@ -13556,11 +13556,11 @@ static struct cipher_testvec cast6_xts_dec_tv_template[] = {
# define AES_CBC_DEC_TEST_VECTORS 5
# define HMAC_MD5_ECB_CIPHER_NULL_ENC_TEST_VECTORS 2
# define HMAC_MD5_ECB_CIPHER_NULL_DEC_TEST_VECTORS 2
# define HMAC_SHA1_ECB_CIPHER_NULL_ENC_TEST_VECTORS 2
# define HMAC_SHA1_ECB_CIPHER_NULL_DEC_TEST_VECTORS 2
# define HMAC_SHA1_AES_CBC_ENC_TEST_VECTORS 7
# define HMAC_SHA256_AES_CBC_ENC_TEST_VECTORS 7
# define HMAC_SHA512_AES_CBC_ENC_TEST_VECTORS 7
# define HMAC_SHA1_ECB_CIPHER_NULL_ENC_TEST_VEC 2
# define HMAC_SHA1_ECB_CIPHER_NULL_DEC_TEST_VEC 2
# define HMAC_SHA1_AES_CBC_ENC_TEST_VEC 7
# define HMAC_SHA256_AES_CBC_ENC_TEST_VEC 7
# define HMAC_SHA512_AES_CBC_ENC_TEST_VEC 7
# define AES_LRW_ENC_TEST_VECTORS 8
# define AES_LRW_DEC_TEST_VECTORS 8
# define AES_XTS_ENC_TEST_VECTORS 5
@ -14448,7 +14448,7 @@ static struct aead_testvec hmac_md5_ecb_cipher_null_dec_tv_template[] = {
} ,
} ;
static struct aead_testvec hmac_sha1_aes_cbc_enc_tv_template [ ] = {
static struct aead_testvec hmac_sha1_aes_cbc_enc_tv_temp [ ] = {
{ /* RFC 3602 Case 1 */
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
@ -14697,7 +14697,7 @@ static struct aead_testvec hmac_sha1_aes_cbc_enc_tv_template[] = {
} ,
} ;
static struct aead_testvec hmac_sha1_ecb_cipher_null_enc_tv_template [ ] = {
static struct aead_testvec hmac_sha1_ecb_cipher_null_enc_tv_temp [ ] = {
{ /* Input data from RFC 2410 Case 1 */
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
@ -14743,7 +14743,7 @@ static struct aead_testvec hmac_sha1_ecb_cipher_null_enc_tv_template[] = {
} ,
} ;
static struct aead_testvec hmac_sha1_ecb_cipher_null_dec_tv_template [ ] = {
static struct aead_testvec hmac_sha1_ecb_cipher_null_dec_tv_temp [ ] = {
{
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
@ -14789,7 +14789,7 @@ static struct aead_testvec hmac_sha1_ecb_cipher_null_dec_tv_template[] = {
} ,
} ;
static struct aead_testvec hmac_sha256_aes_cbc_enc_tv_template [ ] = {
static struct aead_testvec hmac_sha256_aes_cbc_enc_tv_temp [ ] = {
{ /* RFC 3602 Case 1 */
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
@ -15052,7 +15052,7 @@ static struct aead_testvec hmac_sha256_aes_cbc_enc_tv_template[] = {
} ,
} ;
static struct aead_testvec hmac_sha512_aes_cbc_enc_tv_template [ ] = {
static struct aead_testvec hmac_sha512_aes_cbc_enc_tv_temp [ ] = {
{ /* RFC 3602 Case 1 */
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
@ -15371,6 +15371,652 @@ static struct aead_testvec hmac_sha512_aes_cbc_enc_tv_template[] = {
} ,
} ;
# define HMAC_SHA1_DES_CBC_ENC_TEST_VEC 1
static struct aead_testvec hmac_sha1_des_cbc_enc_tv_temp [ ] = {
{ /*Generated with cryptopp*/
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
" \x01 \x00 " /* rta type */
# else
. key = " \x00 \x08 " /* rta length */
" \x00 \x01 " /* rta type */
# endif
" \x00 \x00 \x00 \x08 " /* enc key length */
" \x11 \x22 \x33 \x44 \x55 \x66 \x77 \x88 "
" \x99 \xaa \xbb \xcc \xdd \xee \xff \x11 "
" \x22 \x33 \x44 \x55 "
" \xE9 \xC0 \xFF \x2E \x76 \x0B \x64 \x24 " ,
. klen = 8 + 20 + 8 ,
. iv = " \x7D \x33 \x88 \x93 \x0F \x93 \xB2 \x42 " ,
. assoc = " \x00 \x00 \x43 \x21 \x00 \x00 \x00 \x01 " ,
. alen = 8 ,
. input = " \x6f \x54 \x20 \x6f \x61 \x4d \x79 \x6e "
" \x53 \x20 \x63 \x65 \x65 \x72 \x73 \x74 "
" \x54 \x20 \x6f \x6f \x4d \x20 \x6e \x61 "
" \x20 \x79 \x65 \x53 \x72 \x63 \x74 \x65 "
" \x20 \x73 \x6f \x54 \x20 \x6f \x61 \x4d "
" \x79 \x6e \x53 \x20 \x63 \x65 \x65 \x72 "
