1/* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22/* 23 * Copyright (c) 2010, Oracle and/or its affiliates. All rights reserved. 24 */ 25 26#include <sys/types.h> 27 28/* 29 * AES ECB/CBC test vectors 30 */ 31 32/* AES Known Key (up to 256-bits). */ 33uint8_t aes_known_key[] = { 34 'A', 'E', 'S', '-', '1', '2', '8', ' ', 35 'R', 'I', 'J', 'N', 'D', 'A', 'E', 'L', 36 'L', 'E', 'A', 'D', 'N', 'J', 'I', 'R', 37 ' ', '8', '2', '1', '-', 'S', 'E', 'A' 38}; 39 40/* AES-CBC Known Initialization Vector (128-bits). */ 41uint8_t aes_cbc_known_initialization_vector[] = { 42 'S', 'e', 'c', 'u', 'r', 'i', 't', 'y', 43 'y', 't', 'i', 'r', 'u', 'c', 'e', 'S' 44}; 45 46/* AES Known Plaintext (128-bits). (blocksize is 128-bits) */ 47uint8_t aes_known_plaintext[] = { 48 'S', 'u', 'n', ' ', 'O', 'p', 'e', 'n', 49 ' ', 'S', 'o', 'l', 'a', 'r', 'i', 's' 50}; 51 52/* AES Known Ciphertext (128-bit key). */ 53uint8_t aes_ecb128_known_ciphertext[] = { 54 0xcc, 0xd1, 0xd0, 0xf3, 0xfd, 0x44, 0xb1, 0x4d, 55 0xfe, 0x33, 0x20, 0x72, 0x3c, 0xf3, 0x4d, 0x27 56}; 57 58uint8_t aes_cbc128_known_ciphertext[] = { 59 0x59, 0x34, 0x55, 0xd1, 0x89, 0x9b, 0xf4, 0xa5, 60 0x16, 0x2c, 0x4c, 0x14, 0xd3, 0xe2, 0xe5, 0xed 61}; 62 63/* AES Known Ciphertext (192-bit key). */ 64uint8_t aes_ecb192_known_ciphertext[] = { 65 0xa3, 0x78, 0x10, 0x44, 0xd8, 0xee, 0x8a, 0x98, 66 0x41, 0xa4, 0xeb, 0x96, 0x57, 0xd8, 0xa0, 0xc5 67}; 68 69uint8_t aes_cbc192_known_ciphertext[] = { 70 0x22, 0x9c, 0x68, 0xc6, 0x86, 0x68, 0xcc, 0x6a, 71 0x56, 0x2c, 0xb8, 0xe0, 0x16, 0x4e, 0x8b, 0x78 72}; 73 74/* AES Known Ciphertext (256-bit key). */ 75uint8_t aes_ecb256_known_ciphertext[] = { 76 0xe4, 0x65, 0x92, 0x7f, 0xd0, 0xdd, 0x59, 0x49, 77 0x79, 0xc3, 0xac, 0x96, 0x30, 0xad, 0x32, 0x52 78}; 79 80uint8_t aes_cbc256_known_ciphertext[] = { 81 0xd9, 0x44, 0x43, 0xe8, 0xdb, 0x60, 0x6b, 0xde, 82 0xc2, 0x84, 0xbf, 0xb9, 0xaf, 0x43, 0x3f, 0x51 83}; 84 85/* AES-CTR Known Key (128-bits). */ 86uint8_t aes_ctr128_known_key[] = { 87 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 88 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c 89}; 90 91/* AES-CTR Known Key (192-bits). */ 92uint8_t aes_ctr192_known_key[] = { 93 0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, 94 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5, 95 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b 96}; 97 98/* AES-CTR Known Key (256-bits). */ 99uint8_t aes_ctr256_known_key[] = { 100 0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 101 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81, 102 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, 103 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4 104}; 105 106/* AES-CTR Known Initialization Counter (128-bits). */ 107uint8_t aes_ctr_known_counter[] = { 108 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 109 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff 110}; 111 112/* AES-CTR Known Plaintext (128-bits). */ 113uint8_t aes_ctr_known_plaintext[] = { 114 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 115 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a 116}; 117 118/* AES-CTR Known Ciphertext. */ 119uint8_t aes_ctr128_known_ciphertext[] = { 120 0x87, 0x4d, 0x61, 0x91, 0xb6, 0x20, 0xe3, 0x26, 121 0x1b, 0xef, 0x68, 0x64, 0x99, 0x0d, 0xb6, 0xce 122}; 123 124uint8_t aes_ctr192_known_ciphertext[] = { 125 0x1a, 0xbc, 0x93, 0x24, 0x17, 0x52, 0x1c, 0xa2, 126 0x4f, 0x2b, 0x04, 0x59, 0xfe, 0x7e, 0x6e, 0x0b 127}; 128 129uint8_t aes_ctr256_known_ciphertext[] = { 130 0x60, 0x1e, 0xc3, 0x13, 0x77, 0x57, 0x89, 0xa5, 131 0xb7, 0xa7, 0xf5, 0x04, 0xbb, 0xf3, 0xd2, 0x28 132}; 133 134/* AES-CCM Known Key (128-bits). */ 135uint8_t aes_ccm128_known_key[] = { 136 0x06, 0xfd, 0xf0, 0x83, 0xb5, 0xcb, 0x3b, 0xc7, 137 0xc0, 0x6d, 0x4d, 0xe5, 0xa6, 0x34, 0xc6, 0x50 138}; 139 140/* AES-CCM Known Key (192-bits). */ 141uint8_t aes_ccm192_known_key[] = { 142 0xde, 0x91, 0x08, 0x63, 0xbe, 0x59, 0xb8, 0x7a, 143 0x45, 0x9b, 0xa6, 0xce, 0x2d, 0x7e, 0x71, 0x56, 144 0x1c, 0x5c, 0x15, 0xea, 0x1b, 0x6b, 0x05, 0x06 145}; 146 147/* AES-CCM Known Key (256-bits). */ 148uint8_t aes_ccm256_known_key[] = { 149 0x84, 0x9c, 0x1d, 0xeb, 0x80, 0xf8, 0x5b, 0x7d, 150 0x25, 0x33, 0x64, 0x75, 0x4b, 0xdc, 0x5d, 0xf0, 151 0xe8, 0x1c, 0x98, 0x8a, 0x78, 0x8f, 0x15, 0xd1, 152 0xa2, 0x52, 0x49, 0xfa, 0x18, 0x5e, 0x1f, 0xd3 153}; 154 155/* AES-CCM Known Nonce Nlen = 7 bytes (for 128-bits key). */ 156uint8_t aes_ccm128_known_nonce[] = { 157 0xfd, 0xe2, 0xd5, 0x4c, 0x65, 0x4e, 0xe4 158}; 159 160/* AES-CCM Known Nonce Nlen = 7 bytes (192-bits). */ 161uint8_t aes_ccm192_known_nonce[] = { 162 0xcf, 0xb3, 0x48, 0xfa, 0x04, 0x36, 0xa2 163}; 164 165/* AES-CCM Known Nonce Nlen = 7 bytes (256-bits). */ 166uint8_t aes_ccm256_known_nonce[] = { 167 0x75, 0xa5, 0x5b, 0x58, 0x33, 0x9d, 0x1c 168}; 169 170/* AES-CCM Known Adata Alen = 30 bytes (128-bits). */ 171uint8_t aes_ccm128_known_adata[] = { 172 0xe0, 0xdf, 0xfc, 0x4c, 0x92, 0x90, 0xd8, 0x28, 173 0xef, 0xe7, 0xc6, 0xbe, 0x4a, 0xbc, 0xd1, 0x3e, 174 0x23, 0x61, 0x92, 0x2f, 0xfa, 0x27, 0xa4, 0x0e, 175 0x61, 0x24, 0x58, 0x38, 0x55, 0x33 176}; 177 178/* AES-CCM Known Adata Alen = 30 bytes (192-bits). */ 179uint8_t aes_ccm192_known_adata[] = { 180 0x4c, 0x5b, 0x4f, 0xfe, 0x80, 0xba, 0x7a, 0xe5, 181 0xd3, 0xe8, 0xbc, 0xf6, 0x55, 0x83, 0xcf, 0x58, 182 0xa2, 0x82, 0x59, 0x65, 0xba, 0xbd, 0x63, 0x53, 183 0x0c, 0xb0, 0x0c, 0x14, 0xd4, 0x7b 184}; 185 186/* AES-CCM Known Adata Alen = 30 bytes (256-bits). */ 187uint8_t aes_ccm256_known_adata[] = { 188 0x27, 0xb7, 0xec, 0x91, 0x08, 0xe1, 0x4d, 0x12, 189 0xd3, 0xd3, 0xb8, 0x49, 0x09, 0xde, 0xd0, 0x9a, 190 0x8f, 0x23, 0xbf, 0xd6, 0x02, 0x9b, 0x2a, 0x5e, 191 0x4a, 0x5a, 0x63, 0x8c, 0x72, 0x14 192}; 193/* AES-CCM Known Payload Plen = 32 bytes (128-bits). */ 194uint8_t aes_ccm128_known_plaintext[] = { 195 0x77, 0xca, 0xdf, 0xa5, 0xb1, 0x23, 0xfe, 0x07, 196 0x8d, 0xca, 0x94, 0xe2, 0x66, 0x3f, 0x73, 0xd0, 197 0x3f, 0x0b, 0x4d, 0xc8, 0x05, 0xf6, 0x1c, 0xef, 198 0x13, 0x79, 0xc0, 0xb1, 0xfc, 0x76, 0xea, 0x11 199}; 200 201/* AES-CCM Known Payload Plen = 32 bytes (192-bits). */ 202uint8_t aes_ccm192_known_plaintext[] = { 203 0xf9, 0x8a, 0x58, 0x59, 0x44, 0x2d, 0x2a, 0xf9, 204 0x65, 0x03, 0x36, 0x6d, 0x8a, 0x58, 0x29, 0xf9, 205 0xef, 0x47, 0x44, 0x30, 0xf4, 0x7e, 0x0d, 0xcd, 206 0x73, 0x41, 0x45, 0xdf, 0x50, 0xb2, 0x1b, 0x29 207}; 208 209/* AES-CCM Known Payload Plen = 32 bytes (256-bits). */ 210uint8_t aes_ccm256_known_plaintext[] = { 211 0x25, 0x28, 0x3f, 0x05, 0x41, 0xd6, 0x66, 0x3b, 212 0xdb, 0x8f, 0xe9, 0xe7, 0x7b, 0x06, 0xc0, 0xee, 213 0xfe, 0xf6, 0xc9, 0x8b, 0x45, 0x08, 0x18, 0x4e, 214 0x2e, 0xf7, 0x8e, 0x64, 0xc3, 0xf2, 0xad, 0x18 215}; 216 217/* 218 * AES-CCM Known Ciphertext 219 * Clen = 32 bytes + Tlen = 16 bytes (128-bits). 220 */ 221uint8_t aes_ccm128_known_ciphertext[] = { 222 0x33, 0x50, 0x58, 0xbb, 0x5f, 0x13, 0x8d, 0xc9, 223 0x5b, 0x2c, 0xa4, 0x50, 0x1d, 0x7f, 0xd4, 0xa5, 224 0xb9, 0xb8, 0x71, 0x83, 0x8f, 0x82, 0x27, 0x5f, 225 0x75, 0x3e, 0x30, 0xf9, 0x9d, 0xad, 0xc2, 0xe9, 226 0x66, 0x93, 0x56, 0x98, 0x01, 0x1e, 0x3c, 0x11, 227 0x74, 0xdb, 0x9b, 0xca, 0xce, 0x0f, 0xc3, 0x35 228}; 229 230/* 231 * AES-CCM Known Ciphertext 232 * Clen = 32 bytes + Tlen = 16 bytes (192-bits). 233 */ 234uint8_t aes_ccm192_known_ciphertext[] = { 235 0xa7, 0x40, 0xd0, 0x25, 0xbd, 0x3e, 0x8f, 0xd5, 236 0x28, 0x3e, 0xee, 0xaa, 0xf9, 0xa7, 0xfc, 0xf2, 237 0x33, 0xf6, 0x69, 0xb8, 0xdc, 0x9c, 0x74, 0xb1, 238 0x46, 0xf4, 0xd6, 0xcc, 0x0a, 0x16, 0x12, 0x0c, 239 0x7c, 0x3c, 0x43, 0x76, 0x94, 0xf6, 0x9a, 0x14, 240 0xa0, 0xfb, 0xab, 0x9c, 0x2c, 0xd3, 0x5c, 0x09 241}; 242 243/* 244 * AES-CCM Known Ciphertext 245 * Clen = 32 bytes + Tlen = 16 bytes (256-bits). 