25b7313fc1
Cryptodev performance tests do not need to use any function
from rte_hexdump.h.
Fixes: 202d375c60
("app/test: add cryptodev unit and performance tests")
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
Acked-by: Fan Zhang <roy.fan.zhang@intel.com>
2948 lines
113 KiB
C
2948 lines
113 KiB
C
/*-
|
|
* BSD LICENSE
|
|
*
|
|
* Copyright(c) 2015-2016 Intel Corporation. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* * Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
* * Neither the name of Intel Corporation nor the names of its
|
|
* contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <rte_common.h>
|
|
#include <rte_mbuf.h>
|
|
#include <rte_malloc.h>
|
|
#include <rte_memcpy.h>
|
|
|
|
#include <rte_crypto.h>
|
|
#include <rte_cryptodev.h>
|
|
#include <rte_cycles.h>
|
|
|
|
#include "test.h"
|
|
#include "test_cryptodev.h"
|
|
|
|
|
|
#define PERF_NUM_OPS_INFLIGHT (128)
|
|
#define DEFAULT_NUM_REQS_TO_SUBMIT (10000000)
|
|
|
|
struct crypto_testsuite_params {
|
|
struct rte_mempool *mbuf_mp;
|
|
struct rte_mempool *op_mpool;
|
|
|
|
uint16_t nb_queue_pairs;
|
|
|
|
struct rte_cryptodev_config conf;
|
|
struct rte_cryptodev_qp_conf qp_conf;
|
|
uint8_t dev_id;
|
|
};
|
|
|
|
enum chain_mode {
|
|
CIPHER_HASH,
|
|
HASH_CIPHER,
|
|
CIPHER_ONLY,
|
|
HASH_ONLY
|
|
};
|
|
|
|
struct perf_test_params {
|
|
|
|
unsigned total_operations;
|
|
unsigned burst_size;
|
|
unsigned buf_size;
|
|
|
|
enum chain_mode chain;
|
|
|
|
enum rte_crypto_cipher_algorithm cipher_algo;
|
|
unsigned cipher_key_length;
|
|
enum rte_crypto_auth_algorithm auth_algo;
|
|
};
|
|
|
|
#define MAX_NUM_OF_OPS_PER_UT (128)
|
|
|
|
struct crypto_unittest_params {
|
|
struct rte_crypto_sym_xform cipher_xform;
|
|
struct rte_crypto_sym_xform auth_xform;
|
|
|
|
struct rte_cryptodev_sym_session *sess;
|
|
|
|
struct rte_crypto_op *op;
|
|
|
|
struct rte_mbuf *obuf[MAX_NUM_OF_OPS_PER_UT];
|
|
struct rte_mbuf *ibuf[MAX_NUM_OF_OPS_PER_UT];
|
|
|
|
uint8_t *digest;
|
|
};
|
|
|
|
static struct rte_cryptodev_sym_session *
|
|
test_perf_create_snow3g_session(uint8_t dev_id, enum chain_mode chain,
|
|
enum rte_crypto_cipher_algorithm cipher_algo, unsigned cipher_key_len,
|
|
enum rte_crypto_auth_algorithm auth_algo);
|
|
static struct rte_mbuf *
|
|
test_perf_create_pktmbuf(struct rte_mempool *mpool, unsigned buf_sz);
|
|
static inline struct rte_crypto_op *
|
|
test_perf_set_crypto_op_snow3g(struct rte_crypto_op *op, struct rte_mbuf *m,
|
|
struct rte_cryptodev_sym_session *sess, unsigned data_len,
|
|
unsigned digest_len);
|
|
static uint32_t get_auth_digest_length(enum rte_crypto_auth_algorithm algo);
|
|
|
|
|
|
static const char *chain_mode_name(enum chain_mode mode)
|
|
{
|
|
switch (mode) {
|
|
case CIPHER_HASH: return "cipher_hash"; break;
|
|
case HASH_CIPHER: return "hash_cipher"; break;
|
|
case CIPHER_ONLY: return "cipher_only"; break;
|
|
case HASH_ONLY: return "hash_only"; break;
|
|
default: return ""; break;
|
|
}
|
|
}
|
|
|
|
static const char *pmd_name(enum rte_cryptodev_type pmd)
|
|
{
|
|
switch (pmd) {
|
|
case RTE_CRYPTODEV_NULL_PMD: return CRYPTODEV_NAME_NULL_PMD; break;
|
|
case RTE_CRYPTODEV_AESNI_GCM_PMD:
|
|
return CRYPTODEV_NAME_AESNI_GCM_PMD;
|
|
case RTE_CRYPTODEV_AESNI_MB_PMD:
|
|
return CRYPTODEV_NAME_AESNI_MB_PMD;
|
|
case RTE_CRYPTODEV_QAT_SYM_PMD:
|
|
return CRYPTODEV_NAME_QAT_SYM_PMD;
|
|
case RTE_CRYPTODEV_SNOW3G_PMD:
|
|
return CRYPTODEV_NAME_SNOW3G_PMD;
|
|
default:
|
|
return "";
|
|
}
|
|
}
|
|
|
|
static const char *cipher_algo_name(enum rte_crypto_cipher_algorithm cipher_algo)
|
|
{
|
|
switch (cipher_algo) {
|
|
case RTE_CRYPTO_CIPHER_NULL: return "NULL";
|
|
case RTE_CRYPTO_CIPHER_3DES_CBC: return "3DES_CBC";
|
|
case RTE_CRYPTO_CIPHER_3DES_CTR: return "3DES_CTR";
|
|
case RTE_CRYPTO_CIPHER_3DES_ECB: return "3DES_ECB";
|
|
case RTE_CRYPTO_CIPHER_AES_CBC: return "AES_CBC";
|
|
case RTE_CRYPTO_CIPHER_AES_CCM: return "AES_CCM";
|
|
case RTE_CRYPTO_CIPHER_AES_CTR: return "AES_CTR";
|
|
case RTE_CRYPTO_CIPHER_AES_ECB: return "AES_ECB";
|
|
case RTE_CRYPTO_CIPHER_AES_F8: return "AES_F8";
|
|
case RTE_CRYPTO_CIPHER_AES_GCM: return "AES_GCM";
|
|
case RTE_CRYPTO_CIPHER_AES_XTS: return "AES_XTS";
|
|
case RTE_CRYPTO_CIPHER_ARC4: return "ARC4";
|
|
case RTE_CRYPTO_CIPHER_KASUMI_F8: return "KASUMI_F8";
|
|
case RTE_CRYPTO_CIPHER_SNOW3G_UEA2: return "SNOW3G_UEA2";
|
|
case RTE_CRYPTO_CIPHER_ZUC_EEA3: return "ZUC_EEA3";
|
|
default: return "Another cipher algo";
|
|
}
|
|
}
|
|
|
|
static const char *auth_algo_name(enum rte_crypto_auth_algorithm auth_algo)
|
|
{
|
|
switch (auth_algo) {
|
|
case RTE_CRYPTO_AUTH_NULL: return "NULL"; break;
|
|
case RTE_CRYPTO_AUTH_AES_CBC_MAC: return "AES_CBC_MAC"; break;
|
|
case RTE_CRYPTO_AUTH_AES_CCM: return "AES_CCM"; break;
|
|
case RTE_CRYPTO_AUTH_AES_CMAC: return "AES_CMAC,"; break;
|
|
case RTE_CRYPTO_AUTH_AES_GCM: return "AES_GCM"; break;
|
|
case RTE_CRYPTO_AUTH_AES_GMAC: return "AES_GMAC"; break;
|
|
case RTE_CRYPTO_AUTH_AES_XCBC_MAC: return "AES_XCBC_MAC"; break;
|
|
case RTE_CRYPTO_AUTH_KASUMI_F9: return "KASUMI_F9"; break;
|
|
case RTE_CRYPTO_AUTH_MD5: return "MD5"; break;
|
|
case RTE_CRYPTO_AUTH_MD5_HMAC: return "MD5_HMAC,"; break;
|
|
case RTE_CRYPTO_AUTH_SHA1: return "SHA1"; break;
|
|
case RTE_CRYPTO_AUTH_SHA1_HMAC: return "SHA1_HMAC"; break;
|
|
case RTE_CRYPTO_AUTH_SHA224: return "SHA224"; break;
|
|
case RTE_CRYPTO_AUTH_SHA224_HMAC: return "SHA224_HMAC"; break;
|
|
case RTE_CRYPTO_AUTH_SHA256: return "SHA256"; break;
|
|
case RTE_CRYPTO_AUTH_SHA256_HMAC: return "SHA256_HMAC"; break;
|
|
case RTE_CRYPTO_AUTH_SHA384: return "SHA384,"; break;
|
|
case RTE_CRYPTO_AUTH_SHA384_HMAC: return "SHA384_HMAC,"; break;
|
|
case RTE_CRYPTO_AUTH_SHA512: return "SHA512,"; break;
|
|
case RTE_CRYPTO_AUTH_SHA512_HMAC: return "SHA512_HMAC,"; break;
|
|
case RTE_CRYPTO_AUTH_SNOW3G_UIA2: return "SNOW3G_UIA2"; break;
|
|
case RTE_CRYPTO_AUTH_ZUC_EIA3: return "RTE_CRYPTO_AUTH_ZUC_EIA3"; break;
|
|
default: return "Another auth algo"; break;
|
|
};
|
|
}
|
|
|
|
static struct rte_mbuf *
|
|
setup_test_string(struct rte_mempool *mpool,
|
|
const uint8_t *data, size_t len, uint8_t blocksize)
|
|
{
|
|
struct rte_mbuf *m = rte_pktmbuf_alloc(mpool);
|
|
size_t t_len = len - (blocksize ? (len % blocksize) : 0);
|
|
|
|
if (m) {
|
|
char *dst = rte_pktmbuf_append(m, t_len);
|
|
|
|
if (!dst) {
|
|
rte_pktmbuf_free(m);
|
|
return NULL;
|
|
}
|
|
|
|
rte_memcpy(dst, (const void *)data, t_len);
|
|
}
|
|
return m;
|
|
}
|
|
|
|
static struct crypto_testsuite_params testsuite_params = { NULL };
|
|
static struct crypto_unittest_params unittest_params;
|
|
static enum rte_cryptodev_type gbl_cryptodev_perftest_devtype;
|
|
|
|
static int
|
|
testsuite_setup(void)
|
|
{
|
|
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
|
struct rte_cryptodev_info info;
|
|
unsigned i, nb_devs, valid_dev_id = 0;
|
|
int ret;
|
|
uint16_t qp_id;
|
|
|
|
ts_params->mbuf_mp = rte_mempool_lookup("CRYPTO_PERF_MBUFPOOL");
|
|
if (ts_params->mbuf_mp == NULL) {
|
|
/* Not already created so create */
|
|
ts_params->mbuf_mp = rte_pktmbuf_pool_create(
|
|
"CRYPTO_PERF_MBUFPOOL",
|
|
NUM_MBUFS, MBUF_CACHE_SIZE, 0, MBUF_SIZE,
|
|
rte_socket_id());
|
|
if (ts_params->mbuf_mp == NULL) {
|
|
RTE_LOG(ERR, USER1, "Can't create CRYPTO_PERF_MBUFPOOL\n");
|
|
return TEST_FAILED;
|
|
}
|
|
}
|
|
|
|
|
|
ts_params->op_mpool = rte_crypto_op_pool_create("CRYPTO_OP_POOL",
|
|
RTE_CRYPTO_OP_TYPE_SYMMETRIC,
|
|
NUM_MBUFS, MBUF_CACHE_SIZE,
|
|
DEFAULT_NUM_XFORMS *
|
|
sizeof(struct rte_crypto_sym_xform),
|
|
rte_socket_id());
|
|
if (ts_params->op_mpool == NULL) {
|
|
RTE_LOG(ERR, USER1, "Can't create CRYPTO_OP_POOL\n");
|
|
return TEST_FAILED;
|
|
}
|
|
|
|
/* Create 2 AESNI MB devices if required */
|
|
if (gbl_cryptodev_perftest_devtype == RTE_CRYPTODEV_AESNI_MB_PMD) {
|
|
nb_devs = rte_cryptodev_count_devtype(RTE_CRYPTODEV_AESNI_MB_PMD);
|
|
if (nb_devs < 2) {
|
|
for (i = nb_devs; i < 2; i++) {
|
|
ret = rte_eal_vdev_init(
|
|
CRYPTODEV_NAME_AESNI_MB_PMD, NULL);
|
|
|
|
TEST_ASSERT(ret == 0,
|
|
"Failed to create instance %u of pmd : %s",
|
|
i, CRYPTODEV_NAME_AESNI_MB_PMD);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Create 2 SNOW3G devices if required */
|
|
if (gbl_cryptodev_perftest_devtype == RTE_CRYPTODEV_SNOW3G_PMD) {
|
|
nb_devs = rte_cryptodev_count_devtype(RTE_CRYPTODEV_SNOW3G_PMD);
|
|
if (nb_devs < 2) {
|
|
for (i = nb_devs; i < 2; i++) {
|
|
ret = rte_eal_vdev_init(
|
|
CRYPTODEV_NAME_SNOW3G_PMD, NULL);
|
|
|
|
TEST_ASSERT(ret == 0,
|
|
"Failed to create instance %u of pmd : %s",
|
|
i, CRYPTODEV_NAME_SNOW3G_PMD);
|
|
}
|
|
}
|
|
}
|
|
|
|
nb_devs = rte_cryptodev_count();
|
|
if (nb_devs < 1) {
|
|
RTE_LOG(ERR, USER1, "No crypto devices found?");
|
|
return TEST_FAILED;
|
|
}
|
|
|
|
/* Search for the first valid */
|
|
for (i = 0; i < nb_devs; i++) {
|
|
rte_cryptodev_info_get(i, &info);
|
|
if (info.dev_type == gbl_cryptodev_perftest_devtype) {
|
|
ts_params->dev_id = i;
|
|
valid_dev_id = 1;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!valid_dev_id)
|
|
return TEST_FAILED;
|
|
|
|
/*
|
|
* Using Crypto Device Id 0 by default.
|
|
* Since we can't free and re-allocate queue memory always set the queues
|
|
* on this device up to max size first so enough memory is allocated for
|
|
* any later re-configures needed by other tests
|
|
*/
|
|
|
|
rte_cryptodev_info_get(ts_params->dev_id, &info);
|
|
|
|
ts_params->conf.nb_queue_pairs = DEFAULT_NUM_QPS_PER_QAT_DEVICE;
|
|
ts_params->conf.socket_id = SOCKET_ID_ANY;
|
|
ts_params->conf.session_mp.nb_objs = info.sym.max_nb_sessions;
|
|
|
|
TEST_ASSERT_SUCCESS(rte_cryptodev_configure(ts_params->dev_id,
|
|
&ts_params->conf),
|
|
"Failed to configure cryptodev %u",
|
|
ts_params->dev_id);
|
|
|
|
|
|
ts_params->qp_conf.nb_descriptors = MAX_NUM_OPS_INFLIGHT;
|
|
|
|
for (qp_id = 0; qp_id < ts_params->conf.nb_queue_pairs ; qp_id++) {
|
|
TEST_ASSERT_SUCCESS(rte_cryptodev_queue_pair_setup(
|
|
ts_params->dev_id, qp_id,
|
|
&ts_params->qp_conf,
|
|
rte_cryptodev_socket_id(ts_params->dev_id)),
|
|
"Failed to setup queue pair %u on cryptodev %u",
|
|
qp_id, ts_params->dev_id);
|
|
}
|
|
|
|
/*Now reconfigure queues to size we actually want to use in this testsuite.*/
|
|
ts_params->qp_conf.nb_descriptors = PERF_NUM_OPS_INFLIGHT;
|
|
for (qp_id = 0; qp_id < ts_params->conf.nb_queue_pairs ; qp_id++) {
|
|
|
|
TEST_ASSERT_SUCCESS(rte_cryptodev_queue_pair_setup(
|
|
ts_params->dev_id, qp_id,
|
|
&ts_params->qp_conf,
|
|
rte_cryptodev_socket_id(ts_params->dev_id)),
|
|
"Failed to setup queue pair %u on cryptodev %u",
|
|
qp_id, ts_params->dev_id);
|
|
}
|
|
|
|
return TEST_SUCCESS;
|
|
}
|
|
static void
|
|
testsuite_teardown(void)
|
|
{
|
|
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
|
|
|
if (ts_params->mbuf_mp != NULL)
|
|
RTE_LOG(DEBUG, USER1, "CRYPTO_PERF_MBUFPOOL count %u\n",
|
|
rte_mempool_count(ts_params->mbuf_mp));
|
|
if (ts_params->op_mpool != NULL)
|
|
RTE_LOG(DEBUG, USER1, "CRYPTO_PERF_OP POOL count %u\n",
|
|
rte_mempool_count(ts_params->op_mpool));
|
|
}
|
|
|
|
static int
|
|
ut_setup(void)
|
|
{
|
|
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
|
struct crypto_unittest_params *ut_params = &unittest_params;
|
|
|
|
/* Clear unit test parameters before running test */
|
|
memset(ut_params, 0, sizeof(*ut_params));
|
|
|
|
rte_cryptodev_stats_reset(ts_params->dev_id);
|
|
|
|
/* Start the device */
|
|
TEST_ASSERT_SUCCESS(rte_cryptodev_start(ts_params->dev_id),
|
|
"Failed to start cryptodev %u",
|
|
ts_params->dev_id);
|
|
|
|
return TEST_SUCCESS;
|
|
}
|
|
|
|
static void
|
|
ut_teardown(void)
|
|
{
|
|
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
|
struct crypto_unittest_params *ut_params = &unittest_params;
|
|
struct rte_cryptodev_stats stats;
|
|
|
|
unsigned i;
|
|
|
|
/* free crypto session structure */
|
|
if (ut_params->sess)
|
|
rte_cryptodev_sym_session_free(ts_params->dev_id,
|
|
ut_params->sess);
|
|
|
|
/* free crypto operation structure */
|
|
if (ut_params->op)
|
|
rte_crypto_op_free(ut_params->op);
|
|
|
|
for (i = 0; i < MAX_NUM_OF_OPS_PER_UT; i++) {
|
|
if (ut_params->obuf[i])
|
|
rte_pktmbuf_free(ut_params->obuf[i]);
|
|
else if (ut_params->ibuf[i])
|
|
rte_pktmbuf_free(ut_params->ibuf[i]);
|
|
}
|
|
|
|
if (ts_params->mbuf_mp != NULL)
|
|
RTE_LOG(DEBUG, USER1, "CRYPTO_PERF_MBUFPOOL count %u\n",
|
|
rte_mempool_count(ts_params->mbuf_mp));
|
|
|
|
rte_cryptodev_stats_get(ts_params->dev_id, &stats);
|
|
|
|
/* Stop the device */
|
|
rte_cryptodev_stop(ts_params->dev_id);
|
|
}
|
|
|
|
const char plaintext_quote[] =
|
|
"THE COUNT OF MONTE CRISTO by Alexandre Dumas, Pere Chapter 1. "
|
|
"Marseilles--The Arrival. On the 24th of February, 1815, the "
|
|
"look-out at Notre-Dame de la Garde signalled the three-master,"
|
|
" the Pharaon from Smyrna, Trieste, and Naples. As usual, a "
|
|
"pilot put off immediately, and rounding the Chateau d'If, got "
|
|
"on board the vessel between Cape Morgion and Rion island. "
|
|
"Immediately, and according to custom, the ramparts of Fort "
|
|
"Saint-Jean were covered with spectators; it is always an event "
|
|
"at Marseilles for a ship to come into port, especially when "
|
|
"this ship, like the Pharaon, has been built, rigged, and laden"
|
|
" at the old Phocee docks, and belongs to an owner of the city."
