8f9467308308feffe9928665731c6d6a8f9467308308":hex:"cafebabefacedbad":hex:"6ca95fbb7d16577a9ef2fded94dc85b5d40c629f6bef2c649888e3cbb0ededc7810c04b12c2983bbbbc482e16e45c9215ae12c15c55f2f4809d06652":hex:"":hex:"feedfacedeadbeeffeedfacedeadbeefabaddad2":hex:"e6472b8ebd331bfcc7c0fa63ce094462":int:0:exp:4
AES-GCM NIST Validation (AES-128,128,0,0,128) #0 [#1]
depends_on:1:2
9:exp:1:hex:"d785dafea3e966731ef6fc6202262584":hex:"d91a46205ee94058b3b8403997592dd2":hex:"":hex:"":hex:"3b92a17c1b9c3578a68cffea5a5b6245":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,128) #1 [#1]
depends_on:1:2
9:exp:1:hex:"aec963833b9098de1ababc853ab74d96":hex:"4e0ffd93beffd732c6f7d6ad606a2d24":hex:"":hex:"":hex:"e9fcedc176dfe587dc61b2011010cdf1":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,128) #2 [#1]
depends_on:1:2
9:exp:1:hex:"c4fb9e3393681da9cec5ec96f87c5c31":hex:"845e910bc055d895879f62101d08b4c7":hex:"":hex:"":hex:"99fb783c497416e4b6e2a5de7c782057":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,120) #0 [#1]
depends_on:1:2
9:exp:1:hex:"2a930f2e09beceacd9919cb76f2ac8d3":hex:"340d9af44f6370eff534c653033a785a":hex:"":hex:"":hex:"0c1e5e9c8fe5edfd11f114f3503d63":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,120) #1 [#1]
depends_on:1:2
9:exp:1:hex:"fe71177e02073b1c407b5724e2263a5e":hex:"83c23d20d2a9d4b8f92da96587c96b18":hex:"":hex:"":hex:"43b2ca795420f35f6cb39f5dfa47a2":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,120) #2 [#1]
depends_on:1:2
9:exp:1:hex:"b02392fd7f228888c281e59d1eaa15fb":hex:"2726344ba8912c737e195424e1e6679e":hex:"":hex:"":hex:"a10b601ca8053536a2af2cc255d2b6":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,112) #0 [#1]
depends_on:1:2
9:exp:1:hex:"21895cbafc16b7b8bf5867e88e0853d4":hex:"f987ce1005d9bbd31d2452fb80957753":hex:"":hex:"":hex:"952a7e265830d58a6778d68b9450":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,112) #1 [#1]
depends_on:1:2
9:exp:1:hex:"9bb9742bf47f68caf64963d7c10a97b0":hex:"34a85669de64e1cd44731905fddbcbc5":hex:"":hex:"":hex:"e9b6be928aa77b2de28b480ae74c":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,112) #2 [#1]
depends_on:1:2
9:exp:1:hex:"4e9708e4b37e2e1b5feaf4f5ab54e2a6":hex:"1c53a9fdd23919b036d99560619a9939":hex:"":hex:"":hex:"6611b50d6fbca83047f9f5fe1768":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,104) #0 [#1]
depends_on:1:2
9:exp:1:hex:"82fede79db25f00be96eb050a22cea87":hex:"e9c50b517ab26c89b83c1f0cac50162c":hex:"":hex:"":hex:"d0c0ce9db60b77b0e31d05e048":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,104) #1 [#1]
depends_on:1:2
9:exp:1:hex:"1d98566fca5201abb12914311a8bd532":hex:"590aef4b46a9023405d075edab7e6849":hex:"":hex:"":hex:"a1cfd1a27b341f49eda2ca8305":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,104) #2 [#1]
depends_on:1:2
9:exp:1:hex:"3038771820c2e1319f02a74b8a7a0c08":hex:"e556d9f07fb69d7e9a644261c80fac92":hex:"":hex:"":hex:"4d2f005d662b6a8787f231c5e1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,96) #0 [#1]
depends_on:1:2
9:exp:1:hex:"0fb7eef50de598d7d8b508d019a30d5a":hex:"a2a2617040116c2c7e4236d2d8278213":hex:"":hex:"":hex:"68413c58df7bb5f067197ca0":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,96) #1 [#1]
depends_on:1:2
9:exp:1:hex:"8cc58b609204215c8ab4908286e56e5c":hex:"fb83ea637279332677b5f68081173e99":hex:"":hex:"":hex:"a2a9160d82739a55d8cd419f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,96) #2 [#1]
depends_on:1:2
9:exp:1:hex:"81a5fd184742a478432963f6477e8f92":hex:"da297cbb53b11d7c379e0566299b4d5a":hex:"":hex:"":hex:"200bee49466fdda2f21f0062":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,64) #0 [#1]
depends_on:1:2
9:exp:1:hex:"f604ac66d626959e595cbb7b4128e096":hex:"269d2a49d533c6bb38008711f38e0b39":hex:"":hex:"":hex:"468200fa4683e8be":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,64) #1 [#1]
depends_on:1:2
9:exp:1:hex:"2e308ba7903e925f768c1d00ff3eb623":hex:"335acd2aa48a47a37cfe21e491f1b141":hex:"":hex:"":hex:"4872bfd5e2ff55f6":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,64) #2 [#1]
depends_on:1:2
9:exp:1:hex:"1304e2a5a3520454a5109df61a67da7a":hex:"dbe8b452acf4fa1444c3668e9ee72d26":hex:"":hex:"":hex:"83a0d3440200ca95":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,32) #0 [#1]
depends_on:1:2
9:exp:1:hex:"ecf1ec2c9a8f2e9cc799f9b9fddb3232":hex:"ddf0b695aef5df2b594fcaae72b7e41c":hex:"":hex:"":hex:"2819aedf":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,32) #1 [#1]
depends_on:1:2
9:exp:1:hex:"9ab5c8ca905b5fe50461f4a68941144b":hex:"96dd3927a96e16123f2e9d6b367d303f":hex:"":hex:"":hex:"6e0c53ef":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,32) #2 [#1]
depends_on:1:2
9:exp:1:hex:"b5fc7af605721a9cfe61c1ee6a4b3e22":hex:"6b757d4055823d1035d01077666037d6":hex:"":hex:"":hex:"e8c09ddd":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,128) #0 [#1]
depends_on:1:2
9:exp:1:hex:"03c0b4a6e508a8490db0d086a82c9db7":hex:"ac52f6c1a05030321fa39f87e89fdb5e":hex:"33316ca79d10a79f4fd038593e8eef09625089dc4e0ffe4bc1f2871554fa6666ab3e7fe7885edef694b410456f3ec0e513bb25f1b48d95e4820c5972c1aabb25c84c08566002dadc36df334c1ce86847964a122016d389ac873bca8c335a7a99bcef91e1b985ae5d488a2d7f78b4bf14e0c2dc715e814f4e24276057cf668172":hex:"":hex:"756292d8b4653887edef51679b161812":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,128) #1 [#1]
depends_on:1:2
9:exp:1:hex:"b228d3d15219ea9ad5651fce02c8374d":hex:"5c7eafaead029c3fe3cf3835fe758d0e":hex:"8c35dd805c08686b9b4d460f81b4dcb8c46c6d57842dc3e72ba90952e2bebf17fe7184445b02f801800a944486d662a127d01d3b7f42679052cdc73ce533129af8d13957415c5495142157d6ce8a68aa977e56f562fed98e468e42522767656ce50369471060381bb752dd5e77c79677a4cadffa39e518e30a789e793b07ea21":hex:"":hex:"a4dde1ab93c84937c3bbc3ad5237818d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,128) #2 [#1]
depends_on:1:2
9:exp:1:hex:"776afcbabedd5577fe660a60f920b536":hex:"5bbb7f1b14084e520408dd87b97705e9":hex:"44631fc9d4a07416b0dfb4e2b42071e3e2be45502c9ddf72b3e61810eeda31a7d685ebb2ee43a2c06af374569f439ee1668c550067de2dece9ec46ee72b260858d6033f814e85275c5ae669b60803a8c516de32804fa34d3a213ccfaf6689046e25eeb30b9e1608e689f4d31cc664b83a468a51165f5625f12f098a6bf7ddab2":hex:"":hex:"a5347d41d93b587240651bcd5230264f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,120) #0 [#1]
depends_on:1:2
9:exp:1:hex:"20abeafa25fc4ea7d0592cb3e9b4d5fe":hex:"3aba79a58c5aa664856b41d552c7a8d3":hex:"98cfecaae9eb9a7c3b17e6bc5f80d8a4bf7a9f4fa5e01b74cae15ee6af14633205aafe3b28fb7b7918e12322ea27352056a603746d728a61361134a561619400ff2bf679045bac2e0fbc2c1d41f8faba4b27c7827bceda4e9bf505df4185515dd3a5e26f7639c8ad5a38bc5906a44be062f02cc53862678ae36fa3de3c02c982":hex:"":hex:"2a67ad1471a520fe09a304f0975f31":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,120) #1 [#1]
depends_on:1:2
9:exp:1:hex:"2bc73fba942ff105823b5dccf6befb1c":hex:"902c3e3b69b1ef8395d7281ff74cce38":hex:"4adec0b4ac00325a860044d9f9519daa4f7c163229a75819b0fd7d8e23319f030e61dfa8eadabff42ea27bc36bdb6cad249e801ca631b656836448b7172c11126bad2781e6a1aa4f62c4eda53409408b008c057e0b81215cc13ddabbb8f1915f4bbab854f8b00763a530ad5055d265778cd3080d0bd35b76a329bdd5b5a2d268":hex:"":hex:"ebdd7c8e87fe733138a433543542d1":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,120) #2 [#1]
depends_on:1:2
9:exp:1:hex:"356a4c245868243d61756cabe86da887":hex:"b442f2ec6d45a17144c258fd59fe5b3b":hex:"12cccc3c60474b0a1579c5006c2134850724fa6c9da3a7022d4f65fd238b052bdf34ea34aa7dbadad64996065acee588ab6bd29726d07ed24ffae2d33aadf3e66ebb87f57e689fd85128be1c9e3d8362fad1f8096ee391f75b576fb213d394cef6f091fc5488d9aa152be69475b9167abd6dd4fd93bbbc7b8ca316c952eb19c6":hex:"":hex:"ed26080dcb670590613d97d7c47cf4":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,112) #0 [#1]
depends_on:1:2
9:exp:1:hex:"dfa7e93aff73600fc552324253066e2c":hex:"c20001e93f1cd05253c277a9445d61e4":hex:"a64d1e20058a1f7e698622a02f7ff8dc11886717ede17bbdc3c4645a66a71d8b04346fb389a251ffb0a7f445a25faf642bb7e4697d2cacf925e78c4be98457996afb25b0516b50f179441d1923312364947f8f1e0f5715b43bd537727bf943d7b4679b0b0b28b94e56e7bbf554d9cf79fcee4387f32bb6f91efdd23620035be6":hex:"":hex:"6ba5e4dace9a54b50b901d9b73ad":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,112) #1 [#1]
depends_on:1:2
9:exp:1:hex:"2ecea80b48d2ecd194a7699aa7d8ccfc":hex:"8b4db08bafc23b65ae50a2d20661d270":hex:"efc2ca1a3b41b90f8ddf74291d68f072a6e025d0c91c3ce2b133525943c73ebadc71f150be20afeb097442fa51be31a641df65d90ebd81dcbaf32711ed31f5e0271421377ffe14ddafea3ca60a600588d484856a98de73f56a766ae60bae384a4ae01a1a06821cf0c7a6b4ee4c8f413748457b3777283d3310218fb55c107293":hex:"":hex:"246a9d37553088b6411ebb62aa16":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,112) #2 [#1]
depends_on:1:2
9:exp:1:hex:"d38fee3fd3d6d08224c3c83529a25d08":hex:"a942ccb11cf9468186fabfc18c899801":hex:"1c92a4ce0a1dae27e720d6f9b1e460276538de437f3812ab1177cf0273b05908f296f33ba0f4c790abe2ce958b1d92b930a0d81243e6ad09ef86ee8e3270243095096537cb1054fcfcf537d828b65af9b6cf7c50f5b8470f7908f314d0859107eed772ee1732c78e8a2e35b2493f3e8c1e601b08aeab8d9729e0294dca168c62":hex:"":hex:"803a08700ec86fdeb88f7a388921":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,104) #0 [#1]
depends_on:1:2
9:exp:1:hex:"1899b0cbae41d705c6eed3226afb5bc0":hex:"82d0910aa53e300a487d880d018d0dea":hex:"6bf5583cc1007d74f3529db63b8d4e085400ccf3725eab8e19cb145f3910c61465a21486740a26f74691866a9f632af9fae81f5f0bffedf0c28a6ce0fd520bb4db04a3cd1a7d29d8801e05e4b9c9374fd89bcb539489c2f7f1f801c253a1cc737408669bcd133b62da357f7399a52179125aa59fae6707d340846886d730a835":hex:"":hex:"c5d58870fee9ce157f5ec1fa8f":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,104) #1 [#1]
depends_on:1:2
9:exp:1:hex:"8b95323d86d02754f4c2874b42ec6eb0":hex:"4f76084acbdef9999c71dcc794238d7c":hex:"ebc75788377c0b264818a6f97c19cf92c29f1c7cdeb6b5f0a92d238fa4614bc35d0cfe4ec9d045cd628ff6262c460679ac15b0c6366d9289bbd217e5012279e0af0fb2cfcbdf51fe16935968cbb727f725fe5bcd4428905849746c8493600ce8b2cfc1b61b04c8b752b915fed611d6b54ef73ec4e3950d6db1807b1ce7ed1dcc":hex:"":hex:"c4724ff1d2c57295eb733e9cad":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,104) #2 [#1]
depends_on:1:2
9:exp:1:hex:"30da555559eb11cf7e0eff9d99e9607d":hex:"7799275bf12335f281ec94a870f90a0b":hex:"e735d556e15aec78d9736016c8c99db753ed14d4e4adaaa1dd7eaad702ea5dc337433f8c2b45afdf2f385fdf6c55574425571e079ca759b6235f877ed11618ff212bafd865a22b80b76b3b5cf1acfd24d92fd41607bbb7382f26cd703757088d497b16b32de80e1256c734a9b83356b6fced207177de75458481eaef59a431d7":hex:"":hex:"3c82272130e17c4a0a007a908e":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,96) #0 [#1]
depends_on:1:2
9:exp:1:hex:"ed2ac74af896c5190c271cfa6af02fd2":hex:"e0226e2d8da47badad1fb78b9a797f27":hex:"8f11353ae476ff923013e6e736ffc9d23101a1c471ccc07ad372a8430d6559c376075efce2e318cdf4c9443dbf132e7e6da5524045028c97e904633b44c4d189a4b64237ac7692dd03c0e751ce9f04d0fdbd8a96074cd7dfa2fd441a52328b4ac3974b4902db45663f7b6f24947dba618f8b9769e927faf84c9f49ad8239b9fb":hex:"":hex:"db8af7a0d548fc54d9457c73":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,96) #1 [#1]
depends_on:1:2
9:exp:1:hex:"0225b73fe5fbbe52f838d873173959d8":hex:"02a048764f48d9aed1147ee922395bbf":hex:"9b46a57b06e156c877e94c089814493ead879397dab3dfcab2db349ef387efcd0cc339a7e79131a2c580188fc7429044a465b8329d74cd8f47272a4ed32582b1c5c7e3d32341ae902ea4923dc33df8062bc24bb51a11d2ecc82f464f615041387f9c82bd2135d4e240fe56fa8a68e6a9a417e6702430a434b14d70cf02db3181":hex:"":hex:"e2c2ce4022c49a95c9ac9026":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,96) #2 [#1]
depends_on:1:2
9:exp:1:hex:"89ca3771a0ef3287568b4ac036120198":hex:"7e83d2ffa8af8c554cfd71a0db56ef5b":hex:"1bd7a9d6262882bd12c62bd50942965b3cdcadf5e0fab2dc4d0daf0ee4b16e92c6e2464c0caa423cdce88e4d843490609716ec5e44c41672c656ac0e444d3622557ea8420c94deae3ad190ddaf859f6f8c23e4e2e32a46d28df23de4f99bd6c34f69e06eddfdfa5f263dbe8baf9d4296b2c543e4c4847271e7590374edf46234":hex:"":hex:"06b2bf62591dc7ec1b814705":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,64) #0 [#1]
depends_on:1:2
9:exp:1:hex:"a41a297bd96e224942998fe2192934a1":hex:"6827f2c5a0b7ecd6bbc696abb0adf556":hex:"f32041abd8543415cbac423d945dda5378a16a7e94d9ab5dbd2d32eb1c5048cc7c8e4df3ca84ec725f18c34cfdeaa7595392aabfd66d9e2f37c1165369cd806cd9d2110def6f5fad4345e5a6e2326c9300199438fcc078cd9fcf4d76872cac77fc9a0a8ac7e4d63995078a9addecf798460ff5910861b76c71bccfb6b629d722":hex:"":hex:"49a4917eef61f78e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,64) #1 [#1]
depends_on:1:2
9:exp:1:hex:"a9372c058f42e0a1d019bdb528313919":hex:"8d03f423230c8f00a5b6b712d426a2af":hex:"cfef4e70fcc1821eeccf7c7b5eb3c0c3b5f72dc762426e0bd26242f8aa68c5b716ab97eded5e5720caccc1965da603d556d8214d5828f2cf276d95bf552d47313876796221f62ccb818a6d801088755d58cfb751bfed0d5a19718d4e0f94b850e0279b3a69295d1837cba958a6cc56e7594080b9e5b954a199fdc9e54ddc8583":hex:"":hex:"b82cd11cd3575c8d":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,64) #2 [#1]
depends_on:1:2
9:exp:1:hex:"6302b7338f8fa84195ad9abbacd89b4e":hex:"e1bed5c53547cbc85f3411fbb43bb08b":hex:"bcd329c076e8da2797d50dcdcf271cecf3ce12f3c136ed746edc722f907be6133276ee099038fdc5d73eec812739c7489d4bcc275f95451b44890416e3ffe5a1b6fa3986b84eee3adad774c6feaecb1f785053eeda2cfc18953b8547866d98918dbe0a6abc168ac7d77467a367f11c284924d9d186ef64ef0fd54eacd75156d2":hex:"":hex:"5222d092e9e8bd6c":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,32) #0 [#1]
depends_on:1:2
9:exp:1:hex:"78b5c28d62e4b2097873a1180bd5a3a5":hex:"c93902c2819ee494f0fc4b259ee65dd8":hex:"e6b1192674a02083a6cf36d4ba93ba40a5331fadf63fd1eb2efa2ee9c0d8818472aaaf2b4705746011753f30f447c8f58dd34d29606daf57eadc172529837058cb78a378b19da8d63c321f550dfa256b5fd9f30e93d8f377443bfcd125f86a079a1765d2010be73d060f24eebae8d05e644688b2149bc39e18bd527bc066f2ba":hex:"":hex:"eae48137":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,32) #1 [#1]
depends_on:1:2
9:exp:1:hex:"3d84130578070e036c9e3df5b5509473":hex:"3b9b4950523a19c6866fd2b0cde541fd":hex:"a764931e1b21a140c54a8619aacdb4358834987fb6e263cec525f888f9e9764c165aaa7db74f2c42273f912daeae6d72b232a872ac2c652d7cd3af3a5753f58331c11b6c866475697876dbc4c6ca0e52a00ba015ee3c3b7fb444c6e50a4b4b9bbe135fc0632d32a3f79f333d8f487771ed12522e664b9cf90e66da267f47a74d":hex:"":hex:"79987692":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,32) #2 [#1]
depends_on:1:2
9:exp:1:hex:"08428605ab4742a3e8a55354d4764620":hex:"128f5f4a817e4af04113847a223adeb0":hex:"464b484ed79d93a48e0f804e04df69d7ca10ad04ba7188d69e6549ab50503baaec67e0acba5537d1163c868fd3e350e9d0ae9123046bc76815c201a947aa4a7e4ed239ce889d4ff9c8d043877de06df5fc27cf67442b729b02e9c30287c0821ef9fa15d4cccbc53a95fa9ec3ed432ca960ebbf5a169ccada95a5bf4c7c968830":hex:"":hex:"3eb3e3a2":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,128) #0 [#1]
depends_on:1:2
9:exp:1:hex:"0dd358bc3f992f26e81e3a2f3aa2d517":hex:"d8c750bb443ee1a169dfe97cfe4d855b":hex:"":hex:"87cc4fd75788c9d5cc83bae5d764dd249d178ab23224049795d4288b5ed9ea3f317068a39a7574b300c8544226e87b08e008fbe241d094545c211d56ac44437d41491a438272738968c8d371aa7787b5f606c8549a9d868d8a71380e9657d3c0337979feb01de5991fc1470dfc59eb02511efbbff3fcb479a862ba3844a25aaa":hex:"a81d13973baa22a751833d7d3f94b3b1":char*:"":hex:"77949b29f085bb3abb71a5386003811233056d3296eb093370f7777dadd306d93d59dcb9754d3857cf2758091ba661f845ef0582f6ae0e134328106f0d5d16b541cd74fdc756dc7b53f4f8a194daeea9369ebb1630c01ccb307b848e9527da20a39898d748fd59206f0b79d0ed946a8958033a45bd9ae673518b32606748eb65":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,128) #1 [#1]
depends_on:1:2
9:exp:1:hex:"43b5f18227e5c74288dbeff03801acd6":hex:"08ee12246cf7edb81da3d610f3ebd167":hex:"":hex:"f58d630f10cfca61d4644d4f6505bab629e8e8faf1673e64417f9b79e622966a7011cfb3ff74db5cebf09ad3f41643d4437d213204a6c8397e7d59b8a5b1970aed2b6bb5ea1933c72c351f6ba96c0b0b98188f6e373f5db6c5ebece911ec7a1848abd3ae335515c774e0027dab7d1c07d047d3b8825ff94222dbaf6f9ab597ee":hex:"82d83b2f7da218d1d1441a5b37bcb065":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,128) #2 [#1]
depends_on:1:2
9:exp:1:hex:"9a433c612d7e1bdff881e4d63ba8b141":hex:"8b670cf31f470f79a6c0b79e73863ca1":hex:"":hex:"ce10758332f423228b5e4ae31efda7677586934a1d8f05d9b7a0dc4e2010ec3eaacb71a527a5fff8e787d75ebd24ad163394c891b33477ed9e2a2d853c364cb1c5d0bc317fcaf4010817dbe5f1fd1037c701b291b3a66b164bc818bf5c00a4c210a1671faa574d74c7f3543f6c09aaf117e12e2eb3dae55edb1cc5b4086b617d":hex:"8526fd25daf890e79946a205b698f287":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,120) #0 [#1]
depends_on:1:2
9:exp:1:hex:"8e9d75c781d63b29f1816859f7a0e0a0":hex:"748a3b486b62a164cedcf1bab9325add":hex:"":hex:"a9f1883f58e4ef78377992101ab86da0dafcefa827904dd94dff6f6704b1e45517165a34c5555a55b04c6992fb6d0840a71bd262fe59815e5c7b80fe803b47d5ba44982a3f72cb42f591d8b62df38c9f56a5868af8f68242e3a15f97be8ef2399dbace1273f509623b6f9e4d27a97436aebf2d044e75f1c62694db77ceac05de":hex:"131e0e4ce46d768674a7bcacdcef9c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,120) #1 [#1]
depends_on:1:2
9:exp:1:hex:"fe6b8553002c69396d9976bb48d30779":hex:"595b17d0d76b83780235f5e0c92bd21f":hex:"":hex:"786f4801b16de7a4931ab143b269c7acc68f1ed9b17a95e8929ccec7d53413059fd4267bedbf079d9d69e90314c1345bc9cb9132f1af69323157ddf7533ced42b4b7bd39004f14d326f5b03bc19084d231d93bcab328312d99b426c1e86e8e049d380bb492e2e32ad690af4cf86838d89a0dfdcbc30e8c9e9039e423a234e113":hex:"8879de07815a88877b0623de9be411":char*:"":hex:"b15dc7cd44adcb0783f30f592e5e03ccd47851725af9fe45bfc5b01ae35779b9a8b3f26fec468b188ec3cad40785c608d6bfd867b0ccf07a836ec20d2d9b8451636df153a32b637e7dcdbd606603d9e53f6e4c4cc8396286ce64b0ea638c10e5a567c0bc8e808080b71be51381e051336e60bf1663f6d2d7640a575e0752553b":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,120) #2 [#1]
depends_on:1:2
9:exp:1:hex:"14898c56009b459172fef9c17993b54f":hex:"0862f8f87289988711a877d3231d44eb":hex:"":hex:"e7ba6ef722273238b975d551f95d3e77e9b75b24c547b86eafb457d409803bdf6e1443839d8604ee497020e1a3dbd687a819b17fdde0fcf240ce2129792792a58bfcd825773001ee959bf9ec8d228e27ce1cd93d7fb86769a3793361b6f82bf7daf284afc1ece657a1ee6346ea9294880755b9b623563ad2657ba2286488a2ef":hex:"36938974301ae733760f83439437c4":char*:"":hex:"3fd56897a62743e0ab4a465bcc9777d5fd21ad2c9a59d7e4e1a60feccdc722b9820ec65cb47e1d1160d12ff2ea93abe11bc101b82514ead7d542007fee7b4e2dd6822849cd3e82d761ff7cf5ce4f40ad9fec54050a632a401451b426812cf03c2b16a8667a88bb3f7497e3308a91de6fd646d6a3562c92c24272411229a90802":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,112) #0 [#1]
depends_on:1:2
9:exp:1:hex:"fe5253d4b071793b081ebc122cc2a5f8":hex:"49e82d86804e196421ec19ddc8541066":hex:"":hex:"b57a0bd7714ae95e77fa9452e11a7ed4a2bec60f81ad6ddb956d4b1cb5dfc277dcb4034d501801b26733b5e08c710c3cfdccc1b208dc7a92cd7ebe166320582bcaff64cc943c36fbe7008f004e5db70c40de05fa68b0c9d4c16c8f976130f20702b99674cd2f4c93aeaeb3abca4b1114dbc3a4b33e1226ad801aa0e21f7cc49b":hex:"e8b8ae34f842277fe92729e891e3":char*:"":hex:"c4a31c7ec820469f895d57579f987733337ec6547d78d17c44a18fab91f0322cfe05f23f9afaf019cf9531dec2d420f3591d334f40d78643fd957b91ab588a7e392447bd702652017ede7fb0d61d444a3b3cc4136e1d4df13d9532eb71bcf3ff0ae65e847e1c572a2f90632362bc424da2249b36a84be2c2bb216ae7708f745c":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,112) #1 [#1]
depends_on:1:2
9:exp:1:hex:"b3502d6f0d172246e16503cdf5793296":hex:"6ce994689ff72f9df62f386a187c1a13":hex:"":hex:"09268b8046f1558794e35cdc4945b94227a176dd8cb77f92f883542b1c4be698c379541fd1d557c2a07c7206afdd49506d6a1559123de1783c7a60006df06d87f9119fb105e9b278eb93f81fd316b6fdc38ef702a2b9feaa878a0d1ea999db4c593438f32e0f849f3adabf277a161afb5c1c3460039156eec78944d5666c2563":hex:"21cdf44ff4993eb54b55d58e5a8f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,112) #2 [#1]
depends_on:1:2
9:exp:1:hex:"5fb33dd73db309b9dfd3aee605cd94bf":hex:"3f6486f9e9e645292e0e425bac232268":hex:"":hex:"f4e011f8c99038c46854b427475f23488077ebf051c4b705a1adfdd493a0a10af7a7e9453965b94f52f61ae62ce9243a82a2dbf9c5a285db3fe34ed34ed08b5926f34c48171195f7062d02a6e6e795322a0475017371cb8f645cdcac94afc66dc43e7583bdf1c25790f4235076a53de6c64f3bc5004e5a9ce4783fbf639fad97":hex:"7ee5e0e2082b18d09abf141f902e":char*:"":hex:"0503cb531f1c967dae24f16dd651d544988a732020134896a0f109222e8639bf29ff69877c6ef4ac3df1b260842f909384e3d4409b99a47112681c4b17430041ca447a903a6c1b138f0efbb3b850d8290fceac9723a32edbf8e2d6e8143b1cbc7bf2d28d1b6c7f341a69918758cc82bbab5d898fa0f572d4ceaa11234cb511ec":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,104) #0 [#1]
depends_on:1:2
9:exp:1:hex:"a958fe3b520081b638d9e4c7d5da7ac7":hex:"c396109e96afde6f685d3c38aa3c2fae":hex:"":hex:"dfa9487378c7d8af9c8dbd9e533cd81503d9e4e7dab43133bad11fd3050a53a833df9cc3208af1a86110567d311d5fc54b0d627de433c381b10e113898203ac5225140f951cdb64c6494592b6453f9b6f952ec5ece732fb46c09a324f26b27cdad63588006bb5c6c00b9aa10d5d3b2f9eaab69beeddd6f93966654f964260018":hex:"06ca91004be43cf46ed4599e23":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,104) #1 [#1]
depends_on:1:2
9:exp:1:hex:"ec319fb143eac8215b51541daec268f2":hex:"8a4684f42a1775b03806574f401cff78":hex:"":hex:"d298d988e74927736237eb8ab09d7a86b854fa2fd1f7f3be83b417ac10aa9291f4af5b3fbaf75a296ac32369ad57ded3984b84711953e477de3035ba430a30ffb84c941936e6c8d2cae8d80159876f87dd682747f2dccc36d7c32ab227032b8ac70b313fa4202ea236e3ec4d9e4d8b48cf3b90b378edc5b1dbeec929549344f8":hex:"e91acb1bfda191630b560debc9":char*:"":hex:"27ce4a622959930f4059f247d29d1438257093cc973bf1bae4e0515da88b9a7e21ec59c7e4d062035cdf88b91254d856b11c8c1944865fa12922227ded3eecccaa36341ecf5405c708e9ea173f1e6cdf090499d3bb079910771080814607a1efe62ec6835dc0333d19dd39dd9ea9f31cd3632128536149a122050bb9365b521d":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,104) #2 [#1]
depends_on:1:2
9:exp:1:hex:"14a3e69f351ac39b4297749a90c1365c":hex:"eb1c6c04437aa5a32bcc208bb3c01724":hex:"":hex:"051224f7b208549dcfda5f9d56ce5f0a072ef1f23f3810c693516c92622be6ed4d7a9e0f9450980ba490b2e9e3468ea7eef10bc9ebd673d91f32b748c1bf2c50cc4ebb59fc409c6d780bba00700d563ce1dc9927a6c860095a42ed053f3d640debfbfa7a4e6d5de234af19755000d95e7f414f1f78285ee165410c020038286b":hex:"e418815960559aefee8e0c3831":char*:"":hex:"797310a6ed9ce47cdc25f7f88f5dbbf6f8f4837701704d7afced250585922744598d6f95ba2eecf86e030cc5ee71b328fc1c4f2d4df945d1b91a2803d6ae8eba6881be5fe0f298dd0c0279e12720ede60b9e857ccca5abe9b4d7ee7f25108beebbfe33f05c0d9903bf613c2e7ed6a87b71b5e386d81b3ae53efd01055bbcccc2":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,96) #0 [#1]
depends_on:1:2
9:exp:1:hex:"c34827771fc3918d1cee09ba9401b832":hex:"2379bbd39a1c22bc93b9b9cc45f3840b":hex:"":hex:"ce79701b661066e53191c9acdaf677ad41622314898d7216e3f113e2e6e215d26d8bd139827f06ab3ea5c4105694e87db1dd6cec10e1f86a8744d4c541f08e40319e22ab42fc1a6c89edfd486b6f142c6bbbf84a73912e0b2e55b79db306ccabf839855afdd889e52ae981520c89e7dc29bb2adb1906cca8c93fcb21290a095b":hex:"26e1f6cf0d9e0f36dfd669eb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,96) #1 [#1]
depends_on:1:2
9:exp:1:hex:"b1f9bd2006ec550b7b9913d383200b5d":hex:"ca28fa6b64bb3b32ef7d211f1c8be759":hex:"":hex:"6d9fc8f586d50d6e0128172ae147844e80136905d3a297497a9566ca7c7445029028f14c9950acee92a5c12a9150f5e024e01c7505dd83937542b0b1288de9c292ae8ad918a09b2edf8493540b74c73d2794f2eb6eed18eba520ddea9567462c83330f33d7892fcde0b10c73a4e26ab1bef037cec7e0190b95188e9a752fee6f":hex:"c87aac7ad0e85dbb103c0733":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,96) #2 [#1]
depends_on:1:2
9:exp:1:hex:"8b2cef1a92aa0af2b00fb2a99855d5bc":hex:"08d87b7acee87d884667f6b1e32e34d0":hex:"":hex:"fd09525ef3c65ab5823e1b6c36b4a9449a3975c5d3a9e7e33c61fb32edcbb8e8c915b6202e3fbce87d73cc3b66d83d9ea7e1e353cc7468f08626932cf0235563e2a28953ee5a0afadb1c3cb513b1f1fc9a8a6cf326174b877448672f7731dd6430a51619da1a169ab302da5af5b38802f8bbf5890b5d9b45deda799679501dc4":hex:"3bd7685318010b0c5fe3308b":char*:"":hex:"583e64631c218549923e8ad33b728d07f23b0f19d2aff1ad7e20d564c591db0e117caa8f21e3f3345e3d84f0ccbb27274cddf9274410fc342cb2a5d4aea4e925d0dd5350389ee0dea23a842ff3f5c1198374a96f41e055f999cfbc2f47ceaa883da8eb6ff729f583eff1f91bd3f3254d4e81e60d9993b3455e67f405708e4422":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,64) #0 [#1]
depends_on:1:2
9:exp:1:hex:"175c306f8644b0c4b894ae3d0971505e":hex:"9860268ca2e10974f3726a0e5b9b310f":hex:"":hex:"fbe7ced7048f83e3a075661c4924eb77da1b4d6019d504afb942d728b31fd3b17557bd101c08453540a5e28d3505aeb8801a448afac2d9f68d20c0a31c7ef22bd95438851789eef1bebe8d96ac29607025b7e1366fecd3690ba90c315528dc435d9a786d36a16808d4b3e2c7c5175a1279792f1daccf51b2f91ac839465bb89a":hex:"f809105e5fc5b13c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,64) #1 [#1]
depends_on:1:2
9:exp:1:hex:"08c0edcfe342a676ccdc04bdf854b4b0":hex:"4a7b70753930fe659f8cc38e5833f0c7":hex:"":hex:"1fc8ef8480c32d908b4bcbfa7074a38e915c20ed7a1c608422087e89442d7c5af6fe9c9a716c55793248062d8e6c6e8e904e2804da3a43701e4c78ecdb67e0b25308afc6d9b463356439cd095cff1bdf0fd91ab301c79fd257046cba79a5d5cd99f2502ad968420e4d499110106072dc687f434db0955c756a174a9024373c48":hex:"9ab1e2f3c4606376":char*:"":hex:"983458c3f198bc685d98cea2b23cf71f0eb126e90937cab3492a46d9dc85d76bbb8035c6e209c34b2a7187df007faabe9f3064dc63f1cb15bf5a10655e39b94732e0c6583d56327e9701344e048887a81b256181cdfa9ec42ebc990875e4852240ddcb3cbc4ea4e6307075fd314f7190f3553267bd68b19e954e310ec3f8dbab":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,64) #2 [#1]
depends_on:1:2
9:exp:1:hex:"241067a0301edf0f825d793e03383ea1":hex:"a30994261f48a66bb6c1fc3d69659228":hex:"":hex:"6984bb9830843529fad7f5e7760db89c778d62c764fcd2136ffb35d7d869f62f61d7fef64f65b7136398c1b5a792844528a18a13fba40b186ae08d1153b538007fc460684e2add8a9ed8dd82acbb8d357240daaa0c4deb979e54715545db03fe22e6d3906e89bdc81d535dae53075a58f65099434bfeed943dbc6024a92aa06a":hex:"36c3b4a732ba75ae":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,32) #0 [#1]
depends_on:1:2
9:exp:1:hex:"03cccb5357bd2848332d1696f2ff90cb":hex:"e0754022dfb1f813ccaf321558790806":hex:"":hex:"5e2f18cbc1e773df9f28be08abb3d0b64d545c870c5778ac8bb396bef857d2ac1342ae1afb3bf5d64e667bf837458415d48396204fe560e3b635eb10e560e437f2d0396952998fd36e116cd047c1d7f6fc9901094454d24165c557a8816e0d0a8e0ce41e040ba6f26ca567c74fc47d9738b8cd8dae5dfc831c65bc1ba9603a07":hex:"c75f0246":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,32) #1 [#1]
depends_on:1:2
9:exp:1:hex:"4e5e53c84a05d5a5348bac7b2611cf62":hex:"47e40543b7d16bc9122c40b106d31d43":hex:"":hex:"489c00c05dec06f282924c680f621ab99ac87f7d33ebbb4ca0eee187ec177d30d2b4afb4ee9f0dc019cf1a4da16d84b7f5f5c7fce72a32461db115b5a5a433024fd5ed3d47161836bb057a0189ed768f95e45fa967d0cc512fc91b555808c4033c945e8f2f7d36428dcb61f697e791b74e5c79b2bcb9cb81bec70d8119cd8d76":hex:"81eec75d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,32) #2 [#1]
depends_on:1:2
9:exp:1:hex:"2c94008bf377f90b7a1c0d2ea38f730c":hex:"abfe92931a8411a39986b74560a38211":hex:"":hex:"7b3d619d115de9970b2df4e1f25194940b3f3da04c653231e8e6946de9dc08ae5ba37e2a93c232e1f9445f31c01333045f22bd832e3b5f9833f37070fafb0ef1c44cc5637058ab64d9e07bb81b32852d4cf749a3ddbfdb494f8de8bb4e31f46033f8a16bc22e2595d023845505ea5db74dd69ab4ca940078b09efb4ff19bdb66":hex:"47d42e78":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,128) #0 [#1]
depends_on:1:2
9:exp:1:hex:"69eedf3777e594c30e94e9c5e2bce467":hex:"a3330638a809ba358d6c098e4342b81e":hex:"df4e3f2b47cf0e8590228fcf9913fb8a5eb9751bba318fd2d57be68c7e788e04fabf303699b99f26313d1c4956105cd2817aad21b91c28f3b9251e9c0b354490fa5abfcea0065aa3cc9b96772eb8af06a1a9054bf12d3ae698dfb01a13f989f8b8a4bb61686cf3adf58f05873a24d403a62a092290c2481e4159588fea6b9a09":hex:"5114e9983c96fecec3f7304ca42f52aa16cb7c6aadfb62ad537c93a3188835ca0703dad34c73cf96435b668b68a7a1d056931959316e8d3ab956bf64c4e07479c7767f9d488b0c0c351333ccf400b7e0be19a0fd173e3f2a1ae313f27e516952260fd2da9ab9daca478ebb93cd07d0b7503b32364d8e308d904d966c58f226bb":hex:"5de3068e1e20eed469265000077b1db9":char*:"":hex:"208e6321238bf5c6e2ef55a4b8f531cbbfb0d77374fe32df6dd663486cf79beeed39bb6910c3c78dd0cc30707a0a12b226b2d06024db25dcd8a4e620f009cafa5242121e864c7f3f4360aaf1e9d4e548d99615156f156008418c1c41ff2bbc007cecf8f209c73203e6df89b32871de637b3d6af2e277d146ae03f3404d387b77":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,128) #1 [#1]
depends_on:1:2
9:exp:1:hex:"45cc35311eedf0ba093bf901931a7036":hex:"fed5084de3c348f5a0adf4c2fd4e848a":hex:"6e210914e4aed188d576f5ad7fc7e4cf7dd8d82f34ea3bcbdb7267cfd9045f806978dbff3460c4e8ff8c4edb6ad2edba405a8d915729d89aab2116b36a70b54f5920a97f5a571977e0329eda6c696749be940eabfc6d8b0bbd6fbdb87657b3a7695da9f5d3a7384257f20e0becd8512d3705cc246ee6ca1e610921cf92603d79":hex:"5dc8d7525eaad035c19714ae1b1e538cb66a4089027245351e0ad9297410fb3a0c1155407c10a8bb95a9ca624a9c9925dac003ee78926c6e90ff4ccdba10e8a78bda1c4478162a0e302de5ff05fb0f94c89c3c7429fb94828bdcd97d21333c2ee72963ee6f056ce272b8bab007e653a42b01d1d2041ba627f169c8c0d32e6dae":hex:"266a895fc21da5176b44b446d7d1921d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,128) #2 [#1]
depends_on:1:2
9:exp:1:hex:"9edb5231ca4a136b4df4ae22b8588f9f":hex:"c342e9bdabe7be922b2695f5894e032c":hex:"a45c7f8032ac5144deef8d5380f033aea2786b0592720a867f4831eaccc6b85d3fd568aedc6e472e017455b0b5b30cf7a08ea43ca587f35e1646ecd9b4dc774d11e350c82c65692be1e9541cbd72a283bdcf93dc7115545f373747b4f8d5915ed0c42fbeefd3e9bd86003d65efc2361fde5b874ddabcf8265e6b884615102eff":hex:"493df801c57f8bb591955712d92d3fc34518f0599fec8533b2b4473364e1df4f560c12444cf50eeb584676b7e955c742189de6b50b8e012dfa6642f3679fb02bc6d8e08d1db88c8ae955a7946263e06494e17f8df246b672942661e5563302252208f2e00a0d77068a020e26082c291a75a06f63c41e2830292a418b2b5fd9dd":hex:"5ed3ea75c8172fa0e8755fef7b4c90f1":char*:"":hex:"56696e501fac1e8d5b83ef911ed11337d5d51ff5342a82993dd5340bb9632e6606eef68ec5fe8cec6b34ebbc596c279e6cbc9221c4cde933f6d93ae014e3c4ca49593f35eaa638606d059519bac3a3373519e6184e7227d2aa62170c36479fe239cb698bfca863925a4c9fb1338685a55a6dfd3bd9c52d8ae12be8551fce6e1a":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,120) #0 [#1]
depends_on:1:2
9:exp:1:hex:"d5fdcb8f5225090e63fae9b68f92c7cb":hex:"581c818282a0905df5ffff652e5604e9":hex:"f1ae6cd7b07f261105f555cf812a1d5bf8dd9aac07666318acffa11abb77d0238156663acbf7543825b45c6e9cddb481a40995ecd78bb5f4cba5df7c7efb00fc19c7f45e94d37697aca8ef368b99165393b6107f900194c797cd3289cb097eb5915f2abfd6aa52dd1effffdde448e30075a1c053246db54b0ec16eadca1c0071":hex:"d39b9cba95e3a3aab9bc1d03ff475c04faeb5b7f0510777f39e5a05756606eb7ddd154aac035d9ddaf3535629821dd8f014dedd52cd184f52fc706e3c89a3a271398c9125d9a624dafb297a56022ca2ea331ea7359ab5e65f8e14814788e64e0a886a9b1a0144bf268fdcf9d94c3d10a0452f40111da9df108252e9039eacea3":hex:"827e66b5b70dce56215cfb86c9a642":char*:"":hex:"cec11a12e47fd443f878e8e9fe23c65f29dd2d53cec59b799bcb0928de8e2f92fe85c27cec5c842ef30967b919accafe0c0d731b57f0bb5685d90a3061cb473e50e8aeca1346d1f47f7db06941f83f21ba5976d97c28cab547d8c1f38387a04b8a0b212da55b75fbaf9562eeeabd78eadcbab66457f0cd4e0d28133a64cb063f":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,120) #1 [#1]
depends_on:1:2
9:exp:1:hex:"036198cd3a3ab9319684d0f811cf2992":hex:"47dffc6b3b80ffef4b943bde87b9cf3c":hex:"ec4de476cd337f564a3facb544d0ff31cd89af4c3d9a28543e45156189f8eff8f804494dda83a1fb2c30ce858884a01ec63db59268452b1eea0f0d48280bb7340eaacc84509469dd94d303774d053d7ab4fb5f6c26581efeb19165f8cb09d58ec314d09ab8356731e87fd081f661e7b2d1a7c3aa4af5448a12b742e7b210b0b0":hex:"6b95b9e82a695fb7b466ce3adb536f525d8314f95eada39efb49baf121093ce7d5439f0d8223e03530b85accd388a70650ca9f7e63eb32afecb7b1916ed9b762128cc641caf3e08e027c3d88481d653b6b15172e977dfb9b3f88465911aee162501cbf8501ce2b66ee151bbfdc23225f638f18750c239d62471663e5ee2a5856":hex:"6cf68a374bea08a977ec8a04b92e8b":char*:"":hex:"5c2f7c408167be3d266ff634e1993fe291aef7efae245fa0b6b5bde886a810c866ae6a078286684d1b66116e636e285f03646e09f3c4ed7b184e7c171ba84f3bfd9500c6f35964a404892b4cdcdd3f697fc5b01934a86019810987a9fea7efca016049873f1072f62df3c17f57ea1d88ccd8757f7e3c5d96e8a18d5366a39ea9":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,120) #2 [#1]
depends_on:1:2
9:exp:1:hex:"c9fbbff8f25f951ba874dfc5ff38584e":hex:"1c1fc752673be6d4ff4cc749fc11e0fe":hex:"abfde0b60acfe265b62ed68ebebc1f5f725f155c4b8a8aeec8d704701c51ff7817060c1b0ce6b80d6efc9836c9ea2bc022ec67db4cd34e945e3a1b153fd2e0f7ac84bb4b07e04cbb529ee24014b16067f9f082b940c9d5e54024d3e5e910310457478560721587da7b5343d89eec5a8fce389c01185db15e7faa9a3fa32e8ab9":hex:"ca401071396da00376add467490abc6e6a7d8a85852026979f7013a09cf689113c8d833560cd6c5b8fdaa8fdd818e773ac13954839a0a2c91efeaf4e0e14de43308419a8b86fa2ae600a88a6bd39dfaabc16a3c7c1b77a5c2aab7f7caceb2f8595324125efbb7c96ba16c47d0bd10568b24bf445d72d683268466e68e46df500":hex:"ff0b2c384e03b50e7e829c7a9f95aa":char*:"":hex:"239637fac6e180e71b2c9fa63ce8805f453d81499623ec2deba9b033350250662897867bffaf0c314244baf9e1fe3e1bb7c626d616bfbf3e0ac09a32aaf718b432337c9dc57c2d6fc4a0a09bdc05b9184d1b90c7193b7869f91e2caa8b3b35c10c6621ffae4c609bdf4e4e3f06e930541c381451ef58f4f30a559d2b79b0e6b6":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,112) #0 [#1]
depends_on:1:2
9:exp:1:hex:"3a314ec178da96311e42334a616fb38b":hex:"d7ea27c819e3eb2666611bb1c7fc068d":hex:"db8dcc31a5681f13d56abd51bd2dcb0d2b171628186e215a68bf16167b4acd00c3441973c3fa62fa2698ee5c6749fc20e542364d63c40756d8bcff780269e5201bafdced3cdc97931d8203873431882c84522c151b775285d0a3c5d7667254c74724ff0ea9d417aa6c62835865dfded34edd331c0c235a089427672c5a9211c9":hex:"518b3f5384ab54f80497d55be7a5d6902bc7718386212c2ec7537db331514b3838f104bf9054e03039a4cfb73f41e5d0a9648e569ed738cea8d33917430dff6afa8f07a75e324b9262fa196a4439dcd66b0535ee5bea0d292600227c2a79ed03be0671740e5cb7b306d855612bd3abcbf02cf7e7cecbb6cdbb33d57b4e3234a2":hex:"1e774647b1ca406e0ed7141a8e1e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,112) #1 [#1]
depends_on:1:2
9:exp:1:hex:"e818372a63b7e2c23b524e29ba752bdb":hex:"36e617e787cb25e154f73af1da68cb06":hex:"71801d69796c2ce36b043c157aec9fd2e06fd1ec596126d10c26b6d44e3dc36c4fa30a030d65c382b6ddfd958e71fe9c16732e595137a3d6764c15480fc3358e9a113ba492b31274663f5842df5d1cc6bad70e83b34675a4411e2e70755aede0ff5035601be130562e27a20283d6f144ff1bdb5276dec05fad80d51b28d50688":hex:"c1bf1b702a95ceaa6b48a1cdd888ae51f58a9fc3232bd6c784529a83301c6d0cdda6e605ad9a2563f54a8d59f624ae7c589e48b85041a010dcb6fb8739d43e79a456fc0e8574af086df78680460c3cdc4e00dc3b9d4e76b0de26e9aec546705249fa7e7466c01001c2667eaf2813be1f0f116916f34843a06b201d653aa1b27e":hex:"3744262bc76f283964c1c15dc069":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,112) #2 [#1]
depends_on:1:2
9:exp:1:hex:"9a04f16882ff45816739d1b6697ce8b7":hex:"66f504d9a9128ad7fb7f1430d37c4784":hex:"f641c53c83c4fb1ff8044bfa97cdf63fe75d8159d65b3e5ad585b89c083a53cf4a2f7a58eaeaf45fa71f2c07bc5725a6b03307d7f32884a133a4c803700bf1e12564b98b71f63b434ddf13ad2c467dda25ffa6effcafa72452b20c34cfae71e47096f8745b487e9f1945f5bec83f7ec2709a13b504d92315b1b727a78902be84":hex:"6a4f3dbb3371f64258fd1f831349e745a4e19a33aad794b1de3788729618beed619586092120e9e5dc3ac6e0d52f991f7be61afbfaa4399ac716ad79a2734827254b1627791dc92a128a6f43426b8085dee94242e83176a3d762658f18ecc1e37e3e1531648c9caed212ea2cf3b3843cb92cb07730f30fe2dca3925470fadd06":hex:"fbb37084396394fecd9581741f3c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,104) #0 [#1]
depends_on:1:2
9:exp:1:hex:"38cf029a4b20607030586cd2d82146e6":hex:"6330084319e2bf32cd5240f4826944bc":hex:"80746cfb0127c592f8164d751b0e14a5b379056a884cece7ee4e9b80538d7ff6be56a3b19c135786722aaf315123b47672b0251e87ea45f0fd3601cf93f9efa6cbd9ad537f54d57f1e187f821faac24096ecec19d137c9f4cf145c278af4cd8de01c7758784fda06f1cc62d92ae1977786f3d0645714ab4ab6f48c8794b12f73":hex:"f4c9f4476561c9ebdac71b282ae6e2f9f03547da98e66d4d857720db2fcc9ed1f363858db34c9dcaca0109d7c81db24150493115f2bb6985efa8686e3d2ab719d33b230aa4c5c70696bf42f225fb3c6704711c054a882d89b320884a78cb59cd2100496edf4010487597fb9135d8ca79693a43843e9626fd6c64a8722b3a27dc":hex:"7b021de5cda915ba58f90ceef4":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,104) #1 [#1]
depends_on:1:2
9:exp:1:hex:"cf4d81fc5997c744a572bed71f4ae609":hex:"bc4e20c56931c967ce8e3b8f5f1c392f":hex:"b6b8294abf7da5703f864721f7904d3821f5568bf4b269e44edef4f1c95ddc172d83a06c0ad9f7f1fd2e292c17a876392bc5bb705d370b2f16ff721bef7648f423346fd3a4d762676e6fcf2d690553a47224af29afed0f452d263be90eb8150a13d720f1db6f1abc1c2ec18cfbf93b8ed3c5aa7cfc1dcb514d69f90409687a4d":hex:"f3d65d70326e641fbe7fd945fe9cf66c74f17d0d1020ae8ac488f39b7285c99d8632bc2201960f3d77daccfecc04428abe0853aa8d82b90a93127c72b2d2af53f7f1bd0afb99d50f0b3b24e934ec98eddb278b2c65866442cebf10208c7ce1b7ecf764858480b2a269b106fa6d2428d5ad17612e53e62ccc7ad1184663aeb9a7":hex:"0a86142a0af81c8df64ba689f4":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,104) #2 [#1]
depends_on:1:2
9:exp:1:hex:"d88ad40b42ead744f1b7a36685658be1":hex:"52c3158f5bd65a0a7ce1c5b57b9b295e":hex:"dde2663335c40e5550ae192b843fa9fb4ef357b5c09d9f39dafda3296a4d14031817ee4dc1a201d677597d81e37050cd3dc86c25adbd551e947a080b6c47ec7be8a927ef7920bd1bb81f2c59801a2b9d745d33344cbe4838bcf2eb8dce53ab82c75c9bbab8e406597f6908aaa81fbbdef25aa69116c8f7a8cdc9958435aa32ac":hex:"e99d2566fe6bcb2a04d167605db7c0f1e5567ff2d8d3292c15bbccc5d1e872bcb15a30b3bb8b1eb45e02fba15946e6bca310583a6740845a0f74f4ebfd5c59ced46875823e369e0447cc3e5d03dae530adf3c9846362c94e7f9d17207bf92d4d59981d8fd904eb8b96a0a23eb0f8d7e7a87e8e8892a2451524da6841ce575c27":hex:"7643b3534eb5cb38331ed2e572":char*:"":hex:"6f87f6be2f4e7421aa26fe321045d1e23066a02158634bef35890581c92367d0bc232940de30974c70a66c60137a9f3924d12db1e5bc1b0e7131ea3620a25eb805b7d670263b82c8bbfcd6839305025390fc17d42d82daebe1b24f73ff9aa4617e3866785dded88f8b55ef89b2798ea2641a592a46428d9020f9bf853c194576":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,96) #0 [#1]
depends_on:1:2
9:exp:1:hex:"c3ce86a212a30e724b4c624057db4e79":hex:"9e03f0dd4cb2b3d830a6925e4400ed89":hex:"92c48a39d93ea3308f55f6650d33fdf17a902076d582a94a82ac99496de9f62312292b844bbca5a683ef0f0710bbc1c7f89cbcca8f9c0299f154590d32059bd99fca5d78c450ede0d11d55075947caf2151218ce7a06c1e81985a7781a3444054170b457fd7ba816026310112abb47c8eddfd3ab7f679a0f60efc6c6dd3b759e":hex:"3582ef7a9565c9a8e4496750ee5ca3e3a80df6238f7b7608e3394ec56d1360777921da039ede34abcedd01081babd496ba4de74a7de501181d6bb2022a6cc7f79d89a4c6a97676fb0f2b42f70e2d0bc1eaac364c3646df4f611c1d6b09737451b81b5a4da73c05fb58391c74e44498b80b26f1c29562d23c39b5d3f086b280cb":hex:"3230fe94b6ccd63e605f87d0":char*:"":hex:"052347a4273cddba65b2a0b961477f07edee440a9117ab204359d2dd45ad2a6dad3b60ead891e7da6d79f3017ac90f95725a0089f04d25ce537bf53b7ea8e1ea58692d34c221db141e2a9fd7211adcee03ef8b5bf3c5d36311d20bb3d81f70f7e7272d0e2b6d12293b1a2c31b70f140a8f08d98c6231a3c429c3d0a10b2e1c1c":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,96) #1 [#1]
depends_on:1:2
9:exp:1:hex:"a0155360b84420b5bf4fb410ea02f31e":hex:"46f0386be7363887e7e357376305eab5":hex:"611bc290f91798ad84f0a5ecb5a7cb8fa35e9ab6a5a51c9869a68a076e96f92c9c117595f92cbac5d33343fa2accd2541473907cbc54792c5e215ae857424c921b04ca4b81376bbedbfcc0e565c118f2aced08f247698eed5e2d202c48245161cabeac9fa195219f9799fa253e339561e13012167f1d02b4012b7791b7c863ba":hex:"ecdb51522fc440f7471ea6a31f7c1ef1ec2153e5bcf6303297dbf8ddb3830b45ed9866157375ce4bdeb5e32fcbc6607984fccd7e6552628736608ab13072856d432ceccd3e90d1bb52ca9ada9cee90eb89ac10e887a1978fd0fb3d7bb20caaf35539e150be8044b725b8427c4c4a910f79980865d36344a8784bcc3d58460acb":hex:"ac5addcc10cae6c1345520f1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,96) #2 [#1]
depends_on:1:2
9:exp:1:hex:"694f621f594d96b16c32254ff06f3f9c":hex:"542db4e107485a3cd24c7ad337a4f1b5":hex:"27b7bfa5eb34ba376e515e58ab8b6556c396820d0074a1fe3b984945dcf5251ca450456ccb4bb66ec739b03fdc5f72d24553e843255adc012d1f1c95aa3cdac5d12926465354217203052cbd4869a8b5be2e01d0fe66b5a6a8da0a2ce351557e2991ce77baa812b9c67b8e1c5a1fc348710e1a73a0fd49acfd538b7db6bef8b3":hex:"e61476b8b7f101ca6005f25af2b9bee795d62720bbbf59357057ca7cd473e00f0d465255fce8d6164657603323549fb4e3d33fa51054b1a70cc7e492916dea85453e9107fe781bfeb4a622c5b2306a8dddef99386dc50745003aa7220cd7f32fb0a060fa7682576769a48f9169c7d11fe0a8a61b95f5d6dfcf216f7d0c652a84":hex:"0bdef4d771a1740381e7db97":char*:"":hex:"8b27a338fd2153d304f04655e09bd9bdf4468890ecce1e3b51de2c9a25a8d9336a9acd753ce270b1fe8d50196feac68145e0fd59c9cb3aa7c1e8af03494bc4279c6e287c849f3c775ada584ae173100946ae6921ef7c96bbc6f216093548702cf1867bb1bf1f4c9e90a34230a2b2aeb584622dd615023a43a406e64428bd9170":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,64) #0 [#1]
depends_on:1:2
9:exp:1:hex:"78826a5215a1d5e1b39cad5a06861f8f":hex:"feb9d740fd1e221e328b5ef5ed19eff5":hex:"ca9411b368d8295210d7a04da05a351d287f2f67d978ef1bb936de9f8065473f6fa11495da2eab13a1002231c86411d5409bbc718e2042ee99e013b1df1ef786e9fc1f2d43293c854128184efb9317c4ef82a002eac8b28fcd91d8a714a3aa25fc3c0ae4af9f4bcf5ad19a30cd8ec4b1785df70aa92074da419abe433dd4c435":hex:"0fe2c798d7015d3e2f8725648d95729c45d357dc0c89fc63b9df5a68d3e65419540f663e9190793a29c58c495d5c6a731782acf119e2df8a96fb180ad772c301d098dbc5e3560ac45b6631a01cef7eed6db51f223775d601d2e11b9baa55e2f0651344777e5a03f6738a2013626a891b5f134f07b16598b8cbe3aeaefa1c2a26":hex:"a724bbb295a02883":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,64) #1 [#1]
depends_on:1:2
9:exp:1:hex:"d450f5253251121606e56687952bf2f1":hex:"fe7ff90b020fc77d7fcd90bc583850ac":hex:"a3bca9ff25a60006eb18f993dcdc99681e414e27605264dfd25652195d7fe1489550afd07fc7346b88d93b59eb6642913646e93bf50ee1db5dd30106cf181124d8ad01c72ed99038c9798620abdf5c78c419b08c97f982b34d9e9105d9aa4538afcd37f62e2412f14f7a248fcd60abaf2b66cd4554767f99030f1a495d56a5ae":hex:"479b4f421bd8ac7f615c4a507da187cb5d4b1f1e2c6113d1f9678c1ba92dc5e17c5b525d7f3208733223eb82af0820b8476e9b08ca714ce044417b24d2238720cb8ffdc69db558cbaff52e3651b400e16c9d5ac8ed8949a19c35516f80394a04bd1cfdced7b204f779d792086e00b2ebca2f55a1140e85f5ee9ac7cfc5a31747":hex:"6446398aff73ed23":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,64) #2 [#1]
depends_on:1:2
9:exp:1:hex:"90a59f6b0abf932311f0b65623c17740":hex:"20778bea82a6717038e7064f48a31981":hex:"4022d04f1454a72d2efe57533bd32757595220b20f3a37d166cec0412fb1eb2588f939ecd906c805f4827338669888e9f730905001eb1b136b95e306edf70d9ba1e5cd0aa13a25a1f28ab55cff36f9cd7036c735e3b285d26002ad2ed1074b566e252ea3ec8a9ce10882375dc3f1d9676e301dcb179eaae991120b796cc35648":hex:"be5a948a771a8df12adaf74d702f064a75f6483c03203365fbde7d184844fe6dee0b84cf344be05b1d163817ba1516fcb87b9167ed81f884ada73b0058e2b38cba515bbbe462f4c21f8de1d41bca2cf4340aa659f9f07886c2bb620d9c3295318c07fa3c17fe8242409359c08bcb337e5cf268880839b6a20f4ee4b3f04e7024":hex:"dc77c1d7e0902d48":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,32) #0 [#1]
depends_on:1:2
9:exp:1:hex:"6be4ef629f0b38194c74f7b66418922d":hex:"fb77a4b9b246271abfc656433f87628c":hex:"e5d5227725a19a3050fbf2a97a6e854bc1218b94a4a3403b721ace3447daff68fff5553a26edd41219e68fb61fb9e964d0a3c29796251ae4eb942187cdc55d13a09dfb487e93d9e2072d7271456a77c6ccb81154443eea176314d6e3a08619b52cd880f1c28ae5214ac0090a3855dbd74f87389fe8afebd464330fb683dff81a":hex:"b67ea20a320f4ec0e4185c62a4ad79a3c97a8189a5e4d1deff9d3edff0f9a9323532853c1a2a2c1e62e4d1afebfcdf1d8461921ea601750380e63b912d8b7389198f976851d88a19f1aa32c97143668ad00838d98da1c4f2be0e6e2dc964d170d7f7ad2e2997982e5ca110e744b6e10c24ca18eadff6b129b1f290c8a7e0a593":hex:"3d8fc6fb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,32) #1 [#1]
depends_on:1:2
9:exp:1:hex:"c50e37244931e8debc12b3d561c83ba2":hex:"6c0b1fd7ab424a6883c36457d1b5521f":hex:"516dc25f6452ae169ce293c5cee440de47353ca5ba770dca0f04175950e87a2d4c3f84fbc6eeacaac436853492929680066f959e74de4b736ab924d8367b90aaa6e9492561ad4b5aa78b6737d562e960edc3b983e2e01a186e9f22896f48d8dfcfb6a42cfe2c6006c687a27772820a1e8875bdf09e8104248ce4db883376bc04":hex:"b9abf0796f2d2f774735546cf809030f65ed0c7f6bd469ef2fe0ef32aa0225b57fbce07c36017bbc1806a81ff1a429278160a07643f864485b4e0e35d57553dc1a131e32aa10f1f91d663b10f0a418f472ed7b4bca54fd7ffdbb22c4d7764d94a7ffd04730614459431eb64335b9b65363de292c04275d40a7b968c0f5c486e9":hex:"7d4393f0":char*:"":hex:"962509e494f10269b70ebad02b0cd799d1d41191a734863ef502aff3d3ba48dc2acf9da9a3fc3f40be4d210dc5e128bc00499aec57aa0a4669863165428687b88d46fad41e36af8ea6605586eaa5c0736d0d53b9d523e0cb5a0b285048e060a73cbf4b587d2cd787debdb2b4c8cda731a61a15b19fe8b561fbdd3a7373853ae1":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,32) #2 [#1]
depends_on:1:2
9:exp:1:hex:"8531ddb03977383405baf2ee9ca7d64b":hex:"baf623867d6a25fd85d1f08e599c0566":hex:"18f92cdd37dcd7f99b06838f3f68748aba367baabaebd0da9ee787d70e752fa07dea553a43b643b8d8f460175c0746675205e20a7a98acfcac864d7c4cf5ab4c41c031738c76882acda003c5af47b1c4df8894a827a317935d970d4afaee17715c9cfd1883e8c345f19d1f89e229b8edba6b4f53b86d8da1c0f159afb83b6b33":hex:"d90c9e26509bdba9b1dea8d2b94f2b1881d22c2bd756ad23cd61944710a1c1f2807170ed47a6870ae654e44757fcb3822ef28b37946cafc07284f8a0c22ae3552954f0d87b8d8c825bd546935b494cacb4262d9e2a88f254f200ad31367d8b3715afbabea5f34214ffedb14d7c84806022aba2dc8f88a314ffbb24017d1a9b9f":hex:"2fc9de46":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,128) #0 [#2]
depends_on:1:2
9:exp:1:hex:"862dd5b362cfa556ca37e73cff7f4a0e":hex:"81530a243655a60d22d9ab40d2520447":hex:"":hex:"":hex:"3b9b2af54e610ed0b3dda96961dd8783":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,128) #1 [#2]
depends_on:1:2
9:exp:1:hex:"3452b7bc100c334292e08343f139b9d0":hex:"8f92739a30fe4ba24079f5d42753d6ac":hex:"":hex:"":hex:"0eeca69f8b95e1a902cc3ab1aaa8e2af":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,128) #2 [#2]
depends_on:1:2
9:exp:1:hex:"31a0cbaf21b943f8badc939e94eac7eb":hex:"d5bb2c4eaec47088230972ae34fcda9c":hex:"":hex:"":hex:"580e728512c8e44fbb3fe2c498e05323":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,120) #0 [#2]
depends_on:1:2
9:exp:1:hex:"9e8fca537746e7cbff97f1dcd40a3392":hex:"43e9f2bf186b2af8cc022e7c7412d641":hex:"":hex:"":hex:"4465a3f9d9751789bcef5c7c58cbc5":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,120) #1 [#2]
depends_on:1:2
9:exp:1:hex:"35b5854ca83792ad691dbda1a66790fb":hex:"cff61cf9b32ea30cf7e3692aa6e74bed":hex:"":hex:"":hex:"726793199df533dd9055b0ac7c939d":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,120) #2 [#2]
depends_on:1:2
9:exp:1:hex:"07259267c1c6a015437a5d8cfa92f9e6":hex:"18b9cf2ad7ace6ec1c8366b72878cf20":hex:"":hex:"":hex:"4340f6263f0ba2d82c2eb79cb0cc7e":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,112) #0 [#2]
depends_on:1:2
9:exp:1:hex:"fa1df8955aa3ef191900b06e7c1b7d46":hex:"6928c138c98a4350c318fbdccd3f44ba":hex:"":hex:"":hex:"7c89d9e77515d271b6ed54c9c4e3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,112) #1 [#2]
depends_on:1:2
9:exp:1:hex:"c04200ce41ce77d772babb206315ec7d":hex:"a885d58f0f38f9ff26d906fa1bfb12f4":hex:"":hex:"":hex:"9ee0d025421f2bf18caf563953fb":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,112) #2 [#2]
depends_on:1:2
9:exp:1:hex:"650df049461be341c3099bd1613dcead":hex:"8a4ff6327b49d297248ce2d5bd38afa8":hex:"":hex:"":hex:"13f067ef0d7b448d56e70d282fed":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,104) #0 [#2]
depends_on:1:2
9:exp:1:hex:"ee61b5bf5060fcc637dc833926898508":hex:"b2dcf21f9ffa4a883044d29f087f9b85":hex:"":hex:"":hex:"9ab1d66666d4dea3cbb5982238":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,104) #1 [#2]
depends_on:1:2
9:exp:1:hex:"01cc56ca7e64db7fbef66236a5c49493":hex:"8ea5b63004189792cc040ef18b37e550":hex:"":hex:"":hex:"d685aeb54aa129a21bed17766e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,104) #2 [#2]
depends_on:1:2
9:exp:1:hex:"134dd72ac8e28ab46720c2f42284a303":hex:"c6368e4c0ba0ec90fa7488af9997a4c7":hex:"":hex:"":hex:"4ad9cdf19ff7d7fd7e273efced":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,96) #0 [#2]
depends_on:1:2
9:exp:1:hex:"180c04b2bde6901edcda66085f73ecd9":hex:"9193b206beade4cb036f01a9db187cb8":hex:"":hex:"":hex:"530f5e9ed0879ccef3a7b360":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,96) #1 [#2]
depends_on:1:2
9:exp:1:hex:"aaac85742a55ffa07e98106d6d6b1004":hex:"630cd8ab849253c4da95ac80324ecc28":hex:"":hex:"":hex:"37911820c810e3700c3a9321":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,96) #2 [#2]
depends_on:1:2
9:exp:1:hex:"ab663c4f8f2fdc7d5eabf6ef26169b4e":hex:"86e6100669929e329a1d258cd3552dc9":hex:"":hex:"":hex:"958d6141f7fb2b2dc7d851a6":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,64) #0 [#2]
depends_on:1:2
9:exp:1:hex:"0dd756d49fd25380c4026ea03cafc2da":hex:"6a6f7e39b0d730ea1670e13d16c12c28":hex:"":hex:"":hex:"872ef05a28da5ea1":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,64) #1 [#2]
depends_on:1:2
9:exp:1:hex:"bd8a834b288bdc7578b6c6ab36f5d068":hex:"aa77de0af5fa4dd1ed2ada5cb94813a0":hex:"":hex:"":hex:"c5c094e83755f2b6":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,64) #2 [#2]
depends_on:1:2
9:exp:1:hex:"020d280dbd06939bbb5e6edc6f6d39c6":hex:"09aea6f0e57598452719d6f63b6fe5a0":hex:"":hex:"":hex:"05d6c56ba601e85b":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,32) #0 [#2]
depends_on:1:2
9:exp:1:hex:"e47f41a27a2722df293c1431badc0f90":hex:"227c036fca03171a890806b9fa0c250d":hex:"":hex:"":hex:"86c22189":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,32) #1 [#2]
depends_on:1:2
9:exp:1:hex:"9d3e112114b94e26e93d3855d4be26bd":hex:"99b98525160c4bb2029da5553ff82b59":hex:"":hex:"":hex:"33bee715":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,32) #2 [#2]
depends_on:1:2
9:exp:1:hex:"5b4b7688588125349fbb66004a30d5d4":hex:"b4ae363edb529d8b927c051cf21a2d9d":hex:"":hex:"":hex:"6a920617":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,128) #0 [#2]
depends_on:1:2
9:exp:1:hex:"c4b6c5b8e21c32f36b0ae4ef3b75d5cd":hex:"3d1036bf0000e6f1b77a799f2ef32dec":hex:"1cf2b6cbe86a87b4b5bb3cc50024aeb27c48143658d47b41f2f20b87ed67bd6fc3b85a3a803f66d3576608f5d6ce6cad11e02fe12de5390722dccb8242e1dd140051bef51aa9716c860d45d45bca6effbb1a4797e6e7406a04db5d823766c0f011ebc28e9a8cd4446ec8a75ea8bdc1b2fdbb5cc364fa9877886e30404593df34":hex:"":hex:"a49725014c214ef7cc2d28b9b2b53da7":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,128) #1 [#2]
depends_on:1:2
9:exp:1:hex:"63c3f81500746eaf383fe3975d84f849":hex:"0799d4152fd73c1604b4610cf7171fe1":hex:"cb8248e5f904cc9ccccf6f273fe621eee1b4d7ed98480f9e806a48b84e2d6a733772ecf8fb7fe91805715cddab2b462b89f6e6c7cf873f65031f13c357d5f57b00b7c391c39e78ad1ed94be236ca0ae316bce11bc33c5d701fdfc58abbe918b9c42f7b3d6e89d46f9784b388a6e6daf47730b9fa665d755a17e89932fa669c44":hex:"":hex:"c53d01e53ee4a6ea106ea4a66538265e":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,128) #2 [#2]
depends_on:1:2
9:exp:1:hex:"b0c88b191ce6e8e4a3941f7960b7eae5":hex:"e2a899961c332c815685c553351fa519":hex:"308bf10570af48d632911f3641dea60d78046211c01a63bb8e4e5cbddfff8841d2f2b11e18ccb2170805ef4cacf7804d64e0feef40731a1704907f33b77788c18ccf35b224ec3046a67664ac9a3481d2385b6ddeec6da4f32423f94ea9663a5c51cc388cef33744a8159b4fb654dfdb5092718bf926c824be31197f07f276b5f":hex:"":hex:"92604d37407aff33f8b677326cbb94fc":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,120) #0 [#2]
depends_on:1:2
9:exp:1:hex:"c818dfa0885a09f65ef78712f5ce6609":hex:"ca279284723530fdd68ae880e0ce775c":hex:"2a562abdbb483ca5f355f9cc1c5e607bdd624a078a76b717ce0f8f35d0d4c54b629f372f15d20c848d01420c6af5a7040d42063704a17b46259dcc53723caf2d4bf556143ff9117c752fa4f22c9c155c99b7bf5949d089cdafd562165b9cbf53ff51cec21f49128c8a599718bbcdb4a5d705d20509c44c8945e2a133164b9942":hex:"":hex:"20e9a3a98d71d460743e1efaab13c6":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,120) #1 [#2]
depends_on:1:2
9:exp:1:hex:"2354c6b6afaa883e7ce91faca4981f8b":hex:"604f2730c756c8c39a0527093bc2feb5":hex:"959b4b0b9ce2e9120b327d2d090117553999ee10bdd384a546fc6de0957ef4b447daf07b3d07ef7dbc811f36b0fc09a175d26e4d1263cb5e21eda5ecab85d763807bb20b3cb6ac3f31d548dff00aae058d434ebcf6f7e3a37f11324134f453dd0ea7f51094863486426ff1706129a5a93c53d8c5ccb56cafa5881981fe233cb0":hex:"":hex:"3588c9aa769897dfa328549fbbd10a":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,120) #2 [#2]
depends_on:1:2
9:exp:1:hex:"b0af48e6aebbb6ff5b7c92bd140b085f":hex:"d210d6502a5221ac1274a9c7f5a81725":hex:"d725311ca10eb4b4aa24e6dd19c5e72dc34fc1ff53feb25d924a9b7d8d72205790ca4b1275bd93ad60c27a5587a45659bca07c111e9748fb683a03465153ffd735b7d134b479674ab8596f0596496fe2090f623fd1e4dd730c5283d8b172db8a25df42d9b34f388ed32676a56b8ba03347e47379702654508ccd0a21ff03516e":hex:"":hex:"e6222f068a1e18f09ba6c771eabd86":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,112) #0 [#2]
depends_on:1:2
9:exp:1:hex:"a05fe482fe164b2eca7f6c3e377b39d8":hex:"145327bcc10335fccb93afbf4b17e6e7":hex:"ea6f2e93b5e1bf127d40440b8d6397405246b1b48eebe16964f18928f6b4b8ee2c36322d7126905c1a5b816996e340404b586edc2d77afac11a6c1266511f9eff1a320b035442d4078f8e42ca63cf26d12a971a7adf4645d1bd9a8e4d0a20722f7c2d529beaecc4033f7738075e1cdc6d8a929da5582540678935b82e7b7ba68":hex:"":hex:"3900bde9fa9ae2cbeee54d04f224":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,112) #1 [#2]
depends_on:1:2
9:exp:1:hex:"dacbadf819eb16a63f6f091d13ed04d4":hex:"b9ebce724b0dcb0989ac2d8e7ff8aaec":hex:"7dc6e2189d8a96f3507e352e05e8fd1b4bab988c2f1c706115887119f63b78084f015d85f6b460901a02880103e4d36e8f6527dfd74e4a3acd3f578c0cc726b528875f701ff8b66e5c11b4689c346a098e123bebfa253362cb86829be73c2b85a6881fa976aa730fabb76775027feec7fd920a6c8965a4a509ea812d7c413a95":hex:"":hex:"8988fca83c8cfb1f8feefac46f04":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,112) #2 [#2]
depends_on:1:2
9:exp:1:hex:"969244c7444f3f3bf193b28f8e8e96dc":hex:"49b2845a1a1c87fa66eb8f78c05ac029":hex:"1414a07e86d8b61d1eff43e1ff4ab42c1c95e159058b74c731e3007d21a5eb78bc17b7e920363a3974aeb8608813dc9a4655199b6703ed337450702d8ab16a89776831b2c7c811fec3acc23598a0aa01680a7bf42a4e258145beb08c9f0eacf2bb5f56d26bea3ad11e1a956a630b80f3d22bf35592b4704f7c464b08b06dd7f8":hex:"":hex:"a291c7527385f037f62e60fd8a96":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,104) #0 [#2]
depends_on:1:2
9:exp:1:hex:"525abe490c8434802b69439c590a5290":hex:"141f79f0501316e66451c41c7af0f0cd":hex:"be440db66d3f81be467605a7b2805ec1df5e71e1b1b04bd7a4d05e912f5aa1912ba08de72df18613b32b7edf78963c48c80c25178b3b19262b85bb829f5377e0b368b500d6d3b442f54172d4ca4500eb5b4d478b602e5dc11d090539455087ce1e5b9ea74355fc06e9b60cbf25a9804d3f8c623fff130abc48bc2d8d116b8366":hex:"":hex:"038c7e95f790e6ca5ce73f9551":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,104) #1 [#2]
depends_on:1:2
9:exp:1:hex:"51644e025659de983f5c8156516b812e":hex:"614837c743d0974e9cca497f13038c02":hex:"60c5d062ade2c5c2dec68b734dd3e58ec474a586d1c4797fdfa2337800510134cb27a10d501927632af3c1febc275010c0d2e5abee630cd2bc792963fa82a42286ab047b934a261927311b40f5f953bfd661427921147cac7613d95ee86e16326ef67c1ed097e8fb87a78753d785de34e03a182232786079cb6be00182e41c9e":hex:"":hex:"77e3deba2c7f9386f85bc4a801":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,104) #2 [#2]
depends_on:1:2
9:exp:1:hex:"08566ca7310302dfb84d76ea0525ba20":hex:"5f20ec9c35c08aa7f1c0e8a20fdbd2b3":hex:"5d84e32768b8d1e7e3c426b3118d48e35491bf1bb454b359c8429220216efd8826be94fe1919409a128ccd8125a594f1691c9421fc3dbbb3f757bf2355bb0d074ceec165eb70e26eb53fa2cb5d84dfae06babb557805ef7b8c61c1bc76137571bcc5e84bf5987dc49013831d78bd497ccc49cde7dca2cb75e7ab967da8c6ce81":hex:"":hex:"873f037fc05252a44dc76f8155":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,96) #0 [#2]
depends_on:1:2
9:exp:1:hex:"dfb54db96383fa911bf5b4fa1218ef9a":hex:"7e849e24983f63f1194b396bbd2d55e0":hex:"d3fb689c5818810dd104693f3306a10b27178444af26798a194f7c2ab31ff3a172904b951942b1a26c8ae5b5b1ee2d86dc78bb72a335fde350766d7d9aef6f549871dd46b04b2cc319fcdd47be437d431ad18cab82d51ca9fa57f4108a8de622a92f87d28c0349fab27757fd773413f559a8c00d30e258c1f6cd96f9759bd957":hex:"":hex:"dada7fc7fed58db462854ef6":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,96) #1 [#2]
depends_on:1:2
9:exp:1:hex:"389cf888474e9403e5f4d0e22ffec439":hex:"ef57794cf6fac9f9cea3e8499b53b1d6":hex:"7ea7f7f4763ad208eb6199285b6b2819756c4e3caf2d0ac6f5076ae6785fecdcc4b138a51860ff8b87aaac3a18c2df778a4818308d458dba28f5017513e1454f60be20dae68736ea6d48b1f9deadb517df63140acbd329fbfbc9b82f3ca1862c9e998f0faff1d3ae60b005bf66829f5cf0c5fa03efbdd92d39351e3954be0257":hex:"":hex:"92726d90ad26130e65f2beb4":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,96) #2 [#2]
depends_on:1:2
9:exp:1:hex:"e55abb2ca36c822bf2a030ac703cb8b4":hex:"d86f7177e8ec90f9e9edf10175d5012d":hex:"777a9d93091de56324c10712243f5541722e0b27e1f303fef6faa387a8666161ab354dbea6c43c82a24e8623bfec39aab13164add6be0dfd55d23204c0975b4ba6fbda51363befde482a9ccc1eb9f151e6ad59c77a1e24dd268389e4686f198a936dd603044a3fb653d63cff80597f5a2913c8a2ec1b7d9dce5728dd56c78c2c":hex:"":hex:"65025250343ed8c09b3fceed":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,64) #0 [#2]
depends_on:1:2
9:exp:1:hex:"586114f3b1dc087e1b2739b28c592dfe":hex:"ae5a38ddd455505284434a4bcfe81ef2":hex:"531ff8c285e532d961f49bd210a5523cd9b19a697a3a3fb26db940a496f253862405b1e825daeda7eb0445c98022b8342c8f8ea20301618483f8ab04b6ebccd7e7fc57878fb544a5bf78fa896f50ac30126ff8afca8a86388666b64c643d16812729bfd7e5c03ba52f7e6ea4c6a685404f7bcbd956964417fa0ea9a6d7290c41":hex:"":hex:"467a815610faeb82":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,64) #1 [#2]
depends_on:1:2
9:exp:1:hex:"cbfe806bddb7f06b3826b097550c68f5":hex:"04c1b6c9fd2ab76fc2adfe15d3421bbb":hex:"cfa86d02599652cb4ffff027b9c6ef2336dc9fe946f64fa5ce83f624e144563d4738381bc5371c3cb55cf41ceda07e62cb635ff37246bfa428785229c6e869d5df69d7949a8577889a29e3d05b788ddd43608d9c14e3f1b51ce2085b9a976fe843e3396a74922babe6797d5f01c37ead623b5b582505bcd29edf8a6ea36b0fc7":hex:"":hex:"0697ac372a9acafd":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,64) #2 [#2]
depends_on:1:2
9:exp:1:hex:"96ce3a095a91effdd91d616f1f02ddcd":hex:"579d6633ec6687afa24ef874899b58e0":hex:"3ff3c0038148ed391b6a10aad623a82fe9209c5ba74482f11506d597b5fc7af977235d8ee9e28cf2160346ddd0e33a5bd1fb67b87dad7167fdd4b2b4000d8460ef7b3e1b59b9d61d06cfbe7945379ed6b650de86f396a38cc70d47b8a349f067d00144c903c276b323be6a929a7d7dd8ae7d254d640cdc1176f98e01a1d8c82f":hex:"":hex:"55a0f61032e048f3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,32) #0 [#2]
depends_on:1:2
9:exp:1:hex:"24ece168c2971cf2b404ea206dc9e29d":hex:"e9db62a42491664a6c46cbb0b2bafc92":hex:"3579f6c0cb3d2a5d0c4548855c7c052d36b6a8dfc60f4ca1b4bbe28ed87306119e71982dd84c4205ceba918d675472753df1b5192d3693dbf6a061c6056e312135ffc5ff426895a7e30f7f675d2cb21de06eea5e3761b94deef7537b985d324864c9ff6ab6e230a1006720f98c958912b604a6d03e3979887c07be3ceaafc78f":hex:"":hex:"d2b15a23":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,32) #1 [#2]
depends_on:1:2
9:exp:1:hex:"d3c3cf993f6740a019e61ce13c29955c":hex:"af900ac348082ff32d2e0ab886079516":hex:"2ddd0e8c99661f0757f04aa79a1ffa24ad48fbe5da68b9e71f7a0cf1b4f2ca9b757695900b7549d48847ae49950dc9b270b1569d29dcbef412216737bd83509c17ae41c34ccda318939cb37a0a380762993a7568c0b07794e78746173dd5c0d921cd50de4b548c1589e142c3dadbad42161aaeda2310f3c6d5c722d9ac69e96d":hex:"":hex:"f2d3a6ff":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,32) #2 [#2]
depends_on:1:2
9:exp:1:hex:"5f1e5bd45ee8bb207ebbd730510ff218":hex:"8846424a194f5de858556e6be5b65d7f":hex:"e968947fc0e49136e730b97f6b16e393d5e4fdf3e4803a23af79211ef59f29167c60ead72fd489da32d2ffa43b2bca2074f9d1b4f5396ca65004b0806cb7c6dfa751fb6afbee3e443f3c9b0e3df6722e0d1320441400c5ca508afb657c2b7f1669b0de21761dccab9a40fc513768bd1f552692626ce35078a2e0e12f5d930647":hex:"":hex:"0d6c15da":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,128) #0 [#2]
depends_on:1:2
9:exp:1:hex:"3997050377cfbb802cc438d973661688":hex:"c95c84c263bdfd5f1de66e7e616cf3fb":hex:"":hex:"b02f0dd373e42c65e8e1db2dd76a432e0b2bf6e630c8aaf0d48af51b3709b175de9a19b3245ae75818274c771c06fae225c4f8b002236712336e805ab006449eb29cc5e29abd82b06c32d4c36ee99acb9a6d7d9eae6ec6ec263c002a22c4a898c74f6abd6d92112367ca7ffe82787c5b39e7012ba22825d3612af3d41e8008a8":hex:"b35b3cf6ed59ccb69dbc9b47a3f284ae":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,128) #1 [#2]
depends_on:1:2
9:exp:1:hex:"c58583f6479d9bc9f1bffddefee66e59":hex:"cee448b48d3506ff3ecc227a87987846":hex:"":hex:"564a9f700cbc1f895e4f4fa6426f73b4956896a15e6127e7560d74e3fd0b980d2ee45b7a6a3884fa613d91d13921e3f90967d7132bdafcd146dd8ff7147ed1964c2bdb3e12f4133d3dbbc3bf030ff37b1d2147c493ce885068d9ba5bebae24903aaac004aa0ab73fe789e4150e75ddc2bde2700db02e6398d53e88ac652964ac":hex:"361fc2896d7ee986ecef7cbe665bc60c":char*:"":hex:"9cce7db3fc087d8cb384f6b1a81f03b3fafa2e3281e9f0fcf08a8283929f32439bb0d302516f0ab65b79181fc223a42345bad6e46ff8bcb55add90207f74481227f71a6230a3e13739ef2d015f5003638234b01e58537b7cfab5a8edac19721f41d46948987d1bb1b1d9485a672647bb3b5cb246a1d753a0d107bff036ac7d95":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,128) #2 [#2]
depends_on:1:2
9:exp:1:hex:"0bc2bde877e881aea512068105694968":hex:"05f0c34ab2e8e8026b0a23719344b71f":hex:"":hex:"1a6369a45e8ef2846c42d54f92d0d140a94f9633432782dcbf094f1444a1d006acd07ef6076cd0faee226f9ff14adc1fb23e3c63ed818c9a743efbe16624981663e5a64f03f411dcd326e0c259bcadca3b3dd7660ed985c1b77f13a3b232a5934f8b54e46f8368c6e6eb75f933196fa973e7413e4b1442b9dee5e265b44255ed":hex:"46bab9fc2dbe87b8f6ca0ed4d73e5368":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,120) #0 [#2]
depends_on:1:2
9:exp:1:hex:"e14f45ba5d1eb52e0412240da5d7b5f9":hex:"d7f8ef12f66f8b7c60aea02ef6ff688f":hex:"":hex:"9a85fda19ce923f093a0c25b0c52f5d9534828af7c7687d22307004ae2d10c4592242c0f2704070307ab55b137780d1e2013a19396ab43ff6a295b63fdcf323456d149758f9a2bb37f1418d62ea6368b24d5067b9c63d2968e06d6586c7e3275faffa005f7c7bfef51303e4c2b2ed4564acd17d50efac9f5e3e7f16ce589c39b":hex:"beede05e4928c808bc660f3de95634":char*:"":hex:"4ad5b9ace0c0c7c07df2900faf37a902899471e7aa4a0a1ad5387f8f56d73f78f619be79a4e253f95b15d52895a05bae9ecffa916d35efacd8baf1c704d2aa4a38c234efc4dcfb191ec0fa0b522328fa5b5dff55e8c443fee660ebe3d8ad85de157a889aefc823720030a4cd6ba94a6309dd61806f0abb27772432018bc61701":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,120) #1 [#2]
depends_on:1:2
9:exp:1:hex:"9a64579f3601b0022d357b601cd876ab":hex:"515efc6d036f95db7df56b1bbec0aff2":hex:"":hex:"88be1f4bc8c81b8a9d7abc073cb2751e209ab6b912c15dc094002f95a57a660b9f08b1b34f5947223205b579e704d70a9ecb54520ce3491e52965be643f729516f5cb018beeedc68a7d66c0d40a3f392ec7729c566ce1e9f964c4c0bd61b291ccb96e3d1fac18a401a302f3775697c71edb8ff5a8275a815eba9dd3b912e3759":hex:"13ea92ba35fced366d1e47c97ca5c9":char*:"":hex:"7fc8565760c168d640f24896c69758355b17310dbc359f38b73fc7b57fe3f4b6ecad3f298be931c96a639df3c5744f7e932b32d222f5534efb8eb5d5b98d218dce3efef5c8c7ce65738bf63412d0a8ed209071218a6fa2f7be79b38d0b2f5b571ec73f1a91721bd409b1722b313683e97d53df19ded95fd471124fa5f294a4bb":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,120) #2 [#2]
depends_on:1:2
9:exp:1:hex:"1bda4acfd10ab635f357935bb0ab7020":hex:"48b77c587616ffaa449533a91230b449":hex:"":hex:"c9ac8d4ef7d83848fdc03664957c28b9b76710797d5db1c21e713e85eb0898892223e52be1644fc7362c95026ebb9c9ca74d7d3739eff10cab1eda00c36628dae0b98d119a14635800e37cd340faa6fbba9c3d41d52722cc3969612b1a8c5ca9a68773f5ee654506cb88ea65fb1eddf5ab6312d0170dc03324e483342448b854":hex:"8325e4394c91719691145e68e56439":char*:"":hex:"1287ad3719508a9be70c19e3b134a2eaa4415d736c55922e9abcfd7f621ea07ffb9b78d8a9668c74bbd548b5e6519ea12609d2d6197c8bd3da9c13c46628f218e7ff81884ff7eb34664ab00f86e09cd623bec248d8898ef054fce8f718a0e0978e8b5d037709c524114ec37809ac3fd1604e223e08f594e7aa12097f7dc1850b":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,112) #0 [#2]
depends_on:1:2
9:exp:1:hex:"d21cf24bc5bd176b4b0fd4c8477bb70d":hex:"208cb9dced20b18edddb91596e902124":hex:"":hex:"2e7108fd25c88b799263791940594ec80b26ccd53455c837b2e6cf4e27fcf9707af3f0fe311355e1b03ac3b5ee0af09fb6fb9f0311f8545d40a658119e6a87ba8ba72cc5fdb1386bc455c8fec51a7c0fec957bed4d6441180741197962d51b17c393b57553e53602f2a343a0871ea2dc4b1506663b2768ce271b89c4ed99eec6":hex:"7edfb9daf8ca2babcc02537463e9":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,112) #1 [#2]
depends_on:1:2
9:exp:1:hex:"3d02e2b02170986944487cba8448f998":hex:"6336077bb83eff1c9ea715de99b372cd":hex:"":hex:"bc1d7553f4a28754cf59ed6f7a901901f04ce62a449db2b45ad60329d0341bb9ba421c783c28a9200b41da8ab6328d826293134a7d0c9a5775dd2735e7767efda4ad183566e0847d6d978abd1a8ab13b16b8323acef05ced3b571631e1e24ad44d65e6ffa64e03c9970e94bacb9f721aba06cda6a08806a3be63dddd8029301d":hex:"0466bb2957281f64b59eafed3509":char*:"":hex:"5f395958f2f7acafb1bca6d3a6ec48b717f2ceeac1b77e1b0edc09a09e4a299d2ec722cc7daf34c8f4121a93c80b2adb20a2fc95afd09320f91085c93c8b082dd703814c9777501d23bf9b328f07f04652592dc5a3f4321626a695b8db8e65c8617c809eb2978d8c9a882ffa82a4bb707c1a8f9a965bdacce5c041bafc94a1c6":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,112) #2 [#2]
depends_on:1:2
9:exp:1:hex:"cd1ad1de0521d41645d13c97a18f4a20":hex:"413873a0b063ad039da5513896233286":hex:"":hex:"588c2617517329f3e1e7ba6206a183dc9232e6a4fa8c8b89532d46235af1e542acaa7eae4d034f139b00449076ba2ef9a692cae422998878dabdac60993dce9880d280bec1419803ba937366e5285c4a7f31a5f232f8d3ef73efe7267b3ef82a02f97d320ebc9db6219fbdf1c7f611e8e5164e9ecf25b32f9c07dfa12aa705af":hex:"d4dbe9cae116553b0cbe1984d176":char*:"":hex:"bd519b7e6921e6026784cd7b836c89bc1fa98e4013b41d2bf091ef0d602e44a70df89816c068d37f0c6377af46c8bfa73ec0d5bc0b61966f23e55a15a83cea49f37cc02213b4996f9353ee2b73a798b626e524b9c15937ecf98a4eded83fb62e6deea1de31e0a7f1d210f6d964bc3e69b269da834720fd33487874489b8932a8":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,104) #0 [#2]
depends_on:1:2
9:exp:1:hex:"1cb120e9cd718b5119b4a58af0644eff":hex:"5a7087989bfe2f6eddcb56fde4d72529":hex:"":hex:"4c8e8fb8c87ff6b994ae71bfbf0fa4529f03bad86edf9d27cf899ea93a32972640697e00546136c1dbc7e63662200951b6479c58ae26b1bd8c3b4f507c0d945d615183196868ec4f4865d1d00bb919a00184e9663f6cb9a7a0ddfc73ee2901f7a56ef2074d554f48cef254be558fca35651be405f91c39e0367762b4715d05fa":hex:"95d8bd12af8a5ab677309df0fb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,104) #1 [#2]
depends_on:1:2
9:exp:1:hex:"315b206778c28ed0bfdd6e66088a5c39":hex:"7ec6f47ec56dda5b52bbdaa6ad2eb6da":hex:"":hex:"6186f57a85b65f54efbf9974a193012b1396fc0ca887227e1865f1c915ac2af9bbd55969f7de57ce9fb87604cf11c7bc822b542f745be8a101877a810ed72bf4544d0acb91f0f9d3c30b6a18c48b82557433d0db930e03bcecc6fb53530bfd99ee89f9e154aa1a3e2a2c2a7a9e08c9aed1deab7fae8ea5a31158b50bca2f5e79":hex:"930750c53effc7b84aa10b2276":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,104) #2 [#2]
depends_on:1:2
9:exp:1:hex:"e886de1c907c97e7db8ec80a79df90f8":hex:"612cacbf33266353d0a29a24532f3c0c":hex:"":hex:"c64cc9596d7c738746ab800f688eec190a4c802c55b2528931d74d294496892b81f53d3073d48f9bef1d58ce3be26547474cdda2868abeab71aff566fff613b4e5bfed1be1d2fff35d8ffa33302d3da1c82e421aa3a23848f31e26d90c0cb2ac2ae136ada73404ed3e0e1d3e7cb355a11cd2a4f9393b4d5eac988104fe1cf959":hex:"76634e58d8f3a48f15875ac1d6":char*:"":hex:"7001d7395efb432e2804cc65c0ba5d4719ce84177ce46292c4fd62a5596bd2bab1d5c44217ac43235bd94489c43d01618a11f047d2e247062c3b88d6e59adaa1f46514fb33b7843483920bee60a41f3cb312322c305d25251b4704fb66da58637c95a9d539731434f60ef44fe3cd6d37e2c8e7089880a563938dcc98b43f08fd":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,96) #0 [#2]
depends_on:1:2
9:exp:1:hex:"3b936e09a6477f3bd52030a29df5001d":hex:"f93105be83fa5e315d73acfdcf578de7":hex:"":hex:"65cf11d1afad19b34f282f98f140315992392f5d4eed4265085b29e1e5553f4783fec681ba2d368486ba6a54c00e71c82c08ca3d097904f021ce4b0acba2d2a7005e28e5f8750ea3d18a4f78363c37583e85104234498942c639a0564b0d80055c21cb7735dd44348298291ab602f345b1d74d624750c0177fbd5cca6f99223b":hex:"91b55bb5e3f3f1abcf335db5":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,96) #1 [#2]
depends_on:1:2
9:exp:1:hex:"dc9e2095de7b1b48481b56bf6a3604cd":hex:"9e5268db19a1b51c0496a160ca76f8f7":hex:"":hex:"ed61ff94a3f84c72147faefa615e2df00324fb01790cf9764c72c1b8ba47f17866a1fd64ee5c2f53865d1bc24ec93165a6774466a59603199ee476c1f2da7d932c8943d126aa172d532d8475a484d42bb45fcf92766feafd7f3e2e3d42d22f6f84a90e7e688232f799d80cd2cc152ddd21ecfb137701ecafcb2b65abe2e4e6f4":hex:"0fa9588536fca71bb44260f7":char*:"":hex:"ef562e301fcf923ff1a1acd3aff9b1c963058228655fe8a66cab01396547dbd2aa1f79a22eefc62944b86d1a31ebe2d17130175b8c003d6755b0eb8b79895b0f7f8046c5ae888a067ba17bc8e11a8f6e5023a9cd42f6461966c28e505b371c0f72a2606bff430a58016e99713d25ce11f10391fb4a922e27989422c6a64f9107":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,96) #2 [#2]
depends_on:1:2
9:exp:1:hex:"3f93901fd7cc88db3ba76a158d658c7b":hex:"7e98de461e6d96c0ce6c8d8b3854cf49":hex:"":hex:"16402fded879fcbfe9405902aa63ca2a520889e0045f687455469b7bb867829a01208b8dc5dcc852d8ee478993c30e6d9ec6408773b367821310a0ae171d38d71e06981ff6e845acffbc794142b87c748e12484c0636419d79be3d798cde59e9dae0a4a4a4346596427e6b235ad52e6a1b02d6f4df0c7de35fc390cae36aef14":hex:"86c9a70e4bab304ae46e6542":char*:"":hex:"1b4c09569b42c469b3ab6b39312c214502ec09f5fe2fed1d1933d13cdc6a7b77a5d135123fa69d9207d6844b0357b26b7a2f53b33a5cd218dacda87b78b09cf259e48e74076812c432e2d0833fb269721f9347c96e158500f9b2283342a35c8de0a022edce711118d72d8fbaa354bfb0ffee465844ef2d37e24ec2cea8556648":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,64) #0 [#2]
depends_on:1:2
9:exp:1:hex:"42289f3d3cd5838e250ef54b128e60d1":hex:"e557389a216ad724aafdab0180e1892e":hex:"":hex:"3edae1d554b67d2036f5fdbdb2945cc112f100adc1b47009c2e23f6a2eaee78d1f39ce8a98f715853cc29fc793fb6981ec3036834188dea7d668185ccc8642071b15de1332f6a59c8a9b4399733eb4b3d8f224af57ba6b4a8e64494bb6630b9d28e7ec3349064350febcef6a3ad1d6cca1b1da74f3d2921c2b28a2dd399c3416":hex:"6f78bc809f31393e":char*:"":hex:"25c476659cc7b343a69088baf868a811ba37daca85c4093105bf98235a90aeca015ab034da008af0982f9b2e80df804c186a9b2e97f74cffd70ebb7771d874fcaf12f6d01c44a8b0ec2898cf4493cf09a16a88a65cd77909bbf0430c9603869bd5f20d56cb51d8a3f0a032fc30d925c96599d296b1ec41c2912bda426adea4fb":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,64) #1 [#2]
depends_on:1:2
9:exp:1:hex:"3d772eabb7f19475665ca2a7e693bcfc":hex:"0747cbb486a013453fde1ca6abb11dbe":hex:"":hex:"e9fc4d86f5b857fa6057b73f967351e06f87288c40a95b9e378c84f1a4c0f4b80ed0a0b44ff90a8973be4199c0c4006fc4f5ea19d5f1fe8b9c8c01f4675ab85afab0592bb3daba36bb4fc7ed9eea867e9d8cc50c19fb62a5a57956e9efacebac5e9f849649d35a329bd68de97bb6e5ff7bef477a86765c2c9ec15e24cbba5c6e":hex:"8e761ffaea68f967":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,64) #2 [#2]
depends_on:1:2
9:exp:1:hex:"fb7fd753ee6eaaf283a42a121dab4e43":hex:"8164929fb54485377ecccc9b9621af5e":hex:"":hex:"fd5cecb2c0287cb8229e97d9cc4b9885f428710528884ce663ed1728cd44cb2df93e56ef17ace0678d1e341366c652f4ba7ee45797d39be4a05c1151e5cde499e13e5d45549b5d95a174d03616d06ef96e9d7b2b6bb0d79a726b253dd64223a5f09611671b234ccf9b383952f8888814b2c167e774cfbf54e9c6b99a753f4fa9":hex:"40a2fa7f4370afb2":char*:"":hex:"6208d068be60f7b04b80fc611062e6caaef9a5cf59f850d174b7446c78c039ea9aefe4885e19c2b33911d32ce1fe3c48ddffa4b03e450fd35da03f40c4e7c5bb3b1c3f3049dbfad3ac81ca1b79cafbaa172f4900e3829d38edea3b64000f93924a801259bc4b2523445c64bc23bfee190b952468507fa4baf6dc2bec66fcf0d8":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,32) #0 [#2]
depends_on:1:2
9:exp:1:hex:"30d757fd73a0fd5fa49159ad0653296d":hex:"b35b8df0aebd0608517f2830e0e70cd0":hex:"":hex:"17d485b258f80d8924e35291118cfdcffd86c47851b65f0b06a7c1f5202de82f3f460fc61b1aa38fdba7c8ded375c92cf005afe63e59d362c0960044af39241b81ca24e85c5faa43903229355b7313fee21b992ef3931d9d2407b32b3cf72dd7acbc7948395eb513cb2fd428b215ba2bd1e29c62f45d0ce231884f62480c6d8f":hex:"954c0e99":char*:"":hex:"022618d2598f79104e918a09c937a82b3db59243b5e13de731fcb912e4366105797ce47f6dce7f08073f2f41e5c15fd6b1ec4b5861469a4880c3b0bd769b78c696ff29c28c9349d5a46a6e5ad9211bd4b708a8c0b6928ebbb0dac1c0a5f5ce6b05de6a50073128566a23f09cc1b826aa5803f9f750aa4debf59f24ae9f98c9b5":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,32) #1 [#2]
depends_on:1:2
9:exp:1:hex:"d9d3cfd5900de5d5e2109e7721cfeef6":hex:"b4b9dfb013de6f7c44779e5a9daaf5e5":hex:"":hex:"e4243cc37cc32dfcedf9bb76890e706af6ab1e06b290b8ccfe2a55e5dabe68cb390f7636dc9676b431d4dc8ad3f6d989e510194294ab7ab0556789046743cf374d8b6462f5f95a17f3f44337d6c69ee47b0e1ad7e5ce6f9b224c54099a104e70d2d06af869b921ea47febe08f90c591ed49c1f12003afceabd2c7bba458a0111":hex:"2b81e8ce":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,32) #2 [#2]
depends_on:1:2
9:exp:1:hex:"68dc138f19354d73eaa1cf0e79231d74":hex:"e7147749560f491420a2d893c075bb76":hex:"":hex:"ce345567a76bc30d8b4fd2239788221cfa75e1a310aeeeb8c355f8eea57d80967f3047fbd4e6173fac5caeb22151fa607065953c4c35e0537b9e3788cc80de9eedf2a340698bde99a6a1bdc81265319da3e52f7a53883b7f21749237fcfd3cd4f149bb2be7a4ddd9ef0544cfe0789040d1dc951b6447304942f03ab0beae8866":hex:"70a83f6f":char*:"":hex:"64b021612c78b3e192e8349d48b77d02927e7fd70c7160d37cb8ef472f6bcd9df9d93431627c1c80875e208724ae05f94fdd2e005e9707b78a1bf3bbca7beec4b03ddd4d9de6235ffd6d84a8b9a1842e104c1e22df4566f6c4d3d4e3d96a56b9b8a5cdce9da70aa236109b289266036f285564060b204dfd7ac915eea0dd0b1e":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,128) #0 [#2]
depends_on:1:2
9:exp:1:hex:"7362c86344e0aefb0cf0d04768f9c05d":hex:"7e8d12c2f0dcf4f792247134234ac94b":hex:"86d2b5debc3b10495da353d6821f6cad380776d805bd8660b08dcdb1acd87026e4f344b547a4db47b5f44cded314bec4ce9a417ce40a2acd5a21460c42dfcd27483abf3f38dd8cc5fa523b6768a26513df5896435baa97781cff1966e2e3d6ec6d0a9cdc013de5a50e4d46831667055bad04f784024a82f9cd087ae4cd37dd64":hex:"8baffc7836004deb87c0111d47c182512bf861874021ddfcd559acf2c4a51cf5bc4bfdee2d039b9c005b6af95a2607643dcf4d9cd9d62412f709334556db22fc91d7b40438505d6806ccb2f2c21ae731bc1f1c825d28a71ab27095a39985e96ccd07cfb2e75243ccafd474494a2338c324ef533ca5f17d2ac1b1883140342ced":hex:"9594da428fd8c1b13ecb23afa2c1af2e":char*:"":hex:"e2c424f42aedd56f0e17a39d43ad19c8e2731efc7a25f077aef51d55280b10e667e338bd981b82a975ef62bf53bc52496b6995d33c90c7ae14767c126826e3f32bd23f444ddcfd7a0dd323b0ae2c22defad04ce63892b45c176bd0b86f5fa057a3dc371359744cb80bbfb4a195755136a0ea90b4044a45bc1b069f3cb3695c04":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,128) #1 [#2]
depends_on:1:2
9:exp:1:hex:"58748bb204ccb7bdafdbf739b6c19a3e":hex:"93ac298c73c88e127a4d9dd81bf24e3d":hex:"8f168fc4d1da13bdbefae3f9d6ac1d8cb19fcec1f43f727951af0a466d8826649a46c3cb50c045ea83849fce0eedbc042a1a435e6d9d59017997a2d5459b940078b8a7f3b6b0ff279ff8c560248296a17240ff1b0643d1f436b6e3f2079363fc49fb45f410debbdde083b92057916368cb807d603cb82e2c0dc01658bff7f1ab":hex:"b72902c9ebb72a86be539b19a52fd9af00aa4de081d90c0d8ad580ebb5900177a036f40a1e9b43e3a07d715466526d6d7544e5a5551805b62463f956cd519fc99182c2d54bd62fc7ffc6e5ebf1503859b706da11a1b6c707a67a70789dbfc10ef726bd360f9f2347326e068e757c8443ddc9308a171e682359ae1bfe87194ab5":hex:"efba4589d4a03555766bbc3b421dd60f":char*:"":hex:"d5c97a659f016904ff76286f810e8e92da6f8db2c63d8a42e617760780637e32105503440cdf04d1fe67813312f1479fda8d746c8b0b080591eba83850382f600e9d8680516c6579669f0b3d0a30323510f9de1c92512790b8347751994d022156cae64da0808a649d163a0e99e869fdf224b7c1a6a8fbc613d5917eca8ee08c":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,128) #2 [#2]
depends_on:1:2
9:exp:1:hex:"6cc13cbd62428bb8658dd3954fe9181f":hex:"86740da7ce4efbed70af55e1d6c10fdf":hex:"be561ac15e3cfda624b422af97c26719c140bb50e4a993d636efe9c7f1963fb9047a0762169b571a698ff310bc417e34d4039b7562a95af710ccc1b197964a376c986fd2ed8ac4b0c7b4e843c37a41366f2f483c821a1823f317416c7e4f32eed9b9dc2ae1a2f3ed32c4b3187358a2329aa42191b7c2fe87b6e27ff20303cb29":hex:"2c9ec982d1cfb644ddbc53c0759b10493206d5186affc6882fbb2ba3aa430f9bae1209db2d78dcc125f3c909a54dd84fdff96c71e678216a58390ef4308bdd90f94f7109c4edefa76a74fda64b201b7a435bbabc27298f3eaa4c2d1393bd584f811fff52638f6ad2f6d86a8c3c9c030d9d4264c8c079592a36178d25991cff09":hex:"76b990a1e010e5f088f6ae90bec40b32":char*:"":hex:"0b9a5f5d2e6852b75b9cf26c1b310b2200e56dafcf3c941478862cdf9737ac8e2cb9b38d41bd4a1872ea1b4cfd51a1a0b9b743aca439eefa10de8459a0a7a221c5429b3dee393f17031ca6c399df8e05657c3db55be9c9dd29e690042a4ed8db732efce7c58d6b20a2a0f7c79e42e5ada43b87ab00f481c20cac1b35514dcdc9":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,120) #0 [#2]
depends_on:1:2
9:exp:1:hex:"286d3f5080cfe88538571188fbeb2dd5":hex:"da6140bd4dc6456ddab19069e86efb35":hex:"5d350a04562a605e9082ebd8faec6c27e561425849e7f0f05f5049859c2c1bd2c4682ebf9773fab6177d2601fd5a086cefc3adef5a2f8f6b5dc9e649e98dd0a3d1a2524419f01305bd0fcfff52d84a20d1b14dea2138dcc54eea2bf263c6fe27c3e7255f1f359d0d00fb1b350d7a04965af30027632520197e85eb41de6bb286":hex:"55135928997711360622eda1820c815aa22115204b1e9bb567e231ac6ea2594b4d652627b6816bdc6c40a4411fd6b12fab9a1f169d81c476dbf77151bff13f98ca0d1dc0a68ea681652be089fadbc66c604284eebfc8ce4cf10f4ca6bda0e0f6634023db6e3f0f1de626c3249a28a642ecc9ec5ff401e941fa8a3c691566c0ae":hex:"d90d34094d740214dd3de685010ce3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,120) #1 [#2]
depends_on:1:2
9:exp:1:hex:"726ae113a096769b657f973ea6d2d5dd":hex:"2f9900226c97585d200dd20a279c154a":hex:"761663c3fcbf1db12bc25546b2425b8229b3153e75f79fa63958819caee3febff74603d99264b5a82ef5980439bef89301ae3206a1d01a3bbd7a6c99d27d1e934cc725daeb483f826c2c9d788fd1f67a627864cf8b5f94df777bb59ef90cb6781a2000e6f0baa4f1ea4754b47bb7cbd2699f83634e4d8ab16b325b2c49f13499":hex:"90636012ba8c51d16f8f6df3d3bcabc3f09aeffbe2a762f62e677913188045b861b2e7d9a7bd93dcee46e9e4832e497a6f79db52b4e45c8dab20fa568ff9c4ace55be3216f514a3284768a25d86b1c7da5377622f3e90ed4c7bd4571715af4d0a2ab5181d0475f699202e4406bb9cfdbd4fa7f22d0dd744d36b3223134658496":hex:"d095bfb8990d4fd64752ee24f3de1e":char*:"":hex:"9f7759c6d24fd9aa0df02a7c0cc5f17e61622c63195f85dfafa5d820d3ad218c7288ec017821100f1fade10f9bb447a4a01e3698b045548c7619a08f2304e2818a9bf55e70b40f8b994b7dcf0cb243848cf3f6fdfec3ebbb147d01df84a3ec62cd8fa5d78ad9f2f28cd288a35eb49a5172339e9872e8e7e3350b0d69f59acd07":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,120) #2 [#2]
depends_on:1:2
9:exp:1:hex:"73a9eeda721c6f292e6b399e2647f8a6":hex:"c1e80eb723960049cc4448b66433f1cf":hex:"fb2a0b1f817404e74aee0a6ec8f2cd86f0c9114ed367b2690c44ad80f9d3377d7fd5066beaf1daa739d27ed3fba98379188016b1fe901204a174f9ffca370c181aece5e5d40939a0d460913b40b895e78a3b80ddf3d613c05e4e27bfd161ea2ef42271a2679f2cdca5b728ffb2319781c946a4f3ecacf486b754b30bb04ea60b":hex:"215fc7e52abe4c751ca2f7f9a5cbde9ab8b44b8d4054bb62dcea6df5b936145ca6ec83a2b78b070638fd6e5ea3bad5d0caf1b8f755f391c3e0962a92337e3eba575585eb83680075fc818860388c587746af78d5fc75ccd0a63f1612abb1ba0f04a2228ca27fbddba4878f9b2683683f516b6d6fe4f6622e603bd3c5ad45e332":hex:"e08161262234d0d5be22f09e5646bf":char*:"":hex:"b5e286183f16dd9403bec6786bd4836cc6add47947ef111fb1d5503c18c333c8fe60959502f58390d0e0f69fbe5fee13c72aed65fe6e32f6ea45877fe44f8a556aa5157b112e572197c1c350b7943c6cf2e9146018599524d27599f09c86027f2c5927e4a20c63833870e8369baa36ecc07cdb3ced520b5ae46869ff357ca089":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,112) #0 [#2]
depends_on:1:2
9:exp:1:hex:"90dbda7397d8fc46215a1218a6ffd0d8":hex:"7be477d14df5dc15877ae537b62e1a56":hex:"7358ddf1310a58871a2f76705f1cf64223c015c4d1574104d2e38783bb866205042f05c86e76c47a2516ce284911f1d2cbee079982dd77167e328b8324eec47c9244cc5668cf908c679bb586d4dd32c6c99ed99a6b571cf18b00689463e7a88cea6ea32d288301a10a9139ed6092ffe298e25b8cfb6b4be8217f16076dcd0a90":hex:"4f82a1eca6c9184240f50f7e0cfec07ec772cad5276d93043c462d8364addd9a652eed385ccc6b0faa6ca679ab3a4c3d0be6a759425fd38316ee6a1b1b0c52c1bb3b57a9bd7c8a3be95c82f37800c2e3b42dde031851937398811f8f8dc2a15bfd2d6be99a572d56f536e62bc5b041d3944da666081cd755ec347f464214bf33":hex:"776d871944159c51b2f5ec1980a6":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,112) #1 [#2]
depends_on:1:2
9:exp:1:hex:"0c85174d428fc1c7c89ca5d1b8aaba25":hex:"b3c9dfa4c55388a128fbf62aa5927361":hex:"3f552d45b61cf05ae2aa92668e89f3338a15ec7c5b7113b6571cfcd9e4c4a962043ccd9323f828dd645e8a91b007ce2112b7f978ad22ee9821698a4f2559d987ae4421452ad2e8d180953297156426d4540aff2104d8637b56b034a3a1823cf962bffbc465fe6148097975a8821ca7487e6e6c7ff4ee4de899fe67345676bb1c":hex:"3735cbfb8000260021d1938d2a18e7737f378ecddb11a46ce387bf04e20bbfcc902457637fd152ab87017185601f32a7f906057123b6c2da31a1069c93e3cacc59a359aebd3e31b302e1a1f7d5d8f1b2917a8fe79181fa633b925ce03a1198dac48f4c959076b55bc6b3d50188af2c6aa33d83698aa8db22649f39825ba54775":hex:"1e7dec83830183d56f443a16471d":char*:"":hex:"3d98cabca4afb7c1f6b8eeed521f4666ae252ac12d17ebf4a710b9a22d839b69458387ba4bbec2f6400e0cff80fbe4682c24efcd3b8c594d9b515ca7842c9d5988c42b59b6526c29a99256451e2927f5b956ef262f97c733dfa8bff73644473b9a8562bdfca748f4733ddce94a60024dfbfcde62fb3cbd7c3d955012d5338b91":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,112) #2 [#2]
depends_on:1:2
9:exp:1:hex:"d89f06eb07744d43d44734faf9751d07":hex:"185f8d033713ee629e93561cf8d5acb8":hex:"743bcb671d0aa1c547b5448d64d7c6b290777625ba28f25ca0fbf1fc66495a2fde0648a8db51039b0e7340d993aef8afb48269e660cb599837d1e46f72727762d887ee84c073d6136d1b0bc7d4c78f5673a4a6b73375937e8d54a47304845f38ca6b4f51cf14136a0826016535dc5ed003e38c3ac362b9d58ba8b555a05a1412":hex:"36cc3b2f563305208a03378f7dc036119f7de3fee77cefac06515853d36609a622382ed026c59783fbc0d9910767874c516e10c7bf3e3d104f73b3463c8d93a63418c76cb0d05e62e9c8642cb4f32caced2620912cb6c79e5110a27d5fba1ef3b4d0578077858526c5e4254365f2b2ab47a45df4af08980b3b7a9b66dff5b38c":hex:"fcad48076eb03ebe85c6d64f6357":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,104) #0 [#2]
depends_on:1:2
9:exp:1:hex:"6150f14dc53f391e815acfabed9f9e20":hex:"7e92dd558bd2662c3a539dfe21a352cf":hex:"9b4624e9118e6aa5dc65b69856638f77fd3f9f562046f50ba92a64e988258637932af7979f000505b84a71ff5dd7b60bad62586b1a8837a61c15a1a1ba7f06668272c28169915d7f06297b6c2a96c8c44203a422bfd25500c82e11274ffe07706365bfd3da34af4c4dd8ad7b620de7284a5af729bea9c4ed2631bdcba2ebdb7d":hex:"fd8f337017e1b60d6618e6e4ad37c1f230cdeb78891579c2c63d4e6a4f7d2cb7252e99de333c73db45958808c08e91359c885a7385ab6f9ed98a27927a5b83c3a456ce2e01869712675e527155ba1e339ac14a3ccd7a4b87360902f2b8381308fe5a4eac5c90d0b84da4bf5b907de6ff3139cffd23b49a78750006100183032a":hex:"922a7b48ad5bf61e6d70751cfe":char*:"":hex:"f272a3ee9b981f97785cc6fad350e516d72d402dae0d8a531c064ec64598b2a5760f9b279c10aa1ff71bec07300ab0373187138e7a103fc4130105afa6b6346f3d368b40d6f542375de97878ad4d976d64c5c4968a17be2b1757a17c03100231c34721250cd37cc596678764083ade89ae3b1a2151ff9151edcd7ba0eb8a4649":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,104) #1 [#2]
depends_on:1:2
9:exp:1:hex:"3e8216072ed6fcde0fe0f636b27ed718":hex:"23a122cf363c3117b8c663388c760ee4":hex:"28ce0b4a44fa83323e060f3ff6436b8829d4f842090296bdc952b6d4a6b1b1a66be06168c63c4643e6ac186f7ffd8d144f603b2d4bc0d65be48121676f9fa1f359029c512bebfd75075ff357bc55f20fc76d9f2477c9930f16408f9f09c5ae86efa2529d2f1449ceeb635b83ca13662860ef9ac04a3d8ab4605eccd2d9ae5a71":hex:"3b50f2a8dca9f70178503d861d9e37f5edfafc80ee023bfed390a477372986e4794175ec22ac038c3461aba50c9b2379cab48512946efdfe2cb9c12a858b373a5309324f410e6a05e88ba892759dbee6e486dc9665f66cb5950ea7e71317fa94abbebd67a3948746a998173fbbb4f14f9effbdf66d3b6e346053496a4b1934ce":hex:"531a65cc5dfeca671cc64078d1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,104) #2 [#2]
depends_on:1:2
9:exp:1:hex:"1af434b73a1210b08595ffa686079832":hex:"ae318f3cb881d1680f6afbf6713a9a2f":hex:"3763c9241be0d9d9a9e46e64b12e107d16cca267ff87844c2325af910cc9a485c7015d95bbe62398864d079fb2b577ba0cfad923c24fa30691ad7d767d651eed4a33d0be8f06fed43f58b2e0bb04959f10b9e8e73bd80d3a6a8c8ce637bfbdb9d02c2b0a3dd8317c4997822031a35d34b3b61819b425c10c64e839b29874ddfb":hex:"13f6c1c2d4edcf1438a7b4e85bcd1c84a989831a64d205e7854fce8817ddfceab67d10506ccf6ed9ce50080ef809e28e46cba7b0c96be6a811f59cd09cb3b7b3fe5073ee6763f40aee61e3e65356093f97deef5a8721d995e71db27a51f60a50e34ac3348852c445188cfc64337455f317f87535d465c6f96006f4079396eba3":hex:"2ae7350dd3d1909a73f8d64255":char*:"":hex:"3cd2a770300ce4c85740666640936a0fe48888788702fc37e7a8296adb40b862ec799f257a16821adaa7315bd31e8dec60e4a8faeb8ba2ee606340f0219a6440e9c1d3168425e58fac02e8a88865f30649913d988353ab81f42a5ad43f960055f0877acda20f493208c2c40754fbf4ccee040975aa358ea3fe62cbd028c1611a":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,96) #0 [#2]
depends_on:1:2
9:exp:1:hex:"04036d2f5273c6ff5b8364aa595359c9":hex:"edc433c381140dff929d9df9f62f4cb6":hex:"404acfeeea342aeea8c8b7449af9e20ddf5b85dc7770d2144a4dd05959613d04d0cfece5a21cbb1a9175ddc9443ffacd2085332eb4c337a12a7bb294c95960e7c0bde4b8ab30a91e50267bbd0b8d2a4ed381409ea2e4c84f9a2070a793ce3c90ea8a4b140651b452674f85d5b76d0055df115608bf3a3c60996108023ebabe65":hex:"acf79b6099490af938fb5fd8913255b3daa22786b03356cdf3e0ffaf570f9f866047b8e15c9953f893d97e7098265297396868ebc383be8547e8ec9d974b6a65b5dc5147cdadef2e2ad96696e84e44f364c2ba18c8aabe21f99489957b2b5484bf3fb4fecaf5ddaa1d373e910059c978918a3d01b955de2adb475914bf2c2067":hex:"71f818f1a2b789fabbda8ec1":char*:"":hex:"4729cb642304de928b9dca32bb3d7b7836dd3973bbccf3f013c8ff4b59eca56f5d34d1b8f030a7b581b2f8fdc1e22b76a4cbc10095559876736d318d6c96c5c64cbd9fbd1d8eb4df38a2d56640d67d490d03acc1cd32d3f377eb1907bbd600f21d740b578080ba9c6ddc7dc6c50cdcee41fec51499cb944713c0961fc64f5a70":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,96) #1 [#2]
depends_on:1:2
9:exp:1:hex:"59fe44c6e28d025b2ad05e6e867051ab":hex:"eb0c30320029433f66d29b3fd5c6563b":hex:"49b7418b87374b462d25309b1c06e3132a3c8f4a4fcf29fed58e0902509426be712639db21c076df7b83dcfcc2c2c8fcc88576f4622a4366eb42f84ebf760e3eb22b14f8b5ff83f06a6f04a924eaab05b912e126e80da22461abf7f1925fd72ebdf2aea335a044726e7c2ebbb2b8aeebab4f7de5e186b50f275b700794d895d8":hex:"20e66bae1215de9a87a0b878d39015d17e0d4542a1aaba2000cefbd5f892c26a410f55f0d7dc2f6b66690f2997032985e5516e068bfc6ec8a3669f566e280b0cefded519023b735ee3bcbfc5b6ce8203b727933a750f9bd515ec448c1f3a030aa0f40e607727a3239ebbe655d46b38a3d867e481ccf0fadbf0d59b665d2ed6b5":hex:"296c4cdaeb94beb2847dc53d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,96) #2 [#2]
depends_on:1:2
9:exp:1:hex:"c314264cee0e6db30ebe9b2f6d4991b2":hex:"4cd4431bb6dea8eb18ae74e4c35a6698":hex:"0eeafbfd04f9a0ea18e5bdc688c7df27183f346187e9574b61222006f2b3e12e8d9d9bf1f0f15949ee1a7ee8e5c80ee903b8ba2860e15ccb999929f280200b159c2adca481748d0632a7b40601c45055f8cb5126148e6cbab2c76f543537ab54eb276188343cea3c4ab0d7b65b8754e55cfe3f6a5c41b6ea3c08b81fcecc968a":hex:"d436ff9abfb044a332c4e009b591719a67b12a5366da0a66edf19605c34daa37588e15dd3da0d1a097215e469439de79cca74e04cd4904e5b4a6cb4e0ea54e6ba4e624ed6bd48be32d1ef68ffea1639a14e91a5914c2346ea526df95cbd4ad1b8ee842da210b35b6315c3075ecc267d51643c4b39202d0ad793cbb0045ebdc19":hex:"fda18d2f795d900f057fe872":char*:"":hex:"cb9e0fb0ac13ca730b79e34745584b362d0716c344e4de90d8352b21117471ba12c97f193150b33774baee5e4a0f11b10428eaf0106c958e16aa46c5f6f3d99eed93d1b9ba3957bed05a8b9cc8c5511cf813a66dc7d773cb735b0523d8d6b0b80639b031ddc375f714c6dd50055320cd7ed44a471c8d5645c938a9005d0b5050":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,64) #0 [#2]
depends_on:1:2
9:exp:1:hex:"26072018bd0bda524b5beb66a622c63e":hex:"c783d6d3b8392160e3b68038b43cf1f4":hex:"8ae7c809a9dc40a6732a7384e3c64abb359c1b09dcb752e5a6b584873e3890230c6fc572b9ad24d849766f849c73f060fc48f664c1af9e6707e223691b77e170966ed164e0cc25ede3fbc3541c480f75b71e7be88fe730d8b361ea2733c6f37e6a59621de6004e020894b51dfb525973d641efe8d5fd9077a0bbc9dc7933a5de":hex:"91c524b359dae3bc49117eebfa610672af1e7754054607317d4c417e7b1a68453f72d355468f825aeb7fde044b20049aed196ec6646cce1eeeccf06cb394286272b573220cdb846613ebc4683442dccc7a19ec86ef1ec971c115726584ae1f4008f94e47d1290d8b6b7a932cfe07165fd2b94e8f96d15f73bf72939c73f4bd11":hex:"edffe55c60235556":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,64) #1 [#2]
depends_on:1:2
9:exp:1:hex:"201751d3da98bd39ff4e5990a56cfea7":hex:"6172468634bf4e5dda96f67d433062d7":hex:"ae2d770f40706e1eaa36e087b0093ec11ed58afbde4695794745e7523be0a1e4e54daade393f68ba770956d1cfb267b083431851d713249ffe4b61227f1784769ce8c9127f54271526d54181513aca69dc013b2dfb4a5277f4798b1ff674bca79b3dec4a7a27fcf2905ae0ce03f727c315662cd906e57aa557d1023cce2acd84":hex:"2965af0bde3565a00e61cebbfe0b51b5b5ee98dbbfff7b1b5bf61da5ba537e6f4cf5fa07d2b20e518232c4961e6bc3ae247b797429da5d7eee2fc675b07066ac2e670261c6e9a91d920c7076101d86d5ef422b58e74bdc1e0b1d58298d3ee0f510ee3a3f63a3bbc24a55be556e465c20525dd100e33815c2a128ac89574884c1":hex:"66c247e5ad4e1d6a":char*:"":hex:"efd064d4b4ef4c37b48ddf2fa6f5facc5e9cc4c3255b23a1e3765fabb5a339fa0eda754a5381b72989fc1323ff9a6bbaecd904eb4835e5a511b922927574673061ed8de23299ea1456054e7ebb62869878c34fb95e48c8385b5ebceecb962654cf1586b3f54e7887ce31850363e9a22be9e6fbc22e694db81aa055490495dbf2":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,64) #2 [#2]
depends_on:1:2
9:exp:1:hex:"3bc0dcb5261a641a08e6cb00d23e4deb":hex:"16fa19f69fceed9e97173207158755a5":hex:"92ddd3b98f08fc8538f6106f6434a1efa0a7441cc7f6fd0841103c2e4dd181ea0c9a4811b3cb1bad1986a44d8addabc02dd6980daf7d60405b38dadc836bb1d0620ceab84e0134aca7c30f9f9490436b27acfd7052f9d7f0379b8e7116571017add46b9976f4b41431d47bae6f5f34dc42410793bc26c84bfe84fb53ae138c85":hex:"d533ad89a1a578db330c01b4e04d08238b020e36aebe87cf2b0bf0b01f1ce4197be8b0596e475a95946918152e8b334ba89f60486c31f0bd8773ca4ff1319fe92197088b131e728d64405441c4fb5466641f0b8682e6cb371f8a8936140b16677f6def8b3dd9cbf47a73f553f1dca4320ad76f387e92f910f9434543f0df0626":hex:"f5289e1204ace3b2":char*:"":hex:"be0c30deeffbe51706247928132002b24d29272eee6b9d618483868e67280236632fa1ae06f3ef793f67bd01b1b01f70a827367c1cd28f778910457c7cbd977dfefff1f84a522247e19b2fd01fa22ce67cef9503d45c80a5084741f04108f2462b7cdd06a8f1f044fea2b05e920bcc061fbc6910175d732f45102a63c76ae48c":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,32) #0 [#2]
depends_on:1:2
9:exp:1:hex:"239c15492d6deec979e79236baca4635":hex:"916b8b5417578fa83d2e9e9b8e2e7f6b":hex:"b39eb732bc296c555cc9f00cf4caaf37d012329f344a6b74a873baf0d8dde9631f5e57b45b957d6aec0f7978e573dd78b43d459b77756037cd64d10d49966eb3a2a08d0f4d5e4f5dcb8713f4e4756acdf9925c5fc6120c477f6dffc59b0b47a3d5efd32b8c9052b321bb9b5129e5c6a095d8de563601b34608456f58d7221f2d":hex:"d64886ce5f5b4adb7fe8f95904bc1461749c931655b02819ffdd0ae31bad4175125aa68962f8e36ec834a7d53a191a74c937e81ec93ad9ce0d3b286d3c11ff1733c0b7780130768c120b1833933561cf07399ca49b912370ae34f0e49b9c8cb9920eddc6816ab2ae261c6d7f70058a9b83a494026f249e58c4c613eefafe6974":hex:"fc08cbbe":char*:"":hex:"95c169721ea007c3f292e4ec7562a426d9baa7d374fd82e1e48d1eaca93d891d5ffa9acf5e3bd82e713ac627141e26a8b654920baffab948401cc3c390d6eea9d7b78c4fcb080b0aa9222e4d51bf201ccfd9328995831435e065d92ad37ee41c7c4366cc1efe15c07fc0470608866aeea96997772ecf926934c5d02efe05f250":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,32) #1 [#2]
depends_on:1:2
9:exp:1:hex:"db68a96e216b0dd9945f14b878487e03":hex:"8a1a72e7bb740ec37ea4619c3007f8ae":hex:"1b4f37190a59a4fff41d348798d1829031204fd7ac2a1be7b5ea385567e95e2ace25bf9e324488dd3ab8ce7f29d4c9a4f4b1a8a97f774871ee825e2c17700128d3c55908d3b684a1f550fdb8b38149ff759c21debdd54e49d64d3e8aac803dfd81600464ed484749bb993f89d4224b3d7d55c756b454466ff9fd609019ed5e83":hex:"5634196a32d4cbfa7a2f874a1e0f86287d2942090e0cc6a82bd5caf40136a27ddf524a17713ce4af04ca6cb640a7205cce4ac9cb2d0ab380d533e1e968089ea5740c0fcbfa51f2424008e0b89dc7b3396b224cfaed53b3ac0604879983d3e6e6d36053de4866f52976890f72b8f4b9505e4ebdd04c0497048c3ce19336133ea4":hex:"9251d3e3":char*:"":hex:"0c6bb3ee5de5cbb4b39d85d509bcacb3dda63fa50897936531339882962e8dc54c285c8944768d12096d4a3c2b42ffa92603cee2da9b435ec52908fca6d38ed74f898fe0ffa761f96038ff7dfeccc65bb841c3457b8de1e97d9bee82e2911602ee2dc555b33a227424dea86d610d37c447776295b412b412903ad2cede5170b6":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,32) #2 [#2]
depends_on:1:2
9:exp:1:hex:"659b9e729d12f68b73fdc2f7260ab114":hex:"459df18e2dfbd66d6ad04978432a6d97":hex:"ee0b0b52a729c45b899cc924f46eb1908e55aaaeeaa0c4cdaacf57948a7993a6debd7b6cd7aa426dc3b3b6f56522ba3d5700a820b1697b8170bad9ca7caf1050f13d54fb1ddeb111086cb650e1c5f4a14b6a927205a83bf49f357576fd0f884a83b068154352076a6e36a5369436d2c8351f3e6bfec65b4816e3eb3f144ed7f9":hex:"fd0732a38224c3f16f58de3a7f333da2ecdb6eec92b469544a891966dd4f8fb64a711a793f1ef6a90e49765eacaccdd8cc438c2b57c51902d27a82ee4f24925a864a9513a74e734ddbf77204a99a3c0060fcfbaccae48fe509bc95c3d6e1b1592889c489801265715e6e4355a45357ce467c1caa2f1c3071bd3a9168a7d223e3":hex:"8e5a6a79":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,128) #0 [#1]
depends_on:1:2
9:exp:5:hex:"806766a4d2b6507cc4113bc0e46eebe120eacd948c24dc7f":hex:"4f801c772395c4519ec830980c8ca5a4":hex:"":hex:"":hex:"8fa16452b132bebc6aa521e92cb3b0ea":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,128) #1 [#1]
depends_on:1:2
9:exp:5:hex:"0c2abdcd2e4ae4137509761a38e6ca436b99c21b141f28f5":hex:"335ca01a07081fea4e605eb5f23a778e":hex:"":hex:"":hex:"d7f475dfcb92a75bc8521c12bb2e8b86":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,128) #2 [#1]
depends_on:1:2
9:exp:5:hex:"eef490a0c2ecb32472e1654184340cc7433c34da981c062d":hex:"d9172c3344d37ff93d2dcb2170ea5d01":hex:"":hex:"":hex:"017fef05260a496654896d4703db3888":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,120) #0 [#1]
depends_on:1:2
9:exp:5:hex:"fe0c3490f1f0dba23cf5c64e6e1740d06f85e0afec6772f3":hex:"f47e915163fa3df7f6c15b9d69f53907":hex:"":hex:"":hex:"14e1a057a2e7ffbd2208e9c25dbba1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,120) #1 [#1]
depends_on:1:2
9:exp:5:hex:"4356b3b1f308df3573509945afe5268984f9d953f01096de":hex:"a35b397b34a14a8e24d05a37be4d1822":hex:"":hex:"":hex:"e045ecba220d22c80826b77a21b013":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,120) #2 [#1]
depends_on:1:2
9:exp:5:hex:"e2898937cc575c8bb7444413884deafe8eaf326be8849e42":hex:"169a449ccb3eb29805b15304d603b132":hex:"":hex:"":hex:"3a807251f3d6242849a69972b14f6d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,112) #0 [#1]
depends_on:1:2
9:exp:5:hex:"75683c7df0442e10b5368fcd6bb481f0bff8d95aae90487e":hex:"538641f7d1cc5c68715971cee607da73":hex:"":hex:"":hex:"07d68fffe417adc3397706d73b95":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,112) #1 [#1]
depends_on:1:2
9:exp:5:hex:"0724ee1f317997ce77bb659446fcb5a557490f40597341c7":hex:"0d8eb78032d83c676820b2ef5ccc2cc8":hex:"":hex:"":hex:"7da181563b26c7aefeb29e71cc69":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,112) #2 [#1]
depends_on:1:2
9:exp:5:hex:"be2f0f4ae4ab851b258ec5602628df261b6a69e309ff9043":hex:"646a91d83ae72b9b9e9fce64135cbf73":hex:"":hex:"":hex:"169e717e2bae42e3eb61d0a1a29b":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,104) #0 [#1]
depends_on:1:2
9:exp:5:hex:"583c328daecd18c2ac5c83a0c263de194a4c73aa4700fe76":hex:"55e10d5e9b438b02505d30f211b16fea":hex:"":hex:"":hex:"95c0a4ea9e80f91a4acce500f7":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,104) #1 [#1]
depends_on:1:2
9:exp:5:hex:"b40857e7e6f26050f1e9a6cbe05e15a0ba07c2055634ad47":hex:"e25ef162a4295d7d24de75a673172346":hex:"":hex:"":hex:"89ea4d1f34edb716b322ea7f6f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,104) #2 [#1]
depends_on:1:2
9:exp:5:hex:"627008956e31fea497fb120b438a2a043c23b1b38dc6bc10":hex:"08ea464baac54469b0498419d83820e6":hex:"":hex:"":hex:"ab064a8d380fe2cda38e61f9e1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,96) #0 [#1]
depends_on:1:2
9:exp:5:hex:"8c386d67d7c2bfd46b8571d8685b35741e87a3ed4a46c9db":hex:"766996fb67ace9e6a22d7f802455d4ef":hex:"":hex:"":hex:"9a641be173dc3557ea015372":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,96) #1 [#1]
depends_on:1:2
9:exp:5:hex:"711bc5aa6b94fa3287fad0167ac1a9ef5e8e01c16a79e95a":hex:"75cdb8b83017f3dc5ac8733016ab47c7":hex:"":hex:"":hex:"81e3a5580234d8e0b2204bc3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,96) #2 [#1]
depends_on:1:2
9:exp:5:hex:"c74620828402e0bdf3f7a5353668505dc1550a31debce59a":hex:"cfbefe265583ab3a2285e8080141ba48":hex:"":hex:"":hex:"355a43bcebbe7f72b6cd27ea":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,64) #0 [#1]
depends_on:1:2
9:exp:5:hex:"1eb53aa548b41bfdc85c657ebdebdae0c7e525a6432bc012":hex:"37ffc64d4b2d9c82dd17d1ad3076d82b":hex:"":hex:"":hex:"34b8e037084b3f2d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,64) #1 [#1]
depends_on:1:2
9:exp:5:hex:"50d077575f6db91024a8e564db83324539e9b7add7bb98e4":hex:"118d0283294d4084127cce4b0cd5b5fa":hex:"":hex:"":hex:"507a361d8ac59882":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,64) #2 [#1]
depends_on:1:2
9:exp:5:hex:"d9ddca0807305025d61919ed7893d7d5c5a3c9f012f4842f":hex:"b78d518b6c41a9e031a00b10fb178327":hex:"":hex:"":hex:"f401d546c8b739ff":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,32) #0 [#1]
depends_on:1:2
9:exp:5:hex:"6ed8d8afde4dc3872cbc274d7c47b719205518496dd7951d":hex:"14eb280288740d464e3b8f296c642daa":hex:"":hex:"":hex:"39e64d7a":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,32) #1 [#1]
depends_on:1:2
9:exp:5:hex:"80aace5ab74f261bc09ac6f66898f69e7f348f805d52404d":hex:"f54bf4aac8fb631c8b6ff5e96465fae6":hex:"":hex:"":hex:"1ec1c1a1":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,32) #2 [#1]
depends_on:1:2
9:exp:5:hex:"23b76efd0dbc8d501885ab7d43a7dacde91edd9cde1e1048":hex:"75532d15e582e6c477b411e727d4171e":hex:"":hex:"":hex:"76a0e017":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,128) #0 [#1]
depends_on:1:2
9:exp:5:hex:"94c50453dd3ef7f7ea763ae13fa34debb9c1198abbf32326":hex:"1afe962bc46e36099165552ddb329ac6":hex:"b2920dd9b0325a87e8edda8db560bfe287e44df79cf61edba3b2c95e34629638ecb86584f05a303603065e63323523f6ccc5b605679d1722cde5561f89d268d5f8db8e6bdffda4839c4a04982e8314da78e89f8f8ad9c0fee86332906bf78d2f20afcaabdc282008c6d09df2bfe9be2c9027bb49268b8be8936be39fa8b1ae03":hex:"":hex:"51e1f19a7dea5cfe9b9ca9d09096c3e7":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,128) #1 [#1]
depends_on:1:2
9:exp:5:hex:"c6a98102af3d875bcdebe594661d3a6b376970c02b11d019":hex:"bea8cd85a28a2c05bf7406b8eef1efcc":hex:"f2f80e2c042092cc7240b598ab30fad055bce85408aa0f8cefaf8a7204f0e2acb87c78f46a5867b1f1c19461cbf5ed5d2ca21c96a63fb1f42f10f394952e63520795c56df77d6a04cb5ad006ee865a47dc2349a814a630b3d4c4e0fd149f51e8fa846656ea569fd29a1ebafc061446eb80ec182f833f1f6d9083545abf52fa4c":hex:"":hex:"04b80f25ae9d07f5fd8220263ac3f2f7":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,128) #2 [#1]
depends_on:1:2
9:exp:5:hex:"ec3cc45a22fdc7cc79ed658d9e9dbc138dcc7d6e795cba1a":hex:"b10d9c70205e142704f9d1f74caee0f6":hex:"714994017c169c574aaff2f8bad15f8fa6a385117f5405f74846eca873ca4a8f4876adf704f2fcaff2dfa75c17afefd08a4707292debc6d9fafda6244ca509bc52b0c6b70f09b14c0d7c667583c091d4064e241ba1f82dd43dc3ea4b8922be65faf5583f6b21ff5b22d3632eb4a426675648250e4b3e37c688d6129b954ef6a8":hex:"":hex:"d22407fd3ae1921d1b380461d2e60210":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,120) #0 [#1]
depends_on:1:2
9:exp:5:hex:"5a32ebc7a2338038ced36d2b85cbc6c45cca9845a7c5aa99":hex:"9afe0882e418c9af205eeb90e131d212":hex:"61ff8a8bc22803f17e8e9f01aff865bc7d3083ff413ce392a989e46ebed5114894de906f7d36439024d8f2e69cc815ac043fff2f75169f6c9aa9761ff32d10a1353213ac756cb84bd3613f8261ef390e1d00c3a8fb82764b0cda4e0049219e87d2e92c38f78ffac242391f838a248f608bb2b56b31bbb453d1098e99d079ea1b":hex:"":hex:"fcbb932ddb0128df78a71971c52838":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,120) #1 [#1]
depends_on:1:2
9:exp:5:hex:"9bf22885e7f13bcc63bb0a2ca90c20e5c86001f05edf85d8":hex:"99dec21f4781284722b5074ea567c171":hex:"9f4176dacf26e27aa0e669cd4d44bca41f83468c70b54c745a601408a214bf876941ae2ae4d26929113f5de2e7d15a7bb656541292137bf2129fdc31f06f070e3cfaf0a7b30d93d8d3c76a981d75cd0ffa0bcacb34597d5be1a055c35eefeddc07ee098603e48ad88eb7a2ec19c1aefc5c7be9a237797397aa27590d5261f67a":hex:"":hex:"18fd1feec5e3bbf0985312dd6100d1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,120) #2 [#1]
depends_on:1:2
9:exp:5:hex:"cfd75a9d3788d965895553ab5fb7a8ff0aa383b7594850a6":hex:"a6df69e5f77f4d99d5318c45c87451b2":hex:"041aeb2fa0f7df027cd7709a992e041179d499f5dbccd389035bf7e514a38b5f8368379d2d7b5015d4fa6fadfd7c75abd2d855f5ea4220315fad2c2d435d910253bf76f252a21c57fe74f7247dac32f4276d793d30d48dd61d0e14a4b7f07a56c94d3799d04324dfb2b27a22a5077e280422d4f014f253d138e74c9ac3428a7b":hex:"":hex:"fd78b9956e4e4522605db410f97e84":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,112) #0 [#1]
depends_on:1:2
9:exp:5:hex:"b0b21ae138485591c6bef7b3d5a0aa0e9762c30a50e4bba2":hex:"56dc980e1cba1bc2e3b4a0733d7897ca":hex:"a38458e5cc71f22f6f5880dc018c5777c0e6c8a1301e7d0300c02c976423c2b65f522db4a90401035346d855c892cbf27092c81b969e99cb2b6198e450a95c547bb0145652c9720aaf72a975e4cb5124b483a42f84b5cd022367802c5f167a7dfc885c1f983bb4525a88c8257df3067b6d36d2dbf6323df80c3eaeffc2d176a5":hex:"":hex:"b11f5c0e8cb6fea1a170c9342437":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,112) #1 [#1]
depends_on:1:2
9:exp:5:hex:"8775665aba345b1c3e626128b5afa3d0da8f4d36b8cf1ca6":hex:"cd17f761670e1f104f8ea4fb0cec7166":hex:"2ee08a51ceaca1dbbb3ee09b72f57427fd34bd95da5b4c0933cbb0fc2f7270cffd3476aa05deeb892a7e6a8a3407e61f8631d1a00e47d46efb918393ee5099df7d65c12ab8c9640bfcb3a6cce00c3243d0b3f316f0822cfeae05ee67b419393cc81846b60c42aeb5c53f0ede1280dc36aa8ef59addd10668dd61557ce760c544":hex:"":hex:"6cdf60e62c91a6a944fa80da1854":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,112) #2 [#1]
depends_on:1:2
9:exp:5:hex:"cc9922299b47725952f06272168b728218d2443028d81597":hex:"9b2f1a40717afcdbb6a95d6e335c9e4d":hex:"bcfca8420bc7b9df0290d8c1bcf4e3e66d3a4be1c947af82dd541336e44e2c4fa7c6b456980b174948de30b694232b03f8eb990f849b5f57762886b449671e4f0b5e7a173f12910393bdf5c162163584c774ad3bba39794767a4cc45f4a582d307503960454631cdf551e528a863f2e014b1fca4955a78bd545dec831e4d71c7":hex:"":hex:"dd515e5a8b41ecc441443a749b31":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,104) #0 [#1]
depends_on:1:2
9:exp:5:hex:"5a27d718f21c5cbdc52a745b931bc77bd1afa8b1231f8815":hex:"59661051912fba45023aef4e6f9380a5":hex:"2b7ce5cea81300ed23501493310f1316581ef8a50e37eaadd4bb5f527add6deb09e7dcc67652e44ac889b48726d8c0ae80e2b3a89dd34232eb1da32f7f4fcd5bf8e920d286db8604f23ab06eab3e6f99beb55fe3725107e9d67a491cdada1580717bbf64c28799c9ab67922da9194747f32fd84197070a86838d1c9ebae379b7":hex:"":hex:"f33e8f42b58f45a0456f83a13e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,104) #1 [#1]
depends_on:1:2
9:exp:5:hex:"b83e933cf54ac58f8c7e5ed18e4ed2213059158ed9cb2c30":hex:"8710af55dd79da45a4b24f6e972bc60a":hex:"b7a428bc68696cee06f2f8b43f63b47914e29f04a4a40c0eec6193a9a24bbe012d68bea5573382dd579beeb0565b0e0334cce6724997138b198fce8325f07069d6890ac4c052e127aa6e70a6248e6536d1d3c6ac60d8cd14d9a45200f6540305f882df5fca2cac48278f94fe502b5abe2992fa2719b0ce98b7ef1b5582e0151c":hex:"":hex:"380128ad7f35be87a17c9590fa":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,104) #2 [#1]
depends_on:1:2
9:exp:5:hex:"d2f85f92092385f15da43a086cff64c7448b4ee5a83ed72e":hex:"9026dfd09e4553cd51c4c13ce70830de":hex:"3c8de64c14df73c1b470a9d8aa693af96e487d548d03a92ce59c0baec8576129945c722586a66f03deb5029cbda029fb22d355952c3dadfdede20b63f4221f27c8e5d710e2b335c2d9a9b7ca899597a03c41ee6508e40a6d74814441ac3acb64a20f48a61e8a18f4bbcbd3e7e59bb3cd2be405afd6ac80d47ce6496c4b9b294c":hex:"":hex:"e9e5beea7d39c9250347a2a33d":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,96) #0 [#1]
depends_on:1:2
9:exp:5:hex:"de7df44ce007c99f7baad6a6955195f14e60999ed9818707":hex:"4d209e414965fe99636c1c6493bba3a3":hex:"da3bc6bdd414a1e07e00981cf9199371192a1fb2eaae20f7091e5fe5368e26d61b981f7f1d29f1a9085ad2789d101155a980de98d961c093941502268adb70537ad9783e6c7d5157c939f59b8ad474c3d7fc1fcc91165cdf8dd9d6ec70d6400086d564b68ebead0d03ebd3aa66ded555692b8de0baf43bc0ddef42e3a9eb34ab":hex:"":hex:"24483a57c20826a709b7d10a":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,96) #1 [#1]
depends_on:1:2
9:exp:5:hex:"1dfa5ff20046c775b5e768c2bd9775066ae766345b7befc3":hex:"2d49409b869b8b9fc5b67767979ca8cd":hex:"e35d34478b228bc903ea2423697e603cc077967d7cfb062e95bc11d89fbe0a1f1d4569f89b2a7047300c1f5131d91564ec9bce014d18ba605a1c1e4e15e3e5c18413b8b59cbb25ab8f088885225de1235c16c7d9a8d06a23cb0b38fd1d5c6c19617fe08fd6bf01c965ed593149a1c6295435e98463e4f03a511d1a7e82c11f01":hex:"":hex:"23012503febbf26dc2d872dc":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,96) #2 [#1]
depends_on:1:2
9:exp:5:hex:"2df3ee3a6484c48fdd0d37bab443228c7d873c984529dfb4":hex:"dc6aeb41415c115d66443fbd7acdfc8f":hex:"eafc6007fafb461d3b151bdff459e56dd09b7b48b93ea730c85e5424f762b4a9080de44497a7c56dd7855628ffc61c7b4faeb7d6f413d464fe5ec6401f3028427ae3e62db3ff39cd0f5333a664d3505ff42caa8899b96a92ec01934d4b59556feb9055e8dfb81f55e60135345bfce3e4199bfcdb3ce42523e7d24be2a04cdb67":hex:"":hex:"e8e80bf6e5c4a55e7964f455":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,64) #0 [#1]
depends_on:1:2
9:exp:5:hex:"ce0787f65e6c24a1c444c35dcd38195197530aa20f1f6f3b":hex:"55300431b1eaac0375681d7821e1eb7a":hex:"84a699a34a1e597061ef95e8ec3c21b592e9236ddb98c68d7e05f1e709937b48ec34a4b88d99708d133a2cc33f5cf6819d5e7b82888e49faa5d54147d36c9e486630aa68fef88d55537119db1d57df0402f56e219f7ece7b4bb5f996dbe1c664a75174c880a00b0f2a56e35d17b69c550921961505afabf4bfd66cf04dc596d1":hex:"":hex:"74264163131d16ac":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,64) #1 [#1]
depends_on:1:2
9:exp:5:hex:"3a15541b5857a668dc9899b2e198d2416e83bac13282ca46":hex:"89bf8ab0cea6f59616eeb9b314d7c333":hex:"4d2843f34f9ea13a1ac521479457005178bcf8b2ebeaeb09097ea4471da9f6cc60a532bcda1c18cab822af541de3b87de606999e994ace3951f58a02de0d6620c9ae04549326da449a3e90364a17b90b6b17debc0f454bb0e7e98aef56a1caccf8c91614d1616db30fc8223dbcd8e77bf55d8253efe034fd66f7191e0303c52f":hex:"":hex:"8f4877806daff10e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,64) #2 [#1]
depends_on:1:2
9:exp:5:hex:"b61cdfd19c136ee2acbe09b7993a4683a713427518f8e559":hex:"4066118061c904ed1e866d4f31d11234":hex:"153c075ecdd184fd8a0fca25cae8f720201361ef84f3c638b148ca32c51d091a0e394236d0b51c1d2ee601914120c56dfea1289af470dbc9ef462ec5f974e455e6a83e215a2c8e27c0c5b5b45b662b7f58635a29866e8f76ab41ee628c12a24ab4d5f7954665c3e4a3a346739f20393fc5700ec79d2e3c2722c3fb3c77305337":hex:"":hex:"4eff7227b42f9a7d":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,32) #0 [#1]
depends_on:1:2
9:exp:5:hex:"ce175a7df7e429fcc233540e6b8524323e91f40f592ba144":hex:"c34484b4857b93e309df8e1a0e1ec9a3":hex:"ce8d8775f047b543a6cc0d9ef9bc0db5ac5d610dc3ff6e12e0ad7cd3a399ebb762331e3c1101a189b3433a7ff4cd880a0639d2581b71e398dd982f55a11bf0f4e6ee95bacd897e8ec34649e1c256ee6ccecb33e36c76927cc5124bc2962713ad44cbd435ae3c1143796d3037fa1d659e5dad7ebf3c8cbdb5b619113d7ce8c483":hex:"":hex:"ff355f10":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,32) #1 [#1]
depends_on:1:2
9:exp:5:hex:"5f659ed236ba60494e9bf1ee2cb40edcf3f25a2bac2e5bc5":hex:"ad49f12f202320255406c2f40e55b034":hex:"6da62892f436dfe9790e72d26f4858ca156d1d655c9cc4336fcf282b0f3f0b201e47f799c3019109af89ef5fd48a4811980930e82cd95f86b1995d977c847bbb06ecdcc98b1aae100b23c9c2f0dcf317a1fb36f14e90e396e6c0c594bcc0dc5f3ebf86ce7ecd4b06d1c43202734d53f55751a6e6bbda982104102af240def4eb":hex:"":hex:"cb4d8c1d":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,32) #2 [#1]
depends_on:1:2
9:exp:5:hex:"a73f318b1e298ba4ac0ab2aed74f73543b1017cccbd1b240":hex:"abe33b7e8d88bd30deb96d1e90c4e951":hex:"6de616b000047b14b6759015183dd753c61499c0e665d06a89e4fb0cd0dd3064ff8651582e901ef5d0cdf3344c29c70c3aabc2aaf83cb3f284c6fe4104906d389b027e7d9ca60d010f06ef8cd9e55db2483d06552ddbe3fc43b24c55085cd998eae3edec36673445bf626e933c15b6af08ea21cbace4720b0b68fe1a374877d5":hex:"":hex:"4a28ec97":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,128) #0 [#1]
depends_on:1:2
9:exp:5:hex:"73d5be74615bc5b627eedfb95746fb5f17cbf25b500a597f":hex:"eb16ed8de81efde2915a901f557fba95":hex:"":hex:"fc40993eb8559e6b127315c03103ce31b70fc0e07a766d9eecf2e4e8d973faa4afd3053c9ebef0282c9e3d2289d21b6c339748273fa1edf6d6ef5c8f1e1e9301b250297092d9ac4f4843125ea7299d5370f7f49c258eac2a58cc9df14c162604ba0801728994dc82cb625981130c3ca8cdb3391658d4e034691e62ece0a6e407":hex:"804056dca9f102c4a13a930c81d77eca":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,128) #1 [#1]
depends_on:1:2
9:exp:5:hex:"a249135c9f2f5a8b1af66442a4d4e101771a918ef8acee05":hex:"80b6e48fe4a3b08d40c1636b25dfd2c4":hex:"":hex:"c62b39b937edbdc9b644321d5d284e62eaa4154010c7a3208c1ef4706fba90223da04b2f686a28b975eff17386598ba77e212855692f384782c1f3c00be011e466e145f6f8b65c458e41409e01a019b290773992e19334ffaca544e28fc9044a5e86bcd2fa5ad2e76f2be3f014d8c387456a8fcfded3ae4d1194d0e3e53a2031":hex:"951c1c89b6d95661630d739dd9120a73":char*:"":hex:"b865f8dd64a6f51a500bcfc8cadbc9e9f5d54d2d27d815ecfe3d5731e1b230c587b46958c6187e41b52ff187a14d26aa41c5f9909a3b77859429232e5bd6c6dc22cf5590402476d033a32682e8ab8dc7ed0b089c5ab20ab9a8c5d6a3be9ea7aa56c9d3ab08de4a4a019abb447db448062f16a533d416951a8ff6f13ed5608f77":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,128) #2 [#1]
depends_on:1:2
9:exp:5:hex:"fa832a4b37dcb3c0879a771bb8ae734f0d88b9be497797a8":hex:"70835abab9f945c84ef4e97cdcf2a694":hex:"":hex:"0f1105f9ec24121232b60b6ef3c3e8ca9eec1a3d7625004b857d1d77f292b6ec065d92f5bb97e0dc2fdfdf823a5db275109a9472690caea04730e4bd732c33548718e9f7658bbf3e30b8d07790cd540c5754486ed8e4d6920cefaeb1c182c4d67ebed0d205ba0bd9441a599d55e45094b380f3478bcfca9646a0d7aa18d08e52":hex:"a459be0b349f6e8392c2a86edd8a9da5":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,120) #0 [#1]
depends_on:1:2
9:exp:5:hex:"dda216287910d1f5c0a312f63c243612388bc510cb76c5ba":hex:"7f770140df5b8678bc9c4b962b8c9034":hex:"":hex:"d6617d583344d4fe472099d2a688297857215a3e31b47d1bf355ccfe9cf2398a3eba362c670c88f8c7162903275dfd4761d095900bd97eba72200d4045d72bd239bda156829c36b38b1ff5e4230125e5695f623e129829721e889da235bb7d4b9da07cce8c3ceb96964fd2f9dd1ff0997e1a3e253a688ceb1bfec76a7c567266":hex:"9823e3242b3f890c6a456f1837e039":char*:"":hex:"b4910277224025f58a5d0f37385b03fcd488dfef7580eb5c270c10bd7a6f6d9c7ddc2d1368d68d4e04f90e3df029ed028432a09f710be1610b2a75bd05f31bae83920573929573affd0eb03c63e0cec7a027deab792f43ee6307fd3c5078d43d5b1407ac023824d41c9437d66eeec172488f28d700aa4b54931aad7cd458456f":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,120) #1 [#1]
depends_on:1:2
9:exp:5:hex:"c5afa1e61d4594b1c2fa637f64f18dd557e4df3255b47f24":hex:"151fd3ba32f5bde72adce6291bcf63ea":hex:"":hex:"5c772cdf19571cd51d71fc166d33a0b892fbca4eae36ab0ac94e6164d51acb2d4e60d4f3a19c3757a93960e7fd90b9a6cdf98bdf259b370ed6c7ef8cb96dba7e3a875e6e7fe6abc76aabad30c8743b3e47c8de5d604c748eeb16806c2e75180a96af7741904eca61769d39e943eb4c4c25f2afd68e9472043de2bb03e9edae20":hex:"f0626cc07f2ed1a7570386a4110fc1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,120) #2 [#1]
depends_on:1:2
9:exp:5:hex:"febd4ff0fedd9f16bccb62380d59cd41b8eff1834347d8fa":hex:"743699d3759781e82a3d21c7cd7991c8":hex:"":hex:"dc971c8f65ece2ea4130afd4db38fc657c085ea19c76fef50f5bd0f8dd364cc22471c2fa36be8cde78529f58a78888e9de10961760a01af005e42fc5b03e6f64962e6b18eaedea979d33d1b06e2038b1aad8993e5b20cae6cc93f3f7cf2ad658fbba633d74f21a2003dded5f5dda3b46ed7424845c11bab439fbb987f0be09f8":hex:"1da347f9b6341049e63140395ad445":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,112) #0 [#1]
depends_on:1:2
9:exp:5:hex:"d280d079110c1c826cc77f490d807dd8d508eb579a160c49":hex:"85b241d516b94759c9ef975f557bccea":hex:"":hex:"a286d19610a990d64f3accd329fc005d468465a98cfa2f3606c6d0fbeb9732879bad3ca8094322a334a43155baed02d8e13a2fbf259d80066c6f418a1a74b23e0f6238f505b2b3dc906ffcb4910ce6c878b595bb4e5f8f3e2ede912b38dbafdf4659a93b056a1a67cb0ec1dbf00d93223f3b20b3f64a157105c5445b61628abf":hex:"bbf289df539f78c3a912b141da3a":char*:"":hex:"b9286ab91645c20de040a805020fed53c612d493a8ce9c71649ae16bd50eab6fb7f3a9180e1651d5413aa542608d7ecbf9fc7378c0bef4d439bc35434b6cf803976b8783aecc83a91e95cea72c2a26a883b710252e0c2a6baa115739a0692c85f6d34ff06234fbdc79b8c4a8ea0a7056fb48c18f73aaf5084868abb0dfaa287d":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,112) #1 [#1]
depends_on:1:2
9:exp:5:hex:"5e80f87fa2156c62df7be2ad16c4890de5ee5868a684fcf9":hex:"9769f71c76b5b6c60462a845d2c123ad":hex:"":hex:"c829073efd5c5150d2b7e2cdaeff979830d1aa983c747724ade6472c647a6e8e5033046e0359ea62fc26b4c95bccb3ac416fdf54e95815c35bf86d3fdd7856abbb618fe8fcd35a9295114926a0c9df92317d44ba1885a0c67c10b9ba24b8b2f3a464308c5578932247bf9c79d939aa3576376d2d6b4f14a378ab775531fe8abf":hex:"394b6c631a69be3ed8c90770f3d4":char*:"":hex:"f886bd92ca9d73a52e626b0c63a3daa138faaacf7809086d04f5c0c899362aa22e25d8659653b59c3103668461d9785bb425c6c1026ad9c924271cec9f27a9b341f708ca86f1d82a77aae88b25da9061b78b97276f3216720352629bd1a27ebf890da6f42d8c63d68342a93c382442d49dd4b62219504785cee89dffdc36f868":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,112) #2 [#1]
depends_on:1:2
9:exp:5:hex:"d8a7b99e53f5e5b197364d4516cace4b928de50e571315e3":hex:"4b12c6701534098e23e1b4659f684d6f":hex:"":hex:"d0db0ac5e14bf03729125f3137d4854b4d8ce2d264f8646da17402bdad7034c0d84d7a80f107eb202aeadbfdf063904ae9793c6ae91ee8bcc0fc0674d8111f6aea6607633f92e4be3cfbb64418101db8b0a9225c83e60ffcf7a7f71f77149a13f8c5227cd92855241e11ee363062a893a76ac282fb47b523b306cd8235cd81c2":hex:"729b31c65d8699c93d741caac8e3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,104) #0 [#1]
depends_on:1:2
9:exp:5:hex:"c874b427b7181b0c90b887147c36f242827149324fd5c945":hex:"4b8dda046a5b7c46abeeca2f2f9bcaf8":hex:"":hex:"bdd90190d587a564af022f06c8bd1a68735b6f18f04113fdcec24c6027aaf0271b183336fb713d247a173d9e095dae6e9badb0ab069712302875406f14320151fd43b90a3d6f35cc856636b1a6f98afc797cb5259567e2e9b7ce62d7b3370b5ee852722faf740edf815b3af460cdd7de90ca6ab6cd173844216c064b16ea3696":hex:"fe1e427bcb15ce026413a0da87":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,104) #1 [#1]
depends_on:1:2
9:exp:5:hex:"56543cd6e2ebb1e3dc136a826bfc37eddb12f7a26430a1b4":hex:"927ce8a596ed28c85d9cb8e688a829e6":hex:"":hex:"d541dd3acec2da042e6ea26fb90ff9a3861191926423b6dc99c5110b3bf150b362017159d0b85ffea397106a0d8299ec22791cb06103cd44036eed0d6d9f953724fb003068b3c3d97da129c28d97f09e6300cbea06ba66f410ca61c3311ce334c55f077c37acb3b7129c481748f79c958bc3bbeb2d3ff445ad361ed4bbc79f0a":hex:"3a98f471112a8a646460e8efd0":char*:"":hex:"a602d61e7a35cbe0e463119bb66fd4bb6c75d1fe0b211b9d6a0a6e9e84b0794282318f0d33ec053f2cfba1623e865681affeaf29f3da3113995e87d51a5ab4872bb05b5be8ef2b14dfc3df5a48cbc9b10853a708ee4886a7390e8e4d286740a0dd41c025c8d72eda3f73f3cec5c33d5e50b643afd7691213cccccc2c41b9bd7a":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,104) #2 [#1]
depends_on:1:2
9:exp:5:hex:"caaf81cd380f3af7885ef0d6196a1688c9372c5850dc5b0b":hex:"508c55f1726896f5b9f0a7024fe2fad0":hex:"":hex:"6f269929b92c6281e00672eaec183f187b2ddecc11c9045319521d245b595ab154dd50f045a660c4d53ae07d1b7a7fd6b21da10976eb5ffcddda08c1e9075a3b4d785faa003b4dd243f379e0654740b466704d9173bc43292ae0e279a903a955ce33b299bf2842b3461f7c9a2bd311f3e87254b5413d372ec543d6efa237b95a":hex:"3b8026268caf599ee677ecfd70":char*:"":hex:"c4a96fb08d7c2eebd17046172b98569bc2441929fc0d6876aa1f389b80c05e2ede74dc6f8c3896a2ccf518e1b375ee75e4967f7cca21fa81ee176f8fb8753381ce03b2df873897131adc62a0cbebf718c8e0bb8eeed3104535f17a9c706d178d95a1b232e9dac31f2d1bdb3a1b098f3056f0e3d18be36bd746675779c0f80a10":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,96) #0 [#1]
depends_on:1:2
9:exp:5:hex:"2fc9d9ac8469cfc718add2b03a4d8c8dcc2eeca08e5ff7bc":hex:"b2a7c0d52fc60bacc3d1a94f33087095":hex:"":hex:"bc84d8a962a9cfd179d242788473d980d177abd0af9edccb14c6dc41535439a1768978158eeed99466574ea820dbedea68c819ffd9f9915ca8392c2e03049d7198baeca1d3491fe2345e64c1012aff03985b86c831ad516d4f5eb538109fff25383c7b0fa6b940ae19b0987d8c3e4a37ccbbd2034633c1eb0df1e9ddf3a8239e":hex:"0a7a36ec128d0deb60869893":char*:"":hex:"fc3cd6486dfe944f7cb035787573a554f4fe010c15bd08d6b09f73066f6f272ff84474f3845337b6e429c947d419c511c2945ffb181492c5465940cef85077e8a6a272a07e310a2f3808f11be03d96162913c613d9c3f25c3893c2bd2a58a619a9757fd16cc20c1308f2140557330379f07dbfd8979b26b075977805f1885acc":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,96) #1 [#1]
depends_on:1:2
9:exp:5:hex:"81ff729efa4a9aa2eccc37c5f846235b53d3b93c79c709c8":hex:"1bd17f04d1dc2e447b41665952ad9031":hex:"":hex:"3992ad29eeb97d17bd5c0f04d8589903ee23ccb2b1adc2992a48a2eb62c2644c0df53b4afe4ace60dc5ec249c0c083473ebac3323539a575c14fa74c8381d1ac90cb501240f96d1779b287f7d8ba8775281d453aae37c803185f2711d21f5c00eb45cad37587ed196d1633f1eb0b33abef337447d03ec09c0e3f7fd32e8c69f0":hex:"01b0a815dc6da3e32851e1fb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,96) #2 [#1]
depends_on:1:2
9:exp:5:hex:"068500e8d4f8d4af9035cdaa8e005a648352e8f28bdafc8a":hex:"5ea9198b860679759357befdbb106b62":hex:"":hex:"98e32428d9d21c4b60e690a2ce1cf70bee90df31302d1819b7d27fd577dd990f7ffe6ba5ef117caac718cc1880b4ca98f72db281c9609e189307302dc2866f20be3a545a565521368a6881e2642cba63b3cf4c8b5e5a8eabeb3e8b004618b8f77667c111e5402c5d7c66afd297c575ce5092e898d5831031d225cee668c186a1":hex:"d58752f66b2cb9bb2bc388eb":char*:"":hex:"2ef3a17fcdb154f60d5e80263b7301a8526d2de451ea49adb441aa2541986b868dab24027178f48759dbe874ae7aa7b27fb19461c6678a0ba84bbcd8567ba2412a55179e15e7c1a1392730ac392b59c51d48f8366d45b933880095800e1f36ff1ac00753f6363b0e854f494552f1f2efe028d969e6b1a8080149dd853aa6751e":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,64) #0 [#1]
depends_on:1:2
9:exp:5:hex:"7474d9b07739001b25baf6867254994e06e54c578508232f":hex:"3ade6c92fe2dc575c136e3fbbba5c484":hex:"":hex:"1cbab2b6e4274caa80987072914f667b887198f7aaf4574608b91b5274f5afc3eb05a457554ff5d346d460f92c068bc626fd301d0bb15cb3726504b3d88ecd46a15077728ddc2b698a2e8c5ea5885fc534ac227b8f103d193f1977badf4f853a0931398da01f8019a9b1ff271b3a783ff0fae6f54db425af6e3a345ba7512cbf":hex:"67c25240b8e39b63":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,64) #1 [#1]
depends_on:1:2
9:exp:5:hex:"d50d4c7d442d8a92d0489a96e897d50dda6fbe47ca7713ee":hex:"41b37c04ab8a80f5a8d9d82a3a444772":hex:"":hex:"b36b4caf1d47b0d10652824bd57b603ec1c16f4720ce7d43edde8af1b9737f61b68b882566e04da50136f27d9af4c4c57fff4c8465c8a85f0aeadc17e02709cc9ba818d9a272709e5fb65dd5612a5c5d700da399b3668a00041a51c23de616ea3f72093d85ecbfd9dd0b5d02b541fb605dcffe81e9f45a5c0c191cc0b92ac56d":hex:"4ee54d280829e6ef":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,64) #2 [#1]
depends_on:1:2
9:exp:5:hex:"38f3ec3ec775dac76ae484d5b6ca61c695c7beafba4606ca":hex:"9af53cf6891a749ab286f5c34238088a":hex:"":hex:"49726b8cefc842a02f2d7bef099871f38257cc8ea096c9ac50baced6d940acb4e8baf932bec379a973a2c3a3bc49f60f7e9eef45eafdd15bda1dd1557f068e81226af503934eb96564d14c03f0f351974c8a54fb104fb07417fe79272e4b0c0072b9f89b770326562e4e1b14cad784a2cd1b4ae1dc43623ec451a1cae55f6f84":hex:"6f6f344dd43b0d20":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,32) #0 [#1]
depends_on:1:2
9:exp:5:hex:"6db4ef061513ef6690d57aef50d8011e0dd7eb4432d82374":hex:"623df5a0922d1e8c883debb2e0e5e0b1":hex:"":hex:"b7f9206995bc97311855ee832e2b40c41ab2d1a40d9263683c95b14dcc51c74d2de7b6198f9d4766c659e7619fe2693a5b188fac464ccbd5e632c5fd248cedba4028a92de12ed91415077e94cfe7a60f117052dea8916dfe0a51d92c1c03927e93012dbacd29bbbc50ce537a8173348ca904ac86df55940e9394c2895a9fe563":hex:"14f690d7":char*:"":hex:"a6414daa9be693e7ebb32480a783c54292e57feef4abbb3636bebbc3074bfc608ad55896fe9bd5ab875e52a43f715b98f52c07fc9fa6194ea0cd8ed78404f251639069c5a313ccfc6b94fb1657153ff48f16f6e22b3c4a0b7f88e188c90176447fe27fa7ddc2bac3d2b7edecad5f7605093ac4280b38ae6a4c040d2d4d491b42":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,32) #1 [#1]
depends_on:1:2
9:exp:5:hex:"8901bec4d3c64071d8c30c720c093221e05efed71da280bf":hex:"9265abe966cb83838d7fd9302938f49d":hex:"":hex:"7c447e700db7367260dffa42050e612eff062eb0c8a6b4fe34858800bcb8ec2f622cb5213767b5771433783e9b0fa617c9ffb7fde09845dafc16dfc0df61215c0ca1191eabf43293db6603d5285859de7ef3329f5e71201586fb0188f0840ed5b877043ca06039768c77ff8687c5cfc2fd013a0b8da48344c568fce6b39e2b19":hex:"6f6c38bc":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,32) #2 [#1]
depends_on:1:2
9:exp:5:hex:"2c57eb763f886154d3846cc333fc8ae8b3c7c9c3705f9872":hex:"9b3781165e7ff113ecd1d83d1df2366d":hex:"":hex:"9fe7d210221773ba4a163850bab290ba9b7bf5e825760ac940c290a1b40cd6dd5b9fb6385ae1a79d35ee7b355b34275857d5b847bef4ac7a58f6f0e9de68687807009f5dc26244935d7bcafc7aed18316ce6c375192d2a7bf0bee8a632fe4f412440292e39339b94b28281622842f88048be4640486f2b21a119658c294ce32e":hex:"62f32d4e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,128) #0 [#1]
depends_on:1:2
9:exp:5:hex:"307d31a594e54f673bea2f977835670aca4f3d45c9c376cc":hex:"0bdaa353c4904d32432926f27534c73c":hex:"aa39f04559ccc2cae3d563dda831fb238b2582cb2c2bb28cff20cc20200724c8771b9805ef7464b8fc06c7b8060c6920fd2779fbc807c2292c8c1f88f8088755609a1732ff8c0b06606452b970c79997b985889404fd907c4668a0bcc11ba617175f4525523494a244da60b238468c863055f04db20ea489adf545d56c0a71d8":hex:"d7385a7bd0cb76e1e242fa547c474370bcc7cc7cf3e3fa37b00fe08a56383ca31d023d8c493f6d42e482b0f32e4f244dd100ea08eee6535e5bb8d27f76dbb7eead6ba8e031ccd0eaeb649edee92aeaf0f027d59efd4e39b1f34b15ceb8b592ee0f171b1773b308c0e747790b0e6ace90fc661caa5f942bdc197067f28fbe87d1":hex:"2ddda790aae2ca427f5fb032c29673e6":char*:"":hex:"0b92262759897f4bd5624a891187eba6040d79322a2a5a60fb75c6c6a5badd117abe40c6d963931bbc72dca1a1bf1f5388030fe323b3b24bd408334b95908177fb59af57c5cc6b31825bc7097eec7fec19f9cdb41c0264fd22f71893bcf881c1510feb8057e64880f1ea2df8dc60bb300fd06b0a582f7be534e522caadc4a2c7":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,128) #1 [#1]
depends_on:1:2
9:exp:5:hex:"23c201968def551817f20e49b09dbb5aae0033305bef68a0":hex:"bd2952d215aed5e915d863e7f7696b3e":hex:"23f35fac583897519b94998084ad6d77666e13595109e874625bc6ccc6d0c7816a62d64b02e670fa664e3bb52c276b1bafbeb44e5f9cc3ae028daf1d787344482f31fce5d2800020732b381a8b11c6837f428204b7ed2f4c4810067f2d4da99987b66e6525fc6b9217a8f6933f1681b7cfa857e102f616a7c84adc2f676e3a8f":hex:"77bc8af42d1b64ee39012df5fc33c554af32bfef6d9182804dcfe370dfc4b9d059bdbc55f6ba4eacb8e3a491d96a65360d790864ba60acf1a605f6b28a6591513ea3cfd768ff47aee242a8e9bdfac399b452231bfd59d81c9b91f8dc589ad751d8f9fdad01dd00631f0cb51cb0248332f24194b577e5571ceb5c037a6d0bcfe8":hex:"bb9ba3a9ac7d63e67bd78d71dc3133b3":char*:"":hex:"17d93c921009c6b0b3ecf243d08b701422983f2dcaec9c8d7604a2d5565ed96ce5cddcb183cd5882f8d61d3202c9015d207fed16a4c1195ba712428c727601135315fc504e80c253c3a2e4a5593fc6c4a206edce1fd7104e8a888385bbb396d3cdf1eb2b2aa4d0c9e45451e99550d9cfa05aafe6e7b5319c73c33fd6f98db3c5":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,128) #2 [#1]
depends_on:1:2
9:exp:5:hex:"6baec0669add30acb8f678ce477a2b171f89d1f41935c491":hex:"b1472f92f552ca0d62496b8fa622c569":hex:"5ae64edf11b4dbc7294d3d01bc9faf310dc08a92b28e664e0a7525f938d32ef033033f1de8931f39a58df0eabc8784423f0a6355efcff008cae62c1d8e5b7baefd360a5a2aa1b7068522faf8e437e6419be305ada05715bf21d73bd227531fea4bc31a6ce1662aec49f1961ee28e33ae00eb20013fd84b51cfe0d5adbdaff592":hex:"5712b84c4c97d75f84edd50561bc1d3f1ba451cc3b358b2403b5e528290954348cf7a235b4dc11a72ddbc503191204e98a9744d85419508c8ca76438c13305f716f1e239a6d9f6423c27217a0057aa75f6d7e2fb356e7194f271459ab5482589ea311b33e3d3845952ff4067dd2b9bcc2e8f83630b0a219e904040abd643d839":hex:"29a2d607b2d2d9c96d093000b401a94f":char*:"":hex:"beb687f062ae7f5159d07609dd58d7b81c478d180bc0b4c07ae799626ff1da2be2e0d78b2a2a1f563257f161491a5ac500cd719da6379e30d0f6d0a7a33203381e058f487fc60989923afbee76e703c03abc73bb01bd262ff6f0ac931f771e9b4f2980e7d8c0a9e939fa6e1094796894f2c78f453e4abe64cb285016435ef0e8":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,120) #0 [#1]
depends_on:1:2
9:exp:5:hex:"7b882a2df81fdb9275fb05d120f32417e8ffedd07457e938":hex:"5c064d3418b89388fb21c61d8c74d2c5":hex:"5bfa7113d34e00f34713cf07c386d055e889bb42d7f6c8631ffce5668e98cb19bed8820b90ecb2b35df7134f975700347e5514287cfef7ffa2b0ff48b1de0769b03dca6610995d67cb80052cb2e5914eb4ed43ef5861f4b9364314fde6ad2b82fbba7fd849dfa6e46ecc12edc8cabfff28d9bd23c2bcc8ab3661c9ba4d5fee06":hex:"0aae7213da279b34d6dcf2a691b2d0333112ea22de0c3c68d47cf9f9f4ed8ad4e03d4a60ec18c3a04ac9c2abb73e1023051029b5e8705bb69c4c50afc84deb0379db5077be1f663652f8bd8958271af2c1ac4a87e08cb526bab8a030652f2a29af8055d0f31e35475caee27f84c156ef8642e5bfef89192f5bde3c54279ffe06":hex:"0943abb85adee47741540900cc833f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,120) #1 [#1]
depends_on:1:2
9:exp:5:hex:"51d94d21482c00bb5bc7e7e03aa017ba58f5a23494b72c2a":hex:"fb21cd763e6f25540f8ad455deaccdf0":hex:"019d1db5569eeff83306f65d653b01064854c1be8446cd2516336667c6557e7844fc349adea64a12dc19ac7e8e40b0520a48fac64571a93d669045607085ac9fa78fed99bbf644908d7763fe5f7f503947a9fe8661b7c6aef8da101acca0aed758ca1580eeb2f26ae3bf2de06ce8827a91a694179991a993cdf814efbcc61ca5":hex:"3a9c69c1ed2340bfde1495658dbf4f54731a19b3922a1d535df8d0b2582f5e803b5891e8ad1aa256c923956dcda2430d0c0696bce63295fb61183e040566e459338f908d23ae51f64020c1ef3d192428f23312b285fc4111d50d1add58f4a49008a22c90d3365230e9158cd56f9d84f079bdd673555d4dc76c74b02fa9920e7d":hex:"a93bd682b57e1d1bf4af97e93b8927":char*:"":hex:"7093f44703f2cbb3d12d9872b07a8cd44deb62dae48bc573b11a1ee1c9f3105223423fac3181c312a8a61757a432d92719f486c21e311b840aa63cf530710c873df27fecda0956075923f1ecc39bffb862706f48bde2de15612930fc8630d2036e9e4cfc1c69779171bd23d9e1d5de50a9e0a0de4bd82ed3efc45299980bb4cc":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,120) #2 [#1]
depends_on:1:2
9:exp:5:hex:"e6756470937f5d9af76f2abe6df2d0bc15ff8e39b5154071":hex:"4500193711a5d817a9f48deafda39772":hex:"92fa22dba0eee6b1de1ddd24713b1be44c7105df90e6e7a54dcbf19025e560eb4986ee080cf613898a1a69d5ab460a3b8aa2723a95ac4a4af48224b011b55fb7582ae18f6746591eab2bd33d82a8dbbae3f7877e28afef9857a623530b31d8198b2df43f903d6e48ddae0848741f9eaae7b5504c67ad13791818f3c55c9b3d1e":hex:"afae92bd56c426c095d76633701aa9bea5ce05490482c6c64ac24468c3e1af6e6030a6bb6649745b011c6729bde985b9242e22105322fbb8853dcabbd00165d0b07d7b499e0238b6513bf6351eb40635a798f7e6e2d31125dda45ffe8964596fdbff55df22d4e9025bd4f39e7c9b90e74b3ee58d6901f113900ee47a4df5afd7":hex:"7d9f97c97c3424c79966f5b45af090":char*:"":hex:"62258d60f0138c0405df4b2ec1e308b374603a9eace45932fdc2999e9e2261de8b1099473d1fc741c46c334023aa5d9359f7ef966240aaf7e310d874b5956fd180fb1124cbeb91cf86020c78a1a0335f5f029bd34677dd2d5076482f3b3e85808f54998f4bac8b8fa968febceec3458fb882fc0530271f144fb3e2ab8c1a6289":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,112) #0 [#1]
depends_on:1:2
9:exp:5:hex:"30db73d46b518669c45b81bc67b93bed3d0864f7e9e8e789":hex:"5069e2d2f82b36de8c2eb171f301135d":hex:"ef781dce556b84188adee2b6e1d64dac2751dd8592abc6c72af7b998dfae40cbe692a4cae0b4aa2c95910e270600550fca1e83640c64efb1eb0e0a90a6fc475ae1db863a64ce9cc272f00abac8a63d48dd9f1c0a5f4586224befed05be4afae5bd92249833d565cc6b65fd8955cb8a7d7bd9f4b6a229e3881212871a52c15d1c":hex:"750bc1d2f91d786bb1e621192a376f552538ba8c07d50d9e10b9345f31b3e5f9d8ad7c719c03d8548a3b184b741cd06c49d7fb6fe80258d60c01c2987c337c823211cee7c1cf82077266889bc7767475e0eeabb2ef6b5a1de2089aaef77565d40a1c2c470a880c911e77a186eacca173b25970574f05c0bdcd5428b39b52af7f":hex:"a5100c5e9a16aedf0e1bd8604335":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,112) #1 [#1]
depends_on:1:2
9:exp:5:hex:"209f0478f1a62cb54c551181cbd4d24b796e95f3a06b6cb9":hex:"7be1768f6ffb31599eb6def7d1daa41c":hex:"9cb49357536ebe087e1475a5387907a9e51ad1550697f13c6cc04384ec8a67dea13376bdd5e26b815c84a78f921b506b9e2086de50f849185f05ba7c3041e49e42c0673df856da109a78b8e0ce918c25836f7e781e6b16168e4e5976d27ebc83f20b7bf4beadecb9b4f17a7a0d3a3db27fc65288a754b5031a2f5a1394801e6e":hex:"66db7cc97b4a8266c0a2228e8028e38d8986e79fcbcc3caff3050fdd2de87b7ff7a6895b988b0bdb7fcc4d6e2d538dcfaad43ce2f98b6d32500f5a6e6183d84cb19157a699cdde1266d6d75a251ee1a2eb97bfe6405d50be2b17a58ba6eafaee0a023a28d568fd1c914f06041a49c79b9df9efe63d56883cbbbeaba809273d2e":hex:"4d2ac05bfd4b59b15a6f70ea7cd0":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,112) #2 [#1]
depends_on:1:2
9:exp:5:hex:"1bfa30b315e7b908263330140fa2d66ed57104784a43cc70":hex:"b7081a3010b524218390ba6dd460a1ec":hex:"8c1f42b5931d69ae351fcde7d2b4136d4898a4fa8ba62d55cef721dadf19beaabf9d1900bdf2e58ee568b808684eecbf7aa3c890f65c54b967b94484be082193b2d8393007389abaa9debbb49d727a2ac16b4dab2c8f276840e9c65a47974d9b04f2e63adf38b6aad763f0d7cdb2c3d58691adde6e51e0a85093a4c4944f5bf2":hex:"8eeee9865e23fa51dbbf197fa41776b7edbdb9381a22c935299cd959a46190788ae82f4e645b0362df89bfc00241964784bc7ef70f6f97e81687d52e552a33af20ae34a3005e0a7b85d094368d707c3c4cd3ef31c0daf3ccaa1676609ed199327f4139d0c120977e6babceed28896d2cb3129630f3ee135572dc39433057e26a":hex:"4da85b8ec861dd8be54787bb83f1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,104) #0 [#1]
depends_on:1:2
9:exp:5:hex:"fc47156a693e59a1dea0618c41441fe669fc65dcfb7d0726":hex:"ea1935ed014883cc427983d7962d9992":hex:"0d85b8513becfe8c91d0f6ffb65ec31f2cf406c51c0da88893c43d1327fd8ad1f4bab2d7b5e27438d643397034a72f8666bf641b6781bc90f764db387eae6720b5723d510194570ccd773e1b3bebfc333cc099d078583e8dac60d174d332925a24a45110c8d2abe8924ea677ac74db66ea789e2838efc96c78bceaa6236c0a67":hex:"3e4f0a586bad532a08c8863ebba01fd25014baa907e6032ee43d4a7dfc7c3171916dcdf9faee0531f27527872ae4e127b6b9aaee93f5e74d0ab23f3874aa0e291564bc97f17085dd7d5eb9a85d9f44574e5952929eda08863b64c85dd395c91b01fe5bef66e3fa8f9ee5bf62c25d80dc84fbe002ecfd218430b26f3549f734a1":hex:"8781b045a509c4239b9f44624e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,104) #1 [#1]
depends_on:1:2
9:exp:5:hex:"b5fcd780a03ba80341081ef96b440c0e4348afde4d60c1d5":hex:"ad20cce056e74ec5d0a76d6280998f15":hex:"28f8fcf23b9c1ba40c19ffc1092632e35f234c1e8b82bcd5309d37bf849a2ce401413d1f242cf255ed597f9a93a1d6e50676997f95aa612e580d88234a86ddc404292746f0b2f5cf15abebcea6659f998ec6a1cb5a9914fee5aa1aa5d04b3c20914e45095e4141ce9c173653dd91c3ebe4ed4a9a28f3915d7b2edba34c2a58d8":hex:"6316f3beb32f6f3bf8f2ff6a2c160b432bafd3036d3eefa1e4ec204f24892e37dc4d75c7ce9a24b5c49fb4df901f35ef9d5955f7dc289c56cb74753f4d6b2982267d5269d12237e21202a65061849c65e90e6702dda03a35ace3a3a098d16b4bfbb85b7232404baee37776a9b51af6b3059a5f170f4ebe4ecf11061ca3c1f1f3":hex:"2ad4520ddc3b907414d934cc1d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,104) #2 [#1]
depends_on:1:2
9:exp:5:hex:"4382507dddccf1385fc831da8924147563416d0656e168ec":hex:"a37687c9cd4bdc1ead4e6b8f78bee7f5":hex:"fa9ae30509cbb6fe104c21480ae7b8ec9f12f1afb17320d77b77cdf32ce8c5a3f7f927e501118c7ccd6975b79225059cef530a4fcb0a9719f5e2d3bebe7bb6ec0855e495a31e5075eb50aa6c1227e48b03e3fdf780084ac4912eb3a5674cca9dd6ac037366b230ae631a8580d2d117942dee5d5ddbbb2233afeca53289cc4f68":hex:"e5c5430b960aa35dc8540215c2772d66811270859e33dd4477904759e7e5eb2986a52a4ccc9f592e614147b5ea2ead6636a15c6426336b2995d9a31ab36d76578c3540bc6693842a4bc0491c7963ee9cda2317951cf93244bd30bcdfec69a4767004636fe7d1be7300c35e80627bab9236a075a803e9e1080b9159060c643a78":hex:"4221818d4be45306e205813789":char*:"":hex:"b5b36719bc4d13a5fbf37188ea814cdf3c97a430784330540325c899570e15482300bc82c5b8163074e0544c5132e3ce93bba68bd7a8d2db81d1431b424b697c1158c4d70625666d5ff99145ca34856815c905b5a0fd95806df56b9cd5b384bda3e394b409048eb1037144cc071539c02397e931da28a43cc354d584643afd4f":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,96) #0 [#1]
depends_on:1:2
9:exp:5:hex:"7a66db3450dac9a1e63d2639f34c5c6a3fbfb3c8e8230199":hex:"21f8341529b210ade7f2c6055e13007a":hex:"1699bc8c198ab03e22d9bc4f3682aad335c6e35f3f616bb69769a9d5a202511797e770ae0d8d8528ef7b2bb25b4294d47427b43f0580fa71d93fdef667f4f4196f84e41c0b1978796d0de74a94420fb8571bff39137fa231c572b31be9ae72338288bef5f8c992121dc918538551f346e279a9047df14ec9fc0fd399cd3bd8d8":hex:"6463a7eb2496379bc8a5635541525926a6f9fa718e338221952118ae4cf03a85f2074b4ebaf108b9c725809be1e6309c3a444b66f12286f6ea9d80c3413706b234b26372e8f00783819314a994c9e3ecf6abdd255cbfe01b3865e1390a35dcd2853a3d99ed992e82ec67ba245f088cb090adade74bdbc8a1bad0f06cbea766a6":hex:"4af02b81b26104d1d31e295a":char*:"":hex:"53fe6a34d280f2c96d1ae2b2e8baf6abd67cedf7d214312f75dd4a1bec28a641dda3e71aa398726b2b0b1f515e1f4259ee97acaf17f122db9ec7814c2de6a88d36c3ac106396ad03d337c2cd2d2b9b4b7170e23a5848ca7ea129838f967dfdfe83b45ff2a9be699bfb2346115465d59f074f09e24d8fcbd9ece0018c92776c43":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,96) #1 [#1]
depends_on:1:2
9:exp:5:hex:"1f5c818f24d201f9fb23fcca211b0545eee5c5c9b440810d":hex:"3a163067bdd90fce0406d1c198a88771":hex:"a5e94e233d04fe0c4b6c4684b386902fe05096702237dfbe76f73befa69b6f30394cf9fe3358997942df65842748fb4f075a3dc06e147bd8d67fc4371113a4d75c70219257c650a6f38a136659e20a1cf3a119397835c304e0fb2a33aa3c3019175c86463043d5edc6992874f61e81cd0d26af8b62cf8c8626901d4f16d84236":hex:"9a7566817a06f792e96a6a2ba8e0a01f8837e2de06796e68b0782cc54ed0b04fc5e24a1ad37d5ffb035548b882d88150e89915b89f57cde2bf3c43ab9dae356927daef6bd61cc9edd5e1b7a4abea2f71313677f1b2fdf3d8d4a7e9814ea820fbc3e5c83947db961839a985a57ced7f5e4a1efffcfd17a2c806d4cdc1e79162da":hex:"b124eea927e2a62a875494a1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,96) #2 [#1]
depends_on:1:2
9:exp:5:hex:"9a301f7edf83da63bcf37216a3a33d7613331c3210281dd7":hex:"d73a546b0fa307633ac89506fa86138b":hex:"f57fe548cf4a551a216ffb24a1dcf1b79c95f9abf06443fd58af042d287c2165db373c82a94172db517840f22e45e966e3ead91ce1ddad132bcb844e406e84b76a0b5b0ee23064b66a229f32a2d3b9c71103f020c4ba57fc0f0608b7114914cf2ada0c5a9bc4afbfa9ce5da320f34beb2211d569a142f53bfd262f6d149c4350":hex:"e09cc8543db7804870004706a26e94b457c125bd648b581a196f962f2ae8fa55d9bc66530ba5020e22d282080b4720dc9a2096a11c0fcc3d9a67cd1cf95cd7cd2417ba308c761e64be24347a14c9423447094a5c72a0043c288b35e753ba0aa748f208381249fb1c8d195a472192404b6c8172663ee4b4d4ecfa426e1fb003f2":hex:"f536a3b8c333b1aa520d6440":char*:"":hex:"124a327a8c22b7652886dac2c84b8997ca8a6f61c9ba9c094b5aea41eaa050a6df6cbf280259e5466071bcfa53b4ebc76c3cc4afc8c0385189a5382933aa57c89aab78dca84331e0fe8f0aab3a7857d3e13f08dcd90ec5f0684f82088ef8eb7fd67e75de43b67afc3a0beb458f5ebd61b2c779e6c539d795c667bb7dcc2b762e":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,64) #0 [#1]
depends_on:1:2
9:exp:5:hex:"fd40e8226fd13cb95ba50b7cdf0f07f7ab7037cf8705ca50":hex:"3406e70cbe16b047fedaa537eb892279":hex:"390b18d22d5ecc0b5a524ae9afac6fd948ac72d1360775a88b385aa862cce8a27f3e4b420e539bec6e8958f8c1b5416c313fa0a16f921149a2bfeae29ad2348949b29a73970e5be925ec0c35218b82a020cf21bb68c6931f86b29e01b85500a73f3ee7eb78da60078f42550da83b2e301d151d69b273a050f89e57dfc4787cbf":hex:"75aa7df5c3c443d48ee998064b6fd112c20d2d90c98e00d025ef08d1ad3595385be99de47fa627549b827c48bc79eb1dcaf2f1be95a45f7e55755b952aee5ae0748e68bee1b014a628f3f7dc88e0ebac1d1d00e268355f5101838ce125c57003aebc02a1c9d6ae2cd6e2592f52c0be38cef21a680ae35c909cab99dce9837aef":hex:"69e06c72ead69501":char*:"":hex:"6e8d661cd320b1b39f8494836fcf738b0ab82873d3903c9ee34d74f618aea36099926b54c1589225ec9a9d48ca53657f10d9289c31f199c37c48fb9cbe1cda1e790aaeedf73871f66a3761625cca3c4f642bc4f254868f6b903e80ceeeb015569ace23376567d3712ad16d1289dc504f15d9b2751b23e7722b9e6d8e0827859f":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,64) #1 [#1]
depends_on:1:2
9:exp:5:hex:"a85ab87563b809b01725764d64ba4cc6a143e2e0362f0c52":hex:"9f991ff16a3e3eb164a4f819c9f1821a":hex:"df289511f78d8fa2505afc4c71ab1d7c31a8d15d1e5fcbb29d70f0e56f89c4d7b30f1b3b4745b5d2cc7af34fb4c95461372bf516ec192b400dc8fdb0ca9fe1f30f5320d0fadf20155cfcddcf09233c6f591c1c89917e38a003f56b94a1e2429d1f2b6297db790d7dce84d9fa13d2d86a0e4d100e154050b07178bee4cdf18126":hex:"ef43629721b50bd3656b7ae31b6e4b4ba1cf2c72ed0460ee7d9fb416631ddc597e5f9aebbcf4442b95cc46e28476a464dd87caf9c1c1d6c99d3e3e059dc23f8d2fe155ff5e59c50d640bc052c62adee3aa1295b38732e3458f379e98a8dbdfed04c22a5761792e87fa67ecbcbf3b90eb1bcd1d3f49e60132452f28afece83e90":hex:"dc4c97fe8cc53350":char*:"":hex:"ff0e531c7344f0425d62d5fbedf4bc8d3d5cc80647e67b852c1a58ad1516d376d954cb8dda739f6a4df3cf1507e59696610bcb6b34340d6313028e00d7197845d392e73331aaf168b474a67364d8f9dab740509fabf92af75045f0afabc1b5829264d138820952bbc484d1100d058a4de32b4ece82746b2b4a85fb2993d4add8":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,64) #2 [#1]
depends_on:1:2
9:exp:5:hex:"f4f1e03abb927ffd0b081b9dce83a56a6dd419a6313ac34f":hex:"d1e29bb51a3c4e871d15bb0cd86257e2":hex:"ae2911cdaaad1194c5d7868b6d8f30287105df132eb0cecca14b6e23ec7ac39cc01da1c567a0219cca7b902cc2e825e30f9524a473eb6e1d4d1beff5ab4f29103b2c7522a33dd33182fa955c4f09a75196b1072a6f0340fc55a802d29c7067f05219c21857ebff89ada11f648c1f28dfbfdaab56028f05509de17e2381457ebc":hex:"0e70421499bc4bcb3851afa34cdf5be374722815abdd9bcee5f332dbe890bdc1c0210ab10667e5bb924bf3c1120e25a0c074da620076f143940989e222086d1b34a1200d09aea1f810ef6de7d8520c65eef9539fde5a6422606c588fce6264e5f91f934ede6397c4b307d2d7e07a518fce577a427fa92923cbba637ae495afad":hex:"44f760787f7bc3c0":char*:"":hex:"2199fa5051461b67581429ab19de2ccb50b8b02e12c0e1d81a8a14929f84e09d9715b7d198e77e632de4af1c08c5041276204a7ed76646385e288e96e1a4b0b0f2b1a9df7f0892beaea3cb58d9632720158f6daa4cbbfc0ebdc56ff6a5175768ff2abd24cb7669bc3fe40f8aba7869d2dd7dac86b6ebc4e4ce261edbec88db17":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,32) #0 [#1]
depends_on:1:2
9:exp:5:hex:"33efe20433c6a1ad261a1fed494961749e5bf9d35809b59d":hex:"dc94673b0c49c6d3b4611e278212c748":hex:"919f7397a6d03836423b7cac53177fcfbe457d4aa4348646f646aae1bc5a15568cdb8c96fabef278ace248aca531110a4f4f9e8ab0c32525ad816ae3facf03175232dc84addcd6065f9cc1f513966b63fd27e91a09f1921b95d6bd8f08f1dbce073bcf827847f774514b478b9d7fb5426847dd4dee6f39b5768c1fb729b32d03":hex:"cfbeb61be50def25f513346498f75984bfe797a8ad56be34f2461e2d673f6ce14e7479a59777267b75dadc6b9522599ebe5d7b079495a58ca187ec47796f6ee8c322278ad7451b038c938928adcff6105a8ea3780aedc45b6a3323d3ae6fbce5da4fb59ca5ec0a16a70494c3c4859672348532505e44f915e0b9b8a296ef5225":hex:"c5098340":char*:"":hex:"c5e47d8c60b04df1974b68a14095d9bc8429a413d21960b15bae4fd7356bf7872e0da0a1a385ca2982d3aa3182e63ea4bb8ca01410cd4e71ddad34aa1f12c1387902b3d56634f89c619a2e6756648ab3bf90e9bc945afc9140eb935b633bae96bb067e9ee421697bcf80b14b1b88dbf13e010b472a7ca5411db36848b9c7a37f":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,32) #1 [#1]
depends_on:1:2
9:exp:5:hex:"3ed5dadefa0f6d14fedd1a3cdbab109f6660896a952ac5ab":hex:"553a14f1e1619f9d7bd07cd823961f25":hex:"eb8ea81d3e328a1113942cd5efd0f2b5e7f088791c8fc05690a34584101c4d493628ee7d0099a2865ac194b9124c3fb924de0c4428d0a1c26ea3ad9a0bc89187a16673e3b6f7e370dfb2dc26e8a56a9cf91f9c2088c020a766efe0d0c91689743a603f2cd1e300a6a84828b3b515a4b9a06e6bb20457bf124cd6ce4ac8b83d51":hex:"aef617f69724e020309ec39d9587520efda68a8e303686c3a41ef700cba05b7c6e43e95aadb1a566f61650c87845835e789eb2366941e3bfef6d9846af0e0dbc43249117ad6f299bbc40669ac383cdf79289ada6ccd8ccfe329a0dc6a38eea1a99550457102d10f641cda50c21f533b1f981663f74a0a7c657c04d9fc6696ff4":hex:"dc413c4c":char*:"":hex:"bc1f34991a48aabb0fea513f790f0d223e9feac4c99fa1e8427f01ab8b4b2827cfaf239342de36051a846af0306a3f82e7aed98dd0416fb078bc7f3b617b00ceb2cea4ddafc22dd022efa8303e9804510e0e888065d8427345156d823f796f74130c06db9f9934435552b4fefd051953e20ecba3a4514ac121d7d2097d597439":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,32) #2 [#1]
depends_on:1:2
9:exp:5:hex:"6d97e8bff3923a778504fb917dbc1428a1328587047697d9":hex:"0c28dc4cd53725091c2fb68a476c2e40":hex:"f3932f5e82d75a1e3eba1591c17769e1a45819ccf057c31e76fa810b93678766d25905e859775c244e96bcafbc75c4a2d95e7d02868ccb2f65e49276f0b645ac8cf6e3758402304a3c25ce2de0a49f401b1acadaff8b57589b45cc79130ddc8387f41cc383e33ef38eec019152051c756198d6f782ccf56297b9fe944269a65a":hex:"dc1a81efd51e967767f5bdd7e2e425732c1d28451f2bf5bdf3f5a6492279330594d360dd8a193e5dbde1be49bf143a35c38bcd059f762ada65c5119e097f0976891347f4d829b087bd72daa3494b344cbd3370c4459ca243bd57aeda4cb86cdd0bf274f07830cdbf5e5be4eb9b742ddffef8aa35626d2b9ea0a29d3c3d058b28":hex:"e6d6df7a":char*:"":hex:"39327836e9d8cfb59397adcf045a85644c52c3563290795811f26350c8bce8f55ca779cbcd15479efd8144b8a39ef611153955c70bf3a7da9d4d944c2407a0d735784fcb68de1083eebf6940ebc9cf92f9f139c01404b503ff64e61126a94e881351473507884357040fd32714b872c254349071069644e2bd642905521b944e":int:0
AES-GCM NIST Validation (AES-192,128,0,0,128) #0 [#2]
depends_on:1:2
9:exp:5:hex:"2c78e29971e90a01bb65973f81260b9344fa835751f5f142":hex:"f1a23ce6e2bc9088a62c887abecd30ae":hex:"":hex:"":hex:"d4d5c22f993c8c610145fcbe4e021687":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,128) #1 [#2]
depends_on:1:2
9:exp:5:hex:"8c582d5b6a40ef0e4048ec20f0263572d7cc82704e380851":hex:"ef221a1c66fda17906190b7c99ab60b8":hex:"":hex:"":hex:"6327dcb46ffb3d0fd8fbf3d2848a8f01":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,128) #2 [#2]
depends_on:1:2
9:exp:5:hex:"3a58abadd29e946e23ca9eb09af059913d5394971bda6a4f":hex:"7c29b3196d44df78fa514a1967fcd3a6":hex:"":hex:"":hex:"fc123944bbea6c5075a5f987aed9cf99":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,120) #0 [#2]
depends_on:1:2
9:exp:5:hex:"04bdde4c35c385783715d8a883640851b860ce0e8436ec19":hex:"783f9a3c36b6d0c9fd57c15105316535":hex:"":hex:"":hex:"23e21a803cac5237777014686564f2":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,120) #1 [#2]
depends_on:1:2
9:exp:5:hex:"4ba5fba0c22fbe10c2d1690c5d99938522de9c5186721bac":hex:"2acc2073089a34d4651eee39a262e8ae":hex:"":hex:"":hex:"7ac742c859a02a543b50464c66dcf5":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,120) #2 [#2]
depends_on:1:2
9:exp:5:hex:"f12890b0a8819faa5a8e0e487f7f064af42fa6d5519d009f":hex:"c937615675738f4b3227c799833d1e61":hex:"":hex:"":hex:"88300bd65b12dcb341f1f6d8a15584":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,112) #0 [#2]
depends_on:1:2
9:exp:5:hex:"51878f3630298a81297f4a21514fea637faa3815d4f26fae":hex:"1f939226feab012dabfc2193637d15b1":hex:"":hex:"":hex:"eed5fcb7607c038b354746d91c5b":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,112) #1 [#2]
depends_on:1:2
9:exp:5:hex:"ae596e74840a600556a06f97b13b89e38f67c152f1a1b930":hex:"e2076e1050070d468659885ea77e88d0":hex:"":hex:"":hex:"b4586bdbd4b6b899648f2333eee0":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,112) #2 [#2]
depends_on:1:2
9:exp:5:hex:"fd33b7a0efae34339ca987b5eb8075385fd1276e63cc8530":hex:"2d07bb8616fc0bbb71755a1bd256e7fb":hex:"":hex:"":hex:"6b60d645220cfde42d88296ac193":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,104) #0 [#2]
depends_on:1:2
9:exp:5:hex:"5685b12a6617d554c36b62af5b8ff2239cb3ffb1d2c40e14":hex:"6c31194df99d08881fa5b1dd33b45a92":hex:"":hex:"":hex:"69431593c376c9f8052bf10747":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,104) #1 [#2]
depends_on:1:2
9:exp:5:hex:"036ae037410dae9f0741608516d03b855c9c1851df8c54a4":hex:"73599275f8237f14c4a52b283c07275d":hex:"":hex:"":hex:"6f7249d25c9f273434c4720275":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,104) #2 [#2]
depends_on:1:2
9:exp:5:hex:"ac144f39ebd6124bad85c9c7fb4f75bff389ece2e8085d83":hex:"d0871bfc3693245be478e6a257c79efb":hex:"":hex:"":hex:"5a99d59631d0e12f58b7b95ccd":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,96) #0 [#2]
depends_on:1:2
9:exp:5:hex:"a8a541ff11a1b8548e832d9e015edeccc94b87dadc156065":hex:"c72bb300b624c27cded863eba56e7587":hex:"":hex:"":hex:"ea2528e7439be2ed0a0d6b2a":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,96) #1 [#2]
depends_on:1:2
9:exp:5:hex:"30dd8f400335e9c688e13cc0b1007bd21736a6d395d152e2":hex:"28899601fa95f532b030f11bbeb87011":hex:"":hex:"":hex:"35625638589bb7f6ccdb0222":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,96) #2 [#2]
depends_on:1:2
9:exp:5:hex:"cb8f672b04d706d7d4125d6830fff5d2ec069569bea050ce":hex:"375d4134e8649367f4db9bdb07aa8594":hex:"":hex:"":hex:"70610bf329683e15ecf8c79f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,64) #0 [#2]
depends_on:1:2
9:exp:5:hex:"bf71e5b1cd6eb363ecd89a4958675a1166c10749e1ff1f44":hex:"9f502fb5ac90ff5f5616dd1fa837387d":hex:"":hex:"":hex:"a4b5138122e1209d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,64) #1 [#2]
depends_on:1:2
9:exp:5:hex:"5b9d1dfb2303b66848e363793bdca0e5ada8599cb2c09e24":hex:"2ee96384dd29f8a4c4a6102549a026ab":hex:"":hex:"":hex:"3b33a10189338c3b":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,64) #2 [#2]
depends_on:1:2
9:exp:5:hex:"a35ae271f70ebacb28173b37b921f5abcad1712a1cf5d5db":hex:"8d97f354564d8185b57f7727626850a0":hex:"":hex:"":hex:"813d2f98a760130c":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,32) #0 [#2]
depends_on:1:2
9:exp:5:hex:"9bdd0cb826d5d28c2ab9777d5a0c1558e7c8227c53ed4c4f":hex:"daf13501a47ee73c0197d8b774eec399":hex:"":hex:"":hex:"a6d108c0":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,32) #1 [#2]
depends_on:1:2
9:exp:5:hex:"81b4d5ee4e1cbee1d8966fb3946409e6e64319a4b83231f5":hex:"bc2f9320d6b62eea29ebc9cf7fc9f04a":hex:"":hex:"":hex:"a47cdadd":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,0,32) #2 [#2]
depends_on:1:2
9:exp:5:hex:"5813627d26d568dfe5a0f8184cf561fe455eb98b98841fe0":hex:"817199254a912880405c9729d75ed391":hex:"":hex:"":hex:"d81d9b41":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,128) #0 [#2]
depends_on:1:2
9:exp:5:hex:"94f160e2325da2330fbe4e15910d33c2014f01ace58e5b24":hex:"80a1b99750980bf2be84a17032fc2721":hex:"066fdd980cf043a732403ee5f65c82ca81e3fc858ad3cfa343014a8426fd3806770f127e2041efb42e31506ce83390ac5d76de2fe1806df24ce6e4bb894972a107ef99e51e4acfb0e325ab053f9824514b5941ab1ec598fbb57a5d18ed34d72992a19215d914e34ad1a22326e493d1ff2da7bc271c96ad3ab66d0c32bd711293":hex:"":hex:"dd153cfd7aa946280660c445f586fa28":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,128) #1 [#2]
depends_on:1:2
9:exp:5:hex:"4785846f7c0524e78f3eb137fd433e1808af64549af69183":hex:"5334476a5fa3fa50dcc4b12f8ac00b51":hex:"e70f82d1e3361ac5a5c9a087e47984d5533ba296f9b7e4a192a4ab28a833cdbbd5cece3415cf6fbb2f8055560b5c31c98d83d139954e1c03a464739f1eb5ad982c4371cf20b8984bbd97d5f40b336f5e96df3d272b95f7547be15c3bc05b3caac7d08c5eb5de8bdd246e74f6caa6bff76ea0417730ce72b911867f88fdcf73a0":hex:"":hex:"c59231ddaae98e0e8db6b3fe8f4d3427":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,128) #2 [#2]
depends_on:1:2
9:exp:5:hex:"49b085fe1a8e1ae769ed09fc585d29eb24d589689992e6c5":hex:"899878b0684fb865d30190821817b88c":hex:"f789eafe3d02826b619ca4fbca7bb1919e5c6f7c33824a2f7f815dc50e329979705f7ef61e9adf7899d34f1b8840384ff62ef6d29eea38c45d12be9249aca69a02222cd744d81958c6816304ff0d81d6714a2023b3dd9d940db5c50afd89c52774d28d6afde2b6c68425b6acbe34682531a2e57e2b9a7729b3e8d96a729b15cc":hex:"":hex:"2c84bf7a8947ab93b10ae408243b4993":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,120) #0 [#2]
depends_on:1:2
9:exp:5:hex:"75847588760ecb6ca548747b743914c89fea367a5ccb81b6":hex:"7d8a9fd254e2061c01e39eb574951924":hex:"b03c57dfd49152401a225357f1d6e533f3a423e5cfce07b8ae7ca9daf68645e5bd67b3ca2421eac447530b27c6dc6bd9c7f1b22441b8cc8c4ac26cec2c9c0d665a35b66d779a3772d714f802d6b6272984808d0740344b6abdb63e626ef4e1ab0469da521c7908b2c95a0fd07437c0e9d4d2451ae189ad61ff19f4efb405127c":hex:"":hex:"e8aac14b53cdbc2028d330fc8d92a7":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,120) #1 [#2]
depends_on:1:2
9:exp:5:hex:"e3a18a96d2e45d2f60780dc39cee7160e28cb810bf09858c":hex:"26a4d659665ded39b7a1583de756d0ad":hex:"83f8d9c58169b4c68032321197077ff5c8ee4ebb732b040748e1b55dcf53375ae86fb9646a672b5c5bc805a92c475cbb6d0ed689a58abdf2230250a7d3fbd8cfab07835fa85e738a7f74bc3e93616d844b1ec61b79f23dfea62e1815f295d43f61d7b5956103b31ca88afb0b3d37eb42cf77232dbf2258065232971c397dcbcb":hex:"":hex:"dc034564d4be7de243ff059b5f9160":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,120) #2 [#2]
depends_on:1:2
9:exp:5:hex:"7be3909170ea7a2ff76f9f28241d8cc48ddeafa8517c6f8c":hex:"8dee7e29350c60c5bcfec89da6617d2e":hex:"f6e9e7a7f9716760eb43060d5c80236a0f118b0f750ebd5df01fd2dba95c556ecd2e54a3f337767321abf569c8137a8e48c5b44037ba62951e9f9f709e6e4540a36d769f3945d01a20a2ed1891c415a16d95cab7ddf9bcebf18842c830067509a2a5d49a9684324c433d53824d2f8fd326b149af17f40e5bf5e49185738fba60":hex:"":hex:"942b52277e9dc0a30d737d00f5e597":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,112) #0 [#2]
depends_on:1:2
9:exp:5:hex:"1fe413bafc4753e1511b580c830449bee56e0e5b9acb852c":hex:"e30829f64f3eda13bfb2ac572aceb3de":hex:"6c772d08b4d7507e35804572fa697c646c77301954cc5c160941e49e230697ed8c23338b9f30c3ead69b1c1a2329ff025dcd3c0d0a9cc83fee4979448aa71ddb9d569bedc8c497a2a4ac3b60d087d7872f0a110bf90493ae7da03b0953734223156cd2d6c562e4a978a6dd5cdb229dd58dd4d0f50ac015f2f5e89dac4aa29a19":hex:"":hex:"87737873b82586bb29b406946cae":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,112) #1 [#2]
depends_on:1:2
9:exp:5:hex:"b4bc4378d423931f9b320bb57df584c641406c1daa7448ad":hex:"eca70e10c0358838a3f4a45c4b016ccd":hex:"68d1c045c1604e3c3dd4f7c7543240aca8dbc5266dc18c5a8071e8b09e3700b7cf819044b2722d8db92021f42a0afb295d7b16ecf4e4704a50a527a2e72d7f53617c358e3b7be3d7fecda612ce6842fcfaa68f2d1b8a59d8b8391779f2fab99f820862c94029f444abe62367c5de0a4becc359660e4a5366f7d482bdc362b866":hex:"":hex:"06f95ca69c222a8985887925b15e":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,112) #2 [#2]
depends_on:1:2
9:exp:5:hex:"1cd4414ffd24e830e2dc49727efa592e430a6a75391cf111":hex:"a08e32ad7d63f975de314ad2c0fa13fc":hex:"20a271f1f4c6bea8f1584ab39a7179ec448650e2ff67a7338d1bc9fab7f73b2ce5222cd07ded947d135d9d0670dc368f0a4b50ece85cbf641877f9fe0ac6a7e6afb32fdb1b3cd35360bb80cfffc34cfb94dbcbee9ca5be98a0ca846394a135860fba57c6f0125dcb9fb8b61be681ada31a997638ee172525c03dd13171534a91":hex:"":hex:"c68842cafc50070799f7c8acd62a":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,104) #0 [#2]
depends_on:1:2
9:exp:5:hex:"9e0ef9ed5e6f00a721a9893e1f0d9079c5aa667a4cdd2a52":hex:"5f015fd556e87ff0d0df586fb452306d":hex:"b82986135e49e03f6f8f3ce4048ded2e63ee0c31ddc84929e022ee8561159179b3bb4403ebdafdf6beae51ac5bf4abed4dbc251433417ece3228b260eca5134e5390cba49a0b6fcbbbabb085378374e4e671d9ba265298e9864bfce256884247c36f9bddceb79b6a3e700cb3dd40088ba7bb6ab6aa11b6be261a7e5348f4a7d1":hex:"":hex:"ec9a79a88a164e1a6253d8312e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,104) #1 [#2]
depends_on:1:2
9:exp:5:hex:"9bc8f15d98e089d60d4db00808700053f78b33c31652c3e4":hex:"5cc0ff9bb7d5b9b2aa06f6ecf669d5bb":hex:"24ac95a6ed2f78853f9ab20f53de47e7f662f72aea454141e2131aace7ed2daeb395bbccdbf004e23ce04ad85909f30151b6526c1ce7934726f99997bbab27055b379e5e43b80ad546e2d1655d1adad4cbe51282643bb4df086deb1b48c1bd3ac3b53c4a406be2687174028ecf7e7976e5c7a11c9a3827813ade32baef9f15ec":hex:"":hex:"9779b7c3ece6c23d5813e243ec":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,104) #2 [#2]
depends_on:1:2
9:exp:5:hex:"19afc43a4481f796d77561f80b5b2e1514c96c5d1d86e64c":hex:"d4c06595fefd4a81bbbd4b40c2e1989d":hex:"98fcca51352998d0126b5539e3fb9a238ac31c05954fc206d381909aee70983b6ab99d3f3efe8530a1c3cfe3b62756321b1d0771a5940055eba1e71fa64f29291aa5e5b0af0fcc8e6f5a02688d9e93417225eded791a35217822ffb346d3fa2809b65abe729448316be30cf661137d3c0e49846cb0df598d90eda545afb64a5e":hex:"":hex:"ca82448429106009094c21d70b":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,96) #0 [#2]
depends_on:1:2
9:exp:5:hex:"b4fc31dcfef6203fdb296cc928c13b7df56bfe6f32583057":hex:"6308a78dc8f3c90442dc52196649c38e":hex:"2567d80c253b080c0158102558551445d8ce4d5ddee2014a2be5cbad62e1717a0fd4d2059447c3151192951eb11a4a7b19a952f6ba261c87f10f4c9032028de3cc5a2a573a4e993a690fc8954daa3ec92743e7343e75b646c4fa9cbc3fceb4f5d59bb439c23754c4d9666fbc16c90c0cac91679b6ad1bfe5dcf6bd1a8a67c6b5":hex:"":hex:"9d1603799e2485a03e7b05a0":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,96) #1 [#2]
depends_on:1:2
9:exp:5:hex:"1c2d9412486c381440213e1588b6bb58b0da53300b9d3089":hex:"727ed8846daab874d5a9918b47d016f4":hex:"656430f0c1423018b5e2efbb1e32a5385c1a9a1779c4dbd585dea91edc39ea8752ebfc2d8064251a8a5ae71e1845f24a7e42c6371c2ecb31e2229d5f4923bffc21d4804575a84836f3cf90ec6047bb360b558a41a975ece111b5284dfa2441705a6df54fc66ca6cc1af9163ecc46902fac337d5f67f563fde8e8e7e64b8588b7":hex:"":hex:"05ee6ce13711535864674a5b":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,96) #2 [#2]
depends_on:1:2
9:exp:5:hex:"abf7a97569427225a4bd5143c716a22e62f84c145bb51511":hex:"e255088cdfe8ae5c9fea86d74d2f1b7d":hex:"b850993300f54d078f83ceb9aef7345bbf758f92365b6625c210f61dad4f2a2319f51d883a383a706392d3dfca1706eba585a6fac8bd4294c0bb2cb3f6b454d5c97819e8e5c926754840261b07ec4ef1f87cf281d75c187839689944230306e1903047915e086043990745864819ad713d34a244aa4e9d755fdb137105d7eed8":hex:"":hex:"0c9c17388d0610f99d0a093f":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,64) #0 [#2]
depends_on:1:2
9:exp:5:hex:"45a6df655e88bc880acff41520aafd0cc8aa8aeb8952fd06":hex:"1125e1de94970c9e7be70e58e7626ef4":hex:"fe9838a445b8edef19b3e9f33c8c0c265b3a12c97b8ec57ceb94f65ae5227177de38f1e338dccb2b24e5bd0f0eb8127f83eba0f1ddfa55198789df0cdd1d977fcb985ad9c7d51b96e749d2cf3cc7a1ec4dfcbc641a1a022d55def328e081af890a7e699f2dbafdf506389e045aa1219239d5868ba675a3925602b6fb6f6e6d37":hex:"":hex:"1c3bd1e0d4918e36":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,64) #1 [#2]
depends_on:1:2
9:exp:5:hex:"279f4f2ab4b70778fdb9ca7800cd20e323601d7aa2c75366":hex:"0f7b402560735cf03d5da58de5b6c685":hex:"7dd9a8c848bbcf5127161c8a419a436a0dad559f7c1613cdf41594e177016acb1ccf44be852185c42e7120902a42efe83855995ab52cf5c190d499fcfd698c671fd72949dc3ea7ddb874e586a3aa455a021cec7b5f8608462ca66f926aba76e60a5846d4eb204155cd3c1328da51ba35c3007b8bb394f34e3a8b81ddd2ea1115":hex:"":hex:"dab612351f75e2cb":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,64) #2 [#2]
depends_on:1:2
9:exp:5:hex:"6716ab937755684af7403e6fba5452c1b11568a9047bb50f":hex:"2fd5a446dd564619ef75b6e00905ffe0":hex:"20d261d3192996c21da69e979c26f5f937e6ea4cb7b05c6ef556ce4d86ca0fe85ec2425d274c43b5212fe9d27bb48b04e887461a9f45f524059b87eaea2e287a8d4537f338b0212012a9d4b6610e8c97dd554e0b3c3133e05c14d0ddab3524c93fd527e223b1996b4cff0a4a7438f1d54890bf573cd803941b69e5fc6212c5d2":hex:"":hex:"f1d743b7e1b73af5":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,32) #0 [#2]
depends_on:1:2
9:exp:5:hex:"7dc94b5bbd6315ad8d2b67f0c683d10cf456f822a3ebb024":hex:"6f3eedeb57dcf12bfb3cd80849893c90":hex:"ee1ff367f4b23c156e3dccff84ae4bf2b8ecec1fb5ffd25ccaa93b6c6834389bd79655bd4bac75238eb0f65d3603ecc57c8774798309e85b6677e78ed2077b712cf28795d0dc8fee994f97373a82338ef67c62378136a79a990ecbcd6367445e805efa98f9168826e57cb8dd7e7b1d5c89ad98358646fa56dd2a71c40e0275a1":hex:"":hex:"4dc74971":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,32) #1 [#2]
depends_on:1:2
9:exp:5:hex:"3bbe223e253bf272599e28af6861013ecd0c88710947ed41":hex:"4fbf09ffaffb600f0de38fb12315cab5":hex:"5388146f6479f7b3b280f45655a95b847ee27c734fb2fd91f6c009b1ab1810c772c7435d3221069f9490d251b76e740147906ac1db1c209c175b21aa10881c44fb307d4d2900aa3b1d56fb0edb9f2a58505653a17fee350e12755b9656bc65c78c1593d5cb7178e29f82209caf53e60fddf725f6957cc9718bf410c4a0229ed4":hex:"":hex:"fb845ab7":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,0,1024,32) #2 [#2]
depends_on:1:2
9:exp:5:hex:"461877813acfe6e9979eab729b52e3d192b3236758bb6563":hex:"6985cf77b75a47a3978dd6412d59200b":hex:"385551854a89ab37063ba0ed911501b3d632153c5c2992e154c0a334bc36620476f11495437b842409e0954f7352cbf288d158bdbbaf72621ea2ce75b708bc276f796c5aa7fd0071e522c5f175a9e7787deef79f6362101aa3607b4588f2e1df7127f617c6073593a1c792b959e201e4a7a43ea8b1c3af026376439ef629266c":hex:"":hex:"c840d994":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,128) #0 [#2]
depends_on:1:2
9:exp:5:hex:"09770f9114120a2c1c3cc416fe0eb8699e07141158a5bdff":hex:"cff291d2364fc06a3a89e867b0e67e56":hex:"":hex:"875e2e5b5c02e0a33e71b678aa29c15ce18ec259cf4b41874893ed3112daa56ff2a7475681b8b3d9028ef184d30658e881c908f3588f69899962074db4ddfc0597f8debb66c8388a1bccf0ffe2cf9f078dc1c93f8191f920754442ad4a325985c62de1a57a25de4e9ed5c2fd0f2c8af33f3b140bac12bf60fdb33e0ec557955b":hex:"81f1eb568d0af29680518df7378ba3e8":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,128) #1 [#2]
depends_on:1:2
9:exp:5:hex:"4fbf1c785c087ad06b43d4163cf9b9396deffd3712856379":hex:"1c8f41424acaf009996ceaa815b24ad4":hex:"":hex:"96a690e5319c94d94923988025307e543f16fd970aec24524cf9808dc62b093359287251503f4231bf52cd1a16a80bfa82d8f585d96855dc1932f4919a92da2618d6448fc18a234f9acb386ab4ab4a9e38ea341e7c54faceff38c162d74e7fabbca13aadb71e9c8ae6072e7bef4073cf08aa7faaa6d639f98d15bad4ed183ced":hex:"9f3c0349c5a4a740a82d6d63bf00fb17":char*:"":hex:"6100b091e52366fb422251d9b68974b6c666a62a8bb77a1ffd7c7d1ae586a6ee763b84dc11aace02a25af91d194b70b3265ec46872fded54275b7ddb26ee1f20c857328f46a694fb1dce68bcaecbd587ece5b505d658d57d50333e30b639eea1f6537b37c175f62497c6c84e3cfddae214285d2d68d90dd5cd8ce2273d25c8ca":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,128) #2 [#2]
depends_on:1:2
9:exp:5:hex:"3e0ce4fb4fe4bb2fdf97b23084ff5671b9b899624184acef":hex:"a950ab0dd84115e3829ab0ad3bbb1193":hex:"":hex:"df89974b1534f0ba262bbea5efe39d8b72820cc8a720cc99520fedbf667515c3f6d8c3e25c72c48c1cff042171df58421741aacb2a49f23167257be7d7004d56b14901b2075eaca85946e9fbf1bbf4ae98227efc62bf255a25dd0402d37c67ba553531c699dd89ff797e7a5b5b9a9aa51e73ca2dacfda0f814152aa8ed8c79f9":hex:"25cfde73e7a29115828dfe1617f8b53e":char*:"":hex:"847b54e176ccc83081cb966efc4b4a3bf7809ce0b4885009f620f61fafcaa78feee91a835ae6c1a942571811108b1e81b4c4ddac46aaff599c14988c9a1fb9f387ab7f1357b581568b7b34e167ac2c8c2b2b8a4df3fd7ad8947a363c1c0cb782ec54b1901e928821cf319669dd77eb37b15c67f13ad787ff74312812731ca3e6":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,120) #0 [#2]
depends_on:1:2
9:exp:5:hex:"6be3c66b20e5e66ababbfba1b38e5a716eafce23a1767b69":hex:"3a2acf69bba19f5d1d1947af2cfda781":hex:"":hex:"de1cd978354a499415176f260021abe0a8c5bc34d166f53d20e02e413e1377ce4ef5d7f58337c62251a3b4ddea0dea23c40e5de037fd5dd8a558eb53bffa4e8ce94899afa8284afab503c1a485999a154d23777f9d8a031b7ad5c6d23d6abbe3b775c77876ad50f6bed14ac0b2b88fb19c438e4b7eb03f7d4d3fcca90dd01260":hex:"f826d212f7c1212fb8a8bf23996826":char*:"":hex:"fd1f7b56e5664cf4c91e58f7c50f6c5e98e42ca2e4adcc00348cee6f662b382ad4022da54a47d8faeb9b76a24dfc4f493c27fc0bc421a4648fad7b14b0df95d8752013feb033b1fd971daa2c9a5df898bece6a3b8fa078dd130071df20a68cd0f394be25dcbb3e85bdfa0df4797fa6f01f5f0da7a6e86320207ddb5b3be53ae0":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,120) #1 [#2]
depends_on:1:2
9:exp:5:hex:"d16abb9f5b38d7f5abba9dc36995ce6ce928ed822a07b7c4":hex:"3cd95429c6de1d327b9eb3c45424a87c":hex:"":hex:"e72f29b1fc1dbfc2d93a0f3b79ea4b9806ce9b2c4d490ac5c0c3c793df9dc7df5471e834b84d18afa5a7516f9a6a813a9b65ae2f083a854730547e28a1f60fe97d8dba1d2d433e11847b9bffd8873ec634e64365530c905dd6f274e45c9795ac127a6f356f63cc6c116c5dd8c628e7e17e1fadc58f8452bf21f53c4133198118":hex:"13521236f190f78e75c0897c5fb237":char*:"":hex:"cd8bb97c28df092b6783ef653fd26f2bdc27c442bab0a4c7bee2789f389dcd1b280c0231672721bfbbc939a0449557678ec61ba0afb2e5817e6f7d94387f84ecafbfa1216d65e7f5025f47b0d2905cff7c99adf8306a3d9850c5908be05f87cb1d36a4837dba428aac97d7fbc18e3778f8d81a319259504c87fc94bd0766ed93":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,120) #2 [#2]
depends_on:1:2
9:exp:5:hex:"0bc344b1a4078807e5f53a6e7e1e36fa83108473ae2fb4c2":hex:"bd505fcba464e6e2c58fdf29f5695fb9":hex:"":hex:"8bd73f94c71e3765bc7d17fdc90a9ba6aff9648b46300e4048985fbbd7c60c39c3766f7c524780bfc2296dc11e1132134921760a373104edc376eab6e91e9a60a5c4a5972935df12eadae074722bdc0147c3caf6a62fd449ef37d76b65f6d210283c94ac524cf13186e444d80a70b01e4373cc0462546f1caee6b49e738a742c":hex:"8510fff71bb879f56ea2fe43f6ff50":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,112) #0 [#2]
depends_on:1:2
9:exp:5:hex:"c8097398fc21f93eea6a95aa93a3231096817b65520bc549":hex:"776248381941e16908f52d19207881f5":hex:"":hex:"80b0abbaebbd537a0810ed75cd172d29d50f5982e4d01f8664ddb2dfda8f57fa0ed87e64a779a1d7f5e568b6acfdc739572a7176752307b430fb1fa1c3c2c346477cebe7d01b16745ca6c8929a7f446c03ad9a9e8a5a935de78ca6c701e8c1c5e6d2550c42949cf5342fb5ef4c6ab9bb02ace8388b16edf72a1237e5d1d0e820":hex:"7fc4388b2f8eab0f0c2d6a08527e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,112) #1 [#2]
depends_on:1:2
9:exp:5:hex:"76d4bb5694faaf344db83bc6d6c47d56bb6ab52700826f2d":hex:"603977845d82faccb401817ecce6e2fe":hex:"":hex:"9e31fda6a171f0d4a5f2af2c4f827b1312d9dda5d78fa329b8f1b6373b9b29be358601e5bb0d0c615aef4b9e441c811219f1f2ff2d0ab23e0cd829a88b5b615ee72e5e3ea604fa26cc6438ec4c30e90f7348e9116adf8e8efb7498320d2da16679fa546b1aa9afc7720b074c4e48e06862d41428c9e71a4772c2e195a6f36978":hex:"c955a3bc316841be07e406d289c8":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,112) #2 [#2]
depends_on:1:2
9:exp:5:hex:"a3e5020695587984074d78d9c98b8e1a5719e5f88372740e":hex:"4cd56de54e5140a587be7dfd02d3a39e":hex:"":hex:"c0bfe3b2dc4dad17ec5a7662d86847fb67e582cc0baf469bc9baa7a075d48a8b97521a1072c2798bfbdae5ca3752eda1cb96fe5cf24af989eb77a2948aae3d8b70d83d93f84c49347f788480f34051621c358c03cf8159a70fc72cb8bc02876234ffe76b181da8b22b8796c87b0904da1af46de519c20d8d1b1dc7cc24e39ba5":hex:"1a29527a41330259f918d99d7509":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,104) #0 [#2]
depends_on:1:2
9:exp:5:hex:"afe986ead799727063958e2ce13ca846f76c51605439f839":hex:"f85a95ed10b69623162ab68d1098de94":hex:"":hex:"7c1b354a5bb214bd95147e32d81e658705089c38035d0ea423eb1a5c82f97443c6903d2cf1ba7a007eec7c8ff98b8f82b073d9636a79bd47c7f2f639a8eb4e92076f9ed615766f43ac3a4f1687301ed7d507766605e0e332880ae740ab72e861a2cb6dce1df1ff8be1873d25845ee7c665e712c5bbe029a1788634bce122836c":hex:"3cf1cdb4a4fdc48da78a8b4e81":char*:"":hex:"a7f252ad7983e7083260598051bffd83f40f4d4a8b580cc2388d720a0979dde71549ddcb86b0a62c4964fca591d0982f3a203f2f8884ff4991f17e20f759ea7125ba2bb4d993722f23938994eb2709c850f33ed9889e5a3966f9d7b76add46aedf230e8f417425f9db79ccd46b5660361de7c5d87f71a9d82c491c0c3daaf56c":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,104) #1 [#2]
depends_on:1:2
9:exp:5:hex:"2cfaa215841826a977ae6adfdd993346210c49dd04d5d493":hex:"537a4ee307af3072e745570aaaadce34":hex:"":hex:"e8eb3b6edd0ca4201b49a6a83036445aba1a1db040f3e74511363bce769760a9914e05a067f555ca15a57c6e02e66fbe4e04dd8c8db8d6d14ebc01cc7d84a20ff0aacb69bb3679d6b7d9d2e07deda7c2d4fe4c584fe1166e78d21dc56b9cdad93709c03b9145b887f87b4f605f24f989d5e0534fc71a58e8a8619ee99f69e5f5":hex:"df01cffbd3978850e07328e6b8":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,104) #2 [#2]
depends_on:1:2
9:exp:5:hex:"128ddc83d2170c403a517615056dceec0d19d6fd7632e738":hex:"5124b410c43d875eca6ce298c45994a7":hex:"":hex:"cfe9f7797ee37bfc4f564419bf2268c964479efa7435970874154432930f3b2736438da4dc9c76200009651340e23044bc9d200a32acfd4df2e1b98b0bae3e9ff9d6e8181d926d2d03f89768edc35b963d341931ac57d2739b270ce254f042b64ceac4b75223b233602c9a4bdc925967b051440c28805d816abe76fc9d593f5a":hex:"56ad9c1653f11a41fd649cccd8":char*:"":hex:"cf91f087fd7faf362caacf4a68cff51ec57b3075563e4ad0955df20b366e92bd75c3762cf4a6f0eb859872667a5c55aa5d94f5ac9479b1b9c9345b50f82379d551506a2ab02b0441b14b28b78a12b38500d703a8c19888fe612d4710eec7cd18c16d6a4b55d3c69760e2bed99efc8b551dbe2ac9b9b64715f87180b8e14d1795":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,96) #0 [#2]
depends_on:1:2
9:exp:5:hex:"98581c28983c4da321ce0c419cc0d476d539e77da513c894":hex:"ff10234524433b871202c2cca6acb194":hex:"":hex:"bdef5b65b5111b29e781a6b71a0160179c52b5bccb1ac5c0377b26cf3f61432f3ccd67633a836357c24b5099db0510a7f8110f59e8227cacd11f17ea1798b5d4d68902ca6c6eccd319fef14545edd135078b38d43b61c9af269fc72f7a209ba7897e4c6dbd21bb71d7e93d2d2426ffa1557cae28e74059d3baf06ba419a47b39":hex:"984943355a7aef15c4fb8033":char*:"":hex:"808e28bfd441cb8890416a757d252c986daa8d607ac9cadd2f4fd29eddbcf3b859ba298e14a4ccefe2c2752b123f87b98d6708fde48faca4bc7dd818a7ea76cfa4357932e59cb6be0e9283bdfb49454b86b9fd04aa8cdef503c65d13fcff42e9cd8f142f8c06cf7daa6d8ef8b9c9d69c39e8afd980048fecf731fd674b2a814b":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,96) #1 [#2]
depends_on:1:2
9:exp:5:hex:"167b8b6df8014c8f3de912b77f5a0c113580aa42d785298f":hex:"49da91e926091a448d57d521cc90f3c0":hex:"":hex:"4f787de12ba907a589edf74c8e7a6cdaaabebddd465a86e170e1efc289240298b516fddc43c7fd9bb1c51720a4455db4dd630b59aebaa82bd578eb3cb19f8b23ee6897c1fefaef820430efa6eb7d6ff04de4d8b079605fb520b0d33e96c28f0cd71983c4ce76c0ea62fd7209d21ec7b416881d545824a73d1f9f8d3323fdb90c":hex:"99198f55f9fa763651bba58e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,96) #2 [#2]
depends_on:1:2
9:exp:5:hex:"71f5f8505fba62f08fa0557dd5407fc83a852c6007ccecc8":hex:"b5efb9feae3de41b5ce9aa75583b8d21":hex:"":hex:"3e19ec02365e450e946123a3362f9859352eb52902a6bcb8a782285dfac9d2b282f56302b60d6e9f53fddd16bbf04976cf4eb84ef3b6583e9dc2f805276a7b7340dec7abde4916fb94b0ed9c9af6d4917b27e44d25f3952d0444cd32a4a574e165a23fa8c93229ceb48345171a4f20d610b5be7d9e40dcf7209128f029fed6bf":hex:"9604d031fa43dcd0853e641c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,64) #0 [#2]
depends_on:1:2
9:exp:5:hex:"4cdb38f8185a4186fc983e58a776a6454b92ecf0bffefe98":hex:"aef257dd44d14d0bc75f9311ef24e85a":hex:"":hex:"1ca72c50a093076e9a9dfa09888b9c89eb36a942072fc536a81713f05a2669b39fdb2871b82ca47dcaf18393ca81dcb499aafcc4ed57ea79f8d4f9bd63540610215b2c65481b294638cec41264a7fdca4230df5fe1e7e3d8d26dcd0c435fec8e9bf778f9e6f13482157a9722761601e08425f6160d3bb626ae39ee1117b0353c":hex:"d951becb0d55f9fb":char*:"":hex:"2eaa7e922dbd8963e2078aae216636276f3f7cb5d7f35fa759e91bddb6e247a93c388241ba1d0d37040c0b9e447c67d35b4991c1acce97914f3bc22ee50171bc5922299983ee70af79303265bc1ae1e7334202460618b4a8891d1a7eaaac5cac1e4dce024ce662d14849993f89e771fb873644b552120fd346250df39aaaa403":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,64) #1 [#2]
depends_on:1:2
9:exp:5:hex:"ee8d3aced3aa3cb2166aa66c4a252c12dc0978830d0bc75b":hex:"c15c9c0b0b70c7321df044bfde2b15fb":hex:"":hex:"ee69b2421d43a9f383d99f9802ba4d6cf1c537b42041c86cce681049bb475e5098d4181f1902b0a49c202bf34ef70ea7b787fa685ab8f824fcc27282146d8158925bfef47ccba89aa81c0565eacb087b46b8706c9f886b7edf863701003051d6fb57e45e61d33412591ec818d016eec7dee4254636615a43dacb4f1e6ec35702":hex:"c5c9851a6bf686d0":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,64) #2 [#2]
depends_on:1:2
9:exp:5:hex:"4a8538d609444e3197ab740cd33b66db1cf53600096b94e0":hex:"0bd64d222532dae8ab63dc299355bf2a":hex:"":hex:"8c2b8fb775d1b21c41a3dcf48ad6d68ab05be3879f9b94b305a6ce4d799e3a992c1c3a65a3e4eab563edb57424927c90c76e49386e29dd5e7de2800fcc0eefbc8b4f977f71be3754c006ee93dc09b1cfa59c424b6b3987aeb56feefc21004c63e8284b6845e395bc8843cca0917267fb4a8f2db1f7daafe7a9da95083a44de70":hex:"3477cad1fd4098b2":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,32) #0 [#2]
depends_on:1:2
9:exp:5:hex:"447f0f065771b6129952e52206a64fe0844658ed685e39cd":hex:"37e3a300542d9caf3975c6429cb8a2e8":hex:"":hex:"fea5d227869e527882c63a68a6623f4a699df82b3dc715c7260a5554336df8376744c05ae89ec27d40da02d9f1c5e9e29405579fd4132143cb21cdbe3edfaaab62128ecc28018725c8dd309d2376223d2e2edfea9765699b2630ff5d9fe9bec416c0ca6418b938d195d31a08e4034c49d79e3a249edd65f985230b33c444dd02":hex:"06bfca29":char*:"":hex:"e1bdd1c212b159b87e41a5f64dcba6b27aa0f5c8871fabfb588df0e06bd7730ec1beb0e3388f96c992a573ff69b34870f83c53fb65b420c1c6f92e2aa6f03917e8203d77c7f5ee08baf9fab12f9d38fc0ffb83807ba781c3dd7b62edca2121f68ef230b42b8adbd4cea072209d02713789ed559b83739a54cfde69e68bdc4128":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,32) #1 [#2]
depends_on:1:2
9:exp:5:hex:"f465e95f6fc19fe6968b98319b547104d0c01c17105f8fc0":hex:"6cba4efc8d4840aa044a92d03d6b4d69":hex:"":hex:"2426f108368a00d2a49670a3b64b4f0569c6da9660163e7b209ec3f8d058ee11f7818a8c5030c5f4ce6e1e5a93faa3e5ae3d0bd5d712fbc891cfeb20845707edcf5e29719a5246a3b024fb12d37bd1b81df3812fd50b1dfb3e948ce546dd165cc77f903c07fe32bc7da7fbc25036679017317ce94cd8a00c1bce7379774f1714":hex:"92750ac9":char*:"":hex:"2e59b104c1a6f6d651000396adbfa009bf4cf8cbf714da8e4d3b4a62bd7f522d614decf090c7552a4b9e8d7ee457ba642d5100c0c81c14cbba8c8ff49b12827f6ebd41504ccb6dfc97cdf8532d1f7f7e603c609efa72d2ae0dce036ec4ab36849a0c06f8737d9710075a1daaed3867ca0a7e22111c0e7afae91f553b6fd66c6e":int:0
AES-GCM NIST Validation (AES-192,128,1024,0,32) #2 [#2]
depends_on:1:2
9:exp:5:hex:"f08e3e9f7b3a20ccdc4d98b56f2b567399a28a6b3908deab":hex:"4f4636d1b283bfa72c82809eb4f12519":hex:"":hex:"a986e816f1eafb532c716a555cca1839a1b0523410134ea0426ab309520b339fc1fdeb40478ae76823cee4e03b8d3450e6be92d5ff17b2f78400f0176e6d6a3930bd076a7a3c87c3397dcc0520c6b7b4ff9059ea21e71c91912a74aac2ca70eec422b507cc5c60860bb8baca01eec2a3003970ba84011efe576804b2820e306c":hex:"16c80a62":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,128) #0 [#2]
depends_on:1:2
9:exp:5:hex:"87b5372571fb244648053c99405999130f87a7c178052297":hex:"a1cc81b87bd36affe3af50546e361c9e":hex:"684ce23f59632308d7db14f7f6eddaf4d83271fb0c27401b09518a775b36252540f14305f0dae13ff6c0dc565c9e570759e070c8ac73dfb97abd3285689a7cdcfc941f6271be3b418740b42ba4a114421065a785be3dfa944c86af56da8209779e8736e62529c418b507c6d8ae002cbc0431747722afd64521734f99273de455":hex:"ae078d1554fc6a14447a28c3dd753e790f7ef9b53e35c3e0fe63a7b1b326bc56034847f8a31c2d6358049aae990bfe7575b439db370aa515e225e0ec730488c700a7b0a96a7b8e4e8e4c6afec20decd16fe3c0f3f8d7a6cf7a8711d170829d14c706cceb00e133b8c65c8e08cd984b884662eddd2258ce629abf6b9dd28688c9":hex:"98177b3428e64bc98631375905c0100f":char*:"":hex:"8be7df33a86b1162464af738de582a357d0ce8e213bba1b7913c0d13ad759d62c3bf4366f5130b3af2b255b7ad530b4977627f9e76b07e360c079d0f763dabbd22e976b98cd5495c6182f95bc963aad4b719446f49d3a448d11cac5bfcba4b675b8e4d88a389e2580e8f383f95bf85c72e698680d2a2bc993c9ee1ce0d1f1ac3":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,128) #1 [#2]
depends_on:1:2
9:exp:5:hex:"a2d069b826455d5e79e65db4f1d2b6a29ae9f401bc623917":hex:"6d40a0c7813bc0410ff73f19bb5d89c9":hex:"9960376b1898618d98c327c1761959d045488cc6198238bbe72662f276d47b41e8aebc06dbce63da5adcb302a61ade140c72b9cf9f6dfad6ecedd7401c9509fae349d3c7debe35117776227ba167f2b75921d7321d79f4ebca13d20af1638a1567043365f179f4162795fe4fd80b5d832e4ca70e7bf9830bc272b82182f70d2e":hex:"acd6225dc5b9109d56ea565ab38dd4db432a7ec08f0db04f1c6b691c96d2eaaa6be62da7cc7fd75f931716c7f39705ea7cf828f1a5a325955e9b2c77e7fb2d562be6a89b3351b1b3d1355b43b73ed425049430314c16bf0836ed580e9390a3b8e2a652fddbfa939ca4c3c99765b09db7f30bf2ef88e1aa030e68958722cb0da3":hex:"010195091d4e1684029e58439039d91e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,128) #2 [#2]
depends_on:1:2
9:exp:5:hex:"f3252351fe8e7c628c418c1a49709bf1f8e20add82539948":hex:"eacd2b1c3cf01bf4ea7582d8ee2675d5":hex:"141cb39a2fb8e735e0c97207f1b618a4b98f6b9bf8c44a1c8e9ea575a7759cc2a02301274553e7744408b2c577b4c8c2a00e18f8717fd8a6d2f46a44eeb05d685fbef7edeb4229e7ea9b8e419ffcb504d33583b3ae421c84caeca9f9789047dd7b1810318d3765307233567bc40e003401c9f4e1b07a2a7162889e1a092aedc1":hex:"7e8d2816d280c91d232bad43b6610e2d0532a9f670f221a3a975fb16472c2e83b168115e87a487bcd14b37f075e1faa59c42515c353cdefc728ac617b7d273fa96778e3fb5f7a1132f8e2add4a57015b15d1984338b7862356243d1c5aa628406f4a507498eda12d2f652c55e8e58113ed828783b82505790654f036b610f89a":hex:"63a310b4f43b421a863fb00fafd7eac4":char*:"":hex:"699c146927ae29025e5b20088b20af27bc75449e4725ee6b7d5dc60b44ba8a06f7d265330c16060fbd6def244630d056c82676be2dc85d891c63d005804085c93ce88f3f57c2d2c0371c31027d0a4a0031e3f473cb373db63d4ff8f65be9ebe74045de813a4e6c688110d000f6b12406881c08085c9348e1f0315038907e33f7":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,120) #0 [#2]
depends_on:1:2
9:exp:5:hex:"e462957f2c500bf2d6bfa9af97938fdd8930e360ea4175e7":hex:"b380584a3f4e0e59add4753c282f2cf7":hex:"682b0af6592eef173e559407e7f56574c069251b92092570cbb7f5a2f05e88bed0af48dcda45b2930b1ee7d5da78dc43ec3598a38593df7c548058eda3c9275c1304489aff95f33a6cd79e724e8d12ca0ae92b20273eb3736efcd50dc49e803ad631dcbf64376a45a687eb4e417aef08a3f5f8230d3f0b266ea732c21ed2eed7":hex:"82a7a6dd82a5ea3d9a8e9541d854978487eda298b483df02b45c76b8b38bac98ffd969dd160a2765595b19d4ea3e64351ce95764a903f595dd673d13facf5a5594e01be1d60a0c6d28b866a1f93a63a74fecb6d73ac6fb26b20c008b93db53e9dc1d3e3902359fd47734fe22a5c6958f97e9001cc4e8b6484d9542dbbdfcfcdc":hex:"28a43253d8b37795433140641e9ffd":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,120) #1 [#2]
depends_on:1:2
9:exp:5:hex:"4a62ddd87f41c6df756e8da0985dcd8c91e73ba395b3d79b":hex:"1d1843e2118772d76a0244a2c33c60bd":hex:"028b92727b75b14cb8dfeb7a86a7fec50cd5de46aa4a34645754918b8606819d4bf8a2e7531a05ae5505492ca6cbc8c0e6d6ab2dea23bff1fdf581bb780b4a3312aa39639383fd10bcf92489801954733f16b021c2e84809345216f8f28a99773341e40c4a64305a2098eaa39f26a93bd556c97f02090e1a6c181a4e13e17d3a":hex:"37a83ee6dbdece212446739ea353cb957b9aa409c88bee042bbc3a6e5199aeb28f2b4b00ff433c0c68d6db5a197566019db8a4c7a792e2839a19a302ee02bee046adce04c1fbbd5b0c457d7cbe277992ce2c153d132269e2d1f12b084cf3026a202b4664bc9d11832e9b99c7cc5035dcfde5991dd41aeb4fbf8bec5126a9f524":hex:"ab738073228bdf1e8fd4430b5c7d79":char*:"":hex:"e702f1bb9a1f395c74fca0ce9cdf29e7332c14acaca45200cd432a5767be38929ef8de43d0e1a5e7300c1eb669ac1ab997b31cb1403af8451e77e63505920af0f8c3abf5a9450ea47371039ba1cf2d65a14fa5f013b7ce1d175859404dcf6461a36e8bc260e7abf739d8951ddf1a3754e2d65e0aa31320a5ffca822023bc0906":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,120) #2 [#2]
