/*
* COPYRIGHT (c) International Business Machines Corp. 2005-2017
*
* This program is provided under the terms of the Common Public License,
* version 1.0 (CPL-1.0). Any use, reproduction or distribution for this
* software constitutes recipient's acceptance of CPL-1.0 terms which can be
* found in the file LICENSE file or at
* https://opensource.org/licenses/cpl1.0.php
*/
#ifndef _DES3_H_
#define _DES3_H_
#endif
#include "pkcs11types.h"
#define MAX_KEY_SIZE 64
#define MAX_TEXT_SIZE 128
#define MAX_IV_SIZE 64
#define DES3_BLOCK_SIZE 8
#define DES3_KEY_SIZE 24
#define DES3_IV_SIZE 8
#define MAX_CHUNKS 8
struct des3_test_vector {
unsigned char key[MAX_KEY_SIZE];
unsigned char klen;
unsigned char iv[MAX_IV_SIZE];
unsigned char ivlen;
unsigned char plaintext[MAX_TEXT_SIZE];
unsigned char plen;
unsigned char ciphertext[MAX_TEXT_SIZE];
unsigned char clen;
int chunks[MAX_CHUNKS];
int num_chunks;
};
struct published_test_suite_info {
const char *name;
unsigned int tvcount;
struct des3_test_vector *tv;
unsigned int size;
unsigned long mechanism;
};
struct generated_test_suite_info {
const char *name;
CK_MECHANISM mech;
};
struct CK_MECHANISM des3_keygen = {
.mechanism = CKM_DES3_KEY_GEN,
.ulParameterLen = 0,
.pParameter = NULL,
};
struct mac_test_vector {
unsigned char key[MAX_KEY_SIZE];
unsigned char klen;
unsigned char msg[MAX_TEXT_SIZE];
unsigned char mlen;
unsigned char mac[MAX_KEY_SIZE];
unsigned char tlen;
int chunks_msg[MAX_CHUNKS];
int num_chunks_message;
};
struct published_mac_test_suite_info {
const char *name;
unsigned int tvcount;
struct mac_test_vector *tv;
CK_MECHANISM mech;
CK_KEY_TYPE key_type;
};
unsigned char des3_cbc_iv[] = {0x67, 0x9f, 0xdb, 0xee, 0x16, 0x6c, 0x2e, 0x0a};
/** http://csrc.nist.gov/groups/STM/cavp/documents/des/tdesmmt.zip
TECBMMT1.rsp
**/
static struct des3_test_vector des3_ecb_tv[] = {
{ // #0
.key = {0xe9, 0x7c, 0x83, 0x13, 0xba, 0x26, 0x5d, 0x43, 0x25,
0x4c, 0xbf, 0x9e, 0x8f, 0x7c, 0x2a, 0xa8, 0xa7, 0x54,
0xd6, 0x5e, 0x8a, 0xe9, 0x97, 0xe3},
.klen = 24,
.iv = {0},
.ivlen = 0,
.plaintext = {0x46, 0x56, 0xed, 0x81, 0xa8, 0xbc, 0x58, 0xa9},
.plen = 8,
.ciphertext = {0x42, 0x6a, 0x0a, 0xc2, 0x65, 0x86, 0xbf, 0x6c},
.clen = 8,
}, { // #1
.key = {0x86, 0x6d, 0x38, 0x94, 0xb3, 0x67, 0x0e, 0xfe, 0x37,
0x54, 0xa2, 0xe5, 0x0e, 0x76, 0x7f, 0xcd, 0x34, 0x51,
0xfb, 0x68, 0x89, 0xda, 0xfe, 0xb5},
.klen = 24,
.iv = {0},
.ivlen = 0,
.plaintext = {0x50, 0xea, 0xab, 0x2a, 0x14, 0x14, 0x07, 0xc4, 0x7d,
0x71, 0x6b, 0x70, 0x36, 0x50, 0xf3, 0xa8},
.plen = 16,
.ciphertext = {0xb7, 0x84, 0xaf, 0xf1, 0x1d, 0x71, 0x5d, 0x60, 0x18,
0x5d, 0x11, 0x1a, 0x29, 0x10, 0xeb, 0xca},
.clen = 16,
}, { // #2
.key = {0x02, 0x20, 0x04, 0x83, 0xba, 0x6d, 0xf7, 0x67, 0x5d,
0xea, 0x40, 0x73, 0xb0, 0x2a, 0x1c, 0x5b, 0x85, 0x02,
0x54, 0x23, 0xe5, 0xc4, 0xa4, 0xb5},
.klen = 24,
.iv = {0},
.ivlen = 0,
.plaintext = {0x30, 0x0c, 0xe0, 0x17, 0x8d, 0x4d, 0x54, 0x56, 0x40,
0x24, 0x3b, 0x9d, 0xb8, 0x18, 0x90, 0x4a, 0xe9, 0x17,
0x19, 0x5d, 0xe7, 0xbb, 0x9a, 0xda},
.plen = 24,
.ciphertext = {0x8f, 0x83, 0x4b, 0x37, 0xf7, 0x40, 0x4e, 0x5e, 0xdb,
0x32, 0xd1, 0x0b, 0x17, 0x5c, 0x28, 0xac, 0x6d, 0x94,
0x3b, 0x19, 0xc2, 0x59, 0x83, 0x49},
.clen = 24,
.num_chunks = 3,
.chunks = {8, 8, 8},
}, { // #3
.key = {0x2c, 0x29, 0x20, 0x2c, 0x10, 0x79, 0x79, 0x85, 0xef,
0xc2, 0x52, 0xb3, 0xda, 0x37, 0x8a, 0x89, 0xe9, 0xa7,
0xf8, 0x8c, 0x98, 0xc7, 0x3b, 0x1c},
.klen = 24,
.iv = {0},
.ivlen = 0,
.plaintext = {0x40, 0x58, 0x77, 0x1b, 0x9c, 0x80, 0x8e, 0x69, 0x35,
0x65, 0x0f, 0x97, 0xdb, 0x27, 0xe9, 0xe6, 0x96, 0x41,
0xfc, 0xc5, 0xe7, 0xbc, 0x7f, 0xa5, 0x51, 0xa2, 0x9f,
0x09, 0x18, 0xb6, 0x69, 0xdc},
.plen = 32,
.ciphertext = {0x94, 0x38, 0xd7, 0xb8, 0xb2, 0x05, 0x7a, 0x62, 0x4a,
0x40, 0x71, 0xde, 0x46, 0xc9, 0x86, 0xa3, 0x39, 0x3d,
0xa8, 0x68, 0xa2, 0x96, 0x47, 0x04, 0x14, 0x18, 0xcb,
0x94, 0x6a, 0x51, 0xd3, 0x68},
.clen = 32,
.num_chunks = 2,
.chunks = {16, 16},
}, { // #4
.key = {0xc4, 0x02, 0x97, 0x20, 0x20, 0xec, 0x0e, 0x4a, 0x64,
0x83, 0x3d, 0xfd, 0x5b, 0x1a, 0x43, 0xbf, 0x20, 0xf7,
0x3b, 0xc7, 0x0b, 0xbf, 0x8f, 0x08},
.klen = 24,
.iv = {0},
.ivlen = 0,
.plaintext = {0x35, 0x1c, 0xc5, 0xe4, 0xa8, 0xa8, 0xb0, 0xb0, 0xdb,
0x89, 0xde, 0xef, 0xfc, 0xc4, 0x91, 0xee, 0xfa, 0x1f,
0xc4, 0xcb, 0x45, 0xd8, 0x0e, 0xcf, 0xd5, 0x96, 0xc8,
0xfd, 0x6d, 0xa0, 0x72, 0xeb, 0x21, 0x4d, 0x53, 0xd1,
0x16, 0xbc, 0x60, 0xe0},
.plen = 40,
.ciphertext = {0xc8, 0x50, 0xf2, 0xb1, 0xe1, 0xd3, 0x76, 0xb3, 0xbd,
0x08, 0x66, 0xd0, 0xfd, 0x23, 0x51, 0x5c, 0x4c, 0x95,
0x60, 0xe9, 0x3d, 0x5e, 0x74, 0xe7, 0x4e, 0xb2, 0xd3,
0xd9, 0x04, 0xc7, 0xf2, 0x90, 0xee, 0xc9, 0x53, 0x9d,
0xf3, 0xd8, 0xc7, 0x8a},
.clen = 40,
.num_chunks = 3,
.chunks = {20, -1, 20},
}, { // #5
.key = {0x68, 0x26, 0xf8, 0x91, 0x07, 0x9d, 0xda, 0x4c, 0x0e,
0x57, 0xd0, 0x58, 0x13, 0x62, 0x9d, 0x61, 0x97, 0x89,
0xbc, 0x68, 0x4a, 0xe9, 0x6d, 0x32},
.klen = 24,
.iv = {0},
.ivlen = 0,
.plaintext = {0xf5, 0xee, 0x26, 0x02, 0x16, 0x50, 0xef, 0x21, 0x8f,
0xa4, 0xf4, 0x4a, 0xa5, 0xeb, 0xc5, 0x22, 0x7d, 0x86,
0xd3, 0xa5, 0x30, 0xf5, 0x24, 0x0d, 0x21, 0xe5, 0x4b,
0xf6, 0x8f, 0x6a, 0x98, 0xbf, 0x66, 0x89, 0x8c, 0x33,
0x5b, 0xf9, 0x8f, 0x69, 0x37, 0x2a, 0xe5, 0xe8, 0x73,
0x87, 0xdf, 0x0f},
.plen = 48,
.ciphertext = {0xa8, 0x19, 0xe2, 0xbc, 0x81, 0x0d, 0xd1, 0xc6, 0xed,
0x4e, 0x7e, 0x07, 0x6c, 0x5a, 0x05, 0xc3, 0xce, 0xb6,
0xdb, 0x5e, 0x21, 0x74, 0xc2, 0x86, 0x3d, 0x05, 0x24,
0x93, 0xca, 0x24, 0x80, 0x3d, 0xce, 0x58, 0x8b, 0x4b,
0x92, 0x8b, 0x36, 0x4d, 0xe7, 0x58, 0x8e, 0xb6, 0x62,
0xb5, 0x8c, 0xa6},
.clen = 48,
.num_chunks = 4,
.chunks = {28, 13, 0, 7},
}, { // #6
.key = {0x94, 0xec, 0x51, 0xd0, 0x80, 0x4a, 0x15, 0x31, 0x68,
0x5e, 0x1c, 0x6b, 0x9b, 0xab, 0xc7, 0x08, 0x02, 0x89,
0x40, 0x6e, 0x51, 0x19, 0x61, 0xda},
.klen = 24,
.iv = {0},
.ivlen = 0,
.plaintext = {0x4e, 0xc4, 0x2e, 0xbd, 0x1e, 0x7d, 0xc5, 0xf2, 0xcf,
0xba, 0x60, 0x67, 0xda, 0x9f, 0xe7, 0x77, 0xfb, 0x84,
0x9d, 0x67, 0x37, 0xed, 0x48, 0xf6, 0x1e, 0xbc, 0x91,
0x35, 0x4e, 0xa5, 0xad, 0x99, 0x38, 0xe3, 0x3d, 0x4f,
0x27, 0x29, 0x73, 0xcf, 0x7e, 0xdc, 0x77, 0xb4, 0x40,
0x7f, 0x09, 0xcb, 0xd6, 0x6f, 0x67, 0x6a, 0x0d, 0xd0,
0x71, 0x03},
.plen = 56,
.ciphertext = {0xdd, 0x61, 0x15, 0x22, 0x7a, 0x40, 0x90, 0x7c, 0x83,
0x5a, 0x98, 0xeb, 0x22, 0x78, 0x6d, 0xd6, 0x77, 0x19,
0x09, 0xd0, 0x9c, 0x4d, 0x9e, 0x3a, 0xe6, 0x99, 0xcd,
0xbd, 0x11, 0x0a, 0x82, 0xe1, 0xca, 0xc4, 0xd3, 0x2f,
0xc3, 0x5a, 0x5b, 0x3d, 0xb5, 0xba, 0x1a, 0xc1, 0x88,
0xcc, 0x63, 0x39, 0xc6, 0x63, 0x34, 0xde, 0xde, 0xca,
0x7e, 0x4e},
.clen = 56,
}, { // #7
.key = {0x04, 0xe3, 0xf4, 0x67, 0x02, 0x91, 0x32, 0x13, 0xb0,
0x07, 0x76, 0xbf, 0x52, 0xc7, 0x8a, 0xcb, 0xfd, 0xab,
0xa1, 0xf8, 0xb6, 0xd6, 0x58, 0x57},