|
|
" The ship drew on and had safely passed the strait, which some"
|
|
" volcanic shock has made between the Calasareigne and Jaros "
|
|
"islands; had doubled Pomegue, and approached the harbor under"
|
|
" topsails, jib, and spanker, but so slowly and sedately that"
|
|
" the idlers, with that instinct which is the forerunner of "
|
|
"evil, asked one another what misfortune could have happened "
|
|
"on board. However, those experienced in navigation saw plainly"
|
|
" that if any accident had occurred, it was not to the vessel "
|
|
"herself, for she bore down with all the evidence of being "
|
|
"skilfully handled, the anchor a-cockbill, the jib-boom guys "
|
|
"already eased off, and standing by the side of the pilot, who"
|
|
" was steering the Pharaon towards the narrow entrance of the"
|
|
" inner port, was a young man, who, with activity and vigilant"
|
|
" eye, watched every motion of the ship, and repeated each "
|
|
"direction of the pilot. The vague disquietude which prevailed "
|
|
"among the spectators had so much affected one of the crowd "
|
|
"that he did not await the arrival of the vessel in harbor, but"
|
|
" jumping into a small skiff, desired to be pulled alongside "
|
|
"the Pharaon, which he reached as she rounded into La Reserve "
|
|
"basin. When the young man on board saw this person approach, "
|
|
"he left his station by the pilot, and, hat in hand, leaned "
|
|
"over the ship's bulwarks. He was a fine, tall, slim young "
|
|
"fellow of eighteen or twenty, with black eyes, and hair as "
|
|
"dark as a raven's wing; and his whole appearance bespoke that "
|
|
"calmness and resolution peculiar to men accustomed from their "
|
|
"cradle to contend with danger. \"Ah, is it you, Dantes?\" "
|
|
"cried the man in the skiff. \"What's the matter? and why have "
|
|
"you such an air of sadness aboard?\" \"A great misfortune, M. "
|
|
"Morrel,\" replied the young man,--\"a great misfortune, for me"
|
|
" especially! Off Civita Vecchia we lost our brave Captain "
|
|
"Leclere.\" \"And the cargo?\" inquired the owner, eagerly. "
|
|
"\"Is all safe, M. Morrel; and I think you will be satisfied on"
|
|
" that head. But poor Captain Leclere--\" \"What happened to "
|
|
"him?\" asked the owner, with an air of considerable "
|
|
"resignation. \"What happened to the worthy captain?\" \"He "
|
|
"died.\" \"Fell into the sea?\" \"No, sir, he died of "
|
|
"brain-fever in dreadful agony.\" Then turning to the crew, "
|
|
"he said, \"Bear a hand there, to take in sail!\" All hands "
|
|
"obeyed, and at once the eight or ten seamen who composed the "
|
|
"crew, sprang to their respective stations at the spanker "
|
|
"brails and outhaul, topsail sheets and halyards, the jib "
|
|
"downhaul, and the topsail clewlines and buntlines. The young "
|
|
"sailor gave a look to see that his orders were promptly and "
|
|
"accurately obeyed, and then turned again to the owner. \"And "
|
|
"how did this misfortune occur?\" inquired the latter, resuming"
|
|
" the interrupted conversation. \"Alas, sir, in the most "
|
|
"unexpected manner. After a long talk with the harbor-master, "
|
|
"Captain Leclere left Naples greatly disturbed in mind. In "
|
|
"twenty-four hours he was attacked by a fever, and died three "
|
|
"days afterwards. We performed the usual burial service, and he"
|
|
" is at his rest, sewn up in his hammock with a thirty-six "
|
|
"pound shot at his head and his heels, off El Giglio island. "
|
|
"We bring to his widow his sword and cross of honor. It was "
|
|
"worth while, truly,\" added the young man with a melancholy "
|
|
"smile, \"to make war against the English for ten years, and "
|
|
"to die in his bed at last, like everybody else.";
|
|
|
|
#define QUOTE_LEN_64B (64)
|
|
#define QUOTE_LEN_128B (128)
|
|
#define QUOTE_LEN_256B (256)
|
|
#define QUOTE_LEN_512B (512)
|
|
#define QUOTE_LEN_768B (768)
|
|
#define QUOTE_LEN_1024B (1024)
|
|
#define QUOTE_LEN_1280B (1280)
|
|
#define QUOTE_LEN_1536B (1536)
|
|
#define QUOTE_LEN_1792B (1792)
|
|
#define QUOTE_LEN_2048B (2048)
|
|
|
|
|
|
/* ***** AES-CBC / HMAC-SHA256 Performance Tests ***** */
|
|
|
|
#define HMAC_KEY_LENGTH_SHA256 (DIGEST_BYTE_LENGTH_SHA256)
|
|
|
|
#define CIPHER_KEY_LENGTH_AES_CBC (16)
|
|
#define CIPHER_IV_LENGTH_AES_CBC (CIPHER_KEY_LENGTH_AES_CBC)
|
|
|
|
static uint8_t aes_cbc_128_key[] = {
|
|
0xE4, 0x23, 0x33, 0x8A, 0x35, 0x64, 0x61, 0xE2,
|
|
0xF1, 0x35, 0x5C, 0x3B, 0xDD, 0x9A, 0x65, 0xBA };
|
|
|
|
static uint8_t aes_cbc_128_iv[] = {
|
|
0xf5, 0xd3, 0x89, 0x0f, 0x47, 0x00, 0xcb, 0x52,
|
|
0x42, 0x1a, 0x7d, 0x3d, 0xf5, 0x82, 0x80, 0xf1 };
|
|
|
|
static uint8_t hmac_sha256_key[] = {
|
|
0xff, 0xcb, 0x37, 0x30, 0x1d, 0x4a, 0xc2, 0x41,
|
|
0x49, 0x03, 0xDD, 0xC6, 0xB8, 0xCA, 0x55, 0x7A,
|
|
0x58, 0x34, 0x85, 0x61, 0x1C, 0x42, 0x10, 0x76,
|
|
0x9a, 0x4f, 0x88, 0x1b, 0xb6, 0x8f, 0xd8, 0x60 };
|
|
|
|
|
|
/* Cipher text output */
|
|
|
|
static const uint8_t AES_CBC_ciphertext_64B[] = {
|
|
0x05, 0x15, 0x77, 0x32, 0xc9, 0x66, 0x91, 0x50,
|
|
0x93, 0x9f, 0xbb, 0x4e, 0x2e, 0x5a, 0x02, 0xd0,
|
|
0x2d, 0x9d, 0x31, 0x5d, 0xc8, 0x9e, 0x86, 0x36,
|
|
0x54, 0x5c, 0x50, 0xe8, 0x75, 0x54, 0x74, 0x5e,
|
|
0xd5, 0xa2, 0x84, 0x21, 0x2d, 0xc5, 0xf8, 0x1c,
|
|
0x55, 0x1a, 0xba, 0x91, 0xce, 0xb5, 0xa3, 0x1e,
|
|
0x31, 0xbf, 0xe9, 0xa1, 0x97, 0x5c, 0x2b, 0xd6,
|
|
0x57, 0xa5, 0x9f, 0xab, 0xbd, 0xb0, 0x9b, 0x9c
|
|
};
|
|
|
|
static const uint8_t AES_CBC_ciphertext_128B[] = {
|
|
0x79, 0x92, 0x65, 0xc8, 0xfb, 0x0a, 0xc7, 0xc4,
|
|
0x9b, 0x3b, 0xbe, 0x69, 0x7f, 0x7c, 0xf4, 0x4e,
|
|
0xa5, 0x0d, 0xf6, 0x33, 0xc4, 0xdf, 0xf3, 0x0d,
|
|
0xdb, 0xb9, 0x68, 0x34, 0xb0, 0x0d, 0xbd, 0xb9,
|
|
0xa7, 0xf3, 0x86, 0x50, 0x2a, 0xbe, 0x50, 0x5d,
|
|
0xb3, 0xbe, 0x72, 0xf9, 0x02, 0xb1, 0x69, 0x0b,
|
|
0x8c, 0x96, 0x4c, 0x3c, 0x0c, 0x1e, 0x76, 0xe5,
|
|
0x7e, 0x75, 0xdd, 0xd0, 0xa9, 0x75, 0x00, 0x13,
|
|
0x6b, 0x1e, 0xc0, 0xad, 0xfc, 0x03, 0xb5, 0x99,
|
|
0xdc, 0x37, 0x35, 0xfc, 0x16, 0x34, 0xfd, 0xb4,
|
|
0xea, 0x1e, 0xb6, 0x51, 0xdf, 0xab, 0x87, 0xd6,
|
|
0x87, 0x41, 0xfa, 0x1c, 0xc6, 0x78, 0xa6, 0x3c,
|
|
0x1d, 0x76, 0xfe, 0xff, 0x65, 0xfc, 0x63, 0x1e,
|
|
0x1f, 0xe2, 0x7c, 0x9b, 0xa2, 0x72, 0xc3, 0x34,
|
|
0x23, 0xdf, 0x01, 0xf0, 0xfd, 0x02, 0x8b, 0x97,
|
|
0x00, 0x2b, 0x97, 0x4e, 0xab, 0x98, 0x21, 0x3c
|
|
};
|
|
|
|
static const uint8_t AES_CBC_ciphertext_256B[] = {
|
|
0xc7, 0x71, 0x2b, 0xed, 0x2c, 0x97, 0x59, 0xfa,
|
|
0xcf, 0x5a, 0xb9, 0x31, 0x92, 0xe0, 0xc9, 0x92,
|
|
0xc0, 0x2d, 0xd5, 0x9c, 0x84, 0xbf, 0x70, 0x36,
|
|
0x13, 0x48, 0xe0, 0xb1, 0xbf, 0x6c, 0xcd, 0x91,
|
|
0xa0, 0xc3, 0x57, 0x6c, 0x3f, 0x0e, 0x34, 0x41,
|
|
0xe7, 0x9c, 0xc0, 0xec, 0x18, 0x0c, 0x05, 0x52,
|
|
0x78, 0xe2, 0x3c, 0x6e, 0xdf, 0xa5, 0x49, 0xc7,
|
|
0xf2, 0x55, 0x00, 0x8f, 0x65, 0x6d, 0x4b, 0xd0,
|
|
0xcb, 0xd4, 0xd2, 0x0b, 0xea, 0xf4, 0xb0, 0x85,
|
|
0x61, 0x9e, 0x36, 0xc0, 0x71, 0xb7, 0x80, 0xad,
|
|
0x40, 0x78, 0xb4, 0x70, 0x2b, 0xe8, 0x80, 0xc5,
|
|
0x19, 0x35, 0x96, 0x55, 0x3b, 0x40, 0x03, 0xbb,
|
|
0x9f, 0xa6, 0xc2, 0x82, 0x92, 0x04, 0xc3, 0xa6,
|
|
0x96, 0xc4, 0x7f, 0x4c, 0x3e, 0x3c, 0x79, 0x82,
|
|
0x88, 0x8b, 0x3f, 0x8b, 0xc5, 0x9f, 0x44, 0xbe,
|
|
0x71, 0xe7, 0x09, 0xa2, 0x40, 0xa2, 0x23, 0x4e,
|
|
0x9f, 0x31, 0xab, 0x6f, 0xdf, 0x59, 0x40, 0xe1,
|
|
0x12, 0x15, 0x55, 0x4b, 0xea, 0x3f, 0xa1, 0x41,
|
|
0x4f, 0xaf, 0xcd, 0x27, 0x2a, 0x61, 0xa1, 0x9e,
|
|
0x82, 0x30, 0x05, 0x05, 0x55, 0xce, 0x99, 0xd3,
|
|
0x8f, 0x3f, 0x86, 0x79, 0xdc, 0x9f, 0x33, 0x07,
|
|
0x75, 0x26, 0xc8, 0x72, 0x81, 0x0f, 0x9b, 0xf7,
|
|
0xb1, 0xfb, 0xd3, 0x91, 0x36, 0x08, 0xab, 0x26,
|
|
0x70, 0x53, 0x0c, 0x99, 0xfd, 0xa9, 0x07, 0xb4,
|
|
0xe9, 0xce, 0xc1, 0xd6, 0xd2, 0x2c, 0x71, 0x80,
|
|
0xec, 0x59, 0x61, 0x0b, 0x24, 0xf0, 0x6d, 0x33,
|
|
0x73, 0x45, 0x6e, 0x80, 0x03, 0x45, 0xf2, 0x76,
|
|
0xa5, 0x8a, 0xc9, 0xcf, 0xaf, 0x4a, 0xed, 0x35,
|
|
0xc0, 0x97, 0x52, 0xc5, 0x00, 0xdf, 0xef, 0xc7,
|
|
0x9f, 0xf2, 0xe8, 0x15, 0x3e, 0xb3, 0x30, 0xe7,
|
|
0x00, 0xd0, 0x4e, 0xeb, 0x79, 0xf6, 0xf6, 0xcf,
|
|
0xf0, 0xe7, 0x61, 0xd5, 0x3d, 0x6a, 0x73, 0x9d
|
|
};
|
|
|
|
static const uint8_t AES_CBC_ciphertext_512B[] = {
|
|
0xb4, 0xc6, 0xc6, 0x5f, 0x7e, 0xca, 0x05, 0x70,
|
|
0x21, 0x7b, 0x92, 0x9e, 0x23, 0xe7, 0x92, 0xb8,
|
|
0x27, 0x3d, 0x20, 0x29, 0x57, 0xfa, 0x1f, 0x26,
|
|
0x0a, 0x04, 0x34, 0xa6, 0xf2, 0xdc, 0x44, 0xb6,
|
|
0x43, 0x40, 0x62, 0xde, 0x0c, 0xde, 0x1c, 0x30,
|
|
0x43, 0x85, 0x0b, 0xe8, 0x93, 0x1f, 0xa1, 0x2a,
|
|
0x8a, 0x27, 0x35, 0x39, 0x14, 0x9f, 0x37, 0x64,
|
|
0x59, 0xb5, 0x0e, 0x96, 0x82, 0x5d, 0x63, 0x45,
|
|
0xd6, 0x93, 0x89, 0x46, 0xe4, 0x71, 0x31, 0xeb,
|
|
0x0e, 0xd1, 0x7b, 0xda, 0x90, 0xb5, 0x81, 0xac,
|
|
0x76, 0x54, 0x54, 0x85, 0x0b, 0xa9, 0x46, 0x9c,
|
|
0xf0, 0xfd, 0xde, 0x5d, 0xa8, 0xe3, 0xee, 0xe9,
|
|
0xf4, 0x9d, 0x34, 0x76, 0x39, 0xe7, 0xc3, 0x4a,
|
|
0x84, 0x38, 0x92, 0x61, 0xf1, 0x12, 0x9f, 0x05,
|
|
0xda, 0xdb, 0xc1, 0xd4, 0xb0, 0xa0, 0x27, 0x19,
|
|
0xa0, 0x56, 0x5d, 0x9b, 0xcc, 0x47, 0x7c, 0x15,
|
|
0x1d, 0x52, 0x66, 0xd5, 0xff, 0xef, 0x12, 0x23,
|
|
0x86, 0xe2, 0xee, 0x81, 0x2c, 0x3d, 0x7d, 0x28,
|
|
0xd5, 0x42, 0xdf, 0xdb, 0x75, 0x1c, 0xeb, 0xdf,
|
|
0x13, 0x23, 0xd5, 0x17, 0x89, 0xea, 0xd7, 0x01,
|
|
0xff, 0x57, 0x6a, 0x44, 0x61, 0xf4, 0xea, 0xbe,
|
|
0x97, 0x9b, 0xc2, 0xb1, 0x9c, 0x5d, 0xff, 0x4f,
|
|
0x73, 0x2d, 0x3f, 0x57, 0x28, 0x38, 0xbf, 0x3d,
|
|
0x9f, 0xda, 0x49, 0x55, 0x8f, 0xb2, 0x77, 0xec,
|
|
0x0f, 0xbc, 0xce, 0xb8, 0xc6, 0xe1, 0x03, 0xed,
|
|
0x35, 0x9c, 0xf2, 0x4d, 0xa4, 0x29, 0x6c, 0xd6,
|
|
0x6e, 0x05, 0x53, 0x46, 0xc1, 0x41, 0x09, 0x36,
|
|
0x0b, 0x7d, 0xf4, 0x9e, 0x0f, 0xba, 0x86, 0x33,
|
|
0xdd, 0xf1, 0xa7, 0xf7, 0xd5, 0x29, 0xa8, 0xa7,
|
|
0x4d, 0xce, 0x0c, 0xf5, 0xb4, 0x6c, 0xd8, 0x27,
|
|
0xb0, 0x87, 0x2a, 0x6f, 0x7f, 0x3f, 0x8f, 0xc3,
|
|
0xe2, 0x3e, 0x94, 0xcf, 0x61, 0x4a, 0x09, 0x3d,
|
|
0xf9, 0x55, 0x19, 0x31, 0xf2, 0xd2, 0x4a, 0x3e,
|
|
0xc1, 0xf5, 0xed, 0x7c, 0x45, 0xb0, 0x0c, 0x7b,
|
|
0xdd, 0xa6, 0x0a, 0x26, 0x66, 0xec, 0x85, 0x49,
|
|
0x00, 0x38, 0x05, 0x7c, 0x9c, 0x1c, 0x92, 0xf5,
|
|
0xf7, 0xdb, 0x5d, 0xbd, 0x61, 0x0c, 0xc9, 0xaf,
|
|
0xfd, 0x57, 0x3f, 0xee, 0x2b, 0xad, 0x73, 0xef,
|
|
0xa3, 0xc1, 0x66, 0x26, 0x44, 0x5e, 0xf9, 0x12,
|
|
0x86, 0x66, 0xa9, 0x61, 0x75, 0xa1, 0xbc, 0x40,
|
|
0x7f, 0xa8, 0x08, 0x02, 0xc0, 0x76, 0x0e, 0x76,
|
|
0xb3, 0x26, 0x3d, 0x1c, 0x40, 0x65, 0xe4, 0x18,
|
|
0x0f, 0x62, 0x17, 0x8f, 0x1e, 0x61, 0xb8, 0x08,
|
|
0x83, 0x54, 0x42, 0x11, 0x03, 0x30, 0x8e, 0xb7,
|
|
0xc1, 0x9c, 0xec, 0x69, 0x52, 0x95, 0xfb, 0x7b,
|
|
0x1a, 0x0c, 0x20, 0x24, 0xf7, 0xb8, 0x38, 0x0c,
|
|
0xb8, 0x7b, 0xb6, 0x69, 0x70, 0xd0, 0x61, 0xb9,
|
|
0x70, 0x06, 0xc2, 0x5b, 0x20, 0x47, 0xf7, 0xd9,
|
|
0x32, 0xc2, 0xf2, 0x90, 0xb6, 0x4d, 0xcd, 0x3c,
|
|
0x6d, 0x74, 0xea, 0x82, 0x35, 0x1b, 0x08, 0x44,
|
|
0xba, 0xb7, 0x33, 0x82, 0x33, 0x27, 0x54, 0x77,
|
|
0x6e, 0x58, 0xfe, 0x46, 0x5a, 0xb4, 0x88, 0x53,
|
|
0x8d, 0x9b, 0xb1, 0xab, 0xdf, 0x04, 0xe1, 0xfb,
|
|
0xd7, 0x1e, 0xd7, 0x38, 0x64, 0x54, 0xba, 0xb0,
|
|
0x6c, 0x84, 0x7a, 0x0f, 0xa7, 0x80, 0x6b, 0x86,
|
|
0xd9, 0xc9, 0xc6, 0x31, 0x95, 0xfa, 0x8a, 0x2c,
|
|
0x14, 0xe1, 0x85, 0x66, 0x27, 0xfd, 0x63, 0x3e,
|
|
0xf0, 0xfa, 0x81, 0xc9, 0x89, 0x4f, 0xe2, 0x6a,
|
|
0x8c, 0x17, 0xb5, 0xc7, 0x9f, 0x5d, 0x3f, 0x6b,
|
|
0x3f, 0xcd, 0x13, 0x7a, 0x3c, 0xe6, 0x4e, 0xfa,
|
|
0x7a, 0x10, 0xb8, 0x7c, 0x40, 0xec, 0x93, 0x11,
|
|
0x1f, 0xd0, 0x9e, 0xc3, 0x56, 0xb9, 0xf5, 0x21,
|
|
0x18, 0x41, 0x31, 0xea, 0x01, 0x8d, 0xea, 0x1c,
|
|
0x95, 0x5e, 0x56, 0x33, 0xbc, 0x7a, 0x3f, 0x6f
|
|
};
|
|
|
|
static const uint8_t AES_CBC_ciphertext_768B[] = {
|
|
0x3e, 0x7f, 0x9e, 0x4c, 0x88, 0x15, 0x68, 0x69,
|
|
0x10, 0x09, 0xe1, 0xa7, 0x0f, 0x27, 0x88, 0x2d,
|
|
0x90, 0x73, 0x4f, 0x67, 0xd3, 0x8b, 0xaf, 0xa1,
|
|
0x2c, 0x37, 0xa5, 0x6c, 0x7c, 0xbd, 0x95, 0x4c,
|
|
0x82, 0xcf, 0x05, 0x49, 0x16, 0x5c, 0xe7, 0x06,
|
|
0xd4, 0xcb, 0x55, 0x65, 0x9a, 0xd0, 0xe1, 0x46,
|
|
0x3a, 0x37, 0x71, 0xad, 0xb0, 0xb4, 0x99, 0x1e,
|
|
0x23, 0x57, 0x48, 0x96, 0x9c, 0xc5, 0xc4, 0xdb,
|
|
0x64, 0x3e, 0xc9, 0x7f, 0x90, 0x5a, 0xa0, 0x08,
|
|
0x75, 0x4c, 0x09, 0x06, 0x31, 0x6e, 0x59, 0x29,
|
|
0xfc, 0x2f, 0x72, 0xde, 0xf2, 0x40, 0x5a, 0xfe,
|
|
0xd3, 0x66, 0x64, 0xb8, 0x9c, 0xc9, 0xa6, 0x1f,
|
|
0xc3, 0x52, 0xcd, 0xb5, 0xd1, 0x4f, 0x43, 0x3f,
|
|
0xf4, 0x59, 0x25, 0xc4, 0xdd, 0x3e, 0x58, 0x7c,
|
|
0x21, 0xd6, 0x21, 0xce, 0xa4, 0xbe, 0x08, 0x23,
|
|
0x46, 0x68, 0xc0, 0x00, 0x91, 0x47, 0xca, 0x9b,
|
|
0xe0, 0xb4, 0xe3, 0xab, 0xbf, 0xcf, 0x68, 0x26,
|
|
0x97, 0x23, 0x09, 0x93, 0x64, 0x8f, 0x57, 0x59,
|
|
0xe2, 0x41, 0x7c, 0xa2, 0x48, 0x7e, 0xd5, 0x2c,
|
|
0x54, 0x09, 0x1b, 0x07, 0x94, 0xca, 0x39, 0x83,
|
|
0xdd, 0xf4, 0x7a, 0x1d, 0x2d, 0xdd, 0x67, 0xf7,
|
|
0x3c, 0x30, 0x89, 0x3e, 0xc1, 0xdc, 0x1d, 0x8f,
|
|
0xfc, 0xb1, 0xe9, 0x13, 0x31, 0xb0, 0x16, 0xdb,
|
|
0x88, 0xf2, 0x32, 0x7e, 0x73, 0xa3, 0xdf, 0x08,
|
|
0x6b, 0x53, 0x92, 0x08, 0xc9, 0x9d, 0x98, 0xb2,
|
|
0xf4, 0x8c, 0xb1, 0x95, 0xdc, 0xb6, 0xfc, 0xec,
|
|
0xf1, 0xc9, 0x0d, 0x6d, 0x42, 0x2c, 0xf5, 0x38,
|
|
0x29, 0xf4, 0xd8, 0x98, 0x0f, 0xb0, 0x81, 0xa5,
|
|
0xaa, 0xe6, 0x1f, 0x6e, 0x87, 0x32, 0x1b, 0x02,
|
|
0x07, 0x57, 0x38, 0x83, 0xf3, 0xe4, 0x54, 0x7c,
|
|
0xa8, 0x43, 0xdf, 0x3f, 0x42, 0xfd, 0x67, 0x28,
|
|
0x06, 0x4d, 0xea, 0xce, 0x1f, 0x84, 0x4a, 0xcd,
|
|
0x8c, 0x61, 0x5e, 0x8f, 0x61, 0xed, 0x84, 0x03,
|
|
0x53, 0x6a, 0x9e, 0xbf, 0x68, 0x83, 0xa7, 0x42,
|
|
0x56, 0x57, 0xcd, 0x45, 0x29, 0xfc, 0x7b, 0x07,
|
|
0xfc, 0xe9, 0xb9, 0x42, 0xfd, 0x29, 0xd5, 0xfd,
|
|
0x98, 0x11, 0xd1, 0x8d, 0x67, 0x29, 0x47, 0x61,
|
|
0xd8, 0x27, 0x37, 0x79, 0x29, 0xd1, 0x94, 0x6f,
|
|
0x8d, 0xf3, 0x1b, 0x3d, 0x6a, 0xb1, 0x59, 0xef,
|
|
0x1b, 0xd4, 0x70, 0x0e, 0xac, 0xab, 0xa0, 0x2b,
|
|
0x1f, 0x5e, 0x04, 0xf0, 0x0e, 0x35, 0x72, 0x90,
|
|
0xfc, 0xcf, 0x86, 0x43, 0xea, 0x45, 0x6d, 0x22,
|
|
0x63, 0x06, 0x1a, 0x58, 0xd7, 0x2d, 0xc5, 0xb0,
|
|
0x60, 0x69, 0xe8, 0x53, 0xc2, 0xa2, 0x57, 0x83,
|
|
0xc4, 0x31, 0xb4, 0xc6, 0xb3, 0xa1, 0x77, 0xb3,
|
|
0x1c, 0xca, 0x89, 0x3f, 0xf5, 0x10, 0x3b, 0x36,
|
|
0x31, 0x7d, 0x00, 0x46, 0x00, 0x92, 0xa0, 0xa0,
|
|
0x34, 0xd8, 0x5e, 0x62, 0xa9, 0xe0, 0x23, 0x37,
|
|
0x50, 0x85, 0xc7, 0x3a, 0x20, 0xa3, 0x98, 0xc0,
|
|
0xac, 0x20, 0x06, 0x0f, 0x17, 0x3c, 0xfc, 0x43,
|
|
0x8c, 0x9d, 0xec, 0xf5, 0x9a, 0x35, 0x96, 0xf7,
|
|
0xb7, 0x4c, 0xf9, 0x69, 0xf8, 0xd4, 0x1e, 0x9e,
|
|
0xf9, 0x7c, 0xc4, 0xd2, 0x11, 0x14, 0x41, 0xb9,
|
|
0x89, 0xd6, 0x07, 0xd2, 0x37, 0x07, 0x5e, 0x5e,
|
|
0xae, 0x60, 0xdc, 0xe4, 0xeb, 0x38, 0x48, 0x6d,
|
|
0x95, 0x8d, 0x71, 0xf2, 0xba, 0xda, 0x5f, 0x08,
|
|
0x9d, 0x4a, 0x0f, 0x56, 0x90, 0x64, 0xab, 0xb6,
|
|
0x88, 0x22, 0xa8, 0x90, 0x1f, 0x76, 0x2c, 0x83,
|
|
0x43, 0xce, 0x32, 0x55, 0x45, 0x84, 0x57, 0x43,
|
|
0xf9, 0xa8, 0xd1, 0x4f, 0xe3, 0xc1, 0x72, 0x9c,
|
|
0xeb, 0x64, 0xf7, 0xe4, 0x61, 0x2b, 0x93, 0xd1,
|
|
0x1f, 0xbb, 0x5c, 0xff, 0xa1, 0x59, 0x69, 0xcf,
|
|
0xf7, 0xaf, 0x58, 0x45, 0xd5, 0x3e, 0x98, 0x7d,
|
|
0x26, 0x39, 0x5c, 0x75, 0x3c, 0x4a, 0xbf, 0x5e,
|
|
0x12, 0x10, 0xb0, 0x93, 0x0f, 0x86, 0x82, 0xcf,
|
|
0xb2, 0xec, 0x70, 0x5c, 0x0b, 0xad, 0x5d, 0x63,
|
|
0x65, 0x32, 0xa6, 0x04, 0x58, 0x03, 0x91, 0x2b,
|
|
0xdb, 0x8f, 0xd3, 0xa3, 0x2b, 0x3a, 0xf5, 0xa1,
|
|
0x62, 0x6c, 0xb6, 0xf0, 0x13, 0x3b, 0x8c, 0x07,
|
|
0x10, 0x82, 0xc9, 0x56, 0x24, 0x87, 0xfc, 0x56,
|
|
0xe8, 0xef, 0x90, 0x8b, 0xd6, 0x48, 0xda, 0x53,
|
|
0x04, 0x49, 0x41, 0xa4, 0x67, 0xe0, 0x33, 0x24,
|
|
0x6b, 0x9c, 0x07, 0x55, 0x4c, 0x5d, 0xe9, 0x35,
|
|
0xfa, 0xbd, 0xea, 0xa8, 0x3f, 0xe9, 0xf5, 0x20,
|
|
0x5c, 0x60, 0x0f, 0x0d, 0x24, 0xcb, 0x1a, 0xd6,