depends_on:1:2
9:exp:5:hex:"fc46976d38a581a7042a94ea4b5bfe3587ddc65d1162d71e":hex:"b5e92563dd0339df00b7ffa2239d21bc":hex:"7b6f6e104acbcd7188161477d8e425ff99add22df4d22de7f28d0a0075ca4ef848f68d07ed22d3165c08e40890ce04d1bd05b1a6ccb2fec8193d5f7dffc93d97a0c036b3748f708b011b68247a0249b9e1a60b652164e5c2fd7210377de804ac010c8aa08a11f40af97e8370a59f936cd14c22ea7a236d904145adc04a241fc0":hex:"4b9e858fc8f01903e426112192d4ae4686b1ae4d683b75afb2b8c63590275943d0d6d6a23b6d35796a2f101203acba107474ca6f4ff6dd87d6b77785ad1d160ef2755d84092dc70c86db5e639b689943b15efa646aff44b3f51f5d3f4cf6c8f7fc5adfe7bf2d72f75b93b8ee94ef3fa69ea0fc0bb77b3983901fdcd30bcd36f5":hex:"d4356cb417953b01f7b1110c8aa3eb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,112) #0 [#2]
depends_on:1:2
9:exp:5:hex:"403e49feadd4db763652ed5c4b1e12680cfe0abc30f4696d":hex:"1a60258a56e15f92814b4d372255a80d":hex:"a4ffa9e3c612103224c86515dad4343cbca7a7daf277f5828670834f4d9af67b9a935c71b2130dfbc929c4409bffb7974ffa87523b58890770439c33342880b33319c626bf776c1c0aeb9c2a348a7681572f4ff711d94c192f3450e8b1275f9d02c742a2c9f1da316e9918bf787f22699172986cb9b10fc56d5f6b8392ff92b8":hex:"221c61d769febce3913bfead9a201a805f11005ddcac185cbae00ce749de9c4362889b1b0d9546e91598e0ddedb88b673a90acca65d7e71a85636be052f361839a646dc8b834c02f3e2261d370e6bac9636b7536225b5ea77881200c8a3450d21bfd1e11afb3a470e178ecfe944a25a7cd0254e04a42b67723aac8afffd56fee":hex:"62646fc8bfe38b3ba6d62f9011e3":char*:"":hex:"5c76c90dea7d659804ad873960906259fbdda3614277ec575d9eec730e747a2e7b9df6716b4c38d3451e319eeecee74d1f4918266fc9239de87080f1ad437b47c6904ed2d5514161ad25e3e237655e00e53fe18d452576580e89b2f1f0f6aa7e40a337fd8c48d690fe013a67264a80e9b5dfd009a9152d559aa02a68f401a09b":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,112) #1 [#2]
depends_on:1:2
9:exp:5:hex:"c3471259512d1f03ce44c1ddac186e9a56c1434a6ac567c6":hex:"50164c63d466148ab371376d5c2b6b72":hex:"11d1f523888bea1fbc680d34bc9b66957d651efa59e788db3d3f6f50e72184b9d14e9ff9bc05fb687520cf423d681812e007025eedf0e78e7e8191e6b62404e8eb400cf837d762a31aa248553367263d6de091fcf7abedc3e69fc118b7efb0594c89b96c387b7c28ed9a7b75db60b6b5133949b891ff81eca5790a265f12a58c":hex:"dd5b98b3b3cf03fb92be579068a885afd984630692eb5f155fa6b49f2b1690b803d34b90e8de3cc39c2e61650ffffb51e7ef36d35ad17dc4d91f336363b0734996b162b509c9954cab3dd959bde7e437e9100d84c44104c61e29dbe12492a0272ce6eea2906d390de7808d337e8c650b3301af04a9ed52ab9ea208f3c7439d6c":hex:"6c5f38232e8a43871ab72a3419ad":char*:"":hex:"50438ee712720abf2089331e4c058b30c30c3d17834c507c0010ac3f974a256d01b14a45e9ce5193c5cede41330cf31e1a07a1f5e3ceca515cc971bfda0fbe0b823450efc30563e8ed941b0350f146ec75cd31a2c7e1e469c2dd860c0fd5b286219018d4fbacda164a40d2980aa3a27aa95f8b8e2cd8e2f5f20d79a22c3ff028":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,112) #2 [#2]
depends_on:1:2
9:exp:5:hex:"ec326a1e0fe6a99421398df4fc7d8fea67b67e5f5fcd50ad":hex:"c94aa4baa840a044dbd5942787a0c951":hex:"f8401c578f20d9c250ea86eb945184e007a0190462c7abddf238ce1ceddcc230756aa222386d8ba66ebbba13de008ced140896ac55bc47c231cc81370ca9feadc225e017d59890e6291cc4cca27db3078c0cd6cbb51afb62210226a76837c5454728cb5ce3afe7352e7fe75421f94986e6b7b26321bbca15c75ac7c13dc15f50":hex:"6d5016c434a0f4b4a5d9e0b6b8e2d848a94f132f055d2d847e54601a4c9cfc5966a654d696f8a3529a48a90b491ea0d31c08eae8ef364f71f8ec7ae7f7e39bb9c331137b2578362ff165628099944ba8deb0d99ac660d5ed2215b9a7626ff1fa6173cd8dd676c988d16c9cf750a0d793f584c3c8f5fd5d167bc278f4d77a629c":hex:"3269922affb9d767f5abe041cc8e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,104) #0 [#2]
depends_on:1:2
9:exp:5:hex:"a7ef81652f604e88a72416924c53979dc73cadd3575eda1c":hex:"0cc9ae54c9a85f3e9325c5f3658ab3b2":hex:"d0195b744351aa25a57a99df9573dfa3cebe9850139149b64f7e4af37756a430dda8af98e4ed480e913aa82821c01c1f75b187e105a8f39621757d522c083a8d81d7d8bfe6cf15c439d0692b6affd655a11bcd2457046fae996a1075c66029867b88cd23c503ae04037dd41f27bafd5000d1f516002f9fcc0f2500e8c1b27de0":hex:"9ecd19a8eba9fba843486e1bbfb8d9053c5e04b24e30174d4aa89d8307439d653f8630edddafd51719c744bcb4bce3e444847567bd2cdde2995870d0634cc0ba2bde4b6bc2bc583062fb83874a1c25b50aeb945bd109a151772c077438c4d1caaeb5b0c56390ac23c6d117f3a00fd616306fc2ffc4c1e76f934b30fbbc52eec2":hex:"22c2efeddfd5d9cb528861c4eb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,104) #1 [#2]
depends_on:1:2
9:exp:5:hex:"605271a41e263c92dc14fe9df5203e79d58cc2d1289dc361":hex:"7f128092a777fc503adc7f6b85eb2006":hex:"aef9f984fb645e08d5f0aa07a31c114d2f8e9eca047e4a8d5471378cfc2ced1159dc093d174788e58447a854be58942ed9a3fd45f3f4a1af7351e087369a267797c525f134e79709097e733b9003b9be0c569fc70ee3462b815b6410e19954ce2efac121300c06fd9e00542a9c6a5a682fe1010c145acbbb8b82333bdb5ddfd9":hex:"2bda3448a283ecba31e0299c0a9e44628cb2b41fa7b1a41107e107cabc381083bdbe048f2804568fdd5fe016f4d607f694042a459ba03a2deda4cccc8cbe4612d8ed0d4575e48bc9f59843369dbe2af6d048e65ff4250e1eef61d7b1b378fe2f3305b133ddc7e37d95ca6de89a971730fc80da943a767ff137707a8d8a24329c":hex:"673afea592b2ce16bd058469f1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,104) #2 [#2]
depends_on:1:2
9:exp:5:hex:"fa076f36cb678e2275561e9553ebdf397360e5a5e44791c4":hex:"1ecd53d94fe287047ff184e8b9b71a26":hex:"5ff25f7bac5f76f533f9edffdfd2b2991d7fc4cd5a0452a1031da6094cd498297fb2a05ae8db71cb3451e4ac33a01172619035a9621d2d54f812ef5343e14b9dedc93838e4cf30e223d215b4d2476ea961a17ac7295069f25b2a12d6e2efe76d91f45632c6d4e61ff19a95d5ae36af960d95050ce98b5791df0b7e322411c884":hex:"513305e86c0cb046c5d3720b25a406392766bd1fb7de2758de370ff2e68281e211922890c61f3659460f22c45a57895b424441262a3ba0606df4e2701f38281fd3436a4d0e0f8efecd231808a9ea063dfb725015a91f27cadfe7909a0ee109eac391ac807afed1767ae0515b9c1b51ae9a48b38fe7fec7fe0ddee562c945e5ae":hex:"079e8db9c3e6eddb0335b1cf64":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,96) #0 [#2]
depends_on:1:2
9:exp:5:hex:"ce9dafa0e7e53a8766fc0bc38fba807d04e14e5ed61bc234":hex:"fd0751af49814ee98b2b0cdf730adaa6":hex:"1cba488a0fc8a012f9a336cc7b01cbcc504178eeb08237dbedbc6c7ac68fdf3a6742751a207e43d43068abf6ef4e12a5e3c17e5a2f9398fc04ced67377cbb858fd6020fad675a880adb249e4aba94b96efa515d1cdf5c0c3071a27a3245968867ea94b2bfc2028a67be34c84c3f475944497aa8ca1ab009f8e4b11c8308c1996":hex:"b585b8bf634757dac015f2f69f2ae674372a664f2115ad2d03bd3e0c335306b02d0947d3cda5991f5c0c25f12ead2c3cc2d65d575fd67091c70bc93ddb4b1e21f7b0fc6e6ae652dea93a6564ff13489f927942e64dd94bf8f821c7ffdef16df58bd8306a957821ac256da6f19c9d96e48eee87f88acb83bae05d693b70b9337b":hex:"e5dc92f4ad4000e9b62fb637":char*:"":hex:"95f4324b0656bef19eca5570548fc6a7a9923f4e2a7e42066891bc132fd73bc1c9089755d996756de0072824e69c43f2db8ba2bf6f90d3c4eafc0721ceaccce1af896f9fb15fb19c4746979b6d945f593fad61d550f81d12b5945ed728c02931d7f8d917285c22a3af748d75a6bf163fddd84b941d8564c1a63192c816ad6d6d":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,96) #1 [#2]
depends_on:1:2
9:exp:5:hex:"8a328554fed68dc4838fbc89fd162c99ec105b36651abbc9":hex:"e4f7c69a1d026eeebfc45e77bd7b3538":hex:"e349dcedb0bfcc771c820f0d510b80cef32ae3326484e25aa183015941e7844bc46f617d5e61fd64fa71759e90fcb72ae220bcd507f0fb389b689dd3fa29b3b937eded85f26ada9e0f3f5109f82fef47c7eba7313049750ad17969e7550c0d4093ed18ee27843d082bcee8bf3fc7833d569b7723998595a5a1d871089fd238da":hex:"75986f56972c045c850ed68aeb229f203b228fdfc36cad6b16d9bd12037c48700d20d8062a983ffeca76b8d36a67ef51bc8853706e83a34e4e23ff4f4a4eb943f19dbe85e454043d7906be6587a85079f9ccd27962d2905117d2dbeaf725d6ffe87bef52b2138da153ef29b18065b3342b3f9d07837d57b8bc5f2597de06c54f":hex:"8e8320912fff628f47e92430":char*:"":hex:"a1ed65cfc7e1aeccd0531bce1dc749c7aa84451ec0f29856f12f22c4105888c7d62e2e2fc8ad7a62748610b16e57490f061ad063c88800037d7244ee59e109d445205280473390336d7b6089f3a78218447b1b2398c4d0b3aac8b57a35891ad60dc1b69ad75e2e86248ceac7bb4cf3caade4a896e5ee8c76893ef990f6f65266":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,96) #2 [#2]
depends_on:1:2
9:exp:5:hex:"6e7f6feb4022312de5c804ed1d7a37580d74499107f8cc8b":hex:"6ce13485ffbc80567b02dd542344d7ef":hex:"c6804a2bd8c34de14fe485c8b7caa2564adaf9fcbb754bd2cc1d88ba9183f13d110c762a3c5d2afc0fbc80aedcb91e45efe43d9320075420ee85ab22505f20e77fa4624b0387346c1bd944e9cd54055b5135c7fc92e85390ecf45a7091136b47e3d68d9076594cfad36c36047538e652178c375a2fe59a246a79784577860189":hex:"4f5bbdf575ab8f778549f749f2265e17dc7225713e73ee6d7be163ff7071557dcc2240b0705c079008605f81396414ac64f06b1b637876e04c3fca8d0fa576cef4dd3dc553fd6808eaf120f837f9bb1d9dbbd5cf67ed497167fc7db89d3a84151b81aeab0e921057f121583df5ed7f976b206ece17a913f23485385f64c462a8":hex:"974bd0c4a8cac1563a0e0ce0":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,64) #0 [#2]
depends_on:1:2
9:exp:5:hex:"46d6e982feff0e7d04a84384c56739b69626dde500e4b7fb":hex:"71a6d1e022a6bdff6460c674fb0cf048":hex:"67a8455c7d3fbfdba3c5ec5f40e0be935fbb9417e805771832ffad06ba38a61b8377997af1f586dc0fa1e3da0b39facd520db1f0ec2bdf1904a3a897f0b507c901fab30a85de51effa9f7d4703ceeb2ca72abe0bd146ba0bd3ffdee11628310db7d65ea1343b018084ea2414995f86fefb45ba91a9dc2236d92078b4305671b5":hex:"a5160fb2d397b55a7eba02df33a042404188f02f4492d46f4edc03fc67723d64f5f7fed3a60728438703c60454a30f473ac918ffc8f98be5c5e9779ee984415e415ce3c71f9acc3f808d215be58535d3144cebe7982b9b527edbe41446161094d6fc74dec2e0a1c644bbc2cf5779a22bd4117a7edb11d13e35e95feeb418d3f0":hex:"84f1efd34ff84e83":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,64) #1 [#2]
depends_on:1:2
9:exp:5:hex:"991dcaa2e8fdad2b4e6e462a3c06c96067ef5e9fb133496a":hex:"978913d2c822ba7cc758041d5ee46759":hex:"5a94dc81af011a8af263318b60215b9752292b194b89f6fc013b0fe8e29133de631d981862f2c131ee34905bd93caffc3b8f91aeb0264b27a509e5c6a41ae781209f8c5895d0d35b3c5e1ae34a1a92a2b979e0e62132051394940ea4d9bfffb8d89ba1e8331b15bdf05c41db83a57745a4a651a757cc8648acdcf850a2f25367":hex:"9cd0c27f0c2011c1ab947400d28516c7f46d22a409a18fd35c1babf693b8030dfd7822d9ba03bb8fd56a00f9c7149c056640dde690889d2f23978eeeb28ccc26e2fc251220a3682c963f5580c654c1a6736cccb1b8ed104ec7390021d244bd9f92abde89e39a4b83eff8211c8a6259bd6ac2af1da7dfb8cf1355238056c60381":hex:"15d456da7645abf2":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,64) #2 [#2]
depends_on:1:2
9:exp:5:hex:"f29cff00781f5916930f125489c87d21f6593324d1506f65":hex:"50db7ee25a9f815c784236f908bfd7f2":hex:"ec1482e18692bcd6894a364c4a6abb9c3b9818bb17e5e1fc9ec0b41702c423f3a60907e94c888fad8e78f51e1f724b39969ba7b11d31b503504b304d5c4b4cbd42634f4ec5080a9fe51c82e121ae191270dd2c307af84c82d892d982413a50ccce33698054f761a3fa93da9a1fca321296b378a50d458ba78e57a70da4676150":hex:"a3e8595747b7147d471ac4fe38014bf4a409931e3f419ff88ae249ba7a7f51bd0ede371bf153bab4b28020b7a82a8ca30b75f1e3bcfee3c13db813cbc85138ef05874dedb14a6e5b6d06d7589a83bd5e052dc64433a8e24c1188b9470ddb2536d13b4b7bff0c5afcfaa9aa0157c3aae3b1774df2df14f965d6dee4332edba67e":hex:"a1e19ef2f0d4b9f1":char*:"":hex:"eea18261a4de31d8619e77005ebbb3998c5dcfac2bc120ae465e29d6b4c46de7e6c044c8b148ffe4eda7629c243df8af4e7ceb512d5751a3ee58defb0690b6f26b51086dedfde38748f6f0bbe6b495f4304373188e5d2dc93461bd51bf720149a7d3aa543623b122b9af0123b2cdc9020136b041a49498ec4aa696c2d3c46d06":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,32) #0 [#2]
depends_on:1:2
9:exp:5:hex:"2087e14092dad6df8996715cb1cfca90094f030328080ffd":hex:"d30504afb6f8b6ac444b4a76115d79d1":hex:"d95845d268c8d8f9135d310c39e30f55f83ef7ffee69e6ba1f80d08e92ed473b5ac12cc8f7a872bfc8b325e6b8e374609c90beaf52d975f71caeef5ee4c13de08dce80d358ee1cd091faea209a24e3392adcfe01aeb2b2e1738bc75d4a9b7cd31df7f878141cf278d150f6faa83fb3a2fd1225542a39c900606c602f15c06a4f":hex:"6d039513061980fb195bdf2f7c7079ca4b7e0fdd50d948cbfab5ba10b99e3aea27f08abd000c428851de82cacb0d64c146cd9567e9d55b89819876d6a635bd68bcaf47ffa41e02d9ee97f5a2363bfe6131ae7a21ea5130ae953a64d57d6cbfd45260c5f1946388d445ce97d23ab7ba31a5069a4896bc940a71de32bde02bc18d":hex:"5412f25c":char*:"":hex:"1e81a4c10a3440d0002ddc1bfa42ebb08e504fcc8f0497915c51b6f5f75fee3f0cd3e9c5a81ff6528e0fecd68a36192114f17fa1a4cfe21918dac46e3ba1383c2678c7a6889a980024ee2a21bcf737f7723b5735e1ebe78996f7c7eace2802ebb8284216867d73b53a370a57d5b587d070a96db34b5b4f5afe7f39830498c112":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,32) #1 [#2]
depends_on:1:2
9:exp:5:hex:"3fc76d627c775de2f789279dc7b67979a9f1cc23c8dcabc9":hex:"8f6fd53eb97e12dcd4d40f2843e25365":hex:"e56995df73e52606a11de9df6c7bfb0ef93b86bf6766e319aea59372060294b0e1b13c6288c2310a4bef725a2dddb174f3e1228649861757903c4497a0eec9c141454fc75f101439a2150e368857c4f0f6e5161c42c77f632bf1c229a52595cbf16e9018de9a8f6a1e6b8b18bd244f93f001eb2eb315405d223c0d27ece9d4d9":hex:"92a60d38fc687b92d44635aafee416a142d11a025680e5aa42e9ba5aa010462991ad3dd7328ca4a693673410f9bba37f05a551b949ab0d43fc61ef3b8996dd3fc1b325e66eec6cc61ea667500f82a83e699756a139d14be6ca9747ed38cd9b1d9da032ece311331bdcd698666ddc970b8be2b746ec55fe60e65d7ae47c6f853c":hex:"613ba486":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-192,128,1024,1024,32) #2 [#2]
depends_on:1:2
9:exp:5:hex:"b10979797fb8f418a126120d45106e1779b4538751a19bf6":hex:"ca362e615024a1fe11286668646cc1de":hex:"237d95d86a5ad46035870f576a1757eded636c7234d5ed0f8039f6f59f1333cc31cb893170d1baa98bd4e79576de920120ead0fdecfb343edbc2fcc556540a91607388a05d43bdb8b55f1327552feed3b620614dfcccb2b342083896cbc81dc9670b761add998913ca813163708a45974e6d7b56dfd0511a72eb879f239d6a6d":hex:"e3dc64e3c02731fe6e6ec0e899183018da347bf8bd476aa7746d7a7729d83a95f64bb732ba987468d0cede154e28169f7bafa36559200795037ee38279e0e4ca40f9cfa85aa0c8035df9649345c8fdffd1c31528b485dfe443c1923180cc8fae5196d16f822be4ad07e3f1234e1d218e7c8fb37a0e4480dc6717c9c09ff5c45f":hex:"28d730ea":char*:"":hex:"dafde27aa8b3076bfa16ab1d89207d339c4997f8a756cc3eb62c0b023976de808ab640ba4467f2b2ea83d238861229c73387594cd43770386512ea595a70888b4c38863472279e06b923e7cf32438199b3e054ac4bc21baa8df39ddaa207ebb17fa4cad6e83ea58c3a92ec74e6e01b0a8979af145dd31d5df29750bb91b42d45":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #0 [#1]
depends_on:1:2
9:exp:6:hex:"2c186654406b2b92c9639a7189d4ab5ab0b9bb87c43005027f3fa832fd3507b1":hex:"3a0324d63a70400490c92e7604a3ba97":hex:"":hex:"":hex:"4c61cd2e28a13d78a4e87ea7374dd01a":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #1 [#1]
depends_on:1:2
9:exp:6:hex:"747d01d82d7382b4263e7cbf25bd198a8a92faabf8d7367584c7e2fa506e9c5f":hex:"7156358b203a44ef173706fdc81900f8":hex:"":hex:"":hex:"9687fb231c4742a74d6bf78c62b8ac53":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #2 [#1]
depends_on:1:2
9:exp:6:hex:"1cbe30216136b7eaf223e6a7b46c06625176d9a08182fa806a63d8b143aa768b":hex:"4fe6ace582c4e26ce71ee7f756fb7a88":hex:"":hex:"":hex:"d5bdf8ec2896acafb7022708d74646c7":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #0 [#1]
depends_on:1:2
9:exp:6:hex:"f31194c83bb8da979a1eabb3337ceb3d38a663790da74380d8f94142ab8b8797":hex:"404efd26b665c97ea75437892cf676b6":hex:"":hex:"":hex:"e491075851eec28c723159cc1b2c76":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #1 [#1]
depends_on:1:2
9:exp:6:hex:"daeed52ae4bf5cbe1ad58ae4ccb3da81fb9c0b6f7619ca21979313ad9d3e83c1":hex:"4037eadb11249884b6b38b5525ba2df4":hex:"":hex:"":hex:"360c6ef41cbd9cd4a4e649712d2930":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #2 [#1]
depends_on:1:2
9:exp:6:hex:"3ad81c34389406a965c60edb3214663ac4a6bd5cfd154ae8d9dc86dae93def64":hex:"cebbce06a88852d3bb2978dbe2b5995a":hex:"":hex:"":hex:"bd7ca9f6bd1099cde87c0f0d7cc887":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #0 [#1]
depends_on:1:2
9:exp:6:hex:"4c152ba30aefa5b2a08b0b4d9bf3f16fc208bb0bc4c4eca9411dc262d9276bad":hex:"008d040fbd7342464209f330cf56722c":hex:"":hex:"":hex:"c87107585751e666bedae2b1b7e8":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #1 [#1]
depends_on:1:2
9:exp:6:hex:"9aed4ae6b1d857fdcbe5aec6db38440613dcc49f24aa31fba1f300b2585723f1":hex:"947c5f0432723f2d7b560eca90842df1":hex:"":hex:"":hex:"7d331fedcea0fd1e9e6a84385467":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #2 [#1]
depends_on:1:2
9:exp:6:hex:"cc80bc031676eff5f34dd076388a5130e985f9e06df4b4bf8490ff9ff20aae73":hex:"51f639467083377795111d44f7d16592":hex:"":hex:"":hex:"02d31f29e15f60ae3bee1ad7ea65":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #0 [#1]
depends_on:1:2
9:exp:6:hex:"db7a40213b5b4b07e9900dc28f599403b0579cbce13fcd44dff090062f952686":hex:"aea6f8690f865bca9f77a5ff843d2365":hex:"":hex:"":hex:"7f2280776d6cd6802b3c85083c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #1 [#1]
depends_on:1:2
9:exp:6:hex:"299b874eaa8b7baf769f81f4988a41e2708ae928e69a5ba7b893e8e6b2db5c3b":hex:"2aa04d85d2c0dc6f5294cb71c0d89ac1":hex:"":hex:"":hex:"ea01723a22838ed65ceb80b1cf":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #2 [#1]
depends_on:1:2
9:exp:6:hex:"a6c7b4c8175db4cf23d0593ed8ea949043880fc02e2725f0ab90ae638f9dcfce":hex:"ae07f8c7ac82c4f4c086e04a20db12bc":hex:"":hex:"":hex:"1132e4fff06db51ff135ed9ced":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #0 [#1]
depends_on:1:2
9:exp:6:hex:"b98e1bf76828b65a81005449971fdc8b11be546d31de6616cd73c5813050c326":hex:"929b006eb30d69b49a7f52392d7d3f11":hex:"":hex:"":hex:"33940d330f7c019a57b74f2d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #1 [#1]
depends_on:1:2
9:exp:6:hex:"09ccef64ae761a70fe16772cba462b058a69477c91595de26a5f1bd637c3816f":hex:"e34b19381f05693f7606ce043626664d":hex:"":hex:"":hex:"2adc2c45947bfa7faa5c464a":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #2 [#1]
depends_on:1:2
9:exp:6:hex:"654cf46598e5ad3e243472a459bcd80f1e026a65429352dbd56e73fcc5895d1c":hex:"a56f27709e670b85e5917d5c1d5b0cc2":hex:"":hex:"":hex:"177b9a5e6d9731419dd33c5c":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #0 [#1]
depends_on:1:2
9:exp:6:hex:"84bca1b2768b9202bf194f2d5e5a0a5f51fd8bb725f2bab8a3fccbdb64a4ea70":hex:"c45b2708c5bdf65ec6cc66b6dfb3623b":hex:"":hex:"":hex:"fe82300adffd8c17":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #1 [#1]
depends_on:1:2
9:exp:6:hex:"c8ae011795c9a60ad7660a31fe354fa6f7e9c2724d7a126436291680cd95c007":hex:"1bd9ea6186450f9cd253ccfed2812b1c":hex:"":hex:"":hex:"35214bbc510430e3":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #2 [#1]
depends_on:1:2
9:exp:6:hex:"df2f0a8a3849f497d12bda44e12ce30a6957f3febcd5ec9bc134171326ca66d3":hex:"728cb9608b67a489a382aa677b1f4f5b":hex:"":hex:"":hex:"e2ef5d9cc5791c01":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #0 [#1]
depends_on:1:2
9:exp:6:hex:"78e8a8ad1ecd17446cf9cd9c56facfd4e10faf5762da0fd0da177f6a9b9c3a71":hex:"f169ce6f3ccc58f6434ae2b8ad1a63a1":hex:"":hex:"":hex:"0fe57572":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #1 [#1]
depends_on:1:2
9:exp:6:hex:"02ca6d8a862e25db9d68e4404abc107e700135df4157cfb135ce98eaa33151c9":hex:"7b722fdd43cff20832812f9baf2d6791":hex:"":hex:"":hex:"72dea6cc":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #2 [#1]
depends_on:1:2
9:exp:6:hex:"9a2b709dbcc3a4fb15b3ad541fb008c381b7e985b57df52f07ca7cd26ab1ecc4":hex:"729baa4c0ef75ed8aae746376b39fe3c":hex:"":hex:"":hex:"2a0d607c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #0 [#1]
depends_on:1:2
9:exp:6:hex:"449d39f863e4909984b37f2e5c09ea4d4b3e9fac67bd57c299e4e1d1f084aaa3":hex:"d8e9118f331bb5a359f0aa8882861b72":hex:"4ddcae0bc24d622e12bdeaac73e8d1ab7957af051d27dfaafce53aeed4cdd3f989ea25989a2f41cfb3c38dbd841c5560b0b5ab1861b1fbcd236865d13da55b50219462e021f8a21848a64a85326031fcec8fe47a6ef4a435dd2b2fff637644ffcf3914ef2dfa5dd556421bfd297be150b31db039f0f2cc422b282e659e70cceb":hex:"":hex:"c595b9d99414891228c9fa5edb5fcce3":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #1 [#1]
depends_on:1:2
9:exp:6:hex:"3e70e66813fc48f984dcda4d1c9c24f1d5d1b71ecfc8bb9581782e7cca5a5cc6":hex:"d804f1051e72c9b7117002b862eb45ff":hex:"0b1ab2b7a87cebac668c7a532fa8fa56a22cabf0c41fc1e6744ffe07c857c6865d623f508351f98f3f0c577d1eb94300a30a445472218c8ac626b0bee7d4c122d33f8130436a89add341e8ef7e00694afb4ad80d314d87ad3f921c7105eed05431b8151df7cff2c8e3790efd4acd3f60332dc7f34fdd90beef70f9093361d65b":hex:"":hex:"c09c2e3fdfefa222f7345ae4efb978fc":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #2 [#1]
depends_on:1:2
9:exp:6:hex:"8e534041090b45b80f287dc5fa20ebda017ad81b0530e680f62c6280fd8881af":hex:"ead675b019ef5c6bbf4985f2a382d6c1":hex:"b1db220052c4bebcef27eed6db0dc91be481179d71160c5a2ddb2fe497a05484840b04cce48980057d770fbbd0d5f3d5c633b55470617ad2cab5767188283310337825c4b0eafe13b5b11293dec230dad43b220885105767938c7ec4600fe063f98aa14bc6afb886fc874c10546749da295f571e696305bd9165486e29f43f52":hex:"":hex:"9aa0cdad5686ca515cd58aed94938ef4":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #0 [#1]
depends_on:1:2
9:exp:6:hex:"2de18874470c09db683cf45cd752bdfa8bf33e7967220b1a69f41f2a02da1d80":hex:"af30eb2d0a0c2a50ea413f3285aa88d4":hex:"22889b868d8ccc9f488406813caed199b23091ddd796c8632f564e7cf5a39dfb725266a931fec958659b6fc5b6b9343b8217edb0acb010afc9416601155262b57bd398d62f555953f0e15958e19ae004fbc9cb25e0269a9eaa38a4635a27bfa719fb249fa49337796bcf5f416bba87fbf3b19f0d8c11290c25ca50bbdc822f01":hex:"":hex:"646bbc9b14681af65b0d1c4c9f1d0d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #1 [#1]
depends_on:1:2
9:exp:6:hex:"1a1bb9122e762ecd7ff861a1d65e52607d98e7ae5bd1c3a944e443710f3b0599":hex:"32f99ea4cbf52c2701c2252e5e6c863d":hex:"91b7a70c3a06c1f7f2ea584acb5dd76177ba07323c94f2e8f7cbe93fc0bb7c389c3c88e16aa53174f0fc373bc778a6ccf91bf61b6e92c2969d3441eb17a0a835d30dcf882472a6d3cb036533b04d79f05ebfaadf221ae1c14af3f02fa41867acfdfa35f81e8a9d11d42b9a63288c759063c0c3040c3e6ee69cf7c75f9c33fea1":hex:"":hex:"a8e29e08623a3efdbbe8b111de30a4":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #2 [#1]
depends_on:1:2
9:exp:6:hex:"3bfad1e8f9850577f9ba3f290e9a5e91b494c2d99534220362e171a7543177ac":hex:"8410886b70c57d7ded8596443bd1b157":hex:"ca801c83596795515ea931edba00e06e332bf84246b7036e10b317e2d09a51b2981fcb664ee3bf4180bb0b12ed1cda221abc6790b27c26914f5ef9cea9536e2453cd5b247cb054e295c2687b725a97cbc484b8eb86c6ceee03bd07a54a9301a3ac0ddb23aecb825a238252e7575329058b40e75575a7f16439edf5be163ce5f5":hex:"":hex:"e3645db0c600dba52044efcecfc331":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #0 [#1]
depends_on:1:2
9:exp:6:hex:"65debdf2f2191a6cd8de8ad4d5d4d0d8f731f67744e2545df6b2a7cba89c1ee0":hex:"fdab2ee547dd8b6f5a4ea2dd19697b3e":hex:"d2b0a0438ee0f145aec9a7ca452b788ecb473152b78fb75f6ace721afc7b0ae1942049b790f3a5b6221a8760295659756d35347cc04029be03459f3e23a71209b4e0bbe13a253a888c83db23376d3a6d9a539f7c9fa4a12dc64297e7c93dfa0ab53ef76b6e1d95bf6f3d5e6ee8f08662fc03ec9d40eff0a43f23ac313671bfd9":hex:"":hex:"c25fc157c3f2474885e2eea48aea":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #1 [#1]
depends_on:1:2
9:exp:6:hex:"496ae810380460d40cd2fdae8c0739f16b87205cc7f57db0a71a473eb361d570":hex:"77233de96f5e1744337778212b411bd5":hex:"85f5b54b4c4af5c808120bd28d98e44e96f4126623e57684957e9fc4fd1a2d0583940b8fc8314a249325476e8d05247831b04709580ae714e8187cd38f9559419e14c9fc4f8c454ec191b8ef2a3610988fe3339d0dc6b72f5978f9eff9d596dfabf27056e3a908c6497267461386e860f6b9d65526294bcb92908b5661b06b5a":hex:"":hex:"4ed91af6340e70b0c2b94ab6f82e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #2 [#1]
depends_on:1:2
9:exp:6:hex:"aca188183b46139cc7cffc82a6aaaeb2fd73cecad14e75c663bd62daf1ec711d":hex:"7bbf7fb55eb70cce94cc6a2b67de55ba":hex:"015cfba90f069545fed60f31992ff3d3c3592eb91e7a53df5978ded64291954cb99a57de82d5398ce782b68d14ac04a8b425395bd076ead59eb445721bdb2f45e19fa089117800cbbac7b8313fb165ccb1122acb654e1242dc7fe6885ea1cbb7281b1270cfa1549cdfe9b47caf47b4ac3807e562e48c066566f5e606b5023b47":hex:"":hex:"3bcb5c2a4261d75bfa106fb25ee1":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #0 [#1]
depends_on:1:2
9:exp:6:hex:"8cd6815f6ec15f03b7a53f159e877a5981e0ab7f6e6c261ddde4b47cbb2f2366":hex:"c431c07d9adf5f61204a017259cddd75":hex:"4e1a835402bde4f5227e64b46a1f8d0f23a9434e189377fcdf1b9621ba1987eb86a7f3b97ed0babfd674e74c5604a03dd016d71000a72bbbd00a7f7fe56ad0fcb36a3e24dd0fdb63bd66d4db415f35012416ed599796ca3f678df7eb5a1b17f75abb348ddd3b366369a7b362c9488aedab836b61f9a158f0b129c8ca0a53a81e":hex:"":hex:"0e463806ff34e206f703dd96b3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #1 [#1]
depends_on:1:2
9:exp:6:hex:"8f0a72abcda104aa7fae501f9a3b686d00d3f6fe984731db8a2865bfec587073":hex:"ab8acd063775d1b1314f14e90fddd1be":hex:"02c6d426e7f20b725d8cde0a6382e49b029b52126889013ef45251f27b2fadb95ca4a9a3b16ad06999eeca4a473e813045db4942e9b9ff2e5a5e429d9bac298372344d1b781d5facabf6d779643f31ada6124eb50aad599044b54279ec9b25714ac8a3b9ad2487cec7f4b1ee245d7be3d496d6af1d4cbee1c8201312541f3064":hex:"":hex:"3f0ccc134091e0c0425887b1b9":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #2 [#1]
depends_on:1:2
9:exp:6:hex:"417135cad74280e6f8597dc791431c95cb8fa63bbf7197e3ab37c4b1d6d9438a":hex:"0fe22d9ba1d0e32656e3a9f07a517a27":hex:"a0b2712e81d329d5b076a4be2ad6823cee6dbd17d9a592d065bdebb92b1ff37a56bf2f5e5341f39c574246ccda19e5f35fede49c9ba958f3920cc5440fb404fab7846884ca0c2a3af5b51f4fe97a1395571319cc5b40f8aac986d77de280db82343983982638326ef003e0c013af19c34672975dc99ccc0853a1acf7c617d965":hex:"":hex:"888b836c9111073924a9b43069":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #0 [#1]
depends_on:1:2
9:exp:6:hex:"304824914e32ea0efd61be6972586093349bd2cc2cf0cff44be943682b2dbff5":hex:"b6d927a71929029f6766be42746f7cb1":hex:"7281c81c7514f4b17cb125c4649006ef8959a400a1e4d609d277e363e433725fa32346a10bcbd826b6afc8222158920d0a2db1e6fc915e81231c34c3941ecf3c6f94ffe2136190cae3dc39a4277acbc247f36291b5614a8433b1a0780434a6c50521b72ec25145bbd3b192647155d5dd9df9e66762d39592602ea99bf9bfff49":hex:"":hex:"b6044c4d7f59491f68b2c61e":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #1 [#1]
depends_on:1:2
9:exp:6:hex:"8a10e9abe9389738e12a4bb6f553ae81e8bd320e0dfbc05fbae2128c1fde7a23":hex:"6da44354e198e3beb54792718becbcc1":hex:"199d754630135b669bf2ec581d3027a569412ab39a78dd9d482e87b778ec65c6473656260c27827e00e566f1e3728fd7bc1853a39d00e43752c6f62c6f9b542a302eea4fd314473674f6926a878ec1e4b475d889126ce6317115aea7660b86ab7f7595695787f6954903f72361c917523615a86d6ce724bd4a20c9257984c0c6":hex:"":hex:"5c5683e587baf2bd32de3df5":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #2 [#1]
depends_on:1:2
9:exp:6:hex:"d164ffde5dd684becaf73e9667e3e6acb316682c41aea247899e104a54dd7a7f":hex:"1d388e19e9d7a9750e2fc1187d4b075a":hex:"f166a5b6f91261cda56f1a537f42ffb8aed10af5e0248f8910034b92dbc58d25953f1497f571d31fbf5ec30d92234b440161703851f0e43530418147ce6270fbcb5db33ab819ba8973051908704b6bea8aaca0718947e6aa82498a6e26a813981783ed9bf9d02eb1ea60927530c4700ff21f00179002b27903dd4103bbc5c645":hex:"":hex:"52e10495105799ead991547b":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #0 [#1]
depends_on:1:2
9:exp:6:hex:"2854188c28b15af4b8e528ab25c0950fc1384976f242716c91bddeec06f2fdea":hex:"075af9c31f5252b8920092cbd999e7a0":hex:"e9452f71093843a025bb5f655eb6a4e8316ab5946484b11818f22b62f4df75d5891fa3397537093a261dc9a7648b7477ea1f5fc761716e302763364bcab7992595edd0fc1c7f7ac719c879e6616e2007948eb8530065a6cccf73d0fe4a0598819b471b0856e6d90ea0fc0e5d36a30ee925b6b8e5dbf40e77f01efe782c0bb4f7":hex:"":hex:"6ff8fd87e5a31eb6":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #1 [#1]
depends_on:1:2
9:exp:6:hex:"2bfc445ac0365ae6c3c3815fd18bbd0c60ea224f6620d9b6ac442a500221f104":hex:"43c5f3367a9955aaee1a0c4d4a330059":hex:"db0bae8ce7c66a8ba2fedec22f236212e9a7ad72b371de285c7dc6d2f6c22df0ce4920e0f03f91eb1653c4490050b9f18a2a047115796f0adc41707d1ffcbf148aed5c82013f557e6c28f49434fc4eb20112f43566f212c48cec9894ac40772fcd9b611ee9444df7b73e35b8a38428ccb064c9c50491d2535e0b539f424db83e":hex:"":hex:"49aaa806cb2eeadd":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #2 [#1]
depends_on:1:2
9:exp:6:hex:"7b828f99aaf751bf22d993ed682e488595617a607ed74aaacbb6b60457453080":hex:"d48dac1d8d77e245420feb2598812418":hex:"f50f785f4e7c848a55a616ecf4b6b1e1ca85e16de7100c7e4273d411bd95c1380ee157ba501ba9616980195f34e39f43e335f33253342feb8ed64443483c721b85241a0320b3cac83104de2db47188c61a373fba592ea16feeefdee1f2bb43927396f58151418672ebb74afff5c029503a0d0be81430e81ed443e08b74c03183":hex:"":hex:"a5b71ecf845b25d0":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #0 [#1]
depends_on:1:2
9:exp:6:hex:"7b6da11d69fca3e4c907628d3eb63d95c7e502fc901372fd097e064e70831432":hex:"6fe2148f250ea178d4c8ca8423ead87d":hex:"a8097bb74ded776f578eb7588f5ef8915db9bfa7262af700c8e76ee114e07557b6786dd5a60a66b2703e7c9de5d6b42aca92568aec5d1ecc298dbd0edb150b8cc13c9a78698f7674caa94da6cacd1f3ef4ca4238c59830ea725ab3a6284e28966c8c32d9bccfb0cfd6583a5ca309debe86549a6f317d15c5f928cbc7f473310c":hex:"":hex:"e9cdbc52":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #1 [#1]
depends_on:1:2
9:exp:6:hex:"c5ae9328be49e761064080fc213e53e373fd86359a09d0355e2d438d9b8e68f1":hex:"a7e3f8660ff925d5c88c5aceffbd7026":hex:"2ddddba7a56cc808aec4602f09ae9bd78887827bf0315d8dbe16821606ef9d117746dd138bf1f23565d1ab8f4cee36d53fe3730632c5df9f12109b16edbeae285bb49dfdd155f5dc97b319a85362d53cc86817b7c1c31e5e87c9f37422f133d00dd0776bd92ab05ce6860573cd911645cfe3fbe515e85f744899a447fe443653":hex:"":hex:"e35dbac8":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #2 [#1]
depends_on:1:2
9:exp:6:hex:"e4f8ca13ba86c658cc7f42d4f029422209efbd101bc10a1df81a42cfb3a0f79f":hex:"1a362fa0e4054ba11e4b06d59c8bc9cf":hex:"e7ad5c75aa13659f8ce4b1650c46382645ec67418199b84ea445b8ceef619ef3fbde59ed3d313c459e36fcf87d26ef2b453409b32f1086934c3072c1ef0aac83762d28b1193b9afff2c083ce4300b768b0ae23ff9d3dcf65bc1693f1350da65180620aab205aceacfc683c8be53a332e2d0337a7518d2a5204f9c8d7325a4799":hex:"":hex:"e7a37f15":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #0 [#1]
depends_on:1:2
9:exp:6:hex:"00050a21ca1e72cd0924be31b943c60854be6744577de3dd9d1f4fada4a19ea6":hex:"2fc1afc1395d8409919248709f468496":hex:"":hex:"693ffd3d92294857a99c702a0799eeca28ab066dd90917b9ea5ef8f6547f1d90b106cbec8ef2c22af9f8efa6c652f2f97c2baf33af14fe9def230d49524bd65909c3df1490f637f99e788dcc042b40e00bd524c91e2427ef991bf77e7b2f770cda6e90076c5dac4cac7ee3958b53ff8ce846c3a96281f53c2c52f5f3e523536f":hex:"e39b6a7fd5ac67a2a1cc24d5eb9d9c74":char*:"":hex:"cfcd6b9ff7641829cbadeaa2e56f1f150a099eccf3e378fa4da59794dcc4490aa4f9c5db0ab245bec36a7d4557a572008e42f03bc1baff3c946f23f54a4dc9828f106cf4264e4ab40165839d1085e7795b1ae0950f0ee4a08e46ada501b6b51dee0e518129c9426e5bd44c66674a9f99cfe676f002cfd344c5bbd22d3d91e600":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #1 [#1]
depends_on:1:2
9:exp:6:hex:"f10965a66255f0c3515af497ccbb257a09f22ec2d57c5edae322a3e6d2d188ef":hex:"c571ce0e911de5d883dc4a0787483235":hex:"":hex:"91598690edf2de8b27f9bc7461a84e80811cee544f0542923898328cf157590251f0342cb81d359b5dccc5391a12320d1444c26f24178977dd6705c2b365dc1ece0152c42e2f0ee3162cf886ef5529f4f16a77f3bdd2aeccd405b59addf098521d0d38cc25f1991e11be7ecf24caedb48a2a286d2e560a38fa9001c5a228c4d1":hex:"6d9d3a5dbc8dce385f092fff14bfffda":char*:"":hex:"2867996e389e09ec0da94d42e77b1e436b50065b09ca4adf1cd03240444ee699dbb7b3fc081a1869ca607d77d5ff9754fc3c997ff0a4ee17543a2ba77886b88a7128bcc51d3450df58ff3a26671b02c1d213df6adb6f7e853080eb46b504517cbaea162710a9bbc2da8b552eb6b0e0cb98e44fcab0a157312be67974678d143e":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #2 [#1]
depends_on:1:2
9:exp:6:hex:"4437ee7d16d8c3ca1aa01e20b66749efa901614d4bb4bee786ad5a5f1bfde2e6":hex:"275393276745bc43bae4af1e5d43a31e":hex:"":hex:"ff80727a3485cdbc7fab4ee9fadfdc621c538e2055706629046078f1aa3fb687fc728d3a7ffa52ae457b7b5649613eab7bafa464bb435314c49e5900750f7ad39ca9b75df6b2eaa755439e101f67b7ae4cd80dc4a9dea0027048253f2d0a6014056ca69b8c85605b00cf75fa7634a0ddf464270a8c79ce1a1324c4a4c513b24b":hex:"a82ff1e87d26e4d6e417b60fb2d3ce23":char*:"":hex:"88f994d276ed20be3932d16f551c4b7e2ed80411f2e72ce098fa0b70c22157a59edab30649fec447dd63f0c87dceca7238ef0d9561b58489ba7bd86f2892743099f40af63c432f78ac0ad0b5c2be47b9e3045e7237b096ee400f430af63a6f309de785caf190f3f4aabbe79f727a741590de542bd343df68d13db55a5f8bab41":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #0 [#1]
depends_on:1:2
9:exp:6:hex:"fe4ec037ce563dadee435cfcb2bf090f1f7ccc7d1b5b4fab2f1b738348f8ed2f":hex:"47f5264f7a5b65b671892a05fa556f63":hex:"":hex:"64eb8a4bda9804c09b04cfcd89094928c21480908b81ee19d6c29c2a3631b1a5bdc8e7f8ea56f7b8b8e14a5208296026785cac3a6afa54be8af4d5faedcd12b6621bde0f8ec5a2635fe72a89468ca7704c73aa40cd2ba97aef08886b27a694d339b00e7d12a31308672f87c06a7388a1432f869eb4cc1da864140b1b33931925":hex:"660462b4088f6628a630f2e4170b21":char*:"":hex:"4a310e035361f98b8c54fb4cef70b1a9c910552ece056ca8fdab54c52308ec0ad7fe9dd1dae92badab5010577de522088768fa6466fbccce22e14c51ca7986c4063d0f06bf578dab16a91856713198a7138395c49c78b6314b57ab72fd079028c8dc351952d90b04a7cd2b245df0c0522447cdb7d3329fd9425fe5cb40a8e7c9":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #1 [#1]
depends_on:1:2
9:exp:6:hex:"e6e1ada628ca76eb9832cc6b5efc5c9d2686bb587366a6de2d734233fa95279e":hex:"5a100b451e3a63a3e6d4b8a9e59c6bce":hex:"":hex:"a0ac738e0fb35246b84a6fbe319f827039515df25d0c0fc6de7c048253ae63d3c561e44a12672ffeae1cb925610b482aa422bbee0e1784fc69baac3a97d69f51e6d2a17957b44b318624ea7ec680a559f4d3f2761d09bee66efb3a312ae6b3ecb673e756b2a0f654671e82500e7ace91f2be2a74bc3bc1ec1a4b6877a53c27c8":hex:"88df9a1ea54e5bd2ef24da6880b79d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #2 [#1]
depends_on:1:2
9:exp:6:hex:"cd5c1e90d78213155c51767c52c290b3d657db8414ee0a7604a2ec7b48105667":hex:"4e022d8d86efbd347e8cbab7e979771f":hex:"":hex:"8e987693da0fb77b6d1282eebd3a03e05d9955ff81929b1a2c721574862a067ddee392c7ece52ca1451f3e6e321d7208882d97b4149af6d78d65c054e1bfcdfa62bd2202de32dea8363f8d7f041891ce281840f3cd906ab46ca748e5b3b11890b4014bf0271c9427c874097782d1c13dbb40e78fc8276fc134f3c29923a43a01":hex:"e7df79af0aef011299c3b882e3a45b":char*:"":hex:"3b20473d9b5018d089e7f74d3fef22ec2805948a9e07689831973c704a6d8db4d090af88d696ab8c3aae9740a2bbd7f03e0b18b2b591e59c335c1043a2578a89b1a9f20fd0dd53f12e00e9bfdb27de8caac772bbfc4de9e4a255a5d1b04e59625a87b8279babe613def58d890d5502abf2f709aab625dcc20c58772832c7bbab":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #0 [#1]
depends_on:1:2
9:exp:6:hex:"6e3dfc07003bb6a2d82bd5263b2832f47db4e73279266c7a9ea21f4f18eddf83":hex:"7c0f49fb54f5e68c84e81add009284e6":hex:"":hex:"a960da222af9d4da5797e6957d59b00f6d3893599c70e95c0984b56eb3329b191703c2532f3288b15ebf655b9b5ee4617484e5ac9c39bb06731d03ebe4fef9495d003b0ed694cf540b4dc759d32629e55512680badd81234bd71ffd55fcb5e6a85031c1dc31ee1ed198939582d8336c905717cc87101dcfcf9d833fac815c8ea":hex:"b2ec0f3da02a9eb3132fb4ebe3b8":char*:"":hex:"a40b6f70f0572fe0bc70d83368e7c154f7dbd501f52501630a2e523d18e216e07368521f6040d806299397722b99bcf7f85d36b8bed934b49aa1fa76d38783e6a2e392d6d0786d467f7bc894a739ecf94f0fe884a9c391154f8326bf31ea5242a18aa263d04da4b63b11de23b42d3e10a2d5460cb32700cdf50a0d89165ba22a":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #1 [#1]
depends_on:1:2
9:exp:6:hex:"4103b1ddff87a508a219c808a04ad4750668688f4c2ee75b92d28d70b98a2c94":hex:"5cea906737518c2cb901016e30206276":hex:"":hex:"a00a196193ff07006b7df524824bd0971d63f447a3a7bb1b75c1e2d11789482c115cff677b54948d36dc4de34200bce97be0101d88cee39b177857dd5da3cb0d2f9d6e1150f72a3bd655e0bace1d25a657ba9a7f8dff082b4460432075afb20173da22b49beeb6a030d72ba07869ff4389fc1c28d87018d7c1a9829c21932197":hex:"3a3a771dd5f31c977e154ef5c73a":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #2 [#1]
depends_on:1:2
9:exp:6:hex:"cd8c2f0c330d5db316dae7a16b57d681ca058864f7bd60f3d0de174442283f77":hex:"387ee8c1e7f047e94d06d0322eec02fc":hex:"":hex:"e2a5ad295d35031535bf13c2993bd0b292e8a9465b9dab738e59ba03670248a1ecc92b38a55bae34729162271cc1572c35fcccb27417b48dfcbff852a7a8845cc829a4461061b558ac8b5930a5c6491ffba04a9d0dff220b3cd5e4fc2e0f3db3b2ddd90328f2cad819573a7856299620b02f5ee0267f3b56981afbf1b7d9e3e1":hex:"62356850d12b54e39872357cfa03":char*:"":hex:"17b7f6bdfc1993c56dd9bd674cc276a55a46fdd9fd5fe435b9e4b7ebc7052a9dc76a99e4e43aba7d486603189c90d10a21ad3722c86bf5bc856a0f930ff5bca65be708b76bb8a29105da67f31eebcec81f28aaf526d2f8f0feac393a24959dcd612e2b93b4463f61957d2b3046bcdf855e346601e4c7760c0ca618ee7bf55381":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #0 [#1]
depends_on:1:2
9:exp:6:hex:"7e19e400872eed721d560202cd757d3eb99729496b6e3a6d38dd8afe1066045a":hex:"d2b277f78e98f1fa16f977ce72ee22a7":hex:"":hex:"3fb9abc7aba654dfb174e8899c17db222ffbb387b7260fc6f015b54f1cd74284c516e21aae3b72338e5e8dc643cfafca0678f5bda3a7539f1612dddb04366031b5a3eda55f3232c1b176cc9be7cc07e0ebca674a272224929c401a2530efc6d4eed0087b544b12d172a01bc8340d9c2a2ebcb5af8b07d96073a879fda140c196":hex:"4c81c044101f458fdfac9ca3b9":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #1 [#1]
depends_on:1:2
9:exp:6:hex:"d0653934a16fd36c27d54488a1829302b931bed6e26ca26047242b85b50bfb61":hex:"94886a1845aebba5ed6b86f580be47f9":hex:"":hex:"c02347e1add9178d830d8baaad9aeee37e958bedf2cc846e2561fe8c83481d0a8a85911e7f1f6e444b28f30bd96c13c390e80f616feb6844ee6fa486543a2e3f38c138f45b4405e3fb331b64648219aaf1d574be948ccfca6afc18d12488db19c35b05601e47c0af5d49a93a5dd4420f38585c1eb033e173376fa390d3f948df":hex:"4be34ff42085ef4443c8b6042d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #2 [#1]
depends_on:1:2
9:exp:6:hex:"d0f0ccb88c7cec9496f26a59ddc67dc59ebe49ae3dd89ef3be008598727e214c":hex:"e5ca84b907ac761a5e68a9080da0a88a":hex:"":hex:"7845e155f4f28021291e7c814a1ace8f42b239990831aa82758fc1e376cace0b6f668f7f2f224dede1ef5b1df7ae74b2c01483701044acbbb72a9216eec6b7ef0190f114b3c73c6985c4653f11601c774d10b7f9df1f1e1f3ff4fafa20d6525edb37d9e5acfafe6d3468ee068d407fdb56dc718c98425926831253978d727854":hex:"c8f78e4139dd3eaf2baef8aafb":char*:"":hex:"0cc3ede50b0d3fb9ada11300a3239a383c98f968ad65266d57a195bb18d3e568fe6cabba258da4bee9e923c7c838e06dc887a6c49cc1453ea6a227c6a83e651a8742e0316cad5efc93739393e3603446b5c920a206db1434adbb8ebde4d1a7a8699c7f6c61b2d57c9709b564338423b4f526d6c157647a6c45da9dd521061f05":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #0 [#1]
depends_on:1:2
9:exp:6:hex:"e35dcea17cbf391491ae5ba6056d0dd13b348183474dd4b614742751bdebfc32":hex:"fa549b33b5a43d85f012929a4816297a":hex:"":hex:"5213542beb044910d7fdeec8bb89de93f350760e493286eaef1140485380d429f74a4279c1842a5c64f3ca3381cb5dbb0621de48821bded650cb59703e0ca88f4e9c3d15875f9dc87d85ba7e4bae9986ef8c203fce6f0ce52c28e3a93befb4cc4ba3d963d2283cd30f9bf6ab99d92f2f4f3aff0b022f1751b89d43ea10bbb28a":hex:"afa61e843cee615c97de42a7":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #1 [#1]
depends_on:1:2
9:exp:6:hex:"844c50ddc0ac1d9364b21003287d6ae6360d12bbb17a85351362420ee4ca588e":hex:"2f8512bb7e214db774a217a4615139e1":hex:"":hex:"3a3bf4ccaf05f7c02f5e158dd2c5cb08c6aed4b1ba404a6d8ef9a0737fe2f350b3e22188fc330ea63e35df82f996e3cf94d331c4246cdb25bb2c409762e05ddc21f337edee51b64f1766ad18f520b3f34735b24278d9d647c533a743e0c1e9c81e9dee975cdc47e8582113fd250ef59353605b64acb7c025a97854c1a5c03237":hex:"f1da1cebe00d80eb4e025feb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #2 [#1]
depends_on:1:2
9:exp:6:hex:"2aae1aa047a20ed2d6d8336d923864cee9404f924031ae327fbfe2d293e1d93c":hex:"3da9af3567d70553ca3a9636f0b26470":hex:"":hex:"8e5b6b9e4e7d01de9a919dd33c0c1eb94dcfebf28847c754c62c1c00642d9e96f15b5d28ad103ff6969be750aadfd02fc146935562c83ec459a932a2fd5fda32eb851e6cff33335abd5c2434ae4f5524d6bc74a38094ced360f4606a1a17096ff06604952c8ca94a9a6dc4a251e13b0e0c54bd8a6dff5f397a1eb1cf186fa518":hex:"e1026b3d15d261b2fb47632e":char*:"":hex:"58c52ea9f3b162511160eed1a68b6f52b3c4f5834af728de97a3d9e4ba337b29aad12636003cf5be9ffbeae0f383f7cf32f645a8f6fc5cdc1cde91c625c69a92bc434ed671e52a0044a48f3fce55cae49a7d065c2a72603a7efe58b5a7b18ac500d1a51420e820357e7a439b1c02198ebe3d4e62d5573a3aa5f40900a21e3b41":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #0 [#1]
depends_on:1:2
9:exp:6:hex:"f3d69208cb0d27474e9a231cd46eac7c1574fff950c48bbd1ba03fad16f563df":hex:"b957f05921d21f2192f587768dc12b4f":hex:"":hex:"0d1f06eef5e8f2c81d1a73bb1dca93c22cfb6e40e9948bc75b0d84830fb9216330424f580b89050c3fb3f620eca8f9fd09fb86d2e8b3a0869c6022d8a705fc280d66fd16d3aba7395d6be4bed44145d51d42d56285f3675726d62d94c081364a6d440511de83a613c598b03078e2ec7648c6302defbbea66aafd33e1a4b1686c":hex:"322374fbb192abbc":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #1 [#1]
depends_on:1:2
9:exp:6:hex:"cb2cdeb17fa6bcb006c7fc60858a12a411804464458db351957e8caf42f1ee6c":hex:"31bd7c971a6d330b566567ab19590545":hex:"":hex:"296504131354b2c1928982f12d408ba2377f2d4bbe87e4c69f92a15bf6003910a43bda6c8929df66b3ab1d202a5258cad199f32f36cc30d2dc06199c2a52f7ccadad1fce50123c5f8434dec57cc60cc780263d7aace8f59cc8a6c54bddbaded3adb12ae2ee0bacf6a8da635ff85b51a4e8a1b3dc404863b90059de4ad0f158dd":hex:"efc5a1acf433aaa3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #2 [#1]
depends_on:1:2
9:exp:6:hex:"f94170790fadab3240df568197f9d6f6855afaed8d07eceeaa2380121872529f":hex:"2f9c0647a4af7f61ced45f28d45c43f1":hex:"":hex:"ed231b78db082f652bc6310c396993b52de804a82464fa3fac602a1286535f59c67fc2b1b420c7321eb42b971edde24cd4cb9e75c843f2ac6fb8ecdad612d2e5049cf39327aa7a8d43ec821161c385f3fdc92284a764a5d1cbae886f07f93017f83a105bb7c3cc4fc51e2781516a2471b65c940ddae6b550ad37b35f53d7cc64":hex:"ab74877a0b223e1c":char*:"":hex:"1cb5ed0c10cee98ff8ecfa5a1b6592391bbd9f9b1dc1ff351e0af23920d546b5e27d62b94daabd32f7f96a2632dc9fd7c19bf55f3b9b7cd492e76f4d6b0f5b437c155c14a75e65bfc4120bef186da05e06a2fd3696f210292ee422ddbce6e63d99ee766b68363139438733c5e567177f72e52ef2df6a7dd33fc0376d12ec3005":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #0 [#1]
depends_on:1:2
9:exp:6:hex:"797c0091ff8787fe7cd0427c02922620e7f6fb71c52ddcc03a9f25c89ba33490":hex:"69d81c73008a6827a692fa636fbab8bb":hex:"":hex:"2d3efc8900315c3691a8e3c9de3319d4deaf538fcf41aa0e295b861d0ac85baf56d149a6437747dd6976f44016e012b88de542fb8e5b9e4ad10c19deec4b7c0b69bc1b2e33d44a981ded66127dea354b072010b8dc24b85ed2ffeea3b9c0e931619dbbf22677691f0d54fc03eaa162e0ab0d760ad41021f67057c0d6ac19ca8f":hex:"be2dda5c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #1 [#1]
depends_on:1:2
9:exp:6:hex:"90ce1afb5500489b9edbad987f4009509c847b3e55cdf0c764ef2fb085e3d033":hex:"e119e166471ecf44bc3a070639619931":hex:"":hex:"98482b54edce2bac1cd64d44917dcf117ebfbfe26ad17a9b263447028304f1cf5a69559c05b5d833420f4fddb6e308277d01eb4b3235f1c4b47d33d3899325b55e7be19d43187a5b1b1354ce02a529b3df1c13b4883902ae9fc565079dee825e705f3e580371e4fd86c3b0d31bae98adb529901f346ca07127314152b4370edd":hex:"b2f54b3a":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #2 [#1]
depends_on:1:2
9:exp:6:hex:"29264a90f114a800c0fc3247b3bda00981a12a8f85cf3a19ea4c7ffdd005f4bb":hex:"cf296aa43cb7b328e09c8975e067404e":hex:"":hex:"587c8e53ab5ae8c31e16160b4a41d88798e27f4ad61c573c023c62d4dbb3952eef5026ad7b453fa9e0694347ab8fe50a6cf20da566202b81e325cee9c07ab2d4d53ed45b3ec2d2135936515f8a24f2a8116807dce9df3c44edf64c32647145152ff241d9e018e4101e400af070192dc3b498b5a213d265b4cfc8c8d4d7deccb5":hex:"56015c1e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #0 [#1]
depends_on:1:2
9:exp:6:hex:"84ff9a8772815b929d55f6052c0354cf3e02bcc8336fcfe5794952b4c45d5d96":hex:"5c044a66e488b853baf479f7dee2aadb":hex:"00304e3d40cbc6d2bee0778462884f4ec047a8c74bb3dd7e100f2b9d0e529fd24730063986117b56ca876b208a3691425ac63afc3d504ccb499c76622eade09717023fcb7d956b01ce24a3e53cb5da472be3fcf5b278b5d9e377de22fab75bc74afa9670f5fe9691aa0ed77e43f6abc67a61ec409ec39fd66ac0307bf195f36f":hex:"a87de56d49725a1625baf12fd15931fe1a6783dce5d1e744eba108f45e0c105d8141dc027d0e33ad7efb6752b43729715e2f3e2c42ebdab4d5f72f886bd821c4372244699ddded99a63dbe7763a5a3bc21cbfc253cdc2514eba2a4f54e24dca7c207cb3f6ae80153d77fe0641f357d5a073dcd425c38deb77c45f27427345516":hex:"72ddd9966ede9b684bc981cbb2113313":char*:"":hex:"aadb8537309940422f67ca393aa6182d67fe7c52092538a15e98a4254f0a9087c7f10903d5e78078c2e55de914dec8b6b35cb720e3e55963c0ac9901e44b83a0e7c5b2d3f002aec0a4a08354febe47b2abb955f2a21107626ef0b8e1e099650812a6fecf36908fce2d078c2735cf7c2b970a309e5c6d6ff29c26a05720c57105":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #1 [#1]
depends_on:1:2
9:exp:6:hex:"b5ca3991d0160b1729ae1a622dcf4b03b1f4ba86150bd66bf35cbbee9258af10":hex:"f8402184d1cc36df07b68ecb1ab42047":hex:"d378cfd29758bcbd21e26a324239c42c992941b3ad68d9f2b3d2def3a051fd172ee882562970ef59798ff8d9eb5f724ff17626156f4cf5d93e41ffef6e525919af6194ea9bbb58c67563d3ffd90e5a6e2a3a33bd1fa3d55eff5dba7cd439d571f7e08014c4780e3d10904ef22b660897e78258da20b2600e88d71c35ecb6329a":hex:"62aad5854a238f096bdde0711ac6f5763e7fea29db068ea8c911f17ba91e6d7807883e6fc5ba7db17af33da2b00973008a3425e65cc786ce1b97360019ee2cef74563d54752be436b905705b507c3d62689df4edf0356d26b693eb43d8a2a927a9f3866b7e0e19e84a90447bd6f47e31070fa7c2a71e3f78229ee19fa47e848f":hex:"9e8b59b4971130557aa84ec3ac7e4133":char*:"":hex:"556dd32edc0af3c64186fe8c000ddad1516cd14721c93c228e379d4f87e32c79e734539cec930322048f34a2b34931c585d44f09966caf187ec4b9244c991a8a5f263e9da1d08d6086e52535afdb36c7662307521cbceb9ecb470a76970243723fbc1613b6ebbcae261ac2f1936e66ce29ec7350b2e6b2f73a910ade645154f7":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #2 [#1]
depends_on:1:2
9:exp:6:hex:"df867d1dd8a287821a54479cab6f88636d2aca30e1bf01a5dffc735e17590356":hex:"35019826c51dd1ef07ff915d9ac4ea96":hex:"0375ed93f287eefe414ab2968844bd10148860c528dbf571a77aa74f98cc669a7fc317adc9f7cf2d80dda29b19db635b30a044399f3665b6176ed669146d28f5ada03b3d32d53fe46575a8afcd37f20386d9e36f7e090b4fefadfab7f008e02f1b5022c0eeb81d03443a276eae48c038ed173631687d2450b913b02c97243edb":hex:"6517272cac85d7f38902bcb4b96a0c59c4bdc46bfefa6ebacd7f2fb1629b87ca91de2ffefc42ce3cfd34dcbf01b3f7cadcea3f99e6addf35d36c51f2ceb1f85c1f56a04ec9c9fff60cd7fc238674992183ea3de72ef778561b906202b7b83fe6562a0bca9c1e0a18638e8685b998b4192f5120435809ad6e93a0422d00725262":hex:"e49beb083a9b008ae97a17e3825692f0":char*:"":hex:"723be39bc13adbc48c861b07753f64fac1ae28fc8933acba888b6538721df0a8b91c040a26522fe0dbb7335d8f63d209e89f7cde23afa9ca3c584b336d63a91e07fdd8808b14c3214c96a202e665bbaaa34248ff30348f3d79c9f16e66ad6c5903305acd887a89b6244eb7c2d96e18b13a686de935bf3821444ee20f48678be5":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #0 [#1]
depends_on:1:2
9:exp:6:hex:"0e8e9ce6294b7fbc534a96bdd060120976a6e08315d2ea73ac61d085cd462a44":hex:"4edc6be20f904b4789e5bee0a80a3fc8":hex:"db28ce076b360816cd1e04b7729f8ab080e0a07f35204350f3bd056945aab8638c0e8311ab056f3e5debdbfbb03fae700770264faf73e0f3a05a5812aee84ab613c82f4a76da276250675f6a663f85e2c26d4f4a8666a7f4cedaffc1a7218dec11ca4e72b8b5d5b620d1efbd3d3b94a5ae0d118b9860dfd543b04c78d13a94c3":hex:"9855f186b51358f0e2111c06bfaaeaec9bf95c55e246375c614fad9883d86c82a20c86538dc5f42a0ea69677d59a20c5112d15d2a8396f12096242ad5d7b838d16ee0679fc4017af75bc15e8ad2f77b0e802c864031cbfb0bacd95c828d1db4b7bab0713619e9e5e8fe6902aac7a9e6c42eb05f5b156f7e663ee43e6fdb62480":hex:"03cfe6c36c3f54b3188a6ef3866b84":char*:"":hex:"e10142f852a0d680c983aad2b4609ccbd35ff61bb3eb66442aee6e01d4cc1cd70f45210acbd506395d6ca0cfebc195a196c94b94fc2afb9ffa3b1714653e07e048804746955e2070e1e96bff58f9bc56f3862aaa5fe23a6a57b5e764666ddec9e3e5a6af063f2c150889268619d0128b3b5562d27070e58e41aadd471d92d07e":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #1 [#1]
depends_on:1:2
9:exp:6:hex:"886c77b80f5f3a21c01932685a540b23629f6d41d5574fc527227ed0bdf2e21b":hex:"5ec506edb1890a5a63b464490450d419":hex:"05b8d820c9f439d7aeae5c7da0ee25fb0dad47cc3e6f3a47e8b984e856201546975f8214531fc3c2e504d2ac10fa49cb948596b9a8fab01b95c49d6f04d1589f93b77b899e803dd20e1f00a51c0b5953e85be639109b14b100e35ca26d84ea629964b0db8260dfa5a150a66261bf37e79de2ec49e9f1b082a7c58ecd3d39b6c9":hex:"53a17d7b69f607f08676d6f6dd4e8db08e01333a8355d8c87616e84cdf10ef5b041fc6ddc3f6a245c0f534c2b167064af82f45e4702a5e8dede59579fdecf6713353392433950c9b97c38d9ee515ac97d0970ccf03981954540088567a30941bb2cca08cbed680500f8342faa7aebbc6c143e2ea57ba6b4ac1fd975dcc5d0871":hex:"ffdf56e1c1a7252b88422787536484":char*:"":hex:"79ee27adfa9698a97d217c5010ec807806feda37db811e398c3b82abf698aece08561fffc6c601d2691738e279eeb57e5804e1405a9913830e3ba0d7b979213ef40d733a19497d4bb1b8b2c609a8f904e29771fa230c39a48ebb8c3376f07c8013fff6e34f10fe53988a6ec87a9296c0a7cfba769adefe599ec6671012965973":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #2 [#1]
depends_on:1:2
9:exp:6:hex:"5231ca6d772edd9ea2d251e22d7d455928c22474b4b44130dad57e6511fed6ee":hex:"048698a4a0feabc1f336112e2794795a":hex:"3a81b6b0b722899ff931cb73c39222d555b83ae3f8880b982593cbc1ab8be90d1ee32fd7dfe697cf24c95b7309d82c3fed3aa6b3d5740cc86a28174ac8f17d860ebb251ac0d71751c2ff47b48bfb0b3beb4f51494464cda34feaecddb1dbbe5fa36c681ada0787d6ed728afc4008b95929a1905787917adc95f1034fedcd817a":hex:"2767c808410ee132291585ea74a48ad3102f883f07d060c91c5f10abd37fe0996d2210dc490260238ae15f5d74c7be2a1e15d80db09079c520047f88488a7802857a3fc3b81d85a96949997430a880177880a31d4d0c9c9045247804f057a4f2756d6e40375a4a3187c4376d6bf573ce334cda1ed88d8a50db499e7cdb89d8db":hex:"ba61edeb7b8966188854fc7926aad2":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #0 [#1]
depends_on:1:2
9:exp:6:hex:"5a3f516a7898e04e5da4efd6c7c5989b77552d195464620c2b35b9a4fda29cce":hex:"9310af6974890c0a0364231f9cc8103d":hex:"2103af8356bcb9dfc2a4f1d4ed09cbcd8e1990d23865605e19f87feb50bf8d10d0257740e5557a9297f0499c01e29a1a513ca18e6f43f7406c865cbe3951a7771128f3110c8da3bd696368901944549552842a1f6fd96cc681b45da098f3c1acb3d237d2363285f520d0b6714b698790b7660c52ac84a42c9721ac7e9d38a2ef":hex:"5cc28b61ae97557774bdcd7ff653f4aa349df68d53c7e5a65263883ef1fe224ad40e86bffc2d38f28a2ed9ae1fc08563e2a1e46246106546eb8e6064c06baa0046fa137421734b7f0f94656a4f459d9d981717557d843700d116b6e5e2dd3af5f67c34edf31b40b71fd3c6f2475f9310feb70bcb973be52d41e86792c49d54c0":hex:"993fc8e7176557ee9eb8dd944691":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #1 [#1]
depends_on:1:2
9:exp:6:hex:"59c9258554363d8a885fc0f5d112fee08eadfc7ce52a0e7e73e3d0d41d9a0290":hex:"77e51e89dc47bbcac79cca21e81a61de":hex:"25a6f8800a9b914c0ebf9a45d72355c03ee72a138eb81b2980f332645ce1d7aa4659805821866aee2b276e2c032776b4eaf36f93b5f9a72b791be24e31eff105ca6d0700e3069ee327983dd7fe1c7465d6c6d77837aff69055149988e7199847fad98605c377d997dbd40f3e2ff1a4f978a493684e401249e69540fbde96323c":hex:"79c491411402ea7878e480519fd984dde44bce6459303bb76d4eaf97d4e345d1aafaa68ceb0590b41cfed0f411b675d9344c7e888cccfc9eb6fe6b229d198f94ba516ee850ee7f078a4f5f32a23f92f72264e3a76a31ebd042564315ac4f2ec0bb49ba6d08cfd2d3a6308688e39f28e3ecd669c588368cee8210edf5dbefb925":hex:"ee6d85d3f3703b45adb4f9b2f155":char*:"":hex:"44ca68deed5478074adfddc97f06f44c08bf7bca4dee8707d621fc7396fe2efcdad0a167d1708a9ff59ce4cddb86920bf1dbdf41b2109a1815ffc4e596787319114cad8adab46cf7f080c9ef20bcf67a8441ba55eac449f979280319524c74cf247818a8c5478ea6f6770996026a43781285dd89c36212050afc88faa56135fb":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #2 [#1]
depends_on:1:2
9:exp:6:hex:"5e9eae594cb54c8089330e4404ff79abb1c0841b0be5347a14633ad1e1ff44fa":hex:"0917b486da754f48bb43ecc8766a7ce3":hex:"2aa1ef2f91aeba5da10b48a882dbd4574df4e9157a18abf8cecd03e4176712ba171b6ecb0e745841ff84e35063e47b08101afc44cfd9cededb913a82f00b9d4bac922f23a22f200642270399896405d00fa5271718eefb4cd5fe7e5f32097766ebff36ff1898a1c8a1a01cc18e6121e470805c37ff298fc65ef2fb1b336d09fd":hex:"32abc1eb6077555a85a0a6fd1c78cccca6c8b375842e2eb8eee45ee6c38dc0837443d16c647252e8124639dd01c808ac5e857a25d927c2a75e2fa8955cad5beb5c206fc050cd933fc4621f5718936f01f39dd700ae1aee7537cc595df8789c5d1a6e1e87b1c7a60e3ce5d57c80dd65dee3801798e1481b1963bcc78cc69f8c50":hex:"92282b022e393924ab9c65b258c2":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #0 [#1]
depends_on:1:2
9:exp:6:hex:"aaf03c3055a35362212b9b059931e7a24fc71e32bc9a533428c9dc31077f2ebc":hex:"7dfccd077b29e6ed5720244bb76bde9f":hex:"21edd1c6056f51fd5f314e5c26728182edcd9df92877f30498949098dcde8089eed84e76d774ef8874d77125669a302d268b99dcd66b349d0271dde6f8cc94dc4f2df3787887b1173cad94d067e346846befb108005387102854d9387d2c0fbc9636cdf73a10d145f4b612c201b46e1ff4465f6a7654ce3da5792daf9a27fb35":hex:"c0e12cdd8233878505e025d52427536be7b6bf1887d2dd20eac7092db80b22417a3a4ca83cdf5bc5e36161be1ff9b73f7ceb297c6d07c9cb2a75035a5dc079e48283daea60596f4b356ca28c243e628cbe459f069709fe193394c9b1a31d8ccc5a3a4eba30056c415e68571a2c34bb5c32efff12e9aa483c4a68be5e76aba4cd":hex:"6154c6799ad7cdc2d89801943a":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #1 [#1]
depends_on:1:2
9:exp:6:hex:"60c775971a9eac7950ed2bdd85bd60fe948ba04c419f6743fb67f37557e46c6e":hex:"9b92ad7079b0de09c94091386577338b":hex:"1f6a84b0df75bd99a2a64849e9686957c6a60932ebe898d033128be9b757e9890225925d856bfdc33ff514c63145f357730bb0435c65342bc5e025267b410af6fd388a5eca01b7efc87fd3b1b791df791bd47dfab736350d7b7f368b4100e04c939d5af957bab95ed502dac904e969876674602a0f0790da2d7351b686e46590":hex:"8abb2e66a4d08074916056bb8e925551372f737f0e1b597c5d08ee102989743a273b29d7281013f8b3aee2934399cb427370d70370ee86eb41584b653660c633506a53cae747826bb7d93909f069d5aacf058b7f2bbdc58ea08653db857bda83a979fc22a4f126dfef7aac45177f4cdb802fab0c812fb35d12a8176ec21336d7":hex:"1d6cd4ab3914e109f22668867f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #2 [#1]
depends_on:1:2
9:exp:6:hex:"3b426e449337a14bc0663246ab61b671b523c9a3130c21ed59c93fa6a5aa5ae3":hex:"e6efc96acd105fe4a48d1ac931eea096":hex:"0902cf7a0685444126369712ac47962bc2f7a3a5837f1b6190d9ab1adb4cd35e7f0892eee628b8e07fcf2b598cebe1ec07d8c4823172ae66a135bb51cc71590707b691a66b56af1ffe38772911d11685da355728eaddd83752d21c119d7b59f4c17c2403629fa55cd70cd331aed7b0de673c85f25c2e9e0267f53f0b7480c8ca":hex:"291bd5a00d71eb7d547b7c94e7030ba4a947418eaeb378a3bacd304b08c6f92f6958eaba968ac6aa23e0512a2a8ad7c1ca2f8fcf623bfc1281f5b7b598c08d2aebcd447668b23238c5e338b4c2ac7f8fd381714c596ea3e0c17aca4317a08563e58f0f52a8af08e078dc242ae54ee0fe3869f8c9687b004a4ded0aa27d8f4c5d":hex:"ca4bfeedcd19d301d3f08cb729":char*:"":hex:"bcef3f2fd101b828d36cb38530cf9a0a7a285ac1c55ee1069cc78466327e85887534c98a8891d579effd832c0f7d6e7e822fb1eea85a39317a547591def4aeed6660872859fc9d1df9725d3c40e9ccaa900e0f1426a55d20ac4f2e8e07bd3bbc687f8e059ab93e7604c97e75ac94be1c8c24f4c4da0080a4d77953fb090cbb62":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #0 [#1]
depends_on:1:2
9:exp:6:hex:"ceaf204ff504ea8e7fade1a2097f2b527a44766860447322fa5ad346cd810217":hex:"cfdb8183251f4b61c64e73243594fdc6":hex:"a60f3969fd1b14793dd1425aa0b1f742a4861e0b50eaffd1525cd209ba6d1252176763bb5bee59aaa55f92341cdc0705899aba44cf0ec05cbf80274ebef65cd9507fd4224b25cac19610968d6a37e2daf9ddf046ef158ef512401f8fd0e4f95662eebdee09dd4a7894cc8c409be086d41280bd78d6bc04c35a4e8cd3a2e83be3":hex:"1c8e4cf6018211518494d46c2e0607fa42e236abc28d58f8175c530f84b1f030572f5f6a74cb5517e1fb999a637d352afcbeadea9121e695675859b66b499a3a351ecba5226e58ebbb59fe12e359e4c89cd51c8703d4643c49921ae495801c73627df404b91e828e1d0e03ae09a39defb5aa5f2c8106953772ba0713d3261329":hex:"9e45029f4f13a4767ee05cec":char*:"":hex:"5cdc66b587ed5eebb04f42b83a6ab7017093514881c598cce332d74fa3fab927493ac15bff26835296e080b5b45ef907c0529fc2f4ed2fc09db179ef598e5d193ea60c301d3f8d823404814e3e74de0e1d2417c963e9246c353201c7a42659d447376e7d05c579dd4c3ae51c2436407b8eff16ec31f592f04b8013efcfd0f367":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #1 [#1]
depends_on:1:2
9:exp:6:hex:"15652abe38cd09777bba21d0db04637f5737d3cb3922181b9f2d07bfdafd327a":hex:"3a5e0d223ae981efb405566264e3e776":hex:"cd755437cb61b539908e0cfaaa36c0123f8f17d1e6539783cb61d4b56cac3bc1e971c1ea558b12669b025cb6b9ad55991c6e2f8ee8b0b7901790193e226a0fbbfff7ff0bee6a554660b9f32e061b6c04bf048484ff9ebd492f7e50e744edd72d02c8fd32f87f9421bf18a5a20ebb4d9dbe39a13c34b7296232470e8be587ba09":hex:"1d6c153dec3b4738a09c9fbdfe31a093eb7ea79b8fa49f83e5e1f46893590f074fb171fb66e30ef887767014e3a10a3aa05da2bd50dd7b7936e1d7f6f31af9030e31e76bdf147f4396464db0f6a72511c4885c6c2305d339906e3c761a3249d7ebea3bf463e8b79c3706e684575550e964b8047979f7aed6ea05056c4b5840b1":hex:"01a573d8e99c884563310954":char*:"":hex:"162430c23f7adcf98575a2d9249b4b5cec42efae33776360ebfa6a19c8eee4bd6b07cbd274deadc3292b7cdbb7803e99d9f67ccc5077f3ad5808f339a05b3213dbfd11377673d4f9b486a67a72a9ac8ea9ba699861dce0de7e2fd83d3ba2a2ec7fabf18b95a2bbe2184ff7bddd63111b560b3afe7f2c76807614ba36c1b011fb":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #2 [#1]
depends_on:1:2
9:exp:6:hex:"a43f6d07042a15cd49f6f52a2a3a67c6c2ff420d95bb94b9fe03b287c3abcaf8":hex:"3b6fad21f0034bba8b1f7a344edf7a3c":hex:"2e01c0523c8293fc51388281dccdb8d0a2d215d729289deb327b8142d716c2bb849e9476545b82f3882ba7961b70c5da2a925ba18b6b121e9215d52ac479c9129c9cd28f81584ff84509d5f9dcb7eaae66911b303cc388efa5020ac26a9cd9ea953f61992a306eb4b35bcd8447eea63cef37bb0c95c1e37811115cf26c53e8c5":hex:"b67e58c8b608724fd20aa097ee483bc4c804490cc79de635170944af75c87ae0ad8261365c1dc80d852553bcba18da9fbc3fbe61d27550a03003ef0c60202054626655509a9e1ab54677e537a4e761df011d6c6dd041c795446b384161ae9eab441afd24d19b58eb4fe5116cd7b11b751ebbd0a2adba7afc380d9d775177099a":hex:"43470bc3d7c573cb3a5230f5":char*:"":hex:"e1720d451fa7ab9db4988567187244b15b6fe795dd4fef579fb72e41b21aaa436d2e5d8735a4abd232a3fb9188c75c247f6034cdebb07fd7f260f8e54efefa4f2981cafa510dd5c482a27753a7c015b3cae1c18c7c99a6d6daa4781b80f18bbe6620bfc1518a32531017a1a52aadb96a7794887c11ad6bdd68187ba14f72a4b5":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #0 [#1]
depends_on:1:2
9:exp:6:hex:"1f0f0191e18db07c0501dbab4ed952c5603a4cd249d2d8d17e62e10b96ae713f":hex:"ab8be16b4db809c81be4684b726c05ab":hex:"a5a6e828352a44bd438ad58de80011be0408d410f6e762e3145f8b264a70c593476b41bb87875746c97de7d5fab120bd2f716b37c343608ee48d197a46c7546fafcdbe3e7688b7e9d2f5b6319c91d3881d804546b5f3dbe480996968dd046f406c11f0dc671be0421cbc8b4ea6811dd504281518bb96148dddf9f0dc4e2e2436":hex:"aad40e7866c26e486b6f6e8eb14a130d5f88891bf0d09aa8fe32f447ab8dea7bee5d3eda4499c0103a010483f2b64fdf1155499d31decf528c77dd7627884f9995c213cf7402143dbb7561d69c86886734260ac94ffac7eb33598d25714228ef43f744ec1af2a87e789f1e5d6fff0fbd5082dcc49328f194e8f8a14a5bfc962d":hex:"d8bd7d8773893519":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #1 [#1]
depends_on:1:2
9:exp:6:hex:"a6cf7d83137f57f2310ee6bf31e8883952bb07ccdc12f516233ed533ea967e5d":hex:"f17e37e73a28c682366bfe619cc673bb":hex:"0f4dd201b18e20230b6233e0d7add6f96537dd4e82d3d0704c047fab41af5faf6bd52bd14fa9a072f81d92a2ce04352f0b66f088c67102d2d127a9850b09ff6087f194a6e8ccaba24091feb303eebb65f1203b2d22af44e7be4de71f03e6f6cbadf28e15af58f58eb62e5bddfae06df773cc3f0942520de20078dda752e3270f":hex:"83ab20698fd7573fd121976a72b45a7f03aad84702fc8ac73d6926eabd8a546895aeffe4ba81d117507e2cd37d58eeff71cc3afa8a4449be85f228ea52f6dc6395bb43c1c9f795343720841682d9b2f00602eafa4d4cbe297bfc62467e526b9d823cc8eeecd9e5f8dbc2f65610663c6f37b3d896651b254bd60215629ade3b2a":hex:"74110471ccd75912":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #2 [#1]
depends_on:1:2
9:exp:6:hex:"b0c85ac6b3887639838ddca94c5c69f38115aa00122322c8114642d12ea1b8fe":hex:"14f68e533ecf02bceb9a504d452e78c7":hex:"796a46236fd0ff6572b1d6257c874038f870aa71cbb06b39046d0fb6489d6ae8622b5154292ae5c4e1d5ff706daedb2e812533ae3a635d339a7fbe53780e3e8204924a5deb4b6856618f4c7465d125a3edffe1ab8f88b31d49537791c0f3171f08dbb5ed1d9ed863dafbae4ecb46824a4922862fe0954ee2caa09ab0e77ed8fc":hex:"0210fce418e7e2199cb8f899c81b9be74a630d00269755f882fc4db27632e99685cc12c426a7503473646df1288d0ede28408be9add5713628700f8e2b2e27d7522520ed00ac47239084651eb99e7d03e1520aae137b768f3144232c16b72158fd5da4a26a2525b9b27791bf06d1eb2e671c54daf64fddc1420bc2a30a324ba5":hex:"6fb0b5c83b5212bf":char*:"":hex:"5e6c362f7587936bcb306673713a6f1fb080783a20e9bbb906456973e529cfa0298206184509c30e1d3793eaaa5d564edd4488f04311821eb652e0a1f4adaf6971505ca014788c8ce085ceb3523d70284ed2bb0aebeba7af83d484df69c87f55a93b3d87baa43bd301c4e55eb8c45dcf3e4612535ea1bd5fdb4c3b9056d0cae9":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #0 [#1]
depends_on:1:2
9:exp:6:hex:"e61b1a6b40e2ab1245ff65dcfb9948318ac4fe55e9ed600cec301dae32ae0e93":hex:"c356244b3034d288e4d4fe901b8e27c1":hex:"bdcfeb09d5b97bab05a7acd9849e7de2c5beb7a4dc573c7e1c1d0c0409245a6584023114fdcc6413c800ca16847bde750b27c4d590248e2ce457c19b0f614f6aff4d78d4a19b3251531e5e852fbb05d09412cc1ff8988d1955ca6f5fe2d820f20a7642e3ae69e8122b06ba0918e806400b9b615e1abe6fdd4f56a7d02d649083":hex:"8d67fa9fcf078e421cb63abeb25dba739ab0e09a091dd06b0c616e1e888f350edb2d73a42f57f115266ea20c7f8fc143ac746649612df06a5e29b4a15934dc049be1ab49d018ab86c4f37d8c3d9c714f038029e74d8ee3dbe61d81adc63712ea413b37f7604da12107aa1695d9b0981e5a92cdfaa5fbda0e31b22c6fd6f3b499":hex:"86acc02f":char*:"":hex:"7c73182eca97d9617abb478a6ce62e3491a7e9951981c89c3071b161a4c80440614c3f24d0155073e28dcccee96bc8303dab4901ef77318df522d16d9da47770ef022395d6104cd623d93d67090a27507fc8ca04157e7939e639c62cd0e7d8a472314833c0eaa9ba2fd54a25b02854e3bff25cccd638885c082374ae520ed392":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #1 [#1]
depends_on:1:2
9:exp:6:hex:"4f5a02e9843d28c8c226ed70d44b8fced8fb757ab6ece4d4f06e3c3cec79e44f":hex:"099e5d9aae89fb6391a18adf844a758e":hex:"ad93e8662c3196e48cfdb5aa3bc923cd204151aa980cbec78f0d592b701f779c1c49f9e8686d7e2385a4146b21a643a59c18c8b82214f42560bcd686fad7c7c8e8c1944ce6b20ec9537dd14b6cf2592740ca112f4cd582250d69f240d3e957040e1f7e19c60b3c8f2bd00cb666604c38946eb9b2f17336d281b4794f71e538a2":hex:"3ec13950d329f24074714c583bdc35686b811f775b76b0a8fcfa66fc56426c9d022f8ab0af38f8d2f71a068548330cdbe891670181ed7491bf40c739ef4dd93689fd35929b225089d2b151f83d9b3cd767300611144586767354c0491112c205409f3168092d27f9b9f433afb79820a2811984d48e70c1fb2a13bbb3ddbc53fb":hex:"30298885":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #2 [#1]
depends_on:1:2
9:exp:6:hex:"1cdb218e0bd0e02156e5b48182990f778889793ef6018a8928e61164ac047c8e":hex:"d2ffbb176f86bee958e08e5c7c6357c7":hex:"bc580c4223f34e4f867d97febf9b03629d1c00c73df94436852cafd1408c945c5474c554cb0faf2bae35d3160c823d339a64ebd607cf765fa91f416fc6db042bc2bd7445c129b4a0e04b6f92a7b7b669eb70be9f9b2569e774db7cb7ae83943e3a12d29221356e08e5bf1b09e65f193d00d9fe89f82b84b3b8b062e649163dc8":hex:"4d039618a0eb640329f90fe97de18bc928fc3fc7a0db42c97774bec2e882e872fc1097c8319f7837a16516bf387b1bae321c565e8fc1cb8480f051158e4685f0adba310d2c6253bc1300403cbd3f7ddcb2796a69f8bf9e73d47aada9a02673c1a3d5ecdac838abf22b385906236529a1b7dd5b8af2611a04cf4f83b15ba41cfc":hex:"1997daa9":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #0 [#2]
depends_on:1:2
9:exp:6:hex:"dc1a145c18bdbca760f35eea0d4a5992de04a0615964ec8b419c8288ab1470f0":hex:"7f8368254955e1b6d55b5c64458f3e66":hex:"":hex:"":hex:"8ddaa2c3ed09d53731834fa932d9d3af":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #1 [#2]
depends_on:1:2
9:exp:6:hex:"7b4766d3a6615ee58b390daa228ae7a541c46ce80a1efe227cc43cb777df3232":hex:"274367f31ec16601fe87a8e35b7a22dd":hex:"":hex:"":hex:"5f3a757b596e06e9b246ed9bac9397f9":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #2 [#2]
depends_on:1:2
9:exp:6:hex:"d19b04055bf6e7ff82e89daef66c9d8319ab25f9197e559444c5729b92c4f338":hex:"796efaff4f172bef78453d36a237cd36":hex:"":hex:"":hex:"3b445f38bf4db94f1a9ec771173a29e8":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #0 [#2]
depends_on:1:2
9:exp:6:hex:"7ca68e300534a90a7a87ca9906e4ac614a6aa51f769b6e6129753a4f83d10317":hex:"45e6b23f8b3feefd4b0ea06880b2c324":hex:"":hex:"":hex:"6c0a1c9c2cf5a40407bfa1d5958612":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #1 [#2]
depends_on:1:2
9:exp:6:hex:"a2b7cd693239bbc93599d3d12c9876e7303b227b8ae718e2c62e689e1fd62903":hex:"548c9c8fcc16416a9d2b35c29f0dacb3":hex:"":hex:"":hex:"3aa21f221266e7773eeba4440d1d01":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #2 [#2]
depends_on:1:2
9:exp:6:hex:"156b854beb0c276a5e724f5da72f0d1ca4ae7cbd5f93a2257d95c2e5bfd78ad4":hex:"a5129e2530f47bcad42fc5774ee09fe7":hex:"":hex:"":hex:"6bb09ed183527c5d5ed46f568af35f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #0 [#2]
depends_on:1:2
9:exp:6:hex:"d824330c60141264e1f709d63227a9a731bcc42b4adec1d8f0161b10b4fdb2ab":hex:"c5afaa45312c64ab3c3cf9d6c4e0cc47":hex:"":hex:"":hex:"55952a01eee29d8a1734bbdf3f8f":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #1 [#2]
depends_on:1:2
9:exp:6:hex:"b5517589948d8aea778df6fd66c17a170d327f69e504f0a4bd504c4286a9f578":hex:"6404b111c6289eefa0d88ed6117bb730":hex:"":hex:"":hex:"637f82e592831531a8e877adfc2c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #2 [#2]
depends_on:1:2
9:exp:6:hex:"f6137b2bcbd327fbcc7f313efa10f6ffaed30e4782e222e1225c87103fcae905":hex:"3b87b08337a82272b192bd067e3245ec":hex:"":hex:"":hex:"1f2dda372f20ffddd9dd4810e05f":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #0 [#2]
depends_on:1:2
9:exp:6:hex:"b5e70d1b78e931abf44bba3f937dbc344858516a8a8afe605818dc67d0c3e4c4":hex:"58e70095c6f3a0cda2cdc7775e2f383d":hex:"":hex:"":hex:"1763573f7dab8b46bc177e6147":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #1 [#2]
depends_on:1:2
9:exp:6:hex:"90de0c047d1dd01d521f2dedec7eb81bc0ace7a5a693a7869eaafbb6e725ad7b":hex:"d565c9cdfb5d0a25c4083b51729626bd":hex:"":hex:"":hex:"78738d3e9f5e00b49635ac9a2d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #2 [#2]
depends_on:1:2
9:exp:6:hex:"c43e8dbeafb079692483a9fcbab964b76fccca6ca99e1388a1aa9bf78dfd2f02":hex:"f2bd4fe0d30c0e8d429cac90c8a7b1c8":hex:"":hex:"":hex:"ea7b52490943380ccc902ca5ae":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #0 [#2]
depends_on:1:2
9:exp:6:hex:"13540919fdb95559e37b535a427efeee334309e34c4608459e204d931b8087e7":hex:"c993c1802df0f075ce92963eb9bff9bd":hex:"":hex:"":hex:"edfab013213591beb53e6419":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #1 [#2]
depends_on:1:2
9:exp:6:hex:"2a7b2e07c148ff0f627ae28c241a395876bbed0c20f3fd637330e986db025714":hex:"8f7e1621c2227839da4ea60548290ffa":hex:"":hex:"":hex:"f9da62f59c080160ec30b43d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #2 [#2]
depends_on:1:2
9:exp:6:hex:"b3e7837a75b38ae6d4299a1ae4af3c2460dfca558708de0874d6b1a5689b8360":hex:"05d363b2452beff4b47afb052ac3c973":hex:"":hex:"":hex:"6b4a16d1ea1c21b22bdcb235":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #0 [#2]
depends_on:1:2
9:exp:6:hex:"9df3ccd95f7570f6ecf5e5329dcb79bcd46cbcf083fe03aa8f5bd0f645c6a607":hex:"774f4e70a7577b5101c0c3d019655d3e":hex:"":hex:"":hex:"98ff89a8e28c03fd":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #1 [#2]
depends_on:1:2
9:exp:6:hex:"1c7123e2e8d3774c8f1bdbb2272f19129e04f29b4351ae19c3b9d24e6ea1fe87":hex:"99f25cebd6cfa7f41390b42df6a65f48":hex:"":hex:"":hex:"8e14a0a4853a156a":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #2 [#2]
depends_on:1:2
9:exp:6:hex:"490090323e9257517e2453469caa3414045cacb4d05d5cebc6b9c06fa6d19291":hex:"c1beff1ff6cdd62339aa21149c4da1e6":hex:"":hex:"":hex:"f998d7c08d609b3a":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #0 [#2]
depends_on:1:2
9:exp:6:hex:"360e48dd38d9e7f5bf29a2994ab5b3c9c70247102d94049ae791850807a4c845":hex:"88126c350dfc079c569210ee44a0e31a":hex:"":hex:"":hex:"f2ebe5e4":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #1 [#2]
depends_on:1:2
9:exp:6:hex:"1562b32e4dd843edaf4474b62cadd8f46d50461f5b22c9f1a8eae7367d35d71b":hex:"af29fdb96f726c76f76c473c873b9e08":hex:"":hex:"":hex:"13fd6dfd":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #2 [#2]
depends_on:1:2
9:exp:6:hex:"d5160d0c98ffcb1c26aad755f67589000e2bb25fa940e6b1d81d780f421353d9":hex:"1552604763453b48a57cea1aed8113f4":hex:"":hex:"":hex:"660c5175":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #0 [#2]
depends_on:1:2
9:exp:6:hex:"c3a3ea3a097c0c2b3a4cb78462d87fd5a8f348687c4150e9d3354b388ab13d17":hex:"f77945979241fb3a454d8e3da193e169":hex:"a69bac31241a2c07d3f7e331b77f662b1e67ccb81c07f52578b01f5785de9437f02eb7627ca7b9af09c1cb428fe93d6deb31f4d6dd2f0729f87480bdeb92d985de1aaad4bcebc6fbad83bede9a5dd1ca6a15bf5d8a96d4edb5bee1f7d195e9b2e5fb2221a596d69f257c18a143eda870e22d3f2ed20c9b3b0d8c8a229c462fff":hex:"":hex:"6b4b1a84f49befe3897d59ce85598a9f":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #1 [#2]
depends_on:1:2
9:exp:6:hex:"e1626327d987342cba5c8c63b75b4ed65463a2b9c831f4f9f80325fa867d1d73":hex:"4e25800deab7ecec2a2311f8fb44eb7d":hex:"ebaffd558f24dae03117c69ac4b2b4aaeaffe7e0e7599eaba678bfce23a9914dc9f80b69f4a1c837a5544cba08064a8f924064cba4d783623600d8b61837a08b4e0d4eb9218c29bc3edb8dd0e78c1534ab52331f949b09b25fbf73bece7054179817bc15b4e869c5df1af569c2b19cb6d060855be9a15f2cf497c168c4e683f2":hex:"":hex:"8faa0ffb91311a1a2827b86fec01788d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #2 [#2]
depends_on:1:2
9:exp:6:hex:"938da64b837275b0c80c442bdf2301aa75e387fe65a775d10a8ec840f62ff429":hex:"dec6adeb60216cbb8a6c3afba49fa201":hex:"4ac144bd95f405649444f01ab67ef3e4c0a54fdbd933b6ba00518c79db45c22c90030c45aadcfdb53ec8199be0cbb22dbb9ab938a871f4b3b0c98ed32590a051abb946c42726b3e9701f183b2092985e3457943a6350fbcaece2e6b111b179ea3fd10ac080a577a1481785111d5f294bc28519c470ff94392a51a2c40a42d8b5":hex:"":hex:"2211ca91a809adb8cf55f001745c0563":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #0 [#2]
depends_on:1:2
9:exp:6:hex:"e2436484ea1f454d6451ad8dbd1574b208d7a3ab4fa34869299b85c24348b43d":hex:"97040d2ec094fe1c64fa35b35b7451a7":hex:"bc198677513ce0e66697dfe52b22315fa5d8f92042f34cc9f373a01f94607df1a599132f60af010ed9b5e52162dd7b162912b68b11700e08f5fdafd84d10f760fc05ec97c05b83e55155194f399594015b90a19c04fb992e228940fe1b54ba59c4bb8318b33cc0df1cb1d71c389473dfb3eefabfe269ca95db59a7bc0201c253":hex:"":hex:"2e080ba16011e22a779da1922345c2":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #1 [#2]
depends_on:1:2
9:exp:6:hex:"7fb3fc72eb8a3aa5b102f90039f852cc3fd64f46915f5e49f1d9e02fe9cc13b1":hex:"f6120fea313362524917c53d90bafb4f":hex:"60c2be7fbd15faf895fd19a9ce775fe2b183b45cffafe4fcbf50d421bea97347e41a9418cfa129b2dda63b889a70063010215dbe38c37feae18bc31b34f31b726f22177f2b4b9d648dd4aa80edfd12dafaee10baa83224354432d1cb62ccabe38bb8448d162cd0d30e988d2e1a2458ffdafaacbdff928756390f66dc60d7ea45":hex:"":hex:"83de3f521fcfdaff902386f359e683":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #2 [#2]
depends_on:1:2
9:exp:6:hex:"697c96d80d0a3fa9af35b86f31fb71a17aed30ce841c79896bbc8863b3b3ee04":hex:"3a5163ec7e007061838d755ac219855e":hex:"de50c12da63232768d5eb9920d49683b5b7114cb77448fa10b9d63552ec5d9c2eac94b375d11f944959f903bb20c696639b6e7f108ec1e873870098c631ddacb2c25268cfc26d2a4cacfb7dda7383374c5456bcf4daa887a887f4293f8caa14419472a8bf7ffd214dfb2743091238b6d1142b116c2b9f4360c6fe0015cd7de81":hex:"":hex:"cd4542b26094a1c8e058648874f06f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #0 [#2]
depends_on:1:2
9:exp:6:hex:"66c1d9ce3feb0e966c33e3fd542ec11cc32f18c2514b953103d32abcdc72633a":hex:"46fdb88fdde9b7d74e893802a0303256":hex:"55d2f263d2e3cf0b390fce1dd1ebd5f666086f26e1ce2f08002bedbb810ada3922c6bfcf6a6adaa556e9e326c9766f02b3eb6e278da2fa3baa7dbdb6373be3c6ecfbe646b1a39e27c5a449db9b559e7ea3496366b8cdbca00ee7a3dea7fdfbea1665bbf58bd69bb961c33a0fd7d37b580b6a82804f394f9d5d4366772cee3115":hex:"":hex:"96ca402b16b0f2cd0cdff77935d3":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #1 [#2]
depends_on:1:2
9:exp:6:hex:"d7c949420dc9497232cd5810f316d11f9e85d36c430b5943ba79836d88c1eb92":hex:"7ef9788ff09cbeedd9569d49083a4097":hex:"ca1de5cc3fcde2638eb72210e551e9c0e0a3f5570d5be83a9a4406b545d854bf17e75b9cd0f4c45722fbd71319a317b72a8798485e9316a1c8102432b83bc95af42f6d50700ba68f6f2e19b6af609b73ad643dfa43da94be32cc09b024e087c120e4d2c20f96f8e9ddfe7eae186a540a22131cedfe556d1ebd9306684e345fd1":hex:"":hex:"8233588fca3ad1698d07b25fa3c4":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #2 [#2]
depends_on:1:2
9:exp:6:hex:"6fe7c70815aa12326cdcbb2d2d3e088bbaaef98b730f87fe8510b33d30e12afe":hex:"e0253bd1f19e99a7f8848206fb8ac4a4":hex:"397897eca4856f90d14c3cdfe1ad3cba47e23174ae2dab7d2a6320898584e03bffa3ffd526f416d7b3c579b0f3628744e36eebb5df519240c81d8bbbf5c5966519c5da083ab30a7aa42deae6180e517cdd764b7f77d19cc1a84141817758887a8d7265e7e62279b9d33cd2f1ba10fd54c6c96d4b8a5dbe2318fef629c8e2af0f":hex:"":hex:"477b0a884d788d1905646bd66084":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #0 [#2]
depends_on:1:2
9:exp:6:hex:"cbeefb3817cb02d617f385cf2371d52c8bcbc29e5e7a55cd2da131ca184c6e89":hex:"f74156d6400ae46b612531848bffe18f":hex:"1abe2ab05ceccf2391273126fe4a4426b94d2c3b97a7f1cd2ee6bb952bf4a546e972b5a1701d5ddb0e5bb7a248fcb47107a9fc77e4b9806b68a11850119aa239fa8be1370e3a2e1a8b168f7323afdfc4b8917d92570167848a56132d68876abc386c258a9233dc8a9eb73443b052e842c3d63e8b5369acdd038404e4e9a4b038":hex:"":hex:"0cb67cec1820339fa0552702dd":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #1 [#2]
depends_on:1:2
9:exp:6:hex:"e6f5f65ce2fc8ec3f602f5df90eb7d506dd771337913680ac16bdcd15c56583d":hex:"9212a548c597677d1747e98ce6fb18a4":hex:"55ca486c0183d0134925880d2e21dde0af51c4c77c6038a5a9c0497884e0aa4715bdb5b4bb864acc708ac00b511a24fa08496df6a0ca83259110e97a011b876e748a1d0eae2951ce7c22661a3e2ecf50633c50e3d26fa33c2319c139b288825b7aa5efbd133a5ce7483feecb11167099565e3131d5f0cb360f2174f46cb6b37c":hex:"":hex:"08d7cc52d1637db2a43c399310":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #2 [#2]
depends_on:1:2
9:exp:6:hex:"0e9a0391435acb57eae2e6217e0941c79a3ff938ec6a19b8a7db2ea972e49f54":hex:"27cd1d7af7e491e30c8110cc01392529":hex:"79140d32bb32dace0779e2d37a0f744d6d973e99a279962b43a6c0af63772e8a0a21d5d9dd3c33d4b218cb2f6f24dd8d93bb4e1e6a788cb93135321ecfed455e747fa919b85b63b9e98b4980a8ccb3b19d50d735742cb5853720c2ad37fa5b0e655149583585830f8d799c0d2e67c0dc24fc9273d9730f3bb367c487a5f89a25":hex:"":hex:"fbb477dd4b9898a9abc5a45c63":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #0 [#2]
depends_on:1:2
9:exp:6:hex:"55a12eeca637654252e3e40b371667e3f308b00f2fd2af696223e4cd89e3fd4e":hex:"8a3793b6441258360f7f4801b03d0b26":hex:"f5810dc5f25e49bd6d94bc63c2494aa7a579a4056a25f1dd9b2734d0b8731ee52523edd54ff475651d45c213e1bf254327fb0e2c41a7d85345b02bcc9d27b08915d332e1659671991a4bb74055967bebbba6ecceb182f57977130623d5a7b2175fa5a84b334868661c1f450b95562928b4791759796a177d59ed18bbf141e2ad":hex:"":hex:"99230019630647aedebbb24b":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #1 [#2]
depends_on:1:2
9:exp:6:hex:"3d353f870a9c088de5674efd97646b9c5420b2bcdfcffefcadd81682847e5331":hex:"f267fa982af5c85359b6447f9b7715ea":hex:"7cf55630867af5dff747c8dd25bcc531d94a7730a20b6c03d46059ea93fcaa00d07ee17dad0e0dff814b02dfef0cbe00b37fd2f5f95ead7c72be60016f2934d7683fc1e47185c7211c49cb03e209b088edb14e533dbcb792ab7033728904f7ff12381a236dba97894ec1fafcf853ab15fff343f9265d0283acef10168ffd1271":hex:"":hex:"9553b583d4f9a1a8946fe053":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #2 [#2]
depends_on:1:2
9:exp:6:hex:"d227c9ff5d17a984983056fb96f3991932ae8132377529c29238cf7db94a359d":hex:"b8f6536f376a7efe0e684acf350bae70":hex:"1cc25da31f90de7fa47ebce92754d3faa99f88d4e25ccab45645c1acdf850d55d7f02f61a0bfdc3125f29259d7da8abef532fe0966c63d3486753c8a2cb63a39349a0641b2f2b9526a03b97d58ca60fbb054c6c164ff2836688b0cad54df2b165bc082eeae660e768dde5130e30f8edc863446661c74da69b9e56de8ae388da0":hex:"":hex:"44b95a37fab232c2efb11231":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #0 [#2]
depends_on:1:2
9:exp:6:hex:"b2a57ef85ffcf0548c3d087012b336c46f6574cf1d97ca087bfad042ee83eec2":hex:"3d580402d2a8dc4d7466e5dcb456be7a":hex:"c2b9e95c16e55028794a63ef82d11fb83a2a75dc34a81f238e472c33264534bdd54cd07d02a0ecf9019ad1a6d6c779f339dd479e37940486950f183bade24fca2f24f06d4037b3555b09fc80279ea311769473eb0630b694a29823324cdf780d7d1a50d89f7a23b05f7a8c3ad04b7949aa9e6a55978ba48d8078b5a2fd3c1bbb":hex:"":hex:"072d4118e70cd5ab":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #1 [#2]
depends_on:1:2
9:exp:6:hex:"63889ed5bf2c27d518a696b71c0f85592e3337aae95b5bf07289e4c5dfdc088d":hex:"1ad534280a0fac7dce31f2ae4fb73f5a":hex:"be1b9dabea33bb9443e27f674b27931c0fba699a33dc86fab29e50b76a9441030444b465317bbf2949faf908bc1b501d11a5ea2042e4b460a85f3be5836729e523d99b56ef39231d5c6d8ae2c2ab36ef44e2aa02a1f2c559c6e333216c7f9ed5f9b880a88e920219204c99a3ae8f90afd1396563bc59a691a93e0070b0b5fd90":hex:"":hex:"1bcea0ac2c1a0c73":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #2 [#2]
depends_on:1:2
9:exp:6:hex:"94e3e2c17cfb6f52d4fdba3ba6d18bba891b6662e85df14d7e61f04adb69e0e5":hex:"8a80efb3bfe220526997543409fddb4d":hex:"05da1b0f7ac6eef488d3f087ecae7f35abe3ef36d339709dc3fcb5b471979268ee894c3b6c7f984300d70bc5ea5fba923bfb41d88652bdaecc710964c51f3e2ae2c280b7d6c8e3b9a8a8991d19d92d46c8a158123187f19397ad1ad9080b4ffd04b82b5d68d89dacd3e76439013728c1395263e722b28e45dabf1ef46b8e70b5":hex:"":hex:"faa5c13d899f17ea":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #0 [#2]
depends_on:1:2
9:exp:6:hex:"fe5e479ad0d79dbf717a1f51f5250d467819e444b79cb3def1e0033c80ddadd8":hex:"47ce838083fd070d8544c0ad5337cdc6":hex:"98476bf05a18c4ff1b6024dd779c1ac06d838705a0a83fe42bee5fc6ebf3b2a1a5049b67f4aabc8239cd6ff56504bcbad1e2498c159bbec2a6635933945f6ea49e5bc763dcf94f4b3643d3888f16105abb0965e24f51cb4949406124145e9ae31cc76535b4178492f38b311099df2751f674363ae7a58f6f93019653b7e6a6f0":hex:"":hex:"a3958500":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #1 [#2]
depends_on:1:2
9:exp:6:hex:"27d4dedb71a8f68ca5ce2b9e56da772bf5a09b7981d41cd29f485bd2d1adb8d4":hex:"7e6f0343c54539717a97b6c8b9f7dec4":hex:"d386db78043f719b7e137cbf79a7f53dda2fe3baccbebb57d499f6eb168e5151f10081d76b72ae0f30165efbdda469e826f9246e59dbcad5c0b27691c00d6c192c24073e99c19cf8c142087c0b83c4ce2fc7ba1e696394e5620ab2d117d5dcd2ac2298997407fd5de07d008de8f9941a4a5f8074736a59404118afac0700be6c":hex:"":hex:"50fd1798":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #2 [#2]
depends_on:1:2
9:exp:6:hex:"5a7aa836a469d28542d0d24d3232fad266da8fc889c6b6038b726d3da25f7b20":hex:"9faf7cd805803e143ec8f3f13475efd2":hex:"1006c707f608728b2bf64734062b12a5625062bcdcb80a3ce2058352a2922d5e6fbe19681b4f0d79ad3c837f81e72f2fbf8df669894e802a39072b26c286f4b05188c708f7c6edd5f5bb90b87ffa95b86d84d6c1c4591b11d22c772a8ad7f2fe6bd8b46be0e93672df2e8bff8ba80629e1846cfd4603e75f2d98874665c1a089":hex:"":hex:"07764143":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #0 [#2]
depends_on:1:2
9:exp:6:hex:"a9444fd176acbe061d0221fde3ddfcc4ff74e995d981a831297c4cbda51c22a1":hex:"5714732145470da1c42452e10cd274b5":hex:"":hex:"c146ff5a988496cad7eced7a2ea471e0117d5d6bd2562c23ce9db4bf36d83ba3fc22e90486ec288a627d208e0b2fd3b65f8301cf7fc41d97959981a95cd1cf37effc46db99b94b21c941c3613c26a10b1a6b7793f467d58ff5134612230f1c49d7e1fcf664fe52fc6eca46273982f6fe729b009d90eb8d8e4a0b0dbe907b76da":hex:"db85b830a03357f408587410ebafd10d":char*:"":hex:"a3cad9a57fa28e6f6aaa37150a803bf8b77e765f0702e492c4e5ebb31ae6b12d791149153e469a92bb625784a699fd7ca517500ee3f2851840ba67063b28b481e24ba441314e8b7128f5aaccaf4c4e2c92258eb27310bf031422b7fc2f220f621d4c64837c9377222aced2411628018a409a744902c9e95c14b77d5bb7f5846b":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #1 [#2]
depends_on:1:2
9:exp:6:hex:"686d3bd071e3f46f180611bc4ec8d7726fe72b6c617e7d42b3339f53918c9e36":hex:"a714e51e43aecfe2fda8f824ea1dc4b7":hex:"":hex:"21983ad66449c557263aef299da6eef8f31d576fc17ed2dac3e836f7c2ceaff3094b2695452680e188df10c174810efd1fbaa6c832baedce0b92e4c7121447f6461ac909b4302cdf658095b1de532b536faa4fb38cfdf4192eb5c3fe090d979a343492f841b1edc6eb24b24bdcb90bbbe36d5f8409ce7d27194a7bb995ecc387":hex:"cd30c3618c10d57e9a4477b4a44c5c36":char*:"":hex:"9610908a0eb2ee885981c9e512e1a55075a212d311073bbb2fb9248cce07af16ee4c58bdc8dbe806d28480f9065838146f3e1eb3ae97012cfe53863a13d487f061a49a6c78ca22a321fa25157dbe68c47d78f2359540cc9031ee42d78855ed90e6b8ea3d67725bfffcb6db3d438c982b5f88d9b660f7d82cb300c1fa1edebb6b":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #2 [#2]
depends_on:1:2
9:exp:6:hex:"6fe81f15a02e2ecf46e61199c057102d160e6b5d447d4a275972323fff908c3e":hex:"91d55cfdcdcd7d735d48100ff82227c3":hex:"":hex:"0b4ee0385e6665da8fd2ae47f2d0cf1c5bd395a3bb447047ab5a3ae0b95355bf83d0381119a8d4c01acbe60cd7885da650502f73498a682fdc94f7b14f4c753226064fa15e3a90a6083e053f52f404b0d22394e243b187f913ee2c6bb16c3033f79d794852071970523a67467ce63c35390c163775de2be68b505a63f60245e8":hex:"cd7da82e890b6d7480c7186b2ea7e6f1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #0 [#2]
depends_on:1:2
9:exp:6:hex:"4c2095e1379389dc3810e8819314f5a2f87d1494213c5b1de1a402f7f4f746c4":hex:"19788b2e0bd757947596676436e22df1":hex:"":hex:"26ec8ebac0560538a948afbc18fb730e9a91f21392bde24b88b200f96114b229a5b57fa9d02cf10e6592d4dfb28bf0f00740c61157ce28784e9066ea3afd44ecf3a494723610cb593c0feffc6897e3435c6f448697ad3e241685c4e133eff53bdd0fe44dd8a033cfb1e1ea37a493934eb5303ae6ef47ce6478f767ef9e3301ab":hex:"f26a20bea561004267a0bfbf01674e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #1 [#2]
depends_on:1:2
9:exp:6:hex:"be5351efc0277afc9759ec2464a22cb4401f7a17efd1a205e7af023c7ed30ee1":hex:"c6b26117d9dbd80c1c242ad41abe2acc":hex:"":hex:"1eca91406f338fc09c2988b1d7dc8c409d719300c03840a497d7b680cdd5e09b144903477f7116a934e1d931cf368af1fc2a0a0e7caa95475a3cd7bf585a16fda31eb3f8201db0216b37a1635c1c030836b3dd05ca5b0194388fa198e717822131d5d4318690ef82d35ac80b27fff19aec8f020dc6c6ce28f0813bbbf8230ad9":hex:"61051d6c0801b4a6b6ca0124c019f3":char*:"":hex:"95447aded336d6c20d483a6f062d533efed0261ad321d37bf8b7321b98f55c0f0082ce7f3d341b18fea29a72fc909d30cd8c84a1640227227287674a9b2f16a81b191ecf3b6232d656c32d7b38bea82a1b27d5897694a2be56d7e39aa1e725f326b91bad20455f58a94a545170cb43d13d4b91e1cee82abb6a6e0d95d4de0567":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #2 [#2]
depends_on:1:2
9:exp:6:hex:"814c2cdfdeecf39d43bb141fbfc62dac44f7552c5e5dac2d4913303fc860119b":hex:"0db3ade15cb0dea98a47d1377e034d63":hex:"":hex:"0d3013a1d7132f685d001420daa6c7b643bc36b887511acc4588237d3b412c79e4ebba29c08248ad46c7239e8daa232b7483c9c4e3d1c0bbebc696401efe21f7fd6fc0525a4ab81bd9a893d5f7ab23b70ed07c00f33649b8a996a006de6c94f7793f72848793f4d5b31311c68aae1e715b37409fbe506dac038a0950f05fe82b":hex:"e62f910b6046ba4e934d3cfc6e024c":char*:"":hex:"374d03cfe4dacf668df5e703902cc784f011f418b43887702972dcc3f021bcb9bdd61ed5425f2975b6da7052c4859501eb2f295eb95d10ba6b2d74e7decc1acacebf8568e93a70a7f40be41ac38db6f751518c2f44a69c01c44745c51ad9a333eda9c89d001aa644f1e4063a8eb2a3592e21c6abc515b5aacaec8c32bcf1d3c4":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #0 [#2]
depends_on:1:2
9:exp:6:hex:"1ae4541110f2bc4f83cd720b5c40c8315413d896e034b75007f172baa13d29ec":hex:"83f98eec51ee4cae4cb7fe28b64d1355":hex:"":hex:"5ea811e7fbfc0e00bf2a6abfac50cad9efd90041c5f7fb8f046a0fecbd193b70a2de8a774d01dd3cd54f848cb3e9f5152ee1b052ba698bebfba1fbbdae44a260447d6e6482640ae4d01c9cac3d37d4ffe9a0de0b6001de504a33ef7620efe3ce48ecd6f5b1b3a89185c86d4d662a843ff730e040e3668d6170be4cced8a18a1c":hex:"df47eef69ba2faab887aa8f48e4b":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #1 [#2]
depends_on:1:2
9:exp:6:hex:"20c9b662ec4bd13bf58d64cb0a7159b0e7fee4703af66292bf75c8bd6e42e8dc":hex:"2bc0847d46f3d1064bbf8fe8567f54a2":hex:"":hex:"45b64f2ed5ac707890c0c1726adf338770ce6a728fe86bb372c4c49409a32705f881bc4d31a27c455c7c7df9dd2c541743523e7d32f88930d988857847f011be5f5f31a31e8812745147cbff5c1294d0fd4a7285db4833f22bf1975250da99c4d0dd2c9688d7f8001bb6ef2bc898ce4d42c5b78e74645b56ce992338f49d4183":hex:"5a1bf25aa8d5c3fe5cf1be8e54a1":char*:"":hex:"9079d6275db076625e8474c2914fe483d413d5339202f98f06c3b0ef063d8f3d31029deaf7f9349bfec57e5cf11f46f02d5a6520c7992efc951adbbea6d08e53faeb10dfe8b67ee4685da9ea4fe932551a65821147d06d4c462338e6ddda52017c2bc187fd6d02b7d5193f77da809d4e59a9061efad2f9cadbc4cd9b29728d32":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #2 [#2]
depends_on:1:2
9:exp:6:hex:"0a1554db37f2e275732a77e521cbd8170729d8677a85db73feacf3c66a89d689":hex:"b9194a4d42b139f04c29178467955f1d":hex:"":hex:"5421d93b7e6e0091978c673df4f3a406aef5f13eb5e6f95da19b0783308cbe26d4fd6c669cc4a9f069d7e62e4c6fad14b80e918fe91556a9a941a28b3dbf776a68ac7c42df7059b5ed713e78120aec84e7b68e96226c2b5e11a994864ed61b122e7e42ef6cfdae278fadbae1b3ea3362f4e6dc68eef6a70477b8a3ffcfba0df9":hex:"05949d591793ca52e679bfdf64f3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #0 [#2]
depends_on:1:2
9:exp:6:hex:"3ab1d9bb571c4bdc9f3ef340914bddcfe0c8e7718d4a2530334372cec86e5fcb":hex:"6a5335901284dd3b64dc4a7f810bab96":hex:"":hex:"80bcea307e009745724d5f15d21f3b61a5d5a8401530346b34a2adfa13e3e8c9c9327d6fad914b081e554fbe6c1c6fe070b566620e559555c702c0ab5becf61ea1d9de64351ce43b2276ef4e20b5af7ce43db6d21286af4e740ef00c6d790705afcf0ee4850fffc12c662f2bd8212feb21db31065ab8f717a7509c213352b869":hex:"04b8e5423aee8c06539f435edd":char*:"":hex:"36b9602eee20b8f18dce0783cd1e01a799f81ae0a1ce6d293a26c62f47e7dad85c8446697cc09c81d3d9ead6f9e55c4147211660c8aea9536cc5516e9883c7d6854be580af8cd47ba38fa8451f0dad9c904e0e7f9997eff7e29bf880cd7cedd79493a0e299efe644046e4a46bf6645dfb2397b3a482a346b215deb778c9b7636":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #1 [#2]
depends_on:1:2
9:exp:6:hex:"7dddbd5657e22750bfe6baa70a1f4ac46c1ef8bee573a57cfcef50b66f85e593":hex:"fcb962c39e4850efc8ffd43d9cd960a6":hex:"":hex:"2bf5aba83a8161b9d21ff29251fb0efa697b1ea9c1b3de8481d5fd4d6b57afda0b098decdc8278cc855f25da4116ed558fc4e665a49a8fff3aef11115757a99c10b5a73b1f794f9502186c13dc79442f9226bbf4df19a6440281f76184933aeae438a25f85dbd0781e020a9f7e29fb8e517f597719e639cbd6061ea3b4b67fb0":hex:"1d8cdadcf1872fb2b697e82ef6":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #2 [#2]
depends_on:1:2
9:exp:6:hex:"6916b93b2712421f1f4582de7ec4237c4e42e2b32c7dced2f8bb5bd2e0598312":hex:"b4d9248bb500e40de99ca2a13e743f1c":hex:"":hex:"3739cca20279a36ddb857ac22beae901a49529b3182463ab81a7c46e437eb0b0571e8c16f7b626ecd9f2ca0cd83debe3f83e5d58ed3738899f4b616755eb57fb965208f261736bdf7648b1f8595c6b6a779768115e3077dfee7a42d44b555a51675fb1ce9961d0e21b2b9b477c0541184350e70decf7c14a4c24b8a6cd5fed8e":hex:"090d03446d65adcc0a42387e8e":char*:"":hex:"0255be7ac7ac6feb3a21f572f6a593cc8a97f17af7064c80e478f4a6c469cf94d604bc014b003bf284d216161a9c8a493af43c6a0d8caf813a9e6f83c7ed56dd57543876b11f76aa2be80dcd79d19ac61f00fa423ac2f52fae7a8327cd91494ca4116feb735980ad0a4b1445cb7f38cc712b8aee72179e65b97fca38694e3670":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #0 [#2]
depends_on:1:2
9:exp:6:hex:"b751c8b724165009a8bd97a9d2a0e22cae5a95c4743c55eeeef0a6fe7d946bec":hex:"160c50c0621c03fd1572df6ba49f0d1e":hex:"":hex:"e8546a5af1e38114822e60e75563a9399c88796f303c99c69d1f3c50379da81e1cd5b5a4a721e23c59da58ea4361b7ff58408e506a27fea24f9a235c6af7f7a5bd93fa31e90edfc322821c08d6324134830b7fe160b4a3e6d27866a10e6e60762a31618ef92f5c67ccb1deb1f1b188f0e687165e7c366c7418920df4f4fcdcae":hex:"9fef9becf21901496772996f":char*:"":hex:"175fa6b7cd781ec057ff78ba410f2897a920739b5fc4f04bc9b998fbc7cc18e327ad44d59b167e4627256aaecd97dc3e4a7c9baaf51d177787a7f4a0a2d207a855753c4754d41348982d9418b6b24b590632d5115dc186b0ba3bec16b41fa47c0077c5d091ec705e554475024814c5167121dd224c544686398df3f33c210e82":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #1 [#2]
depends_on:1:2
9:exp:6:hex:"0faf32c22c2a4ee38fe4b5ce08f98fdf6f83b5038dcba5ec8332b3eeb5c710c7":hex:"04885a5846f5f75a760193de7f07853c":hex:"":hex:"8a556cc30075753c6e94c2f669bca2058ff6abcbffffc82da7cfca0a45af82dfb4cf487ceb4ede72be87ee4c8b72db1e96459de1dc96721464c544c001d785f2188b9fccaec4b1a37970d38b326f30163d2fdfdf8a2ce74aec55abcd823772b54f8081d086a2e7b17b4086d6c4a5ea67828ef0b593ea1387b2c61f5dfe8f2bb0":hex:"0c13506ed9f082dd08434342":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #2 [#2]
depends_on:1:2
9:exp:6:hex:"0dddc3d2f82bdcdbc37648a6b9b416af28753740f8e998cd1a52a0b665369f1c":hex:"0a93b883cbd42998ae2e39aab342cb28":hex:"":hex:"07bf84b15b21951fd22049be6991a672503ae243b8d285fb1e515e1d2c36bfd5b0d0bcce85791f2cea8f616aed68a7d9cf4eaf76418e8b1ec27751de67cbfd9d9f7905b2667904f10d598503f04c04ea00a681ff89a9c446d5763898430bd7a9dfebfe544e3ed3e639b362683a651e087626ffa63c0c2b3e0dd088b81b07f75e":hex:"5c37918edb7aa65b246fd5a6":char*:"":hex:"ff7b7b2f88b8c6f9f9bad7152874e995eea0ff1ce1ecd9b8d563642a37a31499f14d70f0dd835b7adf80928497f845fd8c2786cd53af25f8c9fe1bba24e3c3860162635bbed58f06cf6c9966bb9b570987a48329279bb84afb9e464bb4ad19ae6600175086e28929569027c5285d2ed97615e5a7dada40ba03c440861f524475":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #0 [#2]
depends_on:1:2
9:exp:6:hex:"a0b1a62e46e7712277fc711e19d0c0c865ee77b42ac964b7202dbcaf428086c2":hex:"e20957a49a27e247d00379850f934d6c":hex:"":hex:"7dd7c0787fdbea4aacf929341659dcf4b75cbca8f92001e8b62a4d7b40272c5755fa9c445857db05328dc11ce5221f044f4b3dafbf0e2d72a1ad0d3e4c804148db578218690ccc620d8b97b4450ff83400a6caaa959617611446a6627138a4067be9ea410d4b0581022ab621928205b4a4480560fc4c2c3b39a2805684006f35":hex:"c99751516620bf89":char*:"":hex:"9307620479f076c39f53965c87d20c2aff11c736c040dba74cd690d275591a5defc57a02f6806de82eb7051548589484364f6c9b91f233a87258ede1ee276cb2c93b4fc76f4d7e60cbd29ba2c54cb479c178fa462c1c2fb6eeb3f1df0edfb894c9222b994c4931dedf7c6e8ddecbde385ddf4481807f52322a47bf5ff7272991":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #1 [#2]
depends_on:1:2
9:exp:6:hex:"ffcc1c88fba1723b3ab57b458d9bffb98b878c967fb43b9db2ae0753d32a3bb1":hex:"d533c2170c5dc203512c81c34eff4077":hex:"":hex:"19b6dec86d93c466307de3a36c0791ed1010b1b9cf8d30347ae46e0f9283c9fda43da8cb491dd17cc4298b1f0b876d6a0f4bcbc9667fe34564bc08f8f7b67045057d19f4bf027bc839e590822fa09a5cef1af18e64a0116aa2a01a3f246c2b5272c18c9aa23efe674ba53d533ae8f0695cb78c1155cdc7a9d7fae2c4567dc07c":hex:"167ec8675e7f9e12":char*:"":hex:"0539287ac546fe5342e4c3c0ec07127dcd22899abfe8cdd6e89d08f1374d76e877bec4844d06e0a9f32d181c8d945ba16a54ce3725fae21d8245c070a4da0c646203d6b91325b665ab98c30295851c59265b4ab567b968b6e98536b7850738d92e9627b4c9c6f5d9ae2520944783d8f788a1aa11f3f5245660d41f388e26e0a1":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #2 [#2]
depends_on:1:2
9:exp:6:hex:"55e94b339c3bafe068ef9cc30787cc6705850114976843777c92b4b331801650":hex:"2e2b31214d61276a54daf2ccb98baa36":hex:"":hex:"147cc7bc4008dadf1956520b5998d961499bdf3d8b168591adbfd99411ad7b34eb4b2a5c1bb0522b810fec12dd7c775784d7ecdc741e6dec8191361e6abf473b219221801951b4d5ffe955ab50eef9cffdfee65ba29ddfa943fb52d722825338c307870a48a35f51db340aa946c71904d03174b1e4a498238b9d631a6982c68d":hex:"5266e9c67c252164":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #0 [#2]
depends_on:1:2
9:exp:6:hex:"13c9572bdef62510d84f2d415cc481cd1e71b9c1132b43e63b21ba4e16de9b39":hex:"a8339ba505a14786ad05edfe8cebb8d0":hex:"":hex:"7c78e634dec811173ff3c4a9a48ae3ae794fbd2aefd4b31701777ff6fcb670744c592a1d298d319717870dca364b2a3562a4ffa422bf7173c4f7ea9b0edf675e948f8370ffd0fd0d5703a9d33e8f9f375b8b641a1b1eecd1692ad1d461a68d97f91f9087f213aff23db1246ee16f403969c238f99eed894658277da23ced11ee":hex:"df3cab08":char*:"":hex:"91f9780daefd2c1010c458054ac6e35baa885cdd2c95e28e13f84451064e31e0739f27bf259cb376ab951e1c7048e1252f0849ccb5453fc97b319666ebbfbc7ef3055212a61582d1b69158f3b1629950a41bc756bded20498492ebc49a1535d1bd915e59c49b87ffebea2f4ad4516ecdd63fa5afda9cce9dc730d6ab2757384a":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #1 [#2]
depends_on:1:2
9:exp:6:hex:"30a14ca53913acbb215b4e4159083106db3fff83cbedd1e5425f65af1e94f5dd":hex:"4f23f04904de76d6decd4bd380ff56b1":hex:"":hex:"8c5f73ee1544553b712ad7a14f31379c8d54a4e432fb6c5112436988d83c4e94954b0249b470538fb977b756fbee70b811d4dc047a869e207bb0b495f1e271d0034e912000e97594033e0dedde0591b297f8a84bafcc93a46268a5bba117b558f1c73513e971c80a7083e1718fc12d0cc0d996a8e09603d564f0b8e81eea28bc":hex:"18e92b96":char*:"":hex:"bb4b3f8061edd6fa418dd71fe22eb0528547050b3bfbaa1c74e82148470d557499ce856de3e988384c0a73671bf370e560d8fda96dabe4728b5f72a6f9efd5023b07a96a631cafdf2c878b2567104c466f82b89f429915cf3331845febcff008558f836b4c12d53e94d363eae43a50fc6cb36f4ca183be92ca5f299704e2c8cf":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #2 [#2]
depends_on:1:2
9:exp:6:hex:"e69f419140289ac25fb0e2ef9cc4f7e06777ac20f7d631918d1af0c8883b7d6a":hex:"531248afdaaf1b86cf34d2394900afd9":hex:"":hex:"ff8dfa4e70490ea9c84cb894dc5d7e1b935ebcdea80a39c4161d4db42cbb269cc86abd381af15ec9a4a42ed18c1eed540decec19722df46f22aa06883297cb393fb23e4bb31a817e88357aa923c7ecbcf24c28a09f622dd21fa70c0a02193024fdcefeaa96cc1b50f81a65dfa9e1bb5126f0c9766a861eed096ec15fb07b0f81":hex:"c6885cdd":char*:"":hex:"f75299e0ead3834fc7ebd4b2051541b598ad57cc908fdcd4324cf4ccf7dcf7b3f0737ad6c026399a8b1b6d3d50011b3c48ea2c89833b4b44c437677f230b75d36848781d4af14546894eecd873a2b1c3d2fcdd676b10bd55112038c0fdaa7b5598fe4db273a1b6744cba47189b7e2a973651bfc2aaa9e9abea4494047b957a80":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #0 [#2]
depends_on:1:2
9:exp:6:hex:"404a5d1ac9e32f9caabffbfa485ce9c27edc9e5cde0f2aab4f32ce3121449b88":hex:"b6e6c078e6869df156faa9ac32f057c3":hex:"6ebc75fc9304f2b139abc7d3f68b253228009c503a08b7be77852da9e1afbe72c9ab374740b0dc391fa4d7e17de6a0aa08c69e6f5c5f05411e71e70c69dfbcf693df84c30f7a8e6c7949ea1e734297c0ea3df9b7e905faa6bbdcaf1ff2625a39363308331d74892cf531cb3f6d7db31bbe9a039fca87100367747024f68c5b77":hex:"b63ec4d28854b7fe2d4d13973f5bcb16f78494ce25cc2820de9d0dc1d8d91db1f19bc9e01cee8418c9e88a69b2f30cdbb0dbdbb50be71e1e666c111c126f2b7197c02f69a1b2ec5e1bf4062b2d0b22fb0fa1585b4e6286b29f6ac98d1b1319dd99851fa6921607077d2947140fdeeea145b56ea7b6af276c9f65393bc43ede33":hex:"94c1b9b70f9c48e7efd40ecab320c2d3":char*:"":hex:"56a0ac94f3ec7be2608154f779c434ee96db5ed4f5a6e1acfb32361ce04e16e1337be5978df06d7c4f6012385fb9d45bb397dc00f165883714b4a5b2f72f69c018ffa6d4420ad1b772e94575f035ad203be3d34b5b789a99389f295b43f004de3daaef7fa918712d3a23ca44329595e08da190e3678bc6ad9b500b9f885abe23":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #1 [#2]
depends_on:1:2
9:exp:6:hex:"b56f0c980acf7875cf7f27d53ad4a276adc126d0b93a5774ac4277eecad4309e":hex:"b004c049decfb43d6f3ec13c56f839ef":hex:"b2045b97fbb52a5fc6ff03d74e59dd696f3f442c0b555add8e6d111f835df420f45e970c4b32a84f0c45ba3710b5cd574001862b073efa5c9c4bd50127b2ce72d2c736c5e2723956da5a0acb82041a609386d07b50551c1d1fa4678886bac54b0bd080cc5ef607dca2a0d6a1e71f0e3833678bf8560bc059dae370ec94d43af6":hex:"2c94299e36b7c4a825ecbc5a7809061e0a6761764a5a655ffdb0c20e5c3fcb10f4e93c68aa0a38c2acc5d06f2b7c4ff4fcf814b551bfefa248dbe06a09a0f153213538a31fa7cf7d646b5b53908d8978f514c9c4d6d66f2b3738024b5f9c3fd86b6da0c818203183f4205f186ea44a54edb911b1a17c424c95852c8d271b2e93":hex:"fce7234f7f76b5d502fd2b96fc9b1ce7":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #2 [#2]
depends_on:1:2
9:exp:6:hex:"1c5027c36e6caa1b3e5e45fead32b5e3126ac41f106c491b0b3a7c16502f4fe6":hex:"3ee660f03858669e557e3effdd7df6bd":hex:"93e803c79de6ad652def62cf3cd34f9addc9dd1774967a0f69e1d28361eb2cacc177c63c07657389ce23bbe65d73e0460946d31be495424655c7724eac044cafafe1540fcbd4218921367054e43e3d21e0fa6a0da9f8b20c5cdbd019c944a2d2ee6aa6760ee1131e58fec9da30790f5a873e792098a82ddf18c3813611d9242a":hex:"58f0ceaa31c0025d2e6bb58720cce4b64f5f6c657c847ae42936eb1e343fea397c8a8cf2f5ef02ffaec25f431900dcb0910cf32cea9eca3b78aed1c451c7af51066489f87b2a5f8cf28d6fdb6ce49d898b6167b590a3907be7618be11fb0922a3cfd18e73efef19e5cdc250fa33f61e3940c6482ae35f339e8c0a85a17379a4e":hex:"ac33f5ffca9df4efc09271ff7a4f58e2":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #0 [#2]
depends_on:1:2
9:exp:6:hex:"34c3019810d72b5e584f0758f2f5888a42729a33610aafa9824badade4136bbd":hex:"f315ea36c17fc57dab3a2737d687cd4f":hex:"f33c5a3a9e546ad5b35e4febf2ae557ca767b55d93bb3c1cf62d862d112dbd26f8fe2a3f54d347c1bc30029e55118bab2662b99b984b8b8e2d76831f94e48587de2709e32f16c26695f07e654b703eba6428f30070e23ed40b61d04dd1430e33c629117d945d9c0e4d36c79a8b8ab555d85083a898e7e7fbeb64a45cc3511d99":hex:"22deef66cbb7db240c399b6c83407f090d6999ba25e560b2087fed0467904bb5c40cbaa05b8bf0ff5a77c53fa229478d8e0736414daf9c420417c391c9a523fd85954533f1304d81359bdcc2c4ac90d9f5f8a67a517d7f05ba0409b718159baf11cd9154e815d5745179beb59954a45a8676a375d5af7fae4d0da05c4ea91a13":hex:"0bae9403888efb4d8ec97df604cd5d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #1 [#2]
depends_on:1:2
9:exp:6:hex:"29397d98fc5a7f04b5c8b6aa3a1dd975b6e4678457ae7f0691eee40b5397503a":hex:"885543a45fd1163e34ef9276145b0f8c":hex:"d88beaa0664bcef178cbdbfab17ff526b5c0f8ad9543c6a312d93c336707fbf87c0448b07a550580953279f552f368225cc6971f1eecc718d6aad1729c8d8873081357752bd09d77075fa680cb2dc4139171e4a0aaa50b28c262c14fd10b8d799ca1c6641bb7dfdfdf3dea69aa2b9e4e4726dc18b0784afa4228e5ccb1eb2422":hex:"0bbf1079cb5569c32257bc7e52371db46f3961b457402b816588243b4523543430d5ca56b52de6632724c51e6c3af310b28822c749a12bdd58dee58bbc3266631562a998ec3acdc8a2567a9f07f7f9759c3f50b1d1dcdd529256b80c0d227fc1fe8b58c62d1c643f1ac2996809fd061afcf4a9af184c14db9e63ec885c49de61":hex:"7b334d7af54b916821f6136e977a1f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #2 [#2]
depends_on:1:2
9:exp:6:hex:"7555dfcf354da07fd70f951d94ec1d86a635edfdb7929460207b2a39cc0cf4a3":hex:"e1b30b6a47e8c21228e41a21b1a004f0":hex:"bf986d3842378440f8924bb7f117d1a86888a666915a93ba65d486d14c580501e736d3418cebee572439318b21b6e4e504a7b075b8c2300c014e87e04fa842b6a2a3ebd9e6134b9ddd78e0a696223b1dc775f3288a6a9569c64b4d8fc5e04f2047c70115f692d2c2cefe7488de42ff862d7c0f542e58d69f0f8c9bf67ef48aea":hex:"a1351cfffd1b0cbf80c3318cc432d3238cb647e996b7b53c527783594683f535950cd08788687c77226b2d3f095955884adc2e475ca1e1eab04e37d5e901ae8934a9d3a0cb37b80612ca25d989856dfa7607b03039b64d7dcd468204f03e0f2c55cb41c5367c56ca6c561425992b40e2d4f380b3d8419f681e88ebe2d4bdad36":hex:"d8ef5438b7cf5dc11209a635ce1095":char*:"":hex:"95e8db7c8ecab8a60ceb49726153a7c5553cf571bc40515944d833485e19bf33cb954e2555943778040165a6cfffecef79eb7d82fef5a2f136f004bb5e7c35ae827fac3da292a185b5b8fc262012c05caeda5453ede3303cfeb0c890db1facadaa2895bdbb33265ada0bb46030607b6cf94f86961178e2e2deeb53c63900f1ec":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #0 [#2]
depends_on:1:2
9:exp:6:hex:"bbeafe86c72ab0354b733b69b09e4d3462feb1658fe404004d81503f3a6e132f":hex:"ee1caba93cb549054ca29715a536393e":hex:"e44b0e0d275ae7c38a7dc2f768e899c1c11a4c4cb5b5bd25cd2132e3ecbaa5a63654312603e1c5b393c0ce6253c55986ee45bb1daac78a26749d88928f9b9908690fc148a656b78e3595319432763efbcf6957c9b2150ccabfd4833d0dcee01758c5efb47321a948b379a2ec0abcd6b6cbf41a8883f0f5d5bf7b240cb35f0777":hex:"a033c2051e425d01d97d563572e42c5113860e5dedcd24c76e3e357559ba3250f1fc5d4a931a9d0900ac025400f0158621f0b1215b2907467bfc874bcabbb28e28de81fe1ee5b79985261c512afec2327c8c5957df90c9eb77950de4a4860b57a9e6e145ea15eb52da63f217f94a5c8e5fcb5d361b86e0e67637a450cdbcb06f":hex:"a4809e072f93deb7b77c52427095":char*:"":hex:"e62adf9bbd92dd03cc5250251691f724c6ece1cb89d8c4daf31cc732a5420f6bedab71aab0238ba23bd7165ed1f692561ef457fd1d47413949405b6fc8e17922b17026d89d5830b383546ea516a56f3a1c45ec1251583ae880fa8985bd3dcc1d6a57b746971937bf370e76482238cc08c2c3b13258151e0a6475cc017f8a3d0e":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #1 [#2]
depends_on:1:2
9:exp:6:hex:"6ad06c88dd4f3becf35eed95bb859be2406a1803a66e4332a74c5f75c09b9a01":hex:"07d8b4a6e77aef9018828b61e0fdf2a4":hex:"cca1fd0278045dda80b847f0975b6cbf31e1910d2c99b4eb78c360d89133a1c52e66c5c3801824afc1f079d2b2b1c827199e83f680e59b9a7de9b15fa7b6848b5bf4e16a12ac1af4cf2b4d7bb45673c5e1241e9996440860a9204fc27cae46a991607bc5e7120d6c115ddcbdd02c022b262602139081e61eee4aba7193f13992":hex:"2219c11672884b93d0290b6a7140feafe416461f1cdaf0b3aa64693d7db2eb10feae46aac7af549fa1b0abc78c11f8df7ee803ef70310fc3e67769f8b4bc64f81143a6ebf8bee9d386a8ede5d2cc0ed17985a3b7bb95191ef55e684690ccdc5ca504bc6eb28442b353861a034a43532c025f666e80be967a6b05b9dd3a91ff58":hex:"e3ede170386e76321a575c095966":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #2 [#2]
depends_on:1:2
9:exp:6:hex:"87bbf7c15689e8c99a5a32a8ba0dfebcfe1989159807428cdd1f382c3ea95178":hex:"2f19aa1f3a82a7398706953f01739da7":hex:"590dbd230854aa2b5ac19fc3dc9453e5bb9637e47d97b92486a599bdafdfb27c3852e3d06a91429bb820eb12a5318ed8861ffe87d659c462ef167be22604facfa3afb601b2167989b9e3b2e5b59e7d07fda27ffccd450869d528410b0aff468f70cc10ef6723a74af6eebc1572c123a9b5a9aab748a31fa764716d3293ff5de7":hex:"b77d3bf3b30b3e6e5c86cbfb7e5455f6480f423cc76834b4663d28d9f1eb5c40212634e3347668427f7848352ab789886f96682a568260bdaeb7de0aae2af36f5ae04f06c332b158d923706c1c6255c673feeadb6d30bfc901e60b92acd9ddd83ef98686c4d492f4a60e97af2541d470a6a6b21903441020ea7619cf28a06986":hex:"5c43fc4dc959fabeebb188dbf3a5":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #0 [#2]
depends_on:1:2
9:exp:6:hex:"24095a66b6eb0320ca75e2ab78e8496a45f4b000fc43436904c3e386fb852ed2":hex:"0955c1f0e271edca279e016074886f60":hex:"f5160c75c449e6bb971e73b7d04ab9b9a85879f6eb2d67354af94a4f0ca339c0a03a5b9ede87a4ff6823b698113a38ae5327e6878c3ccc0e36d74fe07aa51c027c3b334812862bc660178f5d0f3e764c0b828a5e3f2e7d7a1185b7e79828304a7ad3ddcd724305484177e66f4f81e66afdc5bbee0ec174bff5eb3719482bd2d8":hex:"4690edc843e23d9d9b9a4dab8fa8193f8bf03897d3d29759e9dc9e0f8a970c0f5d4399b9f60461fe5cf439f9b0d54bbc075695e4d76b76298cc2b75bb3e0b516ee9ada93f77c4c002ba9fd163a1e4b377befb76c1e5ab8b3901f214c0a4c48bd2aa2f33560d46e2721a060d4671dc97633ff9bcd703bb0fbed9a4a2c259b53f3":hex:"75a31347598f09fceeea6736fe":char*:"":hex:"0dd2dca260325967267667ff3ccdc6d6b35648821a42090abba46282869bac4bdc20a8bee024bea18a07396c38dbb45d9481fedcc423a3928cfa78a2f0ae8eedb062add810bdbee77ddc26c29e4f9fda1ab336d04ef42947b05fbdb9bc4df79e37af951d19d6bf5e5cb34eef898f23642a9c4a9111ed0b7a08abeeefbbd45c23":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #1 [#2]
depends_on:1:2
9:exp:6:hex:"086b77b5731f971f0bf5b8227361b216746daf8b08c583ad38f114a64aa7877b":hex:"164058e5e425f9da40d22c9098a16204":hex:"6633eae08a1df85f2d36e162f2d7ddd92b0c56b7477f3c6cdb9919d0e4b1e54ea7635c202dcf52d1c688afbbb15552adda32b4cd30aa462b367f02ded02e0d64eeee2a6b95462b191784143c25607fd08a23a2fbc75cf6bee294daf2042587fdd8fe3d22c3a242c624cf0a51a7c14db4f0f766ec437de4c83b64f23706a24437":hex:"629317212ff8bd8a7676e4c00b81a9577de6397c832f99ac974fa2bbbccb6e3b8aa776db6922eed0b014bf3923799da7d9d0854c8817470e1e2f7fc7a572f9d0316ee60cde7ef025d59b897d29a6fee721aeb2f7bb44f9afb471e8a7b0b43a39b5497a3b4d6beb4b511f0cefa12ce5e6d843609d3e06999acfbee50a22ca1eee":hex:"2eb6eb6d516ed4cf1778b4e378":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #2 [#2]
depends_on:1:2
9:exp:6:hex:"0f9e806b0d937268561c0eafbbdd14ec715b7e9cef4118d6eb28abbb91266745":hex:"8657996634e74d4689f292645f103a2e":hex:"2ca253355e893e58cb1a900fbb62d61595de5c4186dc8a9129da3657a92b4a631bbdc3d5f86395385a9aa8557b67f886e3bb807620e558c93aea8e65826eadeb21544418ee40f5420c2d2b8270491be6fc2dcbfd12847fa350910dd615e9a1881bc2ced3b0ac3bde445b735e43c0c84f9d120ca5edd655779fc13c6f88b484f7":hex:"2ae4baef22ace26f464a9b0c75802303f2d7c0f9a1ed1d0180135189765bdd347fea0cc2b73ee7fbbf95ea1fda22597b8aad826f63e744069a9c349488b2cc1cf9372f423cc650302082125724730ae5a4d878e07385ddc99034c6b6b46748f02c80b179fe6406b1d33581950cb9bcd1d1ea1ec7b5becfd6c1f5b279412c433a":hex:"83155ebb1a42112dd1c474f37b":char*:"":hex:"87d69fc3cbc757b2b57b180c6ba34db4e20dde19976bfb3d274d32e7cea13f0c7d9e840d59ce857718c985763b7639e448516ddbbda559457cd8cb364fa99addd5ba44ef45c11060d9be82b4ebe1f0711ac95433074649b6c08eeab539fdfc99c77498b420427e4d70e316111845793de1f67fb0d04e3389a8862f46f4582dc8":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #0 [#2]
depends_on:1:2
9:exp:6:hex:"c24c17911f6db4b3e37c46bcc6fa35efc1a55f7754f0bb99f2eea93398116447":hex:"5098cc52a69ee044197e2c000c2d4ab8":hex:"9ad4dee311d854925fc7f10eca4f5dd4e6990cb2d4325da2ef25a9a23690f5c5590be285d33aaeba76506c59edec64b8c3ff8e62716d1c385fbce2a42bc7bd5d8e8584de1944543ab6f340c20911f8b7b3be1a1db18a4bb94119333339de95815cae09365b016edc184e11f3c5b851f1fa92b1b63cfa3872a127109c1294b677":hex:"0bd92cb106867e25ad427ff6e5f384d2d0f432fc389852187fcc7b0bf9f6d11a102a872b99ed1ad9a05dab0f79fa634745535efed804ff42b0af8dad20ba44709391fb263f245e5a2c52d9ce904179633282f57a1229b0a9c4557a5c0aeda29bbc5a7a871fa8b62d58100c3722c21e51e3b3e913185235526e7a5a91c559717d":hex:"f7930e3fab74a91cb6543e72":char*:"":hex:"6124ede608d416baa5e653a898ca76e9f47f08403c1984feec112e670ded2226e0073f8881ab2161cfda541dccae19691285f7391a729f07aba18f340bb452c1da39cbe83cf476cfc105b64187e0d2227dd283dcba8b6a350f9956b18861fa131d3f00c034443e8f60e0fdfcfaabbed93381ae374a8bf66523d33646183e1379":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #1 [#2]
depends_on:1:2
9:exp:6:hex:"d267a8379260036ff3d1ec07a7b086ff75706bad12d37d9656f04776f3d8b85c":hex:"674dc34e8c74c51fa42aacd625a1bd5b":hex:"6a9a8af732ae96d0b5a9730ad792e296150d59770a20a3fdbbc2a3a035a88ac445d64f37d684e22003c214b771c1995719da72f3ed24a96618284dd414f0cac364640b23c680dc80492a435c8ec10add53b0d9e3374f1cf5bfc663e3528fa2f6209846421ea6f481b7ecf57714f7bc2527edc4e0466b13e750dd4d4c0cc0cdfc":hex:"80c68a330ef50e3e516681f1e535868b03466e7edbb86cb385d01db487da3dd3edad940fdc98d918b7db9b59f8d61369eee2928c88557306c4a13e366af0708d94cb90a15f1c3bc45544bdb05ff964da5e06c5ae965f20adb504620aed7bce2e82f4e408d00219c15ef85fae1ff13fea53deb78afa5f2a50edbd622446e4a894":hex:"bea660e963b08fc657741bc8":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #2 [#2]
depends_on:1:2
9:exp:6:hex:"c86cb637753010f639fa3aa3bff7c28b74f012ad6090f2a31b0801d086f183ad":hex:"87ff6e0bb313502fedf3d2696bff99b5":hex:"2816f1132724f42e40deabab25e325b282f8c615a79e0c98c00d488ee56237537240234966565e46bfb0c50f2b10366d1589620e6e78bd90ade24d38a272f3fff53c09466aa2d3ef793d7f814a064b713821850a6e6a058f5139a1088347a9fa0f54e38abd51ddfc7ef040bf41d188f3f86c973551ced019812c1fc668649621":hex:"6b7858557e0fd0f957842fb30e8d54dedbc127eb4bbf9de319f731fa28a606df2c046a0bce8ecda4e75d3596e4e988efd6bc279aa005bc52fad92ba07f5b1dfda4cc417029f9778c88d6fe5341a0fd48893dcb7c68d0df310a060f2a5235aee422d380f7209bc0909b2aa7e876044056f0b915dab0bc13cbea5a3b86d40ca802":hex:"7859f047f32b51833333accf":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #0 [#2]
depends_on:1:2
9:exp:6:hex:"2c31ca0cac3efe467168198f06beacf39565a6f57f82e1048a5c06a231315882":hex:"95cae6e85f33f3043182460589be3639":hex:"67523751a9b1b643d00de4511b55e4268cb2d18e79e01a55fc7b677d529bd6400940fb25ea6ae135c1a816e61b69e90b966981aeda685934b107066e1467db78973492ad791e20aef430db3a047447141def8be6e6a9a15089607c3af9368cdb11b7b5fbf90691505d0c33664766945d387904e7089b915a3c28886ba1763bb5":hex:"65261d6e29b2369b1828a7cef2df9873d6e6057c499301afedd6cb65b5036ddb95f9e353fbf38e54c4f46f88164325b33620ce183beb2e411fbb89a0e0002e542fc161cad32a61ee6f1e1717e0b4dcd0340b116f795bc1009dbbc65bc31c9b549bf03c40bc204cd0d02ec884be907777ebeed8b527ec3af7cbb508193c0745de":hex:"21309d0351cac45e":char*:"":hex:"1d5f2cb921f54aeb552b4304142facd49497837deb1f00d26fbeddbab922fd80b00dba782961f8fce84f1f7973e81eed6ee168b1760c575c891f40a1dae0fa1a08738025d13ef6e0b30be4f054d874f1b8a2427a19ebb071d98365c32316a88a68c2b40daf1ea831a64519ac3679acb4e04986ecc614ec673c498c6fee459e40":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #1 [#2]
depends_on:1:2
9:exp:6:hex:"ca9fa36ca2159dff9723f6cfdb13280446eb6bc3688043c7e2e2504184791596":hex:"d13ca73365e57114fc698ee60ba0ad84":hex:"2aa510b7f1620bfce90080e0e25f5468dbc5314b50914e793b5278369c51ac017eace9fd15127fca5a726ad9e67bdee5af298988d9a57ec4bbc43d4eb849535eb10521ac7cd7ed647479a42876af2ebc9e2108b539febdaa9127c49bda1bda800f6034050b8576e944311dfbca59d64d259571b6d2ed5b2fc07127239b03f4b7":hex:"ac04c4293554cd832aa400c811cb202d815d6178aa1343b4628592b7f3ae45dc5f12ea47be4b43e1865f40b06ab67b3a9fb3644248a9b3efe131a8addb7447978bb51ccf749e75574fea60e8781677200af023b2f8c415f4e6d8c575a9e374916d9ec3a612b16e37beb589444b588e0b770d9f8e818ad83f83aa4ecf386d17a7":hex:"2111d55d96a4d84d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #2 [#2]
depends_on:1:2
9:exp:6:hex:"2f802e838250064c15fdee28d7bd4872850355870847701ad9742b2d6eb4b0c0":hex:"2dd550cfd97f8e1d8d31ba5537ae4710":hex:"72b9630dda40306e785b961934c56e20948f8eac0e981f49787eb3dbd6e4607f7d08d10ca643746bf1efa7e5066993683d527a90f2d45ec9cf73113f1f17bb67958be669acd4e2927f1dacfde902cd3048056d7f6dfdd8630ff054efce4526db7c9321d6d2be2236f4d60e27b89d8ec94f65a06dc0953c8c4533a51b6a29bd2c":hex:"e2ca8c8d172ff90232879f510d1225af91bc323bdf636363c2903fcd1790692c8bcb03a1cccb18814678852c6b3a441552e541b843ee5e4f86a152fa73d05aea659fe08aa6428bb257eaa2a7b579fdc4022c1dec359a854253c1aefc983c5ede8c97517ea69fc4606e25f13ffb0f5f49160691454fbb74e704326738353525f7":hex:"bd6c8823c9005c85":char*:"":hex:"f6dd0b5f3d1a393a1837112962dba175a13c2d1e525ef95734caf34949d8b2d63b4fe5603226b5f632f2d7f927361ba639dc0e3c63414f45462342695916d5792133b4a24c7c4cbe2b97c712bf27ab62d3d68b3875d58ffe4b7c30a8171bff1a9e2f3995768faacda2ea9213ff35798b9e4513f6a87bd3f5a9d93e847e768359":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #0 [#2]
depends_on:1:2
9:exp:6:hex:"84dd53ce0146cb71c32776033bb243098d78a22ac17f52a62a122f5653fb4e33":hex:"f0c90a1bca52f30fab3670df0d3beab0":hex:"a3ea8032f36a5ca3d7a1088fd08ac50ae6bdc06ad3a534b773ac3e3d4a3d524499e56274a0062c58c3b0685cc850f4725e5c221af8f51c6df2bbd5fbcff4a93ba4c1054f7f9c67fd9285511a08d328d76a642f067227d378f95a1e67587b90251f9103ed3cacdb6bf69e0794e366d8b92d8de37b4e028de0778841f356ac044d":hex:"68222bffa782dcfe4f328fc20eb520e75a9a5fedbe13ec7fcf0e82fba08bb87a8a8e02902638e32fe0e2294344b380797f8028426ffcc0531c739c884892394c48ff0779c5f5edf0a36a3fb8aa91213347774ec4bf0fe1049bd53746b13beef3c637169826c367056cb1aa0a3868e23f886a9c7b8015c26af9e40794662f6b21":hex:"b1ece9fb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #1 [#2]
depends_on:1:2
9:exp:6:hex:"9bb36fe25e966a075ae2c3bb43b5877679ebc379d5123c8eda3fa0e30b95cae0":hex:"59869df4ef5754b406478a2fb608ee99":hex:"ecd125682e8a8e26757c888b0c8b95dec5e7ed7ac991768f93e8af5bcf6f21ed4d4d38699ee7984ed13635fff72f938150157c9a27fcda121ffced7b492d2b18dad299cb6495ed5f68441aefc8219d2cf717d15d5cd2dbce4606fcf90fe45f3601127cf6acee210bd7df97309f773974a35bef1d33df984101c2fc9d4b55259e":hex:"fb3a4be643c10343251c6f0745aaa54349463f622ca04a792e9b4780866844b30aeef3269fc60cac0ea031c5f3780b535e15154f7c76eb4a371b8ae368550f3fa2ce693c34511ec96b839cac567f1b0de0e7e3116d729b45d1b16e453703a43db73f5d0c3e430f16b142420b5f0d26d72ac3dba543d7d813603b0bfdca3dd63e":hex:"cb3f5338":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #2 [#2]
depends_on:1:2
9:exp:6:hex:"ca264e7caecad56ee31c8bf8dde9592f753a6299e76c60ac1e93cff3b3de8ce9":hex:"4763a4e37b806a5f4510f69fd8c63571":hex:"07daeba37a66ebe15f3d6451d1176f3a7107a302da6966680c425377e621fd71610d1fc9c95122da5bf85f83b24c4b783b1dcd6b508d41e22c09b5c43693d072869601fc7e3f5a51dbd3bc6508e8d095b9130fb6a7f2a043f3a432e7ce68b7de06c1379e6bab5a1a48823b76762051b4e707ddc3201eb36456e3862425cb011a":hex:"8d03cf6fac31182ad3e6f32e4c823e3b421aef786d5651afafbf70ef14c00524ab814bc421b1d4181b4d3d82d6ae4e8032e43a6c4e0691184425b37320798f865c88b9b306466311d79e3e42076837474c37c9f6336ed777f05f70b0c7d72bd4348a4cd754d0f0c3e4587f9a18313ea2d2bace502a24ea417d3041b709a0471f":hex:"3105dddb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation PSA (AES-128,128,0,0,128) #0 [#1]
depends_on:4:2
9:exp:1:hex:"d785dafea3e966731ef6fc6202262584":hex:"d91a46205ee94058b3b8403997592dd2":hex:"":hex:"":hex:"3b92a17c1b9c3578a68cffea5a5b6245":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,128) #1 [#1]
depends_on:4:2
9:exp:1:hex:"aec963833b9098de1ababc853ab74d96":hex:"4e0ffd93beffd732c6f7d6ad606a2d24":hex:"":hex:"":hex:"e9fcedc176dfe587dc61b2011010cdf1":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,128) #2 [#1]
depends_on:4:2
9:exp:1:hex:"c4fb9e3393681da9cec5ec96f87c5c31":hex:"845e910bc055d895879f62101d08b4c7":hex:"":hex:"":hex:"99fb783c497416e4b6e2a5de7c782057":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,120) #0 [#1]
depends_on:4:2
9:exp:1:hex:"2a930f2e09beceacd9919cb76f2ac8d3":hex:"340d9af44f6370eff534c653033a785a":hex:"":hex:"":hex:"0c1e5e9c8fe5edfd11f114f3503d63":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,120) #1 [#1]
depends_on:4:2
9:exp:1:hex:"fe71177e02073b1c407b5724e2263a5e":hex:"83c23d20d2a9d4b8f92da96587c96b18":hex:"":hex:"":hex:"43b2ca795420f35f6cb39f5dfa47a2":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,120) #2 [#1]
depends_on:4:2
9:exp:1:hex:"b02392fd7f228888c281e59d1eaa15fb":hex:"2726344ba8912c737e195424e1e6679e":hex:"":hex:"":hex:"a10b601ca8053536a2af2cc255d2b6":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,112) #0 [#1]
depends_on:4:2
9:exp:1:hex:"21895cbafc16b7b8bf5867e88e0853d4":hex:"f987ce1005d9bbd31d2452fb80957753":hex:"":hex:"":hex:"952a7e265830d58a6778d68b9450":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,112) #1 [#1]
depends_on:4:2
9:exp:1:hex:"9bb9742bf47f68caf64963d7c10a97b0":hex:"34a85669de64e1cd44731905fddbcbc5":hex:"":hex:"":hex:"e9b6be928aa77b2de28b480ae74c":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,112) #2 [#1]
depends_on:4:2
9:exp:1:hex:"4e9708e4b37e2e1b5feaf4f5ab54e2a6":hex:"1c53a9fdd23919b036d99560619a9939":hex:"":hex:"":hex:"6611b50d6fbca83047f9f5fe1768":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,104) #0 [#1]
depends_on:4:2
9:exp:1:hex:"82fede79db25f00be96eb050a22cea87":hex:"e9c50b517ab26c89b83c1f0cac50162c":hex:"":hex:"":hex:"d0c0ce9db60b77b0e31d05e048":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,104) #1 [#1]
depends_on:4:2
9:exp:1:hex:"1d98566fca5201abb12914311a8bd532":hex:"590aef4b46a9023405d075edab7e6849":hex:"":hex:"":hex:"a1cfd1a27b341f49eda2ca8305":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,104) #2 [#1]
depends_on:4:2
9:exp:1:hex:"3038771820c2e1319f02a74b8a7a0c08":hex:"e556d9f07fb69d7e9a644261c80fac92":hex:"":hex:"":hex:"4d2f005d662b6a8787f231c5e1":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,96) #0 [#1]
depends_on:4:2
9:exp:1:hex:"0fb7eef50de598d7d8b508d019a30d5a":hex:"a2a2617040116c2c7e4236d2d8278213":hex:"":hex:"":hex:"68413c58df7bb5f067197ca0":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,96) #1 [#1]
depends_on:4:2
9:exp:1:hex:"8cc58b609204215c8ab4908286e56e5c":hex:"fb83ea637279332677b5f68081173e99":hex:"":hex:"":hex:"a2a9160d82739a55d8cd419f":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,96) #2 [#1]
depends_on:4:2
9:exp:1:hex:"81a5fd184742a478432963f6477e8f92":hex:"da297cbb53b11d7c379e0566299b4d5a":hex:"":hex:"":hex:"200bee49466fdda2f21f0062":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,64) #0 [#1]
depends_on:4:2
9:exp:1:hex:"f604ac66d626959e595cbb7b4128e096":hex:"269d2a49d533c6bb38008711f38e0b39":hex:"":hex:"":hex:"468200fa4683e8be":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,64) #1 [#1]
depends_on:4:2
9:exp:1:hex:"2e308ba7903e925f768c1d00ff3eb623":hex:"335acd2aa48a47a37cfe21e491f1b141":hex:"":hex:"":hex:"4872bfd5e2ff55f6":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,64) #2 [#1]
depends_on:4:2
9:exp:1:hex:"1304e2a5a3520454a5109df61a67da7a":hex:"dbe8b452acf4fa1444c3668e9ee72d26":hex:"":hex:"":hex:"83a0d3440200ca95":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,32) #0 [#1]
depends_on:4:2
9:exp:1:hex:"ecf1ec2c9a8f2e9cc799f9b9fddb3232":hex:"ddf0b695aef5df2b594fcaae72b7e41c":hex:"":hex:"":hex:"2819aedf":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,32) #1 [#1]
depends_on:4:2
9:exp:1:hex:"9ab5c8ca905b5fe50461f4a68941144b":hex:"96dd3927a96e16123f2e9d6b367d303f":hex:"":hex:"":hex:"6e0c53ef":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,32) #2 [#1]
depends_on:4:2
9:exp:1:hex:"b5fc7af605721a9cfe61c1ee6a4b3e22":hex:"6b757d4055823d1035d01077666037d6":hex:"":hex:"":hex:"e8c09ddd":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,128) #0 [#1]
depends_on:4:2
9:exp:1:hex:"03c0b4a6e508a8490db0d086a82c9db7":hex:"ac52f6c1a05030321fa39f87e89fdb5e":hex:"33316ca79d10a79f4fd038593e8eef09625089dc4e0ffe4bc1f2871554fa6666ab3e7fe7885edef694b410456f3ec0e513bb25f1b48d95e4820c5972c1aabb25c84c08566002dadc36df334c1ce86847964a122016d389ac873bca8c335a7a99bcef91e1b985ae5d488a2d7f78b4bf14e0c2dc715e814f4e24276057cf668172":hex:"":hex:"756292d8b4653887edef51679b161812":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,128) #1 [#1]
depends_on:4:2
9:exp:1:hex:"b228d3d15219ea9ad5651fce02c8374d":hex:"5c7eafaead029c3fe3cf3835fe758d0e":hex:"8c35dd805c08686b9b4d460f81b4dcb8c46c6d57842dc3e72ba90952e2bebf17fe7184445b02f801800a944486d662a127d01d3b7f42679052cdc73ce533129af8d13957415c5495142157d6ce8a68aa977e56f562fed98e468e42522767656ce50369471060381bb752dd5e77c79677a4cadffa39e518e30a789e793b07ea21":hex:"":hex:"a4dde1ab93c84937c3bbc3ad5237818d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,128) #2 [#1]
depends_on:4:2
9:exp:1:hex:"776afcbabedd5577fe660a60f920b536":hex:"5bbb7f1b14084e520408dd87b97705e9":hex:"44631fc9d4a07416b0dfb4e2b42071e3e2be45502c9ddf72b3e61810eeda31a7d685ebb2ee43a2c06af374569f439ee1668c550067de2dece9ec46ee72b260858d6033f814e85275c5ae669b60803a8c516de32804fa34d3a213ccfaf6689046e25eeb30b9e1608e689f4d31cc664b83a468a51165f5625f12f098a6bf7ddab2":hex:"":hex:"a5347d41d93b587240651bcd5230264f":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,120) #0 [#1]
depends_on:4:2
9:exp:1:hex:"20abeafa25fc4ea7d0592cb3e9b4d5fe":hex:"3aba79a58c5aa664856b41d552c7a8d3":hex:"98cfecaae9eb9a7c3b17e6bc5f80d8a4bf7a9f4fa5e01b74cae15ee6af14633205aafe3b28fb7b7918e12322ea27352056a603746d728a61361134a561619400ff2bf679045bac2e0fbc2c1d41f8faba4b27c7827bceda4e9bf505df4185515dd3a5e26f7639c8ad5a38bc5906a44be062f02cc53862678ae36fa3de3c02c982":hex:"":hex:"2a67ad1471a520fe09a304f0975f31":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,120) #1 [#1]
depends_on:4:2
9:exp:1:hex:"2bc73fba942ff105823b5dccf6befb1c":hex:"902c3e3b69b1ef8395d7281ff74cce38":hex:"4adec0b4ac00325a860044d9f9519daa4f7c163229a75819b0fd7d8e23319f030e61dfa8eadabff42ea27bc36bdb6cad249e801ca631b656836448b7172c11126bad2781e6a1aa4f62c4eda53409408b008c057e0b81215cc13ddabbb8f1915f4bbab854f8b00763a530ad5055d265778cd3080d0bd35b76a329bdd5b5a2d268":hex:"":hex:"ebdd7c8e87fe733138a433543542d1":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,120) #2 [#1]
depends_on:4:2
9:exp:1:hex:"356a4c245868243d61756cabe86da887":hex:"b442f2ec6d45a17144c258fd59fe5b3b":hex:"12cccc3c60474b0a1579c5006c2134850724fa6c9da3a7022d4f65fd238b052bdf34ea34aa7dbadad64996065acee588ab6bd29726d07ed24ffae2d33aadf3e66ebb87f57e689fd85128be1c9e3d8362fad1f8096ee391f75b576fb213d394cef6f091fc5488d9aa152be69475b9167abd6dd4fd93bbbc7b8ca316c952eb19c6":hex:"":hex:"ed26080dcb670590613d97d7c47cf4":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,112) #0 [#1]
depends_on:4:2
9:exp:1:hex:"dfa7e93aff73600fc552324253066e2c":hex:"c20001e93f1cd05253c277a9445d61e4":hex:"a64d1e20058a1f7e698622a02f7ff8dc11886717ede17bbdc3c4645a66a71d8b04346fb389a251ffb0a7f445a25faf642bb7e4697d2cacf925e78c4be98457996afb25b0516b50f179441d1923312364947f8f1e0f5715b43bd537727bf943d7b4679b0b0b28b94e56e7bbf554d9cf79fcee4387f32bb6f91efdd23620035be6":hex:"":hex:"6ba5e4dace9a54b50b901d9b73ad":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,112) #1 [#1]
depends_on:4:2
9:exp:1:hex:"2ecea80b48d2ecd194a7699aa7d8ccfc":hex:"8b4db08bafc23b65ae50a2d20661d270":hex:"efc2ca1a3b41b90f8ddf74291d68f072a6e025d0c91c3ce2b133525943c73ebadc71f150be20afeb097442fa51be31a641df65d90ebd81dcbaf32711ed31f5e0271421377ffe14ddafea3ca60a600588d484856a98de73f56a766ae60bae384a4ae01a1a06821cf0c7a6b4ee4c8f413748457b3777283d3310218fb55c107293":hex:"":hex:"246a9d37553088b6411ebb62aa16":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,112) #2 [#1]
depends_on:4:2
9:exp:1:hex:"d38fee3fd3d6d08224c3c83529a25d08":hex:"a942ccb11cf9468186fabfc18c899801":hex:"1c92a4ce0a1dae27e720d6f9b1e460276538de437f3812ab1177cf0273b05908f296f33ba0f4c790abe2ce958b1d92b930a0d81243e6ad09ef86ee8e3270243095096537cb1054fcfcf537d828b65af9b6cf7c50f5b8470f7908f314d0859107eed772ee1732c78e8a2e35b2493f3e8c1e601b08aeab8d9729e0294dca168c62":hex:"":hex:"803a08700ec86fdeb88f7a388921":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,104) #0 [#1]
depends_on:4:2
9:exp:1:hex:"1899b0cbae41d705c6eed3226afb5bc0":hex:"82d0910aa53e300a487d880d018d0dea":hex:"6bf5583cc1007d74f3529db63b8d4e085400ccf3725eab8e19cb145f3910c61465a21486740a26f74691866a9f632af9fae81f5f0bffedf0c28a6ce0fd520bb4db04a3cd1a7d29d8801e05e4b9c9374fd89bcb539489c2f7f1f801c253a1cc737408669bcd133b62da357f7399a52179125aa59fae6707d340846886d730a835":hex:"":hex:"c5d58870fee9ce157f5ec1fa8f":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,104) #1 [#1]
depends_on:4:2
9:exp:1:hex:"8b95323d86d02754f4c2874b42ec6eb0":hex:"4f76084acbdef9999c71dcc794238d7c":hex:"ebc75788377c0b264818a6f97c19cf92c29f1c7cdeb6b5f0a92d238fa4614bc35d0cfe4ec9d045cd628ff6262c460679ac15b0c6366d9289bbd217e5012279e0af0fb2cfcbdf51fe16935968cbb727f725fe5bcd4428905849746c8493600ce8b2cfc1b61b04c8b752b915fed611d6b54ef73ec4e3950d6db1807b1ce7ed1dcc":hex:"":hex:"c4724ff1d2c57295eb733e9cad":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,104) #2 [#1]
depends_on:4:2
9:exp:1:hex:"30da555559eb11cf7e0eff9d99e9607d":hex:"7799275bf12335f281ec94a870f90a0b":hex:"e735d556e15aec78d9736016c8c99db753ed14d4e4adaaa1dd7eaad702ea5dc337433f8c2b45afdf2f385fdf6c55574425571e079ca759b6235f877ed11618ff212bafd865a22b80b76b3b5cf1acfd24d92fd41607bbb7382f26cd703757088d497b16b32de80e1256c734a9b83356b6fced207177de75458481eaef59a431d7":hex:"":hex:"3c82272130e17c4a0a007a908e":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,96) #0 [#1]
depends_on:4:2
9:exp:1:hex:"ed2ac74af896c5190c271cfa6af02fd2":hex:"e0226e2d8da47badad1fb78b9a797f27":hex:"8f11353ae476ff923013e6e736ffc9d23101a1c471ccc07ad372a8430d6559c376075efce2e318cdf4c9443dbf132e7e6da5524045028c97e904633b44c4d189a4b64237ac7692dd03c0e751ce9f04d0fdbd8a96074cd7dfa2fd441a52328b4ac3974b4902db45663f7b6f24947dba618f8b9769e927faf84c9f49ad8239b9fb":hex:"":hex:"db8af7a0d548fc54d9457c73":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,96) #1 [#1]
depends_on:4:2
9:exp:1:hex:"0225b73fe5fbbe52f838d873173959d8":hex:"02a048764f48d9aed1147ee922395bbf":hex:"9b46a57b06e156c877e94c089814493ead879397dab3dfcab2db349ef387efcd0cc339a7e79131a2c580188fc7429044a465b8329d74cd8f47272a4ed32582b1c5c7e3d32341ae902ea4923dc33df8062bc24bb51a11d2ecc82f464f615041387f9c82bd2135d4e240fe56fa8a68e6a9a417e6702430a434b14d70cf02db3181":hex:"":hex:"e2c2ce4022c49a95c9ac9026":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,96) #2 [#1]
depends_on:4:2
9:exp:1:hex:"89ca3771a0ef3287568b4ac036120198":hex:"7e83d2ffa8af8c554cfd71a0db56ef5b":hex:"1bd7a9d6262882bd12c62bd50942965b3cdcadf5e0fab2dc4d0daf0ee4b16e92c6e2464c0caa423cdce88e4d843490609716ec5e44c41672c656ac0e444d3622557ea8420c94deae3ad190ddaf859f6f8c23e4e2e32a46d28df23de4f99bd6c34f69e06eddfdfa5f263dbe8baf9d4296b2c543e4c4847271e7590374edf46234":hex:"":hex:"06b2bf62591dc7ec1b814705":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,64) #0 [#1]
depends_on:4:2
9:exp:1:hex:"a41a297bd96e224942998fe2192934a1":hex:"6827f2c5a0b7ecd6bbc696abb0adf556":hex:"f32041abd8543415cbac423d945dda5378a16a7e94d9ab5dbd2d32eb1c5048cc7c8e4df3ca84ec725f18c34cfdeaa7595392aabfd66d9e2f37c1165369cd806cd9d2110def6f5fad4345e5a6e2326c9300199438fcc078cd9fcf4d76872cac77fc9a0a8ac7e4d63995078a9addecf798460ff5910861b76c71bccfb6b629d722":hex:"":hex:"49a4917eef61f78e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,64) #1 [#1]
depends_on:4:2
9:exp:1:hex:"a9372c058f42e0a1d019bdb528313919":hex:"8d03f423230c8f00a5b6b712d426a2af":hex:"cfef4e70fcc1821eeccf7c7b5eb3c0c3b5f72dc762426e0bd26242f8aa68c5b716ab97eded5e5720caccc1965da603d556d8214d5828f2cf276d95bf552d47313876796221f62ccb818a6d801088755d58cfb751bfed0d5a19718d4e0f94b850e0279b3a69295d1837cba958a6cc56e7594080b9e5b954a199fdc9e54ddc8583":hex:"":hex:"b82cd11cd3575c8d":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,64) #2 [#1]
depends_on:4:2
9:exp:1:hex:"6302b7338f8fa84195ad9abbacd89b4e":hex:"e1bed5c53547cbc85f3411fbb43bb08b":hex:"bcd329c076e8da2797d50dcdcf271cecf3ce12f3c136ed746edc722f907be6133276ee099038fdc5d73eec812739c7489d4bcc275f95451b44890416e3ffe5a1b6fa3986b84eee3adad774c6feaecb1f785053eeda2cfc18953b8547866d98918dbe0a6abc168ac7d77467a367f11c284924d9d186ef64ef0fd54eacd75156d2":hex:"":hex:"5222d092e9e8bd6c":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,32) #0 [#1]
depends_on:4:2
9:exp:1:hex:"78b5c28d62e4b2097873a1180bd5a3a5":hex:"c93902c2819ee494f0fc4b259ee65dd8":hex:"e6b1192674a02083a6cf36d4ba93ba40a5331fadf63fd1eb2efa2ee9c0d8818472aaaf2b4705746011753f30f447c8f58dd34d29606daf57eadc172529837058cb78a378b19da8d63c321f550dfa256b5fd9f30e93d8f377443bfcd125f86a079a1765d2010be73d060f24eebae8d05e644688b2149bc39e18bd527bc066f2ba":hex:"":hex:"eae48137":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,32) #1 [#1]
depends_on:4:2
9:exp:1:hex:"3d84130578070e036c9e3df5b5509473":hex:"3b9b4950523a19c6866fd2b0cde541fd":hex:"a764931e1b21a140c54a8619aacdb4358834987fb6e263cec525f888f9e9764c165aaa7db74f2c42273f912daeae6d72b232a872ac2c652d7cd3af3a5753f58331c11b6c866475697876dbc4c6ca0e52a00ba015ee3c3b7fb444c6e50a4b4b9bbe135fc0632d32a3f79f333d8f487771ed12522e664b9cf90e66da267f47a74d":hex:"":hex:"79987692":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,32) #2 [#1]
depends_on:4:2
9:exp:1:hex:"08428605ab4742a3e8a55354d4764620":hex:"128f5f4a817e4af04113847a223adeb0":hex:"464b484ed79d93a48e0f804e04df69d7ca10ad04ba7188d69e6549ab50503baaec67e0acba5537d1163c868fd3e350e9d0ae9123046bc76815c201a947aa4a7e4ed239ce889d4ff9c8d043877de06df5fc27cf67442b729b02e9c30287c0821ef9fa15d4cccbc53a95fa9ec3ed432ca960ebbf5a169ccada95a5bf4c7c968830":hex:"":hex:"3eb3e3a2":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,128) #0 [#1]
depends_on:4:2
9:exp:1:hex:"0dd358bc3f992f26e81e3a2f3aa2d517":hex:"d8c750bb443ee1a169dfe97cfe4d855b":hex:"":hex:"87cc4fd75788c9d5cc83bae5d764dd249d178ab23224049795d4288b5ed9ea3f317068a39a7574b300c8544226e87b08e008fbe241d094545c211d56ac44437d41491a438272738968c8d371aa7787b5f606c8549a9d868d8a71380e9657d3c0337979feb01de5991fc1470dfc59eb02511efbbff3fcb479a862ba3844a25aaa":hex:"a81d13973baa22a751833d7d3f94b3b1":char*:"":hex:"77949b29f085bb3abb71a5386003811233056d3296eb093370f7777dadd306d93d59dcb9754d3857cf2758091ba661f845ef0582f6ae0e134328106f0d5d16b541cd74fdc756dc7b53f4f8a194daeea9369ebb1630c01ccb307b848e9527da20a39898d748fd59206f0b79d0ed946a8958033a45bd9ae673518b32606748eb65":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,128) #1 [#1]
depends_on:4:2
9:exp:1:hex:"43b5f18227e5c74288dbeff03801acd6":hex:"08ee12246cf7edb81da3d610f3ebd167":hex:"":hex:"f58d630f10cfca61d4644d4f6505bab629e8e8faf1673e64417f9b79e622966a7011cfb3ff74db5cebf09ad3f41643d4437d213204a6c8397e7d59b8a5b1970aed2b6bb5ea1933c72c351f6ba96c0b0b98188f6e373f5db6c5ebece911ec7a1848abd3ae335515c774e0027dab7d1c07d047d3b8825ff94222dbaf6f9ab597ee":hex:"82d83b2f7da218d1d1441a5b37bcb065":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,128) #2 [#1]
depends_on:4:2
9:exp:1:hex:"9a433c612d7e1bdff881e4d63ba8b141":hex:"8b670cf31f470f79a6c0b79e73863ca1":hex:"":hex:"ce10758332f423228b5e4ae31efda7677586934a1d8f05d9b7a0dc4e2010ec3eaacb71a527a5fff8e787d75ebd24ad163394c891b33477ed9e2a2d853c364cb1c5d0bc317fcaf4010817dbe5f1fd1037c701b291b3a66b164bc818bf5c00a4c210a1671faa574d74c7f3543f6c09aaf117e12e2eb3dae55edb1cc5b4086b617d":hex:"8526fd25daf890e79946a205b698f287":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,120) #0 [#1]
depends_on:4:2
9:exp:1:hex:"8e9d75c781d63b29f1816859f7a0e0a0":hex:"748a3b486b62a164cedcf1bab9325add":hex:"":hex:"a9f1883f58e4ef78377992101ab86da0dafcefa827904dd94dff6f6704b1e45517165a34c5555a55b04c6992fb6d0840a71bd262fe59815e5c7b80fe803b47d5ba44982a3f72cb42f591d8b62df38c9f56a5868af8f68242e3a15f97be8ef2399dbace1273f509623b6f9e4d27a97436aebf2d044e75f1c62694db77ceac05de":hex:"131e0e4ce46d768674a7bcacdcef9c":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,120) #1 [#1]
depends_on:4:2
9:exp:1:hex:"fe6b8553002c69396d9976bb48d30779":hex:"595b17d0d76b83780235f5e0c92bd21f":hex:"":hex:"786f4801b16de7a4931ab143b269c7acc68f1ed9b17a95e8929ccec7d53413059fd4267bedbf079d9d69e90314c1345bc9cb9132f1af69323157ddf7533ced42b4b7bd39004f14d326f5b03bc19084d231d93bcab328312d99b426c1e86e8e049d380bb492e2e32ad690af4cf86838d89a0dfdcbc30e8c9e9039e423a234e113":hex:"8879de07815a88877b0623de9be411":char*:"":hex:"b15dc7cd44adcb0783f30f592e5e03ccd47851725af9fe45bfc5b01ae35779b9a8b3f26fec468b188ec3cad40785c608d6bfd867b0ccf07a836ec20d2d9b8451636df153a32b637e7dcdbd606603d9e53f6e4c4cc8396286ce64b0ea638c10e5a567c0bc8e808080b71be51381e051336e60bf1663f6d2d7640a575e0752553b":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,120) #2 [#1]
depends_on:4:2
9:exp:1:hex:"14898c56009b459172fef9c17993b54f":hex:"0862f8f87289988711a877d3231d44eb":hex:"":hex:"e7ba6ef722273238b975d551f95d3e77e9b75b24c547b86eafb457d409803bdf6e1443839d8604ee497020e1a3dbd687a819b17fdde0fcf240ce2129792792a58bfcd825773001ee959bf9ec8d228e27ce1cd93d7fb86769a3793361b6f82bf7daf284afc1ece657a1ee6346ea9294880755b9b623563ad2657ba2286488a2ef":hex:"36938974301ae733760f83439437c4":char*:"":hex:"3fd56897a62743e0ab4a465bcc9777d5fd21ad2c9a59d7e4e1a60feccdc722b9820ec65cb47e1d1160d12ff2ea93abe11bc101b82514ead7d542007fee7b4e2dd6822849cd3e82d761ff7cf5ce4f40ad9fec54050a632a401451b426812cf03c2b16a8667a88bb3f7497e3308a91de6fd646d6a3562c92c24272411229a90802":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,112) #0 [#1]
depends_on:4:2
9:exp:1:hex:"fe5253d4b071793b081ebc122cc2a5f8":hex:"49e82d86804e196421ec19ddc8541066":hex:"":hex:"b57a0bd7714ae95e77fa9452e11a7ed4a2bec60f81ad6ddb956d4b1cb5dfc277dcb4034d501801b26733b5e08c710c3cfdccc1b208dc7a92cd7ebe166320582bcaff64cc943c36fbe7008f004e5db70c40de05fa68b0c9d4c16c8f976130f20702b99674cd2f4c93aeaeb3abca4b1114dbc3a4b33e1226ad801aa0e21f7cc49b":hex:"e8b8ae34f842277fe92729e891e3":char*:"":hex:"c4a31c7ec820469f895d57579f987733337ec6547d78d17c44a18fab91f0322cfe05f23f9afaf019cf9531dec2d420f3591d334f40d78643fd957b91ab588a7e392447bd702652017ede7fb0d61d444a3b3cc4136e1d4df13d9532eb71bcf3ff0ae65e847e1c572a2f90632362bc424da2249b36a84be2c2bb216ae7708f745c":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,112) #1 [#1]
depends_on:4:2
9:exp:1:hex:"b3502d6f0d172246e16503cdf5793296":hex:"6ce994689ff72f9df62f386a187c1a13":hex:"":hex:"09268b8046f1558794e35cdc4945b94227a176dd8cb77f92f883542b1c4be698c379541fd1d557c2a07c7206afdd49506d6a1559123de1783c7a60006df06d87f9119fb105e9b278eb93f81fd316b6fdc38ef702a2b9feaa878a0d1ea999db4c593438f32e0f849f3adabf277a161afb5c1c3460039156eec78944d5666c2563":hex:"21cdf44ff4993eb54b55d58e5a8f":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,112) #2 [#1]
depends_on:4:2
9:exp:1:hex:"5fb33dd73db309b9dfd3aee605cd94bf":hex:"3f6486f9e9e645292e0e425bac232268":hex:"":hex:"f4e011f8c99038c46854b427475f23488077ebf051c4b705a1adfdd493a0a10af7a7e9453965b94f52f61ae62ce9243a82a2dbf9c5a285db3fe34ed34ed08b5926f34c48171195f7062d02a6e6e795322a0475017371cb8f645cdcac94afc66dc43e7583bdf1c25790f4235076a53de6c64f3bc5004e5a9ce4783fbf639fad97":hex:"7ee5e0e2082b18d09abf141f902e":char*:"":hex:"0503cb531f1c967dae24f16dd651d544988a732020134896a0f109222e8639bf29ff69877c6ef4ac3df1b260842f909384e3d4409b99a47112681c4b17430041ca447a903a6c1b138f0efbb3b850d8290fceac9723a32edbf8e2d6e8143b1cbc7bf2d28d1b6c7f341a69918758cc82bbab5d898fa0f572d4ceaa11234cb511ec":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,104) #0 [#1]
depends_on:4:2
9:exp:1:hex:"a958fe3b520081b638d9e4c7d5da7ac7":hex:"c396109e96afde6f685d3c38aa3c2fae":hex:"":hex:"dfa9487378c7d8af9c8dbd9e533cd81503d9e4e7dab43133bad11fd3050a53a833df9cc3208af1a86110567d311d5fc54b0d627de433c381b10e113898203ac5225140f951cdb64c6494592b6453f9b6f952ec5ece732fb46c09a324f26b27cdad63588006bb5c6c00b9aa10d5d3b2f9eaab69beeddd6f93966654f964260018":hex:"06ca91004be43cf46ed4599e23":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,104) #1 [#1]
depends_on:4:2
9:exp:1:hex:"ec319fb143eac8215b51541daec268f2":hex:"8a4684f42a1775b03806574f401cff78":hex:"":hex:"d298d988e74927736237eb8ab09d7a86b854fa2fd1f7f3be83b417ac10aa9291f4af5b3fbaf75a296ac32369ad57ded3984b84711953e477de3035ba430a30ffb84c941936e6c8d2cae8d80159876f87dd682747f2dccc36d7c32ab227032b8ac70b313fa4202ea236e3ec4d9e4d8b48cf3b90b378edc5b1dbeec929549344f8":hex:"e91acb1bfda191630b560debc9":char*:"":hex:"27ce4a622959930f4059f247d29d1438257093cc973bf1bae4e0515da88b9a7e21ec59c7e4d062035cdf88b91254d856b11c8c1944865fa12922227ded3eecccaa36341ecf5405c708e9ea173f1e6cdf090499d3bb079910771080814607a1efe62ec6835dc0333d19dd39dd9ea9f31cd3632128536149a122050bb9365b521d":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,104) #2 [#1]
depends_on:4:2
9:exp:1:hex:"14a3e69f351ac39b4297749a90c1365c":hex:"eb1c6c04437aa5a32bcc208bb3c01724":hex:"":hex:"051224f7b208549dcfda5f9d56ce5f0a072ef1f23f3810c693516c92622be6ed4d7a9e0f9450980ba490b2e9e3468ea7eef10bc9ebd673d91f32b748c1bf2c50cc4ebb59fc409c6d780bba00700d563ce1dc9927a6c860095a42ed053f3d640debfbfa7a4e6d5de234af19755000d95e7f414f1f78285ee165410c020038286b":hex:"e418815960559aefee8e0c3831":char*:"":hex:"797310a6ed9ce47cdc25f7f88f5dbbf6f8f4837701704d7afced250585922744598d6f95ba2eecf86e030cc5ee71b328fc1c4f2d4df945d1b91a2803d6ae8eba6881be5fe0f298dd0c0279e12720ede60b9e857ccca5abe9b4d7ee7f25108beebbfe33f05c0d9903bf613c2e7ed6a87b71b5e386d81b3ae53efd01055bbcccc2":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,96) #0 [#1]
depends_on:4:2
9:exp:1:hex:"c34827771fc3918d1cee09ba9401b832":hex:"2379bbd39a1c22bc93b9b9cc45f3840b":hex:"":hex:"ce79701b661066e53191c9acdaf677ad41622314898d7216e3f113e2e6e215d26d8bd139827f06ab3ea5c4105694e87db1dd6cec10e1f86a8744d4c541f08e40319e22ab42fc1a6c89edfd486b6f142c6bbbf84a73912e0b2e55b79db306ccabf839855afdd889e52ae981520c89e7dc29bb2adb1906cca8c93fcb21290a095b":hex:"26e1f6cf0d9e0f36dfd669eb":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,96) #1 [#1]
depends_on:4:2
9:exp:1:hex:"b1f9bd2006ec550b7b9913d383200b5d":hex:"ca28fa6b64bb3b32ef7d211f1c8be759":hex:"":hex:"6d9fc8f586d50d6e0128172ae147844e80136905d3a297497a9566ca7c7445029028f14c9950acee92a5c12a9150f5e024e01c7505dd83937542b0b1288de9c292ae8ad918a09b2edf8493540b74c73d2794f2eb6eed18eba520ddea9567462c83330f33d7892fcde0b10c73a4e26ab1bef037cec7e0190b95188e9a752fee6f":hex:"c87aac7ad0e85dbb103c0733":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,96) #2 [#1]
depends_on:4:2
9:exp:1:hex:"8b2cef1a92aa0af2b00fb2a99855d5bc":hex:"08d87b7acee87d884667f6b1e32e34d0":hex:"":hex:"fd09525ef3c65ab5823e1b6c36b4a9449a3975c5d3a9e7e33c61fb32edcbb8e8c915b6202e3fbce87d73cc3b66d83d9ea7e1e353cc7468f08626932cf0235563e2a28953ee5a0afadb1c3cb513b1f1fc9a8a6cf326174b877448672f7731dd6430a51619da1a169ab302da5af5b38802f8bbf5890b5d9b45deda799679501dc4":hex:"3bd7685318010b0c5fe3308b":char*:"":hex:"583e64631c218549923e8ad33b728d07f23b0f19d2aff1ad7e20d564c591db0e117caa8f21e3f3345e3d84f0ccbb27274cddf9274410fc342cb2a5d4aea4e925d0dd5350389ee0dea23a842ff3f5c1198374a96f41e055f999cfbc2f47ceaa883da8eb6ff729f583eff1f91bd3f3254d4e81e60d9993b3455e67f405708e4422":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,64) #0 [#1]
depends_on:4:2
9:exp:1:hex:"175c306f8644b0c4b894ae3d0971505e":hex:"9860268ca2e10974f3726a0e5b9b310f":hex:"":hex:"fbe7ced7048f83e3a075661c4924eb77da1b4d6019d504afb942d728b31fd3b17557bd101c08453540a5e28d3505aeb8801a448afac2d9f68d20c0a31c7ef22bd95438851789eef1bebe8d96ac29607025b7e1366fecd3690ba90c315528dc435d9a786d36a16808d4b3e2c7c5175a1279792f1daccf51b2f91ac839465bb89a":hex:"f809105e5fc5b13c":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,64) #1 [#1]
depends_on:4:2
9:exp:1:hex:"08c0edcfe342a676ccdc04bdf854b4b0":hex:"4a7b70753930fe659f8cc38e5833f0c7":hex:"":hex:"1fc8ef8480c32d908b4bcbfa7074a38e915c20ed7a1c608422087e89442d7c5af6fe9c9a716c55793248062d8e6c6e8e904e2804da3a43701e4c78ecdb67e0b25308afc6d9b463356439cd095cff1bdf0fd91ab301c79fd257046cba79a5d5cd99f2502ad968420e4d499110106072dc687f434db0955c756a174a9024373c48":hex:"9ab1e2f3c4606376":char*:"":hex:"983458c3f198bc685d98cea2b23cf71f0eb126e90937cab3492a46d9dc85d76bbb8035c6e209c34b2a7187df007faabe9f3064dc63f1cb15bf5a10655e39b94732e0c6583d56327e9701344e048887a81b256181cdfa9ec42ebc990875e4852240ddcb3cbc4ea4e6307075fd314f7190f3553267bd68b19e954e310ec3f8dbab":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,64) #2 [#1]
depends_on:4:2
9:exp:1:hex:"241067a0301edf0f825d793e03383ea1":hex:"a30994261f48a66bb6c1fc3d69659228":hex:"":hex:"6984bb9830843529fad7f5e7760db89c778d62c764fcd2136ffb35d7d869f62f61d7fef64f65b7136398c1b5a792844528a18a13fba40b186ae08d1153b538007fc460684e2add8a9ed8dd82acbb8d357240daaa0c4deb979e54715545db03fe22e6d3906e89bdc81d535dae53075a58f65099434bfeed943dbc6024a92aa06a":hex:"36c3b4a732ba75ae":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,32) #0 [#1]
depends_on:4:2
9:exp:1:hex:"03cccb5357bd2848332d1696f2ff90cb":hex:"e0754022dfb1f813ccaf321558790806":hex:"":hex:"5e2f18cbc1e773df9f28be08abb3d0b64d545c870c5778ac8bb396bef857d2ac1342ae1afb3bf5d64e667bf837458415d48396204fe560e3b635eb10e560e437f2d0396952998fd36e116cd047c1d7f6fc9901094454d24165c557a8816e0d0a8e0ce41e040ba6f26ca567c74fc47d9738b8cd8dae5dfc831c65bc1ba9603a07":hex:"c75f0246":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,32) #1 [#1]
depends_on:4:2
9:exp:1:hex:"4e5e53c84a05d5a5348bac7b2611cf62":hex:"47e40543b7d16bc9122c40b106d31d43":hex:"":hex:"489c00c05dec06f282924c680f621ab99ac87f7d33ebbb4ca0eee187ec177d30d2b4afb4ee9f0dc019cf1a4da16d84b7f5f5c7fce72a32461db115b5a5a433024fd5ed3d47161836bb057a0189ed768f95e45fa967d0cc512fc91b555808c4033c945e8f2f7d36428dcb61f697e791b74e5c79b2bcb9cb81bec70d8119cd8d76":hex:"81eec75d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,32) #2 [#1]
depends_on:4:2
9:exp:1:hex:"2c94008bf377f90b7a1c0d2ea38f730c":hex:"abfe92931a8411a39986b74560a38211":hex:"":hex:"7b3d619d115de9970b2df4e1f25194940b3f3da04c653231e8e6946de9dc08ae5ba37e2a93c232e1f9445f31c01333045f22bd832e3b5f9833f37070fafb0ef1c44cc5637058ab64d9e07bb81b32852d4cf749a3ddbfdb494f8de8bb4e31f46033f8a16bc22e2595d023845505ea5db74dd69ab4ca940078b09efb4ff19bdb66":hex:"47d42e78":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,128) #0 [#1]
depends_on:4:2
9:exp:1:hex:"69eedf3777e594c30e94e9c5e2bce467":hex:"a3330638a809ba358d6c098e4342b81e":hex:"df4e3f2b47cf0e8590228fcf9913fb8a5eb9751bba318fd2d57be68c7e788e04fabf303699b99f26313d1c4956105cd2817aad21b91c28f3b9251e9c0b354490fa5abfcea0065aa3cc9b96772eb8af06a1a9054bf12d3ae698dfb01a13f989f8b8a4bb61686cf3adf58f05873a24d403a62a092290c2481e4159588fea6b9a09":hex:"5114e9983c96fecec3f7304ca42f52aa16cb7c6aadfb62ad537c93a3188835ca0703dad34c73cf96435b668b68a7a1d056931959316e8d3ab956bf64c4e07479c7767f9d488b0c0c351333ccf400b7e0be19a0fd173e3f2a1ae313f27e516952260fd2da9ab9daca478ebb93cd07d0b7503b32364d8e308d904d966c58f226bb":hex:"5de3068e1e20eed469265000077b1db9":char*:"":hex:"208e6321238bf5c6e2ef55a4b8f531cbbfb0d77374fe32df6dd663486cf79beeed39bb6910c3c78dd0cc30707a0a12b226b2d06024db25dcd8a4e620f009cafa5242121e864c7f3f4360aaf1e9d4e548d99615156f156008418c1c41ff2bbc007cecf8f209c73203e6df89b32871de637b3d6af2e277d146ae03f3404d387b77":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,128) #1 [#1]
depends_on:4:2
9:exp:1:hex:"45cc35311eedf0ba093bf901931a7036":hex:"fed5084de3c348f5a0adf4c2fd4e848a":hex:"6e210914e4aed188d576f5ad7fc7e4cf7dd8d82f34ea3bcbdb7267cfd9045f806978dbff3460c4e8ff8c4edb6ad2edba405a8d915729d89aab2116b36a70b54f5920a97f5a571977e0329eda6c696749be940eabfc6d8b0bbd6fbdb87657b3a7695da9f5d3a7384257f20e0becd8512d3705cc246ee6ca1e610921cf92603d79":hex:"5dc8d7525eaad035c19714ae1b1e538cb66a4089027245351e0ad9297410fb3a0c1155407c10a8bb95a9ca624a9c9925dac003ee78926c6e90ff4ccdba10e8a78bda1c4478162a0e302de5ff05fb0f94c89c3c7429fb94828bdcd97d21333c2ee72963ee6f056ce272b8bab007e653a42b01d1d2041ba627f169c8c0d32e6dae":hex:"266a895fc21da5176b44b446d7d1921d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,128) #2 [#1]
depends_on:4:2
9:exp:1:hex:"9edb5231ca4a136b4df4ae22b8588f9f":hex:"c342e9bdabe7be922b2695f5894e032c":hex:"a45c7f8032ac5144deef8d5380f033aea2786b0592720a867f4831eaccc6b85d3fd568aedc6e472e017455b0b5b30cf7a08ea43ca587f35e1646ecd9b4dc774d11e350c82c65692be1e9541cbd72a283bdcf93dc7115545f373747b4f8d5915ed0c42fbeefd3e9bd86003d65efc2361fde5b874ddabcf8265e6b884615102eff":hex:"493df801c57f8bb591955712d92d3fc34518f0599fec8533b2b4473364e1df4f560c12444cf50eeb584676b7e955c742189de6b50b8e012dfa6642f3679fb02bc6d8e08d1db88c8ae955a7946263e06494e17f8df246b672942661e5563302252208f2e00a0d77068a020e26082c291a75a06f63c41e2830292a418b2b5fd9dd":hex:"5ed3ea75c8172fa0e8755fef7b4c90f1":char*:"":hex:"56696e501fac1e8d5b83ef911ed11337d5d51ff5342a82993dd5340bb9632e6606eef68ec5fe8cec6b34ebbc596c279e6cbc9221c4cde933f6d93ae014e3c4ca49593f35eaa638606d059519bac3a3373519e6184e7227d2aa62170c36479fe239cb698bfca863925a4c9fb1338685a55a6dfd3bd9c52d8ae12be8551fce6e1a":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,120) #0 [#1]
depends_on:4:2
9:exp:1:hex:"d5fdcb8f5225090e63fae9b68f92c7cb":hex:"581c818282a0905df5ffff652e5604e9":hex:"f1ae6cd7b07f261105f555cf812a1d5bf8dd9aac07666318acffa11abb77d0238156663acbf7543825b45c6e9cddb481a40995ecd78bb5f4cba5df7c7efb00fc19c7f45e94d37697aca8ef368b99165393b6107f900194c797cd3289cb097eb5915f2abfd6aa52dd1effffdde448e30075a1c053246db54b0ec16eadca1c0071":hex:"d39b9cba95e3a3aab9bc1d03ff475c04faeb5b7f0510777f39e5a05756606eb7ddd154aac035d9ddaf3535629821dd8f014dedd52cd184f52fc706e3c89a3a271398c9125d9a624dafb297a56022ca2ea331ea7359ab5e65f8e14814788e64e0a886a9b1a0144bf268fdcf9d94c3d10a0452f40111da9df108252e9039eacea3":hex:"827e66b5b70dce56215cfb86c9a642":char*:"":hex:"cec11a12e47fd443f878e8e9fe23c65f29dd2d53cec59b799bcb0928de8e2f92fe85c27cec5c842ef30967b919accafe0c0d731b57f0bb5685d90a3061cb473e50e8aeca1346d1f47f7db06941f83f21ba5976d97c28cab547d8c1f38387a04b8a0b212da55b75fbaf9562eeeabd78eadcbab66457f0cd4e0d28133a64cb063f":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,120) #1 [#1]
depends_on:4:2
9:exp:1:hex:"036198cd3a3ab9319684d0f811cf2992":hex:"47dffc6b3b80ffef4b943bde87b9cf3c":hex:"ec4de476cd337f564a3facb544d0ff31cd89af4c3d9a28543e45156189f8eff8f804494dda83a1fb2c30ce858884a01ec63db59268452b1eea0f0d48280bb7340eaacc84509469dd94d303774d053d7ab4fb5f6c26581efeb19165f8cb09d58ec314d09ab8356731e87fd081f661e7b2d1a7c3aa4af5448a12b742e7b210b0b0":hex:"6b95b9e82a695fb7b466ce3adb536f525d8314f95eada39efb49baf121093ce7d5439f0d8223e03530b85accd388a70650ca9f7e63eb32afecb7b1916ed9b762128cc641caf3e08e027c3d88481d653b6b15172e977dfb9b3f88465911aee162501cbf8501ce2b66ee151bbfdc23225f638f18750c239d62471663e5ee2a5856":hex:"6cf68a374bea08a977ec8a04b92e8b":char*:"":hex:"5c2f7c408167be3d266ff634e1993fe291aef7efae245fa0b6b5bde886a810c866ae6a078286684d1b66116e636e285f03646e09f3c4ed7b184e7c171ba84f3bfd9500c6f35964a404892b4cdcdd3f697fc5b01934a86019810987a9fea7efca016049873f1072f62df3c17f57ea1d88ccd8757f7e3c5d96e8a18d5366a39ea9":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,120) #2 [#1]
depends_on:4:2
9:exp:1:hex:"c9fbbff8f25f951ba874dfc5ff38584e":hex:"1c1fc752673be6d4ff4cc749fc11e0fe":hex:"abfde0b60acfe265b62ed68ebebc1f5f725f155c4b8a8aeec8d704701c51ff7817060c1b0ce6b80d6efc9836c9ea2bc022ec67db4cd34e945e3a1b153fd2e0f7ac84bb4b07e04cbb529ee24014b16067f9f082b940c9d5e54024d3e5e910310457478560721587da7b5343d89eec5a8fce389c01185db15e7faa9a3fa32e8ab9":hex:"ca401071396da00376add467490abc6e6a7d8a85852026979f7013a09cf689113c8d833560cd6c5b8fdaa8fdd818e773ac13954839a0a2c91efeaf4e0e14de43308419a8b86fa2ae600a88a6bd39dfaabc16a3c7c1b77a5c2aab7f7caceb2f8595324125efbb7c96ba16c47d0bd10568b24bf445d72d683268466e68e46df500":hex:"ff0b2c384e03b50e7e829c7a9f95aa":char*:"":hex:"239637fac6e180e71b2c9fa63ce8805f453d81499623ec2deba9b033350250662897867bffaf0c314244baf9e1fe3e1bb7c626d616bfbf3e0ac09a32aaf718b432337c9dc57c2d6fc4a0a09bdc05b9184d1b90c7193b7869f91e2caa8b3b35c10c6621ffae4c609bdf4e4e3f06e930541c381451ef58f4f30a559d2b79b0e6b6":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,112) #0 [#1]
depends_on:4:2
9:exp:1:hex:"3a314ec178da96311e42334a616fb38b":hex:"d7ea27c819e3eb2666611bb1c7fc068d":hex:"db8dcc31a5681f13d56abd51bd2dcb0d2b171628186e215a68bf16167b4acd00c3441973c3fa62fa2698ee5c6749fc20e542364d63c40756d8bcff780269e5201bafdced3cdc97931d8203873431882c84522c151b775285d0a3c5d7667254c74724ff0ea9d417aa6c62835865dfded34edd331c0c235a089427672c5a9211c9":hex:"518b3f5384ab54f80497d55be7a5d6902bc7718386212c2ec7537db331514b3838f104bf9054e03039a4cfb73f41e5d0a9648e569ed738cea8d33917430dff6afa8f07a75e324b9262fa196a4439dcd66b0535ee5bea0d292600227c2a79ed03be0671740e5cb7b306d855612bd3abcbf02cf7e7cecbb6cdbb33d57b4e3234a2":hex:"1e774647b1ca406e0ed7141a8e1e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,112) #1 [#1]
depends_on:4:2
9:exp:1:hex:"e818372a63b7e2c23b524e29ba752bdb":hex:"36e617e787cb25e154f73af1da68cb06":hex:"71801d69796c2ce36b043c157aec9fd2e06fd1ec596126d10c26b6d44e3dc36c4fa30a030d65c382b6ddfd958e71fe9c16732e595137a3d6764c15480fc3358e9a113ba492b31274663f5842df5d1cc6bad70e83b34675a4411e2e70755aede0ff5035601be130562e27a20283d6f144ff1bdb5276dec05fad80d51b28d50688":hex:"c1bf1b702a95ceaa6b48a1cdd888ae51f58a9fc3232bd6c784529a83301c6d0cdda6e605ad9a2563f54a8d59f624ae7c589e48b85041a010dcb6fb8739d43e79a456fc0e8574af086df78680460c3cdc4e00dc3b9d4e76b0de26e9aec546705249fa7e7466c01001c2667eaf2813be1f0f116916f34843a06b201d653aa1b27e":hex:"3744262bc76f283964c1c15dc069":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,112) #2 [#1]
depends_on:4:2
9:exp:1:hex:"9a04f16882ff45816739d1b6697ce8b7":hex:"66f504d9a9128ad7fb7f1430d37c4784":hex:"f641c53c83c4fb1ff8044bfa97cdf63fe75d8159d65b3e5ad585b89c083a53cf4a2f7a58eaeaf45fa71f2c07bc5725a6b03307d7f32884a133a4c803700bf1e12564b98b71f63b434ddf13ad2c467dda25ffa6effcafa72452b20c34cfae71e47096f8745b487e9f1945f5bec83f7ec2709a13b504d92315b1b727a78902be84":hex:"6a4f3dbb3371f64258fd1f831349e745a4e19a33aad794b1de3788729618beed619586092120e9e5dc3ac6e0d52f991f7be61afbfaa4399ac716ad79a2734827254b1627791dc92a128a6f43426b8085dee94242e83176a3d762658f18ecc1e37e3e1531648c9caed212ea2cf3b3843cb92cb07730f30fe2dca3925470fadd06":hex:"fbb37084396394fecd9581741f3c":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,104) #0 [#1]
depends_on:4:2
9:exp:1:hex:"38cf029a4b20607030586cd2d82146e6":hex:"6330084319e2bf32cd5240f4826944bc":hex:"80746cfb0127c592f8164d751b0e14a5b379056a884cece7ee4e9b80538d7ff6be56a3b19c135786722aaf315123b47672b0251e87ea45f0fd3601cf93f9efa6cbd9ad537f54d57f1e187f821faac24096ecec19d137c9f4cf145c278af4cd8de01c7758784fda06f1cc62d92ae1977786f3d0645714ab4ab6f48c8794b12f73":hex:"f4c9f4476561c9ebdac71b282ae6e2f9f03547da98e66d4d857720db2fcc9ed1f363858db34c9dcaca0109d7c81db24150493115f2bb6985efa8686e3d2ab719d33b230aa4c5c70696bf42f225fb3c6704711c054a882d89b320884a78cb59cd2100496edf4010487597fb9135d8ca79693a43843e9626fd6c64a8722b3a27dc":hex:"7b021de5cda915ba58f90ceef4":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,104) #1 [#1]
depends_on:4:2
9:exp:1:hex:"cf4d81fc5997c744a572bed71f4ae609":hex:"bc4e20c56931c967ce8e3b8f5f1c392f":hex:"b6b8294abf7da5703f864721f7904d3821f5568bf4b269e44edef4f1c95ddc172d83a06c0ad9f7f1fd2e292c17a876392bc5bb705d370b2f16ff721bef7648f423346fd3a4d762676e6fcf2d690553a47224af29afed0f452d263be90eb8150a13d720f1db6f1abc1c2ec18cfbf93b8ed3c5aa7cfc1dcb514d69f90409687a4d":hex:"f3d65d70326e641fbe7fd945fe9cf66c74f17d0d1020ae8ac488f39b7285c99d8632bc2201960f3d77daccfecc04428abe0853aa8d82b90a93127c72b2d2af53f7f1bd0afb99d50f0b3b24e934ec98eddb278b2c65866442cebf10208c7ce1b7ecf764858480b2a269b106fa6d2428d5ad17612e53e62ccc7ad1184663aeb9a7":hex:"0a86142a0af81c8df64ba689f4":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,104) #2 [#1]
depends_on:4:2
9:exp:1:hex:"d88ad40b42ead744f1b7a36685658be1":hex:"52c3158f5bd65a0a7ce1c5b57b9b295e":hex:"dde2663335c40e5550ae192b843fa9fb4ef357b5c09d9f39dafda3296a4d14031817ee4dc1a201d677597d81e37050cd3dc86c25adbd551e947a080b6c47ec7be8a927ef7920bd1bb81f2c59801a2b9d745d33344cbe4838bcf2eb8dce53ab82c75c9bbab8e406597f6908aaa81fbbdef25aa69116c8f7a8cdc9958435aa32ac":hex:"e99d2566fe6bcb2a04d167605db7c0f1e5567ff2d8d3292c15bbccc5d1e872bcb15a30b3bb8b1eb45e02fba15946e6bca310583a6740845a0f74f4ebfd5c59ced46875823e369e0447cc3e5d03dae530adf3c9846362c94e7f9d17207bf92d4d59981d8fd904eb8b96a0a23eb0f8d7e7a87e8e8892a2451524da6841ce575c27":hex:"7643b3534eb5cb38331ed2e572":char*:"":hex:"6f87f6be2f4e7421aa26fe321045d1e23066a02158634bef35890581c92367d0bc232940de30974c70a66c60137a9f3924d12db1e5bc1b0e7131ea3620a25eb805b7d670263b82c8bbfcd6839305025390fc17d42d82daebe1b24f73ff9aa4617e3866785dded88f8b55ef89b2798ea2641a592a46428d9020f9bf853c194576":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,96) #0 [#1]
depends_on:4:2
9:exp:1:hex:"c3ce86a212a30e724b4c624057db4e79":hex:"9e03f0dd4cb2b3d830a6925e4400ed89":hex:"92c48a39d93ea3308f55f6650d33fdf17a902076d582a94a82ac99496de9f62312292b844bbca5a683ef0f0710bbc1c7f89cbcca8f9c0299f154590d32059bd99fca5d78c450ede0d11d55075947caf2151218ce7a06c1e81985a7781a3444054170b457fd7ba816026310112abb47c8eddfd3ab7f679a0f60efc6c6dd3b759e":hex:"3582ef7a9565c9a8e4496750ee5ca3e3a80df6238f7b7608e3394ec56d1360777921da039ede34abcedd01081babd496ba4de74a7de501181d6bb2022a6cc7f79d89a4c6a97676fb0f2b42f70e2d0bc1eaac364c3646df4f611c1d6b09737451b81b5a4da73c05fb58391c74e44498b80b26f1c29562d23c39b5d3f086b280cb":hex:"3230fe94b6ccd63e605f87d0":char*:"":hex:"052347a4273cddba65b2a0b961477f07edee440a9117ab204359d2dd45ad2a6dad3b60ead891e7da6d79f3017ac90f95725a0089f04d25ce537bf53b7ea8e1ea58692d34c221db141e2a9fd7211adcee03ef8b5bf3c5d36311d20bb3d81f70f7e7272d0e2b6d12293b1a2c31b70f140a8f08d98c6231a3c429c3d0a10b2e1c1c":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,96) #1 [#1]
depends_on:4:2
9:exp:1:hex:"a0155360b84420b5bf4fb410ea02f31e":hex:"46f0386be7363887e7e357376305eab5":hex:"611bc290f91798ad84f0a5ecb5a7cb8fa35e9ab6a5a51c9869a68a076e96f92c9c117595f92cbac5d33343fa2accd2541473907cbc54792c5e215ae857424c921b04ca4b81376bbedbfcc0e565c118f2aced08f247698eed5e2d202c48245161cabeac9fa195219f9799fa253e339561e13012167f1d02b4012b7791b7c863ba":hex:"ecdb51522fc440f7471ea6a31f7c1ef1ec2153e5bcf6303297dbf8ddb3830b45ed9866157375ce4bdeb5e32fcbc6607984fccd7e6552628736608ab13072856d432ceccd3e90d1bb52ca9ada9cee90eb89ac10e887a1978fd0fb3d7bb20caaf35539e150be8044b725b8427c4c4a910f79980865d36344a8784bcc3d58460acb":hex:"ac5addcc10cae6c1345520f1":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,96) #2 [#1]
depends_on:4:2
9:exp:1:hex:"694f621f594d96b16c32254ff06f3f9c":hex:"542db4e107485a3cd24c7ad337a4f1b5":hex:"27b7bfa5eb34ba376e515e58ab8b6556c396820d0074a1fe3b984945dcf5251ca450456ccb4bb66ec739b03fdc5f72d24553e843255adc012d1f1c95aa3cdac5d12926465354217203052cbd4869a8b5be2e01d0fe66b5a6a8da0a2ce351557e2991ce77baa812b9c67b8e1c5a1fc348710e1a73a0fd49acfd538b7db6bef8b3":hex:"e61476b8b7f101ca6005f25af2b9bee795d62720bbbf59357057ca7cd473e00f0d465255fce8d6164657603323549fb4e3d33fa51054b1a70cc7e492916dea85453e9107fe781bfeb4a622c5b2306a8dddef99386dc50745003aa7220cd7f32fb0a060fa7682576769a48f9169c7d11fe0a8a61b95f5d6dfcf216f7d0c652a84":hex:"0bdef4d771a1740381e7db97":char*:"":hex:"8b27a338fd2153d304f04655e09bd9bdf4468890ecce1e3b51de2c9a25a8d9336a9acd753ce270b1fe8d50196feac68145e0fd59c9cb3aa7c1e8af03494bc4279c6e287c849f3c775ada584ae173100946ae6921ef7c96bbc6f216093548702cf1867bb1bf1f4c9e90a34230a2b2aeb584622dd615023a43a406e64428bd9170":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,64) #0 [#1]
depends_on:4:2
9:exp:1:hex:"78826a5215a1d5e1b39cad5a06861f8f":hex:"feb9d740fd1e221e328b5ef5ed19eff5":hex:"ca9411b368d8295210d7a04da05a351d287f2f67d978ef1bb936de9f8065473f6fa11495da2eab13a1002231c86411d5409bbc718e2042ee99e013b1df1ef786e9fc1f2d43293c854128184efb9317c4ef82a002eac8b28fcd91d8a714a3aa25fc3c0ae4af9f4bcf5ad19a30cd8ec4b1785df70aa92074da419abe433dd4c435":hex:"0fe2c798d7015d3e2f8725648d95729c45d357dc0c89fc63b9df5a68d3e65419540f663e9190793a29c58c495d5c6a731782acf119e2df8a96fb180ad772c301d098dbc5e3560ac45b6631a01cef7eed6db51f223775d601d2e11b9baa55e2f0651344777e5a03f6738a2013626a891b5f134f07b16598b8cbe3aeaefa1c2a26":hex:"a724bbb295a02883":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,64) #1 [#1]
depends_on:4:2
9:exp:1:hex:"d450f5253251121606e56687952bf2f1":hex:"fe7ff90b020fc77d7fcd90bc583850ac":hex:"a3bca9ff25a60006eb18f993dcdc99681e414e27605264dfd25652195d7fe1489550afd07fc7346b88d93b59eb6642913646e93bf50ee1db5dd30106cf181124d8ad01c72ed99038c9798620abdf5c78c419b08c97f982b34d9e9105d9aa4538afcd37f62e2412f14f7a248fcd60abaf2b66cd4554767f99030f1a495d56a5ae":hex:"479b4f421bd8ac7f615c4a507da187cb5d4b1f1e2c6113d1f9678c1ba92dc5e17c5b525d7f3208733223eb82af0820b8476e9b08ca714ce044417b24d2238720cb8ffdc69db558cbaff52e3651b400e16c9d5ac8ed8949a19c35516f80394a04bd1cfdced7b204f779d792086e00b2ebca2f55a1140e85f5ee9ac7cfc5a31747":hex:"6446398aff73ed23":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,64) #2 [#1]
depends_on:4:2
9:exp:1:hex:"90a59f6b0abf932311f0b65623c17740":hex:"20778bea82a6717038e7064f48a31981":hex:"4022d04f1454a72d2efe57533bd32757595220b20f3a37d166cec0412fb1eb2588f939ecd906c805f4827338669888e9f730905001eb1b136b95e306edf70d9ba1e5cd0aa13a25a1f28ab55cff36f9cd7036c735e3b285d26002ad2ed1074b566e252ea3ec8a9ce10882375dc3f1d9676e301dcb179eaae991120b796cc35648":hex:"be5a948a771a8df12adaf74d702f064a75f6483c03203365fbde7d184844fe6dee0b84cf344be05b1d163817ba1516fcb87b9167ed81f884ada73b0058e2b38cba515bbbe462f4c21f8de1d41bca2cf4340aa659f9f07886c2bb620d9c3295318c07fa3c17fe8242409359c08bcb337e5cf268880839b6a20f4ee4b3f04e7024":hex:"dc77c1d7e0902d48":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,32) #0 [#1]
depends_on:4:2
9:exp:1:hex:"6be4ef629f0b38194c74f7b66418922d":hex:"fb77a4b9b246271abfc656433f87628c":hex:"e5d5227725a19a3050fbf2a97a6e854bc1218b94a4a3403b721ace3447daff68fff5553a26edd41219e68fb61fb9e964d0a3c29796251ae4eb942187cdc55d13a09dfb487e93d9e2072d7271456a77c6ccb81154443eea176314d6e3a08619b52cd880f1c28ae5214ac0090a3855dbd74f87389fe8afebd464330fb683dff81a":hex:"b67ea20a320f4ec0e4185c62a4ad79a3c97a8189a5e4d1deff9d3edff0f9a9323532853c1a2a2c1e62e4d1afebfcdf1d8461921ea601750380e63b912d8b7389198f976851d88a19f1aa32c97143668ad00838d98da1c4f2be0e6e2dc964d170d7f7ad2e2997982e5ca110e744b6e10c24ca18eadff6b129b1f290c8a7e0a593":hex:"3d8fc6fb":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,32) #1 [#1]
depends_on:4:2
9:exp:1:hex:"c50e37244931e8debc12b3d561c83ba2":hex:"6c0b1fd7ab424a6883c36457d1b5521f":hex:"516dc25f6452ae169ce293c5cee440de47353ca5ba770dca0f04175950e87a2d4c3f84fbc6eeacaac436853492929680066f959e74de4b736ab924d8367b90aaa6e9492561ad4b5aa78b6737d562e960edc3b983e2e01a186e9f22896f48d8dfcfb6a42cfe2c6006c687a27772820a1e8875bdf09e8104248ce4db883376bc04":hex:"b9abf0796f2d2f774735546cf809030f65ed0c7f6bd469ef2fe0ef32aa0225b57fbce07c36017bbc1806a81ff1a429278160a07643f864485b4e0e35d57553dc1a131e32aa10f1f91d663b10f0a418f472ed7b4bca54fd7ffdbb22c4d7764d94a7ffd04730614459431eb64335b9b65363de292c04275d40a7b968c0f5c486e9":hex:"7d4393f0":char*:"":hex:"962509e494f10269b70ebad02b0cd799d1d41191a734863ef502aff3d3ba48dc2acf9da9a3fc3f40be4d210dc5e128bc00499aec57aa0a4669863165428687b88d46fad41e36af8ea6605586eaa5c0736d0d53b9d523e0cb5a0b285048e060a73cbf4b587d2cd787debdb2b4c8cda731a61a15b19fe8b561fbdd3a7373853ae1":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,32) #2 [#1]
depends_on:4:2
9:exp:1:hex:"8531ddb03977383405baf2ee9ca7d64b":hex:"baf623867d6a25fd85d1f08e599c0566":hex:"18f92cdd37dcd7f99b06838f3f68748aba367baabaebd0da9ee787d70e752fa07dea553a43b643b8d8f460175c0746675205e20a7a98acfcac864d7c4cf5ab4c41c031738c76882acda003c5af47b1c4df8894a827a317935d970d4afaee17715c9cfd1883e8c345f19d1f89e229b8edba6b4f53b86d8da1c0f159afb83b6b33":hex:"d90c9e26509bdba9b1dea8d2b94f2b1881d22c2bd756ad23cd61944710a1c1f2807170ed47a6870ae654e44757fcb3822ef28b37946cafc07284f8a0c22ae3552954f0d87b8d8c825bd546935b494cacb4262d9e2a88f254f200ad31367d8b3715afbabea5f34214ffedb14d7c84806022aba2dc8f88a314ffbb24017d1a9b9f":hex:"2fc9de46":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,128) #0 [#2]
depends_on:4:2
9:exp:1:hex:"862dd5b362cfa556ca37e73cff7f4a0e":hex:"81530a243655a60d22d9ab40d2520447":hex:"":hex:"":hex:"3b9b2af54e610ed0b3dda96961dd8783":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,128) #1 [#2]
depends_on:4:2
9:exp:1:hex:"3452b7bc100c334292e08343f139b9d0":hex:"8f92739a30fe4ba24079f5d42753d6ac":hex:"":hex:"":hex:"0eeca69f8b95e1a902cc3ab1aaa8e2af":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,128) #2 [#2]
depends_on:4:2
9:exp:1:hex:"31a0cbaf21b943f8badc939e94eac7eb":hex:"d5bb2c4eaec47088230972ae34fcda9c":hex:"":hex:"":hex:"580e728512c8e44fbb3fe2c498e05323":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,120) #0 [#2]
depends_on:4:2
9:exp:1:hex:"9e8fca537746e7cbff97f1dcd40a3392":hex:"43e9f2bf186b2af8cc022e7c7412d641":hex:"":hex:"":hex:"4465a3f9d9751789bcef5c7c58cbc5":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,120) #1 [#2]
depends_on:4:2
9:exp:1:hex:"35b5854ca83792ad691dbda1a66790fb":hex:"cff61cf9b32ea30cf7e3692aa6e74bed":hex:"":hex:"":hex:"726793199df533dd9055b0ac7c939d":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,120) #2 [#2]
depends_on:4:2
9:exp:1:hex:"07259267c1c6a015437a5d8cfa92f9e6":hex:"18b9cf2ad7ace6ec1c8366b72878cf20":hex:"":hex:"":hex:"4340f6263f0ba2d82c2eb79cb0cc7e":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,112) #0 [#2]
depends_on:4:2
9:exp:1:hex:"fa1df8955aa3ef191900b06e7c1b7d46":hex:"6928c138c98a4350c318fbdccd3f44ba":hex:"":hex:"":hex:"7c89d9e77515d271b6ed54c9c4e3":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,112) #1 [#2]
depends_on:4:2
9:exp:1:hex:"c04200ce41ce77d772babb206315ec7d":hex:"a885d58f0f38f9ff26d906fa1bfb12f4":hex:"":hex:"":hex:"9ee0d025421f2bf18caf563953fb":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,112) #2 [#2]
depends_on:4:2
9:exp:1:hex:"650df049461be341c3099bd1613dcead":hex:"8a4ff6327b49d297248ce2d5bd38afa8":hex:"":hex:"":hex:"13f067ef0d7b448d56e70d282fed":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,104) #0 [#2]
depends_on:4:2
9:exp:1:hex:"ee61b5bf5060fcc637dc833926898508":hex:"b2dcf21f9ffa4a883044d29f087f9b85":hex:"":hex:"":hex:"9ab1d66666d4dea3cbb5982238":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,104) #1 [#2]
depends_on:4:2
9:exp:1:hex:"01cc56ca7e64db7fbef66236a5c49493":hex:"8ea5b63004189792cc040ef18b37e550":hex:"":hex:"":hex:"d685aeb54aa129a21bed17766e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,104) #2 [#2]
depends_on:4:2
9:exp:1:hex:"134dd72ac8e28ab46720c2f42284a303":hex:"c6368e4c0ba0ec90fa7488af9997a4c7":hex:"":hex:"":hex:"4ad9cdf19ff7d7fd7e273efced":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,96) #0 [#2]
depends_on:4:2
9:exp:1:hex:"180c04b2bde6901edcda66085f73ecd9":hex:"9193b206beade4cb036f01a9db187cb8":hex:"":hex:"":hex:"530f5e9ed0879ccef3a7b360":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,96) #1 [#2]
depends_on:4:2
9:exp:1:hex:"aaac85742a55ffa07e98106d6d6b1004":hex:"630cd8ab849253c4da95ac80324ecc28":hex:"":hex:"":hex:"37911820c810e3700c3a9321":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,96) #2 [#2]
depends_on:4:2
9:exp:1:hex:"ab663c4f8f2fdc7d5eabf6ef26169b4e":hex:"86e6100669929e329a1d258cd3552dc9":hex:"":hex:"":hex:"958d6141f7fb2b2dc7d851a6":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,64) #0 [#2]
depends_on:4:2
9:exp:1:hex:"0dd756d49fd25380c4026ea03cafc2da":hex:"6a6f7e39b0d730ea1670e13d16c12c28":hex:"":hex:"":hex:"872ef05a28da5ea1":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,64) #1 [#2]
depends_on:4:2
9:exp:1:hex:"bd8a834b288bdc7578b6c6ab36f5d068":hex:"aa77de0af5fa4dd1ed2ada5cb94813a0":hex:"":hex:"":hex:"c5c094e83755f2b6":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,64) #2 [#2]
depends_on:4:2
9:exp:1:hex:"020d280dbd06939bbb5e6edc6f6d39c6":hex:"09aea6f0e57598452719d6f63b6fe5a0":hex:"":hex:"":hex:"05d6c56ba601e85b":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,32) #0 [#2]
depends_on:4:2
9:exp:1:hex:"e47f41a27a2722df293c1431badc0f90":hex:"227c036fca03171a890806b9fa0c250d":hex:"":hex:"":hex:"86c22189":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,32) #1 [#2]
depends_on:4:2
9:exp:1:hex:"9d3e112114b94e26e93d3855d4be26bd":hex:"99b98525160c4bb2029da5553ff82b59":hex:"":hex:"":hex:"33bee715":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,0,32) #2 [#2]
depends_on:4:2
9:exp:1:hex:"5b4b7688588125349fbb66004a30d5d4":hex:"b4ae363edb529d8b927c051cf21a2d9d":hex:"":hex:"":hex:"6a920617":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,128) #0 [#2]
depends_on:4:2
9:exp:1:hex:"c4b6c5b8e21c32f36b0ae4ef3b75d5cd":hex:"3d1036bf0000e6f1b77a799f2ef32dec":hex:"1cf2b6cbe86a87b4b5bb3cc50024aeb27c48143658d47b41f2f20b87ed67bd6fc3b85a3a803f66d3576608f5d6ce6cad11e02fe12de5390722dccb8242e1dd140051bef51aa9716c860d45d45bca6effbb1a4797e6e7406a04db5d823766c0f011ebc28e9a8cd4446ec8a75ea8bdc1b2fdbb5cc364fa9877886e30404593df34":hex:"":hex:"a49725014c214ef7cc2d28b9b2b53da7":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,128) #1 [#2]
depends_on:4:2
9:exp:1:hex:"63c3f81500746eaf383fe3975d84f849":hex:"0799d4152fd73c1604b4610cf7171fe1":hex:"cb8248e5f904cc9ccccf6f273fe621eee1b4d7ed98480f9e806a48b84e2d6a733772ecf8fb7fe91805715cddab2b462b89f6e6c7cf873f65031f13c357d5f57b00b7c391c39e78ad1ed94be236ca0ae316bce11bc33c5d701fdfc58abbe918b9c42f7b3d6e89d46f9784b388a6e6daf47730b9fa665d755a17e89932fa669c44":hex:"":hex:"c53d01e53ee4a6ea106ea4a66538265e":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,128) #2 [#2]
depends_on:4:2
9:exp:1:hex:"b0c88b191ce6e8e4a3941f7960b7eae5":hex:"e2a899961c332c815685c553351fa519":hex:"308bf10570af48d632911f3641dea60d78046211c01a63bb8e4e5cbddfff8841d2f2b11e18ccb2170805ef4cacf7804d64e0feef40731a1704907f33b77788c18ccf35b224ec3046a67664ac9a3481d2385b6ddeec6da4f32423f94ea9663a5c51cc388cef33744a8159b4fb654dfdb5092718bf926c824be31197f07f276b5f":hex:"":hex:"92604d37407aff33f8b677326cbb94fc":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,120) #0 [#2]
depends_on:4:2
9:exp:1:hex:"c818dfa0885a09f65ef78712f5ce6609":hex:"ca279284723530fdd68ae880e0ce775c":hex:"2a562abdbb483ca5f355f9cc1c5e607bdd624a078a76b717ce0f8f35d0d4c54b629f372f15d20c848d01420c6af5a7040d42063704a17b46259dcc53723caf2d4bf556143ff9117c752fa4f22c9c155c99b7bf5949d089cdafd562165b9cbf53ff51cec21f49128c8a599718bbcdb4a5d705d20509c44c8945e2a133164b9942":hex:"":hex:"20e9a3a98d71d460743e1efaab13c6":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,120) #1 [#2]
depends_on:4:2
9:exp:1:hex:"2354c6b6afaa883e7ce91faca4981f8b":hex:"604f2730c756c8c39a0527093bc2feb5":hex:"959b4b0b9ce2e9120b327d2d090117553999ee10bdd384a546fc6de0957ef4b447daf07b3d07ef7dbc811f36b0fc09a175d26e4d1263cb5e21eda5ecab85d763807bb20b3cb6ac3f31d548dff00aae058d434ebcf6f7e3a37f11324134f453dd0ea7f51094863486426ff1706129a5a93c53d8c5ccb56cafa5881981fe233cb0":hex:"":hex:"3588c9aa769897dfa328549fbbd10a":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,120) #2 [#2]
depends_on:4:2
9:exp:1:hex:"b0af48e6aebbb6ff5b7c92bd140b085f":hex:"d210d6502a5221ac1274a9c7f5a81725":hex:"d725311ca10eb4b4aa24e6dd19c5e72dc34fc1ff53feb25d924a9b7d8d72205790ca4b1275bd93ad60c27a5587a45659bca07c111e9748fb683a03465153ffd735b7d134b479674ab8596f0596496fe2090f623fd1e4dd730c5283d8b172db8a25df42d9b34f388ed32676a56b8ba03347e47379702654508ccd0a21ff03516e":hex:"":hex:"e6222f068a1e18f09ba6c771eabd86":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,112) #0 [#2]
depends_on:4:2
9:exp:1:hex:"a05fe482fe164b2eca7f6c3e377b39d8":hex:"145327bcc10335fccb93afbf4b17e6e7":hex:"ea6f2e93b5e1bf127d40440b8d6397405246b1b48eebe16964f18928f6b4b8ee2c36322d7126905c1a5b816996e340404b586edc2d77afac11a6c1266511f9eff1a320b035442d4078f8e42ca63cf26d12a971a7adf4645d1bd9a8e4d0a20722f7c2d529beaecc4033f7738075e1cdc6d8a929da5582540678935b82e7b7ba68":hex:"":hex:"3900bde9fa9ae2cbeee54d04f224":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,112) #1 [#2]
depends_on:4:2
9:exp:1:hex:"dacbadf819eb16a63f6f091d13ed04d4":hex:"b9ebce724b0dcb0989ac2d8e7ff8aaec":hex:"7dc6e2189d8a96f3507e352e05e8fd1b4bab988c2f1c706115887119f63b78084f015d85f6b460901a02880103e4d36e8f6527dfd74e4a3acd3f578c0cc726b528875f701ff8b66e5c11b4689c346a098e123bebfa253362cb86829be73c2b85a6881fa976aa730fabb76775027feec7fd920a6c8965a4a509ea812d7c413a95":hex:"":hex:"8988fca83c8cfb1f8feefac46f04":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,112) #2 [#2]
depends_on:4:2
9:exp:1:hex:"969244c7444f3f3bf193b28f8e8e96dc":hex:"49b2845a1a1c87fa66eb8f78c05ac029":hex:"1414a07e86d8b61d1eff43e1ff4ab42c1c95e159058b74c731e3007d21a5eb78bc17b7e920363a3974aeb8608813dc9a4655199b6703ed337450702d8ab16a89776831b2c7c811fec3acc23598a0aa01680a7bf42a4e258145beb08c9f0eacf2bb5f56d26bea3ad11e1a956a630b80f3d22bf35592b4704f7c464b08b06dd7f8":hex:"":hex:"a291c7527385f037f62e60fd8a96":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,104) #0 [#2]
depends_on:4:2
9:exp:1:hex:"525abe490c8434802b69439c590a5290":hex:"141f79f0501316e66451c41c7af0f0cd":hex:"be440db66d3f81be467605a7b2805ec1df5e71e1b1b04bd7a4d05e912f5aa1912ba08de72df18613b32b7edf78963c48c80c25178b3b19262b85bb829f5377e0b368b500d6d3b442f54172d4ca4500eb5b4d478b602e5dc11d090539455087ce1e5b9ea74355fc06e9b60cbf25a9804d3f8c623fff130abc48bc2d8d116b8366":hex:"":hex:"038c7e95f790e6ca5ce73f9551":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,104) #1 [#2]
depends_on:4:2
9:exp:1:hex:"51644e025659de983f5c8156516b812e":hex:"614837c743d0974e9cca497f13038c02":hex:"60c5d062ade2c5c2dec68b734dd3e58ec474a586d1c4797fdfa2337800510134cb27a10d501927632af3c1febc275010c0d2e5abee630cd2bc792963fa82a42286ab047b934a261927311b40f5f953bfd661427921147cac7613d95ee86e16326ef67c1ed097e8fb87a78753d785de34e03a182232786079cb6be00182e41c9e":hex:"":hex:"77e3deba2c7f9386f85bc4a801":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,104) #2 [#2]
depends_on:4:2
9:exp:1:hex:"08566ca7310302dfb84d76ea0525ba20":hex:"5f20ec9c35c08aa7f1c0e8a20fdbd2b3":hex:"5d84e32768b8d1e7e3c426b3118d48e35491bf1bb454b359c8429220216efd8826be94fe1919409a128ccd8125a594f1691c9421fc3dbbb3f757bf2355bb0d074ceec165eb70e26eb53fa2cb5d84dfae06babb557805ef7b8c61c1bc76137571bcc5e84bf5987dc49013831d78bd497ccc49cde7dca2cb75e7ab967da8c6ce81":hex:"":hex:"873f037fc05252a44dc76f8155":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,96) #0 [#2]
depends_on:4:2
9:exp:1:hex:"dfb54db96383fa911bf5b4fa1218ef9a":hex:"7e849e24983f63f1194b396bbd2d55e0":hex:"d3fb689c5818810dd104693f3306a10b27178444af26798a194f7c2ab31ff3a172904b951942b1a26c8ae5b5b1ee2d86dc78bb72a335fde350766d7d9aef6f549871dd46b04b2cc319fcdd47be437d431ad18cab82d51ca9fa57f4108a8de622a92f87d28c0349fab27757fd773413f559a8c00d30e258c1f6cd96f9759bd957":hex:"":hex:"dada7fc7fed58db462854ef6":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,96) #1 [#2]
depends_on:4:2
9:exp:1:hex:"389cf888474e9403e5f4d0e22ffec439":hex:"ef57794cf6fac9f9cea3e8499b53b1d6":hex:"7ea7f7f4763ad208eb6199285b6b2819756c4e3caf2d0ac6f5076ae6785fecdcc4b138a51860ff8b87aaac3a18c2df778a4818308d458dba28f5017513e1454f60be20dae68736ea6d48b1f9deadb517df63140acbd329fbfbc9b82f3ca1862c9e998f0faff1d3ae60b005bf66829f5cf0c5fa03efbdd92d39351e3954be0257":hex:"":hex:"92726d90ad26130e65f2beb4":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,96) #2 [#2]
depends_on:4:2
9:exp:1:hex:"e55abb2ca36c822bf2a030ac703cb8b4":hex:"d86f7177e8ec90f9e9edf10175d5012d":hex:"777a9d93091de56324c10712243f5541722e0b27e1f303fef6faa387a8666161ab354dbea6c43c82a24e8623bfec39aab13164add6be0dfd55d23204c0975b4ba6fbda51363befde482a9ccc1eb9f151e6ad59c77a1e24dd268389e4686f198a936dd603044a3fb653d63cff80597f5a2913c8a2ec1b7d9dce5728dd56c78c2c":hex:"":hex:"65025250343ed8c09b3fceed":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,64) #0 [#2]
depends_on:4:2
9:exp:1:hex:"586114f3b1dc087e1b2739b28c592dfe":hex:"ae5a38ddd455505284434a4bcfe81ef2":hex:"531ff8c285e532d961f49bd210a5523cd9b19a697a3a3fb26db940a496f253862405b1e825daeda7eb0445c98022b8342c8f8ea20301618483f8ab04b6ebccd7e7fc57878fb544a5bf78fa896f50ac30126ff8afca8a86388666b64c643d16812729bfd7e5c03ba52f7e6ea4c6a685404f7bcbd956964417fa0ea9a6d7290c41":hex:"":hex:"467a815610faeb82":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,64) #1 [#2]
depends_on:4:2
9:exp:1:hex:"cbfe806bddb7f06b3826b097550c68f5":hex:"04c1b6c9fd2ab76fc2adfe15d3421bbb":hex:"cfa86d02599652cb4ffff027b9c6ef2336dc9fe946f64fa5ce83f624e144563d4738381bc5371c3cb55cf41ceda07e62cb635ff37246bfa428785229c6e869d5df69d7949a8577889a29e3d05b788ddd43608d9c14e3f1b51ce2085b9a976fe843e3396a74922babe6797d5f01c37ead623b5b582505bcd29edf8a6ea36b0fc7":hex:"":hex:"0697ac372a9acafd":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,64) #2 [#2]
depends_on:4:2
9:exp:1:hex:"96ce3a095a91effdd91d616f1f02ddcd":hex:"579d6633ec6687afa24ef874899b58e0":hex:"3ff3c0038148ed391b6a10aad623a82fe9209c5ba74482f11506d597b5fc7af977235d8ee9e28cf2160346ddd0e33a5bd1fb67b87dad7167fdd4b2b4000d8460ef7b3e1b59b9d61d06cfbe7945379ed6b650de86f396a38cc70d47b8a349f067d00144c903c276b323be6a929a7d7dd8ae7d254d640cdc1176f98e01a1d8c82f":hex:"":hex:"55a0f61032e048f3":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,32) #0 [#2]
depends_on:4:2
9:exp:1:hex:"24ece168c2971cf2b404ea206dc9e29d":hex:"e9db62a42491664a6c46cbb0b2bafc92":hex:"3579f6c0cb3d2a5d0c4548855c7c052d36b6a8dfc60f4ca1b4bbe28ed87306119e71982dd84c4205ceba918d675472753df1b5192d3693dbf6a061c6056e312135ffc5ff426895a7e30f7f675d2cb21de06eea5e3761b94deef7537b985d324864c9ff6ab6e230a1006720f98c958912b604a6d03e3979887c07be3ceaafc78f":hex:"":hex:"d2b15a23":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,32) #1 [#2]
depends_on:4:2
9:exp:1:hex:"d3c3cf993f6740a019e61ce13c29955c":hex:"af900ac348082ff32d2e0ab886079516":hex:"2ddd0e8c99661f0757f04aa79a1ffa24ad48fbe5da68b9e71f7a0cf1b4f2ca9b757695900b7549d48847ae49950dc9b270b1569d29dcbef412216737bd83509c17ae41c34ccda318939cb37a0a380762993a7568c0b07794e78746173dd5c0d921cd50de4b548c1589e142c3dadbad42161aaeda2310f3c6d5c722d9ac69e96d":hex:"":hex:"f2d3a6ff":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,0,1024,32) #2 [#2]
depends_on:4:2
9:exp:1:hex:"5f1e5bd45ee8bb207ebbd730510ff218":hex:"8846424a194f5de858556e6be5b65d7f":hex:"e968947fc0e49136e730b97f6b16e393d5e4fdf3e4803a23af79211ef59f29167c60ead72fd489da32d2ffa43b2bca2074f9d1b4f5396ca65004b0806cb7c6dfa751fb6afbee3e443f3c9b0e3df6722e0d1320441400c5ca508afb657c2b7f1669b0de21761dccab9a40fc513768bd1f552692626ce35078a2e0e12f5d930647":hex:"":hex:"0d6c15da":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,128) #0 [#2]
depends_on:4:2
9:exp:1:hex:"3997050377cfbb802cc438d973661688":hex:"c95c84c263bdfd5f1de66e7e616cf3fb":hex:"":hex:"b02f0dd373e42c65e8e1db2dd76a432e0b2bf6e630c8aaf0d48af51b3709b175de9a19b3245ae75818274c771c06fae225c4f8b002236712336e805ab006449eb29cc5e29abd82b06c32d4c36ee99acb9a6d7d9eae6ec6ec263c002a22c4a898c74f6abd6d92112367ca7ffe82787c5b39e7012ba22825d3612af3d41e8008a8":hex:"b35b3cf6ed59ccb69dbc9b47a3f284ae":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,128) #1 [#2]
depends_on:4:2
9:exp:1:hex:"c58583f6479d9bc9f1bffddefee66e59":hex:"cee448b48d3506ff3ecc227a87987846":hex:"":hex:"564a9f700cbc1f895e4f4fa6426f73b4956896a15e6127e7560d74e3fd0b980d2ee45b7a6a3884fa613d91d13921e3f90967d7132bdafcd146dd8ff7147ed1964c2bdb3e12f4133d3dbbc3bf030ff37b1d2147c493ce885068d9ba5bebae24903aaac004aa0ab73fe789e4150e75ddc2bde2700db02e6398d53e88ac652964ac":hex:"361fc2896d7ee986ecef7cbe665bc60c":char*:"":hex:"9cce7db3fc087d8cb384f6b1a81f03b3fafa2e3281e9f0fcf08a8283929f32439bb0d302516f0ab65b79181fc223a42345bad6e46ff8bcb55add90207f74481227f71a6230a3e13739ef2d015f5003638234b01e58537b7cfab5a8edac19721f41d46948987d1bb1b1d9485a672647bb3b5cb246a1d753a0d107bff036ac7d95":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,128) #2 [#2]
depends_on:4:2
9:exp:1:hex:"0bc2bde877e881aea512068105694968":hex:"05f0c34ab2e8e8026b0a23719344b71f":hex:"":hex:"1a6369a45e8ef2846c42d54f92d0d140a94f9633432782dcbf094f1444a1d006acd07ef6076cd0faee226f9ff14adc1fb23e3c63ed818c9a743efbe16624981663e5a64f03f411dcd326e0c259bcadca3b3dd7660ed985c1b77f13a3b232a5934f8b54e46f8368c6e6eb75f933196fa973e7413e4b1442b9dee5e265b44255ed":hex:"46bab9fc2dbe87b8f6ca0ed4d73e5368":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,120) #0 [#2]
depends_on:4:2
9:exp:1:hex:"e14f45ba5d1eb52e0412240da5d7b5f9":hex:"d7f8ef12f66f8b7c60aea02ef6ff688f":hex:"":hex:"9a85fda19ce923f093a0c25b0c52f5d9534828af7c7687d22307004ae2d10c4592242c0f2704070307ab55b137780d1e2013a19396ab43ff6a295b63fdcf323456d149758f9a2bb37f1418d62ea6368b24d5067b9c63d2968e06d6586c7e3275faffa005f7c7bfef51303e4c2b2ed4564acd17d50efac9f5e3e7f16ce589c39b":hex:"beede05e4928c808bc660f3de95634":char*:"":hex:"4ad5b9ace0c0c7c07df2900faf37a902899471e7aa4a0a1ad5387f8f56d73f78f619be79a4e253f95b15d52895a05bae9ecffa916d35efacd8baf1c704d2aa4a38c234efc4dcfb191ec0fa0b522328fa5b5dff55e8c443fee660ebe3d8ad85de157a889aefc823720030a4cd6ba94a6309dd61806f0abb27772432018bc61701":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,120) #1 [#2]
depends_on:4:2
