Line data Source code
1 : /*
2 : * Copyright (C) 2013-2018 Red Hat
3 : *
4 : * Author: Nikos Mavrogiannopoulos
5 : *
6 : * This file is part of GnuTLS.
7 : *
8 : * The GnuTLS is free software; you can redistribute it and/or
9 : * modify it under the terms of the GNU Lesser General Public License
10 : * as published by the Free Software Foundation; either version 2.1 of
11 : * the License, or (at your option) any later version.
12 : *
13 : * This library is distributed in the hope that it will be useful, but
14 : * WITHOUT ANY WARRANTY; without even the implied warranty of
15 : * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 : * Lesser General Public License for more details.
17 : *
18 : * You should have received a copy of the GNU Lesser General Public License
19 : * along with this program. If not, see <https://www.gnu.org/licenses/>
20 : *
21 : */
22 :
23 : #include "gnutls_int.h"
24 : #include "errors.h"
25 : #include <cipher_int.h>
26 : #include <datum.h>
27 : #include <gnutls/crypto.h>
28 : #include <gnutls/self-test.h>
29 : #include "errors.h"
30 : #include <random.h>
31 : #include <crypto.h>
32 : #include <nettle/sha3.h>
33 :
34 : #define STR(tag, tag_size, val) \
35 : .tag = (uint8_t*)val, \
36 : .tag_size = (sizeof(val)-1)
37 :
38 : #define V(x) (x), (sizeof(x)/sizeof(x[0]))
39 :
40 : /* This does check the AES and SHA implementation against test vectors.
41 : * This should not run under valgrind in order to use the native
42 : * cpu instructions (AES-NI or padlock).
43 : */
44 :
45 : struct cipher_vectors_st {
46 : const uint8_t *key;
47 : unsigned int key_size;
48 :
49 : const uint8_t *plaintext;
50 : unsigned int plaintext_size;
51 : const uint8_t *ciphertext; /* also of plaintext_size */
52 :
53 : const uint8_t *iv;
54 : unsigned int iv_size;
55 :
56 : const uint8_t *internal_iv;
57 : unsigned int internal_iv_size;
58 : };
59 :
60 : struct cipher_aead_vectors_st {
61 : unsigned compat_apis;
62 : const uint8_t *key;
63 : unsigned int key_size;
64 :
65 : const uint8_t *auth;
66 : unsigned int auth_size;
67 :
68 : const uint8_t *plaintext;
69 : unsigned int plaintext_size;
70 : const uint8_t *ciphertext; /* also of plaintext_size */
71 :
72 : unsigned int iv_size;
73 : const uint8_t *iv;
74 : const uint8_t *tag;
75 : unsigned tag_size;
76 : unsigned tag_prepended;
77 : };
78 :
79 : const struct cipher_aead_vectors_st chacha_poly1305_vectors[] = {
80 : {
81 : .compat_apis = 1,
82 : STR(key, key_size,
83 : "\x1c\x92\x40\xa5\xeb\x55\xd3\x8a\xf3\x33\x88\x86\x04\xf6\xb5\xf0\x47\x39\x17\xc1\x40\x2b\x80\x09\x9d\xca\x5c\xbc\x20\x70\x75\xc0"),
84 : .auth = (void*)"\xf3\x33\x88\x86\x00\x00\x00\x00\x00\x00\x4e\x91",
85 : .auth_size = 12,
86 : .plaintext = (void*)"\x49\x6e\x74\x65\x72\x6e\x65\x74\x2d\x44\x72\x61\x66\x74\x73\x20\x61\x72\x65\x20\x64\x72\x61\x66\x74\x20\x64\x6f\x63\x75\x6d\x65\x6e\x74\x73\x20\x76\x61\x6c\x69\x64\x20\x66\x6f\x72\x20\x61\x20\x6d\x61\x78\x69\x6d\x75\x6d\x20\x6f\x66\x20\x73\x69\x78\x20\x6d\x6f\x6e\x74\x68\x73\x20\x61\x6e\x64\x20\x6d\x61\x79\x20\x62\x65\x20\x75\x70\x64\x61\x74\x65\x64\x2c\x20\x72\x65\x70\x6c\x61\x63\x65\x64\x2c\x20\x6f\x72\x20\x6f\x62\x73\x6f\x6c\x65\x74\x65\x64\x20\x62\x79\x20\x6f\x74\x68\x65\x72\x20\x64\x6f\x63\x75\x6d\x65\x6e\x74\x73\x20\x61\x74\x20\x61\x6e\x79\x20\x74\x69\x6d\x65\x2e\x20\x49\x74\x20\x69\x73\x20\x69\x6e\x61\x70\x70\x72\x6f\x70\x72\x69\x61\x74\x65\x20\x74\x6f\x20\x75\x73\x65\x20\x49\x6e\x74\x65\x72\x6e\x65\x74\x2d\x44\x72\x61\x66\x74\x73\x20\x61\x73\x20\x72\x65\x66\x65\x72\x65\x6e\x63\x65\x20\x6d\x61\x74\x65\x72\x69\x61\x6c\x20\x6f\x72\x20\x74\x6f\x20\x63\x69\x74\x65\x20\x74\x68\x65\x6d\x20\x6f\x74\x68\x65\x72\x20\x74\x68\x61\x6e\x20\x61\x73\x20\x2f\xe2\x80\x9c\x77\x6f\x72\x6b\x20\x69\x6e\x20\x70\x72\x6f\x67\x72\x65\x73\x73\x2e\x2f\xe2\x80\x9d",
87 : .plaintext_size = 265,
88 : .ciphertext = (void*)"\x64\xa0\x86\x15\x75\x86\x1a\xf4\x60\xf0\x62\xc7\x9b\xe6\x43\xbd\x5e\x80\x5c\xfd\x34\x5c\xf3\x89\xf1\x08\x67\x0a\xc7\x6c\x8c\xb2\x4c\x6c\xfc\x18\x75\x5d\x43\xee\xa0\x9e\xe9\x4e\x38\x2d\x26\xb0\xbd\xb7\xb7\x3c\x32\x1b\x01\x00\xd4\xf0\x3b\x7f\x35\x58\x94\xcf\x33\x2f\x83\x0e\x71\x0b\x97\xce\x98\xc8\xa8\x4a\xbd\x0b\x94\x81\x14\xad\x17\x6e\x00\x8d\x33\xbd\x60\xf9\x82\xb1\xff\x37\xc8\x55\x97\x97\xa0\x6e\xf4\xf0\xef\x61\xc1\x86\x32\x4e\x2b\x35\x06\x38\x36\x06\x90\x7b\x6a\x7c\x02\xb0\xf9\xf6\x15\x7b\x53\xc8\x67\xe4\xb9\x16\x6c\x76\x7b\x80\x4d\x46\xa5\x9b\x52\x16\xcd\xe7\xa4\xe9\x90\x40\xc5\xa4\x04\x33\x22\x5e\xe2\x82\xa1\xb0\xa0\x6c\x52\x3e\xaf\x45\x34\xd7\xf8\x3f\xa1\x15\x5b\x00\x47\x71\x8c\xbc\x54\x6a\x0d\x07\x2b\x04\xb3\x56\x4e\xea\x1b\x42\x22\x73\xf5\x48\x27\x1a\x0b\xb2\x31\x60\x53\xfa\x76\x99\x19\x55\xeb\xd6\x31\x59\x43\x4e\xce\xbb\x4e\x46\x6d\xae\x5a\x10\x73\xa6\x72\x76\x27\x09\x7a\x10\x49\xe6\x17\xd9\x1d\x36\x10\x94\xfa\x68\xf0\xff\x77\x98\x71\x30\x30\x5b\xea\xba\x2e\xda\x04\xdf\x99\x7b\x71\x4d\x6c\x6f\x2c\x29\xa6\xad\x5c\xb4\x02\x2b\x02\x70\x9b",
89 : STR(iv, iv_size,
90 : "\x00\x00\x00\x00\x01\x02\x03\x04\x05\x06\x07\x08"),
91 : .tag_size = 16,
92 : .tag = (void *)
93 : "\xee\xad\x9d\x67\x89\x0c\xbb\x22\x39\x23\x36\xfe\xa1\x85\x1f\x38"},
94 : };
95 :
96 : const struct cipher_aead_vectors_st aes128_gcm_vectors[] = {
97 : {
98 : .compat_apis = 1,
99 : STR(key, key_size,
100 : "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
101 : .auth = NULL,
102 : .auth_size = 0,
103 : .plaintext = NULL,
104 : .plaintext_size = 0,
105 : .ciphertext = NULL,
106 : STR(iv, iv_size,
107 : "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
108 : .tag_size = 16,
109 : .tag = (void *)
110 : "\x58\xe2\xfc\xce\xfa\x7e\x30\x61\x36\x7f\x1d\x57\xa4\xe7\x45\x5a"},
111 : {
112 : .compat_apis = 1,
113 : STR(key, key_size,
114 : "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
115 : .auth = NULL,
116 : .auth_size = 0,
117 : STR(plaintext, plaintext_size,
118 : "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
119 : .ciphertext = (void *)
120 : "\x03\x88\xda\xce\x60\xb6\xa3\x92\xf3\x28\xc2\xb9\x71\xb2\xfe\x78",
121 : STR(iv, iv_size,
122 : "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
123 : .tag_size = 16,
124 : .tag = (void *)
125 : "\xab\x6e\x47\xd4\x2c\xec\x13\xbd\xf5\x3a\x67\xb2\x12\x57\xbd\xdf"},
126 : {
127 : .compat_apis = 1,
128 : STR(key, key_size,
129 : "\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08"),
130 : .auth = (void *)
131 : "\xfe\xed\xfa\xce\xde\xad\xbe\xef\xfe\xed\xfa\xce\xde\xad\xbe\xef\xab\xad\xda\xd2",
132 : .auth_size = 20,
133 : STR(plaintext, plaintext_size,
134 : "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39"),
135 : .ciphertext = (void *)
136 : "\x42\x83\x1e\xc2\x21\x77\x74\x24\x4b\x72\x21\xb7\x84\xd0\xd4\x9c\xe3\xaa\x21\x2f\x2c\x02\xa4\xe0\x35\xc1\x7e\x23\x29\xac\xa1\x2e\x21\xd5\x14\xb2\x54\x66\x93\x1c\x7d\x8f\x6a\x5a\xac\x84\xaa\x05\x1b\xa3\x0b\x39\x6a\x0a\xac\x97\x3d\x58\xe0\x91",
137 : STR(iv, iv_size,
138 : "\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88"),
139 : .tag_size = 16,
140 : .tag = (void *)
141 : "\x5b\xc9\x4f\xbc\x32\x21\xa5\xdb\x94\xfa\xe9\x5a\xe7\x12\x1a\x47"}
142 : };
143 :
144 : const struct cipher_aead_vectors_st aes192_gcm_vectors[] = {
145 : {
146 : .compat_apis = 1,
147 : STR(key, key_size,
148 : "\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08\xfe\xff\xe9\x92\x86\x65\x73\x1c"),
149 : .auth = NULL,
150 : .auth_size = 0,
151 : STR(plaintext, plaintext_size,
152 : "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39\x1a\xaf\xd2\x55"),
153 : .ciphertext =
154 : (uint8_t *)
155 : "\x39\x80\xca\x0b\x3c\x00\xe8\x41\xeb\x06\xfa\xc4\x87\x2a\x27\x57\x85\x9e\x1c\xea\xa6\xef\xd9\x84\x62\x85\x93\xb4\x0c\xa1\xe1\x9c\x7d\x77\x3d\x00\xc1\x44\xc5\x25\xac\x61\x9d\x18\xc8\x4a\x3f\x47\x18\xe2\x44\x8b\x2f\xe3\x24\xd9\xcc\xda\x27\x10\xac\xad\xe2\x56",
156 : STR(iv, iv_size,
157 : "\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88"),
158 : .tag_size = 16,
159 : .tag =
160 : (void *)
161 : "\x99\x24\xa7\xc8\x58\x73\x36\xbf\xb1\x18\x02\x4d\xb8\x67\x4a\x14"},
162 :
163 : };
164 :
165 : const struct cipher_aead_vectors_st aes256_gcm_vectors[] = {
166 : {
167 : .compat_apis = 1,
168 : STR(key, key_size,
169 : "\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08"),
170 : .auth = NULL,
171 : .auth_size = 0,
172 : STR(plaintext, plaintext_size,
173 : "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39\x1a\xaf\xd2\x55"),
174 : .ciphertext =
175 : (uint8_t *)
176 : "\x52\x2d\xc1\xf0\x99\x56\x7d\x07\xf4\x7f\x37\xa3\x2a\x84\x42\x7d\x64\x3a\x8c\xdc\xbf\xe5\xc0\xc9\x75\x98\xa2\xbd\x25\x55\xd1\xaa\x8c\xb0\x8e\x48\x59\x0d\xbb\x3d\xa7\xb0\x8b\x10\x56\x82\x88\x38\xc5\xf6\x1e\x63\x93\xba\x7a\x0a\xbc\xc9\xf6\x62\x89\x80\x15\xad",
177 : STR(iv, iv_size,
178 : "\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88"),
179 : .tag_size = 16,
180 : .tag =
181 : (void *)
182 : "\xb0\x94\xda\xc5\xd9\x34\x71\xbd\xec\x1a\x50\x22\x70\xe3\xcc\x6c"},
183 :
184 : };
185 :
186 : const struct cipher_aead_vectors_st aes256_ccm_vectors[] = {
187 : {
188 : .compat_apis = 0,
189 : STR(key, key_size,
190 : "\xfb\x76\x15\xb2\x3d\x80\x89\x1d\xd4\x70\x98\x0b\xc7\x95\x84\xc8\xb2\xfb\x64\xce\x60\x97\x8f\x4d\x17\xfc\xe4\x5a\x49\xe8\x30\xb7"),
191 : .auth = NULL,
192 : .auth_size = 0,
193 : STR(plaintext, plaintext_size,
194 : "\xa8\x45\x34\x8e\xc8\xc5\xb5\xf1\x26\xf5\x0e\x76\xfe\xfd\x1b\x1e"),
195 : .ciphertext = (void *)
196 : "\xcc\x88\x12\x61\xc6\xa7\xfa\x72\xb9\x6a\x17\x39\x17\x6b\x27\x7f",
197 : STR(iv, iv_size,
198 : "\xdb\xd1\xa3\x63\x60\x24\xb7\xb4\x02\xda\x7d\x6f"),
199 : .tag_size = 16,
200 : .tag = (void *)
201 : "\x34\x72\xe1\x14\x5f\x2c\x0c\xbe\x14\x63\x49\x06\x2c\xf0\xe4\x23"},
202 : {
203 : .compat_apis = 0,
204 : STR(key, key_size,
205 : "\xfb\x76\x15\xb2\x3d\x80\x89\x1d\xd4\x70\x98\x0b\xc7\x95\x84\xc8\xb2\xfb\x64\xce\x60\x97\x87\x8d\x17\xfc\xe4\x5a\x49\xe8\x30\xb7"),
206 : STR(auth, auth_size, "\x36"),
207 : STR(plaintext, plaintext_size,
208 : "\xa9"),
209 : .ciphertext = (void *)
210 : "\x9d",
211 : STR(iv, iv_size,
212 : "\xdb\xd1\xa3\x63\x60\x24\xb7\xb4\x02\xda\x7d\x6f"),
213 : .tag_size = 16,
214 : .tag = (void *)
215 : "\x32\x61\xb1\xcf\x93\x14\x31\xe9\x9a\x32\x80\x67\x38\xec\xbd\x2a"},
216 : };
217 :
218 : const struct cipher_aead_vectors_st aes128_ccm_vectors[] = {
219 : {
220 : .compat_apis = 0,
221 : STR(key, key_size,
222 : "\xC0\xC1\xC2\xC3\xC4\xC5\xC6\xC7\xC8\xC9\xCA\xCB\xCC\xCD\xCE\xCF"),
223 : STR(auth, auth_size, "\x08\xD0\x84\x21\x43\x01\x00\x00\x00\x00\x48\xDE\xAC\x02\x05\x00\x00\x00\x55\xCF\x00\x00\x51\x52\x53\x54"),
224 : .plaintext = NULL,
225 : .plaintext_size = 0,
226 : STR(iv, iv_size,
227 : "\xAC\xDE\x48\x00\x00\x00\x00\x01\x00\x00\x00\x05\x02"),
228 : .tag_size = 8,
229 : .tag = (void *)
230 : "\x22\x3B\xC1\xEC\x84\x1A\xB5\x53"},
231 : {
232 : .compat_apis = 0,
233 : STR(key, key_size,
234 : "\x40\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f"),
235 : STR(auth, auth_size, "\x00\x01\x02\x03\x04\x05\x06\x07"),
236 : STR(plaintext, plaintext_size,
237 : "\x20\x21\x22\x23"),
238 : .ciphertext = (void *)
239 : "\x71\x62\x01\x5b",
240 : STR(iv, iv_size,
241 : "\x10\x11\x12\x13\x14\x15\x16"),
242 : .tag_size = 4,
243 : .tag = (void *)
244 : "\x4d\xac\x25\x5d"},
245 : /* from rfc3610 */
246 : {
247 : .compat_apis = 0,
248 : STR(key, key_size,
249 : "\xC0\xC1\xC2\xC3\xC4\xC5\xC6\xC7\xC8\xC9\xCA\xCB\xCC\xCD\xCE\xCF"),
250 : STR(auth, auth_size, "\x00\x01\x02\x03\x04\x05\x06\x07"),
251 : STR(plaintext, plaintext_size,
252 : "\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E"),
253 : .ciphertext = (void *)
254 : "\x01\x35\xD1\xB2\xC9\x5F\x41\xD5\xD1\xD4\xFE\xC1\x85\xD1\x66\xB8\x09\x4E\x99\x9D\xFE\xD9\x6C",
255 : STR(iv, iv_size,
256 : "\x00\x00\x00\x09\x08\x07\x06\xA0\xA1\xA2\xA3\xA4\xA5"),
257 : .tag_size = 10,
258 : .tag = (void *)
259 : "\x04\x8C\x56\x60\x2C\x97\xAC\xBB\x74\x90"},
260 : {
261 : .compat_apis = 0,
262 : STR(key, key_size,
263 : "\xC0\xC1\xC2\xC3\xC4\xC5\xC6\xC7\xC8\xC9\xCA\xCB\xCC\xCD\xCE\xCF"),
264 : STR(auth, auth_size, "\x00\x01\x02\x03\x04\x05\x06\x07"),
265 : STR(plaintext, plaintext_size,
266 : "\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E"),
267 : .ciphertext = (void *)
268 : "\x58\x8C\x97\x9A\x61\xC6\x63\xD2\xF0\x66\xD0\xC2\xC0\xF9\x89\x80\x6D\x5F\x6B\x61\xDA\xC3\x84",
269 : STR(iv, iv_size,
270 : "\x00\x00\x00\x03\x02\x01\x00\xA0\xA1\xA2\xA3\xA4\xA5"),
271 : .tag_size = 8,
272 : .tag = (void *)
273 : "\x17\xE8\xD1\x2C\xFD\xF9\x26\xE0"},
274 : };
275 :
276 : const struct cipher_vectors_st aes128_cbc_vectors[] = {
277 : {
278 : STR(key, key_size,
279 : "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c"),
280 : STR(plaintext, plaintext_size,
281 : "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"),
282 : .ciphertext = (uint8_t *)
283 : "\x76\x49\xab\xac\x81\x19\xb2\x46\xce\xe9\x8e\x9b\x12\xe9\x19\x7d",
284 : STR(iv, iv_size,
285 : "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F"),
286 : },
287 : {
288 : STR(key, key_size,
289 : "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c"),
290 : STR(plaintext, plaintext_size,
291 : "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51"),
292 : .ciphertext =
293 : (uint8_t *)
294 : "\x50\x86\xcb\x9b\x50\x72\x19\xee\x95\xdb\x11\x3a\x91\x76\x78\xb2",
295 : STR(iv, iv_size,
296 : "\x76\x49\xab\xac\x81\x19\xb2\x46\xce\xe9\x8e\x9b\x12\xe9\x19\x7d"),
297 : },
298 : };
299 :
300 : const struct cipher_vectors_st aes192_cbc_vectors[] = {
301 : {
302 : STR(key, key_size,
303 : "\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b\x80\x90\x79\xe5\x62\xf8\xea\xd2\x52\x2c\x6b\x7b"),
304 : STR(plaintext, plaintext_size,
305 : "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"),
306 : .ciphertext = (uint8_t *)
307 : "\x4f\x02\x1d\xb2\x43\xbc\x63\x3d\x71\x78\x18\x3a\x9f\xa0\x71\xe8",
308 : STR(iv, iv_size,
309 : "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F"),
310 : },
311 : {
312 : STR(key, key_size,
313 : "\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b\x80\x90\x79\xe5\x62\xf8\xea\xd2\x52\x2c\x6b\x7b"),
314 : STR(plaintext, plaintext_size,
315 : "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51"),
316 : .ciphertext = (uint8_t *)
317 : "\xb4\xd9\xad\xa9\xad\x7d\xed\xf4\xe5\xe7\x38\x76\x3f\x69\x14\x5a",
318 : STR(iv, iv_size,
319 : "\x4F\x02\x1D\xB2\x43\xBC\x63\x3D\x71\x78\x18\x3A\x9F\xA0\x71\xE8"),
320 : },
321 : };
322 :
323 : const struct cipher_vectors_st aes256_cbc_vectors[] = {
324 : {
325 : STR(key, key_size,
326 : "\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4"),
327 : STR(plaintext, plaintext_size,
328 : "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"),
329 : .ciphertext = (uint8_t *)
330 : "\xF5\x8C\x4C\x04\xD6\xE5\xF1\xBA\x77\x9E\xAB\xFB\x5F\x7B\xFB\xD6",
331 : STR(iv, iv_size,
332 : "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F"),
333 : },
334 : {
335 : STR(key, key_size,
336 : "\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4"),
337 : STR(plaintext, plaintext_size,
338 : "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51"),
339 : .ciphertext = (uint8_t *)
340 : "\x9c\xfc\x4e\x96\x7e\xdb\x80\x8d\x67\x9f\x77\x7b\xc6\x70\x2c\x7d",
341 : STR(iv, iv_size,
342 : "\xF5\x8C\x4C\x04\xD6\xE5\xF1\xBA\x77\x9E\xAB\xFB\x5F\x7B\xFB\xD6"),
343 : },
344 : };
345 :
346 : const struct cipher_vectors_st tdes_cbc_vectors[] = {
347 : /* First 2 from https://www.cosic.esat.kuleuven.be/nessie/testvectors/bc/des/Triple-Des-3-Key-192-64.unverified.test-vectors */
348 : {
349 : STR(key, key_size,
350 : "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17"),
351 : STR(plaintext, plaintext_size,
352 : "\x98\x26\x62\x60\x55\x53\x24\x4D"),
353 : .ciphertext = (uint8_t *)
354 : "\x00\x11\x22\x33\x44\x55\x66\x77",
355 : STR(iv, iv_size, "\x00\x00\x00\x00\x00\x00\x00\x00"),
356 : },
357 : {
358 : STR(key, key_size,
359 : "\x2B\xD6\x45\x9F\x82\xC5\xB3\x00\x95\x2C\x49\x10\x48\x81\xFF\x48\x2B\xD6\x45\x9F\x82\xC5\xB3\x00"),
360 : STR(plaintext, plaintext_size,
361 : "\x85\x98\x53\x8A\x8E\xCF\x11\x7D"),
362 : .ciphertext = (uint8_t *)
363 : "\xEA\x02\x47\x14\xAD\x5C\x4D\x84",
364 : STR(iv, iv_size, "\x00\x00\x00\x00\x00\x00\x00\x00"),
365 : },
366 : };
367 :
368 : const struct cipher_vectors_st arcfour_vectors[] = { /* RFC6229 */
369 : {
370 : STR(key, key_size,
371 : "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18"),
372 : STR(plaintext, plaintext_size,
373 : "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
374 : .ciphertext = (uint8_t *)
375 : "\x05\x95\xe5\x7f\xe5\xf0\xbb\x3c\x70\x6e\xda\xc8\xa4\xb2\xdb\x11",
376 : .iv = NULL,
377 : .iv_size = 0
378 : },
379 : {
380 : STR(key, key_size,
381 : "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20"),
382 : STR(plaintext, plaintext_size,
383 : "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
384 : .ciphertext = (uint8_t *)
385 : "\xea\xa6\xbd\x25\x88\x0b\xf9\x3d\x3f\x5d\x1e\x4c\xa2\x61\x1d\x91",
386 : .iv = NULL,
387 : .iv_size = 0
388 : },
389 : {
390 : STR(key, key_size,
391 : "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10"),
392 : STR(plaintext, plaintext_size,
393 : "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
394 : .ciphertext = (uint8_t *)
395 : "\x9a\xc7\xcc\x9a\x60\x9d\x1e\xf7\xb2\x93\x28\x99\xcd\xe4\x1b\x97",
396 : .iv = NULL,
397 : .iv_size = 0
398 : },
399 : };
400 :
401 : const struct cipher_vectors_st aes128_cfb8_vectors[] = { /* NIST 800-38a */
402 : {
403 : STR(key, key_size,
404 : "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c"),
405 : STR(plaintext, plaintext_size,
406 : "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"
407 : "\xae\x2d"),
408 : .ciphertext = (uint8_t *)
409 : "\x3b\x79\x42\x4c\x9c\x0d\xd4\x36\xba\xce\x9e\x0e\xd4\x58\x6a\x4f"
410 : "\x32\xb9",
411 : STR(iv, iv_size,
412 : "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"),
413 : /* the least significant 16 bytes of ciphertext */
414 : STR(internal_iv, internal_iv_size,
415 : "\x42\x4c\x9c\x0d\xd4\x36\xba\xce\x9e\x0e\xd4\x58\x6a\x4f\x32\xb9"),
416 : },
417 : };
418 :
419 : const struct cipher_vectors_st aes192_cfb8_vectors[] = { /* NIST 800-38a */
420 : {
421 : STR(key, key_size,
422 : "\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b\x80\x90\x79\xe5"
423 : "\x62\xf8\xea\xd2\x52\x2c\x6b\x7b"),
424 : STR(plaintext, plaintext_size,
425 : "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"
426 : "\xae\x2d"),
427 : .ciphertext = (uint8_t *)
428 : "\xcd\xa2\x52\x1e\xf0\xa9\x05\xca\x44\xcd\x05\x7c\xbf\x0d\x47\xa0"
429 : "\x67\x8a",
430 : STR(iv, iv_size,
431 : "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"),
432 : /* the least significant 16 bytes of ciphertext */
433 : STR(internal_iv, internal_iv_size,
434 : "\x52\x1e\xf0\xa9\x05\xca\x44\xcd\x05\x7c\xbf\x0d\x47\xa0\x67\x8a"),
435 : },
436 : };
437 :
438 : const struct cipher_vectors_st aes256_cfb8_vectors[] = { /* NIST 800-38a */
439 : {
440 : STR(key, key_size,
441 : "\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81"
442 : "\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4"),
443 : STR(plaintext, plaintext_size,
444 : "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"
445 : "\xae\x2d"),
446 : .ciphertext = (uint8_t *)
447 : "\xdc\x1f\x1a\x85\x20\xa6\x4d\xb5\x5f\xcc\x8a\xc5\x54\x84\x4e\x88"
448 : "\x97\x00",
449 : STR(iv, iv_size,
450 : "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"),
451 : /* the least significant 16 bytes of ciphertext */
452 : STR(internal_iv, internal_iv_size,
453 : "\x1a\x85\x20\xa6\x4d\xb5\x5f\xcc\x8a\xc5\x54\x84\x4e\x88\x97\x00"),
454 : },
455 : };
456 :
457 : /* GOST 28147-89 vectors come from the testsuite contributed to OpenSSL by
458 : * Sergey E. Leontiev. CryptoPro-B test vector is just truncated.
