Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/openjdk-multiarch-jdk8u
Path: blob/aarch64-shenandoah-jdk8u272-b10/jdk/test/com/sun/crypto/provider/TLS/TestLeadingZeroes.java
38867 views
1
/*
2
* Copyright (c) 2013, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation.
8
*
9
* This code is distributed in the hope that it will be useful, but WITHOUT
10
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12
* version 2 for more details (a copy is included in the LICENSE file that
13
* accompanied this code).
14
*
15
* You should have received a copy of the GNU General Public License version
16
* 2 along with this work; if not, write to the Free Software Foundation,
17
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18
*
19
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20
* or visit www.oracle.com if you need additional information or have any
21
* questions.
22
*/
23
24
/*
25
* @test
26
* @bug 8014618
27
* @summary Need to strip leading zeros in TlsPremasterSecret of DHKeyAgreement
28
* @author Pasi Eronen
29
*/
30
31
import java.io.*;
32
import java.security.*;
33
import java.security.spec.*;
34
import java.security.interfaces.*;
35
import javax.crypto.*;
36
import javax.crypto.spec.*;
37
import javax.crypto.interfaces.*;
38
import com.sun.crypto.provider.SunJCE;
39
40
/**
41
* Test that leading zeroes are stripped in TlsPremasterSecret case,
42
* but are left as-is in other cases.
43
*
44
* We use pre-generated keypairs, since with randomly generated keypairs,
45
* a leading zero happens only (roughly) 1 out of 256 cases.
46
*/
47
48
public class TestLeadingZeroes {
49
50
private static final String SUNJCE = "SunJCE";
51
52
private TestLeadingZeroes() {}
53
54
public static void main(String argv[]) throws Exception {
55
// Add JCE to the list of providers
56
SunJCE jce = new SunJCE();
57
Security.addProvider(jce);
58
59
TestLeadingZeroes keyAgree = new TestLeadingZeroes();
60
keyAgree.run();
61
System.out.println("Test Passed");
62
}
63
64
private void run() throws Exception {
65
66
// decode pre-generated keypairs
67
KeyFactory kfac = KeyFactory.getInstance("DH");
68
PublicKey alicePubKey =
69
kfac.generatePublic(new X509EncodedKeySpec(alicePubKeyEnc));
70
PublicKey bobPubKey =
71
kfac.generatePublic(new X509EncodedKeySpec(bobPubKeyEnc));
72
PrivateKey alicePrivKey =
73
kfac.generatePrivate(new PKCS8EncodedKeySpec(alicePrivKeyEnc));
74
PrivateKey bobPrivKey =
75
kfac.generatePrivate(new PKCS8EncodedKeySpec(bobPrivKeyEnc));
76
77
// generate normal shared secret
78
KeyAgreement aliceKeyAgree = KeyAgreement.getInstance("DH", SUNJCE);
79
aliceKeyAgree.init(alicePrivKey);
