-#ifndef __RSA__
-#define __RSA__
+#ifndef __FOLEO_RSA__
+#define __FOLEO_RSA__
#include <stdio.h>
#include <stdint.h>
#include <stdlib.h>
} rsakey_t;*/
-static void rsa_store(mpz_t n, uint8_t* b, uint32_t s)
+static void foleo_rsa_store(mpz_t n, uint8_t* b, uint32_t s)
{
for (uint32_t i = 0; i < s; i++)
{
}
}
-static void rsa_load(mpz_t n, uint8_t* b, uint32_t s)
+static void foleo_rsa_load(mpz_t n, uint8_t* b, uint32_t s)
{
mpz_set_ui(n, 0);
for (uint32_t i = 0; i < s; i++)
}
//Keys and their sizes in terms of BYTES
-rsakey_t rsa_public(uint8_t* p, uint16_t pS, uint8_t* q, uint16_t qS, uint8_t* e, uint16_t eS)
+rsakey_t foleo_rsa_public(uint8_t* p, uint16_t pS, uint8_t* q, uint16_t qS, uint8_t* e, uint16_t eS)
{
mpz_t np, nq, ne;
mpz_init(np);
mpz_set_ui(nq, 0);
mpz_set_ui(ne, 0);
- rsa_load(np, p, pS);
- rsa_load(nq, q, qS);
- rsa_load(ne, q, qS);
+ foleo_rsa_load(np, p, pS);
+ foleo_rsa_load(nq, q, qS);
+ foleo_rsa_load(ne, q, qS);
rsakey_t ret;
ret.bitWidth = (pS + qS) * 8;
return ret;
}
-rsakey_t rsa_private(uint8_t* p, uint16_t pS, uint8_t* q, uint16_t qS, uint8_t* e, uint16_t eS)
+rsakey_t foleo_rsa_private(uint8_t* p, uint16_t pS, uint8_t* q, uint16_t qS, uint8_t* e, uint16_t eS)
{
mpz_t np, nq, ne;
mpz_init(np);
mpz_set_ui(nq, 0);
mpz_set_ui(ne, 0);
- rsa_load(np, p, pS);
- rsa_load(nq, q, qS);
- rsa_load(ne, q, qS);
+ foleo_rsa_load(np, p, pS);
+ foleo_rsa_load(nq, q, qS);
+ foleo_rsa_load(ne, q, qS);
rsakey_t ret;
ret.bitWidth = (pS + qS) * 8;
return ret;
}
-uint8_t* rsa_export(rsakey_t key, uint8_t whichone, uint16_t* newsize)
+uint8_t* foleo_rsa_export(rsakey_t key, uint8_t whichone, uint16_t* newsize)
{
uint8_t* ret = malloc(key.bitWidth / 8);
switch (whichone)
case 'D':
case 'e':
case 'E':
- rsa_store(key.k, ret, key.bitWidth / 8);
+ foleo_rsa_store(key.k, ret, key.bitWidth / 8);
*newsize = key.bitWidth / 8;
return ret;
case 'n':
case 'N':
- rsa_store(key.n, ret, key.bitWidth / 8);
+ foleo_rsa_store(key.n, ret, key.bitWidth / 8);
*newsize = key.bitWidth / 8;
return ret;
}
return NULL;
}
-rsakey_t rsa_import(uint8_t* bufferK, uint16_t byteSizeK, uint8_t* bufferN, uint16_t byteSizeN)
+rsakey_t foleo_rsa_import(uint8_t* bufferK, uint16_t byteSizeK, uint8_t* bufferN, uint16_t byteSizeN)
{
rsakey_t ret;
ret.bitWidth = byteSizeN * 8;
mpz_set_ui(ret.k, 0);
mpz_set_ui(ret.n, 0);
- rsa_load(ret.k, bufferK, byteSizeK);
- rsa_load(ret.n, bufferN, byteSizeN);
+ foleo_rsa_load(ret.k, bufferK, byteSizeK);
+ foleo_rsa_load(ret.n, bufferN, byteSizeN);
return ret;
}
-void rsa_free(rsakey_t key)
+void foleo_rsa_free(rsakey_t key)
{
key.bitWidth = -1;
mpz_clear(key.n);
//convert to PKCS#1 v1.5 encryption block