.klen = 24,
.iv = {0},
.ivlen = 0,
.plaintext = {0x9e, 0xc9, 0xa6, 0x9f, 0xf3, 0x69, 0x22, 0x5b, 0x75,
0x03, 0x38, 0xaa, 0x11, 0xdb, 0xee, 0x12, 0x7f, 0xda,
0x57, 0xe4, 0x24, 0xe1, 0xa1, 0x26, 0x36, 0x5d, 0x56,
0xd1, 0x21, 0x1c, 0xdb, 0x3d, 0x29, 0x5f, 0x3d, 0xd9,
0x51, 0x30, 0x2c, 0x1f, 0x7c, 0xf5, 0x48, 0xc7, 0xd3,
0x46, 0x9c, 0x3b, 0x66, 0xfc, 0x68, 0x4c, 0x16, 0x8a,
0x24, 0x23, 0xb2, 0x91, 0xc1, 0x7a, 0x60, 0xae, 0x32,
0x0c},
.plen = 64,
.ciphertext = {0x85, 0x88, 0xa7, 0x92, 0x64, 0x0c, 0x21, 0x5b, 0xcb,
0x3b, 0x93, 0x89, 0x7e, 0xd8, 0xc5, 0x49, 0x63, 0x36,
0xca, 0xc5, 0xa4, 0xbd, 0x39, 0x3e, 0x9d, 0x35, 0x67,
0xf8, 0x70, 0x45, 0xb3, 0xa1, 0x4c, 0x4b, 0xfd, 0x3e,
0x2c, 0x3b, 0x5e, 0x6e, 0xe1, 0x5c, 0xfb, 0xba, 0xd3,
0x92, 0xef, 0x92, 0x95, 0x31, 0x21, 0x8f, 0x4e, 0x9a,
0x85, 0x81, 0xf0, 0xb5, 0xc0, 0x92, 0xfd, 0x64, 0x3c,
0xe2},
.clen = 64,
}, { // #8
.key = {0xb6, 0xb0, 0xda, 0xc8, 0xa8, 0x38, 0x61, 0x10, 0x32,
0x75, 0xd0, 0x4f, 0x46, 0x7a, 0x40, 0xb3, 0x92, 0x4c,
0x3d, 0xc4, 0x0d, 0xbf, 0x7c, 0x79},
.klen = 24,
.iv = {0},
.ivlen = 0,
.plaintext = {0x8f, 0x6e, 0x5d, 0x5d, 0xa6, 0xdc, 0x3a, 0x8e, 0xf8,
0x7b, 0xe3, 0x47, 0xf5, 0x46, 0x72, 0x05, 0xbb, 0x3c,
0x00, 0x4e, 0x42, 0xbe, 0x76, 0x3a, 0xd6, 0x38, 0xa0,
0x32, 0xcb, 0x03, 0x83, 0xf8, 0x6c, 0x8a, 0xf1, 0xe7,
0x34, 0xac, 0x5a, 0x7d, 0x41, 0x62, 0xe5, 0x16, 0x05,
0xa2, 0xbf, 0xfa, 0x3f, 0x83, 0xb3, 0x9a, 0x29, 0xa1,
0xfc, 0x17, 0xf3, 0xc3, 0x57, 0x04, 0x71, 0xbb, 0x5c,
0x6d, 0x11, 0x8e, 0x0d, 0x18, 0x0f, 0xd5, 0xb0, 0x0a},
.plen = 72,
.ciphertext = {0x7b, 0xe0, 0x1e, 0x90, 0x9b, 0x9d, 0x8d, 0x33, 0xd4,
0xba, 0x8d, 0x24, 0xee, 0x9a, 0xc2, 0x78, 0x89, 0x8d,
0xca, 0xb3, 0xaf, 0xaf, 0x4c, 0xde, 0xf7, 0x3c, 0x53,
0x9c, 0x99, 0x6b, 0x97, 0xa9, 0x68, 0x77, 0x9d, 0x27,
0x30, 0xac, 0x7d, 0x0c, 0xbf, 0x68, 0x20, 0xee, 0x3d,
0xc2, 0x6c, 0xa7, 0x15, 0x8c, 0xeb, 0x37, 0xa0, 0xb4,
0x95, 0x65, 0x16, 0xe0, 0xd9, 0x61, 0x8c, 0xce, 0xff,
0xa5, 0xfe, 0x83, 0x6c, 0xd5, 0x53, 0xa1, 0x77, 0x8c},
.clen = 72,
}, { // #9
.key = {0xa8, 0xd9, 0xfb, 0xec, 0xb9, 0x64, 0x67, 0xbc, 0xbf,
0xdf, 0x57, 0xa1, 0x1c, 0x49, 0xc7, 0x7f, 0x0d, 0x3e,
0xce, 0x23, 0xcd, 0xd0, 0xf1, 0x79},
.klen = 24,
.iv = {0},
.ivlen = 0,
.plaintext = {0x89, 0xd6, 0x67, 0xba, 0x5e, 0x88, 0xf5, 0x63, 0xad,
0x02, 0x9a, 0x7f, 0x78, 0x87, 0x97, 0x1d, 0x20, 0x44,
0x7b, 0x5c, 0xdb, 0xec, 0x3d, 0x2e, 0x62, 0xa0, 0x88,
0x5c, 0xea, 0x11, 0x56, 0xca, 0x56, 0xe8, 0xc0, 0xfd,
0xab, 0x66, 0x14, 0xda, 0xc4, 0x47, 0x29, 0xb0, 0x47,
0xed, 0xef, 0x79, 0xd7, 0xba, 0x4a, 0x5d, 0x8b, 0xbe,
0x21, 0x78, 0x9f, 0x92, 0xb2, 0xdd, 0x6a, 0x83, 0x28,
0xdb, 0x90, 0xf3, 0x6f, 0x7f, 0x79, 0xfd, 0x47, 0x59,
0x02, 0x58, 0x97, 0x83, 0x72, 0x7e, 0x04, 0xe0},
.plen = 80,
.ciphertext = {0xc3, 0x69, 0x6e, 0x20, 0xf3, 0x35, 0xb3, 0xf7, 0x62,
0x9b, 0xe3, 0x38, 0xd8, 0x70, 0xd2, 0x79, 0x5b, 0x30,
0x75, 0xe9, 0xb8, 0x85, 0x2c, 0x3a, 0xae, 0xa0, 0x76,
0x97, 0x7f, 0x62, 0xa9, 0xaf, 0xfd, 0x8e, 0x75, 0x68,
0x83, 0x1f, 0x1b, 0x99, 0x40, 0x4e, 0x9a, 0xd4, 0xd5,
0x26, 0x84, 0x21, 0x7e, 0xe2, 0x7d, 0xb9, 0x85, 0x10,
0xc0, 0x99, 0x4f, 0x53, 0xa2, 0x63, 0xd1, 0x0e, 0xba,
0x9b, 0xa2, 0x96, 0xd0, 0x90, 0x9a, 0x51, 0x75, 0xa9,
0xa7, 0x63, 0x74, 0x41, 0xfd, 0x42, 0x00, 0xcc},
.clen = 80,
}
};
/** http://csrc.nist.gov/groups/STM/cavp/documents/des/tdesmmt.zip
TCBCMMT3.rsp
**/
static struct des3_test_vector des3_cbc_tv[] = {
{ // #0
.key = {0x46, 0x13, 0x3d, 0xcb, 0xf2, 0x32, 0xb5, 0x19, 0x64,
0xe0, 0xd9, 0x5e, 0x83, 0x20, 0x8f, 0x15, 0x67, 0x32,
0xbf, 0x75, 0xb6, 0x73, 0xab, 0xf1},
.klen = 24,
.iv = {0x34, 0x81, 0x4c, 0x87, 0xf4, 0x7f, 0xd5, 0x9d},
.ivlen = DES3_IV_SIZE,
.plaintext = {0xde, 0x65, 0x5a, 0x0e, 0xa7, 0x71, 0x43, 0x6c},
.plen = 8,
.ciphertext = {0x09, 0x23, 0x68, 0x40, 0x52, 0x96, 0x74, 0x4a},
.clen = 8,
}, { // #1
.key = {0x6d, 0x0d, 0x67, 0xda, 0x68, 0xab, 0x16, 0x6d, 0x1f,
0x43, 0xc7, 0x20, 0x4c, 0x4c, 0x2a, 0xa4, 0xc8, 0x1a,
0x52, 0x85, 0x15, 0xf1, 0xdf, 0xf2},
.klen = 24,
.iv = {0x68, 0xe6, 0x3a, 0x07, 0xb2, 0x2e, 0x33, 0xeb},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x43, 0x46, 0xc4, 0xe8, 0x13, 0x80, 0x62, 0x6f, 0xa0,
0xb2, 0x77, 0x6d, 0x30, 0xa4, 0xfc, 0x05},
.plen = 16,
.ciphertext = {0x52, 0x74, 0xbe, 0x18, 0x3f, 0x5d, 0xfb, 0x6b, 0x01,
0x8f, 0x22, 0xb3, 0x22, 0xf0, 0x39, 0x2d},
.clen = 16,
}, { // #2
.key = {0x13, 0x4c, 0xb3, 0xef, 0xe6, 0x2a, 0x4a, 0xd5, 0x52,
0xcb, 0x85, 0xa1, 0x64, 0xfe, 0xe6, 0xb9, 0x64, 0xa1,
0x26, 0x9b, 0x19, 0x3d, 0x68, 0xc4},
.klen = 24,
.iv = {0x0f, 0xa3, 0x11, 0xf9, 0x9e, 0xc5, 0x7b, 0x86},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x1b, 0x73, 0x5b, 0x05, 0x57, 0x25, 0x5a, 0x0e, 0x6d,
0x8d, 0x67, 0x58, 0x79, 0xe7, 0x20, 0x1c, 0xa3, 0x4c,
0x87, 0x61, 0xa1, 0x29, 0xa9, 0x14},
.plen = 24,
.ciphertext = {0x2f, 0x1a, 0xc7, 0xee, 0x14, 0x14, 0xaf, 0x15, 0x58,
0x7c, 0xb2, 0xc5, 0x40, 0x40, 0x12, 0x94, 0x02, 0x8e,
0x1e, 0x39, 0xd1, 0xcf, 0x2f, 0x67},
.clen = 24,
.num_chunks = 3,
.chunks = {8, 8, 8},
}, { // #3
.key = {0x20, 0x23, 0x98, 0xb6, 0x15, 0x49, 0x68, 0xc1, 0x68,
0x20, 0x13, 0x29, 0x91, 0x0e, 0x61, 0x2f, 0x29, 0x61,
0x89, 0xd3, 0x20, 0x67, 0x01, 0x20},
.klen = 24,
.iv = {0x51, 0x42, 0x73, 0xc9, 0x38, 0x06, 0xfd, 0xe6},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x9a, 0x5e, 0xc9, 0x13, 0x87, 0x62, 0x99, 0x49, 0x2d,
0xda, 0x39, 0x98, 0xf8, 0x8e, 0x1c, 0x31, 0xa7, 0x54,
0x93, 0xb3, 0xad, 0xe1, 0x4e, 0x9e, 0xd7, 0xde, 0x1f,
0x0a, 0x30, 0x3f, 0x02, 0x99},
.plen = 32,
.ciphertext = {0x9b, 0xc0, 0x22, 0x47, 0xff, 0x5c, 0xef, 0xde, 0x9a,
0x03, 0x07, 0xf9, 0x48, 0xf9, 0x43, 0x7e, 0xf2, 0xa2,
0x98, 0xcd, 0xd6, 0x95, 0x42, 0x23, 0x6c, 0xba, 0x47,
0xe8, 0xc9, 0x54, 0xe8, 0x19},
.clen = 32,
.num_chunks = 2,
.chunks = {16, 16},
}, { // #4
.key = {0x19, 0x94, 0x76, 0xc2, 0x43, 0x02, 0xb6, 0xab, 0x0b,
0x98, 0xd5, 0xa8, 0x07, 0x07, 0x9e, 0x43, 0x37, 0xe6,
0x8f, 0x5e, 0xc7, 0x75, 0x61, 0xab},
.klen = 24,
.iv = {0x6e, 0x06, 0x87, 0x59, 0x55, 0xb8, 0x7f, 0x87},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x42, 0x0f, 0xdf, 0xfb, 0x70, 0x67, 0x70, 0xba, 0x1a,
0xee, 0x85, 0xbb, 0x99, 0x2e, 0xd2, 0xef, 0xe7, 0xc4,
0xcb, 0x10, 0xa7, 0x5c, 0xc0, 0x35, 0x65, 0xdd, 0x4d,
0xa4, 0x1e, 0xe1, 0xf1, 0xe7, 0x03, 0x68, 0xfd, 0x22,
0x7a, 0xcd, 0xb0, 0xa3},
.plen = 40,
.ciphertext = {0xf3, 0x90, 0xd5, 0xaf, 0xc5, 0x96, 0x9d, 0x63, 0xd9,
0xc0, 0xa9, 0x5e, 0x1f, 0x1c, 0x29, 0x0d, 0x0b, 0xd2,
0x95, 0x10, 0xe8, 0xe9, 0x82, 0x50, 0x2f, 0xaa, 0x7e,
0xd6, 0x16, 0xcf, 0xe8, 0x73, 0xaf, 0x88, 0xb2, 0x7a,
0x7b, 0x62, 0xcb, 0x21},
.clen = 40,
.num_chunks = 0,
.chunks = {20, -1, 20},
}, { // #5
.key = {0x32, 0x3b, 0xf2, 0x4f, 0xe0, 0xad, 0x70, 0x94, 0x3e,
0x70, 0xbf, 0x1c, 0x5d, 0xf4, 0xd5, 0x31, 0xdc, 0x0d,
0x92, 0x6e, 0x83, 0x80, 0x4c, 0x4a},