" \x73 \x74 \x54 \x20 \x6f \x6f \x4d \x20 "
" \x6e \x61 \x20 \x79 \x65 \x53 \x72 \x63 "
" \x74 \x65 \x20 \x73 \x6f \x54 \x20 \x6f "
" \x61 \x4d \x79 \x6e \x53 \x20 \x63 \x65 "
" \x65 \x72 \x73 \x74 \x54 \x20 \x6f \x6f "
" \x4d \x20 \x6e \x61 \x20 \x79 \x65 \x53 "
" \x72 \x63 \x74 \x65 \x20 \x73 \x6f \x54 "
" \x20 \x6f \x61 \x4d \x79 \x6e \x53 \x20 "
" \x63 \x65 \x65 \x72 \x73 \x74 \x54 \x20 "
" \x6f \x6f \x4d \x20 \x6e \x61 \x0a \x79 " ,
. ilen = 128 ,
. result = " \x70 \xd6 \xde \x64 \x87 \x17 \xf1 \xe8 "
" \x54 \x31 \x85 \x37 \xed \x6b \x01 \x8d "
" \xe3 \xcc \xe0 \x1d \x5e \xf3 \xfe \xf1 "
" \x41 \xaa \x33 \x91 \xa7 \x7d \x99 \x88 "
" \x4d \x85 \x6e \x2f \xa3 \x69 \xf5 \x82 "
" \x3a \x6f \x25 \xcb \x7d \x58 \x1f \x9b "
" \xaa \x9c \x11 \xd5 \x76 \x67 \xce \xde "
" \x56 \xd7 \x5a \x80 \x69 \xea \x3a \x02 "
" \xf0 \xc7 \x7c \xe3 \xcb \x40 \xe5 \x52 "
" \xd1 \x10 \x92 \x78 \x0b \x8e \x5b \xf1 "
" \xe3 \x26 \x1f \xe1 \x15 \x41 \xc7 \xba "
" \x99 \xdb \x08 \x51 \x1c \xd3 \x01 \xf4 "
" \x87 \x47 \x39 \xb8 \xd2 \xdd \xbd \xfb "
" \x66 \x13 \xdf \x1c \x01 \x44 \xf0 \x7a "
" \x1a \x6b \x13 \xf5 \xd5 \x0b \xb8 \xba "
" \x53 \xba \xe1 \x76 \xe3 \x82 \x07 \x86 "
" \x95 \x16 \x20 \x09 \xf5 \x95 \x19 \xfd "
" \x3c \xc7 \xe0 \x42 \xc0 \x14 \x69 \xfa "
" \x5c \x44 \xa9 \x37 " ,
. rlen = 128 + 20 ,
} ,
} ;
# define HMAC_SHA224_DES_CBC_ENC_TEST_VEC 1
static struct aead_testvec hmac_sha224_des_cbc_enc_tv_temp [ ] = {
{ /*Generated with cryptopp*/
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
" \x01 \x00 " /* rta type */
# else
. key = " \x00 \x08 " /* rta length */
" \x00 \x01 " /* rta type */
# endif
" \x00 \x00 \x00 \x08 " /* enc key length */
" \x11 \x22 \x33 \x44 \x55 \x66 \x77 \x88 "
" \x99 \xaa \xbb \xcc \xdd \xee \xff \x11 "
" \x22 \x33 \x44 \x55 \x66 \x77 \x88 \x99 "
" \xE9 \xC0 \xFF \x2E \x76 \x0B \x64 \x24 " ,
. klen = 8 + 24 + 8 ,
. iv = " \x7D \x33 \x88 \x93 \x0F \x93 \xB2 \x42 " ,
. assoc = " \x00 \x00 \x43 \x21 \x00 \x00 \x00 \x01 " ,
. alen = 8 ,
. input = " \x6f \x54 \x20 \x6f \x61 \x4d \x79 \x6e "
" \x53 \x20 \x63 \x65 \x65 \x72 \x73 \x74 "
" \x54 \x20 \x6f \x6f \x4d \x20 \x6e \x61 "
" \x20 \x79 \x65 \x53 \x72 \x63 \x74 \x65 "
" \x20 \x73 \x6f \x54 \x20 \x6f \x61 \x4d "
" \x79 \x6e \x53 \x20 \x63 \x65 \x65 \x72 "
" \x73 \x74 \x54 \x20 \x6f \x6f \x4d \x20 "
" \x6e \x61 \x20 \x79 \x65 \x53 \x72 \x63 "
" \x74 \x65 \x20 \x73 \x6f \x54 \x20 \x6f "
" \x61 \x4d \x79 \x6e \x53 \x20 \x63 \x65 "
" \x65 \x72 \x73 \x74 \x54 \x20 \x6f \x6f "
" \x4d \x20 \x6e \x61 \x20 \x79 \x65 \x53 "
" \x72 \x63 \x74 \x65 \x20 \x73 \x6f \x54 "
" \x20 \x6f \x61 \x4d \x79 \x6e \x53 \x20 "
" \x63 \x65 \x65 \x72 \x73 \x74 \x54 \x20 "
" \x6f \x6f \x4d \x20 \x6e \x61 \x0a \x79 " ,
. ilen = 128 ,
. result = " \x70 \xd6 \xde \x64 \x87 \x17 \xf1 \xe8 "
" \x54 \x31 \x85 \x37 \xed \x6b \x01 \x8d "
" \xe3 \xcc \xe0 \x1d \x5e \xf3 \xfe \xf1 "
" \x41 \xaa \x33 \x91 \xa7 \x7d \x99 \x88 "
" \x4d \x85 \x6e \x2f \xa3 \x69 \xf5 \x82 "
" \x3a \x6f \x25 \xcb \x7d \x58 \x1f \x9b "
" \xaa \x9c \x11 \xd5 \x76 \x67 \xce \xde "
" \x56 \xd7 \x5a \x80 \x69 \xea \x3a \x02 "
" \xf0 \xc7 \x7c \xe3 \xcb \x40 \xe5 \x52 "
" \xd1 \x10 \x92 \x78 \x0b \x8e \x5b \xf1 "
" \xe3 \x26 \x1f \xe1 \x15 \x41 \xc7 \xba "
" \x99 \xdb \x08 \x51 \x1c \xd3 \x01 \xf4 "
" \x87 \x47 \x39 \xb8 \xd2 \xdd \xbd \xfb "
" \x66 \x13 \xdf \x1c \x01 \x44 \xf0 \x7a "
" \x1a \x6b \x13 \xf5 \xd5 \x0b \xb8 \xba "
" \x53 \xba \xe1 \x76 \xe3 \x82 \x07 \x86 "