// note this is considered insecure and OAEP should be used instead
// OAEP is handled by a separate library in this framework
-static uint8_t* RSA_Pad(uint16_t size, uint8_t* buffer, uint16_t bufferSizeInBytes)
+static uint8_t* FOLEO_RSA_Pad(uint16_t size, uint8_t* buffer, uint16_t bufferSizeInBytes)
{
size /= 8;
if (bufferSizeInBytes - 11 > size)
}
//Removes the PKCS#1 v1.5 padding scheme
-static uint8_t* RSA_DePad(uint16_t size, uint8_t* block, uint16_t* bufferSizeInBytes)
+static uint8_t* FOLEO_RSA_DePad(uint16_t size, uint8_t* block, uint16_t* bufferSizeInBytes)
{
uint16_t i = 2;
if (block[0] != 0x00 || (block[1] != 0x01 && block[1] != 0x02))
//convert to PKCS#1 v1.5 signature block
// note this is NOT considered insecure but PSS is often used instead
// PSS is handled by a separate library in this framework
-static uint8_t* RSA_PadSig(uint16_t size, uint8_t* buffer, uint16_t bufferSizeInBytes)
+static uint8_t* FOLEO_RSA_PadSig(uint16_t size, uint8_t* buffer, uint16_t bufferSizeInBytes)
{
size /= 8;
if (bufferSizeInBytes - 11 > size)
return block;
}
-static uint8_t* RSA_Apply(rsakey_t key, uint8_t* block)
+static uint8_t* FOLEO_RSA_Apply(rsakey_t key, uint8_t* block)
{
uint8_t* newblock = malloc(key.bitWidth / 8);
mpz_t n;
mpz_init(n);
mpz_set_ui(n, 0);
- rsa_load(n, block, key.bitWidth / 8);
+ foleo_rsa_load(n, block, key.bitWidth / 8);
mpz_powm(n, n, key.k, key.n);
- rsa_store(n, newblock, key.bitWidth / 8);
+ foleo_rsa_store(n, newblock, key.bitWidth / 8);
mpz_clear(n);
return newblock;
}
-static uint8_t* RSA_MGF1(uint8_t* (hashfunc)(uint8_t*, uint32_t), uint32_t hashsize, uint8_t* seed, uint32_t seedsize, uint32_t totalsize)
+static uint8_t* FOLEO_RSA_MGF1(uint8_t* (hashfunc)(uint8_t*, uint32_t), uint32_t hashsize, uint8_t* seed, uint32_t seedsize, uint32_t totalsize)
{
uint8_t* premask = malloc(seedsize + sizeof(uint32_t));
for (uint32_t i = 0; i < seedsize; i++) premask[i] = seed[i];
}
/*this uses sha-256*/
-static uint8_t* RSA_PadOAEP(uint16_t size, uint8_t* buffer, uint16_t mLen)
+static uint8_t* FOLEO_RSA_PadOAEP(uint16_t size, uint8_t* buffer, uint16_t mLen)
{
uint32_t kLen = size / 8; //length of RSA modulus
uint32_t hLen = 32; //length of hash output
fclose(f);
//Build DB
- uint8_t* HashL = sha256(NULL, 0);
+ uint8_t* HashL = foleo_sha256(NULL, 0);
uint8_t DB[dbLen];
uint32_t pos = 0;
for (uint32_t i = 0; i < hLen; i++) DB[pos++] = HashL[i];
for (uint32_t i = 0; i < mLen; i++) DB[pos++] = buffer[i];
//Mask DB
- uint8_t* DBMask = RSA_MGF1(sha256, hLen, Seed, hLen, dbLen);
+ uint8_t* DBMask = FOLEO_RSA_MGF1(foleo_sha256, hLen, Seed, hLen, dbLen);
for (uint32_t i = 0; i < dbLen; i++) DB[i] ^= DBMask[i];
free(DBMask);
//Mask Seed