.klen = 24,
.iv = {0x29, 0x85, 0x58, 0xd9, 0x55, 0x17, 0xa0, 0x45},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x26, 0xe4, 0x4a, 0xa7, 0x8f, 0xcc, 0x69, 0x06, 0x87,
0xe7, 0x4c, 0xfd, 0xfc, 0xbd, 0x6e, 0xf3, 0x46, 0x96,
0x01, 0x1e, 0x5a, 0xe1, 0xcb, 0xfe, 0x40, 0xd6, 0x33,
0x2b, 0xc7, 0x5b, 0x9c, 0x51, 0x77, 0x24, 0xf1, 0x79,
0xc7, 0x1f, 0x81, 0x8a, 0x90, 0x0f, 0x0e, 0x0f, 0xc2,
0x76, 0x20, 0x3a},
.plen = 48,
.ciphertext = {0xd0, 0x9b, 0x95, 0x68, 0x87, 0x77, 0x69, 0x78, 0x0f,
0xda, 0x99, 0x11, 0xc2, 0x9b, 0x30, 0x3b, 0x27, 0xe1,
0x5b, 0x5f, 0x29, 0xb2, 0xdd, 0xf8, 0x9c, 0x3b, 0x7e,
0xdc, 0xc0, 0x4d, 0xee, 0x78, 0xb7, 0x51, 0xd4, 0x59,
0xa5, 0x0d, 0xf3, 0xae, 0x57, 0xbf, 0xfd, 0x4b, 0x4c,
0xa4, 0x1f, 0xc4},
.clen = 48,
.num_chunks = 4,
.chunks = {28, 13, 0, 7},
}, { // #6
.key = {0xf7, 0xa4, 0x94, 0xc2, 0x73, 0x26, 0x73, 0x4a, 0x10,
0x45, 0x25, 0x04, 0x10, 0x52, 0x10, 0x3e, 0xf2, 0x68,
0x0e, 0x3b, 0xd3, 0x5e, 0xa1, 0x58},
.klen = 24,
.iv = {0xa5, 0xfe, 0x08, 0xd9, 0x04, 0x5b, 0xbf, 0x88},
.ivlen = DES3_IV_SIZE,
.plaintext = {0xf9, 0x11, 0x72, 0x49, 0x04, 0x7f, 0xb9, 0xfe, 0x88,
0x4c, 0x89, 0x26, 0x7e, 0x5a, 0xc9, 0x63, 0x14, 0xf2,
0x33, 0xd2, 0x01, 0xc1, 0x4d, 0x33, 0x15, 0x20, 0x9a,
0x4a, 0x14, 0x99, 0x11, 0x84, 0xc4, 0xa6, 0xce, 0xde,
0x45, 0xbb, 0x08, 0x03, 0xa1, 0x87, 0x43, 0xb4, 0xa4,
0x78, 0xc6, 0x6d, 0xee, 0x7d, 0x50, 0x46, 0x46, 0x0f,
0x07, 0x17},
.plen = 56,
.ciphertext = {0xc8, 0x9f, 0xf7, 0xbc, 0xc5, 0x55, 0x89, 0x52, 0xe8,
0x61, 0x4a, 0x7b, 0xfc, 0xf8, 0xa1, 0xb0, 0x17, 0xf0,
0x40, 0xef, 0x95, 0x4f, 0x65, 0x52, 0x69, 0x6a, 0xe5,
0x3b, 0x70, 0xe6, 0xf9, 0x53, 0xba, 0x6d, 0x9d, 0x0e,
0xfe, 0x38, 0x1c, 0x2b, 0xdd, 0x54, 0xd9, 0x11, 0xad,
0x6e, 0xac, 0x5b, 0x0c, 0xe2, 0x84, 0x53, 0x41, 0xae,
0x34, 0x58},
.clen = 56,
}, { // #7
.key = {0xd3, 0x31, 0x89, 0x58, 0xc7, 0x8c, 0xfd, 0x98, 0xc7,
0xae, 0x31, 0x2a, 0x2c, 0x08, 0xbc, 0xfe, 0xfd, 0x10,
0x26, 0x97, 0x29, 0x01, 0x3d, 0xe5},
.klen = 24,
.iv = {0x01, 0xb6, 0xdd, 0x4a, 0x4c, 0x96, 0x34, 0x9a},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x83, 0x57, 0x73, 0x46, 0x84, 0x1a, 0x1b, 0xbf, 0x08,
0xfb, 0x6d, 0x2b, 0xe3, 0x51, 0xf3, 0x39, 0x14, 0xef,
0xc8, 0xef, 0x9a, 0xa7, 0x05, 0x4b, 0x89, 0x0d, 0x7c,
0x2b, 0x5c, 0x7d, 0xa9, 0x6a, 0x8d, 0x60, 0xe5, 0x4c,
0x63, 0xaa, 0xdd, 0x1c, 0x0c, 0xa7, 0x43, 0x13, 0xeb,
0xf8, 0xc3, 0x7c, 0x33, 0xd9, 0x39, 0x16, 0xb5, 0xa5,
0x21, 0xba, 0xf6, 0x9b, 0x4e, 0x3d, 0x85, 0xe2, 0xe0,
0x98},
.plen = 64,
.ciphertext = {0x8b, 0xe3, 0x0c, 0xa7, 0x45, 0xa0, 0x6e, 0x2f, 0x67,
0xc3, 0xec, 0x2e, 0xd1, 0x8e, 0x87, 0x20, 0x28, 0x44,
0x85, 0x97, 0x21, 0x8b, 0x00, 0x77, 0x46, 0xd9, 0x54,
0xda, 0x0b, 0xa6, 0xb3, 0xdb, 0x20, 0xf9, 0xa2, 0x8d,
0x7f, 0xae, 0xa3, 0x2e, 0xe3, 0xf1, 0x31, 0x03, 0xdc,
0x80, 0x18, 0xe8, 0xf9, 0x7d, 0xc2, 0xc3, 0x48, 0xd2,
0x96, 0x6c, 0x9e, 0x2b, 0x87, 0xb0, 0xf3, 0x18, 0xe0,
0x26},
.clen = 64,
}, { // #8
.key = {0xa4, 0xe5, 0x0d, 0x8a, 0x1f, 0x64, 0xf4, 0xd9, 0xf4,
0x1a, 0x8a, 0xd0, 0xa8, 0xc8, 0x68, 0xb3, 0x4a, 0xc8,
0x61, 0xdc, 0x4c, 0x38, 0xfd, 0x89},
.klen = 24,
.iv = {0xf2, 0x10, 0x47, 0xa0, 0x8a, 0x1b, 0xed, 0x96},
.ivlen = DES3_IV_SIZE,
.plaintext = {0xfa, 0x7c, 0x94, 0xa2, 0xeb, 0x67, 0xdb, 0xf0, 0xce,
0x8e, 0x30, 0xd5, 0xb9, 0x44, 0xe9, 0x58, 0x5f, 0xfe,
0xf8, 0xb9, 0xd8, 0x07, 0xca, 0xbd, 0xa0, 0x75, 0x6f,
0x46, 0xe1, 0x5b, 0xfa, 0x26, 0xf5, 0x40, 0x2b, 0x35,
0x26, 0xd0, 0x4b, 0xa2, 0xb9, 0xd2, 0x58, 0x86, 0x2c,
0x5a, 0x62, 0xbf, 0xbb, 0x40, 0x35, 0xfb, 0x29, 0xd0,
0x38, 0x13, 0xbc, 0xc3, 0x95, 0x9b, 0x8a, 0x6f, 0x9a,
0xb7, 0xf3, 0x3a, 0x60, 0x2f, 0x6f, 0x54, 0xaa, 0xc6},
.plen = 72,
.ciphertext = {0xe4, 0x02, 0x5b, 0x1f, 0x5b, 0xcd, 0xe6, 0xea, 0xe6,
0xc7, 0xbb, 0xfd, 0x48, 0x51, 0x25, 0x8a, 0xf6, 0xd0,
0x97, 0x79, 0x1a, 0x02, 0xd8, 0xdf, 0x54, 0x83, 0xa8,
0xcb, 0xcf, 0xea, 0xaf, 0x52, 0xdd, 0xdb, 0x61, 0xbf,
0x1d, 0xdc, 0x52, 0xb9, 0xcb, 0x6d, 0xf9, 0x47, 0xcb,
0x04, 0x92, 0x48, 0x90, 0x36, 0x21, 0x25, 0x43, 0xfa,
0xb8, 0x26, 0x94, 0x44, 0x9c, 0x8d, 0x3d, 0x32, 0x3d,
0xce, 0x01, 0x6e, 0x26, 0x48, 0xac, 0x6f, 0x65, 0x3e},
.clen = 72,
}, { // #9
.key = {0x08, 0x76, 0x3d, 0xa8, 0x62, 0xad, 0x16, 0xef, 0x58,
0x15, 0x40, 0x8f, 0x5d, 0x3b, 0x70, 0x54, 0x15, 0xab,
0x15, 0x43, 0xa4, 0x2c, 0x3e, 0xfb},
.klen = 24,
.iv = {0x06, 0x34, 0xd6, 0x9e, 0xaf, 0xf3, 0xae, 0x17},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x10, 0x9a, 0x3d, 0x3d, 0x74, 0x5d, 0x65, 0xb3, 0x8e,
0xdb, 0xc7, 0x3d, 0x1d, 0xe8, 0xb2, 0x80, 0x7f, 0x78,
0x20, 0x22, 0x1a, 0x6c, 0x39, 0x37, 0xfa, 0xab, 0x19,
0xfc, 0xbb, 0x75, 0xd3, 0xc8, 0xaa, 0xf4, 0xb6, 0x3f,
0x27, 0x14, 0xcf, 0xc9, 0x4e, 0x95, 0xae, 0x43, 0xd6,
0x5f, 0x6d, 0xf4, 0x38, 0x15, 0xef, 0xc2, 0x14, 0xec,
0x66, 0xa5, 0xd1, 0xbe, 0x18, 0x5d, 0x85, 0x5a, 0x62,
0x60, 0x14, 0x1f, 0xfd, 0x17, 0x9b, 0xc9, 0x80, 0x49,
0x0f, 0x8a, 0x26, 0xd8, 0x21, 0x5d, 0xd2, 0xab},
.plen = 80,
.ciphertext = {0xe9, 0x51, 0x3e, 0x88, 0x92, 0xa0, 0x90, 0x85, 0xbe,
0xe2, 0x9c, 0x35, 0x80, 0x14, 0xaf, 0xd6, 0x0d, 0x75,
0x78, 0xd2, 0x1e, 0x00, 0xa3, 0x1e, 0x5d, 0x61, 0xb9,
0x65, 0xc1, 0x87, 0x78, 0xeb, 0xe1, 0x84, 0x69, 0x17,
0x07, 0x94, 0xe5, 0xdd, 0xf2, 0x4a, 0xa7, 0x77, 0xc8,
0xab, 0x0a, 0x2c, 0x62, 0x47, 0x41, 0x09, 0xe6, 0x17,
0x97, 0x8b, 0xcc, 0x5c, 0xe3, 0x45, 0x6d, 0xdd, 0x96,
0x22, 0x83, 0x34, 0x20, 0x44, 0x3c, 0x2a, 0x26, 0xb1,
0xb6, 0xe2, 0x0a, 0x05, 0xc1, 0x89, 0xda, 0x6c},
.clen = 80,
}
};
/** http://csrc.nist.gov/groups/STM/cavp/documents/des/tdesmmt.zip
TCFB8MMT3.rsp
**/
static struct des3_test_vector des3_cfb8_tv[] = {
{ // #0
.key = {0x94, 0x73, 0xba, 0x2c, 0x29, 0xa8, 0x7f, 0xec, 0x4f,
0x38, 0x29, 0xb3, 0xb6, 0xbc, 0x9e, 0x92, 0x43, 0x4c,
0xab, 0x51, 0x89, 0x0e, 0xda, 0x8c},
.klen = 24,
.iv = {0x34, 0x20, 0xb1, 0x32, 0x81, 0xd3, 0x0b, 0x06},
.ivlen = DES3_IV_SIZE,
.plaintext = {0xcd},
.plen = 1,
.ciphertext = {0x22},
.clen = 1,
}, { // #1
.key = {0xb6, 0x92, 0xea, 0x4a, 0x62, 0x29, 0x9b, 0x32, 0xd9,
0x04, 0x51, 0x38, 0x8a, 0x25, 0x8f, 0xce, 0x3b, 0x3b,
0x1c, 0xfd, 0x34, 0xbc, 0x7f, 0x5d},
.klen = 24,
.iv = {0x54, 0xc0, 0xb1, 0xef, 0xef, 0xf2, 0x53, 0xa2},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x32, 0xee},
.plen = 2,
.ciphertext = {0x7c, 0x92},
.clen = 2,
}, { // #2
.key = {0x40, 0x49, 0x02, 0xc8, 0x51, 0x19, 0xda, 0xb6, 0x1f,
0xb5, 0xce, 0xd6, 0xf4, 0x6b, 0x45, 0xf8, 0xe5, 0xe0,
0x61, 0x34, 0xa8, 0xb5, 0xc1, 0xb9},
.klen = 24,
.iv = {0xa3, 0xd6, 0x97, 0x32, 0xf9, 0x4f, 0xff, 0xc7},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x14, 0xc4, 0x5c},
.plen = 3,
.ciphertext = {0x35, 0x8d, 0x66},
.clen = 3,
}, { // #3
.key = {0xc4, 0xd3, 0x45, 0xfd, 0xdc, 0x9d, 0xf7, 0x02, 0x3b,
0x04, 0xe6, 0x76, 0x52, 0x8a, 0x2f, 0x57, 0xe0, 0x51,