9:exp:1:hex:"9a64579f3601b0022d357b601cd876ab":hex:"515efc6d036f95db7df56b1bbec0aff2":hex:"":hex:"88be1f4bc8c81b8a9d7abc073cb2751e209ab6b912c15dc094002f95a57a660b9f08b1b34f5947223205b579e704d70a9ecb54520ce3491e52965be643f729516f5cb018beeedc68a7d66c0d40a3f392ec7729c566ce1e9f964c4c0bd61b291ccb96e3d1fac18a401a302f3775697c71edb8ff5a8275a815eba9dd3b912e3759":hex:"13ea92ba35fced366d1e47c97ca5c9":char*:"":hex:"7fc8565760c168d640f24896c69758355b17310dbc359f38b73fc7b57fe3f4b6ecad3f298be931c96a639df3c5744f7e932b32d222f5534efb8eb5d5b98d218dce3efef5c8c7ce65738bf63412d0a8ed209071218a6fa2f7be79b38d0b2f5b571ec73f1a91721bd409b1722b313683e97d53df19ded95fd471124fa5f294a4bb":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,120) #2 [#2]
depends_on:4:2
9:exp:1:hex:"1bda4acfd10ab635f357935bb0ab7020":hex:"48b77c587616ffaa449533a91230b449":hex:"":hex:"c9ac8d4ef7d83848fdc03664957c28b9b76710797d5db1c21e713e85eb0898892223e52be1644fc7362c95026ebb9c9ca74d7d3739eff10cab1eda00c36628dae0b98d119a14635800e37cd340faa6fbba9c3d41d52722cc3969612b1a8c5ca9a68773f5ee654506cb88ea65fb1eddf5ab6312d0170dc03324e483342448b854":hex:"8325e4394c91719691145e68e56439":char*:"":hex:"1287ad3719508a9be70c19e3b134a2eaa4415d736c55922e9abcfd7f621ea07ffb9b78d8a9668c74bbd548b5e6519ea12609d2d6197c8bd3da9c13c46628f218e7ff81884ff7eb34664ab00f86e09cd623bec248d8898ef054fce8f718a0e0978e8b5d037709c524114ec37809ac3fd1604e223e08f594e7aa12097f7dc1850b":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,112) #0 [#2]
depends_on:4:2
9:exp:1:hex:"d21cf24bc5bd176b4b0fd4c8477bb70d":hex:"208cb9dced20b18edddb91596e902124":hex:"":hex:"2e7108fd25c88b799263791940594ec80b26ccd53455c837b2e6cf4e27fcf9707af3f0fe311355e1b03ac3b5ee0af09fb6fb9f0311f8545d40a658119e6a87ba8ba72cc5fdb1386bc455c8fec51a7c0fec957bed4d6441180741197962d51b17c393b57553e53602f2a343a0871ea2dc4b1506663b2768ce271b89c4ed99eec6":hex:"7edfb9daf8ca2babcc02537463e9":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,112) #1 [#2]
depends_on:4:2
9:exp:1:hex:"3d02e2b02170986944487cba8448f998":hex:"6336077bb83eff1c9ea715de99b372cd":hex:"":hex:"bc1d7553f4a28754cf59ed6f7a901901f04ce62a449db2b45ad60329d0341bb9ba421c783c28a9200b41da8ab6328d826293134a7d0c9a5775dd2735e7767efda4ad183566e0847d6d978abd1a8ab13b16b8323acef05ced3b571631e1e24ad44d65e6ffa64e03c9970e94bacb9f721aba06cda6a08806a3be63dddd8029301d":hex:"0466bb2957281f64b59eafed3509":char*:"":hex:"5f395958f2f7acafb1bca6d3a6ec48b717f2ceeac1b77e1b0edc09a09e4a299d2ec722cc7daf34c8f4121a93c80b2adb20a2fc95afd09320f91085c93c8b082dd703814c9777501d23bf9b328f07f04652592dc5a3f4321626a695b8db8e65c8617c809eb2978d8c9a882ffa82a4bb707c1a8f9a965bdacce5c041bafc94a1c6":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,112) #2 [#2]
depends_on:4:2
9:exp:1:hex:"cd1ad1de0521d41645d13c97a18f4a20":hex:"413873a0b063ad039da5513896233286":hex:"":hex:"588c2617517329f3e1e7ba6206a183dc9232e6a4fa8c8b89532d46235af1e542acaa7eae4d034f139b00449076ba2ef9a692cae422998878dabdac60993dce9880d280bec1419803ba937366e5285c4a7f31a5f232f8d3ef73efe7267b3ef82a02f97d320ebc9db6219fbdf1c7f611e8e5164e9ecf25b32f9c07dfa12aa705af":hex:"d4dbe9cae116553b0cbe1984d176":char*:"":hex:"bd519b7e6921e6026784cd7b836c89bc1fa98e4013b41d2bf091ef0d602e44a70df89816c068d37f0c6377af46c8bfa73ec0d5bc0b61966f23e55a15a83cea49f37cc02213b4996f9353ee2b73a798b626e524b9c15937ecf98a4eded83fb62e6deea1de31e0a7f1d210f6d964bc3e69b269da834720fd33487874489b8932a8":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,104) #0 [#2]
depends_on:4:2
9:exp:1:hex:"1cb120e9cd718b5119b4a58af0644eff":hex:"5a7087989bfe2f6eddcb56fde4d72529":hex:"":hex:"4c8e8fb8c87ff6b994ae71bfbf0fa4529f03bad86edf9d27cf899ea93a32972640697e00546136c1dbc7e63662200951b6479c58ae26b1bd8c3b4f507c0d945d615183196868ec4f4865d1d00bb919a00184e9663f6cb9a7a0ddfc73ee2901f7a56ef2074d554f48cef254be558fca35651be405f91c39e0367762b4715d05fa":hex:"95d8bd12af8a5ab677309df0fb":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,104) #1 [#2]
depends_on:4:2
9:exp:1:hex:"315b206778c28ed0bfdd6e66088a5c39":hex:"7ec6f47ec56dda5b52bbdaa6ad2eb6da":hex:"":hex:"6186f57a85b65f54efbf9974a193012b1396fc0ca887227e1865f1c915ac2af9bbd55969f7de57ce9fb87604cf11c7bc822b542f745be8a101877a810ed72bf4544d0acb91f0f9d3c30b6a18c48b82557433d0db930e03bcecc6fb53530bfd99ee89f9e154aa1a3e2a2c2a7a9e08c9aed1deab7fae8ea5a31158b50bca2f5e79":hex:"930750c53effc7b84aa10b2276":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,104) #2 [#2]
depends_on:4:2
9:exp:1:hex:"e886de1c907c97e7db8ec80a79df90f8":hex:"612cacbf33266353d0a29a24532f3c0c":hex:"":hex:"c64cc9596d7c738746ab800f688eec190a4c802c55b2528931d74d294496892b81f53d3073d48f9bef1d58ce3be26547474cdda2868abeab71aff566fff613b4e5bfed1be1d2fff35d8ffa33302d3da1c82e421aa3a23848f31e26d90c0cb2ac2ae136ada73404ed3e0e1d3e7cb355a11cd2a4f9393b4d5eac988104fe1cf959":hex:"76634e58d8f3a48f15875ac1d6":char*:"":hex:"7001d7395efb432e2804cc65c0ba5d4719ce84177ce46292c4fd62a5596bd2bab1d5c44217ac43235bd94489c43d01618a11f047d2e247062c3b88d6e59adaa1f46514fb33b7843483920bee60a41f3cb312322c305d25251b4704fb66da58637c95a9d539731434f60ef44fe3cd6d37e2c8e7089880a563938dcc98b43f08fd":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,96) #0 [#2]
depends_on:4:2
9:exp:1:hex:"3b936e09a6477f3bd52030a29df5001d":hex:"f93105be83fa5e315d73acfdcf578de7":hex:"":hex:"65cf11d1afad19b34f282f98f140315992392f5d4eed4265085b29e1e5553f4783fec681ba2d368486ba6a54c00e71c82c08ca3d097904f021ce4b0acba2d2a7005e28e5f8750ea3d18a4f78363c37583e85104234498942c639a0564b0d80055c21cb7735dd44348298291ab602f345b1d74d624750c0177fbd5cca6f99223b":hex:"91b55bb5e3f3f1abcf335db5":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,96) #1 [#2]
depends_on:4:2
9:exp:1:hex:"dc9e2095de7b1b48481b56bf6a3604cd":hex:"9e5268db19a1b51c0496a160ca76f8f7":hex:"":hex:"ed61ff94a3f84c72147faefa615e2df00324fb01790cf9764c72c1b8ba47f17866a1fd64ee5c2f53865d1bc24ec93165a6774466a59603199ee476c1f2da7d932c8943d126aa172d532d8475a484d42bb45fcf92766feafd7f3e2e3d42d22f6f84a90e7e688232f799d80cd2cc152ddd21ecfb137701ecafcb2b65abe2e4e6f4":hex:"0fa9588536fca71bb44260f7":char*:"":hex:"ef562e301fcf923ff1a1acd3aff9b1c963058228655fe8a66cab01396547dbd2aa1f79a22eefc62944b86d1a31ebe2d17130175b8c003d6755b0eb8b79895b0f7f8046c5ae888a067ba17bc8e11a8f6e5023a9cd42f6461966c28e505b371c0f72a2606bff430a58016e99713d25ce11f10391fb4a922e27989422c6a64f9107":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,96) #2 [#2]
depends_on:4:2
9:exp:1:hex:"3f93901fd7cc88db3ba76a158d658c7b":hex:"7e98de461e6d96c0ce6c8d8b3854cf49":hex:"":hex:"16402fded879fcbfe9405902aa63ca2a520889e0045f687455469b7bb867829a01208b8dc5dcc852d8ee478993c30e6d9ec6408773b367821310a0ae171d38d71e06981ff6e845acffbc794142b87c748e12484c0636419d79be3d798cde59e9dae0a4a4a4346596427e6b235ad52e6a1b02d6f4df0c7de35fc390cae36aef14":hex:"86c9a70e4bab304ae46e6542":char*:"":hex:"1b4c09569b42c469b3ab6b39312c214502ec09f5fe2fed1d1933d13cdc6a7b77a5d135123fa69d9207d6844b0357b26b7a2f53b33a5cd218dacda87b78b09cf259e48e74076812c432e2d0833fb269721f9347c96e158500f9b2283342a35c8de0a022edce711118d72d8fbaa354bfb0ffee465844ef2d37e24ec2cea8556648":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,64) #0 [#2]
depends_on:4:2
9:exp:1:hex:"42289f3d3cd5838e250ef54b128e60d1":hex:"e557389a216ad724aafdab0180e1892e":hex:"":hex:"3edae1d554b67d2036f5fdbdb2945cc112f100adc1b47009c2e23f6a2eaee78d1f39ce8a98f715853cc29fc793fb6981ec3036834188dea7d668185ccc8642071b15de1332f6a59c8a9b4399733eb4b3d8f224af57ba6b4a8e64494bb6630b9d28e7ec3349064350febcef6a3ad1d6cca1b1da74f3d2921c2b28a2dd399c3416":hex:"6f78bc809f31393e":char*:"":hex:"25c476659cc7b343a69088baf868a811ba37daca85c4093105bf98235a90aeca015ab034da008af0982f9b2e80df804c186a9b2e97f74cffd70ebb7771d874fcaf12f6d01c44a8b0ec2898cf4493cf09a16a88a65cd77909bbf0430c9603869bd5f20d56cb51d8a3f0a032fc30d925c96599d296b1ec41c2912bda426adea4fb":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,64) #1 [#2]
depends_on:4:2
9:exp:1:hex:"3d772eabb7f19475665ca2a7e693bcfc":hex:"0747cbb486a013453fde1ca6abb11dbe":hex:"":hex:"e9fc4d86f5b857fa6057b73f967351e06f87288c40a95b9e378c84f1a4c0f4b80ed0a0b44ff90a8973be4199c0c4006fc4f5ea19d5f1fe8b9c8c01f4675ab85afab0592bb3daba36bb4fc7ed9eea867e9d8cc50c19fb62a5a57956e9efacebac5e9f849649d35a329bd68de97bb6e5ff7bef477a86765c2c9ec15e24cbba5c6e":hex:"8e761ffaea68f967":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,64) #2 [#2]
depends_on:4:2
9:exp:1:hex:"fb7fd753ee6eaaf283a42a121dab4e43":hex:"8164929fb54485377ecccc9b9621af5e":hex:"":hex:"fd5cecb2c0287cb8229e97d9cc4b9885f428710528884ce663ed1728cd44cb2df93e56ef17ace0678d1e341366c652f4ba7ee45797d39be4a05c1151e5cde499e13e5d45549b5d95a174d03616d06ef96e9d7b2b6bb0d79a726b253dd64223a5f09611671b234ccf9b383952f8888814b2c167e774cfbf54e9c6b99a753f4fa9":hex:"40a2fa7f4370afb2":char*:"":hex:"6208d068be60f7b04b80fc611062e6caaef9a5cf59f850d174b7446c78c039ea9aefe4885e19c2b33911d32ce1fe3c48ddffa4b03e450fd35da03f40c4e7c5bb3b1c3f3049dbfad3ac81ca1b79cafbaa172f4900e3829d38edea3b64000f93924a801259bc4b2523445c64bc23bfee190b952468507fa4baf6dc2bec66fcf0d8":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,32) #0 [#2]
depends_on:4:2
9:exp:1:hex:"30d757fd73a0fd5fa49159ad0653296d":hex:"b35b8df0aebd0608517f2830e0e70cd0":hex:"":hex:"17d485b258f80d8924e35291118cfdcffd86c47851b65f0b06a7c1f5202de82f3f460fc61b1aa38fdba7c8ded375c92cf005afe63e59d362c0960044af39241b81ca24e85c5faa43903229355b7313fee21b992ef3931d9d2407b32b3cf72dd7acbc7948395eb513cb2fd428b215ba2bd1e29c62f45d0ce231884f62480c6d8f":hex:"954c0e99":char*:"":hex:"022618d2598f79104e918a09c937a82b3db59243b5e13de731fcb912e4366105797ce47f6dce7f08073f2f41e5c15fd6b1ec4b5861469a4880c3b0bd769b78c696ff29c28c9349d5a46a6e5ad9211bd4b708a8c0b6928ebbb0dac1c0a5f5ce6b05de6a50073128566a23f09cc1b826aa5803f9f750aa4debf59f24ae9f98c9b5":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,32) #1 [#2]
depends_on:4:2
9:exp:1:hex:"d9d3cfd5900de5d5e2109e7721cfeef6":hex:"b4b9dfb013de6f7c44779e5a9daaf5e5":hex:"":hex:"e4243cc37cc32dfcedf9bb76890e706af6ab1e06b290b8ccfe2a55e5dabe68cb390f7636dc9676b431d4dc8ad3f6d989e510194294ab7ab0556789046743cf374d8b6462f5f95a17f3f44337d6c69ee47b0e1ad7e5ce6f9b224c54099a104e70d2d06af869b921ea47febe08f90c591ed49c1f12003afceabd2c7bba458a0111":hex:"2b81e8ce":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,0,32) #2 [#2]
depends_on:4:2
9:exp:1:hex:"68dc138f19354d73eaa1cf0e79231d74":hex:"e7147749560f491420a2d893c075bb76":hex:"":hex:"ce345567a76bc30d8b4fd2239788221cfa75e1a310aeeeb8c355f8eea57d80967f3047fbd4e6173fac5caeb22151fa607065953c4c35e0537b9e3788cc80de9eedf2a340698bde99a6a1bdc81265319da3e52f7a53883b7f21749237fcfd3cd4f149bb2be7a4ddd9ef0544cfe0789040d1dc951b6447304942f03ab0beae8866":hex:"70a83f6f":char*:"":hex:"64b021612c78b3e192e8349d48b77d02927e7fd70c7160d37cb8ef472f6bcd9df9d93431627c1c80875e208724ae05f94fdd2e005e9707b78a1bf3bbca7beec4b03ddd4d9de6235ffd6d84a8b9a1842e104c1e22df4566f6c4d3d4e3d96a56b9b8a5cdce9da70aa236109b289266036f285564060b204dfd7ac915eea0dd0b1e":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,128) #0 [#2]
depends_on:4:2
9:exp:1:hex:"7362c86344e0aefb0cf0d04768f9c05d":hex:"7e8d12c2f0dcf4f792247134234ac94b":hex:"86d2b5debc3b10495da353d6821f6cad380776d805bd8660b08dcdb1acd87026e4f344b547a4db47b5f44cded314bec4ce9a417ce40a2acd5a21460c42dfcd27483abf3f38dd8cc5fa523b6768a26513df5896435baa97781cff1966e2e3d6ec6d0a9cdc013de5a50e4d46831667055bad04f784024a82f9cd087ae4cd37dd64":hex:"8baffc7836004deb87c0111d47c182512bf861874021ddfcd559acf2c4a51cf5bc4bfdee2d039b9c005b6af95a2607643dcf4d9cd9d62412f709334556db22fc91d7b40438505d6806ccb2f2c21ae731bc1f1c825d28a71ab27095a39985e96ccd07cfb2e75243ccafd474494a2338c324ef533ca5f17d2ac1b1883140342ced":hex:"9594da428fd8c1b13ecb23afa2c1af2e":char*:"":hex:"e2c424f42aedd56f0e17a39d43ad19c8e2731efc7a25f077aef51d55280b10e667e338bd981b82a975ef62bf53bc52496b6995d33c90c7ae14767c126826e3f32bd23f444ddcfd7a0dd323b0ae2c22defad04ce63892b45c176bd0b86f5fa057a3dc371359744cb80bbfb4a195755136a0ea90b4044a45bc1b069f3cb3695c04":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,128) #1 [#2]
depends_on:4:2
9:exp:1:hex:"58748bb204ccb7bdafdbf739b6c19a3e":hex:"93ac298c73c88e127a4d9dd81bf24e3d":hex:"8f168fc4d1da13bdbefae3f9d6ac1d8cb19fcec1f43f727951af0a466d8826649a46c3cb50c045ea83849fce0eedbc042a1a435e6d9d59017997a2d5459b940078b8a7f3b6b0ff279ff8c560248296a17240ff1b0643d1f436b6e3f2079363fc49fb45f410debbdde083b92057916368cb807d603cb82e2c0dc01658bff7f1ab":hex:"b72902c9ebb72a86be539b19a52fd9af00aa4de081d90c0d8ad580ebb5900177a036f40a1e9b43e3a07d715466526d6d7544e5a5551805b62463f956cd519fc99182c2d54bd62fc7ffc6e5ebf1503859b706da11a1b6c707a67a70789dbfc10ef726bd360f9f2347326e068e757c8443ddc9308a171e682359ae1bfe87194ab5":hex:"efba4589d4a03555766bbc3b421dd60f":char*:"":hex:"d5c97a659f016904ff76286f810e8e92da6f8db2c63d8a42e617760780637e32105503440cdf04d1fe67813312f1479fda8d746c8b0b080591eba83850382f600e9d8680516c6579669f0b3d0a30323510f9de1c92512790b8347751994d022156cae64da0808a649d163a0e99e869fdf224b7c1a6a8fbc613d5917eca8ee08c":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,128) #2 [#2]
depends_on:4:2
9:exp:1:hex:"6cc13cbd62428bb8658dd3954fe9181f":hex:"86740da7ce4efbed70af55e1d6c10fdf":hex:"be561ac15e3cfda624b422af97c26719c140bb50e4a993d636efe9c7f1963fb9047a0762169b571a698ff310bc417e34d4039b7562a95af710ccc1b197964a376c986fd2ed8ac4b0c7b4e843c37a41366f2f483c821a1823f317416c7e4f32eed9b9dc2ae1a2f3ed32c4b3187358a2329aa42191b7c2fe87b6e27ff20303cb29":hex:"2c9ec982d1cfb644ddbc53c0759b10493206d5186affc6882fbb2ba3aa430f9bae1209db2d78dcc125f3c909a54dd84fdff96c71e678216a58390ef4308bdd90f94f7109c4edefa76a74fda64b201b7a435bbabc27298f3eaa4c2d1393bd584f811fff52638f6ad2f6d86a8c3c9c030d9d4264c8c079592a36178d25991cff09":hex:"76b990a1e010e5f088f6ae90bec40b32":char*:"":hex:"0b9a5f5d2e6852b75b9cf26c1b310b2200e56dafcf3c941478862cdf9737ac8e2cb9b38d41bd4a1872ea1b4cfd51a1a0b9b743aca439eefa10de8459a0a7a221c5429b3dee393f17031ca6c399df8e05657c3db55be9c9dd29e690042a4ed8db732efce7c58d6b20a2a0f7c79e42e5ada43b87ab00f481c20cac1b35514dcdc9":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,120) #0 [#2]
depends_on:4:2
9:exp:1:hex:"286d3f5080cfe88538571188fbeb2dd5":hex:"da6140bd4dc6456ddab19069e86efb35":hex:"5d350a04562a605e9082ebd8faec6c27e561425849e7f0f05f5049859c2c1bd2c4682ebf9773fab6177d2601fd5a086cefc3adef5a2f8f6b5dc9e649e98dd0a3d1a2524419f01305bd0fcfff52d84a20d1b14dea2138dcc54eea2bf263c6fe27c3e7255f1f359d0d00fb1b350d7a04965af30027632520197e85eb41de6bb286":hex:"55135928997711360622eda1820c815aa22115204b1e9bb567e231ac6ea2594b4d652627b6816bdc6c40a4411fd6b12fab9a1f169d81c476dbf77151bff13f98ca0d1dc0a68ea681652be089fadbc66c604284eebfc8ce4cf10f4ca6bda0e0f6634023db6e3f0f1de626c3249a28a642ecc9ec5ff401e941fa8a3c691566c0ae":hex:"d90d34094d740214dd3de685010ce3":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,120) #1 [#2]
depends_on:4:2
9:exp:1:hex:"726ae113a096769b657f973ea6d2d5dd":hex:"2f9900226c97585d200dd20a279c154a":hex:"761663c3fcbf1db12bc25546b2425b8229b3153e75f79fa63958819caee3febff74603d99264b5a82ef5980439bef89301ae3206a1d01a3bbd7a6c99d27d1e934cc725daeb483f826c2c9d788fd1f67a627864cf8b5f94df777bb59ef90cb6781a2000e6f0baa4f1ea4754b47bb7cbd2699f83634e4d8ab16b325b2c49f13499":hex:"90636012ba8c51d16f8f6df3d3bcabc3f09aeffbe2a762f62e677913188045b861b2e7d9a7bd93dcee46e9e4832e497a6f79db52b4e45c8dab20fa568ff9c4ace55be3216f514a3284768a25d86b1c7da5377622f3e90ed4c7bd4571715af4d0a2ab5181d0475f699202e4406bb9cfdbd4fa7f22d0dd744d36b3223134658496":hex:"d095bfb8990d4fd64752ee24f3de1e":char*:"":hex:"9f7759c6d24fd9aa0df02a7c0cc5f17e61622c63195f85dfafa5d820d3ad218c7288ec017821100f1fade10f9bb447a4a01e3698b045548c7619a08f2304e2818a9bf55e70b40f8b994b7dcf0cb243848cf3f6fdfec3ebbb147d01df84a3ec62cd8fa5d78ad9f2f28cd288a35eb49a5172339e9872e8e7e3350b0d69f59acd07":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,120) #2 [#2]
depends_on:4:2
9:exp:1:hex:"73a9eeda721c6f292e6b399e2647f8a6":hex:"c1e80eb723960049cc4448b66433f1cf":hex:"fb2a0b1f817404e74aee0a6ec8f2cd86f0c9114ed367b2690c44ad80f9d3377d7fd5066beaf1daa739d27ed3fba98379188016b1fe901204a174f9ffca370c181aece5e5d40939a0d460913b40b895e78a3b80ddf3d613c05e4e27bfd161ea2ef42271a2679f2cdca5b728ffb2319781c946a4f3ecacf486b754b30bb04ea60b":hex:"215fc7e52abe4c751ca2f7f9a5cbde9ab8b44b8d4054bb62dcea6df5b936145ca6ec83a2b78b070638fd6e5ea3bad5d0caf1b8f755f391c3e0962a92337e3eba575585eb83680075fc818860388c587746af78d5fc75ccd0a63f1612abb1ba0f04a2228ca27fbddba4878f9b2683683f516b6d6fe4f6622e603bd3c5ad45e332":hex:"e08161262234d0d5be22f09e5646bf":char*:"":hex:"b5e286183f16dd9403bec6786bd4836cc6add47947ef111fb1d5503c18c333c8fe60959502f58390d0e0f69fbe5fee13c72aed65fe6e32f6ea45877fe44f8a556aa5157b112e572197c1c350b7943c6cf2e9146018599524d27599f09c86027f2c5927e4a20c63833870e8369baa36ecc07cdb3ced520b5ae46869ff357ca089":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,112) #0 [#2]
depends_on:4:2
9:exp:1:hex:"90dbda7397d8fc46215a1218a6ffd0d8":hex:"7be477d14df5dc15877ae537b62e1a56":hex:"7358ddf1310a58871a2f76705f1cf64223c015c4d1574104d2e38783bb866205042f05c86e76c47a2516ce284911f1d2cbee079982dd77167e328b8324eec47c9244cc5668cf908c679bb586d4dd32c6c99ed99a6b571cf18b00689463e7a88cea6ea32d288301a10a9139ed6092ffe298e25b8cfb6b4be8217f16076dcd0a90":hex:"4f82a1eca6c9184240f50f7e0cfec07ec772cad5276d93043c462d8364addd9a652eed385ccc6b0faa6ca679ab3a4c3d0be6a759425fd38316ee6a1b1b0c52c1bb3b57a9bd7c8a3be95c82f37800c2e3b42dde031851937398811f8f8dc2a15bfd2d6be99a572d56f536e62bc5b041d3944da666081cd755ec347f464214bf33":hex:"776d871944159c51b2f5ec1980a6":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,112) #1 [#2]
depends_on:4:2
9:exp:1:hex:"0c85174d428fc1c7c89ca5d1b8aaba25":hex:"b3c9dfa4c55388a128fbf62aa5927361":hex:"3f552d45b61cf05ae2aa92668e89f3338a15ec7c5b7113b6571cfcd9e4c4a962043ccd9323f828dd645e8a91b007ce2112b7f978ad22ee9821698a4f2559d987ae4421452ad2e8d180953297156426d4540aff2104d8637b56b034a3a1823cf962bffbc465fe6148097975a8821ca7487e6e6c7ff4ee4de899fe67345676bb1c":hex:"3735cbfb8000260021d1938d2a18e7737f378ecddb11a46ce387bf04e20bbfcc902457637fd152ab87017185601f32a7f906057123b6c2da31a1069c93e3cacc59a359aebd3e31b302e1a1f7d5d8f1b2917a8fe79181fa633b925ce03a1198dac48f4c959076b55bc6b3d50188af2c6aa33d83698aa8db22649f39825ba54775":hex:"1e7dec83830183d56f443a16471d":char*:"":hex:"3d98cabca4afb7c1f6b8eeed521f4666ae252ac12d17ebf4a710b9a22d839b69458387ba4bbec2f6400e0cff80fbe4682c24efcd3b8c594d9b515ca7842c9d5988c42b59b6526c29a99256451e2927f5b956ef262f97c733dfa8bff73644473b9a8562bdfca748f4733ddce94a60024dfbfcde62fb3cbd7c3d955012d5338b91":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,112) #2 [#2]
depends_on:4:2
9:exp:1:hex:"d89f06eb07744d43d44734faf9751d07":hex:"185f8d033713ee629e93561cf8d5acb8":hex:"743bcb671d0aa1c547b5448d64d7c6b290777625ba28f25ca0fbf1fc66495a2fde0648a8db51039b0e7340d993aef8afb48269e660cb599837d1e46f72727762d887ee84c073d6136d1b0bc7d4c78f5673a4a6b73375937e8d54a47304845f38ca6b4f51cf14136a0826016535dc5ed003e38c3ac362b9d58ba8b555a05a1412":hex:"36cc3b2f563305208a03378f7dc036119f7de3fee77cefac06515853d36609a622382ed026c59783fbc0d9910767874c516e10c7bf3e3d104f73b3463c8d93a63418c76cb0d05e62e9c8642cb4f32caced2620912cb6c79e5110a27d5fba1ef3b4d0578077858526c5e4254365f2b2ab47a45df4af08980b3b7a9b66dff5b38c":hex:"fcad48076eb03ebe85c6d64f6357":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,104) #0 [#2]
depends_on:4:2
9:exp:1:hex:"6150f14dc53f391e815acfabed9f9e20":hex:"7e92dd558bd2662c3a539dfe21a352cf":hex:"9b4624e9118e6aa5dc65b69856638f77fd3f9f562046f50ba92a64e988258637932af7979f000505b84a71ff5dd7b60bad62586b1a8837a61c15a1a1ba7f06668272c28169915d7f06297b6c2a96c8c44203a422bfd25500c82e11274ffe07706365bfd3da34af4c4dd8ad7b620de7284a5af729bea9c4ed2631bdcba2ebdb7d":hex:"fd8f337017e1b60d6618e6e4ad37c1f230cdeb78891579c2c63d4e6a4f7d2cb7252e99de333c73db45958808c08e91359c885a7385ab6f9ed98a27927a5b83c3a456ce2e01869712675e527155ba1e339ac14a3ccd7a4b87360902f2b8381308fe5a4eac5c90d0b84da4bf5b907de6ff3139cffd23b49a78750006100183032a":hex:"922a7b48ad5bf61e6d70751cfe":char*:"":hex:"f272a3ee9b981f97785cc6fad350e516d72d402dae0d8a531c064ec64598b2a5760f9b279c10aa1ff71bec07300ab0373187138e7a103fc4130105afa6b6346f3d368b40d6f542375de97878ad4d976d64c5c4968a17be2b1757a17c03100231c34721250cd37cc596678764083ade89ae3b1a2151ff9151edcd7ba0eb8a4649":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,104) #1 [#2]
depends_on:4:2
9:exp:1:hex:"3e8216072ed6fcde0fe0f636b27ed718":hex:"23a122cf363c3117b8c663388c760ee4":hex:"28ce0b4a44fa83323e060f3ff6436b8829d4f842090296bdc952b6d4a6b1b1a66be06168c63c4643e6ac186f7ffd8d144f603b2d4bc0d65be48121676f9fa1f359029c512bebfd75075ff357bc55f20fc76d9f2477c9930f16408f9f09c5ae86efa2529d2f1449ceeb635b83ca13662860ef9ac04a3d8ab4605eccd2d9ae5a71":hex:"3b50f2a8dca9f70178503d861d9e37f5edfafc80ee023bfed390a477372986e4794175ec22ac038c3461aba50c9b2379cab48512946efdfe2cb9c12a858b373a5309324f410e6a05e88ba892759dbee6e486dc9665f66cb5950ea7e71317fa94abbebd67a3948746a998173fbbb4f14f9effbdf66d3b6e346053496a4b1934ce":hex:"531a65cc5dfeca671cc64078d1":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,104) #2 [#2]
depends_on:4:2
9:exp:1:hex:"1af434b73a1210b08595ffa686079832":hex:"ae318f3cb881d1680f6afbf6713a9a2f":hex:"3763c9241be0d9d9a9e46e64b12e107d16cca267ff87844c2325af910cc9a485c7015d95bbe62398864d079fb2b577ba0cfad923c24fa30691ad7d767d651eed4a33d0be8f06fed43f58b2e0bb04959f10b9e8e73bd80d3a6a8c8ce637bfbdb9d02c2b0a3dd8317c4997822031a35d34b3b61819b425c10c64e839b29874ddfb":hex:"13f6c1c2d4edcf1438a7b4e85bcd1c84a989831a64d205e7854fce8817ddfceab67d10506ccf6ed9ce50080ef809e28e46cba7b0c96be6a811f59cd09cb3b7b3fe5073ee6763f40aee61e3e65356093f97deef5a8721d995e71db27a51f60a50e34ac3348852c445188cfc64337455f317f87535d465c6f96006f4079396eba3":hex:"2ae7350dd3d1909a73f8d64255":char*:"":hex:"3cd2a770300ce4c85740666640936a0fe48888788702fc37e7a8296adb40b862ec799f257a16821adaa7315bd31e8dec60e4a8faeb8ba2ee606340f0219a6440e9c1d3168425e58fac02e8a88865f30649913d988353ab81f42a5ad43f960055f0877acda20f493208c2c40754fbf4ccee040975aa358ea3fe62cbd028c1611a":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,96) #0 [#2]
depends_on:4:2
9:exp:1:hex:"04036d2f5273c6ff5b8364aa595359c9":hex:"edc433c381140dff929d9df9f62f4cb6":hex:"404acfeeea342aeea8c8b7449af9e20ddf5b85dc7770d2144a4dd05959613d04d0cfece5a21cbb1a9175ddc9443ffacd2085332eb4c337a12a7bb294c95960e7c0bde4b8ab30a91e50267bbd0b8d2a4ed381409ea2e4c84f9a2070a793ce3c90ea8a4b140651b452674f85d5b76d0055df115608bf3a3c60996108023ebabe65":hex:"acf79b6099490af938fb5fd8913255b3daa22786b03356cdf3e0ffaf570f9f866047b8e15c9953f893d97e7098265297396868ebc383be8547e8ec9d974b6a65b5dc5147cdadef2e2ad96696e84e44f364c2ba18c8aabe21f99489957b2b5484bf3fb4fecaf5ddaa1d373e910059c978918a3d01b955de2adb475914bf2c2067":hex:"71f818f1a2b789fabbda8ec1":char*:"":hex:"4729cb642304de928b9dca32bb3d7b7836dd3973bbccf3f013c8ff4b59eca56f5d34d1b8f030a7b581b2f8fdc1e22b76a4cbc10095559876736d318d6c96c5c64cbd9fbd1d8eb4df38a2d56640d67d490d03acc1cd32d3f377eb1907bbd600f21d740b578080ba9c6ddc7dc6c50cdcee41fec51499cb944713c0961fc64f5a70":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,96) #1 [#2]
depends_on:4:2
9:exp:1:hex:"59fe44c6e28d025b2ad05e6e867051ab":hex:"eb0c30320029433f66d29b3fd5c6563b":hex:"49b7418b87374b462d25309b1c06e3132a3c8f4a4fcf29fed58e0902509426be712639db21c076df7b83dcfcc2c2c8fcc88576f4622a4366eb42f84ebf760e3eb22b14f8b5ff83f06a6f04a924eaab05b912e126e80da22461abf7f1925fd72ebdf2aea335a044726e7c2ebbb2b8aeebab4f7de5e186b50f275b700794d895d8":hex:"20e66bae1215de9a87a0b878d39015d17e0d4542a1aaba2000cefbd5f892c26a410f55f0d7dc2f6b66690f2997032985e5516e068bfc6ec8a3669f566e280b0cefded519023b735ee3bcbfc5b6ce8203b727933a750f9bd515ec448c1f3a030aa0f40e607727a3239ebbe655d46b38a3d867e481ccf0fadbf0d59b665d2ed6b5":hex:"296c4cdaeb94beb2847dc53d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,96) #2 [#2]
depends_on:4:2
9:exp:1:hex:"c314264cee0e6db30ebe9b2f6d4991b2":hex:"4cd4431bb6dea8eb18ae74e4c35a6698":hex:"0eeafbfd04f9a0ea18e5bdc688c7df27183f346187e9574b61222006f2b3e12e8d9d9bf1f0f15949ee1a7ee8e5c80ee903b8ba2860e15ccb999929f280200b159c2adca481748d0632a7b40601c45055f8cb5126148e6cbab2c76f543537ab54eb276188343cea3c4ab0d7b65b8754e55cfe3f6a5c41b6ea3c08b81fcecc968a":hex:"d436ff9abfb044a332c4e009b591719a67b12a5366da0a66edf19605c34daa37588e15dd3da0d1a097215e469439de79cca74e04cd4904e5b4a6cb4e0ea54e6ba4e624ed6bd48be32d1ef68ffea1639a14e91a5914c2346ea526df95cbd4ad1b8ee842da210b35b6315c3075ecc267d51643c4b39202d0ad793cbb0045ebdc19":hex:"fda18d2f795d900f057fe872":char*:"":hex:"cb9e0fb0ac13ca730b79e34745584b362d0716c344e4de90d8352b21117471ba12c97f193150b33774baee5e4a0f11b10428eaf0106c958e16aa46c5f6f3d99eed93d1b9ba3957bed05a8b9cc8c5511cf813a66dc7d773cb735b0523d8d6b0b80639b031ddc375f714c6dd50055320cd7ed44a471c8d5645c938a9005d0b5050":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,64) #0 [#2]
depends_on:4:2
9:exp:1:hex:"26072018bd0bda524b5beb66a622c63e":hex:"c783d6d3b8392160e3b68038b43cf1f4":hex:"8ae7c809a9dc40a6732a7384e3c64abb359c1b09dcb752e5a6b584873e3890230c6fc572b9ad24d849766f849c73f060fc48f664c1af9e6707e223691b77e170966ed164e0cc25ede3fbc3541c480f75b71e7be88fe730d8b361ea2733c6f37e6a59621de6004e020894b51dfb525973d641efe8d5fd9077a0bbc9dc7933a5de":hex:"91c524b359dae3bc49117eebfa610672af1e7754054607317d4c417e7b1a68453f72d355468f825aeb7fde044b20049aed196ec6646cce1eeeccf06cb394286272b573220cdb846613ebc4683442dccc7a19ec86ef1ec971c115726584ae1f4008f94e47d1290d8b6b7a932cfe07165fd2b94e8f96d15f73bf72939c73f4bd11":hex:"edffe55c60235556":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,64) #1 [#2]
depends_on:4:2
9:exp:1:hex:"201751d3da98bd39ff4e5990a56cfea7":hex:"6172468634bf4e5dda96f67d433062d7":hex:"ae2d770f40706e1eaa36e087b0093ec11ed58afbde4695794745e7523be0a1e4e54daade393f68ba770956d1cfb267b083431851d713249ffe4b61227f1784769ce8c9127f54271526d54181513aca69dc013b2dfb4a5277f4798b1ff674bca79b3dec4a7a27fcf2905ae0ce03f727c315662cd906e57aa557d1023cce2acd84":hex:"2965af0bde3565a00e61cebbfe0b51b5b5ee98dbbfff7b1b5bf61da5ba537e6f4cf5fa07d2b20e518232c4961e6bc3ae247b797429da5d7eee2fc675b07066ac2e670261c6e9a91d920c7076101d86d5ef422b58e74bdc1e0b1d58298d3ee0f510ee3a3f63a3bbc24a55be556e465c20525dd100e33815c2a128ac89574884c1":hex:"66c247e5ad4e1d6a":char*:"":hex:"efd064d4b4ef4c37b48ddf2fa6f5facc5e9cc4c3255b23a1e3765fabb5a339fa0eda754a5381b72989fc1323ff9a6bbaecd904eb4835e5a511b922927574673061ed8de23299ea1456054e7ebb62869878c34fb95e48c8385b5ebceecb962654cf1586b3f54e7887ce31850363e9a22be9e6fbc22e694db81aa055490495dbf2":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,64) #2 [#2]
depends_on:4:2
9:exp:1:hex:"3bc0dcb5261a641a08e6cb00d23e4deb":hex:"16fa19f69fceed9e97173207158755a5":hex:"92ddd3b98f08fc8538f6106f6434a1efa0a7441cc7f6fd0841103c2e4dd181ea0c9a4811b3cb1bad1986a44d8addabc02dd6980daf7d60405b38dadc836bb1d0620ceab84e0134aca7c30f9f9490436b27acfd7052f9d7f0379b8e7116571017add46b9976f4b41431d47bae6f5f34dc42410793bc26c84bfe84fb53ae138c85":hex:"d533ad89a1a578db330c01b4e04d08238b020e36aebe87cf2b0bf0b01f1ce4197be8b0596e475a95946918152e8b334ba89f60486c31f0bd8773ca4ff1319fe92197088b131e728d64405441c4fb5466641f0b8682e6cb371f8a8936140b16677f6def8b3dd9cbf47a73f553f1dca4320ad76f387e92f910f9434543f0df0626":hex:"f5289e1204ace3b2":char*:"":hex:"be0c30deeffbe51706247928132002b24d29272eee6b9d618483868e67280236632fa1ae06f3ef793f67bd01b1b01f70a827367c1cd28f778910457c7cbd977dfefff1f84a522247e19b2fd01fa22ce67cef9503d45c80a5084741f04108f2462b7cdd06a8f1f044fea2b05e920bcc061fbc6910175d732f45102a63c76ae48c":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,32) #0 [#2]
depends_on:4:2
9:exp:1:hex:"239c15492d6deec979e79236baca4635":hex:"916b8b5417578fa83d2e9e9b8e2e7f6b":hex:"b39eb732bc296c555cc9f00cf4caaf37d012329f344a6b74a873baf0d8dde9631f5e57b45b957d6aec0f7978e573dd78b43d459b77756037cd64d10d49966eb3a2a08d0f4d5e4f5dcb8713f4e4756acdf9925c5fc6120c477f6dffc59b0b47a3d5efd32b8c9052b321bb9b5129e5c6a095d8de563601b34608456f58d7221f2d":hex:"d64886ce5f5b4adb7fe8f95904bc1461749c931655b02819ffdd0ae31bad4175125aa68962f8e36ec834a7d53a191a74c937e81ec93ad9ce0d3b286d3c11ff1733c0b7780130768c120b1833933561cf07399ca49b912370ae34f0e49b9c8cb9920eddc6816ab2ae261c6d7f70058a9b83a494026f249e58c4c613eefafe6974":hex:"fc08cbbe":char*:"":hex:"95c169721ea007c3f292e4ec7562a426d9baa7d374fd82e1e48d1eaca93d891d5ffa9acf5e3bd82e713ac627141e26a8b654920baffab948401cc3c390d6eea9d7b78c4fcb080b0aa9222e4d51bf201ccfd9328995831435e065d92ad37ee41c7c4366cc1efe15c07fc0470608866aeea96997772ecf926934c5d02efe05f250":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,32) #1 [#2]
depends_on:4:2
9:exp:1:hex:"db68a96e216b0dd9945f14b878487e03":hex:"8a1a72e7bb740ec37ea4619c3007f8ae":hex:"1b4f37190a59a4fff41d348798d1829031204fd7ac2a1be7b5ea385567e95e2ace25bf9e324488dd3ab8ce7f29d4c9a4f4b1a8a97f774871ee825e2c17700128d3c55908d3b684a1f550fdb8b38149ff759c21debdd54e49d64d3e8aac803dfd81600464ed484749bb993f89d4224b3d7d55c756b454466ff9fd609019ed5e83":hex:"5634196a32d4cbfa7a2f874a1e0f86287d2942090e0cc6a82bd5caf40136a27ddf524a17713ce4af04ca6cb640a7205cce4ac9cb2d0ab380d533e1e968089ea5740c0fcbfa51f2424008e0b89dc7b3396b224cfaed53b3ac0604879983d3e6e6d36053de4866f52976890f72b8f4b9505e4ebdd04c0497048c3ce19336133ea4":hex:"9251d3e3":char*:"":hex:"0c6bb3ee5de5cbb4b39d85d509bcacb3dda63fa50897936531339882962e8dc54c285c8944768d12096d4a3c2b42ffa92603cee2da9b435ec52908fca6d38ed74f898fe0ffa761f96038ff7dfeccc65bb841c3457b8de1e97d9bee82e2911602ee2dc555b33a227424dea86d610d37c447776295b412b412903ad2cede5170b6":int:1
AES-GCM NIST Validation PSA (AES-128,128,1024,1024,32) #2 [#2]
depends_on:4:2
9:exp:1:hex:"659b9e729d12f68b73fdc2f7260ab114":hex:"459df18e2dfbd66d6ad04978432a6d97":hex:"ee0b0b52a729c45b899cc924f46eb1908e55aaaeeaa0c4cdaacf57948a7993a6debd7b6cd7aa426dc3b3b6f56522ba3d5700a820b1697b8170bad9ca7caf1050f13d54fb1ddeb111086cb650e1c5f4a14b6a927205a83bf49f357576fd0f884a83b068154352076a6e36a5369436d2c8351f3e6bfec65b4816e3eb3f144ed7f9":hex:"fd0732a38224c3f16f58de3a7f333da2ecdb6eec92b469544a891966dd4f8fb64a711a793f1ef6a90e49765eacaccdd8cc438c2b57c51902d27a82ee4f24925a864a9513a74e734ddbf77204a99a3c0060fcfbaccae48fe509bc95c3d6e1b1592889c489801265715e6e4355a45357ce467c1caa2f1c3071bd3a9168a7d223e3":hex:"8e5a6a79":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,128) #0 [#1]
depends_on:4:2
9:exp:5:hex:"806766a4d2b6507cc4113bc0e46eebe120eacd948c24dc7f":hex:"4f801c772395c4519ec830980c8ca5a4":hex:"":hex:"":hex:"8fa16452b132bebc6aa521e92cb3b0ea":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,128) #1 [#1]
depends_on:4:2
9:exp:5:hex:"0c2abdcd2e4ae4137509761a38e6ca436b99c21b141f28f5":hex:"335ca01a07081fea4e605eb5f23a778e":hex:"":hex:"":hex:"d7f475dfcb92a75bc8521c12bb2e8b86":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,128) #2 [#1]
depends_on:4:2
9:exp:5:hex:"eef490a0c2ecb32472e1654184340cc7433c34da981c062d":hex:"d9172c3344d37ff93d2dcb2170ea5d01":hex:"":hex:"":hex:"017fef05260a496654896d4703db3888":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,120) #0 [#1]
depends_on:4:2
9:exp:5:hex:"fe0c3490f1f0dba23cf5c64e6e1740d06f85e0afec6772f3":hex:"f47e915163fa3df7f6c15b9d69f53907":hex:"":hex:"":hex:"14e1a057a2e7ffbd2208e9c25dbba1":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,120) #1 [#1]
depends_on:4:2
9:exp:5:hex:"4356b3b1f308df3573509945afe5268984f9d953f01096de":hex:"a35b397b34a14a8e24d05a37be4d1822":hex:"":hex:"":hex:"e045ecba220d22c80826b77a21b013":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,120) #2 [#1]
depends_on:4:2
9:exp:5:hex:"e2898937cc575c8bb7444413884deafe8eaf326be8849e42":hex:"169a449ccb3eb29805b15304d603b132":hex:"":hex:"":hex:"3a807251f3d6242849a69972b14f6d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,112) #0 [#1]
depends_on:4:2
9:exp:5:hex:"75683c7df0442e10b5368fcd6bb481f0bff8d95aae90487e":hex:"538641f7d1cc5c68715971cee607da73":hex:"":hex:"":hex:"07d68fffe417adc3397706d73b95":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,112) #1 [#1]
depends_on:4:2
9:exp:5:hex:"0724ee1f317997ce77bb659446fcb5a557490f40597341c7":hex:"0d8eb78032d83c676820b2ef5ccc2cc8":hex:"":hex:"":hex:"7da181563b26c7aefeb29e71cc69":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,112) #2 [#1]
depends_on:4:2
9:exp:5:hex:"be2f0f4ae4ab851b258ec5602628df261b6a69e309ff9043":hex:"646a91d83ae72b9b9e9fce64135cbf73":hex:"":hex:"":hex:"169e717e2bae42e3eb61d0a1a29b":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,104) #0 [#1]
depends_on:4:2
9:exp:5:hex:"583c328daecd18c2ac5c83a0c263de194a4c73aa4700fe76":hex:"55e10d5e9b438b02505d30f211b16fea":hex:"":hex:"":hex:"95c0a4ea9e80f91a4acce500f7":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,104) #1 [#1]
depends_on:4:2
9:exp:5:hex:"b40857e7e6f26050f1e9a6cbe05e15a0ba07c2055634ad47":hex:"e25ef162a4295d7d24de75a673172346":hex:"":hex:"":hex:"89ea4d1f34edb716b322ea7f6f":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,104) #2 [#1]
depends_on:4:2
9:exp:5:hex:"627008956e31fea497fb120b438a2a043c23b1b38dc6bc10":hex:"08ea464baac54469b0498419d83820e6":hex:"":hex:"":hex:"ab064a8d380fe2cda38e61f9e1":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,96) #0 [#1]
depends_on:4:2
9:exp:5:hex:"8c386d67d7c2bfd46b8571d8685b35741e87a3ed4a46c9db":hex:"766996fb67ace9e6a22d7f802455d4ef":hex:"":hex:"":hex:"9a641be173dc3557ea015372":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,96) #1 [#1]
depends_on:4:2
9:exp:5:hex:"711bc5aa6b94fa3287fad0167ac1a9ef5e8e01c16a79e95a":hex:"75cdb8b83017f3dc5ac8733016ab47c7":hex:"":hex:"":hex:"81e3a5580234d8e0b2204bc3":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,96) #2 [#1]
depends_on:4:2
9:exp:5:hex:"c74620828402e0bdf3f7a5353668505dc1550a31debce59a":hex:"cfbefe265583ab3a2285e8080141ba48":hex:"":hex:"":hex:"355a43bcebbe7f72b6cd27ea":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,64) #0 [#1]
depends_on:4:2
9:exp:5:hex:"1eb53aa548b41bfdc85c657ebdebdae0c7e525a6432bc012":hex:"37ffc64d4b2d9c82dd17d1ad3076d82b":hex:"":hex:"":hex:"34b8e037084b3f2d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,64) #1 [#1]
depends_on:4:2
9:exp:5:hex:"50d077575f6db91024a8e564db83324539e9b7add7bb98e4":hex:"118d0283294d4084127cce4b0cd5b5fa":hex:"":hex:"":hex:"507a361d8ac59882":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,64) #2 [#1]
depends_on:4:2
9:exp:5:hex:"d9ddca0807305025d61919ed7893d7d5c5a3c9f012f4842f":hex:"b78d518b6c41a9e031a00b10fb178327":hex:"":hex:"":hex:"f401d546c8b739ff":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,32) #0 [#1]
depends_on:4:2
9:exp:5:hex:"6ed8d8afde4dc3872cbc274d7c47b719205518496dd7951d":hex:"14eb280288740d464e3b8f296c642daa":hex:"":hex:"":hex:"39e64d7a":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,32) #1 [#1]
depends_on:4:2
9:exp:5:hex:"80aace5ab74f261bc09ac6f66898f69e7f348f805d52404d":hex:"f54bf4aac8fb631c8b6ff5e96465fae6":hex:"":hex:"":hex:"1ec1c1a1":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,32) #2 [#1]
depends_on:4:2
9:exp:5:hex:"23b76efd0dbc8d501885ab7d43a7dacde91edd9cde1e1048":hex:"75532d15e582e6c477b411e727d4171e":hex:"":hex:"":hex:"76a0e017":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,128) #0 [#1]
depends_on:4:2
9:exp:5:hex:"94c50453dd3ef7f7ea763ae13fa34debb9c1198abbf32326":hex:"1afe962bc46e36099165552ddb329ac6":hex:"b2920dd9b0325a87e8edda8db560bfe287e44df79cf61edba3b2c95e34629638ecb86584f05a303603065e63323523f6ccc5b605679d1722cde5561f89d268d5f8db8e6bdffda4839c4a04982e8314da78e89f8f8ad9c0fee86332906bf78d2f20afcaabdc282008c6d09df2bfe9be2c9027bb49268b8be8936be39fa8b1ae03":hex:"":hex:"51e1f19a7dea5cfe9b9ca9d09096c3e7":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,128) #1 [#1]
depends_on:4:2
9:exp:5:hex:"c6a98102af3d875bcdebe594661d3a6b376970c02b11d019":hex:"bea8cd85a28a2c05bf7406b8eef1efcc":hex:"f2f80e2c042092cc7240b598ab30fad055bce85408aa0f8cefaf8a7204f0e2acb87c78f46a5867b1f1c19461cbf5ed5d2ca21c96a63fb1f42f10f394952e63520795c56df77d6a04cb5ad006ee865a47dc2349a814a630b3d4c4e0fd149f51e8fa846656ea569fd29a1ebafc061446eb80ec182f833f1f6d9083545abf52fa4c":hex:"":hex:"04b80f25ae9d07f5fd8220263ac3f2f7":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,128) #2 [#1]
depends_on:4:2
9:exp:5:hex:"ec3cc45a22fdc7cc79ed658d9e9dbc138dcc7d6e795cba1a":hex:"b10d9c70205e142704f9d1f74caee0f6":hex:"714994017c169c574aaff2f8bad15f8fa6a385117f5405f74846eca873ca4a8f4876adf704f2fcaff2dfa75c17afefd08a4707292debc6d9fafda6244ca509bc52b0c6b70f09b14c0d7c667583c091d4064e241ba1f82dd43dc3ea4b8922be65faf5583f6b21ff5b22d3632eb4a426675648250e4b3e37c688d6129b954ef6a8":hex:"":hex:"d22407fd3ae1921d1b380461d2e60210":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,120) #0 [#1]
depends_on:4:2
9:exp:5:hex:"5a32ebc7a2338038ced36d2b85cbc6c45cca9845a7c5aa99":hex:"9afe0882e418c9af205eeb90e131d212":hex:"61ff8a8bc22803f17e8e9f01aff865bc7d3083ff413ce392a989e46ebed5114894de906f7d36439024d8f2e69cc815ac043fff2f75169f6c9aa9761ff32d10a1353213ac756cb84bd3613f8261ef390e1d00c3a8fb82764b0cda4e0049219e87d2e92c38f78ffac242391f838a248f608bb2b56b31bbb453d1098e99d079ea1b":hex:"":hex:"fcbb932ddb0128df78a71971c52838":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,120) #1 [#1]
depends_on:4:2
9:exp:5:hex:"9bf22885e7f13bcc63bb0a2ca90c20e5c86001f05edf85d8":hex:"99dec21f4781284722b5074ea567c171":hex:"9f4176dacf26e27aa0e669cd4d44bca41f83468c70b54c745a601408a214bf876941ae2ae4d26929113f5de2e7d15a7bb656541292137bf2129fdc31f06f070e3cfaf0a7b30d93d8d3c76a981d75cd0ffa0bcacb34597d5be1a055c35eefeddc07ee098603e48ad88eb7a2ec19c1aefc5c7be9a237797397aa27590d5261f67a":hex:"":hex:"18fd1feec5e3bbf0985312dd6100d1":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,120) #2 [#1]
depends_on:4:2
9:exp:5:hex:"cfd75a9d3788d965895553ab5fb7a8ff0aa383b7594850a6":hex:"a6df69e5f77f4d99d5318c45c87451b2":hex:"041aeb2fa0f7df027cd7709a992e041179d499f5dbccd389035bf7e514a38b5f8368379d2d7b5015d4fa6fadfd7c75abd2d855f5ea4220315fad2c2d435d910253bf76f252a21c57fe74f7247dac32f4276d793d30d48dd61d0e14a4b7f07a56c94d3799d04324dfb2b27a22a5077e280422d4f014f253d138e74c9ac3428a7b":hex:"":hex:"fd78b9956e4e4522605db410f97e84":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,112) #0 [#1]
depends_on:4:2
9:exp:5:hex:"b0b21ae138485591c6bef7b3d5a0aa0e9762c30a50e4bba2":hex:"56dc980e1cba1bc2e3b4a0733d7897ca":hex:"a38458e5cc71f22f6f5880dc018c5777c0e6c8a1301e7d0300c02c976423c2b65f522db4a90401035346d855c892cbf27092c81b969e99cb2b6198e450a95c547bb0145652c9720aaf72a975e4cb5124b483a42f84b5cd022367802c5f167a7dfc885c1f983bb4525a88c8257df3067b6d36d2dbf6323df80c3eaeffc2d176a5":hex:"":hex:"b11f5c0e8cb6fea1a170c9342437":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,112) #1 [#1]
depends_on:4:2
9:exp:5:hex:"8775665aba345b1c3e626128b5afa3d0da8f4d36b8cf1ca6":hex:"cd17f761670e1f104f8ea4fb0cec7166":hex:"2ee08a51ceaca1dbbb3ee09b72f57427fd34bd95da5b4c0933cbb0fc2f7270cffd3476aa05deeb892a7e6a8a3407e61f8631d1a00e47d46efb918393ee5099df7d65c12ab8c9640bfcb3a6cce00c3243d0b3f316f0822cfeae05ee67b419393cc81846b60c42aeb5c53f0ede1280dc36aa8ef59addd10668dd61557ce760c544":hex:"":hex:"6cdf60e62c91a6a944fa80da1854":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,112) #2 [#1]
depends_on:4:2
9:exp:5:hex:"cc9922299b47725952f06272168b728218d2443028d81597":hex:"9b2f1a40717afcdbb6a95d6e335c9e4d":hex:"bcfca8420bc7b9df0290d8c1bcf4e3e66d3a4be1c947af82dd541336e44e2c4fa7c6b456980b174948de30b694232b03f8eb990f849b5f57762886b449671e4f0b5e7a173f12910393bdf5c162163584c774ad3bba39794767a4cc45f4a582d307503960454631cdf551e528a863f2e014b1fca4955a78bd545dec831e4d71c7":hex:"":hex:"dd515e5a8b41ecc441443a749b31":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,104) #0 [#1]
depends_on:4:2
9:exp:5:hex:"5a27d718f21c5cbdc52a745b931bc77bd1afa8b1231f8815":hex:"59661051912fba45023aef4e6f9380a5":hex:"2b7ce5cea81300ed23501493310f1316581ef8a50e37eaadd4bb5f527add6deb09e7dcc67652e44ac889b48726d8c0ae80e2b3a89dd34232eb1da32f7f4fcd5bf8e920d286db8604f23ab06eab3e6f99beb55fe3725107e9d67a491cdada1580717bbf64c28799c9ab67922da9194747f32fd84197070a86838d1c9ebae379b7":hex:"":hex:"f33e8f42b58f45a0456f83a13e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,104) #1 [#1]
depends_on:4:2
9:exp:5:hex:"b83e933cf54ac58f8c7e5ed18e4ed2213059158ed9cb2c30":hex:"8710af55dd79da45a4b24f6e972bc60a":hex:"b7a428bc68696cee06f2f8b43f63b47914e29f04a4a40c0eec6193a9a24bbe012d68bea5573382dd579beeb0565b0e0334cce6724997138b198fce8325f07069d6890ac4c052e127aa6e70a6248e6536d1d3c6ac60d8cd14d9a45200f6540305f882df5fca2cac48278f94fe502b5abe2992fa2719b0ce98b7ef1b5582e0151c":hex:"":hex:"380128ad7f35be87a17c9590fa":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,104) #2 [#1]
depends_on:4:2
9:exp:5:hex:"d2f85f92092385f15da43a086cff64c7448b4ee5a83ed72e":hex:"9026dfd09e4553cd51c4c13ce70830de":hex:"3c8de64c14df73c1b470a9d8aa693af96e487d548d03a92ce59c0baec8576129945c722586a66f03deb5029cbda029fb22d355952c3dadfdede20b63f4221f27c8e5d710e2b335c2d9a9b7ca899597a03c41ee6508e40a6d74814441ac3acb64a20f48a61e8a18f4bbcbd3e7e59bb3cd2be405afd6ac80d47ce6496c4b9b294c":hex:"":hex:"e9e5beea7d39c9250347a2a33d":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,96) #0 [#1]
depends_on:4:2
9:exp:5:hex:"de7df44ce007c99f7baad6a6955195f14e60999ed9818707":hex:"4d209e414965fe99636c1c6493bba3a3":hex:"da3bc6bdd414a1e07e00981cf9199371192a1fb2eaae20f7091e5fe5368e26d61b981f7f1d29f1a9085ad2789d101155a980de98d961c093941502268adb70537ad9783e6c7d5157c939f59b8ad474c3d7fc1fcc91165cdf8dd9d6ec70d6400086d564b68ebead0d03ebd3aa66ded555692b8de0baf43bc0ddef42e3a9eb34ab":hex:"":hex:"24483a57c20826a709b7d10a":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,96) #1 [#1]
depends_on:4:2
9:exp:5:hex:"1dfa5ff20046c775b5e768c2bd9775066ae766345b7befc3":hex:"2d49409b869b8b9fc5b67767979ca8cd":hex:"e35d34478b228bc903ea2423697e603cc077967d7cfb062e95bc11d89fbe0a1f1d4569f89b2a7047300c1f5131d91564ec9bce014d18ba605a1c1e4e15e3e5c18413b8b59cbb25ab8f088885225de1235c16c7d9a8d06a23cb0b38fd1d5c6c19617fe08fd6bf01c965ed593149a1c6295435e98463e4f03a511d1a7e82c11f01":hex:"":hex:"23012503febbf26dc2d872dc":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,96) #2 [#1]
depends_on:4:2
9:exp:5:hex:"2df3ee3a6484c48fdd0d37bab443228c7d873c984529dfb4":hex:"dc6aeb41415c115d66443fbd7acdfc8f":hex:"eafc6007fafb461d3b151bdff459e56dd09b7b48b93ea730c85e5424f762b4a9080de44497a7c56dd7855628ffc61c7b4faeb7d6f413d464fe5ec6401f3028427ae3e62db3ff39cd0f5333a664d3505ff42caa8899b96a92ec01934d4b59556feb9055e8dfb81f55e60135345bfce3e4199bfcdb3ce42523e7d24be2a04cdb67":hex:"":hex:"e8e80bf6e5c4a55e7964f455":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,64) #0 [#1]
depends_on:4:2
9:exp:5:hex:"ce0787f65e6c24a1c444c35dcd38195197530aa20f1f6f3b":hex:"55300431b1eaac0375681d7821e1eb7a":hex:"84a699a34a1e597061ef95e8ec3c21b592e9236ddb98c68d7e05f1e709937b48ec34a4b88d99708d133a2cc33f5cf6819d5e7b82888e49faa5d54147d36c9e486630aa68fef88d55537119db1d57df0402f56e219f7ece7b4bb5f996dbe1c664a75174c880a00b0f2a56e35d17b69c550921961505afabf4bfd66cf04dc596d1":hex:"":hex:"74264163131d16ac":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,64) #1 [#1]
depends_on:4:2
9:exp:5:hex:"3a15541b5857a668dc9899b2e198d2416e83bac13282ca46":hex:"89bf8ab0cea6f59616eeb9b314d7c333":hex:"4d2843f34f9ea13a1ac521479457005178bcf8b2ebeaeb09097ea4471da9f6cc60a532bcda1c18cab822af541de3b87de606999e994ace3951f58a02de0d6620c9ae04549326da449a3e90364a17b90b6b17debc0f454bb0e7e98aef56a1caccf8c91614d1616db30fc8223dbcd8e77bf55d8253efe034fd66f7191e0303c52f":hex:"":hex:"8f4877806daff10e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,64) #2 [#1]
depends_on:4:2
9:exp:5:hex:"b61cdfd19c136ee2acbe09b7993a4683a713427518f8e559":hex:"4066118061c904ed1e866d4f31d11234":hex:"153c075ecdd184fd8a0fca25cae8f720201361ef84f3c638b148ca32c51d091a0e394236d0b51c1d2ee601914120c56dfea1289af470dbc9ef462ec5f974e455e6a83e215a2c8e27c0c5b5b45b662b7f58635a29866e8f76ab41ee628c12a24ab4d5f7954665c3e4a3a346739f20393fc5700ec79d2e3c2722c3fb3c77305337":hex:"":hex:"4eff7227b42f9a7d":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,32) #0 [#1]
depends_on:4:2
9:exp:5:hex:"ce175a7df7e429fcc233540e6b8524323e91f40f592ba144":hex:"c34484b4857b93e309df8e1a0e1ec9a3":hex:"ce8d8775f047b543a6cc0d9ef9bc0db5ac5d610dc3ff6e12e0ad7cd3a399ebb762331e3c1101a189b3433a7ff4cd880a0639d2581b71e398dd982f55a11bf0f4e6ee95bacd897e8ec34649e1c256ee6ccecb33e36c76927cc5124bc2962713ad44cbd435ae3c1143796d3037fa1d659e5dad7ebf3c8cbdb5b619113d7ce8c483":hex:"":hex:"ff355f10":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,32) #1 [#1]
depends_on:4:2
9:exp:5:hex:"5f659ed236ba60494e9bf1ee2cb40edcf3f25a2bac2e5bc5":hex:"ad49f12f202320255406c2f40e55b034":hex:"6da62892f436dfe9790e72d26f4858ca156d1d655c9cc4336fcf282b0f3f0b201e47f799c3019109af89ef5fd48a4811980930e82cd95f86b1995d977c847bbb06ecdcc98b1aae100b23c9c2f0dcf317a1fb36f14e90e396e6c0c594bcc0dc5f3ebf86ce7ecd4b06d1c43202734d53f55751a6e6bbda982104102af240def4eb":hex:"":hex:"cb4d8c1d":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,32) #2 [#1]
depends_on:4:2
9:exp:5:hex:"a73f318b1e298ba4ac0ab2aed74f73543b1017cccbd1b240":hex:"abe33b7e8d88bd30deb96d1e90c4e951":hex:"6de616b000047b14b6759015183dd753c61499c0e665d06a89e4fb0cd0dd3064ff8651582e901ef5d0cdf3344c29c70c3aabc2aaf83cb3f284c6fe4104906d389b027e7d9ca60d010f06ef8cd9e55db2483d06552ddbe3fc43b24c55085cd998eae3edec36673445bf626e933c15b6af08ea21cbace4720b0b68fe1a374877d5":hex:"":hex:"4a28ec97":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,128) #0 [#1]
depends_on:4:2
9:exp:5:hex:"73d5be74615bc5b627eedfb95746fb5f17cbf25b500a597f":hex:"eb16ed8de81efde2915a901f557fba95":hex:"":hex:"fc40993eb8559e6b127315c03103ce31b70fc0e07a766d9eecf2e4e8d973faa4afd3053c9ebef0282c9e3d2289d21b6c339748273fa1edf6d6ef5c8f1e1e9301b250297092d9ac4f4843125ea7299d5370f7f49c258eac2a58cc9df14c162604ba0801728994dc82cb625981130c3ca8cdb3391658d4e034691e62ece0a6e407":hex:"804056dca9f102c4a13a930c81d77eca":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,128) #1 [#1]
depends_on:4:2
9:exp:5:hex:"a249135c9f2f5a8b1af66442a4d4e101771a918ef8acee05":hex:"80b6e48fe4a3b08d40c1636b25dfd2c4":hex:"":hex:"c62b39b937edbdc9b644321d5d284e62eaa4154010c7a3208c1ef4706fba90223da04b2f686a28b975eff17386598ba77e212855692f384782c1f3c00be011e466e145f6f8b65c458e41409e01a019b290773992e19334ffaca544e28fc9044a5e86bcd2fa5ad2e76f2be3f014d8c387456a8fcfded3ae4d1194d0e3e53a2031":hex:"951c1c89b6d95661630d739dd9120a73":char*:"":hex:"b865f8dd64a6f51a500bcfc8cadbc9e9f5d54d2d27d815ecfe3d5731e1b230c587b46958c6187e41b52ff187a14d26aa41c5f9909a3b77859429232e5bd6c6dc22cf5590402476d033a32682e8ab8dc7ed0b089c5ab20ab9a8c5d6a3be9ea7aa56c9d3ab08de4a4a019abb447db448062f16a533d416951a8ff6f13ed5608f77":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,128) #2 [#1]
depends_on:4:2
9:exp:5:hex:"fa832a4b37dcb3c0879a771bb8ae734f0d88b9be497797a8":hex:"70835abab9f945c84ef4e97cdcf2a694":hex:"":hex:"0f1105f9ec24121232b60b6ef3c3e8ca9eec1a3d7625004b857d1d77f292b6ec065d92f5bb97e0dc2fdfdf823a5db275109a9472690caea04730e4bd732c33548718e9f7658bbf3e30b8d07790cd540c5754486ed8e4d6920cefaeb1c182c4d67ebed0d205ba0bd9441a599d55e45094b380f3478bcfca9646a0d7aa18d08e52":hex:"a459be0b349f6e8392c2a86edd8a9da5":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,120) #0 [#1]
depends_on:4:2
9:exp:5:hex:"dda216287910d1f5c0a312f63c243612388bc510cb76c5ba":hex:"7f770140df5b8678bc9c4b962b8c9034":hex:"":hex:"d6617d583344d4fe472099d2a688297857215a3e31b47d1bf355ccfe9cf2398a3eba362c670c88f8c7162903275dfd4761d095900bd97eba72200d4045d72bd239bda156829c36b38b1ff5e4230125e5695f623e129829721e889da235bb7d4b9da07cce8c3ceb96964fd2f9dd1ff0997e1a3e253a688ceb1bfec76a7c567266":hex:"9823e3242b3f890c6a456f1837e039":char*:"":hex:"b4910277224025f58a5d0f37385b03fcd488dfef7580eb5c270c10bd7a6f6d9c7ddc2d1368d68d4e04f90e3df029ed028432a09f710be1610b2a75bd05f31bae83920573929573affd0eb03c63e0cec7a027deab792f43ee6307fd3c5078d43d5b1407ac023824d41c9437d66eeec172488f28d700aa4b54931aad7cd458456f":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,120) #1 [#1]
depends_on:4:2
9:exp:5:hex:"c5afa1e61d4594b1c2fa637f64f18dd557e4df3255b47f24":hex:"151fd3ba32f5bde72adce6291bcf63ea":hex:"":hex:"5c772cdf19571cd51d71fc166d33a0b892fbca4eae36ab0ac94e6164d51acb2d4e60d4f3a19c3757a93960e7fd90b9a6cdf98bdf259b370ed6c7ef8cb96dba7e3a875e6e7fe6abc76aabad30c8743b3e47c8de5d604c748eeb16806c2e75180a96af7741904eca61769d39e943eb4c4c25f2afd68e9472043de2bb03e9edae20":hex:"f0626cc07f2ed1a7570386a4110fc1":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,120) #2 [#1]
depends_on:4:2
9:exp:5:hex:"febd4ff0fedd9f16bccb62380d59cd41b8eff1834347d8fa":hex:"743699d3759781e82a3d21c7cd7991c8":hex:"":hex:"dc971c8f65ece2ea4130afd4db38fc657c085ea19c76fef50f5bd0f8dd364cc22471c2fa36be8cde78529f58a78888e9de10961760a01af005e42fc5b03e6f64962e6b18eaedea979d33d1b06e2038b1aad8993e5b20cae6cc93f3f7cf2ad658fbba633d74f21a2003dded5f5dda3b46ed7424845c11bab439fbb987f0be09f8":hex:"1da347f9b6341049e63140395ad445":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,112) #0 [#1]
depends_on:4:2
9:exp:5:hex:"d280d079110c1c826cc77f490d807dd8d508eb579a160c49":hex:"85b241d516b94759c9ef975f557bccea":hex:"":hex:"a286d19610a990d64f3accd329fc005d468465a98cfa2f3606c6d0fbeb9732879bad3ca8094322a334a43155baed02d8e13a2fbf259d80066c6f418a1a74b23e0f6238f505b2b3dc906ffcb4910ce6c878b595bb4e5f8f3e2ede912b38dbafdf4659a93b056a1a67cb0ec1dbf00d93223f3b20b3f64a157105c5445b61628abf":hex:"bbf289df539f78c3a912b141da3a":char*:"":hex:"b9286ab91645c20de040a805020fed53c612d493a8ce9c71649ae16bd50eab6fb7f3a9180e1651d5413aa542608d7ecbf9fc7378c0bef4d439bc35434b6cf803976b8783aecc83a91e95cea72c2a26a883b710252e0c2a6baa115739a0692c85f6d34ff06234fbdc79b8c4a8ea0a7056fb48c18f73aaf5084868abb0dfaa287d":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,112) #1 [#1]
depends_on:4:2
9:exp:5:hex:"5e80f87fa2156c62df7be2ad16c4890de5ee5868a684fcf9":hex:"9769f71c76b5b6c60462a845d2c123ad":hex:"":hex:"c829073efd5c5150d2b7e2cdaeff979830d1aa983c747724ade6472c647a6e8e5033046e0359ea62fc26b4c95bccb3ac416fdf54e95815c35bf86d3fdd7856abbb618fe8fcd35a9295114926a0c9df92317d44ba1885a0c67c10b9ba24b8b2f3a464308c5578932247bf9c79d939aa3576376d2d6b4f14a378ab775531fe8abf":hex:"394b6c631a69be3ed8c90770f3d4":char*:"":hex:"f886bd92ca9d73a52e626b0c63a3daa138faaacf7809086d04f5c0c899362aa22e25d8659653b59c3103668461d9785bb425c6c1026ad9c924271cec9f27a9b341f708ca86f1d82a77aae88b25da9061b78b97276f3216720352629bd1a27ebf890da6f42d8c63d68342a93c382442d49dd4b62219504785cee89dffdc36f868":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,112) #2 [#1]
depends_on:4:2
9:exp:5:hex:"d8a7b99e53f5e5b197364d4516cace4b928de50e571315e3":hex:"4b12c6701534098e23e1b4659f684d6f":hex:"":hex:"d0db0ac5e14bf03729125f3137d4854b4d8ce2d264f8646da17402bdad7034c0d84d7a80f107eb202aeadbfdf063904ae9793c6ae91ee8bcc0fc0674d8111f6aea6607633f92e4be3cfbb64418101db8b0a9225c83e60ffcf7a7f71f77149a13f8c5227cd92855241e11ee363062a893a76ac282fb47b523b306cd8235cd81c2":hex:"729b31c65d8699c93d741caac8e3":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,104) #0 [#1]
depends_on:4:2
9:exp:5:hex:"c874b427b7181b0c90b887147c36f242827149324fd5c945":hex:"4b8dda046a5b7c46abeeca2f2f9bcaf8":hex:"":hex:"bdd90190d587a564af022f06c8bd1a68735b6f18f04113fdcec24c6027aaf0271b183336fb713d247a173d9e095dae6e9badb0ab069712302875406f14320151fd43b90a3d6f35cc856636b1a6f98afc797cb5259567e2e9b7ce62d7b3370b5ee852722faf740edf815b3af460cdd7de90ca6ab6cd173844216c064b16ea3696":hex:"fe1e427bcb15ce026413a0da87":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,104) #1 [#1]
depends_on:4:2
9:exp:5:hex:"56543cd6e2ebb1e3dc136a826bfc37eddb12f7a26430a1b4":hex:"927ce8a596ed28c85d9cb8e688a829e6":hex:"":hex:"d541dd3acec2da042e6ea26fb90ff9a3861191926423b6dc99c5110b3bf150b362017159d0b85ffea397106a0d8299ec22791cb06103cd44036eed0d6d9f953724fb003068b3c3d97da129c28d97f09e6300cbea06ba66f410ca61c3311ce334c55f077c37acb3b7129c481748f79c958bc3bbeb2d3ff445ad361ed4bbc79f0a":hex:"3a98f471112a8a646460e8efd0":char*:"":hex:"a602d61e7a35cbe0e463119bb66fd4bb6c75d1fe0b211b9d6a0a6e9e84b0794282318f0d33ec053f2cfba1623e865681affeaf29f3da3113995e87d51a5ab4872bb05b5be8ef2b14dfc3df5a48cbc9b10853a708ee4886a7390e8e4d286740a0dd41c025c8d72eda3f73f3cec5c33d5e50b643afd7691213cccccc2c41b9bd7a":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,104) #2 [#1]
depends_on:4:2
9:exp:5:hex:"caaf81cd380f3af7885ef0d6196a1688c9372c5850dc5b0b":hex:"508c55f1726896f5b9f0a7024fe2fad0":hex:"":hex:"6f269929b92c6281e00672eaec183f187b2ddecc11c9045319521d245b595ab154dd50f045a660c4d53ae07d1b7a7fd6b21da10976eb5ffcddda08c1e9075a3b4d785faa003b4dd243f379e0654740b466704d9173bc43292ae0e279a903a955ce33b299bf2842b3461f7c9a2bd311f3e87254b5413d372ec543d6efa237b95a":hex:"3b8026268caf599ee677ecfd70":char*:"":hex:"c4a96fb08d7c2eebd17046172b98569bc2441929fc0d6876aa1f389b80c05e2ede74dc6f8c3896a2ccf518e1b375ee75e4967f7cca21fa81ee176f8fb8753381ce03b2df873897131adc62a0cbebf718c8e0bb8eeed3104535f17a9c706d178d95a1b232e9dac31f2d1bdb3a1b098f3056f0e3d18be36bd746675779c0f80a10":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,96) #0 [#1]
depends_on:4:2
9:exp:5:hex:"2fc9d9ac8469cfc718add2b03a4d8c8dcc2eeca08e5ff7bc":hex:"b2a7c0d52fc60bacc3d1a94f33087095":hex:"":hex:"bc84d8a962a9cfd179d242788473d980d177abd0af9edccb14c6dc41535439a1768978158eeed99466574ea820dbedea68c819ffd9f9915ca8392c2e03049d7198baeca1d3491fe2345e64c1012aff03985b86c831ad516d4f5eb538109fff25383c7b0fa6b940ae19b0987d8c3e4a37ccbbd2034633c1eb0df1e9ddf3a8239e":hex:"0a7a36ec128d0deb60869893":char*:"":hex:"fc3cd6486dfe944f7cb035787573a554f4fe010c15bd08d6b09f73066f6f272ff84474f3845337b6e429c947d419c511c2945ffb181492c5465940cef85077e8a6a272a07e310a2f3808f11be03d96162913c613d9c3f25c3893c2bd2a58a619a9757fd16cc20c1308f2140557330379f07dbfd8979b26b075977805f1885acc":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,96) #1 [#1]
depends_on:4:2
9:exp:5:hex:"81ff729efa4a9aa2eccc37c5f846235b53d3b93c79c709c8":hex:"1bd17f04d1dc2e447b41665952ad9031":hex:"":hex:"3992ad29eeb97d17bd5c0f04d8589903ee23ccb2b1adc2992a48a2eb62c2644c0df53b4afe4ace60dc5ec249c0c083473ebac3323539a575c14fa74c8381d1ac90cb501240f96d1779b287f7d8ba8775281d453aae37c803185f2711d21f5c00eb45cad37587ed196d1633f1eb0b33abef337447d03ec09c0e3f7fd32e8c69f0":hex:"01b0a815dc6da3e32851e1fb":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,96) #2 [#1]
depends_on:4:2
9:exp:5:hex:"068500e8d4f8d4af9035cdaa8e005a648352e8f28bdafc8a":hex:"5ea9198b860679759357befdbb106b62":hex:"":hex:"98e32428d9d21c4b60e690a2ce1cf70bee90df31302d1819b7d27fd577dd990f7ffe6ba5ef117caac718cc1880b4ca98f72db281c9609e189307302dc2866f20be3a545a565521368a6881e2642cba63b3cf4c8b5e5a8eabeb3e8b004618b8f77667c111e5402c5d7c66afd297c575ce5092e898d5831031d225cee668c186a1":hex:"d58752f66b2cb9bb2bc388eb":char*:"":hex:"2ef3a17fcdb154f60d5e80263b7301a8526d2de451ea49adb441aa2541986b868dab24027178f48759dbe874ae7aa7b27fb19461c6678a0ba84bbcd8567ba2412a55179e15e7c1a1392730ac392b59c51d48f8366d45b933880095800e1f36ff1ac00753f6363b0e854f494552f1f2efe028d969e6b1a8080149dd853aa6751e":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,64) #0 [#1]
depends_on:4:2
9:exp:5:hex:"7474d9b07739001b25baf6867254994e06e54c578508232f":hex:"3ade6c92fe2dc575c136e3fbbba5c484":hex:"":hex:"1cbab2b6e4274caa80987072914f667b887198f7aaf4574608b91b5274f5afc3eb05a457554ff5d346d460f92c068bc626fd301d0bb15cb3726504b3d88ecd46a15077728ddc2b698a2e8c5ea5885fc534ac227b8f103d193f1977badf4f853a0931398da01f8019a9b1ff271b3a783ff0fae6f54db425af6e3a345ba7512cbf":hex:"67c25240b8e39b63":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,64) #1 [#1]
depends_on:4:2
9:exp:5:hex:"d50d4c7d442d8a92d0489a96e897d50dda6fbe47ca7713ee":hex:"41b37c04ab8a80f5a8d9d82a3a444772":hex:"":hex:"b36b4caf1d47b0d10652824bd57b603ec1c16f4720ce7d43edde8af1b9737f61b68b882566e04da50136f27d9af4c4c57fff4c8465c8a85f0aeadc17e02709cc9ba818d9a272709e5fb65dd5612a5c5d700da399b3668a00041a51c23de616ea3f72093d85ecbfd9dd0b5d02b541fb605dcffe81e9f45a5c0c191cc0b92ac56d":hex:"4ee54d280829e6ef":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,64) #2 [#1]
depends_on:4:2
9:exp:5:hex:"38f3ec3ec775dac76ae484d5b6ca61c695c7beafba4606ca":hex:"9af53cf6891a749ab286f5c34238088a":hex:"":hex:"49726b8cefc842a02f2d7bef099871f38257cc8ea096c9ac50baced6d940acb4e8baf932bec379a973a2c3a3bc49f60f7e9eef45eafdd15bda1dd1557f068e81226af503934eb96564d14c03f0f351974c8a54fb104fb07417fe79272e4b0c0072b9f89b770326562e4e1b14cad784a2cd1b4ae1dc43623ec451a1cae55f6f84":hex:"6f6f344dd43b0d20":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,32) #0 [#1]
depends_on:4:2
9:exp:5:hex:"6db4ef061513ef6690d57aef50d8011e0dd7eb4432d82374":hex:"623df5a0922d1e8c883debb2e0e5e0b1":hex:"":hex:"b7f9206995bc97311855ee832e2b40c41ab2d1a40d9263683c95b14dcc51c74d2de7b6198f9d4766c659e7619fe2693a5b188fac464ccbd5e632c5fd248cedba4028a92de12ed91415077e94cfe7a60f117052dea8916dfe0a51d92c1c03927e93012dbacd29bbbc50ce537a8173348ca904ac86df55940e9394c2895a9fe563":hex:"14f690d7":char*:"":hex:"a6414daa9be693e7ebb32480a783c54292e57feef4abbb3636bebbc3074bfc608ad55896fe9bd5ab875e52a43f715b98f52c07fc9fa6194ea0cd8ed78404f251639069c5a313ccfc6b94fb1657153ff48f16f6e22b3c4a0b7f88e188c90176447fe27fa7ddc2bac3d2b7edecad5f7605093ac4280b38ae6a4c040d2d4d491b42":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,32) #1 [#1]
depends_on:4:2
9:exp:5:hex:"8901bec4d3c64071d8c30c720c093221e05efed71da280bf":hex:"9265abe966cb83838d7fd9302938f49d":hex:"":hex:"7c447e700db7367260dffa42050e612eff062eb0c8a6b4fe34858800bcb8ec2f622cb5213767b5771433783e9b0fa617c9ffb7fde09845dafc16dfc0df61215c0ca1191eabf43293db6603d5285859de7ef3329f5e71201586fb0188f0840ed5b877043ca06039768c77ff8687c5cfc2fd013a0b8da48344c568fce6b39e2b19":hex:"6f6c38bc":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,32) #2 [#1]
depends_on:4:2
9:exp:5:hex:"2c57eb763f886154d3846cc333fc8ae8b3c7c9c3705f9872":hex:"9b3781165e7ff113ecd1d83d1df2366d":hex:"":hex:"9fe7d210221773ba4a163850bab290ba9b7bf5e825760ac940c290a1b40cd6dd5b9fb6385ae1a79d35ee7b355b34275857d5b847bef4ac7a58f6f0e9de68687807009f5dc26244935d7bcafc7aed18316ce6c375192d2a7bf0bee8a632fe4f412440292e39339b94b28281622842f88048be4640486f2b21a119658c294ce32e":hex:"62f32d4e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,128) #0 [#1]
depends_on:4:2
9:exp:5:hex:"307d31a594e54f673bea2f977835670aca4f3d45c9c376cc":hex:"0bdaa353c4904d32432926f27534c73c":hex:"aa39f04559ccc2cae3d563dda831fb238b2582cb2c2bb28cff20cc20200724c8771b9805ef7464b8fc06c7b8060c6920fd2779fbc807c2292c8c1f88f8088755609a1732ff8c0b06606452b970c79997b985889404fd907c4668a0bcc11ba617175f4525523494a244da60b238468c863055f04db20ea489adf545d56c0a71d8":hex:"d7385a7bd0cb76e1e242fa547c474370bcc7cc7cf3e3fa37b00fe08a56383ca31d023d8c493f6d42e482b0f32e4f244dd100ea08eee6535e5bb8d27f76dbb7eead6ba8e031ccd0eaeb649edee92aeaf0f027d59efd4e39b1f34b15ceb8b592ee0f171b1773b308c0e747790b0e6ace90fc661caa5f942bdc197067f28fbe87d1":hex:"2ddda790aae2ca427f5fb032c29673e6":char*:"":hex:"0b92262759897f4bd5624a891187eba6040d79322a2a5a60fb75c6c6a5badd117abe40c6d963931bbc72dca1a1bf1f5388030fe323b3b24bd408334b95908177fb59af57c5cc6b31825bc7097eec7fec19f9cdb41c0264fd22f71893bcf881c1510feb8057e64880f1ea2df8dc60bb300fd06b0a582f7be534e522caadc4a2c7":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,128) #1 [#1]
depends_on:4:2
9:exp:5:hex:"23c201968def551817f20e49b09dbb5aae0033305bef68a0":hex:"bd2952d215aed5e915d863e7f7696b3e":hex:"23f35fac583897519b94998084ad6d77666e13595109e874625bc6ccc6d0c7816a62d64b02e670fa664e3bb52c276b1bafbeb44e5f9cc3ae028daf1d787344482f31fce5d2800020732b381a8b11c6837f428204b7ed2f4c4810067f2d4da99987b66e6525fc6b9217a8f6933f1681b7cfa857e102f616a7c84adc2f676e3a8f":hex:"77bc8af42d1b64ee39012df5fc33c554af32bfef6d9182804dcfe370dfc4b9d059bdbc55f6ba4eacb8e3a491d96a65360d790864ba60acf1a605f6b28a6591513ea3cfd768ff47aee242a8e9bdfac399b452231bfd59d81c9b91f8dc589ad751d8f9fdad01dd00631f0cb51cb0248332f24194b577e5571ceb5c037a6d0bcfe8":hex:"bb9ba3a9ac7d63e67bd78d71dc3133b3":char*:"":hex:"17d93c921009c6b0b3ecf243d08b701422983f2dcaec9c8d7604a2d5565ed96ce5cddcb183cd5882f8d61d3202c9015d207fed16a4c1195ba712428c727601135315fc504e80c253c3a2e4a5593fc6c4a206edce1fd7104e8a888385bbb396d3cdf1eb2b2aa4d0c9e45451e99550d9cfa05aafe6e7b5319c73c33fd6f98db3c5":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,128) #2 [#1]
depends_on:4:2
9:exp:5:hex:"6baec0669add30acb8f678ce477a2b171f89d1f41935c491":hex:"b1472f92f552ca0d62496b8fa622c569":hex:"5ae64edf11b4dbc7294d3d01bc9faf310dc08a92b28e664e0a7525f938d32ef033033f1de8931f39a58df0eabc8784423f0a6355efcff008cae62c1d8e5b7baefd360a5a2aa1b7068522faf8e437e6419be305ada05715bf21d73bd227531fea4bc31a6ce1662aec49f1961ee28e33ae00eb20013fd84b51cfe0d5adbdaff592":hex:"5712b84c4c97d75f84edd50561bc1d3f1ba451cc3b358b2403b5e528290954348cf7a235b4dc11a72ddbc503191204e98a9744d85419508c8ca76438c13305f716f1e239a6d9f6423c27217a0057aa75f6d7e2fb356e7194f271459ab5482589ea311b33e3d3845952ff4067dd2b9bcc2e8f83630b0a219e904040abd643d839":hex:"29a2d607b2d2d9c96d093000b401a94f":char*:"":hex:"beb687f062ae7f5159d07609dd58d7b81c478d180bc0b4c07ae799626ff1da2be2e0d78b2a2a1f563257f161491a5ac500cd719da6379e30d0f6d0a7a33203381e058f487fc60989923afbee76e703c03abc73bb01bd262ff6f0ac931f771e9b4f2980e7d8c0a9e939fa6e1094796894f2c78f453e4abe64cb285016435ef0e8":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,120) #0 [#1]
depends_on:4:2
9:exp:5:hex:"7b882a2df81fdb9275fb05d120f32417e8ffedd07457e938":hex:"5c064d3418b89388fb21c61d8c74d2c5":hex:"5bfa7113d34e00f34713cf07c386d055e889bb42d7f6c8631ffce5668e98cb19bed8820b90ecb2b35df7134f975700347e5514287cfef7ffa2b0ff48b1de0769b03dca6610995d67cb80052cb2e5914eb4ed43ef5861f4b9364314fde6ad2b82fbba7fd849dfa6e46ecc12edc8cabfff28d9bd23c2bcc8ab3661c9ba4d5fee06":hex:"0aae7213da279b34d6dcf2a691b2d0333112ea22de0c3c68d47cf9f9f4ed8ad4e03d4a60ec18c3a04ac9c2abb73e1023051029b5e8705bb69c4c50afc84deb0379db5077be1f663652f8bd8958271af2c1ac4a87e08cb526bab8a030652f2a29af8055d0f31e35475caee27f84c156ef8642e5bfef89192f5bde3c54279ffe06":hex:"0943abb85adee47741540900cc833f":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,120) #1 [#1]
depends_on:4:2
9:exp:5:hex:"51d94d21482c00bb5bc7e7e03aa017ba58f5a23494b72c2a":hex:"fb21cd763e6f25540f8ad455deaccdf0":hex:"019d1db5569eeff83306f65d653b01064854c1be8446cd2516336667c6557e7844fc349adea64a12dc19ac7e8e40b0520a48fac64571a93d669045607085ac9fa78fed99bbf644908d7763fe5f7f503947a9fe8661b7c6aef8da101acca0aed758ca1580eeb2f26ae3bf2de06ce8827a91a694179991a993cdf814efbcc61ca5":hex:"3a9c69c1ed2340bfde1495658dbf4f54731a19b3922a1d535df8d0b2582f5e803b5891e8ad1aa256c923956dcda2430d0c0696bce63295fb61183e040566e459338f908d23ae51f64020c1ef3d192428f23312b285fc4111d50d1add58f4a49008a22c90d3365230e9158cd56f9d84f079bdd673555d4dc76c74b02fa9920e7d":hex:"a93bd682b57e1d1bf4af97e93b8927":char*:"":hex:"7093f44703f2cbb3d12d9872b07a8cd44deb62dae48bc573b11a1ee1c9f3105223423fac3181c312a8a61757a432d92719f486c21e311b840aa63cf530710c873df27fecda0956075923f1ecc39bffb862706f48bde2de15612930fc8630d2036e9e4cfc1c69779171bd23d9e1d5de50a9e0a0de4bd82ed3efc45299980bb4cc":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,120) #2 [#1]
depends_on:4:2
9:exp:5:hex:"e6756470937f5d9af76f2abe6df2d0bc15ff8e39b5154071":hex:"4500193711a5d817a9f48deafda39772":hex:"92fa22dba0eee6b1de1ddd24713b1be44c7105df90e6e7a54dcbf19025e560eb4986ee080cf613898a1a69d5ab460a3b8aa2723a95ac4a4af48224b011b55fb7582ae18f6746591eab2bd33d82a8dbbae3f7877e28afef9857a623530b31d8198b2df43f903d6e48ddae0848741f9eaae7b5504c67ad13791818f3c55c9b3d1e":hex:"afae92bd56c426c095d76633701aa9bea5ce05490482c6c64ac24468c3e1af6e6030a6bb6649745b011c6729bde985b9242e22105322fbb8853dcabbd00165d0b07d7b499e0238b6513bf6351eb40635a798f7e6e2d31125dda45ffe8964596fdbff55df22d4e9025bd4f39e7c9b90e74b3ee58d6901f113900ee47a4df5afd7":hex:"7d9f97c97c3424c79966f5b45af090":char*:"":hex:"62258d60f0138c0405df4b2ec1e308b374603a9eace45932fdc2999e9e2261de8b1099473d1fc741c46c334023aa5d9359f7ef966240aaf7e310d874b5956fd180fb1124cbeb91cf86020c78a1a0335f5f029bd34677dd2d5076482f3b3e85808f54998f4bac8b8fa968febceec3458fb882fc0530271f144fb3e2ab8c1a6289":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,112) #0 [#1]
depends_on:4:2
9:exp:5:hex:"30db73d46b518669c45b81bc67b93bed3d0864f7e9e8e789":hex:"5069e2d2f82b36de8c2eb171f301135d":hex:"ef781dce556b84188adee2b6e1d64dac2751dd8592abc6c72af7b998dfae40cbe692a4cae0b4aa2c95910e270600550fca1e83640c64efb1eb0e0a90a6fc475ae1db863a64ce9cc272f00abac8a63d48dd9f1c0a5f4586224befed05be4afae5bd92249833d565cc6b65fd8955cb8a7d7bd9f4b6a229e3881212871a52c15d1c":hex:"750bc1d2f91d786bb1e621192a376f552538ba8c07d50d9e10b9345f31b3e5f9d8ad7c719c03d8548a3b184b741cd06c49d7fb6fe80258d60c01c2987c337c823211cee7c1cf82077266889bc7767475e0eeabb2ef6b5a1de2089aaef77565d40a1c2c470a880c911e77a186eacca173b25970574f05c0bdcd5428b39b52af7f":hex:"a5100c5e9a16aedf0e1bd8604335":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,112) #1 [#1]
depends_on:4:2
9:exp:5:hex:"209f0478f1a62cb54c551181cbd4d24b796e95f3a06b6cb9":hex:"7be1768f6ffb31599eb6def7d1daa41c":hex:"9cb49357536ebe087e1475a5387907a9e51ad1550697f13c6cc04384ec8a67dea13376bdd5e26b815c84a78f921b506b9e2086de50f849185f05ba7c3041e49e42c0673df856da109a78b8e0ce918c25836f7e781e6b16168e4e5976d27ebc83f20b7bf4beadecb9b4f17a7a0d3a3db27fc65288a754b5031a2f5a1394801e6e":hex:"66db7cc97b4a8266c0a2228e8028e38d8986e79fcbcc3caff3050fdd2de87b7ff7a6895b988b0bdb7fcc4d6e2d538dcfaad43ce2f98b6d32500f5a6e6183d84cb19157a699cdde1266d6d75a251ee1a2eb97bfe6405d50be2b17a58ba6eafaee0a023a28d568fd1c914f06041a49c79b9df9efe63d56883cbbbeaba809273d2e":hex:"4d2ac05bfd4b59b15a6f70ea7cd0":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,112) #2 [#1]
depends_on:4:2
9:exp:5:hex:"1bfa30b315e7b908263330140fa2d66ed57104784a43cc70":hex:"b7081a3010b524218390ba6dd460a1ec":hex:"8c1f42b5931d69ae351fcde7d2b4136d4898a4fa8ba62d55cef721dadf19beaabf9d1900bdf2e58ee568b808684eecbf7aa3c890f65c54b967b94484be082193b2d8393007389abaa9debbb49d727a2ac16b4dab2c8f276840e9c65a47974d9b04f2e63adf38b6aad763f0d7cdb2c3d58691adde6e51e0a85093a4c4944f5bf2":hex:"8eeee9865e23fa51dbbf197fa41776b7edbdb9381a22c935299cd959a46190788ae82f4e645b0362df89bfc00241964784bc7ef70f6f97e81687d52e552a33af20ae34a3005e0a7b85d094368d707c3c4cd3ef31c0daf3ccaa1676609ed199327f4139d0c120977e6babceed28896d2cb3129630f3ee135572dc39433057e26a":hex:"4da85b8ec861dd8be54787bb83f1":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,104) #0 [#1]
depends_on:4:2
9:exp:5:hex:"fc47156a693e59a1dea0618c41441fe669fc65dcfb7d0726":hex:"ea1935ed014883cc427983d7962d9992":hex:"0d85b8513becfe8c91d0f6ffb65ec31f2cf406c51c0da88893c43d1327fd8ad1f4bab2d7b5e27438d643397034a72f8666bf641b6781bc90f764db387eae6720b5723d510194570ccd773e1b3bebfc333cc099d078583e8dac60d174d332925a24a45110c8d2abe8924ea677ac74db66ea789e2838efc96c78bceaa6236c0a67":hex:"3e4f0a586bad532a08c8863ebba01fd25014baa907e6032ee43d4a7dfc7c3171916dcdf9faee0531f27527872ae4e127b6b9aaee93f5e74d0ab23f3874aa0e291564bc97f17085dd7d5eb9a85d9f44574e5952929eda08863b64c85dd395c91b01fe5bef66e3fa8f9ee5bf62c25d80dc84fbe002ecfd218430b26f3549f734a1":hex:"8781b045a509c4239b9f44624e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,104) #1 [#1]
depends_on:4:2
9:exp:5:hex:"b5fcd780a03ba80341081ef96b440c0e4348afde4d60c1d5":hex:"ad20cce056e74ec5d0a76d6280998f15":hex:"28f8fcf23b9c1ba40c19ffc1092632e35f234c1e8b82bcd5309d37bf849a2ce401413d1f242cf255ed597f9a93a1d6e50676997f95aa612e580d88234a86ddc404292746f0b2f5cf15abebcea6659f998ec6a1cb5a9914fee5aa1aa5d04b3c20914e45095e4141ce9c173653dd91c3ebe4ed4a9a28f3915d7b2edba34c2a58d8":hex:"6316f3beb32f6f3bf8f2ff6a2c160b432bafd3036d3eefa1e4ec204f24892e37dc4d75c7ce9a24b5c49fb4df901f35ef9d5955f7dc289c56cb74753f4d6b2982267d5269d12237e21202a65061849c65e90e6702dda03a35ace3a3a098d16b4bfbb85b7232404baee37776a9b51af6b3059a5f170f4ebe4ecf11061ca3c1f1f3":hex:"2ad4520ddc3b907414d934cc1d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,104) #2 [#1]
depends_on:4:2
9:exp:5:hex:"4382507dddccf1385fc831da8924147563416d0656e168ec":hex:"a37687c9cd4bdc1ead4e6b8f78bee7f5":hex:"fa9ae30509cbb6fe104c21480ae7b8ec9f12f1afb17320d77b77cdf32ce8c5a3f7f927e501118c7ccd6975b79225059cef530a4fcb0a9719f5e2d3bebe7bb6ec0855e495a31e5075eb50aa6c1227e48b03e3fdf780084ac4912eb3a5674cca9dd6ac037366b230ae631a8580d2d117942dee5d5ddbbb2233afeca53289cc4f68":hex:"e5c5430b960aa35dc8540215c2772d66811270859e33dd4477904759e7e5eb2986a52a4ccc9f592e614147b5ea2ead6636a15c6426336b2995d9a31ab36d76578c3540bc6693842a4bc0491c7963ee9cda2317951cf93244bd30bcdfec69a4767004636fe7d1be7300c35e80627bab9236a075a803e9e1080b9159060c643a78":hex:"4221818d4be45306e205813789":char*:"":hex:"b5b36719bc4d13a5fbf37188ea814cdf3c97a430784330540325c899570e15482300bc82c5b8163074e0544c5132e3ce93bba68bd7a8d2db81d1431b424b697c1158c4d70625666d5ff99145ca34856815c905b5a0fd95806df56b9cd5b384bda3e394b409048eb1037144cc071539c02397e931da28a43cc354d584643afd4f":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,96) #0 [#1]
depends_on:4:2
9:exp:5:hex:"7a66db3450dac9a1e63d2639f34c5c6a3fbfb3c8e8230199":hex:"21f8341529b210ade7f2c6055e13007a":hex:"1699bc8c198ab03e22d9bc4f3682aad335c6e35f3f616bb69769a9d5a202511797e770ae0d8d8528ef7b2bb25b4294d47427b43f0580fa71d93fdef667f4f4196f84e41c0b1978796d0de74a94420fb8571bff39137fa231c572b31be9ae72338288bef5f8c992121dc918538551f346e279a9047df14ec9fc0fd399cd3bd8d8":hex:"6463a7eb2496379bc8a5635541525926a6f9fa718e338221952118ae4cf03a85f2074b4ebaf108b9c725809be1e6309c3a444b66f12286f6ea9d80c3413706b234b26372e8f00783819314a994c9e3ecf6abdd255cbfe01b3865e1390a35dcd2853a3d99ed992e82ec67ba245f088cb090adade74bdbc8a1bad0f06cbea766a6":hex:"4af02b81b26104d1d31e295a":char*:"":hex:"53fe6a34d280f2c96d1ae2b2e8baf6abd67cedf7d214312f75dd4a1bec28a641dda3e71aa398726b2b0b1f515e1f4259ee97acaf17f122db9ec7814c2de6a88d36c3ac106396ad03d337c2cd2d2b9b4b7170e23a5848ca7ea129838f967dfdfe83b45ff2a9be699bfb2346115465d59f074f09e24d8fcbd9ece0018c92776c43":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,96) #1 [#1]
depends_on:4:2
9:exp:5:hex:"1f5c818f24d201f9fb23fcca211b0545eee5c5c9b440810d":hex:"3a163067bdd90fce0406d1c198a88771":hex:"a5e94e233d04fe0c4b6c4684b386902fe05096702237dfbe76f73befa69b6f30394cf9fe3358997942df65842748fb4f075a3dc06e147bd8d67fc4371113a4d75c70219257c650a6f38a136659e20a1cf3a119397835c304e0fb2a33aa3c3019175c86463043d5edc6992874f61e81cd0d26af8b62cf8c8626901d4f16d84236":hex:"9a7566817a06f792e96a6a2ba8e0a01f8837e2de06796e68b0782cc54ed0b04fc5e24a1ad37d5ffb035548b882d88150e89915b89f57cde2bf3c43ab9dae356927daef6bd61cc9edd5e1b7a4abea2f71313677f1b2fdf3d8d4a7e9814ea820fbc3e5c83947db961839a985a57ced7f5e4a1efffcfd17a2c806d4cdc1e79162da":hex:"b124eea927e2a62a875494a1":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,96) #2 [#1]
depends_on:4:2
9:exp:5:hex:"9a301f7edf83da63bcf37216a3a33d7613331c3210281dd7":hex:"d73a546b0fa307633ac89506fa86138b":hex:"f57fe548cf4a551a216ffb24a1dcf1b79c95f9abf06443fd58af042d287c2165db373c82a94172db517840f22e45e966e3ead91ce1ddad132bcb844e406e84b76a0b5b0ee23064b66a229f32a2d3b9c71103f020c4ba57fc0f0608b7114914cf2ada0c5a9bc4afbfa9ce5da320f34beb2211d569a142f53bfd262f6d149c4350":hex:"e09cc8543db7804870004706a26e94b457c125bd648b581a196f962f2ae8fa55d9bc66530ba5020e22d282080b4720dc9a2096a11c0fcc3d9a67cd1cf95cd7cd2417ba308c761e64be24347a14c9423447094a5c72a0043c288b35e753ba0aa748f208381249fb1c8d195a472192404b6c8172663ee4b4d4ecfa426e1fb003f2":hex:"f536a3b8c333b1aa520d6440":char*:"":hex:"124a327a8c22b7652886dac2c84b8997ca8a6f61c9ba9c094b5aea41eaa050a6df6cbf280259e5466071bcfa53b4ebc76c3cc4afc8c0385189a5382933aa57c89aab78dca84331e0fe8f0aab3a7857d3e13f08dcd90ec5f0684f82088ef8eb7fd67e75de43b67afc3a0beb458f5ebd61b2c779e6c539d795c667bb7dcc2b762e":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,64) #0 [#1]
depends_on:4:2
9:exp:5:hex:"fd40e8226fd13cb95ba50b7cdf0f07f7ab7037cf8705ca50":hex:"3406e70cbe16b047fedaa537eb892279":hex:"390b18d22d5ecc0b5a524ae9afac6fd948ac72d1360775a88b385aa862cce8a27f3e4b420e539bec6e8958f8c1b5416c313fa0a16f921149a2bfeae29ad2348949b29a73970e5be925ec0c35218b82a020cf21bb68c6931f86b29e01b85500a73f3ee7eb78da60078f42550da83b2e301d151d69b273a050f89e57dfc4787cbf":hex:"75aa7df5c3c443d48ee998064b6fd112c20d2d90c98e00d025ef08d1ad3595385be99de47fa627549b827c48bc79eb1dcaf2f1be95a45f7e55755b952aee5ae0748e68bee1b014a628f3f7dc88e0ebac1d1d00e268355f5101838ce125c57003aebc02a1c9d6ae2cd6e2592f52c0be38cef21a680ae35c909cab99dce9837aef":hex:"69e06c72ead69501":char*:"":hex:"6e8d661cd320b1b39f8494836fcf738b0ab82873d3903c9ee34d74f618aea36099926b54c1589225ec9a9d48ca53657f10d9289c31f199c37c48fb9cbe1cda1e790aaeedf73871f66a3761625cca3c4f642bc4f254868f6b903e80ceeeb015569ace23376567d3712ad16d1289dc504f15d9b2751b23e7722b9e6d8e0827859f":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,64) #1 [#1]
depends_on:4:2
9:exp:5:hex:"a85ab87563b809b01725764d64ba4cc6a143e2e0362f0c52":hex:"9f991ff16a3e3eb164a4f819c9f1821a":hex:"df289511f78d8fa2505afc4c71ab1d7c31a8d15d1e5fcbb29d70f0e56f89c4d7b30f1b3b4745b5d2cc7af34fb4c95461372bf516ec192b400dc8fdb0ca9fe1f30f5320d0fadf20155cfcddcf09233c6f591c1c89917e38a003f56b94a1e2429d1f2b6297db790d7dce84d9fa13d2d86a0e4d100e154050b07178bee4cdf18126":hex:"ef43629721b50bd3656b7ae31b6e4b4ba1cf2c72ed0460ee7d9fb416631ddc597e5f9aebbcf4442b95cc46e28476a464dd87caf9c1c1d6c99d3e3e059dc23f8d2fe155ff5e59c50d640bc052c62adee3aa1295b38732e3458f379e98a8dbdfed04c22a5761792e87fa67ecbcbf3b90eb1bcd1d3f49e60132452f28afece83e90":hex:"dc4c97fe8cc53350":char*:"":hex:"ff0e531c7344f0425d62d5fbedf4bc8d3d5cc80647e67b852c1a58ad1516d376d954cb8dda739f6a4df3cf1507e59696610bcb6b34340d6313028e00d7197845d392e73331aaf168b474a67364d8f9dab740509fabf92af75045f0afabc1b5829264d138820952bbc484d1100d058a4de32b4ece82746b2b4a85fb2993d4add8":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,64) #2 [#1]
depends_on:4:2
9:exp:5:hex:"f4f1e03abb927ffd0b081b9dce83a56a6dd419a6313ac34f":hex:"d1e29bb51a3c4e871d15bb0cd86257e2":hex:"ae2911cdaaad1194c5d7868b6d8f30287105df132eb0cecca14b6e23ec7ac39cc01da1c567a0219cca7b902cc2e825e30f9524a473eb6e1d4d1beff5ab4f29103b2c7522a33dd33182fa955c4f09a75196b1072a6f0340fc55a802d29c7067f05219c21857ebff89ada11f648c1f28dfbfdaab56028f05509de17e2381457ebc":hex:"0e70421499bc4bcb3851afa34cdf5be374722815abdd9bcee5f332dbe890bdc1c0210ab10667e5bb924bf3c1120e25a0c074da620076f143940989e222086d1b34a1200d09aea1f810ef6de7d8520c65eef9539fde5a6422606c588fce6264e5f91f934ede6397c4b307d2d7e07a518fce577a427fa92923cbba637ae495afad":hex:"44f760787f7bc3c0":char*:"":hex:"2199fa5051461b67581429ab19de2ccb50b8b02e12c0e1d81a8a14929f84e09d9715b7d198e77e632de4af1c08c5041276204a7ed76646385e288e96e1a4b0b0f2b1a9df7f0892beaea3cb58d9632720158f6daa4cbbfc0ebdc56ff6a5175768ff2abd24cb7669bc3fe40f8aba7869d2dd7dac86b6ebc4e4ce261edbec88db17":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,32) #0 [#1]
depends_on:4:2
9:exp:5:hex:"33efe20433c6a1ad261a1fed494961749e5bf9d35809b59d":hex:"dc94673b0c49c6d3b4611e278212c748":hex:"919f7397a6d03836423b7cac53177fcfbe457d4aa4348646f646aae1bc5a15568cdb8c96fabef278ace248aca531110a4f4f9e8ab0c32525ad816ae3facf03175232dc84addcd6065f9cc1f513966b63fd27e91a09f1921b95d6bd8f08f1dbce073bcf827847f774514b478b9d7fb5426847dd4dee6f39b5768c1fb729b32d03":hex:"cfbeb61be50def25f513346498f75984bfe797a8ad56be34f2461e2d673f6ce14e7479a59777267b75dadc6b9522599ebe5d7b079495a58ca187ec47796f6ee8c322278ad7451b038c938928adcff6105a8ea3780aedc45b6a3323d3ae6fbce5da4fb59ca5ec0a16a70494c3c4859672348532505e44f915e0b9b8a296ef5225":hex:"c5098340":char*:"":hex:"c5e47d8c60b04df1974b68a14095d9bc8429a413d21960b15bae4fd7356bf7872e0da0a1a385ca2982d3aa3182e63ea4bb8ca01410cd4e71ddad34aa1f12c1387902b3d56634f89c619a2e6756648ab3bf90e9bc945afc9140eb935b633bae96bb067e9ee421697bcf80b14b1b88dbf13e010b472a7ca5411db36848b9c7a37f":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,32) #1 [#1]
depends_on:4:2
9:exp:5:hex:"3ed5dadefa0f6d14fedd1a3cdbab109f6660896a952ac5ab":hex:"553a14f1e1619f9d7bd07cd823961f25":hex:"eb8ea81d3e328a1113942cd5efd0f2b5e7f088791c8fc05690a34584101c4d493628ee7d0099a2865ac194b9124c3fb924de0c4428d0a1c26ea3ad9a0bc89187a16673e3b6f7e370dfb2dc26e8a56a9cf91f9c2088c020a766efe0d0c91689743a603f2cd1e300a6a84828b3b515a4b9a06e6bb20457bf124cd6ce4ac8b83d51":hex:"aef617f69724e020309ec39d9587520efda68a8e303686c3a41ef700cba05b7c6e43e95aadb1a566f61650c87845835e789eb2366941e3bfef6d9846af0e0dbc43249117ad6f299bbc40669ac383cdf79289ada6ccd8ccfe329a0dc6a38eea1a99550457102d10f641cda50c21f533b1f981663f74a0a7c657c04d9fc6696ff4":hex:"dc413c4c":char*:"":hex:"bc1f34991a48aabb0fea513f790f0d223e9feac4c99fa1e8427f01ab8b4b2827cfaf239342de36051a846af0306a3f82e7aed98dd0416fb078bc7f3b617b00ceb2cea4ddafc22dd022efa8303e9804510e0e888065d8427345156d823f796f74130c06db9f9934435552b4fefd051953e20ecba3a4514ac121d7d2097d597439":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,32) #2 [#1]
depends_on:4:2
9:exp:5:hex:"6d97e8bff3923a778504fb917dbc1428a1328587047697d9":hex:"0c28dc4cd53725091c2fb68a476c2e40":hex:"f3932f5e82d75a1e3eba1591c17769e1a45819ccf057c31e76fa810b93678766d25905e859775c244e96bcafbc75c4a2d95e7d02868ccb2f65e49276f0b645ac8cf6e3758402304a3c25ce2de0a49f401b1acadaff8b57589b45cc79130ddc8387f41cc383e33ef38eec019152051c756198d6f782ccf56297b9fe944269a65a":hex:"dc1a81efd51e967767f5bdd7e2e425732c1d28451f2bf5bdf3f5a6492279330594d360dd8a193e5dbde1be49bf143a35c38bcd059f762ada65c5119e097f0976891347f4d829b087bd72daa3494b344cbd3370c4459ca243bd57aeda4cb86cdd0bf274f07830cdbf5e5be4eb9b742ddffef8aa35626d2b9ea0a29d3c3d058b28":hex:"e6d6df7a":char*:"":hex:"39327836e9d8cfb59397adcf045a85644c52c3563290795811f26350c8bce8f55ca779cbcd15479efd8144b8a39ef611153955c70bf3a7da9d4d944c2407a0d735784fcb68de1083eebf6940ebc9cf92f9f139c01404b503ff64e61126a94e881351473507884357040fd32714b872c254349071069644e2bd642905521b944e":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,128) #0 [#2]
depends_on:4:2
9:exp:5:hex:"2c78e29971e90a01bb65973f81260b9344fa835751f5f142":hex:"f1a23ce6e2bc9088a62c887abecd30ae":hex:"":hex:"":hex:"d4d5c22f993c8c610145fcbe4e021687":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,128) #1 [#2]
depends_on:4:2
9:exp:5:hex:"8c582d5b6a40ef0e4048ec20f0263572d7cc82704e380851":hex:"ef221a1c66fda17906190b7c99ab60b8":hex:"":hex:"":hex:"6327dcb46ffb3d0fd8fbf3d2848a8f01":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,128) #2 [#2]
depends_on:4:2
9:exp:5:hex:"3a58abadd29e946e23ca9eb09af059913d5394971bda6a4f":hex:"7c29b3196d44df78fa514a1967fcd3a6":hex:"":hex:"":hex:"fc123944bbea6c5075a5f987aed9cf99":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,120) #0 [#2]
depends_on:4:2
9:exp:5:hex:"04bdde4c35c385783715d8a883640851b860ce0e8436ec19":hex:"783f9a3c36b6d0c9fd57c15105316535":hex:"":hex:"":hex:"23e21a803cac5237777014686564f2":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,120) #1 [#2]
depends_on:4:2
9:exp:5:hex:"4ba5fba0c22fbe10c2d1690c5d99938522de9c5186721bac":hex:"2acc2073089a34d4651eee39a262e8ae":hex:"":hex:"":hex:"7ac742c859a02a543b50464c66dcf5":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,120) #2 [#2]
depends_on:4:2
9:exp:5:hex:"f12890b0a8819faa5a8e0e487f7f064af42fa6d5519d009f":hex:"c937615675738f4b3227c799833d1e61":hex:"":hex:"":hex:"88300bd65b12dcb341f1f6d8a15584":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,112) #0 [#2]
depends_on:4:2
9:exp:5:hex:"51878f3630298a81297f4a21514fea637faa3815d4f26fae":hex:"1f939226feab012dabfc2193637d15b1":hex:"":hex:"":hex:"eed5fcb7607c038b354746d91c5b":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,112) #1 [#2]
depends_on:4:2
9:exp:5:hex:"ae596e74840a600556a06f97b13b89e38f67c152f1a1b930":hex:"e2076e1050070d468659885ea77e88d0":hex:"":hex:"":hex:"b4586bdbd4b6b899648f2333eee0":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,112) #2 [#2]
depends_on:4:2
9:exp:5:hex:"fd33b7a0efae34339ca987b5eb8075385fd1276e63cc8530":hex:"2d07bb8616fc0bbb71755a1bd256e7fb":hex:"":hex:"":hex:"6b60d645220cfde42d88296ac193":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,104) #0 [#2]
depends_on:4:2
9:exp:5:hex:"5685b12a6617d554c36b62af5b8ff2239cb3ffb1d2c40e14":hex:"6c31194df99d08881fa5b1dd33b45a92":hex:"":hex:"":hex:"69431593c376c9f8052bf10747":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,104) #1 [#2]
depends_on:4:2
9:exp:5:hex:"036ae037410dae9f0741608516d03b855c9c1851df8c54a4":hex:"73599275f8237f14c4a52b283c07275d":hex:"":hex:"":hex:"6f7249d25c9f273434c4720275":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,104) #2 [#2]
depends_on:4:2
9:exp:5:hex:"ac144f39ebd6124bad85c9c7fb4f75bff389ece2e8085d83":hex:"d0871bfc3693245be478e6a257c79efb":hex:"":hex:"":hex:"5a99d59631d0e12f58b7b95ccd":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,96) #0 [#2]
depends_on:4:2
9:exp:5:hex:"a8a541ff11a1b8548e832d9e015edeccc94b87dadc156065":hex:"c72bb300b624c27cded863eba56e7587":hex:"":hex:"":hex:"ea2528e7439be2ed0a0d6b2a":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,96) #1 [#2]
depends_on:4:2
9:exp:5:hex:"30dd8f400335e9c688e13cc0b1007bd21736a6d395d152e2":hex:"28899601fa95f532b030f11bbeb87011":hex:"":hex:"":hex:"35625638589bb7f6ccdb0222":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,96) #2 [#2]
depends_on:4:2
9:exp:5:hex:"cb8f672b04d706d7d4125d6830fff5d2ec069569bea050ce":hex:"375d4134e8649367f4db9bdb07aa8594":hex:"":hex:"":hex:"70610bf329683e15ecf8c79f":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,64) #0 [#2]
depends_on:4:2
9:exp:5:hex:"bf71e5b1cd6eb363ecd89a4958675a1166c10749e1ff1f44":hex:"9f502fb5ac90ff5f5616dd1fa837387d":hex:"":hex:"":hex:"a4b5138122e1209d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,64) #1 [#2]
depends_on:4:2
9:exp:5:hex:"5b9d1dfb2303b66848e363793bdca0e5ada8599cb2c09e24":hex:"2ee96384dd29f8a4c4a6102549a026ab":hex:"":hex:"":hex:"3b33a10189338c3b":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,64) #2 [#2]
depends_on:4:2
9:exp:5:hex:"a35ae271f70ebacb28173b37b921f5abcad1712a1cf5d5db":hex:"8d97f354564d8185b57f7727626850a0":hex:"":hex:"":hex:"813d2f98a760130c":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,32) #0 [#2]
depends_on:4:2
9:exp:5:hex:"9bdd0cb826d5d28c2ab9777d5a0c1558e7c8227c53ed4c4f":hex:"daf13501a47ee73c0197d8b774eec399":hex:"":hex:"":hex:"a6d108c0":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,32) #1 [#2]
depends_on:4:2
9:exp:5:hex:"81b4d5ee4e1cbee1d8966fb3946409e6e64319a4b83231f5":hex:"bc2f9320d6b62eea29ebc9cf7fc9f04a":hex:"":hex:"":hex:"a47cdadd":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,0,32) #2 [#2]
depends_on:4:2
9:exp:5:hex:"5813627d26d568dfe5a0f8184cf561fe455eb98b98841fe0":hex:"817199254a912880405c9729d75ed391":hex:"":hex:"":hex:"d81d9b41":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,128) #0 [#2]
depends_on:4:2
9:exp:5:hex:"94f160e2325da2330fbe4e15910d33c2014f01ace58e5b24":hex:"80a1b99750980bf2be84a17032fc2721":hex:"066fdd980cf043a732403ee5f65c82ca81e3fc858ad3cfa343014a8426fd3806770f127e2041efb42e31506ce83390ac5d76de2fe1806df24ce6e4bb894972a107ef99e51e4acfb0e325ab053f9824514b5941ab1ec598fbb57a5d18ed34d72992a19215d914e34ad1a22326e493d1ff2da7bc271c96ad3ab66d0c32bd711293":hex:"":hex:"dd153cfd7aa946280660c445f586fa28":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,128) #1 [#2]
depends_on:4:2
9:exp:5:hex:"4785846f7c0524e78f3eb137fd433e1808af64549af69183":hex:"5334476a5fa3fa50dcc4b12f8ac00b51":hex:"e70f82d1e3361ac5a5c9a087e47984d5533ba296f9b7e4a192a4ab28a833cdbbd5cece3415cf6fbb2f8055560b5c31c98d83d139954e1c03a464739f1eb5ad982c4371cf20b8984bbd97d5f40b336f5e96df3d272b95f7547be15c3bc05b3caac7d08c5eb5de8bdd246e74f6caa6bff76ea0417730ce72b911867f88fdcf73a0":hex:"":hex:"c59231ddaae98e0e8db6b3fe8f4d3427":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,128) #2 [#2]
depends_on:4:2
9:exp:5:hex:"49b085fe1a8e1ae769ed09fc585d29eb24d589689992e6c5":hex:"899878b0684fb865d30190821817b88c":hex:"f789eafe3d02826b619ca4fbca7bb1919e5c6f7c33824a2f7f815dc50e329979705f7ef61e9adf7899d34f1b8840384ff62ef6d29eea38c45d12be9249aca69a02222cd744d81958c6816304ff0d81d6714a2023b3dd9d940db5c50afd89c52774d28d6afde2b6c68425b6acbe34682531a2e57e2b9a7729b3e8d96a729b15cc":hex:"":hex:"2c84bf7a8947ab93b10ae408243b4993":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,120) #0 [#2]
depends_on:4:2
9:exp:5:hex:"75847588760ecb6ca548747b743914c89fea367a5ccb81b6":hex:"7d8a9fd254e2061c01e39eb574951924":hex:"b03c57dfd49152401a225357f1d6e533f3a423e5cfce07b8ae7ca9daf68645e5bd67b3ca2421eac447530b27c6dc6bd9c7f1b22441b8cc8c4ac26cec2c9c0d665a35b66d779a3772d714f802d6b6272984808d0740344b6abdb63e626ef4e1ab0469da521c7908b2c95a0fd07437c0e9d4d2451ae189ad61ff19f4efb405127c":hex:"":hex:"e8aac14b53cdbc2028d330fc8d92a7":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,120) #1 [#2]
depends_on:4:2
9:exp:5:hex:"e3a18a96d2e45d2f60780dc39cee7160e28cb810bf09858c":hex:"26a4d659665ded39b7a1583de756d0ad":hex:"83f8d9c58169b4c68032321197077ff5c8ee4ebb732b040748e1b55dcf53375ae86fb9646a672b5c5bc805a92c475cbb6d0ed689a58abdf2230250a7d3fbd8cfab07835fa85e738a7f74bc3e93616d844b1ec61b79f23dfea62e1815f295d43f61d7b5956103b31ca88afb0b3d37eb42cf77232dbf2258065232971c397dcbcb":hex:"":hex:"dc034564d4be7de243ff059b5f9160":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,120) #2 [#2]
depends_on:4:2
9:exp:5:hex:"7be3909170ea7a2ff76f9f28241d8cc48ddeafa8517c6f8c":hex:"8dee7e29350c60c5bcfec89da6617d2e":hex:"f6e9e7a7f9716760eb43060d5c80236a0f118b0f750ebd5df01fd2dba95c556ecd2e54a3f337767321abf569c8137a8e48c5b44037ba62951e9f9f709e6e4540a36d769f3945d01a20a2ed1891c415a16d95cab7ddf9bcebf18842c830067509a2a5d49a9684324c433d53824d2f8fd326b149af17f40e5bf5e49185738fba60":hex:"":hex:"942b52277e9dc0a30d737d00f5e597":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,112) #0 [#2]
depends_on:4:2
9:exp:5:hex:"1fe413bafc4753e1511b580c830449bee56e0e5b9acb852c":hex:"e30829f64f3eda13bfb2ac572aceb3de":hex:"6c772d08b4d7507e35804572fa697c646c77301954cc5c160941e49e230697ed8c23338b9f30c3ead69b1c1a2329ff025dcd3c0d0a9cc83fee4979448aa71ddb9d569bedc8c497a2a4ac3b60d087d7872f0a110bf90493ae7da03b0953734223156cd2d6c562e4a978a6dd5cdb229dd58dd4d0f50ac015f2f5e89dac4aa29a19":hex:"":hex:"87737873b82586bb29b406946cae":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,112) #1 [#2]
depends_on:4:2
9:exp:5:hex:"b4bc4378d423931f9b320bb57df584c641406c1daa7448ad":hex:"eca70e10c0358838a3f4a45c4b016ccd":hex:"68d1c045c1604e3c3dd4f7c7543240aca8dbc5266dc18c5a8071e8b09e3700b7cf819044b2722d8db92021f42a0afb295d7b16ecf4e4704a50a527a2e72d7f53617c358e3b7be3d7fecda612ce6842fcfaa68f2d1b8a59d8b8391779f2fab99f820862c94029f444abe62367c5de0a4becc359660e4a5366f7d482bdc362b866":hex:"":hex:"06f95ca69c222a8985887925b15e":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,112) #2 [#2]
depends_on:4:2
9:exp:5:hex:"1cd4414ffd24e830e2dc49727efa592e430a6a75391cf111":hex:"a08e32ad7d63f975de314ad2c0fa13fc":hex:"20a271f1f4c6bea8f1584ab39a7179ec448650e2ff67a7338d1bc9fab7f73b2ce5222cd07ded947d135d9d0670dc368f0a4b50ece85cbf641877f9fe0ac6a7e6afb32fdb1b3cd35360bb80cfffc34cfb94dbcbee9ca5be98a0ca846394a135860fba57c6f0125dcb9fb8b61be681ada31a997638ee172525c03dd13171534a91":hex:"":hex:"c68842cafc50070799f7c8acd62a":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,104) #0 [#2]
depends_on:4:2
9:exp:5:hex:"9e0ef9ed5e6f00a721a9893e1f0d9079c5aa667a4cdd2a52":hex:"5f015fd556e87ff0d0df586fb452306d":hex:"b82986135e49e03f6f8f3ce4048ded2e63ee0c31ddc84929e022ee8561159179b3bb4403ebdafdf6beae51ac5bf4abed4dbc251433417ece3228b260eca5134e5390cba49a0b6fcbbbabb085378374e4e671d9ba265298e9864bfce256884247c36f9bddceb79b6a3e700cb3dd40088ba7bb6ab6aa11b6be261a7e5348f4a7d1":hex:"":hex:"ec9a79a88a164e1a6253d8312e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,104) #1 [#2]
depends_on:4:2
9:exp:5:hex:"9bc8f15d98e089d60d4db00808700053f78b33c31652c3e4":hex:"5cc0ff9bb7d5b9b2aa06f6ecf669d5bb":hex:"24ac95a6ed2f78853f9ab20f53de47e7f662f72aea454141e2131aace7ed2daeb395bbccdbf004e23ce04ad85909f30151b6526c1ce7934726f99997bbab27055b379e5e43b80ad546e2d1655d1adad4cbe51282643bb4df086deb1b48c1bd3ac3b53c4a406be2687174028ecf7e7976e5c7a11c9a3827813ade32baef9f15ec":hex:"":hex:"9779b7c3ece6c23d5813e243ec":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,104) #2 [#2]
depends_on:4:2
9:exp:5:hex:"19afc43a4481f796d77561f80b5b2e1514c96c5d1d86e64c":hex:"d4c06595fefd4a81bbbd4b40c2e1989d":hex:"98fcca51352998d0126b5539e3fb9a238ac31c05954fc206d381909aee70983b6ab99d3f3efe8530a1c3cfe3b62756321b1d0771a5940055eba1e71fa64f29291aa5e5b0af0fcc8e6f5a02688d9e93417225eded791a35217822ffb346d3fa2809b65abe729448316be30cf661137d3c0e49846cb0df598d90eda545afb64a5e":hex:"":hex:"ca82448429106009094c21d70b":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,96) #0 [#2]
depends_on:4:2
9:exp:5:hex:"b4fc31dcfef6203fdb296cc928c13b7df56bfe6f32583057":hex:"6308a78dc8f3c90442dc52196649c38e":hex:"2567d80c253b080c0158102558551445d8ce4d5ddee2014a2be5cbad62e1717a0fd4d2059447c3151192951eb11a4a7b19a952f6ba261c87f10f4c9032028de3cc5a2a573a4e993a690fc8954daa3ec92743e7343e75b646c4fa9cbc3fceb4f5d59bb439c23754c4d9666fbc16c90c0cac91679b6ad1bfe5dcf6bd1a8a67c6b5":hex:"":hex:"9d1603799e2485a03e7b05a0":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,96) #1 [#2]
depends_on:4:2
9:exp:5:hex:"1c2d9412486c381440213e1588b6bb58b0da53300b9d3089":hex:"727ed8846daab874d5a9918b47d016f4":hex:"656430f0c1423018b5e2efbb1e32a5385c1a9a1779c4dbd585dea91edc39ea8752ebfc2d8064251a8a5ae71e1845f24a7e42c6371c2ecb31e2229d5f4923bffc21d4804575a84836f3cf90ec6047bb360b558a41a975ece111b5284dfa2441705a6df54fc66ca6cc1af9163ecc46902fac337d5f67f563fde8e8e7e64b8588b7":hex:"":hex:"05ee6ce13711535864674a5b":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,96) #2 [#2]
depends_on:4:2
9:exp:5:hex:"abf7a97569427225a4bd5143c716a22e62f84c145bb51511":hex:"e255088cdfe8ae5c9fea86d74d2f1b7d":hex:"b850993300f54d078f83ceb9aef7345bbf758f92365b6625c210f61dad4f2a2319f51d883a383a706392d3dfca1706eba585a6fac8bd4294c0bb2cb3f6b454d5c97819e8e5c926754840261b07ec4ef1f87cf281d75c187839689944230306e1903047915e086043990745864819ad713d34a244aa4e9d755fdb137105d7eed8":hex:"":hex:"0c9c17388d0610f99d0a093f":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,64) #0 [#2]
depends_on:4:2
9:exp:5:hex:"45a6df655e88bc880acff41520aafd0cc8aa8aeb8952fd06":hex:"1125e1de94970c9e7be70e58e7626ef4":hex:"fe9838a445b8edef19b3e9f33c8c0c265b3a12c97b8ec57ceb94f65ae5227177de38f1e338dccb2b24e5bd0f0eb8127f83eba0f1ddfa55198789df0cdd1d977fcb985ad9c7d51b96e749d2cf3cc7a1ec4dfcbc641a1a022d55def328e081af890a7e699f2dbafdf506389e045aa1219239d5868ba675a3925602b6fb6f6e6d37":hex:"":hex:"1c3bd1e0d4918e36":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,64) #1 [#2]
depends_on:4:2
9:exp:5:hex:"279f4f2ab4b70778fdb9ca7800cd20e323601d7aa2c75366":hex:"0f7b402560735cf03d5da58de5b6c685":hex:"7dd9a8c848bbcf5127161c8a419a436a0dad559f7c1613cdf41594e177016acb1ccf44be852185c42e7120902a42efe83855995ab52cf5c190d499fcfd698c671fd72949dc3ea7ddb874e586a3aa455a021cec7b5f8608462ca66f926aba76e60a5846d4eb204155cd3c1328da51ba35c3007b8bb394f34e3a8b81ddd2ea1115":hex:"":hex:"dab612351f75e2cb":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,64) #2 [#2]
depends_on:4:2
9:exp:5:hex:"6716ab937755684af7403e6fba5452c1b11568a9047bb50f":hex:"2fd5a446dd564619ef75b6e00905ffe0":hex:"20d261d3192996c21da69e979c26f5f937e6ea4cb7b05c6ef556ce4d86ca0fe85ec2425d274c43b5212fe9d27bb48b04e887461a9f45f524059b87eaea2e287a8d4537f338b0212012a9d4b6610e8c97dd554e0b3c3133e05c14d0ddab3524c93fd527e223b1996b4cff0a4a7438f1d54890bf573cd803941b69e5fc6212c5d2":hex:"":hex:"f1d743b7e1b73af5":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,32) #0 [#2]
depends_on:4:2
9:exp:5:hex:"7dc94b5bbd6315ad8d2b67f0c683d10cf456f822a3ebb024":hex:"6f3eedeb57dcf12bfb3cd80849893c90":hex:"ee1ff367f4b23c156e3dccff84ae4bf2b8ecec1fb5ffd25ccaa93b6c6834389bd79655bd4bac75238eb0f65d3603ecc57c8774798309e85b6677e78ed2077b712cf28795d0dc8fee994f97373a82338ef67c62378136a79a990ecbcd6367445e805efa98f9168826e57cb8dd7e7b1d5c89ad98358646fa56dd2a71c40e0275a1":hex:"":hex:"4dc74971":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,32) #1 [#2]
depends_on:4:2
9:exp:5:hex:"3bbe223e253bf272599e28af6861013ecd0c88710947ed41":hex:"4fbf09ffaffb600f0de38fb12315cab5":hex:"5388146f6479f7b3b280f45655a95b847ee27c734fb2fd91f6c009b1ab1810c772c7435d3221069f9490d251b76e740147906ac1db1c209c175b21aa10881c44fb307d4d2900aa3b1d56fb0edb9f2a58505653a17fee350e12755b9656bc65c78c1593d5cb7178e29f82209caf53e60fddf725f6957cc9718bf410c4a0229ed4":hex:"":hex:"fb845ab7":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,0,1024,32) #2 [#2]
depends_on:4:2
9:exp:5:hex:"461877813acfe6e9979eab729b52e3d192b3236758bb6563":hex:"6985cf77b75a47a3978dd6412d59200b":hex:"385551854a89ab37063ba0ed911501b3d632153c5c2992e154c0a334bc36620476f11495437b842409e0954f7352cbf288d158bdbbaf72621ea2ce75b708bc276f796c5aa7fd0071e522c5f175a9e7787deef79f6362101aa3607b4588f2e1df7127f617c6073593a1c792b959e201e4a7a43ea8b1c3af026376439ef629266c":hex:"":hex:"c840d994":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,128) #0 [#2]
depends_on:4:2
9:exp:5:hex:"09770f9114120a2c1c3cc416fe0eb8699e07141158a5bdff":hex:"cff291d2364fc06a3a89e867b0e67e56":hex:"":hex:"875e2e5b5c02e0a33e71b678aa29c15ce18ec259cf4b41874893ed3112daa56ff2a7475681b8b3d9028ef184d30658e881c908f3588f69899962074db4ddfc0597f8debb66c8388a1bccf0ffe2cf9f078dc1c93f8191f920754442ad4a325985c62de1a57a25de4e9ed5c2fd0f2c8af33f3b140bac12bf60fdb33e0ec557955b":hex:"81f1eb568d0af29680518df7378ba3e8":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,128) #1 [#2]
depends_on:4:2
9:exp:5:hex:"4fbf1c785c087ad06b43d4163cf9b9396deffd3712856379":hex:"1c8f41424acaf009996ceaa815b24ad4":hex:"":hex:"96a690e5319c94d94923988025307e543f16fd970aec24524cf9808dc62b093359287251503f4231bf52cd1a16a80bfa82d8f585d96855dc1932f4919a92da2618d6448fc18a234f9acb386ab4ab4a9e38ea341e7c54faceff38c162d74e7fabbca13aadb71e9c8ae6072e7bef4073cf08aa7faaa6d639f98d15bad4ed183ced":hex:"9f3c0349c5a4a740a82d6d63bf00fb17":char*:"":hex:"6100b091e52366fb422251d9b68974b6c666a62a8bb77a1ffd7c7d1ae586a6ee763b84dc11aace02a25af91d194b70b3265ec46872fded54275b7ddb26ee1f20c857328f46a694fb1dce68bcaecbd587ece5b505d658d57d50333e30b639eea1f6537b37c175f62497c6c84e3cfddae214285d2d68d90dd5cd8ce2273d25c8ca":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,128) #2 [#2]
depends_on:4:2
9:exp:5:hex:"3e0ce4fb4fe4bb2fdf97b23084ff5671b9b899624184acef":hex:"a950ab0dd84115e3829ab0ad3bbb1193":hex:"":hex:"df89974b1534f0ba262bbea5efe39d8b72820cc8a720cc99520fedbf667515c3f6d8c3e25c72c48c1cff042171df58421741aacb2a49f23167257be7d7004d56b14901b2075eaca85946e9fbf1bbf4ae98227efc62bf255a25dd0402d37c67ba553531c699dd89ff797e7a5b5b9a9aa51e73ca2dacfda0f814152aa8ed8c79f9":hex:"25cfde73e7a29115828dfe1617f8b53e":char*:"":hex:"847b54e176ccc83081cb966efc4b4a3bf7809ce0b4885009f620f61fafcaa78feee91a835ae6c1a942571811108b1e81b4c4ddac46aaff599c14988c9a1fb9f387ab7f1357b581568b7b34e167ac2c8c2b2b8a4df3fd7ad8947a363c1c0cb782ec54b1901e928821cf319669dd77eb37b15c67f13ad787ff74312812731ca3e6":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,120) #0 [#2]
depends_on:4:2
9:exp:5:hex:"6be3c66b20e5e66ababbfba1b38e5a716eafce23a1767b69":hex:"3a2acf69bba19f5d1d1947af2cfda781":hex:"":hex:"de1cd978354a499415176f260021abe0a8c5bc34d166f53d20e02e413e1377ce4ef5d7f58337c62251a3b4ddea0dea23c40e5de037fd5dd8a558eb53bffa4e8ce94899afa8284afab503c1a485999a154d23777f9d8a031b7ad5c6d23d6abbe3b775c77876ad50f6bed14ac0b2b88fb19c438e4b7eb03f7d4d3fcca90dd01260":hex:"f826d212f7c1212fb8a8bf23996826":char*:"":hex:"fd1f7b56e5664cf4c91e58f7c50f6c5e98e42ca2e4adcc00348cee6f662b382ad4022da54a47d8faeb9b76a24dfc4f493c27fc0bc421a4648fad7b14b0df95d8752013feb033b1fd971daa2c9a5df898bece6a3b8fa078dd130071df20a68cd0f394be25dcbb3e85bdfa0df4797fa6f01f5f0da7a6e86320207ddb5b3be53ae0":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,120) #1 [#2]
depends_on:4:2
9:exp:5:hex:"d16abb9f5b38d7f5abba9dc36995ce6ce928ed822a07b7c4":hex:"3cd95429c6de1d327b9eb3c45424a87c":hex:"":hex:"e72f29b1fc1dbfc2d93a0f3b79ea4b9806ce9b2c4d490ac5c0c3c793df9dc7df5471e834b84d18afa5a7516f9a6a813a9b65ae2f083a854730547e28a1f60fe97d8dba1d2d433e11847b9bffd8873ec634e64365530c905dd6f274e45c9795ac127a6f356f63cc6c116c5dd8c628e7e17e1fadc58f8452bf21f53c4133198118":hex:"13521236f190f78e75c0897c5fb237":char*:"":hex:"cd8bb97c28df092b6783ef653fd26f2bdc27c442bab0a4c7bee2789f389dcd1b280c0231672721bfbbc939a0449557678ec61ba0afb2e5817e6f7d94387f84ecafbfa1216d65e7f5025f47b0d2905cff7c99adf8306a3d9850c5908be05f87cb1d36a4837dba428aac97d7fbc18e3778f8d81a319259504c87fc94bd0766ed93":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,120) #2 [#2]
depends_on:4:2
9:exp:5:hex:"0bc344b1a4078807e5f53a6e7e1e36fa83108473ae2fb4c2":hex:"bd505fcba464e6e2c58fdf29f5695fb9":hex:"":hex:"8bd73f94c71e3765bc7d17fdc90a9ba6aff9648b46300e4048985fbbd7c60c39c3766f7c524780bfc2296dc11e1132134921760a373104edc376eab6e91e9a60a5c4a5972935df12eadae074722bdc0147c3caf6a62fd449ef37d76b65f6d210283c94ac524cf13186e444d80a70b01e4373cc0462546f1caee6b49e738a742c":hex:"8510fff71bb879f56ea2fe43f6ff50":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,112) #0 [#2]
depends_on:4:2
9:exp:5:hex:"c8097398fc21f93eea6a95aa93a3231096817b65520bc549":hex:"776248381941e16908f52d19207881f5":hex:"":hex:"80b0abbaebbd537a0810ed75cd172d29d50f5982e4d01f8664ddb2dfda8f57fa0ed87e64a779a1d7f5e568b6acfdc739572a7176752307b430fb1fa1c3c2c346477cebe7d01b16745ca6c8929a7f446c03ad9a9e8a5a935de78ca6c701e8c1c5e6d2550c42949cf5342fb5ef4c6ab9bb02ace8388b16edf72a1237e5d1d0e820":hex:"7fc4388b2f8eab0f0c2d6a08527e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,112) #1 [#2]
depends_on:4:2
9:exp:5:hex:"76d4bb5694faaf344db83bc6d6c47d56bb6ab52700826f2d":hex:"603977845d82faccb401817ecce6e2fe":hex:"":hex:"9e31fda6a171f0d4a5f2af2c4f827b1312d9dda5d78fa329b8f1b6373b9b29be358601e5bb0d0c615aef4b9e441c811219f1f2ff2d0ab23e0cd829a88b5b615ee72e5e3ea604fa26cc6438ec4c30e90f7348e9116adf8e8efb7498320d2da16679fa546b1aa9afc7720b074c4e48e06862d41428c9e71a4772c2e195a6f36978":hex:"c955a3bc316841be07e406d289c8":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,112) #2 [#2]
depends_on:4:2
9:exp:5:hex:"a3e5020695587984074d78d9c98b8e1a5719e5f88372740e":hex:"4cd56de54e5140a587be7dfd02d3a39e":hex:"":hex:"c0bfe3b2dc4dad17ec5a7662d86847fb67e582cc0baf469bc9baa7a075d48a8b97521a1072c2798bfbdae5ca3752eda1cb96fe5cf24af989eb77a2948aae3d8b70d83d93f84c49347f788480f34051621c358c03cf8159a70fc72cb8bc02876234ffe76b181da8b22b8796c87b0904da1af46de519c20d8d1b1dc7cc24e39ba5":hex:"1a29527a41330259f918d99d7509":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,104) #0 [#2]
depends_on:4:2
9:exp:5:hex:"afe986ead799727063958e2ce13ca846f76c51605439f839":hex:"f85a95ed10b69623162ab68d1098de94":hex:"":hex:"7c1b354a5bb214bd95147e32d81e658705089c38035d0ea423eb1a5c82f97443c6903d2cf1ba7a007eec7c8ff98b8f82b073d9636a79bd47c7f2f639a8eb4e92076f9ed615766f43ac3a4f1687301ed7d507766605e0e332880ae740ab72e861a2cb6dce1df1ff8be1873d25845ee7c665e712c5bbe029a1788634bce122836c":hex:"3cf1cdb4a4fdc48da78a8b4e81":char*:"":hex:"a7f252ad7983e7083260598051bffd83f40f4d4a8b580cc2388d720a0979dde71549ddcb86b0a62c4964fca591d0982f3a203f2f8884ff4991f17e20f759ea7125ba2bb4d993722f23938994eb2709c850f33ed9889e5a3966f9d7b76add46aedf230e8f417425f9db79ccd46b5660361de7c5d87f71a9d82c491c0c3daaf56c":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,104) #1 [#2]
depends_on:4:2
9:exp:5:hex:"2cfaa215841826a977ae6adfdd993346210c49dd04d5d493":hex:"537a4ee307af3072e745570aaaadce34":hex:"":hex:"e8eb3b6edd0ca4201b49a6a83036445aba1a1db040f3e74511363bce769760a9914e05a067f555ca15a57c6e02e66fbe4e04dd8c8db8d6d14ebc01cc7d84a20ff0aacb69bb3679d6b7d9d2e07deda7c2d4fe4c584fe1166e78d21dc56b9cdad93709c03b9145b887f87b4f605f24f989d5e0534fc71a58e8a8619ee99f69e5f5":hex:"df01cffbd3978850e07328e6b8":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,104) #2 [#2]
depends_on:4:2
9:exp:5:hex:"128ddc83d2170c403a517615056dceec0d19d6fd7632e738":hex:"5124b410c43d875eca6ce298c45994a7":hex:"":hex:"cfe9f7797ee37bfc4f564419bf2268c964479efa7435970874154432930f3b2736438da4dc9c76200009651340e23044bc9d200a32acfd4df2e1b98b0bae3e9ff9d6e8181d926d2d03f89768edc35b963d341931ac57d2739b270ce254f042b64ceac4b75223b233602c9a4bdc925967b051440c28805d816abe76fc9d593f5a":hex:"56ad9c1653f11a41fd649cccd8":char*:"":hex:"cf91f087fd7faf362caacf4a68cff51ec57b3075563e4ad0955df20b366e92bd75c3762cf4a6f0eb859872667a5c55aa5d94f5ac9479b1b9c9345b50f82379d551506a2ab02b0441b14b28b78a12b38500d703a8c19888fe612d4710eec7cd18c16d6a4b55d3c69760e2bed99efc8b551dbe2ac9b9b64715f87180b8e14d1795":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,96) #0 [#2]
depends_on:4:2
9:exp:5:hex:"98581c28983c4da321ce0c419cc0d476d539e77da513c894":hex:"ff10234524433b871202c2cca6acb194":hex:"":hex:"bdef5b65b5111b29e781a6b71a0160179c52b5bccb1ac5c0377b26cf3f61432f3ccd67633a836357c24b5099db0510a7f8110f59e8227cacd11f17ea1798b5d4d68902ca6c6eccd319fef14545edd135078b38d43b61c9af269fc72f7a209ba7897e4c6dbd21bb71d7e93d2d2426ffa1557cae28e74059d3baf06ba419a47b39":hex:"984943355a7aef15c4fb8033":char*:"":hex:"808e28bfd441cb8890416a757d252c986daa8d607ac9cadd2f4fd29eddbcf3b859ba298e14a4ccefe2c2752b123f87b98d6708fde48faca4bc7dd818a7ea76cfa4357932e59cb6be0e9283bdfb49454b86b9fd04aa8cdef503c65d13fcff42e9cd8f142f8c06cf7daa6d8ef8b9c9d69c39e8afd980048fecf731fd674b2a814b":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,96) #1 [#2]
depends_on:4:2
9:exp:5:hex:"167b8b6df8014c8f3de912b77f5a0c113580aa42d785298f":hex:"49da91e926091a448d57d521cc90f3c0":hex:"":hex:"4f787de12ba907a589edf74c8e7a6cdaaabebddd465a86e170e1efc289240298b516fddc43c7fd9bb1c51720a4455db4dd630b59aebaa82bd578eb3cb19f8b23ee6897c1fefaef820430efa6eb7d6ff04de4d8b079605fb520b0d33e96c28f0cd71983c4ce76c0ea62fd7209d21ec7b416881d545824a73d1f9f8d3323fdb90c":hex:"99198f55f9fa763651bba58e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,96) #2 [#2]
depends_on:4:2
9:exp:5:hex:"71f5f8505fba62f08fa0557dd5407fc83a852c6007ccecc8":hex:"b5efb9feae3de41b5ce9aa75583b8d21":hex:"":hex:"3e19ec02365e450e946123a3362f9859352eb52902a6bcb8a782285dfac9d2b282f56302b60d6e9f53fddd16bbf04976cf4eb84ef3b6583e9dc2f805276a7b7340dec7abde4916fb94b0ed9c9af6d4917b27e44d25f3952d0444cd32a4a574e165a23fa8c93229ceb48345171a4f20d610b5be7d9e40dcf7209128f029fed6bf":hex:"9604d031fa43dcd0853e641c":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,64) #0 [#2]
depends_on:4:2
9:exp:5:hex:"4cdb38f8185a4186fc983e58a776a6454b92ecf0bffefe98":hex:"aef257dd44d14d0bc75f9311ef24e85a":hex:"":hex:"1ca72c50a093076e9a9dfa09888b9c89eb36a942072fc536a81713f05a2669b39fdb2871b82ca47dcaf18393ca81dcb499aafcc4ed57ea79f8d4f9bd63540610215b2c65481b294638cec41264a7fdca4230df5fe1e7e3d8d26dcd0c435fec8e9bf778f9e6f13482157a9722761601e08425f6160d3bb626ae39ee1117b0353c":hex:"d951becb0d55f9fb":char*:"":hex:"2eaa7e922dbd8963e2078aae216636276f3f7cb5d7f35fa759e91bddb6e247a93c388241ba1d0d37040c0b9e447c67d35b4991c1acce97914f3bc22ee50171bc5922299983ee70af79303265bc1ae1e7334202460618b4a8891d1a7eaaac5cac1e4dce024ce662d14849993f89e771fb873644b552120fd346250df39aaaa403":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,64) #1 [#2]
depends_on:4:2
9:exp:5:hex:"ee8d3aced3aa3cb2166aa66c4a252c12dc0978830d0bc75b":hex:"c15c9c0b0b70c7321df044bfde2b15fb":hex:"":hex:"ee69b2421d43a9f383d99f9802ba4d6cf1c537b42041c86cce681049bb475e5098d4181f1902b0a49c202bf34ef70ea7b787fa685ab8f824fcc27282146d8158925bfef47ccba89aa81c0565eacb087b46b8706c9f886b7edf863701003051d6fb57e45e61d33412591ec818d016eec7dee4254636615a43dacb4f1e6ec35702":hex:"c5c9851a6bf686d0":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,64) #2 [#2]
depends_on:4:2
9:exp:5:hex:"4a8538d609444e3197ab740cd33b66db1cf53600096b94e0":hex:"0bd64d222532dae8ab63dc299355bf2a":hex:"":hex:"8c2b8fb775d1b21c41a3dcf48ad6d68ab05be3879f9b94b305a6ce4d799e3a992c1c3a65a3e4eab563edb57424927c90c76e49386e29dd5e7de2800fcc0eefbc8b4f977f71be3754c006ee93dc09b1cfa59c424b6b3987aeb56feefc21004c63e8284b6845e395bc8843cca0917267fb4a8f2db1f7daafe7a9da95083a44de70":hex:"3477cad1fd4098b2":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,32) #0 [#2]
depends_on:4:2
9:exp:5:hex:"447f0f065771b6129952e52206a64fe0844658ed685e39cd":hex:"37e3a300542d9caf3975c6429cb8a2e8":hex:"":hex:"fea5d227869e527882c63a68a6623f4a699df82b3dc715c7260a5554336df8376744c05ae89ec27d40da02d9f1c5e9e29405579fd4132143cb21cdbe3edfaaab62128ecc28018725c8dd309d2376223d2e2edfea9765699b2630ff5d9fe9bec416c0ca6418b938d195d31a08e4034c49d79e3a249edd65f985230b33c444dd02":hex:"06bfca29":char*:"":hex:"e1bdd1c212b159b87e41a5f64dcba6b27aa0f5c8871fabfb588df0e06bd7730ec1beb0e3388f96c992a573ff69b34870f83c53fb65b420c1c6f92e2aa6f03917e8203d77c7f5ee08baf9fab12f9d38fc0ffb83807ba781c3dd7b62edca2121f68ef230b42b8adbd4cea072209d02713789ed559b83739a54cfde69e68bdc4128":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,32) #1 [#2]
depends_on:4:2
9:exp:5:hex:"f465e95f6fc19fe6968b98319b547104d0c01c17105f8fc0":hex:"6cba4efc8d4840aa044a92d03d6b4d69":hex:"":hex:"2426f108368a00d2a49670a3b64b4f0569c6da9660163e7b209ec3f8d058ee11f7818a8c5030c5f4ce6e1e5a93faa3e5ae3d0bd5d712fbc891cfeb20845707edcf5e29719a5246a3b024fb12d37bd1b81df3812fd50b1dfb3e948ce546dd165cc77f903c07fe32bc7da7fbc25036679017317ce94cd8a00c1bce7379774f1714":hex:"92750ac9":char*:"":hex:"2e59b104c1a6f6d651000396adbfa009bf4cf8cbf714da8e4d3b4a62bd7f522d614decf090c7552a4b9e8d7ee457ba642d5100c0c81c14cbba8c8ff49b12827f6ebd41504ccb6dfc97cdf8532d1f7f7e603c609efa72d2ae0dce036ec4ab36849a0c06f8737d9710075a1daaed3867ca0a7e22111c0e7afae91f553b6fd66c6e":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,0,32) #2 [#2]
depends_on:4:2
9:exp:5:hex:"f08e3e9f7b3a20ccdc4d98b56f2b567399a28a6b3908deab":hex:"4f4636d1b283bfa72c82809eb4f12519":hex:"":hex:"a986e816f1eafb532c716a555cca1839a1b0523410134ea0426ab309520b339fc1fdeb40478ae76823cee4e03b8d3450e6be92d5ff17b2f78400f0176e6d6a3930bd076a7a3c87c3397dcc0520c6b7b4ff9059ea21e71c91912a74aac2ca70eec422b507cc5c60860bb8baca01eec2a3003970ba84011efe576804b2820e306c":hex:"16c80a62":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,128) #0 [#2]
depends_on:4:2
9:exp:5:hex:"87b5372571fb244648053c99405999130f87a7c178052297":hex:"a1cc81b87bd36affe3af50546e361c9e":hex:"684ce23f59632308d7db14f7f6eddaf4d83271fb0c27401b09518a775b36252540f14305f0dae13ff6c0dc565c9e570759e070c8ac73dfb97abd3285689a7cdcfc941f6271be3b418740b42ba4a114421065a785be3dfa944c86af56da8209779e8736e62529c418b507c6d8ae002cbc0431747722afd64521734f99273de455":hex:"ae078d1554fc6a14447a28c3dd753e790f7ef9b53e35c3e0fe63a7b1b326bc56034847f8a31c2d6358049aae990bfe7575b439db370aa515e225e0ec730488c700a7b0a96a7b8e4e8e4c6afec20decd16fe3c0f3f8d7a6cf7a8711d170829d14c706cceb00e133b8c65c8e08cd984b884662eddd2258ce629abf6b9dd28688c9":hex:"98177b3428e64bc98631375905c0100f":char*:"":hex:"8be7df33a86b1162464af738de582a357d0ce8e213bba1b7913c0d13ad759d62c3bf4366f5130b3af2b255b7ad530b4977627f9e76b07e360c079d0f763dabbd22e976b98cd5495c6182f95bc963aad4b719446f49d3a448d11cac5bfcba4b675b8e4d88a389e2580e8f383f95bf85c72e698680d2a2bc993c9ee1ce0d1f1ac3":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,128) #1 [#2]
depends_on:4:2
9:exp:5:hex:"a2d069b826455d5e79e65db4f1d2b6a29ae9f401bc623917":hex:"6d40a0c7813bc0410ff73f19bb5d89c9":hex:"9960376b1898618d98c327c1761959d045488cc6198238bbe72662f276d47b41e8aebc06dbce63da5adcb302a61ade140c72b9cf9f6dfad6ecedd7401c9509fae349d3c7debe35117776227ba167f2b75921d7321d79f4ebca13d20af1638a1567043365f179f4162795fe4fd80b5d832e4ca70e7bf9830bc272b82182f70d2e":hex:"acd6225dc5b9109d56ea565ab38dd4db432a7ec08f0db04f1c6b691c96d2eaaa6be62da7cc7fd75f931716c7f39705ea7cf828f1a5a325955e9b2c77e7fb2d562be6a89b3351b1b3d1355b43b73ed425049430314c16bf0836ed580e9390a3b8e2a652fddbfa939ca4c3c99765b09db7f30bf2ef88e1aa030e68958722cb0da3":hex:"010195091d4e1684029e58439039d91e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,128) #2 [#2]
depends_on:4:2
9:exp:5:hex:"f3252351fe8e7c628c418c1a49709bf1f8e20add82539948":hex:"eacd2b1c3cf01bf4ea7582d8ee2675d5":hex:"141cb39a2fb8e735e0c97207f1b618a4b98f6b9bf8c44a1c8e9ea575a7759cc2a02301274553e7744408b2c577b4c8c2a00e18f8717fd8a6d2f46a44eeb05d685fbef7edeb4229e7ea9b8e419ffcb504d33583b3ae421c84caeca9f9789047dd7b1810318d3765307233567bc40e003401c9f4e1b07a2a7162889e1a092aedc1":hex:"7e8d2816d280c91d232bad43b6610e2d0532a9f670f221a3a975fb16472c2e83b168115e87a487bcd14b37f075e1faa59c42515c353cdefc728ac617b7d273fa96778e3fb5f7a1132f8e2add4a57015b15d1984338b7862356243d1c5aa628406f4a507498eda12d2f652c55e8e58113ed828783b82505790654f036b610f89a":hex:"63a310b4f43b421a863fb00fafd7eac4":char*:"":hex:"699c146927ae29025e5b20088b20af27bc75449e4725ee6b7d5dc60b44ba8a06f7d265330c16060fbd6def244630d056c82676be2dc85d891c63d005804085c93ce88f3f57c2d2c0371c31027d0a4a0031e3f473cb373db63d4ff8f65be9ebe74045de813a4e6c688110d000f6b12406881c08085c9348e1f0315038907e33f7":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,120) #0 [#2]
depends_on:4:2
9:exp:5:hex:"e462957f2c500bf2d6bfa9af97938fdd8930e360ea4175e7":hex:"b380584a3f4e0e59add4753c282f2cf7":hex:"682b0af6592eef173e559407e7f56574c069251b92092570cbb7f5a2f05e88bed0af48dcda45b2930b1ee7d5da78dc43ec3598a38593df7c548058eda3c9275c1304489aff95f33a6cd79e724e8d12ca0ae92b20273eb3736efcd50dc49e803ad631dcbf64376a45a687eb4e417aef08a3f5f8230d3f0b266ea732c21ed2eed7":hex:"82a7a6dd82a5ea3d9a8e9541d854978487eda298b483df02b45c76b8b38bac98ffd969dd160a2765595b19d4ea3e64351ce95764a903f595dd673d13facf5a5594e01be1d60a0c6d28b866a1f93a63a74fecb6d73ac6fb26b20c008b93db53e9dc1d3e3902359fd47734fe22a5c6958f97e9001cc4e8b6484d9542dbbdfcfcdc":hex:"28a43253d8b37795433140641e9ffd":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,120) #1 [#2]
depends_on:4:2
9:exp:5:hex:"4a62ddd87f41c6df756e8da0985dcd8c91e73ba395b3d79b":hex:"1d1843e2118772d76a0244a2c33c60bd":hex:"028b92727b75b14cb8dfeb7a86a7fec50cd5de46aa4a34645754918b8606819d4bf8a2e7531a05ae5505492ca6cbc8c0e6d6ab2dea23bff1fdf581bb780b4a3312aa39639383fd10bcf92489801954733f16b021c2e84809345216f8f28a99773341e40c4a64305a2098eaa39f26a93bd556c97f02090e1a6c181a4e13e17d3a":hex:"37a83ee6dbdece212446739ea353cb957b9aa409c88bee042bbc3a6e5199aeb28f2b4b00ff433c0c68d6db5a197566019db8a4c7a792e2839a19a302ee02bee046adce04c1fbbd5b0c457d7cbe277992ce2c153d132269e2d1f12b084cf3026a202b4664bc9d11832e9b99c7cc5035dcfde5991dd41aeb4fbf8bec5126a9f524":hex:"ab738073228bdf1e8fd4430b5c7d79":char*:"":hex:"e702f1bb9a1f395c74fca0ce9cdf29e7332c14acaca45200cd432a5767be38929ef8de43d0e1a5e7300c1eb669ac1ab997b31cb1403af8451e77e63505920af0f8c3abf5a9450ea47371039ba1cf2d65a14fa5f013b7ce1d175859404dcf6461a36e8bc260e7abf739d8951ddf1a3754e2d65e0aa31320a5ffca822023bc0906":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,120) #2 [#2]
depends_on:4:2
9:exp:5:hex:"fc46976d38a581a7042a94ea4b5bfe3587ddc65d1162d71e":hex:"b5e92563dd0339df00b7ffa2239d21bc":hex:"7b6f6e104acbcd7188161477d8e425ff99add22df4d22de7f28d0a0075ca4ef848f68d07ed22d3165c08e40890ce04d1bd05b1a6ccb2fec8193d5f7dffc93d97a0c036b3748f708b011b68247a0249b9e1a60b652164e5c2fd7210377de804ac010c8aa08a11f40af97e8370a59f936cd14c22ea7a236d904145adc04a241fc0":hex:"4b9e858fc8f01903e426112192d4ae4686b1ae4d683b75afb2b8c63590275943d0d6d6a23b6d35796a2f101203acba107474ca6f4ff6dd87d6b77785ad1d160ef2755d84092dc70c86db5e639b689943b15efa646aff44b3f51f5d3f4cf6c8f7fc5adfe7bf2d72f75b93b8ee94ef3fa69ea0fc0bb77b3983901fdcd30bcd36f5":hex:"d4356cb417953b01f7b1110c8aa3eb":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,112) #0 [#2]
depends_on:4:2
9:exp:5:hex:"403e49feadd4db763652ed5c4b1e12680cfe0abc30f4696d":hex:"1a60258a56e15f92814b4d372255a80d":hex:"a4ffa9e3c612103224c86515dad4343cbca7a7daf277f5828670834f4d9af67b9a935c71b2130dfbc929c4409bffb7974ffa87523b58890770439c33342880b33319c626bf776c1c0aeb9c2a348a7681572f4ff711d94c192f3450e8b1275f9d02c742a2c9f1da316e9918bf787f22699172986cb9b10fc56d5f6b8392ff92b8":hex:"221c61d769febce3913bfead9a201a805f11005ddcac185cbae00ce749de9c4362889b1b0d9546e91598e0ddedb88b673a90acca65d7e71a85636be052f361839a646dc8b834c02f3e2261d370e6bac9636b7536225b5ea77881200c8a3450d21bfd1e11afb3a470e178ecfe944a25a7cd0254e04a42b67723aac8afffd56fee":hex:"62646fc8bfe38b3ba6d62f9011e3":char*:"":hex:"5c76c90dea7d659804ad873960906259fbdda3614277ec575d9eec730e747a2e7b9df6716b4c38d3451e319eeecee74d1f4918266fc9239de87080f1ad437b47c6904ed2d5514161ad25e3e237655e00e53fe18d452576580e89b2f1f0f6aa7e40a337fd8c48d690fe013a67264a80e9b5dfd009a9152d559aa02a68f401a09b":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,112) #1 [#2]
depends_on:4:2
9:exp:5:hex:"c3471259512d1f03ce44c1ddac186e9a56c1434a6ac567c6":hex:"50164c63d466148ab371376d5c2b6b72":hex:"11d1f523888bea1fbc680d34bc9b66957d651efa59e788db3d3f6f50e72184b9d14e9ff9bc05fb687520cf423d681812e007025eedf0e78e7e8191e6b62404e8eb400cf837d762a31aa248553367263d6de091fcf7abedc3e69fc118b7efb0594c89b96c387b7c28ed9a7b75db60b6b5133949b891ff81eca5790a265f12a58c":hex:"dd5b98b3b3cf03fb92be579068a885afd984630692eb5f155fa6b49f2b1690b803d34b90e8de3cc39c2e61650ffffb51e7ef36d35ad17dc4d91f336363b0734996b162b509c9954cab3dd959bde7e437e9100d84c44104c61e29dbe12492a0272ce6eea2906d390de7808d337e8c650b3301af04a9ed52ab9ea208f3c7439d6c":hex:"6c5f38232e8a43871ab72a3419ad":char*:"":hex:"50438ee712720abf2089331e4c058b30c30c3d17834c507c0010ac3f974a256d01b14a45e9ce5193c5cede41330cf31e1a07a1f5e3ceca515cc971bfda0fbe0b823450efc30563e8ed941b0350f146ec75cd31a2c7e1e469c2dd860c0fd5b286219018d4fbacda164a40d2980aa3a27aa95f8b8e2cd8e2f5f20d79a22c3ff028":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,112) #2 [#2]
depends_on:4:2
9:exp:5:hex:"ec326a1e0fe6a99421398df4fc7d8fea67b67e5f5fcd50ad":hex:"c94aa4baa840a044dbd5942787a0c951":hex:"f8401c578f20d9c250ea86eb945184e007a0190462c7abddf238ce1ceddcc230756aa222386d8ba66ebbba13de008ced140896ac55bc47c231cc81370ca9feadc225e017d59890e6291cc4cca27db3078c0cd6cbb51afb62210226a76837c5454728cb5ce3afe7352e7fe75421f94986e6b7b26321bbca15c75ac7c13dc15f50":hex:"6d5016c434a0f4b4a5d9e0b6b8e2d848a94f132f055d2d847e54601a4c9cfc5966a654d696f8a3529a48a90b491ea0d31c08eae8ef364f71f8ec7ae7f7e39bb9c331137b2578362ff165628099944ba8deb0d99ac660d5ed2215b9a7626ff1fa6173cd8dd676c988d16c9cf750a0d793f584c3c8f5fd5d167bc278f4d77a629c":hex:"3269922affb9d767f5abe041cc8e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,104) #0 [#2]
depends_on:4:2
9:exp:5:hex:"a7ef81652f604e88a72416924c53979dc73cadd3575eda1c":hex:"0cc9ae54c9a85f3e9325c5f3658ab3b2":hex:"d0195b744351aa25a57a99df9573dfa3cebe9850139149b64f7e4af37756a430dda8af98e4ed480e913aa82821c01c1f75b187e105a8f39621757d522c083a8d81d7d8bfe6cf15c439d0692b6affd655a11bcd2457046fae996a1075c66029867b88cd23c503ae04037dd41f27bafd5000d1f516002f9fcc0f2500e8c1b27de0":hex:"9ecd19a8eba9fba843486e1bbfb8d9053c5e04b24e30174d4aa89d8307439d653f8630edddafd51719c744bcb4bce3e444847567bd2cdde2995870d0634cc0ba2bde4b6bc2bc583062fb83874a1c25b50aeb945bd109a151772c077438c4d1caaeb5b0c56390ac23c6d117f3a00fd616306fc2ffc4c1e76f934b30fbbc52eec2":hex:"22c2efeddfd5d9cb528861c4eb":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,104) #1 [#2]
depends_on:4:2
9:exp:5:hex:"605271a41e263c92dc14fe9df5203e79d58cc2d1289dc361":hex:"7f128092a777fc503adc7f6b85eb2006":hex:"aef9f984fb645e08d5f0aa07a31c114d2f8e9eca047e4a8d5471378cfc2ced1159dc093d174788e58447a854be58942ed9a3fd45f3f4a1af7351e087369a267797c525f134e79709097e733b9003b9be0c569fc70ee3462b815b6410e19954ce2efac121300c06fd9e00542a9c6a5a682fe1010c145acbbb8b82333bdb5ddfd9":hex:"2bda3448a283ecba31e0299c0a9e44628cb2b41fa7b1a41107e107cabc381083bdbe048f2804568fdd5fe016f4d607f694042a459ba03a2deda4cccc8cbe4612d8ed0d4575e48bc9f59843369dbe2af6d048e65ff4250e1eef61d7b1b378fe2f3305b133ddc7e37d95ca6de89a971730fc80da943a767ff137707a8d8a24329c":hex:"673afea592b2ce16bd058469f1":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,104) #2 [#2]
depends_on:4:2
9:exp:5:hex:"fa076f36cb678e2275561e9553ebdf397360e5a5e44791c4":hex:"1ecd53d94fe287047ff184e8b9b71a26":hex:"5ff25f7bac5f76f533f9edffdfd2b2991d7fc4cd5a0452a1031da6094cd498297fb2a05ae8db71cb3451e4ac33a01172619035a9621d2d54f812ef5343e14b9dedc93838e4cf30e223d215b4d2476ea961a17ac7295069f25b2a12d6e2efe76d91f45632c6d4e61ff19a95d5ae36af960d95050ce98b5791df0b7e322411c884":hex:"513305e86c0cb046c5d3720b25a406392766bd1fb7de2758de370ff2e68281e211922890c61f3659460f22c45a57895b424441262a3ba0606df4e2701f38281fd3436a4d0e0f8efecd231808a9ea063dfb725015a91f27cadfe7909a0ee109eac391ac807afed1767ae0515b9c1b51ae9a48b38fe7fec7fe0ddee562c945e5ae":hex:"079e8db9c3e6eddb0335b1cf64":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,96) #0 [#2]
depends_on:4:2
9:exp:5:hex:"ce9dafa0e7e53a8766fc0bc38fba807d04e14e5ed61bc234":hex:"fd0751af49814ee98b2b0cdf730adaa6":hex:"1cba488a0fc8a012f9a336cc7b01cbcc504178eeb08237dbedbc6c7ac68fdf3a6742751a207e43d43068abf6ef4e12a5e3c17e5a2f9398fc04ced67377cbb858fd6020fad675a880adb249e4aba94b96efa515d1cdf5c0c3071a27a3245968867ea94b2bfc2028a67be34c84c3f475944497aa8ca1ab009f8e4b11c8308c1996":hex:"b585b8bf634757dac015f2f69f2ae674372a664f2115ad2d03bd3e0c335306b02d0947d3cda5991f5c0c25f12ead2c3cc2d65d575fd67091c70bc93ddb4b1e21f7b0fc6e6ae652dea93a6564ff13489f927942e64dd94bf8f821c7ffdef16df58bd8306a957821ac256da6f19c9d96e48eee87f88acb83bae05d693b70b9337b":hex:"e5dc92f4ad4000e9b62fb637":char*:"":hex:"95f4324b0656bef19eca5570548fc6a7a9923f4e2a7e42066891bc132fd73bc1c9089755d996756de0072824e69c43f2db8ba2bf6f90d3c4eafc0721ceaccce1af896f9fb15fb19c4746979b6d945f593fad61d550f81d12b5945ed728c02931d7f8d917285c22a3af748d75a6bf163fddd84b941d8564c1a63192c816ad6d6d":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,96) #1 [#2]
depends_on:4:2
9:exp:5:hex:"8a328554fed68dc4838fbc89fd162c99ec105b36651abbc9":hex:"e4f7c69a1d026eeebfc45e77bd7b3538":hex:"e349dcedb0bfcc771c820f0d510b80cef32ae3326484e25aa183015941e7844bc46f617d5e61fd64fa71759e90fcb72ae220bcd507f0fb389b689dd3fa29b3b937eded85f26ada9e0f3f5109f82fef47c7eba7313049750ad17969e7550c0d4093ed18ee27843d082bcee8bf3fc7833d569b7723998595a5a1d871089fd238da":hex:"75986f56972c045c850ed68aeb229f203b228fdfc36cad6b16d9bd12037c48700d20d8062a983ffeca76b8d36a67ef51bc8853706e83a34e4e23ff4f4a4eb943f19dbe85e454043d7906be6587a85079f9ccd27962d2905117d2dbeaf725d6ffe87bef52b2138da153ef29b18065b3342b3f9d07837d57b8bc5f2597de06c54f":hex:"8e8320912fff628f47e92430":char*:"":hex:"a1ed65cfc7e1aeccd0531bce1dc749c7aa84451ec0f29856f12f22c4105888c7d62e2e2fc8ad7a62748610b16e57490f061ad063c88800037d7244ee59e109d445205280473390336d7b6089f3a78218447b1b2398c4d0b3aac8b57a35891ad60dc1b69ad75e2e86248ceac7bb4cf3caade4a896e5ee8c76893ef990f6f65266":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,96) #2 [#2]
depends_on:4:2
9:exp:5:hex:"6e7f6feb4022312de5c804ed1d7a37580d74499107f8cc8b":hex:"6ce13485ffbc80567b02dd542344d7ef":hex:"c6804a2bd8c34de14fe485c8b7caa2564adaf9fcbb754bd2cc1d88ba9183f13d110c762a3c5d2afc0fbc80aedcb91e45efe43d9320075420ee85ab22505f20e77fa4624b0387346c1bd944e9cd54055b5135c7fc92e85390ecf45a7091136b47e3d68d9076594cfad36c36047538e652178c375a2fe59a246a79784577860189":hex:"4f5bbdf575ab8f778549f749f2265e17dc7225713e73ee6d7be163ff7071557dcc2240b0705c079008605f81396414ac64f06b1b637876e04c3fca8d0fa576cef4dd3dc553fd6808eaf120f837f9bb1d9dbbd5cf67ed497167fc7db89d3a84151b81aeab0e921057f121583df5ed7f976b206ece17a913f23485385f64c462a8":hex:"974bd0c4a8cac1563a0e0ce0":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,64) #0 [#2]
depends_on:4:2
9:exp:5:hex:"46d6e982feff0e7d04a84384c56739b69626dde500e4b7fb":hex:"71a6d1e022a6bdff6460c674fb0cf048":hex:"67a8455c7d3fbfdba3c5ec5f40e0be935fbb9417e805771832ffad06ba38a61b8377997af1f586dc0fa1e3da0b39facd520db1f0ec2bdf1904a3a897f0b507c901fab30a85de51effa9f7d4703ceeb2ca72abe0bd146ba0bd3ffdee11628310db7d65ea1343b018084ea2414995f86fefb45ba91a9dc2236d92078b4305671b5":hex:"a5160fb2d397b55a7eba02df33a042404188f02f4492d46f4edc03fc67723d64f5f7fed3a60728438703c60454a30f473ac918ffc8f98be5c5e9779ee984415e415ce3c71f9acc3f808d215be58535d3144cebe7982b9b527edbe41446161094d6fc74dec2e0a1c644bbc2cf5779a22bd4117a7edb11d13e35e95feeb418d3f0":hex:"84f1efd34ff84e83":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,64) #1 [#2]
depends_on:4:2
9:exp:5:hex:"991dcaa2e8fdad2b4e6e462a3c06c96067ef5e9fb133496a":hex:"978913d2c822ba7cc758041d5ee46759":hex:"5a94dc81af011a8af263318b60215b9752292b194b89f6fc013b0fe8e29133de631d981862f2c131ee34905bd93caffc3b8f91aeb0264b27a509e5c6a41ae781209f8c5895d0d35b3c5e1ae34a1a92a2b979e0e62132051394940ea4d9bfffb8d89ba1e8331b15bdf05c41db83a57745a4a651a757cc8648acdcf850a2f25367":hex:"9cd0c27f0c2011c1ab947400d28516c7f46d22a409a18fd35c1babf693b8030dfd7822d9ba03bb8fd56a00f9c7149c056640dde690889d2f23978eeeb28ccc26e2fc251220a3682c963f5580c654c1a6736cccb1b8ed104ec7390021d244bd9f92abde89e39a4b83eff8211c8a6259bd6ac2af1da7dfb8cf1355238056c60381":hex:"15d456da7645abf2":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,64) #2 [#2]
depends_on:4:2
9:exp:5:hex:"f29cff00781f5916930f125489c87d21f6593324d1506f65":hex:"50db7ee25a9f815c784236f908bfd7f2":hex:"ec1482e18692bcd6894a364c4a6abb9c3b9818bb17e5e1fc9ec0b41702c423f3a60907e94c888fad8e78f51e1f724b39969ba7b11d31b503504b304d5c4b4cbd42634f4ec5080a9fe51c82e121ae191270dd2c307af84c82d892d982413a50ccce33698054f761a3fa93da9a1fca321296b378a50d458ba78e57a70da4676150":hex:"a3e8595747b7147d471ac4fe38014bf4a409931e3f419ff88ae249ba7a7f51bd0ede371bf153bab4b28020b7a82a8ca30b75f1e3bcfee3c13db813cbc85138ef05874dedb14a6e5b6d06d7589a83bd5e052dc64433a8e24c1188b9470ddb2536d13b4b7bff0c5afcfaa9aa0157c3aae3b1774df2df14f965d6dee4332edba67e":hex:"a1e19ef2f0d4b9f1":char*:"":hex:"eea18261a4de31d8619e77005ebbb3998c5dcfac2bc120ae465e29d6b4c46de7e6c044c8b148ffe4eda7629c243df8af4e7ceb512d5751a3ee58defb0690b6f26b51086dedfde38748f6f0bbe6b495f4304373188e5d2dc93461bd51bf720149a7d3aa543623b122b9af0123b2cdc9020136b041a49498ec4aa696c2d3c46d06":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,32) #0 [#2]
depends_on:4:2
9:exp:5:hex:"2087e14092dad6df8996715cb1cfca90094f030328080ffd":hex:"d30504afb6f8b6ac444b4a76115d79d1":hex:"d95845d268c8d8f9135d310c39e30f55f83ef7ffee69e6ba1f80d08e92ed473b5ac12cc8f7a872bfc8b325e6b8e374609c90beaf52d975f71caeef5ee4c13de08dce80d358ee1cd091faea209a24e3392adcfe01aeb2b2e1738bc75d4a9b7cd31df7f878141cf278d150f6faa83fb3a2fd1225542a39c900606c602f15c06a4f":hex:"6d039513061980fb195bdf2f7c7079ca4b7e0fdd50d948cbfab5ba10b99e3aea27f08abd000c428851de82cacb0d64c146cd9567e9d55b89819876d6a635bd68bcaf47ffa41e02d9ee97f5a2363bfe6131ae7a21ea5130ae953a64d57d6cbfd45260c5f1946388d445ce97d23ab7ba31a5069a4896bc940a71de32bde02bc18d":hex:"5412f25c":char*:"":hex:"1e81a4c10a3440d0002ddc1bfa42ebb08e504fcc8f0497915c51b6f5f75fee3f0cd3e9c5a81ff6528e0fecd68a36192114f17fa1a4cfe21918dac46e3ba1383c2678c7a6889a980024ee2a21bcf737f7723b5735e1ebe78996f7c7eace2802ebb8284216867d73b53a370a57d5b587d070a96db34b5b4f5afe7f39830498c112":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,32) #1 [#2]
depends_on:4:2
9:exp:5:hex:"3fc76d627c775de2f789279dc7b67979a9f1cc23c8dcabc9":hex:"8f6fd53eb97e12dcd4d40f2843e25365":hex:"e56995df73e52606a11de9df6c7bfb0ef93b86bf6766e319aea59372060294b0e1b13c6288c2310a4bef725a2dddb174f3e1228649861757903c4497a0eec9c141454fc75f101439a2150e368857c4f0f6e5161c42c77f632bf1c229a52595cbf16e9018de9a8f6a1e6b8b18bd244f93f001eb2eb315405d223c0d27ece9d4d9":hex:"92a60d38fc687b92d44635aafee416a142d11a025680e5aa42e9ba5aa010462991ad3dd7328ca4a693673410f9bba37f05a551b949ab0d43fc61ef3b8996dd3fc1b325e66eec6cc61ea667500f82a83e699756a139d14be6ca9747ed38cd9b1d9da032ece311331bdcd698666ddc970b8be2b746ec55fe60e65d7ae47c6f853c":hex:"613ba486":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-192,128,1024,1024,32) #2 [#2]
depends_on:4:2
9:exp:5:hex:"b10979797fb8f418a126120d45106e1779b4538751a19bf6":hex:"ca362e615024a1fe11286668646cc1de":hex:"237d95d86a5ad46035870f576a1757eded636c7234d5ed0f8039f6f59f1333cc31cb893170d1baa98bd4e79576de920120ead0fdecfb343edbc2fcc556540a91607388a05d43bdb8b55f1327552feed3b620614dfcccb2b342083896cbc81dc9670b761add998913ca813163708a45974e6d7b56dfd0511a72eb879f239d6a6d":hex:"e3dc64e3c02731fe6e6ec0e899183018da347bf8bd476aa7746d7a7729d83a95f64bb732ba987468d0cede154e28169f7bafa36559200795037ee38279e0e4ca40f9cfa85aa0c8035df9649345c8fdffd1c31528b485dfe443c1923180cc8fae5196d16f822be4ad07e3f1234e1d218e7c8fb37a0e4480dc6717c9c09ff5c45f":hex:"28d730ea":char*:"":hex:"dafde27aa8b3076bfa16ab1d89207d339c4997f8a756cc3eb62c0b023976de808ab640ba4467f2b2ea83d238861229c73387594cd43770386512ea595a70888b4c38863472279e06b923e7cf32438199b3e054ac4bc21baa8df39ddaa207ebb17fa4cad6e83ea58c3a92ec74e6e01b0a8979af145dd31d5df29750bb91b42d45":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,128) #0 [#1]
depends_on:4:2
9:exp:6:hex:"2c186654406b2b92c9639a7189d4ab5ab0b9bb87c43005027f3fa832fd3507b1":hex:"3a0324d63a70400490c92e7604a3ba97":hex:"":hex:"":hex:"4c61cd2e28a13d78a4e87ea7374dd01a":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,128) #1 [#1]
depends_on:4:2
9:exp:6:hex:"747d01d82d7382b4263e7cbf25bd198a8a92faabf8d7367584c7e2fa506e9c5f":hex:"7156358b203a44ef173706fdc81900f8":hex:"":hex:"":hex:"9687fb231c4742a74d6bf78c62b8ac53":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,128) #2 [#1]
depends_on:4:2
9:exp:6:hex:"1cbe30216136b7eaf223e6a7b46c06625176d9a08182fa806a63d8b143aa768b":hex:"4fe6ace582c4e26ce71ee7f756fb7a88":hex:"":hex:"":hex:"d5bdf8ec2896acafb7022708d74646c7":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,120) #0 [#1]
depends_on:4:2
9:exp:6:hex:"f31194c83bb8da979a1eabb3337ceb3d38a663790da74380d8f94142ab8b8797":hex:"404efd26b665c97ea75437892cf676b6":hex:"":hex:"":hex:"e491075851eec28c723159cc1b2c76":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,120) #1 [#1]
depends_on:4:2
9:exp:6:hex:"daeed52ae4bf5cbe1ad58ae4ccb3da81fb9c0b6f7619ca21979313ad9d3e83c1":hex:"4037eadb11249884b6b38b5525ba2df4":hex:"":hex:"":hex:"360c6ef41cbd9cd4a4e649712d2930":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,120) #2 [#1]
depends_on:4:2
9:exp:6:hex:"3ad81c34389406a965c60edb3214663ac4a6bd5cfd154ae8d9dc86dae93def64":hex:"cebbce06a88852d3bb2978dbe2b5995a":hex:"":hex:"":hex:"bd7ca9f6bd1099cde87c0f0d7cc887":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,112) #0 [#1]
depends_on:4:2
9:exp:6:hex:"4c152ba30aefa5b2a08b0b4d9bf3f16fc208bb0bc4c4eca9411dc262d9276bad":hex:"008d040fbd7342464209f330cf56722c":hex:"":hex:"":hex:"c87107585751e666bedae2b1b7e8":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,112) #1 [#1]
depends_on:4:2
9:exp:6:hex:"9aed4ae6b1d857fdcbe5aec6db38440613dcc49f24aa31fba1f300b2585723f1":hex:"947c5f0432723f2d7b560eca90842df1":hex:"":hex:"":hex:"7d331fedcea0fd1e9e6a84385467":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,112) #2 [#1]
depends_on:4:2
9:exp:6:hex:"cc80bc031676eff5f34dd076388a5130e985f9e06df4b4bf8490ff9ff20aae73":hex:"51f639467083377795111d44f7d16592":hex:"":hex:"":hex:"02d31f29e15f60ae3bee1ad7ea65":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,104) #0 [#1]
depends_on:4:2
9:exp:6:hex:"db7a40213b5b4b07e9900dc28f599403b0579cbce13fcd44dff090062f952686":hex:"aea6f8690f865bca9f77a5ff843d2365":hex:"":hex:"":hex:"7f2280776d6cd6802b3c85083c":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,104) #1 [#1]
depends_on:4:2
9:exp:6:hex:"299b874eaa8b7baf769f81f4988a41e2708ae928e69a5ba7b893e8e6b2db5c3b":hex:"2aa04d85d2c0dc6f5294cb71c0d89ac1":hex:"":hex:"":hex:"ea01723a22838ed65ceb80b1cf":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,104) #2 [#1]
depends_on:4:2
9:exp:6:hex:"a6c7b4c8175db4cf23d0593ed8ea949043880fc02e2725f0ab90ae638f9dcfce":hex:"ae07f8c7ac82c4f4c086e04a20db12bc":hex:"":hex:"":hex:"1132e4fff06db51ff135ed9ced":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,96) #0 [#1]
depends_on:4:2
9:exp:6:hex:"b98e1bf76828b65a81005449971fdc8b11be546d31de6616cd73c5813050c326":hex:"929b006eb30d69b49a7f52392d7d3f11":hex:"":hex:"":hex:"33940d330f7c019a57b74f2d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,96) #1 [#1]
depends_on:4:2
9:exp:6:hex:"09ccef64ae761a70fe16772cba462b058a69477c91595de26a5f1bd637c3816f":hex:"e34b19381f05693f7606ce043626664d":hex:"":hex:"":hex:"2adc2c45947bfa7faa5c464a":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,96) #2 [#1]
depends_on:4:2
9:exp:6:hex:"654cf46598e5ad3e243472a459bcd80f1e026a65429352dbd56e73fcc5895d1c":hex:"a56f27709e670b85e5917d5c1d5b0cc2":hex:"":hex:"":hex:"177b9a5e6d9731419dd33c5c":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,64) #0 [#1]
depends_on:4:2
9:exp:6:hex:"84bca1b2768b9202bf194f2d5e5a0a5f51fd8bb725f2bab8a3fccbdb64a4ea70":hex:"c45b2708c5bdf65ec6cc66b6dfb3623b":hex:"":hex:"":hex:"fe82300adffd8c17":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,64) #1 [#1]
depends_on:4:2
9:exp:6:hex:"c8ae011795c9a60ad7660a31fe354fa6f7e9c2724d7a126436291680cd95c007":hex:"1bd9ea6186450f9cd253ccfed2812b1c":hex:"":hex:"":hex:"35214bbc510430e3":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,64) #2 [#1]
depends_on:4:2
9:exp:6:hex:"df2f0a8a3849f497d12bda44e12ce30a6957f3febcd5ec9bc134171326ca66d3":hex:"728cb9608b67a489a382aa677b1f4f5b":hex:"":hex:"":hex:"e2ef5d9cc5791c01":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,32) #0 [#1]
depends_on:4:2
9:exp:6:hex:"78e8a8ad1ecd17446cf9cd9c56facfd4e10faf5762da0fd0da177f6a9b9c3a71":hex:"f169ce6f3ccc58f6434ae2b8ad1a63a1":hex:"":hex:"":hex:"0fe57572":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,32) #1 [#1]
depends_on:4:2
9:exp:6:hex:"02ca6d8a862e25db9d68e4404abc107e700135df4157cfb135ce98eaa33151c9":hex:"7b722fdd43cff20832812f9baf2d6791":hex:"":hex:"":hex:"72dea6cc":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,32) #2 [#1]
depends_on:4:2
9:exp:6:hex:"9a2b709dbcc3a4fb15b3ad541fb008c381b7e985b57df52f07ca7cd26ab1ecc4":hex:"729baa4c0ef75ed8aae746376b39fe3c":hex:"":hex:"":hex:"2a0d607c":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,128) #0 [#1]
depends_on:4:2
9:exp:6:hex:"449d39f863e4909984b37f2e5c09ea4d4b3e9fac67bd57c299e4e1d1f084aaa3":hex:"d8e9118f331bb5a359f0aa8882861b72":hex:"4ddcae0bc24d622e12bdeaac73e8d1ab7957af051d27dfaafce53aeed4cdd3f989ea25989a2f41cfb3c38dbd841c5560b0b5ab1861b1fbcd236865d13da55b50219462e021f8a21848a64a85326031fcec8fe47a6ef4a435dd2b2fff637644ffcf3914ef2dfa5dd556421bfd297be150b31db039f0f2cc422b282e659e70cceb":hex:"":hex:"c595b9d99414891228c9fa5edb5fcce3":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,128) #1 [#1]
depends_on:4:2
9:exp:6:hex:"3e70e66813fc48f984dcda4d1c9c24f1d5d1b71ecfc8bb9581782e7cca5a5cc6":hex:"d804f1051e72c9b7117002b862eb45ff":hex:"0b1ab2b7a87cebac668c7a532fa8fa56a22cabf0c41fc1e6744ffe07c857c6865d623f508351f98f3f0c577d1eb94300a30a445472218c8ac626b0bee7d4c122d33f8130436a89add341e8ef7e00694afb4ad80d314d87ad3f921c7105eed05431b8151df7cff2c8e3790efd4acd3f60332dc7f34fdd90beef70f9093361d65b":hex:"":hex:"c09c2e3fdfefa222f7345ae4efb978fc":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,128) #2 [#1]
depends_on:4:2
9:exp:6:hex:"8e534041090b45b80f287dc5fa20ebda017ad81b0530e680f62c6280fd8881af":hex:"ead675b019ef5c6bbf4985f2a382d6c1":hex:"b1db220052c4bebcef27eed6db0dc91be481179d71160c5a2ddb2fe497a05484840b04cce48980057d770fbbd0d5f3d5c633b55470617ad2cab5767188283310337825c4b0eafe13b5b11293dec230dad43b220885105767938c7ec4600fe063f98aa14bc6afb886fc874c10546749da295f571e696305bd9165486e29f43f52":hex:"":hex:"9aa0cdad5686ca515cd58aed94938ef4":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,120) #0 [#1]
depends_on:4:2
9:exp:6:hex:"2de18874470c09db683cf45cd752bdfa8bf33e7967220b1a69f41f2a02da1d80":hex:"af30eb2d0a0c2a50ea413f3285aa88d4":hex:"22889b868d8ccc9f488406813caed199b23091ddd796c8632f564e7cf5a39dfb725266a931fec958659b6fc5b6b9343b8217edb0acb010afc9416601155262b57bd398d62f555953f0e15958e19ae004fbc9cb25e0269a9eaa38a4635a27bfa719fb249fa49337796bcf5f416bba87fbf3b19f0d8c11290c25ca50bbdc822f01":hex:"":hex:"646bbc9b14681af65b0d1c4c9f1d0d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,120) #1 [#1]
depends_on:4:2
9:exp:6:hex:"1a1bb9122e762ecd7ff861a1d65e52607d98e7ae5bd1c3a944e443710f3b0599":hex:"32f99ea4cbf52c2701c2252e5e6c863d":hex:"91b7a70c3a06c1f7f2ea584acb5dd76177ba07323c94f2e8f7cbe93fc0bb7c389c3c88e16aa53174f0fc373bc778a6ccf91bf61b6e92c2969d3441eb17a0a835d30dcf882472a6d3cb036533b04d79f05ebfaadf221ae1c14af3f02fa41867acfdfa35f81e8a9d11d42b9a63288c759063c0c3040c3e6ee69cf7c75f9c33fea1":hex:"":hex:"a8e29e08623a3efdbbe8b111de30a4":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,120) #2 [#1]
depends_on:4:2
9:exp:6:hex:"3bfad1e8f9850577f9ba3f290e9a5e91b494c2d99534220362e171a7543177ac":hex:"8410886b70c57d7ded8596443bd1b157":hex:"ca801c83596795515ea931edba00e06e332bf84246b7036e10b317e2d09a51b2981fcb664ee3bf4180bb0b12ed1cda221abc6790b27c26914f5ef9cea9536e2453cd5b247cb054e295c2687b725a97cbc484b8eb86c6ceee03bd07a54a9301a3ac0ddb23aecb825a238252e7575329058b40e75575a7f16439edf5be163ce5f5":hex:"":hex:"e3645db0c600dba52044efcecfc331":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,112) #0 [#1]
depends_on:4:2
9:exp:6:hex:"65debdf2f2191a6cd8de8ad4d5d4d0d8f731f67744e2545df6b2a7cba89c1ee0":hex:"fdab2ee547dd8b6f5a4ea2dd19697b3e":hex:"d2b0a0438ee0f145aec9a7ca452b788ecb473152b78fb75f6ace721afc7b0ae1942049b790f3a5b6221a8760295659756d35347cc04029be03459f3e23a71209b4e0bbe13a253a888c83db23376d3a6d9a539f7c9fa4a12dc64297e7c93dfa0ab53ef76b6e1d95bf6f3d5e6ee8f08662fc03ec9d40eff0a43f23ac313671bfd9":hex:"":hex:"c25fc157c3f2474885e2eea48aea":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,112) #1 [#1]
depends_on:4:2
9:exp:6:hex:"496ae810380460d40cd2fdae8c0739f16b87205cc7f57db0a71a473eb361d570":hex:"77233de96f5e1744337778212b411bd5":hex:"85f5b54b4c4af5c808120bd28d98e44e96f4126623e57684957e9fc4fd1a2d0583940b8fc8314a249325476e8d05247831b04709580ae714e8187cd38f9559419e14c9fc4f8c454ec191b8ef2a3610988fe3339d0dc6b72f5978f9eff9d596dfabf27056e3a908c6497267461386e860f6b9d65526294bcb92908b5661b06b5a":hex:"":hex:"4ed91af6340e70b0c2b94ab6f82e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,112) #2 [#1]
depends_on:4:2
9:exp:6:hex:"aca188183b46139cc7cffc82a6aaaeb2fd73cecad14e75c663bd62daf1ec711d":hex:"7bbf7fb55eb70cce94cc6a2b67de55ba":hex:"015cfba90f069545fed60f31992ff3d3c3592eb91e7a53df5978ded64291954cb99a57de82d5398ce782b68d14ac04a8b425395bd076ead59eb445721bdb2f45e19fa089117800cbbac7b8313fb165ccb1122acb654e1242dc7fe6885ea1cbb7281b1270cfa1549cdfe9b47caf47b4ac3807e562e48c066566f5e606b5023b47":hex:"":hex:"3bcb5c2a4261d75bfa106fb25ee1":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,104) #0 [#1]
depends_on:4:2
9:exp:6:hex:"8cd6815f6ec15f03b7a53f159e877a5981e0ab7f6e6c261ddde4b47cbb2f2366":hex:"c431c07d9adf5f61204a017259cddd75":hex:"4e1a835402bde4f5227e64b46a1f8d0f23a9434e189377fcdf1b9621ba1987eb86a7f3b97ed0babfd674e74c5604a03dd016d71000a72bbbd00a7f7fe56ad0fcb36a3e24dd0fdb63bd66d4db415f35012416ed599796ca3f678df7eb5a1b17f75abb348ddd3b366369a7b362c9488aedab836b61f9a158f0b129c8ca0a53a81e":hex:"":hex:"0e463806ff34e206f703dd96b3":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,104) #1 [#1]
depends_on:4:2
9:exp:6:hex:"8f0a72abcda104aa7fae501f9a3b686d00d3f6fe984731db8a2865bfec587073":hex:"ab8acd063775d1b1314f14e90fddd1be":hex:"02c6d426e7f20b725d8cde0a6382e49b029b52126889013ef45251f27b2fadb95ca4a9a3b16ad06999eeca4a473e813045db4942e9b9ff2e5a5e429d9bac298372344d1b781d5facabf6d779643f31ada6124eb50aad599044b54279ec9b25714ac8a3b9ad2487cec7f4b1ee245d7be3d496d6af1d4cbee1c8201312541f3064":hex:"":hex:"3f0ccc134091e0c0425887b1b9":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,104) #2 [#1]
depends_on:4:2
9:exp:6:hex:"417135cad74280e6f8597dc791431c95cb8fa63bbf7197e3ab37c4b1d6d9438a":hex:"0fe22d9ba1d0e32656e3a9f07a517a27":hex:"a0b2712e81d329d5b076a4be2ad6823cee6dbd17d9a592d065bdebb92b1ff37a56bf2f5e5341f39c574246ccda19e5f35fede49c9ba958f3920cc5440fb404fab7846884ca0c2a3af5b51f4fe97a1395571319cc5b40f8aac986d77de280db82343983982638326ef003e0c013af19c34672975dc99ccc0853a1acf7c617d965":hex:"":hex:"888b836c9111073924a9b43069":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,96) #0 [#1]
depends_on:4:2
9:exp:6:hex:"304824914e32ea0efd61be6972586093349bd2cc2cf0cff44be943682b2dbff5":hex:"b6d927a71929029f6766be42746f7cb1":hex:"7281c81c7514f4b17cb125c4649006ef8959a400a1e4d609d277e363e433725fa32346a10bcbd826b6afc8222158920d0a2db1e6fc915e81231c34c3941ecf3c6f94ffe2136190cae3dc39a4277acbc247f36291b5614a8433b1a0780434a6c50521b72ec25145bbd3b192647155d5dd9df9e66762d39592602ea99bf9bfff49":hex:"":hex:"b6044c4d7f59491f68b2c61e":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,96) #1 [#1]
depends_on:4:2
9:exp:6:hex:"8a10e9abe9389738e12a4bb6f553ae81e8bd320e0dfbc05fbae2128c1fde7a23":hex:"6da44354e198e3beb54792718becbcc1":hex:"199d754630135b669bf2ec581d3027a569412ab39a78dd9d482e87b778ec65c6473656260c27827e00e566f1e3728fd7bc1853a39d00e43752c6f62c6f9b542a302eea4fd314473674f6926a878ec1e4b475d889126ce6317115aea7660b86ab7f7595695787f6954903f72361c917523615a86d6ce724bd4a20c9257984c0c6":hex:"":hex:"5c5683e587baf2bd32de3df5":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,96) #2 [#1]
depends_on:4:2
9:exp:6:hex:"d164ffde5dd684becaf73e9667e3e6acb316682c41aea247899e104a54dd7a7f":hex:"1d388e19e9d7a9750e2fc1187d4b075a":hex:"f166a5b6f91261cda56f1a537f42ffb8aed10af5e0248f8910034b92dbc58d25953f1497f571d31fbf5ec30d92234b440161703851f0e43530418147ce6270fbcb5db33ab819ba8973051908704b6bea8aaca0718947e6aa82498a6e26a813981783ed9bf9d02eb1ea60927530c4700ff21f00179002b27903dd4103bbc5c645":hex:"":hex:"52e10495105799ead991547b":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,64) #0 [#1]
depends_on:4:2
9:exp:6:hex:"2854188c28b15af4b8e528ab25c0950fc1384976f242716c91bddeec06f2fdea":hex:"075af9c31f5252b8920092cbd999e7a0":hex:"e9452f71093843a025bb5f655eb6a4e8316ab5946484b11818f22b62f4df75d5891fa3397537093a261dc9a7648b7477ea1f5fc761716e302763364bcab7992595edd0fc1c7f7ac719c879e6616e2007948eb8530065a6cccf73d0fe4a0598819b471b0856e6d90ea0fc0e5d36a30ee925b6b8e5dbf40e77f01efe782c0bb4f7":hex:"":hex:"6ff8fd87e5a31eb6":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,64) #1 [#1]
depends_on:4:2
9:exp:6:hex:"2bfc445ac0365ae6c3c3815fd18bbd0c60ea224f6620d9b6ac442a500221f104":hex:"43c5f3367a9955aaee1a0c4d4a330059":hex:"db0bae8ce7c66a8ba2fedec22f236212e9a7ad72b371de285c7dc6d2f6c22df0ce4920e0f03f91eb1653c4490050b9f18a2a047115796f0adc41707d1ffcbf148aed5c82013f557e6c28f49434fc4eb20112f43566f212c48cec9894ac40772fcd9b611ee9444df7b73e35b8a38428ccb064c9c50491d2535e0b539f424db83e":hex:"":hex:"49aaa806cb2eeadd":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,64) #2 [#1]
depends_on:4:2
9:exp:6:hex:"7b828f99aaf751bf22d993ed682e488595617a607ed74aaacbb6b60457453080":hex:"d48dac1d8d77e245420feb2598812418":hex:"f50f785f4e7c848a55a616ecf4b6b1e1ca85e16de7100c7e4273d411bd95c1380ee157ba501ba9616980195f34e39f43e335f33253342feb8ed64443483c721b85241a0320b3cac83104de2db47188c61a373fba592ea16feeefdee1f2bb43927396f58151418672ebb74afff5c029503a0d0be81430e81ed443e08b74c03183":hex:"":hex:"a5b71ecf845b25d0":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,32) #0 [#1]
depends_on:4:2
9:exp:6:hex:"7b6da11d69fca3e4c907628d3eb63d95c7e502fc901372fd097e064e70831432":hex:"6fe2148f250ea178d4c8ca8423ead87d":hex:"a8097bb74ded776f578eb7588f5ef8915db9bfa7262af700c8e76ee114e07557b6786dd5a60a66b2703e7c9de5d6b42aca92568aec5d1ecc298dbd0edb150b8cc13c9a78698f7674caa94da6cacd1f3ef4ca4238c59830ea725ab3a6284e28966c8c32d9bccfb0cfd6583a5ca309debe86549a6f317d15c5f928cbc7f473310c":hex:"":hex:"e9cdbc52":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,32) #1 [#1]
depends_on:4:2
9:exp:6:hex:"c5ae9328be49e761064080fc213e53e373fd86359a09d0355e2d438d9b8e68f1":hex:"a7e3f8660ff925d5c88c5aceffbd7026":hex:"2ddddba7a56cc808aec4602f09ae9bd78887827bf0315d8dbe16821606ef9d117746dd138bf1f23565d1ab8f4cee36d53fe3730632c5df9f12109b16edbeae285bb49dfdd155f5dc97b319a85362d53cc86817b7c1c31e5e87c9f37422f133d00dd0776bd92ab05ce6860573cd911645cfe3fbe515e85f744899a447fe443653":hex:"":hex:"e35dbac8":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,32) #2 [#1]
depends_on:4:2
9:exp:6:hex:"e4f8ca13ba86c658cc7f42d4f029422209efbd101bc10a1df81a42cfb3a0f79f":hex:"1a362fa0e4054ba11e4b06d59c8bc9cf":hex:"e7ad5c75aa13659f8ce4b1650c46382645ec67418199b84ea445b8ceef619ef3fbde59ed3d313c459e36fcf87d26ef2b453409b32f1086934c3072c1ef0aac83762d28b1193b9afff2c083ce4300b768b0ae23ff9d3dcf65bc1693f1350da65180620aab205aceacfc683c8be53a332e2d0337a7518d2a5204f9c8d7325a4799":hex:"":hex:"e7a37f15":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,128) #0 [#1]
depends_on:4:2
9:exp:6:hex:"00050a21ca1e72cd0924be31b943c60854be6744577de3dd9d1f4fada4a19ea6":hex:"2fc1afc1395d8409919248709f468496":hex:"":hex:"693ffd3d92294857a99c702a0799eeca28ab066dd90917b9ea5ef8f6547f1d90b106cbec8ef2c22af9f8efa6c652f2f97c2baf33af14fe9def230d49524bd65909c3df1490f637f99e788dcc042b40e00bd524c91e2427ef991bf77e7b2f770cda6e90076c5dac4cac7ee3958b53ff8ce846c3a96281f53c2c52f5f3e523536f":hex:"e39b6a7fd5ac67a2a1cc24d5eb9d9c74":char*:"":hex:"cfcd6b9ff7641829cbadeaa2e56f1f150a099eccf3e378fa4da59794dcc4490aa4f9c5db0ab245bec36a7d4557a572008e42f03bc1baff3c946f23f54a4dc9828f106cf4264e4ab40165839d1085e7795b1ae0950f0ee4a08e46ada501b6b51dee0e518129c9426e5bd44c66674a9f99cfe676f002cfd344c5bbd22d3d91e600":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,128) #1 [#1]
depends_on:4:2
9:exp:6:hex:"f10965a66255f0c3515af497ccbb257a09f22ec2d57c5edae322a3e6d2d188ef":hex:"c571ce0e911de5d883dc4a0787483235":hex:"":hex:"91598690edf2de8b27f9bc7461a84e80811cee544f0542923898328cf157590251f0342cb81d359b5dccc5391a12320d1444c26f24178977dd6705c2b365dc1ece0152c42e2f0ee3162cf886ef5529f4f16a77f3bdd2aeccd405b59addf098521d0d38cc25f1991e11be7ecf24caedb48a2a286d2e560a38fa9001c5a228c4d1":hex:"6d9d3a5dbc8dce385f092fff14bfffda":char*:"":hex:"2867996e389e09ec0da94d42e77b1e436b50065b09ca4adf1cd03240444ee699dbb7b3fc081a1869ca607d77d5ff9754fc3c997ff0a4ee17543a2ba77886b88a7128bcc51d3450df58ff3a26671b02c1d213df6adb6f7e853080eb46b504517cbaea162710a9bbc2da8b552eb6b0e0cb98e44fcab0a157312be67974678d143e":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,128) #2 [#1]
depends_on:4:2
9:exp:6:hex:"4437ee7d16d8c3ca1aa01e20b66749efa901614d4bb4bee786ad5a5f1bfde2e6":hex:"275393276745bc43bae4af1e5d43a31e":hex:"":hex:"ff80727a3485cdbc7fab4ee9fadfdc621c538e2055706629046078f1aa3fb687fc728d3a7ffa52ae457b7b5649613eab7bafa464bb435314c49e5900750f7ad39ca9b75df6b2eaa755439e101f67b7ae4cd80dc4a9dea0027048253f2d0a6014056ca69b8c85605b00cf75fa7634a0ddf464270a8c79ce1a1324c4a4c513b24b":hex:"a82ff1e87d26e4d6e417b60fb2d3ce23":char*:"":hex:"88f994d276ed20be3932d16f551c4b7e2ed80411f2e72ce098fa0b70c22157a59edab30649fec447dd63f0c87dceca7238ef0d9561b58489ba7bd86f2892743099f40af63c432f78ac0ad0b5c2be47b9e3045e7237b096ee400f430af63a6f309de785caf190f3f4aabbe79f727a741590de542bd343df68d13db55a5f8bab41":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,120) #0 [#1]
depends_on:4:2
9:exp:6:hex:"fe4ec037ce563dadee435cfcb2bf090f1f7ccc7d1b5b4fab2f1b738348f8ed2f":hex:"47f5264f7a5b65b671892a05fa556f63":hex:"":hex:"64eb8a4bda9804c09b04cfcd89094928c21480908b81ee19d6c29c2a3631b1a5bdc8e7f8ea56f7b8b8e14a5208296026785cac3a6afa54be8af4d5faedcd12b6621bde0f8ec5a2635fe72a89468ca7704c73aa40cd2ba97aef08886b27a694d339b00e7d12a31308672f87c06a7388a1432f869eb4cc1da864140b1b33931925":hex:"660462b4088f6628a630f2e4170b21":char*:"":hex:"4a310e035361f98b8c54fb4cef70b1a9c910552ece056ca8fdab54c52308ec0ad7fe9dd1dae92badab5010577de522088768fa6466fbccce22e14c51ca7986c4063d0f06bf578dab16a91856713198a7138395c49c78b6314b57ab72fd079028c8dc351952d90b04a7cd2b245df0c0522447cdb7d3329fd9425fe5cb40a8e7c9":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,120) #1 [#1]
depends_on:4:2
9:exp:6:hex:"e6e1ada628ca76eb9832cc6b5efc5c9d2686bb587366a6de2d734233fa95279e":hex:"5a100b451e3a63a3e6d4b8a9e59c6bce":hex:"":hex:"a0ac738e0fb35246b84a6fbe319f827039515df25d0c0fc6de7c048253ae63d3c561e44a12672ffeae1cb925610b482aa422bbee0e1784fc69baac3a97d69f51e6d2a17957b44b318624ea7ec680a559f4d3f2761d09bee66efb3a312ae6b3ecb673e756b2a0f654671e82500e7ace91f2be2a74bc3bc1ec1a4b6877a53c27c8":hex:"88df9a1ea54e5bd2ef24da6880b79d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,120) #2 [#1]
depends_on:4:2
9:exp:6:hex:"cd5c1e90d78213155c51767c52c290b3d657db8414ee0a7604a2ec7b48105667":hex:"4e022d8d86efbd347e8cbab7e979771f":hex:"":hex:"8e987693da0fb77b6d1282eebd3a03e05d9955ff81929b1a2c721574862a067ddee392c7ece52ca1451f3e6e321d7208882d97b4149af6d78d65c054e1bfcdfa62bd2202de32dea8363f8d7f041891ce281840f3cd906ab46ca748e5b3b11890b4014bf0271c9427c874097782d1c13dbb40e78fc8276fc134f3c29923a43a01":hex:"e7df79af0aef011299c3b882e3a45b":char*:"":hex:"3b20473d9b5018d089e7f74d3fef22ec2805948a9e07689831973c704a6d8db4d090af88d696ab8c3aae9740a2bbd7f03e0b18b2b591e59c335c1043a2578a89b1a9f20fd0dd53f12e00e9bfdb27de8caac772bbfc4de9e4a255a5d1b04e59625a87b8279babe613def58d890d5502abf2f709aab625dcc20c58772832c7bbab":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,112) #0 [#1]
depends_on:4:2
9:exp:6:hex:"6e3dfc07003bb6a2d82bd5263b2832f47db4e73279266c7a9ea21f4f18eddf83":hex:"7c0f49fb54f5e68c84e81add009284e6":hex:"":hex:"a960da222af9d4da5797e6957d59b00f6d3893599c70e95c0984b56eb3329b191703c2532f3288b15ebf655b9b5ee4617484e5ac9c39bb06731d03ebe4fef9495d003b0ed694cf540b4dc759d32629e55512680badd81234bd71ffd55fcb5e6a85031c1dc31ee1ed198939582d8336c905717cc87101dcfcf9d833fac815c8ea":hex:"b2ec0f3da02a9eb3132fb4ebe3b8":char*:"":hex:"a40b6f70f0572fe0bc70d83368e7c154f7dbd501f52501630a2e523d18e216e07368521f6040d806299397722b99bcf7f85d36b8bed934b49aa1fa76d38783e6a2e392d6d0786d467f7bc894a739ecf94f0fe884a9c391154f8326bf31ea5242a18aa263d04da4b63b11de23b42d3e10a2d5460cb32700cdf50a0d89165ba22a":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,112) #1 [#1]
depends_on:4:2
9:exp:6:hex:"4103b1ddff87a508a219c808a04ad4750668688f4c2ee75b92d28d70b98a2c94":hex:"5cea906737518c2cb901016e30206276":hex:"":hex:"a00a196193ff07006b7df524824bd0971d63f447a3a7bb1b75c1e2d11789482c115cff677b54948d36dc4de34200bce97be0101d88cee39b177857dd5da3cb0d2f9d6e1150f72a3bd655e0bace1d25a657ba9a7f8dff082b4460432075afb20173da22b49beeb6a030d72ba07869ff4389fc1c28d87018d7c1a9829c21932197":hex:"3a3a771dd5f31c977e154ef5c73a":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,112) #2 [#1]
depends_on:4:2
9:exp:6:hex:"cd8c2f0c330d5db316dae7a16b57d681ca058864f7bd60f3d0de174442283f77":hex:"387ee8c1e7f047e94d06d0322eec02fc":hex:"":hex:"e2a5ad295d35031535bf13c2993bd0b292e8a9465b9dab738e59ba03670248a1ecc92b38a55bae34729162271cc1572c35fcccb27417b48dfcbff852a7a8845cc829a4461061b558ac8b5930a5c6491ffba04a9d0dff220b3cd5e4fc2e0f3db3b2ddd90328f2cad819573a7856299620b02f5ee0267f3b56981afbf1b7d9e3e1":hex:"62356850d12b54e39872357cfa03":char*:"":hex:"17b7f6bdfc1993c56dd9bd674cc276a55a46fdd9fd5fe435b9e4b7ebc7052a9dc76a99e4e43aba7d486603189c90d10a21ad3722c86bf5bc856a0f930ff5bca65be708b76bb8a29105da67f31eebcec81f28aaf526d2f8f0feac393a24959dcd612e2b93b4463f61957d2b3046bcdf855e346601e4c7760c0ca618ee7bf55381":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,104) #0 [#1]
depends_on:4:2
9:exp:6:hex:"7e19e400872eed721d560202cd757d3eb99729496b6e3a6d38dd8afe1066045a":hex:"d2b277f78e98f1fa16f977ce72ee22a7":hex:"":hex:"3fb9abc7aba654dfb174e8899c17db222ffbb387b7260fc6f015b54f1cd74284c516e21aae3b72338e5e8dc643cfafca0678f5bda3a7539f1612dddb04366031b5a3eda55f3232c1b176cc9be7cc07e0ebca674a272224929c401a2530efc6d4eed0087b544b12d172a01bc8340d9c2a2ebcb5af8b07d96073a879fda140c196":hex:"4c81c044101f458fdfac9ca3b9":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,104) #1 [#1]
depends_on:4:2
9:exp:6:hex:"d0653934a16fd36c27d54488a1829302b931bed6e26ca26047242b85b50bfb61":hex:"94886a1845aebba5ed6b86f580be47f9":hex:"":hex:"c02347e1add9178d830d8baaad9aeee37e958bedf2cc846e2561fe8c83481d0a8a85911e7f1f6e444b28f30bd96c13c390e80f616feb6844ee6fa486543a2e3f38c138f45b4405e3fb331b64648219aaf1d574be948ccfca6afc18d12488db19c35b05601e47c0af5d49a93a5dd4420f38585c1eb033e173376fa390d3f948df":hex:"4be34ff42085ef4443c8b6042d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,104) #2 [#1]
depends_on:4:2
9:exp:6:hex:"d0f0ccb88c7cec9496f26a59ddc67dc59ebe49ae3dd89ef3be008598727e214c":hex:"e5ca84b907ac761a5e68a9080da0a88a":hex:"":hex:"7845e155f4f28021291e7c814a1ace8f42b239990831aa82758fc1e376cace0b6f668f7f2f224dede1ef5b1df7ae74b2c01483701044acbbb72a9216eec6b7ef0190f114b3c73c6985c4653f11601c774d10b7f9df1f1e1f3ff4fafa20d6525edb37d9e5acfafe6d3468ee068d407fdb56dc718c98425926831253978d727854":hex:"c8f78e4139dd3eaf2baef8aafb":char*:"":hex:"0cc3ede50b0d3fb9ada11300a3239a383c98f968ad65266d57a195bb18d3e568fe6cabba258da4bee9e923c7c838e06dc887a6c49cc1453ea6a227c6a83e651a8742e0316cad5efc93739393e3603446b5c920a206db1434adbb8ebde4d1a7a8699c7f6c61b2d57c9709b564338423b4f526d6c157647a6c45da9dd521061f05":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,96) #0 [#1]
depends_on:4:2
9:exp:6:hex:"e35dcea17cbf391491ae5ba6056d0dd13b348183474dd4b614742751bdebfc32":hex:"fa549b33b5a43d85f012929a4816297a":hex:"":hex:"5213542beb044910d7fdeec8bb89de93f350760e493286eaef1140485380d429f74a4279c1842a5c64f3ca3381cb5dbb0621de48821bded650cb59703e0ca88f4e9c3d15875f9dc87d85ba7e4bae9986ef8c203fce6f0ce52c28e3a93befb4cc4ba3d963d2283cd30f9bf6ab99d92f2f4f3aff0b022f1751b89d43ea10bbb28a":hex:"afa61e843cee615c97de42a7":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,96) #1 [#1]
depends_on:4:2
9:exp:6:hex:"844c50ddc0ac1d9364b21003287d6ae6360d12bbb17a85351362420ee4ca588e":hex:"2f8512bb7e214db774a217a4615139e1":hex:"":hex:"3a3bf4ccaf05f7c02f5e158dd2c5cb08c6aed4b1ba404a6d8ef9a0737fe2f350b3e22188fc330ea63e35df82f996e3cf94d331c4246cdb25bb2c409762e05ddc21f337edee51b64f1766ad18f520b3f34735b24278d9d647c533a743e0c1e9c81e9dee975cdc47e8582113fd250ef59353605b64acb7c025a97854c1a5c03237":hex:"f1da1cebe00d80eb4e025feb":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,96) #2 [#1]
depends_on:4:2
9:exp:6:hex:"2aae1aa047a20ed2d6d8336d923864cee9404f924031ae327fbfe2d293e1d93c":hex:"3da9af3567d70553ca3a9636f0b26470":hex:"":hex:"8e5b6b9e4e7d01de9a919dd33c0c1eb94dcfebf28847c754c62c1c00642d9e96f15b5d28ad103ff6969be750aadfd02fc146935562c83ec459a932a2fd5fda32eb851e6cff33335abd5c2434ae4f5524d6bc74a38094ced360f4606a1a17096ff06604952c8ca94a9a6dc4a251e13b0e0c54bd8a6dff5f397a1eb1cf186fa518":hex:"e1026b3d15d261b2fb47632e":char*:"":hex:"58c52ea9f3b162511160eed1a68b6f52b3c4f5834af728de97a3d9e4ba337b29aad12636003cf5be9ffbeae0f383f7cf32f645a8f6fc5cdc1cde91c625c69a92bc434ed671e52a0044a48f3fce55cae49a7d065c2a72603a7efe58b5a7b18ac500d1a51420e820357e7a439b1c02198ebe3d4e62d5573a3aa5f40900a21e3b41":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,64) #0 [#1]
depends_on:4:2
9:exp:6:hex:"f3d69208cb0d27474e9a231cd46eac7c1574fff950c48bbd1ba03fad16f563df":hex:"b957f05921d21f2192f587768dc12b4f":hex:"":hex:"0d1f06eef5e8f2c81d1a73bb1dca93c22cfb6e40e9948bc75b0d84830fb9216330424f580b89050c3fb3f620eca8f9fd09fb86d2e8b3a0869c6022d8a705fc280d66fd16d3aba7395d6be4bed44145d51d42d56285f3675726d62d94c081364a6d440511de83a613c598b03078e2ec7648c6302defbbea66aafd33e1a4b1686c":hex:"322374fbb192abbc":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,64) #1 [#1]
depends_on:4:2
9:exp:6:hex:"cb2cdeb17fa6bcb006c7fc60858a12a411804464458db351957e8caf42f1ee6c":hex:"31bd7c971a6d330b566567ab19590545":hex:"":hex:"296504131354b2c1928982f12d408ba2377f2d4bbe87e4c69f92a15bf6003910a43bda6c8929df66b3ab1d202a5258cad199f32f36cc30d2dc06199c2a52f7ccadad1fce50123c5f8434dec57cc60cc780263d7aace8f59cc8a6c54bddbaded3adb12ae2ee0bacf6a8da635ff85b51a4e8a1b3dc404863b90059de4ad0f158dd":hex:"efc5a1acf433aaa3":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,64) #2 [#1]
depends_on:4:2
9:exp:6:hex:"f94170790fadab3240df568197f9d6f6855afaed8d07eceeaa2380121872529f":hex:"2f9c0647a4af7f61ced45f28d45c43f1":hex:"":hex:"ed231b78db082f652bc6310c396993b52de804a82464fa3fac602a1286535f59c67fc2b1b420c7321eb42b971edde24cd4cb9e75c843f2ac6fb8ecdad612d2e5049cf39327aa7a8d43ec821161c385f3fdc92284a764a5d1cbae886f07f93017f83a105bb7c3cc4fc51e2781516a2471b65c940ddae6b550ad37b35f53d7cc64":hex:"ab74877a0b223e1c":char*:"":hex:"1cb5ed0c10cee98ff8ecfa5a1b6592391bbd9f9b1dc1ff351e0af23920d546b5e27d62b94daabd32f7f96a2632dc9fd7c19bf55f3b9b7cd492e76f4d6b0f5b437c155c14a75e65bfc4120bef186da05e06a2fd3696f210292ee422ddbce6e63d99ee766b68363139438733c5e567177f72e52ef2df6a7dd33fc0376d12ec3005":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,32) #0 [#1]
depends_on:4:2
9:exp:6:hex:"797c0091ff8787fe7cd0427c02922620e7f6fb71c52ddcc03a9f25c89ba33490":hex:"69d81c73008a6827a692fa636fbab8bb":hex:"":hex:"2d3efc8900315c3691a8e3c9de3319d4deaf538fcf41aa0e295b861d0ac85baf56d149a6437747dd6976f44016e012b88de542fb8e5b9e4ad10c19deec4b7c0b69bc1b2e33d44a981ded66127dea354b072010b8dc24b85ed2ffeea3b9c0e931619dbbf22677691f0d54fc03eaa162e0ab0d760ad41021f67057c0d6ac19ca8f":hex:"be2dda5c":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,32) #1 [#1]
depends_on:4:2
9:exp:6:hex:"90ce1afb5500489b9edbad987f4009509c847b3e55cdf0c764ef2fb085e3d033":hex:"e119e166471ecf44bc3a070639619931":hex:"":hex:"98482b54edce2bac1cd64d44917dcf117ebfbfe26ad17a9b263447028304f1cf5a69559c05b5d833420f4fddb6e308277d01eb4b3235f1c4b47d33d3899325b55e7be19d43187a5b1b1354ce02a529b3df1c13b4883902ae9fc565079dee825e705f3e580371e4fd86c3b0d31bae98adb529901f346ca07127314152b4370edd":hex:"b2f54b3a":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,32) #2 [#1]
depends_on:4:2
9:exp:6:hex:"29264a90f114a800c0fc3247b3bda00981a12a8f85cf3a19ea4c7ffdd005f4bb":hex:"cf296aa43cb7b328e09c8975e067404e":hex:"":hex:"587c8e53ab5ae8c31e16160b4a41d88798e27f4ad61c573c023c62d4dbb3952eef5026ad7b453fa9e0694347ab8fe50a6cf20da566202b81e325cee9c07ab2d4d53ed45b3ec2d2135936515f8a24f2a8116807dce9df3c44edf64c32647145152ff241d9e018e4101e400af070192dc3b498b5a213d265b4cfc8c8d4d7deccb5":hex:"56015c1e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,128) #0 [#1]
depends_on:4:2
9:exp:6:hex:"84ff9a8772815b929d55f6052c0354cf3e02bcc8336fcfe5794952b4c45d5d96":hex:"5c044a66e488b853baf479f7dee2aadb":hex:"00304e3d40cbc6d2bee0778462884f4ec047a8c74bb3dd7e100f2b9d0e529fd24730063986117b56ca876b208a3691425ac63afc3d504ccb499c76622eade09717023fcb7d956b01ce24a3e53cb5da472be3fcf5b278b5d9e377de22fab75bc74afa9670f5fe9691aa0ed77e43f6abc67a61ec409ec39fd66ac0307bf195f36f":hex:"a87de56d49725a1625baf12fd15931fe1a6783dce5d1e744eba108f45e0c105d8141dc027d0e33ad7efb6752b43729715e2f3e2c42ebdab4d5f72f886bd821c4372244699ddded99a63dbe7763a5a3bc21cbfc253cdc2514eba2a4f54e24dca7c207cb3f6ae80153d77fe0641f357d5a073dcd425c38deb77c45f27427345516":hex:"72ddd9966ede9b684bc981cbb2113313":char*:"":hex:"aadb8537309940422f67ca393aa6182d67fe7c52092538a15e98a4254f0a9087c7f10903d5e78078c2e55de914dec8b6b35cb720e3e55963c0ac9901e44b83a0e7c5b2d3f002aec0a4a08354febe47b2abb955f2a21107626ef0b8e1e099650812a6fecf36908fce2d078c2735cf7c2b970a309e5c6d6ff29c26a05720c57105":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,128) #1 [#1]
depends_on:4:2
9:exp:6:hex:"b5ca3991d0160b1729ae1a622dcf4b03b1f4ba86150bd66bf35cbbee9258af10":hex:"f8402184d1cc36df07b68ecb1ab42047":hex:"d378cfd29758bcbd21e26a324239c42c992941b3ad68d9f2b3d2def3a051fd172ee882562970ef59798ff8d9eb5f724ff17626156f4cf5d93e41ffef6e525919af6194ea9bbb58c67563d3ffd90e5a6e2a3a33bd1fa3d55eff5dba7cd439d571f7e08014c4780e3d10904ef22b660897e78258da20b2600e88d71c35ecb6329a":hex:"62aad5854a238f096bdde0711ac6f5763e7fea29db068ea8c911f17ba91e6d7807883e6fc5ba7db17af33da2b00973008a3425e65cc786ce1b97360019ee2cef74563d54752be436b905705b507c3d62689df4edf0356d26b693eb43d8a2a927a9f3866b7e0e19e84a90447bd6f47e31070fa7c2a71e3f78229ee19fa47e848f":hex:"9e8b59b4971130557aa84ec3ac7e4133":char*:"":hex:"556dd32edc0af3c64186fe8c000ddad1516cd14721c93c228e379d4f87e32c79e734539cec930322048f34a2b34931c585d44f09966caf187ec4b9244c991a8a5f263e9da1d08d6086e52535afdb36c7662307521cbceb9ecb470a76970243723fbc1613b6ebbcae261ac2f1936e66ce29ec7350b2e6b2f73a910ade645154f7":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,128) #2 [#1]
depends_on:4:2
9:exp:6:hex:"df867d1dd8a287821a54479cab6f88636d2aca30e1bf01a5dffc735e17590356":hex:"35019826c51dd1ef07ff915d9ac4ea96":hex:"0375ed93f287eefe414ab2968844bd10148860c528dbf571a77aa74f98cc669a7fc317adc9f7cf2d80dda29b19db635b30a044399f3665b6176ed669146d28f5ada03b3d32d53fe46575a8afcd37f20386d9e36f7e090b4fefadfab7f008e02f1b5022c0eeb81d03443a276eae48c038ed173631687d2450b913b02c97243edb":hex:"6517272cac85d7f38902bcb4b96a0c59c4bdc46bfefa6ebacd7f2fb1629b87ca91de2ffefc42ce3cfd34dcbf01b3f7cadcea3f99e6addf35d36c51f2ceb1f85c1f56a04ec9c9fff60cd7fc238674992183ea3de72ef778561b906202b7b83fe6562a0bca9c1e0a18638e8685b998b4192f5120435809ad6e93a0422d00725262":hex:"e49beb083a9b008ae97a17e3825692f0":char*:"":hex:"723be39bc13adbc48c861b07753f64fac1ae28fc8933acba888b6538721df0a8b91c040a26522fe0dbb7335d8f63d209e89f7cde23afa9ca3c584b336d63a91e07fdd8808b14c3214c96a202e665bbaaa34248ff30348f3d79c9f16e66ad6c5903305acd887a89b6244eb7c2d96e18b13a686de935bf3821444ee20f48678be5":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,120) #0 [#1]
depends_on:4:2
9:exp:6:hex:"0e8e9ce6294b7fbc534a96bdd060120976a6e08315d2ea73ac61d085cd462a44":hex:"4edc6be20f904b4789e5bee0a80a3fc8":hex:"db28ce076b360816cd1e04b7729f8ab080e0a07f35204350f3bd056945aab8638c0e8311ab056f3e5debdbfbb03fae700770264faf73e0f3a05a5812aee84ab613c82f4a76da276250675f6a663f85e2c26d4f4a8666a7f4cedaffc1a7218dec11ca4e72b8b5d5b620d1efbd3d3b94a5ae0d118b9860dfd543b04c78d13a94c3":hex:"9855f186b51358f0e2111c06bfaaeaec9bf95c55e246375c614fad9883d86c82a20c86538dc5f42a0ea69677d59a20c5112d15d2a8396f12096242ad5d7b838d16ee0679fc4017af75bc15e8ad2f77b0e802c864031cbfb0bacd95c828d1db4b7bab0713619e9e5e8fe6902aac7a9e6c42eb05f5b156f7e663ee43e6fdb62480":hex:"03cfe6c36c3f54b3188a6ef3866b84":char*:"":hex:"e10142f852a0d680c983aad2b4609ccbd35ff61bb3eb66442aee6e01d4cc1cd70f45210acbd506395d6ca0cfebc195a196c94b94fc2afb9ffa3b1714653e07e048804746955e2070e1e96bff58f9bc56f3862aaa5fe23a6a57b5e764666ddec9e3e5a6af063f2c150889268619d0128b3b5562d27070e58e41aadd471d92d07e":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,120) #1 [#1]
depends_on:4:2
9:exp:6:hex:"886c77b80f5f3a21c01932685a540b23629f6d41d5574fc527227ed0bdf2e21b":hex:"5ec506edb1890a5a63b464490450d419":hex:"05b8d820c9f439d7aeae5c7da0ee25fb0dad47cc3e6f3a47e8b984e856201546975f8214531fc3c2e504d2ac10fa49cb948596b9a8fab01b95c49d6f04d1589f93b77b899e803dd20e1f00a51c0b5953e85be639109b14b100e35ca26d84ea629964b0db8260dfa5a150a66261bf37e79de2ec49e9f1b082a7c58ecd3d39b6c9":hex:"53a17d7b69f607f08676d6f6dd4e8db08e01333a8355d8c87616e84cdf10ef5b041fc6ddc3f6a245c0f534c2b167064af82f45e4702a5e8dede59579fdecf6713353392433950c9b97c38d9ee515ac97d0970ccf03981954540088567a30941bb2cca08cbed680500f8342faa7aebbc6c143e2ea57ba6b4ac1fd975dcc5d0871":hex:"ffdf56e1c1a7252b88422787536484":char*:"":hex:"79ee27adfa9698a97d217c5010ec807806feda37db811e398c3b82abf698aece08561fffc6c601d2691738e279eeb57e5804e1405a9913830e3ba0d7b979213ef40d733a19497d4bb1b8b2c609a8f904e29771fa230c39a48ebb8c3376f07c8013fff6e34f10fe53988a6ec87a9296c0a7cfba769adefe599ec6671012965973":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,120) #2 [#1]
depends_on:4:2
9:exp:6:hex:"5231ca6d772edd9ea2d251e22d7d455928c22474b4b44130dad57e6511fed6ee":hex:"048698a4a0feabc1f336112e2794795a":hex:"3a81b6b0b722899ff931cb73c39222d555b83ae3f8880b982593cbc1ab8be90d1ee32fd7dfe697cf24c95b7309d82c3fed3aa6b3d5740cc86a28174ac8f17d860ebb251ac0d71751c2ff47b48bfb0b3beb4f51494464cda34feaecddb1dbbe5fa36c681ada0787d6ed728afc4008b95929a1905787917adc95f1034fedcd817a":hex:"2767c808410ee132291585ea74a48ad3102f883f07d060c91c5f10abd37fe0996d2210dc490260238ae15f5d74c7be2a1e15d80db09079c520047f88488a7802857a3fc3b81d85a96949997430a880177880a31d4d0c9c9045247804f057a4f2756d6e40375a4a3187c4376d6bf573ce334cda1ed88d8a50db499e7cdb89d8db":hex:"ba61edeb7b8966188854fc7926aad2":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,112) #0 [#1]
depends_on:4:2
9:exp:6:hex:"5a3f516a7898e04e5da4efd6c7c5989b77552d195464620c2b35b9a4fda29cce":hex:"9310af6974890c0a0364231f9cc8103d":hex:"2103af8356bcb9dfc2a4f1d4ed09cbcd8e1990d23865605e19f87feb50bf8d10d0257740e5557a9297f0499c01e29a1a513ca18e6f43f7406c865cbe3951a7771128f3110c8da3bd696368901944549552842a1f6fd96cc681b45da098f3c1acb3d237d2363285f520d0b6714b698790b7660c52ac84a42c9721ac7e9d38a2ef":hex:"5cc28b61ae97557774bdcd7ff653f4aa349df68d53c7e5a65263883ef1fe224ad40e86bffc2d38f28a2ed9ae1fc08563e2a1e46246106546eb8e6064c06baa0046fa137421734b7f0f94656a4f459d9d981717557d843700d116b6e5e2dd3af5f67c34edf31b40b71fd3c6f2475f9310feb70bcb973be52d41e86792c49d54c0":hex:"993fc8e7176557ee9eb8dd944691":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,112) #1 [#1]
depends_on:4:2
9:exp:6:hex:"59c9258554363d8a885fc0f5d112fee08eadfc7ce52a0e7e73e3d0d41d9a0290":hex:"77e51e89dc47bbcac79cca21e81a61de":hex:"25a6f8800a9b914c0ebf9a45d72355c03ee72a138eb81b2980f332645ce1d7aa4659805821866aee2b276e2c032776b4eaf36f93b5f9a72b791be24e31eff105ca6d0700e3069ee327983dd7fe1c7465d6c6d77837aff69055149988e7199847fad98605c377d997dbd40f3e2ff1a4f978a493684e401249e69540fbde96323c":hex:"79c491411402ea7878e480519fd984dde44bce6459303bb76d4eaf97d4e345d1aafaa68ceb0590b41cfed0f411b675d9344c7e888cccfc9eb6fe6b229d198f94ba516ee850ee7f078a4f5f32a23f92f72264e3a76a31ebd042564315ac4f2ec0bb49ba6d08cfd2d3a6308688e39f28e3ecd669c588368cee8210edf5dbefb925":hex:"ee6d85d3f3703b45adb4f9b2f155":char*:"":hex:"44ca68deed5478074adfddc97f06f44c08bf7bca4dee8707d621fc7396fe2efcdad0a167d1708a9ff59ce4cddb86920bf1dbdf41b2109a1815ffc4e596787319114cad8adab46cf7f080c9ef20bcf67a8441ba55eac449f979280319524c74cf247818a8c5478ea6f6770996026a43781285dd89c36212050afc88faa56135fb":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,112) #2 [#1]
depends_on:4:2
9:exp:6:hex:"5e9eae594cb54c8089330e4404ff79abb1c0841b0be5347a14633ad1e1ff44fa":hex:"0917b486da754f48bb43ecc8766a7ce3":hex:"2aa1ef2f91aeba5da10b48a882dbd4574df4e9157a18abf8cecd03e4176712ba171b6ecb0e745841ff84e35063e47b08101afc44cfd9cededb913a82f00b9d4bac922f23a22f200642270399896405d00fa5271718eefb4cd5fe7e5f32097766ebff36ff1898a1c8a1a01cc18e6121e470805c37ff298fc65ef2fb1b336d09fd":hex:"32abc1eb6077555a85a0a6fd1c78cccca6c8b375842e2eb8eee45ee6c38dc0837443d16c647252e8124639dd01c808ac5e857a25d927c2a75e2fa8955cad5beb5c206fc050cd933fc4621f5718936f01f39dd700ae1aee7537cc595df8789c5d1a6e1e87b1c7a60e3ce5d57c80dd65dee3801798e1481b1963bcc78cc69f8c50":hex:"92282b022e393924ab9c65b258c2":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,104) #0 [#1]
depends_on:4:2
9:exp:6:hex:"aaf03c3055a35362212b9b059931e7a24fc71e32bc9a533428c9dc31077f2ebc":hex:"7dfccd077b29e6ed5720244bb76bde9f":hex:"21edd1c6056f51fd5f314e5c26728182edcd9df92877f30498949098dcde8089eed84e76d774ef8874d77125669a302d268b99dcd66b349d0271dde6f8cc94dc4f2df3787887b1173cad94d067e346846befb108005387102854d9387d2c0fbc9636cdf73a10d145f4b612c201b46e1ff4465f6a7654ce3da5792daf9a27fb35":hex:"c0e12cdd8233878505e025d52427536be7b6bf1887d2dd20eac7092db80b22417a3a4ca83cdf5bc5e36161be1ff9b73f7ceb297c6d07c9cb2a75035a5dc079e48283daea60596f4b356ca28c243e628cbe459f069709fe193394c9b1a31d8ccc5a3a4eba30056c415e68571a2c34bb5c32efff12e9aa483c4a68be5e76aba4cd":hex:"6154c6799ad7cdc2d89801943a":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,104) #1 [#1]
depends_on:4:2
9:exp:6:hex:"60c775971a9eac7950ed2bdd85bd60fe948ba04c419f6743fb67f37557e46c6e":hex:"9b92ad7079b0de09c94091386577338b":hex:"1f6a84b0df75bd99a2a64849e9686957c6a60932ebe898d033128be9b757e9890225925d856bfdc33ff514c63145f357730bb0435c65342bc5e025267b410af6fd388a5eca01b7efc87fd3b1b791df791bd47dfab736350d7b7f368b4100e04c939d5af957bab95ed502dac904e969876674602a0f0790da2d7351b686e46590":hex:"8abb2e66a4d08074916056bb8e925551372f737f0e1b597c5d08ee102989743a273b29d7281013f8b3aee2934399cb427370d70370ee86eb41584b653660c633506a53cae747826bb7d93909f069d5aacf058b7f2bbdc58ea08653db857bda83a979fc22a4f126dfef7aac45177f4cdb802fab0c812fb35d12a8176ec21336d7":hex:"1d6cd4ab3914e109f22668867f":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,104) #2 [#1]
depends_on:4:2
9:exp:6:hex:"3b426e449337a14bc0663246ab61b671b523c9a3130c21ed59c93fa6a5aa5ae3":hex:"e6efc96acd105fe4a48d1ac931eea096":hex:"0902cf7a0685444126369712ac47962bc2f7a3a5837f1b6190d9ab1adb4cd35e7f0892eee628b8e07fcf2b598cebe1ec07d8c4823172ae66a135bb51cc71590707b691a66b56af1ffe38772911d11685da355728eaddd83752d21c119d7b59f4c17c2403629fa55cd70cd331aed7b0de673c85f25c2e9e0267f53f0b7480c8ca":hex:"291bd5a00d71eb7d547b7c94e7030ba4a947418eaeb378a3bacd304b08c6f92f6958eaba968ac6aa23e0512a2a8ad7c1ca2f8fcf623bfc1281f5b7b598c08d2aebcd447668b23238c5e338b4c2ac7f8fd381714c596ea3e0c17aca4317a08563e58f0f52a8af08e078dc242ae54ee0fe3869f8c9687b004a4ded0aa27d8f4c5d":hex:"ca4bfeedcd19d301d3f08cb729":char*:"":hex:"bcef3f2fd101b828d36cb38530cf9a0a7a285ac1c55ee1069cc78466327e85887534c98a8891d579effd832c0f7d6e7e822fb1eea85a39317a547591def4aeed6660872859fc9d1df9725d3c40e9ccaa900e0f1426a55d20ac4f2e8e07bd3bbc687f8e059ab93e7604c97e75ac94be1c8c24f4c4da0080a4d77953fb090cbb62":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,96) #0 [#1]
depends_on:4:2
9:exp:6:hex:"ceaf204ff504ea8e7fade1a2097f2b527a44766860447322fa5ad346cd810217":hex:"cfdb8183251f4b61c64e73243594fdc6":hex:"a60f3969fd1b14793dd1425aa0b1f742a4861e0b50eaffd1525cd209ba6d1252176763bb5bee59aaa55f92341cdc0705899aba44cf0ec05cbf80274ebef65cd9507fd4224b25cac19610968d6a37e2daf9ddf046ef158ef512401f8fd0e4f95662eebdee09dd4a7894cc8c409be086d41280bd78d6bc04c35a4e8cd3a2e83be3":hex:"1c8e4cf6018211518494d46c2e0607fa42e236abc28d58f8175c530f84b1f030572f5f6a74cb5517e1fb999a637d352afcbeadea9121e695675859b66b499a3a351ecba5226e58ebbb59fe12e359e4c89cd51c8703d4643c49921ae495801c73627df404b91e828e1d0e03ae09a39defb5aa5f2c8106953772ba0713d3261329":hex:"9e45029f4f13a4767ee05cec":char*:"":hex:"5cdc66b587ed5eebb04f42b83a6ab7017093514881c598cce332d74fa3fab927493ac15bff26835296e080b5b45ef907c0529fc2f4ed2fc09db179ef598e5d193ea60c301d3f8d823404814e3e74de0e1d2417c963e9246c353201c7a42659d447376e7d05c579dd4c3ae51c2436407b8eff16ec31f592f04b8013efcfd0f367":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,96) #1 [#1]
depends_on:4:2
9:exp:6:hex:"15652abe38cd09777bba21d0db04637f5737d3cb3922181b9f2d07bfdafd327a":hex:"3a5e0d223ae981efb405566264e3e776":hex:"cd755437cb61b539908e0cfaaa36c0123f8f17d1e6539783cb61d4b56cac3bc1e971c1ea558b12669b025cb6b9ad55991c6e2f8ee8b0b7901790193e226a0fbbfff7ff0bee6a554660b9f32e061b6c04bf048484ff9ebd492f7e50e744edd72d02c8fd32f87f9421bf18a5a20ebb4d9dbe39a13c34b7296232470e8be587ba09":hex:"1d6c153dec3b4738a09c9fbdfe31a093eb7ea79b8fa49f83e5e1f46893590f074fb171fb66e30ef887767014e3a10a3aa05da2bd50dd7b7936e1d7f6f31af9030e31e76bdf147f4396464db0f6a72511c4885c6c2305d339906e3c761a3249d7ebea3bf463e8b79c3706e684575550e964b8047979f7aed6ea05056c4b5840b1":hex:"01a573d8e99c884563310954":char*:"":hex:"162430c23f7adcf98575a2d9249b4b5cec42efae33776360ebfa6a19c8eee4bd6b07cbd274deadc3292b7cdbb7803e99d9f67ccc5077f3ad5808f339a05b3213dbfd11377673d4f9b486a67a72a9ac8ea9ba699861dce0de7e2fd83d3ba2a2ec7fabf18b95a2bbe2184ff7bddd63111b560b3afe7f2c76807614ba36c1b011fb":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,96) #2 [#1]
depends_on:4:2
9:exp:6:hex:"a43f6d07042a15cd49f6f52a2a3a67c6c2ff420d95bb94b9fe03b287c3abcaf8":hex:"3b6fad21f0034bba8b1f7a344edf7a3c":hex:"2e01c0523c8293fc51388281dccdb8d0a2d215d729289deb327b8142d716c2bb849e9476545b82f3882ba7961b70c5da2a925ba18b6b121e9215d52ac479c9129c9cd28f81584ff84509d5f9dcb7eaae66911b303cc388efa5020ac26a9cd9ea953f61992a306eb4b35bcd8447eea63cef37bb0c95c1e37811115cf26c53e8c5":hex:"b67e58c8b608724fd20aa097ee483bc4c804490cc79de635170944af75c87ae0ad8261365c1dc80d852553bcba18da9fbc3fbe61d27550a03003ef0c60202054626655509a9e1ab54677e537a4e761df011d6c6dd041c795446b384161ae9eab441afd24d19b58eb4fe5116cd7b11b751ebbd0a2adba7afc380d9d775177099a":hex:"43470bc3d7c573cb3a5230f5":char*:"":hex:"e1720d451fa7ab9db4988567187244b15b6fe795dd4fef579fb72e41b21aaa436d2e5d8735a4abd232a3fb9188c75c247f6034cdebb07fd7f260f8e54efefa4f2981cafa510dd5c482a27753a7c015b3cae1c18c7c99a6d6daa4781b80f18bbe6620bfc1518a32531017a1a52aadb96a7794887c11ad6bdd68187ba14f72a4b5":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,64) #0 [#1]
depends_on:4:2
9:exp:6:hex:"1f0f0191e18db07c0501dbab4ed952c5603a4cd249d2d8d17e62e10b96ae713f":hex:"ab8be16b4db809c81be4684b726c05ab":hex:"a5a6e828352a44bd438ad58de80011be0408d410f6e762e3145f8b264a70c593476b41bb87875746c97de7d5fab120bd2f716b37c343608ee48d197a46c7546fafcdbe3e7688b7e9d2f5b6319c91d3881d804546b5f3dbe480996968dd046f406c11f0dc671be0421cbc8b4ea6811dd504281518bb96148dddf9f0dc4e2e2436":hex:"aad40e7866c26e486b6f6e8eb14a130d5f88891bf0d09aa8fe32f447ab8dea7bee5d3eda4499c0103a010483f2b64fdf1155499d31decf528c77dd7627884f9995c213cf7402143dbb7561d69c86886734260ac94ffac7eb33598d25714228ef43f744ec1af2a87e789f1e5d6fff0fbd5082dcc49328f194e8f8a14a5bfc962d":hex:"d8bd7d8773893519":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,64) #1 [#1]
depends_on:4:2
9:exp:6:hex:"a6cf7d83137f57f2310ee6bf31e8883952bb07ccdc12f516233ed533ea967e5d":hex:"f17e37e73a28c682366bfe619cc673bb":hex:"0f4dd201b18e20230b6233e0d7add6f96537dd4e82d3d0704c047fab41af5faf6bd52bd14fa9a072f81d92a2ce04352f0b66f088c67102d2d127a9850b09ff6087f194a6e8ccaba24091feb303eebb65f1203b2d22af44e7be4de71f03e6f6cbadf28e15af58f58eb62e5bddfae06df773cc3f0942520de20078dda752e3270f":hex:"83ab20698fd7573fd121976a72b45a7f03aad84702fc8ac73d6926eabd8a546895aeffe4ba81d117507e2cd37d58eeff71cc3afa8a4449be85f228ea52f6dc6395bb43c1c9f795343720841682d9b2f00602eafa4d4cbe297bfc62467e526b9d823cc8eeecd9e5f8dbc2f65610663c6f37b3d896651b254bd60215629ade3b2a":hex:"74110471ccd75912":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,64) #2 [#1]
depends_on:4:2
9:exp:6:hex:"b0c85ac6b3887639838ddca94c5c69f38115aa00122322c8114642d12ea1b8fe":hex:"14f68e533ecf02bceb9a504d452e78c7":hex:"796a46236fd0ff6572b1d6257c874038f870aa71cbb06b39046d0fb6489d6ae8622b5154292ae5c4e1d5ff706daedb2e812533ae3a635d339a7fbe53780e3e8204924a5deb4b6856618f4c7465d125a3edffe1ab8f88b31d49537791c0f3171f08dbb5ed1d9ed863dafbae4ecb46824a4922862fe0954ee2caa09ab0e77ed8fc":hex:"0210fce418e7e2199cb8f899c81b9be74a630d00269755f882fc4db27632e99685cc12c426a7503473646df1288d0ede28408be9add5713628700f8e2b2e27d7522520ed00ac47239084651eb99e7d03e1520aae137b768f3144232c16b72158fd5da4a26a2525b9b27791bf06d1eb2e671c54daf64fddc1420bc2a30a324ba5":hex:"6fb0b5c83b5212bf":char*:"":hex:"5e6c362f7587936bcb306673713a6f1fb080783a20e9bbb906456973e529cfa0298206184509c30e1d3793eaaa5d564edd4488f04311821eb652e0a1f4adaf6971505ca014788c8ce085ceb3523d70284ed2bb0aebeba7af83d484df69c87f55a93b3d87baa43bd301c4e55eb8c45dcf3e4612535ea1bd5fdb4c3b9056d0cae9":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,32) #0 [#1]
depends_on:4:2
9:exp:6:hex:"e61b1a6b40e2ab1245ff65dcfb9948318ac4fe55e9ed600cec301dae32ae0e93":hex:"c356244b3034d288e4d4fe901b8e27c1":hex:"bdcfeb09d5b97bab05a7acd9849e7de2c5beb7a4dc573c7e1c1d0c0409245a6584023114fdcc6413c800ca16847bde750b27c4d590248e2ce457c19b0f614f6aff4d78d4a19b3251531e5e852fbb05d09412cc1ff8988d1955ca6f5fe2d820f20a7642e3ae69e8122b06ba0918e806400b9b615e1abe6fdd4f56a7d02d649083":hex:"8d67fa9fcf078e421cb63abeb25dba739ab0e09a091dd06b0c616e1e888f350edb2d73a42f57f115266ea20c7f8fc143ac746649612df06a5e29b4a15934dc049be1ab49d018ab86c4f37d8c3d9c714f038029e74d8ee3dbe61d81adc63712ea413b37f7604da12107aa1695d9b0981e5a92cdfaa5fbda0e31b22c6fd6f3b499":hex:"86acc02f":char*:"":hex:"7c73182eca97d9617abb478a6ce62e3491a7e9951981c89c3071b161a4c80440614c3f24d0155073e28dcccee96bc8303dab4901ef77318df522d16d9da47770ef022395d6104cd623d93d67090a27507fc8ca04157e7939e639c62cd0e7d8a472314833c0eaa9ba2fd54a25b02854e3bff25cccd638885c082374ae520ed392":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,32) #1 [#1]
depends_on:4:2
9:exp:6:hex:"4f5a02e9843d28c8c226ed70d44b8fced8fb757ab6ece4d4f06e3c3cec79e44f":hex:"099e5d9aae89fb6391a18adf844a758e":hex:"ad93e8662c3196e48cfdb5aa3bc923cd204151aa980cbec78f0d592b701f779c1c49f9e8686d7e2385a4146b21a643a59c18c8b82214f42560bcd686fad7c7c8e8c1944ce6b20ec9537dd14b6cf2592740ca112f4cd582250d69f240d3e957040e1f7e19c60b3c8f2bd00cb666604c38946eb9b2f17336d281b4794f71e538a2":hex:"3ec13950d329f24074714c583bdc35686b811f775b76b0a8fcfa66fc56426c9d022f8ab0af38f8d2f71a068548330cdbe891670181ed7491bf40c739ef4dd93689fd35929b225089d2b151f83d9b3cd767300611144586767354c0491112c205409f3168092d27f9b9f433afb79820a2811984d48e70c1fb2a13bbb3ddbc53fb":hex:"30298885":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,32) #2 [#1]
depends_on:4:2
9:exp:6:hex:"1cdb218e0bd0e02156e5b48182990f778889793ef6018a8928e61164ac047c8e":hex:"d2ffbb176f86bee958e08e5c7c6357c7":hex:"bc580c4223f34e4f867d97febf9b03629d1c00c73df94436852cafd1408c945c5474c554cb0faf2bae35d3160c823d339a64ebd607cf765fa91f416fc6db042bc2bd7445c129b4a0e04b6f92a7b7b669eb70be9f9b2569e774db7cb7ae83943e3a12d29221356e08e5bf1b09e65f193d00d9fe89f82b84b3b8b062e649163dc8":hex:"4d039618a0eb640329f90fe97de18bc928fc3fc7a0db42c97774bec2e882e872fc1097c8319f7837a16516bf387b1bae321c565e8fc1cb8480f051158e4685f0adba310d2c6253bc1300403cbd3f7ddcb2796a69f8bf9e73d47aada9a02673c1a3d5ecdac838abf22b385906236529a1b7dd5b8af2611a04cf4f83b15ba41cfc":hex:"1997daa9":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,128) #0 [#2]
