Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

crypto/krb5: Test manager data

Add Kerberos crypto tests to the test manager database. This covers:

camellia128-cts-cmac samples from RFC6803
camellia256-cts-cmac samples from RFC6803
aes128-cts-hmac-sha256-128 samples from RFC8009
aes256-cts-hmac-sha384-192 samples from RFC8009

but not:

aes128-cts-hmac-sha1-96
aes256-cts-hmac-sha1-96

as the test samples in RFC3962 don't seem to be suitable.

Signed-off-by: David Howells <dhowells@redhat.com>
cc: Herbert Xu <herbert@gondor.apana.org.au>
cc: "David S. Miller" <davem@davemloft.net>
cc: Chuck Lever <chuck.lever@oracle.com>
cc: Marc Dionne <marc.dionne@auristor.com>
cc: Eric Dumazet <edumazet@google.com>
cc: Jakub Kicinski <kuba@kernel.org>
cc: Paolo Abeni <pabeni@redhat.com>
cc: Simon Horman <horms@kernel.org>
cc: linux-afs@lists.infradead.org
cc: linux-nfs@vger.kernel.org
cc: linux-crypto@vger.kernel.org
cc: netdev@vger.kernel.org

+367
+16
crypto/testmgr.c
··· 4506 4506 .test = alg_test_null, 4507 4507 .fips_allowed = 1, 4508 4508 }, { 4509 + .alg = "authenc(hmac(sha256),cts(cbc(aes)))", 4510 + .test = alg_test_aead, 4511 + .suite = { 4512 + .aead = __VECS(krb5_test_aes128_cts_hmac_sha256_128) 4513 + } 4514 + }, { 4509 4515 .alg = "authenc(hmac(sha256),rfc3686(ctr(aes)))", 4510 4516 .test = alg_test_null, 4511 4517 .fips_allowed = 1, ··· 4531 4525 .alg = "authenc(hmac(sha384),ctr(aes))", 4532 4526 .test = alg_test_null, 4533 4527 .fips_allowed = 1, 4528 + }, { 4529 + .alg = "authenc(hmac(sha384),cts(cbc(aes)))", 4530 + .test = alg_test_aead, 4531 + .suite = { 4532 + .aead = __VECS(krb5_test_aes256_cts_hmac_sha384_192) 4533 + } 4534 4534 }, { 4535 4535 .alg = "authenc(hmac(sha384),rfc3686(ctr(aes)))", 4536 4536 .test = alg_test_null, ··· 5410 5398 .alg = "jitterentropy_rng", 5411 5399 .fips_allowed = 1, 5412 5400 .test = alg_test_null, 5401 + }, { 5402 + .alg = "krb5enc(cmac(camellia),cts(cbc(camellia)))", 5403 + .test = alg_test_aead, 5404 + .suite.aead = __VECS(krb5_test_camellia_cts_cmac) 5413 5405 }, { 5414 5406 .alg = "lrw(aes)", 5415 5407 .generic_driver = "lrw(ecb(aes-generic))",
+351
crypto/testmgr.h
