LCOV - code coverage report
Current view: top level - builds/gnutls/coverage/gnutls-git/lib - crypto-selftests.c (source / functions) Hit Total Coverage
Test: GnuTLS-3.6.14 Code Coverage Lines: 521 736 70.8 %
Date: 2020-10-30 04:50:48 Functions: 10 16 62.5 %
Legend: Lines: hit not hit

          Line data    Source code
       1             : /*
       2             :  * Copyright (C) 2013-2018 Red Hat
       3             :  *
       4             :  * Author: Nikos Mavrogiannopoulos
       5             :  *
       6             :  * This file is part of GnuTLS.
       7             :  *
       8             :  * The GnuTLS is free software; you can redistribute it and/or
       9             :  * modify it under the terms of the GNU Lesser General Public License
      10             :  * as published by the Free Software Foundation; either version 2.1 of
      11             :  * the License, or (at your option) any later version.
      12             :  *
      13             :  * This library is distributed in the hope that it will be useful, but
      14             :  * WITHOUT ANY WARRANTY; without even the implied warranty of
      15             :  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
      16             :  * Lesser General Public License for more details.
      17             :  *
      18             :  * You should have received a copy of the GNU Lesser General Public License
      19             :  * along with this program.  If not, see <https://www.gnu.org/licenses/>
      20             :  *
      21             :  */
      22             : 
      23             : #include "gnutls_int.h"
      24             : #include "errors.h"
      25             : #include <cipher_int.h>
      26             : #include <datum.h>
      27             : #include <gnutls/crypto.h>
      28             : #include <gnutls/self-test.h>
      29             : #include "errors.h"
      30             : #include <random.h>
      31             : #include <crypto.h>
      32             : #include <nettle/sha3.h>
      33             : 
      34             : #define STR(tag, tag_size, val) \
      35             :         .tag = (uint8_t*)val, \
      36             :         .tag_size = (sizeof(val)-1)
      37             : 
      38             : #define V(x) (x), (sizeof(x)/sizeof(x[0]))
      39             : 
      40             : /* This does check the AES and SHA implementation against test vectors.
      41             :  * This should not run under valgrind in order to use the native
      42             :  * cpu instructions (AES-NI or padlock).
      43             :  */
      44             : 
      45             : struct cipher_vectors_st {
      46             :         const uint8_t *key;
      47             :         unsigned int key_size;
      48             : 
      49             :         const uint8_t *plaintext;
      50             :         unsigned int plaintext_size;
      51             :         const uint8_t *ciphertext;      /* also of plaintext_size */
      52             : 
      53             :         const uint8_t *iv;
      54             :         unsigned int iv_size;
      55             : 
      56             :         const uint8_t *internal_iv;
      57             :         unsigned int internal_iv_size;
      58             : };
      59             : 
      60             : struct cipher_aead_vectors_st {
      61             :         unsigned compat_apis;
      62             :         const uint8_t *key;
      63             :         unsigned int key_size;
      64             : 
      65             :         const uint8_t *auth;
      66             :         unsigned int auth_size;
      67             : 
      68             :         const uint8_t *plaintext;
      69             :         unsigned int plaintext_size;
      70             :         const uint8_t *ciphertext;      /* also of plaintext_size */
      71             : 
      72             :         unsigned int iv_size;
      73             :         const uint8_t *iv;
      74             :         const uint8_t *tag;
      75             :         unsigned tag_size;
      76             :         unsigned tag_prepended;
      77             : };
      78             : 
      79             : const struct cipher_aead_vectors_st chacha_poly1305_vectors[] = {
      80             :         {
      81             :          .compat_apis = 1,
      82             :          STR(key, key_size,
      83             :              "\x1c\x92\x40\xa5\xeb\x55\xd3\x8a\xf3\x33\x88\x86\x04\xf6\xb5\xf0\x47\x39\x17\xc1\x40\x2b\x80\x09\x9d\xca\x5c\xbc\x20\x70\x75\xc0"),
      84             :          .auth = (void*)"\xf3\x33\x88\x86\x00\x00\x00\x00\x00\x00\x4e\x91",
      85             :          .auth_size = 12,
      86             :          .plaintext = (void*)"\x49\x6e\x74\x65\x72\x6e\x65\x74\x2d\x44\x72\x61\x66\x74\x73\x20\x61\x72\x65\x20\x64\x72\x61\x66\x74\x20\x64\x6f\x63\x75\x6d\x65\x6e\x74\x73\x20\x76\x61\x6c\x69\x64\x20\x66\x6f\x72\x20\x61\x20\x6d\x61\x78\x69\x6d\x75\x6d\x20\x6f\x66\x20\x73\x69\x78\x20\x6d\x6f\x6e\x74\x68\x73\x20\x61\x6e\x64\x20\x6d\x61\x79\x20\x62\x65\x20\x75\x70\x64\x61\x74\x65\x64\x2c\x20\x72\x65\x70\x6c\x61\x63\x65\x64\x2c\x20\x6f\x72\x20\x6f\x62\x73\x6f\x6c\x65\x74\x65\x64\x20\x62\x79\x20\x6f\x74\x68\x65\x72\x20\x64\x6f\x63\x75\x6d\x65\x6e\x74\x73\x20\x61\x74\x20\x61\x6e\x79\x20\x74\x69\x6d\x65\x2e\x20\x49\x74\x20\x69\x73\x20\x69\x6e\x61\x70\x70\x72\x6f\x70\x72\x69\x61\x74\x65\x20\x74\x6f\x20\x75\x73\x65\x20\x49\x6e\x74\x65\x72\x6e\x65\x74\x2d\x44\x72\x61\x66\x74\x73\x20\x61\x73\x20\x72\x65\x66\x65\x72\x65\x6e\x63\x65\x20\x6d\x61\x74\x65\x72\x69\x61\x6c\x20\x6f\x72\x20\x74\x6f\x20\x63\x69\x74\x65\x20\x74\x68\x65\x6d\x20\x6f\x74\x68\x65\x72\x20\x74\x68\x61\x6e\x20\x61\x73\x20\x2f\xe2\x80\x9c\x77\x6f\x72\x6b\x20\x69\x6e\x20\x70\x72\x6f\x67\x72\x65\x73\x73\x2e\x2f\xe2\x80\x9d",
      87             :          .plaintext_size = 265,
      88             :          .ciphertext = (void*)"\x64\xa0\x86\x15\x75\x86\x1a\xf4\x60\xf0\x62\xc7\x9b\xe6\x43\xbd\x5e\x80\x5c\xfd\x34\x5c\xf3\x89\xf1\x08\x67\x0a\xc7\x6c\x8c\xb2\x4c\x6c\xfc\x18\x75\x5d\x43\xee\xa0\x9e\xe9\x4e\x38\x2d\x26\xb0\xbd\xb7\xb7\x3c\x32\x1b\x01\x00\xd4\xf0\x3b\x7f\x35\x58\x94\xcf\x33\x2f\x83\x0e\x71\x0b\x97\xce\x98\xc8\xa8\x4a\xbd\x0b\x94\x81\x14\xad\x17\x6e\x00\x8d\x33\xbd\x60\xf9\x82\xb1\xff\x37\xc8\x55\x97\x97\xa0\x6e\xf4\xf0\xef\x61\xc1\x86\x32\x4e\x2b\x35\x06\x38\x36\x06\x90\x7b\x6a\x7c\x02\xb0\xf9\xf6\x15\x7b\x53\xc8\x67\xe4\xb9\x16\x6c\x76\x7b\x80\x4d\x46\xa5\x9b\x52\x16\xcd\xe7\xa4\xe9\x90\x40\xc5\xa4\x04\x33\x22\x5e\xe2\x82\xa1\xb0\xa0\x6c\x52\x3e\xaf\x45\x34\xd7\xf8\x3f\xa1\x15\x5b\x00\x47\x71\x8c\xbc\x54\x6a\x0d\x07\x2b\x04\xb3\x56\x4e\xea\x1b\x42\x22\x73\xf5\x48\x27\x1a\x0b\xb2\x31\x60\x53\xfa\x76\x99\x19\x55\xeb\xd6\x31\x59\x43\x4e\xce\xbb\x4e\x46\x6d\xae\x5a\x10\x73\xa6\x72\x76\x27\x09\x7a\x10\x49\xe6\x17\xd9\x1d\x36\x10\x94\xfa\x68\xf0\xff\x77\x98\x71\x30\x30\x5b\xea\xba\x2e\xda\x04\xdf\x99\x7b\x71\x4d\x6c\x6f\x2c\x29\xa6\xad\x5c\xb4\x02\x2b\x02\x70\x9b",
      89             :          STR(iv, iv_size,
      90             :              "\x00\x00\x00\x00\x01\x02\x03\x04\x05\x06\x07\x08"),
      91             :          .tag_size = 16,
      92             :          .tag = (void *)
      93             :          "\xee\xad\x9d\x67\x89\x0c\xbb\x22\x39\x23\x36\xfe\xa1\x85\x1f\x38"},
      94             : };
      95             : 
      96             : const struct cipher_aead_vectors_st aes128_gcm_vectors[] = {
      97             :         {
      98             :          .compat_apis = 1,
      99             :          STR(key, key_size,
     100             :              "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
     101             :          .auth = NULL,
     102             :          .auth_size = 0,
     103             :          .plaintext = NULL,
     104             :          .plaintext_size = 0,
     105             :          .ciphertext = NULL,
     106             :          STR(iv, iv_size,
     107             :              "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
     108             :          .tag_size = 16,
     109             :          .tag = (void *)
     110             :          "\x58\xe2\xfc\xce\xfa\x7e\x30\x61\x36\x7f\x1d\x57\xa4\xe7\x45\x5a"},
     111             :         {
     112             :          .compat_apis = 1,
     113             :          STR(key, key_size,
     114             :              "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
     115             :          .auth = NULL,
     116             :          .auth_size = 0,
     117             :          STR(plaintext, plaintext_size,
     118             :              "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
     119             :          .ciphertext = (void *)
     120             :          "\x03\x88\xda\xce\x60\xb6\xa3\x92\xf3\x28\xc2\xb9\x71\xb2\xfe\x78",
     121             :          STR(iv, iv_size,
     122             :              "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
     123             :          .tag_size = 16,
     124             :          .tag = (void *)
     125             :          "\xab\x6e\x47\xd4\x2c\xec\x13\xbd\xf5\x3a\x67\xb2\x12\x57\xbd\xdf"},
     126             :         {
     127             :          .compat_apis = 1,
     128             :          STR(key, key_size,
     129             :              "\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08"),
     130             :          .auth = (void *)
     131             :          "\xfe\xed\xfa\xce\xde\xad\xbe\xef\xfe\xed\xfa\xce\xde\xad\xbe\xef\xab\xad\xda\xd2",
     132             :          .auth_size = 20,
     133             :          STR(plaintext, plaintext_size,
     134             :              "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39"),
     135             :          .ciphertext = (void *)
     136             :          "\x42\x83\x1e\xc2\x21\x77\x74\x24\x4b\x72\x21\xb7\x84\xd0\xd4\x9c\xe3\xaa\x21\x2f\x2c\x02\xa4\xe0\x35\xc1\x7e\x23\x29\xac\xa1\x2e\x21\xd5\x14\xb2\x54\x66\x93\x1c\x7d\x8f\x6a\x5a\xac\x84\xaa\x05\x1b\xa3\x0b\x39\x6a\x0a\xac\x97\x3d\x58\xe0\x91",
     137             :          STR(iv, iv_size,
     138             :              "\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88"),
     139             :          .tag_size = 16,
     140             :          .tag = (void *)
     141             :          "\x5b\xc9\x4f\xbc\x32\x21\xa5\xdb\x94\xfa\xe9\x5a\xe7\x12\x1a\x47"}
     142             : };
     143             : 
     144             : const struct cipher_aead_vectors_st aes192_gcm_vectors[] = {
     145             :         {
     146             :          .compat_apis = 1,
     147             :          STR(key, key_size,
     148             :              "\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08\xfe\xff\xe9\x92\x86\x65\x73\x1c"),
     149             :          .auth = NULL,
     150             :          .auth_size = 0,
     151             :          STR(plaintext, plaintext_size,
     152             :              "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39\x1a\xaf\xd2\x55"),
     153             :          .ciphertext =
     154             :          (uint8_t *)
     155             :          "\x39\x80\xca\x0b\x3c\x00\xe8\x41\xeb\x06\xfa\xc4\x87\x2a\x27\x57\x85\x9e\x1c\xea\xa6\xef\xd9\x84\x62\x85\x93\xb4\x0c\xa1\xe1\x9c\x7d\x77\x3d\x00\xc1\x44\xc5\x25\xac\x61\x9d\x18\xc8\x4a\x3f\x47\x18\xe2\x44\x8b\x2f\xe3\x24\xd9\xcc\xda\x27\x10\xac\xad\xe2\x56",
     156             :          STR(iv, iv_size,
     157             :              "\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88"),
     158             :          .tag_size = 16,
     159             :          .tag =
     160             :          (void *)
     161             :          "\x99\x24\xa7\xc8\x58\x73\x36\xbf\xb1\x18\x02\x4d\xb8\x67\x4a\x14"},
     162             : 
     163             : };
     164             : 
     165             : const struct cipher_aead_vectors_st aes256_gcm_vectors[] = {
     166             :         {
     167             :          .compat_apis = 1,
     168             :          STR(key, key_size,
     169             :              "\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08"),
     170             :          .auth = NULL,
     171             :          .auth_size = 0,
     172             :          STR(plaintext, plaintext_size,
     173             :              "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39\x1a\xaf\xd2\x55"),
     174             :          .ciphertext =
     175             :          (uint8_t *)
     176             :          "\x52\x2d\xc1\xf0\x99\x56\x7d\x07\xf4\x7f\x37\xa3\x2a\x84\x42\x7d\x64\x3a\x8c\xdc\xbf\xe5\xc0\xc9\x75\x98\xa2\xbd\x25\x55\xd1\xaa\x8c\xb0\x8e\x48\x59\x0d\xbb\x3d\xa7\xb0\x8b\x10\x56\x82\x88\x38\xc5\xf6\x1e\x63\x93\xba\x7a\x0a\xbc\xc9\xf6\x62\x89\x80\x15\xad",
     177             :          STR(iv, iv_size,
     178             :              "\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88"),
     179             :          .tag_size = 16,
     180             :          .tag =
     181             :          (void *)
     182             :          "\xb0\x94\xda\xc5\xd9\x34\x71\xbd\xec\x1a\x50\x22\x70\xe3\xcc\x6c"},
     183             : 
     184             : };
     185             : 
     186             : const struct cipher_aead_vectors_st aes256_ccm_vectors[] = {
     187             :         {
     188             :          .compat_apis = 0,
     189             :          STR(key, key_size,
     190             :              "\xfb\x76\x15\xb2\x3d\x80\x89\x1d\xd4\x70\x98\x0b\xc7\x95\x84\xc8\xb2\xfb\x64\xce\x60\x97\x8f\x4d\x17\xfc\xe4\x5a\x49\xe8\x30\xb7"),
     191             :          .auth = NULL,
     192             :          .auth_size = 0,
     193             :          STR(plaintext, plaintext_size,
     194             :              "\xa8\x45\x34\x8e\xc8\xc5\xb5\xf1\x26\xf5\x0e\x76\xfe\xfd\x1b\x1e"),
     195             :          .ciphertext = (void *)
     196             :              "\xcc\x88\x12\x61\xc6\xa7\xfa\x72\xb9\x6a\x17\x39\x17\x6b\x27\x7f",
     197             :          STR(iv, iv_size,
     198             :              "\xdb\xd1\xa3\x63\x60\x24\xb7\xb4\x02\xda\x7d\x6f"),
     199             :          .tag_size = 16,
     200             :          .tag = (void *)
     201             :              "\x34\x72\xe1\x14\x5f\x2c\x0c\xbe\x14\x63\x49\x06\x2c\xf0\xe4\x23"},
     202             :         {
     203             :          .compat_apis = 0,
     204             :          STR(key, key_size,
     205             :              "\xfb\x76\x15\xb2\x3d\x80\x89\x1d\xd4\x70\x98\x0b\xc7\x95\x84\xc8\xb2\xfb\x64\xce\x60\x97\x87\x8d\x17\xfc\xe4\x5a\x49\xe8\x30\xb7"),
     206             :          STR(auth, auth_size, "\x36"),
     207             :          STR(plaintext, plaintext_size,
     208             :              "\xa9"),
     209             :          .ciphertext = (void *)
     210             :              "\x9d",
     211             :          STR(iv, iv_size,
     212             :              "\xdb\xd1\xa3\x63\x60\x24\xb7\xb4\x02\xda\x7d\x6f"),
     213             :          .tag_size = 16,
     214             :          .tag = (void *)
     215             :              "\x32\x61\xb1\xcf\x93\x14\x31\xe9\x9a\x32\x80\x67\x38\xec\xbd\x2a"},
     216             : };
     217             : 
     218             : const struct cipher_aead_vectors_st aes128_ccm_vectors[] = {
     219             :         {
     220             :          .compat_apis = 0,
     221             :          STR(key, key_size,
     222             :              "\xC0\xC1\xC2\xC3\xC4\xC5\xC6\xC7\xC8\xC9\xCA\xCB\xCC\xCD\xCE\xCF"),
     223             :          STR(auth, auth_size, "\x08\xD0\x84\x21\x43\x01\x00\x00\x00\x00\x48\xDE\xAC\x02\x05\x00\x00\x00\x55\xCF\x00\x00\x51\x52\x53\x54"),
     224             :          .plaintext = NULL,
     225             :          .plaintext_size = 0,
     226             :          STR(iv, iv_size,
     227             :              "\xAC\xDE\x48\x00\x00\x00\x00\x01\x00\x00\x00\x05\x02"),
     228             :          .tag_size = 8,
     229             :          .tag = (void *)
     230             :              "\x22\x3B\xC1\xEC\x84\x1A\xB5\x53"},
     231             :         {
     232             :          .compat_apis = 0,
     233             :          STR(key, key_size,
     234             :              "\x40\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f"),
     235             :          STR(auth, auth_size, "\x00\x01\x02\x03\x04\x05\x06\x07"),
     236             :          STR(plaintext, plaintext_size,
     237             :              "\x20\x21\x22\x23"),
     238             :          .ciphertext = (void *)
     239             :              "\x71\x62\x01\x5b",
     240             :          STR(iv, iv_size,
     241             :              "\x10\x11\x12\x13\x14\x15\x16"),
     242             :          .tag_size = 4,
     243             :          .tag = (void *)
     244             :              "\x4d\xac\x25\x5d"},
     245             :         /* from rfc3610 */
     246             :         {
     247             :          .compat_apis = 0,
     248             :          STR(key, key_size,
     249             :              "\xC0\xC1\xC2\xC3\xC4\xC5\xC6\xC7\xC8\xC9\xCA\xCB\xCC\xCD\xCE\xCF"),
     250             :          STR(auth, auth_size, "\x00\x01\x02\x03\x04\x05\x06\x07"),
     251             :          STR(plaintext, plaintext_size,
     252             :              "\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E"),
     253             :          .ciphertext = (void *)
     254             :              "\x01\x35\xD1\xB2\xC9\x5F\x41\xD5\xD1\xD4\xFE\xC1\x85\xD1\x66\xB8\x09\x4E\x99\x9D\xFE\xD9\x6C",
     255             :          STR(iv, iv_size,
     256             :              "\x00\x00\x00\x09\x08\x07\x06\xA0\xA1\xA2\xA3\xA4\xA5"),
     257             :          .tag_size = 10,
     258             :          .tag = (void *)
     259             :              "\x04\x8C\x56\x60\x2C\x97\xAC\xBB\x74\x90"},
     260             :         {
     261             :          .compat_apis = 0,
     262             :          STR(key, key_size,
     263             :              "\xC0\xC1\xC2\xC3\xC4\xC5\xC6\xC7\xC8\xC9\xCA\xCB\xCC\xCD\xCE\xCF"),
     264             :          STR(auth, auth_size, "\x00\x01\x02\x03\x04\x05\x06\x07"),
     265             :          STR(plaintext, plaintext_size,
     266             :              "\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E"),
     267             :          .ciphertext = (void *)
     268             :              "\x58\x8C\x97\x9A\x61\xC6\x63\xD2\xF0\x66\xD0\xC2\xC0\xF9\x89\x80\x6D\x5F\x6B\x61\xDA\xC3\x84",
     269             :          STR(iv, iv_size,
     270             :              "\x00\x00\x00\x03\x02\x01\x00\xA0\xA1\xA2\xA3\xA4\xA5"),
     271             :          .tag_size = 8,
     272             :          .tag = (void *)
     273             :              "\x17\xE8\xD1\x2C\xFD\xF9\x26\xE0"},
     274             : };
     275             : 
     276             : const struct cipher_vectors_st aes128_cbc_vectors[] = {
     277             :         {
     278             :          STR(key, key_size,
     279             :              "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c"),
     280             :          STR(plaintext, plaintext_size,
     281             :              "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"),
     282             :          .ciphertext = (uint8_t *)
     283             :          "\x76\x49\xab\xac\x81\x19\xb2\x46\xce\xe9\x8e\x9b\x12\xe9\x19\x7d",
     284             :          STR(iv, iv_size,
     285             :              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F"),
     286             :          },
     287             :         {
     288             :          STR(key, key_size,
     289             :              "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c"),
     290             :          STR(plaintext, plaintext_size,
     291             :              "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51"),
     292             :          .ciphertext =
     293             :          (uint8_t *)
     294             :          "\x50\x86\xcb\x9b\x50\x72\x19\xee\x95\xdb\x11\x3a\x91\x76\x78\xb2",
     295             :          STR(iv, iv_size,
     296             :              "\x76\x49\xab\xac\x81\x19\xb2\x46\xce\xe9\x8e\x9b\x12\xe9\x19\x7d"),
     297             :          },
     298             : };
     299             : 
     300             : const struct cipher_vectors_st aes192_cbc_vectors[] = {
     301             :         {
     302             :          STR(key, key_size,
     303             :              "\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b\x80\x90\x79\xe5\x62\xf8\xea\xd2\x52\x2c\x6b\x7b"),
     304             :          STR(plaintext, plaintext_size,
     305             :              "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"),
     306             :          .ciphertext = (uint8_t *)
     307             :          "\x4f\x02\x1d\xb2\x43\xbc\x63\x3d\x71\x78\x18\x3a\x9f\xa0\x71\xe8",
     308             :          STR(iv, iv_size,
     309             :              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F"),
     310             :          },
     311             :         {
     312             :          STR(key, key_size,
     313             :              "\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b\x80\x90\x79\xe5\x62\xf8\xea\xd2\x52\x2c\x6b\x7b"),
     314             :          STR(plaintext, plaintext_size,
     315             :              "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51"),
     316             :          .ciphertext = (uint8_t *)
     317             :          "\xb4\xd9\xad\xa9\xad\x7d\xed\xf4\xe5\xe7\x38\x76\x3f\x69\x14\x5a",
     318             :          STR(iv, iv_size,
     319             :              "\x4F\x02\x1D\xB2\x43\xBC\x63\x3D\x71\x78\x18\x3A\x9F\xA0\x71\xE8"),
     320             :          },
     321             : };
     322             : 
     323             : const struct cipher_vectors_st aes256_cbc_vectors[] = {
     324             :         {
     325             :          STR(key, key_size,
     326             :              "\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4"),
     327             :          STR(plaintext, plaintext_size,
     328             :              "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"),
     329             :          .ciphertext = (uint8_t *)
     330             :          "\xF5\x8C\x4C\x04\xD6\xE5\xF1\xBA\x77\x9E\xAB\xFB\x5F\x7B\xFB\xD6",
     331             :          STR(iv, iv_size,
     332             :              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F"),
     333             :          },
     334             :         {
     335             :          STR(key, key_size,
     336             :              "\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4"),
     337             :          STR(plaintext, plaintext_size,
     338             :              "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51"),
     339             :          .ciphertext = (uint8_t *)
     340             :          "\x9c\xfc\x4e\x96\x7e\xdb\x80\x8d\x67\x9f\x77\x7b\xc6\x70\x2c\x7d",
     341             :          STR(iv, iv_size,
     342             :              "\xF5\x8C\x4C\x04\xD6\xE5\xF1\xBA\x77\x9E\xAB\xFB\x5F\x7B\xFB\xD6"),
     343             :          },
     344             : };
     345             : 
     346             : const struct cipher_vectors_st tdes_cbc_vectors[] = {
     347             : /* First 2 from https://www.cosic.esat.kuleuven.be/nessie/testvectors/bc/des/Triple-Des-3-Key-192-64.unverified.test-vectors */
     348             :         {
     349             :          STR(key, key_size,
     350             :              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17"),
     351             :          STR(plaintext, plaintext_size,
     352             :              "\x98\x26\x62\x60\x55\x53\x24\x4D"),
     353             :          .ciphertext = (uint8_t *)
     354             :          "\x00\x11\x22\x33\x44\x55\x66\x77",
     355             :          STR(iv, iv_size, "\x00\x00\x00\x00\x00\x00\x00\x00"),
     356             :          },
     357             :         {
     358             :          STR(key, key_size,
     359             :              "\x2B\xD6\x45\x9F\x82\xC5\xB3\x00\x95\x2C\x49\x10\x48\x81\xFF\x48\x2B\xD6\x45\x9F\x82\xC5\xB3\x00"),
     360             :          STR(plaintext, plaintext_size,
     361             :              "\x85\x98\x53\x8A\x8E\xCF\x11\x7D"),
     362             :          .ciphertext = (uint8_t *)
     363             :          "\xEA\x02\x47\x14\xAD\x5C\x4D\x84",
     364             :          STR(iv, iv_size, "\x00\x00\x00\x00\x00\x00\x00\x00"),
     365             :          },
     366             : };
     367             : 
     368             : const struct cipher_vectors_st arcfour_vectors[] = { /* RFC6229 */
     369             :         {
     370             :          STR(key, key_size,
     371             :              "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18"),
     372             :          STR(plaintext, plaintext_size,
     373             :              "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
     374             :          .ciphertext = (uint8_t *)
     375             :              "\x05\x95\xe5\x7f\xe5\xf0\xbb\x3c\x70\x6e\xda\xc8\xa4\xb2\xdb\x11",
     376             :          .iv = NULL,
     377             :          .iv_size = 0
     378             :         },
     379             :         {
     380             :          STR(key, key_size,
     381             :              "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20"),
     382             :          STR(plaintext, plaintext_size,
     383             :              "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
     384             :          .ciphertext = (uint8_t *)
     385             :              "\xea\xa6\xbd\x25\x88\x0b\xf9\x3d\x3f\x5d\x1e\x4c\xa2\x61\x1d\x91",
     386             :          .iv = NULL,
     387             :          .iv_size = 0
     388             :         },
     389             :         {
     390             :          STR(key, key_size,
     391             :              "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10"),
     392             :          STR(plaintext, plaintext_size,
     393             :              "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
     394             :          .ciphertext = (uint8_t *)
     395             :          "\x9a\xc7\xcc\x9a\x60\x9d\x1e\xf7\xb2\x93\x28\x99\xcd\xe4\x1b\x97",
     396             :          .iv = NULL,
     397             :          .iv_size = 0
     398             :         },
     399             : };
     400             : 
     401             : const struct cipher_vectors_st aes128_cfb8_vectors[] = { /* NIST 800-38a */
     402             :         {
     403             :          STR(key, key_size,
     404             :              "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c"),
     405             :          STR(plaintext, plaintext_size,
     406             :              "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"
     407             :              "\xae\x2d"),
     408             :          .ciphertext = (uint8_t *)
     409             :              "\x3b\x79\x42\x4c\x9c\x0d\xd4\x36\xba\xce\x9e\x0e\xd4\x58\x6a\x4f"
     410             :              "\x32\xb9",
     411             :          STR(iv, iv_size,
     412             :              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"),
     413             :          /* the least significant 16 bytes of ciphertext */
     414             :          STR(internal_iv, internal_iv_size,
     415             :              "\x42\x4c\x9c\x0d\xd4\x36\xba\xce\x9e\x0e\xd4\x58\x6a\x4f\x32\xb9"),
     416             :          },
     417             : };
     418             : 
     419             : const struct cipher_vectors_st aes192_cfb8_vectors[] = { /* NIST 800-38a */
     420             :         {
     421             :          STR(key, key_size,
     422             :              "\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b\x80\x90\x79\xe5"
     423             :              "\x62\xf8\xea\xd2\x52\x2c\x6b\x7b"),
     424             :          STR(plaintext, plaintext_size,
     425             :              "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"
     426             :              "\xae\x2d"),
     427             :          .ciphertext = (uint8_t *)
     428             :              "\xcd\xa2\x52\x1e\xf0\xa9\x05\xca\x44\xcd\x05\x7c\xbf\x0d\x47\xa0"
     429             :              "\x67\x8a",
     430             :          STR(iv, iv_size,
     431             :              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"),
     432             :          /* the least significant 16 bytes of ciphertext */
     433             :          STR(internal_iv, internal_iv_size,
     434             :              "\x52\x1e\xf0\xa9\x05\xca\x44\xcd\x05\x7c\xbf\x0d\x47\xa0\x67\x8a"),
     435             :          },
     436             : };
     437             : 
     438             : const struct cipher_vectors_st aes256_cfb8_vectors[] = { /* NIST 800-38a */
     439             :         {
     440             :          STR(key, key_size,
     441             :              "\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81"
     442             :              "\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4"),
     443             :          STR(plaintext, plaintext_size,
     444             :              "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"
     445             :              "\xae\x2d"),
     446             :          .ciphertext = (uint8_t *)
     447             :              "\xdc\x1f\x1a\x85\x20\xa6\x4d\xb5\x5f\xcc\x8a\xc5\x54\x84\x4e\x88"
     448             :              "\x97\x00",
     449             :          STR(iv, iv_size,
     450             :              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"),
     451             :          /* the least significant 16 bytes of ciphertext */
     452             :          STR(internal_iv, internal_iv_size,
     453             :              "\x1a\x85\x20\xa6\x4d\xb5\x5f\xcc\x8a\xc5\x54\x84\x4e\x88\x97\x00"),
     454             :          },
     455             : };
     456             : 
     457             : /* GOST 28147-89 vectors come from the testsuite contributed to OpenSSL by
     458             :  * Sergey E. Leontiev. CryptoPro-B test vector is just truncated.