depends_on:4:2
9:exp:6:hex:"dc1a145c18bdbca760f35eea0d4a5992de04a0615964ec8b419c8288ab1470f0":hex:"7f8368254955e1b6d55b5c64458f3e66":hex:"":hex:"":hex:"8ddaa2c3ed09d53731834fa932d9d3af":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,128) #1 [#2]
depends_on:4:2
9:exp:6:hex:"7b4766d3a6615ee58b390daa228ae7a541c46ce80a1efe227cc43cb777df3232":hex:"274367f31ec16601fe87a8e35b7a22dd":hex:"":hex:"":hex:"5f3a757b596e06e9b246ed9bac9397f9":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,128) #2 [#2]
depends_on:4:2
9:exp:6:hex:"d19b04055bf6e7ff82e89daef66c9d8319ab25f9197e559444c5729b92c4f338":hex:"796efaff4f172bef78453d36a237cd36":hex:"":hex:"":hex:"3b445f38bf4db94f1a9ec771173a29e8":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,120) #0 [#2]
depends_on:4:2
9:exp:6:hex:"7ca68e300534a90a7a87ca9906e4ac614a6aa51f769b6e6129753a4f83d10317":hex:"45e6b23f8b3feefd4b0ea06880b2c324":hex:"":hex:"":hex:"6c0a1c9c2cf5a40407bfa1d5958612":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,120) #1 [#2]
depends_on:4:2
9:exp:6:hex:"a2b7cd693239bbc93599d3d12c9876e7303b227b8ae718e2c62e689e1fd62903":hex:"548c9c8fcc16416a9d2b35c29f0dacb3":hex:"":hex:"":hex:"3aa21f221266e7773eeba4440d1d01":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,120) #2 [#2]
depends_on:4:2
9:exp:6:hex:"156b854beb0c276a5e724f5da72f0d1ca4ae7cbd5f93a2257d95c2e5bfd78ad4":hex:"a5129e2530f47bcad42fc5774ee09fe7":hex:"":hex:"":hex:"6bb09ed183527c5d5ed46f568af35f":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,112) #0 [#2]
depends_on:4:2
9:exp:6:hex:"d824330c60141264e1f709d63227a9a731bcc42b4adec1d8f0161b10b4fdb2ab":hex:"c5afaa45312c64ab3c3cf9d6c4e0cc47":hex:"":hex:"":hex:"55952a01eee29d8a1734bbdf3f8f":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,112) #1 [#2]
depends_on:4:2
9:exp:6:hex:"b5517589948d8aea778df6fd66c17a170d327f69e504f0a4bd504c4286a9f578":hex:"6404b111c6289eefa0d88ed6117bb730":hex:"":hex:"":hex:"637f82e592831531a8e877adfc2c":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,112) #2 [#2]
depends_on:4:2
9:exp:6:hex:"f6137b2bcbd327fbcc7f313efa10f6ffaed30e4782e222e1225c87103fcae905":hex:"3b87b08337a82272b192bd067e3245ec":hex:"":hex:"":hex:"1f2dda372f20ffddd9dd4810e05f":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,104) #0 [#2]
depends_on:4:2
9:exp:6:hex:"b5e70d1b78e931abf44bba3f937dbc344858516a8a8afe605818dc67d0c3e4c4":hex:"58e70095c6f3a0cda2cdc7775e2f383d":hex:"":hex:"":hex:"1763573f7dab8b46bc177e6147":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,104) #1 [#2]
depends_on:4:2
9:exp:6:hex:"90de0c047d1dd01d521f2dedec7eb81bc0ace7a5a693a7869eaafbb6e725ad7b":hex:"d565c9cdfb5d0a25c4083b51729626bd":hex:"":hex:"":hex:"78738d3e9f5e00b49635ac9a2d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,104) #2 [#2]
depends_on:4:2
9:exp:6:hex:"c43e8dbeafb079692483a9fcbab964b76fccca6ca99e1388a1aa9bf78dfd2f02":hex:"f2bd4fe0d30c0e8d429cac90c8a7b1c8":hex:"":hex:"":hex:"ea7b52490943380ccc902ca5ae":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,96) #0 [#2]
depends_on:4:2
9:exp:6:hex:"13540919fdb95559e37b535a427efeee334309e34c4608459e204d931b8087e7":hex:"c993c1802df0f075ce92963eb9bff9bd":hex:"":hex:"":hex:"edfab013213591beb53e6419":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,96) #1 [#2]
depends_on:4:2
9:exp:6:hex:"2a7b2e07c148ff0f627ae28c241a395876bbed0c20f3fd637330e986db025714":hex:"8f7e1621c2227839da4ea60548290ffa":hex:"":hex:"":hex:"f9da62f59c080160ec30b43d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,96) #2 [#2]
depends_on:4:2
9:exp:6:hex:"b3e7837a75b38ae6d4299a1ae4af3c2460dfca558708de0874d6b1a5689b8360":hex:"05d363b2452beff4b47afb052ac3c973":hex:"":hex:"":hex:"6b4a16d1ea1c21b22bdcb235":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,64) #0 [#2]
depends_on:4:2
9:exp:6:hex:"9df3ccd95f7570f6ecf5e5329dcb79bcd46cbcf083fe03aa8f5bd0f645c6a607":hex:"774f4e70a7577b5101c0c3d019655d3e":hex:"":hex:"":hex:"98ff89a8e28c03fd":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,64) #1 [#2]
depends_on:4:2
9:exp:6:hex:"1c7123e2e8d3774c8f1bdbb2272f19129e04f29b4351ae19c3b9d24e6ea1fe87":hex:"99f25cebd6cfa7f41390b42df6a65f48":hex:"":hex:"":hex:"8e14a0a4853a156a":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,64) #2 [#2]
depends_on:4:2
9:exp:6:hex:"490090323e9257517e2453469caa3414045cacb4d05d5cebc6b9c06fa6d19291":hex:"c1beff1ff6cdd62339aa21149c4da1e6":hex:"":hex:"":hex:"f998d7c08d609b3a":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,32) #0 [#2]
depends_on:4:2
9:exp:6:hex:"360e48dd38d9e7f5bf29a2994ab5b3c9c70247102d94049ae791850807a4c845":hex:"88126c350dfc079c569210ee44a0e31a":hex:"":hex:"":hex:"f2ebe5e4":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,32) #1 [#2]
depends_on:4:2
9:exp:6:hex:"1562b32e4dd843edaf4474b62cadd8f46d50461f5b22c9f1a8eae7367d35d71b":hex:"af29fdb96f726c76f76c473c873b9e08":hex:"":hex:"":hex:"13fd6dfd":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,0,32) #2 [#2]
depends_on:4:2
9:exp:6:hex:"d5160d0c98ffcb1c26aad755f67589000e2bb25fa940e6b1d81d780f421353d9":hex:"1552604763453b48a57cea1aed8113f4":hex:"":hex:"":hex:"660c5175":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,128) #0 [#2]
depends_on:4:2
9:exp:6:hex:"c3a3ea3a097c0c2b3a4cb78462d87fd5a8f348687c4150e9d3354b388ab13d17":hex:"f77945979241fb3a454d8e3da193e169":hex:"a69bac31241a2c07d3f7e331b77f662b1e67ccb81c07f52578b01f5785de9437f02eb7627ca7b9af09c1cb428fe93d6deb31f4d6dd2f0729f87480bdeb92d985de1aaad4bcebc6fbad83bede9a5dd1ca6a15bf5d8a96d4edb5bee1f7d195e9b2e5fb2221a596d69f257c18a143eda870e22d3f2ed20c9b3b0d8c8a229c462fff":hex:"":hex:"6b4b1a84f49befe3897d59ce85598a9f":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,128) #1 [#2]
depends_on:4:2
9:exp:6:hex:"e1626327d987342cba5c8c63b75b4ed65463a2b9c831f4f9f80325fa867d1d73":hex:"4e25800deab7ecec2a2311f8fb44eb7d":hex:"ebaffd558f24dae03117c69ac4b2b4aaeaffe7e0e7599eaba678bfce23a9914dc9f80b69f4a1c837a5544cba08064a8f924064cba4d783623600d8b61837a08b4e0d4eb9218c29bc3edb8dd0e78c1534ab52331f949b09b25fbf73bece7054179817bc15b4e869c5df1af569c2b19cb6d060855be9a15f2cf497c168c4e683f2":hex:"":hex:"8faa0ffb91311a1a2827b86fec01788d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,128) #2 [#2]
depends_on:4:2
9:exp:6:hex:"938da64b837275b0c80c442bdf2301aa75e387fe65a775d10a8ec840f62ff429":hex:"dec6adeb60216cbb8a6c3afba49fa201":hex:"4ac144bd95f405649444f01ab67ef3e4c0a54fdbd933b6ba00518c79db45c22c90030c45aadcfdb53ec8199be0cbb22dbb9ab938a871f4b3b0c98ed32590a051abb946c42726b3e9701f183b2092985e3457943a6350fbcaece2e6b111b179ea3fd10ac080a577a1481785111d5f294bc28519c470ff94392a51a2c40a42d8b5":hex:"":hex:"2211ca91a809adb8cf55f001745c0563":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,120) #0 [#2]
depends_on:4:2
9:exp:6:hex:"e2436484ea1f454d6451ad8dbd1574b208d7a3ab4fa34869299b85c24348b43d":hex:"97040d2ec094fe1c64fa35b35b7451a7":hex:"bc198677513ce0e66697dfe52b22315fa5d8f92042f34cc9f373a01f94607df1a599132f60af010ed9b5e52162dd7b162912b68b11700e08f5fdafd84d10f760fc05ec97c05b83e55155194f399594015b90a19c04fb992e228940fe1b54ba59c4bb8318b33cc0df1cb1d71c389473dfb3eefabfe269ca95db59a7bc0201c253":hex:"":hex:"2e080ba16011e22a779da1922345c2":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,120) #1 [#2]
depends_on:4:2
9:exp:6:hex:"7fb3fc72eb8a3aa5b102f90039f852cc3fd64f46915f5e49f1d9e02fe9cc13b1":hex:"f6120fea313362524917c53d90bafb4f":hex:"60c2be7fbd15faf895fd19a9ce775fe2b183b45cffafe4fcbf50d421bea97347e41a9418cfa129b2dda63b889a70063010215dbe38c37feae18bc31b34f31b726f22177f2b4b9d648dd4aa80edfd12dafaee10baa83224354432d1cb62ccabe38bb8448d162cd0d30e988d2e1a2458ffdafaacbdff928756390f66dc60d7ea45":hex:"":hex:"83de3f521fcfdaff902386f359e683":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,120) #2 [#2]
depends_on:4:2
9:exp:6:hex:"697c96d80d0a3fa9af35b86f31fb71a17aed30ce841c79896bbc8863b3b3ee04":hex:"3a5163ec7e007061838d755ac219855e":hex:"de50c12da63232768d5eb9920d49683b5b7114cb77448fa10b9d63552ec5d9c2eac94b375d11f944959f903bb20c696639b6e7f108ec1e873870098c631ddacb2c25268cfc26d2a4cacfb7dda7383374c5456bcf4daa887a887f4293f8caa14419472a8bf7ffd214dfb2743091238b6d1142b116c2b9f4360c6fe0015cd7de81":hex:"":hex:"cd4542b26094a1c8e058648874f06f":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,112) #0 [#2]
depends_on:4:2
9:exp:6:hex:"66c1d9ce3feb0e966c33e3fd542ec11cc32f18c2514b953103d32abcdc72633a":hex:"46fdb88fdde9b7d74e893802a0303256":hex:"55d2f263d2e3cf0b390fce1dd1ebd5f666086f26e1ce2f08002bedbb810ada3922c6bfcf6a6adaa556e9e326c9766f02b3eb6e278da2fa3baa7dbdb6373be3c6ecfbe646b1a39e27c5a449db9b559e7ea3496366b8cdbca00ee7a3dea7fdfbea1665bbf58bd69bb961c33a0fd7d37b580b6a82804f394f9d5d4366772cee3115":hex:"":hex:"96ca402b16b0f2cd0cdff77935d3":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,112) #1 [#2]
depends_on:4:2
9:exp:6:hex:"d7c949420dc9497232cd5810f316d11f9e85d36c430b5943ba79836d88c1eb92":hex:"7ef9788ff09cbeedd9569d49083a4097":hex:"ca1de5cc3fcde2638eb72210e551e9c0e0a3f5570d5be83a9a4406b545d854bf17e75b9cd0f4c45722fbd71319a317b72a8798485e9316a1c8102432b83bc95af42f6d50700ba68f6f2e19b6af609b73ad643dfa43da94be32cc09b024e087c120e4d2c20f96f8e9ddfe7eae186a540a22131cedfe556d1ebd9306684e345fd1":hex:"":hex:"8233588fca3ad1698d07b25fa3c4":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,112) #2 [#2]
depends_on:4:2
9:exp:6:hex:"6fe7c70815aa12326cdcbb2d2d3e088bbaaef98b730f87fe8510b33d30e12afe":hex:"e0253bd1f19e99a7f8848206fb8ac4a4":hex:"397897eca4856f90d14c3cdfe1ad3cba47e23174ae2dab7d2a6320898584e03bffa3ffd526f416d7b3c579b0f3628744e36eebb5df519240c81d8bbbf5c5966519c5da083ab30a7aa42deae6180e517cdd764b7f77d19cc1a84141817758887a8d7265e7e62279b9d33cd2f1ba10fd54c6c96d4b8a5dbe2318fef629c8e2af0f":hex:"":hex:"477b0a884d788d1905646bd66084":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,104) #0 [#2]
depends_on:4:2
9:exp:6:hex:"cbeefb3817cb02d617f385cf2371d52c8bcbc29e5e7a55cd2da131ca184c6e89":hex:"f74156d6400ae46b612531848bffe18f":hex:"1abe2ab05ceccf2391273126fe4a4426b94d2c3b97a7f1cd2ee6bb952bf4a546e972b5a1701d5ddb0e5bb7a248fcb47107a9fc77e4b9806b68a11850119aa239fa8be1370e3a2e1a8b168f7323afdfc4b8917d92570167848a56132d68876abc386c258a9233dc8a9eb73443b052e842c3d63e8b5369acdd038404e4e9a4b038":hex:"":hex:"0cb67cec1820339fa0552702dd":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,104) #1 [#2]
depends_on:4:2
9:exp:6:hex:"e6f5f65ce2fc8ec3f602f5df90eb7d506dd771337913680ac16bdcd15c56583d":hex:"9212a548c597677d1747e98ce6fb18a4":hex:"55ca486c0183d0134925880d2e21dde0af51c4c77c6038a5a9c0497884e0aa4715bdb5b4bb864acc708ac00b511a24fa08496df6a0ca83259110e97a011b876e748a1d0eae2951ce7c22661a3e2ecf50633c50e3d26fa33c2319c139b288825b7aa5efbd133a5ce7483feecb11167099565e3131d5f0cb360f2174f46cb6b37c":hex:"":hex:"08d7cc52d1637db2a43c399310":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,104) #2 [#2]
depends_on:4:2
9:exp:6:hex:"0e9a0391435acb57eae2e6217e0941c79a3ff938ec6a19b8a7db2ea972e49f54":hex:"27cd1d7af7e491e30c8110cc01392529":hex:"79140d32bb32dace0779e2d37a0f744d6d973e99a279962b43a6c0af63772e8a0a21d5d9dd3c33d4b218cb2f6f24dd8d93bb4e1e6a788cb93135321ecfed455e747fa919b85b63b9e98b4980a8ccb3b19d50d735742cb5853720c2ad37fa5b0e655149583585830f8d799c0d2e67c0dc24fc9273d9730f3bb367c487a5f89a25":hex:"":hex:"fbb477dd4b9898a9abc5a45c63":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,96) #0 [#2]
depends_on:4:2
9:exp:6:hex:"55a12eeca637654252e3e40b371667e3f308b00f2fd2af696223e4cd89e3fd4e":hex:"8a3793b6441258360f7f4801b03d0b26":hex:"f5810dc5f25e49bd6d94bc63c2494aa7a579a4056a25f1dd9b2734d0b8731ee52523edd54ff475651d45c213e1bf254327fb0e2c41a7d85345b02bcc9d27b08915d332e1659671991a4bb74055967bebbba6ecceb182f57977130623d5a7b2175fa5a84b334868661c1f450b95562928b4791759796a177d59ed18bbf141e2ad":hex:"":hex:"99230019630647aedebbb24b":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,96) #1 [#2]
depends_on:4:2
9:exp:6:hex:"3d353f870a9c088de5674efd97646b9c5420b2bcdfcffefcadd81682847e5331":hex:"f267fa982af5c85359b6447f9b7715ea":hex:"7cf55630867af5dff747c8dd25bcc531d94a7730a20b6c03d46059ea93fcaa00d07ee17dad0e0dff814b02dfef0cbe00b37fd2f5f95ead7c72be60016f2934d7683fc1e47185c7211c49cb03e209b088edb14e533dbcb792ab7033728904f7ff12381a236dba97894ec1fafcf853ab15fff343f9265d0283acef10168ffd1271":hex:"":hex:"9553b583d4f9a1a8946fe053":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,96) #2 [#2]
depends_on:4:2
9:exp:6:hex:"d227c9ff5d17a984983056fb96f3991932ae8132377529c29238cf7db94a359d":hex:"b8f6536f376a7efe0e684acf350bae70":hex:"1cc25da31f90de7fa47ebce92754d3faa99f88d4e25ccab45645c1acdf850d55d7f02f61a0bfdc3125f29259d7da8abef532fe0966c63d3486753c8a2cb63a39349a0641b2f2b9526a03b97d58ca60fbb054c6c164ff2836688b0cad54df2b165bc082eeae660e768dde5130e30f8edc863446661c74da69b9e56de8ae388da0":hex:"":hex:"44b95a37fab232c2efb11231":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,64) #0 [#2]
depends_on:4:2
9:exp:6:hex:"b2a57ef85ffcf0548c3d087012b336c46f6574cf1d97ca087bfad042ee83eec2":hex:"3d580402d2a8dc4d7466e5dcb456be7a":hex:"c2b9e95c16e55028794a63ef82d11fb83a2a75dc34a81f238e472c33264534bdd54cd07d02a0ecf9019ad1a6d6c779f339dd479e37940486950f183bade24fca2f24f06d4037b3555b09fc80279ea311769473eb0630b694a29823324cdf780d7d1a50d89f7a23b05f7a8c3ad04b7949aa9e6a55978ba48d8078b5a2fd3c1bbb":hex:"":hex:"072d4118e70cd5ab":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,64) #1 [#2]
depends_on:4:2
9:exp:6:hex:"63889ed5bf2c27d518a696b71c0f85592e3337aae95b5bf07289e4c5dfdc088d":hex:"1ad534280a0fac7dce31f2ae4fb73f5a":hex:"be1b9dabea33bb9443e27f674b27931c0fba699a33dc86fab29e50b76a9441030444b465317bbf2949faf908bc1b501d11a5ea2042e4b460a85f3be5836729e523d99b56ef39231d5c6d8ae2c2ab36ef44e2aa02a1f2c559c6e333216c7f9ed5f9b880a88e920219204c99a3ae8f90afd1396563bc59a691a93e0070b0b5fd90":hex:"":hex:"1bcea0ac2c1a0c73":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,64) #2 [#2]
depends_on:4:2
9:exp:6:hex:"94e3e2c17cfb6f52d4fdba3ba6d18bba891b6662e85df14d7e61f04adb69e0e5":hex:"8a80efb3bfe220526997543409fddb4d":hex:"05da1b0f7ac6eef488d3f087ecae7f35abe3ef36d339709dc3fcb5b471979268ee894c3b6c7f984300d70bc5ea5fba923bfb41d88652bdaecc710964c51f3e2ae2c280b7d6c8e3b9a8a8991d19d92d46c8a158123187f19397ad1ad9080b4ffd04b82b5d68d89dacd3e76439013728c1395263e722b28e45dabf1ef46b8e70b5":hex:"":hex:"faa5c13d899f17ea":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,32) #0 [#2]
depends_on:4:2
9:exp:6:hex:"fe5e479ad0d79dbf717a1f51f5250d467819e444b79cb3def1e0033c80ddadd8":hex:"47ce838083fd070d8544c0ad5337cdc6":hex:"98476bf05a18c4ff1b6024dd779c1ac06d838705a0a83fe42bee5fc6ebf3b2a1a5049b67f4aabc8239cd6ff56504bcbad1e2498c159bbec2a6635933945f6ea49e5bc763dcf94f4b3643d3888f16105abb0965e24f51cb4949406124145e9ae31cc76535b4178492f38b311099df2751f674363ae7a58f6f93019653b7e6a6f0":hex:"":hex:"a3958500":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,32) #1 [#2]
depends_on:4:2
9:exp:6:hex:"27d4dedb71a8f68ca5ce2b9e56da772bf5a09b7981d41cd29f485bd2d1adb8d4":hex:"7e6f0343c54539717a97b6c8b9f7dec4":hex:"d386db78043f719b7e137cbf79a7f53dda2fe3baccbebb57d499f6eb168e5151f10081d76b72ae0f30165efbdda469e826f9246e59dbcad5c0b27691c00d6c192c24073e99c19cf8c142087c0b83c4ce2fc7ba1e696394e5620ab2d117d5dcd2ac2298997407fd5de07d008de8f9941a4a5f8074736a59404118afac0700be6c":hex:"":hex:"50fd1798":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,0,1024,32) #2 [#2]
depends_on:4:2
9:exp:6:hex:"5a7aa836a469d28542d0d24d3232fad266da8fc889c6b6038b726d3da25f7b20":hex:"9faf7cd805803e143ec8f3f13475efd2":hex:"1006c707f608728b2bf64734062b12a5625062bcdcb80a3ce2058352a2922d5e6fbe19681b4f0d79ad3c837f81e72f2fbf8df669894e802a39072b26c286f4b05188c708f7c6edd5f5bb90b87ffa95b86d84d6c1c4591b11d22c772a8ad7f2fe6bd8b46be0e93672df2e8bff8ba80629e1846cfd4603e75f2d98874665c1a089":hex:"":hex:"07764143":char*:"":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,128) #0 [#2]
depends_on:4:2
9:exp:6:hex:"a9444fd176acbe061d0221fde3ddfcc4ff74e995d981a831297c4cbda51c22a1":hex:"5714732145470da1c42452e10cd274b5":hex:"":hex:"c146ff5a988496cad7eced7a2ea471e0117d5d6bd2562c23ce9db4bf36d83ba3fc22e90486ec288a627d208e0b2fd3b65f8301cf7fc41d97959981a95cd1cf37effc46db99b94b21c941c3613c26a10b1a6b7793f467d58ff5134612230f1c49d7e1fcf664fe52fc6eca46273982f6fe729b009d90eb8d8e4a0b0dbe907b76da":hex:"db85b830a03357f408587410ebafd10d":char*:"":hex:"a3cad9a57fa28e6f6aaa37150a803bf8b77e765f0702e492c4e5ebb31ae6b12d791149153e469a92bb625784a699fd7ca517500ee3f2851840ba67063b28b481e24ba441314e8b7128f5aaccaf4c4e2c92258eb27310bf031422b7fc2f220f621d4c64837c9377222aced2411628018a409a744902c9e95c14b77d5bb7f5846b":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,128) #1 [#2]
depends_on:4:2
9:exp:6:hex:"686d3bd071e3f46f180611bc4ec8d7726fe72b6c617e7d42b3339f53918c9e36":hex:"a714e51e43aecfe2fda8f824ea1dc4b7":hex:"":hex:"21983ad66449c557263aef299da6eef8f31d576fc17ed2dac3e836f7c2ceaff3094b2695452680e188df10c174810efd1fbaa6c832baedce0b92e4c7121447f6461ac909b4302cdf658095b1de532b536faa4fb38cfdf4192eb5c3fe090d979a343492f841b1edc6eb24b24bdcb90bbbe36d5f8409ce7d27194a7bb995ecc387":hex:"cd30c3618c10d57e9a4477b4a44c5c36":char*:"":hex:"9610908a0eb2ee885981c9e512e1a55075a212d311073bbb2fb9248cce07af16ee4c58bdc8dbe806d28480f9065838146f3e1eb3ae97012cfe53863a13d487f061a49a6c78ca22a321fa25157dbe68c47d78f2359540cc9031ee42d78855ed90e6b8ea3d67725bfffcb6db3d438c982b5f88d9b660f7d82cb300c1fa1edebb6b":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,128) #2 [#2]
depends_on:4:2
9:exp:6:hex:"6fe81f15a02e2ecf46e61199c057102d160e6b5d447d4a275972323fff908c3e":hex:"91d55cfdcdcd7d735d48100ff82227c3":hex:"":hex:"0b4ee0385e6665da8fd2ae47f2d0cf1c5bd395a3bb447047ab5a3ae0b95355bf83d0381119a8d4c01acbe60cd7885da650502f73498a682fdc94f7b14f4c753226064fa15e3a90a6083e053f52f404b0d22394e243b187f913ee2c6bb16c3033f79d794852071970523a67467ce63c35390c163775de2be68b505a63f60245e8":hex:"cd7da82e890b6d7480c7186b2ea7e6f1":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,120) #0 [#2]
depends_on:4:2
9:exp:6:hex:"4c2095e1379389dc3810e8819314f5a2f87d1494213c5b1de1a402f7f4f746c4":hex:"19788b2e0bd757947596676436e22df1":hex:"":hex:"26ec8ebac0560538a948afbc18fb730e9a91f21392bde24b88b200f96114b229a5b57fa9d02cf10e6592d4dfb28bf0f00740c61157ce28784e9066ea3afd44ecf3a494723610cb593c0feffc6897e3435c6f448697ad3e241685c4e133eff53bdd0fe44dd8a033cfb1e1ea37a493934eb5303ae6ef47ce6478f767ef9e3301ab":hex:"f26a20bea561004267a0bfbf01674e":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,120) #1 [#2]
depends_on:4:2
9:exp:6:hex:"be5351efc0277afc9759ec2464a22cb4401f7a17efd1a205e7af023c7ed30ee1":hex:"c6b26117d9dbd80c1c242ad41abe2acc":hex:"":hex:"1eca91406f338fc09c2988b1d7dc8c409d719300c03840a497d7b680cdd5e09b144903477f7116a934e1d931cf368af1fc2a0a0e7caa95475a3cd7bf585a16fda31eb3f8201db0216b37a1635c1c030836b3dd05ca5b0194388fa198e717822131d5d4318690ef82d35ac80b27fff19aec8f020dc6c6ce28f0813bbbf8230ad9":hex:"61051d6c0801b4a6b6ca0124c019f3":char*:"":hex:"95447aded336d6c20d483a6f062d533efed0261ad321d37bf8b7321b98f55c0f0082ce7f3d341b18fea29a72fc909d30cd8c84a1640227227287674a9b2f16a81b191ecf3b6232d656c32d7b38bea82a1b27d5897694a2be56d7e39aa1e725f326b91bad20455f58a94a545170cb43d13d4b91e1cee82abb6a6e0d95d4de0567":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,120) #2 [#2]
depends_on:4:2
9:exp:6:hex:"814c2cdfdeecf39d43bb141fbfc62dac44f7552c5e5dac2d4913303fc860119b":hex:"0db3ade15cb0dea98a47d1377e034d63":hex:"":hex:"0d3013a1d7132f685d001420daa6c7b643bc36b887511acc4588237d3b412c79e4ebba29c08248ad46c7239e8daa232b7483c9c4e3d1c0bbebc696401efe21f7fd6fc0525a4ab81bd9a893d5f7ab23b70ed07c00f33649b8a996a006de6c94f7793f72848793f4d5b31311c68aae1e715b37409fbe506dac038a0950f05fe82b":hex:"e62f910b6046ba4e934d3cfc6e024c":char*:"":hex:"374d03cfe4dacf668df5e703902cc784f011f418b43887702972dcc3f021bcb9bdd61ed5425f2975b6da7052c4859501eb2f295eb95d10ba6b2d74e7decc1acacebf8568e93a70a7f40be41ac38db6f751518c2f44a69c01c44745c51ad9a333eda9c89d001aa644f1e4063a8eb2a3592e21c6abc515b5aacaec8c32bcf1d3c4":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,112) #0 [#2]
depends_on:4:2
9:exp:6:hex:"1ae4541110f2bc4f83cd720b5c40c8315413d896e034b75007f172baa13d29ec":hex:"83f98eec51ee4cae4cb7fe28b64d1355":hex:"":hex:"5ea811e7fbfc0e00bf2a6abfac50cad9efd90041c5f7fb8f046a0fecbd193b70a2de8a774d01dd3cd54f848cb3e9f5152ee1b052ba698bebfba1fbbdae44a260447d6e6482640ae4d01c9cac3d37d4ffe9a0de0b6001de504a33ef7620efe3ce48ecd6f5b1b3a89185c86d4d662a843ff730e040e3668d6170be4cced8a18a1c":hex:"df47eef69ba2faab887aa8f48e4b":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,112) #1 [#2]
depends_on:4:2
9:exp:6:hex:"20c9b662ec4bd13bf58d64cb0a7159b0e7fee4703af66292bf75c8bd6e42e8dc":hex:"2bc0847d46f3d1064bbf8fe8567f54a2":hex:"":hex:"45b64f2ed5ac707890c0c1726adf338770ce6a728fe86bb372c4c49409a32705f881bc4d31a27c455c7c7df9dd2c541743523e7d32f88930d988857847f011be5f5f31a31e8812745147cbff5c1294d0fd4a7285db4833f22bf1975250da99c4d0dd2c9688d7f8001bb6ef2bc898ce4d42c5b78e74645b56ce992338f49d4183":hex:"5a1bf25aa8d5c3fe5cf1be8e54a1":char*:"":hex:"9079d6275db076625e8474c2914fe483d413d5339202f98f06c3b0ef063d8f3d31029deaf7f9349bfec57e5cf11f46f02d5a6520c7992efc951adbbea6d08e53faeb10dfe8b67ee4685da9ea4fe932551a65821147d06d4c462338e6ddda52017c2bc187fd6d02b7d5193f77da809d4e59a9061efad2f9cadbc4cd9b29728d32":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,112) #2 [#2]
depends_on:4:2
9:exp:6:hex:"0a1554db37f2e275732a77e521cbd8170729d8677a85db73feacf3c66a89d689":hex:"b9194a4d42b139f04c29178467955f1d":hex:"":hex:"5421d93b7e6e0091978c673df4f3a406aef5f13eb5e6f95da19b0783308cbe26d4fd6c669cc4a9f069d7e62e4c6fad14b80e918fe91556a9a941a28b3dbf776a68ac7c42df7059b5ed713e78120aec84e7b68e96226c2b5e11a994864ed61b122e7e42ef6cfdae278fadbae1b3ea3362f4e6dc68eef6a70477b8a3ffcfba0df9":hex:"05949d591793ca52e679bfdf64f3":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,104) #0 [#2]
depends_on:4:2
9:exp:6:hex:"3ab1d9bb571c4bdc9f3ef340914bddcfe0c8e7718d4a2530334372cec86e5fcb":hex:"6a5335901284dd3b64dc4a7f810bab96":hex:"":hex:"80bcea307e009745724d5f15d21f3b61a5d5a8401530346b34a2adfa13e3e8c9c9327d6fad914b081e554fbe6c1c6fe070b566620e559555c702c0ab5becf61ea1d9de64351ce43b2276ef4e20b5af7ce43db6d21286af4e740ef00c6d790705afcf0ee4850fffc12c662f2bd8212feb21db31065ab8f717a7509c213352b869":hex:"04b8e5423aee8c06539f435edd":char*:"":hex:"36b9602eee20b8f18dce0783cd1e01a799f81ae0a1ce6d293a26c62f47e7dad85c8446697cc09c81d3d9ead6f9e55c4147211660c8aea9536cc5516e9883c7d6854be580af8cd47ba38fa8451f0dad9c904e0e7f9997eff7e29bf880cd7cedd79493a0e299efe644046e4a46bf6645dfb2397b3a482a346b215deb778c9b7636":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,104) #1 [#2]
depends_on:4:2
9:exp:6:hex:"7dddbd5657e22750bfe6baa70a1f4ac46c1ef8bee573a57cfcef50b66f85e593":hex:"fcb962c39e4850efc8ffd43d9cd960a6":hex:"":hex:"2bf5aba83a8161b9d21ff29251fb0efa697b1ea9c1b3de8481d5fd4d6b57afda0b098decdc8278cc855f25da4116ed558fc4e665a49a8fff3aef11115757a99c10b5a73b1f794f9502186c13dc79442f9226bbf4df19a6440281f76184933aeae438a25f85dbd0781e020a9f7e29fb8e517f597719e639cbd6061ea3b4b67fb0":hex:"1d8cdadcf1872fb2b697e82ef6":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,104) #2 [#2]
depends_on:4:2
9:exp:6:hex:"6916b93b2712421f1f4582de7ec4237c4e42e2b32c7dced2f8bb5bd2e0598312":hex:"b4d9248bb500e40de99ca2a13e743f1c":hex:"":hex:"3739cca20279a36ddb857ac22beae901a49529b3182463ab81a7c46e437eb0b0571e8c16f7b626ecd9f2ca0cd83debe3f83e5d58ed3738899f4b616755eb57fb965208f261736bdf7648b1f8595c6b6a779768115e3077dfee7a42d44b555a51675fb1ce9961d0e21b2b9b477c0541184350e70decf7c14a4c24b8a6cd5fed8e":hex:"090d03446d65adcc0a42387e8e":char*:"":hex:"0255be7ac7ac6feb3a21f572f6a593cc8a97f17af7064c80e478f4a6c469cf94d604bc014b003bf284d216161a9c8a493af43c6a0d8caf813a9e6f83c7ed56dd57543876b11f76aa2be80dcd79d19ac61f00fa423ac2f52fae7a8327cd91494ca4116feb735980ad0a4b1445cb7f38cc712b8aee72179e65b97fca38694e3670":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,96) #0 [#2]
depends_on:4:2
9:exp:6:hex:"b751c8b724165009a8bd97a9d2a0e22cae5a95c4743c55eeeef0a6fe7d946bec":hex:"160c50c0621c03fd1572df6ba49f0d1e":hex:"":hex:"e8546a5af1e38114822e60e75563a9399c88796f303c99c69d1f3c50379da81e1cd5b5a4a721e23c59da58ea4361b7ff58408e506a27fea24f9a235c6af7f7a5bd93fa31e90edfc322821c08d6324134830b7fe160b4a3e6d27866a10e6e60762a31618ef92f5c67ccb1deb1f1b188f0e687165e7c366c7418920df4f4fcdcae":hex:"9fef9becf21901496772996f":char*:"":hex:"175fa6b7cd781ec057ff78ba410f2897a920739b5fc4f04bc9b998fbc7cc18e327ad44d59b167e4627256aaecd97dc3e4a7c9baaf51d177787a7f4a0a2d207a855753c4754d41348982d9418b6b24b590632d5115dc186b0ba3bec16b41fa47c0077c5d091ec705e554475024814c5167121dd224c544686398df3f33c210e82":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,96) #1 [#2]
depends_on:4:2
9:exp:6:hex:"0faf32c22c2a4ee38fe4b5ce08f98fdf6f83b5038dcba5ec8332b3eeb5c710c7":hex:"04885a5846f5f75a760193de7f07853c":hex:"":hex:"8a556cc30075753c6e94c2f669bca2058ff6abcbffffc82da7cfca0a45af82dfb4cf487ceb4ede72be87ee4c8b72db1e96459de1dc96721464c544c001d785f2188b9fccaec4b1a37970d38b326f30163d2fdfdf8a2ce74aec55abcd823772b54f8081d086a2e7b17b4086d6c4a5ea67828ef0b593ea1387b2c61f5dfe8f2bb0":hex:"0c13506ed9f082dd08434342":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,96) #2 [#2]
depends_on:4:2
9:exp:6:hex:"0dddc3d2f82bdcdbc37648a6b9b416af28753740f8e998cd1a52a0b665369f1c":hex:"0a93b883cbd42998ae2e39aab342cb28":hex:"":hex:"07bf84b15b21951fd22049be6991a672503ae243b8d285fb1e515e1d2c36bfd5b0d0bcce85791f2cea8f616aed68a7d9cf4eaf76418e8b1ec27751de67cbfd9d9f7905b2667904f10d598503f04c04ea00a681ff89a9c446d5763898430bd7a9dfebfe544e3ed3e639b362683a651e087626ffa63c0c2b3e0dd088b81b07f75e":hex:"5c37918edb7aa65b246fd5a6":char*:"":hex:"ff7b7b2f88b8c6f9f9bad7152874e995eea0ff1ce1ecd9b8d563642a37a31499f14d70f0dd835b7adf80928497f845fd8c2786cd53af25f8c9fe1bba24e3c3860162635bbed58f06cf6c9966bb9b570987a48329279bb84afb9e464bb4ad19ae6600175086e28929569027c5285d2ed97615e5a7dada40ba03c440861f524475":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,64) #0 [#2]
depends_on:4:2
9:exp:6:hex:"a0b1a62e46e7712277fc711e19d0c0c865ee77b42ac964b7202dbcaf428086c2":hex:"e20957a49a27e247d00379850f934d6c":hex:"":hex:"7dd7c0787fdbea4aacf929341659dcf4b75cbca8f92001e8b62a4d7b40272c5755fa9c445857db05328dc11ce5221f044f4b3dafbf0e2d72a1ad0d3e4c804148db578218690ccc620d8b97b4450ff83400a6caaa959617611446a6627138a4067be9ea410d4b0581022ab621928205b4a4480560fc4c2c3b39a2805684006f35":hex:"c99751516620bf89":char*:"":hex:"9307620479f076c39f53965c87d20c2aff11c736c040dba74cd690d275591a5defc57a02f6806de82eb7051548589484364f6c9b91f233a87258ede1ee276cb2c93b4fc76f4d7e60cbd29ba2c54cb479c178fa462c1c2fb6eeb3f1df0edfb894c9222b994c4931dedf7c6e8ddecbde385ddf4481807f52322a47bf5ff7272991":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,64) #1 [#2]
depends_on:4:2
9:exp:6:hex:"ffcc1c88fba1723b3ab57b458d9bffb98b878c967fb43b9db2ae0753d32a3bb1":hex:"d533c2170c5dc203512c81c34eff4077":hex:"":hex:"19b6dec86d93c466307de3a36c0791ed1010b1b9cf8d30347ae46e0f9283c9fda43da8cb491dd17cc4298b1f0b876d6a0f4bcbc9667fe34564bc08f8f7b67045057d19f4bf027bc839e590822fa09a5cef1af18e64a0116aa2a01a3f246c2b5272c18c9aa23efe674ba53d533ae8f0695cb78c1155cdc7a9d7fae2c4567dc07c":hex:"167ec8675e7f9e12":char*:"":hex:"0539287ac546fe5342e4c3c0ec07127dcd22899abfe8cdd6e89d08f1374d76e877bec4844d06e0a9f32d181c8d945ba16a54ce3725fae21d8245c070a4da0c646203d6b91325b665ab98c30295851c59265b4ab567b968b6e98536b7850738d92e9627b4c9c6f5d9ae2520944783d8f788a1aa11f3f5245660d41f388e26e0a1":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,64) #2 [#2]
depends_on:4:2
9:exp:6:hex:"55e94b339c3bafe068ef9cc30787cc6705850114976843777c92b4b331801650":hex:"2e2b31214d61276a54daf2ccb98baa36":hex:"":hex:"147cc7bc4008dadf1956520b5998d961499bdf3d8b168591adbfd99411ad7b34eb4b2a5c1bb0522b810fec12dd7c775784d7ecdc741e6dec8191361e6abf473b219221801951b4d5ffe955ab50eef9cffdfee65ba29ddfa943fb52d722825338c307870a48a35f51db340aa946c71904d03174b1e4a498238b9d631a6982c68d":hex:"5266e9c67c252164":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,32) #0 [#2]
depends_on:4:2
9:exp:6:hex:"13c9572bdef62510d84f2d415cc481cd1e71b9c1132b43e63b21ba4e16de9b39":hex:"a8339ba505a14786ad05edfe8cebb8d0":hex:"":hex:"7c78e634dec811173ff3c4a9a48ae3ae794fbd2aefd4b31701777ff6fcb670744c592a1d298d319717870dca364b2a3562a4ffa422bf7173c4f7ea9b0edf675e948f8370ffd0fd0d5703a9d33e8f9f375b8b641a1b1eecd1692ad1d461a68d97f91f9087f213aff23db1246ee16f403969c238f99eed894658277da23ced11ee":hex:"df3cab08":char*:"":hex:"91f9780daefd2c1010c458054ac6e35baa885cdd2c95e28e13f84451064e31e0739f27bf259cb376ab951e1c7048e1252f0849ccb5453fc97b319666ebbfbc7ef3055212a61582d1b69158f3b1629950a41bc756bded20498492ebc49a1535d1bd915e59c49b87ffebea2f4ad4516ecdd63fa5afda9cce9dc730d6ab2757384a":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,32) #1 [#2]
depends_on:4:2
9:exp:6:hex:"30a14ca53913acbb215b4e4159083106db3fff83cbedd1e5425f65af1e94f5dd":hex:"4f23f04904de76d6decd4bd380ff56b1":hex:"":hex:"8c5f73ee1544553b712ad7a14f31379c8d54a4e432fb6c5112436988d83c4e94954b0249b470538fb977b756fbee70b811d4dc047a869e207bb0b495f1e271d0034e912000e97594033e0dedde0591b297f8a84bafcc93a46268a5bba117b558f1c73513e971c80a7083e1718fc12d0cc0d996a8e09603d564f0b8e81eea28bc":hex:"18e92b96":char*:"":hex:"bb4b3f8061edd6fa418dd71fe22eb0528547050b3bfbaa1c74e82148470d557499ce856de3e988384c0a73671bf370e560d8fda96dabe4728b5f72a6f9efd5023b07a96a631cafdf2c878b2567104c466f82b89f429915cf3331845febcff008558f836b4c12d53e94d363eae43a50fc6cb36f4ca183be92ca5f299704e2c8cf":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,0,32) #2 [#2]
depends_on:4:2
9:exp:6:hex:"e69f419140289ac25fb0e2ef9cc4f7e06777ac20f7d631918d1af0c8883b7d6a":hex:"531248afdaaf1b86cf34d2394900afd9":hex:"":hex:"ff8dfa4e70490ea9c84cb894dc5d7e1b935ebcdea80a39c4161d4db42cbb269cc86abd381af15ec9a4a42ed18c1eed540decec19722df46f22aa06883297cb393fb23e4bb31a817e88357aa923c7ecbcf24c28a09f622dd21fa70c0a02193024fdcefeaa96cc1b50f81a65dfa9e1bb5126f0c9766a861eed096ec15fb07b0f81":hex:"c6885cdd":char*:"":hex:"f75299e0ead3834fc7ebd4b2051541b598ad57cc908fdcd4324cf4ccf7dcf7b3f0737ad6c026399a8b1b6d3d50011b3c48ea2c89833b4b44c437677f230b75d36848781d4af14546894eecd873a2b1c3d2fcdd676b10bd55112038c0fdaa7b5598fe4db273a1b6744cba47189b7e2a973651bfc2aaa9e9abea4494047b957a80":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,128) #0 [#2]
depends_on:4:2
9:exp:6:hex:"404a5d1ac9e32f9caabffbfa485ce9c27edc9e5cde0f2aab4f32ce3121449b88":hex:"b6e6c078e6869df156faa9ac32f057c3":hex:"6ebc75fc9304f2b139abc7d3f68b253228009c503a08b7be77852da9e1afbe72c9ab374740b0dc391fa4d7e17de6a0aa08c69e6f5c5f05411e71e70c69dfbcf693df84c30f7a8e6c7949ea1e734297c0ea3df9b7e905faa6bbdcaf1ff2625a39363308331d74892cf531cb3f6d7db31bbe9a039fca87100367747024f68c5b77":hex:"b63ec4d28854b7fe2d4d13973f5bcb16f78494ce25cc2820de9d0dc1d8d91db1f19bc9e01cee8418c9e88a69b2f30cdbb0dbdbb50be71e1e666c111c126f2b7197c02f69a1b2ec5e1bf4062b2d0b22fb0fa1585b4e6286b29f6ac98d1b1319dd99851fa6921607077d2947140fdeeea145b56ea7b6af276c9f65393bc43ede33":hex:"94c1b9b70f9c48e7efd40ecab320c2d3":char*:"":hex:"56a0ac94f3ec7be2608154f779c434ee96db5ed4f5a6e1acfb32361ce04e16e1337be5978df06d7c4f6012385fb9d45bb397dc00f165883714b4a5b2f72f69c018ffa6d4420ad1b772e94575f035ad203be3d34b5b789a99389f295b43f004de3daaef7fa918712d3a23ca44329595e08da190e3678bc6ad9b500b9f885abe23":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,128) #1 [#2]
depends_on:4:2
9:exp:6:hex:"b56f0c980acf7875cf7f27d53ad4a276adc126d0b93a5774ac4277eecad4309e":hex:"b004c049decfb43d6f3ec13c56f839ef":hex:"b2045b97fbb52a5fc6ff03d74e59dd696f3f442c0b555add8e6d111f835df420f45e970c4b32a84f0c45ba3710b5cd574001862b073efa5c9c4bd50127b2ce72d2c736c5e2723956da5a0acb82041a609386d07b50551c1d1fa4678886bac54b0bd080cc5ef607dca2a0d6a1e71f0e3833678bf8560bc059dae370ec94d43af6":hex:"2c94299e36b7c4a825ecbc5a7809061e0a6761764a5a655ffdb0c20e5c3fcb10f4e93c68aa0a38c2acc5d06f2b7c4ff4fcf814b551bfefa248dbe06a09a0f153213538a31fa7cf7d646b5b53908d8978f514c9c4d6d66f2b3738024b5f9c3fd86b6da0c818203183f4205f186ea44a54edb911b1a17c424c95852c8d271b2e93":hex:"fce7234f7f76b5d502fd2b96fc9b1ce7":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,128) #2 [#2]
depends_on:4:2
9:exp:6:hex:"1c5027c36e6caa1b3e5e45fead32b5e3126ac41f106c491b0b3a7c16502f4fe6":hex:"3ee660f03858669e557e3effdd7df6bd":hex:"93e803c79de6ad652def62cf3cd34f9addc9dd1774967a0f69e1d28361eb2cacc177c63c07657389ce23bbe65d73e0460946d31be495424655c7724eac044cafafe1540fcbd4218921367054e43e3d21e0fa6a0da9f8b20c5cdbd019c944a2d2ee6aa6760ee1131e58fec9da30790f5a873e792098a82ddf18c3813611d9242a":hex:"58f0ceaa31c0025d2e6bb58720cce4b64f5f6c657c847ae42936eb1e343fea397c8a8cf2f5ef02ffaec25f431900dcb0910cf32cea9eca3b78aed1c451c7af51066489f87b2a5f8cf28d6fdb6ce49d898b6167b590a3907be7618be11fb0922a3cfd18e73efef19e5cdc250fa33f61e3940c6482ae35f339e8c0a85a17379a4e":hex:"ac33f5ffca9df4efc09271ff7a4f58e2":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,120) #0 [#2]
depends_on:4:2
9:exp:6:hex:"34c3019810d72b5e584f0758f2f5888a42729a33610aafa9824badade4136bbd":hex:"f315ea36c17fc57dab3a2737d687cd4f":hex:"f33c5a3a9e546ad5b35e4febf2ae557ca767b55d93bb3c1cf62d862d112dbd26f8fe2a3f54d347c1bc30029e55118bab2662b99b984b8b8e2d76831f94e48587de2709e32f16c26695f07e654b703eba6428f30070e23ed40b61d04dd1430e33c629117d945d9c0e4d36c79a8b8ab555d85083a898e7e7fbeb64a45cc3511d99":hex:"22deef66cbb7db240c399b6c83407f090d6999ba25e560b2087fed0467904bb5c40cbaa05b8bf0ff5a77c53fa229478d8e0736414daf9c420417c391c9a523fd85954533f1304d81359bdcc2c4ac90d9f5f8a67a517d7f05ba0409b718159baf11cd9154e815d5745179beb59954a45a8676a375d5af7fae4d0da05c4ea91a13":hex:"0bae9403888efb4d8ec97df604cd5d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,120) #1 [#2]
depends_on:4:2
9:exp:6:hex:"29397d98fc5a7f04b5c8b6aa3a1dd975b6e4678457ae7f0691eee40b5397503a":hex:"885543a45fd1163e34ef9276145b0f8c":hex:"d88beaa0664bcef178cbdbfab17ff526b5c0f8ad9543c6a312d93c336707fbf87c0448b07a550580953279f552f368225cc6971f1eecc718d6aad1729c8d8873081357752bd09d77075fa680cb2dc4139171e4a0aaa50b28c262c14fd10b8d799ca1c6641bb7dfdfdf3dea69aa2b9e4e4726dc18b0784afa4228e5ccb1eb2422":hex:"0bbf1079cb5569c32257bc7e52371db46f3961b457402b816588243b4523543430d5ca56b52de6632724c51e6c3af310b28822c749a12bdd58dee58bbc3266631562a998ec3acdc8a2567a9f07f7f9759c3f50b1d1dcdd529256b80c0d227fc1fe8b58c62d1c643f1ac2996809fd061afcf4a9af184c14db9e63ec885c49de61":hex:"7b334d7af54b916821f6136e977a1f":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,120) #2 [#2]
depends_on:4:2
9:exp:6:hex:"7555dfcf354da07fd70f951d94ec1d86a635edfdb7929460207b2a39cc0cf4a3":hex:"e1b30b6a47e8c21228e41a21b1a004f0":hex:"bf986d3842378440f8924bb7f117d1a86888a666915a93ba65d486d14c580501e736d3418cebee572439318b21b6e4e504a7b075b8c2300c014e87e04fa842b6a2a3ebd9e6134b9ddd78e0a696223b1dc775f3288a6a9569c64b4d8fc5e04f2047c70115f692d2c2cefe7488de42ff862d7c0f542e58d69f0f8c9bf67ef48aea":hex:"a1351cfffd1b0cbf80c3318cc432d3238cb647e996b7b53c527783594683f535950cd08788687c77226b2d3f095955884adc2e475ca1e1eab04e37d5e901ae8934a9d3a0cb37b80612ca25d989856dfa7607b03039b64d7dcd468204f03e0f2c55cb41c5367c56ca6c561425992b40e2d4f380b3d8419f681e88ebe2d4bdad36":hex:"d8ef5438b7cf5dc11209a635ce1095":char*:"":hex:"95e8db7c8ecab8a60ceb49726153a7c5553cf571bc40515944d833485e19bf33cb954e2555943778040165a6cfffecef79eb7d82fef5a2f136f004bb5e7c35ae827fac3da292a185b5b8fc262012c05caeda5453ede3303cfeb0c890db1facadaa2895bdbb33265ada0bb46030607b6cf94f86961178e2e2deeb53c63900f1ec":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,112) #0 [#2]
depends_on:4:2
9:exp:6:hex:"bbeafe86c72ab0354b733b69b09e4d3462feb1658fe404004d81503f3a6e132f":hex:"ee1caba93cb549054ca29715a536393e":hex:"e44b0e0d275ae7c38a7dc2f768e899c1c11a4c4cb5b5bd25cd2132e3ecbaa5a63654312603e1c5b393c0ce6253c55986ee45bb1daac78a26749d88928f9b9908690fc148a656b78e3595319432763efbcf6957c9b2150ccabfd4833d0dcee01758c5efb47321a948b379a2ec0abcd6b6cbf41a8883f0f5d5bf7b240cb35f0777":hex:"a033c2051e425d01d97d563572e42c5113860e5dedcd24c76e3e357559ba3250f1fc5d4a931a9d0900ac025400f0158621f0b1215b2907467bfc874bcabbb28e28de81fe1ee5b79985261c512afec2327c8c5957df90c9eb77950de4a4860b57a9e6e145ea15eb52da63f217f94a5c8e5fcb5d361b86e0e67637a450cdbcb06f":hex:"a4809e072f93deb7b77c52427095":char*:"":hex:"e62adf9bbd92dd03cc5250251691f724c6ece1cb89d8c4daf31cc732a5420f6bedab71aab0238ba23bd7165ed1f692561ef457fd1d47413949405b6fc8e17922b17026d89d5830b383546ea516a56f3a1c45ec1251583ae880fa8985bd3dcc1d6a57b746971937bf370e76482238cc08c2c3b13258151e0a6475cc017f8a3d0e":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,112) #1 [#2]
depends_on:4:2
9:exp:6:hex:"6ad06c88dd4f3becf35eed95bb859be2406a1803a66e4332a74c5f75c09b9a01":hex:"07d8b4a6e77aef9018828b61e0fdf2a4":hex:"cca1fd0278045dda80b847f0975b6cbf31e1910d2c99b4eb78c360d89133a1c52e66c5c3801824afc1f079d2b2b1c827199e83f680e59b9a7de9b15fa7b6848b5bf4e16a12ac1af4cf2b4d7bb45673c5e1241e9996440860a9204fc27cae46a991607bc5e7120d6c115ddcbdd02c022b262602139081e61eee4aba7193f13992":hex:"2219c11672884b93d0290b6a7140feafe416461f1cdaf0b3aa64693d7db2eb10feae46aac7af549fa1b0abc78c11f8df7ee803ef70310fc3e67769f8b4bc64f81143a6ebf8bee9d386a8ede5d2cc0ed17985a3b7bb95191ef55e684690ccdc5ca504bc6eb28442b353861a034a43532c025f666e80be967a6b05b9dd3a91ff58":hex:"e3ede170386e76321a575c095966":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,112) #2 [#2]
depends_on:4:2
9:exp:6:hex:"87bbf7c15689e8c99a5a32a8ba0dfebcfe1989159807428cdd1f382c3ea95178":hex:"2f19aa1f3a82a7398706953f01739da7":hex:"590dbd230854aa2b5ac19fc3dc9453e5bb9637e47d97b92486a599bdafdfb27c3852e3d06a91429bb820eb12a5318ed8861ffe87d659c462ef167be22604facfa3afb601b2167989b9e3b2e5b59e7d07fda27ffccd450869d528410b0aff468f70cc10ef6723a74af6eebc1572c123a9b5a9aab748a31fa764716d3293ff5de7":hex:"b77d3bf3b30b3e6e5c86cbfb7e5455f6480f423cc76834b4663d28d9f1eb5c40212634e3347668427f7848352ab789886f96682a568260bdaeb7de0aae2af36f5ae04f06c332b158d923706c1c6255c673feeadb6d30bfc901e60b92acd9ddd83ef98686c4d492f4a60e97af2541d470a6a6b21903441020ea7619cf28a06986":hex:"5c43fc4dc959fabeebb188dbf3a5":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,104) #0 [#2]
depends_on:4:2
9:exp:6:hex:"24095a66b6eb0320ca75e2ab78e8496a45f4b000fc43436904c3e386fb852ed2":hex:"0955c1f0e271edca279e016074886f60":hex:"f5160c75c449e6bb971e73b7d04ab9b9a85879f6eb2d67354af94a4f0ca339c0a03a5b9ede87a4ff6823b698113a38ae5327e6878c3ccc0e36d74fe07aa51c027c3b334812862bc660178f5d0f3e764c0b828a5e3f2e7d7a1185b7e79828304a7ad3ddcd724305484177e66f4f81e66afdc5bbee0ec174bff5eb3719482bd2d8":hex:"4690edc843e23d9d9b9a4dab8fa8193f8bf03897d3d29759e9dc9e0f8a970c0f5d4399b9f60461fe5cf439f9b0d54bbc075695e4d76b76298cc2b75bb3e0b516ee9ada93f77c4c002ba9fd163a1e4b377befb76c1e5ab8b3901f214c0a4c48bd2aa2f33560d46e2721a060d4671dc97633ff9bcd703bb0fbed9a4a2c259b53f3":hex:"75a31347598f09fceeea6736fe":char*:"":hex:"0dd2dca260325967267667ff3ccdc6d6b35648821a42090abba46282869bac4bdc20a8bee024bea18a07396c38dbb45d9481fedcc423a3928cfa78a2f0ae8eedb062add810bdbee77ddc26c29e4f9fda1ab336d04ef42947b05fbdb9bc4df79e37af951d19d6bf5e5cb34eef898f23642a9c4a9111ed0b7a08abeeefbbd45c23":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,104) #1 [#2]
depends_on:4:2
9:exp:6:hex:"086b77b5731f971f0bf5b8227361b216746daf8b08c583ad38f114a64aa7877b":hex:"164058e5e425f9da40d22c9098a16204":hex:"6633eae08a1df85f2d36e162f2d7ddd92b0c56b7477f3c6cdb9919d0e4b1e54ea7635c202dcf52d1c688afbbb15552adda32b4cd30aa462b367f02ded02e0d64eeee2a6b95462b191784143c25607fd08a23a2fbc75cf6bee294daf2042587fdd8fe3d22c3a242c624cf0a51a7c14db4f0f766ec437de4c83b64f23706a24437":hex:"629317212ff8bd8a7676e4c00b81a9577de6397c832f99ac974fa2bbbccb6e3b8aa776db6922eed0b014bf3923799da7d9d0854c8817470e1e2f7fc7a572f9d0316ee60cde7ef025d59b897d29a6fee721aeb2f7bb44f9afb471e8a7b0b43a39b5497a3b4d6beb4b511f0cefa12ce5e6d843609d3e06999acfbee50a22ca1eee":hex:"2eb6eb6d516ed4cf1778b4e378":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,104) #2 [#2]
depends_on:4:2
9:exp:6:hex:"0f9e806b0d937268561c0eafbbdd14ec715b7e9cef4118d6eb28abbb91266745":hex:"8657996634e74d4689f292645f103a2e":hex:"2ca253355e893e58cb1a900fbb62d61595de5c4186dc8a9129da3657a92b4a631bbdc3d5f86395385a9aa8557b67f886e3bb807620e558c93aea8e65826eadeb21544418ee40f5420c2d2b8270491be6fc2dcbfd12847fa350910dd615e9a1881bc2ced3b0ac3bde445b735e43c0c84f9d120ca5edd655779fc13c6f88b484f7":hex:"2ae4baef22ace26f464a9b0c75802303f2d7c0f9a1ed1d0180135189765bdd347fea0cc2b73ee7fbbf95ea1fda22597b8aad826f63e744069a9c349488b2cc1cf9372f423cc650302082125724730ae5a4d878e07385ddc99034c6b6b46748f02c80b179fe6406b1d33581950cb9bcd1d1ea1ec7b5becfd6c1f5b279412c433a":hex:"83155ebb1a42112dd1c474f37b":char*:"":hex:"87d69fc3cbc757b2b57b180c6ba34db4e20dde19976bfb3d274d32e7cea13f0c7d9e840d59ce857718c985763b7639e448516ddbbda559457cd8cb364fa99addd5ba44ef45c11060d9be82b4ebe1f0711ac95433074649b6c08eeab539fdfc99c77498b420427e4d70e316111845793de1f67fb0d04e3389a8862f46f4582dc8":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,96) #0 [#2]
depends_on:4:2
9:exp:6:hex:"c24c17911f6db4b3e37c46bcc6fa35efc1a55f7754f0bb99f2eea93398116447":hex:"5098cc52a69ee044197e2c000c2d4ab8":hex:"9ad4dee311d854925fc7f10eca4f5dd4e6990cb2d4325da2ef25a9a23690f5c5590be285d33aaeba76506c59edec64b8c3ff8e62716d1c385fbce2a42bc7bd5d8e8584de1944543ab6f340c20911f8b7b3be1a1db18a4bb94119333339de95815cae09365b016edc184e11f3c5b851f1fa92b1b63cfa3872a127109c1294b677":hex:"0bd92cb106867e25ad427ff6e5f384d2d0f432fc389852187fcc7b0bf9f6d11a102a872b99ed1ad9a05dab0f79fa634745535efed804ff42b0af8dad20ba44709391fb263f245e5a2c52d9ce904179633282f57a1229b0a9c4557a5c0aeda29bbc5a7a871fa8b62d58100c3722c21e51e3b3e913185235526e7a5a91c559717d":hex:"f7930e3fab74a91cb6543e72":char*:"":hex:"6124ede608d416baa5e653a898ca76e9f47f08403c1984feec112e670ded2226e0073f8881ab2161cfda541dccae19691285f7391a729f07aba18f340bb452c1da39cbe83cf476cfc105b64187e0d2227dd283dcba8b6a350f9956b18861fa131d3f00c034443e8f60e0fdfcfaabbed93381ae374a8bf66523d33646183e1379":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,96) #1 [#2]
depends_on:4:2
9:exp:6:hex:"d267a8379260036ff3d1ec07a7b086ff75706bad12d37d9656f04776f3d8b85c":hex:"674dc34e8c74c51fa42aacd625a1bd5b":hex:"6a9a8af732ae96d0b5a9730ad792e296150d59770a20a3fdbbc2a3a035a88ac445d64f37d684e22003c214b771c1995719da72f3ed24a96618284dd414f0cac364640b23c680dc80492a435c8ec10add53b0d9e3374f1cf5bfc663e3528fa2f6209846421ea6f481b7ecf57714f7bc2527edc4e0466b13e750dd4d4c0cc0cdfc":hex:"80c68a330ef50e3e516681f1e535868b03466e7edbb86cb385d01db487da3dd3edad940fdc98d918b7db9b59f8d61369eee2928c88557306c4a13e366af0708d94cb90a15f1c3bc45544bdb05ff964da5e06c5ae965f20adb504620aed7bce2e82f4e408d00219c15ef85fae1ff13fea53deb78afa5f2a50edbd622446e4a894":hex:"bea660e963b08fc657741bc8":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,96) #2 [#2]
depends_on:4:2
9:exp:6:hex:"c86cb637753010f639fa3aa3bff7c28b74f012ad6090f2a31b0801d086f183ad":hex:"87ff6e0bb313502fedf3d2696bff99b5":hex:"2816f1132724f42e40deabab25e325b282f8c615a79e0c98c00d488ee56237537240234966565e46bfb0c50f2b10366d1589620e6e78bd90ade24d38a272f3fff53c09466aa2d3ef793d7f814a064b713821850a6e6a058f5139a1088347a9fa0f54e38abd51ddfc7ef040bf41d188f3f86c973551ced019812c1fc668649621":hex:"6b7858557e0fd0f957842fb30e8d54dedbc127eb4bbf9de319f731fa28a606df2c046a0bce8ecda4e75d3596e4e988efd6bc279aa005bc52fad92ba07f5b1dfda4cc417029f9778c88d6fe5341a0fd48893dcb7c68d0df310a060f2a5235aee422d380f7209bc0909b2aa7e876044056f0b915dab0bc13cbea5a3b86d40ca802":hex:"7859f047f32b51833333accf":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,64) #0 [#2]
depends_on:4:2
9:exp:6:hex:"2c31ca0cac3efe467168198f06beacf39565a6f57f82e1048a5c06a231315882":hex:"95cae6e85f33f3043182460589be3639":hex:"67523751a9b1b643d00de4511b55e4268cb2d18e79e01a55fc7b677d529bd6400940fb25ea6ae135c1a816e61b69e90b966981aeda685934b107066e1467db78973492ad791e20aef430db3a047447141def8be6e6a9a15089607c3af9368cdb11b7b5fbf90691505d0c33664766945d387904e7089b915a3c28886ba1763bb5":hex:"65261d6e29b2369b1828a7cef2df9873d6e6057c499301afedd6cb65b5036ddb95f9e353fbf38e54c4f46f88164325b33620ce183beb2e411fbb89a0e0002e542fc161cad32a61ee6f1e1717e0b4dcd0340b116f795bc1009dbbc65bc31c9b549bf03c40bc204cd0d02ec884be907777ebeed8b527ec3af7cbb508193c0745de":hex:"21309d0351cac45e":char*:"":hex:"1d5f2cb921f54aeb552b4304142facd49497837deb1f00d26fbeddbab922fd80b00dba782961f8fce84f1f7973e81eed6ee168b1760c575c891f40a1dae0fa1a08738025d13ef6e0b30be4f054d874f1b8a2427a19ebb071d98365c32316a88a68c2b40daf1ea831a64519ac3679acb4e04986ecc614ec673c498c6fee459e40":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,64) #1 [#2]
depends_on:4:2
9:exp:6:hex:"ca9fa36ca2159dff9723f6cfdb13280446eb6bc3688043c7e2e2504184791596":hex:"d13ca73365e57114fc698ee60ba0ad84":hex:"2aa510b7f1620bfce90080e0e25f5468dbc5314b50914e793b5278369c51ac017eace9fd15127fca5a726ad9e67bdee5af298988d9a57ec4bbc43d4eb849535eb10521ac7cd7ed647479a42876af2ebc9e2108b539febdaa9127c49bda1bda800f6034050b8576e944311dfbca59d64d259571b6d2ed5b2fc07127239b03f4b7":hex:"ac04c4293554cd832aa400c811cb202d815d6178aa1343b4628592b7f3ae45dc5f12ea47be4b43e1865f40b06ab67b3a9fb3644248a9b3efe131a8addb7447978bb51ccf749e75574fea60e8781677200af023b2f8c415f4e6d8c575a9e374916d9ec3a612b16e37beb589444b588e0b770d9f8e818ad83f83aa4ecf386d17a7":hex:"2111d55d96a4d84d":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,64) #2 [#2]
depends_on:4:2
9:exp:6:hex:"2f802e838250064c15fdee28d7bd4872850355870847701ad9742b2d6eb4b0c0":hex:"2dd550cfd97f8e1d8d31ba5537ae4710":hex:"72b9630dda40306e785b961934c56e20948f8eac0e981f49787eb3dbd6e4607f7d08d10ca643746bf1efa7e5066993683d527a90f2d45ec9cf73113f1f17bb67958be669acd4e2927f1dacfde902cd3048056d7f6dfdd8630ff054efce4526db7c9321d6d2be2236f4d60e27b89d8ec94f65a06dc0953c8c4533a51b6a29bd2c":hex:"e2ca8c8d172ff90232879f510d1225af91bc323bdf636363c2903fcd1790692c8bcb03a1cccb18814678852c6b3a441552e541b843ee5e4f86a152fa73d05aea659fe08aa6428bb257eaa2a7b579fdc4022c1dec359a854253c1aefc983c5ede8c97517ea69fc4606e25f13ffb0f5f49160691454fbb74e704326738353525f7":hex:"bd6c8823c9005c85":char*:"":hex:"f6dd0b5f3d1a393a1837112962dba175a13c2d1e525ef95734caf34949d8b2d63b4fe5603226b5f632f2d7f927361ba639dc0e3c63414f45462342695916d5792133b4a24c7c4cbe2b97c712bf27ab62d3d68b3875d58ffe4b7c30a8171bff1a9e2f3995768faacda2ea9213ff35798b9e4513f6a87bd3f5a9d93e847e768359":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,32) #0 [#2]
depends_on:4:2
9:exp:6:hex:"84dd53ce0146cb71c32776033bb243098d78a22ac17f52a62a122f5653fb4e33":hex:"f0c90a1bca52f30fab3670df0d3beab0":hex:"a3ea8032f36a5ca3d7a1088fd08ac50ae6bdc06ad3a534b773ac3e3d4a3d524499e56274a0062c58c3b0685cc850f4725e5c221af8f51c6df2bbd5fbcff4a93ba4c1054f7f9c67fd9285511a08d328d76a642f067227d378f95a1e67587b90251f9103ed3cacdb6bf69e0794e366d8b92d8de37b4e028de0778841f356ac044d":hex:"68222bffa782dcfe4f328fc20eb520e75a9a5fedbe13ec7fcf0e82fba08bb87a8a8e02902638e32fe0e2294344b380797f8028426ffcc0531c739c884892394c48ff0779c5f5edf0a36a3fb8aa91213347774ec4bf0fe1049bd53746b13beef3c637169826c367056cb1aa0a3868e23f886a9c7b8015c26af9e40794662f6b21":hex:"b1ece9fb":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,32) #1 [#2]
depends_on:4:2
9:exp:6:hex:"9bb36fe25e966a075ae2c3bb43b5877679ebc379d5123c8eda3fa0e30b95cae0":hex:"59869df4ef5754b406478a2fb608ee99":hex:"ecd125682e8a8e26757c888b0c8b95dec5e7ed7ac991768f93e8af5bcf6f21ed4d4d38699ee7984ed13635fff72f938150157c9a27fcda121ffced7b492d2b18dad299cb6495ed5f68441aefc8219d2cf717d15d5cd2dbce4606fcf90fe45f3601127cf6acee210bd7df97309f773974a35bef1d33df984101c2fc9d4b55259e":hex:"fb3a4be643c10343251c6f0745aaa54349463f622ca04a792e9b4780866844b30aeef3269fc60cac0ea031c5f3780b535e15154f7c76eb4a371b8ae368550f3fa2ce693c34511ec96b839cac567f1b0de0e7e3116d729b45d1b16e453703a43db73f5d0c3e430f16b142420b5f0d26d72ac3dba543d7d813603b0bfdca3dd63e":hex:"cb3f5338":char*:"FAIL":hex:"":int:1
AES-GCM NIST Validation PSA (AES-256,128,1024,1024,32) #2 [#2]
depends_on:4:2
9:exp:6:hex:"ca264e7caecad56ee31c8bf8dde9592f753a6299e76c60ac1e93cff3b3de8ce9":hex:"4763a4e37b806a5f4510f69fd8c63571":hex:"07daeba37a66ebe15f3d6451d1176f3a7107a302da6966680c425377e621fd71610d1fc9c95122da5bf85f83b24c4b783b1dcd6b508d41e22c09b5c43693d072869601fc7e3f5a51dbd3bc6508e8d095b9130fb6a7f2a043f3a432e7ce68b7de06c1379e6bab5a1a48823b76762051b4e707ddc3201eb36456e3862425cb011a":hex:"8d03cf6fac31182ad3e6f32e4c823e3b421aef786d5651afafbf70ef14c00524ab814bc421b1d4181b4d3d82d6ae4e8032e43a6c4e0691184425b37320798f865c88b9b306466311d79e3e42076837474c37c9f6336ed777f05f70b0c7d72bd4348a4cd754d0f0c3e4587f9a18313ea2d2bace502a24ea417d3041b709a0471f":hex:"3105dddb":char*:"FAIL":hex:"":int:1
| 606,968 | 4,749 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_net.datax | Context init-free-free
0:int:0
Context init-free-init-free
0:int:1
net_poll beyond FD_SETSIZE
1
| 99 | 10 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_asn1parse.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "libc/stdio/stdio.h"
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_asn1parse.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_asn1parse.function
* Test suite data : suites/test_suite_asn1parse.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_ASN1_PARSE_C)
#include "third_party/mbedtls/bignum.h"
#include "third_party/mbedtls/asn1.h"
#if defined(MBEDTLS_ASN1_WRITE_C)
#include "third_party/mbedtls/asn1write.h"
#endif
/* Used internally to report an error that indicates a bug in a parsing function. */
#define ERR_PARSE_INCONSISTENCY INT_MAX
/* Use this magic value in some tests to indicate that the expected result
* should not be checked. */
#define UNPREDICTABLE_RESULT 0x5552
static int nested_parse( unsigned char **const p,
const unsigned char *const end )
{
int ret;
size_t len = 0;
size_t len2 = 0;
unsigned char *const start = *p;
unsigned char *content_start;
unsigned char tag;
/* First get the length, skipping over the tag. */
content_start = start + 1;
ret = mbedtls_asn1_get_len( &content_start, end, &len );
TEST_ASSERT( content_start <= end );
if( ret != 0 )
return( ret );
/* Since we have a valid element start (tag and length), retrieve and
* check the tag. */
tag = start[0];
TEST_EQUAL( mbedtls_asn1_get_tag( p, end, &len2, tag ^ 1 ),
MBEDTLS_ERR_ASN1_UNEXPECTED_TAG );
*p = start;
TEST_EQUAL( mbedtls_asn1_get_tag( p, end, &len2, tag ), 0 );
TEST_EQUAL( len, len2 );
TEST_ASSERT( *p == content_start );
*p = content_start;
switch( tag & 0x1f )
{
case MBEDTLS_ASN1_BOOLEAN:
{
int val = -257;
*p = start;
ret = mbedtls_asn1_get_bool( p, end, &val );
if( ret == 0 )
TEST_ASSERT( val == 0 || val == 1 );
break;
}
case MBEDTLS_ASN1_INTEGER:
{
#if defined(MBEDTLS_BIGNUM_C)
mbedtls_mpi mpi;
mbedtls_mpi_init( &mpi );
*p = start;
ret = mbedtls_asn1_get_mpi( p, end, &mpi );
mbedtls_mpi_free( &mpi );
#else
*p = start + 1;
ret = mbedtls_asn1_get_len( p, end, &len );
*p += len;
#endif
/* If we're sure that the number fits in an int, also
* call mbedtls_asn1_get_int(). */
if( ret == 0 && len < sizeof( int ) )
{
int val = -257;
unsigned char *q = start;
ret = mbedtls_asn1_get_int( &q, end, &val );
TEST_ASSERT( *p == q );
}
break;
}
case MBEDTLS_ASN1_BIT_STRING:
{
mbedtls_asn1_bitstring bs;
*p = start;
ret = mbedtls_asn1_get_bitstring( p, end, &bs );
break;
}
case MBEDTLS_ASN1_SEQUENCE:
{
while( *p <= end && *p < content_start + len && ret == 0 )
ret = nested_parse( p, content_start + len );
break;
}
case MBEDTLS_ASN1_OCTET_STRING:
case MBEDTLS_ASN1_NULL:
case MBEDTLS_ASN1_OID:
case MBEDTLS_ASN1_UTF8_STRING:
case MBEDTLS_ASN1_SET:
case MBEDTLS_ASN1_PRINTABLE_STRING:
case MBEDTLS_ASN1_T61_STRING:
case MBEDTLS_ASN1_IA5_STRING:
case MBEDTLS_ASN1_UTC_TIME:
case MBEDTLS_ASN1_GENERALIZED_TIME:
case MBEDTLS_ASN1_UNIVERSAL_STRING:
case MBEDTLS_ASN1_BMP_STRING:
default:
/* No further testing implemented for this tag. */
*p += len;
return( 0 );
}
TEST_ASSERT( *p <= end );
return( ret );
exit:
return( ERR_PARSE_INCONSISTENCY );
}
int get_len_step( const data_t *input, size_t buffer_size,
size_t actual_length )
{
unsigned char *buf = NULL;
unsigned char *p = NULL;
unsigned char *end;
size_t parsed_length;
int ret;
mbedtls_test_set_step( buffer_size );
/* Allocate a new buffer of exactly the length to parse each time.
* This gives memory sanitizers a chance to catch buffer overreads. */
if( buffer_size == 0 )
{
ASSERT_ALLOC( buf, 1 );
end = buf + 1;
p = end;
}
else
{
ASSERT_ALLOC_WEAK( buf, buffer_size );
if( buffer_size > input->len )
{
memcpy( buf, input->x, input->len );
memset( buf + input->len, 'A', buffer_size - input->len );
}
else
{
memcpy( buf, input->x, buffer_size );
}
p = buf;
end = buf + buffer_size;
}
ret = mbedtls_asn1_get_len( &p, end, &parsed_length );
if( buffer_size >= input->len + actual_length )
{
TEST_EQUAL( ret, 0 );
TEST_ASSERT( p == buf + input->len );
TEST_EQUAL( parsed_length, actual_length );
}
else
{
TEST_EQUAL( ret, MBEDTLS_ERR_ASN1_OUT_OF_DATA );
}
mbedtls_free( buf );
return( 1 );
exit:
mbedtls_free( buf );
return( 0 );
}
typedef struct
{
const unsigned char *input_start;
const char *description;
} traverse_state_t;
/* Value returned by traverse_callback if description runs out. */
#define RET_TRAVERSE_STOP 1
/* Value returned by traverse_callback if description has an invalid format
* (see traverse_sequence_of). */
#define RET_TRAVERSE_ERROR 2
static int traverse_callback( void *ctx, int tag,
unsigned char *content, size_t len )
{
traverse_state_t *state = ctx;
size_t offset;
const char *rest = state->description;
unsigned long n;
TEST_ASSERT( content > state->input_start );
offset = content - state->input_start;
mbedtls_test_set_step( offset );
if( *rest == 0 )
return( RET_TRAVERSE_STOP );
n = strtoul( rest, (char **) &rest, 0 );
TEST_EQUAL( n, offset );
TEST_EQUAL( *rest, ',' );
++rest;
n = strtoul( rest, (char **) &rest, 0 );
TEST_EQUAL( n, (unsigned) tag );
TEST_EQUAL( *rest, ',' );
++rest;
n = strtoul( rest, (char **) &rest, 0 );
TEST_EQUAL( n, len );
if( *rest == ',' )
++rest;
state->description = rest;
return( 0 );
exit:
return( RET_TRAVERSE_ERROR );
}
void test_parse_prefixes( const data_t *input,
int full_result,
int overfull_result )
{
/* full_result: expected result from parsing the given string. */
/* overfull_result: expected_result from parsing the given string plus
* some trailing garbage. This may be UNPREDICTABLE_RESULT to accept
* any result: use this for invalid inputs that may or may not become
* valid depending on what the trailing garbage is. */
unsigned char *buf = NULL;
unsigned char *p = NULL;
size_t buffer_size;
int ret;
/* Test every prefix of the input, except the empty string.
* The first byte of the string is the tag. Without a tag byte,
* we wouldn't know what to parse the input as.
* Also test the input followed by an extra byte.
*/
for( buffer_size = 1; buffer_size <= input->len + 1; buffer_size++ )
{
mbedtls_test_set_step( buffer_size );
/* Allocate a new buffer of exactly the length to parse each time.
* This gives memory sanitizers a chance to catch buffer overreads. */
ASSERT_ALLOC( buf, buffer_size );
memcpy( buf, input->x, buffer_size );
p = buf;
ret = nested_parse( &p, buf + buffer_size );
if( ret == ERR_PARSE_INCONSISTENCY )
goto exit;
if( buffer_size < input->len )
{
TEST_EQUAL( ret, MBEDTLS_ERR_ASN1_OUT_OF_DATA );
}
else if( buffer_size == input->len )
{
TEST_EQUAL( ret, full_result );
}
else /* ( buffer_size > input->len ) */
{
if( overfull_result != UNPREDICTABLE_RESULT )
TEST_EQUAL( ret, overfull_result );
}
if( ret == 0 )
TEST_ASSERT( p == buf + input->len );
mbedtls_free( buf );
buf = NULL;
}
exit:
mbedtls_free( buf );
}
void test_parse_prefixes_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_parse_prefixes( &data0, *( (int *) params[2] ), *( (int *) params[3] ) );
}
void test_get_len( const data_t *input, int actual_length_arg )
{
size_t actual_length = actual_length_arg;
size_t buffer_size;
/* Test prefixes of a buffer containing the given length string
* followed by `actual_length` bytes of payload. To save a bit of
* time, we skip some "boring" prefixes: we don't test prefixes where
* the payload is truncated more than one byte away from either end,
* and we only test the empty string on a 1-byte input.
*/
for( buffer_size = 1; buffer_size <= input->len + 1; buffer_size++ )
{
if( ! get_len_step( input, buffer_size, actual_length ) )
goto exit;
}
if( ! get_len_step( input, input->len + actual_length - 1, actual_length ) )
goto exit;
if( ! get_len_step( input, input->len + actual_length, actual_length ) )
goto exit;
exit:
;
}
void test_get_len_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_get_len( &data0, *( (int *) params[2] ) );
}
void test_get_boolean( const data_t *input,
int expected_value, int expected_result )
{
unsigned char *p = input->x;
int val;
int ret;
ret = mbedtls_asn1_get_bool( &p, input->x + input->len, &val );
TEST_EQUAL( ret, expected_result );
if( expected_result == 0 )
{
TEST_EQUAL( val, expected_value );
TEST_ASSERT( p == input->x + input->len );
}
exit:
;
}
void test_get_boolean_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_get_boolean( &data0, *( (int *) params[2] ), *( (int *) params[3] ) );
}
void test_empty_integer( const data_t *input )
{
unsigned char *p;
#if defined(MBEDTLS_BIGNUM_C)
mbedtls_mpi actual_mpi;
#endif
int val;
#if defined(MBEDTLS_BIGNUM_C)
mbedtls_mpi_init( & actual_mpi );
#endif
/* An INTEGER with no content is not valid. */
p = input->x;
TEST_EQUAL( mbedtls_asn1_get_int( &p, input->x + input->len, &val ),
MBEDTLS_ERR_ASN1_INVALID_LENGTH );
#if defined(MBEDTLS_BIGNUM_C)
/* INTEGERs are sometimes abused as bitstrings, so the library accepts
* an INTEGER with empty content and gives it the value 0. */
p = input->x;
TEST_EQUAL( mbedtls_asn1_get_mpi( &p, input->x + input->len, &actual_mpi ),
0 );
TEST_EQUAL( mbedtls_mpi_cmp_int( &actual_mpi, 0 ), 0 );
#endif
exit:
#if defined(MBEDTLS_BIGNUM_C)
mbedtls_mpi_free( &actual_mpi );
#endif
/*empty cleanup in some configurations*/ ;
}
void test_empty_integer_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_empty_integer( &data0 );
}
void test_get_integer( const data_t *input,
const char *expected_hex, int expected_result )
{
unsigned char *p;
#if defined(MBEDTLS_BIGNUM_C)
mbedtls_mpi expected_mpi;
mbedtls_mpi actual_mpi;
mbedtls_mpi complement;
int expected_result_for_mpi = expected_result;
#endif
long expected_value;
int expected_result_for_int = expected_result;
int val;
int ret;
#if defined(MBEDTLS_BIGNUM_C)
mbedtls_mpi_init( &expected_mpi );
mbedtls_mpi_init( &actual_mpi );
mbedtls_mpi_init( &complement );
#endif
errno = 0;
expected_value = strtol( expected_hex, NULL, 16 );
if( expected_result == 0 &&
( errno == ERANGE
#if LONG_MAX > INT_MAX
|| expected_value > INT_MAX || expected_value < INT_MIN
#endif
) )
{
/* The library returns the dubious error code INVALID_LENGTH
* for integers that are out of range. */
expected_result_for_int = MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
if( expected_result == 0 && expected_value < 0 )
{
/* The library does not support negative INTEGERs and
* returns the dubious error code INVALID_LENGTH.
* Test that we preserve the historical behavior. If we
* decide to change the behavior, we'll also change this test. */
expected_result_for_int = MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
p = input->x;
ret = mbedtls_asn1_get_int( &p, input->x + input->len, &val );
TEST_EQUAL( ret, expected_result_for_int );
if( ret == 0 )
{
TEST_EQUAL( val, expected_value );
TEST_ASSERT( p == input->x + input->len );
}
#if defined(MBEDTLS_BIGNUM_C)
ret = mbedtls_mpi_read_string( &expected_mpi, 16, expected_hex );
TEST_ASSERT( ret == 0 || ret == MBEDTLS_ERR_MPI_BAD_INPUT_DATA );
if( ret == MBEDTLS_ERR_MPI_BAD_INPUT_DATA )
{
/* The data overflows the maximum MPI size. */
expected_result_for_mpi = MBEDTLS_ERR_MPI_BAD_INPUT_DATA;
}
p = input->x;
ret = mbedtls_asn1_get_mpi( &p, input->x + input->len, &actual_mpi );
TEST_EQUAL( ret, expected_result_for_mpi );
if( ret == 0 )
{
if( expected_value >= 0 )
{
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &actual_mpi,
&expected_mpi ) == 0 );
}
else
{
/* The library ignores the sign bit in ASN.1 INTEGERs
* (which makes sense insofar as INTEGERs are sometimes
* abused as bit strings), so the result of parsing them
* is a positive integer such that expected_mpi +
* actual_mpi = 2^n where n is the length of the content
* of the INTEGER. (Leading ff octets don't matter for the
* expected value, but they matter for the actual value.)
* Test that we don't change from this behavior. If we
* decide to fix the library to change the behavior on
* negative INTEGERs, we'll fix this test code. */
unsigned char *q = input->x + 1;
size_t len;
TEST_ASSERT( mbedtls_asn1_get_len( &q, input->x + input->len,
&len ) == 0 );
TEST_ASSERT( mbedtls_mpi_lset( &complement, 1 ) == 0 );
TEST_ASSERT( mbedtls_mpi_shift_l( &complement, len * 8 ) == 0 );
TEST_ASSERT( mbedtls_mpi_add_mpi( &complement, &complement,
&expected_mpi ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &complement,
&actual_mpi ) == 0 );
}
TEST_ASSERT( p == input->x + input->len );
}
#endif
exit:
#if defined(MBEDTLS_BIGNUM_C)
mbedtls_mpi_free( &expected_mpi );
mbedtls_mpi_free( &actual_mpi );
mbedtls_mpi_free( &complement );
#endif
/*empty cleanup in some configurations*/ ;
}
void test_get_integer_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_get_integer( &data0, (char *) params[2], *( (int *) params[3] ) );
}
void test_get_enum( const data_t *input,
const char *expected_hex, int expected_result )
{
unsigned char *p;
long expected_value;
int expected_result_for_enum = expected_result;
int val;
int ret;
errno = 0;
expected_value = strtol( expected_hex, NULL, 16 );
if( expected_result == 0 &&
( errno == ERANGE
#if LONG_MAX > INT_MAX
|| expected_value > INT_MAX || expected_value < INT_MIN
#endif
) )
{
/* The library returns the dubious error code INVALID_LENGTH
* for integers that are out of range. */
expected_result_for_enum = MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
if( expected_result == 0 && expected_value < 0 )
{
/* The library does not support negative INTEGERs and
* returns the dubious error code INVALID_LENGTH.
* Test that we preserve the historical behavior. If we
* decide to change the behavior, we'll also change this test. */
expected_result_for_enum = MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
p = input->x;
ret = mbedtls_asn1_get_enum( &p, input->x + input->len, &val );
TEST_EQUAL( ret, expected_result_for_enum );
if( ret == 0 )
{
TEST_EQUAL( val, expected_value );
TEST_ASSERT( p == input->x + input->len );
}
exit:
;
}
void test_get_enum_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_get_enum( &data0, (char *) params[2], *( (int *) params[3] ) );
}
#if defined(MBEDTLS_BIGNUM_C)
void test_get_mpi_too_large( )
{
unsigned char *buf = NULL;
unsigned char *p;
mbedtls_mpi actual_mpi;
size_t too_many_octets =
MBEDTLS_MPI_MAX_LIMBS * sizeof(mbedtls_mpi_uint) + 1;
size_t size = too_many_octets + 6;
mbedtls_mpi_init( &actual_mpi );
ASSERT_ALLOC( buf, size );
buf[0] = 0x02; /* tag: INTEGER */
buf[1] = 0x84; /* 4-octet length */
buf[2] = ( too_many_octets >> 24 ) & 0xff;
buf[3] = ( too_many_octets >> 16 ) & 0xff;
buf[4] = ( too_many_octets >> 8 ) & 0xff;
buf[5] = too_many_octets & 0xff;
buf[6] = 0x01; /* most significant octet */
p = buf;
TEST_EQUAL( mbedtls_asn1_get_mpi( &p, buf + size, &actual_mpi ),
MBEDTLS_ERR_MPI_ALLOC_FAILED );
exit:
mbedtls_mpi_free( &actual_mpi );
mbedtls_free( buf );
}
void test_get_mpi_too_large_wrapper( void ** params )
{
(void)params;
test_get_mpi_too_large( );
}
#endif /* MBEDTLS_BIGNUM_C */
void test_get_bitstring( const data_t *input,
int expected_length, int expected_unused_bits,
int expected_result, int expected_result_null )
{
mbedtls_asn1_bitstring bs = { 0xdead, 0x21, NULL };
unsigned char *p = input->x;
TEST_EQUAL( mbedtls_asn1_get_bitstring( &p, input->x + input->len, &bs ),
expected_result );
if( expected_result == 0 )
{
TEST_EQUAL( bs.len, (size_t) expected_length );
TEST_EQUAL( bs.unused_bits, expected_unused_bits );
TEST_ASSERT( bs.p != NULL );
TEST_EQUAL( bs.p - input->x + bs.len, input->len );
TEST_ASSERT( p == input->x + input->len );
}
p = input->x;
TEST_EQUAL( mbedtls_asn1_get_bitstring_null( &p, input->x + input->len,
&bs.len ),
expected_result_null );
if( expected_result_null == 0 )
{
TEST_EQUAL( bs.len, (size_t) expected_length );
if( expected_result == 0 )
TEST_ASSERT( p == input->x + input->len - bs.len );
}
exit:
;
}
void test_get_bitstring_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_get_bitstring( &data0, *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ) );
}
void test_get_sequence_of( const data_t *input, int tag,
const char *description,
int expected_result )
{
/* The description string is a comma-separated list of integers.
* For each element in the SEQUENCE in input, description contains
* two integers: the offset of the element (offset from the start
* of input to the tag of the element) and the length of the
* element's contents.
* "offset1,length1,..." */
mbedtls_asn1_sequence head = { { 0, 0, NULL }, NULL };
mbedtls_asn1_sequence *cur;
unsigned char *p = input->x;
const char *rest = description;
unsigned long n;
unsigned int step = 0;
TEST_EQUAL( mbedtls_asn1_get_sequence_of( &p, input->x + input->len,
&head, tag ),
expected_result );
if( expected_result == 0 )
{
TEST_ASSERT( p == input->x + input->len );
if( ! *rest )
{
TEST_EQUAL( head.buf.tag, 0 );
TEST_ASSERT( head.buf.p == NULL );
TEST_EQUAL( head.buf.len, 0 );
TEST_ASSERT( head.next == NULL );
}
else
{
cur = &head;
while( *rest )
{
mbedtls_test_set_step( step );
TEST_ASSERT( cur != NULL );
TEST_EQUAL( cur->buf.tag, tag );
n = strtoul( rest, (char **) &rest, 0 );
TEST_EQUAL( n, (size_t)( cur->buf.p - input->x ) );
++rest;
n = strtoul( rest, (char **) &rest, 0 );
TEST_EQUAL( n, cur->buf.len );
if( *rest )
++rest;
cur = cur->next;
++step;
}
TEST_ASSERT( cur == NULL );
}
}
exit:
mbedtls_asn1_sequence_free( head.next );
}
void test_get_sequence_of_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_get_sequence_of( &data0, *( (int *) params[2] ), (char *) params[3], *( (int *) params[4] ) );
}
void test_traverse_sequence_of( const data_t *input,
int tag_must_mask, int tag_must_val,
int tag_may_mask, int tag_may_val,
const char *description,
int expected_result )
{
/* The description string is a comma-separated list of integers.
* For each element in the SEQUENCE in input, description contains
* three integers: the offset of the element's content (offset from
* the start of input to the content of the element), the element's tag,
* and the length of the element's contents.
* "offset1,tag1,length1,..." */
unsigned char *p = input->x;
traverse_state_t traverse_state = {input->x, description};
int ret;
ret = mbedtls_asn1_traverse_sequence_of( &p, input->x + input->len,
(uint8_t) tag_must_mask, (uint8_t) tag_must_val,
(uint8_t) tag_may_mask, (uint8_t) tag_may_val,
traverse_callback, &traverse_state );
if( ret == RET_TRAVERSE_ERROR )
goto exit;
TEST_EQUAL( ret, expected_result );
TEST_EQUAL( *traverse_state.description, 0 );
exit:
;
}
void test_traverse_sequence_of_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_traverse_sequence_of( &data0, *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ), (char *) params[6], *( (int *) params[7] ) );
}
void test_get_alg( const data_t *input,
int oid_offset, int oid_length,
int params_tag, int params_offset, int params_length,
int total_length,
int expected_result )
{
mbedtls_asn1_buf oid = { -1, 0, NULL };
mbedtls_asn1_buf params = { -1, 0, NULL };
unsigned char *p = input->x;
int ret;
TEST_EQUAL( mbedtls_asn1_get_alg( &p, input->x + input->len,
&oid, ¶ms ),
expected_result );
if( expected_result == 0 )
{
TEST_EQUAL( oid.tag, MBEDTLS_ASN1_OID );
TEST_EQUAL( oid.p - input->x, oid_offset );
TEST_EQUAL( oid.len, (size_t) oid_length );
TEST_EQUAL( params.tag, params_tag );
if( params_offset != 0 )
TEST_EQUAL( params.p - input->x, params_offset );
else
TEST_ASSERT( params.p == NULL );
TEST_EQUAL( params.len, (size_t) params_length );
TEST_EQUAL( p - input->x, total_length );
}
ret = mbedtls_asn1_get_alg_null( &p, input->x + input->len, &oid );
if( expected_result == 0 && params_offset == 0 )
{
TEST_EQUAL( oid.tag, MBEDTLS_ASN1_OID );
TEST_EQUAL( oid.p - input->x, oid_offset );
TEST_EQUAL( oid.len, (size_t) oid_length );
TEST_EQUAL( p - input->x, total_length );
}
else
TEST_ASSERT( ret != 0 );
exit:
;
}
void test_get_alg_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_get_alg( &data0, *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ), *( (int *) params[6] ), *( (int *) params[7] ), *( (int *) params[8] ) );
}
void test_find_named_data( data_t *oid0, data_t *oid1, data_t *oid2, data_t *oid3,
data_t *needle, int from, int position )
{
mbedtls_asn1_named_data nd[] ={
{ {0x06, oid0->len, oid0->x}, {0, 0, NULL}, NULL, 0 },
{ {0x06, oid1->len, oid1->x}, {0, 0, NULL}, NULL, 0 },
{ {0x06, oid2->len, oid2->x}, {0, 0, NULL}, NULL, 0 },
{ {0x06, oid3->len, oid3->x}, {0, 0, NULL}, NULL, 0 },
};
mbedtls_asn1_named_data *pointers[ARRAY_LENGTH( nd ) + 1];
size_t i;
mbedtls_asn1_named_data *found;
for( i = 0; i < ARRAY_LENGTH( nd ); i++ )
pointers[i] = &nd[i];
pointers[ARRAY_LENGTH( nd )] = NULL;
for( i = 0; i < ARRAY_LENGTH( nd ); i++ )
nd[i].next = pointers[i+1];
found = mbedtls_asn1_find_named_data( pointers[from],
(const char *) needle->x,
needle->len );
TEST_ASSERT( found == pointers[position] );
exit:
;
}
void test_find_named_data_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_find_named_data( &data0, &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
void test_free_named_data_null( )
{
mbedtls_asn1_free_named_data( NULL );
goto exit; /* Silence unused label warning */
exit:
;
}
void test_free_named_data_null_wrapper( void ** params )
{
(void)params;
test_free_named_data_null( );
}
void test_free_named_data( int with_oid, int with_val, int with_next )
{
mbedtls_asn1_named_data next =
{ {0x06, 0, NULL}, {0, 0xcafe, NULL}, NULL, 0 };
mbedtls_asn1_named_data head =
{ {0x06, 0, NULL}, {0, 0, NULL}, NULL, 0 };
if( with_oid )
ASSERT_ALLOC( head.oid.p, 1 );
if( with_val )
ASSERT_ALLOC( head.val.p, 1 );
if( with_next )
head.next = &next;
mbedtls_asn1_free_named_data( &head );
TEST_ASSERT( head.oid.p == NULL );
TEST_ASSERT( head.val.p == NULL );
TEST_ASSERT( head.next == NULL );
TEST_ASSERT( next.val.len == 0xcafe );
exit:
mbedtls_free( head.oid.p );
mbedtls_free( head.val.p );
}
void test_free_named_data_wrapper( void ** params )
{
test_free_named_data( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
void test_free_named_data_list( int length )
{
mbedtls_asn1_named_data *head = NULL;
int i;
for( i = 0; i < length; i++ )
{
mbedtls_asn1_named_data *new = NULL;
ASSERT_ALLOC( new, sizeof( mbedtls_asn1_named_data ) );
new->next = head;
head = new;
}
mbedtls_asn1_free_named_data_list( &head );
TEST_ASSERT( head == NULL );
/* Most of the point of the test is that it doesn't leak memory.
* So this test is only really useful under a memory leak detection
* framework. */
exit:
mbedtls_asn1_free_named_data_list( &head );
}
void test_free_named_data_list_wrapper( void ** params )
{
test_free_named_data_list( *( (int *) params[0] ) );
}
#endif /* MBEDTLS_ASN1_PARSE_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_ASN1_PARSE_C)
case 0:
{
*out_value = MBEDTLS_ERR_ASN1_OUT_OF_DATA;
}
break;
case 1:
{
*out_value = UNPREDICTABLE_RESULT;
}
break;
case 2:
{
*out_value = MBEDTLS_ERR_ASN1_INVALID_LENGTH;
}
break;
case 3:
{
*out_value = MBEDTLS_ERR_ASN1_LENGTH_MISMATCH;
}
break;
case 4:
{
*out_value = MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
}
break;
case 5:
{
*out_value = MBEDTLS_ERR_ASN1_INVALID_DATA;
}
break;
case 6:
{
*out_value = RET_TRAVERSE_STOP;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_ASN1_PARSE_C)
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_ASN1_PARSE_C)
test_parse_prefixes_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_ASN1_PARSE_C)
test_get_len_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_ASN1_PARSE_C)
test_get_boolean_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_ASN1_PARSE_C)
test_empty_integer_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_ASN1_PARSE_C)
test_get_integer_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_ASN1_PARSE_C)
test_get_enum_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_ASN1_PARSE_C) && defined(MBEDTLS_BIGNUM_C)
test_get_mpi_too_large_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_ASN1_PARSE_C)
test_get_bitstring_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_ASN1_PARSE_C)
test_get_sequence_of_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_ASN1_PARSE_C)
test_traverse_sequence_of_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_ASN1_PARSE_C)
test_get_alg_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_ASN1_PARSE_C)
test_find_named_data_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_ASN1_PARSE_C)
test_free_named_data_null_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_ASN1_PARSE_C)
test_free_named_data_wrapper,
#else
NULL,
#endif
/* Function Id: 14 */
#if defined(MBEDTLS_ASN1_PARSE_C)
test_free_named_data_list_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_asn1parse.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 37,773 | 1,261 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_gcm.aes128_de.datax | AES-GCM NIST Validation (AES-128,128,0,0,128) #0 [#1]
depends_on:0
2:exp:0:hex:"d785dafea3e966731ef6fc6202262584":hex:"":hex:"d91a46205ee94058b3b8403997592dd2":hex:"":int:128:hex:"3b92a17c1b9c3578a68cffea5a5b6245":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,128) #1 [#1]
depends_on:0
2:exp:0:hex:"aec963833b9098de1ababc853ab74d96":hex:"":hex:"4e0ffd93beffd732c6f7d6ad606a2d24":hex:"":int:128:hex:"e9fcedc176dfe587dc61b2011010cdf1":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,128) #2 [#1]
depends_on:0
2:exp:0:hex:"c4fb9e3393681da9cec5ec96f87c5c31":hex:"":hex:"845e910bc055d895879f62101d08b4c7":hex:"":int:128:hex:"99fb783c497416e4b6e2a5de7c782057":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,120) #0 [#1]
depends_on:0
2:exp:0:hex:"2a930f2e09beceacd9919cb76f2ac8d3":hex:"":hex:"340d9af44f6370eff534c653033a785a":hex:"":int:120:hex:"0c1e5e9c8fe5edfd11f114f3503d63":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,120) #1 [#1]
depends_on:0
2:exp:0:hex:"fe71177e02073b1c407b5724e2263a5e":hex:"":hex:"83c23d20d2a9d4b8f92da96587c96b18":hex:"":int:120:hex:"43b2ca795420f35f6cb39f5dfa47a2":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,120) #2 [#1]
depends_on:0
2:exp:0:hex:"b02392fd7f228888c281e59d1eaa15fb":hex:"":hex:"2726344ba8912c737e195424e1e6679e":hex:"":int:120:hex:"a10b601ca8053536a2af2cc255d2b6":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,112) #0 [#1]
depends_on:0
2:exp:0:hex:"21895cbafc16b7b8bf5867e88e0853d4":hex:"":hex:"f987ce1005d9bbd31d2452fb80957753":hex:"":int:112:hex:"952a7e265830d58a6778d68b9450":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,112) #1 [#1]
depends_on:0
2:exp:0:hex:"9bb9742bf47f68caf64963d7c10a97b0":hex:"":hex:"34a85669de64e1cd44731905fddbcbc5":hex:"":int:112:hex:"e9b6be928aa77b2de28b480ae74c":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,112) #2 [#1]
depends_on:0
2:exp:0:hex:"4e9708e4b37e2e1b5feaf4f5ab54e2a6":hex:"":hex:"1c53a9fdd23919b036d99560619a9939":hex:"":int:112:hex:"6611b50d6fbca83047f9f5fe1768":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,104) #0 [#1]
depends_on:0
2:exp:0:hex:"82fede79db25f00be96eb050a22cea87":hex:"":hex:"e9c50b517ab26c89b83c1f0cac50162c":hex:"":int:104:hex:"d0c0ce9db60b77b0e31d05e048":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,104) #1 [#1]
depends_on:0
2:exp:0:hex:"1d98566fca5201abb12914311a8bd532":hex:"":hex:"590aef4b46a9023405d075edab7e6849":hex:"":int:104:hex:"a1cfd1a27b341f49eda2ca8305":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,104) #2 [#1]
depends_on:0
2:exp:0:hex:"3038771820c2e1319f02a74b8a7a0c08":hex:"":hex:"e556d9f07fb69d7e9a644261c80fac92":hex:"":int:104:hex:"4d2f005d662b6a8787f231c5e1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,96) #0 [#1]
depends_on:0
2:exp:0:hex:"0fb7eef50de598d7d8b508d019a30d5a":hex:"":hex:"a2a2617040116c2c7e4236d2d8278213":hex:"":int:96:hex:"68413c58df7bb5f067197ca0":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,96) #1 [#1]
depends_on:0
2:exp:0:hex:"8cc58b609204215c8ab4908286e56e5c":hex:"":hex:"fb83ea637279332677b5f68081173e99":hex:"":int:96:hex:"a2a9160d82739a55d8cd419f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,96) #2 [#1]
depends_on:0
2:exp:0:hex:"81a5fd184742a478432963f6477e8f92":hex:"":hex:"da297cbb53b11d7c379e0566299b4d5a":hex:"":int:96:hex:"200bee49466fdda2f21f0062":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,64) #0 [#1]
depends_on:0
2:exp:0:hex:"f604ac66d626959e595cbb7b4128e096":hex:"":hex:"269d2a49d533c6bb38008711f38e0b39":hex:"":int:64:hex:"468200fa4683e8be":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,64) #1 [#1]
depends_on:0
2:exp:0:hex:"2e308ba7903e925f768c1d00ff3eb623":hex:"":hex:"335acd2aa48a47a37cfe21e491f1b141":hex:"":int:64:hex:"4872bfd5e2ff55f6":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,64) #2 [#1]
depends_on:0
2:exp:0:hex:"1304e2a5a3520454a5109df61a67da7a":hex:"":hex:"dbe8b452acf4fa1444c3668e9ee72d26":hex:"":int:64:hex:"83a0d3440200ca95":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,32) #0 [#1]
depends_on:0
2:exp:0:hex:"ecf1ec2c9a8f2e9cc799f9b9fddb3232":hex:"":hex:"ddf0b695aef5df2b594fcaae72b7e41c":hex:"":int:32:hex:"2819aedf":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,32) #1 [#1]
depends_on:0
2:exp:0:hex:"9ab5c8ca905b5fe50461f4a68941144b":hex:"":hex:"96dd3927a96e16123f2e9d6b367d303f":hex:"":int:32:hex:"6e0c53ef":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,32) #2 [#1]
depends_on:0
2:exp:0:hex:"b5fc7af605721a9cfe61c1ee6a4b3e22":hex:"":hex:"6b757d4055823d1035d01077666037d6":hex:"":int:32:hex:"e8c09ddd":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,128) #0 [#1]
depends_on:0
2:exp:0:hex:"03c0b4a6e508a8490db0d086a82c9db7":hex:"":hex:"ac52f6c1a05030321fa39f87e89fdb5e":hex:"33316ca79d10a79f4fd038593e8eef09625089dc4e0ffe4bc1f2871554fa6666ab3e7fe7885edef694b410456f3ec0e513bb25f1b48d95e4820c5972c1aabb25c84c08566002dadc36df334c1ce86847964a122016d389ac873bca8c335a7a99bcef91e1b985ae5d488a2d7f78b4bf14e0c2dc715e814f4e24276057cf668172":int:128:hex:"756292d8b4653887edef51679b161812":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,128) #1 [#1]
depends_on:0
2:exp:0:hex:"b228d3d15219ea9ad5651fce02c8374d":hex:"":hex:"5c7eafaead029c3fe3cf3835fe758d0e":hex:"8c35dd805c08686b9b4d460f81b4dcb8c46c6d57842dc3e72ba90952e2bebf17fe7184445b02f801800a944486d662a127d01d3b7f42679052cdc73ce533129af8d13957415c5495142157d6ce8a68aa977e56f562fed98e468e42522767656ce50369471060381bb752dd5e77c79677a4cadffa39e518e30a789e793b07ea21":int:128:hex:"a4dde1ab93c84937c3bbc3ad5237818d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,128) #2 [#1]
depends_on:0
2:exp:0:hex:"776afcbabedd5577fe660a60f920b536":hex:"":hex:"5bbb7f1b14084e520408dd87b97705e9":hex:"44631fc9d4a07416b0dfb4e2b42071e3e2be45502c9ddf72b3e61810eeda31a7d685ebb2ee43a2c06af374569f439ee1668c550067de2dece9ec46ee72b260858d6033f814e85275c5ae669b60803a8c516de32804fa34d3a213ccfaf6689046e25eeb30b9e1608e689f4d31cc664b83a468a51165f5625f12f098a6bf7ddab2":int:128:hex:"a5347d41d93b587240651bcd5230264f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,120) #0 [#1]
depends_on:0
2:exp:0:hex:"20abeafa25fc4ea7d0592cb3e9b4d5fe":hex:"":hex:"3aba79a58c5aa664856b41d552c7a8d3":hex:"98cfecaae9eb9a7c3b17e6bc5f80d8a4bf7a9f4fa5e01b74cae15ee6af14633205aafe3b28fb7b7918e12322ea27352056a603746d728a61361134a561619400ff2bf679045bac2e0fbc2c1d41f8faba4b27c7827bceda4e9bf505df4185515dd3a5e26f7639c8ad5a38bc5906a44be062f02cc53862678ae36fa3de3c02c982":int:120:hex:"2a67ad1471a520fe09a304f0975f31":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,120) #1 [#1]
depends_on:0
2:exp:0:hex:"2bc73fba942ff105823b5dccf6befb1c":hex:"":hex:"902c3e3b69b1ef8395d7281ff74cce38":hex:"4adec0b4ac00325a860044d9f9519daa4f7c163229a75819b0fd7d8e23319f030e61dfa8eadabff42ea27bc36bdb6cad249e801ca631b656836448b7172c11126bad2781e6a1aa4f62c4eda53409408b008c057e0b81215cc13ddabbb8f1915f4bbab854f8b00763a530ad5055d265778cd3080d0bd35b76a329bdd5b5a2d268":int:120:hex:"ebdd7c8e87fe733138a433543542d1":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,120) #2 [#1]
depends_on:0
2:exp:0:hex:"356a4c245868243d61756cabe86da887":hex:"":hex:"b442f2ec6d45a17144c258fd59fe5b3b":hex:"12cccc3c60474b0a1579c5006c2134850724fa6c9da3a7022d4f65fd238b052bdf34ea34aa7dbadad64996065acee588ab6bd29726d07ed24ffae2d33aadf3e66ebb87f57e689fd85128be1c9e3d8362fad1f8096ee391f75b576fb213d394cef6f091fc5488d9aa152be69475b9167abd6dd4fd93bbbc7b8ca316c952eb19c6":int:120:hex:"ed26080dcb670590613d97d7c47cf4":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,112) #0 [#1]
depends_on:0
2:exp:0:hex:"dfa7e93aff73600fc552324253066e2c":hex:"":hex:"c20001e93f1cd05253c277a9445d61e4":hex:"a64d1e20058a1f7e698622a02f7ff8dc11886717ede17bbdc3c4645a66a71d8b04346fb389a251ffb0a7f445a25faf642bb7e4697d2cacf925e78c4be98457996afb25b0516b50f179441d1923312364947f8f1e0f5715b43bd537727bf943d7b4679b0b0b28b94e56e7bbf554d9cf79fcee4387f32bb6f91efdd23620035be6":int:112:hex:"6ba5e4dace9a54b50b901d9b73ad":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,112) #1 [#1]
depends_on:0
2:exp:0:hex:"2ecea80b48d2ecd194a7699aa7d8ccfc":hex:"":hex:"8b4db08bafc23b65ae50a2d20661d270":hex:"efc2ca1a3b41b90f8ddf74291d68f072a6e025d0c91c3ce2b133525943c73ebadc71f150be20afeb097442fa51be31a641df65d90ebd81dcbaf32711ed31f5e0271421377ffe14ddafea3ca60a600588d484856a98de73f56a766ae60bae384a4ae01a1a06821cf0c7a6b4ee4c8f413748457b3777283d3310218fb55c107293":int:112:hex:"246a9d37553088b6411ebb62aa16":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,112) #2 [#1]
depends_on:0
2:exp:0:hex:"d38fee3fd3d6d08224c3c83529a25d08":hex:"":hex:"a942ccb11cf9468186fabfc18c899801":hex:"1c92a4ce0a1dae27e720d6f9b1e460276538de437f3812ab1177cf0273b05908f296f33ba0f4c790abe2ce958b1d92b930a0d81243e6ad09ef86ee8e3270243095096537cb1054fcfcf537d828b65af9b6cf7c50f5b8470f7908f314d0859107eed772ee1732c78e8a2e35b2493f3e8c1e601b08aeab8d9729e0294dca168c62":int:112:hex:"803a08700ec86fdeb88f7a388921":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,104) #0 [#1]
depends_on:0
2:exp:0:hex:"1899b0cbae41d705c6eed3226afb5bc0":hex:"":hex:"82d0910aa53e300a487d880d018d0dea":hex:"6bf5583cc1007d74f3529db63b8d4e085400ccf3725eab8e19cb145f3910c61465a21486740a26f74691866a9f632af9fae81f5f0bffedf0c28a6ce0fd520bb4db04a3cd1a7d29d8801e05e4b9c9374fd89bcb539489c2f7f1f801c253a1cc737408669bcd133b62da357f7399a52179125aa59fae6707d340846886d730a835":int:104:hex:"c5d58870fee9ce157f5ec1fa8f":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,104) #1 [#1]
depends_on:0
2:exp:0:hex:"8b95323d86d02754f4c2874b42ec6eb0":hex:"":hex:"4f76084acbdef9999c71dcc794238d7c":hex:"ebc75788377c0b264818a6f97c19cf92c29f1c7cdeb6b5f0a92d238fa4614bc35d0cfe4ec9d045cd628ff6262c460679ac15b0c6366d9289bbd217e5012279e0af0fb2cfcbdf51fe16935968cbb727f725fe5bcd4428905849746c8493600ce8b2cfc1b61b04c8b752b915fed611d6b54ef73ec4e3950d6db1807b1ce7ed1dcc":int:104:hex:"c4724ff1d2c57295eb733e9cad":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,104) #2 [#1]
depends_on:0
2:exp:0:hex:"30da555559eb11cf7e0eff9d99e9607d":hex:"":hex:"7799275bf12335f281ec94a870f90a0b":hex:"e735d556e15aec78d9736016c8c99db753ed14d4e4adaaa1dd7eaad702ea5dc337433f8c2b45afdf2f385fdf6c55574425571e079ca759b6235f877ed11618ff212bafd865a22b80b76b3b5cf1acfd24d92fd41607bbb7382f26cd703757088d497b16b32de80e1256c734a9b83356b6fced207177de75458481eaef59a431d7":int:104:hex:"3c82272130e17c4a0a007a908e":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,96) #0 [#1]
depends_on:0
2:exp:0:hex:"ed2ac74af896c5190c271cfa6af02fd2":hex:"":hex:"e0226e2d8da47badad1fb78b9a797f27":hex:"8f11353ae476ff923013e6e736ffc9d23101a1c471ccc07ad372a8430d6559c376075efce2e318cdf4c9443dbf132e7e6da5524045028c97e904633b44c4d189a4b64237ac7692dd03c0e751ce9f04d0fdbd8a96074cd7dfa2fd441a52328b4ac3974b4902db45663f7b6f24947dba618f8b9769e927faf84c9f49ad8239b9fb":int:96:hex:"db8af7a0d548fc54d9457c73":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,96) #1 [#1]
depends_on:0
2:exp:0:hex:"0225b73fe5fbbe52f838d873173959d8":hex:"":hex:"02a048764f48d9aed1147ee922395bbf":hex:"9b46a57b06e156c877e94c089814493ead879397dab3dfcab2db349ef387efcd0cc339a7e79131a2c580188fc7429044a465b8329d74cd8f47272a4ed32582b1c5c7e3d32341ae902ea4923dc33df8062bc24bb51a11d2ecc82f464f615041387f9c82bd2135d4e240fe56fa8a68e6a9a417e6702430a434b14d70cf02db3181":int:96:hex:"e2c2ce4022c49a95c9ac9026":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,96) #2 [#1]
depends_on:0
2:exp:0:hex:"89ca3771a0ef3287568b4ac036120198":hex:"":hex:"7e83d2ffa8af8c554cfd71a0db56ef5b":hex:"1bd7a9d6262882bd12c62bd50942965b3cdcadf5e0fab2dc4d0daf0ee4b16e92c6e2464c0caa423cdce88e4d843490609716ec5e44c41672c656ac0e444d3622557ea8420c94deae3ad190ddaf859f6f8c23e4e2e32a46d28df23de4f99bd6c34f69e06eddfdfa5f263dbe8baf9d4296b2c543e4c4847271e7590374edf46234":int:96:hex:"06b2bf62591dc7ec1b814705":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,64) #0 [#1]
depends_on:0
2:exp:0:hex:"a41a297bd96e224942998fe2192934a1":hex:"":hex:"6827f2c5a0b7ecd6bbc696abb0adf556":hex:"f32041abd8543415cbac423d945dda5378a16a7e94d9ab5dbd2d32eb1c5048cc7c8e4df3ca84ec725f18c34cfdeaa7595392aabfd66d9e2f37c1165369cd806cd9d2110def6f5fad4345e5a6e2326c9300199438fcc078cd9fcf4d76872cac77fc9a0a8ac7e4d63995078a9addecf798460ff5910861b76c71bccfb6b629d722":int:64:hex:"49a4917eef61f78e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,64) #1 [#1]
depends_on:0
2:exp:0:hex:"a9372c058f42e0a1d019bdb528313919":hex:"":hex:"8d03f423230c8f00a5b6b712d426a2af":hex:"cfef4e70fcc1821eeccf7c7b5eb3c0c3b5f72dc762426e0bd26242f8aa68c5b716ab97eded5e5720caccc1965da603d556d8214d5828f2cf276d95bf552d47313876796221f62ccb818a6d801088755d58cfb751bfed0d5a19718d4e0f94b850e0279b3a69295d1837cba958a6cc56e7594080b9e5b954a199fdc9e54ddc8583":int:64:hex:"b82cd11cd3575c8d":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,64) #2 [#1]
depends_on:0
2:exp:0:hex:"6302b7338f8fa84195ad9abbacd89b4e":hex:"":hex:"e1bed5c53547cbc85f3411fbb43bb08b":hex:"bcd329c076e8da2797d50dcdcf271cecf3ce12f3c136ed746edc722f907be6133276ee099038fdc5d73eec812739c7489d4bcc275f95451b44890416e3ffe5a1b6fa3986b84eee3adad774c6feaecb1f785053eeda2cfc18953b8547866d98918dbe0a6abc168ac7d77467a367f11c284924d9d186ef64ef0fd54eacd75156d2":int:64:hex:"5222d092e9e8bd6c":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,32) #0 [#1]
depends_on:0
2:exp:0:hex:"78b5c28d62e4b2097873a1180bd5a3a5":hex:"":hex:"c93902c2819ee494f0fc4b259ee65dd8":hex:"e6b1192674a02083a6cf36d4ba93ba40a5331fadf63fd1eb2efa2ee9c0d8818472aaaf2b4705746011753f30f447c8f58dd34d29606daf57eadc172529837058cb78a378b19da8d63c321f550dfa256b5fd9f30e93d8f377443bfcd125f86a079a1765d2010be73d060f24eebae8d05e644688b2149bc39e18bd527bc066f2ba":int:32:hex:"eae48137":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,32) #1 [#1]
depends_on:0
2:exp:0:hex:"3d84130578070e036c9e3df5b5509473":hex:"":hex:"3b9b4950523a19c6866fd2b0cde541fd":hex:"a764931e1b21a140c54a8619aacdb4358834987fb6e263cec525f888f9e9764c165aaa7db74f2c42273f912daeae6d72b232a872ac2c652d7cd3af3a5753f58331c11b6c866475697876dbc4c6ca0e52a00ba015ee3c3b7fb444c6e50a4b4b9bbe135fc0632d32a3f79f333d8f487771ed12522e664b9cf90e66da267f47a74d":int:32:hex:"79987692":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,32) #2 [#1]
depends_on:0
2:exp:0:hex:"08428605ab4742a3e8a55354d4764620":hex:"":hex:"128f5f4a817e4af04113847a223adeb0":hex:"464b484ed79d93a48e0f804e04df69d7ca10ad04ba7188d69e6549ab50503baaec67e0acba5537d1163c868fd3e350e9d0ae9123046bc76815c201a947aa4a7e4ed239ce889d4ff9c8d043877de06df5fc27cf67442b729b02e9c30287c0821ef9fa15d4cccbc53a95fa9ec3ed432ca960ebbf5a169ccada95a5bf4c7c968830":int:32:hex:"3eb3e3a2":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,128) #0 [#1]
depends_on:0
2:exp:0:hex:"0dd358bc3f992f26e81e3a2f3aa2d517":hex:"87cc4fd75788c9d5cc83bae5d764dd249d178ab23224049795d4288b5ed9ea3f317068a39a7574b300c8544226e87b08e008fbe241d094545c211d56ac44437d41491a438272738968c8d371aa7787b5f606c8549a9d868d8a71380e9657d3c0337979feb01de5991fc1470dfc59eb02511efbbff3fcb479a862ba3844a25aaa":hex:"d8c750bb443ee1a169dfe97cfe4d855b":hex:"":int:128:hex:"a81d13973baa22a751833d7d3f94b3b1":char*:"":hex:"77949b29f085bb3abb71a5386003811233056d3296eb093370f7777dadd306d93d59dcb9754d3857cf2758091ba661f845ef0582f6ae0e134328106f0d5d16b541cd74fdc756dc7b53f4f8a194daeea9369ebb1630c01ccb307b848e9527da20a39898d748fd59206f0b79d0ed946a8958033a45bd9ae673518b32606748eb65":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,128) #1 [#1]
depends_on:0
2:exp:0:hex:"43b5f18227e5c74288dbeff03801acd6":hex:"f58d630f10cfca61d4644d4f6505bab629e8e8faf1673e64417f9b79e622966a7011cfb3ff74db5cebf09ad3f41643d4437d213204a6c8397e7d59b8a5b1970aed2b6bb5ea1933c72c351f6ba96c0b0b98188f6e373f5db6c5ebece911ec7a1848abd3ae335515c774e0027dab7d1c07d047d3b8825ff94222dbaf6f9ab597ee":hex:"08ee12246cf7edb81da3d610f3ebd167":hex:"":int:128:hex:"82d83b2f7da218d1d1441a5b37bcb065":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,128) #2 [#1]
depends_on:0
2:exp:0:hex:"9a433c612d7e1bdff881e4d63ba8b141":hex:"ce10758332f423228b5e4ae31efda7677586934a1d8f05d9b7a0dc4e2010ec3eaacb71a527a5fff8e787d75ebd24ad163394c891b33477ed9e2a2d853c364cb1c5d0bc317fcaf4010817dbe5f1fd1037c701b291b3a66b164bc818bf5c00a4c210a1671faa574d74c7f3543f6c09aaf117e12e2eb3dae55edb1cc5b4086b617d":hex:"8b670cf31f470f79a6c0b79e73863ca1":hex:"":int:128:hex:"8526fd25daf890e79946a205b698f287":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,120) #0 [#1]
depends_on:0
2:exp:0:hex:"8e9d75c781d63b29f1816859f7a0e0a0":hex:"a9f1883f58e4ef78377992101ab86da0dafcefa827904dd94dff6f6704b1e45517165a34c5555a55b04c6992fb6d0840a71bd262fe59815e5c7b80fe803b47d5ba44982a3f72cb42f591d8b62df38c9f56a5868af8f68242e3a15f97be8ef2399dbace1273f509623b6f9e4d27a97436aebf2d044e75f1c62694db77ceac05de":hex:"748a3b486b62a164cedcf1bab9325add":hex:"":int:120:hex:"131e0e4ce46d768674a7bcacdcef9c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,120) #1 [#1]
depends_on:0
2:exp:0:hex:"fe6b8553002c69396d9976bb48d30779":hex:"786f4801b16de7a4931ab143b269c7acc68f1ed9b17a95e8929ccec7d53413059fd4267bedbf079d9d69e90314c1345bc9cb9132f1af69323157ddf7533ced42b4b7bd39004f14d326f5b03bc19084d231d93bcab328312d99b426c1e86e8e049d380bb492e2e32ad690af4cf86838d89a0dfdcbc30e8c9e9039e423a234e113":hex:"595b17d0d76b83780235f5e0c92bd21f":hex:"":int:120:hex:"8879de07815a88877b0623de9be411":char*:"":hex:"b15dc7cd44adcb0783f30f592e5e03ccd47851725af9fe45bfc5b01ae35779b9a8b3f26fec468b188ec3cad40785c608d6bfd867b0ccf07a836ec20d2d9b8451636df153a32b637e7dcdbd606603d9e53f6e4c4cc8396286ce64b0ea638c10e5a567c0bc8e808080b71be51381e051336e60bf1663f6d2d7640a575e0752553b":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,120) #2 [#1]
depends_on:0
2:exp:0:hex:"14898c56009b459172fef9c17993b54f":hex:"e7ba6ef722273238b975d551f95d3e77e9b75b24c547b86eafb457d409803bdf6e1443839d8604ee497020e1a3dbd687a819b17fdde0fcf240ce2129792792a58bfcd825773001ee959bf9ec8d228e27ce1cd93d7fb86769a3793361b6f82bf7daf284afc1ece657a1ee6346ea9294880755b9b623563ad2657ba2286488a2ef":hex:"0862f8f87289988711a877d3231d44eb":hex:"":int:120:hex:"36938974301ae733760f83439437c4":char*:"":hex:"3fd56897a62743e0ab4a465bcc9777d5fd21ad2c9a59d7e4e1a60feccdc722b9820ec65cb47e1d1160d12ff2ea93abe11bc101b82514ead7d542007fee7b4e2dd6822849cd3e82d761ff7cf5ce4f40ad9fec54050a632a401451b426812cf03c2b16a8667a88bb3f7497e3308a91de6fd646d6a3562c92c24272411229a90802":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,112) #0 [#1]
depends_on:0
2:exp:0:hex:"fe5253d4b071793b081ebc122cc2a5f8":hex:"b57a0bd7714ae95e77fa9452e11a7ed4a2bec60f81ad6ddb956d4b1cb5dfc277dcb4034d501801b26733b5e08c710c3cfdccc1b208dc7a92cd7ebe166320582bcaff64cc943c36fbe7008f004e5db70c40de05fa68b0c9d4c16c8f976130f20702b99674cd2f4c93aeaeb3abca4b1114dbc3a4b33e1226ad801aa0e21f7cc49b":hex:"49e82d86804e196421ec19ddc8541066":hex:"":int:112:hex:"e8b8ae34f842277fe92729e891e3":char*:"":hex:"c4a31c7ec820469f895d57579f987733337ec6547d78d17c44a18fab91f0322cfe05f23f9afaf019cf9531dec2d420f3591d334f40d78643fd957b91ab588a7e392447bd702652017ede7fb0d61d444a3b3cc4136e1d4df13d9532eb71bcf3ff0ae65e847e1c572a2f90632362bc424da2249b36a84be2c2bb216ae7708f745c":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,112) #1 [#1]
depends_on:0
2:exp:0:hex:"b3502d6f0d172246e16503cdf5793296":hex:"09268b8046f1558794e35cdc4945b94227a176dd8cb77f92f883542b1c4be698c379541fd1d557c2a07c7206afdd49506d6a1559123de1783c7a60006df06d87f9119fb105e9b278eb93f81fd316b6fdc38ef702a2b9feaa878a0d1ea999db4c593438f32e0f849f3adabf277a161afb5c1c3460039156eec78944d5666c2563":hex:"6ce994689ff72f9df62f386a187c1a13":hex:"":int:112:hex:"21cdf44ff4993eb54b55d58e5a8f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,112) #2 [#1]
depends_on:0
2:exp:0:hex:"5fb33dd73db309b9dfd3aee605cd94bf":hex:"f4e011f8c99038c46854b427475f23488077ebf051c4b705a1adfdd493a0a10af7a7e9453965b94f52f61ae62ce9243a82a2dbf9c5a285db3fe34ed34ed08b5926f34c48171195f7062d02a6e6e795322a0475017371cb8f645cdcac94afc66dc43e7583bdf1c25790f4235076a53de6c64f3bc5004e5a9ce4783fbf639fad97":hex:"3f6486f9e9e645292e0e425bac232268":hex:"":int:112:hex:"7ee5e0e2082b18d09abf141f902e":char*:"":hex:"0503cb531f1c967dae24f16dd651d544988a732020134896a0f109222e8639bf29ff69877c6ef4ac3df1b260842f909384e3d4409b99a47112681c4b17430041ca447a903a6c1b138f0efbb3b850d8290fceac9723a32edbf8e2d6e8143b1cbc7bf2d28d1b6c7f341a69918758cc82bbab5d898fa0f572d4ceaa11234cb511ec":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,104) #0 [#1]
depends_on:0
2:exp:0:hex:"a958fe3b520081b638d9e4c7d5da7ac7":hex:"dfa9487378c7d8af9c8dbd9e533cd81503d9e4e7dab43133bad11fd3050a53a833df9cc3208af1a86110567d311d5fc54b0d627de433c381b10e113898203ac5225140f951cdb64c6494592b6453f9b6f952ec5ece732fb46c09a324f26b27cdad63588006bb5c6c00b9aa10d5d3b2f9eaab69beeddd6f93966654f964260018":hex:"c396109e96afde6f685d3c38aa3c2fae":hex:"":int:104:hex:"06ca91004be43cf46ed4599e23":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,104) #1 [#1]
depends_on:0
2:exp:0:hex:"ec319fb143eac8215b51541daec268f2":hex:"d298d988e74927736237eb8ab09d7a86b854fa2fd1f7f3be83b417ac10aa9291f4af5b3fbaf75a296ac32369ad57ded3984b84711953e477de3035ba430a30ffb84c941936e6c8d2cae8d80159876f87dd682747f2dccc36d7c32ab227032b8ac70b313fa4202ea236e3ec4d9e4d8b48cf3b90b378edc5b1dbeec929549344f8":hex:"8a4684f42a1775b03806574f401cff78":hex:"":int:104:hex:"e91acb1bfda191630b560debc9":char*:"":hex:"27ce4a622959930f4059f247d29d1438257093cc973bf1bae4e0515da88b9a7e21ec59c7e4d062035cdf88b91254d856b11c8c1944865fa12922227ded3eecccaa36341ecf5405c708e9ea173f1e6cdf090499d3bb079910771080814607a1efe62ec6835dc0333d19dd39dd9ea9f31cd3632128536149a122050bb9365b521d":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,104) #2 [#1]
depends_on:0
2:exp:0:hex:"14a3e69f351ac39b4297749a90c1365c":hex:"051224f7b208549dcfda5f9d56ce5f0a072ef1f23f3810c693516c92622be6ed4d7a9e0f9450980ba490b2e9e3468ea7eef10bc9ebd673d91f32b748c1bf2c50cc4ebb59fc409c6d780bba00700d563ce1dc9927a6c860095a42ed053f3d640debfbfa7a4e6d5de234af19755000d95e7f414f1f78285ee165410c020038286b":hex:"eb1c6c04437aa5a32bcc208bb3c01724":hex:"":int:104:hex:"e418815960559aefee8e0c3831":char*:"":hex:"797310a6ed9ce47cdc25f7f88f5dbbf6f8f4837701704d7afced250585922744598d6f95ba2eecf86e030cc5ee71b328fc1c4f2d4df945d1b91a2803d6ae8eba6881be5fe0f298dd0c0279e12720ede60b9e857ccca5abe9b4d7ee7f25108beebbfe33f05c0d9903bf613c2e7ed6a87b71b5e386d81b3ae53efd01055bbcccc2":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,96) #0 [#1]
depends_on:0
2:exp:0:hex:"c34827771fc3918d1cee09ba9401b832":hex:"ce79701b661066e53191c9acdaf677ad41622314898d7216e3f113e2e6e215d26d8bd139827f06ab3ea5c4105694e87db1dd6cec10e1f86a8744d4c541f08e40319e22ab42fc1a6c89edfd486b6f142c6bbbf84a73912e0b2e55b79db306ccabf839855afdd889e52ae981520c89e7dc29bb2adb1906cca8c93fcb21290a095b":hex:"2379bbd39a1c22bc93b9b9cc45f3840b":hex:"":int:96:hex:"26e1f6cf0d9e0f36dfd669eb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,96) #1 [#1]
depends_on:0
2:exp:0:hex:"b1f9bd2006ec550b7b9913d383200b5d":hex:"6d9fc8f586d50d6e0128172ae147844e80136905d3a297497a9566ca7c7445029028f14c9950acee92a5c12a9150f5e024e01c7505dd83937542b0b1288de9c292ae8ad918a09b2edf8493540b74c73d2794f2eb6eed18eba520ddea9567462c83330f33d7892fcde0b10c73a4e26ab1bef037cec7e0190b95188e9a752fee6f":hex:"ca28fa6b64bb3b32ef7d211f1c8be759":hex:"":int:96:hex:"c87aac7ad0e85dbb103c0733":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,96) #2 [#1]
depends_on:0
2:exp:0:hex:"8b2cef1a92aa0af2b00fb2a99855d5bc":hex:"fd09525ef3c65ab5823e1b6c36b4a9449a3975c5d3a9e7e33c61fb32edcbb8e8c915b6202e3fbce87d73cc3b66d83d9ea7e1e353cc7468f08626932cf0235563e2a28953ee5a0afadb1c3cb513b1f1fc9a8a6cf326174b877448672f7731dd6430a51619da1a169ab302da5af5b38802f8bbf5890b5d9b45deda799679501dc4":hex:"08d87b7acee87d884667f6b1e32e34d0":hex:"":int:96:hex:"3bd7685318010b0c5fe3308b":char*:"":hex:"583e64631c218549923e8ad33b728d07f23b0f19d2aff1ad7e20d564c591db0e117caa8f21e3f3345e3d84f0ccbb27274cddf9274410fc342cb2a5d4aea4e925d0dd5350389ee0dea23a842ff3f5c1198374a96f41e055f999cfbc2f47ceaa883da8eb6ff729f583eff1f91bd3f3254d4e81e60d9993b3455e67f405708e4422":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,64) #0 [#1]
depends_on:0
2:exp:0:hex:"175c306f8644b0c4b894ae3d0971505e":hex:"fbe7ced7048f83e3a075661c4924eb77da1b4d6019d504afb942d728b31fd3b17557bd101c08453540a5e28d3505aeb8801a448afac2d9f68d20c0a31c7ef22bd95438851789eef1bebe8d96ac29607025b7e1366fecd3690ba90c315528dc435d9a786d36a16808d4b3e2c7c5175a1279792f1daccf51b2f91ac839465bb89a":hex:"9860268ca2e10974f3726a0e5b9b310f":hex:"":int:64:hex:"f809105e5fc5b13c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,64) #1 [#1]
depends_on:0
2:exp:0:hex:"08c0edcfe342a676ccdc04bdf854b4b0":hex:"1fc8ef8480c32d908b4bcbfa7074a38e915c20ed7a1c608422087e89442d7c5af6fe9c9a716c55793248062d8e6c6e8e904e2804da3a43701e4c78ecdb67e0b25308afc6d9b463356439cd095cff1bdf0fd91ab301c79fd257046cba79a5d5cd99f2502ad968420e4d499110106072dc687f434db0955c756a174a9024373c48":hex:"4a7b70753930fe659f8cc38e5833f0c7":hex:"":int:64:hex:"9ab1e2f3c4606376":char*:"":hex:"983458c3f198bc685d98cea2b23cf71f0eb126e90937cab3492a46d9dc85d76bbb8035c6e209c34b2a7187df007faabe9f3064dc63f1cb15bf5a10655e39b94732e0c6583d56327e9701344e048887a81b256181cdfa9ec42ebc990875e4852240ddcb3cbc4ea4e6307075fd314f7190f3553267bd68b19e954e310ec3f8dbab":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,64) #2 [#1]
depends_on:0
2:exp:0:hex:"241067a0301edf0f825d793e03383ea1":hex:"6984bb9830843529fad7f5e7760db89c778d62c764fcd2136ffb35d7d869f62f61d7fef64f65b7136398c1b5a792844528a18a13fba40b186ae08d1153b538007fc460684e2add8a9ed8dd82acbb8d357240daaa0c4deb979e54715545db03fe22e6d3906e89bdc81d535dae53075a58f65099434bfeed943dbc6024a92aa06a":hex:"a30994261f48a66bb6c1fc3d69659228":hex:"":int:64:hex:"36c3b4a732ba75ae":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,32) #0 [#1]
depends_on:0
2:exp:0:hex:"03cccb5357bd2848332d1696f2ff90cb":hex:"5e2f18cbc1e773df9f28be08abb3d0b64d545c870c5778ac8bb396bef857d2ac1342ae1afb3bf5d64e667bf837458415d48396204fe560e3b635eb10e560e437f2d0396952998fd36e116cd047c1d7f6fc9901094454d24165c557a8816e0d0a8e0ce41e040ba6f26ca567c74fc47d9738b8cd8dae5dfc831c65bc1ba9603a07":hex:"e0754022dfb1f813ccaf321558790806":hex:"":int:32:hex:"c75f0246":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,32) #1 [#1]
depends_on:0
2:exp:0:hex:"4e5e53c84a05d5a5348bac7b2611cf62":hex:"489c00c05dec06f282924c680f621ab99ac87f7d33ebbb4ca0eee187ec177d30d2b4afb4ee9f0dc019cf1a4da16d84b7f5f5c7fce72a32461db115b5a5a433024fd5ed3d47161836bb057a0189ed768f95e45fa967d0cc512fc91b555808c4033c945e8f2f7d36428dcb61f697e791b74e5c79b2bcb9cb81bec70d8119cd8d76":hex:"47e40543b7d16bc9122c40b106d31d43":hex:"":int:32:hex:"81eec75d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,32) #2 [#1]
depends_on:0
2:exp:0:hex:"2c94008bf377f90b7a1c0d2ea38f730c":hex:"7b3d619d115de9970b2df4e1f25194940b3f3da04c653231e8e6946de9dc08ae5ba37e2a93c232e1f9445f31c01333045f22bd832e3b5f9833f37070fafb0ef1c44cc5637058ab64d9e07bb81b32852d4cf749a3ddbfdb494f8de8bb4e31f46033f8a16bc22e2595d023845505ea5db74dd69ab4ca940078b09efb4ff19bdb66":hex:"abfe92931a8411a39986b74560a38211":hex:"":int:32:hex:"47d42e78":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,128) #0 [#1]
depends_on:0
2:exp:0:hex:"69eedf3777e594c30e94e9c5e2bce467":hex:"5114e9983c96fecec3f7304ca42f52aa16cb7c6aadfb62ad537c93a3188835ca0703dad34c73cf96435b668b68a7a1d056931959316e8d3ab956bf64c4e07479c7767f9d488b0c0c351333ccf400b7e0be19a0fd173e3f2a1ae313f27e516952260fd2da9ab9daca478ebb93cd07d0b7503b32364d8e308d904d966c58f226bb":hex:"a3330638a809ba358d6c098e4342b81e":hex:"df4e3f2b47cf0e8590228fcf9913fb8a5eb9751bba318fd2d57be68c7e788e04fabf303699b99f26313d1c4956105cd2817aad21b91c28f3b9251e9c0b354490fa5abfcea0065aa3cc9b96772eb8af06a1a9054bf12d3ae698dfb01a13f989f8b8a4bb61686cf3adf58f05873a24d403a62a092290c2481e4159588fea6b9a09":int:128:hex:"5de3068e1e20eed469265000077b1db9":char*:"":hex:"208e6321238bf5c6e2ef55a4b8f531cbbfb0d77374fe32df6dd663486cf79beeed39bb6910c3c78dd0cc30707a0a12b226b2d06024db25dcd8a4e620f009cafa5242121e864c7f3f4360aaf1e9d4e548d99615156f156008418c1c41ff2bbc007cecf8f209c73203e6df89b32871de637b3d6af2e277d146ae03f3404d387b77":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,128) #1 [#1]
depends_on:0
2:exp:0:hex:"45cc35311eedf0ba093bf901931a7036":hex:"5dc8d7525eaad035c19714ae1b1e538cb66a4089027245351e0ad9297410fb3a0c1155407c10a8bb95a9ca624a9c9925dac003ee78926c6e90ff4ccdba10e8a78bda1c4478162a0e302de5ff05fb0f94c89c3c7429fb94828bdcd97d21333c2ee72963ee6f056ce272b8bab007e653a42b01d1d2041ba627f169c8c0d32e6dae":hex:"fed5084de3c348f5a0adf4c2fd4e848a":hex:"6e210914e4aed188d576f5ad7fc7e4cf7dd8d82f34ea3bcbdb7267cfd9045f806978dbff3460c4e8ff8c4edb6ad2edba405a8d915729d89aab2116b36a70b54f5920a97f5a571977e0329eda6c696749be940eabfc6d8b0bbd6fbdb87657b3a7695da9f5d3a7384257f20e0becd8512d3705cc246ee6ca1e610921cf92603d79":int:128:hex:"266a895fc21da5176b44b446d7d1921d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,128) #2 [#1]
depends_on:0
2:exp:0:hex:"9edb5231ca4a136b4df4ae22b8588f9f":hex:"493df801c57f8bb591955712d92d3fc34518f0599fec8533b2b4473364e1df4f560c12444cf50eeb584676b7e955c742189de6b50b8e012dfa6642f3679fb02bc6d8e08d1db88c8ae955a7946263e06494e17f8df246b672942661e5563302252208f2e00a0d77068a020e26082c291a75a06f63c41e2830292a418b2b5fd9dd":hex:"c342e9bdabe7be922b2695f5894e032c":hex:"a45c7f8032ac5144deef8d5380f033aea2786b0592720a867f4831eaccc6b85d3fd568aedc6e472e017455b0b5b30cf7a08ea43ca587f35e1646ecd9b4dc774d11e350c82c65692be1e9541cbd72a283bdcf93dc7115545f373747b4f8d5915ed0c42fbeefd3e9bd86003d65efc2361fde5b874ddabcf8265e6b884615102eff":int:128:hex:"5ed3ea75c8172fa0e8755fef7b4c90f1":char*:"":hex:"56696e501fac1e8d5b83ef911ed11337d5d51ff5342a82993dd5340bb9632e6606eef68ec5fe8cec6b34ebbc596c279e6cbc9221c4cde933f6d93ae014e3c4ca49593f35eaa638606d059519bac3a3373519e6184e7227d2aa62170c36479fe239cb698bfca863925a4c9fb1338685a55a6dfd3bd9c52d8ae12be8551fce6e1a":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,120) #0 [#1]
depends_on:0
2:exp:0:hex:"d5fdcb8f5225090e63fae9b68f92c7cb":hex:"d39b9cba95e3a3aab9bc1d03ff475c04faeb5b7f0510777f39e5a05756606eb7ddd154aac035d9ddaf3535629821dd8f014dedd52cd184f52fc706e3c89a3a271398c9125d9a624dafb297a56022ca2ea331ea7359ab5e65f8e14814788e64e0a886a9b1a0144bf268fdcf9d94c3d10a0452f40111da9df108252e9039eacea3":hex:"581c818282a0905df5ffff652e5604e9":hex:"f1ae6cd7b07f261105f555cf812a1d5bf8dd9aac07666318acffa11abb77d0238156663acbf7543825b45c6e9cddb481a40995ecd78bb5f4cba5df7c7efb00fc19c7f45e94d37697aca8ef368b99165393b6107f900194c797cd3289cb097eb5915f2abfd6aa52dd1effffdde448e30075a1c053246db54b0ec16eadca1c0071":int:120:hex:"827e66b5b70dce56215cfb86c9a642":char*:"":hex:"cec11a12e47fd443f878e8e9fe23c65f29dd2d53cec59b799bcb0928de8e2f92fe85c27cec5c842ef30967b919accafe0c0d731b57f0bb5685d90a3061cb473e50e8aeca1346d1f47f7db06941f83f21ba5976d97c28cab547d8c1f38387a04b8a0b212da55b75fbaf9562eeeabd78eadcbab66457f0cd4e0d28133a64cb063f":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,120) #1 [#1]
depends_on:0
2:exp:0:hex:"036198cd3a3ab9319684d0f811cf2992":hex:"6b95b9e82a695fb7b466ce3adb536f525d8314f95eada39efb49baf121093ce7d5439f0d8223e03530b85accd388a70650ca9f7e63eb32afecb7b1916ed9b762128cc641caf3e08e027c3d88481d653b6b15172e977dfb9b3f88465911aee162501cbf8501ce2b66ee151bbfdc23225f638f18750c239d62471663e5ee2a5856":hex:"47dffc6b3b80ffef4b943bde87b9cf3c":hex:"ec4de476cd337f564a3facb544d0ff31cd89af4c3d9a28543e45156189f8eff8f804494dda83a1fb2c30ce858884a01ec63db59268452b1eea0f0d48280bb7340eaacc84509469dd94d303774d053d7ab4fb5f6c26581efeb19165f8cb09d58ec314d09ab8356731e87fd081f661e7b2d1a7c3aa4af5448a12b742e7b210b0b0":int:120:hex:"6cf68a374bea08a977ec8a04b92e8b":char*:"":hex:"5c2f7c408167be3d266ff634e1993fe291aef7efae245fa0b6b5bde886a810c866ae6a078286684d1b66116e636e285f03646e09f3c4ed7b184e7c171ba84f3bfd9500c6f35964a404892b4cdcdd3f697fc5b01934a86019810987a9fea7efca016049873f1072f62df3c17f57ea1d88ccd8757f7e3c5d96e8a18d5366a39ea9":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,120) #2 [#1]
depends_on:0
2:exp:0:hex:"c9fbbff8f25f951ba874dfc5ff38584e":hex:"ca401071396da00376add467490abc6e6a7d8a85852026979f7013a09cf689113c8d833560cd6c5b8fdaa8fdd818e773ac13954839a0a2c91efeaf4e0e14de43308419a8b86fa2ae600a88a6bd39dfaabc16a3c7c1b77a5c2aab7f7caceb2f8595324125efbb7c96ba16c47d0bd10568b24bf445d72d683268466e68e46df500":hex:"1c1fc752673be6d4ff4cc749fc11e0fe":hex:"abfde0b60acfe265b62ed68ebebc1f5f725f155c4b8a8aeec8d704701c51ff7817060c1b0ce6b80d6efc9836c9ea2bc022ec67db4cd34e945e3a1b153fd2e0f7ac84bb4b07e04cbb529ee24014b16067f9f082b940c9d5e54024d3e5e910310457478560721587da7b5343d89eec5a8fce389c01185db15e7faa9a3fa32e8ab9":int:120:hex:"ff0b2c384e03b50e7e829c7a9f95aa":char*:"":hex:"239637fac6e180e71b2c9fa63ce8805f453d81499623ec2deba9b033350250662897867bffaf0c314244baf9e1fe3e1bb7c626d616bfbf3e0ac09a32aaf718b432337c9dc57c2d6fc4a0a09bdc05b9184d1b90c7193b7869f91e2caa8b3b35c10c6621ffae4c609bdf4e4e3f06e930541c381451ef58f4f30a559d2b79b0e6b6":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,112) #0 [#1]
depends_on:0
2:exp:0:hex:"3a314ec178da96311e42334a616fb38b":hex:"518b3f5384ab54f80497d55be7a5d6902bc7718386212c2ec7537db331514b3838f104bf9054e03039a4cfb73f41e5d0a9648e569ed738cea8d33917430dff6afa8f07a75e324b9262fa196a4439dcd66b0535ee5bea0d292600227c2a79ed03be0671740e5cb7b306d855612bd3abcbf02cf7e7cecbb6cdbb33d57b4e3234a2":hex:"d7ea27c819e3eb2666611bb1c7fc068d":hex:"db8dcc31a5681f13d56abd51bd2dcb0d2b171628186e215a68bf16167b4acd00c3441973c3fa62fa2698ee5c6749fc20e542364d63c40756d8bcff780269e5201bafdced3cdc97931d8203873431882c84522c151b775285d0a3c5d7667254c74724ff0ea9d417aa6c62835865dfded34edd331c0c235a089427672c5a9211c9":int:112:hex:"1e774647b1ca406e0ed7141a8e1e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,112) #1 [#1]
depends_on:0
2:exp:0:hex:"e818372a63b7e2c23b524e29ba752bdb":hex:"c1bf1b702a95ceaa6b48a1cdd888ae51f58a9fc3232bd6c784529a83301c6d0cdda6e605ad9a2563f54a8d59f624ae7c589e48b85041a010dcb6fb8739d43e79a456fc0e8574af086df78680460c3cdc4e00dc3b9d4e76b0de26e9aec546705249fa7e7466c01001c2667eaf2813be1f0f116916f34843a06b201d653aa1b27e":hex:"36e617e787cb25e154f73af1da68cb06":hex:"71801d69796c2ce36b043c157aec9fd2e06fd1ec596126d10c26b6d44e3dc36c4fa30a030d65c382b6ddfd958e71fe9c16732e595137a3d6764c15480fc3358e9a113ba492b31274663f5842df5d1cc6bad70e83b34675a4411e2e70755aede0ff5035601be130562e27a20283d6f144ff1bdb5276dec05fad80d51b28d50688":int:112:hex:"3744262bc76f283964c1c15dc069":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,112) #2 [#1]
depends_on:0
2:exp:0:hex:"9a04f16882ff45816739d1b6697ce8b7":hex:"6a4f3dbb3371f64258fd1f831349e745a4e19a33aad794b1de3788729618beed619586092120e9e5dc3ac6e0d52f991f7be61afbfaa4399ac716ad79a2734827254b1627791dc92a128a6f43426b8085dee94242e83176a3d762658f18ecc1e37e3e1531648c9caed212ea2cf3b3843cb92cb07730f30fe2dca3925470fadd06":hex:"66f504d9a9128ad7fb7f1430d37c4784":hex:"f641c53c83c4fb1ff8044bfa97cdf63fe75d8159d65b3e5ad585b89c083a53cf4a2f7a58eaeaf45fa71f2c07bc5725a6b03307d7f32884a133a4c803700bf1e12564b98b71f63b434ddf13ad2c467dda25ffa6effcafa72452b20c34cfae71e47096f8745b487e9f1945f5bec83f7ec2709a13b504d92315b1b727a78902be84":int:112:hex:"fbb37084396394fecd9581741f3c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,104) #0 [#1]
depends_on:0
2:exp:0:hex:"38cf029a4b20607030586cd2d82146e6":hex:"f4c9f4476561c9ebdac71b282ae6e2f9f03547da98e66d4d857720db2fcc9ed1f363858db34c9dcaca0109d7c81db24150493115f2bb6985efa8686e3d2ab719d33b230aa4c5c70696bf42f225fb3c6704711c054a882d89b320884a78cb59cd2100496edf4010487597fb9135d8ca79693a43843e9626fd6c64a8722b3a27dc":hex:"6330084319e2bf32cd5240f4826944bc":hex:"80746cfb0127c592f8164d751b0e14a5b379056a884cece7ee4e9b80538d7ff6be56a3b19c135786722aaf315123b47672b0251e87ea45f0fd3601cf93f9efa6cbd9ad537f54d57f1e187f821faac24096ecec19d137c9f4cf145c278af4cd8de01c7758784fda06f1cc62d92ae1977786f3d0645714ab4ab6f48c8794b12f73":int:104:hex:"7b021de5cda915ba58f90ceef4":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,104) #1 [#1]
depends_on:0
2:exp:0:hex:"cf4d81fc5997c744a572bed71f4ae609":hex:"f3d65d70326e641fbe7fd945fe9cf66c74f17d0d1020ae8ac488f39b7285c99d8632bc2201960f3d77daccfecc04428abe0853aa8d82b90a93127c72b2d2af53f7f1bd0afb99d50f0b3b24e934ec98eddb278b2c65866442cebf10208c7ce1b7ecf764858480b2a269b106fa6d2428d5ad17612e53e62ccc7ad1184663aeb9a7":hex:"bc4e20c56931c967ce8e3b8f5f1c392f":hex:"b6b8294abf7da5703f864721f7904d3821f5568bf4b269e44edef4f1c95ddc172d83a06c0ad9f7f1fd2e292c17a876392bc5bb705d370b2f16ff721bef7648f423346fd3a4d762676e6fcf2d690553a47224af29afed0f452d263be90eb8150a13d720f1db6f1abc1c2ec18cfbf93b8ed3c5aa7cfc1dcb514d69f90409687a4d":int:104:hex:"0a86142a0af81c8df64ba689f4":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,104) #2 [#1]
depends_on:0
2:exp:0:hex:"d88ad40b42ead744f1b7a36685658be1":hex:"e99d2566fe6bcb2a04d167605db7c0f1e5567ff2d8d3292c15bbccc5d1e872bcb15a30b3bb8b1eb45e02fba15946e6bca310583a6740845a0f74f4ebfd5c59ced46875823e369e0447cc3e5d03dae530adf3c9846362c94e7f9d17207bf92d4d59981d8fd904eb8b96a0a23eb0f8d7e7a87e8e8892a2451524da6841ce575c27":hex:"52c3158f5bd65a0a7ce1c5b57b9b295e":hex:"dde2663335c40e5550ae192b843fa9fb4ef357b5c09d9f39dafda3296a4d14031817ee4dc1a201d677597d81e37050cd3dc86c25adbd551e947a080b6c47ec7be8a927ef7920bd1bb81f2c59801a2b9d745d33344cbe4838bcf2eb8dce53ab82c75c9bbab8e406597f6908aaa81fbbdef25aa69116c8f7a8cdc9958435aa32ac":int:104:hex:"7643b3534eb5cb38331ed2e572":char*:"":hex:"6f87f6be2f4e7421aa26fe321045d1e23066a02158634bef35890581c92367d0bc232940de30974c70a66c60137a9f3924d12db1e5bc1b0e7131ea3620a25eb805b7d670263b82c8bbfcd6839305025390fc17d42d82daebe1b24f73ff9aa4617e3866785dded88f8b55ef89b2798ea2641a592a46428d9020f9bf853c194576":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,96) #0 [#1]
depends_on:0
2:exp:0:hex:"c3ce86a212a30e724b4c624057db4e79":hex:"3582ef7a9565c9a8e4496750ee5ca3e3a80df6238f7b7608e3394ec56d1360777921da039ede34abcedd01081babd496ba4de74a7de501181d6bb2022a6cc7f79d89a4c6a97676fb0f2b42f70e2d0bc1eaac364c3646df4f611c1d6b09737451b81b5a4da73c05fb58391c74e44498b80b26f1c29562d23c39b5d3f086b280cb":hex:"9e03f0dd4cb2b3d830a6925e4400ed89":hex:"92c48a39d93ea3308f55f6650d33fdf17a902076d582a94a82ac99496de9f62312292b844bbca5a683ef0f0710bbc1c7f89cbcca8f9c0299f154590d32059bd99fca5d78c450ede0d11d55075947caf2151218ce7a06c1e81985a7781a3444054170b457fd7ba816026310112abb47c8eddfd3ab7f679a0f60efc6c6dd3b759e":int:96:hex:"3230fe94b6ccd63e605f87d0":char*:"":hex:"052347a4273cddba65b2a0b961477f07edee440a9117ab204359d2dd45ad2a6dad3b60ead891e7da6d79f3017ac90f95725a0089f04d25ce537bf53b7ea8e1ea58692d34c221db141e2a9fd7211adcee03ef8b5bf3c5d36311d20bb3d81f70f7e7272d0e2b6d12293b1a2c31b70f140a8f08d98c6231a3c429c3d0a10b2e1c1c":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,96) #1 [#1]
depends_on:0
2:exp:0:hex:"a0155360b84420b5bf4fb410ea02f31e":hex:"ecdb51522fc440f7471ea6a31f7c1ef1ec2153e5bcf6303297dbf8ddb3830b45ed9866157375ce4bdeb5e32fcbc6607984fccd7e6552628736608ab13072856d432ceccd3e90d1bb52ca9ada9cee90eb89ac10e887a1978fd0fb3d7bb20caaf35539e150be8044b725b8427c4c4a910f79980865d36344a8784bcc3d58460acb":hex:"46f0386be7363887e7e357376305eab5":hex:"611bc290f91798ad84f0a5ecb5a7cb8fa35e9ab6a5a51c9869a68a076e96f92c9c117595f92cbac5d33343fa2accd2541473907cbc54792c5e215ae857424c921b04ca4b81376bbedbfcc0e565c118f2aced08f247698eed5e2d202c48245161cabeac9fa195219f9799fa253e339561e13012167f1d02b4012b7791b7c863ba":int:96:hex:"ac5addcc10cae6c1345520f1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,96) #2 [#1]
depends_on:0
2:exp:0:hex:"694f621f594d96b16c32254ff06f3f9c":hex:"e61476b8b7f101ca6005f25af2b9bee795d62720bbbf59357057ca7cd473e00f0d465255fce8d6164657603323549fb4e3d33fa51054b1a70cc7e492916dea85453e9107fe781bfeb4a622c5b2306a8dddef99386dc50745003aa7220cd7f32fb0a060fa7682576769a48f9169c7d11fe0a8a61b95f5d6dfcf216f7d0c652a84":hex:"542db4e107485a3cd24c7ad337a4f1b5":hex:"27b7bfa5eb34ba376e515e58ab8b6556c396820d0074a1fe3b984945dcf5251ca450456ccb4bb66ec739b03fdc5f72d24553e843255adc012d1f1c95aa3cdac5d12926465354217203052cbd4869a8b5be2e01d0fe66b5a6a8da0a2ce351557e2991ce77baa812b9c67b8e1c5a1fc348710e1a73a0fd49acfd538b7db6bef8b3":int:96:hex:"0bdef4d771a1740381e7db97":char*:"":hex:"8b27a338fd2153d304f04655e09bd9bdf4468890ecce1e3b51de2c9a25a8d9336a9acd753ce270b1fe8d50196feac68145e0fd59c9cb3aa7c1e8af03494bc4279c6e287c849f3c775ada584ae173100946ae6921ef7c96bbc6f216093548702cf1867bb1bf1f4c9e90a34230a2b2aeb584622dd615023a43a406e64428bd9170":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,64) #0 [#1]
depends_on:0
2:exp:0:hex:"78826a5215a1d5e1b39cad5a06861f8f":hex:"0fe2c798d7015d3e2f8725648d95729c45d357dc0c89fc63b9df5a68d3e65419540f663e9190793a29c58c495d5c6a731782acf119e2df8a96fb180ad772c301d098dbc5e3560ac45b6631a01cef7eed6db51f223775d601d2e11b9baa55e2f0651344777e5a03f6738a2013626a891b5f134f07b16598b8cbe3aeaefa1c2a26":hex:"feb9d740fd1e221e328b5ef5ed19eff5":hex:"ca9411b368d8295210d7a04da05a351d287f2f67d978ef1bb936de9f8065473f6fa11495da2eab13a1002231c86411d5409bbc718e2042ee99e013b1df1ef786e9fc1f2d43293c854128184efb9317c4ef82a002eac8b28fcd91d8a714a3aa25fc3c0ae4af9f4bcf5ad19a30cd8ec4b1785df70aa92074da419abe433dd4c435":int:64:hex:"a724bbb295a02883":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,64) #1 [#1]
depends_on:0
2:exp:0:hex:"d450f5253251121606e56687952bf2f1":hex:"479b4f421bd8ac7f615c4a507da187cb5d4b1f1e2c6113d1f9678c1ba92dc5e17c5b525d7f3208733223eb82af0820b8476e9b08ca714ce044417b24d2238720cb8ffdc69db558cbaff52e3651b400e16c9d5ac8ed8949a19c35516f80394a04bd1cfdced7b204f779d792086e00b2ebca2f55a1140e85f5ee9ac7cfc5a31747":hex:"fe7ff90b020fc77d7fcd90bc583850ac":hex:"a3bca9ff25a60006eb18f993dcdc99681e414e27605264dfd25652195d7fe1489550afd07fc7346b88d93b59eb6642913646e93bf50ee1db5dd30106cf181124d8ad01c72ed99038c9798620abdf5c78c419b08c97f982b34d9e9105d9aa4538afcd37f62e2412f14f7a248fcd60abaf2b66cd4554767f99030f1a495d56a5ae":int:64:hex:"6446398aff73ed23":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,64) #2 [#1]
depends_on:0
2:exp:0:hex:"90a59f6b0abf932311f0b65623c17740":hex:"be5a948a771a8df12adaf74d702f064a75f6483c03203365fbde7d184844fe6dee0b84cf344be05b1d163817ba1516fcb87b9167ed81f884ada73b0058e2b38cba515bbbe462f4c21f8de1d41bca2cf4340aa659f9f07886c2bb620d9c3295318c07fa3c17fe8242409359c08bcb337e5cf268880839b6a20f4ee4b3f04e7024":hex:"20778bea82a6717038e7064f48a31981":hex:"4022d04f1454a72d2efe57533bd32757595220b20f3a37d166cec0412fb1eb2588f939ecd906c805f4827338669888e9f730905001eb1b136b95e306edf70d9ba1e5cd0aa13a25a1f28ab55cff36f9cd7036c735e3b285d26002ad2ed1074b566e252ea3ec8a9ce10882375dc3f1d9676e301dcb179eaae991120b796cc35648":int:64:hex:"dc77c1d7e0902d48":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,32) #0 [#1]
depends_on:0
2:exp:0:hex:"6be4ef629f0b38194c74f7b66418922d":hex:"b67ea20a320f4ec0e4185c62a4ad79a3c97a8189a5e4d1deff9d3edff0f9a9323532853c1a2a2c1e62e4d1afebfcdf1d8461921ea601750380e63b912d8b7389198f976851d88a19f1aa32c97143668ad00838d98da1c4f2be0e6e2dc964d170d7f7ad2e2997982e5ca110e744b6e10c24ca18eadff6b129b1f290c8a7e0a593":hex:"fb77a4b9b246271abfc656433f87628c":hex:"e5d5227725a19a3050fbf2a97a6e854bc1218b94a4a3403b721ace3447daff68fff5553a26edd41219e68fb61fb9e964d0a3c29796251ae4eb942187cdc55d13a09dfb487e93d9e2072d7271456a77c6ccb81154443eea176314d6e3a08619b52cd880f1c28ae5214ac0090a3855dbd74f87389fe8afebd464330fb683dff81a":int:32:hex:"3d8fc6fb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,32) #1 [#1]
depends_on:0
2:exp:0:hex:"c50e37244931e8debc12b3d561c83ba2":hex:"b9abf0796f2d2f774735546cf809030f65ed0c7f6bd469ef2fe0ef32aa0225b57fbce07c36017bbc1806a81ff1a429278160a07643f864485b4e0e35d57553dc1a131e32aa10f1f91d663b10f0a418f472ed7b4bca54fd7ffdbb22c4d7764d94a7ffd04730614459431eb64335b9b65363de292c04275d40a7b968c0f5c486e9":hex:"6c0b1fd7ab424a6883c36457d1b5521f":hex:"516dc25f6452ae169ce293c5cee440de47353ca5ba770dca0f04175950e87a2d4c3f84fbc6eeacaac436853492929680066f959e74de4b736ab924d8367b90aaa6e9492561ad4b5aa78b6737d562e960edc3b983e2e01a186e9f22896f48d8dfcfb6a42cfe2c6006c687a27772820a1e8875bdf09e8104248ce4db883376bc04":int:32:hex:"7d4393f0":char*:"":hex:"962509e494f10269b70ebad02b0cd799d1d41191a734863ef502aff3d3ba48dc2acf9da9a3fc3f40be4d210dc5e128bc00499aec57aa0a4669863165428687b88d46fad41e36af8ea6605586eaa5c0736d0d53b9d523e0cb5a0b285048e060a73cbf4b587d2cd787debdb2b4c8cda731a61a15b19fe8b561fbdd3a7373853ae1":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,32) #2 [#1]
depends_on:0
2:exp:0:hex:"8531ddb03977383405baf2ee9ca7d64b":hex:"d90c9e26509bdba9b1dea8d2b94f2b1881d22c2bd756ad23cd61944710a1c1f2807170ed47a6870ae654e44757fcb3822ef28b37946cafc07284f8a0c22ae3552954f0d87b8d8c825bd546935b494cacb4262d9e2a88f254f200ad31367d8b3715afbabea5f34214ffedb14d7c84806022aba2dc8f88a314ffbb24017d1a9b9f":hex:"baf623867d6a25fd85d1f08e599c0566":hex:"18f92cdd37dcd7f99b06838f3f68748aba367baabaebd0da9ee787d70e752fa07dea553a43b643b8d8f460175c0746675205e20a7a98acfcac864d7c4cf5ab4c41c031738c76882acda003c5af47b1c4df8894a827a317935d970d4afaee17715c9cfd1883e8c345f19d1f89e229b8edba6b4f53b86d8da1c0f159afb83b6b33":int:32:hex:"2fc9de46":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,128) #0 [#2]
depends_on:0
2:exp:0:hex:"862dd5b362cfa556ca37e73cff7f4a0e":hex:"":hex:"81530a243655a60d22d9ab40d2520447":hex:"":int:128:hex:"3b9b2af54e610ed0b3dda96961dd8783":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,128) #1 [#2]
depends_on:0
2:exp:0:hex:"3452b7bc100c334292e08343f139b9d0":hex:"":hex:"8f92739a30fe4ba24079f5d42753d6ac":hex:"":int:128:hex:"0eeca69f8b95e1a902cc3ab1aaa8e2af":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,128) #2 [#2]
depends_on:0
2:exp:0:hex:"31a0cbaf21b943f8badc939e94eac7eb":hex:"":hex:"d5bb2c4eaec47088230972ae34fcda9c":hex:"":int:128:hex:"580e728512c8e44fbb3fe2c498e05323":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,120) #0 [#2]
depends_on:0
2:exp:0:hex:"9e8fca537746e7cbff97f1dcd40a3392":hex:"":hex:"43e9f2bf186b2af8cc022e7c7412d641":hex:"":int:120:hex:"4465a3f9d9751789bcef5c7c58cbc5":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,120) #1 [#2]
depends_on:0
2:exp:0:hex:"35b5854ca83792ad691dbda1a66790fb":hex:"":hex:"cff61cf9b32ea30cf7e3692aa6e74bed":hex:"":int:120:hex:"726793199df533dd9055b0ac7c939d":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,120) #2 [#2]
depends_on:0
2:exp:0:hex:"07259267c1c6a015437a5d8cfa92f9e6":hex:"":hex:"18b9cf2ad7ace6ec1c8366b72878cf20":hex:"":int:120:hex:"4340f6263f0ba2d82c2eb79cb0cc7e":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,112) #0 [#2]
depends_on:0
2:exp:0:hex:"fa1df8955aa3ef191900b06e7c1b7d46":hex:"":hex:"6928c138c98a4350c318fbdccd3f44ba":hex:"":int:112:hex:"7c89d9e77515d271b6ed54c9c4e3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,112) #1 [#2]
depends_on:0
2:exp:0:hex:"c04200ce41ce77d772babb206315ec7d":hex:"":hex:"a885d58f0f38f9ff26d906fa1bfb12f4":hex:"":int:112:hex:"9ee0d025421f2bf18caf563953fb":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,112) #2 [#2]
depends_on:0
2:exp:0:hex:"650df049461be341c3099bd1613dcead":hex:"":hex:"8a4ff6327b49d297248ce2d5bd38afa8":hex:"":int:112:hex:"13f067ef0d7b448d56e70d282fed":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,104) #0 [#2]
depends_on:0
2:exp:0:hex:"ee61b5bf5060fcc637dc833926898508":hex:"":hex:"b2dcf21f9ffa4a883044d29f087f9b85":hex:"":int:104:hex:"9ab1d66666d4dea3cbb5982238":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,104) #1 [#2]
depends_on:0
2:exp:0:hex:"01cc56ca7e64db7fbef66236a5c49493":hex:"":hex:"8ea5b63004189792cc040ef18b37e550":hex:"":int:104:hex:"d685aeb54aa129a21bed17766e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,104) #2 [#2]
depends_on:0
2:exp:0:hex:"134dd72ac8e28ab46720c2f42284a303":hex:"":hex:"c6368e4c0ba0ec90fa7488af9997a4c7":hex:"":int:104:hex:"4ad9cdf19ff7d7fd7e273efced":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,96) #0 [#2]
depends_on:0
2:exp:0:hex:"180c04b2bde6901edcda66085f73ecd9":hex:"":hex:"9193b206beade4cb036f01a9db187cb8":hex:"":int:96:hex:"530f5e9ed0879ccef3a7b360":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,96) #1 [#2]
depends_on:0
2:exp:0:hex:"aaac85742a55ffa07e98106d6d6b1004":hex:"":hex:"630cd8ab849253c4da95ac80324ecc28":hex:"":int:96:hex:"37911820c810e3700c3a9321":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,96) #2 [#2]
depends_on:0
2:exp:0:hex:"ab663c4f8f2fdc7d5eabf6ef26169b4e":hex:"":hex:"86e6100669929e329a1d258cd3552dc9":hex:"":int:96:hex:"958d6141f7fb2b2dc7d851a6":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,64) #0 [#2]
depends_on:0
2:exp:0:hex:"0dd756d49fd25380c4026ea03cafc2da":hex:"":hex:"6a6f7e39b0d730ea1670e13d16c12c28":hex:"":int:64:hex:"872ef05a28da5ea1":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,64) #1 [#2]
depends_on:0
2:exp:0:hex:"bd8a834b288bdc7578b6c6ab36f5d068":hex:"":hex:"aa77de0af5fa4dd1ed2ada5cb94813a0":hex:"":int:64:hex:"c5c094e83755f2b6":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,64) #2 [#2]
depends_on:0
2:exp:0:hex:"020d280dbd06939bbb5e6edc6f6d39c6":hex:"":hex:"09aea6f0e57598452719d6f63b6fe5a0":hex:"":int:64:hex:"05d6c56ba601e85b":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,32) #0 [#2]
depends_on:0
2:exp:0:hex:"e47f41a27a2722df293c1431badc0f90":hex:"":hex:"227c036fca03171a890806b9fa0c250d":hex:"":int:32:hex:"86c22189":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,32) #1 [#2]
depends_on:0
2:exp:0:hex:"9d3e112114b94e26e93d3855d4be26bd":hex:"":hex:"99b98525160c4bb2029da5553ff82b59":hex:"":int:32:hex:"33bee715":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,0,32) #2 [#2]
depends_on:0
2:exp:0:hex:"5b4b7688588125349fbb66004a30d5d4":hex:"":hex:"b4ae363edb529d8b927c051cf21a2d9d":hex:"":int:32:hex:"6a920617":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,128) #0 [#2]
depends_on:0
2:exp:0:hex:"c4b6c5b8e21c32f36b0ae4ef3b75d5cd":hex:"":hex:"3d1036bf0000e6f1b77a799f2ef32dec":hex:"1cf2b6cbe86a87b4b5bb3cc50024aeb27c48143658d47b41f2f20b87ed67bd6fc3b85a3a803f66d3576608f5d6ce6cad11e02fe12de5390722dccb8242e1dd140051bef51aa9716c860d45d45bca6effbb1a4797e6e7406a04db5d823766c0f011ebc28e9a8cd4446ec8a75ea8bdc1b2fdbb5cc364fa9877886e30404593df34":int:128:hex:"a49725014c214ef7cc2d28b9b2b53da7":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,128) #1 [#2]
depends_on:0
2:exp:0:hex:"63c3f81500746eaf383fe3975d84f849":hex:"":hex:"0799d4152fd73c1604b4610cf7171fe1":hex:"cb8248e5f904cc9ccccf6f273fe621eee1b4d7ed98480f9e806a48b84e2d6a733772ecf8fb7fe91805715cddab2b462b89f6e6c7cf873f65031f13c357d5f57b00b7c391c39e78ad1ed94be236ca0ae316bce11bc33c5d701fdfc58abbe918b9c42f7b3d6e89d46f9784b388a6e6daf47730b9fa665d755a17e89932fa669c44":int:128:hex:"c53d01e53ee4a6ea106ea4a66538265e":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,128) #2 [#2]
depends_on:0
2:exp:0:hex:"b0c88b191ce6e8e4a3941f7960b7eae5":hex:"":hex:"e2a899961c332c815685c553351fa519":hex:"308bf10570af48d632911f3641dea60d78046211c01a63bb8e4e5cbddfff8841d2f2b11e18ccb2170805ef4cacf7804d64e0feef40731a1704907f33b77788c18ccf35b224ec3046a67664ac9a3481d2385b6ddeec6da4f32423f94ea9663a5c51cc388cef33744a8159b4fb654dfdb5092718bf926c824be31197f07f276b5f":int:128:hex:"92604d37407aff33f8b677326cbb94fc":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,120) #0 [#2]
depends_on:0
2:exp:0:hex:"c818dfa0885a09f65ef78712f5ce6609":hex:"":hex:"ca279284723530fdd68ae880e0ce775c":hex:"2a562abdbb483ca5f355f9cc1c5e607bdd624a078a76b717ce0f8f35d0d4c54b629f372f15d20c848d01420c6af5a7040d42063704a17b46259dcc53723caf2d4bf556143ff9117c752fa4f22c9c155c99b7bf5949d089cdafd562165b9cbf53ff51cec21f49128c8a599718bbcdb4a5d705d20509c44c8945e2a133164b9942":int:120:hex:"20e9a3a98d71d460743e1efaab13c6":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,120) #1 [#2]
depends_on:0
2:exp:0:hex:"2354c6b6afaa883e7ce91faca4981f8b":hex:"":hex:"604f2730c756c8c39a0527093bc2feb5":hex:"959b4b0b9ce2e9120b327d2d090117553999ee10bdd384a546fc6de0957ef4b447daf07b3d07ef7dbc811f36b0fc09a175d26e4d1263cb5e21eda5ecab85d763807bb20b3cb6ac3f31d548dff00aae058d434ebcf6f7e3a37f11324134f453dd0ea7f51094863486426ff1706129a5a93c53d8c5ccb56cafa5881981fe233cb0":int:120:hex:"3588c9aa769897dfa328549fbbd10a":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,120) #2 [#2]
depends_on:0
2:exp:0:hex:"b0af48e6aebbb6ff5b7c92bd140b085f":hex:"":hex:"d210d6502a5221ac1274a9c7f5a81725":hex:"d725311ca10eb4b4aa24e6dd19c5e72dc34fc1ff53feb25d924a9b7d8d72205790ca4b1275bd93ad60c27a5587a45659bca07c111e9748fb683a03465153ffd735b7d134b479674ab8596f0596496fe2090f623fd1e4dd730c5283d8b172db8a25df42d9b34f388ed32676a56b8ba03347e47379702654508ccd0a21ff03516e":int:120:hex:"e6222f068a1e18f09ba6c771eabd86":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,112) #0 [#2]
depends_on:0
2:exp:0:hex:"a05fe482fe164b2eca7f6c3e377b39d8":hex:"":hex:"145327bcc10335fccb93afbf4b17e6e7":hex:"ea6f2e93b5e1bf127d40440b8d6397405246b1b48eebe16964f18928f6b4b8ee2c36322d7126905c1a5b816996e340404b586edc2d77afac11a6c1266511f9eff1a320b035442d4078f8e42ca63cf26d12a971a7adf4645d1bd9a8e4d0a20722f7c2d529beaecc4033f7738075e1cdc6d8a929da5582540678935b82e7b7ba68":int:112:hex:"3900bde9fa9ae2cbeee54d04f224":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,112) #1 [#2]
depends_on:0
2:exp:0:hex:"dacbadf819eb16a63f6f091d13ed04d4":hex:"":hex:"b9ebce724b0dcb0989ac2d8e7ff8aaec":hex:"7dc6e2189d8a96f3507e352e05e8fd1b4bab988c2f1c706115887119f63b78084f015d85f6b460901a02880103e4d36e8f6527dfd74e4a3acd3f578c0cc726b528875f701ff8b66e5c11b4689c346a098e123bebfa253362cb86829be73c2b85a6881fa976aa730fabb76775027feec7fd920a6c8965a4a509ea812d7c413a95":int:112:hex:"8988fca83c8cfb1f8feefac46f04":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,112) #2 [#2]
depends_on:0
2:exp:0:hex:"969244c7444f3f3bf193b28f8e8e96dc":hex:"":hex:"49b2845a1a1c87fa66eb8f78c05ac029":hex:"1414a07e86d8b61d1eff43e1ff4ab42c1c95e159058b74c731e3007d21a5eb78bc17b7e920363a3974aeb8608813dc9a4655199b6703ed337450702d8ab16a89776831b2c7c811fec3acc23598a0aa01680a7bf42a4e258145beb08c9f0eacf2bb5f56d26bea3ad11e1a956a630b80f3d22bf35592b4704f7c464b08b06dd7f8":int:112:hex:"a291c7527385f037f62e60fd8a96":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,104) #0 [#2]
depends_on:0
2:exp:0:hex:"525abe490c8434802b69439c590a5290":hex:"":hex:"141f79f0501316e66451c41c7af0f0cd":hex:"be440db66d3f81be467605a7b2805ec1df5e71e1b1b04bd7a4d05e912f5aa1912ba08de72df18613b32b7edf78963c48c80c25178b3b19262b85bb829f5377e0b368b500d6d3b442f54172d4ca4500eb5b4d478b602e5dc11d090539455087ce1e5b9ea74355fc06e9b60cbf25a9804d3f8c623fff130abc48bc2d8d116b8366":int:104:hex:"038c7e95f790e6ca5ce73f9551":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,104) #1 [#2]
depends_on:0
2:exp:0:hex:"51644e025659de983f5c8156516b812e":hex:"":hex:"614837c743d0974e9cca497f13038c02":hex:"60c5d062ade2c5c2dec68b734dd3e58ec474a586d1c4797fdfa2337800510134cb27a10d501927632af3c1febc275010c0d2e5abee630cd2bc792963fa82a42286ab047b934a261927311b40f5f953bfd661427921147cac7613d95ee86e16326ef67c1ed097e8fb87a78753d785de34e03a182232786079cb6be00182e41c9e":int:104:hex:"77e3deba2c7f9386f85bc4a801":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,104) #2 [#2]
depends_on:0
2:exp:0:hex:"08566ca7310302dfb84d76ea0525ba20":hex:"":hex:"5f20ec9c35c08aa7f1c0e8a20fdbd2b3":hex:"5d84e32768b8d1e7e3c426b3118d48e35491bf1bb454b359c8429220216efd8826be94fe1919409a128ccd8125a594f1691c9421fc3dbbb3f757bf2355bb0d074ceec165eb70e26eb53fa2cb5d84dfae06babb557805ef7b8c61c1bc76137571bcc5e84bf5987dc49013831d78bd497ccc49cde7dca2cb75e7ab967da8c6ce81":int:104:hex:"873f037fc05252a44dc76f8155":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,96) #0 [#2]
depends_on:0
2:exp:0:hex:"dfb54db96383fa911bf5b4fa1218ef9a":hex:"":hex:"7e849e24983f63f1194b396bbd2d55e0":hex:"d3fb689c5818810dd104693f3306a10b27178444af26798a194f7c2ab31ff3a172904b951942b1a26c8ae5b5b1ee2d86dc78bb72a335fde350766d7d9aef6f549871dd46b04b2cc319fcdd47be437d431ad18cab82d51ca9fa57f4108a8de622a92f87d28c0349fab27757fd773413f559a8c00d30e258c1f6cd96f9759bd957":int:96:hex:"dada7fc7fed58db462854ef6":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,96) #1 [#2]
depends_on:0
2:exp:0:hex:"389cf888474e9403e5f4d0e22ffec439":hex:"":hex:"ef57794cf6fac9f9cea3e8499b53b1d6":hex:"7ea7f7f4763ad208eb6199285b6b2819756c4e3caf2d0ac6f5076ae6785fecdcc4b138a51860ff8b87aaac3a18c2df778a4818308d458dba28f5017513e1454f60be20dae68736ea6d48b1f9deadb517df63140acbd329fbfbc9b82f3ca1862c9e998f0faff1d3ae60b005bf66829f5cf0c5fa03efbdd92d39351e3954be0257":int:96:hex:"92726d90ad26130e65f2beb4":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,96) #2 [#2]
depends_on:0
2:exp:0:hex:"e55abb2ca36c822bf2a030ac703cb8b4":hex:"":hex:"d86f7177e8ec90f9e9edf10175d5012d":hex:"777a9d93091de56324c10712243f5541722e0b27e1f303fef6faa387a8666161ab354dbea6c43c82a24e8623bfec39aab13164add6be0dfd55d23204c0975b4ba6fbda51363befde482a9ccc1eb9f151e6ad59c77a1e24dd268389e4686f198a936dd603044a3fb653d63cff80597f5a2913c8a2ec1b7d9dce5728dd56c78c2c":int:96:hex:"65025250343ed8c09b3fceed":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,64) #0 [#2]
depends_on:0
2:exp:0:hex:"586114f3b1dc087e1b2739b28c592dfe":hex:"":hex:"ae5a38ddd455505284434a4bcfe81ef2":hex:"531ff8c285e532d961f49bd210a5523cd9b19a697a3a3fb26db940a496f253862405b1e825daeda7eb0445c98022b8342c8f8ea20301618483f8ab04b6ebccd7e7fc57878fb544a5bf78fa896f50ac30126ff8afca8a86388666b64c643d16812729bfd7e5c03ba52f7e6ea4c6a685404f7bcbd956964417fa0ea9a6d7290c41":int:64:hex:"467a815610faeb82":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,64) #1 [#2]
depends_on:0
2:exp:0:hex:"cbfe806bddb7f06b3826b097550c68f5":hex:"":hex:"04c1b6c9fd2ab76fc2adfe15d3421bbb":hex:"cfa86d02599652cb4ffff027b9c6ef2336dc9fe946f64fa5ce83f624e144563d4738381bc5371c3cb55cf41ceda07e62cb635ff37246bfa428785229c6e869d5df69d7949a8577889a29e3d05b788ddd43608d9c14e3f1b51ce2085b9a976fe843e3396a74922babe6797d5f01c37ead623b5b582505bcd29edf8a6ea36b0fc7":int:64:hex:"0697ac372a9acafd":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,64) #2 [#2]
depends_on:0
2:exp:0:hex:"96ce3a095a91effdd91d616f1f02ddcd":hex:"":hex:"579d6633ec6687afa24ef874899b58e0":hex:"3ff3c0038148ed391b6a10aad623a82fe9209c5ba74482f11506d597b5fc7af977235d8ee9e28cf2160346ddd0e33a5bd1fb67b87dad7167fdd4b2b4000d8460ef7b3e1b59b9d61d06cfbe7945379ed6b650de86f396a38cc70d47b8a349f067d00144c903c276b323be6a929a7d7dd8ae7d254d640cdc1176f98e01a1d8c82f":int:64:hex:"55a0f61032e048f3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,32) #0 [#2]
depends_on:0
2:exp:0:hex:"24ece168c2971cf2b404ea206dc9e29d":hex:"":hex:"e9db62a42491664a6c46cbb0b2bafc92":hex:"3579f6c0cb3d2a5d0c4548855c7c052d36b6a8dfc60f4ca1b4bbe28ed87306119e71982dd84c4205ceba918d675472753df1b5192d3693dbf6a061c6056e312135ffc5ff426895a7e30f7f675d2cb21de06eea5e3761b94deef7537b985d324864c9ff6ab6e230a1006720f98c958912b604a6d03e3979887c07be3ceaafc78f":int:32:hex:"d2b15a23":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,32) #1 [#2]
depends_on:0
2:exp:0:hex:"d3c3cf993f6740a019e61ce13c29955c":hex:"":hex:"af900ac348082ff32d2e0ab886079516":hex:"2ddd0e8c99661f0757f04aa79a1ffa24ad48fbe5da68b9e71f7a0cf1b4f2ca9b757695900b7549d48847ae49950dc9b270b1569d29dcbef412216737bd83509c17ae41c34ccda318939cb37a0a380762993a7568c0b07794e78746173dd5c0d921cd50de4b548c1589e142c3dadbad42161aaeda2310f3c6d5c722d9ac69e96d":int:32:hex:"f2d3a6ff":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,0,1024,32) #2 [#2]
depends_on:0
2:exp:0:hex:"5f1e5bd45ee8bb207ebbd730510ff218":hex:"":hex:"8846424a194f5de858556e6be5b65d7f":hex:"e968947fc0e49136e730b97f6b16e393d5e4fdf3e4803a23af79211ef59f29167c60ead72fd489da32d2ffa43b2bca2074f9d1b4f5396ca65004b0806cb7c6dfa751fb6afbee3e443f3c9b0e3df6722e0d1320441400c5ca508afb657c2b7f1669b0de21761dccab9a40fc513768bd1f552692626ce35078a2e0e12f5d930647":int:32:hex:"0d6c15da":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,128) #0 [#2]
depends_on:0
2:exp:0:hex:"3997050377cfbb802cc438d973661688":hex:"b02f0dd373e42c65e8e1db2dd76a432e0b2bf6e630c8aaf0d48af51b3709b175de9a19b3245ae75818274c771c06fae225c4f8b002236712336e805ab006449eb29cc5e29abd82b06c32d4c36ee99acb9a6d7d9eae6ec6ec263c002a22c4a898c74f6abd6d92112367ca7ffe82787c5b39e7012ba22825d3612af3d41e8008a8":hex:"c95c84c263bdfd5f1de66e7e616cf3fb":hex:"":int:128:hex:"b35b3cf6ed59ccb69dbc9b47a3f284ae":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,128) #1 [#2]
depends_on:0
2:exp:0:hex:"c58583f6479d9bc9f1bffddefee66e59":hex:"564a9f700cbc1f895e4f4fa6426f73b4956896a15e6127e7560d74e3fd0b980d2ee45b7a6a3884fa613d91d13921e3f90967d7132bdafcd146dd8ff7147ed1964c2bdb3e12f4133d3dbbc3bf030ff37b1d2147c493ce885068d9ba5bebae24903aaac004aa0ab73fe789e4150e75ddc2bde2700db02e6398d53e88ac652964ac":hex:"cee448b48d3506ff3ecc227a87987846":hex:"":int:128:hex:"361fc2896d7ee986ecef7cbe665bc60c":char*:"":hex:"9cce7db3fc087d8cb384f6b1a81f03b3fafa2e3281e9f0fcf08a8283929f32439bb0d302516f0ab65b79181fc223a42345bad6e46ff8bcb55add90207f74481227f71a6230a3e13739ef2d015f5003638234b01e58537b7cfab5a8edac19721f41d46948987d1bb1b1d9485a672647bb3b5cb246a1d753a0d107bff036ac7d95":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,128) #2 [#2]
depends_on:0
2:exp:0:hex:"0bc2bde877e881aea512068105694968":hex:"1a6369a45e8ef2846c42d54f92d0d140a94f9633432782dcbf094f1444a1d006acd07ef6076cd0faee226f9ff14adc1fb23e3c63ed818c9a743efbe16624981663e5a64f03f411dcd326e0c259bcadca3b3dd7660ed985c1b77f13a3b232a5934f8b54e46f8368c6e6eb75f933196fa973e7413e4b1442b9dee5e265b44255ed":hex:"05f0c34ab2e8e8026b0a23719344b71f":hex:"":int:128:hex:"46bab9fc2dbe87b8f6ca0ed4d73e5368":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,120) #0 [#2]
depends_on:0
2:exp:0:hex:"e14f45ba5d1eb52e0412240da5d7b5f9":hex:"9a85fda19ce923f093a0c25b0c52f5d9534828af7c7687d22307004ae2d10c4592242c0f2704070307ab55b137780d1e2013a19396ab43ff6a295b63fdcf323456d149758f9a2bb37f1418d62ea6368b24d5067b9c63d2968e06d6586c7e3275faffa005f7c7bfef51303e4c2b2ed4564acd17d50efac9f5e3e7f16ce589c39b":hex:"d7f8ef12f66f8b7c60aea02ef6ff688f":hex:"":int:120:hex:"beede05e4928c808bc660f3de95634":char*:"":hex:"4ad5b9ace0c0c7c07df2900faf37a902899471e7aa4a0a1ad5387f8f56d73f78f619be79a4e253f95b15d52895a05bae9ecffa916d35efacd8baf1c704d2aa4a38c234efc4dcfb191ec0fa0b522328fa5b5dff55e8c443fee660ebe3d8ad85de157a889aefc823720030a4cd6ba94a6309dd61806f0abb27772432018bc61701":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,120) #1 [#2]
depends_on:0
2:exp:0:hex:"9a64579f3601b0022d357b601cd876ab":hex:"88be1f4bc8c81b8a9d7abc073cb2751e209ab6b912c15dc094002f95a57a660b9f08b1b34f5947223205b579e704d70a9ecb54520ce3491e52965be643f729516f5cb018beeedc68a7d66c0d40a3f392ec7729c566ce1e9f964c4c0bd61b291ccb96e3d1fac18a401a302f3775697c71edb8ff5a8275a815eba9dd3b912e3759":hex:"515efc6d036f95db7df56b1bbec0aff2":hex:"":int:120:hex:"13ea92ba35fced366d1e47c97ca5c9":char*:"":hex:"7fc8565760c168d640f24896c69758355b17310dbc359f38b73fc7b57fe3f4b6ecad3f298be931c96a639df3c5744f7e932b32d222f5534efb8eb5d5b98d218dce3efef5c8c7ce65738bf63412d0a8ed209071218a6fa2f7be79b38d0b2f5b571ec73f1a91721bd409b1722b313683e97d53df19ded95fd471124fa5f294a4bb":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,120) #2 [#2]
depends_on:0
2:exp:0:hex:"1bda4acfd10ab635f357935bb0ab7020":hex:"c9ac8d4ef7d83848fdc03664957c28b9b76710797d5db1c21e713e85eb0898892223e52be1644fc7362c95026ebb9c9ca74d7d3739eff10cab1eda00c36628dae0b98d119a14635800e37cd340faa6fbba9c3d41d52722cc3969612b1a8c5ca9a68773f5ee654506cb88ea65fb1eddf5ab6312d0170dc03324e483342448b854":hex:"48b77c587616ffaa449533a91230b449":hex:"":int:120:hex:"8325e4394c91719691145e68e56439":char*:"":hex:"1287ad3719508a9be70c19e3b134a2eaa4415d736c55922e9abcfd7f621ea07ffb9b78d8a9668c74bbd548b5e6519ea12609d2d6197c8bd3da9c13c46628f218e7ff81884ff7eb34664ab00f86e09cd623bec248d8898ef054fce8f718a0e0978e8b5d037709c524114ec37809ac3fd1604e223e08f594e7aa12097f7dc1850b":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,112) #0 [#2]
depends_on:0
2:exp:0:hex:"d21cf24bc5bd176b4b0fd4c8477bb70d":hex:"2e7108fd25c88b799263791940594ec80b26ccd53455c837b2e6cf4e27fcf9707af3f0fe311355e1b03ac3b5ee0af09fb6fb9f0311f8545d40a658119e6a87ba8ba72cc5fdb1386bc455c8fec51a7c0fec957bed4d6441180741197962d51b17c393b57553e53602f2a343a0871ea2dc4b1506663b2768ce271b89c4ed99eec6":hex:"208cb9dced20b18edddb91596e902124":hex:"":int:112:hex:"7edfb9daf8ca2babcc02537463e9":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,112) #1 [#2]
depends_on:0
2:exp:0:hex:"3d02e2b02170986944487cba8448f998":hex:"bc1d7553f4a28754cf59ed6f7a901901f04ce62a449db2b45ad60329d0341bb9ba421c783c28a9200b41da8ab6328d826293134a7d0c9a5775dd2735e7767efda4ad183566e0847d6d978abd1a8ab13b16b8323acef05ced3b571631e1e24ad44d65e6ffa64e03c9970e94bacb9f721aba06cda6a08806a3be63dddd8029301d":hex:"6336077bb83eff1c9ea715de99b372cd":hex:"":int:112:hex:"0466bb2957281f64b59eafed3509":char*:"":hex:"5f395958f2f7acafb1bca6d3a6ec48b717f2ceeac1b77e1b0edc09a09e4a299d2ec722cc7daf34c8f4121a93c80b2adb20a2fc95afd09320f91085c93c8b082dd703814c9777501d23bf9b328f07f04652592dc5a3f4321626a695b8db8e65c8617c809eb2978d8c9a882ffa82a4bb707c1a8f9a965bdacce5c041bafc94a1c6":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,112) #2 [#2]
depends_on:0
2:exp:0:hex:"cd1ad1de0521d41645d13c97a18f4a20":hex:"588c2617517329f3e1e7ba6206a183dc9232e6a4fa8c8b89532d46235af1e542acaa7eae4d034f139b00449076ba2ef9a692cae422998878dabdac60993dce9880d280bec1419803ba937366e5285c4a7f31a5f232f8d3ef73efe7267b3ef82a02f97d320ebc9db6219fbdf1c7f611e8e5164e9ecf25b32f9c07dfa12aa705af":hex:"413873a0b063ad039da5513896233286":hex:"":int:112:hex:"d4dbe9cae116553b0cbe1984d176":char*:"":hex:"bd519b7e6921e6026784cd7b836c89bc1fa98e4013b41d2bf091ef0d602e44a70df89816c068d37f0c6377af46c8bfa73ec0d5bc0b61966f23e55a15a83cea49f37cc02213b4996f9353ee2b73a798b626e524b9c15937ecf98a4eded83fb62e6deea1de31e0a7f1d210f6d964bc3e69b269da834720fd33487874489b8932a8":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,104) #0 [#2]
depends_on:0
2:exp:0:hex:"1cb120e9cd718b5119b4a58af0644eff":hex:"4c8e8fb8c87ff6b994ae71bfbf0fa4529f03bad86edf9d27cf899ea93a32972640697e00546136c1dbc7e63662200951b6479c58ae26b1bd8c3b4f507c0d945d615183196868ec4f4865d1d00bb919a00184e9663f6cb9a7a0ddfc73ee2901f7a56ef2074d554f48cef254be558fca35651be405f91c39e0367762b4715d05fa":hex:"5a7087989bfe2f6eddcb56fde4d72529":hex:"":int:104:hex:"95d8bd12af8a5ab677309df0fb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,104) #1 [#2]
depends_on:0
2:exp:0:hex:"315b206778c28ed0bfdd6e66088a5c39":hex:"6186f57a85b65f54efbf9974a193012b1396fc0ca887227e1865f1c915ac2af9bbd55969f7de57ce9fb87604cf11c7bc822b542f745be8a101877a810ed72bf4544d0acb91f0f9d3c30b6a18c48b82557433d0db930e03bcecc6fb53530bfd99ee89f9e154aa1a3e2a2c2a7a9e08c9aed1deab7fae8ea5a31158b50bca2f5e79":hex:"7ec6f47ec56dda5b52bbdaa6ad2eb6da":hex:"":int:104:hex:"930750c53effc7b84aa10b2276":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,104) #2 [#2]
depends_on:0
2:exp:0:hex:"e886de1c907c97e7db8ec80a79df90f8":hex:"c64cc9596d7c738746ab800f688eec190a4c802c55b2528931d74d294496892b81f53d3073d48f9bef1d58ce3be26547474cdda2868abeab71aff566fff613b4e5bfed1be1d2fff35d8ffa33302d3da1c82e421aa3a23848f31e26d90c0cb2ac2ae136ada73404ed3e0e1d3e7cb355a11cd2a4f9393b4d5eac988104fe1cf959":hex:"612cacbf33266353d0a29a24532f3c0c":hex:"":int:104:hex:"76634e58d8f3a48f15875ac1d6":char*:"":hex:"7001d7395efb432e2804cc65c0ba5d4719ce84177ce46292c4fd62a5596bd2bab1d5c44217ac43235bd94489c43d01618a11f047d2e247062c3b88d6e59adaa1f46514fb33b7843483920bee60a41f3cb312322c305d25251b4704fb66da58637c95a9d539731434f60ef44fe3cd6d37e2c8e7089880a563938dcc98b43f08fd":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,96) #0 [#2]
depends_on:0
2:exp:0:hex:"3b936e09a6477f3bd52030a29df5001d":hex:"65cf11d1afad19b34f282f98f140315992392f5d4eed4265085b29e1e5553f4783fec681ba2d368486ba6a54c00e71c82c08ca3d097904f021ce4b0acba2d2a7005e28e5f8750ea3d18a4f78363c37583e85104234498942c639a0564b0d80055c21cb7735dd44348298291ab602f345b1d74d624750c0177fbd5cca6f99223b":hex:"f93105be83fa5e315d73acfdcf578de7":hex:"":int:96:hex:"91b55bb5e3f3f1abcf335db5":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,96) #1 [#2]
depends_on:0
2:exp:0:hex:"dc9e2095de7b1b48481b56bf6a3604cd":hex:"ed61ff94a3f84c72147faefa615e2df00324fb01790cf9764c72c1b8ba47f17866a1fd64ee5c2f53865d1bc24ec93165a6774466a59603199ee476c1f2da7d932c8943d126aa172d532d8475a484d42bb45fcf92766feafd7f3e2e3d42d22f6f84a90e7e688232f799d80cd2cc152ddd21ecfb137701ecafcb2b65abe2e4e6f4":hex:"9e5268db19a1b51c0496a160ca76f8f7":hex:"":int:96:hex:"0fa9588536fca71bb44260f7":char*:"":hex:"ef562e301fcf923ff1a1acd3aff9b1c963058228655fe8a66cab01396547dbd2aa1f79a22eefc62944b86d1a31ebe2d17130175b8c003d6755b0eb8b79895b0f7f8046c5ae888a067ba17bc8e11a8f6e5023a9cd42f6461966c28e505b371c0f72a2606bff430a58016e99713d25ce11f10391fb4a922e27989422c6a64f9107":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,96) #2 [#2]
depends_on:0
2:exp:0:hex:"3f93901fd7cc88db3ba76a158d658c7b":hex:"16402fded879fcbfe9405902aa63ca2a520889e0045f687455469b7bb867829a01208b8dc5dcc852d8ee478993c30e6d9ec6408773b367821310a0ae171d38d71e06981ff6e845acffbc794142b87c748e12484c0636419d79be3d798cde59e9dae0a4a4a4346596427e6b235ad52e6a1b02d6f4df0c7de35fc390cae36aef14":hex:"7e98de461e6d96c0ce6c8d8b3854cf49":hex:"":int:96:hex:"86c9a70e4bab304ae46e6542":char*:"":hex:"1b4c09569b42c469b3ab6b39312c214502ec09f5fe2fed1d1933d13cdc6a7b77a5d135123fa69d9207d6844b0357b26b7a2f53b33a5cd218dacda87b78b09cf259e48e74076812c432e2d0833fb269721f9347c96e158500f9b2283342a35c8de0a022edce711118d72d8fbaa354bfb0ffee465844ef2d37e24ec2cea8556648":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,64) #0 [#2]
depends_on:0
2:exp:0:hex:"42289f3d3cd5838e250ef54b128e60d1":hex:"3edae1d554b67d2036f5fdbdb2945cc112f100adc1b47009c2e23f6a2eaee78d1f39ce8a98f715853cc29fc793fb6981ec3036834188dea7d668185ccc8642071b15de1332f6a59c8a9b4399733eb4b3d8f224af57ba6b4a8e64494bb6630b9d28e7ec3349064350febcef6a3ad1d6cca1b1da74f3d2921c2b28a2dd399c3416":hex:"e557389a216ad724aafdab0180e1892e":hex:"":int:64:hex:"6f78bc809f31393e":char*:"":hex:"25c476659cc7b343a69088baf868a811ba37daca85c4093105bf98235a90aeca015ab034da008af0982f9b2e80df804c186a9b2e97f74cffd70ebb7771d874fcaf12f6d01c44a8b0ec2898cf4493cf09a16a88a65cd77909bbf0430c9603869bd5f20d56cb51d8a3f0a032fc30d925c96599d296b1ec41c2912bda426adea4fb":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,64) #1 [#2]
depends_on:0
2:exp:0:hex:"3d772eabb7f19475665ca2a7e693bcfc":hex:"e9fc4d86f5b857fa6057b73f967351e06f87288c40a95b9e378c84f1a4c0f4b80ed0a0b44ff90a8973be4199c0c4006fc4f5ea19d5f1fe8b9c8c01f4675ab85afab0592bb3daba36bb4fc7ed9eea867e9d8cc50c19fb62a5a57956e9efacebac5e9f849649d35a329bd68de97bb6e5ff7bef477a86765c2c9ec15e24cbba5c6e":hex:"0747cbb486a013453fde1ca6abb11dbe":hex:"":int:64:hex:"8e761ffaea68f967":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,64) #2 [#2]
depends_on:0
2:exp:0:hex:"fb7fd753ee6eaaf283a42a121dab4e43":hex:"fd5cecb2c0287cb8229e97d9cc4b9885f428710528884ce663ed1728cd44cb2df93e56ef17ace0678d1e341366c652f4ba7ee45797d39be4a05c1151e5cde499e13e5d45549b5d95a174d03616d06ef96e9d7b2b6bb0d79a726b253dd64223a5f09611671b234ccf9b383952f8888814b2c167e774cfbf54e9c6b99a753f4fa9":hex:"8164929fb54485377ecccc9b9621af5e":hex:"":int:64:hex:"40a2fa7f4370afb2":char*:"":hex:"6208d068be60f7b04b80fc611062e6caaef9a5cf59f850d174b7446c78c039ea9aefe4885e19c2b33911d32ce1fe3c48ddffa4b03e450fd35da03f40c4e7c5bb3b1c3f3049dbfad3ac81ca1b79cafbaa172f4900e3829d38edea3b64000f93924a801259bc4b2523445c64bc23bfee190b952468507fa4baf6dc2bec66fcf0d8":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,32) #0 [#2]
depends_on:0
2:exp:0:hex:"30d757fd73a0fd5fa49159ad0653296d":hex:"17d485b258f80d8924e35291118cfdcffd86c47851b65f0b06a7c1f5202de82f3f460fc61b1aa38fdba7c8ded375c92cf005afe63e59d362c0960044af39241b81ca24e85c5faa43903229355b7313fee21b992ef3931d9d2407b32b3cf72dd7acbc7948395eb513cb2fd428b215ba2bd1e29c62f45d0ce231884f62480c6d8f":hex:"b35b8df0aebd0608517f2830e0e70cd0":hex:"":int:32:hex:"954c0e99":char*:"":hex:"022618d2598f79104e918a09c937a82b3db59243b5e13de731fcb912e4366105797ce47f6dce7f08073f2f41e5c15fd6b1ec4b5861469a4880c3b0bd769b78c696ff29c28c9349d5a46a6e5ad9211bd4b708a8c0b6928ebbb0dac1c0a5f5ce6b05de6a50073128566a23f09cc1b826aa5803f9f750aa4debf59f24ae9f98c9b5":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,32) #1 [#2]
depends_on:0
2:exp:0:hex:"d9d3cfd5900de5d5e2109e7721cfeef6":hex:"e4243cc37cc32dfcedf9bb76890e706af6ab1e06b290b8ccfe2a55e5dabe68cb390f7636dc9676b431d4dc8ad3f6d989e510194294ab7ab0556789046743cf374d8b6462f5f95a17f3f44337d6c69ee47b0e1ad7e5ce6f9b224c54099a104e70d2d06af869b921ea47febe08f90c591ed49c1f12003afceabd2c7bba458a0111":hex:"b4b9dfb013de6f7c44779e5a9daaf5e5":hex:"":int:32:hex:"2b81e8ce":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,0,32) #2 [#2]
depends_on:0
2:exp:0:hex:"68dc138f19354d73eaa1cf0e79231d74":hex:"ce345567a76bc30d8b4fd2239788221cfa75e1a310aeeeb8c355f8eea57d80967f3047fbd4e6173fac5caeb22151fa607065953c4c35e0537b9e3788cc80de9eedf2a340698bde99a6a1bdc81265319da3e52f7a53883b7f21749237fcfd3cd4f149bb2be7a4ddd9ef0544cfe0789040d1dc951b6447304942f03ab0beae8866":hex:"e7147749560f491420a2d893c075bb76":hex:"":int:32:hex:"70a83f6f":char*:"":hex:"64b021612c78b3e192e8349d48b77d02927e7fd70c7160d37cb8ef472f6bcd9df9d93431627c1c80875e208724ae05f94fdd2e005e9707b78a1bf3bbca7beec4b03ddd4d9de6235ffd6d84a8b9a1842e104c1e22df4566f6c4d3d4e3d96a56b9b8a5cdce9da70aa236109b289266036f285564060b204dfd7ac915eea0dd0b1e":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,128) #0 [#2]
depends_on:0
2:exp:0:hex:"7362c86344e0aefb0cf0d04768f9c05d":hex:"8baffc7836004deb87c0111d47c182512bf861874021ddfcd559acf2c4a51cf5bc4bfdee2d039b9c005b6af95a2607643dcf4d9cd9d62412f709334556db22fc91d7b40438505d6806ccb2f2c21ae731bc1f1c825d28a71ab27095a39985e96ccd07cfb2e75243ccafd474494a2338c324ef533ca5f17d2ac1b1883140342ced":hex:"7e8d12c2f0dcf4f792247134234ac94b":hex:"86d2b5debc3b10495da353d6821f6cad380776d805bd8660b08dcdb1acd87026e4f344b547a4db47b5f44cded314bec4ce9a417ce40a2acd5a21460c42dfcd27483abf3f38dd8cc5fa523b6768a26513df5896435baa97781cff1966e2e3d6ec6d0a9cdc013de5a50e4d46831667055bad04f784024a82f9cd087ae4cd37dd64":int:128:hex:"9594da428fd8c1b13ecb23afa2c1af2e":char*:"":hex:"e2c424f42aedd56f0e17a39d43ad19c8e2731efc7a25f077aef51d55280b10e667e338bd981b82a975ef62bf53bc52496b6995d33c90c7ae14767c126826e3f32bd23f444ddcfd7a0dd323b0ae2c22defad04ce63892b45c176bd0b86f5fa057a3dc371359744cb80bbfb4a195755136a0ea90b4044a45bc1b069f3cb3695c04":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,128) #1 [#2]
depends_on:0
2:exp:0:hex:"58748bb204ccb7bdafdbf739b6c19a3e":hex:"b72902c9ebb72a86be539b19a52fd9af00aa4de081d90c0d8ad580ebb5900177a036f40a1e9b43e3a07d715466526d6d7544e5a5551805b62463f956cd519fc99182c2d54bd62fc7ffc6e5ebf1503859b706da11a1b6c707a67a70789dbfc10ef726bd360f9f2347326e068e757c8443ddc9308a171e682359ae1bfe87194ab5":hex:"93ac298c73c88e127a4d9dd81bf24e3d":hex:"8f168fc4d1da13bdbefae3f9d6ac1d8cb19fcec1f43f727951af0a466d8826649a46c3cb50c045ea83849fce0eedbc042a1a435e6d9d59017997a2d5459b940078b8a7f3b6b0ff279ff8c560248296a17240ff1b0643d1f436b6e3f2079363fc49fb45f410debbdde083b92057916368cb807d603cb82e2c0dc01658bff7f1ab":int:128:hex:"efba4589d4a03555766bbc3b421dd60f":char*:"":hex:"d5c97a659f016904ff76286f810e8e92da6f8db2c63d8a42e617760780637e32105503440cdf04d1fe67813312f1479fda8d746c8b0b080591eba83850382f600e9d8680516c6579669f0b3d0a30323510f9de1c92512790b8347751994d022156cae64da0808a649d163a0e99e869fdf224b7c1a6a8fbc613d5917eca8ee08c":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,128) #2 [#2]
depends_on:0
2:exp:0:hex:"6cc13cbd62428bb8658dd3954fe9181f":hex:"2c9ec982d1cfb644ddbc53c0759b10493206d5186affc6882fbb2ba3aa430f9bae1209db2d78dcc125f3c909a54dd84fdff96c71e678216a58390ef4308bdd90f94f7109c4edefa76a74fda64b201b7a435bbabc27298f3eaa4c2d1393bd584f811fff52638f6ad2f6d86a8c3c9c030d9d4264c8c079592a36178d25991cff09":hex:"86740da7ce4efbed70af55e1d6c10fdf":hex:"be561ac15e3cfda624b422af97c26719c140bb50e4a993d636efe9c7f1963fb9047a0762169b571a698ff310bc417e34d4039b7562a95af710ccc1b197964a376c986fd2ed8ac4b0c7b4e843c37a41366f2f483c821a1823f317416c7e4f32eed9b9dc2ae1a2f3ed32c4b3187358a2329aa42191b7c2fe87b6e27ff20303cb29":int:128:hex:"76b990a1e010e5f088f6ae90bec40b32":char*:"":hex:"0b9a5f5d2e6852b75b9cf26c1b310b2200e56dafcf3c941478862cdf9737ac8e2cb9b38d41bd4a1872ea1b4cfd51a1a0b9b743aca439eefa10de8459a0a7a221c5429b3dee393f17031ca6c399df8e05657c3db55be9c9dd29e690042a4ed8db732efce7c58d6b20a2a0f7c79e42e5ada43b87ab00f481c20cac1b35514dcdc9":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,120) #0 [#2]
depends_on:0
2:exp:0:hex:"286d3f5080cfe88538571188fbeb2dd5":hex:"55135928997711360622eda1820c815aa22115204b1e9bb567e231ac6ea2594b4d652627b6816bdc6c40a4411fd6b12fab9a1f169d81c476dbf77151bff13f98ca0d1dc0a68ea681652be089fadbc66c604284eebfc8ce4cf10f4ca6bda0e0f6634023db6e3f0f1de626c3249a28a642ecc9ec5ff401e941fa8a3c691566c0ae":hex:"da6140bd4dc6456ddab19069e86efb35":hex:"5d350a04562a605e9082ebd8faec6c27e561425849e7f0f05f5049859c2c1bd2c4682ebf9773fab6177d2601fd5a086cefc3adef5a2f8f6b5dc9e649e98dd0a3d1a2524419f01305bd0fcfff52d84a20d1b14dea2138dcc54eea2bf263c6fe27c3e7255f1f359d0d00fb1b350d7a04965af30027632520197e85eb41de6bb286":int:120:hex:"d90d34094d740214dd3de685010ce3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,120) #1 [#2]
depends_on:0
2:exp:0:hex:"726ae113a096769b657f973ea6d2d5dd":hex:"90636012ba8c51d16f8f6df3d3bcabc3f09aeffbe2a762f62e677913188045b861b2e7d9a7bd93dcee46e9e4832e497a6f79db52b4e45c8dab20fa568ff9c4ace55be3216f514a3284768a25d86b1c7da5377622f3e90ed4c7bd4571715af4d0a2ab5181d0475f699202e4406bb9cfdbd4fa7f22d0dd744d36b3223134658496":hex:"2f9900226c97585d200dd20a279c154a":hex:"761663c3fcbf1db12bc25546b2425b8229b3153e75f79fa63958819caee3febff74603d99264b5a82ef5980439bef89301ae3206a1d01a3bbd7a6c99d27d1e934cc725daeb483f826c2c9d788fd1f67a627864cf8b5f94df777bb59ef90cb6781a2000e6f0baa4f1ea4754b47bb7cbd2699f83634e4d8ab16b325b2c49f13499":int:120:hex:"d095bfb8990d4fd64752ee24f3de1e":char*:"":hex:"9f7759c6d24fd9aa0df02a7c0cc5f17e61622c63195f85dfafa5d820d3ad218c7288ec017821100f1fade10f9bb447a4a01e3698b045548c7619a08f2304e2818a9bf55e70b40f8b994b7dcf0cb243848cf3f6fdfec3ebbb147d01df84a3ec62cd8fa5d78ad9f2f28cd288a35eb49a5172339e9872e8e7e3350b0d69f59acd07":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,120) #2 [#2]
depends_on:0
2:exp:0:hex:"73a9eeda721c6f292e6b399e2647f8a6":hex:"215fc7e52abe4c751ca2f7f9a5cbde9ab8b44b8d4054bb62dcea6df5b936145ca6ec83a2b78b070638fd6e5ea3bad5d0caf1b8f755f391c3e0962a92337e3eba575585eb83680075fc818860388c587746af78d5fc75ccd0a63f1612abb1ba0f04a2228ca27fbddba4878f9b2683683f516b6d6fe4f6622e603bd3c5ad45e332":hex:"c1e80eb723960049cc4448b66433f1cf":hex:"fb2a0b1f817404e74aee0a6ec8f2cd86f0c9114ed367b2690c44ad80f9d3377d7fd5066beaf1daa739d27ed3fba98379188016b1fe901204a174f9ffca370c181aece5e5d40939a0d460913b40b895e78a3b80ddf3d613c05e4e27bfd161ea2ef42271a2679f2cdca5b728ffb2319781c946a4f3ecacf486b754b30bb04ea60b":int:120:hex:"e08161262234d0d5be22f09e5646bf":char*:"":hex:"b5e286183f16dd9403bec6786bd4836cc6add47947ef111fb1d5503c18c333c8fe60959502f58390d0e0f69fbe5fee13c72aed65fe6e32f6ea45877fe44f8a556aa5157b112e572197c1c350b7943c6cf2e9146018599524d27599f09c86027f2c5927e4a20c63833870e8369baa36ecc07cdb3ced520b5ae46869ff357ca089":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,112) #0 [#2]
depends_on:0
2:exp:0:hex:"90dbda7397d8fc46215a1218a6ffd0d8":hex:"4f82a1eca6c9184240f50f7e0cfec07ec772cad5276d93043c462d8364addd9a652eed385ccc6b0faa6ca679ab3a4c3d0be6a759425fd38316ee6a1b1b0c52c1bb3b57a9bd7c8a3be95c82f37800c2e3b42dde031851937398811f8f8dc2a15bfd2d6be99a572d56f536e62bc5b041d3944da666081cd755ec347f464214bf33":hex:"7be477d14df5dc15877ae537b62e1a56":hex:"7358ddf1310a58871a2f76705f1cf64223c015c4d1574104d2e38783bb866205042f05c86e76c47a2516ce284911f1d2cbee079982dd77167e328b8324eec47c9244cc5668cf908c679bb586d4dd32c6c99ed99a6b571cf18b00689463e7a88cea6ea32d288301a10a9139ed6092ffe298e25b8cfb6b4be8217f16076dcd0a90":int:112:hex:"776d871944159c51b2f5ec1980a6":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,112) #1 [#2]
depends_on:0
2:exp:0:hex:"0c85174d428fc1c7c89ca5d1b8aaba25":hex:"3735cbfb8000260021d1938d2a18e7737f378ecddb11a46ce387bf04e20bbfcc902457637fd152ab87017185601f32a7f906057123b6c2da31a1069c93e3cacc59a359aebd3e31b302e1a1f7d5d8f1b2917a8fe79181fa633b925ce03a1198dac48f4c959076b55bc6b3d50188af2c6aa33d83698aa8db22649f39825ba54775":hex:"b3c9dfa4c55388a128fbf62aa5927361":hex:"3f552d45b61cf05ae2aa92668e89f3338a15ec7c5b7113b6571cfcd9e4c4a962043ccd9323f828dd645e8a91b007ce2112b7f978ad22ee9821698a4f2559d987ae4421452ad2e8d180953297156426d4540aff2104d8637b56b034a3a1823cf962bffbc465fe6148097975a8821ca7487e6e6c7ff4ee4de899fe67345676bb1c":int:112:hex:"1e7dec83830183d56f443a16471d":char*:"":hex:"3d98cabca4afb7c1f6b8eeed521f4666ae252ac12d17ebf4a710b9a22d839b69458387ba4bbec2f6400e0cff80fbe4682c24efcd3b8c594d9b515ca7842c9d5988c42b59b6526c29a99256451e2927f5b956ef262f97c733dfa8bff73644473b9a8562bdfca748f4733ddce94a60024dfbfcde62fb3cbd7c3d955012d5338b91":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,112) #2 [#2]
depends_on:0
2:exp:0:hex:"d89f06eb07744d43d44734faf9751d07":hex:"36cc3b2f563305208a03378f7dc036119f7de3fee77cefac06515853d36609a622382ed026c59783fbc0d9910767874c516e10c7bf3e3d104f73b3463c8d93a63418c76cb0d05e62e9c8642cb4f32caced2620912cb6c79e5110a27d5fba1ef3b4d0578077858526c5e4254365f2b2ab47a45df4af08980b3b7a9b66dff5b38c":hex:"185f8d033713ee629e93561cf8d5acb8":hex:"743bcb671d0aa1c547b5448d64d7c6b290777625ba28f25ca0fbf1fc66495a2fde0648a8db51039b0e7340d993aef8afb48269e660cb599837d1e46f72727762d887ee84c073d6136d1b0bc7d4c78f5673a4a6b73375937e8d54a47304845f38ca6b4f51cf14136a0826016535dc5ed003e38c3ac362b9d58ba8b555a05a1412":int:112:hex:"fcad48076eb03ebe85c6d64f6357":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,104) #0 [#2]
depends_on:0
2:exp:0:hex:"6150f14dc53f391e815acfabed9f9e20":hex:"fd8f337017e1b60d6618e6e4ad37c1f230cdeb78891579c2c63d4e6a4f7d2cb7252e99de333c73db45958808c08e91359c885a7385ab6f9ed98a27927a5b83c3a456ce2e01869712675e527155ba1e339ac14a3ccd7a4b87360902f2b8381308fe5a4eac5c90d0b84da4bf5b907de6ff3139cffd23b49a78750006100183032a":hex:"7e92dd558bd2662c3a539dfe21a352cf":hex:"9b4624e9118e6aa5dc65b69856638f77fd3f9f562046f50ba92a64e988258637932af7979f000505b84a71ff5dd7b60bad62586b1a8837a61c15a1a1ba7f06668272c28169915d7f06297b6c2a96c8c44203a422bfd25500c82e11274ffe07706365bfd3da34af4c4dd8ad7b620de7284a5af729bea9c4ed2631bdcba2ebdb7d":int:104:hex:"922a7b48ad5bf61e6d70751cfe":char*:"":hex:"f272a3ee9b981f97785cc6fad350e516d72d402dae0d8a531c064ec64598b2a5760f9b279c10aa1ff71bec07300ab0373187138e7a103fc4130105afa6b6346f3d368b40d6f542375de97878ad4d976d64c5c4968a17be2b1757a17c03100231c34721250cd37cc596678764083ade89ae3b1a2151ff9151edcd7ba0eb8a4649":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,104) #1 [#2]
depends_on:0
2:exp:0:hex:"3e8216072ed6fcde0fe0f636b27ed718":hex:"3b50f2a8dca9f70178503d861d9e37f5edfafc80ee023bfed390a477372986e4794175ec22ac038c3461aba50c9b2379cab48512946efdfe2cb9c12a858b373a5309324f410e6a05e88ba892759dbee6e486dc9665f66cb5950ea7e71317fa94abbebd67a3948746a998173fbbb4f14f9effbdf66d3b6e346053496a4b1934ce":hex:"23a122cf363c3117b8c663388c760ee4":hex:"28ce0b4a44fa83323e060f3ff6436b8829d4f842090296bdc952b6d4a6b1b1a66be06168c63c4643e6ac186f7ffd8d144f603b2d4bc0d65be48121676f9fa1f359029c512bebfd75075ff357bc55f20fc76d9f2477c9930f16408f9f09c5ae86efa2529d2f1449ceeb635b83ca13662860ef9ac04a3d8ab4605eccd2d9ae5a71":int:104:hex:"531a65cc5dfeca671cc64078d1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,104) #2 [#2]
depends_on:0
2:exp:0:hex:"1af434b73a1210b08595ffa686079832":hex:"13f6c1c2d4edcf1438a7b4e85bcd1c84a989831a64d205e7854fce8817ddfceab67d10506ccf6ed9ce50080ef809e28e46cba7b0c96be6a811f59cd09cb3b7b3fe5073ee6763f40aee61e3e65356093f97deef5a8721d995e71db27a51f60a50e34ac3348852c445188cfc64337455f317f87535d465c6f96006f4079396eba3":hex:"ae318f3cb881d1680f6afbf6713a9a2f":hex:"3763c9241be0d9d9a9e46e64b12e107d16cca267ff87844c2325af910cc9a485c7015d95bbe62398864d079fb2b577ba0cfad923c24fa30691ad7d767d651eed4a33d0be8f06fed43f58b2e0bb04959f10b9e8e73bd80d3a6a8c8ce637bfbdb9d02c2b0a3dd8317c4997822031a35d34b3b61819b425c10c64e839b29874ddfb":int:104:hex:"2ae7350dd3d1909a73f8d64255":char*:"":hex:"3cd2a770300ce4c85740666640936a0fe48888788702fc37e7a8296adb40b862ec799f257a16821adaa7315bd31e8dec60e4a8faeb8ba2ee606340f0219a6440e9c1d3168425e58fac02e8a88865f30649913d988353ab81f42a5ad43f960055f0877acda20f493208c2c40754fbf4ccee040975aa358ea3fe62cbd028c1611a":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,96) #0 [#2]
depends_on:0
2:exp:0:hex:"04036d2f5273c6ff5b8364aa595359c9":hex:"acf79b6099490af938fb5fd8913255b3daa22786b03356cdf3e0ffaf570f9f866047b8e15c9953f893d97e7098265297396868ebc383be8547e8ec9d974b6a65b5dc5147cdadef2e2ad96696e84e44f364c2ba18c8aabe21f99489957b2b5484bf3fb4fecaf5ddaa1d373e910059c978918a3d01b955de2adb475914bf2c2067":hex:"edc433c381140dff929d9df9f62f4cb6":hex:"404acfeeea342aeea8c8b7449af9e20ddf5b85dc7770d2144a4dd05959613d04d0cfece5a21cbb1a9175ddc9443ffacd2085332eb4c337a12a7bb294c95960e7c0bde4b8ab30a91e50267bbd0b8d2a4ed381409ea2e4c84f9a2070a793ce3c90ea8a4b140651b452674f85d5b76d0055df115608bf3a3c60996108023ebabe65":int:96:hex:"71f818f1a2b789fabbda8ec1":char*:"":hex:"4729cb642304de928b9dca32bb3d7b7836dd3973bbccf3f013c8ff4b59eca56f5d34d1b8f030a7b581b2f8fdc1e22b76a4cbc10095559876736d318d6c96c5c64cbd9fbd1d8eb4df38a2d56640d67d490d03acc1cd32d3f377eb1907bbd600f21d740b578080ba9c6ddc7dc6c50cdcee41fec51499cb944713c0961fc64f5a70":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,96) #1 [#2]
depends_on:0
2:exp:0:hex:"59fe44c6e28d025b2ad05e6e867051ab":hex:"20e66bae1215de9a87a0b878d39015d17e0d4542a1aaba2000cefbd5f892c26a410f55f0d7dc2f6b66690f2997032985e5516e068bfc6ec8a3669f566e280b0cefded519023b735ee3bcbfc5b6ce8203b727933a750f9bd515ec448c1f3a030aa0f40e607727a3239ebbe655d46b38a3d867e481ccf0fadbf0d59b665d2ed6b5":hex:"eb0c30320029433f66d29b3fd5c6563b":hex:"49b7418b87374b462d25309b1c06e3132a3c8f4a4fcf29fed58e0902509426be712639db21c076df7b83dcfcc2c2c8fcc88576f4622a4366eb42f84ebf760e3eb22b14f8b5ff83f06a6f04a924eaab05b912e126e80da22461abf7f1925fd72ebdf2aea335a044726e7c2ebbb2b8aeebab4f7de5e186b50f275b700794d895d8":int:96:hex:"296c4cdaeb94beb2847dc53d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,96) #2 [#2]
depends_on:0
2:exp:0:hex:"c314264cee0e6db30ebe9b2f6d4991b2":hex:"d436ff9abfb044a332c4e009b591719a67b12a5366da0a66edf19605c34daa37588e15dd3da0d1a097215e469439de79cca74e04cd4904e5b4a6cb4e0ea54e6ba4e624ed6bd48be32d1ef68ffea1639a14e91a5914c2346ea526df95cbd4ad1b8ee842da210b35b6315c3075ecc267d51643c4b39202d0ad793cbb0045ebdc19":hex:"4cd4431bb6dea8eb18ae74e4c35a6698":hex:"0eeafbfd04f9a0ea18e5bdc688c7df27183f346187e9574b61222006f2b3e12e8d9d9bf1f0f15949ee1a7ee8e5c80ee903b8ba2860e15ccb999929f280200b159c2adca481748d0632a7b40601c45055f8cb5126148e6cbab2c76f543537ab54eb276188343cea3c4ab0d7b65b8754e55cfe3f6a5c41b6ea3c08b81fcecc968a":int:96:hex:"fda18d2f795d900f057fe872":char*:"":hex:"cb9e0fb0ac13ca730b79e34745584b362d0716c344e4de90d8352b21117471ba12c97f193150b33774baee5e4a0f11b10428eaf0106c958e16aa46c5f6f3d99eed93d1b9ba3957bed05a8b9cc8c5511cf813a66dc7d773cb735b0523d8d6b0b80639b031ddc375f714c6dd50055320cd7ed44a471c8d5645c938a9005d0b5050":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,64) #0 [#2]
depends_on:0
2:exp:0:hex:"26072018bd0bda524b5beb66a622c63e":hex:"91c524b359dae3bc49117eebfa610672af1e7754054607317d4c417e7b1a68453f72d355468f825aeb7fde044b20049aed196ec6646cce1eeeccf06cb394286272b573220cdb846613ebc4683442dccc7a19ec86ef1ec971c115726584ae1f4008f94e47d1290d8b6b7a932cfe07165fd2b94e8f96d15f73bf72939c73f4bd11":hex:"c783d6d3b8392160e3b68038b43cf1f4":hex:"8ae7c809a9dc40a6732a7384e3c64abb359c1b09dcb752e5a6b584873e3890230c6fc572b9ad24d849766f849c73f060fc48f664c1af9e6707e223691b77e170966ed164e0cc25ede3fbc3541c480f75b71e7be88fe730d8b361ea2733c6f37e6a59621de6004e020894b51dfb525973d641efe8d5fd9077a0bbc9dc7933a5de":int:64:hex:"edffe55c60235556":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,64) #1 [#2]
depends_on:0
2:exp:0:hex:"201751d3da98bd39ff4e5990a56cfea7":hex:"2965af0bde3565a00e61cebbfe0b51b5b5ee98dbbfff7b1b5bf61da5ba537e6f4cf5fa07d2b20e518232c4961e6bc3ae247b797429da5d7eee2fc675b07066ac2e670261c6e9a91d920c7076101d86d5ef422b58e74bdc1e0b1d58298d3ee0f510ee3a3f63a3bbc24a55be556e465c20525dd100e33815c2a128ac89574884c1":hex:"6172468634bf4e5dda96f67d433062d7":hex:"ae2d770f40706e1eaa36e087b0093ec11ed58afbde4695794745e7523be0a1e4e54daade393f68ba770956d1cfb267b083431851d713249ffe4b61227f1784769ce8c9127f54271526d54181513aca69dc013b2dfb4a5277f4798b1ff674bca79b3dec4a7a27fcf2905ae0ce03f727c315662cd906e57aa557d1023cce2acd84":int:64:hex:"66c247e5ad4e1d6a":char*:"":hex:"efd064d4b4ef4c37b48ddf2fa6f5facc5e9cc4c3255b23a1e3765fabb5a339fa0eda754a5381b72989fc1323ff9a6bbaecd904eb4835e5a511b922927574673061ed8de23299ea1456054e7ebb62869878c34fb95e48c8385b5ebceecb962654cf1586b3f54e7887ce31850363e9a22be9e6fbc22e694db81aa055490495dbf2":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,64) #2 [#2]
depends_on:0
2:exp:0:hex:"3bc0dcb5261a641a08e6cb00d23e4deb":hex:"d533ad89a1a578db330c01b4e04d08238b020e36aebe87cf2b0bf0b01f1ce4197be8b0596e475a95946918152e8b334ba89f60486c31f0bd8773ca4ff1319fe92197088b131e728d64405441c4fb5466641f0b8682e6cb371f8a8936140b16677f6def8b3dd9cbf47a73f553f1dca4320ad76f387e92f910f9434543f0df0626":hex:"16fa19f69fceed9e97173207158755a5":hex:"92ddd3b98f08fc8538f6106f6434a1efa0a7441cc7f6fd0841103c2e4dd181ea0c9a4811b3cb1bad1986a44d8addabc02dd6980daf7d60405b38dadc836bb1d0620ceab84e0134aca7c30f9f9490436b27acfd7052f9d7f0379b8e7116571017add46b9976f4b41431d47bae6f5f34dc42410793bc26c84bfe84fb53ae138c85":int:64:hex:"f5289e1204ace3b2":char*:"":hex:"be0c30deeffbe51706247928132002b24d29272eee6b9d618483868e67280236632fa1ae06f3ef793f67bd01b1b01f70a827367c1cd28f778910457c7cbd977dfefff1f84a522247e19b2fd01fa22ce67cef9503d45c80a5084741f04108f2462b7cdd06a8f1f044fea2b05e920bcc061fbc6910175d732f45102a63c76ae48c":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,32) #0 [#2]
depends_on:0
2:exp:0:hex:"239c15492d6deec979e79236baca4635":hex:"d64886ce5f5b4adb7fe8f95904bc1461749c931655b02819ffdd0ae31bad4175125aa68962f8e36ec834a7d53a191a74c937e81ec93ad9ce0d3b286d3c11ff1733c0b7780130768c120b1833933561cf07399ca49b912370ae34f0e49b9c8cb9920eddc6816ab2ae261c6d7f70058a9b83a494026f249e58c4c613eefafe6974":hex:"916b8b5417578fa83d2e9e9b8e2e7f6b":hex:"b39eb732bc296c555cc9f00cf4caaf37d012329f344a6b74a873baf0d8dde9631f5e57b45b957d6aec0f7978e573dd78b43d459b77756037cd64d10d49966eb3a2a08d0f4d5e4f5dcb8713f4e4756acdf9925c5fc6120c477f6dffc59b0b47a3d5efd32b8c9052b321bb9b5129e5c6a095d8de563601b34608456f58d7221f2d":int:32:hex:"fc08cbbe":char*:"":hex:"95c169721ea007c3f292e4ec7562a426d9baa7d374fd82e1e48d1eaca93d891d5ffa9acf5e3bd82e713ac627141e26a8b654920baffab948401cc3c390d6eea9d7b78c4fcb080b0aa9222e4d51bf201ccfd9328995831435e065d92ad37ee41c7c4366cc1efe15c07fc0470608866aeea96997772ecf926934c5d02efe05f250":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,32) #1 [#2]
depends_on:0
2:exp:0:hex:"db68a96e216b0dd9945f14b878487e03":hex:"5634196a32d4cbfa7a2f874a1e0f86287d2942090e0cc6a82bd5caf40136a27ddf524a17713ce4af04ca6cb640a7205cce4ac9cb2d0ab380d533e1e968089ea5740c0fcbfa51f2424008e0b89dc7b3396b224cfaed53b3ac0604879983d3e6e6d36053de4866f52976890f72b8f4b9505e4ebdd04c0497048c3ce19336133ea4":hex:"8a1a72e7bb740ec37ea4619c3007f8ae":hex:"1b4f37190a59a4fff41d348798d1829031204fd7ac2a1be7b5ea385567e95e2ace25bf9e324488dd3ab8ce7f29d4c9a4f4b1a8a97f774871ee825e2c17700128d3c55908d3b684a1f550fdb8b38149ff759c21debdd54e49d64d3e8aac803dfd81600464ed484749bb993f89d4224b3d7d55c756b454466ff9fd609019ed5e83":int:32:hex:"9251d3e3":char*:"":hex:"0c6bb3ee5de5cbb4b39d85d509bcacb3dda63fa50897936531339882962e8dc54c285c8944768d12096d4a3c2b42ffa92603cee2da9b435ec52908fca6d38ed74f898fe0ffa761f96038ff7dfeccc65bb841c3457b8de1e97d9bee82e2911602ee2dc555b33a227424dea86d610d37c447776295b412b412903ad2cede5170b6":int:0
AES-GCM NIST Validation (AES-128,128,1024,1024,32) #2 [#2]
depends_on:0
2:exp:0:hex:"659b9e729d12f68b73fdc2f7260ab114":hex:"fd0732a38224c3f16f58de3a7f333da2ecdb6eec92b469544a891966dd4f8fb64a711a793f1ef6a90e49765eacaccdd8cc438c2b57c51902d27a82ee4f24925a864a9513a74e734ddbf77204a99a3c0060fcfbaccae48fe509bc95c3d6e1b1592889c489801265715e6e4355a45357ce467c1caa2f1c3071bd3a9168a7d223e3":hex:"459df18e2dfbd66d6ad04978432a6d97":hex:"ee0b0b52a729c45b899cc924f46eb1908e55aaaeeaa0c4cdaacf57948a7993a6debd7b6cd7aa426dc3b3b6f56522ba3d5700a820b1697b8170bad9ca7caf1050f13d54fb1ddeb111086cb650e1c5f4a14b6a927205a83bf49f357576fd0f884a83b068154352076a6e36a5369436d2c8351f3e6bfec65b4816e3eb3f144ed7f9":int:32:hex:"8e5a6a79":char*:"FAIL":hex:"":int:0
AES-GCM Bad IV (AES-128,128,0,0,32) #0
depends_on:0
0:exp:0:exp:1:hex:"d0194b6ee68f0ed8adc4b22ed15dbf14":hex:"":hex:"":hex:"":int:32:exp:2
AES-GCM Selftest
depends_on:0
5
| 93,733 | 681 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_gcm.aes256_de.datax | AES-GCM NIST Validation (AES-256,128,0,0,128) #0 [#1]
depends_on:0
2:exp:0:hex:"2c186654406b2b92c9639a7189d4ab5ab0b9bb87c43005027f3fa832fd3507b1":hex:"":hex:"3a0324d63a70400490c92e7604a3ba97":hex:"":int:128:hex:"4c61cd2e28a13d78a4e87ea7374dd01a":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #1 [#1]
depends_on:0
2:exp:0:hex:"747d01d82d7382b4263e7cbf25bd198a8a92faabf8d7367584c7e2fa506e9c5f":hex:"":hex:"7156358b203a44ef173706fdc81900f8":hex:"":int:128:hex:"9687fb231c4742a74d6bf78c62b8ac53":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #2 [#1]
depends_on:0
2:exp:0:hex:"1cbe30216136b7eaf223e6a7b46c06625176d9a08182fa806a63d8b143aa768b":hex:"":hex:"4fe6ace582c4e26ce71ee7f756fb7a88":hex:"":int:128:hex:"d5bdf8ec2896acafb7022708d74646c7":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #0 [#1]
depends_on:0
2:exp:0:hex:"f31194c83bb8da979a1eabb3337ceb3d38a663790da74380d8f94142ab8b8797":hex:"":hex:"404efd26b665c97ea75437892cf676b6":hex:"":int:120:hex:"e491075851eec28c723159cc1b2c76":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #1 [#1]
depends_on:0
2:exp:0:hex:"daeed52ae4bf5cbe1ad58ae4ccb3da81fb9c0b6f7619ca21979313ad9d3e83c1":hex:"":hex:"4037eadb11249884b6b38b5525ba2df4":hex:"":int:120:hex:"360c6ef41cbd9cd4a4e649712d2930":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #2 [#1]
depends_on:0
2:exp:0:hex:"3ad81c34389406a965c60edb3214663ac4a6bd5cfd154ae8d9dc86dae93def64":hex:"":hex:"cebbce06a88852d3bb2978dbe2b5995a":hex:"":int:120:hex:"bd7ca9f6bd1099cde87c0f0d7cc887":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #0 [#1]
depends_on:0
2:exp:0:hex:"4c152ba30aefa5b2a08b0b4d9bf3f16fc208bb0bc4c4eca9411dc262d9276bad":hex:"":hex:"008d040fbd7342464209f330cf56722c":hex:"":int:112:hex:"c87107585751e666bedae2b1b7e8":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #1 [#1]
depends_on:0
2:exp:0:hex:"9aed4ae6b1d857fdcbe5aec6db38440613dcc49f24aa31fba1f300b2585723f1":hex:"":hex:"947c5f0432723f2d7b560eca90842df1":hex:"":int:112:hex:"7d331fedcea0fd1e9e6a84385467":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #2 [#1]
depends_on:0
2:exp:0:hex:"cc80bc031676eff5f34dd076388a5130e985f9e06df4b4bf8490ff9ff20aae73":hex:"":hex:"51f639467083377795111d44f7d16592":hex:"":int:112:hex:"02d31f29e15f60ae3bee1ad7ea65":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #0 [#1]
depends_on:0
2:exp:0:hex:"db7a40213b5b4b07e9900dc28f599403b0579cbce13fcd44dff090062f952686":hex:"":hex:"aea6f8690f865bca9f77a5ff843d2365":hex:"":int:104:hex:"7f2280776d6cd6802b3c85083c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #1 [#1]
depends_on:0
2:exp:0:hex:"299b874eaa8b7baf769f81f4988a41e2708ae928e69a5ba7b893e8e6b2db5c3b":hex:"":hex:"2aa04d85d2c0dc6f5294cb71c0d89ac1":hex:"":int:104:hex:"ea01723a22838ed65ceb80b1cf":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #2 [#1]
depends_on:0
2:exp:0:hex:"a6c7b4c8175db4cf23d0593ed8ea949043880fc02e2725f0ab90ae638f9dcfce":hex:"":hex:"ae07f8c7ac82c4f4c086e04a20db12bc":hex:"":int:104:hex:"1132e4fff06db51ff135ed9ced":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #0 [#1]
depends_on:0
2:exp:0:hex:"b98e1bf76828b65a81005449971fdc8b11be546d31de6616cd73c5813050c326":hex:"":hex:"929b006eb30d69b49a7f52392d7d3f11":hex:"":int:96:hex:"33940d330f7c019a57b74f2d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #1 [#1]
depends_on:0
2:exp:0:hex:"09ccef64ae761a70fe16772cba462b058a69477c91595de26a5f1bd637c3816f":hex:"":hex:"e34b19381f05693f7606ce043626664d":hex:"":int:96:hex:"2adc2c45947bfa7faa5c464a":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #2 [#1]
depends_on:0
2:exp:0:hex:"654cf46598e5ad3e243472a459bcd80f1e026a65429352dbd56e73fcc5895d1c":hex:"":hex:"a56f27709e670b85e5917d5c1d5b0cc2":hex:"":int:96:hex:"177b9a5e6d9731419dd33c5c":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #0 [#1]
depends_on:0
2:exp:0:hex:"84bca1b2768b9202bf194f2d5e5a0a5f51fd8bb725f2bab8a3fccbdb64a4ea70":hex:"":hex:"c45b2708c5bdf65ec6cc66b6dfb3623b":hex:"":int:64:hex:"fe82300adffd8c17":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #1 [#1]
depends_on:0
2:exp:0:hex:"c8ae011795c9a60ad7660a31fe354fa6f7e9c2724d7a126436291680cd95c007":hex:"":hex:"1bd9ea6186450f9cd253ccfed2812b1c":hex:"":int:64:hex:"35214bbc510430e3":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #2 [#1]
depends_on:0
2:exp:0:hex:"df2f0a8a3849f497d12bda44e12ce30a6957f3febcd5ec9bc134171326ca66d3":hex:"":hex:"728cb9608b67a489a382aa677b1f4f5b":hex:"":int:64:hex:"e2ef5d9cc5791c01":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #0 [#1]
depends_on:0
2:exp:0:hex:"78e8a8ad1ecd17446cf9cd9c56facfd4e10faf5762da0fd0da177f6a9b9c3a71":hex:"":hex:"f169ce6f3ccc58f6434ae2b8ad1a63a1":hex:"":int:32:hex:"0fe57572":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #1 [#1]
depends_on:0
2:exp:0:hex:"02ca6d8a862e25db9d68e4404abc107e700135df4157cfb135ce98eaa33151c9":hex:"":hex:"7b722fdd43cff20832812f9baf2d6791":hex:"":int:32:hex:"72dea6cc":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #2 [#1]
depends_on:0
2:exp:0:hex:"9a2b709dbcc3a4fb15b3ad541fb008c381b7e985b57df52f07ca7cd26ab1ecc4":hex:"":hex:"729baa4c0ef75ed8aae746376b39fe3c":hex:"":int:32:hex:"2a0d607c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #0 [#1]