|
|
0xe8, 0x5c, 0xa8, 0x42, 0xae, 0xd0, 0xd2, 0xf2,
|
|
0xa8, 0xbe, 0xea, 0x0f, 0x8d, 0xfb, 0x81, 0xa3,
|
|
0xa4, 0xef, 0xb7, 0x3e, 0x91, 0xbd, 0x26, 0x0f,
|
|
0x8e, 0xf1, 0xb2, 0xa5, 0x47, 0x06, 0xfa, 0x40,
|
|
0x8b, 0x31, 0x7a, 0x5a, 0x74, 0x2a, 0x0a, 0x7c,
|
|
0x62, 0x5d, 0x39, 0xa4, 0xae, 0x14, 0x85, 0x08,
|
|
0x5b, 0x20, 0x85, 0xf1, 0x57, 0x6e, 0x71, 0x13,
|
|
0x4e, 0x2b, 0x49, 0x87, 0x01, 0xdf, 0x37, 0xed,
|
|
0x28, 0xee, 0x4d, 0xa1, 0xf4, 0xb3, 0x3b, 0xba,
|
|
0x2d, 0xb3, 0x46, 0x17, 0x84, 0x80, 0x9d, 0xd7,
|
|
0x93, 0x1f, 0x28, 0x7c, 0xf5, 0xf9, 0xd6, 0x85,
|
|
0x8c, 0xa5, 0x44, 0xe9, 0x2c, 0x65, 0x51, 0x5f,
|
|
0x53, 0x7a, 0x09, 0xd9, 0x30, 0x16, 0x95, 0x89,
|
|
0x9c, 0x0b, 0xef, 0x90, 0x6d, 0x23, 0xd3, 0x48,
|
|
0x57, 0x3b, 0x55, 0x69, 0x96, 0xfc, 0xf7, 0x52,
|
|
0x92, 0x38, 0x36, 0xbf, 0xa9, 0x0a, 0xbb, 0x68,
|
|
0x45, 0x08, 0x25, 0xee, 0x59, 0xfe, 0xee, 0xf2,
|
|
0x2c, 0xd4, 0x5f, 0x78, 0x59, 0x0d, 0x90, 0xf1,
|
|
0xd7, 0xe4, 0x39, 0x0e, 0x46, 0x36, 0xf5, 0x75,
|
|
0x03, 0x3c, 0x28, 0xfb, 0xfa, 0x8f, 0xef, 0xc9,
|
|
0x61, 0x00, 0x94, 0xc3, 0xd2, 0x0f, 0xd9, 0xda
|
|
};
|
|
|
|
static const uint8_t AES_CBC_ciphertext_1024B[] = {
|
|
0x7d, 0x01, 0x7e, 0x2f, 0x92, 0xb3, 0xea, 0x72,
|
|
0x4a, 0x3f, 0x10, 0xf9, 0x2b, 0xb0, 0xd5, 0xb9,
|
|
0x19, 0x68, 0x94, 0xe9, 0x93, 0xe9, 0xd5, 0x26,
|
|
0x20, 0x44, 0xe2, 0x47, 0x15, 0x8d, 0x75, 0x48,
|
|
0x8e, 0xe4, 0x40, 0x81, 0xb5, 0x06, 0xa8, 0xb8,
|
|
0x0e, 0x0f, 0x3b, 0xbc, 0x5b, 0xbe, 0x3b, 0xa2,
|
|
0x2a, 0x0c, 0x48, 0x98, 0x19, 0xdf, 0xe9, 0x25,
|
|
0x75, 0xab, 0x93, 0x44, 0xb1, 0x72, 0x70, 0xbb,
|
|
0x20, 0xcf, 0x78, 0xe9, 0x4d, 0xc6, 0xa9, 0xa9,
|
|
0x84, 0x78, 0xc5, 0xc0, 0xc4, 0xc9, 0x79, 0x1a,
|
|
0xbc, 0x61, 0x25, 0x5f, 0xac, 0x01, 0x03, 0xb7,
|
|
0xef, 0x07, 0xf2, 0x62, 0x98, 0xee, 0xe3, 0xad,
|
|
0x94, 0x75, 0x30, 0x67, 0xb9, 0x15, 0x00, 0xe7,
|
|
0x11, 0x32, 0x2e, 0x6b, 0x55, 0x9f, 0xac, 0x68,
|
|
0xde, 0x61, 0x05, 0x80, 0x01, 0xf3, 0xad, 0xab,
|
|
0xaf, 0x45, 0xe0, 0xf4, 0x68, 0x5c, 0xc0, 0x52,
|
|
0x92, 0xc8, 0x21, 0xb6, 0xf5, 0x8a, 0x1d, 0xbb,
|
|
0xfc, 0x4a, 0x11, 0x62, 0xa2, 0xc4, 0xf1, 0x2d,
|
|
0x0e, 0xb2, 0xc7, 0x17, 0x34, 0xb4, 0x2a, 0x54,
|
|
0x81, 0xc2, 0x1e, 0xcf, 0x51, 0x0a, 0x76, 0x54,
|
|
0xf1, 0x48, 0x0d, 0x5c, 0xcd, 0x38, 0x3e, 0x38,
|
|
0x3e, 0xf8, 0x46, 0x1d, 0x00, 0xf5, 0x62, 0xe1,
|
|
0x5c, 0xb7, 0x8d, 0xce, 0xd0, 0x3f, 0xbb, 0x22,
|
|
0xf1, 0xe5, 0xb1, 0xa0, 0x58, 0x5e, 0x3c, 0x0f,
|
|
0x15, 0xd1, 0xac, 0x3e, 0xc7, 0x72, 0xc4, 0xde,
|
|
0x8b, 0x95, 0x3e, 0x91, 0xf7, 0x1d, 0x04, 0x9a,
|
|
0xc8, 0xe4, 0xbf, 0xd3, 0x22, 0xca, 0x4a, 0xdc,
|
|
0xb6, 0x16, 0x79, 0x81, 0x75, 0x2f, 0x6b, 0xa7,
|
|
0x04, 0x98, 0xa7, 0x4e, 0xc1, 0x19, 0x90, 0x33,
|
|
0x33, 0x3c, 0x7f, 0xdd, 0xac, 0x09, 0x0c, 0xc3,
|
|
0x91, 0x34, 0x74, 0xab, 0xa5, 0x35, 0x0a, 0x13,
|
|
0xc3, 0x56, 0x67, 0x6d, 0x1a, 0x3e, 0xbf, 0x56,
|
|
0x06, 0x67, 0x15, 0x5f, 0xfc, 0x8b, 0xa2, 0x3c,
|
|
0x5e, 0xaf, 0x56, 0x1f, 0xe3, 0x2e, 0x9d, 0x0a,
|
|
0xf9, 0x9b, 0xc7, 0xb5, 0x03, 0x1c, 0x68, 0x99,
|
|
0xfa, 0x3c, 0x37, 0x59, 0xc1, 0xf7, 0x6a, 0x83,
|
|
0x22, 0xee, 0xca, 0x7f, 0x7d, 0x49, 0xe6, 0x48,
|
|
0x84, 0x54, 0x7a, 0xff, 0xb3, 0x72, 0x21, 0xd8,
|
|
0x7a, 0x5d, 0xb1, 0x4b, 0xcc, 0x01, 0x6f, 0x90,
|
|
0xc6, 0x68, 0x1c, 0x2c, 0xa1, 0xe2, 0x74, 0x40,
|
|
0x26, 0x9b, 0x57, 0x53, 0xa3, 0x7c, 0x0b, 0x0d,
|
|
0xcf, 0x05, 0x5d, 0x62, 0x4f, 0x75, 0x06, 0x62,
|
|
0x1f, 0x26, 0x32, 0xaa, 0x25, 0xcc, 0x26, 0x8d,
|
|
0xae, 0x01, 0x47, 0xa3, 0x00, 0x42, 0xe2, 0x4c,
|
|
0xee, 0x29, 0xa2, 0x81, 0xa0, 0xfd, 0xeb, 0xff,
|
|
0x9a, 0x66, 0x6e, 0x47, 0x5b, 0xab, 0x93, 0x5a,
|
|
0x02, 0x6d, 0x6f, 0xf2, 0x6e, 0x02, 0x9d, 0xb1,
|
|
0xab, 0x56, 0xdc, 0x8b, 0x9b, 0x17, 0xa8, 0xfb,
|
|
0x87, 0x42, 0x7c, 0x91, 0x1e, 0x14, 0xc6, 0x6f,
|
|
0xdc, 0xf0, 0x27, 0x30, 0xfa, 0x3f, 0xc4, 0xad,
|
|
0x57, 0x85, 0xd2, 0xc9, 0x32, 0x2c, 0x13, 0xa6,
|
|
0x04, 0x04, 0x50, 0x05, 0x2f, 0x72, 0xd9, 0x44,
|
|
0x55, 0x6e, 0x93, 0x40, 0xed, 0x7e, 0xd4, 0x40,
|
|
0x3e, 0x88, 0x3b, 0x8b, 0xb6, 0xeb, 0xc6, 0x5d,
|
|
0x9c, 0x99, 0xa1, 0xcf, 0x30, 0xb2, 0xdc, 0x48,
|
|
0x8a, 0x01, 0xa7, 0x61, 0x77, 0x50, 0x14, 0xf3,
|
|
0x0c, 0x49, 0x53, 0xb3, 0xb4, 0xb4, 0x28, 0x41,
|
|
0x4a, 0x2d, 0xd2, 0x4d, 0x2a, 0x30, 0x31, 0x83,
|
|
0x03, 0x5e, 0xaa, 0xd3, 0xa3, 0xd1, 0xa1, 0xca,
|
|
0x62, 0xf0, 0xe1, 0xf2, 0xff, 0xf0, 0x19, 0xa6,
|
|
0xde, 0x22, 0x47, 0xb5, 0x28, 0x7d, 0xf7, 0x07,
|
|
0x16, 0x0d, 0xb1, 0x55, 0x81, 0x95, 0xe5, 0x1d,
|
|
0x4d, 0x78, 0xa9, 0x3e, 0xce, 0xe3, 0x1c, 0xf9,
|
|
0x47, 0xc8, 0xec, 0xc5, 0xc5, 0x93, 0x4c, 0x34,
|
|
0x20, 0x6b, 0xee, 0x9a, 0xe6, 0x86, 0x57, 0x58,
|
|
0xd5, 0x58, 0xf1, 0x33, 0x10, 0x29, 0x9e, 0x93,
|
|
0x2f, 0xf5, 0x90, 0x00, 0x17, 0x67, 0x4f, 0x39,
|
|
0x18, 0xe1, 0xcf, 0x55, 0x78, 0xbb, 0xe6, 0x29,
|
|
0x3e, 0x77, 0xd5, 0x48, 0xb7, 0x42, 0x72, 0x53,
|
|
0x27, 0xfa, 0x5b, 0xe0, 0x36, 0x14, 0x97, 0xb8,
|
|
0x9b, 0x3c, 0x09, 0x77, 0xc1, 0x0a, 0xe4, 0xa2,
|
|
0x63, 0xfc, 0xbe, 0x5c, 0x17, 0xcf, 0x01, 0xf5,
|
|
0x03, 0x0f, 0x17, 0xbc, 0x93, 0xdd, 0x5f, 0xe2,
|
|
0xf3, 0x08, 0xa8, 0xb1, 0x85, 0xb6, 0x34, 0x3f,
|
|
0x87, 0x42, 0xa5, 0x42, 0x3b, 0x0e, 0xd6, 0x83,
|
|
0x6a, 0xfd, 0x5d, 0xc9, 0x67, 0xd5, 0x51, 0xc9,
|
|
0x2a, 0x4e, 0x91, 0xb0, 0x59, 0xb2, 0x0f, 0xa2,
|
|
0xe6, 0x47, 0x73, 0xc2, 0xa2, 0xae, 0xbb, 0xc8,
|
|
0x42, 0xa3, 0x2a, 0x27, 0x29, 0x48, 0x8c, 0x54,
|
|
0x6c, 0xec, 0x00, 0x2a, 0x42, 0xa3, 0x7a, 0x0f,
|
|
0x12, 0x66, 0x6b, 0x96, 0xf6, 0xd0, 0x56, 0x4f,
|
|
0x49, 0x5c, 0x47, 0xec, 0x05, 0x62, 0x54, 0xb2,
|
|
0x64, 0x5a, 0x69, 0x1f, 0x19, 0xb4, 0x84, 0x5c,
|
|
0xbe, 0x48, 0x8e, 0xfc, 0x58, 0x21, 0xce, 0xfa,
|
|
0xaa, 0x84, 0xd2, 0xc1, 0x08, 0xb3, 0x87, 0x0f,
|
|
0x4f, 0xa3, 0x3a, 0xb6, 0x44, 0xbe, 0x2e, 0x9a,
|
|
0xdd, 0xb5, 0x44, 0x80, 0xca, 0xf4, 0xc3, 0x6e,
|
|
0xba, 0x93, 0x77, 0xe0, 0x53, 0xfb, 0x37, 0xfb,
|
|
0x88, 0xc3, 0x1f, 0x25, 0xde, 0x3e, 0x11, 0xf4,
|
|
0x89, 0xe7, 0xd1, 0x3b, 0xb4, 0x23, 0xcb, 0x70,
|
|
0xba, 0x35, 0x97, 0x7c, 0xbe, 0x84, 0x13, 0xcf,
|
|
0xe0, 0x4d, 0x33, 0x91, 0x71, 0x85, 0xbb, 0x4b,
|
|
0x97, 0x32, 0x5d, 0xa0, 0xb9, 0x8f, 0xdc, 0x27,
|
|
0x5a, 0xeb, 0x71, 0xf1, 0xd5, 0x0d, 0x65, 0xb4,
|
|
0x22, 0x81, 0xde, 0xa7, 0x58, 0x20, 0x0b, 0x18,
|
|
0x11, 0x76, 0x5c, 0xe6, 0x6a, 0x2c, 0x99, 0x69,
|
|
0xdc, 0xed, 0x67, 0x08, 0x5d, 0x5e, 0xe9, 0x1e,
|
|
0x55, 0x70, 0xc1, 0x5a, 0x76, 0x1b, 0x8d, 0x2e,
|
|
0x0d, 0xf9, 0xcc, 0x30, 0x8c, 0x44, 0x0f, 0x63,
|
|
0x8c, 0x42, 0x8a, 0x9f, 0x4c, 0xd1, 0x48, 0x28,
|
|
0x8a, 0xf5, 0x56, 0x2e, 0x23, 0x12, 0xfe, 0x67,
|
|
0x9a, 0x13, 0x65, 0x75, 0x83, 0xf1, 0x3c, 0x98,
|
|
0x07, 0x6b, 0xb7, 0x27, 0x5b, 0xf0, 0x70, 0xda,
|
|
0x30, 0xf8, 0x74, 0x4e, 0x7a, 0x32, 0x84, 0xcc,
|
|
0x0e, 0xcd, 0x80, 0x8b, 0x82, 0x31, 0x9a, 0x48,
|
|
0xcf, 0x75, 0x00, 0x1f, 0x4f, 0xe0, 0x8e, 0xa3,
|
|
0x6a, 0x2c, 0xd4, 0x73, 0x4c, 0x63, 0x7c, 0xa6,
|
|
0x4d, 0x5e, 0xfd, 0x43, 0x3b, 0x27, 0xe1, 0x5e,
|
|
0xa3, 0xa9, 0x5c, 0x3b, 0x60, 0xdd, 0xc6, 0x8d,
|
|
0x5a, 0xf1, 0x3e, 0x89, 0x4b, 0x24, 0xcf, 0x01,
|
|
0x3a, 0x2d, 0x44, 0xe7, 0xda, 0xe7, 0xa1, 0xac,
|
|
0x11, 0x05, 0x0c, 0xa9, 0x7a, 0x82, 0x8c, 0x5c,
|
|
0x29, 0x68, 0x9c, 0x73, 0x13, 0xcc, 0x67, 0x32,
|
|
0x11, 0x5e, 0xe5, 0xcc, 0x8c, 0xf5, 0xa7, 0x52,
|
|
0x83, 0x9a, 0x70, 0xef, 0xde, 0x55, 0x9c, 0xc7,
|
|
0x8a, 0xed, 0xad, 0x28, 0x4a, 0xc5, 0x92, 0x6d,
|
|
0x8e, 0x47, 0xca, 0xe3, 0xf8, 0x77, 0xb5, 0x26,
|
|
0x64, 0x84, 0xc2, 0xf1, 0xd7, 0xae, 0x0c, 0xb9,
|
|
0x39, 0x0f, 0x43, 0x6b, 0xe9, 0xe0, 0x09, 0x4b,
|
|
0xe5, 0xe3, 0x17, 0xa6, 0x68, 0x69, 0x46, 0xf4,
|
|
0xf0, 0x68, 0x7f, 0x2f, 0x1c, 0x7e, 0x4c, 0xd2,
|
|
0xb5, 0xc6, 0x16, 0x85, 0xcf, 0x02, 0x4c, 0x89,
|
|
0x0b, 0x25, 0xb0, 0xeb, 0xf3, 0x77, 0x08, 0x6a,
|
|
0x46, 0x5c, 0xf6, 0x2f, 0xf1, 0x24, 0xc3, 0x4d,
|
|
0x80, 0x60, 0x4d, 0x69, 0x98, 0xde, 0xc7, 0xa1,
|
|
0xf6, 0x4e, 0x18, 0x0c, 0x2a, 0xb0, 0xb2, 0xe0,
|
|
0x46, 0xe7, 0x49, 0x37, 0xc8, 0x5a, 0x23, 0x24,
|
|
0xe3, 0x0f, 0xcc, 0x92, 0xb4, 0x8d, 0xdc, 0x9e
|
|
};
|
|
|
|
static const uint8_t AES_CBC_ciphertext_1280B[] = {
|
|
0x91, 0x99, 0x5e, 0x9e, 0x84, 0xff, 0x59, 0x45,
|
|
0xc1, 0xf4, 0xbc, 0x9c, 0xb9, 0x30, 0x6c, 0x51,
|
|
0x73, 0x52, 0xb4, 0x44, 0x09, 0x79, 0xe2, 0x89,
|
|
0x75, 0xeb, 0x54, 0x26, 0xce, 0xd8, 0x24, 0x98,
|
|
0xaa, 0xf8, 0x13, 0x16, 0x68, 0x58, 0xc4, 0x82,
|
|
0x0e, 0x31, 0xd3, 0x6a, 0x13, 0x58, 0x31, 0xe9,
|
|
0x3a, 0xc1, 0x8b, 0xc5, 0x3f, 0x50, 0x42, 0xd1,
|
|
0x93, 0xe4, 0x9b, 0x65, 0x2b, 0xf4, 0x1d, 0x9e,
|
|
0x2d, 0xdb, 0x48, 0xef, 0x9a, 0x01, 0x68, 0xb6,
|
|
0xea, 0x7a, 0x2b, 0xad, 0xfe, 0x77, 0x44, 0x7e,
|
|
0x5a, 0xc5, 0x64, 0xb4, 0xfe, 0x5c, 0x80, 0xf3,
|
|
0x20, 0x7e, 0xaf, 0x5b, 0xf8, 0xd1, 0x38, 0xa0,
|
|
0x8d, 0x09, 0x77, 0x06, 0xfe, 0xf5, 0xf4, 0xe4,
|
|
0xee, 0xb8, 0x95, 0x27, 0xed, 0x07, 0xb8, 0xaa,
|
|
0x25, 0xb4, 0xe1, 0x4c, 0xeb, 0x3f, 0xdb, 0x39,
|
|
0x66, 0x28, 0x1b, 0x60, 0x42, 0x8b, 0x99, 0xd9,
|
|
0x49, 0xd6, 0x8c, 0xa4, 0x9d, 0xd8, 0x93, 0x58,
|
|
0x8f, 0xfa, 0xd3, 0xf7, 0x37, 0x9c, 0x88, 0xab,
|
|
0x16, 0x50, 0xfe, 0x01, 0x1f, 0x88, 0x48, 0xbe,
|
|
0x21, 0xa9, 0x90, 0x9e, 0x73, 0xe9, 0x82, 0xf7,
|
|
0xbf, 0x4b, 0x43, 0xf4, 0xbf, 0x22, 0x3c, 0x45,
|
|
0x47, 0x95, 0x5b, 0x49, 0x71, 0x07, 0x1c, 0x8b,
|
|
0x49, 0xa4, 0xa3, 0x49, 0xc4, 0x5f, 0xb1, 0xf5,
|
|
0xe3, 0x6b, 0xf1, 0xdc, 0xea, 0x92, 0x7b, 0x29,
|
|
0x40, 0xc9, 0x39, 0x5f, 0xdb, 0xbd, 0xf3, 0x6a,
|
|
0x09, 0x9b, 0x2a, 0x5e, 0xc7, 0x0b, 0x25, 0x94,
|
|
0x55, 0x71, 0x9c, 0x7e, 0x0e, 0xb4, 0x08, 0x12,
|
|
0x8c, 0x6e, 0x77, 0xb8, 0x29, 0xf1, 0xc6, 0x71,
|
|
0x04, 0x40, 0x77, 0x18, 0x3f, 0x01, 0x09, 0x9c,
|
|
0x23, 0x2b, 0x5d, 0x2a, 0x88, 0x20, 0x23, 0x59,
|
|
0x74, 0x2a, 0x67, 0x8f, 0xb7, 0xba, 0x38, 0x9f,
|
|
0x0f, 0xcf, 0x94, 0xdf, 0xe1, 0x8f, 0x35, 0x5e,
|
|
0x34, 0x0c, 0x32, 0x92, 0x2b, 0x23, 0x81, 0xf4,
|
|
0x73, 0xa0, 0x5a, 0x2a, 0xbd, 0xa6, 0x6b, 0xae,
|
|
0x43, 0xe2, 0xdc, 0x01, 0xc1, 0xc6, 0xc3, 0x04,
|
|
0x06, 0xbb, 0xb0, 0x89, 0xb3, 0x4e, 0xbd, 0x81,
|
|
0x1b, 0x03, 0x63, 0x93, 0xed, 0x4e, 0xf6, 0xe5,
|
|
0x94, 0x6f, 0xd6, 0xf3, 0x20, 0xf3, 0xbc, 0x30,
|
|
0xc5, 0xd6, 0xbe, 0x1c, 0x05, 0x34, 0x26, 0x4d,
|
|
0x46, 0x5e, 0x56, 0x63, 0xfb, 0xdb, 0xcd, 0xed,
|
|
0xb0, 0x7f, 0x83, 0x94, 0x55, 0x54, 0x2f, 0xab,
|
|
0xc9, 0xb7, 0x16, 0x4f, 0x9e, 0x93, 0x25, 0xd7,
|
|
0x9f, 0x39, 0x2b, 0x63, 0xcf, 0x1e, 0xa3, 0x0e,
|
|
0x28, 0x47, 0x8a, 0x5f, 0x40, 0x02, 0x89, 0x1f,
|
|
0x83, 0xe7, 0x87, 0xd1, 0x90, 0x17, 0xb8, 0x27,
|
|
0x64, 0xe1, 0xe1, 0x48, 0x5a, 0x55, 0x74, 0x99,
|
|
0x27, 0x9d, 0x05, 0x67, 0xda, 0x70, 0x12, 0x8f,
|
|
0x94, 0x96, 0xfd, 0x36, 0xa4, 0x1d, 0x22, 0xe5,
|
|
0x0b, 0xe5, 0x2f, 0x38, 0x55, 0xa3, 0x5d, 0x0b,
|
|
0xcf, 0xd4, 0xa9, 0xb8, 0xd6, 0x9a, 0x16, 0x2e,
|
|
0x6c, 0x4a, 0x25, 0x51, 0x7a, 0x09, 0x48, 0xdd,
|
|
0xf0, 0xa3, 0x5b, 0x08, 0x1e, 0x2f, 0x03, 0x91,
|
|
0x80, 0xe8, 0x0f, 0xe9, 0x5a, 0x2f, 0x90, 0xd3,
|
|
0x64, 0xed, 0xd7, 0x51, 0x17, 0x66, 0x53, 0x40,
|
|
0x43, 0x74, 0xef, 0x0a, 0x0d, 0x49, 0x41, 0xf2,
|
|
0x67, 0x6e, 0xea, 0x14, 0xc8, 0x74, 0xd6, 0xa9,
|
|
0xb9, 0x6a, 0xe3, 0xec, 0x7d, 0xe8, 0x6a, 0x21,
|
|
0x3a, 0x52, 0x42, 0xfe, 0x9a, 0x15, 0x6d, 0x60,
|
|
0x64, 0x88, 0xc5, 0xb2, 0x8b, 0x15, 0x2c, 0xff,
|
|
0xe2, 0x35, 0xc3, 0xee, 0x9f, 0xcd, 0x82, 0xd9,
|
|
0x14, 0x35, 0x2a, 0xb7, 0xf5, 0x2f, 0x7b, 0xbc,
|
|
0x01, 0xfd, 0xa8, 0xe0, 0x21, 0x4e, 0x73, 0xf9,
|
|
0xf2, 0xb0, 0x79, 0xc9, 0x10, 0x52, 0x8f, 0xa8,
|
|
0x3e, 0x3b, 0xbe, 0xc5, 0xde, 0xf6, 0x53, 0xe3,
|
|
0x1c, 0x25, 0x3a, 0x1f, 0x13, 0xbf, 0x13, 0xbb,
|
|
0x94, 0xc2, 0x97, 0x43, 0x64, 0x47, 0x8f, 0x76,
|
|
0xd7, 0xaa, 0xeb, 0xa4, 0x03, 0x50, 0x0c, 0x10,
|
|
0x50, 0xd8, 0xf7, 0x75, 0x52, 0x42, 0xe2, 0x94,
|
|
0x67, 0xf4, 0x60, 0xfb, 0x21, 0x9b, 0x7a, 0x05,
|
|
0x50, 0x7c, 0x1b, 0x4a, 0x8b, 0x29, 0xe1, 0xac,
|
|
0xd7, 0x99, 0xfd, 0x0d, 0x65, 0x92, 0xcd, 0x23,
|
|
0xa7, 0x35, 0x8e, 0x13, 0xf2, 0xe4, 0x10, 0x74,
|
|
0xc6, 0x4f, 0x19, 0xf7, 0x01, 0x0b, 0x46, 0xab,
|
|
0xef, 0x8d, 0x4a, 0x4a, 0xfa, 0xda, 0xf3, 0xfb,
|
|
0x40, 0x28, 0x88, 0xa2, 0x65, 0x98, 0x4d, 0x88,
|
|
0xc7, 0xbf, 0x00, 0xc8, 0xd0, 0x91, 0xcb, 0x89,
|
|
0x2f, 0xb0, 0x85, 0xfc, 0xa1, 0xc1, 0x9e, 0x83,
|
|
0x88, 0xad, 0x95, 0xc0, 0x31, 0xa0, 0xad, 0xa2,
|
|
0x42, 0xb5, 0xe7, 0x55, 0xd4, 0x93, 0x5a, 0x74,
|
|
0x4e, 0x41, 0xc3, 0xcf, 0x96, 0x83, 0x46, 0xa1,
|
|
0xb7, 0x5b, 0xb1, 0x34, 0x67, 0x4e, 0xb1, 0xd7,
|
|
0x40, 0x20, 0x72, 0xe9, 0xc8, 0x74, 0xb7, 0xde,
|
|
0x72, 0x29, 0x77, 0x4c, 0x74, 0x7e, 0xcc, 0x18,
|
|
0xa5, 0x8d, 0x79, 0x8c, 0xd6, 0x6e, 0xcb, 0xd9,
|
|
0xe1, 0x61, 0xe7, 0x36, 0xbc, 0x37, 0xea, 0xee,
|
|
0xd8, 0x3c, 0x5e, 0x7c, 0x47, 0x50, 0xd5, 0xec,
|
|
0x37, 0xc5, 0x63, 0xc3, 0xc9, 0x99, 0x23, 0x9f,
|
|
0x64, 0x39, 0xdf, 0x13, 0x96, 0x6d, 0xea, 0x08,
|
|
0x0c, 0x27, 0x2d, 0xfe, 0x0f, 0xc2, 0xa3, 0x97,
|
|
0x04, 0x12, 0x66, 0x0d, 0x94, 0xbf, 0xbe, 0x3e,
|
|
0xb9, 0xcf, 0x8e, 0xc1, 0x9d, 0xb1, 0x64, 0x17,
|
|
0x54, 0x92, 0x3f, 0x0a, 0x51, 0xc8, 0xf5, 0x82,
|
|
0x98, 0x73, 0x03, 0xc0, 0x5a, 0x51, 0x01, 0x67,
|
|
0xb4, 0x01, 0x04, 0x06, 0xbc, 0x37, 0xde, 0x96,
|
|
0x23, 0x3c, 0xce, 0x98, 0x3f, 0xd6, 0x51, 0x1b,
|
|
0x01, 0x83, 0x0a, 0x1c, 0xf9, 0xeb, 0x7e, 0x72,
|
|
0xa9, 0x51, 0x23, 0xc8, 0xd7, 0x2f, 0x12, 0xbc,
|
|
0x08, 0xac, 0x07, 0xe7, 0xa7, 0xe6, 0x46, 0xae,
|
|
0x54, 0xa3, 0xc2, 0xf2, 0x05, 0x2d, 0x06, 0x5e,
|
|
0xfc, 0xe2, 0xa2, 0x23, 0xac, 0x86, 0xf2, 0x54,
|
|
0x83, 0x4a, 0xb6, 0x48, 0x93, 0xa1, 0x78, 0xc2,
|
|
0x07, 0xec, 0x82, 0xf0, 0x74, 0xa9, 0x18, 0xe9,
|
|
0x53, 0x44, 0x49, 0xc2, 0x94, 0xf8, 0x94, 0x92,
|
|
0x08, 0x3f, 0xbf, 0xa6, 0xe5, 0xc6, 0x03, 0x8a,
|
|
0xc6, 0x90, 0x48, 0x6c, 0xee, 0xbd, 0x44, 0x92,
|
|
0x1f, 0x2a, 0xce, 0x1d, 0xb8, 0x31, 0xa2, 0x9d,
|
|
0x24, 0x93, 0xa8, 0x9f, 0x36, 0x00, 0x04, 0x7b,
|
|
0xcb, 0x93, 0x59, 0xa1, 0x53, 0xdb, 0x13, 0x7a,
|
|
0x54, 0xb1, 0x04, 0xdb, 0xce, 0x48, 0x4f, 0xe5,
|
|
0x2f, 0xcb, 0xdf, 0x8f, 0x50, 0x7c, 0xfc, 0x76,
|
|
0x80, 0xb4, 0xdc, 0x3b, 0xc8, 0x98, 0x95, 0xf5,
|
|
0x50, 0xba, 0x70, 0x5a, 0x97, 0xd5, 0xfc, 0x98,
|
|
0x4d, 0xf3, 0x61, 0x0f, 0xcf, 0xac, 0x49, 0x0a,
|
|
0xdb, 0xc1, 0x42, 0x8f, 0xb6, 0x29, 0xd5, 0x65,
|
|
0xef, 0x83, 0xf1, 0x30, 0x4b, 0x84, 0xd0, 0x69,
|
|
0xde, 0xd2, 0x99, 0xe5, 0xec, 0xd3, 0x90, 0x86,
|
|
0x39, 0x2a, 0x6e, 0xd5, 0x32, 0xe3, 0x0d, 0x2d,
|
|
0x01, 0x8b, 0x17, 0x55, 0x1d, 0x65, 0x57, 0xbf,
|
|
0xd8, 0x75, 0xa4, 0x85, 0xb6, 0x4e, 0x35, 0x14,
|
|
0x58, 0xe4, 0x89, 0xb8, 0x7a, 0x58, 0x86, 0x0c,
|
|
0xbd, 0x8b, 0x05, 0x7b, 0x63, 0xc0, 0x86, 0x80,
|
|
0x33, 0x46, 0xd4, 0x9b, 0xb6, 0x0a, 0xeb, 0x6c,
|
|
0xae, 0xd6, 0x57, 0x7a, 0xc7, 0x59, 0x33, 0xa0,
|
|
0xda, 0xa4, 0x12, 0xbf, 0x52, 0x22, 0x05, 0x8d,
|
|
0xeb, 0xee, 0xd5, 0xec, 0xea, 0x29, 0x9b, 0x76,
|
|
0x95, 0x50, 0x6d, 0x99, 0xe1, 0x45, 0x63, 0x09,
|
|
0x16, 0x5f, 0xb0, 0xf2, 0x5b, 0x08, 0x33, 0xdd,
|
|
0x8f, 0xb7, 0x60, 0x7a, 0x8e, 0xc6, 0xfc, 0xac,
|
|
0xa9, 0x56, 0x2c, 0xa9, 0x8b, 0x74, 0x33, 0xad,
|
|
0x2a, 0x7e, 0x96, 0xb6, 0xba, 0x22, 0x28, 0xcf,
|
|
0x4d, 0x96, 0xb7, 0xd1, 0xfa, 0x99, 0x4a, 0x61,
|
|
0xe6, 0x84, 0xd1, 0x94, 0xca, 0xf5, 0x86, 0xb0,
|
|
0xba, 0x34, 0x7a, 0x04, 0xcc, 0xd4, 0x81, 0xcd,
|
|
0xd9, 0x86, 0xb6, 0xe0, 0x5a, 0x6f, 0x9b, 0x99,
|
|
0xf0, 0xdf, 0x49, 0xae, 0x6d, 0xc2, 0x54, 0x67,
|
|
0xe0, 0xb4, 0x34, 0x2d, 0x1c, 0x46, 0xdf, 0x73,
|
|
0x3b, 0x45, 0x43, 0xe7, 0x1f, 0xa3, 0x36, 0x35,
|
|
0x25, 0x33, 0xd9, 0xc0, 0x54, 0x38, 0x6e, 0x6b,
|
|
0x80, 0xcf, 0x50, 0xa4, 0xb6, 0x21, 0x17, 0xfd,
|
|
0x9b, 0x5c, 0x36, 0xca, 0xcc, 0x73, 0x73, 0xad,
|
|
0xe0, 0x57, 0x77, 0x90, 0x0e, 0x7f, 0x0f, 0x87,
|
|
0x7f, 0xdb, 0x73, 0xbf, 0xda, 0xc2, 0xb3, 0x05,
|
|
0x22, 0x06, 0xf5, 0xa3, 0xfc, 0x1e, 0x8f, 0xda,
|
|
0xcf, 0x49, 0xd6, 0xb3, 0x66, 0x2c, 0xb5, 0x00,