0xba, 0x86, 0x6b, 0x98, 0x7a, 0xba},
.klen = 24,
.iv = {0xd7, 0x6f, 0xbd, 0x43, 0x4d, 0x8b, 0x2e, 0xd9},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x1d, 0x1e, 0x42, 0xcd},
.plen = 4,
.ciphertext = {0x44, 0xde, 0xee, 0xe3},
.clen = 4,
}, { // #4
.key = {0xf1, 0xc4, 0x07, 0xf8, 0x25, 0x0b, 0xcd, 0x10, 0xda,
0x91, 0x4f, 0x62, 0x6b, 0xf7, 0x15, 0x54, 0x8c, 0x31,
0xd6, 0xe0, 0xba, 0x70, 0xec, 0x5b},
.klen = 24,
.iv = {0x0f, 0x9d, 0x30, 0x71, 0xaf, 0x25, 0xa1, 0x42},
.ivlen = DES3_IV_SIZE,
.plaintext = {0xa4, 0x3e, 0xcd, 0x3d, 0x06},
.plen = 5,
.ciphertext = {0x6a, 0x6d, 0xa4, 0x8c, 0x70},
.clen = 5,
}, { // #5
.key = {0x26, 0x7c, 0xcb, 0xea, 0xa4, 0x91, 0x25, 0x51, 0x2c,
0x7f, 0x2c, 0x9e, 0x8a, 0xf8, 0x4a, 0xe6, 0x3b, 0x9b,
0xb9, 0x57, 0x83, 0x16, 0x8a, 0x52},
.klen = 24,
.iv = {0x03, 0xf6, 0x56, 0xfb, 0x72, 0xc9, 0xbf, 0x5d},
.ivlen = DES3_IV_SIZE,
.plaintext = {0xab, 0x15, 0x81, 0x70, 0x7d, 0x7d},
.plen = 6,
.ciphertext = {0x16, 0x88, 0x1e, 0x43, 0xfc, 0x0c},
.clen = 6,
}, { // #6
.key = {0x5e, 0xfe, 0x5d, 0x40, 0x80, 0x2f, 0x4f, 0x25, 0xad,
0xc2, 0x62, 0x4c, 0xdc, 0x29, 0x80, 0x45, 0x2c, 0x0b,
0x38, 0x91, 0x52, 0x57, 0x52, 0x80},
.klen = 24,
.iv = {0x00, 0x16, 0x7d, 0x7f, 0x48, 0x30, 0x9f, 0x0a},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x02, 0x4e, 0x62, 0x6c, 0xea, 0x49, 0x91},
.plen = 7,
.ciphertext = {0x2b, 0x23, 0x9e, 0x41, 0xd9, 0x60, 0x69},
.clen = 7,
}, { // #7
.key = {0xcb, 0x79, 0xb6, 0xdf, 0xad, 0xa1, 0x13, 0x79, 0xb6,
0x51, 0x32, 0xa7, 0x70, 0x54, 0xd3, 0x08, 0x13, 0xb9,
0xda, 0x29, 0x54, 0x02, 0x0e, 0x9e},
.klen = 24,
.iv = {0x2c, 0x5f, 0x51, 0xcd, 0x90, 0x0f, 0xe7, 0x53},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x58, 0x76, 0xdb, 0xe3, 0xd1, 0xe6, 0x3b, 0xec},
.plen = 8,
.ciphertext = {0x73, 0xc1, 0x54, 0x52, 0x4f, 0x4d, 0x57, 0x29},
.clen = 8,
}, { // #8
.key = {0x04, 0xdf, 0x08, 0x19, 0x29, 0x64, 0xd6, 0xbc, 0xc8,
0x4c, 0x97, 0xda, 0x94, 0x0b, 0x32, 0xc8, 0x80, 0xdf,
0xd0, 0xce, 0x8c, 0x91, 0x80, 0xa8},
.klen = 24,
.iv = {0xcf, 0x7e, 0x0c, 0xc1, 0xf2, 0x23, 0x34, 0x3e},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x1d, 0xe8, 0x12, 0x27, 0x9b, 0xd5, 0x57, 0x6e, 0xc2},
.plen = 9,
.ciphertext = {0x34, 0xd1, 0x06, 0x7d, 0x1a, 0x92, 0xa8, 0xda, 0x19},
.clen = 9,
.num_chunks = 3,
.chunks = {4, -1, 5},
}, { // #9
.key = {0xe3, 0x34, 0x7a, 0x6b, 0x0b, 0xc1, 0x15, 0x2c, 0x64,
0x2a, 0x25, 0xcb, 0xd3, 0xbc, 0x31, 0xab, 0xfb, 0xa1,
0x62, 0xa8, 0x1f, 0x19, 0x7c, 0x15},
.klen = 24,
.iv = {0xb7, 0x40, 0xcc, 0x21, 0xe9, 0x25, 0xe3, 0xc8},
.ivlen = DES3_IV_SIZE,
.plaintext = {0xdb, 0xe9, 0x15, 0xfc, 0xb3, 0x3b, 0xca, 0x18, 0xef,
0x14},
.plen = 10,
.ciphertext = {0xf4, 0x80, 0x1a, 0x8d, 0x03, 0x9d, 0xb4, 0xca, 0x8f,
0xf6},
.clen = 10,
.num_chunks = 3,
.chunks = {5, 0, 5},
}
};
/** http://csrc.nist.gov/groups/STM/cavp/documents/des/tdesmmt.zip
TCFB64MMT3.rsp
**/
static struct des3_test_vector des3_cfb64_tv[] = {
{ // #0
.key = {0xe0, 0xd5, 0x25, 0xe9, 0xec, 0xa2, 0x26, 0xd5, 0x58,
0x4a, 0x70, 0x2f, 0xdc, 0xd3, 0xdf, 0x23, 0x80, 0x58,
0xad, 0x4c, 0x15, 0x70, 0x34, 0x8f},
.klen = 24,
.iv = {0x8b, 0xf6, 0xfe, 0xbf, 0xde, 0x90, 0xbd, 0x17},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x26, 0x85, 0xa3, 0x86, 0x57, 0xe8, 0xdb, 0xfe},
.plen = 8,
.ciphertext = {0xe9, 0xfb, 0xc0, 0x28, 0x10, 0x53, 0x54, 0xed},
.clen = 8,
}, { // #1
.key = {0x02, 0xf1, 0xb5, 0x64, 0x51, 0xc8, 0x20, 0x7f, 0xce,
0x70, 0x92, 0x8f, 0x1f, 0xcd, 0xe0, 0xb3, 0x6d, 0xcd,
0xa8, 0x58, 0xef, 0xe9, 0xb0, 0x6b},
.klen = 24,
.iv = {0xee, 0x34, 0x61, 0x53, 0xc0, 0x9d, 0xc8, 0x73},
.ivlen = DES3_IV_SIZE,
.plaintext = {0xa7, 0x2f, 0x0d, 0x3f, 0xb8, 0xd4, 0xd8, 0xf7, 0x84,
0xce, 0x12, 0x0f, 0x2b, 0x4b, 0x85, 0x38},
.plen = 16,
.ciphertext = {0x3b, 0x6b, 0x32, 0x36, 0x5d, 0xac, 0xe6, 0xc9, 0x9b,
0x76, 0x74, 0xfb, 0xbe, 0xa1, 0x7a, 0x9b},
.clen = 16,
}, { // #2
.key = {0x76, 0xdc, 0xf7, 0xba, 0x76, 0x9b, 0xd3, 0x32, 0x34,
0x02, 0xc2, 0xae, 0x61, 0x15, 0x02, 0xc8, 0xd5, 0xc2,
0x26, 0x15, 0xef, 0xb0, 0xe0, 0x9e},
.klen = 24,
.iv = {0x5b, 0x48, 0x33, 0x4d, 0x9f, 0x3a, 0x67, 0xda},
.ivlen = DES3_IV_SIZE,
.plaintext = {0xb4, 0xd0, 0x02, 0x4c, 0x7f, 0xa1, 0x40, 0xbe, 0xde,
0xa2, 0x19, 0xdc, 0xce, 0x36, 0x7a, 0xa9, 0xd6, 0x10,
0x53, 0x27, 0x82, 0xdf, 0xa8, 0x19},
.plen = 24,
.ciphertext = {0x26, 0xa9, 0x83, 0x6c, 0xfa, 0xc9, 0x6d, 0xfa, 0x2e,
0x45, 0x55, 0x48, 0xd2, 0x6c, 0x09, 0xea, 0x93, 0xe5,
0x3b, 0xff, 0x52, 0x37, 0x5c, 0xf0},
.clen = 24,
.num_chunks = 3,
.chunks = {12, 0, 12},
}, { // #3
.key = {0x4f, 0x5d, 0xad, 0xfe, 0x34, 0x43, 0x80, 0x3d, 0x07,
0xdc, 0xcb, 0x2c, 0x37, 0x73, 0xdc, 0xb5, 0xc4, 0xc2,
0xd6, 0x97, 0xcd, 0x7f, 0x67, 0xe9},
.klen = 24,
.iv = {0x9a, 0x6d, 0x3d, 0x65, 0xd3, 0xca, 0x4d, 0xfb},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x1c, 0x1f, 0x3c, 0xe7, 0x92, 0x7d, 0x25, 0x62, 0xc0,
0x53, 0xc6, 0x5d, 0x73, 0x8a, 0x6e, 0xbc, 0x92, 0xbf,
0x59, 0x9c, 0x52, 0xa4, 0x82, 0xdb, 0xa8, 0xa3, 0xb8,
0xda, 0x04, 0xc5, 0xf4, 0x81},
.plen = 32,
.ciphertext = {0xb6, 0x88, 0xdd, 0x16, 0x5b, 0x56, 0x12, 0x8c, 0x8f,
0x14, 0xcc, 0xd5, 0x99, 0x12, 0x63, 0x1f, 0x13, 0x0f,
0x0d, 0x95, 0x67, 0x7c, 0xae, 0xc3, 0x60, 0xd4, 0x96,
0x58, 0x99, 0x2e, 0x09, 0xec},
.clen = 32,
.num_chunks = 4,
.chunks = {8, 8, 8, 8},
}, { // #4
.key = {0x02, 0xc1, 0x64, 0x46, 0xe5, 0x25, 0x4c, 0x97, 0x45,
0xf1, 0xab, 0xab, 0xd6, 0xc7, 0xcd, 0x9d, 0xf8, 0xcd,
0x0d, 0x4a, 0x04, 0x20, 0xd3, 0xe5},
.klen = 24,
.iv = {0x61, 0x54, 0x2a, 0xc6, 0x07, 0xbb, 0x26, 0x7e},
.ivlen = DES3_IV_SIZE,
.plaintext = {0xf9, 0x07, 0xdd, 0x85, 0x81, 0x65, 0x1f, 0xef, 0xf3,
0x3d, 0x54, 0x5d, 0xc4, 0xb9, 0x4a, 0x74, 0xd3, 0xd1,
0x71, 0xf5, 0xaa, 0x77, 0x3d, 0x95, 0x01, 0x12, 0xcc,
0x09, 0x84, 0x2e, 0xc9, 0x60, 0xd7, 0x72, 0x90, 0x95,
0xd6, 0xd2, 0x93, 0x65},
.plen = 40,
.ciphertext = {0x45, 0x3f, 0xe0, 0x1c, 0x94, 0xf0, 0xd0, 0x28, 0xac,
0xb8, 0xd8, 0x3d, 0x66, 0xca, 0xc3, 0x73, 0x4e, 0xb8,
0x43, 0xab, 0x4b, 0x6c, 0xbd, 0x6c, 0x0c, 0xbf, 0x1a,
0x1e, 0x8e, 0x55, 0x4c, 0x88, 0x13, 0xfa, 0x42, 0x93,
0xa9, 0x3c, 0x6f, 0x8c},
.clen = 40,
.num_chunks = 3,
.chunks = {20, -1, 20},
}, { // #5
.key = {0x70, 0x75, 0x57, 0x15, 0x23, 0xd9, 0x02, 0xc8, 0x9b,
0x0d, 0xa2, 0x0b, 0x85, 0x70, 0x43, 0x04, 0x70, 0xe5,
0x61, 0xda, 0x58, 0xfe, 0xe0, 0x38},
.klen = 24,
.iv = {0x86, 0xd8, 0xa5, 0xa0, 0x76, 0xce, 0xae, 0x0a},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x18, 0x39, 0xc8, 0xb6, 0xcd, 0xd4, 0x07, 0x0a, 0xdc,
0xc4, 0x24, 0x2c, 0x48, 0x4e, 0x5e, 0x31, 0x5d, 0xdb,
0x8f, 0x5c, 0xe9, 0x56, 0x01, 0x9c, 0xa9, 0xd6, 0x82,
0x55, 0x02, 0x7d, 0xbb, 0x63, 0xf1, 0xa0, 0xbd, 0x5d,
0x45, 0x27, 0xdd, 0x16, 0x0c, 0x37, 0xc2, 0x6a, 0x4b,
0x0f, 0xbc, 0x37},
.plen = 48,
.ciphertext = {0x4f, 0xe9, 0x7b, 0xab, 0x6c, 0x9d, 0xdd, 0xf7, 0xf6,