246 */ 247uint8_t aes_ccm256_known_ciphertext[] = { 248 0xf6, 0x4d, 0x24, 0x69, 0x0e, 0xde, 0xc9, 0xc0, 249 0x1e, 0x42, 0xc0, 0x78, 0x29, 0xcf, 0xdb, 0xfe, 250 0xab, 0x52, 0x9a, 0xb1, 0x07, 0xe4, 0xac, 0xdf, 251 0x48, 0x46, 0x46, 0xc1, 0xe2, 0xb2, 0x0f, 0x36, 252 0x5f, 0xeb, 0x44, 0xcf, 0xa8, 0x80, 0x80, 0x23, 253 0xc9, 0xee, 0xc7, 0x56, 0x24, 0x63, 0x6e, 0x7e 254}; 255 256/* AES-GCM Known Key (128-bits). */ 257uint8_t aes_gcm128_known_key[] = { 258 0x7d, 0xf9, 0x9c, 0xdf, 0x7d, 0x00, 0xd9, 0xea, 259 0xd3, 0x85, 0x17, 0x1b, 0x29, 0xae, 0xcf, 0xbc 260}; 261 262/* AES-GCM Known Key (192-bits). */ 263uint8_t aes_gcm192_known_key[] = { 264 0x85, 0xf4, 0x34, 0x7a, 0xf5, 0x98, 0x1e, 0xd9, 265 0x89, 0x85, 0x98, 0x1a, 0x53, 0xfc, 0xc5, 0xbf, 266 0x53, 0x6c, 0x91, 0x4b, 0x18, 0x3c, 0xe8, 0x12 267}; 268 269/* AES-GCM Known Key (256-bits). */ 270uint8_t aes_gcm256_known_key[] = { 271 0xee, 0xbc, 0x1f, 0x57, 0x48, 0x7f, 0x51, 0x92, 272 0x1c, 0x04, 0x65, 0x66, 0x5f, 0x8a, 0xe6, 0xd1, 273 0x65, 0x8b, 0xb2, 0x6d, 0xe6, 0xf8, 0xa0, 0x69, 274 0xa3, 0x52, 0x02, 0x93, 0xa5, 0x72, 0x07, 0x8f 275}; 276 277/* AES-GCM Known Initialization Vector (128-bits). */ 278uint8_t aes_gcm128_known_iv[] = { 279 0x27, 0x4c, 0x4e, 0xae, 0xfe, 0xef, 0xae, 0x26, 280 0x80, 0xb0, 0xef, 0xd5 281}; 282 283/* AES-GCM Known Initialization Vector (192-bits). */ 284uint8_t aes_gcm192_known_iv[] = { 285 0xd4, 0xfb, 0x33, 0xc6, 0x51, 0xc8, 0x86, 0xff, 286 0x28, 0x80, 0xef, 0x96 287}; 288 289/* AES-GCM Known Initialization Vector (256-bits). */ 290uint8_t aes_gcm256_known_iv[] = { 291 0x99, 0xaa, 0x3e, 0x68, 0xed, 0x81, 0x73, 0xa0, 292 0xee, 0xd0, 0x66, 0x84 293}; 294 295/* AES-GCM Known AAD Alen = 16 bytes (128-bits). */ 296uint8_t aes_gcm128_known_adata[] = { 297 0x60, 0xe8, 0xb0, 0x37, 0xec, 0xdf, 0x4d, 0x82, 298 0x8c, 0x83, 0x0d, 0xcf, 0xc5, 0xce, 0xd4, 0x9c 299}; 300 301/* AES-GCM Known AAD Alen = 16 bytes (192-bits). */ 302uint8_t aes_gcm192_known_adata[] = { 303 0x44, 0x3a, 0xdf, 0xad, 0xbb, 0x29, 0xd6, 0x8c, 304 0x55, 0xe2, 0x02, 0x2d, 0xca, 0x62, 0x9b, 0x51 305}; 306 307/* AES-GCM Known AAD Alen = 16 bytes (256-bits). */ 308uint8_t aes_gcm256_known_adata[] = { 309 0x4d, 0x23, 0xc3, 0xce, 0xc3, 0x34, 0xb4, 0x9b, 310 0xdb, 0x37, 0x0c, 0x43, 0x7f, 0xec, 0x78, 0xde 311}; 312 313/* AES-GCM Known Payload Plen = 16 bytes (128-bits). */ 314uint8_t aes_gcm128_known_plaintext[] = { 315 0x99, 0x66, 0x7d, 0xc9, 0x62, 0xb3, 0x9f, 0x14, 316 0x8c, 0xdd, 0xfe, 0x68, 0xf9, 0x0a, 0x43, 0xf9 317}; 318/* AES-GCM Known Payload Plen = 16 bytes (192-bits). */ 319uint8_t aes_gcm192_known_plaintext[] = { 320 0x7f, 0x9c, 0x08, 0x1d, 0x6a, 0xcc, 0xa8, 0xab, 321 0x71, 0x75, 0xcb, 0xd0, 0x49, 0x42, 0xba, 0xad 322}; 323/* AES-GCM Known Payload Plen = 16 bytes (256-bits). */ 324uint8_t aes_gcm256_known_plaintext[] = { 325 0xf5, 0x6e, 0x87, 0x05, 0x5b, 0xc3, 0x2d, 0x0e, 326 0xeb, 0x31, 0xb2, 0xea, 0xcc, 0x2b, 0xf2, 0xa5 327}; 328 329/* AES-GCM Known Ciphertext Clen = 16 bytes (128-bits) + tag */ 330uint8_t aes_gcm128_known_ciphertext[] = { 331 0x2b, 0x5f, 0x57, 0xf2, 0x62, 0x27, 0xe0, 0x94, 332 0xe7, 0xf8, 0x01, 0x23, 0xf9, 0xed, 0xbd, 0xe8, 333 0x16, 0xee, 0x08, 0xb4, 0xd8, 0x07, 0xe5, 0xdb, 334 0xd5, 0x70, 0x3c, 0xb3, 0xcf, 0x53, 0x8c, 0x14 335}; 336 337/* AES-GCM Known Ciphertext Clen = 16 bytes (192-bits) + tag */ 338uint8_t aes_gcm192_known_ciphertext[] = { 339 0xdd, 0x7e, 0x7e, 0x45, 0x5b, 0x21, 0xd8, 0x84, 340 0x3d, 0x7b, 0xc3, 0x1f, 0x21, 0x07, 0xf9, 0x55, 341 0x9f, 0x0e, 0x8d, 0xe2, 0x6d, 0xb4, 0x95, 0xf5, 342 0x91, 0x1f, 0xb6, 0x0c, 0xf5, 0xf2, 0x3a, 0xf9 343}; 344 345/* AES-GCM Known Ciphertext Clen = 16 bytes (256-bits)+ tag */ 346uint8_t aes_gcm256_known_ciphertext[] = { 347 0xf7, 0x26, 0x44, 0x13, 0xa8, 0x4c, 0x0e, 0x7c, 348 0xd5, 0x36, 0x86, 0x7e, 0xb9, 0xf2, 0x17, 0x36, 349 0x67, 0xba, 0x05, 0x10, 0x26, 0x2a, 0xe4, 0x87, 350 0xd7, 0x37, 0xee, 0x62, 0x98, 0xf7, 0x7e, 0x0c 351}; 352 353/* 354 * Source: NIST gcmEncryptExtIV128.txt 355 * Count = 0, [Keylen = 128], [IVlen = 96], [PTlen = 0], 356 * [AADlen = 128], [Taglen = 128] 357 * 358 * Source: NIST gcmEncryptExtIV192.txt 359 * Count = 0, [Keylen = 192], [IVlen = 96], [PTlen = 0], 360 * [AADlen = 128], [Taglen = 128] 361 * 362 * Source: NIST gcmEncryptExtIV256.txt 363 * Count = 0, [Keylen = 256], [IVlen = 96], [PTlen = 0], 364 * [AADlen = 128], [Taglen = 128] 365 */ 366 367/* AES-GMAC Known Key (128-bits). */ 368uint8_t aes_gmac128_known_key[] = { 369 0x7d, 0x70, 0xd2, 0x32, 0x48, 0xc4, 0x7e, 0xb3, 370 0xd2, 0x73, 0xdf, 0x81, 0xed, 0x30, 0x24, 0xbd 371}; 372 373/* AES-GMAC Known Key (192-bits). */ 374uint8_t aes_gmac192_known_key[] = { 375 0x03, 0x60, 0x22, 0xfe, 0x26, 0x9a, 0xdc, 0xad, 376 0xb5, 0x73, 0x11, 0xa4, 0xa0, 0xed, 0x2a, 0x84, 377 0x18, 0x34, 0xb8, 0xb6, 0xd8, 0xa0, 0x7f, 0x41 378}; 379 380/* AES-GMAC Known Key (256-bits). */ 381uint8_t aes_gmac256_known_key[] = { 382 0xbb, 0x10, 0x10, 0x06, 0x4f, 0xb8, 0x35, 0x23, 383 0xea, 0x9d, 0xf3, 0x2b, 0xad, 0x9f, 0x1f, 0x2a, 384 0x4f, 0xce, 0xfc, 0x0f, 0x21, 0x07, 0xc0, 0xaa, 385 0xba, 0xd9, 0xb7, 0x56, 0xd8, 0x09, 0x21, 0x9d 386}; 387 388/* AES-GMAC Known Initialization Vector (128-bits). */ 389uint8_t aes_gmac128_known_iv[] = { 390 0xab, 0x53, 0x23, 0x33, 0xd6, 0x76, 0x51, 0x20, 391 0x8b, 0x8c, 0x34, 0x85 392}; 393 394/* AES-GMAC Known Initialization Vector (192-bits). */ 395uint8_t aes_gmac192_known_iv[] = { 396 0x85, 0x65, 0xb2, 0x15, 0x3a, 0x3f, 0x34, 0x9a, 397 0x07, 0x31, 0x06, 0x79 398}; 399 400/* AES-GMAC Known Initialization Vector (256-bits). */ 401uint8_t aes_gmac256_known_iv[] = { 402 0x2f, 0x9a, 0xd0, 0x12, 0xad, 0xfc, 0x12, 0x73, 403 0x43, 0xfb, 0xe0, 0x56 404}; 405 406/* AES-GMAC Known Tag (128-bits). */ 407uint8_t aes_gmac128_known_tag[] = { 408 0xcf, 0x89, 0x50, 0xa3, 0x10, 0xf5, 0xab, 0x8b, 409 0x69, 0xd5, 0x00, 0x11, 0x1a, 0x44, 0xb0, 0x96 410}; 411 412/* AES-GMAC Known Tag (192-bits). */ 413uint8_t aes_gmac192_known_tag[] = { 414 0x90, 0x21, 0xaf, 0x4c, 0xa0, 0x8d, 0x01, 0xef, 415 0x82, 0x5a, 0x42, 0xf9, 0xbe, 0x3a, 0xb3, 0xe9 416}; 417 418/* AES-GMAC Known Tag (256-bits). */ 419uint8_t aes_gmac256_known_tag[] = { 420 0xef, 0x06, 0xd5, 0x4d, 0xfd, 0x00, 0x02, 0x1d, 421 0x75, 0x27, 0xdf, 0xf2, 0x6f, 0xc9, 0xd4, 0x84 422}; 423 424/* AES-GMAC Known AAD Alen = 16 bytes (128-bits). */ 425uint8_t aes_gmac128_known_adata[] = { 426 0x7d, 0x1d, 0x42, 0xe8, 0x94, 0x60, 0xe9, 0x44, 427 0xbf, 0xa4, 0x83, 0xdb, 0xe6, 0x92, 0xf0, 0x8d 428}; 429 430/* AES-GMAC Known AAD Alen = 16 bytes (192-bits). */ 431uint8_t aes_gmac192_known_adata[] = { 432 0xad, 0xcf, 0x4f, 0xbb, 0xa0, 0xe0, 0x6a, 0x63, 433 0x70, 0x71, 0x1a, 0x57, 0xf8, 0xdc, 0xd0, 0xc9 434}; 435 436/* AES-GMAC Known AAD Alen = 16 bytes (256-bits). */ 437uint8_t aes_gmac256_known_adata[] = { 438 0xdb, 0x98, 0xd9, 0x0d, 0x1b, 0x69, 0x5c, 0xdb, 439 0x74, 0x7a, 0x34, 0x3f, 0xbb, 0xc9, 0xf1, 0x41 440}; 441 442/* DES3 Known Key. */ 443uint8_t des3_known_key[] = { 444 'A', 'N', 'S', 'I', ' ', 'T', 'r', 'i', 445 'p', 'l', 'e', '-', 'D', 'E', 'S', ' ', 446 'K', 'e', 'y', ' ', 'D', 'a', 't', 'a' 447}; 448 449/* DES3-CBC Known Initialization Vector (64-bits). */ 450uint8_t des3_cbc_known_iv[] = { 451 'S', 'e', 'c', 'u', 'r', 'i', 't', 'y' 452}; 453 454/* DES3 Known Plaintext (64-bits). */ 455uint8_t des3_ecb_known_plaintext[] = { 456 'S', 'o', 'l', 'a', 'r', 'i', 's', '!' 457}; 458uint8_t des3_cbc_known_plaintext[] = { 459 'S', 'o', 'l', 'a', 'r', 'i', 's', '!' 460}; 461 462/* DES3 Known Ciphertext (64-bits). */ 463uint8_t des3_ecb_known_ciphertext[] = { 464 0x17, 0x0d, 0x1f, 0x13, 0xd3, 0xa0, 0x3a, 0x63 465}; 466 467uint8_t des3_cbc_known_ciphertext[] = { 468 0x7f, 0x62, 0x44, 0xb3, 0xf8, 0x77, 0xf8, 0xf8 469}; 470 471 472 473/* 474 * SHA-1 Known Hash Message 475 * Source from NIST SHA1ShortMsg (L = 512-bits). 