summaryrefslogtreecommitdiff
path: root/security/nss/cmd/bltest/tests/aes_cts/aes-cts-type-1-vectors.txt
diff options
context:
space:
mode:
Diffstat (limited to 'security/nss/cmd/bltest/tests/aes_cts/aes-cts-type-1-vectors.txt')
-rw-r--r--security/nss/cmd/bltest/tests/aes_cts/aes-cts-type-1-vectors.txt47
1 files changed, 0 insertions, 47 deletions
diff --git a/security/nss/cmd/bltest/tests/aes_cts/aes-cts-type-1-vectors.txt b/security/nss/cmd/bltest/tests/aes_cts/aes-cts-type-1-vectors.txt
deleted file mode 100644
index b10758676..000000000
--- a/security/nss/cmd/bltest/tests/aes_cts/aes-cts-type-1-vectors.txt
+++ /dev/null
@@ -1,47 +0,0 @@
-# Raeburn Standards Track [Page 12]
-#
-# RFC 3962 AES Encryption for Kerberos 5 February 2005
-#
-# Some test vectors for CBC with ciphertext stealing, using an initial
-# vector of all-zero.
-#
-# Original Test vectors were for AES CTS-3 (Kerberos). These test vectors have been modified for AES CTS-1 (NIST)
-#
-
-Key: 63 68 69 63 6b 65 6e 20 74 65 72 69 79 61 6b 69
-IV: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
-Input: 49 20 77 6f 75 6c 64 20 6c 69 6b 65 20 74 68 65 20
-Output: 97 c6 35 35 68 f2 bf 8c b4 d8 a5 80 36 2d a7 ff 7f
-Next IV: c6 35 35 68 f2 bf 8c b4 d8 a5 80 36 2d a7 ff 7f
-
-Key: 63 68 69 63 6b 65 6e 20 74 65 72 69 79 61 6b 69
-IV: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
-Input: 49 20 77 6f 75 6c 64 20 6c 69 6b 65 20 74 68 65 20 47 65 6e 65 72 61 6c 20 47 61 75 27 73 20
-Output: 97 68 72 68 d6 ec cc c0 c0 7b 25 e2 5e cf e5 fc 00 78 3e 0e fd b2 c1 d4 45 d4 c8 ef f7 ed 22
-Next IV: fc 00 78 3e 0e fd b2 c1 d4 45 d4 c8 ef f7 ed 22
-
-Key: 63 68 69 63 6b 65 6e 20 74 65 72 69 79 61 6b 69
-IV: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
-Input: 49 20 77 6f 75 6c 64 20 6c 69 6b 65 20 74 68 65 20 47 65 6e 65 72 61 6c 20 47 61 75 27 73 20 43
-Output: 97 68 72 68 d6 ec cc c0 c0 7b 25 e2 5e cf e5 84 39 31 25 23 a7 86 62 d5 be 7f cb cc 98 eb f5 a8
-Next IV: 39 31 25 23 a7 86 62 d5 be 7f cb cc 98 eb f5 a8
-
-Key: 63 68 69 63 6b 65 6e 20 74 65 72 69 79 61 6b 69
-IV: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
-Input: 49 20 77 6f 75 6c 64 20 6c 69 6b 65 20 74 68 65 20 47 65 6e 65 72 61 6c 20 47 61 75 27 73 20 43 68 69 63 6b 65 6e 2c 20 70 6c 65 61 73 65 2c
-Output: 97 68 72 68 d6 ec cc c0 c0 7b 25 e2 5e cf e5 84 39 31 25 23 a7 86 62 d5 be 7f cb cc 98 eb f5 b3 ff fd 94 0c 16 a1 8c 1b 55 49 d2 f8 38 02 9e
-Next IV: b3 ff fd 94 0c 16 a1 8c 1b 55 49 d2 f8 38 02 9e
-
-Key: 63 68 69 63 6b 65 6e 20 74 65 72 69 79 61 6b 69
-IV: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
-Input: 49 20 77 6f 75 6c 64 20 6c 69 6b 65 20 74 68 65 20 47 65 6e 65 72 61 6c 20 47 61 75 27 73 20 43 68 69 63 6b 65 6e 2c 20 70 6c 65 61 73 65 2c 20
-Output: 97 68 72 68 d6 ec cc c0 c0 7b 25 e2 5e cf e5 84 39 31 25 23 a7 86 62 d5 be 7f cb cc 98 eb f5 a8 9d ad 8b bb 96 c4 cd c0 3b c1 03 e1 a1 94 bb d8
-Next IV: 9d ad 8b bb 96 c4 cd c0 3b c1 03 e1 a1 94 bb d8
-
-Key: 63 68 69 63 6b 65 6e 20 74 65 72 69 79 61 6b 69
-IV: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
-Input: 49 20 77 6f 75 6c 64 20 6c 69 6b 65 20 74 68 65 20 47 65 6e 65 72 61 6c 20 47 61 75 27 73 20 43 68 69 63 6b 65 6e 2c 20 70 6c 65 61 73 65 2c 20 61 6e 64 20 77 6f 6e 74 6f 6e 20 73 6f 75 70 2e
-Output: 97 68 72 68 d6 ec cc c0 c0 7b 25 e2 5e cf e5 84 39 31 25 23 a7 86 62 d5 be 7f cb cc 98 eb f5 a8 9d ad 8b bb 96 c4 cd c0 3b c1 03 e1 a1 94 bb d8 48 07 ef e8 36 ee 89 a5 26 73 0d bc 2f 7b c8 40
-Next IV: 48 07 ef e8 36 ee 89 a5 26 73 0d bc 2f 7b c8 40
-
-