0x7d, 0xa8, 0xf2, 0xc1, 0x67, 0x3c, 0x17, 0xbf, 0x35,
0xd7, 0x4d, 0x8c, 0xf4, 0xa1, 0xb1, 0x6a, 0xc1, 0xb2,
0x74, 0xf7, 0x12, 0x40, 0xea, 0xef, 0x79, 0x31, 0x81,
0x8b, 0xa7, 0x45, 0x3a, 0x09, 0xa7, 0x4e, 0x3a, 0x1c,
0xb0, 0xc4, 0x81},
.clen = 48,
}, { // #6
.key = {0x79, 0x5b, 0x80, 0x98, 0xe5, 0xb3, 0xe5, 0x67, 0xd9,
0xa8, 0x9d, 0x4a, 0x8c, 0x08, 0x3e, 0x54, 0x0e, 0xf7,
0x31, 0x16, 0x62, 0x6d, 0xb0, 0x32},
.klen = 24,
.iv = {0xe1, 0x92, 0x73, 0x25, 0x82, 0xbf, 0x00, 0x85},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x02, 0xbc, 0x7e, 0xda, 0x94, 0xe8, 0x91, 0x19, 0xa9,
0x6e, 0xf5, 0x50, 0x1d, 0x05, 0x91, 0x96, 0x3a, 0x27,
0x0a, 0xcf, 0xe3, 0x72, 0x95, 0x2d, 0x11, 0x4e, 0x09,
0xf6, 0x84, 0xd0, 0x39, 0x87, 0xb2, 0xde, 0x80, 0x99,
0x04, 0x94, 0x9d, 0xc3, 0x41, 0xe7, 0xc1, 0x40, 0x4a,
0x88, 0xe7, 0xf3, 0x09, 0x0b, 0x64, 0xa8, 0xa4, 0x49,
0xbf, 0x9d},
.plen = 56,
.ciphertext = {0xdd, 0x87, 0x24, 0xcd, 0xd9, 0x53, 0xf6, 0x95, 0x10,
0x9c, 0xaa, 0x06, 0x8d, 0xd7, 0x1a, 0xa6, 0x58, 0xe7,
0x5e, 0x79, 0x64, 0xc2, 0xc6, 0x02, 0x1c, 0x77, 0x1d,
0x53, 0x59, 0x05, 0x60, 0xc0, 0x0c, 0x88, 0xcc, 0xc6,
0xee, 0x14, 0x8e, 0x28, 0x72, 0xa1, 0x33, 0x70, 0x37,
0xe2, 0x79, 0xea, 0xe0, 0x27, 0x60, 0xac, 0x0f, 0xe4,
0x83, 0x96},
.clen = 56,
.num_chunks = 4,
.chunks = {16, 16, 16, 8},
}, { // #7
.key = {0x7c, 0x7c, 0xc7, 0xfe, 0x4a, 0xf2, 0x0e, 0x6b, 0x38,
0xa8, 0x79, 0x5d, 0xab, 0xfd, 0xba, 0x1f, 0xbc, 0x5d,
0x25, 0x45, 0x2a, 0x94, 0x32, 0x34},
.klen = 24,
.iv = {0x84, 0x32, 0xa5, 0x46, 0x2a, 0x16, 0xbc, 0xfb},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x58, 0x8a, 0x36, 0x9d, 0x93, 0xdd, 0x68, 0xbd, 0x51,
0x8f, 0xd3, 0x41, 0xba, 0xb4, 0x83, 0x10, 0xea, 0x89,
0x14, 0x6a, 0xf4, 0x65, 0xd3, 0x79, 0x27, 0xec, 0x20,
0x29, 0x90, 0x86, 0x17, 0x3a, 0xbf, 0x10, 0x6f, 0x94,
0xce, 0xd1, 0xa1, 0xda, 0xa0, 0xaf, 0x4d, 0x41, 0x67,
0xa2, 0xda, 0xa3, 0x69, 0x6a, 0x5e, 0xcf, 0x03, 0x7d,
0xbd, 0x24, 0xee, 0x44, 0x14, 0x5e, 0xc1, 0x86, 0x58,
0xaf},
.plen = 64,
.ciphertext = {0x2b, 0xfb, 0x5c, 0x7b, 0x2d, 0x9f, 0xbe, 0x4a, 0x51,
0x4a, 0x2d, 0x14, 0x0c, 0xaf, 0x8c, 0x46, 0x46, 0xfd,
0x13, 0xd9, 0xc2, 0x51, 0xc1, 0x07, 0x3d, 0x07, 0xf8,
0x95, 0xea, 0x99, 0xec, 0x90, 0xf4, 0x5a, 0xbb, 0xd4,
0x0b, 0xf4, 0x0f, 0xc7, 0x85, 0xaa, 0x9f, 0x9f, 0xf5,
0xb9, 0x25, 0xcd, 0x29, 0xdb, 0x70, 0xe5, 0x14, 0x9c,
0x16, 0x28, 0x79, 0xde, 0xd9, 0x45, 0xa7, 0x78, 0x09,
0xc8},
.clen = 64,
.num_chunks = 4,
.chunks = {32, 0, -1, 32},
}, { // #8
.key = {0x8c, 0x37, 0xbc, 0x49, 0x32, 0x01, 0x64, 0x79, 0xf1,
0x97, 0xb0, 0xf7, 0x57, 0xcb, 0x16, 0xf1, 0x46, 0x54,
0xfb, 0x49, 0x92, 0x46, 0xda, 0xba},
.klen = 24,
.iv = {0xfd, 0xee, 0x51, 0xb0, 0x6b, 0x61, 0xfc, 0xe8},
.ivlen = DES3_IV_SIZE,
.plaintext = {0xc1, 0x55, 0x07, 0xd7, 0x25, 0xaf, 0xa1, 0x47, 0x55,
0xda, 0x2c, 0xc3, 0xcd, 0xf5, 0x9a, 0x83, 0xad, 0x28,
0xbd, 0x20, 0x05, 0xdd, 0xaf, 0x5e, 0x50, 0x2c, 0x71,
0x48, 0x3e, 0x96, 0xd2, 0x83, 0xb7, 0xf7, 0x92, 0xdc,
0x1c, 0xb6, 0xc8, 0x23, 0xd0, 0x3f, 0x81, 0x3c, 0xf7,
0xb3, 0xaa, 0x73, 0x7d, 0xdd, 0x30, 0x10, 0x5a, 0x69,
0x65, 0x2b, 0x15, 0x50, 0xa6, 0xc2, 0x87, 0x97, 0x3b,
0x09, 0xe2, 0x39, 0x7e, 0x01, 0xf2, 0x62, 0x3f, 0x4c},
.plen = 72,
.ciphertext = {0xe5, 0x6f, 0x5d, 0x07, 0x80, 0x60, 0x61, 0xcd, 0xa9,
0xcc, 0x7a, 0x83, 0x09, 0x64, 0xc1, 0x64, 0x7e, 0x92,
0x02, 0x3d, 0xb2, 0xb6, 0x8d, 0xd8, 0x4a, 0xa5, 0x48,
0xf4, 0x86, 0xcc, 0xc7, 0x79, 0xd2, 0x7d, 0xfa, 0xef,
0x17, 0x1c, 0x52, 0xc6, 0x32, 0x1f, 0x9f, 0x47, 0x73,
0x0d, 0x2a, 0x8e, 0x10, 0x9b, 0x67, 0xad, 0x57, 0x59,
0xd5, 0x62, 0x44, 0x06, 0x67, 0x69, 0xe4, 0x3c, 0x6c,
0x11, 0xe9, 0x05, 0xa7, 0x37, 0x2a, 0x81, 0x45, 0x6b},
.clen = 72,
.num_chunks = 5,
.chunks = {5, 20, -1, 17, 30},
}, { // #9
.key = {0x4f, 0x52, 0x26, 0x01, 0x9d, 0xb3, 0x6b, 0x40, 0x46,
0x43, 0x92, 0xc8, 0xe5, 0xc4, 0x2a, 0xd9, 0x5e, 0x20,
0x32, 0x26, 0x3d, 0xce, 0x8f, 0x20},
.klen = 24,
.iv = {0xee, 0x24, 0xf2, 0xe7, 0xd6, 0xd1, 0xf6, 0xf9},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x6a, 0x9a, 0xaf, 0xb3, 0x4b, 0x4d, 0xd8, 0xad, 0x40,
0x07, 0x21, 0xb5, 0xc2, 0xee, 0x62, 0x50, 0x15, 0xc8,
0x9a, 0x92, 0xcb, 0x6d, 0x92, 0x35, 0x8b, 0x7c, 0xbd,
0xe8, 0x10, 0x4e, 0x63, 0xe9, 0x74, 0x28, 0xfe, 0xd6,
0xaf, 0xb5, 0xe5, 0xc1, 0x5b, 0xb3, 0x27, 0x82, 0xba,
0xec, 0xba, 0x51, 0xf9, 0x68, 0xd5, 0x94, 0xb6, 0xe1,
0x9a, 0xf5, 0xc1, 0x77, 0xf8, 0xb8, 0x1f, 0xa5, 0xd0,
0x4b, 0x55, 0x74, 0x56, 0x1f, 0xe3, 0xee, 0xbb, 0xb7,
0x0e, 0xd6, 0x09, 0xff, 0xe2, 0x96, 0x4e, 0xde},
.plen = 80,
.ciphertext = {0x34, 0x9d, 0xdf, 0x37, 0xbf, 0xa1, 0x25, 0x30, 0x4f,
0x91, 0x03, 0x5a, 0xa0, 0x2b, 0x5f, 0xd5, 0xc4, 0x9c,
0x6f, 0xd2, 0x44, 0x37, 0x9c, 0x43, 0xcf, 0x7e, 0xbe,
0xca, 0xd4, 0x89, 0xe3, 0x8a, 0xed, 0xeb, 0x74, 0x90,
0xa7, 0x7b, 0xb1, 0x77, 0x7d, 0x62, 0x8f, 0x01, 0x8c,
0x86, 0x22, 0x2e, 0xbf, 0x4d, 0x12, 0x48, 0x3f, 0x97,
0x9d, 0xdf, 0x13, 0x6f, 0x35, 0x15, 0x1c, 0x56, 0x5c,
0x54, 0xf8, 0x6f, 0x24, 0x59, 0xad, 0xc7, 0xb1, 0x66,
0x80, 0x66, 0xe6, 0x9f, 0xc2, 0x66, 0x17, 0x01},
.clen = 80,
.num_chunks = 2,
.chunks = {40, 40},
}
};
/** http://csrc.nist.gov/groups/STM/cavp/documents/des/tdesmmt.zip
TOFBMMT3.rsp
**/
static struct des3_test_vector des3_ofb64_tv[] = {
{ // #0
.key = {0xe9, 0x61, 0x54, 0xa2, 0xa8, 0x75, 0x5b, 0xfd, 0x2c,
0x51, 0xd6, 0xa1, 0x97, 0x67, 0xd5, 0x26, 0x43, 0x5d,
0x19, 0xb6, 0x98, 0x2c, 0x6d, 0xa7},
.klen = 24,
.iv = {0xd9, 0xb4, 0x23, 0x43, 0x4c, 0xea, 0x15, 0xf3},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x31, 0x93, 0xf8, 0xd9, 0xf6, 0x90, 0x61, 0xbf},
.plen = 8,
.ciphertext = {0x0a, 0x7b, 0x1d, 0xa0, 0x7c, 0x99, 0xa3, 0xdd},
.clen = 8,
}, { // #1
.key = {0x83, 0x86, 0xc4, 0x64, 0xef, 0xbf, 0xf1, 0xa7, 0x1c,
0xa8, 0x4c, 0xbf, 0xbf, 0x76, 0x0e, 0x32, 0x2a, 0x07,
0x8a, 0x2f, 0x6d, 0x1f, 0xf2, 0x31},
.klen = 24,
.iv = {0x15, 0xed, 0xcd, 0xe1, 0xbd, 0x53, 0xc4, 0xc5},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x32, 0x7d, 0xa4, 0x0b, 0x70, 0xe3, 0x56, 0x86, 0x8d,
0x22, 0x15, 0x1c, 0x96, 0xe7, 0x65, 0x8e},
.plen = 16,
.ciphertext = {0xda, 0x19, 0x0d, 0x06, 0xdb, 0x62, 0x69, 0xef, 0xa0,
0x6a, 0xe7, 0x2a, 0x79, 0xb9, 0x86, 0xb1},
.clen = 16,
}, { // #2
.key = {0xb9, 0x20, 0x9e, 0xbc, 0x8c, 0xce, 0x62, 0x40, 0x16,
0xf1, 0x7a, 0x43, 0xa2, 0x8a, 0x25, 0x15, 0x1a, 0xab,
0x8c, 0xab, 0xb0, 0x6b, 0x08, 0x3b},
.klen = 24,
.iv = {0x2c, 0x95, 0x82, 0x73, 0xea, 0x54, 0x96, 0x7f},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x5e, 0x26, 0x18, 0x8f, 0xb4, 0x5d, 0x09, 0x3f, 0x60,
0x67, 0xff, 0x5c, 0x4c, 0x14, 0xe0, 0x43, 0x35, 0xc2,
0xdd, 0x74, 0x67, 0x19, 0x53, 0xe9},
.plen = 24,
.ciphertext = {0x49, 0x2a, 0x36, 0xf8, 0x13, 0xd1, 0x99, 0xd3, 0x11,
0x21, 0xe5, 0x37, 0x9a, 0xf9, 0xa8, 0x20, 0x51, 0x90,