depends_on:0
2:exp:0:hex:"449d39f863e4909984b37f2e5c09ea4d4b3e9fac67bd57c299e4e1d1f084aaa3":hex:"":hex:"d8e9118f331bb5a359f0aa8882861b72":hex:"4ddcae0bc24d622e12bdeaac73e8d1ab7957af051d27dfaafce53aeed4cdd3f989ea25989a2f41cfb3c38dbd841c5560b0b5ab1861b1fbcd236865d13da55b50219462e021f8a21848a64a85326031fcec8fe47a6ef4a435dd2b2fff637644ffcf3914ef2dfa5dd556421bfd297be150b31db039f0f2cc422b282e659e70cceb":int:128:hex:"c595b9d99414891228c9fa5edb5fcce3":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #1 [#1]
depends_on:0
2:exp:0:hex:"3e70e66813fc48f984dcda4d1c9c24f1d5d1b71ecfc8bb9581782e7cca5a5cc6":hex:"":hex:"d804f1051e72c9b7117002b862eb45ff":hex:"0b1ab2b7a87cebac668c7a532fa8fa56a22cabf0c41fc1e6744ffe07c857c6865d623f508351f98f3f0c577d1eb94300a30a445472218c8ac626b0bee7d4c122d33f8130436a89add341e8ef7e00694afb4ad80d314d87ad3f921c7105eed05431b8151df7cff2c8e3790efd4acd3f60332dc7f34fdd90beef70f9093361d65b":int:128:hex:"c09c2e3fdfefa222f7345ae4efb978fc":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #2 [#1]
depends_on:0
2:exp:0:hex:"8e534041090b45b80f287dc5fa20ebda017ad81b0530e680f62c6280fd8881af":hex:"":hex:"ead675b019ef5c6bbf4985f2a382d6c1":hex:"b1db220052c4bebcef27eed6db0dc91be481179d71160c5a2ddb2fe497a05484840b04cce48980057d770fbbd0d5f3d5c633b55470617ad2cab5767188283310337825c4b0eafe13b5b11293dec230dad43b220885105767938c7ec4600fe063f98aa14bc6afb886fc874c10546749da295f571e696305bd9165486e29f43f52":int:128:hex:"9aa0cdad5686ca515cd58aed94938ef4":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #0 [#1]
depends_on:0
2:exp:0:hex:"2de18874470c09db683cf45cd752bdfa8bf33e7967220b1a69f41f2a02da1d80":hex:"":hex:"af30eb2d0a0c2a50ea413f3285aa88d4":hex:"22889b868d8ccc9f488406813caed199b23091ddd796c8632f564e7cf5a39dfb725266a931fec958659b6fc5b6b9343b8217edb0acb010afc9416601155262b57bd398d62f555953f0e15958e19ae004fbc9cb25e0269a9eaa38a4635a27bfa719fb249fa49337796bcf5f416bba87fbf3b19f0d8c11290c25ca50bbdc822f01":int:120:hex:"646bbc9b14681af65b0d1c4c9f1d0d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #1 [#1]
depends_on:0
2:exp:0:hex:"1a1bb9122e762ecd7ff861a1d65e52607d98e7ae5bd1c3a944e443710f3b0599":hex:"":hex:"32f99ea4cbf52c2701c2252e5e6c863d":hex:"91b7a70c3a06c1f7f2ea584acb5dd76177ba07323c94f2e8f7cbe93fc0bb7c389c3c88e16aa53174f0fc373bc778a6ccf91bf61b6e92c2969d3441eb17a0a835d30dcf882472a6d3cb036533b04d79f05ebfaadf221ae1c14af3f02fa41867acfdfa35f81e8a9d11d42b9a63288c759063c0c3040c3e6ee69cf7c75f9c33fea1":int:120:hex:"a8e29e08623a3efdbbe8b111de30a4":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #2 [#1]
depends_on:0
2:exp:0:hex:"3bfad1e8f9850577f9ba3f290e9a5e91b494c2d99534220362e171a7543177ac":hex:"":hex:"8410886b70c57d7ded8596443bd1b157":hex:"ca801c83596795515ea931edba00e06e332bf84246b7036e10b317e2d09a51b2981fcb664ee3bf4180bb0b12ed1cda221abc6790b27c26914f5ef9cea9536e2453cd5b247cb054e295c2687b725a97cbc484b8eb86c6ceee03bd07a54a9301a3ac0ddb23aecb825a238252e7575329058b40e75575a7f16439edf5be163ce5f5":int:120:hex:"e3645db0c600dba52044efcecfc331":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #0 [#1]
depends_on:0
2:exp:0:hex:"65debdf2f2191a6cd8de8ad4d5d4d0d8f731f67744e2545df6b2a7cba89c1ee0":hex:"":hex:"fdab2ee547dd8b6f5a4ea2dd19697b3e":hex:"d2b0a0438ee0f145aec9a7ca452b788ecb473152b78fb75f6ace721afc7b0ae1942049b790f3a5b6221a8760295659756d35347cc04029be03459f3e23a71209b4e0bbe13a253a888c83db23376d3a6d9a539f7c9fa4a12dc64297e7c93dfa0ab53ef76b6e1d95bf6f3d5e6ee8f08662fc03ec9d40eff0a43f23ac313671bfd9":int:112:hex:"c25fc157c3f2474885e2eea48aea":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #1 [#1]
depends_on:0
2:exp:0:hex:"496ae810380460d40cd2fdae8c0739f16b87205cc7f57db0a71a473eb361d570":hex:"":hex:"77233de96f5e1744337778212b411bd5":hex:"85f5b54b4c4af5c808120bd28d98e44e96f4126623e57684957e9fc4fd1a2d0583940b8fc8314a249325476e8d05247831b04709580ae714e8187cd38f9559419e14c9fc4f8c454ec191b8ef2a3610988fe3339d0dc6b72f5978f9eff9d596dfabf27056e3a908c6497267461386e860f6b9d65526294bcb92908b5661b06b5a":int:112:hex:"4ed91af6340e70b0c2b94ab6f82e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #2 [#1]
depends_on:0
2:exp:0:hex:"aca188183b46139cc7cffc82a6aaaeb2fd73cecad14e75c663bd62daf1ec711d":hex:"":hex:"7bbf7fb55eb70cce94cc6a2b67de55ba":hex:"015cfba90f069545fed60f31992ff3d3c3592eb91e7a53df5978ded64291954cb99a57de82d5398ce782b68d14ac04a8b425395bd076ead59eb445721bdb2f45e19fa089117800cbbac7b8313fb165ccb1122acb654e1242dc7fe6885ea1cbb7281b1270cfa1549cdfe9b47caf47b4ac3807e562e48c066566f5e606b5023b47":int:112:hex:"3bcb5c2a4261d75bfa106fb25ee1":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #0 [#1]
depends_on:0
2:exp:0:hex:"8cd6815f6ec15f03b7a53f159e877a5981e0ab7f6e6c261ddde4b47cbb2f2366":hex:"":hex:"c431c07d9adf5f61204a017259cddd75":hex:"4e1a835402bde4f5227e64b46a1f8d0f23a9434e189377fcdf1b9621ba1987eb86a7f3b97ed0babfd674e74c5604a03dd016d71000a72bbbd00a7f7fe56ad0fcb36a3e24dd0fdb63bd66d4db415f35012416ed599796ca3f678df7eb5a1b17f75abb348ddd3b366369a7b362c9488aedab836b61f9a158f0b129c8ca0a53a81e":int:104:hex:"0e463806ff34e206f703dd96b3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #1 [#1]
depends_on:0
2:exp:0:hex:"8f0a72abcda104aa7fae501f9a3b686d00d3f6fe984731db8a2865bfec587073":hex:"":hex:"ab8acd063775d1b1314f14e90fddd1be":hex:"02c6d426e7f20b725d8cde0a6382e49b029b52126889013ef45251f27b2fadb95ca4a9a3b16ad06999eeca4a473e813045db4942e9b9ff2e5a5e429d9bac298372344d1b781d5facabf6d779643f31ada6124eb50aad599044b54279ec9b25714ac8a3b9ad2487cec7f4b1ee245d7be3d496d6af1d4cbee1c8201312541f3064":int:104:hex:"3f0ccc134091e0c0425887b1b9":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #2 [#1]
depends_on:0
2:exp:0:hex:"417135cad74280e6f8597dc791431c95cb8fa63bbf7197e3ab37c4b1d6d9438a":hex:"":hex:"0fe22d9ba1d0e32656e3a9f07a517a27":hex:"a0b2712e81d329d5b076a4be2ad6823cee6dbd17d9a592d065bdebb92b1ff37a56bf2f5e5341f39c574246ccda19e5f35fede49c9ba958f3920cc5440fb404fab7846884ca0c2a3af5b51f4fe97a1395571319cc5b40f8aac986d77de280db82343983982638326ef003e0c013af19c34672975dc99ccc0853a1acf7c617d965":int:104:hex:"888b836c9111073924a9b43069":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #0 [#1]
depends_on:0
2:exp:0:hex:"304824914e32ea0efd61be6972586093349bd2cc2cf0cff44be943682b2dbff5":hex:"":hex:"b6d927a71929029f6766be42746f7cb1":hex:"7281c81c7514f4b17cb125c4649006ef8959a400a1e4d609d277e363e433725fa32346a10bcbd826b6afc8222158920d0a2db1e6fc915e81231c34c3941ecf3c6f94ffe2136190cae3dc39a4277acbc247f36291b5614a8433b1a0780434a6c50521b72ec25145bbd3b192647155d5dd9df9e66762d39592602ea99bf9bfff49":int:96:hex:"b6044c4d7f59491f68b2c61e":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #1 [#1]
depends_on:0
2:exp:0:hex:"8a10e9abe9389738e12a4bb6f553ae81e8bd320e0dfbc05fbae2128c1fde7a23":hex:"":hex:"6da44354e198e3beb54792718becbcc1":hex:"199d754630135b669bf2ec581d3027a569412ab39a78dd9d482e87b778ec65c6473656260c27827e00e566f1e3728fd7bc1853a39d00e43752c6f62c6f9b542a302eea4fd314473674f6926a878ec1e4b475d889126ce6317115aea7660b86ab7f7595695787f6954903f72361c917523615a86d6ce724bd4a20c9257984c0c6":int:96:hex:"5c5683e587baf2bd32de3df5":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #2 [#1]
depends_on:0
2:exp:0:hex:"d164ffde5dd684becaf73e9667e3e6acb316682c41aea247899e104a54dd7a7f":hex:"":hex:"1d388e19e9d7a9750e2fc1187d4b075a":hex:"f166a5b6f91261cda56f1a537f42ffb8aed10af5e0248f8910034b92dbc58d25953f1497f571d31fbf5ec30d92234b440161703851f0e43530418147ce6270fbcb5db33ab819ba8973051908704b6bea8aaca0718947e6aa82498a6e26a813981783ed9bf9d02eb1ea60927530c4700ff21f00179002b27903dd4103bbc5c645":int:96:hex:"52e10495105799ead991547b":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #0 [#1]
depends_on:0
2:exp:0:hex:"2854188c28b15af4b8e528ab25c0950fc1384976f242716c91bddeec06f2fdea":hex:"":hex:"075af9c31f5252b8920092cbd999e7a0":hex:"e9452f71093843a025bb5f655eb6a4e8316ab5946484b11818f22b62f4df75d5891fa3397537093a261dc9a7648b7477ea1f5fc761716e302763364bcab7992595edd0fc1c7f7ac719c879e6616e2007948eb8530065a6cccf73d0fe4a0598819b471b0856e6d90ea0fc0e5d36a30ee925b6b8e5dbf40e77f01efe782c0bb4f7":int:64:hex:"6ff8fd87e5a31eb6":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #1 [#1]
depends_on:0
2:exp:0:hex:"2bfc445ac0365ae6c3c3815fd18bbd0c60ea224f6620d9b6ac442a500221f104":hex:"":hex:"43c5f3367a9955aaee1a0c4d4a330059":hex:"db0bae8ce7c66a8ba2fedec22f236212e9a7ad72b371de285c7dc6d2f6c22df0ce4920e0f03f91eb1653c4490050b9f18a2a047115796f0adc41707d1ffcbf148aed5c82013f557e6c28f49434fc4eb20112f43566f212c48cec9894ac40772fcd9b611ee9444df7b73e35b8a38428ccb064c9c50491d2535e0b539f424db83e":int:64:hex:"49aaa806cb2eeadd":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #2 [#1]
depends_on:0
2:exp:0:hex:"7b828f99aaf751bf22d993ed682e488595617a607ed74aaacbb6b60457453080":hex:"":hex:"d48dac1d8d77e245420feb2598812418":hex:"f50f785f4e7c848a55a616ecf4b6b1e1ca85e16de7100c7e4273d411bd95c1380ee157ba501ba9616980195f34e39f43e335f33253342feb8ed64443483c721b85241a0320b3cac83104de2db47188c61a373fba592ea16feeefdee1f2bb43927396f58151418672ebb74afff5c029503a0d0be81430e81ed443e08b74c03183":int:64:hex:"a5b71ecf845b25d0":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #0 [#1]
depends_on:0
2:exp:0:hex:"7b6da11d69fca3e4c907628d3eb63d95c7e502fc901372fd097e064e70831432":hex:"":hex:"6fe2148f250ea178d4c8ca8423ead87d":hex:"a8097bb74ded776f578eb7588f5ef8915db9bfa7262af700c8e76ee114e07557b6786dd5a60a66b2703e7c9de5d6b42aca92568aec5d1ecc298dbd0edb150b8cc13c9a78698f7674caa94da6cacd1f3ef4ca4238c59830ea725ab3a6284e28966c8c32d9bccfb0cfd6583a5ca309debe86549a6f317d15c5f928cbc7f473310c":int:32:hex:"e9cdbc52":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #1 [#1]
depends_on:0
2:exp:0:hex:"c5ae9328be49e761064080fc213e53e373fd86359a09d0355e2d438d9b8e68f1":hex:"":hex:"a7e3f8660ff925d5c88c5aceffbd7026":hex:"2ddddba7a56cc808aec4602f09ae9bd78887827bf0315d8dbe16821606ef9d117746dd138bf1f23565d1ab8f4cee36d53fe3730632c5df9f12109b16edbeae285bb49dfdd155f5dc97b319a85362d53cc86817b7c1c31e5e87c9f37422f133d00dd0776bd92ab05ce6860573cd911645cfe3fbe515e85f744899a447fe443653":int:32:hex:"e35dbac8":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #2 [#1]
depends_on:0
2:exp:0:hex:"e4f8ca13ba86c658cc7f42d4f029422209efbd101bc10a1df81a42cfb3a0f79f":hex:"":hex:"1a362fa0e4054ba11e4b06d59c8bc9cf":hex:"e7ad5c75aa13659f8ce4b1650c46382645ec67418199b84ea445b8ceef619ef3fbde59ed3d313c459e36fcf87d26ef2b453409b32f1086934c3072c1ef0aac83762d28b1193b9afff2c083ce4300b768b0ae23ff9d3dcf65bc1693f1350da65180620aab205aceacfc683c8be53a332e2d0337a7518d2a5204f9c8d7325a4799":int:32:hex:"e7a37f15":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #0 [#1]
depends_on:0
2:exp:0:hex:"00050a21ca1e72cd0924be31b943c60854be6744577de3dd9d1f4fada4a19ea6":hex:"693ffd3d92294857a99c702a0799eeca28ab066dd90917b9ea5ef8f6547f1d90b106cbec8ef2c22af9f8efa6c652f2f97c2baf33af14fe9def230d49524bd65909c3df1490f637f99e788dcc042b40e00bd524c91e2427ef991bf77e7b2f770cda6e90076c5dac4cac7ee3958b53ff8ce846c3a96281f53c2c52f5f3e523536f":hex:"2fc1afc1395d8409919248709f468496":hex:"":int:128:hex:"e39b6a7fd5ac67a2a1cc24d5eb9d9c74":char*:"":hex:"cfcd6b9ff7641829cbadeaa2e56f1f150a099eccf3e378fa4da59794dcc4490aa4f9c5db0ab245bec36a7d4557a572008e42f03bc1baff3c946f23f54a4dc9828f106cf4264e4ab40165839d1085e7795b1ae0950f0ee4a08e46ada501b6b51dee0e518129c9426e5bd44c66674a9f99cfe676f002cfd344c5bbd22d3d91e600":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #1 [#1]
depends_on:0
2:exp:0:hex:"f10965a66255f0c3515af497ccbb257a09f22ec2d57c5edae322a3e6d2d188ef":hex:"91598690edf2de8b27f9bc7461a84e80811cee544f0542923898328cf157590251f0342cb81d359b5dccc5391a12320d1444c26f24178977dd6705c2b365dc1ece0152c42e2f0ee3162cf886ef5529f4f16a77f3bdd2aeccd405b59addf098521d0d38cc25f1991e11be7ecf24caedb48a2a286d2e560a38fa9001c5a228c4d1":hex:"c571ce0e911de5d883dc4a0787483235":hex:"":int:128:hex:"6d9d3a5dbc8dce385f092fff14bfffda":char*:"":hex:"2867996e389e09ec0da94d42e77b1e436b50065b09ca4adf1cd03240444ee699dbb7b3fc081a1869ca607d77d5ff9754fc3c997ff0a4ee17543a2ba77886b88a7128bcc51d3450df58ff3a26671b02c1d213df6adb6f7e853080eb46b504517cbaea162710a9bbc2da8b552eb6b0e0cb98e44fcab0a157312be67974678d143e":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #2 [#1]
depends_on:0
2:exp:0:hex:"4437ee7d16d8c3ca1aa01e20b66749efa901614d4bb4bee786ad5a5f1bfde2e6":hex:"ff80727a3485cdbc7fab4ee9fadfdc621c538e2055706629046078f1aa3fb687fc728d3a7ffa52ae457b7b5649613eab7bafa464bb435314c49e5900750f7ad39ca9b75df6b2eaa755439e101f67b7ae4cd80dc4a9dea0027048253f2d0a6014056ca69b8c85605b00cf75fa7634a0ddf464270a8c79ce1a1324c4a4c513b24b":hex:"275393276745bc43bae4af1e5d43a31e":hex:"":int:128:hex:"a82ff1e87d26e4d6e417b60fb2d3ce23":char*:"":hex:"88f994d276ed20be3932d16f551c4b7e2ed80411f2e72ce098fa0b70c22157a59edab30649fec447dd63f0c87dceca7238ef0d9561b58489ba7bd86f2892743099f40af63c432f78ac0ad0b5c2be47b9e3045e7237b096ee400f430af63a6f309de785caf190f3f4aabbe79f727a741590de542bd343df68d13db55a5f8bab41":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #0 [#1]
depends_on:0
2:exp:0:hex:"fe4ec037ce563dadee435cfcb2bf090f1f7ccc7d1b5b4fab2f1b738348f8ed2f":hex:"64eb8a4bda9804c09b04cfcd89094928c21480908b81ee19d6c29c2a3631b1a5bdc8e7f8ea56f7b8b8e14a5208296026785cac3a6afa54be8af4d5faedcd12b6621bde0f8ec5a2635fe72a89468ca7704c73aa40cd2ba97aef08886b27a694d339b00e7d12a31308672f87c06a7388a1432f869eb4cc1da864140b1b33931925":hex:"47f5264f7a5b65b671892a05fa556f63":hex:"":int:120:hex:"660462b4088f6628a630f2e4170b21":char*:"":hex:"4a310e035361f98b8c54fb4cef70b1a9c910552ece056ca8fdab54c52308ec0ad7fe9dd1dae92badab5010577de522088768fa6466fbccce22e14c51ca7986c4063d0f06bf578dab16a91856713198a7138395c49c78b6314b57ab72fd079028c8dc351952d90b04a7cd2b245df0c0522447cdb7d3329fd9425fe5cb40a8e7c9":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #1 [#1]
depends_on:0
2:exp:0:hex:"e6e1ada628ca76eb9832cc6b5efc5c9d2686bb587366a6de2d734233fa95279e":hex:"a0ac738e0fb35246b84a6fbe319f827039515df25d0c0fc6de7c048253ae63d3c561e44a12672ffeae1cb925610b482aa422bbee0e1784fc69baac3a97d69f51e6d2a17957b44b318624ea7ec680a559f4d3f2761d09bee66efb3a312ae6b3ecb673e756b2a0f654671e82500e7ace91f2be2a74bc3bc1ec1a4b6877a53c27c8":hex:"5a100b451e3a63a3e6d4b8a9e59c6bce":hex:"":int:120:hex:"88df9a1ea54e5bd2ef24da6880b79d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #2 [#1]
depends_on:0
2:exp:0:hex:"cd5c1e90d78213155c51767c52c290b3d657db8414ee0a7604a2ec7b48105667":hex:"8e987693da0fb77b6d1282eebd3a03e05d9955ff81929b1a2c721574862a067ddee392c7ece52ca1451f3e6e321d7208882d97b4149af6d78d65c054e1bfcdfa62bd2202de32dea8363f8d7f041891ce281840f3cd906ab46ca748e5b3b11890b4014bf0271c9427c874097782d1c13dbb40e78fc8276fc134f3c29923a43a01":hex:"4e022d8d86efbd347e8cbab7e979771f":hex:"":int:120:hex:"e7df79af0aef011299c3b882e3a45b":char*:"":hex:"3b20473d9b5018d089e7f74d3fef22ec2805948a9e07689831973c704a6d8db4d090af88d696ab8c3aae9740a2bbd7f03e0b18b2b591e59c335c1043a2578a89b1a9f20fd0dd53f12e00e9bfdb27de8caac772bbfc4de9e4a255a5d1b04e59625a87b8279babe613def58d890d5502abf2f709aab625dcc20c58772832c7bbab":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #0 [#1]
depends_on:0
2:exp:0:hex:"6e3dfc07003bb6a2d82bd5263b2832f47db4e73279266c7a9ea21f4f18eddf83":hex:"a960da222af9d4da5797e6957d59b00f6d3893599c70e95c0984b56eb3329b191703c2532f3288b15ebf655b9b5ee4617484e5ac9c39bb06731d03ebe4fef9495d003b0ed694cf540b4dc759d32629e55512680badd81234bd71ffd55fcb5e6a85031c1dc31ee1ed198939582d8336c905717cc87101dcfcf9d833fac815c8ea":hex:"7c0f49fb54f5e68c84e81add009284e6":hex:"":int:112:hex:"b2ec0f3da02a9eb3132fb4ebe3b8":char*:"":hex:"a40b6f70f0572fe0bc70d83368e7c154f7dbd501f52501630a2e523d18e216e07368521f6040d806299397722b99bcf7f85d36b8bed934b49aa1fa76d38783e6a2e392d6d0786d467f7bc894a739ecf94f0fe884a9c391154f8326bf31ea5242a18aa263d04da4b63b11de23b42d3e10a2d5460cb32700cdf50a0d89165ba22a":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #1 [#1]
depends_on:0
2:exp:0:hex:"4103b1ddff87a508a219c808a04ad4750668688f4c2ee75b92d28d70b98a2c94":hex:"a00a196193ff07006b7df524824bd0971d63f447a3a7bb1b75c1e2d11789482c115cff677b54948d36dc4de34200bce97be0101d88cee39b177857dd5da3cb0d2f9d6e1150f72a3bd655e0bace1d25a657ba9a7f8dff082b4460432075afb20173da22b49beeb6a030d72ba07869ff4389fc1c28d87018d7c1a9829c21932197":hex:"5cea906737518c2cb901016e30206276":hex:"":int:112:hex:"3a3a771dd5f31c977e154ef5c73a":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #2 [#1]
depends_on:0
2:exp:0:hex:"cd8c2f0c330d5db316dae7a16b57d681ca058864f7bd60f3d0de174442283f77":hex:"e2a5ad295d35031535bf13c2993bd0b292e8a9465b9dab738e59ba03670248a1ecc92b38a55bae34729162271cc1572c35fcccb27417b48dfcbff852a7a8845cc829a4461061b558ac8b5930a5c6491ffba04a9d0dff220b3cd5e4fc2e0f3db3b2ddd90328f2cad819573a7856299620b02f5ee0267f3b56981afbf1b7d9e3e1":hex:"387ee8c1e7f047e94d06d0322eec02fc":hex:"":int:112:hex:"62356850d12b54e39872357cfa03":char*:"":hex:"17b7f6bdfc1993c56dd9bd674cc276a55a46fdd9fd5fe435b9e4b7ebc7052a9dc76a99e4e43aba7d486603189c90d10a21ad3722c86bf5bc856a0f930ff5bca65be708b76bb8a29105da67f31eebcec81f28aaf526d2f8f0feac393a24959dcd612e2b93b4463f61957d2b3046bcdf855e346601e4c7760c0ca618ee7bf55381":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #0 [#1]
depends_on:0
2:exp:0:hex:"7e19e400872eed721d560202cd757d3eb99729496b6e3a6d38dd8afe1066045a":hex:"3fb9abc7aba654dfb174e8899c17db222ffbb387b7260fc6f015b54f1cd74284c516e21aae3b72338e5e8dc643cfafca0678f5bda3a7539f1612dddb04366031b5a3eda55f3232c1b176cc9be7cc07e0ebca674a272224929c401a2530efc6d4eed0087b544b12d172a01bc8340d9c2a2ebcb5af8b07d96073a879fda140c196":hex:"d2b277f78e98f1fa16f977ce72ee22a7":hex:"":int:104:hex:"4c81c044101f458fdfac9ca3b9":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #1 [#1]
depends_on:0
2:exp:0:hex:"d0653934a16fd36c27d54488a1829302b931bed6e26ca26047242b85b50bfb61":hex:"c02347e1add9178d830d8baaad9aeee37e958bedf2cc846e2561fe8c83481d0a8a85911e7f1f6e444b28f30bd96c13c390e80f616feb6844ee6fa486543a2e3f38c138f45b4405e3fb331b64648219aaf1d574be948ccfca6afc18d12488db19c35b05601e47c0af5d49a93a5dd4420f38585c1eb033e173376fa390d3f948df":hex:"94886a1845aebba5ed6b86f580be47f9":hex:"":int:104:hex:"4be34ff42085ef4443c8b6042d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #2 [#1]
depends_on:0
2:exp:0:hex:"d0f0ccb88c7cec9496f26a59ddc67dc59ebe49ae3dd89ef3be008598727e214c":hex:"7845e155f4f28021291e7c814a1ace8f42b239990831aa82758fc1e376cace0b6f668f7f2f224dede1ef5b1df7ae74b2c01483701044acbbb72a9216eec6b7ef0190f114b3c73c6985c4653f11601c774d10b7f9df1f1e1f3ff4fafa20d6525edb37d9e5acfafe6d3468ee068d407fdb56dc718c98425926831253978d727854":hex:"e5ca84b907ac761a5e68a9080da0a88a":hex:"":int:104:hex:"c8f78e4139dd3eaf2baef8aafb":char*:"":hex:"0cc3ede50b0d3fb9ada11300a3239a383c98f968ad65266d57a195bb18d3e568fe6cabba258da4bee9e923c7c838e06dc887a6c49cc1453ea6a227c6a83e651a8742e0316cad5efc93739393e3603446b5c920a206db1434adbb8ebde4d1a7a8699c7f6c61b2d57c9709b564338423b4f526d6c157647a6c45da9dd521061f05":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #0 [#1]
depends_on:0
2:exp:0:hex:"e35dcea17cbf391491ae5ba6056d0dd13b348183474dd4b614742751bdebfc32":hex:"5213542beb044910d7fdeec8bb89de93f350760e493286eaef1140485380d429f74a4279c1842a5c64f3ca3381cb5dbb0621de48821bded650cb59703e0ca88f4e9c3d15875f9dc87d85ba7e4bae9986ef8c203fce6f0ce52c28e3a93befb4cc4ba3d963d2283cd30f9bf6ab99d92f2f4f3aff0b022f1751b89d43ea10bbb28a":hex:"fa549b33b5a43d85f012929a4816297a":hex:"":int:96:hex:"afa61e843cee615c97de42a7":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #1 [#1]
depends_on:0
2:exp:0:hex:"844c50ddc0ac1d9364b21003287d6ae6360d12bbb17a85351362420ee4ca588e":hex:"3a3bf4ccaf05f7c02f5e158dd2c5cb08c6aed4b1ba404a6d8ef9a0737fe2f350b3e22188fc330ea63e35df82f996e3cf94d331c4246cdb25bb2c409762e05ddc21f337edee51b64f1766ad18f520b3f34735b24278d9d647c533a743e0c1e9c81e9dee975cdc47e8582113fd250ef59353605b64acb7c025a97854c1a5c03237":hex:"2f8512bb7e214db774a217a4615139e1":hex:"":int:96:hex:"f1da1cebe00d80eb4e025feb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #2 [#1]
depends_on:0
2:exp:0:hex:"2aae1aa047a20ed2d6d8336d923864cee9404f924031ae327fbfe2d293e1d93c":hex:"8e5b6b9e4e7d01de9a919dd33c0c1eb94dcfebf28847c754c62c1c00642d9e96f15b5d28ad103ff6969be750aadfd02fc146935562c83ec459a932a2fd5fda32eb851e6cff33335abd5c2434ae4f5524d6bc74a38094ced360f4606a1a17096ff06604952c8ca94a9a6dc4a251e13b0e0c54bd8a6dff5f397a1eb1cf186fa518":hex:"3da9af3567d70553ca3a9636f0b26470":hex:"":int:96:hex:"e1026b3d15d261b2fb47632e":char*:"":hex:"58c52ea9f3b162511160eed1a68b6f52b3c4f5834af728de97a3d9e4ba337b29aad12636003cf5be9ffbeae0f383f7cf32f645a8f6fc5cdc1cde91c625c69a92bc434ed671e52a0044a48f3fce55cae49a7d065c2a72603a7efe58b5a7b18ac500d1a51420e820357e7a439b1c02198ebe3d4e62d5573a3aa5f40900a21e3b41":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #0 [#1]
depends_on:0
2:exp:0:hex:"f3d69208cb0d27474e9a231cd46eac7c1574fff950c48bbd1ba03fad16f563df":hex:"0d1f06eef5e8f2c81d1a73bb1dca93c22cfb6e40e9948bc75b0d84830fb9216330424f580b89050c3fb3f620eca8f9fd09fb86d2e8b3a0869c6022d8a705fc280d66fd16d3aba7395d6be4bed44145d51d42d56285f3675726d62d94c081364a6d440511de83a613c598b03078e2ec7648c6302defbbea66aafd33e1a4b1686c":hex:"b957f05921d21f2192f587768dc12b4f":hex:"":int:64:hex:"322374fbb192abbc":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #1 [#1]
depends_on:0
2:exp:0:hex:"cb2cdeb17fa6bcb006c7fc60858a12a411804464458db351957e8caf42f1ee6c":hex:"296504131354b2c1928982f12d408ba2377f2d4bbe87e4c69f92a15bf6003910a43bda6c8929df66b3ab1d202a5258cad199f32f36cc30d2dc06199c2a52f7ccadad1fce50123c5f8434dec57cc60cc780263d7aace8f59cc8a6c54bddbaded3adb12ae2ee0bacf6a8da635ff85b51a4e8a1b3dc404863b90059de4ad0f158dd":hex:"31bd7c971a6d330b566567ab19590545":hex:"":int:64:hex:"efc5a1acf433aaa3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #2 [#1]
depends_on:0
2:exp:0:hex:"f94170790fadab3240df568197f9d6f6855afaed8d07eceeaa2380121872529f":hex:"ed231b78db082f652bc6310c396993b52de804a82464fa3fac602a1286535f59c67fc2b1b420c7321eb42b971edde24cd4cb9e75c843f2ac6fb8ecdad612d2e5049cf39327aa7a8d43ec821161c385f3fdc92284a764a5d1cbae886f07f93017f83a105bb7c3cc4fc51e2781516a2471b65c940ddae6b550ad37b35f53d7cc64":hex:"2f9c0647a4af7f61ced45f28d45c43f1":hex:"":int:64:hex:"ab74877a0b223e1c":char*:"":hex:"1cb5ed0c10cee98ff8ecfa5a1b6592391bbd9f9b1dc1ff351e0af23920d546b5e27d62b94daabd32f7f96a2632dc9fd7c19bf55f3b9b7cd492e76f4d6b0f5b437c155c14a75e65bfc4120bef186da05e06a2fd3696f210292ee422ddbce6e63d99ee766b68363139438733c5e567177f72e52ef2df6a7dd33fc0376d12ec3005":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #0 [#1]
depends_on:0
2:exp:0:hex:"797c0091ff8787fe7cd0427c02922620e7f6fb71c52ddcc03a9f25c89ba33490":hex:"2d3efc8900315c3691a8e3c9de3319d4deaf538fcf41aa0e295b861d0ac85baf56d149a6437747dd6976f44016e012b88de542fb8e5b9e4ad10c19deec4b7c0b69bc1b2e33d44a981ded66127dea354b072010b8dc24b85ed2ffeea3b9c0e931619dbbf22677691f0d54fc03eaa162e0ab0d760ad41021f67057c0d6ac19ca8f":hex:"69d81c73008a6827a692fa636fbab8bb":hex:"":int:32:hex:"be2dda5c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #1 [#1]
depends_on:0
2:exp:0:hex:"90ce1afb5500489b9edbad987f4009509c847b3e55cdf0c764ef2fb085e3d033":hex:"98482b54edce2bac1cd64d44917dcf117ebfbfe26ad17a9b263447028304f1cf5a69559c05b5d833420f4fddb6e308277d01eb4b3235f1c4b47d33d3899325b55e7be19d43187a5b1b1354ce02a529b3df1c13b4883902ae9fc565079dee825e705f3e580371e4fd86c3b0d31bae98adb529901f346ca07127314152b4370edd":hex:"e119e166471ecf44bc3a070639619931":hex:"":int:32:hex:"b2f54b3a":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #2 [#1]
depends_on:0
2:exp:0:hex:"29264a90f114a800c0fc3247b3bda00981a12a8f85cf3a19ea4c7ffdd005f4bb":hex:"587c8e53ab5ae8c31e16160b4a41d88798e27f4ad61c573c023c62d4dbb3952eef5026ad7b453fa9e0694347ab8fe50a6cf20da566202b81e325cee9c07ab2d4d53ed45b3ec2d2135936515f8a24f2a8116807dce9df3c44edf64c32647145152ff241d9e018e4101e400af070192dc3b498b5a213d265b4cfc8c8d4d7deccb5":hex:"cf296aa43cb7b328e09c8975e067404e":hex:"":int:32:hex:"56015c1e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #0 [#1]
depends_on:0
2:exp:0:hex:"84ff9a8772815b929d55f6052c0354cf3e02bcc8336fcfe5794952b4c45d5d96":hex:"a87de56d49725a1625baf12fd15931fe1a6783dce5d1e744eba108f45e0c105d8141dc027d0e33ad7efb6752b43729715e2f3e2c42ebdab4d5f72f886bd821c4372244699ddded99a63dbe7763a5a3bc21cbfc253cdc2514eba2a4f54e24dca7c207cb3f6ae80153d77fe0641f357d5a073dcd425c38deb77c45f27427345516":hex:"5c044a66e488b853baf479f7dee2aadb":hex:"00304e3d40cbc6d2bee0778462884f4ec047a8c74bb3dd7e100f2b9d0e529fd24730063986117b56ca876b208a3691425ac63afc3d504ccb499c76622eade09717023fcb7d956b01ce24a3e53cb5da472be3fcf5b278b5d9e377de22fab75bc74afa9670f5fe9691aa0ed77e43f6abc67a61ec409ec39fd66ac0307bf195f36f":int:128:hex:"72ddd9966ede9b684bc981cbb2113313":char*:"":hex:"aadb8537309940422f67ca393aa6182d67fe7c52092538a15e98a4254f0a9087c7f10903d5e78078c2e55de914dec8b6b35cb720e3e55963c0ac9901e44b83a0e7c5b2d3f002aec0a4a08354febe47b2abb955f2a21107626ef0b8e1e099650812a6fecf36908fce2d078c2735cf7c2b970a309e5c6d6ff29c26a05720c57105":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #1 [#1]
depends_on:0
2:exp:0:hex:"b5ca3991d0160b1729ae1a622dcf4b03b1f4ba86150bd66bf35cbbee9258af10":hex:"62aad5854a238f096bdde0711ac6f5763e7fea29db068ea8c911f17ba91e6d7807883e6fc5ba7db17af33da2b00973008a3425e65cc786ce1b97360019ee2cef74563d54752be436b905705b507c3d62689df4edf0356d26b693eb43d8a2a927a9f3866b7e0e19e84a90447bd6f47e31070fa7c2a71e3f78229ee19fa47e848f":hex:"f8402184d1cc36df07b68ecb1ab42047":hex:"d378cfd29758bcbd21e26a324239c42c992941b3ad68d9f2b3d2def3a051fd172ee882562970ef59798ff8d9eb5f724ff17626156f4cf5d93e41ffef6e525919af6194ea9bbb58c67563d3ffd90e5a6e2a3a33bd1fa3d55eff5dba7cd439d571f7e08014c4780e3d10904ef22b660897e78258da20b2600e88d71c35ecb6329a":int:128:hex:"9e8b59b4971130557aa84ec3ac7e4133":char*:"":hex:"556dd32edc0af3c64186fe8c000ddad1516cd14721c93c228e379d4f87e32c79e734539cec930322048f34a2b34931c585d44f09966caf187ec4b9244c991a8a5f263e9da1d08d6086e52535afdb36c7662307521cbceb9ecb470a76970243723fbc1613b6ebbcae261ac2f1936e66ce29ec7350b2e6b2f73a910ade645154f7":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #2 [#1]
depends_on:0
2:exp:0:hex:"df867d1dd8a287821a54479cab6f88636d2aca30e1bf01a5dffc735e17590356":hex:"6517272cac85d7f38902bcb4b96a0c59c4bdc46bfefa6ebacd7f2fb1629b87ca91de2ffefc42ce3cfd34dcbf01b3f7cadcea3f99e6addf35d36c51f2ceb1f85c1f56a04ec9c9fff60cd7fc238674992183ea3de72ef778561b906202b7b83fe6562a0bca9c1e0a18638e8685b998b4192f5120435809ad6e93a0422d00725262":hex:"35019826c51dd1ef07ff915d9ac4ea96":hex:"0375ed93f287eefe414ab2968844bd10148860c528dbf571a77aa74f98cc669a7fc317adc9f7cf2d80dda29b19db635b30a044399f3665b6176ed669146d28f5ada03b3d32d53fe46575a8afcd37f20386d9e36f7e090b4fefadfab7f008e02f1b5022c0eeb81d03443a276eae48c038ed173631687d2450b913b02c97243edb":int:128:hex:"e49beb083a9b008ae97a17e3825692f0":char*:"":hex:"723be39bc13adbc48c861b07753f64fac1ae28fc8933acba888b6538721df0a8b91c040a26522fe0dbb7335d8f63d209e89f7cde23afa9ca3c584b336d63a91e07fdd8808b14c3214c96a202e665bbaaa34248ff30348f3d79c9f16e66ad6c5903305acd887a89b6244eb7c2d96e18b13a686de935bf3821444ee20f48678be5":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #0 [#1]
depends_on:0
2:exp:0:hex:"0e8e9ce6294b7fbc534a96bdd060120976a6e08315d2ea73ac61d085cd462a44":hex:"9855f186b51358f0e2111c06bfaaeaec9bf95c55e246375c614fad9883d86c82a20c86538dc5f42a0ea69677d59a20c5112d15d2a8396f12096242ad5d7b838d16ee0679fc4017af75bc15e8ad2f77b0e802c864031cbfb0bacd95c828d1db4b7bab0713619e9e5e8fe6902aac7a9e6c42eb05f5b156f7e663ee43e6fdb62480":hex:"4edc6be20f904b4789e5bee0a80a3fc8":hex:"db28ce076b360816cd1e04b7729f8ab080e0a07f35204350f3bd056945aab8638c0e8311ab056f3e5debdbfbb03fae700770264faf73e0f3a05a5812aee84ab613c82f4a76da276250675f6a663f85e2c26d4f4a8666a7f4cedaffc1a7218dec11ca4e72b8b5d5b620d1efbd3d3b94a5ae0d118b9860dfd543b04c78d13a94c3":int:120:hex:"03cfe6c36c3f54b3188a6ef3866b84":char*:"":hex:"e10142f852a0d680c983aad2b4609ccbd35ff61bb3eb66442aee6e01d4cc1cd70f45210acbd506395d6ca0cfebc195a196c94b94fc2afb9ffa3b1714653e07e048804746955e2070e1e96bff58f9bc56f3862aaa5fe23a6a57b5e764666ddec9e3e5a6af063f2c150889268619d0128b3b5562d27070e58e41aadd471d92d07e":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #1 [#1]
depends_on:0
2:exp:0:hex:"886c77b80f5f3a21c01932685a540b23629f6d41d5574fc527227ed0bdf2e21b":hex:"53a17d7b69f607f08676d6f6dd4e8db08e01333a8355d8c87616e84cdf10ef5b041fc6ddc3f6a245c0f534c2b167064af82f45e4702a5e8dede59579fdecf6713353392433950c9b97c38d9ee515ac97d0970ccf03981954540088567a30941bb2cca08cbed680500f8342faa7aebbc6c143e2ea57ba6b4ac1fd975dcc5d0871":hex:"5ec506edb1890a5a63b464490450d419":hex:"05b8d820c9f439d7aeae5c7da0ee25fb0dad47cc3e6f3a47e8b984e856201546975f8214531fc3c2e504d2ac10fa49cb948596b9a8fab01b95c49d6f04d1589f93b77b899e803dd20e1f00a51c0b5953e85be639109b14b100e35ca26d84ea629964b0db8260dfa5a150a66261bf37e79de2ec49e9f1b082a7c58ecd3d39b6c9":int:120:hex:"ffdf56e1c1a7252b88422787536484":char*:"":hex:"79ee27adfa9698a97d217c5010ec807806feda37db811e398c3b82abf698aece08561fffc6c601d2691738e279eeb57e5804e1405a9913830e3ba0d7b979213ef40d733a19497d4bb1b8b2c609a8f904e29771fa230c39a48ebb8c3376f07c8013fff6e34f10fe53988a6ec87a9296c0a7cfba769adefe599ec6671012965973":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #2 [#1]
depends_on:0
2:exp:0:hex:"5231ca6d772edd9ea2d251e22d7d455928c22474b4b44130dad57e6511fed6ee":hex:"2767c808410ee132291585ea74a48ad3102f883f07d060c91c5f10abd37fe0996d2210dc490260238ae15f5d74c7be2a1e15d80db09079c520047f88488a7802857a3fc3b81d85a96949997430a880177880a31d4d0c9c9045247804f057a4f2756d6e40375a4a3187c4376d6bf573ce334cda1ed88d8a50db499e7cdb89d8db":hex:"048698a4a0feabc1f336112e2794795a":hex:"3a81b6b0b722899ff931cb73c39222d555b83ae3f8880b982593cbc1ab8be90d1ee32fd7dfe697cf24c95b7309d82c3fed3aa6b3d5740cc86a28174ac8f17d860ebb251ac0d71751c2ff47b48bfb0b3beb4f51494464cda34feaecddb1dbbe5fa36c681ada0787d6ed728afc4008b95929a1905787917adc95f1034fedcd817a":int:120:hex:"ba61edeb7b8966188854fc7926aad2":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #0 [#1]
depends_on:0
2:exp:0:hex:"5a3f516a7898e04e5da4efd6c7c5989b77552d195464620c2b35b9a4fda29cce":hex:"5cc28b61ae97557774bdcd7ff653f4aa349df68d53c7e5a65263883ef1fe224ad40e86bffc2d38f28a2ed9ae1fc08563e2a1e46246106546eb8e6064c06baa0046fa137421734b7f0f94656a4f459d9d981717557d843700d116b6e5e2dd3af5f67c34edf31b40b71fd3c6f2475f9310feb70bcb973be52d41e86792c49d54c0":hex:"9310af6974890c0a0364231f9cc8103d":hex:"2103af8356bcb9dfc2a4f1d4ed09cbcd8e1990d23865605e19f87feb50bf8d10d0257740e5557a9297f0499c01e29a1a513ca18e6f43f7406c865cbe3951a7771128f3110c8da3bd696368901944549552842a1f6fd96cc681b45da098f3c1acb3d237d2363285f520d0b6714b698790b7660c52ac84a42c9721ac7e9d38a2ef":int:112:hex:"993fc8e7176557ee9eb8dd944691":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #1 [#1]
depends_on:0
2:exp:0:hex:"59c9258554363d8a885fc0f5d112fee08eadfc7ce52a0e7e73e3d0d41d9a0290":hex:"79c491411402ea7878e480519fd984dde44bce6459303bb76d4eaf97d4e345d1aafaa68ceb0590b41cfed0f411b675d9344c7e888cccfc9eb6fe6b229d198f94ba516ee850ee7f078a4f5f32a23f92f72264e3a76a31ebd042564315ac4f2ec0bb49ba6d08cfd2d3a6308688e39f28e3ecd669c588368cee8210edf5dbefb925":hex:"77e51e89dc47bbcac79cca21e81a61de":hex:"25a6f8800a9b914c0ebf9a45d72355c03ee72a138eb81b2980f332645ce1d7aa4659805821866aee2b276e2c032776b4eaf36f93b5f9a72b791be24e31eff105ca6d0700e3069ee327983dd7fe1c7465d6c6d77837aff69055149988e7199847fad98605c377d997dbd40f3e2ff1a4f978a493684e401249e69540fbde96323c":int:112:hex:"ee6d85d3f3703b45adb4f9b2f155":char*:"":hex:"44ca68deed5478074adfddc97f06f44c08bf7bca4dee8707d621fc7396fe2efcdad0a167d1708a9ff59ce4cddb86920bf1dbdf41b2109a1815ffc4e596787319114cad8adab46cf7f080c9ef20bcf67a8441ba55eac449f979280319524c74cf247818a8c5478ea6f6770996026a43781285dd89c36212050afc88faa56135fb":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #2 [#1]
depends_on:0
2:exp:0:hex:"5e9eae594cb54c8089330e4404ff79abb1c0841b0be5347a14633ad1e1ff44fa":hex:"32abc1eb6077555a85a0a6fd1c78cccca6c8b375842e2eb8eee45ee6c38dc0837443d16c647252e8124639dd01c808ac5e857a25d927c2a75e2fa8955cad5beb5c206fc050cd933fc4621f5718936f01f39dd700ae1aee7537cc595df8789c5d1a6e1e87b1c7a60e3ce5d57c80dd65dee3801798e1481b1963bcc78cc69f8c50":hex:"0917b486da754f48bb43ecc8766a7ce3":hex:"2aa1ef2f91aeba5da10b48a882dbd4574df4e9157a18abf8cecd03e4176712ba171b6ecb0e745841ff84e35063e47b08101afc44cfd9cededb913a82f00b9d4bac922f23a22f200642270399896405d00fa5271718eefb4cd5fe7e5f32097766ebff36ff1898a1c8a1a01cc18e6121e470805c37ff298fc65ef2fb1b336d09fd":int:112:hex:"92282b022e393924ab9c65b258c2":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #0 [#1]
depends_on:0
2:exp:0:hex:"aaf03c3055a35362212b9b059931e7a24fc71e32bc9a533428c9dc31077f2ebc":hex:"c0e12cdd8233878505e025d52427536be7b6bf1887d2dd20eac7092db80b22417a3a4ca83cdf5bc5e36161be1ff9b73f7ceb297c6d07c9cb2a75035a5dc079e48283daea60596f4b356ca28c243e628cbe459f069709fe193394c9b1a31d8ccc5a3a4eba30056c415e68571a2c34bb5c32efff12e9aa483c4a68be5e76aba4cd":hex:"7dfccd077b29e6ed5720244bb76bde9f":hex:"21edd1c6056f51fd5f314e5c26728182edcd9df92877f30498949098dcde8089eed84e76d774ef8874d77125669a302d268b99dcd66b349d0271dde6f8cc94dc4f2df3787887b1173cad94d067e346846befb108005387102854d9387d2c0fbc9636cdf73a10d145f4b612c201b46e1ff4465f6a7654ce3da5792daf9a27fb35":int:104:hex:"6154c6799ad7cdc2d89801943a":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #1 [#1]
depends_on:0
2:exp:0:hex:"60c775971a9eac7950ed2bdd85bd60fe948ba04c419f6743fb67f37557e46c6e":hex:"8abb2e66a4d08074916056bb8e925551372f737f0e1b597c5d08ee102989743a273b29d7281013f8b3aee2934399cb427370d70370ee86eb41584b653660c633506a53cae747826bb7d93909f069d5aacf058b7f2bbdc58ea08653db857bda83a979fc22a4f126dfef7aac45177f4cdb802fab0c812fb35d12a8176ec21336d7":hex:"9b92ad7079b0de09c94091386577338b":hex:"1f6a84b0df75bd99a2a64849e9686957c6a60932ebe898d033128be9b757e9890225925d856bfdc33ff514c63145f357730bb0435c65342bc5e025267b410af6fd388a5eca01b7efc87fd3b1b791df791bd47dfab736350d7b7f368b4100e04c939d5af957bab95ed502dac904e969876674602a0f0790da2d7351b686e46590":int:104:hex:"1d6cd4ab3914e109f22668867f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #2 [#1]
depends_on:0
2:exp:0:hex:"3b426e449337a14bc0663246ab61b671b523c9a3130c21ed59c93fa6a5aa5ae3":hex:"291bd5a00d71eb7d547b7c94e7030ba4a947418eaeb378a3bacd304b08c6f92f6958eaba968ac6aa23e0512a2a8ad7c1ca2f8fcf623bfc1281f5b7b598c08d2aebcd447668b23238c5e338b4c2ac7f8fd381714c596ea3e0c17aca4317a08563e58f0f52a8af08e078dc242ae54ee0fe3869f8c9687b004a4ded0aa27d8f4c5d":hex:"e6efc96acd105fe4a48d1ac931eea096":hex:"0902cf7a0685444126369712ac47962bc2f7a3a5837f1b6190d9ab1adb4cd35e7f0892eee628b8e07fcf2b598cebe1ec07d8c4823172ae66a135bb51cc71590707b691a66b56af1ffe38772911d11685da355728eaddd83752d21c119d7b59f4c17c2403629fa55cd70cd331aed7b0de673c85f25c2e9e0267f53f0b7480c8ca":int:104:hex:"ca4bfeedcd19d301d3f08cb729":char*:"":hex:"bcef3f2fd101b828d36cb38530cf9a0a7a285ac1c55ee1069cc78466327e85887534c98a8891d579effd832c0f7d6e7e822fb1eea85a39317a547591def4aeed6660872859fc9d1df9725d3c40e9ccaa900e0f1426a55d20ac4f2e8e07bd3bbc687f8e059ab93e7604c97e75ac94be1c8c24f4c4da0080a4d77953fb090cbb62":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #0 [#1]
depends_on:0
2:exp:0:hex:"ceaf204ff504ea8e7fade1a2097f2b527a44766860447322fa5ad346cd810217":hex:"1c8e4cf6018211518494d46c2e0607fa42e236abc28d58f8175c530f84b1f030572f5f6a74cb5517e1fb999a637d352afcbeadea9121e695675859b66b499a3a351ecba5226e58ebbb59fe12e359e4c89cd51c8703d4643c49921ae495801c73627df404b91e828e1d0e03ae09a39defb5aa5f2c8106953772ba0713d3261329":hex:"cfdb8183251f4b61c64e73243594fdc6":hex:"a60f3969fd1b14793dd1425aa0b1f742a4861e0b50eaffd1525cd209ba6d1252176763bb5bee59aaa55f92341cdc0705899aba44cf0ec05cbf80274ebef65cd9507fd4224b25cac19610968d6a37e2daf9ddf046ef158ef512401f8fd0e4f95662eebdee09dd4a7894cc8c409be086d41280bd78d6bc04c35a4e8cd3a2e83be3":int:96:hex:"9e45029f4f13a4767ee05cec":char*:"":hex:"5cdc66b587ed5eebb04f42b83a6ab7017093514881c598cce332d74fa3fab927493ac15bff26835296e080b5b45ef907c0529fc2f4ed2fc09db179ef598e5d193ea60c301d3f8d823404814e3e74de0e1d2417c963e9246c353201c7a42659d447376e7d05c579dd4c3ae51c2436407b8eff16ec31f592f04b8013efcfd0f367":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #1 [#1]
depends_on:0
2:exp:0:hex:"15652abe38cd09777bba21d0db04637f5737d3cb3922181b9f2d07bfdafd327a":hex:"1d6c153dec3b4738a09c9fbdfe31a093eb7ea79b8fa49f83e5e1f46893590f074fb171fb66e30ef887767014e3a10a3aa05da2bd50dd7b7936e1d7f6f31af9030e31e76bdf147f4396464db0f6a72511c4885c6c2305d339906e3c761a3249d7ebea3bf463e8b79c3706e684575550e964b8047979f7aed6ea05056c4b5840b1":hex:"3a5e0d223ae981efb405566264e3e776":hex:"cd755437cb61b539908e0cfaaa36c0123f8f17d1e6539783cb61d4b56cac3bc1e971c1ea558b12669b025cb6b9ad55991c6e2f8ee8b0b7901790193e226a0fbbfff7ff0bee6a554660b9f32e061b6c04bf048484ff9ebd492f7e50e744edd72d02c8fd32f87f9421bf18a5a20ebb4d9dbe39a13c34b7296232470e8be587ba09":int:96:hex:"01a573d8e99c884563310954":char*:"":hex:"162430c23f7adcf98575a2d9249b4b5cec42efae33776360ebfa6a19c8eee4bd6b07cbd274deadc3292b7cdbb7803e99d9f67ccc5077f3ad5808f339a05b3213dbfd11377673d4f9b486a67a72a9ac8ea9ba699861dce0de7e2fd83d3ba2a2ec7fabf18b95a2bbe2184ff7bddd63111b560b3afe7f2c76807614ba36c1b011fb":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #2 [#1]
depends_on:0
2:exp:0:hex:"a43f6d07042a15cd49f6f52a2a3a67c6c2ff420d95bb94b9fe03b287c3abcaf8":hex:"b67e58c8b608724fd20aa097ee483bc4c804490cc79de635170944af75c87ae0ad8261365c1dc80d852553bcba18da9fbc3fbe61d27550a03003ef0c60202054626655509a9e1ab54677e537a4e761df011d6c6dd041c795446b384161ae9eab441afd24d19b58eb4fe5116cd7b11b751ebbd0a2adba7afc380d9d775177099a":hex:"3b6fad21f0034bba8b1f7a344edf7a3c":hex:"2e01c0523c8293fc51388281dccdb8d0a2d215d729289deb327b8142d716c2bb849e9476545b82f3882ba7961b70c5da2a925ba18b6b121e9215d52ac479c9129c9cd28f81584ff84509d5f9dcb7eaae66911b303cc388efa5020ac26a9cd9ea953f61992a306eb4b35bcd8447eea63cef37bb0c95c1e37811115cf26c53e8c5":int:96:hex:"43470bc3d7c573cb3a5230f5":char*:"":hex:"e1720d451fa7ab9db4988567187244b15b6fe795dd4fef579fb72e41b21aaa436d2e5d8735a4abd232a3fb9188c75c247f6034cdebb07fd7f260f8e54efefa4f2981cafa510dd5c482a27753a7c015b3cae1c18c7c99a6d6daa4781b80f18bbe6620bfc1518a32531017a1a52aadb96a7794887c11ad6bdd68187ba14f72a4b5":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #0 [#1]
depends_on:0
2:exp:0:hex:"1f0f0191e18db07c0501dbab4ed952c5603a4cd249d2d8d17e62e10b96ae713f":hex:"aad40e7866c26e486b6f6e8eb14a130d5f88891bf0d09aa8fe32f447ab8dea7bee5d3eda4499c0103a010483f2b64fdf1155499d31decf528c77dd7627884f9995c213cf7402143dbb7561d69c86886734260ac94ffac7eb33598d25714228ef43f744ec1af2a87e789f1e5d6fff0fbd5082dcc49328f194e8f8a14a5bfc962d":hex:"ab8be16b4db809c81be4684b726c05ab":hex:"a5a6e828352a44bd438ad58de80011be0408d410f6e762e3145f8b264a70c593476b41bb87875746c97de7d5fab120bd2f716b37c343608ee48d197a46c7546fafcdbe3e7688b7e9d2f5b6319c91d3881d804546b5f3dbe480996968dd046f406c11f0dc671be0421cbc8b4ea6811dd504281518bb96148dddf9f0dc4e2e2436":int:64:hex:"d8bd7d8773893519":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #1 [#1]
depends_on:0
2:exp:0:hex:"a6cf7d83137f57f2310ee6bf31e8883952bb07ccdc12f516233ed533ea967e5d":hex:"83ab20698fd7573fd121976a72b45a7f03aad84702fc8ac73d6926eabd8a546895aeffe4ba81d117507e2cd37d58eeff71cc3afa8a4449be85f228ea52f6dc6395bb43c1c9f795343720841682d9b2f00602eafa4d4cbe297bfc62467e526b9d823cc8eeecd9e5f8dbc2f65610663c6f37b3d896651b254bd60215629ade3b2a":hex:"f17e37e73a28c682366bfe619cc673bb":hex:"0f4dd201b18e20230b6233e0d7add6f96537dd4e82d3d0704c047fab41af5faf6bd52bd14fa9a072f81d92a2ce04352f0b66f088c67102d2d127a9850b09ff6087f194a6e8ccaba24091feb303eebb65f1203b2d22af44e7be4de71f03e6f6cbadf28e15af58f58eb62e5bddfae06df773cc3f0942520de20078dda752e3270f":int:64:hex:"74110471ccd75912":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #2 [#1]
depends_on:0
2:exp:0:hex:"b0c85ac6b3887639838ddca94c5c69f38115aa00122322c8114642d12ea1b8fe":hex:"0210fce418e7e2199cb8f899c81b9be74a630d00269755f882fc4db27632e99685cc12c426a7503473646df1288d0ede28408be9add5713628700f8e2b2e27d7522520ed00ac47239084651eb99e7d03e1520aae137b768f3144232c16b72158fd5da4a26a2525b9b27791bf06d1eb2e671c54daf64fddc1420bc2a30a324ba5":hex:"14f68e533ecf02bceb9a504d452e78c7":hex:"796a46236fd0ff6572b1d6257c874038f870aa71cbb06b39046d0fb6489d6ae8622b5154292ae5c4e1d5ff706daedb2e812533ae3a635d339a7fbe53780e3e8204924a5deb4b6856618f4c7465d125a3edffe1ab8f88b31d49537791c0f3171f08dbb5ed1d9ed863dafbae4ecb46824a4922862fe0954ee2caa09ab0e77ed8fc":int:64:hex:"6fb0b5c83b5212bf":char*:"":hex:"5e6c362f7587936bcb306673713a6f1fb080783a20e9bbb906456973e529cfa0298206184509c30e1d3793eaaa5d564edd4488f04311821eb652e0a1f4adaf6971505ca014788c8ce085ceb3523d70284ed2bb0aebeba7af83d484df69c87f55a93b3d87baa43bd301c4e55eb8c45dcf3e4612535ea1bd5fdb4c3b9056d0cae9":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #0 [#1]
depends_on:0
2:exp:0:hex:"e61b1a6b40e2ab1245ff65dcfb9948318ac4fe55e9ed600cec301dae32ae0e93":hex:"8d67fa9fcf078e421cb63abeb25dba739ab0e09a091dd06b0c616e1e888f350edb2d73a42f57f115266ea20c7f8fc143ac746649612df06a5e29b4a15934dc049be1ab49d018ab86c4f37d8c3d9c714f038029e74d8ee3dbe61d81adc63712ea413b37f7604da12107aa1695d9b0981e5a92cdfaa5fbda0e31b22c6fd6f3b499":hex:"c356244b3034d288e4d4fe901b8e27c1":hex:"bdcfeb09d5b97bab05a7acd9849e7de2c5beb7a4dc573c7e1c1d0c0409245a6584023114fdcc6413c800ca16847bde750b27c4d590248e2ce457c19b0f614f6aff4d78d4a19b3251531e5e852fbb05d09412cc1ff8988d1955ca6f5fe2d820f20a7642e3ae69e8122b06ba0918e806400b9b615e1abe6fdd4f56a7d02d649083":int:32:hex:"86acc02f":char*:"":hex:"7c73182eca97d9617abb478a6ce62e3491a7e9951981c89c3071b161a4c80440614c3f24d0155073e28dcccee96bc8303dab4901ef77318df522d16d9da47770ef022395d6104cd623d93d67090a27507fc8ca04157e7939e639c62cd0e7d8a472314833c0eaa9ba2fd54a25b02854e3bff25cccd638885c082374ae520ed392":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #1 [#1]
depends_on:0
2:exp:0:hex:"4f5a02e9843d28c8c226ed70d44b8fced8fb757ab6ece4d4f06e3c3cec79e44f":hex:"3ec13950d329f24074714c583bdc35686b811f775b76b0a8fcfa66fc56426c9d022f8ab0af38f8d2f71a068548330cdbe891670181ed7491bf40c739ef4dd93689fd35929b225089d2b151f83d9b3cd767300611144586767354c0491112c205409f3168092d27f9b9f433afb79820a2811984d48e70c1fb2a13bbb3ddbc53fb":hex:"099e5d9aae89fb6391a18adf844a758e":hex:"ad93e8662c3196e48cfdb5aa3bc923cd204151aa980cbec78f0d592b701f779c1c49f9e8686d7e2385a4146b21a643a59c18c8b82214f42560bcd686fad7c7c8e8c1944ce6b20ec9537dd14b6cf2592740ca112f4cd582250d69f240d3e957040e1f7e19c60b3c8f2bd00cb666604c38946eb9b2f17336d281b4794f71e538a2":int:32:hex:"30298885":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #2 [#1]
depends_on:0
2:exp:0:hex:"1cdb218e0bd0e02156e5b48182990f778889793ef6018a8928e61164ac047c8e":hex:"4d039618a0eb640329f90fe97de18bc928fc3fc7a0db42c97774bec2e882e872fc1097c8319f7837a16516bf387b1bae321c565e8fc1cb8480f051158e4685f0adba310d2c6253bc1300403cbd3f7ddcb2796a69f8bf9e73d47aada9a02673c1a3d5ecdac838abf22b385906236529a1b7dd5b8af2611a04cf4f83b15ba41cfc":hex:"d2ffbb176f86bee958e08e5c7c6357c7":hex:"bc580c4223f34e4f867d97febf9b03629d1c00c73df94436852cafd1408c945c5474c554cb0faf2bae35d3160c823d339a64ebd607cf765fa91f416fc6db042bc2bd7445c129b4a0e04b6f92a7b7b669eb70be9f9b2569e774db7cb7ae83943e3a12d29221356e08e5bf1b09e65f193d00d9fe89f82b84b3b8b062e649163dc8":int:32:hex:"1997daa9":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #0 [#2]
depends_on:0
2:exp:0:hex:"dc1a145c18bdbca760f35eea0d4a5992de04a0615964ec8b419c8288ab1470f0":hex:"":hex:"7f8368254955e1b6d55b5c64458f3e66":hex:"":int:128:hex:"8ddaa2c3ed09d53731834fa932d9d3af":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #1 [#2]
depends_on:0
2:exp:0:hex:"7b4766d3a6615ee58b390daa228ae7a541c46ce80a1efe227cc43cb777df3232":hex:"":hex:"274367f31ec16601fe87a8e35b7a22dd":hex:"":int:128:hex:"5f3a757b596e06e9b246ed9bac9397f9":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,128) #2 [#2]
depends_on:0
2:exp:0:hex:"d19b04055bf6e7ff82e89daef66c9d8319ab25f9197e559444c5729b92c4f338":hex:"":hex:"796efaff4f172bef78453d36a237cd36":hex:"":int:128:hex:"3b445f38bf4db94f1a9ec771173a29e8":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #0 [#2]
depends_on:0
2:exp:0:hex:"7ca68e300534a90a7a87ca9906e4ac614a6aa51f769b6e6129753a4f83d10317":hex:"":hex:"45e6b23f8b3feefd4b0ea06880b2c324":hex:"":int:120:hex:"6c0a1c9c2cf5a40407bfa1d5958612":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #1 [#2]
depends_on:0
2:exp:0:hex:"a2b7cd693239bbc93599d3d12c9876e7303b227b8ae718e2c62e689e1fd62903":hex:"":hex:"548c9c8fcc16416a9d2b35c29f0dacb3":hex:"":int:120:hex:"3aa21f221266e7773eeba4440d1d01":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,120) #2 [#2]
depends_on:0
2:exp:0:hex:"156b854beb0c276a5e724f5da72f0d1ca4ae7cbd5f93a2257d95c2e5bfd78ad4":hex:"":hex:"a5129e2530f47bcad42fc5774ee09fe7":hex:"":int:120:hex:"6bb09ed183527c5d5ed46f568af35f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #0 [#2]
depends_on:0
2:exp:0:hex:"d824330c60141264e1f709d63227a9a731bcc42b4adec1d8f0161b10b4fdb2ab":hex:"":hex:"c5afaa45312c64ab3c3cf9d6c4e0cc47":hex:"":int:112:hex:"55952a01eee29d8a1734bbdf3f8f":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #1 [#2]
depends_on:0
2:exp:0:hex:"b5517589948d8aea778df6fd66c17a170d327f69e504f0a4bd504c4286a9f578":hex:"":hex:"6404b111c6289eefa0d88ed6117bb730":hex:"":int:112:hex:"637f82e592831531a8e877adfc2c":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,112) #2 [#2]
depends_on:0
2:exp:0:hex:"f6137b2bcbd327fbcc7f313efa10f6ffaed30e4782e222e1225c87103fcae905":hex:"":hex:"3b87b08337a82272b192bd067e3245ec":hex:"":int:112:hex:"1f2dda372f20ffddd9dd4810e05f":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #0 [#2]
depends_on:0
2:exp:0:hex:"b5e70d1b78e931abf44bba3f937dbc344858516a8a8afe605818dc67d0c3e4c4":hex:"":hex:"58e70095c6f3a0cda2cdc7775e2f383d":hex:"":int:104:hex:"1763573f7dab8b46bc177e6147":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #1 [#2]
depends_on:0
2:exp:0:hex:"90de0c047d1dd01d521f2dedec7eb81bc0ace7a5a693a7869eaafbb6e725ad7b":hex:"":hex:"d565c9cdfb5d0a25c4083b51729626bd":hex:"":int:104:hex:"78738d3e9f5e00b49635ac9a2d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,104) #2 [#2]
depends_on:0
2:exp:0:hex:"c43e8dbeafb079692483a9fcbab964b76fccca6ca99e1388a1aa9bf78dfd2f02":hex:"":hex:"f2bd4fe0d30c0e8d429cac90c8a7b1c8":hex:"":int:104:hex:"ea7b52490943380ccc902ca5ae":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #0 [#2]
depends_on:0
2:exp:0:hex:"13540919fdb95559e37b535a427efeee334309e34c4608459e204d931b8087e7":hex:"":hex:"c993c1802df0f075ce92963eb9bff9bd":hex:"":int:96:hex:"edfab013213591beb53e6419":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #1 [#2]
depends_on:0
2:exp:0:hex:"2a7b2e07c148ff0f627ae28c241a395876bbed0c20f3fd637330e986db025714":hex:"":hex:"8f7e1621c2227839da4ea60548290ffa":hex:"":int:96:hex:"f9da62f59c080160ec30b43d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,96) #2 [#2]
depends_on:0
2:exp:0:hex:"b3e7837a75b38ae6d4299a1ae4af3c2460dfca558708de0874d6b1a5689b8360":hex:"":hex:"05d363b2452beff4b47afb052ac3c973":hex:"":int:96:hex:"6b4a16d1ea1c21b22bdcb235":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #0 [#2]
depends_on:0
2:exp:0:hex:"9df3ccd95f7570f6ecf5e5329dcb79bcd46cbcf083fe03aa8f5bd0f645c6a607":hex:"":hex:"774f4e70a7577b5101c0c3d019655d3e":hex:"":int:64:hex:"98ff89a8e28c03fd":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #1 [#2]
depends_on:0
2:exp:0:hex:"1c7123e2e8d3774c8f1bdbb2272f19129e04f29b4351ae19c3b9d24e6ea1fe87":hex:"":hex:"99f25cebd6cfa7f41390b42df6a65f48":hex:"":int:64:hex:"8e14a0a4853a156a":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,64) #2 [#2]
depends_on:0
2:exp:0:hex:"490090323e9257517e2453469caa3414045cacb4d05d5cebc6b9c06fa6d19291":hex:"":hex:"c1beff1ff6cdd62339aa21149c4da1e6":hex:"":int:64:hex:"f998d7c08d609b3a":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #0 [#2]
depends_on:0
2:exp:0:hex:"360e48dd38d9e7f5bf29a2994ab5b3c9c70247102d94049ae791850807a4c845":hex:"":hex:"88126c350dfc079c569210ee44a0e31a":hex:"":int:32:hex:"f2ebe5e4":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #1 [#2]
depends_on:0
2:exp:0:hex:"1562b32e4dd843edaf4474b62cadd8f46d50461f5b22c9f1a8eae7367d35d71b":hex:"":hex:"af29fdb96f726c76f76c473c873b9e08":hex:"":int:32:hex:"13fd6dfd":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,0,32) #2 [#2]
depends_on:0
2:exp:0:hex:"d5160d0c98ffcb1c26aad755f67589000e2bb25fa940e6b1d81d780f421353d9":hex:"":hex:"1552604763453b48a57cea1aed8113f4":hex:"":int:32:hex:"660c5175":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #0 [#2]
depends_on:0
2:exp:0:hex:"c3a3ea3a097c0c2b3a4cb78462d87fd5a8f348687c4150e9d3354b388ab13d17":hex:"":hex:"f77945979241fb3a454d8e3da193e169":hex:"a69bac31241a2c07d3f7e331b77f662b1e67ccb81c07f52578b01f5785de9437f02eb7627ca7b9af09c1cb428fe93d6deb31f4d6dd2f0729f87480bdeb92d985de1aaad4bcebc6fbad83bede9a5dd1ca6a15bf5d8a96d4edb5bee1f7d195e9b2e5fb2221a596d69f257c18a143eda870e22d3f2ed20c9b3b0d8c8a229c462fff":int:128:hex:"6b4b1a84f49befe3897d59ce85598a9f":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #1 [#2]
depends_on:0
2:exp:0:hex:"e1626327d987342cba5c8c63b75b4ed65463a2b9c831f4f9f80325fa867d1d73":hex:"":hex:"4e25800deab7ecec2a2311f8fb44eb7d":hex:"ebaffd558f24dae03117c69ac4b2b4aaeaffe7e0e7599eaba678bfce23a9914dc9f80b69f4a1c837a5544cba08064a8f924064cba4d783623600d8b61837a08b4e0d4eb9218c29bc3edb8dd0e78c1534ab52331f949b09b25fbf73bece7054179817bc15b4e869c5df1af569c2b19cb6d060855be9a15f2cf497c168c4e683f2":int:128:hex:"8faa0ffb91311a1a2827b86fec01788d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,128) #2 [#2]
depends_on:0
2:exp:0:hex:"938da64b837275b0c80c442bdf2301aa75e387fe65a775d10a8ec840f62ff429":hex:"":hex:"dec6adeb60216cbb8a6c3afba49fa201":hex:"4ac144bd95f405649444f01ab67ef3e4c0a54fdbd933b6ba00518c79db45c22c90030c45aadcfdb53ec8199be0cbb22dbb9ab938a871f4b3b0c98ed32590a051abb946c42726b3e9701f183b2092985e3457943a6350fbcaece2e6b111b179ea3fd10ac080a577a1481785111d5f294bc28519c470ff94392a51a2c40a42d8b5":int:128:hex:"2211ca91a809adb8cf55f001745c0563":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #0 [#2]
depends_on:0
2:exp:0:hex:"e2436484ea1f454d6451ad8dbd1574b208d7a3ab4fa34869299b85c24348b43d":hex:"":hex:"97040d2ec094fe1c64fa35b35b7451a7":hex:"bc198677513ce0e66697dfe52b22315fa5d8f92042f34cc9f373a01f94607df1a599132f60af010ed9b5e52162dd7b162912b68b11700e08f5fdafd84d10f760fc05ec97c05b83e55155194f399594015b90a19c04fb992e228940fe1b54ba59c4bb8318b33cc0df1cb1d71c389473dfb3eefabfe269ca95db59a7bc0201c253":int:120:hex:"2e080ba16011e22a779da1922345c2":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #1 [#2]
depends_on:0
2:exp:0:hex:"7fb3fc72eb8a3aa5b102f90039f852cc3fd64f46915f5e49f1d9e02fe9cc13b1":hex:"":hex:"f6120fea313362524917c53d90bafb4f":hex:"60c2be7fbd15faf895fd19a9ce775fe2b183b45cffafe4fcbf50d421bea97347e41a9418cfa129b2dda63b889a70063010215dbe38c37feae18bc31b34f31b726f22177f2b4b9d648dd4aa80edfd12dafaee10baa83224354432d1cb62ccabe38bb8448d162cd0d30e988d2e1a2458ffdafaacbdff928756390f66dc60d7ea45":int:120:hex:"83de3f521fcfdaff902386f359e683":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,120) #2 [#2]
depends_on:0
2:exp:0:hex:"697c96d80d0a3fa9af35b86f31fb71a17aed30ce841c79896bbc8863b3b3ee04":hex:"":hex:"3a5163ec7e007061838d755ac219855e":hex:"de50c12da63232768d5eb9920d49683b5b7114cb77448fa10b9d63552ec5d9c2eac94b375d11f944959f903bb20c696639b6e7f108ec1e873870098c631ddacb2c25268cfc26d2a4cacfb7dda7383374c5456bcf4daa887a887f4293f8caa14419472a8bf7ffd214dfb2743091238b6d1142b116c2b9f4360c6fe0015cd7de81":int:120:hex:"cd4542b26094a1c8e058648874f06f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #0 [#2]
depends_on:0
2:exp:0:hex:"66c1d9ce3feb0e966c33e3fd542ec11cc32f18c2514b953103d32abcdc72633a":hex:"":hex:"46fdb88fdde9b7d74e893802a0303256":hex:"55d2f263d2e3cf0b390fce1dd1ebd5f666086f26e1ce2f08002bedbb810ada3922c6bfcf6a6adaa556e9e326c9766f02b3eb6e278da2fa3baa7dbdb6373be3c6ecfbe646b1a39e27c5a449db9b559e7ea3496366b8cdbca00ee7a3dea7fdfbea1665bbf58bd69bb961c33a0fd7d37b580b6a82804f394f9d5d4366772cee3115":int:112:hex:"96ca402b16b0f2cd0cdff77935d3":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #1 [#2]
depends_on:0
2:exp:0:hex:"d7c949420dc9497232cd5810f316d11f9e85d36c430b5943ba79836d88c1eb92":hex:"":hex:"7ef9788ff09cbeedd9569d49083a4097":hex:"ca1de5cc3fcde2638eb72210e551e9c0e0a3f5570d5be83a9a4406b545d854bf17e75b9cd0f4c45722fbd71319a317b72a8798485e9316a1c8102432b83bc95af42f6d50700ba68f6f2e19b6af609b73ad643dfa43da94be32cc09b024e087c120e4d2c20f96f8e9ddfe7eae186a540a22131cedfe556d1ebd9306684e345fd1":int:112:hex:"8233588fca3ad1698d07b25fa3c4":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,112) #2 [#2]
depends_on:0
2:exp:0:hex:"6fe7c70815aa12326cdcbb2d2d3e088bbaaef98b730f87fe8510b33d30e12afe":hex:"":hex:"e0253bd1f19e99a7f8848206fb8ac4a4":hex:"397897eca4856f90d14c3cdfe1ad3cba47e23174ae2dab7d2a6320898584e03bffa3ffd526f416d7b3c579b0f3628744e36eebb5df519240c81d8bbbf5c5966519c5da083ab30a7aa42deae6180e517cdd764b7f77d19cc1a84141817758887a8d7265e7e62279b9d33cd2f1ba10fd54c6c96d4b8a5dbe2318fef629c8e2af0f":int:112:hex:"477b0a884d788d1905646bd66084":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #0 [#2]
depends_on:0
2:exp:0:hex:"cbeefb3817cb02d617f385cf2371d52c8bcbc29e5e7a55cd2da131ca184c6e89":hex:"":hex:"f74156d6400ae46b612531848bffe18f":hex:"1abe2ab05ceccf2391273126fe4a4426b94d2c3b97a7f1cd2ee6bb952bf4a546e972b5a1701d5ddb0e5bb7a248fcb47107a9fc77e4b9806b68a11850119aa239fa8be1370e3a2e1a8b168f7323afdfc4b8917d92570167848a56132d68876abc386c258a9233dc8a9eb73443b052e842c3d63e8b5369acdd038404e4e9a4b038":int:104:hex:"0cb67cec1820339fa0552702dd":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #1 [#2]
depends_on:0
2:exp:0:hex:"e6f5f65ce2fc8ec3f602f5df90eb7d506dd771337913680ac16bdcd15c56583d":hex:"":hex:"9212a548c597677d1747e98ce6fb18a4":hex:"55ca486c0183d0134925880d2e21dde0af51c4c77c6038a5a9c0497884e0aa4715bdb5b4bb864acc708ac00b511a24fa08496df6a0ca83259110e97a011b876e748a1d0eae2951ce7c22661a3e2ecf50633c50e3d26fa33c2319c139b288825b7aa5efbd133a5ce7483feecb11167099565e3131d5f0cb360f2174f46cb6b37c":int:104:hex:"08d7cc52d1637db2a43c399310":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,104) #2 [#2]
depends_on:0
2:exp:0:hex:"0e9a0391435acb57eae2e6217e0941c79a3ff938ec6a19b8a7db2ea972e49f54":hex:"":hex:"27cd1d7af7e491e30c8110cc01392529":hex:"79140d32bb32dace0779e2d37a0f744d6d973e99a279962b43a6c0af63772e8a0a21d5d9dd3c33d4b218cb2f6f24dd8d93bb4e1e6a788cb93135321ecfed455e747fa919b85b63b9e98b4980a8ccb3b19d50d735742cb5853720c2ad37fa5b0e655149583585830f8d799c0d2e67c0dc24fc9273d9730f3bb367c487a5f89a25":int:104:hex:"fbb477dd4b9898a9abc5a45c63":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #0 [#2]
depends_on:0
2:exp:0:hex:"55a12eeca637654252e3e40b371667e3f308b00f2fd2af696223e4cd89e3fd4e":hex:"":hex:"8a3793b6441258360f7f4801b03d0b26":hex:"f5810dc5f25e49bd6d94bc63c2494aa7a579a4056a25f1dd9b2734d0b8731ee52523edd54ff475651d45c213e1bf254327fb0e2c41a7d85345b02bcc9d27b08915d332e1659671991a4bb74055967bebbba6ecceb182f57977130623d5a7b2175fa5a84b334868661c1f450b95562928b4791759796a177d59ed18bbf141e2ad":int:96:hex:"99230019630647aedebbb24b":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #1 [#2]
depends_on:0
2:exp:0:hex:"3d353f870a9c088de5674efd97646b9c5420b2bcdfcffefcadd81682847e5331":hex:"":hex:"f267fa982af5c85359b6447f9b7715ea":hex:"7cf55630867af5dff747c8dd25bcc531d94a7730a20b6c03d46059ea93fcaa00d07ee17dad0e0dff814b02dfef0cbe00b37fd2f5f95ead7c72be60016f2934d7683fc1e47185c7211c49cb03e209b088edb14e533dbcb792ab7033728904f7ff12381a236dba97894ec1fafcf853ab15fff343f9265d0283acef10168ffd1271":int:96:hex:"9553b583d4f9a1a8946fe053":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,96) #2 [#2]
depends_on:0
2:exp:0:hex:"d227c9ff5d17a984983056fb96f3991932ae8132377529c29238cf7db94a359d":hex:"":hex:"b8f6536f376a7efe0e684acf350bae70":hex:"1cc25da31f90de7fa47ebce92754d3faa99f88d4e25ccab45645c1acdf850d55d7f02f61a0bfdc3125f29259d7da8abef532fe0966c63d3486753c8a2cb63a39349a0641b2f2b9526a03b97d58ca60fbb054c6c164ff2836688b0cad54df2b165bc082eeae660e768dde5130e30f8edc863446661c74da69b9e56de8ae388da0":int:96:hex:"44b95a37fab232c2efb11231":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #0 [#2]
depends_on:0
2:exp:0:hex:"b2a57ef85ffcf0548c3d087012b336c46f6574cf1d97ca087bfad042ee83eec2":hex:"":hex:"3d580402d2a8dc4d7466e5dcb456be7a":hex:"c2b9e95c16e55028794a63ef82d11fb83a2a75dc34a81f238e472c33264534bdd54cd07d02a0ecf9019ad1a6d6c779f339dd479e37940486950f183bade24fca2f24f06d4037b3555b09fc80279ea311769473eb0630b694a29823324cdf780d7d1a50d89f7a23b05f7a8c3ad04b7949aa9e6a55978ba48d8078b5a2fd3c1bbb":int:64:hex:"072d4118e70cd5ab":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #1 [#2]
depends_on:0
2:exp:0:hex:"63889ed5bf2c27d518a696b71c0f85592e3337aae95b5bf07289e4c5dfdc088d":hex:"":hex:"1ad534280a0fac7dce31f2ae4fb73f5a":hex:"be1b9dabea33bb9443e27f674b27931c0fba699a33dc86fab29e50b76a9441030444b465317bbf2949faf908bc1b501d11a5ea2042e4b460a85f3be5836729e523d99b56ef39231d5c6d8ae2c2ab36ef44e2aa02a1f2c559c6e333216c7f9ed5f9b880a88e920219204c99a3ae8f90afd1396563bc59a691a93e0070b0b5fd90":int:64:hex:"1bcea0ac2c1a0c73":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,64) #2 [#2]
depends_on:0
2:exp:0:hex:"94e3e2c17cfb6f52d4fdba3ba6d18bba891b6662e85df14d7e61f04adb69e0e5":hex:"":hex:"8a80efb3bfe220526997543409fddb4d":hex:"05da1b0f7ac6eef488d3f087ecae7f35abe3ef36d339709dc3fcb5b471979268ee894c3b6c7f984300d70bc5ea5fba923bfb41d88652bdaecc710964c51f3e2ae2c280b7d6c8e3b9a8a8991d19d92d46c8a158123187f19397ad1ad9080b4ffd04b82b5d68d89dacd3e76439013728c1395263e722b28e45dabf1ef46b8e70b5":int:64:hex:"faa5c13d899f17ea":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #0 [#2]
depends_on:0
2:exp:0:hex:"fe5e479ad0d79dbf717a1f51f5250d467819e444b79cb3def1e0033c80ddadd8":hex:"":hex:"47ce838083fd070d8544c0ad5337cdc6":hex:"98476bf05a18c4ff1b6024dd779c1ac06d838705a0a83fe42bee5fc6ebf3b2a1a5049b67f4aabc8239cd6ff56504bcbad1e2498c159bbec2a6635933945f6ea49e5bc763dcf94f4b3643d3888f16105abb0965e24f51cb4949406124145e9ae31cc76535b4178492f38b311099df2751f674363ae7a58f6f93019653b7e6a6f0":int:32:hex:"a3958500":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #1 [#2]
depends_on:0
2:exp:0:hex:"27d4dedb71a8f68ca5ce2b9e56da772bf5a09b7981d41cd29f485bd2d1adb8d4":hex:"":hex:"7e6f0343c54539717a97b6c8b9f7dec4":hex:"d386db78043f719b7e137cbf79a7f53dda2fe3baccbebb57d499f6eb168e5151f10081d76b72ae0f30165efbdda469e826f9246e59dbcad5c0b27691c00d6c192c24073e99c19cf8c142087c0b83c4ce2fc7ba1e696394e5620ab2d117d5dcd2ac2298997407fd5de07d008de8f9941a4a5f8074736a59404118afac0700be6c":int:32:hex:"50fd1798":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,0,1024,32) #2 [#2]
depends_on:0
2:exp:0:hex:"5a7aa836a469d28542d0d24d3232fad266da8fc889c6b6038b726d3da25f7b20":hex:"":hex:"9faf7cd805803e143ec8f3f13475efd2":hex:"1006c707f608728b2bf64734062b12a5625062bcdcb80a3ce2058352a2922d5e6fbe19681b4f0d79ad3c837f81e72f2fbf8df669894e802a39072b26c286f4b05188c708f7c6edd5f5bb90b87ffa95b86d84d6c1c4591b11d22c772a8ad7f2fe6bd8b46be0e93672df2e8bff8ba80629e1846cfd4603e75f2d98874665c1a089":int:32:hex:"07764143":char*:"":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #0 [#2]
depends_on:0
2:exp:0:hex:"a9444fd176acbe061d0221fde3ddfcc4ff74e995d981a831297c4cbda51c22a1":hex:"c146ff5a988496cad7eced7a2ea471e0117d5d6bd2562c23ce9db4bf36d83ba3fc22e90486ec288a627d208e0b2fd3b65f8301cf7fc41d97959981a95cd1cf37effc46db99b94b21c941c3613c26a10b1a6b7793f467d58ff5134612230f1c49d7e1fcf664fe52fc6eca46273982f6fe729b009d90eb8d8e4a0b0dbe907b76da":hex:"5714732145470da1c42452e10cd274b5":hex:"":int:128:hex:"db85b830a03357f408587410ebafd10d":char*:"":hex:"a3cad9a57fa28e6f6aaa37150a803bf8b77e765f0702e492c4e5ebb31ae6b12d791149153e469a92bb625784a699fd7ca517500ee3f2851840ba67063b28b481e24ba441314e8b7128f5aaccaf4c4e2c92258eb27310bf031422b7fc2f220f621d4c64837c9377222aced2411628018a409a744902c9e95c14b77d5bb7f5846b":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #1 [#2]
depends_on:0
2:exp:0:hex:"686d3bd071e3f46f180611bc4ec8d7726fe72b6c617e7d42b3339f53918c9e36":hex:"21983ad66449c557263aef299da6eef8f31d576fc17ed2dac3e836f7c2ceaff3094b2695452680e188df10c174810efd1fbaa6c832baedce0b92e4c7121447f6461ac909b4302cdf658095b1de532b536faa4fb38cfdf4192eb5c3fe090d979a343492f841b1edc6eb24b24bdcb90bbbe36d5f8409ce7d27194a7bb995ecc387":hex:"a714e51e43aecfe2fda8f824ea1dc4b7":hex:"":int:128:hex:"cd30c3618c10d57e9a4477b4a44c5c36":char*:"":hex:"9610908a0eb2ee885981c9e512e1a55075a212d311073bbb2fb9248cce07af16ee4c58bdc8dbe806d28480f9065838146f3e1eb3ae97012cfe53863a13d487f061a49a6c78ca22a321fa25157dbe68c47d78f2359540cc9031ee42d78855ed90e6b8ea3d67725bfffcb6db3d438c982b5f88d9b660f7d82cb300c1fa1edebb6b":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,128) #2 [#2]
depends_on:0
2:exp:0:hex:"6fe81f15a02e2ecf46e61199c057102d160e6b5d447d4a275972323fff908c3e":hex:"0b4ee0385e6665da8fd2ae47f2d0cf1c5bd395a3bb447047ab5a3ae0b95355bf83d0381119a8d4c01acbe60cd7885da650502f73498a682fdc94f7b14f4c753226064fa15e3a90a6083e053f52f404b0d22394e243b187f913ee2c6bb16c3033f79d794852071970523a67467ce63c35390c163775de2be68b505a63f60245e8":hex:"91d55cfdcdcd7d735d48100ff82227c3":hex:"":int:128:hex:"cd7da82e890b6d7480c7186b2ea7e6f1":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #0 [#2]
depends_on:0
2:exp:0:hex:"4c2095e1379389dc3810e8819314f5a2f87d1494213c5b1de1a402f7f4f746c4":hex:"26ec8ebac0560538a948afbc18fb730e9a91f21392bde24b88b200f96114b229a5b57fa9d02cf10e6592d4dfb28bf0f00740c61157ce28784e9066ea3afd44ecf3a494723610cb593c0feffc6897e3435c6f448697ad3e241685c4e133eff53bdd0fe44dd8a033cfb1e1ea37a493934eb5303ae6ef47ce6478f767ef9e3301ab":hex:"19788b2e0bd757947596676436e22df1":hex:"":int:120:hex:"f26a20bea561004267a0bfbf01674e":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #1 [#2]
depends_on:0
2:exp:0:hex:"be5351efc0277afc9759ec2464a22cb4401f7a17efd1a205e7af023c7ed30ee1":hex:"1eca91406f338fc09c2988b1d7dc8c409d719300c03840a497d7b680cdd5e09b144903477f7116a934e1d931cf368af1fc2a0a0e7caa95475a3cd7bf585a16fda31eb3f8201db0216b37a1635c1c030836b3dd05ca5b0194388fa198e717822131d5d4318690ef82d35ac80b27fff19aec8f020dc6c6ce28f0813bbbf8230ad9":hex:"c6b26117d9dbd80c1c242ad41abe2acc":hex:"":int:120:hex:"61051d6c0801b4a6b6ca0124c019f3":char*:"":hex:"95447aded336d6c20d483a6f062d533efed0261ad321d37bf8b7321b98f55c0f0082ce7f3d341b18fea29a72fc909d30cd8c84a1640227227287674a9b2f16a81b191ecf3b6232d656c32d7b38bea82a1b27d5897694a2be56d7e39aa1e725f326b91bad20455f58a94a545170cb43d13d4b91e1cee82abb6a6e0d95d4de0567":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,120) #2 [#2]
depends_on:0
2:exp:0:hex:"814c2cdfdeecf39d43bb141fbfc62dac44f7552c5e5dac2d4913303fc860119b":hex:"0d3013a1d7132f685d001420daa6c7b643bc36b887511acc4588237d3b412c79e4ebba29c08248ad46c7239e8daa232b7483c9c4e3d1c0bbebc696401efe21f7fd6fc0525a4ab81bd9a893d5f7ab23b70ed07c00f33649b8a996a006de6c94f7793f72848793f4d5b31311c68aae1e715b37409fbe506dac038a0950f05fe82b":hex:"0db3ade15cb0dea98a47d1377e034d63":hex:"":int:120:hex:"e62f910b6046ba4e934d3cfc6e024c":char*:"":hex:"374d03cfe4dacf668df5e703902cc784f011f418b43887702972dcc3f021bcb9bdd61ed5425f2975b6da7052c4859501eb2f295eb95d10ba6b2d74e7decc1acacebf8568e93a70a7f40be41ac38db6f751518c2f44a69c01c44745c51ad9a333eda9c89d001aa644f1e4063a8eb2a3592e21c6abc515b5aacaec8c32bcf1d3c4":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #0 [#2]
depends_on:0
2:exp:0:hex:"1ae4541110f2bc4f83cd720b5c40c8315413d896e034b75007f172baa13d29ec":hex:"5ea811e7fbfc0e00bf2a6abfac50cad9efd90041c5f7fb8f046a0fecbd193b70a2de8a774d01dd3cd54f848cb3e9f5152ee1b052ba698bebfba1fbbdae44a260447d6e6482640ae4d01c9cac3d37d4ffe9a0de0b6001de504a33ef7620efe3ce48ecd6f5b1b3a89185c86d4d662a843ff730e040e3668d6170be4cced8a18a1c":hex:"83f98eec51ee4cae4cb7fe28b64d1355":hex:"":int:112:hex:"df47eef69ba2faab887aa8f48e4b":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #1 [#2]
depends_on:0
2:exp:0:hex:"20c9b662ec4bd13bf58d64cb0a7159b0e7fee4703af66292bf75c8bd6e42e8dc":hex:"45b64f2ed5ac707890c0c1726adf338770ce6a728fe86bb372c4c49409a32705f881bc4d31a27c455c7c7df9dd2c541743523e7d32f88930d988857847f011be5f5f31a31e8812745147cbff5c1294d0fd4a7285db4833f22bf1975250da99c4d0dd2c9688d7f8001bb6ef2bc898ce4d42c5b78e74645b56ce992338f49d4183":hex:"2bc0847d46f3d1064bbf8fe8567f54a2":hex:"":int:112:hex:"5a1bf25aa8d5c3fe5cf1be8e54a1":char*:"":hex:"9079d6275db076625e8474c2914fe483d413d5339202f98f06c3b0ef063d8f3d31029deaf7f9349bfec57e5cf11f46f02d5a6520c7992efc951adbbea6d08e53faeb10dfe8b67ee4685da9ea4fe932551a65821147d06d4c462338e6ddda52017c2bc187fd6d02b7d5193f77da809d4e59a9061efad2f9cadbc4cd9b29728d32":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,112) #2 [#2]
depends_on:0
2:exp:0:hex:"0a1554db37f2e275732a77e521cbd8170729d8677a85db73feacf3c66a89d689":hex:"5421d93b7e6e0091978c673df4f3a406aef5f13eb5e6f95da19b0783308cbe26d4fd6c669cc4a9f069d7e62e4c6fad14b80e918fe91556a9a941a28b3dbf776a68ac7c42df7059b5ed713e78120aec84e7b68e96226c2b5e11a994864ed61b122e7e42ef6cfdae278fadbae1b3ea3362f4e6dc68eef6a70477b8a3ffcfba0df9":hex:"b9194a4d42b139f04c29178467955f1d":hex:"":int:112:hex:"05949d591793ca52e679bfdf64f3":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #0 [#2]
depends_on:0
2:exp:0:hex:"3ab1d9bb571c4bdc9f3ef340914bddcfe0c8e7718d4a2530334372cec86e5fcb":hex:"80bcea307e009745724d5f15d21f3b61a5d5a8401530346b34a2adfa13e3e8c9c9327d6fad914b081e554fbe6c1c6fe070b566620e559555c702c0ab5becf61ea1d9de64351ce43b2276ef4e20b5af7ce43db6d21286af4e740ef00c6d790705afcf0ee4850fffc12c662f2bd8212feb21db31065ab8f717a7509c213352b869":hex:"6a5335901284dd3b64dc4a7f810bab96":hex:"":int:104:hex:"04b8e5423aee8c06539f435edd":char*:"":hex:"36b9602eee20b8f18dce0783cd1e01a799f81ae0a1ce6d293a26c62f47e7dad85c8446697cc09c81d3d9ead6f9e55c4147211660c8aea9536cc5516e9883c7d6854be580af8cd47ba38fa8451f0dad9c904e0e7f9997eff7e29bf880cd7cedd79493a0e299efe644046e4a46bf6645dfb2397b3a482a346b215deb778c9b7636":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #1 [#2]
depends_on:0
2:exp:0:hex:"7dddbd5657e22750bfe6baa70a1f4ac46c1ef8bee573a57cfcef50b66f85e593":hex:"2bf5aba83a8161b9d21ff29251fb0efa697b1ea9c1b3de8481d5fd4d6b57afda0b098decdc8278cc855f25da4116ed558fc4e665a49a8fff3aef11115757a99c10b5a73b1f794f9502186c13dc79442f9226bbf4df19a6440281f76184933aeae438a25f85dbd0781e020a9f7e29fb8e517f597719e639cbd6061ea3b4b67fb0":hex:"fcb962c39e4850efc8ffd43d9cd960a6":hex:"":int:104:hex:"1d8cdadcf1872fb2b697e82ef6":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,104) #2 [#2]
depends_on:0
2:exp:0:hex:"6916b93b2712421f1f4582de7ec4237c4e42e2b32c7dced2f8bb5bd2e0598312":hex:"3739cca20279a36ddb857ac22beae901a49529b3182463ab81a7c46e437eb0b0571e8c16f7b626ecd9f2ca0cd83debe3f83e5d58ed3738899f4b616755eb57fb965208f261736bdf7648b1f8595c6b6a779768115e3077dfee7a42d44b555a51675fb1ce9961d0e21b2b9b477c0541184350e70decf7c14a4c24b8a6cd5fed8e":hex:"b4d9248bb500e40de99ca2a13e743f1c":hex:"":int:104:hex:"090d03446d65adcc0a42387e8e":char*:"":hex:"0255be7ac7ac6feb3a21f572f6a593cc8a97f17af7064c80e478f4a6c469cf94d604bc014b003bf284d216161a9c8a493af43c6a0d8caf813a9e6f83c7ed56dd57543876b11f76aa2be80dcd79d19ac61f00fa423ac2f52fae7a8327cd91494ca4116feb735980ad0a4b1445cb7f38cc712b8aee72179e65b97fca38694e3670":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #0 [#2]
depends_on:0
2:exp:0:hex:"b751c8b724165009a8bd97a9d2a0e22cae5a95c4743c55eeeef0a6fe7d946bec":hex:"e8546a5af1e38114822e60e75563a9399c88796f303c99c69d1f3c50379da81e1cd5b5a4a721e23c59da58ea4361b7ff58408e506a27fea24f9a235c6af7f7a5bd93fa31e90edfc322821c08d6324134830b7fe160b4a3e6d27866a10e6e60762a31618ef92f5c67ccb1deb1f1b188f0e687165e7c366c7418920df4f4fcdcae":hex:"160c50c0621c03fd1572df6ba49f0d1e":hex:"":int:96:hex:"9fef9becf21901496772996f":char*:"":hex:"175fa6b7cd781ec057ff78ba410f2897a920739b5fc4f04bc9b998fbc7cc18e327ad44d59b167e4627256aaecd97dc3e4a7c9baaf51d177787a7f4a0a2d207a855753c4754d41348982d9418b6b24b590632d5115dc186b0ba3bec16b41fa47c0077c5d091ec705e554475024814c5167121dd224c544686398df3f33c210e82":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #1 [#2]
depends_on:0
2:exp:0:hex:"0faf32c22c2a4ee38fe4b5ce08f98fdf6f83b5038dcba5ec8332b3eeb5c710c7":hex:"8a556cc30075753c6e94c2f669bca2058ff6abcbffffc82da7cfca0a45af82dfb4cf487ceb4ede72be87ee4c8b72db1e96459de1dc96721464c544c001d785f2188b9fccaec4b1a37970d38b326f30163d2fdfdf8a2ce74aec55abcd823772b54f8081d086a2e7b17b4086d6c4a5ea67828ef0b593ea1387b2c61f5dfe8f2bb0":hex:"04885a5846f5f75a760193de7f07853c":hex:"":int:96:hex:"0c13506ed9f082dd08434342":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,96) #2 [#2]
depends_on:0
2:exp:0:hex:"0dddc3d2f82bdcdbc37648a6b9b416af28753740f8e998cd1a52a0b665369f1c":hex:"07bf84b15b21951fd22049be6991a672503ae243b8d285fb1e515e1d2c36bfd5b0d0bcce85791f2cea8f616aed68a7d9cf4eaf76418e8b1ec27751de67cbfd9d9f7905b2667904f10d598503f04c04ea00a681ff89a9c446d5763898430bd7a9dfebfe544e3ed3e639b362683a651e087626ffa63c0c2b3e0dd088b81b07f75e":hex:"0a93b883cbd42998ae2e39aab342cb28":hex:"":int:96:hex:"5c37918edb7aa65b246fd5a6":char*:"":hex:"ff7b7b2f88b8c6f9f9bad7152874e995eea0ff1ce1ecd9b8d563642a37a31499f14d70f0dd835b7adf80928497f845fd8c2786cd53af25f8c9fe1bba24e3c3860162635bbed58f06cf6c9966bb9b570987a48329279bb84afb9e464bb4ad19ae6600175086e28929569027c5285d2ed97615e5a7dada40ba03c440861f524475":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #0 [#2]
depends_on:0
2:exp:0:hex:"a0b1a62e46e7712277fc711e19d0c0c865ee77b42ac964b7202dbcaf428086c2":hex:"7dd7c0787fdbea4aacf929341659dcf4b75cbca8f92001e8b62a4d7b40272c5755fa9c445857db05328dc11ce5221f044f4b3dafbf0e2d72a1ad0d3e4c804148db578218690ccc620d8b97b4450ff83400a6caaa959617611446a6627138a4067be9ea410d4b0581022ab621928205b4a4480560fc4c2c3b39a2805684006f35":hex:"e20957a49a27e247d00379850f934d6c":hex:"":int:64:hex:"c99751516620bf89":char*:"":hex:"9307620479f076c39f53965c87d20c2aff11c736c040dba74cd690d275591a5defc57a02f6806de82eb7051548589484364f6c9b91f233a87258ede1ee276cb2c93b4fc76f4d7e60cbd29ba2c54cb479c178fa462c1c2fb6eeb3f1df0edfb894c9222b994c4931dedf7c6e8ddecbde385ddf4481807f52322a47bf5ff7272991":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #1 [#2]
depends_on:0
2:exp:0:hex:"ffcc1c88fba1723b3ab57b458d9bffb98b878c967fb43b9db2ae0753d32a3bb1":hex:"19b6dec86d93c466307de3a36c0791ed1010b1b9cf8d30347ae46e0f9283c9fda43da8cb491dd17cc4298b1f0b876d6a0f4bcbc9667fe34564bc08f8f7b67045057d19f4bf027bc839e590822fa09a5cef1af18e64a0116aa2a01a3f246c2b5272c18c9aa23efe674ba53d533ae8f0695cb78c1155cdc7a9d7fae2c4567dc07c":hex:"d533c2170c5dc203512c81c34eff4077":hex:"":int:64:hex:"167ec8675e7f9e12":char*:"":hex:"0539287ac546fe5342e4c3c0ec07127dcd22899abfe8cdd6e89d08f1374d76e877bec4844d06e0a9f32d181c8d945ba16a54ce3725fae21d8245c070a4da0c646203d6b91325b665ab98c30295851c59265b4ab567b968b6e98536b7850738d92e9627b4c9c6f5d9ae2520944783d8f788a1aa11f3f5245660d41f388e26e0a1":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,64) #2 [#2]
depends_on:0
2:exp:0:hex:"55e94b339c3bafe068ef9cc30787cc6705850114976843777c92b4b331801650":hex:"147cc7bc4008dadf1956520b5998d961499bdf3d8b168591adbfd99411ad7b34eb4b2a5c1bb0522b810fec12dd7c775784d7ecdc741e6dec8191361e6abf473b219221801951b4d5ffe955ab50eef9cffdfee65ba29ddfa943fb52d722825338c307870a48a35f51db340aa946c71904d03174b1e4a498238b9d631a6982c68d":hex:"2e2b31214d61276a54daf2ccb98baa36":hex:"":int:64:hex:"5266e9c67c252164":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #0 [#2]
depends_on:0
2:exp:0:hex:"13c9572bdef62510d84f2d415cc481cd1e71b9c1132b43e63b21ba4e16de9b39":hex:"7c78e634dec811173ff3c4a9a48ae3ae794fbd2aefd4b31701777ff6fcb670744c592a1d298d319717870dca364b2a3562a4ffa422bf7173c4f7ea9b0edf675e948f8370ffd0fd0d5703a9d33e8f9f375b8b641a1b1eecd1692ad1d461a68d97f91f9087f213aff23db1246ee16f403969c238f99eed894658277da23ced11ee":hex:"a8339ba505a14786ad05edfe8cebb8d0":hex:"":int:32:hex:"df3cab08":char*:"":hex:"91f9780daefd2c1010c458054ac6e35baa885cdd2c95e28e13f84451064e31e0739f27bf259cb376ab951e1c7048e1252f0849ccb5453fc97b319666ebbfbc7ef3055212a61582d1b69158f3b1629950a41bc756bded20498492ebc49a1535d1bd915e59c49b87ffebea2f4ad4516ecdd63fa5afda9cce9dc730d6ab2757384a":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #1 [#2]
depends_on:0
2:exp:0:hex:"30a14ca53913acbb215b4e4159083106db3fff83cbedd1e5425f65af1e94f5dd":hex:"8c5f73ee1544553b712ad7a14f31379c8d54a4e432fb6c5112436988d83c4e94954b0249b470538fb977b756fbee70b811d4dc047a869e207bb0b495f1e271d0034e912000e97594033e0dedde0591b297f8a84bafcc93a46268a5bba117b558f1c73513e971c80a7083e1718fc12d0cc0d996a8e09603d564f0b8e81eea28bc":hex:"4f23f04904de76d6decd4bd380ff56b1":hex:"":int:32:hex:"18e92b96":char*:"":hex:"bb4b3f8061edd6fa418dd71fe22eb0528547050b3bfbaa1c74e82148470d557499ce856de3e988384c0a73671bf370e560d8fda96dabe4728b5f72a6f9efd5023b07a96a631cafdf2c878b2567104c466f82b89f429915cf3331845febcff008558f836b4c12d53e94d363eae43a50fc6cb36f4ca183be92ca5f299704e2c8cf":int:0
AES-GCM NIST Validation (AES-256,128,1024,0,32) #2 [#2]
depends_on:0
2:exp:0:hex:"e69f419140289ac25fb0e2ef9cc4f7e06777ac20f7d631918d1af0c8883b7d6a":hex:"ff8dfa4e70490ea9c84cb894dc5d7e1b935ebcdea80a39c4161d4db42cbb269cc86abd381af15ec9a4a42ed18c1eed540decec19722df46f22aa06883297cb393fb23e4bb31a817e88357aa923c7ecbcf24c28a09f622dd21fa70c0a02193024fdcefeaa96cc1b50f81a65dfa9e1bb5126f0c9766a861eed096ec15fb07b0f81":hex:"531248afdaaf1b86cf34d2394900afd9":hex:"":int:32:hex:"c6885cdd":char*:"":hex:"f75299e0ead3834fc7ebd4b2051541b598ad57cc908fdcd4324cf4ccf7dcf7b3f0737ad6c026399a8b1b6d3d50011b3c48ea2c89833b4b44c437677f230b75d36848781d4af14546894eecd873a2b1c3d2fcdd676b10bd55112038c0fdaa7b5598fe4db273a1b6744cba47189b7e2a973651bfc2aaa9e9abea4494047b957a80":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #0 [#2]
depends_on:0
2:exp:0:hex:"404a5d1ac9e32f9caabffbfa485ce9c27edc9e5cde0f2aab4f32ce3121449b88":hex:"b63ec4d28854b7fe2d4d13973f5bcb16f78494ce25cc2820de9d0dc1d8d91db1f19bc9e01cee8418c9e88a69b2f30cdbb0dbdbb50be71e1e666c111c126f2b7197c02f69a1b2ec5e1bf4062b2d0b22fb0fa1585b4e6286b29f6ac98d1b1319dd99851fa6921607077d2947140fdeeea145b56ea7b6af276c9f65393bc43ede33":hex:"b6e6c078e6869df156faa9ac32f057c3":hex:"6ebc75fc9304f2b139abc7d3f68b253228009c503a08b7be77852da9e1afbe72c9ab374740b0dc391fa4d7e17de6a0aa08c69e6f5c5f05411e71e70c69dfbcf693df84c30f7a8e6c7949ea1e734297c0ea3df9b7e905faa6bbdcaf1ff2625a39363308331d74892cf531cb3f6d7db31bbe9a039fca87100367747024f68c5b77":int:128:hex:"94c1b9b70f9c48e7efd40ecab320c2d3":char*:"":hex:"56a0ac94f3ec7be2608154f779c434ee96db5ed4f5a6e1acfb32361ce04e16e1337be5978df06d7c4f6012385fb9d45bb397dc00f165883714b4a5b2f72f69c018ffa6d4420ad1b772e94575f035ad203be3d34b5b789a99389f295b43f004de3daaef7fa918712d3a23ca44329595e08da190e3678bc6ad9b500b9f885abe23":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #1 [#2]
depends_on:0
2:exp:0:hex:"b56f0c980acf7875cf7f27d53ad4a276adc126d0b93a5774ac4277eecad4309e":hex:"2c94299e36b7c4a825ecbc5a7809061e0a6761764a5a655ffdb0c20e5c3fcb10f4e93c68aa0a38c2acc5d06f2b7c4ff4fcf814b551bfefa248dbe06a09a0f153213538a31fa7cf7d646b5b53908d8978f514c9c4d6d66f2b3738024b5f9c3fd86b6da0c818203183f4205f186ea44a54edb911b1a17c424c95852c8d271b2e93":hex:"b004c049decfb43d6f3ec13c56f839ef":hex:"b2045b97fbb52a5fc6ff03d74e59dd696f3f442c0b555add8e6d111f835df420f45e970c4b32a84f0c45ba3710b5cd574001862b073efa5c9c4bd50127b2ce72d2c736c5e2723956da5a0acb82041a609386d07b50551c1d1fa4678886bac54b0bd080cc5ef607dca2a0d6a1e71f0e3833678bf8560bc059dae370ec94d43af6":int:128:hex:"fce7234f7f76b5d502fd2b96fc9b1ce7":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,128) #2 [#2]
depends_on:0
2:exp:0:hex:"1c5027c36e6caa1b3e5e45fead32b5e3126ac41f106c491b0b3a7c16502f4fe6":hex:"58f0ceaa31c0025d2e6bb58720cce4b64f5f6c657c847ae42936eb1e343fea397c8a8cf2f5ef02ffaec25f431900dcb0910cf32cea9eca3b78aed1c451c7af51066489f87b2a5f8cf28d6fdb6ce49d898b6167b590a3907be7618be11fb0922a3cfd18e73efef19e5cdc250fa33f61e3940c6482ae35f339e8c0a85a17379a4e":hex:"3ee660f03858669e557e3effdd7df6bd":hex:"93e803c79de6ad652def62cf3cd34f9addc9dd1774967a0f69e1d28361eb2cacc177c63c07657389ce23bbe65d73e0460946d31be495424655c7724eac044cafafe1540fcbd4218921367054e43e3d21e0fa6a0da9f8b20c5cdbd019c944a2d2ee6aa6760ee1131e58fec9da30790f5a873e792098a82ddf18c3813611d9242a":int:128:hex:"ac33f5ffca9df4efc09271ff7a4f58e2":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #0 [#2]
depends_on:0
2:exp:0:hex:"34c3019810d72b5e584f0758f2f5888a42729a33610aafa9824badade4136bbd":hex:"22deef66cbb7db240c399b6c83407f090d6999ba25e560b2087fed0467904bb5c40cbaa05b8bf0ff5a77c53fa229478d8e0736414daf9c420417c391c9a523fd85954533f1304d81359bdcc2c4ac90d9f5f8a67a517d7f05ba0409b718159baf11cd9154e815d5745179beb59954a45a8676a375d5af7fae4d0da05c4ea91a13":hex:"f315ea36c17fc57dab3a2737d687cd4f":hex:"f33c5a3a9e546ad5b35e4febf2ae557ca767b55d93bb3c1cf62d862d112dbd26f8fe2a3f54d347c1bc30029e55118bab2662b99b984b8b8e2d76831f94e48587de2709e32f16c26695f07e654b703eba6428f30070e23ed40b61d04dd1430e33c629117d945d9c0e4d36c79a8b8ab555d85083a898e7e7fbeb64a45cc3511d99":int:120:hex:"0bae9403888efb4d8ec97df604cd5d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #1 [#2]
depends_on:0
2:exp:0:hex:"29397d98fc5a7f04b5c8b6aa3a1dd975b6e4678457ae7f0691eee40b5397503a":hex:"0bbf1079cb5569c32257bc7e52371db46f3961b457402b816588243b4523543430d5ca56b52de6632724c51e6c3af310b28822c749a12bdd58dee58bbc3266631562a998ec3acdc8a2567a9f07f7f9759c3f50b1d1dcdd529256b80c0d227fc1fe8b58c62d1c643f1ac2996809fd061afcf4a9af184c14db9e63ec885c49de61":hex:"885543a45fd1163e34ef9276145b0f8c":hex:"d88beaa0664bcef178cbdbfab17ff526b5c0f8ad9543c6a312d93c336707fbf87c0448b07a550580953279f552f368225cc6971f1eecc718d6aad1729c8d8873081357752bd09d77075fa680cb2dc4139171e4a0aaa50b28c262c14fd10b8d799ca1c6641bb7dfdfdf3dea69aa2b9e4e4726dc18b0784afa4228e5ccb1eb2422":int:120:hex:"7b334d7af54b916821f6136e977a1f":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,120) #2 [#2]
depends_on:0
2:exp:0:hex:"7555dfcf354da07fd70f951d94ec1d86a635edfdb7929460207b2a39cc0cf4a3":hex:"a1351cfffd1b0cbf80c3318cc432d3238cb647e996b7b53c527783594683f535950cd08788687c77226b2d3f095955884adc2e475ca1e1eab04e37d5e901ae8934a9d3a0cb37b80612ca25d989856dfa7607b03039b64d7dcd468204f03e0f2c55cb41c5367c56ca6c561425992b40e2d4f380b3d8419f681e88ebe2d4bdad36":hex:"e1b30b6a47e8c21228e41a21b1a004f0":hex:"bf986d3842378440f8924bb7f117d1a86888a666915a93ba65d486d14c580501e736d3418cebee572439318b21b6e4e504a7b075b8c2300c014e87e04fa842b6a2a3ebd9e6134b9ddd78e0a696223b1dc775f3288a6a9569c64b4d8fc5e04f2047c70115f692d2c2cefe7488de42ff862d7c0f542e58d69f0f8c9bf67ef48aea":int:120:hex:"d8ef5438b7cf5dc11209a635ce1095":char*:"":hex:"95e8db7c8ecab8a60ceb49726153a7c5553cf571bc40515944d833485e19bf33cb954e2555943778040165a6cfffecef79eb7d82fef5a2f136f004bb5e7c35ae827fac3da292a185b5b8fc262012c05caeda5453ede3303cfeb0c890db1facadaa2895bdbb33265ada0bb46030607b6cf94f86961178e2e2deeb53c63900f1ec":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #0 [#2]
depends_on:0
2:exp:0:hex:"bbeafe86c72ab0354b733b69b09e4d3462feb1658fe404004d81503f3a6e132f":hex:"a033c2051e425d01d97d563572e42c5113860e5dedcd24c76e3e357559ba3250f1fc5d4a931a9d0900ac025400f0158621f0b1215b2907467bfc874bcabbb28e28de81fe1ee5b79985261c512afec2327c8c5957df90c9eb77950de4a4860b57a9e6e145ea15eb52da63f217f94a5c8e5fcb5d361b86e0e67637a450cdbcb06f":hex:"ee1caba93cb549054ca29715a536393e":hex:"e44b0e0d275ae7c38a7dc2f768e899c1c11a4c4cb5b5bd25cd2132e3ecbaa5a63654312603e1c5b393c0ce6253c55986ee45bb1daac78a26749d88928f9b9908690fc148a656b78e3595319432763efbcf6957c9b2150ccabfd4833d0dcee01758c5efb47321a948b379a2ec0abcd6b6cbf41a8883f0f5d5bf7b240cb35f0777":int:112:hex:"a4809e072f93deb7b77c52427095":char*:"":hex:"e62adf9bbd92dd03cc5250251691f724c6ece1cb89d8c4daf31cc732a5420f6bedab71aab0238ba23bd7165ed1f692561ef457fd1d47413949405b6fc8e17922b17026d89d5830b383546ea516a56f3a1c45ec1251583ae880fa8985bd3dcc1d6a57b746971937bf370e76482238cc08c2c3b13258151e0a6475cc017f8a3d0e":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #1 [#2]
depends_on:0
2:exp:0:hex:"6ad06c88dd4f3becf35eed95bb859be2406a1803a66e4332a74c5f75c09b9a01":hex:"2219c11672884b93d0290b6a7140feafe416461f1cdaf0b3aa64693d7db2eb10feae46aac7af549fa1b0abc78c11f8df7ee803ef70310fc3e67769f8b4bc64f81143a6ebf8bee9d386a8ede5d2cc0ed17985a3b7bb95191ef55e684690ccdc5ca504bc6eb28442b353861a034a43532c025f666e80be967a6b05b9dd3a91ff58":hex:"07d8b4a6e77aef9018828b61e0fdf2a4":hex:"cca1fd0278045dda80b847f0975b6cbf31e1910d2c99b4eb78c360d89133a1c52e66c5c3801824afc1f079d2b2b1c827199e83f680e59b9a7de9b15fa7b6848b5bf4e16a12ac1af4cf2b4d7bb45673c5e1241e9996440860a9204fc27cae46a991607bc5e7120d6c115ddcbdd02c022b262602139081e61eee4aba7193f13992":int:112:hex:"e3ede170386e76321a575c095966":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,112) #2 [#2]
depends_on:0
2:exp:0:hex:"87bbf7c15689e8c99a5a32a8ba0dfebcfe1989159807428cdd1f382c3ea95178":hex:"b77d3bf3b30b3e6e5c86cbfb7e5455f6480f423cc76834b4663d28d9f1eb5c40212634e3347668427f7848352ab789886f96682a568260bdaeb7de0aae2af36f5ae04f06c332b158d923706c1c6255c673feeadb6d30bfc901e60b92acd9ddd83ef98686c4d492f4a60e97af2541d470a6a6b21903441020ea7619cf28a06986":hex:"2f19aa1f3a82a7398706953f01739da7":hex:"590dbd230854aa2b5ac19fc3dc9453e5bb9637e47d97b92486a599bdafdfb27c3852e3d06a91429bb820eb12a5318ed8861ffe87d659c462ef167be22604facfa3afb601b2167989b9e3b2e5b59e7d07fda27ffccd450869d528410b0aff468f70cc10ef6723a74af6eebc1572c123a9b5a9aab748a31fa764716d3293ff5de7":int:112:hex:"5c43fc4dc959fabeebb188dbf3a5":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #0 [#2]
depends_on:0
2:exp:0:hex:"24095a66b6eb0320ca75e2ab78e8496a45f4b000fc43436904c3e386fb852ed2":hex:"4690edc843e23d9d9b9a4dab8fa8193f8bf03897d3d29759e9dc9e0f8a970c0f5d4399b9f60461fe5cf439f9b0d54bbc075695e4d76b76298cc2b75bb3e0b516ee9ada93f77c4c002ba9fd163a1e4b377befb76c1e5ab8b3901f214c0a4c48bd2aa2f33560d46e2721a060d4671dc97633ff9bcd703bb0fbed9a4a2c259b53f3":hex:"0955c1f0e271edca279e016074886f60":hex:"f5160c75c449e6bb971e73b7d04ab9b9a85879f6eb2d67354af94a4f0ca339c0a03a5b9ede87a4ff6823b698113a38ae5327e6878c3ccc0e36d74fe07aa51c027c3b334812862bc660178f5d0f3e764c0b828a5e3f2e7d7a1185b7e79828304a7ad3ddcd724305484177e66f4f81e66afdc5bbee0ec174bff5eb3719482bd2d8":int:104:hex:"75a31347598f09fceeea6736fe":char*:"":hex:"0dd2dca260325967267667ff3ccdc6d6b35648821a42090abba46282869bac4bdc20a8bee024bea18a07396c38dbb45d9481fedcc423a3928cfa78a2f0ae8eedb062add810bdbee77ddc26c29e4f9fda1ab336d04ef42947b05fbdb9bc4df79e37af951d19d6bf5e5cb34eef898f23642a9c4a9111ed0b7a08abeeefbbd45c23":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #1 [#2]
depends_on:0
2:exp:0:hex:"086b77b5731f971f0bf5b8227361b216746daf8b08c583ad38f114a64aa7877b":hex:"629317212ff8bd8a7676e4c00b81a9577de6397c832f99ac974fa2bbbccb6e3b8aa776db6922eed0b014bf3923799da7d9d0854c8817470e1e2f7fc7a572f9d0316ee60cde7ef025d59b897d29a6fee721aeb2f7bb44f9afb471e8a7b0b43a39b5497a3b4d6beb4b511f0cefa12ce5e6d843609d3e06999acfbee50a22ca1eee":hex:"164058e5e425f9da40d22c9098a16204":hex:"6633eae08a1df85f2d36e162f2d7ddd92b0c56b7477f3c6cdb9919d0e4b1e54ea7635c202dcf52d1c688afbbb15552adda32b4cd30aa462b367f02ded02e0d64eeee2a6b95462b191784143c25607fd08a23a2fbc75cf6bee294daf2042587fdd8fe3d22c3a242c624cf0a51a7c14db4f0f766ec437de4c83b64f23706a24437":int:104:hex:"2eb6eb6d516ed4cf1778b4e378":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,104) #2 [#2]
depends_on:0
2:exp:0:hex:"0f9e806b0d937268561c0eafbbdd14ec715b7e9cef4118d6eb28abbb91266745":hex:"2ae4baef22ace26f464a9b0c75802303f2d7c0f9a1ed1d0180135189765bdd347fea0cc2b73ee7fbbf95ea1fda22597b8aad826f63e744069a9c349488b2cc1cf9372f423cc650302082125724730ae5a4d878e07385ddc99034c6b6b46748f02c80b179fe6406b1d33581950cb9bcd1d1ea1ec7b5becfd6c1f5b279412c433a":hex:"8657996634e74d4689f292645f103a2e":hex:"2ca253355e893e58cb1a900fbb62d61595de5c4186dc8a9129da3657a92b4a631bbdc3d5f86395385a9aa8557b67f886e3bb807620e558c93aea8e65826eadeb21544418ee40f5420c2d2b8270491be6fc2dcbfd12847fa350910dd615e9a1881bc2ced3b0ac3bde445b735e43c0c84f9d120ca5edd655779fc13c6f88b484f7":int:104:hex:"83155ebb1a42112dd1c474f37b":char*:"":hex:"87d69fc3cbc757b2b57b180c6ba34db4e20dde19976bfb3d274d32e7cea13f0c7d9e840d59ce857718c985763b7639e448516ddbbda559457cd8cb364fa99addd5ba44ef45c11060d9be82b4ebe1f0711ac95433074649b6c08eeab539fdfc99c77498b420427e4d70e316111845793de1f67fb0d04e3389a8862f46f4582dc8":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #0 [#2]
depends_on:0
2:exp:0:hex:"c24c17911f6db4b3e37c46bcc6fa35efc1a55f7754f0bb99f2eea93398116447":hex:"0bd92cb106867e25ad427ff6e5f384d2d0f432fc389852187fcc7b0bf9f6d11a102a872b99ed1ad9a05dab0f79fa634745535efed804ff42b0af8dad20ba44709391fb263f245e5a2c52d9ce904179633282f57a1229b0a9c4557a5c0aeda29bbc5a7a871fa8b62d58100c3722c21e51e3b3e913185235526e7a5a91c559717d":hex:"5098cc52a69ee044197e2c000c2d4ab8":hex:"9ad4dee311d854925fc7f10eca4f5dd4e6990cb2d4325da2ef25a9a23690f5c5590be285d33aaeba76506c59edec64b8c3ff8e62716d1c385fbce2a42bc7bd5d8e8584de1944543ab6f340c20911f8b7b3be1a1db18a4bb94119333339de95815cae09365b016edc184e11f3c5b851f1fa92b1b63cfa3872a127109c1294b677":int:96:hex:"f7930e3fab74a91cb6543e72":char*:"":hex:"6124ede608d416baa5e653a898ca76e9f47f08403c1984feec112e670ded2226e0073f8881ab2161cfda541dccae19691285f7391a729f07aba18f340bb452c1da39cbe83cf476cfc105b64187e0d2227dd283dcba8b6a350f9956b18861fa131d3f00c034443e8f60e0fdfcfaabbed93381ae374a8bf66523d33646183e1379":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #1 [#2]
depends_on:0
2:exp:0:hex:"d267a8379260036ff3d1ec07a7b086ff75706bad12d37d9656f04776f3d8b85c":hex:"80c68a330ef50e3e516681f1e535868b03466e7edbb86cb385d01db487da3dd3edad940fdc98d918b7db9b59f8d61369eee2928c88557306c4a13e366af0708d94cb90a15f1c3bc45544bdb05ff964da5e06c5ae965f20adb504620aed7bce2e82f4e408d00219c15ef85fae1ff13fea53deb78afa5f2a50edbd622446e4a894":hex:"674dc34e8c74c51fa42aacd625a1bd5b":hex:"6a9a8af732ae96d0b5a9730ad792e296150d59770a20a3fdbbc2a3a035a88ac445d64f37d684e22003c214b771c1995719da72f3ed24a96618284dd414f0cac364640b23c680dc80492a435c8ec10add53b0d9e3374f1cf5bfc663e3528fa2f6209846421ea6f481b7ecf57714f7bc2527edc4e0466b13e750dd4d4c0cc0cdfc":int:96:hex:"bea660e963b08fc657741bc8":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,96) #2 [#2]
depends_on:0
2:exp:0:hex:"c86cb637753010f639fa3aa3bff7c28b74f012ad6090f2a31b0801d086f183ad":hex:"6b7858557e0fd0f957842fb30e8d54dedbc127eb4bbf9de319f731fa28a606df2c046a0bce8ecda4e75d3596e4e988efd6bc279aa005bc52fad92ba07f5b1dfda4cc417029f9778c88d6fe5341a0fd48893dcb7c68d0df310a060f2a5235aee422d380f7209bc0909b2aa7e876044056f0b915dab0bc13cbea5a3b86d40ca802":hex:"87ff6e0bb313502fedf3d2696bff99b5":hex:"2816f1132724f42e40deabab25e325b282f8c615a79e0c98c00d488ee56237537240234966565e46bfb0c50f2b10366d1589620e6e78bd90ade24d38a272f3fff53c09466aa2d3ef793d7f814a064b713821850a6e6a058f5139a1088347a9fa0f54e38abd51ddfc7ef040bf41d188f3f86c973551ced019812c1fc668649621":int:96:hex:"7859f047f32b51833333accf":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #0 [#2]
depends_on:0
2:exp:0:hex:"2c31ca0cac3efe467168198f06beacf39565a6f57f82e1048a5c06a231315882":hex:"65261d6e29b2369b1828a7cef2df9873d6e6057c499301afedd6cb65b5036ddb95f9e353fbf38e54c4f46f88164325b33620ce183beb2e411fbb89a0e0002e542fc161cad32a61ee6f1e1717e0b4dcd0340b116f795bc1009dbbc65bc31c9b549bf03c40bc204cd0d02ec884be907777ebeed8b527ec3af7cbb508193c0745de":hex:"95cae6e85f33f3043182460589be3639":hex:"67523751a9b1b643d00de4511b55e4268cb2d18e79e01a55fc7b677d529bd6400940fb25ea6ae135c1a816e61b69e90b966981aeda685934b107066e1467db78973492ad791e20aef430db3a047447141def8be6e6a9a15089607c3af9368cdb11b7b5fbf90691505d0c33664766945d387904e7089b915a3c28886ba1763bb5":int:64:hex:"21309d0351cac45e":char*:"":hex:"1d5f2cb921f54aeb552b4304142facd49497837deb1f00d26fbeddbab922fd80b00dba782961f8fce84f1f7973e81eed6ee168b1760c575c891f40a1dae0fa1a08738025d13ef6e0b30be4f054d874f1b8a2427a19ebb071d98365c32316a88a68c2b40daf1ea831a64519ac3679acb4e04986ecc614ec673c498c6fee459e40":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #1 [#2]
depends_on:0
2:exp:0:hex:"ca9fa36ca2159dff9723f6cfdb13280446eb6bc3688043c7e2e2504184791596":hex:"ac04c4293554cd832aa400c811cb202d815d6178aa1343b4628592b7f3ae45dc5f12ea47be4b43e1865f40b06ab67b3a9fb3644248a9b3efe131a8addb7447978bb51ccf749e75574fea60e8781677200af023b2f8c415f4e6d8c575a9e374916d9ec3a612b16e37beb589444b588e0b770d9f8e818ad83f83aa4ecf386d17a7":hex:"d13ca73365e57114fc698ee60ba0ad84":hex:"2aa510b7f1620bfce90080e0e25f5468dbc5314b50914e793b5278369c51ac017eace9fd15127fca5a726ad9e67bdee5af298988d9a57ec4bbc43d4eb849535eb10521ac7cd7ed647479a42876af2ebc9e2108b539febdaa9127c49bda1bda800f6034050b8576e944311dfbca59d64d259571b6d2ed5b2fc07127239b03f4b7":int:64:hex:"2111d55d96a4d84d":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,64) #2 [#2]
depends_on:0
2:exp:0:hex:"2f802e838250064c15fdee28d7bd4872850355870847701ad9742b2d6eb4b0c0":hex:"e2ca8c8d172ff90232879f510d1225af91bc323bdf636363c2903fcd1790692c8bcb03a1cccb18814678852c6b3a441552e541b843ee5e4f86a152fa73d05aea659fe08aa6428bb257eaa2a7b579fdc4022c1dec359a854253c1aefc983c5ede8c97517ea69fc4606e25f13ffb0f5f49160691454fbb74e704326738353525f7":hex:"2dd550cfd97f8e1d8d31ba5537ae4710":hex:"72b9630dda40306e785b961934c56e20948f8eac0e981f49787eb3dbd6e4607f7d08d10ca643746bf1efa7e5066993683d527a90f2d45ec9cf73113f1f17bb67958be669acd4e2927f1dacfde902cd3048056d7f6dfdd8630ff054efce4526db7c9321d6d2be2236f4d60e27b89d8ec94f65a06dc0953c8c4533a51b6a29bd2c":int:64:hex:"bd6c8823c9005c85":char*:"":hex:"f6dd0b5f3d1a393a1837112962dba175a13c2d1e525ef95734caf34949d8b2d63b4fe5603226b5f632f2d7f927361ba639dc0e3c63414f45462342695916d5792133b4a24c7c4cbe2b97c712bf27ab62d3d68b3875d58ffe4b7c30a8171bff1a9e2f3995768faacda2ea9213ff35798b9e4513f6a87bd3f5a9d93e847e768359":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #0 [#2]
depends_on:0
2:exp:0:hex:"84dd53ce0146cb71c32776033bb243098d78a22ac17f52a62a122f5653fb4e33":hex:"68222bffa782dcfe4f328fc20eb520e75a9a5fedbe13ec7fcf0e82fba08bb87a8a8e02902638e32fe0e2294344b380797f8028426ffcc0531c739c884892394c48ff0779c5f5edf0a36a3fb8aa91213347774ec4bf0fe1049bd53746b13beef3c637169826c367056cb1aa0a3868e23f886a9c7b8015c26af9e40794662f6b21":hex:"f0c90a1bca52f30fab3670df0d3beab0":hex:"a3ea8032f36a5ca3d7a1088fd08ac50ae6bdc06ad3a534b773ac3e3d4a3d524499e56274a0062c58c3b0685cc850f4725e5c221af8f51c6df2bbd5fbcff4a93ba4c1054f7f9c67fd9285511a08d328d76a642f067227d378f95a1e67587b90251f9103ed3cacdb6bf69e0794e366d8b92d8de37b4e028de0778841f356ac044d":int:32:hex:"b1ece9fb":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #1 [#2]
depends_on:0
2:exp:0:hex:"9bb36fe25e966a075ae2c3bb43b5877679ebc379d5123c8eda3fa0e30b95cae0":hex:"fb3a4be643c10343251c6f0745aaa54349463f622ca04a792e9b4780866844b30aeef3269fc60cac0ea031c5f3780b535e15154f7c76eb4a371b8ae368550f3fa2ce693c34511ec96b839cac567f1b0de0e7e3116d729b45d1b16e453703a43db73f5d0c3e430f16b142420b5f0d26d72ac3dba543d7d813603b0bfdca3dd63e":hex:"59869df4ef5754b406478a2fb608ee99":hex:"ecd125682e8a8e26757c888b0c8b95dec5e7ed7ac991768f93e8af5bcf6f21ed4d4d38699ee7984ed13635fff72f938150157c9a27fcda121ffced7b492d2b18dad299cb6495ed5f68441aefc8219d2cf717d15d5cd2dbce4606fcf90fe45f3601127cf6acee210bd7df97309f773974a35bef1d33df984101c2fc9d4b55259e":int:32:hex:"cb3f5338":char*:"FAIL":hex:"":int:0
AES-GCM NIST Validation (AES-256,128,1024,1024,32) #2 [#2]
depends_on:0
2:exp:0:hex:"ca264e7caecad56ee31c8bf8dde9592f753a6299e76c60ac1e93cff3b3de8ce9":hex:"8d03cf6fac31182ad3e6f32e4c823e3b421aef786d5651afafbf70ef14c00524ab814bc421b1d4181b4d3d82d6ae4e8032e43a6c4e0691184425b37320798f865c88b9b306466311d79e3e42076837474c37c9f6336ed777f05f70b0c7d72bd4348a4cd754d0f0c3e4587f9a18313ea2d2bace502a24ea417d3041b709a0471f":hex:"4763a4e37b806a5f4510f69fd8c63571":hex:"07daeba37a66ebe15f3d6451d1176f3a7107a302da6966680c425377e621fd71610d1fc9c95122da5bf85f83b24c4b783b1dcd6b508d41e22c09b5c43693d072869601fc7e3f5a51dbd3bc6508e8d095b9130fb6a7f2a043f3a432e7ce68b7de06c1379e6bab5a1a48823b76762051b4e707ddc3201eb36456e3862425cb011a":int:32:hex:"3105dddb":char*:"FAIL":hex:"":int:0
AES-GCM Bad IV (AES-256,128,0,0,32) #0
depends_on:0
0:exp:0:exp:1:hex:"ca264e7caecad56ee31c8bf8dde9592f753a6299e76c60ac1e93cff3b3de8ce9":hex:"":hex:"":hex:"":int:32:exp:2
AES-GCM Selftest
depends_on:0
5
| 98,929 | 681 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.aes.datax | AES-128 CBC - Decrypt empty buffer
depends_on:0:1:2
6:exp:0:int:0:int:0
AES-128 XTS - Decrypt empty buffer
depends_on:0:3
6:exp:1:exp:2:int:0
AES-128 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:0:exp:3
AES-128 CBC - Encrypt and decrypt 1 byte with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:1:exp:3
AES-128 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:2:exp:3
AES-128 CBC - Encrypt and decrypt 7 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:7:exp:3
AES-128 CBC - Encrypt and decrypt 8 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:8:exp:3
AES-128 CBC - Encrypt and decrypt 9 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:9:exp:3
AES-128 CBC - Encrypt and decrypt 15 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:15:exp:3
AES-128 CBC - Encrypt and decrypt 16 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:16:exp:3
AES-128 CBC - Encrypt and decrypt 17 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:17:exp:3
AES-128 CBC - Encrypt and decrypt 31 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:31:exp:3
AES-128 CBC - Encrypt and decrypt 32 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:32:exp:3
AES-128 CBC - Encrypt and decrypt 33 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:33:exp:3
AES-128 CBC - Encrypt and decrypt 47 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:47:exp:3
AES-128 CBC - Encrypt and decrypt 48 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:48:exp:3
AES-128 CBC - Encrypt and decrypt 49 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:49:exp:3
AES-128 CBC - Encrypt and decrypt 0 bytes with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:0:exp:4
AES-128 CBC - Encrypt and decrypt 1 byte with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:1:exp:4
AES-128 CBC - Encrypt and decrypt 2 bytes with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:2:exp:4
AES-128 CBC - Encrypt and decrypt 7 bytes with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:7:exp:4
AES-128 CBC - Encrypt and decrypt 8 bytes with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:8:exp:4
AES-128 CBC - Encrypt and decrypt 9 bytes with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:9:exp:4
AES-128 CBC - Encrypt and decrypt 15 bytes with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:15:exp:4
AES-128 CBC - Encrypt and decrypt 16 bytes with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:16:exp:4
AES-128 CBC - Encrypt and decrypt 17 bytes with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:17:exp:4
AES-128 CBC - Encrypt and decrypt 31 bytes with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:31:exp:4
AES-128 CBC - Encrypt and decrypt 32 bytes with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:32:exp:4
AES-128 CBC - Encrypt and decrypt 33 bytes with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:33:exp:4
AES-128 CBC - Encrypt and decrypt 47 bytes with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:47:exp:4
AES-128 CBC - Encrypt and decrypt 48 bytes with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:48:exp:4
AES-128 CBC - Encrypt and decrypt 49 bytes with one and zeros padding
depends_on:0:1:4
4:exp:0:char*:"AES-128-CBC":int:128:int:49:exp:4
AES-128 CBC - Encrypt and decrypt 0 bytes with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:0:exp:5
AES-128 CBC - Encrypt and decrypt 1 byte with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:1:exp:5
AES-128 CBC - Encrypt and decrypt 2 bytes with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:2:exp:5
AES-128 CBC - Encrypt and decrypt 7 bytes with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:7:exp:5
AES-128 CBC - Encrypt and decrypt 8 bytes with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:8:exp:5
AES-128 CBC - Encrypt and decrypt 9 bytes with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:9:exp:5
AES-128 CBC - Encrypt and decrypt 15 bytes with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:15:exp:5
AES-128 CBC - Encrypt and decrypt 16 bytes with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:16:exp:5
AES-128 CBC - Encrypt and decrypt 17 bytes with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:17:exp:5
AES-128 CBC - Encrypt and decrypt 31 bytes with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:31:exp:5
AES-128 CBC - Encrypt and decrypt 32 bytes with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:32:exp:5
AES-128 CBC - Encrypt and decrypt 33 bytes with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:33:exp:5
AES-128 CBC - Encrypt and decrypt 47 bytes with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:47:exp:5
AES-128 CBC - Encrypt and decrypt 48 bytes with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:48:exp:5
AES-128 CBC - Encrypt and decrypt 49 bytes with zeros and len padding
depends_on:0:1:5
4:exp:0:char*:"AES-128-CBC":int:128:int:49:exp:5
AES-128 CBC - Encrypt and decrypt 0 bytes with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:0:exp:6
AES-128 CBC - Encrypt and decrypt 1 byte with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:1:exp:6
AES-128 CBC - Encrypt and decrypt 2 bytes with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:2:exp:6
AES-128 CBC - Encrypt and decrypt 7 bytes with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:7:exp:6
AES-128 CBC - Encrypt and decrypt 8 bytes with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:8:exp:6
AES-128 CBC - Encrypt and decrypt 9 bytes with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:9:exp:6
AES-128 CBC - Encrypt and decrypt 15 bytes with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:15:exp:6
AES-128 CBC - Encrypt and decrypt 16 bytes with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:16:exp:6
AES-128 CBC - Encrypt and decrypt 17 bytes with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:17:exp:6
AES-128 CBC - Encrypt and decrypt 31 bytes with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:31:exp:6
AES-128 CBC - Encrypt and decrypt 32 bytes with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:32:exp:6
AES-128 CBC - Encrypt and decrypt 33 bytes with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:33:exp:6
AES-128 CBC - Encrypt and decrypt 47 bytes with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:47:exp:6
AES-128 CBC - Encrypt and decrypt 48 bytes with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:48:exp:6
AES-128 CBC - Encrypt and decrypt 49 bytes with zeros padding
depends_on:0:1:6
4:exp:0:char*:"AES-128-CBC":int:128:int:49:exp:6
AES-128 CBC - Encrypt and decrypt 0 bytes with no padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:0:exp:7
AES-128 CBC - Encrypt and decrypt 16 bytes with no padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:16:exp:7
AES-128 CBC - Encrypt and decrypt 32 bytes with no padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:32:exp:7
AES-128 CBC - Encrypt and decrypt 48 bytes with no padding
depends_on:0:1:2
4:exp:0:char*:"AES-128-CBC":int:128:int:48:exp:7
AES-128 CBC - Try encrypting 1 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:128:int:1:exp:8
AES-128 CBC - Try encrypting 2 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:128:int:2:exp:8
AES-128 CBC - Try encrypting 7 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:128:int:7:exp:8
AES-128 CBC - Try encrypting 8 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:128:int:8:exp:8
AES-128 CBC - Try encrypting 9 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:128:int:9:exp:8
AES-128 CBC - Try encrypting 15 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:128:int:15:exp:8
AES-128 CBC - Try encrypting 17 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:128:int:17:exp:8
AES-128 CBC - Try encrypting 31 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:128:int:31:exp:8
AES-128 CBC - Try encrypting 33 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:128:int:33:exp:8
AES-128 CBC - Try encrypting 47 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:128:int:47:exp:8
AES-128 CBC - Try encrypting 49 bytes with no padding
depends_on:0:1:2
5:exp:0:exp:7:int:128:int:49:exp:8
AES-128 CBC - Encrypt and decrypt 0 bytes in multiple parts with PKCS7 padding
depends_on:0:1:2
7:exp:0:int:128:int:0:int:0:exp:9:int:0:int:0:int:0:int:0
AES-128 CBC - Encrypt and decrypt 1 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:0:int:128:int:1:int:0:exp:9:int:0:int:0:int:0:int:0
AES-128 CBC - Encrypt and decrypt 1 bytes in multiple parts with PKCS7 padding 2
depends_on:0:1:2
7:exp:0:int:128:int:0:int:1:exp:9:int:0:int:0:int:0:int:0
AES-128 CBC - Encrypt and decrypt 16 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:0:int:128:int:16:int:0:exp:9:int:16:int:0:int:0:int:16
AES-128 CBC - Encrypt and decrypt 16 bytes in multiple parts with PKCS7 padding 2
depends_on:0:1:2
7:exp:0:int:128:int:0:int:16:exp:9:int:0:int:16:int:0:int:16
AES-128 CBC - Encrypt and decrypt 16 bytes in multiple parts with PKCS7 padding 3
depends_on:0:1:2
7:exp:0:int:128:int:1:int:15:exp:9:int:0:int:16:int:0:int:16
AES-128 CBC - Encrypt and decrypt 16 bytes in multiple parts with PKCS7 padding 4
depends_on:0:1:2
7:exp:0:int:128:int:15:int:1:exp:9:int:0:int:16:int:0:int:16
AES-128 CBC - Encrypt and decrypt 22 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:0:int:128:int:15:int:7:exp:9:int:0:int:16:int:0:int:16
AES-128 CBC - Encrypt and decrypt 22 bytes in multiple parts with PKCS7 padding 2
depends_on:0:1:2
7:exp:0:int:128:int:16:int:6:exp:9:int:16:int:0:int:0:int:16
AES-128 CBC - Encrypt and decrypt 23 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:0:int:128:int:17:int:6:exp:9:int:16:int:0:int:16:int:0
AES-128 CBC - Encrypt and decrypt 32 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:0:int:128:int:16:int:16:exp:9:int:16:int:16:int:0:int:32
AES-128 CBC - Encrypt and decrypt 0 bytes in multiple parts with no padding
depends_on:0:1
7:exp:0:int:128:int:0:int:0:exp:7:int:0:int:0:int:0:int:0
AES-128 CBC - Encrypt and decrypt 16 bytes in multiple parts with no padding 1
depends_on:0:1
7:exp:0:int:128:int:16:int:0:exp:7:int:16:int:0:int:16:int:0
AES-128 CBC - Encrypt and decrypt 16 bytes in multiple parts with no padding 2
depends_on:0:1
7:exp:0:int:128:int:0:int:16:exp:7:int:0:int:16:int:0:int:16
AES-128 CBC - Encrypt and decrypt 16 bytes in multiple parts with no padding 3
depends_on:0:1
7:exp:0:int:128:int:1:int:15:exp:7:int:0:int:16:int:0:int:16
AES-128 CBC - Encrypt and decrypt 16 bytes in multiple parts with no padding 4
depends_on:0:1
7:exp:0:int:128:int:15:int:1:exp:7:int:0:int:16:int:0:int:16
AES-128 CBC - Encrypt and decrypt 32 bytes in multiple parts with no padding 1
depends_on:0:1
7:exp:0:int:128:int:16:int:16:exp:7:int:16:int:16:int:16:int:16
AES-128 CFB - Encrypt and decrypt 0 bytes
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:0:exp:3
AES-128 CFB - Encrypt and decrypt 1 byte
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:1:exp:3
AES-128 CFB - Encrypt and decrypt 2 bytes
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:2:exp:3
AES-128 CFB - Encrypt and decrypt 7 bytes
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:7:exp:3
AES-128 CFB - Encrypt and decrypt 8 bytes
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:8:exp:3
AES-128 CFB - Encrypt and decrypt 9 bytes
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:9:exp:3
AES-128 CFB - Encrypt and decrypt 15 bytes
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:15:exp:3
AES-128 CFB - Encrypt and decrypt 16 bytes
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:16:exp:3
AES-128 CFB - Encrypt and decrypt 17 bytes
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:17:exp:3
AES-128 CFB - Encrypt and decrypt 31 bytes
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:31:exp:3
AES-128 CFB - Encrypt and decrypt 32 bytes
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:32:exp:3
AES-128 CFB - Encrypt and decrypt 33 bytes
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:33:exp:3
AES-128 CFB - Encrypt and decrypt 47 bytes
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:47:exp:3
AES-128 CFB - Encrypt and decrypt 48 bytes
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:48:exp:3
AES-128 CFB - Encrypt and decrypt 49 bytes
depends_on:0:7
4:exp:10:char*:"AES-128-CFB128":int:128:int:49:exp:3
AES-128 CFB - Encrypt and decrypt 0 bytes in multiple parts
depends_on:0:7
7:exp:10:int:128:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
AES-128 CFB - Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:0:7
7:exp:10:int:128:int:1:int:0:exp:3:int:1:int:0:int:1:int:0
AES-128 CFB - Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:0:7
7:exp:10:int:128:int:0:int:1:exp:3:int:0:int:1:int:0:int:1
AES-128 CFB - Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:0:7
7:exp:10:int:128:int:16:int:0:exp:3:int:16:int:0:int:16:int:0
AES-128 CFB - Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:0:7
7:exp:10:int:128:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
AES-128 CFB - Encrypt and decrypt 16 bytes in multiple parts 3
depends_on:0:7
7:exp:10:int:128:int:1:int:15:exp:3:int:1:int:15:int:1:int:15
AES-128 CFB - Encrypt and decrypt 16 bytes in multiple parts 4
depends_on:0:7
7:exp:10:int:128:int:15:int:1:exp:3:int:15:int:1:int:15:int:1
AES-128 CFB - Encrypt and decrypt 22 bytes in multiple parts 1
depends_on:0:7
7:exp:10:int:128:int:15:int:7:exp:3:int:15:int:7:int:15:int:7
AES-128 CFB - Encrypt and decrypt 22 bytes in multiple parts 2
depends_on:0:7
7:exp:10:int:128:int:16:int:6:exp:3:int:16:int:6:int:16:int:6
AES-128 CFB - Encrypt and decrypt 23 bytes in multiple parts 1
depends_on:0:7
7:exp:10:int:128:int:17:int:6:exp:3:int:17:int:6:int:17:int:6
AES-128 CFB - Encrypt and decrypt 32 bytes in multiple parts 1
depends_on:0:7
7:exp:10:int:128:int:16:int:16:exp:3:int:16:int:16:int:16:int:16
AES-128 OFB - Encrypt and decrypt 0 bytes
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:0:exp:3
AES-128 OFB - Encrypt and decrypt 1 byte
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:1:exp:3
AES-128 OFB - Encrypt and decrypt 2 bytes
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:2:exp:3
AES-128 OFB - Encrypt and decrypt 7 bytes
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:7:exp:3
AES-128 OFB - Encrypt and decrypt 8 bytes
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:8:exp:3
AES-128 OFB - Encrypt and decrypt 9 bytes
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:9:exp:3
AES-128 OFB - Encrypt and decrypt 15 bytes
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:15:exp:3
AES-128 OFB - Encrypt and decrypt 16 bytes
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:16:exp:3
AES-128 OFB - Encrypt and decrypt 17 bytes
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:17:exp:3
AES-128 OFB - Encrypt and decrypt 31 bytes
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:31:exp:3
AES-128 OFB - Encrypt and decrypt 32 bytes
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:32:exp:3
AES-128 OFB - Encrypt and decrypt 33 bytes
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:33:exp:3
AES-128 OFB - Encrypt and decrypt 47 bytes
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:47:exp:3
AES-128 OFB - Encrypt and decrypt 48 bytes
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:48:exp:3
AES-128 OFB - Encrypt and decrypt 49 bytes
depends_on:0:8
4:exp:11:char*:"AES-128-OFB":int:128:int:49:exp:3
AES-128 OFB - Encrypt and decrypt 0 bytes in multiple parts
depends_on:0:8
7:exp:11:int:128:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
AES-128 OFB - Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:0:8
7:exp:11:int:128:int:1:int:0:exp:3:int:1:int:0:int:1:int:0
AES-128 OFB - Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:0:8
7:exp:11:int:128:int:0:int:1:exp:3:int:0:int:1:int:0:int:1
AES-128 OFB - Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:0:8
7:exp:11:int:128:int:16:int:0:exp:3:int:16:int:0:int:16:int:0
AES-128 OFB - Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:0:8
7:exp:11:int:128:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
AES-128 OFB - Encrypt and decrypt 16 bytes in multiple parts 3
depends_on:0:8
7:exp:11:int:128:int:1:int:15:exp:3:int:1:int:15:int:1:int:15
AES-128 OFB - Encrypt and decrypt 16 bytes in multiple parts 4
depends_on:0:8
7:exp:11:int:128:int:15:int:1:exp:3:int:15:int:1:int:15:int:1
AES-128 OFB - Encrypt and decrypt 22 bytes in multiple parts 1
depends_on:0:8
7:exp:11:int:128:int:15:int:7:exp:3:int:15:int:7:int:15:int:7
AES-128 OFB - Encrypt and decrypt 22 bytes in multiple parts 2
depends_on:0:8
7:exp:11:int:128:int:16:int:6:exp:3:int:16:int:6:int:16:int:6
AES-128 OFB - Encrypt and decrypt 23 bytes in multiple parts 1
depends_on:0:8
7:exp:11:int:128:int:17:int:6:exp:3:int:17:int:6:int:17:int:6
AES-128 OFB - Encrypt and decrypt 32 bytes in multiple parts 1
depends_on:0:8
7:exp:11:int:128:int:16:int:16:exp:3:int:16:int:16:int:16:int:16
AES-192 OFB - Encrypt and decrypt 0 bytes
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:0:exp:3
AES-192 OFB - Encrypt and decrypt 1 byte
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:1:exp:3
AES-192 OFB - Encrypt and decrypt 2 bytes
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:2:exp:3
AES-192 OFB - Encrypt and decrypt 7 bytes
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:7:exp:3
AES-192 OFB - Encrypt and decrypt 8 bytes
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:8:exp:3
AES-192 OFB - Encrypt and decrypt 9 bytes
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:9:exp:3
AES-192 OFB - Encrypt and decrypt 15 bytes
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:15:exp:3
AES-192 OFB - Encrypt and decrypt 16 bytes
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:16:exp:3
AES-192 OFB - Encrypt and decrypt 17 bytes
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:17:exp:3
AES-192 OFB - Encrypt and decrypt 31 bytes
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:31:exp:3
AES-192 OFB - Encrypt and decrypt 32 bytes
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:32:exp:3
AES-192 OFB - Encrypt and decrypt 33 bytes
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:33:exp:3
AES-192 OFB - Encrypt and decrypt 47 bytes
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:47:exp:3
AES-192 OFB - Encrypt and decrypt 48 bytes
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:48:exp:3
AES-192 OFB - Encrypt and decrypt 49 bytes
depends_on:0:8
4:exp:12:char*:"AES-192-OFB":int:192:int:49:exp:3
AES-192 OFB - Encrypt and decrypt 0 bytes in multiple parts
depends_on:0:8
7:exp:12:int:192:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
AES-192 OFB - Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:0:8
7:exp:12:int:192:int:1:int:0:exp:3:int:1:int:0:int:1:int:0
AES-192 OFB - Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:0:8
7:exp:12:int:192:int:0:int:1:exp:3:int:0:int:1:int:0:int:1
AES-192 OFB - Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:0:8
7:exp:12:int:192:int:16:int:0:exp:3:int:16:int:0:int:16:int:0
AES-192 OFB - Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:0:8
7:exp:12:int:192:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
AES-192 OFB - Encrypt and decrypt 16 bytes in multiple parts 3
depends_on:0:8
7:exp:12:int:192:int:1:int:15:exp:3:int:1:int:15:int:1:int:15
AES-192 OFB - Encrypt and decrypt 16 bytes in multiple parts 4
depends_on:0:8
7:exp:12:int:192:int:15:int:1:exp:3:int:15:int:1:int:15:int:1
AES-192 OFB - Encrypt and decrypt 22 bytes in multiple parts 1
depends_on:0:8
7:exp:12:int:192:int:15:int:7:exp:3:int:15:int:7:int:15:int:7
AES-192 OFB - Encrypt and decrypt 22 bytes in multiple parts 2
depends_on:0:8
7:exp:12:int:192:int:16:int:6:exp:3:int:16:int:6:int:16:int:6
AES-192 OFB - Encrypt and decrypt 23 bytes in multiple parts 1
depends_on:0:8
7:exp:12:int:192:int:17:int:6:exp:3:int:17:int:6:int:17:int:6
AES-192 OFB - Encrypt and decrypt 32 bytes in multiple parts 1
depends_on:0:8
7:exp:12:int:192:int:16:int:16:exp:3:int:16:int:16:int:16:int:16
AES-256 OFB - Encrypt and decrypt 0 bytes
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:0:exp:3
AES-256 OFB - Encrypt and decrypt 1 byte
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:1:exp:3
AES-256 OFB - Encrypt and decrypt 2 bytes
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:2:exp:3
AES-256 OFB - Encrypt and decrypt 7 bytes
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:7:exp:3
AES-256 OFB - Encrypt and decrypt 8 bytes
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:8:exp:3
AES-256 OFB - Encrypt and decrypt 9 bytes
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:9:exp:3
AES-256 OFB - Encrypt and decrypt 15 bytes
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:15:exp:3
AES-256 OFB - Encrypt and decrypt 16 bytes
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:16:exp:3
AES-256 OFB - Encrypt and decrypt 17 bytes
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:17:exp:3
AES-256 OFB - Encrypt and decrypt 31 bytes
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:31:exp:3
AES-256 OFB - Encrypt and decrypt 32 bytes
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:32:exp:3
AES-256 OFB - Encrypt and decrypt 33 bytes
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:33:exp:3
AES-256 OFB - Encrypt and decrypt 47 bytes
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:47:exp:3
AES-256 OFB - Encrypt and decrypt 48 bytes
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:48:exp:3
AES-256 OFB - Encrypt and decrypt 49 bytes
depends_on:0:8
4:exp:13:char*:"AES-256-OFB":int:256:int:49:exp:3
AES-256 OFB - Encrypt and decrypt 0 bytes in multiple parts
depends_on:0:8
7:exp:13:int:256:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
AES-256 OFB - Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:0:8
7:exp:13:int:256:int:1:int:0:exp:3:int:1:int:0:int:1:int:0
AES-256 OFB - Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:0:8
7:exp:13:int:256:int:0:int:1:exp:3:int:0:int:1:int:0:int:1
AES-256 OFB - Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:0:8
7:exp:13:int:256:int:16:int:0:exp:3:int:16:int:0:int:16:int:0
AES-256 OFB - Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:0:8
7:exp:13:int:256:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
AES-256 OFB - Encrypt and decrypt 16 bytes in multiple parts 3
depends_on:0:8
7:exp:13:int:256:int:1:int:15:exp:3:int:1:int:15:int:1:int:15
AES-256 OFB - Encrypt and decrypt 16 bytes in multiple parts 4
depends_on:0:8
7:exp:13:int:256:int:15:int:1:exp:3:int:15:int:1:int:15:int:1
AES-256 OFB - Encrypt and decrypt 22 bytes in multiple parts 1
depends_on:0:8
7:exp:13:int:256:int:15:int:7:exp:3:int:15:int:7:int:15:int:7
AES-256 OFB - Encrypt and decrypt 22 bytes in multiple parts 2
depends_on:0:8
7:exp:13:int:256:int:16:int:6:exp:3:int:16:int:6:int:16:int:6
AES-256 OFB - Encrypt and decrypt 23 bytes in multiple parts 1
depends_on:0:8
7:exp:13:int:256:int:17:int:6:exp:3:int:17:int:6:int:17:int:6
AES-256 OFB - Encrypt and decrypt 32 bytes in multiple parts 1
depends_on:0:8
7:exp:13:int:256:int:16:int:16:exp:3:int:16:int:16:int:16:int:16
AES-128 XTS - Encrypt and decrypt 16 bytes
depends_on:0:3
4:exp:1:char*:"AES-128-XTS":int:256:int:16:exp:3
AES-128 XTS - Encrypt and decrypt 17 bytes
depends_on:0:3
4:exp:1:char*:"AES-128-XTS":int:256:int:17:exp:3
AES-128 XTS - Encrypt and decrypt 31 bytes
depends_on:0:3
4:exp:1:char*:"AES-128-XTS":int:256:int:31:exp:3
AES-128 XTS - Encrypt and decrypt 32 bytes
depends_on:0:3
4:exp:1:char*:"AES-128-XTS":int:256:int:32:exp:3
AES-128 XTS - Encrypt and decrypt 33 bytes
depends_on:0:3
4:exp:1:char*:"AES-128-XTS":int:256:int:33:exp:3
AES-128 XTS - Encrypt and decrypt 47 bytes
depends_on:0:3
4:exp:1:char*:"AES-128-XTS":int:256:int:47:exp:3
AES-128 XTS - Encrypt and decrypt 48 bytes
depends_on:0:3
4:exp:1:char*:"AES-128-XTS":int:256:int:48:exp:3
AES-128 XTS - Encrypt and decrypt 49 bytes
depends_on:0:3
4:exp:1:char*:"AES-128-XTS":int:256:int:49:exp:3
AES-256 XTS - Encrypt and decrypt 16 bytes
depends_on:0:3
4:exp:14:char*:"AES-256-XTS":int:512:int:16:exp:3
AES-256 XTS - Encrypt and decrypt 17 bytes
depends_on:0:3
4:exp:14:char*:"AES-256-XTS":int:512:int:17:exp:3
AES-256 XTS - Encrypt and decrypt 31 bytes
depends_on:0:3
4:exp:14:char*:"AES-256-XTS":int:512:int:31:exp:3
AES-256 XTS - Encrypt and decrypt 32 bytes
depends_on:0:3
4:exp:14:char*:"AES-256-XTS":int:512:int:32:exp:3
AES-256 XTS - Encrypt and decrypt 33 bytes
depends_on:0:3
4:exp:14:char*:"AES-256-XTS":int:512:int:33:exp:3
AES-256 XTS - Encrypt and decrypt 47 bytes
depends_on:0:3
4:exp:14:char*:"AES-256-XTS":int:512:int:47:exp:3
AES-256 XTS - Encrypt and decrypt 48 bytes
depends_on:0:3
4:exp:14:char*:"AES-256-XTS":int:512:int:48:exp:3
AES-256 XTS - Encrypt and decrypt 49 bytes
depends_on:0:3
4:exp:14:char*:"AES-256-XTS":int:512:int:49:exp:3
AES-128 CTR - Encrypt and decrypt 0 bytes
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:0:exp:3
AES-128 CTR - Encrypt and decrypt 1 byte
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:1:exp:3
AES-128 CTR - Encrypt and decrypt 2 bytes
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:2:exp:3
AES-128 CTR - Encrypt and decrypt 7 bytes
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:7:exp:3
AES-128 CTR - Encrypt and decrypt 8 bytes
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:8:exp:3
AES-128 CTR - Encrypt and decrypt 9 bytes
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:9:exp:3
AES-128 CTR - Encrypt and decrypt 15 bytes
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:15:exp:3
AES-128 CTR - Encrypt and decrypt 16 bytes
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:16:exp:3
AES-128 CTR - Encrypt and decrypt 17 bytes
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:17:exp:3
AES-128 CTR - Encrypt and decrypt 31 bytes
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:31:exp:3
AES-128 CTR - Encrypt and decrypt 32 bytes
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:32:exp:3
AES-128 CTR - Encrypt and decrypt 33 bytes
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:33:exp:3
AES-128 CTR - Encrypt and decrypt 47 bytes
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:47:exp:3
AES-128 CTR - Encrypt and decrypt 48 bytes
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:48:exp:3
AES-128 CTR - Encrypt and decrypt 49 bytes
depends_on:0:9
4:exp:15:char*:"AES-128-CTR":int:128:int:49:exp:3
AES-128 CTR - Encrypt and decrypt 0 bytes in multiple parts
depends_on:0:9
7:exp:15:int:128:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
AES-128 CTR - Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:0:9
7:exp:15:int:128:int:1:int:0:exp:3:int:1:int:0:int:1:int:0
AES-128 CTR - Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:0:9
7:exp:15:int:128:int:0:int:1:exp:3:int:0:int:1:int:0:int:1
AES-128 CTR - Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:0:9
7:exp:15:int:128:int:16:int:0:exp:3:int:16:int:0:int:16:int:0
AES-128 CTR - Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:0:9
7:exp:15:int:128:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
AES-128 CTR - Encrypt and decrypt 16 bytes in multiple parts 3
depends_on:0:9
7:exp:15:int:128:int:1:int:15:exp:3:int:1:int:15:int:1:int:15
AES-128 CTR - Encrypt and decrypt 16 bytes in multiple parts 4
depends_on:0:9
7:exp:15:int:128:int:15:int:1:exp:3:int:15:int:1:int:15:int:1
AES-128 CTR - Encrypt and decrypt 22 bytes in multiple parts 1
depends_on:0:9
7:exp:15:int:128:int:15:int:7:exp:3:int:15:int:7:int:15:int:7
AES-128 CTR - Encrypt and decrypt 22 bytes in multiple parts 2
depends_on:0:9
7:exp:15:int:128:int:16:int:6:exp:3:int:16:int:6:int:16:int:6
AES-128 CTR - Encrypt and decrypt 23 bytes in multiple parts 1
depends_on:0:9
7:exp:15:int:128:int:17:int:6:exp:3:int:17:int:6:int:17:int:6
AES-128 CTR - Encrypt and decrypt 32 bytes in multiple parts 1
depends_on:0:9
7:exp:15:int:128:int:16:int:16:exp:3:int:16:int:16:int:16:int:16
AES-192 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:0:exp:3
AES-192 CBC - Encrypt and decrypt 1 byte with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:1:exp:3
AES-192 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:2:exp:3
AES-192 CBC - Encrypt and decrypt 7 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:7:exp:3
AES-192 CBC - Encrypt and decrypt 8 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:8:exp:3
AES-192 CBC - Encrypt and decrypt 9 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:9:exp:3
AES-192 CBC - Encrypt and decrypt 15 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:15:exp:3
AES-192 CBC - Encrypt and decrypt 16 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:16:exp:3
AES-192 CBC - Encrypt and decrypt 17 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:17:exp:3
AES-192 CBC - Encrypt and decrypt 31 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:31:exp:3
AES-192 CBC - Encrypt and decrypt 32 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:32:exp:3
AES-192 CBC - Encrypt and decrypt 33 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:33:exp:3
AES-192 CBC - Encrypt and decrypt 47 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:47:exp:3
AES-192 CBC - Encrypt and decrypt 48 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:48:exp:3
AES-192 CBC - Encrypt and decrypt 49 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:16:char*:"AES-192-CBC":int:192:int:49:exp:3
AES-192 CBC - Encrypt and decrypt 0 bytes in multiple parts with PKCS7 padding
depends_on:0:1:2
7:exp:16:int:192:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
AES-192 CBC - Encrypt and decrypt 1 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:16:int:192:int:1:int:0:exp:3:int:0:int:0:int:0:int:0
AES-192 CBC - Encrypt and decrypt 1 bytes in multiple parts with PKCS7 padding 2
depends_on:0:1:2
7:exp:16:int:192:int:0:int:1:exp:3:int:0:int:0:int:0:int:0
AES-192 CBC - Encrypt and decrypt 16 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:16:int:192:int:16:int:0:exp:3:int:16:int:0:int:0:int:16
AES-192 CBC - Encrypt and decrypt 16 bytes in multiple parts with PKCS7 padding 2
depends_on:0:1:2
7:exp:16:int:192:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
AES-192 CBC - Encrypt and decrypt 16 bytes in multiple parts with PKCS7 padding 3
depends_on:0:1:2
7:exp:16:int:192:int:1:int:15:exp:3:int:0:int:16:int:0:int:16
AES-192 CBC - Encrypt and decrypt 16 bytes in multiple parts with PKCS7 padding 4
depends_on:0:1:2
7:exp:16:int:192:int:15:int:1:exp:3:int:0:int:16:int:0:int:16
AES-192 CBC - Encrypt and decrypt 22 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:16:int:192:int:15:int:7:exp:3:int:0:int:16:int:0:int:16
AES-192 CBC - Encrypt and decrypt 22 bytes in multiple parts with PKCS7 padding 2
depends_on:0:1:2
7:exp:16:int:192:int:16:int:6:exp:3:int:16:int:0:int:0:int:16
AES-192 CBC - Encrypt and decrypt 23 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:16:int:192:int:17:int:6:exp:3:int:16:int:0:int:16:int:0
AES-192 CBC - Encrypt and decrypt 32 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:16:int:192:int:16:int:16:exp:3:int:16:int:16:int:0:int:32
AES-256 CBC - Decrypt empty buffer
depends_on:0:1:2
6:exp:17:int:0:int:0
AES-256 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:0:exp:3
AES-256 CBC - Encrypt and decrypt 1 byte with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:1:exp:3
AES-256 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:2:exp:3
AES-256 CBC - Encrypt and decrypt 7 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:7:exp:3
AES-256 CBC - Encrypt and decrypt 8 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:8:exp:3
AES-256 CBC - Encrypt and decrypt 9 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:9:exp:3
AES-256 CBC - Encrypt and decrypt 15 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:15:exp:3
AES-256 CBC - Encrypt and decrypt 16 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:16:exp:3
AES-256 CBC - Encrypt and decrypt 17 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:17:exp:3
AES-256 CBC - Encrypt and decrypt 31 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:31:exp:3
AES-256 CBC - Encrypt and decrypt 32 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:32:exp:3
AES-256 CBC - Encrypt and decrypt 33 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:33:exp:3
AES-256 CBC - Encrypt and decrypt 47 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:47:exp:3
AES-256 CBC - Encrypt and decrypt 48 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:48:exp:3
AES-256 CBC - Encrypt and decrypt 49 bytes with PKCS7 padding
depends_on:0:1:2
4:exp:17:char*:"AES-256-CBC":int:256:int:49:exp:3
AES-256 CBC - Encrypt and decrypt 0 bytes in multiple parts with PKCS7 padding
depends_on:0:1:2
7:exp:17:int:256:int:0:int:0:exp:3:int:0:int:0:int:0:int:0
AES-256 CBC - Encrypt and decrypt 1 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:17:int:256:int:1:int:0:exp:3:int:0:int:0:int:0:int:0
AES-256 CBC - Encrypt and decrypt 1 bytes in multiple parts with PKCS7 padding 2
depends_on:0:1:2
7:exp:17:int:256:int:0:int:1:exp:3:int:0:int:0:int:0:int:0
AES-256 CBC - Encrypt and decrypt 16 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:17:int:256:int:16:int:0:exp:3:int:16:int:0:int:0:int:16
AES-256 CBC - Encrypt and decrypt 16 bytes in multiple parts with PKCS7 padding 2
depends_on:0:1:2
7:exp:17:int:256:int:0:int:16:exp:3:int:0:int:16:int:0:int:16
AES-256 CBC - Encrypt and decrypt 16 bytes in multiple parts with PKCS7 padding 3
depends_on:0:1:2
7:exp:17:int:256:int:1:int:15:exp:3:int:0:int:16:int:0:int:16
AES-256 CBC - Encrypt and decrypt 16 bytes in multiple parts with PKCS7 padding 4
depends_on:0:1:2
7:exp:17:int:256:int:15:int:1:exp:3:int:0:int:16:int:0:int:16
AES-256 CBC - Encrypt and decrypt 22 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:17:int:256:int:15:int:7:exp:3:int:0:int:16:int:0:int:16
AES-256 CBC - Encrypt and decrypt 22 bytes in multiple parts with PKCS7 padding 2
depends_on:0:1:2
7:exp:17:int:256:int:16:int:6:exp:3:int:16:int:0:int:0:int:16
AES-256 CBC - Encrypt and decrypt 23 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:17:int:256:int:17:int:6:exp:3:int:16:int:0:int:16:int:0
AES-256 CBC - Encrypt and decrypt 32 bytes in multiple parts with PKCS7 padding 1
depends_on:0:1:2
7:exp:17:int:256:int:16:int:16:exp:3:int:16:int:16:int:0:int:32
AES Decrypt test vector #0
depends_on:0:2:1:2
8:exp:0:exp:9:hex:"ffffffffe00000000000000000000000":hex:"00000000000000000000000000000000":hex:"23f710842b9bb9c32f26648c786807ca":hex:"00000000000000000000000000000000":hex:"":hex:"":exp:18:int:0
AES Decrypt test vector #1
depends_on:0:1:2
8:exp:0:exp:7:hex:"ffffffffe00000000000000000000000":hex:"00000000000000000000000000000000":hex:"23f710842b9bb9c32f26648c786807ca":hex:"00000000000000000000000000000000":hex:"":hex:"":int:0:int:0
AES Decrypt test vector #2
depends_on:0:1:2
8:exp:16:exp:7:hex:"000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"707b1dbb0ffa40ef7d95def421233fae":hex:"fffffffff80000000000000000000000":hex:"":hex:"":int:0:int:0
AES Decrypt test vector #3
depends_on:0:1:2
8:exp:17:exp:7:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"49af6b372135acef10132e548f217b17":hex:"ff000000000000000000000000000000":hex:"":hex:"":int:0:int:0
AES Decrypt test vector #4
depends_on:0:7
8:exp:10:exp:3:hex:"fffffffe000000000000000000000000":hex:"00000000000000000000000000000000":hex:"1114bc2028009b923f0b01915ce5e7c4":hex:"00000000000000000000000000000000":hex:"":hex:"":int:0:int:0
AES Decrypt test vector #5
depends_on:0:7
8:exp:19:exp:3:hex:"ffffffffffffffffffffffffffffffffffffffffffe00000":hex:"00000000000000000000000000000000":hex:"60136703374f64e860b48ce31f930716":hex:"00000000000000000000000000000000":hex:"":hex:"":int:0:int:0
AES Decrypt test vector #6
depends_on:0:7
8:exp:20:exp:3:hex:"ffffffffff800000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"be66cfea2fecd6bf0ec7b4352c99bcaa":hex:"00000000000000000000000000000000":hex:"":hex:"":int:0:int:0
AES Decrypt test vector #7
depends_on:0:8
8:exp:11:exp:3:hex:"2B7E151628AED2A6ABF7158809CF4F3C":hex:"000102030405060708090A0B0C0D0E0F":hex:"3B3FD92EB72DAD20333449F8E83CFB4A7789508d16918f03f53c52dac54ed8259740051e9c5fecf64344f7a82260edcc304c6528f659c77866a510d9c1d6ae5e":hex:"6BC1BEE22E409F96E93D7E117393172AAE2D8A571E03AC9C9EB76FAC45AF8E5130C81C46A35CE411E5FBC1191A0A52EFF69F2445DF4F9B17AD2B417BE66C3710":hex:"":hex:"":int:0:int:0
AES Decrypt test vector #8
depends_on:0:8
8:exp:12:exp:3:hex:"8E73B0F7DA0E6452C810F32B809079E562F8EAD2522C6B7B":hex:"000102030405060708090A0B0C0D0E0F":hex:"CDC80D6FDDF18CAB34C25909C99A4174fcc28b8d4c63837c09e81700c11004018d9a9aeac0f6596f559c6d4daf59a5f26d9f200857ca6c3e9cac524bd9acc92a":hex:"6BC1BEE22E409F96E93D7E117393172AAE2D8A571E03AC9C9EB76FAC45AF8E5130C81C46A35CE411E5FBC1191A0A52EFF69F2445DF4F9B17AD2B417BE66C3710":hex:"":hex:"":int:0:int:0
AES Decrypt test vector #9
depends_on:0:8
8:exp:13:exp:3:hex:"603DEB1015CA71BE2B73AEF0857D77811F352C073B6108D72D9810A30914DFF4":hex:"000102030405060708090A0B0C0D0E0F":hex:"DC7E84BFDA79164B7ECD8486985D38604febdc6740d20b3ac88f6ad82a4fb08d71ab47a086e86eedf39d1c5bba97c4080126141d67f37be8538f5a8be740e484":hex:"6BC1BEE22E409F96E93D7E117393172AAE2D8A571E03AC9C9EB76FAC45AF8E5130C81C46A35CE411E5FBC1191A0A52EFF69F2445DF4F9B17AD2B417BE66C3710":hex:"":hex:"":int:0:int:0
AES-128-ECB Encrypt NIST KAT #1
depends_on:0
10:exp:21:exp:22:hex:"00000000000000000000000000000000":hex:"f34481ec3cc627bacd5dc3fb08f273e6":hex:"0336763e966d92595a567cc9ce537f5e":int:0
AES-128-ECB Encrypt NIST KAT #2
depends_on:0
10:exp:21:exp:22:hex:"00000000000000000000000000000000":hex:"9798c4640bad75c7c3227db910174e72":hex:"a9a1631bf4996954ebc093957b234589":int:0
AES-128-ECB Encrypt NIST KAT #3
depends_on:0
10:exp:21:exp:22:hex:"00000000000000000000000000000000":hex:"96ab5c2ff612d9dfaae8c31f30c42168":hex:"ff4f8391a6a40ca5b25d23bedd44a597":int:0
AES-128-ECB Encrypt NIST KAT #4
depends_on:0
10:exp:21:exp:22:hex:"e0000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"72a1da770f5d7ac4c9ef94d822affd97":int:0
AES-128-ECB Encrypt NIST KAT #5
depends_on:0
10:exp:21:exp:22:hex:"f0000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"970014d634e2b7650777e8e84d03ccd8":int:0
AES-128-ECB Encrypt NIST KAT #6
depends_on:0
10:exp:21:exp:22:hex:"f8000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"f17e79aed0db7e279e955b5f493875a7":int:0
AES-128-ECB Encrypt NIST KAT #7
depends_on:0
10:exp:21:exp:22:hex:"fffffffffffff0000000000000000000":hex:"00000000000000000000000000000000":hex:"7b90785125505fad59b13c186dd66ce3":int:0
AES-128-ECB Encrypt NIST KAT #8
depends_on:0
10:exp:21:exp:22:hex:"fffffffffffff8000000000000000000":hex:"00000000000000000000000000000000":hex:"8b527a6aebdaec9eaef8eda2cb7783e5":int:0
AES-128-ECB Encrypt NIST KAT #9
depends_on:0
10:exp:21:exp:22:hex:"fffffffffffffc000000000000000000":hex:"00000000000000000000000000000000":hex:"43fdaf53ebbc9880c228617d6a9b548b":int:0
AES-128-ECB Encrypt NIST KAT #10
depends_on:0
10:exp:21:exp:22:hex:"ffffffffffffffffffffffffffffc000":hex:"00000000000000000000000000000000":hex:"70c46bb30692be657f7eaa93ebad9897":int:0
AES-128-ECB Encrypt NIST KAT #11
depends_on:0
10:exp:21:exp:22:hex:"ffffffffffffffffffffffffffffe000":hex:"00000000000000000000000000000000":hex:"323994cfb9da285a5d9642e1759b224a":int:0
AES-128-ECB Encrypt NIST KAT #12
depends_on:0
10:exp:21:exp:22:hex:"fffffffffffffffffffffffffffff000":hex:"00000000000000000000000000000000":hex:"1dbf57877b7b17385c85d0b54851e371":int:0
AES-128-ECB Encrypt NIST KAT #13
depends_on:0
10:exp:21:exp:22:hex:"00000000000000000000000000000000":hex:"ffffffffffffffc00000000000000000":hex:"3a4d354f02bb5a5e47d39666867f246a":int:0
AES-128-ECB Encrypt NIST KAT #14
depends_on:0
10:exp:21:exp:22:hex:"00000000000000000000000000000000":hex:"ffffffffffffffe00000000000000000":hex:"d451b8d6e1e1a0ebb155fbbf6e7b7dc3":int:0
AES-128-ECB Encrypt NIST KAT #15
depends_on:0
10:exp:21:exp:22:hex:"00000000000000000000000000000000":hex:"fffffffffffffff00000000000000000":hex:"6898d4f42fa7ba6a10ac05e87b9f2080":int:0
AES-128-ECB Encrypt NIST KAT #16
depends_on:0
10:exp:21:exp:22:hex:"00000000000000000000000000000000":hex:"ffffffffffffffffffffffffe0000000":hex:"082eb8be35f442fb52668e16a591d1d6":int:0
AES-128-ECB Encrypt NIST KAT #17
depends_on:0
10:exp:21:exp:22:hex:"00000000000000000000000000000000":hex:"fffffffffffffffffffffffff0000000":hex:"e656f9ecf5fe27ec3e4a73d00c282fb3":int:0
AES-128-ECB Encrypt NIST KAT #18
depends_on:0
10:exp:21:exp:22:hex:"00000000000000000000000000000000":hex:"fffffffffffffffffffffffff8000000":hex:"2ca8209d63274cd9a29bb74bcd77683a":int:0
AES-128-ECB Decrypt NIST KAT #1
depends_on:0
10:exp:21:exp:23:hex:"00000000000000000000000000000000":hex:"db4f1aa530967d6732ce4715eb0ee24b":hex:"ff000000000000000000000000000000":int:0
AES-128-ECB Decrypt NIST KAT #2
depends_on:0
10:exp:21:exp:23:hex:"00000000000000000000000000000000":hex:"a81738252621dd180a34f3455b4baa2f":hex:"ff800000000000000000000000000000":int:0
AES-128-ECB Decrypt NIST KAT #3
depends_on:0
10:exp:21:exp:23:hex:"00000000000000000000000000000000":hex:"77e2b508db7fd89234caf7939ee5621a":hex:"ffc00000000000000000000000000000":int:0
AES-128-ECB Decrypt NIST KAT #4
depends_on:0
10:exp:21:exp:23:hex:"00000000000000000000000000000000":hex:"dc43be40be0e53712f7e2bf5ca707209":hex:"6a118a874519e64e9963798a503f1d35":int:0
AES-128-ECB Decrypt NIST KAT #5
depends_on:0
10:exp:21:exp:23:hex:"00000000000000000000000000000000":hex:"92beedab1895a94faa69b632e5cc47ce":hex:"cb9fceec81286ca3e989bd979b0cb284":int:0
AES-128-ECB Decrypt NIST KAT #6
depends_on:0
10:exp:21:exp:23:hex:"00000000000000000000000000000000":hex:"459264f4798f6a78bacb89c15ed3d601":hex:"b26aeb1874e47ca8358ff22378f09144":int:0
AES-128-ECB Decrypt NIST KAT #7
depends_on:0
10:exp:21:exp:23:hex:"b69418a85332240dc82492353956ae0c":hex:"a303d940ded8f0baff6f75414cac5243":hex:"00000000000000000000000000000000":int:0
AES-128-ECB Decrypt NIST KAT #8
depends_on:0
10:exp:21:exp:23:hex:"71b5c08a1993e1362e4d0ce9b22b78d5":hex:"c2dabd117f8a3ecabfbb11d12194d9d0":hex:"00000000000000000000000000000000":int:0
AES-128-ECB Decrypt NIST KAT #9
depends_on:0
10:exp:21:exp:23:hex:"e234cdca2606b81f29408d5f6da21206":hex:"fff60a4740086b3b9c56195b98d91a7b":hex:"00000000000000000000000000000000":int:0
AES-128-ECB Decrypt NIST KAT #10
depends_on:0
10:exp:21:exp:23:hex:"ffffffffffffffff0000000000000000":hex:"84be19e053635f09f2665e7bae85b42d":hex:"00000000000000000000000000000000":int:0
AES-128-ECB Decrypt NIST KAT #11
depends_on:0
10:exp:21:exp:23:hex:"ffffffffffffffff8000000000000000":hex:"32cd652842926aea4aa6137bb2be2b5e":hex:"00000000000000000000000000000000":int:0
AES-192-ECB Encrypt NIST KAT #1
depends_on:0
10:exp:24:exp:22:hex:"000000000000000000000000000000000000000000000000":hex:"fffffffffffffffffffff80000000000":hex:"156f07767a85a4312321f63968338a01":int:0
AES-192-ECB Encrypt NIST KAT #2
depends_on:0
10:exp:24:exp:22:hex:"000000000000000000000000000000000000000000000000":hex:"fffffffffffffffffffffc0000000000":hex:"15eec9ebf42b9ca76897d2cd6c5a12e2":int:0
AES-192-ECB Encrypt NIST KAT #3
depends_on:0
10:exp:24:exp:22:hex:"000000000000000000000000000000000000000000000000":hex:"fffffffffffffffffffffe0000000000":hex:"db0d3a6fdcc13f915e2b302ceeb70fd8":int:0
AES-192-ECB Encrypt NIST KAT #4
depends_on:0
10:exp:24:exp:22:hex:"000000000000000000000000000000000000000000000000":hex:"51719783d3185a535bd75adc65071ce1":hex:"4f354592ff7c8847d2d0870ca9481b7c":int:0
AES-192-ECB Encrypt NIST KAT #5
depends_on:0
10:exp:24:exp:22:hex:"000000000000000000000000000000000000000000000000":hex:"26aa49dcfe7629a8901a69a9914e6dfd":hex:"d5e08bf9a182e857cf40b3a36ee248cc":int:0
AES-192-ECB Encrypt NIST KAT #6
depends_on:0
10:exp:24:exp:22:hex:"000000000000000000000000000000000000000000000000":hex:"941a4773058224e1ef66d10e0a6ee782":hex:"067cd9d3749207791841562507fa9626":int:0
AES-192-ECB Encrypt NIST KAT #7
depends_on:0
10:exp:24:exp:22:hex:"d2926527e0aa9f37b45e2ec2ade5853ef807576104c7ace3":hex:"00000000000000000000000000000000":hex:"dd619e1cf204446112e0af2b9afa8f8c":int:0
AES-192-ECB Encrypt NIST KAT #8
depends_on:0
10:exp:24:exp:22:hex:"982215f4e173dfa0fcffe5d3da41c4812c7bcc8ed3540f93":hex:"00000000000000000000000000000000":hex:"d4f0aae13c8fe9339fbf9e69ed0ad74d":int:0
AES-192-ECB Encrypt NIST KAT #9
depends_on:0
10:exp:24:exp:22:hex:"98c6b8e01e379fbd14e61af6af891596583565f2a27d59e9":hex:"00000000000000000000000000000000":hex:"19c80ec4a6deb7e5ed1033dda933498f":int:0
AES-192-ECB Encrypt NIST KAT #10
depends_on:0
10:exp:24:exp:22:hex:"fffffffffffffffffffffffffff800000000000000000000":hex:"00000000000000000000000000000000":hex:"8dd274bd0f1b58ae345d9e7233f9b8f3":int:0
AES-192-ECB Encrypt NIST KAT #11
depends_on:0
10:exp:24:exp:22:hex:"fffffffffffffffffffffffffffc00000000000000000000":hex:"00000000000000000000000000000000":hex:"9d6bdc8f4ce5feb0f3bed2e4b9a9bb0b":int:0
AES-192-ECB Encrypt NIST KAT #12
depends_on:0
10:exp:24:exp:22:hex:"fffffffffffffffffffffffffffe00000000000000000000":hex:"00000000000000000000000000000000":hex:"fd5548bcf3f42565f7efa94562528d46":int:0
AES-192-ECB Decrypt NIST KAT #1
depends_on:0
10:exp:24:exp:23:hex:"fffffffffffffffffffffffffffffffff000000000000000":hex:"bb2852c891c5947d2ed44032c421b85f":hex:"00000000000000000000000000000000":int:0
AES-192-ECB Decrypt NIST KAT #2
depends_on:0
10:exp:24:exp:23:hex:"fffffffffffffffffffffffffffffffff800000000000000":hex:"1b9f5fbd5e8a4264c0a85b80409afa5e":hex:"00000000000000000000000000000000":int:0
AES-192-ECB Decrypt NIST KAT #3
depends_on:0
10:exp:24:exp:23:hex:"fffffffffffffffffffffffffffffffffc00000000000000":hex:"30dab809f85a917fe924733f424ac589":hex:"00000000000000000000000000000000":int:0
AES-192-ECB Decrypt NIST KAT #4
depends_on:0
10:exp:24:exp:23:hex:"61257134a518a0d57d9d244d45f6498cbc32f2bafc522d79":hex:"cfe4d74002696ccf7d87b14a2f9cafc9":hex:"00000000000000000000000000000000":int:0
AES-192-ECB Decrypt NIST KAT #5
depends_on:0
10:exp:24:exp:23:hex:"b0ab0a6a818baef2d11fa33eac947284fb7d748cfb75e570":hex:"d2eafd86f63b109b91f5dbb3a3fb7e13":hex:"00000000000000000000000000000000":int:0
AES-192-ECB Decrypt NIST KAT #6
depends_on:0
10:exp:24:exp:23:hex:"ee053aa011c8b428cdcc3636313c54d6a03cac01c71579d6":hex:"9b9fdd1c5975655f539998b306a324af":hex:"00000000000000000000000000000000":int:0
AES-192-ECB Decrypt NIST KAT #7
depends_on:0
10:exp:24:exp:23:hex:"000000000000000000000000000000000000000000000000":hex:"275cfc0413d8ccb70513c3859b1d0f72":hex:"1b077a6af4b7f98229de786d7516b639":int:0
AES-192-ECB Decrypt NIST KAT #8
depends_on:0
10:exp:24:exp:23:hex:"000000000000000000000000000000000000000000000000":hex:"c9b8135ff1b5adc413dfd053b21bd96d":hex:"9c2d8842e5f48f57648205d39a239af1":int:0
AES-192-ECB Decrypt NIST KAT #9
depends_on:0
10:exp:24:exp:23:hex:"000000000000000000000000000000000000000000000000":hex:"4a3650c3371ce2eb35e389a171427440":hex:"bff52510095f518ecca60af4205444bb":int:0
AES-192-ECB Decrypt NIST KAT #10
depends_on:0
10:exp:24:exp:23:hex:"000000000000000000000000000000000000000000000000":hex:"b2099795e88cc158fd75ea133d7e7fbe":hex:"ffffffffffffffffffffc00000000000":int:0
AES-192-ECB Decrypt NIST KAT #11
depends_on:0
10:exp:24:exp:23:hex:"000000000000000000000000000000000000000000000000":hex:"a6cae46fb6fadfe7a2c302a34242817b":hex:"ffffffffffffffffffffe00000000000":int:0
AES-192-ECB Decrypt NIST KAT #12
depends_on:0
10:exp:24:exp:23:hex:"000000000000000000000000000000000000000000000000":hex:"026a7024d6a902e0b3ffccbaa910cc3f":hex:"fffffffffffffffffffff00000000000":int:0
AES-256-ECB Encrypt NIST KAT #1
depends_on:0
10:exp:25:exp:22:hex:"c1cc358b449909a19436cfbb3f852ef8bcb5ed12ac7058325f56e6099aab1a1c":hex:"00000000000000000000000000000000":hex:"352065272169abf9856843927d0674fd":int:0
AES-256-ECB Encrypt NIST KAT #2
depends_on:0
10:exp:25:exp:22:hex:"984ca75f4ee8d706f46c2d98c0bf4a45f5b00d791c2dfeb191b5ed8e420fd627":hex:"00000000000000000000000000000000":hex:"4307456a9e67813b452e15fa8fffe398":int:0
AES-256-ECB Encrypt NIST KAT #3
depends_on:0
10:exp:25:exp:22:hex:"b43d08a447ac8609baadae4ff12918b9f68fc1653f1269222f123981ded7a92f":hex:"00000000000000000000000000000000":hex:"4663446607354989477a5c6f0f007ef4":int:0
AES-256-ECB Encrypt NIST KAT #4
depends_on:0
10:exp:25:exp:22:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"0b24af36193ce4665f2825d7b4749c98":hex:"a9ff75bd7cf6613d3731c77c3b6d0c04":int:0
AES-256-ECB Encrypt NIST KAT #5
depends_on:0
10:exp:25:exp:22:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"761c1fe41a18acf20d241650611d90f1":hex:"623a52fcea5d443e48d9181ab32c7421":int:0
AES-256-ECB Encrypt NIST KAT #6
depends_on:0
10:exp:25:exp:22:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"8a560769d605868ad80d819bdba03771":hex:"38f2c7ae10612415d27ca190d27da8b4":int:0
AES-256-ECB Encrypt NIST KAT #7
depends_on:0
10:exp:25:exp:22:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"ffffff80000000000000000000000000":hex:"36aff0ef7bf3280772cf4cac80a0d2b2":int:0
AES-256-ECB Encrypt NIST KAT #8
depends_on:0
10:exp:25:exp:22:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"ffffffc0000000000000000000000000":hex:"1f8eedea0f62a1406d58cfc3ecea72cf":int:0
AES-256-ECB Encrypt NIST KAT #9
depends_on:0
10:exp:25:exp:22:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"ffffffe0000000000000000000000000":hex:"abf4154a3375a1d3e6b1d454438f95a6":int:0
AES-256-ECB Encrypt NIST KAT #10
depends_on:0
10:exp:25:exp:22:hex:"ffffffffffffffffffffffffffffffffffff8000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"45d089c36d5c5a4efc689e3b0de10dd5":int:0
AES-256-ECB Encrypt NIST KAT #11
depends_on:0
10:exp:25:exp:22:hex:"ffffffffffffffffffffffffffffffffffffc000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"b4da5df4becb5462e03a0ed00d295629":int:0
AES-256-ECB Encrypt NIST KAT #12
depends_on:0
10:exp:25:exp:22:hex:"ffffffffffffffffffffffffffffffffffffe000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"dcf4e129136c1a4b7a0f38935cc34b2b":int:0
AES-256-ECB Decrypt NIST KAT #1
depends_on:0
10:exp:25:exp:23:hex:"fffffffffffffffffffffffffffffffffffffffffffffff00000000000000000":hex:"edf61ae362e882ddc0167474a7a77f3a":hex:"00000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #2
depends_on:0
10:exp:25:exp:23:hex:"fffffffffffffffffffffffffffffffffffffffffffffff80000000000000000":hex:"6168b00ba7859e0970ecfd757efecf7c":hex:"00000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #3
depends_on:0
10:exp:25:exp:23:hex:"fffffffffffffffffffffffffffffffffffffffffffffffc0000000000000000":hex:"d1415447866230d28bb1ea18a4cdfd02":hex:"00000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #4
depends_on:0
10:exp:25:exp:23:hex:"f8be9ba615c5a952cabbca24f68f8593039624d524c816acda2c9183bd917cb9":hex:"a3944b95ca0b52043584ef02151926a8":hex:"00000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #5
depends_on:0
10:exp:25:exp:23:hex:"797f8b3d176dac5b7e34a2d539c4ef367a16f8635f6264737591c5c07bf57a3e":hex:"a74289fe73a4c123ca189ea1e1b49ad5":hex:"00000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #6
depends_on:0
10:exp:25:exp:23:hex:"6838d40caf927749c13f0329d331f448e202c73ef52c5f73a37ca635d4c47707":hex:"b91d4ea4488644b56cf0812fa7fcf5fc":hex:"00000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #7
depends_on:0
10:exp:25:exp:23:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"623a52fcea5d443e48d9181ab32c7421":hex:"761c1fe41a18acf20d241650611d90f1":int:0
AES-256-ECB Decrypt NIST KAT #8
depends_on:0
10:exp:25:exp:23:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"38f2c7ae10612415d27ca190d27da8b4":hex:"8a560769d605868ad80d819bdba03771":int:0
AES-256-ECB Decrypt NIST KAT #9
depends_on:0
10:exp:25:exp:23:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"1bc704f1bce135ceb810341b216d7abe":hex:"91fbef2d15a97816060bee1feaa49afe":int:0
AES-256-ECB Decrypt NIST KAT #10
depends_on:0
10:exp:25:exp:23:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"ddc6bf790c15760d8d9aeb6f9a75fd4e":hex:"80000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #11
depends_on:0
10:exp:25:exp:23:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"0a6bdc6d4c1e6280301fd8e97ddbe601":hex:"c0000000000000000000000000000000":int:0
AES-256-ECB Decrypt NIST KAT #12
depends_on:0
10:exp:25:exp:23:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"9b80eefb7ebe2d2b16247aa0efc72f5d":hex:"e0000000000000000000000000000000":int:0
AES-128-ECB crypt Encrypt NIST KAT #1
depends_on:0
11:exp:21:exp:22:hex:"00000000000000000000000000000000":hex:"":hex:"f34481ec3cc627bacd5dc3fb08f273e6":hex:"0336763e966d92595a567cc9ce537f5e":int:0:int:0
AES-128-ECB crypt Encrypt NIST KAT #2
depends_on:0
11:exp:21:exp:22:hex:"f0000000000000000000000000000000":hex:"":hex:"00000000000000000000000000000000":hex:"970014d634e2b7650777e8e84d03ccd8":int:0:int:0
AES-128-ECB crypt Encrypt NIST KAT #3
depends_on:0
11:exp:21:exp:22:hex:"00000000000000000000000000000000":hex:"":hex:"ffffffffffffffc00000000000000000":hex:"3a4d354f02bb5a5e47d39666867f246a":int:0:int:0
AES-128-ECB crypt Decrypt NIST KAT #1
depends_on:0
11:exp:21:exp:23:hex:"00000000000000000000000000000000":hex:"":hex:"db4f1aa530967d6732ce4715eb0ee24b":hex:"ff000000000000000000000000000000":int:0:int:0
AES-128-ECB crypt Decrypt NIST KAT #2
depends_on:0
11:exp:21:exp:23:hex:"b69418a85332240dc82492353956ae0c":hex:"":hex:"a303d940ded8f0baff6f75414cac5243":hex:"00000000000000000000000000000000":int:0:int:0
AES-128-ECB crypt Decrypt NIST KAT #3
depends_on:0
11:exp:21:exp:23:hex:"ffffffffffffffff8000000000000000":hex:"":hex:"32cd652842926aea4aa6137bb2be2b5e":hex:"00000000000000000000000000000000":int:0:int:0
AES-192-ECB crypt Encrypt NIST KAT #1
depends_on:0
11:exp:24:exp:22:hex:"000000000000000000000000000000000000000000000000":hex:"":hex:"fffffffffffffffffffff80000000000":hex:"156f07767a85a4312321f63968338a01":int:0:int:0
AES-192-ECB crypt Encrypt NIST KAT #2
depends_on:0
11:exp:24:exp:22:hex:"000000000000000000000000000000000000000000000000":hex:"":hex:"51719783d3185a535bd75adc65071ce1":hex:"4f354592ff7c8847d2d0870ca9481b7c":int:0:int:0
AES-192-ECB crypt Encrypt NIST KAT #3
depends_on:0
11:exp:24:exp:22:hex:"d2926527e0aa9f37b45e2ec2ade5853ef807576104c7ace3":hex:"":hex:"00000000000000000000000000000000":hex:"dd619e1cf204446112e0af2b9afa8f8c":int:0:int:0
AES-192-ECB crypt Encrypt NIST KAT #4
depends_on:0
11:exp:24:exp:22:hex:"fffffffffffffffffffffffffff800000000000000000000":hex:"":hex:"00000000000000000000000000000000":hex:"8dd274bd0f1b58ae345d9e7233f9b8f3":int:0:int:0
AES-192-ECB crypt Decrypt NIST KAT #1
depends_on:0
11:exp:24:exp:23:hex:"fffffffffffffffffffffffffffffffff000000000000000":hex:"":hex:"bb2852c891c5947d2ed44032c421b85f":hex:"00000000000000000000000000000000":int:0:int:0
AES-192-ECB crypt Decrypt NIST KAT #2
depends_on:0
11:exp:24:exp:23:hex:"61257134a518a0d57d9d244d45f6498cbc32f2bafc522d79":hex:"":hex:"cfe4d74002696ccf7d87b14a2f9cafc9":hex:"00000000000000000000000000000000":int:0:int:0
AES-192-ECB crypt Decrypt NIST KAT #3
depends_on:0
11:exp:24:exp:23:hex:"000000000000000000000000000000000000000000000000":hex:"":hex:"275cfc0413d8ccb70513c3859b1d0f72":hex:"1b077a6af4b7f98229de786d7516b639":int:0:int:0
AES-192-ECB crypt Decrypt NIST KAT #4
depends_on:0
11:exp:24:exp:23:hex:"000000000000000000000000000000000000000000000000":hex:"":hex:"b2099795e88cc158fd75ea133d7e7fbe":hex:"ffffffffffffffffffffc00000000000":int:0:int:0
AES-256-ECB crypt Encrypt NIST KAT #1
depends_on:0
11:exp:25:exp:22:hex:"c1cc358b449909a19436cfbb3f852ef8bcb5ed12ac7058325f56e6099aab1a1c":hex:"":hex:"00000000000000000000000000000000":hex:"352065272169abf9856843927d0674fd":int:0:int:0
AES-256-ECB crypt Encrypt NIST KAT #2
depends_on:0
11:exp:25:exp:22:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"":hex:"0b24af36193ce4665f2825d7b4749c98":hex:"a9ff75bd7cf6613d3731c77c3b6d0c04":int:0:int:0
AES-256-ECB crypt Encrypt NIST KAT #3
depends_on:0
11:exp:25:exp:22:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"":hex:"ffffff80000000000000000000000000":hex:"36aff0ef7bf3280772cf4cac80a0d2b2":int:0:int:0
AES-256-ECB crypt Encrypt NIST KAT #4
depends_on:0
11:exp:25:exp:22:hex:"ffffffffffffffffffffffffffffffffffff8000000000000000000000000000":hex:"":hex:"00000000000000000000000000000000":hex:"45d089c36d5c5a4efc689e3b0de10dd5":int:0:int:0
AES-256-ECB crypt Decrypt NIST KAT #1
depends_on:0
11:exp:25:exp:23:hex:"fffffffffffffffffffffffffffffffffffffffffffffff00000000000000000":hex:"":hex:"edf61ae362e882ddc0167474a7a77f3a":hex:"00000000000000000000000000000000":int:0:int:0
AES-256-ECB crypt Decrypt NIST KAT #2
depends_on:0
11:exp:25:exp:23:hex:"f8be9ba615c5a952cabbca24f68f8593039624d524c816acda2c9183bd917cb9":hex:"":hex:"a3944b95ca0b52043584ef02151926a8":hex:"00000000000000000000000000000000":int:0:int:0
AES-256-ECB crypt Decrypt NIST KAT #3
depends_on:0
11:exp:25:exp:23:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"":hex:"623a52fcea5d443e48d9181ab32c7421":hex:"761c1fe41a18acf20d241650611d90f1":int:0:int:0
AES-256-ECB crypt Decrypt NIST KAT #4
depends_on:0
11:exp:25:exp:23:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"":hex:"ddc6bf790c15760d8d9aeb6f9a75fd4e":hex:"80000000000000000000000000000000":int:0:int:0
AES-128-CBC crypt Encrypt NIST KAT #1
depends_on:0:1
11:exp:0:exp:22:hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"80000000000000000000000000000000":hex:"3ad78e726c1ec02b7ebfe92b23d9ec34":int:0:int:0
AES-128-CBC crypt Encrypt NIST KAT #2
depends_on:0:1
11:exp:0:exp:22:hex:"ffffffffffffffffffffffffffffe000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"323994cfb9da285a5d9642e1759b224a":int:0:int:0
AES-128-CBC crypt Encrypt NIST KAT #3
depends_on:0:1
11:exp:0:exp:22:hex:"10a58869d74be5a374cf867cfb473859":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"6d251e6944b051e04eaa6fb4dbf78465":int:0:int:0
AES-128-CBC crypt Encrypt NIST KAT #4
depends_on:0:1
11:exp:0:exp:22:hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"f34481ec3cc627bacd5dc3fb08f273e6":hex:"0336763e966d92595a567cc9ce537f5e":int:0:int:0
AES-128-CBC crypt Decrypt NIST KAT #1
depends_on:0:1
11:exp:0:exp:23:hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"3ad78e726c1ec02b7ebfe92b23d9ec34":hex:"80000000000000000000000000000000":int:0:int:0
AES-128-CBC crypt Decrypt NIST KAT #2
depends_on:0:1
11:exp:0:exp:23:hex:"ffffc000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"df556a33438db87bc41b1752c55e5e49":hex:"00000000000000000000000000000000":int:0:int:0
AES-128-CBC crypt Decrypt NIST KAT #3
depends_on:0:1
11:exp:0:exp:23:hex:"10a58869d74be5a374cf867cfb473859":hex:"00000000000000000000000000000000":hex:"6d251e6944b051e04eaa6fb4dbf78465":hex:"00000000000000000000000000000000":int:0:int:0
AES-128-CBC crypt Decrypt NIST KAT #4
depends_on:0:1
11:exp:0:exp:23:hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"0336763e966d92595a567cc9ce537f5e":hex:"f34481ec3cc627bacd5dc3fb08f273e6":int:0:int:0
AES-192-CBC crypt Encrypt NIST KAT #1
depends_on:0:1
11:exp:16:exp:22:hex:"000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"80000000000000000000000000000000":hex:"6cd02513e8d4dc986b4afe087a60bd0c":int:0:int:0
AES-192-CBC crypt Encrypt NIST KAT #2
depends_on:0:1
11:exp:16:exp:22:hex:"ff0000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"833f71258d53036b02952c76c744f5a1":int:0:int:0
AES-192-CBC crypt Encrypt NIST KAT #3
depends_on:0:1
11:exp:16:exp:22:hex:"e9f065d7c13573587f7875357dfbb16c53489f6a4bd0f7cd":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"0956259c9cd5cfd0181cca53380cde06":int:0:int:0
AES-192-CBC crypt Encrypt NIST KAT #4
depends_on:0:1
11:exp:16:exp:22:hex:"000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"1b077a6af4b7f98229de786d7516b639":hex:"275cfc0413d8ccb70513c3859b1d0f72":int:0:int:0
AES-192-CBC crypt Decrypt NIST KAT #1
depends_on:0:1
11:exp:16:exp:23:hex:"000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"6cd02513e8d4dc986b4afe087a60bd0c":hex:"80000000000000000000000000000000":int:0:int:0
AES-192-CBC crypt Decrypt NIST KAT #2
depends_on:0:1
11:exp:16:exp:23:hex:"ffe000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"7ababc4b3f516c9aafb35f4140b548f9":hex:"00000000000000000000000000000000":int:0:int:0
AES-192-CBC crypt Decrypt NIST KAT #3
depends_on:0:1
11:exp:16:exp:23:hex:"e9f065d7c13573587f7875357dfbb16c53489f6a4bd0f7cd":hex:"00000000000000000000000000000000":hex:"0956259c9cd5cfd0181cca53380cde06":hex:"00000000000000000000000000000000":int:0:int:0
AES-192-CBC crypt Decrypt NIST KAT #4
depends_on:0:1
11:exp:16:exp:23:hex:"000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"275cfc0413d8ccb70513c3859b1d0f72":hex:"1b077a6af4b7f98229de786d7516b639":int:0:int:0
AES-256-CBC crypt Encrypt NIST KAT #1
depends_on:0:1
11:exp:17:exp:22:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"80000000000000000000000000000000":hex:"ddc6bf790c15760d8d9aeb6f9a75fd4e":int:0:int:0
AES-256-CBC crypt Encrypt NIST KAT #2
depends_on:0:1
11:exp:17:exp:22:hex:"ff00000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"ec52a212f80a09df6317021bc2a9819e":int:0:int:0
AES-256-CBC crypt Encrypt NIST KAT #3
depends_on:0:1
11:exp:17:exp:22:hex:"c47b0294dbbbee0fec4757f22ffeee3587ca4730c3d33b691df38bab076bc558":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"46f2fb342d6f0ab477476fc501242c5f":int:0:int:0
AES-256-CBC crypt Encrypt NIST KAT #4
depends_on:0:1
11:exp:17:exp:22:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"014730f80ac625fe84f026c60bfd547d":hex:"5c9d844ed46f9885085e5d6a4f94c7d7":int:0:int:0
AES-256-CBC crypt Decrypt NIST KAT #1
depends_on:0:1
11:exp:17:exp:23:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"ddc6bf790c15760d8d9aeb6f9a75fd4e":hex:"80000000000000000000000000000000":int:0:int:0
AES-256-CBC crypt Decrypt NIST KAT #2
depends_on:0:1
11:exp:17:exp:23:hex:"ffe0000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"d1ccb9b1337002cbac42c520b5d67722":hex:"00000000000000000000000000000000":int:0:int:0
AES-256-CBC crypt Decrypt NIST KAT #3
depends_on:0:1
11:exp:17:exp:23:hex:"c47b0294dbbbee0fec4757f22ffeee3587ca4730c3d33b691df38bab076bc558":hex:"00000000000000000000000000000000":hex:"46f2fb342d6f0ab477476fc501242c5f":hex:"00000000000000000000000000000000":int:0:int:0
AES-256-CBC crypt Decrypt NIST KAT #4
depends_on:0:1
11:exp:17:exp:23:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"5c9d844ed46f9885085e5d6a4f94c7d7":hex:"014730f80ac625fe84f026c60bfd547d":int:0:int:0
AES-128-CBC crypt Encrypt NIST KAT #1 PSA
depends_on:10:0:1
11:exp:0:exp:22:hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"80000000000000000000000000000000":hex:"3ad78e726c1ec02b7ebfe92b23d9ec34":int:0:int:1
AES-128-CBC crypt Encrypt NIST KAT #2 PSA
depends_on:10:0:1
11:exp:0:exp:22:hex:"ffffffffffffffffffffffffffffe000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"323994cfb9da285a5d9642e1759b224a":int:0:int:1
AES-128-CBC crypt Encrypt NIST KAT #3 PSA
depends_on:10:0:1
11:exp:0:exp:22:hex:"10a58869d74be5a374cf867cfb473859":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"6d251e6944b051e04eaa6fb4dbf78465":int:0:int:1
AES-128-CBC crypt Encrypt NIST KAT #4 PSA
depends_on:10:0:1
11:exp:0:exp:22:hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"f34481ec3cc627bacd5dc3fb08f273e6":hex:"0336763e966d92595a567cc9ce537f5e":int:0:int:1
AES-128-CBC crypt Decrypt NIST KAT #1 PSA
depends_on:10:0:1
11:exp:0:exp:23:hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"3ad78e726c1ec02b7ebfe92b23d9ec34":hex:"80000000000000000000000000000000":int:0:int:1
AES-128-CBC crypt Decrypt NIST KAT #2 PSA
depends_on:10:0:1
11:exp:0:exp:23:hex:"ffffc000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"df556a33438db87bc41b1752c55e5e49":hex:"00000000000000000000000000000000":int:0:int:1
AES-128-CBC crypt Decrypt NIST KAT #3 PSA
depends_on:10:0:1
11:exp:0:exp:23:hex:"10a58869d74be5a374cf867cfb473859":hex:"00000000000000000000000000000000":hex:"6d251e6944b051e04eaa6fb4dbf78465":hex:"00000000000000000000000000000000":int:0:int:1
AES-128-CBC crypt Decrypt NIST KAT #4 PSA
depends_on:10:0:1
11:exp:0:exp:23:hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"0336763e966d92595a567cc9ce537f5e":hex:"f34481ec3cc627bacd5dc3fb08f273e6":int:0:int:1
AES-192-CBC crypt Encrypt NIST KAT #1 PSA
depends_on:10:0:1
11:exp:16:exp:22:hex:"000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"80000000000000000000000000000000":hex:"6cd02513e8d4dc986b4afe087a60bd0c":int:0:int:1
AES-192-CBC crypt Encrypt NIST KAT #2 PSA
depends_on:10:0:1
11:exp:16:exp:22:hex:"ff0000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"833f71258d53036b02952c76c744f5a1":int:0:int:1
AES-192-CBC crypt Encrypt NIST KAT #3 PSA
depends_on:10:0:1
11:exp:16:exp:22:hex:"e9f065d7c13573587f7875357dfbb16c53489f6a4bd0f7cd":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"0956259c9cd5cfd0181cca53380cde06":int:0:int:1
AES-192-CBC crypt Encrypt NIST KAT #4 PSA
depends_on:10:0:1
11:exp:16:exp:22:hex:"000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"1b077a6af4b7f98229de786d7516b639":hex:"275cfc0413d8ccb70513c3859b1d0f72":int:0:int:1
AES-192-CBC crypt Decrypt NIST KAT #1 PSA
depends_on:10:0:1
11:exp:16:exp:23:hex:"000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"6cd02513e8d4dc986b4afe087a60bd0c":hex:"80000000000000000000000000000000":int:0:int:1
AES-192-CBC crypt Decrypt NIST KAT #2 PSA
depends_on:10:0:1
11:exp:16:exp:23:hex:"ffe000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"7ababc4b3f516c9aafb35f4140b548f9":hex:"00000000000000000000000000000000":int:0:int:1
AES-192-CBC crypt Decrypt NIST KAT #3 PSA
depends_on:10:0:1
11:exp:16:exp:23:hex:"e9f065d7c13573587f7875357dfbb16c53489f6a4bd0f7cd":hex:"00000000000000000000000000000000":hex:"0956259c9cd5cfd0181cca53380cde06":hex:"00000000000000000000000000000000":int:0:int:1
AES-192-CBC crypt Decrypt NIST KAT #4 PSA
depends_on:10:0:1
11:exp:16:exp:23:hex:"000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"275cfc0413d8ccb70513c3859b1d0f72":hex:"1b077a6af4b7f98229de786d7516b639":int:0:int:1
AES-256-CBC crypt Encrypt NIST KAT #1 PSA
depends_on:10:0:1
11:exp:17:exp:22:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"80000000000000000000000000000000":hex:"ddc6bf790c15760d8d9aeb6f9a75fd4e":int:0:int:1
AES-256-CBC crypt Encrypt NIST KAT #2 PSA
depends_on:10:0:1
11:exp:17:exp:22:hex:"ff00000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"ec52a212f80a09df6317021bc2a9819e":int:0:int:1
AES-256-CBC crypt Encrypt NIST KAT #3 PSA
depends_on:10:0:1
11:exp:17:exp:22:hex:"c47b0294dbbbee0fec4757f22ffeee3587ca4730c3d33b691df38bab076bc558":hex:"00000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"46f2fb342d6f0ab477476fc501242c5f":int:0:int:1
AES-256-CBC crypt Encrypt NIST KAT #4 PSA
depends_on:10:0:1
11:exp:17:exp:22:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"014730f80ac625fe84f026c60bfd547d":hex:"5c9d844ed46f9885085e5d6a4f94c7d7":int:0:int:1
AES-256-CBC crypt Decrypt NIST KAT #1 PSA
depends_on:10:0:1
11:exp:17:exp:23:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"ddc6bf790c15760d8d9aeb6f9a75fd4e":hex:"80000000000000000000000000000000":int:0:int:1
AES-256-CBC crypt Decrypt NIST KAT #2 PSA
depends_on:10:0:1
11:exp:17:exp:23:hex:"ffe0000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"d1ccb9b1337002cbac42c520b5d67722":hex:"00000000000000000000000000000000":int:0:int:1
AES-256-CBC crypt Decrypt NIST KAT #3 PSA
depends_on:10:0:1
11:exp:17:exp:23:hex:"c47b0294dbbbee0fec4757f22ffeee3587ca4730c3d33b691df38bab076bc558":hex:"00000000000000000000000000000000":hex:"46f2fb342d6f0ab477476fc501242c5f":hex:"00000000000000000000000000000000":int:0:int:1
AES-256-CBC crypt Decrypt NIST KAT #4 PSA
depends_on:10:0:1
11:exp:17:exp:23:hex:"0000000000000000000000000000000000000000000000000000000000000000":hex:"00000000000000000000000000000000":hex:"5c9d844ed46f9885085e5d6a4f94c7d7":hex:"014730f80ac625fe84f026c60bfd547d":int:0:int:1
Cipher Corner Case behaviours
depends_on:0
3
| 73,470 | 1,805 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_ecp.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "libc/log/log.h"
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_ecp.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_ecp.function
* Test suite data : suites/test_suite_ecp.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_ECP_C)
#include "third_party/mbedtls/ecp.h"
#define ECP_PF_UNKNOWN -1
#define ECP_PT_RESET( x ) \
mbedtls_ecp_point_free( x ); \
mbedtls_ecp_point_init( x );
void test_ecp_valid_param( )
{
TEST_VALID_PARAM( mbedtls_ecp_group_free( NULL ) );
TEST_VALID_PARAM( mbedtls_ecp_keypair_free( NULL ) );
TEST_VALID_PARAM( mbedtls_ecp_point_free( NULL ) );
#if defined(MBEDTLS_ECP_RESTARTABLE)
TEST_VALID_PARAM( mbedtls_ecp_restart_free( NULL ) );
#endif /* MBEDTLS_ECP_RESTARTABLE */
exit:
return;
}
void test_ecp_valid_param_wrapper( void ** params )
{
(void)params;
test_ecp_valid_param( );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_ecp_invalid_param( )
{
mbedtls_ecp_group grp;
mbedtls_ecp_keypair kp;
mbedtls_ecp_point P;
mbedtls_mpi m;
const char *x = "deadbeef";
int valid_fmt = MBEDTLS_ECP_PF_UNCOMPRESSED;
int invalid_fmt = 42;
size_t olen;
unsigned char buf[42] = { 0 };
const unsigned char *null_buf = NULL;
mbedtls_ecp_group_id valid_group = MBEDTLS_ECP_DP_SECP192R1;
#if defined(MBEDTLS_ECP_RESTARTABLE)
mbedtls_ecp_restart_ctx restart_ctx;
#endif /* MBEDTLS_ECP_RESTARTABLE */
TEST_INVALID_PARAM( mbedtls_ecp_point_init( NULL ) );
TEST_INVALID_PARAM( mbedtls_ecp_keypair_init( NULL ) );
TEST_INVALID_PARAM( mbedtls_ecp_group_init( NULL ) );
#if defined(MBEDTLS_ECP_RESTARTABLE)
TEST_INVALID_PARAM( mbedtls_ecp_restart_init( NULL ) );
TEST_INVALID_PARAM( mbedtls_ecp_check_budget( NULL, &restart_ctx, 42 ) );
#endif /* MBEDTLS_ECP_RESTARTABLE */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_copy( NULL, &P ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_copy( &P, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_group_copy( NULL, &grp ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_group_copy( &grp, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_gen_privkey( NULL,
&m,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_gen_privkey( &grp,
NULL,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_gen_privkey( &grp,
&m,
NULL,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_set_zero( NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_is_zero( NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_point_cmp( NULL, &P ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_point_cmp( &P, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_point_read_string( NULL, 2,
x, x ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_point_read_string( &P, 2,
NULL, x ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_point_read_string( &P, 2,
x, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_point_write_binary( NULL, &P,
valid_fmt,
&olen,
buf, sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_point_write_binary( &grp, NULL,
valid_fmt,
&olen,
buf, sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_point_write_binary( &grp, &P,
invalid_fmt,
&olen,
buf, sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_point_write_binary( &grp, &P,
valid_fmt,
NULL,
buf, sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_point_write_binary( &grp, &P,
valid_fmt,
&olen,
NULL, sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_point_read_binary( NULL, &P, buf,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_point_read_binary( &grp, NULL, buf,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_point_read_binary( &grp, &P, NULL,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_read_point( NULL, &P,
(const unsigned char **) &buf,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_read_point( &grp, NULL,
(const unsigned char **) &buf,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_read_point( &grp, &P, &null_buf,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_read_point( &grp, &P, NULL,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_write_point( NULL, &P,
valid_fmt,
&olen,
buf,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_write_point( &grp, NULL,
valid_fmt,
&olen,
buf,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_write_point( &grp, &P,
invalid_fmt,
&olen,
buf,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_write_point( &grp, &P,
valid_fmt,
NULL,
buf,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_write_point( &grp, &P,
valid_fmt,
&olen,
NULL,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_group_load( NULL, valid_group ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_read_group( NULL,
(const unsigned char **) &buf,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_read_group( &grp, NULL,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_read_group( &grp, &null_buf,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_read_group_id( NULL,
(const unsigned char **) &buf,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_read_group_id( &valid_group, NULL,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_read_group_id( &valid_group,
&null_buf,
sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_write_group( NULL, &olen,
buf, sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_write_group( &grp, NULL,
buf, sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_tls_write_group( &grp, &olen,
NULL, sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_mul( NULL, &P, &m, &P,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_mul( &grp, NULL, &m, &P,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_mul( &grp, &P, NULL, &P,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_mul( &grp, &P, &m, NULL,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_mul_restartable( NULL, &P, &m, &P,
mbedtls_test_rnd_std_rand,
NULL , NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_mul_restartable( &grp, NULL, &m, &P,
mbedtls_test_rnd_std_rand,
NULL , NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_mul_restartable( &grp, &P, NULL, &P,
mbedtls_test_rnd_std_rand,
NULL , NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_mul_restartable( &grp, &P, &m, NULL,
mbedtls_test_rnd_std_rand,
NULL , NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_muladd( NULL, &P, &m, &P,
&m, &P ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_muladd( &grp, NULL, &m, &P,
&m, &P ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_muladd( &grp, &P, NULL, &P,
&m, &P ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_muladd( &grp, &P, &m, NULL,
&m, &P ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_muladd( &grp, &P, &m, &P,
NULL, &P ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_muladd( &grp, &P, &m, &P,
&m, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_muladd_restartable( NULL, &P, &m, &P,
&m, &P, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_muladd_restartable( &grp, NULL, &m, &P,
&m, &P, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_muladd_restartable( &grp, &P, NULL, &P,
&m, &P, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_muladd_restartable( &grp, &P, &m, NULL,
&m, &P, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_muladd_restartable( &grp, &P, &m, &P,
NULL, &P, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_muladd_restartable( &grp, &P, &m, &P,
&m, NULL, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_check_pubkey( NULL, &P ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_check_pubkey( &grp, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_check_pub_priv( NULL, &kp ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_check_pub_priv( &kp, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_check_privkey( NULL, &m ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_check_privkey( &grp, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_gen_keypair_base( NULL, &P, &m, &P,
mbedtls_test_rnd_std_rand, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_gen_keypair_base( &grp, NULL, &m, &P,
mbedtls_test_rnd_std_rand, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_gen_keypair_base( &grp, &P, NULL, &P,
mbedtls_test_rnd_std_rand, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_gen_keypair_base( &grp, &P, &m, NULL,
mbedtls_test_rnd_std_rand, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_gen_keypair_base( &grp, &P, &m, &P, NULL, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_gen_keypair( NULL,
&m, &P,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_gen_keypair( &grp,
NULL, &P,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_gen_keypair( &grp,
&m, NULL,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_gen_keypair( &grp,
&m, &P,
NULL,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_gen_key( valid_group, NULL,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecp_gen_key( valid_group, &kp,
NULL, NULL ) );
exit:
return;
}
void test_ecp_invalid_param_wrapper( void ** params )
{
(void)params;
test_ecp_invalid_param( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_mbedtls_ecp_curve_info( int id, int tls_id, int size, char * name )
{
const mbedtls_ecp_curve_info *by_id, *by_tls, *by_name;
by_id = mbedtls_ecp_curve_info_from_grp_id( id );
by_tls = mbedtls_ecp_curve_info_from_tls_id( tls_id );
by_name = mbedtls_ecp_curve_info_from_name( name );
TEST_ASSERT( by_id != NULL );
TEST_ASSERT( by_tls != NULL );
TEST_ASSERT( by_name != NULL );
TEST_ASSERT( by_id == by_tls );
TEST_ASSERT( by_id == by_name );
TEST_ASSERT( by_id->bit_size == size );
exit:
;
}
void test_mbedtls_ecp_curve_info_wrapper( void ** params )
{
test_mbedtls_ecp_curve_info( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), (char *) params[3] );
}
void test_ecp_check_pub( int grp_id, char * x_hex, char * y_hex, char * z_hex,
int ret )
{
mbedtls_ecp_group grp;
mbedtls_ecp_point P;
mbedtls_ecp_group_init( &grp );
mbedtls_ecp_point_init( &P );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, grp_id ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &P.X, 16, x_hex ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &P.Y, 16, y_hex ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &P.Z, 16, z_hex ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &grp, &P ) == ret );
exit:
mbedtls_ecp_group_free( &grp );
mbedtls_ecp_point_free( &P );
}
void test_ecp_check_pub_wrapper( void ** params )
{
test_ecp_check_pub( *( (int *) params[0] ), (char *) params[1], (char *) params[2], (char *) params[3], *( (int *) params[4] ) );
}
#if defined(MBEDTLS_ECP_RESTARTABLE)
void test_ecp_test_vect_restart( int id,
char *dA_str, char *xA_str, char *yA_str,
char *dB_str, char *xZ_str, char *yZ_str,
int max_ops, int min_restarts, int max_restarts )
{
/*
* Test for early restart. Based on test vectors like ecp_test_vect(),
* but for the sake of simplicity only does half of each side. It's
* important to test both base point and random point, though, as memory
* management is different in each case.