" \x9c \x2d \x7e \xee \x20 \x34 \x55 \x0a "
" \xce \xb5 \x4e \x64 \x53 \xe7 \xbf \x91 "
" \xab \xd4 \xd9 \xda \xc9 \x12 \xae \xf7 " ,
. rlen = 128 + 24 ,
} ,
} ;
# define HMAC_SHA256_DES_CBC_ENC_TEST_VEC 1
static struct aead_testvec hmac_sha256_des_cbc_enc_tv_temp [ ] = {
{ /*Generated with cryptopp*/
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
" \x01 \x00 " /* rta type */
# else
. key = " \x00 \x08 " /* rta length */
" \x00 \x01 " /* rta type */
# endif
" \x00 \x00 \x00 \x08 " /* enc key length */
" \x11 \x22 \x33 \x44 \x55 \x66 \x77 \x88 "
" \x99 \xaa \xbb \xcc \xdd \xee \xff \x11 "
" \x22 \x33 \x44 \x55 \x66 \x77 \x88 \x99 "
" \xaa \xbb \xcc \xdd \xee \xff \x11 \x22 "
" \xE9 \xC0 \xFF \x2E \x76 \x0B \x64 \x24 " ,
. klen = 8 + 32 + 8 ,
. iv = " \x7D \x33 \x88 \x93 \x0F \x93 \xB2 \x42 " ,
. assoc = " \x00 \x00 \x43 \x21 \x00 \x00 \x00 \x01 " ,
. alen = 8 ,
. input = " \x6f \x54 \x20 \x6f \x61 \x4d \x79 \x6e "
" \x53 \x20 \x63 \x65 \x65 \x72 \x73 \x74 "
" \x54 \x20 \x6f \x6f \x4d \x20 \x6e \x61 "
" \x20 \x79 \x65 \x53 \x72 \x63 \x74 \x65 "
" \x20 \x73 \x6f \x54 \x20 \x6f \x61 \x4d "
" \x79 \x6e \x53 \x20 \x63 \x65 \x65 \x72 "
" \x73 \x74 \x54 \x20 \x6f \x6f \x4d \x20 "
" \x6e \x61 \x20 \x79 \x65 \x53 \x72 \x63 "
" \x74 \x65 \x20 \x73 \x6f \x54 \x20 \x6f "
" \x61 \x4d \x79 \x6e \x53 \x20 \x63 \x65 "
" \x65 \x72 \x73 \x74 \x54 \x20 \x6f \x6f "
" \x4d \x20 \x6e \x61 \x20 \x79 \x65 \x53 "
" \x72 \x63 \x74 \x65 \x20 \x73 \x6f \x54 "
" \x20 \x6f \x61 \x4d \x79 \x6e \x53 \x20 "
" \x63 \x65 \x65 \x72 \x73 \x74 \x54 \x20 "
" \x6f \x6f \x4d \x20 \x6e \x61 \x0a \x79 " ,
. ilen = 128 ,
. result = " \x70 \xd6 \xde \x64 \x87 \x17 \xf1 \xe8 "
" \x54 \x31 \x85 \x37 \xed \x6b \x01 \x8d "
" \xe3 \xcc \xe0 \x1d \x5e \xf3 \xfe \xf1 "
" \x41 \xaa \x33 \x91 \xa7 \x7d \x99 \x88 "
" \x4d \x85 \x6e \x2f \xa3 \x69 \xf5 \x82 "
" \x3a \x6f \x25 \xcb \x7d \x58 \x1f \x9b "
" \xaa \x9c \x11 \xd5 \x76 \x67 \xce \xde "
" \x56 \xd7 \x5a \x80 \x69 \xea \x3a \x02 "
" \xf0 \xc7 \x7c \xe3 \xcb \x40 \xe5 \x52 "
" \xd1 \x10 \x92 \x78 \x0b \x8e \x5b \xf1 "
" \xe3 \x26 \x1f \xe1 \x15 \x41 \xc7 \xba "
" \x99 \xdb \x08 \x51 \x1c \xd3 \x01 \xf4 "
" \x87 \x47 \x39 \xb8 \xd2 \xdd \xbd \xfb "
" \x66 \x13 \xdf \x1c \x01 \x44 \xf0 \x7a "
" \x1a \x6b \x13 \xf5 \xd5 \x0b \xb8 \xba "
" \x53 \xba \xe1 \x76 \xe3 \x82 \x07 \x86 "
" \xc6 \x58 \xa1 \x60 \x70 \x91 \x39 \x36 "
" \x50 \xf6 \x5d \xab \x4b \x51 \x4e \x5e "
" \xde \x63 \xde \x76 \x52 \xde \x9f \xba "
" \x90 \xcf \x15 \xf2 \xbb \x6e \x84 \x00 " ,
. rlen = 128 + 32 ,
} ,
} ;
# define HMAC_SHA384_DES_CBC_ENC_TEST_VEC 1
static struct aead_testvec hmac_sha384_des_cbc_enc_tv_temp [ ] = {
{ /*Generated with cryptopp*/
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
" \x01 \x00 " /* rta type */
# else
. key = " \x00 \x08 " /* rta length */
" \x00 \x01 " /* rta type */
# endif
" \x00 \x00 \x00 \x08 " /* enc key length */
" \x11 \x22 \x33 \x44 \x55 \x66 \x77 \x88 "
" \x99 \xaa \xbb \xcc \xdd \xee \xff \x11 "
" \x22 \x33 \x44 \x55 \x66 \x77 \x88 \x99 "
" \xaa \xbb \xcc \xdd \xee \xff \x11 \x22 "
" \x33 \x44 \x55 \x66 \x77 \x88 \x99 \xaa "
" \xbb \xcc \xdd \xee \xff \x11 \x22 \x33 "
" \xE9 \xC0 \xFF \x2E \x76 \x0B \x64 \x24 " ,
. klen = 8 + 48 + 8 ,
. iv = " \x7D \x33 \x88 \x93 \x0F \x93 \xB2 \x42 " ,
. assoc = " \x00 \x00 \x43 \x21 \x00 \x00 \x00 \x01 " ,
. alen = 8 ,
. input = " \x6f \x54 \x20 \x6f \x61 \x4d \x79 \x6e "
" \x53 \x20 \x63 \x65 \x65 \x72 \x73 \x74 "