- uint8_t* SeedMask = RSA_MGF1(sha256, hLen, DB, dbLen, hLen);
+ uint8_t* SeedMask = FOLEO_RSA_MGF1(foleo_sha256, hLen, DB, dbLen, hLen);
for (uint32_t i = 0; i < hLen; i++) Seed[i] ^= SeedMask[i];
free(SeedMask);
}
//Removes the OAEP padding scheme
-static uint8_t* RSA_DeOAEP(uint16_t size, uint8_t* block, uint16_t* bufferSizeInBytes)
+static uint8_t* FOLEO_RSA_DeOAEP(uint16_t size, uint8_t* block, uint16_t* bufferSizeInBytes)
{
if (block[0] != 0x00) return NULL;
uint32_t kLen = size / 8; //length of RSA modulus
for (uint32_t i = 0; i < dbLen; i++) MaskedDB[i] = block[i + 1 + hLen];
//Recover the original Seed
- uint8_t* Seed = RSA_MGF1(sha256, hLen, MaskedDB, dbLen, hLen);
+ uint8_t* Seed = FOLEO_RSA_MGF1(foleo_sha256, hLen, MaskedDB, dbLen, hLen);
for (uint32_t i = 0; i < hLen; i++) Seed[i] ^= MaskedSeed[i];
//Recover the original DB
- uint8_t* SeedMask = RSA_MGF1(sha256, hLen, Seed, hLen, dbLen);
+ uint8_t* SeedMask = FOLEO_RSA_MGF1(foleo_sha256, hLen, Seed, hLen, dbLen);
for (uint32_t i = 0; i < dbLen; i++) MaskedDB[i] ^= SeedMask[i];
free(Seed);
free(SeedMask);
return out;
}
-uint8_t* rsa_encrypt(rsakey_t key, uint8_t padding, uint8_t* buffer, uint16_t bufferSize)
+uint8_t* foleo_rsa_encrypt(rsakey_t key, uint8_t padding, uint8_t* buffer, uint16_t bufferSize)
{
uint8_t* block;
uint8_t* eblock;
- if (padding == RSA_ENCRYPTION)
+ if (padding == FOLEO_RSA_ENCRYPTION)
{
- block = RSA_Pad(key.bitWidth, buffer, bufferSize);
- eblock = RSA_Apply(key, block);
+ block = FOLEO_RSA_Pad(key.bitWidth, buffer, bufferSize);
+ eblock = FOLEO_RSA_Apply(key, block);
free(block);
}
- else if (padding == RSA_SIGNATURE)
+ else if (padding == FOLEO_RSA_SIGNATURE)
{
- block = RSA_PadSig(key.bitWidth, buffer, bufferSize);
- eblock = RSA_Apply(key, block);
+ block = FOLEO_RSA_PadSig(key.bitWidth, buffer, bufferSize);
+ eblock = FOLEO_RSA_Apply(key, block);
free(block);
}
- else if (padding == RSA_OAEP)
+ else if (padding == FOLEO_RSA_OAEP)
{
- block = RSA_PadOAEP(key.bitWidth, buffer, bufferSize);
- eblock = RSA_Apply(key, block);
+ block = FOLEO_RSA_PadOAEP(key.bitWidth, buffer, bufferSize);
+ eblock = FOLEO_RSA_Apply(key, block);
free(block);
}
else
{
- eblock = RSA_Apply(key, buffer);
+ eblock = FOLEO_RSA_Apply(key, buffer);
}
return eblock;
}
-uint8_t* rsa_decrypt(rsakey_t key, uint8_t padding, uint8_t* eblock, uint16_t* bufferSize)
+uint8_t* foleo_rsa_decrypt(rsakey_t key, uint8_t padding, uint8_t* eblock, uint16_t* bufferSize)
{
uint8_t* block;
uint8_t* buffer;
- if (padding == RSA_ENCRYPTION || padding == RSA_SIGNATURE)
+ if (padding == FOLEO_RSA_ENCRYPTION || padding == FOLEO_RSA_SIGNATURE)
{
- block = RSA_Apply(key, eblock);
