Path: blob/master/test/jdk/com/sun/crypto/provider/Cipher/AEAD/GCMBufferTest.java
66649 views
/*1* Copyright (c) 2020, 2021, Oracle and/or its affiliates. All rights reserved.2* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.3*4* This code is free software; you can redistribute it and/or modify it5* under the terms of the GNU General Public License version 2 only, as6* published by the Free Software Foundation.7*8* This code is distributed in the hope that it will be useful, but WITHOUT9* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or10* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License11* version 2 for more details (a copy is included in the LICENSE file that12* accompanied this code).13*14* You should have received a copy of the GNU General Public License version15* 2 along with this work; if not, write to the Free Software Foundation,16* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.17*18* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA19* or visit www.oracle.com if you need additional information or have any20* questions.21*/2223/*24* @test25* @summary Use Cipher update and doFinal with a mixture of byte[], bytebuffer,26* and offset while verifying return values. Also using different and27* in-place buffers.28*29* in-place is not tested with different buffer types as it is not a logical30* scenario and is complicated by getOutputSize calculations.31*/3233import javax.crypto.Cipher;34import javax.crypto.SecretKey;35import javax.crypto.spec.GCMParameterSpec;36import javax.crypto.spec.SecretKeySpec;37import java.io.ByteArrayOutputStream;38import java.nio.ByteBuffer;39import java.security.SecureRandom;40import java.util.Arrays;41import java.util.HashMap;42import java.util.HexFormat;43import java.util.List;4445public class GCMBufferTest implements Cloneable {4647// Data type for the operation48enum dtype { BYTE, HEAP, DIRECT };49// Data map50static HashMap<String, List<Data>> datamap = new HashMap<>();51// List of enum values for order of operation52List<dtype> ops;5354static final int AESBLOCK = 16;55// The remaining input data length is inserted at the particular index56// in sizes[] during execution.57static final int REMAINDER = -1;5859String algo;60boolean same = true;61int[] sizes;62boolean incremental = false;63// In some cases the theoretical check is too complicated to verify64boolean theoreticalCheck;65List<Data> dataSet;66int inOfs = 0, outOfs = 0;67static HexFormat hex = HexFormat.of();6869static class Data {70int id;71SecretKey key;72byte[] iv;73byte[] pt;74byte[] aad;75byte[] ct;76byte[] tag;7778Data(String keyalgo, int id, String key, String iv, byte[] pt, String aad,79String ct, String tag) {80this.id = id;81this.key = new SecretKeySpec(HexToBytes(key), keyalgo);82this.iv = HexToBytes(iv);83this.pt = pt;84this.aad = HexToBytes(aad);85this.ct = HexToBytes(ct);86this.tag = HexToBytes(tag);87}8889Data(String keyalgo, int id, String key, String iv, String pt, String aad,90String ct, String tag) {91this(keyalgo, id, key, iv, HexToBytes(pt), aad, ct, tag);92}9394Data(String keyalgo, int id, String key, int ptlen) {95this.id = id;96this.key = new SecretKeySpec(HexToBytes(key), keyalgo);97iv = new byte[16];98pt = new byte[ptlen];99tag = new byte[12];100aad = new byte[0];101byte[] tct = null;102try {103SecureRandom r = new SecureRandom();104r.nextBytes(iv);105r.nextBytes(pt);106Cipher c = Cipher.getInstance("AES/GCM/NoPadding");107c.init(Cipher.ENCRYPT_MODE, this.key,108new GCMParameterSpec(tag.length * 8, this.iv));109tct = c.doFinal(pt);110} catch (Exception e) {111throw new RuntimeException("Error