" \x54 \x20 \x6f \x6f \x4d \x20 \x6e \x61 "
" \x20 \x79 \x65 \x53 \x72 \x63 \x74 \x65 "
" \x20 \x73 \x6f \x54 \x20 \x6f \x61 \x4d "
" \x79 \x6e \x53 \x20 \x63 \x65 \x65 \x72 "
" \x73 \x74 \x54 \x20 \x6f \x6f \x4d \x20 "
" \x6e \x61 \x20 \x79 \x65 \x53 \x72 \x63 "
" \x74 \x65 \x20 \x73 \x6f \x54 \x20 \x6f "
" \x61 \x4d \x79 \x6e \x53 \x20 \x63 \x65 "
" \x65 \x72 \x73 \x74 \x54 \x20 \x6f \x6f "
" \x4d \x20 \x6e \x61 \x20 \x79 \x65 \x53 "
" \x72 \x63 \x74 \x65 \x20 \x73 \x6f \x54 "
" \x20 \x6f \x61 \x4d \x79 \x6e \x53 \x20 "
" \x63 \x65 \x65 \x72 \x73 \x74 \x54 \x20 "
" \x6f \x6f \x4d \x20 \x6e \x61 \x0a \x79 " ,
. ilen = 128 ,
. result = " \x70 \xd6 \xde \x64 \x87 \x17 \xf1 \xe8 "
" \x54 \x31 \x85 \x37 \xed \x6b \x01 \x8d "
" \xe3 \xcc \xe0 \x1d \x5e \xf3 \xfe \xf1 "
" \x41 \xaa \x33 \x91 \xa7 \x7d \x99 \x88 "
" \x4d \x85 \x6e \x2f \xa3 \x69 \xf5 \x82 "
" \x3a \x6f \x25 \xcb \x7d \x58 \x1f \x9b "
" \xaa \x9c \x11 \xd5 \x76 \x67 \xce \xde "
" \x56 \xd7 \x5a \x80 \x69 \xea \x3a \x02 "
" \xf0 \xc7 \x7c \xe3 \xcb \x40 \xe5 \x52 "
" \xd1 \x10 \x92 \x78 \x0b \x8e \x5b \xf1 "
" \xe3 \x26 \x1f \xe1 \x15 \x41 \xc7 \xba "
" \x99 \xdb \x08 \x51 \x1c \xd3 \x01 \xf4 "
" \x87 \x47 \x39 \xb8 \xd2 \xdd \xbd \xfb "
" \x66 \x13 \xdf \x1c \x01 \x44 \xf0 \x7a "
" \x1a \x6b \x13 \xf5 \xd5 \x0b \xb8 \xba "
" \x53 \xba \xe1 \x76 \xe3 \x82 \x07 \x86 "
" \xa8 \x8e \x9c \x74 \x8c \x2b \x99 \xa0 "
" \xc8 \x8c \xef \x25 \x07 \x83 \x11 \x3a "
" \x31 \x8d \xbe \x3b \x6a \xd7 \x96 \xfe "
" \x5e \x67 \xb5 \x74 \xe7 \xe7 \x85 \x61 "
" \x6a \x95 \x26 \x75 \xcc \x53 \x89 \xf3 "
" \x74 \xc9 \x2a \x76 \x20 \xa2 \x64 \x62 " ,
. rlen = 128 + 48 ,
} ,
} ;
# define HMAC_SHA512_DES_CBC_ENC_TEST_VEC 1
static struct aead_testvec hmac_sha512_des_cbc_enc_tv_temp [ ] = {
{ /*Generated with cryptopp*/
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
" \x01 \x00 " /* rta type */
# else
. key = " \x00 \x08 " /* rta length */
" \x00 \x01 " /* rta type */
# endif
" \x00 \x00 \x00 \x08 " /* enc key length */
" \x11 \x22 \x33 \x44 \x55 \x66 \x77 \x88 "
" \x99 \xaa \xbb \xcc \xdd \xee \xff \x11 "
" \x22 \x33 \x44 \x55 \x66 \x77 \x88 \x99 "
" \xaa \xbb \xcc \xdd \xee \xff \x11 \x22 "
" \x33 \x44 \x55 \x66 \x77 \x88 \x99 \xaa "
" \xbb \xcc \xdd \xee \xff \x11 \x22 \x33 "
" \x44 \x55 \x66 \x77 \x88 \x99 \xaa \xbb "
" \xcc \xdd \xee \xff \x11 \x22 \x33 \x44 "
" \xE9 \xC0 \xFF \x2E \x76 \x0B \x64 \x24 " ,
. klen = 8 + 64 + 8 ,
. iv = " \x7D \x33 \x88 \x93 \x0F \x93 \xB2 \x42 " ,
. assoc = " \x00 \x00 \x43 \x21 \x00 \x00 \x00 \x01 " ,
. alen = 8 ,
. input = " \x6f \x54 \x20 \x6f \x61 \x4d \x79 \x6e "
" \x53 \x20 \x63 \x65 \x65 \x72 \x73 \x74 "
" \x54 \x20 \x6f \x6f \x4d \x20 \x6e \x61 "
" \x20 \x79 \x65 \x53 \x72 \x63 \x74 \x65 "
" \x20 \x73 \x6f \x54 \x20 \x6f \x61 \x4d "
" \x79 \x6e \x53 \x20 \x63 \x65 \x65 \x72 "
" \x73 \x74 \x54 \x20 \x6f \x6f \x4d \x20 "
" \x6e \x61 \x20 \x79 \x65 \x53 \x72 \x63 "
" \x74 \x65 \x20 \x73 \x6f \x54 \x20 \x6f "
" \x61 \x4d \x79 \x6e \x53 \x20 \x63 \x65 "
" \x65 \x72 \x73 \x74 \x54 \x20 \x6f \x6f "
" \x4d \x20 \x6e \x61 \x20 \x79 \x65 \x53 "
" \x72 \x63 \x74 \x65 \x20 \x73 \x6f \x54 "
" \x20 \x6f \x61 \x4d \x79 \x6e \x53 \x20 "
" \x63 \x65 \x65 \x72 \x73 \x74 \x54 \x20 "
" \x6f \x6f \x4d \x20 \x6e \x61 \x0a \x79 " ,
. ilen = 128 ,
. result = " \x70 \xd6 \xde \x64 \x87 \x17 \xf1 \xe8 "
" \x54 \x31 \x85 \x37 \xed \x6b \x01 \x8d "
" \xe3 \xcc \xe0 \x1d \x5e \xf3 \xfe \xf1 "