- buffer = RSA_DePad(key.bitWidth, block, bufferSize);
+ block = FOLEO_RSA_Apply(key, eblock);
+ buffer = FOLEO_RSA_DePad(key.bitWidth, block, bufferSize);
free(block);
}
- else if (padding == RSA_OAEP)
+ else if (padding == FOLEO_RSA_OAEP)
{
- block = RSA_Apply(key, eblock);
- buffer = RSA_DeOAEP(key.bitWidth, block, bufferSize);
+ block = FOLEO_RSA_Apply(key, eblock);
+ buffer = FOLEO_RSA_DeOAEP(key.bitWidth, block, bufferSize);
free(block);
}
else
{
- buffer = RSA_Apply(key, eblock);
+ buffer = FOLEO_RSA_Apply(key, eblock);
}
return buffer;
}
--- /dev/null
+uint8_t NIST_HMAC_key1[] =
+{
+ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
+ 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
+ 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
+ 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F,
+ 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27,
+ 0x28, 0x29, 0x2A, 0x2B, 0x2C, 0x2D, 0x2E, 0x2F,
+ 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
+ 0x38, 0x39, 0x3A, 0x3B, 0x3C, 0x3D, 0x3E, 0x3F
+};
+uint8_t NIST_HMAC_data1[] =
+{
+ 0x53, 0x61, 0x6D, 0x70, 0x6C, 0x65, 0x20, 0x6D,
+ 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x20, 0x66,
+ 0x6F, 0x72, 0x20, 0x6B, 0x65, 0x79, 0x6C, 0x65,
+ 0x6E, 0x3D, 0x62, 0x6C, 0x6F, 0x63, 0x6B, 0x6C,
+ 0x65, 0x6E
+};
+uint8_t NIST_HMAC_result1[] =
+{
+ 0x8B, 0xB9, 0xA1, 0xDB, 0x98, 0x06, 0xF2, 0x0D,
+ 0xF7, 0xF7, 0x7B, 0x82, 0x13, 0x8C, 0x79, 0x14,
+ 0xD1, 0x74, 0xD5, 0x9E, 0x13, 0xDC, 0x4D, 0x01,
+ 0x69, 0xC9, 0x05, 0x7B, 0x13, 0x3E, 0x1D, 0x62
+};
+uint8_t NIST_HMAC_key2[] =
+{
+ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
+ 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
+ 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
+ 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F
+};
+uint8_t NIST_HMAC_data2[] =
+{
+ 0x53, 0x61, 0x6D, 0x70, 0x6C, 0x65, 0x20, 0x6D,
+ 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x20, 0x66,
+ 0x6F, 0x72, 0x20, 0x6B, 0x65, 0x79, 0x6C, 0x65,
+ 0x6E, 0x3C, 0x62, 0x6C, 0x6F, 0x63, 0x6B, 0x6C,
+ 0x65, 0x6E
+};
+uint8_t NIST_HMAC_result2[] =
+{
+ 0xA2, 0x8C, 0xF4, 0x31, 0x30, 0xEE, 0x69, 0x6A,
+ 0x98, 0xF1, 0x4A, 0x37, 0x67, 0x8B, 0x56, 0xBC,
+ 0xFC, 0xBD, 0xD9, 0xE5, 0xCF, 0x69, 0x71, 0x7F,
+ 0xEC, 0xF5, 0x48, 0x0F, 0x0E, 0xBD, 0xF7, 0x90
+};
+uint8_t NIST_HMAC_key3[] =
+{
+ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
+ 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
+ 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
+ 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F,
+ 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27,
+ 0x28, 0x29, 0x2A, 0x2B, 0x2C, 0x2D, 0x2E, 0x2F,