80
aliceKeyAgree.doPhase(bobPubKey, true);
81
byte[] sharedSecret = aliceKeyAgree.generateSecret();
82
System.out.println("shared secret:\n" + toHexString(sharedSecret));
83
84
// verify that leading zero is present
85
if (sharedSecret.length != 128) {
86
throw new Exception("Unexpected shared secret length");
87
}
88
if (sharedSecret[0] != 0) {
89
throw new Exception("First byte is not zero as expected");
90
}
91
92
// now, test TLS premaster secret
93
aliceKeyAgree.init(alicePrivKey);
94
aliceKeyAgree.doPhase(bobPubKey, true);
95
byte[] tlsPremasterSecret =
96
aliceKeyAgree.generateSecret("TlsPremasterSecret").getEncoded();
97
System.out.println(
98
"tls premaster secret:\n" + toHexString(tlsPremasterSecret));
99
100
// check that leading zero has been stripped
101
if (tlsPremasterSecret.length != 127) {
102
throw new Exception("Unexpected TLS premaster secret length");
103
}
104
if (tlsPremasterSecret[0] == 0) {
105
throw new Exception("First byte is zero");
106
}
107
for (int i = 0; i < tlsPremasterSecret.length; i++) {
108
if (tlsPremasterSecret[i] != sharedSecret[i+1]) {
109
throw new Exception("Shared secrets differ");
110
}
111
}
112
113
}
114
115
/*
116
* Converts a byte to hex digit and writes to the supplied buffer
117
*/
118
private void byte2hex(byte b, StringBuffer buf) {
119
char[] hexChars = { '0', '1', '2', '3', '4', '5', '6', '7', '8',
120
'9', 'A', 'B', 'C', 'D', 'E', 'F' };
121
int high = ((b & 0xf0) >> 4);
122
int low = (b & 0x0f);
123
buf.append(hexChars[high]);
124
buf.append(hexChars[low]);
125
}
126
127
/*
128
* Converts a byte array to hex string
129
*/
130
private String toHexString(byte[] block) {
131
StringBuffer buf = new StringBuffer();
132
133
int len = block.length;
134
135
for (int i = 0; i < len; i++) {
136
byte2hex(block[i], buf);
137
if (i < len-1) {
138
buf.append(":");
139
}
140
}
141
return buf.toString();
142
}
143
144
private static final byte alicePubKeyEnc[] = {
145
(byte)0x30, (byte)0x82, (byte)0x01, (byte)0x24,
146
(byte)0x30, (byte)0x81, (byte)0x99, (byte)0x06,
147
(byte)0x09, (byte)0x2A, (byte)0x86, (byte)0x48,
148
(byte)0x86, (byte)0xF7, (byte)0x0D, (byte)0x01,
149
(byte)0x03, (byte)0x01, (byte)0x30, (byte)0x81,
150
(byte)0x8B, (byte)0x02, (byte)0x81, (byte)0x81,
151
(byte)0x00, (byte)0xF4, (byte)0x88, (byte)0xFD,
152
(byte)0x58, (byte)0x4E, (byte)0x49, (byte)0xDB,
153
(byte)0xCD, (byte)0x20, (byte)0xB4, (byte)0x9D,
154
(byte)0xE4, (byte)0x91, (byte)0x07, (byte)0x36,
155
(byte)0x6B, (byte)0x33, (byte)0x6C, (byte)0x38,
156
(byte)0x0D, (byte)0x45, (byte)0x1D, (byte)0x0F,
157
(byte)0x7C, (byte)0x88, (byte)0xB3, (byte)0x1C,
158