*
* Don't try using too precise bounds for restarts as the exact number
* will depend on settings such as MBEDTLS_ECP_FIXED_POINT_OPTIM and
* MBEDTLS_ECP_WINDOW_SIZE, as well as implementation details that may
* change in the future. A factor 2 is a minimum safety margin.
*
* For reference, with mbed TLS 2.4 and default settings, for P-256:
* - Random point mult: ~3250M
* - Cold base point mult: ~3300M
* - Hot base point mult: ~1100M
* With MBEDTLS_ECP_WINDOW_SIZE set to 2 (minimum):
* - Random point mult: ~3850M
*/
mbedtls_ecp_restart_ctx ctx;
mbedtls_ecp_group grp;
mbedtls_ecp_point R, P;
mbedtls_mpi dA, xA, yA, dB, xZ, yZ;
int cnt_restarts;
int ret;
mbedtls_ecp_restart_init( &ctx );
mbedtls_ecp_group_init( &grp );
mbedtls_ecp_point_init( &R ); mbedtls_ecp_point_init( &P );
mbedtls_mpi_init( &dA ); mbedtls_mpi_init( &xA ); mbedtls_mpi_init( &yA );
mbedtls_mpi_init( &dB ); mbedtls_mpi_init( &xZ ); mbedtls_mpi_init( &yZ );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &dA, 16, dA_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &xA, 16, xA_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &yA, 16, yA_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &dB, 16, dB_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &xZ, 16, xZ_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &yZ, 16, yZ_str ) == 0 );
mbedtls_ecp_set_max_ops( (unsigned) max_ops );
/* Base point case */
cnt_restarts = 0;
do {
ECP_PT_RESET( &R );
ret = mbedtls_ecp_mul_restartable( &grp, &R, &dA, &grp.G, NULL, NULL, &ctx );
} while( ret == MBEDTLS_ERR_ECP_IN_PROGRESS && ++cnt_restarts );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.X, &xA ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.Y, &yA ) == 0 );
TEST_ASSERT( cnt_restarts >= min_restarts );
TEST_ASSERT( cnt_restarts <= max_restarts );
/* Non-base point case */
mbedtls_ecp_copy( &P, &R );
cnt_restarts = 0;
do {
ECP_PT_RESET( &R );
ret = mbedtls_ecp_mul_restartable( &grp, &R, &dB, &P, NULL, NULL, &ctx );
} while( ret == MBEDTLS_ERR_ECP_IN_PROGRESS && ++cnt_restarts );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.X, &xZ ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.Y, &yZ ) == 0 );
TEST_ASSERT( cnt_restarts >= min_restarts );
TEST_ASSERT( cnt_restarts <= max_restarts );
/* Do we leak memory when aborting an operation?
* This test only makes sense when we actually restart */
if( min_restarts > 0 )
{
ret = mbedtls_ecp_mul_restartable( &grp, &R, &dB, &P, NULL, NULL, &ctx );
TEST_ASSERT( ret == MBEDTLS_ERR_ECP_IN_PROGRESS );
}
exit:
mbedtls_ecp_restart_free( &ctx );
mbedtls_ecp_group_free( &grp );
mbedtls_ecp_point_free( &R ); mbedtls_ecp_point_free( &P );
mbedtls_mpi_free( &dA ); mbedtls_mpi_free( &xA ); mbedtls_mpi_free( &yA );
mbedtls_mpi_free( &dB ); mbedtls_mpi_free( &xZ ); mbedtls_mpi_free( &yZ );
}
void test_ecp_test_vect_restart_wrapper( void ** params )
{
test_ecp_test_vect_restart( *( (int *) params[0] ), (char *) params[1], (char *) params[2], (char *) params[3], (char *) params[4], (char *) params[5], (char *) params[6], *( (int *) params[7] ), *( (int *) params[8] ), *( (int *) params[9] ) );
}
#endif /* MBEDTLS_ECP_RESTARTABLE */
#if defined(MBEDTLS_ECP_RESTARTABLE)
void test_ecp_muladd_restart( int id, char *xR_str, char *yR_str,
char *u1_str, char *u2_str,
char *xQ_str, char *yQ_str,
int max_ops, int min_restarts, int max_restarts )
{
/*
* Compute R = u1 * G + u2 * Q
* (test vectors mostly taken from ECDSA intermediate results)
*
* See comments at the top of ecp_test_vect_restart()
*/
mbedtls_ecp_restart_ctx ctx;
mbedtls_ecp_group grp;
mbedtls_ecp_point R, Q;
mbedtls_mpi u1, u2, xR, yR;
int cnt_restarts;
int ret;
mbedtls_ecp_restart_init( &ctx );
mbedtls_ecp_group_init( &grp );
mbedtls_ecp_point_init( &R );
mbedtls_ecp_point_init( &Q );
mbedtls_mpi_init( &u1 ); mbedtls_mpi_init( &u2 );
mbedtls_mpi_init( &xR ); mbedtls_mpi_init( &yR );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &u1, 16, u1_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &u2, 16, u2_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &xR, 16, xR_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &yR, 16, yR_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Q.X, 16, xQ_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Q.Y, 16, yQ_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_lset( &Q.Z, 1 ) == 0 );
mbedtls_ecp_set_max_ops( (unsigned) max_ops );
cnt_restarts = 0;
do {
ECP_PT_RESET( &R );
ret = mbedtls_ecp_muladd_restartable( &grp, &R,
&u1, &grp.G, &u2, &Q, &ctx );
} while( ret == MBEDTLS_ERR_ECP_IN_PROGRESS && ++cnt_restarts );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.X, &xR ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.Y, &yR ) == 0 );
TEST_ASSERT( cnt_restarts >= min_restarts );
TEST_ASSERT( cnt_restarts <= max_restarts );
/* Do we leak memory when aborting an operation?
* This test only makes sense when we actually restart */
if( min_restarts > 0 )
{
ret = mbedtls_ecp_muladd_restartable( &grp, &R,
&u1, &grp.G, &u2, &Q, &ctx );
TEST_ASSERT( ret == MBEDTLS_ERR_ECP_IN_PROGRESS );
}
exit:
mbedtls_ecp_restart_free( &ctx );
mbedtls_ecp_group_free( &grp );
mbedtls_ecp_point_free( &R );
mbedtls_ecp_point_free( &Q );
mbedtls_mpi_free( &u1 ); mbedtls_mpi_free( &u2 );
mbedtls_mpi_free( &xR ); mbedtls_mpi_free( &yR );
}
void test_ecp_muladd_restart_wrapper( void ** params )
{
test_ecp_muladd_restart( *( (int *) params[0] ), (char *) params[1], (char *) params[2], (char *) params[3], (char *) params[4], (char *) params[5], (char *) params[6], *( (int *) params[7] ), *( (int *) params[8] ), *( (int *) params[9] ) );
}
#endif /* MBEDTLS_ECP_RESTARTABLE */
void test_ecp_test_vect( int id, char * dA_str, char * xA_str, char * yA_str,
char * dB_str, char * xB_str, char * yB_str,
char * xZ_str, char * yZ_str )
{
mbedtls_ecp_group grp;
mbedtls_ecp_point R;
mbedtls_mpi dA, xA, yA, dB, xB, yB, xZ, yZ;
mbedtls_test_rnd_pseudo_info rnd_info;
mbedtls_ecp_group_init( &grp ); mbedtls_ecp_point_init( &R );
mbedtls_mpi_init( &dA ); mbedtls_mpi_init( &xA ); mbedtls_mpi_init( &yA ); mbedtls_mpi_init( &dB );
mbedtls_mpi_init( &xB ); mbedtls_mpi_init( &yB ); mbedtls_mpi_init( &xZ ); mbedtls_mpi_init( &yZ );
memset( &rnd_info, 0x00, sizeof( mbedtls_test_rnd_pseudo_info ) );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &grp, &grp.G ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &dA, 16, dA_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &xA, 16, xA_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &yA, 16, yA_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &dB, 16, dB_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &xB, 16, xB_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &yB, 16, yB_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &xZ, 16, xZ_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &yZ, 16, yZ_str ) == 0 );
TEST_ASSERT( mbedtls_ecp_mul( &grp, &R, &dA, &grp.G,
&mbedtls_test_rnd_pseudo_rand, &rnd_info ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.X, &xA ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.Y, &yA ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &grp, &R ) == 0 );
TEST_ASSERT( mbedtls_ecp_mul( &grp, &R, &dB, &R, NULL, NULL ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.X, &xZ ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.Y, &yZ ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &grp, &R ) == 0 );
TEST_ASSERT( mbedtls_ecp_mul( &grp, &R, &dB, &grp.G, NULL, NULL ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.X, &xB ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.Y, &yB ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &grp, &R ) == 0 );
TEST_ASSERT( mbedtls_ecp_mul( &grp, &R, &dA, &R,
&mbedtls_test_rnd_pseudo_rand, &rnd_info ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.X, &xZ ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.Y, &yZ ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &grp, &R ) == 0 );
exit:
mbedtls_ecp_group_free( &grp ); mbedtls_ecp_point_free( &R );
mbedtls_mpi_free( &dA ); mbedtls_mpi_free( &xA ); mbedtls_mpi_free( &yA ); mbedtls_mpi_free( &dB );
mbedtls_mpi_free( &xB ); mbedtls_mpi_free( &yB ); mbedtls_mpi_free( &xZ ); mbedtls_mpi_free( &yZ );
}
void test_ecp_test_vect_wrapper( void ** params )
{
test_ecp_test_vect( *( (int *) params[0] ), (char *) params[1], (char *) params[2], (char *) params[3], (char *) params[4], (char *) params[5], (char *) params[6], (char *) params[7], (char *) params[8] );
}
void test_ecp_test_vec_x( int id, char * dA_hex, char * xA_hex, char * dB_hex,
char * xB_hex, char * xS_hex )
{
mbedtls_ecp_group grp;
mbedtls_ecp_point R;
mbedtls_mpi dA, xA, dB, xB, xS;
mbedtls_test_rnd_pseudo_info rnd_info;
mbedtls_ecp_group_init( &grp ); mbedtls_ecp_point_init( &R );
mbedtls_mpi_init( &dA ); mbedtls_mpi_init( &xA );
mbedtls_mpi_init( &dB ); mbedtls_mpi_init( &xB );
mbedtls_mpi_init( &xS );
memset( &rnd_info, 0x00, sizeof( mbedtls_test_rnd_pseudo_info ) );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &grp, &grp.G ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &dA, 16, dA_hex ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &dB, 16, dB_hex ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &xA, 16, xA_hex ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &xB, 16, xB_hex ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &xS, 16, xS_hex ) == 0 );
TEST_ASSERT( mbedtls_ecp_mul( &grp, &R, &dA, &grp.G,
&mbedtls_test_rnd_pseudo_rand, &rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &grp, &R ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.X, &xA ) == 0 );
TEST_ASSERT( mbedtls_ecp_mul( &grp, &R, &dB, &R,
&mbedtls_test_rnd_pseudo_rand, &rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &grp, &R ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.X, &xS ) == 0 );
TEST_ASSERT( mbedtls_ecp_mul( &grp, &R, &dB, &grp.G, NULL, NULL ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &grp, &R ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.X, &xB ) == 0 );
TEST_ASSERT( mbedtls_ecp_mul( &grp, &R, &dA, &R, NULL, NULL ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &grp, &R ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &R.X, &xS ) == 0 );
exit:
mbedtls_ecp_group_free( &grp ); mbedtls_ecp_point_free( &R );
mbedtls_mpi_free( &dA ); mbedtls_mpi_free( &xA );
mbedtls_mpi_free( &dB ); mbedtls_mpi_free( &xB );
mbedtls_mpi_free( &xS );
}
void test_ecp_test_vec_x_wrapper( void ** params )
{
test_ecp_test_vec_x( *( (int *) params[0] ), (char *) params[1], (char *) params[2], (char *) params[3], (char *) params[4], (char *) params[5] );
}
void test_ecp_test_mul( int id, data_t * n_hex,
data_t * Px_hex, data_t * Py_hex, data_t * Pz_hex,
data_t * nPx_hex, data_t * nPy_hex, data_t * nPz_hex,
int expected_ret )
{
mbedtls_ecp_group grp;
mbedtls_ecp_point P, nP, R;
mbedtls_mpi n;
mbedtls_test_rnd_pseudo_info rnd_info;
mbedtls_ecp_group_init( &grp ); mbedtls_ecp_point_init( &R );
mbedtls_ecp_point_init( &P ); mbedtls_ecp_point_init( &nP );
mbedtls_mpi_init( &n );
memset( &rnd_info, 0x00, sizeof( mbedtls_test_rnd_pseudo_info ) );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &grp, &grp.G ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &n, n_hex->x, n_hex->len ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &P.X, Px_hex->x, Px_hex->len ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &P.Y, Py_hex->x, Py_hex->len ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &P.Z, Pz_hex->x, Pz_hex->len ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &nP.X, nPx_hex->x, nPx_hex->len )
== 0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &nP.Y, nPy_hex->x, nPy_hex->len )
== 0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &nP.Z, nPz_hex->x, nPz_hex->len )
== 0 );
TEST_ASSERT( mbedtls_ecp_mul( &grp, &R, &n, &P,
&mbedtls_test_rnd_pseudo_rand, &rnd_info )
== expected_ret );
if( expected_ret == 0 )
{
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &nP.X, &R.X ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &nP.Y, &R.Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &nP.Z, &R.Z ) == 0 );
}
exit:
mbedtls_ecp_group_free( &grp ); mbedtls_ecp_point_free( &R );
mbedtls_ecp_point_free( &P ); mbedtls_ecp_point_free( &nP );
mbedtls_mpi_free( &n );
}
void test_ecp_test_mul_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data11 = {(uint8_t *) params[11], *( (uint32_t *) params[12] )};
data_t data13 = {(uint8_t *) params[13], *( (uint32_t *) params[14] )};
test_ecp_test_mul( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, &data11, &data13, *( (int *) params[15] ) );
}
void test_ecp_test_mul_rng( int id, data_t * d_hex)
{
mbedtls_ecp_group grp;
mbedtls_mpi d;
mbedtls_ecp_point Q;
mbedtls_ecp_group_init( &grp ); mbedtls_mpi_init( &d );
mbedtls_ecp_point_init( &Q );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &grp, &grp.G ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_binary( &d, d_hex->x, d_hex->len ) == 0 );
TEST_ASSERT( mbedtls_ecp_mul( &grp, &Q, &d, &grp.G,
&mbedtls_test_rnd_zero_rand, NULL )
== MBEDTLS_ERR_ECP_RANDOM_FAILED );
exit:
mbedtls_ecp_group_free( &grp ); mbedtls_mpi_free( &d );
mbedtls_ecp_point_free( &Q );
}
void test_ecp_test_mul_rng_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_ecp_test_mul_rng( *( (int *) params[0] ), &data1 );
}
void test_ecp_fast_mod( int id, char * N_str )
{
mbedtls_ecp_group grp;
mbedtls_mpi N, R;
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &R );
mbedtls_ecp_group_init( &grp );
TEST_ASSERT( mbedtls_mpi_read_string( &N, 16, N_str ) == 0 );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( grp.modp != NULL );
/*
* Store correct result before we touch N
*/
TEST_ASSERT( mbedtls_mpi_mod_mpi( &R, &N, &grp.P ) == 0 );
TEST_ASSERT( grp.modp( &N ) == 0 );
TEST_ASSERT( mbedtls_mpi_bitlen( &N ) <= grp.pbits + 3 );
/*
* Use mod rather than addition/subtraction in case previous test fails
*/
TEST_ASSERT( mbedtls_mpi_mod_mpi( &N, &N, &grp.P ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &N, &R ) == 0 );
exit:
mbedtls_mpi_free( &N ); mbedtls_mpi_free( &R );
mbedtls_ecp_group_free( &grp );
}
void test_ecp_fast_mod_wrapper( void ** params )
{
test_ecp_fast_mod( *( (int *) params[0] ), (char *) params[1] );
}
void test_ecp_write_binary( int id, char * x, char * y, char * z, int format,
data_t * out, int blen, int ret )
{
mbedtls_ecp_group grp;
mbedtls_ecp_point P;
unsigned char buf[256];
size_t olen;
memset( buf, 0, sizeof( buf ) );
mbedtls_ecp_group_init( &grp ); mbedtls_ecp_point_init( &P );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &P.X, 16, x ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &P.Y, 16, y ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &P.Z, 16, z ) == 0 );
TEST_ASSERT( mbedtls_ecp_point_write_binary( &grp, &P, format,
&olen, buf, blen ) == ret );
if( ret == 0 )
{
TEST_ASSERT( mbedtls_test_hexcmp( buf, out->x, olen, out->len ) == 0 );
}
exit:
mbedtls_ecp_group_free( &grp ); mbedtls_ecp_point_free( &P );
}
void test_ecp_write_binary_wrapper( void ** params )
{
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
test_ecp_write_binary( *( (int *) params[0] ), (char *) params[1], (char *) params[2], (char *) params[3], *( (int *) params[4] ), &data5, *( (int *) params[7] ), *( (int *) params[8] ) );
}
void test_ecp_read_binary( int id, data_t * buf, char * x, char * y, char * z,
int ret )
{
mbedtls_ecp_group grp;
mbedtls_ecp_point P;
mbedtls_mpi X, Y, Z;
mbedtls_ecp_group_init( &grp ); mbedtls_ecp_point_init( &P );
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &X, 16, x ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, 16, y ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Z, 16, z ) == 0 );
TEST_ASSERT( mbedtls_ecp_point_read_binary( &grp, &P, buf->x, buf->len ) == ret );
if( ret == 0 )
{
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &P.X, &X ) == 0 );
if( mbedtls_ecp_get_type( &grp ) == MBEDTLS_ECP_TYPE_MONTGOMERY )
{
TEST_ASSERT( mbedtls_mpi_is_zero( &Y ) );
TEST_ASSERT( P.Y.p == NULL );
TEST_ASSERT( mbedtls_mpi_is_one( &Z ) );
TEST_ASSERT( mbedtls_mpi_is_one( &P.Z ) );
}
else
{
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &P.Y, &Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &P.Z, &Z ) == 0 );
}
}
exit:
mbedtls_ecp_group_free( &grp ); mbedtls_ecp_point_free( &P );
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &Z );
}
void test_ecp_read_binary_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_ecp_read_binary( *( (int *) params[0] ), &data1, (char *) params[3], (char *) params[4], (char *) params[5], *( (int *) params[6] ) );
}
void test_mbedtls_ecp_tls_read_point( int id, data_t * buf, char * x, char * y,
char * z, int ret )
{
mbedtls_ecp_group grp;
mbedtls_ecp_point P;
mbedtls_mpi X, Y, Z;
const unsigned char *vbuf = buf->x;
mbedtls_ecp_group_init( &grp ); mbedtls_ecp_point_init( &P );
mbedtls_mpi_init( &X ); mbedtls_mpi_init( &Y ); mbedtls_mpi_init( &Z );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &X, 16, x ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Y, 16, y ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &Z, 16, z ) == 0 );
TEST_ASSERT( mbedtls_ecp_tls_read_point( &grp, &P, &vbuf, buf->len ) == ret );
if( ret == 0 )
{
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &P.X, &X ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &P.Y, &Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &P.Z, &Z ) == 0 );
TEST_ASSERT( (uint32_t)( vbuf - buf->x ) == buf->len );
}
exit:
mbedtls_ecp_group_free( &grp ); mbedtls_ecp_point_free( &P );
mbedtls_mpi_free( &X ); mbedtls_mpi_free( &Y ); mbedtls_mpi_free( &Z );
}
void test_mbedtls_ecp_tls_read_point_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_mbedtls_ecp_tls_read_point( *( (int *) params[0] ), &data1, (char *) params[3], (char *) params[4], (char *) params[5], *( (int *) params[6] ) );
}
void test_ecp_tls_write_read_point( int id )
{
mbedtls_ecp_group grp;
mbedtls_ecp_point pt;
unsigned char buf[256];
const unsigned char *vbuf;
size_t olen;
mbedtls_ecp_group_init( &grp );
mbedtls_ecp_point_init( &pt );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
memset( buf, 0x00, sizeof( buf ) ); vbuf = buf;
TEST_ASSERT( mbedtls_ecp_tls_write_point( &grp, &grp.G,
MBEDTLS_ECP_PF_COMPRESSED, &olen, buf, 256 ) == 0 );
TEST_ASSERT( mbedtls_ecp_tls_read_point( &grp, &pt, &vbuf, olen )
== MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE );
TEST_ASSERT( vbuf == buf + olen );
memset( buf, 0x00, sizeof( buf ) ); vbuf = buf;
TEST_ASSERT( mbedtls_ecp_tls_write_point( &grp, &grp.G,
MBEDTLS_ECP_PF_UNCOMPRESSED, &olen, buf, 256 ) == 0 );
TEST_ASSERT( mbedtls_ecp_tls_read_point( &grp, &pt, &vbuf, olen ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &grp.G.X, &pt.X ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &grp.G.Y, &pt.Y ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &grp.G.Z, &pt.Z ) == 0 );
TEST_ASSERT( vbuf == buf + olen );
memset( buf, 0x00, sizeof( buf ) ); vbuf = buf;
TEST_ASSERT( mbedtls_ecp_set_zero( &pt ) == 0 );
TEST_ASSERT( mbedtls_ecp_tls_write_point( &grp, &pt,
MBEDTLS_ECP_PF_COMPRESSED, &olen, buf, 256 ) == 0 );
TEST_ASSERT( mbedtls_ecp_tls_read_point( &grp, &pt, &vbuf, olen ) == 0 );
TEST_ASSERT( mbedtls_ecp_is_zero( &pt ) );
TEST_ASSERT( vbuf == buf + olen );
memset( buf, 0x00, sizeof( buf ) ); vbuf = buf;
TEST_ASSERT( mbedtls_ecp_set_zero( &pt ) == 0 );
TEST_ASSERT( mbedtls_ecp_tls_write_point( &grp, &pt,
MBEDTLS_ECP_PF_UNCOMPRESSED, &olen, buf, 256 ) == 0 );
TEST_ASSERT( mbedtls_ecp_tls_read_point( &grp, &pt, &vbuf, olen ) == 0 );
TEST_ASSERT( mbedtls_ecp_is_zero( &pt ) );
TEST_ASSERT( vbuf == buf + olen );
exit:
mbedtls_ecp_group_free( &grp );
mbedtls_ecp_point_free( &pt );
}
void test_ecp_tls_write_read_point_wrapper( void ** params )
{
test_ecp_tls_write_read_point( *( (int *) params[0] ) );
}
void test_mbedtls_ecp_tls_read_group( data_t * buf, int result, int bits,
int record_len )
{
mbedtls_ecp_group grp;
const unsigned char *vbuf = buf->x;
int ret;
mbedtls_ecp_group_init( &grp );
ret = mbedtls_ecp_tls_read_group( &grp, &vbuf, buf->len );
TEST_ASSERT( ret == result );
if( ret == 0)
{
TEST_ASSERT( mbedtls_mpi_bitlen( &grp.P ) == (size_t) bits );
TEST_ASSERT( vbuf - buf->x == record_len);
}
exit:
mbedtls_ecp_group_free( &grp );
}
void test_mbedtls_ecp_tls_read_group_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_mbedtls_ecp_tls_read_group( &data0, *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_ecp_tls_write_read_group( int id )
{
mbedtls_ecp_group grp1, grp2;
unsigned char buf[10];
const unsigned char *vbuf = buf;
size_t len;
int ret;
mbedtls_ecp_group_init( &grp1 );
mbedtls_ecp_group_init( &grp2 );
memset( buf, 0x00, sizeof( buf ) );
TEST_ASSERT( mbedtls_ecp_group_load( &grp1, id ) == 0 );
TEST_ASSERT( mbedtls_ecp_tls_write_group( &grp1, &len, buf, 10 ) == 0 );
ret = mbedtls_ecp_tls_read_group( &grp2, &vbuf, len );
TEST_ASSERT( ret == 0 );
if( ret == 0 )
{
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &grp1.N, &grp2.N ) == 0 );
TEST_ASSERT( grp1.id == grp2.id );
}
exit:
mbedtls_ecp_group_free( &grp1 );
mbedtls_ecp_group_free( &grp2 );
}
void test_ecp_tls_write_read_group_wrapper( void ** params )
{
test_ecp_tls_write_read_group( *( (int *) params[0] ) );
}
void test_mbedtls_ecp_check_privkey( int id, char * key_hex, int ret )
{
mbedtls_ecp_group grp;
mbedtls_mpi d;
mbedtls_ecp_group_init( &grp );
mbedtls_mpi_init( &d );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &d, 16, key_hex ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_privkey( &grp, &d ) == ret );
exit:
mbedtls_ecp_group_free( &grp );
mbedtls_mpi_free( &d );
}
void test_mbedtls_ecp_check_privkey_wrapper( void ** params )
{
test_mbedtls_ecp_check_privkey( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ) );
}
void test_mbedtls_ecp_check_pub_priv( int id_pub, char * Qx_pub, char * Qy_pub,
int id, char * d, char * Qx, char * Qy,
int ret )
{
mbedtls_ecp_keypair pub, prv;
mbedtls_ecp_keypair_init( &pub );
mbedtls_ecp_keypair_init( &prv );
if( id_pub != MBEDTLS_ECP_DP_NONE )
TEST_ASSERT( mbedtls_ecp_group_load( &pub.grp, id_pub ) == 0 );
TEST_ASSERT( mbedtls_ecp_point_read_string( &pub.Q, 16, Qx_pub, Qy_pub ) == 0 );
if( id != MBEDTLS_ECP_DP_NONE )
TEST_ASSERT( mbedtls_ecp_group_load( &prv.grp, id ) == 0 );
TEST_ASSERT( mbedtls_ecp_point_read_string( &prv.Q, 16, Qx, Qy ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &prv.d, 16, d ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pub_priv( &pub, &prv ) == ret );
exit:
mbedtls_ecp_keypair_free( &pub );
mbedtls_ecp_keypair_free( &prv );
}
void test_mbedtls_ecp_check_pub_priv_wrapper( void ** params )
{
test_mbedtls_ecp_check_pub_priv( *( (int *) params[0] ), (char *) params[1], (char *) params[2], *( (int *) params[3] ), (char *) params[4], (char *) params[5], (char *) params[6], *( (int *) params[7] ) );
}
void test_mbedtls_ecp_gen_keypair( int id )
{
mbedtls_ecp_group grp;
mbedtls_ecp_point Q;
mbedtls_mpi d;
mbedtls_test_rnd_pseudo_info rnd_info;
mbedtls_ecp_group_init( &grp );
mbedtls_ecp_point_init( &Q );
mbedtls_mpi_init( &d );
memset( &rnd_info, 0x00, sizeof( mbedtls_test_rnd_pseudo_info ) );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( mbedtls_ecp_gen_keypair( &grp, &d, &Q,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &grp, &Q ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_privkey( &grp, &d ) == 0 );
exit:
mbedtls_ecp_group_free( &grp );
mbedtls_ecp_point_free( &Q );
mbedtls_mpi_free( &d );
}
void test_mbedtls_ecp_gen_keypair_wrapper( void ** params )
{
test_mbedtls_ecp_gen_keypair( *( (int *) params[0] ) );
}
void test_mbedtls_ecp_gen_key( int id )
{
mbedtls_ecp_keypair key;
mbedtls_test_rnd_pseudo_info rnd_info;
mbedtls_ecp_keypair_init( &key );
memset( &rnd_info, 0x00, sizeof( mbedtls_test_rnd_pseudo_info ) );
TEST_ASSERT( mbedtls_ecp_gen_key( id, &key,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_pubkey( &key.grp, &key.Q ) == 0 );
TEST_ASSERT( mbedtls_ecp_check_privkey( &key.grp, &key.d ) == 0 );
exit:
mbedtls_ecp_keypair_free( &key );
}
void test_mbedtls_ecp_gen_key_wrapper( void ** params )
{
test_mbedtls_ecp_gen_key( *( (int *) params[0] ) );
}
void test_mbedtls_ecp_read_key( int grp_id, data_t* in_key, int expected, int canonical )
{
int ret = 0;
mbedtls_ecp_keypair key;
mbedtls_ecp_keypair key2;
mbedtls_ecp_keypair_init( &key );
mbedtls_ecp_keypair_init( &key2 );
ret = mbedtls_ecp_read_key( grp_id, &key, in_key->x, in_key->len );
TEST_ASSERT( ret == expected );
if( expected == 0 )
{
ret = mbedtls_ecp_check_privkey( &key.grp, &key.d );
TEST_ASSERT( ret == 0 );
if( canonical )
{
unsigned char buf[MBEDTLS_ECP_MAX_BYTES];
ret = mbedtls_ecp_write_key( &key, buf, in_key->len );
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( in_key->x, in_key->len,
buf, in_key->len );
}
else
{
unsigned char export1[MBEDTLS_ECP_MAX_BYTES];
unsigned char export2[MBEDTLS_ECP_MAX_BYTES];
ret = mbedtls_ecp_write_key( &key, export1, in_key->len );
TEST_ASSERT( ret == 0 );
ret = mbedtls_ecp_read_key( grp_id, &key2, export1, in_key->len );
TEST_ASSERT( ret == expected );
ret = mbedtls_ecp_write_key( &key2, export2, in_key->len );
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( export1, in_key->len,
export2, in_key->len );
}
}
exit:
mbedtls_ecp_keypair_free( &key );
mbedtls_ecp_keypair_free( &key2 );
}
void test_mbedtls_ecp_read_key_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_mbedtls_ecp_read_key( *( (int *) params[0] ), &data1, *( (int *) params[3] ), *( (int *) params[4] ) );
}
#if defined(MBEDTLS_SELF_TEST)
void test_ecp_selftest( )
{
TEST_ASSERT( mbedtls_ecp_self_test( 1 ) == 0 );
exit:
;
}
void test_ecp_selftest_wrapper( void ** params )
{
(void)params;
test_ecp_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_ECP_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_ECP_C)
case 0:
{
*out_value = MBEDTLS_ECP_DP_BP512R1;
}
break;
case 1:
{
*out_value = MBEDTLS_ECP_DP_BP384R1;
}
break;
case 2:
{
*out_value = MBEDTLS_ECP_DP_BP256R1;
}
break;
case 3:
{
*out_value = MBEDTLS_ECP_DP_SECP521R1;
}
break;
case 4:
{
*out_value = MBEDTLS_ECP_DP_SECP384R1;
}
break;
case 5:
{
*out_value = MBEDTLS_ECP_DP_SECP256R1;
}
break;
case 6:
{
*out_value = MBEDTLS_ECP_DP_SECP224R1;
}
break;
case 7:
{
*out_value = MBEDTLS_ECP_DP_SECP192R1;
}
break;
case 8:
{
*out_value = MBEDTLS_ECP_DP_CURVE25519;
}
break;
case 9:
{
*out_value = MBEDTLS_ERR_ECP_INVALID_KEY;
}
break;
case 10:
{
*out_value = MBEDTLS_ECP_DP_SECP224K1;
}
break;
case 11:
{
*out_value = MBEDTLS_ECP_PF_UNCOMPRESSED;
}
break;
case 12:
{
*out_value = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL;
}
break;
case 13:
{
*out_value = MBEDTLS_ECP_PF_COMPRESSED;
}
break;
case 14:
{
*out_value = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
}
break;
case 15:
{
*out_value = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE;
}
break;
case 16:
{
*out_value = MBEDTLS_ECP_DP_NONE;
}
break;
case 17:
{
*out_value = MBEDTLS_ECP_DP_CURVE448;
}
break;
case 18:
{
*out_value = INT_MAX;
}
break;
case 19:
{
*out_value = MBEDTLS_ERR_MPI_NOT_ACCEPTABLE;
}
break;
case 20:
{
*out_value = MBEDTLS_ECP_DP_SECP192K1;
}
break;
case 21:
{
*out_value = MBEDTLS_ECP_DP_SECP256K1;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_ECP_C)
case 0:
{
#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 4:
{
#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 5:
{
#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 6:
{
#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 7:
{
#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 8:
{
#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 9:
{
#if defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 10:
{
#if !defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 11:
{
#if defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 12:
{
#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 13:
{
#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_ECP_C)
test_ecp_valid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_ECP_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_ecp_invalid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_ECP_C)
test_mbedtls_ecp_curve_info_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_ECP_C)
test_ecp_check_pub_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_ECP_C) && defined(MBEDTLS_ECP_RESTARTABLE)
test_ecp_test_vect_restart_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_ECP_C) && defined(MBEDTLS_ECP_RESTARTABLE)
test_ecp_muladd_restart_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_ECP_C)
test_ecp_test_vect_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_ECP_C)
test_ecp_test_vec_x_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_ECP_C)
test_ecp_test_mul_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_ECP_C)
test_ecp_test_mul_rng_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_ECP_C)
test_ecp_fast_mod_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_ECP_C)
test_ecp_write_binary_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_ECP_C)
test_ecp_read_binary_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_ECP_C)
test_mbedtls_ecp_tls_read_point_wrapper,
#else
NULL,
#endif
/* Function Id: 14 */
#if defined(MBEDTLS_ECP_C)
test_ecp_tls_write_read_point_wrapper,
#else
NULL,
#endif
/* Function Id: 15 */
#if defined(MBEDTLS_ECP_C)
test_mbedtls_ecp_tls_read_group_wrapper,
#else
NULL,
#endif
/* Function Id: 16 */
#if defined(MBEDTLS_ECP_C)
test_ecp_tls_write_read_group_wrapper,
#else
NULL,
#endif
/* Function Id: 17 */
#if defined(MBEDTLS_ECP_C)
test_mbedtls_ecp_check_privkey_wrapper,
#else
NULL,
#endif
/* Function Id: 18 */
#if defined(MBEDTLS_ECP_C)
test_mbedtls_ecp_check_pub_priv_wrapper,
#else
NULL,
#endif
/* Function Id: 19 */
#if defined(MBEDTLS_ECP_C)
test_mbedtls_ecp_gen_keypair_wrapper,
#else
NULL,
#endif
/* Function Id: 20 */
#if defined(MBEDTLS_ECP_C)
test_mbedtls_ecp_gen_key_wrapper,
#else
NULL,
#endif
/* Function Id: 21 */
#if defined(MBEDTLS_ECP_C)
test_mbedtls_ecp_read_key_wrapper,
#else
NULL,
#endif
/* Function Id: 22 */
#if defined(MBEDTLS_ECP_C) && defined(MBEDTLS_SELF_TEST)
test_ecp_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
/* ++ftrace; */
/* ftrace_install(); */
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_ecp.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 67,668 | 1,904 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_aes.ecb.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_aes.ecb.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_aes.function
* Test suite data : suites/test_suite_aes.ecb.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_AES_C)
#include "third_party/mbedtls/aes.h"
void test_aes_encrypt_ecb( data_t * key_str, data_t * src_str,
data_t * dst, int setkey_result )
{
unsigned char output[100];
mbedtls_aes_context ctx;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
TEST_ASSERT( mbedtls_aes_setkey_enc( &ctx, key_str->x, key_str->len * 8 ) == setkey_result );
if( setkey_result == 0 )
{
TEST_ASSERT( mbedtls_aes_crypt_ecb( &ctx, MBEDTLS_AES_ENCRYPT, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, 16, dst->len ) == 0 );
}
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_encrypt_ecb_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
test_aes_encrypt_ecb( &data0, &data2, &data4, *( (int *) params[6] ) );
}
void test_aes_decrypt_ecb( data_t * key_str, data_t * src_str,
data_t * dst, int setkey_result )
{
unsigned char output[100];
mbedtls_aes_context ctx;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
TEST_ASSERT( mbedtls_aes_setkey_dec( &ctx, key_str->x, key_str->len * 8 ) == setkey_result );
if( setkey_result == 0 )
{
TEST_ASSERT( mbedtls_aes_crypt_ecb( &ctx, MBEDTLS_AES_DECRYPT, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, 16, dst->len ) == 0 );
}
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_decrypt_ecb_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
test_aes_decrypt_ecb( &data0, &data2, &data4, *( (int *) params[6] ) );
}
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_aes_encrypt_cbc( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst,
int cbc_result )
{
unsigned char output[100];
mbedtls_aes_context ctx;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
mbedtls_aes_setkey_enc( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_aes_crypt_cbc( &ctx, MBEDTLS_AES_ENCRYPT, src_str->len, iv_str->x, src_str->x, output ) == cbc_result );
if( cbc_result == 0 )
{
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
}
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_encrypt_cbc_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_aes_encrypt_cbc( &data0, &data2, &data4, &data6, *( (int *) params[8] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_aes_decrypt_cbc( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst,
int cbc_result )
{
unsigned char output[100];
mbedtls_aes_context ctx;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
mbedtls_aes_setkey_dec( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_aes_crypt_cbc( &ctx, MBEDTLS_AES_DECRYPT, src_str->len, iv_str->x, src_str->x, output ) == cbc_result );
if( cbc_result == 0)
{
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
}
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_decrypt_cbc_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_aes_decrypt_cbc( &data0, &data2, &data4, &data6, *( (int *) params[8] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#if defined(MBEDTLS_CIPHER_MODE_XTS)
void test_aes_encrypt_xts( char *hex_key_string, char *hex_data_unit_string,
char *hex_src_string, char *hex_dst_string )
{
enum { AES_BLOCK_SIZE = 16 };
unsigned char *data_unit = NULL;
unsigned char *key = NULL;
unsigned char *src = NULL;
unsigned char *dst = NULL;
unsigned char *output = NULL;
mbedtls_aes_xts_context ctx;
size_t key_len, src_len, dst_len, data_unit_len;
mbedtls_aes_xts_init( &ctx );
data_unit = mbedtls_test_unhexify_alloc( hex_data_unit_string,
&data_unit_len );
TEST_ASSERT( data_unit_len == AES_BLOCK_SIZE );
key = mbedtls_test_unhexify_alloc( hex_key_string, &key_len );
TEST_ASSERT( key_len % 2 == 0 );
src = mbedtls_test_unhexify_alloc( hex_src_string, &src_len );
dst = mbedtls_test_unhexify_alloc( hex_dst_string, &dst_len );
TEST_ASSERT( src_len == dst_len );
output = mbedtls_test_zero_alloc( dst_len );
TEST_ASSERT( mbedtls_aes_xts_setkey_enc( &ctx, key, key_len * 8 ) == 0 );
TEST_ASSERT( mbedtls_aes_crypt_xts( &ctx, MBEDTLS_AES_ENCRYPT, src_len,
data_unit, src, output ) == 0 );
TEST_ASSERT( memcmp( output, dst, dst_len ) == 0 );
exit:
mbedtls_aes_xts_free( &ctx );
mbedtls_free( data_unit );
mbedtls_free( key );
mbedtls_free( src );
mbedtls_free( dst );
mbedtls_free( output );
}
void test_aes_encrypt_xts_wrapper( void ** params )
{
test_aes_encrypt_xts( (char *) params[0], (char *) params[1], (char *) params[2], (char *) params[3] );
}
#endif /* MBEDTLS_CIPHER_MODE_XTS */
#if defined(MBEDTLS_CIPHER_MODE_XTS)
void test_aes_decrypt_xts( char *hex_key_string, char *hex_data_unit_string,
char *hex_dst_string, char *hex_src_string )
{
enum { AES_BLOCK_SIZE = 16 };
unsigned char *data_unit = NULL;
unsigned char *key = NULL;
unsigned char *src = NULL;
unsigned char *dst = NULL;
unsigned char *output = NULL;
mbedtls_aes_xts_context ctx;
size_t key_len, src_len, dst_len, data_unit_len;
mbedtls_aes_xts_init( &ctx );
data_unit = mbedtls_test_unhexify_alloc( hex_data_unit_string,
&data_unit_len );
TEST_ASSERT( data_unit_len == AES_BLOCK_SIZE );
key = mbedtls_test_unhexify_alloc( hex_key_string, &key_len );
TEST_ASSERT( key_len % 2 == 0 );
src = mbedtls_test_unhexify_alloc( hex_src_string, &src_len );
dst = mbedtls_test_unhexify_alloc( hex_dst_string, &dst_len );
TEST_ASSERT( src_len == dst_len );
output = mbedtls_test_zero_alloc( dst_len );
TEST_ASSERT( mbedtls_aes_xts_setkey_dec( &ctx, key, key_len * 8 ) == 0 );
TEST_ASSERT( mbedtls_aes_crypt_xts( &ctx, MBEDTLS_AES_DECRYPT, src_len,
data_unit, src, output ) == 0 );
TEST_ASSERT( memcmp( output, dst, dst_len ) == 0 );
exit:
mbedtls_aes_xts_free( &ctx );
mbedtls_free( data_unit );
mbedtls_free( key );
mbedtls_free( src );
mbedtls_free( dst );
mbedtls_free( output );
}
void test_aes_decrypt_xts_wrapper( void ** params )
{
test_aes_decrypt_xts( (char *) params[0], (char *) params[1], (char *) params[2], (char *) params[3] );
}
#endif /* MBEDTLS_CIPHER_MODE_XTS */
#if defined(MBEDTLS_CIPHER_MODE_XTS)
void test_aes_crypt_xts_size( int size, int retval )
{
mbedtls_aes_xts_context ctx;
const unsigned char src[16] = { 0 };
unsigned char output[16];
unsigned char data_unit[16];
size_t length = size;
mbedtls_aes_xts_init( &ctx );
memset( data_unit, 0x00, sizeof( data_unit ) );
/* Valid pointers are passed for builds with MBEDTLS_CHECK_PARAMS, as
* otherwise we wouldn't get to the size check we're interested in. */
TEST_ASSERT( mbedtls_aes_crypt_xts( &ctx, MBEDTLS_AES_ENCRYPT, length, data_unit, src, output ) == retval );
exit:
;
}
void test_aes_crypt_xts_size_wrapper( void ** params )
{
test_aes_crypt_xts_size( *( (int *) params[0] ), *( (int *) params[1] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_XTS */
#if defined(MBEDTLS_CIPHER_MODE_XTS)
void test_aes_crypt_xts_keysize( int size, int retval )
{
mbedtls_aes_xts_context ctx;
const unsigned char key[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 };
size_t key_len = size;
mbedtls_aes_xts_init( &ctx );
TEST_ASSERT( mbedtls_aes_xts_setkey_enc( &ctx, key, key_len * 8 ) == retval );
TEST_ASSERT( mbedtls_aes_xts_setkey_dec( &ctx, key, key_len * 8 ) == retval );
exit:
mbedtls_aes_xts_free( &ctx );
}
void test_aes_crypt_xts_keysize_wrapper( void ** params )
{
test_aes_crypt_xts_keysize( *( (int *) params[0] ), *( (int *) params[1] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_XTS */
#if defined(MBEDTLS_CIPHER_MODE_CFB)
void test_aes_encrypt_cfb128( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst )
{
unsigned char output[100];
mbedtls_aes_context ctx;
size_t iv_offset = 0;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
mbedtls_aes_setkey_enc( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_aes_crypt_cfb128( &ctx, MBEDTLS_AES_ENCRYPT, 16, &iv_offset, iv_str->x, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, 16, dst->len ) == 0 );
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_encrypt_cfb128_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_aes_encrypt_cfb128( &data0, &data2, &data4, &data6 );
}
#endif /* MBEDTLS_CIPHER_MODE_CFB */
#if defined(MBEDTLS_CIPHER_MODE_CFB)
void test_aes_decrypt_cfb128( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst )
{
unsigned char output[100];
mbedtls_aes_context ctx;
size_t iv_offset = 0;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
mbedtls_aes_setkey_enc( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_aes_crypt_cfb128( &ctx, MBEDTLS_AES_DECRYPT, 16, &iv_offset, iv_str->x, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x, 16, dst->len ) == 0 );
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_decrypt_cfb128_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_aes_decrypt_cfb128( &data0, &data2, &data4, &data6 );
}
#endif /* MBEDTLS_CIPHER_MODE_CFB */
#if defined(MBEDTLS_CIPHER_MODE_CFB)
void test_aes_encrypt_cfb8( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst )
{
unsigned char output[100];
mbedtls_aes_context ctx;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
mbedtls_aes_setkey_enc( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_aes_crypt_cfb8( &ctx, MBEDTLS_AES_ENCRYPT, src_str->len, iv_str->x, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_encrypt_cfb8_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_aes_encrypt_cfb8( &data0, &data2, &data4, &data6 );
}
#endif /* MBEDTLS_CIPHER_MODE_CFB */
#if defined(MBEDTLS_CIPHER_MODE_CFB)
void test_aes_decrypt_cfb8( data_t * key_str, data_t * iv_str,
data_t * src_str, data_t * dst )
{
unsigned char output[100];
mbedtls_aes_context ctx;
memset(output, 0x00, 100);
mbedtls_aes_init( &ctx );
mbedtls_aes_setkey_enc( &ctx, key_str->x, key_str->len * 8 );
TEST_ASSERT( mbedtls_aes_crypt_cfb8( &ctx, MBEDTLS_AES_DECRYPT, src_str->len, iv_str->x, src_str->x, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, dst->x,
src_str->len, dst->len ) == 0 );
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_decrypt_cfb8_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_aes_decrypt_cfb8( &data0, &data2, &data4, &data6 );
}
#endif /* MBEDTLS_CIPHER_MODE_CFB */
#if defined(MBEDTLS_CIPHER_MODE_OFB)
void test_aes_encrypt_ofb( int fragment_size, data_t *key_str,
data_t *iv_str, data_t *src_str,
data_t *expected_output )
{
unsigned char output[32];
mbedtls_aes_context ctx;
size_t iv_offset = 0;
int in_buffer_len;
unsigned char* src_str_next;
memset( output, 0x00, sizeof( output ) );
mbedtls_aes_init( &ctx );
TEST_ASSERT( (size_t)fragment_size < sizeof( output ) );
TEST_ASSERT( mbedtls_aes_setkey_enc( &ctx, key_str->x,
key_str->len * 8 ) == 0 );
in_buffer_len = src_str->len;
src_str_next = src_str->x;
while( in_buffer_len > 0 )
{
TEST_ASSERT( mbedtls_aes_crypt_ofb( &ctx, fragment_size, &iv_offset,
iv_str->x, src_str_next, output ) == 0 );
TEST_ASSERT( memcmp( output, expected_output->x, fragment_size ) == 0 );
in_buffer_len -= fragment_size;
expected_output->x += fragment_size;
src_str_next += fragment_size;
if( in_buffer_len < fragment_size )
fragment_size = in_buffer_len;
}
exit:
mbedtls_aes_free( &ctx );
}
void test_aes_encrypt_ofb_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
test_aes_encrypt_ofb( *( (int *) params[0] ), &data1, &data3, &data5, &data7 );
}
#endif /* MBEDTLS_CIPHER_MODE_OFB */
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_aes_check_params( )
{
mbedtls_aes_context aes_ctx;
#if defined(MBEDTLS_CIPHER_MODE_XTS)
mbedtls_aes_xts_context xts_ctx;
#endif
const unsigned char key[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 };
const unsigned char in[16] = { 0 };
unsigned char out[16];
size_t size;
const int valid_mode = MBEDTLS_AES_ENCRYPT;
const int invalid_mode = 42;
TEST_INVALID_PARAM( mbedtls_aes_init( NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_XTS)
TEST_INVALID_PARAM( mbedtls_aes_xts_init( NULL ) );
#endif
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_setkey_enc( NULL, key, 128 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_setkey_enc( &aes_ctx, NULL, 128 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_setkey_dec( NULL, key, 128 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_setkey_dec( &aes_ctx, NULL, 128 ) );
#if defined(MBEDTLS_CIPHER_MODE_XTS)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_xts_setkey_enc( NULL, key, 128 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_xts_setkey_enc( &xts_ctx, NULL, 128 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_xts_setkey_dec( NULL, key, 128 ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_xts_setkey_dec( &xts_ctx, NULL, 128 ) );
#endif
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ecb( NULL,
valid_mode, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ecb( &aes_ctx,
invalid_mode, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ecb( &aes_ctx,
valid_mode, NULL, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ecb( &aes_ctx,
valid_mode, in, NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_CBC)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cbc( NULL,
valid_mode, 16,
out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cbc( &aes_ctx,
invalid_mode, 16,
out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cbc( &aes_ctx,
valid_mode, 16,
NULL, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cbc( &aes_ctx,
valid_mode, 16,
out, NULL, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cbc( &aes_ctx,
valid_mode, 16,
out, in, NULL ) );
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#if defined(MBEDTLS_CIPHER_MODE_XTS)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_xts( NULL,
valid_mode, 16,
in, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_xts( &xts_ctx,
invalid_mode, 16,
in, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_xts( &xts_ctx,
valid_mode, 16,
NULL, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_xts( &xts_ctx,
valid_mode, 16,
in, NULL, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_xts( &xts_ctx,
valid_mode, 16,
in, in, NULL ) );
#endif /* MBEDTLS_CIPHER_MODE_XTS */
#if defined(MBEDTLS_CIPHER_MODE_CFB)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb128( NULL,
valid_mode, 16,
&size, out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb128( &aes_ctx,
invalid_mode, 16,
&size, out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb128( &aes_ctx,
valid_mode, 16,
NULL, out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb128( &aes_ctx,
valid_mode, 16,
&size, NULL, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb128( &aes_ctx,
valid_mode, 16,
&size, out, NULL, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb128( &aes_ctx,
valid_mode, 16,
&size, out, in, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb8( NULL,
valid_mode, 16,
out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb8( &aes_ctx,
invalid_mode, 16,
out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb8( &aes_ctx,
valid_mode, 16,
NULL, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb8( &aes_ctx,
valid_mode, 16,
out, NULL, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_cfb8( &aes_ctx,
valid_mode, 16,
out, in, NULL ) );
#endif /* MBEDTLS_CIPHER_MODE_CFB */
#if defined(MBEDTLS_CIPHER_MODE_OFB)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ofb( NULL, 16,
&size, out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ofb( &aes_ctx, 16,
NULL, out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ofb( &aes_ctx, 16,
&size, NULL, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ofb( &aes_ctx, 16,
&size, out, NULL, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ofb( &aes_ctx, 16,
&size, out, in, NULL ) );
#endif /* MBEDTLS_CIPHER_MODE_OFB */
#if defined(MBEDTLS_CIPHER_MODE_CTR)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ctr( NULL, 16, &size, out,
out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ctr( &aes_ctx, 16, NULL, out,
out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ctr( &aes_ctx, 16, &size, NULL,
out, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ctr( &aes_ctx, 16, &size, out,
NULL, in, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ctr( &aes_ctx, 16, &size, out,
out, NULL, out ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_AES_BAD_INPUT_DATA,
mbedtls_aes_crypt_ctr( &aes_ctx, 16, &size, out,
out, in, NULL ) );
#endif /* MBEDTLS_CIPHER_MODE_CTR */
exit:
;
}
void test_aes_check_params_wrapper( void ** params )
{
(void)params;
test_aes_check_params( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_aes_misc_params( )
{
#if defined(MBEDTLS_CIPHER_MODE_CBC) || \
defined(MBEDTLS_CIPHER_MODE_XTS) || \
defined(MBEDTLS_CIPHER_MODE_CFB) || \
defined(MBEDTLS_CIPHER_MODE_OFB)
mbedtls_aes_context aes_ctx;
const unsigned char in[16] = { 0 };
unsigned char out[16];
#endif
#if defined(MBEDTLS_CIPHER_MODE_XTS)
mbedtls_aes_xts_context xts_ctx;
#endif
#if defined(MBEDTLS_CIPHER_MODE_CFB) || \
defined(MBEDTLS_CIPHER_MODE_OFB)
size_t size;
#endif
/* These calls accept NULL */
TEST_VALID_PARAM( mbedtls_aes_free( NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_XTS)
TEST_VALID_PARAM( mbedtls_aes_xts_free( NULL ) );
#endif
#if defined(MBEDTLS_CIPHER_MODE_CBC)
TEST_ASSERT( mbedtls_aes_crypt_cbc( &aes_ctx, MBEDTLS_AES_ENCRYPT,
15,
out, in, out )
== MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH );
TEST_ASSERT( mbedtls_aes_crypt_cbc( &aes_ctx, MBEDTLS_AES_ENCRYPT,
17,
out, in, out )
== MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH );
#endif
#if defined(MBEDTLS_CIPHER_MODE_XTS)
TEST_ASSERT( mbedtls_aes_crypt_xts( &xts_ctx, MBEDTLS_AES_ENCRYPT,
15,
in, in, out )
== MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH );
TEST_ASSERT( mbedtls_aes_crypt_xts( &xts_ctx, MBEDTLS_AES_ENCRYPT,
(1 << 24) + 1,
in, in, out )
== MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH );
#endif
#if defined(MBEDTLS_CIPHER_MODE_CFB)
size = 16;
TEST_ASSERT( mbedtls_aes_crypt_cfb128( &aes_ctx, MBEDTLS_AES_ENCRYPT, 16,
&size, out, in, out )
== MBEDTLS_ERR_AES_BAD_INPUT_DATA );
#endif
#if defined(MBEDTLS_CIPHER_MODE_OFB)
size = 16;
TEST_ASSERT( mbedtls_aes_crypt_ofb( &aes_ctx, 16, &size, out, in, out )
== MBEDTLS_ERR_AES_BAD_INPUT_DATA );
#endif
exit:
;
}
void test_aes_misc_params_wrapper( void ** params )
{
(void)params;
test_aes_misc_params( );
}
#if defined(MBEDTLS_SELF_TEST)
void test_aes_selftest( )
{
TEST_ASSERT( mbedtls_aes_self_test( 1 ) == 0 );
exit:
;
}
void test_aes_selftest_wrapper( void ** params )
{
(void)params;
test_aes_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_AES_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_AES_C)
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_AES_C)
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_AES_C)
test_aes_encrypt_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_AES_C)
test_aes_decrypt_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_aes_encrypt_cbc_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_aes_decrypt_cbc_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_XTS)
test_aes_encrypt_xts_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_XTS)
test_aes_decrypt_xts_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_XTS)
test_aes_crypt_xts_size_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_XTS)
test_aes_crypt_xts_keysize_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_CFB)
test_aes_encrypt_cfb128_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_CFB)
test_aes_decrypt_cfb128_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_CFB)
test_aes_encrypt_cfb8_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_CFB)
test_aes_decrypt_cfb8_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CIPHER_MODE_OFB)
test_aes_encrypt_ofb_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_aes_check_params_wrapper,
#else
NULL,
#endif
/* Function Id: 14 */
#if defined(MBEDTLS_AES_C)
test_aes_misc_params_wrapper,
#else
NULL,
#endif
/* Function Id: 15 */
#if defined(MBEDTLS_AES_C) && defined(MBEDTLS_SELF_TEST)
test_aes_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_aes.ecb.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 38,135 | 1,100 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.null.datax | NULL Encrypt and decrypt 0 bytes
depends_on:0
4:exp:0:char*:"NULL":int:0:int:0:exp:1
NULL Encrypt and decrypt 1 bytes
depends_on:0
4:exp:0:char*:"NULL":int:0:int:1:exp:1
NULL Encrypt and decrypt 2 bytes
depends_on:0
4:exp:0:char*:"NULL":int:0:int:2:exp:1
NULL Encrypt and decrypt 7 bytes
depends_on:0
4:exp:0:char*:"NULL":int:0:int:7:exp:1
NULL Encrypt and decrypt 8 bytes
depends_on:0
4:exp:0:char*:"NULL":int:0:int:8:exp:1
NULL Encrypt and decrypt 9 bytes
depends_on:0
4:exp:0:char*:"NULL":int:0:int:9:exp:1
NULL Encrypt and decrypt 15 bytes
depends_on:0
4:exp:0:char*:"NULL":int:0:int:15:exp:1
NULL Encrypt and decrypt 16 bytes
depends_on:0
4:exp:0:char*:"NULL":int:0:int:16:exp:1
NULL Encrypt and decrypt 31 bytes
depends_on:0
4:exp:0:char*:"NULL":int:0:int:31:exp:1
NULL Encrypt and decrypt 32 bytes
depends_on:0
4:exp:0:char*:"NULL":int:0:int:32:exp:1
NULL Encrypt and decrypt 33 bytes
depends_on:0
4:exp:0:char*:"NULL":int:0:int:33:exp:1
NULL Encrypt and decrypt 47 bytes
depends_on:0
4:exp:0:char*:"NULL":int:0:int:47:exp:1
NULL Encrypt and decrypt 48 bytes
depends_on:0
4:exp:0:char*:"NULL":int:0:int:48:exp:1
NULL Encrypt and decrypt 49 bytes
depends_on:0
4:exp:0:char*:"NULL":int:0:int:49:exp:1
NULL Encrypt and decrypt 1 bytes in multiple parts 1
depends_on:0
7:exp:0:int:0:int:1:int:0:exp:1:int:1:int:0:int:1:int:0
NULL Encrypt and decrypt 1 bytes in multiple parts 2
depends_on:0
7:exp:0:int:0:int:0:int:1:exp:1:int:0:int:1:int:0:int:1
NULL Encrypt and decrypt 16 bytes in multiple parts 1
depends_on:0
7:exp:0:int:0:int:16:int:0:exp:1:int:16:int:0:int:16:int:0
NULL Encrypt and decrypt 16 bytes in multiple parts 2
depends_on:0
7:exp:0:int:0:int:0:int:16:exp:1:int:0:int:16:int:0:int:16
NULL Encrypt and decrypt 16 bytes in multiple parts 3
depends_on:0
7:exp:0:int:0:int:1:int:15:exp:1:int:1:int:15:int:1:int:15
NULL Encrypt and decrypt 16 bytes in multiple parts 4
depends_on:0
7:exp:0:int:0:int:15:int:1:exp:1:int:15:int:1:int:15:int:1
NULL Encrypt and decrypt 22 bytes in multiple parts 1 [#1]
depends_on:0
7:exp:0:int:0:int:15:int:7:exp:1:int:15:int:7:int:15:int:7
NULL Encrypt and decrypt 22 bytes in multiple parts 1 [#2]
depends_on:0
7:exp:0:int:0:int:16:int:6:exp:1:int:16:int:6:int:16:int:6
NULL Encrypt and decrypt 22 bytes in multiple parts 1 [#3]
depends_on:0
7:exp:0:int:0:int:17:int:6:exp:1:int:17:int:6:int:17:int:6
NULL Encrypt and decrypt 32 bytes in multiple parts 1
depends_on:0
7:exp:0:int:0:int:16:int:16:exp:1:int:16:int:16:int:16:int:16
| 2,500 | 97 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.nist_kw.datax | KW AES-128 wrap - Decrypt empty buffer
depends_on:0:1
6:exp:0:exp:1:exp:1
KWP AES-128 wrap - Decrypt empty buffer
depends_on:0:1
6:exp:2:exp:1:exp:1
KW AES-128 wrap rfc 3394
depends_on:0:1
9:exp:0:hex:"000102030405060708090A0B0C0D0E0F":hex:"":hex:"":hex:"1FA68B0A8112B447AEF34BD8FB5A7B829D3E862371D2CFE5":hex:"":char*:"":hex:"00112233445566778899AABBCCDDEEFF":int:0
KW AES-192 wrap rfc 3394
depends_on:0:1
9:exp:3:hex:"000102030405060708090A0B0C0D0E0F1011121314151617":hex:"":hex:"":hex:"96778B25AE6CA435F92B5B97C050AED2468AB8A17AD84E5D":hex:"":char*:"":hex:"00112233445566778899AABBCCDDEEFF":int:0
KW AES-256 wrap rfc 3394 [#1]
depends_on:0:1
9:exp:4:hex:"000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F":hex:"":hex:"":hex:"A8F9BC1612C68B3FF6E6F4FBE30E71E4769C8B80A32CB8958CD5D17D6B254DA1":hex:"":char*:"":hex:"00112233445566778899AABBCCDDEEFF0001020304050607":int:0
KW AES-256 wrap rfc 3394 [#2]
depends_on:0:1
9:exp:4:hex:"000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F":hex:"":hex:"":hex:"64E8C3F9CE0F5BA263E9777905818A2A93C8191E7D6E8AE7":hex:"":char*:"":hex:"00112233445566778899AABBCCDDEEFF":int:0
KWP AES-192 RFC 5649 #1
depends_on:0:1
9:exp:5:hex:"5840df6e29b02af1ab493b705bf16ea1ae8338f4dcc176a8":hex:"":hex:"":hex:"138bdeaa9b8fa7fc61f97742e72248ee5ae6ae5360d1ae6a5f54f373fa543b6a":hex:"":char*:"":hex:"c37b7e6492584340bed12207808941155068f738":int:0
KWP AES-192 RFC 5649 #2
depends_on:0:1
9:exp:5:hex:"5840df6e29b02af1ab493b705bf16ea1ae8338f4dcc176a8":hex:"":hex:"":hex:"afbeb0f07dfbf5419200f2ccb50bb24f":hex:"":char*:"":hex:"466f7250617369":int:0
KWP AES-128 1 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"A9D2D4394815D53F2799ABD7E51D2C8B":hex:"":char*:"":hex:"00":int:0
KWP AES-128 2 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"36D0CA197F638BF478D022C7E543B699":hex:"":char*:"":hex:"0001":int:0
KWP AES-128 3 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"DAB4EE2853E1C44C5E553E644143902B":hex:"":char*:"":hex:"000102":int:0
KWP AES-128 4 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"446C037F831092B147C372616357BF7D":hex:"":char*:"":hex:"00010203":int:0
KWP AES-128 5 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"9ED0AF6457B82E0DDADBD2240A303D74":hex:"":char*:"":hex:"0001020304":int:0
KWP AES-128 6 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"D863A8CE0DF301A564945259B4F74E7D":hex:"":char*:"":hex:"000102030405":int:0
KWP AES-128 7 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"E8387E5456242B0C30BE77FC1FF0C1FD":hex:"":char*:"":hex:"00010203040506":int:0
KWP AES-128 8 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"01FF4C430CDF3D2D815B0972B23D7C35":hex:"":char*:"":hex:"0001020304050607":int:0
KWP AES-128 9 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"C06E2163E0CC845B348E012AC9413DEEE40C8C3B030A3681":hex:"":char*:"":hex:"000102030405060708":int:0
KWP AES-128 10 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"3DFD2F643C38B07E121C77C2CA0EF82DA742B0989B6D848E":hex:"":char*:"":hex:"00010203040506070809":int:0
KWP AES-128 11 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"AFAEF390634E21E754FD09F55A4EDD918A1D23ECA9B76F2B":hex:"":char*:"":hex:"000102030405060708090A":int:0
KWP AES-128 12 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"A42D14C830F64F0A73570BFA7FDF8DDDD5E3AD3065A09FB0":hex:"":char*:"":hex:"000102030405060708090A0B":int:0
KWP AES-128 13 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"83F23527625FC643942279D090C1B61D10FC978B54D778CD":hex:"":char*:"":hex:"000102030405060708090A0B0C":int:0
KWP AES-128 14 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"E073C30E0DAC595F9FD28A0CB9E53945B26D1E1DE4E66D04":hex:"":char*:"":hex:"000102030405060708090A0B0C0D":int:0
KWP AES-128 15 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"64E3C2F7E0F7CB297C6B8C4CAF665F9F0A3F7082D2522635":hex:"":char*:"":hex:"000102030405060708090A0B0C0D0E":int:0
KWP AES-128 16 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"8F5982C7D265A0A40FC81D2326429A0A65BCD1368F0E16CB":hex:"":char*:"":hex:"000102030405060708090A0B0C0D0E0F":int:0
KWP AES-128 17 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"E29EC6664BCBA00986DD9845F8C4B26472BFDDF98522E537B5D23D5D2A8D02C5":hex:"":char*:"":hex:"000102030405060708090A0B0C0D0E0F10":int:0
KWP AES-128 18 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"9451ABCA0B9756A183F8C9ADA834E1AD2400B693C33624E59F26C35AC1586E2B":hex:"":char*:"":hex:"000102030405060708090A0B0C0D0E0F1011":int:0
KWP AES-128 19 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"F03CB49A65FD3EF8FC83C52F029A3D73667D5B84DB429C38436619ED8320D12E":hex:"":char*:"":hex:"000102030405060708090A0B0C0D0E0F101112":int:0
KWP AES-128 20 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"759524B855037849812D62979A18F24D3E672C2663DEA9204BA5A639FB7DB292":hex:"":char*:"":hex:"000102030405060708090A0B0C0D0E0F10111213":int:0
KWP AES-128 21 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"F352B8228FBFA0769C2E3858D7451FA603E9B751CFE780ED0F93C850C7870259":hex:"":char*:"":hex:"000102030405060708090A0B0C0D0E0F1011121314":int:0
KWP AES-128 22 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"3491F4C8D916A1BC3824D1478EC746BE8C837415017ED52A1ABC30FB14DDE825":hex:"":char*:"":hex:"000102030405060708090A0B0C0D0E0F101112131415":int:0
KWP AES-128 23 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"0E6E35C5B9D706C2FF2C4C6CFCF254849879D6C1CB577E0A73BB12CBC7AC9740":hex:"":char*:"":hex:"000102030405060708090A0B0C0D0E0F10111213141516":int:0
KWP AES-128 24 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"E7DB580663B113B57489E1107F2DCAF7CF80629E7CE1839E1ED044ECD0299E79":hex:"":char*:"":hex:"000102030405060708090A0B0C0D0E0F1011121314151617":int:0
KWP AES-128 25 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"883500DB91747BAD8C5E122ED2338F3BCB6B43064F5DA9D1303E165815EC8CC4C5BFD31AEAE1B6A3":hex:"":char*:"":hex:"000102030405060708090A0B0C0D0E0F101112131415161718":int:0
KWP AES-128 26 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"24099AAAD4F19BF614ECC35DA9E3646F73AAFAA9C46975D4B56D72A332AF7EC4850B8294D94B7E1A":hex:"":char*:"":hex:"000102030405060708090A0B0C0D0E0F10111213141516171819":int:0
KWP AES-128 27 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"C24F8CCE3425AC9638145A0DAC28B59368583FF3A7AAD85FBE1AEAAB5D23C0B128A1F9BC575B785A":hex:"":char*:"":hex:"000102030405060708090A0B0C0D0E0F101112131415161718191A":int:0
KWP AES-128 28 byte input
depends_on:0:1
9:exp:2:hex:"00000000000000000000000000000000":hex:"":hex:"":hex:"EFD0BC7612331A98F2D68F86E606717197BF57E35114234C675D40E9462ACF00DE7860C0F38677F7":hex:"":char*:"":hex:"000102030405060708090A0B0C0D0E0F101112131415161718191A1B":int:0
KW AES-128 wrap CAVS 17.4 COUNT 0 PLEN 16 [#1]
depends_on:0:1
9:exp:0:hex:"7575da3a93607cc2bfd8cec7aadfd9a6":hex:"":hex:"":hex:"031f6bd7e61e643df68594816f64caa3f56fabea2548f5fb":hex:"":char*:"":hex:"42136d3c384a3eeac95a066fd28fed3f":int:0
KW AES-128 wrap CAVS 17.4 COUNT 0 PLEN 16 [#2]
depends_on:0:1
9:exp:0:hex:"7575da3a93607cc2bfd8cec7aadfd9a7":hex:"":hex:"":hex:"031f6bd7e61e643df68594816f64cbb3f56fabea2548f5fb":hex:"":char*:"FAIL":hex:"":int:0
KW AES-128 wrap CAVS 17.4 COUNT 0 PLEN 32
depends_on:0:1
9:exp:0:hex:"e5d058e7f1c22c016c4e1cc9b26b9f8f":hex:"":hex:"":hex:"60b9f8ac797c56e01e9b5f84d65816a980777869f67991a0e6dc19b8cd75c9b54db4a38456bbd6f3":hex:"":char*:"":hex:"7f604e9b8d39d3c91e193fe6f196c1e3da6211a7c9a33b8873b64b138d1803e4":int:0
KW AES-128 wrap CAVS 17.4 COUNT 0 PLEN 24
depends_on:0:1
9:exp:0:hex:"67ae4270bcdd31e8326b7e7f94c80276":hex:"":hex:"":hex:"96cec0e3272a21faa550a857957aa38ce3c1cf06f0dd9f5b5c5c422cef6c69a1":hex:"":char*:"":hex:"57e748b62fbc37ba25e904ee973d01b136cf7c1d0c8c5c87":int:0
KW AES-192 wrap CAVS 17.4 COUNT 0 PLEN 16
depends_on:0:1
9:exp:3:hex:"a6a3f6d509811859238fc569b5664605f7a73c475a691a8f":hex:"":hex:"":hex:"57d7a4b4e85ffdcb7788b9b666cb63303dd2c5d0f11b1bbb":hex:"":char*:"":hex:"8484e414b091f8a9f72cfd13087ddec1":int:0
KW AES-192 wrap CAVS 17.4 COUNT 0 PLEN 32
depends_on:0:1
9:exp:3:hex:"3686e50dd602f84024570f545bbf618362bef80d45472436":hex:"":hex:"":hex:"c7d5a1a5dfeb7327acbb94767d74cc2afc622ffd01f854d7d3e2b6f75ca7e8f441a0c0bad3d26ee2":hex:"":char*:"":hex:"d780d69b45483b682d311ccaaadcfa3a1cecf1f05dbe2ebc71e6d3fa979f3de8":int:0
KW AES-192 wrap CAVS 17.4 COUNT 0 PLEN 24
depends_on:0:1
9:exp:3:hex:"0a833412e7aa1384ff26866dc9c551bf60413c17e847d317":hex:"":hex:"":hex:"3a7efd629305bf1d61360ed6ff8ec7d059e8af3e5104c29729adb55d1bb94f7e":hex:"":char*:"":hex:"f734760cc0fa3bbfb271277d4f29a48ddecda733d610fa42":int:0
KW AES-256 wrap CAVS 17.4 COUNT 0 PLEN 16
depends_on:0:1
9:exp:4:hex:"f59782f1dceb0544a8da06b34969b9212b55ce6dcbdd0975a33f4b3f88b538da":hex:"":hex:"":hex:"2e63946ea3c090902fa1558375fdb2907742ac74e39403fc":hex:"":char*:"":hex:"73d33060b5f9f2eb5785c0703ddfa704":int:0
KW AES-256 wrap CAVS 17.4 COUNT 0 PLEN 32
depends_on:0:1
9:exp:4:hex:"8b54e6bc3d20e823d96343dc776c0db10c51708ceecc9a38a14beb4ca5b8b221":hex:"":hex:"":hex:"b13eeb7619fab818f1519266516ceb82abc0e699a7153cf26edcb8aeb879f4c011da906841fc5956":hex:"":char*:"":hex:"d6192635c620dee3054e0963396b260af5c6f02695a5205f159541b4bc584bac":int:0
KW AES-256 wrap CAVS 17.4 COUNT 0 PLEN 24
depends_on:0:1
9:exp:4:hex:"112ad41b4856c7254a9848d30fdd78335b039a48a8962c4d1cb78eabd5dad788":hex:"":hex:"":hex:"ba8a259a471b787dd5d540ec25d43d87200fdadc6d1f05d916584fa9f6cbf512":hex:"":char*:"":hex:"1b20bf1990b065d798e1b32264ad50a8747492ba09a04dd1":int:0
KWP AES-128 wrap CAVS 17.4 COUNT 0 PLEN 1
depends_on:0:1
9:exp:2:hex:"6decf10a1caf8e3b80c7a4be8c9c84e8":hex:"":hex:"":hex:"01a7d657fc4a5b216f261cca4d052c2b":hex:"":char*:"":hex:"49":int:0
KWP AES-128 wrap CAVS 17.4 COUNT 0 PLEN 8
depends_on:0:1
9:exp:2:hex:"a8e06da625a65b25cf5030826830b661":hex:"":hex:"":hex:"b6f967616dd8d772e9fea295a456dba7":hex:"":char*:"":hex:"43acff293120dd5d":int:0
KWP AES-128 wrap CAVS 17.4 COUNT 0 PLEN 9
depends_on:0:1
9:exp:2:hex:"7865e20f3c21659ab4690b629cdf3cc4":hex:"":hex:"":hex:"41eca956d4aa047eb5cf4efe659661e74db6f8c564e23500":hex:"":char*:"":hex:"bd6843d420378dc896":int:0
KWP AES-128 wrap CAVS 17.4 COUNT 0 PLEN 31
depends_on:0:1
9:exp:2:hex:"be96dc195ec034d616486ed70e97fe83":hex:"":hex:"":hex:"974769b3a7b4d5d32985f87fddf9990631e5610fbfb278387b58b1f48e05c77d2fb7575c5169eb0e":hex:"":char*:"":hex:"85b5437b6335ebba7635903a4493d12a77d9357a9e0dbc013456d85f1d3201":int:0
KWP AES-192 wrap CAVS 17.4 COUNT 0 PLEN 1
depends_on:0:1
9:exp:5:hex:"9ca11078baebc1597a68ce2fe3fc79a201626575252b8860":hex:"":hex:"":hex:"866bc0ae30e290bb20a0dab31a6e7165":hex:"":char*:"":hex:"76":int:0
KWP AES-192 wrap CAVS 17.4 COUNT 0 PLEN 8
depends_on:0:1
9:exp:5:hex:"c5029804d28341ca267c9e73afc5f963b14bb604708b43f2":hex:"":hex:"":hex:"15b98046b2a3a49b9c0831c476fc34fb":hex:"":char*:"":hex:"e6eb18a3e969ab5c":int:0
KWP AES-192 wrap CAVS 17.4 COUNT 0 PLEN 9
depends_on:0:1
9:exp:5:hex:"9464f1af6aabad076661328bcfd15777da16a288a2660009":hex:"":hex:"":hex:"d9b257b400d808a0b0386af3be9154fc7f2fb2d7edc06201":hex:"":char*:"":hex:"431527c3a644c106bb":int:0
KWP AES-192 wrap CAVS 17.4 COUNT 0 PLEN 31
depends_on:0:1
9:exp:5:hex:"a354ccd6dd97cf40bed840f8137e0cf2e91c00e592104765":hex:"":hex:"":hex:"f018e7c8d6dcdbd20606502b2667439d9049a9a2d5c960af8e9251466d6ff8923fb82432b299f1a4":hex:"":char*:"":hex:"22ccc034c5345550f5bc0114f2951f0fe439ec3ecd8ac1fea8889dd12bfb8e":int:0
KWP AES-256 wrap CAVS 17.4 COUNT 0 PLEN 1
depends_on:0:1
9:exp:6:hex:"95da2700ca6fd9a52554ee2a8df1386f5b94a1a60ed8a4aef60a8d61ab5f225a":hex:"":hex:"":hex:"06ba7ae6f3248cfdcf267507fa001bc4":hex:"":char*:"":hex:"d1":int:0
KWP AES-256 wrap CAVS 17.4 COUNT 0 PLEN 8
depends_on:0:1
9:exp:6:hex:"3517f0efa7f0c4d74f91af83ece5e7503bcc5ab82907a6e4b7ed34d87b69ab1d":hex:"":hex:"":hex:"0b06a9b635d50cda9d4210cb3a71f990":hex:"":char*:"":hex:"897e0456b289ad31":int:0
KWP AES-256 wrap CAVS 17.4 COUNT 0 PLEN 9
depends_on:0:1
9:exp:6:hex:"70da43aac823c6dd37d1109f5b18feb4503c973288989745e2cc1cc21d9570c6":hex:"":hex:"":hex:"d67b5b2ad15c645450e23b5e7b6d682f8ae20e716d470db7":hex:"":char*:"":hex:"edf17d966ed896aee3":int:0
KWP AES-256 wrap CAVS 17.4 COUNT 0 PLEN 31
depends_on:0:1
9:exp:6:hex:"e9bb7f44c7baafbf392ab912589a2f8db53268106eafb74689bb1833136e6113":hex:"":hex:"":hex:"15b9f06fbc765e5e3d55d6b824616f21921d2a6918ee7bf1406b524274e170b4a78333ca5ee92af5":hex:"":char*:"":hex:"ffe952604834bff899e63658f34246815c91597eb40a21729e0a8a959b61f2":int:0
KW AES-128 wrap CAVS 17.4 FAIL COUNT 1 CLEN 48
depends_on:0:1
9:exp:0:hex:"5d4899ee66beff1bda1fc717a1ad4c50":hex:"":hex:"":hex:"bb7fd0bce778bd775e4e88d904d26a7134364c53a6c493a0":hex:"":char*:"FAIL":hex:"":int:0
KW AES-128 wrap CAVS 17.4 FAIL COUNT 1 CLEN 80
depends_on:0:1
9:exp:0:hex:"84bc6ce7ee4fd9db512536669d0686da":hex:"":hex:"":hex:"c383db930ffd02c0073ac2cc79ec289e6866bdcc6a135a3b776aa42f14ee04f9cca06ed6c0b22901":hex:"":char*:"FAIL":hex:"":int:0
KW AES-128 wrap CAVS 17.4 FAIL COUNT 3 CLEN 64
depends_on:0:1
9:exp:0:hex:"266b009e911bb55f9aa0661539a6fdd5":hex:"":hex:"":hex:"db9c94e7236ec56982d7ddeb9427c24580bc1fb96db98ab19340e03670045b7a":hex:"":char*:"FAIL":hex:"":int:0
KW AES-192 wrap CAVS 17.4 FAIL COUNT 3 CLEN 48
depends_on:0:1
9:exp:3:hex:"9200a0f688d86c0b6bfd9abeff66341684a373fe3f9a3057":hex:"":hex:"":hex:"5c685c8596e374710fe327bafc45cd09190215fdcc03d010":hex:"":char*:"FAIL":hex:"":int:0
KW AES-192 wrap CAVS 17.4 FAIL COUNT 1 CLEN 80
depends_on:0:1
9:exp:3:hex:"95c9e644559919cace6f93f545dbfe48b130808ed66d0964":hex:"":hex:"":hex:"7b8d1307e992221f6ffdcc7909d972d5f02e92187139cfd77f79345cb998bbdbabedb3ac00a6cdc4":hex:"":char*:"FAIL":hex:"":int:0
KW AES-192 wrap CAVS 17.4 FAIL COUNT 2 CLEN 64
depends_on:0:1
9:exp:3:hex:"e218e9643d5db01b412fcaefafe5eb237d03acfad0a3abaa":hex:"":hex:"":hex:"5eee8fbf6a8ab6ba371f4581982ec61839bf28c0eb913d1f417a284dccd72580":hex:"":char*:"FAIL":hex:"":int:0
KW AES-256 wrap CAVS 17.4 FAIL COUNT 4 CLEN 48
depends_on:0:1
9:exp:4:hex:"08c936b25b567a0aa679c29f201bf8b190327df0c2563e39cee061f149f4d91b":hex:"":hex:"":hex:"e227eb8ae9d239ccd8928adec39c28810ca9b3dc1f366444":hex:"":char*:"FAIL":hex:"":int:0
KW AES-256 wrap CAVS 17.4 FAIL COUNT 3 CLEN 80
depends_on:0:1
9:exp:4:hex:"605b22935f1eee56ba884bc7a869febc159ac306b66fb9767a7cc6ab7068dffa":hex:"":hex:"":hex:"6607f5a64c8f9fd96dc6f9f735b06a193762cdbacfc367e410926c1bfe6dd715490adbad5b9697a6":hex:"":char*:"FAIL":hex:"":int:0
KW AES-256 wrap CAVS 17.4 FAIL COUNT 3 CLEN 64
depends_on:0:1
9:exp:4:hex:"81c93da5baa5157bf700fd38d7d67662670778b690cfbca9fe11e06268b35605":hex:"":hex:"":hex:"875e1ca385586f83d1e23e44ca201006df04e1854e41b933fd607a7383ae1a39":hex:"":char*:"FAIL":hex:"":int:0
KWP AES-128 wrap CAVS 17.4 FAIL COUNT 1 CLEN 32
depends_on:0:1
9:exp:2:hex:"30be7ff51227f0eef786cb7be2482510":hex:"":hex:"":hex:"7f61a0a8b2fe7803f2947d233ec3a255":hex:"":char*:"FAIL":hex:"":int:0
KWP AES-192 wrap CAVS 17.4 FAIL COUNT 3 CLEN 32
depends_on:0:1
9:exp:5:hex:"21fb6600c1d34a74adee67612672593a86cf235421735350":hex:"":hex:"":hex:"56b45c49c3e379b18d9c38b6423db133":hex:"":char*:"FAIL":hex:"":int:0
KWP AES-256 wrap CAVS 17.4 FAIL COUNT 4 CLEN 32
depends_on:0:1
9:exp:6:hex:"c32cb3e1e41a4b9f4de79989957866f5dd48dba38c22a6ebb80e14c84bdd9534":hex:"":hex:"":hex:"c29b05c2619a58ecc1d239e7a34273cd":hex:"":char*:"FAIL":hex:"":int:0
| 16,294 | 281 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_pkcs5.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_pkcs5.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_pkcs5.function
* Test suite data : suites/test_suite_pkcs5.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_PKCS5_C)
#include "third_party/mbedtls/pkcs5.h"
void test_pbkdf2_hmac( int hash, data_t * pw_str, data_t * salt_str,
int it_cnt, int key_len, data_t * result_key_string )
{
mbedtls_md_context_t ctx;
const mbedtls_md_info_t *info;
unsigned char key[100];
mbedtls_md_init( &ctx );
info = mbedtls_md_info_from_type( hash );
TEST_ASSERT( info != NULL );
TEST_ASSERT( mbedtls_md_setup( &ctx, info, 1 ) == 0 );
TEST_ASSERT( mbedtls_pkcs5_pbkdf2_hmac( &ctx, pw_str->x, pw_str->len, salt_str->x, salt_str->len,
it_cnt, key_len, key ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( key, result_key_string->x,
key_len, result_key_string->len ) == 0 );
exit:
mbedtls_md_free( &ctx );
}
void test_pbkdf2_hmac_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
test_pbkdf2_hmac( *( (int *) params[0] ), &data1, &data3, *( (int *) params[5] ), *( (int *) params[6] ), &data7 );
}
#if defined(MBEDTLS_ASN1_PARSE_C)
void test_mbedtls_pkcs5_pbes2( int params_tag, data_t *params_hex, data_t *pw,
data_t *data, int ref_ret, data_t *ref_out )
{
int my_ret;
mbedtls_asn1_buf params;
unsigned char *my_out = NULL;
params.tag = params_tag;
params.p = params_hex->x;
params.len = params_hex->len;
my_out = mbedtls_test_zero_alloc( ref_out->len );
my_ret = mbedtls_pkcs5_pbes2( ¶ms, MBEDTLS_PKCS5_DECRYPT,
pw->x, pw->len, data->x, data->len, my_out );
TEST_ASSERT( my_ret == ref_ret );
if( ref_ret == 0 )
TEST_ASSERT( memcmp( my_out, ref_out->x, ref_out->len ) == 0 );
exit:
mbedtls_free( my_out );
}
void test_mbedtls_pkcs5_pbes2_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_mbedtls_pkcs5_pbes2( *( (int *) params[0] ), &data1, &data3, &data5, *( (int *) params[7] ), &data8 );
}
#endif /* MBEDTLS_ASN1_PARSE_C */
#if defined(MBEDTLS_SELF_TEST)
void test_pkcs5_selftest( )
{
TEST_ASSERT( mbedtls_pkcs5_self_test( 1 ) == 0 );
exit:
;
}
void test_pkcs5_selftest_wrapper( void ** params )
{
(void)params;
test_pkcs5_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_PKCS5_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_PKCS5_C)
case 0:
{
*out_value = MBEDTLS_MD_SHA1;
}
break;
case 1:
{
*out_value = MBEDTLS_MD_SHA224;
}
break;
case 2:
{
*out_value = MBEDTLS_MD_SHA256;
}
break;
case 3:
{
*out_value = MBEDTLS_MD_SHA384;
}
break;
case 4:
{
*out_value = MBEDTLS_MD_SHA512;
}
break;
case 5:
{
*out_value = MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE;
}
break;
case 6:
{
*out_value = MBEDTLS_ASN1_SEQUENCE;
}
break;
case 7:
{
*out_value = MBEDTLS_ERR_PKCS5_INVALID_FORMAT + MBEDTLS_ERR_ASN1_UNEXPECTED_TAG;
}
break;
case 8:
{
*out_value = MBEDTLS_ERR_PKCS5_INVALID_FORMAT + MBEDTLS_ERR_ASN1_OUT_OF_DATA;
}
break;
case 9:
{
*out_value = MBEDTLS_ERR_PKCS5_FEATURE_UNAVAILABLE;
}
break;
case 10:
{
*out_value = MBEDTLS_ERR_PKCS5_INVALID_FORMAT + MBEDTLS_ERR_ASN1_LENGTH_MISMATCH;
}
break;
case 11:
{
*out_value = MBEDTLS_ERR_PKCS5_INVALID_FORMAT;
}
break;
case 12:
{
*out_value = MBEDTLS_ERR_PKCS5_PASSWORD_MISMATCH;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_PKCS5_C)
case 0:
{
#if defined(MBEDTLS_SHA1_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_SHA256_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_SHA512_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if !defined(MBEDTLS_SHA512_NO_SHA384)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 4:
{
#if defined(MBEDTLS_DES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 5:
{
#if defined(MBEDTLS_CIPHER_MODE_CBC)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_PKCS5_C)
test_pbkdf2_hmac_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_PKCS5_C) && defined(MBEDTLS_ASN1_PARSE_C)
test_mbedtls_pkcs5_pbes2_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_PKCS5_C) && defined(MBEDTLS_SELF_TEST)
test_pkcs5_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_pkcs5.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 13,328 | 472 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_asn1write.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_asn1write.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_asn1write.function
* Test suite data : suites/test_suite_asn1write.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_ASN1_WRITE_C)
#include "third_party/mbedtls/asn1write.h"
#define GUARD_LEN 4
#define GUARD_VAL 0x2a
typedef struct
{
unsigned char *output;
unsigned char *start;
unsigned char *end;
unsigned char *p;
size_t size;
} generic_write_data_t;
int generic_write_start_step( generic_write_data_t *data )
{
mbedtls_test_set_step( data->size );
ASSERT_ALLOC( data->output, data->size == 0 ? 1 : data->size );
data->end = data->output + data->size;
data->p = data->end;
data->start = data->end - data->size;
return( 1 );
exit:
return( 0 );
}
int generic_write_finish_step( generic_write_data_t *data,
const data_t *expected, int ret )
{
int ok = 0;
if( data->size < expected->len )
{
TEST_EQUAL( ret, MBEDTLS_ERR_ASN1_BUF_TOO_SMALL );
}
else
{
TEST_EQUAL( ret, data->end - data->p );
TEST_ASSERT( data->p >= data->start );
TEST_ASSERT( data->p <= data->end );
ASSERT_COMPARE( data->p, (size_t)( data->end - data->p ),
expected->x, expected->len );
}
ok = 1;
exit:
mbedtls_free( data->output );
data->output = NULL;
return( ok );
}
void test_mbedtls_asn1_write_null( data_t *expected )
{
generic_write_data_t data = { NULL, NULL, NULL, NULL, 0 };
int ret;
for( data.size = 0; data.size < expected->len + 1; data.size++ )
{
if( ! generic_write_start_step( &data ) )
goto exit;
ret = mbedtls_asn1_write_null( &data.p, data.start );
if( ! generic_write_finish_step( &data, expected, ret ) )
goto exit;
}
exit:
mbedtls_free( data.output );
}
void test_mbedtls_asn1_write_null_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_mbedtls_asn1_write_null( &data0 );
}
void test_mbedtls_asn1_write_bool( int val, data_t *expected )
{
generic_write_data_t data = { NULL, NULL, NULL, NULL, 0 };
int ret;
for( data.size = 0; data.size < expected->len + 1; data.size++ )
{
if( ! generic_write_start_step( &data ) )
goto exit;
ret = mbedtls_asn1_write_bool( &data.p, data.start, val );
if( ! generic_write_finish_step( &data, expected, ret ) )
goto exit;
}
exit:
mbedtls_free( data.output );
}
void test_mbedtls_asn1_write_bool_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_mbedtls_asn1_write_bool( *( (int *) params[0] ), &data1 );
}
void test_mbedtls_asn1_write_int( int val, data_t *expected )
{
generic_write_data_t data = { NULL, NULL, NULL, NULL, 0 };
int ret;
for( data.size = 0; data.size < expected->len + 1; data.size++ )
{
if( ! generic_write_start_step( &data ) )
goto exit;
ret = mbedtls_asn1_write_int( &data.p, data.start, val );
if( ! generic_write_finish_step( &data, expected, ret ) )
goto exit;
}
exit:
mbedtls_free( data.output );
}
void test_mbedtls_asn1_write_int_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_mbedtls_asn1_write_int( *( (int *) params[0] ), &data1 );
}
void test_mbedtls_asn1_write_enum( int val, data_t *expected )
{
generic_write_data_t data = { NULL, NULL, NULL, NULL, 0 };
int ret;
for( data.size = 0; data.size < expected->len + 1; data.size++ )
{
if( ! generic_write_start_step( &data ) )
goto exit;
ret = mbedtls_asn1_write_enum( &data.p, data.start, val );
if( ! generic_write_finish_step( &data, expected, ret ) )
goto exit;
}
exit:
mbedtls_free( data.output );
}
void test_mbedtls_asn1_write_enum_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_mbedtls_asn1_write_enum( *( (int *) params[0] ), &data1 );
}
#if defined(MBEDTLS_BIGNUM_C)
void test_mbedtls_asn1_write_mpi( data_t *val, data_t *expected )
{
generic_write_data_t data = { NULL, NULL, NULL, NULL, 0 };
mbedtls_mpi mpi;
int ret;
mbedtls_mpi_init( &mpi );
TEST_ASSERT( mbedtls_mpi_read_binary( &mpi, val->x, val->len ) == 0 );
for( data.size = 0; data.size < expected->len + 1; data.size++ )
{
if( ! generic_write_start_step( &data ) )
goto exit;
ret = mbedtls_asn1_write_mpi( &data.p, data.start, &mpi );
if( ! generic_write_finish_step( &data, expected, ret ) )
goto exit;
if( expected->len > 10 && data.size == 8 )
data.size = expected->len - 2;
}
exit:
mbedtls_mpi_free( &mpi );
mbedtls_free( data.output );
}
void test_mbedtls_asn1_write_mpi_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
test_mbedtls_asn1_write_mpi( &data0, &data2 );
}
#endif /* MBEDTLS_BIGNUM_C */
void test_mbedtls_asn1_write_string( int tag, data_t *content, data_t *expected )
{
generic_write_data_t data = { NULL, NULL, NULL, NULL, 0 };
int ret;
for( data.size = 0; data.size < expected->len + 1; data.size++ )
{
if( ! generic_write_start_step( &data ) )
goto exit;
switch( tag )
{
case MBEDTLS_ASN1_OCTET_STRING:
ret = mbedtls_asn1_write_octet_string(
&data.p, data.start, content->x, content->len );
break;
case MBEDTLS_ASN1_OID:
ret = mbedtls_asn1_write_oid(
&data.p, data.start,
(const char *) content->x, content->len );
break;
case MBEDTLS_ASN1_UTF8_STRING:
ret = mbedtls_asn1_write_utf8_string(
&data.p, data.start,
(const char *) content->x, content->len );
break;
case MBEDTLS_ASN1_PRINTABLE_STRING:
ret = mbedtls_asn1_write_printable_string(
&data.p, data.start,
(const char *) content->x, content->len );
break;
case MBEDTLS_ASN1_IA5_STRING:
ret = mbedtls_asn1_write_ia5_string(
&data.p, data.start,
(const char *) content->x, content->len );
break;
default:
ret = mbedtls_asn1_write_tagged_string(
&data.p, data.start, tag,
(const char *) content->x, content->len );
}
if( ! generic_write_finish_step( &data, expected, ret ) )
goto exit;
if( expected->len > 10 && data.size == 8 )
data.size = expected->len - 2;
}
exit:
mbedtls_free( data.output );
}
void test_mbedtls_asn1_write_string_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
test_mbedtls_asn1_write_string( *( (int *) params[0] ), &data1, &data3 );
}
void test_mbedtls_asn1_write_algorithm_identifier( data_t *oid,
int par_len,
data_t *expected )
{
generic_write_data_t data = { NULL, NULL, NULL, NULL, 0 };
int ret;
for( data.size = 0; data.size < expected->len + 1; data.size++ )
{
if( ! generic_write_start_step( &data ) )
goto exit;
ret = mbedtls_asn1_write_algorithm_identifier(
&data.p, data.start,
(const char *) oid->x, oid->len, par_len );
/* If params_len != 0, mbedtls_asn1_write_algorithm_identifier()
* assumes that the parameters are already present in the buffer
* and returns a length that accounts for this, but our test
* data omits the parameters. */
if( ret >= 0 )
ret -= par_len;
if( ! generic_write_finish_step( &data, expected, ret ) )
goto exit;
}
exit:
mbedtls_free( data.output );
}
void test_mbedtls_asn1_write_algorithm_identifier_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
test_mbedtls_asn1_write_algorithm_identifier( &data0, *( (int *) params[2] ), &data3 );
}
#if defined(MBEDTLS_ASN1_PARSE_C)
void test_mbedtls_asn1_write_len( int len, data_t * asn1, int buf_len,
int result )
{
int ret;
unsigned char buf[150];
unsigned char *p;
size_t i;
size_t read_len;
memset( buf, GUARD_VAL, sizeof( buf ) );
p = buf + GUARD_LEN + buf_len;
ret = mbedtls_asn1_write_len( &p, buf + GUARD_LEN, (size_t) len );
TEST_ASSERT( ret == result );
/* Check for buffer overwrite on both sides */
for( i = 0; i < GUARD_LEN; i++ )
{
TEST_ASSERT( buf[i] == GUARD_VAL );
TEST_ASSERT( buf[GUARD_LEN + buf_len + i] == GUARD_VAL );
}
if( result >= 0 )
{
TEST_ASSERT( p + asn1->len == buf + GUARD_LEN + buf_len );
TEST_ASSERT( memcmp( p, asn1->x, asn1->len ) == 0 );
/* Read back with mbedtls_asn1_get_len() to check */
ret = mbedtls_asn1_get_len( &p, buf + GUARD_LEN + buf_len, &read_len );
if( len == 0 )
{
TEST_ASSERT( ret == 0 );
}
else
{
/* Return will be MBEDTLS_ERR_ASN1_OUT_OF_DATA because the rest of
* the buffer is missing
*/
TEST_ASSERT( ret == MBEDTLS_ERR_ASN1_OUT_OF_DATA );
}
TEST_ASSERT( read_len == (size_t) len );
TEST_ASSERT( p == buf + GUARD_LEN + buf_len );
}
exit:
;
}
void test_mbedtls_asn1_write_len_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_mbedtls_asn1_write_len( *( (int *) params[0] ), &data1, *( (int *) params[3] ), *( (int *) params[4] ) );
}
#endif /* MBEDTLS_ASN1_PARSE_C */
void test_test_asn1_write_bitstrings( data_t *bitstring, int bits,
data_t *expected, int is_named )
{
generic_write_data_t data = { NULL, NULL, NULL, NULL, 0 };
int ret;
int ( *func )( unsigned char **p, unsigned char *start,
const unsigned char *buf, size_t bits ) =
( is_named ? mbedtls_asn1_write_named_bitstring :
mbedtls_asn1_write_bitstring );
for( data.size = 0; data.size < expected->len + 1; data.size++ )
{
if( ! generic_write_start_step( &data ) )
goto exit;
ret = ( *func )( &data.p, data.start, bitstring->x, bits );
if( ! generic_write_finish_step( &data, expected, ret ) )
goto exit;
}
exit:
mbedtls_free( data.output );
}
void test_test_asn1_write_bitstrings_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
test_test_asn1_write_bitstrings( &data0, *( (int *) params[2] ), &data3, *( (int *) params[5] ) );
}
void test_store_named_data_find( data_t *oid0, data_t *oid1,
data_t *oid2, data_t *oid3,
data_t *needle, int from, int position )
{
data_t *oid[4] = {oid0, oid1, oid2, oid3};
mbedtls_asn1_named_data nd[] ={
{ {0x06, 0, NULL}, {0, 0, NULL}, NULL, 0 },
{ {0x06, 0, NULL}, {0, 0, NULL}, NULL, 0 },
{ {0x06, 0, NULL}, {0, 0, NULL}, NULL, 0 },
{ {0x06, 0, NULL}, {0, 0, NULL}, NULL, 0 },
};
mbedtls_asn1_named_data *pointers[ARRAY_LENGTH( nd ) + 1];
size_t i;
mbedtls_asn1_named_data *head = NULL;
mbedtls_asn1_named_data *found = NULL;
for( i = 0; i < ARRAY_LENGTH( nd ); i++ )
pointers[i] = &nd[i];
pointers[ARRAY_LENGTH( nd )] = NULL;
for( i = 0; i < ARRAY_LENGTH( nd ); i++ )
{
ASSERT_ALLOC( nd[i].oid.p, oid[i]->len );
memcpy( nd[i].oid.p, oid[i]->x, oid[i]->len );
nd[i].oid.len = oid[i]->len;
nd[i].next = pointers[i+1];
}
head = pointers[from];
found = mbedtls_asn1_store_named_data( &head,
(const char *) needle->x,
needle->len,
NULL, 0 );
/* In any case, the existing list structure must be unchanged. */
for( i = 0; i < ARRAY_LENGTH( nd ); i++ )
TEST_ASSERT( nd[i].next == pointers[i+1] );
if( position >= 0 )
{
/* position should have been found and modified. */
TEST_ASSERT( head == pointers[from] );
TEST_ASSERT( found == pointers[position] );
}
else
{
/* A new entry should have been created. */
TEST_ASSERT( found == head );
TEST_ASSERT( head->next == pointers[from] );
for( i = 0; i < ARRAY_LENGTH( nd ); i++ )
TEST_ASSERT( found != &nd[i] );
}
exit:
if( found != NULL && found == head && found != pointers[from] )
{
mbedtls_free( found->oid.p );
mbedtls_free( found );
}
for( i = 0; i < ARRAY_LENGTH( nd ); i++ )
mbedtls_free( nd[i].oid.p );
}
void test_store_named_data_find_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_store_named_data_find( &data0, &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
void test_store_named_data_val_found( int old_len, int new_len )
{
mbedtls_asn1_named_data nd =
{ {0x06, 3, (unsigned char *) "OID"}, {0, 0, NULL}, NULL, 0 };
mbedtls_asn1_named_data *head = &nd;
mbedtls_asn1_named_data *found = NULL;
unsigned char *old_val = NULL;
unsigned char *new_val = (unsigned char *) "new value";
if( old_len != 0 )
{
ASSERT_ALLOC( nd.val.p, (size_t) old_len );
old_val = nd.val.p;
nd.val.len = old_len;
memset( old_val, 'x', old_len );
}
if( new_len <= 0 )
{
new_len = - new_len;
new_val = NULL;
}
found = mbedtls_asn1_store_named_data( &head, "OID", 3,
new_val, new_len );
TEST_ASSERT( head == &nd );
TEST_ASSERT( found == head );
if( new_val != NULL)
ASSERT_COMPARE( found->val.p, found->val.len,
new_val, (size_t) new_len );
if( new_len == 0)
TEST_ASSERT( found->val.p == NULL );
else if( new_len == old_len )
TEST_ASSERT( found->val.p == old_val );
else
TEST_ASSERT( found->val.p != old_val );
exit:
mbedtls_free( nd.val.p );
}
void test_store_named_data_val_found_wrapper( void ** params )
{
test_store_named_data_val_found( *( (int *) params[0] ), *( (int *) params[1] ) );
}
void test_store_named_data_val_new( int new_len )
{
mbedtls_asn1_named_data *head = NULL;
mbedtls_asn1_named_data *found = NULL;
const unsigned char *oid = (unsigned char *) "OID";
size_t oid_len = strlen( (const char *) oid );
const unsigned char *new_val = (unsigned char *) "new value";
if( new_len <= 0 )
new_val = NULL;
if( new_len < 0 )
new_len = - new_len;
found = mbedtls_asn1_store_named_data( &head,
(const char *) oid, oid_len,
new_val, (size_t) new_len );
TEST_ASSERT( found != NULL );
TEST_ASSERT( found == head );
TEST_ASSERT( found->oid.p != oid );
ASSERT_COMPARE( found->oid.p, found->oid.len, oid, oid_len );
if( new_len == 0 )
TEST_ASSERT( found->val.p == NULL );
else if( new_val == NULL )
TEST_ASSERT( found->val.p != NULL );
else
{
TEST_ASSERT( found->val.p != new_val );
ASSERT_COMPARE( found->val.p, found->val.len,
new_val, (size_t) new_len );
}
exit:
if( found != NULL )
{
mbedtls_free( found->oid.p );
mbedtls_free( found->val.p );
}
mbedtls_free( found );
}
void test_store_named_data_val_new_wrapper( void ** params )
{
test_store_named_data_val_new( *( (int *) params[0] ) );
}
#endif /* MBEDTLS_ASN1_WRITE_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_ASN1_WRITE_C)
case 0:
{
*out_value = MBEDTLS_ASN1_OCTET_STRING;
}
break;
case 1:
{
*out_value = MBEDTLS_ASN1_UTF8_STRING;
}
break;
case 2:
{
*out_value = MBEDTLS_ASN1_PRINTABLE_STRING;
}
break;
case 3:
{
*out_value = MBEDTLS_ASN1_IA5_STRING;
}
break;
case 4:
{
*out_value = MBEDTLS_ASN1_IA5_STRING | MBEDTLS_ASN1_CONTEXT_SPECIFIC;
}
break;
case 5:
{
*out_value = MBEDTLS_ASN1_OID;
}
break;
case 6:
{
*out_value = MBEDTLS_ERR_ASN1_BUF_TOO_SMALL;
}
break;
case 7:
{
*out_value = -1;
}
break;
case 8:
{
*out_value = -4;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_ASN1_WRITE_C)
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_ASN1_WRITE_C)
test_mbedtls_asn1_write_null_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_ASN1_WRITE_C)
test_mbedtls_asn1_write_bool_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_ASN1_WRITE_C)
test_mbedtls_asn1_write_int_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_ASN1_WRITE_C)
test_mbedtls_asn1_write_enum_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_ASN1_WRITE_C) && defined(MBEDTLS_BIGNUM_C)
test_mbedtls_asn1_write_mpi_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_ASN1_WRITE_C)
test_mbedtls_asn1_write_string_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_ASN1_WRITE_C)
test_mbedtls_asn1_write_algorithm_identifier_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_ASN1_WRITE_C) && defined(MBEDTLS_ASN1_PARSE_C)
test_mbedtls_asn1_write_len_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_ASN1_WRITE_C)
test_test_asn1_write_bitstrings_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_ASN1_WRITE_C)
test_store_named_data_find_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_ASN1_WRITE_C)
test_store_named_data_val_found_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_ASN1_WRITE_C)
test_store_named_data_val_new_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_asn1write.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 26,682 | 909 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_dhm.datax | Diffie-Hellman parameter validation
0
Diffie-Hellman full exchange #1
1:int:10:char*:"23":int:10:char*:"5":int:0
Diffie-Hellman full exchange #2
1:int:10:char*:"93450983094850938450983409623":int:10:char*:"9345098304850938450983409622":int:0
Diffie-Hellman full exchange #3
1:int:10:char*:"93450983094850938450983409623982317398171298719873918739182739712938719287391879381271":int:10:char*:"9345098309485093845098340962223981329819812792137312973297123912791271":int:0
Diffie-Hellman trivial subgroup #1
1:int:10:char*:"23":int:10:char*:"1":exp:0
Diffie-Hellman trivial subgroup #2
1:int:10:char*:"23":int:10:char*:"-1":exp:0
Diffie-Hellman small modulus
1:int:10:char*:"3":int:10:char*:"5":exp:1
Diffie-Hellman zero modulus
1:int:10:char*:"0":int:10:char*:"5":exp:0
Diffie-Hellman MPI_MAX_SIZE modulus
2:exp:2:int:10:char*:"5":int:0
Diffie-Hellman MPI_MAX_SIZE + 1 modulus
2:exp:3:int:10:char*:"5":exp:4
Diffie-Hellman load parameters from file [#1]
3:char*:"/zip/third_party/mbedtls/test/data/dhparams.pem":char*:"9e35f430443a09904f3a39a979797d070df53378e79c2438bef4e761f3c714553328589b041c809be1d6c6b5f1fc9f47d3a25443188253a992a56818b37ba9de5a40d362e56eff0be5417474c125c199272c8fe41dea733df6f662c92ae76556e755d10c64e6a50968f67fc6ea73d0dca8569be2ba204e23580d8bca2f4975b3":char*:"02":int:128
Diffie-Hellman load parameters from file [#2]
3:char*:"/zip/third_party/mbedtls/test/data/dh.optlen.pem":char*:"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":char*:"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":int:256
Diffie-Hellman selftest
4
| 2,488 | 40 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_des.datax | DES check weak key #1
0:hex:"0101010101010101":int:1
DES check weak key #2
0:hex:"FEE0FEE0FEF1FEF1":int:1
DES check weak key #3
0:hex:"0101010101010100":int:0
DES check weak key #4
0:hex:"EEE0FEE0FEF1FEF1":int:0
DES Encrypt OpenSSL Test Vector #1
1:hex:"0000000000000000":hex:"0000000000000000":hex:"8CA64DE9C1B123A7"
DES Encrypt OpenSSL Test Vector #2
1:hex:"FFFFFFFFFFFFFFFF":hex:"FFFFFFFFFFFFFFFF":hex:"7359B2163E4EDC58"
DES Encrypt OpenSSL Test Vector #3
1:hex:"3000000000000000":hex:"1000000000000001":hex:"958E6E627A05557B"
DES Encrypt OpenSSL Test Vector #4
1:hex:"1111111111111111":hex:"1111111111111111":hex:"F40379AB9E0EC533"
DES Encrypt OpenSSL Test Vector #5
1:hex:"0123456789ABCDEF":hex:"1111111111111111":hex:"17668DFC7292532D"
DES Encrypt OpenSSL Test Vector #6
1:hex:"1111111111111111":hex:"0123456789ABCDEF":hex:"8A5AE1F81AB8F2DD"
DES Encrypt OpenSSL Test Vector #7
1:hex:"0000000000000000":hex:"0000000000000000":hex:"8CA64DE9C1B123A7"
DES Encrypt OpenSSL Test Vector #8
1:hex:"FEDCBA9876543210":hex:"0123456789ABCDEF":hex:"ED39D950FA74BCC4"
DES Encrypt OpenSSL Test Vector #9
1:hex:"7CA110454A1A6E57":hex:"01A1D6D039776742":hex:"690F5B0D9A26939B"
DES Encrypt OpenSSL Test Vector #10
1:hex:"0131D9619DC1376E":hex:"5CD54CA83DEF57DA":hex:"7A389D10354BD271"
DES Encrypt OpenSSL Test Vector #11
1:hex:"07A1133E4A0B2686":hex:"0248D43806F67172":hex:"868EBB51CAB4599A"
DES Encrypt OpenSSL Test Vector #12
1:hex:"3849674C2602319E":hex:"51454B582DDF440A":hex:"7178876E01F19B2A"
DES Encrypt OpenSSL Test Vector #13
1:hex:"04B915BA43FEB5B6":hex:"42FD443059577FA2":hex:"AF37FB421F8C4095"
DES Encrypt OpenSSL Test Vector #14
1:hex:"0113B970FD34F2CE":hex:"059B5E0851CF143A":hex:"86A560F10EC6D85B"
DES Encrypt OpenSSL Test Vector #15
1:hex:"0170F175468FB5E6":hex:"0756D8E0774761D2":hex:"0CD3DA020021DC09"
DES Encrypt OpenSSL Test Vector #16
1:hex:"43297FAD38E373FE":hex:"762514B829BF486A":hex:"EA676B2CB7DB2B7A"
DES Encrypt OpenSSL Test Vector #17
1:hex:"07A7137045DA2A16":hex:"3BDD119049372802":hex:"DFD64A815CAF1A0F"
DES Encrypt OpenSSL Test Vector #18
1:hex:"04689104C2FD3B2F":hex:"26955F6835AF609A":hex:"5C513C9C4886C088"
DES Encrypt OpenSSL Test Vector #19
1:hex:"37D06BB516CB7546":hex:"164D5E404F275232":hex:"0A2AEEAE3FF4AB77"
DES Encrypt OpenSSL Test Vector #20
1:hex:"1F08260D1AC2465E":hex:"6B056E18759F5CCA":hex:"EF1BF03E5DFA575A"
DES Encrypt OpenSSL Test Vector #21
1:hex:"584023641ABA6176":hex:"004BD6EF09176062":hex:"88BF0DB6D70DEE56"
DES Encrypt OpenSSL Test Vector #22
1:hex:"025816164629B007":hex:"480D39006EE762F2":hex:"A1F9915541020B56"
DES Encrypt OpenSSL Test Vector #23
1:hex:"49793EBC79B3258F":hex:"437540C8698F3CFA":hex:"6FBF1CAFCFFD0556"
DES Encrypt OpenSSL Test Vector #24
1:hex:"4FB05E1515AB73A7":hex:"072D43A077075292":hex:"2F22E49BAB7CA1AC"
DES Encrypt OpenSSL Test Vector #25
1:hex:"49E95D6D4CA229BF":hex:"02FE55778117F12A":hex:"5A6B612CC26CCE4A"
DES Encrypt OpenSSL Test Vector #26
1:hex:"018310DC409B26D6":hex:"1D9D5C5018F728C2":hex:"5F4C038ED12B2E41"
DES Encrypt OpenSSL Test Vector #27
1:hex:"1C587F1C13924FEF":hex:"305532286D6F295A":hex:"63FAC0D034D9F793"
DES Encrypt OpenSSL Test Vector #28
1:hex:"0101010101010101":hex:"0123456789ABCDEF":hex:"617B3A0CE8F07100"
DES Encrypt OpenSSL Test Vector #29
1:hex:"1F1F1F1F0E0E0E0E":hex:"0123456789ABCDEF":hex:"DB958605F8C8C606"
DES Encrypt OpenSSL Test Vector #30
1:hex:"E0FEE0FEF1FEF1FE":hex:"0123456789ABCDEF":hex:"EDBFD1C66C29CCC7"
DES Encrypt OpenSSL Test Vector #31
1:hex:"0000000000000000":hex:"FFFFFFFFFFFFFFFF":hex:"355550B2150E2451"
DES Encrypt OpenSSL Test Vector #32
1:hex:"FFFFFFFFFFFFFFFF":hex:"0000000000000000":hex:"CAAAAF4DEAF1DBAE"
DES Encrypt OpenSSL Test Vector #33
1:hex:"0123456789ABCDEF":hex:"0000000000000000":hex:"D5D44FF720683D0D"
DES Encrypt OpenSSL Test Vector #34
1:hex:"FEDCBA9876543210":hex:"FFFFFFFFFFFFFFFF":hex:"2A2BB008DF97C2F2"
DES Decrypt OpenSSL Test Vector #1
2:hex:"0000000000000000":hex:"8CA64DE9C1B123A7":hex:"0000000000000000"
DES Decrypt OpenSSL Test Vector #2
2:hex:"FFFFFFFFFFFFFFFF":hex:"7359B2163E4EDC58":hex:"FFFFFFFFFFFFFFFF"
DES Decrypt OpenSSL Test Vector #3
2:hex:"3000000000000000":hex:"958E6E627A05557B":hex:"1000000000000001"
DES Decrypt OpenSSL Test Vector #4
2:hex:"1111111111111111":hex:"F40379AB9E0EC533":hex:"1111111111111111"
DES Decrypt OpenSSL Test Vector #5
2:hex:"0123456789ABCDEF":hex:"17668DFC7292532D":hex:"1111111111111111"
DES Decrypt OpenSSL Test Vector #6
2:hex:"1111111111111111":hex:"8A5AE1F81AB8F2DD":hex:"0123456789ABCDEF"
DES Decrypt OpenSSL Test Vector #7
2:hex:"0000000000000000":hex:"8CA64DE9C1B123A7":hex:"0000000000000000"
DES Decrypt OpenSSL Test Vector #8
2:hex:"FEDCBA9876543210":hex:"ED39D950FA74BCC4":hex:"0123456789ABCDEF"
DES Decrypt OpenSSL Test Vector #9
2:hex:"7CA110454A1A6E57":hex:"690F5B0D9A26939B":hex:"01A1D6D039776742"
DES Decrypt OpenSSL Test Vector #10
2:hex:"0131D9619DC1376E":hex:"7A389D10354BD271":hex:"5CD54CA83DEF57DA"
DES Decrypt OpenSSL Test Vector #11
2:hex:"07A1133E4A0B2686":hex:"868EBB51CAB4599A":hex:"0248D43806F67172"
DES Decrypt OpenSSL Test Vector #12
2:hex:"3849674C2602319E":hex:"7178876E01F19B2A":hex:"51454B582DDF440A"
DES Decrypt OpenSSL Test Vector #13
2:hex:"04B915BA43FEB5B6":hex:"AF37FB421F8C4095":hex:"42FD443059577FA2"
DES Decrypt OpenSSL Test Vector #14
2:hex:"0113B970FD34F2CE":hex:"86A560F10EC6D85B":hex:"059B5E0851CF143A"
DES Decrypt OpenSSL Test Vector #15
2:hex:"0170F175468FB5E6":hex:"0CD3DA020021DC09":hex:"0756D8E0774761D2"
DES Decrypt OpenSSL Test Vector #16
2:hex:"43297FAD38E373FE":hex:"EA676B2CB7DB2B7A":hex:"762514B829BF486A"
DES Decrypt OpenSSL Test Vector #17
2:hex:"07A7137045DA2A16":hex:"DFD64A815CAF1A0F":hex:"3BDD119049372802"
DES Decrypt OpenSSL Test Vector #18
2:hex:"04689104C2FD3B2F":hex:"5C513C9C4886C088":hex:"26955F6835AF609A"
DES Decrypt OpenSSL Test Vector #19
2:hex:"37D06BB516CB7546":hex:"0A2AEEAE3FF4AB77":hex:"164D5E404F275232"
DES Decrypt OpenSSL Test Vector #20
2:hex:"1F08260D1AC2465E":hex:"EF1BF03E5DFA575A":hex:"6B056E18759F5CCA"
DES Decrypt OpenSSL Test Vector #21
2:hex:"584023641ABA6176":hex:"88BF0DB6D70DEE56":hex:"004BD6EF09176062"
DES Decrypt OpenSSL Test Vector #22
2:hex:"025816164629B007":hex:"A1F9915541020B56":hex:"480D39006EE762F2"
DES Decrypt OpenSSL Test Vector #23
2:hex:"49793EBC79B3258F":hex:"6FBF1CAFCFFD0556":hex:"437540C8698F3CFA"
DES Decrypt OpenSSL Test Vector #24
2:hex:"4FB05E1515AB73A7":hex:"2F22E49BAB7CA1AC":hex:"072D43A077075292"
DES Decrypt OpenSSL Test Vector #25
2:hex:"49E95D6D4CA229BF":hex:"5A6B612CC26CCE4A":hex:"02FE55778117F12A"
DES Decrypt OpenSSL Test Vector #26
2:hex:"018310DC409B26D6":hex:"5F4C038ED12B2E41":hex:"1D9D5C5018F728C2"
DES Decrypt OpenSSL Test Vector #27
2:hex:"1C587F1C13924FEF":hex:"63FAC0D034D9F793":hex:"305532286D6F295A"
DES Decrypt OpenSSL Test Vector #28
2:hex:"0101010101010101":hex:"617B3A0CE8F07100":hex:"0123456789ABCDEF"
DES Decrypt OpenSSL Test Vector #29
2:hex:"1F1F1F1F0E0E0E0E":hex:"DB958605F8C8C606":hex:"0123456789ABCDEF"
DES Decrypt OpenSSL Test Vector #30
2:hex:"E0FEE0FEF1FEF1FE":hex:"EDBFD1C66C29CCC7":hex:"0123456789ABCDEF"
DES Decrypt OpenSSL Test Vector #31
2:hex:"0000000000000000":hex:"355550B2150E2451":hex:"FFFFFFFFFFFFFFFF"
DES Decrypt OpenSSL Test Vector #32
2:hex:"FFFFFFFFFFFFFFFF":hex:"CAAAAF4DEAF1DBAE":hex:"0000000000000000"
DES Decrypt OpenSSL Test Vector #33
2:hex:"0123456789ABCDEF":hex:"D5D44FF720683D0D":hex:"0000000000000000"
DES Decrypt OpenSSL Test Vector #34
2:hex:"FEDCBA9876543210":hex:"2A2BB008DF97C2F2":hex:"FFFFFFFFFFFFFFFF"
DES-CBC Encrypt OpenSSL Test Vector #1
3:hex:"0123456789abcdef":hex:"fedcba9876543210":hex:"37363534333231204E6F77206973207468652074696D6520":hex:"ccd173ffab2039f4acd8aefddfd8a1eb468e91157888ba68":int:0
DES-CBC Decrypt OpenSSL Test Vector #1
4:hex:"0123456789abcdef":hex:"fedcba9876543210":hex:"ccd173ffab2039f4acd8aefddfd8a1eb468e91157888ba68":hex:"37363534333231204E6F77206973207468652074696D6520":int:0
3DES-ECB 2Key Encrypt OpenSSL Test Vector #1
5:int:2:hex:"0000000000000000FFFFFFFFFFFFFFFF":hex:"0000000000000000":hex:"9295B59BB384736E"
3DES-ECB 2Key Encrypt OpenSSL Test Vector #2
5:int:2:hex:"FFFFFFFFFFFFFFFF3000000000000000":hex:"FFFFFFFFFFFFFFFF":hex:"199E9D6DF39AA816"
3DES-ECB 2Key Decrypt OpenSSL Test Vector #1
6:int:2:hex:"0000000000000000FFFFFFFFFFFFFFFF":hex:"9295B59BB384736E":hex:"0000000000000000"
3DES-ECB 2Key Decrypt OpenSSL Test Vector #2
6:int:2:hex:"FFFFFFFFFFFFFFFF3000000000000000":hex:"199E9D6DF39AA816":hex:"FFFFFFFFFFFFFFFF"
3DES-CBC 3Key Encrypt OpenSSL Test Vector #1
7:int:3:hex:"0123456789abcdeff1e0d3c2b5a49786fedcba9876543210":hex:"fedcba9876543210":hex:"37363534333231204E6F77206973207468652074696D6520":hex:"3FE301C962AC01D02213763C1CBD4CDC799657C064ECF5D4":int:0
3DES-CBC 3Key Decrypt OpenSSL Test Vector #1
8:int:3:hex:"0123456789abcdeff1e0d3c2b5a49786fedcba9876543210":hex:"fedcba9876543210":hex:"3FE301C962AC01D02213763C1CBD4CDC799657C064ECF5D4":hex:"37363534333231204E6F77206973207468652074696D6520":int:0
DES-CBC Encrypt (Invalid input length)
3:hex:"0123456789abcdef":hex:"fedcba9876543210":hex:"37363534333231204E6F77206973207468652074696D65":hex:"":exp:0
3DES-CBC 3Key Encrypt (Invalid input length)
7:int:3:hex:"0123456789abcdeff1e0d3c2b5a49786fedcba9876543210":hex:"fedcba9876543210":hex:"37363534333231204E6F77206973207468652074696D65":hex:"":exp:0
Run through parity bit tests
9
DES Selftest
10
| 9,403 | 253 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.ccm.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_cipher.ccm.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_cipher.function
* Test suite data : suites/test_suite_cipher.ccm.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_CIPHER_C)
#include "third_party/mbedtls/cipher.h"
#if defined(MBEDTLS_AES_C)
#include "third_party/mbedtls/aes.h"
#endif
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
#endif
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
#define MBEDTLS_CIPHER_AUTH_CRYPT
#endif
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
/* Helper for resetting key/direction
*
* The documentation doesn't explicitly say whether calling
* mbedtls_cipher_setkey() twice is allowed or not. This currently works with
* the default software implementation, but only by accident. It isn't
* guaranteed to work with new ciphers or with alternative implementations of
* individual ciphers, and it doesn't work with the PSA wrappers. So don't do
* it, and instead start with a fresh context.
*/
static int cipher_reset_key( mbedtls_cipher_context_t *ctx, int cipher_id,
int use_psa, size_t tag_len, const data_t *key, int direction )
{
mbedtls_cipher_free( ctx );
mbedtls_cipher_init( ctx );
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
(void) tag_len;
#else
if( use_psa == 1 )
{
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( ctx,
mbedtls_cipher_info_from_type( cipher_id ),
tag_len ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
TEST_ASSERT( 0 == mbedtls_cipher_setup( ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
}
TEST_ASSERT( 0 == mbedtls_cipher_setkey( ctx, key->x, 8 * key->len,
direction ) );
return( 1 );
exit:
return( 0 );
}
/*
* Check if a buffer is all-0 bytes:
* return 1 if it is,
* 0 if it isn't.
*/
int buffer_is_all_zero( const uint8_t *buf, size_t size )
{
for( size_t i = 0; i < size; i++ )
if( buf[i] != 0 )
return 0;
return 1;
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_mbedtls_cipher_list( )
{
const int *cipher_type;
for( cipher_type = mbedtls_cipher_list(); *cipher_type != 0; cipher_type++ )
TEST_ASSERT( mbedtls_cipher_info_from_type( *cipher_type ) != NULL );
exit:
;
}
void test_mbedtls_cipher_list_wrapper( void ** params )
{
(void)params;
test_mbedtls_cipher_list( );
}
void test_cipher_invalid_param_unconditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_cipher_context_t invalid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
mbedtls_cipher_init( &valid_ctx );
mbedtls_cipher_setup( &valid_ctx, valid_info );
mbedtls_cipher_init( &invalid_ctx );
/* mbedtls_cipher_setup() */
TEST_ASSERT( mbedtls_cipher_setup( &valid_ctx, NULL ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_get_block_size() */
TEST_ASSERT( mbedtls_cipher_get_block_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_cipher_mode() */
TEST_ASSERT( mbedtls_cipher_get_cipher_mode( &invalid_ctx ) ==
MBEDTLS_MODE_NONE );
/* mbedtls_cipher_get_iv_size() */
TEST_ASSERT( mbedtls_cipher_get_iv_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_type() */
TEST_ASSERT(
mbedtls_cipher_get_type( &invalid_ctx ) ==
MBEDTLS_CIPHER_NONE);
/* mbedtls_cipher_get_name() */
TEST_ASSERT( mbedtls_cipher_get_name( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_key_bitlen() */
TEST_ASSERT( mbedtls_cipher_get_key_bitlen( &invalid_ctx ) ==
MBEDTLS_KEY_LENGTH_NONE );
/* mbedtls_cipher_get_operation() */
TEST_ASSERT( mbedtls_cipher_get_operation( &invalid_ctx ) ==
MBEDTLS_OPERATION_NONE );
/* mbedtls_cipher_setkey() */
TEST_ASSERT(
mbedtls_cipher_setkey( &invalid_ctx,
valid_buffer,
valid_bitlen,
valid_operation ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_set_iv() */
TEST_ASSERT(
mbedtls_cipher_set_iv( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_reset() */
TEST_ASSERT( mbedtls_cipher_reset( &invalid_ctx ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_ASSERT(
mbedtls_cipher_update_ad( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_ASSERT( mbedtls_cipher_set_padding_mode( &invalid_ctx, valid_mode ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif
/* mbedtls_cipher_update() */
TEST_ASSERT(
mbedtls_cipher_update( &invalid_ctx,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_finish() */
TEST_ASSERT(
mbedtls_cipher_finish( &invalid_ctx,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_ASSERT(
mbedtls_cipher_write_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_check_tag() */
TEST_ASSERT(
mbedtls_cipher_check_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
exit:
mbedtls_cipher_free( &invalid_ctx );
mbedtls_cipher_free( &valid_ctx );
}
void test_cipher_invalid_param_unconditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_unconditional( );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_cipher_invalid_param_conditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_operation_t invalid_operation = 100;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
/* mbedtls_cipher_init() */
TEST_VALID_PARAM( mbedtls_cipher_init( &valid_ctx ) );
TEST_INVALID_PARAM( mbedtls_cipher_init( NULL ) );
/* mbedtls_cipher_setup() */
TEST_VALID_PARAM( mbedtls_cipher_setup( &valid_ctx, valid_info ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setup( NULL, valid_info ) );
/* mbedtls_cipher_get_block_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_block_size( NULL ) );
/* mbedtls_cipher_get_cipher_mode() */
TEST_INVALID_PARAM_RET(
MBEDTLS_MODE_NONE,
mbedtls_cipher_get_cipher_mode( NULL ) );
/* mbedtls_cipher_get_iv_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_iv_size( NULL ) );
/* mbedtls_cipher_get_type() */
TEST_INVALID_PARAM_RET(
MBEDTLS_CIPHER_NONE,
mbedtls_cipher_get_type( NULL ) );
/* mbedtls_cipher_get_name() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_name( NULL ) );
/* mbedtls_cipher_get_key_bitlen() */
TEST_INVALID_PARAM_RET(
MBEDTLS_KEY_LENGTH_NONE,
mbedtls_cipher_get_key_bitlen( NULL ) );
/* mbedtls_cipher_get_operation() */
TEST_INVALID_PARAM_RET(
MBEDTLS_OPERATION_NONE,
mbedtls_cipher_get_operation( NULL ) );
/* mbedtls_cipher_setkey() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( NULL,
valid_buffer,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
NULL,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
valid_buffer,
valid_bitlen,
invalid_operation ) );
/* mbedtls_cipher_set_iv() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_reset() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_reset( NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_padding_mode( NULL, valid_mode ) );
#endif
/* mbedtls_cipher_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( NULL,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
NULL, valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
valid_buffer,
NULL ) );
/* mbedtls_cipher_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( NULL,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
valid_buffer,
NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_check_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
/* mbedtls_cipher_crypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_AEAD)
/* mbedtls_cipher_auth_encrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
/* mbedtls_cipher_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
#endif /* defined(MBEDTLS_CIPHER_MODE_AEAD) */
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
/* mbedtls_cipher_auth_encrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
/* mbedtls_cipher_auth_decrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
#endif /* MBEDTLS_CIPHER_MODE_AEAD || MBEDTLS_NIST_KW_C */
/* mbedtls_cipher_free() */
TEST_VALID_PARAM( mbedtls_cipher_free( NULL ) );
exit:
TEST_VALID_PARAM( mbedtls_cipher_free( &valid_ctx ) );
}
void test_cipher_invalid_param_conditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_conditional( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
#if defined(MBEDTLS_AES_C)
void test_cipher_special_behaviours( )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char input[32];
unsigned char output[32];
#if defined (MBEDTLS_CIPHER_MODE_CBC)
unsigned char iv[32];
#endif
size_t olen = 0;
mbedtls_cipher_init( &ctx );
memset( input, 0, sizeof( input ) );
memset( output, 0, sizeof( output ) );
#if defined(MBEDTLS_CIPHER_MODE_CBC)
memset( iv, 0, sizeof( iv ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_CBC );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* IV too big */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, MBEDTLS_MAX_IV_LENGTH + 1 )
== MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
/* IV too small */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, 0 )
== MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_cipher_free( &ctx );
mbedtls_cipher_init( &ctx );
#endif /* MBEDTLS_CIPHER_MODE_CBC */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_ECB );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* Update ECB with partial block */
TEST_ASSERT( mbedtls_cipher_update( &ctx, input, 1, output, &olen )
== MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED );
exit:
mbedtls_cipher_free( &ctx );
}
void test_cipher_special_behaviours_wrapper( void ** params )
{
(void)params;
test_cipher_special_behaviours( );
}
#endif /* MBEDTLS_AES_C */
void test_enc_dec_buf( int cipher_id, char * cipher_string, int key_len,
int length_val, int pad_mode )
{
size_t length = length_val, outlen, total_len, i, block_size;
unsigned char key[64];
unsigned char iv[16];
unsigned char ad[13];
unsigned char tag[16];
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
/*
* Prepare contexts
*/
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( key, 0x2a, sizeof( key ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( mbedtls_cipher_info_from_string( cipher_string ) == cipher_info );
/* Initialise enc and dec contexts */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
/*
* Do a few encode/decode cycles
*/
for( i = 0; i < 3; i++ )
{
memset( iv , 0x00 + i, sizeof( iv ) );
memset( ad, 0x10 + i, sizeof( ad ) );
memset( inbuf, 0x20 + i, sizeof( inbuf ) );
memset( encbuf, 0, sizeof( encbuf ) );
memset( decbuf, 0, sizeof( decbuf ) );
memset( tag, 0, sizeof( tag ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, ad, sizeof( ad ) - i ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, ad, sizeof( ad ) - i ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, length, encbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_write_tag( &ctx_enc, tag, sizeof( tag ) ) );
#endif
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len > length &&
total_len <= length + block_size ) );
/* decode the previously encoded string */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, total_len, decbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_check_tag( &ctx_dec, tag, sizeof( tag ) ) );
#endif
/* check result */
TEST_ASSERT( total_len == length );
TEST_ASSERT( 0 == memcmp(inbuf, decbuf, length) );
}
/*
* Done
*/
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_wrapper( void ** params )
{
test_enc_dec_buf( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_enc_fail( int cipher_id, int pad_mode, int key_len, int length_val,
int ret )
{
size_t length = length_val;
unsigned char key[32];
unsigned char iv[16];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char inbuf[64];
unsigned char encbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
/* Initialise context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, NULL, 0 ) );
#endif
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, inbuf, length, encbuf, &outlen ) );
TEST_ASSERT( ret == mbedtls_cipher_finish( &ctx, encbuf + outlen, &outlen ) );
/* done */
exit:
mbedtls_cipher_free( &ctx );
}
void test_enc_fail_wrapper( void ** params )
{
test_enc_fail( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_dec_empty_buf( int cipher,
int expected_update_ret,
int expected_finish_ret )
{
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
const mbedtls_cipher_info_t *cipher_info;
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise context */
cipher_info = mbedtls_cipher_info_from_type( cipher );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( sizeof(key) * 8 >= cipher_info->key_bitlen );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec,
key, cipher_info->key_bitlen,
MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
#endif
/* decode 0-byte string */
TEST_ASSERT( expected_update_ret ==
mbedtls_cipher_update( &ctx_dec, encbuf, 0, decbuf, &outlen ) );
TEST_ASSERT( 0 == outlen );
if ( expected_finish_ret == 0 &&
( cipher_info->mode == MBEDTLS_MODE_CBC ||
cipher_info->mode == MBEDTLS_MODE_ECB ) )
{
/* Non-CBC and non-ECB ciphers are OK with decrypting empty buffers and
* return success, not MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED, when
* decrypting an empty buffer.
* On the other hand, CBC and ECB ciphers need a full block of input.
*/
expected_finish_ret = MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED;
}
TEST_ASSERT( expected_finish_ret == mbedtls_cipher_finish(
&ctx_dec, decbuf + outlen, &outlen ) );
TEST_ASSERT( 0 == outlen );
exit:
mbedtls_cipher_free( &ctx_dec );
}
void test_dec_empty_buf_wrapper( void ** params )
{
test_dec_empty_buf( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
void test_enc_dec_buf_multipart( int cipher_id, int key_len, int first_length_val,
int second_length_val, int pad_mode,
int first_encrypt_output_len, int second_encrypt_output_len,
int first_decrypt_output_len, int second_decrypt_output_len )
{
size_t first_length = first_length_val;
size_t second_length = second_length_val;
size_t length = first_length + second_length;
size_t block_size;
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
const mbedtls_cipher_info_t *cipher_info;
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
size_t totaloutlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise enc and dec contexts */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, NULL, 0 ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, first_length, encbuf, &outlen ) );
TEST_ASSERT( (size_t)first_encrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf + first_length, second_length, encbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_encrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen > length &&
totaloutlen <= length + block_size ) );
/* decode the previously encoded string */
second_length = totaloutlen - first_length;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, first_length, decbuf, &outlen ) );
TEST_ASSERT( (size_t)first_decrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf + first_length, second_length, decbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_decrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length );
TEST_ASSERT( 0 == memcmp(inbuf, decbuf, length) );
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_multipart_wrapper( void ** params )
{
test_enc_dec_buf_multipart( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ), *( (int *) params[6] ), *( (int *) params[7] ), *( (int *) params[8] ) );
}
void test_decrypt_test_vec( int cipher_id, int pad_mode, data_t * key,
data_t * iv, data_t * cipher,
data_t * clear, data_t * ad, data_t * tag,
int finish_result, int tag_result )
{
unsigned char output[265];
mbedtls_cipher_context_t ctx;
size_t outlen, total_len;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
#if !defined(MBEDTLS_GCM_C) && !defined(MBEDTLS_CHACHAPOLY_C)
((void) ad);
((void) tag);
#endif
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, MBEDTLS_DECRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( pad_mode != -1 )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv->x, iv->len ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, ad->x, ad->len ) );
#endif
/* decode buffer and check tag->x */
total_len = 0;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, cipher->x, cipher->len, output, &outlen ) );
total_len += outlen;
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( tag_result == mbedtls_cipher_check_tag( &ctx, tag->x, tag->len ) );
#endif
/* check plaintext only if everything went fine */
if( 0 == finish_result && 0 == tag_result )
{
TEST_ASSERT( total_len == clear->len );
TEST_ASSERT( 0 == memcmp( output, clear->x, clear->len ) );
}
exit:
mbedtls_cipher_free( &ctx );
}
void test_decrypt_test_vec_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_decrypt_test_vec( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, &data10, &data12, *( (int *) params[14] ), *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
void test_auth_crypt_tv( int cipher_id, data_t * key, data_t * iv,
data_t * ad, data_t * cipher, data_t * tag,
char * result, data_t * clear, int use_psa )
{
/*
* Take an AEAD ciphertext + tag and perform a pair
* of AEAD decryption and AEAD encryption. Check that
* this results in the expected plaintext, and that
* decryption and encryption are inverse to one another.
*
* Do that twice:
* - once with legacy functions auth_decrypt/auth_encrypt
* - once with new functions auth_decrypt_ext/auth_encrypt_ext
* This allows testing both without duplicating test cases.
*/
int ret;
int using_nist_kw, using_nist_kw_padding;
mbedtls_cipher_context_t ctx;
size_t outlen;
unsigned char *cipher_plus_tag = NULL;
size_t cipher_plus_tag_len;
unsigned char *decrypt_buf = NULL;
size_t decrypt_buf_len = 0;
unsigned char *encrypt_buf = NULL;
size_t encrypt_buf_len = 0;
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
unsigned char *tmp_tag = NULL;
unsigned char *tmp_cipher = NULL;
unsigned char *tag_buf = NULL;
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
/* Null pointers are documented as valid for inputs of length 0.
* The test framework passes non-null pointers, so set them to NULL.
* key, cipher and tag can't be empty. */
if( iv->len == 0 )
iv->x = NULL;
if( ad->len == 0 )
ad->x = NULL;
if( clear->len == 0 )
clear->x = NULL;
mbedtls_cipher_init( &ctx );
/* Initialize PSA Crypto */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_ASSERT( psa_crypto_init( ) );
#else
(void) use_psa;
#endif
/*
* Are we using NIST_KW? with padding?
*/
using_nist_kw_padding = cipher_id == MBEDTLS_CIPHER_AES_128_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_192_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_256_KWP;
using_nist_kw = cipher_id == MBEDTLS_CIPHER_AES_128_KW ||
cipher_id == MBEDTLS_CIPHER_AES_192_KW ||
cipher_id == MBEDTLS_CIPHER_AES_256_KW ||
using_nist_kw_padding;
/****************************************************************
* *
* Part 1: non-deprecated API *
* *
****************************************************************/
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* prepare buffer for decryption
* (we need the tag appended to the ciphertext)
*/
cipher_plus_tag_len = cipher->len + tag->len;
ASSERT_ALLOC( cipher_plus_tag, cipher_plus_tag_len );
memcpy( cipher_plus_tag, cipher->x, cipher->len );
memcpy( cipher_plus_tag + cipher->len, tag->x, tag->len );
/*
* Compute length of output buffer according to the documentation
*/
if( using_nist_kw )
decrypt_buf_len = cipher_plus_tag_len - 8;
else
decrypt_buf_len = cipher_plus_tag_len - tag->len;
/*
* Try decrypting to a buffer that's 1B too small
*/
if( decrypt_buf_len != 0 )
{
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len, &outlen, tag->len );
if( strcmp( result, "FAIL" ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, decrypt_buf_len ) );
}
else
{
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
/* Free this, but keep cipher_plus_tag for deprecated function with PSA */
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/*
* Compute size of output buffer according to documentation
*/
if( using_nist_kw )
{
encrypt_buf_len = clear->len + 8;
if( using_nist_kw_padding && encrypt_buf_len % 8 != 0 )
encrypt_buf_len += 8 - encrypt_buf_len % 8;
}
else
{
encrypt_buf_len = clear->len + tag->len;
}
/*
* Try encrypting with an output buffer that's 1B too small
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret != 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
/*
* Encrypt and check the result
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len, &outlen, tag->len );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len + tag->len );
TEST_ASSERT( memcmp( encrypt_buf, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( memcmp( encrypt_buf + cipher->len,
tag->x, tag->len ) == 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
}
/****************************************************************
* *
* Part 2: deprecated API *
* *
****************************************************************/
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* Prepare pointers for decryption
*/
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
{
/* PSA requires that the tag immediately follows the ciphertext.
* Fortunately, we already have that from testing the new API. */
tmp_cipher = cipher_plus_tag;
tmp_tag = tmp_cipher + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
tmp_cipher = cipher->x;
tmp_tag = tag->x;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, cipher->len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
tmp_cipher, cipher->len, decrypt_buf, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
/* NIST_KW with legacy API */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else if( strcmp( result, "FAIL" ) == 0 )
{
/* unauthentic message */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, cipher->len ) );
}
else
{
/* authentic message: is the plaintext correct? */
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
mbedtls_free( cipher_plus_tag );
cipher_plus_tag = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/* prepare buffers for encryption */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa )
{
ASSERT_ALLOC( cipher_plus_tag, cipher->len + tag->len );
tmp_cipher = cipher_plus_tag;
tmp_tag = cipher_plus_tag + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
ASSERT_ALLOC( encrypt_buf, cipher->len );
ASSERT_ALLOC( tag_buf, tag->len );
tmp_cipher = encrypt_buf;
tmp_tag = tag_buf;
}
/*
* Encrypt and check the result
*/
outlen = 0;
ret = mbedtls_cipher_auth_encrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
clear->x, clear->len, tmp_cipher, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len );
if( cipher->len != 0 )
TEST_ASSERT( memcmp( tmp_cipher, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( memcmp( tmp_tag, tag->x, tag->len ) == 0 );
}
}
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
exit:
mbedtls_cipher_free( &ctx );
mbedtls_free( decrypt_buf );
mbedtls_free( encrypt_buf );
mbedtls_free( cipher_plus_tag );
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
mbedtls_free( tag_buf );
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_auth_crypt_tv_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_auth_crypt_tv( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, (char *) params[11], &data12, *( (int *) params[14] ) );
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_test_vec_ecb( int cipher_id, int operation, data_t * key,
data_t * input, data_t * result, int finish_result
)
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, input->x,
mbedtls_cipher_get_block_size( &ctx ),
output, &outlen ) );
TEST_ASSERT( outlen == mbedtls_cipher_get_block_size( &ctx ) );
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
TEST_ASSERT( 0 == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == memcmp( output, result->x,
mbedtls_cipher_get_block_size( &ctx ) ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_test_vec_ecb_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_test_vec_ecb( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, *( (int *) params[8] ) );
}
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_test_vec_crypt( int cipher_id, int operation, data_t *key,
data_t *iv, data_t *input, data_t *result,
int finish_result, int use_psa )
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
#else
if( use_psa == 1 )
{
PSA_ASSERT( psa_crypto_init( ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( &ctx,
mbedtls_cipher_info_from_type( cipher_id ), 0 ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
if( MBEDTLS_MODE_CBC == ctx.cipher_info->mode )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, MBEDTLS_PADDING_NONE ) );
TEST_ASSERT( finish_result == mbedtls_cipher_crypt( &ctx, iv->len ? iv->x : NULL,
iv->len, input->x, input->len,
output, &outlen ) );
TEST_ASSERT( result->len == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == memcmp( output, result->x, outlen ) );
exit:
mbedtls_cipher_free( &ctx );
#if defined(MBEDTLS_USE_PSA_CRYPTO)
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_test_vec_crypt_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_test_vec_crypt( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_set_padding( int cipher_id, int pad_mode, int ret )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
mbedtls_cipher_init( &ctx );
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( ret == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_set_padding_wrapper( void ** params )
{
test_set_padding( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_check_padding( int pad_mode, data_t * input, int ret, int dlen_check
)
{
mbedtls_cipher_info_t cipher_info;
mbedtls_cipher_context_t ctx;
size_t dlen;
/* build a fake context just for getting access to get_padding */
mbedtls_cipher_init( &ctx );
cipher_info.mode = MBEDTLS_MODE_CBC;
ctx.cipher_info = &cipher_info;
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
TEST_ASSERT( ret == ctx.get_padding( input->x, input->len, &dlen ) );
if( 0 == ret )
TEST_ASSERT( dlen == (size_t) dlen_check );
exit:
;
}
void test_check_padding_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_check_padding( *( (int *) params[0] ), &data1, *( (int *) params[3] ), *( (int *) params[4] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#endif /* MBEDTLS_CIPHER_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
*out_value = MBEDTLS_CIPHER_AES_128_CCM;
}
break;
case 1:
{
*out_value = MBEDTLS_CIPHER_AES_192_CCM;
}
break;
case 2:
{
*out_value = MBEDTLS_CIPHER_AES_256_CCM;
}
break;
case 3:
{
*out_value = MBEDTLS_CIPHER_CAMELLIA_128_CCM;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
#if defined(MBEDTLS_AES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_CCM_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_CAMELLIA_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if defined(MBEDTLS_USE_PSA_CRYPTO)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_CIPHER_C)
test_mbedtls_cipher_list_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_CIPHER_C)
test_cipher_invalid_param_unconditional_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_cipher_invalid_param_conditional_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_AES_C)
test_cipher_special_behaviours_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_fail_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_CIPHER_C)
test_dec_empty_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_multipart_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_CIPHER_C)
test_decrypt_test_vec_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_AUTH_CRYPT)
test_auth_crypt_tv_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_CIPHER_C)
test_test_vec_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_test_vec_crypt_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_set_padding_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_check_padding_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_cipher.ccm.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 72,472 | 2,066 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test.mk | #-*-mode:makefile-gmake;indent-tabs-mode:t;tab-width:8;coding:utf-8-*-â
#âââvi: set et ft=make ts=8 tw=8 fenc=utf-8 :viââââââââââââââââââââââââ
PKGS += THIRD_PARTY_MBEDTLS_TEST
THIRD_PARTY_MBEDTLS_TEST_FILES := $(wildcard third_party/mbedtls/test/*)
THIRD_PARTY_MBEDTLS_TEST_SRCS = $(filter %.c,$(THIRD_PARTY_MBEDTLS_TEST_FILES))
THIRD_PARTY_MBEDTLS_TEST_HDRS = $(filter %.h,$(THIRD_PARTY_MBEDTLS_TEST_FILES))
THIRD_PARTY_MBEDTLS_TEST_INCS = $(filter %.inc,$(THIRD_PARTY_MBEDTLS_TEST_FILES))
THIRD_PARTY_MBEDTLS_TEST_OBJS = \
$(THIRD_PARTY_MBEDTLS_TEST_SRCS:%.c=o/$(MODE)/%.o)
THIRD_PARTY_MBEDTLS_TEST_COMS = \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.cbc.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.cfb.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.ecb.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.ofb.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.rest.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.xts.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_asn1parse.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_asn1write.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_base64.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_blowfish.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_chacha20.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_chachapoly.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.aes.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.blowfish.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.ccm.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.chacha20.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.chachapoly.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.des.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.gcm.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.misc.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.nist_kw.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.null.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.padding.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_ctr_drbg.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_des.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_dhm.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_ecdh.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_ecdsa.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_ecp.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_entropy.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_error.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes128_de.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes128_en.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes192_de.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes192_en.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes256_de.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes256_en.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.misc.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_hkdf.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.misc.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.no_reseed.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.nopr.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.pr.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_md.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_mdx.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_memory_buffer_alloc.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_mpi.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_net.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_nist_kw.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_oid.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_pem.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_pk.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs1_v15.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs1_v21.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs5.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkparse.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkwrite.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_poly1305.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_random.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_rsa.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_shax.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_ssl.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_timing.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_version.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_x509parse.com \
o/$(MODE)/third_party/mbedtls/test/test_suite_x509write.com \
o/$(MODE)/third_party/mbedtls/test/secp384r1_test.com \
o/$(MODE)/third_party/mbedtls/test/everest_test.com
THIRD_PARTY_MBEDTLS_TEST_TESTS = \
$(THIRD_PARTY_MBEDTLS_TEST_COMS:%=%.ok)
THIRD_PARTY_CHIBICC_TEST_BINS = \
$(THIRD_PARTY_CHIBICC_TEST_COMS) \
$(THIRD_PARTY_CHIBICC_TEST_COMS:%=%.dbg)
THIRD_PARTY_MBEDTLS_TEST_CHECKS = \
$(THIRD_PARTY_MBEDTLS_TEST_COMS:%=%.runs) \
$(THIRD_PARTY_MBEDTLS_TEST_HDRS:%=o/$(MODE)/%.ok)
THIRD_PARTY_MBEDTLS_TEST_DIRECTDEPS = \
LIBC_CALLS \
LIBC_DNS \
LIBC_FMT \
LIBC_INTRIN \
LIBC_LOG \
LIBC_MEM \
LIBC_NEXGEN32E \
LIBC_NT_KERNEL32 \
LIBC_RUNTIME \
LIBC_STDIO \
LIBC_STR \
LIBC_SYSV \
LIBC_TIME \
LIBC_TESTLIB \
LIBC_X \
LIBC_ZIPOS \
THIRD_PARTY_COMPILER_RT \
THIRD_PARTY_GDTOA \
THIRD_PARTY_MBEDTLS
THIRD_PARTY_MBEDTLS_TEST_DEPS := \
$(call uniq,$(foreach x,$(THIRD_PARTY_MBEDTLS_TEST_DIRECTDEPS),$($(x))))
o/$(MODE)/third_party/mbedtls/test/test.pkg: \
$(THIRD_PARTY_MBEDTLS_TEST_OBJS) \
$(foreach x,$(THIRD_PARTY_MBEDTLS_TEST_DIRECTDEPS),$($(x)_A).pkg)
o/$(MODE)/third_party/mbedtls/test/lib.o: third_party/mbedtls/test/lib.c
o/$(MODE)/third_party/mbedtls/test/%.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/%.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/%.com.runs: o/$(MODE)/third_party/mbedtls/test/%.com $(VM)
@$(COMPILE) -ACHECK -wtT$@ $(VM) $< $(TESTARGS)
o/$(MODE)/third_party/mbedtls/test/lib.o: private \
OVERRIDE_CFLAGS += \
-fdata-sections \
-ffunction-sections
.PHONY: o/$(MODE)/third_party/mbedtls/test
.PRECIOUS: $(THIRD_PARTY_CHIBICC_TEST_COMS:%=%.dbg)
o/$(MODE)/third_party/mbedtls/test: \
$(THIRD_PARTY_MBEDTLS_TEST_CHECKS)
.PHONY: o/$(MODE)/third_party/mbedtls/test/TESTS
o/$(MODE)/third_party/mbedtls/test/TESTS: \
$(THIRD_PARTY_MBEDTLS_TEST_TESTS)
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.cbc.com: o/$(MODE)/third_party/mbedtls/test/test_suite_aes.cbc.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.cbc.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.cbc.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.cbc.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.cfb.com: o/$(MODE)/third_party/mbedtls/test/test_suite_aes.cfb.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.cfb.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.cfb.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.cfb.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.ecb.com: o/$(MODE)/third_party/mbedtls/test/test_suite_aes.ecb.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.ecb.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.ecb.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.ecb.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.ofb.com: o/$(MODE)/third_party/mbedtls/test/test_suite_aes.ofb.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.ofb.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.ofb.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.ofb.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.rest.com: o/$(MODE)/third_party/mbedtls/test/test_suite_aes.rest.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.rest.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.rest.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.rest.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.xts.com: o/$(MODE)/third_party/mbedtls/test/test_suite_aes.xts.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.xts.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.xts.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_aes.xts.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_asn1parse.com: o/$(MODE)/third_party/mbedtls/test/test_suite_asn1parse.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_asn1parse.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_asn1parse.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_asn1parse.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_asn1write.com: o/$(MODE)/third_party/mbedtls/test/test_suite_asn1write.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_asn1write.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_asn1write.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_asn1write.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_base64.com: o/$(MODE)/third_party/mbedtls/test/test_suite_base64.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_base64.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_base64.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_base64.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_blowfish.com: o/$(MODE)/third_party/mbedtls/test/test_suite_blowfish.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_blowfish.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_blowfish.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_blowfish.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_chacha20.com: o/$(MODE)/third_party/mbedtls/test/test_suite_chacha20.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_chacha20.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_chacha20.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_chacha20.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_chachapoly.com: o/$(MODE)/third_party/mbedtls/test/test_suite_chachapoly.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_chachapoly.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_chachapoly.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_chachapoly.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.aes.com: o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.aes.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.aes.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.aes.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.aes.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.blowfish.com: o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.blowfish.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.blowfish.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.blowfish.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.blowfish.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.ccm.com: o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.ccm.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.ccm.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.ccm.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.ccm.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.chacha20.com: o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.chacha20.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.chacha20.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.chacha20.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.chacha20.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.chachapoly.com: o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.chachapoly.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.chachapoly.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.chachapoly.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.chachapoly.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.des.com: o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.des.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.des.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.des.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.des.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.gcm.com: o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.gcm.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.gcm.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.gcm.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.gcm.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.misc.com: o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.misc.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.misc.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.misc.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.misc.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.nist_kw.com: o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.nist_kw.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.nist_kw.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.nist_kw.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.nist_kw.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.null.com: o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.null.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.null.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.null.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.null.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.padding.com: o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.padding.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.padding.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.padding.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_cipher.padding.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_ctr_drbg.com.runs: private .UNVEIL += rwc:o/tmp
o/$(MODE)/third_party/mbedtls/test/test_suite_ctr_drbg.com: o/$(MODE)/third_party/mbedtls/test/test_suite_ctr_drbg.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_ctr_drbg.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_ctr_drbg.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_ctr_drbg.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_des.com: o/$(MODE)/third_party/mbedtls/test/test_suite_des.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_des.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_des.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_des.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_dhm.com: o/$(MODE)/third_party/mbedtls/test/test_suite_dhm.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_dhm.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_dhm.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_dhm.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dh.optlen.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dhparams.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_ecdh.com: o/$(MODE)/third_party/mbedtls/test/test_suite_ecdh.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_ecdh.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_ecdh.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_ecdh.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_ecdsa.com: o/$(MODE)/third_party/mbedtls/test/test_suite_ecdsa.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_ecdsa.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_ecdsa.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_ecdsa.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_ecp.com: o/$(MODE)/third_party/mbedtls/test/test_suite_ecp.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_ecp.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_ecp.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_ecp.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_entropy.com: o/$(MODE)/third_party/mbedtls/test/test_suite_entropy.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_entropy.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_entropy.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_entropy.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_error.com: o/$(MODE)/third_party/mbedtls/test/test_suite_error.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_error.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_error.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_error.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes128_de.com: o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes128_de.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes128_de.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes128_de.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes128_de.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes128_en.com: o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes128_en.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes128_en.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes128_en.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes128_en.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes192_de.com: o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes192_de.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes192_de.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes192_de.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes192_de.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes192_en.com: o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes192_en.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes192_en.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes192_en.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes192_en.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes256_de.com: o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes256_de.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes256_de.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes256_de.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes256_de.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes256_en.com: o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes256_en.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes256_en.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes256_en.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.aes256_en.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.misc.com: o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.misc.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.misc.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.misc.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_gcm.misc.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_hkdf.com: o/$(MODE)/third_party/mbedtls/test/test_suite_hkdf.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_hkdf.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_hkdf.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_hkdf.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.misc.com.runs: private .UNVEIL += rwc:o/tmp
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.misc.com: o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.misc.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.misc.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.misc.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.misc.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.no_reseed.com: o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.no_reseed.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.no_reseed.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.no_reseed.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.no_reseed.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.nopr.com: o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.nopr.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.nopr.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.nopr.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.nopr.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.pr.com: o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.pr.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.pr.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.pr.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_hmac_drbg.pr.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_md.com: o/$(MODE)/third_party/mbedtls/test/test_suite_md.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_md.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_md.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_md.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/hash_file_1.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/hash_file_2.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/hash_file_3.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/hash_file_4.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/hash_file_5.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_mdx.com: o/$(MODE)/third_party/mbedtls/test/test_suite_mdx.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_mdx.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_mdx.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_mdx.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_memory_buffer_alloc.com: o/$(MODE)/third_party/mbedtls/test/test_suite_memory_buffer_alloc.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_memory_buffer_alloc.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_memory_buffer_alloc.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_memory_buffer_alloc.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_mpi.com.runs: private .UNVEIL += rwc:o/tmp
o/$(MODE)/third_party/mbedtls/test/test_suite_mpi.com: o/$(MODE)/third_party/mbedtls/test/test_suite_mpi.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_mpi.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_mpi.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_mpi.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/hash_file_3.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/hash_file_4.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/mpi_10.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/mpi_too_big.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/mpi_write.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_net.com: o/$(MODE)/third_party/mbedtls/test/test_suite_net.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_net.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_net.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_net.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_nist_kw.com: o/$(MODE)/third_party/mbedtls/test/test_suite_nist_kw.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_nist_kw.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_nist_kw.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_nist_kw.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_oid.com: o/$(MODE)/third_party/mbedtls/test/test_suite_oid.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_oid.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_oid.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_oid.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_pem.com: o/$(MODE)/third_party/mbedtls/test/test_suite_pem.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_pem.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_pem.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_pem.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_pk.com: o/$(MODE)/third_party/mbedtls/test/test_suite_pk.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_pk.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_pk.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_pk.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_256_prv.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_256_pub.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.pubkey.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server2.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs1_v15.com: o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs1_v15.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs1_v15.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs1_v15.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs1_v15.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs1_v21.com: o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs1_v21.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs1_v21.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs1_v21.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs1_v21.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs5.com: o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs5.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs5.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs5.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkcs5.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_pkparse.com: o/$(MODE)/third_party/mbedtls/test/test_suite_pkparse.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_pkparse.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkparse.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkparse.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_224_prv.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_224_pub.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_256_prv.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_256_pub.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_384_prv.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_384_pub.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_521_prv.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_521_pub.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_bp256_prv.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_bp256_pub.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_bp384_prv.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_bp384_pub.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_bp512_prv.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_bp512_pub.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.pk8.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.pk8.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.pk8.pw.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.pk8.pw.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.pk8nopub.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.pk8nopub.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.pk8nopubparam.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.pk8nopubparam.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.pk8param.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.pk8param.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.sec1.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.sec1.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.sec1.pw.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.specdom.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_pub.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_pub.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/format_gen.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_1024_3des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_1024_aes128.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_1024_aes192.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_1024_aes256.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_1024_des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_2048_3des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_2048_aes128.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_2048_aes192.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_2048_aes256.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_2048_des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_2048_public.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_2048_public.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_4096_3des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_4096_aes128.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_4096_aes192.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_4096_aes256.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs1_4096_des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_2048_public.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_2048_public.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_1024_2des.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_1024_2des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_1024_3des.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_1024_3des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_1024_rc4_128.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_1024_rc4_128.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_2048_2des.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_2048_2des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_2048_3des.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_2048_3des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_2048_rc4_128.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_2048_rc4_128.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_4096_2des.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_4096_2des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_4096_3des.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_4096_3des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_4096_rc4_128.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbe_sha1_4096_rc4_128.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_3des.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_3des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha224.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha224.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha256.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha256.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha384.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha384.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha512.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_3des_sha512.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_des.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_des_sha224.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_des_sha224.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_des_sha256.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_des_sha256.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_des_sha384.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_des_sha384.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_des_sha512.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_1024_des_sha512.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_3des.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_3des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha224.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha224.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha256.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha256.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha384.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha384.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha512.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_3des_sha512.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_des.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_des_sha224.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_des_sha224.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_des_sha256.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_des_sha256.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_des_sha384.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_des_sha384.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_des_sha512.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_2048_des_sha512.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_3des.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_3des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha224.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha224.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha256.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha256.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha384.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha384.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha512.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha512.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_des.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_des.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_des_sha224.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_des_sha224.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_des_sha256.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_des_sha256.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_des_sha384.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_des_sha384.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_des_sha512.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa_pkcs8_pbes2_pbkdf2_4096_des_sha512.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_pkwrite.com: o/$(MODE)/third_party/mbedtls/test/test_suite_pkwrite.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_pkwrite.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkwrite.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_pkwrite.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_256_long_prv.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_521_prv.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_521_pub.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_521_short_prv.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_bp512_prv.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_bp512_pub.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_prv.sec1.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/ec_pub.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa4096_prv.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/rsa4096_pub.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.pubkey.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_poly1305.com: o/$(MODE)/third_party/mbedtls/test/test_suite_poly1305.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_poly1305.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_poly1305.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_poly1305.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_random.com: o/$(MODE)/third_party/mbedtls/test/test_suite_random.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_random.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_random.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_random.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_rsa.com: o/$(MODE)/third_party/mbedtls/test/test_suite_rsa.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_rsa.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_rsa.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_rsa.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_shax.com: o/$(MODE)/third_party/mbedtls/test/test_suite_shax.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_shax.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_shax.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_shax.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_ssl.com: o/$(MODE)/third_party/mbedtls/test/test_suite_ssl.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_ssl.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_ssl.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_ssl.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_timing.com: o/$(MODE)/third_party/mbedtls/test/test_suite_timing.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_timing.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_timing.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_timing.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_version.com: o/$(MODE)/third_party/mbedtls/test/test_suite_version.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_version.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_version.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_version.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_x509parse.com: o/$(MODE)/third_party/mbedtls/test/test_suite_x509parse.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_x509parse.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_x509parse.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_x509parse.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/bitstring-in-dn.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/cert_example_multi.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/cert_example_multi_nocn.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/cert_example_wildcard.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/cert_md2.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/cert_md4.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/cert_md5.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/cert_sha1.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/cert_sha224.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/cert_sha256.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/cert_sha384.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/cert_sha512.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/cert_v1_with_ext.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/cli-rsa-sha256-badalg.crt.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-ec-sha1.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-ec-sha224.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-ec-sha256.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-ec-sha384.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-ec-sha512.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-future.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-futureRevocationDate.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-idp.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-idpnc.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-malformed-trailing-spaces.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-rsa-pss-sha1-badsign.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-rsa-pss-sha1.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-rsa-pss-sha224.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-rsa-pss-sha256.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-rsa-pss-sha384.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl-rsa-pss-sha512.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl_cat_ec-rsa.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl_cat_ecfut-rsa.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl_cat_rsa-ec.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl_expired.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl_md2.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl_md4.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl_md5.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl_sha1.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl_sha224.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl_sha256.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl_sha384.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/crl_sha512.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/00.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/00.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/01.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/01.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/02.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/02.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/03.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/03.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/04.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/04.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/05.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/05.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/06.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/06.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/07.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/07.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/08.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/08.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/09.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/09.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/10.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/10.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/11.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/11.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/12.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/12.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/13.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/13.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/14.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/14.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/15.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/15.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/16.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/16.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/17.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/17.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/18.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/18.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/19.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/19.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/20.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/20.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/Readme.txt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c00.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c01.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c02.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c03.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c04.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c05.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c06.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c07.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c08.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c09.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c10.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c11.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c12.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c13.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c14.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c15.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c16.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c17.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c18.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c19.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/c20.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/int.opensslconf.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/long.sh.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir1/.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir2/.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir3/.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir1/test-ca.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir2/test-ca.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir2/test-ca2.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir3/Readme.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir3/test-ca.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir3/test-ca2.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert11.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert12.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert13.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert14.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert21.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert22.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert23.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert31.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert32.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert33.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert34.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert41.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert42.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert43.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert44.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert45.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert51.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert52.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert53.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert54.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert61.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert62.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert63.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert71.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert72.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert73.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert74.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert81.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert82.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert83.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert91.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/dir4/cert92.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/enco-ca-prstr.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/enco-cert-utf8str.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/keyUsage.decipherOnly.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/multiple_san.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/non-ascii-string-in-issuer.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1-ms.req.sha256.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1-v1.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.cert_type.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.crt.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.ext_ku.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.key_usage.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.md4.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.md5.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.sha1.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.sha224.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.sha256.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.sha384.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.sha512.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server10-bs_int3.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server10_int3-bs.pem.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server10_int3_int-ca2.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server10_int3_int-ca2_ca.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server10_int3_spurious_int-ca2.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1_ca.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1_pathlen_int_max-1.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1_pathlen_int_max.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server2-badsign.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server2-v1-chain.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server2-v1.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server2.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server2.crt.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server3.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server4.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5-badsign.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5-expired.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5-fan.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5-future.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5-othername.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5-selfsigned.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5-sha1.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5-sha224.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5-sha384.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5-sha512.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5-ss-expired.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5-ss-forgeca.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5-tricky-ip-san.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5-unsupported_othername.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5.eku-cli.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5.eku-cs_any.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5.eku-srv.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5.eku-srv_cli.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5.req.sha1.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5.req.sha224.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5.req.sha256.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5.req.sha384.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5.req.sha512.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server6-ss-child.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server6.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server7-badsign.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server7-expired.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server7-future.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server7.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server7_all_space.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server7_int-ca-exp.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server7_int-ca.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server7_int-ca_ca2.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server7_pem_space.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server7_spurious_int-ca.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server7_trailing_space.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server8.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server8_int-ca2.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9-bad-mgfhash.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9-bad-saltlen.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9-badsign.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9-defaults.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9-sha224.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9-sha256.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9-sha384.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9-sha512.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9-with-ca.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9.req.sha1.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9.req.sha224.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9.req.sha256.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9.req.sha384.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server9.req.sha512.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca-alt-good.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca-any_policy.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca-any_policy_ec.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca-any_policy_with_qualifier.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca-any_policy_with_qualifier_ec.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca-good-alt.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca-multi_policy.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca-multi_policy_ec.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca-unsupported_policy.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca-unsupported_policy_ec.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca-v1.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca.crt.der.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca2-expired.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca2.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca2.ku-crl.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca2.ku-crt.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca2.ku-crt_crl.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca2.ku-ds.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca2_cat-future-invalid.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca2_cat-future-present.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca2_cat-past-invalid.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca2_cat-past-present.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca2_cat-present-future.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca2_cat-present-past.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca_cat12.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca_cat21.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca_printable.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca_uppercase.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca_utf8.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-int-ca.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-int-ca2.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-int-ca3.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_x509write.com: o/$(MODE)/third_party/mbedtls/test/test_suite_x509write.com.dbg
o/$(MODE)/third_party/mbedtls/test/test_suite_x509write.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/lib.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_x509write.o \
o/$(MODE)/third_party/mbedtls/test/test_suite_x509write.datax.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.ca.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.ca_noauthid.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.cert_type.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.cert_type_noauthid.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.key_usage.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.key_usage_noauthid.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.noauthid.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.cert_type.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.cert_type_empty.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.key_usage.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.key_usage_empty.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.ku-ct.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.md4.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.md5.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.sha1.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.sha224.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.sha256.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.sha384.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.req.sha512.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server1.v1.crt.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/server5.req.ku.sha1.zip.o \
o/$(MODE)/third_party/mbedtls/test/data/test-ca.key.zip.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/everest_test.com: o/$(MODE)/third_party/mbedtls/test/everest_test.com.dbg
o/$(MODE)/third_party/mbedtls/test/everest_test.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/everest_test.o \
o/$(MODE)/third_party/mbedtls/test/everest_unravaged.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(LIBC_TESTMAIN) \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/secp384r1_test.com: o/$(MODE)/third_party/mbedtls/test/secp384r1_test.com.dbg
o/$(MODE)/third_party/mbedtls/test/secp384r1_test.com.dbg: \
$(THIRD_PARTY_MBEDTLS_TEST_DEPS) \
o/$(MODE)/third_party/mbedtls/test/secp384r1_test.o \
o/$(MODE)/third_party/mbedtls/test/test.pkg \
$(LIBC_TESTMAIN) \
$(CRT) \
$(APE_NO_MODIFY_SELF)
@$(APELINK)
o/$(MODE)/third_party/mbedtls/test/test_suite_asn1parse.com.runs: private QUOTA = -M512m
# these need to be explictly defined because landlock make won't sandbox
# prerequisites with a trailing slash.
o/$(MODE)/third_party/mbedtls/test/data/.zip.o: \
third_party/mbedtls/test/data
o/$(MODE)/third_party/mbedtls/test/data/dir-maxpath/.zip.o: \
third_party/mbedtls/test/data/dir-maxpath
o/$(MODE)/third_party/mbedtls/test/data/dir1/.zip.o: \
third_party/mbedtls/test/data/dir1
o/$(MODE)/third_party/mbedtls/test/data/dir2/.zip.o: \
third_party/mbedtls/test/data/dir2
o/$(MODE)/third_party/mbedtls/test/data/dir3/.zip.o: \
third_party/mbedtls/test/data/dir3
o/$(MODE)/third_party/mbedtls/test/data/dir4/.zip.o: \
third_party/mbedtls/test/data/dir4
| 80,045 | 1,376 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_entropy.datax | Entropy init-free-free
0:int:0
Entropy init-free-init-free
0:int:1
Create NV seed_file
8
Entropy write/update seed file: good
1:char*:"o/tmp/mbedtls_test_suite_entropy_seed":int:0
Entropy write/update seed file: nonexistent
1:char*:"o/tmp/no_such_dir/file":exp:0
Entropy no sources
2
Entropy too many sources
3
Entropy output length: 0
4:int:0:int:0
Entropy output length: 1
4:int:1:int:0
Entropy output length: 2
4:int:2:int:0
Entropy output length: 31
4:int:31:int:0
Entropy output length: 65 > BLOCK_SIZE
4:int:65:exp:1
Entropy failing source
5:char*:"/zip/third_party/mbedtls/test/data/entropy_seed"
Entropy threshold: 16=2*8
6:int:16:int:2:int:8
Entropy threshold: 32=1*32
6:int:32:int:1:int:32
Entropy threshold: 0* never reaches the threshold
6:int:16:int:0:exp:1
Entropy threshold: 1024 never reached
6:int:1024:int:1:exp:1
Entropy calls: no strong
7:exp:2:exp:2:int:1:exp:3:exp:4
Entropy calls: 1 strong, 1*BLOCK_SIZE
7:exp:5:exp:2:int:1:exp:3:int:1
Entropy calls: 1 strong, 2*(BLOCK_SIZE/2)
7:exp:5:exp:2:int:1:exp:6:int:2
Entropy calls: 1 strong, BLOCK_SIZE*1
7:exp:5:exp:2:int:1:int:1:exp:3
Entropy calls: 1 strong, 2*BLOCK_SIZE to reach threshold
7:exp:5:exp:2:exp:7:exp:3:int:2
Entropy calls: 2 strong, BLOCK_SIZE/2 each
7:exp:5:exp:2:exp:6:exp:6:int:2
Check NV seed standard IO
9
Check NV seed manually #1
10:hex:"00112233445566778899AABBCCDDEEFF00112233445566778899AABBCCDDEEFF00112233445566778899AABBCCDDEEFF00112233445566778899AABBCCDDEEFF"
Check NV seed manually #2
10:hex:"00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"
Check NV seed manually #3
10:hex:"ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"
Entropy self test
depends_on:0
11:int:0
Entropy self test (MBEDTLS_TEST_NULL_ENTROPY)
depends_on:1
11:int:1
| 1,924 | 90 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_base64.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_base64.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_base64.function
* Test suite data : suites/test_suite_base64.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_BASE64_C)
#include "third_party/mbedtls/base64.h"
void test_mbedtls_base64_encode( char * src_string, char * dst_string,
int dst_buf_size, int result )
{
unsigned char src_str[1000];
unsigned char dst_str[1000];
size_t len, src_len;
memset(src_str, 0x00, 1000);
memset(dst_str, 0x00, 1000);
strncpy( (char *) src_str, src_string, sizeof(src_str) - 1 );
src_len = strlen( (char *) src_str );
TEST_CF_SECRET( src_str, sizeof( src_str ) );
TEST_ASSERT( mbedtls_base64_encode( dst_str, dst_buf_size, &len, src_str, src_len) == result );
TEST_CF_PUBLIC( src_str, sizeof( src_str ) );
/* dest_str will have had tainted data copied to it, prevent the TEST_ASSERT below from triggering
CF failures by unmarking it. */
TEST_CF_PUBLIC( dst_str, len );
if( result == 0 )
{
TEST_ASSERT( strcmp( (char *) dst_str, dst_string ) == 0 );
}
exit:
;
}
void test_mbedtls_base64_encode_wrapper( void ** params )
{
test_mbedtls_base64_encode( (char *) params[0], (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ) );
}
void test_mbedtls_base64_decode( char * src_string, char * dst_string, int result )
{
unsigned char src_str[1000];
unsigned char dst_str[1000];
size_t len;
int res;
memset(src_str, 0x00, 1000);
memset(dst_str, 0x00, 1000);
strncpy( (char *) src_str, src_string, sizeof(src_str) - 1 );
res = mbedtls_base64_decode( dst_str, sizeof( dst_str ), &len, src_str, strlen( (char *) src_str ) );
TEST_ASSERT( res == result );
if( result == 0 )
{
TEST_ASSERT( strcmp( (char *) dst_str, dst_string ) == 0 );
}
exit:
;
}
void test_mbedtls_base64_decode_wrapper( void ** params )
{
test_mbedtls_base64_decode( (char *) params[0], (char *) params[1], *( (int *) params[2] ) );
}
void test_base64_encode_hex( data_t * src, char * dst, int dst_buf_size,
int result )
{
unsigned char *res = NULL;
size_t len;
res = mbedtls_test_zero_alloc( dst_buf_size );
TEST_CF_SECRET( src->x, src->len );
TEST_ASSERT( mbedtls_base64_encode( res, dst_buf_size, &len, src->x, src->len ) == result );
TEST_CF_PUBLIC( src->x, src->len );
/* res will have had tainted data copied to it, prevent the TEST_ASSERT below from triggering
CF failures by unmarking it. */
TEST_CF_PUBLIC( res, len );
if( result == 0 )
{
TEST_ASSERT( len == strlen( dst ) );
TEST_ASSERT( timingsafe_bcmp( dst, res, len ) == 0 );
}
exit:
mbedtls_free( res );
}
void test_base64_encode_hex_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_base64_encode_hex( &data0, (char *) params[2], *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_base64_decode_hex( char * src, data_t * dst, int dst_buf_size,
int result )
{
unsigned char *res = NULL;
size_t len;
res = mbedtls_test_zero_alloc( dst_buf_size );
TEST_ASSERT( mbedtls_base64_decode( res, dst_buf_size, &len, (unsigned char *) src,
strlen( src ) ) == result );
if( result == 0 )
{
TEST_ASSERT( len == dst->len );
TEST_ASSERT( timingsafe_bcmp( dst->x, res, len ) == 0 );
}
exit:
mbedtls_free( res );
}
void test_base64_decode_hex_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_base64_decode_hex( (char *) params[0], &data1, *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_base64_decode_hex_src( data_t * src, char * dst_ref, int result )
{
unsigned char dst[1000] = { 0 };
size_t len;
TEST_ASSERT( mbedtls_base64_decode( dst, sizeof( dst ), &len, src->x, src->len ) == result );
if( result == 0 )
{
TEST_ASSERT( len == strlen( dst_ref ) );
TEST_ASSERT( timingsafe_bcmp( dst, dst_ref, len ) == 0 );
}
exit:
;;
}
void test_base64_decode_hex_src_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_base64_decode_hex_src( &data0, (char *) params[2], *( (int *) params[3] ) );
}
#if defined(MBEDTLS_SELF_TEST)
void test_base64_selftest( )
{
TEST_ASSERT( mbedtls_base64_self_test( 1 ) == 0 );
exit:
;
}
void test_base64_selftest_wrapper( void ** params )
{
(void)params;
test_base64_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_BASE64_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_BASE64_C)
case 0:
{
*out_value = MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL;
}
break;
case 1:
{
*out_value = MBEDTLS_ERR_BASE64_INVALID_CHARACTER;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_BASE64_C)
case 0:
{
#if defined(MBEDTLS_SELF_TEST)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_BASE64_C)
test_mbedtls_base64_encode_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_BASE64_C)
test_mbedtls_base64_decode_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_BASE64_C)
test_base64_encode_hex_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_BASE64_C)
test_base64_decode_hex_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_BASE64_C)
test_base64_decode_hex_src_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_BASE64_C) && defined(MBEDTLS_SELF_TEST)
test_base64_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_base64.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 13,054 | 472 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_ctr_drbg.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_ctr_drbg.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_ctr_drbg.function
* Test suite data : suites/test_suite_ctr_drbg.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_CTR_DRBG_C)
#include "third_party/mbedtls/entropy.h"
#include "third_party/mbedtls/ctr_drbg.h"
/* Modes for ctr_drbg_validate */
enum reseed_mode
{
RESEED_NEVER, /* never reseed */
RESEED_FIRST, /* instantiate, reseed, generate, generate */
RESEED_SECOND, /* instantiate, generate, reseed, generate */
RESEED_ALWAYS /* prediction resistance, no explicit reseed */
};
static size_t test_offset_idx = 0;
static size_t test_max_idx = 0;
static int mbedtls_test_entropy_func( void *data, unsigned char *buf, size_t len )
{
const unsigned char *p = (unsigned char *) data;
if( test_offset_idx + len > test_max_idx )
return( MBEDTLS_ERR_ENTROPY_SOURCE_FAILED );
memcpy( buf, p + test_offset_idx, len );
test_offset_idx += len;
return( 0 );
}
static void ctr_drbg_validate_internal( int reseed_mode, data_t * nonce,
int entropy_len_arg, data_t * entropy,
data_t * reseed,
data_t * add1, data_t * add2,
data_t * result )
{
mbedtls_ctr_drbg_context ctx;
unsigned char buf[64];
size_t entropy_chunk_len = (size_t) entropy_len_arg;
TEST_ASSERT( entropy_chunk_len <= sizeof( buf ) );
test_offset_idx = 0;
mbedtls_ctr_drbg_init( &ctx );
test_max_idx = entropy->len;
/* CTR_DRBG_Instantiate(entropy[:entropy->len], nonce, perso, <ignored>)
* where nonce||perso = nonce[nonce->len] */
mbedtls_ctr_drbg_set_entropy_len( &ctx, entropy_chunk_len );
mbedtls_ctr_drbg_set_nonce_len( &ctx, 0 );
TEST_ASSERT( mbedtls_ctr_drbg_seed(
&ctx,
mbedtls_test_entropy_func, entropy->x,
nonce->x, nonce->len ) == 0 );
if( reseed_mode == RESEED_ALWAYS )
mbedtls_ctr_drbg_set_prediction_resistance(
&ctx,
MBEDTLS_CTR_DRBG_PR_ON );
if( reseed_mode == RESEED_FIRST )
{
/* CTR_DRBG_Reseed(entropy[idx:idx+entropy->len],
* reseed[:reseed->len]) */
TEST_ASSERT( mbedtls_ctr_drbg_reseed(
&ctx,
reseed->x, reseed->len ) == 0 );
}
/* CTR_DRBG_Generate(result->len * 8 bits, add1[:add1->len]) -> buf */
/* Then reseed if prediction resistance is enabled. */
TEST_ASSERT( mbedtls_ctr_drbg_random_with_add(
&ctx,
buf, result->len,
add1->x, add1->len ) == 0 );
if( reseed_mode == RESEED_SECOND )
{
/* CTR_DRBG_Reseed(entropy[idx:idx+entropy->len],
* reseed[:reseed->len]) */
TEST_ASSERT( mbedtls_ctr_drbg_reseed(
&ctx,
reseed->x, reseed->len ) == 0 );
}
/* CTR_DRBG_Generate(result->len * 8 bits, add2->x[:add2->len]) -> buf */
/* Then reseed if prediction resistance is enabled. */
TEST_ASSERT( mbedtls_ctr_drbg_random_with_add(
&ctx,
buf, result->len,
add2->x, add2->len ) == 0 );
TEST_ASSERT( timingsafe_bcmp( buf, result->x, result->len ) == 0 );
exit:
mbedtls_ctr_drbg_free( &ctx );
}
void test_ctr_drbg_special_behaviours( )
{
mbedtls_ctr_drbg_context ctx;
unsigned char output[512];
unsigned char additional[512];
mbedtls_ctr_drbg_init( &ctx );
memset( output, 0, sizeof( output ) );
memset( additional, 0, sizeof( additional ) );
TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx,
output, MBEDTLS_CTR_DRBG_MAX_REQUEST + 1,
additional, 16 ) ==
MBEDTLS_ERR_CTR_DRBG_REQUEST_TOO_BIG );
TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx,
output, 16,
additional, MBEDTLS_CTR_DRBG_MAX_INPUT + 1 ) ==
MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
TEST_ASSERT( mbedtls_ctr_drbg_reseed( &ctx, additional,
MBEDTLS_CTR_DRBG_MAX_SEED_INPUT + 1 ) ==
MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
mbedtls_ctr_drbg_set_entropy_len( &ctx, ~0 );
TEST_ASSERT( mbedtls_ctr_drbg_reseed( &ctx, additional,
MBEDTLS_CTR_DRBG_MAX_SEED_INPUT ) ==
MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
exit:
mbedtls_ctr_drbg_free( &ctx );
}
void test_ctr_drbg_special_behaviours_wrapper( void ** params )
{
(void)params;
test_ctr_drbg_special_behaviours( );
}
void test_ctr_drbg_validate_no_reseed( data_t * add_init, data_t * entropy,
data_t * add1, data_t * add2,
data_t * result_string )
{
data_t empty = { 0, 0 };
ctr_drbg_validate_internal( RESEED_NEVER, add_init,
entropy->len, entropy,
&empty, add1, add2,
result_string );
goto exit; // goto is needed to avoid warning ( no test assertions in func)
exit:
;
}
void test_ctr_drbg_validate_no_reseed_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_ctr_drbg_validate_no_reseed( &data0, &data2, &data4, &data6, &data8 );
}
void test_ctr_drbg_validate_pr( data_t * add_init, data_t * entropy,
data_t * add1, data_t * add2,
data_t * result_string )
{
data_t empty = { 0, 0 };
ctr_drbg_validate_internal( RESEED_ALWAYS, add_init,
entropy->len / 3, entropy,
&empty, add1, add2,
result_string );
goto exit; // goto is needed to avoid warning ( no test assertions in func)
exit:
;
}
void test_ctr_drbg_validate_pr_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_ctr_drbg_validate_pr( &data0, &data2, &data4, &data6, &data8 );
}
void test_ctr_drbg_validate_reseed_between( data_t * add_init, data_t * entropy,
data_t * add1, data_t * add_reseed,
data_t * add2, data_t * result_string )
{
ctr_drbg_validate_internal( RESEED_SECOND, add_init,
entropy->len / 2, entropy,
add_reseed, add1, add2,
result_string );
goto exit; // goto is needed to avoid warning ( no test assertions in func)
exit:
;
}
void test_ctr_drbg_validate_reseed_between_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
test_ctr_drbg_validate_reseed_between( &data0, &data2, &data4, &data6, &data8, &data10 );
}
void test_ctr_drbg_validate_reseed_first( data_t * add_init, data_t * entropy,
data_t * add1, data_t * add_reseed,
data_t * add2, data_t * result_string )
{
ctr_drbg_validate_internal( RESEED_FIRST, add_init,
entropy->len / 2, entropy,
add_reseed, add1, add2,
result_string );
goto exit; // goto is needed to avoid warning ( no test assertions in func)
exit:
;
}
void test_ctr_drbg_validate_reseed_first_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
test_ctr_drbg_validate_reseed_first( &data0, &data2, &data4, &data6, &data8, &data10 );
}
void test_ctr_drbg_entropy_strength( int expected_bit_strength )
{
unsigned char entropy[/*initial entropy*/ MBEDTLS_CTR_DRBG_ENTROPY_LEN +
/*nonce*/ MBEDTLS_CTR_DRBG_ENTROPY_NONCE_LEN +
/*reseed*/ MBEDTLS_CTR_DRBG_ENTROPY_LEN];
mbedtls_ctr_drbg_context ctx;
size_t last_idx;
size_t byte_strength = expected_bit_strength / 8;
mbedtls_ctr_drbg_init( &ctx );
test_offset_idx = 0;
test_max_idx = sizeof( entropy );
memset( entropy, 0, sizeof( entropy ) );
/* The initial seeding must grab at least byte_strength bytes of entropy
* for the entropy input and byte_strength/2 bytes for a nonce. */
TEST_ASSERT( mbedtls_ctr_drbg_seed( &ctx,
mbedtls_test_entropy_func, entropy,
NULL, 0 ) == 0 );
TEST_ASSERT( test_offset_idx >= ( byte_strength * 3 + 1 ) / 2 );
last_idx = test_offset_idx;
/* A reseed must grab at least byte_strength bytes of entropy. */
TEST_ASSERT( mbedtls_ctr_drbg_reseed( &ctx, NULL, 0 ) == 0 );
TEST_ASSERT( test_offset_idx - last_idx >= byte_strength );
exit:
mbedtls_ctr_drbg_free( &ctx );
}
void test_ctr_drbg_entropy_strength_wrapper( void ** params )
{
test_ctr_drbg_entropy_strength( *( (int *) params[0] ) );
}
void test_ctr_drbg_entropy_usage( int entropy_nonce_len )
{
unsigned char out[16];
unsigned char add[16];
unsigned char entropy[1024];
mbedtls_ctr_drbg_context ctx;
size_t i, reps = 10;
size_t expected_idx = 0;
mbedtls_ctr_drbg_init( &ctx );
test_offset_idx = 0;
test_max_idx = sizeof( entropy );
memset( entropy, 0, sizeof( entropy ) );
memset( out, 0, sizeof( out ) );
memset( add, 0, sizeof( add ) );
if( entropy_nonce_len >= 0 )
TEST_ASSERT( mbedtls_ctr_drbg_set_nonce_len( &ctx, entropy_nonce_len ) == 0 );
/* Set reseed interval before seed */
mbedtls_ctr_drbg_set_reseed_interval( &ctx, 2 * reps );
/* Init must use entropy */
TEST_ASSERT( mbedtls_ctr_drbg_seed( &ctx, mbedtls_test_entropy_func, entropy, NULL, 0 ) == 0 );
expected_idx += MBEDTLS_CTR_DRBG_ENTROPY_LEN;
if( entropy_nonce_len >= 0 )
expected_idx += entropy_nonce_len;
else
expected_idx += MBEDTLS_CTR_DRBG_ENTROPY_NONCE_LEN;
TEST_EQUAL( test_offset_idx, expected_idx );
/* By default, PR is off, and reseed interval was set to
* 2 * reps so the next few calls should not use entropy */
for( i = 0; i < reps; i++ )
{
TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) - 4 ) == 0 );
TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, out, sizeof( out ) - 4,
add, sizeof( add ) ) == 0 );
}
TEST_EQUAL( test_offset_idx, expected_idx );
/* While at it, make sure we didn't write past the requested length */
TEST_ASSERT( out[sizeof( out ) - 4] == 0 );
TEST_ASSERT( out[sizeof( out ) - 3] == 0 );
TEST_ASSERT( out[sizeof( out ) - 2] == 0 );
TEST_ASSERT( out[sizeof( out ) - 1] == 0 );
/* There have been 2 * reps calls to random. The next call should reseed */
TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_idx += MBEDTLS_CTR_DRBG_ENTROPY_LEN;
TEST_EQUAL( test_offset_idx, expected_idx );
/* Set reseed interval after seed */
mbedtls_ctr_drbg_set_reseed_interval( &ctx, 4 * reps + 1 );
/* The next few calls should not reseed */
for( i = 0; i < (2 * reps); i++ )
{
TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, out, sizeof( out ) ,
add, sizeof( add ) ) == 0 );
}
TEST_EQUAL( test_offset_idx, expected_idx );
/* Call update with too much data (sizeof entropy > MAX(_SEED)_INPUT).
* Make sure it's detected as an error and doesn't cause memory
* corruption. */
TEST_ASSERT( mbedtls_ctr_drbg_update_ret(
&ctx, entropy, sizeof( entropy ) ) != 0 );
/* Now enable PR, so the next few calls should all reseed */
mbedtls_ctr_drbg_set_prediction_resistance( &ctx, MBEDTLS_CTR_DRBG_PR_ON );
TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_idx += MBEDTLS_CTR_DRBG_ENTROPY_LEN;
TEST_EQUAL( test_offset_idx, expected_idx );
/* Finally, check setting entropy_len */
mbedtls_ctr_drbg_set_entropy_len( &ctx, 42 );
TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_idx += 42;
TEST_EQUAL( test_offset_idx, expected_idx );
mbedtls_ctr_drbg_set_entropy_len( &ctx, 13 );
TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_idx += 13;
TEST_EQUAL( test_offset_idx, expected_idx );
exit:
mbedtls_ctr_drbg_free( &ctx );
}
void test_ctr_drbg_entropy_usage_wrapper( void ** params )
{
test_ctr_drbg_entropy_usage( *( (int *) params[0] ) );
}
#if defined(MBEDTLS_FS_IO)
void test_ctr_drbg_seed_file( char * path, int ret )
{
mbedtls_ctr_drbg_context ctx;
mbedtls_ctr_drbg_init( &ctx );
TEST_ASSERT( mbedtls_ctr_drbg_seed( &ctx, mbedtls_test_rnd_std_rand,
NULL, NULL, 0 ) == 0 );
TEST_ASSERT( mbedtls_ctr_drbg_write_seed_file( &ctx, path ) == ret );
TEST_ASSERT( mbedtls_ctr_drbg_update_seed_file( &ctx, path ) == ret );
exit:
mbedtls_ctr_drbg_free( &ctx );
}
void test_ctr_drbg_seed_file_wrapper( void ** params )
{
test_ctr_drbg_seed_file( (char *) params[0], *( (int *) params[1] ) );
}
#endif /* MBEDTLS_FS_IO */
#if defined(MBEDTLS_SELF_TEST)
void test_ctr_drbg_selftest( )
{
TEST_ASSERT( mbedtls_ctr_drbg_self_test( 1 ) == 0 );
exit:
;
}
void test_ctr_drbg_selftest_wrapper( void ** params )
{
(void)params;
test_ctr_drbg_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_CTR_DRBG_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_CTR_DRBG_C)
case 0:
{
*out_value = -1;
}
break;
case 1:
{
*out_value = MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_CTR_DRBG_C)
case 0:
{
#if !defined(MBEDTLS_CTR_DRBG_USE_128_BIT_KEY)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_CTR_DRBG_USE_128_BIT_KEY)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_CTR_DRBG_C)
test_ctr_drbg_special_behaviours_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_CTR_DRBG_C)
test_ctr_drbg_validate_no_reseed_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_CTR_DRBG_C)
test_ctr_drbg_validate_pr_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_CTR_DRBG_C)
test_ctr_drbg_validate_reseed_between_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_CTR_DRBG_C)
test_ctr_drbg_validate_reseed_first_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_CTR_DRBG_C)
test_ctr_drbg_entropy_strength_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_CTR_DRBG_C)
test_ctr_drbg_entropy_usage_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_CTR_DRBG_C) && defined(MBEDTLS_FS_IO)
test_ctr_drbg_seed_file_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_CTR_DRBG_C) && defined(MBEDTLS_SELF_TEST)
test_ctr_drbg_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_ctr_drbg.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 24,114 | 740 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_cipher.nist_kw.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_cipher.nist_kw.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_cipher.function
* Test suite data : suites/test_suite_cipher.nist_kw.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_CIPHER_C)
#include "third_party/mbedtls/cipher.h"
#if defined(MBEDTLS_AES_C)
#include "third_party/mbedtls/aes.h"
#endif
#if defined(MBEDTLS_GCM_C)
#include "third_party/mbedtls/gcm.h"
#endif
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
#define MBEDTLS_CIPHER_AUTH_CRYPT
#endif
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
/* Helper for resetting key/direction
*
* The documentation doesn't explicitly say whether calling
* mbedtls_cipher_setkey() twice is allowed or not. This currently works with
* the default software implementation, but only by accident. It isn't
* guaranteed to work with new ciphers or with alternative implementations of
* individual ciphers, and it doesn't work with the PSA wrappers. So don't do
* it, and instead start with a fresh context.
*/
static int cipher_reset_key( mbedtls_cipher_context_t *ctx, int cipher_id,
int use_psa, size_t tag_len, const data_t *key, int direction )
{
mbedtls_cipher_free( ctx );
mbedtls_cipher_init( ctx );
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
(void) tag_len;
#else
if( use_psa == 1 )
{
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( ctx,
mbedtls_cipher_info_from_type( cipher_id ),
tag_len ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
TEST_ASSERT( 0 == mbedtls_cipher_setup( ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
}
TEST_ASSERT( 0 == mbedtls_cipher_setkey( ctx, key->x, 8 * key->len,
direction ) );
return( 1 );
exit:
return( 0 );
}
/*
* Check if a buffer is all-0 bytes:
* return 1 if it is,
* 0 if it isn't.