··· 38894 38894 38895 38895 }; 38896 38896 38897 + #ifdef __LITTLE_ENDIAN 38898 + #define AUTHENC_KEY_HEADER(enckeylen) \ 38899 + "\x08\x00\x01\x00" /* LE rtattr */ \ 38900 + enckeylen /* crypto_authenc_key_param */ 38901 + #else 38902 + #define AUTHENC_KEY_HEADER(enckeylen) \ 38903 + "\x00\x08\x00\x01" /* BE rtattr */ \ 38904 + enckeylen /* crypto_authenc_key_param */ 38905 + #endif 38906 + 38907 + static const struct aead_testvec krb5_test_aes128_cts_hmac_sha256_128[] = { 38908 + /* rfc8009 Appendix A */ 38909 + { 38910 + /* "enc no plain" */ 38911 + .key = 38912 + AUTHENC_KEY_HEADER("\x00\x00\x00\x10") 38913 + "\x9F\xDA\x0E\x56\xAB\x2D\x85\xE1\x56\x9A\x68\x86\x96\xC2\x6A\x6C" // Ki 38914 + "\x9B\x19\x7D\xD1\xE8\xC5\x60\x9D\x6E\x67\xC3\xE3\x7C\x62\xC7\x2E", // Ke 38915 + .klen = 4 + 4 + 16 + 16, 38916 + .ptext = 38917 + "\x7E\x58\x95\xEA\xF2\x67\x24\x35\xBA\xD8\x17\xF5\x45\xA3\x71\x48" // Confounder 38918 + "", // Plain 38919 + .plen = 16 + 0, 38920 + .ctext = 38921 + "\xEF\x85\xFB\x89\x0B\xB8\x47\x2F\x4D\xAB\x20\x39\x4D\xCA\x78\x1D" 38922 + "\xAD\x87\x7E\xDA\x39\xD5\x0C\x87\x0C\x0D\x5A\x0A\x8E\x48\xC7\x18", 38923 + .clen = 16 + 0 + 16, 38924 + .assoc = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", // IV 38925 + .alen = 16, 38926 + }, { 38927 + /* "enc plain<block" */ 38928 + .key = 38929 + AUTHENC_KEY_HEADER("\x00\x00\x00\x10") 38930 + "\x9F\xDA\x0E\x56\xAB\x2D\x85\xE1\x56\x9A\x68\x86\x96\xC2\x6A\x6C" // Ki 38931 + "\x9B\x19\x7D\xD1\xE8\xC5\x60\x9D\x6E\x67\xC3\xE3\x7C\x62\xC7\x2E", // Ke 38932 + .klen = 4 + 4 + 16 + 16, 38933 + .ptext = 38934 + "\x7B\xCA\x28\x5E\x2F\xD4\x13\x0F\xB5\x5B\x1A\x5C\x83\xBC\x5B\x24" // Confounder 38935 + "\x00\x01\x02\x03\x04\x05", // Plain 38936 + .plen = 16 + 6, 38937 + .ctext = 38938 + "\x84\xD7\xF3\x07\x54\xED\x98\x7B\xAB\x0B\xF3\x50\x6B\xEB\x09\xCF" 38939 + "\xB5\x54\x02\xCE\xF7\xE6\x87\x7C\xE9\x9E\x24\x7E\x52\xD1\x6E\xD4" 38940 + "\x42\x1D\xFD\xF8\x97\x6C", 38941 + .clen = 16 + 6 + 16, 38942 + .assoc = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", // IV 38943 + .alen = 16, 38944 + }, { 38945 + /* "enc plain==block" */ 38946 + .key = 38947 + AUTHENC_KEY_HEADER("\x00\x00\x00\x10") 38948 + "\x9F\xDA\x0E\x56\xAB\x2D\x85\xE1\x56\x9A\x68\x86\x96\xC2\x6A\x6C" // Ki 38949 + "\x9B\x19\x7D\xD1\xE8\xC5\x60\x9D\x6E\x67\xC3\xE3\x7C\x62\xC7\x2E", // Ke 38950 + .klen = 4 + 4 + 16 + 16, 38951 + .ptext = 38952 + "\x56\xAB\x21\x71\x3F\xF6\x2C\x0A\x14\x57\x20\x0F\x6F\xA9\x94\x8F" // Confounder 38953 + "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", // Plain 38954 + .plen = 16 + 16, 38955 + .ctext = 38956 + "\x35\x17\xD6\x40\xF5\x0D\xDC\x8A\xD3\x62\x87\x22\xB3\x56\x9D\x2A" 38957 + "\xE0\x74\x93\xFA\x82\x63\x25\x40\x80\xEA\x65\xC1\x00\x8E\x8F\xC2" 38958 + "\x95\xFB\x48\x52\xE7\xD8\x3E\x1E\x7C\x48\xC3\x7E\xEB\xE6\xB0\xD3", 38959 + .clen = 16 + 16 + 16, 38960 + .assoc = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", // IV 38961 + .alen = 16, 38962 + }, { 38963 + /* "enc plain>block" */ 38964 + .key = 38965 + AUTHENC_KEY_HEADER("\x00\x00\x00\x10") 38966 + "\x9F\xDA\x0E\x56\xAB\x2D\x85\xE1\x56\x9A\x68\x86\x96\xC2\x6A\x6C" // Ki 38967 + "\x9B\x19\x7D\xD1\xE8\xC5\x60\x9D\x6E\x67\xC3\xE3\x7C\x62\xC7\x2E", // Ke 38968 + .klen = 4 + 4 + 16 + 16, 38969 + .ptext = 38970 + "\xA7\xA4\xE2\x9A\x47\x28\xCE\x10\x66\x4F\xB6\x4E\x49\xAD\x3F\xAC" // Confounder 38971 + "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F" 38972 + "\x10\x11\x12\x13\x14", // Plain 38973 + .plen = 16 + 21, 38974 + .ctext = 38975 + "\x72\x0F\x73\xB1\x8D\x98\x59\xCD\x6C\xCB\x43\x46\x11\x5C\xD3\x36" 38976 + "\xC7\x0F\x58\xED\xC0\xC4\x43\x7C\x55\x73\x54\x4C\x31\xC8\x13\xBC" 38977 + "\xE1\xE6\xD0\x72\xC1\x86\xB3\x9A\x41\x3C\x2F\x92\xCA\x9B\x83\x34" 38978 + "\xA2\x87\xFF\xCB\xFC", 38979 + .clen = 16 + 21 + 16, 38980 + .assoc = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", // IV 38981 + .alen = 16, 38982 + }, 38983 + }; 38984 + 38985 + static const struct aead_testvec krb5_test_aes256_cts_hmac_sha384_192[] = { 38986 + /* rfc8009 Appendix A */ 38987 + { 38988 + /* "enc no plain" */ 38989 + .key = 38990 + AUTHENC_KEY_HEADER("\x00\x00\x00\x20") 38991 + "\x69\xB1\x65\x14\xE3\xCD\x8E\x56\xB8\x20\x10\xD5\xC7\x30\x12\xB6" 38992 + "\x22\xC4\xD0\x0F\xFC\x23\xED\x1F" // Ki 38993 + "\x56\xAB\x22\xBE\xE6\x3D\x82\xD7\xBC\x52\x27\xF6\x77\x3F\x8E\xA7" 38994 + "\xA5\xEB\x1C\x82\x51\x60\xC3\x83\x12\x98\x0C\x44\x2E\x5C\x7E\x49", // Ke 38995 + .klen = 4 + 4 + 32 + 24, 38996 + .ptext = 38997 + "\xF7\x64\xE9\xFA\x15\xC2\x76\x47\x8B\x2C\x7D\x0C\x4E\x5F\x58\xE4" // Confounder 38998 + "", // Plain 38999 + .plen = 16 + 0, 39000 + .ctext = 39001 + "\x41\xF5\x3F\xA5\xBF\xE7\x02\x6D\x91\xFA\xF9\xBE\x95\x91\x95\xA0" 