" \x41 \xaa \x33 \x91 \xa7 \x7d \x99 \x88 "
" \x4d \x85 \x6e \x2f \xa3 \x69 \xf5 \x82 "
" \x3a \x6f \x25 \xcb \x7d \x58 \x1f \x9b "
" \xaa \x9c \x11 \xd5 \x76 \x67 \xce \xde "
" \x56 \xd7 \x5a \x80 \x69 \xea \x3a \x02 "
" \xf0 \xc7 \x7c \xe3 \xcb \x40 \xe5 \x52 "
" \xd1 \x10 \x92 \x78 \x0b \x8e \x5b \xf1 "
" \xe3 \x26 \x1f \xe1 \x15 \x41 \xc7 \xba "
" \x99 \xdb \x08 \x51 \x1c \xd3 \x01 \xf4 "
" \x87 \x47 \x39 \xb8 \xd2 \xdd \xbd \xfb "
" \x66 \x13 \xdf \x1c \x01 \x44 \xf0 \x7a "
" \x1a \x6b \x13 \xf5 \xd5 \x0b \xb8 \xba "
" \x53 \xba \xe1 \x76 \xe3 \x82 \x07 \x86 "
" \xc6 \x2c \x73 \x88 \xb0 \x9d \x5f \x3e "
" \x5b \x78 \xca \x0e \xab \x8a \xa3 \xbb "
" \xd9 \x1d \xc3 \xe3 \x05 \xac \x76 \xfb "
" \x58 \x83 \xda \x67 \xfb \x21 \x24 \xa2 "
" \xb1 \xa7 \xd7 \x66 \xa6 \x8d \xa6 \x93 "
" \x97 \xe2 \xe3 \xb8 \xaa \x48 \x85 \xee "
" \x8c \xf6 \x07 \x95 \x1f \xa6 \x6c \x96 "
" \x99 \xc7 \x5c \x8d \xd8 \xb5 \x68 \x7b " ,
. rlen = 128 + 64 ,
} ,
} ;
# define HMAC_SHA1_DES3_EDE_CBC_ENC_TEST_VEC 1
static struct aead_testvec hmac_sha1_des3_ede_cbc_enc_tv_temp [ ] = {
{ /*Generated with cryptopp*/
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
" \x01 \x00 " /* rta type */
# else
. key = " \x00 \x08 " /* rta length */
" \x00 \x01 " /* rta type */
# endif
" \x00 \x00 \x00 \x18 " /* enc key length */
" \x11 \x22 \x33 \x44 \x55 \x66 \x77 \x88 "
" \x99 \xaa \xbb \xcc \xdd \xee \xff \x11 "
" \x22 \x33 \x44 \x55 "
" \xE9 \xC0 \xFF \x2E \x76 \x0B \x64 \x24 "
" \x44 \x4D \x99 \x5A \x12 \xD6 \x40 \xC0 "
" \xEA \xC2 \x84 \xE8 \x14 \x95 \xDB \xE8 " ,
. klen = 8 + 20 + 24 ,
. iv = " \x7D \x33 \x88 \x93 \x0F \x93 \xB2 \x42 " ,
. assoc = " \x00 \x00 \x43 \x21 \x00 \x00 \x00 \x01 " ,
. alen = 8 ,
. input = " \x6f \x54 \x20 \x6f \x61 \x4d \x79 \x6e "
" \x53 \x20 \x63 \x65 \x65 \x72 \x73 \x74 "
" \x54 \x20 \x6f \x6f \x4d \x20 \x6e \x61 "
" \x20 \x79 \x65 \x53 \x72 \x63 \x74 \x65 "
" \x20 \x73 \x6f \x54 \x20 \x6f \x61 \x4d "
" \x79 \x6e \x53 \x20 \x63 \x65 \x65 \x72 "
" \x73 \x74 \x54 \x20 \x6f \x6f \x4d \x20 "
" \x6e \x61 \x20 \x79 \x65 \x53 \x72 \x63 "
" \x74 \x65 \x20 \x73 \x6f \x54 \x20 \x6f "
" \x61 \x4d \x79 \x6e \x53 \x20 \x63 \x65 "
" \x65 \x72 \x73 \x74 \x54 \x20 \x6f \x6f "
" \x4d \x20 \x6e \x61 \x20 \x79 \x65 \x53 "
" \x72 \x63 \x74 \x65 \x20 \x73 \x6f \x54 "
" \x20 \x6f \x61 \x4d \x79 \x6e \x53 \x20 "
" \x63 \x65 \x65 \x72 \x73 \x74 \x54 \x20 "
" \x6f \x6f \x4d \x20 \x6e \x61 \x0a \x79 " ,
. ilen = 128 ,
. result = " \x0e \x2d \xb6 \x97 \x3c \x56 \x33 \xf4 "
" \x67 \x17 \x21 \xc7 \x6e \x8a \xd5 \x49 "
" \x74 \xb3 \x49 \x05 \xc5 \x1c \xd0 \xed "
" \x12 \x56 \x5c \x53 \x96 \xb6 \x00 \x7d "
" \x90 \x48 \xfc \xf5 \x8d \x29 \x39 \xcc "
" \x8a \xd5 \x35 \x18 \x36 \x23 \x4e \xd7 "
" \x76 \xd1 \xda \x0c \x94 \x67 \xbb \x04 "
" \x8b \xf2 \x03 \x6c \xa8 \xcf \xb6 \xea "
" \x22 \x64 \x47 \xaa \x8f \x75 \x13 \xbf "
" \x9f \xc2 \xc3 \xf0 \xc9 \x56 \xc5 \x7a "
" \x71 \x63 \x2e \x89 \x7b \x1e \x12 \xca "
" \xe2 \x5f \xaf \xd8 \xa4 \xf8 \xc9 \x7a "
" \xd6 \xf9 \x21 \x31 \x62 \x44 \x45 \xa6 "
" \xd6 \xbc \x5a \xd3 \x2d \x54 \x43 \xcc "
" \x9d \xde \xa5 \x70 \xe9 \x42 \x45 \x8a "
" \x6b \xfa \xb1 \x91 \x13 \xb0 \xd9 \x19 "
" \x67 \x6d \xb1 \xf5 \xb8 \x10 \xdc \xc6 "
" \x75 \x86 \x96 \x6b \xb1 \xc5 \xe4 \xcf "
" \xd1 \x60 \x91 \xb3 " ,
. rlen = 128 + 20 ,
} ,
} ;
# define HMAC_SHA224_DES3_EDE_CBC_ENC_TEST_VEC 1
static struct aead_testvec hmac_sha224_des3_ede_cbc_enc_tv_temp [ ] = {
{ /*Generated with cryptopp*/