(byte)0x7C, (byte)0x5B, (byte)0x2D, (byte)0x8E,
159
(byte)0xF6, (byte)0xF3, (byte)0xC9, (byte)0x23,
160
(byte)0xC0, (byte)0x43, (byte)0xF0, (byte)0xA5,
161
(byte)0x5B, (byte)0x18, (byte)0x8D, (byte)0x8E,
162
(byte)0xBB, (byte)0x55, (byte)0x8C, (byte)0xB8,
163
(byte)0x5D, (byte)0x38, (byte)0xD3, (byte)0x34,
164
(byte)0xFD, (byte)0x7C, (byte)0x17, (byte)0x57,
165
(byte)0x43, (byte)0xA3, (byte)0x1D, (byte)0x18,
166
(byte)0x6C, (byte)0xDE, (byte)0x33, (byte)0x21,
167
(byte)0x2C, (byte)0xB5, (byte)0x2A, (byte)0xFF,
168
(byte)0x3C, (byte)0xE1, (byte)0xB1, (byte)0x29,
169
(byte)0x40, (byte)0x18, (byte)0x11, (byte)0x8D,
170
(byte)0x7C, (byte)0x84, (byte)0xA7, (byte)0x0A,
171
(byte)0x72, (byte)0xD6, (byte)0x86, (byte)0xC4,
172
(byte)0x03, (byte)0x19, (byte)0xC8, (byte)0x07,
173
(byte)0x29, (byte)0x7A, (byte)0xCA, (byte)0x95,
174
(byte)0x0C, (byte)0xD9, (byte)0x96, (byte)0x9F,
175
(byte)0xAB, (byte)0xD0, (byte)0x0A, (byte)0x50,
176
(byte)0x9B, (byte)0x02, (byte)0x46, (byte)0xD3,
177
(byte)0x08, (byte)0x3D, (byte)0x66, (byte)0xA4,
178
(byte)0x5D, (byte)0x41, (byte)0x9F, (byte)0x9C,
179
(byte)0x7C, (byte)0xBD, (byte)0x89, (byte)0x4B,
180
(byte)0x22, (byte)0x19, (byte)0x26, (byte)0xBA,
181
(byte)0xAB, (byte)0xA2, (byte)0x5E, (byte)0xC3,
182
(byte)0x55, (byte)0xE9, (byte)0x2F, (byte)0x78,
183
(byte)0xC7, (byte)0x02, (byte)0x01, (byte)0x02,
184
(byte)0x02, (byte)0x02, (byte)0x02, (byte)0x00,
185
(byte)0x03, (byte)0x81, (byte)0x85, (byte)0x00,
186
(byte)0x02, (byte)0x81, (byte)0x81, (byte)0x00,
187
(byte)0xEE, (byte)0xD6, (byte)0xB1, (byte)0xA3,
188
(byte)0xB4, (byte)0x78, (byte)0x2B, (byte)0x35,
189
(byte)0xEF, (byte)0xCD, (byte)0x17, (byte)0x86,
190
(byte)0x63, (byte)0x2B, (byte)0x97, (byte)0x0E,
191
(byte)0x7A, (byte)0xD1, (byte)0xFF, (byte)0x7A,
192
(byte)0xEB, (byte)0x57, (byte)0x61, (byte)0xA1,
193
(byte)0xF7, (byte)0x90, (byte)0x11, (byte)0xA7,
194
(byte)0x79, (byte)0x28, (byte)0x69, (byte)0xBA,
195
(byte)0xA7, (byte)0xB2, (byte)0x37, (byte)0x17,
196
(byte)0xAE, (byte)0x3C, (byte)0x92, (byte)0x89,
197
(byte)0x88, (byte)0xE5, (byte)0x7E, (byte)0x8E,
198
(byte)0xF0, (byte)0x24, (byte)0xD0, (byte)0xE1,
199
(byte)0xC4, (byte)0xB0, (byte)0x26, (byte)0x5A,
200
(byte)0x1E, (byte)0xBD, (byte)0xA0, (byte)0xCF,
201
(byte)0x3E, (byte)0x97, (byte)0x2A, (byte)0x13,
202
(byte)0x92, (byte)0x3B, (byte)0x39, (byte)0xD0,
203
(byte)0x1D, (byte)0xA3, (byte)0x6B, (byte)0x3E,
204
(byte)0xC2, (byte)0xBB, (byte)0x14, (byte)0xB6,
205
(byte)0xE2, (byte)0x4C, (byte)0x0E, (byte)0x5B,
206
(byte)0x4B, (byte)0xA4, (byte)0x9D, (byte)0xA6,
207
(byte)0x21, (byte)0xB0, (byte)0xF9, (byte)0xDE,
208
(byte)0x55, (byte)0xAE, (byte)0x5C, (byte)0x29,
209