*/
int buffer_is_all_zero( const uint8_t *buf, size_t size )
{
for( size_t i = 0; i < size; i++ )
if( buf[i] != 0 )
return 0;
return 1;
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_mbedtls_cipher_list( )
{
const int *cipher_type;
for( cipher_type = mbedtls_cipher_list(); *cipher_type != 0; cipher_type++ )
TEST_ASSERT( mbedtls_cipher_info_from_type( *cipher_type ) != NULL );
exit:
;
}
void test_mbedtls_cipher_list_wrapper( void ** params )
{
(void)params;
test_mbedtls_cipher_list( );
}
void test_cipher_invalid_param_unconditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_cipher_context_t invalid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
mbedtls_cipher_init( &valid_ctx );
mbedtls_cipher_setup( &valid_ctx, valid_info );
mbedtls_cipher_init( &invalid_ctx );
/* mbedtls_cipher_setup() */
TEST_ASSERT( mbedtls_cipher_setup( &valid_ctx, NULL ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_get_block_size() */
TEST_ASSERT( mbedtls_cipher_get_block_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_cipher_mode() */
TEST_ASSERT( mbedtls_cipher_get_cipher_mode( &invalid_ctx ) ==
MBEDTLS_MODE_NONE );
/* mbedtls_cipher_get_iv_size() */
TEST_ASSERT( mbedtls_cipher_get_iv_size( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_type() */
TEST_ASSERT(
mbedtls_cipher_get_type( &invalid_ctx ) ==
MBEDTLS_CIPHER_NONE);
/* mbedtls_cipher_get_name() */
TEST_ASSERT( mbedtls_cipher_get_name( &invalid_ctx ) == 0 );
/* mbedtls_cipher_get_key_bitlen() */
TEST_ASSERT( mbedtls_cipher_get_key_bitlen( &invalid_ctx ) ==
MBEDTLS_KEY_LENGTH_NONE );
/* mbedtls_cipher_get_operation() */
TEST_ASSERT( mbedtls_cipher_get_operation( &invalid_ctx ) ==
MBEDTLS_OPERATION_NONE );
/* mbedtls_cipher_setkey() */
TEST_ASSERT(
mbedtls_cipher_setkey( &invalid_ctx,
valid_buffer,
valid_bitlen,
valid_operation ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_set_iv() */
TEST_ASSERT(
mbedtls_cipher_set_iv( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_reset() */
TEST_ASSERT( mbedtls_cipher_reset( &invalid_ctx ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_ASSERT(
mbedtls_cipher_update_ad( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_ASSERT( mbedtls_cipher_set_padding_mode( &invalid_ctx, valid_mode ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif
/* mbedtls_cipher_update() */
TEST_ASSERT(
mbedtls_cipher_update( &invalid_ctx,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_finish() */
TEST_ASSERT(
mbedtls_cipher_finish( &invalid_ctx,
valid_buffer,
&size_t_var ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_ASSERT(
mbedtls_cipher_write_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
/* mbedtls_cipher_check_tag() */
TEST_ASSERT(
mbedtls_cipher_check_tag( &invalid_ctx,
valid_buffer,
valid_size ) ==
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
exit:
mbedtls_cipher_free( &invalid_ctx );
mbedtls_cipher_free( &valid_ctx );
}
void test_cipher_invalid_param_unconditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_unconditional( );
}
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_cipher_invalid_param_conditional( )
{
mbedtls_cipher_context_t valid_ctx;
mbedtls_operation_t valid_operation = MBEDTLS_ENCRYPT;
mbedtls_operation_t invalid_operation = 100;
mbedtls_cipher_padding_t valid_mode = MBEDTLS_PADDING_ZEROS;
unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 };
int valid_size = sizeof(valid_buffer);
int valid_bitlen = valid_size * 8;
const mbedtls_cipher_info_t *valid_info = mbedtls_cipher_info_from_type(
*( mbedtls_cipher_list() ) );
size_t size_t_var;
(void)valid_mode; /* In some configurations this is unused */
/* mbedtls_cipher_init() */
TEST_VALID_PARAM( mbedtls_cipher_init( &valid_ctx ) );
TEST_INVALID_PARAM( mbedtls_cipher_init( NULL ) );
/* mbedtls_cipher_setup() */
TEST_VALID_PARAM( mbedtls_cipher_setup( &valid_ctx, valid_info ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setup( NULL, valid_info ) );
/* mbedtls_cipher_get_block_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_block_size( NULL ) );
/* mbedtls_cipher_get_cipher_mode() */
TEST_INVALID_PARAM_RET(
MBEDTLS_MODE_NONE,
mbedtls_cipher_get_cipher_mode( NULL ) );
/* mbedtls_cipher_get_iv_size() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_iv_size( NULL ) );
/* mbedtls_cipher_get_type() */
TEST_INVALID_PARAM_RET(
MBEDTLS_CIPHER_NONE,
mbedtls_cipher_get_type( NULL ) );
/* mbedtls_cipher_get_name() */
TEST_INVALID_PARAM_RET( 0, mbedtls_cipher_get_name( NULL ) );
/* mbedtls_cipher_get_key_bitlen() */
TEST_INVALID_PARAM_RET(
MBEDTLS_KEY_LENGTH_NONE,
mbedtls_cipher_get_key_bitlen( NULL ) );
/* mbedtls_cipher_get_operation() */
TEST_INVALID_PARAM_RET(
MBEDTLS_OPERATION_NONE,
mbedtls_cipher_get_operation( NULL ) );
/* mbedtls_cipher_setkey() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( NULL,
valid_buffer,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
NULL,
valid_bitlen,
valid_operation ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_setkey( &valid_ctx,
valid_buffer,
valid_bitlen,
invalid_operation ) );
/* mbedtls_cipher_set_iv() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_iv( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_reset() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_reset( NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_update_ad() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update_ad( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
/* mbedtls_cipher_set_padding_mode() */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_set_padding_mode( NULL, valid_mode ) );
#endif
/* mbedtls_cipher_update() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( NULL,
valid_buffer,
valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
NULL, valid_size,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_update( &valid_ctx,
valid_buffer, valid_size,
valid_buffer,
NULL ) );
/* mbedtls_cipher_finish() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( NULL,
valid_buffer,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
NULL,
&size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_finish( &valid_ctx,
valid_buffer,
NULL ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
/* mbedtls_cipher_write_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_write_tag( &valid_ctx,
NULL,
valid_size ) );
/* mbedtls_cipher_check_tag() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( NULL,
valid_buffer,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_check_tag( &valid_ctx,
NULL,
valid_size ) );
#endif /* defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C) */
/* mbedtls_cipher_crypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_crypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL ) );
#if defined(MBEDTLS_CIPHER_MODE_AEAD)
/* mbedtls_cipher_auth_encrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
/* mbedtls_cipher_auth_decrypt() */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, &size_t_var,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, NULL,
valid_buffer, valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, &size_t_var,
NULL, valid_size ) );
#endif /* defined(MBEDTLS_CIPHER_MODE_AEAD) */
#if defined(MBEDTLS_CIPHER_MODE_AEAD) || defined(MBEDTLS_NIST_KW_C)
/* mbedtls_cipher_auth_encrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_encrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
/* mbedtls_cipher_auth_decrypt_ext */
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( NULL,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size,
valid_buffer, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
NULL, valid_size, &size_t_var,
valid_size ) );
TEST_INVALID_PARAM_RET(
MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
mbedtls_cipher_auth_decrypt_ext( &valid_ctx,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size,
valid_buffer, valid_size, NULL,
valid_size ) );
#endif /* MBEDTLS_CIPHER_MODE_AEAD || MBEDTLS_NIST_KW_C */
/* mbedtls_cipher_free() */
TEST_VALID_PARAM( mbedtls_cipher_free( NULL ) );
exit:
TEST_VALID_PARAM( mbedtls_cipher_free( &valid_ctx ) );
}
void test_cipher_invalid_param_conditional_wrapper( void ** params )
{
(void)params;
test_cipher_invalid_param_conditional( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
#if defined(MBEDTLS_AES_C)
void test_cipher_special_behaviours( )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char input[32];
unsigned char output[32];
#if defined (MBEDTLS_CIPHER_MODE_CBC)
unsigned char iv[32];
#endif
size_t olen = 0;
mbedtls_cipher_init( &ctx );
memset( input, 0, sizeof( input ) );
memset( output, 0, sizeof( output ) );
#if defined(MBEDTLS_CIPHER_MODE_CBC)
memset( iv, 0, sizeof( iv ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_CBC );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* IV too big */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, MBEDTLS_MAX_IV_LENGTH + 1 )
== MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
/* IV too small */
TEST_ASSERT( mbedtls_cipher_set_iv( &ctx, iv, 0 )
== MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_cipher_free( &ctx );
mbedtls_cipher_init( &ctx );
#endif /* MBEDTLS_CIPHER_MODE_CBC */
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_ECB );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
/* Update ECB with partial block */
TEST_ASSERT( mbedtls_cipher_update( &ctx, input, 1, output, &olen )
== MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED );
exit:
mbedtls_cipher_free( &ctx );
}
void test_cipher_special_behaviours_wrapper( void ** params )
{
(void)params;
test_cipher_special_behaviours( );
}
#endif /* MBEDTLS_AES_C */
void test_enc_dec_buf( int cipher_id, char * cipher_string, int key_len,
int length_val, int pad_mode )
{
size_t length = length_val, outlen, total_len, i, block_size;
unsigned char key[64];
unsigned char iv[16];
unsigned char ad[13];
unsigned char tag[16];
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
/*
* Prepare contexts
*/
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( key, 0x2a, sizeof( key ) );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( mbedtls_cipher_info_from_string( cipher_string ) == cipher_info );
/* Initialise enc and dec contexts */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
/*
* Do a few encode/decode cycles
*/
for( i = 0; i < 3; i++ )
{
memset( iv , 0x00 + i, sizeof( iv ) );
memset( ad, 0x10 + i, sizeof( ad ) );
memset( inbuf, 0x20 + i, sizeof( inbuf ) );
memset( encbuf, 0, sizeof( encbuf ) );
memset( decbuf, 0, sizeof( decbuf ) );
memset( tag, 0, sizeof( tag ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, sizeof( iv ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, ad, sizeof( ad ) - i ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, ad, sizeof( ad ) - i ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, length, encbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_write_tag( &ctx_enc, tag, sizeof( tag ) ) );
#endif
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len > length &&
total_len <= length + block_size ) );
/* decode the previously encoded string */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, total_len, decbuf, &outlen ) );
total_len = outlen;
TEST_ASSERT( total_len == length ||
( total_len % block_size == 0 &&
total_len < length &&
total_len + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + outlen, &outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_check_tag( &ctx_dec, tag, sizeof( tag ) ) );
#endif
/* check result */
TEST_ASSERT( total_len == length );
TEST_ASSERT( 0 == memcmp(inbuf, decbuf, length) );
}
/*
* Done
*/
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_wrapper( void ** params )
{
test_enc_dec_buf( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_enc_fail( int cipher_id, int pad_mode, int key_len, int length_val,
int ret )
{
size_t length = length_val;
unsigned char key[32];
unsigned char iv[16];
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
unsigned char inbuf[64];
unsigned char encbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
/* Check and get info structures */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
/* Initialise context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, NULL, 0 ) );
#endif
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, inbuf, length, encbuf, &outlen ) );
TEST_ASSERT( ret == mbedtls_cipher_finish( &ctx, encbuf + outlen, &outlen ) );
/* done */
exit:
mbedtls_cipher_free( &ctx );
}
void test_enc_fail_wrapper( void ** params )
{
test_enc_fail( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ) );
}
void test_dec_empty_buf( int cipher,
int expected_update_ret,
int expected_finish_ret )
{
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
const mbedtls_cipher_info_t *cipher_info;
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise context */
cipher_info = mbedtls_cipher_info_from_type( cipher );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( sizeof(key) * 8 >= cipher_info->key_bitlen );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec,
key, cipher_info->key_bitlen,
MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
#endif
/* decode 0-byte string */
TEST_ASSERT( expected_update_ret ==
mbedtls_cipher_update( &ctx_dec, encbuf, 0, decbuf, &outlen ) );
TEST_ASSERT( 0 == outlen );
if ( expected_finish_ret == 0 &&
( cipher_info->mode == MBEDTLS_MODE_CBC ||
cipher_info->mode == MBEDTLS_MODE_ECB ) )
{
/* Non-CBC and non-ECB ciphers are OK with decrypting empty buffers and
* return success, not MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED, when
* decrypting an empty buffer.
* On the other hand, CBC and ECB ciphers need a full block of input.
*/
expected_finish_ret = MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED;
}
TEST_ASSERT( expected_finish_ret == mbedtls_cipher_finish(
&ctx_dec, decbuf + outlen, &outlen ) );
TEST_ASSERT( 0 == outlen );
exit:
mbedtls_cipher_free( &ctx_dec );
}
void test_dec_empty_buf_wrapper( void ** params )
{
test_dec_empty_buf( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
void test_enc_dec_buf_multipart( int cipher_id, int key_len, int first_length_val,
int second_length_val, int pad_mode,
int first_encrypt_output_len, int second_encrypt_output_len,
int first_decrypt_output_len, int second_decrypt_output_len )
{
size_t first_length = first_length_val;
size_t second_length = second_length_val;
size_t length = first_length + second_length;
size_t block_size;
unsigned char key[32];
unsigned char iv[16];
mbedtls_cipher_context_t ctx_dec;
mbedtls_cipher_context_t ctx_enc;
const mbedtls_cipher_info_t *cipher_info;
unsigned char inbuf[64];
unsigned char encbuf[64];
unsigned char decbuf[64];
size_t outlen = 0;
size_t totaloutlen = 0;
memset( key, 0, 32 );
memset( iv , 0, 16 );
mbedtls_cipher_init( &ctx_dec );
mbedtls_cipher_init( &ctx_enc );
memset( inbuf, 5, 64 );
memset( encbuf, 0, 64 );
memset( decbuf, 0, 64 );
/* Initialise enc and dec contexts */
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info);
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_dec, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx_enc, cipher_info ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( -1 != pad_mode )
{
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_dec, pad_mode ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx_enc, pad_mode ) );
}
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_dec, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx_enc, iv, 16 ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_dec ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx_enc ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_dec, NULL, 0 ) );
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx_enc, NULL, 0 ) );
#endif
block_size = mbedtls_cipher_get_block_size( &ctx_enc );
TEST_ASSERT( block_size != 0 );
/* encode length number of bytes from inbuf */
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, first_length, encbuf, &outlen ) );
TEST_ASSERT( (size_t)first_encrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf + first_length, second_length, encbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_encrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size > length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_enc, encbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen > length &&
totaloutlen <= length + block_size ) );
/* decode the previously encoded string */
second_length = totaloutlen - first_length;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, first_length, decbuf, &outlen ) );
TEST_ASSERT( (size_t)first_decrypt_output_len == outlen );
totaloutlen = outlen;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf + first_length, second_length, decbuf + totaloutlen, &outlen ) );
TEST_ASSERT( (size_t)second_decrypt_output_len == outlen );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length ||
( totaloutlen % block_size == 0 &&
totaloutlen < length &&
totaloutlen + block_size >= length ) );
TEST_ASSERT( 0 == mbedtls_cipher_finish( &ctx_dec, decbuf + totaloutlen, &outlen ) );
totaloutlen += outlen;
TEST_ASSERT( totaloutlen == length );
TEST_ASSERT( 0 == memcmp(inbuf, decbuf, length) );
exit:
mbedtls_cipher_free( &ctx_dec );
mbedtls_cipher_free( &ctx_enc );
}
void test_enc_dec_buf_multipart_wrapper( void ** params )
{
test_enc_dec_buf_multipart( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ), *( (int *) params[4] ), *( (int *) params[5] ), *( (int *) params[6] ), *( (int *) params[7] ), *( (int *) params[8] ) );
}
void test_decrypt_test_vec( int cipher_id, int pad_mode, data_t * key,
data_t * iv, data_t * cipher,
data_t * clear, data_t * ad, data_t * tag,
int finish_result, int tag_result )
{
unsigned char output[265];
mbedtls_cipher_context_t ctx;
size_t outlen, total_len;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
#if !defined(MBEDTLS_GCM_C) && !defined(MBEDTLS_CHACHAPOLY_C)
((void) ad);
((void) tag);
#endif
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, MBEDTLS_DECRYPT ) );
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
if( pad_mode != -1 )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
#else
(void) pad_mode;
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
TEST_ASSERT( 0 == mbedtls_cipher_set_iv( &ctx, iv->x, iv->len ) );
TEST_ASSERT( 0 == mbedtls_cipher_reset( &ctx ) );
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( 0 == mbedtls_cipher_update_ad( &ctx, ad->x, ad->len ) );
#endif
/* decode buffer and check tag->x */
total_len = 0;
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, cipher->x, cipher->len, output, &outlen ) );
total_len += outlen;
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
total_len += outlen;
#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CHACHAPOLY_C)
TEST_ASSERT( tag_result == mbedtls_cipher_check_tag( &ctx, tag->x, tag->len ) );
#endif
/* check plaintext only if everything went fine */
if( 0 == finish_result && 0 == tag_result )
{
TEST_ASSERT( total_len == clear->len );
TEST_ASSERT( 0 == memcmp( output, clear->x, clear->len ) );
}
exit:
mbedtls_cipher_free( &ctx );
}
void test_decrypt_test_vec_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
data_t data10 = {(uint8_t *) params[10], *( (uint32_t *) params[11] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_decrypt_test_vec( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, &data10, &data12, *( (int *) params[14] ), *( (int *) params[15] ) );
}
#if defined(MBEDTLS_CIPHER_AUTH_CRYPT)
void test_auth_crypt_tv( int cipher_id, data_t * key, data_t * iv,
data_t * ad, data_t * cipher, data_t * tag,
char * result, data_t * clear, int use_psa )
{
/*
* Take an AEAD ciphertext + tag and perform a pair
* of AEAD decryption and AEAD encryption. Check that
* this results in the expected plaintext, and that
* decryption and encryption are inverse to one another.
*
* Do that twice:
* - once with legacy functions auth_decrypt/auth_encrypt
* - once with new functions auth_decrypt_ext/auth_encrypt_ext
* This allows testing both without duplicating test cases.
*/
int ret;
int using_nist_kw, using_nist_kw_padding;
mbedtls_cipher_context_t ctx;
size_t outlen;
unsigned char *cipher_plus_tag = NULL;
size_t cipher_plus_tag_len;
unsigned char *decrypt_buf = NULL;
size_t decrypt_buf_len = 0;
unsigned char *encrypt_buf = NULL;
size_t encrypt_buf_len = 0;
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
unsigned char *tmp_tag = NULL;
unsigned char *tmp_cipher = NULL;
unsigned char *tag_buf = NULL;
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
/* Null pointers are documented as valid for inputs of length 0.
* The test framework passes non-null pointers, so set them to NULL.
* key, cipher and tag can't be empty. */
if( iv->len == 0 )
iv->x = NULL;
if( ad->len == 0 )
ad->x = NULL;
if( clear->len == 0 )
clear->x = NULL;
mbedtls_cipher_init( &ctx );
/* Initialize PSA Crypto */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_ASSERT( psa_crypto_init( ) );
#else
(void) use_psa;
#endif
/*
* Are we using NIST_KW? with padding?
*/
using_nist_kw_padding = cipher_id == MBEDTLS_CIPHER_AES_128_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_192_KWP ||
cipher_id == MBEDTLS_CIPHER_AES_256_KWP;
using_nist_kw = cipher_id == MBEDTLS_CIPHER_AES_128_KW ||
cipher_id == MBEDTLS_CIPHER_AES_192_KW ||
cipher_id == MBEDTLS_CIPHER_AES_256_KW ||
using_nist_kw_padding;
/****************************************************************
* *
* Part 1: non-deprecated API *
* *
****************************************************************/
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* prepare buffer for decryption
* (we need the tag appended to the ciphertext)
*/
cipher_plus_tag_len = cipher->len + tag->len;
ASSERT_ALLOC( cipher_plus_tag, cipher_plus_tag_len );
memcpy( cipher_plus_tag, cipher->x, cipher->len );
memcpy( cipher_plus_tag + cipher->len, tag->x, tag->len );
/*
* Compute length of output buffer according to the documentation
*/
if( using_nist_kw )
decrypt_buf_len = cipher_plus_tag_len - 8;
else
decrypt_buf_len = cipher_plus_tag_len - tag->len;
/*
* Try decrypting to a buffer that's 1B too small
*/
if( decrypt_buf_len != 0 )
{
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA );
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, decrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, cipher_plus_tag, cipher_plus_tag_len,
decrypt_buf, decrypt_buf_len, &outlen, tag->len );
if( strcmp( result, "FAIL" ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, decrypt_buf_len ) );
}
else
{
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
/* Free this, but keep cipher_plus_tag for deprecated function with PSA */
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/*
* Compute size of output buffer according to documentation
*/
if( using_nist_kw )
{
encrypt_buf_len = clear->len + 8;
if( using_nist_kw_padding && encrypt_buf_len % 8 != 0 )
encrypt_buf_len += 8 - encrypt_buf_len % 8;
}
else
{
encrypt_buf_len = clear->len + tag->len;
}
/*
* Try encrypting with an output buffer that's 1B too small
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len - 1 );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len - 1, &outlen, tag->len );
TEST_ASSERT( ret != 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
/*
* Encrypt and check the result
*/
ASSERT_ALLOC( encrypt_buf, encrypt_buf_len );
outlen = 0;
ret = mbedtls_cipher_auth_encrypt_ext( &ctx, iv->x, iv->len,
ad->x, ad->len, clear->x, clear->len,
encrypt_buf, encrypt_buf_len, &outlen, tag->len );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len + tag->len );
TEST_ASSERT( memcmp( encrypt_buf, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( memcmp( encrypt_buf + cipher->len,
tag->x, tag->len ) == 0 );
mbedtls_free( encrypt_buf );
encrypt_buf = NULL;
}
/****************************************************************
* *
* Part 2: deprecated API *
* *
****************************************************************/
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
/*
* Prepare context for decryption
*/
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_DECRYPT ) )
goto exit;
/*
* Prepare pointers for decryption
*/
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
{
/* PSA requires that the tag immediately follows the ciphertext.
* Fortunately, we already have that from testing the new API. */
tmp_cipher = cipher_plus_tag;
tmp_tag = tmp_cipher + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
tmp_cipher = cipher->x;
tmp_tag = tag->x;
}
/*
* Authenticate and decrypt, and check result
*/
ASSERT_ALLOC( decrypt_buf, cipher->len );
outlen = 0;
ret = mbedtls_cipher_auth_decrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
tmp_cipher, cipher->len, decrypt_buf, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
/* NIST_KW with legacy API */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else if( strcmp( result, "FAIL" ) == 0 )
{
/* unauthentic message */
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
TEST_ASSERT( buffer_is_all_zero( decrypt_buf, cipher->len ) );
}
else
{
/* authentic message: is the plaintext correct? */
TEST_ASSERT( ret == 0 );
ASSERT_COMPARE( decrypt_buf, outlen, clear->x, clear->len );
}
mbedtls_free( decrypt_buf );
decrypt_buf = NULL;
mbedtls_free( cipher_plus_tag );
cipher_plus_tag = NULL;
/*
* Encrypt back if test data was authentic
*/
if( strcmp( result, "FAIL" ) != 0 )
{
/* prepare context for encryption */
if( ! cipher_reset_key( &ctx, cipher_id, use_psa, tag->len, key,
MBEDTLS_ENCRYPT ) )
goto exit;
/* prepare buffers for encryption */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa )
{
ASSERT_ALLOC( cipher_plus_tag, cipher->len + tag->len );
tmp_cipher = cipher_plus_tag;
tmp_tag = cipher_plus_tag + cipher->len;
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
{
ASSERT_ALLOC( encrypt_buf, cipher->len );
ASSERT_ALLOC( tag_buf, tag->len );
tmp_cipher = encrypt_buf;
tmp_tag = tag_buf;
}
/*
* Encrypt and check the result
*/
outlen = 0;
ret = mbedtls_cipher_auth_encrypt( &ctx, iv->x, iv->len, ad->x, ad->len,
clear->x, clear->len, tmp_cipher, &outlen,
tmp_tag, tag->len );
if( using_nist_kw )
{
TEST_ASSERT( ret == MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( outlen == cipher->len );
if( cipher->len != 0 )
TEST_ASSERT( memcmp( tmp_cipher, cipher->x, cipher->len ) == 0 );
TEST_ASSERT( memcmp( tmp_tag, tag->x, tag->len ) == 0 );
}
}
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
exit:
mbedtls_cipher_free( &ctx );
mbedtls_free( decrypt_buf );
mbedtls_free( encrypt_buf );
mbedtls_free( cipher_plus_tag );
#if !defined(MBEDTLS_DEPRECATED_WARNING) && \
!defined(MBEDTLS_DEPRECATED_REMOVED)
mbedtls_free( tag_buf );
#endif /* !MBEDTLS_DEPRECATED_WARNING && !MBEDTLS_DEPRECATED_REMOVED */
#if defined(MBEDTLS_USE_PSA_CRYPTO)
if( use_psa == 1 )
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_auth_crypt_tv_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data12 = {(uint8_t *) params[12], *( (uint32_t *) params[13] )};
test_auth_crypt_tv( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, (char *) params[11], &data12, *( (int *) params[14] ) );
}
#endif /* MBEDTLS_CIPHER_AUTH_CRYPT */
void test_test_vec_ecb( int cipher_id, int operation, data_t * key,
data_t * input, data_t * result, int finish_result
)
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, input->x,
mbedtls_cipher_get_block_size( &ctx ),
output, &outlen ) );
TEST_ASSERT( outlen == mbedtls_cipher_get_block_size( &ctx ) );
TEST_ASSERT( finish_result == mbedtls_cipher_finish( &ctx, output + outlen,
&outlen ) );
TEST_ASSERT( 0 == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == memcmp( output, result->x,
mbedtls_cipher_get_block_size( &ctx ) ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_test_vec_ecb_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_test_vec_ecb( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, *( (int *) params[8] ) );
}
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_test_vec_crypt( int cipher_id, int operation, data_t *key,
data_t *iv, data_t *input, data_t *result,
int finish_result, int use_psa )
{
mbedtls_cipher_context_t ctx;
unsigned char output[32];
size_t outlen;
mbedtls_cipher_init( &ctx );
memset( output, 0x00, sizeof( output ) );
/* Prepare context */
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
(void) use_psa;
#else
if( use_psa == 1 )
{
PSA_ASSERT( psa_crypto_init( ) );
TEST_ASSERT( 0 == mbedtls_cipher_setup_psa( &ctx,
mbedtls_cipher_info_from_type( cipher_id ), 0 ) );
}
else
#endif /* MBEDTLS_USE_PSA_CRYPTO */
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx,
mbedtls_cipher_info_from_type( cipher_id ) ) );
TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key->x, 8 * key->len, operation ) );
if( MBEDTLS_MODE_CBC == ctx.cipher_info->mode )
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, MBEDTLS_PADDING_NONE ) );
TEST_ASSERT( finish_result == mbedtls_cipher_crypt( &ctx, iv->len ? iv->x : NULL,
iv->len, input->x, input->len,
output, &outlen ) );
TEST_ASSERT( result->len == outlen );
/* check plaintext only if everything went fine */
if( 0 == finish_result )
TEST_ASSERT( 0 == memcmp( output, result->x, outlen ) );
exit:
mbedtls_cipher_free( &ctx );
#if defined(MBEDTLS_USE_PSA_CRYPTO)
PSA_DONE( );
#endif /* MBEDTLS_USE_PSA_CRYPTO */
}
void test_test_vec_crypt_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
data_t data8 = {(uint8_t *) params[8], *( (uint32_t *) params[9] )};
test_test_vec_crypt( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, &data8, *( (int *) params[10] ), *( (int *) params[11] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
void test_set_padding( int cipher_id, int pad_mode, int ret )
{
const mbedtls_cipher_info_t *cipher_info;
mbedtls_cipher_context_t ctx;
mbedtls_cipher_init( &ctx );
cipher_info = mbedtls_cipher_info_from_type( cipher_id );
TEST_ASSERT( NULL != cipher_info );
TEST_ASSERT( 0 == mbedtls_cipher_setup( &ctx, cipher_info ) );
TEST_ASSERT( ret == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
exit:
mbedtls_cipher_free( &ctx );
}
void test_set_padding_wrapper( void ** params )
{
test_set_padding( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
#if defined(MBEDTLS_CIPHER_MODE_CBC)
void test_check_padding( int pad_mode, data_t * input, int ret, int dlen_check
)
{
mbedtls_cipher_info_t cipher_info;
mbedtls_cipher_context_t ctx;
size_t dlen;
/* build a fake context just for getting access to get_padding */
mbedtls_cipher_init( &ctx );
cipher_info.mode = MBEDTLS_MODE_CBC;
ctx.cipher_info = &cipher_info;
TEST_ASSERT( 0 == mbedtls_cipher_set_padding_mode( &ctx, pad_mode ) );
TEST_ASSERT( ret == ctx.get_padding( input->x, input->len, &dlen ) );
if( 0 == ret )
TEST_ASSERT( dlen == (size_t) dlen_check );
exit:
;
}
void test_check_padding_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
test_check_padding( *( (int *) params[0] ), &data1, *( (int *) params[3] ), *( (int *) params[4] ) );
}
#endif /* MBEDTLS_CIPHER_MODE_CBC */
#endif /* MBEDTLS_CIPHER_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
*out_value = MBEDTLS_CIPHER_AES_128_KW;
}
break;
case 1:
{
*out_value = MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE;
}
break;
case 2:
{
*out_value = MBEDTLS_CIPHER_AES_128_KWP;
}
break;
case 3:
{
*out_value = MBEDTLS_CIPHER_AES_192_KW;
}
break;
case 4:
{
*out_value = MBEDTLS_CIPHER_AES_256_KW;
}
break;
case 5:
{
*out_value = MBEDTLS_CIPHER_AES_192_KWP;
}
break;
case 6:
{
*out_value = MBEDTLS_CIPHER_AES_256_KWP;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_CIPHER_C)
case 0:
{
#if defined(MBEDTLS_AES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_NIST_KW_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_CIPHER_C)
test_mbedtls_cipher_list_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_CIPHER_C)
test_cipher_invalid_param_unconditional_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_cipher_invalid_param_conditional_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_AES_C)
test_cipher_special_behaviours_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_fail_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_CIPHER_C)
test_dec_empty_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 7 */
#if defined(MBEDTLS_CIPHER_C)
test_enc_dec_buf_multipart_wrapper,
#else
NULL,
#endif
/* Function Id: 8 */
#if defined(MBEDTLS_CIPHER_C)
test_decrypt_test_vec_wrapper,
#else
NULL,
#endif
/* Function Id: 9 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_AUTH_CRYPT)
test_auth_crypt_tv_wrapper,
#else
NULL,
#endif
/* Function Id: 10 */
#if defined(MBEDTLS_CIPHER_C)
test_test_vec_ecb_wrapper,
#else
NULL,
#endif
/* Function Id: 11 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_test_vec_crypt_wrapper,
#else
NULL,
#endif
/* Function Id: 12 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
test_set_padding_wrapper,
#else
NULL,
#endif
/* Function Id: 13 */
#if defined(MBEDTLS_CIPHER_C) && defined(MBEDTLS_CIPHER_MODE_CBC)
test_check_padding_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_cipher.nist_kw.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 72,448 | 2,063 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_hmac_drbg.nopr.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_hmac_drbg.nopr.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_hmac_drbg.function
* Test suite data : suites/test_suite_hmac_drbg.nopr.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_HMAC_DRBG_C)
#include "third_party/mbedtls/hmac_drbg.h"
typedef struct
{
unsigned char *p;
size_t len;
} entropy_ctx;
static int mbedtls_test_entropy_func( void *data, unsigned char *buf, size_t len )
{
entropy_ctx *ctx = (entropy_ctx *) data;
if( len > ctx->len )
return( -1 );
memcpy( buf, ctx->p, len );
ctx->p += len;
ctx->len -= len;
return( 0 );
}
void test_hmac_drbg_entropy_usage( int md_alg )
{
unsigned char out[16];
unsigned char buf[1024];
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
entropy_ctx entropy;
size_t i, reps = 10;
size_t default_entropy_len;
size_t expected_consumed_entropy = 0;
mbedtls_hmac_drbg_init( &ctx );
memset( buf, 0, sizeof( buf ) );
memset( out, 0, sizeof( out ) );
entropy.len = sizeof( buf );
entropy.p = buf;
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
if( mbedtls_md_get_size( md_info ) <= 20 )
default_entropy_len = 16;
else if( mbedtls_md_get_size( md_info ) <= 28 )
default_entropy_len = 24;
else
default_entropy_len = 32;
/* Set reseed interval before seed */
mbedtls_hmac_drbg_set_reseed_interval( &ctx, 2 * reps );
/* Init must use entropy */
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info, mbedtls_test_entropy_func, &entropy,
NULL, 0 ) == 0 );
/* default_entropy_len of entropy, plus half as much for the nonce */
expected_consumed_entropy += default_entropy_len * 3 / 2;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* By default, PR is off, and reseed interval was set to
* 2 * reps so the next few calls should not use entropy */
for( i = 0; i < reps; i++ )
{
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) - 4 ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, out, sizeof( out ) - 4,
buf, 16 ) == 0 );
}
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* While at it, make sure we didn't write past the requested length */
TEST_ASSERT( out[sizeof( out ) - 4] == 0 );
TEST_ASSERT( out[sizeof( out ) - 3] == 0 );
TEST_ASSERT( out[sizeof( out ) - 2] == 0 );
TEST_ASSERT( out[sizeof( out ) - 1] == 0 );
/* There have been 2 * reps calls to random. The next call should reseed */
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_consumed_entropy += default_entropy_len;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* Set reseed interval after seed */
mbedtls_hmac_drbg_set_reseed_interval( &ctx, 4 * reps + 1);
/* The new few calls should not reseed */
for( i = 0; i < (2 * reps); i++ )
{
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, out, sizeof( out ) ,
buf, 16 ) == 0 );
}
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* Now enable PR, so the next few calls should all reseed */
mbedtls_hmac_drbg_set_prediction_resistance( &ctx, MBEDTLS_HMAC_DRBG_PR_ON );
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_consumed_entropy += default_entropy_len;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
/* Finally, check setting entropy_len */
mbedtls_hmac_drbg_set_entropy_len( &ctx, 42 );
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_consumed_entropy += 42;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
mbedtls_hmac_drbg_set_entropy_len( &ctx, 13 );
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
expected_consumed_entropy += 13;
TEST_EQUAL( sizeof( buf ) - entropy.len, expected_consumed_entropy );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_entropy_usage_wrapper( void ** params )
{
test_hmac_drbg_entropy_usage( *( (int *) params[0] ) );
}
#if defined(MBEDTLS_FS_IO)
void test_hmac_drbg_seed_file( int md_alg, char * path, int ret )
{
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
mbedtls_hmac_drbg_init( &ctx );
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info,
mbedtls_test_rnd_std_rand, NULL,
NULL, 0 ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_write_seed_file( &ctx, path ) == ret );
TEST_ASSERT( mbedtls_hmac_drbg_update_seed_file( &ctx, path ) == ret );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_seed_file_wrapper( void ** params )
{
test_hmac_drbg_seed_file( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ) );
}
#endif /* MBEDTLS_FS_IO */
void test_hmac_drbg_buf( int md_alg )
{
unsigned char out[16];
unsigned char buf[100];
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
size_t i;
mbedtls_hmac_drbg_init( &ctx );
memset( buf, 0, sizeof( buf ) );
memset( out, 0, sizeof( out ) );
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT( mbedtls_hmac_drbg_seed_buf( &ctx, md_info, buf, sizeof( buf ) ) == 0 );
/* Make sure it never tries to reseed (would segfault otherwise) */
mbedtls_hmac_drbg_set_reseed_interval( &ctx, 3 );
mbedtls_hmac_drbg_set_prediction_resistance( &ctx, MBEDTLS_HMAC_DRBG_PR_ON );
for( i = 0; i < 30; i++ )
TEST_ASSERT( mbedtls_hmac_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_buf_wrapper( void ** params )
{
test_hmac_drbg_buf( *( (int *) params[0] ) );
}
void test_hmac_drbg_no_reseed( int md_alg, data_t * entropy,
data_t * custom, data_t * add1,
data_t * add2, data_t * output )
{
unsigned char data[1024];
unsigned char my_output[512];
entropy_ctx p_entropy;
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
mbedtls_hmac_drbg_init( &ctx );
p_entropy.p = entropy->x;
p_entropy.len = entropy->len;
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
/* Test the simplified buffer-based variant */
memcpy( data, entropy->x, p_entropy.len );
memcpy( data + p_entropy.len, custom->x, custom->len );
TEST_ASSERT( mbedtls_hmac_drbg_seed_buf( &ctx, md_info,
data, p_entropy.len + custom->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add1->x, add1->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add2->x, add2->len ) == 0 );
/* Reset context for second run */
mbedtls_hmac_drbg_free( &ctx );
TEST_ASSERT( memcmp( my_output, output->x, output->len ) == 0 );
/* And now the normal entropy-based variant */
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info, mbedtls_test_entropy_func, &p_entropy,
custom->x, custom->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add1->x, add1->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add2->x, add2->len ) == 0 );
TEST_ASSERT( memcmp( my_output, output->x, output->len ) == 0 );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_no_reseed_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
test_hmac_drbg_no_reseed( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9 );
}
void test_hmac_drbg_nopr( int md_alg, data_t * entropy, data_t * custom,
data_t * add1, data_t * add2, data_t * add3,
data_t * output )
{
unsigned char my_output[512];
entropy_ctx p_entropy;
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
mbedtls_hmac_drbg_init( &ctx );
p_entropy.p = entropy->x;
p_entropy.len = entropy->len;
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info, mbedtls_test_entropy_func, &p_entropy,
custom->x, custom->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_reseed( &ctx, add1->x, add1->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add2->x, add2->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add3->x, add3->len ) == 0 );
TEST_ASSERT( memcmp( my_output, output->x, output->len ) == 0 );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_nopr_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
data_t data11 = {(uint8_t *) params[11], *( (uint32_t *) params[12] )};
test_hmac_drbg_nopr( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9, &data11 );
}
void test_hmac_drbg_pr( int md_alg, data_t * entropy, data_t * custom,
data_t * add1, data_t * add2, data_t * output )
{
unsigned char my_output[512];
entropy_ctx p_entropy;
const mbedtls_md_info_t *md_info;
mbedtls_hmac_drbg_context ctx;
mbedtls_hmac_drbg_init( &ctx );
p_entropy.p = entropy->x;
p_entropy.len = entropy->len;
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
TEST_ASSERT( mbedtls_hmac_drbg_seed( &ctx, md_info, mbedtls_test_entropy_func, &p_entropy,
custom->x, custom->len ) == 0 );
mbedtls_hmac_drbg_set_prediction_resistance( &ctx, MBEDTLS_HMAC_DRBG_PR_ON );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add1->x, add1->len ) == 0 );
TEST_ASSERT( mbedtls_hmac_drbg_random_with_add( &ctx, my_output, output->len,
add2->x, add2->len ) == 0 );
TEST_ASSERT( memcmp( my_output, output->x, output->len ) == 0 );
exit:
mbedtls_hmac_drbg_free( &ctx );
}
void test_hmac_drbg_pr_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
data_t data7 = {(uint8_t *) params[7], *( (uint32_t *) params[8] )};
data_t data9 = {(uint8_t *) params[9], *( (uint32_t *) params[10] )};
test_hmac_drbg_pr( *( (int *) params[0] ), &data1, &data3, &data5, &data7, &data9 );
}
#if defined(MBEDTLS_SELF_TEST)
void test_hmac_drbg_selftest( )
{
TEST_ASSERT( mbedtls_hmac_drbg_self_test( 1 ) == 0 );
exit:
;
}
void test_hmac_drbg_selftest_wrapper( void ** params )
{
(void)params;
test_hmac_drbg_selftest( );
}
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_HMAC_DRBG_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_HMAC_DRBG_C)
case 0:
{
*out_value = MBEDTLS_MD_SHA1;
}
break;
case 1:
{
*out_value = MBEDTLS_MD_SHA224;
}
break;
case 2:
{
*out_value = MBEDTLS_MD_SHA256;
}
break;
case 3:
{
*out_value = MBEDTLS_MD_SHA384;
}
break;
case 4:
{
*out_value = MBEDTLS_MD_SHA512;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_HMAC_DRBG_C)
case 0:
{
#if defined(MBEDTLS_SHA1_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_SHA256_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_SHA512_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if !defined(MBEDTLS_SHA512_NO_SHA384)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_entropy_usage_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_HMAC_DRBG_C) && defined(MBEDTLS_FS_IO)
test_hmac_drbg_seed_file_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_buf_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_no_reseed_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_nopr_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_HMAC_DRBG_C)
test_hmac_drbg_pr_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_HMAC_DRBG_C) && defined(MBEDTLS_SELF_TEST)
test_hmac_drbg_selftest_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_hmac_drbg.nopr.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 21,849 | 696 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_aes.xts.datax | AES-128-XTS Encrypt Fail Sector Too Small (by 16 bytes)
6:int:0:exp:0
AES-128-XTS Encrypt Fail Sector Too Small (by 1 byte)
6:int:15:exp:0
AES-128-XTS Encrypt Fail Sector Too Large (by 1 byte)
6:int:16777217:exp:0
AES-128-XTS Encrypt Fail Sector Too Large (by 1 block)
6:int:16777232:exp:0
AES-0-XTS Setkey Fail Invalid Key Length
7:int:0:exp:1
AES-4-XTS Setkey Fail Invalid Key Length
7:int:1:exp:1
AES-64-XTS Setkey Fail Invalid Key Length
7:int:16:exp:1
AES-192-XTS Setkey Fail Invalid Key Length
7:int:48:exp:1
AES-384-XTS Setkey Fail Invalid Key Length
7:int:96:exp:1
AES-128-XTS Encrypt IEEE P1619/D16 Vector 1
4:char*:"0000000000000000000000000000000000000000000000000000000000000000":char*:"00000000000000000000000000000000":char*:"0000000000000000000000000000000000000000000000000000000000000000":char*:"917cf69ebd68b2ec9b9fe9a3eadda692cd43d2f59598ed858c02c2652fbf922e"
AES-128-XTS Encrypt IEEE P1619/D16 Vector 2
4:char*:"1111111111111111111111111111111122222222222222222222222222222222":char*:"33333333330000000000000000000000":char*:"4444444444444444444444444444444444444444444444444444444444444444":char*:"c454185e6a16936e39334038acef838bfb186fff7480adc4289382ecd6d394f0"
AES-128-XTS Encrypt IEEE P1619/D16 Vector 3
4:char*:"fffefdfcfbfaf9f8f7f6f5f4f3f2f1f022222222222222222222222222222222":char*:"33333333330000000000000000000000":char*:"4444444444444444444444444444444444444444444444444444444444444444":char*:"af85336b597afc1a900b2eb21ec949d292df4c047e0b21532186a5971a227a89"
AES-128-XTS Encrypt IEEE P1619/D16 Vector 4
4:char*:"2718281828459045235360287471352631415926535897932384626433832795":char*:"00000000000000000000000000000000":char*:"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":char*:"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"
AES-128-XTS Encrypt IEEE P1619/D16 Vector 5
4:char*:"2718281828459045235360287471352631415926535897932384626433832795":char*:"01000000000000000000000000000000":char*:"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":char*:"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"
AES-128-XTS Encrypt IEEE P1619/D16 Vector 6
4:char*:"2718281828459045235360287471352631415926535897932384626433832795":char*:"02000000000000000000000000000000":char*:"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":char*:"fa762a3680b76007928ed4a4f49a9456031b704782e65e16cecb54ed7d017b5e18abd67b338e81078f21edb7868d901ebe9c731a7c18b5e6dec1d6a72e078ac9a4262f860beefa14f4e821018272e411a951502b6e79066e84252c3346f3aa62344351a291d4bedc7a07618bdea2af63145cc7a4b8d4070691ae890cd65733e7946e9021a1dffc4c59f159425ee6d50ca9b135fa6162cea18a939838dc000fb386fad086acce5ac07cb2ece7fd580b00cfa5e98589631dc25e8e2a3daf2ffdec26531659912c9d8f7a15e5865ea8fb5816d6207052bd7128cd743c12c8118791a4736811935eb982a532349e31dd401e0b660a568cb1a4711f552f55ded59f1f15bf7196b3ca12a91e488ef59d64f3a02bf45239499ac6176ae321c4a211ec545365971c5d3f4f09d4eb139bfdf2073d33180b21002b65cc9865e76cb24cd92c874c24c18350399a936ab3637079295d76c417776b94efce3a0ef7206b15110519655c956cbd8b2489405ee2b09a6b6eebe0c53790a12a8998378b33a5b71159625f4ba49d2a2fdba59fbf0897bc7aabd8d707dc140a80f0f309f835d3da54ab584e501dfa0ee977fec543f74186a802b9a37adb3e8291eca04d66520d229e60401e7282bef486ae059aa70696e0e305d777140a7a883ecdcb69b9ff938e8a4231864c69ca2c2043bed007ff3e605e014bcf518138dc3a25c5e236171a2d01d6"
AES-128-XTS Encrypt IEEE P1619/D16 Vector 7
4:char*:"2718281828459045235360287471352631415926535897932384626433832795":char*:"fd000000000000000000000000000000":char*:"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":char*:"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"
AES-128-XTS Encrypt IEEE P1619/D16 Vector 8
4:char*:"2718281828459045235360287471352631415926535897932384626433832795":char*:"fe000000000000000000000000000000":char*:"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":char*:"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"
AES-128-XTS Encrypt IEEE P1619/D16 Vector 9
4:char*:"2718281828459045235360287471352631415926535897932384626433832795":char*:"ff000000000000000000000000000000":char*:"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":char*:"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"
AES-256-XTS Encrypt IEEE P1619/D16 Vector 10
4:char*:"27182818284590452353602874713526624977572470936999595749669676273141592653589793238462643383279502884197169399375105820974944592":char*:"ff000000000000000000000000000000":char*:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff":char*:"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"
AES-256-XTS Encrypt IEEE P1619/D16 Vector 11
4:char*:"27182818284590452353602874713526624977572470936999595749669676273141592653589793238462643383279502884197169399375105820974944592":char*:"ffff0000000000000000000000000000":char*:"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":char*:"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"
AES-256-XTS Encrypt IEEE P1619/D16 Vector 12
4:char*:"27182818284590452353602874713526624977572470936999595749669676273141592653589793238462643383279502884197169399375105820974944592":char*:"ffffff00000000000000000000000000":char*:"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":char*:"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"
AES-256-XTS Encrypt IEEE P1619/D16 Vector 13
4:char*:"27182818284590452353602874713526624977572470936999595749669676273141592653589793238462643383279502884197169399375105820974944592":char*:"ffffffff000000000000000000000000":char*:"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":char*:"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"
AES-256-XTS Encrypt IEEE P1619/D16 Vector 14
4:char*:"27182818284590452353602874713526624977572470936999595749669676273141592653589793238462643383279502884197169399375105820974944592":char*:"ffffffffff0000000000000000000000":char*:"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":char*:"64497e5a831e4a932c09be3e5393376daa599548b816031d224bbf50a818ed2350eae7e96087c8a0db51ad290bd00c1ac1620857635bf246c176ab463be30b808da548081ac847b158e1264be25bb0910bbc92647108089415d45fab1b3d2604e8a8eff1ae4020cfa39936b66827b23f371b92200be90251e6d73c5f86de5fd4a950781933d79a28272b782a2ec313efdfcc0628f43d744c2dc2ff3dcb66999b50c7ca895b0c64791eeaa5f29499fb1c026f84ce5b5c72ba1083cddb5ce45434631665c333b60b11593fb253c5179a2c8db813782a004856a1653011e93fb6d876c18366dd8683f53412c0c180f9c848592d593f8609ca736317d356e13e2bff3a9f59cd9aeb19cd482593d8c46128bb32423b37a9adfb482b99453fbe25a41bf6feb4aa0bef5ed24bf73c762978025482c13115e4015aac992e5613a3b5c2f685b84795cb6e9b2656d8c88157e52c42f978d8634c43d06fea928f2822e465aa6576e9bf419384506cc3ce3c54ac1a6f67dc66f3b30191e698380bc999b05abce19dc0c6dcc2dd001ec535ba18deb2df1a101023108318c75dc98611a09dc48a0acdec676fabdf222f07e026f059b672b56e5cbc8e1d21bbd867dd927212054681d70ea737134cdfce93b6f82ae22423274e58a0821cc5502e2d0ab4585e94de6975be5e0b4efce51cd3e70c25a1fbbbd609d273ad5b0d59631c531f6a0a57b9"
AES-128-XTS Encrypt IEEE P1619/D16 Vector 15
4:char*:"fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0bfbebdbcbbbab9b8b7b6b5b4b3b2b1b0":char*:"9a785634120000000000000000000000":char*:"000102030405060708090a0b0c0d0e0f10":char*:"6c1625db4671522d3d7599601de7ca09ed"
AES-128-XTS Encrypt IEEE P1619/D16 Vector 16
4:char*:"fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0bfbebdbcbbbab9b8b7b6b5b4b3b2b1b0":char*:"9a785634120000000000000000000000":char*:"000102030405060708090a0b0c0d0e0f1011":char*:"d069444b7a7e0cab09e24447d24deb1fedbf"
AES-128-XTS Encrypt IEEE P1619/D16 Vector 17
4:char*:"fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0bfbebdbcbbbab9b8b7b6b5b4b3b2b1b0":char*:"9a785634120000000000000000000000":char*:"000102030405060708090a0b0c0d0e0f101112":char*:"e5df1351c0544ba1350b3363cd8ef4beedbf9d"
AES-128-XTS Encrypt IEEE P1619/D16 Vector 18
4:char*:"fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0bfbebdbcbbbab9b8b7b6b5b4b3b2b1b0":char*:"9a785634120000000000000000000000":char*:"000102030405060708090a0b0c0d0e0f10111213":char*:"9d84c813f719aa2c7be3f66171c7c5c2edbf9dac"
AES-128-XTS Encrypt IEEE P1619/D16 Vector 19
4:char*:"e0e1e2e3e4e5e6e7e8e9eaebecedeeefc0c1c2c3c4c5c6c7c8c9cacbcccdcecf":char*:"21436587a90000000000000000000000":char*:"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":char*:"38b45812ef43a05bd957e545907e223b954ab4aaf088303ad910eadf14b42be68b2461149d8c8ba85f992be970bc621f1b06573f63e867bf5875acafa04e42ccbd7bd3c2a0fb1fff791ec5ec36c66ae4ac1e806d81fbf709dbe29e471fad38549c8e66f5345d7c1eb94f405d1ec785cc6f6a68f6254dd8339f9d84057e01a17741990482999516b5611a38f41bb6478e6f173f320805dd71b1932fc333cb9ee39936beea9ad96fa10fb4112b901734ddad40bc1878995f8e11aee7d141a2f5d48b7a4e1e7f0b2c04830e69a4fd1378411c2f287edf48c6c4e5c247a19680f7fe41cefbd49b582106e3616cbbe4dfb2344b2ae9519391f3e0fb4922254b1d6d2d19c6d4d537b3a26f3bcc51588b32f3eca0829b6a5ac72578fb814fb43cf80d64a233e3f997a3f02683342f2b33d25b492536b93becb2f5e1a8b82f5b883342729e8ae09d16938841a21a97fb543eea3bbff59f13c1a18449e398701c1ad51648346cbc04c27bb2da3b93a1372ccae548fb53bee476f9e9c91773b1bb19828394d55d3e1a20ed69113a860b6829ffa847224604435070221b257e8dff783615d2cae4803a93aa4334ab482a0afac9c0aeda70b45a481df5dec5df8cc0f423c77a5fd46cd312021d4b438862419a791be03bb4d97c0e59578542531ba466a83baf92cefc151b5cc1611a167893819b63fb8a6b18e86de60290fa72b797b0ce59f3"
AES-128-XTS Decrypt IEEE P1619/D16 Vector 1
5:char*:"0000000000000000000000000000000000000000000000000000000000000000":char*:"00000000000000000000000000000000":char*:"0000000000000000000000000000000000000000000000000000000000000000":char*:"917cf69ebd68b2ec9b9fe9a3eadda692cd43d2f59598ed858c02c2652fbf922e"
AES-128-XTS Decrypt IEEE P1619/D16 Vector 2
5:char*:"1111111111111111111111111111111122222222222222222222222222222222":char*:"33333333330000000000000000000000":char*:"4444444444444444444444444444444444444444444444444444444444444444":char*:"c454185e6a16936e39334038acef838bfb186fff7480adc4289382ecd6d394f0"
AES-128-XTS Decrypt IEEE P1619/D16 Vector 3
5:char*:"2718281828459045235360287471352631415926535897932384626433832795":char*:"00000000000000000000000000000000":char*:"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":char*:"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"
AES-128-XTS Decrypt IEEE P1619/D16 Vector 4
5:char*:"2718281828459045235360287471352631415926535897932384626433832795":char*:"00000000000000000000000000000000":char*:"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":char*:"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"
AES-128-XTS Decrypt IEEE P1619/D16 Vector 5
5:char*:"2718281828459045235360287471352631415926535897932384626433832795":char*:"01000000000000000000000000000000":char*:"27a7479befa1d476489f308cd4cfa6e2a96e4bbe3208ff25287dd3819616e89cc78cf7f5e543445f8333d8fa7f56000005279fa5d8b5e4ad40e736ddb4d35412328063fd2aab53e5ea1e0a9f332500a5df9487d07a5c92cc512c8866c7e860ce93fdf166a24912b422976146ae20ce846bb7dc9ba94a767aaef20c0d61ad02655ea92dc4c4e41a8952c651d33174be51a10c421110e6d81588ede82103a252d8a750e8768defffed9122810aaeb99f9172af82b604dc4b8e51bcb08235a6f4341332e4ca60482a4ba1a03b3e65008fc5da76b70bf1690db4eae29c5f1badd03c5ccf2a55d705ddcd86d449511ceb7ec30bf12b1fa35b913f9f747a8afd1b130e94bff94effd01a91735ca1726acd0b197c4e5b03393697e126826fb6bbde8ecc1e08298516e2c9ed03ff3c1b7860f6de76d4cecd94c8119855ef5297ca67e9f3e7ff72b1e99785ca0a7e7720c5b36dc6d72cac9574c8cbbc2f801e23e56fd344b07f22154beba0f08ce8891e643ed995c94d9a69c9f1b5f499027a78572aeebd74d20cc39881c213ee770b1010e4bea718846977ae119f7a023ab58cca0ad752afe656bb3c17256a9f6e9bf19fdd5a38fc82bbe872c5539edb609ef4f79c203ebb140f2e583cb2ad15b4aa5b655016a8449277dbd477ef2c8d6c017db738b18deb4a427d1923ce3ff262735779a418f20a282df920147beabe421ee5319d0568":char*:"264d3ca8512194fec312c8c9891f279fefdd608d0c027b60483a3fa811d65ee59d52d9e40ec5672d81532b38b6b089ce951f0f9c35590b8b978d175213f329bb1c2fd30f2f7f30492a61a532a79f51d36f5e31a7c9a12c286082ff7d2394d18f783e1a8e72c722caaaa52d8f065657d2631fd25bfd8e5baad6e527d763517501c68c5edc3cdd55435c532d7125c8614deed9adaa3acade5888b87bef641c4c994c8091b5bcd387f3963fb5bc37aa922fbfe3df4e5b915e6eb514717bdd2a74079a5073f5c4bfd46adf7d282e7a393a52579d11a028da4d9cd9c77124f9648ee383b1ac763930e7162a8d37f350b2f74b8472cf09902063c6b32e8c2d9290cefbd7346d1c779a0df50edcde4531da07b099c638e83a755944df2aef1aa31752fd323dcb710fb4bfbb9d22b925bc3577e1b8949e729a90bbafeacf7f7879e7b1147e28ba0bae940db795a61b15ecf4df8db07b824bb062802cc98a9545bb2aaeed77cb3fc6db15dcd7d80d7d5bc406c4970a3478ada8899b329198eb61c193fb6275aa8ca340344a75a862aebe92eee1ce032fd950b47d7704a3876923b4ad62844bf4a09c4dbe8b4397184b7471360c9564880aedddb9baa4af2e75394b08cd32ff479c57a07d3eab5d54de5f9738b8d27f27a9f0ab11799d7b7ffefb2704c95c6ad12c39f1e867a4b7b1d7818a4b753dfd2a89ccb45e001a03a867b187f225dd"
AES-128-XTS Decrypt IEEE P1619/D16 Vector 6
5:char*:"2718281828459045235360287471352631415926535897932384626433832795":char*:"02000000000000000000000000000000":char*:"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":char*:"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"
AES-128-XTS Decrypt IEEE P1619/D16 Vector 7
5:char*:"2718281828459045235360287471352631415926535897932384626433832795":char*:"fd000000000000000000000000000000":char*:"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":char*:"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"
AES-128-XTS Decrypt IEEE P1619/D16 Vector 8
5:char*:"2718281828459045235360287471352631415926535897932384626433832795":char*:"fe000000000000000000000000000000":char*:"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":char*:"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"
AES-128-XTS Decrypt IEEE P1619/D16 Vector 9
5:char*:"2718281828459045235360287471352631415926535897932384626433832795":char*:"ff000000000000000000000000000000":char*:"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":char*:"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"
AES-256-XTS Decrypt IEEE P1619/D16 Vector 10
5:char*:"27182818284590452353602874713526624977572470936999595749669676273141592653589793238462643383279502884197169399375105820974944592":char*:"ff000000000000000000000000000000":char*:"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":char*:"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"
AES-256-XTS Decrypt IEEE P1619/D16 Vector 11
5:char*:"27182818284590452353602874713526624977572470936999595749669676273141592653589793238462643383279502884197169399375105820974944592":char*:"ffff0000000000000000000000000000":char*:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff":char*:"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"
AES-256-XTS Decrypt IEEE P1619/D16 Vector 12
5:char*:"27182818284590452353602874713526624977572470936999595749669676273141592653589793238462643383279502884197169399375105820974944592":char*:"ffffff00000000000000000000000000":char*:"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":char*:"e387aaa58ba483afa7e8eb469778317ecf4cf573aa9d4eac23f2cdf914e4e200a8b490e42ee646802dc6ee2b471b278195d60918ececb44bf79966f83faba0499298ebc699c0c8634715a320bb4f075d622e74c8c932004f25b41e361025b5a87815391f6108fc4afa6a05d9303c6ba68a128a55705d415985832fdeaae6c8e19110e84d1b1f199a2692119edc96132658f09da7c623efcec712537a3d94c0bf5d7e352ec94ae5797fdb377dc1551150721adf15bd26a8efc2fcaad56881fa9e62462c28f30ae1ceaca93c345cf243b73f542e2074a705bd2643bb9f7cc79bb6e7091ea6e232df0f9ad0d6cf502327876d82207abf2115cdacf6d5a48f6c1879a65b115f0f8b3cb3c59d15dd8c769bc014795a1837f3901b5845eb491adfefe097b1fa30a12fc1f65ba22905031539971a10f2f36c321bb51331cdefb39e3964c7ef079994f5b69b2edd83a71ef549971ee93f44eac3938fcdd61d01fa71799da3a8091c4c48aa9ed263ff0749df95d44fef6a0bb578ec69456aa5408ae32c7af08ad7ba8921287e3bbee31b767be06a0e705c864a769137df28292283ea81a2480241b44d9921cdbec1bc28dc1fda114bd8e5217ac9d8ebafa720e9da4f9ace231cc949e5b96fe76ffc21063fddc83a6b8679c00d35e09576a875305bed5f36ed242c8900dd1fa965bc950dfce09b132263a1eef52dd6888c309f5a7d712826"
AES-256-XTS Decrypt IEEE P1619/D16 Vector 13
5:char*:"27182818284590452353602874713526624977572470936999595749669676273141592653589793238462643383279502884197169399375105820974944592":char*:"ffffffff000000000000000000000000":char*:"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":char*:"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"
AES-256-XTS Decrypt IEEE P1619/D16 Vector 14
5:char*:"27182818284590452353602874713526624977572470936999595749669676273141592653589793238462643383279502884197169399375105820974944592":char*:"ffffffffff0000000000000000000000":char*:"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":char*:"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"
AES-128-XTS Decrypt IEEE P1619/D16 Vector 15
5:char*:"fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0bfbebdbcbbbab9b8b7b6b5b4b3b2b1b0":char*:"9a785634120000000000000000000000":char*:"000102030405060708090a0b0c0d0e0f10":char*:"6c1625db4671522d3d7599601de7ca09ed"
AES-128-XTS Decrypt IEEE P1619/D16 Vector 16
5:char*:"fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0bfbebdbcbbbab9b8b7b6b5b4b3b2b1b0":char*:"9a785634120000000000000000000000":char*:"000102030405060708090a0b0c0d0e0f1011":char*:"d069444b7a7e0cab09e24447d24deb1fedbf"
AES-128-XTS Decrypt IEEE P1619/D16 Vector 17
5:char*:"fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0bfbebdbcbbbab9b8b7b6b5b4b3b2b1b0":char*:"9a785634120000000000000000000000":char*:"000102030405060708090a0b0c0d0e0f101112":char*:"e5df1351c0544ba1350b3363cd8ef4beedbf9d"
AES-128-XTS Decrypt IEEE P1619/D16 Vector 18
5:char*:"fffefdfcfbfaf9f8f7f6f5f4f3f2f1f0bfbebdbcbbbab9b8b7b6b5b4b3b2b1b0":char*:"9a785634120000000000000000000000":char*:"000102030405060708090a0b0c0d0e0f10111213":char*:"9d84c813f719aa2c7be3f66171c7c5c2edbf9dac"
AES-128-XTS Decrypt IEEE P1619/D16 Vector 19
5:char*:"e0e1e2e3e4e5e6e7e8e9eaebecedeeefc0c1c2c3c4c5c6c7c8c9cacbcccdcecf":char*:"21436587a90000000000000000000000":char*:"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":char*:"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"
| 60,476 | 142 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/secp384r1_test.c | /*-*- mode:c;indent-tabs-mode:nil;c-basic-offset:2;tab-width:8;coding:utf-8 -*-â
âvi: set net ft=c ts=2 sts=2 sw=2 fenc=utf-8 :viâ
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ¡
â Copyright 2021 Justine Alexandra Roberts Tunney â
â â
â Permission to use, copy, modify, and/or distribute this software for â
â any purpose with or without fee is hereby granted, provided that the â
â above copyright notice and this permission notice appear in all copies. â
â â
â THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL â
â WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED â
â WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE â
â AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL â
â DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR â
â PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER â
â TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR â
â PERFORMANCE OF THIS SOFTWARE. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ*/
#include "libc/stdio/rand.h"
#include "libc/stdio/stdio.h"
#include "libc/str/str.h"
#include "libc/testlib/ezbench.h"
#include "libc/testlib/testlib.h"
#include "third_party/mbedtls/bignum.h"
#include "third_party/mbedtls/ecp.h"
#include "third_party/mbedtls/ecp_internal.h"
#include "third_party/mbedtls/math.h"
#ifdef MBEDTLS_ECP_C
/*P=0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffeffffffff0000000000000000ffffffff*/
int ecp_mod_p384_old(mbedtls_mpi *);
int GetEntropy(void *c, unsigned char *p, size_t n) {
rngset(p, n, _rand64, -1);
return 0;
}
TEST(secp384r1, testIsTheSame) {
int i;
mbedtls_mpi A, B;
mbedtls_mpi_init(&A);
mbedtls_mpi_init(&B);
mbedtls_mpi_fill_random(&A, 12 * 8, GetEntropy, 0);
mbedtls_mpi_copy(&B, &A);
ecp_mod_p384(&A);
ecp_mod_p384_old(&B);
for (i = 0; i < 1000; ++i) {
if (memcmp(A.p, B.p, 12 * 8)) {
for (i = 0; i < 12; ++i) {
printf("0x%016lx vs. 0x%016lx %d\n", A.p[i], B.p[i], A.p[i] == B.p[i]);
}
ASSERT_TRUE(false);
}
}
mbedtls_mpi_free(&B);
mbedtls_mpi_free(&A);
}
TEST(secp384r1, needsDownwardCorrection) {
int i;
uint64_t P[6] = {
0x00000000ffffffff, //
0xffffffff00000000, //
0xfffffffffffffffe, //
0xffffffffffffffff, //
0xffffffffffffffff, //
0xffffffffffffffff, //
};
uint64_t X[12] = {
0xffffffffffffffff, //
0xffffffffffffffff, //
0xffffffffffffffff, //
0xffffffffffffffff, //
0xffffffffffffffff, //
0xffffffffffffffff, //
0xffffffffffffffff, //
0xffffffffffffffff, //
0xffffffffffffffff, //
0xffffffffffffffff, //
0xffffffffffffffff, //
0xffffffffffffffff, //
};
uint64_t W[12] /* == X mod P */ = {
0xfffffffe00000000, //
0x0000000200000000, //
0xfffffffe00000000, //
0x0000000200000000, //
0x0000000000000001, //
};
mbedtls_p384_mod(X);
if (memcmp(W, X, 12 * 8)) {
for (i = 0; i < 12; ++i) {
printf("0x%016lx vs. 0x%016lx %d\n", W[i], X[i], W[i] == X[i]);
}
ASSERT_TRUE(false);
}
}
TEST(secp384r1, needsUpwardCorrection) {
int i;
uint64_t X[12] = {
0x0000000000000000, //
0x0000000000000000, //
0x0000000000000000, //
0x0000000000000000, //
0x0000000000000000, //
0x0000000000000000, //
0x0000000000000000, //
0x0000000000000000, //
0x0000000000000000, //
0x0000000000000000, //
0x0000000000000000, //
0x00000000ffffffff, //
};
uint64_t W[12] /* == X mod P */ = {
0xffffffffffffffff, //
0x0000000000000000, //
0xfffffffefffffffd, //
0x0000000100000000, //
0x0000000000000000, //
0x00000001ffffffff, //
};
mbedtls_p384_mod(X);
if (memcmp(W, X, 12 * 8)) {
for (i = 0; i < 12; ++i) {
printf("0x%016lx vs. 0x%016lx %d\n", W[i], X[i], W[i] == X[i]);
}
ASSERT_TRUE(false);
}
}
TEST(secp384r1, largestInput_quasiModNeedsTwoDownwardCorrections) {
int i;
uint64_t X[12] = {
// X = (P-1)*(P-1)
0xfffffffc00000004, //
0x0000000400000000, //
0xfffffffe00000002, //
0x0000000200000000, //
0x0000000000000001, //
0x0000000000000000, //
0x00000001fffffffc, //
0xfffffffe00000000, //
0xfffffffffffffffd, //
0xffffffffffffffff, //
0xffffffffffffffff, //
0xffffffffffffffff, //
};
uint64_t W[12] /* W = X mod P */ = {
0x0000000000000001, //
};
mbedtls_p384_mod(X);
if (memcmp(W, X, 12 * 8)) {
for (i = 0; i < 12; ++i) {
printf("0x%016lx vs. 0x%016lx %d\n", W[i], X[i], W[i] == X[i]);
}
ASSERT_TRUE(false);
}
}
BENCH(secp384r1, bench) {
mbedtls_mpi A;
mbedtls_mpi_init(&A);
mbedtls_mpi_fill_random(&A, 12 * 8, GetEntropy, 0);
EZBENCH2("secp384r1", donothing, secp384r1(A.p));
EZBENCH2("ecp_mod_p384", donothing, ecp_mod_p384(&A));
EZBENCH2("ecp_mod_p384_old", donothing, ecp_mod_p384_old(&A));
mbedtls_mpi_free(&A);
}
#endif /* MBEDTLS_ECP_C */
| 5,904 | 173 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/everest_unravaged.c | #include "libc/intrin/bits.h"
#include "libc/limits.h"
#include "libc/time/time.h"
#include "third_party/mbedtls/asn1.h"
#include "third_party/mbedtls/bignum.h"
#include "third_party/mbedtls/common.h"
#include "third_party/mbedtls/error.h"
#include "third_party/mbedtls/platform.h"
asm(".ident\t\"\\n\\n\
Everest (Apache 2.0)\\n\
Copyright 2016-2018 INRIA and Microsoft Corporation\"");
asm(".include \"libc/disclaimer.inc\"");
/* clang-format off */
/*
* ECDH with curve-optimized implementation multiplexing
*
* Copyright 2016-2018 INRIA and Microsoft Corporation
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* This file is part of mbed TLS (https://tls.mbed.org)
*/
#define load64_le(b) READ64LE(b)
#define store64_le(b, i) WRITE64LE(b, i)
#define KRML_HOST_EXIT exit
#define KRML_HOST_PRINTF printf
#define KRML_EXIT \
do { \
KRML_HOST_PRINTF("Unimplemented function at %s:%d\n", __FILE__, __LINE__); \
KRML_HOST_EXIT(254); \
} while (0)
#define _KRML_CHECK_SIZE_PRAGMA \
_Pragma("GCC diagnostic ignored \"-Wtype-limits\"")
#define KRML_CHECK_SIZE(size_elt, sz) \
do { \
_KRML_CHECK_SIZE_PRAGMA \
if (((size_t)(sz)) > ((size_t)(SIZE_MAX / (size_elt)))) { \
KRML_HOST_PRINTF( \
"Maximum allocatable size exceeded, aborting before overflow at " \
"%s:%d\n", \
__FILE__, __LINE__); \
KRML_HOST_EXIT(253); \
} \
} while (0)
typedef const char *Prims_string;
typedef struct {
uint32_t length;
const char *data;
} FStar_Bytes_bytes;
typedef int32_t Prims_pos, Prims_nat, Prims_nonzero, Prims_int,
krml_checked_int_t;
/* Prims_nat not yet in scope */
inline static int32_t krml_time() {
return (int32_t)time(NULL);
}
static uint64_t FStar_UInt64_eq_mask(uint64_t a, uint64_t b)
{
uint64_t x = a ^ b;
uint64_t minus_x = ~x + (uint64_t)1U;
uint64_t x_or_minus_x = x | minus_x;
uint64_t xnx = x_or_minus_x >> (uint32_t)63U;
return xnx - (uint64_t)1U;
}
static uint64_t FStar_UInt64_gte_mask(uint64_t a, uint64_t b)
{
uint64_t x = a;
uint64_t y = b;
uint64_t x_xor_y = x ^ y;
uint64_t x_sub_y = x - y;
uint64_t x_sub_y_xor_y = x_sub_y ^ y;
uint64_t q = x_xor_y | x_sub_y_xor_y;
uint64_t x_xor_q = x ^ q;
uint64_t x_xor_q_ = x_xor_q >> (uint32_t)63U;
return x_xor_q_ - (uint64_t)1U;
}
static uint32_t FStar_UInt32_eq_mask(uint32_t a, uint32_t b)
{
uint32_t x = a ^ b;
uint32_t minus_x = ~x + (uint32_t)1U;
uint32_t x_or_minus_x = x | minus_x;
uint32_t xnx = x_or_minus_x >> (uint32_t)31U;
return xnx - (uint32_t)1U;
}
static uint32_t FStar_UInt32_gte_mask(uint32_t a, uint32_t b)
{
uint32_t x = a;
uint32_t y = b;
uint32_t x_xor_y = x ^ y;
uint32_t x_sub_y = x - y;
uint32_t x_sub_y_xor_y = x_sub_y ^ y;
uint32_t q = x_xor_y | x_sub_y_xor_y;
uint32_t x_xor_q = x ^ q;
uint32_t x_xor_q_ = x_xor_q >> (uint32_t)31U;
return x_xor_q_ - (uint32_t)1U;
}
static uint16_t FStar_UInt16_eq_mask(uint16_t a, uint16_t b)
{
uint16_t x = a ^ b;
uint16_t minus_x = ~x + (uint16_t)1U;
uint16_t x_or_minus_x = x | minus_x;
uint16_t xnx = x_or_minus_x >> (uint32_t)15U;
return xnx - (uint16_t)1U;
}
static uint16_t FStar_UInt16_gte_mask(uint16_t a, uint16_t b)
{
uint16_t x = a;
uint16_t y = b;
uint16_t x_xor_y = x ^ y;
uint16_t x_sub_y = x - y;
uint16_t x_sub_y_xor_y = x_sub_y ^ y;
uint16_t q = x_xor_y | x_sub_y_xor_y;
uint16_t x_xor_q = x ^ q;
uint16_t x_xor_q_ = x_xor_q >> (uint32_t)15U;
return x_xor_q_ - (uint16_t)1U;
}
static uint8_t FStar_UInt8_eq_mask(uint8_t a, uint8_t b)
{
uint8_t x = a ^ b;
uint8_t minus_x = ~x + (uint8_t)1U;
uint8_t x_or_minus_x = x | minus_x;
uint8_t xnx = x_or_minus_x >> (uint32_t)7U;
return xnx - (uint8_t)1U;
}
static uint8_t FStar_UInt8_gte_mask(uint8_t a, uint8_t b)
{
uint8_t x = a;
uint8_t y = b;
uint8_t x_xor_y = x ^ y;
uint8_t x_sub_y = x - y;
uint8_t x_sub_y_xor_y = x_sub_y ^ y;
uint8_t q = x_xor_y | x_sub_y_xor_y;
uint8_t x_xor_q = x ^ q;
uint8_t x_xor_q_ = x_xor_q >> (uint32_t)7U;
return x_xor_q_ - (uint8_t)1U;
}
static void Hacl_Bignum_Modulo_carry_top(uint64_t *b)
{
uint64_t b4 = b[4U];
uint64_t b0 = b[0U];
uint64_t b4_ = b4 & (uint64_t)0x7ffffffffffffU;
uint64_t b0_ = b0 + (uint64_t)19U * (b4 >> (uint32_t)51U);
b[4U] = b4_;
b[0U] = b0_;
}
inline static void Hacl_Bignum_Fproduct_copy_from_wide_(uint64_t *output, uint128_t *input)
{
uint32_t i;
for (i = (uint32_t)0U; i < (uint32_t)5U; i = i + (uint32_t)1U)
{
uint128_t xi = input[i];
output[i] = (uint64_t)xi;
}
}
inline static void
Hacl_Bignum_Fproduct_sum_scalar_multiplication_(uint128_t *output, uint64_t *input, uint64_t s)
{
uint32_t i;
for (i = (uint32_t)0U; i < (uint32_t)5U; i = i + (uint32_t)1U)
{
uint128_t xi = output[i];
uint64_t yi = input[i];
output[i] = xi + (uint128_t)yi * s;
}
}
inline static void Hacl_Bignum_Fproduct_carry_wide_(uint128_t *tmp)
{
uint32_t i;
for (i = (uint32_t)0U; i < (uint32_t)4U; i = i + (uint32_t)1U)
{
uint32_t ctr = i;
uint128_t tctr = tmp[ctr];
uint128_t tctrp1 = tmp[ctr + (uint32_t)1U];
uint64_t r0 = (uint64_t)tctr & (uint64_t)0x7ffffffffffffU;
uint128_t c = tctr >> (uint32_t)51U;
tmp[ctr] = (uint128_t)r0;
tmp[ctr + (uint32_t)1U] = tctrp1 + c;
}
}
inline static void Hacl_Bignum_Fmul_shift_reduce(uint64_t *output)
{
uint64_t tmp = output[4U];
uint64_t b0;
{
uint32_t i;
for (i = (uint32_t)0U; i < (uint32_t)4U; i = i + (uint32_t)1U)
{
uint32_t ctr = (uint32_t)5U - i - (uint32_t)1U;
uint64_t z = output[ctr - (uint32_t)1U];
output[ctr] = z;
}
}
output[0U] = tmp;
b0 = output[0U];
output[0U] = (uint64_t)19U * b0;
}
static void
Hacl_Bignum_Fmul_mul_shift_reduce_(uint128_t *output, uint64_t *input, uint64_t *input2)
{
uint32_t i;
uint64_t input2i;
{
uint32_t i0;
for (i0 = (uint32_t)0U; i0 < (uint32_t)4U; i0 = i0 + (uint32_t)1U)
{
uint64_t input2i0 = input2[i0];
Hacl_Bignum_Fproduct_sum_scalar_multiplication_(output, input, input2i0);
Hacl_Bignum_Fmul_shift_reduce(input);
}
}
i = (uint32_t)4U;
input2i = input2[i];
Hacl_Bignum_Fproduct_sum_scalar_multiplication_(output, input, input2i);
}
inline static void Hacl_Bignum_Fmul_fmul(uint64_t *output, uint64_t *input, uint64_t *input2)
{
uint64_t tmp[5U] = { 0U };
memcpy(tmp, input, (uint32_t)5U * sizeof input[0U]);
KRML_CHECK_SIZE(sizeof (uint128_t), (uint32_t)5U);
{
uint128_t t[5U];
{
uint32_t _i;
for (_i = 0U; _i < (uint32_t)5U; ++_i)
t[_i] = (uint128_t)(uint64_t)0U;
}
{
uint128_t b4;
uint128_t b0;
uint128_t b4_;
uint128_t b0_;
uint64_t i0;
uint64_t i1;
uint64_t i0_;
uint64_t i1_;
Hacl_Bignum_Fmul_mul_shift_reduce_(t, tmp, input2);
Hacl_Bignum_Fproduct_carry_wide_(t);
b4 = t[4U];
b0 = t[0U];
b4_ = b4 & (uint128_t)(uint64_t)0x7ffffffffffffU;
b0_ = b0 + (uint128_t)(uint64_t)19U * (uint64_t)(b4 >> (uint32_t)51U);
t[4U] = b4_;
t[0U] = b0_;
Hacl_Bignum_Fproduct_copy_from_wide_(output, t);
i0 = output[0U];
i1 = output[1U];
i0_ = i0 & (uint64_t)0x7ffffffffffffU;
i1_ = i1 + (i0 >> (uint32_t)51U);
output[0U] = i0_;
output[1U] = i1_;
}
}
}
inline static void Hacl_Bignum_Fsquare_fsquare__(uint128_t *tmp, uint64_t *output)
{
uint64_t r0 = output[0U];
uint64_t r1 = output[1U];
uint64_t r2 = output[2U];
uint64_t r3 = output[3U];
uint64_t r4 = output[4U];
uint64_t d0 = r0 * (uint64_t)2U;
uint64_t d1 = r1 * (uint64_t)2U;
uint64_t d2 = r2 * (uint64_t)2U * (uint64_t)19U;
uint64_t d419 = r4 * (uint64_t)19U;
uint64_t d4 = d419 * (uint64_t)2U;
uint128_t s0 = (uint128_t)r0 * r0 + (uint128_t)d4 * r1 + (uint128_t)d2 * r3;
uint128_t s1 = (uint128_t)d0 * r1 + (uint128_t)d4 * r2 + (uint128_t)(r3 * (uint64_t)19U) * r3;
uint128_t s2 = (uint128_t)d0 * r2 + (uint128_t)r1 * r1 + (uint128_t)d4 * r3;
uint128_t s3 = (uint128_t)d0 * r3 + (uint128_t)d1 * r2 + (uint128_t)r4 * d419;
uint128_t s4 = (uint128_t)d0 * r4 + (uint128_t)d1 * r3 + (uint128_t)r2 * r2;
tmp[0U] = s0;
tmp[1U] = s1;
tmp[2U] = s2;
tmp[3U] = s3;
tmp[4U] = s4;
}
inline static void Hacl_Bignum_Fsquare_fsquare_(uint128_t *tmp, uint64_t *output)
{
uint128_t b4;
uint128_t b0;
uint128_t b4_;
uint128_t b0_;
uint64_t i0;
uint64_t i1;
uint64_t i0_;
uint64_t i1_;
Hacl_Bignum_Fsquare_fsquare__(tmp, output);
Hacl_Bignum_Fproduct_carry_wide_(tmp);
b4 = tmp[4U];
b0 = tmp[0U];
b4_ = b4 & (uint128_t)(uint64_t)0x7ffffffffffffU;
b0_ = b0 + (uint128_t)(uint64_t)19U * (uint64_t)(b4 >> (uint32_t)51U);
tmp[4U] = b4_;
tmp[0U] = b0_;
Hacl_Bignum_Fproduct_copy_from_wide_(output, tmp);
i0 = output[0U];
i1 = output[1U];
i0_ = i0 & (uint64_t)0x7ffffffffffffU;
i1_ = i1 + (i0 >> (uint32_t)51U);
output[0U] = i0_;
output[1U] = i1_;
}
static void
Hacl_Bignum_Fsquare_fsquare_times_(uint64_t *input, uint128_t *tmp, uint32_t count1)
{
uint32_t i;
Hacl_Bignum_Fsquare_fsquare_(tmp, input);
for (i = (uint32_t)1U; i < count1; i = i + (uint32_t)1U)
Hacl_Bignum_Fsquare_fsquare_(tmp, input);
}
inline static void
Hacl_Bignum_Fsquare_fsquare_times(uint64_t *output, uint64_t *input, uint32_t count1)
{
KRML_CHECK_SIZE(sizeof (uint128_t), (uint32_t)5U);
{
uint128_t t[5U];
{
uint32_t _i;
for (_i = 0U; _i < (uint32_t)5U; ++_i)
t[_i] = (uint128_t)(uint64_t)0U;
}
memcpy(output, input, (uint32_t)5U * sizeof input[0U]);
Hacl_Bignum_Fsquare_fsquare_times_(output, t, count1);
}
}
inline static void Hacl_Bignum_Fsquare_fsquare_times_inplace(uint64_t *output, uint32_t count1)
{
KRML_CHECK_SIZE(sizeof (uint128_t), (uint32_t)5U);
{
uint128_t t[5U];
{
uint32_t _i;
for (_i = 0U; _i < (uint32_t)5U; ++_i)
t[_i] = (uint128_t)(uint64_t)0U;
}
Hacl_Bignum_Fsquare_fsquare_times_(output, t, count1);
}
}
inline static void Hacl_Bignum_Crecip_crecip(uint64_t *out, uint64_t *z)
{
uint64_t buf[20U] = { 0U };
uint64_t *a0 = buf;
uint64_t *t00 = buf + (uint32_t)5U;
uint64_t *b0 = buf + (uint32_t)10U;
uint64_t *t01;
uint64_t *b1;
uint64_t *c0;
uint64_t *a;
uint64_t *t0;
uint64_t *b;
uint64_t *c;
Hacl_Bignum_Fsquare_fsquare_times(a0, z, (uint32_t)1U);
Hacl_Bignum_Fsquare_fsquare_times(t00, a0, (uint32_t)2U);
Hacl_Bignum_Fmul_fmul(b0, t00, z);
Hacl_Bignum_Fmul_fmul(a0, b0, a0);
Hacl_Bignum_Fsquare_fsquare_times(t00, a0, (uint32_t)1U);
Hacl_Bignum_Fmul_fmul(b0, t00, b0);
Hacl_Bignum_Fsquare_fsquare_times(t00, b0, (uint32_t)5U);
t01 = buf + (uint32_t)5U;
b1 = buf + (uint32_t)10U;
c0 = buf + (uint32_t)15U;
Hacl_Bignum_Fmul_fmul(b1, t01, b1);
Hacl_Bignum_Fsquare_fsquare_times(t01, b1, (uint32_t)10U);
Hacl_Bignum_Fmul_fmul(c0, t01, b1);
Hacl_Bignum_Fsquare_fsquare_times(t01, c0, (uint32_t)20U);
Hacl_Bignum_Fmul_fmul(t01, t01, c0);
Hacl_Bignum_Fsquare_fsquare_times_inplace(t01, (uint32_t)10U);
Hacl_Bignum_Fmul_fmul(b1, t01, b1);
Hacl_Bignum_Fsquare_fsquare_times(t01, b1, (uint32_t)50U);
a = buf;
t0 = buf + (uint32_t)5U;
b = buf + (uint32_t)10U;
c = buf + (uint32_t)15U;
Hacl_Bignum_Fmul_fmul(c, t0, b);
Hacl_Bignum_Fsquare_fsquare_times(t0, c, (uint32_t)100U);
Hacl_Bignum_Fmul_fmul(t0, t0, c);
Hacl_Bignum_Fsquare_fsquare_times_inplace(t0, (uint32_t)50U);
Hacl_Bignum_Fmul_fmul(t0, t0, b);
Hacl_Bignum_Fsquare_fsquare_times_inplace(t0, (uint32_t)5U);
Hacl_Bignum_Fmul_fmul(out, t0, a);
}
inline static void Hacl_Bignum_fsum(uint64_t *a, uint64_t *b)
{
uint32_t i;
for (i = (uint32_t)0U; i < (uint32_t)5U; i = i + (uint32_t)1U)
{
uint64_t xi = a[i];
uint64_t yi = b[i];
a[i] = xi + yi;
}
}
inline static void Hacl_Bignum_fdifference(uint64_t *a, uint64_t *b)
{
uint64_t tmp[5U] = { 0U };
uint64_t b0;
uint64_t b1;
uint64_t b2;
uint64_t b3;
uint64_t b4;
memcpy(tmp, b, (uint32_t)5U * sizeof b[0U]);
b0 = tmp[0U];
b1 = tmp[1U];
b2 = tmp[2U];
b3 = tmp[3U];
b4 = tmp[4U];
tmp[0U] = b0 + (uint64_t)0x3fffffffffff68U;
tmp[1U] = b1 + (uint64_t)0x3ffffffffffff8U;
tmp[2U] = b2 + (uint64_t)0x3ffffffffffff8U;
tmp[3U] = b3 + (uint64_t)0x3ffffffffffff8U;
tmp[4U] = b4 + (uint64_t)0x3ffffffffffff8U;
{
uint32_t i;
for (i = (uint32_t)0U; i < (uint32_t)5U; i = i + (uint32_t)1U)
{
uint64_t xi = a[i];
uint64_t yi = tmp[i];
a[i] = yi - xi;
}
}
}
inline static void Hacl_Bignum_fscalar(uint64_t *output, uint64_t *b, uint64_t s)
{
KRML_CHECK_SIZE(sizeof (uint128_t), (uint32_t)5U);
{
uint128_t tmp[5U];
{
uint32_t _i;
for (_i = 0U; _i < (uint32_t)5U; ++_i)
tmp[_i] = (uint128_t)(uint64_t)0U;
}
{
uint128_t b4;
uint128_t b0;
uint128_t b4_;
uint128_t b0_;
{
uint32_t i;
for (i = (uint32_t)0U; i < (uint32_t)5U; i = i + (uint32_t)1U)
{
uint64_t xi = b[i];
tmp[i] = (uint128_t)xi * s;
}
}
Hacl_Bignum_Fproduct_carry_wide_(tmp);
b4 = tmp[4U];
b0 = tmp[0U];
b4_ = b4 & (uint128_t)(uint64_t)0x7ffffffffffffU;
b0_ = b0 + (uint128_t)(uint64_t)19U * (uint64_t)(b4 >> (uint32_t)51U);
tmp[4U] = b4_;
tmp[0U] = b0_;
Hacl_Bignum_Fproduct_copy_from_wide_(output, tmp);
}
}
}
inline static void Hacl_Bignum_fmul(uint64_t *output, uint64_t *a, uint64_t *b)
{
Hacl_Bignum_Fmul_fmul(output, a, b);
}
inline static void Hacl_Bignum_crecip(uint64_t *output, uint64_t *input)
{
Hacl_Bignum_Crecip_crecip(output, input);
}
static void
Hacl_EC_Point_swap_conditional_step(uint64_t *a, uint64_t *b, uint64_t swap1, uint32_t ctr)
{
uint32_t i = ctr - (uint32_t)1U;
uint64_t ai = a[i];
uint64_t bi = b[i];
uint64_t x = swap1 & (ai ^ bi);
uint64_t ai1 = ai ^ x;
uint64_t bi1 = bi ^ x;
a[i] = ai1;
b[i] = bi1;
}
static void
Hacl_EC_Point_swap_conditional_(uint64_t *a, uint64_t *b, uint64_t swap1, uint32_t ctr)
{
if (!(ctr == (uint32_t)0U))
{
uint32_t i;
Hacl_EC_Point_swap_conditional_step(a, b, swap1, ctr);
i = ctr - (uint32_t)1U;
Hacl_EC_Point_swap_conditional_(a, b, swap1, i);
}
}
static void Hacl_EC_Point_swap_conditional(uint64_t *a, uint64_t *b, uint64_t iswap)
{
uint64_t swap1 = (uint64_t)0U - iswap;
Hacl_EC_Point_swap_conditional_(a, b, swap1, (uint32_t)5U);
Hacl_EC_Point_swap_conditional_(a + (uint32_t)5U, b + (uint32_t)5U, swap1, (uint32_t)5U);
}
static void Hacl_EC_Point_copy(uint64_t *output, uint64_t *input)
{
memcpy(output, input, (uint32_t)5U * sizeof input[0U]);
memcpy(output + (uint32_t)5U,
input + (uint32_t)5U,
(uint32_t)5U * sizeof (input + (uint32_t)5U)[0U]);
}
static void Hacl_EC_Format_fexpand(uint64_t *output, uint8_t *input)
{
uint64_t i0 = load64_le(input);
uint8_t *x00 = input + (uint32_t)6U;
uint64_t i1 = load64_le(x00);
uint8_t *x01 = input + (uint32_t)12U;
uint64_t i2 = load64_le(x01);
uint8_t *x02 = input + (uint32_t)19U;
uint64_t i3 = load64_le(x02);
uint8_t *x0 = input + (uint32_t)24U;
uint64_t i4 = load64_le(x0);
uint64_t output0 = i0 & (uint64_t)0x7ffffffffffffU;
uint64_t output1 = i1 >> (uint32_t)3U & (uint64_t)0x7ffffffffffffU;
uint64_t output2 = i2 >> (uint32_t)6U & (uint64_t)0x7ffffffffffffU;
uint64_t output3 = i3 >> (uint32_t)1U & (uint64_t)0x7ffffffffffffU;
uint64_t output4 = i4 >> (uint32_t)12U & (uint64_t)0x7ffffffffffffU;
output[0U] = output0;
output[1U] = output1;
output[2U] = output2;
output[3U] = output3;
output[4U] = output4;
}
static void Hacl_EC_Format_fcontract_first_carry_pass(uint64_t *input)
{
uint64_t t0 = input[0U];
uint64_t t1 = input[1U];
uint64_t t2 = input[2U];
uint64_t t3 = input[3U];
uint64_t t4 = input[4U];
uint64_t t1_ = t1 + (t0 >> (uint32_t)51U);
uint64_t t0_ = t0 & (uint64_t)0x7ffffffffffffU;
uint64_t t2_ = t2 + (t1_ >> (uint32_t)51U);
uint64_t t1__ = t1_ & (uint64_t)0x7ffffffffffffU;
uint64_t t3_ = t3 + (t2_ >> (uint32_t)51U);
uint64_t t2__ = t2_ & (uint64_t)0x7ffffffffffffU;
uint64_t t4_ = t4 + (t3_ >> (uint32_t)51U);
uint64_t t3__ = t3_ & (uint64_t)0x7ffffffffffffU;
input[0U] = t0_;
input[1U] = t1__;
input[2U] = t2__;
input[3U] = t3__;
input[4U] = t4_;
}
static void Hacl_EC_Format_fcontract_first_carry_full(uint64_t *input)
{
Hacl_EC_Format_fcontract_first_carry_pass(input);
Hacl_Bignum_Modulo_carry_top(input);
}
static void Hacl_EC_Format_fcontract_second_carry_pass(uint64_t *input)
{
uint64_t t0 = input[0U];
uint64_t t1 = input[1U];
uint64_t t2 = input[2U];
uint64_t t3 = input[3U];
uint64_t t4 = input[4U];
uint64_t t1_ = t1 + (t0 >> (uint32_t)51U);
uint64_t t0_ = t0 & (uint64_t)0x7ffffffffffffU;
uint64_t t2_ = t2 + (t1_ >> (uint32_t)51U);
uint64_t t1__ = t1_ & (uint64_t)0x7ffffffffffffU;
uint64_t t3_ = t3 + (t2_ >> (uint32_t)51U);
uint64_t t2__ = t2_ & (uint64_t)0x7ffffffffffffU;
uint64_t t4_ = t4 + (t3_ >> (uint32_t)51U);
uint64_t t3__ = t3_ & (uint64_t)0x7ffffffffffffU;
input[0U] = t0_;
input[1U] = t1__;
input[2U] = t2__;
input[3U] = t3__;
input[4U] = t4_;
}
static void Hacl_EC_Format_fcontract_second_carry_full(uint64_t *input)
{
uint64_t i0;
uint64_t i1;
uint64_t i0_;
uint64_t i1_;
Hacl_EC_Format_fcontract_second_carry_pass(input);
Hacl_Bignum_Modulo_carry_top(input);
i0 = input[0U];
i1 = input[1U];
i0_ = i0 & (uint64_t)0x7ffffffffffffU;
i1_ = i1 + (i0 >> (uint32_t)51U);
input[0U] = i0_;
input[1U] = i1_;
}
static void Hacl_EC_Format_fcontract_trim(uint64_t *input)
{
uint64_t a0 = input[0U];
uint64_t a1 = input[1U];
uint64_t a2 = input[2U];
uint64_t a3 = input[3U];
uint64_t a4 = input[4U];
uint64_t mask0 = FStar_UInt64_gte_mask(a0, (uint64_t)0x7ffffffffffedU);
uint64_t mask1 = FStar_UInt64_eq_mask(a1, (uint64_t)0x7ffffffffffffU);
uint64_t mask2 = FStar_UInt64_eq_mask(a2, (uint64_t)0x7ffffffffffffU);
uint64_t mask3 = FStar_UInt64_eq_mask(a3, (uint64_t)0x7ffffffffffffU);
uint64_t mask4 = FStar_UInt64_eq_mask(a4, (uint64_t)0x7ffffffffffffU);
uint64_t mask = (((mask0 & mask1) & mask2) & mask3) & mask4;
uint64_t a0_ = a0 - ((uint64_t)0x7ffffffffffedU & mask);
uint64_t a1_ = a1 - ((uint64_t)0x7ffffffffffffU & mask);
uint64_t a2_ = a2 - ((uint64_t)0x7ffffffffffffU & mask);
uint64_t a3_ = a3 - ((uint64_t)0x7ffffffffffffU & mask);
uint64_t a4_ = a4 - ((uint64_t)0x7ffffffffffffU & mask);
input[0U] = a0_;
input[1U] = a1_;
input[2U] = a2_;
input[3U] = a3_;
input[4U] = a4_;
}
static void Hacl_EC_Format_fcontract_store(uint8_t *output, uint64_t *input)
{
uint64_t t0 = input[0U];
uint64_t t1 = input[1U];
uint64_t t2 = input[2U];
uint64_t t3 = input[3U];
uint64_t t4 = input[4U];
uint64_t o0 = t1 << (uint32_t)51U | t0;
uint64_t o1 = t2 << (uint32_t)38U | t1 >> (uint32_t)13U;
uint64_t o2 = t3 << (uint32_t)25U | t2 >> (uint32_t)26U;
uint64_t o3 = t4 << (uint32_t)12U | t3 >> (uint32_t)39U;
uint8_t *b0 = output;
uint8_t *b1 = output + (uint32_t)8U;
uint8_t *b2 = output + (uint32_t)16U;
uint8_t *b3 = output + (uint32_t)24U;
store64_le(b0, o0);
store64_le(b1, o1);
store64_le(b2, o2);
store64_le(b3, o3);
}
static void Hacl_EC_Format_fcontract(uint8_t *output, uint64_t *input)
{
Hacl_EC_Format_fcontract_first_carry_full(input);
Hacl_EC_Format_fcontract_second_carry_full(input);
Hacl_EC_Format_fcontract_trim(input);
Hacl_EC_Format_fcontract_store(output, input);
}
static void Hacl_EC_Format_scalar_of_point(uint8_t *scalar, uint64_t *point)
{
uint64_t *x = point;
uint64_t *z = point + (uint32_t)5U;
uint64_t buf[10U] = { 0U };
uint64_t *zmone = buf;
uint64_t *sc = buf + (uint32_t)5U;
Hacl_Bignum_crecip(zmone, z);
Hacl_Bignum_fmul(sc, x, zmone);
Hacl_EC_Format_fcontract(scalar, sc);
}
static void
Hacl_EC_AddAndDouble_fmonty(
uint64_t *pp,
uint64_t *ppq,
uint64_t *p,
uint64_t *pq,
uint64_t *qmqp
)
{
uint64_t *qx = qmqp;
uint64_t *x2 = pp;
uint64_t *z2 = pp + (uint32_t)5U;
uint64_t *x3 = ppq;
uint64_t *z3 = ppq + (uint32_t)5U;
uint64_t *x = p;
uint64_t *z = p + (uint32_t)5U;
uint64_t *xprime = pq;
uint64_t *zprime = pq + (uint32_t)5U;
uint64_t buf[40U] = { 0U };
uint64_t *origx = buf;
uint64_t *origxprime0 = buf + (uint32_t)5U;
uint64_t *xxprime0 = buf + (uint32_t)25U;
uint64_t *zzprime0 = buf + (uint32_t)30U;
uint64_t *origxprime;
uint64_t *xx0;
uint64_t *zz0;
uint64_t *xxprime;
uint64_t *zzprime;
uint64_t *zzzprime;
uint64_t *zzz;
uint64_t *xx;
uint64_t *zz;
uint64_t scalar;
memcpy(origx, x, (uint32_t)5U * sizeof x[0U]);
Hacl_Bignum_fsum(x, z);
Hacl_Bignum_fdifference(z, origx);
memcpy(origxprime0, xprime, (uint32_t)5U * sizeof xprime[0U]);
Hacl_Bignum_fsum(xprime, zprime);
Hacl_Bignum_fdifference(zprime, origxprime0);
Hacl_Bignum_fmul(xxprime0, xprime, z);
Hacl_Bignum_fmul(zzprime0, x, zprime);
origxprime = buf + (uint32_t)5U;
xx0 = buf + (uint32_t)15U;
zz0 = buf + (uint32_t)20U;
xxprime = buf + (uint32_t)25U;
zzprime = buf + (uint32_t)30U;
zzzprime = buf + (uint32_t)35U;
memcpy(origxprime, xxprime, (uint32_t)5U * sizeof xxprime[0U]);
Hacl_Bignum_fsum(xxprime, zzprime);
Hacl_Bignum_fdifference(zzprime, origxprime);
Hacl_Bignum_Fsquare_fsquare_times(x3, xxprime, (uint32_t)1U);
Hacl_Bignum_Fsquare_fsquare_times(zzzprime, zzprime, (uint32_t)1U);
Hacl_Bignum_fmul(z3, zzzprime, qx);
Hacl_Bignum_Fsquare_fsquare_times(xx0, x, (uint32_t)1U);
Hacl_Bignum_Fsquare_fsquare_times(zz0, z, (uint32_t)1U);
zzz = buf + (uint32_t)10U;
xx = buf + (uint32_t)15U;
zz = buf + (uint32_t)20U;
Hacl_Bignum_fmul(x2, xx, zz);
Hacl_Bignum_fdifference(zz, xx);
scalar = (uint64_t)121665U;
Hacl_Bignum_fscalar(zzz, zz, scalar);
Hacl_Bignum_fsum(zzz, xx);
Hacl_Bignum_fmul(z2, zzz, zz);
}
static void
Hacl_EC_Ladder_SmallLoop_cmult_small_loop_step(
uint64_t *nq,
uint64_t *nqpq,
uint64_t *nq2,
uint64_t *nqpq2,
uint64_t *q,
uint8_t byt
)
{
uint64_t bit0 = (uint64_t)(byt >> (uint32_t)7U);
uint64_t bit;
Hacl_EC_Point_swap_conditional(nq, nqpq, bit0);
Hacl_EC_AddAndDouble_fmonty(nq2, nqpq2, nq, nqpq, q);
bit = (uint64_t)(byt >> (uint32_t)7U);
Hacl_EC_Point_swap_conditional(nq2, nqpq2, bit);
}
static void
Hacl_EC_Ladder_SmallLoop_cmult_small_loop_double_step(
uint64_t *nq,
uint64_t *nqpq,
uint64_t *nq2,
uint64_t *nqpq2,
uint64_t *q,
uint8_t byt
)
{
uint8_t byt1;
Hacl_EC_Ladder_SmallLoop_cmult_small_loop_step(nq, nqpq, nq2, nqpq2, q, byt);
byt1 = byt << (uint32_t)1U;
Hacl_EC_Ladder_SmallLoop_cmult_small_loop_step(nq2, nqpq2, nq, nqpq, q, byt1);
}
static void
Hacl_EC_Ladder_SmallLoop_cmult_small_loop(
uint64_t *nq,
uint64_t *nqpq,
uint64_t *nq2,
uint64_t *nqpq2,
uint64_t *q,
uint8_t byt,
uint32_t i
)
{
if (!(i == (uint32_t)0U))
{
uint32_t i_ = i - (uint32_t)1U;
uint8_t byt_;
Hacl_EC_Ladder_SmallLoop_cmult_small_loop_double_step(nq, nqpq, nq2, nqpq2, q, byt);
byt_ = byt << (uint32_t)2U;
Hacl_EC_Ladder_SmallLoop_cmult_small_loop(nq, nqpq, nq2, nqpq2, q, byt_, i_);
}
}
static void
Hacl_EC_Ladder_BigLoop_cmult_big_loop(
uint8_t *n1,
uint64_t *nq,
uint64_t *nqpq,
uint64_t *nq2,
uint64_t *nqpq2,
uint64_t *q,
uint32_t i
)
{
if (!(i == (uint32_t)0U))
{
uint32_t i1 = i - (uint32_t)1U;
uint8_t byte = n1[i1];
Hacl_EC_Ladder_SmallLoop_cmult_small_loop(nq, nqpq, nq2, nqpq2, q, byte, (uint32_t)4U);
Hacl_EC_Ladder_BigLoop_cmult_big_loop(n1, nq, nqpq, nq2, nqpq2, q, i1);
}
}
static void Hacl_EC_Ladder_cmult(uint64_t *result, uint8_t *n1, uint64_t *q)
{
uint64_t point_buf[40U] = { 0U };
uint64_t *nq = point_buf;
uint64_t *nqpq = point_buf + (uint32_t)10U;
uint64_t *nq2 = point_buf + (uint32_t)20U;
uint64_t *nqpq2 = point_buf + (uint32_t)30U;
Hacl_EC_Point_copy(nqpq, q);
nq[0U] = (uint64_t)1U;
Hacl_EC_Ladder_BigLoop_cmult_big_loop(n1, nq, nqpq, nq2, nqpq2, q, (uint32_t)32U);
Hacl_EC_Point_copy(result, nq);
}
void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint)
{
uint64_t buf0[10U] = { 0U };
uint64_t *x0 = buf0;
uint64_t *z = buf0 + (uint32_t)5U;
uint64_t *q;
Hacl_EC_Format_fexpand(x0, basepoint);
z[0U] = (uint64_t)1U;
q = buf0;
{
uint8_t e[32U] = { 0U };
uint8_t e0;
uint8_t e31;
uint8_t e01;
uint8_t e311;
uint8_t e312;
uint8_t *scalar;
memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]);
e0 = e[0U];
e31 = e[31U];
e01 = e0 & (uint8_t)248U;
e311 = e31 & (uint8_t)127U;
e312 = e311 | (uint8_t)64U;
e[0U] = e01;
e[31U] = e312;
scalar = e;
{
uint64_t buf[15U] = { 0U };
uint64_t *nq = buf;
uint64_t *x = nq;
x[0U] = (uint64_t)1U;
Hacl_EC_Ladder_cmult(nq, scalar, q);
Hacl_EC_Format_scalar_of_point(mypublic, nq);
}
}
}
| 26,181 | 896 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_oid.datax | OID get Any Policy certificate policy
0:hex:"551D2000":char*:"Any Policy"
OID get certificate policy invalid oid
0:hex:"5533445566":char*:""
OID get certificate policy wrong oid - id-ce-authorityKeyIdentifier
0:hex:"551D23":char*:""
OID get Ext Key Usage - id-kp-serverAuth
1:hex:"2B06010505070301":char*:"TLS Web Server Authentication"
OID get Ext Key Usage - id-kp-clientAuth
1:hex:"2B06010505070302":char*:"TLS Web Client Authentication"
OID get Ext Key Usage - id-kp-codeSigning
1:hex:"2B06010505070303":char*:"Code Signing"
OID get Ext Key Usage - id-kp-emailProtection
1:hex:"2B06010505070304":char*:"E-mail Protection"
OID get Ext Key Usage - id-kp-timeStamping
1:hex:"2B06010505070308":char*:"Time Stamping"
OID get Ext Key Usage - id-kp-OCSPSigning
1:hex:"2B06010505070309":char*:"OCSP Signing"
OID get Ext Key Usage invalid oid
1:hex:"5533445566":char*:""
OID get Ext Key Usage wrong oid - id-ce-authorityKeyIdentifier
1:hex:"551D23":char*:""
OID get x509 extension - id-ce-basicConstraints
2:hex:"551D13":exp:0
OID get x509 extension - id-ce-keyUsage
2:hex:"551D0F":exp:1
OID get x509 extension - id-ce-extKeyUsage
2:hex:"551D25":exp:2
OID get x509 extension - id-ce-subjectAltName
2:hex:"551D11":exp:3
OID get x509 extension - id-netscape-certtype
2:hex:"6086480186F8420101":exp:4
OID get x509 extension - id-ce-certificatePolicies
2:hex:"551D20":exp:5
OID get x509 extension - invalid oid
2:hex:"5533445566":int:0
OID get x509 extension - wrong oid - id-ce
2:hex:"551D":int:0
OID hash id - id-md5
depends_on:0
3:hex:"2A864886f70d0205":exp:6
OID hash id - id-sha1
depends_on:1
3:hex:"2b0e03021a":exp:7
OID hash id - id-sha224
depends_on:2
3:hex:"608648016503040204":exp:8
OID hash id - id-sha256
depends_on:2
3:hex:"608648016503040201":exp:9
OID hash id - id-sha384
depends_on:3
3:hex:"608648016503040202":exp:10
OID hash id - id-sha512
depends_on:3
3:hex:"608648016503040203":exp:11
OID hash id - id-ripemd160
depends_on:4
3:hex:"2b24030201":exp:12
OID hash id - invalid oid
3:hex:"2B864886f70d0204":exp:13
| 2,047 | 89 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_nist_kw.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_nist_kw.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_nist_kw.function
* Test suite data : suites/test_suite_nist_kw.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_NIST_KW_C)
#include "third_party/mbedtls/nist_kw.h"
#if defined(MBEDTLS_SELF_TEST)
#if defined(MBEDTLS_AES_C)
void test_mbedtls_nist_kw_self_test( )
{
TEST_ASSERT( mbedtls_nist_kw_self_test( 1 ) == 0 );
exit:
;
}
void test_mbedtls_nist_kw_self_test_wrapper( void ** params )
{
(void)params;
test_mbedtls_nist_kw_self_test( );
}
#endif /* MBEDTLS_AES_C */
#endif /* MBEDTLS_SELF_TEST */
#if defined(MBEDTLS_AES_C)
void test_mbedtls_nist_kw_mix_contexts( )
{
mbedtls_nist_kw_context ctx1, ctx2;
unsigned char key[16];
unsigned char plaintext[32];
unsigned char ciphertext1[40];
unsigned char ciphertext2[40];
size_t output_len, i;
memset( plaintext, 0, sizeof( plaintext ) );
memset( ciphertext1, 0, sizeof( ciphertext1 ) );
memset( ciphertext2, 0, sizeof( ciphertext2 ) );
memset( key, 0, sizeof( key ) );
/*
* 1. Check wrap and unwrap with two separate contexts
*/
mbedtls_nist_kw_init( &ctx1 );
mbedtls_nist_kw_init( &ctx2 );
TEST_ASSERT( mbedtls_nist_kw_setkey( &ctx1,
MBEDTLS_CIPHER_ID_AES,
key, sizeof( key ) * 8,
1 ) == 0 );
TEST_ASSERT( mbedtls_nist_kw_wrap( &ctx1, MBEDTLS_KW_MODE_KW,
plaintext, sizeof( plaintext ),
ciphertext1, &output_len,
sizeof( ciphertext1 ) ) == 0 );
TEST_ASSERT( output_len == sizeof( ciphertext1 ) );
TEST_ASSERT( mbedtls_nist_kw_setkey( &ctx2,
MBEDTLS_CIPHER_ID_AES,
key, sizeof( key ) * 8,
0 ) == 0 );
TEST_ASSERT( mbedtls_nist_kw_unwrap( &ctx2, MBEDTLS_KW_MODE_KW,
ciphertext1, output_len,
plaintext, &output_len,
sizeof( plaintext ) ) == 0 );
TEST_ASSERT( output_len == sizeof( plaintext ) );
for( i = 0; i < sizeof( plaintext ); i++ )
{
TEST_ASSERT( plaintext[i] == 0 );
}
mbedtls_nist_kw_free( &ctx1 );
mbedtls_nist_kw_free( &ctx2 );
/*
* 2. Check wrapping with two modes, on same context
*/
mbedtls_nist_kw_init( &ctx1 );
mbedtls_nist_kw_init( &ctx2 );
output_len = sizeof( ciphertext1 );
TEST_ASSERT( mbedtls_nist_kw_setkey( &ctx1,
MBEDTLS_CIPHER_ID_AES,
key, sizeof( key ) * 8,
1 ) == 0 );
TEST_ASSERT( mbedtls_nist_kw_wrap( &ctx1, MBEDTLS_KW_MODE_KW,
plaintext, sizeof( plaintext ),
ciphertext1, &output_len,
sizeof( ciphertext1 ) ) == 0 );
TEST_ASSERT( output_len == sizeof( ciphertext1 ) );
TEST_ASSERT( mbedtls_nist_kw_wrap( &ctx1, MBEDTLS_KW_MODE_KWP,
plaintext, sizeof( plaintext ),
ciphertext2, &output_len,
sizeof( ciphertext2 ) ) == 0 );
TEST_ASSERT( output_len == sizeof( ciphertext2 ) );
TEST_ASSERT( mbedtls_nist_kw_setkey( &ctx2,
MBEDTLS_CIPHER_ID_AES,
key, sizeof( key ) * 8,
0 ) == 0 );
TEST_ASSERT( mbedtls_nist_kw_unwrap( &ctx2, MBEDTLS_KW_MODE_KW,
ciphertext1, sizeof( ciphertext1 ),
plaintext, &output_len,
sizeof( plaintext ) ) == 0 );
TEST_ASSERT( output_len == sizeof( plaintext ) );
for( i = 0; i < sizeof( plaintext ); i++ )
{
TEST_ASSERT( plaintext[i] == 0 );
}
TEST_ASSERT( mbedtls_nist_kw_unwrap( &ctx2, MBEDTLS_KW_MODE_KWP,
ciphertext2, sizeof( ciphertext2 ),
plaintext, &output_len,
sizeof( plaintext ) ) == 0 );
TEST_ASSERT( output_len == sizeof( plaintext ) );
for( i = 0; i < sizeof( plaintext ); i++ )
{
TEST_ASSERT( plaintext[i] == 0 );
}
exit:
mbedtls_nist_kw_free( &ctx1 );
mbedtls_nist_kw_free( &ctx2 );
}
void test_mbedtls_nist_kw_mix_contexts_wrapper( void ** params )
{
(void)params;
test_mbedtls_nist_kw_mix_contexts( );
}
#endif /* MBEDTLS_AES_C */
void test_mbedtls_nist_kw_setkey( int cipher_id, int key_size,
int is_wrap, int result )
{
mbedtls_nist_kw_context ctx;
unsigned char key[32];
int ret;
mbedtls_nist_kw_init( &ctx );
memset( key, 0x2A, sizeof( key ) );
TEST_ASSERT( (unsigned) key_size <= 8 * sizeof( key ) );
ret = mbedtls_nist_kw_setkey( &ctx, cipher_id, key, key_size, is_wrap );
TEST_ASSERT( ret == result );
exit:
mbedtls_nist_kw_free( &ctx );
}
void test_mbedtls_nist_kw_setkey_wrapper( void ** params )
{
test_mbedtls_nist_kw_setkey( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ) );
}
#if defined(MBEDTLS_AES_C)
void test_nist_kw_plaintext_lengths( int in_len, int out_len, int mode, int res )
{
mbedtls_nist_kw_context ctx;
unsigned char key[16];
unsigned char *plaintext = NULL;
unsigned char *ciphertext = NULL;
size_t output_len = out_len;
mbedtls_nist_kw_init( &ctx );
memset( key, 0, sizeof( key ) );
if( in_len != 0 )
{
plaintext = mbedtls_calloc( 1, in_len );
TEST_ASSERT( plaintext != NULL );
}
if( out_len != 0 )
{
ciphertext = mbedtls_calloc( 1, output_len );
TEST_ASSERT( ciphertext != NULL );
}
TEST_ASSERT( mbedtls_nist_kw_setkey( &ctx, MBEDTLS_CIPHER_ID_AES,
key, 8 * sizeof( key ), 1 ) == 0 );
TEST_ASSERT( mbedtls_nist_kw_wrap( &ctx, mode, plaintext, in_len,
ciphertext, &output_len,
output_len ) == res );
if( res == 0 )
{
if( mode == MBEDTLS_KW_MODE_KWP )
TEST_ASSERT( output_len == (size_t) in_len + 8 -
( in_len % 8 ) + 8 );
else
TEST_ASSERT( output_len == (size_t) in_len + 8 );
}
else
{
TEST_ASSERT( output_len == 0 );
}
exit:
mbedtls_free( ciphertext );
mbedtls_free( plaintext );
mbedtls_nist_kw_free( &ctx );
}
void test_nist_kw_plaintext_lengths_wrapper( void ** params )
{
test_nist_kw_plaintext_lengths( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ) );
}
#endif /* MBEDTLS_AES_C */
#if defined(MBEDTLS_AES_C)
void test_nist_kw_ciphertext_lengths( int in_len, int out_len, int mode, int res )
{
mbedtls_nist_kw_context ctx;
unsigned char key[16];
unsigned char *plaintext = NULL;
unsigned char *ciphertext = NULL;
int unwrap_ret;
size_t output_len = out_len;
mbedtls_nist_kw_init( &ctx );
memset( key, 0, sizeof( key ) );
if( out_len != 0 )
{
plaintext = mbedtls_calloc( 1, output_len );
TEST_ASSERT( plaintext != NULL );
}
if( in_len != 0 )
{
ciphertext = mbedtls_calloc( 1, in_len );
TEST_ASSERT( ciphertext != NULL );
}
TEST_ASSERT( mbedtls_nist_kw_setkey( &ctx, MBEDTLS_CIPHER_ID_AES,
key, 8 * sizeof( key ), 0 ) == 0 );
unwrap_ret = mbedtls_nist_kw_unwrap( &ctx, mode, ciphertext, in_len,
plaintext, &output_len,
output_len );
if( res == 0 )
TEST_ASSERT( unwrap_ret == MBEDTLS_ERR_CIPHER_AUTH_FAILED );
else
TEST_ASSERT( unwrap_ret == res );
TEST_ASSERT( output_len == 0 );
exit:
mbedtls_free( ciphertext );
mbedtls_free( plaintext );
mbedtls_nist_kw_free( &ctx );
}
void test_nist_kw_ciphertext_lengths_wrapper( void ** params )
{
test_nist_kw_ciphertext_lengths( *( (int *) params[0] ), *( (int *) params[1] ), *( (int *) params[2] ), *( (int *) params[3] ) );
}
#endif /* MBEDTLS_AES_C */
void test_mbedtls_nist_kw_wrap( int cipher_id, int mode, data_t *key, data_t *msg,
data_t *expected_result )
{
unsigned char result[528];
mbedtls_nist_kw_context ctx;
size_t result_len, i, padlen;
mbedtls_nist_kw_init( &ctx );
memset( result, '+', sizeof( result ) );
TEST_ASSERT( mbedtls_nist_kw_setkey( &ctx, cipher_id,
key->x, key->len * 8, 1 ) == 0 );
/* Test with input == output */
TEST_ASSERT( mbedtls_nist_kw_wrap( &ctx, mode, msg->x, msg->len,
result, &result_len, sizeof( result ) ) == 0 );
TEST_ASSERT( result_len == expected_result->len );
TEST_ASSERT( memcmp( expected_result->x, result, result_len ) == 0 );
padlen = ( msg->len % 8 != 0 ) ? 8 - (msg->len % 8 ) : 0;
/* Check that the function didn't write beyond the end of the buffer. */
for( i = msg->len + 8 + padlen; i < sizeof( result ); i++ )
{
TEST_ASSERT( result[i] == '+' );
}
exit:
mbedtls_nist_kw_free( &ctx );
}
void test_mbedtls_nist_kw_wrap_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_mbedtls_nist_kw_wrap( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6 );
}
void test_mbedtls_nist_kw_unwrap( int cipher_id, int mode, data_t *key, data_t *msg,
data_t *expected_result, int expected_ret )
{
unsigned char result[528];
mbedtls_nist_kw_context ctx;
size_t result_len, i;
mbedtls_nist_kw_init( &ctx );
memset( result, '+', sizeof( result ) );
TEST_ASSERT( mbedtls_nist_kw_setkey( &ctx, cipher_id,
key->x, key->len * 8, 0 ) == 0 );
/* Test with input == output */
TEST_ASSERT( mbedtls_nist_kw_unwrap( &ctx, mode, msg->x, msg->len,
result, &result_len, sizeof( result ) ) == expected_ret );
if( expected_ret == 0 )
{
TEST_ASSERT( result_len == expected_result->len );
TEST_ASSERT( memcmp( expected_result->x, result, result_len ) == 0 );
}
else
{
TEST_ASSERT( result_len == 0 );
}
/* Check that the function didn't write beyond the end of the buffer. */
for( i = msg->len - 8; i < sizeof( result ); i++ )
{
TEST_ASSERT( result[i] == '+' );
}
exit:
mbedtls_nist_kw_free( &ctx );
}
void test_mbedtls_nist_kw_unwrap_wrapper( void ** params )
{
data_t data2 = {(uint8_t *) params[2], *( (uint32_t *) params[3] )};
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_mbedtls_nist_kw_unwrap( *( (int *) params[0] ), *( (int *) params[1] ), &data2, &data4, &data6, *( (int *) params[8] ) );
}
#endif /* MBEDTLS_NIST_KW_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_NIST_KW_C)
case 0:
{
*out_value = MBEDTLS_CIPHER_ID_AES;
}
break;
case 1:
{
*out_value = MBEDTLS_CIPHER_ID_CAMELLIA;
}
break;
case 2:
{
*out_value = MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE;
}
break;
case 3:
{
*out_value = MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA;
}
break;
case 4:
{
*out_value = MBEDTLS_CIPHER_ID_BLOWFISH;
}
break;
case 5:
{
*out_value = MBEDTLS_KW_MODE_KW;
}
break;
case 6:
{
*out_value = MBEDTLS_KW_MODE_KWP;
}
break;
case 7:
{
*out_value = MBEDTLS_ERR_CIPHER_AUTH_FAILED;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_NIST_KW_C)
case 0:
{
#if defined(MBEDTLS_AES_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_CAMELLIA_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_BLOWFISH_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_NIST_KW_C) && defined(MBEDTLS_SELF_TEST) && defined(MBEDTLS_AES_C)
test_mbedtls_nist_kw_self_test_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_NIST_KW_C) && defined(MBEDTLS_AES_C)
test_mbedtls_nist_kw_mix_contexts_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_NIST_KW_C)
test_mbedtls_nist_kw_setkey_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_NIST_KW_C) && defined(MBEDTLS_AES_C)
test_nist_kw_plaintext_lengths_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_NIST_KW_C) && defined(MBEDTLS_AES_C)
test_nist_kw_ciphertext_lengths_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_NIST_KW_C)
test_mbedtls_nist_kw_wrap_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_NIST_KW_C)
test_mbedtls_nist_kw_unwrap_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_nist_kw.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 21,390 | 721 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_ecdsa.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_ecdsa.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_ecdsa.function
* Test suite data : suites/test_suite_ecdsa.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_ECDSA_C)
#include "third_party/mbedtls/ecdsa.h"
#if defined(MBEDTLS_CHECK_PARAMS)
#if !defined(MBEDTLS_PARAM_FAILED_ALT)
void test_ecdsa_invalid_param( )
{
mbedtls_ecdsa_context ctx;
mbedtls_ecp_keypair key;
mbedtls_ecp_group grp;
mbedtls_ecp_group_id valid_group = MBEDTLS_ECP_DP_SECP192R1;
mbedtls_ecp_point P;
mbedtls_md_type_t valid_md = MBEDTLS_MD_SHA256;
mbedtls_mpi m;
size_t slen;
unsigned char buf[42] = { 0 };
TEST_INVALID_PARAM( mbedtls_ecdsa_init( NULL ) );
TEST_VALID_PARAM( mbedtls_ecdsa_free( NULL ) );
#if defined(MBEDTLS_ECP_RESTARTABLE)
TEST_INVALID_PARAM( mbedtls_ecdsa_restart_init( NULL ) );
TEST_VALID_PARAM( mbedtls_ecdsa_restart_free( NULL ) );
#endif /* MBEDTLS_ECP_RESTARTABLE */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_sign( NULL, &m, &m, &m,
buf, sizeof( buf ),
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_sign( &grp, NULL, &m, &m,
buf, sizeof( buf ),
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_sign( &grp, &m, NULL, &m,
buf, sizeof( buf ),
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_sign( &grp, &m, &m, NULL,
buf, sizeof( buf ),
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_sign( &grp, &m, &m, &m,
NULL, sizeof( buf ),
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_sign( &grp, &m, &m, &m,
buf, sizeof( buf ),
NULL, NULL ) );
#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_sign_det_ext( NULL, &m, &m, &m,
buf, sizeof( buf ),
valid_md,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_sign_det_ext( &grp, NULL, &m, &m,
buf, sizeof( buf ),
valid_md,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_sign_det_ext( &grp, &m, NULL, &m,
buf, sizeof( buf ),
valid_md,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_sign_det_ext( &grp, &m, &m, NULL,
buf, sizeof( buf ),
valid_md,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_sign_det_ext( &grp, &m, &m, &m,
NULL, sizeof( buf ),
valid_md,
mbedtls_test_rnd_std_rand,
NULL ) );
#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_verify( NULL,
buf, sizeof( buf ),
&P, &m, &m ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_verify( &grp,
NULL, sizeof( buf ),
&P, &m, &m ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_verify( &grp,
buf, sizeof( buf ),
NULL, &m, &m ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_verify( &grp,
buf, sizeof( buf ),
&P, NULL, &m ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_verify( &grp,
buf, sizeof( buf ),
&P, &m, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_write_signature( NULL, valid_md, buf, sizeof( buf ),
buf, &slen, mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_write_signature( &ctx, valid_md, NULL, sizeof( buf ),
buf, &slen, mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_write_signature( &ctx, valid_md, buf, sizeof( buf ),
NULL, &slen, mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_write_signature( &ctx, valid_md, buf, sizeof( buf ),
buf, NULL, mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_write_signature_restartable( NULL, valid_md, buf,
sizeof( buf ), buf, &slen,
mbedtls_test_rnd_std_rand,
NULL, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_write_signature_restartable( &ctx, valid_md, NULL,
sizeof( buf ), buf, &slen,
mbedtls_test_rnd_std_rand,
NULL, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_write_signature_restartable( &ctx, valid_md, buf,
sizeof( buf ), NULL, &slen,
mbedtls_test_rnd_std_rand,
NULL, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_write_signature_restartable( &ctx, valid_md, buf,
sizeof( buf ), buf, NULL,
mbedtls_test_rnd_std_rand,
NULL, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_read_signature( NULL,
buf, sizeof( buf ),
buf, sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_read_signature( &ctx,
NULL, sizeof( buf ),
buf, sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_read_signature( &ctx,
buf, sizeof( buf ),
NULL, sizeof( buf ) ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_read_signature_restartable( NULL,
buf, sizeof( buf ),
buf, sizeof( buf ),
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_read_signature_restartable( &ctx,
NULL, sizeof( buf ),
buf, sizeof( buf ),
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_read_signature_restartable( &ctx,
buf, sizeof( buf ),
NULL, sizeof( buf ),
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_genkey( NULL, valid_group,
mbedtls_test_rnd_std_rand,
NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_genkey( &ctx, valid_group,
NULL, NULL ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_from_keypair( NULL, &key ) );
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
mbedtls_ecdsa_from_keypair( &ctx, NULL ) );
exit:
return;
}
void test_ecdsa_invalid_param_wrapper( void ** params )
{
(void)params;
test_ecdsa_invalid_param( );
}
#endif /* !MBEDTLS_PARAM_FAILED_ALT */
#endif /* MBEDTLS_CHECK_PARAMS */
void test_ecdsa_prim_random( int id )
{
mbedtls_ecp_group grp;
mbedtls_ecp_point Q;
mbedtls_mpi d, r, s;
mbedtls_test_rnd_pseudo_info rnd_info;
unsigned char buf[MBEDTLS_MD_MAX_SIZE];
mbedtls_ecp_group_init( &grp );
mbedtls_ecp_point_init( &Q );
mbedtls_mpi_init( &d ); mbedtls_mpi_init( &r ); mbedtls_mpi_init( &s );
memset( &rnd_info, 0x00, sizeof( mbedtls_test_rnd_pseudo_info ) );
memset( buf, 0, sizeof( buf ) );
/* prepare material for signature */
TEST_ASSERT( mbedtls_test_rnd_pseudo_rand( &rnd_info,
buf, sizeof( buf ) ) == 0 );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( mbedtls_ecp_gen_keypair( &grp, &d, &Q,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecdsa_sign( &grp, &r, &s, &d, buf, sizeof( buf ),
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecdsa_verify( &grp, buf, sizeof( buf ), &Q, &r, &s ) == 0 );
exit:
mbedtls_ecp_group_free( &grp );
mbedtls_ecp_point_free( &Q );
mbedtls_mpi_free( &d ); mbedtls_mpi_free( &r ); mbedtls_mpi_free( &s );
}
void test_ecdsa_prim_random_wrapper( void ** params )
{
test_ecdsa_prim_random( *( (int *) params[0] ) );
}
void test_ecdsa_prim_test_vectors( int id, char * d_str, char * xQ_str,
char * yQ_str, data_t * rnd_buf,
data_t * hash, char * r_str, char * s_str,
int result )
{
mbedtls_ecp_group grp;
mbedtls_ecp_point Q;
mbedtls_mpi d, r, s, r_check, s_check;
mbedtls_test_rnd_buf_info rnd_info;
mbedtls_ecp_group_init( &grp );
mbedtls_ecp_point_init( &Q );
mbedtls_mpi_init( &d ); mbedtls_mpi_init( &r ); mbedtls_mpi_init( &s );
mbedtls_mpi_init( &r_check ); mbedtls_mpi_init( &s_check );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( mbedtls_ecp_point_read_string( &Q, 16, xQ_str, yQ_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &d, 16, d_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &r_check, 16, r_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &s_check, 16, s_str ) == 0 );
rnd_info.buf = rnd_buf->x;
rnd_info.length = rnd_buf->len;
/* Fix rnd_buf->x by shifting it left if necessary */
if( grp.nbits % 8 != 0 )
{
unsigned char shift = 8 - ( grp.nbits % 8 );
size_t i;
for( i = 0; i < rnd_info.length - 1; i++ )
rnd_buf->x[i] = rnd_buf->x[i] << shift | rnd_buf->x[i+1] >> ( 8 - shift );
rnd_buf->x[rnd_info.length-1] <<= shift;
}
TEST_ASSERT( mbedtls_ecdsa_sign( &grp, &r, &s, &d, hash->x, hash->len,
mbedtls_test_rnd_buffer_rand, &rnd_info ) == result );
if ( result == 0)
{
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &r, &r_check ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &s, &s_check ) == 0 );
TEST_ASSERT( mbedtls_ecdsa_verify( &grp, hash->x, hash->len, &Q, &r_check, &s_check ) == 0 );
TEST_ASSERT( mbedtls_mpi_sub_int( &r, &r, 1 ) == 0 );
TEST_ASSERT( mbedtls_mpi_add_int( &s, &s, 1 ) == 0 );
TEST_ASSERT( mbedtls_ecdsa_verify( &grp, hash->x, hash->len,
&Q, &r, &s_check ) == MBEDTLS_ERR_ECP_VERIFY_FAILED );
TEST_ASSERT( mbedtls_ecdsa_verify( &grp, hash->x, hash->len,
&Q, &r_check, &s ) == MBEDTLS_ERR_ECP_VERIFY_FAILED );
TEST_ASSERT( mbedtls_ecdsa_verify( &grp, hash->x, hash->len,
&grp.G, &r_check, &s_check ) == MBEDTLS_ERR_ECP_VERIFY_FAILED );
}
exit:
mbedtls_ecp_group_free( &grp );
mbedtls_ecp_point_free( &Q );
mbedtls_mpi_free( &d ); mbedtls_mpi_free( &r ); mbedtls_mpi_free( &s );
mbedtls_mpi_free( &r_check ); mbedtls_mpi_free( &s_check );
}
void test_ecdsa_prim_test_vectors_wrapper( void ** params )
{
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
data_t data6 = {(uint8_t *) params[6], *( (uint32_t *) params[7] )};
test_ecdsa_prim_test_vectors( *( (int *) params[0] ), (char *) params[1], (char *) params[2], (char *) params[3], &data4, &data6, (char *) params[8], (char *) params[9], *( (int *) params[10] ) );
}
#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
void test_ecdsa_det_test_vectors( int id, char * d_str, int md_alg, char * msg,
char * r_str, char * s_str )
{
mbedtls_ecp_group grp;
mbedtls_mpi d, r, s, r_check, s_check;
unsigned char hash[MBEDTLS_MD_MAX_SIZE];
size_t hlen;
const mbedtls_md_info_t *md_info;
mbedtls_ecp_group_init( &grp );
mbedtls_mpi_init( &d ); mbedtls_mpi_init( &r ); mbedtls_mpi_init( &s );
mbedtls_mpi_init( &r_check ); mbedtls_mpi_init( &s_check );
memset( hash, 0, sizeof( hash ) );
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &d, 16, d_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &r_check, 16, r_str ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &s_check, 16, s_str ) == 0 );
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
hlen = mbedtls_md_get_size( md_info );
TEST_ASSERT( mbedtls_md( md_info, (const unsigned char *) msg,
strlen( msg ), hash ) == 0 );
TEST_ASSERT(
mbedtls_ecdsa_sign_det_ext( &grp, &r, &s, &d, hash, hlen,
md_alg, mbedtls_test_rnd_std_rand,
NULL )
== 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &r, &r_check ) == 0 );
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &s, &s_check ) == 0 );
exit:
mbedtls_ecp_group_free( &grp );
mbedtls_mpi_free( &d ); mbedtls_mpi_free( &r ); mbedtls_mpi_free( &s );
mbedtls_mpi_free( &r_check ); mbedtls_mpi_free( &s_check );
}
void test_ecdsa_det_test_vectors_wrapper( void ** params )
{
test_ecdsa_det_test_vectors( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], (char *) params[4], (char *) params[5] );
}
#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
#if defined(MBEDTLS_SHA256_C)
void test_ecdsa_write_read_random( int id )
{
mbedtls_ecdsa_context ctx;
mbedtls_test_rnd_pseudo_info rnd_info;
unsigned char hash[32];
unsigned char sig[200];
size_t sig_len, i;
mbedtls_ecdsa_init( &ctx );
memset( &rnd_info, 0x00, sizeof( mbedtls_test_rnd_pseudo_info ) );
memset( hash, 0, sizeof( hash ) );
memset( sig, 0x2a, sizeof( sig ) );
/* prepare material for signature */
TEST_ASSERT( mbedtls_test_rnd_pseudo_rand( &rnd_info,
hash, sizeof( hash ) ) == 0 );
/* generate signing key */
TEST_ASSERT( mbedtls_ecdsa_genkey( &ctx, id,
&mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
/* generate and write signature, then read and verify it */
TEST_ASSERT( mbedtls_ecdsa_write_signature( &ctx, MBEDTLS_MD_SHA256,
hash, sizeof( hash ),
sig, &sig_len, &mbedtls_test_rnd_pseudo_rand,
&rnd_info ) == 0 );
TEST_ASSERT( mbedtls_ecdsa_read_signature( &ctx, hash, sizeof( hash ),
sig, sig_len ) == 0 );
/* check we didn't write past the announced length */
for( i = sig_len; i < sizeof( sig ); i++ )
TEST_ASSERT( sig[i] == 0x2a );
/* try verification with invalid length */
TEST_ASSERT( mbedtls_ecdsa_read_signature( &ctx, hash, sizeof( hash ),
sig, sig_len - 1 ) != 0 );
TEST_ASSERT( mbedtls_ecdsa_read_signature( &ctx, hash, sizeof( hash ),
sig, sig_len + 1 ) != 0 );
/* try invalid sequence tag */
sig[0]++;
TEST_ASSERT( mbedtls_ecdsa_read_signature( &ctx, hash, sizeof( hash ),
sig, sig_len ) != 0 );
sig[0]--;
/* try modifying r */
sig[10]++;
TEST_ASSERT( mbedtls_ecdsa_read_signature( &ctx, hash, sizeof( hash ),
sig, sig_len ) == MBEDTLS_ERR_ECP_VERIFY_FAILED );
sig[10]--;
/* try modifying s */
sig[sig_len - 1]++;
TEST_ASSERT( mbedtls_ecdsa_read_signature( &ctx, hash, sizeof( hash ),
sig, sig_len ) == MBEDTLS_ERR_ECP_VERIFY_FAILED );
sig[sig_len - 1]--;
exit:
mbedtls_ecdsa_free( &ctx );
}
void test_ecdsa_write_read_random_wrapper( void ** params )
{
test_ecdsa_write_read_random( *( (int *) params[0] ) );
}
#endif /* MBEDTLS_SHA256_C */
#if defined(MBEDTLS_ECP_RESTARTABLE)
void test_ecdsa_read_restart( int id, data_t *pk, data_t *hash, data_t *sig,
int max_ops, int min_restart, int max_restart )
{
mbedtls_ecdsa_context ctx;
mbedtls_ecdsa_restart_ctx rs_ctx;
int ret, cnt_restart;
mbedtls_ecdsa_init( &ctx );
mbedtls_ecdsa_restart_init( &rs_ctx );
TEST_ASSERT( mbedtls_ecp_group_load( &ctx.grp, id ) == 0 );
TEST_ASSERT( mbedtls_ecp_point_read_binary( &ctx.grp, &ctx.Q,
pk->x, pk->len ) == 0 );
mbedtls_ecp_set_max_ops( max_ops );
cnt_restart = 0;
do {
ret = mbedtls_ecdsa_read_signature_restartable( &ctx,
hash->x, hash->len, sig->x, sig->len, &rs_ctx );
} while( ret == MBEDTLS_ERR_ECP_IN_PROGRESS && ++cnt_restart );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( cnt_restart >= min_restart );
TEST_ASSERT( cnt_restart <= max_restart );
/* try modifying r */
TEST_ASSERT( sig->len > 10 );
sig->x[10]++;
do {
ret = mbedtls_ecdsa_read_signature_restartable( &ctx,
hash->x, hash->len, sig->x, sig->len, &rs_ctx );
} while( ret == MBEDTLS_ERR_ECP_IN_PROGRESS );
TEST_ASSERT( ret == MBEDTLS_ERR_ECP_VERIFY_FAILED );
sig->x[10]--;
/* try modifying s */
sig->x[sig->len - 1]++;
do {
ret = mbedtls_ecdsa_read_signature_restartable( &ctx,
hash->x, hash->len, sig->x, sig->len, &rs_ctx );
} while( ret == MBEDTLS_ERR_ECP_IN_PROGRESS );
TEST_ASSERT( ret == MBEDTLS_ERR_ECP_VERIFY_FAILED );
sig->x[sig->len - 1]--;
/* Do we leak memory when aborting an operation?
* This test only makes sense when we actually restart */
if( min_restart > 0 )
{
ret = mbedtls_ecdsa_read_signature_restartable( &ctx,
hash->x, hash->len, sig->x, sig->len, &rs_ctx );
TEST_ASSERT( ret == MBEDTLS_ERR_ECP_IN_PROGRESS );
}
exit:
mbedtls_ecdsa_free( &ctx );
mbedtls_ecdsa_restart_free( &rs_ctx );
}
void test_ecdsa_read_restart_wrapper( void ** params )
{
data_t data1 = {(uint8_t *) params[1], *( (uint32_t *) params[2] )};
data_t data3 = {(uint8_t *) params[3], *( (uint32_t *) params[4] )};
data_t data5 = {(uint8_t *) params[5], *( (uint32_t *) params[6] )};
test_ecdsa_read_restart( *( (int *) params[0] ), &data1, &data3, &data5, *( (int *) params[7] ), *( (int *) params[8] ), *( (int *) params[9] ) );
}
#endif /* MBEDTLS_ECP_RESTARTABLE */
#if defined(MBEDTLS_ECP_RESTARTABLE)
#if defined(MBEDTLS_ECDSA_DETERMINISTIC)
void test_ecdsa_write_restart( int id, char *d_str, int md_alg,
char *msg, data_t *sig_check,
int max_ops, int min_restart, int max_restart )
{
int ret, cnt_restart;
mbedtls_ecdsa_restart_ctx rs_ctx;
mbedtls_ecdsa_context ctx;
unsigned char hash[MBEDTLS_MD_MAX_SIZE];
unsigned char sig[MBEDTLS_ECDSA_MAX_LEN];
size_t hlen, slen;
const mbedtls_md_info_t *md_info;
mbedtls_ecdsa_restart_init( &rs_ctx );
mbedtls_ecdsa_init( &ctx );
memset( hash, 0, sizeof( hash ) );
memset( sig, 0, sizeof( sig ) );
TEST_ASSERT( mbedtls_ecp_group_load( &ctx.grp, id ) == 0 );
TEST_ASSERT( mbedtls_mpi_read_string( &ctx.d, 16, d_str ) == 0 );
md_info = mbedtls_md_info_from_type( md_alg );
TEST_ASSERT( md_info != NULL );
hlen = mbedtls_md_get_size( md_info );
TEST_ASSERT( mbedtls_md( md_info,
(const unsigned char *) msg, strlen( msg ),
hash ) == 0 );
mbedtls_ecp_set_max_ops( max_ops );
slen = sizeof( sig );
cnt_restart = 0;
do {
ret = mbedtls_ecdsa_write_signature_restartable( &ctx,
md_alg, hash, hlen, sig, &slen, NULL, NULL, &rs_ctx );
} while( ret == MBEDTLS_ERR_ECP_IN_PROGRESS && ++cnt_restart );
TEST_ASSERT( ret == 0 );
TEST_ASSERT( slen == sig_check->len );
TEST_ASSERT( memcmp( sig, sig_check->x, slen ) == 0 );
TEST_ASSERT( cnt_restart >= min_restart );
TEST_ASSERT( cnt_restart <= max_restart );
/* Do we leak memory when aborting an operation?
* This test only makes sense when we actually restart */
if( min_restart > 0 )
{
ret = mbedtls_ecdsa_write_signature_restartable( &ctx,
md_alg, hash, hlen, sig, &slen, NULL, NULL, &rs_ctx );
TEST_ASSERT( ret == MBEDTLS_ERR_ECP_IN_PROGRESS );
}
exit:
mbedtls_ecdsa_restart_free( &rs_ctx );
mbedtls_ecdsa_free( &ctx );
}
void test_ecdsa_write_restart_wrapper( void ** params )
{
data_t data4 = {(uint8_t *) params[4], *( (uint32_t *) params[5] )};
test_ecdsa_write_restart( *( (int *) params[0] ), (char *) params[1], *( (int *) params[2] ), (char *) params[3], &data4, *( (int *) params[6] ), *( (int *) params[7] ), *( (int *) params[8] ) );
}
#endif /* MBEDTLS_ECDSA_DETERMINISTIC */
#endif /* MBEDTLS_ECP_RESTARTABLE */
#endif /* MBEDTLS_ECDSA_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_ECDSA_C)
case 0:
{
*out_value = MBEDTLS_ECP_DP_SECP192R1;
}
break;
case 1:
{
*out_value = MBEDTLS_ECP_DP_SECP224R1;
}
break;
case 2:
{
*out_value = MBEDTLS_ECP_DP_SECP256R1;
}
break;
case 3:
{
*out_value = MBEDTLS_ECP_DP_SECP384R1;
}
break;
case 4:
{
*out_value = MBEDTLS_ECP_DP_SECP521R1;
}
break;
case 5:
{
*out_value = MBEDTLS_MD_SHA1;
}
break;
case 6:
{
*out_value = MBEDTLS_MD_SHA224;
}
break;
case 7:
{
*out_value = MBEDTLS_MD_SHA256;
}
break;
case 8:
{
*out_value = MBEDTLS_MD_SHA384;
}
break;
case 9:
{
*out_value = MBEDTLS_MD_SHA512;
}
break;
case 10:
{
*out_value = MBEDTLS_ERR_ECP_INVALID_KEY;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_ECDSA_C)
case 0:
{
#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 4:
{
#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 5:
{
#if defined(MBEDTLS_SHA1_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 6:
{
#if defined(MBEDTLS_SHA256_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 7:
{
#if defined(MBEDTLS_SHA512_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 8:
{
#if !defined(MBEDTLS_SHA512_NO_SHA384)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_ECDSA_C) && defined(MBEDTLS_CHECK_PARAMS) && !defined(MBEDTLS_PARAM_FAILED_ALT)
test_ecdsa_invalid_param_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_ECDSA_C)
test_ecdsa_prim_random_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_ECDSA_C)
test_ecdsa_prim_test_vectors_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_ECDSA_C) && defined(MBEDTLS_ECDSA_DETERMINISTIC)
test_ecdsa_det_test_vectors_wrapper,
#else
NULL,
#endif
/* Function Id: 4 */
#if defined(MBEDTLS_ECDSA_C) && defined(MBEDTLS_SHA256_C)
test_ecdsa_write_read_random_wrapper,
#else
NULL,
#endif
/* Function Id: 5 */
#if defined(MBEDTLS_ECDSA_C) && defined(MBEDTLS_ECP_RESTARTABLE)
test_ecdsa_read_restart_wrapper,
#else
NULL,
#endif
/* Function Id: 6 */
#if defined(MBEDTLS_ECDSA_C) && defined(MBEDTLS_ECP_RESTARTABLE) && defined(MBEDTLS_ECDSA_DETERMINISTIC)
test_ecdsa_write_restart_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_ecdsa.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 36,618 | 1,008 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_pkcs1_v15.datax | RSAES-V15 Encryption input=NULL with length=0
0:int:1024:int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:0:hex:"":hex:"aafd12f659cae63489b479e5076ddec2f06cb58f67c6697351ff4aec29cdbaabf2fbe3467cc254f81be8e78d765a2e63339fc99a66320db73158a35a255d051758e95ed4abb2cdc69bb454110e827441213ddc8770e93ea141e1fc673e017e97eadc6b968f385c2aecb03bfb3267c6697351ff4aec29cdbaabf2fbe34676cac0":hex:"42c6fce63a3b858ba89fe83004cac3651d1497c15090bf0086b9a4b9ff3bd451502838a413095aefe231832ba10bb467ae3f95c889cd8e9a6e32b4df633b2170d07a2168c086745f0017cf1d9facff2eee55af2fcb03730209173b2a0bbfb2d4c34d7ea93b3b0cb84a8a7b6371670e14482e6dcedbdd9efe66d906e0238586fe":int:0
RSAES-V15 Decryption empty output with NULL buffer
1:int:1024:int:16:char*:"eecfae81b1b9b3c908810b10a1b5600199eb9f44aef4fda493b81a9e3d84f632124ef0236e5d1e3b7e28fae7aa040a2d5b252176459d1f397541ba2a58fb6599":int:16:char*:"c97fb1f027f453f6341233eaaad1d9353f6c42d08866b1d05a0f2035028b9d869840b41666b42e92ea0da3b43204b5cfce3352524d0416a5a441e700af461503":int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:0:hex:"":char*:"aafd12f659cae63489b479e5076ddec2f06cb58f":hex:"42c6fce63a3b858ba89fe83004cac3651d1497c15090bf0086b9a4b9ff3bd451502838a413095aefe231832ba10bb467ae3f95c889cd8e9a6e32b4df633b2170d07a2168c086745f0017cf1d9facff2eee55af2fcb03730209173b2a0bbfb2d4c34d7ea93b3b0cb84a8a7b6371670e14482e6dcedbdd9efe66d906e0238586fe":int:0
RSAES-V15 Encryption Test Vector Int
0:int:1024:int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:1:hex:"d436e99569fd32a7c8a05bbc90d32c49":hex:"aafd12f659cae63489b479e5076ddec2f06cb58f67c6697351ff4aec29cdbaabf2fbe3467cc254f81be8e78d765a2e63339fc99a66320db73158a35a255d051758e95ed4abb2cdc69bb454110e827441213ddc8770e93ea141e1fc673e017e97eadc6b968f385c2aecb03bfb32":hex:"6c5ebca6116b1e91316613fbb5e93197270a849122d549122d05815e2626f80d20f7f3f038c98295203c0f7f6bb8c3568455c67dec82bca86be86eff43b56b7ba2d15375f9a42454c2a2c709953a6e4a977462e35fd21a9c2fb3c0ad2a370f7655267bf6f04814784982988e663b869fc8588475af860d499e5a6ffdfc2c6bfd":int:0
RSAES-V15 Decryption Test Vector Int
1:int:1024:int:16:char*:"eecfae81b1b9b3c908810b10a1b5600199eb9f44aef4fda493b81a9e3d84f632124ef0236e5d1e3b7e28fae7aa040a2d5b252176459d1f397541ba2a58fb6599":int:16:char*:"c97fb1f027f453f6341233eaaad1d9353f6c42d08866b1d05a0f2035028b9d869840b41666b42e92ea0da3b43204b5cfce3352524d0416a5a441e700af461503":int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:1:hex:"d436e99569fd32a7c8a05bbc90d32c49":char*:"aafd12f659cae63489b479e5076ddec2f06cb58f":hex:"28818cb14236ad18f4527e7f1f7633e96cef021bc3234475d7f61e88702b6335b42a352ed3f3267ac7c3e9ba4af17e45096c63eefd8d9a7cb42dfc52fffb2f5b8afb305b46312c2eb50634123b4437a2287ac57b7509d59a583fb741989a49f32625e9267b4641a6607b7303d35c68489db53c8d387b620d0d46a852e72ea43c":int:0
RSAES-V15 Encryption Test Vector Data just fits
0:int:1024:int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:1:hex:"4293cecc8095232ae595b84c15ec26f35cf5fde88ae7a9aaa717bcb1ecc4de498da81db97425000770817b5dde5eed01ca3745ff5ab894d0fc0921e5a10b081490129d8ccbaa154ad3dd461397af8ec964ef99402d60a7591ee44b8ce1c16ef88fcb2717076c730d88223893bdd8000b23d87d38ab":hex:"aafd12f659cae63489b479e5076ddec2f06cb58f":hex:"18cdb161f40a18509a3501b7e8ec1c7522e2490319efee8581179b5bcf3750f83a865952d078efd48f58f8060b0d43f9888b43a094fe15209451826ef797195885ff9fa3e26994eee85dbe5dd0404a71565708286027b433c88c85af555b96c34c304dc7c8278233654c022ef340042cfff55e6b15b67cfea8a5a384ef64a6ac":int:0
RSAES-V15 Decryption Test Vector Data just fits
1:int:1024:int:16:char*:"eecfae81b1b9b3c908810b10a1b5600199eb9f44aef4fda493b81a9e3d84f632124ef0236e5d1e3b7e28fae7aa040a2d5b252176459d1f397541ba2a58fb6599":int:16:char*:"c97fb1f027f453f6341233eaaad1d9353f6c42d08866b1d05a0f2035028b9d869840b41666b42e92ea0da3b43204b5cfce3352524d0416a5a441e700af461503":int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:1:hex:"4293cecc8095232ae595b84c15ec26f35cf5fde88ae7a9aaa717bcb1ecc4de498da81db97425000770817b5dde5eed01ca3745ff5ab894d0fc0921e5a10b081490129d8ccbaa154ad3dd461397af8ec964ef99402d60a7591ee44b8ce1c16ef88fcb2717076c730d88223893bdd8000b23d87d38ab":char*:"aafd12f659cae63489b479e5076ddec2f06cb58f":hex:"18cdb161f40a18509a3501b7e8ec1c7522e2490319efee8581179b5bcf3750f83a865952d078efd48f58f8060b0d43f9888b43a094fe15209451826ef797195885ff9fa3e26994eee85dbe5dd0404a71565708286027b433c88c85af555b96c34c304dc7c8278233654c022ef340042cfff55e6b15b67cfea8a5a384ef64a6ac":int:0
RSAES-V15 Encryption Test Vector Data too long 1
0:int:1024:int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:1:hex:"b84293cecc8095232ae595b84c15ec26f35cf5fde88ae7a9aaa717bcb1ecc4de498da81db97425000770817b5dde5eed01ca3745ff5ab894d0fc0921e5a10b081490129d8ccbaa154ad3dd461397af8ec964ef99402d60a7591ee44b8ce1c16ef88fcb2717076c730d88223893bdd8000b23d87d38ab":hex:"aafd12f659cae63489b479e5076ddec2f06cb58f":hex:"05abded6751d620a95177abdba915027b58dd6eecf4ebe71f71c400b115e1d9e12465ace4db3cc03eb57fcbbfe017770f438cf84c10bad505919aefebfa0752087f6376b055beabf0e089fbb90e10f99c795d2d5676eea196db7f94a8fd34aedaba39fb230281bb9917cc91793eb37f84dedb2421e9680c39cfda34d4a012134":exp:2
RSAES-V15 Decryption Test Vector Padding too short 7
1:int:1024:int:16:char*:"eecfae81b1b9b3c908810b10a1b5600199eb9f44aef4fda493b81a9e3d84f632124ef0236e5d1e3b7e28fae7aa040a2d5b252176459d1f397541ba2a58fb6599":int:16:char*:"c97fb1f027f453f6341233eaaad1d9353f6c42d08866b1d05a0f2035028b9d869840b41666b42e92ea0da3b43204b5cfce3352524d0416a5a441e700af461503":int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:1:hex:"b84293cecc8095232ae595b84c15ec26f35cf5fde88ae7a9aaa717bcb1ecc4de498da81db97425000770817b5dde5eed01ca3745ff5ab894d0fc0921e5a10b081490129d8ccbaa154ad3dd461397af8ec964ef99402d60a7591ee44b8ce1c16ef88fcb2717076c730d88223893bdd8000b23d87d38ab":char*:"aafd12f659cae63489b479e5076ddec2f06cb58f":hex:"05abded6751d620a95177abdba915027b58dd6eecf4ebe71f71c400b115e1d9e12465ace4db3cc03eb57fcbbfe017770f438cf84c10bad505919aefebfa0752087f6376b055beabf0e089fbb90e10f99c795d2d5676eea196db7f94a8fd34aedaba39fb230281bb9917cc91793eb37f84dedb2421e9680c39cfda34d4a012134":exp:3
RSAES-V15 Encryption Test Vector Data too long 3
0:int:1024:int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:1:hex:"aa1ab84293cecc8095232ae595b84c15ec26f35cf5fde88ae7a9aaa717bcb1ecc4de498da81db97425000770817b5dde5eed01ca3745ff5ab894d0fc0921e5a10b081490129d8ccbaa154ad3dd461397af8ec964ef99402d60a7591ee44b8ce1c16ef88fcb2717076c730d88223893bdd8000b23d87d38ab":hex:"aafd12f659cae63489b479e5076ddec2f06cb58f":hex:"10d60b8040d57d8701bacb55f2f283d54601ec24d465601ac7f7d5a2f75cac380ba78ca4ab6f3c159f3a9fd6839f5adde0333852ebf876c585664c1a58a1e6885231982f2027be6d7f08ff1807d3ceda8e41ad1f02ddf97a7458832fd13a1f431de6a4ab79e3d4b88bb1df2c5c77fcde9e7b5aa1e7bb29112eae58763127752a":exp:2
RSAES-V15 Decryption Test Vector Padding too short 5
1:int:1024:int:16:char*:"eecfae81b1b9b3c908810b10a1b5600199eb9f44aef4fda493b81a9e3d84f632124ef0236e5d1e3b7e28fae7aa040a2d5b252176459d1f397541ba2a58fb6599":int:16:char*:"c97fb1f027f453f6341233eaaad1d9353f6c42d08866b1d05a0f2035028b9d869840b41666b42e92ea0da3b43204b5cfce3352524d0416a5a441e700af461503":int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:1:hex:"aa1ab84293cecc8095232ae595b84c15ec26f35cf5fde88ae7a9aaa717bcb1ecc4de498da81db97425000770817b5dde5eed01ca3745ff5ab894d0fc0921e5a10b081490129d8ccbaa154ad3dd461397af8ec964ef99402d60a7591ee44b8ce1c16ef88fcb2717076c730d88223893bdd8000b23d87d38ab":char*:"aafd12f659cae63489b479e5076ddec2f06cb58f":hex:"10d60b8040d57d8701bacb55f2f283d54601ec24d465601ac7f7d5a2f75cac380ba78ca4ab6f3c159f3a9fd6839f5adde0333852ebf876c585664c1a58a1e6885231982f2027be6d7f08ff1807d3ceda8e41ad1f02ddf97a7458832fd13a1f431de6a4ab79e3d4b88bb1df2c5c77fcde9e7b5aa1e7bb29112eae58763127752a":exp:3
RSAES-V15 Encryption Test Vector Data too long 8
0:int:1024:int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:1:hex:"a5a384ef64a6acb84293cecc8095232ae595b84c15ec26f35cf5fde88ae7a9aaa717bcb1ecc4de498da81db97425000770817b5dde5eed01ca3745ff5ab894d0fc0921e5a10b081490129d8ccbaa154ad3dd461397af8ec964ef99402d60a7591ee44b8ce1c16ef88fcb2717076c730d88223893bdd8000b23d87d38ab":hex:"aafd12f659cae63489b479e5076ddec2f06cb58f":hex:"72f98d12ddc230484179ec3022d11b3719222daaa0dc016fc3dbd6771a3f2c9fdd0560f86d616dd50ef1fa5b8c7e1fc40b5abf7b845d7795b3a6af02457b97f783360575cde7497bdf9c104650d4e9a8f4034406de1af95ace39bef2b9e979b74d9a2c0a741d8a21221d9afc98992776cad52d73151613dbc10da9bd8038751a":exp:2
RSAES-V15 Decryption Test Vector Padding too short 0
1:int:1024:int:16:char*:"eecfae81b1b9b3c908810b10a1b5600199eb9f44aef4fda493b81a9e3d84f632124ef0236e5d1e3b7e28fae7aa040a2d5b252176459d1f397541ba2a58fb6599":int:16:char*:"c97fb1f027f453f6341233eaaad1d9353f6c42d08866b1d05a0f2035028b9d869840b41666b42e92ea0da3b43204b5cfce3352524d0416a5a441e700af461503":int:16:char*:"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":int:16:char*:"11":exp:1:hex:"a5a384ef64a6acb84293cecc8095232ae595b84c15ec26f35cf5fde88ae7a9aaa717bcb1ecc4de498da81db97425000770817b5dde5eed01ca3745ff5ab894d0fc0921e5a10b081490129d8ccbaa154ad3dd461397af8ec964ef99402d60a7591ee44b8ce1c16ef88fcb2717076c730d88223893bdd8000b23d87d38ab":char*:"aafd12f659cae63489b479e5076ddec2f06cb58f":hex:"72f98d12ddc230484179ec3022d11b3719222daaa0dc016fc3dbd6771a3f2c9fdd0560f86d616dd50ef1fa5b8c7e1fc40b5abf7b845d7795b3a6af02457b97f783360575cde7497bdf9c104650d4e9a8f4034406de1af95ace39bef2b9e979b74d9a2c0a741d8a21221d9afc98992776cad52d73151613dbc10da9bd8038751a":exp:3
RSASSA-V15 Signing Test Vector Int
3:int:1024:int:16:char*:"d17f655bf27c8b16d35462c905cc04a26f37e2a67fa9c0ce0dced472394a0df743fe7f929e378efdb368eddff453cf007af6d948e0ade757371f8a711e278f6b":int:16:char*:"c6d92b6fee7414d1358ce1546fb62987530b90bd15e0f14963a5e2635adb69347ec0c01b2ab1763fd8ac1a592fb22757463a982425bb97a3a437c5bf86d03f2f":int:16:char*:"a2ba40ee07e3b2bd2f02ce227f36a195024486e49c19cb41bbbdfbba98b22b0e577c2eeaffa20d883a76e65e394c69d4b3c05a1e8fadda27edb2a42bc000fe888b9b32c22d15add0cd76b3e7936e19955b220dd17d4ea904b1ec102b2e4de7751222aa99151024c7cb41cc5ea21d00eeb41f7c800834d2c6e06bce3bce7ea9a5":int:16:char*:"010001":exp:1:exp:1:hex:"859eef2fd78aca00308bdc471193bf55bf9d78db8f8a672b484634f3c9c26e6478ae10260fe0dd8c082e53a5293af2173cd50c6d5d354febf78b26021c25c02712e78cd4694c9f469777e451e7f8e9e04cd3739c6bbfedae487fb55644e9ca74ff77a53cb729802f6ed4a5ffa8ba159890fc":hex:"e3b5d5d002c1bce50c2b65ef88a188d83bce7e61":hex:"2154f928615e5101fcdeb57bc08fc2f35c3d5996403861ae3efb1d0712f8bb05cc21f7f5f11f62e5b6ea9f0f2b62180e5cbe7ba535032d6ac8068fff7f362f73d2c3bf5eca6062a1723d7cfd5abb6dcf7e405f2dc560ffe6fc37d38bee4dc9e24fe2bece3e3b4a3f032701d3f0947b42930083dd4ad241b3309b514595482d42":int:0
RSASSA-V15 Verification Test Vector Int
4:int:1024:int:16:char*:"a2ba40ee07e3b2bd2f02ce227f36a195024486e49c19cb41bbbdfbba98b22b0e577c2eeaffa20d883a76e65e394c69d4b3c05a1e8fadda27edb2a42bc000fe888b9b32c22d15add0cd76b3e7936e19955b220dd17d4ea904b1ec102b2e4de7751222aa99151024c7cb41cc5ea21d00eeb41f7c800834d2c6e06bce3bce7ea9a5":int:16:char*:"010001":exp:1:exp:1:hex:"859eef2fd78aca00308bdc471193bf55bf9d78db8f8a672b484634f3c9c26e6478ae10260fe0dd8c082e53a5293af2173cd50c6d5d354febf78b26021c25c02712e78cd4694c9f469777e451e7f8e9e04cd3739c6bbfedae487fb55644e9ca74ff77a53cb729802f6ed4a5ffa8ba159890fc":char*:"e3b5d5d002c1bce50c2b65ef88a188d83bce7e61":hex:"2154f928615e5101fcdeb57bc08fc2f35c3d5996403861ae3efb1d0712f8bb05cc21f7f5f11f62e5b6ea9f0f2b62180e5cbe7ba535032d6ac8068fff7f362f73d2c3bf5eca6062a1723d7cfd5abb6dcf7e405f2dc560ffe6fc37d38bee4dc9e24fe2bece3e3b4a3f032701d3f0947b42930083dd4ad241b3309b514595482d42":int:0
RSAES-V15 decoding: good, payload=max, tight output buffer
2:exp:4:hex:"0002505152535455565700":int:117:int:117:int:0
RSAES-V15 decoding: good, payload=max, larger output buffer
2:exp:4:hex:"0002505152535455565700":int:117:int:128:int:0
RSAES-V15 decoding: good, payload=max-1, tight output buffer
2:exp:4:hex:"000250515253545556575800":int:116:int:116:int:0
RSAES-V15 decoding: good, payload=max-1, larger output buffer
2:exp:4:hex:"000250515253545556575800":int:116:int:117:int:0
RSAES-V15 decoding: good, payload=1
2:exp:4:hex:"00025050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505000":int:1:int:1:int:0
RSAES-V15 decoding: good, empty payload
2:exp:4:hex:"0002505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505000":int:0:int:0:int:0
RSAES-V15 decoding: payload=max, output too large
2:exp:4:hex:"0002505152535455565700":int:117:int:116:exp:5
RSAES-V15 decoding: payload=max-1, output too large
2:exp:4:hex:"000250515253545556575800":int:116:int:115:exp:5
RSAES-V15 decoding: bad first byte
2:exp:4:hex:"0102505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050":int:0:int:42:exp:3
RSAES-V15 decoding: bad second byte (0 instead of 2)
2:exp:4:hex:"0000505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050":int:0:int:42:exp:3
RSAES-V15 decoding: bad second byte (1 instead of 2)
2:exp:4:hex:"0001505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050":int:0:int:42:exp:3
RSAES-V15 decoding: padding too short (0)
2:exp:4:hex:"000200":int:0:int:42:exp:3
RSAES-V15 decoding: padding too short (7)
2:exp:4:hex:"0002505050505050500000ffffffffffffffffff00":int:0:int:42:exp:3
RSAES-V15 decoding: unfinished padding
2:exp:4:hex:"0002505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050505050":int:0:int:42:exp:3
EMSA-V15 decoding: good, payload=max, tight output buffer
2:exp:6:hex:"0001ffffffffffffffff00":int:117:int:117:int:0
EMSA-V15 decoding: good, payload=max, larger output buffer
2:exp:6:hex:"0001ffffffffffffffff00":int:117:int:128:int:0
EMSA-V15 decoding: good, payload=max-1, tight output buffer
2:exp:6:hex:"0001ffffffffffffffffff00":int:116:int:116:int:0
EMSA-V15 decoding: good, payload=max-1, larger output buffer
2:exp:6:hex:"0001ffffffffffffffffff00":int:116:int:117:int:0
EMSA-V15 decoding: good, payload=1
2:exp:6:hex:"0001ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00":int:1:int:1:int:0
EMSA-V15 decoding: good, empty payload
2:exp:6:hex:"0001ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00":int:0:int:0:int:0
EMSA-V15 decoding: bad first byte
2:exp:6:hex:"0101ffffffffffffffff00":int:0:int:42:exp:3
EMSA-V15 decoding: bad second byte (0 instead of 1)
2:exp:6:hex:"0000ffffffffffffffff00":int:0:int:42:exp:3
EMSA-V15 decoding: bad second byte (2 instead of 1)
2:exp:6:hex:"0002ffffffffffffffff00":int:0:int:42:exp:3
EMSA-V15 decoding: padding too short (0)
2:exp:6:hex:"000100":int:0:int:42:exp:3
EMSA-V15 decoding: padding too short (7)
2:exp:6:hex:"0001ffffffffffffff0000ffffffffffffffff00":int:0:int:42:exp:3
EMSA-V15 decoding: invalid padding at first byte
2:exp:6:hex:"0001fffffffffffffffe00":int:0:int:42:exp:3
EMSA-V15 decoding: invalid padding at last byte
2:exp:6:hex:"0001feffffffffffffff00":int:0:int:42:exp:3
EMSA-V15 decoding: unfinished padding
2:exp:6:hex:"0001ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff":int:0:int:42:exp:3
EMSA-V15 decoding: unfinished padding with invalid first byte
2:exp:6:hex:"0001feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff":int:0:int:42:exp:3
EMSA-V15 decoding: unfinished padding with invalid last byte
2:exp:6:hex:"0001fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe":int:0:int:42:exp:3
| 20,162 | 133 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_ecdh.datax | ECDH - Valid parameters
0
ECDH - Invalid parameters
1
ECDH primitive random #1
depends_on:0
2:exp:0
ECDH primitive random #2
depends_on:1
2:exp:1
ECDH primitive random #3
depends_on:2
2:exp:2
ECDH primitive random #4
depends_on:3
2:exp:3
ECDH primitive random #5
depends_on:4
2:exp:4
ECDH primitive rfc 5903 p256
depends_on:2
3:exp:2:hex:"C88F01F510D9AC3F70A292DAA2316DE544E9AAB8AFE84049C62A9C57862D1433":char*:"DAD0B65394221CF9B051E1FECA5787D098DFE637FC90B9EF945D0C3772581180":char*:"5271A0461CDB8252D61F1C456FA3E59AB1F45B33ACCF5F58389E0577B8990BB3":hex:"C6EF9C5D78AE012A011164ACB397CE2088685D8F06BF9BE0B283AB46476BEE53":char*:"D12DFB5289C8D4F81208B70270398C342296970A0BCCB74C736FC7554494BF63":char*:"56FBF3CA366CC23E8157854C13C58D6AAC23F046ADA30F8353E74F33039872AB":char*:"D6840F6B42F6EDAFD13116E0E12565202FEF8E9ECE7DCE03812464D04B9442DE"
ECDH primitive rfc 5903 p384
depends_on:3
3:exp:3:hex:"099F3C7034D4A2C699884D73A375A67F7624EF7C6B3C0F160647B67414DCE655E35B538041E649EE3FAEF896783AB194":char*:"667842D7D180AC2CDE6F74F37551F55755C7645C20EF73E31634FE72B4C55EE6DE3AC808ACB4BDB4C88732AEE95F41AA":char*:"9482ED1FC0EEB9CAFC4984625CCFC23F65032149E0E144ADA024181535A0F38EEB9FCFF3C2C947DAE69B4C634573A81C":hex:"41CB0779B4BDB85D47846725FBEC3C9430FAB46CC8DC5060855CC9BDA0AA2942E0308312916B8ED2960E4BD55A7448FC":char*:"E558DBEF53EECDE3D3FCCFC1AEA08A89A987475D12FD950D83CFA41732BC509D0D1AC43A0336DEF96FDA41D0774A3571":char*:"DCFBEC7AACF3196472169E838430367F66EEBE3C6E70C416DD5F0C68759DD1FFF83FA40142209DFF5EAAD96DB9E6386C":char*:"11187331C279962D93D604243FD592CB9D0A926F422E47187521287E7156C5C4D603135569B9E9D09CF5D4A270F59746"
ECDH primitive rfc 5903 p521
depends_on:4
3:exp:4:hex:"0037ADE9319A89F4DABDB3EF411AACCCA5123C61ACAB57B5393DCE47608172A095AA85A30FE1C2952C6771D937BA9777F5957B2639BAB072462F68C27A57382D4A52":char*:"0015417E84DBF28C0AD3C278713349DC7DF153C897A1891BD98BAB4357C9ECBEE1E3BF42E00B8E380AEAE57C2D107564941885942AF5A7F4601723C4195D176CED3E":char*:"017CAE20B6641D2EEB695786D8C946146239D099E18E1D5A514C739D7CB4A10AD8A788015AC405D7799DC75E7B7D5B6CF2261A6A7F1507438BF01BEB6CA3926F9582":hex:"0145BA99A847AF43793FDD0E872E7CDFA16BE30FDC780F97BCCC3F078380201E9C677D600B343757A3BDBF2A3163E4C2F869CCA7458AA4A4EFFC311F5CB151685EB9":char*:"00D0B3975AC4B799F5BEA16D5E13E9AF971D5E9B984C9F39728B5E5739735A219B97C356436ADC6E95BB0352F6BE64A6C2912D4EF2D0433CED2B6171640012D9460F":char*:"015C68226383956E3BD066E797B623C27CE0EAC2F551A10C2C724D9852077B87220B6536C5C408A1D2AEBB8E86D678AE49CB57091F4732296579AB44FCD17F0FC56A":char*:"01144C7D79AE6956BC8EDB8E7C787C4521CB086FA64407F97894E5E6B2D79B04D1427E73CA4BAA240A34786859810C06B3C715A3A8CC3151F2BEE417996D19F3DDEA"
ECDH exchange #1
depends_on:0
4:exp:0
ECDH exchange #2
depends_on:4
4:exp:4
ECDH restartable rfc 5903 p256 restart enabled max_ops=0 (disabled)
depends_on:2
5:exp:2:hex:"C88F01F510D9AC3F70A292DAA2316DE544E9AAB8AFE84049C62A9C57862D1433":hex:"C6EF9C5D78AE012A011164ACB397CE2088685D8F06BF9BE0B283AB46476BEE53":hex:"D6840F6B42F6EDAFD13116E0E12565202FEF8E9ECE7DCE03812464D04B9442DE":int:1:int:0:int:0:int:0
ECDH restartable rfc 5903 p256 restart enabled max_ops=1
depends_on:2
5:exp:2:hex:"C88F01F510D9AC3F70A292DAA2316DE544E9AAB8AFE84049C62A9C57862D1433":hex:"C6EF9C5D78AE012A011164ACB397CE2088685D8F06BF9BE0B283AB46476BEE53":hex:"D6840F6B42F6EDAFD13116E0E12565202FEF8E9ECE7DCE03812464D04B9442DE":int:1:int:1:int:1:int:10000
ECDH restartable rfc 5903 p256 restart enabled max_ops=10000
depends_on:2
5:exp:2:hex:"C88F01F510D9AC3F70A292DAA2316DE544E9AAB8AFE84049C62A9C57862D1433":hex:"C6EF9C5D78AE012A011164ACB397CE2088685D8F06BF9BE0B283AB46476BEE53":hex:"D6840F6B42F6EDAFD13116E0E12565202FEF8E9ECE7DCE03812464D04B9442DE":int:1:int:10000:int:0:int:0
ECDH restartable rfc 5903 p256 restart enabled max_ops=250
depends_on:2
5:exp:2:hex:"C88F01F510D9AC3F70A292DAA2316DE544E9AAB8AFE84049C62A9C57862D1433":hex:"C6EF9C5D78AE012A011164ACB397CE2088685D8F06BF9BE0B283AB46476BEE53":hex:"D6840F6B42F6EDAFD13116E0E12565202FEF8E9ECE7DCE03812464D04B9442DE":int:1:int:250:int:2:int:32
ECDH restartable rfc 5903 p256 restart disabled max_ops=0 (disabled)
depends_on:2
5:exp:2:hex:"C88F01F510D9AC3F70A292DAA2316DE544E9AAB8AFE84049C62A9C57862D1433":hex:"C6EF9C5D78AE012A011164ACB397CE2088685D8F06BF9BE0B283AB46476BEE53":hex:"D6840F6B42F6EDAFD13116E0E12565202FEF8E9ECE7DCE03812464D04B9442DE":int:0:int:0:int:0:int:0
ECDH restartable rfc 5903 p256 restart disabled max_ops=1
depends_on:2
5:exp:2:hex:"C88F01F510D9AC3F70A292DAA2316DE544E9AAB8AFE84049C62A9C57862D1433":hex:"C6EF9C5D78AE012A011164ACB397CE2088685D8F06BF9BE0B283AB46476BEE53":hex:"D6840F6B42F6EDAFD13116E0E12565202FEF8E9ECE7DCE03812464D04B9442DE":int:0:int:1:int:0:int:0
ECDH restartable rfc 5903 p256 restart disabled max_ops=10000
depends_on:2
5:exp:2:hex:"C88F01F510D9AC3F70A292DAA2316DE544E9AAB8AFE84049C62A9C57862D1433":hex:"C6EF9C5D78AE012A011164ACB397CE2088685D8F06BF9BE0B283AB46476BEE53":hex:"D6840F6B42F6EDAFD13116E0E12565202FEF8E9ECE7DCE03812464D04B9442DE":int:0:int:10000:int:0:int:0
ECDH restartable rfc 5903 p256 restart disabled max_ops=250
depends_on:2
5:exp:2:hex:"C88F01F510D9AC3F70A292DAA2316DE544E9AAB8AFE84049C62A9C57862D1433":hex:"C6EF9C5D78AE012A011164ACB397CE2088685D8F06BF9BE0B283AB46476BEE53":hex:"D6840F6B42F6EDAFD13116E0E12565202FEF8E9ECE7DCE03812464D04B9442DE":int:0:int:250:int:0:int:0
ECDH exchange legacy context
depends_on:0
6:exp:0
ECDH calc_secret: ours first, SECP256R1 (RFC 5903)
depends_on:2
7:exp:2:hex:"c6ef9c5d78ae012a011164acb397ce2088685d8f06bf9be0b283ab46476bee53":hex:"04dad0b65394221cf9b051e1feca5787d098dfe637fc90b9ef945d0c37725811805271a0461cdb8252d61f1c456fa3e59ab1f45b33accf5f58389e0577b8990bb3":int:0:hex:"d6840f6b42f6edafd13116e0e12565202fef8e9ece7dce03812464d04b9442de"
ECDH calc_secret: theirs first, SECP256R1 (RFC 5903)
depends_on:2
7:exp:2:hex:"c6ef9c5d78ae012a011164acb397ce2088685d8f06bf9be0b283ab46476bee53":hex:"04dad0b65394221cf9b051e1feca5787d098dfe637fc90b9ef945d0c37725811805271a0461cdb8252d61f1c456fa3e59ab1f45b33accf5f58389e0577b8990bb3":int:1:hex:"d6840f6b42f6edafd13116e0e12565202fef8e9ece7dce03812464d04b9442de"
ecdh calc_secret: ours first (Alice), curve25519 (rfc 7748)
depends_on:5
7:exp:5:hex:"77076d0a7318a57d3c16c17251b26645df4c2f87ebc0992ab177fba51db92c2a":hex:"de9edb7d7b7dc1b4d35b61c2ece435373f8343c85b78674dadfc7e146f882b4f":int:0:hex:"4a5d9d5ba4ce2de1728e3bf480350f25e07e21c947d19e3376f09b3c1e161742"
ecdh calc_secret: theirs first (Alice), curve25519 (rfc 7748)
depends_on:5
7:exp:5:hex:"77076d0a7318a57d3c16c17251b26645df4c2f87ebc0992ab177fba51db92c2a":hex:"de9edb7d7b7dc1b4d35b61c2ece435373f8343c85b78674dadfc7e146f882b4f":int:1:hex:"4a5d9d5ba4ce2de1728e3bf480350f25e07e21c947d19e3376f09b3c1e161742"
ecdh calc_secret: ours first (Bob), curve25519 (rfc 7748)
depends_on:5
7:exp:5:hex:"5dab087e624a8a4b79e17f8b83800ee66f3bb1292618b6fd1c2f8b27ff88e0eb":hex:"8520f0098930a754748b7ddcb43ef75a0dbf3a0d26381af4eba4a98eaa9b4e6a":int:0:hex:"4a5d9d5ba4ce2de1728e3bf480350f25e07e21c947d19e3376f09b3c1e161742"
ECDH get_params with mismatched groups: our BP256R1, their SECP256R1
depends_on:2:6
8:exp:6:hex:"1234567812345678123456781234567812345678123456781234567812345678":exp:2:hex:"04dad0b65394221cf9b051e1feca5787d098dfe637fc90b9ef945d0c37725811805271a0461cdb8252d61f1c456fa3e59ab1f45b33accf5f58389e0577b8990bb3":int:0:exp:7
ECDH get_params with mismatched groups: their SECP256R1, our BP256R1
depends_on:2:6
8:exp:6:hex:"1234567812345678123456781234567812345678123456781234567812345678":exp:2:hex:"04dad0b65394221cf9b051e1feca5787d098dfe637fc90b9ef945d0c37725811805271a0461cdb8252d61f1c456fa3e59ab1f45b33accf5f58389e0577b8990bb3":int:1:exp:7
| 7,636 | 111 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_oid.c | /* clang-format off */
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "third_party/mbedtls/test/test.inc"
/*
* *** THIS FILE WAS MACHINE GENERATED ***
*
* This file has been machine generated using the script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* Test file : ./test_suite_oid.c
*
* The following files were used to create this file.
*
* Main code file : suites/main_test.function
* Platform code file : suites/host_test.function
* Helper file : suites/helpers.function
* Test suite file : suites/test_suite_oid.function
* Test suite data : suites/test_suite_oid.data
*
*/
#define TEST_SUITE_ACTIVE
#if defined(MBEDTLS_OID_C)
#include "third_party/mbedtls/oid.h"
#include "third_party/mbedtls/asn1.h"
#include "third_party/mbedtls/asn1write.h"
void test_oid_get_certificate_policies( data_t *oid, char *result_str )
{
mbedtls_asn1_buf asn1_buf = { 0, 0, NULL };
int ret;
const char *desc;
asn1_buf.tag = MBEDTLS_ASN1_OID;
asn1_buf.p = oid->x;
asn1_buf.len = oid->len;
ret = mbedtls_oid_get_certificate_policies( &asn1_buf, &desc );
if( strlen( result_str ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_OID_NOT_FOUND );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( strcmp( ( char* )desc, result_str ) == 0 );
}
exit:
;
}
void test_oid_get_certificate_policies_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_oid_get_certificate_policies( &data0, (char *) params[2] );
}
void test_oid_get_extended_key_usage( data_t *oid, char *result_str )
{
mbedtls_asn1_buf asn1_buf = { 0, 0, NULL };
int ret;
const char *desc;
asn1_buf.tag = MBEDTLS_ASN1_OID;
asn1_buf.p = oid->x;
asn1_buf.len = oid->len;
ret = mbedtls_oid_get_extended_key_usage( &asn1_buf, &desc );
if( strlen( result_str ) == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_OID_NOT_FOUND );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( strcmp( ( char * )desc, result_str ) == 0 );
}
exit:
;
}
void test_oid_get_extended_key_usage_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_oid_get_extended_key_usage( &data0, (char *) params[2] );
}
void test_oid_get_x509_extension( data_t *oid, int exp_type )
{
mbedtls_asn1_buf ext_oid = { 0, 0, NULL };
int ret;
int ext_type;
ext_oid.tag = MBEDTLS_ASN1_OID;
ext_oid.p = oid->x;
ext_oid.len = oid->len;
ret = mbedtls_oid_get_x509_ext_type( &ext_oid, &ext_type );
if( exp_type == 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_OID_NOT_FOUND );
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( ext_type == exp_type );
}
exit:
;
}
void test_oid_get_x509_extension_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_oid_get_x509_extension( &data0, *( (int *) params[2] ) );
}
void test_oid_get_md_alg_id( data_t *oid, int exp_md_id )
{
mbedtls_asn1_buf md_oid = { 0, 0, NULL };
int ret;
mbedtls_md_type_t md_id = 0;
md_oid.tag = MBEDTLS_ASN1_OID;
md_oid.p = oid->x;
md_oid.len = oid->len;
ret = mbedtls_oid_get_md_alg( &md_oid, &md_id );
if( exp_md_id < 0 )
{
TEST_ASSERT( ret == MBEDTLS_ERR_OID_NOT_FOUND );
TEST_ASSERT( md_id == 0);
}
else
{
TEST_ASSERT( ret == 0 );
TEST_ASSERT( (mbedtls_md_type_t)exp_md_id == md_id );
}
exit:
;
}
void test_oid_get_md_alg_id_wrapper( void ** params )
{
data_t data0 = {(uint8_t *) params[0], *( (uint32_t *) params[1] )};
test_oid_get_md_alg_id( &data0, *( (int *) params[2] ) );
}
#endif /* MBEDTLS_OID_C */
/*----------------------------------------------------------------------------*/
/* Test dispatch code */
/**
* \brief Evaluates an expression/macro into its literal integer value.
* For optimizing space for embedded targets each expression/macro
* is identified by a unique identifier instead of string literals.
* Identifiers and evaluation code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param exp_id Expression identifier.
* \param out_value Pointer to int to hold the integer.
*
* \return 0 if exp_id is found. 1 otherwise.
*/
int get_expression( int32_t exp_id, int32_t * out_value )
{
int ret = KEY_VALUE_MAPPING_FOUND;
(void) exp_id;
(void) out_value;
switch( exp_id )
{
#if defined(MBEDTLS_OID_C)
case 0:
{
*out_value = MBEDTLS_OID_X509_EXT_BASIC_CONSTRAINTS;
}
break;
case 1:
{
*out_value = MBEDTLS_OID_X509_EXT_KEY_USAGE;
}
break;
case 2:
{
*out_value = MBEDTLS_OID_X509_EXT_EXTENDED_KEY_USAGE;
}
break;
case 3:
{
*out_value = MBEDTLS_OID_X509_EXT_SUBJECT_ALT_NAME;
}
break;
case 4:
{
*out_value = MBEDTLS_OID_X509_EXT_NS_CERT_TYPE;
}
break;
case 5:
{
*out_value = MBEDTLS_OID_X509_EXT_CERTIFICATE_POLICIES;
}
break;
case 6:
{
*out_value = MBEDTLS_MD_MD5;
}
break;
case 7:
{
*out_value = MBEDTLS_MD_SHA1;
}
break;
case 8:
{
*out_value = MBEDTLS_MD_SHA224;
}
break;
case 9:
{
*out_value = MBEDTLS_MD_SHA256;
}
break;
case 10:
{
*out_value = MBEDTLS_MD_SHA384;
}
break;
case 11:
{
*out_value = MBEDTLS_MD_SHA512;
}
break;
case 12:
{
*out_value = MBEDTLS_MD_RIPEMD160;
}
break;
case 13:
{
*out_value = -1;
}
break;
#endif
default:
{
ret = KEY_VALUE_MAPPING_NOT_FOUND;
}
break;
}
return( ret );
}
/**
* \brief Checks if the dependency i.e. the compile flag is set.
* For optimizing space for embedded targets each dependency
* is identified by a unique identifier instead of string literals.
* Identifiers and check code is generated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
* \param dep_id Dependency identifier.
*
* \return DEPENDENCY_SUPPORTED if set else DEPENDENCY_NOT_SUPPORTED
*/
int dep_check( int dep_id )
{
int ret = DEPENDENCY_NOT_SUPPORTED;
(void) dep_id;
switch( dep_id )
{
#if defined(MBEDTLS_OID_C)
case 0:
{
#if defined(MBEDTLS_MD5_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 1:
{
#if defined(MBEDTLS_SHA1_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 2:
{
#if defined(MBEDTLS_SHA256_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 3:
{
#if defined(MBEDTLS_SHA512_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
case 4:
{
#if defined(MBEDTLS_RIPEMD160_C)
ret = DEPENDENCY_SUPPORTED;
#else
ret = DEPENDENCY_NOT_SUPPORTED;
#endif
}
break;
#endif
default:
break;
}
return( ret );
}
/**
* \brief Function pointer type for test function wrappers.
*
* A test function wrapper decodes the parameters and passes them to the
* underlying test function. Both the wrapper and the underlying function
* return void. Test wrappers assume that they are passed a suitable
* parameter array and do not perform any error detection.
*
* \param param_array The array of parameters. Each element is a `void *`
* which the wrapper casts to the correct type and
* dereferences. Each wrapper function hard-codes the
* number and types of the parameters.
*/
typedef void (*TestWrapper_t)( void **param_array );
/**
* \brief Table of test function wrappers. Used by dispatch_test().
* This table is populated by script:
* generate_test_code.py and then mbedtls_test_suite.sh and then mbedtls_test_suite.sh
*
*/
TestWrapper_t test_funcs[] =
{
/* Function Id: 0 */
#if defined(MBEDTLS_OID_C)
test_oid_get_certificate_policies_wrapper,
#else
NULL,
#endif
/* Function Id: 1 */
#if defined(MBEDTLS_OID_C)
test_oid_get_extended_key_usage_wrapper,
#else
NULL,
#endif
/* Function Id: 2 */
#if defined(MBEDTLS_OID_C)
test_oid_get_x509_extension_wrapper,
#else
NULL,
#endif
/* Function Id: 3 */
#if defined(MBEDTLS_OID_C)
test_oid_get_md_alg_id_wrapper,
#else
NULL,
#endif
};
/**
* \brief Execute the test function.
*
* This is a wrapper function around the test function execution
* to allow the setjmp() call used to catch any calls to the
* parameter failure callback, to be used. Calls to setjmp()
* can invalidate the state of any local auto variables.
*
* \param fp Function pointer to the test function.
* \param params Parameters to pass to the #TestWrapper_t wrapper function.
*
*/
void execute_function_ptr(TestWrapper_t fp, void **params)
{
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
mbedtls_test_enable_insecure_external_rng( );
#endif
#if defined(MBEDTLS_CHECK_PARAMS)
mbedtls_test_param_failed_location_record_t location_record;
if ( setjmp( mbedtls_test_param_failed_get_state_buf( ) ) == 0 )
{
fp( params );
}
else
{
/* Unexpected parameter validation error */
mbedtls_test_param_failed_get_location_record( &location_record );
mbedtls_test_fail( location_record.failure_condition,
location_record.line,
location_record.file );
}
mbedtls_test_param_failed_reset_state( );
#else
fp( params );
#endif
#if defined(MBEDTLS_TEST_MUTEX_USAGE)
mbedtls_test_mutex_usage_check( );
#endif /* MBEDTLS_TEST_MUTEX_USAGE */
}
/**
* \brief Dispatches test functions based on function index.
*
* \param func_idx Test function index.
* \param params The array of parameters to pass to the test function.
* It will be decoded by the #TestWrapper_t wrapper function.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int dispatch_test( size_t func_idx, void ** params )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof( test_funcs ) / sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp )
execute_function_ptr(fp, params);
else
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
/**
* \brief Checks if test function is supported in this build-time
* configuration.
*
* \param func_idx Test function index.