459 : * TC26Z is calculated using Nettle */
460 : const struct cipher_vectors_st gost28147_cpa_cfb_vectors[] = {
461 : {
462 : STR(key, key_size,
463 : "\x8d\x5a\x2c\x83\xa7\xc7\x0a\x61\xd6\x1b\x34\xb5\x1f\xdf\x42\x68"
464 : "\x66\x71\xa3\x5d\x87\x4c\xfd\x84\x99\x36\x63\xb6\x1e\xd6\x0d\xad"),
465 : STR(plaintext, plaintext_size,
466 : "\xd2\xfd\xf8\x3a\xc1\xb4\x39\x23\x2e\xaa\xcc\x98\x0a\x02\xda\x33"),
467 : .ciphertext = (uint8_t *)
468 : "\x88\xb7\x75\x16\x74\xa5\xee\x2d\x14\xfe\x91\x67\xd0\x5c\xcc\x40",
469 : STR(iv, iv_size,
470 : "\x46\x60\x6f\x0d\x88\x34\x23\x5a"),
471 : },
472 : };
473 :
474 : const struct cipher_vectors_st gost28147_cpb_cfb_vectors[] = {
475 : {
476 : STR(key, key_size,
477 : "\x48\x0c\x74\x1b\x02\x6b\x55\xd5\xb6\x6d\xd7\x1d\x40\x48\x05\x6b"
478 : "\x6d\xeb\x3c\x29\x0f\x84\x80\x23\xee\x0d\x47\x77\xe3\xfe\x61\xc9"),
479 : STR(plaintext, plaintext_size,
480 : "\x8c\x9c\x44\x35\xfb\xe9\xa5\xa3\xa0\xae\x28\x56\x91\x10\x8e\x1e"
481 : "\xd2\xbb\x18\x53\x81\x27\x0d\xa6\x68\x59\x36\xc5\x81\x62\x9a\x8e"
482 : "\x7d\x50\xf1\x6f\x97\x62\x29\xec\x80\x51\xe3\x7d\x6c\xc4\x07\x95"
483 : "\x28\x63\xdc\xb4\xb9\x2d\xb8\x13\xb1\x05\xb5\xf9\xeb\x75\x37"),
484 : .ciphertext = (uint8_t *)
485 : "\x23\xc6\x7f\x20\xa1\x23\x58\xbc\x7b\x05\xdb\x21\x15\xcf\x96\x41"
486 : "\xc7\x88\xef\x76\x5c\x49\xdb\x42\xbf\xf3\xc0\xf5\xbd\x5d\xd9\x8e"
487 : "\xaf\x3d\xf4\xe4\xda\x88\xbd\xbc\x47\x5d\x76\x07\xc9\x5f\x54\x1d"
488 : "\x1d\x6a\xa1\x2e\x18\xd6\x60\x84\x02\x18\x37\x92\x92\x15\xab",
489 : STR(iv, iv_size,
490 : "\x1f\x3f\x82\x1e\x0d\xd8\x1e\x22"),
491 : },
492 : };
493 :
494 : const struct cipher_vectors_st gost28147_cpc_cfb_vectors[] = {
495 : {
496 : STR(key, key_size,
497 : "\x77\xc3\x45\x8e\xf6\x42\xe7\x04\x8e\xfc\x08\xe4\x70\x96\xd6\x05"
498 : "\x93\x59\x02\x6d\x6f\x97\xca\xe9\xcf\x89\x44\x4b\xde\x6c\x22\x1d"),
499 : STR(plaintext, plaintext_size,
500 : "\x07\x9c\x91\xbe"),
501 : .ciphertext = (uint8_t *)
502 : "\x19\x35\x81\x34",
503 : STR(iv, iv_size,
504 : "\x43\x7c\x3e\x8e\x2f\x2a\x00\x98"),
505 : },
506 : };
507 :
508 : const struct cipher_vectors_st gost28147_cpd_cfb_vectors[] = {
509 : {
510 : STR(key, key_size,
511 : "\x38\x9f\xe8\x37\xff\x9c\x5d\x29\xfc\x48\x55\xa0\x87\xea\xe8\x40"
512 : "\x20\x87\x5b\xb2\x01\x15\x55\xa7\xe3\x2d\xcb\x3d\xd6\x59\x04\x73"),
513 : STR(plaintext, plaintext_size,
514 : "\x2f\x31\xd8\x83\xb4\x20\xe8\x6e\xda"),
515 : .ciphertext = (uint8_t *)
516 : "\x6d\xa4\xed\x40\x08\x88\x71\xad\x16",
517 : STR(iv, iv_size,
518 : "\xc5\xa2\xd2\x1f\x2f\xdf\xb8\xeb"),
519 : },
520 : };
521 :
522 : const struct cipher_vectors_st gost28147_tc26z_cfb_vectors[] = {
523 : {
524 : STR(key, key_size,
525 : "\x8d\x5a\x2c\x83\xa7\xc7\x0a\x61\xd6\x1b\x34\xb5\x1f\xdf\x42\x68"
526 : "\x66\x71\xa3\x5d\x87\x4c\xfd\x84\x99\x36\x63\xb6\x1e\xd6\x0d\xad"),
527 : STR(plaintext, plaintext_size,
528 : "\xd2\xfd\xf8\x3a\xc1\xb4\x39\x23\x2e\xaa\xcc\x98\x0a\x02\xda\x33"),
529 : .ciphertext = (uint8_t *)
530 : "\xed\xa7\xf1\x41\x01\x9c\xbd\xcd\x44\x6b\x00\x96\x87\xf7\xc7\xe6",
531 : STR(iv, iv_size,
532 : "\x46\x60\x6f\x0d\x88\x34\x23\x5a"),
533 : },
534 : };
535 :
536 : const struct cipher_vectors_st gost28147_tc26z_cnt_vectors[] = {
537 : {
538 : STR(key, key_size,
539 : "\x59\x9f\x84\xba\xc3\xf3\xd2\xf1\x60\xe1\xe3\xf2\x6a\x96\x1a\xf9"
540 : "\x9c\x48\xb2\x4e\xbc\xbb\xbf\x7c\xd8\xf3\xac\xcd\x96\x8d\x28\x6a"),
541 : STR(plaintext, plaintext_size,
542 : "\x90\xa2\x39\x66\xae\x01\xb9\xa3\x52\x4e\xc8\xed\x6c\xdd\x88\x30"),
543 : .ciphertext = (uint8_t *)
544 : "\xe8\xb1\x4f\xc7\x30\xdc\x25\xbb\x36\xba\x64\x3c\x17\xdb\xff\x99",
545 : STR(iv, iv_size,
546 : "\x8d\xaf\xa8\xd1\x58\xed\x05\x8d"),
547 : }
548 : };
549 :
550 : /* Manually calculated to overcome section size differences between TLS cipher
551 : * and test vectors defined in recommendation for standarization
552 : * R 1323565.1.017-2018. TLS uses 1024 byte sections, we need more to have at
553 : * least one rekeying. */
554 : const struct cipher_vectors_st magma_ctr_acpkm_vectors[] = {
555 : {
556 : STR(key, key_size,
557 : "\x88\x99\xaa\xbb\xcc\xdd\xee\xff\x00\x11\x22\x33\x44\x55\x66\x77"
558 : "\xfe\xdc\xba\x98\x76\x54\x32\x10\x01\x23\x45\x67\x89\xab\xcd\xef"),
559 : STR(plaintext, plaintext_size,
560 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
561 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
562 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
563 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
564 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
565 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
566 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
567 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
568 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
569 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
570 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
571 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
572 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
573 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
574 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
575 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
576 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
577 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
578 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
579 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
580 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
581 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
582 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
583 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
584 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
585 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
586 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
587 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
588 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
589 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
590 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
591 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
592 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
593 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
594 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
595 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
596 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
597 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
598 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
599 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
600 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
601 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
602 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
603 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
604 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
605 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
606 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
607 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
608 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
609 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
610 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
611 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
612 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
613 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
614 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
615 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
616 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
617 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
618 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
619 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
620 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
621 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
622 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
623 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
624 :
625 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
626 : ),
627 : .ciphertext = (uint8_t *)
628 : "\x2a\xb8\x1d\xee\xeb\x1e\x4c\xab\x68\xe1\x04\xc4\xbd\x6b\x94\xea"
629 : "\xc0\x4d\xdb\x07\xea\x92\x8f\xa2\x22\x0d\x97\x91\x83\x20\x78\x6b"
630 : "\x17\x0d\x8e\xaf\x6e\x3c\xa1\xab\xf2\x92\x93\x9a\xb1\x19\x54\xbb"
631 : "\xd3\x3f\x07\x38\x54\x26\x56\xed\xe3\xed\x4d\x54\x42\xb3\x0d\x0d"
632 : "\x43\xa1\x2e\xe8\xcf\x83\x81\x30\xe5\x90\xf3\x71\xe6\x7a\x42\xc3"
633 : "\xf8\x75\x91\xeb\xb8\xf7\xea\x17\xb3\xc4\xec\x9f\xa0\xca\x54\xd5"
634 : "\xbc\x42\x9b\x60\xd8\x90\xce\x61\xc1\xb4\x0d\x20\x52\x45\x0a\xfa"
635 : "\x77\xb4\x83\x54\xb4\x43\x77\x11\x50\x8f\xdc\xf4\xc4\x8f\x24\x2b"
636 : "\x84\xec\x97\xc9\xc1\x76\x3c\xf3\x17\x3c\x5a\xe8\x57\x86\x41\x22"
637 : "\xb6\x5b\x57\x29\xae\x1b\xb0\x75\x06\x95\xe5\xe2\x37\x93\x3b\x5a"
638 : "\xbe\x85\x5d\xb0\x16\x70\x5b\x53\x35\x57\x52\xdb\x87\x50\x89\x34"
639 : "\xa3\xd2\x1e\xc3\x83\x03\xbd\xdc\xc1\x24\xc3\xc9\x9d\xd7\x1b\x45"
640 : "\xfb\xcb\x4e\xd5\x64\x10\x5c\xe6\xc5\x93\x4d\xa9\x9b\xea\xed\xc5"
641 : "\xf4\x02\x30\x13\xbc\x41\x97\x81\x05\xb0\xcc\x6a\x39\x83\xe9\x05"
642 : "\x25\x11\x6e\x04\x63\x14\x6d\x85\x78\x9a\x09\xa7\x0d\x4c\x7b\xd7"
643 : "\xdf\xb1\x33\xeb\xbf\xeb\x92\x58\xf3\xda\x9d\xed\x8e\xf9\x8a\x3c"
644 : "\x71\x8d\x19\x67\x1a\x12\x49\xdf\x0e\xb1\x88\x3c\x9e\xf5\x1b\x77"
645 : "\x13\x60\x80\x1a\x28\x46\xa0\x48\x31\xec\xc2\xcb\xe7\xe7\x72\xdb"
646 : "\x92\x2a\x7b\x04\xd0\xa3\xd0\x17\x8c\xb2\x4d\xb3\xa2\x43\x16\x17"
647 : "\x8d\xec\x78\xf0\xdd\xe5\x60\x07\x77\x49\x66\xad\xb3\x36\xdd\xe4"
648 : "\xc9\xef\xf7\x6d\xe4\x00\xfc\x9c\x5b\x9d\x8a\x65\x58\xbb\xbd\x5c"
649 : "\xfe\x18\xe6\x97\x83\xd1\xae\x20\xed\x12\xac\xe5\x29\x7f\x58\xab"
650 : "\x83\xea\xd2\x92\xea\x17\x00\xaf\x2b\x55\x43\x7c\x5b\x17\xf2\x91"
651 : "\x0e\x79\x0b\x95\xb4\xe0\x4a\xb0\x55\x62\xe5\x5d\xda\x55\x02\xd6"
652 : "\xa1\xea\x99\x73\x16\x59\xb3\x3e\xc9\x86\x92\x1d\xb2\x1a\xf1\x4e"
653 : "\x6b\x2e\xeb\x49\x7d\xf6\x35\xc0\x23\xae\xb5\x56\xff\x90\xe7\xc5"
654 : "\xc5\x4c\xef\xea\x8f\x9e\xf1\xc2\xd0\x1c\xee\xef\xb7\xac\x0c\x0c"
655 : "\x43\xdf\xcc\x8e\x95\xe2\xd3\xd5\x9f\x17\x81\x85\x66\x87\x7e\xdb"
656 : "\x5e\x45\xde\xb2\x45\x95\x69\x90\x75\x80\xc1\x5e\x0c\x3d\xe8\xd9"
657 : "\x9a\x17\xc5\x62\x49\x90\xa6\x54\x68\xc2\xfa\xb0\x96\xc9\xac\x42"
658 : "\x9e\xa9\x6f\x33\x0c\x5b\xc2\xc5\x81\xc1\xc5\x5d\x91\x44\xb7\x48"
659 : "\xd0\x32\xc6\x7d\x99\xa1\xad\x43\x6c\xba\xc5\xf5\x10\xbd\xf2\x44"
660 : "\x75\x36\xe8\x7e\x91\x21\x8c\x16\xce\x74\xa4\xc2\x3d\x18\x28\x1a"
661 : "\x82\x79\x04\x3e\x15\x73\x22\x30\x7a\x33\x7f\x76\x63\xbc\x9b\x0b"
662 : "\xcb\x3c\xe2\x3d\x66\x22\x28\x20\x1c\xc3\x43\x12\x89\x2d\x05\x51"
663 : "\x0b\x65\x2b\xf3\xca\x0f\x21\xd7\x57\xac\xa9\x4d\x4f\xd0\x03\x13"
664 : "\x89\x94\xec\xad\x38\x9b\x95\xaf\xf8\x0a\xc5\xb0\x8b\xb3\x57\xcd"
665 : "\xdd\xe7\xa3\xfe\x3e\x84\x35\xad\xe6\x87\x69\xd5\xb7\xc5\xf0\xde"
666 : "\xcc\xc7\x81\x59\xd7\x52\x4b\xa1\x77\x8f\xec\x6a\x9d\xcd\x0d\x08"
667 : "\xa7\xbf\x32\x6b\x5a\xa3\xc8\x4a\x0b\xde\x8c\xf8\x12\x86\xf1\x6b"
668 : "\x78\x86\xaf\xf3\x49\x78\x81\x5b\x9d\x6b\xe9\xf7\x59\xe2\x36\xea"
669 : "\xab\x40\x87\x1b\x0b\x2a\x70\x9b\x4c\x29\x3f\x3d\x5a\xfb\x09\x11"
670 : "\x9a\x39\xfc\x41\x65\xac\x64\xbd\xfd\x8b\xf3\x09\x1b\x13\xde\x38"
671 : "\x5b\x35\x0e\xce\x71\xab\x87\x99\x82\xd4\x26\x5c\x5d\x4d\x5b\xfe"
672 : "\xe8\x33\x11\x37\xf8\x3b\x16\x93\x20\xbe\x47\x68\xd9\x19\x94\x17"
673 : "\xdf\x56\xce\xbf\x82\x34\x75\x74\x7a\x39\xb3\xb5\xc3\x54\x86\x30"
674 : "\x33\x7e\xbd\xe7\xd9\x24\x18\x8f\xbf\xc1\x69\x28\x75\x37\xb6\x90"
675 : "\x2e\x4c\x71\x88\xcf\xfe\x90\xd6\xe5\x3d\xf3\xf2\x42\x8f\xee\x76"
676 : "\x00\xb8\x84\x5f\xeb\xbc\x5d\x46\xcd\xa6\x13\xaf\x3b\x37\xae\xb4"
677 : "\x82\xd5\x37\x88\x86\x94\x0f\xd8\x00\x0b\x97\x86\xa3\x91\x43\x8f"
678 : "\x05\x40\x04\xdb\x7c\x17\x5e\xbf\xf0\x07\x29\x94\x34\x04\x6b\x1f"
679 : "\x32\xa0\xa3\x30\x1a\xc8\x72\xde\xd7\x42\xfe\xb8\xe2\x2e\x6c\xe9"
680 : "\x71\x3e\xe5\x9a\x6c\x83\xc1\x75\xc2\x04\xfb\x8d\x45\x4a\x52\x7a"
681 : "\xac\xca\x87\x7a\xf3\x88\x42\x42\xfb\x40\x71\x67\xc0\xa7\xcc\x10"
682 : "\x30\x32\xc2\x7e\x3d\x93\x40\xb6\xb2\x53\xcd\xe4\x23\x4b\x5a\x99"
683 : "\x20\xfe\xe9\xef\xce\x82\xb0\x0f\x4e\x21\xa6\xc0\xad\x6a\x7b\x08"
684 : "\xb9\x33\x6b\xc2\x35\x5e\x0d\x6e\xd5\x9d\x65\xef\x70\x5d\xc7\x02"
685 : "\xa8\x4e\x5e\x80\xb1\x9c\xa8\x50\xfd\x25\x44\x0d\xe6\x78\x8c\xd9"
686 : "\x18\x01\x43\xd0\xee\x9f\xa7\x68\xd9\x37\xf3\x5e\xcb\xf6\x08\x92"
687 : "\x75\x02\x65\xee\xcf\xed\xdc\xe5\x3f\x6d\x9f\x84\x75\x39\x93\x27"
688 : "\xff\xc5\x97\x37\x6e\xc7\x60\x9c\x1d\x39\x4d\xbc\x27\xa2\xe5\x85"
689 : "\x05\xa4\x3d\x28\xce\x42\x51\x81\xd5\xcb\xbd\x83\x11\x13\x05\x93"
690 : "\x4f\x70\xb3\x97\xa9\xfa\x14\x95\x77\xc5\x1e\x40\xd0\x4d\x77\xef"
691 : "\xa8\x53\xfc\x26\x30\xd4\xfe\xda\xd0\x74\x58\x38\x21\xc0\xbb\x21"
692 :
693 : "\xd9\x6a\xf3\xcc\x57\x01\xcb\xbb\x01\x9a\x99\xe6\x4e\xaf\xf2\x32",
694 : STR(iv, iv_size,
695 : "\x12\x34\x56\x78\x00\x00\x00\x00"),
696 : }
697 : };
698 :
699 : /* Manually calculated to overcome section size differences between TLS cipher
700 : * and test vectors defined in recommendation for standarization
701 : * R 1323565.1.017-2018. TLS uses 4096 byte sections, we need more to have at
702 : * least one rekeying. */
703 : const struct cipher_vectors_st kuznyechik_ctr_acpkm_vectors[] = {
704 : {
705 : STR(key, key_size,
706 : "\x88\x99\xaa\xbb\xcc\xdd\xee\xff\x00\x11\x22\x33\x44\x55\x66\x77"
707 : "\xfe\xdc\xba\x98\x76\x54\x32\x10\x01\x23\x45\x67\x89\xab\xcd\xef"),
708 : STR(plaintext, plaintext_size,
709 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
710 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
711 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
712 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
713 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
714 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
715 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
716 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
717 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
718 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
719 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
720 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
721 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
722 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
723 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
724 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
725 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
726 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
727 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
728 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
729 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
730 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
731 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
732 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
733 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
734 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
735 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
736 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
737 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
738 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
739 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
740 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
741 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
742 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
743 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
744 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
745 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
746 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
747 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
748 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
749 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
750 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
751 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
752 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
753 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
754 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
755 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
756 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
757 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
758 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
759 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
760 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
761 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
762 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
763 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
764 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
765 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
766 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
767 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
768 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
769 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
770 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
771 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
772 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
773 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
774 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
775 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
776 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
777 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
778 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
779 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
780 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
781 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
782 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
783 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
784 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
785 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