(byte)0x0E, (byte)0xC1, (byte)0xFC, (byte)0xBA,
210
(byte)0x51, (byte)0xD3, (byte)0xB6, (byte)0x6D,
211
(byte)0x75, (byte)0x72, (byte)0xDF, (byte)0x43,
212
(byte)0xAB, (byte)0x94, (byte)0x21, (byte)0x6E,
213
(byte)0x0C, (byte)0xD1, (byte)0x93, (byte)0x54,
214
(byte)0x56, (byte)0x7D, (byte)0x4B, (byte)0x90,
215
(byte)0xF1, (byte)0x94, (byte)0x45, (byte)0xD4,
216
(byte)0x2A, (byte)0x71, (byte)0xA1, (byte)0xB8,
217
(byte)0xDD, (byte)0xAA, (byte)0x05, (byte)0xF0,
218
(byte)0x27, (byte)0x37, (byte)0xBD, (byte)0x44
219
};
220
221
private static final byte alicePrivKeyEnc[] = {
222
(byte)0x30, (byte)0x81, (byte)0xE3, (byte)0x02,
223
(byte)0x01, (byte)0x00, (byte)0x30, (byte)0x81,
224
(byte)0x99, (byte)0x06, (byte)0x09, (byte)0x2A,
225
(byte)0x86, (byte)0x48, (byte)0x86, (byte)0xF7,
226
(byte)0x0D, (byte)0x01, (byte)0x03, (byte)0x01,
227
(byte)0x30, (byte)0x81, (byte)0x8B, (byte)0x02,
228
(byte)0x81, (byte)0x81, (byte)0x00, (byte)0xF4,
229
(byte)0x88, (byte)0xFD, (byte)0x58, (byte)0x4E,
230
(byte)0x49, (byte)0xDB, (byte)0xCD, (byte)0x20,
231
(byte)0xB4, (byte)0x9D, (byte)0xE4, (byte)0x91,
232
(byte)0x07, (byte)0x36, (byte)0x6B, (byte)0x33,
233
(byte)0x6C, (byte)0x38, (byte)0x0D, (byte)0x45,
234
(byte)0x1D, (byte)0x0F, (byte)0x7C, (byte)0x88,
235
(byte)0xB3, (byte)0x1C, (byte)0x7C, (byte)0x5B,
236
(byte)0x2D, (byte)0x8E, (byte)0xF6, (byte)0xF3,
237
(byte)0xC9, (byte)0x23, (byte)0xC0, (byte)0x43,
238
(byte)0xF0, (byte)0xA5, (byte)0x5B, (byte)0x18,
239
(byte)0x8D, (byte)0x8E, (byte)0xBB, (byte)0x55,
240
(byte)0x8C, (byte)0xB8, (byte)0x5D, (byte)0x38,
241
(byte)0xD3, (byte)0x34, (byte)0xFD, (byte)0x7C,
242
(byte)0x17, (byte)0x57, (byte)0x43, (byte)0xA3,
243
(byte)0x1D, (byte)0x18, (byte)0x6C, (byte)0xDE,
244
(byte)0x33, (byte)0x21, (byte)0x2C, (byte)0xB5,
245
(byte)0x2A, (byte)0xFF, (byte)0x3C, (byte)0xE1,
246
(byte)0xB1, (byte)0x29, (byte)0x40, (byte)0x18,
247
(byte)0x11, (byte)0x8D, (byte)0x7C, (byte)0x84,
248
(byte)0xA7, (byte)0x0A, (byte)0x72, (byte)0xD6,
249
(byte)0x86, (byte)0xC4, (byte)0x03, (byte)0x19,
250
(byte)0xC8, (byte)0x07, (byte)0x29, (byte)0x7A,
251
(byte)0xCA, (byte)0x95, (byte)0x0C, (byte)0xD9,
252
(byte)0x96, (byte)0x9F, (byte)0xAB, (byte)0xD0,
253
(byte)0x0A, (byte)0x50, (byte)0x9B, (byte)0x02,
254
(byte)0x46, (byte)0xD3, (byte)0x08, (byte)0x3D,
255
(byte)0x66, (byte)0xA4, (byte)0x5D, (byte)0x41,
256
(byte)0x9F, (byte)0x9C, (byte)0x7C, (byte)0xBD,
257
(byte)0x89, (byte)0x4B, (byte)0x22, (byte)0x19,
258
(byte)0x26, (byte)0xBA, (byte)0xAB, (byte)0xA2,
259
(byte)0x5E, (byte)0xC3, (byte)0x55, (byte)0xE9,
260
(byte)0x2F, (byte)0x78, (byte)0xC7, (byte)0x02,
261
(byte)0x01, (byte)0x02, (byte)0x02, (byte)0x02,