     459             :  * TC26Z is calculated using Nettle */
     460             : const struct cipher_vectors_st gost28147_cpa_cfb_vectors[] = {
     461             :         {
     462             :          STR(key, key_size,
     463             :              "\x8d\x5a\x2c\x83\xa7\xc7\x0a\x61\xd6\x1b\x34\xb5\x1f\xdf\x42\x68"
     464             :              "\x66\x71\xa3\x5d\x87\x4c\xfd\x84\x99\x36\x63\xb6\x1e\xd6\x0d\xad"),
     465             :          STR(plaintext, plaintext_size,
     466             :              "\xd2\xfd\xf8\x3a\xc1\xb4\x39\x23\x2e\xaa\xcc\x98\x0a\x02\xda\x33"),
     467             :          .ciphertext = (uint8_t *)
     468             :                  "\x88\xb7\x75\x16\x74\xa5\xee\x2d\x14\xfe\x91\x67\xd0\x5c\xcc\x40",
     469             :          STR(iv, iv_size,
     470             :              "\x46\x60\x6f\x0d\x88\x34\x23\x5a"),
     471             :         },
     472             : };
     473             : 
     474             : const struct cipher_vectors_st gost28147_cpb_cfb_vectors[] = {
     475             :         {
     476             :          STR(key, key_size,
     477             :              "\x48\x0c\x74\x1b\x02\x6b\x55\xd5\xb6\x6d\xd7\x1d\x40\x48\x05\x6b"
     478             :              "\x6d\xeb\x3c\x29\x0f\x84\x80\x23\xee\x0d\x47\x77\xe3\xfe\x61\xc9"),
     479             :          STR(plaintext, plaintext_size,
     480             :              "\x8c\x9c\x44\x35\xfb\xe9\xa5\xa3\xa0\xae\x28\x56\x91\x10\x8e\x1e"
     481             :              "\xd2\xbb\x18\x53\x81\x27\x0d\xa6\x68\x59\x36\xc5\x81\x62\x9a\x8e"
     482             :              "\x7d\x50\xf1\x6f\x97\x62\x29\xec\x80\x51\xe3\x7d\x6c\xc4\x07\x95"
     483             :              "\x28\x63\xdc\xb4\xb9\x2d\xb8\x13\xb1\x05\xb5\xf9\xeb\x75\x37"),
     484             :          .ciphertext = (uint8_t *)
     485             :                  "\x23\xc6\x7f\x20\xa1\x23\x58\xbc\x7b\x05\xdb\x21\x15\xcf\x96\x41"
     486             :                  "\xc7\x88\xef\x76\x5c\x49\xdb\x42\xbf\xf3\xc0\xf5\xbd\x5d\xd9\x8e"
     487             :                  "\xaf\x3d\xf4\xe4\xda\x88\xbd\xbc\x47\x5d\x76\x07\xc9\x5f\x54\x1d"
     488             :                  "\x1d\x6a\xa1\x2e\x18\xd6\x60\x84\x02\x18\x37\x92\x92\x15\xab",
     489             :          STR(iv, iv_size,
     490             :              "\x1f\x3f\x82\x1e\x0d\xd8\x1e\x22"),
     491             :         },
     492             : };
     493             : 
     494             : const struct cipher_vectors_st gost28147_cpc_cfb_vectors[] = {
     495             :         {
     496             :          STR(key, key_size,
     497             :              "\x77\xc3\x45\x8e\xf6\x42\xe7\x04\x8e\xfc\x08\xe4\x70\x96\xd6\x05"
     498             :              "\x93\x59\x02\x6d\x6f\x97\xca\xe9\xcf\x89\x44\x4b\xde\x6c\x22\x1d"),
     499             :          STR(plaintext, plaintext_size,
     500             :              "\x07\x9c\x91\xbe"),
     501             :          .ciphertext = (uint8_t *)
     502             :                  "\x19\x35\x81\x34",
     503             :          STR(iv, iv_size,
     504             :              "\x43\x7c\x3e\x8e\x2f\x2a\x00\x98"),
     505             :         },
     506             : };
     507             : 
     508             : const struct cipher_vectors_st gost28147_cpd_cfb_vectors[] = {
     509             :         {
     510             :          STR(key, key_size,
     511             :              "\x38\x9f\xe8\x37\xff\x9c\x5d\x29\xfc\x48\x55\xa0\x87\xea\xe8\x40"
     512             :              "\x20\x87\x5b\xb2\x01\x15\x55\xa7\xe3\x2d\xcb\x3d\xd6\x59\x04\x73"),
     513             :          STR(plaintext, plaintext_size,
     514             :              "\x2f\x31\xd8\x83\xb4\x20\xe8\x6e\xda"),
     515             :          .ciphertext = (uint8_t *)
     516             :                  "\x6d\xa4\xed\x40\x08\x88\x71\xad\x16",
     517             :          STR(iv, iv_size,
     518             :              "\xc5\xa2\xd2\x1f\x2f\xdf\xb8\xeb"),
     519             :         },
     520             : };
     521             : 
     522             : const struct cipher_vectors_st gost28147_tc26z_cfb_vectors[] = {
     523             :         {
     524             :          STR(key, key_size,
     525             :              "\x8d\x5a\x2c\x83\xa7\xc7\x0a\x61\xd6\x1b\x34\xb5\x1f\xdf\x42\x68"
     526             :              "\x66\x71\xa3\x5d\x87\x4c\xfd\x84\x99\x36\x63\xb6\x1e\xd6\x0d\xad"),
     527             :          STR(plaintext, plaintext_size,
     528             :              "\xd2\xfd\xf8\x3a\xc1\xb4\x39\x23\x2e\xaa\xcc\x98\x0a\x02\xda\x33"),
     529             :          .ciphertext = (uint8_t *)
     530             :                  "\xed\xa7\xf1\x41\x01\x9c\xbd\xcd\x44\x6b\x00\x96\x87\xf7\xc7\xe6",
     531             :          STR(iv, iv_size,
     532             :              "\x46\x60\x6f\x0d\x88\x34\x23\x5a"),
     533             :         },
     534             : };
     535             : 
     536             : const struct cipher_vectors_st gost28147_tc26z_cnt_vectors[] = {
     537             :         {
     538             :          STR(key, key_size,
     539             :              "\x59\x9f\x84\xba\xc3\xf3\xd2\xf1\x60\xe1\xe3\xf2\x6a\x96\x1a\xf9"
     540             :              "\x9c\x48\xb2\x4e\xbc\xbb\xbf\x7c\xd8\xf3\xac\xcd\x96\x8d\x28\x6a"),
     541             :          STR(plaintext, plaintext_size,
     542             :              "\x90\xa2\x39\x66\xae\x01\xb9\xa3\x52\x4e\xc8\xed\x6c\xdd\x88\x30"),
     543             :          .ciphertext = (uint8_t *)
     544             :                  "\xe8\xb1\x4f\xc7\x30\xdc\x25\xbb\x36\xba\x64\x3c\x17\xdb\xff\x99",
     545             :          STR(iv, iv_size,
     546             :              "\x8d\xaf\xa8\xd1\x58\xed\x05\x8d"),
     547             :         }
     548             : };
     549             : 
     550             : /* Manually calculated to overcome section size differences between TLS cipher
     551             :  * and test vectors defined in recommendation for standarization
     552             :  * R 1323565.1.017-2018. TLS uses 1024 byte sections, we need more to have at
     553             :  * least one rekeying. */
     554             : const struct cipher_vectors_st magma_ctr_acpkm_vectors[] = {
     555             :         {
     556             :          STR(key, key_size,
     557             :              "\x88\x99\xaa\xbb\xcc\xdd\xee\xff\x00\x11\x22\x33\x44\x55\x66\x77"
     558             :              "\xfe\xdc\xba\x98\x76\x54\x32\x10\x01\x23\x45\x67\x89\xab\xcd\xef"),
     559             :          STR(plaintext, plaintext_size,
     560             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     561             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     562             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     563             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     564             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     565             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     566             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     567             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     568             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     569             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     570             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     571             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     572             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     573             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     574             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     575             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     576             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     577             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     578             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     579             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     580             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     581             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     582             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     583             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     584             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     585             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     586             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     587             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     588             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     589             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     590             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     591             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     592             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     593             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     594             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     595             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     596             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     597             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     598             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     599             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     600             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     601             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     602             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     603             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     604             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     605             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     606             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     607             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     608             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     609             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     610             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     611             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     612             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     613             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     614             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     615             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     616             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     617             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     618             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     619             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     620             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     621             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     622             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     623             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     624             : 
     625             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     626             :              ),
     627             :          .ciphertext = (uint8_t *)
     628             :              "\x2a\xb8\x1d\xee\xeb\x1e\x4c\xab\x68\xe1\x04\xc4\xbd\x6b\x94\xea"
     629             :              "\xc0\x4d\xdb\x07\xea\x92\x8f\xa2\x22\x0d\x97\x91\x83\x20\x78\x6b"
     630             :              "\x17\x0d\x8e\xaf\x6e\x3c\xa1\xab\xf2\x92\x93\x9a\xb1\x19\x54\xbb"
     631             :              "\xd3\x3f\x07\x38\x54\x26\x56\xed\xe3\xed\x4d\x54\x42\xb3\x0d\x0d"
     632             :              "\x43\xa1\x2e\xe8\xcf\x83\x81\x30\xe5\x90\xf3\x71\xe6\x7a\x42\xc3"
     633             :              "\xf8\x75\x91\xeb\xb8\xf7\xea\x17\xb3\xc4\xec\x9f\xa0\xca\x54\xd5"
     634             :              "\xbc\x42\x9b\x60\xd8\x90\xce\x61\xc1\xb4\x0d\x20\x52\x45\x0a\xfa"
     635             :              "\x77\xb4\x83\x54\xb4\x43\x77\x11\x50\x8f\xdc\xf4\xc4\x8f\x24\x2b"
     636             :              "\x84\xec\x97\xc9\xc1\x76\x3c\xf3\x17\x3c\x5a\xe8\x57\x86\x41\x22"
     637             :              "\xb6\x5b\x57\x29\xae\x1b\xb0\x75\x06\x95\xe5\xe2\x37\x93\x3b\x5a"
     638             :              "\xbe\x85\x5d\xb0\x16\x70\x5b\x53\x35\x57\x52\xdb\x87\x50\x89\x34"
     639             :              "\xa3\xd2\x1e\xc3\x83\x03\xbd\xdc\xc1\x24\xc3\xc9\x9d\xd7\x1b\x45"
     640             :              "\xfb\xcb\x4e\xd5\x64\x10\x5c\xe6\xc5\x93\x4d\xa9\x9b\xea\xed\xc5"
     641             :              "\xf4\x02\x30\x13\xbc\x41\x97\x81\x05\xb0\xcc\x6a\x39\x83\xe9\x05"
     642             :              "\x25\x11\x6e\x04\x63\x14\x6d\x85\x78\x9a\x09\xa7\x0d\x4c\x7b\xd7"
     643             :              "\xdf\xb1\x33\xeb\xbf\xeb\x92\x58\xf3\xda\x9d\xed\x8e\xf9\x8a\x3c"
     644             :              "\x71\x8d\x19\x67\x1a\x12\x49\xdf\x0e\xb1\x88\x3c\x9e\xf5\x1b\x77"
     645             :              "\x13\x60\x80\x1a\x28\x46\xa0\x48\x31\xec\xc2\xcb\xe7\xe7\x72\xdb"
     646             :              "\x92\x2a\x7b\x04\xd0\xa3\xd0\x17\x8c\xb2\x4d\xb3\xa2\x43\x16\x17"
     647             :              "\x8d\xec\x78\xf0\xdd\xe5\x60\x07\x77\x49\x66\xad\xb3\x36\xdd\xe4"
     648             :              "\xc9\xef\xf7\x6d\xe4\x00\xfc\x9c\x5b\x9d\x8a\x65\x58\xbb\xbd\x5c"
     649             :              "\xfe\x18\xe6\x97\x83\xd1\xae\x20\xed\x12\xac\xe5\x29\x7f\x58\xab"
     650             :              "\x83\xea\xd2\x92\xea\x17\x00\xaf\x2b\x55\x43\x7c\x5b\x17\xf2\x91"
     651             :              "\x0e\x79\x0b\x95\xb4\xe0\x4a\xb0\x55\x62\xe5\x5d\xda\x55\x02\xd6"
     652             :              "\xa1\xea\x99\x73\x16\x59\xb3\x3e\xc9\x86\x92\x1d\xb2\x1a\xf1\x4e"
     653             :              "\x6b\x2e\xeb\x49\x7d\xf6\x35\xc0\x23\xae\xb5\x56\xff\x90\xe7\xc5"
     654             :              "\xc5\x4c\xef\xea\x8f\x9e\xf1\xc2\xd0\x1c\xee\xef\xb7\xac\x0c\x0c"
     655             :              "\x43\xdf\xcc\x8e\x95\xe2\xd3\xd5\x9f\x17\x81\x85\x66\x87\x7e\xdb"
     656             :              "\x5e\x45\xde\xb2\x45\x95\x69\x90\x75\x80\xc1\x5e\x0c\x3d\xe8\xd9"
     657             :              "\x9a\x17\xc5\x62\x49\x90\xa6\x54\x68\xc2\xfa\xb0\x96\xc9\xac\x42"
     658             :              "\x9e\xa9\x6f\x33\x0c\x5b\xc2\xc5\x81\xc1\xc5\x5d\x91\x44\xb7\x48"
     659             :              "\xd0\x32\xc6\x7d\x99\xa1\xad\x43\x6c\xba\xc5\xf5\x10\xbd\xf2\x44"
     660             :              "\x75\x36\xe8\x7e\x91\x21\x8c\x16\xce\x74\xa4\xc2\x3d\x18\x28\x1a"
     661             :              "\x82\x79\x04\x3e\x15\x73\x22\x30\x7a\x33\x7f\x76\x63\xbc\x9b\x0b"
     662             :              "\xcb\x3c\xe2\x3d\x66\x22\x28\x20\x1c\xc3\x43\x12\x89\x2d\x05\x51"
     663             :              "\x0b\x65\x2b\xf3\xca\x0f\x21\xd7\x57\xac\xa9\x4d\x4f\xd0\x03\x13"
     664             :              "\x89\x94\xec\xad\x38\x9b\x95\xaf\xf8\x0a\xc5\xb0\x8b\xb3\x57\xcd"
     665             :              "\xdd\xe7\xa3\xfe\x3e\x84\x35\xad\xe6\x87\x69\xd5\xb7\xc5\xf0\xde"
     666             :              "\xcc\xc7\x81\x59\xd7\x52\x4b\xa1\x77\x8f\xec\x6a\x9d\xcd\x0d\x08"
     667             :              "\xa7\xbf\x32\x6b\x5a\xa3\xc8\x4a\x0b\xde\x8c\xf8\x12\x86\xf1\x6b"
     668             :              "\x78\x86\xaf\xf3\x49\x78\x81\x5b\x9d\x6b\xe9\xf7\x59\xe2\x36\xea"
     669             :              "\xab\x40\x87\x1b\x0b\x2a\x70\x9b\x4c\x29\x3f\x3d\x5a\xfb\x09\x11"
     670             :              "\x9a\x39\xfc\x41\x65\xac\x64\xbd\xfd\x8b\xf3\x09\x1b\x13\xde\x38"
     671             :              "\x5b\x35\x0e\xce\x71\xab\x87\x99\x82\xd4\x26\x5c\x5d\x4d\x5b\xfe"
     672             :              "\xe8\x33\x11\x37\xf8\x3b\x16\x93\x20\xbe\x47\x68\xd9\x19\x94\x17"
     673             :              "\xdf\x56\xce\xbf\x82\x34\x75\x74\x7a\x39\xb3\xb5\xc3\x54\x86\x30"
     674             :              "\x33\x7e\xbd\xe7\xd9\x24\x18\x8f\xbf\xc1\x69\x28\x75\x37\xb6\x90"
     675             :              "\x2e\x4c\x71\x88\xcf\xfe\x90\xd6\xe5\x3d\xf3\xf2\x42\x8f\xee\x76"
     676             :              "\x00\xb8\x84\x5f\xeb\xbc\x5d\x46\xcd\xa6\x13\xaf\x3b\x37\xae\xb4"
     677             :              "\x82\xd5\x37\x88\x86\x94\x0f\xd8\x00\x0b\x97\x86\xa3\x91\x43\x8f"
     678             :              "\x05\x40\x04\xdb\x7c\x17\x5e\xbf\xf0\x07\x29\x94\x34\x04\x6b\x1f"
     679             :              "\x32\xa0\xa3\x30\x1a\xc8\x72\xde\xd7\x42\xfe\xb8\xe2\x2e\x6c\xe9"
     680             :              "\x71\x3e\xe5\x9a\x6c\x83\xc1\x75\xc2\x04\xfb\x8d\x45\x4a\x52\x7a"
     681             :              "\xac\xca\x87\x7a\xf3\x88\x42\x42\xfb\x40\x71\x67\xc0\xa7\xcc\x10"
     682             :              "\x30\x32\xc2\x7e\x3d\x93\x40\xb6\xb2\x53\xcd\xe4\x23\x4b\x5a\x99"
     683             :              "\x20\xfe\xe9\xef\xce\x82\xb0\x0f\x4e\x21\xa6\xc0\xad\x6a\x7b\x08"
     684             :              "\xb9\x33\x6b\xc2\x35\x5e\x0d\x6e\xd5\x9d\x65\xef\x70\x5d\xc7\x02"
     685             :              "\xa8\x4e\x5e\x80\xb1\x9c\xa8\x50\xfd\x25\x44\x0d\xe6\x78\x8c\xd9"
     686             :              "\x18\x01\x43\xd0\xee\x9f\xa7\x68\xd9\x37\xf3\x5e\xcb\xf6\x08\x92"
     687             :              "\x75\x02\x65\xee\xcf\xed\xdc\xe5\x3f\x6d\x9f\x84\x75\x39\x93\x27"
     688             :              "\xff\xc5\x97\x37\x6e\xc7\x60\x9c\x1d\x39\x4d\xbc\x27\xa2\xe5\x85"
     689             :              "\x05\xa4\x3d\x28\xce\x42\x51\x81\xd5\xcb\xbd\x83\x11\x13\x05\x93"
     690             :              "\x4f\x70\xb3\x97\xa9\xfa\x14\x95\x77\xc5\x1e\x40\xd0\x4d\x77\xef"
     691             :              "\xa8\x53\xfc\x26\x30\xd4\xfe\xda\xd0\x74\x58\x38\x21\xc0\xbb\x21"
     692             : 
     693             :              "\xd9\x6a\xf3\xcc\x57\x01\xcb\xbb\x01\x9a\x99\xe6\x4e\xaf\xf2\x32",
     694             :          STR(iv, iv_size,
     695             :              "\x12\x34\x56\x78\x00\x00\x00\x00"),
     696             :         }
     697             : };
     698             : 
     699             : /* Manually calculated to overcome section size differences between TLS cipher
     700             :  * and test vectors defined in recommendation for standarization
     701             :  * R 1323565.1.017-2018. TLS uses 4096 byte sections, we need more to have at
     702             :  * least one rekeying. */
     703             : const struct cipher_vectors_st kuznyechik_ctr_acpkm_vectors[] = {
     704             :         {
     705             :          STR(key, key_size,
     706             :              "\x88\x99\xaa\xbb\xcc\xdd\xee\xff\x00\x11\x22\x33\x44\x55\x66\x77"
     707             :              "\xfe\xdc\xba\x98\x76\x54\x32\x10\x01\x23\x45\x67\x89\xab\xcd\xef"),
     708             :          STR(plaintext, plaintext_size,
     709             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     710             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     711             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     712             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     713             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     714             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     715             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     716             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     717             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     718             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     719             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     720             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     721             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     722             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     723             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     724             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     725             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     726             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     727             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     728             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     729             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     730             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     731             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     732             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     733             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     734             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     735             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     736             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     737             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     738             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     739             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     740             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     741             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     742             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     743             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     744             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     745             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     746             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     747             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     748             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     749             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     750             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     751             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     752             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     753             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     754             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     755             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     756             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     757             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     758             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     759             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     760             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     761             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     762             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     763             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     764             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     765             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     766             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     767             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     768             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     769             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     770             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     771             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     772             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     773             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     774             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     775             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     776             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     777             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     778             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     779             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     780             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     781             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     782             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     783             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     784             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     785             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     786             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     787             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     788             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     789             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     790             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     791             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     792             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     793             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     794             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     795             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     796             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     797             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     798             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     799             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     800             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     801             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     802             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     803             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     804             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     805             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     806             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     807             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     808             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     809             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     810             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     811             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     812             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     813             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     814             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     815             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     816             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     817             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     818             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     819             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     820             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     821             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     822             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     823             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     824             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     825             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     826             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     827             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     828             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     829             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     830             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     831             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     832             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     833             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     834             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     835             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     836             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     837             