|
|
0xaf, 0x85, 0x6e, 0xb8, 0x5b, 0x8c, 0xa1, 0xa4,
|
|
0x21, 0xce, 0x40, 0xf3, 0x98, 0xac, 0xec, 0x88,
|
|
0x62, 0x43, 0x2a, 0xac, 0xca, 0xcf, 0xb9, 0x30,
|
|
0xeb, 0xfc, 0xef, 0xf0, 0x6e, 0x64, 0x6d, 0xe7,
|
|
0x54, 0x88, 0x6b, 0x22, 0x29, 0xbe, 0xa5, 0x8c,
|
|
0x31, 0x23, 0x3b, 0x4a, 0x80, 0x37, 0xe6, 0xd0,
|
|
0x05, 0xfc, 0x10, 0x0e, 0xdd, 0xbb, 0x00, 0xc5,
|
|
0x07, 0x20, 0x59, 0xd3, 0x41, 0x17, 0x86, 0x46,
|
|
0xab, 0x68, 0xf6, 0x48, 0x3c, 0xea, 0x5a, 0x06,
|
|
0x30, 0x21, 0x19, 0xed, 0x74, 0xbe, 0x0b, 0x97,
|
|
0xee, 0x91, 0x35, 0x94, 0x1f, 0xcb, 0x68, 0x7f,
|
|
0xe4, 0x48, 0xb0, 0x16, 0xfb, 0xf0, 0x74, 0xdb,
|
|
0x06, 0x59, 0x2e, 0x5a, 0x9c, 0xce, 0x8f, 0x7d,
|
|
0xba, 0x48, 0xd5, 0x3f, 0x5c, 0xb0, 0xc2, 0x33,
|
|
0x48, 0x60, 0x17, 0x08, 0x85, 0xba, 0xff, 0xb9,
|
|
0x34, 0x0a, 0x3d, 0x8f, 0x21, 0x13, 0x12, 0x1b
|
|
};
|
|
|
|
static const uint8_t AES_CBC_ciphertext_1536B[] = {
|
|
0x89, 0x93, 0x05, 0x99, 0xa9, 0xed, 0xea, 0x62,
|
|
0xc9, 0xda, 0x51, 0x15, 0xce, 0x42, 0x91, 0xc3,
|
|
0x80, 0xc8, 0x03, 0x88, 0xc2, 0x63, 0xda, 0x53,
|
|
0x1a, 0xf3, 0xeb, 0xd5, 0xba, 0x6f, 0x23, 0xb2,
|
|
0xed, 0x8f, 0x89, 0xb1, 0xb3, 0xca, 0x90, 0x7a,
|
|
0xdd, 0x3f, 0xf6, 0xca, 0x86, 0x58, 0x54, 0xbc,
|
|
0xab, 0x0f, 0xf4, 0xab, 0x6d, 0x5d, 0x42, 0xd0,
|
|
0x17, 0x49, 0x17, 0xd1, 0x93, 0xea, 0xe8, 0x22,
|
|
0xc1, 0x34, 0x9f, 0x3a, 0x3b, 0xaa, 0xe9, 0x1b,
|
|
0x93, 0xff, 0x6b, 0x68, 0xba, 0xe6, 0xd2, 0x39,
|
|
0x3d, 0x55, 0x34, 0x8f, 0x98, 0x86, 0xb4, 0xd8,
|
|
0x7c, 0x0d, 0x3e, 0x01, 0x63, 0x04, 0x01, 0xff,
|
|
0x16, 0x0f, 0x51, 0x5f, 0x73, 0x53, 0xf0, 0x3a,
|
|
0x38, 0xb4, 0x4d, 0x8d, 0xaf, 0xa3, 0xca, 0x2f,
|
|
0x6f, 0xdf, 0xc0, 0x41, 0x6c, 0x48, 0x60, 0x1a,
|
|
0xe4, 0xe7, 0x8a, 0x65, 0x6f, 0x8d, 0xd7, 0xe1,
|
|
0x10, 0xab, 0x78, 0x5b, 0xb9, 0x69, 0x1f, 0xe0,
|
|
0x5c, 0xf1, 0x19, 0x12, 0x21, 0xc7, 0x51, 0xbc,
|
|
0x61, 0x5f, 0xc0, 0x36, 0x17, 0xc0, 0x28, 0xd9,
|
|
0x51, 0xcb, 0x43, 0xd9, 0xfa, 0xd1, 0xad, 0x79,
|
|
0x69, 0x86, 0x49, 0xc5, 0xe5, 0x69, 0x27, 0xce,
|
|
0x22, 0xd0, 0xe1, 0x6a, 0xf9, 0x02, 0xca, 0x6c,
|
|
0x34, 0xc7, 0xb8, 0x02, 0xc1, 0x38, 0x7f, 0xd5,
|
|
0x15, 0xf5, 0xd6, 0xeb, 0xf9, 0x30, 0x40, 0x43,
|
|
0xea, 0x87, 0xde, 0x35, 0xf6, 0x83, 0x59, 0x09,
|
|
0x68, 0x62, 0x00, 0x87, 0xb8, 0xe7, 0xca, 0x05,
|
|
0x0f, 0xac, 0x42, 0x58, 0x45, 0xaa, 0xc9, 0x9b,
|
|
0xfd, 0x2a, 0xda, 0x65, 0x33, 0x93, 0x9d, 0xc6,
|
|
0x93, 0x8d, 0xe2, 0xc5, 0x71, 0xc1, 0x5c, 0x13,
|
|
0xde, 0x7b, 0xd4, 0xb9, 0x4c, 0x35, 0x61, 0x85,
|
|
0x90, 0x78, 0xf7, 0x81, 0x98, 0x45, 0x99, 0x24,
|
|
0x58, 0x73, 0x28, 0xf8, 0x31, 0xab, 0x54, 0x2e,
|
|
0xc0, 0x38, 0x77, 0x25, 0x5c, 0x06, 0x9c, 0xc3,
|
|
0x69, 0x21, 0x92, 0x76, 0xe1, 0x16, 0xdc, 0xa9,
|
|
0xee, 0xb6, 0x80, 0x66, 0x43, 0x11, 0x24, 0xb3,
|
|
0x07, 0x17, 0x89, 0x0f, 0xcb, 0xe0, 0x60, 0xa8,
|
|
0x9d, 0x06, 0x4b, 0x6e, 0x72, 0xb7, 0xbc, 0x4f,
|
|
0xb8, 0xc0, 0x80, 0xa2, 0xfb, 0x46, 0x5b, 0x8f,
|
|
0x11, 0x01, 0x92, 0x9d, 0x37, 0x09, 0x98, 0xc8,
|
|
0x0a, 0x46, 0xae, 0x12, 0xac, 0x61, 0x3f, 0xe7,
|
|
0x41, 0x1a, 0xaa, 0x2e, 0xdc, 0xd7, 0x2a, 0x47,
|
|
0xee, 0xdf, 0x08, 0xd1, 0xff, 0xea, 0x13, 0xc6,
|
|
0x05, 0xdb, 0x29, 0xcc, 0x03, 0xba, 0x7b, 0x6d,
|
|
0x40, 0xc1, 0xc9, 0x76, 0x75, 0x03, 0x7a, 0x71,
|
|
0xc9, 0x5f, 0xd9, 0xe0, 0x61, 0x69, 0x36, 0x8f,
|
|
0xb2, 0xbc, 0x28, 0xf3, 0x90, 0x71, 0xda, 0x5f,
|
|
0x08, 0xd5, 0x0d, 0xc1, 0xe6, 0xbd, 0x2b, 0xc6,
|
|
0x6c, 0x42, 0xfd, 0xbf, 0x10, 0xe8, 0x5f, 0x87,
|
|
0x3d, 0x21, 0x42, 0x85, 0x01, 0x0a, 0xbf, 0x8e,
|
|
0x49, 0xd3, 0x9c, 0x89, 0x3b, 0xea, 0xe1, 0xbf,
|
|
0xe9, 0x9b, 0x5e, 0x0e, 0xb8, 0xeb, 0xcd, 0x3a,
|
|
0xf6, 0x29, 0x41, 0x35, 0xdd, 0x9b, 0x13, 0x24,
|
|
0xe0, 0x1d, 0x8a, 0xcb, 0x20, 0xf8, 0x41, 0x51,
|
|
0x3e, 0x23, 0x8c, 0x67, 0x98, 0x39, 0x53, 0x77,
|
|
0x2a, 0x68, 0xf4, 0x3c, 0x7e, 0xd6, 0xc4, 0x6e,
|
|
0xf1, 0x53, 0xe9, 0xd8, 0x5c, 0xc1, 0xa9, 0x38,
|
|
0x6f, 0x5e, 0xe4, 0xd4, 0x29, 0x1c, 0x6c, 0xee,
|
|
0x2f, 0xea, 0xde, 0x61, 0x71, 0x5a, 0xea, 0xce,
|
|
0x23, 0x6e, 0x1b, 0x16, 0x43, 0xb7, 0xc0, 0xe3,
|
|
0x87, 0xa1, 0x95, 0x1e, 0x97, 0x4d, 0xea, 0xa6,
|
|
0xf7, 0x25, 0xac, 0x82, 0x2a, 0xd3, 0xa6, 0x99,
|
|
0x75, 0xdd, 0xc1, 0x55, 0x32, 0x6b, 0xea, 0x33,
|
|
0x88, 0xce, 0x06, 0xac, 0x15, 0x39, 0x19, 0xa3,
|
|
0x59, 0xaf, 0x7a, 0x1f, 0xd9, 0x72, 0x5e, 0xf7,
|
|
0x4c, 0xf3, 0x5d, 0x6b, 0xf2, 0x16, 0x92, 0xa8,
|
|
0x9e, 0x3d, 0xd4, 0x4c, 0x72, 0x55, 0x4e, 0x4a,
|
|
0xf7, 0x8b, 0x2f, 0x67, 0x5a, 0x90, 0xb7, 0xcf,
|
|
0x16, 0xd3, 0x7b, 0x5a, 0x9a, 0xc8, 0x9f, 0xbf,
|
|
0x01, 0x76, 0x3b, 0x86, 0x2c, 0x2a, 0x78, 0x10,
|
|
0x70, 0x05, 0x38, 0xf9, 0xdd, 0x2a, 0x1d, 0x00,
|
|
0x25, 0xb7, 0x10, 0xac, 0x3b, 0x3c, 0x4d, 0x3c,
|
|
0x01, 0x68, 0x3c, 0x5a, 0x29, 0xc2, 0xa0, 0x1b,
|
|
0x95, 0x67, 0xf9, 0x0a, 0x60, 0xb7, 0x11, 0x9c,
|
|
0x40, 0x45, 0xd7, 0xb0, 0xda, 0x49, 0x87, 0xcd,
|
|
0xb0, 0x9b, 0x61, 0x8c, 0xf4, 0x0d, 0x94, 0x1d,
|
|
0x79, 0x66, 0x13, 0x0b, 0xc6, 0x6b, 0x19, 0xee,
|
|
0xa0, 0x6b, 0x64, 0x7d, 0xc4, 0xff, 0x98, 0x72,
|
|
0x60, 0xab, 0x7f, 0x0f, 0x4d, 0x5d, 0x6b, 0xc3,
|
|
0xba, 0x5e, 0x0d, 0x04, 0xd9, 0x59, 0x17, 0xd0,
|
|
0x64, 0xbe, 0xfb, 0x58, 0xfc, 0xed, 0x18, 0xf6,
|
|
0xac, 0x19, 0xa4, 0xfd, 0x16, 0x59, 0x80, 0x58,
|
|
0xb8, 0x0f, 0x79, 0x24, 0x60, 0x18, 0x62, 0xa9,
|
|
0xa3, 0xa0, 0xe8, 0x81, 0xd6, 0xec, 0x5b, 0xfe,
|
|
0x5b, 0xb8, 0xa4, 0x00, 0xa9, 0xd0, 0x90, 0x17,
|
|
0xe5, 0x50, 0x3d, 0x2b, 0x12, 0x6e, 0x2a, 0x13,
|
|
0x65, 0x7c, 0xdf, 0xdf, 0xa7, 0xdd, 0x9f, 0x78,
|
|
0x5f, 0x8f, 0x4e, 0x90, 0xa6, 0x10, 0xe4, 0x7b,
|
|
0x68, 0x6b, 0xfd, 0xa9, 0x6d, 0x47, 0xfa, 0xec,
|
|
0x42, 0x35, 0x07, 0x12, 0x3e, 0x78, 0x23, 0x15,
|
|
0xff, 0xe2, 0x65, 0xc7, 0x47, 0x89, 0x2f, 0x97,
|
|
0x7c, 0xd7, 0x6b, 0x69, 0x35, 0x79, 0x6f, 0x85,
|
|
0xb4, 0xa9, 0x75, 0x04, 0x32, 0x9a, 0xfe, 0xf0,
|
|
0xce, 0xe3, 0xf1, 0xab, 0x15, 0x47, 0xe4, 0x9c,
|
|
0xc1, 0x48, 0x32, 0x3c, 0xbe, 0x44, 0x72, 0xc9,
|
|
0xaa, 0x50, 0x37, 0xa6, 0xbe, 0x41, 0xcf, 0xe8,
|
|
0x17, 0x4e, 0x37, 0xbe, 0xf1, 0x34, 0x2c, 0xd9,
|
|
0x60, 0x48, 0x09, 0xa5, 0x26, 0x00, 0x31, 0x77,
|
|
0x4e, 0xac, 0x7c, 0x89, 0x75, 0xe3, 0xde, 0x26,
|
|
0x4c, 0x32, 0x54, 0x27, 0x8e, 0x92, 0x26, 0x42,
|
|
0x85, 0x76, 0x01, 0x76, 0x62, 0x4c, 0x29, 0xe9,
|
|
0x38, 0x05, 0x51, 0x54, 0x97, 0xa3, 0x03, 0x59,
|
|
0x5e, 0xec, 0x0c, 0xe4, 0x96, 0xb7, 0x15, 0xa8,
|
|
0x41, 0x06, 0x2b, 0x78, 0x95, 0x24, 0xf6, 0x32,
|
|
0xc5, 0xec, 0xd7, 0x89, 0x28, 0x1e, 0xec, 0xb1,
|
|
0xc7, 0x21, 0x0c, 0xd3, 0x80, 0x7c, 0x5a, 0xe6,
|
|
0xb1, 0x3a, 0x52, 0x33, 0x84, 0x4e, 0x32, 0x6e,
|
|
0x7a, 0xf6, 0x43, 0x15, 0x5b, 0xa6, 0xba, 0xeb,
|
|
0xa8, 0xe4, 0xff, 0x4f, 0xbd, 0xbd, 0xa8, 0x5e,
|
|
0xbe, 0x27, 0xaf, 0xc5, 0xf7, 0x9e, 0xdf, 0x48,
|
|
0x22, 0xca, 0x6a, 0x0b, 0x3c, 0xd7, 0xe0, 0xdc,
|
|
0xf3, 0x71, 0x08, 0xdc, 0x28, 0x13, 0x08, 0xf2,
|
|
0x08, 0x1d, 0x9d, 0x7b, 0xd9, 0xde, 0x6f, 0xe6,
|
|
0xe8, 0x88, 0x18, 0xc2, 0xcd, 0x93, 0xc5, 0x38,
|
|
0x21, 0x68, 0x4c, 0x9a, 0xfb, 0xb6, 0x18, 0x16,
|
|
0x73, 0x2c, 0x1d, 0x6f, 0x95, 0xfb, 0x65, 0x4f,
|
|
0x7c, 0xec, 0x8d, 0x6c, 0xa8, 0xc0, 0x55, 0x28,
|
|
0xc6, 0xc3, 0xea, 0xeb, 0x05, 0xf5, 0x65, 0xeb,
|
|
0x53, 0xe1, 0x54, 0xef, 0xb8, 0x64, 0x98, 0x2d,
|
|
0x98, 0x9e, 0xc8, 0xfe, 0xa2, 0x07, 0x30, 0xf7,
|
|
0xf7, 0xae, 0xdb, 0x32, 0xf8, 0x71, 0x9d, 0x06,
|
|
0xdf, 0x9b, 0xda, 0x61, 0x7d, 0xdb, 0xae, 0x06,
|
|
0x24, 0x63, 0x74, 0xb6, 0xf3, 0x1b, 0x66, 0x09,
|
|
0x60, 0xff, 0x2b, 0x29, 0xf5, 0xa9, 0x9d, 0x61,
|
|
0x5d, 0x55, 0x10, 0x82, 0x21, 0xbb, 0x64, 0x0d,
|
|
0xef, 0x5c, 0xe3, 0x30, 0x1b, 0x60, 0x1e, 0x5b,
|
|
0xfe, 0x6c, 0xf5, 0x15, 0xa3, 0x86, 0x27, 0x58,
|
|
0x46, 0x00, 0x20, 0xcb, 0x86, 0x9a, 0x52, 0x29,
|
|
0x20, 0x68, 0x4d, 0x67, 0x88, 0x70, 0xc2, 0x31,
|
|
0xd8, 0xbb, 0xa5, 0xa7, 0x88, 0x7f, 0x66, 0xbc,
|
|
0xaa, 0x0f, 0xe1, 0x78, 0x7b, 0x97, 0x3c, 0xb7,
|
|
0xd7, 0xd8, 0x04, 0xe0, 0x09, 0x60, 0xc8, 0xd0,
|
|
0x9e, 0xe5, 0x6b, 0x31, 0x7f, 0x88, 0xfe, 0xc3,
|
|
0xfd, 0x89, 0xec, 0x76, 0x4b, 0xb3, 0xa7, 0x37,
|
|
0x03, 0xb7, 0xc6, 0x10, 0x7c, 0x9d, 0x0c, 0x75,
|
|
0xd3, 0x08, 0x14, 0x94, 0x03, 0x42, 0x25, 0x26,
|
|
0x85, 0xf7, 0xf0, 0x90, 0x06, 0x3e, 0x6f, 0x60,
|
|
0x52, 0x55, 0xd5, 0x0f, 0x79, 0x64, 0x69, 0x69,
|
|
0x46, 0xf9, 0x7f, 0x7f, 0x03, 0xf1, 0x1f, 0xdb,
|
|
0x39, 0x05, 0xba, 0x4a, 0x8f, 0x17, 0xe7, 0xba,
|
|
0xe2, 0x07, 0x7c, 0x1d, 0x9e, 0xbc, 0x94, 0xc0,
|
|
0x61, 0x59, 0x8e, 0x72, 0xaf, 0xfc, 0x99, 0xe4,
|
|
0xd5, 0xa8, 0xee, 0x0a, 0x48, 0x2d, 0x82, 0x8b,
|
|
0x34, 0x54, 0x8a, 0xce, 0xc7, 0xfa, 0xdd, 0xba,
|
|
0x54, 0xdf, 0xb3, 0x30, 0x33, 0x73, 0x2e, 0xd5,
|
|
0x52, 0xab, 0x49, 0x91, 0x4e, 0x0a, 0xd6, 0x2f,
|
|
0x67, 0xe4, 0xdd, 0x64, 0x48, 0x16, 0xd9, 0x85,
|
|
0xaa, 0x52, 0xa5, 0x0b, 0xd3, 0xb4, 0x2d, 0x77,
|
|
0x5e, 0x52, 0x77, 0x17, 0xcf, 0xbe, 0x88, 0x04,
|
|
0x01, 0x52, 0xe2, 0xf1, 0x46, 0xe2, 0x91, 0x30,
|
|
0x65, 0xcf, 0xc0, 0x65, 0x45, 0xc3, 0x7e, 0xf4,
|
|
0x2e, 0xb5, 0xaf, 0x6f, 0xab, 0x1a, 0xfa, 0x70,
|
|
0x35, 0xb8, 0x4f, 0x2d, 0x78, 0x90, 0x33, 0xb5,
|
|
0x9a, 0x67, 0xdb, 0x2f, 0x28, 0x32, 0xb6, 0x54,
|
|
0xab, 0x4c, 0x6b, 0x85, 0xed, 0x6c, 0x3e, 0x05,
|
|
0x2a, 0xc7, 0x32, 0xe8, 0xf5, 0xa3, 0x7b, 0x4e,
|
|
0x7b, 0x58, 0x24, 0x73, 0xf7, 0xfd, 0xc7, 0xc8,
|
|
0x6c, 0x71, 0x68, 0xb1, 0xf6, 0xc5, 0x9e, 0x1e,
|
|
0xe3, 0x5c, 0x25, 0xc0, 0x5b, 0x3e, 0x59, 0xa1,
|
|
0x18, 0x5a, 0xe8, 0xb5, 0xd1, 0x44, 0x13, 0xa3,
|
|
0xe6, 0x05, 0x76, 0xd2, 0x8d, 0x6e, 0x54, 0x68,
|
|
0x0c, 0xa4, 0x7b, 0x8b, 0xd3, 0x8c, 0x42, 0x13,
|
|
0x87, 0xda, 0xdf, 0x8f, 0xa5, 0x83, 0x7a, 0x42,
|
|
0x99, 0xb7, 0xeb, 0xe2, 0x79, 0xe0, 0xdb, 0xda,
|
|
0x33, 0xa8, 0x50, 0x3a, 0xd7, 0xe7, 0xd3, 0x61,
|
|
0x18, 0xb8, 0xaa, 0x2d, 0xc8, 0xd8, 0x2c, 0x28,
|
|
0xe5, 0x97, 0x0a, 0x7c, 0x6c, 0x7f, 0x09, 0xd7,
|
|
0x88, 0x80, 0xac, 0x12, 0xed, 0xf8, 0xc6, 0xb5,
|
|
0x2d, 0xd6, 0x63, 0x9b, 0x98, 0x35, 0x26, 0xde,
|
|
0xf6, 0x31, 0xee, 0x7e, 0xa0, 0xfb, 0x16, 0x98,
|
|
0xb1, 0x96, 0x1d, 0xee, 0xe3, 0x2f, 0xfb, 0x41,
|
|
0xdd, 0xea, 0x10, 0x1e, 0x03, 0x89, 0x18, 0xd2,
|
|
0x47, 0x0c, 0xa0, 0x57, 0xda, 0x76, 0x3a, 0x37,
|
|
0x2c, 0xe4, 0xf9, 0x77, 0xc8, 0x43, 0x5f, 0xcb,
|
|
0xd6, 0x85, 0xf7, 0x22, 0xe4, 0x32, 0x25, 0xa8,
|
|
0xdc, 0x21, 0xc0, 0xf5, 0x95, 0xb2, 0xf8, 0x83,
|
|
0xf0, 0x65, 0x61, 0x15, 0x48, 0x94, 0xb7, 0x03,
|
|
0x7f, 0x66, 0xa1, 0x39, 0x1f, 0xdd, 0xce, 0x96,
|
|
0xfe, 0x58, 0x81, 0x3d, 0x41, 0x11, 0x87, 0x13,
|
|
0x26, 0x1b, 0x6d, 0xf3, 0xca, 0x2e, 0x2c, 0x76,
|
|
0xd3, 0x2f, 0x6d, 0x49, 0x70, 0x53, 0x05, 0x96,
|
|
0xcc, 0x30, 0x2b, 0x83, 0xf2, 0xc6, 0xb2, 0x4b,
|
|
0x22, 0x13, 0x95, 0x42, 0xeb, 0x56, 0x4d, 0x22,
|
|
0xe6, 0x43, 0x6f, 0xba, 0xe7, 0x3b, 0xe5, 0x59,
|
|
0xce, 0x57, 0x88, 0x85, 0xb6, 0xbf, 0x15, 0x37,
|
|
0xb3, 0x7a, 0x7e, 0xc4, 0xbc, 0x99, 0xfc, 0xe4,
|
|
0x89, 0x00, 0x68, 0x39, 0xbc, 0x5a, 0xba, 0xab,
|
|
0x52, 0xab, 0xe6, 0x81, 0xfd, 0x93, 0x62, 0xe9,
|
|
0xb7, 0x12, 0xd1, 0x18, 0x1a, 0xb9, 0x55, 0x4a,
|
|
0x0f, 0xae, 0x35, 0x11, 0x04, 0x27, 0xf3, 0x42,
|
|
0x4e, 0xca, 0xdf, 0x9f, 0x12, 0x62, 0xea, 0x03,
|
|
0xc0, 0xa9, 0x22, 0x7b, 0x6c, 0x6c, 0xe3, 0xdf,
|
|
0x16, 0xad, 0x03, 0xc9, 0xfe, 0xa4, 0xdd, 0x4f
|
|
};
|
|
|
|
static const uint8_t AES_CBC_ciphertext_1792B[] = {
|
|
0x59, 0xcc, 0xfe, 0x8f, 0xb4, 0x9d, 0x0e, 0xd1,
|
|
0x85, 0xfc, 0x9b, 0x43, 0xc1, 0xb7, 0x54, 0x67,
|
|
0x01, 0xef, 0xb8, 0x71, 0x36, 0xdb, 0x50, 0x48,
|
|
0x7a, 0xea, 0xcf, 0xce, 0xba, 0x30, 0x10, 0x2e,
|
|
0x96, 0x2b, 0xfd, 0xcf, 0x00, 0xe3, 0x1f, 0xac,
|
|
0x66, 0x14, 0x30, 0x86, 0x49, 0xdb, 0x01, 0x8b,
|
|
0x07, 0xdd, 0x00, 0x9d, 0x0d, 0x5c, 0x19, 0x11,
|
|
0xe8, 0x44, 0x2b, 0x25, 0x70, 0xed, 0x7c, 0x33,
|
|
0x0d, 0xe3, 0x34, 0x93, 0x63, 0xad, 0x26, 0xb1,
|
|
0x11, 0x91, 0x34, 0x2e, 0x1d, 0x50, 0xaa, 0xd4,
|
|
0xef, 0x3a, 0x6d, 0xd7, 0x33, 0x20, 0x0d, 0x3f,
|
|
0x9b, 0xdd, 0xc3, 0xa5, 0xc5, 0xf1, 0x99, 0xdc,
|
|
0xea, 0x52, 0xda, 0x55, 0xea, 0xa2, 0x7a, 0xc5,
|
|
0x78, 0x44, 0x4a, 0x02, 0x33, 0x19, 0x62, 0x37,
|
|
0xf8, 0x8b, 0xd1, 0x0c, 0x21, 0xdf, 0x40, 0x19,
|
|
0x81, 0xea, 0xfb, 0x1c, 0xa7, 0xcc, 0x60, 0xfe,
|
|
0x63, 0x25, 0x8f, 0xf3, 0x73, 0x0f, 0x45, 0xe6,
|
|
0x6a, 0x18, 0xbf, 0xbe, 0xad, 0x92, 0x2a, 0x1e,
|
|
0x15, 0x65, 0x6f, 0xef, 0x92, 0xcd, 0x0e, 0x19,
|
|
0x3d, 0x42, 0xa8, 0xfc, 0x0d, 0x32, 0x58, 0xe0,
|
|
0x56, 0x9f, 0xd6, 0x9b, 0x8b, 0xec, 0xe0, 0x45,
|
|
0x4d, 0x7e, 0x73, 0x87, 0xff, 0x74, 0x92, 0x59,
|
|
0x60, 0x13, 0x93, 0xda, 0xec, 0xbf, 0xfa, 0x20,
|
|
0xb6, 0xe7, 0xdf, 0xc7, 0x10, 0xf5, 0x79, 0xb4,
|
|
0xd7, 0xac, 0xaf, 0x2b, 0x37, 0x52, 0x30, 0x1d,
|
|
0xbe, 0x0f, 0x60, 0x77, 0x3d, 0x03, 0x63, 0xa9,
|
|
0xae, 0xb1, 0xf3, 0xca, 0xca, 0xb4, 0x21, 0xd7,
|
|
0x6f, 0x2e, 0x5e, 0x9b, 0x68, 0x53, 0x80, 0xab,
|
|
0x30, 0x23, 0x0a, 0x72, 0x6b, 0xb1, 0xd8, 0x25,
|
|
0x5d, 0x3a, 0x62, 0x9b, 0x4f, 0x59, 0x3b, 0x79,
|
|
0xa8, 0x9e, 0x08, 0x6d, 0x37, 0xb0, 0xfc, 0x42,
|
|
0x51, 0x25, 0x86, 0xbd, 0x54, 0x5a, 0x95, 0x20,
|
|
0x6c, 0xac, 0xb9, 0x30, 0x1c, 0x03, 0xc9, 0x49,
|
|
0x38, 0x55, 0x31, 0x49, 0xed, 0xa9, 0x0e, 0xc3,
|
|
0x65, 0xb4, 0x68, 0x6b, 0x07, 0x4c, 0x0a, 0xf9,
|
|
0x21, 0x69, 0x7c, 0x9f, 0x28, 0x80, 0xe9, 0x49,
|
|
0x22, 0x7c, 0xec, 0x97, 0xf7, 0x70, 0xb4, 0xb8,
|
|
0x25, 0xe7, 0x80, 0x2c, 0x43, 0x24, 0x8a, 0x2e,
|
|
0xac, 0xa2, 0x84, 0x20, 0xe7, 0xf4, 0x6b, 0x86,
|
|
0x37, 0x05, 0xc7, 0x59, 0x04, 0x49, 0x2a, 0x99,
|
|
0x80, 0x46, 0x32, 0x19, 0xe6, 0x30, 0xce, 0xc0,
|
|
0xef, 0x6e, 0xec, 0xe5, 0x2f, 0x24, 0xc1, 0x78,
|
|
0x45, 0x02, 0xd3, 0x64, 0x99, 0xf5, 0xc7, 0xbc,
|
|
0x8f, 0x8c, 0x75, 0xb1, 0x0a, 0xc8, 0xc3, 0xbd,
|
|
0x5e, 0x7e, 0xbd, 0x0e, 0xdf, 0x4b, 0x96, 0x6a,
|
|
0xfd, 0x03, 0xdb, 0xd1, 0x31, 0x1e, 0x27, 0xf9,
|
|
0xe5, 0x83, 0x9a, 0xfc, 0x13, 0x4c, 0xd3, 0x04,
|
|
0xdb, 0xdb, 0x3f, 0x35, 0x93, 0x4e, 0x14, 0x6b,
|
|
0x00, 0x5c, 0xb6, 0x11, 0x50, 0xee, 0x61, 0x5c,
|
|
0x10, 0x5c, 0xd0, 0x90, 0x02, 0x2e, 0x12, 0xe0,
|
|
0x50, 0x44, 0xad, 0x75, 0xcd, 0x94, 0xcf, 0x92,
|
|
0xcb, 0xe3, 0xe8, 0x77, 0x4b, 0xd7, 0x1a, 0x7c,
|
|
0xdd, 0x6b, 0x49, 0x21, 0x7c, 0xe8, 0x2c, 0x25,
|
|
0x49, 0x86, 0x1e, 0x54, 0xae, 0xfc, 0x0e, 0x80,
|
|
0xb1, 0xd5, 0xa5, 0x23, 0xcf, 0xcc, 0x0e, 0x11,
|
|
0xe2, 0x7c, 0x3c, 0x25, 0x78, 0x64, 0x03, 0xa1,
|
|
0xdd, 0x9f, 0x74, 0x12, 0x7b, 0x21, 0xb5, 0x73,
|
|
0x15, 0x3c, 0xed, 0xad, 0x07, 0x62, 0x21, 0x79,
|
|
0xd4, 0x2f, 0x0d, 0x72, 0xe9, 0x7c, 0x6b, 0x96,
|
|
0x6e, 0xe5, 0x36, 0x4a, 0xd2, 0x38, 0xe1, 0xff,
|
|
0x6e, 0x26, 0xa4, 0xac, 0x83, 0x07, 0xe6, 0x67,
|
|
0x74, 0x6c, 0xec, 0x8b, 0x4b, 0x79, 0x33, 0x50,
|
|
0x2f, 0x8f, 0xa0, 0x8f, 0xfa, 0x38, 0x6a, 0xa2,
|
|
0x3a, 0x42, 0x85, 0x15, 0x90, 0xd0, 0xb3, 0x0d,
|
|
0x8a, 0xe4, 0x60, 0x03, 0xef, 0xf9, 0x65, 0x8a,
|
|
0x4e, 0x50, 0x8c, 0x65, 0xba, 0x61, 0x16, 0xc3,
|
|
0x93, 0xb7, 0x75, 0x21, 0x98, 0x25, 0x60, 0x6e,
|
|
0x3d, 0x68, 0xba, 0x7c, 0xe4, 0xf3, 0xd9, 0x9b,
|
|
0xfb, 0x7a, 0xed, 0x1f, 0xb3, 0x4b, 0x88, 0x74,
|
|
0x2c, 0xb8, 0x8c, 0x22, 0x95, 0xce, 0x90, 0xf1,
|
|
0xdb, 0x80, 0xa6, 0x39, 0xae, 0x82, 0xa1, 0xef,
|
|
0x75, 0xec, 0xfe, 0xf1, 0xe8, 0x04, 0xfd, 0x99,
|
|
0x1b, 0x5f, 0x45, 0x87, 0x4f, 0xfa, 0xa2, 0x3e,
|
|
0x3e, 0xb5, 0x01, 0x4b, 0x46, 0xeb, 0x13, 0x9a,
|
|
0xe4, 0x7d, 0x03, 0x87, 0xb1, 0x59, 0x91, 0x8e,
|
|
0x37, 0xd3, 0x16, 0xce, 0xef, 0x4b, 0xe9, 0x46,
|
|
0x8d, 0x2a, 0x50, 0x2f, 0x41, 0xd3, 0x7b, 0xcf,
|
|
0xf0, 0xb7, 0x8b, 0x65, 0x0f, 0xa3, 0x27, 0x10,
|
|
0xe9, 0xa9, 0xe9, 0x2c, 0xbe, 0xbb, 0x82, 0xe3,
|
|
0x7b, 0x0b, 0x81, 0x3e, 0xa4, 0x6a, 0x4f, 0x3b,
|
|
0xd5, 0x61, 0xf8, 0x47, 0x04, 0x99, 0x5b, 0xff,
|
|
0xf3, 0x14, 0x6e, 0x57, 0x5b, 0xbf, 0x1b, 0xb4,
|
|
0x3f, 0xf9, 0x31, 0xf6, 0x95, 0xd5, 0x10, 0xa9,
|
|
0x72, 0x28, 0x23, 0xa9, 0x6a, 0xa2, 0xcf, 0x7d,
|
|