in generating data for length " +112ptlen, e);113}114ct = new byte[ptlen];115System.arraycopy(tct, 0, ct, 0, ct.length);116System.arraycopy(tct, ct.length, tag, 0, tag.length);117}118119private static final byte[] HexToBytes(String hexVal) {120if (hexVal == null) {121return new byte[0];122}123return hex.parseHex(hexVal);124}125126}127128/**129* Construct a test with an algorithm and a list of dtype.130* @param algo Algorithm string131* @param ops List of dtypes. If only one dtype is specified, only a132* doFinal operation will occur. If multiple dtypes are133* specified, the last is a doFinal, the others are updates.134*/135GCMBufferTest(String algo, List<dtype> ops) {136this.algo = algo;137this.ops = ops;138theoreticalCheck = true;139dataSet = datamap.get(algo);140}141142public GCMBufferTest clone() throws CloneNotSupportedException{143return (GCMBufferTest)super.clone();144}145146/**147* Define particular data sizes to be tested. "REMAINDER", which has a148* value of -1, can be used to insert the remaining input text length at149* that index during execution.150* @param sizes Data sizes for each dtype in the list.151*/152GCMBufferTest dataSegments(int[] sizes) {153this.sizes = sizes;154return this;155}156157/**158* Do not perform in-place operations159*/160GCMBufferTest differentBufferOnly() {161this.same = false;162return this;163}164165/**166* Enable incrementing through each data size available. This can only be167* used when the List has more than one dtype entry.168*/169GCMBufferTest incrementalSegments() {170this.incremental = true;171return this;172}173174/**175* Specify a particular test dataset.176*177* @param id id value for the test data to used in this test.178*/179GCMBufferTest dataSet(int id) throws Exception {180for (Data d : datamap.get(algo)) {181if (d.id == id) {182dataSet = List.of(d);183return this;184}185}186throw new Exception("Unable to find dataSet id = " + id);187}188189/**190* Set both input and output offsets to the same offset191* @param offset value for inOfs and outOfs192* @return193*/194GCMBufferTest offset(int offset) {195this.inOfs = offset;196this.outOfs = offset;197return this;198}199200/**201* Set the input offset202* @param offset value for input offset203* @return204*/205GCMBufferTest inOfs(int offset) {206this.inOfs = offset;207return this;208}209210/**211* Set the output offset212* @param offset value for output offset213* @return214*/215GCMBufferTest outOfs(int offset) {216this.outOfs = offset;217return this;218}219220/**221* Reverse recursive loop that starts at the end-1 index, going to 0, in222* the size array to calculate all the possible sizes.223* It returns the remaining data size not used in the loop. This remainder224* is used for the end index which is the doFinal op.225*/226int inc(int index, int max, int total) {227if (sizes[index] == max - total) {228sizes[index + 1]++;229total++;230sizes[index] = 0;231} else if (index == 0) {232sizes[index]++;233}234235total += sizes[index];236if (index > 0) {237return inc(index - 1, max, total);238}239return total;240}241242// Call recursive loop and take returned remainder value for last index243boolean incrementSizes(int max) {244sizes[ops.size() - 1] = max - inc(ops.size() - 2, max, 0);245if (sizes[ops.size() - 2] == max) {246// We are at the end, exit test loop247return false;248}249return true;250}251252void test() throws Exception {253int i = 1;254System.err.println("Algo: " + algo + " \tOps: " + ops.toString());255for (Data data : dataSet) {256257// If incrementalSegments is enabled, run through that test only258if (incremental) {259if (ops.size() < 