Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/openjdk-multiarch-jdk8u
Path: blob/aarch64-shenandoah-jdk8u272-b10/jdk/test/sun/security/pkcs11/tls/TestLeadingZeroesP11.java
38855 views
1
/*
2
* Copyright (c) 2013, 2016, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation.
8
*
9
* This code is distributed in the hope that it will be useful, but WITHOUT
10
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12
* version 2 for more details (a copy is included in the LICENSE file that
13
* accompanied this code).
14
*
15
* You should have received a copy of the GNU General Public License version
16
* 2 along with this work; if not, write to the Free Software Foundation,
17
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18
*
19
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20
* or visit www.oracle.com if you need additional information or have any
21
* questions.
22
*/
23
24
/*
25
* @test
26
* @bug 8014618
27
* @summary Need to strip leading zeros in TlsPremasterSecret of DHKeyAgreement
28
* @library ..
29
* @author Pasi Eronen
30
* @run main/othervm TestLeadingZeroesP11
31
* @run main/othervm TestLeadingZeroesP11 sm
32
*/
33
34
35
import java.security.KeyFactory;
36
import java.security.PrivateKey;
37
import java.security.Provider;
38
import java.security.PublicKey;
39
import java.security.spec.PKCS8EncodedKeySpec;
40
import java.security.spec.X509EncodedKeySpec;
41
import javax.crypto.KeyAgreement;
42
43
/**
44
* Test that leading zeroes are stripped in TlsPremasterSecret case,
45
* but are left as-is in other cases.
46
*
47
* We use pre-generated keypairs, since with randomly generated keypairs,
48
* a leading zero happens only (roughly) 1 out of 256 cases.
49
*/
50
51
public class TestLeadingZeroesP11 extends PKCS11Test {
52
53
public static void main(String[] args) throws Exception {
54
main(new TestLeadingZeroesP11(), args);
55
}
56
57
@Override
58
public void main(Provider p) throws Exception {
59
60
// decode pre-generated keypairs
61
KeyFactory kfac = KeyFactory.getInstance("DH", p);
62
PublicKey alicePubKey =
63
kfac.generatePublic(new X509EncodedKeySpec(alicePubKeyEnc));
64
PublicKey bobPubKey =
65
kfac.generatePublic(new X509EncodedKeySpec(bobPubKeyEnc));
66
PrivateKey alicePrivKey =
67
kfac.generatePrivate(new PKCS8EncodedKeySpec(alicePrivKeyEnc));
68
PrivateKey bobPrivKey =
69
kfac.generatePrivate(new PKCS8EncodedKeySpec(bobPrivKeyEnc));
70
71
// generate normal shared secret
72
KeyAgreement aliceKeyAgree = KeyAgreement.getInstance("DH", p);
73
aliceKeyAgree.init(alicePrivKey);
74
aliceKeyAgree.doPhase(bobPubKey, true);
75