476 */ 477uint8_t sha1_known_hash_message[] = { 478 0x7e, 0x3a, 0x4c, 0x32, 0x5c, 0xb9, 0xc5, 0x2b, 479 0x88, 0x38, 0x7f, 0x93, 0xd0, 0x1a, 0xe8, 0x6d, 480 0x42, 0x09, 0x8f, 0x5e, 0xfa, 0x7f, 0x94, 0x57, 481 0x38, 0x8b, 0x5e, 0x74, 0xb6, 0xd2, 0x8b, 0x24, 482 0x38, 0xd4, 0x2d, 0x8b, 0x64, 0x70, 0x33, 0x24, 483 0xd4, 0xaa, 0x25, 0xab, 0x6a, 0xad, 0x15, 0x3a, 484 0xe3, 0x0c, 0xd2, 0xb2, 0xaf, 0x4d, 0x5e, 0x5c, 485 0x00, 0xa8, 0xa2, 0xd0, 0x22, 0x0c, 0x61, 0x16 486}; 487 488/* SHA-1 Known Digest Message (160-bits). */ 489uint8_t sha1_known_digest[] = { 490 0xa3, 0x05, 0x44, 0x27, 0xcd, 0xb1, 0x3f, 0x16, 491 0x4a, 0x61, 0x0b, 0x34, 0x87, 0x02, 0x72, 0x4c, 492 0x80, 0x8a, 0x0d, 0xcc 493}; 494 495/* Source from NIST HMAC.txt Count = 0 */ 496uint8_t HMAC_known_secret_key[] = { 497 0x7b, 0x10, 0xf4, 0x12, 0x4b, 0x15, 0xc8, 0x2e 498}; 499 500/* known SHA1 hmac - truncated (10 bytes) */ 501uint8_t known_SHA1_hmac[] = { 502 0x4e, 0xad, 0x12, 0xc2, 0xfe, 0x3d, 0x6e, 0xa4, 503 0x3a, 0xcb 504}; 505 506uint8_t hmac_sha1_known_hash_message[] = { 507 0x27, 0xdc, 0xb5, 0xb1, 0xda, 0xf6, 0x0c, 0xfd, 508 0x3e, 0x2f, 0x73, 0xd4, 0xd6, 0x4c, 0xa9, 0xc6, 509 0x84, 0xf8, 0xbf, 0x71, 0xfc, 0x68, 0x2a, 0x46, 510 0x79, 0x3b, 0x17, 0x90, 0xaf, 0xa4, 0xfe, 0xb1, 511 0x00, 0xca, 0x7a, 0xaf, 0xf2, 0x6f, 0x58, 0xf0, 512 0xe1, 0xd0, 0xed, 0x42, 0xf1, 0xcd, 0xad, 0x1f, 513 0x47, 0x4a, 0xfa, 0x2e, 0x79, 0xd5, 0x3a, 0x0c, 514 0x42, 0x89, 0x2c, 0x4d, 0x7b, 0x32, 0x7c, 0xbe, 515 0x46, 0xb2, 0x95, 0xed, 0x8d, 0xa3, 0xb6, 0xec, 516 0xab, 0x3d, 0x48, 0x51, 0x68, 0x7a, 0x6f, 0x81, 517 0x2b, 0x79, 0xdf, 0x2f, 0x6b, 0x20, 0xf1, 0x1f, 518 0x67, 0x06, 0xf5, 0x30, 0x17, 0x90, 0xca, 0x99, 519 0x62, 0x5a, 0xad, 0x73, 0x91, 0xd8, 0x4f, 0x78, 520 0x04, 0x3d, 0x2a, 0x0a, 0x23, 0x9b, 0x14, 0x77, 521 0x98, 0x4c, 0x15, 0x7b, 0xbc, 0x92, 0x76, 0x06, 522 0x4e, 0x7a, 0x1a, 0x40, 0x6b, 0x06, 0x12, 0xca 523}; 524 525/* 526 * SHA-1 HMAC Known MAC (Case 2) 527 * Source from FIPS PUB 198 (A.2) 528 */ 529uint8_t sha1_hmac_known_secret_key_2[] = { 530 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 531 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 532 0x40, 0x41, 0x42, 0x43 533}; 534 535uint8_t sha1_hmac_known_hash_message_2[] = { 536 'S', 'a', 'm', 'p', 'l', 'e', ' ', '#', '2' 537}; 538 539uint8_t sha1_known_hmac_2[] = { 540 0x09, 0x22, 0xd3, 0x40, 0x5f, 0xaa, 0x3d, 0x19, 541 0x4f, 0x82, 0xa4, 0x58, 0x30, 0x73, 0x7d, 0x5c, 542 0xc6, 0xc7, 0x5d, 0x24 543}; 544 545/* 546 * SHA-256 Known Hash Message (512-bits). 547 * Source from NIST SHA256ShortMsg (Len = 512) 548 */ 549uint8_t sha256_known_hash_message[] = { 550 0x35, 0x92, 0xec, 0xfd, 0x1e, 0xac, 0x61, 0x8f, 551 0xd3, 0x90, 0xe7, 0xa9, 0xc2, 0x4b, 0x65, 0x65, 552 0x32, 0x50, 0x93, 0x67, 0xc2, 0x1a, 0x0e, 0xac, 553 0x12, 0x12, 0xac, 0x83, 0xc0, 0xb2, 0x0c, 0xd8, 554 0x96, 0xeb, 0x72, 0xb8, 0x01, 0xc4, 0xd2, 0x12, 555 0xc5, 0x45, 0x2b, 0xbb, 0xf0, 0x93, 0x17, 0xb5, 556 0x0c, 0x5c, 0x9f, 0xb1, 0x99, 0x75, 0x53, 0xd2, 557 0xbb, 0xc2, 0x9b, 0xb4, 0x2f, 0x57, 0x48, 0xad 558}; 559 560/* known SHA256 Digest Message (32 bytes) */ 561uint8_t known_sha256_digest[] = { 562 0x10, 0x5a, 0x60, 0x86, 0x58, 0x30, 0xac, 0x3a, 563 0x37, 0x1d, 0x38, 0x43, 0x32, 0x4d, 0x4b, 0xb5, 564 0xfa, 0x8e, 0xc0, 0xe0, 0x2d, 0xda, 0xa3, 0x89, 565 0xad, 0x8d, 0xa4, 0xf1, 0x02, 0x15, 0xc4, 0x54 566}; 567 568/* 569 * SHA-384 Known Hash Message (512-bits). 570 * Source from NIST SHA384ShortMsg (Len = 512) 571 */ 572uint8_t sha384_known_hash_message[] = { 573 0x58, 0xbe, 0xab, 0xf9, 0x79, 0xab, 0x35, 0xab, 574 0xba, 0x29, 0x37, 0x6d, 0x5d, 0xc2, 0x27, 0xab, 575 0xb3, 0xd2, 0xff, 0x4d, 0x90, 0x30, 0x49, 0x82, 576 0xfc, 0x10, 0x79, 0xbc, 0x2b, 0x28, 0x80, 0xfc, 577 0xb0, 0x12, 0x9e, 0x4f, 0xed, 0xf2, 0x78, 0x98, 578 0xce, 0x58, 0x6a, 0x91, 0xb7, 0x68, 0x1e, 0x0d, 579 0xba, 0x38, 0x5e, 0x80, 0x0e, 0x79, 0x26, 0xc0, 580 0xbc, 0x5a, 0xfe, 0x0d, 0x9c, 0xa9, 0x86, 0x50 581}; 582 583/* known SHA384 Digest Message (48 bytes) */ 584uint8_t known_sha384_digest[] = { 585 0xa0, 0x88, 0x8e, 0x1c, 0x4d, 0x7e, 0x80, 0xcb, 586 0xaa, 0xaf, 0xa8, 0xbb, 0x1c, 0xa1, 0xca, 0x91, 587 0x2a, 0x93, 0x21, 0x75, 0xc2, 0xef, 0x98, 0x2c, 588 0xe1, 0xf1, 0x23, 0xa8, 0xc1, 0xae, 0xe9, 0x63, 589 0x5a, 0xd7, 0x5b, 0xe5, 0x25, 0x90, 0xa9, 0x24, 590 0xbe, 0xd3, 0xf5, 0xec, 0x36, 0xc3, 0x56, 0x90 591}; 592 593/* 594 * SHA-512 Known Hash Message (512-bits). 595 * Source from NIST SHA512ShortMsg (Len = 512) 596 */ 597uint8_t sha512_known_hash_message[] = { 598 0x09, 0x5c, 0x7f, 0x30, 0x82, 0x4f, 0xc9, 0x28, 599 0x58, 0xcc, 0x93, 0x47, 0xc0, 0x85, 0xd5, 0x78, 600 0x88, 0x5f, 0xf3, 0x61, 0x4d, 0xd3, 0x8e, 0xe7, 601 0xee, 0x94, 0xa0, 0xf4, 0x40, 0x72, 0xc8, 0x77, 602 0x04, 0x7e, 0xe2, 0xad, 0x16, 0x6f, 0xdb, 0xa0, 603 0xe7, 0x44, 0xc3, 0xed, 0x2c, 0x2b, 0x24, 0xc9, 604 0xd8, 0xa2, 0x93, 0x46, 0x48, 0xdc, 0x84, 0xd3, 605 0xbe, 0x66, 0x63, 0x02, 0x11, 0x0a, 0xe0, 0x8f 606}; 607 608/* known SHA512 Digest Message (64 bytes) */ 609uint8_t known_sha512_digest[] = { 610 0xd5, 0xcd, 0xaf, 0x83, 0xbb, 0x4a, 0x27, 0xea, 611 0xad, 0x8d, 0x8f, 0x18, 0xe4, 0xbe, 0xe9, 0xc2, 612 0x5b, 0xe9, 0x49, 0xa7, 0x61, 0xa0, 0xfd, 0x0f, 613 0xb2, 0x28, 0x4c, 0xab, 0x14, 0x3c, 0xad, 0x60, 614 0xbe, 0xb5, 0x68, 0x87, 0x34, 0xb2, 0xf8, 0x1e, 615 0x9e, 0x2d, 0x64, 0x0b, 0x42, 0x5f, 0xd3, 0x2c, 616 0xcb, 0x3d, 0x20, 0xd0, 0x2d, 0x63, 0xc2, 0xc9, 617 0x4c, 0x03, 0xab, 0x3d, 0x9e, 0x7d, 0x9b, 0x4a 618}; 619 620/* SHA-2 HMAC Test Vectors */ 621 622/* 623 * SHA-256 HMAC Known Hash Message (512-bits). 624 * (Not used by HW provider because of the key size limitation 625 */ 626uint8_t sha256_hmac_known_hash_message[] = { 627 0x54, 0x68, 0x65, 0x20, 0x74, 0x65, 0x73, 0x74, 628 0x20, 0x6D, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 629 0x20, 0x66, 0x6F, 0x72, 0x20, 0x74, 0x68, 0x65, 630 0x20, 0x4D, 0x44, 0x32, 0x2C, 0x20, 0x4D, 0x44, 631 0x35, 0x2C, 0x20, 0x61, 0x6E, 0x64, 0x20, 0x53, 632 0x48, 0x41, 0x2D, 0x31, 0x20, 0x68, 0x61, 0x73, 633 0x68, 0x69, 0x6E, 0x67, 0x20, 0x61, 0x6C, 0x67, 634 0x6F, 0x72, 0x69, 0x74, 0x68, 0x6D, 0x73, 0x2E 635}; 636 637uint8_t sha256_hmac_known_secret_key[] = { 638 0x54, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, 639 0x74, 0x68, 0x65, 0x20, 0x53, 0x48, 0x41, 0x2D, 640 0x32, 0x35, 0x36, 0x20, 0x48, 0x4D, 0x41, 0x43, 641 0x20, 0x73, 0x65, 0x63, 0x72, 0x65, 0x74, 0x20, 642 0x6B, 0x65, 0x79, 0x21 643}; 644 645/* known SHA256 hmac (32 bytes) */ 646uint8_t known_sha256_hmac[] = { 647 0x02, 0x87, 0x21, 0x93, 0x84, 0x8a, 0x35, 0xae, 648 0xdb, 0xb6, 0x79, 0x26, 0x96, 0xf0, 0x50, 0xeb, 649 0x33, 0x49, 0x57, 0xf1, 0xb2, 0x32, 0xd3, 0x63, 650 0x03, 0x65, 0x57, 0xa2, 0xba, 0xa2, 0x5f, 0x35 651}; 652 653/* 654 * SHA-256 HMAC Known Hash Message from RFC 4231 655 * Test Case 2 and 4 656 */ 657uint8_t sha256_hmac_known_hash_message_1[] = { 658 0x77, 0x68, 0x61, 0x74, 0x20, 0x64, 0x6f, 0x20, 659 0x79, 0x61, 0x20, 0x77, 0x61, 0x6e, 0x74, 0x20, 660 0x66, 0x6f, 0x72, 0x20, 0x6e, 0x6f, 0x74, 0x68, 661 0x69, 0x6e, 0x67, 0x3f 662}; 663uint8_t sha256_hmac_known_secret_key_1[] = { 664 0x4a, 0x65, 0x66, 0x65 665}; 666uint8_t sha256_known_hmac_1[] = { 667 0x5b, 0xdc, 0xc1, 0x46, 0xbf, 0x60, 0x75, 0x4e, 668 0x6a, 0x04, 0x24, 0x26, 0x08, 0x95, 0x75, 0xc7, 669 0x5a, 0x00, 0x3f, 0x08, 0x9d, 0x27, 0x39, 0x83, 670 0x9d, 0xec, 0x58, 0xb9, 0x64, 0xec, 0x38, 0x43 671}; 672 673uint8_t sha256_hmac_known_hash_message_2[] = { 674 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 675 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 676 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 677 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 678 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 679 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 680 0xcd, 0xcd 681}; 682uint8_t sha256_hmac_known_secret_key_2[] = { 683 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 684 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 685 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 686 0x19 687}; 688uint8_t sha256_known_hmac_2[] = { 689 0x82, 0x55, 0x8a, 0x38, 0x9a, 0x44, 0x3c, 0x0e, 690 0xa4, 0xcc, 0x81, 0x98, 0x99, 0xf2, 0x08, 0x3a, 691 0x85, 0xf0, 0xfa, 0xa3, 0xe5, 0x78, 0xf8, 0x07, 692 0x7a, 0x2e, 0x3f, 0xf4, 0x67, 0x29, 0x66, 0x5b 693}; 694 695/* 696 * SHA-384 HMAC Known Hash Message (512-bits). 