2) {260throw new Exception("To do incrementalSegments you must" +261"have more that 1 dtype in the list");262}263sizes = new int[ops.size()];264265while (incrementSizes(data.pt.length)) {266System.err.print("Encrypt: Data Index: " + i + " \tSizes[ ");267for (int v : sizes) {268System.err.print(v + " ");269}270System.err.println("]");271encrypt(data);272}273Arrays.fill(sizes, 0);274275while (incrementSizes(data.ct.length + data.tag.length)) {276System.err.print("Decrypt: Data Index: " + i + " \tSizes[ ");277for (int v : sizes) {278System.err.print(v + " ");279}280System.err.println("]");281decrypt(data);282}283284} else {285// Default test of 0 and 2 offset doing in place and different286// i/o buffers287System.err.println("Encrypt: Data Index: " + i);288encrypt(data);289290System.err.println("Decrypt: Data Index: " + i);291decrypt(data);292}293i++;294}295}296297// Setup data for encryption298void encrypt(Data data) throws Exception {299byte[] input, output;300301input = data.pt;302output = new byte[data.ct.length + data.tag.length];303System.arraycopy(data.ct, 0, output, 0, data.ct.length);304System.arraycopy(data.tag, 0, output, data.ct.length,305data.tag.length);306307// Test different input/output buffers308System.err.println("\tinput len: " + input.length + " inOfs " +309inOfs + " outOfs " + outOfs + " in/out buffer: different");310crypto(true, data, input, output);311312// Test with in-place buffers313if (same) {314System.err.println("\tinput len: " + input.length + " inOfs " +315inOfs + " outOfs " + outOfs + " in/out buffer: in-place");316cryptoSameBuffer(true, data, input, output);317}318}319320// Setup data for decryption321void decrypt(Data data) throws Exception {322byte[] input, output;323324input = new byte[data.ct.length + data.tag.length];325System.arraycopy(data.ct, 0, input, 0, data.ct.length);326System.arraycopy(data.tag, 0, input, data.ct.length, data.tag.length);327output = data.pt;328329// Test different input/output buffers330System.err.println("\tinput len: " + input.length + " inOfs " +331inOfs + " outOfs " + outOfs + " in/out buffer: different");332crypto(false, data, input, output);333334// Test with in-place buffers335if (same) {336System.err.println("\tinput len: " + input.length + " inOfs " +337inOfs + " outOfs " + outOfs + " in-place: same");338cryptoSameBuffer(false, data, input, output);339}340}341342/**343* Perform cipher operation using different input and output buffers.344* This method allows mixing of data types (byte, heap, direct).345*/346void crypto(boolean encrypt, Data d, byte[] input, byte[] output)347throws Exception {348byte[] pt = new byte[input.length + inOfs];349System.arraycopy(input, 0, pt, inOfs, input.length);350byte[] expectedOut = new byte[output.length + outOfs];351System.arraycopy(output, 0, expectedOut, outOfs, output.length);352int plen = input.length / ops.size(); // partial input length353int theoreticallen;// expected output length354int dataoffset = 0; // offset of unconsumed data in pt355int index = 0; // index of which op we are on356int rlen; // result length357int pbuflen = 0; // plen remaining in the GCM internal buffers358359Cipher cipher = Cipher.getInstance(algo);360cipher.init((encrypt ? Cipher.ENCRYPT_MODE : Cipher.DECRYPT_MODE),361d.key, new GCMParameterSpec(d.tag.length * 8, d.iv));362cipher.updateAAD(d.aad);363364ByteArrayOutputStream ba = new ByteArrayOutputStream();365ba.write(new byte[outOfs], 0, outOfs);366for (dtype v : ops) {367if (index < ops.size() - 1) {368if (sizes != null && input.length > 0) {369if (sizes[index] == -1) {370plen = input.length - dataoffset;371} else {372if (sizes[index] > input.length) {373plen = input.length;374} else {375plen = sizes[index];376}377}378}379380int olen = cipher.getOutputSize(plen) + outOfs;381382/*383* The theoretical limit is the length of the data sent to384* update() + any data might be setting in CipherCore or GCM385* internal buffers % the block size.386*/387theoreticallen = (plen + pbuflen) - ((plen + pbuflen) % AESBLOCK);388389// Update operations390switch (v) {391case BYTE -> {392byte[] out = new byte[olen];393rlen = cipher.update(pt, dataoffset + inOfs, plen, out,394outOfs);395ba.write(out, outOfs, rlen);396}397case HEAP -> {398ByteBuffer b = ByteBuffer.allocate(plen + outOfs);399b.position(outOfs);400b.put(pt, dataoffset + inOfs, plen);401b.flip();402b.position(outOfs);403ByteBuffer out = ByteBuffer.allocate(olen);404out.position(outOfs);405rlen = cipher.update(b, out);406ba.write(out.array(), outOfs, rlen);407}408case DIRECT -> {409ByteBuffer b = ByteBuffer.allocateDirect(plen + outOfs);410b.position(outOfs);411b.put(pt, dataoffset + inOfs, plen);412b.flip();413b.position(outOfs);414ByteBuffer out = ByteBuffer.allocateDirect(olen);415out.position(outOfs);416rlen = cipher.update(b, out);417byte[] o = new byte[rlen];418out.flip();419out.position(outOfs);420out.get(o, 0, rlen);421ba.write(o);422}423default -> throw new Exception("Unknown op: " + v.name());424}425426if (theoreticalCheck) {427pbuflen += plen - rlen;428if (encrypt && rlen != theoreticallen) {429throw new Exception("Wrong update return len (" +430v.name() + "): " + "rlen=" + rlen +431", expected output len=" + theoreticallen);432}433}434435dataoffset += plen;436index++;437438} else {439// doFinal operation440plen = input.length - dataoffset;441442int olen = cipher.getOutputSize(plen) + outOfs;443switch (v) {444case BYTE -> {445byte[] out = new byte[olen];446rlen = cipher.doFinal(pt, dataoffset + inOfs,447plen, out, outOfs);448ba.write(out, outOfs, rlen);449}450case HEAP -> {451ByteBuffer b = ByteBuffer.allocate(plen + inOfs);452b.limit(b.capacity());453b.position(inOfs);454b.put(pt, dataoffset + inOfs, plen);455b.flip();456b.position(inOfs);457ByteBuffer out = ByteBuffer.allocate(olen);458out.limit(out.capacity());459out.position(outOfs);460rlen = cipher.doFinal(b, out);461ba.write(out.array(), outOfs, rlen);462}463case DIRECT -> {464ByteBuffer b = ByteBuffer.allocateDirect(plen + inOfs);465b.limit(b.capacity());466b.position(inOfs);467b.put(pt, dataoffset + inOfs, plen);468b.flip();469b.position(inOfs);470ByteBuffer out = ByteBuffer.allocateDirect(olen);471out.limit(out.capacity());472out.position(outOfs);473rlen = cipher.doFinal(b, out);474byte[] o = new byte[rlen];475out.flip();476out.position(outOfs);477out.get(o, 0, rlen);478ba.write(o);479}480default -> throw new Exception("Unknown op: " + v.name());481}482483if (theoreticalCheck && rlen != olen - outOfs) {484throw new Exception("Wrong doFinal return len (" +485v.name() + "): " + "rlen=" + rlen +486", expected output len=" + (olen - outOfs));487}488489// Verify results490byte[] ctresult = ba.toByteArray();491if (ctresult.length != expectedOut.length ||492Arrays.compare(ctresult, expectedOut) != 0) {493String s = "Ciphertext mismatch (" + v.name() +494"):\nresult (len=" + ctresult.length + "): " +495hex.formatHex(ctresult) +496"\nexpected (len=" + output.length + "): " +497hex.formatHex(output);498System.err.println(s);499throw new Exception(s);500501}502}503}504}505506/**507* Perform cipher operation using in-place buffers. This method does not508* allow mixing of data types (byte, heap, direct).509*510* Mixing data types makes no sense