786 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
787 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
788 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
789 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
790 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
791 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
792 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
793 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
794 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
795 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
796 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
797 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
798 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
799 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
800 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
801 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
802 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
803 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
804 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
805 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
806 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
807 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
808 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
809 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
810 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
811 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
812 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
813 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
814 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
815 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
816 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
817 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
818 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
819 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
820 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
821 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
822 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
823 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
824 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
825 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
826 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
827 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
828 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
829 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
830 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
831 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
832 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
833 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
834 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
835 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
836 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
837 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
838 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
839 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
840 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
841 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
842 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
843 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
844 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
845 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
846 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
847 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
848 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
849 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
850 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
851 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
852 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
853 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
854 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
855 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
856 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
857 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
858 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
859 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
860 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
861 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
862 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
863 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
864 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
865 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
866 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
867 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
868 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
869 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
870 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
871 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
872 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
873 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
874 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
875 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
876 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
877 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
878 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
879 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
880 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
881 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
882 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
883 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
884 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
885 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
886 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
887 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
888 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
889 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
890 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
891 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
892 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
893 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
894 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
895 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
896 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
897 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
898 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
899 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
900 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
901 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
902 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
903 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
904 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
905 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
906 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
907 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
908 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
909 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
910 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
911 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
912 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
913 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
914 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
915 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
916 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
917 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
918 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
919 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
920 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
921 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
922 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
923 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
924 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
925 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
926 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
927 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
928 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
929 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
930 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
931 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
932 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
933 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
934 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
935 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
936 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
937 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
938 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
939 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
940 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
941 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
942 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
943 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
944 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
945 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
946 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
947 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
948 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
949 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
950 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
951 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
952 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
953 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
954 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
955 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
956 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
957 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
958 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
959 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
960 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
961 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
962 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
963 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
964 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
965 :
966 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
967 : ),
968 : .ciphertext = (uint8_t *)
969 : "\xf1\x95\xd8\xbe\xc1\x0e\xd1\xdb\xd5\x7b\x5f\xa2\x40\xbd\xa1\xb8"
970 : "\x85\xee\xe7\x33\xf6\xa1\x3e\x5d\xf3\x3c\xe4\xb3\x3c\x45\xde\xe4"
971 : "\xa5\xea\xe8\x8b\xe6\x35\x6e\xd3\xd5\xe8\x77\xf1\x35\x64\xa3\xa5"
972 : "\xcb\x91\xfa\xb1\xf2\x0c\xba\xb6\xd1\xc6\xd1\x58\x20\xbd\xba\x73"
973 : "\x7e\x08\xf5\x9f\x71\xb8\x56\x08\xe3\x89\x55\xb1\x7b\x53\xed\x27"
974 : "\xee\x04\xce\x2c\x02\xae\xf0\x75\x8f\x5d\x64\x77\xea\x0a\x79\xb2"
975 : "\x9f\xc0\xb0\x9a\xf0\x93\xd5\xbf\xb9\xdf\xab\x18\x25\xf7\x51\xc9"
976 : "\x82\x69\x88\x08\x00\x2b\x35\x8e\x2c\x2f\x7c\x01\xdc\x31\x56\x1d"
977 : "\x52\xb4\xca\x07\xbf\x02\xa5\x9a\x80\x88\x91\x19\xf1\x26\x0b\x7f"
978 : "\x9d\x3e\x1c\xe5\xf9\x92\x1a\xf5\xb5\x53\xed\x1e\x1a\xdf\xdc\x53"
979 : "\x9e\x2e\x79\x65\xbd\x7b\x48\x48\x57\x58\x90\x76\x40\x57\x86\x76"
980 : "\x7d\xe3\xb2\x82\x06\xed\xeb\xce\x35\x1b\xcc\x5c\xee\x54\xe4\x3f"
981 : "\x53\x4b\xb5\x0d\x07\x0a\x2d\x0c\xb7\xcf\x7c\xf8\x81\xad\x32\x01"
982 : "\x26\x50\x0f\xe9\x32\xf3\xd7\xc9\xf0\x86\xab\xb8\xf8\xea\x72\x3a"
983 : "\x9a\x17\x48\x12\xa5\xbb\x3b\xa9\x6d\x01\x51\x82\xc0\xe2\x98\x4d"
984 : "\x69\x3c\xbd\x67\x6a\xa0\xb1\x7d\x7a\xa8\x2c\xb8\xe2\xb9\xf6\x68"
985 : "\xfa\xeb\xae\x0d\x41\xcb\xb0\xfe\xe5\x55\x65\xb6\x5d\x56\xe5\x05"
986 : "\x20\x08\x51\x77\x7c\x18\x3a\x25\x69\xaa\xa2\x39\x68\xcf\xd1\x3e"
987 : "\x51\x47\xb5\xd8\x13\xcc\xaf\x2d\x31\xd5\x28\xae\x61\x48\xe6\x9a"
988 : "\x0a\xd8\x30\x0b\x1f\x7c\xef\x3d\x32\xa5\x40\x05\x41\xdf\x84\x1e"
989 : "\xce\xde\xca\x31\x42\xa6\xc4\xbc\x2b\x56\xb7\x7e\xa6\x22\x1f\x85"
990 : "\x7b\xe8\x80\x01\xc1\xff\x78\x45\x14\xb5\x4d\x9b\xe3\x21\xf7\xb8"
991 : "\x13\xd5\x44\x3d\x6f\x33\x85\x46\x56\x07\x79\x15\xb4\xec\xe5\xfd"
992 : "\x34\x35\xc8\x8a\x5f\x4d\x58\x84\x82\x9d\xb6\x4d\x0e\x90\x65\xb0"
993 : "\x5e\x61\x83\x30\x3d\x51\x34\xe3\x0e\x6e\x78\x05\xc8\x6d\x1e\x7d"
994 : "\x76\xe2\x3d\x85\x33\x82\x42\x7c\x7d\x67\x33\xbb\x60\x5e\x4d\xb0"
995 : "\xc8\xd0\x7a\x6c\xbe\x4e\xc8\xc4\x82\x9d\xb6\x25\x56\xc9\x1b\x52"
996 : "\x3b\x9b\x4a\xf5\x8f\x67\x12\xd5\x41\x60\xe6\x97\x08\x90\x7b\x17"
997 : "\x3b\xf9\x1c\x82\x0d\x15\x0a\x3d\x1b\x27\xd4\x46\xd6\x91\x5c\x74"
998 : "\x48\x45\x1a\x4c\x60\x26\xf3\xe3\x1f\xe7\x0a\xfc\x79\x42\x8a\x5f"
999 : "\x5f\x5b\x33\xf4\xb3\xda\xbd\x4c\x4a\x10\x5e\x3b\x9d\x09\xf8\xf2"
1000 : "\x51\x25\x44\x37\x7b\xca\x88\xf0\x88\xa9\x5d\x2e\x9e\x42\xf6\xac"
1001 : "\x3d\xd6\x01\x06\x06\x5c\x96\x4b\x13\xf5\x5f\xaa\x06\x34\x16\x67"
1002 : "\xfd\xa5\x49\x12\xcc\x21\x8f\xb4\xb9\x33\xfc\x58\xf0\x36\xeb\xd7"
1003 : "\x50\xf2\x38\x39\x9e\x93\x7b\xf7\xf5\xc7\x9c\x73\x36\x1f\xbe\xa9"
1004 : "\x49\xf9\x2c\x4f\x17\xfc\xb3\x64\x51\x68\xaf\xed\xe3\x43\xbf\x2f"
1005 : "\x3f\x57\xbb\x74\x93\x51\xc4\x93\x1e\x2e\x05\xed\xda\x74\x27\x1b"
1006 : "\x7b\xa8\x98\x3e\xa6\x62\x75\xbd\x68\xab\x44\xe8\xe4\x2d\x2f\x08"
1007 : "\x44\x64\x85\xa6\x42\xfe\xdb\x11\xb5\xbc\x1a\x83\xc4\x58\x7a\xd1"
1008 : "\x0d\x64\xa2\xdb\xd5\x4c\x3a\xd7\x2a\xd8\xc7\x0b\xf5\x33\x80\xe2"
1009 : "\xaa\xc6\xaf\xad\xee\x39\x83\x1c\xfb\xda\x39\xd6\xe4\xbe\x6f\xde"
1010 : "\x46\xd1\xdc\xc8\x77\x3b\x42\x3a\x19\x83\xdb\x79\x5e\x9d\xd9\xef"
1011 : "\xe7\x54\x9e\xfa\xde\x56\x26\x0e\x33\x44\xb6\xac\xc7\x25\x1f\x0b"
1012 : "\xd0\x12\x4a\x75\x6f\xef\x9f\xb7\xe7\xf1\xc3\xb2\x77\xa7\x01\xc1"
1013 : "\x24\xf2\x60\xf2\x04\xa4\x07\x47\x25\x81\x2a\x51\x36\x1d\xb3\x42"
1014 : "\x3c\xc5\x12\xbb\x53\x89\xc3\x00\xb4\xe8\x0e\xd8\xed\x5d\x9c\x18"
1015 : "\x08\x16\x05\x57\x22\x99\xc1\xcb\x97\x4d\x7d\x42\xb0\xbf\xf3\x35"
1016 : "\x9e\xc9\xc0\x4e\xe6\x42\xec\x49\x06\x5e\x50\x7f\x6c\x86\x20\x9e"
1017 : "\xe0\x49\x6a\x1d\x50\x45\x52\x3d\x66\xdc\x66\xb2\xa1\x57\xbb\x1d"
1018 : "\x65\x30\xf9\x3e\x6c\x8b\xf8\x07\x5e\xf9\xb0\xcf\x15\x1f\xa4\x22"
1019 : "\xe6\x28\xdf\x40\x44\x27\x80\x99\xbf\xcc\x86\x94\x3d\xe1\x97\xbc"
1020 : "\x64\x7b\xc9\x8a\xc8\xb7\xdd\x8e\xd9\x95\xfa\x97\x44\x59\x70\xb6"
1021 : "\xa4\x59\xdd\x94\x2a\x4e\x71\x76\xe1\xf8\xff\x2e\xef\xf7\xf3\x26"
1022 : "\x0d\xeb\x63\x9b\x34\x74\xcf\xc7\xe4\x99\xb3\x8b\xe5\xf8\xfa\xf8"
1023 : "\x60\x6a\x8f\x16\xfe\xb3\x12\xe8\x66\x5c\x26\x61\x11\xaa\x14\x85"
1024 : "\x5e\x4c\x0f\xf8\x47\x99\x49\x4c\x22\xa5\x37\xb7\x4b\xed\x1d\x33"
1025 : "\x54\xe4\x6f\xfe\x4b\x7e\x95\x44\x56\xa9\xa9\x48\x6f\x40\x08\x42"
1026 : "\x28\xa0\xd6\x8e\x52\x72\x84\x87\xd5\xcc\x08\xf4\x34\x9b\xc7\xf7"
1027 : "\x92\xac\x5d\x5a\x30\x4c\x87\xc2\x2c\x94\x68\x10\x03\x02\x8c\x38"
1028 : "\x6e\xf6\xca\xd1\xd6\x55\x02\x3c\x3a\xf4\x21\x1c\x90\x03\x7c\x33"
1029 : "\xcd\x81\x93\x3f\x4c\xa1\xe6\x7c\x7d\x27\xaf\x97\x7a\xd8\xb0\x32"
1030 : "\xcb\x1f\xb6\x5d\xb0\x7c\x9e\xf7\x15\x6a\x29\xc9\xb3\x13\x8e\xb2"
1031 : "\x2e\xf2\x9d\xb2\x64\xe9\xc7\x13\x86\xc3\x46\x97\x9e\x53\x37\xac"
1032 : "\xd1\x75\x0b\xe2\x20\x4a\x5e\x3a\x47\xdf\xb3\x67\x78\x23\x22\xa6"
1033 : "\xb6\x69\x83\x1b\x41\xe1\xdc\xe3\xbb\x63\x8e\x6a\x70\xe2\x91\x30"
1034 : "\xa2\x48\x43\x07\x9b\xf1\x87\x9d\xd9\x2f\x36\x62\xaf\x51\x70\x10"
1035 : "\x5d\x68\x42\x6e\x95\xe6\x86\x85\x90\x08\x80\x42\xc6\x11\x7d\x38"
1036 : "\x37\x94\xc7\x7a\x9d\xec\xff\x87\x15\x0d\x30\x42\x7d\xbf\xb0\x21"
1037 : "\xa8\x28\xc3\xa9\x56\x31\xda\x2e\x91\x8d\x0d\x78\x93\xe2\x4d\x7f"
1038 : "\xb3\xdb\x87\x5b\xf2\x2a\x55\x54\xc4\x1a\x47\x9b\x51\x79\x2c\x55"
1039 : "\xaa\xaf\x57\x89\x90\x32\x26\xfa\xcf\x26\x3d\xbd\xc3\x59\x7e\x4b"
1040 : "\x53\x7a\xa3\xf8\xec\x31\x3e\x9f\x22\x33\x41\xec\xe5\xf1\x50\x41"
1041 : "\x57\x64\x37\x0e\x24\x0f\x03\x0c\x93\xaf\xd7\x44\xef\x33\xf9\x96"
1042 : "\x8e\x63\x9c\x79\x09\xdf\x58\xdb\xcd\xd2\xf2\x81\xed\x97\x28\x5e"
1043 : "\x6d\x99\x45\xad\xf1\xa4\xe8\x59\xaa\xeb\x59\xbd\xfa\x54\x27\xe2"
1044 : "\x01\x6d\xfa\x08\xe5\x1a\x46\x92\x31\xa0\xfd\x2e\x25\x21\x5e\x9d"
1045 : "\x1d\x41\x82\x16\x21\xea\xe8\x29\x5a\xe7\xd4\xd8\x7c\x91\x6d\xa8"
1046 : "\x69\xa8\x6b\xac\xf9\x3d\x2c\x07\xfa\xaf\x65\x5e\x84\x63\x5c\x1c"
1047 : "\xb6\x71\x1c\x6e\x1a\x1a\xcf\x5f\x39\x08\x02\xeb\xde\x75\x28\x44"
1048 : "\x90\x3b\x6d\x09\xf5\xa4\x3a\x00\x99\xc1\x6e\xb8\x23\x47\xb6\xe6"
1049 : "\x44\x69\x24\x86\x0d\x93\x7d\xc2\x1a\xe7\xf8\x97\x97\x6d\x2f\x7d"
1050 : "\x6a\x3e\xd7\x6d\x94\xbe\x9b\xfa\x7d\x40\xff\x35\x7e\x2d\x9c\x50"
1051 : "\x71\xf8\x99\x5f\xf3\x53\x16\x59\x77\x72\x4b\xef\x8d\x21\x8c\x28"
1052 : "\x15\x8a\x57\x6d\x3d\x35\xf4\x2c\x37\x39\x0e\x97\x8f\xd3\x45\x17"
1053 : "\xac\x0b\xa2\xaa\x16\xe7\x98\x70\xbd\x91\x4b\x7b\xc9\x14\x5b\x85"
1054 : "\x29\xe5\xd9\x20\xa6\xf3\x89\x63\xc8\x01\x94\x2c\x20\xb0\xf1\x1c"
1055 : "\x61\x90\x5b\xe8\xaf\xdb\xe2\x20\x62\x4f\xd0\x3c\x51\x1f\x5f\x14"
1056 : "\x28\x13\x07\x5e\xbc\x4a\xa0\x46\xa7\x9c\xc7\x00\x24\xb4\x67\x0d"
1057 : "\x9c\xe8\x05\xa7\xe3\x37\x94\xd3\x97\xc5\xd6\x1d\xb3\x79\x0c\x7f"
1058 : "\xf0\xeb\x68\xa7\xa9\x75\x30\x3c\xf1\xf8\xfb\x96\x4b\xa5\x99\xb1"
1059 : "\xf0\x71\xab\xb4\x8a\xa6\x5d\x97\xb5\x6f\x42\x81\xef\x38\x0e\x41"
1060 : "\x21\xcd\x15\xe4\xf1\xdc\x02\xc2\xe5\xe4\xb2\xf2\xdb\xc5\x42\x0f"
1061 : "\xeb\x00\xb8\x49\x48\x90\x97\x59\x69\x8c\x3d\x90\xfa\x7f\xaf\x75"
1062 : "\xff\xe8\x0f\xff\x13\x2f\x7a\xca\x33\xbc\xb0\x41\x7b\xd4\x94\xce"
1063 : "\xd5\xd7\x53\xe5\x36\x9d\xea\x0c\x13\x60\x63\xd9\x79\x83\x53\x03"
1064 : "\x3c\x5f\x33\x6b\x16\xd2\xd6\x07\xbd\xbc\xa9\xcd\xd6\x21\x58\x8a"
1065 : "\x90\xac\x85\x7c\x0a\x85\xf1\x02\xfd\x6c\x5b\xac\x92\xa5\x6f\xfc"
1066 : "\x02\x60\xb3\x05\x91\x31\x80\xd5\x75\x82\xa8\xab\xcc\x7b\x47\xdb"
1067 : "\x79\xaf\x85\xea\x75\x2d\xf4\x46\x45\xa6\x24\x35\x2d\xba\x9e\x19"
1068 : "\x4e\x48\xb3\x5f\x40\x96\x6c\x73\x44\x09\x67\x27\xee\xdb\xdb\xca"
1069 : "\xf6\x14\x3f\x32\xdf\x3b\xd3\xcb\x87\x48\x6b\x03\xda\xfe\xb5\x20"