+ 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
+ 0x38, 0x39, 0x3A, 0x3B, 0x3C, 0x3D, 0x3E, 0x3F,
+ 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47,
+ 0x48, 0x49, 0x4A, 0x4B, 0x4C, 0x4D, 0x4E, 0x4F,
+ 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57,
+ 0x58, 0x59, 0x5A, 0x5B, 0x5C, 0x5D, 0x5E, 0x5F,
+ 0x60, 0x61, 0x62, 0x63
+};
+uint8_t NIST_HMAC_data3[] =
+{
+ 0x53, 0x61, 0x6D, 0x70, 0x6C, 0x65, 0x20, 0x6D,
+ 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x20, 0x66,
+ 0x6F, 0x72, 0x20, 0x6B, 0x65, 0x79, 0x6C, 0x65,
+ 0x6E, 0x3D, 0x62, 0x6C, 0x6F, 0x63, 0x6B, 0x6C,
+ 0x65, 0x6E
+};
+uint8_t NIST_HMAC_result3[] =
+{
+ 0xBD, 0xCC, 0xB6, 0xC7, 0x2D, 0xDE, 0xAD, 0xB5,
+ 0x00, 0xAE, 0x76, 0x83, 0x86, 0xCB, 0x38, 0xCC,
+ 0x41, 0xC6, 0x3D, 0xBB, 0x08, 0x78, 0xDD, 0xB9,
+ 0xC7, 0xA3, 0x8A, 0x43, 0x1B, 0x78, 0x37, 0x8D
+};
+uint8_t NIST_HMAC_key4[] =
+{
+ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
+ 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
+ 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
+ 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F,
+ 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27,
+ 0x28, 0x29, 0x2A, 0x2B, 0x2C, 0x2D, 0x2E, 0x2F,
+ 0x30
+};
+uint8_t NIST_HMAC_data4[] =
+{
+ 0x53, 0x61, 0x6D, 0x70, 0x6C, 0x65, 0x20, 0x6D,
+ 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x20, 0x66,
+ 0x6F, 0x72, 0x20, 0x6B, 0x65, 0x79, 0x6C, 0x65,
+ 0x6E, 0x3C, 0x62, 0x6C, 0x6F, 0x63, 0x6B, 0x6C,
+ 0x65, 0x6E, 0x2C, 0x20, 0x77, 0x69, 0x74, 0x68,
+ 0x20, 0x74, 0x72, 0x75, 0x6E, 0x63, 0x61, 0x74,
+ 0x65, 0x64, 0x20, 0x74, 0x61, 0x67
+};
+uint8_t NIST_HMAC_result4[] =
+{
+ 0x27, 0xA8, 0xB1, 0x57, 0x83, 0x9E, 0xFE, 0xAC,
+ 0x98, 0xDF, 0x07, 0x0B, 0x33, 0x1D, 0x59, 0x36
+};
+uint8_t RFC4231_HMAC_key1[] =
+{
+ 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
+ 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
+ 0x0b, 0x0b, 0x0b, 0x0b
+};
+uint8_t RFC4231_HMAC_data1[] =
+{
+ 0x48, 0x69, 0x20, 0x54, 0x68, 0x65, 0x72, 0x65
+};
+uint8_t RFC4231_HMAC_result1[] =
+{
+ 0xb0, 0x34, 0x4c, 0x61, 0xd8, 0xdb, 0x38, 0x53,
+ 0x5c, 0xa8, 0xaf, 0xce, 0xaf, 0x0b, 0xf1, 0x2b,
+ 0x88, 0x1d, 0xc2, 0x00, 0xc9, 0x83, 0x3d, 0xa7,
+ 0x26, 0xe9, 0x37, 0x6c, 0x2e, 0x32, 0xcf, 0xf7
+};
+uint8_t RFC4231_HMAC_key2[] =
+{
+ 0x4a, 0x65, 0x66, 0x65
+};
+uint8_t RFC4231_HMAC_data2[] =
+{
+ 0x77, 0x68, 0x61, 0x74, 0x20, 0x64, 0x6f, 0x20,
+ 0x79, 0x61, 0x20, 0x77, 0x61, 0x6e, 0x74, 0x20,
+ 0x66, 0x6f, 0x72, 0x20, 0x6e, 0x6f, 0x74, 0x68,
+ 0x69, 0x6e, 0x67, 0x3f
+};
+uint8_t RFC4231_HMAC_result2[] =
+{
+ 0x5b, 0xdc, 0xc1, 0x46, 0xbf, 0x60, 0x75, 0x4e,
+ 0x6a, 0x04, 0x24, 0x26, 0x08, 0x95, 0x75, 0xc7,