for in-place operations and would511* greatly complicate the test code.512*/513void cryptoSameBuffer(boolean encrypt, Data d, byte[] input, byte[] output) throws Exception {514515byte[] data, out;516if (encrypt) {517data = new byte[output.length + Math.max(inOfs, outOfs)];518} else {519data = new byte[input.length + Math.max(inOfs, outOfs)];520}521522ByteBuffer bbin = null, bbout = null;523System.arraycopy(input, 0, data, inOfs, input.length);524byte[] expectedOut = new byte[output.length + outOfs];525System.arraycopy(output, 0, expectedOut, outOfs, output.length);526int plen = input.length / ops.size(); // partial input length527int theorticallen = plen - (plen % AESBLOCK); // output length528int dataoffset = 0;529int index = 0;530int rlen = 0; // result length531int len = 0;532533Cipher cipher = Cipher.getInstance(algo);534cipher.init((encrypt ? Cipher.ENCRYPT_MODE : Cipher.DECRYPT_MODE),535d.key, new GCMParameterSpec(d.tag.length * 8, d.iv));536cipher.updateAAD(d.aad);537538// Prepare data539switch (ops.get(0)) {540case HEAP -> {541bbin = ByteBuffer.wrap(data);542bbin.limit(input.length + inOfs);543bbout = bbin.duplicate();544}545case DIRECT -> {546bbin = ByteBuffer.allocateDirect(data.length);547bbout = bbin.duplicate();548bbin.put(data, 0, input.length + inOfs);549bbin.flip();550}551}552553// Set data limits for bytebuffers554if (bbin != null) {555bbin.position(inOfs);556bbout.limit(output.length + outOfs);557bbout.position(outOfs);558}559560// Iterate through each operation561for (dtype v : ops) {562if (index < ops.size() - 1) {563switch (v) {564case BYTE -> {565rlen = cipher.update(data, dataoffset + inOfs, plen,566data, len + outOfs);567}568case HEAP, DIRECT -> {569theorticallen = bbin.remaining() -570(bbin.remaining() % AESBLOCK);571rlen = cipher.update(bbin, bbout);572}573default -> throw new Exception("Unknown op: " + v.name());574}575576// Check that the theoretical return value matches the actual.577if (theoreticalCheck && encrypt && rlen != theorticallen) {578throw new Exception("Wrong update return len (" +579v.name() + "): " + "rlen=" + rlen +580", expected output len=" + theorticallen);581}582583dataoffset += plen;584len += rlen;585index++;586587} else {588// Run doFinal op589plen = input.length - dataoffset;590591switch (v) {592case BYTE -> {593rlen = cipher.doFinal(data, dataoffset + inOfs,594plen, data, len + outOfs);595out = Arrays.copyOfRange(data, 0,len + rlen + outOfs);596}597case HEAP, DIRECT -> {598rlen = cipher.doFinal(bbin, bbout);599bbout.flip();600out = new byte[bbout.remaining()];601bbout.get(out);602}603default -> throw new Exception("Unknown op: " + v.name());604}605len += rlen;606607// Verify results608if (len != output.length ||609Arrays.compare(out, 0, len, expectedOut, 0,610output.length) != 0) {611String s = "Ciphertext mismatch (" + v.name() +612"):\nresult (len=" + len + "):\n" +613hex.formatHex(out) +614"\nexpected (len=" + output.length + "):\n" +615hex.formatHex(output);616System.err.println(s);617throw new Exception(s);618}619}620}621}622static void offsetTests(GCMBufferTest t) throws Exception {623t.clone().offset(2).test();624t.clone().inOfs(2).test();625// Test not designed for overlap situations626t.clone().outOfs(2).differentBufferOnly().test();627}628629public static void main(String args[]) throws Exception {630GCMBufferTest t;631632initTest();633634// Test single byte array635new GCMBufferTest("AES/GCM/NoPadding", List.of(dtype.BYTE)).test();636offsetTests(new GCMBufferTest("AES/GCM/NoPadding", List.of(dtype.BYTE)));637// Test update-doFinal with byte arrays638new