0xf4, 0x38, 0xbb, 0x18, 0x03, 0x06},
.clen = 24,
.num_chunks = 3,
.chunks = {12, 0, 12},
}, { // #3
.key = {0xbf, 0x13, 0x92, 0x07, 0x86, 0x6b, 0xb6, 0x5d, 0xe9,
0x76, 0xa8, 0x70, 0x2f, 0x23, 0x64, 0x34, 0xb3, 0xdc,
0xc8, 0x37, 0x08, 0x23, 0x52, 0xc2},
.klen = 24,
.iv = {0x4c, 0xd5, 0xe1, 0xf5, 0x82, 0x2b, 0x32, 0x4c},
.ivlen = DES3_IV_SIZE,
.plaintext = {0xaa, 0xed, 0x11, 0xce, 0x4c, 0x1e, 0x77, 0xee, 0x37,
0xbc, 0xbc, 0x01, 0x98, 0x14, 0x88, 0x60, 0x6d, 0xf7,
0xf8, 0x06, 0xde, 0xbe, 0x93, 0xaa, 0xd1, 0x8a, 0x80,
0x2b, 0xb9, 0xd1, 0xf6, 0x31},
.plen = 32,
.ciphertext = {0x84, 0xab, 0xa2, 0x7a, 0xf1, 0x2f, 0x6c, 0xf9, 0x6e,
0x1d, 0xc8, 0x85, 0xb2, 0x79, 0xda, 0xb0, 0xba, 0x88,
0x7c, 0x96, 0xb3, 0xbb, 0x0d, 0x29, 0x0d, 0x54, 0x0f,
0xa8, 0x96, 0x6a, 0x6e, 0x2d},
.clen = 32,
.num_chunks = 4,
.chunks = {8, 8, 8, 8},
}, { // #4
.key = {0x89, 0xb0, 0x9e, 0x9b, 0x8c, 0x73, 0x37, 0x79, 0xe5,
0xcd, 0x01, 0x94, 0x83, 0x20, 0xb3, 0xb0, 0x75, 0xc4,
0x3e, 0x3d, 0xe6, 0x32, 0xe3, 0xc4},
.klen = 24,
.iv = {0x37, 0x61, 0x25, 0x03, 0x1f, 0x18, 0xf6, 0xf0},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x88, 0x2c, 0x7a, 0x11, 0x39, 0xa5, 0xa8, 0xfd, 0x56,
0xf1, 0x1d, 0xd0, 0x86, 0xa7, 0x65, 0xf7, 0x52, 0xc1,
0xe5, 0x54, 0xe3, 0x4d, 0xbe, 0x92, 0x0d, 0x65, 0xf4,
0xb6, 0x8d, 0x60, 0xd0, 0xf7, 0x8f, 0x4a, 0x82, 0xd0,
0x74, 0x92, 0x0b, 0x53},
.plen = 40,
.ciphertext = {0xe8, 0xd9, 0x04, 0x39, 0xe3, 0x06, 0xc3, 0xe3, 0xe9,
0x46, 0x00, 0x39, 0xfd, 0x21, 0x4f, 0x00, 0xf7, 0xef,
0xfc, 0x0b, 0x59, 0xb6, 0x01, 0x93, 0xe6, 0x1c, 0x6e,
0x28, 0xa9, 0xf4, 0xfb, 0xd3, 0x39, 0x25, 0x23, 0x1e,
0x48, 0x8a, 0x52, 0xd2},
.clen = 40,
.num_chunks = 3,
.chunks = {20, -1, 20},
}, { // #5
.key = {0xa4, 0x40, 0xba, 0x91, 0xba, 0xe5, 0x62, 0x19, 0x1f,
0x97, 0xdf, 0x58, 0xae, 0x58, 0x7c, 0x19, 0x89, 0x75,
0xd3, 0x45, 0x73, 0xcb, 0xcb, 0xa4},
.klen = 24,
.iv = {0x0b, 0x39, 0x33, 0x67, 0x57, 0x11, 0xb1, 0x15},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x80, 0xee, 0x89, 0xf4, 0x2d, 0x88, 0x11, 0x9b, 0xbc,
0x87, 0x4f, 0x70, 0xd3, 0xc7, 0x3e, 0xd2, 0x5d, 0x59,
0x3f, 0xf1, 0xdc, 0x83, 0x0b, 0xee, 0x00, 0x07, 0xec,
0x3e, 0x78, 0xa8, 0x2d, 0x50, 0x08, 0xeb, 0xce, 0x6f,
0xdc, 0x1b, 0x7d, 0xe9, 0x1c, 0x8f, 0xc2, 0x71, 0xc0,
0x30, 0x7a, 0xc2},
.plen = 48,
.ciphertext = {0xbb, 0x2b, 0x2f, 0xb1, 0x88, 0xba, 0x69, 0xda, 0x7c,
0xc5, 0x2b, 0x01, 0x60, 0x7d, 0x3d, 0x15, 0x42, 0x24,
0x9d, 0x0b, 0x11, 0xec, 0x27, 0xcc, 0x6c, 0x6f, 0xc7,
0x3f, 0x0f, 0x28, 0x23, 0xe0, 0xae, 0xea, 0xc4, 0x8e,
0x30, 0xc6, 0x66, 0x74, 0x02, 0x02, 0xfe, 0x93, 0x70,
0xa5, 0x19, 0x0d},
.clen = 48,
}, { // #6
.key = {0x64, 0x13, 0x20, 0x94, 0x8a, 0x29, 0x85, 0xc2, 0xec,
0xec, 0x0d, 0xfb, 0x34, 0xb9, 0x04, 0x45, 0x75, 0xfb,
0x2a, 0x0b, 0x10, 0x3b, 0x75, 0x51},
.klen = 24,
.iv = {0x9a, 0xc0, 0x63, 0x68, 0xfa, 0x0e, 0x64, 0xe0},
.ivlen = DES3_IV_SIZE,
.plaintext = {0xea, 0x00, 0xb3, 0x66, 0xd3, 0x2d, 0xae, 0x2d, 0x9c,
0xba, 0x94, 0x15, 0x54, 0x84, 0x9c, 0x0f, 0x76, 0x2e,
0xac, 0xf3, 0xc9, 0x73, 0x64, 0x75, 0x85, 0xba, 0x5e,
0x56, 0xb7, 0xeb, 0xb4, 0xd7, 0xe6, 0x82, 0xc3, 0x73,
0xf7, 0xe2, 0x2f, 0xcd, 0x4e, 0xeb, 0x28, 0xe8, 0x36,
0xce, 0xeb, 0x96, 0x83, 0x20, 0x8b, 0x33, 0x76, 0x2e,
0xf1, 0x92},
.plen = 56,
.ciphertext = {0xb3, 0x19, 0x40, 0xc4, 0xdd, 0x1d, 0x84, 0xfd, 0x6f,
0xda, 0x95, 0x3c, 0x11, 0x7f, 0x1f, 0x20, 0xe5, 0x80,
0xc2, 0xd1, 0x8f, 0x4e, 0xfe, 0x39, 0xfc, 0x15, 0xe4,
0xc5, 0x5a, 0xee, 0x88, 0x6a, 0x65, 0x15, 0x5b, 0x4b,
0x43, 0x4a, 0xb7, 0x29, 0xeb, 0x25, 0xd8, 0x9c, 0x69,
0xb4, 0xd5, 0xc9, 0x3a, 0x66, 0x25, 0xf8, 0x80, 0x32,
0xae, 0xe3},
.clen = 56,
.num_chunks = 4,
.chunks = {16, 16, 16, 8},
}, { // #7
.key = {0x2c, 0xfb, 0xbc, 0x62, 0x5b, 0xad, 0x3e, 0x54, 0xe6,
0x01, 0xf2, 0x52, 0xc4, 0x20, 0xa8, 0x34, 0x13, 0xe9,
0x2a, 0x46, 0xc1, 0xa7, 0xe5, 0x86},
.klen = 24,
.iv = {0xba, 0xda, 0x00, 0xb1, 0x23, 0x6c, 0x22, 0xfa},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x70, 0xa8, 0x94, 0x85, 0x40, 0x56, 0x75, 0x66, 0x54,
0x36, 0xb9, 0x27, 0xad, 0x9b, 0x7e, 0x3d, 0x7c, 0x3e,
0xa8, 0xcf, 0xda, 0x25, 0x30, 0xbd, 0xb9, 0xc9, 0xbe,
0xe2, 0x1b, 0x77, 0x7b, 0x96, 0x82, 0xf7, 0x20, 0x77,
0xa7, 0x6c, 0x54, 0x6a, 0x6e, 0x7b, 0x34, 0xdc, 0x1a,
0xaf, 0x33, 0x4e, 0xbd, 0x1c, 0x24, 0x10, 0xf3, 0x43,
0x95, 0x4c, 0xd0, 0x36, 0x5f, 0x47, 0x17, 0xfd, 0x7b,
0xe4},
.plen = 64,
.ciphertext = {0x51, 0xde, 0x0e, 0x2f, 0xee, 0x09, 0xc6, 0x0d, 0xa1,
0x97, 0x13, 0xa6, 0xcd, 0x1b, 0x82, 0x1f, 0xb2, 0xa2,
0x3f, 0xd7, 0xb4, 0x80, 0x76, 0xd2, 0xe0, 0x9d, 0xd7,
0x5f, 0x69, 0x2a, 0x29, 0x5f, 0x1c, 0xda, 0x91, 0xe2,
0x3e, 0x83, 0x52, 0x26, 0x6e, 0x1e, 0x7c, 0x85, 0x38,
0x61, 0xe8, 0xf4, 0x0c, 0xf3, 0x72, 0x56, 0x0c, 0x94,
0x92, 0x4e, 0xd9, 0xfd, 0x5e, 0xdc, 0x49, 0x7b, 0xf5,
0xeb},
.clen = 64,
.num_chunks = 4,
.chunks = {32, 0, -1, 32},
}, { // #8
.key = {0xb3, 0xae, 0x76, 0x13, 0xc4, 0xd0, 0x3b, 0x7a, 0x23,
0x58, 0x8a, 0x6e, 0x7c, 0x9b, 0x1f, 0xe5, 0x6e, 0x43,
0x58, 0x8f, 0xf7, 0x4f, 0x8a, 0x32},
.klen = 24,
.iv = {0x89, 0x62, 0x65, 0xe4, 0x3e, 0x5a, 0x7b, 0xea},
.ivlen = DES3_IV_SIZE,
.plaintext = {0x01, 0xa7, 0x68, 0xf8, 0x00, 0x2e, 0x80, 0xe8, 0xc7,
0x5b, 0xbc, 0x2d, 0x48, 0x1d, 0xdb, 0xdc, 0x5b, 0xc6,
0x7d, 0x61, 0xc9, 0xc7, 0xdb, 0x66, 0xa3, 0xbb, 0xb4,
0xf7, 0xd9, 0xa8, 0x8b, 0xe3, 0x07, 0x81, 0x0f, 0x65,
0x92, 0xef, 0xdb, 0x03, 0xf4, 0x50, 0x5f, 0xb7, 0x54,
0x01, 0x1e, 0x4d, 0x5a, 0xd8, 0x1b, 0x0c, 0x41, 0xf5,
0x8d, 0x98, 0x2e, 0xbb, 0xda, 0x17, 0xc0, 0x19, 0xc3,
0x93, 0xe8, 0x0e, 0xdc, 0x9f, 0xfb, 0x6c, 0x40, 0x3e},
.plen = 72,
.ciphertext = {0x92, 0xfb, 0xd9, 0x0d, 0xc8, 0x61, 0x5a, 0xef, 0x01,
0x6a, 0x1a, 0x43, 0x3f, 0xd8, 0xc5, 0x6a, 0xfa, 0x8d,
0x25, 0x68, 0x25, 0xae, 0x50, 0xad, 0x85, 0x59, 0xff,
0x5d, 0xcc, 0xfc, 0xe4, 0x2e, 0x56, 0xc3, 0xef, 0x8d,
0x7e, 0xbf, 0x6a, 0x75, 0x97, 0xfd, 0x0e, 0x95, 0x3b,
0x0c, 0x00, 0xa0, 0x22, 0xbc, 0xaa, 0xd9, 0x2c, 0xbc,
0x17, 0x2c, 0xc7, 0x9e, 0xf5, 0xf9, 0x41, 0xb6, 0xe0,
0x7e, 0xc7, 0xe1, 0xc2, 0x71, 0x6a, 0x93, 0x9a, 0x7d},
.clen = 72,
.num_chunks = 5,
.chunks = {5, 20, -1, 17, 30},
}, { // #9
.key = {0x13, 0xf1, 0x0b, 0xc8, 0xd5, 0x98, 0x7c, 0x6d, 0x97,
0x0d, 0xe6, 0xd6, 0x01, 0x52, 0xdc, 0xe6, 0xda, 0x3b,
0x3b, 0x04, 0xb5, 0x2c, 0x20, 0x5d},
.klen = 24,
.iv = {0x9d, 0x99, 0x5c, 0x62, 0x11, 0xb4, 0xec, 0x4d},
.ivlen = DES3_IV_SIZE,
.plaintext = {0xb6, 0x94, 0xeb, 0x44, 0x89, 0x7b, 0x59, 0xd3, 0x97,
0x65, 0x9d, 0x3b, 0x00, 0x81, 0x80, 0x35, 0x6f, 0x64,
0x8a, 0x34, 0x54, 0x46, 0x6a, 0x3e, 0x74, 0x6f, 0x99,
0xfb, 0xa4, 0xec, 0x3b, 0x0c, 0xd1, 0x86, 0x46, 0x9d,
0x44, 0xf5, 0xe5, 0x3e, 0x24, 0x50, 0x1f, 0xee, 0x3d,
0xc8, 0xb4, 0x79, 0xff, 0x96, 0x47, 0x05, 0xca, 0x32,
0xc2, 0xe7, 0x69, 0xc6, 0xf7, 0xbb, 0xdc, 0xe2, 0x83,
0xb3, 0x5a, 0x71, 0xf8, 0x2f, 0x96, 0xec, 0x3b, 0x8e,