697 * Source from NIST HMAC.txt (Count = 15, Klen = 16, Tlen = 48) 698 */ 699uint8_t sha384_hmac_known_secret_key[] = { 700 0x01, 0xac, 0x59, 0xf4, 0x2f, 0x8b, 0xb9, 0x1d, 701 0x1b, 0xd1, 0x0f, 0xe6, 0x99, 0x0d, 0x7a, 0x87 702}; 703 704uint8_t sha384_hmac_known_hash_message[] = { 705 0x3c, 0xaf, 0x18, 0xc4, 0x76, 0xed, 0xd5, 0x61, 706 0x5f, 0x34, 0x3a, 0xc7, 0xb7, 0xd3, 0xa9, 0xda, 707 0x9e, 0xfa, 0xde, 0x75, 0x56, 0x72, 0xd5, 0xba, 708 0x4b, 0x8a, 0xe8, 0xa7, 0x50, 0x55, 0x39, 0xea, 709 0x2c, 0x12, 0x4f, 0xf7, 0x55, 0xec, 0x04, 0x57, 710 0xfb, 0xe4, 0x9e, 0x43, 0x48, 0x0b, 0x3c, 0x71, 711 0xe7, 0xf4, 0x74, 0x2e, 0xc3, 0x69, 0x3a, 0xad, 712 0x11, 0x5d, 0x03, 0x9f, 0x90, 0x22, 0x2b, 0x03, 713 0x0f, 0xdc, 0x94, 0x40, 0x31, 0x36, 0x91, 0x71, 714 0x6d, 0x53, 0x02, 0x00, 0x58, 0x08, 0xc0, 0x76, 715 0x27, 0x48, 0x3b, 0x91, 0x6f, 0xdf, 0x61, 0x98, 716 0x30, 0x63, 0xc2, 0xeb, 0x12, 0x68, 0xf2, 0xde, 717 0xee, 0xf4, 0x2f, 0xc7, 0x90, 0x33, 0x44, 0x56, 718 0xbc, 0x6b, 0xad, 0x25, 0x6e, 0x31, 0xfc, 0x90, 719 0x66, 0xde, 0x7c, 0xc7, 0xe4, 0x3d, 0x13, 0x21, 720 0xb1, 0x86, 0x6d, 0xb4, 0x5e, 0x90, 0x56, 0x22 721}; 722 723/* known SHA384 hmac (48 bytes) */ 724uint8_t known_sha384_hmac[] = { 725 0x19, 0x85, 0xfa, 0x21, 0x63, 0xa5, 0x94, 0x3f, 726 0xc5, 0xd9, 0x2f, 0x1f, 0xe8, 0x83, 0x12, 0x15, 727 0xe7, 0xe9, 0x1f, 0x0b, 0xff, 0x53, 0x32, 0xbc, 728 0x71, 0x3a, 0x07, 0x2b, 0xdb, 0x3a, 0x8f, 0x9e, 729 0x5c, 0x51, 0x57, 0x46, 0x3a, 0x3b, 0xfe, 0xb3, 730 0x62, 0x31, 0x41, 0x6e, 0x65, 0x97, 0x3e, 0x64 731}; 732 733/* 734 * SHA-512 HMAC Known Hash Message (512-bits). 735 * Source from NIST HMAC.txt (Count = 30, Klen = 20, Tlen = 64) 736 */ 737uint8_t sha512_hmac_known_secret_key[] = { 738 0xa7, 0x36, 0xf2, 0x74, 0xfd, 0xa6, 0x8e, 0x1b, 739 0xd5, 0xf9, 0x47, 0x1e, 0x85, 0xfd, 0x41, 0x5d, 740 0x7f, 0x2b, 0xa1, 0xbc 741}; 742 743uint8_t sha512_hmac_known_hash_message[] = { 744 0xa6, 0xcc, 0xc3, 0x55, 0x2c, 0x33, 0xe9, 0x17, 745 0x8b, 0x6b, 0x82, 0xc6, 0x53, 0xd6, 0x3d, 0xe2, 746 0x54, 0x0f, 0x17, 0x08, 0x07, 0xc3, 0xd9, 0x6a, 747 0x2a, 0xc2, 0xe2, 0x7d, 0xab, 0x55, 0x26, 0xf1, 748 0xc7, 0xd3, 0x77, 0xe6, 0x73, 0x6f, 0x04, 0x5d, 749 0xfb, 0x54, 0x1f, 0xec, 0xe9, 0xf4, 0x43, 0xb7, 750 0x28, 0x9c, 0x55, 0x9b, 0x69, 0x4c, 0x2a, 0xac, 751 0xc6, 0xc7, 0x4a, 0xe2, 0xa5, 0xe6, 0xf3, 0x0f, 752 0xe0, 0x31, 0x61, 0x14, 0x23, 0xb0, 0x4d, 0x55, 753 0x95, 0xff, 0xb4, 0x6a, 0xba, 0xa1, 0xd9, 0x18, 754 0x98, 0x96, 0x8d, 0x7f, 0x18, 0x30, 0xae, 0x94, 755 0xb0, 0x22, 0xee, 0xd2, 0x3f, 0xda, 0xd5, 0x2d, 756 0x38, 0x11, 0x0a, 0x48, 0x03, 0xa0, 0xce, 0xe7, 757 0xa0, 0x95, 0xc9, 0xa7, 0x8e, 0x86, 0x09, 0xed, 758 0xeb, 0x25, 0x48, 0x1c, 0xdc, 0x15, 0x6d, 0x0b, 759 0x2f, 0xfc, 0x56, 0xb6, 0x3f, 0xda, 0xd5, 0x33 760}; 761 762/* known SHA512 hmac (64 bytes) */ 763uint8_t known_sha512_hmac[] = { 764 0xf7, 0x18, 0x03, 0x43, 0x1e, 0x07, 0xa5, 0xa6, 765 0xe5, 0xfd, 0x4a, 0xe4, 0xcf, 0xc2, 0x75, 0x3b, 766 0xc8, 0x0d, 0x26, 0xe1, 0x67, 0x23, 0xd9, 0xe8, 767 0x8b, 0x40, 0x5a, 0x02, 0x34, 0x8e, 0xf4, 0xb9, 768 0x67, 0x92, 0xc9, 0x9c, 0xed, 0x64, 0xdc, 0x70, 769 0xea, 0x47, 0x53, 0x78, 0xb7, 0x46, 0x6a, 0xc2, 770 0xca, 0xf4, 0xa4, 0x20, 0xb0, 0x1f, 0xf6, 0x1e, 771 0x72, 0xc5, 0xb5, 0xee, 0x8e, 0xaa, 0xd4, 0xd4 772}; 773 774/* 775 * RSA: 1024-bit RSA known key 776 */ 777uint8_t rsa_modulus_1024[] = { 778 0x94, 0x32, 0xb9, 0x12, 0x1d, 0x68, 0x2c, 0xda, 779 0x2b, 0xe0, 0xe4, 0x97, 0x1b, 0x4d, 0xdc, 0x43, 780 0xdf, 0x38, 0x6e, 0x7b, 0x9f, 0x07, 0x58, 0xae, 781 0x9d, 0x82, 0x1e, 0xc7, 0xbc, 0x92, 0xbf, 0xd3, 782 0xce, 0x00, 0xbb, 0x91, 0xc9, 0x79, 0x06, 0x03, 783 0x1f, 0xbc, 0x9f, 0x94, 0x75, 0x29, 0x5f, 0xd7, 784 0xc5, 0xf3, 0x73, 0x8a, 0xa4, 0x35, 0x43, 0x7a, 785 0x00, 0x32, 0x97, 0x3e, 0x86, 0xef, 0x70, 0x6f, 786 0x18, 0x56, 0x15, 0xaa, 0x6a, 0x87, 0xe7, 0x8d, 787 0x7d, 0xdd, 0x1f, 0xa4, 0xe4, 0x31, 0xd4, 0x7a, 788 0x8c, 0x0e, 0x20, 0xd2, 0x23, 0xf5, 0x57, 0x3c, 789 0x1b, 0xa8, 0x44, 0xa4, 0x57, 0x8f, 0x33, 0x52, 790 0xad, 0x83, 0xae, 0x4a, 0x97, 0xa6, 0x1e, 0xa6, 791 0x2b, 0xfa, 0xea, 0xeb, 0x6e, 0x71, 0xb8, 0xb6, 792 0x0a, 0x36, 0xed, 0x83, 0xce, 0xb0, 0xdf, 0xc1, 793 0xd4, 0x3a, 0xe9, 0x99, 0x6f, 0xf3, 0x96, 0xb7 794}; 795uint8_t rsa_public_exponent_1024[] = {0x01, 0x00, 0x01}; 796uint8_t rsa_private_exponent_1024[] = { 797 0x8e, 0xc9, 0x70, 0x57, 0x6b, 0xcd, 0xfb, 0xa9, 798 0x19, 0xad, 0xcd, 0x91, 0x69, 0xd5, 0x52, 0xec, 799 0x72, 0x1e, 0x45, 0x15, 0x06, 0xdc, 0x65, 0x2d, 800 0x98, 0xc4, 0xce, 0x33, 0x54, 0x15, 0x70, 0x8d, 801 0xfa, 0x65, 0xea, 0x53, 0x44, 0xf3, 0x3e, 0x3f, 802 0xb4, 0x4c, 0x60, 0xd5, 0x01, 0x2d, 0xa4, 0x12, 803 0x99, 0xbf, 0x3f, 0x0b, 0xcd, 0xbb, 0x24, 0x10, 804 0x60, 0x30, 0x5e, 0x58, 0xf8, 0x59, 0xaa, 0xd1, 805 0x63, 0x3b, 0xbc, 0xcb, 0x94, 0x58, 0x38, 0x24, 806 0xfc, 0x65, 0x25, 0xc5, 0xa6, 0x51, 0xa2, 0x2e, 807 0xf1, 0x5e, 0xf5, 0xc1, 0xf5, 0x46, 0xf7, 0xbd, 808 0xc7, 0x62, 0xa8, 0xe2, 0x27, 0xd6, 0x94, 0x5b, 809 0xd3, 0xa2, 0xb5, 0x76, 0x42, 0x67, 0x6b, 0x86, 810 0x91, 0x97, 0x4d, 0x07, 0x92, 0x00, 0x4a, 0xdf, 811 0x0b, 0x65, 0x64, 0x05, 0x03, 0x48, 0x27, 0xeb, 812 0xce, 0x9a, 0x49, 0x7f, 0x3e, 0x10, 0xe0, 0x01 813}; 814uint8_t rsa_prime1_1024[] = { 815 0xe4, 0xe7, 0x50, 0x8c, 0x48, 0x2b, 0x0a, 0xda, 816 0xb1, 0xf0, 0xd5, 0x1e, 0x0b, 0xf3, 0xdc, 0xfc, 817 0xa9, 0x60, 0x20, 0x73, 0xa0, 0x89, 0x20, 0xa8, 818 0x2e, 0x1a, 0x50, 0x95, 0xdc, 0x45, 0xef, 0x29, 819 0x21, 0x69, 0x22, 0xca, 0x3f, 0x2c, 0xfe, 0x6e, 820 0xb3, 0xc9, 0xee, 0x2d, 0xb1, 0xb9, 0xbd, 0x6c, 821 0xdd, 0x89, 0xbb, 0x0a, 0x9a, 0x0e, 0x14, 0xa1, 822 0x88, 0x4a, 0x56, 0x5d, 0xb5, 0x0f, 0xd2, 0x01 823}; 824uint8_t rsa_prime2_1024[] = { 825 0xa5, 0xbd, 0xb6, 0xb8, 0x49, 0x97, 0x9d, 0x2c, 826 0x04, 0x06, 0x5b, 0xee, 0xae, 0x5f, 0x78, 0x06, 827 0x49, 0xa2, 0x11, 0xbf, 0xff, 0x40, 0x4f, 0x56, 828 0x88, 0xc7, 0xe9, 0x55, 0x79, 0xeb, 0xc6, 0x68, 829 0x1c, 0xb3, 0x13, 0x9f, 0x41, 0x6c, 0x10, 0x3c, 830 0x26, 0xd2, 0xd6, 0x68, 0xb3, 0x1e, 0x6b, 0x93, 831 0x08, 0x86, 0xfe, 0x15, 0x47, 0xa7, 0x52, 0x3a, 832 0xb4, 0x28, 0x43, 0x78, 0xef, 0x34, 0x78, 0xb7 833}; 834uint8_t rsa_exponent1_1024[] = { 835 0x58, 0x83, 0x51, 0xd4, 0x4c, 0xfb, 0xc7, 0xe0, 836 0xb5, 0x3a, 0x09, 0x4e, 0xeb, 0x14, 0x4b, 0x79, 837 0xb0, 0x0d, 0x29, 0xbf, 0x4c, 0x6e, 0x7a, 0x20, 838 0x4e, 0x63, 0x82, 0x91, 0xd0, 0x71, 0x82, 0x7f, 839 0x87, 0x19, 0xde, 0x88, 0x12, 0x51, 0xd5, 0xb8, 840 0xfc, 0xf0, 0xb2, 0x97, 0x1c, 0xc8, 0x54, 0x05, 841 0x4a, 0xcd, 0x3d, 0x74, 0x66, 0x09, 0xd7, 0xd4, 842 0x76, 0x9d, 0x38, 0x34, 0x58, 0x15, 0x5c, 0x01 843}; 844uint8_t rsa_exponent2_1024[] = { 845 0x4a, 0xc6, 0x27, 0x6c, 0x47, 0x0f, 0x56, 0xc2, 846 0x67, 0xe2, 0x72, 0x91, 0x61, 0x2c, 0x03, 0x1b, 847 0x5b, 0x16, 0xfa, 0x49, 0x13, 0xa0, 0x70, 0xea, 848 0xca, 0x74, 0xde, 0x89, 0x48, 0xa3, 0x1d, 0x75, 849 0x15, 0x15, 0x99, 0x91, 0xac, 0xd3, 0x53, 0x13, 850 0xc0, 0x34, 0x38, 0xb5, 0x2d, 0xb2, 0x58, 0xb8, 851 0x12, 0x0d, 0xcd, 0x0d, 0xce, 0xb0, 0xe7, 0x41, 852 0x42, 0xcc, 0x33, 0x7c, 0x98, 0xf6, 0xa4, 0x4b 853}; 854uint8_t rsa_coefficient_1024[] = { 855 0x60, 0x6a, 0x6c, 0x5a, 0xf1, 0x55, 0xe9, 0xe4, 856 0x67, 0x72, 0x2f, 0x99, 0x03, 0x6a, 0x56, 0xa1, 857 0xed, 0xf2, 0x59, 0xfa, 0xec, 0x88, 0xc5, 0xb7, 858 0xa8, 0x71, 0x4a, 0x5f, 0xab, 0x86, 0xb0, 0x50, 859 0x93, 0x3c, 0xe3, 0x70, 0xf9, 0xf2, 0x72, 0xe6, 860 0xd2, 0xb5, 0x30, 0x3e, 0x60, 0x29, 0x70, 0xd4, 861 0xf0, 0x31, 0x15, 0x36, 0x3a, 0x27, 0xb6, 0xdf, 862 0x18, 0xb0, 0xf0, 0x32, 0xef, 0xa3, 0x84, 0xcb 863}; 864 865 866/* 867 * RSA: 2048-bit RSA known key 868 */ 869uint8_t rsa_modulus_2048[] = { 870 0x7f, 0xf1, 0xed, 0x5a, 0xa0, 0xe2, 0x97, 0x05, 871 0x03, 0xc0, 0xf3, 0xcf, 0x86, 0x4a, 0x01, 0x15, 872 0xc3, 0x4f, 0x32, 0xf4, 0xf7, 0xbe, 0x57, 0x4a, 873 0xe1, 0x87, 0xf2, 0x1c, 0xd3, 0xa5, 0x96, 0xc1, 874 0x54, 0xe5, 0x97, 0x19, 0x7d, 0xf1, 0x13, 0xc3, 875 0x4d, 0xcf, 0x5a, 0x08, 0x76, 0xfc, 0x6c, 0x93, 876 0x87, 0x71, 0x20, 0x66, 0xb7, 0xbf, 0x37, 0xbb, 877 0xc9, 0xf5, 0x16, 0xf4, 0x9c, 0x5c, 0x64, 0x58, 878 0xc4, 0x9e, 0x17, 0x0e, 0x99, 0x6d, 0x3f, 0x7d, 879 0x4f, 0xf1, 0x01, 0xde, 0x76, 0x55, 0xa9, 0xfe, 880 0xa0, 0xa4, 0x95, 0xd1, 0x4e, 0xc6, 0x8b, 0x0a, 881 0x86, 0x5b, 0x60, 0x40, 0xf1, 0x74, 0x91, 0x26, 882 0xcf, 0xc4, 0xf7, 0x7a, 0x86, 0xd7, 0x72, 0x47, 883 0x25, 0x9e, 0x3e, 0x5a, 0xbd, 0x7f, 0x11, 0x9a, 884 0x28, 0x9e, 0x00, 0x8d, 0xfb, 0x9d, 0x93, 0x8e, 885 0xb4, 0xcc, 0x7f, 0x22, 0x00, 0x8a, 0x3b, 0xbb, 886 0xca, 0x45, 0x8e, 0x93, 0xd3, 0xe4, 0x89, 0x96, 887 0xe1, 0xb8, 0x5f, 0xdf, 0x75, 