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
" \x01 \x00 " /* rta type */
# else
. key = " \x00 \x08 " /* rta length */
" \x00 \x01 " /* rta type */
# endif
" \x00 \x00 \x00 \x18 " /* enc key length */
" \x11 \x22 \x33 \x44 \x55 \x66 \x77 \x88 "
" \x99 \xaa \xbb \xcc \xdd \xee \xff \x11 "
" \x22 \x33 \x44 \x55 \x66 \x77 \x88 \x99 "
" \xE9 \xC0 \xFF \x2E \x76 \x0B \x64 \x24 "
" \x44 \x4D \x99 \x5A \x12 \xD6 \x40 \xC0 "
" \xEA \xC2 \x84 \xE8 \x14 \x95 \xDB \xE8 " ,
. klen = 8 + 24 + 24 ,
. iv = " \x7D \x33 \x88 \x93 \x0F \x93 \xB2 \x42 " ,
. assoc = " \x00 \x00 \x43 \x21 \x00 \x00 \x00 \x01 " ,
. alen = 8 ,
. input = " \x6f \x54 \x20 \x6f \x61 \x4d \x79 \x6e "
" \x53 \x20 \x63 \x65 \x65 \x72 \x73 \x74 "
" \x54 \x20 \x6f \x6f \x4d \x20 \x6e \x61 "
" \x20 \x79 \x65 \x53 \x72 \x63 \x74 \x65 "
" \x20 \x73 \x6f \x54 \x20 \x6f \x61 \x4d "
" \x79 \x6e \x53 \x20 \x63 \x65 \x65 \x72 "
" \x73 \x74 \x54 \x20 \x6f \x6f \x4d \x20 "
" \x6e \x61 \x20 \x79 \x65 \x53 \x72 \x63 "
" \x74 \x65 \x20 \x73 \x6f \x54 \x20 \x6f "
" \x61 \x4d \x79 \x6e \x53 \x20 \x63 \x65 "
" \x65 \x72 \x73 \x74 \x54 \x20 \x6f \x6f "
" \x4d \x20 \x6e \x61 \x20 \x79 \x65 \x53 "
" \x72 \x63 \x74 \x65 \x20 \x73 \x6f \x54 "
" \x20 \x6f \x61 \x4d \x79 \x6e \x53 \x20 "
" \x63 \x65 \x65 \x72 \x73 \x74 \x54 \x20 "
" \x6f \x6f \x4d \x20 \x6e \x61 \x0a \x79 " ,
. ilen = 128 ,
. result = " \x0e \x2d \xb6 \x97 \x3c \x56 \x33 \xf4 "
" \x67 \x17 \x21 \xc7 \x6e \x8a \xd5 \x49 "
" \x74 \xb3 \x49 \x05 \xc5 \x1c \xd0 \xed "
" \x12 \x56 \x5c \x53 \x96 \xb6 \x00 \x7d "
" \x90 \x48 \xfc \xf5 \x8d \x29 \x39 \xcc "
" \x8a \xd5 \x35 \x18 \x36 \x23 \x4e \xd7 "
" \x76 \xd1 \xda \x0c \x94 \x67 \xbb \x04 "
" \x8b \xf2 \x03 \x6c \xa8 \xcf \xb6 \xea "
" \x22 \x64 \x47 \xaa \x8f \x75 \x13 \xbf "
" \x9f \xc2 \xc3 \xf0 \xc9 \x56 \xc5 \x7a "
" \x71 \x63 \x2e \x89 \x7b \x1e \x12 \xca "
" \xe2 \x5f \xaf \xd8 \xa4 \xf8 \xc9 \x7a "
" \xd6 \xf9 \x21 \x31 \x62 \x44 \x45 \xa6 "
" \xd6 \xbc \x5a \xd3 \x2d \x54 \x43 \xcc "
" \x9d \xde \xa5 \x70 \xe9 \x42 \x45 \x8a "
" \x6b \xfa \xb1 \x91 \x13 \xb0 \xd9 \x19 "
" \x15 \x24 \x7f \x5a \x45 \x4a \x66 \xce "
" \x2b \x0b \x93 \x99 \x2f \x9d \x0c \x6c "
" \x56 \x1f \xe1 \xa6 \x41 \xb2 \x4c \xd0 " ,
. rlen = 128 + 24 ,
} ,
} ;
# define HMAC_SHA256_DES3_EDE_CBC_ENC_TEST_VEC 1
static struct aead_testvec hmac_sha256_des3_ede_cbc_enc_tv_temp [ ] = {
{ /*Generated with cryptopp*/
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
" \x01 \x00 " /* rta type */
# else
. key = " \x00 \x08 " /* rta length */
" \x00 \x01 " /* rta type */
# endif
" \x00 \x00 \x00 \x18 " /* enc key length */
" \x11 \x22 \x33 \x44 \x55 \x66 \x77 \x88 "
" \x99 \xaa \xbb \xcc \xdd \xee \xff \x11 "
" \x22 \x33 \x44 \x55 \x66 \x77 \x88 \x99 "
" \xaa \xbb \xcc \xdd \xee \xff \x11 \x22 "
" \xE9 \xC0 \xFF \x2E \x76 \x0B \x64 \x24 "
" \x44 \x4D \x99 \x5A \x12 \xD6 \x40 \xC0 "
" \xEA \xC2 \x84 \xE8 \x14 \x95 \xDB \xE8 " ,
. klen = 8 + 32 + 24 ,
. iv = " \x7D \x33 \x88 \x93 \x0F \x93 \xB2 \x42 " ,
. assoc = " \x00 \x00 \x43 \x21 \x00 \x00 \x00 \x01 " ,
. alen = 8 ,
. input = " \x6f \x54 \x20 \x6f \x61 \x4d \x79 \x6e "
" \x53 \x20 \x63 \x65 \x65 \x72 \x73 \x74 "
" \x54 \x20 \x6f \x6f \x4d \x20 \x6e \x61 "
" \x20 \x79 \x65 \x53 \x72 \x63 \x74 \x65 "
" \x20 \x73 \x6f \x54 \x20 \x6f \x61 \x4d "
" \x79 \x6e \x53 \x20 \x63 \x65 \x65 \x72 "
" \x73 \x74 \x54 \x20 \x6f \x6f \x4d \x20 "
" \x6e \x61 \x20 \x79 \x65 \x53 \x72 \x63 "
" \x74 \x65 \x20 \x73 \x6f \x54 \x20 \x6f "