1070 : "\xf8\x72\xd0\xe4\x65\xfd\x14\x5d\x9b\xd3\xc5\x67\x4b\x41\xf4\xcb"
1071 : "\xac\xe4\xce\x61\xe0\x06\x8e\xb6\xca\xef\xa5\xe4\x70\xd4\xff\x4f"
1072 : "\x4c\x81\xb7\xc7\xc1\xe3\x1d\x6b\xfe\x44\x37\xfe\x7e\xb4\xec\xda"
1073 : "\x55\xbc\x26\xdd\x44\x08\x28\x49\x19\xc9\x52\x20\x4a\x5e\xe1\xae"
1074 : "\x6b\x87\x35\xa2\x9a\x02\x17\xb0\x74\xe1\x19\x92\xca\x5d\x34\x81"
1075 : "\xd7\x3f\xb1\x14\xe2\x44\x97\x7f\xab\x0a\xc3\x44\x8d\x9c\xe6\x27"
1076 : "\x84\x5e\x2e\xe1\x0e\x7b\x74\xee\x47\xe2\x6f\x79\x3a\x0d\x25\x90"
1077 : "\x9b\x32\x13\x78\xd3\xd1\x19\x10\xb7\x88\xc4\xb4\xb8\x0f\x84\x0c"
1078 : "\xc4\x6d\xb3\xbc\xbc\xea\x1d\x84\xfe\x6f\x95\x1e\x44\x78\xbb\x73"
1079 : "\xd0\x08\x8b\xbe\xae\x91\x6f\x84\xeb\x6c\x05\x58\x3a\xb7\x68\xee"
1080 : "\x62\x14\x0b\xba\xd3\xd6\x78\x23\x35\x03\x2f\xed\xac\xf2\x35\xa7"
1081 : "\x0b\xf5\x37\xa1\xa5\x4d\x57\x0e\x2e\x5e\x0d\x0c\xd6\x04\xc8\x07"
1082 : "\x60\xe6\xda\xd9\x55\x16\xf6\xc6\x0c\x53\xc0\x46\xa8\x91\xa6\xdd"
1083 : "\x22\x99\x88\x9f\x23\x93\x64\x81\xdb\x4b\xe8\x99\x1e\x16\x5c\xb5"
1084 : "\x08\xc0\x74\xf9\x79\xd3\xc1\x6a\xe5\x38\x6b\xcd\xf0\xcb\x1e\xb8"
1085 : "\x5c\x6b\x14\xd6\x85\x58\xa3\xc8\x3d\x5b\x14\x50\xc4\x70\x97\xb2"
1086 : "\xcd\x93\xd6\x3a\x42\x2f\x3a\x88\x28\x8a\xd0\xa7\xe9\x98\x87\xbe"
1087 : "\x66\x89\x69\xd9\xbd\x11\x91\xd3\x9b\xc4\x22\x14\xe6\x8f\xc8\xbd"
1088 : "\x95\x5d\x3d\xd2\x1d\x10\xbd\x61\x69\x87\xf9\x4a\x9c\x61\x5b\x80"
1089 : "\x9b\x3f\x32\xce\x17\xcd\x98\x79\xb9\xeb\x45\xf7\x54\x3c\xc9\xa6"
1090 : "\x2e\xb4\x0b\x0d\x84\x0d\x35\xcc\x64\x5f\x5a\x92\xf8\xcb\xd6\xfa"
1091 : "\xae\xd9\xce\x9c\x41\x83\xc2\xab\xd5\x73\x21\xea\x95\xd5\x73\x2f"
1092 : "\xf1\xd0\x71\x95\x45\x07\x7c\x1f\xcc\xba\xf3\xb0\x75\xfa\x1a\xd4"
1093 : "\x89\x66\x4e\x93\x93\x80\xb7\x67\xd5\xdf\x99\xd8\x43\x6d\xf6\xde"
1094 : "\x19\xc8\x13\x56\xf8\x63\xe5\xf2\x53\xfd\x2e\x62\x8d\xde\x92\xd4"
1095 : "\x98\xfc\x1c\x36\x08\x3d\x33\x0f\xee\xbc\xb8\x2f\x49\xa2\xb3\xb4"
1096 : "\x9b\x0c\x7e\x16\xd4\xe8\xc0\x98\xd0\x5c\xda\x25\xaa\xe4\x60\x95"
1097 : "\xe6\xc5\x7b\x62\xa5\xe9\xbc\xa1\x5e\x11\x4f\x5d\xb4\x19\x29\x33"
1098 : "\x6f\xff\xf4\xef\x7f\x62\x2b\xf2\xbd\x47\x90\xcb\xba\xbc\xe8\xa8"
1099 : "\xd7\xcf\xac\x44\x05\x67\xf3\xd3\x93\x22\xc0\x48\x23\xdf\xef\x54"
1100 : "\x3d\x64\xc7\x13\xfd\x4f\x0a\x21\x20\x2b\xad\x34\x88\x02\x69\x84"
1101 : "\xaf\x8a\xfb\xbb\x97\x7d\xca\x0e\x80\xdc\x8a\x50\x51\x49\xc8\x1f"
1102 : "\xbd\x35\x46\x11\xf6\xdf\x52\x29\xc2\x52\xc4\xae\xd5\x16\xbb\x67"
1103 : "\x21\x7b\x25\xeb\xc4\x21\x0d\xc7\x3f\x1b\xae\x42\xc2\x21\x58\x1e"
1104 : "\x32\x46\x0d\x72\x15\x89\x75\xaa\xd9\x0b\x2d\xa7\x25\x3a\x2a\x3d"
1105 : "\xc6\x46\xd1\xa3\x9d\xed\x52\xd8\xbb\x53\xb9\x1f\x6d\xfc\x63\xb7"
1106 : "\x28\xa1\x78\x78\x18\x43\xa2\x3d\x6f\xcd\x6a\x40\x6a\xc2\x44\x88"
1107 : "\x59\x03\xdd\xd3\x47\x8d\x3d\xe2\x24\xc2\x11\x00\xb1\x2e\xc7\x24"
1108 : "\x81\x4b\xc0\x9c\x90\x64\xb7\x8b\xfb\x3a\xdc\x69\xe1\x4c\xf4\xc4"
1109 : "\xc7\x78\x5a\xca\xf8\x6f\x16\xa0\xb8\xe3\xb0\x66\x94\xab\x7a\x86"
1110 : "\x5c\xa8\xb9\x7f\xf7\x6a\x64\x1d\x8f\x03\xcf\x4b\x4b\xb0\xd8\xc2"
1111 : "\xc2\xea\x02\x5a\xaa\x14\x19\x8f\x60\x49\x5b\xf4\x05\xc8\x98\x30"
1112 : "\xeb\xbc\x00\x12\xa4\xc0\x27\x5f\x38\x91\x89\x73\xfa\xb7\xc1\x3a"
1113 : "\xf4\x7c\x18\xe4\xe7\x7f\x8c\x82\x51\xb0\x64\x2b\x9d\xa3\x98\x47"
1114 : "\x67\xe4\x0f\x1f\x30\x8e\x78\x0a\x3e\xc4\xa8\xc4\x1c\x79\x0a\x09"
1115 : "\x91\xbd\xa1\x6a\xab\x47\xce\x54\x24\xda\x4b\xa6\x7b\x40\x43\x92"
1116 : "\xd5\x43\xbb\x50\x53\x54\x1d\xf0\x0c\x87\x01\xc0\x82\x0a\xf0\xd8"
1117 : "\x7d\xd7\x22\xfc\x33\x59\xf7\x54\x87\x5c\x45\xc8\x2d\x92\x6d\x3a"
1118 : "\xfc\x90\x03\xa9\x23\xa8\xa3\xa5\x00\x3d\x3f\x7d\x9f\x6c\x7a\xba"
1119 : "\xdd\xff\xfd\x09\x04\x9b\x82\xea\x9f\x0e\x05\x92\xed\x08\x24\x1d"
1120 : "\x00\xfa\xac\x61\xf0\xe7\xc7\x37\x7e\x0d\x73\x38\x3e\x7a\x63\xcb"
1121 : "\x4e\x26\x21\xd6\x50\x12\xe4\x95\x1e\xc7\xd0\xed\xcb\xf9\xbf\x1d"
1122 : "\x34\x81\x81\xa4\x0e\xeb\xf6\xe8\xc5\x1e\x98\xca\x79\xad\x15\x3c"
1123 : "\xdc\xf5\xe3\xa9\xfe\xe9\x4c\x6a\xc5\x79\x55\x89\x18\xf2\xd1\x86"
1124 : "\x4e\xd6\x95\x38\xf8\x78\x0b\xfc\x50\x40\x72\xd4\x3c\x45\xdf\xaa"
1125 : "\x13\x1e\x9e\x74\xff\xde\xa9\x33\x5e\xa8\xa1\x70\x75\xd7\x7c\x4f"
1126 : "\x71\xf1\x03\xb3\xfb\x0f\xad\x19\x4f\x5d\xfe\xbb\xc5\x98\x81\x11"
1127 : "\xee\x24\x24\x13\xa4\xa4\xfe\x40\x4b\x20\x38\x61\x6e\xe3\xec\x05"
1128 : "\x15\x46\x35\x2d\xd4\x61\x7d\x0f\x4a\x34\xf1\x23\x87\x5e\xc6\x8e"
1129 : "\xf5\x77\x8c\x03\x4b\x58\xe2\x3b\x35\x08\x2f\x40\x60\xd6\xe3\x3a"
1130 : "\xf0\xb4\xdd\xb9\x18\xfc\x7d\x79\x7a\xf3\x0a\x5c\x89\x2e\xcc\x30"
1131 : "\x9b\x8f\x7e\x3c\xd3\x1d\x45\xcb\xfb\xb5\x09\xe8\x6e\xd4\x87\xb0"
1132 : "\xc5\x5c\x0e\x70\xec\xd9\x04\xb2\xc1\x44\x9b\x78\x4f\x46\x92\x4b"
1133 : "\x18\x0b\x90\xaa\xe3\xf9\x11\x8d\xf8\x9e\x5e\xc6\x2e\xfb\x9f\xba"
1134 : "\x31\x49\x9e\x9d\xb7\xb8\x5c\x0b\x09\xcf\x45\xb0\x82\x9d\x6a\xd7"
1135 : "\xeb\x1d\x79\x6f\x26\x1a\xec\x5d\x16\xb1\xa8\xc5\x90\x00\x9a\x79"
1136 : "\x51\x9b\xab\x79\x09\xa1\x7f\x65\x74\xa0\xf8\x54\xfd\xf3\x74\x52"
1137 : "\x80\x09\x25\x33\xa4\xd5\x22\xba\x79\xc0\x77\xe0\x56\xfb\x19\xa9"
1138 : "\x8f\x23\x16\x29\xa9\x39\x54\x10\x0d\x85\xb9\x20\xd3\x27\xa2\x7d"
1139 : "\xe4\x81\x9e\x0a\x4a\xc4\xf6\xef\xc7\x0b\xb8\x6a\x50\xa9\xed\x72"
1140 : "\xb4\x79\x01\xf3\xc3\x89\x5d\x19\x5e\x9a\xf1\x35\x14\xcc\x04\x4c"
1141 : "\x2d\xe5\x0f\xd8\x07\xee\x50\xee\x3f\xaf\x74\x86\xcd\xc5\xf8\x34"
1142 : "\x0f\xeb\x32\x7f\x36\xcc\x03\xa8\xbc\xde\xd9\xf8\xfc\x01\x73\x83"
1143 : "\x74\x4a\x26\xdc\x70\x1a\x76\x71\x5a\xee\xac\x0b\xe0\xdb\x16\xd4"
1144 : "\x26\x7c\xfb\xb8\x96\x74\x00\x7d\xb8\x5c\x4a\x07\xfc\x9e\xc9\xff"
1145 : "\x4a\xd0\xaf\x86\x4b\xb0\xc6\x29\x8e\x3f\x2e\x9f\xa0\x33\xd3\xdf"
1146 : "\xb9\xe0\xd5\x48\xb9\xf0\x08\x7e\xae\xdd\xd0\x2e\xf5\x41\xd8\xa3"
1147 : "\x9a\xff\x76\x93\x04\x7a\xef\xd2\xf5\xb8\x05\xa1\x55\x8e\xe8\x03"
1148 : "\x9f\x6e\xd9\xc4\x75\xd0\xfe\x75\xd1\x77\x3f\x22\xbe\x2e\xc7\x27"
1149 : "\x10\x4e\x2c\xab\x2f\x38\x53\xcb\xe7\x27\x9d\xff\xd8\x86\xb7\xca"
1150 : "\xc1\x7e\xeb\x23\xd8\x8f\x5e\x85\xa3\x2a\xa3\xe6\xc8\x8f\x71\x30"
1151 : "\x98\x91\x1d\x11\x8d\x76\xdf\x42\xe8\x72\x6b\x41\x3a\x70\x46\x26"
1152 : "\x78\x16\xc8\x6a\x21\x66\x81\xdc\xec\xac\x3e\x5d\x8a\x9a\x01\x03"
1153 : "\xee\xee\x0a\x34\x1a\xad\xdc\xc9\x4f\x3d\x22\x3b\x48\x67\x43\x7d"
1154 : "\x7e\x53\x08\x91\x26\xbf\x7d\x60\x4a\xf4\xfb\x21\xcf\x74\xc9\xc6"
1155 : "\x47\x9b\x39\x58\x61\xde\x5d\x3c\xbe\x60\x2e\x2b\x6c\x08\x42\x3e"
1156 : "\xe3\x03\x76\x6d\xa8\xac\xba\x11\xb2\xce\x0f\xdb\x95\x6a\x33\xf4"
1157 : "\x00\xc9\x66\x13\xd4\x5f\xab\xe7\x1b\x17\x62\xa1\xe6\x4a\x82\x67"
1158 : "\x28\xa3\x7b\xf7\x4b\xfc\x57\xcb\x16\x3e\xfe\xb5\xa4\xef\x3b\x35"
1159 : "\xdd\x14\xd5\x48\x41\x5e\xa5\x62\xcc\x18\xba\x97\x6c\x75\xe9\x39"
1160 : "\x63\xd4\x9d\xce\x2d\x9d\x4c\xc3\x82\xb1\x31\x69\x91\x90\x3e\x6d"
1161 : "\x66\xc7\xea\xd3\x88\x02\xd3\x39\x10\x22\x04\x1a\xbf\xc5\x0d\x02"
1162 : "\xb8\x7c\x9a\x86\xc5\x04\x87\xef\xaf\x75\xe5\xc7\xe6\x21\xba\xa1"
1163 : "\xbd\x9c\x14\x90\xc3\x99\x80\xbb\x61\xe3\xe2\xc1\x79\xf0\xc6\x46"
1164 : "\x4f\x38\x86\x35\x93\x1a\x55\xd8\x76\x0f\x7c\xa2\xae\x3b\x6a\xa8"
1165 : "\xe4\x74\x74\xc2\x50\x38\xcf\xc5\xda\x85\xee\xe0\x2f\x23\x1a\x83"
1166 : "\x17\x54\xa7\x34\xa0\x1f\xd7\xd3\xb2\x53\xe3\x77\xfe\x8e\x97\x49"
1167 : "\xc5\x5b\xe0\x5f\xcb\x2c\x90\xe9\x09\x83\x40\x89\x81\x51\xf6\x40"
1168 : "\x64\x2c\x89\xca\xcf\x61\xda\x04\x0d\xaf\x3b\x48\xf9\x8a\xfa\x74"
1169 : "\x6a\x6a\xe5\x29\x5e\x3a\x6b\xee\xb5\x5e\xa3\x0c\x78\xf1\xe0\xcb"
1170 : "\x74\x69\x2c\x7b\xf6\x73\xc1\x53\x20\x8c\x15\x54\x03\x5d\x96\xe3"
1171 : "\x6a\x8d\x19\x5d\xec\x5a\xd4\xe3\x6b\x1a\x72\x27\x73\x73\xbb\x2e"
1172 : "\x7c\x4e\xbb\x63\x26\xdb\x9d\x9c\xde\x67\xd8\x50\x7c\x85\x1a\xff"
1173 : "\xf0\xd0\x12\x4d\x3e\x69\xb1\x2d\x2a\xd1\x28\x4a\xc9\x82\x1e\xd5"
1174 : "\xfc\xa3\x64\x0b\x2f\xcc\x4c\xef\x17\xa6\xe5\x0b\xd5\x76\xb4\x33"
1175 : "\xff\x3b\x3d\xc3\xb0\x28\xf7\x38\xf5\x7a\x76\x2c\x84\xf7\xcc\x4f"
1176 : "\x3a\xdf\x68\xab\xbc\x6b\x24\xac\x84\x8a\x09\x5e\x0d\x89\x9d\x85"
1177 : "\x98\xf5\x61\x60\x38\xb0\xdd\x86\xe1\xb5\x42\xa0\x6c\x25\x77\x28"
1178 : "\x8f\xf1\x21\xb3\xa8\xed\x8c\xfd\x18\xcf\x23\xae\x2a\x9f\x1c\x67"
1179 : "\xc3\x17\x48\x73\x3b\x6e\xbf\x02\x88\xed\x4d\xa2\x86\x07\x6a\x5d"
1180 : "\x16\x55\x3b\x87\x29\x88\xd0\x8d\xe3\x30\x3b\x89\x22\x5c\xa2\xb6"
1181 : "\xbb\xcf\xda\xd8\x1f\xe4\x7f\xa5\x50\xb9\x8b\xc2\x61\x73\x86\x61"
1182 : "\x92\x44\x1b\xc2\x9d\x34\x72\x81\x30\xca\x22\x83\x78\xe0\xa5\xb5"
1183 : "\x39\xba\xa3\x46\x7a\x4c\xd9\x2b\x5e\xaf\x42\xdf\xba\x80\x4a\x83"
1184 : "\x9c\x20\xe0\x86\x90\x88\x4e\xbf\x7b\xa6\x44\x3d\x7f\x9c\xbe\xc8"
1185 : "\xdf\x74\xe8\x2c\xf7\x4b\xc0\x06\x3f\x9e\x23\x30\xe8\x31\xc6\x07"
1186 : "\x5b\xc9\x26\xf1\x1c\xc8\xbe\xe3\xc7\xcb\x4f\x1b\x37\x09\xf0\xcf"
1187 : "\x0c\x5e\x1d\xac\x1c\xb8\x91\xcf\x0a\x54\x09\x6c\xa9\x4e\x9f\xa1"
1188 : "\x36\xde\x41\xa8\x67\xe4\x4c\x65\xc9\x28\x20\x0f\xbd\x49\x74\x7f"
1189 : "\x83\x26\x48\xb1\xe6\xca\x6f\xd8\x88\x27\x94\xdd\xa4\xaa\x03\x43"
1190 : "\xc6\x19\xab\x8b\x83\x78\x4f\x2a\x51\x34\x98\xff\x27\x6b\xda\x39"
1191 : "\xe4\x2e\xf6\xe9\xe7\xd6\x96\x86\x60\x3b\xc3\x80\xb8\xba\x51\x77"
1192 : "\x8a\x79\x07\x62\xb1\xaa\xa9\x58\x96\x54\x84\x04\x9e\xee\x24\x8d"
1193 : "\xf1\xac\x34\x03\x43\x8e\xd0\x92\xdc\x4d\xbc\xc7\x15\xdc\x82\xfc"
1194 : "\x19\x9b\x7e\x43\xe1\x36\xc5\x6b\xfb\xb8\x9e\xf4\x22\x5e\x29\x6f"
1195 : "\x4c\x45\xdd\xfe\xcb\x17\x77\xee\xd3\x6b\x80\x50\x96\xd0\x07\xa3"
1196 : "\xb2\xf0\x68\xc7\x40\xeb\x24\x16\x23\xa7\x57\xc4\xbb\x9c\x69\x16"
1197 : "\x49\x30\xb8\xd9\x4d\x41\x4e\x22\xc6\x24\x7f\x44\x59\x4e\x3c\x46"
1198 : "\x61\x64\x60\xc5\x82\xc2\x60\xc5\x63\xe7\xb3\xe1\xb9\xd1\x71\x65"
1199 : "\x32\xaa\x88\xa1\x4e\x98\xdb\x0b\x29\xe8\x5a\xa4\xbc\x61\x20\x62"
1200 : "\xbc\xea\xb0\x90\x3c\x2f\x29\xef\x74\x87\x4b\x1b\x36\xf7\x01\xde"
1201 : "\x30\xf0\x00\xe3\xd7\x2d\xf6\x52\x09\xe1\xe5\x84\x13\x04\xfe\x1f"
1202 : "\x2c\x1c\xeb\xfb\x2c\x40\x7d\x4d\xf5\x9c\x6e\x47\xe9\x2d\xb0\xca"
1203 : "\x88\x37\xf4\x8d\xbe\x50\xfb\xec\x5e\xee\x5d\x0f\x1a\x71\x42\xe3"
1204 : "\xc0\x9c\x57\xe3\x50\xba\x98\x0d\x79\xfa\x56\xe9\x7a\x09\x03\x75"
1205 : "\x21\x0f\x97\x69\xe0\xed\x9d\x10\x8f\x64\xdd\xd5\x10\xdc\x3b\x21"
1206 : "\x08\xc2\x7e\x7e\xac\x6e\x7c\x0b\xb9\x71\x65\x3e\xfa\x1c\xf3\x13"
1207 : "\xdc\x03\x9c\xf2\xa4\x21\xf1\xfc\x07\xaa\xef\xa0\x55\xd7\x21\xfc"
1208 : "\x0c\x17\x6a\x06\x57\x6b\x0e\x8e\x1d\xea\xb2\xc8\x23\xb3\xad\x42"
1209 : "\x00\x41\xe2\x9c\x1f\x2e\xa8\x51\x19\x3d\xdb\x24\x73\x4a\x8f\x08"
1210 : "\x74\xb5\x6b\x58\x48\x7a\x4e\x7b\xa6\x5c\x4b\x81\xd6\x38\xf9\xe5"
1211 : "\x66\xe3\x15\x9a\x74\x49\x68\x8e\x5b\x1e\xdd\x3f\x4f\xc8\xe3\x0c"
1212 : "\x73\x32\xf0\x35\x16\x8c\xd9\x84\xc3\x9a\x65\x16\x93\x65\x0f\x47"
1213 : "\x15\x97\xc8\xb4\x6a\x7f\x91\x0a\x05\xf2\x08\x36\xf0\x7e\x2c\xcb"
1214 : "\x79\xc4\xc4\xcb\x5a\xa0\x25\xc9\xe9\xac\x35\x8f\x56\xf6\x87\x4e"
1215 : "\x9b\x4b\x9d\x1a\x38\xb0\x43\x41\x94\x07\x17\x78\xec\xd3\x8c\x89"
1216 : "\x58\x09\xef\x07\xe1\xd8\x65\x97\x3e\xce\x61\xad\x51\x0a\x48\x3d"
1217 : "\x64\xd5\x6e\xa1\xe5\x86\x06\xb7\x22\xcd\x03\x44\xec\x94\x52\x15"
1218 : "\x5d\xf6\x9b\xc6\xb6\x22\x49\x5e\xb1\xdb\x01\x24\xd2\xc2\xac\x13"
1219 : "\xdc\xec\xb3\x93\x4c\x88\x3b\x11\x6d\x77\xab\x44\x67\x8c\xca\xa8"
1220 : "\x18\x47\xe3\xdc\x58\x13\x45\x43\xb3\x7f\xdf\x3a\xdf\xef\x0e\x4f"
1221 : "\xc0\xf3\x95\xb6\x7d\xdf\x97\xd7\x0d\x03\x9d\x14\x76\xd6\xae\x5f"
1222 : "\xb4\x13\x7f\x2a\xdb\x00\xa2\xe7\xfd\x33\xa6\x4d\x3f\xc1\x14\x58"
1223 : "\x7c\x55\x30\x6a\xae\x71\x0f\x73\xe3\x64\x1f\xc5\x2e\x6f\x82\x82"
1224 : "\x62\xd2\x02\xde\xf8\x29\x1e\xd5\x71\x3a\xbe\xcd\x43\xf8\x71\x5e"
1225 : "\xa1\xce\x68\xca\xcb\x23\xfa\x83\xba\xc2\x0f\x9b\x6b\x86\x5d\x9f",
1226 : STR(iv, iv_size,
1227 : "\x12\x34\x56\x78\x90\xab\xce\xf0\x00\x00\x00\x00\x00\x00\x00\x00"),
1228 : }
1229 : };
1230 :
1231 : const struct cipher_vectors_st aes128_xts_vectors[] = {
1232 : {
1233 : STR(key, key_size,
1234 : "\xa1\xb9\x0c\xba\x3f\x06\xac\x35\x3b\x2c\x34\x38\x76\x08\x17\x62"
1235 : "\x09\x09\x23\x02\x6e\x91\x77\x18\x15\xf2\x9d\xab\x01\x93\x2f\x2f"),
1236 : STR(plaintext, plaintext_size,
1237 : "\xeb\xab\xce\x95\xb1\x4d\x3c\x8d\x6f\xb3\x50\x39\x07\x90\x31\x1c"),
1238 : .ciphertext = (uint8_t *)
1239 : "\x77\x8a\xe8\xb4\x3c\xb9\x8d\x5a\x82\x50\x81\xd5\xbe\x47\x1c\x63",
1240 : STR(iv, iv_size,
1241 : "\x4f\xae\xf7\x11\x7c\xda\x59\xc6\x6e\x4b\x92\x01\x3e\x76\x8a\xd5"),
1242 : },
1243 : {
1244 : STR(key, key_size,
1245 : "\x75\x03\x72\xc3\xd8\x2f\x63\x38\x28\x67\xbe\x66\x62\xac\xfa\x4a"
1246 : "\x25\x9b\xe3\xfa\x9b\xc6\x62\xa1\x15\x4f\xfa\xae\xd8\xb4\x48\xa5"),
1247 : STR(plaintext, plaintext_size,
1248 : "\xd8\xe3\xa5\x65\x59\xa4\x36\xce\x0d\x8b\x21\x2c\x80\xa8\x8b\x23"
1249 : "\xaf\x62\xb0\xe5\x98\xf2\x08\xe0\x3c\x1f\x2e\x9f\xa5\x63\xa5\x4b"),
1250 : .ciphertext = (uint8_t *)
1251 : "\x49\x5f\x78\x55\x53\x5e\xfd\x13\x34\x64\xdc\x9a\x9a\xbf\x8a\x0f"
1252 : "\x28\xfa\xcb\xce\x21\xbd\x3c\x22\x17\x8e\xc4\x89\xb7\x99\xe4\x91",
1253 : STR(iv, iv_size,
1254 : "\x93\xa2\x92\x54\xc4\x7e\x42\x60\x66\x96\x21\x30\x7d\x4f\x5c\xd3"),
1255 : },
1256 : };
1257 :
1258 : const struct cipher_vectors_st aes256_xts_vectors[] = {
1259 : {
1260 : STR(key, key_size,
1261 : "\x1e\xa6\x61\xc5\x8d\x94\x3a\x0e\x48\x01\xe4\x2f\x4b\x09\x47\x14"
1262 : "\x9e\x7f\x9f\x8e\x3e\x68\xd0\xc7\x50\x52\x10\xbd\x31\x1a\x0e\x7c"
1263 : "\xd6\xe1\x3f\xfd\xf2\x41\x8d\x8d\x19\x11\xc0\x04\xcd\xa5\x8d\xa3"
1264 : "\xd6\x19\xb7\xe2\xb9\x14\x1e\x58\x31\x8e\xea\x39\x2c\xf4\x1b\x08"),
1265 : STR(plaintext, plaintext_size,
1266 : "\x2e\xed\xea\x52\xcd\x82\x15\xe1\xac\xc6\x47\xe8\x10\xbb\xc3\x64"
1267 : "\x2e\x87\x28\x7f\x8d\x2e\x57\xe3\x6c\x0a\x24\xfb\xc1\x2a\x20\x2e"),
1268 : .ciphertext = (uint8_t *)
1269 : "\xcb\xaa\xd0\xe2\xf6\xce\xa3\xf5\x0b\x37\xf9\x34\xd4\x6a\x9b\x13"
1270 : "\x0b\x9d\x54\xf0\x7e\x34\xf3\x6a\xf7\x93\xe8\x6f\x73\xc6\xd7\xdb",
1271 : STR(iv, iv_size,
1272 : "\xad\xf8\xd9\x26\x27\x46\x4a\xd2\xf0\x42\x8e\x84\xa9\xf8\x75\x64"),
1273 : },
1274 : };
1275 :
1276 : const struct cipher_aead_vectors_st aes128_siv_vectors[] = {
1277 : {
1278 : STR(key, key_size,
1279 : "\x7f\x7e\x7d\x7c\x7b\x7a\x79\x78\x77\x76\x75\x74\x73\x72\x71\x70"
1280 : "\x40\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f"),
1281 : STR(auth, auth_size,
1282 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xdd\xee\xff"
1283 : "\xde\xad\xda\xda\xde\xad\xda\xda\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
1284 : "\x77\x66\x55\x44\x33\x22\x11\x00"),
1285 : STR(plaintext, plaintext_size,
1286 : "\x74\x68\x69\x73\x20\x69\x73\x20\x73\x6f\x6d\x65\x20\x70\x6c\x61"
1287 : "\x69\x6e\x74\x65\x78\x74\x20\x74\x6f\x20\x65\x6e\x63\x72\x79\x70"
1288 : "\x74\x20\x75\x73\x69\x6e\x67\x20\x53\x49\x56\x2d\x41\x45\x53"),
1289 : .ciphertext = (uint8_t *)
1290 : "\xa4\xff\xb8\x7f\xdb\xa9\x7c\x89\x44\xa6\x23\x25\xf1\x33\xb4\xe0"
1291 : "\x1c\xa5\x52\x76\xe2\x26\x1c\x1a\x1d\x1d\x42\x48\xd1\xda\x30\xba"
1292 : "\x52\xb9\xc8\xd7\x95\x5d\x65\xc8\xd2\xce\x6e\xb7\xe3\x67\xd0",
1293 : STR(iv, iv_size,
1294 : "\x02\x03\x04"),
1295 : .tag_size = 16,
1296 : .tag = (void *)
1297 : "\xf1\xdb\xa3\x3d\xe5\xb3\x36\x9e\x88\x3f\x67\xb6\xfc\x82\x3c\xee",
1298 : .tag_prepended = 1,
1299 : }
1300 : };
1301 :
1302 : const struct cipher_aead_vectors_st aes256_siv_vectors[] = {
1303 : {
1304 : STR(key, key_size,
1305 : "\xc2\x7d\xf2\xfd\xae\xc3\x5d\x4a\x2a\x41\x2a\x50\xc3\xe8\xc4\x7d"
1306 : "\x2d\x56\x8e\x91\xa3\x8e\x54\x14\x8a\xbd\xc0\xb6\xe8\x6c\xaf\x87"
1307 : "\x69\x5c\x0a\x8a\xdf\x4c\x5f\x8e\xb2\xc6\xc8\xb1\x36\x52\x98\x64"
1308 : "\xf3\xb8\x4b\x3a\xe8\xe3\x67\x6c\xe7\x60\xc4\x61\xf3\xa1\x3e\x83"),
1309 : STR(auth, auth_size,
1310 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xdd\xee\xff"
1311 : "\xde\xad\xda\xda\xde\xad\xda\xda\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
1312 : "\x77\x66\x55\x44\x33\x22\x11\x00"),
1313 : STR(plaintext, plaintext_size,
1314 : "\x74\x68\x69\x73\x20\x69\x73\x20\x73\x6f\x6d\x65\x20\x70\x6c\x61"
1315 : "\x69\x6e\x74\x65\x78\x74\x20\x74\x6f\x20\x65\x6e\x63\x72\x79\x70"
1316 : "\x74\x20\x75\x73\x69\x6e\x67\x20\x53\x49\x56\x2d\x41\x45\x53"),
1317 : .ciphertext = (uint8_t *)
1318 : "\x50\x93\x3d\xa8\x04\x7b\xc3\x06\xfa\xba\xf0\xc3\xd9\xfa\x84\x71"
1319 : "\xc7\x0a\x7d\xef\x39\xa2\xf9\x1d\x68\xa2\x02\x1c\x99\xac\x7e\x2a\x24"
1320 : "\x53\x5a\x13\x4b\xa2\x3e\xc1\x57\x87\xce\xbe\x5c\x53\xcc",
1321 : STR(iv, iv_size,
1322 : "\x09\xf9\x11\x02\x9d\x74\xe3\x5b\xd8\x41\x56\xc5\x63\x56\x88\xc0"),
1323 : .tag_size = 16,
1324 : .tag = (void *)
1325 : "\x5a\x97\x9b\x0d\xa5\x8f\xde\x80\x51\x62\x1a\xe6\xbf\x96\xfe\xda",
1326 : .tag_prepended = 1,
1327 : }
1328 : };
1329 :
1330 : const struct cipher_vectors_st chacha20_32_vectors[] = { /* RFC8439 */
1331 : {
1332 : STR(key, key_size,
1333 : "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f"),
1334 : STR(plaintext, plaintext_size,
1335 : "\x4c\x61\x64\x69\x65\x73\x20\x61\x6e\x64\x20\x47\x65\x6e\x74\x6c\x65\x6d\x65\x6e\x20\x6f\x66\x20\x74\x68\x65\x20\x63\x6c\x61\x73\x73\x20\x6f\x66\x20\x27\x39\x39\x3a\x20\x49\x66\x20\x49\x20\x63\x6f\x75\x6c\x64\x20\x6f\x66\x66\x65\x72\x20\x79\x6f\x75\x20\x6f\x6e\x6c\x79\x20\x6f\x6e\x65\x20\x74\x69\x70\x20\x66\x6f\x72\x20\x74\x68\x65\x20\x66\x75\x74\x75\x72\x65\x2c\x20\x73\x75\x6e\x73\x63\x72\x65\x65\x6e\x20\x77\x6f\x75\x6c\x64\x20\x62\x65\x20\x69\x74\x2e"),
1336 : .ciphertext = (uint8_t *)
1337 : "\x6e\x2e\x35\x9a\x25\x68\xf9\x80\x41\xba\x07\x28\xdd\x0d\x69\x81\xe9\x7e\x7a\xec\x1d\x43\x60\xc2\x0a\x27\xaf\xcc\xfd\x9f\xae\x0b\xf9\x1b\x65\xc5\x52\x47\x33\xab\x8f\x59\x3d\xab\xcd\x62\xb3\x57\x16\x39\xd6\x24\xe6\x51\x52\xab\x8f\x53\x0c\x35\x9f\x08\x61\xd8\x07\xca\x0d\xbf\x50\x0d\x6a\x61\x56\xa3\x8e\x08\x8a\x22\xb6\x5e\x52\xbc\x51\x4d\x16\xcc\xf8\x06\x81\x8c\xe9\x1a\xb7\x79\x37\x36\x5a\xf9\x0b\xbf\x74\xa3\x5b\xe6\xb4\x0b\x8e\xed\xf2\x78\x5e\x42\x87\x4d",
1338 : STR(iv, iv_size,
1339 : "\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x4a\x00\x00\x00\x00")
1340 : },
1341 : };
1342 :
1343 100 : static int test_cipher(gnutls_cipher_algorithm_t cipher,
1344 : const struct cipher_vectors_st *vectors,
1345 : size_t vectors_size, unsigned flags)