byte[] sharedSecret = aliceKeyAgree.generateSecret();
76
System.out.println("shared secret:\n" + toHexString(sharedSecret));
77
78
// verify that leading zero is present
79
if (sharedSecret.length != 128) {
80
throw new Exception("Unexpected shared secret length");
81
}
82
if (sharedSecret[0] != 0) {
83
throw new Exception("First byte is not zero as expected");
84
}
85
86
// now, test TLS premaster secret
87
aliceKeyAgree.init(alicePrivKey);
88
aliceKeyAgree.doPhase(bobPubKey, true);
89
byte[] tlsPremasterSecret =
90
aliceKeyAgree.generateSecret("TlsPremasterSecret").getEncoded();
91
System.out.println(
92
"tls premaster secret:\n" + toHexString(tlsPremasterSecret));
93
94
// check that leading zero has been stripped
95
if (tlsPremasterSecret.length != 127) {
96
throw new Exception("Unexpected TLS premaster secret length");
97
}
98
if (tlsPremasterSecret[0] == 0) {
99
throw new Exception("First byte is zero");
100
}
101
for (int i = 0; i < tlsPremasterSecret.length; i++) {
102
if (tlsPremasterSecret[i] != sharedSecret[i+1]) {
103
throw new Exception("Shared secrets differ");
104
}
105
}
106
107
}
108
109
/*
110
* Converts a byte to hex digit and writes to the supplied buffer
111
*/
112
private void byte2hex(byte b, StringBuffer buf) {
113
char[] hexChars = { '0', '1', '2', '3', '4', '5', '6', '7', '8',
114
'9', 'A', 'B', 'C', 'D', 'E', 'F' };
115
int high = ((b & 0xf0) >> 4);
116
int low = (b & 0x0f);
117
buf.append(hexChars[high]);
118
buf.append(hexChars[low]);
119
}
120
121
/*
122
* Converts a byte array to hex string
123
*/
124
private String toHexString(byte[] block) {
125
StringBuffer buf = new StringBuffer();
126
127
int len = block.length;
128
129
for (int i = 0; i < len; i++) {
130
byte2hex(block[i], buf);
131
if (i < len-1) {
132
buf.append(":");
133
}
134
}
135
return buf.toString();
136
}
137
138
private static final byte alicePubKeyEnc[] = {
139
(byte)0x30, (byte)0x82, (byte)0x01, (byte)0x24,
140
(byte)0x30, (byte)0x81, (byte)0x99, (byte)0x06,
141
(byte)0x09, (byte)0x2A, (byte)0x86, (byte)0x48,
142
(byte)0x86, (byte)0xF7, (byte)0x0D, (byte)0x01,
143
(byte)0x03, (byte)0x01, (byte)0x30, (byte)0x81,
144
(byte)0x8B, (byte)0x02, (byte)0x81, (byte)0x81,
145
(byte)0x00, (byte)0xF4, (byte)0x88, (byte)0xFD,
146
(byte)0x58, (byte)0x4E, (byte)0x49, (byte)0xDB,
147
(byte)0xCD, (byte)0x20, (byte)0xB4, (byte)0x9D,
148
(byte)0xE4, (byte)0x91, (byte)0x07, (byte)0x36,
149
(byte)0x6B, (byte)0x33, (byte)0x6C, (byte)0x38,
150
(byte)0x0D, (byte)0x45, (byte)0x1D, (byte)0x0F,
151
(byte)0x7C, (byte)0x88, (byte)0xB3, (byte)0x1C,
152
(byte)0x7C, (byte)0x5B, (byte)0x2D, (byte)0x8E,
153
(byte)0xF6, (byte)0xF3, (byte)0xC9, (byte)0x23,