0x94, 0x89, 0xa5, 888 0xad, 0x39, 0x76, 0x43, 0xa7, 0xdf, 0xe4, 0x62, 889 0x39, 0x01, 0x56, 0x31, 0x46, 0x2b, 0xf4, 0x05, 890 0xa9, 0xa9, 0x33, 0x96, 0x16, 0x75, 0x3f, 0xf2, 891 0xcd, 0x6b, 0x0d, 0xa9, 0xf2, 0x9b, 0x30, 0x6d, 892 0x17, 0xec, 0x1a, 0x5a, 0x14, 0x5a, 0x8e, 0xaa, 893 0x52, 0x35, 0x83, 0x0a, 0x59, 0xbc, 0x56, 0x96, 894 0x18, 0x08, 0xbf, 0x91, 0xf7, 0x69, 0x81, 0x66, 895 0xda, 0x13, 0xb6, 0x77, 0xb9, 0x6a, 0x4a, 0x71, 896 0xd9, 0xae, 0x43, 0x0d, 0xad, 0xb4, 0x5f, 0x11, 897 0x87, 0x91, 0x84, 0xc6, 0x59, 0xfe, 0xb0, 0x05, 898 0x83, 0x21, 0x66, 0x7a, 0x70, 0xeb, 0x15, 0xbb, 899 0xc3, 0x40, 0x37, 0xce, 0xbc, 0xe7, 0x4f, 0x95, 900 0xf1, 0x83, 0xcf, 0x89, 0xdd, 0xdc, 0xea, 0x01, 901 0xe1, 0x42, 0xe9, 0x52, 0x8b, 0x1f, 0x91, 0x25}; 902uint8_t rsa_public_exponent_2048[] = { 0x3 }; 903uint8_t rsa_private_exponent_2048[] = { 904 0x55, 0x4b, 0xf3, 0x91, 0xc0, 0x97, 0x0f, 0x58, 905 0xad, 0x2b, 0x4d, 0x35, 0x04, 0x31, 0x56, 0x0e, 906 0x82, 0x34, 0xcc, 0xa3, 0x4f, 0xd4, 0x3a, 0x31, 907 0xeb, 0xaf, 0xf6, 0xbd, 0xe2, 0x6e, 0x64, 0x80, 908 0xe3, 0x43, 0xba, 0x10, 0xfe, 0xa0, 0xb7, 0xd7, 909 0x89, 0x34, 0xe6, 0xb0, 0x4f, 0x52, 0xf3, 0x0d, 910 0x04, 0xf6, 0x15, 0x99, 0xcf, 0xd4, 0xcf, 0xd2, 911 0x86, 0xa3, 0x64, 0xa3, 0x12, 0xe8, 0x42, 0xe5, 912 0xd8, 0x69, 0x64, 0xb4, 0x66, 0x48, 0xd4, 0xfe, 913 0x35, 0x4b, 0x56, 0x94, 0x4e, 0xe3, 0xc6, 0xa9, 914 0xc0, 0x6d, 0xb9, 0x36, 0x34, 0x84, 0x5c, 0xb1, 915 0xae, 0xe7, 0x95, 0x80, 0xa0, 0xf8, 0x60, 0xc4, 916 0x8a, 0x83, 0x4f, 0xa7, 0x04, 0x8f, 0xa1, 0x84, 917 0xc3, 0xbe, 0xd4, 0x3c, 0x7e, 0x54, 0xb6, 0x66, 918 0xc5, 0xbe, 0xab, 0x09, 0x52, 0x69, 0x0d, 0x09, 919 0xcd, 0xdd, 0xaa, 0x16, 0xab, 0x06, 0xd2, 0x7c, 920 0x3c, 0x58, 0x7d, 0x53, 0x4b, 0x14, 0x41, 0x35, 921 0x9a, 0x78, 0x74, 0xf5, 0x8e, 0x67, 0x50, 0x52, 922 0xc5, 0x17, 0xcd, 0xfd, 0x7a, 0xe4, 0x9b, 0xbb, 923 0xaf, 0x4b, 0x17, 0xa7, 0x3c, 0x09, 0x1d, 0xd6, 924 0xa1, 0x11, 0x06, 0x36, 0x68, 0x83, 0x66, 0xd6, 925 0x49, 0x44, 0x9f, 0x0b, 0xe3, 0x17, 0x1a, 0xc5, 926 0xd7, 0x9a, 0x65, 0x5d, 0x15, 0x81, 0x6a, 0x5d, 927 0xdd, 0xd7, 0xf4, 0x54, 0xa3, 0x6f, 0x1e, 0x60, 928 0x87, 0x2a, 0x59, 0xaa, 0x73, 0xf0, 0xdd, 0xdb, 929 0x66, 0xa8, 0x19, 0x31, 0xfd, 0x00, 0x09, 0x8f, 930 0xce, 0x9a, 0xec, 0xff, 0x88, 0x5c, 0x4e, 0x67, 931 0x55, 0xa0, 0x14, 0xdf, 0x28, 0x61, 0x5f, 0x47, 932 0x8d, 0x49, 0xb3, 0xee, 0x5e, 0xfc, 0xc8, 0x41, 933 0x75, 0x59, 0x93, 0xa4, 0x24, 0x69, 0xc0, 0x1a, 934 0x18, 0x04, 0xda, 0x38, 0x0e, 0xf3, 0xa5, 0x04, 935 0xbf, 0xe3, 0xf9, 0xf3, 0x7c, 0xe5, 0x82, 0xeb}; 936uint8_t rsa_prime1_2048[] = { 937 0x97, 0x5e, 0xb8, 0x7b, 0x74, 0xe6, 0xe3, 0x7b, 938 0x4b, 0xdf, 0x5b, 0xb8, 0x0f, 0xe6, 0xa1, 0xcc, 939 0x1c, 0x84, 0xc9, 0x60, 0x5d, 0x80, 0x17, 0x6d, 940 0x61, 0xc2, 0x4d, 0x14, 0x0c, 0x71, 0xda, 0x02, 941 0x74, 0x6f, 0x1f, 0x85, 0x4f, 0xb9, 0x69, 0xb9, 942 0x3c, 0x23, 0x74, 0x60, 0x14, 0xc2, 0xb2, 0x44, 943 0x0c, 0x18, 0xde, 0xfa, 0x12, 0x2c, 0xb8, 0x68, 944 0x71, 0x62, 0x07, 0x8c, 0x02, 0xe3, 0x08, 0xf9, 945 0x49, 0xc1, 0x15, 0x13, 0x0f, 0x76, 0x50, 0xd6, 946 0x6e, 0xd3, 0x7b, 0xfa, 0x68, 0x0e, 0x75, 0x07, 947 0x0b, 0xee, 0x2c, 0xd7, 0x34, 0xc9, 0x98, 0x33, 948 0x16, 0xca, 0x60, 0x54, 0x36, 0x12, 0x65, 0xc4, 949 0x1c, 0xf1, 0xe5, 0x7c, 0x6a, 0x6a, 0x0f, 0x11, 950 0x45, 0xbb, 0x60, 0xa0, 0x35, 0x97, 0xaa, 0x25, 951 0x58, 0x29, 0x1b, 0xf8, 0x4d, 0xb5, 0x86, 0x58, 952 0x68, 0x19, 0x30, 0x6d, 0x07, 0x78, 0x1d, 0x9d}; 953uint8_t rsa_prime2_2048[] = { 954 0xd8, 0x62, 0x1a, 0x1b, 0x6e, 0x5f, 0x44, 0x4b, 955 0x2e, 0x24, 0x54, 0xb7, 0x10, 0x12, 0xef, 0x5d, 956 0x69, 0x10, 0xf7, 0xe7, 0x12, 0x08, 0xe3, 0x5b, 957 0x50, 0x4e, 0x65, 0xa2, 0x5f, 0xac, 0x6d, 0x41, 958 0x43, 0xa0, 0x8a, 0xbf, 0x29, 0xf6, 0xbb, 0xf8, 959 0x23, 0x60, 0xaa, 0xb8, 0x09, 0x35, 0xd6, 0x00, 960 0x48, 0x6b, 0xa3, 0x54, 0x61, 0xeb, 0xb6, 0xb5, 961 0x14, 0x0f, 0x8c, 0xff, 0x61, 0xb2, 0xa0, 0x0c, 962 0x03, 0x88, 0x23, 0xff, 0x3a, 0x09, 0xe3, 0xc7, 963 0x51, 0x44, 0x14, 0xb2, 0x55, 0xdb, 0xc7, 0x13, 964 0x17, 0xd7, 0xb2, 0xb7, 0x2c, 0x60, 0x51, 0x43, 965 0x70, 0x57, 0x05, 0x23, 0x67, 0x5a, 0x3b, 0x56, 966 0x12, 0x40, 0xf3, 0x18, 0x78, 0x05, 0xda, 0x48, 967 0x4d, 0x7e, 0x79, 0xb8, 0x50, 0xb1, 0x05, 0x49, 968 0x75, 0x53, 0x6c, 0x3d, 0x79, 0xb9, 0xec, 0x22, 969 0x59, 0x53, 0xc1, 0xf8, 0x48, 0x4f, 0x2f, 0x29}; 970uint8_t rsa_exponent1_2048[] = { 971 0x64, 0xe9, 0xd0, 0x52, 0x4d, 0xef, 0x42, 0x52, 972 0x32, 0x94, 0xe7, 0xd0, 0x0a, 0x99, 0xc1, 0x32, 973 0xbd, 0xad, 0xdb, 0x95, 0x93, 0xaa, 0xba, 0x48, 974 0xeb, 0xd6, 0xde, 0x0d, 0x5d, 0xa1, 0x3c, 0x01, 975 0xa2, 0xf4, 0xbf, 0xae, 0x35, 0x26, 0x46, 0x7b, 976 0x7d, 0x6c, 0xf8, 0x40, 0x0d, 0xd7, 0x21, 0x82, 977 0xb2, 0xbb, 0x3f, 0x51, 0x61, 0x73, 0x25, 0x9a, 978 0xf6, 0x41, 0x5a, 0x5d, 0x57, 0x42, 0x05, 0xfb, 979 0x86, 0x80, 0xb8, 0xb7, 0x5f, 0xa4, 0x35, 0xe4, 980 0x49, 0xe2, 0x52, 0xa6, 0xf0, 0x09, 0xa3, 0x5a, 981 0x07, 0xf4, 0x1d, 0xe4, 0xcd, 0xdb, 0xba, 0xcc, 982 0xb9, 0xdc, 0x40, 0x38, 0x24, 0x0c, 0x43, 0xd8, 983 0x13, 0x4b, 0xee, 0x52, 0xf1, 0x9c, 0x0a, 0x0b, 984 0x83, 0xd2, 0x40, 0x6a, 0xce, 0x65, 0x1c, 0x18, 985 0xe5, 0x70, 0xbd, 0x50, 0x33, 0xce, 0x59, 0x90, 986 0x45, 0x66, 0x20, 0x48, 0xaf, 0xa5, 0x69, 0x13}; 987uint8_t rsa_exponent2_2048[] = { 988 0x90, 0x41, 0x66, 0xbc, 0xf4, 0x3f, 0x82, 0xdc, 989 0xc9, 0x6d, 0x8d, 0xcf, 0x60, 0x0c, 0x9f, 0x93, 990 0x9b, 0x60, 0xa5, 0x44, 0xb6, 0xb0, 0x97, 0x92, 991 0x35, 0x89, 0x99, 0x16, 0xea, 0x72, 0xf3, 0x80, 992 0xd7, 0xc0, 0x5c, 0x7f, 0x71, 0x4f, 0x27, 0xfa, 993 0xc2, 0x40, 0x71, 0xd0, 0x06, 0x23, 0xe4, 0x00, 994 0x30, 0x47, 0xc2, 0x38, 0x41, 0x47, 0xcf, 0x23, 995 0x62, 0xb5, 0x08, 0xaa, 0x41, 0x21, 0xc0, 0x08, 996 0x02, 0x5a, 0xc2, 0xaa, 0x26, 0xb1, 0x42, 0x84, 997 0xe0, 0xd8, 0x0d, 0xcc, 0x39, 0x3d, 0x2f, 0x62, 998 0x0f, 0xe5, 0x21, 0xcf, 0x72, 0xea, 0xe0, 0xd7, 999 0xa0, 0x3a, 0x03, 0x6c, 0xef, 0x91, 0x7c, 0xe4, 1000 0x0c, 0x2b, 0x4c, 0xba, 0xfa, 0xae, 0x91, 0x85, 1001 0x88, 0xfe, 0xfb, 0xd0, 0x35, 0xcb, 0x58, 0xdb, 1002 0xa3, 0x8c, 0xf2, 0xd3, 0xa6, 0x7b, 0xf2, 0xc1, 1003 0x90, 0xe2, 0x81, 0x50, 0x30, 0x34, 0xca, 0x1b}; 1004uint8_t rsa_coefficient_2048[] = { 1005 0x86, 0xfd, 0x64, 0x2c, 0x28, 0x72, 0x4e, 0x59, 1006 0x2a, 0x29, 0xcd, 0xe2, 0xd1, 0xf6, 0x19, 0xc8, 1007 0xf8, 0xf0, 0x69, 0x77, 0x94, 0x03, 0x70, 0x0d, 1008 0x87, 0x27, 0x37, 0x4d, 0xe8, 0xed, 0x56, 0x9f, 1009 0x15, 0x99, 0x14, 0x3f, 0xf8, 0x35, 0x2f, 0x7c, 1010 0x01, 0x11, 0x82, 0x99, 0x90, 0x5f, 0x6d, 0xf8, 1011 0x2c, 0x81, 0x74, 0x22, 0xa1, 0x5c, 0x87, 0x93, 1012 0xc4, 0xa4, 0x0a, 0xd2, 0xf2, 0xe6, 0x51, 0x4d, 1013 0x3a, 0x24, 0x16, 0x7a, 0x8a, 0x36, 0xca, 0x03, 1014 0x58, 0xd7, 0xce, 0x5b, 0x16, 0x3f, 0x65, 0xf7, 1015 0xe8, 0xdc, 0x91, 0xee, 0x0b, 0x80, 0x20, 0x5d, 1016 0x12, 0x75, 0x0d, 0xe1, 0xe2, 0x78, 0x13, 0xcc, 1017 0x3d, 0xe6, 0x84, 0x56, 0x66, 0xa4, 0x69, 0x20, 1018 0x9f, 0x55, 0xf3, 0xcd, 0x48, 0x84, 0x93, 0xc0, 1019 0x4d, 0xf9, 0xa7, 0xb3, 0xfa, 0xf3, 0x31, 0x27, 1020 0x23, 0x70, 0x19, 0x6a, 0xf3, 0x02, 0x7f, 0x9d}; 1021 1022/* 1023 * RSA: 1024-bit and 2048-bit known plaintext and signatures 1024 */ 1025/* Plaintext message: 1024-bit including NULL termination */ 1026uint8_t rsa_known_plaintext_msg[] = { 1027 0x42, 0xad, 0xcb, 0xba, 0x92, 0x41, 0x72, 0xf3, 1028 0x3e, 0x7c, 0xc0, 0xf7, 0x2b, 0xbe, 0x30, 0xdf, 1029 0x97, 0xa2, 0x11, 0xd1, 0xa6, 0x43, 0x33, 0x22, 1030 0xc9, 0x14, 0xec, 0x07, 0x69, 0x4c, 0xa8, 0xbc, 1031 0xb9, 0x87, 0x54, 0xe1, 0x26, 0x2a, 0x9e, 0xfd, 1032 0xf7, 0xa2, 0x3b, 0xee, 0x77, 0x93, 0xff, 0xa8, 1033 0x34, 0xf5, 0x89, 0xef, 0xa4, 0xb9, 0x00, 0x86, 1034 0x46, 0x63, 0x07, 0x5a, 0x8f, 0x87, 0xb4, 0x6e, 1035 0x0d, 0xd6, 0xb2, 0x32, 0x21, 0x50, 0xab, 0x18, 1036 0xc0, 0x9c, 0x1e, 0xa1, 0x8a, 0x4e, 0xf3, 0x1f, 1037 0xe1, 0x4e, 0xf0, 0xe3, 0x9b, 0x9d, 0x33, 0x84, 1038 0x6d, 0x4b, 0x6f, 0x52, 0x65, 0x2c, 0xc1, 0x41, 1039 0x6a, 0x13, 0x10, 0xc2, 0xf6, 0x2f, 0xc6, 0xaf, 1040 0x35, 0xb4, 0xf2, 0xbf, 0x21, 0x16, 0x2b, 0x45, 1041 0x61, 0x97, 0xcf, 0x4f, 0xa0, 0x1d, 0x99, 0x9d, 1042 0xa0, 0x92, 0x11, 0x6d, 0x34, 0x63, 0x19, 0x73 1043}; 1044 1045uint8_t rsa_x509_known_signature_1024[] = { 1046 0x43, 0xA3, 0x73, 0x60, 0xD7, 0x6F, 0xAB, 0x76, 1047 0x8C, 