0xe3, 0x18, 0x95, 0xda, 0xbc, 0x6f, 0xe9, 0xd8,
|
|
0xef, 0x49, 0x3f, 0xd3, 0xef, 0x1f, 0xe1, 0x50,
|
|
0xe8, 0x8a, 0xc0, 0xce, 0xcc, 0xb7, 0x5e, 0x0e,
|
|
0x8b, 0x95, 0x80, 0xfd, 0x58, 0x2a, 0x9b, 0xc8,
|
|
0xb4, 0x17, 0x04, 0x46, 0x74, 0xd4, 0x68, 0x91,
|
|
0x33, 0xc8, 0x31, 0x15, 0x84, 0x16, 0x35, 0x03,
|
|
0x64, 0x6d, 0xa9, 0x4e, 0x20, 0xeb, 0xa9, 0x3f,
|
|
0x21, 0x5e, 0x9b, 0x09, 0xc3, 0x45, 0xf8, 0x7c,
|
|
0x59, 0x62, 0x29, 0x9a, 0x5c, 0xcf, 0xb4, 0x27,
|
|
0x5e, 0x13, 0xea, 0xb3, 0xef, 0xd9, 0x01, 0x2a,
|
|
0x65, 0x5f, 0x14, 0xf4, 0xbf, 0x28, 0x89, 0x3d,
|
|
0xdd, 0x9d, 0x52, 0xbd, 0x9e, 0x5b, 0x3b, 0xd2,
|
|
0xc2, 0x81, 0x35, 0xb6, 0xac, 0xdd, 0x27, 0xc3,
|
|
0x7b, 0x01, 0x5a, 0x6d, 0x4c, 0x5e, 0x2c, 0x30,
|
|
0xcb, 0x3a, 0xfa, 0xc1, 0xd7, 0x31, 0x67, 0x3e,
|
|
0x08, 0x6a, 0xe8, 0x8c, 0x75, 0xac, 0x1a, 0x6a,
|
|
0x52, 0xf7, 0x51, 0xcd, 0x85, 0x3f, 0x3c, 0xa7,
|
|
0xea, 0xbc, 0xd7, 0x18, 0x9e, 0x27, 0x73, 0xe6,
|
|
0x2b, 0x58, 0xb6, 0xd2, 0x29, 0x68, 0xd5, 0x8f,
|
|
0x00, 0x4d, 0x55, 0xf6, 0x61, 0x5a, 0xcc, 0x51,
|
|
0xa6, 0x5e, 0x85, 0xcb, 0x0b, 0xfd, 0x06, 0xca,
|
|
0xf5, 0xbf, 0x0d, 0x13, 0x74, 0x78, 0x6d, 0x9e,
|
|
0x20, 0x11, 0x84, 0x3e, 0x78, 0x17, 0x04, 0x4f,
|
|
0x64, 0x2c, 0x3b, 0x3e, 0x93, 0x7b, 0x58, 0x33,
|
|
0x07, 0x52, 0xf7, 0x60, 0x6a, 0xa8, 0x3b, 0x19,
|
|
0x27, 0x7a, 0x93, 0xc5, 0x53, 0xad, 0xec, 0xf6,
|
|
0xc8, 0x94, 0xee, 0x92, 0xea, 0xee, 0x7e, 0xea,
|
|
0xb9, 0x5f, 0xac, 0x59, 0x5d, 0x2e, 0x78, 0x53,
|
|
0x72, 0x81, 0x92, 0xdd, 0x1c, 0x63, 0xbe, 0x02,
|
|
0xeb, 0xa8, 0x1b, 0x2a, 0x6e, 0x72, 0xe3, 0x2d,
|
|
0x84, 0x0d, 0x8a, 0x22, 0xf6, 0xba, 0xab, 0x04,
|
|
0x8e, 0x04, 0x24, 0xdb, 0xcc, 0xe2, 0x69, 0xeb,
|
|
0x4e, 0xfa, 0x6b, 0x5b, 0xc8, 0xc0, 0xd9, 0x25,
|
|
0xcb, 0x40, 0x8d, 0x4b, 0x8e, 0xa0, 0xd4, 0x72,
|
|
0x98, 0x36, 0x46, 0x3b, 0x4f, 0x5f, 0x96, 0x84,
|
|
0x03, 0x28, 0x86, 0x4d, 0xa1, 0x8a, 0xd7, 0xb2,
|
|
0x5b, 0x27, 0x01, 0x80, 0x62, 0x49, 0x56, 0xb9,
|
|
0xa0, 0xa1, 0xe3, 0x6e, 0x22, 0x2a, 0x5d, 0x03,
|
|
0x86, 0x40, 0x36, 0x22, 0x5e, 0xd2, 0xe5, 0xc0,
|
|
0x6b, 0xfa, 0xac, 0x80, 0x4e, 0x09, 0x99, 0xbc,
|
|
0x2f, 0x9b, 0xcc, 0xf3, 0x4e, 0xf7, 0x99, 0x98,
|
|
0x11, 0x6e, 0x6f, 0x62, 0x22, 0x6b, 0x92, 0x95,
|
|
0x3b, 0xc3, 0xd2, 0x8e, 0x0f, 0x07, 0xc2, 0x51,
|
|
0x5c, 0x4d, 0xb2, 0x6e, 0xc0, 0x27, 0x73, 0xcd,
|
|
0x57, 0xb7, 0xf0, 0xe9, 0x2e, 0xc8, 0xe2, 0x0c,
|
|
0xd1, 0xb5, 0x0f, 0xff, 0xf9, 0xec, 0x38, 0xba,
|
|
0x97, 0xd6, 0x94, 0x9b, 0xd1, 0x79, 0xb6, 0x6a,
|
|
0x01, 0x17, 0xe4, 0x7e, 0xa6, 0xd5, 0x86, 0x19,
|
|
0xae, 0xf3, 0xf0, 0x62, 0x73, 0xc0, 0xf0, 0x0a,
|
|
0x7a, 0x96, 0x93, 0x72, 0x89, 0x7e, 0x25, 0x57,
|
|
0xf8, 0xf7, 0xd5, 0x1e, 0xe5, 0xac, 0xd6, 0x38,
|
|
0x4f, 0xe8, 0x81, 0xd1, 0x53, 0x41, 0x07, 0x2d,
|
|
0x58, 0x34, 0x1c, 0xef, 0x74, 0x2e, 0x61, 0xca,
|
|
0xd3, 0xeb, 0xd6, 0x93, 0x0a, 0xf2, 0xf2, 0x86,
|
|
0x9c, 0xe3, 0x7a, 0x52, 0xf5, 0x42, 0xf1, 0x8b,
|
|
0x10, 0xf2, 0x25, 0x68, 0x7e, 0x61, 0xb1, 0x19,
|
|
0xcf, 0x8f, 0x5a, 0x53, 0xb7, 0x68, 0x4f, 0x1a,
|
|
0x71, 0xe9, 0x83, 0x91, 0x3a, 0x78, 0x0f, 0xf7,
|
|
0xd4, 0x74, 0xf5, 0x06, 0xd2, 0x88, 0xb0, 0x06,
|
|
0xe5, 0xc0, 0xfb, 0xb3, 0x91, 0xad, 0xc0, 0x84,
|
|
0x31, 0xf2, 0x3a, 0xcf, 0x63, 0xe6, 0x4a, 0xd3,
|
|
0x78, 0xbe, 0xde, 0x73, 0x3e, 0x02, 0x8e, 0xb8,
|
|
0x3a, 0xf6, 0x55, 0xa7, 0xf8, 0x5a, 0xb5, 0x0e,
|
|
0x0c, 0xc5, 0xe5, 0x66, 0xd5, 0xd2, 0x18, 0xf3,
|
|
0xef, 0xa5, 0xc9, 0x68, 0x69, 0xe0, 0xcd, 0x00,
|
|
0x33, 0x99, 0x6e, 0xea, 0xcb, 0x06, 0x7a, 0xe1,
|
|
0xe1, 0x19, 0x0b, 0xe7, 0x08, 0xcd, 0x09, 0x1b,
|
|
0x85, 0xec, 0xc4, 0xd4, 0x75, 0xf0, 0xd6, 0xfb,
|
|
0x84, 0x95, 0x07, 0x44, 0xca, 0xa5, 0x2a, 0x6c,
|
|
0xc2, 0x00, 0x58, 0x08, 0x87, 0x9e, 0x0a, 0xd4,
|
|
0x06, 0xe2, 0x91, 0x5f, 0xb7, 0x1b, 0x11, 0xfa,
|
|
0x85, 0xfc, 0x7c, 0xf2, 0x0f, 0x6e, 0x3c, 0x8a,
|
|
0xe1, 0x0f, 0xa0, 0x33, 0x84, 0xce, 0x81, 0x4d,
|
|
0x32, 0x4d, 0xeb, 0x41, 0xcf, 0x5a, 0x05, 0x60,
|
|
0x47, 0x6c, 0x2a, 0xc4, 0x17, 0xd5, 0x16, 0x3a,
|
|
0xe4, 0xe7, 0xab, 0x84, 0x94, 0x22, 0xff, 0x56,
|
|
0xb0, 0x0c, 0x92, 0x6c, 0x19, 0x11, 0x4c, 0xb3,
|
|
0xed, 0x58, 0x48, 0x84, 0x2a, 0xe2, 0x19, 0x2a,
|
|
0xe1, 0xc0, 0x56, 0x82, 0x3c, 0x83, 0xb4, 0x58,
|
|
0x2d, 0xf0, 0xb5, 0x1e, 0x76, 0x85, 0x51, 0xc2,
|
|
0xe4, 0x95, 0x27, 0x96, 0xd1, 0x90, 0xc3, 0x17,
|
|
0x75, 0xa1, 0xbb, 0x46, 0x5f, 0xa6, 0xf2, 0xef,
|
|
0x71, 0x56, 0x92, 0xc5, 0x8a, 0x85, 0x52, 0xe4,
|
|
0x63, 0x21, 0x6f, 0x55, 0x85, 0x2b, 0x6b, 0x0d,
|
|
0xc9, 0x92, 0x77, 0x67, 0xe3, 0xff, 0x2a, 0x2b,
|
|
0x90, 0x01, 0x3d, 0x74, 0x63, 0x04, 0x61, 0x3c,
|
|
0x8e, 0xf8, 0xfc, 0x04, 0xdd, 0x21, 0x85, 0x92,
|
|
0x1e, 0x4d, 0x51, 0x8d, 0xb5, 0x6b, 0xf1, 0xda,
|
|
0x96, 0xf5, 0x8e, 0x3c, 0x38, 0x5a, 0xac, 0x9b,
|
|
0xba, 0x0c, 0x84, 0x5d, 0x50, 0x12, 0xc7, 0xc5,
|
|
0x7a, 0xcb, 0xb1, 0xfa, 0x16, 0x93, 0xdf, 0x98,
|
|
0xda, 0x3f, 0x49, 0xa3, 0x94, 0x78, 0x70, 0xc7,
|
|
0x0b, 0xb6, 0x91, 0xa6, 0x16, 0x2e, 0xcf, 0xfd,
|
|
0x51, 0x6a, 0x5b, 0xad, 0x7a, 0xdd, 0xa9, 0x48,
|
|
0x48, 0xac, 0xd6, 0x45, 0xbc, 0x23, 0x31, 0x1d,
|
|
0x86, 0x54, 0x8a, 0x7f, 0x04, 0x97, 0x71, 0x9e,
|
|
0xbc, 0x2e, 0x6b, 0xd9, 0x33, 0xc8, 0x20, 0xc9,
|
|
0xe0, 0x25, 0x86, 0x59, 0x15, 0xcf, 0x63, 0xe5,
|
|
0x99, 0xf1, 0x24, 0xf1, 0xba, 0xc4, 0x15, 0x02,
|
|
0xe2, 0xdb, 0xfe, 0x4a, 0xf8, 0x3b, 0x91, 0x13,
|
|
0x8d, 0x03, 0x81, 0x9f, 0xb3, 0x3f, 0x04, 0x03,
|
|
0x58, 0xc0, 0xef, 0x27, 0x82, 0x14, 0xd2, 0x7f,
|
|
0x93, 0x70, 0xb7, 0xb2, 0x02, 0x21, 0xb3, 0x07,
|
|
0x7f, 0x1c, 0xef, 0x88, 0xee, 0x29, 0x7a, 0x0b,
|
|
0x3d, 0x75, 0x5a, 0x93, 0xfe, 0x7f, 0x14, 0xf7,
|
|
0x4e, 0x4b, 0x7f, 0x21, 0x02, 0xad, 0xf9, 0x43,
|
|
0x29, 0x1a, 0xe8, 0x1b, 0xf5, 0x32, 0xb2, 0x96,
|
|
0xe6, 0xe8, 0x96, 0x20, 0x9b, 0x96, 0x8e, 0x7b,
|
|
0xfe, 0xd8, 0xc9, 0x9c, 0x65, 0x16, 0xd6, 0x68,
|
|
0x95, 0xf8, 0x22, 0xe2, 0xae, 0x84, 0x03, 0xfd,
|
|
0x87, 0xa2, 0x72, 0x79, 0x74, 0x95, 0xfa, 0xe1,
|
|
0xfe, 0xd0, 0x4e, 0x3d, 0x39, 0x2e, 0x67, 0x55,
|
|
0x71, 0x6c, 0x89, 0x33, 0x49, 0x0c, 0x1b, 0x46,
|
|
0x92, 0x31, 0x6f, 0xa6, 0xf0, 0x09, 0xbd, 0x2d,
|
|
0xe2, 0xca, 0xda, 0x18, 0x33, 0xce, 0x67, 0x37,
|
|
0xfd, 0x6f, 0xcb, 0x9d, 0xbd, 0x42, 0xbc, 0xb2,
|
|
0x9c, 0x28, 0xcd, 0x65, 0x3c, 0x61, 0xbc, 0xde,
|
|
0x9d, 0xe1, 0x2a, 0x3e, 0xbf, 0xee, 0x3c, 0xcb,
|
|
0xb1, 0x50, 0xa9, 0x2c, 0xbe, 0xb5, 0x43, 0xd0,
|
|
0xec, 0x29, 0xf9, 0x16, 0x6f, 0x31, 0xd9, 0x9b,
|
|
0x92, 0xb1, 0x32, 0xae, 0x0f, 0xb6, 0x9d, 0x0e,
|
|
0x25, 0x7f, 0x89, 0x1f, 0x1d, 0x01, 0x68, 0xab,
|
|
0x3d, 0xd1, 0x74, 0x5b, 0x4c, 0x38, 0x7f, 0x3d,
|
|
0x33, 0xa5, 0xa2, 0x9f, 0xda, 0x84, 0xa5, 0x82,
|
|
0x2d, 0x16, 0x66, 0x46, 0x08, 0x30, 0x14, 0x48,
|
|
0x5e, 0xca, 0xe3, 0xf4, 0x8c, 0xcb, 0x32, 0xc6,
|
|
0xf1, 0x43, 0x62, 0xc6, 0xef, 0x16, 0xfa, 0x43,
|
|
0xae, 0x9c, 0x53, 0xe3, 0x49, 0x45, 0x80, 0xfd,
|
|
0x1d, 0x8c, 0xa9, 0x6d, 0x77, 0x76, 0xaa, 0x40,
|
|
0xc4, 0x4e, 0x7b, 0x78, 0x6b, 0xe0, 0x1d, 0xce,
|
|
0x56, 0x3d, 0xf0, 0x11, 0xfe, 0x4f, 0x6a, 0x6d,
|
|
0x0f, 0x4f, 0x90, 0x38, 0x92, 0x17, 0xfa, 0x56,
|
|
0x12, 0xa6, 0xa1, 0x0a, 0xea, 0x2f, 0x50, 0xf9,
|
|
0x60, 0x66, 0x6c, 0x7d, 0x5a, 0x08, 0x8e, 0x3c,
|
|
0xf3, 0xf0, 0x33, 0x02, 0x11, 0x02, 0xfe, 0x4c,
|
|
0x56, 0x2b, 0x9f, 0x0c, 0xbd, 0x65, 0x8a, 0x83,
|
|
0xde, 0x7c, 0x05, 0x26, 0x93, 0x19, 0xcc, 0xf3,
|
|
0x71, 0x0e, 0xad, 0x2f, 0xb3, 0xc9, 0x38, 0x50,
|
|
0x64, 0xd5, 0x4c, 0x60, 0x5f, 0x02, 0x13, 0x34,
|
|
0xc9, 0x75, 0xc4, 0x60, 0xab, 0x2e, 0x17, 0x7d
|
|
};
|
|
|
|
static const uint8_t AES_CBC_ciphertext_2048B[] = {
|
|
0x8b, 0x55, 0xbd, 0xfd, 0x2b, 0x35, 0x76, 0x5c,
|
|
0xd1, 0x90, 0xd7, 0x6a, 0x63, 0x1e, 0x39, 0x71,
|
|
0x0d, 0x5c, 0xd8, 0x03, 0x00, 0x75, 0xf1, 0x07,
|
|
0x03, 0x8d, 0x76, 0xeb, 0x3b, 0x00, 0x1e, 0x33,
|
|
0x88, 0xfc, 0x8f, 0x08, 0x4d, 0x33, 0xf1, 0x3c,
|
|
0xee, 0xd0, 0x5d, 0x19, 0x8b, 0x3c, 0x50, 0x86,
|
|
0xfd, 0x8d, 0x58, 0x21, 0xb4, 0xae, 0x0f, 0x81,
|
|
0xe9, 0x9f, 0xc9, 0xc0, 0x90, 0xf7, 0x04, 0x6f,
|
|
0x39, 0x1d, 0x8a, 0x3f, 0x8d, 0x32, 0x23, 0xb5,
|
|
0x1f, 0xcc, 0x8a, 0x12, 0x2d, 0x46, 0x82, 0x5e,
|
|
0x6a, 0x34, 0x8c, 0xb1, 0x93, 0x70, 0x3b, 0xde,
|
|
0x55, 0xaf, 0x16, 0x35, 0x99, 0x84, 0xd5, 0x88,
|
|
0xc9, 0x54, 0xb1, 0xb2, 0xd3, 0xeb, 0x9e, 0x55,
|
|
0x9a, 0xa9, 0xa7, 0xf5, 0xda, 0x29, 0xcf, 0xe1,
|
|
0x98, 0x64, 0x45, 0x77, 0xf2, 0x12, 0x69, 0x8f,
|
|
0x78, 0xd8, 0x82, 0x41, 0xb2, 0x9f, 0xe2, 0x1c,
|
|
0x63, 0x9b, 0x24, 0x81, 0x67, 0x95, 0xa2, 0xff,
|
|
0x26, 0x9d, 0x65, 0x48, 0x61, 0x30, 0x66, 0x41,
|
|
0x68, 0x84, 0xbb, 0x59, 0x14, 0x8e, 0x9a, 0x62,
|
|
0xb6, 0xca, 0xda, 0xbe, 0x7c, 0x41, 0x52, 0x6e,
|
|
0x1b, 0x86, 0xbf, 0x08, 0xeb, 0x37, 0x84, 0x60,
|
|
0xe4, 0xc4, 0x1e, 0xa8, 0x4c, 0x84, 0x60, 0x2f,
|
|
0x70, 0x90, 0xf2, 0x26, 0xe7, 0x65, 0x0c, 0xc4,
|
|
0x58, 0x36, 0x8e, 0x4d, 0xdf, 0xff, 0x9a, 0x39,
|
|
0x93, 0x01, 0xcf, 0x6f, 0x6d, 0xde, 0xef, 0x79,
|
|
0xb0, 0xce, 0xe2, 0x98, 0xdb, 0x85, 0x8d, 0x62,
|
|
0x9d, 0xb9, 0x63, 0xfd, 0xf0, 0x35, 0xb5, 0xa9,
|
|
0x1b, 0xf9, 0xe5, 0xd4, 0x2e, 0x22, 0x2d, 0xcc,
|
|
0x42, 0xbf, 0x0e, 0x51, 0xf7, 0x15, 0x07, 0x32,
|
|
0x75, 0x5b, 0x74, 0xbb, 0x00, 0xef, 0xd4, 0x66,
|
|
0x8b, 0xad, 0x71, 0x53, 0x94, 0xd7, 0x7d, 0x2c,
|
|
0x40, 0x3e, 0x69, 0xa0, 0x4c, 0x86, 0x5e, 0x06,
|
|
0xed, 0xdf, 0x22, 0xe2, 0x24, 0x25, 0x4e, 0x9b,
|
|
0x5f, 0x49, 0x74, 0xba, 0xed, 0xb1, 0xa6, 0xeb,
|
|
0xae, 0x3f, 0xc6, 0x9e, 0x0b, 0x29, 0x28, 0x9a,
|
|
0xb6, 0xb2, 0x74, 0x58, 0xec, 0xa6, 0x4a, 0xed,
|
|
0xe5, 0x10, 0x00, 0x85, 0xe1, 0x63, 0x41, 0x61,
|
|
0x30, 0x7c, 0x97, 0xcf, 0x75, 0xcf, 0xb6, 0xf3,
|
|
0xf7, 0xda, 0x35, 0x3f, 0x85, 0x8c, 0x64, 0xca,
|
|
0xb7, 0xea, 0x7f, 0xe4, 0xa3, 0x4d, 0x30, 0x84,
|
|
0x8c, 0x9c, 0x80, 0x5a, 0x50, 0xa5, 0x64, 0xae,
|
|
0x26, 0xd3, 0xb5, 0x01, 0x73, 0x36, 0x8a, 0x92,
|
|
0x49, 0xc4, 0x1a, 0x94, 0x81, 0x9d, 0xf5, 0x6c,
|
|
0x50, 0xe1, 0x58, 0x0b, 0x75, 0xdd, 0x6b, 0x6a,
|
|
0xca, 0x69, 0xea, 0xc3, 0x33, 0x90, 0x9f, 0x3b,
|
|
0x65, 0x5d, 0x5e, 0xee, 0x31, 0xb7, 0x32, 0xfd,
|
|
0x56, 0x83, 0xb6, 0xfb, 0xa8, 0x04, 0xfc, 0x1e,
|
|
0x11, 0xfb, 0x02, 0x23, 0x53, 0x49, 0x45, 0xb1,
|
|
0x07, 0xfc, 0xba, 0xe7, 0x5f, 0x5d, 0x2d, 0x7f,
|
|
0x9e, 0x46, 0xba, 0xe9, 0xb0, 0xdb, 0x32, 0x04,
|
|
0xa4, 0xa7, 0x98, 0xab, 0x91, 0xcd, 0x02, 0x05,
|
|
0xf5, 0x74, 0x31, 0x98, 0x83, 0x3d, 0x33, 0x11,
|
|
0x0e, 0xe3, 0x8d, 0xa8, 0xc9, 0x0e, 0xf3, 0xb9,
|
|
0x47, 0x67, 0xe9, 0x79, 0x2b, 0x34, 0xcd, 0x9b,
|
|
0x45, 0x75, 0x29, 0xf0, 0xbf, 0xcc, 0xda, 0x3a,
|
|
0x91, 0xb2, 0x15, 0x27, 0x7a, 0xe5, 0xf5, 0x6a,
|
|
0x5e, 0xbe, 0x2c, 0x98, 0xe8, 0x40, 0x96, 0x4f,
|
|
0x8a, 0x09, 0xfd, 0xf6, 0xb2, 0xe7, 0x45, 0xb6,
|
|
0x08, 0xc1, 0x69, 0xe1, 0xb3, 0xc4, 0x24, 0x34,
|
|
0x07, 0x85, 0xd5, 0xa9, 0x78, 0xca, 0xfa, 0x4b,
|
|
0x01, 0x19, 0x4d, 0x95, 0xdc, 0xa5, 0xc1, 0x9c,
|
|
0xec, 0x27, 0x5b, 0xa6, 0x54, 0x25, 0xbd, 0xc8,
|
|
0x0a, 0xb7, 0x11, 0xfb, 0x4e, 0xeb, 0x65, 0x2e,
|
|
0xe1, 0x08, 0x9c, 0x3a, 0x45, 0x44, 0x33, 0xef,
|
|
0x0d, 0xb9, 0xff, 0x3e, 0x68, 0x9c, 0x61, 0x2b,
|
|
0x11, 0xb8, 0x5c, 0x47, 0x0f, 0x94, 0xf2, 0xf8,
|
|
0x0b, 0xbb, 0x99, 0x18, 0x85, 0xa3, 0xba, 0x44,
|
|
0xf3, 0x79, 0xb3, 0x63, 0x2c, 0x1f, 0x2a, 0x35,
|
|
0x3b, 0x23, 0x98, 0xab, 0xf4, 0x16, 0x36, 0xf8,
|
|
0xde, 0x86, 0xa4, 0xd4, 0x75, 0xff, 0x51, 0xf9,
|
|
0xeb, 0x42, 0x5f, 0x55, 0xe2, 0xbe, 0xd1, 0x5b,
|
|
0xb5, 0x38, 0xeb, 0xb4, 0x4d, 0xec, 0xec, 0x99,
|
|
0xe1, 0x39, 0x43, 0xaa, 0x64, 0xf7, 0xc9, 0xd8,
|
|
0xf2, 0x9a, 0x71, 0x43, 0x39, 0x17, 0xe8, 0xa8,
|
|
0xa2, 0xe2, 0xa4, 0x2c, 0x18, 0x11, 0x49, 0xdf,
|
|
0x18, 0xdd, 0x85, 0x6e, 0x65, 0x96, 0xe2, 0xba,
|
|
0xa1, 0x0a, 0x2c, 0xca, 0xdc, 0x5f, 0xe4, 0xf4,
|
|
0x35, 0x03, 0xb2, 0xa9, 0xda, 0xcf, 0xb7, 0x6d,
|
|
0x65, 0x82, 0x82, 0x67, 0x9d, 0x0e, 0xf3, 0xe8,
|
|
0x85, 0x6c, 0x69, 0xb8, 0x4c, 0xa6, 0xc6, 0x2e,
|
|
0x40, 0xb5, 0x54, 0x28, 0x95, 0xe4, 0x57, 0xe0,
|
|
0x5b, 0xf8, 0xde, 0x59, 0xe0, 0xfd, 0x89, 0x48,
|
|
0xac, 0x56, 0x13, 0x54, 0xb9, 0x1b, 0xf5, 0x59,
|
|
0x97, 0xb6, 0xb3, 0xe8, 0xac, 0x2d, 0xfc, 0xd2,
|
|
0xea, 0x57, 0x96, 0x57, 0xa8, 0x26, 0x97, 0x2c,
|
|
0x01, 0x89, 0x56, 0xea, 0xec, 0x8c, 0x53, 0xd5,
|
|
0xd7, 0x9e, 0xc9, 0x98, 0x0b, 0xad, 0x03, 0x75,
|
|
0xa0, 0x6e, 0x98, 0x8b, 0x97, 0x8d, 0x8d, 0x85,
|
|
0x7d, 0x74, 0xa7, 0x2d, 0xde, 0x67, 0x0c, 0xcd,
|
|
0x54, 0xb8, 0x15, 0x7b, 0xeb, 0xf5, 0x84, 0xb9,
|
|
0x78, 0xab, 0xd8, 0x68, 0x91, 0x1f, 0x6a, 0xa6,
|
|
0x28, 0x22, 0xf7, 0x00, 0x49, 0x00, 0xbe, 0x41,
|
|
0x71, 0x0a, 0xf5, 0xe7, 0x9f, 0xb4, 0x11, 0x41,
|
|
0x3f, 0xcd, 0xa9, 0xa9, 0x01, 0x8b, 0x6a, 0xeb,
|
|
0x54, 0x4c, 0x58, 0x92, 0x68, 0x02, 0x0e, 0xe9,
|
|
0xed, 0x65, 0x4c, 0xfb, 0x95, 0x48, 0x58, 0xa2,
|
|
0xaa, 0x57, 0x69, 0x13, 0x82, 0x0c, 0x2c, 0x4b,
|
|
0x5d, 0x4e, 0x18, 0x30, 0xef, 0x1c, 0xb1, 0x9d,
|
|
0x05, 0x05, 0x02, 0x1c, 0x97, 0xc9, 0x48, 0xfe,
|
|
0x5e, 0x7b, 0x77, 0xa3, 0x1f, 0x2a, 0x81, 0x42,
|
|
0xf0, 0x4b, 0x85, 0x12, 0x9c, 0x1f, 0x44, 0xb1,
|
|
0x14, 0x91, 0x92, 0x65, 0x77, 0xb1, 0x87, 0xa2,
|
|
0xfc, 0xa4, 0xe7, 0xd2, 0x9b, 0xf2, 0x17, 0xf0,
|
|
0x30, 0x1c, 0x8d, 0x33, 0xbc, 0x25, 0x28, 0x48,
|
|
0xfd, 0x30, 0x79, 0x0a, 0x99, 0x3e, 0xb4, 0x0f,
|
|
0x1e, 0xa6, 0x68, 0x76, 0x19, 0x76, 0x29, 0xac,
|
|
0x5d, 0xb8, 0x1e, 0x42, 0xd6, 0x85, 0x04, 0xbf,
|
|
0x64, 0x1c, 0x2d, 0x53, 0xe9, 0x92, 0x78, 0xf8,
|
|
0xc3, 0xda, 0x96, 0x92, 0x10, 0x6f, 0x45, 0x85,
|
|
0xaf, 0x5e, 0xcc, 0xa8, 0xc0, 0xc6, 0x2e, 0x73,
|
|
0x51, 0x3f, 0x5e, 0xd7, 0x52, 0x33, 0x71, 0x12,
|
|
0x6d, 0x85, 0xee, 0xea, 0x85, 0xa8, 0x48, 0x2b,
|
|
0x40, 0x64, 0x6d, 0x28, 0x73, 0x16, 0xd7, 0x82,
|
|
0xd9, 0x90, 0xed, 0x1f, 0xa7, 0x5c, 0xb1, 0x5c,
|
|
0x27, 0xb9, 0x67, 0x8b, 0xb4, 0x17, 0x13, 0x83,
|
|
0x5f, 0x09, 0x72, 0x0a, 0xd7, 0xa0, 0xec, 0x81,
|
|
0x59, 0x19, 0xb9, 0xa6, 0x5a, 0x37, 0x34, 0x14,
|
|
0x47, 0xf6, 0xe7, 0x6c, 0xd2, 0x09, 0x10, 0xe7,
|
|
0xdd, 0xbb, 0x02, 0xd1, 0x28, 0xfa, 0x01, 0x2c,
|
|
0x93, 0x64, 0x2e, 0x1b, 0x4c, 0x02, 0x52, 0xcb,
|
|
0x07, 0xa1, 0xb6, 0x46, 0x02, 0x80, 0xd9, 0x8f,
|
|
0x5c, 0x62, 0xbe, 0x78, 0x9e, 0x75, 0xc4, 0x97,
|
|
0x91, 0x39, 0x12, 0x65, 0xb9, 0x3b, 0xc2, 0xd1,
|
|
0xaf, 0xf2, 0x1f, 0x4e, 0x4d, 0xd1, 0xf0, 0x9f,
|
|
0xb7, 0x12, 0xfd, 0xe8, 0x75, 0x18, 0xc0, 0x9d,
|
|
0x8c, 0x70, 0xff, 0x77, 0x05, 0xb6, 0x1a, 0x1f,
|
|
0x96, 0x48, 0xf6, 0xfe, 0xd5, 0x5d, 0x98, 0xa5,
|
|
0x72, 0x1c, 0x84, 0x76, 0x3e, 0xb8, 0x87, 0x37,
|
|
0xdd, 0xd4, 0x3a, 0x45, 0xdd, 0x09, 0xd8, 0xe7,
|
|
0x09, 0x2f, 0x3e, 0x33, 0x9e, 0x7b, 0x8c, 0xe4,
|
|
0x85, 0x12, 0x4e, 0xf8, 0x06, 0xb7, 0xb1, 0x85,
|
|
0x24, 0x96, 0xd8, 0xfe, 0x87, 0x92, 0x81, 0xb1,
|
|
0xa3, 0x38, 0xb9, 0x56, 0xe1, 0xf6, 0x36, 0x41,
|
|
0xbb, 0xd6, 0x56, 0x69, 0x94, 0x57, 0xb3, 0xa4,
|
|
0xca, 0xa4, 0xe1, 0x02, 0x3b, 0x96, 0x71, 0xe0,
|
|
0xb2, 0x2f, 0x85, 0x48, 0x1b, 0x4a, 0x41, 0x80,
|
|
0x4b, 0x9c, 0xe0, 0xc9, 0x39, 0xb8, 0xb1, 0xca,
|
|
0x64, 0x77, 0x46, 0x58, 0xe6, 0x84, 0xd5, 0x2b,
|
|
0x65, 0xce, 0xe9, 0x09, 0xa3, 0xaa, 0xfb, 0x83,
|
|
0xa9, 0x28, 0x68, 0xfd, 0xcd, 0xfd, 0x76, 0x83,
|
|
0xe1, 0x20, 0x22, 0x77, 0x3a, 0xa3, 0xb2, 0x93,
|
|
0x14, 0x91, 0xfc, 0xe2, 0x17, 0x63, 0x2b, 0xa6,
|
|
0x29, 0x38, 0x7b, 0x9b, 0x8b, 0x15, 0x77, 0xd6,
|
|
0xaa, 0x92, 0x51, 0x53, 0x50, 0xff, 0xa0, 0x35,
|
|
0xa0, 0x59, 0x7d, 0xf0, 0x11, 0x23, 0x49, 0xdf,
|
|
0x5a, 0x21, 0xc2, 0xfe, 0x35, 0xa0, 0x1d, 0xe2,
|
|
0xae, 0xa2, 0x8a, 0x61, 0x5b, 0xf7, 0xf1, 0x1c,
|
|
0x1c, 0xec, 0xc4, 0xf6, 0xdc, 0xaa, 0xc8, 0xc2,
|
|
0xe5, 0xa1, 0x2e, 0x14, 0xe5, 0xc6, 0xc9, 0x73,
|
|
0x03, 0x78, 0xeb, 0xed, 0xe0, 0x3e, 0xc5, 0xf4,
|
|
0xf1, 0x50, 0xb2, 0x01, 0x91, 0x96, 0xf5, 0xbb,
|
|
0xe1, 0x32, 0xcd, 0xa8, 0x66, 0xbf, 0x73, 0x85,
|
|
0x94, 0xd6, 0x7e, 0x68, 0xc5, 0xe4, 0xed, 0xd5,
|
|
0xe3, 0x67, 0x4c, 0xa5, 0xb3, 0x1f, 0xdf, 0xf8,
|
|