154
(byte)0xC0, (byte)0x43, (byte)0xF0, (byte)0xA5,
155
(byte)0x5B, (byte)0x18, (byte)0x8D, (byte)0x8E,
156
(byte)0xBB, (byte)0x55, (byte)0x8C, (byte)0xB8,
157
(byte)0x5D, (byte)0x38, (byte)0xD3, (byte)0x34,
158
(byte)0xFD, (byte)0x7C, (byte)0x17, (byte)0x57,
159
(byte)0x43, (byte)0xA3, (byte)0x1D, (byte)0x18,
160
(byte)0x6C, (byte)0xDE, (byte)0x33, (byte)0x21,
161
(byte)0x2C, (byte)0xB5, (byte)0x2A, (byte)0xFF,
162
(byte)0x3C, (byte)0xE1, (byte)0xB1, (byte)0x29,
163
(byte)0x40, (byte)0x18, (byte)0x11, (byte)0x8D,
164
(byte)0x7C, (byte)0x84, (byte)0xA7, (byte)0x0A,
165
(byte)0x72, (byte)0xD6, (byte)0x86, (byte)0xC4,
166
(byte)0x03, (byte)0x19, (byte)0xC8, (byte)0x07,
167
(byte)0x29, (byte)0x7A, (byte)0xCA, (byte)0x95,
168
(byte)0x0C, (byte)0xD9, (byte)0x96, (byte)0x9F,
169
(byte)0xAB, (byte)0xD0, (byte)0x0A, (byte)0x50,
170
(byte)0x9B, (byte)0x02, (byte)0x46, (byte)0xD3,
171
(byte)0x08, (byte)0x3D, (byte)0x66, (byte)0xA4,
172
(byte)0x5D, (byte)0x41, (byte)0x9F, (byte)0x9C,
173
(byte)0x7C, (byte)0xBD, (byte)0x89, (byte)0x4B,
174
(byte)0x22, (byte)0x19, (byte)0x26, (byte)0xBA,
175
(byte)0xAB, (byte)0xA2, (byte)0x5E, (byte)0xC3,
176
(byte)0x55, (byte)0xE9, (byte)0x2F, (byte)0x78,
177
(byte)0xC7, (byte)0x02, (byte)0x01, (byte)0x02,
178
(byte)0x02, (byte)0x02, (byte)0x02, (byte)0x00,
179
(byte)0x03, (byte)0x81, (byte)0x85, (byte)0x00,
180
(byte)0x02, (byte)0x81, (byte)0x81, (byte)0x00,
181
(byte)0xEE, (byte)0xD6, (byte)0xB1, (byte)0xA3,
182
(byte)0xB4, (byte)0x78, (byte)0x2B, (byte)0x35,
183
(byte)0xEF, (byte)0xCD, (byte)0x17, (byte)0x86,
184
(byte)0x63, (byte)0x2B, (byte)0x97, (byte)0x0E,
185
(byte)0x7A, (byte)0xD1, (byte)0xFF, (byte)0x7A,
186
(byte)0xEB, (byte)0x57, (byte)0x61, (byte)0xA1,
187
(byte)0xF7, (byte)0x90, (byte)0x11, (byte)0xA7,
188
(byte)0x79, (byte)0x28, (byte)0x69, (byte)0xBA,
189
(byte)0xA7, (byte)0xB2, (byte)0x37, (byte)0x17,
190
(byte)0xAE, (byte)0x3C, (byte)0x92, (byte)0x89,
191
(byte)0x88, (byte)0xE5, (byte)0x7E, (byte)0x8E,
192
(byte)0xF0, (byte)0x24, (byte)0xD0, (byte)0xE1,
193
(byte)0xC4, (byte)0xB0, (byte)0x26, (byte)0x5A,
194
(byte)0x1E, (byte)0xBD, (byte)0xA0, (byte)0xCF,
195
(byte)0x3E, (byte)0x97, (byte)0x2A, (byte)0x13,
196
(byte)0x92, (byte)0x3B, (byte)0x39, (byte)0xD0,
197
(byte)0x1D, (byte)0xA3, (byte)0x6B, (byte)0x3E,
198
(byte)0xC2, (byte)0xBB, (byte)0x14, (byte)0xB6,
199
(byte)0xE2, (byte)0x4C, (byte)0x0E, (byte)0x5B,
200
(byte)0x4B, (byte)0xA4, (byte)0x9D, (byte)0xA6,
201
(byte)0x21, (byte)0xB0, (byte)0xF9, (byte)0xDE,
202
(byte)0x55, (byte)0xAE, (byte)0x5C, (byte)0x29,
203
(byte)0x0E, (byte)0xC1, (byte)0xFC, (byte)0xBA,
204