39002 + "\x58\x70\x72\x73\xA9\x6A\x40\xF0\xA0\x19\x60\x62\x1A\xC6\x12\x74" 39003 + "\x8B\x9B\xBF\xBE\x7E\xB4\xCE\x3C", 39004 + .clen = 16 + 0 + 24, 39005 + .assoc = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", // IV 39006 + .alen = 16, 39007 + }, { 39008 + /* "enc plain<block" */ 39009 + .key = 39010 + AUTHENC_KEY_HEADER("\x00\x00\x00\x20") 39011 + "\x69\xB1\x65\x14\xE3\xCD\x8E\x56\xB8\x20\x10\xD5\xC7\x30\x12\xB6" 39012 + "\x22\xC4\xD0\x0F\xFC\x23\xED\x1F" // Ki 39013 + "\x56\xAB\x22\xBE\xE6\x3D\x82\xD7\xBC\x52\x27\xF6\x77\x3F\x8E\xA7" 39014 + "\xA5\xEB\x1C\x82\x51\x60\xC3\x83\x12\x98\x0C\x44\x2E\x5C\x7E\x49", // Ke 39015 + .klen = 4 + 4 + 32 + 24, 39016 + .ptext = 39017 + "\xB8\x0D\x32\x51\xC1\xF6\x47\x14\x94\x25\x6F\xFE\x71\x2D\x0B\x9A" // Confounder 39018 + "\x00\x01\x02\x03\x04\x05", // Plain 39019 + .plen = 16 + 6, 39020 + .ctext = 39021 + "\x4E\xD7\xB3\x7C\x2B\xCA\xC8\xF7\x4F\x23\xC1\xCF\x07\xE6\x2B\xC7" 39022 + "\xB7\x5F\xB3\xF6\x37\xB9\xF5\x59\xC7\xF6\x64\xF6\x9E\xAB\x7B\x60" 39023 + "\x92\x23\x75\x26\xEA\x0D\x1F\x61\xCB\x20\xD6\x9D\x10\xF2", 39024 + .clen = 16 + 6 + 24, 39025 + .assoc = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", // IV 39026 + .alen = 16, 39027 + }, { 39028 + /* "enc plain==block" */ 39029 + .key = 39030 + AUTHENC_KEY_HEADER("\x00\x00\x00\x20") 39031 + "\x69\xB1\x65\x14\xE3\xCD\x8E\x56\xB8\x20\x10\xD5\xC7\x30\x12\xB6" 39032 + "\x22\xC4\xD0\x0F\xFC\x23\xED\x1F" // Ki 39033 + "\x56\xAB\x22\xBE\xE6\x3D\x82\xD7\xBC\x52\x27\xF6\x77\x3F\x8E\xA7" 39034 + "\xA5\xEB\x1C\x82\x51\x60\xC3\x83\x12\x98\x0C\x44\x2E\x5C\x7E\x49", // Ke 39035 + .klen = 4 + 4 + 32 + 24, 39036 + .ptext = 39037 + "\x53\xBF\x8A\x0D\x10\x52\x65\xD4\xE2\x76\x42\x86\x24\xCE\x5E\x63" // Confounder 39038 + "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", // Plain 39039 + .plen = 16 + 16, 39040 + .ctext = 39041 + "\xBC\x47\xFF\xEC\x79\x98\xEB\x91\xE8\x11\x5C\xF8\xD1\x9D\xAC\x4B" 39042 + "\xBB\xE2\xE1\x63\xE8\x7D\xD3\x7F\x49\xBE\xCA\x92\x02\x77\x64\xF6" 39043 + "\x8C\xF5\x1F\x14\xD7\x98\xC2\x27\x3F\x35\xDF\x57\x4D\x1F\x93\x2E" 39044 + "\x40\xC4\xFF\x25\x5B\x36\xA2\x66", 39045 + .clen = 16 + 16 + 24, 39046 + .assoc = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", // IV 39047 + .alen = 16, 39048 + }, { 39049 + /* "enc plain>block" */ 39050 + .key = 39051 + AUTHENC_KEY_HEADER("\x00\x00\x00\x20") 39052 + "\x69\xB1\x65\x14\xE3\xCD\x8E\x56\xB8\x20\x10\xD5\xC7\x30\x12\xB6" 39053 + "\x22\xC4\xD0\x0F\xFC\x23\xED\x1F" // Ki 39054 + "\x56\xAB\x22\xBE\xE6\x3D\x82\xD7\xBC\x52\x27\xF6\x77\x3F\x8E\xA7" 39055 + "\xA5\xEB\x1C\x82\x51\x60\xC3\x83\x12\x98\x0C\x44\x2E\x5C\x7E\x49", // Ke 39056 + .klen = 4 + 4 + 32 + 24, 39057 + .ptext = 39058 + "\x76\x3E\x65\x36\x7E\x86\x4F\x02\xF5\x51\x53\xC7\xE3\xB5\x8A\xF1" // Confounder 39059 + "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F" 39060 + "\x10\x11\x12\x13\x14", // Plain 39061 + .plen = 16 + 21, 39062 + .ctext = 39063 + "\x40\x01\x3E\x2D\xF5\x8E\x87\x51\x95\x7D\x28\x78\xBC\xD2\xD6\xFE" 39064 + "\x10\x1C\xCF\xD5\x56\xCB\x1E\xAE\x79\xDB\x3C\x3E\xE8\x64\x29\xF2" 39065 + "\xB2\xA6\x02\xAC\x86\xFE\xF6\xEC\xB6\x47\xD6\x29\x5F\xAE\x07\x7A" 39066 + "\x1F\xEB\x51\x75\x08\xD2\xC1\x6B\x41\x92\xE0\x1F\x62", 39067 + .clen = 16 + 21 + 24, 39068 + .assoc = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", // IV 39069 + .alen = 16, 39070 + }, 39071 + }; 39072 + 39073 + static const struct aead_testvec krb5_test_camellia_cts_cmac[] = { 39074 + /* rfc6803 sec 10 */ 39075 + { 39076 + // "enc no plain" 39077 + .key = 39078 + AUTHENC_KEY_HEADER("\x00\x00\x00\x10") 39079 + "\x45\xeb\x66\xe2\xef\xa8\x77\x8f\x7d\xf1\x46\x54\x53\x05\x98\x06" // Ki 39080 + "\xe9\x9b\x82\xb3\x6c\x4a\xe8\xea\x19\xe9\x5d\xfa\x9e\xde\x88\x2c", // Ke 39081 + .klen = 4 + 4 + 16 * 2, 39082 + .ptext = 39083 + "\xB6\x98\x22\xA1\x9A\x6B\x09\xC0\xEB\xC8\x55\x7D\x1F\x1B\x6C\x0A" // Confounder 39084 + "", // Plain 39085 + .plen = 16 + 0, 39086 + .ctext = 39087 + "\xC4\x66\xF1\x87\x10\x69\x92\x1E\xDB\x7C\x6F\xDE\x24\x4A\x52\xDB" 39088 + "\x0B\xA1\x0E\xDC\x19\x7B\xDB\x80\x06\x65\x8C\xA3\xCC\xCE\x6E\xB8", 39089 + .clen = 16 + 0 + 16, 39090 + }, { 39091 + // "enc 1 plain", 39092 + .key = 39093 + AUTHENC_KEY_HEADER("\x00\x00\x00\x10") 39094 + "\x13\x5f\xe7\x11\x6f\x53\xc2\xaa\x36\x12\xb7\xea\xe0\xf2\x84\xaa" // Ki 39095 + "\xa7\xed\xcd\x53\x97\xea\x6d\x12\xb0\xaf\xf4\xcb\x8d\xaa\x57\xad", // Ke 39096 + .klen = 4 + 4 + 16 * 2, 39097 + .ptext = 39098 + "\x6F\x2F\xC3\xC2\xA1\x66\xFD\x88\x98\x96\x7A\x83\xDE\x95\x96\xD9" // Confounder 39099 + "1", // Plain 39100 + .plen = 16 + 1, 39101 + .ctext = 39102 + "\x84\x2D\x21\xFD\x95\x03\x11\xC0\xDD\x46\x4A\x3F\x4B\xE8\xD6\xDA" 39103 + "\x88\xA5\x6D\x55\x9C\x9B\x47\xD3\xF9\xA8\x50\x67\xAF\x66\x15\x59" 39104 + "\xB8", 39105 + .clen = 16 + 1 + 16, 39106 + }, { 39107 + // "enc 9 plain", 39108 + .key = 39109 + AUTHENC_KEY_HEADER("\x00\x00\x00\x10") 39110 + "\x10\x2c\x34\xd0\x75\x74\x9f\x77\x8a\x15\xca\xd1\xe9\x7d\xa9\x86" // Ki 39111 + "\xdd\xe4\x2e\xca\x7c\xd9\x86\x3f\xc3\xce\x89\xcb\xc9\x43\x62\xd7", // Ke 39112 + .klen = 4 + 4 + 16 * 2, 39113 + .ptext = 39114 + "\xA5\xB4\xA7\x1E\x07\x7A\xEE\xF9\x3C\x87\x63\xC1\x8F\xDB\x1F\x10" // Confounder 39115 + "9 bytesss", // Plain 39116 + .plen = 16 + 9, 39117 + .ctext = 39118 + "\x61\x9F\xF0\x72\xE3\x62\x86\xFF\x0A\x28\xDE\xB3\xA3\x52\xEC\x0D" 39119 + "\x0E\xDF\x5C\x51\x60\xD6\x63\xC9\x01\x75\x8C\xCF\x9D\x1E\xD3\x3D" 39120 + "\x71\xDB\x8F\x23\xAA\xBF\x83\x48\xA0", 39121 + .clen = 16 + 9 + 16, 39122 + }, { 39123 + // "enc 13 plain", 39124 + .key = 39125 + AUTHENC_KEY_HEADER("\x00\x00\x00\x10") 39126 + "\xb8\xc4\x38\xcc\x1a\x00\x60\xfc\x91\x3a\x8e\x07\x16\x96\xbd\x08" // Ki 39127 + "\xc3\x11\x3a\x25\x85\x90\xb9\xae\xbf\x72\x1b\x1a\xf6\xb0\xcb\xf8", // Ke 39128 + .klen = 4 + 4 + 16 * 2, 39129 + .ptext = 39130 + "\x19\xFE\xE4\x0D\x81\x0C\x52\x4B\x5B\x22\xF0\x18\x74\xC6\x93\xDA" // Confounder 39131 + "13 bytes byte", // Plain 39132 + .plen = 16 + 13, 39133 + .ctext = 39134 + "\xB8\xEC\xA3\x16\x7A\xE6\x31\x55\x12\xE5\x9F\x98\xA7\xC5\x00\x20" 39135 + "\x5E\x5F\x63\xFF\x3B\xB3\x89\xAF\x1C\x41\xA2\x1D\x64\x0D\x86\x15" 39136 + "\xC9\xED\x3F\xBE\xB0\x5A\xB6\xAC\xB6\x76\x89\xB5\xEA", 39137 + .clen = 16 + 13 + 16, 39138 + }, { 39139 + // "enc 30 plain", 39140 + .key = 39141 + AUTHENC_KEY_HEADER("\x00\x00\x00\x10") 39142 + "\x18\xaf\x19\xb0\x23\x74\x44\xfd\x75\x04\xad\x7d\xbd\x48\xad\xd3" // Ki 39143 + "\x8b\x07\xee\xd3\x01\x49\x91\x6a\xa2\x0d\xb3\xf5\xce\xd8\xaf\xad", // Ke 39144 + .klen = 4 + 4 + 16 * 2, 39145 + .ptext = 39146 + "\xCA\x7A\x7A\xB4\xBE\x19\x2D\xAB\xD6\x03\x50\x6D\xB1\x9C\x39\xE2" // Confounder 39147 + "30 bytes bytes bytes bytes byt", // Plain 39148 + .plen = 16 + 30, 39149 + .ctext = 39150 + "\xA2\x6A\x39\x05\xA4\xFF\xD5\x81\x6B\x7B\x1E\x27\x38\x0D\x08\x09" 39151 + "\x0C\x8E\xC1\xF3\x04\x49\x6E\x1A\xBD\xCD\x2B\xDC\xD1\xDF\xFC\x66" 