0xb3, 0x73, 0x5a, 0xac, 0xeb, 0x46, 0x16, 0x24,
|
|
0xab, 0xca, 0xa4, 0xdd, 0x87, 0x0e, 0x24, 0x83,
|
|
0x32, 0x04, 0x4c, 0xd8, 0xda, 0x7d, 0xdc, 0xe3,
|
|
0x01, 0x93, 0xf3, 0xc1, 0x5b, 0xbd, 0xc3, 0x1d,
|
|
0x40, 0x62, 0xde, 0x94, 0x03, 0x85, 0x91, 0x2a,
|
|
0xa0, 0x25, 0x10, 0xd3, 0x32, 0x9f, 0x93, 0x00,
|
|
0xa7, 0x8a, 0xfa, 0x77, 0x7c, 0xaf, 0x4d, 0xc8,
|
|
0x7a, 0xf3, 0x16, 0x2b, 0xba, 0xeb, 0x74, 0x51,
|
|
0xb8, 0xdd, 0x32, 0xad, 0x68, 0x7d, 0xdd, 0xca,
|
|
0x60, 0x98, 0xc9, 0x9b, 0xb6, 0x5d, 0x4d, 0x3a,
|
|
0x66, 0x8a, 0xbe, 0x05, 0xf9, 0x0c, 0xc5, 0xba,
|
|
0x52, 0x82, 0x09, 0x1f, 0x5a, 0x66, 0x89, 0x69,
|
|
0xa3, 0x5d, 0x93, 0x50, 0x7d, 0x44, 0xc3, 0x2a,
|
|
0xb8, 0xab, 0xec, 0xa6, 0x5a, 0xae, 0x4a, 0x6a,
|
|
0xcd, 0xfd, 0xb6, 0xff, 0x3d, 0x98, 0x05, 0xd9,
|
|
0x5b, 0x29, 0xc4, 0x6f, 0xe0, 0x76, 0xe2, 0x3f,
|
|
0xec, 0xd7, 0xa4, 0x91, 0x63, 0xf5, 0x4e, 0x4b,
|
|
0xab, 0x20, 0x8c, 0x3a, 0x41, 0xed, 0x8b, 0x4b,
|
|
0xb9, 0x01, 0x21, 0xc0, 0x6d, 0xfd, 0x70, 0x5b,
|
|
0x20, 0x92, 0x41, 0x89, 0x74, 0xb7, 0xe9, 0x8b,
|
|
0xfc, 0x6d, 0x17, 0x3f, 0x7f, 0x89, 0x3d, 0x6b,
|
|
0x8f, 0xbc, 0xd2, 0x57, 0xe9, 0xc9, 0x6e, 0xa7,
|
|
0x19, 0x26, 0x18, 0xad, 0xef, 0xb5, 0x87, 0xbf,
|
|
0xb8, 0xa8, 0xd6, 0x7d, 0xdd, 0x5f, 0x94, 0x54,
|
|
0x09, 0x92, 0x2b, 0xf5, 0x04, 0xf7, 0x36, 0x69,
|
|
0x8e, 0xf4, 0xdc, 0x1d, 0x6e, 0x55, 0xbb, 0xe9,
|
|
0x13, 0x05, 0x83, 0x35, 0x9c, 0xed, 0xcf, 0x8c,
|
|
0x26, 0x8c, 0x7b, 0xc7, 0x0b, 0xba, 0xfd, 0xe2,
|
|
0x84, 0x5c, 0x2a, 0x79, 0x43, 0x99, 0xb2, 0xc3,
|
|
0x82, 0x87, 0xc8, 0xcd, 0x37, 0x6d, 0xa1, 0x2b,
|
|
0x39, 0xb2, 0x38, 0x99, 0xd9, 0xfc, 0x02, 0x15,
|
|
0x55, 0x21, 0x62, 0x59, 0xeb, 0x00, 0x86, 0x08,
|
|
0x20, 0xbe, 0x1a, 0x62, 0x4d, 0x7e, 0xdf, 0x68,
|
|
0x73, 0x5b, 0x5f, 0xaf, 0x84, 0x96, 0x2e, 0x1f,
|
|
0x6b, 0x03, 0xc9, 0xa6, 0x75, 0x18, 0xe9, 0xd4,
|
|
0xbd, 0xc8, 0xec, 0x9a, 0x5a, 0xb3, 0x99, 0xab,
|
|
0x5f, 0x7c, 0x08, 0x7f, 0x69, 0x4d, 0x52, 0xa2,
|
|
0x30, 0x17, 0x3b, 0x16, 0x15, 0x1b, 0x11, 0x62,
|
|
0x3e, 0x80, 0x4b, 0x85, 0x7c, 0x9c, 0xd1, 0x3a,
|
|
0x13, 0x01, 0x5e, 0x45, 0xf1, 0xc8, 0x5f, 0xcd,
|
|
0x0e, 0x21, 0xf5, 0x82, 0xd4, 0x7b, 0x5c, 0x45,
|
|
0x27, 0x6b, 0xef, 0xfe, 0xb8, 0xc0, 0x6f, 0xdc,
|
|
0x60, 0x7b, 0xe4, 0xd5, 0x75, 0x71, 0xe6, 0xe8,
|
|
0x7d, 0x6b, 0x6d, 0x80, 0xaf, 0x76, 0x41, 0x58,
|
|
0xb7, 0xac, 0xb7, 0x13, 0x2f, 0x81, 0xcc, 0xf9,
|
|
0x19, 0x97, 0xe8, 0xee, 0x40, 0x91, 0xfc, 0x89,
|
|
0x13, 0x1e, 0x67, 0x9a, 0xdb, 0x8f, 0x8f, 0xc7,
|
|
0x4a, 0xc9, 0xaf, 0x2f, 0x67, 0x01, 0x3c, 0xb8,
|
|
0xa8, 0x3e, 0x78, 0x93, 0x1b, 0xdf, 0xbb, 0x34,
|
|
0x0b, 0x1a, 0xfa, 0xc2, 0x2d, 0xc5, 0x1c, 0xec,
|
|
0x97, 0x4f, 0x48, 0x41, 0x15, 0x0e, 0x75, 0xed,
|
|
0x66, 0x8c, 0x17, 0x7f, 0xb1, 0x48, 0x13, 0xc1,
|
|
0xfb, 0x60, 0x06, 0xf9, 0x72, 0x41, 0x3e, 0xcf,
|
|
0x6e, 0xb6, 0xc8, 0xeb, 0x4b, 0x5a, 0xd2, 0x0c,
|
|
0x28, 0xda, 0x02, 0x7a, 0x46, 0x21, 0x42, 0xb5,
|
|
0x34, 0xda, 0xcb, 0x5e, 0xbd, 0x66, 0x5c, 0xca,
|
|
0xff, 0x52, 0x43, 0x89, 0xf9, 0x10, 0x9a, 0x9e,
|
|
0x9b, 0xe3, 0xb0, 0x51, 0xe9, 0xf3, 0x0a, 0x35,
|
|
0x77, 0x54, 0xcc, 0xac, 0xa6, 0xf1, 0x2e, 0x36,
|
|
0x89, 0xac, 0xc5, 0xc6, 0x62, 0x5a, 0xc0, 0x6d,
|
|
0xc4, 0xe1, 0xf7, 0x64, 0x30, 0xff, 0x11, 0x40,
|
|
0x13, 0x89, 0xd8, 0xd7, 0x73, 0x3f, 0x93, 0x08,
|
|
0x68, 0xab, 0x66, 0x09, 0x1a, 0xea, 0x78, 0xc9,
|
|
0x52, 0xf2, 0xfd, 0x93, 0x1b, 0x94, 0xbe, 0x5c,
|
|
0xe5, 0x00, 0x6e, 0x00, 0xb9, 0xea, 0x27, 0xaa,
|
|
0xb3, 0xee, 0xe3, 0xc8, 0x6a, 0xb0, 0xc1, 0x8e,
|
|
0x9b, 0x54, 0x40, 0x10, 0x96, 0x06, 0xe8, 0xb3,
|
|
0xf5, 0x55, 0x77, 0xd7, 0x5c, 0x94, 0xc1, 0x74,
|
|
0xf3, 0x07, 0x64, 0xac, 0x1c, 0xde, 0xc7, 0x22,
|
|
0xb0, 0xbf, 0x2a, 0x5a, 0xc0, 0x8f, 0x8a, 0x83,
|
|
0x50, 0xc2, 0x5e, 0x97, 0xa0, 0xbe, 0x49, 0x7e,
|
|
0x47, 0xaf, 0xa7, 0x20, 0x02, 0x35, 0xa4, 0x57,
|
|
0xd9, 0x26, 0x63, 0xdb, 0xf1, 0x34, 0x42, 0x89,
|
|
0x36, 0xd1, 0x77, 0x6f, 0xb1, 0xea, 0x79, 0x7e,
|
|
0x95, 0x10, 0x5a, 0xee, 0xa3, 0xae, 0x6f, 0xba,
|
|
0xa9, 0xef, 0x5a, 0x7e, 0x34, 0x03, 0x04, 0x07,
|
|
0x92, 0xd6, 0x07, 0x79, 0xaa, 0x14, 0x90, 0x97,
|
|
0x05, 0x4d, 0xa6, 0x27, 0x10, 0x5c, 0x25, 0x24,
|
|
0xcb, 0xcc, 0xf6, 0x77, 0x9e, 0x43, 0x23, 0xd4,
|
|
0x98, 0xef, 0x22, 0xa8, 0xad, 0xf2, 0x26, 0x08,
|
|
0x59, 0x69, 0xa4, 0xc3, 0x97, 0xe0, 0x5c, 0x6f,
|
|
0xeb, 0x3d, 0xd4, 0x62, 0x6e, 0x80, 0x61, 0x02,
|
|
0xf4, 0xfc, 0x94, 0x79, 0xbb, 0x4e, 0x6d, 0xd7,
|
|
0x30, 0x5b, 0x10, 0x11, 0x5a, 0x3d, 0xa7, 0x50,
|
|
0x1d, 0x9a, 0x13, 0x5f, 0x4f, 0xa8, 0xa7, 0xb6,
|
|
0x39, 0xc7, 0xea, 0xe6, 0x19, 0x61, 0x69, 0xc7,
|
|
0x9a, 0x3a, 0xeb, 0x9d, 0xdc, 0xf7, 0x06, 0x37,
|
|
0xbd, 0xac, 0xe3, 0x18, 0xff, 0xfe, 0x11, 0xdb,
|
|
0x67, 0x42, 0xb4, 0xea, 0xa8, 0xbd, 0xb0, 0x76,
|
|
0xd2, 0x74, 0x32, 0xc2, 0xa4, 0x9c, 0xe7, 0x60,
|
|
0xc5, 0x30, 0x9a, 0x57, 0x66, 0xcd, 0x0f, 0x02,
|
|
0x4c, 0xea, 0xe9, 0xd3, 0x2a, 0x5c, 0x09, 0xc2,
|
|
0xff, 0x6a, 0xde, 0x5d, 0xb7, 0xe9, 0x75, 0x6b,
|
|
0x29, 0x94, 0xd6, 0xf7, 0xc3, 0xdf, 0xfb, 0x70,
|
|
0xec, 0xb5, 0x8c, 0xb0, 0x78, 0x7a, 0xee, 0x52,
|
|
0x5f, 0x8c, 0xae, 0x85, 0xe5, 0x98, 0xa2, 0xb7,
|
|
0x7c, 0x02, 0x2a, 0xcc, 0x9e, 0xde, 0x99, 0x5f,
|
|
0x84, 0x20, 0xbb, 0xdc, 0xf2, 0xd2, 0x13, 0x46,
|
|
0x3c, 0xd6, 0x4d, 0xe7, 0x50, 0xef, 0x55, 0xc3,
|
|
0x96, 0x9f, 0xec, 0x6c, 0xd8, 0xe2, 0xea, 0xed,
|
|
0xc7, 0x33, 0xc9, 0xb3, 0x1c, 0x4f, 0x1d, 0x83,
|
|
0x1d, 0xe4, 0xdd, 0xb2, 0x24, 0x8f, 0xf9, 0xf5
|
|
};
|
|
|
|
|
|
static const uint8_t HMAC_SHA256_ciphertext_64B_digest[] = {
|
|
0xc5, 0x6d, 0x4f, 0x29, 0xf4, 0xd2, 0xcc, 0x87,
|
|
0x3c, 0x81, 0x02, 0x6d, 0x38, 0x7a, 0x67, 0x3e,
|
|
0x95, 0x9c, 0x5c, 0x8f, 0xda, 0x5c, 0x06, 0xe0,
|
|
0x65, 0xf1, 0x6c, 0x51, 0x52, 0x49, 0x3e, 0x5f
|
|
};
|
|
|
|
static const uint8_t HMAC_SHA256_ciphertext_128B_digest[] = {
|
|
0x76, 0x64, 0x2d, 0x69, 0x71, 0x5d, 0x6a, 0xd8,
|
|
0x9f, 0x74, 0x11, 0x2f, 0x58, 0xe0, 0x4a, 0x2f,
|
|
0x6c, 0x88, 0x5e, 0x4d, 0x9c, 0x79, 0x83, 0x1c,
|
|
0x8a, 0x14, 0xd0, 0x07, 0xfb, 0xbf, 0x6c, 0x8f
|
|
};
|
|
|
|
static const uint8_t HMAC_SHA256_ciphertext_256B_digest[] = {
|
|
0x05, 0xa7, 0x44, 0xcd, 0x91, 0x8c, 0x95, 0xcf,
|
|
0x7b, 0x8f, 0xd3, 0x90, 0x86, 0x7e, 0x7b, 0xb9,
|
|
0x05, 0xd6, 0x6e, 0x7a, 0xc1, 0x7b, 0x26, 0xff,
|
|
0xd3, 0x4b, 0xe0, 0x22, 0x8b, 0xa8, 0x47, 0x52
|
|
};
|
|
|
|
static const uint8_t HMAC_SHA256_ciphertext_512B_digest[] = {
|
|
0x08, 0xb7, 0x29, 0x54, 0x18, 0x7e, 0x97, 0x49,
|
|
0xc6, 0x7c, 0x9f, 0x94, 0xa5, 0x4f, 0xa2, 0x25,
|
|
0xd0, 0xe2, 0x30, 0x7b, 0xad, 0x93, 0xc9, 0x12,
|
|
0x0f, 0xf0, 0xf0, 0x71, 0xc2, 0xf6, 0x53, 0x8f
|
|
};
|
|
|
|
static const uint8_t HMAC_SHA256_ciphertext_768B_digest[] = {
|
|
0xe4, 0x3e, 0x73, 0x93, 0x03, 0xaf, 0x6f, 0x9c,
|
|
0xca, 0x57, 0x3b, 0x4a, 0x6e, 0x83, 0x58, 0xf5,
|
|
0x66, 0xc2, 0xb4, 0xa7, 0xe0, 0xee, 0x63, 0x6b,
|
|
0x48, 0xb7, 0x50, 0x45, 0x69, 0xdf, 0x5c, 0x5b
|
|
};
|
|
|
|
static const uint8_t HMAC_SHA256_ciphertext_1024B_digest[] = {
|
|
0x03, 0xb9, 0x96, 0x26, 0xdc, 0x1c, 0xab, 0xe2,
|
|
0xf5, 0x70, 0x55, 0x15, 0x67, 0x6e, 0x48, 0x11,
|
|
0xe7, 0x67, 0xea, 0xfa, 0x5c, 0x6b, 0x28, 0x22,
|
|
0xc9, 0x0e, 0x67, 0x04, 0xb3, 0x71, 0x7f, 0x88
|
|
};
|
|
|
|
static const uint8_t HMAC_SHA256_ciphertext_1280B_digest[] = {
|
|
0x01, 0x91, 0xb8, 0x78, 0xd3, 0x21, 0x74, 0xa5,
|
|
0x1c, 0x8b, 0xd4, 0xd2, 0xc0, 0x49, 0xd7, 0xd2,
|
|
0x16, 0x46, 0x66, 0x85, 0x50, 0x6d, 0x08, 0xcc,
|
|
0xc7, 0x0a, 0xa3, 0x71, 0xcc, 0xde, 0xee, 0xdc
|
|
};
|
|
|
|
static const uint8_t HMAC_SHA256_ciphertext_1536B_digest[] = {
|
|
0xf2, 0xe5, 0xe9, 0x57, 0x53, 0xd7, 0x69, 0x28,
|
|
0x7b, 0x69, 0xb5, 0x49, 0xa3, 0x31, 0x56, 0x5f,
|
|
0xa4, 0xe9, 0x87, 0x26, 0x2f, 0xe0, 0x2d, 0xd6,
|
|
0x08, 0x44, 0x01, 0x71, 0x0c, 0x93, 0x85, 0x84
|
|
};
|
|
|
|
static const uint8_t HMAC_SHA256_ciphertext_1792B_digest[] = {
|
|
0xf6, 0x57, 0x62, 0x01, 0xbf, 0x2d, 0xea, 0x4a,
|
|
0xef, 0x43, 0x85, 0x60, 0x18, 0xdf, 0x8b, 0xb4,
|
|
0x60, 0xc0, 0xfd, 0x2f, 0x90, 0x15, 0xe6, 0x91,
|
|
0x56, 0x61, 0x68, 0x7f, 0x5e, 0x92, 0xa8, 0xdd
|
|
};
|
|
|
|
static const uint8_t HMAC_SHA256_ciphertext_2048B_digest[] = {
|
|
0x81, 0x1a, 0x29, 0xbc, 0x6b, 0x9f, 0xbb, 0xb8,
|
|
0xef, 0x71, 0x7b, 0x1f, 0x6f, 0xd4, 0x7e, 0x68,
|
|
0x3a, 0x9c, 0xb9, 0x98, 0x22, 0x81, 0xfa, 0x95,
|
|
0xee, 0xbc, 0x7f, 0x23, 0x29, 0x88, 0x76, 0xb8
|
|
};
|
|
|
|
struct crypto_data_params {
|
|
const char *name;
|
|
uint16_t length;
|
|
const char *plaintext;
|
|
struct crypto_expected_output {
|
|
const uint8_t *ciphertext;
|
|
const uint8_t *digest;
|
|
} expected;
|
|
};
|
|
|
|
#define MAX_PACKET_SIZE_INDEX 10
|
|
|
|
struct crypto_data_params aes_cbc_hmac_sha256_output[MAX_PACKET_SIZE_INDEX] = {
|
|
{ "64B", 64, &plaintext_quote[sizeof(plaintext_quote) - 1 - 64],
|
|
{ AES_CBC_ciphertext_64B, HMAC_SHA256_ciphertext_64B_digest } },
|
|
{ "128B", 128, &plaintext_quote[sizeof(plaintext_quote) - 1 - 128],
|
|
{ AES_CBC_ciphertext_128B, HMAC_SHA256_ciphertext_128B_digest } },
|
|
{ "256B", 256, &plaintext_quote[sizeof(plaintext_quote) - 1 - 256],
|
|
{ AES_CBC_ciphertext_256B, HMAC_SHA256_ciphertext_256B_digest } },
|
|
{ "512B", 512, &plaintext_quote[sizeof(plaintext_quote) - 1 - 512],
|
|
{ AES_CBC_ciphertext_512B, HMAC_SHA256_ciphertext_512B_digest } },
|
|
{ "768B", 768, &plaintext_quote[sizeof(plaintext_quote) - 1 - 768],
|
|
{ AES_CBC_ciphertext_768B, HMAC_SHA256_ciphertext_768B_digest } },
|
|
{ "1024B", 1024, &plaintext_quote[sizeof(plaintext_quote) - 1 - 1024],
|
|
{ AES_CBC_ciphertext_1024B, HMAC_SHA256_ciphertext_1024B_digest } },
|
|
{ "1280B", 1280, &plaintext_quote[sizeof(plaintext_quote) - 1 - 1280],
|
|
{ AES_CBC_ciphertext_1280B, HMAC_SHA256_ciphertext_1280B_digest } },
|
|
{ "1536B", 1536, &plaintext_quote[sizeof(plaintext_quote) - 1 - 1536],
|
|
{ AES_CBC_ciphertext_1536B, HMAC_SHA256_ciphertext_1536B_digest } },
|
|
{ "1792B", 1792, &plaintext_quote[sizeof(plaintext_quote) - 1 - 1792],
|
|
{ AES_CBC_ciphertext_1792B, HMAC_SHA256_ciphertext_1792B_digest } },
|
|
{ "2048B", 2048, &plaintext_quote[sizeof(plaintext_quote) - 1 - 2048],
|
|
{ AES_CBC_ciphertext_2048B, HMAC_SHA256_ciphertext_2048B_digest } }
|
|
};
|
|
|
|
static int
|
|
test_perf_crypto_qp_vary_burst_size(uint16_t dev_num)
|
|
{
|
|
uint32_t num_to_submit = 4096;
|
|
struct rte_crypto_op *c_ops[num_to_submit];
|
|
struct rte_crypto_op *proc_ops[num_to_submit];
|
|
uint64_t failed_polls, retries, start_cycles, end_cycles, total_cycles = 0;
|
|
uint32_t burst_sent, burst_received;
|
|
uint32_t i, burst_size, num_sent, num_received;
|
|
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
|
struct crypto_unittest_params *ut_params = &unittest_params;
|
|
struct crypto_data_params *data_params = aes_cbc_hmac_sha256_output;
|
|
|
|
if (rte_cryptodev_count() == 0) {
|
|
printf("\nNo crypto devices available. Is kernel driver loaded?\n");
|
|
return TEST_FAILED;
|
|
}
|
|
|
|
/* Setup Cipher Parameters */
|
|
ut_params->cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
|
ut_params->cipher_xform.next = &ut_params->auth_xform;
|
|
|
|
ut_params->cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_AES_CBC;
|
|
ut_params->cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_DECRYPT;
|
|
ut_params->cipher_xform.cipher.key.data = aes_cbc_128_key;
|
|
ut_params->cipher_xform.cipher.key.length = CIPHER_IV_LENGTH_AES_CBC;
|
|
|
|
|
|
/* Setup HMAC Parameters */
|
|
ut_params->auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
|
ut_params->auth_xform.next = NULL;
|
|
|
|
ut_params->auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_VERIFY;
|
|
ut_params->auth_xform.auth.algo = RTE_CRYPTO_AUTH_SHA256_HMAC;
|
|
ut_params->auth_xform.auth.key.data = hmac_sha256_key;
|
|
ut_params->auth_xform.auth.key.length = HMAC_KEY_LENGTH_SHA256;
|
|
ut_params->auth_xform.auth.digest_length = DIGEST_BYTE_LENGTH_SHA256;
|
|
|
|
/* Create Crypto session*/
|
|
ut_params->sess = rte_cryptodev_sym_session_create(ts_params->dev_id,
|
|
&ut_params->cipher_xform);
|
|
|
|
TEST_ASSERT_NOT_NULL(ut_params->sess, "Session creation failed");
|
|
|
|
/* Generate Crypto op data structure(s) */
|
|
for (i = 0; i < num_to_submit ; i++) {
|
|
struct rte_mbuf *m = setup_test_string(ts_params->mbuf_mp,
|
|
data_params[0].expected.ciphertext,
|
|
data_params[0].length, 0);
|
|
TEST_ASSERT_NOT_NULL(m, "Failed to allocate tx_buf");
|
|
|
|
ut_params->digest = (uint8_t *)rte_pktmbuf_append(m,
|
|
DIGEST_BYTE_LENGTH_SHA256);
|
|
TEST_ASSERT_NOT_NULL(ut_params->digest,
|
|
"no room to append digest");
|
|
|
|
rte_memcpy(ut_params->digest, data_params[0].expected.digest,
|
|
DIGEST_BYTE_LENGTH_SHA256);
|
|
|
|
|
|
struct rte_crypto_op *op =
|
|
rte_crypto_op_alloc(ts_params->op_mpool,
|
|
RTE_CRYPTO_OP_TYPE_SYMMETRIC);
|
|
|
|
rte_crypto_op_attach_sym_session(op, ut_params->sess);
|
|
|
|
op->sym->auth.digest.data = ut_params->digest;
|
|
op->sym->auth.digest.phys_addr = rte_pktmbuf_mtophys_offset(m,
|
|
data_params[0].length);
|
|
op->sym->auth.digest.length = DIGEST_BYTE_LENGTH_SHA256;
|
|
|
|
op->sym->auth.data.offset = CIPHER_IV_LENGTH_AES_CBC;
|
|
op->sym->auth.data.length = data_params[0].length;
|
|
|
|
|
|
op->sym->cipher.iv.data = (uint8_t *)rte_pktmbuf_prepend(m,
|
|
CIPHER_IV_LENGTH_AES_CBC);
|
|
op->sym->cipher.iv.phys_addr = rte_pktmbuf_mtophys(m);
|
|
op->sym->cipher.iv.length = CIPHER_IV_LENGTH_AES_CBC;
|
|
|
|
rte_memcpy(op->sym->cipher.iv.data, aes_cbc_128_iv,
|
|
CIPHER_IV_LENGTH_AES_CBC);
|
|
|
|
op->sym->cipher.data.offset = CIPHER_IV_LENGTH_AES_CBC;
|
|
op->sym->cipher.data.length = data_params[0].length;
|
|
|
|
op->sym->m_src = m;
|
|
|
|
c_ops[i] = op;
|
|
}
|
|
|
|
printf("\nTest to measure the IA cycle cost using AES128_CBC_SHA256_HMAC "
|
|
"algorithm with a constant request size of %u.",
|
|
data_params[0].length);
|
|
printf("\nThis test will keep retries at 0 and only measure IA cycle "
|
|
"cost for each request.");
|
|
printf("\nDev No\tQP No\tNum Sent\tNum Received\tTx/Rx burst");
|
|
printf("\tRetries (Device Busy)\tAverage IA cycle cost "
|
|
"(assuming 0 retries)");
|
|
for (i = 2; i <= 128 ; i *= 2) {
|
|
num_sent = 0;
|
|
num_received = 0;
|
|
retries = 0;
|
|
failed_polls = 0;
|
|
burst_size = i;
|
|
total_cycles = 0;
|
|
while (num_sent < num_to_submit) {
|
|
start_cycles = rte_rdtsc_precise();
|
|
burst_sent = rte_cryptodev_enqueue_burst(dev_num,
|
|
0, &c_ops[num_sent],
|
|
((num_to_submit-num_sent) < burst_size) ?
|
|
num_to_submit-num_sent : burst_size);
|
|
if (burst_sent == 0)
|
|
retries++;
|
|
else
|
|
num_sent += burst_sent;
|
|
end_cycles = rte_rdtsc_precise();
|
|
total_cycles += (end_cycles - start_cycles);
|
|
/*
|
|
* Wait until requests have been sent.
|
|
*/
|
|
rte_delay_ms(1);
|
|
|
|
start_cycles = rte_rdtsc_precise();
|
|
burst_received = rte_cryptodev_dequeue_burst(
|
|
dev_num, 0, proc_ops, burst_size);
|
|
if (burst_received == 0)
|
|
failed_polls++;
|
|
else
|
|
num_received += burst_received;
|
|
end_cycles = rte_rdtsc_precise();
|
|
total_cycles += end_cycles - start_cycles;
|
|
}
|
|
|
|
while (num_received != num_to_submit) {
|
|
if (gbl_cryptodev_perftest_devtype ==
|
|
RTE_CRYPTODEV_AESNI_MB_PMD)
|
|
rte_cryptodev_enqueue_burst(dev_num, 0,
|
|
NULL, 0);
|
|
|
|
burst_received = rte_cryptodev_dequeue_burst(
|
|
dev_num, 0, proc_ops, burst_size);
|
|
if (burst_received == 0)
|
|
failed_polls++;
|
|
else
|
|
num_received += burst_received;
|
|
}
|
|
|
|
printf("\n%u\t%u\t%u\t\t%u\t\t%u", dev_num, 0,
|
|
num_sent, num_received, burst_size);
|
|
printf("\t\t%"PRIu64, retries);
|
|
printf("\t\t\t%"PRIu64, total_cycles/num_received);