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     838             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     839             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     840             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     841             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     842             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     843             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     844             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     845             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     846             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     847             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     848             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     849             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     850             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     851             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     852             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     853             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     854             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     855             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     856             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     857             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     858             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     859             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     860             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     861             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     862             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     863             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     864             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     865             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     866             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     867             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     868             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     869             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     870             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     871             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     872             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     873             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     874             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     875             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     876             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     877             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     878             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     879             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     880             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     881             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     882             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     883             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     884             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     885             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     886             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     887             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     888             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     889             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     890             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     891             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     892             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     893             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     894             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     895             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     896             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     897             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     898             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     899             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     900             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     901             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     902             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     903             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     904             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     905             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     906             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     907             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     908             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     909             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     910             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     911             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     912             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     913             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     914             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     915             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     916             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     917             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     918             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     919             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     920             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     921             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     922             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     923             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     924             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     925             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     926             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     927             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     928             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     929             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     930             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     931             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     932             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     933             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     934             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     935             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     936             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     937             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     938             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     939             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     940             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     941             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     942             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     943             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     944             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     945             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     946             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     947             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     948             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     949             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     950             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     951             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     952             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     953             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     954             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     955             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     956             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     957             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     958             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     959             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     960             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     961             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     962             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
     963             :              "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
     964             :              "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"
     965             : 
     966             :              "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
     967             :              ),
     968             :          .ciphertext = (uint8_t *)
     969             :              "\xf1\x95\xd8\xbe\xc1\x0e\xd1\xdb\xd5\x7b\x5f\xa2\x40\xbd\xa1\xb8"
     970             :              "\x85\xee\xe7\x33\xf6\xa1\x3e\x5d\xf3\x3c\xe4\xb3\x3c\x45\xde\xe4"
     971             :              "\xa5\xea\xe8\x8b\xe6\x35\x6e\xd3\xd5\xe8\x77\xf1\x35\x64\xa3\xa5"
     972             :              "\xcb\x91\xfa\xb1\xf2\x0c\xba\xb6\xd1\xc6\xd1\x58\x20\xbd\xba\x73"
     973             :              "\x7e\x08\xf5\x9f\x71\xb8\x56\x08\xe3\x89\x55\xb1\x7b\x53\xed\x27"
     974             :              "\xee\x04\xce\x2c\x02\xae\xf0\x75\x8f\x5d\x64\x77\xea\x0a\x79\xb2"
     975             :              "\x9f\xc0\xb0\x9a\xf0\x93\xd5\xbf\xb9\xdf\xab\x18\x25\xf7\x51\xc9"
     976             :              "\x82\x69\x88\x08\x00\x2b\x35\x8e\x2c\x2f\x7c\x01\xdc\x31\x56\x1d"
     977             :              "\x52\xb4\xca\x07\xbf\x02\xa5\x9a\x80\x88\x91\x19\xf1\x26\x0b\x7f"
     978             :              "\x9d\x3e\x1c\xe5\xf9\x92\x1a\xf5\xb5\x53\xed\x1e\x1a\xdf\xdc\x53"
     979             :              "\x9e\x2e\x79\x65\xbd\x7b\x48\x48\x57\x58\x90\x76\x40\x57\x86\x76"
     980             :              "\x7d\xe3\xb2\x82\x06\xed\xeb\xce\x35\x1b\xcc\x5c\xee\x54\xe4\x3f"
     981             :              "\x53\x4b\xb5\x0d\x07\x0a\x2d\x0c\xb7\xcf\x7c\xf8\x81\xad\x32\x01"
     982             :              "\x26\x50\x0f\xe9\x32\xf3\xd7\xc9\xf0\x86\xab\xb8\xf8\xea\x72\x3a"
     983             :              "\x9a\x17\x48\x12\xa5\xbb\x3b\xa9\x6d\x01\x51\x82\xc0\xe2\x98\x4d"
     984             :              "\x69\x3c\xbd\x67\x6a\xa0\xb1\x7d\x7a\xa8\x2c\xb8\xe2\xb9\xf6\x68"
     985             :              "\xfa\xeb\xae\x0d\x41\xcb\xb0\xfe\xe5\x55\x65\xb6\x5d\x56\xe5\x05"
     986             :              "\x20\x08\x51\x77\x7c\x18\x3a\x25\x69\xaa\xa2\x39\x68\xcf\xd1\x3e"
     987             :              "\x51\x47\xb5\xd8\x13\xcc\xaf\x2d\x31\xd5\x28\xae\x61\x48\xe6\x9a"
     988             :              "\x0a\xd8\x30\x0b\x1f\x7c\xef\x3d\x32\xa5\x40\x05\x41\xdf\x84\x1e"
     989             :              "\xce\xde\xca\x31\x42\xa6\xc4\xbc\x2b\x56\xb7\x7e\xa6\x22\x1f\x85"
     990             :              "\x7b\xe8\x80\x01\xc1\xff\x78\x45\x14\xb5\x4d\x9b\xe3\x21\xf7\xb8"
     991             :              "\x13\xd5\x44\x3d\x6f\x33\x85\x46\x56\x07\x79\x15\xb4\xec\xe5\xfd"
     992             :              "\x34\x35\xc8\x8a\x5f\x4d\x58\x84\x82\x9d\xb6\x4d\x0e\x90\x65\xb0"
     993             :              "\x5e\x61\x83\x30\x3d\x51\x34\xe3\x0e\x6e\x78\x05\xc8\x6d\x1e\x7d"
     994             :              "\x76\xe2\x3d\x85\x33\x82\x42\x7c\x7d\x67\x33\xbb\x60\x5e\x4d\xb0"
     995             :              "\xc8\xd0\x7a\x6c\xbe\x4e\xc8\xc4\x82\x9d\xb6\x25\x56\xc9\x1b\x52"
     996             :              "\x3b\x9b\x4a\xf5\x8f\x67\x12\xd5\x41\x60\xe6\x97\x08\x90\x7b\x17"
     997             :              "\x3b\xf9\x1c\x82\x0d\x15\x0a\x3d\x1b\x27\xd4\x46\xd6\x91\x5c\x74"
     998             :              "\x48\x45\x1a\x4c\x60\x26\xf3\xe3\x1f\xe7\x0a\xfc\x79\x42\x8a\x5f"
     999             :              "\x5f\x5b\x33\xf4\xb3\xda\xbd\x4c\x4a\x10\x5e\x3b\x9d\x09\xf8\xf2"
    1000             :              "\x51\x25\x44\x37\x7b\xca\x88\xf0\x88\xa9\x5d\x2e\x9e\x42\xf6\xac"
    1001             :              "\x3d\xd6\x01\x06\x06\x5c\x96\x4b\x13\xf5\x5f\xaa\x06\x34\x16\x67"
    1002             :              "\xfd\xa5\x49\x12\xcc\x21\x8f\xb4\xb9\x33\xfc\x58\xf0\x36\xeb\xd7"
    1003             :              "\x50\xf2\x38\x39\x9e\x93\x7b\xf7\xf5\xc7\x9c\x73\x36\x1f\xbe\xa9"
    1004             :              "\x49\xf9\x2c\x4f\x17\xfc\xb3\x64\x51\x68\xaf\xed\xe3\x43\xbf\x2f"
    1005             :              "\x3f\x57\xbb\x74\x93\x51\xc4\x93\x1e\x2e\x05\xed\xda\x74\x27\x1b"
    1006             :              "\x7b\xa8\x98\x3e\xa6\x62\x75\xbd\x68\xab\x44\xe8\xe4\x2d\x2f\x08"
    1007             :              "\x44\x64\x85\xa6\x42\xfe\xdb\x11\xb5\xbc\x1a\x83\xc4\x58\x7a\xd1"
    1008             :              "\x0d\x64\xa2\xdb\xd5\x4c\x3a\xd7\x2a\xd8\xc7\x0b\xf5\x33\x80\xe2"
    1009             :              "\xaa\xc6\xaf\xad\xee\x39\x83\x1c\xfb\xda\x39\xd6\xe4\xbe\x6f\xde"
    1010             :              "\x46\xd1\xdc\xc8\x77\x3b\x42\x3a\x19\x83\xdb\x79\x5e\x9d\xd9\xef"
    1011             :              "\xe7\x54\x9e\xfa\xde\x56\x26\x0e\x33\x44\xb6\xac\xc7\x25\x1f\x0b"
    1012             :              "\xd0\x12\x4a\x75\x6f\xef\x9f\xb7\xe7\xf1\xc3\xb2\x77\xa7\x01\xc1"
    1013             :              "\x24\xf2\x60\xf2\x04\xa4\x07\x47\x25\x81\x2a\x51\x36\x1d\xb3\x42"
    1014             :              "\x3c\xc5\x12\xbb\x53\x89\xc3\x00\xb4\xe8\x0e\xd8\xed\x5d\x9c\x18"
    1015             :              "\x08\x16\x05\x57\x22\x99\xc1\xcb\x97\x4d\x7d\x42\xb0\xbf\xf3\x35"
    1016             :              "\x9e\xc9\xc0\x4e\xe6\x42\xec\x49\x06\x5e\x50\x7f\x6c\x86\x20\x9e"
    1017             :              "\xe0\x49\x6a\x1d\x50\x45\x52\x3d\x66\xdc\x66\xb2\xa1\x57\xbb\x1d"
    1018             :              "\x65\x30\xf9\x3e\x6c\x8b\xf8\x07\x5e\xf9\xb0\xcf\x15\x1f\xa4\x22"
    1019             :              "\xe6\x28\xdf\x40\x44\x27\x80\x99\xbf\xcc\x86\x94\x3d\xe1\x97\xbc"
    1020             :              "\x64\x7b\xc9\x8a\xc8\xb7\xdd\x8e\xd9\x95\xfa\x97\x44\x59\x70\xb6"
    1021             :              "\xa4\x59\xdd\x94\x2a\x4e\x71\x76\xe1\xf8\xff\x2e\xef\xf7\xf3\x26"
    1022             :              "\x0d\xeb\x63\x9b\x34\x74\xcf\xc7\xe4\x99\xb3\x8b\xe5\xf8\xfa\xf8"
    1023             :              "\x60\x6a\x8f\x16\xfe\xb3\x12\xe8\x66\x5c\x26\x61\x11\xaa\x14\x85"
    1024             :              "\x5e\x4c\x0f\xf8\x47\x99\x49\x4c\x22\xa5\x37\xb7\x4b\xed\x1d\x33"
    1025             :              "\x54\xe4\x6f\xfe\x4b\x7e\x95\x44\x56\xa9\xa9\x48\x6f\x40\x08\x42"
    1026             :              "\x28\xa0\xd6\x8e\x52\x72\x84\x87\xd5\xcc\x08\xf4\x34\x9b\xc7\xf7"
    1027             :              "\x92\xac\x5d\x5a\x30\x4c\x87\xc2\x2c\x94\x68\x10\x03\x02\x8c\x38"
    1028             :              "\x6e\xf6\xca\xd1\xd6\x55\x02\x3c\x3a\xf4\x21\x1c\x90\x03\x7c\x33"
    1029             :              "\xcd\x81\x93\x3f\x4c\xa1\xe6\x7c\x7d\x27\xaf\x97\x7a\xd8\xb0\x32"
    1030             :              "\xcb\x1f\xb6\x5d\xb0\x7c\x9e\xf7\x15\x6a\x29\xc9\xb3\x13\x8e\xb2"
    1031             :              "\x2e\xf2\x9d\xb2\x64\xe9\xc7\x13\x86\xc3\x46\x97\x9e\x53\x37\xac"
    1032             :              "\xd1\x75\x0b\xe2\x20\x4a\x5e\x3a\x47\xdf\xb3\x67\x78\x23\x22\xa6"
    1033             :              "\xb6\x69\x83\x1b\x41\xe1\xdc\xe3\xbb\x63\x8e\x6a\x70\xe2\x91\x30"
    1034             :              "\xa2\x48\x43\x07\x9b\xf1\x87\x9d\xd9\x2f\x36\x62\xaf\x51\x70\x10"
    1035             :              "\x5d\x68\x42\x6e\x95\xe6\x86\x85\x90\x08\x80\x42\xc6\x11\x7d\x38"
    1036             :              "\x37\x94\xc7\x7a\x9d\xec\xff\x87\x15\x0d\x30\x42\x7d\xbf\xb0\x21"
    1037             :              "\xa8\x28\xc3\xa9\x56\x31\xda\x2e\x91\x8d\x0d\x78\x93\xe2\x4d\x7f"
    1038             :              "\xb3\xdb\x87\x5b\xf2\x2a\x55\x54\xc4\x1a\x47\x9b\x51\x79\x2c\x55"
    1039             :              "\xaa\xaf\x57\x89\x90\x32\x26\xfa\xcf\x26\x3d\xbd\xc3\x59\x7e\x4b"
    1040             :              "\x53\x7a\xa3\xf8\xec\x31\x3e\x9f\x22\x33\x41\xec\xe5\xf1\x50\x41"
    1041             :              "\x57\x64\x37\x0e\x24\x0f\x03\x0c\x93\xaf\xd7\x44\xef\x33\xf9\x96"
    1042             :              "\x8e\x63\x9c\x79\x09\xdf\x58\xdb\xcd\xd2\xf2\x81\xed\x97\x28\x5e"
    1043             :              "\x6d\x99\x45\xad\xf1\xa4\xe8\x59\xaa\xeb\x59\xbd\xfa\x54\x27\xe2"
    1044             :              "\x01\x6d\xfa\x08\xe5\x1a\x46\x92\x31\xa0\xfd\x2e\x25\x21\x5e\x9d"
    1045             :              "\x1d\x41\x82\x16\x21\xea\xe8\x29\x5a\xe7\xd4\xd8\x7c\x91\x6d\xa8"
    1046             :              "\x69\xa8\x6b\xac\xf9\x3d\x2c\x07\xfa\xaf\x65\x5e\x84\x63\x5c\x1c"
    1047             :              "\xb6\x71\x1c\x6e\x1a\x1a\xcf\x5f\x39\x08\x02\xeb\xde\x75\x28\x44"
    1048             :              "\x90\x3b\x6d\x09\xf5\xa4\x3a\x00\x99\xc1\x6e\xb8\x23\x47\xb6\xe6"
    1049             :              "\x44\x69\x24\x86\x0d\x93\x7d\xc2\x1a\xe7\xf8\x97\x97\x6d\x2f\x7d"
    1050             :              "\x6a\x3e\xd7\x6d\x94\xbe\x9b\xfa\x7d\x40\xff\x35\x7e\x2d\x9c\x50"
    1051             :              "\x71\xf8\x99\x5f\xf3\x53\x16\x59\x77\x72\x4b\xef\x8d\x21\x8c\x28"
    1052             :              "\x15\x8a\x57\x6d\x3d\x35\xf4\x2c\x37\x39\x0e\x97\x8f\xd3\x45\x17"
    1053             :              "\xac\x0b\xa2\xaa\x16\xe7\x98\x70\xbd\x91\x4b\x7b\xc9\x14\x5b\x85"
    1054             :              "\x29\xe5\xd9\x20\xa6\xf3\x89\x63\xc8\x01\x94\x2c\x20\xb0\xf1\x1c"
    1055             :              "\x61\x90\x5b\xe8\xaf\xdb\xe2\x20\x62\x4f\xd0\x3c\x51\x1f\x5f\x14"
    1056             :              "\x28\x13\x07\x5e\xbc\x4a\xa0\x46\xa7\x9c\xc7\x00\x24\xb4\x67\x0d"
    1057             :              "\x9c\xe8\x05\xa7\xe3\x37\x94\xd3\x97\xc5\xd6\x1d\xb3\x79\x0c\x7f"
    1058             :              "\xf0\xeb\x68\xa7\xa9\x75\x30\x3c\xf1\xf8\xfb\x96\x4b\xa5\x99\xb1"
    1059             :              "\xf0\x71\xab\xb4\x8a\xa6\x5d\x97\xb5\x6f\x42\x81\xef\x38\x0e\x41"
    1060             :              "\x21\xcd\x15\xe4\xf1\xdc\x02\xc2\xe5\xe4\xb2\xf2\xdb\xc5\x42\x0f"
    1061             :              "\xeb\x00\xb8\x49\x48\x90\x97\x59\x69\x8c\x3d\x90\xfa\x7f\xaf\x75"
    1062             :              "\xff\xe8\x0f\xff\x13\x2f\x7a\xca\x33\xbc\xb0\x41\x7b\xd4\x94\xce"
    1063             :              "\xd5\xd7\x53\xe5\x36\x9d\xea\x0c\x13\x60\x63\xd9\x79\x83\x53\x03"
    1064             :              "\x3c\x5f\x33\x6b\x16\xd2\xd6\x07\xbd\xbc\xa9\xcd\xd6\x21\x58\x8a"
    1065             :              "\x90\xac\x85\x7c\x0a\x85\xf1\x02\xfd\x6c\x5b\xac\x92\xa5\x6f\xfc"
    1066             :              "\x02\x60\xb3\x05\x91\x31\x80\xd5\x75\x82\xa8\xab\xcc\x7b\x47\xdb"
    1067             :              "\x79\xaf\x85\xea\x75\x2d\xf4\x46\x45\xa6\x24\x35\x2d\xba\x9e\x19"
    1068             :              "\x4e\x48\xb3\x5f\x40\x96\x6c\x73\x44\x09\x67\x27\xee\xdb\xdb\xca"
    1069             :              "\xf6\x14\x3f\x32\xdf\x3b\xd3\xcb\x87\x48\x6b\x03\xda\xfe\xb5\x20"
    1070             :              "\xf8\x72\xd0\xe4\x65\xfd\x14\x5d\x9b\xd3\xc5\x67\x4b\x41\xf4\xcb"
    1071             :              "\xac\xe4\xce\x61\xe0\x06\x8e\xb6\xca\xef\xa5\xe4\x70\xd4\xff\x4f"
    1072             :              "\x4c\x81\xb7\xc7\xc1\xe3\x1d\x6b\xfe\x44\x37\xfe\x7e\xb4\xec\xda"
    1073             :              "\x55\xbc\x26\xdd\x44\x08\x28\x49\x19\xc9\x52\x20\x4a\x5e\xe1\xae"
    1074             :              "\x6b\x87\x35\xa2\x9a\x02\x17\xb0\x74\xe1\x19\x92\xca\x5d\x34\x81"
    1075             :              "\xd7\x3f\xb1\x14\xe2\x44\x97\x7f\xab\x0a\xc3\x44\x8d\x9c\xe6\x27"
    1076             :              "\x84\x5e\x2e\xe1\x0e\x7b\x74\xee\x47\xe2\x6f\x79\x3a\x0d\x25\x90"
    1077             :              "\x9b\x32\x13\x78\xd3\xd1\x19\x10\xb7\x88\xc4\xb4\xb8\x0f\x84\x0c"
    1078             :              "\xc4\x6d\xb3\xbc\xbc\xea\x1d\x84\xfe\x6f\x95\x1e\x44\x78\xbb\x73"
    1079             :              "\xd0\x08\x8b\xbe\xae\x91\x6f\x84\xeb\x6c\x05\x58\x3a\xb7\x68\xee"
    1080             :              "\x62\x14\x0b\xba\xd3\xd6\x78\x23\x35\x03\x2f\xed\xac\xf2\x35\xa7"
    1081             :              "\x0b\xf5\x37\xa1\xa5\x4d\x57\x0e\x2e\x5e\x0d\x0c\xd6\x04\xc8\x07"
    1082             :              "\x60\xe6\xda\xd9\x55\x16\xf6\xc6\x0c\x53\xc0\x46\xa8\x91\xa6\xdd"
    1083             :              "\x22\x99\x88\x9f\x23\x93\x64\x81\xdb\x4b\xe8\x99\x1e\x16\x5c\xb5"
    1084             :              "\x08\xc0\x74\xf9\x79\xd3\xc1\x6a\xe5\x38\x6b\xcd\xf0\xcb\x1e\xb8"
    1085             :              "\x5c\x6b\x14\xd6\x85\x58\xa3\xc8\x3d\x5b\x14\x50\xc4\x70\x97\xb2"
    1086             :              "\xcd\x93\xd6\x3a\x42\x2f\x3a\x88\x28\x8a\xd0\xa7\xe9\x98\x87\xbe"
    1087             :              "\x66\x89\x69\xd9\xbd\x11\x91\xd3\x9b\xc4\x22\x14\xe6\x8f\xc8\xbd"
    1088             :              "\x95\x5d\x3d\xd2\x1d\x10\xbd\x61\x69\x87\xf9\x4a\x9c\x61\x5b\x80"
    1089             :              "\x9b\x3f\x32\xce\x17\xcd\x98\x79\xb9\xeb\x45\xf7\x54\x3c\xc9\xa6"
    1090             :              "\x2e\xb4\x0b\x0d\x84\x0d\x35\xcc\x64\x5f\x5a\x92\xf8\xcb\xd6\xfa"
    1091             :              "\xae\xd9\xce\x9c\x41\x83\xc2\xab\xd5\x73\x21\xea\x95\xd5\x73\x2f"
    1092             :              "\xf1\xd0\x71\x95\x45\x07\x7c\x1f\xcc\xba\xf3\xb0\x75\xfa\x1a\xd4"
    1093             :              "\x89\x66\x4e\x93\x93\x80\xb7\x67\xd5\xdf\x99\xd8\x43\x6d\xf6\xde"
    1094             :              "\x19\xc8\x13\x56\xf8\x63\xe5\xf2\x53\xfd\x2e\x62\x8d\xde\x92\xd4"
    1095             :              "\x98\xfc\x1c\x36\x08\x3d\x33\x0f\xee\xbc\xb8\x2f\x49\xa2\xb3\xb4"
    1096             :              "\x9b\x0c\x7e\x16\xd4\xe8\xc0\x98\xd0\x5c\xda\x25\xaa\xe4\x60\x95"
    1097             :              "\xe6\xc5\x7b\x62\xa5\xe9\xbc\xa1\x5e\x11\x4f\x5d\xb4\x19\x29\x33"
    1098             :              "\x6f\xff\xf4\xef\x7f\x62\x2b\xf2\xbd\x47\x90\xcb\xba\xbc\xe8\xa8"
    1099             :              "\xd7\xcf\xac\x44\x05\x67\xf3\xd3\x93\x22\xc0\x48\x23\xdf\xef\x54"
    1100             :              "\x3d\x64\xc7\x13\xfd\x4f\x0a\x21\x20\x2b\xad\x34\x88\x02\x69\x84"
    1101             :              "\xaf\x8a\xfb\xbb\x97\x7d\xca\x0e\x80\xdc\x8a\x50\x51\x49\xc8\x1f"
    1102             :              "\xbd\x35\x46\x11\xf6\xdf\x52\x29\xc2\x52\xc4\xae\xd5\x16\xbb\x67"
    1103             :              "\x21\x7b\x25\xeb\xc4\x21\x0d\xc7\x3f\x1b\xae\x42\xc2\x21\x58\x1e"
    1104             :              "\x32\x46\x0d\x72\x15\x89\x75\xaa\xd9\x0b\x2d\xa7\x25\x3a\x2a\x3d"
    1105             :              "\xc6\x46\xd1\xa3\x9d\xed\x52\xd8\xbb\x53\xb9\x1f\x6d\xfc\x63\xb7"
    1106             :              "\x28\xa1\x78\x78\x18\x43\xa2\x3d\x6f\xcd\x6a\x40\x6a\xc2\x44\x88"
    1107             :              "\x59\x03\xdd\xd3\x47\x8d\x3d\xe2\x24\xc2\x11\x00\xb1\x2e\xc7\x24"
    1108             :              "\x81\x4b\xc0\x9c\x90\x64\xb7\x8b\xfb\x3a\xdc\x69\xe1\x4c\xf4\xc4"
    1109             :              "\xc7\x78\x5a\xca\xf8\x6f\x16\xa0\xb8\xe3\xb0\x66\x94\xab\x7a\x86"
    1110             :              "\x5c\xa8\xb9\x7f\xf7\x6a\x64\x1d\x8f\x03\xcf\x4b\x4b\xb0\xd8\xc2"
    1111             :              "\xc2\xea\x02\x5a\xaa\x14\x19\x8f\x60\x49\x5b\xf4\x05\xc8\x98\x30"
    1112             :              "\xeb\xbc\x00\x12\xa4\xc0\x27\x5f\x38\x91\x89\x73\xfa\xb7\xc1\x3a"
    1113             :              "\xf4\x7c\x18\xe4\xe7\x7f\x8c\x82\x51\xb0\x64\x2b\x9d\xa3\x98\x47"
    1114             :              "\x67\xe4\x0f\x1f\x30\x8e\x78\x0a\x3e\xc4\xa8\xc4\x1c\x79\x0a\x09"
    1115             :              "\x91\xbd\xa1\x6a\xab\x47\xce\x54\x24\xda\x4b\xa6\x7b\x40\x43\x92"
    1116             :              "\xd5\x43\xbb\x50\x53\x54\x1d\xf0\x0c\x87\x01\xc0\x82\x0a\xf0\xd8"
    1117             :              "\x7d\xd7\x22\xfc\x33\x59\xf7\x54\x87\x5c\x45\xc8\x2d\x92\x6d\x3a"
    1118             :              "\xfc\x90\x03\xa9\x23\xa8\xa3\xa5\x00\x3d\x3f\x7d\x9f\x6c\x7a\xba"
    1119             :              "\xdd\xff\xfd\x09\x04\x9b\x82\xea\x9f\x0e\x05\x92\xed\x08\x24\x1d"
    1120             :              "\x00\xfa\xac\x61\xf0\xe7\xc7\x37\x7e\x0d\x73\x38\x3e\x7a\x63\xcb"
    1121             :              "\x4e\x26\x21\xd6\x50\x12\xe4\x95\x1e\xc7\xd0\xed\xcb\xf9\xbf\x1d"
    1122             :              "\x34\x81\x81\xa4\x0e\xeb\xf6\xe8\xc5\x1e\x98\xca\x79\xad\x15\x3c"
    1123             :              "\xdc\xf5\xe3\xa9\xfe\xe9\x4c\x6a\xc5\x79\x55\x89\x18\xf2\xd1\x86"
    1124             :              "\x4e\xd6\x95\x38\xf8\x78\x0b\xfc\x50\x40\x72\xd4\x3c\x45\xdf\xaa"
    1125             :              "\x13\x1e\x9e\x74\xff\xde\xa9\x33\x5e\xa8\xa1\x70\x75\xd7\x7c\x4f"
    1126             :              "\x71\xf1\x03\xb3\xfb\x0f\xad\x19\x4f\x5d\xfe\xbb\xc5\x98\x81\x11"
    1127             :              "\xee\x24\x24\x13\xa4\xa4\xfe\x40\x4b\x20\x38\x61\x6e\xe3\xec\x05"
    1128             :              "\x15\x46\x35\x2d\xd4\x61\x7d\x0f\x4a\x34\xf1\x23\x87\x5e\xc6\x8e"
    1129             :              "\xf5\x77\x8c\x03\x4b\x58\xe2\x3b\x35\x08\x2f\x40\x60\xd6\xe3\x3a"
    1130             :              "\xf0\xb4\xdd\xb9\x18\xfc\x7d\x79\x7a\xf3\x0a\x5c\x89\x2e\xcc\x30"
    1131             :              "\x9b\x8f\x7e\x3c\xd3\x1d\x45\xcb\xfb\xb5\x09\xe8\x6e\xd4\x87\xb0"
    1132             :              "\xc5\x5c\x0e\x70\xec\xd9\x04\xb2\xc1\x44\x9b\x78\x4f\x46\x92\x4b"
    1133             :              "\x18\x0b\x90\xaa\xe3\xf9\x11\x8d\xf8\x9e\x5e\xc6\x2e\xfb\x9f\xba"
    1134             :              "\x31\x49\x9e\x9d\xb7\xb8\x5c\x0b\x09\xcf\x45\xb0\x82\x9d\x6a\xd7"
    1135             :              "\xeb\x1d\x79\x6f\x26\x1a\xec\x5d\x16\xb1\xa8\xc5\x90\x00\x9a\x79"
    1136             :              "\x51\x9b\xab\x79\x09\xa1\x7f\x65\x74\xa0\xf8\x54\xfd\xf3\x74\x52"
    1137             :              "\x80\x09\x25\x33\xa4\xd5\x22\xba\x79\xc0\x77\xe0\x56\xfb\x19\xa9"
    1138             :              "\x8f\x23\x16\x29\xa9\x39\x54\x10\x0d\x85\xb9\x20\xd3\x27\xa2\x7d"
    1139             :              "\xe4\x81\x9e\x0a\x4a\xc4\xf6\xef\xc7\x0b\xb8\x6a\x50\xa9\xed\x72"
    1140             :              "\xb4\x79\x01\xf3\xc3\x89\x5d\x19\x5e\x9a\xf1\x35\x14\xcc\x04\x4c"
    1141             :              "\x2d\xe5\x0f\xd8\x07\xee\x50\xee\x3f\xaf\x74\x86\xcd\xc5\xf8\x34"
    1142             :              "\x0f\xeb\x32\x7f\x36\xcc\x03\xa8\xbc\xde\xd9\xf8\xfc\x01\x73\x83"
    1143             :              "\x74\x4a\x26\xdc\x70\x1a\x76\x71\x5a\xee\xac\x0b\xe0\xdb\x16\xd4"
    1144             :              "\x26\x7c\xfb\xb8\x96\x74\x00\x7d\xb8\x5c\x4a\x07\xfc\x9e\xc9\xff"
    1145             :              "\x4a\xd0\xaf\x86\x4b\xb0\xc6\x29\x8e\x3f\x2e\x9f\xa0\x33\xd3\xdf"
    1146             :              "\xb9\xe0\xd5\x48\xb9\xf0\x08\x7e\xae\xdd\xd0\x2e\xf5\x41\xd8\xa3"
    1147             :              "\x9a\xff\x76\x93\x04\x7a\xef\xd2\xf5\xb8\x05\xa1\x55\x8e\xe8\x03"
    1148             :              "\x9f\x6e\xd9\xc4\x75\xd0\xfe\x75\xd1\x77\x3f\x22\xbe\x2e\xc7\x27"
    1149             :              "\x10\x4e\x2c\xab\x2f\x38\x53\xcb\xe7\x27\x9d\xff\xd8\x86\xb7\xca"
    1150             :              "\xc1\x7e\xeb\x23\xd8\x8f\x5e\x85\xa3\x2a\xa3\xe6\xc8\x8f\x71\x30"
    1151             :              "\x98\x91\x1d\x11\x8d\x76\xdf\x42\xe8\x72\x6b\x41\x3a\x70\x46\x26"
    1152             :              "\x78\x16\xc8\x6a\x21\x66\x81\xdc\xec\xac\x3e\x5d\x8a\x9a\x01\x03"
    1153             :              "\xee\xee\x0a\x34\x1a\xad\xdc\xc9\x4f\x3d\x22\x3b\x48\x67\x43\x7d"
    1154             :              "\x7e\x53\x08\x91\x26\xbf\x7d\x60\x4a\xf4\xfb\x21\xcf\x74\xc9\xc6"
    1155             :              "\x47\x9b\x39\x58\x61\xde\x5d\x3c\xbe\x60\x2e\x2b\x6c\x08\x42\x3e"