262
(byte)0x02, (byte)0x00, (byte)0x04, (byte)0x42,
263
(byte)0x02, (byte)0x40, (byte)0x36, (byte)0x4D,
264
(byte)0xD0, (byte)0x58, (byte)0x64, (byte)0x91,
265
(byte)0x78, (byte)0xA2, (byte)0x4B, (byte)0x79,
266
(byte)0x46, (byte)0xFE, (byte)0xC9, (byte)0xD9,
267
(byte)0xCA, (byte)0x5C, (byte)0xF9, (byte)0xFD,
268
(byte)0x6C, (byte)0x5D, (byte)0x76, (byte)0x3A,
269
(byte)0x41, (byte)0x6D, (byte)0x44, (byte)0x62,
270
(byte)0x75, (byte)0x93, (byte)0x81, (byte)0x93,
271
(byte)0x00, (byte)0x4C, (byte)0xB1, (byte)0xD8,
272
(byte)0x7D, (byte)0x9D, (byte)0xF3, (byte)0x16,
273
(byte)0x2C, (byte)0x6C, (byte)0x9F, (byte)0x7A,
274
(byte)0x84, (byte)0xA3, (byte)0x7A, (byte)0xC1,
275
(byte)0x4F, (byte)0x60, (byte)0xE3, (byte)0xB5,
276
(byte)0x86, (byte)0x28, (byte)0x08, (byte)0x4D,
277
(byte)0x94, (byte)0xB6, (byte)0x04, (byte)0x0D,
278
(byte)0xAC, (byte)0xBD, (byte)0x1F, (byte)0x42,
279
(byte)0x8F, (byte)0x1B
280
};
281
282
private static final byte bobPubKeyEnc[] = {
283
(byte)0x30, (byte)0x82, (byte)0x01, (byte)0x23,
284
(byte)0x30, (byte)0x81, (byte)0x99, (byte)0x06,
285
(byte)0x09, (byte)0x2A, (byte)0x86, (byte)0x48,
286
(byte)0x86, (byte)0xF7, (byte)0x0D, (byte)0x01,
287
(byte)0x03, (byte)0x01, (byte)0x30, (byte)0x81,
288
(byte)0x8B, (byte)0x02, (byte)0x81, (byte)0x81,
289
(byte)0x00, (byte)0xF4, (byte)0x88, (byte)0xFD,
290
(byte)0x58, (byte)0x4E, (byte)0x49, (byte)0xDB,
291
(byte)0xCD, (byte)0x20, (byte)0xB4, (byte)0x9D,
292
(byte)0xE4, (byte)0x91, (byte)0x07, (byte)0x36,
293
(byte)0x6B, (byte)0x33, (byte)0x6C, (byte)0x38,
294
(byte)0x0D, (byte)0x45, (byte)0x1D, (byte)0x0F,
295
(byte)0x7C, (byte)0x88, (byte)0xB3, (byte)0x1C,
296
(byte)0x7C, (byte)0x5B, (byte)0x2D, (byte)0x8E,
297
(byte)0xF6, (byte)0xF3, (byte)0xC9, (byte)0x23,
298
(byte)0xC0, (byte)0x43, (byte)0xF0, (byte)0xA5,
299
(byte)0x5B, (byte)0x18, (byte)0x8D, (byte)0x8E,
300
(byte)0xBB, (byte)0x55, (byte)0x8C, (byte)0xB8,
301
(byte)0x5D, (byte)0x38, (byte)0xD3, (byte)0x34,
302
(byte)0xFD, (byte)0x7C, (byte)0x17, (byte)0x57,
303
(byte)0x43, (byte)0xA3, (byte)0x1D, (byte)0x18,
304
(byte)0x6C, (byte)0xDE, (byte)0x33, (byte)0x21,
305
(byte)0x2C, (byte)0xB5, (byte)0x2A, (byte)0xFF,
306
(byte)0x3C, (byte)0xE1, (byte)0xB1, (byte)0x29,
307
(byte)0x40, (byte)0x18, (byte)0x11, (byte)0x8D,
308
(byte)0x7C, (byte)0x84, (byte)0xA7, (byte)0x0A,
309
(byte)0x72, (byte)0xD6, (byte)0x86, (byte)0xC4,
310
(byte)0x03, (byte)0x19, (byte)0xC8, (byte)0x07,
311
(byte)0x29, (byte)0x7A, (byte)0xCA, (byte)0x95,
312
(byte)0x0C, (byte)0xD9, (byte)0x96, (byte)0x9F,
313
(byte)0xAB, (byte)0xD0, (byte)0x0A, (byte)0x50,
314
(byte)0x9B, (byte)0x02, (byte)0x46, (byte)0xD3,