39152 + "\x09\x89\xE1\x17\xA7\x13\xDD\xBB\x57\xA4\x14\x6C\x15\x87\xCB\xA4" 39153 + "\x35\x66\x65\x59\x1D\x22\x40\x28\x2F\x58\x42\xB1\x05\xA5", 39154 + .clen = 16 + 30 + 16, 39155 + }, { 39156 + // "enc no plain", 39157 + .key = 39158 + AUTHENC_KEY_HEADER("\x00\x00\x00\x20") 39159 + "\xa2\xb8\x33\xe9\x43\xbb\x10\xee\x53\xb4\xa1\x9b\xc2\xbb\xc7\xe1" 39160 + "\x9b\x87\xad\x5d\xe9\x21\x22\xa4\x33\x8b\xe6\xf7\x32\xfd\x8a\x0e" // Ki 39161 + "\x6c\xcb\x3f\x25\xd8\xae\x57\xf4\xe8\xf6\xca\x47\x4b\xdd\xef\xf1" 39162 + "\x16\xce\x13\x1b\x3f\x71\x01\x2e\x75\x6d\x6b\x1e\x3f\x70\xa7\xf1", // Ke 39163 + .klen = 4 + 4 + 32 * 2, 39164 + .ptext = 39165 + "\x3C\xBB\xD2\xB4\x59\x17\x94\x10\x67\xF9\x65\x99\xBB\x98\x92\x6C" // Confounder 39166 + "", // Plain 39167 + .plen = 16 + 0, 39168 + .ctext = 39169 + "\x03\x88\x6D\x03\x31\x0B\x47\xA6\xD8\xF0\x6D\x7B\x94\xD1\xDD\x83" 39170 + "\x7E\xCC\xE3\x15\xEF\x65\x2A\xFF\x62\x08\x59\xD9\x4A\x25\x92\x66", 39171 + .clen = 16 + 0 + 16, 39172 + }, { 39173 + // "enc 1 plain", 39174 + .key = 39175 + AUTHENC_KEY_HEADER("\x00\x00\x00\x20") 39176 + "\x84\x61\x4b\xfa\x98\xf1\x74\x8a\xa4\xaf\x99\x2b\x8c\x26\x28\x0d" 39177 + "\xc8\x98\x73\x29\xdf\x77\x5c\x1d\xb0\x4a\x43\xf1\x21\xaa\x86\x65" // Ki 39178 + "\xe9\x31\x73\xaa\x01\xeb\x3c\x24\x62\x31\xda\xfc\x78\x02\xee\x32" 39179 + "\xaf\x24\x85\x1d\x8c\x73\x87\xd1\x8c\xb9\xb2\xc5\xb7\xf5\x70\xb8", // Ke 39180 + .klen = 4 + 4 + 32 * 2, 39181 + .ptext = 39182 + "\xDE\xF4\x87\xFC\xEB\xE6\xDE\x63\x46\xD4\xDA\x45\x21\xBB\xA2\xD2" // Confounder 39183 + "1", // Plain 39184 + .plen = 16 + 1, 39185 + .ctext = 39186 + "\x2C\x9C\x15\x70\x13\x3C\x99\xBF\x6A\x34\xBC\x1B\x02\x12\x00\x2F" 39187 + "\xD1\x94\x33\x87\x49\xDB\x41\x35\x49\x7A\x34\x7C\xFC\xD9\xD1\x8A" 39188 + "\x12", 39189 + .clen = 16 + 1 + 16, 39190 + }, { 39191 + // "enc 9 plain", 39192 + .key = 39193 + AUTHENC_KEY_HEADER("\x00\x00\x00\x20") 39194 + "\x47\xb9\xf5\xba\xd7\x63\x00\x58\x2a\x54\x45\xfa\x0c\x1b\x29\xc3" 39195 + "\xaa\x83\xec\x63\xb9\x0b\x4a\xb0\x08\x48\xc1\x85\x67\x4f\x44\xa7" // Ki 39196 + "\xcd\xa2\xd3\x9a\x9b\x24\x3f\xfe\xb5\x6e\x8d\x5f\x4b\xd5\x28\x74" 39197 + "\x1e\xcb\x52\x0c\x62\x12\x3f\xb0\x40\xb8\x41\x8b\x15\xc7\xd7\x0c", // Ke 39198 + .klen = 4 + 4 + 32 * 2, 39199 + .ptext = 39200 + "\xAD\x4F\xF9\x04\xD3\x4E\x55\x53\x84\xB1\x41\x00\xFC\x46\x5F\x88" // Confounder 39201 + "9 bytesss", // Plain 39202 + .plen = 16 + 9, 39203 + .ctext = 39204 + "\x9C\x6D\xE7\x5F\x81\x2D\xE7\xED\x0D\x28\xB2\x96\x35\x57\xA1\x15" 39205 + "\x64\x09\x98\x27\x5B\x0A\xF5\x15\x27\x09\x91\x3F\xF5\x2A\x2A\x9C" 39206 + "\x8E\x63\xB8\x72\xF9\x2E\x64\xC8\x39", 39207 + .clen = 16 + 9 + 16, 39208 + }, { 39209 + // "enc 13 plain", 39210 + .key = 39211 + AUTHENC_KEY_HEADER("\x00\x00\x00\x20") 39212 + "\x15\x2f\x8c\x9d\xc9\x85\x79\x6e\xb1\x94\xed\x14\xc5\x9e\xac\xdd" 39213 + "\x41\x8a\x33\x32\x36\xb7\x8f\xaf\xa7\xc7\x9b\x04\xe0\xac\xe7\xbf" // Ki 39214 + "\xcd\x8a\x10\xe2\x79\xda\xdd\xb6\x90\x1e\xc3\x0b\xdf\x98\x73\x25" 39215 + "\x0f\x6e\xfc\x6a\x77\x36\x7d\x74\xdc\x3e\xe7\xf7\x4b\xc7\x77\x4e", // Ke 39216 + .klen = 4 + 4 + 32 * 2, 39217 + .ptext = 39218 + "\xCF\x9B\xCA\x6D\xF1\x14\x4E\x0C\x0A\xF9\xB8\xF3\x4C\x90\xD5\x14" // Confounder 39219 + "13 bytes byte", 39220 + .plen = 16 + 13, 39221 + .ctext = 39222 + "\xEE\xEC\x85\xA9\x81\x3C\xDC\x53\x67\x72\xAB\x9B\x42\xDE\xFC\x57" 39223 + "\x06\xF7\x26\xE9\x75\xDD\xE0\x5A\x87\xEB\x54\x06\xEA\x32\x4C\xA1" 39224 + "\x85\xC9\x98\x6B\x42\xAA\xBE\x79\x4B\x84\x82\x1B\xEE", 39225 + .clen = 16 + 13 + 16, 39226 + }, { 39227 + // "enc 30 plain", 39228 + .key = 39229 + AUTHENC_KEY_HEADER("\x00\x00\x00\x20") 39230 + "\x04\x8d\xeb\xf7\xb1\x2c\x09\x32\xe8\xb2\x96\x99\x6c\x23\xf8\xb7" 39231 + "\x9d\x59\xb9\x7e\xa1\x19\xfc\x0c\x15\x6b\xf7\x88\xdc\x8c\x85\xe8" // Ki 39232 + "\x1d\x51\x47\xf3\x4b\xb0\x01\xa0\x4a\x68\xa7\x13\x46\xe7\x65\x4e" 39233 + "\x02\x23\xa6\x0d\x90\xbc\x2b\x79\xb4\xd8\x79\x56\xd4\x7c\xd4\x2a", // Ke 39234 + .klen = 4 + 4 + 32 * 2, 39235 + .ptext = 39236 + "\x64\x4D\xEF\x38\xDA\x35\x00\x72\x75\x87\x8D\x21\x68\x55\xE2\x28" // Confounder 39237 + "30 bytes bytes bytes bytes byt", // Plain 39238 + .plen = 16 + 30, 39239 + .ctext = 39240 + "\x0E\x44\x68\x09\x85\x85\x5F\x2D\x1F\x18\x12\x52\x9C\xA8\x3B\xFD" 39241 + "\x8E\x34\x9D\xE6\xFD\x9A\xDA\x0B\xAA\xA0\x48\xD6\x8E\x26\x5F\xEB" 39242 + "\xF3\x4A\xD1\x25\x5A\x34\x49\x99\xAD\x37\x14\x68\x87\xA6\xC6\x84" 39243 + "\x57\x31\xAC\x7F\x46\x37\x6A\x05\x04\xCD\x06\x57\x14\x74", 39244 + .clen = 16 + 30 + 16, 39245 + }, 39246 + }; 39247 + 38897 39248 #endif /* _CRYPTO_TESTMGR_H */