+ 0x5a, 0x00, 0x3f, 0x08, 0x9d, 0x27, 0x39, 0x83,
+ 0x9d, 0xec, 0x58, 0xb9, 0x64, 0xec, 0x38, 0x43
+};
+uint8_t RFC4231_HMAC_key3[] =
+{
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa
+};
+uint8_t RFC4231_HMAC_data3[] =
+{
+ 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
+ 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
+ 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
+ 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
+ 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
+ 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
+ 0xdd, 0xdd
+};
+uint8_t RFC4231_HMAC_result3[] =
+{
+ 0x77, 0x3e, 0xa9, 0x1e, 0x36, 0x80, 0x0e, 0x46,
+ 0x85, 0x4d, 0xb8, 0xeb, 0xd0, 0x91, 0x81, 0xa7,
+ 0x29, 0x59, 0x09, 0x8b, 0x3e, 0xf8, 0xc1, 0x22,
+ 0xd9, 0x63, 0x55, 0x14, 0xce, 0xd5, 0x65, 0xfe
+};
+uint8_t RFC4231_HMAC_key4[] =
+{
+ 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
+ 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10,
+ 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18,
+ 0x19
+};
+uint8_t RFC4231_HMAC_data4[] =
+{
+ 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
+ 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
+ 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
+ 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
+ 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
+ 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
+ 0xcd, 0xcd
+};
+uint8_t RFC4231_HMAC_result4[] =
+{
+ 0x82, 0x55, 0x8a, 0x38, 0x9a, 0x44, 0x3c, 0x0e,
+ 0xa4, 0xcc, 0x81, 0x98, 0x99, 0xf2, 0x08, 0x3a,
+ 0x85, 0xf0, 0xfa, 0xa3, 0xe5, 0x78, 0xf8, 0x07,
+ 0x7a, 0x2e, 0x3f, 0xf4, 0x67, 0x29, 0x66, 0x5b
+};
+uint8_t RFC4231_HMAC_key5[] =
+{
+ 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c,
+ 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c,
+ 0x0c, 0x0c, 0x0c, 0x0c
+};
+uint8_t RFC4231_HMAC_data5[] =
+{
+ 0x54, 0x65, 0x73, 0x74, 0x20,
+ 0x57, 0x69, 0x74, 0x68, 0x20,
+ 0x54, 0x72, 0x75, 0x6e, 0x63,
+ 0x61, 0x74, 0x69, 0x6f, 0x6e
+};
+uint8_t RFC4231_HMAC_result5[] =
+{
+ 0xa3, 0xb6, 0x16, 0x74, 0x73, 0x10, 0x0e,
+ 0xe0, 0x6e, 0x0c, 0x79, 0x6c, 0x29, 0x55,
+ 0x55, 0x2b
+};
+uint8_t RFC4231_HMAC_key6[] =
+{
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa
+};
+uint8_t RFC4231_HMAC_data6[] =
+{
+ 0x54, 0x65, 0x73, 0x74, 0x20, 0x55, 0x73, 0x69,
+ 0x6e, 0x67, 0x20, 0x4c, 0x61, 0x72, 0x67, 0x65,
+ 0x72, 0x20, 0x54, 0x68, 0x61, 0x6e, 0x20, 0x42,
+ 0x6c, 0x6f, 0x63, 0x6b, 0x2d, 0x53, 0x69, 0x7a,
+ 0x65, 0x20, 0x4b, 0x65, 0x79, 0x20, 0x2d, 0x20,
+ 0x48, 0x61, 0x73, 0x68, 0x20, 0x4b, 0x65, 0x79,
+ 0x20, 0x46, 0x69, 0x72, 0x73, 0x74
+};
+uint8_t RFC4231_HMAC_result6[] =
+{