    1156             :              "\xe3\x03\x76\x6d\xa8\xac\xba\x11\xb2\xce\x0f\xdb\x95\x6a\x33\xf4"
    1157             :              "\x00\xc9\x66\x13\xd4\x5f\xab\xe7\x1b\x17\x62\xa1\xe6\x4a\x82\x67"
    1158             :              "\x28\xa3\x7b\xf7\x4b\xfc\x57\xcb\x16\x3e\xfe\xb5\xa4\xef\x3b\x35"
    1159             :              "\xdd\x14\xd5\x48\x41\x5e\xa5\x62\xcc\x18\xba\x97\x6c\x75\xe9\x39"
    1160             :              "\x63\xd4\x9d\xce\x2d\x9d\x4c\xc3\x82\xb1\x31\x69\x91\x90\x3e\x6d"
    1161             :              "\x66\xc7\xea\xd3\x88\x02\xd3\x39\x10\x22\x04\x1a\xbf\xc5\x0d\x02"
    1162             :              "\xb8\x7c\x9a\x86\xc5\x04\x87\xef\xaf\x75\xe5\xc7\xe6\x21\xba\xa1"
    1163             :              "\xbd\x9c\x14\x90\xc3\x99\x80\xbb\x61\xe3\xe2\xc1\x79\xf0\xc6\x46"
    1164             :              "\x4f\x38\x86\x35\x93\x1a\x55\xd8\x76\x0f\x7c\xa2\xae\x3b\x6a\xa8"
    1165             :              "\xe4\x74\x74\xc2\x50\x38\xcf\xc5\xda\x85\xee\xe0\x2f\x23\x1a\x83"
    1166             :              "\x17\x54\xa7\x34\xa0\x1f\xd7\xd3\xb2\x53\xe3\x77\xfe\x8e\x97\x49"
    1167             :              "\xc5\x5b\xe0\x5f\xcb\x2c\x90\xe9\x09\x83\x40\x89\x81\x51\xf6\x40"
    1168             :              "\x64\x2c\x89\xca\xcf\x61\xda\x04\x0d\xaf\x3b\x48\xf9\x8a\xfa\x74"
    1169             :              "\x6a\x6a\xe5\x29\x5e\x3a\x6b\xee\xb5\x5e\xa3\x0c\x78\xf1\xe0\xcb"
    1170             :              "\x74\x69\x2c\x7b\xf6\x73\xc1\x53\x20\x8c\x15\x54\x03\x5d\x96\xe3"
    1171             :              "\x6a\x8d\x19\x5d\xec\x5a\xd4\xe3\x6b\x1a\x72\x27\x73\x73\xbb\x2e"
    1172             :              "\x7c\x4e\xbb\x63\x26\xdb\x9d\x9c\xde\x67\xd8\x50\x7c\x85\x1a\xff"
    1173             :              "\xf0\xd0\x12\x4d\x3e\x69\xb1\x2d\x2a\xd1\x28\x4a\xc9\x82\x1e\xd5"
    1174             :              "\xfc\xa3\x64\x0b\x2f\xcc\x4c\xef\x17\xa6\xe5\x0b\xd5\x76\xb4\x33"
    1175             :              "\xff\x3b\x3d\xc3\xb0\x28\xf7\x38\xf5\x7a\x76\x2c\x84\xf7\xcc\x4f"
    1176             :              "\x3a\xdf\x68\xab\xbc\x6b\x24\xac\x84\x8a\x09\x5e\x0d\x89\x9d\x85"
    1177             :              "\x98\xf5\x61\x60\x38\xb0\xdd\x86\xe1\xb5\x42\xa0\x6c\x25\x77\x28"
    1178             :              "\x8f\xf1\x21\xb3\xa8\xed\x8c\xfd\x18\xcf\x23\xae\x2a\x9f\x1c\x67"
    1179             :              "\xc3\x17\x48\x73\x3b\x6e\xbf\x02\x88\xed\x4d\xa2\x86\x07\x6a\x5d"
    1180             :              "\x16\x55\x3b\x87\x29\x88\xd0\x8d\xe3\x30\x3b\x89\x22\x5c\xa2\xb6"
    1181             :              "\xbb\xcf\xda\xd8\x1f\xe4\x7f\xa5\x50\xb9\x8b\xc2\x61\x73\x86\x61"
    1182             :              "\x92\x44\x1b\xc2\x9d\x34\x72\x81\x30\xca\x22\x83\x78\xe0\xa5\xb5"
    1183             :              "\x39\xba\xa3\x46\x7a\x4c\xd9\x2b\x5e\xaf\x42\xdf\xba\x80\x4a\x83"
    1184             :              "\x9c\x20\xe0\x86\x90\x88\x4e\xbf\x7b\xa6\x44\x3d\x7f\x9c\xbe\xc8"
    1185             :              "\xdf\x74\xe8\x2c\xf7\x4b\xc0\x06\x3f\x9e\x23\x30\xe8\x31\xc6\x07"
    1186             :              "\x5b\xc9\x26\xf1\x1c\xc8\xbe\xe3\xc7\xcb\x4f\x1b\x37\x09\xf0\xcf"
    1187             :              "\x0c\x5e\x1d\xac\x1c\xb8\x91\xcf\x0a\x54\x09\x6c\xa9\x4e\x9f\xa1"
    1188             :              "\x36\xde\x41\xa8\x67\xe4\x4c\x65\xc9\x28\x20\x0f\xbd\x49\x74\x7f"
    1189             :              "\x83\x26\x48\xb1\xe6\xca\x6f\xd8\x88\x27\x94\xdd\xa4\xaa\x03\x43"
    1190             :              "\xc6\x19\xab\x8b\x83\x78\x4f\x2a\x51\x34\x98\xff\x27\x6b\xda\x39"
    1191             :              "\xe4\x2e\xf6\xe9\xe7\xd6\x96\x86\x60\x3b\xc3\x80\xb8\xba\x51\x77"
    1192             :              "\x8a\x79\x07\x62\xb1\xaa\xa9\x58\x96\x54\x84\x04\x9e\xee\x24\x8d"
    1193             :              "\xf1\xac\x34\x03\x43\x8e\xd0\x92\xdc\x4d\xbc\xc7\x15\xdc\x82\xfc"
    1194             :              "\x19\x9b\x7e\x43\xe1\x36\xc5\x6b\xfb\xb8\x9e\xf4\x22\x5e\x29\x6f"
    1195             :              "\x4c\x45\xdd\xfe\xcb\x17\x77\xee\xd3\x6b\x80\x50\x96\xd0\x07\xa3"
    1196             :              "\xb2\xf0\x68\xc7\x40\xeb\x24\x16\x23\xa7\x57\xc4\xbb\x9c\x69\x16"
    1197             :              "\x49\x30\xb8\xd9\x4d\x41\x4e\x22\xc6\x24\x7f\x44\x59\x4e\x3c\x46"
    1198             :              "\x61\x64\x60\xc5\x82\xc2\x60\xc5\x63\xe7\xb3\xe1\xb9\xd1\x71\x65"
    1199             :              "\x32\xaa\x88\xa1\x4e\x98\xdb\x0b\x29\xe8\x5a\xa4\xbc\x61\x20\x62"
    1200             :              "\xbc\xea\xb0\x90\x3c\x2f\x29\xef\x74\x87\x4b\x1b\x36\xf7\x01\xde"
    1201             :              "\x30\xf0\x00\xe3\xd7\x2d\xf6\x52\x09\xe1\xe5\x84\x13\x04\xfe\x1f"
    1202             :              "\x2c\x1c\xeb\xfb\x2c\x40\x7d\x4d\xf5\x9c\x6e\x47\xe9\x2d\xb0\xca"
    1203             :              "\x88\x37\xf4\x8d\xbe\x50\xfb\xec\x5e\xee\x5d\x0f\x1a\x71\x42\xe3"
    1204             :              "\xc0\x9c\x57\xe3\x50\xba\x98\x0d\x79\xfa\x56\xe9\x7a\x09\x03\x75"
    1205             :              "\x21\x0f\x97\x69\xe0\xed\x9d\x10\x8f\x64\xdd\xd5\x10\xdc\x3b\x21"
    1206             :              "\x08\xc2\x7e\x7e\xac\x6e\x7c\x0b\xb9\x71\x65\x3e\xfa\x1c\xf3\x13"
    1207             :              "\xdc\x03\x9c\xf2\xa4\x21\xf1\xfc\x07\xaa\xef\xa0\x55\xd7\x21\xfc"
    1208             :              "\x0c\x17\x6a\x06\x57\x6b\x0e\x8e\x1d\xea\xb2\xc8\x23\xb3\xad\x42"
    1209             :              "\x00\x41\xe2\x9c\x1f\x2e\xa8\x51\x19\x3d\xdb\x24\x73\x4a\x8f\x08"
    1210             :              "\x74\xb5\x6b\x58\x48\x7a\x4e\x7b\xa6\x5c\x4b\x81\xd6\x38\xf9\xe5"
    1211             :              "\x66\xe3\x15\x9a\x74\x49\x68\x8e\x5b\x1e\xdd\x3f\x4f\xc8\xe3\x0c"
    1212             :              "\x73\x32\xf0\x35\x16\x8c\xd9\x84\xc3\x9a\x65\x16\x93\x65\x0f\x47"
    1213             :              "\x15\x97\xc8\xb4\x6a\x7f\x91\x0a\x05\xf2\x08\x36\xf0\x7e\x2c\xcb"
    1214             :              "\x79\xc4\xc4\xcb\x5a\xa0\x25\xc9\xe9\xac\x35\x8f\x56\xf6\x87\x4e"
    1215             :              "\x9b\x4b\x9d\x1a\x38\xb0\x43\x41\x94\x07\x17\x78\xec\xd3\x8c\x89"
    1216             :              "\x58\x09\xef\x07\xe1\xd8\x65\x97\x3e\xce\x61\xad\x51\x0a\x48\x3d"
    1217             :              "\x64\xd5\x6e\xa1\xe5\x86\x06\xb7\x22\xcd\x03\x44\xec\x94\x52\x15"
    1218             :              "\x5d\xf6\x9b\xc6\xb6\x22\x49\x5e\xb1\xdb\x01\x24\xd2\xc2\xac\x13"
    1219             :              "\xdc\xec\xb3\x93\x4c\x88\x3b\x11\x6d\x77\xab\x44\x67\x8c\xca\xa8"
    1220             :              "\x18\x47\xe3\xdc\x58\x13\x45\x43\xb3\x7f\xdf\x3a\xdf\xef\x0e\x4f"
    1221             :              "\xc0\xf3\x95\xb6\x7d\xdf\x97\xd7\x0d\x03\x9d\x14\x76\xd6\xae\x5f"
    1222             :              "\xb4\x13\x7f\x2a\xdb\x00\xa2\xe7\xfd\x33\xa6\x4d\x3f\xc1\x14\x58"
    1223             :              "\x7c\x55\x30\x6a\xae\x71\x0f\x73\xe3\x64\x1f\xc5\x2e\x6f\x82\x82"
    1224             :              "\x62\xd2\x02\xde\xf8\x29\x1e\xd5\x71\x3a\xbe\xcd\x43\xf8\x71\x5e"
    1225             :              "\xa1\xce\x68\xca\xcb\x23\xfa\x83\xba\xc2\x0f\x9b\x6b\x86\x5d\x9f",
    1226             :          STR(iv, iv_size,
    1227             :              "\x12\x34\x56\x78\x90\xab\xce\xf0\x00\x00\x00\x00\x00\x00\x00\x00"),
    1228             :         }
    1229             : };
    1230             : 
    1231             : const struct cipher_vectors_st aes128_xts_vectors[] = {
    1232             :         {
    1233             :          STR(key, key_size,
    1234             :              "\xa1\xb9\x0c\xba\x3f\x06\xac\x35\x3b\x2c\x34\x38\x76\x08\x17\x62"
    1235             :              "\x09\x09\x23\x02\x6e\x91\x77\x18\x15\xf2\x9d\xab\x01\x93\x2f\x2f"),
    1236             :          STR(plaintext, plaintext_size,
    1237             :              "\xeb\xab\xce\x95\xb1\x4d\x3c\x8d\x6f\xb3\x50\x39\x07\x90\x31\x1c"),
    1238             :          .ciphertext = (uint8_t *)
    1239             :              "\x77\x8a\xe8\xb4\x3c\xb9\x8d\x5a\x82\x50\x81\xd5\xbe\x47\x1c\x63",
    1240             :          STR(iv, iv_size,
    1241             :              "\x4f\xae\xf7\x11\x7c\xda\x59\xc6\x6e\x4b\x92\x01\x3e\x76\x8a\xd5"),
    1242             :          },
    1243             :         {
    1244             :          STR(key, key_size,
    1245             :              "\x75\x03\x72\xc3\xd8\x2f\x63\x38\x28\x67\xbe\x66\x62\xac\xfa\x4a"
    1246             :              "\x25\x9b\xe3\xfa\x9b\xc6\x62\xa1\x15\x4f\xfa\xae\xd8\xb4\x48\xa5"),
    1247             :          STR(plaintext, plaintext_size,
    1248             :              "\xd8\xe3\xa5\x65\x59\xa4\x36\xce\x0d\x8b\x21\x2c\x80\xa8\x8b\x23"
    1249             :              "\xaf\x62\xb0\xe5\x98\xf2\x08\xe0\x3c\x1f\x2e\x9f\xa5\x63\xa5\x4b"),
    1250             :          .ciphertext = (uint8_t *)
    1251             :              "\x49\x5f\x78\x55\x53\x5e\xfd\x13\x34\x64\xdc\x9a\x9a\xbf\x8a\x0f"
    1252             :              "\x28\xfa\xcb\xce\x21\xbd\x3c\x22\x17\x8e\xc4\x89\xb7\x99\xe4\x91",
    1253             :          STR(iv, iv_size,
    1254             :              "\x93\xa2\x92\x54\xc4\x7e\x42\x60\x66\x96\x21\x30\x7d\x4f\x5c\xd3"),
    1255             :          },
    1256             : };
    1257             : 
    1258             : const struct cipher_vectors_st aes256_xts_vectors[] = {
    1259             :         {
    1260             :          STR(key, key_size,
    1261             :              "\x1e\xa6\x61\xc5\x8d\x94\x3a\x0e\x48\x01\xe4\x2f\x4b\x09\x47\x14"
    1262             :              "\x9e\x7f\x9f\x8e\x3e\x68\xd0\xc7\x50\x52\x10\xbd\x31\x1a\x0e\x7c"
    1263             :              "\xd6\xe1\x3f\xfd\xf2\x41\x8d\x8d\x19\x11\xc0\x04\xcd\xa5\x8d\xa3"
    1264             :              "\xd6\x19\xb7\xe2\xb9\x14\x1e\x58\x31\x8e\xea\x39\x2c\xf4\x1b\x08"),
    1265             :          STR(plaintext, plaintext_size,
    1266             :              "\x2e\xed\xea\x52\xcd\x82\x15\xe1\xac\xc6\x47\xe8\x10\xbb\xc3\x64"
    1267             :              "\x2e\x87\x28\x7f\x8d\x2e\x57\xe3\x6c\x0a\x24\xfb\xc1\x2a\x20\x2e"),
    1268             :          .ciphertext = (uint8_t *)
    1269             :              "\xcb\xaa\xd0\xe2\xf6\xce\xa3\xf5\x0b\x37\xf9\x34\xd4\x6a\x9b\x13"
    1270             :              "\x0b\x9d\x54\xf0\x7e\x34\xf3\x6a\xf7\x93\xe8\x6f\x73\xc6\xd7\xdb",
    1271             :          STR(iv, iv_size,
    1272             :              "\xad\xf8\xd9\x26\x27\x46\x4a\xd2\xf0\x42\x8e\x84\xa9\xf8\x75\x64"),
    1273             :          },
    1274             : };
    1275             : 
    1276             : const struct cipher_aead_vectors_st aes128_siv_vectors[] = {
    1277             :         {
    1278             :          STR(key, key_size,
    1279             :              "\x7f\x7e\x7d\x7c\x7b\x7a\x79\x78\x77\x76\x75\x74\x73\x72\x71\x70"
    1280             :              "\x40\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f"),
    1281             :          STR(auth, auth_size,
    1282             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xdd\xee\xff"
    1283             :              "\xde\xad\xda\xda\xde\xad\xda\xda\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
    1284             :              "\x77\x66\x55\x44\x33\x22\x11\x00"),
    1285             :          STR(plaintext, plaintext_size,
    1286             :              "\x74\x68\x69\x73\x20\x69\x73\x20\x73\x6f\x6d\x65\x20\x70\x6c\x61"
    1287             :              "\x69\x6e\x74\x65\x78\x74\x20\x74\x6f\x20\x65\x6e\x63\x72\x79\x70"
    1288             :              "\x74\x20\x75\x73\x69\x6e\x67\x20\x53\x49\x56\x2d\x41\x45\x53"),
    1289             :          .ciphertext = (uint8_t *)
    1290             :              "\xa4\xff\xb8\x7f\xdb\xa9\x7c\x89\x44\xa6\x23\x25\xf1\x33\xb4\xe0"
    1291             :              "\x1c\xa5\x52\x76\xe2\x26\x1c\x1a\x1d\x1d\x42\x48\xd1\xda\x30\xba"
    1292             :              "\x52\xb9\xc8\xd7\x95\x5d\x65\xc8\xd2\xce\x6e\xb7\xe3\x67\xd0",
    1293             :          STR(iv, iv_size,
    1294             :              "\x02\x03\x04"),
    1295             :          .tag_size = 16,
    1296             :          .tag = (void *)
    1297             :              "\xf1\xdb\xa3\x3d\xe5\xb3\x36\x9e\x88\x3f\x67\xb6\xfc\x82\x3c\xee",
    1298             :          .tag_prepended = 1,
    1299             :         }
    1300             : };
    1301             : 
    1302             : const struct cipher_aead_vectors_st aes256_siv_vectors[] = {
    1303             :         {
    1304             :          STR(key, key_size,
    1305             :              "\xc2\x7d\xf2\xfd\xae\xc3\x5d\x4a\x2a\x41\x2a\x50\xc3\xe8\xc4\x7d"
    1306             :              "\x2d\x56\x8e\x91\xa3\x8e\x54\x14\x8a\xbd\xc0\xb6\xe8\x6c\xaf\x87"
    1307             :              "\x69\x5c\x0a\x8a\xdf\x4c\x5f\x8e\xb2\xc6\xc8\xb1\x36\x52\x98\x64"
    1308             :              "\xf3\xb8\x4b\x3a\xe8\xe3\x67\x6c\xe7\x60\xc4\x61\xf3\xa1\x3e\x83"),
    1309             :          STR(auth, auth_size,
    1310             :              "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xdd\xee\xff"
    1311             :              "\xde\xad\xda\xda\xde\xad\xda\xda\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
    1312             :              "\x77\x66\x55\x44\x33\x22\x11\x00"),
    1313             :          STR(plaintext, plaintext_size,
    1314             :              "\x74\x68\x69\x73\x20\x69\x73\x20\x73\x6f\x6d\x65\x20\x70\x6c\x61"
    1315             :              "\x69\x6e\x74\x65\x78\x74\x20\x74\x6f\x20\x65\x6e\x63\x72\x79\x70"
    1316             :              "\x74\x20\x75\x73\x69\x6e\x67\x20\x53\x49\x56\x2d\x41\x45\x53"),
    1317             :          .ciphertext = (uint8_t *)
    1318             :              "\x50\x93\x3d\xa8\x04\x7b\xc3\x06\xfa\xba\xf0\xc3\xd9\xfa\x84\x71"
    1319             :          "\xc7\x0a\x7d\xef\x39\xa2\xf9\x1d\x68\xa2\x02\x1c\x99\xac\x7e\x2a\x24"
    1320             :          "\x53\x5a\x13\x4b\xa2\x3e\xc1\x57\x87\xce\xbe\x5c\x53\xcc",
    1321             :          STR(iv, iv_size,
    1322             :              "\x09\xf9\x11\x02\x9d\x74\xe3\x5b\xd8\x41\x56\xc5\x63\x56\x88\xc0"),
    1323             :          .tag_size = 16,
    1324             :          .tag = (void *)
    1325             :              "\x5a\x97\x9b\x0d\xa5\x8f\xde\x80\x51\x62\x1a\xe6\xbf\x96\xfe\xda",
    1326             :          .tag_prepended = 1,
    1327             :         }
    1328             : };
    1329             : 
    1330             : const struct cipher_vectors_st chacha20_32_vectors[] = { /* RFC8439 */
    1331             :         {
    1332             :          STR(key, key_size,
    1333             :              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f"),
    1334             :          STR(plaintext, plaintext_size,
    1335             :              "\x4c\x61\x64\x69\x65\x73\x20\x61\x6e\x64\x20\x47\x65\x6e\x74\x6c\x65\x6d\x65\x6e\x20\x6f\x66\x20\x74\x68\x65\x20\x63\x6c\x61\x73\x73\x20\x6f\x66\x20\x27\x39\x39\x3a\x20\x49\x66\x20\x49\x20\x63\x6f\x75\x6c\x64\x20\x6f\x66\x66\x65\x72\x20\x79\x6f\x75\x20\x6f\x6e\x6c\x79\x20\x6f\x6e\x65\x20\x74\x69\x70\x20\x66\x6f\x72\x20\x74\x68\x65\x20\x66\x75\x74\x75\x72\x65\x2c\x20\x73\x75\x6e\x73\x63\x72\x65\x65\x6e\x20\x77\x6f\x75\x6c\x64\x20\x62\x65\x20\x69\x74\x2e"),
    1336             :          .ciphertext = (uint8_t *)
    1337             :              "\x6e\x2e\x35\x9a\x25\x68\xf9\x80\x41\xba\x07\x28\xdd\x0d\x69\x81\xe9\x7e\x7a\xec\x1d\x43\x60\xc2\x0a\x27\xaf\xcc\xfd\x9f\xae\x0b\xf9\x1b\x65\xc5\x52\x47\x33\xab\x8f\x59\x3d\xab\xcd\x62\xb3\x57\x16\x39\xd6\x24\xe6\x51\x52\xab\x8f\x53\x0c\x35\x9f\x08\x61\xd8\x07\xca\x0d\xbf\x50\x0d\x6a\x61\x56\xa3\x8e\x08\x8a\x22\xb6\x5e\x52\xbc\x51\x4d\x16\xcc\xf8\x06\x81\x8c\xe9\x1a\xb7\x79\x37\x36\x5a\xf9\x0b\xbf\x74\xa3\x5b\xe6\xb4\x0b\x8e\xed\xf2\x78\x5e\x42\x87\x4d",
    1338             :          STR(iv, iv_size,
    1339             :              "\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x4a\x00\x00\x00\x00")
    1340             :         },
    1341             : };
    1342             : 
    1343         100 : static int test_cipher(gnutls_cipher_algorithm_t cipher,
    1344             :                        const struct cipher_vectors_st *vectors,
    1345             :                        size_t vectors_size, unsigned flags)
    1346             : {
    1347         100 :         gnutls_cipher_hd_t hd;
    1348         100 :         int ret;
    1349         100 :         unsigned int i;
    1350         100 :         uint8_t tmp[4096 + 16];
    1351         100 :         gnutls_datum_t key, iv = {NULL, 0};
    1352             : 
    1353         235 :         for (i = 0; i < vectors_size; i++) {
    1354         135 :                 key.data = (void *) vectors[i].key;
    1355         135 :                 key.size = vectors[i].key_size;
    1356             : 
    1357         135 :                 if (vectors[i].iv != NULL) {
    1358         120 :                         iv.data = (void *) vectors[i].iv;
    1359         120 :                         iv.size = gnutls_cipher_get_iv_size(cipher);
    1360             :                 }
    1361             : 
    1362         135 :                 if (iv.size != vectors[i].iv_size)
    1363           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1364             : 
    1365         135 :                 ret = gnutls_cipher_init(&hd, cipher, &key, &iv);
    1366         135 :                 if (ret < 0) {
    1367           0 :                         _gnutls_debug_log("error initializing: %s\n",
    1368             :                                           gnutls_cipher_get_name(cipher));
    1369           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1370             :                 }
    1371             : 
    1372         135 :                 ret =
    1373         270 :                     gnutls_cipher_encrypt2(hd,
    1374         135 :                                            vectors[i].plaintext,
    1375         135 :                                            vectors[i].plaintext_size,
    1376             :                                            tmp, sizeof(tmp));
    1377         135 :                 if (ret < 0)
    1378           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1379             : 
    1380         135 :                 if (memcmp
    1381         135 :                     (tmp, vectors[i].ciphertext,
    1382         135 :                      vectors[i].plaintext_size) != 0) {
    1383           0 :                         _gnutls_debug_log("%s test vector %d failed!\n",
    1384             :                                           gnutls_cipher_get_name(cipher),
    1385             :                                           i);
    1386           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1387             :                 }
    1388             : 
    1389             :                 /* check in-place encryption */
    1390         135 :                 if (cipher != GNUTLS_CIPHER_ARCFOUR_128) { /* arcfour is stream */
    1391         120 :                         if (cipher == GNUTLS_CIPHER_MAGMA_CTR_ACPKM ||
    1392             :                             cipher == GNUTLS_CIPHER_KUZNYECHIK_CTR_ACPKM)
    1393          10 :                                 _gnutls_cipher_set_key(hd, (void*)vectors[i].key, vectors[i].key_size);
    1394         120 :                         gnutls_cipher_set_iv(hd, (void*)vectors[i].iv, vectors[i].iv_size);
    1395             : 
    1396         120 :                         memcpy(tmp, vectors[i].plaintext, vectors[i].plaintext_size);
    1397         120 :                         ret = gnutls_cipher_encrypt(hd, tmp, vectors[i].plaintext_size);
    1398         120 :                         if (ret < 0)
    1399           0 :                                 return
    1400           0 :                                     gnutls_assert_val
    1401             :                                     (GNUTLS_E_SELF_TEST_ERROR);
    1402             : 
    1403         120 :                         if (memcmp(tmp, vectors[i].ciphertext, vectors[i].plaintext_size) != 0) {
    1404           0 :                                 _gnutls_debug_log("%s vector %d in-place encryption failed!\n", gnutls_cipher_get_name(cipher), i);
    1405           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1406             :                         }
    1407             :                 }
    1408             : 
    1409             :                 /* check the internal IV */
    1410         135 :                 if (vectors[i].internal_iv_size > 0) {
    1411          15 :                         ret = _gnutls_cipher_get_iv(hd, tmp, sizeof(tmp));
    1412          15 :                         if (ret < 0)
    1413           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1414             : 
    1415          15 :                         if (memcmp(tmp, vectors[i].internal_iv, ret) != 0) {
    1416           0 :                                 _gnutls_debug_log("%s vector %d internal IV check failed!\n",
    1417             :                                                   gnutls_cipher_get_name(cipher),
    1418             :                                                   i);
    1419           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1420             :                         }
    1421             :                 }
    1422             : 
    1423         135 :                 gnutls_cipher_deinit(hd);
    1424             :         }
    1425             : 
    1426         100 :         iv.size = gnutls_cipher_get_iv_size(cipher);
    1427             : 
    1428         235 :         for (i = 0; i < vectors_size; i++) {
    1429         135 :                 key.data = (void *) vectors[i].key;
    1430         135 :                 key.size = vectors[i].key_size;
    1431             : 
    1432         135 :                 iv.data = (void *) vectors[i].iv;
    1433             : 
    1434         135 :                 ret = gnutls_cipher_init(&hd, cipher, &key, &iv);
    1435         135 :                 if (ret < 0)
    1436           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1437             : 
    1438         135 :                 ret =
    1439         270 :                     gnutls_cipher_decrypt2(hd,
    1440         135 :                                            vectors[i].ciphertext,
    1441         135 :                                            vectors[i].plaintext_size, tmp,
    1442             :                                            sizeof(tmp));
    1443         135 :                 if (ret < 0) {
    1444           0 :                         _gnutls_debug_log
    1445             :                             ("%s decryption of test vector %d failed!\n",
    1446             :                              gnutls_cipher_get_name(cipher), i);
    1447           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1448             :                 }
    1449             : 
    1450         135 :                 if (memcmp
    1451         135 :                     (tmp, vectors[i].plaintext,
    1452         135 :                      vectors[i].plaintext_size) != 0) {
    1453           0 :                         _gnutls_debug_log("%s test vector %d failed!\n",
    1454             :                                           gnutls_cipher_get_name(cipher),
    1455             :                                           i);
    1456           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1457             :                 }
    1458             : 
    1459             :                 /* check in-place decryption */
    1460         135 :                 if (cipher != GNUTLS_CIPHER_ARCFOUR_128) { /* arcfour is stream */
    1461         120 :                         if (cipher == GNUTLS_CIPHER_MAGMA_CTR_ACPKM ||
    1462             :                             cipher == GNUTLS_CIPHER_KUZNYECHIK_CTR_ACPKM)
    1463          10 :                                 _gnutls_cipher_set_key(hd, (void*)vectors[i].key, vectors[i].key_size);
    1464         120 :                         gnutls_cipher_set_iv(hd, (void*)vectors[i].iv, vectors[i].iv_size);
    1465             : 
    1466         120 :                         memcpy(tmp, vectors[i].ciphertext, vectors[i].plaintext_size);
    1467         120 :                         ret = gnutls_cipher_decrypt(hd, tmp, vectors[i].plaintext_size);
    1468         120 :                         if (ret < 0)
    1469           0 :                                 return
    1470           0 :                                     gnutls_assert_val
    1471             :                                     (GNUTLS_E_SELF_TEST_ERROR);
    1472             : 
    1473         120 :                         if (memcmp(tmp, vectors[i].plaintext, vectors[i].plaintext_size) != 0) {
    1474           0 :                                 _gnutls_debug_log("%s vector %d in-place decryption failed!\n", gnutls_cipher_get_name(cipher), i);
    1475           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1476             :                         }
    1477             :                 }
    1478             : 
    1479         135 :                 gnutls_cipher_deinit(hd);
    1480             :         }
    1481             : 
    1482         100 :         _gnutls_debug_log
    1483             :             ("%s self check succeeded\n",
    1484             :              gnutls_cipher_get_name(cipher));
    1485             : 
    1486             :         return 0;
    1487             : }
    1488             : 
    1489          15 : static int test_cipher_all_block_sizes(gnutls_cipher_algorithm_t cipher,
    1490             :                                        const struct cipher_vectors_st *vectors,
    1491             :                                        size_t vectors_size, unsigned flags)
    1492             : {
    1493          15 :         gnutls_cipher_hd_t hd;
    1494          15 :         int ret;
    1495          15 :         unsigned int i;
    1496          15 :         uint8_t tmp[384];
    1497          15 :         gnutls_datum_t key, iv = {NULL, 0};
    1498          15 :         size_t block;
    1499          15 :         size_t offset;
    1500             : 
    1501          30 :         for (i = 0; i < vectors_size; i++) {
    1502         285 :                 for (block = 1; block <= vectors[i].plaintext_size; block++) {
    1503         270 :                         key.data = (void *) vectors[i].key;
    1504         270 :                         key.size = vectors[i].key_size;
    1505             : 
    1506         270 :                         iv.data = (void *) vectors[i].iv;
    1507         270 :                         iv.size = gnutls_cipher_get_iv_size(cipher);
    1508             : 
    1509         270 :                         if (iv.size != vectors[i].iv_size)
    1510           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1511             : 
    1512         270 :                         ret = gnutls_cipher_init(&hd, cipher, &key, &iv);
    1513         270 :                         if (ret < 0) {
    1514           0 :                                 _gnutls_debug_log("error initializing: %s\n",
    1515             :                                                   gnutls_cipher_get_name(cipher));
    1516           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1517             :                         }
    1518             : 
    1519        1320 :                         for (offset = 0;
    1520        1320 :                              offset < vectors[i].plaintext_size;
    1521        1050 :                              offset += block) {
    1522        1050 :                                 ret =
    1523        2100 :                                     gnutls_cipher_encrypt2(hd,
    1524        1050 :                                                            vectors[i].plaintext + offset,
    1525        1050 :                                                            MIN(block, vectors[i].plaintext_size - offset),
    1526             :                                                            tmp + offset,
    1527             :                                                            sizeof(tmp) - offset);
    1528        1050 :                                 if (ret < 0)