315
(byte)0x08, (byte)0x3D, (byte)0x66, (byte)0xA4,
316
(byte)0x5D, (byte)0x41, (byte)0x9F, (byte)0x9C,
317
(byte)0x7C, (byte)0xBD, (byte)0x89, (byte)0x4B,
318
(byte)0x22, (byte)0x19, (byte)0x26, (byte)0xBA,
319
(byte)0xAB, (byte)0xA2, (byte)0x5E, (byte)0xC3,
320
(byte)0x55, (byte)0xE9, (byte)0x2F, (byte)0x78,
321
(byte)0xC7, (byte)0x02, (byte)0x01, (byte)0x02,
322
(byte)0x02, (byte)0x02, (byte)0x02, (byte)0x00,
323
(byte)0x03, (byte)0x81, (byte)0x84, (byte)0x00,
324
(byte)0x02, (byte)0x81, (byte)0x80, (byte)0x2C,
325
(byte)0x40, (byte)0xFA, (byte)0xF6, (byte)0xA6,
326
(byte)0xF8, (byte)0xAC, (byte)0xC2, (byte)0x4F,
327
(byte)0xCD, (byte)0xC7, (byte)0x37, (byte)0x93,
328
(byte)0xE5, (byte)0xE4, (byte)0x5E, (byte)0x18,
329
(byte)0x14, (byte)0xE6, (byte)0x50, (byte)0xDA,
330
(byte)0x55, (byte)0x38, (byte)0x5D, (byte)0x24,
331
(byte)0xF5, (byte)0x42, (byte)0x68, (byte)0x5F,
332
(byte)0xF5, (byte)0x15, (byte)0xC8, (byte)0x9B,
333
(byte)0x5D, (byte)0x06, (byte)0x3D, (byte)0xE1,
334
(byte)0x52, (byte)0x2F, (byte)0x98, (byte)0xFF,
335
(byte)0x37, (byte)0xBB, (byte)0x75, (byte)0x48,
336
(byte)0x48, (byte)0xE9, (byte)0x65, (byte)0x84,
337
(byte)0x37, (byte)0xBB, (byte)0xB3, (byte)0xE9,
338
(byte)0x36, (byte)0x01, (byte)0xB4, (byte)0x6A,
339
(byte)0x1C, (byte)0xB2, (byte)0x11, (byte)0x82,
340
(byte)0xCE, (byte)0x3D, (byte)0x65, (byte)0xE5,
341
(byte)0x3C, (byte)0x89, (byte)0xE9, (byte)0x52,
342
(byte)0x19, (byte)0xBD, (byte)0x58, (byte)0xF6,
343
(byte)0xA2, (byte)0x03, (byte)0xA8, (byte)0xB2,
344
(byte)0xA5, (byte)0xDB, (byte)0xEB, (byte)0xF5,
345
(byte)0x94, (byte)0xF9, (byte)0x46, (byte)0xBE,
346
(byte)0x45, (byte)0x4C, (byte)0x65, (byte)0xD2,
347
(byte)0xD1, (byte)0xCF, (byte)0xFF, (byte)0xFF,
348
(byte)0xFA, (byte)0x38, (byte)0xF1, (byte)0x72,
349
(byte)0xAB, (byte)0xB9, (byte)0x14, (byte)0x4E,
350
(byte)0xF5, (byte)0xF0, (byte)0x7A, (byte)0x8E,
351
(byte)0x45, (byte)0xFD, (byte)0x5B, (byte)0xF9,
352
(byte)0xA2, (byte)0x97, (byte)0x1B, (byte)0xAE,
353
(byte)0x2C, (byte)0x7B, (byte)0x6B, (byte)0x7C,
354
(byte)0x98, (byte)0xFE, (byte)0x58, (byte)0xDD,
355
(byte)0xBE, (byte)0xF6, (byte)0x1C, (byte)0x8E,
356
(byte)0xD0, (byte)0xA1, (byte)0x72
357
};
358
359
private static final byte bobPrivKeyEnc[] = {
360
(byte)0x30, (byte)0x81, (byte)0xE4, (byte)0x02,
361
(byte)0x01, (byte)0x00, (byte)0x30, (byte)0x81,
362
(byte)0x99, (byte)0x06, (byte)0x09, (byte)0x2A,
363
(byte)0x86, (byte)0x48, (byte)0x86, (byte)0xF7,
364
(byte)0x0D, (byte)0x01, (byte)0x03, (byte)0x01,
365
(byte)0x30, (byte)0x81, (byte)0x8B, (byte)0x02,
366
(byte)0x81, (byte)0x81, (byte)0x00, (byte)0xF4,
367