1346 : {
1347 100 : gnutls_cipher_hd_t hd;
1348 100 : int ret;
1349 100 : unsigned int i;
1350 100 : uint8_t tmp[4096 + 16];
1351 100 : gnutls_datum_t key, iv = {NULL, 0};
1352 :
1353 235 : for (i = 0; i < vectors_size; i++) {
1354 135 : key.data = (void *) vectors[i].key;
1355 135 : key.size = vectors[i].key_size;
1356 :
1357 135 : if (vectors[i].iv != NULL) {
1358 120 : iv.data = (void *) vectors[i].iv;
1359 120 : iv.size = gnutls_cipher_get_iv_size(cipher);
1360 : }
1361 :
1362 135 : if (iv.size != vectors[i].iv_size)
1363 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1364 :
1365 135 : ret = gnutls_cipher_init(&hd, cipher, &key, &iv);
1366 135 : if (ret < 0) {
1367 0 : _gnutls_debug_log("error initializing: %s\n",
1368 : gnutls_cipher_get_name(cipher));
1369 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1370 : }
1371 :
1372 135 : ret =
1373 270 : gnutls_cipher_encrypt2(hd,
1374 135 : vectors[i].plaintext,
1375 135 : vectors[i].plaintext_size,
1376 : tmp, sizeof(tmp));
1377 135 : if (ret < 0)
1378 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1379 :
1380 135 : if (memcmp
1381 135 : (tmp, vectors[i].ciphertext,
1382 135 : vectors[i].plaintext_size) != 0) {
1383 0 : _gnutls_debug_log("%s test vector %d failed!\n",
1384 : gnutls_cipher_get_name(cipher),
1385 : i);
1386 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1387 : }
1388 :
1389 : /* check in-place encryption */
1390 135 : if (cipher != GNUTLS_CIPHER_ARCFOUR_128) { /* arcfour is stream */
1391 120 : if (cipher == GNUTLS_CIPHER_MAGMA_CTR_ACPKM ||
1392 : cipher == GNUTLS_CIPHER_KUZNYECHIK_CTR_ACPKM)
1393 10 : _gnutls_cipher_set_key(hd, (void*)vectors[i].key, vectors[i].key_size);
1394 120 : gnutls_cipher_set_iv(hd, (void*)vectors[i].iv, vectors[i].iv_size);
1395 :
1396 120 : memcpy(tmp, vectors[i].plaintext, vectors[i].plaintext_size);
1397 120 : ret = gnutls_cipher_encrypt(hd, tmp, vectors[i].plaintext_size);
1398 120 : if (ret < 0)
1399 0 : return
1400 0 : gnutls_assert_val
1401 : (GNUTLS_E_SELF_TEST_ERROR);
1402 :
1403 120 : if (memcmp(tmp, vectors[i].ciphertext, vectors[i].plaintext_size) != 0) {
1404 0 : _gnutls_debug_log("%s vector %d in-place encryption failed!\n", gnutls_cipher_get_name(cipher), i);
1405 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1406 : }
1407 : }
1408 :
1409 : /* check the internal IV */
1410 135 : if (vectors[i].internal_iv_size > 0) {
1411 15 : ret = _gnutls_cipher_get_iv(hd, tmp, sizeof(tmp));
1412 15 : if (ret < 0)
1413 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1414 :
1415 15 : if (memcmp(tmp, vectors[i].internal_iv, ret) != 0) {
1416 0 : _gnutls_debug_log("%s vector %d internal IV check failed!\n",
1417 : gnutls_cipher_get_name(cipher),
1418 : i);
1419 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1420 : }
1421 : }
1422 :
1423 135 : gnutls_cipher_deinit(hd);
1424 : }
1425 :
1426 100 : iv.size = gnutls_cipher_get_iv_size(cipher);
1427 :
1428 235 : for (i = 0; i < vectors_size; i++) {
1429 135 : key.data = (void *) vectors[i].key;
1430 135 : key.size = vectors[i].key_size;
1431 :
1432 135 : iv.data = (void *) vectors[i].iv;
1433 :
1434 135 : ret = gnutls_cipher_init(&hd, cipher, &key, &iv);
1435 135 : if (ret < 0)
1436 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1437 :
1438 135 : ret =
1439 270 : gnutls_cipher_decrypt2(hd,
1440 135 : vectors[i].ciphertext,
1441 135 : vectors[i].plaintext_size, tmp,
1442 : sizeof(tmp));
1443 135 : if (ret < 0) {
1444 0 : _gnutls_debug_log
1445 : ("%s decryption of test vector %d failed!\n",
1446 : gnutls_cipher_get_name(cipher), i);
1447 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1448 : }
1449 :
1450 135 : if (memcmp
1451 135 : (tmp, vectors[i].plaintext,
1452 135 : vectors[i].plaintext_size) != 0) {
1453 0 : _gnutls_debug_log("%s test vector %d failed!\n",
1454 : gnutls_cipher_get_name(cipher),
1455 : i);
1456 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1457 : }
1458 :
1459 : /* check in-place decryption */
1460 135 : if (cipher != GNUTLS_CIPHER_ARCFOUR_128) { /* arcfour is stream */
1461 120 : if (cipher == GNUTLS_CIPHER_MAGMA_CTR_ACPKM ||
1462 : cipher == GNUTLS_CIPHER_KUZNYECHIK_CTR_ACPKM)
1463 10 : _gnutls_cipher_set_key(hd, (void*)vectors[i].key, vectors[i].key_size);
1464 120 : gnutls_cipher_set_iv(hd, (void*)vectors[i].iv, vectors[i].iv_size);
1465 :
1466 120 : memcpy(tmp, vectors[i].ciphertext, vectors[i].plaintext_size);
1467 120 : ret = gnutls_cipher_decrypt(hd, tmp, vectors[i].plaintext_size);
1468 120 : if (ret < 0)
1469 0 : return
1470 0 : gnutls_assert_val
1471 : (GNUTLS_E_SELF_TEST_ERROR);
1472 :
1473 120 : if (memcmp(tmp, vectors[i].plaintext, vectors[i].plaintext_size) != 0) {
1474 0 : _gnutls_debug_log("%s vector %d in-place decryption failed!\n", gnutls_cipher_get_name(cipher), i);
1475 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1476 : }
1477 : }
1478 :
1479 135 : gnutls_cipher_deinit(hd);
1480 : }
1481 :
1482 100 : _gnutls_debug_log
1483 : ("%s self check succeeded\n",
1484 : gnutls_cipher_get_name(cipher));
1485 :
1486 : return 0;
1487 : }
1488 :
1489 15 : static int test_cipher_all_block_sizes(gnutls_cipher_algorithm_t cipher,
1490 : const struct cipher_vectors_st *vectors,
1491 : size_t vectors_size, unsigned flags)
1492 : {
1493 15 : gnutls_cipher_hd_t hd;
1494 15 : int ret;
1495 15 : unsigned int i;
1496 15 : uint8_t tmp[384];
1497 15 : gnutls_datum_t key, iv = {NULL, 0};
1498 15 : size_t block;
1499 15 : size_t offset;
1500 :
1501 30 : for (i = 0; i < vectors_size; i++) {
1502 285 : for (block = 1; block <= vectors[i].plaintext_size; block++) {
1503 270 : key.data = (void *) vectors[i].key;
1504 270 : key.size = vectors[i].key_size;
1505 :
1506 270 : iv.data = (void *) vectors[i].iv;
1507 270 : iv.size = gnutls_cipher_get_iv_size(cipher);
1508 :
1509 270 : if (iv.size != vectors[i].iv_size)
1510 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1511 :
1512 270 : ret = gnutls_cipher_init(&hd, cipher, &key, &iv);
1513 270 : if (ret < 0) {
1514 0 : _gnutls_debug_log("error initializing: %s\n",
1515 : gnutls_cipher_get_name(cipher));
1516 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1517 : }
1518 :
1519 1320 : for (offset = 0;
1520 1320 : offset < vectors[i].plaintext_size;
1521 1050 : offset += block) {
1522 1050 : ret =
1523 2100 : gnutls_cipher_encrypt2(hd,
1524 1050 : vectors[i].plaintext + offset,
1525 1050 : MIN(block, vectors[i].plaintext_size - offset),
1526 : tmp + offset,
1527 : sizeof(tmp) - offset);
1528 1050 : if (ret < 0)
1529 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1530 : }
1531 :
1532 270 : if (memcmp
1533 270 : (tmp, vectors[i].ciphertext,
1534 : vectors[i].plaintext_size) != 0) {
1535 0 : _gnutls_debug_log("%s encryption of test vector %d failed with block size %d/%d!\n",
1536 : gnutls_cipher_get_name(cipher),
1537 : i, (int)block, (int)vectors[i].plaintext_size);
1538 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1539 : }
1540 :
1541 270 : gnutls_cipher_deinit(hd);
1542 : }
1543 : }
1544 :
1545 30 : for (i = 0; i < vectors_size; i++) {
1546 285 : for (block = 1; block <= vectors[i].plaintext_size; block++) {
1547 270 : key.data = (void *) vectors[i].key;
1548 270 : key.size = vectors[i].key_size;
1549 :
1550 270 : iv.data = (void *) vectors[i].iv;
1551 270 : iv.size = gnutls_cipher_get_iv_size(cipher);
1552 :
1553 270 : ret = gnutls_cipher_init(&hd, cipher, &key, &iv);
1554 270 : if (ret < 0)
1555 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1556 :
1557 1140 : for (offset = 0;
1558 1140 : offset + block <= vectors[i].plaintext_size;
1559 : offset += block) {
1560 870 : ret =
1561 1740 : gnutls_cipher_decrypt2(hd,
1562 870 : vectors[i].ciphertext + offset,
1563 870 : MIN(block, vectors[i].plaintext_size - offset),
1564 : tmp + offset,
1565 : sizeof(tmp) - offset);
1566 870 : if (ret < 0)
1567 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1568 : }
1569 :
1570 270 : if (memcmp
1571 270 : (tmp, vectors[i].plaintext,
1572 : vectors[i].plaintext_size) != 0) {
1573 0 : _gnutls_debug_log("%s decryption of test vector %d failed with block size %d!\n",
1574 : gnutls_cipher_get_name(cipher),
1575 : i, (int)block);
1576 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1577 : }
1578 :
1579 270 : gnutls_cipher_deinit(hd);
1580 : }
1581 : }
1582 :
1583 15 : _gnutls_debug_log
1584 : ("%s self check succeeded\n",
1585 : gnutls_cipher_get_name(cipher));
1586 :
1587 : return 0;
1588 : }
1589 :
1590 : /* AEAD modes (compat APIs) */
1591 16 : static int test_cipher_aead_compat(gnutls_cipher_algorithm_t cipher,
1592 : const struct cipher_aead_vectors_st *vectors,
1593 : size_t vectors_size)
1594 : {
1595 16 : gnutls_cipher_hd_t hd;
1596 16 : int ret;
1597 16 : unsigned int i;
1598 16 : uint8_t tmp[384];
1599 16 : uint8_t tmp2[384];
1600 16 : gnutls_datum_t key, iv;
1601 16 : unsigned tag_size;
1602 :
1603 16 : _gnutls_debug_log("compat: running tests for: %s\n",
1604 : gnutls_cipher_get_name(cipher));
1605 :
1606 28 : for (i = 0; i < vectors_size; i++) {
1607 20 : memset(tmp, 0, sizeof(tmp));
1608 20 : key.data = (void *) vectors[i].key;
1609 20 : key.size = vectors[i].key_size;
1610 :
1611 20 : iv.data = (void *) vectors[i].iv;
1612 20 : iv.size = vectors[i].iv_size;
1613 20 : tag_size = vectors[i].tag_size;
1614 :
1615 :
1616 20 : if (tag_size > gnutls_cipher_get_tag_size(cipher)) {
1617 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1618 : }
1619 :
1620 20 : ret = gnutls_cipher_init(&hd, cipher, &key, &iv);
1621 20 : if (ret < 0) {
1622 8 : if (vectors[i].compat_apis == 0) {
1623 : return 0; /* expected */
1624 : } else {
1625 0 : _gnutls_debug_log("compat: error initializing: %s\n",
1626 : gnutls_cipher_get_name(cipher));
1627 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1628 : }
1629 : }
1630 :
1631 12 : if (vectors[i].compat_apis == 0) {
1632 0 : _gnutls_debug_log("compat: initialized but shouldn't: %s\n",
1633 : gnutls_cipher_get_name(cipher));
1634 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1635 : }
1636 :
1637 12 : if (vectors[i].auth_size) {
1638 4 : ret = gnutls_cipher_add_auth(hd, vectors[i].auth, vectors[i].auth_size);
1639 4 : if (ret < 0)
1640 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1641 : }
1642 :
1643 12 : ret = gnutls_cipher_encrypt2(hd, vectors[i].plaintext, vectors[i].plaintext_size,
1644 : tmp, sizeof(tmp));
1645 12 : if (ret < 0)
1646 0 : return
1647 0 : gnutls_assert_val
1648 : (GNUTLS_E_SELF_TEST_ERROR);
1649 :
1650 12 : ret = gnutls_cipher_tag(hd, tmp+vectors[i].plaintext_size, tag_size);
1651 12 : if (ret < 0)
1652 0 : return
1653 0 : gnutls_assert_val
1654 : (GNUTLS_E_SELF_TEST_ERROR);
1655 :
1656 12 : if (memcmp(tmp+vectors[i].plaintext_size, vectors[i].tag, tag_size) != 0) {
1657 0 : _gnutls_debug_log
1658 : ("compat: %s test vector %d failed (tag)!\n",
1659 : gnutls_cipher_get_name(cipher), i);
1660 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1661 : }
1662 :
1663 12 : if (vectors[i].plaintext_size > 0) {
1664 10 : if (memcmp
1665 10 : (tmp, vectors[i].ciphertext,
1666 : vectors[i].plaintext_size) != 0) {
1667 0 : _gnutls_debug_log
1668 : ("compat: %s test vector %d failed!\n",
1669 : gnutls_cipher_get_name(cipher), i);
1670 :
1671 0 : return
1672 0 : gnutls_assert_val
1673 : (GNUTLS_E_SELF_TEST_ERROR);
1674 : }
1675 : }
1676 :
1677 12 : if (vectors[i].plaintext_size > 0) {
1678 : /* check inplace encryption */
1679 10 : gnutls_cipher_set_iv(hd, (void*)vectors[i].iv, vectors[i].iv_size);
1680 10 : memcpy(tmp2, vectors[i].plaintext, vectors[i].plaintext_size);
1681 :
1682 10 : ret = gnutls_cipher_encrypt(hd, tmp2, vectors[i].plaintext_size);
1683 10 : if (ret < 0)
1684 0 : return
1685 0 : gnutls_assert_val
1686 : (GNUTLS_E_SELF_TEST_ERROR);
1687 :
1688 10 : if (memcmp(tmp, tmp2, vectors[i].plaintext_size) != 0) {
1689 0 : _gnutls_debug_log("compat: %s vector %d in-place encryption failed!\n", gnutls_cipher_get_name(cipher), i);
1690 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1691 : }
1692 :
1693 : /* check decryption with separate buffers */
1694 10 : gnutls_cipher_set_iv(hd, (void*)vectors[i].iv, vectors[i].iv_size);
1695 :
1696 10 : if (vectors[i].auth_size) {
1697 4 : ret = gnutls_cipher_add_auth(hd, vectors[i].auth, vectors[i].auth_size);
1698 4 : if (ret < 0)
1699 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1700 : }
1701 :
1702 10 : ret =
1703 10 : gnutls_cipher_decrypt2(hd, tmp, vectors[i].plaintext_size,
1704 : tmp2, sizeof(tmp2));
1705 10 : if (ret < 0)
1706 0 : return
1707 0 : gnutls_assert_val
1708 : (GNUTLS_E_SELF_TEST_ERROR);
1709 :
1710 10 : if (memcmp(tmp2, vectors[i].plaintext, vectors[i].plaintext_size) != 0) {
1711 0 : _gnutls_debug_log("compat: %s test vector %d failed (decryption)!\n",
1712 : gnutls_cipher_get_name(cipher), i);
1713 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1714 : }
1715 :
1716 : /* check in-place decryption */
1717 10 : if (vectors[i].plaintext_size > 0) {
1718 10 : gnutls_cipher_set_iv(hd, (void*)vectors[i].iv, vectors[i].iv_size);
1719 :
1720 10 : if (vectors[i].auth_size) {
1721 4 : ret = gnutls_cipher_add_auth(hd, vectors[i].auth, vectors[i].auth_size);
1722 4 : if (ret < 0)
1723 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1724 : }
1725 :
1726 10 : memcpy(tmp2, tmp, vectors[i].plaintext_size);
1727 10 : ret = gnutls_cipher_decrypt(hd, tmp2, vectors[i].plaintext_size);
1728 10 : if (ret < 0)
1729 0 : return
1730 0 : gnutls_assert_val
1731 : (GNUTLS_E_SELF_TEST_ERROR);
1732 :
1733 10 : if (memcmp(tmp2, vectors[i].plaintext, vectors[i].plaintext_size) != 0) {
1734 0 : _gnutls_debug_log("compat: %s vector %d in-place decryption failed!\n", gnutls_cipher_get_name(cipher), i);
1735 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1736 : }
1737 : }
1738 : }
1739 :
1740 12 : gnutls_cipher_deinit(hd);
1741 : }
1742 :
1743 8 : _gnutls_debug_log
1744 : ("%s compat self check succeeded\n",
1745 : gnutls_cipher_get_name(cipher));
1746 :
1747 : return 0;
1748 :
1749 : }
1750 :
1751 : #define IOV_PARTS 8
1752 : /* AEAD modes - scatter read */
1753 40 : static int test_cipher_aead_scatter(gnutls_cipher_algorithm_t cipher,
1754 : const struct cipher_aead_vectors_st *vectors,
1755 : size_t vectors_size, unsigned flags)
1756 : {
1757 40 : gnutls_aead_cipher_hd_t hd;
1758 40 : int ret;
1759 40 : unsigned int i, z;
1760 40 : uint8_t tmp[384];
1761 40 : gnutls_datum_t key, iv;
1762 40 : size_t s;
1763 40 : unsigned tag_size;
1764 40 : giovec_t auth_iov[IOV_PARTS];
1765 40 : int auth_iov_len;
1766 40 : int iov_len;
1767 40 : giovec_t iov[IOV_PARTS];
1768 40 : const uint8_t *tag;
1769 40 : uint8_t *ciphertext;
1770 :
1771 40 : _gnutls_debug_log("running scatter (iovec) tests for: %s\n",
1772 : gnutls_cipher_get_name(cipher));
1773 :
1774 110 : for (i = 0; i < vectors_size; i++) {
1775 70 : memset(tmp, 0, sizeof(tmp));
1776 70 : key.data = (void *) vectors[i].key;
1777 70 : key.size = vectors[i].key_size;
1778 :
1779 70 : iv.data = (void *) vectors[i].iv;
1780 70 : iv.size = vectors[i].iv_size;
1781 70 : tag_size = vectors[i].tag_size;
1782 :
1783 70 : if (tag_size > gnutls_cipher_get_tag_size(cipher)) {
1784 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1785 : }
1786 :
1787 70 : ret = gnutls_aead_cipher_init(&hd, cipher, &key);
1788 70 : if (ret < 0) {
1789 0 : _gnutls_debug_log("error initializing: %s\n",
1790 : gnutls_cipher_get_name(cipher));
1791 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1792 : }
1793 :
1794 70 : s = sizeof(tmp);
1795 :
1796 : /* single vector */
1797 70 : auth_iov_len = 1;
1798 70 : auth_iov[0].iov_base = (void*)vectors[i].auth;
1799 70 : auth_iov[0].iov_len = vectors[i].auth_size;
1800 :
1801 70 : iov_len = 1;
1802 70 : iov[0].iov_base = (void*)vectors[i].plaintext;
1803 70 : iov[0].iov_len = vectors[i].plaintext_size;
1804 :
1805 70 : ret =
1806 140 : gnutls_aead_cipher_encryptv(hd,
1807 : iv.data, iv.size,
1808 : auth_iov, auth_iov_len,
1809 70 : vectors[i].tag_size,
1810 : iov, iov_len,
1811 : tmp, &s);
1812 70 : if (ret < 0)
1813 0 : return
1814 0 : gnutls_assert_val
1815 : (GNUTLS_E_SELF_TEST_ERROR);
1816 :
1817 70 : if (s != vectors[i].plaintext_size + tag_size) {
1818 0 : return
1819 0 : gnutls_assert_val
1820 : (GNUTLS_E_SELF_TEST_ERROR);
1821 : }
1822 :
1823 70 : if (vectors[i].tag_prepended)
1824 : tag = tmp;
1825 : else
1826 60 : tag = tmp+vectors[i].plaintext_size;
1827 :
1828 70 : if (memcmp(tag, vectors[i].tag, tag_size) != 0) {
1829 0 : _gnutls_debug_log
1830 : ("%s test vector %d failed (tag)!\n",
1831 : gnutls_cipher_get_name(cipher), i);
1832 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1833 : }
1834 :
1835 70 : if (vectors[i].tag_prepended)
1836 10 : ciphertext = tmp+vectors[i].tag_size;
1837 : else
1838 : ciphertext = tmp;
1839 :
1840 70 : if (vectors[i].plaintext_size > 0) {
1841 60 : if (memcmp
1842 60 : (ciphertext, vectors[i].ciphertext,
1843 : vectors[i].plaintext_size) != 0) {
1844 0 : _gnutls_debug_log
1845 : ("%s test vector %d failed!\n",
1846 : gnutls_cipher_get_name(cipher), i);
1847 :
1848 0 : return
1849 0 : gnutls_assert_val
1850 : (GNUTLS_E_SELF_TEST_ERROR);
1851 : }
1852 : }
1853 :
1854 : /* multi-vector */
1855 70 : auth_iov_len = 0;
1856 70 : if (vectors[i].auth_size > IOV_PARTS) {
1857 25 : unsigned split = vectors[i].auth_size / IOV_PARTS;
1858 25 : assert(split>0);
1859 225 : for (z=0;z<IOV_PARTS;z++) {
1860 200 : auth_iov[z].iov_base = (void*)(vectors[i].auth+(z*split));
1861 200 : if (z==IOV_PARTS-1)
1862 25 : auth_iov[z].iov_len = vectors[i].auth_size - z*split;
1863 : else
1864 175 : auth_iov[z].iov_len = split;
1865 200 : auth_iov_len++;
1866 : }
1867 : } else {
1868 45 : auth_iov_len = 1;
1869 45 : auth_iov[0].iov_base = (void*)vectors[i].auth;
1870 45 : auth_iov[0].iov_len = vectors[i].auth_size;
1871 : }
1872 :
1873 70 : iov_len = 0;
1874 70 : if (vectors[i].plaintext_size > IOV_PARTS) {
1875 50 : unsigned split = vectors[i].plaintext_size / IOV_PARTS;
1876 50 : assert(split>0);