GCMBufferTest("AES/GCM/NoPadding", List.of(dtype.BYTE, dtype.BYTE)).test();639offsetTests(new GCMBufferTest("AES/GCM/NoPadding", List.of(dtype.BYTE, dtype.BYTE)));640// Test update-update-doFinal with byte arrays641new GCMBufferTest("AES/GCM/NoPadding",642List.of(dtype.BYTE, dtype.BYTE, dtype.BYTE)).test();643offsetTests(new GCMBufferTest("AES/GCM/NoPadding", List.of(dtype.BYTE, dtype.BYTE, dtype.BYTE)));644645// Test single heap bytebuffer646new GCMBufferTest("AES/GCM/NoPadding", List.of(dtype.HEAP)).test();647offsetTests(new GCMBufferTest("AES/GCM/NoPadding", List.of(dtype.HEAP)));648// Test update-doFinal with heap bytebuffer649new GCMBufferTest("AES/GCM/NoPadding",650List.of(dtype.HEAP, dtype.HEAP)).test();651offsetTests(new GCMBufferTest("AES/GCM/NoPadding", List.of(dtype.HEAP, dtype.HEAP)));652// Test update-update-doFinal with heap bytebuffer653new GCMBufferTest("AES/GCM/NoPadding",654List.of(dtype.HEAP, dtype.HEAP, dtype.HEAP)).test();655offsetTests(new GCMBufferTest("AES/GCM/NoPadding", List.of(dtype.HEAP, dtype.HEAP, dtype.HEAP)));656657// Test single direct bytebuffer658new GCMBufferTest("AES/GCM/NoPadding", List.of(dtype.DIRECT)).test();659offsetTests(new GCMBufferTest("AES/GCM/NoPadding", List.of(dtype.DIRECT)));660// Test update-doFinal with direct bytebuffer661new GCMBufferTest("AES/GCM/NoPadding",662List.of(dtype.DIRECT, dtype.DIRECT)).test();663offsetTests(new GCMBufferTest("AES/GCM/NoPadding",664List.of(dtype.DIRECT, dtype.DIRECT)));665// Test update-update-doFinal with direct bytebuffer666new GCMBufferTest("AES/GCM/NoPadding",667List.of(dtype.DIRECT, dtype.DIRECT, dtype.DIRECT)).test();668offsetTests(new GCMBufferTest("AES/GCM/NoPadding",669List.of(dtype.DIRECT, dtype.DIRECT, dtype.DIRECT)));670671// Test update-update-doFinal with byte arrays and preset data sizes672t = new GCMBufferTest("AES/GCM/NoPadding",673List.of(dtype.BYTE, dtype.BYTE, dtype.BYTE)).dataSegments(674new int[] { 1, 1, GCMBufferTest.REMAINDER});675t.clone().test();676offsetTests(t.clone());677678// Test update-doFinal with a byte array and a direct bytebuffer679t = new GCMBufferTest("AES/GCM/NoPadding",680List.of(dtype.BYTE, dtype.DIRECT)).differentBufferOnly();681t.clone().test();682offsetTests(t.clone());683// Test update-doFinal with a byte array and heap and direct bytebuffer684t = new GCMBufferTest("AES/GCM/NoPadding",685List.of(dtype.BYTE, dtype.HEAP, dtype.DIRECT)).differentBufferOnly();686t.clone().test();687offsetTests(t.clone());688689// Test update-doFinal with a direct bytebuffer and a byte array.690t = new GCMBufferTest("AES/GCM/NoPadding",691List.of(dtype.DIRECT, dtype.BYTE)).differentBufferOnly();692t.clone().test();693offsetTests(t.clone());694695// Test update-doFinal with a direct bytebuffer and a byte array with696// preset data sizes.697t = new GCMBufferTest("AES/GCM/NoPadding",698List.of(dtype.DIRECT, dtype.BYTE)).differentBufferOnly().699dataSegments(new int[] { 20, GCMBufferTest.REMAINDER });700t.clone().test();701offsetTests(t.clone());702// Test update-update-doFinal with a direct and heap bytebuffer and a703// byte array with preset data sizes.704t = new GCMBufferTest("AES/GCM/NoPadding",705List.of(dtype.DIRECT, dtype.BYTE, dtype.HEAP)).706differentBufferOnly().dataSet(5).707dataSegments(new int[] { 5000, 1000, GCMBufferTest.REMAINDER });708t.clone().test();709offsetTests(t.clone());710711// Test update-update-doFinal with byte arrays, incrementing through712// every data size combination for the Data set 0713new GCMBufferTest("AES/GCM/NoPadding",714List.of(dtype.BYTE, dtype.BYTE, dtype.BYTE)).incrementalSegments().715dataSet(0).test();716// Test update-update-doFinal