(byte)0x88, (byte)0xFD, (byte)0x58, (byte)0x4E,
368
(byte)0x49, (byte)0xDB, (byte)0xCD, (byte)0x20,
369
(byte)0xB4, (byte)0x9D, (byte)0xE4, (byte)0x91,
370
(byte)0x07, (byte)0x36, (byte)0x6B, (byte)0x33,
371
(byte)0x6C, (byte)0x38, (byte)0x0D, (byte)0x45,
372
(byte)0x1D, (byte)0x0F, (byte)0x7C, (byte)0x88,
373
(byte)0xB3, (byte)0x1C, (byte)0x7C, (byte)0x5B,
374
(byte)0x2D, (byte)0x8E, (byte)0xF6, (byte)0xF3,
375
(byte)0xC9, (byte)0x23, (byte)0xC0, (byte)0x43,
376
(byte)0xF0, (byte)0xA5, (byte)0x5B, (byte)0x18,
377
(byte)0x8D, (byte)0x8E, (byte)0xBB, (byte)0x55,
378
(byte)0x8C, (byte)0xB8, (byte)0x5D, (byte)0x38,
379
(byte)0xD3, (byte)0x34, (byte)0xFD, (byte)0x7C,
380
(byte)0x17, (byte)0x57, (byte)0x43, (byte)0xA3,
381
(byte)0x1D, (byte)0x18, (byte)0x6C, (byte)0xDE,
382
(byte)0x33, (byte)0x21, (byte)0x2C, (byte)0xB5,
383
(byte)0x2A, (byte)0xFF, (byte)0x3C, (byte)0xE1,
384
(byte)0xB1, (byte)0x29, (byte)0x40, (byte)0x18,
385
(byte)0x11, (byte)0x8D, (byte)0x7C, (byte)0x84,
386
(byte)0xA7, (byte)0x0A, (byte)0x72, (byte)0xD6,
387
(byte)0x86, (byte)0xC4, (byte)0x03, (byte)0x19,
388
(byte)0xC8, (byte)0x07, (byte)0x29, (byte)0x7A,
389
(byte)0xCA, (byte)0x95, (byte)0x0C, (byte)0xD9,
390
(byte)0x96, (byte)0x9F, (byte)0xAB, (byte)0xD0,
391
(byte)0x0A, (byte)0x50, (byte)0x9B, (byte)0x02,
392
(byte)0x46, (byte)0xD3, (byte)0x08, (byte)0x3D,
393
(byte)0x66, (byte)0xA4, (byte)0x5D, (byte)0x41,
394
(byte)0x9F, (byte)0x9C, (byte)0x7C, (byte)0xBD,
395
(byte)0x89, (byte)0x4B, (byte)0x22, (byte)0x19,
396
(byte)0x26, (byte)0xBA, (byte)0xAB, (byte)0xA2,
397
(byte)0x5E, (byte)0xC3, (byte)0x55, (byte)0xE9,
398
(byte)0x2F, (byte)0x78, (byte)0xC7, (byte)0x02,
399
(byte)0x01, (byte)0x02, (byte)0x02, (byte)0x02,
400
(byte)0x02, (byte)0x00, (byte)0x04, (byte)0x43,
401
(byte)0x02, (byte)0x41, (byte)0x00, (byte)0xE0,
402
(byte)0x31, (byte)0xE7, (byte)0x77, (byte)0xB8,
403
(byte)0xD0, (byte)0x7E, (byte)0x0A, (byte)0x9B,
404
(byte)0x94, (byte)0xD5, (byte)0x3D, (byte)0x33,
405
(byte)0x62, (byte)0x32, (byte)0x51, (byte)0xCE,
406
(byte)0x74, (byte)0x5C, (byte)0xA5, (byte)0x72,
407
(byte)0xD9, (byte)0x36, (byte)0xF3, (byte)0x8A,
408
(byte)0x3F, (byte)0x8B, (byte)0xC6, (byte)0xFE,
409
(byte)0xEF, (byte)0x94, (byte)0x8B, (byte)0x50,
410
(byte)0x41, (byte)0x9B, (byte)0x14, (byte)0xC8,
411
(byte)0xE9, (byte)0x1F, (byte)0x24, (byte)0x1F,
412
(byte)0x65, (byte)0x8E, (byte)0xD3, (byte)0x85,
413
(byte)0xD0, (byte)0x68, (byte)0x6C, (byte)0xF1,
414
(byte)0x79, (byte)0x45, (byte)0xD0, (byte)0x06,
415
(byte)0xA4, (byte)0xB8, (byte)0xE0, (byte)0x64,
416
(byte)0xF5, (byte)0x38, (byte)0x72, (byte)0x97,
417
(byte)0x00, (byte)0x23, (byte)0x5F
418
};
419
}
420
421
422