0x42, 0xcd, 0x2a, 0x44, 0xd1, 0x47, 0x82, 0x2d},
.plen = 80,
.ciphertext = {0xa5, 0xf7, 0xee, 0xe8, 0x26, 0xee, 0x1e, 0x8b, 0xcb,
0x77, 0xd2, 0xef, 0x6f, 0xfb, 0x56, 0xc9, 0xa3, 0xa5,
0x43, 0xc4, 0xfd, 0x89, 0xa0, 0x6b, 0x4f, 0x26, 0x5b,
0xda, 0xab, 0x1c, 0x2c, 0x03, 0xb6, 0x6c, 0x51, 0x43,
0x9a, 0xd4, 0x14, 0xf5, 0x2a, 0x4f, 0xcb, 0xac, 0xea,
0x83, 0x3a, 0x33, 0xd1, 0x61, 0x0f, 0x80, 0xf9, 0x33,
0xab, 0x90, 0x0e, 0xc0, 0x47, 0x33, 0x4f, 0xd3, 0x3f,
0xaf, 0xc5, 0xc2, 0x59, 0x17, 0x40, 0x9f, 0x01, 0xe0,
0x47, 0xbb, 0x83, 0x28, 0x35, 0x2f, 0x7c, 0x45},
.clen = 80,
.num_chunks = 2,
.chunks = {40, 40},
}
};
/**
* NIST Special Publication 800-38B
* https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/
* CAVP-TESTING-BLOCK-CIPHER-MODES#CMAC
**/
static struct mac_test_vector des2_cmac_tv[] = {
{ // 0 (0)
.key = { 0xdc,0x04,0x73,0x68,0x02,0x32,0x52,0xd9,0x0e,
0xbc,0xcd,0xc2,0x16,0x61,0xe3,0xab },
.klen = 16,
.msg = { 0x00 },
.mlen = 0,
.mac = { 0x72,0x61,0x9d,0xc7,0xda },
.tlen = 5,
}, { // 1 (1)
.key = { 0x76,0xfd,0x92,0x07,0x04,0x29,0xd3,0x3d,0x29,
0x02,0x9b,0x46,0x1a,0x8a,0x2f,0x57 },
.klen = 16,
.msg = { 0x00 },
.mlen = 0,
.mac = { 0x63,0x92,0x98,0x77,0xf1 },
.tlen = 5,
.chunks_msg = { 0, 0 },
.num_chunks_message = 2,
}, { // 2 (8)
.key = { 0x3d,0x4c,0xf2,0x64,0x13,0x76,0xae,0xc2,0x13,
0xa8,0x26,0x5d,0x52,0x9b,0x7a,0x20 },
.klen = 16,
.msg = { 0x00 },
.mlen = 0,
.mac = { 0xcd,0xd2,0xe2,0xc8,0x49,0x31,0xc1 },
.tlen = 7,
}, { // 3 (16)
.key = { 0xd3,0x94,0x8a,0xa4,0x52,0x7a,0xe5,0xba,0x1a,
0x54,0x32,0xe9,0x08,0x54,0x10,0xdc },
.klen = 16,
.msg = { 0x39,0x2e,0x55,0x79,0x30,0xd3,0x04,0xd5 },
.mlen = 8,
.mac = { 0x0c,0x01,0x23,0x3c,0x9a },
.tlen = 5,
}, { // 4 (17)
.key = { 0xe6,0x2f,0x08,0xd0,0x26,0x04,0xfd,0xcb,0x2c,
0x16,0x6d,0x62,0x0e,0x10,0xe5,0x07 },
.klen = 16,
.msg = { 0x95,0x84,0x8f,0x94,0x05,0x62,0xae,0x51 },
.mlen = 8,
.mac = { 0x87,0x6d,0x6a,0x38,0x69 },
.tlen = 5,
.chunks_msg = { 4, 4 },
.num_chunks_message = 2,
}, { // 5 (32)
.key = { 0x5d,0xb9,0xb0,0xd6,0xb5,0xd9,0x25,0x46,0x86,
0x1c,0xbf,0x5b,0xf8,0xf2,0xf1,0xe6 },
.klen = 16,
.msg = { 0xeb,0x00,0x22,0x4e,0x03,0x65,0x2e,0xb1,0x84,
0x2a,0x47,0x73,0x54,0xae,0x19,0x1f },
.mlen = 16,
.mac = { 0x61,0x75,0xa0,0xf3,0x6f },
.tlen = 5,
}, { // 6 (33)
.key = { 0x51,0x1c,0x68,0x25,0xfb,0x97,0xda,0x70,0x70,
0xb5,0xd5,0x19,0x0b,0xec,0x49,0x9e },
.klen = 16,
.msg = { 0x25,0xd8,0x7c,0x44,0x02,0xf3,0x4e,0xa5,0x9b,
0x38,0x98,0xbe,0xaa,0x40,0x1e,0x96 },
.mlen = 16,
.mac = { 0x18,0x76,0xc6,0xa2,0x72 },
.tlen = 5,
.chunks_msg = { 5, 5, 6 },
.num_chunks_message = 3,
}, { // 7 (40)
.key = { 0xb9,0x02,0x6e,0xba,0xda,0x62,0x38,0xd9,0x20,
0x7f,0x07,0x3e,0x1c,0x1c,0xb6,0xd5 },
.klen = 16,
.msg = { 0x23,0x32,0x82,0xca,0x3e,0x2a,0xfc,0x6f,0x4c,
0x47,0x13,0x26,0x75,0x1e,0xd2,0x5a },
.mlen = 16,
.mac = { 0xfe,0x6a,0xc1,0xbf,0x3a,0x15,0x89 },
.tlen = 7,
}, { // 8 (48)
.key = { 0xc2,0x75,0x57,0x76,0xb0,0x6e,0x67,0x97,0x26,
0x1a,0xef,0x15,0xa1,0x38,0x38,0x8f },
.klen = 16,
.msg = { 0x30,0x94,0xb1,0x6e,0x28,0x99,0x1c },
.mlen = 7,
.mac = { 0x15,0xa3,0x7f,0x1a,0x7b },
.tlen = 5,
}, { // 9 (49)
.key = { 0xf8,0xf1,0x49,0x2c,0xb5,0xae,0x70,0xcd,0x5e,
0x97,0x94,0x19,0xc8,0xfb,0xc7,0xad },
.klen = 16,
.msg = { 0x53,0x53,0x4f,0x17,0x77,0x5c,0x0e },
.mlen = 7,
.mac = { 0x2c,0x2a,0x55,0x32,0x96 },
.tlen = 5,
.chunks_msg = { 3, 4 },
.num_chunks_message = 2,
}, { // 10 (64)
.key = { 0x04,0x13,0xb3,0x67,0xc2,0xbf,0x49,0x1f,0x5e,
0xea,0xb5,0x40,0x43,0xfe,0x7f,0x16 },
.klen = 16,
.msg = { 0x70,0xb2,0xdb,0xfe,0x6d,0x89,0x2a,0xd8,0xd0,
0xd0,0x48,0xec,0x8a,0x04,0xc9 },
.mlen = 15,
.mac = { 0xd5,0x25,0xaa,0x36,0x43 },
.tlen = 5,
}
};
/**
* NIST Special Publication 800-38B
* https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/
* CAVP-TESTING-BLOCK-CIPHER-MODES#CMAC
**/
static struct mac_test_vector des3_cmac_tv[] = {
{ // 0 (0)
.key = { 0xc4,0x79,0xf8,0x13,0xad,0x1a,0x45,0xd5,0xdc,
0x43,0x45,0x9d,0xa4,0xc8,0x5e,0x85,0x1c,0xda,
0x51,0x8a,0xf8,0x86,0xbf,0x1f },
.klen = 24,
.msg = { 0x00 },
.mlen = 0,
.mac = { 0xfe,0xa0,0x1c,0x84,0xa7 },
.tlen = 5,
}, { // 1 (1)
.key = { 0x73,0x13,0x31,0x86,0x67,0x54,0x58,0x8f,0xd3,
0x32,0xef,0x51,0xe0,0xce,0x19,0x25,0xd5,0x86,
0xcb,0xa7,0x04,0x40,0xf4,0x4f },
.klen = 24,
.msg = { 0x00 },
.mlen = 0,
.mac = { 0x16,0x4b,0xdb,0x85,0x82 },
.tlen = 5,
.chunks_msg = { 0, 0 },
.num_chunks_message = 2,
}, { // 2 (8)
.key = { 0xf8,0x7c,0x4c,0x3d,0xf7,0x1f,0xd9,0x8c,0xe5,
0x32,0xf4,0x1f,0xfe,0x31,0x58,0x20,0x51,0x4f,
0xad,0x7c,0x7a,0xae,0x2f,0x46 },
.klen = 24,
.msg = { 0x00 },
.mlen = 0,
.mac = { 0x19,0xfb,0xd3,0xdc,0x15,0x4b,0xc1,0x39 },
.tlen = 8,
}, { // 3 (16)
.key = { 0xd9,0x61,0xb6,0xd5,0x57,0xae,0xba,0x4a,0x0e,
0xc1,0xbf,0xf2,0x79,0x7a,0xdf,0xda,0x04,0x70,
0x61,0x68,0x83,0x92,0x76,0xfe },
.klen = 24,
.msg = { 0xd7,0x68,0x97,0x5c,0x45,0x4f,0x93,0x90,0x6c,
0xd3,0x5e,0x6a,0x6d,0x5f,0x44,0x53 },
.mlen = 16,
.mac = { 0x96,0x72,0x52,0xe4,0xf3 },
.tlen = 5,
}, { // 4 (17)
.key = { 0xdf,0x10,0xfb,0x6b,0x76,0x6e,0xab,0x34,0xd5,
0xcb,0x75,0x79,0x58,0x2f,0xb6,0xa8,0x02,0x5e,
0x45,0x9b,0xb3,0x8f,0x43,0x37 },
.klen = 24,
.msg = { 0x35,0x07,0x23,0xc4,0xf1,0x67,0x7f,0x7b,0xac,
0xdb,0x78,0xd1,0x2a,0x22,0xa1,0x9b },
.mlen = 16,
.mac = { 0xb4,0xd9,0x1d,0x08,0xe4 },
.tlen = 5,
.chunks_msg = { 5, 5, 6 },
.num_chunks_message = 3,
}, { // 5 (24)
.key = { 0x01,0xc1,0x25,0xc2,0x79,0xcb,0xe9,0x0d,0xdf,
0xc2,0xc1,0xb0,0x4c,0xa8,0xae,0x49,0x16,0x16,
0xad,0x64,0x43,0x3d,0x83,0x4a },
.klen = 24,
.msg = { 0x0a,0x25,0x8b,0x67,0x19,0xe2,0xe0,0x07,0x9b,
0x78,0x0a,0x08,0x63,0xff,0x11,0x5b },
.mlen = 16,
.mac = { 0xa7,0xbc,0xbe,0x72,0x0a,0xc2,0xa7,0xe5 },
.tlen = 8,
}, { // 6 (32)
.key = { 0xe6,0xe0,0xd5,0xfd,0x61,0xda,0xe3,0x15,0x5b,
0x32,0x98,0x0e,0x70,0xe6,0xd6,0x7f,0xd9,0x9d,
0x8f,0xf4,0x34,0x8f,0xe9,0x8f },
.klen = 24,
.msg = { 0xe4,0x3b,0xd4,0x9c,0x39,0x76,0xaf,0xa7,0x8a,
0x71,0x38,0xdd,0xab,0xfa,0x13,0x2a,0x72,0xe7,
0xd1,0xa4,0x22,0xb4,0x0a,0x58,0x2a,0x6d,0xac,
0x4a,0x10,0xce,0x92,0xb7 },
.mlen = 32,
.mac = { 0xd4,0x4f,0x71,0x0b,0x81 },
.tlen = 5,
}, { // 7 (33)
.key = { 0x20,0x40,0x40,0xce,0x67,0x10,0x2c,0x3b,0x31,
0x29,0x43,0x5d,0x8a,0x85,0x3d,0x91,0x6d,0x37,
0x8a,0x2c,0x68,0x76,0x70,0xd3 },
.klen = 24,
.msg = { 0x9b,0x75,0x8b,0xc9,0x3d,0x48,0x25,0x05,0xb1,
0xb7,0xb6,0xf1,0x47,0x20,0x3a,0x72,0xe8,0x1b,
0xf1,0x90,0x04,0xa5,0xfa,0xc1,0xcb,0x7e,0x23,
0x6a,0xa0,0xcf,0x00,0xa3 },
.mlen = 32,
.mac = { 0x49,0x00,0x1a,0x2a,0x10 },
.tlen = 5,
.chunks_msg = { 10, 10, 10, 2 },
.num_chunks_message = 4,
}, { // 8 (48)
.key = { 0xef,0x0d,0x5e,0x94,0xe5,0xc8,0x89,0x34,0xbf,
0xcb,0xb5,0x80,0x67,0x08,0x97,0x4a,0x70,0xc1,
0x4a,0x70,0x31,0x02,0x3d,0xb0 },
.klen = 24,