with direct bytebuffers, incrementing through717// every data size combination for the Data set 0718new GCMBufferTest("AES/GCM/NoPadding",719List.of(dtype.DIRECT, dtype.DIRECT, dtype.DIRECT)).720incrementalSegments().dataSet(0).test();721722new GCMBufferTest("AES/GCM/NoPadding",723List.of(dtype.DIRECT, dtype.DIRECT, dtype.DIRECT)).724dataSegments(new int[] { 49, 0, 2 }).dataSet(0).test();725}726727// Test data728static void initTest() {729datamap.put("AES/GCM/NoPadding", List.of(730// GCM KAT731new Data("AES", 0,732"141f1ce91989b07e7eb6ae1dbd81ea5e",733"49451da24bd6074509d3cebc2c0394c972e6934b45a1d91f3ce1d3ca69e19" +734"4aa1958a7c21b6f21d530ce6d2cc5256a3f846b6f9d2f38df0102c4791e5" +735"7df038f6e69085646007df999751e248e06c47245f4cd3b8004585a7470d" +736"ee1690e9d2d63169a58d243c0b57b3e5b4a481a3e4e8c60007094ef3adea" +737"2e8f05dd3a1396f",738"d384305af2388699aa302f510913fed0f2cb63ba42efa8c5c9de2922a2ec" +739"2fe87719dadf1eb0aef212b51e74c9c5b934104a43",740"630cf18a91cc5a6481ac9eefd65c24b1a3c93396bd7294d6b8ba3239517" +741"27666c947a21894a079ef061ee159c05beeb4",742"f4c34e5fbe74c0297313268296cd561d59ccc95bbfcdfcdc71b0097dbd83" +743"240446b28dc088abd42b0fc687f208190ff24c0548",744"dbb93bbb56d0439cd09f620a57687f5d"),745// GCM KAT746new Data("AES", 1, "11754cd72aec309bf52f7687212e8957",747"3c819d9a9bed087615030b65",748(String)null, null, null,749"250327c674aaf477aef2675748cf6971"),750// GCM KAT751new Data("AES", 2, "272f16edb81a7abbea887357a58c1917",752"794ec588176c703d3d2a7a07",753(String)null, null, null,754"b6e6f197168f5049aeda32dafbdaeb"),755// zero'd test data756new Data("AES", 3, "272f16edb81a7abbea887357a58c1917",757"794ec588176c703d3d2a7a07", new byte[256], null,758"15b461672153270e8ba1e6789f7641c5411f3e642abda731b6086f535c216457" +759"e87305bc59a1ff1f7e1e0bbdf302b75549b136606c67d7e5f71277aeca4bc670" +760"07a98f78e0cfa002ed183e62f07893ad31fe67aad1bb37e15b957a14d145f14f" +761"7483d041f2c3612ad5033155984470bdfc64d18df73c2745d92f28461bb09832" +762"33524811321ba87d213692825815dd13f528dba601a3c319cac6be9b48686c23" +763"a0ce23d5062916ea8827bbb243f585e446131489e951354c8ab24661f625c02e" +764"15536c5bb602244e98993ff745f3e523399b2059f0e062d8933fad2366e7e147" +765"510a931282bb0e3f635efe7bf05b1dd715f95f5858261b00735224256b6b3e80",766"08b3593840d4ed005f5234ae062a5c"),767// Random test data768new Data("AES", 4, "272f16edb81a7abbea887357a58c1917",769"794ec588176c703d3d2a7a07",770new byte[2075], null,771"15b461672153270e8ba1e6789f7641c5411f3e642abda731b6086f535c216457" +772"e87305bc59a1ff1f7e1e0bbdf302b75549b136606c67d7e5f71277aeca4bc670" +773"07a98f78e0cfa002ed183e62f07893ad31fe67aad1bb37e15b957a14d145f14f" +774"7483d041f2c3612ad5033155984470bdfc64d18df73c2745d92f28461bb09832" +775"33524811321ba87d213692825815dd13f528dba601a3c319cac6be9b48686c23" +776"a0ce23d5062916ea8827bbb243f585e446131489e951354c8ab24661f625c02e" +777"15536c5bb602244e98993ff745f3e523399b2059f0e062d8933fad2366e7e147" +778"510a931282bb0e3f635efe7bf05b1dd715f95f5858261b00735224256b6b3e80" +779"7364cb53ff6d4e88f928cf67ac70da127718a8a35542efbae9dd7567c818a074" +780"9a0c74bd69014639f59768bc55056d1166ea5523e8c66f9d78d980beb8f0d83b" +781"a9e2c5544b94dc3a1a4b6f0f95f897b010150e89ebcacf0daee3c2793d6501a0" +782"b58b411de273dee987e8e8cf8bb29ef2e7f655b46b55fabf64c6a4295e0d080b" +783"6a570ace90eb0fe0f5b5d878bdd90eddaa1150e4d5a6505b350aac814fe99615" +784"317ecd0516a464c7904011ef5922409c0d65b1e43b69d7c3293a8f7d3e9fbee9" +785"eb91ec0007a7d6f72e64deb675d459c5ba07dcfd58d08e6820b100465e6e04f0" +786"663e310584a00d36d23699c1bffc6afa094c75184fc7cde7ad35909c0f49f2f3" +787"fe1e6d745ab628d74ea56b757047de57ce18