(byte)0x51, (byte)0xD3, (byte)0xB6, (byte)0x6D,
205
(byte)0x75, (byte)0x72, (byte)0xDF, (byte)0x43,
206
(byte)0xAB, (byte)0x94, (byte)0x21, (byte)0x6E,
207
(byte)0x0C, (byte)0xD1, (byte)0x93, (byte)0x54,
208
(byte)0x56, (byte)0x7D, (byte)0x4B, (byte)0x90,
209
(byte)0xF1, (byte)0x94, (byte)0x45, (byte)0xD4,
210
(byte)0x2A, (byte)0x71, (byte)0xA1, (byte)0xB8,
211
(byte)0xDD, (byte)0xAA, (byte)0x05, (byte)0xF0,
212
(byte)0x27, (byte)0x37, (byte)0xBD, (byte)0x44
213
};
214
215
private static final byte alicePrivKeyEnc[] = {
216
(byte)0x30, (byte)0x81, (byte)0xE3, (byte)0x02,
217
(byte)0x01, (byte)0x00, (byte)0x30, (byte)0x81,
218
(byte)0x99, (byte)0x06, (byte)0x09, (byte)0x2A,
219
(byte)0x86, (byte)0x48, (byte)0x86, (byte)0xF7,
220
(byte)0x0D, (byte)0x01, (byte)0x03, (byte)0x01,
221
(byte)0x30, (byte)0x81, (byte)0x8B, (byte)0x02,
222
(byte)0x81, (byte)0x81, (byte)0x00, (byte)0xF4,
223
(byte)0x88, (byte)0xFD, (byte)0x58, (byte)0x4E,
224
(byte)0x49, (byte)0xDB, (byte)0xCD, (byte)0x20,
225
(byte)0xB4, (byte)0x9D, (byte)0xE4, (byte)0x91,
226
(byte)0x07, (byte)0x36, (byte)0x6B, (byte)0x33,
227
(byte)0x6C, (byte)0x38, (byte)0x0D, (byte)0x45,
228
(byte)0x1D, (byte)0x0F, (byte)0x7C, (byte)0x88,
229
(byte)0xB3, (byte)0x1C, (byte)0x7C, (byte)0x5B,
230
(byte)0x2D, (byte)0x8E, (byte)0xF6, (byte)0xF3,
231
(byte)0xC9, (byte)0x23, (byte)0xC0, (byte)0x43,
232
(byte)0xF0, (byte)0xA5, (byte)0x5B, (byte)0x18,
233
(byte)0x8D, (byte)0x8E, (byte)0xBB, (byte)0x55,
234
(byte)0x8C, (byte)0xB8, (byte)0x5D, (byte)0x38,
235
(byte)0xD3, (byte)0x34, (byte)0xFD, (byte)0x7C,
236
(byte)0x17, (byte)0x57, (byte)0x43, (byte)0xA3,
237
(byte)0x1D, (byte)0x18, (byte)0x6C, (byte)0xDE,
238
(byte)0x33, (byte)0x21, (byte)0x2C, (byte)0xB5,
239
(byte)0x2A, (byte)0xFF, (byte)0x3C, (byte)0xE1,
240
(byte)0xB1, (byte)0x29, (byte)0x40, (byte)0x18,
241
(byte)0x11, (byte)0x8D, (byte)0x7C, (byte)0x84,
242
(byte)0xA7, (byte)0x0A, (byte)0x72, (byte)0xD6,
243
(byte)0x86, (byte)0xC4, (byte)0x03, (byte)0x19,
244
(byte)0xC8, (byte)0x07, (byte)0x29, (byte)0x7A,
245
(byte)0xCA, (byte)0x95, (byte)0x0C, (byte)0xD9,
246
(byte)0x96, (byte)0x9F, (byte)0xAB, (byte)0xD0,
247
(byte)0x0A, (byte)0x50, (byte)0x9B, (byte)0x02,
248
(byte)0x46, (byte)0xD3, (byte)0x08, (byte)0x3D,
249
(byte)0x66, (byte)0xA4, (byte)0x5D, (byte)0x41,
250
(byte)0x9F, (byte)0x9C, (byte)0x7C, (byte)0xBD,
251
(byte)0x89, (byte)0x4B, (byte)0x22, (byte)0x19,
252
(byte)0x26, (byte)0xBA, (byte)0xAB, (byte)0xA2,
253
(byte)0x5E, (byte)0xC3, (byte)0x55, (byte)0xE9,
254
(byte)0x2F, (byte)0x78, (byte)0xC7, (byte)0x02,
255
(byte)0x01, (byte)0x02, (byte)0x02, (byte)0x02,
256