1877 :
1878 450 : for (z=0;z<IOV_PARTS;z++) {
1879 400 : iov[z].iov_base = (void*)(vectors[i].plaintext+(z*split));
1880 400 : if (z==IOV_PARTS-1)
1881 50 : iov[z].iov_len = vectors[i].plaintext_size - z*split;
1882 : else
1883 350 : iov[z].iov_len = split;
1884 400 : iov_len++;
1885 : }
1886 : } else {
1887 20 : iov_len = 1;
1888 20 : iov[0].iov_base = (void*)vectors[i].plaintext;
1889 20 : iov[0].iov_len = vectors[i].plaintext_size;
1890 : }
1891 :
1892 70 : s = sizeof(tmp);
1893 :
1894 70 : ret =
1895 140 : gnutls_aead_cipher_encryptv(hd,
1896 : iv.data, iv.size,
1897 : auth_iov, auth_iov_len,
1898 70 : vectors[i].tag_size,
1899 : iov, iov_len,
1900 : tmp, &s);
1901 70 : if (ret < 0)
1902 0 : return
1903 0 : gnutls_assert_val
1904 : (GNUTLS_E_SELF_TEST_ERROR);
1905 :
1906 70 : if (s != vectors[i].plaintext_size + tag_size) {
1907 0 : return
1908 0 : gnutls_assert_val
1909 : (GNUTLS_E_SELF_TEST_ERROR);
1910 : }
1911 :
1912 70 : if (vectors[i].tag_prepended)
1913 : tag = tmp;
1914 : else
1915 60 : tag = tmp+vectors[i].plaintext_size;
1916 :
1917 70 : if (memcmp(tag, vectors[i].tag, tag_size) != 0) {
1918 0 : _gnutls_debug_log
1919 : ("%s test vector %d failed (tag)!\n",
1920 : gnutls_cipher_get_name(cipher), i);
1921 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1922 : }
1923 :
1924 70 : if (vectors[i].tag_prepended)
1925 10 : ciphertext = tmp+vectors[i].tag_size;
1926 : else
1927 : ciphertext = tmp;
1928 :
1929 70 : if (vectors[i].plaintext_size > 0) {
1930 60 : if (memcmp
1931 60 : (ciphertext, vectors[i].ciphertext,
1932 : vectors[i].plaintext_size) != 0) {
1933 0 : _gnutls_debug_log
1934 : ("%s test vector %d failed!\n",
1935 : gnutls_cipher_get_name(cipher), i);
1936 :
1937 0 : return
1938 0 : gnutls_assert_val
1939 : (GNUTLS_E_SELF_TEST_ERROR);
1940 : }
1941 : }
1942 :
1943 :
1944 :
1945 70 : gnutls_aead_cipher_deinit(hd);
1946 : }
1947 :
1948 40 : _gnutls_debug_log
1949 : ("%s scatter self check succeeded\n",
1950 : gnutls_cipher_get_name(cipher));
1951 :
1952 40 : if (flags & GNUTLS_SELF_TEST_FLAG_NO_COMPAT)
1953 : return 0;
1954 : else
1955 16 : return test_cipher_aead_compat(cipher, vectors, vectors_size);
1956 : }
1957 :
1958 : /* AEAD modes */
1959 40 : static int test_cipher_aead(gnutls_cipher_algorithm_t cipher,
1960 : const struct cipher_aead_vectors_st *vectors,
1961 : size_t vectors_size, unsigned flags)
1962 : {
1963 40 : gnutls_aead_cipher_hd_t hd;
1964 40 : int ret;
1965 40 : unsigned int i;
1966 40 : uint8_t tmp[384];
1967 40 : uint8_t tmp2[384];
1968 40 : gnutls_datum_t key, iv;
1969 40 : size_t s, s2;
1970 40 : const uint8_t *tag;
1971 40 : unsigned tag_size;
1972 40 : uint8_t *ciphertext;
1973 :
1974 40 : _gnutls_debug_log("running tests for: %s\n",
1975 : gnutls_cipher_get_name(cipher));
1976 :
1977 110 : for (i = 0; i < vectors_size; i++) {
1978 70 : memset(tmp, 0, sizeof(tmp));
1979 70 : key.data = (void *) vectors[i].key;
1980 70 : key.size = vectors[i].key_size;
1981 :
1982 70 : iv.data = (void *) vectors[i].iv;
1983 70 : iv.size = vectors[i].iv_size;
1984 70 : tag_size = vectors[i].tag_size;
1985 :
1986 70 : if (tag_size > gnutls_cipher_get_tag_size(cipher)) {
1987 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1988 : }
1989 : #if 0
1990 : if (iv.size != vectors[i].iv_size)
1991 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1992 : #endif
1993 70 : ret = gnutls_aead_cipher_init(&hd, cipher, &key);
1994 70 : if (ret < 0) {
1995 0 : _gnutls_debug_log("error initializing: %s\n",
1996 : gnutls_cipher_get_name(cipher));
1997 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
1998 : }
1999 :
2000 70 : s = sizeof(tmp);
2001 :
2002 70 : ret =
2003 140 : gnutls_aead_cipher_encrypt(hd,
2004 : iv.data, iv.size,
2005 70 : vectors[i].auth, vectors[i].auth_size,
2006 70 : vectors[i].tag_size,
2007 70 : vectors[i].plaintext,
2008 70 : vectors[i].plaintext_size,
2009 : tmp, &s);
2010 70 : if (ret < 0)
2011 0 : return
2012 0 : gnutls_assert_val
2013 : (GNUTLS_E_SELF_TEST_ERROR);
2014 :
2015 70 : if (s != vectors[i].plaintext_size + tag_size) {
2016 0 : return
2017 0 : gnutls_assert_val
2018 : (GNUTLS_E_SELF_TEST_ERROR);
2019 : }
2020 :
2021 70 : if (vectors[i].tag_prepended)
2022 : tag = tmp;
2023 : else
2024 60 : tag = tmp+vectors[i].plaintext_size;
2025 :
2026 70 : if (memcmp(tag, vectors[i].tag, tag_size) != 0) {
2027 0 : _gnutls_debug_log
2028 : ("%s test vector %d failed (tag)!\n",
2029 : gnutls_cipher_get_name(cipher), i);
2030 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2031 : }
2032 :
2033 70 : if (vectors[i].tag_prepended)
2034 10 : ciphertext = tmp+vectors[i].tag_size;
2035 : else
2036 : ciphertext = tmp;
2037 :
2038 70 : if (vectors[i].plaintext_size > 0) {
2039 60 : if (memcmp
2040 60 : (ciphertext, vectors[i].ciphertext,
2041 : vectors[i].plaintext_size) != 0) {
2042 0 : _gnutls_debug_log
2043 : ("%s test vector %d failed!\n",
2044 : gnutls_cipher_get_name(cipher), i);
2045 :
2046 0 : return
2047 0 : gnutls_assert_val
2048 : (GNUTLS_E_SELF_TEST_ERROR);
2049 : }
2050 : }
2051 :
2052 : /* check decryption */
2053 : {
2054 70 : s2 = sizeof(tmp2);
2055 70 : ret =
2056 140 : gnutls_aead_cipher_decrypt(hd,
2057 : iv.data, iv.size,
2058 70 : vectors[i].auth, vectors[i].auth_size,
2059 70 : vectors[i].tag_size,
2060 : tmp, s,
2061 : tmp2, &s2);
2062 70 : if (ret < 0)
2063 0 : return
2064 0 : gnutls_assert_val
2065 : (GNUTLS_E_SELF_TEST_ERROR);
2066 :
2067 70 : if (s2 != vectors[i].plaintext_size && memcmp(tmp, vectors[i].plaintext, vectors[i].plaintext_size) != 0) {
2068 0 : _gnutls_debug_log("%s test vector %d failed (decryption)!\n",
2069 : gnutls_cipher_get_name(cipher), i);
2070 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2071 : }
2072 :
2073 : /* test tag verification */
2074 70 : if (s > 0) {
2075 70 : (*ciphertext)++;
2076 :
2077 70 : s2 = sizeof(tmp2);
2078 70 : ret =
2079 140 : gnutls_aead_cipher_decrypt(hd,
2080 : iv.data, iv.size,
2081 70 : vectors[i].auth, vectors[i].auth_size,
2082 70 : vectors[i].tag_size,
2083 : tmp, s,
2084 : tmp2, &s2);
2085 :
2086 70 : if (ret >= 0) {
2087 0 : _gnutls_debug_log("%s: tag check failed\n", gnutls_cipher_get_name(cipher));
2088 0 : return
2089 0 : gnutls_assert_val
2090 : (GNUTLS_E_SELF_TEST_ERROR);
2091 : }
2092 : }
2093 : }
2094 :
2095 70 : gnutls_aead_cipher_deinit(hd);
2096 : }
2097 :
2098 40 : _gnutls_debug_log
2099 : ("%s self check succeeded\n",
2100 : gnutls_cipher_get_name(cipher));
2101 :
2102 40 : return test_cipher_aead_scatter(cipher, vectors, vectors_size, flags);
2103 : }
2104 :
2105 :
2106 :
2107 : struct hash_vectors_st {
2108 : const uint8_t *plaintext;
2109 : unsigned int plaintext_size;
2110 : const uint8_t *output;
2111 : unsigned int output_size;
2112 : };
2113 :
2114 : const struct hash_vectors_st md5_vectors[] = {
2115 : {
2116 : STR(plaintext, plaintext_size, "abcdefghijklmnopqrstuvwxyz"),
2117 : STR(output, output_size,
2118 : "\xc3\xfc\xd3\xd7\x61\x92\xe4\x00\x7d\xfb\x49\x6c\xca\x67\xe1\x3b"),
2119 : },
2120 : };
2121 :
2122 : const struct hash_vectors_st sha1_vectors[] = {
2123 : {
2124 : STR(plaintext, plaintext_size, "what do ya want for nothing?"),
2125 : STR(output, output_size,
2126 : "\x8f\x82\x03\x94\xf9\x53\x35\x18\x20\x45\xda\x24\xf3\x4d\xe5\x2b\xf8\xbc\x34\x32"),
2127 : },
2128 : {
2129 : STR(plaintext, plaintext_size,
2130 : "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"),
2131 : STR(output, output_size,
2132 : "\xbe\xae\xd1\x6d\x65\x8e\xc7\x92\x9e\xdf\xd6\x2b\xfa\xfe\xac\x29\x9f\x0d\x74\x4d"),
2133 : },
2134 : };
2135 :
2136 : const struct hash_vectors_st sha224_vectors[] = {
2137 : {
2138 : STR(plaintext, plaintext_size,
2139 : "The quick brown fox jumps over the lazy dog"),
2140 : STR(output, output_size,
2141 : "\x73\x0e\x10\x9b\xd7\xa8\xa3\x2b\x1c\xb9\xd9\xa0\x9a\xa2\x32\x5d\x24\x30\x58\x7d\xdb\xc0\xc3\x8b\xad\x91\x15\x25"),
2142 : },
2143 : };
2144 :
2145 : const struct hash_vectors_st sha256_vectors[] = {
2146 : {
2147 : STR(plaintext, plaintext_size,
2148 : "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"),
2149 : STR(output, output_size,
2150 : "\x24\x8d\x6a\x61\xd2\x06\x38\xb8\xe5\xc0\x26\x93\x0c\x3e\x60\x39\xa3\x3c\xe4\x59\x64\xff\x21\x67\xf6\xec\xed\xd4\x19\xdb\x06\xc1"),
2151 : },
2152 : {
2153 : STR(plaintext, plaintext_size,
2154 : "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"),
2155 : STR(output, output_size,
2156 : "\x50\xea\x82\x5d\x96\x84\xf4\x22\x9c\xa2\x9f\x1f\xec\x51\x15\x93\xe2\x81\xe4\x6a\x14\x0d\x81\xe0\x00\x5f\x8f\x68\x86\x69\xa0\x6c"),
2157 : },
2158 : };
2159 :
2160 : const struct hash_vectors_st sha384_vectors[] = {
2161 : {
2162 : STR(plaintext, plaintext_size,
2163 : "The quick brown fox jumps over the lazy dog"),
2164 : STR(output, output_size,
2165 : "\xca\x73\x7f\x10\x14\xa4\x8f\x4c\x0b\x6d\xd4\x3c\xb1\x77\xb0\xaf\xd9\xe5\x16\x93\x67\x54\x4c\x49\x40\x11\xe3\x31\x7d\xbf\x9a\x50\x9c\xb1\xe5\xdc\x1e\x85\xa9\x41\xbb\xee\x3d\x7f\x2a\xfb\xc9\xb1"),
2166 : },
2167 : };
2168 :
2169 : const struct hash_vectors_st sha512_vectors[] = {
2170 : {
2171 : STR(plaintext, plaintext_size,
2172 : "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu"),
2173 : STR(output, output_size,
2174 : "\x8e\x95\x9b\x75\xda\xe3\x13\xda\x8c\xf4\xf7\x28\x14\xfc\x14\x3f\x8f\x77\x79\xc6\xeb\x9f\x7f\xa1\x72\x99\xae\xad\xb6\x88\x90\x18\x50\x1d\x28\x9e\x49\x00\xf7\xe4\x33\x1b\x99\xde\xc4\xb5\x43\x3a\xc7\xd3\x29\xee\xb6\xdd\x26\x54\x5e\x96\xe5\x5b\x87\x4b\xe9\x09"),
2175 : },
2176 : };
2177 :
2178 : const struct hash_vectors_st sha3_224_vectors[] = {
2179 : {
2180 : STR(plaintext, plaintext_size,
2181 : "\xC1\xEC\xFD\xFC"),
2182 : STR(output, output_size,
2183 : "\xA3\x3C\x58\xDF\x8A\x80\x26\xF0\xF9\x59\x19\x66\xBD\x6D\x00\xEE\xD3\xB1\xE8\x29\x58\x0A\xB9\xBE\x26\x8C\xAF\x39"),
2184 : },
2185 : };
2186 :
2187 : const struct hash_vectors_st sha3_256_vectors[] = {
2188 : {
2189 : STR(plaintext, plaintext_size,
2190 : "\xC1\xEC\xFD\xFC"),
2191 : STR(output, output_size,
2192 : "\xC5\x85\x9B\xE8\x25\x60\xCC\x87\x89\x13\x3F\x7C\x83\x4A\x6E\xE6\x28\xE3\x51\xE5\x04\xE6\x01\xE8\x05\x9A\x06\x67\xFF\x62\xC1\x24"),
2193 : }
2194 : };
2195 :
2196 : const struct hash_vectors_st sha3_384_vectors[] = {
2197 : {
2198 : STR(plaintext, plaintext_size,
2199 : "\x4A\x4F\x20\x24\x84\x51\x25\x26"),
2200 : STR(output, output_size,
2201 : "\x89\xDB\xF4\xC3\x9B\x8F\xB4\x6F\xDF\x0A\x69\x26\xCE\xC0\x35\x5A\x4B\xDB\xF9\xC6\xA4\x46\xE1\x40\xB7\xC8\xBD\x08\xFF\x6F\x48\x9F\x20\x5D\xAF\x8E\xFF\xE1\x60\xF4\x37\xF6\x74\x91\xEF\x89\x7C\x23"),
2202 : },
2203 : };
2204 :
2205 : const struct hash_vectors_st sha3_512_vectors[] = {
2206 : {
2207 : STR(plaintext, plaintext_size,
2208 : "\x82\xE1\x92\xE4\x04\x3D\xDC\xD1\x2E\xCF\x52\x96\x9D\x0F\x80\x7E\xED"),
2209 : STR(output, output_size,
2210 : "\x96\x44\xE3\xC9\x0B\x67\xE2\x21\x24\xE9\x6D\xFE\xDC\xE5\x3D\x33\xC4\x60\xF1\x32\x86\x8F\x09\x75\xD1\x8B\x22\xCF\xD5\x9F\x63\x7D\xD8\x5A\xA4\x05\xE3\x98\x08\xA4\x55\x70\xA4\x98\xC0\xB8\xF2\xCB\xA5\x9F\x8E\x14\x37\xEA\xEF\x89\xF2\x0B\x88\x29\x8A\xDF\xA2\xDE"),
2211 : },
2212 : };
2213 :
2214 : const struct hash_vectors_st gostr_94_vectors[] = {
2215 : {
2216 : STR(plaintext, plaintext_size,
2217 : "The quick brown fox jumps over the lazy dog"),
2218 : STR(output, output_size,
2219 : "\x90\x04\x29\x4a\x36\x1a\x50\x8c\x58\x6f\xe5\x3d\x1f\x1b\x02\x74\x67\x65\xe7\x1b\x76\x54\x72\x78\x6e\x47\x70\xd5\x65\x83\x0a\x76"),
2220 : },
2221 : };
2222 :
2223 : /* GOST R 34.11-2012 */
2224 : const struct hash_vectors_st streebog_512_vectors[] = {
2225 : {
2226 : STR(plaintext, plaintext_size,
2227 : "\xd1\xe5\x20\xe2\xe5\xf2\xf0\xe8\x2c\x20\xd1\xf2\xf0\xe8\xe1\xee"
2228 : "\xe6\xe8\x20\xe2\xed\xf3\xf6\xe8\x2c\x20\xe2\xe5\xfe\xf2\xfa\x20"
2229 : "\xf1\x20\xec\xee\xf0\xff\x20\xf1\xf2\xf0\xe5\xeb\xe0\xec\xe8\x20"
2230 : "\xed\xe0\x20\xf5\xf0\xe0\xe1\xf0\xfb\xff\x20\xef\xeb\xfa\xea\xfb"
2231 : "\x20\xc8\xe3\xee\xf0\xe5\xe2\xfb"),
2232 : STR(output, output_size,
2233 : "\x1e\x88\xe6\x22\x26\xbf\xca\x6f\x99\x94\xf1\xf2\xd5\x15\x69\xe0"
2234 : "\xda\xf8\x47\x5a\x3b\x0f\xe6\x1a\x53\x00\xee\xe4\x6d\x96\x13\x76"
2235 : "\x03\x5f\xe8\x35\x49\xad\xa2\xb8\x62\x0f\xcd\x7c\x49\x6c\xe5\xb3"
2236 : "\x3f\x0c\xb9\xdd\xdc\x2b\x64\x60\x14\x3b\x03\xda\xba\xc9\xfb\x28"),
2237 : },
2238 : {
2239 : STR(plaintext, plaintext_size,
2240 : "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
2241 : "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
2242 : "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
2243 : "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
2244 : "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
2245 : "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
2246 : "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
2247 : "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"),
2248 : STR(output, output_size,
2249 : "\x90\xa1\x61\xd1\x2a\xd3\x09\x49\x8d\x3f\xe5\xd4\x82\x02\xd8\xa4"
2250 : "\xe9\xc4\x06\xd6\xa2\x64\xae\xab\x25\x8a\xc5\xec\xc3\x7a\x79\x62"
2251 : "\xaa\xf9\x58\x7a\x5a\xbb\x09\xb6\xbb\x81\xec\x4b\x37\x52\xa3\xff"
2252 : "\x5a\x83\x8e\xf1\x75\xbe\x57\x72\x05\x6b\xc5\xfe\x54\xfc\xfc\x7e"),
2253 : },
2254 : };
2255 :
2256 : /* GOST R 34.11-2012 */
2257 : const struct hash_vectors_st streebog_256_vectors[] = {
2258 : {
2259 : STR(plaintext, plaintext_size,
2260 : "\xd1\xe5\x20\xe2\xe5\xf2\xf0\xe8\x2c\x20\xd1\xf2\xf0\xe8\xe1\xee"
2261 : "\xe6\xe8\x20\xe2\xed\xf3\xf6\xe8\x2c\x20\xe2\xe5\xfe\xf2\xfa\x20"
2262 : "\xf1\x20\xec\xee\xf0\xff\x20\xf1\xf2\xf0\xe5\xeb\xe0\xec\xe8\x20"
2263 : "\xed\xe0\x20\xf5\xf0\xe0\xe1\xf0\xfb\xff\x20\xef\xeb\xfa\xea\xfb"
2264 : "\x20\xc8\xe3\xee\xf0\xe5\xe2\xfb"),
2265 : STR(output, output_size,
2266 : "\x9d\xd2\xfe\x4e\x90\x40\x9e\x5d\xa8\x7f\x53\x97\x6d\x74\x05\xb0"
2267 : "\xc0\xca\xc6\x28\xfc\x66\x9a\x74\x1d\x50\x06\x3c\x55\x7e\x8f\x50"),
2268 : },
2269 : };
2270 :
2271 : #define HASH_DATA_SIZE 64
2272 :
2273 : /* SHA1 and other hashes */
2274 28 : static int test_digest(gnutls_digest_algorithm_t dig,
2275 : const struct hash_vectors_st *vectors,
2276 : size_t vectors_size, unsigned flags)
2277 : {
2278 28 : uint8_t data[HASH_DATA_SIZE];
2279 28 : unsigned int i;
2280 28 : int ret;
2281 28 : size_t data_size;
2282 28 : gnutls_hash_hd_t hd;
2283 28 : gnutls_hash_hd_t copy;
2284 :
2285 28 : if (_gnutls_digest_exists(dig) == 0)
2286 : return 0;
2287 :
2288 64 : for (i = 0; i < vectors_size; i++) {
2289 36 : ret = gnutls_hash_init(&hd, dig);
2290 36 : if (ret < 0) {
2291 0 : _gnutls_debug_log("error initializing: %s\n",
2292 : gnutls_digest_get_name(dig));
2293 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2294 : }
2295 :
2296 36 : ret = gnutls_hash(hd, vectors[i].plaintext, 1);
2297 36 : if (ret < 0)
2298 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2299 :
2300 36 : copy = gnutls_hash_copy(hd);
2301 : /* Returning NULL is not an error here for the time being, but
2302 : * it might become one later */
2303 36 : if (!copy && secure_getenv("GNUTLS_TEST_SUITE_RUN"))
2304 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2305 :
2306 72 : ret = gnutls_hash(hd,
2307 36 : &vectors[i].plaintext[1],
2308 36 : vectors[i].plaintext_size - 1);
2309 36 : if (ret < 0)
2310 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2311 :
2312 36 : gnutls_hash_deinit(hd, data);
2313 :
2314 36 : data_size = gnutls_hash_get_len(dig);
2315 36 : if (data_size <= 0)
2316 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2317 :
2318 36 : if (data_size != vectors[i].output_size ||
2319 36 : memcmp(data, vectors[i].output,
2320 : vectors[i].output_size) != 0) {
2321 0 : _gnutls_debug_log("%s test vector %d failed!\n",
2322 : gnutls_digest_get_name(dig), i);
2323 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2324 : }
2325 :
2326 36 : if (copy != NULL) {
2327 64 : ret = gnutls_hash(copy,
2328 32 : &vectors[i].plaintext[1],
2329 32 : vectors[i].plaintext_size - 1);
2330 32 : if (ret < 0)
2331 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2332 :
2333 32 : memset(data, 0xaa, data_size);
2334 32 : gnutls_hash_deinit(copy, data);
2335 :
2336 32 : if (memcmp(data, vectors[i].output,
2337 32 : vectors[i].output_size) != 0) {
2338 0 : _gnutls_debug_log("%s copy test vector %d failed!\n",
2339 : gnutls_digest_get_name(dig), i);
2340 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2341 : }
2342 : }
2343 : }
2344 :
2345 28 : _gnutls_debug_log("%s self check succeeded\n",
2346 : gnutls_digest_get_name(dig));
2347 :
2348 : return 0;
2349 : }
2350 :
2351 :
2352 : struct mac_vectors_st {
2353 : const uint8_t *key;
2354 : unsigned int key_size;
2355 : const uint8_t *nonce;
2356 : unsigned int nonce_size;
2357 : const uint8_t *plaintext;
2358 : unsigned int plaintext_size;
2359 : const uint8_t *output;
2360 : unsigned int output_size;
2361 : };
2362 :
2363 : const struct mac_vectors_st hmac_md5_vectors[] = {
2364 : {
2365 : STR(key, key_size, "Jefe"),
2366 : STR(plaintext, plaintext_size, "what do ya want for nothing?"),
2367 : STR(output, output_size,
2368 : "\x75\x0c\x78\x3e\x6a\xb0\xb5\x03\xea\xa8\x6e\x31\x0a\x5d\xb7\x38"),
2369 : },
2370 : };
2371 :
2372 : const struct mac_vectors_st hmac_sha1_vectors[] = {
2373 : {
2374 : STR(key, key_size,
2375 : "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
2376 : STR(plaintext, plaintext_size, "Hi There"),
2377 : STR(output, output_size,
2378 : "\x67\x5b\x0b\x3a\x1b\x4d\xdf\x4e\x12\x48\x72\xda\x6c\x2f\x63\x2b\xfe\xd9\x57\xe9"),
2379 : },
2380 : };
2381 :
2382 : /* from rfc4231 */
2383 : const struct mac_vectors_st hmac_sha224_vectors[] = {
2384 : {
2385 : STR(key, key_size,
2386 : "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
2387 : STR(plaintext, plaintext_size, "Hi There"),
2388 : STR(output, output_size,
2389 : "\x89\x6f\xb1\x12\x8a\xbb\xdf\x19\x68\x32\x10\x7c\xd4\x9d\xf3\x3f\x47\xb4\xb1\x16\x99\x12\xba\x4f\x53\x68\x4b\x22"),
2390 : },
2391 : };
2392 :
2393 : const struct mac_vectors_st hmac_sha256_vectors[] = {
2394 : {
2395 : STR(key, key_size,