*
* \return DISPATCH_TEST_SUCCESS if found
* DISPATCH_TEST_FN_NOT_FOUND if not found
* DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
*/
int check_test( size_t func_idx )
{
int ret = DISPATCH_TEST_SUCCESS;
TestWrapper_t fp = NULL;
if ( func_idx < (int)( sizeof(test_funcs)/sizeof( TestWrapper_t ) ) )
{
fp = test_funcs[func_idx];
if ( fp == NULL )
ret = DISPATCH_UNSUPPORTED_SUITE;
}
else
{
ret = DISPATCH_TEST_FN_NOT_FOUND;
}
return( ret );
}
int main( int argc, const char *argv[] )
{
int ret;
mbedtls_test_platform_setup();
ret = execute_tests( argc, argv, "/zip/third_party/mbedtls/test/test_suite_oid.datax" );
mbedtls_test_platform_teardown();
return( ret );
}
| 13,580 | 523 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_hmac_drbg.pr.datax | HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #0
depends_on:0
5:exp:0:hex:"a0c9ab58f1e2e5a4de3ebd4ff73e9c5b64efd8ca028cf81148a584fe69ab5aee42aa4d42176099d45e1397dc404d86a37bf55954756951e4":hex:"":hex:"":hex:"":hex:"9a00a2d00ed59bfe31ecb1399b608148d1969d250d3c1e94101098129325cab8fccc2d54731970c0107aa4892519955e4bc6001d7f4e6a2bf8a301ab46055c09a67188f1a740eef3e15c029b44af0344"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #1
depends_on:0
5:exp:0:hex:"07bddab06cf3d7f094cc2302abd700a9d67421aeb711f4bbe66f59e28a46794213bf3d0c3a2cbbb09205b90e0ef212c7679b37526a806789":hex:"":hex:"":hex:"":hex:"f76fd2a49d9574c3f90864f35f32253b83098ee04a4c8dba464a8035f665ca165c8a038be5e1b100d56752adcf59bea167e15b1d01c419948d2d0a85be66d19bb40e5e0a66cfd76ba7547eba6276ea49"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #2
depends_on:0
5:exp:0:hex:"6d283e7705a2aa4b1abfc1ff8559c9e7962df9229000b8e432ac40bad34797345f1ed6d7a0fdea8ec01e7a20dc436aa1d62153813d59d44a":hex:"":hex:"":hex:"":hex:"60ddce57be4563b87bb59e848496f42fcef9ed79799040e0eee68fd89b330109cd3b3f761348fc7036c0cf5d69aefecf91e89a7ae0429590569a88922aeff249ea783f00f795aadca729f96996eef76d"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #3
depends_on:0
5:exp:0:hex:"108a1fa539fc471e0a26a8d39633c88d1e84c26a62894e7dec15fcbeda9dcd1e40619dc03c7d3dd2db39bc8f4964949b1737b9cd69a8ff97":hex:"":hex:"":hex:"":hex:"b0fbe3f6b6667b88e2a48f3679f21ad83f28107675d43d2a5186dd6a0256afc6acaf995b3f07691325543b37ddd5bfb4934f46ff9783597b69c727c9cae1c6b83601a39227c53c99181ec18d5be60d5b"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #4
depends_on:0
5:exp:0:hex:"1db6fe209a51124f9eba3ae7a5690a31c9383b0d62abe0237fa6ce2b34b320b68d24927d9245a10f7216ded701c39f4d10dd6eb4ae912b78":hex:"":hex:"":hex:"":hex:"10e9661bbe14a0c768f09840979233865296fa801ee8ba97106043c067d3b01a5d3a866eb9b21f730c3ec1f11f022820a2a2db4cd07061acb85b0987e33892064b56626c962d1febe1eb97af6b99ac22"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #5
depends_on:0
5:exp:0:hex:"dac7cb5d659646246a2c3cd6cbb8b7bb9ede30c88355725c16576ca7567f52b51ea3f7e5d456b0e8b7a33faf21150e5b39999ee53fd05b2f":hex:"":hex:"":hex:"":hex:"7117fe0c0a9afa75c078b1641ba637ed2a4501e70bf38465914ea185da5a62048910040e70f279ca9f2fd5e478ffd76484f52afa62a29ca9d649f252f27a8eeca1ec95d7898f705421c92b60493e5c77"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #6
depends_on:0
5:exp:0:hex:"a422e11d41ed91e458b1dff7844e7a06eb807b042fec7c42da9a7d64aea6ec843cbb5dacf8517c3f7214d02d432fc64766f6bd40f54290c5":hex:"":hex:"":hex:"":hex:"e6e1b59d47aa47ebd862fa2336d50a920f77aff6d42942a293947c24b044756c9777231aa0ce8a67d2916136cf4477dde78b6fa789b4a570460538a3da199c2c64155692bc1aef3fa94ce8ba4a43bcaf"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #7
depends_on:0
5:exp:0:hex:"8020ccd23e6733f7638a6d68b4954b701dd2e3b33176d5d1a14b6cd8aead4e152e0726dd16b4d76dd9cae60e69023d0fd82b0b69b7cbaf75":hex:"":hex:"":hex:"":hex:"c2b22410ddba0466b6635ab98f7690572d7159d66b4f037fa75869276950ea4ab4a92e3011d7c3d50f921a3988906486590706c8e0eeeb487ac85ca924d8b3a4445e2af49365c10c6e99eb17d93286c3"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #8
depends_on:0
5:exp:0:hex:"d66ef5d12c778d8b78134704e345b08c6839471eb903bd0480169d4069d73a669a17dff2e1d6fc23f0688fdf7867f72a024ae445969458fb":hex:"":hex:"":hex:"":hex:"91ef2bacbffacbedc11da58d275448692ae26bb9920c0b14d86a42a65a9a79422ed77c3a8f941b428552caf6d15e057c2dd8b5cdee670ee151f674b4a82ff9754cb067c1a1a27302bef2d395379d6009"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #9
depends_on:0
5:exp:0:hex:"cb4ca0d6e07b341ea0d105e5128bcd6b6fc317bec49394a83c485ce4f8205361374484ac0173ef3f08fd65d0a11af2b3f90ee8bd3fcdc08b":hex:"":hex:"":hex:"":hex:"1727a7f580a267492646fc2c18e3539a131b52fa3d82ac8cb36227ebb94a396b139c0a709301b4f00b49ec63d7f48125e469443b57b16bdab66bdaf0684da425e63a596182de4674416ade17f0cef49d"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #10
depends_on:0
5:exp:0:hex:"7cec0120261bbeddd34eb776464c9b80667da732cc82c365a492b4def218ba2cad59f7b4bc1afaef00861c9b62b581444f79b8977e9fbf8f":hex:"":hex:"":hex:"":hex:"3ad128a75af8144cdf5cace68166dabca9db5d5cac6eeaa0c3d608d99d5da4a2ca90fc080d832e5f97060ab2247dc5dc20bc10be47e6ab03efeb662fc9d52c89d8db340cc4903be59dfd086f6d018468"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #11
depends_on:0
5:exp:0:hex:"29dc07553bb77cad6f321bcdd5c5c758b6a77588ee43d0afb15c0d981e368cb2482663aea93ded95d82a1a2a22cdbdf8de93695862cd9429":hex:"":hex:"":hex:"":hex:"5e1d53d8db89511fa996ccf513baacee2612da201c21d51e2927dcb99caf3132f6d2ccc3376dbf95520018515b0784e98b4226671cb3f1c7915757d2e59f1c4e843ea9c98004108118b4eb53bef2baaf"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #12
depends_on:0
5:exp:0:hex:"748777316160fc175eafff578481402ccd5a38508e4ac0603f86281576c970d3316ee58a36f809a8df9ef241861c04093a284d116384d204":hex:"":hex:"":hex:"":hex:"05f179c71691c0c2c64eda58b63a27772210f0c2c6973708a5f84e6b49f547169a839f2e97ce18ac94696337a9d1c1d450bf27b7fdaf1761ee8da9b55d59031a8516eeaebb1bd48a1e3bd070c5fb4eda"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #13
depends_on:0
5:exp:0:hex:"11e2e3934d23239aa6bf1abb07aadaf8df05892d126cd4be13f2965bdcfcc8396dcb16d8742eed1b276b562702915fbb59c01cafb7044022":hex:"":hex:"":hex:"":hex:"6ec1caa762b5b87ce92ef7d254536f94d41ed5a98696da5c14fa2d29aa95182927b3e2a5ee9e2012c911ecc5e244af1a8200de37cbff2b26d0c2271659bce074d5b3c06743f08d6495286068a1e5435e"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 0) #14
depends_on:0
5:exp:0:hex:"ec11e1929e7430b914b385285801e27df4aa6783fa1e3405ae706e740dda50209b20acf90dfa8cecb4d4b4bc7cba4daa285ff88ce9e8d451":hex:"":hex:"":hex:"":hex:"74acba48f0216087f18042ff14101707c27d281e5ddbc19c722bec3f77bf17ca31239382f4fc1d4dd0f44c296bc2f10f74864951f7da19a23e3e598ac43fb8bbdd1fca8047b98689ef1c05bc81102bb5"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #0
depends_on:0
5:exp:0:hex:"d92b39ff610db66427613c111c002b75329734372847a88f53c1d289b30d3584d34efb884ce6d1d7174a3c20508ca0171ed9610622d454fd":hex:"":hex:"9980d97c65cc8b3c61b390e48abc6523":hex:"76213356e359e94984cfa7db15220518":hex:"e0b298f7cd1112527a506201e38f7e60d762f591603db72aca3a2cd1b9d115c3ddbc7dcb7643f2f40f53e96e6ca1590ca27abb77a6234754ff1edef86f75fd5f298872ad1544fb88a62936e238f22aef"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #1
depends_on:0
5:exp:0:hex:"3c56bd6733e9cf9d765f3d5906c60807bd1c9c11f4a1293bb4abaefe6a65c978d9c75a704239e500319d9b4b8f9f121caef7fe3c49f9ab37":hex:"":hex:"365f1612ecb78ad7b1140dc66082ab30":hex:"0e5d2013782191581e4a76e0a2b5bec4":hex:"0e509b7b436d085c1080c3d9e6ee3cc563944bba0fad352d13182c87c8c3a0f0ba71e86676729da0d2f4acc2b57e430b8791c4f30d232a0fe48bf91d5824242fb8e36333837173d702e6738291b57efd"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #2
depends_on:0
5:exp:0:hex:"91a44f3e412d031bd47ec8907e32f0434a20d784db3f6ffd78b013ca0b00553698a113d75d8ebbe856554c71aa4b0d48af74bbebc97afab4":hex:"":hex:"9f4b3b3f1e2d849753d2cedc8d8c5d17":hex:"64a1f4d2b10cf97a268cae7034ca4d8c":hex:"232ade326de23ec970f66e6a540f306d962769d1b24b0675109ca7514dbc52003d154687f525f4a2220501d6dc92551df9111c8dd398356c560ce44f1959301dedbb197c0161fcad0299a9eef3e799e2"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #3
depends_on:0
5:exp:0:hex:"fbaa5e65ce5580d774739340e025eac46550b5d3865829eaef9b59ea37d094692b9fd15ca25468fcf7e38f7dcecd5fd85c686057e1ab9bab":hex:"":hex:"f0e722190994c66f64ff725e8a9b3be0":hex:"548ed3bbccc8f9f79c70b2e85ee0e626":hex:"2c07d2994fbf0bbefbbaf60e0dbc712f12f8ddc3aa6d94ea9e9d3083209ec35c4cf3e62bceb9ab042e60050520e0469961dbdaee0787fda6f1c49755855752753b1e87031a6821c04cda887cdedecc55"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #4
depends_on:0
5:exp:0:hex:"13747421a19855709f3c468a5b1f77c19eb589a0b18c06da3aae0078b85ee10c79d1925f5ab2045eac1f2ffdd850e7602cda7debeb042bea":hex:"":hex:"3c95ff221ccf82f4041fcf4e8a56de29":hex:"3471a7ab4234fc6e8678d3613ee10835":hex:"c346efd443cec6f21eca26eb5289e0bec5eb3f7c3785842e7690d5d35eddc87d79041aa0a9d5e4ee9ec69a4b67b26ccb70eecb59df582316b8f1b945a25c64b861a6decb59adc1447cea219947f6aa72"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #5
depends_on:0
5:exp:0:hex:"4f72d884628c90261fdfa9b87bdbbce93daaf175d0290ae7f725e8a9f9b8c98807b57a591d4e8b2a5b692a6e310c4851bc4a6d986eba9cef":hex:"":hex:"8b3a7401800ee1bf5fdc76243b313244":hex:"cc199f4f43036b0af63fe3f8ef4ab3d2":hex:"6950a89759b52b6c8416600f9e0d56d19fab12b423d746af9d00a6657f3b8f3a3681c0910343569544b8b537294aa610e89b977c4db21a324317587be8b9232b38d354eb3e4032cacd561dfe42e72d23"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #6
depends_on:0
5:exp:0:hex:"59c23b4073e7c9d2871d5d882953a33b17eb2a8b0b9b068870c070deb9f1324b8fc29fdb612c52dd300889913ab120536cf9a389485859bb":hex:"":hex:"a6483a9e5113a45a84f6630869291461":hex:"b93bbb79da7750f44e4561081ac4f29e":hex:"6a298856c9b25b20de0159890135beddc415802307b87507d62b2ad32b1883e4ba036308a6669a06246d4afc43a29e183ca141f156f7b1975095bf14cceaf71cd2831fac8870d90fe0e1067434783a5e"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #7
depends_on:0
5:exp:0:hex:"a4b620abe19aff576cddb8f6d1e83b59c26d4ba79fb8346974ca841db33e280d59e28e110cfeafc4f033c6a45f443f528a326ed4c2de5cd9":hex:"":hex:"be26760cfc23c0cad1ad0978c3ec8f09":hex:"e767cc6694242b003d6d3795415389b8":hex:"89d79211db69679c2269dfb2e599740ff646eb9ebd5f28a68b76665e6087d15fb888bbf899e3d16d711c3db63e3dbf9cd9bcaad6984be04afe5b41c2270431948ddf4486272f136f1c5bdf37cd2a70e8"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #8
depends_on:0
5:exp:0:hex:"994e455c4815ffd4a9ee168d1fccd3b661da827c4e81b102db0b28977c81bc4dd58d06819e2939883983f9ebf1356b0d01e6dc02735596ca":hex:"":hex:"029caa66544f6ae8f6cc5bd3791f86f0":hex:"7f14c05c5d88acafab220aa467e3e3ca":hex:"fde93e19f71fa97fc368f5f4454df8a39b3fce42bd4a801726b296838c3dcc6678bb387687e2c943edab86902e377a619950d36fe78cd7ba3c67aaecafdd9f7faa2076d71fa79646933387bd6bee147a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #9
depends_on:0
5:exp:0:hex:"2713eb063d3876dd6c3a5903a1ef5774a180c4123eeeea8a4aa472cf07c278ac367a9a490c7ddef058d6bf34ec9db314abb119a1a017a17e":hex:"":hex:"4452362eed6b9c30a01f784a9a06dc5d":hex:"e59780f291461d2665924f3af8bcb6e0":hex:"743f529bee048d0be6f10da0101c63c746fbeed37c6cd0c0ae97854893a00c82b65acc9e6e6ec04357e5e4b3159a4ef3e5e57a38da2e00f0eb3c1538a26ee1a518f71169d59b0d9e8a021f3d623b8fc5"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #10
depends_on:0
5:exp:0:hex:"ff2cb4930d26b0ee75bd9edfb77e09f50c80049f75ba95a5137ea862d086d6523bdfde203bb8c2a9bb588ef2428a173453136bdedec37eb3":hex:"":hex:"a52775c066b6e9f7508b30ca22944296":hex:"5e4ad554e65a49685e8527f923cbc0cc":hex:"4e9134db809bd07a46f40bc1a1f6d830808121eed25d17d7ce3eb81bb88ec660b7dd945ebe9fef8bdccda92139f4770ab8a467e0118f24680c6f6e5b9ad6ee94a086118b6cf69aceb8cd809d91429aa6"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #11
depends_on:0
5:exp:0:hex:"72971d13d6356e68fa61d94ae1d76a91b69d8b39499393fe9eb2889d14d91a7488207bd8ee536d481b37237b0995a218fb56dd1740335992":hex:"":hex:"0e59b74d4ac5ab8bb51c7f4b99ff859e":hex:"232dec60628a43216b75839ac820fe4d":hex:"1f1adb85b8d7d1e022d5a6594ce074242683993ee4d3c5166a2aaf40c239830587b1112af2a4313e363ea4a980b06f20c5ee3207de026aaea9197c95d0e771f4f16a2cab41c0684c15e6462cb7a5a71a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #12
depends_on:0
5:exp:0:hex:"975c10933f7351262a4296aa6175471fa34e7c9b3437b5c7013e22d2a9002e9e42d27202e0518b53da23016d1f5b7b63c46c1391886934d5":hex:"":hex:"b7063d6ba3740d5c258303d5393f8f3b":hex:"9161780ba6bef05da7290a77416767ba":hex:"b68b4ebb6856af7337745e0a50caa1d34abe27594d56d846794c15bc03973d67d548bbd2680dc749c5171372e27af16900d6bf729a84e6d7626563ef0b4c90c275d9112567b8ca6e0093b34a0966f27d"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #13
depends_on:0
5:exp:0:hex:"e1dfa7999006aee12a2349ae1d580f5ca2a437dc0bc294f449f2670afc55e8fa8152c787a014880f670c585cfca574ea2d13f28e6a0ea677":hex:"":hex:"d77a830f650a3331a72f0a4b1471dab6":hex:"37aef81e729ed0b91bf054ce98df4a76":hex:"c009a692d7e566b58cc54a45f7d6987a48d96c3664f6034ae3ac0dae9ed5c220c46ef0c638c75353ac790124d88ca54fe43797f1a70422604507a2ab458fed576ccf6d25cf521da8d0c3b7bfa16ee6f6"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 0, 128) #14
depends_on:0
5:exp:0:hex:"310d8d08687545e48493db179e6e92a176cba53ff17cd783ba5d38da5f2e51468b0a9489c88b8db0be4a2c87c875be0e1be01aadf2efeef6":hex:"":hex:"a1824b07e0d2ada0fadec29beb53a9f7":hex:"ccdb3f7d7f6a4d169f5f2e24ec481fcb":hex:"bfcc8f2ece23d22545ec2176aabd083855923ca9a673b54b66a3e2562212aad3cc74c4c8976de259cc95a2f09a85b7acd1f18c343eff0368a80e73a547efdcd954816b38df1c19556d714897e317d69f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #0
depends_on:0
5:exp:0:hex:"db8128c27eaf3a39d5019785aa35b20c3977437fd75e8032ed340ddbe1b29eb9bedb3048a3fdd06aa957c5cff00eb87549c307400d4059d0":hex:"4f8060506daf40819c7c58630151edc7":hex:"":hex:"":hex:"4ac933b7de803c266461493a19dbb00e9db25ee768165781fc9a70c67c4e8a92db36471e3cb1714fbb65e17d74770061b0abae52be34a604d87e56a4ae1e90c6533cc764aa7419b5439e3efa193934bb"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #1
depends_on:0
5:exp:0:hex:"87c80a5e334e02a36f59324befb4fae19e5b73aef691d45e8973f58a487b457d73c4312ff890b053472d95de538f1512f6432233b7d9c058":hex:"6cc5553434148499d65f8e4ab7334938":hex:"":hex:"":hex:"5ccdcb3d022eb4d72c211594c916dd2d883d2ecc190f6e78ed76f438562059e6f8800ce6d11b3b8603243f4a56f38d41672935ace8d6fab825cb6978a2d0827aa65c70523c48f7b9a8f6fe43cc2ba927"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #2
depends_on:0
5:exp:0:hex:"83c113dabd43229d4a7333147c7d84f48fc29ea3d813c0f1d45c5184906a02ea4c6f11b149db7f98812904be3ee96de25ac9a78ccdfddeb3":hex:"77dc45d37d6d401e45c982f2c4960fd6":hex:"":hex:"":hex:"e4f08087eaae11fca94bd7df816980e6608e208032f944f1efc50ac8d47834b9f10c00958837633e61f3ed2351c6885446b72d2634bf6b69f9d7b7a36f3fb8e98294f1e9d92a4a725462e60325dc41ca"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #3
depends_on:0
5:exp:0:hex:"aec809c1b7eef916569cca247cd9e7b072df669458c8af4d29fecba0c46130ba920fc8bf7d29cfaeda476607f3325566ef52fb69a3defc54":hex:"824b11ac7e13f654ff4238e0f28a2f60":hex:"":hex:"":hex:"514f1adaeb99dd2833f714a53804aca43a99fce45caf5db166b15acb0460f5e7e23c696fdaa8ecd138a937367483dc7bb7a6af51a611aa7b0671559aed14109133738e06bf2190bb85abef3a674e488a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #4
depends_on:0
5:exp:0:hex:"b2f5cacdf871e742c262c7671b59a74c6a41242b2225f252cba7db3bf77d6619af46532eb9c01b72cde2978ec39e4fe5247ac5f0fea559d8":hex:"2cbfb9bc6c318219df86e08ab11419e2":hex:"":hex:"":hex:"67d393c84d05983f5acfb8883ed44e24406f216efa3d6650807fabd3028fb1f762d6c67ffb0aabe8143fd3ddfda8ca2c7ef13546dcffc4dcf95b610a28f7cc2a25ac4e7ec0944d655c56c110fa931ff7"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #5
depends_on:0
5:exp:0:hex:"54ef54d0425f8cebd127fed0f395884613dc19463664d19d02af6baf06de126b55fbb3d7f114728bb4650839f1335f8c2c3be18ea3beea75":hex:"f0cef260a2f74a425d062bb25c68c539":hex:"":hex:"":hex:"dd8b96a5f3fbd0f5f69477c5b7e71099b2113888fcfa6acce713a13f040b0b5fd55100a3d0d3a344706a31e796d6999f63cc6357f5ba386f38d46bca9c42a25c4a39afdc7db8d843a032ef35bf4b15ef"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #6
depends_on:0
5:exp:0:hex:"4a1781c483eae07e0a9ddd91b908fb00a21a4f5e1c6e9da58f380f407dbcc982cd0761e5f0fd6d339a646bdc6132addb7ac0cdefb1b91f7d":hex:"c4b7084d73d399c128e0a119217c793f":hex:"":hex:"":hex:"e465cbc1502709493de1d3347a07f855b2dd6435a4ebaaf00e7756c1439219546e5fc67093f0eac1055d221fde51297cdc9ff41121d582514c75e9906870f99d58806f1873f0183277510cf1f067a840"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #7
depends_on:0
5:exp:0:hex:"36974a7c276e18ed2704eedef6b627f8e57e755d554b80efd0f065c236f78964cfd3b661405b98640631fda19fefa8b5b003e8b752ef060b":hex:"626a8bc0d1fab08c8c6afcdc3dc6ac33":hex:"":hex:"":hex:"6b9ae340e5e75e1dcf6f181589a1fdba3951417c30467be4b41e9ff4ce03073ef1ba0a19d160abc8e5e23ed433bcc421ff1f428780454defb66511fc94794f3ec1c48c014d783bb173db102275b64b1f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #8
depends_on:0
5:exp:0:hex:"05f934d668e9630a131ac51e2560e45a78ceb8ef6fad7190045cd995039bfb3db624f4687302445fad08829815e7407fc962afe2779589f5":hex:"8536223ee0184eb43e84a07cf71d445d":hex:"":hex:"":hex:"97142414252556f5d5efafd39852d7a84e70316a0aff7985ed6761798eec57621271977bb950187a290dd4dd514b7a801c98103d4fd4012afdfe0f264bfe3f6e584768503831ea0211fe0415a0f59324"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #9
depends_on:0
5:exp:0:hex:"e2ee5b3970ac4cb83061e5692b349df8643b6100aac55ab296fcaf7a2ef7e3a1aa54c3fb1963dfd93781ca34a95d6fc3250762bd1d31b0b4":hex:"71a4316ea88341dcf3c9280a5cb54b7f":hex:"":hex:"":hex:"bf767ed7e5f11abf1a6aa5c453fa124401297e32f23270c8d78423a98f5e6783f3e8e835aa734b36c2f11be30acf0b598c7a23ac40ce894689a24fd8de3e0812e9a5cc1791091c981bfa9ec2168daf90"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #10
depends_on:0
5:exp:0:hex:"32bd60df5e2b435c922a9e434f5f99be9c5437ff159c7e5e67b81b82f7b5ecdf6e60ec4789820d37a1071d7b91cf1e3d14f10ef7f34922cd":hex:"c759e4ab6c8fe8a11a1f8472b06eee0f":hex:"":hex:"":hex:"329cc81105343bd74f24c0a59b972892e789ea20e46ead1a74e7af036a836d46c70461c52df5038282e53e2db44143590d6015809db56754b778a2a7278d5050eeec9332fd732c9c714a676563c8c3ef"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #11
depends_on:0
5:exp:0:hex:"ac524ec09761670b96563803218a7d3589bd8e682b2a5cef64d96b968ec98839a97a4704a7a5b2b859f3ed6c370031f1027def8fa0672a26":hex:"1531a17d3d89c1d0775f3a630ba730b8":hex:"":hex:"":hex:"47e3bfaa2cbe4b085603991aa739363a639b064dd9120e0149cb5ba2ba0539c4147897a34d98538935fe25ab36cf50f6a1c3aa2892e2c06591e4c2bccfa990f6317732d5581944c8d2ef96d0329ac574"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #12
depends_on:0
5:exp:0:hex:"2c9a43ef1496352ea62ced1c345de4090a9cea6898b8a53abb2f01a435ec6d2050a692b44fa152bfc42ce4ea30ef761297c1ef132839d411":hex:"00bfb2ff2600fe1dc6a2d85642e9eced":hex:"":hex:"":hex:"193d08bfb22121deb22e8079895703e2a518b79bfc3104038c2a220f6babeb8f28f5652d5d1b3a8b468d8a4ed0cb32c69c5519ded85ddc0fea62d77ec5158b6a55caec3bbdf1f6b93e449d6f15cce26a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #13
depends_on:0
5:exp:0:hex:"0f15ec0c8d3c184d9b2a47bf9ffa20982685161bec91fad2c55808ccafd46ecd18081738cf835e1347e7df7e3f879f3fbb759c2051e34217":hex:"eaef27215467d7878106ba9dae990bef":hex:"":hex:"":hex:"bcf79ad50201f3498cf18288dc30c32dfbf2739490c74862d5e9c66b16195590075cfe094956e2bcba2009b64a5f8b62d144158180835a7f51b706a12884e309ab4ec198f5bd07efffd591d5cc8569e1"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 0) #14
depends_on:0
5:exp:0:hex:"56a0b6194153e0d2737f49f4e5cb77ba4d8fbf9914405833f324c09f96434ceea7e756fc2f55a0b3f043b6e11fc2f671ec00f4d478b791c6":hex:"81a85cb2b6afa99a1f609f83c3b15105":hex:"":hex:"":hex:"40e87b822b1000441884a38b8776baa69fbea99962571e8a20d8af012d50c8c211860ad579869ec880320ea8057d5cb0de9496ec57d8b594ca8be5b94219eaa800af7205f8a83b66c87e0fee9aa9732f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #0
depends_on:0
5:exp:0:hex:"680face90d7bca21d4a0edb7799ee5d8b7be9eeddd0e3b4b7cafe231630aa95a742c4e5f5f22c6a41c0d7792898827948a589f822d1af7a6":hex:"f58c40ae70f7a55648a931a0a9313dd7":hex:"dc3663f062789cd15cbb20c3c18cd9d7":hex:"fe85b0ab14c696e69c24e7b5a137120c":hex:"68004b3a28f7f01cf9e9b5712079ef80871b08b9a91bcd2b9f094da48480b34cafd5596b0c0a48e148dabc6f77b8ffaf187028e104137a4feb1c72b0c44fe8b1afaba5bcfd8667f2f55b4606632e3cbc"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #1
depends_on:0
5:exp:0:hex:"b481041a75b03cdaa07784e372b376897fa9e792e1fa5e078d4c7234fb9dc3f9804b4e48a32a5db74990333c4951d02823765f90a0aa8850":hex:"f8f0f1ed3f0bda164e596ebe123b7f75":hex:"3120e329f1d55a8c07e7472ac77e1720":hex:"2b9ff310e63c67b5e0aeb47ff7a102fa":hex:"7d6b3ab84bb6c014dd44eb1266fb3954f1e8ff6c48a4d91514f685f0642497cb1936a0afc40c8ddd1545204e128fd06d4d18bba05d1294e64d57a0593b803a311b37cc2d631487ab03a00fe288e5e745"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #2
depends_on:0
5:exp:0:hex:"aef9d310cfced29873b7e2b7be37572b76ed84b043364cca611917f9b12053f919cdf60ac9c0b364909f096204f21b58b0bbdcf38a3be7e9":hex:"67e5aa83fa572ca27acfcd27d4f5e49b":hex:"7ae90f7dc220bf5b387ed44c2425af29":hex:"9d750dc13c19acf3cdba10155d3ca5a7":hex:"892776bfb009fe0b1793c0ebb2ba549cbcc4a29d0374070683990c3f2c622ee08977fe9361c59838f068f6758d7f3f76c383d9f59ded8501f25eff9be4a1e2de3ee484a2e8069c51e886a75a229ae15f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #3
depends_on:0
5:exp:0:hex:"b68686b8cf817da9c93cfcd7aae410c02d3a8eaff57c6ecf990f20f70c587166292b5f56cef1ccc5018c38a602f811c7cdc16ed59faaf405":hex:"03cd598585a3a80f9a81e2780c699269":hex:"dc761246e0a74339adb76c729ec1414b":hex:"b2936022922202757eae4e5d59eb29e3":hex:"6e9735b82a9da2074f93b54580aeb76bc75265e525f1b50a8ee0d6851317beb64f477f3b3457ca9c120cd8eab6d37400ae62332bc91cab803b0c44e070666f9389a9d0fbe8baab9cc5c0cd54a397c8e1"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #4
depends_on:0
5:exp:0:hex:"cb68eb95bb00beb896048d5d323d737942b1a4795806fc6bbcf67d195862172f49bb319e609965feda2937165b8dffa6560e1fd434a5ea0f":hex:"700dc7725321a0a21a70ff6aebe30d82":hex:"d57c3dfbcb18e280cef81c7118a520f2":hex:"6e569776b8a26d8e7d3c87f99f932aac":hex:"b017eb98c5d782469658d47569453b8322a8db7a2abe75b4e68637a395f7c67bee75a42b39def3aacb0b1a03677a0bb4d31257964f467b7b3962d912daf6d8441e5952aaa427c246a1f1a623a8498a53"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #5
depends_on:0
5:exp:0:hex:"81e7eccf46acd145d435b80f2a6e72eb1b236d02f12554270c26e8ba13e9306856d6219ad04a8f1be3fa436bf280f579c22b64c91ac700b2":hex:"33a186afbc44f3adec590d7e36bd9905":hex:"bcfd99d6931ea9df679d196d8412c9ad":hex:"6dd61af0f5077df531c151f2dbe2bad2":hex:"41e6ced34a97afee72166239455d82fe020f5464ccbc8e875e06a05875ca844d8b7fa3ec360d31ae57f53245e7c4bed501ebb6f9b4af350ff9cd86a571360804d3a34b9dc11eb4be6427f521bd14f893"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #6
depends_on:0
5:exp:0:hex:"1b76bb8a0dc7067afa193bf5dae1cd7c03dcc37b5788d22fe0f4adda99dc6d776fa545aabfb767255001063ddd99c7ef656a16e7604c5102":hex:"b06bb683dc5018f0678c14b97547944e":hex:"87ea4f713562b129079b49956eb88abb":hex:"5650ef281323b6acec34c51795c67160":hex:"afeae028a358702743b14dd64414d3350eb1de78702677e30f7ff9e71d6f9b368c53e79b0a353a43ec06e9020c7234232a07d504c163d7a8a63496bdaf670efcf2597b66bd0dea2b827e0a4ce513425e"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #7
depends_on:0
5:exp:0:hex:"117ad3f68248555a2b9941cf0a56726ca162bf9b531f26e3416be004bcc6fc35be8362c6dbd9771d42bd6e187868d598f6e2647b536c9728":hex:"16168c2a54d8dd7150cd7f122482a723":hex:"4e4cb0001c5288c1538dccb80be01e41":hex:"8177c1d4def6bde093f27a9894d345ee":hex:"1e407dd8c1dd1436064f2015eab9c5fb9b88b6dd017e1196ce70fd9ec878a8cb02e2d221f4096e7998dbffbf0b392e7f4d97e0d1cdf81755507c04b5a6254086b40d153b10faf0011980bc0911275145"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #8
depends_on:0
5:exp:0:hex:"54bada0b89d9f5bbea78aa8c409dccd039acfd7b1645a0ef193b60cac97196e4cf9795fede9d898d082a9731a8ce2168a10420c5d6bd9a0c":hex:"1c8feb149d98faf15b73622167064088":hex:"a71ee8a522d67194bd1756c2e2898115":hex:"669ef07679f336f529058672f861b0f3":hex:"d72d43ff8704248a0d59a111b64128fa6bff265c52bdae38507ce5f302158be902d8380fe247abc0275dbbb502867f7ad1cddde0e404fd9d64ec494daac5d088401b4da696f47a31b4435abbea71c387"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #9
depends_on:0
5:exp:0:hex:"8cd407fc7a36315f1cfef1489a2ecdec433b2cbc1fda4ae1d967e192ea8942aecaa169deca4c268246edb421a0092a12091497a5fa159327":hex:"114a4f3446eb3c98aa9c182d329b2856":hex:"f29994a39804004e7ac50642f99c403b":hex:"40782cf3d002aa603026e26d3bbc6dd1":hex:"cf381392567f9e0d1f55c642bc64075699254df6b4b375fff8f869f7a10188046276dcf41076c55990b6b997db182fcc88cbacc4782347b9f4ce39351b77e378931d5cd026d997ab104b8b7787b2f92b"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #10
depends_on:0
5:exp:0:hex:"dc8d705180e22f8be91aa4bd57a02caa30fe8340a53c64ad2d460e409c3a2db9fdfde9034a4c8f306195fa6653dc29d84d26af5118fb60af":hex:"4b51ded198d1b16f80ba9e536a2a046d":hex:"ceacb5b37ca76de240a9f4dea89a0389":hex:"73c614b8e273ea9203683d1b0cb2d7a6":hex:"6a136d4218255c70913b73af480af86cd8ccb6f319937e075365ef014187c312f9069f1fd05c6e0c44a1b7ba9dd25e948ac155461e425d864cc83b63bd84289b768058f7647a8921e23bfa7c73b4476a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #11
depends_on:0
5:exp:0:hex:"1796646b48a2b982fcf7a4f49fee7e3d6be673106a4a29371eb8d3598888d53f59572c63c0e4bb183b17e0f67d81a11cc878ef600d1bb810":hex:"5297aedbca866d1754c4b6af443ab24c":hex:"771688574b52154837bdff6ddcf24d52":hex:"f6c627bc84b2c01a9c055d4632ec955c":hex:"9d1c796a2343ee855859e04ed702fa233da2f73ac9ad632fd17c8c5afe15c5600c6ab2495018f808b1cebc54b14ae2b1f929347be4aed9836e0b45dd2352b23cb28d753045f1ae6aff7598a9a1c350a7"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #12
depends_on:0
5:exp:0:hex:"c5aa3b0e9d8f916f18e73daa0cb88a447f7510af40f9dd540f8ae4d62be2c5754f6eb10410c121388233201ff9c8121a36ae77e042a98211":hex:"06c35c446e28f21fb1cdf2d40af53dc6":hex:"41015c3ef3adb96edbfaea6eb8e0dea6":hex:"e6b60016bb99415640506851c0fe3fb7":hex:"027ff1ab4c406c048da6a8c24f04d12a5a35a5191b62b496459b750b10066cfbac502b1ac612b58527744f6ac5005d22d3f86c1adeb1c1bf1a26902474d08bf886ed5bb26e6d1b529df0143128b397f4"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #13
depends_on:0
5:exp:0:hex:"57c7e29e0305e6a803a568f47acaed60d13e192c1e16bd9bc50ef5ebb52c5493bcc4d7a0e5be64d064b735deabbf67e94395544497e4816c":hex:"89199bb960ac741082c5fe5ea34ea2f3":hex:"53b5b2783d8191ad4eae3ed87bc059ed":hex:"fce4d7f5f0cb2115d4c4be2294deca56":hex:"b98839a962db8de7a17d35c35bda06c4139db3933c4ee60bf1779b16d804d7c600a62f9c57cef93a79ff281989d90481db863d23cd24c4b566d74e1de6596b7cceefcef1f161e5a51d115128e0b23c5b"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-1, 128, 128) #14
depends_on:0
5:exp:0:hex:"567d3f4c0de396ed67569c070d87f2b535ec874e881418983ec42ceb295b7d312e715e46b96f9da5998f9cde45b1dc22db6d2d7bfd4f3930":hex:"43c16ab49ca5174f907d7899ebd242e9":hex:"6c0b479d9e847dfbeae230bd4601d0db":hex:"0d5a2183c9f9ca6941f6a617892f5e47":hex:"934fe82b0951b97dafc5ba16e87b0459691156b42ff2dbbbd8f6ed9b04be952af267c6a17fbfc86de91f9f07eed482a5362b176216a8963af485503ba93b2e82c03a3ee6225077d90cd961e24f6026f6"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #0
depends_on:1
5:exp:1:hex:"f3a709bb47a36838cb998fb6986ff074c57932a669670570ff6cd1b202ee1da014a011f43fc02c51ffcb4048cc060763f2c58de2edd494275da14118c9cb7fd50475c66cc7e792406213a7d00cf7623d931a5947":hex:"":hex:"":hex:"":hex:"bbe3daefa61fe302bdaa6d4d379680acfd0d456b5d35f137c145b72626f2fcf39fdf7f3708d9e88c1710408a3d7ece3b0261ff538846fd5452149960215c0c22beafe6cd24a7c392d5845774b87528912c322119a2adf4d35a0ba61dd36ffc8a7e7475afec58ad4a8cf343afb677f087"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #1
depends_on:1
5:exp:1:hex:"0f508c6330b9673e94861ae2057e200ae8f2b330b74634d79fe8a4c698211080db07e58b762a2387379f0c0e2d01b2ca40ef82fec35eb81a5493ccef709dbaa0b0e4494e460530062c8db7446bc6af2d852fd875":hex:"":hex:"":hex:"":hex:"583367bde003eb2061cdb6f51db9c6827cbcefbff0497ba823e112edbf7f2066fcffa3e92d1e8c531007783554e6aa8a633bc925690ca6d579fbedbf9cc4d6cb08133d0cf8d4c25fcd3b6fed95f00b1bb17477cf67b97a557e7da933bdc121481755f628fdf0f0b1189a097c7147169e"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #2
depends_on:1
5:exp:1:hex:"9082871e73b098bbc58f324f12f6a83c321360c9f5b400d00a9bb865ef5265083d9309657c40ac94b579995902df0e2084eb4a6410cac605e482ea4abe5c8eb73bc63f68baaeaa56d47f7d74974d940555fd3861":hex:"":hex:"":hex:"":hex:"67c2fd4397af79297782af9baad2a26b993efa48c689a74531417ae102d4ea1d6a82cb0321aee3dc2572ad27299e81a7a77f1cf837119e746988f2ec60bb01eb2ac3d110a948c1c33e86833757e2670cc3947658f3b2d32ac59242f152e889d03d03056f0a265ee759d3a4488b55c63a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #3
depends_on:1
5:exp:1:hex:"4701f34326930cf93deaeb3a9c196e307a890c8ccf44a55f84593b3388a196238fdd97d201998ec734821998e7d6bef7b31fa2a81343918056c01d65f519c8576e4120a3d6b9ce28ccf57eeabd012d2c14e47045":hex:"":hex:"":hex:"":hex:"b499b86b0a25a0fc84a9a1b902972e2bb5aaf9b84f13804d6180491285b9316218cde0e73eacf722b5c664f4e618625ed35c5facbfca153cc184309754ecaad9c3678ce51ade96dfe3290e125d661e2afbdadfa73240c24939bc31d171712c7c987bfb434f1db6ed44b321bcd237f149"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #4
depends_on:1
5:exp:1:hex:"a912b6755cd2d677d63268a5203739b0785d7d956738a596e269128a583921aacbba1adb7c6d1714c164143c8f44e76711965514651680235068476ab137d5962e5e5872f3b899d0e9ca5ae8fe71bdcfaef1d241":hex:"":hex:"":hex:"":hex:"0f410304b6d88e52c8d6039ca674a06c49a5fa1094cf341c4034e39990236d9e5bb8ebb6e59849e7df82e2d02981d8df21e4ba3381e606b99c16de62860a470109c0123c69ebaf970603f451f9e6acf83e1c5951c3cb87170ef319d9a791110aea0c0dae5623c287d4c454ec93227654"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #5
depends_on:1
5:exp:1:hex:"54fb376707de02a1c385a3da78523485111a0a099066206f210ad848f29d3c270d2fd2f668cdd3a57cabed71f9d784c209259d1e4a3eee2046846a55a46965e495eb29725a86bd630dc43cd60ddb4fc93c59980d":hex:"":hex:"":hex:"":hex:"a2e3ab5390b5b79786ec7b434de48e45f590b85513106008479d8a3b7b236c884b0f871d8dee539c712509bd70de351f3881cd87c9cf77c1a9d8879986ff0f6678549c5c6acd15aeb6bbe653a9bc76829df2f194c5f6e8c7dd3058971ce15273a2d559c1ac60a0014e5e32352d6be2a1"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #6
depends_on:1
5:exp:1:hex:"3a0c24b5a6106d28c02957538e76e96b3ececfa80ba4c7d01fe642a88fc822884cc36ac2703e8952ee635948715f78c542e6e3270f2757f1652474df4706490b18e649ffd95dc518a8b4259da193600af5d5bde1":hex:"":hex:"":hex:"":hex:"55dc24206aa59d34ea990ac6b31250f15ac056c8ecd52e159f3464c38e1f28840eec4c6423b0fd9971d11c5ab99225eda5d173c08f9439bb56eb1cc487fdaea934fa816f9c9e0d628f111cbe60a647e03892084f80775248d41cb587617671d99b508644476b66c1c96979e5061e025a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #7
depends_on:1
5:exp:1:hex:"ae7ff70bb69c964f05c99c0e7868210d567bcb5eb02db7708de162e6bbfd91fa17f30656420dad1ca69d356cbab80456cef922a9206f07d32c3f198c1a68e673c5583674bb1df1f2a69c554fdd3411c81a90c83f":hex:"":hex:"":hex:"":hex:"f1f3f79b1d7f988d4caf7308416f3d02371cc029a28eb4f0247c8625c4680a2dcbe9f3d56d92de6ee4d4031a254bda8a657bc147fb90c2f7783a8e3749b60633e5a921d015b846b3cb38830bc7554308af08ee8219e5acd1b699f1ac538930d257da4ef567ca570a7951bfb236d4d36b"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #8
depends_on:1
5:exp:1:hex:"86704ad0286f88dbc60baebc2ed0571de7b5ab64bc8554ba8645557fa10159ec03cc9f6f299c1c3011c73b2563e571fc24f5b5b50b4bee514d7c808873ca804b147201ba7ed43430d89b066c04b00b0a17694523":hex:"":hex:"":hex:"":hex:"6b1a26d7d21308d217bc8988067ef3e21f5bc10d34e89937f2a89f8da256acef50b6ea7d9ea877bc1d15002b1766e9bc7fea3d681b147e42359ce29d6d4f8c73e7c29b9ec14277fce2f6a0c518d24aeada44990f7f92b0d1184ff96b20c76d506f6f9d963391abec5bc247a2ac6b24c7"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #9
depends_on:1
5:exp:1:hex:"d0b30341b4fd48281f76a83d7de5769d05d5cb9e565b213c8e2bc8d4adcbae90107fc12fc1ed2a19f20beb563de8f05bc5c437637148154a12b1606bff071dbb366458b74a07a1c14114fab487772d436d4ce159":hex:"":hex:"":hex:"":hex:"fe2a7ced1965f013d475724eaa7d31b62740be411d899afa79f9fa6e73f18ebe0907f2f21388b6498cd365798f27f882a2c5c2744a9b25e8d351e77b9fa4471ceb1dd6c72fdef75977e4e4a246e24f56a615189e1b2a8d6782e8c5062b744a65ebe1f7c5fbcab333fdc155bfee300503"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #10
depends_on:1
5:exp:1:hex:"4a1a697e41537f28b381e05f11ebc905bd66c2c1d905d8c0b78c10c26cdf547a1b6f85ff58f48298a11bba41e3ec015d41a24d9e335e6e13b06b84b9f56b3e803bac569dae2d74c444bb58b3a6344bfbb9eee765":hex:"":hex:"":hex:"":hex:"15060b2bc827dbeefa2170ade633b0f0075a4b9b03fc24f73522174be4e4b08b93b421fa98c7c5a445c3aafed47a2eeeed63f19ef4f67e7726d8ff84bd94daa3338e397d52abea4c7d1191e30f3e8a11864f10ff56b2dbefd860655d34cf63ea22bbb54dfd0c5f64284c303a2ba2f49e"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #11
depends_on:1
5:exp:1:hex:"e80b8c8896557d596e192c3226347c336dae455b50bf32a78c61b9a98c949096be51538e293d338a464eae0eb18f1ab21f9903d07a8b98ea2ad7f41fe7ffdc4b4bd0fd06138a84dc5217cc8fe39b92f9558aa619":hex:"":hex:"":hex:"":hex:"55574491d07db3aff94dcb71f519cffe2f96ef57219262860c3c03f9a5b8a1eb88869e69587f8bc0693c9919bb277dc84fa55187c0dbb20101f0c4e301dcd2fe21664e5a2f0dda3eb4f11df3878c5becddbfc3ca032a17f740d424b99be0a9bedfd99907229ecccbf459f5495533560e"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #12
depends_on:1
5:exp:1:hex:"5c25f02bef1f1319cb6868d836c9cbc182fd8d86ecd87bc5cba41c163710074e80d1a30ddfd0f5d88c6682292cd50c68966d15e6ff95e117d342d974ff074ee872719d15745da624f8503a6141b0ac4b887ead5f":hex:"":hex:"":hex:"":hex:"9c5204d5471c25203f1d9786d38f71081a872f1c56604dc7570caa5439f17cddb7feff01cadaac8e0f35e7a5433cbbcd2dd4f11cc7dd14f6af629fd72a3145db6924d2bdefc262662367b7258cff36172263460f4dd52dd08faed3460bbffe18eb10ff5b3c6a97faddf65b3e21ecc98c"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #13
depends_on:1
5:exp:1:hex:"68b4e1ddfd16a1c1ecb0f4221306e77ad02b07993457eace086f66566afc5f12489633c605d11d53916eee96ed778d6d6518c5681f0fa9b0160da1c71740a94ab33310bc20a18710015af25d3d667c40dc619f34":hex:"":hex:"":hex:"":hex:"5c4c9b3276d546d3b6277a3a2089d4969146d833e0ace3e1ddbd9f79fa2158531f8bb26a28b08dc64bb1e610f13eb14c9fb23559dc2f38326e145ab509b9f69259a0d1a32f471d5abf154a2585288063845f99306f9bb875ccb0d32e9d49b42900257ebaa532e8ec223aea60abc9714d"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 0) #14
depends_on:1
5:exp:1:hex:"d5ee5e2e629ea17487e593914012575daa8baf2d0e9671e1b8aad16524dbdf7d04c11130cdc10e50c630ccb235579a72b6eb4502fe146aabdab62a085c820ea46bb9091054d75a892a83c3850da0a31c15e0d021":hex:"":hex:"":hex:"":hex:"e32c0798b2040620fbc5d2a44ec7fa8038444c1910fd4a24312c8c8eadb57a78606449cf05ac51a3bc4d58ce78742c1be3a0fab6e3f5ebc92b82b5d5d64ce29e8c2787ace0f4e718a7f6cb669a0a43ba1aee0d9aef55cb7c6f5dff57c8acfe883ffd8a496d44afe06803e4c9ff62df04"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #0
depends_on:1
5:exp:1:hex:"6e531842b9b7fe2c0ee66899a1255135f784a2d5259c93ab3d63a5cb708e2e6cba955897d9b66c7fab274aa388a5db69713c86faa4a19709e9aab04638c670ffaa83806abf79a43e613e62cccafc637e1a1c0c14":hex:"":hex:"e628db057250fbc6fc5aba01b6c8b47062ec5632a8566730":hex:"bd12e61e3d5218efb0c103dc49402800cfb863ec8925e76a":hex:"037650ddf66ed42ea38cf44aaa94884effc5f831c593fb35886b5d601a58f74f868d89f2dba450b9c160e28f69fd24e30fb7a44189810e29afd0d11762d3ef07b4527f4134d6c53bdc9b024cebb6b40fbacd68b6acd4bb4d011d6705ce22f90d910ac4017d2426db7a48db3242161aa8"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #1
depends_on:1
5:exp:1:hex:"3fadabd2d8879bd2298f53c54b573db2584655e08a83289cb58a4ff5170fdc30d71bb24efbb5a50def315dc69146111462e204289a64ce72767499f299c74c934f0007ddb34bf5183bc1e5afd8c15eebdebba882":hex:"":hex:"742f7022892c2123e62379e9367787302fd18dc3835de0bd":hex:"b60325136fde7c858054983a977262b6390a48419725febe":hex:"3bfa419f9bad259b871703681284c5396fa94a323d646ddbf5339398c4d8314a999c230894ac60bf231762acada672f58154a86f80a8c4e3bbc67132e22ef50c0377193cb0d13c7e2c97cb24ce5bb69c73be2e5cd3a07ca2b000b2d7eea940053156bf55d846181e3748a91c342e191f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #2
depends_on:1
5:exp:1:hex:"0784a499424dd1c2c13f765e9ed88d752fefa83cec61154f82b3fd645f642ff103db9c8d1c10b5979c56a22d58324669d4ace3994927222fa87fd049558a48adcbd6ad5a2380d2d927be57fffaae037bf8a34384":hex:"":hex:"9f853db57c3da0421914d2f71f9317817580c1de4ca43d50":hex:"27071ad475b8541c1a80234bb2d110637fcf4b4e20e06a7a":hex:"2c879a03bd719595211b526101fe85702161711c67a81184cc42c1f9da5761e853ff4b8d19deb95a2f3323d1cd58a2e066c66e7a30059732eba43a4bf3b22fffa5bea5161fd775160dc53d7cbb4c892bc122e4e0139f8f550219cf6fbccf55d16d8a4d8d7776aa143c00d9e7bd1c847a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #3
depends_on:1
5:exp:1:hex:"addb36bc9ad134c7b8fa54881db1b18e040de4f253be28efbd36b12bfcf4721b08c5833eb0a97c668c7adbc7f04a9e0299549126172e25b9e624282c8e63eccf358c0ef1a71f8fd0a8fc49451db7757eae344e48":hex:"":hex:"e32540418ef68c3dcca1e7a0546e5dc7d4c5e92019b8cb0f":hex:"327e31a0619305c93e9b5eef87102d447d21e21e2d8c1cc2":hex:"178bee4059af0282854c833e11e7bba923a1e2f1126fe8cd7e1694602c180802d67b845a88ff786147f22a74e6ffb0f8b86d352cec2714ff8f308b1f9705603faf5b04bea3c75c87c91d5e6cf7583b5c45eb5f5a74d2bac490c8415d2fe07726bc334c88e3fb7284058b006f82e89ae7"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #4
depends_on:1
5:exp:1:hex:"412431badcf06f87551ec63c3860baf4b59667cb4753363d0f82fe7c968ea6f8bc5d015418adeae206005725dd9693af6f7060a2d5ba53f66dd49dc148de581737b67acd4bb70ff2f4cf20abc001ae1eb50cb75f":hex:"":hex:"d67f94a953e7e4e4bc0cbd517f963e599d68851cc333644a":hex:"385281961ecf2d8175c0a718347d2132f059964c55f39f57":hex:"357876e78a69cd4bc4e06b2c52ad28434520d54a4a310ee0eb026b87993514ba1442e25eb1ae22a3ce98529625d8db9b0e5b680d7e027523b0ba0184d3f2e4b9cdee027960ac1612295bcdbf570912ed05108541b97e3bb30ae0a122d74cb536e5db34b7d5ee5a042897d5d29fa3c126"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #5
depends_on:1
5:exp:1:hex:"ae914c3d74acb6e2d9b8487927db7992b838ede73dc918b60bcc94f0f456f454a6d100c90e119342154bc3ddb059f48db3a8d7b7288eb42d0ceb07532a2a357d20506ead28d9bd4a127d437a657a61f5d30b04cf":hex:"":hex:"2afb537c13fee9c4103cc6abb11225046d94df2e9838f73f":hex:"6a9f670cb49cd9ad98a17cc19d00d4766344108f0c86804b":hex:"2ed0c4140420c6e3798a13f917cd998b2ce6f98bac27f0fdb09e2538f573caff16904edb371f98f50964b7de552e997007fcd267b36abed12cd95d9a08852a4ca862872edd32c707e7a60e11fe0a7db4c0d34f4c70ff16e5c75e6f5d7ffaec3be383b8790ef0ff3a0d9f79850c9749c0"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #6
depends_on:1
5:exp:1:hex:"38a93c3ede148c91eb7f0cd327cbe8b27ff0e569bc5262aaf30b86d31be35f83b4ff50b84b5dfd649908d0c55cd5be7ad36d4f5f7f22cce066d3b589adef804bfaf52253a0e4c6bb03e000d649541e523ae52f1d":hex:"":hex:"e12c05f2bf463d24da9abe89301d2acefb7957dc1bab9ef8":hex:"d70065fa713e2d691bf554a00d063222755e7204a3e53968":hex:"3e5ad7e96c8cee899889640d8268cbea296aee96fca7bb60308bcdc08eed36bdc8a5b3126ed8be900577e60ec0f8b3d3014deec41ac650480e08dd3a425843b37fa5d1d621b5053ba4b2fc1804d407849a84e9eb5bfcf94f27c2a535e2756b8202ede1f18e81f65e3f7f51a064b401a4"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #7
depends_on:1
5:exp:1:hex:"384d6f43e7d77a381bc6bfbfbfe1a17aa35525bef01be8aaf6c488c46517d9b94380c73d3fb45a4f1b4d70375021c7df78eadb61df5d9efc6e08fe2d81ffa65df33667c23e3cc5c89893988f04be1d3634ced443":hex:"":hex:"a0271fd2552e037568cc857a60a550db050680fc03904fce":hex:"ec095cc9e3bc301071a901d0289b54aefc796bffad6fda8e":hex:"aca2571a9cf6bcd10429e146e6e94d1ae43a00db28bee2b60eb6a1bc1cde3d452dd6e04617aae7a3f813feaddc0f8fd25890004607f45ec995df970e1a3abb17b416bdbf62b6ba5625a80cb100e2b87260a73ffe15d9e6f24abfe9e6f9ba66bdfbfe71380d832418e2a4b460dd7415f4"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #8
depends_on:1
5:exp:1:hex:"98c8df867d234553e504fcdf807fb8bba51d23ac65dd8b160943bd45181764cf6df0049cad23e6aca490db57d12dc6c631604c943f153927d6d04af042e1da1b225eb8bdf4ee99dd405e3586acf8e44bb0184d68":hex:"":hex:"3338baea79c06f0d48ec2d47004e61c1c1e5056bf8bbecd3":hex:"79007bfce109a682b746df074e87c845eebd665532867fa2":hex:"ba7040193e38c4495971827fb1ddb747ea80cd0bb1fd6aaabf85ec1959c29eba8f818ef55aadadc8c34b6a7c00f210a899092b9704f2e03abf3e5e8fe6d127cac0436441d0a6f1b02a00e5fe948539c66a8c78e70f35cfeb600e1cc68c06553f47ca053b64a0534a028a73d0890034fe"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #9
depends_on:1
5:exp:1:hex:"6150b7280b3105b86b66c2a39a1f0461cfbce17e746791afb241b298741454e174650ab1e7f08500bd7eb096e40d8114e5a60668636b6ff66d2622154b7d239eaefc9ab2aa3351eda2af4fe51de36e22e70235fb":hex:"":hex:"6ece8aa447d2cf51d8497e303c1a202e39e06bd723c847b7":hex:"21d890666d2c8ce4440bb453f4284c3928650f8cf38576d7":hex:"7554b8cc8e79330ae55575f9157cd10d8eeb58af30eeebe9daa021f4b55ce365fbdf3629be7547a89c78bb9df79d35179e5d2924aa032e60d5a00281f19ee2255c17a69345ed86bf36ecfd694be0405c8b6c077b43a8c8bbea603ddc632a1aea6771a6bc117dbdc365e2714bdaa8b377"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #10
depends_on:1
5:exp:1:hex:"cb25eef7230ac2da249fe30ea94d3a3332147022bb2207aab4a50822b1564c24a047ebb46d57f45f6680f909629b43129876c75381e3b7c6d06887f68083fc423f06ecba159a90edd394cc0ca9473e9cd0f23c89":hex:"":hex:"2f30b005ea5d5965439bf15220b1c010e6c79306e700e6fe":hex:"9937bf3edb3603cbbe190f3616b021fad652011854e6f6d0":hex:"040a30b82981f71e4607c20c1f2d6e6854824c90b127517f65b6c7da99fd33dee32dc52bd0dbe902509c50492a88e5963b2b6e27d046334b356e5909f85763af2de70e93a89d6a00e2ef81ddd74f4a33d3f8406d05b383fda569a5a574fb5e3c0c86a5096e94174b79b2a4eadebccc2c"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #11
depends_on:1
5:exp:1:hex:"1d7dbe4e83913bad3fa918262ab0f45cdb9e4e61667694f361ddecace06bf352b18dfab4c32bff9a013d3b92a2da8ed698168155ddc492f8ad5d65cda8eed212793cd9aec8acde7e00f952bb5d00c53c5c181e89":hex:"":hex:"f9c51ff8f264cae722734502f6799e4fc5bee773d31e3e31":hex:"6a171a0a8801017a1d924f80fc5d9d6592b8b28a342f30de":hex:"425024bd1d1a66d4527a3e8a8307b3206923bc1d693f5b7f9017f0d5527cd6591016758794ac89e2f682cb2d66f8d28f9a2f5ae2974a75f4d0de17dcd02e93bf29c69175fceba262378bafbe3eb7e3dabe974889306d0a2ebd0ad9d934c37b1ad89ac1fc28493e6b1f6f24620e40eaf7"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #12
depends_on:1
5:exp:1:hex:"a6887fe41ed5a615eb030b31b86315d32d13dd5ad506566ea23ea3b162b8dd621129736c8dde31708a7fa4a4c606dc212b3440617111e94a5c6722c3a729d84d2e5858c23ba8bb249456a11d63dba9d4260a7213":hex:"":hex:"a52036daa8172111e89c8991ca818bdd711095a1602f2f15":hex:"cba427a2b7bb64002e1da3159d643e002516bed279e0d442":hex:"cf0f5881032606c21a8ea20adba6a72e176e968f10b08ab6d08f997b24fc2a24f2c5d44d1b99deb7db4f388dc8ac268f966a34c857cc5f43efc601674bc548ffeaee1c13415df6d0240835832cb75840b60711cb636f509dd9b87b698615959688e9afeffa50671ada05faa564c87ad5"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #13
depends_on:1
5:exp:1:hex:"a563459889ca29b711086adfbf18f284fdd18601ff69916af1ce47510d33f205d4dcd0080f9dfedb2bc1e2e60fa0b9cae094102bc7a705cc223279e0fc3b0020b4facafc2b31b9bca92382f3810d5a4e3ef626a9":hex:"":hex:"5fc83f1f6dc0ad454bbacf2df366c803cc1d2fd46bf78d32":hex:"1a9654667cfd6ad0aad9383be04ec1480a494262b3fee823":hex:"cb45ce96a973728bdade51f91004ac09e155173769063b3fb4712493d8877f088127a3492588e99fef648a101cf1c238fdefd798dd4928b5bb3a851eed693f37d67360a28a2b27c4406e9ddefdffba662529b91a980bbe4eb381cf9734b336e2b64e7482e0328c2e2bf81e39edc30d97"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 0, 192) #14
depends_on:1
5:exp:1:hex:"886d098731abf3140d512e0d348a384d25372667fe7e4f0ce713b1d2eca7b2ad939b25af03f78edad75bf0ab95b4110710d0e12e714e03f7df35db59fc4ef2906cf36c6c8897b802200a83e60d16f7fb064abd2a":hex:"":hex:"a4f42d83a492db3fc053d1275c6f264706fa932955c3da62":hex:"4505c0664e59bb4388020470838bb098c4ae1338c268adf2":hex:"4f9c3c60ee32042735cc539b9a23d04c2bc6bcd68db04a58240305f165bccebbb98e0f4796b283a0d78bdaccfcc8daf19f21a72945be07996bbb0b606643c7753f76ee6371292d3e681468b714e16bc32db14ad6d777677137ebd3731186ea72b840b8c4ae79ecb2c61352ea056d2d6a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #0
depends_on:1
5:exp:1:hex:"a26af93571ba84b58e14e921a6bada73083ec17f21580a152703e1741392fc9ce6046f77d6eda5000f3225ef28425e30cec138a16b0ebd885fef074c6da2a7b126fcd1f056e3a5fd5627368c63681cc10fbf750b":hex:"0627d10b1e5b4f0fff96d0c7e684deb9fb6a4e48959dbc29":hex:"":hex:"":hex:"98d6bc7ec7cd72da4c750d9173518a9a17120fe9af10cd1a7d872fac505d9276c551b821a868cb8b4d8b10eb3b05845827717d2975814b5080a2f4aa50c5b112bd01b8652f2d1b56a88c6c891db5f3f40d1d1f0648d84e6ce2138c2c879884eb4847856198579eac759a065a5d384c46"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #1
depends_on:1
5:exp:1:hex:"5fd08930ba404d13a7275227660869e7eff10e103548e6ea15f0816ea93b649f6aba408ac710c49eaddea0b4d1e219577e6f6ba4f193386228f6fdf9cdcc50d5bdcf6d1f249e9cae0a097bb341e2ba3581a3f2ca":hex:"7a463958302109d5fb9fef1a232b5aea13ba58a60b70911c":hex:"":hex:"":hex:"a1a5c9d90f9340c807efa2068c6a0b872a4ad51a7cf90e14b4797dd894361712fc9507bd61d8ba984ecf1345fa3cbcf3031e2bc4302354cdf3f615c3a1bf43f60a464698e250726c37a7a9a23e1ff7e8d96df03957e3a0b5e6c4c4fdbdcff487e467b12dbc21e07eb8a7c4cd7f779912"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #2
depends_on:1
5:exp:1:hex:"625d6a509ec43c55bbec45b4244fa0bce24c74cc270851f2d32e4bb4f1961476af40088b5ea81f7a86efba78abdfb50be09e1a68851899e0e9acd95f77f16e8b0aea5a9bf29bc1a18d32158cf69c794f3f47fe61":hex:"bcfa259c919f6e56c77914a272959cda6d2cafeaff87d91b":hex:"":hex:"":hex:"b5bc1f03099547ce1a359bede1f9f3b76b38e8b9cc781fb3909899144f4d0a4ba93272552bfb0ddcda51165d0ca3eae47d10961a62692bd9edf2a9339c8ad14469f1834eee3c3fc1074cb1493054f84273e4adc73e5eec6cba284c5b7fd8005f10cb67b0fe16ae0b4ff30d50ca245c5d"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #3
depends_on:1
5:exp:1:hex:"bc0c83de31217ff6b22c719de8c6653fcbd8aff7925f04624c76f586ed3bab324b64fa8a1ec14efa8d8d0b41eb6735d517f6c647ef8bedf3036a6ca90fa1d2c528722de33f76f7375711b6b4127b86fe096e72cd":hex:"d7ef6b5dd09c08437313871078ac730c2f85a5abae6d6e24":hex:"":hex:"":hex:"6d415afc0151c3cb426eb3b90c209feb726c01e28785678bb0b8d9143d4b7f31ae07e384816072e2df31350b133a8f4e3ee18f04b154d194513d9b072a695e52bf03eeb4c9a1df85dd6ef98d2453dc39390bc3a17f3ce499d9b182c89d0591dc3dbdb7aecb626b07f0ad2737bf8200b2"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #4
depends_on:1
5:exp:1:hex:"caca2b8631502fbd8bec33e89066e77b97a57b09d21a92dcc7b65897e50d7a312f287932c529f6a6fd8be6fad5c467f6c15f9bc0f39653a6e4963c0d4c4baa9d6ad39f4ad2a1d6587377ec3898e63e02cc0c454f":hex:"33691da7461d3355659c4ca927b4d3e3bbfd8e775b535538":hex:"":hex:"":hex:"89abe8e656667299705c4c8b208f0fc400897397d15aa3574cf86c0a6415dd30ac5d7d8bc629d8ba52e6e5af63818475874266e98a43ab5d3085d2856950e8d487ea22e01f9ab7fe1862be1fdb9a97cc24eb9ad05beebb202716607e8b164cf63cacb92504e80e68e641af71ad6ee47d"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #5
depends_on:1
5:exp:1:hex:"5d97de97d6f81a858ad6ae0262e58169b27c25adfc2bff506854e6bfd37f3a4d8c4b46cd78d0a76b0dc67e0d3f90fb04c2131bc31239defc8eabe9be0fc589a554a4b77fa79c64c03bbf87a32031530d99bbe397":hex:"a0d8be30a0972002f21ce2d7cf3c8e84907c638e0093354d":hex:"":hex:"":hex:"67536d7352a49a1a49110a1dc1b77dd1924be34123e027aea0ba6064ae0aa051d4470ccbf923e0c96c86f2d440f17f45b67c4c7785a6f5006bf0cadc13269540b2c59bb75f642e9668feb601fc60c18b94d65ebea0dfe5fb284e003a58837f9e9e120481ec2ba972c755c6a9134af683"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #6
depends_on:1
5:exp:1:hex:"9ca7149b0c5ccb7a0f7ec5399c644dba98c418373460c59978d91db57ff714897ee71caf459c1dc164655140810992fa6cbbb708ba2e61053d5866ba6a1bbdbc639fd21be4383beb4a4d370e86d0e9739ef849ae":hex:"2ade2ffc19de7fc94767193223aa1fb3461cb29d970c8f05":hex:"":hex:"":hex:"b39d6db529fbb3c6a90d6b7057759c26a9fa26024d2b65e3bf459881ff0f88a5b93b87e0779635022cea81db313329b61613742cc82b52fff1a2e6e24ae0eebc0917d5e4573466e4aee3f0ee0053445566eaa080c3e701bc35d40ce5105b4b6572baa7b4c84a16e4aab501e6ef670164"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #7
depends_on:1
5:exp:1:hex:"cc751171d828dba023f430b3f5a7134f733f4cc1ec76495e98a6dc2a627d97924716d7e6b043cf15c62ce8da1dda2a930c88d6d4d12ca992a501f773dff5d38e42f150f1c55ee358aba1e73cbebf465baf9fd0a6":hex:"4ba50a75424970526022c7351831c58ee75f1e3aa0c47749":hex:"":hex:"":hex:"8b387e55b9c10d0cc336f5445755c0b6dbe971bf69a04682b21c9303a66e093b7dccf33fc685765c6d2bcfa3020892ed09ce6ea3e3355b3bc16741f34d40b5c96bb085c1574801d14b4f71c97cf64e75dcc330fafa1d1e626822609a9af62c894dbdd56307ccf1ebbb7ec09d500096aa"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #8
depends_on:1
5:exp:1:hex:"1f2ccd29bc38e8364a4beb0e89984b88d61dcd31d48e310ae691c0e146f495b9d8cf443ed12f3ad2da7c59c2a2f6b8df4e0202414791e106c1f879879b7a46ac207f45b5fed69c38309adf15dfd0dd75742c0df0":hex:"e0c49aee71c4c060aac1bab1f438f9e2b0c96d710ebfef77":hex:"":hex:"":hex:"593677f65ca4339c0dd8b1ae9278cc49adaef1cf889760b4631a379d82bc25123dfd2e1436d0b6b890d4155e3236fc1e2cef67d8bc0454099051e220d6925b37c47408fdacdfd54cab7be70f8b3b3dfc5a86f181dd559ff7182f225f7de87dd8bd69143be270ce76d2562c6e01ba4c4e"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #9
depends_on:1
5:exp:1:hex:"f1bee9caecfd0397a6cd76f356ecacf1053981c64d315db4a51a244fe3b22ef997392f65dc13cf30f5b8f5edb7f8f55863a30156722536d02440e5f06e503795d2401775a560685f2ad3c98aaaa22726cd6ec45a":hex:"9d42670ea4113ae02302cdcc660b497f3ffb19b9aca8babf":hex:"":hex:"":hex:"78f31a24cda43acfbc4db7f17c57805a4b53353d668596247358b47e8f8deeaca312a7f9ce78832bc1da2d6b3727fcb847ca4feb1695a2edfd2ab24c486da125be1c1af4f78b749afdb57f97b4a8b892fd87228f116ba10fa739059581256de4fb865d1115c58284cb9850a24e5b7615"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #10
depends_on:1
5:exp:1:hex:"17b3146ea3ac1afdca446275f3b7539a517766b90e2da2c4c85db4802943efcd8009a9ffdd054440da16edb641a050fce3f3cab3d5f03d550111daeaa8841a9c814def76eec9c4e910788c710562428a39cd0987":hex:"f3831c1bc859fad452a76ce513575a23e8b790c90de4575c":hex:"":hex:"":hex:"c6c85936cd52b5271a6e70410e0b9d960d76f3236b548cfd4fea26504ca8a78e58ee914c6cf248f30d7ee3547eedd3a4d9869b15e326c911aaecb7f0c221f8eb9208a9b355e4b1cc7926380d25bb776f3e89904943b3fdf306012fc95d06b3b7c44ef55c9eee675150b332e2181f2a32"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #11
depends_on:1
5:exp:1:hex:"fabe526177dcd476be9950233ec56f9122a9b083e589c9264add302d4768c06020cf53e7708bc728582360cbf06a18de38e3da2642dd6751aa686dbf11734bd75a422571c9f2420915d7d79d9efea870e72d262d":hex:"ba5858340e6a82b2ecfe1190215bd8da995ee8ef572eed8b":hex:"":hex:"":hex:"10260dfc2f2322f530192e96a2396694dead62f9b206137108666cd199939184503da75598f54a89dff885a9856140b56687347c2c066a1593bfe02b8bd2cd93e939c424b33683a13678ba5f34df3f2f5f50b2a708d1d5a04683db00a607e2f80e5feb20086e3d64294e9732b0776c51"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #12
depends_on:1
5:exp:1:hex:"b7c9a1d221fe10552bb0b799e18d12cffd1f76d6a1e6dc79a36584ac7e13c355b9323d0ef2f97fc2d8a26e6c37209a485963788aeab084e923a3794c63713c2ee288ba3a99f2d407adfc1b87ba64fcc5a7f98e4e":hex:"e563f8c8318862c7117af8946823e8570ebc64b3de1b293e":hex:"":hex:"":hex:"100c460c12e5ab12a72bd4351f7b608f5578060b262f21d735fe79d13c942035a76f001adfd39fe93caa22b6274bec282e640469d3f454d108991a1b73d8acb3d392732fc24cafb15fbe248441462bb2c1278883610ba28486ef82ec2ff3d20eb9601866c7dc4eaf44cdd73e5b5ac14f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #13
depends_on:1
5:exp:1:hex:"78e5d4818964d748282fa8dd386ea9c920c4fc5ddb9d2204a3f6285082b8065dd3944ce193722e973f8300783e37991e6c4a6286a1a0fe3703dd78ae951c88a0ce47b1a23d91e0926358221713670a78732d5470":hex:"fa058586d35f0d74d2c473e005e7f8ddc33a1f6d5bc79d75":hex:"":hex:"":hex:"6b603b098ca74b7fcf3c8f9b42dde5b3b51e84cab4f67f4d87bc6575ad4fa3f1e0ee27085f88e2a5ecf4f57f9ba92638e52941535806d2cd1b5aeb5b7c81b3d44d41cf5b8073b646a9cc1b0a9f7e183b082e9f2270acd928623e8a46b46257e1b827e8b88b55c88a3a3a067cfcb9b2b0"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 0) #14
depends_on:1
5:exp:1:hex:"50241739e3f08c910baea7f9ba481511b6ee5d69bb1a2dd34f3987a231cc25f39a1a966390e391a33dc21281372589e2a667cdbbe4267710d5244fd342c959b7272b39e5cdf67701d47665b61782541e94aa224f":hex:"6a7d2f2dcfcae8a284802c97d77917e87c6cf8417c2b16bd":hex:"":hex:"":hex:"4402afee12048c1c6a44624d2df026798930ec732884899ffd20d17f1c8d7c221cf5edac8679a21ee11b177ecfd61927d4ccbb175ee6b49cc6f371450904c2666aaf2e6cb36cd55cae3af772beb80955cf67b4e8be1fce11250a39693ecb7f8ac05aa23b949ac74bc9a67060cd60cc77"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #0
depends_on:1
5:exp:1:hex:"c3005cdc5c5b7b25ed78c9684f3faf6278f9a9c5a9fb202014a29882e50b21e56ec8b7947fe871daec2626f32372123f44a8721ff4339e0a20f978ea27609eb495c2342e9ba719bbd2b44ff503db2322ada1c982":hex:"c4506109937e0f9352fc881b0396b0a103626a15addfe525":hex:"6ee49c76d138eaa3fc10cf411e0b8ad5488d77f74faacf13":hex:"8825122b506dd6f3a58811fe6c9a7e9271a6e68dcdd590e2":hex:"e818887ca1c84717e277baf00913d65ed58a8f90b8728080a03043bb2ab53f55fa605ba0cfab29b4cb694f6aae6594dedcbe6f74e1f7573c2944f3703b89a52789b0170077ea8e66d8299ba5cc139943ab96254065a27abca2098a85162fb01d294d8671b00206b7f784319384e01b3d"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #1
depends_on:1
5:exp:1:hex:"9bf2ab19aa7e9ffc3461522f3cf85b3292b54bd3e1099a42dd6f5349d169d59a152b2dce675874b665fcff802260ea84b358f6fcf8011b511834e8447a73c1f675b7598d836dc9fbf40f1dd0f481f47f95f3ef4d":hex:"38d7a2109c6fad9205abc22b9ff705b7f671c4bde5b662d4":hex:"b46e928cb59eac0cbed65645767e96fd824fa95cb96a1cd7":hex:"532c8d3748205cfaa826fba7f240e9926cd3811da8fd1a5a":hex:"bc367839d1510316ac3ba17fb7bf633a6eb4b61dc0b03cf1cca564db8248ced0b47ccb36e730c0237b0812af30361b5dce662636b23f87d6ace82cd3e34d45a1133b35ff9b8bde8fb29fe82298820c0c87f0e30887ddb15c9644bfb12578f0878a710771ad22fe16935c66681378f5f8"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #2
depends_on:1
5:exp:1:hex:"a3bfbed559c396b807ffa80409fc4e2c23ba952f64a41c07d3af5e5b78d8ef88171bd5022d3e02efefa644f4fddbe207e59397605a0408b0201f6a882def64d973c0714555d2c7e0a6fddf49558fd1328074ca79":hex:"4c63bef79f71fa82168928619cd09b003aeb2ba2b04150d2":hex:"c85bb368a82d57c70cd5ad6327187c8550f7c10380b2f030":hex:"5d467e9c06ee058ca066dadd6f6ec6b0da59ecbaa4ddd12e":hex:"1ce311c919c67e151b51ce3060384ca95c071a295f01e54349abaa2da8ef497ea1364454133d20f57da28985bfc6d1d2f58f84d144c85dbe3c9fd5e8958ce06f2f5ad5af7e16bf90ddb4a1e2947f78008467fcc38b5a082eb1612d68e36e3c0abfbfb3a321eef3754ac16c41f96bd635"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #3
depends_on:1
5:exp:1:hex:"1b2c2419e85386716135b3c142d749f1f5bc23edbf8c0a1c53b72f474484c545761b21aeff05cdd35621d104ee393e791737c48c5a6e6b25b58c5c5be28ecf17c410c9c9c3c3aa2b6385f66759f31b61f9fe0286":hex:"b69011f446e50880a15bb0dd00229f765bf77b2a40040109":hex:"67eb63a168aad8712a0e7e0f162af7ac7893e902f1aa72cd":hex:"23bb752e6232144630e3d3a6daaa1e58a5ca315f21fe1d8b":hex:"cd8e6c6b8a1f7f98f5d796023fdd4f1da2d72eedb96a8e85cac661da24dd0a7810fa04be0491c69db7617712582b43ec4bf112d9e2932288f25b64fb7a2a09ac8747b8f71ce75e3c80b854336a0457b8013ec6dc1268b4c7e8f7d3422a4a5d432f8d9705d6a273a09b9f9273f4928c4f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #4
depends_on:1
5:exp:1:hex:"62d059e3ecb695167e93b3cfd77f96e681985ab5d68f15473a89f9cbc4012e1c090a5a9e65f738be938f44fd6cb157fd9b737d9389e4e56b6903d4d015f9d80d96336730fdf57787296d447ea91de7e686c7a81e":hex:"d8f121b2bbdb8530c6315c63e0a52e383c163c033d3b0854":hex:"830e2cab11331b761aed55db61681fffad3a61a1a06adfec":hex:"c7783d7357ff30e88cfdbc90569daf03d3fec8caf89619ff":hex:"e44c9b35d3b847a928748094ba6754d1c5de3cbe3d90d4e2bd0c0f19dc5aed7228c541044b2b14d7e67dcc148ab04abff7c22a8f1fdbec4d68ad24a7c4b0f0e507bd7f2b4845593363da484b481906fb7207844597238b9d40c14237004e275572aac6a6d84d151fa58abc0987e54e18"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #5
depends_on:1
5:exp:1:hex:"fcf3887b4505f7a1273ad5b32e064ff51682bca23ed974ca981871a5b7f63e5ceee58131f9a01fa7c37ab14150c9323a03f694e463496c4159eb8e5d3ebc62f41264beb93098a42a3dd406b983e1fb040d108f93":hex:"9b3e97eed077155cf181829233868d27eb773c398575dfb2":hex:"75a75a15c622e69eba698a064b0b41c8bc80ef803df0f29e":hex:"7b6a20a222a81dfa6fd164def816c2b6708bd4c761b2bb8f":hex:"0b3d501f728d2f1d8b0d7dffda0160157b30d0d97932315f77022d1a6fb30d9a0ee4383f2f63377ac6e57b16b0c7480a6f5dd12ed3ec0bc6f104a26c86592daa3f68a499570703306e2c2448e784b67cd6efdb4ae64a2e8ffa5929e74c95b663c9b7fe891633f07d7b50f5f16e9fe567"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #6
depends_on:1
5:exp:1:hex:"7a6a0774f2cb5ddce6b5242782fd3d7b5c7c7e31cb5fe95367c06f29a5488fa37feb34d689c646cdb162e258ad636a030ff74f6a7ff876417fb08f5c5decdcc98692538bebf9958c627ad8287633f98c587cdaec":hex:"fb16aea72967c43b8803bcdd3e794911f6d53f2cb7946cee":hex:"67d89947396322ca243e2c591a3adc8fd9f1ef448414fca8":hex:"a0d568f4fce862e5e1b22acca29e60d7bc6cdcf6cc277794":hex:"758b4685b0db1093eebde07ba11085a9dcab64c8d5adacda070fd2b292bec49240f25e158fc96cb1d0ecc9ebcccc360b981d140e3cdba54fc697313014450a9af29d9d55dcbc5bb9a38e4f10c6a3e41874d5c6688f22d0c5714301083cbbd0014880af0f7d088dabeb4e84a64f26d2b9"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #7
depends_on:1
5:exp:1:hex:"19bbbbfcb755cd9dc000abfc03343ef64193141c3d3f43120f55674616e3d96b6086adf47c906981923c98ef7dd0fbb2f7af0ecbbd2de848f2b25cba8651b7e3aeaa0c59b605e6d4710a01406565ea30d0c4f68d":hex:"e77cce9d26d283bb5d6e8300ad0f69df723324d23928c6f7":hex:"0586c76051462d0483071213804385d01a07bcb27db05e06":hex:"1c9363d0b3e9f42b6c722b8d62f9c633066587577fe766e3":hex:"6d458079264d5f3940d098aae092690b7d04cd46d6d5dde753063b7194118ab67d3848459156b8f0216d85b5c583a1bfc000e68111be459743175fd114253cc24db72ecc978ff8620301ecbf18f42fc4697d91150649a8254a9850d5c28f9c4e187e409e496e2a659b2e79c06074c5c9"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #8
depends_on:1
5:exp:1:hex:"c2b577bfd802b8f599ca14bdd5fe5003ee28ae69ca5c246df4f62d9e21a7793281c48f73ffea15f3c3d444ba48367fde04cdf6d62498b8afb24966a8662461015135cb55034a63571a032d3cd2c1e6cf4a6855ef":hex:"f0de29d4530b4af75b8defe9b3b24dcb7ce0add4aed6f72d":hex:"90ac05703a8e0c6057dd2d8b1a6f16f0059e7c70679919df":hex:"16935f700de9fe529a2bbe811dccad430e27dbc60549c3e5":hex:"56988f9328a91314e4b3ae027bc6f43a01fe471615f3a319afd9bb63f55b13e681ac0ae830d4d3057882fe247ca4decbb26af811282f59ee89ea38642e4ffad9bdfae44bcdbc3a289bf431e0bfc68148c12ced1853e698e74f74e24aa434937390fd41cb4e78f823a262900f2f44c1fa"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #9
depends_on:1
5:exp:1:hex:"b5c4acc63ae5c68ca404bded2d36a391e8b2e9ef3b32eb598aa94fd6b5ede6c3d9c33ec77a195abb6f8cbcafb6c492a1d78f04439bdc442168d1eccc783d53a92e16b90ccbdb0284b383cb96af04e81728d1cda0":hex:"b3e6df5e9ae10c63da4269de170550b92dde7c6e33af228e":hex:"c9787b641b5c881dae53a69e2b3514ce2ea81e5879765bd1":hex:"e4abedcfc4cc69da45467bf2bfb03d823abc19a746e3c582":hex:"e14f46dcab0ba39965f170f01a07308090b051127685ada6601112aa236093f7a760530f856617d9e027c8279ef33d9fbc4b624ae26a277b9e6077ac71e2d2f101b84ebed007ddeddb4286aa4729cb3b28798387b757d8e99a7b6d2631601fe7ab4caad7983dede59b94f4c920ef1b29"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #10
depends_on:1
5:exp:1:hex:"7302ea40e214308136b8427e601ad61132d195f870f2a861c7b8ce1f686bf325a155d0aae1211401bb844893dba2909060c76cf9cda757d9e2cb24f5602fedf6a7412f49497c82866a8c9b56e2bbaf912f760255":hex:"58efaa77c9bf446ce8d3f3ce73b7d1f014bdeffea2a2fdde":hex:"68f9eab1893186d7e5cf3a8c37bf1c229344abdceecd9de5":hex:"a0d3bf1de632fb19ca5326d936f79aafe59a0e809b13f10c":hex:"f2c6a717ab10a9cc89f6d3a07bf6077fa33c2e5d67475ebcdd1b895fd0067941ed3fd8f251352403c2680df2319a882f39a91f8ccb7df2c06a13037f057962e23b8ea0654ef9bfc19b6ec982e539ea6afcd1145cee582d27b708691354b4c397a51d004c61687c1c9c948576009002ee"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #11
depends_on:1
5:exp:1:hex:"48ce334fcdeae603c54fc228461e7173681a8e8387e0c048c2acfdd6a78c955deb7dc25bea4e9924c4a2ae22d9fb6b227452addd0b6eda7769f9ceaaf2ca34568b3c198ebdcf5f6ed11f863097bd56f42d648862":hex:"6bf4c173d264dce03e475fb3bde9fca2474877627bfb0c5d":hex:"2a728f461ce1067dd38896002724b4967c1a9cfececd3437":hex:"2b862cd7a94c1776b26022c27c0e4f2d199ccb782caae6dd":hex:"07f80326ea781bd95efe729867d6c39465213bb698b5e486e6c5f27d3fac4fda3cfb7c831fe6291062d4db2aff59781efb4f4cf428236aad6a55111b969885a6b851d5462278d0863909a07796e5e0e8448fc0d674a4408cd9e91e98e3adcec2064ad37dcc566faa80149519f5ea261c"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #12
depends_on:1
5:exp:1:hex:"b23c748a9c9d206ed4ce6b8bacb6f7e17cacf5649ea8d1e1144a96e977a4cb22c0f37139c3eedbcc8b9024c6f21412f1600fcde1488f95744446df7b6e21a858224b9294a75829a014697cc4b363c3ad0e152ca6":hex:"325bdbd8c14b766d4a7ff0e14128585b21af76de7ca30ff1":hex:"2e002a406bb8090eae6c950944a4d6768c89d43cc0d8bd17":hex:"4828622ff56d0867bbad03bac51b8c939a5dfa33a362b129":hex:"58cebdf4676a21ded5eba4dd19452f5dec909c589751879ea4249a4c9fef834d85dcfc95ada82f7fba1476451774036246d7a496d4d427f37647ebc10fc2e1125b0b71da1fa5f1479c5681e9d7acc9b88b527390734d943bff6a76c4b22bb4f6ac331f7710b95f6806fa35a29a2fa35f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #13
depends_on:1
5:exp:1:hex:"606f388e8ae35faf979434656144370991e89b7457ca5b55d5bf2b48fe8cb64f549f48a812edbbb4cff895efb21c90eb26c1db239ed72da43504a1e09c56fe144f2d09242f2670dbe2561456d938352125b19131":hex:"5e039f38d6f9a9c4ecc67158f40d3c8de61808fd7476fbf7":hex:"21c7d976da71bcde51a3b4bc1b9a79cc6c4ca51ec992e479":hex:"bac1c5904816c3040eb532622f127ac3e28cd78ba68404a9":hex:"5f951dd774bc1a0818b249ffc51348bf1f36aa4b9d6a3348d36df84b5d3e824adcdf8b87ffecfec13fe36ca354625ae8db8a69722254c3f6e7027b866c529f9bed25360e0cee7ce41f996d50d224a08e965e0e5dd67a77142e2a3de0d559b9dae8919ad0387ba5fdef699e42016d7291"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-224, 192, 192) #14
depends_on:1
5:exp:1:hex:"be16ca52551a6a0656c40539e3155eebbc416cbfe212101f8edc2f7118472907ae9b2b9574abe81257533115472610ab401d1ce1f8998884af43fa5776a59ae38c88631a066fa85d24dfc9b2547caae598cd0fa7":hex:"ed000ad2e479513861014e8ff45a481a494af312d2dd5563":hex:"feb295c74975f1e1c738988fc70b9d2603c7da93832154a1":hex:"764705681b7781573af811fa7751dbc27d667af7a1e59dce":hex:"ba4a0583d8d6c5b4216a0875cfad594485858dc7f9ef265d4ed0c0f0fbfcaaf5ae318df2d7fc530301813d9f49826030625f7ea02d0630b3573c486b1fa0ef4269cbfb6fb86675c11fb7c0570cf7ff4fc7affdb00625ac453c23c229a4ea5f540c66f031ab3462f7d12659eec990501f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #0
depends_on:1
5:exp:2:hex:"9969e54b4703ff31785b879a7e5c0eae0d3e309559e9fe96b0676d49d591ea4d07d20d46d064757d3023cac2376127abc60f2999100f738c10f74792676a3fc4a262d13721798046e29a295181569f54c11d4524c9071bd3096015fcf7bc24a607f22fa065c937658a2a77a8699089f4":hex:"":hex:"":hex:"":hex:"abc015856094803a938dffd20da94843870ef935b82cfec17706b8f551b8385044235dd44b599f94b39be78dd476e0cf11309c995a7334e0a78b37bc9586235086fa3b637ba91cf8fb65efa22a589c137531aa7b2d4e2607aac27292b01c698e6e01ae679eb87c01a89c7422d4372d6d754ababb4bf896fcb1cd09d692d0283f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #1
depends_on:1
5:exp:2:hex:"371d2d3a50d8fef465b02d57f0f102e820c624b0e11703bb81badf8b0ca1841594b0bd16c1fc0e5e1235dfd414081164c54ffd056c9cdf688284f615cfb4814cf28ac6dac05756e07e6bc9f56033666ae35819ae359d53aad14adc9199ea154e45ee2b064955a8f334b9f62cea23d0b0":hex:"":hex:"":hex:"":hex:"b474ddc66e4cac2fdba195cb9c5ee521f4a3ebc24e3722df281774b7c9acfa87bd5b85c1e4e559e2859f2382ecc3a820d76cacdf10ad559691b7059b4e7f3d9a4453ffa241627a3a258b3439ab7f592e95751c826b6f89c92d1f85fc855d231045c405941b9a8b5101f76e6afed9c2032712eb5c60c16a7ecfc26ba0d47adf04"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #2
depends_on:1
5:exp:2:hex:"60e5cc3b260a0fdb9e994bb7c7b7fc32ef0117813a33b4f6af13ed81a61edc3c7209beb9336855fe207fcfb77356894b4fba0b7c3a93cf6cdfdafdb4b56cf0938f2cc18ed54a02a3551247ee10e606b0aaa8d30cbe0bdd3781a1b238e19cbd86a2dbdcaa9f94c3d39f9deb8c4a6801e7":hex:"":hex:"":hex:"":hex:"628ad20bad88e5b0ee30107640248a81f7c1ef77f757a40e53927d3b10adc5b734d379d71a28b3fbc0787d6054cfa926a5a74b464b818f8d185430773e7ab055f9647eec01a71dcf680abf7589329e1248ad9df205d10ceccd1bdfe4c9b3f6d7b804c5114c1406db83c921c828df36f5755e989520274669f7f06f5550c97d4f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #3
depends_on:1
5:exp:2:hex:"5b9320748b1c4c44624b26504e9e9765a136f965c5a8d787585391782c7432e33e5d97a4c05394d570402b908f54b80cafe9be7eba6c4c4424ff53adca50b522a0ec1b51efea35bf474fc6a0d6aa67d44582c01f287f8a8a9caeb571e26f86100990e5633139b56f4c733cd5ad08c4df":hex:"":hex:"":hex:"":hex:"70883300ef578f796d8f85a30cd8b9e4e2c29f84b7b127836450571408c92b5a1b5bb040f83bced508f26d7066ee0b6e6364eeb1c639a5292050f755fc78e828c08054b14e3a9993c2685791e2eb1dbf258cb762ecde1aa2ed41fc004ac989e0fc26e245ec87a96004c5b28c45d8d9e0829bdb696137f9c944f538c28be34b05"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #4
depends_on:1
5:exp:2:hex:"35a17d1251628f82da8b4b35b979783f50e76b2cd77e03ab2f64d29d26b22d82a7b89cc8ba85c70e10d42adc80da014a11cbac5342d46634dcbb33baea277a67afec23b3f50875e4b965b3565de66e36025e0db252b1b31e45683a9676b55f462abbf6887fcd770599b123f109e5c9fd":hex:"":hex:"":hex:"":hex:"86e2bb0f5ddd938978692ef93d19d34865a04484cf82aaacf4546378e2198a2d8050ddf53ab618fb98f9bc59a614e3d60be06a54eccc7e3e54bce7afaf979a6ff4d7fa19a9d7669656fa21fbefa9a70b134c01844c0b85a86b9f98a14255158ae8f5822ee506f88e81f09760810b19f4129d6b47a10d8837d633671558ec3771"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #5
depends_on:1
5:exp:2:hex:"3d6c40cceeaca0633c2dc71b7135be9d64d07aa80e6f3a86f43775855f14d3a4f5b702ec622e0c84eb3fd4662ae150ec364d343fd8068b87a8b29e9da7f181b91aa002639980da5489720068816df144ce1c01ea38915b6207374cae626f7199a42d47c9232094d16a04c368f0c11d30":hex:"":hex:"":hex:"":hex:"75eb7a740b6284358f1b2f7c8c1875c027eeb05e0350179f7bfdba23dc823285cbc33cfa6ca22c8e70bba00e903d3f71ca66a1d7081f742574613c2e8854a0d0e59cbac17356b1abb65b533bf563d8169700e196d7d1e25be8e4ed4502298b21dba8ef822c565443c46a8ec08bf3cbe11ac51eb765e53d2b035a8afa29ed1147"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #6
depends_on:1
5:exp:2:hex:"6174ea125101e34850e11dcbb0e48dfed7834efd45dc9d196a42e9bbebc9f00853467570badf39ac3366084682491479ec5e80af6d5e73e0cea43d1ce15c277ccf5bee254c2d4e57623a17653d48bd82d801b0cab2df27f804e23e4dc1dae0b7eb6160264c8ca4712d775970a8756a0e":hex:"":hex:"":hex:"":hex:"a9d269c3771e1fd3cf2a5f4470c7e6560c4db008cce0f4c0d1ed939157567cbfcc2353c19e5c1b535c02d5601b45ea2a1d8045b42df6508b7389fdf350c107dae05da4e6e1c078a26aec3d0ee5225a680c15c563e3727d352bc257d3a4defda48e6dfdd5c7001439cc587ff033c5afd3b1fb7c618b2113736a362058adf12968"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #7
depends_on:1
5:exp:2:hex:"6a7df1ea8b6d92fb4f1b66b6014c97466a9b9edfc68de647a8a4c36dcb0f4d776bb353bbd5c18ddc5aa274ff29abecc946eeae7eb7e931673c1ba88ec99d3105059dd1f9a7ba8145e0bc86459e525028dce62564a7bbb5479320d75cafe40b4c7a0daaa2bed5a48a0eaeaaa8d6c76d1b":hex:"":hex:"":hex:"":hex:"32e66872ffbc6d93da7f923f82574e3273c81a289257246d3e69b94365115e2b91ddcb077034914f0bf3b5871b62ab773decd00121c87439ad5318adeac31ac024b46e7b49cee5fe0f1dae93a4b93d4245c016ae6a7ba7e9e9857a38b4c220c3a30903eabaa3210d93a08f703626ead078d59b28a42d76081e9b67d7ab68b366"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #8
depends_on:1
5:exp:2:hex:"0a9056319735191d4eab3b70f533e59b0a5a70aeeb5c00cdeaa5dd26ba7af09f2e259bd4e04cc9f5ba8b5c8dedf7b155a1ad8112d6b1daead36cdd337266fab65c85824f878219e611d48c4f73ac7c0b96e40762c87d1a78e63e3b266f5fd7b9ce86252b9bf46b0855238602c098204e":hex:"":hex:"":hex:"":hex:"0ea1662f0b95b6c1cbeb82f7b7523eba3f569544b0841f78b1c05809fdffb776eaa6d1c77a8b60ddc680c18eaf9096013d2f4bbd41617e3c482d29aca8d84822c07b55825e46a26abe7c39fe17d2228e399cb88e36e435438ca919b37a0f868fb5243afdc2cccea3b06fd313aba67dc688203878d2be0f4f8864d831622b6f4d"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #9
depends_on:1
5:exp:2:hex:"9ee3fca776f4e7336f5336e426d8208848c854c7b0b271d6ec84dd3e86a86fab42c0825cf2be769f7e31924b34a3a760c94d0db714b2a09ccbe26b2acc8071f083332c3ef50802b2aee1eef195b74e9eba52fa49901d67585a766a9465d3db843d3f0a4a3a9d535dd976dd98aedd9df8":hex:"":hex:"":hex:"":hex:"1c1151e976bdb947bdf7bed108c742428aab2e6f5ac7cbcca6fcf2459d2410bf6ad89636b02337a453a21bf1aa72f393deadc925f9a4dc7ff978ba837c58ea30267cfe61dbca4a366b9ab9904ca6223f76d2d33d8d3deb959c6c57baba368e9e67f2d9d4d3758d072df868d2aebebedfca3bfcc018cdb19ba37b593a0ae80c6e"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #10
depends_on:1
5:exp:2:hex:"1006e3b161fdd1f30442346fc91b3371a29531bc9964f84d3fefd0ea3a340efc06096974bbd600cb644db66b738ffcec05696a981e50c7f6864a8279e83985ddd42a9c74affdfdc8452ac25575def3af3250da95f0182331dcc7d2d50ff71dcde00f92b6874ee902e613779de0789dde":hex:"":hex:"":hex:"":hex:"3bee9fe6d08899fc7eb6e1f0978c68f5dc9dcc76fbfaea7a652d0ad22632396d6e065fef14aafac7d3afb066ea743f0cfba804cc9686405ac966ba7a291f5dbd54dde5d6a330383b2355319e3ef4056b856386cf8378a5e11d9d36b0207e2cd414f9ade2af057c53c8c31e72fe765f0582da5a685eb42a0fd969dbde2642c4f5"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #11
depends_on:1
5:exp:2:hex:"83d0546d20fe18184c5ee79bea6f5818881d158dcc7780c0350baad7662d3b0578bfe5590b9923c3500ccf96a797d9fb246f31e6b2454c6a443233ce0264fcc0ffd41f0a3bdccdd9417d1614aee596880571ea5f2e62fd6c6e555613024262a26a169f17380a19f2e5020ad3359e4842":hex:"":hex:"":hex:"":hex:"0e453a3e0a4d58f418018f09c1b7ee5e3df81d309e54b77567b180437c258b870069c0257bb8db332e9d790ed325633260967e898e7933d38832fe7a677c9484992918421c75d7072b9c04162b202872200e28db3c03d157c8adb077c4c8a661c534ff5c1bdcce80ef047eb197b0bf3939daa8be31d6156e9d573cca4b11008d"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #12
depends_on:1
5:exp:2:hex:"fb09b02011b54f9fa2a30783141a520e11fe3e2dd55b25799c19be9fa7bf3c20e8fbb8fe9e43014516d25c6930865c2727827cc01406aaa1827bf2d9272ebe18a44ca74d63b3b78fd67e61d5d96db509a77c857ae04e06bdcebb7aa491d1b9a99a0ecb8c7dc3d7bc69775721b75289aa":hex:"":hex:"":hex:"":hex:"ef8783f00156c497796d787c018c9c01cfef9357cff2ba8f047109a0d17f719ac46952a7147e7fe8d60fdebe2c744e50522e09aa0d18de258459840ae320d48cb71ba11432169ddcdd15ce081f3ee9719cae4ba601bda1cbbaf9ebe82559b69107111c96e468d23e0268e53c9430cebe7cb02b547d6913b76e4c1643b2a2045a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #13
depends_on:1
5:exp:2:hex:"07de9e5e57368e7833177066c804575d984bbf9ca4bf03ea3118dce063027b2a1da1e930b356722ea0c0f02e09db6e92f407fd606fbddbcb3e574f0ef548c12b97460e2079a004c1b5f4612ced9f5034d8ed92d5e98eb176db2eba898915f31af7cd0763e7da1e64ba132a08deb82864":hex:"":hex:"":hex:"":hex:"e780aa6744f592da3fef690e78fe8c4fd40c364cf5f1a8be34f23f7324ab387b09aa3b5c126bbb5fb25fdd26d4e536f2eaca8f0ea8c93ac863c1c5d80314480fd9e2382ee1d9b17828b7f3716ee669b9f369655091f0ee23163996c7c815c3f5e705c9e48c25fec05a485eb39f3814065283dd1d0c37cdb7713acf24e3484afa"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 0) #14
depends_on:1
5:exp:2:hex:"5957069eb143c1526826c15358e0e949096108fc6e09537cf3d6426e155b4178bff8a8b7c57c3cbf8f9c78b52d76509c1ec089e083b29c0adbd7d703b3e0beeb2118a052548fb1e30455b080c111cbda6b4930e8fb7daf431060778445bad7d9c3f78dbf811e6c9c58493844d90e73c7":hex:"":hex:"":hex:"":hex:"2f5b7e172c5e291f68d9f59f0d14ec516e7e80c2eee36d1aa0734e3f819a976c74a565ad03334fbf1c60dacb1a6d150ce1316b5c256ca85c80fcee6ce0c7004a0a0ca8be5dce19a3b68f92f3f6b7f8e9c4a3177b93529b32b78a2d0ca18b27fe80b42546d1211587acee2bd5a63f3ae66b5e5d66a52154b52bea2b71cb05b9ec"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #0
depends_on:1
5:exp:2:hex:"2cad88b2b6a06e703de46185ccb2ddcf5e0ee030995ebdf95cc4fbc38441f17f32310770e04172c0cf91f6590cce44a4448bfbc5ce9e3b9da3e9642daecd994dfe373e75253e8eb585141224eca7ad7bafb57f69799c0b892b3015990e133698d543aa87829ace868e4a5e9525d62357":hex:"":hex:"ef6da5e6530e0d621749ab192e06327e995c3ac0c3963ab8c8cd2df2839ab5df":hex:"44278b31ed853f0a510bd14650ac4b4971d8b426799a43511d016be68dedbb8d":hex:"4c7dfbe509dc5a3ac26998723c6a44cad20b197fc86117c778d1568ab828923862885e97198f77a1cb45113f5d78726a0f120aec94afc45f57c8dcc1cb092b343480012858ef5bc559f57023442209326ec4a54d91ca3a77dfdf9e75f117cef50e6fd2dc9af6ddce8e6515b4a97357a97b6cd274f68a042fa41bbd7b7261b034"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #1
depends_on:1
5:exp:2:hex:"b91fe9efdd9b7d20b6ece02fdb7624ce41c83a4a127f3e2fae0599eab506710d0c4cb40526c6bdf57f2a3df2b5497bdaef67509ca77ddfb72d8101a462816a695bb33745a7348e2646d926a219d4944397755353bab4a6b291607179d16b4a249a3466cc33ab0798517872b279fd2cff":hex:"":hex:"17c156cbcc50d6037d4576a37576c14a661b2edfb02e7d566d993bc658da03f6":hex:"7c7b4a4b325e6f6734f5214cf996f9bf1c8c81d39b606a44c603a2fb132019b7":hex:"9cdc638a192322660cc5b9d7fb2ab031e38a36a85aa814da1ea9ccfeb82644839ff6ffaac898b830353b3d36d249d440620a65107655efc0959ca7da3fcfb77bc6e12852fc0ce2370d83a7514b31473ce13cae7001c8a3d3c2ac779cd168779b58273ba50fc27a8b046562d5e8d6fe2aafd3d3febd18fbcdcd66b5016966a03c"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #2
depends_on:1
5:exp:2:hex:"a46367f0ca034a86604003faed2ba524b6c0bba8418fb158ba13a8f730d91ec49b3a7e35c619f0e1abda6d140b08af85e3cfe402b62a2e893fe0244e88b9a489a1035d287947139af7873e5f7d0485e87238bb11d4f631090c34365222eb95baf7b865be5f6410ea0aa0484e3de55483":hex:"":hex:"aa020a1aa92f8a426c5d0d44191c6b46f68c1abbd5dcbcff0df2c8e024a3288c":hex:"38965ad5f163f663b3d90d4f5b67ed2f4db22c90e5878bddcd4f230dc77f4b0a":hex:"6c7edf375281b751383211a3e09e46c61a9c425fe326041063f0f03e1cfc01e8a830f9c4bf77377c4a9946c61a8b7cc664b22973c556437c9f5557b1a1222c45789eb700e1184d5d6e52f597ba5b1deae3dd3cb2d8325ed5b3929946e3fcf9e4f199115eafba9abc87558fcecc63723cd8cdc8dfba48a3c64e8a70995b0c7ece"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #3
depends_on:1
5:exp:2:hex:"08b9db82f179055872383f58203aab4b9b701c6d7a1cd428bc1860cc70e4111dd5cff962725b20d8121fb4f484a846c8fcae938683cc1602b692ad88b2edb5ec1c8dd408f4c10ee77a460bbc40c8e365d5b0bab8b6c8fb3d6ae8f65dc91750600592d1f0f9ff661d39436329263b9213":hex:"":hex:"88ebaa296598dd71d22ad5cdbd16603e1982d3b00391e0e83862d765148173da":hex:"4fe9752a5a88ec1eba5e7d85b193910f1717d166ed16e12676cf9dd417d96f2b":hex:"b4b02be55fad8dae22716f95038cce34f654c3dceac59a39ee85c55c6a10864e19dfa5710231138efdfcfa73652e99fa3febde8b06ad06af23ded42d78bd7e05ffed6b403df2320de419a08065dd254e5c676c16aec3b82774f014811cb6f32f96bb240bca91fb9f05b57c776d4474d309cb08a730c269627b63858821657e8b"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #4
depends_on:1
5:exp:2:hex:"76b0ba5992daab1aa40ebe377ca2e0f6407eb1729961151d216a9989b49733c2f7892eeee64338d8ff151db27b20e66684015bb1b433a01fd7570e2434bf39d924d19096199e367dcda87af7ac8b9f2a064e8a7bc291a904fc5a40cffb306020d718de11d3cdc5442724f4538d835f76":hex:"":hex:"f8b63da99a35cd63334c7f0f101a80b101990f7646d31eb58bd4cac251f434c2":hex:"46a417f4938d88406d3ac65dffffff7e3c410b0999e9c6dc7787ac46a0b1be77":hex:"d557b0064c6d8feadb23f9752cdaf5e443a295ba97e5fe3db8bdc3a502b12394951e69497638a758e7315323c4d9443ec8f144f9dff421b0feab8d541fdc3b5993dae6db4a732d573d27f4383f825783b8d0b93951719b95ddef703f36c1d95034b4c0b12615aed9314067c35a55a091fdbc3a459a22a75b6d1616e79d551b2a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #5
depends_on:1
5:exp:2:hex:"e82960489c01468263e8fe59ac341af1cedc5595ef1677c00190f87f10679295b0d64271e860e5e1bc2b7c24c2127c9457ab6db2495d422d24f3560a909513626cc0e0e8d74171ca51d3d1d31777fcd1b771f5b186516d45a270a7c5c96f098c5051cd79ffb04c7981cda36a68eef347":hex:"":hex:"9d544530ee12e9cb06172d79ae291932e17b240f9cd92698b6a2ec061fc132cf":hex:"dd1ad16a1f9decc0cb875ce35c7ad1a3105818679a12b22149b5a7dd0a1b7d87":hex:"9a08d941e9a1bfd9c3e059dd06caf008c636ca08bb2e136d0bdf162c433218045224bfd8d75b8241025f93c4a8203c6ea1fce63c37bb20444c5d4a68b13ee663b262c685630d2a6c40ec224027d75bfd3dc73e1d538400789f2221ffe0ff1bff8f514c0229e684422d77b2b0298c0ba8a2ab02610e880232bf516f8ab507c461"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #6
depends_on:1
5:exp:2:hex:"a1982c8ea6aa75e5c0486bb26ab8c9dcf3d13034372207bcf103adca982bd902b1388afd3745a00be19abbdeb12225db35ab41471d93c02aaa2414354626246b3ea3d932dd522e5ff0fa81c9bb7bb1f372d851b57043789abc1837d33d52779b638aa2bd1693caa52ec7b0824adb8470":hex:"":hex:"2d0113c4f225e47b5910cbda7d27d98fe2bcc23d7bc293da1028e20848804353":hex:"f6d92fe0603e2548fc13a560f4b1009a2cf63ff91c74b17cb4f256611173ef17":hex:"d26b469920ec26d6891d5243d3c131f129832695a130386511f02a66e92d538bd165d9bcb70ba5e8df479576b4342a27f3ce113584e0262f8eec814f0c97d48988c39ba548e4da78601103abf9c6a47ff3705fcfb7d1a150535d4af2fa219509e94bd8e74f3a90fd0ffa63159b4b62eb533193f9df3c86864f9b5f05249175a1"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #7
depends_on:1
5:exp:2:hex:"feecfb3ecb1b1322b34d90f25fffa2ff0c2af010a942a0467c04e9338832c3c0e5c5876ddf0e3dbdc2d63416fd77daf6170d67fd6b7ff621b1e844914711817ece93e5edf428a6e6325193d42bd676598ef4672cf1e4de4b54df68d0fa8d268868813162fa712d294491d338b65f27f8":hex:"":hex:"d1e3da59674d0ce33cc3e6e56292ef47fc1b3f495871f5a74a8c3f61edeb593e":hex:"74d491697d72689a19c58982621e68a336ba9f7143c199dacc3f37508ef5f3a7":hex:"78de8963019611fde15ee0c8c7b8a35c16a5ea1e86fdb435c422184cf0f7bbce3d6dd7aae11b6397ca213c0aca63188d3982c2451401845d02fa0822ad2f9190022f6c099d137c5a44d9d74a77c75bba2350f1269b6bf90507736d8576b53dfa14ccf7c685ea0acc8484d6a5d310b15bf3941666178414aae3d76d6d5f4aea9a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #8
depends_on:1
5:exp:2:hex:"1d6bdef15811731f6e30d66c79104224c5ed9d455bf9fa2d3442e8d61395d53ca6e3d5b3862fd0d0b2ecf3577e2ddd124f7e33bf11a7ecebcd2b26a117c3805bc93b98ee0e70b8ed51b929cf76f2fa72b433757da47b1ec92c11fd91921b171ff51a41a996866e8c287ea130f06cd95f":hex:"":hex:"f25347f88fb41d65602b99a370be7c8ce1dd6a29a0a7401b4a3279b3e563cf4b":hex:"4e5c80bd7ffc931fb57632935faff2f28c4f75336fd28f14f7fc27a12c7cb41b":hex:"54a280962af1a839b470b42456a4381eb8cc26f16303bb97b6f709f91a914ed72a8b85d16ad4d26a900c8fec4148cc42f9416dd19f31fd1afd527f5fb266b6aff100f890b57c8a3f9228462d4dd92dbd5af2f9daf05e5ee2843e56f0e180eba8a2cabab36f739a7fd3c04228ec007ef43ebbc25841b7373f2c06fdfbc66f8322"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #9
depends_on:1
5:exp:2:hex:"294c6459958425d309d4df6617410f34e96efbc1e609178f4105071171d271cbb698b79c7f83851ab0a4e29a756b058584cd5d446a25f77749e4154628c3d6963c369585a7768baeca0fe21cc40b00a87144cbdaeba812bb1dd8a18e4d7e50e810885ac520e44c398d1b3c41fcaf6c36":hex:"":hex:"0e433b8a3920ebe0053e388d0f2588123c6ce644280dba77632bea8de1b6fd9d":hex:"411a39921ad892db7d38f51c51148296cbf510a59fcf4fd2785c2acf310fae6f":hex:"04c64a3c4ef8cd3aa322596cfe08e34b435bb55943c6ba7abf72b549d4a057e3bfeb53fa4e2adbee63c88684bbd5b84c4c1358c9c0ff0ffeb1c8fc972c4e79641c9a4ea0901d9c85fb9ac5eeb5d5dbdd324649c0db542e0946d96cec8a990147be80f46685cf8278b8cf89c9255baa566740c4fd12e6bc163be6e52ab7799c2a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #10
depends_on:1
5:exp:2:hex:"1940c31637da2a1a4a3ad66826e074a0d5ce69dde50b75a55b5e09daf23c097bb31a4e9d363f3c716cd9e899cd98bbdaf67e6f909077c7051b067d9f2a6ecace36e5053b2e6329ffd364e589403a0be1af2b27d258c90e1cb2d8261bcc7bd5f910f15851a87442cafe87aa42031befd5":hex:"":hex:"0e21b2eae0d946c1da14153d9a3945894f43ae5331ab95a07a727b05bffe9f35":hex:"69646ac749185da00638654c813d45e0dcc842202845cbb0a8158b2609733146":hex:"f5dc9a88bcb19f74101fb46304bfd66fe0e245357b656e751a9ed535bed3a5b47f4f84c01068763a3fead22c29d7def5d18e32453f806424177082d1d65dbe3ee5d9765fd5364a1cf55dc64ee9f3f313697c2625327373298807a60bb4536c3040e76c9995cfc6eef225a122c98849980d40ea0f86a122756d4390096b4d8fac"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #11
depends_on:1
5:exp:2:hex:"83a44c38f699a883a91ecbbd9db952a62b65cbf75e72a1a2497810a73ea743c4d15ffcba06cd7a3338b3294afb50462b1eb4df21dbe7107a8b4c6a41b41977f38c33b1ada829517d0902a3bc0836bf899c257234f7f63219acdcdcdfa510d284e7380348296eaab4074ccfa9037e6b68":hex:"":hex:"3f6f8f77f3051c945afad9969af764fcf4ba5b567c0a096bec36f712f0405539":hex:"210ab7859b1354f53e143e8b06afe84b12fc1b16aa4e3e818dc56292656eb3f3":hex:"adc004394a5bf98be1ac40123ab1e430bf93046df87d20b04c235d16543c9a2b80f99f841a946e91a4c6f10149f7a703967de651e3af208d600ebc2c6e2c1fbc895760de537a4da2870e128fb10d8fa1f06870d758b9804c49c2ab81f90118042f78a89809b92c2abce87b230587739acbffd082aaba422c88e7ce199691dd87"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #12
depends_on:1
5:exp:2:hex:"7a45d07a2bec078c06031b79e94ba6b34ea1522504f62df3c7543d6a902a352faea5251586a8bdc562aebfd9f7175a025406525dab022350d8452cf3e187e30cb54320fe9f13a351e003727278fdd12c2ac1bf56556317ad5bffb3c2f89069c7c742be442f64972304a3a97ad40481cb":hex:"":hex:"16384f8c9eb749fb49fed4a667339f2284634a5f791369739d0401a84d435373":hex:"1b81f0d21a3da462ec2f81d0bfda1fc0143673b80bc7ecdbe524ceba9ae96ddf":hex:"a34623e01a14b87c400f681a6fb4ae66b97afbfe040758b99dc807fbac73d22a5cadad262f23ea5d27f726993c8220921125cc78d17a990145bf6845c7719bcbdd195348c40da96fcd60a54cee25af89c3b1312d88635223ea8c27564e918289fd0120b437c42d99a35f198de3e9c092c493a971c8ace8c48ab625a5a92d6fd0"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #13
depends_on:1
5:exp:2:hex:"646d1c1e7c363c4cbae7e6a4f606c95812a7e0f2fb86e33f178f5b502c6457d3b57644b3bc1ab6ceb09589870c7d54ca19fe763b481308a64667913cfe25103fe738fc0a800920f0afec70ef86cb8a0ea2d9dfd3895cbf921c87e64905f81ef61dc231b6cd7a0135003726451cab95f2":hex:"":hex:"78566b2ffd3252772e3bba71f3445497a2150afd48bc130251baeb4332da8a27":hex:"888b33c6abdcd475586e00eef185a69726eb9b024be447e9298b953fd8021906":hex:"e659d60d17da14043cb919709bbb5b3cc5a203517353c8badc0634ef2f2ea2dab6fb2b327e296ed6341dc4bf431c0c14ec041de50395d25a4a4cd64a6420153a50af886f48a2973523a4ec5baff43526556959a37f3b2452d5753f4d2a3c050b2e8f9f6ac2577959f346ab37404d029ca51a789a5521ee660845f913d2452033"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 0, 256) #14
depends_on:1
5:exp:2:hex:"bde2de2b8d3c4b5c4af2998d70da9a21340b98c7630d687d685a71eafccec446e0194d245d2811a54ef522dcfd96abca2ecea6d7892dddaa4dcacf7e5ef3fb345c33b23a3de687ab578aac8e6757547a1b3c127a633e58903e8367a805840020d2ce3f6f0372991d7c7f234c3b31118b":hex:"":hex:"d903a2271f1ce24f20222120f8fee3b8709ce4fc7ba85b77d6ff049e81d7a37f":hex:"03bffe38ef883397cfe53edf6c79e68493b7a637d1ceeed9d569ac6195b8e4db":hex:"cc317f81c3a6cab42933d1733cfc4504dc0b232dc00502d29b8e6fe78ae11d1d1ae4a1c5c6a7f99543a844ec5413b6dc3c22e3bf0cbf12e7b57a48018c75f6ab25fe78b786d2d035de7adaa3a3b7cf1ca564f342fff4f9e6b3c9d2af384cb70f5abcd28c99a5d10f176dd2f702575bfb81a984db2507434b4a3c8c286e3dfc68"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #0
depends_on:1
5:exp:2:hex:"f7b90c797a4a376cdd9f5c435f5985e77f36ec1df1145a12072cbb2a0da378fcd95202986d45896e9f4a65f2f353fa35130ab64f41a5d49d6a241e0260b4bb8a46a16c6ac9e234c84b5b26cdb518d459f7670e817ac061ac60439be60982492000dc5da8bc6636bdac8b1cab03198dfd":hex:"61535c5c045e784267fd0d85f2861778fa53c8e8586af67cf5c9f21a28ebb656":hex:"":hex:"":hex:"8df4e349f9ea43cc509ecb2b1124358cda2de1f5cc9315edca63610a413478d68b8bb49c2814c82ce571f6e0a6780fa21c4b570610ee0c04d3edb92124f580f962d741330200c19885ca716502223247b728d66fbbeb7c6cc25cfe9866b1450b346227c7663074c8b15d189f1c6edba172a53c733d67c1c69bd7aca7e62013cd"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #1
depends_on:1
5:exp:2:hex:"135496fc1b7d28f318c9a789b6b3c872ac00d459362505afa5db96cb3c584687a5aabf203bfe230ed1c7410f3fc9b367e2bdb7480806f3e1933cac79a72b11dae32ee191a50219572028adf260d7cd458bd469fcff599595c651de71685ffcf94aabec5acbbed3661ffa74d3aca67460":hex:"64b6fc60bc6176236d3f4a0fe1b4d5209e70dd03536dbfcecd5680bcb815c8aa":hex:"":hex:"":hex:"1f9eafe4d246b747414c659901e93bbb830c0ab0c13ae2b3314eeb9373ee0b26c263a5754599d45c9fa1d445876b206140ea78a532df9e6617afb1889e2e23ddc1da139788a5b65e90144eef13ab5cd92c979e7cd7f8ceea81f5cd71154944ce83b605fb7d30b5572c314ffcfe80b6c0130c5b9b2e8f3dfcc2a30c111b805ff3"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #2
depends_on:1
5:exp:2:hex:"d78eab5329fe38a26ce2e54efcf8f0c15cd7462a5878537a1e3615d098b186974f48003172c7204fe6dd77c89fa92fbad4e81412c8d167bde3857b9e045bcb5c666d64aa990a7d92e46ca533b93de544238b79b6a9551ea7dc52bfa1557fd973bf6e594ad4bc0e63b651d5955da37f6a":hex:"e934bec18cf8e9b9293029d9ed60ecde1d46621439c322203f7c22c6b2d77544":hex:"":hex:"":hex:"285df697361c284753c94865081c3c25ffcbc77709fc51f37a09624bba67149156a087efa92ae709eff1bd50bed464f4f31c4b66c1cdb71a506779b50645c165a099718d599fc9a166f345abaf8b0b2f9e700c253a454cea49262a334d79a01c208caad5073644b257b2b1577dd973862c6fc7fcc3320e24e1e31063fe6e94ba"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #3
depends_on:1
5:exp:2:hex:"fad6a0fcddeefb263c27432ecc6470e44f26aeff2840e8db682ca14ab45c31cc89402a698ffd36ca8ffce986568f728afc08bc0077c95ce4cf08bccf50cdafc19004abc3c5ced1cc3e7ce2cfc938c1600a93fd50fef1245e7b9cae2834e7104335f8aeac080d4a4fd3e0c0ef0d67b690":hex:"352270c867c34b3fb297cb2e5d3a807b087c720026576aa44fad577ec82015a9":hex:"":hex:"":hex:"3622977f8aa0a0ca5f8e1235d03b76f92b2f26eb172b88323558e8f3c756c539ce1061de127247ca7553402c3d5c9439b4c9afbb4c419867baee06eafd856af9847a69247ddf6640a09a360c93577bfc353cdec7312e549bc7873f77796e062ad058ec7f3e52dd1ddafb4bb1186b05b5360200e6ea784be27b8f205de80ba145"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #4
depends_on:1
5:exp:2:hex:"be90a07ae616574d36f8366d39d6bf1408626466d40982d97380e44331f9e1885a27cab08c6a8595894de22a909dc2479cf15973a0f0b71c0ba911951f9b444050825a976c391e621c58fd4b59a7a22a7dd66d8f59a60c0010fa8aaacce99bc2aa1f365653dc0cd57b489edc2349177b":hex:"99b88ac1958d5d62aa39eca8b8f8e598a55c08b49e895737d74b8792ca343a36":hex:"":hex:"":hex:"ee76c5a6b6b4eaf9ce8dc4ac0ee91cad143f0369a2bfdf40b70fcf14e3eb28855e3c59a01ddee684bf9ce4152be5c70d290b8b780784eadb44854b03cd0a32d0aa8b8f0db1bd47502d2aa61a54e3de7fd7bdb5c74c715ae2aadfe328b4d1128bb19ce7d8166c4c1719c98b6bfeb1ce313054d8f1b6a4c5af842cf3cbea17c710"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #5
depends_on:1
5:exp:2:hex:"31c7b8f0aafa70b4b670f056e24bf141f0bd6683453d17e9b09add3d231cee1cafe818dfd7d7343f8eb1b4100d80c4d9c8e7e4d5afcd3ab82964f121847d4466471df38b849c59630900171580948f53c41425045dc4db04935aa5264891af031b08cd48670b2b1720692cc6bed3e7b1":hex:"769f2b3e30408856f46fc3a3fcfe05295d876415555906ecf853d59badd48eef":hex:"":hex:"":hex:"9b3dc767e1bd9dd67003ec99c334b94dd97c48cccbdbfb2eed4dd5bde96b1e0ea4c24cb0edadcc5386f7bec54ac5ef149374f6225aa7e78466c34b1ea0b286499e4e2a294381e6e065abeab67553c4a2cd0fbda19c59415fee5cc1249692768aebc80ec35c8331f68f1b7245602b3ebff1eaca2fed5898213fbec09acdb60cd1"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #6
depends_on:1
5:exp:2:hex:"3848bad2b0631411f9168bf818a2c3cac10b6d83a82d58011367688c8d30d3fa77fe460dd459c7da7d69a3ba5576b2bc8dc15a0de18f52f79b9120b03a5bd9bb4b45547b94b301cf3ce2442ae5083c5c08b455e06fc3f80be972e2868ea019376fdf04721478289440491744df5cc1f0":hex:"e5a3ebc7d533c214f4cd66d37f1dd4ff718891daef55959915938a177dd97088":hex:"":hex:"":hex:"959bf36092622923e96ef5c038ca318048f9447003626a9f5f0c5082f65daf5c5ebdc7328e090fd68ee5d3c161506b86590e2229a479de7bbc3920852647db2a35272c305e9a309c04da1b8e58ee185183681cca89f1b9534c0e15c188f69cbed87326a83caffcabb800e2672691b7642700659ebccff375f284eae1729edcc9"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #7
depends_on:1
5:exp:2:hex:"dcd74d5dda3adffcbb54be0e7c48682174b1b460622b52ad4f32bdb2b164032bc32776da1ad3913626d9e61f5b9f9877c8bdbc62d984753560f2c292ec0ece8cf0e369b64e14ecb910997b7fd81a8eec62e9ef78b1d0de6642d8404cc4cb7bd544fc5a3b3588a16c4e342dc5003d6608":hex:"e7aa07cf4a3f90167b486c1c4ffdd5ae45aa59200e4a94caded0b85aaae8fef2":hex:"":hex:"":hex:"f931b0dae43703f7ec20bb6c5667191380e7e263efbf30bf4bd4cf6e3cd5976095eb48ddcfe9f72c299dc05ab2d8846e2259600fe3723744f4ee19c75835c07bfb207e70ceaafa355bb6c6b0a4236d0e0830759cc6673af2b4dee9a3efe496e7020556b4f8ed0c08cbd4cac61831bab2f5a81a8121b240a9c6d374172e5a87e1"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #8
depends_on:1
5:exp:2:hex:"b72d5604401b15477b659a373caae53a8fe983e2199187546756e039e72efb7f2ad472ee90447f616b7ad5bb1dc692fd1b9e1000ee6c8ba65f39a837f27a4e5cde8cbdea58ecf1145d53c219369fa86402ac05e3fe3d52fd54343179f237ae2055277d76d9276bbf83f97901232ba6c4":hex:"c9038b0d468153e8529089c3db418fbbe42afae5613a8eea7c8e3c2a307c4159":hex:"":hex:"":hex:"9c2a9dc2504e2d943d85e1c068f7e578350dfed661cb5d82cd26ce22d083f6e158a39161f303370ee844b4f75723ffb45131223bee8efc32726bbdbb9ba2a0d8177e90e4e1c8f1d3a22e9a9eaef8b7ca4cbaf142aa1da1886d2ef9c1dc3692bb15784cfc906e12b484609403515550cc44e3b0edd42ae9c3f267ae9dd737ef28"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #9
depends_on:1
5:exp:2:hex:"c5f5e519283f7d3216f2ed7765ae2c0dd1e22596d7762c1f0707ac99ad3f6ba6b920e6d0ec15852186b77c3e9318904b252aa0e2dafc2901a5177449032a7727e523d33d6f4b5f350545e5bf21a2ab6cea23f43c73c2cc0982541c298e05e4b2dcc6fc5d1d507232d735b01ed2536317":hex:"9835ac84c8f8cc00464ce75891074e20f050b162f73c9e91435aad5929b473c0":hex:"":hex:"":hex:"85a747731638e09ec0254e7aa38e08439457e6504de94d00405d417326f3ad47f156b5e211204a83634369beffc128f3614e89e2e288d2de11f7b90bcc2b8d29f149e13a3cbc8d711d24765f480bd6596c8ef605cd72fa64ed8ab1f9a18b2d0b81c0de08a167d537b3d1c51c2a0c9ea9124c6e41613b383f13f1d20e1eaf2288"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #10
depends_on:1
5:exp:2:hex:"fb912fcad27bbb2538164f75a79a3d7651c42aba547dad64037b492a87e301809e154f0b8b099a2f584643e4e40ab34fa1466679fd0a8a1f82772ae0c8e9de2a461d820cf37b2e9bd77a609dc367b449ebaecfd0aff59cabaf224d5610069c888762f92a16553d82c917553a9e723177":hex:"e3c8eab35fbf90cad2a69cc74a68ac0bd0fc51585231fb9c3eecb49a064043bc":hex:"":hex:"":hex:"09b4a47519d4acfda506d64c0b5536fb9e72cb1b6b408da82b4b80ff794f45beb2070b05de67759b8317f40e798bf37d392cb59cbbfecc3056259c9426415df526bf3cb62f4636542689537629c0e91a9bec2a600ede3dcae82079ceaa3522524fc002e82c280724c4179e00dfdd374effa05a71fc856ceb21542be0bdb62bf7"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #11
depends_on:1
5:exp:2:hex:"ead7fa32dafaec063474693e98230bfdd61ed5ee88c7a93718fdf17db771673f2c3d12d63a08b9acc2ef21531412dcdac37c5828d4ab26c1e365c043aad21c52ef9c144305e917dee8a15dd6cd751c2c45a2d6e146935458fd2ceba68b49b74bceca4329ac5d30c7a67f614d3b93a6fd":hex:"fd3da5bb01ea75d7e32c023eec230f3bacbc163768c1c24216028e82660e1bf2":hex:"":hex:"":hex:"8fc78a425f9e846ec2c757e98f0e1f67085bde0184f9ba9e8697811f6c50928de7ec9767a4fbec8bb099f534cabae4bcde69f2632fe4d1c582cb918e3370cabb2153a1d168fce23fafde95660e6987d2e8fcefbdfeb21398a5074ee76f7315cd7c517d3a4df8af26f1857b0d3e5704b7a3e5c15adc5f3c6745c063d45a2bf1ef"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #12
depends_on:1
5:exp:2:hex:"5d79c6ccee050b3c2ed52edcc16fc26ea7b6f3fd2b9199fd65c7dc2345d6566e9a0c6e01710e4c71b2820f7aa9203da23515eab85a5812c66756634804e3f5817d32f51dab3ae00443c694c59b72d526f840a166e566b7f633c7d246192ef82419e3cd733a02684d6a4ca091178ccc76":hex:"ee4c3cfa5c79b1ff1dec4b9f9ff4ea45c916e46889130cffd7f137e6579af52d":hex:"":hex:"":hex:"4f53f72462d7e9247e7ad113827d3ea741c35690fa0be027b86660e937c119e7237bbc674e826f42dd6dfa5f54d90542ed2bad21683af4b1f8741ecb75b464345111cc3d383c8b7d088718a353c2d4af93ff59057745a808203d08eba2452a1a9ade75cadd0f49fcd27ac3c024c04c0936c0237fc29dcd061b62fbb73adaa8ea"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #13
depends_on:1
5:exp:2:hex:"35f9c3b0e5947a74d90609e6ab660b4b46177a12886cc77a19aa9eaee86500a9eaec5de5672c5ee56771d778f5aa963713ffd39fae8e05ec90843505d5832ec8d999f271812d41db4f223a5d8467944f08083a81c29d9a559a960f8349fb0174a8dbcfa171be39a8c36bcb7743c5c5b9":hex:"b4b5fafff369997074a82e064298859ad2775eb5c5979f81d2118da96e840930":hex:"":hex:"":hex:"87afd3147e61c49d2029b88482eacdace56f27ccda2927799a7dd01ff63d6873804e7b5635645ff3f65b00e1bd65254933e7e57b56177db81548fbac37305d3dcb70a5f76a222999d6ba9c73670ae931b49ccc97b4f25203ee95cd68fa79e2824e2ead8bd4755a5bb4658e02788b9ced166ea9ec5373954ad8da88791e8f1047"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 0) #14
depends_on:1
5:exp:2:hex:"cd08363e60e17bbc12d57954ef92ea38af1095ffec417a7f305b7c10d44f1e6500649786d5141793f7ee33a913b08f60457cdf6316357035abf57c2e2b19bae6973d01e9e93dac249198188be2f6849e5a9636d6b6bf7d1c01c16c03669ab7b5aea828017989c870cac6857bf327b748":hex:"b5611807d3070200fc6257cc2b13a84f842ad45ce116fc91eda79ff14f3f25f3":hex:"":hex:"":hex:"281e9ceb5a46578dfa2917d9883f1819bbbdc9901d44f3ab48ccfcb807eb596e20fc05060d6a77d92a6f630bd2a012b41232dce411ea046794ab0096b86491d3ca2a59d4405e2831b1f9f69e55542aec89417ee7ecd7a050eb28fd4d7d2739aef7aa6f30fa17c5b2bc1c69ebb10163426b8c6033ec7733cc9ffcae2f23986e63"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #0
depends_on:1
5:exp:2:hex:"4294671d493dc085b5184607d7de2ff2b6aceb734a1b026f6cfee7c5a90f03dad071544e599235d5eb38b64b551d2a6edb9b4790b62336fbb9a684b82947065393eeef8f57bd2477141ad17e776dac344a9abe80f6f522f29878bedf8245b27940a76471006fb4a4110beb4decb6c341":hex:"63bc769ae1d95a98bde870e4db7776297041d37c8a5c688d4e024b78d83f4d78":hex:"28848becd3f47696f124f4b14853a456156f69be583a7d4682cff8d44b39e1d3":hex:"8bfce0b7132661c3cd78175d83926f643e36f7608eec2c5dac3ddcbacc8c2182":hex:"e580dc969194b2b18a97478aef9d1a72390aff14562747bf080d741527a6655ce7fc135325b457483a9f9c70f91165a811cf4524b50d51199a0df3bd60d12abac27d0bf6618e6b114e05420352e23f3603dfe8a225dc19b3d1fff1dc245dc6b1df24c741744bec3f9437dbbf222df84881a457a589e7815ef132f686b760f012"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #1
depends_on:1
5:exp:2:hex:"c7ccbc677e21661e272b63dd3a78dcdf666d3f24aecf3701a90d898aa7dc8158aeb210157e18446d13eadf3785fe81fb7ba1915b3c04c41b1d192f1a1881603c6c6291b7e9f5cb96bb816accb5ae55b6992cc7787e3b8812efbed3d27d2aa586da8d58734a0ab22ebb4c7ee39ab681c1":hex:"bc55ab3cf652b0113d7b90b824c9264e5a1e770d3d584adad181e9f8eb308f6f":hex:"18e817ffef39c7415c730303f63de85fc8abe4ab0fade8d686885528c169dd76":hex:"ac07fcbe870ed3ea1f7eb8e79dece8e7bcf3182577354aaa00992add0a005082":hex:"956f95fc3bb7fe3ed04e1a146c347f7b1d0d635e489c69e64607d287f386523d98275ed754e775504ffb4dfdac2f4b77cf9e8ecc16a224cd53de3ec5555dd5263f89dfca8b4e1eb68878635ca263984e6f2559b15f2b23b04ba5185dc2157440594cb41ecf9a36fd43e203b8599130892ac85a43237c7372da3fad2bba006bd1"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #2
depends_on:1
5:exp:2:hex:"20f69bc4a308d1fa40146bfb8a3171e81a66ebf4c83fd46b2c8a3b34df499a6c92f4bc9699bf6d19d5c3f45245bb0fb08310eb7a9ce51883b0c36271b5ff0a1c00219a04a6b571362c7a18cabc48f2fab0cdf3434c9f72cf5ef6a61feeedc94c72e28fb5a99345dbc7939a3b8e277c5e":hex:"882bf0edbb66ebb288ce741997ffcd3380049f5007b30e740ece190a01612dea":hex:"ca1da31810bfa6c02b5863f87d39668d796105430c445db157c41a0152a0d200":hex:"c344b0bfe801da37e2320d36b9e6452235e6f6f4cf3190d414e859f4ee90e5de":hex:"8ecac7a65cbfb7a849604505d403acaec41c6ffda3009f6080bda79e26d1de3bdfd88fc9bb9ca1dd1cd8d49e3d0cfb0f0a2e70ae1834e8f7d7f79382591e8bea0a0386ad40c98d097122dde0dc2f4fd3258d40dcdd804fdcb72d62ef9041518c34fd8a37684bcabe2f59594382767c2633bf255121ac735852fecf14440cb623"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #3
depends_on:1
5:exp:2:hex:"0a13da2edd9ed097631860dc29cb2d7eff3519910808e7eb0c6ff1485cdf758d9793ca69779117a63a47e386433f18b882ea8c8d3179dcc1b263fb263bdbf2ab818775a881964a5690a6e9af592db594a39a960e343bd4edb7747d75866e1ca7125797d2bf6a644aed6e3c8443f94274":hex:"48445b1b6807b261d10569ab4b5d8ab5d97ebd3d9e8194088b10463abf11a2df":hex:"6b742d07c45a031795a7771eace89fab782eff6a74555fc2eabba00d1d7b7c15":hex:"cd0493aa84c941c1b7fce37d2e38c199fb8c86ea0c5b6a536118ae423ca7ab50":hex:"fa005c9119a898f2fea35b805a2bd8be88c48cbdaa8582337f1f407ce3e49dee8011bb1e4ae33317ca6d5cb645687a62aed86d5803583a012d96b82e7bbfbebf59fdfc1db0a92586a843f6e57056f49726e89bf98b641ea60a3c91815edbaf415b2c4eb7bb8c56ca5d84a3587c64a945a6e3d625b6763084c2a0917de6bd6746"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #4
depends_on:1
5:exp:2:hex:"fffcaaa7ae7787e12e96521a3e29a7c40ae08a7cdea9974cfcb894352955e65a27c8b01490c9fa7593734ec27ae242a20d0371c3c664bdec7f368bf53a930cfb0933de5d50865cd757b63fa350341375f132dd2bf9bf8c6d9d2ca5354e284bbac677c269298e1a5bef536091081446bb":hex:"5b1c1a19b28b09d08bf9cde87b4a6881d38a7961bd7ba6888de06d0c78fbef13":hex:"5ebc76ae5779fe563362c6f99bba35b4b50eacaf7192c68b82a376fb7f2b61de":hex:"95831949170105e9c022a7711803f9f7d617a8a137145b4c2f6ddda7ebcf3c5a":hex:"633cb6696b97f2d4119fe242486e8affdf1b3e25a94e434592caf0270563b210df6a9f9405c2c33cbbb750c0218f718116b67232db874621832ba78b040523b2ebf715082fd23fe7e32599402af95156ebeda98eff2a8f2a4e295b9afb7fadce956cabfc1183f20e4e059d91604fa5d77065c4a006b3fb2c15750206ec936e97"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #5
depends_on:1
5:exp:2:hex:"ae8a6a25b266051cd41fd5ecc682b844aa3a09327216eb6ac63390250620113124145033b99896c21f8dcf60271ba681156406ff2691886972f53c2e4b449dc94fb09a2960a3423d2f4ac66f973b4a89f80c00af6fbe4b0bbd430b12a714d40e172e99f909916a27221020fc72259cb1":hex:"0acbae3c085d2e5e760b0631c6ad97d935e96b0a90ed4a9867f626951596ded2":hex:"2d74d07e82a033c0bf65643a6478856c92f33ee55a2682c17e7c42857e8e6fa7":hex:"a1b397cd826af3fb1b949453e96878e59f0697352929b15cd678142453479e55":hex:"c309567edb3d40fd8d828551117964e20041b031e8eb41a8c6e95e25e0f43372585854202c5d5796ca4fd38b7b789b44410ba3e3ab7016cb6793625be27c6c8d39499c402e4d52bf2c0bce21a5f4f16d80d5449d5222aea19b64de25f8f5eb81bea7c491a329ca079a99c9ea00cbf3354b5fef435e8d4cbcbfea7486d379a2a2"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #6
depends_on:1
5:exp:2:hex:"e603b02ccd1b3e2cf27a2a5cbbb6e8fd205ed3531ab08ce912f915328ea1c73ba7a075a9dfd9805101ba2f0f6e42ebff7202687e99e1cc914036146e187c16b83999df442f0ff87b9d82fc7831714d820c247f1a2c3eca9d32ef0039c4a2ebb9962d844e0032a58c604d630f12884742":hex:"27e863c2f9f91e9540f0201dba0fc63c3c623ac89d63368093dec2f17b6868bc":hex:"93e967f73929f2be339448735c74b571a8b80c10bda2ea7fbea824b188a7db93":hex:"1ff3a43966a8f64c42dee8889ce2626bb370afef4c0222b926abe1be719427fc":hex:"7ca6867ef568c8c323d216db96b642576de1f5e82d08b84e6a2752000c5175cf49d6096dff7b714a45a72a69e467ee378f4eabb142eddca926a3d01120960cd7aaef1e377f447b0bcf8ee733d961d0c36be901c7f406a1dc81cb2ae2e9f6886f5ba1e481e7c1396d2c89aa456b2fb34f02a91d0eda8784c26ad5a6892ba5ffa3"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #7
depends_on:1
5:exp:2:hex:"222dcb4b31c7bc37d8813be78d95e9d8c0f021363862c6bee5b01e6c9dbdba8c2ae81c52b90d4cfeb80697fcf05caa08bf81702a92a6bc90b531b363db5a5fe4f50412621ba390c1cd211a9683c47ec7ed6d15513bd49d10449f0c450183f5a7b16466a37df5fc79a4ddd3ec6bd0c56f":hex:"bcc19eb476ac96567da10da8fb714c2f9fbdff28b7c74a5cbac80ca480e61de6":hex:"46fe8bd4c4789c373707050d0e700e50d692ba10ff2fcba20045c9efff7373f5":hex:"68c956a95f6a2c9cdd06e461805d5270b0df3c9fcdebbeffb30dad1a852fb35a":hex:"8a54fa9818602032762a45c9f67f668860ed605e371a6382082509249330fc24d13c4acf27782a7d2be42721bbb9c80c6338acb57a715ed17c008928166f9a090331db4fe62a11ab47c966bc3c24a8be942e350a2dee7c7e9f620386d89a1e0bd5298d00f94f9a931e50834a2a85c0175308bc74a34ac37ab21305c511866263"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #8
depends_on:1
5:exp:2:hex:"787c1fe1498bacca291f020f80d6b556e4f0d4fa5adcf21531c447f28e14266e4f2e9de3e12557756348d8b0c73a1301f43ce41038cbb7dac60d8269495b62ca7452a9c4edcb54e7d477f0c6c6b7af61b3a3784c775a5884cc536f60132e66386dbb911577aef75fc0a68508432e255a":hex:"91f18dd75859c2938edb0d81f9d6095a2bc7565b67403a8777cd059f2631c958":hex:"92d2d8091cc4fe9f5cdf2ded2e358fa05a7d8e4525333b4c00697ab18dd1f995":hex:"2263cbb6e29bb9bdbd803c7224aa039077ba43d1643d4754745f89d8bb6f888d":hex:"620851d2a4c8b6558e18aa5e2d454cec83856d25e619e69928b578ea4d4e41c662a4cd0ae64ee756b184742154d9e7a6283d78bb8b6ce53e2fd2ce93cc12ad78749cab530a7f996c83117df6d217170927d75a0c983194816d2e21f92840791292710178b3f7d9fe1003041d2d9e7c59943b14409abd7956bd5c31190a54ba0b"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #9
depends_on:1
5:exp:2:hex:"1537f9380d97e98f6e02f4b10182b835f224cca2278f37a8cb1411a1c6cb89eabcf37a8b159cdee3a55329b3816f8c656c7f63835f860b4a5e3c450a2afb5b892b4da708d39614921a82d36cf23518618c9bb0f5332492c1740fb385e969d77d5d7e0aa0a4066cb6bbba4e4c7fa8ae73":hex:"6d89190aebd160b155d5dff8cc4393f095988a1551bb154fae621739a4378430":hex:"04a511f1d8e1994879e2372163b5a45289966df680350bbaf9baea52333e652b":hex:"dfd8c8e467628de6c121c403816a65bdca01dcedd05778b925283f92d3cb5251":hex:"61edfb457546493a43fe1391b8f86da01c1242b3297f3c4ee02e04e37161725f4182b144609335f0183b477744ce3370ff64ae861c728e7526148eac3fb07403a27c3f82fba5ce505233a4e38b8d40c3f44cfe3cc65c6a89127f803b11a3f24397a20409b594e193e443190155da50ff1134c8b1adc5006c7ad201887e6c1ad3"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #10
depends_on:1
5:exp:2:hex:"842daa3d64b3c25210cb0ecbb251333c2ee4e090a992138a5d6f9c455a8a5f0d28be9fb51ad223ed196d5c245eeea940f822952bbcf1e2ba7d3dbf526ae44ad7e60e9d99a833b3f372f77adc440850f3fdeecf48941dbcecf6f710d99ae54939f9bf35c3ef2b7b6136d7778b95846af5":hex:"bb9376b79ce2cede150036c0626ddaf8bbd960ec04ade2694be6aea6ce8946e3":hex:"41431b7537968a2ffedd6d7942ee21565f34a5155de6e096646fc7d41302ed96":hex:"946b190e855aa2d4fa7544e9858ec70ca9ac19ad510bd7d625f14d16a80896bb":hex:"b0d45631a104c246a1af31c8bcf7f7bea92cde3c259fc029072c51e662a33c040cfb1d262c705320b7020bd1365288c1ba9b3bde9d0a9df8b9e7275e8637ce9a1896877e34323abe8ca3dd0262d3d75ee3a5af505235e354aab491dcfce11287b7c73dfc4c97c47f0373cb93baaf3def2186a53095fe8b050c94b1cef109c07c"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #11
depends_on:1
5:exp:2:hex:"aaba29c12aaa011619c07efca75a186714d97eac18d75fdc8b5b36a9ef247bef0f152b758cdbd69256bd8697fce53d2b59ae1210a350319834d6721e9da6b2cc1c0e559a26804d47953e0bd5df66ea2a0c449fc0a8dcc16b9b0a82f5e6f85a218cdddaef40c254c1030a9bfa33214ae8":hex:"02470d6898bcd119cab49242c95fa97b56a495f6d1c5b26d1e877b70b954e3b3":hex:"e4e4293148c31ca6bbd73706e2dd2f36a22d3af3f862ddae40ad35d51dd6781e":hex:"34c6505eebf018676a039f201507fa38338594cd015fb4d962d1577befc63ec6":hex:"e1556a8bca38d5c2087b5c61156ab91566a5da784647e220bf4ea0374e187d4a4bc373ec891472daa31aa0dccdb56a8b42fb2805e74251976ffe5e02b446af8ac6a9f0d6f36d857fe6d3772d9fae7ab08b360e8de2529dec80dd31a5a5468034aa53b10b6a73068fd9e046b70e2f03fded8bd85f7df4322d4fa5338c9cde0471"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #12
depends_on:1
5:exp:2:hex:"742fbf9f39f9d8c4279143f88a6d30307492681ccd58e8422277259a0bf87aca24c5d6dc4f650f39c3403fe1eac1ecb079e7b9f363eb44559177701f93da93aa30dc5f4b933209073c825ab2b39b52ec23caf049f760aa385f58983d9af300ec5f831f2449d2508bb5824abb622e00dd":hex:"c2c42e63d43a765c2a49d2b35c8ba98a7a67765a0c453d2352d9f224aeb06176":hex:"794083185e79cf918faa846bd12287e8ff1e620770e0e08b33e8e1da8d23cfda":hex:"ed7b902eb55b7bdb2b8bf70711c1f7a4bc00c4dade92c9d2459db060551336af":hex:"c83af90a8c7879e98b255e9c6b1852bd759ccf8f9c5be4ea5e9a356df4c43efca41303d5a322a7e42ed12b8b0b715e1d23257aaa366bb261e39f19834c38a7a883bf2f01c47a782edb7905cc61742b8166974f5990330a08168e25d4aab6740b96493ff87a424ac6ed447ad655afcfde1d2ec6ab2ba811351385ea0f8b66e318"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #13
depends_on:1
5:exp:2:hex:"1437958fbc93c701cdd09fe81a90af55f022195388264ef03758fc08bfd0dd80f63c7bc06945eedd58893df2b5f5f62b222ee423dbcc5491d1a57155891406c79e8ef51fe7575db8074c4e40f50024daf177548eb130a8c248c2b7df99b6626ee062cd5e82048019b32cd6c7319eecdd":hex:"c443f891534c30d8d2b1e2072cb5b824e6d3ddfdd1e6c7757e54372d4420b5ed":hex:"39f7abd306f127baaf8cb832b67c2564287efa433df8ecabc40b9744637e6bfa":hex:"eda6950002c866c61d2e2dfcd9d69e8c5154b45f762efd688e26044adc3957c2":hex:"8fb758b498feb1c0e961a8f86b821bddde387dac221a8191f71b6a64caa2bcc4a475460823996f8261b8e22125dfeac5c9dbda25525dab249cbe469c5e224478964793bf822446721bf5bc85e5da6ef34ddcb7c94f109193c475904099b06e2a7f53ba6dd94480dd5bc9fff90150286c4d3ccea975925cc8ed4ef9830389b9bc"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-256, 256, 256) #14
depends_on:1
5:exp:2:hex:"ef9292f4a7a67ac4d4eba48936391bb45f8810c2ab02ba424cc8e4add53d1c514611e3233cd8cc8f6d69494dc336cbe1cbc67c17520af442933a235c6aa6b8f98128c66fcdd77843ae32e06b7a31689c9a6a3c540a19081bcbe850278d50adfac3638ec8cf85148a0547d28d0a7025db":hex:"f4a8721a2a873f8fe94e4b3e137e866c79212f9c14f89be156c47a5fbb9aaecb":hex:"b38a6628647a02c0de5b7acb939d0d1896c9c730106c8667d810bd4866ebaee4":hex:"366370899b2a0d6f049e7d820061599a675cba5d3bc82ad747fa731bead8efb3":hex:"1947d468ae4fa4da7f45cfaf32d62a4369796e532f1b03b1495587e6bb95d8330f5b7c962a9b0a2b715d9def79194741870e5c47d15a7308843e10616b891fc9e5cab7db901e0f1efbe1217dd627c71b54c98cec0fe1b25a84caa56f0bde247a9d9183587742a38825234b6b6cc808afde36ef5e17bcdb2c72c7645949289369"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #0
depends_on:2:3
5:exp:3:hex:"51ec4987ddacbcf6348e4a891fa571c6e3aec02879eb0181a121a4846344a687cdff9798761875320256e5a59bc94663faab8864cc0bb1e64343c0b978fcc0d6e84d0d17c1c1f4093fac3b4c01837c6b37d189d7608f0c335eb38fe1f43573e0c525093f60ef618bab297b8a4d9d8c16":hex:"":hex:"":hex:"":hex:"ade04730059471b1829bec8dfbb0ec708be7b4e77d688ce7cfba9ddde059a52f969407291440aa79492f827fe1a2f6568989fd36b4fd84e6699152536bff15388af319fb306f07de4309eb92ba3da5f7007948335993698d398bac42029912bec6ba39226c2bf238733b5081aa0a2ca392a719385184be619d9ca56771d8e3716a46cfb339f93ff48abe406ef788db2ada45ab5fcb7f689bd801a5ccad855b52cd4bf1d6e338f2c3eac94ce9fdd0dd06632d01ded3753e87957e8569a67eccad"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #1
depends_on:2:3
5:exp:3:hex:"f8dfa70524d46f3545db3c687fe85a8ea35e32eda470b4e14b8b12f4e9c6bbf6c08efa9ae1df90ae6f14b895c342ae07b5e8d563199a141c34e709c6e743260b573f88186f40f800c4c0ec9f9fbeba49f103bfa2d62d7ed8fc9ff88cb1ddc5d4ca4d074e0053c069393d70a5b3f1df3e":hex:"":hex:"":hex:"":hex:"05f4e609b085d28958f5702eb7b99f2e0c7a80f095907abd5b7329628aa6dce2e2f8bdb7a2992261ea414e6434dc98162d02c51936542218a31c6072ed55c9ed83c79698de7ffd3835d5e4d0f3a0c2a70bef2b6c602d1e0cc814c71b2fb1a001fb83a0e2befdec7e4749629693629ea2397b299cdf491415dda446817dd7d28da431f95162de83d917f9e9325774e2f7ef02fe8067cf4bac47e2f61ba235b532af3aa95a6517e9f1286e065ccf9b3eefa6cab4c940c83ee9a11da55ee21c8d06"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #2
depends_on:2:3
5:exp:3:hex:"7ab7da47ff7a95ebf2367de0a25c7885d80931447d2f5cc73ae7f66844910e481e05f53ca993b0266b7cde89960d681a3d3c568d9a6e35347cf52d2e0ff7ad1142983fd7d2c848674315ed3e009adb7154fde1f2d90019cac210dbfc06279d48fc7c2e900652b5cb638c1260acd896ea":hex:"":hex:"":hex:"":hex:"f00714df243103f54b4c0c516a7a631431dbefdecc30c09e8e834f09882100c1d0276273568cc6352c3028c156371389078236afe57d00edaa226262f1a7f6e0011ba48d4b8f089cd257b6b7cfe80ca2bbeee99635c277254546d4adbf046935791be21c48a7882ef6cb81f7bccdfcf9bc430d21cef1d788d4f4df6bd6ef5bcbf48e35f116d482d880f597bcbcfbbf68bc77f591bd7346d7a1085fbc1c2707c17bb288ce6bfb0a78a54731421762f18142975b8b3b79dec0d852dca80f1638b3"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #3
depends_on:2:3
5:exp:3:hex:"40e83cb1fbbefb44426350916b0995fb6a1c5394f2fd625774459548cfab27f2f92e2e889d3deeb33dfd6c40f610b71b70387af8d70768c52b36bb2a59f3ad9a16be98c726c2d65af457b2f7d81c75fae82523c977cbdf6138b1cbe5a9b3ad402ba197a3009dba459d3f534ea143e5dc":hex:"":hex:"":hex:"":hex:"52cfd4a4741b6575578a1b7aab91a366341cfd483799ca08b851bb0dc2f2bf640e90c1406fd09fbf9166bd55d46aaaef38e0449b7187d019e68a3b98a7dd9cdac63ae9c966db4d901d37cc147835d017915902621216bc1835d70dc2101ae50e0541f796bd6bca2e53260ba3353e6aa4eee56f80aa329173e347d83d050ddeb465d8e1aa5450e6e7eb515a92fbcdfd8530f04fae3d1a41b13151a4827f0634d6e80424c1e934ce0e2077f5f31fd177e9a42acfcaa67d4043fd31a8ec72a39e6b"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #4
depends_on:2:3
5:exp:3:hex:"39927d4fd0c3eba2044002e65b60d3994c3aad0c705bce2e9e41aca30a7c2f03e7b4968d8e729e868f5fd57b49a4b862b0bd169a4e2d77bd59745e778ca6fd762901ae3c0fcc48a0d6ee22bc8520ec450630055b3b66bdd2dde9f5215d241fa266d24342b50d42e2db5436a478c7ebaf":hex:"":hex:"":hex:"":hex:"96194dd1b6ac5efb3d4787bd1fb4c9cc32c29b67ee34369a7aad9a56f64f53526e9207c1d4c541c6e0df4960c54e10168284891841fe554adaa5012f325b3aea79fa4db8c36e67a0f914d9ab361d8ba0b3d6ca4904103f14a30a90dd6fd7c3f679c272dee7f01110f7229f4f5b6ed152a0149dc5a7185bf637d10899bca417cba8f919a2800d8a72d5575f0c174f98f77a1afad850334204e66156eff4572a6703aab50b850a8df498d1d96b1e2bc1ac34aa4399f3b13e97b4989539ca78e97a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #5
depends_on:2:3
5:exp:3:hex:"ad10dbbedf980a0c33576f7606e14785b2a903788b9b7cb4c29cf74a8bbec877999ca28c36c835b60680bab9005d8e4f341b97213fdb6a52e783d19850906cb643bcf48c291cd186ebcbf0a287e459d1795e29ffb0c7c84b0f6dfbe219b4f85d9fb893c0cf9134263a9e6a36c76d02a9":hex:"":hex:"":hex:"":hex:"5db269714c4ab774c2eb14eb95e9b60c6ccaa6e90f9f879e295cc007069dd231894cd8fe0c09bf748e26940160cd0cad75dd2e305ed1f2527ba857c42c3d0662d25cbbcfe342910498ced309cda1894a1186ab935fb614646d299ca56f86defdd0a0f52baee1b9b9be05df85a05c225475a7ce1cc58ebc488a4f57fd1f983881754dcfe3bd78cac529e9945c89383e331f0177e721644b3a8d82deef548d161e085cff59645a345cf7af3f3582bed5b81c7de7a6a216403bb88804f7d16ceec9"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #6
depends_on:2:3
5:exp:3:hex:"e9506dd05bac4750f5d5b43e0663ecba6444455ab6f662802897a493ca11ff05f76045b621004f4a88fc6b1ba859ae795e4846f17c3b1c127a8ef16d32381e27eeca77ec062a8a8f811f5dd7f90737147f5fca2b7cc89009b0350292b88d1de5de94e1e82bd5f7bf2e06882a925977ce":hex:"":hex:"":hex:"":hex:"abc3d68bb9b0d29655ee2057a60e59fb84afbaf9c75ac5d146a9856384022e4873a6abb963d8795ded5ce33f8df9275f8ae4c3da0037973487348645415ed51458529bd7c4996128c943ddfa21484521fc645723802318ffd5191e957ec453a8e922d48b1e83681c1463a03c34175a5d610f8f3709b3044f45084f901704547e301f9807a7d92036e08a3eef791f67659816fcb28922b9b52e2a4a2e81cb848f9ae579cba346b0507e91f26b70d199acb6da5d3544b8caea762f6f30178636d8"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #7
depends_on:2:3
5:exp:3:hex:"f1f00ebb7cb4bbb3b0a083a290d4d3cc4db53aa9eb3f2feb1d428cf6d8104bdc56b2a30e75782693d7565c5d1ad6edd6cc22967eeb5f159989c2ed7fdb62103c055456f5e1a3163bfa034c502ccbd9aa75385d4777d03a82606a890c89a207494d082becc22efad8fe69c367fa9e3350":hex:"":hex:"":hex:"":hex:"6b75aa14c129d011191b9016b089af15b806a494e8e763a7fe902479155704e1a92eab48ce29fd0f1e9d5a2014757c3cda6e021defdb91c796cbad709658edad6c8f7ab6aebe978d507459198e0719eec49b1926a7c4e33e34e8e366966e0e4e7f3ce0aed6e51d7804d803aab57257ff1250ae8b76bfc48a505d4600bccdd992d564b39c3519db0c7dd26f5dbabdf3c098735688aad1af8525e8a6a343835bed094708b78faa300c08600e638e6f24f4b2b78df0d747ffbb9521cc6786b9c89d"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #8
depends_on:2:3
5:exp:3:hex:"1f3bade86f64dc0770dafd6a4900f61baf003c6dccec496856b7b08cb99db8f371f1c9606602ad397e0c757f56ec6176c04e832302fd6fbac3519af6d2cb9da5a85ee70efc19c7350145e904a7fa9d3199e1f6213999ee3bbdbcd1200b4dd4e7a8f112f3a37865e494bf8549349e9e78":hex:"":hex:"":hex:"":hex:"1a420c51052534d5d77347ed5751e44817824ed75467791c9717875dadcbceff2ffe024952958d4718b2b4028af83ecf363d57349a36476c0203fcdf4952794aa66b3692e7b0810ce060601817ad0794574b1ce12d6a7b6ec1d0b1e0acb2a6c453be81bf2d17e1fca7dc1c9ac5fe4a64069285a8cb9408051ba5ae4dc0c8897b4a216109b22ec56aace995a453f28dd7d2c38c7d44739b9f09ca0e52d62f204e7f4a09c3e231c8cdaf54f941e8d5565b25155be21cb316417a4c005f7e834d0e"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #9
depends_on:2:3
5:exp:3:hex:"1b288c94a8aa7499850d7bf82177024f20e8ccd502b7b0f529c47185aad4eb82ca1efc0104f93cc35885e9894671b9d74fa8237f5d740fec09e90b88bc75124e564f1f198081d51c950dbef6a6ebb2b5e1aec008d8a5a4c692f6467c740f5026807bafc0710dc8e9197aee4372b429cf":hex:"":hex:"":hex:"":hex:"3daf72d94056e6c7138787004f40a4a0c81a244c8aa14c332675e977330b63315916d8fe6ba8f0aea5a22def342d4136d1d6c787b3a6c6c05a44ee1cf9b2d8911974974cbf7a14ed5b83fceb8dd8d3ed59194d3fb6cce579a97244091731a4c1ca1d6e4c9d2623a41de665ee3c8236e0da8710208cee948f248329781f40f6f4b4010508c219755b6df752b9523ed0c9644b17250bbc88b4338c688e97e952a924da894fc986f7e807fca4477be94dec993cd6910709d8032fd3a5b97612cd65"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #10
depends_on:2:3
5:exp:3:hex:"1e1837b46486b6e65713327240bfac6c618e817787c277b995c92dbe03b9b01de8e100b303ce5bf5048dccfce4d240878ffd5ddcb6754292291d1a79ee1e62b6da6b23d7a83d0fe9e84757dcfa51d05709d54142b42dc876506876b136b6df34b485c0c129581972bcbc674b893ad61b":hex:"":hex:"":hex:"":hex:"23c258b93d4e9943783e88b244a52cde6747d8d7ff28b77e2ddfaa2edcbb29eaf41dc75cdc2c5b581b3a59fe20e705223bdd90e786f6c6498330ec9bd7ca7303e53c0b21abef1497210f8222850ca7f01e0af4fefd36d82e711fb17f581b951e949876a5ef0a212fb73af4d32f6bf9fe8c9e60849fd2311f3b5cb8a4abe856b3dd629fbac41e6dfb502d1894088fc52832cefff807555457c03ba7b7daaf02830d9ff8c9e8ed09ddbb68d6530af0cc5ae9383acd34c89ec189f5a97abbf3ed5d"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #11
depends_on:2:3
5:exp:3:hex:"67b2a6e09bf31ecee8fe9c719491baf3c6efc0e27519155f99c94667d727420265254ee6d34c6b9c03414452d68929812f1d23aca44adfaf6b02f519dfc3f034bc32c1b763a129a97c7258e5e77ba69d6eb459be2cc96fd6150b6040babcc406143bdc2c1862c7bf6607b4be95f3151f":hex:"":hex:"":hex:"":hex:"d0f71e56e975e443bd7364eaffa9dbfb60a82bd0ea6405de0b1301911449ae6ac0dc8792acd2b0ca3e68c2abb982362eb2a7a8f95d2960579f9932070c9cd7abd57a36759b2c6f12e20dbda8a16a17c29b70f5bb8db0efa9451d9a349b9917b7bc39af6c6be8217e0a6fb52e6a4c46dfe41e6a9cfba84335d0254cad07557fd7aa3fea185c8c88a921ea665e410067395791785ebdf1793038ceef6c590e64af00ac4ce69ac3d0b497feb93b4fee7d55cf0fa40dd49ea748b33f038b5097578c"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #12
depends_on:2:3
5:exp:3:hex:"379d0a38c8897a6524d6a59df4f09ba975c146be7a398c3cbde8c222fcf998102e98223b81dfca7fb5bc92b164afbaf50f58b8df04889dbd69acd59f7d5ac08f81984910ee20a4d58c51512a3ed893d7b736da894a0b52f75c5208d14f858dfd42290f4181b7aa249097b93fb2bceab8":hex:"":hex:"":hex:"":hex:"166f643609dcb8951161ca15b3660759b69da616b45761b8cfec01a8a7f51a0bb1cf256c9fabe69b29552f8e861cbb3160b905d24845d368a17ebf911a839384c3b3aa6c8dedf1fde12384ec9535ab9d008728978ca58ad88780cdc3d272d1dcf2059b9bdc0d2311812fb1b559e31f8e5a89efcb2b33c705555ee0efb23d2c4d312fe02b998eb78af85e3839963afd98c1c644ed4493c3f1af0cb210e660748cadcfc9ef85fa3b5fafe345756ca34e7b7f88d3aff8783e92da00dbead5d51f89"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #13
depends_on:2:3
5:exp:3:hex:"96041c211e97d480d149e75c876886a78fee171e0f395a952a0e873af4dc22b46cdb68a60dd1d5753027e544643c5764cd65e202eb821804300ea618e8ff9785f3bf2fbf1b1048cd4450399e2f642af38bce41df8fde3208055e34d356b1aa1b0180673e8507af2035f75e9fe629f979":hex:"":hex:"":hex:"":hex:"51475ffba32991781b17e38ea58b08bde40f03b64824187b9506153f41c233f34dbdc52b63cfc71b120b4fe6c2866d11e9aaf44f82deddaf998caa56a4dd58a6ea2e8f5e3c4ec7fef73e5620cb6a77313a4bc0b135c57d18085010a4a026059c2abd4b6d2048393c5400341928f5ee6c5a063d679e185eb9be2834a1009d03d298b9abb09f993a8ede54bdc4d9a95c2af5552aed9fb02cf598a18b5cfe6c811d1ca4ed764d0756fdfcb5d03aac1ed80fc86595539c105da6b66a00a91caf44fd"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 0) #14
depends_on:2:3
5:exp:3:hex:"423cf6fb44605cf03e3063bceb92c156e38c5badfaac35593139df46d325242c84908baef2f824bf3ea66e74bb4127a0c5650c33f68b5d33502b1f55e06fe2c1169fb34688a09291d1e12e5390a73da125be4cf15692e3e6ad0ab6ffb22cf3f77b00333517ecb2239c9b81e59a72d087":hex:"":hex:"":hex:"":hex:"41f335cf727ffec9ebfe7cb348d11cdb4e5e49a9a047d8342a6656e5d235219a5d80715166698cc1f16e34f743811b820e6ea55c2bdd0db1b97ea2269fbf60c739feed818282f447bfe2bd0b9a7c479144f0016703aff450abbd87a50e5e5af0d2d9469175542737bd116de2a73acbb74d9f0077a227704f271fe0696f071914dcb9c0f0191fee35eb66248eb17991b538649457d5d5f9d4bb9cd81c33a14d2becce003c143c9cfe39ccac51048ef169f6a22143eca721d04f6e147749a44a75"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #0
depends_on:2:3
5:exp:3:hex:"0b2307c32f34d3f3c3d6887fb17ff68b01f158ef07438a41cde27d2d6725277f33f60888aa32b9b7406f78f47bd877a1795496f759d693f3f8bbd65cb5b2562c4a8d4a717b6bb8eeabc4d8f56118a97d3787d3065f1e20e6d71a1dee563fdb2d56561128fa83d8602fe0da3e89b019e1":hex:"":hex:"16815bf5482abc969179152f79aa34a04c28d483e6ac81aae14f7e0e051a5662":hex:"938c363df2740ba9ccd39168f9bbcd7d421566955f141e13ed039c4d86195392":hex:"959517e0b27d461d678ba2dd528bfb7e844f7bf14a15fb176efabb3a5200ff2b373c7c0683f095798951dc7ffd62b172ed814954c44087fc7a6695a5a275bc8aecd3a2ca8ed631a9ebf5e1d1c515542c67f31e16fd3ebc7e2333c7dffcf385f0d6ebe16b9ed42994be9f83d0cc1e2b3b5773cd2963639ac74ce64a311ac0726014bcd213818cecf5d562cd1c5e97be4028f64400cff31fcd587a004cf60f03c6f3222e4dabae5c4bdef8819670f77f9227eaf55eba5238f90c4bea4f03588b66"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #1
depends_on:2:3
5:exp:3:hex:"062f2aa7b48c983c1c6d00d06aa523a67d4e86e5bd266451bb286dcc5888f0f4940c3b022cc76d68e1706d62fea84d052a019b921335f69ed5dcd902632116759b68e09b531de276c9238faf3a9802806750454a5260bd808b796cb12116354b9a7ab9ce33f8dbd40ae7e74a07cfca02":hex:"":hex:"4a217bf136c3894ff7a3ca07eafafa286fafc8a827328b105b3a8aff28e49d14":hex:"e433460e9414b21fc3d5e2705c08a21a36acde4458e24b78dcc51199b97c7a9a":hex:"5c980247a1fa16ea086d54084281c5fd114777ed21478beee9edb175be7c4066b197065da5f4c15750783039eb4b5e2cd4ccdc2a45c49ce535f03a36657f218fc616b3e8ef0c84b78b0cd1c57477242bbddbbde098be573e20d6ddc76649d706e7f6c7ca3f44c845c2c9c9d316ac8b7389f7264c6f8cd6c56ca5503e5b37f52d19e8d47cc85a04a0196b9387433bca3c18dc30b47030fd297705101826840991eaf5b856a5ab75d2bbb70cb13e0dd1876802fc2bd776a518b9dcb9484c499644"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #2
depends_on:2:3
5:exp:3:hex:"0fc79576bdba77a815108bc9cd2d168ee30f9ab76db70600ac95fc40c1f6b724068c12b99cb4928247e64b2ea8e75c728ccb3de18adfebe24ef99e14ad54bc1b3a486891b00b1c55172d16adb00ae58c9d8ae0fa9809245a56c9118048199767d35c026e6664773562af011c2ca7025d":hex:"":hex:"b0c200b6f8548643529fd414c693054d4fe04d8f76c3fb8ccc6992ffc25e6b19":hex:"b91bf188cbaf4b01350d726585c6f3601a26b3654db2e2690a14f1989f83ad85":hex:"7c64e503eea5b3df44dc0eb986188c312a0f5fe1f113239984608a69ccadce8a7c7f3136169e075b0c61812b1e74dfe6ab2e7d6f247f73859da5a1068c92ef8e6aedd94c3904b973ab887ca3c38de70b8b312e32a702710829ddf962f0e08779ed9770975536557e3f912ef0d5c4969202af50252117eca8182c30389c9b84fda95118f8c748f0b1752c1e58b8e0af530376aa34cd874cf49628bebbd7353ab4a5f64bbc8e3537762fd5556c680290b2c523153432a2e0df1658f2a5507a30a6"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #3
depends_on:2:3
5:exp:3:hex:"ffde7e2726e89cce816ab3e22572fe31434f3181d0578d51161cc77305e2562b755008c7e4ccc8ec62806bdfbcd8508ae418fcb0b57a4d1007469ee3d959a07e949094b0a3e5af69aea3a90a222630978af9139027a656151225a2183b92e980fff9ba9876824bafcf18d63c916fe7ae":hex:"":hex:"bda1741b0b39d9248dd062870334e33cecde5c5f63a07a3030f98b021c6849fa":hex:"1b5336fcbb0ed183e0f80cd31ede4f324997ffb842a83957f41d291612c55e8a":hex:"61d542e4794e9bd4acefef4b325d954c8ec6a29138476ab1bb037507cf52c17edbd511579be5c232a67269ef42364cfb4e2aaefb31d9e8e260a04e51d95c2ed6c5e0f095efd92fbd36edcae4393659af6bb98b0b71b281e91e1df37c353987a6a9e259f2735fd16b8c1277df651b26ac3d9f292c9252be7fe09ab7851f515325a078cd69a7573a4810ab460c4c9e7604e54242ab956fe471e90f86613ece7372f1aa934a50dbd0457033843b887c279f14ad6b4960f401b7fb777253ca5e295f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #4
depends_on:2:3
5:exp:3:hex:"7946fe7ada4b545090d7647c99f71594fa094593115c23888146b27a7ccbfd77ce305c1ae4fddbb75a65dba4f0ea18897bb7e9aff3138ba030005a7d1c5802838ebb20848f8e81e7e8018cd0d0dd921243c094aa710f6b0b2ea004bd684799e3caed8c3c8944d5da995b88fa071d7526":hex:"":hex:"b29a506c7bc8b2282570223230664193216dd47f7d20ccdd35943a88c58c0503":hex:"3a4c00cd2f278f0e82498d33fb6ae9e020f4d3793e832afc9864c0b7b6cda43c":hex:"8c0667d913b13866c7eab98471109d966901fdc66fa4dff8996ce81ec5185ce374b118da34e07bd82833f20fa4e44ef159f9b0c47c046307a484b3f52822a596bcfb49b555ec8d481fb30e13dc9898f093d34cbb4d696d70161315c48def73bb1c8b4947c8ddab101d4918f5cc00b890b7450e4e10c17c46ea7f5e0a1df65a1fe74ad2577e592e7bddeadb246fa62cfa5bb8620220b18fff296a19a5a3ae6b833321ca779b7cb5b55658931610d8b7776087c41ee4d077400753681c7da5c5aa"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #5
depends_on:2:3
5:exp:3:hex:"5459500d5a709b88bf067b4c390837eef5ae2e5f109c110a84cf32f561d26ddc567c5f4cf0f418cbc2a56d4325b2727f875cb1ceed3167136f0d93940417f616a3843b686ab4f5dd3d808801054c510fca5ea8fa0465f9d1afd8e0c68affa10f5af61e594e66b2bdb2372caa0712bff1":hex:"":hex:"eaec7b75ee03cdf0508c0ca171b005077954e2cec7230b0aedfe32a15cb1c855":hex:"cdafe409b871625ab1b06a93c4d5a1f8196777370df18643f97050d7756adecd":hex:"486aa4063b3840f0417034c65676d20da22c510d281bbf407855cb58a87ac9b33511d692315d88d27bd5d1ad5c35ec8b99018b5ca64897aff48544a5e578124ddc00f785deb60b0a60dc4873fa9a148da4dfa1557baa3aafa22680a40f650e4992d21e35fab3be5458dae13eb2caeddd8704d662b221bda01ac6329e2c451e865af9701a7ccb69c0ed0baeb226e6fbd2b871b99420949570bf5fc61c673aacb58feabdb304f870939d705426aae55cb3a2f3206c33abd453e077c4565c603a18"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #6
depends_on:2:3
5:exp:3:hex:"7e74b0a5413ee2ad8de814ea1f556ca5c54c6f11159f1fbc78faa86a74c4871a11658e917fed348e779aae510d383290bc6c4f13391709f8aa9bd79f38f310e2ffbe7fb1be3e6e3aac9d879f1e5fb3eb1fe81675cbdd098cd287f66fb9b28d50e12a64b9e08f28a40ed446fc3a12585c":hex:"":hex:"d152b0aa1946cf177aafc7d47322f8c756831550ec79adb40f34681fd6b3840f":hex:"152229388caf5dc50454c2514d9ff1a4b70e3d1d9b8b29a228d59ce67e8bc586":hex:"a1e2046729e849482bd693e21779e18370a542e2fc7baedbed054476f35447e069bfda33fa2723ad425717c027e8b30d57dd2fca8cf268849358354478cd8bb42e8f9a737c2e3d5490991e4902a52e86d1bafc1751f5908a36afca2b6b4663ccc9f1aa46e857e2ee61e4dc19d154029da48d59519dde64410b1d7daeb5b7b93213cba1bb059637023f928f16e5944e0ed2ca07be3674fed6e0da72313b3cb80b7a2d6533fc8785587366ca1b6769db803d6d840c5d1b6c4589272a3fe9371b0f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #7
depends_on:2:3
5:exp:3:hex:"70b5cab63391c5777e4e60516b7095dea3cf26d72b27c19f5a08de6634306d992de4c3f70bf2849a4c3dbeafb163f5d50dcbbcc8e6f4bd973636da95d71d39d6ffc9e67332088bf906921b9c48a7e3de158740a9c0f29a7b69d5545e390030965e305ac1653958360d01607bcbc39fb9":hex:"":hex:"ab042d23accf9a9473b43e82683e30f436fa492ba4a8911e4ed2622d481e0cd1":hex:"b707e2d5a5020d37656009713bb100c55819a98e220fbdfd921c6c0724ba7238":hex:"f3f82b7aa0639bcabecefc7b07b3eecc9962884250fad11b9351226f138e06e3e953e052792d0127618a28aaaa1bf5374a06393c18a326f8d3471010f9840dd16ec997f53fb981aa2b689bf1cdbf265b4ab698f9e8e9c054255147e04654b8fb1d0fd3a0b64d3880ee6e9fa87e0184f6ba307f4d3fea651556e0baeeb75f308fa32925f8c55ae0f355f8db8495ec6c46003763ad4ef36590ec40239b5e8530aadaac931feefc8e392c550ad4d89f5b314a53a0633c7a93bc05b588273e6d1d56"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #8
depends_on:2:3
5:exp:3:hex:"c17914dd6b73d65e5af112536f52b046d4963f9c9098c77d9dfe35ca7ee6366d4c0fed576ba4cd14caa3d0c406fffad2f0748362166975f5bcb9a395d568b8dbde3383c5654bd24f26890b21ee1f1cb10f3c93cf2df64cd764187c840590a54babc9c281de88ad1a1dbc2677fa8687f9":hex:"":hex:"4a61ee9349d53f8b3c1af36fe0a9303ef89705fd87e06e5f34b61e1350111279":hex:"a9ad1cad4ca7a5af4bfb83680d4b914c23a6cd551e8b002c50f30be0d8693edf":hex:"9ab30e3729dd8b2af987dcb793d7a3e1fc4ebcfe0a4ac976d91bd3897777effb210c8076e9fd135991e54abb4bb8c7b183a80ef37077692e519d38df4a04304fd83fe1d67d32147fe0a249a6c8bc603d99878039b873588c3781a193437f098094fd8c12945ef99036442c80cd1f544725040df980c548f0a675afaf62a1b7c225c9cdf0703e613c7a5d72c8b00d8ba199b8ecb48b6e0b0d103a3b0f57ff1a4b9189a20dedeac6eb26b1f66ea0c34ddded10af2b0133f4b5b95ac2239dd94919"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #9
depends_on:2:3
5:exp:3:hex:"2aa5423270d0859a6e3aa3069a88f3ac4c30eda7f6e52aa891e4f995244a80d73d73f789561b00ceddf721ea59a7eda3157090ec192c578fc53d232c36453c5e8bc3c9c22f3aedb6a93f7aa63975d9bd3369cd518e570f6af0ab162e4c938d17dcd4f3ae46d7cd502ef73b2d40f50e2a":hex:"":hex:"32cae3ff757b79f2305a8b5f5fff5a77afb581faf5a3796c5ed7054d7c048017":hex:"632eb6f1c827cf299f3403bf80af721fe5ff8245331f1ccfbb8f4e61ef5edadf":hex:"1a85c36131a8c271d6c805233098bb29f9104e6254e0680c6e264a76f79ec17c7ac65c8a97610a0a7e5304b37d1ebdbe02cf9daa9e45b81d75d8c613afb974eb38dc49041eafa7462b4c272fdd3d7fd4b05b1e6142305ffd6fa634ddde90e273b51b02c0b68b823c77ddf3e93a2ab9436d0f4801f08a113eefeefefb9592683981423f83235f8e563ecdb4e44daa9afa5e1728204dde1bd254c7985e6d56897c570b0c6307fd49ae4dce18ea55eae846af2a5acaae17a71f8369b64f47b0e54d"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #10
depends_on:2:3
5:exp:3:hex:"c69c61689d1f7763d43b22b6bc2262c377c62db60835114442fd5bd65c665705b5563b3b6e9e793d0f4128696eefc5ac603b3edb35b705ae39845cefdf8fde23f5479ae4f033442aa958e979c89bc41dde68d92f05b28c3644133d19788624bc970019a10f6b3c6c5b8dd22b0cee3e26":hex:"":hex:"15cd6984fab6ae7db72a4c099a064cdfbd141dce361fab0021872c91b1bb65ff":hex:"86c295fcc7f9c2ec9fad377e0e4d0119334080f59fa68c21c19d7a1212dce03b":hex:"97b971ec13db049ccd72bc597ebc2e33fe4da647d0f74855f242884d35dcf92d0349fdb3527c87c5431c10fa85569285096d3369bd1917c8c7c8650024acb88e5b17c42b50a75419e29757a9e1ae09053cf0b51dac437883cf3f5b1abb40a71f40d279bc9d596d0f59f4c70f81087b4446c402279f4486198ee3294d0a5f72eba7ba52cd552906371aeeedb47122bffb0d5ed27c3cbb86a6fc2d83ab4db7b6e1ee467dd1ec20dc15bcee168f2e200179714cfc04eac651a495a718e1ed985bfb"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #11
depends_on:2:3
5:exp:3:hex:"4dcc7427dff46b7db7e2d3273e0605ce85c460cfd4269fce9ca3b10399b99e178b12f28786b9e3df457ac0015004844d6f6bef29ea562856ee82246d24982393f770d0b65d0ffc660d9d8359f10904fd8cbb76e648df60ec43237ff7dc46bc34920bba637a2c1643a53e8a88bb7bb97b":hex:"":hex:"4c0ab67b952186f2f85a0dbd4b2c1b0dd009dd794260ee7f321b2d2b3d994e09":hex:"f5be66009b79f51f6aa0cd1a5a24a72c6a6c4263263cbcf80e8e0d514a2bbb1e":hex:"211ca57a321cae2c6d1ad755ac924c92dd09bb1c6334ecc543ba78a18608479457bebda63f707fc28190b2d56e4cfd96d8c49fd146ace867236c57761ea28326e3d241d1dc35d7ca971df9d292f2563d33c5f32abe86367cf5f2f06628376752b353f72b501ffa94a50f146b8174cb7946ab8c8be382237334f37594418850a233c536d72763f10b06f728e3e60d3b4f0377d51b0de11d110a28b6fcb7c42b77e5f6b771c8e5d713a0f6c4d82ab2311cadf16b7cb441a417b2f595f32ea822ea"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #12
depends_on:2:3
5:exp:3:hex:"b72f34bf8209a28168ae7692e4c7d6f19feab9346971b85fb9f377f6e4a77dfb370a10addae744ac03f2f277c85423945f486830cd410f26e22c23a136d41800850113339242e1a0550bef81a239a289a8d020c14298854f0b17abb0bc461ed6d39ab2d9cfb03b835916c2a8e93710a0":hex:"":hex:"e919d983beae4b687bb393d90ad4104146e86564845800ecf82085d5b269f1dc":hex:"abc8b519db05c1de8794248c5741627cc00ee35a972ecdec045a0cc557a2d967":hex:"9777504473adadade14eefc0279f8347bb178a36dbb5fb028f0315b4309fad4ef554bf34b04146ba4bc260a89cf78195ad1c23c6e473a14385c66ba2a1c005cdfe336999245f00ffeaa41dfa3d9e68294e5d676f01f213c6d2d8a69b43e36f2a568999c0a8c07e96d7daf90f3e2e668eb9fc8e5c812a49a39507d193eb7c95b947aafe658a1065efe9370cf81014e4ffd54efffe5f863e6e4b7d875565617d8b72854ecf09263c55d1c3f1a4f4862214fafe7f03da5572095a7befcfd8e6ee63"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #13
depends_on:2:3
5:exp:3:hex:"35d5a6cae5aefdbc62f1efb638c15dda387a8f651810bf068a8d92601fd37e0efffd95196c09c668ddb05eef3de339222a0bd0d3b721a27e2f29be84a846c3964eb9a84cf69b214f612df3b414729df499da4d3ad8bf3613bdad3a70c73cae80556c16f8ab83adf0f2bc9391094bfd98":hex:"":hex:"cd603812a8444925993f2c1a0691bb4459faedd872f43852f9970675f579a1eb":hex:"1441b6d4876b050fa4d969f1845d3f119cf5d8720c35da9c489000e6b7165db4":hex:"259828d05b8e735fad69527cd2322f94e8e7ac2791607ccf2a74d070bf7d5574ffd8d6e447cb4e02bb15a87aa88d8f1667edc0905455b116ef7f08ce727d8f266965242e0042810f946e52acca6348d70e012d998322a18a2f3b4c4c6d6b66cfe65385312344e3eed14c6e7277eac9a4d09ddc5dcf8fcce6f79a23d34c80cb78aaaf1347ecce8c13efd450d59506513e62f527179b95b9b5d9df821c32538f8e1ccb17e911826e944ec44943ad8e726d54fa98ebc4d012d34a23771ba497ca2e"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 0, 256) #14
depends_on:2:3
5:exp:3:hex:"66abf17d907a134232faaff93bfe361223b5b773980cc261fd19caaca022fd0a081c11efee01fb1f7abd0145b32a51b3237d6ace877ca6392bcae2fd2aa5b865aabfb1d1d1da33f42319a088c8dbed1124a71d39e627d5efaa1e8f3e5f70114bb03b71ce54e4f8d34e838106b2467cca":hex:"":hex:"1e51f2b67538f84440912c6fa20fbf009100fc3008b5b8e1308d95e7ca53b460":hex:"301f91c659f73b618cb46a4343772f1eee9fb4949ec6328109823749bd8b0b11":hex:"34c532082926e6d530b3a58282eb4666ac7374e8befaa4999dfc9f409e40ff966652295d2940db97061800583bc7d47b053553ad29c89ee61803c1089d30592270d2927031353592d4aa71f59a4bf3f2147cb406322367544c38fa5a3c8ccb534bd884355b06145db62161260162091c795874a2e99e01292a2e39e107738818a211750f858edbe0c2ea4734ad14f1c45bcc9f733f027616926558587f7332be55044dfd6fcdb628ff7d7d581820a217bc64aa092e450722686e0cb291eca45b"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #0
depends_on:2:3
5:exp:3:hex:"37dc21c72dc7c82d5e13c51ecaf5a8ae06402500d92caf96c0555a95069f4f0144a961ead5d6d9bc317afc8206202bddd57fc02a2a500df1fb5c4d9d8837b52a5220fdf068fe2b8b4bcc63fbc9bfc94c8e21d987e8b6cb0f4cd37b144c668f18b7a36ed4e9758ee7b96029aa0ab2196a":hex:"41e3b89347bd035bde510ab8ff83d5fdcc9d5f2de648bdb468a714f2c1083c52":hex:"":hex:"":hex:"a929ee23c5832e5ab93ccaa40bf775593d7d04a1a8411dfa07b4c8a2da2dc91b1bcb9c27a0ba5a7152ce5ded5f76cf6b83c04c0f8a4f6b43383ae3e7d497280c0f944be91b0bca6a56df2d00641bfc1ec549b538898e559407b076164278c0eb7afb6d6f4495a50d4da178c04b259d21bb745692d3bd186edf5bb3da6f66b4418fc3d9b085b0a6c1a5e54696272c305c4b8887595b391dd6ed8da03dc9fdb2728d8c40a2defd8af05ef1c443a72323f2e0b0d268109fb7e7ee70192fa06bc6c2"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #1
depends_on:2:3
5:exp:3:hex:"0dcbeb660cff703e059913eebff4f639a24b611a078bae8f01320ea4af5e8e0ed93b8dc4e84d224036b5da645c147359c6123c54cc2367262a7594bc9a7dc69f76549ab803af66de8f253d338d48ab827b2b1918d636d6ec92bfd9123f1f5fb59b6c37eadca0ca7792e2b7932e1ddc33":hex:"1debeed9ba5790437a6c56dd3c9e2f6df0912aa0ce2e57fa8eec9652e2eccfc1":hex:"":hex:"":hex:"5bd815b3c3bb73a45dba72c68457ccc17212af905607d827e8b5ddbffa34a058ec360abbeb6c8ba16c770ae4826135ac7e4faf208da8b5fe3b26c16fa7c7ef4000c3dfe1b8b707dde64b415c671c4615d56e2648908e047ac978a389e346cebe9228daa7bcdf5e341f72c3c7ff74672edd60c7c6341726450ffbf9e3e7a16580e7e602f9ddd3f3556129052de05991907d81a87467ff5842c6e5dcff4543e24ee48149f16e9107a9aa40cbce367d4b76042d77ef1790b0a7701b2f04873d245f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #2
depends_on:2:3
5:exp:3:hex:"d9bd99128fe2771918afc6db6b2514eea0b617d9bd4599a238d9d99a7ce18995e8d85542f3f9dd89920b0f79b94d7f551fef4a330e9de24eb197bc75677bc13d8361104997af99ea2c6da03f4e71c89e03191bc5e320f057afee98e98facb99d15142c61ddd71666cdc38146fbc3ea4d":hex:"eb701a9d119cc6dc0d735254067dfe161b1052ba3f93ab0d6bcc19cc0387027a":hex:"":hex:"":hex:"67b86213a84778a9a38eb9913b9db8508b53ac0a81ff85dc78c966d638255f8f7c63ce06d4a66f5d9213ec2b32f7e63ce5dcf01b59d3b30433f0cf4c06c171d839953de913093ec845670b38ecacd81162dd73501b2e4c2d9dc69b97d49bd6d9f6250070ef6b360305fcc5ff392d1adad98d6bfda67d10b725c7cc8ef6b4fc206fde1871712b96dcbc2df4f08d79f1adf7fbb01bfd8f20e76956ed4b9dd1d7e5fb4f922ad2a529bd871490e741843d839e876c4b475e2fa140f28ac8d347a07b"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #3
depends_on:2:3
5:exp:3:hex:"0de3fed3b363d20ec5018d4aeafb25c8e0e6aa42ee8b56843043f8d9c40b9bdc8ed427d29c469d8976a5b785d050f3d2e5eb287a064c54311bab32dcd5f240682babef59c6ffa602669f3ce4590b054e2550444f249b56666b7b2fbec29b33d1b29ee653e388f9fb54b00635ff526dd9":hex:"82b6a44b0f35f946fa0fd4628738e61a0bdd421a8de73f3d2efa25216c789080":hex:"":hex:"":hex:"1f7b951d147ddbf21fef9d4849044c44b757309da8f0244f71e4d8301e1fd50c5e46407f5bcbed83eaefdf8983c330dd0a67568e866b20b48c2bc97dc63a7c0d3eb60f2488b1eefdfaa7b8dd43132511b4a2ca80bc9e82851584ec4ae463444aadd3c8e6db2d4469ad9750e18a31337613975b3fa0629b9a22bccb235d20157a4427acd619324e881e68f5615c65e59a566a73e4ce9d484fc5b0b29137c4f339be84781cad67d17de03099b1d03ac45106c1f2eb5b380ec84392b7ba5c91df4c"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #4
depends_on:2:3
5:exp:3:hex:"abdc2ac24ba7d92ed9f518d9576510969f8d22074bed9b7639299d2137532c50faa49b5e843f417693a2eebd0ffd3f27c0ad2d8bbfdb912ed4d1ec85165d4ae577a92b1affab63070e25dca8bb1b035c8bbc5d3a07b4fe094690e4a45b99f9e5bb6b0bfe823f3c2a148732fd43db5e5d":hex:"8c7b18ce389664fb72e777e70b533ced4c04b0c290fdd45b86b6b95708d74187":hex:"":hex:"":hex:"c3d1420055f71a43264ab8da92829fa1b8937346375349d2e256705d933a21352ddb4eeceb36cdeab38cae58da81bcbe6deafeca5d7f018a0514bbc285f436b574ffac2547d26a3f9aef21b66c1e70b45d372e4dc2281182ae94667e442f39e1b9b2fc2aee06ab306095a904614613b513cf1af5a9df12b996cbe88cc3b25401790034ad0622df43af4cdbf9cb681538c79189a8260cf9c35378955f2ea859faa78773854883cd94bde4c0f50d4c998c278e47787e3f74f3dbb98f710366d315"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #5
depends_on:2:3
5:exp:3:hex:"d20353e175f4ebd0ef5fe77f7f6fbf5340ba07934828dd296c041a63de841002db0d21ecbfd5eda2bce80bed6f73c23d3f18900bcc02791ba9cae668fc33fc60ba84c6eb40afbbfff18be5c4960ce57ad67dfc8c1eabe61a299881c0f326f7093c1a232c80467772e707dbe75b5558d4":hex:"f38f23461c471181a4179323aed247299df11ce145fbab9834b85b3cb42a10f5":hex:"":hex:"":hex:"76a4994edba3d0d9ffee9ccb7e12a75e79c5ec1213f45ca4c50ad629ac533e5e6dbf58f8fac193755e74f9e7a75eedf89472e91d394e32eaed86efa4fb2f9e7fe4bec1d9c7a30fe9bd17c2cda73d136e752a9b818cee6f1262028031bc09cb81b89156138b571f03afa69dd388a807a8cbe9c4de66cad764114f9a4a6419ea70ccbbbff9dd774aea8a2d6b1d20d0a577c59953661f0a87b4d795c2626a025d733f43bb5cd1df37f5cf542c7c8b6bda061cf4693e0384060e63090415d7470cb0"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #6
depends_on:2:3
5:exp:3:hex:"a58ca5154659ba58fc1b468c909c667e1b5087884c01ab15f86fb5a431e982c1c041be0aa014fb310019fff65f40ff13d4469b123223ae44f4f4ac0fb6877a7890f969d39047e39ab23882cd7838e16e64bc361fe18136471dea2e71a86ef2d9f8f7e1d24643d7df292409ff8cba0f13":hex:"dc05980e40f07a02fdb150af580a7d195ba26f4fa72a1fe513ccc2cf6e4f699f":hex:"":hex:"":hex:"6ad4543c218cb6aafe65e6a50c4f9ee9d5c7a3b9a0112bce262f49f5b0d20dab7225fd0acffa25165729d8fbba038eb65f7e72f136e5bb82e8d94698dd9b763c38f3041ccece3b04189aaabed79e4d4213e24218c5fccf5f9a0c3902875564431f4d670e6e60e1dbabcc4642c3ef895c115e28702927cb98d509f9341ac7ae2c6ef6c2dc4537e909c81a9804057b6e24fa63ec5edce835e624969a969e2c47c6dcb7e9bcb2bb8f344d2b9855a43e26c0606466887b28b67ffd7f99d374812d11"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #7
depends_on:2:3
5:exp:3:hex:"9d6e99a11d63cab5aabb1462abef66bef31a2886cd172651bbf30f65b16fb8f3b93b5042a908510d8518330538a06253959da557d2b390c6fe0b7ac6b18591e5791d275c7e3d558690719d5967d026a80604a389946e2a55486b5c49c2984990a2e14824aa2922e6a59892c5e6d969fb":hex:"af631e7990394889b84d851920ce8877934e706b780908a07211d45b247584a6":hex:"":hex:"":hex:"9f33ba9083c7f4088c9505622cd5b4937b7189b0cbcdcf352c54ef72057594b8568cd4b13a4bfeb61261d27f5febbf2cbbf902a8d55f6bdf669238ae84b8abc58826841f7f62a0c5bd9f74125cecbf8e3b4c1ec88663114e7c248c41cce92e73b05eb3f826100c1b2683cbba985d2ab694b5de1ed8624628917ec9bb97733f337298c0459f198c7a138f1670dfac0d58f287b8244f0605f97406ef528099aa2ef290db202baa7fb221a8523344ad836c9a2bb25e1ff3fb4dc20f69ebc9f0fdd9"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #8
depends_on:2:3
5:exp:3:hex:"df7c57519ae3914c75174b3107b7ddab95df936c5cd7c296b1cb1ea06249915cda22bac19ccf2d522137989d5a42549809277ba155d04b3353520f4b5c2f18120bb4b8442130db58e9d46a1a41f5627c40a6b65a4f9075460b7053202a6e5b12b9e07ae6ee9b4945d4235d0b736e88f2":hex:"10a198b05830cff2fb4f5b0317c258129396edb943769292753095b58bc8fece":hex:"":hex:"":hex:"17b9fc6419c17534ee16aacf32550cbf58ea1f073b8e72fb9ae6e94094e797f216703da428394a1da8236f725b191cbec11531a1f87946c70fb1440a55be7d7d18c9b5085d626dd0cd9b3bd63a9014e5d14eef636beb694dfa7f781e83f3c1b4fe5519ab1a505d1be5b812514f3a39814601db104afe5726086f6bacb61c00ab8210239b2891938e97fc53de069f18a6469999727a904403bc53c6c73c7b3a5f9f37f380563f1281cdaa1b4bb4a636f849717c307848748172ae0191997abda8"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #9
depends_on:2:3
5:exp:3:hex:"2e403c307a03d766b61001842f85caf91a5eec97a49934547b2ce63411916495f3e102d333269e04381bbf140a28a2d61fa6a5f2286079619f4f4fafeb5c520c602d0ac3190fd500a3402e7c0647ac76c901e7c58e012cd6b9e83d2a969f0d0ae4e08ed5cb601fc72596a72b4854f246":hex:"ff1d9eed8cf59f5708e41924cf13fd5d30ccb7dedce3062dfbb2c4bb4d36b65b":hex:"":hex:"":hex:"e5e20f2cb063c1587583a381536aecbf0b0cb4400c99a74bbb6aa15f338b3e67187316865cf90e691d99466e34bd6612985575122c6c79848d4e2f26801d98e49c002f4063019394f4b3eee908f2d6b56749c260e56ece4e0431650a8bd9735879ee6c9bfaa5d44c07e7ff6978883c36597c31126386dafbbe035579819068bb060348629f74420bd411f2dc858d46dff0bb4f79946af96046da2c2cb32e0aaded4eb1ebc8748f277317f9ffb9aadac1bf5e6654ae7131d5ee0c765ff3d49d9e"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #10
depends_on:2:3
5:exp:3:hex:"4b1240cedb84ee3f395317e177efcf03b0fb57be1e01e3c206170877a06ec2cc077e9751b4eec964a4422d010ef1487456fc16b3e6e7ccb8a06230144535274215f00afe175d394cb04518b630ba7255ada0c6676885801a8f503c55c38850de6f7904b40cf03fa195cd16ea2999347c":hex:"9043ef3c775f32dce1902b9efdc481f61f29220eca53bb904155f2aacc3b3706":hex:"":hex:"":hex:"4facd2fff1828b9f4a63f639503cf6533a4d242f316ef7168fba44b52b876056bb0fd040d5e331d2746169cdc88ccef74dcf6c642c1d1a0db4130f8be9ff88555de4c2a7a5824f005cccdfa6074df3385672eca57a45679d69dfec232cc8b1bca87f6f9c6cac2f630498d52449a5d1b328a6d2ac1a9054a0658be589bc277b7750ab5d647a73a15a059d72608f9d299d11f9fb417a37ddc1b52c8b8859c2949e5ebae650b9cf8b4fd771288e582dee38178b154e681eaf74d4d3f35daf00a309"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #11
depends_on:2:3
5:exp:3:hex:"c2027d8c084e2c6fc5d535726312bc6362372872cd37bf07cc1c3870f3b59a970c62b84a10d1498b2e02027d854fd84dd615e29e7c204579968569386b6f08393322c4fb36da4398ec4881ca9c17905b7b2fa28722c98d404e93fbaadb165411d41256a0dfc806a19df0f526571c80f0":hex:"8c5c93583dbba016531aecc1da7b010b9559785b2e8cf660ce17022f8d86be78":hex:"":hex:"":hex:"54074cf184040f57716e9eef80ed0e006cd029b99ca568fd7639c4c1b0f7431933516830f5f87b157fdbbb2af7ab57f6faa26323f096c8e86136e49d833665a6cb3a22f7d5d38290c2e9a23c62dea6c51b958460b263566c5c0e4be9adcb1c123b55879f405f11b3c34c24852d33c64d6563ee46cad14ce08d5919ddbffdfaad0bef8d8ed9974f1d95917e2b108d9519b13c4f6929429d2dc44ecace7799839ffcae035904b576e71e92b0a89f39e3b3444b75ee0705419c3b3533c793605eb6"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #12
depends_on:2:3
5:exp:3:hex:"02ef640b9f087fa48457918d7bd6e910d7379bdd89e1549118ec67880dc3c4be3ad95397b8fc88bfced5aa76941716bf4c26696e9540d759c8c6b8603d5c40df267056c79bd8a3497b77052e498953493eb853b56c41f3286c09f1ec88637f95a1cb7e6e0efd3acb8a8fa4de63d10727":hex:"38e664b930fb072112e6d47bfc5538b0d48672a12769f3eb860243bbc1c5db75":hex:"":hex:"":hex:"c399e8c39ab174fa8cabb7e73845d8d434dcebc21062edc69d02928b0de4471517496365bbd59062a43408215f5b0f35971f4c48077623860206e0e6af8de751e6fe45eb6648a66e8ac5e603043c5365be3015af858fa2709c6c7b1cd22701dbbf4ef27fa45e6d7f9df4e8a558517a38e26bdd82960db9a92a0deee98657ab514913f134cb9362756a78ae4afed3a6c89e86341a8fb20b5cdfcd56933363f83e8c55c69adbf8e8d7199bc4f93b72ae1c4d0939b564d98e7f052c66e1e0988ca5"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #13
depends_on:2:3
5:exp:3:hex:"2f280ffe3306764839899faa89213139a40462039f4d9c55feaef6728c24cc636819357f6ea65badc8e493b99d5af1d995d14d81e39802711977d0a1c5783bfe3c290bc469bb9af520b0faa06f230fe6c4ba3804e39e3226f0731f09579e105d726b089d1c37c72e3faeb33768d3f20e":hex:"e3d99860e8b1e9297c60b17904be8525be831d71dbd3f454f085d1758ebe7160":hex:"":hex:"":hex:"45400ec700a4cf8309fbea94aa4fcbdd22c859e0f7defa746085a2f4ddb9db16efbb0c2fff798c99ff4e9e11986f4c330f3658e34a146f8d9071467228e3b0ea486cfbc81da3e739a301fe51b620d7d27fe9da0e4b875efe3c2bd0fde31f608015ad71cac9c95bce33e516c62fc45a9fc85a78c142416d7fbff3a83602dcce3add6301ca6b9be565e3cf06ad6f22855d57d9c184ed7214adc1bb014a1b6dafb86989283fa3a4be10c410442d761c98d2d3f94bb0d97ba1d5c8966eb47b0fe6ec"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 0) #14
depends_on:2:3
5:exp:3:hex:"8f3ddc4230f8320bd18cf078c04c62e248fcc326980301174617a9e54351c667ba4c31a4c0e7dbd7336c27c0b8a034f6fd947b0a21e580e6c2dbfbd44d01f5fb4a51dcd2199df9f1803f24c5e774f048815302e016aad33254d308c5457f368965c15b6204e191c2a252e4fe88dfb978":hex:"9bfe9bc055b3215560cd285553372c47cca422fca574c0d22d7ce5f2dd40b084":hex:"":hex:"":hex:"34f550231d31c1b3a3db331d341ada3b987120d94e431831eea67e8d208f9cf1800549d445fc7befbdcc2488cc7f4340560d574fcd2396e9ecc9a232f1015cfb26db451623fe47ec8bacee1756573e74e519adc62b23ce86fc191ea5e13da9c7a14496426c6c53dfa7c7ccdb67d6164dbe88cbbe7f48d4971993003ab24f3eff18bd52c2661992e8f8da93bfdd28f01fc32edb439ad130352463084041e9871c431ba26c676ecd7812991833113cbbe687651e93aeb22a6a44cffc7a3fb214b2"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #0
depends_on:2:3
5:exp:3:hex:"8b285ce6b4da70c83fd72aab1b4be62101bf9b29e168726ea2f670aab0deaefc5da3404c494c6019ea33679e37cec308dab13e0cb060f66c1c83fc6fba46477d1a3c802edd7594db0b297dedb9ccbc800c817f05658fb9b4c99938ae2140160c4a16d548634a353bc285cb38d0e93243":hex:"723c0f287db4af285c195cebb1104a106f22e8b243fdcd0566228ab5f227a9e3":hex:"881a1874c800db068b5913d195058d0726458de3782ff530af1a761f9628547f":hex:"0c27cf271bd7931d187ec6f56038519674468fa2e7e6f994904c9f1afa346939":hex:"51e042dd56a193908c9018c25f1c1a8b5e2734b055c3b7fde6a8ba9ec2b959349df29295abb0a24b4715f98d31de0a369e6262c2b2cd49c5462b7ae284e921f5ad2ec013edc1611343c228683f4170f34a75854b1b656d226e294172d488c10a415f09dee70984b9c49e8d36863192301d1762145e0d9e94e99bd30ce8490438ed050f418cf4ba0b07fe90a82d1ccf38578d99edf0518c4a758a199db4d3533c4dbc55b1da19840b8f365a574aa01647819032dc0ad641388c2093ebd4ab5d99"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #1
depends_on:2:3
5:exp:3:hex:"5b5c670d3e0e97a21cfd5bc3d038f0c3d2578cf3147f5545e5118a04c4eac727b50734939e2fd0aba704932ccaac42af316525e3fc5f1dd224131d65f8d44ff8420891c0af7c78f9cf766097fbf0f8bfdd131db1801275c28081e6063c0c4d6242f96e40fc513608289f378bc4f18518":hex:"4cb0e590a1d575b6a2df9cb0243895263c894a990b6798424bea9ef199761d08":hex:"feabcecf0648665b08a7c690add6ff75744de3916d5573145c35517808605beb":hex:"fe81cf8978798311ee6d1c5d6145b3832d9ad1a1266fdac0f4fa230c631e9ba0":hex:"62aa5e9b8a07bed2a5d3eef0c73bbc841bb8cbf544d32a2889806ba501c6768aca98c19b83fd4fb2cabf120c05716b9eac9b77d561ffdd69682308f80fcf1c78409f3b21749bf71abdb209660716a39c2562e8ae1b3478828bf35ec9d3f9712d95f49a36b9eaddaf1b249f023c36d09ff1b6f3df6d10e4e336763edef9501827d5171c507eec405bae52d56fd62f90f5c58a2f1a7310530df15ca6b7841a2871a37cae583e6b388978c118b9600840f5540af529bce0a24da8f906f601fc270f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #2
depends_on:2:3
5:exp:3:hex:"64cf47e52f758df802c2b37a4841c73a3228738d14b439a7d02b13fa3024715c744721e49f25a0e73e821f69786fe2d91ec1cce1d1cbf2dcbe5bdd2371c0a5df050841b6f07b1a2c0d064bc5e06ecf2ff9904928febe0bfaf3626df5bfb79fee1474cc8dfc3ae268570df2811bc3ba3b":hex:"c3f0b0471d5273f40e74ccd71712071fa411b72b0f5a98c9eea9a5f7f176967e":hex:"4df90039bbb54d8753b19ccb6250ffceb7279c05f6d69b5c47801c6fdeb1ddf8":hex:"181d12bb126ea840bbf9e6ff5e68f8ef53f69071d223bff593a63e4e0c65ee1b":hex:"8cec490ebe0b4837f040663de29e2c6dc801d7953cb2416d245ef66173e5d7baafbb77fd2c5ce69b4b8995bfe51f5f33cfffd9e9b1284fb8657bb7a3c26f5aac500cc7d3737fc81418c94d3db1a63f4922ca49803c04fdbc9488e21d9c4bc381c48bd9f7e5cd1ed6c6fa9e889e463dfc3a313812245a66be220266707a5358e25807ccb11f24780e5ef82c84a8803f72dbd21f55d96362d7cd8abbfd9d21f4e3dfac33326a4e538476508afd87e030d92328a91c91ffb16b054740dc3d0a2130"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #3
depends_on:2:3
5:exp:3:hex:"690a8be904c75e41342c8e2548abde2e465612a632710179ccb9c1dab76c4615bdaeda1587772638a61747738b96cfc94879325d2cf1cc0269d877eab8aa233ba8d7f1ff44e9118a128bcd8cc687eef58940343d27ba1d800aed9e2e911a8c83b8460f9d72c7b92852cc178d3d0baf6a":hex:"5dd031fb2df56c510b3cc3c02fdcf6cf3ffa4a881e7475a8631073b3ed5e3c62":hex:"a0a861238b2b9ea03582eb4703bc33921b5376c27004710d416ff921d6e6fc60":hex:"3cef66f75aa682ad5430bdf0f01dd1f2c3492fcacc6f80ab351cfacc1c6b6ce0":hex:"92b337a3364059acfcaef789ac1ae09c9ed05fdf69f5d5da7a1c9b6962d3a3c71a4041dc234f7be58fdbb728f8f5fb10404558f21d9b4c818fcadf5d6bac8bcb044e5b2fbd26ee08398dc8904c271e8d3d184bbf61f77c62fd3c8f1cc1ee2f8c4620c513f3abf5e312b431e8608b29cdf528d892ff03bc0a9cbd202b9da1d052ae2bc2dd8723198a1b3017ade2803c3dc8733ac33ddbdcef7a9948d64f72da0716b32dc6eea224bd49a7349a1c32e8e325ac11e5fad8353cf85d9eb4b72b1954"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #4
depends_on:2:3
5:exp:3:hex:"0eba7b06309f0dc4e2bfabea57e1d01a5a3e711398320925647008abf19cae194efbff93968c0a7d1c7623ee1e3987cd95c3dbd1b2ba94d0b2d416fe2f2f6faeab46646a378e931bb5daac049333129ce7e20e53117a0f68baf4c86a3ee5e787b02b53b1e0140430e77ca86f242d7f90":hex:"69adc69e03cd113c34ae6b89c7c2fcfbe987e426da865f7c8e052da4bade343a":hex:"729489cc7ba4f3f96f77ff365fd5380cd83cc7b17b150d327c5b7632f1cb0460":hex:"59892fcf99ce719819774539ed4f10edb7cd35cd66969137a88ebe6336da90f9":hex:"565e3e392a9f364df0b575d9444aac262f58ce12312d5ac9832ae6351b6aae0398e0bedd3074f57bd4e9f0e89a50d627ecfe11fe9aea09fce563eb34efd27610a3255f81f953bb3f222b15c019b9d812150f7a1f19126994c505d9ce5c948882a1f6c5cdbc7050461ccdbbb7aae597dab53a12ea6bfaa4d4710188d690fb0a0a34df7fb6bba949fd6a8565fded8e4832ff7f6b08a653a72b8b88782b8d77c1f217e8487163fdbddcc88a83d8bdad479ca75fdbcaf02250db39528456942119f1"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #5
depends_on:2:3
5:exp:3:hex:"9dea5f271193aef61bd72c76a581d65eadc8002b258a4d548c7ad1cb587a5f681e9709eab5e146833b01a79a34c352aa642a7a376595347c0203a8a0456af4e9859aea62c887166b3483e0c7acdd5b99a1b1a466dc0709cc6ba133abe29ecf3f3150d664d04baef8854fd86a5d8cab19":hex:"895e5039eeb3ea1d197614a683c84d7780ac8724192bd6c35fe81137bc23e4bd":hex:"9e8669a67bf80c695889a7e875a9ad1954b91e4bddd0848313b4efb4b00b14fc":hex:"2e93a8b96ae1966e2a052db0d5c2d5b76cd7cd23494bb1170a33a9ddf39b21ce":hex:"71a0ea8b9884e979f4ed546cee3688ebc399b41be38578f15b99d9621de0da3e671182f6da612334edb8d3a6d5e34c2872e277942854350526c3e000834bbe18cd5f2f336bcfabb42c4aaeb19b8cefa3f7066a89593960fabba244812d15c5fa7a7281067c789745127ee2b63b14237136c54864bf86ab7c377414a7933b829fc3052e8c26c698459a83b1990c093305372aa608c967bfda719e98c4c177764b72d184586f7b63a8e75f78c9e5e1dc045c3eb5b30c7147c69100c2cf910d4f3a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #6
depends_on:2:3
5:exp:3:hex:"2b4c85aac528f5cf44e9018795a1e8f810220ce318aa174bed9db372602c00f68ac33625739f299241d1a8381372537bac392411a1d6849aa6610a177743afdf45cc524838fadf1b5feaaa9983ca79a4508b5e4a275514ef4c04c233c3dbbca32a00d0a1628323b91dacbe499c1ba928":hex:"799a4b3c9f62c2f6aa9e91604e742dd06ff9f77b15d3799684e1dfcf029d807b":hex:"1d15f59cb3e102d5ff47ad4c0aae13631ec4d300de4247137aec5b43e5aa4f79":hex:"f43801851946f97208909f1ad0f79d6577eeda70067886b270f55d626d966fbe":hex:"f05e50192528ba1185cb964324141c1d195f6e26c42164052a7b7244797c3084d48bc5e6e1a27e64562cf2fa36b4de30132a082de2f927059731d084e2042eb7720932ae8e1741f05f4c75079586924cc43a6cf3f5525e037b089674121c2741f836372f219a33bfcd910884abb166eeeed1840672663e0455b18bc7c9fcf20967b25dd77eb37e00d8fc40b0788c08280b0bd8878c504d982db4d3d2476f5fe6785b1959d1bfa2762c00efe436cd217b6d01adbf7da08d23254f1be1991d200a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #7
depends_on:2:3
5:exp:3:hex:"a716af9e058eedbe937ef79ee21cbaf4ac1ed0e2f4863eef4ca1e3e972f33326eb6ecfa7bc9bacd3d90215a3db843b24343edf7ada9e440a206df7f38f8cbd1d38159b8511f2a93d1f0b5ace8a89c0d823fe001656c3dde659874df88dd60056ced293cc49d64a71ee6b23199c9b20e6":hex:"648aa30cb2687d857d309f702f6dae1f30edc824493d6e83a9e26d94f28948a2":hex:"39c5a6514f3d399ac41b2640fd619312332fe053abf1b2a19472a58c28345347":hex:"c912a1bb84f7aeeef79d73347097e09f6b8fb7ec593176cebbbb56af866bc309":hex:"5387674cec52da2a9743b2556fa9874c0866e579079954cb357f17fc069c2e345c1ca80081040d620fba150c22eb1b8b2c7df082f637855c396ad6417fd383f8e93b7bd91693408e951b7572269c0ae65be8bcc9844f9fd8401e68f6fafdce195162154b34fdd5db8559dc11cfd3cbd3d391a45065761372f60c5182fe4cc162304061f86e666326c3332010fd388626cfa9ce1252982cae7b6eb1b8208c79b7b689aae9084fd180d00962fa4eea79f612ab7ec5fb51394f6f498528ad5860e7"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #8
depends_on:2:3
5:exp:3:hex:"af405b42f8a67c349bc10d4d0b97f56cce433e1d34cebcc75c2850010d20cf74f61b23e1d2f964ad6c9a8d65c9f87749da279902d5c30fb67207d72be55451337f34aaa8e598b9ef55fd36224ebee4b5524a93f1513fc21fa984f0a76c2bcc98ddf39823d0a87d501b3515e3ee9fd4d6":hex:"1cbd963d49b2553a9711687bc50743d820588049cf097c100739f857b3928fc0":hex:"e0d336ea552a6dbc132f194ac9ab80a34a54f4d331a55a070dde6601d6d9084e":hex:"91e882daaa304874fb0c063718984ac53e1f0716ca8c9210bdcdddc142c84082":hex:"0acb19f2a65bf0e1d9f9561d8731fe0f0c178443f00faf427973ad45f2df4f4d21a4fdecdf96c34be28e389d8caed96b515ecb215ca915b38c715015e1b07949263fb65517ea4bcae361d76c418cd2c58d29010ea79b9420d1cedf937d3aaae7e29c2170ba88c8328664d884ace90e88c66200033d19ffd52f668b00b0df088b7942377c1aec37b3c304521c394ec749efbb252669e0c0415b8b04b995fc224903b0843fbaf0be1ce804c9f14a5e97afa70d0fca9cb708ad20388730aa9de020"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #9
depends_on:2:3
5:exp:3:hex:"e9ecd00efafeba4fa9cbab22b1b5288c98a36ff1d6856592a288325968c31d7d88fd2be5c82d79413b33c1dbe972859822ca2c8a92e7812479c14fa292a627a8909c3a953a2758d42f22a18682ffa219aa9908e06f521be8fb59ad58e5651aa9d6b95983e23e54cd57dfc82b2077bf96":hex:"adf1f50a295d88f68e8c07a180897d8e7b49f7cc6cb78a3b25ee10b0583a0f0b":hex:"82de6a73568ade5e5b0d8ae37c40ff25e858a7055346020c5e47feddfef75680":hex:"cd0e15d764d2355ac9f1cbd5ea519ed1756a3bfaa55e3783b738c03bdb42e371":hex:"1e592e5003fc0f3f81a7aef2272527980cc5a9ac7286a621513b9c7ce2ea94fbfa255ef2654d673bb8cd13f3a033a7701304acbbe8d19b82a61d2e77e7251f98b0e28e1a694f9cba2c86c7c8cb20d9c2986e52052f701596e3c837af95b166cd227f2fc00edd3ea62b57f60262712b2f71479569c119cbce9d771f8a2cfdf832aa8d70e0a912978fb2bb33b27a185fb3a4caa3a18913aeab095ac088d14381802117af0cc1d97c06fe9730bebbff0adf2ffac5995d299e4defb0722bd93f0799"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #10
depends_on:2:3
5:exp:3:hex:"898a6c47a5cff500ea0f5b18b5f0b4bcf7e75d6d7c92025f9920c666dbc1c5ffc48972e1d519428f8d61dfb5e300b48f2660ff53e1ffaa3950cffc50e17a874182236fbb555d35ced33302ef87b84c0ad31e87441ae365350452a39470567bc009871a3c9785bda4569af33d03d46f08":hex:"9e16568a225b80e9011571f3b55102cf6362e26b8a60fd33680d4e6625738e5f":hex:"b1c65d6e51ba043f63b4251ed58e9a8eebfc289f6285705f8ef44c202c9b4a22":hex:"245ee741a2041eda22ce7053f8576c0a43eae868fd95ad7d58bb921c155b1b53":hex:"b076210688b06ab6b57edf68126dcdfce82b6f9285ddec102ed60730aa7530863076186a3f7affbdd4ef081b7f5a32fb461bc5755ab4f860012631b74ae357fbc3cbd64f0eef8789c6c9dca894a41a005d272b4a57e761f91d221636d0ec7a49f10bb1b4264938604ff4dc7bc97eb799cea9e3e1d7a9b4bd66d88d244e22120bb311f502e66e60c5c9e42731ad320b23d6b06ae92a132b093ad924a1a7e08b5dccdc50e257bfdb63bf5705350588f61e93e4fc5042a2cad1bd6d9fbc82e875cf"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #11
depends_on:2:3
5:exp:3:hex:"8e92836dc5e4bbf9598803efb0d3871e5418cf18f379479bbcbd9262558af6cb6d97e73decb8781c30f69b61c1f5c91a5ea1f10fb1eef74b480e583710d9a6a2e57f8cfc9d0215fa73d1ce9c1562f3cc34be187940cd317b69139ab9aa58d064b6bca59ee6460c3db4e8b57fab0186f1":hex:"6d9afc769985218745235e5af280eb45cec81a2e920c284ed5c77105489e8f4b":hex:"711672f2ca12e7d8f32445a87163bc00f5d0f52c2f6799ba513b68c07c350de5":hex:"426aeab2cfa56cd3146c0eb9facfbc048a504eec3273256b5e4db3d66c89560f":hex:"56325373099fc1dd194555c3a1e69358fc7f80fe6610412cb31c14cdc70c73a74d040746c6cf388fb9718e7446888c6162de73ac097c32f8b4b00dd7f115fed1821d3786baaa1f64885cb93c75531e99171f98d3c3576337c1c41c5bfe83f94cef2adebc88c0790398d4c071488699edd599797c1f8f394b3e00e66bc4b68a7cacd209695961713c3bf2c9a5c8589d935e171f775f366217e2634ddf0db5f01ab31760ebd9ed9724292bec89db06d0145fb824a76292a35f39b01a06c43510a6"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #12
depends_on:2:3
5:exp:3:hex:"a4f1fd83e53a406163862260fb9e2ec64d4af74f5fa41ff56c07c791b6bb6abbdb203670b1849afbf0931206ad6393798ff06fba8dca3318c29d9161c0ec18ec5d7d66847b1a618bb0e4f69fa1331fd1db5d5fffdeec5a2e045c588dc95a5d5eac6d35502ebe2e6a57318f15af53e001":hex:"39dd79397f91a97432e5124e7b9b85928f62c598ecd19626070a81a5a8ed564a":hex:"985724541d44c8b865672759c8d36ded75c2189c2281731888a741b305eb4161":hex:"e2dae75950e417c18f1c3e5fbd66b1cc9fa617aa695c9d03d8768b9e197fea80":hex:"703ab1f6a5332f01fa788cf73922a9f6cf856319772eeab07b4795702562cde350a8cf9395976fd227b08134feb469ca34f675c9b6f176ad684a5b0d02b4c135a7174bf0604a1546e7d8d978ecfd8cb6ae5efce3b228dc95cb413b010732c3e7f9ef8e547a93540e5e4aaaa3b0e5a8f45b83bb11209a03883c54f41e494fcbc66c2d57c01002137567ea2f99f7a1ed6c4c6080bdaa299d18f57bb3b386278a78b2ef23a03043e850bd9fd742527c45308e5b910fc586f9f21de7022d02b1493b"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #13
depends_on:2:3
5:exp:3:hex:"f331ebcdbc0d2dfbf54758680dd49dd0bd666d0505ef6ba1c4bbfb7dee62edc34ea9063632c8e6719bbe140c3c840aabd66e7702c384700921dc1838c6c5a832c650a474e74270c378abff021d60d1a1884939bbdc51c547c72c929c0c73ca7f78668d33fba197642be8ac2d41cefde4":hex:"ec299e456cd1985a3f1022d5c05f0ef9040cc8b8297ba5e404d92a6d36c3578f":hex:"954f464877f7258f99acbfb9adfe4eedc89da71ca82e3581fb5bad127b2069e7":hex:"515f9e746c7407196610bbae963b9bc15b1658972a30e62be6f78caee1287e88":hex:"5aa30a796d46e789c498352ade179f0cd3336418fbeafae0d10fbf7798917672288b3b2a12267fc0435d88b4e99809c1e3067f0d65c910b12a330334b6a23d6d30910d301438c2c999353e1f78019ba7b20eaf68b499ff1e88db0431312a66f35305c4f3c3a2750c95bbc07ccbdf1e4d123eec378b9be8894b597bcc029c664e59e2b3c23fd72841af0ddc9374ecef21885a0b54d13186dc0a66ed3c3caca9e41753813ae61015a952142bd4d7ebbaa3193598be1267be937745fb0de09aa70d"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-384, 256, 256) #14
depends_on:2:3
5:exp:3:hex:"d99ddbd82ce9937cda083e30b3da47a6e6ca08b8f59f2fc934bb3f78e748bb28cfabddb375efc5f2025a53fd073a89b0fbec391290863ad862aa56fe6d945044e879ca05c3c019313f810dd559fa0e682d6b77ff7e612c7c40cd5231eece4018c5b3c0d8181ab44703f7a04c0a1c7c5e":hex:"ebc2193d4a97b97d298f1305b2f7a54dab466f7c4e444831651cac29a6c5bd88":hex:"6826aad41f8ac29e272884cb6d21300c7b0b3ca37205e1720afaf9f716f337ec":hex:"5a7434648de82a3552e12aff800093776ca3e86565b29c0b3ad6c0bc3180623f":hex:"cfc79a89a0a55dc9c6c6eccdfab5a9935335e806b73bab7f5eff5f9fea6aa3f47bf31f06d987a94e2bc2a4a6144ebe94d6f5aa8fcaabbf86a37c8d412207864322d3057b89fef358740c5962cf9e7c37072847fcaa6db693a5238ef270e8414e2b29448bbcc37dceaa75479c2ac5fee2d6fe9ed68516f6dbd90135ddcae8a12d1c1595e0edc34ea2bf00bee7ae773c240c2bc1ed828b7ff91a676891173eec1dabeecb2184df9186c3bd833e349351481655bda91bc0f4e419fb78e426de6b39"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #0
depends_on:2
5:exp:4:hex:"64a8afb71975256b6196f3f93038ba8b7a4d7089f7f268134cb3f5926868e4d104c60b44fbf3bc198f4bc58bf1260d123a5aaf8749136a86c4e5aba81692d587133d29d3b7a63fa6204ed84e93be6aebf50472d313ef5797d1a290a7cae086052b57e8d5a20ed22ec7702dd424d935ea":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #1
depends_on:2
5:exp:4:hex:"e5b8dbea654b559f025c008c1f3b2eff92fe98932b0271228e3f4efa3303cd4f112660f48057fc56ed0eebacf559cdd14f523a3e948e8037427e65dd25c1eb41560f2f78dee139b3d721ba1c278c3855aeec3fd3a44a5331c8f54396ec3b9ba73c22da8ae1adc9748178d7d21341f7c9":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #2
depends_on:2
5:exp:4:hex:"abe7121c768208f174ee9e545250014d031ebc647497a60e18e3462517027fea1c0e3854cfe5429bc105916e63a0d5a7585cfba737f887852f23a41039cca6e33de94901cc1aae91ac42db0ca34724b07368b1a3ab733dad24aee03bab50eaaf2acf15c2c700e5e070097132a92ae7bd":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #3
depends_on:2
5:exp:4:hex:"07e570fa7cf079e066c5c30b6d24fd37906ab7aa07b1551be605b31f86dbc3cb3e95a0723e9344922d14185824c483bc5dc8341f10d698629736838fad6a190825a24482413b388265fb20b2a8e7c078b91090c97db01e6c6a72d1c067bedd73da1d7b1575b05870b8eee4343bc42213":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #4
depends_on:2
5:exp:4:hex:"99fa882ea5aa55ec9682719721a8e79d6afeec5cbb3577f1df7fe97e4edc479040efa1e51f8893210c302f2a2a3abbac2ddb3fa31758c8473a6f7c50d98e423ccf360a2f6a5d94f7ec6af04f656ad06d20e2be7e09f728b64f81d736ac3fb8263b0f7808abd5d7b0bbae1d4b3f445957":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #5
depends_on:2
5:exp:4:hex:"75336fb0006f7aad995ae01b3f3ec24cef46d3f7ad07798e52f609ec34b266f1cb51865817281103b3be2c2bece85487e979f3a31ba75d6e6e4b357811b4aaf5fc958406721693eeec21e8c9808ceefbd17a0a6d5664162e7b988c19dbc911b6e3b68e90a1e6a3c9c5a4662d954ef5c5":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #6
depends_on:2
5:exp:4:hex:"f6d7401663547661563e5b2da208f1f8a4a0c17b97ddf0d4a4c1a17c23ee8c7d00d037839f2d95dde6a96886cd67c9a92fb7fbf77ca088d1e46f2dc386e16fb6f1d178f7c1a3dfe202f05d52ca20fe29b8084a9d597fd6b0e53f41a13fcefbb8aa5d539c7b09d8e7b8f687b3df92c606":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #7
depends_on:2
5:exp:4:hex:"98bd225cfaa81e2111f83b4b3b2dfdf3507fe18aa97100062bcb5a1f665c091002fba3d84e3886048f67bc7f06750a19a65503d83a48045cd9b128c56c3e474b7d658fc590348bd9c14013fd20d2df32dbe9f9b73d47e43e58a6ecb5f85f93b3546817134746016f6886f6b63be830e1":hex:"":hex:"":hex:"":hex:"05cddb6391c5c2de3db999426f31238b5d3e14a35623272d6a72c73947b3521017cef377415dcdf09ededc0d34d9880b9c44f28099f270844e58f9a97f7388df83717ad48972036968e63f281fc0abe53135867cace0e427ccab04e0dfa8108d87a0b7cf7be14ab50e59e4aec8d367f54805c534a9ffa2f3686712caaead514caa30b1ca06c668b5f271ad8fd84909ef122d2fabde7b524d42b925a068d0bb265cbd7c6505a4c2c0bff7d47068b76f350fc85c745d099c78bc73f9ea0796381903e0d3512283b7fad05850e1bdf63b9cd52eebfed270f1622f057f102d6ab19c63ed59cf2cc1e5876257ab03e20e62f3a77761da32a5e1c2f8c95bcc7534ee00"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #8
depends_on:2
5:exp:4:hex:"7a324a646b53f28808f7c44303221ab36324d1c97660f7c333b3baa7537d1e1ea038b8ca6c159d91d02f3b206eb927570aac85674b59f419af2660cca8eb0ef996bac65dc33c08a946fb2abb9348dd7ebce4c71cb9de11b8d59aceaee2c9a29b154633df643f3787c2672ea7e789a2b6":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #9
depends_on:2
5:exp:4:hex:"59b84cf5a29b45a3f8e0ac384bed20d970f2b6d89661bbe2af90ef073eb061cbf323a13d0643dcdba902df168ded7b6094e18381181d91d3734cfb4e44cd4462de81aae064a9ae9d156bbb14079b78e2f612c2e0965d15b2563d888e2034d06e55f939ac2345c2638443f83b59152696":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #10
depends_on:2
5:exp:4:hex:"64688640a1d3f610528eabe2948e2eab2b453a8cbbccf58bb02a72b1bb466b8277f2c2f829fec66872cc8d6c03280b5074136e7f3e123d6fb72786fc29d1b55782b7283285cb53c4185801d2d7333b8ce76c1c661c1ef65864b8dddce781f5db520c666fe07fcbe4bd5ccacc115fbbdb":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #11
depends_on:2
5:exp:4:hex:"d77985d85e130fa02ee13b55cc7372c23565a56f588c70154b7d81dbfb8ef66ee861c781fa258019ef91d101367726ca46a60c705e0e3a305ab6a7c5179e6a14c6e7de93e5c95956660ba7357003f08a25a42e9bfc38fc882a063586285eebead74a78296c7c3e8112062d7fe1adb232":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #12
depends_on:2
5:exp:4:hex:"ad321095c835f2c49f3abdd0f9117cf8ea30b237dc3f1eff7728fa9b08d4c0fc073c82bfae1b5771728917ae78d5e22f4989019b13c5f04a420f134d1cfcf1be81408a143e1372a468c1303292f717daf4f18ccdcb81d8c7ac6562deb4e07a9e146900123f39ef49a91e30e22cdca22c":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #13
depends_on:2
5:exp:4:hex:"67569721ff02c3862cefa68283ecb5b9afbfeb8395ae944c55e5da1b21b6c2270f0100b2cf014cef7a2e85dbf2738e97f8ee97eca692130d6541fa900eeef6b9858497faa2cd47c6874590190da6d5fbd36d2a1e124a94311c8508b9f70f34b97c32df3947aa4a0bf197b1ab35172233":hex:"":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 0) #14
depends_on:2
5:exp:4:hex:"b19d6916dd39eab11165ff2066fea53f72488a78eba473a0e141de1d5b13fecd79e678b4b108c65f9c38fb2a2e5c29c4ea9dd450593b6b3c7be76ed2cf8baa1b44794ebef1c1105a445b79aafe471d9f9881be7e81282bec46431b505ca8bc5049da52cd4cb075cc818bb79697b739e0":hex:"":hex:"":hex:"":hex:"abf29caa9bcae107ac382204baa2f46ca2742090a3c895e41b345a6cda8660e44000984173f57e79cc7ab869d8d9f7f2d855b171c3007ff9c82f2a5291d509b6584f04346361de9aa373f587b6ce8cc43d589d876c95e813890c26ceae61bbe0b88072cacd0b857d6b33ad9e562c8e1aa1592ff16cf683e81142caf493896fdb325eef5ab6ef3238cc3eb3baea05825e57533ad8cb707b373d2d0a2c048a07bb40a5a68d14d21a796fa97db06331b480bdc39701bf2298fd3405a42f5f6b76b9f40dc8671db632c588ba89210767bc165ce88accc78424216e357cef52a31e7601d3f1cce1b5b5d71c3d622c9f68092f66787b32d241716996b2392376c48909"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #0
depends_on:2
5:exp:4:hex:"73afadfdf46ac9c528059ec5e4f940f120c19beda8d5b12ae692c1d3b12526754ce532c291c8ce823aeaf923b3be8c438d8b2a82162bce020237440d3445d4ef91793b983202b0f8532be2d78c34469d2c67fea05495feec67b76615967efa6f6bcde5bcf18285dd3d8f9b97b3463813":hex:"":hex:"7172619bf78c088c4f0d5b358f63cbcc019620c6ea9ffa31e040ec0d51665989":hex:"a0670a6df2033cb19b082a3c83fd2eecddd9b9caebf3aed0b781ae9d4ac8bbe2":hex:"38ebc242f240569f792379afe393a76698fd07dc05d5c86d00791c1b9d1d79f180c4360fc8f2e5332a961198d7486750671e14d39a2b4852aede2ae9745484ca05d7421191571d334cd714b9433ba026a058cab5619208f2e54f2d48286e49bd0b528d05785beb4ff8953fe875cd2c92277494f2e315ab2790a1cd58f02224387470bd7edb3181d2b587e5c319a262c7806f8b75e59f2857871d8a182ba0366cd3a968023c22582ec7bad2a204de0eba3d24566f213c1d88ca2b2ca8cafd8149193949da885bd744323f31b39956fdea7bccb1d64d3f14afd03e1755962d9df1f2507098455584358e951f7ff8619f1aab96e1481ede5289224053f603a98ae6"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #1
depends_on:2
5:exp:4:hex:"cd453c328ae68152e074e18b660f03668cf264eaa4109afb941816f7bf1f73cd4043d4692942472482f44e7d6ba5486dbeea1cf1de6ba6ea1606cac41a92e34839fb26b5a9bee5f4f475558a5d8f673d838247ab81aaeeb2a72be405c3d24a625df7476b1133b56f6e7aeb184f73eafb":hex:"":hex:"c6c23cddded140a30079f35cf9e2dda6bb2b277d8a212d2fca1a83b507808e79":hex:"edb8c8657883a17093ffd355e8145e26f65ce7071ba38c89fc031040996a9705":hex:"635a7dbb7ff1dc4a90ce91ba13d79e09819ec7387c277c91946b59fad4bf5d606fa75cf03b6904c60f9a70697e662aeeebc7ba2e6e94632c4c5f3e1686e6e9497945c8889243719ad066847dc11efac141e58ac29d6d2779f702cd1d5fd0d82d232a004dfdc13c09147a77d71774761ab4e760a9d2714e9ffc52402633c8c3020b7b9822b177976f21b7e98cccea4a7eebe1cf9a604bdfa36f19e44cf4308172258576c3615cc26418e86a7269e0f88af7f15a114c5b8c6f96b8be098572aec4129fac371736b2fa0a88f1b5480c7c8657dd515417edbcd902b3d3e9f7e10df45160a37284933dac5fb105da145ff13f677d99c494e279b0b1990234fb8ed9d3"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #2
depends_on:2
5:exp:4:hex:"3c4fed3a265818f6a323b9d52c04a92698223f3136c77428b29e1cd6fddc7e4da48d9115c5ad18a4182df480eddd529f35e2bd1908dfd05964cc3fefe53c38615f04ca5e12c06872a695971f9144f6b97bd32c620083a379d4f56e820105c5f5b0f98539936d05d57f6afdc191cce7f4":hex:"":hex:"7271afbed1b1f2be5643c5bdf0b6218247a6128bfbe2ff4d745a926a3f35d0fe":hex:"00022d8acec09266a84673d056e7b235f0608d15989ddfd7059647522cf3c3e4":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #3
depends_on:2
5:exp:4:hex:"229b3318cb25189e12ce9ef25acd08bf56c631c6058daae6f377d58f7574576a4c0b7c634e11da5ccc02be824e6effb8ebc0d5403d79bb30572be47a5ef88fe35a0421dcf9547437cd3a563b6be7a158a7f601f75347509a12dba8d7f2abc7afdf89c43fc5538318654fbc90c3f51c5a":hex:"":hex:"f8f98c65ba1f619d376d41d1dd480d4a0446de56e0b3dd007ef7e1cc2bb98def":hex:"b3bed7c4c2e1a762209b1fd2ce9ddda8fe47eb70225e60d5c5887a61bdef0009":hex:"2467978b293afe33a96a7291286eeae2b1c8b5753ed4d45b3d5be906cf30a6051095cbca79d2871334e049b729068924a036ea914a5244fc71005385ed6ad7c7cdaabc267a8ef0074b14189763b5de2115d30da70eb815262aa511e9859b9d1cf2810c910bce18d179a0308fed6f6f911cde79031ead39f499ef85f7525140f1c497fabd879ae130f73fbbfe8c3fa749df48e484cc2fc313d234b5d0b49690988421611206059b42f6d72b0e5fde6bc11291b8533a9aa2c521e54749bc1929b71ff05dfc8f1716c9fb13cdad16b35d194a48ae377625300df479d3facd20c3b8fdf18b88b57753065e542f147248064278611e99ab92b33c68aabc4da08a49bf"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #4
depends_on:2
5:exp:4:hex:"4cfbfda3fe8ae7ffdd8450a52c78388a6c9d93c6e3ab537c91dffe23b5693158b7919e875d9ed6827a33d5ec5bdcf061c311aee36953d13c16f0e50f455705a9ab7a436b039551187a0f42e5f90b40cbd44e98cd5295550cc46e33be6f073a9e6c02ace6b0f896f9ec56ab7e8be7a07b":hex:"":hex:"9d155d6754ddcebaa3dd28ba27946ce3e22de29dc1db8359378390295e5aa287":hex:"ec634fc86bfb45f49a1197a70875d7addeb257f1245375aa1f01b3bc359ed73b":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #5
depends_on:2
5:exp:4:hex:"3351a083c1f6033be5cc879eaf34e25542ebabb2671b65f726e76ed711ae073e9bd7ef6d7888d6fc31e51dc7f60e8b07cc6fe94ea0f22cea1ad54ffad09700596f6320d980488ad48527f4e00937b6f736ebf1b9166e20c5b812c8b85a2a29d91ebb021b19d2374ed4e2895d1518e6cf":hex:"":hex:"9497a1c85796846de8d8b70d66d369ef59bd91203660d6df2935000e8bfcfe71":hex:"8a681d6cbe1cda5e0f9eeaed12fdac75b7bb33d28d6855d498b6c61cd7ebca57":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #6
depends_on:2
5:exp:4:hex:"3439b57a2d19db8b7e10ff9a34ac1d29b8d789b05f4cd2bcb0376c6e184cfdc695c6e26a0b15b11a685438f48dbd7433d63119fffb5e317d97a5b3e23fa6228221caadd163b66e36e41d1df89473ad3a114d25c8093128e2219a7f2206621b99ebe673bbcaa9a369aad3339927773b57":hex:"":hex:"dd1602f833057b77a8c763ec5aa302326920bc2dda46b4b83b3600673c1f4627":hex:"e2328a109a4546f4311bbe3decb53b3a1028984ae73ef8849bf682ec29c9b5af":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #7
depends_on:2
5:exp:4:hex:"f7c4995379079e036b9b10db6f163db23bce7399fa8b6268099fa5f2795b67ef06ec674197c73fe47eaf0c4986dd3566055eb14934bc8d5272baa751267c1dab1d52da6204ace6c869bef56eac006abe8eed565693e1854619266d400cd3f70222b6c671120173fe918d229d5e566886":hex:"":hex:"23ec7d6ba9a666ab49df45eeac006ad1f4f0e2aa4da2061d0429b510ea43d93d":hex:"299253ffb0481d2a1dc2ccfa666123a3bda652666a77b52a32e4cf92a65f0d61":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #8
depends_on:2
5:exp:4:hex:"376829aa929aa4fcad37b41f3a23bec28386329ca689317c49bdc2beccd5066b92e763dbe8a80fa1a1d21c38130fd999df05446bbf128bf23834d8c7cf89ceb5ee6b21124eb6d4966f0f5cdfa59ef58592dd2deda2f611b6c1ac8ea1b1dfb3a51dc5760c3a7e82fee6f09cc2b7a74d7a":hex:"":hex:"f14c07e0ca886373c563ca544c3ed069de697c538afaf009bbfbd935995955f6":hex:"4d71578fb5a3211d3bdda82396507fe5193d21a2f70e6c2b03828fff53f5f6a4":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #9
depends_on:2
5:exp:4:hex:"981da820fa53e7184a1a214a114a943953eedb39e5bf2c3aa7028aafe57e482bf4c0dbdf862d55afbd0f0a97f6c61204711b46a8f5d1a69089add789f39cc3d6dc7fd19af6a630f03b1496d84aa83f1eb24c0d354407fa9664ee5f4c8de4ea75f05a17621aa9dc58ef38cdb9184d24b1":hex:"":hex:"2f4d6b4724cb715b0d553ae1ca6f3055d7c398c1c031a3a69946f099116d13f6":hex:"76c1d679786f1752bcde1108b9977311f4af9e3d5f5fb9eb52565d0eff90b4f0":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #10
depends_on:2
5:exp:4:hex:"909f30f7186bfbae0615a701e3fc362fc6e8ce42162cd16fed11ecff70760d7d0679e0b79fec33f83bd722f2bca339e791e5db7af16fa629c84d1f4778d1b1dc24c9813711507349c26319e18084755cc392c9c2f2241406ebef3985a4ccb46b2d7c5f8b79321163bdfc3b5e21eadc89":hex:"":hex:"1fcffb9b047f2e904899eb6aa815b2eb51ed696db2478118c4225b7b308ce069":hex:"becf0c41d3930f152260e0e6f06355bd0c1701b81e699fff7d8e5a750d57b980":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #11
depends_on:2
5:exp:4:hex:"9586ebe27de089218433143fadc74eec6ef7c8d077536f7ecb62d412ef0e163437f6d84e8bc6e97ec02097815a99c338c8f3434b286ef26b1c234ebf1bb1d216b14b4c3b3df48ac3283b3ec9e50c9124a717eb398941ec0801f95ba6108bd9f89d9fbd72d6248ae50961354280d92df3":hex:"":hex:"65d08da7a1fc390f2400efb57520e16da932bbd328a236163c40a540de585488":hex:"a1ffc217e71d1f1047a9657d61ffad559da3ebb75d5af74f3a1ca9fc5b964f76":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #12
depends_on:2
5:exp:4:hex:"90b824b7aa16b4954d99c3fded669a83d67460ca2fa861468f0ff6e8ef61aac7eff878ac34c2bc59a14dac9659cb558b11989f8e34d1f27c68ccd71f45f7a848c94ced0b18c175c7e1eb50fe0204cf630e39ba3deddeae5de4f2c3d254d6d9a747f486e20106f5a6d7b05a67fe474e57":hex:"":hex:"a76ba2ac232a282b3829d9442587fcff4693350232e976439b5b9dcbc1b704c9":hex:"06eada44600f5d5eeac046e16cf576d59c1bbe6c608d7684453f353a644cd031":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #13
depends_on:2
5:exp:4:hex:"0ad0edb50bccfc0fb68b5e7b5edf8ca338e5457cfe44af3fb5d683db120c6a09b9907dccf135c5cd0a97200abe245e144fa70365cdb06dddd7b59a557831ec9c3ac14b3de791421cbaacc609bb7659c4e178a7158d7651369655f9c570674fee2c5aed961f3c6baa0a092363b388add5":hex:"":hex:"f9880c0023486c8c8dcac2b40100a6e2bd78b9289e20a72f4cbf46fc156619f6":hex:"f5bf191309d298ce4a39daa668d8c99935df9ae31f5bd1fbe77a3682858d5c0c":hex:"febefa9a23eb4f236d1321d9abedbe0bda5de6fb8ae4259512dbe3f4df7e006e571d8b55db6a438de63917a2e476435ede5af77630241e7a213005f205d3857348b8282e790972e4a5983009e052cbc6bfd00c08306d346c351f32a7c01e5142cc65d5e951fd9186a098f6f22a5e4d5abd80982d1da86c39b1529e36d2341e18859518a425cbc198e9dba895591a1ae395b148f033e1375903fdcb478e8438e0622544d6cd990e5a4633698dee50a623a2b7d8596ccd647db9be1c2e6f383e5316081f2c076dcc98483279e87594ddca5ec4ef4f9f52439571f671087bba02708af107b771cf59bdd38f4f5b6c36aae8112f85a9b2828e048988bcec68098660"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 0, 256) #14
depends_on:2
5:exp:4:hex:"0425754d1610c14f6be928608ea3ce731ae818b200c54341aeb178f69e145fc6bd38473928da0d3638b0625d06f6b94fa009d920238b591c97ef48bdac9021fd85f19ce809a9627183e3b621036fd7e3bfe1dcf51b07ad45ea924e2d933f15c1172432b359ad72149e51e86e56ba7768":hex:"":hex:"f746e854338d81d89e81ba3655eac565866b56b2faccdc50a36156fe2faa661b":hex:"06e81c2ff61b7c7e51f5238babc38887bc10d5fecd86b7a6d7c48baf4aa5adcf":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #0
depends_on:2
5:exp:4:hex:"d7d2a9a0b97f4564e05de6db7bf170d2a726e0f5eb2970839c4a0c686ef372faaa5d8afc07d7e9a44904fe9f7359d8b6205c7ce06021f5dd60656247503694960c78aa5e3b3f5008d48c6a264bb94e1c2950f734611e3e10291cdc0199ab9000a9c2eb74081b3c2cb4461ad6406a38e7":hex:"db994880895242ced06eb29157756b25052257bd49ca08c7208d51e7b0ddeeb7":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #1
depends_on:2
5:exp:4:hex:"82037584f80266988ef6d15fa6003478c20d33265530c1767e3c23f0a0a95d61c9262c26dbd37083066bacce5f93dc86e2cb95521fa6dcc9e4d01c469c4a3fee33579c21058975dd91f9043d5ddb154f5390c4ca2c813938a8270b954a7c7197ec382f02c50dd19598017d2abd1e45ec":hex:"52a6cc9fe891945e5039e95271ccc44ba9ab57f62086837ee64409d0fcaf1973":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #2
depends_on:2
5:exp:4:hex:"5aebe22736577e69c5027cbd1dcc95146f8dccadf961020cae23562d70e9f0155bfced0ce2053114972614a45932eed8a6b4f4e746d8d9e8b25cc9d9fa67ee0b15cc5b3e3a2e4371a448c9f6bcffacb8a0a8f2c05e8a3a0abfd5d803a77a80fba75ff12cc0649af9bcb94fa5ae2edd2a":hex:"3422191ee68de00c779434aba239e3cd7ad535c13d118bb226e1e013ea6e9511":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #3
depends_on:2
5:exp:4:hex:"f5340f1fea08877edb309b9b43228f11dfca26f340fa433f0b18eb9e6e07ccbe96f7a1d745a9b2910e21bc9522a989dbb2db642c5e4b2d59ffeed6c9e667b378588849338b385625f03a226389081858e86a222876f18a0d7ff69d0fede620a83caf254eb9376dac8ef99837dc491dd4":hex:"98f5b7af38c1fbac43fa9cb358bec11923d103720a73591de2c6ed245e86e028":hex:"":hex:"":hex:"5293ce6891b5641a33199c0a52c2b5ac46b261ed311d15a6eaa8df6478b217aeec221d488af74a347ac9a14d51e07a239c2a52d2db6d75dcd901452fa3b3403a15c449c2f1f9770501fe10884ddc3ef6db2d89ead176dd9d240446b5eaef3737666750f56dcc4370720419136b0e6268efa538c7468f6b21699d68fbca51a3c941df46fe9564d395c54d829a681864837fb2b6eeecc994478210317d5908886f6056293d53501a726cf4e786c6294381fc4af6e1109186759ec90999d8a21ab09053938fb545692ac03c776803868134c3e4f7ed87c9284cf16a7651458d7e68b625272687944e2e6c7ccb4fe8e003abbae93f98f694a8385a295c336b5a404f"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #4
depends_on:2
5:exp:4:hex:"82738d1234a9393fab94ab99b841371f7046c6852bcdfce1b2d56825f5c58786e599005a8a79a30d89a4251d3a797cab8b3f30950b9a15d686f1259a11a516d399551928cd3cb5734c7839847bd584c364b95b8feb390567cb2ec23746543ace1371a089ed97f9968e83e75636203574":hex:"3fa319b90a1038b544916123534aa5cb10f4da16cb12c3e00bc1306423742bad":hex:"":hex:"":hex:"9bba6c3cef2838d115f1030925a01db7881df7e7b5d461a5f8dfa2a40795322df746a25ebbeff272d064aca9ae284b50b6f93fa566ea519e712c82f5ceb481f2ff873e73043352c7647238fe339336cd7aa3765882429a09293267613e29bcce17535efd1cbdbe5e40bb21bdde402e6ba7d554b30635d05f581dd1bfef0565c3f5dedc8210b5a01a10b58130442e3f8eb11b9a40e599ec8d5e1089ef1f5e6587b4120d1fc39576282c80c825e6e9507a0ceb3d0460832ffa079fb8492a3518f27f09c0bbf06f6ec00d80e145b5e848b688418419cec8ae52cda766da84a856f94a4bfbec26a97e2810fb1dec3b48f285fa4b0e2794fcd28455bb178b3d55340e"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #5
depends_on:2
5:exp:4:hex:"e554287587131cc3297b05c8adab4610cc3d1634eab65119d8c546d13e9961594f9e6cc618ea0d782547d54aae466fa243c2265aae6d575f8fe22edcf71b3e77fd9f9ebb11c9e2e81c70abfb193239adb73e4fd14c93bd84bf79c328a86a433427b305a6425dd5711d83006dd2db95d6":hex:"2a5741cd93041be381636c081f44a9410647961ce5265211ba69e09beb6e5cd3":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #6
depends_on:2
5:exp:4:hex:"ee071e3f09552a53b8bd98d9e4b4b460577bae8629ca6e8461111a1ec08d5188654042148dfedabc409caeb5a03b26e422113d79729e75ccbe2466ae8197cf8ed14dd2a9382596da6daee3314b12ba42cd9ed90aafb911598d1863c9a72625d0ba9d711d1fd3dc462516a6b6286644dc":hex:"fdbdc11a4f71667bd1561e87ee34d925b13d1e79967fcecee8b2656f04d6d379":hex:"":hex:"":hex:"acf342f6537c1c3a8f050359730c185e2beaaba5686d2ffc0101e3eb2b153cc80ed5e8404bc849e330e980c0c2ee5df6e630b0d2e28ea50f9f8c06acc0c880304e321ed7205e673e4bb44ccf12ee27bc6f168b636d4297d53462db1c4816ac5ad684e532f35a21ccc6226dc6481d649158e75a6eb012eb95ff4b460b41f8ee1335fcc43f0cb9b5ee76a471283ffe0880e5cfa2ac200b18149712aa10b76fe3850dec22ef4639beeed69f01a4c25ce6110a2eb0a69c479c97a6ff2be4adf3c725511f932f86419ffffd0306bcba149390e1d30679c4d70d15637665419d17e508c0509bc4a1e73448c29df6944c00ce8e32ca8964418739734e8ba0aa4de20585"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #7
depends_on:2
5:exp:4:hex:"e0bc8c0b53acd8cf5e4c87ad24455bc34d456367bd2e71674d5ac59d0901a07abb52c4f264b0607bb8f1ac0efa4f974947bad42b482868d84208f064fa27f465865b910d8e536f011097bc0cfea07a934ae5023ac7098985c4e1e2d173bc835f7f6fca3200e38482a36c871386ff9b0d":hex:"bc98fdca1133a21a2b4435105b1f96be16333f5ecc6618c54d28aab599b79549":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #8
depends_on:2
5:exp:4:hex:"9c61a730a0ab38830f36a44181988afa24fa5de5f298db058fb4a3443d3b71412ebe35851a12f942b7fc379ca1e14c6319cb485e125dde2482c5632976a2a9c11221a9fb6e65bad990a5b77b55b2b8623a5509cd919819e7f8adb23a99b27c2d05fb6a3fb3936d5fbfd44cf2b24a7a87":hex:"a60b8962b18d686ea141e0f4f01572a25b69acf19740bde9588ea63a11e904ba":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #9
depends_on:2
5:exp:4:hex:"e3d186a9a4d9530906c58f9d1f3b415d1b60e2f12ca34a428d16fde09c700dc5ea9d104a92831936136691232ef64c887b71383be1523478c67387441c67fd7761e9f75fa0636e5a3caa845219f3582bddbd0017b9b95984cea6a3ddbeb0820f4f55ff15e22c00e8db7dd8fbea8f6526":hex:"c33655a0e2973ba13785fe4edfb75749d84d818752f7658014448b7719982726":hex:"":hex:"":hex:"e002203e9dcb191c5c0c3ca2e143e689ca9925337ae04c29547a56d4144b2657f826742c2af60a2ef56b4f76e68ecd423ca04eb79e92473c2b2096072918a2390b5e1ef596ed6a4302c181b03257f9defacd58796e10b5601ba9a1be767440ac0aadd4f647bbd81a084bbd8bed5a0091892bafba61259a46cea95f7be6ac76492a52957eb62e0c96f5dc74dc3d949e74310be664cc21b9c76d39101b76b7130f2cdf444e07bdfca000819dfefc2eedf897b1de0ab92e3d04f6dbe9438c71115e5d14fb663d712027be4c1348cc3c5c30bf8dc0f7f5a2456159a542e58aed5d10affdfed5b6eae77f3af607354ddfc4f1d7afed90463486f60dd9fbf10b32f6bb"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #10
depends_on:2
5:exp:4:hex:"38eccee965505ba5136a8ab868ed1e741d343ad713075233bfebe196fcef6f4057a21d8b2d6c68abdf52633d54d9609e87542efa8f4b46f40a4e60a2dbcf3338138d46c1e14d6f752954a8fb992fb0260ca8890300556ca7092a7661b65fbbbf0c56e2d49875528aed1ebb0133f13c55":hex:"7bf2914afa8ff9c3b384cb495d0a08bf7d8f0b7198df96db7371dfe987b2b73e":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #11
depends_on:2
5:exp:4:hex:"19222f7886766642da4a80b97b9ab8b157b58ed63dcea2512f088644791475a5c6a33a2cce394d45da2f84b02a0abcaaeca4698d50d5bda435778b808397315654878e866ba0136f9c4e206f7749b60ded4198d69d1d077564a894375291991eb125d394547d226c2da17e8cd98853e1":hex:"af34763c141bc212271d52a260c6d6d40e9f40a8a4cc3fb7ce6359bc71941f89":hex:"":hex:"":hex:"5914df97ca36accfe40009f033bc6cd2195d0b1d354960d152157f2b868db4cbb736cdd0f077f230442ba0101789c5cc2ac727b0704a10b41c87d79c8aef748567a2eb6e61a7c499a6a1cd6a9d958cac18585b2e697dae4ff92bf913480968f3b2b8ca2e0cd85f1d9303e3a1a3830a30d6ef0a1e02c682958fd186e1be8ffb2a4a69d34bcbe617c3ecca0a77d460e3782cf10143df34adeaa7cf74d1d86fb1ed35da217f00cdf27f1637d2a188c3ce7ce6cfafda3adef4463a0e7e668eb1268ada8465ce909f368a0b12a439eb4d43a87cbf98f83a4f8c422ac90851ed081d74f212c854522437b2655959c081fdc8ca2945271821182691f6ee5fa0c13dcca8"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #12
depends_on:2
5:exp:4:hex:"f314eba7451a0b721622be298659a3d253ea5925f5912196c62ed149daa11e26cd94e8e647da38bcbbeeef1da21ad92e0b9a5f1ad72826bf55097621314f9859f8f8d4d62cc9a00b3e9d95e996509d77413449aac8f9d8b311577a083f80364ad1d489262058aa11ce9fd3dcc6b1e4cc":hex:"f8b1e97ec680f637a4792a0d50fff9a0edb028619a9dac05b8ba6d57e55a1a4a":hex:"":hex:"":hex:"93db5a7ed48a819e9a237ad4eaa33946880ae85266418a264ec17b41a8c97c16c446f91c6d901871e70b6d9c10aaa07077c1d40242cb7c5cb89a137094aa81628278b9e453d7f0f034724110acf8a08fa244da256bf3e41960013e70974dc8c228218cd88ac4d7448bd13a4343866b656b16aaf42ff678dfb960523cb95776bfadde24e16ab0070305e084cd970093fcd08431b815f85fdc4f6a43fcad105965b6fb1661c7709a166ae6f3d1fb463689f752811fe7d6665689a06c60aae8a051abfbada40fc602fea2ced51aa910c09b78d97a4e85242c3d206cf31ccfee11c5dc141ebb5278b55de7e7aa9a08048d5cad072da32c449bd0dad2f7d6188a5b9a"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #13
depends_on:2
5:exp:4:hex:"841cd7bfc5d87a0fa624f474af6d8ae9f2b5a1426cf1b752ddf11f792169f2f2c0b60427bf62df1b373302d91fa8dd891fd7542bf6425a7308f64e96b0c3e372d4addc747898731517a418210813f6f14d56651b2599bb2899b109b9c21367126ed5bf099f455ab5b67f47a1a3abc3f6":hex:"c35726206d18f9fd3b8423fa9ee2fc5a896a013a95d052ff495b9cc6759d58f7":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 0) #14
depends_on:2
5:exp:4:hex:"dd62ed0d54d930fed1cd7582e376ab47da3138f77daadeda32fab95bf881fe90d9ab4dc5b1cf0641ad966ba1761aaedebad9ebc3f3b24688e16251c409267bec9b02cca6b8ea7969a5991ef647fdbe28d3126c505bc0d9f8241fdc49e8674ffd6bbdcc5f99c6e20d4271b4215e224156":hex:"366c8ff666c2b42d735dcca5c0b12e352afa483d48d57c908b5263ad3d2affbe":hex:"":hex:"":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #0
depends_on:2
5:exp:4:hex:"3aca6b55561521007c9ece085e9a6635e346fa804335d6ad42ebd6814c017fa8aa7fd3c3dd5d03d9b8efc7f70574581f4cc19fae5a456f8a53a656d23a0b665d6ddf7f43020a5febbb552714e447565d637386b3ab33f78fd9751c7b7e67e1e15f6e50ddc548a1eb5813f6d0d48381bf":hex:"4bc9a485ec840d377ae4504aa1df41e444c4231687f3d7851c26c275bc687463":hex:"b39c43539fdc24343085cbb65b8d36c54732476d781104c355c391a951313a30":hex:"b6850edd4622675ef5a507eab911e249d63fcf62f330cc8a16bb2ccc5858de5d":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #1
depends_on:2
5:exp:4:hex:"2531c41a234821eec46f8aa7dae8e3ae12d167d289bfbfdca928643b343eb951015c066e2d278ea39d2a459e6434e234e55fa1145583ede74e632ee8bef2a2ff76ca3b8c9c977a5813c4041f3f9328be6c67f1689d878e8ad61bfe6a39f5b034b75c40c9b305c1eeb92a3f4169ae1720":hex:"d1952b7d0c4c94185adc025e67a29fda50f577770115c0931bfb03e8101d1d3e":hex:"0be3f61ece380d63c68ff0d4bde36f58233358ce62c7bc588728cf1babbd4342":hex:"01e76a0c9addb4dc2001bec231b72e2098a6e9e8d39ada13ff0c493aec8ba65a":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #2
depends_on:2
5:exp:4:hex:"4d65ff2fd260eb6290b02b1fd71cffec840cc01807e984f07da64e6ad80ad37fb5810ed012d2ceec3a0418003a03343502219bd422c08e0321bbb86d923bbd04082f939ded421657f929b37e21604a2668b57d5606ac36456da916df82a8753d224b4f7c829d285254e9e851937b54af":hex:"d75616aa0190a56af573e43605157c0e0d5275bca959f2c75d0e777943b200e2":hex:"954fdc652d0bd8eea37342f5547241afb67f8d4c587bc2402c435a260144acd1":hex:"ed07fea3a07e8846b4c3aae8cec0bf6df7c8ba7817e3e9699943e2d2e778c4ac":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #3
depends_on:2
5:exp:4:hex:"313680a6ef5cc85924575195608f3b9cd852004343ab708e89d61c24696246166b0dbcdf61c59b0041fd2c55a829c99cf8468552aabddd993687c2b4a6017024c41100510ee10034ba4f66563db4d3388a7f6d475e080faa23ed43c674254bf9ed25f73109630647fa3c85575727d2e1":hex:"cda08cd76f3bac2c30bda2069a1a7a461f2462ad2b2ab6a727da6836896a4d2f":hex:"431c4fdeddd3da1de6fcf19a25d74af811f72fc2367a7f33cfcdf17cf38fcb6e":hex:"4750344c23e4686b2bfe2dbd9301705d06969fedbc77841bf6591540aebfebd7":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #4
depends_on:2
5:exp:4:hex:"95b698a454070603efe15cb4c359ae946da756d124939f916d67d77aaa0608d8e577b5f5567ba3c075128b528a6ecbcc2ff6d8d15ddd68039173c4b70df3651f4cb5ac62957781ac91563324a56b47409b02699662f68022be2d93eac367a21026ae95ff0cba67a630e4bd8e53469215":hex:"de401ad1d2c339934a47822421eba0fb79c89863d1df0ef5d47e6be5bb3a8c48":hex:"a002954ae5f7676a3230533dbdf59252ef051acc76574bd519ad56882bbf46e6":hex:"5e3de2b53936a7890db7248802bb95e9093d9d7a15a9378d8f4ba42c52e679dd":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #5
depends_on:2
5:exp:4:hex:"d7d3e83dd979bcfb524074f12a90f78873e983c2aa90e0241f00d2c691a4702bb452dbcc69a7793cc2081b984033295c4435495713c20295aa97bf42babb66edb4856370b9701020a8a79df7381650fd7a3aa5ace4bf54b3331a8d4092c19fde08cd51a06146cdfab9e3a32e5cd02b35":hex:"5612ed7d790419dceab4befdce6e4e687d335a3aa972d8809db6291e3001f825":hex:"915028d0610160a2516e926f06ed34b18ad1064b6efd56566494a92a3fa0eea5":hex:"86cf5bdf061711d2361ab6d79c731c2fcf9aa47ae5bb5f6294486a14081b1862":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #6
depends_on:2
5:exp:4:hex:"c1e64b99394e1241b31ffb7b482cfaaacf5f2fbc251f954e7e3dc0866aa81856a16ce83d9ce70b71479ae9ccd6c59ea4e99986d1e09ab16eb1f48b99cb9bc9d63701f6a9a1af0b1d8057339d5d7ffeacc8e5729134ef2148663227e348dc31b9d56626c0d43478d5d53bfe998fb85b1f":hex:"42be743f8a9c0187d2d54b596caf64dfa630d60bd8c6de0b126d6a151d823cdc":hex:"e925684793bf51a8a4a46c2ac5b91ed40843efd0878336f983f1001722231f1d":hex:"df019e78efc5d3a85fbd9056ad05f97de81be05c069b32e68792ba8f5a775fb3":hex:"cc3df6f1cbb0e1bd937e64b2d8be12c07cb256369040d834037226b96e4b8e7232c2abfcbbdc0bc2c432414845c5ebbc35fa4e903d5df19aef62dc702b20d0346daf20caebd8819df9210a721be34d9df72603a4370c0c6a653979d19282505d64ae09e0922149759ca0f5324f665eb83ceaf6dd46771c520b96885a8503b6be333ef6aa8d83d370edf100edb13b86724234442a15cc23f89359f629a2a15b645c2510099c0263d25e310567d822bf03aebbd4bac392b999414bd013fdb00b4fba8e30afb17f50145d11302d71dddad30ce6678fbede83e567a97f4deb3b1759e191319697efd9486f2b502a94e01c00a9b5b76230036665fc5d87f8c9e2fb4e"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #7
depends_on:2
5:exp:4:hex:"071b46d52085a658309f2c35bdab443e1509aca159c1fb9c222951affaf1a243d0bdcfbcaa247fcb8da53fed8e5f8b3eed2fd022c96bdd6e86bff89beaa99f2bc34963d3ef118df9a5525a910c9540aeac5166f65f5d05c6277260081aa9b71ac58cbb5f1ba5000d4d8078c5a30d282c":hex:"7ca33e3345bb333a5b1f412a6d57f8ebad65b427ccbbd7fe3ac837691da39219":hex:"60efb3c75aeb2f4fb208659f20e79eb41d8d9b422066c235a14b9420bdf6f172":hex:"4e2675c8009b5bde9882ce940d42daefe402fb11379e07db9a4c0c763e97f319":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #8
depends_on:2
5:exp:4:hex:"06c7a8a74b6fe9e14fa2475ef8b8a1ff9610bfc1b4b93cf53a8c844d7dbac08ff743ea1bfc6c10d7707b5172a29af054491b573dc2cde1a3e74262f4fd2e9ec819ecae830db4f0c7021028737ffc5bc025a216f658065e27314c30c04925051c0d7caf6ef440cae263f49148c0398007":hex:"1a33793d255386d47952bfc1f63ec15caff3603d5c28b2acdd799673affab589":hex:"7eade98e717aaa32f74b033163ad76489a7d682783d2db67b9696ecc7b9be57a":hex:"58369a241166bcc87e713b28b4ae216a8e61f8cba83969d42b91e55283286af6":hex:"7bc84544b68eadac9cf1ca907d9166e094844b396e5d54672ec88dac573418125d50befe1097e2f3438aaaf3f13182ccf4593bddd52d6a41a5e58f267c6f0817d8d1ce3327a611f9fc591ae64c7c18d61958a598e0ec4383e25b46dfd34db10f609cf53ed76c86116018fc8e9027aa2f0b0fb3f22d6b86b11311daa5e78d1f4105ae4ac67f63707400b0f054b6f3d71f26ca5d463192952fb39ae00326db9cb1dc028525c31aa9beb7c3d299070cc3ed8279b8ca32940b21273afe8016d8069a577acdba6bf6d2fe327b2f6dc9c5c7875da6c3f584516db0365d16670db6d90cc1e5bb5309ce9fc8234326ddd68706e1d76830202cdba770bd40046b751f3c15"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #9
depends_on:2
5:exp:4:hex:"d5552efbb7f33481a574589c4bb56dbe43000ffe9ea67fd0c8d5638092c8469944a150b0dc1315ab0484976b128ccc961734d226d66c77dab3c22558ff2225e32191aa2dcec8e47a56f757f71c081acaf5df357c07952cf6de2e3564813ded982f72069ed1bcff6b48ba4b4625ba247b":hex:"345b4acb2b0cac82139fd516ec3d39292438a916d2d2c8e97ef265a1192a65a9":hex:"732451ce7bf5acc84a05de3474b622d07bd3d01eb6e3724538e454c4d669a994":hex:"7c7ef660cebee96b425485296a8e88c37c66e385eb1cf7389a95c46fa68a34f6":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #10
depends_on:2
5:exp:4:hex:"bee5dd72828806929757afa02a92c5c54d86c5015047379b717c6608a71239b15255de5a2bd27e9c6ef23046c8a8217bd89744552137b24d93e5ed41250ecbcf6ec77734fed7a40680e801ea277e8c6eae57b4328acb1e1dfa04d0b5f799ce1e2f111c3fe8c9f954fdad6aceac7d27cd":hex:"4c3c54284845fb2a494d1e452b2ba1eb0d3456cfa9560ca7c60878e8458eb7f3":hex:"a8a333527a2158a087879a6f950d2af8d093c4f67945a140549a5e93e405b886":hex:"bfa0025ac9774ac767a4d3810c27a3c8e3e48780cd0597a5a401f6c9b0067e7e":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #11
depends_on:2
5:exp:4:hex:"754e542dbb453f10f41e1361164f5e1ffda67a024ba26701cc86066caf2f9477a074690faa069cfec6fa38d8b2506aca34fd27d66708876f28d8ac08d28eeefcb728fb6226559d5a0646a8e183807a8e08469cc5535712a4426ddc5a340b6c71607ee1e2df489528a266b141d7c977ca":hex:"3a9193fbb67a0fdd732a788d3ae5783de84968794b8c4c0b5ad4de067a5d1fe5":hex:"034db3c40c2c181cb4d635aaf08f05e724f418ecf7b3d2ba6863e9ede616857f":hex:"50058bcdd53c9d257dab7846fedca4ef99ed069604002cf58ab27014ca7100c0":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #12
depends_on:2
5:exp:4:hex:"42824bd8944f49479f07cf6af8f02aeebda3ac074ab72a9eca8850c99b909d081f2382d4ecc9e923bf1a588f8db10bdce61c6f452c8e15c0f003d2231ce5cb69292ae1a37c602aa889f0d56df049717bd99005ff353c08eb29ebb8cee3aafeb52b3867a61a76335d86c2d7808ac94bba":hex:"2b573345c4fbdb8382bbdac1d3e2c38fbafbcb599c67412296fb6912e1a640ac":hex:"a5f43abb4634bedf1b199dcf6394bd3504ffa0cdc151b4e53cd0772d86a43f60":hex:"a2f1ac52ec46d93b3b944055b7205da8fee95c9a3241418cfbdfb0e9ece9143a":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #13
depends_on:2
5:exp:4:hex:"9d899a56a0660f18b98c921b0d409550fc225ffcfb975e9ec6b2315bc9a1eb3f68fc77abc3452380e30ac761a20a91565f5ce875a82ee08a46a1fc5d4aaa8918fb23970428c863dd1b24606b0118476b150f7a47f3962dfdd8ddec93fc8f82df7cda58cb3bb5623610eec69bdd0722a0":hex:"67bf61b3eca94013fc165b110eafcb9126917a0ce7e2d9bdf7ef1b38bab6ca4b":hex:"db144f531cee5efadc505f4d37a6e5413f638d46d419fbac76f81ecb63ea2809":hex:"d737b2ba62c1ec1c766f30a5dea7363b5c570c1e7a33fb65c3fb89eab41f748e":hex:"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"
HMAC_DRBG NIST CAVS 14.3 PR True (SHA-512, 256, 256) #14
depends_on:2
5:exp:4:hex:"ae767959378e9f031c8f68d778cfc0dce1f9b4cc176c5f9f9f4c9c3aed9435f482585a0711812c3c79bda619b942c6eb8f5abbe8540aaeeedeaaeb52c156d07d8669179fc6967884db69c17186cb8fc96f2de9b0ac5922ab53c595df1e3513bb3f2642b458d96e3782dbb975a8b4faed":hex:"830f178cf5f544140d2d8c0737790b97bc6f150784865548d73f1f37a5a39a65":hex:"cb12a2b9a02aaaeae4c7c76cad9e006186d978bc046c1ea81532bc51601ede00":hex:"2d3dde3b3581b863e1590bdc638c33bfd170555445e225f3a450d9e9762abec1":hex:"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"
| 207,160 | 1,201 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_hmac_drbg.misc.datax | HMAC_DRBG entropy usage SHA-1
depends_on:0
0:exp:0
HMAC_DRBG entropy usage SHA-224
depends_on:1
0:exp:1
HMAC_DRBG entropy usage SHA-256
depends_on:1
0:exp:2
HMAC_DRBG entropy usage SHA-384
depends_on:2:3
0:exp:3
HMAC_DRBG entropy usage SHA-512
depends_on:2
0:exp:4
HMAC_DRBG write/update seed file SHA-1 [#1]
depends_on:0
1:exp:0:char*:"o/tmp/test_suite_hmac_drbg_seed":int:0
HMAC_DRBG write/update seed file SHA-1 [#2]
depends_on:0
1:exp:0:char*:"no_such_dir/file":exp:5
HMAC_DRBG write/update seed file SHA-224 [#1]
depends_on:1
1:exp:1:char*:"o/tmp/test_suite_hmac_drbg_seed":int:0
HMAC_DRBG write/update seed file SHA-224 [#2]
depends_on:1
1:exp:1:char*:"no_such_dir/file":exp:5
HMAC_DRBG write/update seed file SHA-256 [#1]
depends_on:1
1:exp:2:char*:"o/tmp/test_suite_hmac_drbg_seed":int:0
HMAC_DRBG write/update seed file SHA-256 [#2]
depends_on:1
1:exp:2:char*:"no_such_dir/file":exp:5
HMAC_DRBG write/update seed file SHA-384 [#1]
depends_on:2:3
1:exp:3:char*:"o/tmp/test_suite_hmac_drbg_seed":int:0
HMAC_DRBG write/update seed file SHA-384 [#2]
depends_on:2:3
1:exp:3:char*:"no_such_dir/file":exp:5
HMAC_DRBG write/update seed file SHA-512 [#1]
depends_on:2
1:exp:4:char*:"o/tmp/test_suite_hmac_drbg_seed":int:0
HMAC_DRBG write/update seed file SHA-512 [#2]
depends_on:2
1:exp:4:char*:"o/tmp/test_suite_hmac_drbg_no_such_dir/file":exp:5
HMAC_DRBG from buffer SHA-1
depends_on:0
2:exp:0
HMAC_DRBG from buffer SHA-224
depends_on:1
2:exp:1
HMAC_DRBG from buffer SHA-256
depends_on:1
2:exp:2
HMAC_DRBG from buffer SHA-384
depends_on:2:3
2:exp:3
HMAC_DRBG from buffer SHA-512
depends_on:2
2:exp:4
HMAC_DRBG self test
6
| 1,645 | 84 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test.inc | #include "libc/calls/calls.h"
#include "libc/errno.h"
#include "libc/fmt/conv.h"
#include "libc/limits.h"
#include "libc/macros.internal.h"
#include "libc/sysv/consts/exit.h"
#include "third_party/mbedtls/config.h"
#include "third_party/mbedtls/test/lib.h"
asm(".ident\t\"\\n\\n\
Mbed TLS (Apache 2.0)\\n\
Copyright ARM Limited\\n\
Copyright Mbed TLS Contributors\"");
asm(".include \"libc/disclaimer.inc\"");
STATIC_YOINK("zip_uri_support");
| 445 | 17 | jart/cosmopolitan | false |
cosmopolitan/third_party/mbedtls/test/test_suite_shax.datax | SHA-1 - Valid parameters
0
SHA-1 - Invalid parameters
1
SHA-1 Test Vector NIST CAVS #1
depends_on:0
2:hex:"":hex:"da39a3ee5e6b4b0d3255bfef95601890afd80709"
SHA-1 Test Vector NIST CAVS #2
depends_on:0
2:hex:"a8":hex:"99f2aa95e36f95c2acb0eaf23998f030638f3f15"
SHA-1 Test Vector NIST CAVS #3
depends_on:0
2:hex:"3000":hex:"f944dcd635f9801f7ac90a407fbc479964dec024"
SHA-1 Test Vector NIST CAVS #4
depends_on:0
2:hex:"42749e":hex:"a444319e9b6cc1e8464c511ec0969c37d6bb2619"
SHA-1 Test Vector NIST CAVS #5
depends_on:0
2:hex:"9fc3fe08":hex:"16a0ff84fcc156fd5d3ca3a744f20a232d172253"
SHA-1 Test Vector NIST CAVS #6
depends_on:0
2:hex:"b5c1c6f1af":hex:"fec9deebfcdedaf66dda525e1be43597a73a1f93"
SHA-1 Test Vector NIST CAVS #7
depends_on:0
2:hex:"ec29561244ede706b6eb30a1c371d74450a105c3f9735f7fa9fe38cf67f304a5736a106e92e17139a6813b1c81a4f3d3fb9546ab4296fa9f722826c066869edacd73b2548035185813e22634a9da44000d95a281ff9f264ecce0a931222162d021cca28db5f3c2aa24945ab1e31cb413ae29810fd794cad5dfaf29ec43cb38d198fe4ae1da2359780221405bd6712a5305da4b1b737fce7cd21c0eb7728d08235a9011":hex:"970111c4e77bcc88cc20459c02b69b4aa8f58217"
SHA-1 Test Vector NIST CAVS #8
depends_on:0
2:hex:"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":hex:"0423dc76a8791107d14e13f5265b343f24cc0f19"
SHA-1 Test Vector NIST CAVS #9
depends_on:0
2:hex:"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":hex:"6692a71d73e00f27df976bc56df4970650d90e45"
SHA-1 Test Vector NIST CAVS #10
depends_on:0
2:hex:"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":hex:"11863b483809ef88413ca9b0084ac4a5390640af"
SHA-256 Valid parameters
3
SHA-256 Invalid parameters
4
SHA-224 Test Vector NIST CAVS #1
depends_on:1
5:hex:"":hex:"d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f"
SHA-224 Test Vector NIST CAVS #2
depends_on:1
5:hex:"ff":hex:"e33f9d75e6ae1369dbabf81b96b4591ae46bba30b591a6b6c62542b5"
SHA-224 Test Vector NIST CAVS #3
depends_on:1
5:hex:"984c":hex:"2fa9df9157d9e027cfbc4c6a9df32e1adc0cbe2328ec2a63c5ae934e"
SHA-224 Test Vector NIST CAVS #4
depends_on:1
5:hex:"50efd0":hex:"b5a9820413c2bf8211fbbf5df1337043b32fa4eafaf61a0c8e9ccede"
SHA-224 Test Vector NIST CAVS #5
depends_on:1
5:hex:"e5e09924":hex:"fd19e74690d291467ce59f077df311638f1c3a46e510d0e49a67062d"
SHA-224 Test Vector NIST CAVS #6
depends_on:1
5:hex:"21ebecb914":hex:"78f4a71c21c694499ce1c7866611b14ace70d905012c356323c7c713"
SHA-224 Test Vector NIST CAVS #7
depends_on:1
5:hex:"fc488947c1a7a589726b15436b4f3d9556262f98fc6422fc5cdf20f0fad7fe427a3491c86d101ffe6b7514f06268f65b2d269b0f69ad9a97847eff1c16a2438775eb7be6847ccf11cb8b2e8dcd6640b095b49c0693fe3cf4a66e2d9b7ad68bff14f3ad69abf49d0aba36cbe0535202deb6599a47225ef05beb351335cd7bc0f480d691198c7e71305ffd53b39d33242bb79cfd98bfd69e137b5d18b2b89ac9ace01c8dbdcf2533cce3682ecc52118de0c1062ec2126c2e657d6ea3d9e2398e705d4b0b1f1ceecb266dffc4f31bf42744fb1e938dc22a889919ee1e73f463f7871fed720519e32186264b7ef2a0e5d9a18e6c95c0781894f77967f048951dec3b4d892a38710b1e3436d3c29088eb8b3da1789c25db3d3bc6c26081206e7155d210a89b80ca6ea877c41ff9947c0f25625dcb118294a163501f6239c326661a958fd12da4cd15a899f8b88cc723589056eaec5aa04a4cf5dbb6f480f9660423ccf38c486e210707e0fb25e1f126ceb2616f63e147a647dab0af9ebe89d65458bf636154a46e4cab95f5ee62da2c7974cd14b90d3e4f99f81733e85b3c1d5da2b508d9b90f5eed7eff0d9c7649de62bee00375454fee4a39576a5bbfdae428e7f8097bdf7797f167686cb68407e49079e4611ff3402b6384ba7b7e522bd2bb11ce8fd02ea4c1604d163ac4f6dde50b8b1f593f7edaadeac0868ed97df690200680c25f0f5d85431a529e4f339089dcdeda105e4ee51dead704cdf5a605c55fb055c9b0e86b8ba1b564c0dea3eb790a595cb103cb292268b07c5e59371e1a7ef597cd4b22977a820694c9f9aeb55d9de3ef62b75d6e656e3336698d960a3787bf8cf5b926a7faeef52ae128bcb5dc9e66d94b016c7b8e034879171a2d91c381f57e6a815b63b5ee6a6d2ff435b49f14c963966960194430d78f8f87627a67757fb3532b289550894da6dce4817a4e07f4d56877a1102ffcc8befa5c9f8fca6a4574d93ff70376c8861e0f8108cf907fce77ecb49728f86f034f80224b9695682e0824462f76cdb1fd1af151337b0d85419047a7aa284791718a4860cd586f7824b95bc837b6fd4f9be5aade68456e20356aa4d943dac36bf8b67b9e8f9d01a00fcda74b798bafa746c661b010f75b59904b29d0c8041504811c4065f82cf2ead58d2f595cbd8bc3e7043f4d94577b373b7cfe16a36fe564f505c03b70cfeb5e5f411c79481338aa67e86b3f5a2e77c21e454c333ae3da943ab723ab5f4c940395319534a5575f64acba0d0ecc43f60221ed3badf7289c9b3a7b903a2d6c94e15fa4c310dc4fa7faa0c24f405160a1002dbef20e4105d481db982f7243f79400a6e4cd9753c4b9732a47575f504b20c328fe9add7f432a4f075829da07b53b695037dc51737d3cd731934df333cd1a53fcf65aa31baa450ca501a6fae26e322347e618c5a444d92e9fec5a8261ae38b98fee5be77c02cec09ddccd5b3de92036":hex:"1302149d1e197c41813b054c942329d420e366530f5517b470e964fe"
SHA-256 Test Vector NIST CAVS #1
depends_on:1
6:hex:"":hex:"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
SHA-256 Test Vector NIST CAVS #2
depends_on:1
6:hex:"bd":hex:"68325720aabd7c82f30f554b313d0570c95accbb7dc4b5aae11204c08ffe732b"
SHA-256 Test Vector NIST CAVS #3
depends_on:1
6:hex:"5fd4":hex:"7c4fbf484498d21b487b9d61de8914b2eadaf2698712936d47c3ada2558f6788"
SHA-256 Test Vector NIST CAVS #4
depends_on:1
6:hex:"b0bd69":hex:"4096804221093ddccfbf46831490ea63e9e99414858f8d75ff7f642c7ca61803"
SHA-256 Test Vector NIST CAVS #5
depends_on:1
6:hex:"c98c8e55":hex:"7abc22c0ae5af26ce93dbb94433a0e0b2e119d014f8e7f65bd56c61ccccd9504"
SHA-256 Test Vector NIST CAVS #6
depends_on:1
6:hex:"81a723d966":hex:"7516fb8bb11350df2bf386bc3c33bd0f52cb4c67c6e4745e0488e62c2aea2605"
SHA-256 Test Vector NIST CAVS #7
depends_on:1
6:hex:"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":hex:"4109cdbec3240ad74cc6c37f39300f70fede16e21efc77f7865998714aad0b5e"
SHA-512 Invalid parameters
8
SHA-512 Valid parameters
7
SHA-384 Test Vector NIST CAVS #1
depends_on:2:3
9:hex:"":hex:"38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b"
SHA-384 Test Vector NIST CAVS #2
depends_on:2:3
9:hex:"ab":hex:"fb94d5be118865f6fcbc978b825da82cff188faec2f66cb84b2537d74b4938469854b0ca89e66fa2e182834736629f3d"
SHA-384 Test Vector NIST CAVS #3
depends_on:2:3
9:hex:"7c27":hex:"3d80be467df86d63abb9ea1d3f9cb39cd19890e7f2c53a6200bedc5006842b35e820dc4e0ca90ca9b97ab23ef07080fc"
SHA-384 Test Vector NIST CAVS #4
depends_on:2:3
9:hex:"31f5ca":hex:"78d54b943421fdf7ba90a7fb9637c2073aa480454bd841d39ff72f4511fc21fb67797b652c0c823229342873d3bef955"
SHA-384 Test Vector NIST CAVS #5
depends_on:2:3
9:hex:"7bdee3f8":hex:"8bdafba0777ee446c3431c2d7b1fbb631089f71d2ca417abc1d230e1aba64ec2f1c187474a6f4077d372c14ad407f99a"
SHA-384 Test Vector NIST CAVS #6
depends_on:2:3
9:hex:"8f05604915":hex:"504e414bf1db1060f14c8c799e25b1e0c4dcf1504ebbd129998f0ae283e6de86e0d3c7e879c73ec3b1836c3ee89c2649"
SHA-384 Test Vector NIST CAVS #7
depends_on:2:3
9:hex:"665da6eda214":hex:"4c022f112010908848312f8b8f1072625fd5c105399d562ea1d56130619a7eac8dfc3748fd05ee37e4b690be9daa9980"
SHA-384 Test Vector NIST CAVS #8
depends_on:2:3
9:hex:"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":hex:"cba9e3eb12a6f83db11e8a6ff40d1049854ee094416bc527fea931d8585428a8ed6242ce81f6769b36e2123a5c23483e"
SHA-512 Test Vector NIST CAVS #1
depends_on:2
10:hex:"":hex:"cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e"
SHA-512 Test Vector NIST CAVS #2
depends_on:2
10:hex:"8f":hex:"e4cd2d19931b5aad9c920f45f56f6ce34e3d38c6d319a6e11d0588ab8b838576d6ce6d68eea7c830de66e2bd96458bfa7aafbcbec981d4ed040498c3dd95f22a"
SHA-512 Test Vector NIST CAVS #3
depends_on:2
10:hex:"e724":hex:"7dbb520221a70287b23dbcf62bfc1b73136d858e86266732a7fffa875ecaa2c1b8f673b5c065d360c563a7b9539349f5f59bef8c0c593f9587e3cd50bb26a231"
SHA-512 Test Vector NIST CAVS #4
depends_on:2
10:hex:"de4c90":hex:"33ce98281045a5c4c9df0363d8196f1d7dfcd5ee46ac89776fd8a4344c12f123a66788af5bd41ceff1941aa5637654b4064c88c14e00465ab79a2fc6c97e1014"
SHA-512 Test Vector NIST CAVS #5
depends_on:2
10:hex:"a801e94b":hex:"dadb1b5a27f9fece8d86adb2a51879beb1787ff28f4e8ce162cad7fee0f942efcabbf738bc6f797fc7cc79a3a75048cd4c82ca0757a324695bfb19a557e56e2f"
SHA-512 Test Vector NIST CAVS #6
depends_on:2
10:hex:"94390d3502":hex:"b6175c4c4cccf69e0ce5f0312010886ea6b34d43673f942ae42483f9cbb7da817de4e11b5d58e25a3d9bd721a22cdffe1c40411cc45df1911fa5506129b69297"
SHA-512 Test Vector NIST CAVS #7
depends_on:2
10:hex:"49297dd63e5f":hex:"1fcc1e6f6870859d11649f5e5336a9cd16329c029baf04d5a6edf257889a2e9522b497dd656bb402da461307c4ee382e2e89380c8e6e6e7697f1e439f650fa94"
SHA-512 Test Vector NIST CAVS #8
depends_on:2
10:hex:"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":hex:"8e4bc6f8b8c60fe4d68c61d9b159c8693c3151c46749af58da228442d927f23359bd6ccd6c2ec8fa3f00a86cecbfa728e1ad60b821ed22fcd309ba91a4138bc9"
SHA-1 Selftest
depends_on:4:0
11
SHA-256 Selftest
depends_on:4:1
12
SHA-512 Selftest
depends_on:4:2
13
| 16,993 | 191 | jart/cosmopolitan | false |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.