0xF7, 0x7C, 0xDD, 0x26, 0x59, 0x75, 0x91, 1048 0x0F, 0x06, 0x95, 0x4A, 0x3A, 0x02, 0x9A, 0x19, 1049 0x33, 0xF0, 0x98, 0x4E, 0x9A, 0x97, 0xEA, 0xFE, 1050 0x45, 0xB5, 0x94, 0xE0, 0x42, 0x46, 0xC7, 0x74, 1051 0x65, 0xE6, 0x0F, 0x81, 0xD0, 0x95, 0x17, 0x8F, 1052 0x82, 0xF6, 0x36, 0x02, 0x59, 0xE9, 0x20, 0x08, 1053 0x38, 0x70, 0x68, 0x67, 0xFE, 0x9B, 0xEA, 0xF8, 1054 0xBA, 0xD0, 0x00, 0x3F, 0x75, 0x2A, 0x2F, 0x7A, 1055 0xC7, 0xE9, 0x44, 0xA4, 0x39, 0xB6, 0x94, 0x85, 1056 0xA7, 0x8A, 0x3A, 0x97, 0x83, 0x93, 0x18, 0x93, 1057 0x99, 0xAC, 0xF7, 0x21, 0xD5, 0x76, 0x30, 0xA5, 1058 0xA1, 0xE5, 0x3B, 0x50, 0x2D, 0x10, 0xBE, 0xD1, 1059 0x96, 0x41, 0x9D, 0xD9, 0xCD, 0x68, 0xD4, 0x49, 1060 0x96, 0x78, 0xBB, 0x62, 0x7D, 0xEC, 0x0D, 0x09, 1061 0xA4, 0x84, 0x6B, 0x6F, 0xA8, 0x41, 0x03, 0x37 1062}; 1063 1064uint8_t rsa_pkcs_known_signature_1024[] = { 1065 0x7B, 0x9C, 0x75, 0x6D, 0x45, 0xC3, 0xED, 0x9F, 1066 0xFA, 0xE9, 0x9C, 0xFA, 0x8B, 0x1A, 0xAF, 0x86, 1067 0x25, 0x45, 0x52, 0x21, 0x81, 0x94, 0x2C, 0x87, 1068 0x51, 0x65, 0x77, 0x2F, 0x25, 0xA8, 0x6C, 0x85, 1069 0x06, 0xA8, 0xA3, 0xF6, 0x3B, 0xA6, 0xC8, 0x44, 1070 0xF5, 0xBF, 0xE8, 0xE0, 0xF8, 0x20, 0xB5, 0x84, 1071 0xF3, 0xAE, 0x1B, 0x24, 0xA6, 0x19, 0xC5, 0x63, 1072 0xFD, 0x54, 0xFA, 0x88, 0xA2, 0x2D, 0x2C, 0x39, 1073 0x38, 0x4B, 0x68, 0x70, 0xF7, 0xD3, 0x8D, 0xE1, 1074 0x90, 0xE7, 0x41, 0x8D, 0x03, 0x75, 0x39, 0x38, 1075 0x3B, 0x96, 0x47, 0xFF, 0xA7, 0x9B, 0x72, 0x08, 1076 0x76, 0x7D, 0x00, 0x61, 0xD4, 0x07, 0x47, 0xED, 1077 0xB3, 0x62, 0x4D, 0xFD, 0x79, 0x44, 0xD5, 0xF5, 1078 0xDA, 0xDE, 0xE5, 0x89, 0xFB, 0x57, 0xA8, 0x0A, 1079 0x92, 0x41, 0x92, 0x3A, 0x47, 0x85, 0x1D, 0x72, 1080 0xAF, 0x58, 0x85, 0x9D, 0x46, 0x4A, 0xD2, 0x7D 1081}; 1082 1083uint8_t rsa_x509_known_signature_2048[] = { 1084 0x74, 0xEB, 0x2F, 0x01, 0x93, 0xF0, 0xB9, 0x64, 1085 0x12, 0xD6, 0xD6, 0x75, 0xF0, 0x6C, 0xDC, 0x44, 1086 0x5F, 0x09, 0xAC, 0x98, 0x6C, 0xF9, 0x23, 0x7E, 1087 0xBB, 0x44, 0xCB, 0x9A, 0x3C, 0xE9, 0x76, 0x7B, 1088 0x81, 0xAA, 0x69, 0xA6, 0x77, 0x34, 0x85, 0x8E, 1089 0xDB, 0x13, 0x9A, 0xE3, 0xD0, 0xBF, 0x2A, 0x3C, 1090 0x8B, 0x50, 0x3E, 0x8A, 0x95, 0xF7, 0x09, 0x39, 1091 0xED, 0x3F, 0x5A, 0x52, 0x68, 0xA1, 0xF3, 0x42, 1092 0xA8, 0x09, 0x13, 0xAE, 0xFD, 0x9F, 0x40, 0x0C, 1093 0x3D, 0x84, 0x68, 0x07, 0xFF, 0x30, 0x0F, 0x6B, 1094 0x6F, 0xB7, 0x1F, 0x09, 0x11, 0x8E, 0x7B, 0x3F, 1095 0x88, 0xF5, 0x41, 0x07, 0xE1, 0x5C, 0x71, 0x28, 1096 0xAE, 0x71, 0x51, 0xAE, 0xC3, 0xC9, 0xCB, 0xED, 1097 0xAC, 0x87, 0x32, 0xAB, 0xD0, 0x2F, 0x65, 0xA3, 1098 0x7D, 0x90, 0xDC, 0xFF, 0x7A, 0x9D, 0xCE, 0xBC, 1099 0xCA, 0x00, 0x6E, 0x65, 0x3C, 0x99, 0x2F, 0x00, 1100 0x8A, 0x5A, 0xD9, 0x5A, 0x01, 0x83, 0x99, 0x1D, 1101 0x8D, 0xD7, 0x10, 0x3B, 0xE2, 0x9C, 0x9C, 0x49, 1102 0xCA, 0x9C, 0xF6, 0x42, 0x0E, 0x4D, 0xCD, 0x11, 1103 0x70, 0x0C, 0xCC, 0x2C, 0x8F, 0xAA, 0xA5, 0x7C, 1104 0xA8, 0x1D, 0xBD, 0x99, 0x63, 0x6E, 0x44, 0x9D, 1105 0xE6, 0xC0, 0x55, 0x2F, 0x0F, 0x27, 0x43, 0xA3, 1106 0x3C, 0x46, 0xC4, 0x52, 0x59, 0x4F, 0xD4, 0x07, 1107 0xAD, 0xE2, 0xBA, 0x19, 0x23, 0x23, 0xB6, 0x78, 1108 0xFE, 0x65, 0x6D, 0x0D, 0x62, 0x0E, 0xAB, 0xE5, 1109 0x5A, 0x58, 0x28, 0x17, 0xE9, 0x1D, 0x2F, 0x3E, 1110 0x04, 0xED, 0x01, 0x56, 0x0B, 0xB9, 0x4E, 0x2D, 1111 0xF8, 0xC9, 0x7D, 0x12, 0xFE, 0x8A, 0x00, 0x3E, 1112 0x72, 0x9F, 0x28, 0x77, 0x92, 0x58, 0x6E, 0x11, 1113 0x75, 0xF1, 0x31, 0x5B, 0x43, 0xF4, 0x95, 0xD3, 1114 0x59, 0x31, 0xA7, 0xD1, 0x8B, 0x91, 0xED, 0xDE, 1115 0xD9, 0xC0, 0x04, 0xBA, 0x1F, 0x4E, 0x1D, 0xB6 1116}; 1117 1118uint8_t rsa_pkcs_known_signature_2048[] = { 1119 0x77, 0x5A, 0x7C, 0x5B, 0x95, 0xB8, 0x02, 0xB5, 1120 0xF7, 0xDF, 0x8A, 0x3F, 0x90, 0x7D, 0x32, 0x6E, 1121 0x3B, 0x79, 0x0F, 0x74, 0xAD, 0x4D, 0xE1, 0x61, 1122 0xCD, 0x5D, 0x32, 0x4C, 0x4A, 0x94, 0x90, 0xB2, 1123 0xDB, 0xB0, 0xCE, 0x0E, 0xC8, 0xC2, 0x2D, 0x8B, 1124 0x26, 0x49, 0xE8, 0x0F, 0x37, 0x85, 0x64, 0xF0, 1125 0x2B, 0x94, 0xA5, 0x05, 0xC7, 0x32, 0x4C, 0xFD, 1126 0xE8, 0x1F, 0x5B, 0x3C, 0x74, 0x08, 0x16, 0x02, 1127 0xAE, 0xB6, 0xB8, 0xF1, 0x4A, 0x2F, 0x3F, 0x92, 1128 0xCD, 0x8B, 0x82, 0xCA, 0xCC, 0xB4, 0x8E, 0x68, 1129 0xD6, 0x2F, 0x21, 0x8C, 0x4C, 0x63, 0xA4, 0xEA, 1130 0xDE, 0xE5, 0xF2, 0x8A, 0x3F, 0x9B, 0x81, 0x50, 1131 0x12, 0x30, 0x05, 0xF2, 0x63, 0x64, 0xB2, 0x41, 1132 0x8A, 0x77, 0xAF, 0x07, 0xC1, 0x91, 0x6E, 0x32, 1133 0x43, 0xEC, 0x3B, 0xB2, 0xE5, 0xAE, 0x95, 0x81, 1134 0xEE, 0x34, 0x4C, 0xAF, 0x26, 0x8C, 0x14, 0x7D, 1135 0xB3, 0x0D, 0x47, 0x95, 0x46, 0xFF, 0x5E, 0x12, 1136 0xCC, 0x02, 0x68, 0x52, 0x58, 0x90, 0xE8, 0x38, 1137 0xC5, 0x7F, 0x6F, 0x6A, 0xA6, 0x1C, 0x92, 0xDB, 1138 0x43, 0x82, 0x13, 0x2A, 0x33, 0x0F, 0xEB, 0xEC, 1139 0xF3, 0x52, 0x47, 0x06, 0x0B, 0xB0, 0x38, 0x52, 1140 0xB7, 0x60, 0xB5, 0x4D, 0xC3, 0xF8, 0x26, 0x60, 1141 0x99, 0x67, 0xFA, 0x5C, 0x40, 0x3A, 0x71, 0x8F, 1142 0x30, 0x04, 0xEF, 0xD2, 0xBD, 0x31, 0xA3, 0x1F, 1143 0x9A, 0x5D, 0xAA, 0x0C, 0x8E, 0xA1, 0x87, 0x78, 1144 0x62, 0xFD, 0x15, 0x8C, 0xB4, 0xF5, 0xAF, 0x84, 1145 0xFB, 0x26, 0xC9, 0xDA, 0x58, 0x67, 0x55, 0x27, 1146 0x1C, 0x20, 0xEA, 0xDD, 0x5E, 0xC0, 0xBE, 0x88, 1147 0x46, 0x9C, 0xEF, 0x70, 0x75, 0x91, 0x31, 0x44, 1148 0x40, 0xCD, 0x61, 0x3F, 0xB6, 0x9C, 0x18, 0x6D, 1149 0xCD, 0x16, 0x07, 0x89, 0x7D, 0x73, 0x03, 0xE3, 1150 0x54, 0x22, 0x11, 0x76, 0xF5, 0xE6, 0x4F, 0xF0 1151}; 1152 1153 1154uchar_t dsa_base_1024[] = { 1155 0x34, 0x32, 0xEF, 0xA6, 0x81, 0x0E, 0xF7, 0xA2, 1156 0x6F, 0x0C, 0x05, 0xB8, 0x6F, 0xE4, 0x0B, 0xD7, 1157 0xB4, 0x5B, 0x77, 0x3E, 0x0D, 0x6D, 0xA9, 0x37, 1158 0x39, 0x69, 0xEC, 0x26, 0x58, 0xDD, 0xE5, 0xF7, 1159 0x26, 0x2A, 0x8C, 0xBD, 0x47, 0x7B, 0x53, 0x12, 1160 0x65, 0xD5, 0x86, 0x7C, 0xAA, 0x47, 0x8D, 0x2C, 1161 0xBD, 0x8A, 0x82, 0x5B, 0x5E, 0xEB, 0x94, 0xAE, 1162 0x79, 0x1D, 0x76, 0x64, 0x9E, 0x3E, 0x33, 0x5A, 1163 0xFC, 0xB6, 0x86, 0x83, 0x6A, 0xAF, 0x7D, 0xC4, 1164 0x50, 0x56, 0x60, 0xEF, 0x57, 0x86, 0x6C, 0xD9, 1165 0x44, 0x72, 0xF2, 0x19, 0xB0, 0x46, 0x52, 0x04, 1166 0xC3, 0x92, 0xF4, 0xF1, 0x36, 0xEF, 0xFA, 0xAF, 1167 0xFA, 0x86, 0xBB, 0x2B, 0x07, 0x04, 0x9F, 0xF5, 1168 0xD4, 0xEC, 0xB5, 0x60, 0x81, 0x8A, 0x6E, 0x5F, 1169 0x96, 0x4C, 0x84, 0x9E, 0xD0, 0x9E, 0xA9, 0x28, 1170 0x95, 0xF9, 0x17, 0x5E, 0x95, 0x4F, 0xA8, 0x45 1171}; 1172uchar_t dsa_prime_1024[] = { 1173 0xB6, 0x6F, 0x0C, 0xED, 0xAF, 0x2C, 0x79, 0x76, 1174 0x03, 0xC1, 0xB6, 0x4A, 0x60, 0x24, 0x89, 0x6D, 1175 0xFC, 0x8A, 0x8C, 0x4F, 0x0A, 0x61, 0x4B, 0x55, 1176 0xB2, 0x4E, 0xDC, 0x2E, 0xB7, 0xFA, 0xFF, 0x9A, 1177 0xF7, 0xA4, 0x86, 0x71, 0x0E, 0xBF, 0x2A, 0xBB, 1178 0x60, 0x64, 0x49, 0xFB, 0xB8, 0x8C, 0x86, 0xA1, 1179 0x92, 0xBC, 0x0A, 0xF8, 0xF3, 0x62, 0x5E, 0x0D, 1180 0x40, 0xA7, 0x61, 0xCB, 0x45, 0x21, 0x90, 0xF0, 1181 0x3F, 0xC9, 0x25, 0x79, 0x5B, 0x3A, 0xDE, 0x4E, 1182 0xAE, 0xFA, 0x21, 0x74, 0x6F, 0x9A, 0x09, 0xED, 1183 0xA6, 0x7D, 0x6C, 0x89, 0x5A, 0x3E, 0x28, 0xE8, 1184 0x5D, 0x31, 0x20, 0xD9, 0xAF, 0xE8, 0x9F, 0xA4, 1185 0xA6, 0xD7, 0xFE, 0x2F, 0x26, 0x4E, 0x85, 0x61, 1186 0x9B, 0xE6, 0x5E, 0x67, 0x90, 0xF5, 0xDA, 0x8F, 1187 0xE2, 0xD1, 0x26, 0xB1, 0x66, 0xC6, 0xB0, 0xCA, 1188 0x7C, 0xE8, 0x08, 0x85, 0x57, 0xE5, 0xAD, 0x01 1189}; 1190uchar_t dsa_subprime_1024[] = { 1191 0x80, 0xBD, 0xBC, 0x1F, 0x32, 0x59, 0x51, 0xC6, 1192 0xE0, 0x36, 0xC7, 0x74, 0x47, 0x16, 0xCF, 0x06, 1193 0xDC, 0x8A, 0xA9, 0x07 1194}; 1195uchar_t dsa_privalue_1024[] = { 1196 0x3F, 0x02, 0xC5, 0xA7, 0x0C, 0x35, 0xAE, 0xF9, 1197 0x9B, 0xED, 0xF4, 0x93, 0xB4, 0x10, 0x09, 0x68, 1198 0x83, 0x2F, 0xCB, 0x9C 1199}; 1200uchar_t dsa_pubvalue_1024[] = { 1201 0x10, 0xEF, 0xCB, 0x38, 0x16, 0xCC, 0xCA, 0x91, 1202 0x13, 0x6C, 0x56, 0x54, 0x67, 0xBF, 0x14, 0x98, 1203 0xB7, 0x9B, 0x67, 0x91, 0xC9, 0x43, 0x6E, 0x04, 1204 0x79, 0x85, 0x0D, 0x74, 0x4C, 0x8B, 0x0E, 0x33, 1205 0x8E, 0x2C, 0xF4, 0x47, 0x4D, 0x2C, 0x3D, 0xE3, 1206 0x50, 0x28, 0x0B, 0x19, 0x8E, 0x7F, 0x25, 0x85, 1207 0xD9, 0xF8, 0x75, 0xE3, 0xE8, 0xE7, 0xDF, 0xAE, 1208 0x6D, 0xC5, 0x63, 0x25, 0x1E, 0x4E, 0x69, 0xBF, 1209 0xCE, 0xA1, 0x9A, 0xEA, 0xDB, 0xC5, 0x73, 0x20, 1210 0x41, 0x9C, 0x1D, 0xCE, 0x28, 0x1D, 0xFE, 0x87, 1211 0x0C, 0x6A, 0x1D, 0x44, 0xF0, 0x56, 0x01, 0x0D, 1212 0xF7, 0x1D, 0x82, 0xFD, 0x8D, 0x20, 0xF2, 0xA3, 1213 