2396 : "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
2397 : STR(plaintext, plaintext_size, "Hi There"),
2398 : STR(output, output_size,
2399 : "\xb0\x34\x4c\x61\xd8\xdb\x38\x53\x5c\xa8\xaf\xce\xaf\x0b\xf1\x2b\x88\x1d\xc2\x00\xc9\x83\x3d\xa7\x26\xe9\x37\x6c\x2e\x32\xcf\xf7"),
2400 : },
2401 : };
2402 :
2403 : const struct mac_vectors_st hmac_sha384_vectors[] = {
2404 : {
2405 : STR(key, key_size,
2406 : "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
2407 : STR(plaintext, plaintext_size, "Hi There"),
2408 : STR(output, output_size,
2409 : "\xaf\xd0\x39\x44\xd8\x48\x95\x62\x6b\x08\x25\xf4\xab\x46\x90\x7f\x15\xf9\xda\xdb\xe4\x10\x1e\xc6\x82\xaa\x03\x4c\x7c\xeb\xc5\x9c\xfa\xea\x9e\xa9\x07\x6e\xde\x7f\x4a\xf1\x52\xe8\xb2\xfa\x9c\xb6"),
2410 : },
2411 : };
2412 :
2413 : const struct mac_vectors_st hmac_sha512_vectors[] = {
2414 : {
2415 : STR(key, key_size,
2416 : "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
2417 : STR(plaintext, plaintext_size, "Hi There"),
2418 : STR(output, output_size,
2419 : "\x87\xaa\x7c\xde\xa5\xef\x61\x9d\x4f\xf0\xb4\x24\x1a\x1d\x6c\xb0\x23\x79\xf4\xe2\xce\x4e\xc2\x78\x7a\xd0\xb3\x05\x45\xe1\x7c\xde\xda\xa8\x33\xb7\xd6\xb8\xa7\x02\x03\x8b\x27\x4e\xae\xa3\xf4\xe4\xbe\x9d\x91\x4e\xeb\x61\xf1\x70\x2e\x69\x6c\x20\x3a\x12\x68\x54"),
2420 : },
2421 : };
2422 :
2423 : /* Calculated */
2424 : const struct mac_vectors_st hmac_gostr_94_vectors[] = {
2425 : {
2426 : STR(key, key_size,
2427 : "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
2428 : "\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f"),
2429 : STR(plaintext, plaintext_size,
2430 : "\x01\x26\xbd\xb8\x78\x00\xaf\x21\x43\x41\x45\x65\x63\x78\x01\x00"),
2431 : STR(output, output_size,
2432 : "\xba\xd7\x0b\x61\xc4\x10\x95\xbc\x47\xe1\x14\x1c\xfa\xed\x42\x72"
2433 : "\x6a\x5c\xee\xbd\x62\xce\x75\xdb\xbb\x9a\xd7\x6c\xda\x9f\x72\xf7"),
2434 : },
2435 : };
2436 :
2437 : /* RFC 7836 */
2438 : const struct mac_vectors_st hmac_streebog_512_vectors[] = {
2439 : {
2440 : STR(key, key_size,
2441 : "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
2442 : "\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f"),
2443 : STR(plaintext, plaintext_size,
2444 : "\x01\x26\xbd\xb8\x78\x00\xaf\x21\x43\x41\x45\x65\x63\x78\x01\x00"),
2445 : STR(output, output_size,
2446 : "\xa5\x9b\xab\x22\xec\xae\x19\xc6\x5f\xbd\xe6\xe5\xf4\xe9\xf5\xd8"
2447 : "\x54\x9d\x31\xf0\x37\xf9\xdf\x9b\x90\x55\x00\xe1\x71\x92\x3a\x77"
2448 : "\x3d\x5f\x15\x30\xf2\xed\x7e\x96\x4c\xb2\xee\xdc\x29\xe9\xad\x2f"
2449 : "\x3a\xfe\x93\xb2\x81\x4f\x79\xf5\x00\x0f\xfc\x03\x66\xc2\x51\xe6"),
2450 : },
2451 : };
2452 :
2453 : /* RFC 7836 */
2454 : const struct mac_vectors_st hmac_streebog_256_vectors[] = {
2455 : {
2456 : STR(key, key_size,
2457 : "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
2458 : "\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f"),
2459 : STR(plaintext, plaintext_size,
2460 : "\x01\x26\xbd\xb8\x78\x00\xaf\x21\x43\x41\x45\x65\x63\x78\x01\x00"),
2461 : STR(output, output_size,
2462 : "\xa1\xaa\x5f\x7d\xe4\x02\xd7\xb3\xd3\x23\xf2\x99\x1c\x8d\x45\x34"
2463 : "\x01\x31\x37\x01\x0a\x83\x75\x4f\xd0\xaf\x6d\x7c\xd4\x92\x2e\xd9"),
2464 : },
2465 : };
2466 :
2467 : const struct mac_vectors_st aes_cmac_128_vectors[] = { /* NIST SP800-38A */
2468 : {
2469 : STR(key, key_size,
2470 : "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c"),
2471 : STR(plaintext, plaintext_size,
2472 : "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"),
2473 : STR(output, output_size,
2474 : "\x07\x0a\x16\xb4\x6b\x4d\x41\x44\xf7\x9b\xdd\x9d\xd0\x4a\x28\x7c"),
2475 : },
2476 : };
2477 :
2478 : const struct mac_vectors_st aes_cmac_256_vectors[] = { /* NIST SP800-38A */
2479 : {
2480 : STR(key, key_size,
2481 : "\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81"
2482 : "\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4"),
2483 : STR(plaintext, plaintext_size,
2484 : "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"),
2485 : STR(output, output_size,
2486 : "\x28\xa7\x02\x3f\x45\x2e\x8f\x82\xbd\x4b\xf2\x8d\x8c\x37\xc3\x5c"),
2487 : },
2488 : };
2489 :
2490 : const struct mac_vectors_st aes_gmac_128_vectors[] = { /* NIST test vectors */
2491 : {
2492 : STR(key, key_size,
2493 : "\x23\x70\xe3\x20\xd4\x34\x42\x08\xe0\xff\x56\x83\xf2\x43\xb2\x13"),
2494 : STR(nonce, nonce_size,
2495 : "\x04\xdb\xb8\x2f\x04\x4d\x30\x83\x1c\x44\x12\x28"),
2496 : STR(plaintext, plaintext_size,
2497 : "\xd4\x3a\x8e\x50\x89\xee\xa0\xd0\x26\xc0\x3a\x85\x17\x8b\x27\xda"),
2498 : STR(output, output_size,
2499 : "\x2a\x04\x9c\x04\x9d\x25\xaa\x95\x96\x9b\x45\x1d\x93\xc3\x1c\x6e"),
2500 : },
2501 : };
2502 :
2503 : const struct mac_vectors_st aes_gmac_192_vectors[] = { /* NIST test vectors */
2504 : {
2505 : STR(key, key_size,
2506 : "\xaa\x92\x1c\xb5\xa2\x43\xab\x08\x91\x1f\x32\x89\x26\x6b\x39\xda"
2507 : "\xb1\x33\xf5\xc4\x20\xa6\xc5\xcd"),
2508 : STR(nonce, nonce_size,
2509 : "\x8f\x73\xdb\x68\xda\xee\xed\x2d\x15\x5f\xb1\xa0"),
2510 : STR(plaintext, plaintext_size,
2511 : "\x48\x74\x43\xc7\xc1\x4c\xe4\x74\xcb\x3d\x29\x1f\x25\x70\x70\xa2"),
2512 : STR(output, output_size,
2513 : "\xb1\x26\x74\xfb\xea\xc6\x88\x9a\x24\x94\x8f\x27\x92\xe3\x0a\x50"),
2514 : },
2515 : };
2516 :
2517 : const struct mac_vectors_st aes_gmac_256_vectors[] = { /* NIST test vectors */
2518 : {
2519 : STR(key, key_size,
2520 : "\x6d\xfd\xaf\xd6\x70\x3c\x28\x5c\x01\xf1\x4f\xd1\x0a\x60\x12\x86"
2521 : "\x2b\x2a\xf9\x50\xd4\x73\x3a\xbb\x40\x3b\x2e\x74\x5b\x26\x94\x5d"),
2522 : STR(nonce, nonce_size,
2523 : "\x37\x49\xd0\xb3\xd5\xba\xcb\x71\xbe\x06\xad\xe6"),
2524 : STR(plaintext, plaintext_size,
2525 : "\xc0\xd2\x49\x87\x19\x92\xe7\x03\x02\xae\x00\x81\x93\xd1\xe8\x9f"),
2526 : STR(output, output_size,
2527 : "\x4a\xa4\xcc\x69\xf8\x4e\xe6\xac\x16\xd9\xbf\xb4\xe0\x5d\xe5\x00"),
2528 : },
2529 : };
2530 :
2531 : const struct mac_vectors_st gost28147_tc26z_imit_vectors[] = {
2532 : {
2533 : STR(key, key_size,
2534 : "\x9d\x05\xb7\x9e\x90\xca\xd0\x0a\x2c\xda\xd2\x2e\xf4\xe8\x6f\x5c"
2535 : "\xf5\xdc\x37\x68\x19\x85\xb3\xbf\xaa\x18\xc1\xc3\x05\x0a\x91\xa2"),
2536 : STR(plaintext, plaintext_size,
2537 : "\xb5\xa1\xf0\xe3\xce\x2f\x02\x1d\x67\x61\x94\x34\x5c\x41\xe3\x6e"),
2538 : STR(output, output_size,
2539 : "\x03\xe5\x67\x66"),
2540 : },
2541 : };
2542 :
2543 : /* GOST R 34.13-2015 */
2544 : const struct mac_vectors_st magma_omac_vectors[] = {
2545 : {
2546 : STR(key, key_size,
2547 : "\xff\xee\xdd\xcc\xbb\xaa\x99\x88\x77\x66\x55\x44\x33\x22\x11\x00"
2548 : "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff"),
2549 : STR(plaintext, plaintext_size,
2550 : "\x92\xde\xf0\x6b\x3c\x13\x0a\x59"
2551 : "\xdb\x54\xc7\x04\xf8\x18\x9d\x20"
2552 : "\x4a\x98\xfb\x2e\x67\xa8\x02\x4c"
2553 : "\x89\x12\x40\x9b\x17\xb5\x7e\x41"),
2554 : STR(output, output_size,
2555 : "\x15\x4e\x72\x10\x20\x30\xc5\xbb"),
2556 : },
2557 : };
2558 :
2559 : /* GOST R 34.13-2015 */
2560 : const struct mac_vectors_st kuznyechik_omac_vectors[] = {
2561 : {
2562 : STR(key, key_size,
2563 : "\x88\x99\xaa\xbb\xcc\xdd\xee\xff\x00\x11\x22\x33\x44\x55\x66\x77"
2564 : "\xfe\xdc\xba\x98\x76\x54\x32\x10\x01\x23\x45\x67\x89\xab\xcd\xef"),
2565 : STR(plaintext, plaintext_size,
2566 : "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
2567 : "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
2568 : "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
2569 : "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"),
2570 : STR(output, output_size,
2571 : "\x33\x6f\x4d\x29\x60\x59\xfb\xe3\x4d\xde\xb3\x5b\x37\x74\x9c\x67"),
2572 : },
2573 : };
2574 :
2575 36 : static int test_mac(gnutls_mac_algorithm_t mac,
2576 : const struct mac_vectors_st *vectors,
2577 : size_t vectors_size, unsigned flags)
2578 : {
2579 36 : uint8_t data[HASH_DATA_SIZE];
2580 36 : unsigned int i;
2581 36 : int ret;
2582 36 : size_t data_size;
2583 36 : gnutls_hmac_hd_t hd;
2584 36 : gnutls_hmac_hd_t copy;
2585 :
2586 72 : for (i = 0; i < vectors_size; i++) {
2587 72 : ret = gnutls_hmac_init(&hd,
2588 36 : mac, vectors[i].key,
2589 36 : vectors[i].key_size);
2590 :
2591 36 : if (ret < 0) {
2592 0 : _gnutls_debug_log("error initializing: MAC-%s\n",
2593 : gnutls_mac_get_name(mac));
2594 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2595 : }
2596 :
2597 36 : if (vectors[i].nonce_size)
2598 6 : gnutls_hmac_set_nonce(hd,
2599 6 : vectors[i].nonce,
2600 : vectors[i].nonce_size);
2601 :
2602 36 : ret = gnutls_hmac(hd, vectors[i].plaintext, 1);
2603 36 : if (ret < 0)
2604 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2605 :
2606 36 : copy = gnutls_hmac_copy(hd);
2607 : /* Returning NULL is not an error here for the time being, but
2608 : * it might become one later */
2609 36 : if (!copy && secure_getenv("GNUTLS_TEST_SUITE_RUN"))
2610 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2611 :
2612 72 : ret = gnutls_hmac(hd,
2613 36 : &vectors[i].plaintext[1],
2614 36 : vectors[i].plaintext_size - 1);
2615 36 : if (ret < 0)
2616 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2617 :
2618 36 : gnutls_hmac_deinit(hd, data);
2619 :
2620 36 : data_size = gnutls_hmac_get_len(mac);
2621 36 : if (data_size <= 0)
2622 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2623 :
2624 36 : if (data_size != vectors[i].output_size ||
2625 36 : memcmp(data, vectors[i].output,
2626 : vectors[i].output_size) != 0) {
2627 :
2628 0 : _gnutls_debug_log
2629 : ("MAC-%s test vector %d failed!\n",
2630 : gnutls_mac_get_name(mac), i);
2631 :
2632 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2633 : }
2634 :
2635 36 : if (copy != NULL) {
2636 68 : ret = gnutls_hmac(copy,
2637 34 : &vectors[i].plaintext[1],
2638 34 : vectors[i].plaintext_size - 1);
2639 34 : if (ret < 0)
2640 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2641 :
2642 34 : memset(data, 0xaa, data_size);
2643 34 : gnutls_hmac_deinit(copy, data);
2644 :
2645 34 : if (memcmp(data, vectors[i].output,
2646 34 : vectors[i].output_size) != 0) {
2647 0 : _gnutls_debug_log
2648 : ("MAC-%s copy test vector %d failed!\n",
2649 : gnutls_mac_get_name(mac), i);
2650 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
2651 : }
2652 : }
2653 : }
2654 :
2655 36 : _gnutls_debug_log
2656 : ("MAC-%s self check succeeded\n",
2657 : gnutls_mac_get_name(mac));
2658 :
2659 : return 0;
2660 : }
2661 :
2662 : #define CASE(x, func, vectors) case x: \
2663 : ret = func(x, V(vectors), flags); \
2664 : if (!(flags & GNUTLS_SELF_TEST_FLAG_ALL) || ret < 0) \
2665 : return ret
2666 :
2667 : #define CASE2(x, func, func2, vectors) case x: \
2668 : ret = func(x, V(vectors), flags); \
2669 : if (!(flags & GNUTLS_SELF_TEST_FLAG_ALL) || ret < 0) \
2670 : return ret; \
2671 : ret = func2(x, V(vectors), flags); \
2672 : if (!(flags & GNUTLS_SELF_TEST_FLAG_ALL) || ret < 0) \
2673 : return ret
2674 :
2675 : #define NON_FIPS_CASE(x, func, vectors) case x: \
2676 : if (_gnutls_fips_mode_enabled() == 0) { \
2677 : ret = func(x, V(vectors), flags); \
2678 : if (!(flags & GNUTLS_SELF_TEST_FLAG_ALL) || ret < 0) \
2679 : return ret; \
2680 : }
2681 :
2682 : /*-
2683 : * gnutls_cipher_self_test:
2684 : * @flags: GNUTLS_SELF_TEST_FLAG flags
2685 : * @cipher: the encryption algorithm to use
2686 : *
2687 : * This function will run self tests on the provided cipher or all
2688 : * available ciphers if @flags is %GNUTLS_SELF_TEST_FLAG_ALL.
2689 : *
2690 : * Returns: Zero or a negative error code on error.
2691 : *
2692 : * Since: 3.3.0-FIPS140
2693 : -*/
2694 5 : int gnutls_cipher_self_test(unsigned flags, gnutls_cipher_algorithm_t cipher)
2695 : {
2696 5 : int ret;
2697 :
2698 5 : if (flags & GNUTLS_SELF_TEST_FLAG_ALL)
2699 : cipher = GNUTLS_CIPHER_UNKNOWN;
2700 :
2701 0 : switch (cipher) {
2702 5 : case GNUTLS_CIPHER_UNKNOWN:
2703 5 : CASE(GNUTLS_CIPHER_AES_128_CCM, test_cipher_aead,
2704 : aes128_ccm_vectors);
2705 5 : FALLTHROUGH;
2706 5 : CASE(GNUTLS_CIPHER_AES_256_CCM, test_cipher_aead,
2707 : aes256_ccm_vectors);
2708 5 : FALLTHROUGH;
2709 5 : CASE(GNUTLS_CIPHER_AES_128_CBC, test_cipher,
2710 : aes128_cbc_vectors);
2711 5 : FALLTHROUGH;
2712 5 : CASE(GNUTLS_CIPHER_AES_192_CBC, test_cipher,
2713 : aes192_cbc_vectors);
2714 5 : FALLTHROUGH;
2715 5 : CASE(GNUTLS_CIPHER_AES_256_CBC, test_cipher,
2716 : aes256_cbc_vectors);
2717 5 : FALLTHROUGH;
2718 5 : CASE(GNUTLS_CIPHER_3DES_CBC, test_cipher,
2719 : tdes_cbc_vectors);
2720 5 : FALLTHROUGH;
2721 5 : NON_FIPS_CASE(GNUTLS_CIPHER_ARCFOUR_128, test_cipher,
2722 5 : arcfour_vectors);
2723 5 : FALLTHROUGH;
2724 5 : CASE(GNUTLS_CIPHER_AES_128_GCM, test_cipher_aead,
2725 : aes128_gcm_vectors);
2726 5 : FALLTHROUGH;
2727 5 : CASE(GNUTLS_CIPHER_AES_192_GCM, test_cipher_aead,
2728 : aes192_gcm_vectors);
2729 5 : FALLTHROUGH;
2730 5 : CASE(GNUTLS_CIPHER_AES_256_GCM, test_cipher_aead,
2731 : aes256_gcm_vectors);
2732 5 : FALLTHROUGH;
2733 5 : NON_FIPS_CASE(GNUTLS_CIPHER_CHACHA20_POLY1305, test_cipher_aead,
2734 5 : chacha_poly1305_vectors);
2735 5 : FALLTHROUGH;
2736 5 : CASE2(GNUTLS_CIPHER_AES_128_CFB8, test_cipher,
2737 : test_cipher_all_block_sizes,
2738 : aes128_cfb8_vectors);
2739 5 : FALLTHROUGH;
2740 5 : CASE2(GNUTLS_CIPHER_AES_192_CFB8, test_cipher,
2741 : test_cipher_all_block_sizes,
2742 : aes192_cfb8_vectors);
2743 5 : FALLTHROUGH;
2744 5 : CASE2(GNUTLS_CIPHER_AES_256_CFB8, test_cipher,
2745 : test_cipher_all_block_sizes,
2746 : aes256_cfb8_vectors);
2747 5 : FALLTHROUGH;
2748 5 : CASE(GNUTLS_CIPHER_AES_128_XTS, test_cipher,
2749 : aes128_xts_vectors);
2750 5 : FALLTHROUGH;
2751 5 : CASE(GNUTLS_CIPHER_AES_256_XTS, test_cipher,
2752 : aes256_xts_vectors);
2753 5 : FALLTHROUGH;
2754 5 : NON_FIPS_CASE(GNUTLS_CIPHER_AES_128_SIV, test_cipher_aead,
2755 5 : aes128_siv_vectors);
2756 5 : FALLTHROUGH;
2757 5 : NON_FIPS_CASE(GNUTLS_CIPHER_AES_256_SIV, test_cipher_aead,
2758 5 : aes256_siv_vectors);
2759 5 : FALLTHROUGH;
2760 5 : NON_FIPS_CASE(GNUTLS_CIPHER_CHACHA20_32, test_cipher,
2761 5 : chacha20_32_vectors);
2762 5 : FALLTHROUGH;
2763 : /* The same test vector for _32 variant should work */
2764 5 : NON_FIPS_CASE(GNUTLS_CIPHER_CHACHA20_64, test_cipher,
2765 5 : chacha20_32_vectors);
2766 : #if ENABLE_GOST
2767 5 : FALLTHROUGH;
2768 5 : NON_FIPS_CASE(GNUTLS_CIPHER_GOST28147_CPA_CFB, test_cipher,
2769 5 : gost28147_cpa_cfb_vectors);
2770 5 : FALLTHROUGH;
2771 5 : NON_FIPS_CASE(GNUTLS_CIPHER_GOST28147_CPB_CFB, test_cipher,
2772 5 : gost28147_cpb_cfb_vectors);
2773 5 : FALLTHROUGH;
2774 5 : NON_FIPS_CASE(GNUTLS_CIPHER_GOST28147_CPC_CFB, test_cipher,
2775 5 : gost28147_cpc_cfb_vectors);
2776 5 : FALLTHROUGH;
2777 5 : NON_FIPS_CASE(GNUTLS_CIPHER_GOST28147_CPD_CFB, test_cipher,
2778 5 : gost28147_cpd_cfb_vectors);
2779 5 : FALLTHROUGH;
2780 5 : NON_FIPS_CASE(GNUTLS_CIPHER_GOST28147_TC26Z_CFB, test_cipher,
2781 5 : gost28147_tc26z_cfb_vectors);
2782 5 : FALLTHROUGH;
2783 5 : NON_FIPS_CASE(GNUTLS_CIPHER_GOST28147_TC26Z_CNT, test_cipher,
2784 5 : gost28147_tc26z_cnt_vectors);
2785 5 : FALLTHROUGH;
2786 5 : NON_FIPS_CASE(GNUTLS_CIPHER_MAGMA_CTR_ACPKM, test_cipher,
2787 5 : magma_ctr_acpkm_vectors);
2788 5 : FALLTHROUGH;
2789 5 : NON_FIPS_CASE(GNUTLS_CIPHER_KUZNYECHIK_CTR_ACPKM, test_cipher,
2790 : kuznyechik_ctr_acpkm_vectors);
2791 : #endif
2792 : break;
2793 : default:
2794 0 : return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
2795 : }
2796 :
2797 : return 0;
2798 : }
2799 :
2800 : /*-
2801 : * gnutls_mac_self_test:
2802 : * @flags: GNUTLS_SELF_TEST_FLAG flags
2803 : * @mac: the message authentication algorithm to use
2804 : *
2805 : * This function will run self tests on the provided mac.
2806 : *
2807 : * Returns: Zero or a negative error code on error.
2808 : *
2809 : * Since: 3.3.0-FIPS140
2810 : -*/
2811 4 : int gnutls_mac_self_test(unsigned flags, gnutls_mac_algorithm_t mac)
2812 : {
2813 4 : int ret;
2814 :
2815 4 : if (flags & GNUTLS_SELF_TEST_FLAG_ALL)
2816 : mac = GNUTLS_MAC_UNKNOWN;
2817 :
2818 2 : switch (mac) {
2819 : case GNUTLS_MAC_UNKNOWN:
2820 2 : NON_FIPS_CASE(GNUTLS_MAC_MD5, test_mac, hmac_md5_vectors);
2821 2 : FALLTHROUGH;
2822 2 : CASE(GNUTLS_MAC_SHA1, test_mac, hmac_sha1_vectors);
2823 2 : FALLTHROUGH;
2824 2 : CASE(GNUTLS_MAC_SHA224, test_mac, hmac_sha224_vectors);
2825 4 : FALLTHROUGH;
2826 4 : CASE(GNUTLS_MAC_SHA256, test_mac, hmac_sha256_vectors);
2827 2 : FALLTHROUGH;
2828 2 : CASE(GNUTLS_MAC_SHA384, test_mac, hmac_sha384_vectors);
2829 2 : FALLTHROUGH;
2830 2 : CASE(GNUTLS_MAC_SHA512, test_mac, hmac_sha512_vectors);
2831 : #if ENABLE_GOST
2832 2 : FALLTHROUGH;
2833 2 : NON_FIPS_CASE(GNUTLS_MAC_GOSTR_94, test_mac, hmac_gostr_94_vectors);
2834 2 : FALLTHROUGH;
2835 2 : NON_FIPS_CASE(GNUTLS_MAC_STREEBOG_512, test_mac, hmac_streebog_512_vectors);
2836 2 : FALLTHROUGH;
2837 2 : NON_FIPS_CASE(GNUTLS_MAC_STREEBOG_256, test_mac, hmac_streebog_256_vectors);
2838 2 : FALLTHROUGH;
2839 2 : NON_FIPS_CASE(GNUTLS_MAC_GOST28147_TC26Z_IMIT, test_mac, gost28147_tc26z_imit_vectors);
2840 2 : FALLTHROUGH;
2841 2 : NON_FIPS_CASE(GNUTLS_MAC_MAGMA_OMAC, test_mac, magma_omac_vectors);
2842 2 : FALLTHROUGH;
2843 2 : NON_FIPS_CASE(GNUTLS_MAC_KUZNYECHIK_OMAC, test_mac, kuznyechik_omac_vectors);
2844 : #endif
2845 2 : FALLTHROUGH;
2846 2 : CASE(GNUTLS_MAC_AES_CMAC_128, test_mac, aes_cmac_128_vectors);
2847 2 : FALLTHROUGH;
2848 2 : CASE(GNUTLS_MAC_AES_CMAC_256, test_mac, aes_cmac_256_vectors);
2849 2 : FALLTHROUGH;
2850 2 : CASE(GNUTLS_MAC_AES_GMAC_128, test_mac, aes_gmac_128_vectors);
2851 2 : FALLTHROUGH;
2852 2 : CASE(GNUTLS_MAC_AES_GMAC_192, test_mac, aes_gmac_192_vectors);
2853 2 : FALLTHROUGH;
2854 2 : CASE(GNUTLS_MAC_AES_GMAC_256, test_mac, aes_gmac_256_vectors);
2855 :
2856 : break;
2857 : default:
2858 0 : return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
2859 : }
2860 :
2861 : return 0;
2862 : }
2863 :
2864 : /*-
2865 : * gnutls_digest_self_test:
2866 : * @flags: GNUTLS_SELF_TEST_FLAG flags
2867 : * @digest: the digest algorithm to use
2868 : *
2869 : * This function will run self tests on the provided digest.
2870 : *
2871 : * Returns: Zero or a negative error code on error.