    1529           0 :                                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1530             :                         }
    1531             : 
    1532         270 :                         if (memcmp
    1533         270 :                             (tmp, vectors[i].ciphertext,
    1534             :                              vectors[i].plaintext_size) != 0) {
    1535           0 :                                 _gnutls_debug_log("%s encryption of test vector %d failed with block size %d/%d!\n",
    1536             :                                                   gnutls_cipher_get_name(cipher),
    1537             :                                                   i, (int)block, (int)vectors[i].plaintext_size);
    1538           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1539             :                         }
    1540             : 
    1541         270 :                         gnutls_cipher_deinit(hd);
    1542             :                 }
    1543             :         }
    1544             : 
    1545          30 :         for (i = 0; i < vectors_size; i++) {
    1546         285 :                 for (block = 1; block <= vectors[i].plaintext_size; block++) {
    1547         270 :                         key.data = (void *) vectors[i].key;
    1548         270 :                         key.size = vectors[i].key_size;
    1549             : 
    1550         270 :                         iv.data = (void *) vectors[i].iv;
    1551         270 :                         iv.size = gnutls_cipher_get_iv_size(cipher);
    1552             : 
    1553         270 :                         ret = gnutls_cipher_init(&hd, cipher, &key, &iv);
    1554         270 :                         if (ret < 0)
    1555           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1556             : 
    1557        1140 :                         for (offset = 0;
    1558        1140 :                              offset + block <= vectors[i].plaintext_size;
    1559             :                              offset += block) {
    1560         870 :                                 ret =
    1561        1740 :                                     gnutls_cipher_decrypt2(hd,
    1562         870 :                                                            vectors[i].ciphertext + offset,
    1563         870 :                                                            MIN(block, vectors[i].plaintext_size - offset),
    1564             :                                                            tmp + offset,
    1565             :                                                            sizeof(tmp) - offset);
    1566         870 :                                 if (ret < 0)
    1567           0 :                                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1568             :                         }
    1569             : 
    1570         270 :                         if (memcmp
    1571         270 :                             (tmp, vectors[i].plaintext,
    1572             :                              vectors[i].plaintext_size) != 0) {
    1573           0 :                                 _gnutls_debug_log("%s decryption of test vector %d failed with block size %d!\n",
    1574             :                                                   gnutls_cipher_get_name(cipher),
    1575             :                                                   i, (int)block);
    1576           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1577             :                         }
    1578             : 
    1579         270 :                         gnutls_cipher_deinit(hd);
    1580             :                 }
    1581             :         }
    1582             : 
    1583          15 :         _gnutls_debug_log
    1584             :             ("%s self check succeeded\n",
    1585             :              gnutls_cipher_get_name(cipher));
    1586             : 
    1587             :         return 0;
    1588             : }
    1589             : 
    1590             : /* AEAD modes (compat APIs) */
    1591          16 : static int test_cipher_aead_compat(gnutls_cipher_algorithm_t cipher,
    1592             :                             const struct cipher_aead_vectors_st *vectors,
    1593             :                             size_t vectors_size)
    1594             : {
    1595          16 :         gnutls_cipher_hd_t hd;
    1596          16 :         int ret;
    1597          16 :         unsigned int i;
    1598          16 :         uint8_t tmp[384];
    1599          16 :         uint8_t tmp2[384];
    1600          16 :         gnutls_datum_t key, iv;
    1601          16 :         unsigned tag_size;
    1602             : 
    1603          16 :         _gnutls_debug_log("compat: running tests for: %s\n",
    1604             :                                   gnutls_cipher_get_name(cipher));
    1605             : 
    1606          28 :         for (i = 0; i < vectors_size; i++) {
    1607          20 :                 memset(tmp, 0, sizeof(tmp));
    1608          20 :                 key.data = (void *) vectors[i].key;
    1609          20 :                 key.size = vectors[i].key_size;
    1610             : 
    1611          20 :                 iv.data = (void *) vectors[i].iv;
    1612          20 :                 iv.size = vectors[i].iv_size;
    1613          20 :                 tag_size = vectors[i].tag_size;
    1614             : 
    1615             : 
    1616          20 :                 if (tag_size > gnutls_cipher_get_tag_size(cipher)) {
    1617           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1618             :                 }
    1619             : 
    1620          20 :                 ret = gnutls_cipher_init(&hd, cipher, &key, &iv);
    1621          20 :                 if (ret < 0) {
    1622           8 :                         if (vectors[i].compat_apis == 0) {
    1623             :                                 return 0; /* expected */
    1624             :                         } else {
    1625           0 :                                 _gnutls_debug_log("compat: error initializing: %s\n",
    1626             :                                           gnutls_cipher_get_name(cipher));
    1627           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1628             :                         }
    1629             :                 }
    1630             : 
    1631          12 :                 if (vectors[i].compat_apis == 0) {
    1632           0 :                         _gnutls_debug_log("compat: initialized but shouldn't: %s\n",
    1633             :                                   gnutls_cipher_get_name(cipher));
    1634           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1635             :                 }
    1636             : 
    1637          12 :                 if (vectors[i].auth_size) {
    1638           4 :                         ret = gnutls_cipher_add_auth(hd, vectors[i].auth, vectors[i].auth_size);
    1639           4 :                         if (ret < 0)
    1640           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1641             :                 }
    1642             : 
    1643          12 :                 ret = gnutls_cipher_encrypt2(hd, vectors[i].plaintext, vectors[i].plaintext_size,
    1644             :                                              tmp, sizeof(tmp));
    1645          12 :                 if (ret < 0)
    1646           0 :                         return
    1647           0 :                             gnutls_assert_val
    1648             :                             (GNUTLS_E_SELF_TEST_ERROR);
    1649             : 
    1650          12 :                 ret = gnutls_cipher_tag(hd, tmp+vectors[i].plaintext_size, tag_size);
    1651          12 :                 if (ret < 0)
    1652           0 :                         return
    1653           0 :                             gnutls_assert_val
    1654             :                             (GNUTLS_E_SELF_TEST_ERROR);
    1655             : 
    1656          12 :                 if (memcmp(tmp+vectors[i].plaintext_size, vectors[i].tag, tag_size) != 0) {
    1657           0 :                         _gnutls_debug_log
    1658             :                             ("compat: %s test vector %d failed (tag)!\n",
    1659             :                              gnutls_cipher_get_name(cipher), i);
    1660           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1661             :                 }
    1662             : 
    1663          12 :                 if (vectors[i].plaintext_size > 0) {
    1664          10 :                         if (memcmp
    1665          10 :                             (tmp, vectors[i].ciphertext,
    1666             :                              vectors[i].plaintext_size) != 0) {
    1667           0 :                                 _gnutls_debug_log
    1668             :                                     ("compat: %s test vector %d failed!\n",
    1669             :                                      gnutls_cipher_get_name(cipher), i);
    1670             : 
    1671           0 :                                 return
    1672           0 :                                     gnutls_assert_val
    1673             :                                     (GNUTLS_E_SELF_TEST_ERROR);
    1674             :                         }
    1675             :                 }
    1676             : 
    1677          12 :                 if (vectors[i].plaintext_size > 0) {
    1678             :                         /* check inplace encryption */
    1679          10 :                         gnutls_cipher_set_iv(hd, (void*)vectors[i].iv, vectors[i].iv_size);
    1680          10 :                         memcpy(tmp2, vectors[i].plaintext, vectors[i].plaintext_size);
    1681             : 
    1682          10 :                         ret = gnutls_cipher_encrypt(hd, tmp2, vectors[i].plaintext_size);
    1683          10 :                         if (ret < 0)
    1684           0 :                                 return
    1685           0 :                                     gnutls_assert_val
    1686             :                                     (GNUTLS_E_SELF_TEST_ERROR);
    1687             : 
    1688          10 :                         if (memcmp(tmp, tmp2, vectors[i].plaintext_size) != 0) {
    1689           0 :                                 _gnutls_debug_log("compat: %s vector %d in-place encryption failed!\n", gnutls_cipher_get_name(cipher), i);
    1690           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1691             :                         }
    1692             : 
    1693             :                         /* check decryption with separate buffers */
    1694          10 :                         gnutls_cipher_set_iv(hd, (void*)vectors[i].iv, vectors[i].iv_size);
    1695             : 
    1696          10 :                         if (vectors[i].auth_size) {
    1697           4 :                                 ret = gnutls_cipher_add_auth(hd, vectors[i].auth, vectors[i].auth_size);
    1698           4 :                                 if (ret < 0)
    1699           0 :                                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1700             :                         }
    1701             : 
    1702          10 :                         ret =
    1703          10 :                             gnutls_cipher_decrypt2(hd, tmp, vectors[i].plaintext_size,
    1704             :                                                    tmp2, sizeof(tmp2));
    1705          10 :                         if (ret < 0)
    1706           0 :                                 return
    1707           0 :                                     gnutls_assert_val
    1708             :                                     (GNUTLS_E_SELF_TEST_ERROR);
    1709             : 
    1710          10 :                         if (memcmp(tmp2, vectors[i].plaintext, vectors[i].plaintext_size) != 0) {
    1711           0 :                                 _gnutls_debug_log("compat: %s test vector %d failed (decryption)!\n",
    1712             :                                         gnutls_cipher_get_name(cipher), i);
    1713           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1714             :                         }
    1715             : 
    1716             :                         /* check in-place decryption */
    1717          10 :                         if (vectors[i].plaintext_size > 0) {
    1718          10 :                                 gnutls_cipher_set_iv(hd, (void*)vectors[i].iv, vectors[i].iv_size);
    1719             : 
    1720          10 :                                 if (vectors[i].auth_size) {
    1721           4 :                                         ret = gnutls_cipher_add_auth(hd, vectors[i].auth, vectors[i].auth_size);
    1722           4 :                                         if (ret < 0)
    1723           0 :                                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1724             :                                 }
    1725             : 
    1726          10 :                                 memcpy(tmp2, tmp, vectors[i].plaintext_size);
    1727          10 :                                 ret = gnutls_cipher_decrypt(hd, tmp2, vectors[i].plaintext_size);
    1728          10 :                                 if (ret < 0)
    1729           0 :                                         return
    1730           0 :                                             gnutls_assert_val
    1731             :                                             (GNUTLS_E_SELF_TEST_ERROR);
    1732             : 
    1733          10 :                                 if (memcmp(tmp2, vectors[i].plaintext, vectors[i].plaintext_size) != 0) {
    1734           0 :                                         _gnutls_debug_log("compat: %s vector %d in-place decryption failed!\n", gnutls_cipher_get_name(cipher), i);
    1735           0 :                                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1736             :                                 }
    1737             :                         }
    1738             :                 }
    1739             : 
    1740          12 :                 gnutls_cipher_deinit(hd);
    1741             :         }
    1742             : 
    1743           8 :         _gnutls_debug_log
    1744             :             ("%s compat self check succeeded\n",
    1745             :              gnutls_cipher_get_name(cipher));
    1746             : 
    1747             :         return 0;
    1748             : 
    1749             : }
    1750             : 
    1751             : #define IOV_PARTS 8
    1752             : /* AEAD modes - scatter read */
    1753          40 : static int test_cipher_aead_scatter(gnutls_cipher_algorithm_t cipher,
    1754             :                                     const struct cipher_aead_vectors_st *vectors,
    1755             :                                     size_t vectors_size, unsigned flags)
    1756             : {
    1757          40 :         gnutls_aead_cipher_hd_t hd;
    1758          40 :         int ret;
    1759          40 :         unsigned int i, z;
    1760          40 :         uint8_t tmp[384];
    1761          40 :         gnutls_datum_t key, iv;
    1762          40 :         size_t s;
    1763          40 :         unsigned tag_size;
    1764          40 :         giovec_t auth_iov[IOV_PARTS];
    1765          40 :         int auth_iov_len;
    1766          40 :         int iov_len;
    1767          40 :         giovec_t iov[IOV_PARTS];
    1768          40 :         const uint8_t *tag;
    1769          40 :         uint8_t *ciphertext;
    1770             : 
    1771          40 :         _gnutls_debug_log("running scatter (iovec) tests for: %s\n",
    1772             :                                   gnutls_cipher_get_name(cipher));
    1773             : 
    1774         110 :         for (i = 0; i < vectors_size; i++) {
    1775          70 :                 memset(tmp, 0, sizeof(tmp));
    1776          70 :                 key.data = (void *) vectors[i].key;
    1777          70 :                 key.size = vectors[i].key_size;
    1778             : 
    1779          70 :                 iv.data = (void *) vectors[i].iv;
    1780          70 :                 iv.size = vectors[i].iv_size;
    1781          70 :                 tag_size = vectors[i].tag_size;
    1782             : 
    1783          70 :                 if (tag_size > gnutls_cipher_get_tag_size(cipher)) {
    1784           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1785             :                 }
    1786             : 
    1787          70 :                 ret = gnutls_aead_cipher_init(&hd, cipher, &key);
    1788          70 :                 if (ret < 0) {
    1789           0 :                         _gnutls_debug_log("error initializing: %s\n",
    1790             :                                           gnutls_cipher_get_name(cipher));
    1791           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1792             :                 }
    1793             : 
    1794          70 :                 s = sizeof(tmp);
    1795             : 
    1796             :                 /* single vector */
    1797          70 :                 auth_iov_len = 1;
    1798          70 :                 auth_iov[0].iov_base = (void*)vectors[i].auth;
    1799          70 :                 auth_iov[0].iov_len = vectors[i].auth_size;
    1800             : 
    1801          70 :                 iov_len = 1;
    1802          70 :                 iov[0].iov_base = (void*)vectors[i].plaintext;
    1803          70 :                 iov[0].iov_len = vectors[i].plaintext_size;
    1804             : 
    1805          70 :                 ret =
    1806         140 :                     gnutls_aead_cipher_encryptv(hd,
    1807             :                                                 iv.data, iv.size,
    1808             :                                                 auth_iov, auth_iov_len,
    1809          70 :                                                 vectors[i].tag_size,
    1810             :                                                 iov, iov_len,
    1811             :                                                 tmp, &s);
    1812          70 :                 if (ret < 0)
    1813           0 :                         return
    1814           0 :                             gnutls_assert_val
    1815             :                             (GNUTLS_E_SELF_TEST_ERROR);
    1816             : 
    1817          70 :                 if (s != vectors[i].plaintext_size + tag_size) {
    1818           0 :                         return
    1819           0 :                             gnutls_assert_val
    1820             :                             (GNUTLS_E_SELF_TEST_ERROR);
    1821             :                 }
    1822             : 
    1823          70 :                 if (vectors[i].tag_prepended)
    1824             :                         tag = tmp;
    1825             :                 else
    1826          60 :                         tag = tmp+vectors[i].plaintext_size;
    1827             : 
    1828          70 :                 if (memcmp(tag, vectors[i].tag, tag_size) != 0) {
    1829           0 :                         _gnutls_debug_log
    1830             :                             ("%s test vector %d failed (tag)!\n",
    1831             :                              gnutls_cipher_get_name(cipher), i);
    1832           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1833             :                 }
    1834             : 
    1835          70 :                 if (vectors[i].tag_prepended)
    1836          10 :                         ciphertext = tmp+vectors[i].tag_size;
    1837             :                 else
    1838             :                         ciphertext = tmp;
    1839             : 
    1840          70 :                 if (vectors[i].plaintext_size > 0) {
    1841          60 :                         if (memcmp
    1842          60 :                             (ciphertext, vectors[i].ciphertext,
    1843             :                              vectors[i].plaintext_size) != 0) {
    1844           0 :                                 _gnutls_debug_log
    1845             :                                     ("%s test vector %d failed!\n",
    1846             :                                      gnutls_cipher_get_name(cipher), i);
    1847             : 
    1848           0 :                                 return
    1849           0 :                                     gnutls_assert_val
    1850             :                                     (GNUTLS_E_SELF_TEST_ERROR);
    1851             :                         }
    1852             :                 }
    1853             : 
    1854             :                 /* multi-vector */
    1855          70 :                 auth_iov_len = 0;
    1856          70 :                 if (vectors[i].auth_size > IOV_PARTS) {
    1857          25 :                         unsigned split = vectors[i].auth_size / IOV_PARTS;
    1858          25 :                         assert(split>0);
    1859         225 :                         for (z=0;z<IOV_PARTS;z++) {
    1860         200 :                                 auth_iov[z].iov_base = (void*)(vectors[i].auth+(z*split));
    1861         200 :                                 if (z==IOV_PARTS-1)
    1862          25 :                                         auth_iov[z].iov_len = vectors[i].auth_size - z*split;
    1863             :                                 else
    1864         175 :                                         auth_iov[z].iov_len = split;
    1865         200 :                                 auth_iov_len++;
    1866             :                         }
    1867             :                 } else {
    1868          45 :                         auth_iov_len = 1;
    1869          45 :                         auth_iov[0].iov_base = (void*)vectors[i].auth;
    1870          45 :                         auth_iov[0].iov_len = vectors[i].auth_size;
    1871             :                 }
    1872             : 
    1873          70 :                 iov_len = 0;
    1874          70 :                 if (vectors[i].plaintext_size > IOV_PARTS) {
    1875          50 :                         unsigned split = vectors[i].plaintext_size / IOV_PARTS;
    1876          50 :                         assert(split>0);
    1877             : 
    1878         450 :                         for (z=0;z<IOV_PARTS;z++) {
    1879         400 :                                 iov[z].iov_base = (void*)(vectors[i].plaintext+(z*split));
    1880         400 :                                 if (z==IOV_PARTS-1)
    1881          50 :                                         iov[z].iov_len = vectors[i].plaintext_size - z*split;
    1882             :                                 else
    1883         350 :                                         iov[z].iov_len = split;
    1884         400 :                                 iov_len++;
    1885             :                         }
    1886             :                 } else {
    1887          20 :                         iov_len = 1;
    1888          20 :                         iov[0].iov_base = (void*)vectors[i].plaintext;
    1889          20 :                         iov[0].iov_len = vectors[i].plaintext_size;
    1890             :                 }
    1891             : 
    1892          70 :                 s = sizeof(tmp);
    1893             : 
    1894          70 :                 ret =
    1895         140 :                     gnutls_aead_cipher_encryptv(hd,
    1896             :                                                 iv.data, iv.size,
    1897             :                                                 auth_iov, auth_iov_len,
    1898          70 :                                                 vectors[i].tag_size,
    1899             :                                                 iov, iov_len,
    1900             :                                                 tmp, &s);
    1901          70 :                 if (ret < 0)
    1902           0 :                         return
    1903           0 :                             gnutls_assert_val
    1904             :                             (GNUTLS_E_SELF_TEST_ERROR);
    1905             : 
    1906          70 :                 if (s != vectors[i].plaintext_size + tag_size) {
    1907           0 :                         return
    1908           0 :                             gnutls_assert_val
    1909             :                             (GNUTLS_E_SELF_TEST_ERROR);
    1910             :                 }
    1911             : 
    1912          70 :                 if (vectors[i].tag_prepended)
    1913             :                         tag = tmp;
    1914             :                 else
    1915          60 :                         tag = tmp+vectors[i].plaintext_size;
    1916             : 
    1917          70 :                 if (memcmp(tag, vectors[i].tag, tag_size) != 0) {
    1918           0 :                         _gnutls_debug_log
    1919             :                             ("%s test vector %d failed (tag)!\n",
    1920             :                              gnutls_cipher_get_name(cipher), i);
    1921           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1922             :                 }
    1923             : 
    1924          70 :                 if (vectors[i].tag_prepended)
    1925          10 :                         ciphertext = tmp+vectors[i].tag_size;
    1926             :                 else
    1927             :                         ciphertext = tmp;
    1928             : 
    1929          70 :                 if (vectors[i].plaintext_size > 0) {
    1930          60 :                         if (memcmp
    1931          60 :                             (ciphertext, vectors[i].ciphertext,
    1932             :                              vectors[i].plaintext_size) != 0) {
    1933           0 :                                 _gnutls_debug_log
    1934             :                                     ("%s test vector %d failed!\n",
    1935             :                                      gnutls_cipher_get_name(cipher), i);
    1936             : 
    1937           0 :                                 return
    1938           0 :                                     gnutls_assert_val
    1939             :                                     (GNUTLS_E_SELF_TEST_ERROR);
    1940             :                         }
    1941             :                 }
    1942             : 
    1943             : 
    1944             : 
    1945          70 :                 gnutls_aead_cipher_deinit(hd);
    1946             :         }
    1947             : 
    1948          40 :         _gnutls_debug_log
    1949             :             ("%s scatter self check succeeded\n",
    1950             :              gnutls_cipher_get_name(cipher));
    1951             : 
    1952          40 :         if (flags & GNUTLS_SELF_TEST_FLAG_NO_COMPAT)
    1953             :                 return 0;
    1954             :         else
    1955          16 :                 return test_cipher_aead_compat(cipher, vectors, vectors_size);
    1956             : }
    1957             : 
    1958             : /* AEAD modes */
    1959          40 : static int test_cipher_aead(gnutls_cipher_algorithm_t cipher,
    1960             :                             const struct cipher_aead_vectors_st *vectors,
    1961             :                             size_t vectors_size, unsigned flags)
    1962             : {
    1963          40 :         gnutls_aead_cipher_hd_t hd;
    1964          40 :         int ret;
    1965          40 :         unsigned int i;
    1966          40 :         uint8_t tmp[384];
    1967          40 :         uint8_t tmp2[384];
    1968          40 :         gnutls_datum_t key, iv;
    1969          40 :         size_t s, s2;
    1970          40 :         const uint8_t *tag;
    1971          40 :         unsigned tag_size;
    1972          40 :         uint8_t *ciphertext;
    1973             : 
    1974          40 :         _gnutls_debug_log("running tests for: %s\n",
    1975             :                                   gnutls_cipher_get_name(cipher));