b4b3c71e8af31a6fac16189cb0a3" +788"a97a1bea447042ce382fcf726560476d759c24d5c735525ea26a332c2094408e" +789"671c7deb81d5505bbfd178f866a6f3a011b3cfdbe089b4957a790688028dfdf7" +790"9a096b3853f9d0d6d3feef230c7f5f46ffbf7486ebdaca5804dc5bf9d202415e" +791"e0d67b365c2f92a17ea740807e4f0b198b42b54f15faa9dff2c7c35d2cf8d72e" +792"b8f8b18875a2e7b5c43d1e0aa5139c461e8153c7f632895aa46ffe2b134e6a0d" +793"dfbf6a336e709adfe951bd52c4dfc7b07a15fb3888fc35b7e758922f87a104c4" +794"563c5c7839cfe5a7edbdb97264a7c4ebc90367b10cbe09dbf2390767ad7afaa8" +795"8fb46b39d3f55f216d2104e5cf040bf3d39b758bea28e2dbce576c808d17a8eb" +796"e2fd183ef42a774e39119dff1f539efeb6ad15d889dfcb0d54d0d4d4cc03c8d9" +797"aa6c9ebd157f5e7170183298d6a30ada8792dcf793d931e2a1eafccbc63c11c0" +798"c5c5ed60837f30017d693ccb294df392a8066a0594a56954aea7b78a16e9a11f" +799"4a8bc2104070a7319f5fab0d2c4ccad8ec5cd8f47c839179bfd54a7bf225d502" +800"cd0a318752fe763e8c09eb88fa57fc5399ad1f797d0595c7b8afdd23f13603e9" +801"6802192bb51433b7723f4e512bd4f799feb94b458e7f9792f5f9bd6733828f70" +802"a6b7ffbbc0bb7575021f081ec2a0d37fecd7cda2daec9a3a9d9dfe1c8034cead" +803"e4b56b581cc82bd5b74b2b30817967d9da33850336f171a4c68e2438e03f4b11" +804"96da92f01b3b7aeab795180ccf40a4b090b1175a1fc0b67c95f93105c3aef00e" +805"13d76cc402539192274fee703730cd0d1c5635257719cc96cacdbad00c6255e2" +806"bd40c775b43ad09599e84f2c3205d75a6661ca3f151183be284b354ce21457d1" +807"3ba65b9b2cdb81874bd14469c2008b3ddec78f7225ecc710cc70de7912ca6a6d" +808"348168322ab59fdafcf5c833bfa0ad4046f4b6da90e9f263db7079af592eda07" +809"5bf16c6b1a8346da9c292a48bf660860a4fc89eaef40bc132779938eca294569" +810"787c740af2b5a8de7f5e10ac750d1e3d0ef3ed168ba408a676e10b8a20bd4be8" +811"3e8336b45e54481726d73e1bd19f165a98e242aca0d8387f2dd22d02d74e23db" +812"4cef9a523587413e0a44d7e3260019a34d3a6b38426ae9fa4655be338d721970" +813"cb9fe76c073f26f9303093a033022cd2c62b2790bce633ba9026a1c93b6535f1" +814"1882bf5880e511b9e1b0b7d8f23a993aae5fd275faac3a5b4ccaf7c06b0b266a" +815"ee970a1e3a4cd7a41094f516960630534e692545b25a347c30e3f328bba4825f" +816"ed754e5525d846131ecba7ca120a6aeabc7bab9f59c890c80b7e31f9bc741591" +817"55d292433ce9558e104102f2cc63ee267c1c8333e841522707ea6d595cb802b9" +818"61697da77bbc4cb404ea62570ab335ebffa2023730732ac5ddba1c3dbb5be408" +819"3c50aea462c1ffa166d7cc3db4b742b747e81b452db2363e91374dee8c6b40f0" +820"e7fbf50e60eaf5cc5649f6bb553aae772c185026ceb052af088c545330a1ffbf" +821"50615b8c7247c6cd386afd7440654f4e15bcfae0c45442ec814fe88433a9d616" +822"ee6cc3f163f0d3d325526d05f25d3b37ad5eeb3ca77248ad86c9042b16c65554" +823"aebb6ad3e17b981492b13f42c5a5dc088e991da303e5a273fdbb8601aece4267" +824"47b01f6cb972e6da1743a0d7866cf206e95f23c6f8e337c901b9cd34a9a1fbbe" +825"1694f2c26b00dfa4d02c0d54540163e798fbdc9c25f30d6406f5b4c13f7ed619" +826"34e350f4059c13aa5e973307a9e3058917cda96fdd082e9c629ccfb2a9f98d12" +827"5c6e4703a7b0f348f5cdeb63cef2133d1c6c1a087591e0a2bca29d09c6565e66" +828"e91042f83b0e74e60a5d57562c23e2fbcd6599c29d7c19e47cf625c2ce24bb8a" +829"13f8e54041498437eec2cedd1e3d8e57a051baa962c0a62d70264d99c5ee716d" +830"5c8b9078db08c8b2c5613f464198a7aff43f76c5b4612b46a4f1cd2a494386c5" +831"7fd28f3d199f0ba8d8e39116cc7db16ce6188205ee49a9dce3d4fa32ea394919" +832"f6e91ef58b84d00b99596b4306c2d9f432d917bb4ac73384c42ae12adb4920d8" +833"c33a816febcb299dcddf3ec7a8eb6e04cdc90891c6e145bd9fc5f41dc4061a46" +834"9feba38545b64ec8203f386ceef52785619e991d274ae80af7e54af535e0b011" +835"5effdf847472992875e09398457604d04e0bb965db692c0cdcf11a",836"687cc09c89298491deb51061d709af"),837// Randomly generated data at the time of execution.838new Data("AES", 5, "11754cd72aec309bf52f7687212e8957", 12345)839)840);841}842}843844845