" \x61 \x4d \x79 \x6e \x53 \x20 \x63 \x65 "
" \x65 \x72 \x73 \x74 \x54 \x20 \x6f \x6f "
" \x4d \x20 \x6e \x61 \x20 \x79 \x65 \x53 "
" \x72 \x63 \x74 \x65 \x20 \x73 \x6f \x54 "
" \x20 \x6f \x61 \x4d \x79 \x6e \x53 \x20 "
" \x63 \x65 \x65 \x72 \x73 \x74 \x54 \x20 "
" \x6f \x6f \x4d \x20 \x6e \x61 \x0a \x79 " ,
. ilen = 128 ,
. result = " \x0e \x2d \xb6 \x97 \x3c \x56 \x33 \xf4 "
" \x67 \x17 \x21 \xc7 \x6e \x8a \xd5 \x49 "
" \x74 \xb3 \x49 \x05 \xc5 \x1c \xd0 \xed "
" \x12 \x56 \x5c \x53 \x96 \xb6 \x00 \x7d "
" \x90 \x48 \xfc \xf5 \x8d \x29 \x39 \xcc "
" \x8a \xd5 \x35 \x18 \x36 \x23 \x4e \xd7 "
" \x76 \xd1 \xda \x0c \x94 \x67 \xbb \x04 "
" \x8b \xf2 \x03 \x6c \xa8 \xcf \xb6 \xea "
" \x22 \x64 \x47 \xaa \x8f \x75 \x13 \xbf "
" \x9f \xc2 \xc3 \xf0 \xc9 \x56 \xc5 \x7a "
" \x71 \x63 \x2e \x89 \x7b \x1e \x12 \xca "
" \xe2 \x5f \xaf \xd8 \xa4 \xf8 \xc9 \x7a "
" \xd6 \xf9 \x21 \x31 \x62 \x44 \x45 \xa6 "
" \xd6 \xbc \x5a \xd3 \x2d \x54 \x43 \xcc "
" \x9d \xde \xa5 \x70 \xe9 \x42 \x45 \x8a "
" \x6b \xfa \xb1 \x91 \x13 \xb0 \xd9 \x19 "
" \x73 \xb0 \xea \x9f \xe8 \x18 \x80 \xd6 "
" \x56 \x38 \x44 \xc0 \xdb \xe3 \x4f \x71 "
" \xf7 \xce \xd1 \xd3 \xf8 \xbd \x3e \x4f "
" \xca \x43 \x95 \xdf \x80 \x61 \x81 \xa9 " ,
. rlen = 128 + 32 ,
} ,
} ;
# define HMAC_SHA384_DES3_EDE_CBC_ENC_TEST_VEC 1
static struct aead_testvec hmac_sha384_des3_ede_cbc_enc_tv_temp [ ] = {
{ /*Generated with cryptopp*/
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
" \x01 \x00 " /* rta type */
# else
. key = " \x00 \x08 " /* rta length */
" \x00 \x01 " /* rta type */
# endif
" \x00 \x00 \x00 \x18 " /* enc key length */
" \x11 \x22 \x33 \x44 \x55 \x66 \x77 \x88 "
" \x99 \xaa \xbb \xcc \xdd \xee \xff \x11 "
" \x22 \x33 \x44 \x55 \x66 \x77 \x88 \x99 "
" \xaa \xbb \xcc \xdd \xee \xff \x11 \x22 "
" \x33 \x44 \x55 \x66 \x77 \x88 \x99 \xaa "
" \xbb \xcc \xdd \xee \xff \x11 \x22 \x33 "
" \xE9 \xC0 \xFF \x2E \x76 \x0B \x64 \x24 "
" \x44 \x4D \x99 \x5A \x12 \xD6 \x40 \xC0 "
" \xEA \xC2 \x84 \xE8 \x14 \x95 \xDB \xE8 " ,
. klen = 8 + 48 + 24 ,
. iv = " \x7D \x33 \x88 \x93 \x0F \x93 \xB2 \x42 " ,
. assoc = " \x00 \x00 \x43 \x21 \x00 \x00 \x00 \x01 " ,
. alen = 8 ,
. input = " \x6f \x54 \x20 \x6f \x61 \x4d \x79 \x6e "
" \x53 \x20 \x63 \x65 \x65 \x72 \x73 \x74 "
" \x54 \x20 \x6f \x6f \x4d \x20 \x6e \x61 "
" \x20 \x79 \x65 \x53 \x72 \x63 \x74 \x65 "
" \x20 \x73 \x6f \x54 \x20 \x6f \x61 \x4d "
" \x79 \x6e \x53 \x20 \x63 \x65 \x65 \x72 "
" \x73 \x74 \x54 \x20 \x6f \x6f \x4d \x20 "
" \x6e \x61 \x20 \x79 \x65 \x53 \x72 \x63 "
" \x74 \x65 \x20 \x73 \x6f \x54 \x20 \x6f "
" \x61 \x4d \x79 \x6e \x53 \x20 \x63 \x65 "
" \x65 \x72 \x73 \x74 \x54 \x20 \x6f \x6f "
" \x4d \x20 \x6e \x61 \x20 \x79 \x65 \x53 "
" \x72 \x63 \x74 \x65 \x20 \x73 \x6f \x54 "
" \x20 \x6f \x61 \x4d \x79 \x6e \x53 \x20 "
" \x63 \x65 \x65 \x72 \x73 \x74 \x54 \x20 "
" \x6f \x6f \x4d \x20 \x6e \x61 \x0a \x79 " ,
. ilen = 128 ,
. result = " \x0e \x2d \xb6 \x97 \x3c \x56 \x33 \xf4 "
" \x67 \x17 \x21 \xc7 \x6e \x8a \xd5 \x49 "
" \x74 \xb3 \x49 \x05 \xc5 \x1c \xd0 \xed "
" \x12 \x56 \x5c \x53 \x96 \xb6 \x00 \x7d "
" \x90 \x48 \xfc \xf5 \x8d \x29 \x39 \xcc "
" \x8a \xd5 \x35 \x18 \x36 \x23 \x4e \xd7 "
" \x76 \xd1 \xda \x0c \x94 \x67 \xbb \x04 "
" \x8b \xf2 \x03 \x6c \xa8 \xcf \xb6 \xea "
" \x22 \x64 \x47 \xaa \x8f \x75 \x13 \xbf "
" \x9f \xc2 \xc3 \xf0 \xc9 \x56 \xc5 \x7a "
" \x71 \x63 \x2e \x89 \x7b \x1e \x12 \xca "
" \xe2 \x5f \xaf \xd8 \xa4 \xf8 \xc9 \x7a "
