diff options
Diffstat (limited to 'security/nss/cmd/bltest/tests/aes_cts/aes-cts-type-1-vectors.txt')
-rw-r--r-- | security/nss/cmd/bltest/tests/aes_cts/aes-cts-type-1-vectors.txt | 47 |
1 files changed, 0 insertions, 47 deletions
diff --git a/security/nss/cmd/bltest/tests/aes_cts/aes-cts-type-1-vectors.txt b/security/nss/cmd/bltest/tests/aes_cts/aes-cts-type-1-vectors.txt deleted file mode 100644 index b10758676..000000000 --- a/security/nss/cmd/bltest/tests/aes_cts/aes-cts-type-1-vectors.txt +++ /dev/null @@ -1,47 +0,0 @@ -# Raeburn Standards Track [Page 12] -# -# RFC 3962 AES Encryption for Kerberos 5 February 2005 -# -# Some test vectors for CBC with ciphertext stealing, using an initial -# vector of all-zero. -# -# Original Test vectors were for AES CTS-3 (Kerberos). These test vectors have been modified for AES CTS-1 (NIST) -# - -Key: 63 68 69 63 6b 65 6e 20 74 65 72 69 79 61 6b 69 -IV: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 -Input: 49 20 77 6f 75 6c 64 20 6c 69 6b 65 20 74 68 65 20 -Output: 97 c6 35 35 68 f2 bf 8c b4 d8 a5 80 36 2d a7 ff 7f -Next IV: c6 35 35 68 f2 bf 8c b4 d8 a5 80 36 2d a7 ff 7f - -Key: 63 68 69 63 6b 65 6e 20 74 65 72 69 79 61 6b 69 -IV: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 -Input: 49 20 77 6f 75 6c 64 20 6c 69 6b 65 20 74 68 65 20 47 65 6e 65 72 61 6c 20 47 61 75 27 73 20 -Output: 97 68 72 68 d6 ec cc c0 c0 7b 25 e2 5e cf e5 fc 00 78 3e 0e fd b2 c1 d4 45 d4 c8 ef f7 ed 22 -Next IV: fc 00 78 3e 0e fd b2 c1 d4 45 d4 c8 ef f7 ed 22 - -Key: 63 68 69 63 6b 65 6e 20 74 65 72 69 79 61 6b 69 -IV: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 -Input: 49 20 77 6f 75 6c 64 20 6c 69 6b 65 20 74 68 65 20 47 65 6e 65 72 61 6c 20 47 61 75 27 73 20 43 -Output: 97 68 72 68 d6 ec cc c0 c0 7b 25 e2 5e cf e5 84 39 31 25 23 a7 86 62 d5 be 7f cb cc 98 eb f5 a8 -Next IV: 39 31 25 23 a7 86 62 d5 be 7f cb cc 98 eb f5 a8 - -Key: 63 68 69 63 6b 65 6e 20 74 65 72 69 79 61 6b 69 -IV: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 -Input: 49 20 77 6f 75 6c 64 20 6c 69 6b 65 20 74 68 65 20 47 65 6e 65 72 61 6c 20 47 61 75 27 73 20 43 68 69 63 6b 65 6e 2c 20 70 6c 65 61 73 65 2c -Output: 97 68 72 68 d6 ec cc c0 c0 7b 25 e2 5e cf e5 84 39 31 25 23 a7 86 62 d5 be 7f cb cc 98 eb f5 b3 ff fd 94 0c 16 a1 8c 1b 55 49 d2 f8 38 02 9e -Next IV: b3 ff fd 94 0c 16 a1 8c 1b 55 49 d2 f8 38 02 9e - -Key: 63 68 69 63 6b 65 6e 20 74 65 72 69 79 61 6b 69 -IV: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 -Input: 49 20 77 6f 75 6c 64 20 6c 69 6b 65 20 74 68 65 20 47 65 6e 65 72 61 6c 20 47 61 75 27 73 20 43 68 69 63 6b 65 6e 2c 20 70 6c 65 61 73 65 2c 20 -Output: 97 68 72 68 d6 ec cc c0 c0 7b 25 e2 5e cf e5 84 39 31 25 23 a7 86 62 d5 be 7f cb cc 98 eb f5 a8 9d ad 8b bb 96 c4 cd c0 3b c1 03 e1 a1 94 bb d8 -Next IV: 9d ad 8b bb 96 c4 cd c0 3b c1 03 e1 a1 94 bb d8 - -Key: 63 68 69 63 6b 65 6e 20 74 65 72 69 79 61 6b 69 -IV: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 -Input: 49 20 77 6f 75 6c 64 20 6c 69 6b 65 20 74 68 65 20 47 65 6e 65 72 61 6c 20 47 61 75 27 73 20 43 68 69 63 6b 65 6e 2c 20 70 6c 65 61 73 65 2c 20 61 6e 64 20 77 6f 6e 74 6f 6e 20 73 6f 75 70 2e -Output: 97 68 72 68 d6 ec cc c0 c0 7b 25 e2 5e cf e5 84 39 31 25 23 a7 86 62 d5 be 7f cb cc 98 eb f5 a8 9d ad 8b bb 96 c4 cd c0 3b c1 03 e1 a1 94 bb d8 48 07 ef e8 36 ee 89 a5 26 73 0d bc 2f 7b c8 40 -Next IV: 48 07 ef e8 36 ee 89 a5 26 73 0d bc 2f 7b c8 40 - - |