0x83, 0x28, 0xD3, 0xED, 0x40, 0x36, 0x0A, 0x4C, 1214 0xAB, 0x2A, 0xB4, 0x9F, 0xA7, 0x9C, 0x53, 0x69, 1215 0xBB, 0xC6, 0xB8, 0x78, 0x5E, 0xAF, 0x8F, 0x4E, 1216 0xFF, 0xCB, 0x2C, 0xB7, 0xD3, 0x53, 0x6D, 0x0A 1217}; 1218 1219uchar_t dsa_known_data[] = { 1220 '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 1221 'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J' 1222}; 1223 1224/* 1225 * NIST-Approved Curves 1226 */ 1227 1228/* P-192 */ 1229uchar_t ec_param_oid_secp192r1[] = /* prime192v1/P192 */ 1230 {0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x3, 0x1, 0x1}; 1231uchar_t ec_point_p192r1[] = { 1232 0x04, 0xa8, 0x57, 0x22, 0x30, 0x43, 0x82, 0xa4, 1233 0x80, 0x2c, 0x46, 0x79, 0x23, 0x8b, 0xe5, 0x08, 1234 0x02, 0xf7, 0xc6, 0x86, 0xda, 0xe8, 0x9b, 0x7b, 1235 0x8c, 0x79, 0xa5, 0x6e, 0x0c, 0x1c, 0x37, 0x47, 1236 0x1d, 0x51, 0x67, 0xe3, 0xdd, 0x2a, 0xc3, 0x1a, 1237 0x29, 0xec, 0xd3, 0xbc, 0xf6, 0x95, 0xeb, 0x22, 1238 0xe0 1239}; 1240uchar_t ec_value_p192r1[] = { 1241 0x52, 0x9b, 0x30, 0x58, 0x69, 0x72, 0x1b, 0x57, 1242 0x9c, 0xe5, 0x29, 0xa1, 0x52, 0x70, 0xb9, 0xbe, 1243 0xf4, 0x3a, 0x63, 0xdd, 0x89, 0xc0, 0xd0, 0xa8 1244}; 1245 1246/* P-224 */ 1247uchar_t ec_param_oid_secp224r1[] = 1248 {0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x21}; 1249uchar_t ec_point_p224r1[] = { 1250 0x04, 1251 0x2B, 0xFF, 0xAF, 0xA1, 0xAA, 0x9A, 0x05, 0x44, 1252 0xBC, 0xC8, 0xD4, 0xAF, 0xC8, 0x53, 0x92, 0xD8, 1253 0xC5, 0x01, 0x70, 0xF2, 0x97, 0x5B, 0x7A, 0x23, 1254 0x7D, 0x39, 0x6A, 0xCD, 0x32, 0xF3, 0x3C, 0x69, 1255 0x8F, 0x42, 0x00, 0xD6, 0x38, 0x0A, 0xF4, 0xCE, 1256 0x6D, 0x43, 0x98, 0xDF, 0x2E, 0x62, 0x90, 0x6E, 1257 0xAD, 0xF7, 0x4E, 0x6C, 0x67, 0x83, 0xC5, 0x69 1258 }; 1259uchar_t ec_value_p224r1[] = { 1260 0x91, 0xE9, 0x9A, 0xA5, 0x6F, 0xA7, 0x9D, 0x90, 1261 0xED, 0x41, 0x25, 0x42, 0xA8, 0x31, 0x4E, 0xE2, 1262 0xEB, 0x95, 0x14, 0x89, 0x6D, 0x78, 0xA0, 0x14, 1263 0x45, 0x8B, 0x85, 0x0E 1264}; 1265 1266 1267/* P-256 */ 1268uchar_t ec_param_oid_secp256r1[] = 1269 {0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x3, 0x1, 0x7}; 1270uchar_t ec_point_p256r1[] = { 1271 0x04, 0xa0, 0x90, 0x62, 0x74, 0x7d, 0x00, 0x6a, 1272 0x84, 0x01, 0xcd, 0x7b, 0x29, 0xf6, 0x53, 0xe3, 1273 0xd3, 0x2b, 0xb7, 0x1f, 0x51, 0x8a, 0x0c, 0xba, 1274 0xe9, 0x3e, 0xd6, 0xa4, 0x90, 0xd3, 0x3a, 0x70, 1275 0x29, 0x11, 0x70, 0xac, 0x03, 0x8b, 0xb0, 0x11, 1276 0xd7, 0x05, 0xd5, 0xce, 0x17, 0x4d, 0x1e, 0x50, 1277 0xdc, 0xea, 0x3b, 0x42, 0x0b, 0x94, 0xcb, 0xda, 1278 0x4a, 0x07, 0xc9, 0xe6, 0x8e, 0x1d, 0x59, 0xd2, 0x77 1279}; 1280uchar_t ec_value_p256r1[] = { 1281 0xf3, 0x58, 0xee, 0xc7, 0xec, 0x32, 0x1c, 0x1a, 1282 0xc6, 0x10, 0xb2, 0x97, 0x15, 0x4e, 0x84, 0x5b, 1283 0xed, 0x36, 0x94, 0xc1, 0xa0, 0xaa, 0x8b, 0x91, 1284 0xba, 0x26, 0x73, 0xeb, 0x6b, 0x2d, 0x4c, 0xde 1285}; 1286 1287/* P-384 */ 1288uchar_t ec_param_oid_secp384r1[] = 1289 {0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x22}; 1290uchar_t ec_point_p384r1[] = { 1291 0x04, 0x2a, 0x87, 0x73, 0x17, 0x2f, 0x61, 0xf6, 1292 0xbc, 0xd1, 0x8b, 0x31, 0x3d, 0xa1, 0x37, 0x4b, 1293 0x39, 0xa6, 0x1e, 0xe1, 0x8a, 0x88, 0x17, 0x2b, 1294 0x86, 0x1a, 0x36, 0xd1, 0x1c, 0x0f, 0x53, 0xd9, 1295 0xc7, 0x48, 0x31, 0x64, 0xcd, 0x20, 0x38, 0x14, 1296 0xdd, 0x16, 0xde, 0x8d, 0xf7, 0xf6, 0x89, 0x43, 1297 0xa0, 0x34, 0x15, 0x5f, 0x70, 0x99, 0x96, 0x55, 1298 0x03, 0x26, 0x7c, 0x34, 0x9f, 0xe4, 0xfe, 0xaa, 1299 0xcc, 0xbb, 0xa1, 0x91, 0x2c, 0xbd, 0xe8, 0xc6, 1300 0x7b, 0xef, 0x17, 0x87, 0x2d, 0x9f, 0xe3, 0x2b, 1301 0x99, 0x17, 0x6d, 0x96, 0xed, 0x44, 0x55, 0x28, 1302 0x53, 0xce, 0xcd, 0x31, 0x8c, 0x3d, 0x90, 0x2f, 0xcf 1303}; 1304uchar_t ec_value_p384r1[] = { 1305 0xfc, 0xcb, 0x14, 0xdd, 0x5f, 0x86, 0x31, 0x74, 1306 0x27, 0xef, 0x19, 0x18, 0x6c, 0x02, 0x2b, 0x94, 1307 0xbf, 0x56, 0x9f, 0x36, 0x5e, 0x38, 0x6b, 0x82, 1308 0x91, 0x70, 0xc4, 0x0f, 0xd6, 0xbe, 0x32, 0x5c, 1309 0x4d, 0xe3, 0x75, 0x98, 0x05, 0x8c, 0x61, 0xe8, 1310 0x70, 0x32, 0x6f, 0xbc, 0xc9, 0x85, 0x0a, 0x34 1311}; 1312 1313/* P-521 */ 1314uchar_t ec_param_oid_secp521r1[] = 1315 {0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x23}; 1316uchar_t ec_point_p521r1[] = { 1317 0x04, 0x01, 0x41, 0x65, 0x78, 0xe4, 0xbd, 0x99, 1318 0x50, 0xc8, 0x2e, 0x4a, 0x82, 0xac, 0x6c, 0x20, 1319 0xcf, 0xf8, 0x2e, 0x72, 0x40, 0x1d, 0x5f, 0x51, 1320 0x5f, 0xcc, 0xb3, 0xa8, 0x52, 0x8c, 0xa6, 0x41, 1321 0x43, 0xd6, 0xd8, 0x13, 0xfd, 0xd8, 0xbb, 0xd9, 1322 0x7c, 0xa7, 0xbf, 0xa8, 0xa8, 0x65, 0x0f, 0xc8, 1323 0xb9, 0x60, 0x13, 0xbc, 0xd3, 0x16, 0x6a, 0x5f, 1324 0xf0, 0x52, 0x49, 0xce, 0x61, 0x8f, 0x1a, 0xf3, 1325 0x6d, 0xe6, 0xce, 0x01, 0x15, 0x98, 0xb0, 0x2f, 1326 0xa0, 0x28, 0x4b, 0x2b, 0xf1, 0xf4, 0xd0, 0x9e, 1327 0xbd, 0xa2, 0xf5, 0xad, 0x04, 0x23, 0xf6, 0x55, 1328 0xdb, 0x08, 0x45, 0x7b, 0xde, 0x6e, 0x7b, 0xce, 1329 0x1d, 0x26, 0x08, 0xc3, 0x01, 0xfd, 0xb1, 0xe1, 1330 0x56, 0xd3, 0xcc, 0x38, 0x38, 0x93, 0x4d, 0x6e, 1331 0xb1, 0x95, 0xd1, 0x9c, 0x91, 0x65, 0x4c, 0x85, 1332 0xe7, 0x64, 0x4f, 0xe5, 0x27, 0x48, 0x81, 0x02, 1333 0x2f, 0x58, 0x29, 0x17, 0x6b 1334}; 1335uchar_t ec_value_p521r1[] = { 1336 0x01, 0x74, 0x8a, 0x92, 0xca, 0x6f, 0x31, 0x1f, 1337 0x45, 0x22, 0x84, 0x9f, 0x33, 0x20, 0x56, 0xb0, 1338 0x5a, 0xdd, 0xda, 0x73, 0x89, 0xb3, 0x21, 0xab, 1339 0xe5, 0xe0, 0xac, 0xe1, 0x6c, 0xa5, 0x59, 0x1b, 1340 0x54, 0x56, 0xd6, 0x45, 0xcb, 0xcf, 0x9f, 0xbd, 1341 0xec, 0x26, 0x43, 0xe8, 0xc4, 0x84, 0xec, 0xa6, 1342 0xdf, 0x09, 0xfc, 0xe3, 0xe3, 0xcb, 0x89, 0x01, 1343 0xce, 0x19, 0x12, 0x3d, 0x61, 0x10, 0x1d, 0x6a, 1344 0xca, 0x39 1345}; 1346 1347 1348/* K-163 */ 1349uchar_t ec_param_oid_sect163k1[] = 1350 {0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x01}; 1351uchar_t ec_point_t163k1[] = { 1352 0x04, 0x05, 0x95, 0xe3, 0x64, 0xed, 0x0b, 0xf5, 1353 0x0b, 0x28, 0x20, 0x31, 0xb5, 0x25, 0x35, 0x0d, 1354 0xc0, 0x5b, 0x16, 0x64, 0x18, 0x7d, 0x01, 0xe4, 1355 0x11, 0xda, 0xa4, 0x1e, 0x79, 0x7b, 0xcd, 0x5a, 1356 0x29, 0xed, 0xdf, 0xec, 0xa0, 0xc2, 0xb5, 0xf7, 1357 0xf3, 0xf6, 0x5a 1358}; 1359uchar_t ec_value_t163k1[] = { 1360 0x03, 0x0d, 0x02, 0xa7, 0xb7, 0x7b, 0x86, 0xe1, 1361 0x6a, 0x4e, 0xea, 0xd5, 0xa5, 0x01, 0x5c, 0x7c, 1362 0x73, 0x60, 0x5b, 0x44, 0x80 1363}; 1364 1365/* K-233 */ 1366uchar_t ec_param_oid_sect233k1[] = 1367 {0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x1a}; 1368uchar_t ec_point_t233k1[] = { 1369 0x04, 0x00, 0xf1, 0x3e, 0x3d, 0xd9, 0xbf, 0x5c, 1370 0x68, 0x9d, 0xb3, 0x2a, 0x4f, 0x0e, 0xb0, 0xfa, 1371 0x97, 0x1a, 0x50, 0xbc, 0xbb, 0x5f, 0x86, 0x05, 1372 0xe3, 0x60, 0x04, 0x81, 0x4b, 0xce, 0x62, 0x01, 1373 0xe7, 0x57, 0xeb, 0xe2, 0x52, 0xc8, 0x4b, 0x84, 1374 0x46, 0xd4, 0xca, 0xce, 0x1d, 0xf8, 0x07, 0x0c, 1375 0x5b, 0x8c, 0x56, 0xce, 0x08, 0xdb, 0x4e, 0x1b, 1376 0xf7, 0xed, 0x56, 0x19, 0x13 1377}; 1378uchar_t ec_value_t233k1[] = { 1379 0x00, 0x61, 0xba, 0xcf, 0x3f, 0x7c, 0x0c, 0x16, 1380 0x81, 0x84, 0x7a, 0x2b, 0x07, 0x88, 0x86, 0x83, 1381 0xc7, 0xdb, 0xc0, 0xc6, 0xc7, 0xb9, 0x55, 0x80, 1382 0x7d, 0x9b, 0x89, 0x0f, 0x6f, 0x9d 1383}; 1384 1385 1386/* K-283 */ 1387uchar_t ec_param_oid_sect283k1[] = 1388 {0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x10}; 1389uchar_t ec_point_t283k1[] = { 1390 0x04, 0x03, 0x63, 0x96, 0xa4, 0xdd, 0x64, 0xf6, 1391 0x9a, 0x76, 0x4e, 0x46, 0x64, 0x39, 0x3f, 0x6d, 1392 0xb6, 0xcc, 0xf8, 0xa8, 0x85, 0xea, 0xd4, 0x59, 1393 0x38, 0xf5, 0xce, 0xb4, 0x57, 0xf3, 0x68, 0xd9, 1394 0x3a, 0x11, 0xd6, 0x88, 0x2f, 0x03, 0x7f, 0x23, 1395 0x70, 0x4a, 0x11, 0x3f, 0x4d, 0x04, 0x57, 0x48, 1396 0xa0, 0x31, 0xd7, 0x0f, 0xec, 0x35, 0x57, 0x4c, 1397 0x01, 0x11, 0xe5, 0xf0, 0x71, 0xa9, 0x69, 0x44, 1398 0xc9, 0xf1, 0xc1, 0xf9, 0xe8, 0xb3, 0x90, 0xae, 0x7f 1399}; 1400uchar_t ec_value_t283k1[] = { 1401 0x01, 0x4d, 0x29, 0x14, 0xf0, 0xed, 0xd5, 0x7d, 1402 0x44, 0x23, 0xc8, 0xa0, 0xc3, 0x4c, 0x90, 0x54, 1403 0x52, 0xaa, 0x30, 0x90, 0xd9, 0x85, 0xc1, 0x45, 1404 0xbf, 0x1d, 0xd6, 0x2b, 0x91, 0x47, 0x87, 0x40, 1405 0xcf, 0x76, 0xa7, 0xa4 1406}; 1407 1408/* K-409 */ 1409uchar_t ec_param_oid_sect409k1[] = 1410 {0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x24}; 1411uchar_t ec_point_t409k1[] = { 