" \xd6 \xf9 \x21 \x31 \x62 \x44 \x45 \xa6 "
" \xd6 \xbc \x5a \xd3 \x2d \x54 \x43 \xcc "
" \x9d \xde \xa5 \x70 \xe9 \x42 \x45 \x8a "
" \x6b \xfa \xb1 \x91 \x13 \xb0 \xd9 \x19 "
" \x6d \x77 \xfc \x80 \x9d \x8a \x9c \xb7 "
" \x70 \xe7 \x93 \xbf \x73 \xe6 \x9f \x83 "
" \x99 \x62 \x23 \xe6 \x5b \xd0 \xda \x18 "
" \xa4 \x32 \x8a \x0b \x46 \xd7 \xf0 \x39 "
" \x36 \x5d \x13 \x2f \x86 \x10 \x78 \xd6 "
" \xd6 \xbe \x5c \xb9 \x15 \x89 \xf9 \x1b " ,
. rlen = 128 + 48 ,
} ,
} ;
# define HMAC_SHA512_DES3_EDE_CBC_ENC_TEST_VEC 1
static struct aead_testvec hmac_sha512_des3_ede_cbc_enc_tv_temp [ ] = {
{ /*Generated with cryptopp*/
# ifdef __LITTLE_ENDIAN
. key = " \x08 \x00 " /* rta length */
" \x01 \x00 " /* rta type */
# else
. key = " \x00 \x08 " /* rta length */
" \x00 \x01 " /* rta type */
# endif
" \x00 \x00 \x00 \x18 " /* enc key length */
" \x11 \x22 \x33 \x44 \x55 \x66 \x77 \x88 "
" \x99 \xaa \xbb \xcc \xdd \xee \xff \x11 "
" \x22 \x33 \x44 \x55 \x66 \x77 \x88 \x99 "
" \xaa \xbb \xcc \xdd \xee \xff \x11 \x22 "
" \x33 \x44 \x55 \x66 \x77 \x88 \x99 \xaa "
" \xbb \xcc \xdd \xee \xff \x11 \x22 \x33 "
" \x44 \x55 \x66 \x77 \x88 \x99 \xaa \xbb "
" \xcc \xdd \xee \xff \x11 \x22 \x33 \x44 "
" \xE9 \xC0 \xFF \x2E \x76 \x0B \x64 \x24 "
" \x44 \x4D \x99 \x5A \x12 \xD6 \x40 \xC0 "
" \xEA \xC2 \x84 \xE8 \x14 \x95 \xDB \xE8 " ,
. klen = 8 + 64 + 24 ,
. iv = " \x7D \x33 \x88 \x93 \x0F \x93 \xB2 \x42 " ,
. assoc = " \x00 \x00 \x43 \x21 \x00 \x00 \x00 \x01 " ,
. alen = 8 ,
. input = " \x6f \x54 \x20 \x6f \x61 \x4d \x79 \x6e "
" \x53 \x20 \x63 \x65 \x65 \x72 \x73 \x74 "
" \x54 \x20 \x6f \x6f \x4d \x20 \x6e \x61 "
" \x20 \x79 \x65 \x53 \x72 \x63 \x74 \x65 "
" \x20 \x73 \x6f \x54 \x20 \x6f \x61 \x4d "
" \x79 \x6e \x53 \x20 \x63 \x65 \x65 \x72 "
" \x73 \x74 \x54 \x20 \x6f \x6f \x4d \x20 "
" \x6e \x61 \x20 \x79 \x65 \x53 \x72 \x63 "
" \x74 \x65 \x20 \x73 \x6f \x54 \x20 \x6f "
" \x61 \x4d \x79 \x6e \x53 \x20 \x63 \x65 "
" \x65 \x72 \x73 \x74 \x54 \x20 \x6f \x6f "
" \x4d \x20 \x6e \x61 \x20 \x79 \x65 \x53 "
" \x72 \x63 \x74 \x65 \x20 \x73 \x6f \x54 "
" \x20 \x6f \x61 \x4d \x79 \x6e \x53 \x20 "
" \x63 \x65 \x65 \x72 \x73 \x74 \x54 \x20 "
" \x6f \x6f \x4d \x20 \x6e \x61 \x0a \x79 " ,
. ilen = 128 ,
. result = " \x0e \x2d \xb6 \x97 \x3c \x56 \x33 \xf4 "
" \x67 \x17 \x21 \xc7 \x6e \x8a \xd5 \x49 "
" \x74 \xb3 \x49 \x05 \xc5 \x1c \xd0 \xed "
" \x12 \x56 \x5c \x53 \x96 \xb6 \x00 \x7d "
" \x90 \x48 \xfc \xf5 \x8d \x29 \x39 \xcc "
" \x8a \xd5 \x35 \x18 \x36 \x23 \x4e \xd7 "
" \x76 \xd1 \xda \x0c \x94 \x67 \xbb \x04 "
" \x8b \xf2 \x03 \x6c \xa8 \xcf \xb6 \xea "
" \x22 \x64 \x47 \xaa \x8f \x75 \x13 \xbf "
" \x9f \xc2 \xc3 \xf0 \xc9 \x56 \xc5 \x7a "
" \x71 \x63 \x2e \x89 \x7b \x1e \x12 \xca "
" \xe2 \x5f \xaf \xd8 \xa4 \xf8 \xc9 \x7a "
" \xd6 \xf9 \x21 \x31 \x62 \x44 \x45 \xa6 "
" \xd6 \xbc \x5a \xd3 \x2d \x54 \x43 \xcc "
" \x9d \xde \xa5 \x70 \xe9 \x42 \x45 \x8a "
" \x6b \xfa \xb1 \x91 \x13 \xb0 \xd9 \x19 "
" \x41 \xb5 \x1f \xbb \xbd \x4e \xb8 \x32 "
" \x22 \x86 \x4e \x57 \x1b \x2a \xd8 \x6e "
" \xa9 \xfb \xc8 \xf3 \xbf \x2d \xae \x2b "
" \x3b \xbc \x41 \xe8 \x38 \xbb \xf1 \x60 "
" \x4c \x68 \xa9 \x4e \x8c \x73 \xa7 \xc0 "
" \x2a \x74 \xd4 \x65 \x12 \xcb \x55 \xf2 "
" \xd5 \x02 \x6d \xe6 \xaf \xc9 \x2f \xf2 "
" \x57 \xaa \x85 \xf7 \xf3 \x6a \xcb \xdb " ,
. rlen = 128 + 64 ,
} ,
} ;
static struct cipher_testvec aes_lrw_enc_tv_template [ ] = {
/* from http://grouper.ieee.org/groups/1619/email/pdf00017.pdf */
{ /* LRW-32-AES 1 */