    1976             : 
    1977         110 :         for (i = 0; i < vectors_size; i++) {
    1978          70 :                 memset(tmp, 0, sizeof(tmp));
    1979          70 :                 key.data = (void *) vectors[i].key;
    1980          70 :                 key.size = vectors[i].key_size;
    1981             : 
    1982          70 :                 iv.data = (void *) vectors[i].iv;
    1983          70 :                 iv.size = vectors[i].iv_size;
    1984          70 :                 tag_size = vectors[i].tag_size;
    1985             : 
    1986          70 :                 if (tag_size > gnutls_cipher_get_tag_size(cipher)) {
    1987           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1988             :                 }
    1989             : #if 0
    1990             :                 if (iv.size != vectors[i].iv_size)
    1991             :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1992             : #endif
    1993          70 :                 ret = gnutls_aead_cipher_init(&hd, cipher, &key);
    1994          70 :                 if (ret < 0) {
    1995           0 :                         _gnutls_debug_log("error initializing: %s\n",
    1996             :                                           gnutls_cipher_get_name(cipher));
    1997           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    1998             :                 }
    1999             : 
    2000          70 :                 s = sizeof(tmp);
    2001             : 
    2002          70 :                 ret =
    2003         140 :                     gnutls_aead_cipher_encrypt(hd,
    2004             :                                            iv.data, iv.size,
    2005          70 :                                            vectors[i].auth, vectors[i].auth_size,
    2006          70 :                                            vectors[i].tag_size,
    2007          70 :                                            vectors[i].plaintext,
    2008          70 :                                            vectors[i].plaintext_size,
    2009             :                                            tmp, &s);
    2010          70 :                 if (ret < 0)
    2011           0 :                         return
    2012           0 :                             gnutls_assert_val
    2013             :                             (GNUTLS_E_SELF_TEST_ERROR);
    2014             : 
    2015          70 :                 if (s != vectors[i].plaintext_size + tag_size) {
    2016           0 :                         return
    2017           0 :                             gnutls_assert_val
    2018             :                             (GNUTLS_E_SELF_TEST_ERROR);
    2019             :                 }
    2020             : 
    2021          70 :                 if (vectors[i].tag_prepended)
    2022             :                         tag = tmp;
    2023             :                 else
    2024          60 :                         tag = tmp+vectors[i].plaintext_size;
    2025             : 
    2026          70 :                 if (memcmp(tag, vectors[i].tag, tag_size) != 0) {
    2027           0 :                         _gnutls_debug_log
    2028             :                             ("%s test vector %d failed (tag)!\n",
    2029             :                              gnutls_cipher_get_name(cipher), i);
    2030           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2031             :                 }
    2032             : 
    2033          70 :                 if (vectors[i].tag_prepended)
    2034          10 :                         ciphertext = tmp+vectors[i].tag_size;
    2035             :                 else
    2036             :                         ciphertext = tmp;
    2037             : 
    2038          70 :                 if (vectors[i].plaintext_size > 0) {
    2039          60 :                         if (memcmp
    2040          60 :                             (ciphertext, vectors[i].ciphertext,
    2041             :                              vectors[i].plaintext_size) != 0) {
    2042           0 :                                 _gnutls_debug_log
    2043             :                                     ("%s test vector %d failed!\n",
    2044             :                                      gnutls_cipher_get_name(cipher), i);
    2045             : 
    2046           0 :                                 return
    2047           0 :                                     gnutls_assert_val
    2048             :                                     (GNUTLS_E_SELF_TEST_ERROR);
    2049             :                         }
    2050             :                 }
    2051             : 
    2052             :                 /* check decryption */
    2053             :                 {
    2054          70 :                         s2 = sizeof(tmp2);
    2055          70 :                         ret =
    2056         140 :                             gnutls_aead_cipher_decrypt(hd,
    2057             :                                                    iv.data, iv.size,
    2058          70 :                                                    vectors[i].auth, vectors[i].auth_size,
    2059          70 :                                                    vectors[i].tag_size,
    2060             :                                                    tmp, s,
    2061             :                                                    tmp2, &s2);
    2062          70 :                         if (ret < 0)
    2063           0 :                                 return
    2064           0 :                                     gnutls_assert_val
    2065             :                                     (GNUTLS_E_SELF_TEST_ERROR);
    2066             : 
    2067          70 :                         if (s2 != vectors[i].plaintext_size && memcmp(tmp, vectors[i].plaintext, vectors[i].plaintext_size) != 0) {
    2068           0 :                                 _gnutls_debug_log("%s test vector %d failed (decryption)!\n",
    2069             :                                         gnutls_cipher_get_name(cipher), i);
    2070           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2071             :                         }
    2072             : 
    2073             :                         /* test tag verification */
    2074          70 :                         if (s > 0) {
    2075          70 :                                 (*ciphertext)++;
    2076             : 
    2077          70 :                                 s2 = sizeof(tmp2);
    2078          70 :                                 ret =
    2079         140 :                                     gnutls_aead_cipher_decrypt(hd,
    2080             :                                                            iv.data, iv.size,
    2081          70 :                                                            vectors[i].auth, vectors[i].auth_size,
    2082          70 :                                                            vectors[i].tag_size,
    2083             :                                                            tmp, s,
    2084             :                                                            tmp2, &s2);
    2085             : 
    2086          70 :                                 if (ret >= 0) {
    2087           0 :                                         _gnutls_debug_log("%s: tag check failed\n", gnutls_cipher_get_name(cipher));
    2088           0 :                                         return
    2089           0 :                                             gnutls_assert_val
    2090             :                                             (GNUTLS_E_SELF_TEST_ERROR);
    2091             :                                 }
    2092             :                         }
    2093             :                 }
    2094             : 
    2095          70 :                 gnutls_aead_cipher_deinit(hd);
    2096             :         }
    2097             : 
    2098          40 :         _gnutls_debug_log
    2099             :             ("%s self check succeeded\n",
    2100             :              gnutls_cipher_get_name(cipher));
    2101             : 
    2102          40 :         return test_cipher_aead_scatter(cipher, vectors, vectors_size, flags);
    2103             : }
    2104             : 
    2105             : 
    2106             : 
    2107             : struct hash_vectors_st {
    2108             :         const uint8_t *plaintext;
    2109             :         unsigned int plaintext_size;
    2110             :         const uint8_t *output;
    2111             :         unsigned int output_size;
    2112             : };
    2113             : 
    2114             : const struct hash_vectors_st md5_vectors[] = {
    2115             :         {
    2116             :          STR(plaintext, plaintext_size, "abcdefghijklmnopqrstuvwxyz"),
    2117             :          STR(output, output_size,
    2118             :              "\xc3\xfc\xd3\xd7\x61\x92\xe4\x00\x7d\xfb\x49\x6c\xca\x67\xe1\x3b"),
    2119             :          },
    2120             : };
    2121             : 
    2122             : const struct hash_vectors_st sha1_vectors[] = {
    2123             :         {
    2124             :          STR(plaintext, plaintext_size, "what do ya want for nothing?"),
    2125             :          STR(output, output_size,
    2126             :              "\x8f\x82\x03\x94\xf9\x53\x35\x18\x20\x45\xda\x24\xf3\x4d\xe5\x2b\xf8\xbc\x34\x32"),
    2127             :          },
    2128             :         {
    2129             :          STR(plaintext, plaintext_size,
    2130             :              "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"),
    2131             :          STR(output, output_size,
    2132             :              "\xbe\xae\xd1\x6d\x65\x8e\xc7\x92\x9e\xdf\xd6\x2b\xfa\xfe\xac\x29\x9f\x0d\x74\x4d"),
    2133             :          },
    2134             : };
    2135             : 
    2136             : const struct hash_vectors_st sha224_vectors[] = {
    2137             :         {
    2138             :          STR(plaintext, plaintext_size,
    2139             :              "The quick brown fox jumps over the lazy dog"),
    2140             :          STR(output, output_size,
    2141             :              "\x73\x0e\x10\x9b\xd7\xa8\xa3\x2b\x1c\xb9\xd9\xa0\x9a\xa2\x32\x5d\x24\x30\x58\x7d\xdb\xc0\xc3\x8b\xad\x91\x15\x25"),
    2142             :          },
    2143             : };
    2144             : 
    2145             : const struct hash_vectors_st sha256_vectors[] = {
    2146             :         {
    2147             :          STR(plaintext, plaintext_size,
    2148             :              "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"),
    2149             :          STR(output, output_size,
    2150             :              "\x24\x8d\x6a\x61\xd2\x06\x38\xb8\xe5\xc0\x26\x93\x0c\x3e\x60\x39\xa3\x3c\xe4\x59\x64\xff\x21\x67\xf6\xec\xed\xd4\x19\xdb\x06\xc1"),
    2151             :          },
    2152             :         {
    2153             :          STR(plaintext, plaintext_size,
    2154             :              "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"),
    2155             :          STR(output, output_size,
    2156             :              "\x50\xea\x82\x5d\x96\x84\xf4\x22\x9c\xa2\x9f\x1f\xec\x51\x15\x93\xe2\x81\xe4\x6a\x14\x0d\x81\xe0\x00\x5f\x8f\x68\x86\x69\xa0\x6c"),
    2157             :          },
    2158             : };
    2159             : 
    2160             : const struct hash_vectors_st sha384_vectors[] = {
    2161             :         {
    2162             :          STR(plaintext, plaintext_size,
    2163             :              "The quick brown fox jumps over the lazy dog"),
    2164             :          STR(output, output_size,
    2165             :              "\xca\x73\x7f\x10\x14\xa4\x8f\x4c\x0b\x6d\xd4\x3c\xb1\x77\xb0\xaf\xd9\xe5\x16\x93\x67\x54\x4c\x49\x40\x11\xe3\x31\x7d\xbf\x9a\x50\x9c\xb1\xe5\xdc\x1e\x85\xa9\x41\xbb\xee\x3d\x7f\x2a\xfb\xc9\xb1"),
    2166             :          },
    2167             : };
    2168             : 
    2169             : const struct hash_vectors_st sha512_vectors[] = {
    2170             :         {
    2171             :          STR(plaintext, plaintext_size,
    2172             :              "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu"),
    2173             :          STR(output, output_size,
    2174             :              "\x8e\x95\x9b\x75\xda\xe3\x13\xda\x8c\xf4\xf7\x28\x14\xfc\x14\x3f\x8f\x77\x79\xc6\xeb\x9f\x7f\xa1\x72\x99\xae\xad\xb6\x88\x90\x18\x50\x1d\x28\x9e\x49\x00\xf7\xe4\x33\x1b\x99\xde\xc4\xb5\x43\x3a\xc7\xd3\x29\xee\xb6\xdd\x26\x54\x5e\x96\xe5\x5b\x87\x4b\xe9\x09"),
    2175             :          },
    2176             : };
    2177             : 
    2178             : const struct hash_vectors_st sha3_224_vectors[] = {
    2179             :         {
    2180             :          STR(plaintext, plaintext_size,
    2181             :              "\xC1\xEC\xFD\xFC"),
    2182             :          STR(output, output_size,
    2183             :              "\xA3\x3C\x58\xDF\x8A\x80\x26\xF0\xF9\x59\x19\x66\xBD\x6D\x00\xEE\xD3\xB1\xE8\x29\x58\x0A\xB9\xBE\x26\x8C\xAF\x39"),
    2184             :          },
    2185             : };
    2186             : 
    2187             : const struct hash_vectors_st sha3_256_vectors[] = {
    2188             :         {
    2189             :          STR(plaintext, plaintext_size,
    2190             :              "\xC1\xEC\xFD\xFC"),
    2191             :          STR(output, output_size,
    2192             :              "\xC5\x85\x9B\xE8\x25\x60\xCC\x87\x89\x13\x3F\x7C\x83\x4A\x6E\xE6\x28\xE3\x51\xE5\x04\xE6\x01\xE8\x05\x9A\x06\x67\xFF\x62\xC1\x24"),
    2193             :          }
    2194             : };
    2195             : 
    2196             : const struct hash_vectors_st sha3_384_vectors[] = {
    2197             :         {
    2198             :          STR(plaintext, plaintext_size,
    2199             :              "\x4A\x4F\x20\x24\x84\x51\x25\x26"),
    2200             :          STR(output, output_size,
    2201             :              "\x89\xDB\xF4\xC3\x9B\x8F\xB4\x6F\xDF\x0A\x69\x26\xCE\xC0\x35\x5A\x4B\xDB\xF9\xC6\xA4\x46\xE1\x40\xB7\xC8\xBD\x08\xFF\x6F\x48\x9F\x20\x5D\xAF\x8E\xFF\xE1\x60\xF4\x37\xF6\x74\x91\xEF\x89\x7C\x23"),
    2202             :          },
    2203             : };
    2204             : 
    2205             : const struct hash_vectors_st sha3_512_vectors[] = {
    2206             :         {
    2207             :          STR(plaintext, plaintext_size,
    2208             :              "\x82\xE1\x92\xE4\x04\x3D\xDC\xD1\x2E\xCF\x52\x96\x9D\x0F\x80\x7E\xED"),
    2209             :          STR(output, output_size,
    2210             :              "\x96\x44\xE3\xC9\x0B\x67\xE2\x21\x24\xE9\x6D\xFE\xDC\xE5\x3D\x33\xC4\x60\xF1\x32\x86\x8F\x09\x75\xD1\x8B\x22\xCF\xD5\x9F\x63\x7D\xD8\x5A\xA4\x05\xE3\x98\x08\xA4\x55\x70\xA4\x98\xC0\xB8\xF2\xCB\xA5\x9F\x8E\x14\x37\xEA\xEF\x89\xF2\x0B\x88\x29\x8A\xDF\xA2\xDE"),
    2211             :          },
    2212             : };
    2213             : 
    2214             : const struct hash_vectors_st gostr_94_vectors[] = {
    2215             :         {
    2216             :          STR(plaintext, plaintext_size,
    2217             :              "The quick brown fox jumps over the lazy dog"),
    2218             :          STR(output, output_size,
    2219             :              "\x90\x04\x29\x4a\x36\x1a\x50\x8c\x58\x6f\xe5\x3d\x1f\x1b\x02\x74\x67\x65\xe7\x1b\x76\x54\x72\x78\x6e\x47\x70\xd5\x65\x83\x0a\x76"),
    2220             :         },
    2221             : };
    2222             : 
    2223             : /* GOST R 34.11-2012 */
    2224             : const struct hash_vectors_st streebog_512_vectors[] = {
    2225             :         {
    2226             :             STR(plaintext, plaintext_size,
    2227             :                 "\xd1\xe5\x20\xe2\xe5\xf2\xf0\xe8\x2c\x20\xd1\xf2\xf0\xe8\xe1\xee"
    2228             :                 "\xe6\xe8\x20\xe2\xed\xf3\xf6\xe8\x2c\x20\xe2\xe5\xfe\xf2\xfa\x20"
    2229             :                 "\xf1\x20\xec\xee\xf0\xff\x20\xf1\xf2\xf0\xe5\xeb\xe0\xec\xe8\x20"
    2230             :                 "\xed\xe0\x20\xf5\xf0\xe0\xe1\xf0\xfb\xff\x20\xef\xeb\xfa\xea\xfb"
    2231             :                 "\x20\xc8\xe3\xee\xf0\xe5\xe2\xfb"),
    2232             :             STR(output, output_size,
    2233             :                 "\x1e\x88\xe6\x22\x26\xbf\xca\x6f\x99\x94\xf1\xf2\xd5\x15\x69\xe0"
    2234             :                 "\xda\xf8\x47\x5a\x3b\x0f\xe6\x1a\x53\x00\xee\xe4\x6d\x96\x13\x76"
    2235             :                 "\x03\x5f\xe8\x35\x49\xad\xa2\xb8\x62\x0f\xcd\x7c\x49\x6c\xe5\xb3"
    2236             :                 "\x3f\x0c\xb9\xdd\xdc\x2b\x64\x60\x14\x3b\x03\xda\xba\xc9\xfb\x28"),
    2237             :         },
    2238             :         {
    2239             :             STR(plaintext, plaintext_size,
    2240             :                 "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
    2241             :                 "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
    2242             :                 "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
    2243             :                 "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
    2244             :                 "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
    2245             :                 "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
    2246             :                 "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
    2247             :                 "\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"),
    2248             :             STR(output, output_size,
    2249             :                 "\x90\xa1\x61\xd1\x2a\xd3\x09\x49\x8d\x3f\xe5\xd4\x82\x02\xd8\xa4"
    2250             :                 "\xe9\xc4\x06\xd6\xa2\x64\xae\xab\x25\x8a\xc5\xec\xc3\x7a\x79\x62"
    2251             :                 "\xaa\xf9\x58\x7a\x5a\xbb\x09\xb6\xbb\x81\xec\x4b\x37\x52\xa3\xff"
    2252             :                 "\x5a\x83\x8e\xf1\x75\xbe\x57\x72\x05\x6b\xc5\xfe\x54\xfc\xfc\x7e"),
    2253             :         },
    2254             : };
    2255             : 
    2256             : /* GOST R 34.11-2012 */
    2257             : const struct hash_vectors_st streebog_256_vectors[] = {
    2258             :         {
    2259             :             STR(plaintext, plaintext_size,
    2260             :                 "\xd1\xe5\x20\xe2\xe5\xf2\xf0\xe8\x2c\x20\xd1\xf2\xf0\xe8\xe1\xee"
    2261             :                 "\xe6\xe8\x20\xe2\xed\xf3\xf6\xe8\x2c\x20\xe2\xe5\xfe\xf2\xfa\x20"
    2262             :                 "\xf1\x20\xec\xee\xf0\xff\x20\xf1\xf2\xf0\xe5\xeb\xe0\xec\xe8\x20"
    2263             :                 "\xed\xe0\x20\xf5\xf0\xe0\xe1\xf0\xfb\xff\x20\xef\xeb\xfa\xea\xfb"
    2264             :                 "\x20\xc8\xe3\xee\xf0\xe5\xe2\xfb"),
    2265             :             STR(output, output_size,
    2266             :                 "\x9d\xd2\xfe\x4e\x90\x40\x9e\x5d\xa8\x7f\x53\x97\x6d\x74\x05\xb0"
    2267             :                 "\xc0\xca\xc6\x28\xfc\x66\x9a\x74\x1d\x50\x06\x3c\x55\x7e\x8f\x50"),
    2268             :         },
    2269             : };
    2270             : 
    2271             : #define HASH_DATA_SIZE 64
    2272             : 
    2273             : /* SHA1 and other hashes */
    2274          28 : static int test_digest(gnutls_digest_algorithm_t dig,
    2275             :                        const struct hash_vectors_st *vectors,
    2276             :                        size_t vectors_size, unsigned flags)
    2277             : {
    2278          28 :         uint8_t data[HASH_DATA_SIZE];
    2279          28 :         unsigned int i;
    2280          28 :         int ret;
    2281          28 :         size_t data_size;
    2282          28 :         gnutls_hash_hd_t hd;
    2283          28 :         gnutls_hash_hd_t copy;
    2284             : 
    2285          28 :         if (_gnutls_digest_exists(dig) == 0)
    2286             :                 return 0;
    2287             : 
    2288          64 :         for (i = 0; i < vectors_size; i++) {
    2289          36 :                 ret = gnutls_hash_init(&hd, dig);
    2290          36 :                 if (ret < 0) {
    2291           0 :                         _gnutls_debug_log("error initializing: %s\n",
    2292             :                                           gnutls_digest_get_name(dig));
    2293           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2294             :                 }
    2295             : 
    2296          36 :                 ret = gnutls_hash(hd, vectors[i].plaintext, 1);
    2297          36 :                 if (ret < 0)
    2298           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2299             : 
    2300          36 :                 copy = gnutls_hash_copy(hd);
    2301             :                 /* Returning NULL is not an error here for the time being, but
    2302             :                  * it might become one later */
    2303          36 :                 if (!copy && secure_getenv("GNUTLS_TEST_SUITE_RUN"))
    2304           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2305             : 
    2306          72 :                 ret = gnutls_hash(hd,
    2307          36 :                                   &vectors[i].plaintext[1],
    2308          36 :                                   vectors[i].plaintext_size - 1);
    2309          36 :                 if (ret < 0)
    2310           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2311             : 
    2312          36 :                 gnutls_hash_deinit(hd, data);
    2313             : 
    2314          36 :                 data_size = gnutls_hash_get_len(dig);
    2315          36 :                 if (data_size <= 0)
    2316           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2317             : 
    2318          36 :                 if (data_size != vectors[i].output_size ||
    2319          36 :                     memcmp(data, vectors[i].output,
    2320             :                            vectors[i].output_size) != 0) {
    2321           0 :                         _gnutls_debug_log("%s test vector %d failed!\n",
    2322             :                                           gnutls_digest_get_name(dig), i);
    2323           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2324             :                 }
    2325             : 
    2326          36 :                 if (copy != NULL) {
    2327          64 :                         ret = gnutls_hash(copy,
    2328          32 :                                           &vectors[i].plaintext[1],
    2329          32 :                                           vectors[i].plaintext_size - 1);
    2330          32 :                         if (ret < 0)
    2331           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2332             : 
    2333          32 :                         memset(data, 0xaa, data_size);
    2334          32 :                         gnutls_hash_deinit(copy, data);
    2335             : 
    2336          32 :                         if (memcmp(data, vectors[i].output,
    2337          32 :                             vectors[i].output_size) != 0) {
    2338           0 :                                 _gnutls_debug_log("%s copy test vector %d failed!\n",
    2339             :                                                   gnutls_digest_get_name(dig), i);
    2340           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2341             :                         }
    2342             :                 }
    2343             :         }
    2344             : 
    2345          28 :         _gnutls_debug_log("%s self check succeeded\n",
    2346             :                           gnutls_digest_get_name(dig));
    2347             : 
    2348             :         return 0;
    2349             : }
    2350             : 
    2351             : 
    2352             : struct mac_vectors_st {
    2353             :         const uint8_t *key;
    2354             :         unsigned int key_size;
    2355             :         const uint8_t *nonce;
    2356             :         unsigned int nonce_size;
    2357             :         const uint8_t *plaintext;
    2358             :         unsigned int plaintext_size;
    2359             :         const uint8_t *output;
    2360             :         unsigned int output_size;
    2361             : };
    2362             : 
    2363             : const struct mac_vectors_st hmac_md5_vectors[] = {
    2364             :         {
    2365             :          STR(key, key_size, "Jefe"),
    2366             :          STR(plaintext, plaintext_size, "what do ya want for nothing?"),
    2367             :          STR(output, output_size,
    2368             :              "\x75\x0c\x78\x3e\x6a\xb0\xb5\x03\xea\xa8\x6e\x31\x0a\x5d\xb7\x38"),
    2369             :          },
    2370             : };
    2371             : 
    2372             : const struct mac_vectors_st hmac_sha1_vectors[] = {
    2373             :         {
    2374             :          STR(key, key_size,
    2375             :              "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
    2376             :          STR(plaintext, plaintext_size, "Hi There"),
    2377             :          STR(output, output_size,
    2378             :              "\x67\x5b\x0b\x3a\x1b\x4d\xdf\x4e\x12\x48\x72\xda\x6c\x2f\x63\x2b\xfe\xd9\x57\xe9"),
    2379             :          },
    2380             : };
    2381             : 
    2382             :             /* from rfc4231 */
    2383             : const struct mac_vectors_st hmac_sha224_vectors[] = {
    2384             :         {
    2385             :          STR(key, key_size,
    2386             :              "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
    2387             :          STR(plaintext, plaintext_size, "Hi There"),
    2388             :          STR(output, output_size,
    2389             :              "\x89\x6f\xb1\x12\x8a\xbb\xdf\x19\x68\x32\x10\x7c\xd4\x9d\xf3\x3f\x47\xb4\xb1\x16\x99\x12\xba\x4f\x53\x68\x4b\x22"),
    2390             :          },
    2391             : };
    2392             : 
    2393             : const struct mac_vectors_st hmac_sha256_vectors[] = {
    2394             :         {
    2395             :          STR(key, key_size,
    2396             :              "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
    2397             :          STR(plaintext, plaintext_size, "Hi There"),
    2398             :          STR(output, output_size,
    2399             :              "\xb0\x34\x4c\x61\xd8\xdb\x38\x53\x5c\xa8\xaf\xce\xaf\x0b\xf1\x2b\x88\x1d\xc2\x00\xc9\x83\x3d\xa7\x26\xe9\x37\x6c\x2e\x32\xcf\xf7"),
    2400             :          },
    2401             : };
    2402             : 
    2403             : const struct mac_vectors_st hmac_sha384_vectors[] = {
    2404             :         {
    2405             :          STR(key, key_size,
    2406             :              "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
    2407             :          STR(plaintext, plaintext_size, "Hi There"),
    2408             :          STR(output, output_size,
    2409             :              "\xaf\xd0\x39\x44\xd8\x48\x95\x62\x6b\x08\x25\xf4\xab\x46\x90\x7f\x15\xf9\xda\xdb\xe4\x10\x1e\xc6\x82\xaa\x03\x4c\x7c\xeb\xc5\x9c\xfa\xea\x9e\xa9\x07\x6e\xde\x7f\x4a\xf1\x52\xe8\xb2\xfa\x9c\xb6"),
    2410             :          },
    2411             : };
    2412             : 
    2413             : const struct mac_vectors_st hmac_sha512_vectors[] = {
    2414             :         {
    2415             :          STR(key, key_size,
    2416             :              "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
    2417             :          STR(plaintext, plaintext_size, "Hi There"),
    2418             :          STR(output, output_size,
    2419             :              "\x87\xaa\x7c\xde\xa5\xef\x61\x9d\x4f\xf0\xb4\x24\x1a\x1d\x6c\xb0\x23\x79\xf4\xe2\xce\x4e\xc2\x78\x7a\xd0\xb3\x05\x45\xe1\x7c\xde\xda\xa8\x33\xb7\xd6\xb8\xa7\x02\x03\x8b\x27\x4e\xae\xa3\xf4\xe4\xbe\x9d\x91\x4e\xeb\x61\xf1\x70\x2e\x69\x6c\x20\x3a\x12\x68\x54"),