.msg = { 0x8d,0x32,0x44,0xbd,0x36,0x4e,0xea,0x1f,0x53 },
.mlen = 9,
.mac = { 0x65,0x52,0x7e,0xeb,0x1b },
.tlen = 5,
}, { // 9 (49)
.key = { 0xdf,0xd6,0xd0,0xb0,0x58,0x75,0x1f,0xa1,0x7a,
0x1f,0xd6,0x73,0x45,0x16,0x3d,0xa1,0x37,0xad,
0x25,0x1f,0x3e,0x1f,0x70,0x8a },
.klen = 24,
.msg = { 0x9a,0xa7,0xd5,0xfb,0x6b,0xa2,0xd8,0x55,0x75 },
.mlen = 9,
.mac = { 0x5c,0x08,0x41,0x49,0x31 },
.tlen = 5,
.chunks_msg = { 4, 5 },
.num_chunks_message = 2,
}, { // 10 (56)
.key = { 0x9e,0x98,0xd0,0x2a,0xc8,0xda,0x0d,0xa8,0x38,
0x20,0xda,0x43,0x83,0xce,0x6e,0xea,0x16,0x19,
0xa4,0x7f,0xe0,0xa1,0xa1,0x13 },
.klen = 24,
.msg = { 0xa1,0xb0,0xd3,0x65,0xea,0x1b,0xfb,0xf0,0x84 },
.mlen = 9,
.mac = { 0x9c,0xf6,0xad,0x27,0xde,0xb8,0x4e,0xe7 },
.tlen = 8,
}, { // 11 (64)
.key = { 0xea,0x5e,0xc8,0x6b,0x61,0x9d,0x7a,0x58,0xbf,
0x7c,0x75,0xdf,0xdc,0xa7,0xb6,0x25,0x3d,0xf8,
0xd5,0x40,0x73,0x23,0x38,0xb6 },
.klen = 24,
.msg = { 0x4c,0xdb,0x3b,0x20,0xd6,0x33,0x8b,0x67,0x96,
0x71,0x99,0x23,0xf4,0xeb,0xb8,0x6b,0x74 },
.mlen = 17,
.mac = { 0x46,0xe2,0xd2,0xa7,0x8c },
.tlen = 5,
}, { // 12 (65)
.key = { 0xa1,0xad,0xe6,0x13,0x37,0x43,0x5e,0x3b,0xd3,
0xd6,0x43,0x49,0x45,0x4c,0xab,0xe5,0x62,0x45,
0x25,0x62,0xc4,0x38,0x34,0xae },
.klen = 24,
.msg = { 0x35,0x94,0x21,0xe9,0xf7,0x8c,0xc4,0xa3,0x1f,
0x4f,0x01,0x99,0x77,0xd7,0xfd,0x29,0x78 },
.mlen = 17,
.mac = { 0xff,0x99,0xe6,0xcc,0x7c },
.tlen = 5,
.chunks_msg = { 7, 10 },
.num_chunks_message = 2,
}, { // 13 (80)
.key = { 0x3e,0x7f,0xf2,0xe9,0x3e,0x01,0x26,0x58,0xbf,
0x97,0x79,0x0e,0x49,0x8c,0x23,0xad,0xd3,0x52,
0xcd,0x26,0xb3,0x64,0xbf,0x19 },
.klen = 24,
.msg = { 0x75,0x55,0x98,0x98,0xf4,0xba,0x03,0xc5,0x5a,
0xfc,0x25,0xea,0x91,0xaa,0x61,0xa9,0x3c,0x2f,
0x82,0x70,0xa5,0xfa,0x51,0xb6,0xf6,0xdc,0x68,
0x81,0xad,0xb1,0x41,0x2c },
.mlen = 32,
.mac = { 0xe4,0x21,0xb4,0x30,0x74 },
.tlen = 5,
}
};
/**
* Derived CBC-MAC test vectors from DES3-CBC test vectors
* http://csrc.nist.gov/groups/STM/cavp/documents/des/tdesmmt.zip
* TCBCMMT3.rsp
**/
static struct mac_test_vector des3_cbc_mac_tv[] = {
{ // 0
.key = {0x46, 0x13, 0x3d, 0xcb, 0xf2, 0x32, 0xb5, 0x19, 0x64,
0xe0, 0xd9, 0x5e, 0x83, 0x20, 0x8f, 0x15, 0x67, 0x32,
0xbf, 0x75, 0xb6, 0x73, 0xab, 0xf1},
.klen = 24,
.msg = { 0x80,0x00,0x00,0x00,0x00,0x00,0x00,0x00 },
.mlen = 8,
.mac = { 0x36,0x77,0x03,0x73},
.tlen = 4,
}, { // 1
.key = {0x46, 0x13, 0x3d, 0xcb, 0xf2, 0x32, 0xb5, 0x19, 0x64,
0xe0, 0xd9, 0x5e, 0x83, 0x20, 0x8f, 0x15, 0x67, 0x32,
0xbf, 0x75, 0xb6, 0x73, 0xab, 0xf1},
.klen = 24,
.msg = { 0x00,0x00,0x00,0x00,0x80,0x00,0x00,0x00 },
.mlen = 8,
.mac = { 0x97,0x6a,0x35,0x19,0xeb,0xcd},
.tlen = 6,
}, { // 2
.key = {0x46, 0x13, 0x3d, 0xcb, 0xf2, 0x32, 0xb5, 0x19, 0x64,
0xe0, 0xd9, 0x5e, 0x83, 0x20, 0x8f, 0x15, 0x67, 0x32,
0xbf, 0x75, 0xb6, 0x73, 0xab, 0xf1},
.klen = 24,
.msg = { 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01 },
.mlen = 8,
.mac = { 0xd2,0x36,0x82,0x9a,0x4c},
.tlen = 5,
}, { // 3
.key = {0x46, 0x13, 0x3d, 0xcb, 0xf2, 0x32, 0xb5, 0x19, 0x64,
0xe0, 0xd9, 0x5e, 0x83, 0x20, 0x8f, 0x15, 0x67, 0x32,
0xbf, 0x75, 0xb6, 0x73, 0xab, 0xf1},
.klen = 24,
.msg = { 0x80,0x00,0x00,0x00,0x00,0x00,0x00,0x00 },
.mlen = 8,
.mac = { 0x36,0x77,0x03,0x73},
.tlen = 4,
.chunks_msg = { 2, 3, 3 },
.num_chunks_message = 3,
}, { // 4
.key = {0x46, 0x13, 0x3d, 0xcb, 0xf2, 0x32, 0xb5, 0x19, 0x64,
0xe0, 0xd9, 0x5e, 0x83, 0x20, 0x8f, 0x15, 0x67, 0x32,
0xbf, 0x75, 0xb6, 0x73, 0xab, 0xf1},
.klen = 24,
.msg = { 0x00,0x00,0x00,0x00,0x80,0x00,0x00,0x00 },
.mlen = 8,
.mac = { 0x97,0x6a,0x35,0x19,0xeb,0xcd},
.tlen = 6,
.chunks_msg = { 1, 1, 6 },
.num_chunks_message = 3,
}, { // 5
.key = {0x46, 0x13, 0x3d, 0xcb, 0xf2, 0x32, 0xb5, 0x19, 0x64,
0xe0, 0xd9, 0x5e, 0x83, 0x20, 0x8f, 0x15, 0x67, 0x32,
0xbf, 0x75, 0xb6, 0x73, 0xab, 0xf1},
.klen = 24,
.msg = { 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01 },
.mlen = 8,
.mac = { 0xd2,0x36,0x82,0x9a,0x4c},
.tlen = 5,
.chunks_msg = { 1, 2, 1, 2, 2 },
.num_chunks_message = 5,
}, { // 6
.key = {0x46, 0x13, 0x3d, 0xcb, 0xf2, 0x32, 0xb5, 0x19, 0x64,
0xe0, 0xd9, 0x5e, 0x83, 0x20, 0x8f, 0x15, 0x67, 0x32,
0xbf, 0x75, 0xb6, 0x73, 0xab, 0xf1},
.klen = 24,
.msg = { 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x00,
0x00,0x00,0x00,0x00,0x00,0x00,0x01 },
.mlen = 16,
.mac = { 0xcd,0x02,0xf0,0xd2,0xb4},
.tlen = 5,
.chunks_msg = { 5, 5, 1, 2, 3 },
.num_chunks_message = 5,
}, { // 7
.key = {0x46, 0x13, 0x3d, 0xcb, 0xf2, 0x32, 0xb5, 0x19, 0x64,
0xe0, 0xd9, 0x5e, 0x83, 0x20, 0x8f, 0x15, 0x67, 0x32,
0xbf, 0x75, 0xb6, 0x73, 0xab, 0xf1},
.klen = 24,
.msg = { 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x00,
0x00,0x00,0x00,0x00,0x01 },
.mlen = 14,
.mac = { 0x59,0x45,0x53,0xd5,0x67},
.tlen = 5,
.chunks_msg = { 7, 2, 1, 2, 2 },
.num_chunks_message = 5,
}
};
#define NUM_OF_PUBLISHED_TESTSUITES 5
struct published_test_suite_info published_test_suites[] = {
{
.name = "DES3_ECB",
.tvcount = 10,
.tv = des3_ecb_tv,
.size = DES3_BLOCK_SIZE,
.mechanism = CKM_DES3_ECB,
}, {
.name = "DES3_CBC",
.tvcount = 10,
.tv = des3_cbc_tv,
.size = DES3_BLOCK_SIZE,
.mechanism = CKM_DES3_CBC,
}, {
.name = "DES3_CFB8",
.tvcount = 10,
.tv = des3_cfb8_tv,
.size = 1,
.mechanism = CKM_DES_CFB8,
}, {
.name = "DES3_CFB64",
.tvcount = 10,
.tv = des3_cfb64_tv,
.size = DES3_BLOCK_SIZE,
.mechanism = CKM_DES_CFB64,
}, {
.name = "DES3_OFB64",
.tvcount = 10,
.tv = des3_ofb64_tv,
.size = DES3_BLOCK_SIZE,
.mechanism = CKM_DES_OFB64,
}
};
#define NUM_OF_GENERATED_TESTSUITES 3
static struct generated_test_suite_info generated_test_suites[] = {
{
.name = "DES3_ECB",
.mech = {CKM_DES3_ECB, 0, 0},
}, {
.name = "DES3_CBC",
.mech = {CKM_DES3_CBC, &des3_cbc_iv, DES3_IV_SIZE},
}, {
.name = "DES3_CBC_PAD",
.mech = {CKM_DES3_CBC_PAD, &des3_cbc_iv, DES3_IV_SIZE},
}
};
#define NUM_OF_PUBLISHED_MAC_TESTSUITES 7
struct published_mac_test_suite_info published_mac_test_suites[] = {
{
.name = "2DES_CMAC_GENERAL",
.tvcount = 11,
.tv = des2_cmac_tv,
.mech = {CKM_DES3_CMAC_GENERAL, 0, 0},
.key_type = CKK_DES2,
}, {
.name = "3DES_CMAC_GENERAL",
.tvcount = 14,
.tv = des3_cmac_tv,
.mech = {CKM_DES3_CMAC_GENERAL, 0, 0},
.key_type = CKK_DES3,
}, {
.name = "2DES_CMAC",
.tvcount = 11,
.tv = des2_cmac_tv,
.mech = {CKM_DES3_CMAC, 0, 0},
.key_type = CKK_DES2,
}, {
.name = "3DES_CMAC",
.tvcount = 14,
.tv = des3_cmac_tv,
.mech = {CKM_DES3_CMAC, 0, 0},
.key_type = CKK_DES3,
}, {
.name = "IBM-CMAC",
.tvcount = 14,
.tv = des3_cmac_tv,
.mech = {CKM_IBM_CMAC, 0, 0},
.key_type = CKK_DES3,
}, {
.name = "3DES_MAC_GENERAL",
.tvcount = 8,
.tv = des3_cbc_mac_tv,
.mech = {CKM_DES3_MAC_GENERAL, 0, 0},
.key_type = CKK_DES3,
}, {
.name = "3DES_MAC",
.tvcount = 8,
.tv = des3_cbc_mac_tv,
.mech = {CKM_DES3_MAC, 0, 0},
.key_type = CKK_DES3,
}
};