(byte)0x02, (byte)0x00, (byte)0x04, (byte)0x42,
257
(byte)0x02, (byte)0x40, (byte)0x36, (byte)0x4D,
258
(byte)0xD0, (byte)0x58, (byte)0x64, (byte)0x91,
259
(byte)0x78, (byte)0xA2, (byte)0x4B, (byte)0x79,
260
(byte)0x46, (byte)0xFE, (byte)0xC9, (byte)0xD9,
261
(byte)0xCA, (byte)0x5C, (byte)0xF9, (byte)0xFD,
262
(byte)0x6C, (byte)0x5D, (byte)0x76, (byte)0x3A,
263
(byte)0x41, (byte)0x6D, (byte)0x44, (byte)0x62,
264
(byte)0x75, (byte)0x93, (byte)0x81, (byte)0x93,
265
(byte)0x00, (byte)0x4C, (byte)0xB1, (byte)0xD8,
266
(byte)0x7D, (byte)0x9D, (byte)0xF3, (byte)0x16,
267
(byte)0x2C, (byte)0x6C, (byte)0x9F, (byte)0x7A,
268
(byte)0x84, (byte)0xA3, (byte)0x7A, (byte)0xC1,
269
(byte)0x4F, (byte)0x60, (byte)0xE3, (byte)0xB5,
270
(byte)0x86, (byte)0x28, (byte)0x08, (byte)0x4D,
271
(byte)0x94, (byte)0xB6, (byte)0x04, (byte)0x0D,
272
(byte)0xAC, (byte)0xBD, (byte)0x1F, (byte)0x42,
273
(byte)0x8F, (byte)0x1B
274
};
275
276
private static final byte bobPubKeyEnc[] = {
277
(byte)0x30, (byte)0x82, (byte)0x01, (byte)0x23,
278
(byte)0x30, (byte)0x81, (byte)0x99, (byte)0x06,
279
(byte)0x09, (byte)0x2A, (byte)0x86, (byte)0x48,
280
(byte)0x86, (byte)0xF7, (byte)0x0D, (byte)0x01,
281
(byte)0x03, (byte)0x01, (byte)0x30, (byte)0x81,
282
(byte)0x8B, (byte)0x02, (byte)0x81, (byte)0x81,
283
(byte)0x00, (byte)0xF4, (byte)0x88, (byte)0xFD,
284
(byte)0x58, (byte)0x4E, (byte)0x49, (byte)0xDB,
285
(byte)0xCD, (byte)0x20, (byte)0xB4, (byte)0x9D,
286
(byte)0xE4, (byte)0x91, (byte)0x07, (byte)0x36,
287
(byte)0x6B, (byte)0x33, (byte)0x6C, (byte)0x38,
288
(byte)0x0D, (byte)0x45, (byte)0x1D, (byte)0x0F,
289
(byte)0x7C, (byte)0x88, (byte)0xB3, (byte)0x1C,
290
(byte)0x7C, (byte)0x5B, (byte)0x2D, (byte)0x8E,
291
(byte)0xF6, (byte)0xF3, (byte)0xC9, (byte)0x23,
292
(byte)0xC0, (byte)0x43, (byte)0xF0, (byte)0xA5,
293
(byte)0x5B, (byte)0x18, (byte)0x8D, (byte)0x8E,
294
(byte)0xBB, (byte)0x55, (byte)0x8C, (byte)0xB8,
295
(byte)0x5D, (byte)0x38, (byte)0xD3, (byte)0x34,
296
(byte)0xFD, (byte)0x7C, (byte)0x17, (byte)0x57,
297
(byte)0x43, (byte)0xA3, (byte)0x1D, (byte)0x18,
298
(byte)0x6C, (byte)0xDE, (byte)0x33, (byte)0x21,
299
(byte)0x2C, (byte)0xB5, (byte)0x2A, (byte)0xFF,
300
(byte)0x3C, (byte)0xE1, (byte)0xB1, (byte)0x29,
301
(byte)0x40, (byte)0x18, (byte)0x11, (byte)0x8D,
302
(byte)0x7C, (byte)0x84, (byte)0xA7, (byte)0x0A,
303
(byte)0x72, (byte)0xD6, (byte)0x86, (byte)0xC4,
304
(byte)0x03, (byte)0x19, (byte)0xC8, (byte)0x07,
305
(byte)0x29, (byte)0x7A, (byte)0xCA, (byte)0x95,
306
(byte)0x0C, (byte)0xD9, (byte)0x96, (byte)0x9F,
307
(byte)0xAB, (byte)0xD0, (byte)0x0A, (byte)0x50,
308
(byte)0x9B, (byte)0x02, (byte)0x46, (byte)0xD3,
309