    2420             :          },
    2421             : };
    2422             : 
    2423             : /* Calculated */
    2424             : const struct mac_vectors_st hmac_gostr_94_vectors[] = {
    2425             :         {
    2426             :          STR(key, key_size,
    2427             :              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
    2428             :              "\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f"),
    2429             :          STR(plaintext, plaintext_size,
    2430             :              "\x01\x26\xbd\xb8\x78\x00\xaf\x21\x43\x41\x45\x65\x63\x78\x01\x00"),
    2431             :          STR(output, output_size,
    2432             :              "\xba\xd7\x0b\x61\xc4\x10\x95\xbc\x47\xe1\x14\x1c\xfa\xed\x42\x72"
    2433             :              "\x6a\x5c\xee\xbd\x62\xce\x75\xdb\xbb\x9a\xd7\x6c\xda\x9f\x72\xf7"),
    2434             :         },
    2435             : };
    2436             : 
    2437             : /* RFC 7836 */
    2438             : const struct mac_vectors_st hmac_streebog_512_vectors[] = {
    2439             :         {
    2440             :          STR(key, key_size,
    2441             :              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
    2442             :              "\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f"),
    2443             :          STR(plaintext, plaintext_size,
    2444             :              "\x01\x26\xbd\xb8\x78\x00\xaf\x21\x43\x41\x45\x65\x63\x78\x01\x00"),
    2445             :          STR(output, output_size,
    2446             :              "\xa5\x9b\xab\x22\xec\xae\x19\xc6\x5f\xbd\xe6\xe5\xf4\xe9\xf5\xd8"
    2447             :              "\x54\x9d\x31\xf0\x37\xf9\xdf\x9b\x90\x55\x00\xe1\x71\x92\x3a\x77"
    2448             :              "\x3d\x5f\x15\x30\xf2\xed\x7e\x96\x4c\xb2\xee\xdc\x29\xe9\xad\x2f"
    2449             :              "\x3a\xfe\x93\xb2\x81\x4f\x79\xf5\x00\x0f\xfc\x03\x66\xc2\x51\xe6"),
    2450             :         },
    2451             : };
    2452             : 
    2453             : /* RFC 7836 */
    2454             : const struct mac_vectors_st hmac_streebog_256_vectors[] = {
    2455             :         {
    2456             :          STR(key, key_size,
    2457             :              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
    2458             :              "\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f"),
    2459             :          STR(plaintext, plaintext_size,
    2460             :              "\x01\x26\xbd\xb8\x78\x00\xaf\x21\x43\x41\x45\x65\x63\x78\x01\x00"),
    2461             :          STR(output, output_size,
    2462             :              "\xa1\xaa\x5f\x7d\xe4\x02\xd7\xb3\xd3\x23\xf2\x99\x1c\x8d\x45\x34"
    2463             :              "\x01\x31\x37\x01\x0a\x83\x75\x4f\xd0\xaf\x6d\x7c\xd4\x92\x2e\xd9"),
    2464             :         },
    2465             : };
    2466             : 
    2467             : const struct mac_vectors_st aes_cmac_128_vectors[] = { /* NIST SP800-38A */
    2468             :         {
    2469             :          STR(key, key_size,
    2470             :              "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c"),
    2471             :          STR(plaintext, plaintext_size,
    2472             :              "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"),
    2473             :          STR(output, output_size,
    2474             :              "\x07\x0a\x16\xb4\x6b\x4d\x41\x44\xf7\x9b\xdd\x9d\xd0\x4a\x28\x7c"),
    2475             :          },
    2476             : };
    2477             : 
    2478             : const struct mac_vectors_st aes_cmac_256_vectors[] = { /* NIST SP800-38A */
    2479             :         {
    2480             :          STR(key, key_size,
    2481             :              "\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81"
    2482             :              "\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4"),
    2483             :          STR(plaintext, plaintext_size,
    2484             :              "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"),
    2485             :          STR(output, output_size,
    2486             :              "\x28\xa7\x02\x3f\x45\x2e\x8f\x82\xbd\x4b\xf2\x8d\x8c\x37\xc3\x5c"),
    2487             :          },
    2488             : };
    2489             : 
    2490             : const struct mac_vectors_st aes_gmac_128_vectors[] = { /* NIST test vectors */
    2491             :         {
    2492             :          STR(key, key_size,
    2493             :              "\x23\x70\xe3\x20\xd4\x34\x42\x08\xe0\xff\x56\x83\xf2\x43\xb2\x13"),
    2494             :          STR(nonce, nonce_size,
    2495             :              "\x04\xdb\xb8\x2f\x04\x4d\x30\x83\x1c\x44\x12\x28"),
    2496             :          STR(plaintext, plaintext_size,
    2497             :              "\xd4\x3a\x8e\x50\x89\xee\xa0\xd0\x26\xc0\x3a\x85\x17\x8b\x27\xda"),
    2498             :          STR(output, output_size,
    2499             :              "\x2a\x04\x9c\x04\x9d\x25\xaa\x95\x96\x9b\x45\x1d\x93\xc3\x1c\x6e"),
    2500             :         },
    2501             : };
    2502             : 
    2503             : const struct mac_vectors_st aes_gmac_192_vectors[] = { /* NIST test vectors */
    2504             :         {
    2505             :          STR(key, key_size,
    2506             :              "\xaa\x92\x1c\xb5\xa2\x43\xab\x08\x91\x1f\x32\x89\x26\x6b\x39\xda"
    2507             :              "\xb1\x33\xf5\xc4\x20\xa6\xc5\xcd"),
    2508             :          STR(nonce, nonce_size,
    2509             :              "\x8f\x73\xdb\x68\xda\xee\xed\x2d\x15\x5f\xb1\xa0"),
    2510             :          STR(plaintext, plaintext_size,
    2511             :              "\x48\x74\x43\xc7\xc1\x4c\xe4\x74\xcb\x3d\x29\x1f\x25\x70\x70\xa2"),
    2512             :          STR(output, output_size,
    2513             :              "\xb1\x26\x74\xfb\xea\xc6\x88\x9a\x24\x94\x8f\x27\x92\xe3\x0a\x50"),
    2514             :         },
    2515             : };
    2516             : 
    2517             : const struct mac_vectors_st aes_gmac_256_vectors[] = { /* NIST test vectors */
    2518             :         {
    2519             :          STR(key, key_size,
    2520             :              "\x6d\xfd\xaf\xd6\x70\x3c\x28\x5c\x01\xf1\x4f\xd1\x0a\x60\x12\x86"
    2521             :              "\x2b\x2a\xf9\x50\xd4\x73\x3a\xbb\x40\x3b\x2e\x74\x5b\x26\x94\x5d"),
    2522             :          STR(nonce, nonce_size,
    2523             :              "\x37\x49\xd0\xb3\xd5\xba\xcb\x71\xbe\x06\xad\xe6"),
    2524             :          STR(plaintext, plaintext_size,
    2525             :              "\xc0\xd2\x49\x87\x19\x92\xe7\x03\x02\xae\x00\x81\x93\xd1\xe8\x9f"),
    2526             :          STR(output, output_size,
    2527             :              "\x4a\xa4\xcc\x69\xf8\x4e\xe6\xac\x16\xd9\xbf\xb4\xe0\x5d\xe5\x00"),
    2528             :         },
    2529             : };
    2530             : 
    2531             : const struct mac_vectors_st gost28147_tc26z_imit_vectors[] = {
    2532             :         {
    2533             :                 STR(key, key_size,
    2534             :                     "\x9d\x05\xb7\x9e\x90\xca\xd0\x0a\x2c\xda\xd2\x2e\xf4\xe8\x6f\x5c"
    2535             :                     "\xf5\xdc\x37\x68\x19\x85\xb3\xbf\xaa\x18\xc1\xc3\x05\x0a\x91\xa2"),
    2536             :                 STR(plaintext, plaintext_size,
    2537             :                     "\xb5\xa1\xf0\xe3\xce\x2f\x02\x1d\x67\x61\x94\x34\x5c\x41\xe3\x6e"),
    2538             :                 STR(output, output_size,
    2539             :                     "\x03\xe5\x67\x66"),
    2540             :         },
    2541             : };
    2542             : 
    2543             : /* GOST R 34.13-2015 */
    2544             : const struct mac_vectors_st magma_omac_vectors[] = {
    2545             :         {
    2546             :         STR(key, key_size,
    2547             :             "\xff\xee\xdd\xcc\xbb\xaa\x99\x88\x77\x66\x55\x44\x33\x22\x11\x00"
    2548             :             "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff"),
    2549             :         STR(plaintext, plaintext_size,
    2550             :             "\x92\xde\xf0\x6b\x3c\x13\x0a\x59"
    2551             :             "\xdb\x54\xc7\x04\xf8\x18\x9d\x20"
    2552             :             "\x4a\x98\xfb\x2e\x67\xa8\x02\x4c"
    2553             :             "\x89\x12\x40\x9b\x17\xb5\x7e\x41"),
    2554             :         STR(output, output_size,
    2555             :             "\x15\x4e\x72\x10\x20\x30\xc5\xbb"),
    2556             :         },
    2557             : };
    2558             : 
    2559             : /* GOST R 34.13-2015 */
    2560             : const struct mac_vectors_st kuznyechik_omac_vectors[] = {
    2561             :         {
    2562             :         STR(key, key_size,
    2563             :             "\x88\x99\xaa\xbb\xcc\xdd\xee\xff\x00\x11\x22\x33\x44\x55\x66\x77"
    2564             :             "\xfe\xdc\xba\x98\x76\x54\x32\x10\x01\x23\x45\x67\x89\xab\xcd\xef"),
    2565             :         STR(plaintext, plaintext_size,
    2566             :             "\x11\x22\x33\x44\x55\x66\x77\x00\xff\xee\xdd\xcc\xbb\xaa\x99\x88"
    2567             :             "\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a"
    2568             :             "\x11\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00"
    2569             :             "\x22\x33\x44\x55\x66\x77\x88\x99\xaa\xbb\xcc\xee\xff\x0a\x00\x11"),
    2570             :         STR(output, output_size,
    2571             :             "\x33\x6f\x4d\x29\x60\x59\xfb\xe3\x4d\xde\xb3\x5b\x37\x74\x9c\x67"),
    2572             :         },
    2573             : };
    2574             : 
    2575          36 : static int test_mac(gnutls_mac_algorithm_t mac,
    2576             :                     const struct mac_vectors_st *vectors,
    2577             :                     size_t vectors_size, unsigned flags)
    2578             : {
    2579          36 :         uint8_t data[HASH_DATA_SIZE];
    2580          36 :         unsigned int i;
    2581          36 :         int ret;
    2582          36 :         size_t data_size;
    2583          36 :         gnutls_hmac_hd_t hd;
    2584          36 :         gnutls_hmac_hd_t copy;
    2585             : 
    2586          72 :         for (i = 0; i < vectors_size; i++) {
    2587          72 :                 ret = gnutls_hmac_init(&hd,
    2588          36 :                                        mac, vectors[i].key,
    2589          36 :                                        vectors[i].key_size);
    2590             : 
    2591          36 :                 if (ret < 0) {
    2592           0 :                         _gnutls_debug_log("error initializing: MAC-%s\n",
    2593             :                                           gnutls_mac_get_name(mac));
    2594           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2595             :                 }
    2596             : 
    2597          36 :                 if (vectors[i].nonce_size)
    2598           6 :                         gnutls_hmac_set_nonce(hd,
    2599           6 :                                               vectors[i].nonce,
    2600             :                                               vectors[i].nonce_size);
    2601             : 
    2602          36 :                 ret = gnutls_hmac(hd, vectors[i].plaintext, 1);
    2603          36 :                 if (ret < 0)
    2604           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2605             : 
    2606          36 :                 copy = gnutls_hmac_copy(hd);
    2607             :                 /* Returning NULL is not an error here for the time being, but
    2608             :                  * it might become one later */
    2609          36 :                 if (!copy && secure_getenv("GNUTLS_TEST_SUITE_RUN"))
    2610           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2611             : 
    2612          72 :                 ret = gnutls_hmac(hd,
    2613          36 :                                   &vectors[i].plaintext[1],
    2614          36 :                                   vectors[i].plaintext_size - 1);
    2615          36 :                 if (ret < 0)
    2616           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2617             : 
    2618          36 :                 gnutls_hmac_deinit(hd, data);
    2619             : 
    2620          36 :                 data_size = gnutls_hmac_get_len(mac);
    2621          36 :                 if (data_size <= 0)
    2622           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2623             : 
    2624          36 :                 if (data_size != vectors[i].output_size ||
    2625          36 :                     memcmp(data, vectors[i].output,
    2626             :                            vectors[i].output_size) != 0) {
    2627             : 
    2628           0 :                         _gnutls_debug_log
    2629             :                             ("MAC-%s test vector %d failed!\n",
    2630             :                              gnutls_mac_get_name(mac), i);
    2631             : 
    2632           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2633             :                 }
    2634             : 
    2635          36 :                 if (copy != NULL) {
    2636          68 :                         ret = gnutls_hmac(copy,
    2637          34 :                                           &vectors[i].plaintext[1],
    2638          34 :                                           vectors[i].plaintext_size - 1);
    2639          34 :                         if (ret < 0)
    2640           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2641             : 
    2642          34 :                         memset(data, 0xaa, data_size);
    2643          34 :                         gnutls_hmac_deinit(copy, data);
    2644             : 
    2645          34 :                         if (memcmp(data, vectors[i].output,
    2646          34 :                             vectors[i].output_size) != 0) {
    2647           0 :                                 _gnutls_debug_log
    2648             :                                         ("MAC-%s copy test vector %d failed!\n",
    2649             :                                          gnutls_mac_get_name(mac), i);
    2650           0 :                                 return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    2651             :                         }
    2652             :                 }
    2653             :         }
    2654             : 
    2655          36 :         _gnutls_debug_log
    2656             :             ("MAC-%s self check succeeded\n",
    2657             :              gnutls_mac_get_name(mac));
    2658             : 
    2659             :         return 0;
    2660             : }
    2661             : 
    2662             : #define CASE(x, func, vectors) case x: \
    2663             :                         ret = func(x, V(vectors), flags); \
    2664             :                         if (!(flags & GNUTLS_SELF_TEST_FLAG_ALL) || ret < 0) \
    2665             :                                 return ret
    2666             : 
    2667             : #define CASE2(x, func, func2, vectors) case x:    \
    2668             :                         ret = func(x, V(vectors), flags); \
    2669             :                         if (!(flags & GNUTLS_SELF_TEST_FLAG_ALL) || ret < 0) \
    2670             :                                 return ret; \
    2671             :                         ret = func2(x, V(vectors), flags); \
    2672             :                         if (!(flags & GNUTLS_SELF_TEST_FLAG_ALL) || ret < 0) \
    2673             :                                 return ret
    2674             : 
    2675             : #define NON_FIPS_CASE(x, func, vectors) case x: \
    2676             :                         if (_gnutls_fips_mode_enabled() == 0) { \
    2677             :                                 ret = func(x, V(vectors), flags); \
    2678             :                                 if (!(flags & GNUTLS_SELF_TEST_FLAG_ALL) || ret < 0) \
    2679             :                                         return ret; \
    2680             :                         }
    2681             : 
    2682             : /*-
    2683             :  * gnutls_cipher_self_test:
    2684             :  * @flags: GNUTLS_SELF_TEST_FLAG flags
    2685             :  * @cipher: the encryption algorithm to use
    2686             :  *
    2687             :  * This function will run self tests on the provided cipher or all
    2688             :  * available ciphers if @flags is %GNUTLS_SELF_TEST_FLAG_ALL.
    2689             :  *
    2690             :  * Returns: Zero or a negative error code on error.
    2691             :  *
    2692             :  * Since: 3.3.0-FIPS140
    2693             :  -*/
    2694           5 : int gnutls_cipher_self_test(unsigned flags, gnutls_cipher_algorithm_t cipher)
    2695             : {
    2696           5 :         int ret;
    2697             : 
    2698           5 :         if (flags & GNUTLS_SELF_TEST_FLAG_ALL)
    2699             :                 cipher = GNUTLS_CIPHER_UNKNOWN;
    2700             : 
    2701           0 :         switch (cipher) {
    2702           5 :         case GNUTLS_CIPHER_UNKNOWN:
    2703           5 :                 CASE(GNUTLS_CIPHER_AES_128_CCM, test_cipher_aead,
    2704             :                      aes128_ccm_vectors);
    2705           5 :                 FALLTHROUGH;
    2706           5 :                 CASE(GNUTLS_CIPHER_AES_256_CCM, test_cipher_aead,
    2707             :                      aes256_ccm_vectors);
    2708           5 :                 FALLTHROUGH;
    2709           5 :                 CASE(GNUTLS_CIPHER_AES_128_CBC, test_cipher,
    2710             :                      aes128_cbc_vectors);
    2711           5 :                 FALLTHROUGH;
    2712           5 :                 CASE(GNUTLS_CIPHER_AES_192_CBC, test_cipher,
    2713             :                      aes192_cbc_vectors);
    2714           5 :                 FALLTHROUGH;
    2715           5 :                 CASE(GNUTLS_CIPHER_AES_256_CBC, test_cipher,
    2716             :                      aes256_cbc_vectors);
    2717           5 :                 FALLTHROUGH;
    2718           5 :                 CASE(GNUTLS_CIPHER_3DES_CBC, test_cipher,
    2719             :                      tdes_cbc_vectors);
    2720           5 :                 FALLTHROUGH;
    2721           5 :                 NON_FIPS_CASE(GNUTLS_CIPHER_ARCFOUR_128, test_cipher,
    2722           5 :                      arcfour_vectors);
    2723           5 :                 FALLTHROUGH;
    2724           5 :                 CASE(GNUTLS_CIPHER_AES_128_GCM, test_cipher_aead,
    2725             :                      aes128_gcm_vectors);
    2726           5 :                 FALLTHROUGH;
    2727           5 :                 CASE(GNUTLS_CIPHER_AES_192_GCM, test_cipher_aead,
    2728             :                      aes192_gcm_vectors);
    2729           5 :                 FALLTHROUGH;
    2730           5 :                 CASE(GNUTLS_CIPHER_AES_256_GCM, test_cipher_aead,
    2731             :                      aes256_gcm_vectors);
    2732           5 :                 FALLTHROUGH;
    2733           5 :                 NON_FIPS_CASE(GNUTLS_CIPHER_CHACHA20_POLY1305, test_cipher_aead,
    2734           5 :                      chacha_poly1305_vectors);
    2735           5 :                 FALLTHROUGH;
    2736           5 :                 CASE2(GNUTLS_CIPHER_AES_128_CFB8, test_cipher,
    2737             :                       test_cipher_all_block_sizes,
    2738             :                       aes128_cfb8_vectors);
    2739           5 :                 FALLTHROUGH;
    2740           5 :                 CASE2(GNUTLS_CIPHER_AES_192_CFB8, test_cipher,
    2741             :                       test_cipher_all_block_sizes,
    2742             :                       aes192_cfb8_vectors);
    2743           5 :                 FALLTHROUGH;
    2744           5 :                 CASE2(GNUTLS_CIPHER_AES_256_CFB8, test_cipher,
    2745             :                       test_cipher_all_block_sizes,
    2746             :                       aes256_cfb8_vectors);
    2747           5 :                 FALLTHROUGH;
    2748           5 :                 CASE(GNUTLS_CIPHER_AES_128_XTS, test_cipher,
    2749             :                      aes128_xts_vectors);
    2750           5 :                 FALLTHROUGH;
    2751           5 :                 CASE(GNUTLS_CIPHER_AES_256_XTS, test_cipher,
    2752             :                      aes256_xts_vectors);
    2753           5 :                 FALLTHROUGH;
    2754           5 :                 NON_FIPS_CASE(GNUTLS_CIPHER_AES_128_SIV, test_cipher_aead,
    2755           5 :                      aes128_siv_vectors);
    2756           5 :                 FALLTHROUGH;
    2757           5 :                 NON_FIPS_CASE(GNUTLS_CIPHER_AES_256_SIV, test_cipher_aead,
    2758           5 :                      aes256_siv_vectors);
    2759           5 :                 FALLTHROUGH;
    2760           5 :                 NON_FIPS_CASE(GNUTLS_CIPHER_CHACHA20_32, test_cipher,
    2761           5 :                      chacha20_32_vectors);
    2762           5 :                 FALLTHROUGH;
    2763             :                 /* The same test vector for _32 variant should work */
    2764           5 :                 NON_FIPS_CASE(GNUTLS_CIPHER_CHACHA20_64, test_cipher,
    2765           5 :                      chacha20_32_vectors);
    2766             : #if ENABLE_GOST
    2767           5 :                 FALLTHROUGH;
    2768           5 :                 NON_FIPS_CASE(GNUTLS_CIPHER_GOST28147_CPA_CFB, test_cipher,
    2769           5 :                               gost28147_cpa_cfb_vectors);
    2770           5 :                 FALLTHROUGH;
    2771           5 :                 NON_FIPS_CASE(GNUTLS_CIPHER_GOST28147_CPB_CFB, test_cipher,
    2772           5 :                               gost28147_cpb_cfb_vectors);
    2773           5 :                 FALLTHROUGH;
    2774           5 :                 NON_FIPS_CASE(GNUTLS_CIPHER_GOST28147_CPC_CFB, test_cipher,
    2775           5 :                               gost28147_cpc_cfb_vectors);
    2776           5 :                 FALLTHROUGH;
    2777           5 :                 NON_FIPS_CASE(GNUTLS_CIPHER_GOST28147_CPD_CFB, test_cipher,
    2778           5 :                               gost28147_cpd_cfb_vectors);
    2779           5 :                 FALLTHROUGH;
    2780           5 :                 NON_FIPS_CASE(GNUTLS_CIPHER_GOST28147_TC26Z_CFB, test_cipher,
    2781           5 :                               gost28147_tc26z_cfb_vectors);
    2782           5 :                 FALLTHROUGH;
    2783           5 :                 NON_FIPS_CASE(GNUTLS_CIPHER_GOST28147_TC26Z_CNT, test_cipher,
    2784           5 :                               gost28147_tc26z_cnt_vectors);
    2785           5 :                 FALLTHROUGH;
    2786           5 :                 NON_FIPS_CASE(GNUTLS_CIPHER_MAGMA_CTR_ACPKM, test_cipher,
    2787           5 :                               magma_ctr_acpkm_vectors);
    2788           5 :                 FALLTHROUGH;
    2789           5 :                 NON_FIPS_CASE(GNUTLS_CIPHER_KUZNYECHIK_CTR_ACPKM, test_cipher,
    2790             :                               kuznyechik_ctr_acpkm_vectors);
    2791             : #endif
    2792             :                 break;
    2793             :         default:
    2794           0 :                 return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
    2795             :         }
    2796             : 
    2797             :         return 0;
    2798             : }
    2799             : 
    2800             : /*-
    2801             :  * gnutls_mac_self_test:
    2802             :  * @flags: GNUTLS_SELF_TEST_FLAG flags
    2803             :  * @mac: the message authentication algorithm to use
    2804             :  *
    2805             :  * This function will run self tests on the provided mac.
    2806             :  *
    2807             :  * Returns: Zero or a negative error code on error.
    2808             :  *
    2809             :  * Since: 3.3.0-FIPS140
    2810             :  -*/
    2811           4 : int gnutls_mac_self_test(unsigned flags, gnutls_mac_algorithm_t mac)
    2812             : {
    2813           4 :         int ret;
    2814             : 
    2815           4 :         if (flags & GNUTLS_SELF_TEST_FLAG_ALL)
    2816             :                 mac = GNUTLS_MAC_UNKNOWN;
    2817             : 
    2818           2 :         switch (mac) {
    2819             :         case GNUTLS_MAC_UNKNOWN:
    2820           2 :                 NON_FIPS_CASE(GNUTLS_MAC_MD5, test_mac, hmac_md5_vectors);
    2821           2 :                 FALLTHROUGH;
    2822           2 :                 CASE(GNUTLS_MAC_SHA1, test_mac, hmac_sha1_vectors);
    2823           2 :                 FALLTHROUGH;
    2824           2 :                 CASE(GNUTLS_MAC_SHA224, test_mac, hmac_sha224_vectors);
    2825           4 :                 FALLTHROUGH;
    2826           4 :                 CASE(GNUTLS_MAC_SHA256, test_mac, hmac_sha256_vectors);
    2827           2 :                 FALLTHROUGH;
    2828           2 :                 CASE(GNUTLS_MAC_SHA384, test_mac, hmac_sha384_vectors);
    2829           2 :                 FALLTHROUGH;
    2830           2 :                 CASE(GNUTLS_MAC_SHA512, test_mac, hmac_sha512_vectors);
    2831             : #if ENABLE_GOST
    2832           2 :                 FALLTHROUGH;
    2833           2 :                 NON_FIPS_CASE(GNUTLS_MAC_GOSTR_94, test_mac, hmac_gostr_94_vectors);
    2834           2 :                 FALLTHROUGH;
    2835           2 :                 NON_FIPS_CASE(GNUTLS_MAC_STREEBOG_512, test_mac, hmac_streebog_512_vectors);
    2836           2 :                 FALLTHROUGH;
    2837           2 :                 NON_FIPS_CASE(GNUTLS_MAC_STREEBOG_256, test_mac, hmac_streebog_256_vectors);
    2838           2 :                 FALLTHROUGH;
    2839           2 :                 NON_FIPS_CASE(GNUTLS_MAC_GOST28147_TC26Z_IMIT, test_mac, gost28147_tc26z_imit_vectors);
    2840           2 :                 FALLTHROUGH;
    2841           2 :                 NON_FIPS_CASE(GNUTLS_MAC_MAGMA_OMAC, test_mac, magma_omac_vectors);
    2842           2 :                 FALLTHROUGH;
    2843           2 :                 NON_FIPS_CASE(GNUTLS_MAC_KUZNYECHIK_OMAC, test_mac, kuznyechik_omac_vectors);
    2844             : #endif
    2845           2 :                 FALLTHROUGH;
    2846           2 :                 CASE(GNUTLS_MAC_AES_CMAC_128, test_mac, aes_cmac_128_vectors);
    2847           2 :                 FALLTHROUGH;
    2848           2 :                 CASE(GNUTLS_MAC_AES_CMAC_256, test_mac, aes_cmac_256_vectors);
    2849           2 :                 FALLTHROUGH;
    2850           2 :                 CASE(GNUTLS_MAC_AES_GMAC_128, test_mac, aes_gmac_128_vectors);
    2851           2 :                 FALLTHROUGH;
    2852           2 :                 CASE(GNUTLS_MAC_AES_GMAC_192, test_mac, aes_gmac_192_vectors);
    2853           2 :                 FALLTHROUGH;
    2854           2 :                 CASE(GNUTLS_MAC_AES_GMAC_256, test_mac, aes_gmac_256_vectors);
    2855             : 
    2856             :                 break;
    2857             :         default:
    2858           0 :                 return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
    2859             :         }
    2860             : 
    2861             :         return 0;
    2862             : }
    2863             : 
    2864             : /*-
    2865             :  * gnutls_digest_self_test:
    2866             :  * @flags: GNUTLS_SELF_TEST_FLAG flags
    2867             :  * @digest: the digest algorithm to use
    2868             :  *
    2869             :  * This function will run self tests on the provided digest.
    2870             :  *
    2871             :  * Returns: Zero or a negative error code on error.