+ 0x60, 0xe4, 0x31, 0x59, 0x1e, 0xe0, 0xb6, 0x7f,
+ 0x0d, 0x8a, 0x26, 0xaa, 0xcb, 0xf5, 0xb7, 0x7f,
+ 0x8e, 0x0b, 0xc6, 0x21, 0x37, 0x28, 0xc5, 0x14,
+ 0x05, 0x46, 0x04, 0x0f, 0x0e, 0xe3, 0x7f, 0x54
+};
+uint8_t RFC4231_HMAC_key7[] =
+{
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+ 0xaa, 0xaa, 0xaa
+};
+uint8_t RFC4231_HMAC_data7[] =
+{
+ 0x54, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20,
+ 0x61, 0x20, 0x74, 0x65, 0x73, 0x74, 0x20, 0x75,
+ 0x73, 0x69, 0x6e, 0x67, 0x20, 0x61, 0x20, 0x6c,
+ 0x61, 0x72, 0x67, 0x65, 0x72, 0x20, 0x74, 0x68,
+ 0x61, 0x6e, 0x20, 0x62, 0x6c, 0x6f, 0x63, 0x6b,
+ 0x2d, 0x73, 0x69, 0x7a, 0x65, 0x20, 0x6b, 0x65,
+ 0x79, 0x20, 0x61, 0x6e, 0x64, 0x20, 0x61, 0x20,
+ 0x6c, 0x61, 0x72, 0x67, 0x65, 0x72, 0x20, 0x74,
+ 0x68, 0x61, 0x6e, 0x20, 0x62, 0x6c, 0x6f, 0x63,
+ 0x6b, 0x2d, 0x73, 0x69, 0x7a, 0x65, 0x20, 0x64,
+ 0x61, 0x74, 0x61, 0x2e, 0x20, 0x54, 0x68, 0x65,
+ 0x20, 0x6b, 0x65, 0x79, 0x20, 0x6e, 0x65, 0x65,
+ 0x64, 0x73, 0x20, 0x74, 0x6f, 0x20, 0x62, 0x65,
+ 0x20, 0x68, 0x61, 0x73, 0x68, 0x65, 0x64, 0x20,
+ 0x62, 0x65, 0x66, 0x6f, 0x72, 0x65, 0x20, 0x62,
+ 0x65, 0x69, 0x6e, 0x67, 0x20, 0x75, 0x73, 0x65,
+ 0x64, 0x20, 0x62, 0x79, 0x20, 0x74, 0x68, 0x65,
+ 0x20, 0x48, 0x4d, 0x41, 0x43, 0x20, 0x61, 0x6c,
+ 0x67, 0x6f, 0x72, 0x69, 0x74, 0x68, 0x6d, 0x2e
+};
+uint8_t RFC4231_HMAC_result7[] =
+{
+ 0x9b, 0x09, 0xff, 0xa7, 0x1b, 0x94, 0x2f, 0xcb,
+ 0x27, 0x63, 0x5f, 0xbc, 0xd5, 0xb0, 0xe9, 0x44,
+ 0xbf, 0xdc, 0x63, 0x64, 0x4f, 0x07, 0x13, 0x93,
+ 0x8a, 0x7f, 0x51, 0x53, 0x5c, 0x3a, 0x35, 0xe2
+};
+
+uint8_t RFC5869_HKDF_ikm1[] =
+{
+ 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
+ 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
+ 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b
+};
+uint8_t RFC5869_HKDF_salt1[] =
+{
+ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
+ 0x08, 0x09, 0x0a, 0x0b, 0x0c
+};
+uint8_t RFC5869_HKDF_info1[] =
+{
+ 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9
+};
+uint8_t RFC5869_HKDF_result1[] =
+{
+ 0x3c, 0xb2, 0x5f, 0x25, 0xfa, 0xac, 0xd5, 0x7a, 0x90, 0x43,
+ 0x4f, 0x64, 0xd0, 0x36, 0x2f, 0x2a, 0x2d, 0x2d, 0x0a, 0x90,
+ 0xcf, 0x1a, 0x5a, 0x4c, 0x5d, 0xb0, 0x2d, 0x56, 0xec, 0xc4,
+ 0xc5, 0xbf, 0x34, 0x00, 0x72, 0x08, 0xd5, 0xb8, 0x87, 0x18,
+ 0x58, 0x65
+};
+uint8_t RFC5869_HKDF_ikm2[] =
+{
+ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
+ 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
+ 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
+ 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f,
+ 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27,
+ 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f,