|
|
}
|
|
printf("\n");
|
|
|
|
for (i = 0; i < num_to_submit ; i++) {
|
|
rte_pktmbuf_free(c_ops[i]->sym->m_src);
|
|
rte_crypto_op_free(c_ops[i]);
|
|
}
|
|
return TEST_SUCCESS;
|
|
}
|
|
|
|
static int
|
|
test_perf_snow3G_optimise_cyclecount(struct perf_test_params *pparams)
|
|
{
|
|
uint32_t num_to_submit = pparams->total_operations;
|
|
struct rte_crypto_op *c_ops[num_to_submit];
|
|
struct rte_crypto_op *proc_ops[num_to_submit];
|
|
uint64_t failed_polls, retries, start_cycles, end_cycles, total_cycles = 0;
|
|
uint32_t burst_sent = 0, burst_received = 0;
|
|
uint32_t i, burst_size, num_sent, num_ops_received;
|
|
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
|
static struct rte_cryptodev_sym_session *sess;
|
|
|
|
if (rte_cryptodev_count() == 0) {
|
|
printf("\nNo crypto devices found. Is PMD build configured?\n");
|
|
printf("\nAnd is kernel driver loaded for HW PMDs?\n");
|
|
return TEST_FAILED;
|
|
}
|
|
|
|
/* Create Crypto session*/
|
|
sess = test_perf_create_snow3g_session(ts_params->dev_id,
|
|
pparams->chain, pparams->cipher_algo,
|
|
pparams->cipher_key_length, pparams->auth_algo);
|
|
TEST_ASSERT_NOT_NULL(sess, "Session creation failed");
|
|
|
|
/* Generate Crypto op data structure(s)*/
|
|
for (i = 0; i < num_to_submit ; i++) {
|
|
struct rte_mbuf *m = test_perf_create_pktmbuf(
|
|
ts_params->mbuf_mp,
|
|
pparams->buf_size);
|
|
TEST_ASSERT_NOT_NULL(m, "Failed to allocate tx_buf");
|
|
|
|
struct rte_crypto_op *op =
|
|
rte_crypto_op_alloc(ts_params->op_mpool,
|
|
RTE_CRYPTO_OP_TYPE_SYMMETRIC);
|
|
TEST_ASSERT_NOT_NULL(op, "Failed to allocate op");
|
|
|
|
op = test_perf_set_crypto_op_snow3g(op, m, sess, pparams->buf_size,
|
|
get_auth_digest_length(pparams->auth_algo));
|
|
TEST_ASSERT_NOT_NULL(op, "Failed to attach op to session");
|
|
|
|
c_ops[i] = op;
|
|
}
|
|
|
|
printf("\nOn %s dev%u qp%u, %s, cipher algo:%s, auth_algo:%s, "
|
|
"Packet Size %u bytes",
|
|
pmd_name(gbl_cryptodev_perftest_devtype),
|
|
ts_params->dev_id, 0,
|
|
chain_mode_name(pparams->chain),
|
|
cipher_algo_name(pparams->cipher_algo),
|
|
auth_algo_name(pparams->auth_algo),
|
|
pparams->buf_size);
|
|
printf("\nOps Tx\tOps Rx\tOps/burst ");
|
|
printf("Retries EmptyPolls\tIACycles/CyOp\tIACycles/Burst\tIACycles/Byte");
|
|
|
|
for (i = 2; i <= 128 ; i *= 2) {
|
|
num_sent = 0;
|
|
num_ops_received = 0;
|
|
retries = 0;
|
|
failed_polls = 0;
|
|
burst_size = i;
|
|
total_cycles = 0;
|
|
while (num_sent < num_to_submit) {
|
|
start_cycles = rte_rdtsc_precise();
|
|
burst_sent = rte_cryptodev_enqueue_burst(ts_params->dev_id,
|
|
0, &c_ops[num_sent],
|
|
((num_to_submit-num_sent) < burst_size) ?
|
|
num_to_submit-num_sent : burst_size);
|
|
end_cycles = rte_rdtsc_precise();
|
|
if (burst_sent == 0)
|
|
retries++;
|
|
num_sent += burst_sent;
|
|
total_cycles += (end_cycles - start_cycles);
|
|
|
|
/* Wait until requests have been sent. */
|
|
|
|
rte_delay_ms(1);
|
|
|
|
start_cycles = rte_rdtsc_precise();
|
|
burst_received = rte_cryptodev_dequeue_burst(
|
|
ts_params->dev_id, 0, proc_ops, burst_size);
|
|
end_cycles = rte_rdtsc_precise();
|
|
if (burst_received < burst_sent)
|
|
failed_polls++;
|
|
num_ops_received += burst_received;
|
|
|
|
total_cycles += end_cycles - start_cycles;
|
|
}
|
|
|
|
while (num_ops_received != num_to_submit) {
|
|
if (gbl_cryptodev_perftest_devtype ==
|
|
RTE_CRYPTODEV_AESNI_MB_PMD)
|
|
rte_cryptodev_enqueue_burst(ts_params->dev_id, 0,
|
|
NULL, 0);
|
|
start_cycles = rte_rdtsc_precise();
|
|
burst_received = rte_cryptodev_dequeue_burst(
|
|
ts_params->dev_id, 0, proc_ops, burst_size);
|
|
end_cycles = rte_rdtsc_precise();
|
|
total_cycles += end_cycles - start_cycles;
|
|
if (burst_received == 0)
|
|
failed_polls++;
|
|
num_ops_received += burst_received;
|
|
}
|
|
|
|
printf("\n%u\t%u\t%u", num_sent, num_ops_received, burst_size);
|
|
printf("\t\t%"PRIu64, retries);
|
|
printf("\t%"PRIu64, failed_polls);
|
|
printf("\t\t%"PRIu64, total_cycles/num_ops_received);
|
|
printf("\t\t%"PRIu64, (total_cycles/num_ops_received)*burst_size);
|
|
printf("\t\t%"PRIu64, total_cycles/(num_ops_received*pparams->buf_size));
|
|
}
|
|
printf("\n");
|
|
|
|
for (i = 0; i < num_to_submit ; i++) {
|
|
rte_pktmbuf_free(c_ops[i]->sym->m_src);
|
|
rte_crypto_op_free(c_ops[i]);
|
|
}
|
|
|
|
return TEST_SUCCESS;
|
|
}
|
|
|
|
static int
|
|
test_perf_snow3G_vary_burst_size(void)
|
|
{
|
|
unsigned total_operations = 4096;
|
|
/*no need to vary pkt size for QAT, should have no effect on IA cycles */
|
|
uint16_t buf_lengths[] = {40};
|
|
uint8_t i, j;
|
|
|
|
struct perf_test_params params_set[] = {
|
|
{
|
|
.chain = CIPHER_ONLY,
|
|
.cipher_algo = RTE_CRYPTO_CIPHER_SNOW3G_UEA2,
|
|
.cipher_key_length = 16,
|
|
.auth_algo = RTE_CRYPTO_AUTH_NULL,
|
|
},
|
|
{
|
|
.chain = HASH_ONLY,
|
|
.cipher_algo = RTE_CRYPTO_CIPHER_NULL,
|
|
.auth_algo = RTE_CRYPTO_AUTH_SNOW3G_UIA2,
|
|
.cipher_key_length = 16
|
|
},
|
|
};
|
|
|
|
printf("\n\nStart %s.", __func__);
|
|
printf("\nThis Test measures the average IA cycle cost using a "
|
|
"constant request(packet) size. ");
|
|
printf("Cycle cost is only valid when indicators show device is not busy,"
|
|
" i.e. Retries and EmptyPolls = 0");
|
|
|
|
for (i = 0; i < RTE_DIM(params_set); i++) {
|
|
printf("\n");
|
|
params_set[i].total_operations = total_operations;
|
|
|
|
for (j = 0;
|
|
j < RTE_DIM(buf_lengths);
|
|
j++) {
|
|
|
|
params_set[i].buf_size = buf_lengths[j];
|
|
|
|
test_perf_snow3G_optimise_cyclecount(¶ms_set[i]);
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static uint32_t get_auth_key_max_length(enum rte_crypto_auth_algorithm algo)
|
|
{
|
|
switch (algo) {
|
|
case RTE_CRYPTO_AUTH_SNOW3G_UIA2:
|
|
return 16;
|
|
case RTE_CRYPTO_AUTH_SHA1_HMAC:
|
|
return 64;
|
|
case RTE_CRYPTO_AUTH_SHA224_HMAC:
|
|
return 64;
|
|
case RTE_CRYPTO_AUTH_SHA256_HMAC:
|
|
return 64;
|
|
case RTE_CRYPTO_AUTH_SHA384_HMAC:
|
|
return 128;
|
|
case RTE_CRYPTO_AUTH_SHA512_HMAC:
|
|
return 128;
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
static uint32_t get_auth_digest_length(enum rte_crypto_auth_algorithm algo)
|
|
{
|
|
switch (algo) {
|
|
case RTE_CRYPTO_AUTH_SNOW3G_UIA2:
|
|
return 4;
|
|
case RTE_CRYPTO_AUTH_SHA1_HMAC:
|
|
return TRUNCATED_DIGEST_BYTE_LENGTH_SHA1;
|
|
case RTE_CRYPTO_AUTH_SHA224_HMAC:
|
|
return TRUNCATED_DIGEST_BYTE_LENGTH_SHA224;
|
|
case RTE_CRYPTO_AUTH_SHA256_HMAC:
|
|
return TRUNCATED_DIGEST_BYTE_LENGTH_SHA256;
|
|
case RTE_CRYPTO_AUTH_SHA384_HMAC:
|
|
return TRUNCATED_DIGEST_BYTE_LENGTH_SHA384;
|
|
case RTE_CRYPTO_AUTH_SHA512_HMAC:
|
|
return TRUNCATED_DIGEST_BYTE_LENGTH_SHA512;
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
static uint8_t aes_cbc_key[] = {
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
|
|
};
|
|
|
|
static uint8_t aes_cbc_iv[] = {
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
|
|
};
|
|
|
|
static uint8_t hmac_sha_key[] = {
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
|
|
};
|
|
|
|
static uint8_t snow3g_cipher_key[] = {
|
|
0x2B, 0xD6, 0x45, 0x9F, 0x82, 0xC5, 0xB3, 0x00,
|
|
0x95, 0x2C, 0x49, 0x10, 0x48, 0x81, 0xFF, 0x48
|
|
};
|
|
|
|
static uint8_t snow3g_iv[] = {
|
|
0x72, 0xA4, 0xF2, 0x0F, 0x64, 0x00, 0x00, 0x00,
|
|
0x72, 0xA4, 0xF2, 0x0F, 0x64, 0x00, 0x00, 0x00
|
|
};
|
|
|
|
static uint8_t snow3g_hash_key[] = {
|
|
0xC7, 0x36, 0xC6, 0xAA, 0xB2, 0x2B, 0xFF, 0xF9,
|
|
0x1E, 0x26, 0x98, 0xD2, 0xE2, 0x2A, 0xD5, 0x7E
|
|
};
|
|
|
|
static struct rte_cryptodev_sym_session *
|
|
test_perf_create_aes_sha_session(uint8_t dev_id, enum chain_mode chain,
|
|
enum rte_crypto_cipher_algorithm cipher_algo,
|
|
unsigned cipher_key_len,
|
|
enum rte_crypto_auth_algorithm auth_algo)
|
|
{
|
|
struct rte_crypto_sym_xform cipher_xform = { 0 };
|
|
struct rte_crypto_sym_xform auth_xform = { 0 };
|
|
|
|
|
|
/* Setup Cipher Parameters */
|
|
cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
|
cipher_xform.cipher.algo = cipher_algo;
|
|
cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;
|
|
|
|
cipher_xform.cipher.key.data = aes_cbc_key;
|
|
cipher_xform.cipher.key.length = cipher_key_len;
|
|
|
|
/* Setup HMAC Parameters */
|
|
auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
|
auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_GENERATE;
|
|
auth_xform.auth.algo = auth_algo;
|
|
|
|
auth_xform.auth.key.data = hmac_sha_key;
|
|
auth_xform.auth.key.length = get_auth_key_max_length(auth_algo);
|
|
auth_xform.auth.digest_length = get_auth_digest_length(auth_algo);
|
|
|
|
switch (chain) {
|
|
case CIPHER_HASH:
|
|
cipher_xform.next = &auth_xform;
|
|
auth_xform.next = NULL;
|
|
/* Create Crypto session*/
|
|
return rte_cryptodev_sym_session_create(dev_id, &cipher_xform);
|
|
case HASH_CIPHER:
|
|
auth_xform.next = &cipher_xform;
|
|
cipher_xform.next = NULL;
|
|
/* Create Crypto session*/
|
|
return rte_cryptodev_sym_session_create(dev_id, &auth_xform);
|
|
default:
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
static struct rte_cryptodev_sym_session *
|
|
test_perf_create_snow3g_session(uint8_t dev_id, enum chain_mode chain,
|
|
enum rte_crypto_cipher_algorithm cipher_algo, unsigned cipher_key_len,
|
|
enum rte_crypto_auth_algorithm auth_algo)
|
|
{
|
|
struct rte_crypto_sym_xform cipher_xform = {0};
|
|
struct rte_crypto_sym_xform auth_xform = {0};
|
|
|
|
|
|
/* Setup Cipher Parameters */
|
|
cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
|
cipher_xform.cipher.algo = cipher_algo;
|
|
cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;
|
|
|
|
cipher_xform.cipher.key.data = snow3g_cipher_key;
|
|
cipher_xform.cipher.key.length = cipher_key_len;
|
|
|
|
/* Setup HMAC Parameters */
|
|
auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
|
auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_GENERATE;
|
|
auth_xform.auth.algo = auth_algo;
|
|
|
|
auth_xform.auth.key.data = snow3g_hash_key;
|
|
auth_xform.auth.key.length = get_auth_key_max_length(auth_algo);
|
|
auth_xform.auth.digest_length = get_auth_digest_length(auth_algo);
|
|
|
|
switch (chain) {
|
|
case CIPHER_HASH:
|
|
cipher_xform.next = &auth_xform;
|
|
auth_xform.next = NULL;
|
|
/* Create Crypto session*/
|
|
return rte_cryptodev_sym_session_create(dev_id, &cipher_xform);
|
|
case HASH_CIPHER:
|
|
auth_xform.next = &cipher_xform;
|
|
cipher_xform.next = NULL;
|
|
/* Create Crypto session*/
|
|
return rte_cryptodev_sym_session_create(dev_id, &auth_xform);
|
|
case CIPHER_ONLY:
|
|
cipher_xform.next = NULL;
|
|
/* Create Crypto session*/
|
|
return rte_cryptodev_sym_session_create(dev_id, &cipher_xform);
|
|
case HASH_ONLY:
|
|
auth_xform.next = NULL;
|
|
/* Create Crypto session */
|
|
return rte_cryptodev_sym_session_create(dev_id, &auth_xform);
|
|
default:
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
#define AES_CBC_BLOCK_SIZE 16
|
|
#define AES_CBC_CIPHER_IV_LENGTH 16
|
|
#define SNOW3G_CIPHER_IV_LENGTH 16
|
|
|
|
static struct rte_mbuf *
|
|
test_perf_create_pktmbuf(struct rte_mempool *mpool, unsigned buf_sz)
|
|
{
|
|
struct rte_mbuf *m = rte_pktmbuf_alloc(mpool);
|
|
|
|
if (rte_pktmbuf_append(m, buf_sz) == NULL) {
|
|
rte_pktmbuf_free(m);
|
|
return NULL;
|
|
}
|
|
|
|
memset(rte_pktmbuf_mtod(m, uint8_t *), 0, buf_sz);
|
|
|
|
return m;
|
|
}
|
|
|
|
static inline struct rte_crypto_op *
|
|
test_perf_set_crypto_op(struct rte_crypto_op *op, struct rte_mbuf *m,
|
|
struct rte_cryptodev_sym_session *sess, unsigned data_len,
|
|
unsigned digest_len)
|
|
{
|
|
if (rte_crypto_op_attach_sym_session(op, sess) != 0) {
|
|
rte_crypto_op_free(op);
|
|
return NULL;
|
|
}
|
|
|
|
/* Authentication Parameters */
|
|
op->sym->auth.digest.data = (uint8_t *)m->buf_addr +
|
|
(m->data_off + data_len);
|
|
op->sym->auth.digest.phys_addr = rte_pktmbuf_mtophys_offset(m, data_len);
|
|
op->sym->auth.digest.length = digest_len;
|
|
op->sym->auth.aad.data = aes_cbc_iv;
|
|
op->sym->auth.aad.length = AES_CBC_CIPHER_IV_LENGTH;
|
|
|
|
/* Cipher Parameters */
|
|
op->sym->cipher.iv.data = aes_cbc_iv;
|
|
op->sym->cipher.iv.length = AES_CBC_CIPHER_IV_LENGTH;
|
|
|
|
/* Data lengths/offsets Parameters */
|
|
op->sym->auth.data.offset = 0;
|
|
op->sym->auth.data.length = data_len;
|
|
|
|
op->sym->cipher.data.offset = AES_CBC_BLOCK_SIZE;
|
|
op->sym->cipher.data.length = data_len - AES_CBC_BLOCK_SIZE;
|
|
|
|
op->sym->m_src = m;
|
|
|
|
return op;
|
|
}
|
|
|
|
static inline struct rte_crypto_op *
|
|
test_perf_set_crypto_op_snow3g(struct rte_crypto_op *op, struct rte_mbuf *m,
|
|
struct rte_cryptodev_sym_session *sess, unsigned data_len,
|
|
unsigned digest_len)
|
|
{
|
|
if (rte_crypto_op_attach_sym_session(op, sess) != 0) {
|
|
rte_crypto_op_free(op);
|
|
return NULL;
|
|
}
|
|
|
|
/* Authentication Parameters */
|
|
op->sym->auth.digest.data = (uint8_t *)m->buf_addr +
|
|
(m->data_off + data_len);
|
|
op->sym->auth.digest.phys_addr = rte_pktmbuf_mtophys_offset(m, data_len);
|
|
op->sym->auth.digest.length = digest_len;
|
|
op->sym->auth.aad.data = snow3g_iv;
|
|
op->sym->auth.aad.length = SNOW3G_CIPHER_IV_LENGTH;
|
|
|
|
/* Cipher Parameters */
|
|
op->sym->cipher.iv.data = snow3g_iv;
|
|
op->sym->cipher.iv.length = SNOW3G_CIPHER_IV_LENGTH;
|
|
|
|
/* Data lengths/offsets Parameters */
|
|
op->sym->auth.data.offset = 0;
|
|
op->sym->auth.data.length = data_len << 3;
|
|
|
|
op->sym->cipher.data.offset = 0;
|
|
op->sym->cipher.data.length = data_len << 3;
|
|
|
|
op->sym->m_src = m;
|
|
|
|
return op;
|
|
}
|
|
|
|
|
|
|
|
/* An mbuf set is used in each burst. An mbuf can be used by multiple bursts at
|
|
* same time, i.e. as they're not dereferenced there's no need to wait until
|
|
* finished with to re-use */
|
|
#define NUM_MBUF_SETS 8
|
|
|
|
static int
|
|
test_perf_aes_sha(uint8_t dev_id, uint16_t queue_id,
|
|
struct perf_test_params *pparams)
|
|
{
|
|
uint16_t i, k, l, m;
|
|
uint16_t j = 0;
|
|
uint16_t ops_unused = 0;
|
|
|
|
uint64_t burst_enqueued = 0, total_enqueued = 0, burst_dequeued = 0;
|
|
uint64_t processed = 0, failed_polls = 0, retries = 0;
|
|
uint64_t tsc_start = 0, tsc_end = 0;
|
|
|
|
uint16_t digest_length = get_auth_digest_length(pparams->auth_algo);
|
|
|
|
struct rte_crypto_op *ops[pparams->burst_size];
|
|
struct rte_crypto_op *proc_ops[pparams->burst_size];
|
|
|
|
struct rte_mbuf *mbufs[pparams->burst_size * 8];
|
|
|
|
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
|
|
|
static struct rte_cryptodev_sym_session *sess;
|
|
|
|
if (rte_cryptodev_count() == 0) {
|
|
printf("\nNo crypto devices available. Is kernel driver loaded?\n");
|
|
return TEST_FAILED;
|
|
}
|
|
|
|
/* Create Crypto session*/
|
|
sess = test_perf_create_aes_sha_session(ts_params->dev_id,
|
|
pparams->chain, pparams->cipher_algo,
|
|
pparams->cipher_key_length, pparams->auth_algo);
|
|
TEST_ASSERT_NOT_NULL(sess, "Session creation failed");
|
|
|
|
/* Generate a burst of crypto operations */
|
|
for (i = 0; i < (pparams->burst_size * NUM_MBUF_SETS); i++) {
|
|
struct rte_mbuf *m = test_perf_create_pktmbuf(
|
|
ts_params->mbuf_mp,
|
|
pparams->buf_size);
|
|
|
|
if (m == NULL) {
|
|
printf("\nFailed to get mbuf - freeing the rest.\n");
|
|
for (k = 0; k < i; k++)
|
|
rte_pktmbuf_free(mbufs[k]);
|
|
return -1;
|
|
}
|
|
|
|
mbufs[i] = m;
|
|
}
|
|
|
|
|
|
tsc_start = rte_rdtsc_precise();
|
|
|
|
while (total_enqueued < pparams->total_operations) {
|
|
uint16_t burst_size =
|
|
total_enqueued+pparams->burst_size <= pparams->total_operations ?