    2872             :  *
    2873             :  * Since: 3.3.0-FIPS140
    2874             :  -*/
    2875           4 : int gnutls_digest_self_test(unsigned flags, gnutls_digest_algorithm_t digest)
    2876             : {
    2877           4 :         int ret;
    2878             : 
    2879           4 :         if (flags & GNUTLS_SELF_TEST_FLAG_ALL)
    2880             :                 digest = GNUTLS_DIG_UNKNOWN;
    2881             : 
    2882           2 :         switch (digest) {
    2883             :         case GNUTLS_DIG_UNKNOWN:
    2884           2 :                 NON_FIPS_CASE(GNUTLS_DIG_MD5, test_digest, md5_vectors);
    2885           4 :                 FALLTHROUGH;
    2886           4 :                 CASE(GNUTLS_DIG_SHA1, test_digest, sha1_vectors);
    2887           2 :                 FALLTHROUGH;
    2888           2 :                 CASE(GNUTLS_DIG_SHA224, test_digest, sha224_vectors);
    2889           2 :                 FALLTHROUGH;
    2890           2 :                 CASE(GNUTLS_DIG_SHA256, test_digest, sha256_vectors);
    2891           2 :                 FALLTHROUGH;
    2892           2 :                 CASE(GNUTLS_DIG_SHA384, test_digest, sha384_vectors);
    2893           2 :                 FALLTHROUGH;
    2894           2 :                 CASE(GNUTLS_DIG_SHA512, test_digest, sha512_vectors);
    2895             : #ifdef NETTLE_SHA3_FIPS202
    2896           2 :                 FALLTHROUGH;
    2897           2 :                 CASE(GNUTLS_DIG_SHA3_224, test_digest, sha3_224_vectors);
    2898           2 :                 FALLTHROUGH;
    2899           2 :                 CASE(GNUTLS_DIG_SHA3_256, test_digest, sha3_256_vectors);
    2900           2 :                 FALLTHROUGH;
    2901           2 :                 CASE(GNUTLS_DIG_SHA3_384, test_digest, sha3_384_vectors);
    2902           2 :                 FALLTHROUGH;
    2903           2 :                 CASE(GNUTLS_DIG_SHA3_512, test_digest, sha3_512_vectors);
    2904             : #endif
    2905             : #if ENABLE_GOST
    2906           2 :                 FALLTHROUGH;
    2907           2 :                 NON_FIPS_CASE(GNUTLS_DIG_GOSTR_94, test_digest, gostr_94_vectors);
    2908           2 :                 FALLTHROUGH;
    2909           2 :                 NON_FIPS_CASE(GNUTLS_DIG_STREEBOG_512, test_digest, streebog_512_vectors);
    2910           2 :                 FALLTHROUGH;
    2911           2 :                 NON_FIPS_CASE(GNUTLS_DIG_STREEBOG_256, test_digest, streebog_256_vectors);
    2912             : #endif
    2913             :                 break;
    2914             :         default:
    2915           0 :                 return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
    2916             :         }
    2917             : 
    2918             :         return 0;
    2919             : }
    2920             : 
    2921             : struct hkdf_vectors_st {
    2922             :         const uint8_t *ikm;
    2923             :         unsigned int ikm_size;
    2924             :         const uint8_t *salt;
    2925             :         unsigned int salt_size;
    2926             :         const uint8_t *prk;
    2927             :         unsigned int prk_size;
    2928             :         const uint8_t *info;
    2929             :         unsigned int info_size;
    2930             :         const uint8_t *okm;
    2931             :         unsigned int okm_size;
    2932             : };
    2933             : 
    2934             : const struct hkdf_vectors_st hkdf_sha256_vectors[] = {
    2935             :         /* RFC 5869: A.1. Test Case 1: Basic test case with SHA-256 */
    2936             :         {
    2937             :                 STR(ikm, ikm_size,
    2938             :                     "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"
    2939             :                     "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
    2940             :                 STR(salt, salt_size,
    2941             :                     "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c"),
    2942             :                 STR(prk, prk_size,
    2943             :                     "\x07\x77\x09\x36\x2c\x2e\x32\xdf\x0d\xdc\x3f\x0d\xc4\x7b"
    2944             :                     "\xba\x63\x90\xb6\xc7\x3b\xb5\x0f\x9c\x31\x22\xec\x84\x4a"
    2945             :                     "\xd7\xc2\xb3\xe5"),
    2946             :                 STR(info, info_size,
    2947             :                     "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9"),
    2948             :                 STR(okm, okm_size,
    2949             :                     "\x3c\xb2\x5f\x25\xfa\xac\xd5\x7a\x90\x43\x4f\x64\xd0\x36"
    2950             :                     "\x2f\x2a\x2d\x2d\x0a\x90\xcf\x1a\x5a\x4c\x5d\xb0\x2d\x56"
    2951             :                     "\xec\xc4\xc5\xbf\x34\x00\x72\x08\xd5\xb8\x87\x18\x58\x65"),
    2952             :         },
    2953             :         /* RFC 5869: A.2. Test Case 2: Test with SHA-256 and longer inputs/outputs */
    2954             :         {
    2955             :                 STR(ikm, ikm_size,
    2956             :                     "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d"
    2957             :                     "\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b"
    2958             :                     "\x1c\x1d\x1e\x1f\x20\x21\x22\x23\x24\x25\x26\x27\x28\x29"
    2959             :                     "\x2a\x2b\x2c\x2d\x2e\x2f\x30\x31\x32\x33\x34\x35\x36\x37"
    2960             :                     "\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f\x40\x41\x42\x43\x44\x45"
    2961             :                     "\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f"),
    2962             :                 STR(salt, salt_size,
    2963             :                     "\x60\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d"
    2964             :                     "\x6e\x6f\x70\x71\x72\x73\x74\x75\x76\x77\x78\x79\x7a\x7b"
    2965             :                     "\x7c\x7d\x7e\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89"
    2966             :                     "\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94\x95\x96\x97"
    2967             :                     "\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0\xa1\xa2\xa3\xa4\xa5"
    2968             :                     "\xa6\xa7\xa8\xa9\xaa\xab\xac\xad\xae\xaf"),
    2969             :                 STR(prk, prk_size,
    2970             :                     "\x06\xa6\xb8\x8c\x58\x53\x36\x1a\x06\x10\x4c\x9c\xeb\x35"
    2971             :                     "\xb4\x5c\xef\x76\x00\x14\x90\x46\x71\x01\x4a\x19\x3f\x40"
    2972             :                     "\xc1\x5f\xc2\x44"),
    2973             :                 STR(info, info_size,
    2974             :                     "\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8\xb9\xba\xbb\xbc\xbd"
    2975             :                     "\xbe\xbf\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8\xc9\xca\xcb"
    2976             :                     "\xcc\xcd\xce\xcf\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8\xd9"
    2977             :                     "\xda\xdb\xdc\xdd\xde\xdf\xe0\xe1\xe2\xe3\xe4\xe5\xe6\xe7"
    2978             :                     "\xe8\xe9\xea\xeb\xec\xed\xee\xef\xf0\xf1\xf2\xf3\xf4\xf5"
    2979             :                     "\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff"),
    2980             :                 STR(okm, okm_size,
    2981             :                     "\xb1\x1e\x39\x8d\xc8\x03\x27\xa1\xc8\xe7\xf7\x8c\x59\x6a"
    2982             :                     "\x49\x34\x4f\x01\x2e\xda\x2d\x4e\xfa\xd8\xa0\x50\xcc\x4c"
    2983             :                     "\x19\xaf\xa9\x7c\x59\x04\x5a\x99\xca\xc7\x82\x72\x71\xcb"
    2984             :                     "\x41\xc6\x5e\x59\x0e\x09\xda\x32\x75\x60\x0c\x2f\x09\xb8"
    2985             :                     "\x36\x77\x93\xa9\xac\xa3\xdb\x71\xcc\x30\xc5\x81\x79\xec"
    2986             :                     "\x3e\x87\xc1\x4c\x01\xd5\xc1\xf3\x43\x4f\x1d\x87"),
    2987             :         },
    2988             : };
    2989             : 
    2990           0 : static int test_hkdf(gnutls_mac_algorithm_t mac,
    2991             :                      const struct hkdf_vectors_st *vectors,
    2992             :                      size_t vectors_size, unsigned flags)
    2993             : {
    2994           0 :         unsigned int i;
    2995             : 
    2996           0 :         for (i = 0; i < vectors_size; i++) {
    2997           0 :                 gnutls_datum_t ikm, prk, salt, info;
    2998           0 :                 uint8_t output[4096];
    2999           0 :                 int ret;
    3000             : 
    3001           0 :                 ikm.data = (void *) vectors[i].ikm;
    3002           0 :                 ikm.size = vectors[i].ikm_size;
    3003           0 :                 salt.data = (void *) vectors[i].salt;
    3004           0 :                 salt.size = vectors[i].salt_size;
    3005             : 
    3006           0 :                 ret = gnutls_hkdf_extract(mac, &ikm, &salt, output);
    3007           0 :                 if (ret < 0) {
    3008           0 :                         _gnutls_debug_log("error extracting HKDF: MAC-%s\n",
    3009             :                                           gnutls_mac_get_name(mac));
    3010           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    3011             :                 }
    3012             : 
    3013           0 :                 if (memcmp(output, vectors[i].prk, vectors[i].prk_size) != 0) {
    3014           0 :                         _gnutls_debug_log
    3015             :                             ("HKDF extract: MAC-%s test vector failed!\n",
    3016             :                              gnutls_mac_get_name(mac));
    3017             : 
    3018           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    3019             :                 }
    3020             : 
    3021           0 :                 prk.data = (void *) vectors[i].prk;
    3022           0 :                 prk.size = vectors[i].prk_size;
    3023           0 :                 info.data = (void *) vectors[i].info;
    3024           0 :                 info.size = vectors[i].info_size;
    3025             : 
    3026           0 :                 ret = gnutls_hkdf_expand(mac, &prk, &info,
    3027           0 :                                          output, vectors[i].okm_size);
    3028           0 :                 if (ret < 0) {
    3029           0 :                         _gnutls_debug_log("error extracting HKDF: MAC-%s\n",
    3030             :                                           gnutls_mac_get_name(mac));
    3031           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    3032             :                 }
    3033             : 
    3034           0 :                 if (memcmp(output, vectors[i].okm, vectors[i].okm_size) != 0) {
    3035           0 :                         _gnutls_debug_log
    3036             :                             ("HKDF expand: MAC-%s test vector failed!\n",
    3037             :                              gnutls_mac_get_name(mac));
    3038             : 
    3039           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    3040             :                 }
    3041             :         }
    3042             : 
    3043           0 :         _gnutls_debug_log
    3044             :             ("HKDF: MAC-%s self check succeeded\n",
    3045             :              gnutls_mac_get_name(mac));
    3046             : 
    3047             :         return 0;
    3048             : }
    3049             : 
    3050             : /*-
    3051             :  * gnutls_hkdf_self_test:
    3052             :  * @flags: GNUTLS_SELF_TEST_FLAG flags
    3053             :  * @mac: the message authentication algorithm to use
    3054             :  *
    3055             :  * This function will run self tests on HKDF with the provided mac.
    3056             :  *
    3057             :  * Returns: Zero or a negative error code on error.
    3058             :  *
    3059             :  * Since: 3.3.0-FIPS140
    3060             :  -*/
    3061           0 : int gnutls_hkdf_self_test(unsigned flags, gnutls_mac_algorithm_t mac)
    3062             : {
    3063           0 :         int ret;
    3064             : 
    3065           0 :         if (flags & GNUTLS_SELF_TEST_FLAG_ALL)
    3066             :                 mac = GNUTLS_MAC_UNKNOWN;
    3067             : 
    3068           0 :         switch (mac) {
    3069           0 :         case GNUTLS_MAC_UNKNOWN:
    3070           0 :                 CASE(GNUTLS_MAC_SHA256, test_hkdf, hkdf_sha256_vectors);
    3071             : 
    3072             :                 break;
    3073             :         default:
    3074           0 :                 return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
    3075             :         }
    3076             : 
    3077             :         return 0;
    3078             : }
    3079             : 
    3080             : struct pbkdf2_vectors_st {
    3081             :         const uint8_t *key;
    3082             :         size_t key_size;
    3083             :         const uint8_t *salt;
    3084             :         size_t salt_size;
    3085             :         unsigned iter_count;
    3086             :         const uint8_t *output;
    3087             :         size_t output_size;
    3088             : };
    3089             : 
    3090             : const struct pbkdf2_vectors_st pbkdf2_sha256_vectors[] = {
    3091             :         /* RFC 7914: 11. Test Vectors for PBKDF2 with HMAC-SHA-256 */
    3092             :         {
    3093             :                 STR(key, key_size, "passwd"),
    3094             :                 STR(salt, salt_size, "salt"),
    3095             :                 .iter_count = 1,
    3096             :                 STR(output, output_size,
    3097             :                     "\x55\xac\x04\x6e\x56\xe3\x08\x9f\xec\x16\x91\xc2\x25\x44"
    3098             :                     "\xb6\x05\xf9\x41\x85\x21\x6d\xde\x04\x65\xe6\x8b\x9d\x57"
    3099             :                     "\xc2\x0d\xac\xbc\x49\xca\x9c\xcc\xf1\x79\xb6\x45\x99\x16"
    3100             :                     "\x64\xb3\x9d\x77\xef\x31\x7c\x71\xb8\x45\xb1\xe3\x0b\xd5"
    3101             :                     "\x09\x11\x20\x41\xd3\xa1\x97\x83"),
    3102             :         },
    3103             :         /* RFC 7914: 11. Test Vectors for PBKDF2 with HMAC-SHA-256 */
    3104             :         {
    3105             :                 STR(key, key_size, "Password"),
    3106             :                 STR(salt, salt_size, "NaCl"),
    3107             :                 .iter_count = 80000,
    3108             :                 STR(output, output_size,
    3109             :                     "\x4d\xdc\xd8\xf6\x0b\x98\xbe\x21\x83\x0c\xee\x5e\xf2\x27"
    3110             :                     "\x01\xf9\x64\x1a\x44\x18\xd0\x4c\x04\x14\xae\xff\x08\x87"
    3111             :                     "\x6b\x34\xab\x56\xa1\xd4\x25\xa1\x22\x58\x33\x54\x9a\xdb"
    3112             :                     "\x84\x1b\x51\xc9\xb3\x17\x6a\x27\x2b\xde\xbb\xa1\xd0\x78"
    3113             :                     "\x47\x8f\x62\xb3\x97\xf3\x3c\x8d"),
    3114             :         },
    3115             : };
    3116             : 
    3117           0 : static int test_pbkdf2(gnutls_mac_algorithm_t mac,
    3118             :                        const struct pbkdf2_vectors_st *vectors,
    3119             :                        size_t vectors_size, unsigned flags)
    3120             : {
    3121           0 :         unsigned int i;
    3122             : 
    3123           0 :         for (i = 0; i < vectors_size; i++) {
    3124           0 :                 gnutls_datum_t key, salt;
    3125           0 :                 uint8_t output[4096];
    3126           0 :                 int ret;
    3127             : 
    3128           0 :                 key.data = (void *) vectors[i].key;
    3129           0 :                 key.size = vectors[i].key_size;
    3130           0 :                 salt.data = (void *) vectors[i].salt;
    3131           0 :                 salt.size = vectors[i].salt_size;
    3132             : 
    3133           0 :                 ret = gnutls_pbkdf2(mac, &key, &salt, vectors[i].iter_count,
    3134             :                                     output, vectors[i].output_size);
    3135           0 :                 if (ret < 0) {
    3136           0 :                         _gnutls_debug_log("error calculating PBKDF2: MAC-%s\n",
    3137             :                                           gnutls_mac_get_name(mac));
    3138           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    3139             :                 }
    3140             : 
    3141           0 :                 if (memcmp(output, vectors[i].output, vectors[i].output_size) != 0) {
    3142           0 :                         _gnutls_debug_log
    3143             :                             ("PBKDF2: MAC-%s test vector failed!\n",
    3144             :                              gnutls_mac_get_name(mac));
    3145             : 
    3146           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    3147             :                 }
    3148             :         }
    3149             : 
    3150           0 :         _gnutls_debug_log
    3151             :             ("PBKDF2: MAC-%s self check succeeded\n",
    3152             :              gnutls_mac_get_name(mac));
    3153             : 
    3154             :         return 0;
    3155             : }
    3156             : 
    3157             : /*-
    3158             :  * gnutls_pbkdf2_self_test:
    3159             :  * @flags: GNUTLS_SELF_TEST_FLAG flags
    3160             :  * @mac: the message authentication algorithm to use
    3161             :  *
    3162             :  * This function will run self tests on PBKDF2 with the provided mac.
    3163             :  *
    3164             :  * Returns: Zero or a negative error code on error.
    3165             :  *
    3166             :  * Since: 3.3.0-FIPS140
    3167             :  -*/
    3168           0 : int gnutls_pbkdf2_self_test(unsigned flags, gnutls_mac_algorithm_t mac)
    3169             : {
    3170           0 :         int ret;
    3171             : 
    3172           0 :         if (flags & GNUTLS_SELF_TEST_FLAG_ALL)
    3173             :                 mac = GNUTLS_MAC_UNKNOWN;
    3174             : 
    3175           0 :         switch (mac) {
    3176           0 :         case GNUTLS_MAC_UNKNOWN:
    3177           0 :                 CASE(GNUTLS_MAC_SHA256, test_pbkdf2, pbkdf2_sha256_vectors);
    3178             : 
    3179             :                 break;
    3180             :         default:
    3181           0 :                 return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
    3182             :         }
    3183             : 
    3184             :         return 0;
    3185             : }
    3186             : 
    3187             : struct tlsprf_vectors_st {
    3188             :         const uint8_t *key;
    3189             :         size_t key_size;
    3190             :         const uint8_t *label;
    3191             :         size_t label_size;
    3192             :         const uint8_t *seed;
    3193             :         size_t seed_size;
    3194             :         const uint8_t *output;
    3195             :         size_t output_size;
    3196             : };
    3197             : 
    3198             : const struct tlsprf_vectors_st tls10prf_vectors[] = {
    3199             :         /* tests/tls10-prf.c: test1 */
    3200             :         {
    3201             :                 STR(key, key_size,
    3202             :                     "\x26\x3b\xdb\xbb\x6f\x6d\x4c\x66\x4e\x05\x8d\x0a\xa9\xd3"
    3203             :                     "\x21\xbe"),
    3204             :                 STR(label, label_size,
    3205             :                     "test label"),
    3206             :                 STR(seed, seed_size,
    3207             :                     "\xb9\x20\x57\x3b\x19\x96\x01\x02\x4f\x04\xd6\xdc\x61\x96"
    3208             :                     "\x6e\x65"),
    3209             :                 STR(output, output_size,
    3210             :                     "\x66\x17\x99\x37\x65\xfa\x6c\xa7\x03\xd1\x9e\xc7\x0d\xd5"
    3211             :                     "\xdd\x16\x0f\xfc\xc0\x77\x25\xfa\xfb\x71\x4a\x9f\x81\x5a"
    3212             :                     "\x2a\x30\xbf\xb7\xe3\xbb\xfb\x7e\xee\x57\x4b\x3b\x61\x3e"
    3213             :                     "\xb7\xfe\x80\xee\xc9\x69\x1d\x8c\x1b\x0e\x2d\x9b\x3c\x8b"
    3214             :                     "\x4b\x02\xb6\xb6\xd6\xdb\x88\xe2\x09\x46\x23\xef\x62\x40"
    3215             :                     "\x60\x7e\xda\x7a\xbe\x3c\x84\x6e\x82\xa3"),
    3216             :         },
    3217             : };
    3218             : 
    3219             : const struct tlsprf_vectors_st tls12prf_sha256_vectors[] = {
    3220             :         /* tests/tls12-prf.c: sha256_test1 */
    3221             :         {
    3222             :                 STR(key, key_size,
    3223             :                     "\x04\x50\xb0\xea\x9e\xcd\x36\x02\xee\x0d\x76\xc5\xc3\xc8"
    3224             :                     "\x6f\x4a"),
    3225             :                 STR(label, label_size,
    3226             :                     "test label"),
    3227             :                 STR(seed, seed_size,
    3228             :                     "\x20\x7a\xcc\x02\x54\xb8\x67\xf5\xb9\x25\xb4\x5a\x33\x60"
    3229             :                     "\x1d\x8b"),
    3230             :                 STR(output, output_size,
    3231             :                     "\xae\x67\x9e\x0e\x71\x4f\x59\x75\x76\x37\x68\xb1\x66\x97"
    3232             :                     "\x9e\x1d"),
    3233             :         },
    3234             :         /* tests/tls12-prf.c: sha256_test2 */
    3235             :         {
    3236             :                 STR(key, key_size,
    3237             :                     "\x34\x20\x4a\x9d\xf0\xbe\x6e\xb4\xe9\x25\xa8\x02\x7c\xf6"
    3238             :                     "\xc6\x02"),
    3239             :                 STR(label, label_size,
    3240             :                     "test label"),
    3241             :                 STR(seed, seed_size,
    3242             :                     "\x98\xb2\xc4\x0b\xcd\x66\x4c\x83\xbb\x92\x0c\x18\x20\x1a"
    3243             :                     "\x63\x95"),
    3244             :                 STR(output, output_size,
    3245             :                     "\xaf\xa9\x31\x24\x53\xc2\x2f\xa8\x3d\x2b\x51\x1b\x37\x2d"
    3246             :                     "\x73\xa4\x02\xa2\xa6\x28\x73\x23\x9a\x51\xfa\xde\x45\x08"
    3247             :                     "\x2f\xaf\x3f\xd2\xbb\x7f\xfb\x3e\x9b\xf3\x6e\x28\xb3\x14"
    3248             :                     "\x1a\xab\xa4\x84\x00\x53\x32\xa9\xf9\xe3\x88\xa4\xd3\x29"
    3249             :                     "\xf1\x58\x7a\x4b\x31\x7d\xa0\x77\x08\xea\x1b\xa9\x5a\x53"
    3250             :                     "\xf8\x78\x67\x24\xbd\x83\xce\x4b\x03\xaf"),
    3251             :         },
    3252             :         /* tests/tls12-prf.c: sha256_test3 */
    3253             :         {
    3254             :                 STR(key, key_size,
    3255             :                     "\xa3\x69\x1a\xa1\xf6\x81\x4b\x80\x59\x2b\xf1\xcf\x2a\xcf"
    3256             :                     "\x16\x97"),
    3257             :                 STR(label, label_size,
    3258             :                     "test label"),
    3259             :                 STR(seed, seed_size,
    3260             :                     "\x55\x23\xd4\x1e\x32\x0e\x69\x4d\x0c\x1f\xf5\x73\x4d\x83"
    3261             :                     "\x0b\x93\x3e\x46\x92\x70\x71\xc9\x26\x21"),
    3262             :                 STR(output, output_size,
    3263             :                     "\x6a\xd0\x98\x4f\xa0\x6f\x78\xfe\x16\x1b\xd4\x6d\x7c\x26"
    3264             :                     "\x1d\xe4\x33\x40\xd7\x28\xdd\xdc\x3d\x0f\xf0\xdd\x7e\x0d"),
    3265             :         },
    3266             :         /* tests/tls12-prf.c: sha256_test4 */
    3267             :         {
    3268             :                 STR(key, key_size,
    3269             :                     "\x21\x0e\xc9\x37\x06\x97\x07\xe5\x46\x5b\xc4\x6b\xf7\x79"
    3270             :                     "\xe1\x04\x10\x8b\x18\xfd\xb7\x93\xbe\x7b\x21\x8d\xbf\x14"
    3271             :                     "\x5c\x86\x41\xf3"),
    3272             :                 STR(label, label_size,
    3273             :                     "test label"),
    3274             :                 STR(seed, seed_size,
    3275             :                     "\x1e\x35\x1a\x0b\xaf\x35\xc7\x99\x45\x92\x43\x94\xb8\x81"
    3276             :                     "\xcf\xe3\x1d\xae\x8f\x1c\x1e\xd5\x4d\x3b"),
    3277             :                 STR(output, output_size,
    3278             :                     "\x76\x53\xfa\x80\x9c\xde\x3b\x55\x3c\x4a\x17\xe2\xcd\xbc"
    3279             :                     "\xc9\x18\xf3\x65\x27\xf2\x22\x19\xa7\xd7\xf9\x5d\x97\x24"
    3280             :                     "\x3f\xf2\xd5\xde\xe8\x26\x5e\xf0\xaf\x03"),
    3281             :         },
    3282             : };
    3283             : 
    3284             : const struct tlsprf_vectors_st tls12prf_sha384_vectors[] = {
    3285             :         /* tests/tls12-prf.c: sha384_test1
    3286             :          * https://www.ietf.org/mail-archive/web/tls/current/msg03416.html
    3287             :          */
    3288             :         {
    3289             :                 STR(key, key_size,
    3290             :                     "\xb8\x0b\x73\x3d\x6c\xee\xfc\xdc\x71\x56\x6e\xa4\x8e\x55"
    3291             :                     "\x67\xdf"),
    3292             :                 STR(label, label_size,
    3293             :                     "test label"),
    3294             :                 STR(seed, seed_size,
    3295             :                     "\xcd\x66\x5c\xf6\xa8\x44\x7d\xd6\xff\x8b\x27\x55\x5e\xdb"
    3296             :                     "\x74\x65"),
    3297             :                 STR(output, output_size,
    3298             :                     "\x7b\x0c\x18\xe9\xce\xd4\x10\xed\x18\x04\xf2\xcf\xa3\x4a"
    3299             :                     "\x33\x6a\x1c\x14\xdf\xfb\x49\x00\xbb\x5f\xd7\x94\x21\x07"
    3300             :                     "\xe8\x1c\x83\xcd\xe9\xca\x0f\xaa\x60\xbe\x9f\xe3\x4f\x82"
    3301             :                     "\xb1\x23\x3c\x91\x46\xa0\xe5\x34\xcb\x40\x0f\xed\x27\x00"
    3302             :                     "\x88\x4f\x9d\xc2\x36\xf8\x0e\xdd\x8b\xfa\x96\x11\x44\xc9"
    3303             :                     "\xe8\xd7\x92\xec\xa7\x22\xa7\xb3\x2f\xc3\xd4\x16\xd4\x73"
    3304             :                     "\xeb\xc2\xc5\xfd\x4a\xbf\xda\xd0\x5d\x91\x84\x25\x9b\x5b"
    3305             :                     "\xf8\xcd\x4d\x90\xfa\x0d\x31\xe2\xde\xc4\x79\xe4\xf1\xa2"
    3306             :                     "\x60\x66\xf2\xee\xa9\xa6\x92\x36\xa3\xe5\x26\x55\xc9\xe9"
    3307             :                     "\xae\xe6\x91\xc8\xf3\xa2\x68\x54\x30\x8d\x5e\xaa\x3b\xe8"
    3308             :                     "\x5e\x09\x90\x70\x3d\x73\xe5\x6f"),
    3309             :         },
    3310             : };
    3311             : 
    3312           0 : static int test_tlsprf(gnutls_mac_algorithm_t mac,
    3313             :                        const struct tlsprf_vectors_st *vectors,
    3314             :                        size_t vectors_size, unsigned flags)
    3315             : {
    3316           0 :         unsigned int i;
    3317             : 
    3318           0 :         for (i = 0; i < vectors_size; i++) {
    3319           0 :                 char output[4096];
    3320           0 :                 int ret;
    3321             : 
    3322           0 :                 ret = _gnutls_prf_raw(mac,
    3323           0 :                                       vectors[i].key_size, vectors[i].key,
    3324           0 :                                       vectors[i].label_size, (const char *)vectors[i].label,
    3325             :                                       vectors[i].seed_size, vectors[i].seed,
    3326           0 :                                       vectors[i].output_size, output);
    3327           0 :                 if (ret < 0) {
    3328           0 :                         _gnutls_debug_log("error calculating TLS-PRF: MAC-%s\n",
    3329             :                                           gnutls_mac_get_name(mac));
    3330           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    3331             :                 }
    3332             : 
    3333           0 :                 if (memcmp(output, vectors[i].output, vectors[i].output_size) != 0) {
    3334           0 :                         _gnutls_debug_log
    3335             :                             ("TLS-PRF: MAC-%s test vector failed!\n",
    3336             :                              gnutls_mac_get_name(mac));
    3337             : 
    3338           0 :                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
    3339             :                 }
    3340             :         }
    3341             : 
    3342           0 :         _gnutls_debug_log
    3343             :             ("TLS-PRF: MAC-%s self check succeeded\n",
    3344             :              gnutls_mac_get_name(mac));
    3345             : 
    3346             :         return 0;
    3347             : }
    3348             : 
    3349             : /*-
    3350             :  * gnutls_tlsprf_self_test:
    3351             :  * @flags: GNUTLS_SELF_TEST_FLAG flags
    3352             :  * @mac: the message authentication algorithm to use
    3353             :  *
    3354             :  * This function will run self tests on TLS-PRF with the provided mac.
    3355             :  *
    3356             :  * Returns: Zero or a negative error code on error.
    3357             :  *
    3358             :  * Since: 3.3.0-FIPS140
    3359             :  -*/
    3360           0 : int gnutls_tlsprf_self_test(unsigned flags, gnutls_mac_algorithm_t mac)
    3361             : {
    3362           0 :         int ret;
    3363             : 
    3364           0 :         if (flags & GNUTLS_SELF_TEST_FLAG_ALL)
    3365             :                 mac = GNUTLS_MAC_UNKNOWN;
    3366             : 
    3367           0 :         switch (mac) {
    3368             :         case GNUTLS_MAC_UNKNOWN:
    3369           0 :                 NON_FIPS_CASE(GNUTLS_MAC_MD5_SHA1, test_tlsprf, tls10prf_vectors);
    3370           0 :                 FALLTHROUGH;
    3371           0 :                 CASE(GNUTLS_MAC_SHA256, test_tlsprf, tls12prf_sha256_vectors);
    3372           0 :                 FALLTHROUGH;
    3373           0 :                 CASE(GNUTLS_MAC_SHA384, test_tlsprf, tls12prf_sha384_vectors);
    3374             : 
    3375             :                 break;
    3376             :         default:
    3377           0 :                 return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
    3378             :         }
    3379             : 
    3380             :         return 0;
    3381             : }

Generated by: LCOV version 1.14