(byte)0x08, (byte)0x3D, (byte)0x66, (byte)0xA4,
310
(byte)0x5D, (byte)0x41, (byte)0x9F, (byte)0x9C,
311
(byte)0x7C, (byte)0xBD, (byte)0x89, (byte)0x4B,
312
(byte)0x22, (byte)0x19, (byte)0x26, (byte)0xBA,
313
(byte)0xAB, (byte)0xA2, (byte)0x5E, (byte)0xC3,
314
(byte)0x55, (byte)0xE9, (byte)0x2F, (byte)0x78,
315
(byte)0xC7, (byte)0x02, (byte)0x01, (byte)0x02,
316
(byte)0x02, (byte)0x02, (byte)0x02, (byte)0x00,
317
(byte)0x03, (byte)0x81, (byte)0x84, (byte)0x00,
318
(byte)0x02, (byte)0x81, (byte)0x80, (byte)0x2C,
319
(byte)0x40, (byte)0xFA, (byte)0xF6, (byte)0xA6,
320
(byte)0xF8, (byte)0xAC, (byte)0xC2, (byte)0x4F,
321
(byte)0xCD, (byte)0xC7, (byte)0x37, (byte)0x93,
322
(byte)0xE5, (byte)0xE4, (byte)0x5E, (byte)0x18,
323
(byte)0x14, (byte)0xE6, (byte)0x50, (byte)0xDA,
324
(byte)0x55, (byte)0x38, (byte)0x5D, (byte)0x24,
325
(byte)0xF5, (byte)0x42, (byte)0x68, (byte)0x5F,
326
(byte)0xF5, (byte)0x15, (byte)0xC8, (byte)0x9B,
327
(byte)0x5D, (byte)0x06, (byte)0x3D, (byte)0xE1,
328
(byte)0x52, (byte)0x2F, (byte)0x98, (byte)0xFF,
329
(byte)0x37, (byte)0xBB, (byte)0x75, (byte)0x48,
330
(byte)0x48, (byte)0xE9, (byte)0x65, (byte)0x84,
331
(byte)0x37, (byte)0xBB, (byte)0xB3, (byte)0xE9,
332
(byte)0x36, (byte)0x01, (byte)0xB4, (byte)0x6A,
333
(byte)0x1C, (byte)0xB2, (byte)0x11, (byte)0x82,
334
(byte)0xCE, (byte)0x3D, (byte)0x65, (byte)0xE5,
335
(byte)0x3C, (byte)0x89, (byte)0xE9, (byte)0x52,
336
(byte)0x19, (byte)0xBD, (byte)0x58, (byte)0xF6,
337
(byte)0xA2, (byte)0x03, (byte)0xA8, (byte)0xB2,
338
(byte)0xA5, (byte)0xDB, (byte)0xEB, (byte)0xF5,
339
(byte)0x94, (byte)0xF9, (byte)0x46, (byte)0xBE,
340
(byte)0x45, (byte)0x4C, (byte)0x65, (byte)0xD2,
341
(byte)0xD1, (byte)0xCF, (byte)0xFF, (byte)0xFF,
342
(byte)0xFA, (byte)0x38, (byte)0xF1, (byte)0x72,
343
(byte)0xAB, (byte)0xB9, (byte)0x14, (byte)0x4E,
344
(byte)0xF5, (byte)0xF0, (byte)0x7A, (byte)0x8E,
345
(byte)0x45, (byte)0xFD, (byte)0x5B, (byte)0xF9,
346
(byte)0xA2, (byte)0x97, (byte)0x1B, (byte)0xAE,
347
(byte)0x2C, (byte)0x7B, (byte)0x6B, (byte)0x7C,
348
(byte)0x98, (byte)0xFE, (byte)0x58, (byte)0xDD,
349
(byte)0xBE, (byte)0xF6, (byte)0x1C, (byte)0x8E,
350
(byte)0xD0, (byte)0xA1, (byte)0x72
351
};
352
353
private static final byte bobPrivKeyEnc[] = {
354
(byte)0x30, (byte)0x81, (byte)0xE4, (byte)0x02,
355
(byte)0x01, (byte)0x00, (byte)0x30, (byte)0x81,
356
(byte)0x99, (byte)0x06, (byte)0x09, (byte)0x2A,
357
(byte)0x86, (byte)0x48, (byte)0x86, (byte)0xF7,
358
(byte)0x0D, (byte)0x01, (byte)0x03, (byte)0x01,
359
(byte)0x30, (byte)0x81, (byte)0x8B, (byte)0x02,
360
(byte)0x81, (byte)0x81, (byte)0x00, (byte)0xF4,
361
(byte)0x88, (byte)0xFD, (byte)0x58, (byte)0x4E,