|
|
pparams->burst_size : pparams->total_operations-total_enqueued;
|
|
uint16_t ops_needed = burst_size-ops_unused;
|
|
|
|
if (ops_needed != rte_crypto_op_bulk_alloc(ts_params->op_mpool,
|
|
RTE_CRYPTO_OP_TYPE_SYMMETRIC, ops, ops_needed)){
|
|
printf("\nFailed to alloc enough ops, finish dequeuing "
|
|
"and free ops below.");
|
|
} else {
|
|
for (i = 0; i < ops_needed; i++)
|
|
ops[i] = test_perf_set_crypto_op(ops[i],
|
|
mbufs[i + (pparams->burst_size *
|
|
(j % NUM_MBUF_SETS))],
|
|
sess, pparams->buf_size, digest_length);
|
|
|
|
/* enqueue burst */
|
|
burst_enqueued = rte_cryptodev_enqueue_burst(dev_id,
|
|
queue_id, ops, burst_size);
|
|
|
|
if (burst_enqueued < burst_size)
|
|
retries++;
|
|
|
|
ops_unused = burst_size-burst_enqueued;
|
|
total_enqueued += burst_enqueued;
|
|
}
|
|
|
|
/* dequeue burst */
|
|
burst_dequeued = rte_cryptodev_dequeue_burst(dev_id, queue_id,
|
|
proc_ops, pparams->burst_size);
|
|
if (burst_dequeued == 0)
|
|
failed_polls++;
|
|
else {
|
|
processed += burst_dequeued;
|
|
|
|
for (l = 0; l < burst_dequeued; l++)
|
|
rte_crypto_op_free(proc_ops[l]);
|
|
}
|
|
j++;
|
|
}
|
|
|
|
/* Dequeue any operations still in the crypto device */
|
|
while (processed < pparams->total_operations) {
|
|
/* Sending 0 length burst to flush sw crypto device */
|
|
rte_cryptodev_enqueue_burst(dev_id, queue_id, NULL, 0);
|
|
|
|
/* dequeue burst */
|
|
burst_dequeued = rte_cryptodev_dequeue_burst(dev_id, queue_id,
|
|
proc_ops, pparams->burst_size);
|
|
if (burst_dequeued == 0)
|
|
failed_polls++;
|
|
else {
|
|
processed += burst_dequeued;
|
|
|
|
for (m = 0; m < burst_dequeued; m++)
|
|
rte_crypto_op_free(proc_ops[m]);
|
|
}
|
|
}
|
|
|
|
tsc_end = rte_rdtsc_precise();
|
|
|
|
double ops_s = ((double)processed / (tsc_end - tsc_start)) * rte_get_tsc_hz();
|
|
double throughput = (ops_s * pparams->buf_size * 8) / 1000000000;
|
|
|
|
printf("\t%u\t%6.2f\t%10.2f\t%8"PRIu64"\t%8"PRIu64, pparams->buf_size, ops_s/1000000,
|
|
throughput, retries, failed_polls);
|
|
|
|
for (i = 0; i < pparams->burst_size * NUM_MBUF_SETS; i++)
|
|
rte_pktmbuf_free(mbufs[i]);
|
|
|
|
printf("\n");
|
|
return TEST_SUCCESS;
|
|
}
|
|
|
|
|
|
static int
|
|
test_perf_snow3g(uint8_t dev_id, uint16_t queue_id,
|
|
struct perf_test_params *pparams)
|
|
{
|
|
uint16_t i, k, l, m;
|
|
uint16_t j = 0;
|
|
uint16_t ops_unused = 0;
|
|
uint64_t burst_enqueued = 0, total_enqueued = 0, burst_dequeued = 0;
|
|
uint64_t processed = 0, failed_polls = 0, retries = 0;
|
|
uint64_t tsc_start = 0, tsc_end = 0;
|
|
|
|
uint16_t digest_length = get_auth_digest_length(pparams->auth_algo);
|
|
|
|
struct rte_crypto_op *ops[pparams->burst_size];
|
|
struct rte_crypto_op *proc_ops[pparams->burst_size];
|
|
|
|
struct rte_mbuf *mbufs[pparams->burst_size * NUM_MBUF_SETS];
|
|
|
|
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
|
|
|
static struct rte_cryptodev_sym_session *sess;
|
|
|
|
if (rte_cryptodev_count() == 0) {
|
|
printf("\nNo crypto devices found. Is PMD build configured?\n");
|
|
printf("\nAnd is kernel driver loaded for HW PMDs?\n");
|
|
return TEST_FAILED;
|
|
}
|
|
|
|
/* Create Crypto session*/
|
|
sess = test_perf_create_snow3g_session(ts_params->dev_id,
|
|
pparams->chain, pparams->cipher_algo,
|
|
pparams->cipher_key_length, pparams->auth_algo);
|
|
TEST_ASSERT_NOT_NULL(sess, "Session creation failed");
|
|
|
|
/* Generate a burst of crypto operations */
|
|
for (i = 0; i < (pparams->burst_size * NUM_MBUF_SETS); i++) {
|
|
struct rte_mbuf *m = test_perf_create_pktmbuf(
|
|
ts_params->mbuf_mp,
|
|
pparams->buf_size);
|
|
|
|
if (m == NULL) {
|
|
printf("\nFailed to get mbuf - freeing the rest.\n");
|
|
for (k = 0; k < i; k++)
|
|
rte_pktmbuf_free(mbufs[k]);
|
|
return -1;
|
|
}
|
|
|
|
mbufs[i] = m;
|
|
}
|
|
|
|
tsc_start = rte_rdtsc_precise();
|
|
|
|
while (total_enqueued < pparams->total_operations) {
|
|
uint16_t burst_size =
|
|
(total_enqueued+pparams->burst_size)
|
|
<= pparams->total_operations ?
|
|
pparams->burst_size : pparams->total_operations-total_enqueued;
|
|
uint16_t ops_needed = burst_size-ops_unused;
|
|
/* Handle the last burst correctly */
|
|
uint16_t op_offset = pparams->burst_size - burst_size;
|
|
|
|
if (ops_needed !=
|
|
rte_crypto_op_bulk_alloc(ts_params->op_mpool,
|
|
RTE_CRYPTO_OP_TYPE_SYMMETRIC,
|
|
ops+op_offset, ops_needed)) {
|
|
printf("\nFailed to alloc enough ops.");
|
|
/*Don't exit, dequeue, more ops should become available*/
|
|
} else {
|
|
for (i = 0; i < ops_needed; i++) {
|
|
ops[i+op_offset] =
|
|
test_perf_set_crypto_op_snow3g(ops[i+op_offset],
|
|
mbufs[i +
|
|
(pparams->burst_size * (j % NUM_MBUF_SETS))],
|
|
sess,
|
|
pparams->buf_size, digest_length);
|
|
}
|
|
|
|
/* enqueue burst */
|
|
burst_enqueued =
|
|
rte_cryptodev_enqueue_burst(dev_id, queue_id,
|
|
ops+op_offset, burst_size);
|
|
|
|
if (burst_enqueued < burst_size)
|
|
retries++;
|
|
|
|
ops_unused = burst_size-burst_enqueued;
|
|
total_enqueued += burst_enqueued;
|
|
}
|
|
|
|
/* dequeue burst */
|
|
burst_dequeued = rte_cryptodev_dequeue_burst(dev_id, queue_id,
|
|
proc_ops, pparams->burst_size);
|
|
if (burst_dequeued == 0) {
|
|
failed_polls++;
|
|
} else {
|
|
processed += burst_dequeued;
|
|
for (l = 0; l < burst_dequeued; l++)
|
|
rte_crypto_op_free(proc_ops[l]);
|
|
}
|
|
j++;
|
|
}
|
|
|
|
/* Dequeue any operations still in the crypto device */
|
|
while (processed < pparams->total_operations) {
|
|
/* Sending 0 length burst to flush sw crypto device */
|
|
rte_cryptodev_enqueue_burst(dev_id, queue_id, NULL, 0);
|
|
|
|
/* dequeue burst */
|
|
burst_dequeued = rte_cryptodev_dequeue_burst(dev_id, queue_id,
|
|
proc_ops, pparams->burst_size);
|
|
if (burst_dequeued == 0)
|
|
failed_polls++;
|
|
else {
|
|
processed += burst_dequeued;
|
|
for (m = 0; m < burst_dequeued; m++)
|
|
rte_crypto_op_free(proc_ops[m]);
|
|
}
|
|
}
|
|
|
|
tsc_end = rte_rdtsc_precise();
|
|
|
|
double ops_s = ((double)processed / (tsc_end - tsc_start)) * rte_get_tsc_hz();
|
|
double cycles_burst = (double) (tsc_end - tsc_start) /
|
|
(double) processed * pparams->burst_size;
|
|
double cycles_buff = (double) (tsc_end - tsc_start) / (double) processed;
|
|
double cycles_B = cycles_buff / pparams->buf_size;
|
|
double throughput = (ops_s * pparams->buf_size * 8) / 1000000;
|
|
|
|
if (gbl_cryptodev_perftest_devtype == RTE_CRYPTODEV_QAT_SYM_PMD) {
|
|
/* Cycle count misleading on HW devices for this test, so don't print */
|
|
printf("%4u\t%6.2f\t%10.2f\t n/a \t\t n/a "
|
|
"\t\t n/a \t\t%8"PRIu64"\t%8"PRIu64,
|
|
pparams->buf_size, ops_s/1000000,
|
|
throughput, retries, failed_polls);
|
|
} else {
|
|
printf("%4u\t%6.2f\t%10.2f\t%10.2f\t%8.2f"
|
|
"\t%8.2f\t%8"PRIu64"\t%8"PRIu64,
|
|
pparams->buf_size, ops_s/1000000, throughput, cycles_burst,
|
|
cycles_buff, cycles_B, retries, failed_polls);
|
|
}
|
|
|
|
for (i = 0; i < pparams->burst_size * NUM_MBUF_SETS; i++)
|
|
rte_pktmbuf_free(mbufs[i]);
|
|
|
|
printf("\n");
|
|
return TEST_SUCCESS;
|
|
}
|
|
|
|
/*
|
|
|
|
perf_test_aes_sha("avx2", HASH_CIPHER, 16, CBC, SHA1);
|
|
perf_test_aes_sha("avx2", HASH_CIPHER, 16, CBC, SHA_256);
|
|
perf_test_aes_sha("avx2", HASH_CIPHER, 16, CBC, SHA_512);
|
|
|
|
perf_test_aes_sha("avx2", CIPHER_HASH, 32, CBC, SHA1);
|
|
perf_test_aes_sha("avx2", CIPHER_HASH, 32, CBC, SHA_256);
|
|
perf_test_aes_sha("avx2", CIPHER_HASH, 32, CBC, SHA_512);
|
|
|
|
perf_test_aes_sha("avx2", HASH_CIPHER, 32, CBC, SHA1);
|
|
perf_test_aes_sha("avx2", HASH_CIPHER, 32, CBC, SHA_256);
|
|
perf_test_aes_sha("avx2", HASH_CIPHER, 32, CBC, SHA_512);
|
|
*/
|
|
static int
|
|
test_perf_aes_cbc_encrypt_digest_vary_pkt_size(void)
|
|
{
|
|
unsigned total_operations = 1000000;
|
|
unsigned burst_size = 32;
|
|
unsigned buf_lengths[] = { 64, 128, 256, 512, 768, 1024, 1280, 1536, 1792, 2048 };
|
|
uint8_t i, j;
|
|
|
|
struct perf_test_params params_set[] = {
|
|
{
|
|
.chain = CIPHER_HASH,
|
|
|
|
.cipher_algo = RTE_CRYPTO_CIPHER_AES_CBC,
|
|
.cipher_key_length = 16,
|
|
.auth_algo = RTE_CRYPTO_AUTH_SHA1_HMAC
|
|
},
|
|
{
|
|
.chain = CIPHER_HASH,
|
|
|
|
.cipher_algo = RTE_CRYPTO_CIPHER_AES_CBC,
|
|
.cipher_key_length = 16,
|
|
.auth_algo = RTE_CRYPTO_AUTH_SHA256_HMAC
|
|
},
|
|
{
|
|
.chain = CIPHER_HASH,
|
|
|
|
.cipher_algo = RTE_CRYPTO_CIPHER_AES_CBC,
|
|
.cipher_key_length = 16,
|
|
.auth_algo = RTE_CRYPTO_AUTH_SHA512_HMAC
|
|
},
|
|
{
|
|
.chain = CIPHER_HASH,
|
|
|
|
.cipher_algo = RTE_CRYPTO_CIPHER_AES_CBC,
|
|
.cipher_key_length = 32,
|
|
.auth_algo = RTE_CRYPTO_AUTH_SHA1_HMAC
|
|
},
|
|
{
|
|
.chain = CIPHER_HASH,
|
|
|
|
.cipher_algo = RTE_CRYPTO_CIPHER_AES_CBC,
|
|
.cipher_key_length = 32,
|
|
.auth_algo = RTE_CRYPTO_AUTH_SHA256_HMAC
|
|
},
|
|
{
|
|
.chain = CIPHER_HASH,
|
|
|
|
.cipher_algo = RTE_CRYPTO_CIPHER_AES_CBC,
|
|
.cipher_key_length = 32,
|
|
.auth_algo = RTE_CRYPTO_AUTH_SHA512_HMAC
|
|
},
|
|
};
|
|
|
|
for (i = 0; i < RTE_DIM(params_set); i++) {
|
|
|
|
params_set[i].total_operations = total_operations;
|
|
params_set[i].burst_size = burst_size;
|
|
printf("\n%s. cipher algo: %s auth algo: %s cipher key size=%u."
|
|
" burst_size: %d ops\n",
|
|
chain_mode_name(params_set[i].chain),
|
|
cipher_algo_name(params_set[i].cipher_algo),
|
|
auth_algo_name(params_set[i].auth_algo),
|
|
params_set[i].cipher_key_length,
|
|
burst_size);
|
|
printf("\nBuffer Size(B)\tOPS(M)\tThroughput(Gbps)\t"
|
|
"Retries\tEmptyPolls\n");
|
|
for (j = 0; j < RTE_DIM(buf_lengths); j++) {
|
|
params_set[i].buf_size = buf_lengths[j];
|
|
test_perf_aes_sha(testsuite_params.dev_id, 0,
|
|
¶ms_set[i]);
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
test_perf_snow3G_vary_pkt_size(void)
|
|
{
|
|
unsigned total_operations = 1000000;
|
|
uint8_t i, j;
|
|
unsigned k;
|
|
uint16_t burst_sizes[] = {64};
|
|
uint16_t buf_lengths[] = {40, 64, 80, 120, 240, 256, 400, 512, 600, 1024, 2048};
|
|
|
|
struct perf_test_params params_set[] = {
|
|
{
|
|
.chain = CIPHER_ONLY,
|
|
.cipher_algo = RTE_CRYPTO_CIPHER_SNOW3G_UEA2,
|
|
.cipher_key_length = 16,
|
|
.auth_algo = RTE_CRYPTO_AUTH_NULL,
|
|
},
|
|
{
|
|
.chain = HASH_ONLY,
|
|
.cipher_algo = RTE_CRYPTO_CIPHER_NULL,
|
|
.auth_algo = RTE_CRYPTO_AUTH_SNOW3G_UIA2,
|
|
.cipher_key_length = 16
|
|
},
|
|
};
|
|
|
|
printf("\n\nStart %s.", __func__);
|
|
printf("\nTest to measure max throughput at various pkt sizes.");
|
|
printf("\nOn HW devices t'put maximised when high Retries and EmptyPolls"
|
|
" so cycle cost not relevant (n/a displayed).");
|
|
|
|
for (i = 0; i < RTE_DIM(params_set); i++) {
|
|
printf("\n\n");
|
|
params_set[i].total_operations = total_operations;
|
|
for (k = 0; k < RTE_DIM(burst_sizes); k++) {
|
|
printf("\nOn %s dev%u qp%u, %s, "
|
|
"cipher algo:%s, auth algo:%s, burst_size: %d ops",
|
|
pmd_name(gbl_cryptodev_perftest_devtype),
|
|
testsuite_params.dev_id, 0,
|
|
chain_mode_name(params_set[i].chain),
|
|
cipher_algo_name(params_set[i].cipher_algo),
|
|
auth_algo_name(params_set[i].auth_algo),
|
|
burst_sizes[k]);
|
|
|
|
params_set[i].burst_size = burst_sizes[k];
|
|
printf("\nPktSzB\tOp/s(M)\tThruput(Mbps)\tCycles/Burst\t"
|
|
"Cycles/buf\tCycles/B\tRetries\t\tEmptyPolls\n");
|
|
for (j = 0; j < RTE_DIM(buf_lengths); j++) {
|
|
|
|
params_set[i].buf_size = buf_lengths[j];
|
|
|
|
test_perf_snow3g(testsuite_params.dev_id, 0, ¶ms_set[i]);
|
|
}
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
test_perf_aes_cbc_vary_burst_size(void)
|
|
{
|
|
return test_perf_crypto_qp_vary_burst_size(testsuite_params.dev_id);
|
|
}
|
|
|
|
#if 1
|
|
static struct unit_test_suite cryptodev_testsuite = {
|
|
.suite_name = "Crypto Device Unit Test Suite",
|
|
.setup = testsuite_setup,
|
|
.teardown = testsuite_teardown,
|
|
.unit_test_cases = {
|
|
TEST_CASE_ST(ut_setup, ut_teardown,
|
|
test_perf_aes_cbc_encrypt_digest_vary_pkt_size),
|
|
TEST_CASE_ST(ut_setup, ut_teardown,
|
|
test_perf_aes_cbc_vary_burst_size),
|
|
TEST_CASES_END() /**< NULL terminate unit test array */
|
|
}
|
|
};
|
|
#endif
|
|
static struct unit_test_suite cryptodev_aes_testsuite = {
|
|
.suite_name = "Crypto Device AESNI MB Unit Test Suite",
|
|
.setup = testsuite_setup,
|
|
.teardown = testsuite_teardown,
|
|
.unit_test_cases = {
|
|
TEST_CASE_ST(ut_setup, ut_teardown,
|
|
test_perf_aes_cbc_encrypt_digest_vary_pkt_size),
|
|
TEST_CASES_END() /**< NULL terminate unit test array */
|
|
}
|
|
};
|
|
|
|
static struct unit_test_suite cryptodev_snow3g_testsuite = {
|
|
.suite_name = "Crypto Device Snow3G Unit Test Suite",
|
|
.setup = testsuite_setup,
|
|
.teardown = testsuite_teardown,
|
|
.unit_test_cases = {
|
|
TEST_CASE_ST(ut_setup, ut_teardown,
|
|
test_perf_snow3G_vary_pkt_size),
|
|
TEST_CASE_ST(ut_setup, ut_teardown,
|
|
test_perf_snow3G_vary_burst_size),
|
|
TEST_CASES_END() /**< NULL terminate unit test array */
|
|
}
|
|
};
|
|
|
|
static int
|
|
perftest_aesni_mb_cryptodev(void /*argv __rte_unused, int argc __rte_unused*/)
|
|
{
|
|
gbl_cryptodev_perftest_devtype = RTE_CRYPTODEV_AESNI_MB_PMD;
|
|
|
|
return unit_test_suite_runner(&cryptodev_aes_testsuite);
|
|
}
|
|
|
|
static int
|
|
perftest_qat_cryptodev(void /*argv __rte_unused, int argc __rte_unused*/)
|
|
{
|
|
gbl_cryptodev_perftest_devtype = RTE_CRYPTODEV_QAT_SYM_PMD;
|
|
|
|
return unit_test_suite_runner(&cryptodev_testsuite);
|
|
}
|
|
|
|
static int
|
|
perftest_sw_snow3g_cryptodev(void /*argv __rte_unused, int argc __rte_unused*/)
|
|
{
|
|
gbl_cryptodev_perftest_devtype = RTE_CRYPTODEV_SNOW3G_PMD;
|
|
|
|
return unit_test_suite_runner(&cryptodev_snow3g_testsuite);
|
|
}
|
|
|
|
static int
|
|
perftest_qat_snow3g_cryptodev(void /*argv __rte_unused, int argc __rte_unused*/)
|
|
{
|
|
gbl_cryptodev_perftest_devtype = RTE_CRYPTODEV_QAT_SYM_PMD;
|
|
|
|
return unit_test_suite_runner(&cryptodev_snow3g_testsuite);
|
|
}
|
|
|
|
static struct test_command cryptodev_aesni_mb_perf_cmd = {
|
|
.command = "cryptodev_aesni_mb_perftest",
|
|
.callback = perftest_aesni_mb_cryptodev,
|
|
};
|
|
|
|
static struct test_command cryptodev_qat_perf_cmd = {
|
|
.command = "cryptodev_qat_perftest",
|
|
.callback = perftest_qat_cryptodev,
|
|
};
|
|
|
|
static struct test_command cryptodev_sw_snow3g_perf_cmd = {
|
|
.command = "cryptodev_sw_snow3g_perftest",
|
|
.callback = perftest_sw_snow3g_cryptodev,
|
|
};
|
|
|
|
static struct test_command cryptodev_qat_snow3g_perf_cmd = {
|
|
.command = "cryptodev_qat_snow3g_perftest",
|
|
.callback = perftest_qat_snow3g_cryptodev,
|
|
};
|
|
|
|
REGISTER_TEST_COMMAND(cryptodev_aesni_mb_perf_cmd);
|
|
REGISTER_TEST_COMMAND(cryptodev_qat_perf_cmd);
|
|
REGISTER_TEST_COMMAND(cryptodev_sw_snow3g_perf_cmd);
|
|
REGISTER_TEST_COMMAND(cryptodev_qat_snow3g_perf_cmd);
|