2872 : *
2873 : * Since: 3.3.0-FIPS140
2874 : -*/
2875 4 : int gnutls_digest_self_test(unsigned flags, gnutls_digest_algorithm_t digest)
2876 : {
2877 4 : int ret;
2878 :
2879 4 : if (flags & GNUTLS_SELF_TEST_FLAG_ALL)
2880 : digest = GNUTLS_DIG_UNKNOWN;
2881 :
2882 2 : switch (digest) {
2883 : case GNUTLS_DIG_UNKNOWN:
2884 2 : NON_FIPS_CASE(GNUTLS_DIG_MD5, test_digest, md5_vectors);
2885 4 : FALLTHROUGH;
2886 4 : CASE(GNUTLS_DIG_SHA1, test_digest, sha1_vectors);
2887 2 : FALLTHROUGH;
2888 2 : CASE(GNUTLS_DIG_SHA224, test_digest, sha224_vectors);
2889 2 : FALLTHROUGH;
2890 2 : CASE(GNUTLS_DIG_SHA256, test_digest, sha256_vectors);
2891 2 : FALLTHROUGH;
2892 2 : CASE(GNUTLS_DIG_SHA384, test_digest, sha384_vectors);
2893 2 : FALLTHROUGH;
2894 2 : CASE(GNUTLS_DIG_SHA512, test_digest, sha512_vectors);
2895 : #ifdef NETTLE_SHA3_FIPS202
2896 2 : FALLTHROUGH;
2897 2 : CASE(GNUTLS_DIG_SHA3_224, test_digest, sha3_224_vectors);
2898 2 : FALLTHROUGH;
2899 2 : CASE(GNUTLS_DIG_SHA3_256, test_digest, sha3_256_vectors);
2900 2 : FALLTHROUGH;
2901 2 : CASE(GNUTLS_DIG_SHA3_384, test_digest, sha3_384_vectors);
2902 2 : FALLTHROUGH;
2903 2 : CASE(GNUTLS_DIG_SHA3_512, test_digest, sha3_512_vectors);
2904 : #endif
2905 : #if ENABLE_GOST
2906 2 : FALLTHROUGH;
2907 2 : NON_FIPS_CASE(GNUTLS_DIG_GOSTR_94, test_digest, gostr_94_vectors);
2908 2 : FALLTHROUGH;
2909 2 : NON_FIPS_CASE(GNUTLS_DIG_STREEBOG_512, test_digest, streebog_512_vectors);
2910 2 : FALLTHROUGH;
2911 2 : NON_FIPS_CASE(GNUTLS_DIG_STREEBOG_256, test_digest, streebog_256_vectors);
2912 : #endif
2913 : break;
2914 : default:
2915 0 : return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
2916 : }
2917 :
2918 : return 0;
2919 : }
2920 :
2921 : struct hkdf_vectors_st {
2922 : const uint8_t *ikm;
2923 : unsigned int ikm_size;
2924 : const uint8_t *salt;
2925 : unsigned int salt_size;
2926 : const uint8_t *prk;
2927 : unsigned int prk_size;
2928 : const uint8_t *info;
2929 : unsigned int info_size;
2930 : const uint8_t *okm;
2931 : unsigned int okm_size;
2932 : };
2933 :
2934 : const struct hkdf_vectors_st hkdf_sha256_vectors[] = {
2935 : /* RFC 5869: A.1. Test Case 1: Basic test case with SHA-256 */
2936 : {
2937 : STR(ikm, ikm_size,
2938 : "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"
2939 : "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
2940 : STR(salt, salt_size,
2941 : "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c"),
2942 : STR(prk, prk_size,
2943 : "\x07\x77\x09\x36\x2c\x2e\x32\xdf\x0d\xdc\x3f\x0d\xc4\x7b"
2944 : "\xba\x63\x90\xb6\xc7\x3b\xb5\x0f\x9c\x31\x22\xec\x84\x4a"
2945 : "\xd7\xc2\xb3\xe5"),
2946 : STR(info, info_size,
2947 : "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9"),
2948 : STR(okm, okm_size,
2949 : "\x3c\xb2\x5f\x25\xfa\xac\xd5\x7a\x90\x43\x4f\x64\xd0\x36"
2950 : "\x2f\x2a\x2d\x2d\x0a\x90\xcf\x1a\x5a\x4c\x5d\xb0\x2d\x56"
2951 : "\xec\xc4\xc5\xbf\x34\x00\x72\x08\xd5\xb8\x87\x18\x58\x65"),
2952 : },
2953 : /* RFC 5869: A.2. Test Case 2: Test with SHA-256 and longer inputs/outputs */
2954 : {
2955 : STR(ikm, ikm_size,
2956 : "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d"
2957 : "\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b"
2958 : "\x1c\x1d\x1e\x1f\x20\x21\x22\x23\x24\x25\x26\x27\x28\x29"
2959 : "\x2a\x2b\x2c\x2d\x2e\x2f\x30\x31\x32\x33\x34\x35\x36\x37"
2960 : "\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f\x40\x41\x42\x43\x44\x45"
2961 : "\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f"),
2962 : STR(salt, salt_size,
2963 : "\x60\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d"
2964 : "\x6e\x6f\x70\x71\x72\x73\x74\x75\x76\x77\x78\x79\x7a\x7b"
2965 : "\x7c\x7d\x7e\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89"
2966 : "\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94\x95\x96\x97"
2967 : "\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0\xa1\xa2\xa3\xa4\xa5"
2968 : "\xa6\xa7\xa8\xa9\xaa\xab\xac\xad\xae\xaf"),
2969 : STR(prk, prk_size,
2970 : "\x06\xa6\xb8\x8c\x58\x53\x36\x1a\x06\x10\x4c\x9c\xeb\x35"
2971 : "\xb4\x5c\xef\x76\x00\x14\x90\x46\x71\x01\x4a\x19\x3f\x40"
2972 : "\xc1\x5f\xc2\x44"),
2973 : STR(info, info_size,
2974 : "\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8\xb9\xba\xbb\xbc\xbd"
2975 : "\xbe\xbf\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8\xc9\xca\xcb"
2976 : "\xcc\xcd\xce\xcf\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8\xd9"
2977 : "\xda\xdb\xdc\xdd\xde\xdf\xe0\xe1\xe2\xe3\xe4\xe5\xe6\xe7"
2978 : "\xe8\xe9\xea\xeb\xec\xed\xee\xef\xf0\xf1\xf2\xf3\xf4\xf5"
2979 : "\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff"),
2980 : STR(okm, okm_size,
2981 : "\xb1\x1e\x39\x8d\xc8\x03\x27\xa1\xc8\xe7\xf7\x8c\x59\x6a"
2982 : "\x49\x34\x4f\x01\x2e\xda\x2d\x4e\xfa\xd8\xa0\x50\xcc\x4c"
2983 : "\x19\xaf\xa9\x7c\x59\x04\x5a\x99\xca\xc7\x82\x72\x71\xcb"
2984 : "\x41\xc6\x5e\x59\x0e\x09\xda\x32\x75\x60\x0c\x2f\x09\xb8"
2985 : "\x36\x77\x93\xa9\xac\xa3\xdb\x71\xcc\x30\xc5\x81\x79\xec"
2986 : "\x3e\x87\xc1\x4c\x01\xd5\xc1\xf3\x43\x4f\x1d\x87"),
2987 : },
2988 : };
2989 :
2990 0 : static int test_hkdf(gnutls_mac_algorithm_t mac,
2991 : const struct hkdf_vectors_st *vectors,
2992 : size_t vectors_size, unsigned flags)
2993 : {
2994 0 : unsigned int i;
2995 :
2996 0 : for (i = 0; i < vectors_size; i++) {
2997 0 : gnutls_datum_t ikm, prk, salt, info;
2998 0 : uint8_t output[4096];
2999 0 : int ret;
3000 :
3001 0 : ikm.data = (void *) vectors[i].ikm;
3002 0 : ikm.size = vectors[i].ikm_size;
3003 0 : salt.data = (void *) vectors[i].salt;
3004 0 : salt.size = vectors[i].salt_size;
3005 :
3006 0 : ret = gnutls_hkdf_extract(mac, &ikm, &salt, output);
3007 0 : if (ret < 0) {
3008 0 : _gnutls_debug_log("error extracting HKDF: MAC-%s\n",
3009 : gnutls_mac_get_name(mac));
3010 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
3011 : }
3012 :
3013 0 : if (memcmp(output, vectors[i].prk, vectors[i].prk_size) != 0) {
3014 0 : _gnutls_debug_log
3015 : ("HKDF extract: MAC-%s test vector failed!\n",
3016 : gnutls_mac_get_name(mac));
3017 :
3018 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
3019 : }
3020 :
3021 0 : prk.data = (void *) vectors[i].prk;
3022 0 : prk.size = vectors[i].prk_size;
3023 0 : info.data = (void *) vectors[i].info;
3024 0 : info.size = vectors[i].info_size;
3025 :
3026 0 : ret = gnutls_hkdf_expand(mac, &prk, &info,
3027 0 : output, vectors[i].okm_size);
3028 0 : if (ret < 0) {
3029 0 : _gnutls_debug_log("error extracting HKDF: MAC-%s\n",
3030 : gnutls_mac_get_name(mac));
3031 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
3032 : }
3033 :
3034 0 : if (memcmp(output, vectors[i].okm, vectors[i].okm_size) != 0) {
3035 0 : _gnutls_debug_log
3036 : ("HKDF expand: MAC-%s test vector failed!\n",
3037 : gnutls_mac_get_name(mac));
3038 :
3039 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
3040 : }
3041 : }
3042 :
3043 0 : _gnutls_debug_log
3044 : ("HKDF: MAC-%s self check succeeded\n",
3045 : gnutls_mac_get_name(mac));
3046 :
3047 : return 0;
3048 : }
3049 :
3050 : /*-
3051 : * gnutls_hkdf_self_test:
3052 : * @flags: GNUTLS_SELF_TEST_FLAG flags
3053 : * @mac: the message authentication algorithm to use
3054 : *
3055 : * This function will run self tests on HKDF with the provided mac.
3056 : *
3057 : * Returns: Zero or a negative error code on error.
3058 : *
3059 : * Since: 3.3.0-FIPS140
3060 : -*/
3061 0 : int gnutls_hkdf_self_test(unsigned flags, gnutls_mac_algorithm_t mac)
3062 : {
3063 0 : int ret;
3064 :
3065 0 : if (flags & GNUTLS_SELF_TEST_FLAG_ALL)
3066 : mac = GNUTLS_MAC_UNKNOWN;
3067 :
3068 0 : switch (mac) {
3069 0 : case GNUTLS_MAC_UNKNOWN:
3070 0 : CASE(GNUTLS_MAC_SHA256, test_hkdf, hkdf_sha256_vectors);
3071 :
3072 : break;
3073 : default:
3074 0 : return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
3075 : }
3076 :
3077 : return 0;
3078 : }
3079 :
3080 : struct pbkdf2_vectors_st {
3081 : const uint8_t *key;
3082 : size_t key_size;
3083 : const uint8_t *salt;
3084 : size_t salt_size;
3085 : unsigned iter_count;
3086 : const uint8_t *output;
3087 : size_t output_size;
3088 : };
3089 :
3090 : const struct pbkdf2_vectors_st pbkdf2_sha256_vectors[] = {
3091 : /* RFC 7914: 11. Test Vectors for PBKDF2 with HMAC-SHA-256 */
3092 : {
3093 : STR(key, key_size, "passwd"),
3094 : STR(salt, salt_size, "salt"),
3095 : .iter_count = 1,
3096 : STR(output, output_size,
3097 : "\x55\xac\x04\x6e\x56\xe3\x08\x9f\xec\x16\x91\xc2\x25\x44"
3098 : "\xb6\x05\xf9\x41\x85\x21\x6d\xde\x04\x65\xe6\x8b\x9d\x57"
3099 : "\xc2\x0d\xac\xbc\x49\xca\x9c\xcc\xf1\x79\xb6\x45\x99\x16"
3100 : "\x64\xb3\x9d\x77\xef\x31\x7c\x71\xb8\x45\xb1\xe3\x0b\xd5"
3101 : "\x09\x11\x20\x41\xd3\xa1\x97\x83"),
3102 : },
3103 : /* RFC 7914: 11. Test Vectors for PBKDF2 with HMAC-SHA-256 */
3104 : {
3105 : STR(key, key_size, "Password"),
3106 : STR(salt, salt_size, "NaCl"),
3107 : .iter_count = 80000,
3108 : STR(output, output_size,
3109 : "\x4d\xdc\xd8\xf6\x0b\x98\xbe\x21\x83\x0c\xee\x5e\xf2\x27"
3110 : "\x01\xf9\x64\x1a\x44\x18\xd0\x4c\x04\x14\xae\xff\x08\x87"
3111 : "\x6b\x34\xab\x56\xa1\xd4\x25\xa1\x22\x58\x33\x54\x9a\xdb"
3112 : "\x84\x1b\x51\xc9\xb3\x17\x6a\x27\x2b\xde\xbb\xa1\xd0\x78"
3113 : "\x47\x8f\x62\xb3\x97\xf3\x3c\x8d"),
3114 : },
3115 : };
3116 :
3117 0 : static int test_pbkdf2(gnutls_mac_algorithm_t mac,
3118 : const struct pbkdf2_vectors_st *vectors,
3119 : size_t vectors_size, unsigned flags)
3120 : {
3121 0 : unsigned int i;
3122 :
3123 0 : for (i = 0; i < vectors_size; i++) {
3124 0 : gnutls_datum_t key, salt;
3125 0 : uint8_t output[4096];
3126 0 : int ret;
3127 :
3128 0 : key.data = (void *) vectors[i].key;
3129 0 : key.size = vectors[i].key_size;
3130 0 : salt.data = (void *) vectors[i].salt;
3131 0 : salt.size = vectors[i].salt_size;
3132 :
3133 0 : ret = gnutls_pbkdf2(mac, &key, &salt, vectors[i].iter_count,
3134 : output, vectors[i].output_size);
3135 0 : if (ret < 0) {
3136 0 : _gnutls_debug_log("error calculating PBKDF2: MAC-%s\n",
3137 : gnutls_mac_get_name(mac));
3138 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
3139 : }
3140 :
3141 0 : if (memcmp(output, vectors[i].output, vectors[i].output_size) != 0) {
3142 0 : _gnutls_debug_log
3143 : ("PBKDF2: MAC-%s test vector failed!\n",
3144 : gnutls_mac_get_name(mac));
3145 :
3146 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
3147 : }
3148 : }
3149 :
3150 0 : _gnutls_debug_log
3151 : ("PBKDF2: MAC-%s self check succeeded\n",
3152 : gnutls_mac_get_name(mac));
3153 :
3154 : return 0;
3155 : }
3156 :
3157 : /*-
3158 : * gnutls_pbkdf2_self_test:
3159 : * @flags: GNUTLS_SELF_TEST_FLAG flags
3160 : * @mac: the message authentication algorithm to use
3161 : *
3162 : * This function will run self tests on PBKDF2 with the provided mac.
3163 : *
3164 : * Returns: Zero or a negative error code on error.
3165 : *
3166 : * Since: 3.3.0-FIPS140
3167 : -*/
3168 0 : int gnutls_pbkdf2_self_test(unsigned flags, gnutls_mac_algorithm_t mac)
3169 : {
3170 0 : int ret;
3171 :
3172 0 : if (flags & GNUTLS_SELF_TEST_FLAG_ALL)
3173 : mac = GNUTLS_MAC_UNKNOWN;
3174 :
3175 0 : switch (mac) {
3176 0 : case GNUTLS_MAC_UNKNOWN:
3177 0 : CASE(GNUTLS_MAC_SHA256, test_pbkdf2, pbkdf2_sha256_vectors);
3178 :
3179 : break;
3180 : default:
3181 0 : return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
3182 : }
3183 :
3184 : return 0;
3185 : }
3186 :
3187 : struct tlsprf_vectors_st {
3188 : const uint8_t *key;
3189 : size_t key_size;
3190 : const uint8_t *label;
3191 : size_t label_size;
3192 : const uint8_t *seed;
3193 : size_t seed_size;
3194 : const uint8_t *output;
3195 : size_t output_size;
3196 : };
3197 :
3198 : const struct tlsprf_vectors_st tls10prf_vectors[] = {
3199 : /* tests/tls10-prf.c: test1 */
3200 : {
3201 : STR(key, key_size,
3202 : "\x26\x3b\xdb\xbb\x6f\x6d\x4c\x66\x4e\x05\x8d\x0a\xa9\xd3"
3203 : "\x21\xbe"),
3204 : STR(label, label_size,
3205 : "test label"),
3206 : STR(seed, seed_size,
3207 : "\xb9\x20\x57\x3b\x19\x96\x01\x02\x4f\x04\xd6\xdc\x61\x96"
3208 : "\x6e\x65"),
3209 : STR(output, output_size,
3210 : "\x66\x17\x99\x37\x65\xfa\x6c\xa7\x03\xd1\x9e\xc7\x0d\xd5"
3211 : "\xdd\x16\x0f\xfc\xc0\x77\x25\xfa\xfb\x71\x4a\x9f\x81\x5a"
3212 : "\x2a\x30\xbf\xb7\xe3\xbb\xfb\x7e\xee\x57\x4b\x3b\x61\x3e"
3213 : "\xb7\xfe\x80\xee\xc9\x69\x1d\x8c\x1b\x0e\x2d\x9b\x3c\x8b"
3214 : "\x4b\x02\xb6\xb6\xd6\xdb\x88\xe2\x09\x46\x23\xef\x62\x40"
3215 : "\x60\x7e\xda\x7a\xbe\x3c\x84\x6e\x82\xa3"),
3216 : },
3217 : };
3218 :
3219 : const struct tlsprf_vectors_st tls12prf_sha256_vectors[] = {
3220 : /* tests/tls12-prf.c: sha256_test1 */
3221 : {
3222 : STR(key, key_size,
3223 : "\x04\x50\xb0\xea\x9e\xcd\x36\x02\xee\x0d\x76\xc5\xc3\xc8"
3224 : "\x6f\x4a"),
3225 : STR(label, label_size,
3226 : "test label"),
3227 : STR(seed, seed_size,
3228 : "\x20\x7a\xcc\x02\x54\xb8\x67\xf5\xb9\x25\xb4\x5a\x33\x60"
3229 : "\x1d\x8b"),
3230 : STR(output, output_size,
3231 : "\xae\x67\x9e\x0e\x71\x4f\x59\x75\x76\x37\x68\xb1\x66\x97"
3232 : "\x9e\x1d"),
3233 : },
3234 : /* tests/tls12-prf.c: sha256_test2 */
3235 : {
3236 : STR(key, key_size,
3237 : "\x34\x20\x4a\x9d\xf0\xbe\x6e\xb4\xe9\x25\xa8\x02\x7c\xf6"
3238 : "\xc6\x02"),
3239 : STR(label, label_size,
3240 : "test label"),
3241 : STR(seed, seed_size,
3242 : "\x98\xb2\xc4\x0b\xcd\x66\x4c\x83\xbb\x92\x0c\x18\x20\x1a"
3243 : "\x63\x95"),
3244 : STR(output, output_size,
3245 : "\xaf\xa9\x31\x24\x53\xc2\x2f\xa8\x3d\x2b\x51\x1b\x37\x2d"
3246 : "\x73\xa4\x02\xa2\xa6\x28\x73\x23\x9a\x51\xfa\xde\x45\x08"
3247 : "\x2f\xaf\x3f\xd2\xbb\x7f\xfb\x3e\x9b\xf3\x6e\x28\xb3\x14"
3248 : "\x1a\xab\xa4\x84\x00\x53\x32\xa9\xf9\xe3\x88\xa4\xd3\x29"
3249 : "\xf1\x58\x7a\x4b\x31\x7d\xa0\x77\x08\xea\x1b\xa9\x5a\x53"
3250 : "\xf8\x78\x67\x24\xbd\x83\xce\x4b\x03\xaf"),
3251 : },
3252 : /* tests/tls12-prf.c: sha256_test3 */
3253 : {
3254 : STR(key, key_size,
3255 : "\xa3\x69\x1a\xa1\xf6\x81\x4b\x80\x59\x2b\xf1\xcf\x2a\xcf"
3256 : "\x16\x97"),
3257 : STR(label, label_size,
3258 : "test label"),
3259 : STR(seed, seed_size,
3260 : "\x55\x23\xd4\x1e\x32\x0e\x69\x4d\x0c\x1f\xf5\x73\x4d\x83"
3261 : "\x0b\x93\x3e\x46\x92\x70\x71\xc9\x26\x21"),
3262 : STR(output, output_size,
3263 : "\x6a\xd0\x98\x4f\xa0\x6f\x78\xfe\x16\x1b\xd4\x6d\x7c\x26"
3264 : "\x1d\xe4\x33\x40\xd7\x28\xdd\xdc\x3d\x0f\xf0\xdd\x7e\x0d"),
3265 : },
3266 : /* tests/tls12-prf.c: sha256_test4 */
3267 : {
3268 : STR(key, key_size,
3269 : "\x21\x0e\xc9\x37\x06\x97\x07\xe5\x46\x5b\xc4\x6b\xf7\x79"
3270 : "\xe1\x04\x10\x8b\x18\xfd\xb7\x93\xbe\x7b\x21\x8d\xbf\x14"
3271 : "\x5c\x86\x41\xf3"),
3272 : STR(label, label_size,
3273 : "test label"),
3274 : STR(seed, seed_size,
3275 : "\x1e\x35\x1a\x0b\xaf\x35\xc7\x99\x45\x92\x43\x94\xb8\x81"
3276 : "\xcf\xe3\x1d\xae\x8f\x1c\x1e\xd5\x4d\x3b"),
3277 : STR(output, output_size,
3278 : "\x76\x53\xfa\x80\x9c\xde\x3b\x55\x3c\x4a\x17\xe2\xcd\xbc"
3279 : "\xc9\x18\xf3\x65\x27\xf2\x22\x19\xa7\xd7\xf9\x5d\x97\x24"
3280 : "\x3f\xf2\xd5\xde\xe8\x26\x5e\xf0\xaf\x03"),
3281 : },
3282 : };
3283 :
3284 : const struct tlsprf_vectors_st tls12prf_sha384_vectors[] = {
3285 : /* tests/tls12-prf.c: sha384_test1
3286 : * https://www.ietf.org/mail-archive/web/tls/current/msg03416.html
3287 : */
3288 : {
3289 : STR(key, key_size,
3290 : "\xb8\x0b\x73\x3d\x6c\xee\xfc\xdc\x71\x56\x6e\xa4\x8e\x55"
3291 : "\x67\xdf"),
3292 : STR(label, label_size,
3293 : "test label"),
3294 : STR(seed, seed_size,
3295 : "\xcd\x66\x5c\xf6\xa8\x44\x7d\xd6\xff\x8b\x27\x55\x5e\xdb"
3296 : "\x74\x65"),
3297 : STR(output, output_size,
3298 : "\x7b\x0c\x18\xe9\xce\xd4\x10\xed\x18\x04\xf2\xcf\xa3\x4a"
3299 : "\x33\x6a\x1c\x14\xdf\xfb\x49\x00\xbb\x5f\xd7\x94\x21\x07"
3300 : "\xe8\x1c\x83\xcd\xe9\xca\x0f\xaa\x60\xbe\x9f\xe3\x4f\x82"
3301 : "\xb1\x23\x3c\x91\x46\xa0\xe5\x34\xcb\x40\x0f\xed\x27\x00"
3302 : "\x88\x4f\x9d\xc2\x36\xf8\x0e\xdd\x8b\xfa\x96\x11\x44\xc9"
3303 : "\xe8\xd7\x92\xec\xa7\x22\xa7\xb3\x2f\xc3\xd4\x16\xd4\x73"
3304 : "\xeb\xc2\xc5\xfd\x4a\xbf\xda\xd0\x5d\x91\x84\x25\x9b\x5b"
3305 : "\xf8\xcd\x4d\x90\xfa\x0d\x31\xe2\xde\xc4\x79\xe4\xf1\xa2"
3306 : "\x60\x66\xf2\xee\xa9\xa6\x92\x36\xa3\xe5\x26\x55\xc9\xe9"
3307 : "\xae\xe6\x91\xc8\xf3\xa2\x68\x54\x30\x8d\x5e\xaa\x3b\xe8"
3308 : "\x5e\x09\x90\x70\x3d\x73\xe5\x6f"),
3309 : },
3310 : };
3311 :
3312 0 : static int test_tlsprf(gnutls_mac_algorithm_t mac,
3313 : const struct tlsprf_vectors_st *vectors,
3314 : size_t vectors_size, unsigned flags)
3315 : {
3316 0 : unsigned int i;
3317 :
3318 0 : for (i = 0; i < vectors_size; i++) {
3319 0 : char output[4096];
3320 0 : int ret;
3321 :
3322 0 : ret = _gnutls_prf_raw(mac,
3323 0 : vectors[i].key_size, vectors[i].key,
3324 0 : vectors[i].label_size, (const char *)vectors[i].label,
3325 : vectors[i].seed_size, vectors[i].seed,
3326 0 : vectors[i].output_size, output);
3327 0 : if (ret < 0) {
3328 0 : _gnutls_debug_log("error calculating TLS-PRF: MAC-%s\n",
3329 : gnutls_mac_get_name(mac));
3330 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
3331 : }
3332 :
3333 0 : if (memcmp(output, vectors[i].output, vectors[i].output_size) != 0) {
3334 0 : _gnutls_debug_log
3335 : ("TLS-PRF: MAC-%s test vector failed!\n",
3336 : gnutls_mac_get_name(mac));
3337 :
3338 0 : return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
3339 : }
3340 : }
3341 :
3342 0 : _gnutls_debug_log
3343 : ("TLS-PRF: MAC-%s self check succeeded\n",
3344 : gnutls_mac_get_name(mac));
3345 :
3346 : return 0;
3347 : }
3348 :
3349 : /*-
3350 : * gnutls_tlsprf_self_test:
3351 : * @flags: GNUTLS_SELF_TEST_FLAG flags
3352 : * @mac: the message authentication algorithm to use
3353 : *
3354 : * This function will run self tests on TLS-PRF with the provided mac.
3355 : *
3356 : * Returns: Zero or a negative error code on error.
3357 : *
3358 : * Since: 3.3.0-FIPS140
3359 : -*/
3360 0 : int gnutls_tlsprf_self_test(unsigned flags, gnutls_mac_algorithm_t mac)
3361 : {
3362 0 : int ret;
3363 :
3364 0 : if (flags & GNUTLS_SELF_TEST_FLAG_ALL)
3365 : mac = GNUTLS_MAC_UNKNOWN;
3366 :
3367 0 : switch (mac) {
3368 : case GNUTLS_MAC_UNKNOWN:
3369 0 : NON_FIPS_CASE(GNUTLS_MAC_MD5_SHA1, test_tlsprf, tls10prf_vectors);
3370 0 : FALLTHROUGH;
3371 0 : CASE(GNUTLS_MAC_SHA256, test_tlsprf, tls12prf_sha256_vectors);
3372 0 : FALLTHROUGH;
3373 0 : CASE(GNUTLS_MAC_SHA384, test_tlsprf, tls12prf_sha384_vectors);
3374 :
3375 : break;
3376 : default:
3377 0 : return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
3378 : }
3379 :
3380 : return 0;
3381 : }
|