1412 0x04, 0x00, 0xed, 0xe7, 0xa4, 0xe0, 0xe6, 0x06, 1413 0xd5, 0xc7, 0x39, 0x08, 0xf3, 0x35, 0xe4, 0x20, 1414 0xd3, 0xb8, 0xbb, 0x24, 0x41, 0x6a, 0x7a, 0xa6, 1415 0x47, 0x72, 0x29, 0xc8, 0x57, 0x59, 0x3d, 0xc3, 1416 0x53, 0xac, 0x0e, 0xeb, 0x00, 0x48, 0xe4, 0x9b, 1417 0xa3, 0xc6, 0x05, 0x01, 0x7f, 0xa7, 0x81, 0xff, 1418 0x18, 0x48, 0xf6, 0x3b, 0x2a, 0x01, 0xb8, 0xef, 1419 0x75, 0x39, 0x2b, 0xb5, 0x3d, 0x80, 0x54, 0xef, 1420 0xee, 0x37, 0xc8, 0x59, 0xdb, 0xad, 0xff, 0xad, 1421 0x52, 0x42, 0x40, 0x2b, 0xcc, 0xdd, 0xa1, 0xd7, 1422 0x83, 0xd0, 0x7d, 0x21, 0xab, 0xc7, 0xbf, 0xb2, 1423 0x1a, 0x4e, 0xb4, 0xe6, 0xb4, 0x1c, 0xe5, 0x9b, 1424 0xbb, 0xb9, 0xef, 0x68, 0x5c, 0xbf, 0x0d, 0xfd, 0x42 1425}; 1426uchar_t ec_value_t409k1[] = { 1427 0x00, 0x74, 0xa9, 0xea, 0x4e, 0xeb, 0x48, 0x7d, 1428 0xc4, 0x7c, 0xd6, 0x09, 0xf9, 0x1d, 0x06, 0x0c, 1429 0xbf, 0x61, 0xa8, 0x8a, 0x70, 0x11, 0x2c, 0xca, 1430 0x2d, 0xb8, 0x0b, 0x3a, 0x83, 0x22, 0x9b, 0x69, 1431 0x22, 0x25, 0x13, 0xe3, 0x4c, 0xe1, 0xed, 0x4e, 1432 0xdd, 0xe4, 0x27, 0x38, 0xc0, 0x75, 0x91, 0xb7, 1433 0xfd, 0x6a, 0x73, 0x1c 1434}; 1435 1436 1437/* K-571 */ 1438uchar_t ec_param_oid_sect571k1[] = 1439 {0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x26}; 1440uchar_t ec_point_t571k1[] = { 1441 0x04, 0x02, 0x90, 0x9c, 0xfe, 0x4f, 0x09, 0x18, 1442 0x38, 0x71, 0xdc, 0x84, 0xda, 0x80, 0x1d, 0xa5, 1443 0xba, 0xad, 0x52, 0xce, 0x72, 0x19, 0x42, 0xb8, 1444 0x6f, 0xa4, 0x31, 0x68, 0xb6, 0xb2, 0x59, 0x4e, 1445 0x49, 0x73, 0x6e, 0xb6, 0xf7, 0x04, 0x19, 0x6d, 1446 0x78, 0x5b, 0x28, 0x5a, 0xf6, 0x9b, 0x33, 0x6b, 1447 0xac, 0x58, 0x1a, 0xcb, 0x52, 0xab, 0xb8, 0x51, 1448 0xe1, 0x27, 0x6e, 0x55, 0x2b, 0xaa, 0x78, 0xd8, 1449 0x27, 0x19, 0x2f, 0x3b, 0xfd, 0x5d, 0x4d, 0xa7, 1450 0x17, 0x05, 0x8a, 0x27, 0xfa, 0x9f, 0xd5, 0xf0, 1451 0xfe, 0xf7, 0x01, 0x7b, 0x2d, 0x53, 0xc5, 0x4a, 1452 0x82, 0xc9, 0xae, 0xb3, 0xde, 0xf8, 0x93, 0xc7, 1453 0x10, 0x2a, 0x95, 0x43, 0x3f, 0x1f, 0xdd, 0xcb, 1454 0x59, 0xf8, 0xc8, 0x2d, 0xa3, 0xce, 0x7e, 0x65, 1455 0x39, 0x85, 0x61, 0x01, 0xb3, 0x25, 0x11, 0xc8, 1456 0x7a, 0xed, 0x15, 0xc4, 0x9d, 0x60, 0x8e, 0xc7, 1457 0x34, 0x6e, 0x15, 0xa1, 0x0f, 0x9c, 0x86, 0x3d, 1458 0x8d, 0x2f, 0xdc, 0x9e, 0xb3, 0xfd, 0xb7, 0x1c, 0x98 1459}; 1460uchar_t ec_value_t571k1[] = { 1461 0x00, 0x18, 0xf8, 0xad, 0x6b, 0x49, 0xa4, 0x31, 1462 0x97, 0x4b, 0xcf, 0x23, 0xa0, 0x7f, 0xf4, 0x66, 1463 0x81, 0x7d, 0xa2, 0x72, 0x11, 0x7d, 0x5b, 0xe1, 1464 0xab, 0x9f, 0xf1, 0xb7, 0xee, 0xea, 0x88, 0xee, 1465 0xd6, 0x20, 0x18, 0xfd, 0x51, 0xb2, 0xa4, 0x06, 1466 0xdc, 0x35, 0x13, 0x32, 0x93, 0x56, 0xbe, 0x55, 1467 0x01, 0xf3, 0xd3, 0x8c, 0xba, 0x8c, 0xcd, 0xd0, 1468 0xa2, 0x49, 0x9c, 0x7d, 0xac, 0x50, 0x4a, 0x17, 1469 0xca, 0xbc, 0x52, 0x39, 0x97, 0xf5, 0xfe, 0xc8 1470}; 1471 1472/* B-163 */ 1473uchar_t ec_param_oid_sect163r2[] = 1474 {0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x0f}; 1475uchar_t ec_point_t163r2[] = { 1476 0x04, 0x05, 0xe7, 0xb8, 0x3c, 0xd5, 0x6b, 0xc1, 1477 0xeb, 0x43, 0x0b, 0xbc, 0xc1, 0xd7, 0xc2, 0xf9, 1478 0xa2, 0xc5, 0x88, 0x4d, 0x48, 0x46, 0x04, 0xd2, 1479 0x80, 0x2f, 0x35, 0x35, 0x38, 0xda, 0x85, 0xab, 1480 0x23, 0xce, 0x85, 0xe5, 0x89, 0xcf, 0x00, 0x5d, 1481 0xf5, 0x39, 0xfc 1482}; 1483uchar_t ec_value_t163r2[] = { 1484 0x01, 0x4d, 0xbd, 0x26, 0x63, 0xc4, 0x6a, 0xec, 1485 0x6d, 0xa5, 0x46, 0x8d, 0xa2, 0x65, 0x64, 0x20, 1486 0xb5, 0x05, 0x8a, 0x94, 0x24 1487}; 1488 1489 1490/* B-233 */ 1491uchar_t ec_param_oid_sect233r1[] = 1492 {0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x1b}; 1493uchar_t ec_point_t233r1[] = { 1494 0x04, 0x01, 0x68, 0x1d, 0x09, 0x0b, 0x67, 0xe4, 1495 0x9c, 0xc1, 0xd9, 0xac, 0x98, 0xec, 0x26, 0x91, 1496 0x0a, 0x08, 0x3b, 0xeb, 0x48, 0xc1, 0xea, 0x79, 1497 0x37, 0xff, 0xc5, 0x3d, 0xad, 0xe9, 0xea, 0x01, 1498 0xab, 0x06, 0x22, 0x4f, 0xb3, 0xfa, 0x23, 0xe3, 1499 0x15, 0xf3, 0x7d, 0xa0, 0x5a, 0xff, 0x1d, 0x00, 1500 0xe0, 0xa2, 0x70, 0xbc, 0x31, 0xef, 0xa0, 0xc9, 1501 0xd4, 0xba, 0xa5, 0x16, 0x62 1502}; 1503uchar_t ec_value_t233r1[] = { 1504 0x00, 0x88, 0x3e, 0x26, 0x83, 0x08, 0x9c, 0xd9, 1505 0x7a, 0x46, 0xae, 0xf8, 0x6d, 0xd3, 0x9c, 0xee, 1506 0xd8, 0xae, 0xf9, 0xd0, 0x5d, 0x96, 0x7e, 0xf9, 1507 0xb0, 0x1c, 0x21, 0x26, 0x9d, 0x64 1508}; 1509 1510 1511/* B-283 */ 1512uchar_t ec_param_oid_sect283r1[] = 1513 {0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x11}; 1514uchar_t ec_point_t283r1[] = { 1515 0x04, 0x03, 0x78, 0x8d, 0x40, 0xd6, 0x34, 0xb6, 1516 0xa0, 0x54, 0x66, 0x23, 0x9d, 0xc0, 0x60, 0x65, 1517 0x7f, 0xeb, 0x6d, 0xe1, 0x9e, 0xee, 0xc3, 0x7a, 1518 0xce, 0x50, 0x4f, 0x66, 0x45, 0x49, 0xcd, 0xbf, 1519 0x5a, 0x8c, 0x84, 0xa7, 0x30, 0x07, 0xc6, 0xbf, 1520 0x90, 0x6b, 0x6d, 0x9b, 0x50, 0x24, 0x66, 0x7b, 1521 0xd2, 0xc9, 0xfe, 0x27, 0xdd, 0xd3, 0xef, 0x15, 1522 0x2e, 0xca, 0x09, 0x93, 0x38, 0x4d, 0x90, 0x9c, 1523 0x0e, 0x6b, 0xad, 0x5b, 0x79, 0xef, 0x45, 0xb0, 0xef 1524}; 1525uchar_t ec_value_t283r1[] = { 1526 0x00, 0xa1, 0xbb, 0x28, 0x7a, 0xc8, 0x63, 0x2a, 1527 0xd4, 0x5e, 0xe1, 0xe2, 0x29, 0x33, 0x74, 0x0f, 1528 0xbb, 0x26, 0x06, 0x36, 0x4f, 0xab, 0x14, 0x35, 1529 0x87, 0x40, 0xb3, 0x99, 0x67, 0xe2, 0x83, 0xcd, 1530 0x44, 0xdf, 0xac, 0xff 1531}; 1532 1533/* B-409 */ 1534uchar_t ec_param_oid_sect409r1[] = 1535 {0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x25}; 1536uchar_t ec_point_t409r1[] = { 1537 0x04, 0x01, 0x28, 0x3c, 0x30, 0xa0, 0x5f, 0x13, 1538 0x3e, 0x72, 0xf5, 0x5f, 0xf6, 0xe9, 0x78, 0x20, 1539 0xb2, 0x8e, 0x81, 0xdd, 0x62, 0xa6, 0x8a, 0x57, 1540 0xaf, 0x94, 0xab, 0x0a, 0x7e, 0xef, 0xb5, 0xda, 1541 0xfe, 0xcf, 0x6f, 0x7f, 0xa7, 0x6d, 0x2c, 0xa6, 1542 0xe4, 0xca, 0x32, 0x7e, 0x7f, 0x45, 0xaa, 0xc8, 1543 0x88, 0x7a, 0x67, 0x36, 0x07, 0x00, 0xdc, 0x7d, 1544 0x11, 0xc7, 0x6e, 0x49, 0xc5, 0x57, 0x80, 0xf2, 1545 0x49, 0xf5, 0xce, 0x62, 0x7b, 0xad, 0xb8, 0xae, 1546 0x24, 0x8d, 0x1d, 0x77, 0xbf, 0x83, 0xd6, 0xc3, 1547 0xf3, 0xa9, 0xb9, 0xe3, 0xa6, 0x47, 0x1a, 0x4a, 1548 0x91, 0x11, 0xd1, 0x4a, 0x48, 0x21, 0x10, 0x16, 1549 0x85, 0x49, 0xb4, 0x45, 0x7f, 0xdf, 0x0f, 0x34, 0x8a 1550}; 1551uchar_t ec_value_t409r1[] = { 1552 0x00, 0xef, 0x9d, 0x02, 0xa8, 0xef, 0xe4, 0xa2, 1553 0xe7, 0x5b, 0x6e, 0x3f, 0x15, 0x2f, 0x64, 0x5b, 1554 0x55, 0xc8, 0xbf, 0xec, 0xca, 0x3a, 0xeb, 0x1c, 1555 0xdd, 0x97, 0x4f, 0x3f, 0xb0, 0x08, 0xfb, 0x4e, 1556 0x1d, 0xd3, 0x40, 0x83, 0x75, 0x82, 0x56, 0x27, 1557 0x6b, 0xfd, 0x83, 0xa8, 0xb7, 0xb6, 0x27, 0xc2, 1558 0x85, 0x22, 0x4f, 0x34 1559}; 1560 1561/* B-571 */ 1562uchar_t ec_param_oid_sect571r1[] = 1563 {0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x27}; 1564uchar_t ec_point_t571r1[] = { 1565 0x04, 0x04, 0x30, 0x6c, 0xfe, 0x2b, 0xff, 0x12, 1566 0x23, 0x8a, 0x3b, 0xe0, 0x07, 0x19, 0x8b, 0xd1, 1567 0xf9, 0x8c, 0x14, 0x3e, 0xea, 0x5f, 0x85, 0x7f, 1568 0x03, 0x20, 0x89, 0x9f, 0x9f, 0x6d, 0xde, 0xcd, 1569 0x35, 0x24, 0xa1, 0x83, 0xf7, 0xb9, 0xd1, 0x4b, 1570 0x4f, 0x20, 0xa8, 0x91, 0x36, 0xa4, 0x75, 0x5e, 1571 0xee, 0x5a, 0x0e, 0x47, 0xf0, 0xa9, 0xff, 0xb6, 1572 0x62, 0x65, 0x2b, 0x85, 0x01, 0x49, 0x59, 0x5f, 1573 0x1d, 0x37, 0x54, 0xf5, 0xdc, 0x61, 0x37, 0x48, 1574 0xbd, 0x02, 0xf2, 0xa2, 0x7d, 0x73, 0x00, 0xfb, 1575 0x15, 0x6c, 0x4e, 0x16, 0x22, 0x82, 0xdb, 0x9d, 1576 0xed, 0x6e, 0xa6, 0x5d, 0x97, 0x19, 0xbb, 0x30, 1577 0x13, 0x22, 0x71, 0x04, 0xc7, 0xd3, 0x83, 0xc2, 1578 0x2c, 0xcf, 0x2f, 0xf9, 0x90, 0xe2, 0x9a, 0xca, 1579 0x97, 0x6b, 0x3c, 0x1d, 0x22, 0xf1, 0x38, 0x6c, 1580 0x14, 0x4e, 0xa9, 0x8d, 0x37, 0xf5, 0x51, 0xbc, 1581 0x2b, 0xc8, 0x03, 0x47, 0x25, 0xd5, 0x30, 0x9b, 1582 0x64, 0xfc, 0x7e, 0x80, 0x70, 0x63, 0xc1, 0x34, 0x86 1583}; 1584uchar_t ec_value_t571r1[] = { 1585 0x03, 0xa0, 0xb6, 0xf6, 0x40, 0x71, 0x56, 0xd8, 1586 0x88, 0xf4, 0x08, 0x13, 0xa1, 0x20, 0x8b, 0x03, 1587 0x04, 0xae, 0x67, 0xc0, 0x7d, 0x1f, 0x19, 0x4b, 1588 0x40, 0xab, 0x75, 0x65, 0x5f, 0x61, 0x0b, 0x0b, 1589 0x72, 0x1d, 0xc3, 0xdf, 0x5c, 0xd2, 0x41, 0xf7, 1590 0x74, 0xe2, 0x26, 0x4d, 0xba, 0xab, 0xcb, 0x6e, 1591 0xcd, 0x86, 0x57, 0x48, 0x7f, 0x3f, 0x2b, 0x91, 1592 0xab, 0x50, 0x61, 0xd0, 0x01, 0xd9, 0x1a, 0xec, 1593 0x7b, 0xb8, 0xcb, 0x3c, 0x72, 0xa7, 0xd5, 0x39 1594}; 1595