+ 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
+ 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f,
+ 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47,
+ 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f
+};
+uint8_t RFC5869_HKDF_salt2[] =
+{
+ 0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67,
+ 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f,
+ 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77,
+ 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f,
+ 0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87,
+ 0x88, 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f,
+ 0x90, 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97,
+ 0x98, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f,
+ 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7,
+ 0xa8, 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf
+};
+uint8_t RFC5869_HKDF_info2[] =
+{
+ 0xb0, 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7,
+ 0xb8, 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf,
+ 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7,
+ 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf,
+ 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7,
+ 0xd8, 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf,
+ 0xe0, 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7,
+ 0xe8, 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef,
+ 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7,
+ 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff
+};
+uint8_t RFC5869_HKDF_result2[] =
+{
+ 0xb1, 0x1e, 0x39, 0x8d, 0xc8, 0x03, 0x27, 0xa1,
+ 0xc8, 0xe7, 0xf7, 0x8c, 0x59, 0x6a, 0x49, 0x34,
+ 0x4f, 0x01, 0x2e, 0xda, 0x2d, 0x4e, 0xfa, 0xd8,
+ 0xa0, 0x50, 0xcc, 0x4c, 0x19, 0xaf, 0xa9, 0x7c,
+ 0x59, 0x04, 0x5a, 0x99, 0xca, 0xc7, 0x82, 0x72,
+ 0x71, 0xcb, 0x41, 0xc6, 0x5e, 0x59, 0x0e, 0x09,
+ 0xda, 0x32, 0x75, 0x60, 0x0c, 0x2f, 0x09, 0xb8,
+ 0x36, 0x77, 0x93, 0xa9, 0xac, 0xa3, 0xdb, 0x71,
+ 0xcc, 0x30, 0xc5, 0x81, 0x79, 0xec, 0x3e, 0x87,
+ 0xc1, 0x4c, 0x01, 0xd5, 0xc1, 0xf3, 0x43, 0x4f,
+ 0x1d, 0x87
+};
+uint8_t RFC5869_HKDF_ikm3[] =
+{
+ 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
+ 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
+ 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b
+};
+uint8_t RFC5869_HKDF_salt3[] = {};
+uint8_t RFC5869_HKDF_info3[] = {};
+uint8_t RFC5869_HKDF_result3[] =
+{
+ 0x8d, 0xa4, 0xe7, 0x75, 0xa5, 0x63, 0xc1, 0x8f,
+ 0x71, 0x5f, 0x80, 0x2a, 0x06, 0x3c, 0x5a, 0x31,
+ 0xb8, 0xa1, 0x1f, 0x5c, 0x5e, 0xe1, 0x87, 0x9e,
+ 0xc3, 0x45, 0x4e, 0x5f, 0x3c, 0x73, 0x8d, 0x2d,
+ 0x9d, 0x20, 0x13, 0x95, 0xfa, 0xa4, 0xb6, 0x1a,
+ 0x96, 0xc8
+};
\ No newline at end of file