362
(byte)0x49, (byte)0xDB, (byte)0xCD, (byte)0x20,
363
(byte)0xB4, (byte)0x9D, (byte)0xE4, (byte)0x91,
364
(byte)0x07, (byte)0x36, (byte)0x6B, (byte)0x33,
365
(byte)0x6C, (byte)0x38, (byte)0x0D, (byte)0x45,
366
(byte)0x1D, (byte)0x0F, (byte)0x7C, (byte)0x88,
367
(byte)0xB3, (byte)0x1C, (byte)0x7C, (byte)0x5B,
368
(byte)0x2D, (byte)0x8E, (byte)0xF6, (byte)0xF3,
369
(byte)0xC9, (byte)0x23, (byte)0xC0, (byte)0x43,
370
(byte)0xF0, (byte)0xA5, (byte)0x5B, (byte)0x18,
371
(byte)0x8D, (byte)0x8E, (byte)0xBB, (byte)0x55,
372
(byte)0x8C, (byte)0xB8, (byte)0x5D, (byte)0x38,
373
(byte)0xD3, (byte)0x34, (byte)0xFD, (byte)0x7C,
374
(byte)0x17, (byte)0x57, (byte)0x43, (byte)0xA3,
375
(byte)0x1D, (byte)0x18, (byte)0x6C, (byte)0xDE,
376
(byte)0x33, (byte)0x21, (byte)0x2C, (byte)0xB5,
377
(byte)0x2A, (byte)0xFF, (byte)0x3C, (byte)0xE1,
378
(byte)0xB1, (byte)0x29, (byte)0x40, (byte)0x18,
379
(byte)0x11, (byte)0x8D, (byte)0x7C, (byte)0x84,
380
(byte)0xA7, (byte)0x0A, (byte)0x72, (byte)0xD6,
381
(byte)0x86, (byte)0xC4, (byte)0x03, (byte)0x19,
382
(byte)0xC8, (byte)0x07, (byte)0x29, (byte)0x7A,
383
(byte)0xCA, (byte)0x95, (byte)0x0C, (byte)0xD9,
384
(byte)0x96, (byte)0x9F, (byte)0xAB, (byte)0xD0,
385
(byte)0x0A, (byte)0x50, (byte)0x9B, (byte)0x02,
386
(byte)0x46, (byte)0xD3, (byte)0x08, (byte)0x3D,
387
(byte)0x66, (byte)0xA4, (byte)0x5D, (byte)0x41,
388
(byte)0x9F, (byte)0x9C, (byte)0x7C, (byte)0xBD,
389
(byte)0x89, (byte)0x4B, (byte)0x22, (byte)0x19,
390
(byte)0x26, (byte)0xBA, (byte)0xAB, (byte)0xA2,
391
(byte)0x5E, (byte)0xC3, (byte)0x55, (byte)0xE9,
392
(byte)0x2F, (byte)0x78, (byte)0xC7, (byte)0x02,
393
(byte)0x01, (byte)0x02, (byte)0x02, (byte)0x02,
394
(byte)0x02, (byte)0x00, (byte)0x04, (byte)0x43,
395
(byte)0x02, (byte)0x41, (byte)0x00, (byte)0xE0,
396
(byte)0x31, (byte)0xE7, (byte)0x77, (byte)0xB8,
397
(byte)0xD0, (byte)0x7E, (byte)0x0A, (byte)0x9B,
398
(byte)0x94, (byte)0xD5, (byte)0x3D, (byte)0x33,
399
(byte)0x62, (byte)0x32, (byte)0x51, (byte)0xCE,
400
(byte)0x74, (byte)0x5C, (byte)0xA5, (byte)0x72,
401
(byte)0xD9, (byte)0x36, (byte)0xF3, (byte)0x8A,
402
(byte)0x3F, (byte)0x8B, (byte)0xC6, (byte)0xFE,
403
(byte)0xEF, (byte)0x94, (byte)0x8B, (byte)0x50,
404
(byte)0x41, (byte)0x9B, (byte)0x14, (byte)0xC8,
405
(byte)0xE9, (byte)0x1F, (byte)0x24, (byte)0x1F,
406
(byte)0x65, (byte)0x8E, (byte)0xD3, (byte)0x85,
407
(byte)0xD0, (byte)0x68, (byte)0x6C, (byte)0xF1,
408
(byte)0x79, (byte)0x45, (byte)0xD0, (byte)0x06,
409
(byte)0xA4, (byte)0xB8, (byte)0xE0, (byte)0x64,
410
(byte)0xF5, (byte)0x38, (byte)0x72, (byte)0x97,
411
(byte)0x00, (byte)0x23, (byte)0x5F
412
};
413
}
414
415
416